Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(324)

Side by Side Diff: net/third_party/nss/ssl/ssl.h

Issue 4670004: Change NSS's native auth patch to use PCERT_KEY_CONTEXT instead of HCRYPTPROV on Win (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Rebase Created 9 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « net/socket/ssl_client_socket_nss.cc ('k') | net/third_party/nss/ssl/sslimpl.h » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 /* 1 /*
2 * This file contains prototypes for the public SSL functions. 2 * This file contains prototypes for the public SSL functions.
3 * 3 *
4 * ***** BEGIN LICENSE BLOCK ***** 4 * ***** BEGIN LICENSE BLOCK *****
5 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 5 * Version: MPL 1.1/GPL 2.0/LGPL 2.1
6 * 6 *
7 * The contents of this file are subject to the Mozilla Public License Version 7 * The contents of this file are subject to the Mozilla Public License Version
8 * 1.1 (the "License"); you may not use this file except in compliance with 8 * 1.1 (the "License"); you may not use this file except in compliance with
9 * the License. You may obtain a copy of the License at 9 * the License. You may obtain a copy of the License at
10 * http://www.mozilla.org/MPL/ 10 * http://www.mozilla.org/MPL/
(...skipping 333 matching lines...) Expand 10 before | Expand all | Expand 10 after
344 /* 344 /*
345 * Prototype for SSL callback to get client auth data from the application, 345 * Prototype for SSL callback to get client auth data from the application,
346 * when using the underlying platform's cryptographic primitives. Returning 346 * when using the underlying platform's cryptographic primitives. Returning
347 * SECFailure will cause the socket to send no client certificate. 347 * SECFailure will cause the socket to send no client certificate.
348 * arg - application passed argument 348 * arg - application passed argument
349 * caNames - pointer to distinguished names of CAs that the server likes 349 * caNames - pointer to distinguished names of CAs that the server likes
350 * pRetCerts - pointer to pointer to list of certs, with the first being 350 * pRetCerts - pointer to pointer to list of certs, with the first being
351 * the client cert, and any following being used for chain 351 * the client cert, and any following being used for chain
352 * building 352 * building
353 * pRetKey - pointer to native key pointer, for return of key 353 * pRetKey - pointer to native key pointer, for return of key
354 * - Windows: pointer to HCRYPTPROV 354 * - Windows: A pointer to a PCERT_KEY_CONTEXT that was allocated
355 * - Mac OS X: pointer to SecKeyRef 355 * via PORT_Alloc(). Ownership of the PCERT_KEY_CONTEXT
356 * is transferred to NSS, which will free via
357 * PORT_Free().
358 * - Mac OS X: A pointer to a SecKeyRef. Ownership is
359 * transferred to NSS, which will free via CFRelease().
356 */ 360 */
357 typedef SECStatus (PR_CALLBACK *SSLGetPlatformClientAuthData)(void *arg, 361 typedef SECStatus (PR_CALLBACK *SSLGetPlatformClientAuthData)(void *arg,
358 PRFileDesc *fd, 362 PRFileDesc *fd,
359 CERTDistNames *caNames, 363 CERTDistNames *caNames,
360 CERTCertList **pRetCerts,/*return */ 364 CERTCertList **pRetCerts,/*return */
361 void **pRetKey);/* return */ 365 void **pRetKey);/* return */
362 366
363 /* 367 /*
364 * Set the client side callback for SSL to retrieve user's private key 368 * Set the client side callback for SSL to retrieve user's private key
365 * and certificate. 369 * and certificate.
(...skipping 382 matching lines...) Expand 10 before | Expand all | Expand 10 after
748 ** Did the handshake with the peer negotiate the given extension? 752 ** Did the handshake with the peer negotiate the given extension?
749 ** Output parameter valid only if function returns SECSuccess 753 ** Output parameter valid only if function returns SECSuccess
750 */ 754 */
751 SSL_IMPORT SECStatus SSL_HandshakeNegotiatedExtension(PRFileDesc * socket, 755 SSL_IMPORT SECStatus SSL_HandshakeNegotiatedExtension(PRFileDesc * socket,
752 SSLExtensionType extId, 756 SSLExtensionType extId,
753 PRBool *yes); 757 PRBool *yes);
754 758
755 SEC_END_PROTOS 759 SEC_END_PROTOS
756 760
757 #endif /* __ssl_h_ */ 761 #endif /* __ssl_h_ */
OLDNEW
« no previous file with comments | « net/socket/ssl_client_socket_nss.cc ('k') | net/third_party/nss/ssl/sslimpl.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698