Chromium Code Reviews

Side by Side Diff: net/third_party/nss/ssl/ssl.h

Issue 23279007: Initialize the 'policy' setting of all cipher suites to SSL_ALLOWED, (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src/
Patch Set: Created 7 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments.
Jump to:
View unified diff | | Annotate | Revision Log
« no previous file with comments | « no previous file | net/third_party/nss/ssl/ssl3con.c » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 /* 1 /*
2 * This file contains prototypes for the public SSL functions. 2 * This file contains prototypes for the public SSL functions.
3 * 3 *
4 * This Source Code Form is subject to the terms of the Mozilla Public 4 * This Source Code Form is subject to the terms of the Mozilla Public
5 * License, v. 2.0. If a copy of the MPL was not distributed with this 5 * License, v. 2.0. If a copy of the MPL was not distributed with this
6 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ 6 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
7 7
8 #ifndef __ssl_h_ 8 #ifndef __ssl_h_
9 #define __ssl_h_ 9 #define __ssl_h_
10 10
(...skipping 334 matching lines...)
345 345
346 /* Returns, in |*vrange|, the range of enabled SSL3/TLS versions for |fd|. */ 346 /* Returns, in |*vrange|, the range of enabled SSL3/TLS versions for |fd|. */
347 SSL_IMPORT SECStatus SSL_VersionRangeGet(PRFileDesc *fd, 347 SSL_IMPORT SECStatus SSL_VersionRangeGet(PRFileDesc *fd,
348 SSLVersionRange *vrange); 348 SSLVersionRange *vrange);
349 349
350 /* Sets the range of enabled SSL3/TLS versions for |fd| to |*vrange|. */ 350 /* Sets the range of enabled SSL3/TLS versions for |fd| to |*vrange|. */
351 SSL_IMPORT SECStatus SSL_VersionRangeSet(PRFileDesc *fd, 351 SSL_IMPORT SECStatus SSL_VersionRangeSet(PRFileDesc *fd,
352 const SSLVersionRange *vrange); 352 const SSLVersionRange *vrange);
353 353
354 354
355 /* Values for "policy" argument to SSL_PolicySet */ 355 /* Values for "policy" argument to SSL_CipherPolicySet */
356 /* Values returned by SSL_CipherPolicyGet. */ 356 /* Values returned by SSL_CipherPolicyGet. */
357 #define SSL_NOT_ALLOWED 0 /* or invalid or unimplemented */ 357 #define SSL_NOT_ALLOWED 0 /* or invalid or unimplemented */
358 #define SSL_ALLOWED 1 358 #define SSL_ALLOWED 1
359 #define SSL_RESTRICTED 2 /* only with "Step-Up" certs. */ 359 #define SSL_RESTRICTED 2 /* only with "Step-Up" certs. */
360 360
361 /* Values for "on" with SSL_REQUIRE_CERTIFICATE. */ 361 /* Values for "on" with SSL_REQUIRE_CERTIFICATE. */
362 #define SSL_REQUIRE_NEVER ((PRBool)0) 362 #define SSL_REQUIRE_NEVER ((PRBool)0)
363 #define SSL_REQUIRE_ALWAYS ((PRBool)1) 363 #define SSL_REQUIRE_ALWAYS ((PRBool)1)
364 #define SSL_REQUIRE_FIRST_HANDSHAKE ((PRBool)2) 364 #define SSL_REQUIRE_FIRST_HANDSHAKE ((PRBool)2)
365 #define SSL_REQUIRE_NO_ERROR ((PRBool)3) 365 #define SSL_REQUIRE_NO_ERROR ((PRBool)3)
(...skipping 520 matching lines...)
886 */ 886 */
887 SSL_IMPORT SECStatus NSS_CmpCertChainWCANames(CERTCertificate *cert, 887 SSL_IMPORT SECStatus NSS_CmpCertChainWCANames(CERTCertificate *cert,
888 CERTDistNames *caNames); 888 CERTDistNames *caNames);
889 889
890 /* 890 /*
891 * Returns key exchange type of the keys in an SSL server certificate. 891 * Returns key exchange type of the keys in an SSL server certificate.
892 */ 892 */
893 SSL_IMPORT SSLKEAType NSS_FindCertKEAType(CERTCertificate * cert); 893 SSL_IMPORT SSLKEAType NSS_FindCertKEAType(CERTCertificate * cert);
