updated Doxyfile
properly close all doxygen groups fixed remaining doxygen warnings
This commit is contained in:
parent
e4838d02b3
commit
1490ff4d9b
1530
Doxyfile.in
1530
Doxyfile.in
File diff suppressed because it is too large
Load Diff
|
@ -350,4 +350,4 @@ struct bus_t {
|
|||
*/
|
||||
bus_t *bus_create();
|
||||
|
||||
#endif /* BUS_H_ @} */
|
||||
#endif /** BUS_H_ @}*/
|
||||
|
|
|
@ -59,4 +59,4 @@ struct file_logger_t {
|
|||
*/
|
||||
file_logger_t *file_logger_create(FILE *out);
|
||||
|
||||
#endif /* FILE_LOGGER_H_ @} */
|
||||
#endif /** FILE_LOGGER_H_ @}*/
|
||||
|
|
|
@ -61,4 +61,4 @@ struct sys_logger_t {
|
|||
*/
|
||||
sys_logger_t *sys_logger_create(int facility);
|
||||
|
||||
#endif /* SYS_LOGGER_H_ @} */
|
||||
#endif /** SYS_LOGGER_H_ @}*/
|
||||
|
|
|
@ -80,4 +80,4 @@ struct attribute_manager_t {
|
|||
*/
|
||||
attribute_manager_t *attribute_manager_create();
|
||||
|
||||
#endif /* ATTRIBUTE_MANAGER_H_ @}*/
|
||||
#endif /** ATTRIBUTE_MANAGER_H_ @}*/
|
||||
|
|
|
@ -58,4 +58,4 @@ struct attribute_provider_t {
|
|||
char *pool, host_t *address, identification_t *id);
|
||||
};
|
||||
|
||||
#endif /* ATTRIBUTE_PROVIDER_H_ @}*/
|
||||
#endif /** ATTRIBUTE_PROVIDER_H_ @}*/
|
||||
|
|
|
@ -72,4 +72,4 @@ struct backend_t {
|
|||
peer_cfg_t *(*get_peer_cfg_by_name)(backend_t *this, char *name);
|
||||
};
|
||||
|
||||
#endif /* BACKEND_H_ @} */
|
||||
#endif /** BACKEND_H_ @}*/
|
||||
|
|
|
@ -119,5 +119,4 @@ struct backend_manager_t {
|
|||
*/
|
||||
backend_manager_t* backend_manager_create(void);
|
||||
|
||||
#endif /*BACKEND_MANAGER_H_ @} */
|
||||
|
||||
#endif /** BACKEND_MANAGER_H_ @}*/
|
||||
|
|
|
@ -234,10 +234,10 @@ struct child_cfg_t {
|
|||
/**
|
||||
* Sets two options needed for Mobile IPv6 interoperability
|
||||
*
|
||||
* @proxy_mode use IPsec transport proxy mode (default FALSE)
|
||||
* @install_policy install IPsec kernel policies (default TRUE)
|
||||
* @param proxy_mode use IPsec transport proxy mode (default FALSE)
|
||||
* @param install_policy install IPsec kernel policies (default TRUE)
|
||||
*/
|
||||
void (*set_mipv6_options)(child_cfg_t *this, bool proxy_mod,
|
||||
void (*set_mipv6_options)(child_cfg_t *this, bool proxy_mode,
|
||||
bool install_policy);
|
||||
|
||||
/**
|
||||
|
@ -299,4 +299,4 @@ child_cfg_t *child_cfg_create(char *name, u_int32_t lifetime,
|
|||
char *updown, bool hostaccess, ipsec_mode_t mode,
|
||||
action_t dpd_action, action_t close_action, bool ipcomp);
|
||||
|
||||
#endif /* CHILD_CFG_H_ @} */
|
||||
#endif /** CHILD_CFG_H_ @}*/
|
||||
|
|
|
@ -133,7 +133,6 @@ struct ike_cfg_t {
|
|||
*
|
||||
* Supplied hosts become owned by ike_cfg, the name gets cloned.
|
||||
*
|
||||
* @param name ike_cfg identifier
|
||||
* @param certreq TRUE to send a certificate request
|
||||
* @param force_encap enforce UDP encapsulation by faking NATD notify
|
||||
* @param me address/DNS name of local peer
|
||||
|
@ -143,4 +142,4 @@ struct ike_cfg_t {
|
|||
ike_cfg_t *ike_cfg_create(bool certreq, bool force_encap,
|
||||
char *me, char *other);
|
||||
|
||||
#endif /* IKE_CFG_H_ @} */
|
||||
#endif /** IKE_CFG_H_ @}*/
|
||||
|
|
|
@ -340,7 +340,6 @@ struct peer_cfg_t {
|
|||
* @param reauth_time timeout before starting reauthentication
|
||||
* @param jitter_time timerange to randomly substract from rekey/reauth time
|
||||
* @param over_time maximum overtime before closing a rekeying/reauth SA
|
||||
* @param reauth sould be done reauthentication instead of rekeying?
