@@ -153,7 +153,7 @@ template int SSLWrap<TLSWrap>::SelectALPNCallback(
153
153
#endif // TLSEXT_TYPE_application_layer_protocol_negotiation
154
154
155
155
156
- static int PasswordCallback (char * buf, int size, int rwflag, void * u) {
156
+ static int PasswordCallback (char * buf, int size, int rwflag, void * u) {
157
157
if (u) {
158
158
size_t buflen = static_cast <size_t >(size);
159
159
size_t len = strlen (static_cast <const char *>(u));
@@ -206,7 +206,7 @@ static ENGINE* LoadEngineById(const char* engine_id, char (*errmsg)[1024]) {
206
206
// for the OpenSSL CLI, but works poorly for Node.js because it involves
207
207
// synchronous interaction with the controlling terminal, something we never
208
208
// want, and use this function to avoid it.
209
- static int NoPasswordCallback (char * buf, int size, int rwflag, void * u) {
209
+ static int NoPasswordCallback (char * buf, int size, int rwflag, void * u) {
210
210
return 0 ;
211
211
}
212
212
@@ -726,7 +726,7 @@ static X509_STORE* NewRootCertStore() {
726
726
if (root_certs_vector.empty ()) {
727
727
for (size_t i = 0 ; i < arraysize (root_certs); i++) {
728
728
BIO* bp = NodeBIO::NewFixed (root_certs[i], strlen (root_certs[i]));
729
- X509 * x509 = PEM_read_bio_X509 (bp, nullptr , NoPasswordCallback, nullptr );
729
+ X509* x509 = PEM_read_bio_X509 (bp, nullptr , NoPasswordCallback, nullptr );
730
730
BIO_free (bp);
731
731
732
732
// Parse errors from the built-in roots are fatal.
@@ -743,7 +743,7 @@ static X509_STORE* NewRootCertStore() {
743
743
if (ssl_openssl_cert_store) {
744
744
X509_STORE_set_default_paths (store);
745
745
} else {
746
- for (X509 * cert : root_certs_vector) {
746
+ for (X509* cert : root_certs_vector) {
747
747
X509_up_ref (cert);
748
748
X509_STORE_add_cert (store, cert);
749
749
}
@@ -1994,7 +1994,7 @@ void SSLWrap<Base>::GetTLSTicket(const FunctionCallbackInfo<Value>& args) {
1994
1994
if (sess == nullptr )
1995
1995
return ;
1996
1996
1997
- const unsigned char * ticket;
1997
+ const unsigned char * ticket;
1998
1998
size_t length;
1999
1999
SSL_SESSION_get0_ticket (sess, &ticket, &length);
2000
2000
@@ -2771,7 +2771,7 @@ static bool IsValidGCMTagLength(unsigned int tag_len) {
2771
2771
return tag_len == 4 || tag_len == 8 || (tag_len >= 12 && tag_len <= 16 );
2772
2772
}
2773
2773
2774
- bool CipherBase::InitAuthenticated (const char * cipher_type, int iv_len,
2774
+ bool CipherBase::InitAuthenticated (const char * cipher_type, int iv_len,
2775
2775
unsigned int auth_tag_len) {
2776
2776
CHECK (IsAuthenticatedMode ());
2777
2777
@@ -3085,7 +3085,7 @@ void CipherBase::SetAutoPadding(const FunctionCallbackInfo<Value>& args) {
3085
3085
}
3086
3086
3087
3087
3088
- bool CipherBase::Final (unsigned char ** out, int * out_len) {
3088
+ bool CipherBase::Final (unsigned char ** out, int * out_len) {
3089
3089
if (!ctx_)
3090
3090
return false ;
3091
3091
0 commit comments