diff options
author | Nick Mathewson <nickm@torproject.org> | 2008-02-06 21:53:13 +0000 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2008-02-06 21:53:13 +0000 |
commit | 46b1a21dc49c83e57e7d8e6a90968fc908e739f8 (patch) | |
tree | 16207dc36f00b6394187cfd2cdd1129f6fa41518 /src/common/tortls.h | |
parent | 46532d8111b9842aee8f0b600a1d1abd0ae53a9f (diff) | |
download | tor-46b1a21dc49c83e57e7d8e6a90968fc908e739f8.tar.gz tor-46b1a21dc49c83e57e7d8e6a90968fc908e739f8.zip |
r17955@catbus: nickm | 2008-02-06 16:53:07 -0500
The SSL portion of the revised handshake now seems to work: I just finally got a client and a server to negotiate versions. Now to make sure certificate verification is really happening, connections are getting opened, etc.
svn:r13409
Diffstat (limited to 'src/common/tortls.h')
-rw-r--r-- | src/common/tortls.h | 5 |
1 files changed, 0 insertions, 5 deletions
diff --git a/src/common/tortls.h b/src/common/tortls.h index a7ef9a775e..163b0402c4 100644 --- a/src/common/tortls.h +++ b/src/common/tortls.h @@ -56,11 +56,6 @@ void tor_tls_set_renegotiate_callback(tor_tls_t *tls, int tor_tls_is_server(tor_tls_t *tls); void tor_tls_free(tor_tls_t *tls); int tor_tls_peer_has_cert(tor_tls_t *tls); -int tor_tls_get_cert_digests(tor_tls_t *tls, char *my_digest_out, - char *peer_digest_out); -char *tor_tls_encode_my_certificate(tor_tls_t *tls, size_t *size_out, - int conn_cert); -crypto_pk_env_t *tor_tls_dup_private_key(tor_tls_t *tls); int tor_tls_verify_v1(int severity, tor_tls_t *tls, crypto_pk_env_t **identity); int tor_tls_check_lifetime(tor_tls_t *tls, int tolerance); |