diff options
author | Andreas Steffen <andreas.steffen@strongswan.org> | 2011-05-31 15:46:30 +0200 |
---|---|---|
committer | Andreas Steffen <andreas.steffen@strongswan.org> | 2011-05-31 15:46:51 +0200 |
commit | 7e432eff6bf414465c4a1405bfddf856aa7ce753 (patch) | |
tree | 37637e028876b928a95fc6d7ee938a50bdeb0d5c /src/libtls/tls_crypto.h | |
parent | 4cefb9bd10a3fc7c74489b8ad90c2b6cdc834062 (diff) | |
download | strongswan-7e432eff6bf414465c4a1405bfddf856aa7ce753.tar.bz2 strongswan-7e432eff6bf414465c4a1405bfddf856aa7ce753.tar.xz |
renamed tls_reader|writer to bio_* and moved to libstrongswan
Diffstat (limited to 'src/libtls/tls_crypto.h')
-rw-r--r-- | src/libtls/tls_crypto.h | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/src/libtls/tls_crypto.h b/src/libtls/tls_crypto.h index f57b8f3e1..35c9b6e05 100644 --- a/src/libtls/tls_crypto.h +++ b/src/libtls/tls_crypto.h @@ -427,7 +427,7 @@ struct tls_crypto_t { * * @param writer writer to write supported hash/sig algorithms */ - void (*get_signature_algorithms)(tls_crypto_t *this, tls_writer_t *writer); + void (*get_signature_algorithms)(tls_crypto_t *this, bio_writer_t *writer); /** * Create an enumerator over supported ECDH groups. @@ -464,7 +464,7 @@ struct tls_crypto_t { * @return TRUE if signature create successfully */ bool (*sign)(tls_crypto_t *this, private_key_t *key, - tls_writer_t *writer, chunk_t data, chunk_t hashsig); + bio_writer_t *writer, chunk_t data, chunk_t hashsig); /** * Verify a blob of data, read signature from a reader. @@ -475,7 +475,7 @@ struct tls_crypto_t { * @return TRUE if signature valid */ bool (*verify)(tls_crypto_t *this, public_key_t *key, - tls_reader_t *reader, chunk_t data); + bio_reader_t *reader, chunk_t data); /** * Create a signature of the handshake data using a given private key. @@ -486,7 +486,7 @@ struct tls_crypto_t { * @return TRUE if signature create successfully */ bool (*sign_handshake)(tls_crypto_t *this, private_key_t *key, - tls_writer_t *writer, chunk_t hashsig); + bio_writer_t *writer, chunk_t hashsig); /** * Verify the signature over handshake data using a given public key. @@ -496,7 +496,7 @@ struct tls_crypto_t { * @return TRUE if signature valid */ bool (*verify_handshake)(tls_crypto_t *this, public_key_t *key, - tls_reader_t *reader); + bio_reader_t *reader); /** * Calculate the data of a TLS finished message. |