Line data Source code
1 : /*
2 : * DO NOT EDIT. THIS FILE IS GENERATED FROM ../../../dist/idl/nsISSLSocketControl.idl
3 : */
4 :
5 : #ifndef __gen_nsISSLSocketControl_h__
6 : #define __gen_nsISSLSocketControl_h__
7 :
8 :
9 : #ifndef __gen_nsISupports_h__
10 : #include "nsISupports.h"
11 : #endif
12 :
13 : #include "mozilla/Assertions.h"
14 : #include "mozilla/DebugOnly.h"
15 :
16 : /* For IDL files that don't want to include root IDL files. */
17 : #ifndef NS_NO_VTABLE
18 : #define NS_NO_VTABLE
19 : #endif
20 : class nsIInterfaceRequestor; /* forward declaration */
21 :
22 : class nsIX509Cert; /* forward declaration */
23 :
24 : #include "nsTArrayForwardDeclare.h"
25 : class nsCString;
26 :
27 : /* starting interface: nsISSLSocketControl */
28 : #define NS_ISSLSOCKETCONTROL_IID_STR "418265c8-654e-4fbb-ba62-4eed27de1f03"
29 :
30 : #define NS_ISSLSOCKETCONTROL_IID \
31 : {0x418265c8, 0x654e, 0x4fbb, \
32 : { 0xba, 0x62, 0x4e, 0xed, 0x27, 0xde, 0x1f, 0x03 }}
33 :
34 0 : class NS_NO_VTABLE nsISSLSocketControl : public nsISupports {
35 : public:
36 :
37 : NS_DECLARE_STATIC_IID_ACCESSOR(NS_ISSLSOCKETCONTROL_IID)
38 :
39 : /* attribute nsIInterfaceRequestor notificationCallbacks; */
40 : NS_IMETHOD GetNotificationCallbacks(nsIInterfaceRequestor * *aNotificationCallbacks) = 0;
41 : NS_IMETHOD SetNotificationCallbacks(nsIInterfaceRequestor *aNotificationCallbacks) = 0;
42 :
43 : /* void proxyStartSSL (); */
44 : NS_IMETHOD ProxyStartSSL(void) = 0;
45 :
46 : /* void StartTLS (); */
47 : NS_IMETHOD StartTLS(void) = 0;
48 :
49 : /* [noscript] void setNPNList (in nsCStringTArrayRef aNPNList); */
50 : NS_IMETHOD SetNPNList(nsTArray<nsCString> & aNPNList) = 0;
51 :
52 : /* readonly attribute ACString negotiatedNPN; */
53 : NS_IMETHOD GetNegotiatedNPN(nsACString & aNegotiatedNPN) = 0;
54 :
55 : /* ACString getAlpnEarlySelection (); */
56 : NS_IMETHOD GetAlpnEarlySelection(nsACString & _retval) = 0;
57 :
58 : /* readonly attribute bool earlyDataAccepted; */
59 : NS_IMETHOD GetEarlyDataAccepted(bool *aEarlyDataAccepted) = 0;
60 :
61 : /* void driveHandshake (); */
62 : NS_IMETHOD DriveHandshake(void) = 0;
63 :
64 : /* boolean joinConnection (in ACString npnProtocol, in ACString hostname, in long port); */
65 : NS_IMETHOD JoinConnection(const nsACString & npnProtocol, const nsACString & hostname, int32_t port, bool *_retval) = 0;
66 :
67 : /* boolean testJoinConnection (in ACString npnProtocol, in ACString hostname, in long port); */
68 : NS_IMETHOD TestJoinConnection(const nsACString & npnProtocol, const nsACString & hostname, int32_t port, bool *_retval) = 0;
69 :
70 : /* boolean isAcceptableForHost (in ACString hostname); */
71 : NS_IMETHOD IsAcceptableForHost(const nsACString & hostname, bool *_retval) = 0;
72 :
73 : /* [infallible] readonly attribute short KEAUsed; */
74 : NS_IMETHOD GetKEAUsed(int16_t *aKEAUsed) = 0;
75 0 : inline int16_t GetKEAUsed()
76 : {
77 : int16_t result;
78 0 : mozilla::DebugOnly<nsresult> rv = GetKEAUsed(&result);
79 0 : MOZ_ASSERT(NS_SUCCEEDED(rv));
80 0 : return result;
81 : }
82 :
83 : /* [infallible] readonly attribute unsigned long KEAKeyBits; */
84 : NS_IMETHOD GetKEAKeyBits(uint32_t *aKEAKeyBits) = 0;
85 0 : inline uint32_t GetKEAKeyBits()
86 : {
87 : uint32_t result;