|
||||
* @param mobike use MOBIKE (RFC4555) if peer supports it
|
||||
* @param dpd DPD check interval, 0 to disable
|
||||
* @param virtual_ip virtual IP for local host, or NULL
|
||||
|
@ -350,7 +349,7 @@ struct peer_cfg_t {
|
|||
* @param peer_id ID that identifies our peer at the mediation server
|
||||
* @return peer_cfg_t object
|
||||
*/
|
||||
peer_cfg_t *peer_cfg_create(char *name, u_int ikev_version, ike_cfg_t *ike_cfg,
|
||||
peer_cfg_t *peer_cfg_create(char *name, u_int ike_version, ike_cfg_t *ike_cfg,
|
||||
identification_t *my_id, identification_t *other_id,
|
||||
cert_policy_t cert_policy, unique_policy_t unique,
|
||||
u_int32_t keyingtries, u_int32_t rekey_time,
|
||||
|
@ -360,4 +359,4 @@ peer_cfg_t *peer_cfg_create(char *name, u_int ikev_version, ike_cfg_t *ike_cfg,
|
|||
bool mediation, peer_cfg_t *mediated_by,
|
||||
identification_t *peer_id);
|
||||
|
||||
#endif /* PEER_CFG_H_ @} */
|
||||
#endif /** PEER_CFG_H_ @}*/
|
||||
|
|
|
@ -243,4 +243,4 @@ proposal_t *proposal_create_from_string(protocol_id_t protocol, const char *algs
|
|||
int proposal_printf_hook(char *dst, size_t len, printf_hook_spec_t *spec,
|
||||
const void *const *args);
|
||||
|
||||
#endif /* PROPOSAL_H_ @} */
|
||||
#endif /** PROPOSAL_H_ @}*/
|
||||
|
|
|
@ -264,6 +264,8 @@ traffic_selector_t *traffic_selector_create_from_bytes(
|
|||
*
|
||||
* @param net subnet to use
|
||||
* @param netbits size of the subnet, as used in e.g. 192.168.0.0/24 notation
|
||||
* @param protocol protocol for this ts, such as TCP or UDP
|
||||
* @param port port number, host order
|
||||
* @return
|
||||
* - traffic_selector_t object
|
||||
* - NULL if address family of net not supported
|
||||
|
@ -301,4 +303,4 @@ traffic_selector_t *traffic_selector_create_dynamic(u_int8_t protocol,
|
|||
int traffic_selector_printf_hook(char *dst, size_t len, printf_hook_spec_t *spec,
|
||||
const void *const *args);
|
||||
|
||||
#endif /* TRAFFIC_SELECTOR_H_ @} */
|
||||
#endif /** TRAFFIC_SELECTOR_H_ @}*/
|
||||
|
|
|
@ -171,4 +171,4 @@ struct controller_t {
|
|||
*/
|
||||
controller_t *controller_create(void);
|
||||
|
||||
#endif /* CONTROLLER_H_ @} */
|
||||
#endif /** CONTROLLER_H_ @}*/
|
||||
|
|
|
@ -195,4 +195,4 @@ struct auth_info_t {
|
|||
*/
|
||||
auth_info_t *auth_info_create();
|
||||
|
||||
#endif /* AUTH_INFO_H_ @}*/
|
||||
#endif /** AUTH_INFO_H_ @}*/
|
||||
|
|
|
@ -204,4 +204,4 @@ struct credential_manager_t {
|
|||
*/
|
||||
credential_manager_t *credential_manager_create();
|
||||
|
||||
#endif /* CREDENTIAL_MANAGER_H_ @} */
|
||||
#endif /** CREDENTIAL_MANAGER_H_ @}*/
|
||||
|
|
|
@ -107,4 +107,4 @@ struct credential_set_t {
|
|||
void (*cache_cert)(credential_set_t *this, certificate_t *cert);
|
||||
};
|
||||
|
||||
#endif /* CREDENTIAL_SET_H_ @} */
|
||||
#endif /** CREDENTIAL_SET_H_ @}*/
|
||||
|
|
|
@ -52,4 +52,4 @@ struct auth_info_wrapper_t {
|
|||
*/
|
||||
auth_info_wrapper_t *auth_info_wrapper_create(auth_info_t *auth);
|
||||
|
||||
#endif /* AUTH_INFO_WRAPPER_H_ @}*/
|
||||
#endif /** AUTH_INFO_WRAPPER_H_ @}*/
|
||||
|
|
|
@ -70,4 +70,4 @@ struct cert_cache_t {
|
|||
*/
|
||||
cert_cache_t *cert_cache_create();
|
||||
|
||||
#endif /* CERT_CACHE_H_ @}*/
|
||||
#endif /** CERT_CACHE_H_ @}*/
|
||||
|
|
|
