diff options
author | Nick Mathewson <nickm@torproject.org> | 2015-08-18 09:47:36 -0400 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2015-08-18 09:47:36 -0400 |
commit | 988d208814e68162d78f66a033940f715a24834a (patch) | |
tree | f5f64e1f84b92b27b906a9c74806aac847702ab4 /src/trunnel/ed25519_cert.h | |
parent | a7de5bd02e54afcacc9d7e5a7a95fd8856228c5b (diff) | |
download | tor-988d208814e68162d78f66a033940f715a24834a.tar.gz tor-988d208814e68162d78f66a033940f715a24834a.zip |
Update to latest trunnel
Diffstat (limited to 'src/trunnel/ed25519_cert.h')
-rw-r--r-- | src/trunnel/ed25519_cert.h | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/src/trunnel/ed25519_cert.h b/src/trunnel/ed25519_cert.h index fb006868ea..face810dbe 100644 --- a/src/trunnel/ed25519_cert.h +++ b/src/trunnel/ed25519_cert.h @@ -1,4 +1,4 @@ -/* ed25519_cert.h -- generated by by Trunnel v1.4.2. +/* ed25519_cert.h -- generated by by Trunnel v1.4.3. * https://gitweb.torproject.org/trunnel.git * You probably shouldn't edit this file. */ @@ -61,7 +61,7 @@ ssize_t ed25519_cert_extension_encoded_len(const ed25519_cert_extension_t *obj); * On success, return the number of bytes used. On failure, return -2 * if the buffer was not long enough, and -1 if the input was invalid. */ -ssize_t ed25519_cert_extension_encode(uint8_t *output, const size_t avail, const ed25519_cert_extension_t *input); +ssize_t ed25519_cert_extension_encode(uint8_t *output, size_t avail, const ed25519_cert_extension_t *input); /** Check whether the internal state of the ed25519_cert_extension in * 'obj' is consistent. Return NULL if it is, and a short message if * it is not. @@ -167,7 +167,7 @@ ssize_t ed25519_cert_encoded_len(const ed25519_cert_t *obj); * success, return the number of bytes used. On failure, return -2 if * the buffer was not long enough, and -1 if the input was invalid. */ -ssize_t ed25519_cert_encode(uint8_t *output, const size_t avail, const ed25519_cert_t *input); +ssize_t ed25519_cert_encode(uint8_t *output, size_t avail, const ed25519_cert_t *input); /** Check whether the internal state of the ed25519_cert in 'obj' is * consistent. Return NULL if it is, and a short message if it is not. */ |