| OLD | NEW |
| 1 /* | 1 /* |
| 2 * This file contains prototypes for the public SSL functions. | 2 * This file contains prototypes for the public SSL functions. |
| 3 * | 3 * |
| 4 * This Source Code Form is subject to the terms of the Mozilla Public | 4 * This Source Code Form is subject to the terms of the Mozilla Public |
| 5 * License, v. 2.0. If a copy of the MPL was not distributed with this | 5 * License, v. 2.0. If a copy of the MPL was not distributed with this |
| 6 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ | 6 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
| 7 | 7 |
| 8 #ifndef __ssl_h_ | 8 #ifndef __ssl_h_ |
| 9 #define __ssl_h_ | 9 #define __ssl_h_ |
| 10 | 10 |
| (...skipping 348 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 359 | 359 |
| 360 /* Returns, in |*vrange|, the range of enabled SSL3/TLS versions for |fd|. */ | 360 /* Returns, in |*vrange|, the range of enabled SSL3/TLS versions for |fd|. */ |
| 361 SSL_IMPORT SECStatus SSL_VersionRangeGet(PRFileDesc *fd, | 361 SSL_IMPORT SECStatus SSL_VersionRangeGet(PRFileDesc *fd, |
| 362 SSLVersionRange *vrange); | 362 SSLVersionRange *vrange); |
| 363 | 363 |
| 364 /* Sets the range of enabled SSL3/TLS versions for |fd| to |*vrange|. */ | 364 /* Sets the range of enabled SSL3/TLS versions for |fd| to |*vrange|. */ |
| 365 SSL_IMPORT SECStatus SSL_VersionRangeSet(PRFileDesc *fd, | 365 SSL_IMPORT SECStatus SSL_VersionRangeSet(PRFileDesc *fd, |
| 366 const SSLVersionRange *vrange); | 366 const SSLVersionRange *vrange); |
| 367 | 367 |
| 368 | 368 |
| 369 /* Values for "policy" argument to SSL_PolicySet */ | 369 /* Values for "policy" argument to SSL_CipherPolicySet */ |
| 370 /* Values returned by SSL_CipherPolicyGet. */ | 370 /* Values returned by SSL_CipherPolicyGet. */ |
| 371 #define SSL_NOT_ALLOWED 0 /* or invalid or unimplemented */ | 371 #define SSL_NOT_ALLOWED 0 /* or invalid or unimplemented */ |
| 372 #define SSL_ALLOWED 1 | 372 #define SSL_ALLOWED 1 |
| 373 #define SSL_RESTRICTED 2 /* only with "Step-Up" certs. */ | 373 #define SSL_RESTRICTED 2 /* only with "Step-Up" certs. */ |
| 374 | 374 |
| 375 /* Values for "on" with SSL_REQUIRE_CERTIFICATE. */ | 375 /* Values for "on" with SSL_REQUIRE_CERTIFICATE. */ |
| 376 #define SSL_REQUIRE_NEVER ((PRBool)0) | 376 #define SSL_REQUIRE_NEVER ((PRBool)0) |
| 377 #define SSL_REQUIRE_ALWAYS ((PRBool)1) | 377 #define SSL_REQUIRE_ALWAYS ((PRBool)1) |
| 378 #define SSL_REQUIRE_FIRST_HANDSHAKE ((PRBool)2) | 378 #define SSL_REQUIRE_FIRST_HANDSHAKE ((PRBool)2) |
| 379 #define SSL_REQUIRE_NO_ERROR ((PRBool)3) | 379 #define SSL_REQUIRE_NO_ERROR ((PRBool)3) |
| (...skipping 577 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 957 */ | 957 */ |
| 958 SSL_IMPORT SECStatus NSS_CmpCertChainWCANames(CERTCertificate *cert, | 958 SSL_IMPORT SECStatus NSS_CmpCertChainWCANames(CERTCertificate *cert, |
| 959 CERTDistNames *caNames); | 959 CERTDistNames *caNames); |
| 960 | 960 |
| 961 /* | 961 /* |
| 962 * Returns key exchange type of the keys in an SSL server certificate. | 962 * Returns key exchange type of the keys in an SSL server certificate. |
| 963 */ | 963 */ |
| 964 SSL_IMPORT SSLKEAType NSS_FindCertKEAType(CERTCertificate * cert); | 964 SSL_IMPORT SSLKEAType NSS_FindCertKEAType(CERTCertificate * cert); |
| 965 | 965 |
| 966 /* Set cipher policies to a predefined Domestic (U.S.A.) policy. | 966 /* Set cipher policies to a predefined Domestic (U.S.A.) policy. |
