-
-
Notifications
You must be signed in to change notification settings - Fork 11k
Added SSL_CTX_get0_alpn_protos() and SSL_get0_alpn_protos() #29646
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
e45ddba to
52baa56
Compare
b56b8b9 to
638ed0e
Compare
9065fc7 to
523992a
Compare
| SSL_CTX_get_alpn_protos() and SSL_get_alpn_protos() are used by the client to | ||
| get the list of protocols available to be negotiated. Returns a pointer to | ||
| protocol list in B<protos> with length B<protos_len>. It is not NUL-terminated. | ||
| B<protos> must not be freed. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Some reference to the format of the data would be helpful here (like we do in the paragraph above). E.g. "The returned list is in protocol-list format as described below". Or some similar wording.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ok, added.
Fixes openssl#4952 Co-authored-by: Pauli <ppzgs1@gmail.com>
ffcd819 to
8e42942
Compare
Added useful SSL_CTX_get0_alpn_protos() and SSL_get0_alpn_protos().
Normally I would use size_t for length, but here I prioritize the consistency. I think I only violated that by checking for NULL parameters, which is proper for public functions. Maybe in the next small PR I'll add similar checks to the surrounding functions.
Fixes #4952