From 35761752f2bfb222979aa98610559dcfa73b3b57 Mon Sep 17 00:00:00 2001 From: tb <> Date: Sun, 9 Mar 2025 15:53:36 +0000 Subject: const correct tls_session_secret_cb_fn() Various ports throw a warning since their tls_session_secret_cb's signature doesn't match what we expect. Aligns us with OpenSSL 1.1. This is only useful for RFC 4851 EAP-FAST implementations and surprisingly it's undocumented. ok jsing --- src/lib/libssl/ssl_clnt.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'src/lib/libssl/ssl_clnt.c') diff --git a/src/lib/libssl/ssl_clnt.c b/src/lib/libssl/ssl_clnt.c index 593ed553d3..0d3dcf78af 100644 --- a/src/lib/libssl/ssl_clnt.c +++ b/src/lib/libssl/ssl_clnt.c @@ -1,4 +1,4 @@ -/* $OpenBSD: ssl_clnt.c,v 1.168 2024/07/22 14:47:15 jsing Exp $ */ +/* $OpenBSD: ssl_clnt.c,v 1.169 2025/03/09 15:53:36 tb Exp $ */ /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) * All rights reserved. * @@ -926,7 +926,7 @@ ssl3_get_server_hello(SSL *s) * pre-shared secret. */ if (s->tls_session_secret_cb != NULL) { - SSL_CIPHER *pref_cipher = NULL; + const SSL_CIPHER *pref_cipher = NULL; int master_key_length = sizeof(s->session->master_key); if (!s->tls_session_secret_cb(s, -- cgit v1.2.3-55-g6feb