diff options
author | David Stainton <dstainton415@gmail.com> | 2014-09-02 17:59:31 +0000 |
---|---|---|
committer | David Stainton <dstainton415@gmail.com> | 2014-09-02 18:08:57 +0000 |
commit | 6e4efb559d9921e44c40b99e69619d4fa8b36668 (patch) | |
tree | fdc9ed69c8002eb40711e56a4e4c2145b4032940 /src/or/rendservice.c | |
parent | 7caf7e9f2a26dfb425dab761b4b41a38d96db0af (diff) | |
download | tor-6e4efb559d9921e44c40b99e69619d4fa8b36668.tar.gz tor-6e4efb559d9921e44c40b99e69619d4fa8b36668.zip |
Fix white space
Diffstat (limited to 'src/or/rendservice.c')
-rw-r--r-- | src/or/rendservice.c | 22 |
1 files changed, 14 insertions, 8 deletions
diff --git a/src/or/rendservice.c b/src/or/rendservice.c index a1d572e1ac..75080cbe94 100644 --- a/src/or/rendservice.c +++ b/src/or/rendservice.c @@ -95,7 +95,8 @@ typedef struct rend_service_port_config_t { typedef struct rend_service_t { /* Fields specified in config file */ char *directory; /**< where in the filesystem it stores it */ - int dir_group_readable; /**< if 1, allow group read permissions on directory */ + int dir_group_readable; /**< if 1, allow group read + permissions on directory */ smartlist_t *ports; /**< List of rend_service_port_config_t */ rend_auth_type_t auth_type; /**< Client authorization type or 0 if no client * authorization is performed. */ @@ -395,15 +396,20 @@ rend_config_services(const or_options_t *options, int validate_only) return -1; } smartlist_add(service->ports, portcfg); - } else if (!strcasecmp(line->key, "HiddenServiceDirGroupReadable")) { - service->dir_group_readable = (int)tor_parse_long(line->value, 10, 0, 1, &ok, NULL); + } else if (!strcasecmp(line->key, + "HiddenServiceDirGroupReadable")) { + service->dir_group_readable = (int)tor_parse_long(line->value, + 10, 0, 1, &ok, NULL); if (!ok) { - log_warn(LD_CONFIG, "HiddenServiceDirGroupReadable should be 0 or 1, not %s", + log_warn(LD_CONFIG, + "HiddenServiceDirGroupReadable should be 0 or 1, not %s", line->value); rend_service_free(service); return -1; } - log_info(LD_CONFIG, "HiddenServiceDirGroupReadable=%d for %s", service->dir_group_readable, service->directory); + log_info(LD_CONFIG, + "HiddenServiceDirGroupReadable=%d for %s", + service->dir_group_readable, service->directory); } else if (!strcasecmp(line->key, "HiddenServiceAuthorizeClient")) { /* Parse auth type and comma-separated list of client names and add a * rend_authorized_client_t for each client to the service's list @@ -761,9 +767,9 @@ rend_service_load_keys(rend_service_t *s) #ifndef _WIN32 if (s->dir_group_readable) { /* Also verify hostname file created with group read. */ - if (chmod(fname, 0640)) { - log_warn(LD_FS,"Unable to make hidden hostname file %s group-readable.", fname); - } + if (chmod(fname, 0640)) + log_warn(LD_FS,"Unable to make hidden hostname file %s group-readable.", + fname); } #endif |