@ -52,4 +52,4 @@ struct ocsp_response_wrapper_t {
|
|||
*/
|
||||
ocsp_response_wrapper_t *ocsp_response_wrapper_create(ocsp_response_t *response);
|
||||
|
||||
#endif /* OCSP_RESPONSE_WRAPPER_H_ @}*/
|
||||
#endif /** OCSP_RESPONSE_WRAPPER_H_ @}*/
|
||||
|
|
|
@ -330,4 +330,4 @@ struct daemon_t {
|
|||
*/
|
||||
extern daemon_t *charon;
|
||||
|
||||
#endif /*DAEMON_H_ @} */
|
||||
#endif /** DAEMON_H_ @}*/
|
||||
|
|
|
@ -84,4 +84,4 @@ struct generator_t {
|
|||
*/
|
||||
generator_t *generator_create(void);
|
||||
|
||||
#endif /*GENERATOR_H_ @} */
|
||||
#endif /** GENERATOR_H_ @}*/
|
||||
|
|
|
@ -353,4 +353,4 @@ message_t * message_create_from_packet(packet_t *packet);
|
|||
*/
|
||||
message_t * message_create(void);
|
||||
|
||||
#endif /*MESSAGE_H_ @} */
|
||||
#endif /** MESSAGE_H_ @}*/
|
||||
|
|
|
@ -78,4 +78,4 @@ struct parser_t {
|
|||
*/
|
||||
parser_t *parser_create(chunk_t data);
|
||||
|
||||
#endif /*PARSER_H_ @} */
|
||||
#endif /** PARSER_H_ @}*/
|
||||
|
|
|
@ -101,4 +101,4 @@ struct auth_payload_t {
|
|||
*/
|
||||
auth_payload_t *auth_payload_create(void);
|
||||
|
||||
#endif /* AUTH_PAYLOAD_H_ @} */
|
||||
#endif /** AUTH_PAYLOAD_H_ @}*/
|
||||
|
|
|
@ -115,7 +115,6 @@ struct cert_payload_t {
|
|||
/**
|
||||
* Creates an empty certificate payload.
|
||||
*
|
||||
* @param cert certificate to embed
|
||||
* @return cert_payload_t object
|
||||
*/
|
||||
cert_payload_t *cert_payload_create(void);
|
||||
|
@ -137,4 +136,4 @@ cert_payload_t *cert_payload_create_from_cert(certificate_t *cert);
|
|||
*/
|
||||
cert_payload_t *cert_payload_create_from_hash_and_url(chunk_t hash, char *url);
|
||||
|
||||
#endif /* CERT_PAYLOAD_H_ @} */
|
||||
#endif /** CERT_PAYLOAD_H_ @}*/
|
||||
|
|
|
@ -89,4 +89,4 @@ certreq_payload_t *certreq_payload_create(void);
|
|||
*/
|
||||
certreq_payload_t *certreq_payload_create_type(certificate_type_t type);
|
||||
|
||||
#endif /* CERTREQ_PAYLOAD_H_ @} */
|
||||
#endif /** CERTREQ_PAYLOAD_H_ @}*/
|
||||
|
|
|
@ -127,4 +127,4 @@ struct configuration_attribute_t {
|
|||
*/
|
||||
configuration_attribute_t *configuration_attribute_create(void);
|
||||
|
||||
#endif /* CONFIGURATION_ATTRIBUTE_H_ @} */
|
||||
#endif /** CONFIGURATION_ATTRIBUTE_H_ @}*/
|
||||
|
|
|
@ -110,4 +110,4 @@ struct cp_payload_t {
|
|||
*/
|
||||
cp_payload_t *cp_payload_create(void);
|
||||
|
||||
#endif /*CP_PAYLOAD_H_ @} */
|
||||
#endif /** CP_PAYLOAD_H_ @}*/
|
||||
|
|
|
@ -83,4 +83,4 @@ struct delete_payload_t {
|
|||
*/
|
||||
delete_payload_t *delete_payload_create(protocol_id_t protocol_id);
|
||||
|
||||
#endif /* DELETE_PAYLOAD_H_ @} */
|
||||
#endif /** DELETE_PAYLOAD_H_ @}*/
|
||||
|
|
|
@ -128,4 +128,4 @@ eap_payload_t *eap_payload_create_code(eap_code_t code, u_int8_t identifier);
|
|||
*/
|
||||
eap_payload_t *eap_payload_create_nak(u_int8_t identifier);
|
||||
|
||||
#endif /* EAP_PAYLOAD_H_ @} */
|
||||
#endif /** EAP_PAYLOAD_H_ @}*/
|
||||
|
|
|
@ -527,4 +527,4 @@ struct encoding_rule_t {
|
|||
u_int32_t offset;
|
||||
};
|
||||
|
||||
#endif /*ENCODINGS_H_ @} */
|
||||
#endif /** ENCODINGS_H_ @}*/
|
||||
|
|
|
@ -172,4 +172,4 @@ struct encryption_payload_t {
|
|||
*/
|
||||
encryption_payload_t *encryption_payload_create(void);
|
||||
|
||||
#endif /*ENCRYPTION_PAYLOAD_H_ @} */
