diff options
author | Nick Mathewson <nickm@torproject.org> | 2015-05-25 21:16:53 -0400 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2015-05-28 16:00:23 +0100 |
commit | 831eef2cf500b8a2aaee21b44986c79e62bae912 (patch) | |
tree | 76826c2c7602a9a6dec0a4cad7042437017fedae /include | |
parent | 15a06488fcced19b79708a0329313121e01ded7e (diff) | |
download | openssl-831eef2cf500b8a2aaee21b44986c79e62bae912.tar.gz |
Add SSL_get_client_ciphers() to return ciphers from ClientHello
On the server side, if you want to know which ciphers the client
offered, you had to use session->ciphers. But that field is no
longer visible, so we need a method to get at it.
Signed-off-by: Nick Mathewson <nickm@torproject.org>
Signed-off-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Tim Hudson <tjh@openssl.org>
Diffstat (limited to 'include')
-rw-r--r-- | include/openssl/ssl.h | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/include/openssl/ssl.h b/include/openssl/ssl.h index 9694e24d9a..5de33e9305 100644 --- a/include/openssl/ssl.h +++ b/include/openssl/ssl.h @@ -1583,6 +1583,7 @@ __owur const SSL_METHOD *DTLS_server_method(void); /* DTLS 1.0 and 1.2 */ __owur const SSL_METHOD *DTLS_client_method(void); /* DTLS 1.0 and 1.2 */ __owur STACK_OF(SSL_CIPHER) *SSL_get_ciphers(const SSL *s); +__owur STACK_OF(SSL_CIPHER) *SSL_get_client_ciphers(const SSL *s); __owur STACK_OF(SSL_CIPHER) *SSL_get1_supported_ciphers(SSL *s); __owur int SSL_do_handshake(SSL *s); |