diff options
author | Nick Mathewson <nickm@torproject.org> | 2005-09-30 01:09:52 +0000 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2005-09-30 01:09:52 +0000 |
commit | 92451f74a8fd50bbd2f360526263a4913d145677 (patch) | |
tree | 0fd53e000abac269d11ca5bb7c13ae7a14d997bc /src/common/tortls.c | |
parent | 6ce1add8da1de0c814b4f10f99e7c1f89736ed90 (diff) | |
download | tor-92451f74a8fd50bbd2f360526263a4913d145677.tar.gz tor-92451f74a8fd50bbd2f360526263a4913d145677.zip |
Reformat inconsistent function declarations.
svn:r5160
Diffstat (limited to 'src/common/tortls.c')
-rw-r--r-- | src/common/tortls.c | 17 |
1 files changed, 11 insertions, 6 deletions
diff --git a/src/common/tortls.c b/src/common/tortls.c index 37ab9d1cc6..d2b0d7080d 100644 --- a/src/common/tortls.c +++ b/src/common/tortls.c @@ -174,8 +174,9 @@ tor_tls_free_all(void) * it: We always accept peer certs and complete the handshake. We * don't validate them until later. */ -static int always_accept_verify_cb(int preverify_ok, - X509_STORE_CTX *x509_ctx) +static int +always_accept_verify_cb(int preverify_ok, + X509_STORE_CTX *x509_ctx) { /* avoid "unused parameter" warning. */ preverify_ok = 0; @@ -672,7 +673,8 @@ tor_tls_get_peer_cert_nickname(tor_tls *tls, char *buf, size_t buflen) return r; } -static void log_cert_lifetime(X509 *cert, const char *problem) +static void +log_cert_lifetime(X509 *cert, const char *problem) { BIO *bio = NULL; BUF_MEM *buf; @@ -842,13 +844,15 @@ tor_tls_get_pending_bytes(tor_tls *tls) } /** Return the number of bytes read across the underlying socket. */ -unsigned long tor_tls_get_n_bytes_read(tor_tls *tls) +unsigned long +tor_tls_get_n_bytes_read(tor_tls *tls) { tor_assert(tls); return BIO_number_read(SSL_get_rbio(tls->ssl)); } /** Return the number of bytes written across the underlying socket. */ -unsigned long tor_tls_get_n_bytes_written(tor_tls *tls) +unsigned long +tor_tls_get_n_bytes_written(tor_tls *tls) { tor_assert(tls); return BIO_number_written(SSL_get_wbio(tls->ssl)); @@ -856,7 +860,8 @@ unsigned long tor_tls_get_n_bytes_written(tor_tls *tls) /** Implement check_no_tls_errors: If there are any pending OpenSSL * errors, log an error message and assert(0). */ -void _check_no_tls_errors(const char *fname, int line) +void +_check_no_tls_errors(const char *fname, int line) { if (ERR_peek_error() == 0) return; |