|
||||
#endif /** ENCRYPTION_PAYLOAD_H_ @}*/
|
||||
|
|
|
@ -172,4 +172,4 @@ endpoint_notify_t *endpoint_notify_create_from_host(me_endpoint_type_t type,
|
|||
*/
|
||||
endpoint_notify_t *endpoint_notify_create_from_payload(notify_payload_t *notify);
|
||||
|
||||
#endif /*ENDPOINT_NOTIFY_H_ @} */
|
||||
#endif /** ENDPOINT_NOTIFY_H_ @}*/
|
||||
|
|
|
@ -121,4 +121,4 @@ id_payload_t *id_payload_create(payload_type_t payload_type);
|
|||
id_payload_t *id_payload_create_from_identification(payload_type_t payload_type,
|
||||
identification_t *identification);
|
||||
|
||||
#endif /* ID_PAYLOAD_H_ @} */
|
||||
#endif /** ID_PAYLOAD_H_ @}*/
|
||||
|
|
|
@ -227,4 +227,4 @@ struct ike_header_t {
|
|||
*/
|
||||
ike_header_t *ike_header_create(void);
|
||||
|
||||
#endif /*IKE_HEADER_H_ @} */
|
||||
#endif /** IKE_HEADER_H_ @}*/
|
||||
|
|
|
@ -103,4 +103,4 @@ ke_payload_t *ke_payload_create(void);
|
|||
ke_payload_t *ke_payload_create_from_diffie_hellman(
|
||||
diffie_hellman_t *diffie_hellman);
|
||||
|
||||
#endif /* KE_PAYLOAD_H_ @} */
|
||||
#endif /** KE_PAYLOAD_H_ @}*/
|
||||
|
|
|
@ -77,4 +77,4 @@ struct nonce_payload_t {
|
|||
*/
|
||||
nonce_payload_t *nonce_payload_create(void);
|
||||
|
||||
#endif /*NONCE_PAYLOAD_H_ @} */
|
||||
#endif /** NONCE_PAYLOAD_H_ @}*/
|
||||
|
|
|
@ -215,4 +215,4 @@ notify_payload_t *notify_payload_create(void);
|
|||
notify_payload_t *notify_payload_create_from_protocol_and_type(
|
||||
protocol_id_t protocol_id, notify_type_t type);
|
||||
|
||||
#endif /*NOTIFY_PAYLOAD_H_ @} */
|
||||
#endif /** NOTIFY_PAYLOAD_H_ @}*/
|
||||
|
|
|
@ -271,4 +271,4 @@ struct payload_t {
|
|||
*/
|
||||
payload_t *payload_create(payload_type_t type);
|
||||
|
||||
#endif /*PAYLOAD_H_ @} */
|
||||
#endif /** PAYLOAD_H_ @}*/
|
||||
|
|
|
@ -172,4 +172,4 @@ proposal_substructure_t *proposal_substructure_create(void);
|
|||
proposal_substructure_t *proposal_substructure_create_from_proposal(
|
||||
proposal_t *proposal);
|
||||
|
||||
#endif /*PROPOSAL_SUBSTRUCTURE_H_ @} */
|
||||
#endif /** PROPOSAL_SUBSTRUCTURE_H_ @}*/
|
||||
|
|
|
@ -114,4 +114,4 @@ sa_payload_t *sa_payload_create_from_proposal_list(linked_list_t *proposals);
|
|||
*/
|
||||
sa_payload_t *sa_payload_create_from_proposal(proposal_t *proposal);
|
||||
|
||||
#endif /*SA_PAYLOAD_H_ @} */
|
||||
#endif /** SA_PAYLOAD_H_ @}*/
|
||||
|
|
|
@ -150,4 +150,4 @@ traffic_selector_substructure_t *traffic_selector_substructure_create(void);
|
|||
traffic_selector_substructure_t *traffic_selector_substructure_create_from_traffic_selector(
|
||||
traffic_selector_t *traffic_selector);
|
||||
|
||||
#endif /* /TRAFFIC_SELECTOR_SUBSTRUCTURE_H_ @} */
|
||||
#endif /** TRAFFIC_SELECTOR_SUBSTRUCTURE_H_ @}*/
|
||||
|
|
|
@ -131,4 +131,4 @@ transform_attribute_t *transform_attribute_create(void);
|
|||
*/
|
||||
transform_attribute_t *transform_attribute_create_key_length(u_int16_t key_length);
|
||||
|
||||
#endif /*TRANSFORM_ATTRIBUTE_H_ @} */
|
||||
#endif /** TRANSFORM_ATTRIBUTE_H_ @}*/
|
||||
|
|
|
@ -173,4 +173,4 @@ transform_substructure_t *transform_substructure_create_type(
|
|||
transform_type_t transform_type, u_int16_t transform_id,
|
||||
u_int16_t key_length);
|
||||
|
||||
#endif /*TRANSFORM_SUBSTRUCTURE_H_ @} */
|
||||
