diff --git a/mozilla/security/nss/lib/ssl/ssl.h b/mozilla/security/nss/lib/ssl/ssl.h index 3ecebd2a746..85c75bd3420 100644 --- a/mozilla/security/nss/lib/ssl/ssl.h +++ b/mozilla/security/nss/lib/ssl/ssl.h @@ -36,7 +36,7 @@ * the terms of any one of the MPL, the GPL or the LGPL. * * ***** END LICENSE BLOCK ***** */ -/* $Id: ssl.h,v 1.30 2009-11-06 20:11:27 nelson%bolyard.com Exp $ */ +/* $Id: ssl.h,v 1.31 2009-11-25 05:24:25 wtc%google.com Exp $ */ #ifndef __ssl_h_ #define __ssl_h_ @@ -415,7 +415,7 @@ SSL_IMPORT SECStatus SSL_ShutdownServerSessionIDCache(void); ** Set peer information so we can correctly look up SSL session later. ** You only have to do this if you're tunneling through a proxy. */ -SSL_IMPORT SECStatus SSL_SetSockPeerID(PRFileDesc *fd, char *peerID); +SSL_IMPORT SECStatus SSL_SetSockPeerID(PRFileDesc *fd, const char *peerID); /* ** Reveal the security information for the peer. diff --git a/mozilla/security/nss/lib/ssl/sslsock.c b/mozilla/security/nss/lib/ssl/sslsock.c index 19f2281d0ca..5bfa11479ed 100644 --- a/mozilla/security/nss/lib/ssl/sslsock.c +++ b/mozilla/security/nss/lib/ssl/sslsock.c @@ -40,7 +40,7 @@ * the terms of any one of the MPL, the GPL or the LGPL. * * ***** END LICENSE BLOCK ***** */ -/* $Id: sslsock.c,v 1.59 2009-11-06 20:11:29 nelson%bolyard.com Exp $ */ +/* $Id: sslsock.c,v 1.60 2009-11-25 05:24:25 wtc%google.com Exp $ */ #include "seccomon.h" #include "cert.h" #include "keyhi.h" @@ -1584,8 +1584,8 @@ ssl_GetSockName(PRFileDesc *fd, PRNetAddr *name) return (PRStatus)(*ss->ops->getsockname)(ss, name); } -SECStatus PR_CALLBACK -SSL_SetSockPeerID(PRFileDesc *fd, char *peerID) +SECStatus +SSL_SetSockPeerID(PRFileDesc *fd, const char *peerID) { sslSocket *ss;