aboutsummaryrefslogtreecommitdiff
path: root/src/common/tortls.h
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2005-10-06 04:33:40 +0000
committerNick Mathewson <nickm@torproject.org>2005-10-06 04:33:40 +0000
commitba24193ab51bec6f7c451c622f6476a7ab6adc42 (patch)
tree6b6cf18501bb696e4a19399c1030bf697b83d053 /src/common/tortls.h
parente53f1ccbfcb667bda30ce9ee5a42cc3be9efc80a (diff)
downloadtor-ba24193ab51bec6f7c451c622f6476a7ab6adc42.tar.gz
tor-ba24193ab51bec6f7c451c622f6476a7ab6adc42.zip
Make doxygen marginally happier
svn:r5208
Diffstat (limited to 'src/common/tortls.h')
-rw-r--r--src/common/tortls.h32
1 files changed, 16 insertions, 16 deletions
diff --git a/src/common/tortls.h b/src/common/tortls.h
index 4d8aba264b..d5cf493872 100644
--- a/src/common/tortls.h
+++ b/src/common/tortls.h
@@ -16,7 +16,7 @@
#include "../common/compat.h"
/* Opaque structure to hold a TLS connection. */
-typedef struct tor_tls_st tor_tls;
+typedef struct tor_tls_t tor_tls_t;
/* Possible return values for most tor_tls_* functions. */
#define TOR_TLS_ERROR -4
@@ -28,21 +28,21 @@ typedef struct tor_tls_st tor_tls;
void tor_tls_free_all(void);
int tor_tls_context_new(crypto_pk_env_t *rsa, int isServer,
const char *nickname, unsigned int key_lifetime);
-tor_tls *tor_tls_new(int sock, int is_server, int use_no_cert);
-int tor_tls_is_server(tor_tls *tls);
-void tor_tls_free(tor_tls *tls);
-int tor_tls_peer_has_cert(tor_tls *tls);
-int tor_tls_get_peer_cert_nickname(tor_tls *tls, char *buf, size_t buflen);
-int tor_tls_verify(tor_tls *tls, crypto_pk_env_t **identity);
-int tor_tls_check_lifetime(tor_tls *tls, int tolerance);
-int tor_tls_read(tor_tls *tls, char *cp, size_t len);
-int tor_tls_write(tor_tls *tls, char *cp, size_t n);
-int tor_tls_handshake(tor_tls *tls);
-int tor_tls_shutdown(tor_tls *tls);
-int tor_tls_get_pending_bytes(tor_tls *tls);
-
-unsigned long tor_tls_get_n_bytes_read(tor_tls *tls);
-unsigned long tor_tls_get_n_bytes_written(tor_tls *tls);
+tor_tls_t *tor_tls_new(int sock, int is_server, int use_no_cert);
+int tor_tls_is_server(tor_tls_t *tls);
+void tor_tls_free(tor_tls_t *tls);
+int tor_tls_peer_has_cert(tor_tls_t *tls);
+int tor_tls_get_peer_cert_nickname(tor_tls_t *tls, char *buf, size_t buflen);
+int tor_tls_verify(tor_tls_t *tls, crypto_pk_env_t **identity);
+int tor_tls_check_lifetime(tor_tls_t *tls, int tolerance);
+int tor_tls_read(tor_tls_t *tls, char *cp, size_t len);
+int tor_tls_write(tor_tls_t *tls, char *cp, size_t n);
+int tor_tls_handshake(tor_tls_t *tls);
+int tor_tls_shutdown(tor_tls_t *tls);
+int tor_tls_get_pending_bytes(tor_tls_t *tls);
+
+unsigned long tor_tls_get_n_bytes_read(tor_tls_t *tls);
+unsigned long tor_tls_get_n_bytes_written(tor_tls_t *tls);
/* Log and abort if there are unhandled TLS errors in OpenSSL's error stack.
*/