88 0 : mozilla::DebugOnly<nsresult> rv = GetKEAKeyBits(&result);
89 0 : MOZ_ASSERT(NS_SUCCEEDED(rv));
90 0 : return result;
91 : }
92 :
93 : enum {
94 : KEY_EXCHANGE_UNKNOWN = -1
95 : };
96 :
97 : /* readonly attribute uint32_t providerFlags; */
98 : NS_IMETHOD GetProviderFlags(uint32_t *aProviderFlags) = 0;
99 :
100 : enum {
101 : SSL_VERSION_3 = 768,
102 : TLS_VERSION_1 = 769,
103 : TLS_VERSION_1_1 = 770,
104 : TLS_VERSION_1_2 = 771,
105 : TLS_VERSION_1_3 = 772,
106 : SSL_VERSION_UNKNOWN = -1
107 : };
108 :
109 : /* [infallible] readonly attribute short SSLVersionUsed; */
110 : NS_IMETHOD GetSSLVersionUsed(int16_t *aSSLVersionUsed) = 0;
111 0 : inline int16_t GetSSLVersionUsed()
112 : {
113 : int16_t result;
114 0 : mozilla::DebugOnly<nsresult> rv = GetSSLVersionUsed(&result);
115 0 : MOZ_ASSERT(NS_SUCCEEDED(rv));
116 0 : return result;
117 : }
118 :
119 : /* [infallible] readonly attribute short SSLVersionOffered; */
120 : NS_IMETHOD GetSSLVersionOffered(int16_t *aSSLVersionOffered) = 0;
121 0 : inline int16_t GetSSLVersionOffered()
122 : {
123 : int16_t result;
124 0 : mozilla::DebugOnly<nsresult> rv = GetSSLVersionOffered(&result);
125 0 : MOZ_ASSERT(NS_SUCCEEDED(rv));
126 0 : return result;
127 : }
128 :
129 : enum {
130 : SSL_MAC_UNKNOWN = -1,
131 : SSL_MAC_NULL = 0,
132 : SSL_MAC_MD5 = 1,
133 : SSL_MAC_SHA = 2,
134 : SSL_HMAC_MD5 = 3,
135 : SSL_HMAC_SHA = 4,
136 : SSL_HMAC_SHA256 = 5,
137 : SSL_MAC_AEAD = 6
138 : };
139 :
140 : /* [infallible] readonly attribute short MACAlgorithmUsed; */
141 : NS_IMETHOD GetMACAlgorithmUsed(int16_t *aMACAlgorithmUsed) = 0;
142 0 : inline int16_t GetMACAlgorithmUsed()
143 : {
144 : int16_t result;
145 0 : mozilla::DebugOnly<nsresult> rv = GetMACAlgorithmUsed(&result);
146 0 : MOZ_ASSERT(NS_SUCCEEDED(rv));
147 0 : return result;
148 : }
149 :
150 : /* attribute nsIX509Cert clientCert; */
151 : NS_IMETHOD GetClientCert(nsIX509Cert * *aClientCert) = 0;
152 : NS_IMETHOD SetClientCert(nsIX509Cert *aClientCert) = 0;
153 :
154 : /* [infallible] readonly attribute boolean bypassAuthentication; */
155 : NS_IMETHOD GetBypassAuthentication(bool *aBypassAuthentication) = 0;
156 0 : inline bool GetBypassAuthentication()
157 : {
158 : bool result;
159 0 : mozilla::DebugOnly<nsresult> rv = GetBypassAuthentication(&result);
160 0 : MOZ_ASSERT(NS_SUCCEEDED(rv));
161 0 : return result;
162 : }
163 :
164 : /* [infallible] readonly attribute boolean failedVerification; */
165 : NS_IMETHOD GetFailedVerification(bool *aFailedVerification) = 0;
166 0 : inline bool GetFailedVerification()
167 : {
168 : bool result;
169 0 : mozilla::DebugOnly<nsresult> rv = GetFailedVerification(&result);
170 0 : MOZ_ASSERT(NS_SUCCEEDED(rv));
171 0 : return result;
172 : }
173 :
174 : };
175 :
176 : NS_DEFINE_STATIC_IID_ACCESSOR(nsISSLSocketControl, NS_ISSLSOCKETCONTROL_IID)
177 :
178 : /* Use this macro when declaring classes that implement this interface. */
179 : #define NS_DECL_NSISSLSOCKETCONTROL \
180 : NS_IMETHOD GetNotificationCallbacks(nsIInterfaceRequestor * *aNotificationCallbacks) override; \
181 : NS_IMETHOD SetNotificationCallbacks(nsIInterfaceRequestor *aNotificationCallbacks) override; \
182 : NS_IMETHOD ProxyStartSSL(void) override; \
183 : NS_IMETHOD StartTLS(void) override; \