894 894
895 /* Set cipher policies to a predefined Domestic (U.S.A.) policy. 895 /* Set cipher policies to a predefined Domestic (U.S.A.) policy.
896 * This essentially enables all supported ciphers. 896 * This essentially allows all supported ciphers.
897 */ 897 */
898 SSL_IMPORT SECStatus NSS_SetDomesticPolicy(void); 898 SSL_IMPORT SECStatus NSS_SetDomesticPolicy(void);
899 899
900 /* Set cipher policies to a predefined Policy that is exportable from the USA 900 /* Set cipher policies to a predefined Policy that is exportable from the USA
901 * according to present U.S. policies as we understand them. 901 * according to present U.S. policies as we understand them.
902 * See documentation for the list. 902 * It is the same as NSS_SetDomesticPolicy now.
903 * Note that your particular application program may be able to obtain
904 * an export license with more or fewer capabilities than those allowed
905 * by this function. In that case, you should use SSL_SetPolicy()
906 * to explicitly allow those ciphers you may legally export.
907 */ 903 */
908 SSL_IMPORT SECStatus NSS_SetExportPolicy(void); 904 SSL_IMPORT SECStatus NSS_SetExportPolicy(void);
909 905
910 /* Set cipher policies to a predefined Policy that is exportable from the USA 906 /* Set cipher policies to a predefined Policy that is exportable from the USA
911 * according to present U.S. policies as we understand them, and that the 907 * according to present U.S. policies as we understand them, and that the
912 * nation of France will permit to be imported into their country. 908 * nation of France will permit to be imported into their country.
913 * See documentation for the list. 909 * It is the same as NSS_SetDomesticPolicy now.
914 */ 910 */
915 SSL_IMPORT SECStatus NSS_SetFrancePolicy(void); 911 SSL_IMPORT SECStatus NSS_SetFrancePolicy(void);
916 912
917 SSL_IMPORT SSL3Statistics * SSL_GetStatistics(void); 913 SSL_IMPORT SSL3Statistics * SSL_GetStatistics(void);
918 914
919 /* Report more information than SSL_SecurityStatus. 915 /* Report more information than SSL_SecurityStatus.
920 ** Caller supplies the info struct. Function fills it in. 916 ** Caller supplies the info struct. Function fills it in.
921 */ 917 */
922 SSL_IMPORT SECStatus SSL_GetChannelInfo(PRFileDesc *fd, SSLChannelInfo *info, 918 SSL_IMPORT SECStatus SSL_GetChannelInfo(PRFileDesc *fd, SSLChannelInfo *info,
923 PRUintn len); 919 PRUintn len);
(...skipping 177 matching lines...)
1101 * should continue using the connection. If the application passes a non-zero 1097 * should continue using the connection. If the application passes a non-zero
1102 * value for second argument (error), or if SSL_AuthCertificateComplete returns 1098 * value for second argument (error), or if SSL_AuthCertificateComplete returns
1103 * anything other than SECSuccess, then the application should close the 1099 * anything other than SECSuccess, then the application should close the
1104 * connection. 1100 * connection.
1105 */ 1101 */
1106 SSL_IMPORT SECStatus SSL_AuthCertificateComplete(PRFileDesc *fd, 1102 SSL_IMPORT SECStatus SSL_AuthCertificateComplete(PRFileDesc *fd,
1107 PRErrorCode error); 1103 PRErrorCode error);
1108 SEC_END_PROTOS 1104 SEC_END_PROTOS
1109 1105
1110 #endif /* __ssl_h_ */ 1106 #endif /* __ssl_h_ */
OLDNEW
« no previous file with comments | « no previous file | net/third_party/nss/ssl/ssl3con.c » ('j') | no next file with comments »

Powered by Google App Engine