aboutsummaryrefslogtreecommitdiff
path: root/src/or/or.h
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2004-10-19 18:19:59 +0000
committerNick Mathewson <nickm@torproject.org>2004-10-19 18:19:59 +0000
commite5049d5aa32574ad6f5a1a73151e80b0db606237 (patch)
tree4244a3d0f28bd2b4e2d07bb745df5f08a5cd8544 /src/or/or.h
parent62094ebd32c61421a24982c88b767826cdae75db (diff)
downloadtor-e5049d5aa32574ad6f5a1a73151e80b0db606237.tar
tor-e5049d5aa32574ad6f5a1a73151e80b0db606237.tar.gz
Remove routerinfo_t->is_trusted_dir, and all the twisted machinery used to
maintain it. Have clients default to the nickname "client" in their certificates. Give a less frightening warning on obsolete (pre-0.0.8) routerinfo_t's. svn:r2568
Diffstat (limited to 'src/or/or.h')
-rw-r--r--src/or/or.h4
1 files changed, 0 insertions, 4 deletions
diff --git a/src/or/or.h b/src/or/or.h
index 196a1dc9a..a6dd45193 100644
--- a/src/or/or.h
+++ b/src/or/or.h
@@ -595,7 +595,6 @@ typedef struct {
int is_running; /**< As far as we know, is this OR currently running? */
time_t status_set_at; /**< When did we last update is_running? */
int is_verified; /**< Has a trusted dirserver validated this OR? */
- int is_trusted_dir; /**< Do we trust this OR as a directory server? */
smartlist_t *declared_family; /**< Nicknames of router which this router
* claims are its family. */
@@ -1451,13 +1450,10 @@ routerinfo_t *router_get_by_digest(const char *digest);
int router_digest_is_trusted_dir(const char *digest);
void router_get_routerlist(routerlist_t **prouterlist);
void routerlist_free(routerlist_t *routerlist);
-void routerlist_clear_trusted_directories(void);
void routerinfo_free(routerinfo_t *router);
routerinfo_t *routerinfo_copy(const routerinfo_t *router);
void router_mark_as_down(const char *digest);
void routerlist_remove_old_routers(int age);
-int router_load_routerlist_from_file(char *routerfile, int trusted);
-int router_load_routerlist_from_string(const char *s, int trusted);
int router_load_routerlist_from_directory(const char *s,crypto_pk_env_t *pkey,
int check_version);
int router_compare_addr_to_exit_policy(uint32_t addr, uint16_t port,