@@ -286,7 +286,7 @@ static BIO* LoadBIO (Handle<Value> v) {
286
286
String::Utf8Value s (v);
287
287
r = BIO_write (bio, *s, s.length ());
288
288
} else if (Buffer::HasInstance (v)) {
289
- char * buffer_data = Buffer::Data (v);
289
+ char * buffer_data = Buffer::Data (v);
290
290
size_t buffer_length = Buffer::Length (v);
291
291
r = BIO_write (bio, buffer_data, buffer_length);
292
292
}
@@ -700,7 +700,7 @@ Handle<Value> SecureContext::LoadPKCS12(const Arguments& args) {
700
700
701
701
if (!ret) {
702
702
unsigned long err = ERR_get_error ();
703
- const char * str = ERR_reason_error_string (err);
703
+ const char * str = ERR_reason_error_string (err);
704
704
return ThrowException (Exception::Error (String::New (str)));
705
705
}
706
706
@@ -1047,7 +1047,7 @@ static int VerifyCallback(int preverify_ok, X509_STORE_CTX *ctx) {
1047
1047
#ifdef OPENSSL_NPN_NEGOTIATED
1048
1048
1049
1049
int Connection::AdvertiseNextProtoCallback_ (SSL *s,
1050
- const unsigned char ** data,
1050
+ const unsigned char ** data,
1051
1051
unsigned int *len,
1052
1052
void *arg) {
1053
1053
@@ -1066,7 +1066,7 @@ int Connection::AdvertiseNextProtoCallback_(SSL *s,
1066
1066
}
1067
1067
1068
1068
int Connection::SelectNextProtoCallback_ (SSL *s,
1069
- unsigned char ** out, unsigned char * outlen,
1069
+ unsigned char ** out, unsigned char * outlen,
1070
1070
const unsigned char * in,
1071
1071
unsigned int inlen, void *arg) {
1072
1072
Connection *p = static_cast <Connection*> SSL_get_app_data (s);
@@ -1282,7 +1282,7 @@ Handle<Value> Connection::EncIn(const Arguments& args) {
1282
1282
String::New (" Second argument should be a buffer" )));
1283
1283
}
1284
1284
1285
- char * buffer_data = Buffer::Data (args[0 ]);
1285
+ char * buffer_data = Buffer::Data (args[0 ]);
1286
1286
size_t buffer_length = Buffer::Length (args[0 ]);
1287
1287
1288
1288
size_t off = args[1 ]->Int32Value ();
@@ -1328,7 +1328,7 @@ Handle<Value> Connection::ClearOut(const Arguments& args) {
1328
1328
String::New (" Second argument should be a buffer" )));
1329
1329
}
1330
1330
1331
- char * buffer_data = Buffer::Data (args[0 ]);
1331
+ char * buffer_data = Buffer::Data (args[0 ]);
1332
1332
size_t buffer_length = Buffer::Length (args[0 ]);
1333
1333
1334
1334
size_t off = args[1 ]->Int32Value ();
@@ -1400,7 +1400,7 @@ Handle<Value> Connection::EncOut(const Arguments& args) {
1400
1400
String::New (" Second argument should be a buffer" )));
1401
1401
}
1402
1402
1403
- char * buffer_data = Buffer::Data (args[0 ]);
1403
+ char * buffer_data = Buffer::Data (args[0 ]);
1404
1404
size_t buffer_length = Buffer::Length (args[0 ]);
1405
1405
1406
1406
size_t off = args[1 ]->Int32Value ();
@@ -1439,7 +1439,7 @@ Handle<Value> Connection::ClearIn(const Arguments& args) {
1439
1439
String::New (" Second argument should be a buffer" )));
1440
1440
}
1441
1441
1442
- char * buffer_data = Buffer::Data (args[0 ]);
