summaryrefslogtreecommitdiff
path: root/src/common/crypto.h
diff options
context:
space:
mode:
authorSebastian Hahn <sebastian@torproject.org>2009-10-27 04:31:23 +0100
committerSebastian Hahn <sebastian@torproject.org>2009-10-27 04:31:23 +0100
commit70abd843fd006cd25dadd388e5f4ff753c3a4668 (patch)
treed3c14deb20557089f6f277cf3a47aecd54c6be18 /src/common/crypto.h
parent174be15c1a062bb39298418a9c530f73557c4916 (diff)
downloadtor-70abd843fd006cd25dadd388e5f4ff753c3a4668.tar.gz
tor-70abd843fd006cd25dadd388e5f4ff753c3a4668.zip
crypto_cipher_set_key cannot fail
In 5e4d53d535a3cc9903250b3df0caa829f1c5e4bf we made it so that crypto_cipher_set_key cannot fail. The call will now always succeed, to returning a boolean for success/failure makes no sense.
Diffstat (limited to 'src/common/crypto.h')
-rw-r--r--src/common/crypto.h2
1 files changed, 1 insertions, 1 deletions
diff --git a/src/common/crypto.h b/src/common/crypto.h
index d9adb16f80..239acb5871 100644
--- a/src/common/crypto.h
+++ b/src/common/crypto.h
@@ -151,7 +151,7 @@ int crypto_pk_check_fingerprint_syntax(const char *s);
/* symmetric crypto */
int crypto_cipher_generate_key(crypto_cipher_env_t *env);
-int crypto_cipher_set_key(crypto_cipher_env_t *env, const char *key);
+void crypto_cipher_set_key(crypto_cipher_env_t *env, const char *key);
void crypto_cipher_generate_iv(char *iv_out);
int crypto_cipher_set_iv(crypto_cipher_env_t *env, const char *iv);
const char *crypto_cipher_get_key(crypto_cipher_env_t *env);