Bladeren bron

Change end-of-file NLNL convention. It turns out arma I and I agree.

svn:r4382
Nick Mathewson 19 jaren geleden
bovenliggende
commit
0831823763

+ 1 - 1
contrib/checkSpace.pl

@@ -75,7 +75,7 @@ for $fn (@ARGV) {
 	    }
 	}
     }
-    if ($lastnil) {
+    if (! $lastnil) {
         print "  EOL\@EOF:$fn:$.\n";
     }
     close(F);

+ 1 - 0
src/common/aes.c

@@ -812,3 +812,4 @@ void rijndaelEncrypt(const u32 rk[/*4*(Nr + 1)*/], int Nr, const u8 pt[16], u8 c
                 rk[3];
         PUTU32(ct + 12, s3);
 }
+

+ 1 - 0
src/common/aes.h

@@ -28,3 +28,4 @@ void aes_set_counter(aes_cnt_cipher_t *cipher, uint64_t counter);
 void aes_adjust_counter(aes_cnt_cipher_t *cipher, long delta);
 
 #endif
+

+ 1 - 0
src/common/compat.c

@@ -1031,3 +1031,4 @@ int network_init(void)
 #endif
   return 0;
 }
+

+ 1 - 0
src/common/compat.h

@@ -239,3 +239,4 @@ unsigned long tor_get_thread_id(void);
 #endif
 
 #endif
+

+ 1 - 0
src/common/container.c

@@ -649,3 +649,4 @@ int strmap_isempty(strmap_t *map)
 {
   return SPLAY_EMPTY(&map->head);
 }
+

+ 1 - 0
src/common/container.h

@@ -94,3 +94,4 @@ void strmap_iter_get(strmap_iter_t *iter, const char **keyp, void **valp);
 int strmap_iter_done(strmap_iter_t *iter);
 
 #endif
+

+ 1 - 0
src/common/crypto.c

@@ -1675,3 +1675,4 @@ setup_openssl_threading(void) {
 #else
 static int setup_openssl_threading(void) { return 0; }
 #endif
+

+ 1 - 0
src/common/crypto.h

@@ -160,3 +160,4 @@ void secret_to_key(char *key_out, size_t key_out_len, const char *secret,
                    size_t secret_len, const char *s2k_specifier);
 
 #endif
+

+ 1 - 0
src/common/log.c

@@ -537,3 +537,4 @@ void suppress_libevent_log_msg(const char *msg)
 void configure_libevent_logging(void) {}
 void suppress_libevent_log_msg(const char *msg) {}
 #endif
+

+ 1 - 0
src/common/log.h

@@ -99,3 +99,4 @@ void _log_fn(int severity, const char *format, ...);
 
 # define __LOG_H
 #endif
+

+ 1 - 0
src/common/test.h

@@ -136,3 +136,4 @@ extern int have_failed;
   } STMT_END
 
 #endif
+

+ 1 - 0
src/common/torgzip.c

@@ -245,3 +245,4 @@ int detect_compression_method(const char *in, size_t in_len)
     return 0;
   }
 }
+

+ 1 - 0
src/common/torgzip.h

@@ -30,3 +30,4 @@ int is_gzip_supported(void);
 int detect_compression_method(const char *in, size_t in_len);
 
 #endif
+

+ 1 - 0
src/common/torint.h

@@ -250,3 +250,4 @@ typedef uint32_t uintptr_t;
 #define SIZE_T_CEILING (sizeof(char)<<(sizeof(size_t)*8 - 1))
 
 #endif /* __TORINT_H */
+

+ 1 - 0
src/common/tortls.c

@@ -859,3 +859,4 @@ void _check_no_tls_errors(const char *fname, int line)
          fname, line);
   tls_log_errors(LOG_WARN, NULL);
 }
+

+ 1 - 0
src/common/tortls.h

@@ -51,3 +51,4 @@ unsigned long tor_tls_get_n_bytes_written(tor_tls *tls);
 void _check_no_tls_errors(const char *fname, int line);
 
 #endif
+

+ 1 - 0
src/common/util.c

@@ -1443,3 +1443,4 @@ void write_pidfile(char *filename) {
   }
 #endif
 }
+

+ 1 - 0
src/common/util.h

@@ -142,3 +142,4 @@ void finish_daemon(const char *desired_cwd);
 void write_pidfile(char *filename);
 
 #endif
+

+ 1 - 0
src/or/buffers.c

@@ -1093,3 +1093,4 @@ void assert_buf_ok(buf_t *buf)
   }
 #endif
 }
+

+ 1 - 0
src/or/circuitbuild.c

@@ -1475,3 +1475,4 @@ onion_append_hop(crypt_path_t **head_ptr, routerinfo_t *choice) {
 
   return 0;
 }
+

+ 1 - 0
src/or/circuitlist.c

@@ -707,3 +707,4 @@ void assert_circuit_ok(const circuit_t *c)
     tor_assert(!c->rend_splice);
   }
 }
+

+ 1 - 0
src/or/circuituse.c

@@ -1140,3 +1140,4 @@ int connection_ap_handshake_attach_circuit(connection_t *conn) {
     return 0;
   }
 }
+

+ 1 - 0
src/or/command.c

@@ -335,3 +335,4 @@ static void command_process_destroy_cell(cell_t *cell, connection_t *conn) {
     }
   }
 }
+

