summaryrefslogtreecommitdiff
path: root/toxencryptsave
diff options
context:
space:
mode:
authoriphydf <iphydf@users.noreply.github.com>2016-12-14 09:17:19 +0000
committeriphydf <iphydf@users.noreply.github.com>2016-12-14 11:35:43 +0000
commitbbdd7982563b7d8f89fcd3b7297b5fbdf21fc57f (patch)
treeed7c949449b8ca3cae0b74299a328872af0092ec /toxencryptsave
parent22fca79ad76147a07fcb3950a0a6ec1578ecc492 (diff)
Fix unresolved reference in toxencryptsave API.
Also, make sure this won't happen again by checking for it in format-source.
Diffstat (limited to 'toxencryptsave')
-rw-r--r--toxencryptsave/toxencryptsave.api.h2
-rw-r--r--toxencryptsave/toxencryptsave.h2
2 files changed, 2 insertions, 2 deletions
diff --git a/toxencryptsave/toxencryptsave.api.h b/toxencryptsave/toxencryptsave.api.h
index 20b8da06..93456235 100644
--- a/toxencryptsave/toxencryptsave.api.h
+++ b/toxencryptsave/toxencryptsave.api.h
@@ -49,7 +49,7 @@ extern "C" {
49 * prefer the advanced API and reuse pass-key objects. 49 * prefer the advanced API and reuse pass-key objects.
50 * 50 *
51 * To use the second part, first derive an encryption key from a password with 51 * To use the second part, first derive an encryption key from a password with
52 * ${pass_Key.derive}, then use the derived key to encrypt the data. 52 * ${tox.pass_Key.derive}, then use the derived key to encrypt the data.
53 * 53 *
54 * The encrypted data is prepended with a magic number, to aid validity 54 * The encrypted data is prepended with a magic number, to aid validity
55 * checking (no guarantees are made of course). Any data to be decrypted must 55 * checking (no guarantees are made of course). Any data to be decrypted must
diff --git a/toxencryptsave/toxencryptsave.h b/toxencryptsave/toxencryptsave.h
index 584efaed..de53273e 100644
--- a/toxencryptsave/toxencryptsave.h
+++ b/toxencryptsave/toxencryptsave.h
@@ -48,7 +48,7 @@ extern "C" {
48 * prefer the advanced API and reuse pass-key objects. 48 * prefer the advanced API and reuse pass-key objects.
49 * 49 *
50 * To use the second part, first derive an encryption key from a password with 50 * To use the second part, first derive an encryption key from a password with
51 * <unresolved>, then use the derived key to encrypt the data. 51 * tox_pass_key_derive, then use the derived key to encrypt the data.
52 * 52 *
53 * The encrypted data is prepended with a magic number, to aid validity 53 * The encrypted data is prepended with a magic number, to aid validity
54 * checking (no guarantees are made of course). Any data to be decrypted must 54 * checking (no guarantees are made of course). Any data to be decrypted must