OLD | NEW |
---|---|
1 /* | 1 /* |
2 * This file contains prototypes for the public SSL functions. | 2 * This file contains prototypes for the public SSL functions. |
3 * | 3 * |
4 * This Source Code Form is subject to the terms of the Mozilla Public | 4 * This Source Code Form is subject to the terms of the Mozilla Public |
5 * License, v. 2.0. If a copy of the MPL was not distributed with this | 5 * License, v. 2.0. If a copy of the MPL was not distributed with this |
6 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ | 6 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
7 | 7 |
8 #ifndef __ssl_h_ | 8 #ifndef __ssl_h_ |
9 #define __ssl_h_ | 9 #define __ssl_h_ |
10 | 10 |
(...skipping 143 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
154 * configurations) prevent the same attack by prepending an empty | 154 * configurations) prevent the same attack by prepending an empty |
155 * application_data record to every application_data record they send; we do | 155 * application_data record to every application_data record they send; we do |
156 * not do that because some implementations cannot handle empty | 156 * not do that because some implementations cannot handle empty |
157 * application_data records. Also, we only split application_data records and | 157 * application_data records. Also, we only split application_data records and |
158 * not other types of records, because some implementations will not accept | 158 * not other types of records, because some implementations will not accept |
159 * fragmented records of some other types (e.g. some versions of NSS do not | 159 * fragmented records of some other types (e.g. some versions of NSS do not |
160 * accept fragmented alerts). | 160 * accept fragmented alerts). |
161 */ | 161 */ |
162 #define SSL_CBC_RANDOM_IV 23 | 162 #define SSL_CBC_RANDOM_IV 23 |
163 #define SSL_ENABLE_OCSP_STAPLING 24 /* Request OCSP stapling (client) */ | 163 #define SSL_ENABLE_OCSP_STAPLING 24 /* Request OCSP stapling (client) */ |
164 | |
165 /* SSL_ENABLE_NPN controls whether the NPN extension is enabled for the initial | |
wtc
2014/02/12 15:26:24
Define "NPN".
Should we say "SSL_ENABLE_NEXT_PROT
| |
166 * handshake when protocol negotiation is used. SSL_SetNextProtoCallback | |
167 * or SSL_SetNextProtoNego must be used to control the protocol negotiation; | |
168 * otherwise, the NPN extension will not be negotiated. SSL_ENABLE_NPN is | |
169 * currently enabled by default but this may change in future versions. | |
170 */ | |
171 #define SSL_ENABLE_NPN 25 | |
172 | |
173 /* SSL_ENABLE_ALPN controls whether the ALPN extension is enabled for the | |
wtc
2014/02/12 15:26:24
Define "APLN".
Should we say "SSL_ENABLE_APP_LAYE
| |
174 * initial handshake when protocol negotiation is used. SSL_SetNextProtoNego | |
175 * (not SSL_SetNextProtoCallback) must be used to control the protocol | |
176 * negotiation; otherwise, the ALPN extension will not be negotiated. ALPN is | |
177 * not negotiated for renegotiation handshakes, even though the ALPN | |
178 * specification defines a way to use ALPN during renegotiations. | |
179 * SSL_ENABLE_ALPN is currently disabled by default, but this may change in | |
180 * future versions. | |
181 */ | |
182 #define SSL_ENABLE_ALPN 26 | |
183 | |
164 /* Request Signed Certificate Timestamps via TLS extension (client) */ | 184 /* Request Signed Certificate Timestamps via TLS extension (client) */ |
165 #define SSL_ENABLE_SIGNED_CERT_TIMESTAMPS 25 | 185 #define SSL_ENABLE_SIGNED_CERT_TIMESTAMPS 27 |
166 #define SSL_ENABLE_FALLBACK_SCSV 26 /* Send fallback SCSV in | 186 #define SSL_ENABLE_FALLBACK_SCSV 28 /* Send fallback SCSV in |
167 * handshakes. */ | 187 * handshakes. */ |
168 | 188 |
169 #ifdef SSL_DEPRECATED_FUNCTION | 189 #ifdef SSL_DEPRECATED_FUNCTION |
170 /* Old deprecated function names */ | 190 /* Old deprecated function names */ |
171 SSL_IMPORT SECStatus SSL_Enable(PRFileDesc *fd, int option, PRBool on); | 191 SSL_IMPORT SECStatus SSL_Enable(PRFileDesc *fd, int option, PRBool on); |
172 SSL_IMPORT SECStatus SSL_EnableDefault(int option, PRBool on); | 192 SSL_IMPORT SECStatus SSL_EnableDefault(int option, PRBool on); |
173 #endif | 193 #endif |
174 | 194 |
175 /* New function names */ | 195 /* New function names */ |
176 SSL_IMPORT SECStatus SSL_OptionSet(PRFileDesc *fd, PRInt32 option, PRBool on); | 196 SSL_IMPORT SECStatus SSL_OptionSet(PRFileDesc *fd, PRInt32 option, PRBool on); |
(...skipping 991 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
1168 * should continue using the connection. If the application passes a non-zero | 1188 * should continue using the connection. If the application passes a non-zero |
1169 * value for second argument (error), or if SSL_AuthCertificateComplete returns | 1189 * value for second argument (error), or if SSL_AuthCertificateComplete returns |
1170 * anything other than SECSuccess, then the application should close the | 1190 * anything other than SECSuccess, then the application should close the |
1171 * connection. | 1191 * connection. |
1172 */ | 1192 */ |
1173 SSL_IMPORT SECStatus SSL_AuthCertificateComplete(PRFileDesc *fd, | 1193 SSL_IMPORT SECStatus SSL_AuthCertificateComplete(PRFileDesc *fd, |
1174 PRErrorCode error); | 1194 PRErrorCode error); |
1175 SEC_END_PROTOS | 1195 SEC_END_PROTOS |
1176 | 1196 |
1177 #endif /* __ssl_h_ */ | 1197 #endif /* __ssl_h_ */ |
OLD | NEW |