summaryrefslogtreecommitdiffstats
path: root/net/third_party/nss/ssl/ssl.h
diff options
context:
space:
mode:
authorwtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-06-05 16:39:00 +0000
committerwtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-06-05 16:39:00 +0000
commitbb5ceb93a5ec91b4bde5fd2340b4e74691720354 (patch)
tree5d838d76297f1e37697d5347efe84bad7843fd52 /net/third_party/nss/ssl/ssl.h
parent623bdfc15be9c9be0a11cc3c4ae0d93e8a913860 (diff)
downloadchromium_src-bb5ceb93a5ec91b4bde5fd2340b4e74691720354.zip
chromium_src-bb5ceb93a5ec91b4bde5fd2340b4e74691720354.tar.gz
chromium_src-bb5ceb93a5ec91b4bde5fd2340b4e74691720354.tar.bz2
Implement RFC 5764 (DTLS-SRTP).
The patch is contributed by Eric Rescorla. R=rsleevi@chromium.org,ekr@rtfm.com BUG=120938 TEST=none (eventually covered by libjingle tests) Review URL: https://chromiumcodereview.appspot.com/9982019 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@140535 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/third_party/nss/ssl/ssl.h')
-rw-r--r--net/third_party/nss/ssl/ssl.h22
1 files changed, 22 insertions, 0 deletions
diff --git a/net/third_party/nss/ssl/ssl.h b/net/third_party/nss/ssl/ssl.h
index 3d8fdcb..4cfede3 100644
--- a/net/third_party/nss/ssl/ssl.h
+++ b/net/third_party/nss/ssl/ssl.h
@@ -834,6 +834,28 @@ NSS_GetClientAuthData(void * arg,
struct SECKEYPrivateKeyStr **pRetKey);
/*
+** Configure DTLS-SRTP (RFC 5764) cipher suite preferences.
+** Input is a list of ciphers in descending preference order and a length
+** of the list. As a side effect, this causes the use_srtp extension to be
+** negotiated.
+**
+** Invalid or unimplemented cipher suites in |ciphers| are ignored. If at
+** least one cipher suite in |ciphers| is implemented, returns SECSuccess.
+** Otherwise returns SECFailure.
+*/
+SSL_IMPORT SECStatus SSL_SetSRTPCiphers(PRFileDesc *fd,
+ const PRUint16 *ciphers,
+ unsigned int numCiphers);
+
+/*
+** Get the selected DTLS-SRTP cipher suite (if any).
+** To be called after the handshake completes.
+** Returns SECFailure if not negotiated.
+*/
+SSL_IMPORT SECStatus SSL_GetSRTPCipher(PRFileDesc *fd,
+ PRUint16 *cipher);
+
+/*
* Look to see if any of the signers in the cert chain for "cert" are found
* in the list of caNames.
* Returns SECSuccess if so, SECFailure if not.