#endif /** TRANSFORM_SUBSTRUCTURE_H_ @}*/
|
||||
|
|
|
@ -126,4 +126,4 @@ ts_payload_t *ts_payload_create(bool is_initiator);
|
|||
ts_payload_t *ts_payload_create_from_traffic_selectors(bool is_initiator,
|
||||
linked_list_t *traffic_selectors);
|
||||
|
||||
#endif /* TS_PAYLOAD_H_ @} */
|
||||
#endif /** TS_PAYLOAD_H_ @}*/
|
||||
|
|
|
@ -78,4 +78,4 @@ struct unknown_payload_t {
|
|||
*/
|
||||
unknown_payload_t *unknown_payload_create(void);
|
||||
|
||||
#endif /* UNKNOWN_PAYLOAD_H_ @} */
|
||||
#endif /** UNKNOWN_PAYLOAD_H_ @}*/
|
||||
|
|
|
@ -86,4 +86,4 @@ struct vendor_id_payload_t {
|
|||
*/
|
||||
vendor_id_payload_t *vendor_id_payload_create(void);
|
||||
|
||||
#endif /* VENDOR_ID_PAYLOAD_H_ @} */
|
||||
#endif /** VENDOR_ID_PAYLOAD_H_ @}*/
|
||||
|
|
|
@ -379,4 +379,4 @@ struct kernel_interface_t {
|
|||
*/
|
||||
kernel_interface_t *kernel_interface_create(void);
|
||||
|
||||
#endif /* KERNEL_INTERFACE_H_ @} */
|
||||
#endif /** KERNEL_INTERFACE_H_ @}*/
|
||||
|
|
|
@ -258,4 +258,4 @@ struct kernel_ipsec_t {
|
|||
void (*destroy) (kernel_ipsec_t *this);
|
||||
};
|
||||
|
||||
#endif /* KERNEL_IPSEC_H_ @} */
|
||||
#endif /** KERNEL_IPSEC_H_ @}*/
|
||||
|
|
|
@ -142,4 +142,4 @@ struct kernel_net_t {
|
|||
void (*destroy) (kernel_net_t *this);
|
||||
};
|
||||
|
||||
#endif /* KERNEL_NET_H_ @} */
|
||||
#endif /** KERNEL_NET_H_ @}*/
|
||||
|
|
|
@ -114,4 +114,4 @@ struct packet_t {
|
|||
*/
|
||||
packet_t *packet_create(void);
|
||||
|
||||
#endif /*PACKET_H_ @} */
|
||||
#endif /** PACKET_H_ @}*/
|
||||
|
|
|
@ -69,4 +69,4 @@ struct receiver_t {
|
|||
*/
|
||||
receiver_t * receiver_create(void);
|
||||
|
||||
#endif /*RECEIVER_H_ @} */
|
||||
#endif /** RECEIVER_H_ @}*/
|
||||
|
|
|
@ -61,4 +61,4 @@ struct sender_t {
|
|||
*/
|
||||
sender_t * sender_create(void);
|
||||
|
||||
#endif /*SENDER_H_ @} */
|
||||
#endif /** SENDER_H_ @}*/
|
||||
|
|
|
@ -101,4 +101,4 @@ struct socket_t {
|
|||
*/
|
||||
socket_t *socket_create();
|
||||
|
||||
#endif /*SOCKET_H_ @} */
|
||||
#endif /** SOCKET_H_ @}*/
|
||||
|
|
|
@ -49,7 +49,7 @@ typedef struct eap_aka_t eap_aka_t;
|
|||
* a sequence number derived from time. It is initialized to the startup
|
||||
* time of the daemon. As long as the (UTC) time of the system is not
|
||||
* turned back while the daemon is not running, this method is secure.
|
||||
* To enable time based SEQs, #define SEQ_CHECK as 1. Default is to accept
|
||||
* To enable time based SEQs, define SEQ_CHECK as 1. Default is to accept
|
||||
* any SEQ numbers. This allows an attacker to do replay attacks. But since
|
||||
* the server has proven his identity via IKE, such an attack is only
|
||||
* possible between server and AAA (if any).
|
||||
|
@ -80,4 +80,4 @@ eap_aka_t *eap_aka_create_server(identification_t *server, identification_t *pee
|
|||
*/
|
||||
eap_aka_t *eap_aka_create_peer(identification_t *server, identification_t *peer);
|
||||
|
||||
#endif /* EAP_AKA_H_ @}*/
|
||||
#endif /** EAP_AKA_H_ @}*/
|
||||
|
|
|
@ -46,4 +46,4 @@ struct eap_aka_plugin_t {
|
|||
*/
|
||||
plugin_t *plugin_create();
|
||||
|
||||
#endif /* EAP_AKA_PLUGIN_H_ @}*/
|
||||
#endif /** EAP_AKA_PLUGIN_H_ @}*/
|
||||
|
|
|
@ -59,4 +59,4 @@ eap_gtc_t *eap_gtc_create_server(identification_t *server, identification_t *pee