1442
+ char * buffer_data = Buffer::Data (args[0 ]);
1443
1443
size_t buffer_length = Buffer::Length (args[0 ]);
1444
1444
1445
1445
size_t off = args[1 ]->Int32Value ();
@@ -1905,9 +1905,9 @@ Handle<Value> Connection::GetCurrentCipher(const Arguments& args) {
1905
1905
c = SSL_get_current_cipher (ss->ssl_ );
1906
1906
if ( c == NULL ) return Undefined ();
1907
1907
Local<Object> info = Object::New ();
1908
- const char * cipher_name = SSL_CIPHER_get_name (c);
1908
+ const char * cipher_name = SSL_CIPHER_get_name (c);
1909
1909
info->Set (name_symbol, String::New (cipher_name));
1910
- const char * cipher_version = SSL_CIPHER_get_version (c);
1910
+ const char * cipher_version = SSL_CIPHER_get_version (c);
1911
1911
info->Set (version_symbol, String::New (cipher_version));
1912
1912
return scope.Close (info);
1913
1913
}
@@ -1931,7 +1931,7 @@ Handle<Value> Connection::GetNegotiatedProto(const Arguments& args) {
1931
1931
Connection *ss = Connection::Unwrap (args);
1932
1932
1933
1933
if (ss->is_server_ ) {
1934
- const unsigned char * npn_proto;
1934
+ const unsigned char * npn_proto;
1935
1935
unsigned int npn_proto_len;
1936
1936
1937
1937
SSL_get0_next_proto_negotiated (ss->ssl_ , &npn_proto, &npn_proto_len);
@@ -2039,8 +2039,8 @@ class Cipher : public ObjectWrap {
2039
2039
return false ;
2040
2040
}
2041
2041
EVP_CipherInit_ex (&ctx, NULL , NULL ,
2042
- (unsigned char *)key,
2043
- (unsigned char *)iv, true );
2042
+ (unsigned char *)key,
2043
+ (unsigned char *)iv, true );
2044
2044
initialised_ = true ;
2045
2045
return true ;
2046
2046
}
@@ -2049,7 +2049,7 @@ class Cipher : public ObjectWrap {
2049
2049
bool CipherInitIv (char * cipherType,
2050
2050
char * key,
2051
2051
int key_len,
2052
- char * iv,
2052
+ char * iv,
2053
2053
int iv_len) {
2054
2054
cipher = EVP_get_cipherbyname (cipherType);
2055
2055
if (!cipher) {
@@ -2071,8 +2071,8 @@ class Cipher : public ObjectWrap {
2071
2071
return false ;
2072
2072
}
2073
2073
EVP_CipherInit_ex (&ctx, NULL , NULL ,
2074
- (unsigned char *)key,
2075
- (unsigned char *)iv, true );
2074
+ (unsigned char *)key,
2075
+ (unsigned char *)iv, true );
2076
2076
initialised_ = true ;
2077
2077
return true ;
2078
2078
}
@@ -2210,7 +2210,7 @@ class Cipher : public ObjectWrap {
2210
2210
2211
2211
ASSERT_IS_BUFFER (args[0 ]);
2212
2212
2213
- unsigned char * out=0 ;
2213
+ unsigned char * out=0 ;
2214
2214
int out_len=0 , r;
2215
2215
char * buffer_data = Buffer::Data (args[0 ]);
2216
2216
size_t buffer_length = Buffer::Length (args[0 ]);
@@ -2338,8 +2338,8 @@ class Decipher : public ObjectWrap {
2338
2338
return false ;
2339
2339
}
2340
2340
EVP_CipherInit_ex (&ctx, NULL , NULL ,
2341
- (unsigned char *)key,
2342
- (unsigned char *)iv, false );
2341
+ (unsigned char *)key,
2342
+ (unsigned char *)iv, false );
2343
2343
initialised_ = true ;
2344
2344
return true ;
2345
2345
}
