aboutsummaryrefslogtreecommitdiff
path: root/src/feature
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2020-09-17 08:19:53 -0400
committerNick Mathewson <nickm@torproject.org>2020-09-17 08:19:53 -0400
commit22643272d24fdcd106887b792f2e36dc604029c0 (patch)
tree1ca93a075253982e4a628fa7f5b880890e0ae9b8 /src/feature
parentc92e19268bcff04e4726e4f243f7125de66d2c2d (diff)
downloadtor-22643272d24fdcd106887b792f2e36dc604029c0.tar.gz
tor-22643272d24fdcd106887b792f2e36dc604029c0.zip
Fix wide lines
Diffstat (limited to 'src/feature')
-rw-r--r--src/feature/hs/hs_service.c3
-rw-r--r--src/feature/nodelist/torcert.c2
-rw-r--r--src/feature/relay/routerkeys.c6
3 files changed, 6 insertions, 5 deletions
diff --git a/src/feature/hs/hs_service.c b/src/feature/hs/hs_service.c
index 71f38dfb69..f2a8898b2c 100644
--- a/src/feature/hs/hs_service.c
+++ b/src/feature/hs/hs_service.c
@@ -1717,7 +1717,8 @@ build_desc_signing_key_cert(hs_service_descriptor_t *desc, time_t now)
CERT_FLAG_INCLUDE_SIGNING_KEY);
/* If the cert creation fails, the descriptor encoding will fail and thus
* ultimately won't be uploaded. We'll get a stack trace to help us learn
- * where the call came from and the tor_cert_create_ed25519() will log the error. */
+ * where the call came from and the tor_cert_create_ed25519() will log the
+ * error. */
tor_assert_nonfatal(plaintext->signing_key_cert);
}
diff --git a/src/feature/nodelist/torcert.c b/src/feature/nodelist/torcert.c
index 3f1051b818..603b8bf086 100644
--- a/src/feature/nodelist/torcert.c
+++ b/src/feature/nodelist/torcert.c
@@ -37,7 +37,7 @@
#include "core/or/or_handshake_certs_st.h"
-/** Helper for tor_cert_create_ed25519(): signs any 32 bytes, not just an ed25519
+/** Helper for tor_cert_create_*(): signs any 32 bytes, not just an ed25519
* key.
*/
static tor_cert_t *
diff --git a/src/feature/relay/routerkeys.c b/src/feature/relay/routerkeys.c
index ca13d0b9a1..c7adf5b977 100644
--- a/src/feature/relay/routerkeys.c
+++ b/src/feature/relay/routerkeys.c
@@ -466,7 +466,7 @@ init_mock_ed_keys(const crypto_pk_t *rsa_identity_key)
MAKEKEY(master_signing_key);
MAKEKEY(current_auth_key);
#define MAKECERT(cert, signing, signed_, type, flags) \
- cert = tor_cert_create_ed25519(signing, \
+ cert = tor_cert_create_ed25519(signing, \
type, \
&signed_->pubkey, \
time(NULL), 86400, \
@@ -699,8 +699,8 @@ make_ntor_onion_key_crosscert(const curve25519_keypair_t *onion_key,
onion_key) < 0)
goto end;
- cert = tor_cert_create_ed25519(&ed_onion_key, CERT_TYPE_ONION_ID, master_id_key,
- now, lifetime, 0);
+ cert = tor_cert_create_ed25519(&ed_onion_key, CERT_TYPE_ONION_ID,
+ master_id_key, now, lifetime, 0);
end:
memwipe(&ed_onion_key, 0, sizeof(ed_onion_key));