diff options
author | Nick Mathewson <nickm@torproject.org> | 2014-10-08 15:39:34 -0400 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2015-05-28 10:41:50 -0400 |
commit | b75361c5ed717cde787c1b4f36e8fb51ccfddc2b (patch) | |
tree | ab7eabd383a6b83ffcbdd6bf2f6e19d222ae4681 /src/common/tortls.h | |
parent | df05e195ee64d7ed1b5a1b5d74c5868683788ba2 (diff) | |
download | tor-b75361c5ed717cde787c1b4f36e8fb51ccfddc2b.tar.gz tor-b75361c5ed717cde787c1b4f36e8fb51ccfddc2b.zip |
Start testing cell encoders/processers for the v3 handshake.
An earlier version of these tests was broken; now they're a nicer,
more robust, more black-box set of tests. The key is to have each
test check a handshake message that is wrong in _one_ way.
Diffstat (limited to 'src/common/tortls.h')
-rw-r--r-- | src/common/tortls.h | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/src/common/tortls.h b/src/common/tortls.h index 28a73e9ae4..11ef09fed4 100644 --- a/src/common/tortls.h +++ b/src/common/tortls.h @@ -132,8 +132,8 @@ int tor_tls_get_my_certs(int server, const tor_x509_cert_t **id_cert_out); crypto_pk_t *tor_tls_get_my_client_auth_key(void); crypto_pk_t *tor_tls_cert_get_key(tor_x509_cert_t *cert); -int tor_tls_cert_matches_key(const tor_tls_t *tls, - const tor_x509_cert_t *cert); +MOCK_DECL(int,tor_tls_cert_matches_key,(const tor_tls_t *tls, + const tor_x509_cert_t *cert)); int tor_tls_cert_is_valid(int severity, const tor_x509_cert_t *cert, const tor_x509_cert_t *signing_cert, |