*/
/* XXXX indicate "read blocked" somehow? */
int
-buf_read_from_socket(tor_socket_t s, size_t at_most, buf_t *buf, int *reached_eof,
- int *socket_error)
+buf_read_from_socket(tor_socket_t s, size_t at_most, buf_t *buf,
+ int *reached_eof,
+ int *socket_error)
{
/* XXXX It's stupid to overload the return values for these functions:
* "error status" and "number of bytes read" are not mutually exclusive.
* -1 on failure. Return 0 if write() would block.
*/
int
-buf_flush_to_socket(tor_socket_t s, buf_t *buf, size_t sz, size_t *buf_flushlen)
+buf_flush_to_socket(tor_socket_t s, buf_t *buf, size_t sz,
+ size_t *buf_flushlen)
{
/* XXXX It's stupid to overload the return values for these functions:
* "error status" and "number of bytes flushed" are not mutually exclusive.
uint32_t buf_get_oldest_chunk_timestamp(const buf_t *buf, uint32_t now);
size_t buf_get_total_allocation(void);
-int buf_read_from_socket(tor_socket_t s, size_t at_most, buf_t *buf, int *reached_eof,
- int *socket_error);
+int buf_read_from_socket(tor_socket_t s, size_t at_most, buf_t *buf,
+ int *reached_eof,
+ int *socket_error);
-int buf_flush_to_socket(tor_socket_t s, buf_t *buf, size_t sz, size_t *buf_flushlen);
+int buf_flush_to_socket(tor_socket_t s, buf_t *buf, size_t sz,
+ size_t *buf_flushlen);
int buf_add(const char *string, size_t string_len, buf_t *buf);
int buf_add_compress(buf_t *buf, struct tor_compress_state_t *state,
return r;
}
-/** As buf_flush_to_socket(), but writes data to a TLS connection. Can write more than
- * <b>flushlen</b> bytes.
+/** As buf_flush_to_socket(), but writes data to a TLS connection. Can write
+ * more than <b>flushlen</b> bytes.
*/
int
buf_flush_to_tls(tor_tls_t *tls, buf_t *buf, size_t flushlen,
static int connection_flushed_some(connection_t *conn);
static int connection_finished_connecting(connection_t *conn);
static int connection_reached_eof(connection_t *conn);
-static int connection_buf_read_from_socket(connection_t *conn, ssize_t *max_to_read,
- int *socket_error);
+static int connection_buf_read_from_socket(connection_t *conn,
+ ssize_t *max_to_read,
+ int *socket_error);
static int connection_process_inbuf(connection_t *conn, int package_partial);
static void client_check_address_changed(tor_socket_t sock);
static void set_constrained_socket_buffers(tor_socket_t sock, int size);
/* !connection_speaks_cells, !conn->linked_conn. */
int reached_eof = 0;
CONN_LOG_PROTECT(conn,
- result = buf_read_from_socket(conn->s, at_most, conn->inbuf, &reached_eof,
- socket_error));
+ result = buf_read_from_socket(conn->s, at_most, conn->inbuf,
+ &reached_eof,
+ socket_error));
if (reached_eof)
conn->inbuf_reached_eof = 1;
} else
retval = -1; /* never flush non-open broken tls connections */
} else {
- retval = buf_flush_to_socket(conn->s, conn->outbuf, sz, &conn->outbuf_flushlen);
+ retval = buf_flush_to_socket(conn->s, conn->outbuf, sz,
+ &conn->outbuf_flushlen);
}
if (retval >= 0 && /* Technically, we could survive things like
TLS_WANT_WRITE here. But don't bother for now. */