Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 /* | 1 /* |
| 2 * Copyright 2004 The WebRTC Project Authors. All rights reserved. | 2 * Copyright 2004 The WebRTC Project Authors. All rights reserved. |
| 3 * | 3 * |
| 4 * Use of this source code is governed by a BSD-style license | 4 * Use of this source code is governed by a BSD-style license |
| 5 * that can be found in the LICENSE file in the root of the source | 5 * that can be found in the LICENSE file in the root of the source |
| 6 * tree. An additional intellectual property rights grant can be found | 6 * tree. An additional intellectual property rights grant can be found |
| 7 * in the file PATENTS. All contributing project authors may | 7 * in the file PATENTS. All contributing project authors may |
| 8 * be found in the AUTHORS file in the root of the source tree. | 8 * be found in the AUTHORS file in the root of the source tree. |
| 9 */ | 9 */ |
| 10 | 10 |
| (...skipping 138 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 149 // Do DTLS or TLS. | 149 // Do DTLS or TLS. |
| 150 virtual void SetMode(SSLMode mode) = 0; | 150 virtual void SetMode(SSLMode mode) = 0; |
| 151 | 151 |
| 152 // Set maximum supported protocol version. The highest version supported by | 152 // Set maximum supported protocol version. The highest version supported by |
| 153 // both ends will be used for the connection, i.e. if one party supports | 153 // both ends will be used for the connection, i.e. if one party supports |
| 154 // DTLS 1.0 and the other DTLS 1.2, DTLS 1.0 will be used. | 154 // DTLS 1.0 and the other DTLS 1.2, DTLS 1.0 will be used. |
| 155 // If requested version is not supported by underlying crypto library, the | 155 // If requested version is not supported by underlying crypto library, the |
| 156 // next lower will be used. | 156 // next lower will be used. |
| 157 virtual void SetMaxProtocolVersion(SSLProtocolVersion version) = 0; | 157 virtual void SetMaxProtocolVersion(SSLProtocolVersion version) = 0; |
| 158 | 158 |
| 159 // Set the initial timeout for the handshake message. When the timeout | |
| 160 // expires, the handshake message gets retransmitted and the timeout is | |
| 161 // exponentially increased. | |
| 162 virtual void SetHandshakeTimeout(int timeout_ms) = 0; | |
|
Taylor Brandstetter
2017/02/02 18:07:41
nit: Better name would be "InitialRetransmissionTi
pthatcher2
2017/02/02 20:09:44
+1
skvlad
2017/02/02 22:19:33
I made it InitialHandshakeRetransmissionTimeout. L
Taylor Brandstetter
2017/02/02 22:57:27
I'd still call it just "InitialRetransmissionTimeo
| |
| 163 | |
| 159 // StartSSL starts negotiation with a peer, whose certificate is verified | 164 // StartSSL starts negotiation with a peer, whose certificate is verified |
| 160 // using the certificate digest. Generally, SetIdentity() and possibly | 165 // using the certificate digest. Generally, SetIdentity() and possibly |
| 161 // SetServerRole() should have been called before this. | 166 // SetServerRole() should have been called before this. |
| 162 // SetPeerCertificateDigest() must also be called. It may be called after | 167 // SetPeerCertificateDigest() must also be called. It may be called after |
| 163 // StartSSLWithPeer() but must be called before the underlying stream opens. | 168 // StartSSLWithPeer() but must be called before the underlying stream opens. |
| 164 // | 169 // |
| 165 // Use of the stream prior to calling StartSSL will pass data in clear text. | 170 // Use of the stream prior to calling StartSSL will pass data in clear text. |
| 166 // Calling StartSSL causes SSL negotiation to begin as soon as possible: right | 171 // Calling StartSSL causes SSL negotiation to begin as soon as possible: right |
| 167 // away if the underlying wrapped stream is already opened, or else as soon as | 172 // away if the underlying wrapped stream is already opened, or else as soon as |
| 168 // it opens. | 173 // it opens. |
| (...skipping 88 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 257 | 262 |
| 258 // If true (default), the client is required to provide a certificate during | 263 // If true (default), the client is required to provide a certificate during |
| 259 // handshake. If no certificate is given, handshake fails. This applies to | 264 // handshake. If no certificate is given, handshake fails. This applies to |
| 260 // server mode only. | 265 // server mode only. |
| 261 bool client_auth_enabled_; | 266 bool client_auth_enabled_; |
| 262 }; | 267 }; |
| 263 | 268 |
| 264 } // namespace rtc | 269 } // namespace rtc |
| 265 | 270 |
| 266 #endif // WEBRTC_BASE_SSLSTREAMADAPTER_H_ | 271 #endif // WEBRTC_BASE_SSLSTREAMADAPTER_H_ |
| OLD | NEW |