Chromium Code Reviews| Index: net/third_party/nss/ssl/ssl.h |
| =================================================================== |
| --- net/third_party/nss/ssl/ssl.h (revision 130750) |
| +++ net/third_party/nss/ssl/ssl.h (working copy) |
| @@ -836,6 +836,24 @@ |
| struct SECKEYPrivateKeyStr **pRetKey); |
| /* |
| +** Configure DTLS-SRTP (RFC 5764) cipher suite preferences. |
| +** Input is a list of ciphers in descending preference order and a length |
| +** of the list. As a side effect, this causes the use_srtp extension to be |
| +** negotiated. |
| +*/ |
| +SSL_IMPORT SECStatus SSL_SetSRTPCiphers(PRFileDesc *socket, |
| + const PRUint16 *ciphers, |
| + unsigned int numCiphers); |
|
wtc
2012/04/20 02:02:13
To enable SSL/TLS cipher suites, one has to call t
ekr
2012/04/26 14:33:42
That seems to be a change consistent with NSS styl
wtc
2012/04/27 01:06:08
I just realized that one disadvantage of the
SSL_C
ekr
2012/04/27 03:36:34
I think it's likely to remain very small; there's
|
| + |
| +/* |
| +** Get the selected DTLS-SRTP cipher suite (if any). |
| +** To be called after the handshake completes. |
| +** Returns SECFailure if not negotiated. |
| +*/ |
| +SSL_IMPORT SECStatus SSL_GetSRTPCipher(PRFileDesc *socket, |
| + PRUint16 *cipher); |
| + |
| +/* |
| * Look to see if any of the signers in the cert chain for "cert" are found |
| * in the list of caNames. |
| * Returns SECSuccess if so, SECFailure if not. |