|
|||
*/
|
||||
eap_gtc_t *eap_gtc_create_peer(identification_t *server, identification_t *peer);
|
||||
|
||||
#endif /* EAP_GTC_H_ @}*/
|
||||
#endif /** EAP_GTC_H_ @}*/
|
||||
|
|
|
@ -46,4 +46,4 @@ struct eap_gtc_plugin_t {
|
|||
*/
|
||||
plugin_t *plugin_create();
|
||||
|
||||
#endif /* EAP_GTC_PLUGIN_H_ @}*/
|
||||
#endif /** EAP_GTC_PLUGIN_H_ @}*/
|
||||
|
|
|
@ -58,4 +58,4 @@ eap_identity_t *eap_identity_create_server(identification_t *server,
|
|||
eap_identity_t *eap_identity_create_peer(identification_t *server,
|
||||
identification_t *peer);
|
||||
|
||||
#endif /* EAP_IDENTITY_H_ @}*/
|
||||
#endif /** EAP_IDENTITY_H_ @}*/
|
||||
|
|
|
@ -46,4 +46,4 @@ struct eap_identity_plugin_t {
|
|||
*/
|
||||
plugin_t *plugin_create();
|
||||
|
||||
#endif /* EAP_IDENTITY_PLUGIN_H_ @}*/
|
||||
#endif /** EAP_IDENTITY_PLUGIN_H_ @}*/
|
||||
|
|
|
@ -56,4 +56,4 @@ eap_md5_t *eap_md5_create_server(identification_t *server, identification_t *pee
|
|||
*/
|
||||
eap_md5_t *eap_md5_create_peer(identification_t *server, identification_t *peer);
|
||||
|
||||
#endif /* EAP_MD5_H_ @}*/
|
||||
#endif /** EAP_MD5_H_ @}*/
|
||||
|
|
|
@ -46,4 +46,4 @@ struct eap_md5_plugin_t {
|
|||
*/
|
||||
plugin_t *plugin_create();
|
||||
|
||||
#endif /* EAP_MD5_PLUGIN_H_ @}*/
|
||||
#endif /** EAP_MD5_PLUGIN_H_ @}*/
|
||||
|
|
|
@ -56,4 +56,4 @@ eap_mschapv2_t *eap_mschapv2_create_server(identification_t *server, identificat
|
|||
*/
|
||||
eap_mschapv2_t *eap_mschapv2_create_peer(identification_t *server, identification_t *peer);
|
||||
|
||||
#endif /* EAP_MSCHAPV2_H_ @}*/
|
||||
#endif /** EAP_MSCHAPV2_H_ @}*/
|
||||
|
|
|
@ -46,4 +46,4 @@ struct eap_mschapv2_plugin_t {
|
|||
*/
|
||||
plugin_t *plugin_create();
|
||||
|
||||
#endif /* EAP_MSCHAPV2_PLUGIN_H_ @}*/
|
||||
#endif /** EAP_MSCHAPV2_PLUGIN_H_ @}*/
|
||||
|
|
|
@ -47,4 +47,4 @@ struct eap_radius_t {
|
|||
*/
|
||||
eap_radius_t *eap_radius_create(identification_t *server, identification_t *peer);
|
||||
|
||||
#endif /* EAP_RADIUS_H_ @}*/
|
||||
#endif /** EAP_RADIUS_H_ @}*/
|
||||
|
|
|
@ -49,4 +49,4 @@ struct eap_radius_plugin_t {
|
|||
*/
|
||||
plugin_t *plugin_create();
|
||||
|
||||
#endif /* EAP_RADIUS_PLUGIN_H_ @}*/
|
||||
#endif /** EAP_RADIUS_PLUGIN_H_ @}*/
|
||||
|
|
|
@ -89,4 +89,4 @@ bool radius_client_init();
|
|||
*/
|
||||
void radius_client_cleanup();
|
||||
|
||||
#endif /* radius_client_H_ @}*/
|
||||
#endif /** RADIUS_CLIENT_H_ @}*/
|
||||
|
|
|
@ -263,7 +263,6 @@ struct radius_message_t {
|
|||
/**
|
||||
* Create an empty RADIUS request message (RMT_ACCESS_REQUEST).
|
||||
*
|
||||
* @param identifier RADIUS message identifier
|
||||
* @return radius_message_t object
|
||||
*/
|
||||
radius_message_t *radius_message_create_request();
|
||||
|
@ -276,4 +275,4 @@ radius_message_t *radius_message_create_request();
|
|||
*/
|
||||
radius_message_t *radius_message_parse_response(chunk_t data);
|
||||
|
||||
#endif /* RADIUS_MESSAGE_H_ @}*/
|
||||
#endif /** RADIUS_MESSAGE_H_ @}*/
|
||||
|
|
|
@ -58,4 +58,4 @@ eap_sim_t *eap_sim_create_server(identification_t *server, identification_t *pee
|
|||
*/
|
||||
eap_sim_t *eap_sim_create_peer(identification_t *server, identification_t *peer);
|
||||
|
||||
#endif /* EAP_SIM_H_ @}*/
|
||||
