summaryrefslogtreecommitdiff
path: root/src/ssl/internal.h
diff options
context:
space:
mode:
authorRobert Sloan <varomodt@google.com>2019-04-16 09:26:20 -0700
committerRobert Sloan <varomodt@google.com>2019-04-16 09:26:20 -0700
commitf63bd1f440905963647c68a896db0c85e8914d11 (patch)
tree5bfdfa9db8642d577ef86e52257844b934be87c4 /src/ssl/internal.h
parent4726ed3660caaf209857097358032c4257d910ad (diff)
downloadboringssl-f63bd1f440905963647c68a896db0c85e8914d11.tar.gz
external/boringssl: Sync to c9827e073f64e353c4891ecc2c73721882543ee0.android-o-mr1-iot-release-1.0.12oreo-mr1-iot-release
This includes the following changes: https://boringssl.googlesource.com/boringssl/+log/387b07b78dac785a341eeb2ff86e29393ffe8627..c9827e073f64e353c4891ecc2c73721882543ee0 Test: atest CtsLibcoreTestCases (TODO) Change-Id: Ie7c2899ac4ea374113e0fe3b76f9a4dce36ea8de
Diffstat (limited to 'src/ssl/internal.h')
-rw-r--r--src/ssl/internal.h10
1 files changed, 5 insertions, 5 deletions
diff --git a/src/ssl/internal.h b/src/ssl/internal.h
index 16b2866f..ee2952a4 100644
--- a/src/ssl/internal.h
+++ b/src/ssl/internal.h
@@ -1081,7 +1081,7 @@ void dtls_clear_outgoing_messages(SSL *ssl);
void ssl_do_info_callback(const SSL *ssl, int type, int value);
// ssl_do_msg_callback calls |ssl|'s message callback, if set.
-void ssl_do_msg_callback(SSL *ssl, int is_write, int content_type,
+void ssl_do_msg_callback(const SSL *ssl, int is_write, int content_type,
Span<const uint8_t> in);
@@ -1798,7 +1798,7 @@ int ssl_log_secret(const SSL *ssl, const char *label, const uint8_t *secret,
// ClientHello functions.
-bool ssl_client_hello_init(SSL *ssl, SSL_CLIENT_HELLO *out,
+bool ssl_client_hello_init(const SSL *ssl, SSL_CLIENT_HELLO *out,
const SSLMessage &msg);
bool ssl_client_hello_get_extension(const SSL_CLIENT_HELLO *client_hello,
@@ -1958,7 +1958,7 @@ struct SSL_PROTOCOL_METHOD {
void (*ssl_free)(SSL *ssl);
// get_message sets |*out| to the current handshake message and returns true
// if one has been received. It returns false if more input is needed.
- bool (*get_message)(SSL *ssl, SSLMessage *out);
+ bool (*get_message)(const SSL *ssl, SSLMessage *out);
// next_message is called to release the current handshake message.
void (*next_message)(SSL *ssl);
// Use the |ssl_open_handshake| wrapper.
@@ -2675,7 +2675,7 @@ void ssl_session_renew_timeout(SSL *ssl, SSL_SESSION *session,
void ssl_update_cache(SSL_HANDSHAKE *hs, int mode);
int ssl_send_alert(SSL *ssl, int level, int desc);
-bool ssl3_get_message(SSL *ssl, SSLMessage *out);
+bool ssl3_get_message(const SSL *ssl, SSLMessage *out);
ssl_open_record_t ssl3_open_handshake(SSL *ssl, size_t *out_consumed,
uint8_t *out_alert, Span<uint8_t> in);
void ssl3_next_message(SSL *ssl);
@@ -2741,7 +2741,7 @@ unsigned int dtls1_min_mtu(void);
bool dtls1_new(SSL *ssl);
void dtls1_free(SSL *ssl);
-bool dtls1_get_message(SSL *ssl, SSLMessage *out);
+bool dtls1_get_message(const SSL *ssl, SSLMessage *out);
ssl_open_record_t dtls1_open_handshake(SSL *ssl, size_t *out_consumed,
uint8_t *out_alert, Span<uint8_t> in);
void dtls1_next_message(SSL *ssl);