]> git.ipfire.org Git - thirdparty/tor.git/commitdiff
Fix whitespace.
authorNick Mathewson <nickm@torproject.org>
Tue, 15 Mar 2016 13:21:29 +0000 (09:21 -0400)
committerNick Mathewson <nickm@torproject.org>
Tue, 15 Mar 2016 13:21:29 +0000 (09:21 -0400)
src/common/util.c
src/or/circuitbuild.c
src/or/config.c
src/or/main.c
src/or/rendcommon.c
src/or/rendcommon.h
src/or/routerlist.c

index 52b87f8209312f8915355af309a8f56bae005594..39d6502ebf64af6d40643ada9ea16d481d2455a3 100644 (file)
@@ -2074,7 +2074,8 @@ check_private_dir(const char *dirname, cpd_check_t check,
    * the file between stat() and chmod(), a potential race exists.
    *
    * Several suggestions taken from:
-   * https://developer.apple.com/library/mac/documentation/Security/Conceptual/SecureCodingGuide/Articles/RaceConditions.html
+   * https://developer.apple.com/library/mac/documentation/
+   *     Security/Conceptual/SecureCodingGuide/Articles/RaceConditions.html
    */
 
   /* Open directory.
@@ -2985,7 +2986,8 @@ expand_filename(const char *filename)
   tor_assert(filename);
 #ifdef _WIN32
   /* Might consider using GetFullPathName() as described here:
-   * http://etutorials.org/Programming/secure+programming/Chapter+3.+Input+Validation/3.7+Validating+Filenames+and+Paths/
+   * http://etutorials.org/Programming/secure+programming/
+   *     Chapter+3.+Input+Validation/3.7+Validating+Filenames+and+Paths/
    */
   return tor_strdup(filename);
 #else
index a15f4c28b5573d65fdeba6108e46957821cc2f61..237b61ab185e7172ed82935c7feb71fb4ce7b134 100644 (file)
@@ -2420,7 +2420,8 @@ build_state_get_exit_nickname(cpath_build_state_t *state)
 }
 
 /** Return true iff the given address can be used to extend to. */
-int extend_info_addr_is_allowed(const tor_addr_t *addr)
+int
+extend_info_addr_is_allowed(const tor_addr_t *addr)
 {
   tor_assert(addr);
 
@@ -2434,3 +2435,4 @@ int extend_info_addr_is_allowed(const tor_addr_t *addr)
  disallow:
   return 0;
 }
+
index 8f3c28c1c85e778b269cab7f8282d06449e3c78c..0e15f9bb077d44042a76b95c527edba4dd35283c 100644 (file)
@@ -6325,7 +6325,8 @@ parse_port_config(smartlist_t *out,
       ipv4_traffic = 1, ipv6_traffic = 0, prefer_ipv6 = 0,
       cache_ipv4 = 1, use_cached_ipv4 = 0,
       cache_ipv6 = 0, use_cached_ipv6 = 0,
-      prefer_ipv6_automap = 1, world_writable = 0, group_writable = 0, relax_dirmode_check = 0,
+      prefer_ipv6_automap = 1, world_writable = 0, group_writable = 0,
+      relax_dirmode_check = 0,
       has_used_unix_socket_only_option = 0;
 
     smartlist_split_string(elts, ports->value, NULL,
@@ -6577,7 +6578,8 @@ parse_port_config(smartlist_t *out,
 
     if ( has_used_unix_socket_only_option && ! unix_socket_path) {
       log_warn(LD_CONFIG, "You have a %sPort entry with GroupWritable, "
-               "WorldWritable, or RelaxDirModeCheck, but it is not a unix socket.", portname);
+               "WorldWritable, or RelaxDirModeCheck, but it is not a "
+               "unix socket.", portname);
       goto err;
     }
 
index cfd11696ec65a9819ce569ce28dffc02c31d6611..713816d9b78b456263f8c699b795b3a2173a8f4f 100644 (file)
@@ -572,7 +572,8 @@ connection_check_event(connection_t *conn, struct event *ev)
              conn_type_to_string(conn->type),
              conn_state_to_string(conn->type, conn->state),
              (int)conn->s, (int)conn->linked,
-             (conn->type == CONN_TYPE_AP && TO_EDGE_CONN(conn)->is_dns_request),
+             (conn->type == CONN_TYPE_AP &&
+                               TO_EDGE_CONN(conn)->is_dns_request),
              conn->marked_for_close_file ? conn->marked_for_close_file : "-",
              conn->marked_for_close
              );
index 79509cbe2f317d275169feea0b94b4e6c5908d3f..603e4f0dd9f2cdcda13b4d43e4f3c462eee1a6ec 100644 (file)
@@ -1009,3 +1009,4 @@ MOCK_IMPL(int, hid_serv_responsible_for_desc_id,
   smartlist_free(responsible);
   return result;
 }
+
index fe452995989aa8746fe88d2ecd8f449217cab68b..7d81976013370f4ae15f39971a88552708d14599 100644 (file)
@@ -58,7 +58,7 @@ void rend_get_descriptor_id_bytes(char *descriptor_id_out,
                                   const char *service_id,
                                   const char *secret_id_part);
 int hid_serv_get_responsible_directories(smartlist_t *responsible_dirs,
-                                                                        const char *id);
+                                         const char *id);
 int hid_serv_acting_as_directory(void);
 MOCK_DECL(int, hid_serv_responsible_for_desc_id, (const char *id));
 
index 7f20aa9c3e8886b5ac61a7aab0e193729acb02bb..bc5e2e91335f202b26d0d69f28606c0aeae278c0 100644 (file)
@@ -5395,3 +5395,4 @@ refresh_all_country_info(void)
 
   nodelist_refresh_countries();
 }
+