[prev in list] [next in list] [prev in thread] [next in thread] 

List:       openssl-cvs
Subject:    [CVS] OpenSSL: OpenSSL_0_9_7-stable: openssl/crypto/asn1/ a_print.c as...
From:       "Ben Laurie" <ben () openssl ! org>
Date:       2005-03-23 8:21:31
Message-ID: 20050323082131.EA768203635 () master ! openssl ! org
[Download RAW message or body]

  OpenSSL CVS Repository
  http://cvs.openssl.org/
  ____________________________________________________________________________

  Server: cvs.openssl.org                  Name:   Ben Laurie
  Root:   /e/openssl/cvs                   Email:  ben@openssl.org
  Module: openssl                          Date:   23-Mar-2005 09:21:31
  Branch: OpenSSL_0_9_7-stable             Handle: 2005032308212901

  Modified files:           (Branch: OpenSSL_0_9_7-stable)
    openssl/crypto/asn1     a_print.c asn1.h
    openssl/crypto/x509     x509.h x509name.c
    openssl/ssl             s23_lib.c s2_lib.c s3_lib.c ssl.h ssl_asn1.c
                            ssl_cert.c ssl_ciph.c ssl_err.c ssl_lib.c
                            ssl_locl.h ssl_sess.c ssl_txt.c

  Log:
    Constification.

  Summary:
    Revision    Changes     Path
    1.10.2.1    +1  -1      openssl/crypto/asn1/a_print.c
    1.103.2.8   +1  -1      openssl/crypto/asn1/asn1.h
    1.116.2.6   +5  -5      openssl/crypto/x509/x509.h
    1.12.8.1    +5  -5      openssl/crypto/x509/x509name.c
    1.18.2.1    +1  -1      openssl/ssl/s23_lib.c
    1.39.2.9    +1  -1      openssl/ssl/s2_lib.c
    1.57.2.12   +1  -1      openssl/ssl/s3_lib.c
    1.126.2.22  +59 -57     openssl/ssl/ssl.h
    1.9.2.7     +1  -1      openssl/ssl/ssl_asn1.c
    1.48.2.11   +2  -2      openssl/ssl/ssl_cert.c
    1.33.2.12   +4  -4      openssl/ssl/ssl_ciph.c
    1.41.2.5    +1  -0      openssl/ssl/ssl_err.c
    1.110.2.14  +48 -42     openssl/ssl/ssl_lib.c
    1.47.2.4    +5  -4      openssl/ssl/ssl_locl.h
    1.40.2.9    +5  -5      openssl/ssl/ssl_sess.c
    1.11.2.2    +2  -2      openssl/ssl/ssl_txt.c
  ____________________________________________________________________________

  patch -p0 <<'@@ .'
  Index: openssl/crypto/asn1/a_print.c
  ============================================================================
  $ cvs diff -u -r1.10 -r1.10.2.1 a_print.c
  --- openssl/crypto/asn1/a_print.c	8 Dec 2000 19:06:56 -0000	1.10
  +++ openssl/crypto/asn1/a_print.c	23 Mar 2005 08:21:29 -0000	1.10.2.1
  @@ -60,7 +60,7 @@
   #include "cryptlib.h"
   #include <openssl/asn1.h>
   
  -int ASN1_PRINTABLE_type(unsigned char *s, int len)
  +int ASN1_PRINTABLE_type(const unsigned char *s, int len)
   	{
   	int c;
   	int ia5=0;
  @@ .
  patch -p0 <<'@@ .'
  Index: openssl/crypto/asn1/asn1.h
  ============================================================================
  $ cvs diff -u -r1.103.2.7 -r1.103.2.8 asn1.h
  --- openssl/crypto/asn1/asn1.h	5 Dec 2004 01:04:33 -0000	1.103.2.7
  +++ openssl/crypto/asn1/asn1.h	23 Mar 2005 08:21:29 -0000	1.103.2.8
  @@ -829,7 +829,7 @@
   
   /* General */
   /* given a string, return the correct type, max is the maximum length */
  -int ASN1_PRINTABLE_type(unsigned char *s, int max);
  +int ASN1_PRINTABLE_type(const unsigned char *s, int max);
   
   int i2d_ASN1_bytes(ASN1_STRING *a, unsigned char **pp, int tag, int xclass);
   ASN1_STRING *d2i_ASN1_bytes(ASN1_STRING **a, unsigned char **pp,
  @@ .
  patch -p0 <<'@@ .'
  Index: openssl/crypto/x509/x509.h
  ============================================================================
  $ cvs diff -u -r1.116.2.5 -r1.116.2.6 x509.h
  --- openssl/crypto/x509/x509.h	4 Oct 2004 16:27:35 -0000	1.116.2.5
  +++ openssl/crypto/x509/x509.h	23 Mar 2005 08:21:29 -0000	1.116.2.6
  @@ -1038,18 +1038,18 @@
   int X509_NAME_add_entry_by_NID(X509_NAME *name, int nid, int type,
   			unsigned char *bytes, int len, int loc, int set);
   X509_NAME_ENTRY *X509_NAME_ENTRY_create_by_txt(X509_NAME_ENTRY **ne,
  -		char *field, int type, unsigned char *bytes, int len);
  +		const char *field, int type, const unsigned char *bytes, int len);
   X509_NAME_ENTRY *X509_NAME_ENTRY_create_by_NID(X509_NAME_ENTRY **ne, int nid,
   			int type,unsigned char *bytes, int len);
  -int X509_NAME_add_entry_by_txt(X509_NAME *name, char *field, int type,
  -			unsigned char *bytes, int len, int loc, int set);
  +int X509_NAME_add_entry_by_txt(X509_NAME *name, const char *field, int type,
  +			const unsigned char *bytes, int len, int loc, int set);
   X509_NAME_ENTRY *X509_NAME_ENTRY_create_by_OBJ(X509_NAME_ENTRY **ne,
  -			ASN1_OBJECT *obj, int type,unsigned char *bytes,
  +			ASN1_OBJECT *obj, int type,const unsigned char *bytes,
   			int len);
   int 		X509_NAME_ENTRY_set_object(X509_NAME_ENTRY *ne,
   			ASN1_OBJECT *obj);
   int 		X509_NAME_ENTRY_set_data(X509_NAME_ENTRY *ne, int type,
  -			unsigned char *bytes, int len);
  +			const unsigned char *bytes, int len);
   ASN1_OBJECT *	X509_NAME_ENTRY_get_object(X509_NAME_ENTRY *ne);
   ASN1_STRING *	X509_NAME_ENTRY_get_data(X509_NAME_ENTRY *ne);
   
