* '-2' if we got one of those errors.
* For errors, an error message is returned in the 'errbuf' variable.
*/
-int sock_send(SOCKET sock, SSL *ssl, const char *buffer, size_t size,
+int sock_send(SOCKET sock, SSL *ssl _U_NOSSL_, const char *buffer, size_t size,
char *errbuf, int errbuflen)
{
int remaining;
do {
#ifdef HAVE_OPENSSL
if (ssl) return ssl_send(ssl, buffer, remaining, errbuf, errbuflen);
-#else
- (void)ssl;
#endif
#ifdef MSG_NOSIGNAL
* The error message is returned in the 'errbuf' variable.
*/
-int sock_recv(SOCKET sock, SSL *ssl, void *buffer, size_t size, int flags,
- char *errbuf, int errbuflen)
+int sock_recv(SOCKET sock, SSL *ssl _U_NOSSL_, void *buffer, size_t size,
+ int flags, char *errbuf, int errbuflen)
{
int recv_flags = 0;
char *bufp = buffer;
*
* Returns the size of the datagram on success or -1 on error.
*/
-int sock_recv_dgram(SOCKET sock, SSL *ssl, void *buffer, size_t size,
+int sock_recv_dgram(SOCKET sock, SSL *ssl _U_NOSSL_, void *buffer, size_t size,
char *errbuf, int errbuflen)
{
ssize_t nread;
return -1;
}
+#ifdef HAVE_OPENSSL
// TODO: DTLS
if (ssl)
{
pcap_snprintf(errbuf, errbuflen, "DTLS not implemented yet");
return -1;
}
+#endif
/*
* This should be a datagram socket, so we should get the
int ssl_send(SSL *, char const *buffer, int size, char *errbuf, size_t errbuflen);
int ssl_recv(SSL *, char *buffer, int size, char *errbuf, size_t errbuflen);
+// The SSL parameters are used
+#define _U_NOSSL_
+
#else // HAVE_OPENSSL
// This saves us from a lot of ifdefs:
#define SSL void const
+// The SSL parameters are unused
+#define _U_NOSSL_ _U_
+
#endif // HAVE_OPENSSL
#endif // __SSLUTILS_H__