summaryrefslogtreecommitdiffstats
path: root/security/manager/ssl/nsNSSCallbacks.h
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--security/manager/ssl/nsNSSCallbacks.h45
1 files changed, 45 insertions, 0 deletions
diff --git a/security/manager/ssl/nsNSSCallbacks.h b/security/manager/ssl/nsNSSCallbacks.h
new file mode 100644
index 0000000000..18b7a83540
--- /dev/null
+++ b/security/manager/ssl/nsNSSCallbacks.h
@@ -0,0 +1,45 @@
+/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
+ *
+ * This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+#ifndef nsNSSCallbacks_h
+#define nsNSSCallbacks_h
+
+#include "mozilla/Attributes.h"
+#include "mozilla/BasePrincipal.h"
+#include "mozilla/TimeStamp.h"
+#include "mozilla/Vector.h"
+#include "nspr.h"
+#include "nsString.h"
+#include "pk11func.h"
+#include "mozpkix/pkix.h"
+#include "mozpkix/pkixtypes.h"
+#include "nsIX509Cert.h"
+
+using mozilla::OriginAttributes;
+using mozilla::TimeDuration;
+using mozilla::Vector;
+
+class nsILoadGroup;
+
+char* PK11PasswordPrompt(PK11SlotInfo* slot, PRBool retry, void* arg);
+
+void HandshakeCallback(PRFileDesc* fd, void* client_data);
+SECStatus CanFalseStartCallback(PRFileDesc* fd, void* client_data,
+ PRBool* canFalseStart);
+
+mozilla::pkix::Result DoOCSPRequest(
+ const nsCString& aiaLocation, const OriginAttributes& originAttributes,
+ uint8_t (&ocspRequest)[mozilla::pkix::OCSP_REQUEST_MAX_LENGTH],
+ size_t ocspRequestLength, TimeDuration timeout,
+ /*out*/ Vector<uint8_t>& result);
+
+nsCString getKeaGroupName(uint32_t aKeaGroup);
+nsCString getSignatureName(uint32_t aSignatureScheme);
+nsresult IsCertificateDistrustImminent(
+ const nsTArray<RefPtr<nsIX509Cert>>& aCertArray,
+ /* out */ bool& isDistrusted);
+
+#endif // nsNSSCallbacks_h