summaryrefslogtreecommitdiff
path: root/src/common/tortls.c
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2005-09-30 01:09:52 +0000
committerNick Mathewson <nickm@torproject.org>2005-09-30 01:09:52 +0000
commit92451f74a8fd50bbd2f360526263a4913d145677 (patch)
tree0fd53e000abac269d11ca5bb7c13ae7a14d997bc /src/common/tortls.c
parent6ce1add8da1de0c814b4f10f99e7c1f89736ed90 (diff)
downloadtor-92451f74a8fd50bbd2f360526263a4913d145677.tar.gz
tor-92451f74a8fd50bbd2f360526263a4913d145677.zip
Reformat inconsistent function declarations.
svn:r5160
Diffstat (limited to 'src/common/tortls.c')
-rw-r--r--src/common/tortls.c17
1 files changed, 11 insertions, 6 deletions
diff --git a/src/common/tortls.c b/src/common/tortls.c
index 37ab9d1cc6..d2b0d7080d 100644
--- a/src/common/tortls.c
+++ b/src/common/tortls.c
@@ -174,8 +174,9 @@ tor_tls_free_all(void)
* it: We always accept peer certs and complete the handshake. We
* don't validate them until later.
*/
-static int always_accept_verify_cb(int preverify_ok,
- X509_STORE_CTX *x509_ctx)
+static int
+always_accept_verify_cb(int preverify_ok,
+ X509_STORE_CTX *x509_ctx)
{
/* avoid "unused parameter" warning. */
preverify_ok = 0;
@@ -672,7 +673,8 @@ tor_tls_get_peer_cert_nickname(tor_tls *tls, char *buf, size_t buflen)
return r;
}
-static void log_cert_lifetime(X509 *cert, const char *problem)
+static void
+log_cert_lifetime(X509 *cert, const char *problem)
{
BIO *bio = NULL;
BUF_MEM *buf;
@@ -842,13 +844,15 @@ tor_tls_get_pending_bytes(tor_tls *tls)
}
/** Return the number of bytes read across the underlying socket. */
-unsigned long tor_tls_get_n_bytes_read(tor_tls *tls)
+unsigned long
+tor_tls_get_n_bytes_read(tor_tls *tls)
{
tor_assert(tls);
return BIO_number_read(SSL_get_rbio(tls->ssl));
}
/** Return the number of bytes written across the underlying socket. */
-unsigned long tor_tls_get_n_bytes_written(tor_tls *tls)
+unsigned long
+tor_tls_get_n_bytes_written(tor_tls *tls)
{
tor_assert(tls);
return BIO_number_written(SSL_get_wbio(tls->ssl));
@@ -856,7 +860,8 @@ unsigned long tor_tls_get_n_bytes_written(tor_tls *tls)
/** Implement check_no_tls_errors: If there are any pending OpenSSL
* errors, log an error message and assert(0). */
-void _check_no_tls_errors(const char *fname, int line)
+void
+_check_no_tls_errors(const char *fname, int line)
{
if (ERR_peek_error() == 0)
return;