diff options
author | Matt Caswell <matt@openssl.org> | 2016-11-25 10:34:35 +0000 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2016-12-08 17:18:18 +0000 |
commit | e56c33b98bd8d72307da7911de27b5d38191d239 (patch) | |
tree | c276271ac4f91c9e643a1c4fc3ca89fc9a837cbe /ssl/statem/statem_locl.h | |
parent | 7da160b0f46d832dbf285cb0b48ae56d4a8b884d (diff) | |
download | openssl-e56c33b98bd8d72307da7911de27b5d38191d239.zip openssl-e56c33b98bd8d72307da7911de27b5d38191d239.tar.gz openssl-e56c33b98bd8d72307da7911de27b5d38191d239.tar.bz2 |
Rename some functions
The _clienthello_ in the extensions parsing functions is overly specific.
Better to keep the convention to just _client_
Perl changes reviewed by Richard Levitte. Non-perl changes reviewed by Rich
Salz
Reviewed-by: Rich Salz <rsalz@openssl.org>
Reviewed-by: Richard Levitte <levitte@openssl.org>
Diffstat (limited to 'ssl/statem/statem_locl.h')
-rw-r--r-- | ssl/statem/statem_locl.h | 28 |
1 files changed, 14 insertions, 14 deletions
diff --git a/ssl/statem/statem_locl.h b/ssl/statem/statem_locl.h index 7032ab4..53fd0f0 100644 --- a/ssl/statem/statem_locl.h +++ b/ssl/statem/statem_locl.h @@ -157,28 +157,28 @@ __owur int tls_construct_extensions(SSL *s, WPACKET *pkt, unsigned int context, int *al); /* Server Extension processing */ -int tls_parse_clienthello_renegotiate(SSL *s, PACKET *pkt, int *al); -int tls_parse_clienthello_server_name(SSL *s, PACKET *pkt, int *al); +int tls_parse_client_renegotiate(SSL *s, PACKET *pkt, int *al); +int tls_parse_client_server_name(SSL *s, PACKET *pkt, int *al); #ifndef OPENSSL_NO_SRP -int tls_parse_clienthello_srp(SSL *s, PACKET *pkt, int *al); +int tls_parse_client_srp(SSL *s, PACKET *pkt, int *al); #endif #ifndef OPENSSL_NO_EC -int tls_parse_clienthello_ec_pt_formats(SSL *s, PACKET *pkt, int *al); -int tls_parse_clienthello_supported_groups(SSL *s, PACKET *pkt, int *al); +int tls_parse_client_ec_pt_formats(SSL *s, PACKET *pkt, int *al); +int tls_parse_client_supported_groups(SSL *s, PACKET *pkt, int *al); #endif -int tls_parse_clienthello_session_ticket(SSL *s, PACKET *pkt, int *al); -int tls_parse_clienthello_sig_algs(SSL *s, PACKET *pkt, int *al); -int tls_parse_clienthello_status_request(SSL *s, PACKET *pkt, int *al); +int tls_parse_client_session_ticket(SSL *s, PACKET *pkt, int *al); +int tls_parse_client_sig_algs(SSL *s, PACKET *pkt, int *al); +int tls_parse_client_status_request(SSL *s, PACKET *pkt, int *al); #ifndef OPENSSL_NO_NEXTPROTONEG -int tls_parse_clienthello_npn(SSL *s, PACKET *pkt, int *al); +int tls_parse_client_npn(SSL *s, PACKET *pkt, int *al); #endif -int tls_parse_clienthello_alpn(SSL *s, PACKET *pkt, int *al); +int tls_parse_client_alpn(SSL *s, PACKET *pkt, int *al); #ifndef OPENSSL_NO_SRTP -int tls_parse_clienthello_use_srtp(SSL *s, PACKET *pkt, int *al); +int tls_parse_client_use_srtp(SSL *s, PACKET *pkt, int *al); #endif -int tls_parse_clienthello_etm(SSL *s, PACKET *pkt, int *al); -int tls_parse_clienthello_key_share(SSL *s, PACKET *pkt, int *al); -int tls_parse_clienthello_ems(SSL *s, PACKET *pkt, int *al); +int tls_parse_client_etm(SSL *s, PACKET *pkt, int *al); +int tls_parse_client_key_share(SSL *s, PACKET *pkt, int *al); +int tls_parse_client_ems(SSL *s, PACKET *pkt, int *al); int tls_construct_server_renegotiate(SSL *s, WPACKET *pkt, int *al); int tls_construct_server_server_name(SSL *s, WPACKET *pkt, int *al); |