diff options
author | Daniel Pinto <danielpinto52@gmail.com> | 2020-08-03 20:08:17 +0100 |
---|---|---|
committer | Daniel Pinto <danielpinto52@gmail.com> | 2020-08-03 20:08:17 +0100 |
commit | ccdd0d801ae952d4c8219eea9acdd3acfd438924 (patch) | |
tree | a62aab1be8e18804a7e9e5d7aea8a950567d1a0e /src | |
parent | 1474ab33956eefd9b75ef9a3e238ec7f855b8c7e (diff) | |
download | tor-ccdd0d801ae952d4c8219eea9acdd3acfd438924.tar.gz tor-ccdd0d801ae952d4c8219eea9acdd3acfd438924.zip |
Minor style improvements. #30045
Diffstat (limited to 'src')
-rw-r--r-- | src/app/config/config.c | 3 | ||||
-rw-r--r-- | src/app/config/or_options_st.h | 11 | ||||
-rw-r--r-- | src/feature/relay/routerkeys.c | 7 |
3 files changed, 11 insertions, 10 deletions
diff --git a/src/app/config/config.c b/src/app/config/config.c index 1c6d4acd3e..23f280891b 100644 --- a/src/app/config/config.c +++ b/src/app/config/config.c @@ -4434,9 +4434,8 @@ options_init_from_torrc(int argc, char **argv) const char *v = format_line->value; // keep the same order as enum key_expiration_format const char *formats[] = { "iso8601", "timestamp" }; - const int formats_len = sizeof(formats) / sizeof(formats[0]); int format = -1; - for (int i = 0; i < formats_len; i++) { + for (unsigned i = 0; i < ARRAY_LENGTH(formats); i++) { if (!strcmp(v, formats[i])) { format = i; break; diff --git a/src/app/config/or_options_st.h b/src/app/config/or_options_st.h index 774b476476..9d620c7b62 100644 --- a/src/app/config/or_options_st.h +++ b/src/app/config/or_options_st.h @@ -35,6 +35,12 @@ typedef enum { TCP_PROXY_PROTOCOL_HAPROXY } tcp_proxy_protocol_t; +/** Enumeration of available time formats for output of --key-expiration */ +typedef enum { + KEY_EXPIRATION_FORMAT_ISO8601 = 0, + KEY_EXPIRATION_FORMAT_TIMESTAMP +} key_expiration_format_t; + /** Configuration options for a Tor process. */ struct or_options_t { uint32_t magic_; @@ -944,10 +950,7 @@ struct or_options_t { * ed25519 identity key except from tor --keygen */ int OfflineMasterKey; - enum { - KEY_EXPIRATION_FORMAT_ISO8601 = 0, - KEY_EXPIRATION_FORMAT_TIMESTAMP - } key_expiration_format; + key_expiration_format_t key_expiration_format; enum { FORCE_PASSPHRASE_AUTO=0, diff --git a/src/feature/relay/routerkeys.c b/src/feature/relay/routerkeys.c index f0fd101efd..744a73d936 100644 --- a/src/feature/relay/routerkeys.c +++ b/src/feature/relay/routerkeys.c @@ -520,14 +520,13 @@ print_cert_expiration(const char *expiration, /** * Log when a certificate, <b>cert</b>, with some <b>description</b> and * stored in a file named <b>fname</b>, is going to expire. Formats the expire - * time according to <b>time_format</b>. Valid time formats are in the - * key_expiration_format enum, in or_options_t. + * time according to <b>time_format</b>. */ static void log_ed_cert_expiration(const tor_cert_t *cert, const char *description, const char *fname, - int time_format) { + key_expiration_format_t time_format) { if (BUG(!cert)) { /* If the specified key hasn't been loaded */ log_warn(LD_OR, "No %s key loaded; can't get certificate expiration.", description); @@ -582,7 +581,7 @@ log_master_signing_key_cert_expiration(const or_options_t *options) /* If we do have a signing key, log the expiration time. */ if (signing_key) { - int time_format = options->key_expiration_format; + key_expiration_format_t time_format = options->key_expiration_format; log_ed_cert_expiration(signing_key, "signing", fn, time_format); } else { log_warn(LD_OR, "Could not load signing key certificate from %s, so " \ |