@@ -2348,7 +2348,7 @@ class Decipher : public ObjectWrap {
2348
2348
bool DecipherInitIv (char * cipherType,
2349
2349
char * key,
2350
2350
int key_len,
2351
- char * iv,
2351
+ char * iv,
2352
2352
int iv_len) {
2353
2353
cipher_ = EVP_get_cipherbyname (cipherType);
2354
2354
if (!cipher_) {
@@ -2370,8 +2370,8 @@ class Decipher : public ObjectWrap {
2370
2370
return false ;
2371
2371
}
2372
2372
EVP_CipherInit_ex (&ctx, NULL , NULL ,
2373
- (unsigned char *)key,
2374
- (unsigned char *)iv, false );
2373
+ (unsigned char *)key,
2374
+ (unsigned char *)iv, false );
2375
2375
initialised_ = true ;
2376
2376
return true ;
2377
2377
}
@@ -2525,13 +2525,13 @@ class Decipher : public ObjectWrap {
2525
2525
char * buf;
2526
2526
// if alloc_buf then buf must be deleted later
2527
2527
bool alloc_buf = false ;
2528
- char * buffer_data = Buffer::Data (args[0 ]);
2528
+ char * buffer_data = Buffer::Data (args[0 ]);
2529
2529
size_t buffer_length = Buffer::Length (args[0 ]);
2530
2530
2531
2531
buf = buffer_data;
2532
2532
len = buffer_length;
2533
2533
2534
- unsigned char * out=0 ;
2534
+ unsigned char * out=0 ;
2535
2535
int out_len=0 ;
2536
2536
int r = cipher->DecipherUpdate (buf, len, &out, &out_len);
2537
2537
@@ -2717,7 +2717,7 @@ class Hmac : public ObjectWrap {
2717
2717
2718
2718
int r;
2719
2719
2720
- char * buffer_data = Buffer::Data (args[0 ]);
2720
+ char * buffer_data = Buffer::Data (args[0 ]);
2721
2721
size_t buffer_length = Buffer::Length (args[0 ]);
2722
2722
2723
2723
r = hmac->HmacUpdate (buffer_data, buffer_length);
@@ -2832,7 +2832,7 @@ class Hash : public ObjectWrap {
2832
2832
2833
2833
int r;
2834
2834
2835
- char * buffer_data = Buffer::Data (args[0 ]);
2835
+ char * buffer_data = Buffer::Data (args[0 ]);
2836
2836
size_t buffer_length = Buffer::Length (args[0 ]);
2837
2837
r = hash->HashUpdate (buffer_data, buffer_length);
2838
2838
@@ -2984,7 +2984,7 @@ class Sign : public ObjectWrap {
2984
2984
2985
2985
int r;
2986
2986
2987
- char * buffer_data = Buffer::Data (args[0 ]);
2987
+ char * buffer_data = Buffer::Data (args[0 ]);
2988
2988
size_t buffer_length = Buffer::Length (args[0 ]);
2989
2989
2990
2990
r = sign->SignUpdate (buffer_data, buffer_length);
@@ -3195,7 +3195,7 @@ class Verify : public ObjectWrap {
3195
3195
3196
3196
int r;
3197
3197
3198
- char * buffer_data = Buffer::Data (args[0 ]);
3198
+ char * buffer_data = Buffer::Data (args[0 ]);
3199
3199
size_t buffer_length = Buffer::Length (args[0 ]);
3200
3200
3201
3201
r = verify->VerifyUpdate (buffer_data, buffer_length);
@@ -3236,7 +3236,7 @@ class Verify : public ObjectWrap {
3236
3236
}
3237
3237
3238
3238
unsigned char * hbuf = new unsigned char [hlen];
3239
- ssize_t hwritten = DecodeWrite ((char *)hbuf, hlen, args[1 ], BINARY);
3239
+ ssize_t hwritten = DecodeWrite ((char *)hbuf, hlen, args[1 ], BINARY);
3240
3240
assert (hwritten == hlen);
3241
3241
3242
3242
int r=-1 ;
0 commit comments