aboutsummaryrefslogtreecommitdiff
path: root/src/common/tortls.h
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2006-05-26 16:32:16 +0000
committerRoger Dingledine <arma@torproject.org>2006-05-26 16:32:16 +0000
commit7f611f473268ed884dbc5bf0e91dfff84985d370 (patch)
tree05231073c99379a3bbade7b9fd429213075a6bb7 /src/common/tortls.h
parent82ae38f649a15e3df02cdf6d35ab8b316a317aad (diff)
downloadtor-7f611f473268ed884dbc5bf0e91dfff84985d370.tar
tor-7f611f473268ed884dbc5bf0e91dfff84985d370.tar.gz
if we're a server and some peer has a broken tls certificate, don't
shout about it unless we want to hear about protocol violations. svn:r6507
Diffstat (limited to 'src/common/tortls.h')
-rw-r--r--src/common/tortls.h3
1 files changed, 2 insertions, 1 deletions
diff --git a/src/common/tortls.h b/src/common/tortls.h
index 9add9c7ce..82a64cb97 100644
--- a/src/common/tortls.h
+++ b/src/common/tortls.h
@@ -32,7 +32,8 @@ tor_tls_t *tor_tls_new(int sock, int is_server, int use_no_cert);
int tor_tls_is_server(tor_tls_t *tls);
void tor_tls_free(tor_tls_t *tls);
int tor_tls_peer_has_cert(tor_tls_t *tls);
-int tor_tls_get_peer_cert_nickname(tor_tls_t *tls, char *buf, size_t buflen);
+int tor_tls_get_peer_cert_nickname(int severity, tor_tls_t *tls,
+ char *buf, size_t buflen);
int tor_tls_verify(int severity, tor_tls_t *tls, crypto_pk_env_t **identity);
int tor_tls_check_lifetime(tor_tls_t *tls, int tolerance);
int tor_tls_read(tor_tls_t *tls, char *cp, size_t len);