Protect QUIC ECH code with a BORINGSSL_API_VERSION check
This fixes the Envoy Mobile build and is a no-op for any QUICHE embedder using a recent version of BoringSSL.
PiperOrigin-RevId: 533165362
diff --git a/quiche/quic/core/tls_handshaker.cc b/quiche/quic/core/tls_handshaker.cc
index 03ec0c9..62ec169 100644
--- a/quiche/quic/core/tls_handshaker.cc
+++ b/quiche/quic/core/tls_handshaker.cc
@@ -389,6 +389,7 @@
void TlsHandshaker::MessageCallback(bool is_write, int /*version*/,
int content_type, absl::string_view data) {
+#if BORINGSSL_API_VERSION >= 17
if (content_type == SSL3_RT_CLIENT_HELLO_INNER) {
// Notify QuicConnectionDebugVisitor. Most TLS messages can be seen in
// CRYPTO frames, but, with ECH enabled, the ClientHelloInner is encrypted
@@ -399,6 +400,11 @@
handshaker_delegate_->OnEncryptedClientHelloReceived(data);
}
}
+#else // BORINGSSL_API_VERSION
+ (void)is_write;
+ (void)content_type;
+ (void)data;
+#endif // BORINGSSL_API_VERSION
}
} // namespace quic