  @@ .
  patch -p0 <<'@@ .'
  Index: openssl/crypto/x509/x509name.c
  ============================================================================
  $ cvs diff -u -r1.12 -r1.12.8.1 x509name.c
  --- openssl/crypto/x509/x509name.c	14 Mar 2000 03:29:57 -0000	1.12
  +++ openssl/crypto/x509/x509name.c	23 Mar 2005 08:21:29 -0000	1.12.8.1
  @@ -195,8 +195,8 @@
   	return ret;
   }
   
  -int X509_NAME_add_entry_by_txt(X509_NAME *name, char *field, int type,
  -			unsigned char *bytes, int len, int loc, int set)
  +int X509_NAME_add_entry_by_txt(X509_NAME *name, const char *field, int type,
  +			const unsigned char *bytes, int len, int loc, int set)
   {
   	X509_NAME_ENTRY *ne;
   	int ret;
  @@ -273,7 +273,7 @@
   	}
   
   X509_NAME_ENTRY *X509_NAME_ENTRY_create_by_txt(X509_NAME_ENTRY **ne,
  -		char *field, int type, unsigned char *bytes, int len)
  +		const char *field, int type, const unsigned char *bytes, int len)
   	{
   	ASN1_OBJECT *obj;
   	X509_NAME_ENTRY *nentry;
  @@ -309,7 +309,7 @@
   	}
   
   X509_NAME_ENTRY *X509_NAME_ENTRY_create_by_OBJ(X509_NAME_ENTRY **ne,
  -	     ASN1_OBJECT *obj, int type, unsigned char *bytes, int len)
  +	     ASN1_OBJECT *obj, int type, const unsigned char *bytes, int len)
   	{
   	X509_NAME_ENTRY *ret;
   
  @@ -347,7 +347,7 @@
   	}
   
   int X509_NAME_ENTRY_set_data(X509_NAME_ENTRY *ne, int type,
  -	     unsigned char *bytes, int len)
  +	     const unsigned char *bytes, int len)
   	{
   	int i;
   
  @@ .
  patch -p0 <<'@@ .'
  Index: openssl/ssl/s23_lib.c
  ============================================================================
  $ cvs diff -u -r1.18 -r1.18.2.1 s23_lib.c
  --- openssl/ssl/s23_lib.c	8 Mar 2001 21:54:01 -0000	1.18
  +++ openssl/ssl/s23_lib.c	23 Mar 2005 08:21:30 -0000	1.18.2.1
  @@ -87,7 +87,7 @@
   	ssl3_ctx_ctrl,
   	ssl23_get_cipher_by_char,
   	ssl23_put_cipher_by_char,
  -	ssl_undefined_function,
  +	ssl_undefined_const_function,
   	ssl23_num_ciphers,
   	ssl23_get_cipher,
   	ssl_bad_method,
  @@ .
  patch -p0 <<'@@ .'
  Index: openssl/ssl/s2_lib.c
  ============================================================================
  $ cvs diff -u -r1.39.2.8 -r1.39.2.9 s2_lib.c
  --- openssl/ssl/s2_lib.c	27 Dec 2003 16:09:58 -0000	1.39.2.8
  +++ openssl/ssl/s2_lib.c	23 Mar 2005 08:21:30 -0000	1.39.2.9
  @@ -263,7 +263,7 @@
   		return(NULL);
   	}
   
  -int ssl2_pending(SSL *s)
  +int ssl2_pending(const SSL *s)
   	{
   	return SSL_in_init(s) ? 0 : s->s2->ract_data_length;
   	}
  @@ .
  patch -p0 <<'@@ .'
  Index: openssl/ssl/s3_lib.c
  ============================================================================
  $ cvs diff -u -r1.57.2.11 -r1.57.2.12 s3_lib.c
  --- openssl/ssl/s3_lib.c	27 Jul 2004 18:28:49 -0000	1.57.2.11
  +++ openssl/ssl/s3_lib.c	23 Mar 2005 08:21:30 -0000	1.57.2.12
  @@ -1057,7 +1057,7 @@
   		return(NULL);
   	}
   
  -int ssl3_pending(SSL *s)
  +int ssl3_pending(const SSL *s)
   	{
   	if (s->rstate == SSL_ST_READ_BODY)
   		return 0;
  @@ .
  patch -p0 <<'@@ .'
  Index: openssl/ssl/ssl.h
  ============================================================================
  $ cvs diff -u -r1.126.2.21 -r1.126.2.22 ssl.h
  --- openssl/ssl/ssl.h	31 Jan 2005 01:33:36 -0000	1.126.2.21
  +++ openssl/ssl/ssl.h	23 Mar 2005 08:21:30 -0000	1.126.2.22
  @@ -373,7 +373,7 @@
   	long (*ssl_ctx_ctrl)(SSL_CTX *ctx,int cmd,long larg,void *parg);
   	SSL_CIPHER *(*get_cipher_by_char)(const unsigned char *ptr);
   	int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr);
  -	int (*ssl_pending)(SSL *s);
  +	int (*ssl_pending)(const SSL *s);
   	int (*num_ciphers)(void);
   	SSL_CIPHER *(*get_cipher)(unsigned ncipher);
   	struct ssl_method_st *(*get_ssl_method)(int version);
  @@ -999,8 +999,8 @@
    *   -- that we sent (SSL_get_finished)
    *   -- that we expected from peer (SSL_get_peer_finished).
    * Returns length (0 == no Finished so far), copies up to 'count' bytes. */
  -size_t SSL_get_finished(SSL *s, void *buf, size_t count);
  -size_t SSL_get_peer_finished(SSL *s, void *buf, size_t count);
  +size_t SSL_get_finished(const SSL *s, void *buf, size_t count);
  +size_t SSL_get_peer_finished(const SSL *s, void *buf, size_t count);
   
