* '-2' if we got one of those errors.
* For errors, an error message is returned in the 'errbuf' variable.
*/
-int sock_send(SOCKET sock, SSL *ssl, const char *buffer, size_t size,
+int sock_send(SOCKET sock, SSL *ssl _U_NOSSL_, const char *buffer, size_t size,
char *errbuf, int errbuflen)
{
int remaining;
do {
#ifdef HAVE_OPENSSL
if (ssl) return ssl_send(ssl, buffer, remaining, errbuf, errbuflen);
-#else
- (void)ssl;
#endif
#ifdef MSG_NOSIGNAL
* The error message is returned in the 'errbuf' variable.
*/
-int sock_recv(SOCKET sock, SSL *ssl, void *buffer, size_t size, int flags,
- char *errbuf, int errbuflen)
+int sock_recv(SOCKET sock, SSL *ssl _U_NOSSL_, void *buffer, size_t size,
+ int flags, char *errbuf, int errbuflen)
{
int recv_flags = 0;
char *bufp = buffer;
*
* Returns the size of the datagram on success or -1 on error.
*/
-int sock_recv_dgram(SOCKET sock, SSL *ssl, void *buffer, size_t size,
+int sock_recv_dgram(SOCKET sock, SSL *ssl _U_NOSSL_, void *buffer, size_t size,
char *errbuf, int errbuflen)
{
ssize_t nread;
return -1;
}
+#ifdef HAVE_OPENSSL
// TODO: DTLS
if (ssl)
{
pcap_snprintf(errbuf, errbuflen, "DTLS not implemented yet");
return -1;
}
+#endif
/*
* This should be a datagram socket, so we should get the