diff options
author | Sebastian Hahn <sebastian@torproject.org> | 2009-10-27 04:31:23 +0100 |
---|---|---|
committer | Sebastian Hahn <sebastian@torproject.org> | 2009-10-27 04:31:23 +0100 |
commit | 70abd843fd006cd25dadd388e5f4ff753c3a4668 (patch) | |
tree | d3c14deb20557089f6f277cf3a47aecd54c6be18 /src/common/crypto.h | |
parent | 174be15c1a062bb39298418a9c530f73557c4916 (diff) | |
download | tor-70abd843fd006cd25dadd388e5f4ff753c3a4668.tar.gz tor-70abd843fd006cd25dadd388e5f4ff753c3a4668.zip |
crypto_cipher_set_key cannot fail
In 5e4d53d535a3cc9903250b3df0caa829f1c5e4bf we made it so that
crypto_cipher_set_key cannot fail. The call will now
always succeed, to returning a boolean for success/failure makes
no sense.
Diffstat (limited to 'src/common/crypto.h')
-rw-r--r-- | src/common/crypto.h | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/src/common/crypto.h b/src/common/crypto.h index d9adb16f80..239acb5871 100644 --- a/src/common/crypto.h +++ b/src/common/crypto.h @@ -151,7 +151,7 @@ int crypto_pk_check_fingerprint_syntax(const char *s); /* symmetric crypto */ int crypto_cipher_generate_key(crypto_cipher_env_t *env); -int crypto_cipher_set_key(crypto_cipher_env_t *env, const char *key); +void crypto_cipher_set_key(crypto_cipher_env_t *env, const char *key); void crypto_cipher_generate_iv(char *iv_out); int crypto_cipher_set_iv(crypto_cipher_env_t *env, const char *iv); const char *crypto_cipher_get_key(crypto_cipher_env_t *env); |