   /* use either SSL_VERIFY_NONE or SSL_VERIFY_PEER, the last 2 options
    * are 'ored' with SSL_VERIFY_PEER if they are desired */
  @@ -1172,26 +1172,26 @@
   SSL_CTX *SSL_CTX_new(SSL_METHOD *meth);
   void	SSL_CTX_free(SSL_CTX *);
   long SSL_CTX_set_timeout(SSL_CTX *ctx,long t);
  -long SSL_CTX_get_timeout(SSL_CTX *ctx);
  -X509_STORE *SSL_CTX_get_cert_store(SSL_CTX *);
  +long SSL_CTX_get_timeout(const SSL_CTX *ctx);
  +X509_STORE *SSL_CTX_get_cert_store(const SSL_CTX *);
   void SSL_CTX_set_cert_store(SSL_CTX *,X509_STORE *);
  -int SSL_want(SSL *s);
  +int SSL_want(const SSL *s);
   int	SSL_clear(SSL *s);
   
   void	SSL_CTX_flush_sessions(SSL_CTX *ctx,long tm);
   
  -SSL_CIPHER *SSL_get_current_cipher(SSL *s);
  -int	SSL_CIPHER_get_bits(SSL_CIPHER *c,int *alg_bits);
  -char *	SSL_CIPHER_get_version(SSL_CIPHER *c);
  -const char *	SSL_CIPHER_get_name(SSL_CIPHER *c);
  -
  -int	SSL_get_fd(SSL *s);
  -int	SSL_get_rfd(SSL *s);
  -int	SSL_get_wfd(SSL *s);
  -const char  * SSL_get_cipher_list(SSL *s,int n);
  -char *	SSL_get_shared_ciphers(SSL *s, char *buf, int len);
  -int	SSL_get_read_ahead(SSL * s);
  -int	SSL_pending(SSL *s);
  +SSL_CIPHER *SSL_get_current_cipher(const SSL *s);
  +int	SSL_CIPHER_get_bits(const SSL_CIPHER *c,int *alg_bits);
  +char *	SSL_CIPHER_get_version(const SSL_CIPHER *c);
  +const char *	SSL_CIPHER_get_name(const SSL_CIPHER *c);
  +
  +int	SSL_get_fd(const SSL *s);
  +int	SSL_get_rfd(const SSL *s);
  +int	SSL_get_wfd(const SSL *s);
  +const char  * SSL_get_cipher_list(const SSL *s,int n);
  +char *	SSL_get_shared_ciphers(const SSL *s, char *buf, int len);
  +int	SSL_get_read_ahead(const SSL * s);
  +int	SSL_pending(const SSL *s);
   #ifndef OPENSSL_NO_SOCK
   int	SSL_set_fd(SSL *s, int fd);
   int	SSL_set_rfd(SSL *s, int fd);
  @@ -1199,14 +1199,14 @@
   #endif
   #ifndef OPENSSL_NO_BIO
   void	SSL_set_bio(SSL *s, BIO *rbio,BIO *wbio);
  -BIO *	SSL_get_rbio(SSL *s);
  -BIO *	SSL_get_wbio(SSL *s);
  +BIO *	SSL_get_rbio(const SSL *s);
  +BIO *	SSL_get_wbio(const SSL *s);
   #endif
   int	SSL_set_cipher_list(SSL *s, const char *str);
   void	SSL_set_read_ahead(SSL *s, int yes);
  -int	SSL_get_verify_mode(SSL *s);
  -int	SSL_get_verify_depth(SSL *s);
  -int	(*SSL_get_verify_callback(SSL *s))(int,X509_STORE_CTX *);
  +int	SSL_get_verify_mode(const SSL *s);
  +int	SSL_get_verify_depth(const SSL *s);
  +int	(*SSL_get_verify_callback(const SSL *s))(int,X509_STORE_CTX *);
   void	SSL_set_verify(SSL *s, int mode,
   		       int (*callback)(int ok,X509_STORE_CTX *ctx));
   void	SSL_set_verify_depth(SSL *s, int depth);
  @@ -1244,20 +1244,20 @@
   const char *SSL_rstate_string(const SSL *s);
   const char *SSL_state_string_long(const SSL *s);
   const char *SSL_rstate_string_long(const SSL *s);
  -long	SSL_SESSION_get_time(SSL_SESSION *s);
  +long	SSL_SESSION_get_time(const SSL_SESSION *s);
   long	SSL_SESSION_set_time(SSL_SESSION *s, long t);
  -long	SSL_SESSION_get_timeout(SSL_SESSION *s);
  +long	SSL_SESSION_get_timeout(const SSL_SESSION *s);
   long	SSL_SESSION_set_timeout(SSL_SESSION *s, long t);
  -void	SSL_copy_session_id(SSL *to,SSL *from);
  +void	SSL_copy_session_id(SSL *to,const SSL *from);
   
   SSL_SESSION *SSL_SESSION_new(void);
  -unsigned long SSL_SESSION_hash(SSL_SESSION *a);
  -int	SSL_SESSION_cmp(SSL_SESSION *a,SSL_SESSION *b);
  +unsigned long SSL_SESSION_hash(const SSL_SESSION *a);
  +int	SSL_SESSION_cmp(const SSL_SESSION *a,const SSL_SESSION *b);
   #ifndef OPENSSL_NO_FP_API
  -int	SSL_SESSION_print_fp(FILE *fp,SSL_SESSION *ses);
  +int	SSL_SESSION_print_fp(FILE *fp,const SSL_SESSION *ses);
   #endif
   #ifndef OPENSSL_NO_BIO
  -int	SSL_SESSION_print(BIO *fp,SSL_SESSION *ses);
  +int	SSL_SESSION_print(BIO *fp,const SSL_SESSION *ses);
   #endif
   void	SSL_SESSION_free(SSL_SESSION *ses);
   int	i2d_SSL_SESSION(SSL_SESSION *in,unsigned char **pp);
  @@ -1268,17 +1268,18 @@
   int	SSL_set_generate_session_id(SSL *, GEN_SESSION_CB);
   int	SSL_has_matching_session_id(const SSL *ssl, const unsigned char *id,
   					unsigned int id_len);
  -SSL_SESSION *d2i_SSL_SESSION(SSL_SESSION **a,unsigned char **pp,long length);
  +SSL_SESSION *d2i_SSL_SESSION(SSL_SESSION **a,const unsigned char * const *pp,
  +			     long length);
   
   #ifdef HEADER_X509_H
  -X509 *	SSL_get_peer_certificate(SSL *s);
  +X509 *	SSL_get_peer_certificate(const SSL *s);
   #endif
   
