[tor-commits] [tor/master] Fix whitespace/formatting

nickm at torproject.org nickm at torproject.org
Sun Jul 15 21:07:27 UTC 2018


commit fb105404f27a713f3192cb3a376ddc5fc257ccd9
Author: rl1987 <rl1987 at sdf.lonestar.org>
Date:   Tue May 22 13:59:07 2018 +0200

    Fix whitespace/formatting
---
 src/or/proto_socks.c | 19 ++++++++++---------
 1 file changed, 10 insertions(+), 9 deletions(-)

diff --git a/src/or/proto_socks.c b/src/or/proto_socks.c
index 6ed8f6e17..17589fad3 100644
--- a/src/or/proto_socks.c
+++ b/src/or/proto_socks.c
@@ -181,7 +181,6 @@ parse_socks4_request(const uint8_t *raw_data, socks_request_t *req,
     }
   }
 
-
   end:
   socks4_client_request_free(trunnel_req);
 
@@ -362,7 +361,6 @@ parse_socks5_userpass_auth(const uint8_t *raw_data, socks_request_t *req,
   socks5_client_userpass_auth_t *trunnel_req = NULL;
   ssize_t parsed = socks5_client_userpass_auth_parse(&trunnel_req, raw_data,
                                                      datalen);
-
   tor_assert(drain_out);
   *drain_out = 0;
 
@@ -460,7 +458,8 @@ parse_socks5_client_request(const uint8_t *raw_data, socks_request_t *req,
   int res = 1;
   tor_addr_t destaddr;
   socks5_client_request_t *trunnel_req = NULL;
-  ssize_t parsed = socks5_client_request_parse(&trunnel_req, raw_data, datalen);
+  ssize_t parsed =
+   socks5_client_request_parse(&trunnel_req, raw_data, datalen);
   if (parsed == -1) {
     log_warn(LD_APP, "socks5: parsing failed - invalid client request");
     res = -1;
@@ -493,7 +492,7 @@ parse_socks5_client_request(const uint8_t *raw_data, socks_request_t *req,
       tor_addr_to_str(req->address, &destaddr, sizeof(req->address), 1);
     } break;
     case 3: {
-      const struct domainname_st *dns_name = 
+      const struct domainname_st *dns_name =
         socks5_client_request_getconst_dest_addr_domainname(trunnel_req);
 
       const char *hostname = domainname_getconstarray_name(dns_name);
@@ -502,7 +501,8 @@ parse_socks5_client_request(const uint8_t *raw_data, socks_request_t *req,
     } break;
     case 4: {
       const char *ipv6 =
-        (const char *)socks5_client_request_getarray_dest_addr_ipv6(trunnel_req);
+        (const char *)socks5_client_request_getarray_dest_addr_ipv6(
+          trunnel_req);
       tor_addr_from_ipv6_bytes(&destaddr, ipv6);
 
       tor_addr_to_str(req->address, &destaddr, sizeof(req->address), 1);
@@ -552,7 +552,7 @@ process_socks5_client_request(socks_request_t *req,
              req->port, escaped_safe_str_client(req->address));
 
     res = -1;
-    goto end;;
+    goto end;
   }
 
   if (req->socks5_atyp == 1 || req->socks5_atyp == 4) {
@@ -578,8 +578,9 @@ process_socks5_client_request(socks_request_t *req,
 }
 
 static int
-handle_socks_message(const uint8_t *raw_data, size_t datalen, socks_request_t *req,
-                     int log_sockstype, int safe_socks, size_t *drain_out)
+handle_socks_message(const uint8_t *raw_data, size_t datalen,
+                     socks_request_t *req, int log_sockstype,
+                     int safe_socks, size_t *drain_out)
 {
   int res = 1;
 
@@ -733,7 +734,7 @@ fetch_from_buf_socks(buf_t *buf, socks_request_t *req,
 
   do {
     n_drain = 0;
-    buf_pullup(buf, MAX(want_length, buf_datalen(buf)), 
+    buf_pullup(buf, MAX(want_length, buf_datalen(buf)),
                &head, &datalen);
     tor_assert(head && datalen >= 2);
     want_length = 0;





More information about the tor-commits mailing list