]> git.ipfire.org Git - thirdparty/tor.git/commitdiff
Fix whitespace from tor_x509_cert rename
authorNick Mathewson <nickm@torproject.org>
Tue, 30 Sep 2014 12:35:02 +0000 (08:35 -0400)
committerNick Mathewson <nickm@torproject.org>
Tue, 24 Feb 2015 17:03:11 +0000 (12:03 -0500)
src/common/tortls.c
src/common/tortls.h
src/or/connection_or.c

index b4d50cda62a57f34312fbc0c0afa2647fb002f6a..97dca4d47821d9c87d6c2137311dee7880d772d9 100644 (file)
@@ -880,8 +880,8 @@ tor_x509_cert_new(X509 *x509_cert)
 }
 
 /** Read a DER-encoded X509 cert, of length exactly <b>certificate_len</b>,
- * from a <b>certificate</b>.  Return a newly allocated tor_x509_cert_t on success
- * and NULL on failure. */
+ * from a <b>certificate</b>.  Return a newly allocated tor_x509_cert_t on
+ * success and NULL on failure. */
 tor_x509_cert_t *
 tor_x509_cert_decode(const uint8_t *certificate, size_t certificate_len)
 {
index 22b1a9eb0fb83b9a59be09e47c5f78d534e39850..28a73e9ae42cea7cf12c20f681abe77d1b457bd2 100644 (file)
@@ -132,7 +132,8 @@ int tor_tls_get_my_certs(int server,
                          const tor_x509_cert_t **id_cert_out);
 crypto_pk_t *tor_tls_get_my_client_auth_key(void);
 crypto_pk_t *tor_tls_cert_get_key(tor_x509_cert_t *cert);
-int tor_tls_cert_matches_key(const tor_tls_t *tls, const tor_x509_cert_t *cert);
+int tor_tls_cert_matches_key(const tor_tls_t *tls,
+                             const tor_x509_cert_t *cert);
 int tor_tls_cert_is_valid(int severity,
                           const tor_x509_cert_t *cert,
                           const tor_x509_cert_t *signing_cert,
index 6c584a5c770c3f7e01a9a4c6577e4ec312c9059f..4ab47f0aa8a20cc00e61c56693fe83ea0d0138de 100644 (file)
@@ -2348,7 +2348,8 @@ connection_or_compute_authenticate_cell_body(or_connection_t *conn,
     if (tor_tls_get_my_certs(server, &link_cert, &id_cert))
       return -1;
     my_digests = tor_x509_cert_get_id_digests(id_cert);
-    their_digests = tor_x509_cert_get_id_digests(conn->handshake_state->id_cert);
+    their_digests =
+      tor_x509_cert_get_id_digests(conn->handshake_state->id_cert);
     tor_assert(my_digests);
     tor_assert(their_digests);
     my_id = (uint8_t*)my_digests->d[DIGEST_SHA256];