diff options
author | Robert Sloan <varomodt@google.com> | 2019-04-16 09:26:20 -0700 |
---|---|---|
committer | Robert Sloan <varomodt@google.com> | 2019-04-16 09:26:20 -0700 |
commit | f63bd1f440905963647c68a896db0c85e8914d11 (patch) | |
tree | 5bfdfa9db8642d577ef86e52257844b934be87c4 /src/ssl/internal.h | |
parent | 4726ed3660caaf209857097358032c4257d910ad (diff) | |
download | boringssl-f63bd1f440905963647c68a896db0c85e8914d11.tar.gz |
external/boringssl: Sync to c9827e073f64e353c4891ecc2c73721882543ee0.android-o-mr1-iot-release-1.0.12oreo-mr1-iot-release
This includes the following changes:
https://boringssl.googlesource.com/boringssl/+log/387b07b78dac785a341eeb2ff86e29393ffe8627..c9827e073f64e353c4891ecc2c73721882543ee0
Test: atest CtsLibcoreTestCases (TODO)
Change-Id: Ie7c2899ac4ea374113e0fe3b76f9a4dce36ea8de
Diffstat (limited to 'src/ssl/internal.h')
-rw-r--r-- | src/ssl/internal.h | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/src/ssl/internal.h b/src/ssl/internal.h index 16b2866f..ee2952a4 100644 --- a/src/ssl/internal.h +++ b/src/ssl/internal.h @@ -1081,7 +1081,7 @@ void dtls_clear_outgoing_messages(SSL *ssl); void ssl_do_info_callback(const SSL *ssl, int type, int value); // ssl_do_msg_callback calls |ssl|'s message callback, if set. -void ssl_do_msg_callback(SSL *ssl, int is_write, int content_type, +void ssl_do_msg_callback(const SSL *ssl, int is_write, int content_type, Span<const uint8_t> in); @@ -1798,7 +1798,7 @@ int ssl_log_secret(const SSL *ssl, const char *label, const uint8_t *secret, // ClientHello functions. -bool ssl_client_hello_init(SSL *ssl, SSL_CLIENT_HELLO *out, +bool ssl_client_hello_init(const SSL *ssl, SSL_CLIENT_HELLO *out, const SSLMessage &msg); bool ssl_client_hello_get_extension(const SSL_CLIENT_HELLO *client_hello, @@ -1958,7 +1958,7 @@ struct SSL_PROTOCOL_METHOD { void (*ssl_free)(SSL *ssl); // get_message sets |*out| to the current handshake message and returns true // if one has been received. It returns false if more input is needed. - bool (*get_message)(SSL *ssl, SSLMessage *out); + bool (*get_message)(const SSL *ssl, SSLMessage *out); // next_message is called to release the current handshake message. void (*next_message)(SSL *ssl); // Use the |ssl_open_handshake| wrapper. @@ -2675,7 +2675,7 @@ void ssl_session_renew_timeout(SSL *ssl, SSL_SESSION *session, void ssl_update_cache(SSL_HANDSHAKE *hs, int mode); int ssl_send_alert(SSL *ssl, int level, int desc); -bool ssl3_get_message(SSL *ssl, SSLMessage *out); +bool ssl3_get_message(const SSL *ssl, SSLMessage *out); ssl_open_record_t ssl3_open_handshake(SSL *ssl, size_t *out_consumed, uint8_t *out_alert, Span<uint8_t> in); void ssl3_next_message(SSL *ssl); @@ -2741,7 +2741,7 @@ unsigned int dtls1_min_mtu(void); bool dtls1_new(SSL *ssl); void dtls1_free(SSL *ssl); -bool dtls1_get_message(SSL *ssl, SSLMessage *out); +bool dtls1_get_message(const SSL *ssl, SSLMessage *out); ssl_open_record_t dtls1_open_handshake(SSL *ssl, size_t *out_consumed, uint8_t *out_alert, Span<uint8_t> in); void dtls1_next_message(SSL *ssl); |