184 : NS_IMETHOD SetNPNList(nsTArray<nsCString> & aNPNList) override; \
185 : NS_IMETHOD GetNegotiatedNPN(nsACString & aNegotiatedNPN) override; \
186 : NS_IMETHOD GetAlpnEarlySelection(nsACString & _retval) override; \
187 : NS_IMETHOD GetEarlyDataAccepted(bool *aEarlyDataAccepted) override; \
188 : NS_IMETHOD DriveHandshake(void) override; \
189 : NS_IMETHOD JoinConnection(const nsACString & npnProtocol, const nsACString & hostname, int32_t port, bool *_retval) override; \
190 : NS_IMETHOD TestJoinConnection(const nsACString & npnProtocol, const nsACString & hostname, int32_t port, bool *_retval) override; \
191 : NS_IMETHOD IsAcceptableForHost(const nsACString & hostname, bool *_retval) override; \
192 : using nsISSLSocketControl::GetKEAUsed; \
193 : NS_IMETHOD GetKEAUsed(int16_t *aKEAUsed) override; \
194 : using nsISSLSocketControl::GetKEAKeyBits; \
195 : NS_IMETHOD GetKEAKeyBits(uint32_t *aKEAKeyBits) override; \
196 : NS_IMETHOD GetProviderFlags(uint32_t *aProviderFlags) override; \
197 : using nsISSLSocketControl::GetSSLVersionUsed; \
198 : NS_IMETHOD GetSSLVersionUsed(int16_t *aSSLVersionUsed) override; \
199 : using nsISSLSocketControl::GetSSLVersionOffered; \
200 : NS_IMETHOD GetSSLVersionOffered(int16_t *aSSLVersionOffered) override; \
201 : using nsISSLSocketControl::GetMACAlgorithmUsed; \
202 : NS_IMETHOD GetMACAlgorithmUsed(int16_t *aMACAlgorithmUsed) override; \
203 : NS_IMETHOD GetClientCert(nsIX509Cert * *aClientCert) override; \
204 : NS_IMETHOD SetClientCert(nsIX509Cert *aClientCert) override; \
205 : using nsISSLSocketControl::GetBypassAuthentication; \
206 : NS_IMETHOD GetBypassAuthentication(bool *aBypassAuthentication) override; \
207 : using nsISSLSocketControl::GetFailedVerification; \
208 : NS_IMETHOD GetFailedVerification(bool *aFailedVerification) override;
209 :
210 : /* Use this macro when declaring the members of this interface when the
211 : class doesn't implement the interface. This is useful for forwarding. */
212 : #define NS_DECL_NON_VIRTUAL_NSISSLSOCKETCONTROL \
213 : nsresult GetNotificationCallbacks(nsIInterfaceRequestor * *aNotificationCallbacks); \
214 : nsresult SetNotificationCallbacks(nsIInterfaceRequestor *aNotificationCallbacks); \
215 : nsresult ProxyStartSSL(void); \
216 : nsresult StartTLS(void); \
217 : nsresult SetNPNList(nsTArray<nsCString> & aNPNList); \
218 : nsresult GetNegotiatedNPN(nsACString & aNegotiatedNPN); \
219 : nsresult GetAlpnEarlySelection(nsACString & _retval); \
220 : nsresult GetEarlyDataAccepted(bool *aEarlyDataAccepted); \
221 : nsresult DriveHandshake(void); \
222 : nsresult JoinConnection(const nsACString & npnProtocol, const nsACString & hostname, int32_t port, bool *_retval); \
223 : nsresult TestJoinConnection(const nsACString & npnProtocol, const nsACString & hostname, int32_t port, bool *_retval); \
224 : nsresult IsAcceptableForHost(const nsACString & hostname, bool *_retval); \
225 : using nsISSLSocketControl::GetKEAUsed; \
226 : nsresult GetKEAUsed(int16_t *aKEAUsed); \
227 : using nsISSLSocketControl::GetKEAKeyBits; \
228 : nsresult GetKEAKeyBits(uint32_t *aKEAKeyBits); \
229 : nsresult GetProviderFlags(uint32_t *aProviderFlags); \
230 : using nsISSLSocketControl::GetSSLVersionUsed; \
231 : nsresult GetSSLVersionUsed(int16_t *aSSLVersionUsed); \