  -STACK_OF(X509) *SSL_get_peer_cert_chain(SSL *s);
  +STACK_OF(X509) *SSL_get_peer_cert_chain(const SSL *s);
   
  -int SSL_CTX_get_verify_mode(SSL_CTX *ctx);
  -int SSL_CTX_get_verify_depth(SSL_CTX *ctx);
  -int (*SSL_CTX_get_verify_callback(SSL_CTX *ctx))(int,X509_STORE_CTX *);
  +int SSL_CTX_get_verify_mode(const SSL_CTX *ctx);
  +int SSL_CTX_get_verify_depth(const SSL_CTX *ctx);
  +int (*SSL_CTX_get_verify_callback(const SSL_CTX *ctx))(int,X509_STORE_CTX *);
   void SSL_CTX_set_verify(SSL_CTX *ctx,int mode,
   			int (*callback)(int, X509_STORE_CTX *));
   void SSL_CTX_set_verify_depth(SSL_CTX *ctx,int depth);
  @@ -1296,8 +1297,8 @@
   void SSL_CTX_set_default_passwd_cb(SSL_CTX *ctx, pem_password_cb *cb);
   void SSL_CTX_set_default_passwd_cb_userdata(SSL_CTX *ctx, void *u);
   
  -int SSL_CTX_check_private_key(SSL_CTX *ctx);
  -int SSL_check_private_key(SSL *ctx);
  +int SSL_CTX_check_private_key(const SSL_CTX *ctx);
  +int SSL_check_private_key(const SSL *ctx);
   
   int	SSL_CTX_set_session_id_context(SSL_CTX *ctx,const unsigned char *sid_ctx,
   				       unsigned int sid_ctx_len);
  @@ -1322,8 +1323,8 @@
   long	SSL_CTX_ctrl(SSL_CTX *ctx,int cmd, long larg, void *parg);
   long	SSL_CTX_callback_ctrl(SSL_CTX *, int, void (*)());
   
  -int	SSL_get_error(SSL *s,int ret_code);
  -const char *SSL_get_version(SSL *s);
  +int	SSL_get_error(const SSL *s,int ret_code);
  +const char *SSL_get_version(const SSL *s);
   
   /* This sets the 'default' SSL version that SSL_new() will create */
   int SSL_CTX_set_ssl_version(SSL_CTX *ctx,SSL_METHOD *meth);
  @@ -1344,7 +1345,7 @@
   SSL_METHOD *TLSv1_server_method(void);	/* TLSv1.0 */
   SSL_METHOD *TLSv1_client_method(void);	/* TLSv1.0 */
   
  -STACK_OF(SSL_CIPHER) *SSL_get_ciphers(SSL *s);
  +STACK_OF(SSL_CIPHER) *SSL_get_ciphers(const SSL *s);
   
   int SSL_do_handshake(SSL *s);
   int SSL_renegotiate(SSL *s);
  @@ -1360,15 +1361,15 @@
   
   void SSL_set_client_CA_list(SSL *s, STACK_OF(X509_NAME) *name_list);
   void SSL_CTX_set_client_CA_list(SSL_CTX *ctx, STACK_OF(X509_NAME) *name_list);
  -STACK_OF(X509_NAME) *SSL_get_client_CA_list(SSL *s);
  -STACK_OF(X509_NAME) *SSL_CTX_get_client_CA_list(SSL_CTX *s);
  +STACK_OF(X509_NAME) *SSL_get_client_CA_list(const SSL *s);
  +STACK_OF(X509_NAME) *SSL_CTX_get_client_CA_list(const SSL_CTX *s);
   int SSL_add_client_CA(SSL *ssl,X509 *x);
   int SSL_CTX_add_client_CA(SSL_CTX *ctx,X509 *x);
   
   void SSL_set_connect_state(SSL *s);
   void SSL_set_accept_state(SSL *s);
   
  -long SSL_get_default_timeout(SSL *s);
  +long SSL_get_default_timeout(const SSL *s);
   
   int SSL_library_init(void );
   
  @@ -1377,43 +1378,43 @@
   
   SSL *SSL_dup(SSL *ssl);
   
  -X509 *SSL_get_certificate(SSL *ssl);
  +X509 *SSL_get_certificate(const SSL *ssl);
   /* EVP_PKEY */ struct evp_pkey_st *SSL_get_privatekey(SSL *ssl);
   
   void SSL_CTX_set_quiet_shutdown(SSL_CTX *ctx,int mode);
  -int SSL_CTX_get_quiet_shutdown(SSL_CTX *ctx);
  +int SSL_CTX_get_quiet_shutdown(const SSL_CTX *ctx);
   void SSL_set_quiet_shutdown(SSL *ssl,int mode);
  -int SSL_get_quiet_shutdown(SSL *ssl);
  +int SSL_get_quiet_shutdown(const SSL *ssl);
   void SSL_set_shutdown(SSL *ssl,int mode);
  -int SSL_get_shutdown(SSL *ssl);
  -int SSL_version(SSL *ssl);
  +int SSL_get_shutdown(const SSL *ssl);
  +int SSL_version(const SSL *ssl);
   int SSL_CTX_set_default_verify_paths(SSL_CTX *ctx);
   int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile,
   	const char *CApath);
   #define SSL_get0_session SSL_get_session /* just peek at pointer */
  -SSL_SESSION *SSL_get_session(SSL *ssl);
  +SSL_SESSION *SSL_get_session(const SSL *ssl);
   SSL_SESSION *SSL_get1_session(SSL *ssl); /* obtain a reference count */
  -SSL_CTX *SSL_get_SSL_CTX(SSL *ssl);
  +SSL_CTX *SSL_get_SSL_CTX(const SSL *ssl);
   void SSL_set_info_callback(SSL *ssl,
   			   void (*cb)(const SSL *ssl,int type,int val));
  -void (*SSL_get_info_callback(SSL *ssl))(const SSL *ssl,int type,int val);
  -int SSL_state(SSL *ssl);
  +void (*SSL_get_info_callback(const SSL *ssl))(const SSL *ssl,int type,int val);
  +int SSL_state(const SSL *ssl);
   
   void SSL_set_verify_result(SSL *ssl,long v);
  -long SSL_get_verify_result(SSL *ssl);
  +long SSL_get_verify_result(const SSL *ssl);
   
   int SSL_set_ex_data(SSL *ssl,int idx,void *data);
  -void *SSL_get_ex_data(SSL *ssl,int idx);
  +void *SSL_get_ex_data(const SSL *ssl,int idx);
   int SSL_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func,
   	CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func);
   
   int SSL_SESSION_set_ex_data(SSL_SESSION *ss,int idx,void *data);
  -void *SSL_SESSION_get_ex_data(SSL_SESSION *ss,int idx);
  +void *SSL_SESSION_get_ex_data(const SSL_SESSION *ss,int idx);
   int SSL_SESSION_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func,
   	CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func);
   
   int SSL_CTX_set_ex_data(SSL_CTX *ssl,int idx,void *data);
  -void *SSL_CTX_get_ex_data(SSL_CTX *ssl,int idx);
  +void *SSL_CTX_get_ex_data(const SSL_CTX *ssl,int idx);
   int SSL_CTX_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func,
   	CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func);
   
