}
if (SSLeay() < OPENSSL_V_SERIES(1,0,0)) {
- log_notice(LD_CRYPTO, "Your OpenSSL version seems to be %s. We "
- "recommend 1.0.0 or later.", crypto_openssl_get_version_str());
+ log_notice(LD_CRYPTO,
+ "Your OpenSSL version seems to be %s. We recommend 1.0.0 "
+ "or later.",
+ crypto_openssl_get_version_str());
}
if (useAccel > 0) {
rv = tor_malloc(sizeof(*rv));
memcpy(rv, q, sizeof(*rv));
-
+
return rv;
}
*/
static void
-cell_queue_entry_free(cell_queue_entry_t *q, int handed_off) {
+cell_queue_entry_free(cell_queue_entry_t *q, int handed_off)
+{
if (!q) return;
if (!handed_off) {
* Update active_circuits et al.; this does policy notifies, so
* comes before freeing policy data
*/
-
+
if (to_remove->muxinfo.cell_count > 0) {
circuitmux_make_circuit_inactive(cmux, circ, CELL_DIRECTION_IN);
}
circuitmux_policy_data_t *pol_data,
circuit_t *circ,
circuitmux_policy_circ_data_t *pol_circ_data);
-static void
+static void
ewma_notify_circ_active(circuitmux_t *cmux,
circuitmux_policy_data_t *pol_data,
circuit_t *circ,
* the active_circuits_pqueue.
*/
-static void
+static void
ewma_notify_circ_active(circuitmux_t *cmux,
circuitmux_policy_data_t *pol_data,
circuit_t *circ,
* the active_circuits_pqueue.
*/
-static void
+static void
ewma_notify_circ_inactive(circuitmux_t *cmux,
circuitmux_policy_data_t *pol_data,
circuit_t *circ,
channel_set_cmux_policy_everywhere(NULL);
}
-
/* Update the BridgePassword's hashed version as needed. We store this as a
* digest so that we can do side-channel-proof comparisons on it.
*/
channel_set_cmux_policy_everywhere(NULL);
}
-
/* XXXX024 this call might be unnecessary here: can changing the
* current consensus really alter our view of any OR's rate limits? */
connection_or_update_token_buckets(get_connection_array(), options);