| 967 * This essentially enables all supported ciphers. | 967 * This essentially allows all supported ciphers. |
| 968 */ | 968 */ |
| 969 SSL_IMPORT SECStatus NSS_SetDomesticPolicy(void); | 969 SSL_IMPORT SECStatus NSS_SetDomesticPolicy(void); |
| 970 | 970 |
| 971 /* Set cipher policies to a predefined Policy that is exportable from the USA | 971 /* Set cipher policies to a predefined Policy that is exportable from the USA |
| 972 * according to present U.S. policies as we understand them. | 972 * according to present U.S. policies as we understand them. |
| 973 * See documentation for the list. | 973 * It is the same as NSS_SetDomesticPolicy now. |
| 974 * Note that your particular application program may be able to obtain | |
| 975 * an export license with more or fewer capabilities than those allowed | |
| 976 * by this function. In that case, you should use SSL_SetPolicy() | |
| 977 * to explicitly allow those ciphers you may legally export. | |
| 978 */ | 974 */ |
| 979 SSL_IMPORT SECStatus NSS_SetExportPolicy(void); | 975 SSL_IMPORT SECStatus NSS_SetExportPolicy(void); |
| 980 | 976 |
| 981 /* Set cipher policies to a predefined Policy that is exportable from the USA | 977 /* Set cipher policies to a predefined Policy that is exportable from the USA |
| 982 * according to present U.S. policies as we understand them, and that the | 978 * according to present U.S. policies as we understand them, and that the |
| 983 * nation of France will permit to be imported into their country. | 979 * nation of France will permit to be imported into their country. |
| 984 * See documentation for the list. | 980 * It is the same as NSS_SetDomesticPolicy now. |
| 985 */ | 981 */ |
| 986 SSL_IMPORT SECStatus NSS_SetFrancePolicy(void); | 982 SSL_IMPORT SECStatus NSS_SetFrancePolicy(void); |
| 987 | 983 |
| 988 SSL_IMPORT SSL3Statistics * SSL_GetStatistics(void); | 984 SSL_IMPORT SSL3Statistics * SSL_GetStatistics(void); |
| 989 | 985 |
| 990 /* Report more information than SSL_SecurityStatus. | 986 /* Report more information than SSL_SecurityStatus. |
| 991 ** Caller supplies the info struct. Function fills it in. | 987 ** Caller supplies the info struct. Function fills it in. |
| 992 */ | 988 */ |
| 993 SSL_IMPORT SECStatus SSL_GetChannelInfo(PRFileDesc *fd, SSLChannelInfo *info, | 989 SSL_IMPORT SECStatus SSL_GetChannelInfo(PRFileDesc *fd, SSLChannelInfo *info, |
| 994 PRUintn len); | 990 PRUintn len); |
| (...skipping 177 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1172 * should continue using the connection. If the application passes a non-zero | 1168 * should continue using the connection. If the application passes a non-zero |
| 1173 * value for second argument (error), or if SSL_AuthCertificateComplete returns | 1169 * value for second argument (error), or if SSL_AuthCertificateComplete returns |
| 1174 * anything other than SECSuccess, then the application should close the | 1170 * anything other than SECSuccess, then the application should close the |
| 1175 * connection. | 1171 * connection. |
| 1176 */ | 1172 */ |
| 1177 SSL_IMPORT SECStatus SSL_AuthCertificateComplete(PRFileDesc *fd, | 1173 SSL_IMPORT SECStatus SSL_AuthCertificateComplete(PRFileDesc *fd, |
| 1178 PRErrorCode error); | 1174 PRErrorCode error); |
| 1179 SEC_END_PROTOS | 1175 SEC_END_PROTOS |
| 1180 | 1176 |
| 1181 #endif /* __ssl_h_ */ | 1177 #endif /* __ssl_h_ */ |
| OLD | NEW |