232 : using nsISSLSocketControl::GetSSLVersionOffered; \
233 : nsresult GetSSLVersionOffered(int16_t *aSSLVersionOffered); \
234 : using nsISSLSocketControl::GetMACAlgorithmUsed; \
235 : nsresult GetMACAlgorithmUsed(int16_t *aMACAlgorithmUsed); \
236 : nsresult GetClientCert(nsIX509Cert * *aClientCert); \
237 : nsresult SetClientCert(nsIX509Cert *aClientCert); \
238 : using nsISSLSocketControl::GetBypassAuthentication; \
239 : nsresult GetBypassAuthentication(bool *aBypassAuthentication); \
240 : using nsISSLSocketControl::GetFailedVerification; \
241 : nsresult GetFailedVerification(bool *aFailedVerification);
242 :
243 : /* Use this macro to declare functions that forward the behavior of this interface to another object. */
244 : #define NS_FORWARD_NSISSLSOCKETCONTROL(_to) \
245 : NS_IMETHOD GetNotificationCallbacks(nsIInterfaceRequestor * *aNotificationCallbacks) override { return _to GetNotificationCallbacks(aNotificationCallbacks); } \
246 : NS_IMETHOD SetNotificationCallbacks(nsIInterfaceRequestor *aNotificationCallbacks) override { return _to SetNotificationCallbacks(aNotificationCallbacks); } \
247 : NS_IMETHOD ProxyStartSSL(void) override { return _to ProxyStartSSL(); } \
248 : NS_IMETHOD StartTLS(void) override { return _to StartTLS(); } \
249 : NS_IMETHOD SetNPNList(nsTArray<nsCString> & aNPNList) override { return _to SetNPNList(aNPNList); } \
250 : NS_IMETHOD GetNegotiatedNPN(nsACString & aNegotiatedNPN) override { return _to GetNegotiatedNPN(aNegotiatedNPN); } \
251 : NS_IMETHOD GetAlpnEarlySelection(nsACString & _retval) override { return _to GetAlpnEarlySelection(_retval); } \
252 : NS_IMETHOD GetEarlyDataAccepted(bool *aEarlyDataAccepted) override { return _to GetEarlyDataAccepted(aEarlyDataAccepted); } \
253 : NS_IMETHOD DriveHandshake(void) override { return _to DriveHandshake(); } \
254 : NS_IMETHOD JoinConnection(const nsACString & npnProtocol, const nsACString & hostname, int32_t port, bool *_retval) override { return _to JoinConnection(npnProtocol, hostname, port, _retval); } \
255 : NS_IMETHOD TestJoinConnection(const nsACString & npnProtocol, const nsACString & hostname, int32_t port, bool *_retval) override { return _to TestJoinConnection(npnProtocol, hostname, port, _retval); } \
256 : NS_IMETHOD IsAcceptableForHost(const nsACString & hostname, bool *_retval) override { return _to IsAcceptableForHost(hostname, _retval); } \
257 : using nsISSLSocketControl::GetKEAUsed; \
258 : NS_IMETHOD GetKEAUsed(int16_t *aKEAUsed) override { return _to GetKEAUsed(aKEAUsed); } \
259 : using nsISSLSocketControl::GetKEAKeyBits; \
260 : NS_IMETHOD GetKEAKeyBits(uint32_t *aKEAKeyBits) override { return _to GetKEAKeyBits(aKEAKeyBits); } \
261 : NS_IMETHOD GetProviderFlags(uint32_t *aProviderFlags) override { return _to GetProviderFlags(aProviderFlags); } \
262 : using nsISSLSocketControl::GetSSLVersionUsed; \
263 : NS_IMETHOD GetSSLVersionUsed(int16_t *aSSLVersionUsed) override { return _to GetSSLVersionUsed(aSSLVersionUsed); } \
264 : using nsISSLSocketControl::GetSSLVersionOffered; \
265 : NS_IMETHOD GetSSLVersionOffered(int16_t *aSSLVersionOffered) override { return _to GetSSLVersionOffered(aSSLVersionOffered); } \
266 : using nsISSLSocketControl::GetMACAlgorithmUsed; \
