OLD | NEW |
1 /* | 1 /* |
2 * This file contains prototypes for the public SSL functions. | 2 * This file contains prototypes for the public SSL functions. |
3 * | 3 * |
4 * This Source Code Form is subject to the terms of the Mozilla Public | 4 * This Source Code Form is subject to the terms of the Mozilla Public |
5 * License, v. 2.0. If a copy of the MPL was not distributed with this | 5 * License, v. 2.0. If a copy of the MPL was not distributed with this |
6 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ | 6 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
7 | 7 |
8 #ifndef __ssl_h_ | 8 #ifndef __ssl_h_ |
9 #define __ssl_h_ | 9 #define __ssl_h_ |
10 | 10 |
(...skipping 334 matching lines...) Loading... |
345 | 345 |
346 /* Returns, in |*vrange|, the range of enabled SSL3/TLS versions for |fd|. */ | 346 /* Returns, in |*vrange|, the range of enabled SSL3/TLS versions for |fd|. */ |
347 SSL_IMPORT SECStatus SSL_VersionRangeGet(PRFileDesc *fd, | 347 SSL_IMPORT SECStatus SSL_VersionRangeGet(PRFileDesc *fd, |
348 SSLVersionRange *vrange); | 348 SSLVersionRange *vrange); |
349 | 349 |
350 /* Sets the range of enabled SSL3/TLS versions for |fd| to |*vrange|. */ | 350 /* Sets the range of enabled SSL3/TLS versions for |fd| to |*vrange|. */ |
351 SSL_IMPORT SECStatus SSL_VersionRangeSet(PRFileDesc *fd, | 351 SSL_IMPORT SECStatus SSL_VersionRangeSet(PRFileDesc *fd, |
352 const SSLVersionRange *vrange); | 352 const SSLVersionRange *vrange); |
353 | 353 |
354 | 354 |
355 /* Values for "policy" argument to SSL_PolicySet */ | 355 /* Values for "policy" argument to SSL_CipherPolicySet */ |
356 /* Values returned by SSL_CipherPolicyGet. */ | 356 /* Values returned by SSL_CipherPolicyGet. */ |
357 #define SSL_NOT_ALLOWED 0 /* or invalid or unimplemented */ | 357 #define SSL_NOT_ALLOWED 0 /* or invalid or unimplemented */ |
358 #define SSL_ALLOWED 1 | 358 #define SSL_ALLOWED 1 |
359 #define SSL_RESTRICTED 2 /* only with "Step-Up" certs. */ | 359 #define SSL_RESTRICTED 2 /* only with "Step-Up" certs. */ |
360 | 360 |
361 /* Values for "on" with SSL_REQUIRE_CERTIFICATE. */ | 361 /* Values for "on" with SSL_REQUIRE_CERTIFICATE. */ |
362 #define SSL_REQUIRE_NEVER ((PRBool)0) | 362 #define SSL_REQUIRE_NEVER ((PRBool)0) |
363 #define SSL_REQUIRE_ALWAYS ((PRBool)1) | 363 #define SSL_REQUIRE_ALWAYS ((PRBool)1) |
364 #define SSL_REQUIRE_FIRST_HANDSHAKE ((PRBool)2) | 364 #define SSL_REQUIRE_FIRST_HANDSHAKE ((PRBool)2) |
365 #define SSL_REQUIRE_NO_ERROR ((PRBool)3) | 365 #define SSL_REQUIRE_NO_ERROR ((PRBool)3) |
(...skipping 520 matching lines...) Loading... |
886 */ | 886 */ |
887 SSL_IMPORT SECStatus NSS_CmpCertChainWCANames(CERTCertificate *cert, | 887 SSL_IMPORT SECStatus NSS_CmpCertChainWCANames(CERTCertificate *cert, |
888 CERTDistNames *caNames); | 888 CERTDistNames *caNames); |
889 | 889 |
890 /* | 890 /* |
891 * Returns key exchange type of the keys in an SSL server certificate. | 891 * Returns key exchange type of the keys in an SSL server certificate. |
892 */ | 892 */ |
893 SSL_IMPORT SSLKEAType NSS_FindCertKEAType(CERTCertificate * cert); | 893 SSL_IMPORT SSLKEAType NSS_FindCertKEAType(CERTCertificate * cert); |
894 | 894 |
895 /* Set cipher policies to a predefined Domestic (U.S.A.) policy. | 895 /* Set cipher policies to a predefined Domestic (U.S.A.) policy. |
