From 46b1a21dc49c83e57e7d8e6a90968fc908e739f8 Mon Sep 17 00:00:00 2001 From: Nick Mathewson Date: Wed, 6 Feb 2008 21:53:13 +0000 Subject: r17955@catbus: nickm | 2008-02-06 16:53:07 -0500 The SSL portion of the revised handshake now seems to work: I just finally got a client and a server to negotiate versions. Now to make sure certificate verification is really happening, connections are getting opened, etc. svn:r13409 --- src/common/tortls.h | 5 ----- 1 file changed, 5 deletions(-) (limited to 'src/common/tortls.h') diff --git a/src/common/tortls.h b/src/common/tortls.h index a7ef9a775e..163b0402c4 100644 --- a/src/common/tortls.h +++ b/src/common/tortls.h @@ -56,11 +56,6 @@ void tor_tls_set_renegotiate_callback(tor_tls_t *tls, int tor_tls_is_server(tor_tls_t *tls); void tor_tls_free(tor_tls_t *tls); int tor_tls_peer_has_cert(tor_tls_t *tls); -int tor_tls_get_cert_digests(tor_tls_t *tls, char *my_digest_out, - char *peer_digest_out); -char *tor_tls_encode_my_certificate(tor_tls_t *tls, size_t *size_out, - int conn_cert); -crypto_pk_env_t *tor_tls_dup_private_key(tor_tls_t *tls); int tor_tls_verify_v1(int severity, tor_tls_t *tls, crypto_pk_env_t **identity); int tor_tls_check_lifetime(tor_tls_t *tls, int tolerance); -- cgit v1.2.3-54-g00ecf