summaryrefslogtreecommitdiffstats
path: root/src/lockdown.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/lockdown.c')
-rw-r--r--src/lockdown.c16
1 files changed, 9 insertions, 7 deletions
diff --git a/src/lockdown.c b/src/lockdown.c
index 68a74b5..e899baa 100644
--- a/src/lockdown.c
+++ b/src/lockdown.c
@@ -1060,8 +1060,9 @@ lockdownd_error_t lockdownd_enter_recovery(lockdownd_client_t client)
1060 * 1060 *
1061 * @param client The lockdown client 1061 * @param client The lockdown client
1062 * 1062 *
1063 * @return LOCKDOWN_E_SUCCESS on success, NP_E_INVALID_ARG when client is NULL, 1063 * @return LOCKDOWN_E_SUCCESS on success, LOCKDOWN_E_INVALID_ARG when client
1064 * LOCKDOWN_E_PLIST_ERROR if the device did not acknowledge the request 1064 * is NULL, LOCKDOWN_E_PLIST_ERROR if the device did not acknowledge the
1065 * request
1065 */ 1066 */
1066lockdownd_error_t lockdownd_goodbye(lockdownd_client_t client) 1067lockdownd_error_t lockdownd_goodbye(lockdownd_client_t client)
1067{ 1068{
@@ -1104,9 +1105,10 @@ lockdownd_error_t lockdownd_goodbye(lockdownd_client_t client)
1104 * @param ohost_cert Holds the generated host certificate. 1105 * @param ohost_cert Holds the generated host certificate.
1105 * @param oroot_cert Holds the generated root certificate. 1106 * @param oroot_cert Holds the generated root certificate.
1106 * 1107 *
1107 * @return LOCKDOWN_E_SUCCESS on success, NP_E_INVALID_ARG when a parameter is NULL, 1108 * @return LOCKDOWN_E_SUCCESS on success, LOCKDOWN_E_INVALID_ARG when a
1108 * LOCKDOWN_E_INVALID_CONF if the internal configuration system failed, 1109 * parameter is NULL, LOCKDOWN_E_INVALID_CONF if the internal configuration
1109 * LOCKDOWN_E_SSL_ERROR if the certificates could not be generated 1110 * system failed, LOCKDOWN_E_SSL_ERROR if the certificates could not be
1111 * generated
1110 */ 1112 */
1111lockdownd_error_t lockdownd_gen_pair_cert(key_data_t public_key, key_data_t * odevice_cert, 1113lockdownd_error_t lockdownd_gen_pair_cert(key_data_t public_key, key_data_t * odevice_cert,
1112 key_data_t * ohost_cert, key_data_t * oroot_cert) 1114 key_data_t * ohost_cert, key_data_t * oroot_cert)
@@ -1396,8 +1398,8 @@ lockdownd_error_t lockdownd_gen_pair_cert(key_data_t public_key, key_data_t * od
1396 * @param session_id The new session_id of the created session 1398 * @param session_id The new session_id of the created session
1397 * @param ssl_enabled Whether SSL communication is used in the session 1399 * @param ssl_enabled Whether SSL communication is used in the session
1398 * 1400 *
1399 * @return LOCKDOWN_E_SUCCESS on success, NP_E_INVALID_ARG when a client or 1401 * @return LOCKDOWN_E_SUCCESS on success, LOCKDOWN_E_INVALID_ARG when a client
1400 * host_id is NULL, LOCKDOWN_E_PLIST_ERROR if the response plist had errors, 1402 * or host_id is NULL, LOCKDOWN_E_PLIST_ERROR if the response plist had errors,
1401 * LOCKDOWN_E_INVALID_HOST_ID if the device does not know the supplied HostID, 1403 * LOCKDOWN_E_INVALID_HOST_ID if the device does not know the supplied HostID,
1402 * LOCKDOWN_E_SSL_ERROR if enabling SSL communication failed 1404 * LOCKDOWN_E_SSL_ERROR if enabling SSL communication failed
1403 */ 1405 */