summaryrefslogtreecommitdiff
path: root/src/core/gnunet-service-core_kx.h
diff options
context:
space:
mode:
Diffstat (limited to 'src/core/gnunet-service-core_kx.h')
-rw-r--r--src/core/gnunet-service-core_kx.h20
1 files changed, 10 insertions, 10 deletions
diff --git a/src/core/gnunet-service-core_kx.h b/src/core/gnunet-service-core_kx.h
index d27c3687a..d8928f7d3 100644
--- a/src/core/gnunet-service-core_kx.h
+++ b/src/core/gnunet-service-core_kx.h
@@ -11,12 +11,12 @@
11 WITHOUT ANY WARRANTY; without even the implied warranty of 11 WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU 12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 Affero General Public License for more details. 13 Affero General Public License for more details.
14 14
15 You should have received a copy of the GNU Affero General Public License 15 You should have received a copy of the GNU Affero General Public License
16 along with this program. If not, see <http://www.gnu.org/licenses/>. 16 along with this program. If not, see <http://www.gnu.org/licenses/>.
17 17
18 SPDX-License-Identifier: AGPL3.0-or-later 18 SPDX-License-Identifier: AGPL3.0-or-later
19*/ 19 */
20 20
21/** 21/**
22 * @file core/gnunet-service-core_kx.h 22 * @file core/gnunet-service-core_kx.h
@@ -44,9 +44,9 @@ struct GSC_KeyExchangeInfo;
44 * @param payload_size number of bytes in 'payload' 44 * @param payload_size number of bytes in 'payload'
45 */ 45 */
46void 46void
47GSC_KX_encrypt_and_transmit (struct GSC_KeyExchangeInfo *kx, 47GSC_KX_encrypt_and_transmit(struct GSC_KeyExchangeInfo *kx,
48 const void *payload, 48 const void *payload,
49 size_t payload_size); 49 size_t payload_size);
50 50
51 51
52/** 52/**
@@ -56,14 +56,14 @@ GSC_KX_encrypt_and_transmit (struct GSC_KeyExchangeInfo *kx,
56 * @return #GNUNET_OK on success, #GNUNET_SYSERR on failure 56 * @return #GNUNET_OK on success, #GNUNET_SYSERR on failure
57 */ 57 */
58int 58int
59GSC_KX_init (struct GNUNET_CRYPTO_EddsaPrivateKey *pk); 59GSC_KX_init(struct GNUNET_CRYPTO_EddsaPrivateKey *pk);
60 60
61 61
62/** 62/**
63 * Shutdown KX subsystem. 63 * Shutdown KX subsystem.
64 */ 64 */
65void 65void
66GSC_KX_done (void); 66GSC_KX_done(void);
67 67
68 68
69/** 69/**
@@ -73,7 +73,7 @@ GSC_KX_done (void);
73 * @return #GNUNET_YES if excess bandwidth is available, #GNUNET_NO if not 73 * @return #GNUNET_YES if excess bandwidth is available, #GNUNET_NO if not
74 */ 74 */
75int 75int
76GSC_NEIGHBOURS_check_excess_bandwidth (const struct GSC_KeyExchangeInfo *target); 76GSC_NEIGHBOURS_check_excess_bandwidth(const struct GSC_KeyExchangeInfo *target);
77 77
78 78
79/** 79/**
@@ -83,7 +83,7 @@ GSC_NEIGHBOURS_check_excess_bandwidth (const struct GSC_KeyExchangeInfo *target)
83 * @return number of items in the message queue 83 * @return number of items in the message queue
84 */ 84 */
85unsigned int 85unsigned int
86GSC_NEIGHBOURS_get_queue_length (const struct GSC_KeyExchangeInfo *target); 86GSC_NEIGHBOURS_get_queue_length(const struct GSC_KeyExchangeInfo *target);
87 87
88 88
89/** 89/**
@@ -95,7 +95,7 @@ GSC_NEIGHBOURS_get_queue_length (const struct GSC_KeyExchangeInfo *target);
95 * @param mq message queue to add for monitoring 95 * @param mq message queue to add for monitoring
96 */ 96 */
97void 97void
98GSC_KX_handle_client_monitor_peers (struct GNUNET_MQ_Handle *mq); 98GSC_KX_handle_client_monitor_peers(struct GNUNET_MQ_Handle *mq);
99 99
100 100
101#endif 101#endif