Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 /* | 1 /* |
| 2 * This file contains prototypes for the public SSL functions. | 2 * This file contains prototypes for the public SSL functions. |
| 3 * | 3 * |
| 4 * This Source Code Form is subject to the terms of the Mozilla Public | 4 * This Source Code Form is subject to the terms of the Mozilla Public |
| 5 * License, v. 2.0. If a copy of the MPL was not distributed with this | 5 * License, v. 2.0. If a copy of the MPL was not distributed with this |
| 6 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ | 6 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
| 7 | 7 |
| 8 #ifndef __sslt_h_ | 8 #ifndef __sslt_h_ |
| 9 #define __sslt_h_ | 9 #define __sslt_h_ |
| 10 | 10 |
| (...skipping 85 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 96 ssl_calg_seed = 9, | 96 ssl_calg_seed = 9, |
| 97 ssl_calg_aes_gcm = 10 | 97 ssl_calg_aes_gcm = 10 |
| 98 } SSLCipherAlgorithm; | 98 } SSLCipherAlgorithm; |
| 99 | 99 |
| 100 typedef enum { | 100 typedef enum { |
| 101 ssl_mac_null = 0, | 101 ssl_mac_null = 0, |
| 102 ssl_mac_md5 = 1, | 102 ssl_mac_md5 = 1, |
| 103 ssl_mac_sha = 2, | 103 ssl_mac_sha = 2, |
| 104 ssl_hmac_md5 = 3, /* TLS HMAC version of mac_md5 */ | 104 ssl_hmac_md5 = 3, /* TLS HMAC version of mac_md5 */ |
| 105 ssl_hmac_sha = 4, /* TLS HMAC version of mac_sha */ | 105 ssl_hmac_sha = 4, /* TLS HMAC version of mac_sha */ |
| 106 ssl_hmac_sha256 = 5 | 106 ssl_hmac_sha256 = 5, |
| 107 ssl_hmac_sha384 = 6, | |
| 108 ssl_hmac_sha512 = 7, | |
|
wtc
2013/08/17 00:21:15
Question: to be future-proof, I added ssl_hmac_sha
Ryan Sleevi
2013/08/17 02:00:23
My preference would be not to introduce them until
wtc
2013/08/19 23:31:56
Done.
| |
| 109 ssl_mac_aead = 8 | |
| 107 } SSLMACAlgorithm; | 110 } SSLMACAlgorithm; |
| 108 | 111 |
| 109 typedef enum { | 112 typedef enum { |
| 110 ssl_compression_null = 0, | 113 ssl_compression_null = 0, |
| 111 ssl_compression_deflate = 1 /* RFC 3749 */ | 114 ssl_compression_deflate = 1 /* RFC 3749 */ |
| 112 } SSLCompressionMethod; | 115 } SSLCompressionMethod; |
| 113 | 116 |
| 114 typedef struct SSLChannelInfoStr { | 117 typedef struct SSLChannelInfoStr { |
| 115 PRUint32 length; | 118 PRUint32 length; |
| 116 PRUint16 protocolVersion; | 119 PRUint16 protocolVersion; |
| (...skipping 35 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 152 SSLKEAType keaType; | 155 SSLKEAType keaType; |
| 153 | 156 |
| 154 /* symmetric encryption info */ | 157 /* symmetric encryption info */ |
| 155 const char * symCipherName; | 158 const char * symCipherName; |
| 156 SSLCipherAlgorithm symCipher; | 159 SSLCipherAlgorithm symCipher; |
| 157 PRUint16 symKeyBits; | 160 PRUint16 symKeyBits; |
| 158 PRUint16 symKeySpace; | 161 PRUint16 symKeySpace; |
| 159 PRUint16 effectiveKeyBits; | 162 PRUint16 effectiveKeyBits; |
| 160 | 163 |
| 161 /* MAC info */ | 164 /* MAC info */ |
| 165 /* AEAD ciphers don't have a MAC. For an AEAD cipher, macAlgorithmName | |
| 166 * is "AEAD", macAlgorithm is ssl_mac_aead, and macBits is the length in | |
| 167 * bits of the authentication tag. */ | |
| 162 const char * macAlgorithmName; | 168 const char * macAlgorithmName; |
| 163 SSLMACAlgorithm macAlgorithm; | 169 SSLMACAlgorithm macAlgorithm; |
| 164 PRUint16 macBits; | 170 PRUint16 macBits; |
| 165 | 171 |
| 166 PRUintn isFIPS : 1; | 172 PRUintn isFIPS : 1; |
| 167 PRUintn isExportable : 1; | 173 PRUintn isExportable : 1; |
| 168 PRUintn nonStandard : 1; | 174 PRUintn nonStandard : 1; |
| 169 PRUintn reservedBits :29; | 175 PRUintn reservedBits :29; |
| 170 | 176 |
| 171 } SSLCipherSuiteInfo; | 177 } SSLCipherSuiteInfo; |
| (...skipping 27 matching lines...) Expand all Loading... | |
| 199 ssl_app_layer_protocol_xtn = 16, | 205 ssl_app_layer_protocol_xtn = 16, |
| 200 ssl_session_ticket_xtn = 35, | 206 ssl_session_ticket_xtn = 35, |
| 201 ssl_next_proto_nego_xtn = 13172, | 207 ssl_next_proto_nego_xtn = 13172, |
| 202 ssl_channel_id_xtn = 30031, | 208 ssl_channel_id_xtn = 30031, |
| 203 ssl_renegotiation_info_xtn = 0xff01 /* experimental number */ | 209 ssl_renegotiation_info_xtn = 0xff01 /* experimental number */ |
| 204 } SSLExtensionType; | 210 } SSLExtensionType; |
| 205 | 211 |
| 206 #define SSL_MAX_EXTENSIONS 11 | 212 #define SSL_MAX_EXTENSIONS 11 |
| 207 | 213 |
| 208 #endif /* __sslt_h_ */ | 214 #endif /* __sslt_h_ */ |
| OLD | NEW |