diff options
author | Nick Mathewson <nickm@torproject.org> | 2005-10-06 04:33:40 +0000 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2005-10-06 04:33:40 +0000 |
commit | ba24193ab51bec6f7c451c622f6476a7ab6adc42 (patch) | |
tree | 6b6cf18501bb696e4a19399c1030bf697b83d053 /src/common/tortls.h | |
parent | e53f1ccbfcb667bda30ce9ee5a42cc3be9efc80a (diff) | |
download | tor-ba24193ab51bec6f7c451c622f6476a7ab6adc42.tar.gz tor-ba24193ab51bec6f7c451c622f6476a7ab6adc42.zip |
Make doxygen marginally happier
svn:r5208
Diffstat (limited to 'src/common/tortls.h')
-rw-r--r-- | src/common/tortls.h | 32 |
1 files changed, 16 insertions, 16 deletions
diff --git a/src/common/tortls.h b/src/common/tortls.h index 4d8aba264b..d5cf493872 100644 --- a/src/common/tortls.h +++ b/src/common/tortls.h @@ -16,7 +16,7 @@ #include "../common/compat.h" /* Opaque structure to hold a TLS connection. */ -typedef struct tor_tls_st tor_tls; +typedef struct tor_tls_t tor_tls_t; /* Possible return values for most tor_tls_* functions. */ #define TOR_TLS_ERROR -4 @@ -28,21 +28,21 @@ typedef struct tor_tls_st tor_tls; void tor_tls_free_all(void); int tor_tls_context_new(crypto_pk_env_t *rsa, int isServer, const char *nickname, unsigned int key_lifetime); -tor_tls *tor_tls_new(int sock, int is_server, int use_no_cert); -int tor_tls_is_server(tor_tls *tls); -void tor_tls_free(tor_tls *tls); -int tor_tls_peer_has_cert(tor_tls *tls); -int tor_tls_get_peer_cert_nickname(tor_tls *tls, char *buf, size_t buflen); -int tor_tls_verify(tor_tls *tls, crypto_pk_env_t **identity); -int tor_tls_check_lifetime(tor_tls *tls, int tolerance); -int tor_tls_read(tor_tls *tls, char *cp, size_t len); -int tor_tls_write(tor_tls *tls, char *cp, size_t n); -int tor_tls_handshake(tor_tls *tls); -int tor_tls_shutdown(tor_tls *tls); -int tor_tls_get_pending_bytes(tor_tls *tls); - -unsigned long tor_tls_get_n_bytes_read(tor_tls *tls); -unsigned long tor_tls_get_n_bytes_written(tor_tls *tls); +tor_tls_t *tor_tls_new(int sock, int is_server, int use_no_cert); +int tor_tls_is_server(tor_tls_t *tls); +void tor_tls_free(tor_tls_t *tls); +int tor_tls_peer_has_cert(tor_tls_t *tls); +int tor_tls_get_peer_cert_nickname(tor_tls_t *tls, char *buf, size_t buflen); +int tor_tls_verify(tor_tls_t *tls, crypto_pk_env_t **identity); +int tor_tls_check_lifetime(tor_tls_t *tls, int tolerance); +int tor_tls_read(tor_tls_t *tls, char *cp, size_t len); +int tor_tls_write(tor_tls_t *tls, char *cp, size_t n); +int tor_tls_handshake(tor_tls_t *tls); +int tor_tls_shutdown(tor_tls_t *tls); +int tor_tls_get_pending_bytes(tor_tls_t *tls); + +unsigned long tor_tls_get_n_bytes_read(tor_tls_t *tls); +unsigned long tor_tls_get_n_bytes_written(tor_tls_t *tls); /* Log and abort if there are unhandled TLS errors in OpenSSL's error stack. */ |