OLD | NEW |
1 /* | 1 /* |
2 * This file contains prototypes for the public SSL functions. | 2 * This file contains prototypes for the public SSL functions. |
3 * | 3 * |
4 * ***** BEGIN LICENSE BLOCK ***** | 4 * ***** BEGIN LICENSE BLOCK ***** |
5 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 | 5 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 |
6 * | 6 * |
7 * The contents of this file are subject to the Mozilla Public License Version | 7 * The contents of this file are subject to the Mozilla Public License Version |
8 * 1.1 (the "License"); you may not use this file except in compliance with | 8 * 1.1 (the "License"); you may not use this file except in compliance with |
9 * the License. You may obtain a copy of the License at | 9 * the License. You may obtain a copy of the License at |
10 * http://www.mozilla.org/MPL/ | 10 * http://www.mozilla.org/MPL/ |
(...skipping 333 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
344 /* | 344 /* |
345 * Prototype for SSL callback to get client auth data from the application, | 345 * Prototype for SSL callback to get client auth data from the application, |
346 * when using the underlying platform's cryptographic primitives. Returning | 346 * when using the underlying platform's cryptographic primitives. Returning |
347 * SECFailure will cause the socket to send no client certificate. | 347 * SECFailure will cause the socket to send no client certificate. |
348 * arg - application passed argument | 348 * arg - application passed argument |
349 * caNames - pointer to distinguished names of CAs that the server likes | 349 * caNames - pointer to distinguished names of CAs that the server likes |
350 * pRetCerts - pointer to pointer to list of certs, with the first being | 350 * pRetCerts - pointer to pointer to list of certs, with the first being |
351 * the client cert, and any following being used for chain | 351 * the client cert, and any following being used for chain |
352 * building | 352 * building |
353 * pRetKey - pointer to native key pointer, for return of key | 353 * pRetKey - pointer to native key pointer, for return of key |
354 * - Windows: pointer to HCRYPTPROV | 354 * - Windows: A pointer to a PCERT_KEY_CONTEXT that was allocated |
355 * - Mac OS X: pointer to SecKeyRef | 355 * via PORT_Alloc(). Ownership of the PCERT_KEY_CONTEXT |
| 356 * is transferred to NSS, which will free via |
| 357 * PORT_Free(). |
| 358 * - Mac OS X: A pointer to a SecKeyRef. Ownership is |
| 359 * transferred to NSS, which will free via CFRelease(). |
356 */ | 360 */ |
357 typedef SECStatus (PR_CALLBACK *SSLGetPlatformClientAuthData)(void *arg, | 361 typedef SECStatus (PR_CALLBACK *SSLGetPlatformClientAuthData)(void *arg, |
358 PRFileDesc *fd, | 362 PRFileDesc *fd, |
359 CERTDistNames *caNames, | 363 CERTDistNames *caNames, |
360 CERTCertList **pRetCerts,/*return */ | 364 CERTCertList **pRetCerts,/*return */ |
361 void **pRetKey);/* return */ | 365 void **pRetKey);/* return */ |
362 | 366 |
363 /* | 367 /* |
364 * Set the client side callback for SSL to retrieve user's private key | 368 * Set the client side callback for SSL to retrieve user's private key |
365 * and certificate. | 369 * and certificate. |
(...skipping 382 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
748 ** Did the handshake with the peer negotiate the given extension? | 752 ** Did the handshake with the peer negotiate the given extension? |
749 ** Output parameter valid only if function returns SECSuccess | 753 ** Output parameter valid only if function returns SECSuccess |
750 */ | 754 */ |
751 SSL_IMPORT SECStatus SSL_HandshakeNegotiatedExtension(PRFileDesc * socket, | 755 SSL_IMPORT SECStatus SSL_HandshakeNegotiatedExtension(PRFileDesc * socket, |
752 SSLExtensionType extId, | 756 SSLExtensionType extId, |
753 PRBool *yes); | 757 PRBool *yes); |
754 | 758 |
755 SEC_END_PROTOS | 759 SEC_END_PROTOS |
756 | 760 |
757 #endif /* __ssl_h_ */ | 761 #endif /* __ssl_h_ */ |
OLD | NEW |