  @@ -1604,6 +1605,7 @@
   #define SSL_F_SSL_SET_TRUST				 228
   #define SSL_F_SSL_SET_WFD				 196
   #define SSL_F_SSL_SHUTDOWN				 224
  +#define SSL_F_SSL_UNDEFINED_CONST_FUNCTION		 243
   #define SSL_F_SSL_UNDEFINED_FUNCTION			 197
   #define SSL_F_SSL_USE_CERTIFICATE			 198
   #define SSL_F_SSL_USE_CERTIFICATE_ASN1			 199
  @@ .
  patch -p0 <<'@@ .'
  Index: openssl/ssl/ssl_asn1.c
  ============================================================================
  $ cvs diff -u -r1.9.2.6 -r1.9.2.7 ssl_asn1.c
  --- openssl/ssl/ssl_asn1.c	27 Dec 2003 16:09:58 -0000	1.9.2.6
  +++ openssl/ssl/ssl_asn1.c	23 Mar 2005 08:21:30 -0000	1.9.2.7
  @@ -226,7 +226,7 @@
   	M_ASN1_I2D_finish();
   	}
   
  -SSL_SESSION *d2i_SSL_SESSION(SSL_SESSION **a, unsigned char **pp,
  +SSL_SESSION *d2i_SSL_SESSION(SSL_SESSION **a, const unsigned char * const *pp,
   	     long length)
   	{
   	int version,ssl_version=0,i;
  @@ .
  patch -p0 <<'@@ .'
  Index: openssl/ssl/ssl_cert.c
  ============================================================================
  $ cvs diff -u -r1.48.2.10 -r1.48.2.11 ssl_cert.c
  --- openssl/ssl/ssl_cert.c	31 Jan 2005 01:33:36 -0000	1.48.2.10
  +++ openssl/ssl/ssl_cert.c	23 Mar 2005 08:21:30 -0000	1.48.2.11
  @@ -544,12 +544,12 @@
   	set_client_CA_list(&(ctx->client_CA),name_list);
   	}
   
  -STACK_OF(X509_NAME) *SSL_CTX_get_client_CA_list(SSL_CTX *ctx)
  +STACK_OF(X509_NAME) *SSL_CTX_get_client_CA_list(const SSL_CTX *ctx)
   	{
   	return(ctx->client_CA);
   	}
   
  -STACK_OF(X509_NAME) *SSL_get_client_CA_list(SSL *s)
  +STACK_OF(X509_NAME) *SSL_get_client_CA_list(const SSL *s)
   	{
   	if (s->type == SSL_ST_CONNECT)
   		{ /* we are in the client */
  @@ .
  patch -p0 <<'@@ .'
  Index: openssl/ssl/ssl_ciph.c
  ============================================================================
  $ cvs diff -u -r1.33.2.11 -r1.33.2.12 ssl_ciph.c
  --- openssl/ssl/ssl_ciph.c	25 Oct 2004 11:15:49 -0000	1.33.2.11
  +++ openssl/ssl/ssl_ciph.c	23 Mar 2005 08:21:30 -0000	1.33.2.12
  @@ -187,7 +187,7 @@
   	init_ciphers=0;
   	}
   
  -int ssl_cipher_get_evp(SSL_SESSION *s, const EVP_CIPHER **enc,
  +int ssl_cipher_get_evp(const SSL_SESSION *s, const EVP_CIPHER **enc,
   	     const EVP_MD **md, SSL_COMP **comp)
   	{
   	int i;
  @@ -1065,7 +1065,7 @@
   	return(buf);
   	}
   
  -char *SSL_CIPHER_get_version(SSL_CIPHER *c)
  +char *SSL_CIPHER_get_version(const SSL_CIPHER *c)
   	{
   	int i;
   
  @@ -1080,7 +1080,7 @@
   	}
   
   /* return the actual cipher being used */
  -const char *SSL_CIPHER_get_name(SSL_CIPHER *c)
  +const char *SSL_CIPHER_get_name(const SSL_CIPHER *c)
   	{
   	if (c != NULL)
   		return(c->name);
  @@ -1088,7 +1088,7 @@
   	}
   
   /* number of bits for symmetric cipher */
  -int SSL_CIPHER_get_bits(SSL_CIPHER *c, int *alg_bits)
  +int SSL_CIPHER_get_bits(const SSL_CIPHER *c, int *alg_bits)
   	{
   	int ret=0;
   
  @@ .
  patch -p0 <<'@@ .'
  Index: openssl/ssl/ssl_err.c
  ============================================================================
  $ cvs diff -u -r1.41.2.4 -r1.41.2.5 ssl_err.c
  --- openssl/ssl/ssl_err.c	31 Jan 2005 01:33:36 -0000	1.41.2.4
  +++ openssl/ssl/ssl_err.c	23 Mar 2005 08:21:30 -0000	1.41.2.5
  @@ -193,6 +193,7 @@
   {ERR_PACK(0,SSL_F_SSL_SET_TRUST,0),	"SSL_set_trust"},
   {ERR_PACK(0,SSL_F_SSL_SET_WFD,0),	"SSL_set_wfd"},
   {ERR_PACK(0,SSL_F_SSL_SHUTDOWN,0),	"SSL_shutdown"},
  +{ERR_PACK(0,SSL_F_SSL_UNDEFINED_CONST_FUNCTION,0),	"SSL_UNDEFINED_CONST_FUNCTION"},
   {ERR_PACK(0,SSL_F_SSL_UNDEFINED_FUNCTION,0),	"SSL_UNDEFINED_FUNCTION"},
   {ERR_PACK(0,SSL_F_SSL_USE_CERTIFICATE,0),	"SSL_use_certificate"},
   {ERR_PACK(0,SSL_F_SSL_USE_CERTIFICATE_ASN1,0),	"SSL_use_certificate_ASN1"},
  @@ .
  patch -p0 <<'@@ .'
  Index: openssl/ssl/ssl_lib.c
  ============================================================================
  $ cvs diff -u -r1.110.2.13 -r1.110.2.14 ssl_lib.c
  --- openssl/ssl/ssl_lib.c	31 Jan 2005 01:33:36 -0000	1.110.2.13
  +++ openssl/ssl/ssl_lib.c	23 Mar 2005 08:21:30 -0000	1.110.2.14
  @@ -501,18 +501,18 @@
   	s->wbio=wbio;
   	}
   
