Update to latest trunnel
This commit is contained in:
parent
a7de5bd02e
commit
988d208814
|
@ -1,4 +1,4 @@
|
|||
/* trunnel-impl.h -- copied from Trunnel v1.4.2
|
||||
/* trunnel-impl.h -- copied from Trunnel v1.4.3
|
||||
* https://gitweb.torproject.org/trunnel.git
|
||||
* You probably shouldn't edit this file.
|
||||
*/
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
/* trunnel.c -- copied from Trunnel v1.4.2
|
||||
/* trunnel.c -- copied from Trunnel v1.4.3
|
||||
* https://gitweb.torproject.org/trunnel.git
|
||||
* You probably shouldn't edit this file.
|
||||
*/
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
/* trunnel.h -- copied from Trunnel v1.4.2
|
||||
/* trunnel.h -- copied from Trunnel v1.4.3
|
||||
* https://gitweb.torproject.org/trunnel.git
|
||||
* You probably shouldn't edit this file.
|
||||
*/
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
/* ed25519_cert.c -- generated by Trunnel v1.4.2.
|
||||
/* ed25519_cert.c -- generated by Trunnel v1.4.3.
|
||||
* https://gitweb.torproject.org/trunnel.git
|
||||
* You probably shouldn't edit this file.
|
||||
*/
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
/* ed25519_cert.h -- generated by by Trunnel v1.4.2.
|
||||
/* ed25519_cert.h -- generated by by Trunnel v1.4.3.
|
||||
* https://gitweb.torproject.org/trunnel.git
|
||||
* You probably shouldn't edit this file.
|
||||
*/
|
||||
|
@ -61,7 +61,7 @@ ssize_t ed25519_cert_extension_encoded_len(const ed25519_cert_extension_t *obj);
|
|||
* On success, return the number of bytes used. On failure, return -2
|
||||
* if the buffer was not long enough, and -1 if the input was invalid.
|
||||
*/
|
||||
ssize_t ed25519_cert_extension_encode(uint8_t *output, const size_t avail, const ed25519_cert_extension_t *input);
|
||||
ssize_t ed25519_cert_extension_encode(uint8_t *output, size_t avail, const ed25519_cert_extension_t *input);
|
||||
/** Check whether the internal state of the ed25519_cert_extension in
|
||||
* 'obj' is consistent. Return NULL if it is, and a short message if
|
||||
* it is not.
|
||||
|
@ -167,7 +167,7 @@ ssize_t ed25519_cert_encoded_len(const ed25519_cert_t *obj);
|
|||
* success, return the number of bytes used. On failure, return -2 if
|
||||
* the buffer was not long enough, and -1 if the input was invalid.
|
||||
*/
|
||||
ssize_t ed25519_cert_encode(uint8_t *output, const size_t avail, const ed25519_cert_t *input);
|
||||
ssize_t ed25519_cert_encode(uint8_t *output, size_t avail, const ed25519_cert_t *input);
|
||||
/** Check whether the internal state of the ed25519_cert in 'obj' is
|
||||
* consistent. Return NULL if it is, and a short message if it is not.
|
||||
*/
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
/* link_handshake.c -- generated by Trunnel v1.4.2.
|
||||
/* link_handshake.c -- generated by Trunnel v1.4.3.
|
||||
* https://gitweb.torproject.org/trunnel.git
|
||||
* You probably shouldn't edit this file.
|
||||
*/
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
/* link_handshake.h -- generated by by Trunnel v1.4.2.
|
||||
/* link_handshake.h -- generated by by Trunnel v1.4.3.
|
||||
* https://gitweb.torproject.org/trunnel.git
|
||||
* You probably shouldn't edit this file.
|
||||
*/
|
||||
|
@ -104,7 +104,7 @@ ssize_t auth_challenge_cell_encoded_len(const auth_challenge_cell_t *obj);
|
|||
* success, return the number of bytes used. On failure, return -2 if
|
||||
* the buffer was not long enough, and -1 if the input was invalid.
|
||||
*/
|
||||
ssize_t auth_challenge_cell_encode(uint8_t *output, const size_t avail, const auth_challenge_cell_t *input);
|
||||
ssize_t auth_challenge_cell_encode(uint8_t *output, size_t avail, const auth_challenge_cell_t *input);
|
||||
/** Check whether the internal state of the auth_challenge_cell in
|
||||
* 'obj' is consistent. Return NULL if it is, and a short message if
|
||||
* it is not.