#endif /** EAP_SIM_H_ @}*/
|
||||
|
|
|
@ -46,4 +46,4 @@ struct eap_sim_plugin_t {
|
|||
*/
|
||||
plugin_t *plugin_create();
|
||||
|
||||
#endif /* EAP_SIM_PLUGIN_H_ @}*/
|
||||
#endif /** EAP_SIM_PLUGIN_H_ @}*/
|
||||
|
|
|
@ -52,4 +52,4 @@ struct eap_sim_file_card_t {
|
|||
*/
|
||||
eap_sim_file_card_t *eap_sim_file_card_create(eap_sim_file_triplets_t *triplets);
|
||||
|
||||
#endif /* EAP_SIM_FILE_CARD_ @}*/
|
||||
#endif /** EAP_SIM_FILE_CARD_ @}*/
|
||||
|
|
|
@ -46,4 +46,4 @@ struct eap_sim_file_plugin_t {
|
|||
*/
|
||||
plugin_t *plugin_create();
|
||||
|
||||
#endif /* EAP_SIM_FILE_PLUGIN_H_ @}*/
|
||||
#endif /** EAP_SIM_FILE_PLUGIN_H_ @}*/
|
||||
|
|
|
@ -51,4 +51,4 @@ struct eap_sim_file_provider_t {
|
|||
eap_sim_file_provider_t *eap_sim_file_provider_create(
|
||||
eap_sim_file_triplets_t *triplets);
|
||||
|
||||
#endif /* EAP_SIM_FILE_PROVIDER_ @}*/
|
||||
#endif /** EAP_SIM_FILE_PROVIDER_ @}*/
|
||||
|
|
|
@ -71,4 +71,4 @@ struct eap_sim_file_triplets_t {
|
|||
*/
|
||||
eap_sim_file_triplets_t *eap_sim_file_triplets_create(char *file);
|
||||
|
||||
#endif /* EAP_SIM_FILE_TRIPLETS_ @}*/
|
||||
#endif /** EAP_SIM_FILE_TRIPLETS_ @}*/
|
||||
|
|
|
@ -45,4 +45,4 @@ struct kernel_klips_ipsec_t {
|
|||
*/
|
||||
kernel_klips_ipsec_t *kernel_klips_ipsec_create();
|
||||
|
||||
#endif /* KERNEL_KLIPS_IPSEC_H_ @} */
|
||||
#endif /** KERNEL_KLIPS_IPSEC_H_ @}*/
|
||||
|
|
|
@ -46,4 +46,4 @@ struct kernel_klips_plugin_t {
|
|||
*/
|
||||
plugin_t *plugin_create();
|
||||
|
||||
#endif /* KERNEL_KLIPS_PLUGIN_H_ @} */
|
||||
#endif /** KERNEL_KLIPS_PLUGIN_H_ @}*/
|
||||
|
|
|
@ -45,4 +45,4 @@ struct kernel_netlink_ipsec_t {
|
|||
*/
|
||||
kernel_netlink_ipsec_t *kernel_netlink_ipsec_create();
|
||||
|
||||
#endif /* KERNEL_NETLINK_IPSEC_H_ @} */
|
||||
#endif /** KERNEL_NETLINK_IPSEC_H_ @}*/
|
||||
|
|
|
@ -45,4 +45,4 @@ struct kernel_netlink_net_t {
|
|||
*/
|
||||
kernel_netlink_net_t *kernel_netlink_net_create();
|
||||
|
||||
#endif /* KERNEL_NETLINK_NET_H_ @} */
|
||||
#endif /** KERNEL_NETLINK_NET_H_ @}*/
|
||||
|
|
|
@ -46,4 +46,4 @@ struct kernel_netlink_plugin_t {
|
|||
*/
|
||||
plugin_t *plugin_create();
|
||||
|
||||
#endif /* KERNEL_NETLINK_PLUGIN_H_ @} */
|
||||
#endif /** KERNEL_NETLINK_PLUGIN_H_ @}*/
|
||||
|
|
|
@ -45,4 +45,4 @@ struct kernel_pfkey_ipsec_t {
|
|||
*/
|
||||
kernel_pfkey_ipsec_t *kernel_pfkey_ipsec_create();
|
||||
|
||||
#endif /* KERNEL_PFKEY_IPSEC_H_ @} */
|
||||
#endif /** KERNEL_PFKEY_IPSEC_H_ @}*/
|
||||
|
|
|
@ -46,4 +46,4 @@ struct kernel_pfkey_plugin_t {
|
|||
*/
|
||||
plugin_t *plugin_create();
|
||||
|
||||
#endif /* KERNEL_PFKEY_PLUGIN_H_ @} */
|
||||
#endif /** KERNEL_PFKEY_PLUGIN_H_ @}*/
|
||||
|
|
|
@ -50,4 +50,4 @@ struct load_tester_config_t {
|
|||
*/
|
||||
load_tester_config_t *load_tester_config_create();
|
||||
|
||||
#endif /* LOAD_TESTER_CONFIG_H_ @}*/
|
||||
#endif /** LOAD_TESTER_CONFIG_H_ @}*/
|
||||
|
|
|
@ -50,4 +50,4 @@ struct load_tester_creds_t {
|
|||
*/
|
||||
load_tester_creds_t *load_tester_creds_create();
|
||||
|
||||
#endif /* LOAD_TESTER_CREDS_H_ @}*/
|
||||
#endif /** LOAD_TESTER_CREDS_H_ @}*/
|
||||
|
|
|
@ -47,4 +47,4 @@ struct load_tester_diffie_hellman_t {
|
|||
load_tester_diffie_hellman_t *load_tester_diffie_hellman_create(
