aboutsummaryrefslogtreecommitdiffhomepage
path: root/src/core/security/security_connector.h
diff options
context:
space:
mode:
authorGravatar Craig Tiller <ctiller@google.com>2015-09-22 10:45:28 -0700
committerGravatar Craig Tiller <ctiller@google.com>2015-09-22 10:45:28 -0700
commit1be70ccdb84ec41975cc018f6b2a2a89cf5072ee (patch)
treed4e6890ca32762bf786e2b801d3c26b27ec707ee /src/core/security/security_connector.h
parent45724b35e411fef7c5da66a74c78428c11d56843 (diff)
Move arguments to the start of lists
Diffstat (limited to 'src/core/security/security_connector.h')
-rw-r--r--src/core/security/security_connector.h12
1 files changed, 6 insertions, 6 deletions
diff --git a/src/core/security/security_connector.h b/src/core/security/security_connector.h
index 913e01978d..3af7f6f83a 100644
--- a/src/core/security/security_connector.h
+++ b/src/core/security/security_connector.h
@@ -61,15 +61,15 @@ typedef struct grpc_security_connector grpc_security_connector;
#define GRPC_SECURITY_CONNECTOR_ARG "grpc.security_connector"
-typedef void (*grpc_security_check_cb) (void *user_data, grpc_security_status status, grpc_closure_list * closure_list);
+typedef void (*grpc_security_check_cb) (grpc_exec_ctx * exec_ctx, void *user_data, grpc_security_status status);
/* Ownership of the secure_endpoint is transfered. */
-typedef void (*grpc_security_handshake_done_cb) (void *user_data, grpc_security_status status, grpc_endpoint * wrapped_endpoint, grpc_endpoint * secure_endpoint, grpc_closure_list * closure_list);
+typedef void (*grpc_security_handshake_done_cb) (grpc_exec_ctx * exec_ctx, void *user_data, grpc_security_status status, grpc_endpoint * wrapped_endpoint, grpc_endpoint * secure_endpoint);
typedef struct
{
void (*destroy) (grpc_security_connector * sc);
- void (*do_handshake) (grpc_security_connector * sc, grpc_endpoint * nonsecure_endpoint, grpc_security_handshake_done_cb cb, void *user_data, grpc_closure_list * closure_list);
+ void (*do_handshake) (grpc_exec_ctx * exec_ctx, grpc_security_connector * sc, grpc_endpoint * nonsecure_endpoint, grpc_security_handshake_done_cb cb, void *user_data);
grpc_security_status (*check_peer) (grpc_security_connector * sc, tsi_peer peer, grpc_security_check_cb cb, void *user_data);
} grpc_security_connector_vtable;
@@ -98,7 +98,7 @@ void grpc_security_connector_unref (grpc_security_connector * policy);
#endif
/* Handshake. */
-void grpc_security_connector_do_handshake (grpc_security_connector * connector, grpc_endpoint * nonsecure_endpoint, grpc_security_handshake_done_cb cb, void *user_data, grpc_closure_list * closure_list);
+void grpc_security_connector_do_handshake (grpc_exec_ctx * exec_ctx, grpc_security_connector * connector, grpc_endpoint * nonsecure_endpoint, grpc_security_handshake_done_cb cb, void *user_data);
/* Check the peer.
Implementations can choose to check the peer either synchronously or
@@ -129,7 +129,7 @@ struct grpc_channel_security_connector
{
grpc_security_connector base; /* requires is_client_side to be non 0. */
grpc_credentials *request_metadata_creds;
- grpc_security_status (*check_call_host) (grpc_channel_security_connector * sc, const char *host, grpc_security_check_cb cb, void *user_data, grpc_closure_list * closure_list);
+ grpc_security_status (*check_call_host) (grpc_exec_ctx * exec_ctx, grpc_channel_security_connector * sc, const char *host, grpc_security_check_cb cb, void *user_data);
};
/* Checks that the host that will be set for a call is acceptable.
@@ -137,7 +137,7 @@ struct grpc_channel_security_connector
asynchronously. In the first case, a successful call will return
GRPC_SECURITY_OK. In the asynchronous case, the call will return
GRPC_SECURITY_PENDING unless an error is detected early on. */
-grpc_security_status grpc_channel_security_connector_check_call_host (grpc_channel_security_connector * sc, const char *host, grpc_security_check_cb cb, void *user_data, grpc_closure_list * closure_list);
+grpc_security_status grpc_channel_security_connector_check_call_host (grpc_exec_ctx * exec_ctx, grpc_channel_security_connector * sc, const char *host, grpc_security_check_cb cb, void *user_data);
/* --- Creation security connectors. --- */