|
||||
|
@ -206,7 +206,7 @@ ssize_t certs_cell_cert_encoded_len(const certs_cell_cert_t *obj);
|
|||
* success, return the number of bytes used. On failure, return -2 if
|
||||
* the buffer was not long enough, and -1 if the input was invalid.
|
||||
*/
|
||||
ssize_t certs_cell_cert_encode(uint8_t *output, const size_t avail, const certs_cell_cert_t *input);
|
||||
ssize_t certs_cell_cert_encode(uint8_t *output, size_t avail, const certs_cell_cert_t *input);
|
||||
/** Check whether the internal state of the certs_cell_cert in 'obj'
|
||||
* is consistent. Return NULL if it is, and a short message if it is
|
||||
* not.
|
||||
|
@ -285,7 +285,7 @@ ssize_t rsa_ed_crosscert_encoded_len(const rsa_ed_crosscert_t *obj);
|
|||
* success, return the number of bytes used. On failure, return -2 if
|
||||
* the buffer was not long enough, and -1 if the input was invalid.
|
||||
*/
|
||||
ssize_t rsa_ed_crosscert_encode(uint8_t *output, const size_t avail, const rsa_ed_crosscert_t *input);
|
||||
ssize_t rsa_ed_crosscert_encode(uint8_t *output, size_t avail, const rsa_ed_crosscert_t *input);
|
||||
/** Check whether the internal state of the rsa_ed_crosscert in 'obj'
|
||||
* is consistent. Return NULL if it is, and a short message if it is
|
||||
* not.
|
||||
|
@ -382,7 +382,7 @@ ssize_t auth1_encoded_len(const auth1_t *obj, const auth_ctx_t *auth_ctx_ctx);
|
|||
* the number of bytes used. On failure, return -2 if the buffer was
|
||||
* not long enough, and -1 if the input was invalid.
|
||||
*/
|
||||
ssize_t auth1_encode(uint8_t *output, const size_t avail, const auth1_t *input, const auth_ctx_t *auth_ctx_ctx);
|
||||
ssize_t auth1_encode(uint8_t *output, size_t avail, const auth1_t *input, const auth_ctx_t *auth_ctx_ctx);
|
||||
/** Check whether the internal state of the auth1 in 'obj' is
|
||||
* consistent. Return NULL if it is, and a short message if it is not.
|
||||
*/
|
||||
|
@ -602,7 +602,7 @@ ssize_t certs_cell_encoded_len(const certs_cell_t *obj);
|
|||
* success, return the number of bytes used. On failure, return -2 if
|
||||
* the buffer was not long enough, and -1 if the input was invalid.
|
||||
*/
|
||||
ssize_t certs_cell_encode(uint8_t *output, const size_t avail, const certs_cell_t *input);
|
||||
ssize_t certs_cell_encode(uint8_t *output, size_t avail, const certs_cell_t *input);
|
||||
/** Check whether the internal state of the certs_cell in 'obj' is
|
||||
* consistent. Return NULL if it is, and a short message if it is not.
|
||||
*/
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
/* pwbox.c -- generated by Trunnel v1.4.2.
|
||||
/* pwbox.c -- generated by Trunnel v1.4.3.
|
||||
* https://gitweb.torproject.org/trunnel.git
|
||||
* You probably shouldn't edit this file.
|
||||
*/
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
/* pwbox.h -- generated by by Trunnel v1.4.2.
|
||||
/* pwbox.h -- generated by by Trunnel v1.4.3.
|
||||
* https://gitweb.torproject.org/trunnel.git
|
||||
* You probably shouldn't edit this file.
|
||||
*/
|
||||
|
@ -49,7 +49,7 @@ ssize_t pwbox_encoded_encoded_len(const pwbox_encoded_t *obj);
|
|||
* success, return the number of bytes used. On failure, return -2 if
|
||||
* the buffer was not long enough, and -1 if the input was invalid.
|
||||
*/
|
||||
ssize_t pwbox_encoded_encode(uint8_t *output, const size_t avail, const pwbox_encoded_t *input);
|
||||
ssize_t pwbox_encoded_encode(uint8_t *output, size_t avail, const pwbox_encoded_t *input);
|
||||
/** Check whether the internal state of the pwbox_encoded in 'obj' is
|
||||
* consistent. Return NULL if it is, and a short message if it is not.
|
||||
*/
|
||||
|
|
Loading…
Reference in New Issue