|
||||
diffie_hellman_group_t group);
|
||||
|
||||
#endif /* LOAD_TESTER_DIFFIE_HELLMAN_ @}*/
|
||||
#endif /** LOAD_TESTER_DIFFIE_HELLMAN_ @}*/
|
||||
|
|
|
@ -45,4 +45,4 @@ struct load_tester_ipsec_t {
|
|||
*/
|
||||
load_tester_ipsec_t *load_tester_ipsec_create();
|
||||
|
||||
#endif /* LOAD_TESTER_IPSEC_H_ @} */
|
||||
#endif /** LOAD_TESTER_IPSEC_H_ @}*/
|
||||
|
|
|
@ -51,4 +51,4 @@ struct load_tester_listener_t {
|
|||
*/
|
||||
load_tester_listener_t *load_tester_listener_create(u_int shutdown_on);
|
||||
|
||||
#endif /* LOAD_TESTER_LISTENER_H_ @}*/
|
||||
#endif /** LOAD_TESTER_LISTENER_H_ @}*/
|
||||
|
|
|
@ -48,4 +48,4 @@ struct load_tester_plugin_t {
|
|||
*/
|
||||
plugin_t *plugin_create();
|
||||
|
||||
#endif /* LOAD_TESTER_PLUGIN_H_ @}*/
|
||||
#endif /** LOAD_TESTER_PLUGIN_H_ @}*/
|
||||
|
|
|
@ -52,4 +52,4 @@ struct medcli_config_t {
|
|||
*/
|
||||
medcli_config_t *medcli_config_create(database_t *db);
|
||||
|
||||
#endif /* MEDCLI_CONFIG_H_ @}*/
|
||||
#endif /** MEDCLI_CONFIG_H_ @}*/
|
||||
|
|
|
@ -52,4 +52,4 @@ struct medcli_creds_t {
|
|||
*/
|
||||
medcli_creds_t *medcli_creds_create(database_t *database);
|
||||
|
||||
#endif /* MEDCLI_CREDS_H_ @}*/
|
||||
#endif /** MEDCLI_CREDS_H_ @}*/
|
||||
|
|
|
@ -52,4 +52,4 @@ struct medcli_listener_t {
|
|||
*/
|
||||
medcli_listener_t *medcli_listener_create(database_t *database);
|
||||
|
||||
#endif /* MEDCLI_LISTENER_H_ @}*/
|
||||
#endif /** MEDCLI_LISTENER_H_ @}*/
|
||||
|
|
|
@ -46,4 +46,4 @@ struct medcli_plugin_t {
|
|||
*/
|
||||
plugin_t *plugin_create();
|
||||
|
||||
#endif /* MEDCLI_PLUGIN_H_ @}*/
|
||||
#endif /** MEDCLI_PLUGIN_H_ @}*/
|
||||
|
|
|
@ -52,4 +52,4 @@ struct medsrv_config_t {
|
|||
*/
|
||||
medsrv_config_t *medsrv_config_create(database_t *db);
|
||||
|
||||
#endif /* MEDSRV_CONFIG_H_ @}*/
|
||||
#endif /** MEDSRV_CONFIG_H_ @}*/
|
||||
|
|
|
@ -52,4 +52,4 @@ struct medsrv_creds_t {
|
|||
*/
|
||||
medsrv_creds_t *medsrv_creds_create(database_t *database);
|
||||
|
||||
#endif /* MEDSRV_CREDS_H_ @}*/
|
||||
#endif /** MEDSRV_CREDS_H_ @}*/
|
||||
|
|
|
@ -46,4 +46,4 @@ struct medsrv_plugin_t {
|
|||
*/
|
||||
plugin_t *plugin_create();
|
||||
|
||||
#endif /* MEDSRV_PLUGIN_H_ @}*/
|
||||
#endif /** MEDSRV_PLUGIN_H_ @}*/
|
||||
|
|
|
@ -76,4 +76,4 @@ struct nm_creds_t {
|
|||
*/
|
||||
nm_creds_t *nm_creds_create();
|
||||
|
||||
#endif /* NM_CREDS_H_ @}*/
|
||||
#endif /** NM_CREDS_H_ @}*/
|
||||
|
|
|
@ -46,4 +46,4 @@ struct nm_plugin_t {
|
|||
*/
|
||||
plugin_t *plugin_create();
|
||||
|
||||
#endif /* NM_PLUGIN_H_ @}*/
|
||||
#endif /** NM_PLUGIN_H_ @}*/
|
||||
|
|
|
@ -52,4 +52,4 @@ GType nm_strongswan_plugin_get_type(void);
|
|||
|
||||
NMStrongswanPlugin *nm_strongswan_plugin_new(nm_creds_t *creds);
|
||||
|
||||
#endif /* NM_SERVICE_H_ */
|
||||
#endif /** NM_SERVICE_H_ @}*/
|
||||
|
|
|
@ -49,4 +49,4 @@ struct smp_t {
|
|||
*/
|
||||
plugin_t *plugin_create();
|
||||
|
||||
#endif /* XML_H_ @}*/
|
||||
#endif /** XML_H_ @}*/
|
||||
|
|
|
@ -48,4 +48,4 @@ struct sql_attribute_t {
|
|||
*/
|
||||
sql_attribute_t *sql_attribute_create(database_t *db);
|
||||
|
||||
#endif /* SQL_ATTRIBUTE_H_ @}*/
|
||||
#endif /** SQL_ATTRIBUTE_H_ @}*/
|
||||
|
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue