aboutsummaryrefslogtreecommitdiff
path: root/src/feature/relay
diff options
context:
space:
mode:
authorDaniel Pinto <danielpinto52@gmail.com>2020-08-03 20:08:17 +0100
committerDaniel Pinto <danielpinto52@gmail.com>2020-08-03 20:08:17 +0100
commitccdd0d801ae952d4c8219eea9acdd3acfd438924 (patch)
treea62aab1be8e18804a7e9e5d7aea8a950567d1a0e /src/feature/relay
parent1474ab33956eefd9b75ef9a3e238ec7f855b8c7e (diff)
downloadtor-ccdd0d801ae952d4c8219eea9acdd3acfd438924.tar.gz
tor-ccdd0d801ae952d4c8219eea9acdd3acfd438924.zip
Minor style improvements. #30045
Diffstat (limited to 'src/feature/relay')
-rw-r--r--src/feature/relay/routerkeys.c7
1 files changed, 3 insertions, 4 deletions
diff --git a/src/feature/relay/routerkeys.c b/src/feature/relay/routerkeys.c
index f0fd101efd..744a73d936 100644
--- a/src/feature/relay/routerkeys.c
+++ b/src/feature/relay/routerkeys.c
@@ -520,14 +520,13 @@ print_cert_expiration(const char *expiration,
/**
* Log when a certificate, <b>cert</b>, with some <b>description</b> and
* stored in a file named <b>fname</b>, is going to expire. Formats the expire
- * time according to <b>time_format</b>. Valid time formats are in the
- * key_expiration_format enum, in or_options_t.
+ * time according to <b>time_format</b>.
*/
static void
log_ed_cert_expiration(const tor_cert_t *cert,
const char *description,
const char *fname,
- int time_format) {
+ key_expiration_format_t time_format) {
if (BUG(!cert)) { /* If the specified key hasn't been loaded */
log_warn(LD_OR, "No %s key loaded; can't get certificate expiration.",
description);
@@ -582,7 +581,7 @@ log_master_signing_key_cert_expiration(const or_options_t *options)
/* If we do have a signing key, log the expiration time. */
if (signing_key) {
- int time_format = options->key_expiration_format;
+ key_expiration_format_t time_format = options->key_expiration_format;
log_ed_cert_expiration(signing_key, "signing", fn, time_format);
} else {
log_warn(LD_OR, "Could not load signing key certificate from %s, so " \