  -BIO *SSL_get_rbio(SSL *s)
  +BIO *SSL_get_rbio(const SSL *s)
   	{ return(s->rbio); }
   
  -BIO *SSL_get_wbio(SSL *s)
  +BIO *SSL_get_wbio(const SSL *s)
   	{ return(s->wbio); }
   
  -int SSL_get_fd(SSL *s)
  +int SSL_get_fd(const SSL *s)
   	{
   	return(SSL_get_rfd(s));
   	}
   
  -int SSL_get_rfd(SSL *s)
  +int SSL_get_rfd(const SSL *s)
   	{
   	int ret= -1;
   	BIO *b,*r;
  @@ -524,7 +524,7 @@
   	return(ret);
   	}
   
  -int SSL_get_wfd(SSL *s)
  +int SSL_get_wfd(const SSL *s)
   	{
   	int ret= -1;
   	BIO *b,*r;
  @@ -606,7 +606,7 @@
   
   
   /* return length of latest Finished message we sent, copy to 'buf' */
  -size_t SSL_get_finished(SSL *s, void *buf, size_t count)
  +size_t SSL_get_finished(const SSL *s, void *buf, size_t count)
   	{
   	size_t ret = 0;
   	
  @@ -621,7 +621,7 @@
   	}
   
   /* return length of latest Finished message we expected, copy to 'buf' */
  -size_t SSL_get_peer_finished(SSL *s, void *buf, size_t count)
  +size_t SSL_get_peer_finished(const SSL *s, void *buf, size_t count)
   	{
   	size_t ret = 0;
   	
  @@ -636,32 +636,32 @@
   	}
   
   
  -int SSL_get_verify_mode(SSL *s)
  +int SSL_get_verify_mode(const SSL *s)
   	{
   	return(s->verify_mode);
   	}
   
  -int SSL_get_verify_depth(SSL *s)
  +int SSL_get_verify_depth(const SSL *s)
   	{
   	return(s->verify_depth);
   	}
   
  -int (*SSL_get_verify_callback(SSL *s))(int,X509_STORE_CTX *)
  +int (*SSL_get_verify_callback(const SSL *s))(int,X509_STORE_CTX *)
   	{
   	return(s->verify_callback);
   	}
   
  -int SSL_CTX_get_verify_mode(SSL_CTX *ctx)
  +int SSL_CTX_get_verify_mode(const SSL_CTX *ctx)
   	{
   	return(ctx->verify_mode);
   	}
   
  -int SSL_CTX_get_verify_depth(SSL_CTX *ctx)
  +int SSL_CTX_get_verify_depth(const SSL_CTX *ctx)
   	{
   	return(ctx->verify_depth);
   	}
   
  -int (*SSL_CTX_get_verify_callback(SSL_CTX *ctx))(int,X509_STORE_CTX *)
  +int (*SSL_CTX_get_verify_callback(const SSL_CTX *ctx))(int,X509_STORE_CTX *)
   	{
   	return(ctx->default_verify_callback);
   	}
  @@ -684,12 +684,12 @@
   	s->read_ahead=yes;
   	}
   
  -int SSL_get_read_ahead(SSL *s)
  +int SSL_get_read_ahead(const SSL *s)
   	{
   	return(s->read_ahead);
   	}
   
  -int SSL_pending(SSL *s)
  +int SSL_pending(const SSL *s)
   	{
   	/* SSL_pending cannot work properly if read-ahead is enabled
   	 * (SSL_[CTX_]ctrl(..., SSL_CTRL_SET_READ_AHEAD, 1, NULL)),
  @@ -701,7 +701,7 @@
   	return(s->method->ssl_pending(s));
   	}
   
  -X509 *SSL_get_peer_certificate(SSL *s)
  +X509 *SSL_get_peer_certificate(const SSL *s)
   	{
   	X509 *r;
   	
  @@ -717,7 +717,7 @@
   	return(r);
   	}
   
  -STACK_OF(X509) *SSL_get_peer_cert_chain(SSL *s)
  +STACK_OF(X509) *SSL_get_peer_cert_chain(const SSL *s)
   	{
   	STACK_OF(X509) *r;
   	
  @@ -734,7 +734,7 @@
   
   /* Now in theory, since the calling process own 't' it should be safe to
    * modify.  We need to be able to read f without being hassled */
  -void SSL_copy_session_id(SSL *t,SSL *f)
  +void SSL_copy_session_id(SSL *t,const SSL *f)
   	{
   	CERT *tmp;
   
  @@ -763,7 +763,7 @@
   	}
   
   /* Fix this so it checks all the valid key/cert options */
  -int SSL_CTX_check_private_key(SSL_CTX *ctx)
  +int SSL_CTX_check_private_key(const SSL_CTX *ctx)
   	{
   	if (	(ctx == NULL) ||
   		(ctx->cert == NULL) ||
  @@ -781,7 +781,7 @@
   	}
   
   /* Fix this function so that it takes an optional type parameter */
  -int SSL_check_private_key(SSL *ssl)
  +int SSL_check_private_key(const SSL *ssl)
   	{
   	if (ssl == NULL)
   		{
  @@ -825,7 +825,7 @@
   	return(s->method->ssl_connect(s));
   	}
   
  -long SSL_get_default_timeout(SSL *s)
  +long SSL_get_default_timeout(const SSL *s)
   	{
   	return(s->method->get_timeout());
   	}
  @@ -1072,7 +1072,7 @@
   