896 * This essentially enables all supported ciphers. | 896 * This essentially allows all supported ciphers. |
897 */ | 897 */ |
898 SSL_IMPORT SECStatus NSS_SetDomesticPolicy(void); | 898 SSL_IMPORT SECStatus NSS_SetDomesticPolicy(void); |
899 | 899 |
900 /* Set cipher policies to a predefined Policy that is exportable from the USA | 900 /* Set cipher policies to a predefined Policy that is exportable from the USA |
901 * according to present U.S. policies as we understand them. | 901 * according to present U.S. policies as we understand them. |
902 * See documentation for the list. | 902 * It is the same as NSS_SetDomesticPolicy now. |
903 * Note that your particular application program may be able to obtain | |
904 * an export license with more or fewer capabilities than those allowed | |
905 * by this function. In that case, you should use SSL_SetPolicy() | |
906 * to explicitly allow those ciphers you may legally export. | |
907 */ | 903 */ |
908 SSL_IMPORT SECStatus NSS_SetExportPolicy(void); | 904 SSL_IMPORT SECStatus NSS_SetExportPolicy(void); |
909 | 905 |
910 /* Set cipher policies to a predefined Policy that is exportable from the USA | 906 /* Set cipher policies to a predefined Policy that is exportable from the USA |
911 * according to present U.S. policies as we understand them, and that the | 907 * according to present U.S. policies as we understand them, and that the |
912 * nation of France will permit to be imported into their country. | 908 * nation of France will permit to be imported into their country. |
913 * See documentation for the list. | 909 * It is the same as NSS_SetDomesticPolicy now. |
914 */ | 910 */ |
915 SSL_IMPORT SECStatus NSS_SetFrancePolicy(void); | 911 SSL_IMPORT SECStatus NSS_SetFrancePolicy(void); |
916 | 912 |
917 SSL_IMPORT SSL3Statistics * SSL_GetStatistics(void); | 913 SSL_IMPORT SSL3Statistics * SSL_GetStatistics(void); |
918 | 914 |
919 /* Report more information than SSL_SecurityStatus. | 915 /* Report more information than SSL_SecurityStatus. |
920 ** Caller supplies the info struct. Function fills it in. | 916 ** Caller supplies the info struct. Function fills it in. |
921 */ | 917 */ |
922 SSL_IMPORT SECStatus SSL_GetChannelInfo(PRFileDesc *fd, SSLChannelInfo *info, | 918 SSL_IMPORT SECStatus SSL_GetChannelInfo(PRFileDesc *fd, SSLChannelInfo *info, |
923 PRUintn len); | 919 PRUintn len); |
(...skipping 177 matching lines...) Loading... |
1101 * should continue using the connection. If the application passes a non-zero | 1097 * should continue using the connection. If the application passes a non-zero |
1102 * value for second argument (error), or if SSL_AuthCertificateComplete returns | 1098 * value for second argument (error), or if SSL_AuthCertificateComplete returns |
1103 * anything other than SECSuccess, then the application should close the | 1099 * anything other than SECSuccess, then the application should close the |
1104 * connection. | 1100 * connection. |
1105 */ | 1101 */ |
1106 SSL_IMPORT SECStatus SSL_AuthCertificateComplete(PRFileDesc *fd, | 1102 SSL_IMPORT SECStatus SSL_AuthCertificateComplete(PRFileDesc *fd, |
1107 PRErrorCode error); | 1103 PRErrorCode error); |
1108 SEC_END_PROTOS | 1104 SEC_END_PROTOS |
1109 | 1105 |
1110 #endif /* __ssl_h_ */ | 1106 #endif /* __ssl_h_ */ |
OLD | NEW |