267 : NS_IMETHOD GetMACAlgorithmUsed(int16_t *aMACAlgorithmUsed) override { return _to GetMACAlgorithmUsed(aMACAlgorithmUsed); } \
268 : NS_IMETHOD GetClientCert(nsIX509Cert * *aClientCert) override { return _to GetClientCert(aClientCert); } \
269 : NS_IMETHOD SetClientCert(nsIX509Cert *aClientCert) override { return _to SetClientCert(aClientCert); } \
270 : using nsISSLSocketControl::GetBypassAuthentication; \
271 : NS_IMETHOD GetBypassAuthentication(bool *aBypassAuthentication) override { return _to GetBypassAuthentication(aBypassAuthentication); } \
272 : using nsISSLSocketControl::GetFailedVerification; \
273 : NS_IMETHOD GetFailedVerification(bool *aFailedVerification) override { return _to GetFailedVerification(aFailedVerification); }
274 :
275 : /* Use this macro to declare functions that forward the behavior of this interface to another object in a safe way. */
276 : #define NS_FORWARD_SAFE_NSISSLSOCKETCONTROL(_to) \
277 : NS_IMETHOD GetNotificationCallbacks(nsIInterfaceRequestor * *aNotificationCallbacks) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetNotificationCallbacks(aNotificationCallbacks); } \
278 : NS_IMETHOD SetNotificationCallbacks(nsIInterfaceRequestor *aNotificationCallbacks) override { return !_to ? NS_ERROR_NULL_POINTER : _to->SetNotificationCallbacks(aNotificationCallbacks); } \
279 : NS_IMETHOD ProxyStartSSL(void) override { return !_to ? NS_ERROR_NULL_POINTER : _to->ProxyStartSSL(); } \
280 : NS_IMETHOD StartTLS(void) override { return !_to ? NS_ERROR_NULL_POINTER : _to->StartTLS(); } \
281 : NS_IMETHOD SetNPNList(nsTArray<nsCString> & aNPNList) override { return !_to ? NS_ERROR_NULL_POINTER : _to->SetNPNList(aNPNList); } \
282 : NS_IMETHOD GetNegotiatedNPN(nsACString & aNegotiatedNPN) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetNegotiatedNPN(aNegotiatedNPN); } \
283 : NS_IMETHOD GetAlpnEarlySelection(nsACString & _retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetAlpnEarlySelection(_retval); } \
284 : NS_IMETHOD GetEarlyDataAccepted(bool *aEarlyDataAccepted) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetEarlyDataAccepted(aEarlyDataAccepted); } \
285 : NS_IMETHOD DriveHandshake(void) override { return !_to ? NS_ERROR_NULL_POINTER : _to->DriveHandshake(); } \
286 : NS_IMETHOD JoinConnection(const nsACString & npnProtocol, const nsACString & hostname, int32_t port, bool *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->JoinConnection(npnProtocol, hostname, port, _retval); } \
287 : NS_IMETHOD TestJoinConnection(const nsACString & npnProtocol, const nsACString & hostname, int32_t port, bool *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->TestJoinConnection(npnProtocol, hostname, port, _retval); } \
288 : NS_IMETHOD IsAcceptableForHost(const nsACString & hostname, bool *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->IsAcceptableForHost(hostname, _retval); } \
289 : NS_IMETHOD GetKEAUsed(int16_t *aKEAUsed) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetKEAUsed(aKEAUsed); } \
290 : NS_IMETHOD GetKEAKeyBits(uint32_t *aKEAKeyBits) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetKEAKeyBits(aKEAKeyBits); } \
291 : NS_IMETHOD GetProviderFlags(uint32_t *aProviderFlags) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetProviderFlags(aProviderFlags); } \
