summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--src/tools/tor-checkkey.c3
-rw-r--r--src/tools/tor-gencert.c3
-rw-r--r--src/tools/tor-resolve.c4
3 files changed, 4 insertions, 6 deletions
diff --git a/src/tools/tor-checkkey.c b/src/tools/tor-checkkey.c
index e15cc46df9..a244124991 100644
--- a/src/tools/tor-checkkey.c
+++ b/src/tools/tor-checkkey.c
@@ -12,7 +12,8 @@
#include <openssl/bn.h>
#include <openssl/rsa.h>
-int main(int c, char **v)
+int
+main(int c, char **v)
{
crypto_pk_env_t *env;
char *str;
diff --git a/src/tools/tor-gencert.c b/src/tools/tor-gencert.c
index 9eb9c798e0..13a640cb8b 100644
--- a/src/tools/tor-gencert.c
+++ b/src/tools/tor-gencert.c
@@ -64,7 +64,6 @@ show_help(void)
"[-c certificate_file]\n"
" [-m lifetime_in_months] [-a address:port] "
"[--passphrase-fd <fd>]\n");
-
}
/* XXXX copied from crypto.c */
@@ -408,7 +407,6 @@ get_fingerprint(EVP_PKEY *pkey, char *out)
return r;
}
-
/** Set <b>out</b> to the hex-encoded fingerprint of <b>pkey</b>. */
static int
get_digest(EVP_PKEY *pkey, char *out)
@@ -502,7 +500,6 @@ generate_certificate(void)
return 0;
}
-
/** Entry point to tor-gencert */
int
main(int argc, char **argv)
diff --git a/src/tools/tor-resolve.c b/src/tools/tor-resolve.c
index dbab3da9c6..2639d9e599 100644
--- a/src/tools/tor-resolve.c
+++ b/src/tools/tor-resolve.c
@@ -148,7 +148,7 @@ parse_socks4a_resolve_response(const char *hostname,
static const char *
socks5_reason_to_string(char reason)
{
- switch(reason) {
+ switch (reason) {
case SOCKS5_SUCCEEDED:
return "succeeded";
case SOCKS5_GENERAL_ERROR:
@@ -251,7 +251,7 @@ do_resolve(const char *hostname, uint32_t sockshost, uint16_t socksport,
}
if (parse_socks4a_resolve_response(hostname,
reply_buf, RESPONSE_LEN_4,
- result_addr)<0){
+ result_addr)<0) {
return -1;
}
} else {