ne_session.h   ne_session.h 
skipping to change at line 141 skipping to change at line 141
* return value will fail the SSL negotiation. */ * return value will fail the SSL negotiation. */
typedef int (*ne_ssl_verify_fn)(void *userdata, int failures, typedef int (*ne_ssl_verify_fn)(void *userdata, int failures,
const ne_ssl_certificate *cert); const ne_ssl_certificate *cert);
/* Install a callback to handle server certificate verification. This /* Install a callback to handle server certificate verification. This
* is required when the CA certificate is not known for the server * is required when the CA certificate is not known for the server
* certificate, or the server cert has other verification problems. */ * certificate, or the server cert has other verification problems. */
void ne_ssl_set_verify(ne_session *sess, ne_ssl_verify_fn fn, void *userdat a); void ne_ssl_set_verify(ne_session *sess, ne_ssl_verify_fn fn, void *userdat a);
/* Use the given client certificate for the session. The client cert /* Use the given client certificate for the session. The client cert
* MUST be in the decrypted state, otherwise behaviour is undefined. */ * MUST be in the decrypted state, otherwise behaviour is undefined.
* The 'clicert' object is duplicated internally so can be destroyed
* by the caller. */
void ne_ssl_set_clicert(ne_session *sess, const ne_ssl_client_cert *clicert ); void ne_ssl_set_clicert(ne_session *sess, const ne_ssl_client_cert *clicert );
/* Indicate that the certificate 'cert' is trusted; 'cert' is /* Indicate that the certificate 'cert' is trusted; the 'cert' object
* duplicated internally and may be destroyed at will. */ * is duplicated internally so can be destroyed by the caller. */
void ne_ssl_trust_cert(ne_session *sess, const ne_ssl_certificate *cert); void ne_ssl_trust_cert(ne_session *sess, const ne_ssl_certificate *cert);
/* If the SSL library provided a default set of CA certificates, trust /* If the SSL library provided a default set of CA certificates, trust
* this set of CAs. */ * this set of CAs. */
void ne_ssl_trust_default_ca(ne_session *sess); void ne_ssl_trust_default_ca(ne_session *sess);
/* Callback used to load a client certificate on demand. If dncount /* Callback used to load a client certificate on demand. If dncount
* is > 0, the 'dnames' array dnames[0] through dnames[dncount-1] * is > 0, the 'dnames' array dnames[0] through dnames[dncount-1]
* gives the list of CA names which the server indicated were * gives the list of CA names which the server indicated were
* acceptable. The callback should load an appropriate client * acceptable. The callback should load an appropriate client
 End of changes. 2 change blocks. 
3 lines changed or deleted 5 lines changed or added

This html diff was produced by rfcdiff 1.41. The latest version is available from http://tools.ietf.org/tools/rfcdiff/