Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 /* | 1 /* |
| 2 * This file contains prototypes for the public SSL functions. | 2 * This file contains prototypes for the public SSL functions. |
| 3 * | 3 * |
| 4 * This Source Code Form is subject to the terms of the Mozilla Public | 4 * This Source Code Form is subject to the terms of the Mozilla Public |
| 5 * License, v. 2.0. If a copy of the MPL was not distributed with this | 5 * License, v. 2.0. If a copy of the MPL was not distributed with this |
| 6 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ | 6 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
| 7 | 7 |
| 8 #ifndef __ssl_h_ | 8 #ifndef __ssl_h_ |
| 9 #define __ssl_h_ | 9 #define __ssl_h_ |
| 10 | 10 |
| (...skipping 143 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 154 * configurations) prevent the same attack by prepending an empty | 154 * configurations) prevent the same attack by prepending an empty |
| 155 * application_data record to every application_data record they send; we do | 155 * application_data record to every application_data record they send; we do |
| 156 * not do that because some implementations cannot handle empty | 156 * not do that because some implementations cannot handle empty |
| 157 * application_data records. Also, we only split application_data records and | 157 * application_data records. Also, we only split application_data records and |
| 158 * not other types of records, because some implementations will not accept | 158 * not other types of records, because some implementations will not accept |
| 159 * fragmented records of some other types (e.g. some versions of NSS do not | 159 * fragmented records of some other types (e.g. some versions of NSS do not |
| 160 * accept fragmented alerts). | 160 * accept fragmented alerts). |
| 161 */ | 161 */ |
| 162 #define SSL_CBC_RANDOM_IV 23 | 162 #define SSL_CBC_RANDOM_IV 23 |
| 163 #define SSL_ENABLE_OCSP_STAPLING 24 /* Request OCSP stapling (client) */ | 163 #define SSL_ENABLE_OCSP_STAPLING 24 /* Request OCSP stapling (client) */ |
| 164 | |
| 165 /* SSL_ENABLE_NPN controls whether the NPN extension is enabled for the initial | |
|
wtc
2014/02/12 15:26:24
Define "NPN".
Should we say "SSL_ENABLE_NEXT_PROT
| |
| 166 * handshake when protocol negotiation is used. SSL_SetNextProtoCallback | |
| 167 * or SSL_SetNextProtoNego must be used to control the protocol negotiation; | |
| 168 * otherwise, the NPN extension will not be negotiated. SSL_ENABLE_NPN is | |
| 169 * currently enabled by default but this may change in future versions. | |
| 170 */ | |
| 171 #define SSL_ENABLE_NPN 25 | |
| 172 | |
| 173 /* SSL_ENABLE_ALPN controls whether the ALPN extension is enabled for the | |
|
wtc
2014/02/12 15:26:24
Define "APLN".
Should we say "SSL_ENABLE_APP_LAYE
| |
| 174 * initial handshake when protocol negotiation is used. SSL_SetNextProtoNego | |
| 175 * (not SSL_SetNextProtoCallback) must be used to control the protocol | |
| 176 * negotiation; otherwise, the ALPN extension will not be negotiated. ALPN is | |
| 177 * not negotiated for renegotiation handshakes, even though the ALPN | |
| 178 * specification defines a way to use ALPN during renegotiations. | |
| 179 * SSL_ENABLE_ALPN is currently disabled by default, but this may change in | |
| 180 * future versions. | |
| 181 */ | |
| 182 #define SSL_ENABLE_ALPN 26 | |
| 183 | |
| 164 /* Request Signed Certificate Timestamps via TLS extension (client) */ | 184 /* Request Signed Certificate Timestamps via TLS extension (client) */ |
| 165 #define SSL_ENABLE_SIGNED_CERT_TIMESTAMPS 25 | 185 #define SSL_ENABLE_SIGNED_CERT_TIMESTAMPS 27 |
| 166 #define SSL_ENABLE_FALLBACK_SCSV 26 /* Send fallback SCSV in | 186 #define SSL_ENABLE_FALLBACK_SCSV 28 /* Send fallback SCSV in |
| 167 * handshakes. */ | 187 * handshakes. */ |
| 168 | 188 |
| 169 #ifdef SSL_DEPRECATED_FUNCTION | 189 #ifdef SSL_DEPRECATED_FUNCTION |
| 170 /* Old deprecated function names */ | 190 /* Old deprecated function names */ |
| 171 SSL_IMPORT SECStatus SSL_Enable(PRFileDesc *fd, int option, PRBool on); | 191 SSL_IMPORT SECStatus SSL_Enable(PRFileDesc *fd, int option, PRBool on); |
| 172 SSL_IMPORT SECStatus SSL_EnableDefault(int option, PRBool on); | 192 SSL_IMPORT SECStatus SSL_EnableDefault(int option, PRBool on); |
| 173 #endif | 193 #endif |
| 174 | 194 |
| 175 /* New function names */ | 195 /* New function names */ |
| 176 SSL_IMPORT SECStatus SSL_OptionSet(PRFileDesc *fd, PRInt32 option, PRBool on); | 196 SSL_IMPORT SECStatus SSL_OptionSet(PRFileDesc *fd, PRInt32 option, PRBool on); |
| (...skipping 991 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 1168 * should continue using the connection. If the application passes a non-zero | 1188 * should continue using the connection. If the application passes a non-zero |
| 1169 * value for second argument (error), or if SSL_AuthCertificateComplete returns | 1189 * value for second argument (error), or if SSL_AuthCertificateComplete returns |
| 1170 * anything other than SECSuccess, then the application should close the | 1190 * anything other than SECSuccess, then the application should close the |
| 1171 * connection. | 1191 * connection. |
| 1172 */ | 1192 */ |
| 1173 SSL_IMPORT SECStatus SSL_AuthCertificateComplete(PRFileDesc *fd, | 1193 SSL_IMPORT SECStatus SSL_AuthCertificateComplete(PRFileDesc *fd, |
| 1174 PRErrorCode error); | 1194 PRErrorCode error); |
| 1175 SEC_END_PROTOS | 1195 SEC_END_PROTOS |
| 1176 | 1196 |
| 1177 #endif /* __ssl_h_ */ | 1197 #endif /* __ssl_h_ */ |
| OLD | NEW |