+ 1 - 0
src/or/config.c

@@ -2785,3 +2785,4 @@ print_cvs_version(void)
   puts(routerlist_c_id);
   puts(routerparse_c_id);
 }
+

+ 1 - 0
src/or/connection.c

@@ -1817,3 +1817,4 @@ void assert_connection_ok(connection_t *conn, time_t now)
       tor_assert(0);
   }
 }
+

+ 1 - 0
src/or/connection_edge.c

@@ -1720,3 +1720,4 @@ failed:
     *s = '.';
     return BAD_HOSTNAME;
 }
+

+ 1 - 0
src/or/connection_or.c

@@ -635,3 +635,4 @@ loop:
 
   goto loop; /* process the remainder of the buffer */
 }
+

+ 1 - 0
src/or/control.c

@@ -1303,3 +1303,4 @@ init_cookie_authentication(int enabled)
 
   return 0;
 }
+

+ 1 - 0
src/or/cpuworker.c

@@ -430,3 +430,4 @@ int assign_to_cpuworker(connection_t *cpuworker, uint8_t question_type,
   }
   return 0;
 }
+

+ 1 - 0
src/or/directory.c

@@ -1190,3 +1190,4 @@ int connection_dir_finished_connecting(connection_t *conn)
   conn->state = DIR_CONN_STATE_CLIENT_SENDING; /* start flushing conn */
   return 0;
 }
+

+ 1 - 0
src/or/dirserv.c

@@ -1043,3 +1043,4 @@ dirserv_free_all(void)
   memset(&cached_directory, 0, sizeof(cached_directory));
   memset(&cached_runningrouters, 0, sizeof(cached_runningrouters));
 }
+

+ 1 - 0
src/or/dns.c

@@ -877,3 +877,4 @@ static void spawn_enough_dnsworkers(void) {
     num_dnsworkers--;
   }
 }
+

+ 1 - 0
src/or/hibernate.c

@@ -832,3 +832,4 @@ void consider_hibernation(time_t now) {
     }
   }
 }
+

+ 1 - 0
src/or/main.c

@@ -1624,3 +1624,4 @@ int tor_main(int argc, char *argv[]) {
   tor_cleanup();
   return -1;
 }
+

+ 1 - 0
src/or/onion.c

@@ -404,3 +404,4 @@ clear_pending_onions(void)
   ol_list = ol_tail = NULL;
   ol_length = 0;
 }
+

+ 1 - 0
src/or/or.h

@@ -1887,3 +1887,4 @@ int tor_version_compare(tor_version_t *a, tor_version_t *b);
 void assert_addr_policy_ok(addr_policy_t *t);
 
 #endif
+

+ 1 - 0
src/or/relay.c

@@ -1211,3 +1211,4 @@ circuit_consider_sending_sendme(circuit_t *circ, crypt_path_t *layer_hint)
     }
   }
 }
+

+ 1 - 0
src/or/rendclient.c

@@ -447,3 +447,4 @@ char *rend_client_get_random_intro(char *query) {
   smartlist_free(sl);
   return nickname;
 }
+

+ 1 - 0
src/or/rendcommon.c

@@ -358,3 +358,4 @@ void rend_process_relay_cell(circuit_t *circ, int command, size_t length,
       tor_assert(0);
   }
 }
+

+ 1 - 0
src/or/rendmid.c

@@ -289,3 +289,4 @@ rend_mid_rendezvous(circuit_t *circ, const char *request, size_t request_len)
   circuit_mark_for_close(circ);
   return -1;
 }
+

+ 1 - 0
src/or/rendservice.c

@@ -1028,3 +1028,4 @@ rend_service_set_connection_addr_port(connection_t *conn, circuit_t *circ)
          conn->port,serviceid);
   return -1;
 }
+

+ 1 - 0
src/or/rephist.c

@@ -758,3 +758,4 @@ void rep_hist_free_all(void)
   tor_free(write_array);
   predicted_ports_free();
 }
+

+ 1 - 0
src/or/router.c

@@ -970,3 +970,4 @@ void router_free_all_keys(void)
   if (desc_routerinfo)
     routerinfo_free(desc_routerinfo);
 }
+

+ 1 - 0
src/or/routerlist.c

@@ -1459,3 +1459,4 @@ void clear_trusted_dir_servers(void)
     trusted_dir_servers = smartlist_create();
   }
 }
+

+ 1 - 0
src/or/routerparse.c

@@ -1631,3 +1631,4 @@ tor_version_same_series(tor_version_t *a, tor_version_t *b)
           (a->minor == b->minor) &&
           (a->micro == b->micro));
 }
+

+ 1 - 0
src/or/test.c

@@ -1463,3 +1463,4 @@ main(int c, char**v) {
   else
     return 0;
 }
+

+ 1 - 0
src/or/tor_main.c

@@ -18,3 +18,4 @@ int main(int argc, char *argv[])
 {
   return tor_main(argc, argv);
 }
+

+ 1 - 0
src/or/tree.h

@@ -675,3 +675,4 @@ name##_RB_MINMAX(struct name *head, int val)				\
 	     (x) = name##_RB_NEXT(head, x))
 
 #endif	/* _SYS_TREE_H_ */
+