, including all inherited members.
cipher() | Conexus::NSS::SSLSocket | |
configure_as_server(Certificate::pointer cert, PrivateKey::pointer key, KEA kea_type) | Conexus::NSS::SSLSocket | |
create(Conexus::NSPR::Socket::pointer socket, SSLSocket::pointer model=SSLSocket::pointer()) | Conexus::NSS::SSLSocket | [static] |
enable_cipher(int32_t cipher, bool enable=true) | Conexus::NSS::SSLSocket | |
force_handshake() | Conexus::NSS::SSLSocket | |
input_available() | Conexus::NSS::SSLSocket | [virtual] |
invalidate_session() | Conexus::NSS::SSLSocket | |
is_cipher_enabled(int32_t cipher) | Conexus::NSS::SSLSocket | |
is_option_set(int32_t option) | Conexus::NSS::SSLSocket | |
issuer() | Conexus::NSS::SSLSocket | |
m_authenticate_certificate_slot | Conexus::NSS::SSLSocket | [protected] |
m_bad_certificate_slot | Conexus::NSS::SSLSocket | [protected] |
m_client_authentication_slot | Conexus::NSS::SSLSocket | [protected] |
m_signal_handshake_complete | Conexus::NSS::SSLSocket | [protected] |
on_authenticate_certificate(bool checksig, bool isServer) | Conexus::NSS::SSLSocket | [protected, virtual] |
on_bad_certificate() | Conexus::NSS::SSLSocket | [protected, virtual] |
on_client_authentication(struct CERTDistNamesStr *ca_names, struct CERTCertificateStr **ret_cert, struct SECKEYPrivateKeyStr **ret_key) | Conexus::NSS::SSLSocket | [protected, virtual] |
open() | Conexus::NSS::SSLSocket | [virtual] |
peer_certificate() | Conexus::NSS::SSLSocket | |
pkcs11_pin_arg() | Conexus::NSS::SSLSocket | |
pointer typedef | Conexus::NSS::SSLSocket | |
rehandshake(bool flush_cache=true) | Conexus::NSS::SSLSocket | |
reset_handshake(bool as_server=false) | Conexus::NSS::SSLSocket | |
secret_key_size() | Conexus::NSS::SSLSocket | |
security_status() | Conexus::NSS::SSLSocket | |
session_id() | Conexus::NSS::SSLSocket | |
session_key_size() | Conexus::NSS::SSLSocket | |
set_authenticate_certificate_callback(sigc::slot< bool, bool, bool > slot) | Conexus::NSS::SSLSocket | |
set_bad_certificate_callback(sigc::slot< bool > slot) | Conexus::NSS::SSLSocket | |
set_client_authentication_callback(sigc::slot< bool, struct CERTDistNamesStr *, struct CERTCertificateStr **, struct SECKEYPrivateKeyStr ** > slot) | Conexus::NSS::SSLSocket | |
set_default_client_authentication_callback(char *nickname) | Conexus::NSS::SSLSocket | |
set_option(int32_t option, bool on=true) | Conexus::NSS::SSLSocket | |
set_peer_id(const std::string &peer_id) | Conexus::NSS::SSLSocket | |
set_pkcs11_pin_arg(void *arg) | Conexus::NSS::SSLSocket | |
set_url(const std::string &url) | Conexus::NSS::SSLSocket | |
signal_handshake_complete() | Conexus::NSS::SSLSocket | |
SSL_AuthCertificateHook_proxy(void *arg, PRFileDesc *socket, PRBool checksig, PRBool isServer) | Conexus::NSS::SSLSocket | [private, static] |
SSL_BadCertHook_proxy(void *arg, PRFileDesc *socket) | Conexus::NSS::SSLSocket | [private, static] |
SSL_GetClientAuthDataHook_proxy(void *arg, PRFileDesc *socket, struct CERTDistNamesStr *caNames, struct CERTCertificateStr **pRetCert, struct SECKEYPrivateKeyStr **pRetKey) | Conexus::NSS::SSLSocket | [private, static] |
SSL_HandshakeCallback_proxy(PRFileDesc *socket, void *arg) | Conexus::NSS::SSLSocket | [private, static] |
SSLSocket(Conexus::NSPR::Socket::pointer socket, SSLSocket::pointer model=SSLSocket::pointer()) | Conexus::NSS::SSLSocket | [protected] |
subject() | Conexus::NSS::SSLSocket | |
unset_authenticate_certificate_callback() | Conexus::NSS::SSLSocket | |
unset_bad_certificate_callback() | Conexus::NSS::SSLSocket | |
unset_client_authentication_callback() | Conexus::NSS::SSLSocket | |
url() | Conexus::NSS::SSLSocket | |
~SSLSocket() | Conexus::NSS::SSLSocket | [virtual] |