diff options
Diffstat (limited to 'src/common')
-rw-r--r-- | src/common/tortls.c | 4 | ||||
-rw-r--r-- | src/common/tortls.h | 3 |
2 files changed, 4 insertions, 3 deletions
diff --git a/src/common/tortls.c b/src/common/tortls.c index b4d50cda62..97dca4d478 100644 --- a/src/common/tortls.c +++ b/src/common/tortls.c @@ -880,8 +880,8 @@ tor_x509_cert_new(X509 *x509_cert) } /** Read a DER-encoded X509 cert, of length exactly <b>certificate_len</b>, - * from a <b>certificate</b>. Return a newly allocated tor_x509_cert_t on success - * and NULL on failure. */ + * from a <b>certificate</b>. Return a newly allocated tor_x509_cert_t on + * success and NULL on failure. */ tor_x509_cert_t * tor_x509_cert_decode(const uint8_t *certificate, size_t certificate_len) { diff --git a/src/common/tortls.h b/src/common/tortls.h index 22b1a9eb0f..28a73e9ae4 100644 --- a/src/common/tortls.h +++ b/src/common/tortls.h @@ -132,7 +132,8 @@ int tor_tls_get_my_certs(int server, const tor_x509_cert_t **id_cert_out); crypto_pk_t *tor_tls_get_my_client_auth_key(void); crypto_pk_t *tor_tls_cert_get_key(tor_x509_cert_t *cert); -int tor_tls_cert_matches_key(const tor_tls_t *tls, const tor_x509_cert_t *cert); +int tor_tls_cert_matches_key(const tor_tls_t *tls, + const tor_x509_cert_t *cert); int tor_tls_cert_is_valid(int severity, const tor_x509_cert_t *cert, const tor_x509_cert_t *signing_cert, |