summaryrefslogtreecommitdiff
path: root/src/common/tortls.h
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2014-10-08 15:39:34 -0400
committerNick Mathewson <nickm@torproject.org>2015-05-28 10:41:50 -0400
commitb75361c5ed717cde787c1b4f36e8fb51ccfddc2b (patch)
treeab7eabd383a6b83ffcbdd6bf2f6e19d222ae4681 /src/common/tortls.h
parentdf05e195ee64d7ed1b5a1b5d74c5868683788ba2 (diff)
downloadtor-b75361c5ed717cde787c1b4f36e8fb51ccfddc2b.tar.gz
tor-b75361c5ed717cde787c1b4f36e8fb51ccfddc2b.zip
Start testing cell encoders/processers for the v3 handshake.
An earlier version of these tests was broken; now they're a nicer, more robust, more black-box set of tests. The key is to have each test check a handshake message that is wrong in _one_ way.
Diffstat (limited to 'src/common/tortls.h')
-rw-r--r--src/common/tortls.h4
1 files changed, 2 insertions, 2 deletions
diff --git a/src/common/tortls.h b/src/common/tortls.h
index 28a73e9ae4..11ef09fed4 100644
--- a/src/common/tortls.h
+++ b/src/common/tortls.h
@@ -132,8 +132,8 @@ int tor_tls_get_my_certs(int server,
const tor_x509_cert_t **id_cert_out);
crypto_pk_t *tor_tls_get_my_client_auth_key(void);
crypto_pk_t *tor_tls_cert_get_key(tor_x509_cert_t *cert);
-int tor_tls_cert_matches_key(const tor_tls_t *tls,
- const tor_x509_cert_t *cert);
+MOCK_DECL(int,tor_tls_cert_matches_key,(const tor_tls_t *tls,
+ const tor_x509_cert_t *cert));
int tor_tls_cert_is_valid(int severity,
const tor_x509_cert_t *cert,
const tor_x509_cert_t *signing_cert,