diff options
author | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2007-11-11 08:26:38 +0200 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2007-11-11 08:26:38 +0200 |
commit | 19079c1ae445c6c8d465ac0d963bf338dcbb5071 (patch) | |
tree | 4f347688a511be283ab637240ef0f324f0ee31e7 | |
parent | 30cfff6fb0e8af7ee050ccb95423199345ba3a07 (diff) | |
download | gnutls-19079c1ae445c6c8d465ac0d963bf338dcbb5071.tar.gz |
Applied documentation and prototype fixes reported by Evan Martin <martine@danga.com>.
-rw-r--r-- | includes/gnutls/gnutls.h.in | 4 | ||||
-rw-r--r-- | lib/gnutls_cert.c | 14 | ||||
-rw-r--r-- | src/tls_test.c | 2 |
3 files changed, 12 insertions, 8 deletions
diff --git a/includes/gnutls/gnutls.h.in b/includes/gnutls/gnutls.h.in index 03e1147068..14e1e34483 100644 --- a/includes/gnutls/gnutls.h.in +++ b/includes/gnutls/gnutls.h.in @@ -692,6 +692,10 @@ extern "C" const gnutls_datum_t * KEY, gnutls_x509_crt_fmt_t type); + void gnutls_certificate_send_x509_rdn_sequence (gnutls_session_t session, + int status); + + extern int gnutls_certificate_set_x509_simple_pkcs12_file (gnutls_certificate_credentials_t res, const char *pkcs12file, diff --git a/lib/gnutls_cert.c b/lib/gnutls_cert.c index 3eb7c2b58c..9c7928895a 100644 --- a/lib/gnutls_cert.c +++ b/lib/gnutls_cert.c @@ -314,19 +314,19 @@ gnutls_certificate_server_set_request (gnutls_session_t session, * to be used in the handshake. * The callback's function prototype is: * int (*callback)(gnutls_session_t, const gnutls_datum_t* req_ca_dn, int nreqs, - * gnutls_pk_algorithm_t* pk_algos, int pk_algos_length, gnutls_retr_st* st); + * const gnutls_pk_algorithm_t* pk_algos, int pk_algos_length, gnutls_retr_st* st); * - * @st should contain the certificates and private keys. - * - * @req_ca_cert, is only used in X.509 certificates. + * @req_ca_cert is only used in X.509 certificates. * Contains a list with the CA names that the server considers trusted. * Normally we should send a certificate that is signed * by one of these CAs. These names are DER encoded. To get a more * meaningful value use the function gnutls_x509_rdn_get(). * - * @pk_algos, contains a list with server's acceptable signature algorithms. + * @pk_algos contains a list with server's acceptable signature algorithms. * The certificate returned should support the server's given algorithms. * + * @st should contain the certificates and private keys. + * * If the callback function is provided then gnutls will call it, in the * handshake, after the certificate request message has been received. * @@ -522,7 +522,7 @@ _gnutls_openpgp_crt_verify_peers (gnutls_session_t session, * * Returns a negative error code on error and zero on success. * - * This is the same as gnutls_x509_verify_certificate() and uses the + * This is the same as gnutls_x509_crt_list_verify() and uses the * loaded CAs in the credentials as trusted CAs. * * Note that some commonly used X.509 Certificate Authorities are @@ -571,7 +571,7 @@ gnutls_certificate_verify_peers2 (gnutls_session_t session, * gnutls_certificate_status_t enumerated elements bitwise or'd, or a * negative value on error. * - * This is the same as gnutls_x509_verify_certificate(). + * This is the same as gnutls_x509_crt_list_verify(). * * Deprecated: Use gnutls_certificate_verify_peers2() instead. * diff --git a/src/tls_test.c b/src/tls_test.c index 2134474a10..d34eec4a56 100644 --- a/src/tls_test.c +++ b/src/tls_test.c @@ -245,7 +245,7 @@ main (int argc, char **argv) if (i > 3 && tls1_1_ok == 0 && tls1_ok == 0 && ssl3_ok == 0) { fprintf (stderr, - "\nServer does not support none of SSL 3.0, TLS 1.0 and TLS 1.1\n"); + "\nServer does not support any of SSL 3.0, TLS 1.0 and TLS 1.1\n"); break; } |