292 : NS_IMETHOD GetSSLVersionUsed(int16_t *aSSLVersionUsed) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetSSLVersionUsed(aSSLVersionUsed); } \
293 : NS_IMETHOD GetSSLVersionOffered(int16_t *aSSLVersionOffered) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetSSLVersionOffered(aSSLVersionOffered); } \
294 : NS_IMETHOD GetMACAlgorithmUsed(int16_t *aMACAlgorithmUsed) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetMACAlgorithmUsed(aMACAlgorithmUsed); } \
295 : NS_IMETHOD GetClientCert(nsIX509Cert * *aClientCert) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetClientCert(aClientCert); } \
296 : NS_IMETHOD SetClientCert(nsIX509Cert *aClientCert) override { return !_to ? NS_ERROR_NULL_POINTER : _to->SetClientCert(aClientCert); } \
297 : NS_IMETHOD GetBypassAuthentication(bool *aBypassAuthentication) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetBypassAuthentication(aBypassAuthentication); } \
298 : NS_IMETHOD GetFailedVerification(bool *aFailedVerification) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetFailedVerification(aFailedVerification); }
299 :
300 : #if 0
301 : /* Use the code below as a template for the implementation class for this interface. */
302 :
303 : /* Header file */
304 : class nsSSLSocketControl : public nsISSLSocketControl
305 : {
306 : public:
307 : NS_DECL_ISUPPORTS
308 : NS_DECL_NSISSLSOCKETCONTROL
309 :
310 : nsSSLSocketControl();
311 :
312 : private:
313 : ~nsSSLSocketControl();
314 :
315 : protected:
316 : /* additional members */
317 : };
318 :
319 : /* Implementation file */
320 : NS_IMPL_ISUPPORTS(nsSSLSocketControl, nsISSLSocketControl)
321 :
322 : nsSSLSocketControl::nsSSLSocketControl()
323 : {
324 : /* member initializers and constructor code */
325 : }
326 :
327 : nsSSLSocketControl::~nsSSLSocketControl()
328 : {
329 : /* destructor code */
330 : }
331 :
332 : /* attribute nsIInterfaceRequestor notificationCallbacks; */
333 : NS_IMETHODIMP nsSSLSocketControl::GetNotificationCallbacks(nsIInterfaceRequestor * *aNotificationCallbacks)
334 : {
335 : return NS_ERROR_NOT_IMPLEMENTED;
336 : }
337 : NS_IMETHODIMP nsSSLSocketControl::SetNotificationCallbacks(nsIInterfaceRequestor *aNotificationCallbacks)
338 : {
339 : return NS_ERROR_NOT_IMPLEMENTED;
340 : }
341 :
342 : /* void proxyStartSSL (); */
343 : NS_IMETHODIMP nsSSLSocketControl::ProxyStartSSL()
344 : {
345 : return NS_ERROR_NOT_IMPLEMENTED;
346 : }
347 :
348 : /* void StartTLS (); */
349 : NS_IMETHODIMP nsSSLSocketControl::StartTLS()
350 : {
351 : return NS_ERROR_NOT_IMPLEMENTED;
352 : }
353 :
354 : /* [noscript] void setNPNList (in nsCStringTArrayRef aNPNList); */
355 : NS_IMETHODIMP nsSSLSocketControl::SetNPNList(nsTArray<nsCString> & aNPNList)
356 : {
357 : return NS_ERROR_NOT_IMPLEMENTED;
358 : }
359 :
360 : /* readonly attribute ACString negotiatedNPN; */
361 : NS_IMETHODIMP nsSSLSocketControl::GetNegotiatedNPN(nsACString & aNegotiatedNPN)
362 : {
363 : return NS_ERROR_NOT_IMPLEMENTED;
364 : }
365 :
366 : /* ACString getAlpnEarlySelection (); */
367 : NS_IMETHODIMP nsSSLSocketControl::GetAlpnEarlySelection(nsACString & _retval)
368 : {
369 : return NS_ERROR_NOT_IMPLEMENTED;
370 : }
371 :
372 : /* readonly attribute bool earlyDataAccepted; */