   /** return a STACK of the ciphers available for the SSL and in order of
    * preference */
  -STACK_OF(SSL_CIPHER) *SSL_get_ciphers(SSL *s)
  +STACK_OF(SSL_CIPHER) *SSL_get_ciphers(const SSL *s)
   	{
   	if (s != NULL)
   		{
  @@ -1109,7 +1109,7 @@
   	}
   
   /** The old interface to get the same thing as SSL_get_ciphers() */
  -const char *SSL_get_cipher_list(SSL *s,int n)
  +const char *SSL_get_cipher_list(const SSL *s,int n)
   	{
   	SSL_CIPHER *c;
   	STACK_OF(SSL_CIPHER) *sk;
  @@ -1146,7 +1146,7 @@
   	}
   
   /* works well for SSLv2, not so good for SSLv3 */
  -char *SSL_get_shared_ciphers(SSL *s,char *buf,int len)
  +char *SSL_get_shared_ciphers(const SSL *s,char *buf,int len)
   	{
   	char *p;
   	const char *cp;
  @@ -1250,7 +1250,7 @@
   	return(NULL);
   	}
   
  -unsigned long SSL_SESSION_hash(SSL_SESSION *a)
  +unsigned long SSL_SESSION_hash(const SSL_SESSION *a)
   	{
   	unsigned long l;
   
  @@ -1267,7 +1267,7 @@
    * SSL_CTX_has_matching_session_id() is checked accordingly. It relies on being
    * able to construct an SSL_SESSION that will collide with any existing session
    * with a matching session ID. */
  -int SSL_SESSION_cmp(SSL_SESSION *a,SSL_SESSION *b)
  +int SSL_SESSION_cmp(const SSL_SESSION *a,const SSL_SESSION *b)
   	{
   	if (a->ssl_version != b->ssl_version)
   		return(1);
  @@ -1731,7 +1731,7 @@
   	return(ret);
   	}
   
  -int SSL_get_error(SSL *s,int i)
  +int SSL_get_error(const SSL *s,int i)
   	{
   	int reason;
   	unsigned long l;
  @@ -1865,13 +1865,19 @@
   	return(0);
   	}
   
  +int ssl_undefined_const_function(const SSL *s)
  +	{
  +	SSLerr(SSL_F_SSL_UNDEFINED_CONST_FUNCTION,ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
  +	return(0);
  +	}
  +
   SSL_METHOD *ssl_bad_method(int ver)
   	{
   	SSLerr(SSL_F_SSL_BAD_METHOD,ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
   	return(NULL);
   	}
   
  -const char *SSL_get_version(SSL *s)
  +const char *SSL_get_version(const SSL *s)
   	{
   	if (s->version == TLS1_VERSION)
   		return("TLSv1");
  @@ -2040,7 +2046,7 @@
   	}
   
   /* Fix this function so that it takes an optional type parameter */
  -X509 *SSL_get_certificate(SSL *s)
  +X509 *SSL_get_certificate(const SSL *s)
   	{
   	if (s->cert != NULL)
   		return(s->cert->key->x509);
  @@ -2057,7 +2063,7 @@
   		return(NULL);
   	}
   
  -SSL_CIPHER *SSL_get_current_cipher(SSL *s)
  +SSL_CIPHER *SSL_get_current_cipher(const SSL *s)
   	{
   	if ((s->session != NULL) && (s->session->cipher != NULL))
   		return(s->session->cipher);
  @@ -2121,7 +2127,7 @@
   	ctx->quiet_shutdown=mode;
   	}
   
  -int SSL_CTX_get_quiet_shutdown(SSL_CTX *ctx)
  +int SSL_CTX_get_quiet_shutdown(const SSL_CTX *ctx)
   	{
   	return(ctx->quiet_shutdown);
   	}
  @@ -2131,7 +2137,7 @@
   	s->quiet_shutdown=mode;
   	}
   
  -int SSL_get_quiet_shutdown(SSL *s)
  +int SSL_get_quiet_shutdown(const SSL *s)
   	{
   	return(s->quiet_shutdown);
   	}
  @@ -2141,17 +2147,17 @@
   	s->shutdown=mode;
   	}
   
  -int SSL_get_shutdown(SSL *s)
  +int SSL_get_shutdown(const SSL *s)
   	{
   	return(s->shutdown);
   	}
   
  -int SSL_version(SSL *s)
  +int SSL_version(const SSL *s)
   	{
   	return(s->version);
   	}
   
  -SSL_CTX *SSL_get_SSL_CTX(SSL *ssl)
  +SSL_CTX *SSL_get_SSL_CTX(const SSL *ssl)
   	{
   	return(ssl->ctx);
   	}
  @@ -2177,12 +2183,12 @@
   	ssl->info_callback=cb;
   	}
   
  -void (*SSL_get_info_callback(SSL *ssl))(const SSL *ssl,int type,int val)
  +void (*SSL_get_info_callback(const SSL *ssl))(const SSL *ssl,int type,int val)
   	{
   	return ssl->info_callback;
   	}
   
  -int SSL_state(SSL *ssl)
  +int SSL_state(const SSL *ssl)
   	{
   	return(ssl->state);
   	}
  @@ -2192,7 +2198,7 @@
   	ssl->verify_result=arg;
   	}
   
  -long SSL_get_verify_result(SSL *ssl)
  +long SSL_get_verify_result(const SSL *ssl)
   	{
   	return(ssl->verify_result);
   	}
  @@ -2209,7 +2215,7 @@
   	return(CRYPTO_set_ex_data(&s->ex_data,idx,arg));
   	}
   
  -void *SSL_get_ex_data(SSL *s,int idx)
  +void *SSL_get_ex_data(const SSL *s,int idx)
   	{
   	return(CRYPTO_get_ex_data(&s->ex_data,idx));
   	}
  @@ -2226,7 +2232,7 @@
   	return(CRYPTO_set_ex_data(&s->ex_data,idx,arg));
   	}
   
  -void *SSL_CTX_get_ex_data(SSL_CTX *s,int idx)
  +void *SSL_CTX_get_ex_data(const SSL_CTX *s,int idx)
   	{
   	return(CRYPTO_get_ex_data(&s->ex_data,idx));
   	}
  @@ -2236,7 +2242,7 @@
   	return(1);
   	}
   
  -X509_STORE *SSL_CTX_get_cert_store(SSL_CTX *ctx)
  +X509_STORE *SSL_CTX_get_cert_store(const SSL_CTX *ctx)
   	{
   	return(ctx->cert_store);
   	}
  @@ -2248,7 +2254,7 @@
   	ctx->cert_store=store;
   	}
   
