Browse Source

Make check-spaces happy

Sebastian Hahn 13 years ago
parent
commit
9bed40eb10
5 changed files with 11 additions and 9 deletions
  1. 2 1
      src/common/tortls.c
  2. 1 1
      src/or/nodelist.c
  3. 6 5
      src/or/policies.c
  4. 2 1
      src/or/routerlist.c
  5. 0 1
      src/test/test_microdesc.c

+ 2 - 1
src/common/tortls.c

@@ -1079,7 +1079,8 @@ void
 tor_tls_assert_renegotiation_unblocked(tor_tls_t *tls)
 {
   if (use_unsafe_renegotiation_flag) {
-    tor_assert(0 != (tls->ssl->s3->flags & SSL3_FLAGS_ALLOW_UNSAFE_LEGACY_RENEGOTIATION));
+    tor_assert(0 != (tls->ssl->s3->flags &
+                     SSL3_FLAGS_ALLOW_UNSAFE_LEGACY_RENEGOTIATION));
   }
   if (use_unsafe_renegotiation_op) {
     long options = SSL_get_options(tls->ssl);

+ 1 - 1
src/or/nodelist.c

@@ -551,7 +551,6 @@ node_is_dir(const node_t *node)
     return 0;
 }
 
-
 /** Return true iff <b>node</b> has either kind of usable descriptor -- that
  * is, a routerdecriptor or a microdescriptor. */
 int
@@ -726,3 +725,4 @@ node_get_declared_family(const node_t *node)
   else
     return NULL;
 }
+

+ 6 - 5
src/or/policies.c

@@ -1353,14 +1353,14 @@ parse_short_policy(const char *summary)
 
     if (tor_sscanf(ent_buf, "%u-%u%c", &low, &high, &dummy) == 2) {
       if (low<1 || low>65535 || high<1 || high>65535) {
-        log_fn(LOG_PROTOCOL_WARN, LD_DIR,"Found bad entry in policy summary %s",
-              escaped(orig_summary));
+        log_fn(LOG_PROTOCOL_WARN, LD_DIR,
+               "Found bad entry in policy summary %s", escaped(orig_summary));
         return NULL;
       }
     } else if (tor_sscanf(ent_buf, "%u%c", &low, &dummy) == 1) {
       if (low<1 || low>65535) {
-        log_fn(LOG_PROTOCOL_WARN, LD_DIR,"Found bad entry in policy summary %s",
-               escaped(orig_summary));
+        log_fn(LOG_PROTOCOL_WARN, LD_DIR,
+               "Found bad entry in policy summary %s", escaped(orig_summary));
         return NULL;
       }
       high = low;
@@ -1447,7 +1447,8 @@ int
 short_policy_is_reject_star(const short_policy_t *policy)
 {
   /* This doesn't need to be as much on the lookout as policy_is_reject_star,
-   * since policy summaries are from the consensus or from consensus microdescs.
+   * since policy summaries are from the consensus or from consensus
+   * microdescs.
    */
   tor_assert(policy);
   /* Check for an exact match of "reject 1-65535". */

+ 2 - 1
src/or/routerlist.c

@@ -2289,7 +2289,8 @@ hex_digest_nickname_matches(const char *hexdigest, const char *identity_digest,
   return !memcmp(digest, identity_digest, DIGEST_LEN);
 }
 
-/* Return true iff <b>router</b> is listed as named in the current consensus. */
+/* Return true iff <b>router</b> is listed as named in the current
+ * consensus. */
 static int
 router_is_named(const routerinfo_t *router)
 {

+ 0 - 1
src/test/test_microdesc.c

@@ -226,7 +226,6 @@ test_md_cache(void *data)
   tor_free(fn);
 }
 
-
 struct testcase_t microdesc_tests[] = {
   { "cache", test_md_cache, TT_FORK, NULL, NULL },
   END_OF_TESTCASES