373 : NS_IMETHODIMP nsSSLSocketControl::GetEarlyDataAccepted(bool *aEarlyDataAccepted)
374 : {
375 : return NS_ERROR_NOT_IMPLEMENTED;
376 : }
377 :
378 : /* void driveHandshake (); */
379 : NS_IMETHODIMP nsSSLSocketControl::DriveHandshake()
380 : {
381 : return NS_ERROR_NOT_IMPLEMENTED;
382 : }
383 :
384 : /* boolean joinConnection (in ACString npnProtocol, in ACString hostname, in long port); */
385 : NS_IMETHODIMP nsSSLSocketControl::JoinConnection(const nsACString & npnProtocol, const nsACString & hostname, int32_t port, bool *_retval)
386 : {
387 : return NS_ERROR_NOT_IMPLEMENTED;
388 : }
389 :
390 : /* boolean testJoinConnection (in ACString npnProtocol, in ACString hostname, in long port); */
391 : NS_IMETHODIMP nsSSLSocketControl::TestJoinConnection(const nsACString & npnProtocol, const nsACString & hostname, int32_t port, bool *_retval)
392 : {
393 : return NS_ERROR_NOT_IMPLEMENTED;
394 : }
395 :
396 : /* boolean isAcceptableForHost (in ACString hostname); */
397 : NS_IMETHODIMP nsSSLSocketControl::IsAcceptableForHost(const nsACString & hostname, bool *_retval)
398 : {
399 : return NS_ERROR_NOT_IMPLEMENTED;
400 : }
401 :
402 : /* [infallible] readonly attribute short KEAUsed; */
403 : NS_IMETHODIMP nsSSLSocketControl::GetKEAUsed(int16_t *aKEAUsed)
404 : {
405 : return NS_ERROR_NOT_IMPLEMENTED;
406 : }
407 :
408 : /* [infallible] readonly attribute unsigned long KEAKeyBits; */
409 : NS_IMETHODIMP nsSSLSocketControl::GetKEAKeyBits(uint32_t *aKEAKeyBits)
410 : {
411 : return NS_ERROR_NOT_IMPLEMENTED;
412 : }
413 :
414 : /* readonly attribute uint32_t providerFlags; */
415 : NS_IMETHODIMP nsSSLSocketControl::GetProviderFlags(uint32_t *aProviderFlags)
416 : {
417 : return NS_ERROR_NOT_IMPLEMENTED;
418 : }
419 :
420 : /* [infallible] readonly attribute short SSLVersionUsed; */
421 : NS_IMETHODIMP nsSSLSocketControl::GetSSLVersionUsed(int16_t *aSSLVersionUsed)
422 : {
423 : return NS_ERROR_NOT_IMPLEMENTED;
424 : }
425 :
426 : /* [infallible] readonly attribute short SSLVersionOffered; */
427 : NS_IMETHODIMP nsSSLSocketControl::GetSSLVersionOffered(int16_t *aSSLVersionOffered)
428 : {
429 : return NS_ERROR_NOT_IMPLEMENTED;
430 : }
431 :
432 : /* [infallible] readonly attribute short MACAlgorithmUsed; */
433 : NS_IMETHODIMP nsSSLSocketControl::GetMACAlgorithmUsed(int16_t *aMACAlgorithmUsed)
434 : {
435 : return NS_ERROR_NOT_IMPLEMENTED;
436 : }
437 :
438 : /* attribute nsIX509Cert clientCert; */
439 : NS_IMETHODIMP nsSSLSocketControl::GetClientCert(nsIX509Cert * *aClientCert)
440 : {
441 : return NS_ERROR_NOT_IMPLEMENTED;
442 : }
443 : NS_IMETHODIMP nsSSLSocketControl::SetClientCert(nsIX509Cert *aClientCert)
444 : {
445 : return NS_ERROR_NOT_IMPLEMENTED;
446 : }
447 :
448 : /* [infallible] readonly attribute boolean bypassAuthentication; */
449 : NS_IMETHODIMP nsSSLSocketControl::GetBypassAuthentication(bool *aBypassAuthentication)
450 : {
451 : return NS_ERROR_NOT_IMPLEMENTED;
452 : }
453 :
454 : /* [infallible] readonly attribute boolean failedVerification; */
455 : NS_IMETHODIMP nsSSLSocketControl::GetFailedVerification(bool *aFailedVerification)
456 : {
457 : return NS_ERROR_NOT_IMPLEMENTED;
458 : }
459 :
460 : /* End of implementation class template. */
461 : #endif
462 :
463 :
464 : #endif /* __gen_nsISSLSocketControl_h__ */
|