diff options
author | Nick Mathewson <nickm@torproject.org> | 2016-11-03 08:55:54 -0400 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2016-11-03 08:55:54 -0400 |
commit | 32854aef28f5ff94fc60647c9881576141574aba (patch) | |
tree | 825a30def480a4cadf9e7e1aefb0275363b566cc /src/or | |
parent | d9ca4e20bd51915317c7bda38ef56c67499f6f5e (diff) | |
download | tor-32854aef28f5ff94fc60647c9881576141574aba.tar.gz tor-32854aef28f5ff94fc60647c9881576141574aba.zip |
whitespace fixes
Diffstat (limited to 'src/or')
-rw-r--r-- | src/or/channeltls.c | 10 | ||||
-rw-r--r-- | src/or/circuitbuild.c | 1 | ||||
-rw-r--r-- | src/or/connection_or.c | 4 | ||||
-rw-r--r-- | src/or/or.h | 4 | ||||
-rw-r--r-- | src/or/routerkeys.c | 3 | ||||
-rw-r--r-- | src/or/torcert.c | 3 |
6 files changed, 10 insertions, 15 deletions
diff --git a/src/or/channeltls.c b/src/or/channeltls.c index 1af75e6648..5117672a6a 100644 --- a/src/or/channeltls.c +++ b/src/or/channeltls.c @@ -1889,7 +1889,8 @@ channel_tls_process_certs_cell(var_cell_t *cell, channel_tls_t *chan) tor_cert_t *ed_cert = tor_cert_parse(cert_body, cert_len); if (!ed_cert) { log_fn(LOG_PROTOCOL_WARN, LD_PROTOCOL, - "Received undecodable Ed certificate in CERTS cell from %s:%d", + "Received undecodable Ed certificate " + "in CERTS cell from %s:%d", safe_str(chan->conn->base_.address), chan->conn->base_.port); } else { @@ -2310,10 +2311,9 @@ channel_tls_process_authenticate_cell(var_cell_t *cell, channel_tls_t *chan) chan->conn->handshake_state->authenticated_rsa = 1; chan->conn->handshake_state->digest_received_data = 0; { - crypto_pk_t *identity_rcvd = - tor_tls_cert_get_key(chan->conn->handshake_state->certs->id_cert); - const common_digests_t *id_digests = - tor_x509_cert_get_id_digests(chan->conn->handshake_state->certs->id_cert); + tor_x509_cert_t *id_cert = chan->conn->handshake_state->certs->id_cert; + crypto_pk_t *identity_rcvd = tor_tls_cert_get_key(id_cert); + const common_digests_t *id_digests = tor_x509_cert_get_id_digests(id_cert); const ed25519_public_key_t *ed_identity_received = NULL; if (! sig_is_rsa) { diff --git a/src/or/circuitbuild.c b/src/or/circuitbuild.c index b2fbd273a8..0881f231aa 100644 --- a/src/or/circuitbuild.c +++ b/src/or/circuitbuild.c @@ -84,7 +84,6 @@ channel_connect_for_circuit(const tor_addr_t *addr, uint16_t port, { channel_t *chan; - chan = channel_connect(addr, port, id_digest, NULL // XXXX Ed25519 id. ); diff --git a/src/or/connection_or.c b/src/or/connection_or.c index c6d5bb5250..eb67f0653f 100644 --- a/src/or/connection_or.c +++ b/src/or/connection_or.c @@ -2544,8 +2544,8 @@ connection_or_compute_authenticate_cell_body(or_connection_t *conn, ssize_t len2 = auth1_parse(&tmp, out, len, ctx); if (!tmp) { /* LCOV_EXCL_START */ - log_warn(LD_BUG, "Unable to parse signed part of AUTH1 data that we just " - "encoded"); + log_warn(LD_BUG, "Unable to parse signed part of AUTH1 data that " + "we just encoded"); goto err; /* LCOV_EXCL_STOP */ } diff --git a/src/or/or.h b/src/or/or.h index 1fc4b16e63..d305eac543 100644 --- a/src/or/or.h +++ b/src/or/or.h @@ -1373,10 +1373,6 @@ typedef struct listener_connection_t { * authchallenge_type_is_better(). */ - - - - /** The length of the part of the AUTHENTICATE cell body that the client and * server can generate independently (when using RSA_SHA256_TLSSECRET). It * contains everything except the client's timestamp, the client's randomly diff --git a/src/or/routerkeys.c b/src/or/routerkeys.c index b6f20e6642..8d9a1328b8 100644 --- a/src/or/routerkeys.c +++ b/src/or/routerkeys.c @@ -1029,7 +1029,8 @@ should_make_new_ed_keys(const or_options_t *options, const time_t now) #undef EXPIRES_SOON #ifdef TOR_UNIT_TESTS -/* Helper for unit tests: populate the ed25519 keys without saving or loading */ +/* Helper for unit tests: populate the ed25519 keys without saving or + * loading */ void init_mock_ed_keys(const crypto_pk_t *rsa_identity_key) { diff --git a/src/or/torcert.c b/src/or/torcert.c index 4259363f35..852def9ef6 100644 --- a/src/or/torcert.c +++ b/src/or/torcert.c @@ -603,7 +603,6 @@ or_handshake_certs_ed25519_ok(int severity, return 1; } - /** * Check the Ed certificates and/or the RSA certificates, as appropriate. If * we obtained an Ed25519 identity, set *ed_id_out. If we obtained an RSA @@ -646,5 +645,5 @@ or_handshake_certs_check_both(int severity, *rsa_id_out = tor_x509_cert_get_id_digests(certs->id_cert); } } - } + |