  -int SSL_want(SSL *s)
  +int SSL_want(const SSL *s)
   	{
   	return(s->rwstate);
   	}
  @@ .
  patch -p0 <<'@@ .'
  Index: openssl/ssl/ssl_locl.h
  ============================================================================
  $ cvs diff -u -r1.47.2.3 -r1.47.2.4 ssl_locl.h
  --- openssl/ssl/ssl_locl.h	27 Jul 2004 18:28:49 -0000	1.47.2.3
  +++ openssl/ssl/ssl_locl.h	23 Mar 2005 08:21:30 -0000	1.47.2.4
  @@ -499,10 +499,11 @@
   					     STACK_OF(SSL_CIPHER) **sorted,
   					     const char *rule_str);
   void ssl_update_cache(SSL *s, int mode);
  -int ssl_cipher_get_evp(SSL_SESSION *s,const EVP_CIPHER **enc,const EVP_MD **md,
  -		       SSL_COMP **comp);
  +int ssl_cipher_get_evp(const SSL_SESSION *s,const EVP_CIPHER **enc,
  +		       const EVP_MD **md,SSL_COMP **comp);
   int ssl_verify_cert_chain(SSL *s,STACK_OF(X509) *sk);
   int ssl_undefined_function(SSL *s);
  +int ssl_undefined_const_function(const SSL *s);
   X509 *ssl_get_server_send_cert(SSL *);
   EVP_PKEY *ssl_get_sign_pkey(SSL *,SSL_CIPHER *);
   int ssl_cert_type(X509 *x,EVP_PKEY *pkey);
  @@ -536,7 +537,7 @@
   long	ssl2_ctx_ctrl(SSL_CTX *s,int cmd, long larg, void *parg);
   long	ssl2_callback_ctrl(SSL *s,int cmd, void (*fp)());
   long	ssl2_ctx_callback_ctrl(SSL_CTX *s,int cmd, void (*fp)());
  -int	ssl2_pending(SSL *s);
  +int	ssl2_pending(const SSL *s);
   
   SSL_CIPHER *ssl3_get_cipher_by_char(const unsigned char *p);
   int ssl3_put_cipher_by_char(const SSL_CIPHER *c,unsigned char *p);
  @@ -584,7 +585,7 @@
   long	ssl3_ctx_ctrl(SSL_CTX *s,int cmd, long larg, void *parg);
   long	ssl3_callback_ctrl(SSL *s,int cmd, void (*fp)());
   long	ssl3_ctx_callback_ctrl(SSL_CTX *s,int cmd, void (*fp)());
  -int	ssl3_pending(SSL *s);
  +int	ssl3_pending(const SSL *s);
   
   int ssl23_accept(SSL *s);
   int ssl23_connect(SSL *s);
  @@ .
  patch -p0 <<'@@ .'
  Index: openssl/ssl/ssl_sess.c
  ============================================================================
  $ cvs diff -u -r1.40.2.8 -r1.40.2.9 ssl_sess.c
  --- openssl/ssl/ssl_sess.c	15 May 2004 16:39:23 -0000	1.40.2.8
  +++ openssl/ssl/ssl_sess.c	23 Mar 2005 08:21:30 -0000	1.40.2.9
  @@ -65,7 +65,7 @@
   static void SSL_SESSION_list_add(SSL_CTX *ctx,SSL_SESSION *s);
   static int remove_session_lock(SSL_CTX *ctx, SSL_SESSION *c, int lck);
   
  -SSL_SESSION *SSL_get_session(SSL *ssl)
  +SSL_SESSION *SSL_get_session(const SSL *ssl)
   /* aka SSL_get0_session; gets 0 objects, just returns a copy of the pointer */
   	{
   	return(ssl->session);
  @@ -98,7 +98,7 @@
   	return(CRYPTO_set_ex_data(&s->ex_data,idx,arg));
   	}
   
  -void *SSL_SESSION_get_ex_data(SSL_SESSION *s, int idx)
  +void *SSL_SESSION_get_ex_data(const SSL_SESSION *s, int idx)
   	{
   	return(CRYPTO_get_ex_data(&s->ex_data,idx));
   	}
  @@ -610,13 +610,13 @@
   	return(1);
   	}
   
  -long SSL_SESSION_get_timeout(SSL_SESSION *s)
  +long SSL_SESSION_get_timeout(const SSL_SESSION *s)
   	{
   	if (s == NULL) return(0);
   	return(s->timeout);
   	}
   
  -long SSL_SESSION_get_time(SSL_SESSION *s)
  +long SSL_SESSION_get_time(const SSL_SESSION *s)
   	{
   	if (s == NULL) return(0);
   	return(s->time);
  @@ -638,7 +638,7 @@
   	return(l);
   	}
   
  -long SSL_CTX_get_timeout(SSL_CTX *s)
  +long SSL_CTX_get_timeout(const SSL_CTX *s)
   	{
   	if (s == NULL) return(0);
   	return(s->session_timeout);
  @@ .
  patch -p0 <<'@@ .'
  Index: openssl/ssl/ssl_txt.c
  ============================================================================
  $ cvs diff -u -r1.11.2.1 -r1.11.2.2 ssl_txt.c
  --- openssl/ssl/ssl_txt.c	12 Mar 2002 13:33:20 -0000	1.11.2.1
  +++ openssl/ssl/ssl_txt.c	23 Mar 2005 08:21:30 -0000	1.11.2.2
  @@ -61,7 +61,7 @@
   #include "ssl_locl.h"
   
   #ifndef OPENSSL_NO_FP_API
  -int SSL_SESSION_print_fp(FILE *fp, SSL_SESSION *x)
  +int SSL_SESSION_print_fp(FILE *fp, const SSL_SESSION *x)
   	{
   	BIO *b;
   	int ret;
  @@ -78,7 +78,7 @@
   	}
   #endif
   
  -int SSL_SESSION_print(BIO *bp, SSL_SESSION *x)
  +int SSL_SESSION_print(BIO *bp, const SSL_SESSION *x)
   	{
   	unsigned int i;
   	char *s;
  @@ .
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
CVS Repository Commit List                     openssl-cvs@openssl.org
Automated List Manager                           majordomo@openssl.org
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic