@@ -311,7 +311,7 @@ bool EntropySource(unsigned char* buffer, size_t length) {
311
311
312
312
313
313
void SecureContext::Initialize (Environment* env, Local<Object> target) {
314
- Local<FunctionTemplate> t = env->NewFunctionTemplate (SecureContext:: New);
314
+ Local<FunctionTemplate> t = env->NewFunctionTemplate (New);
315
315
t->InstanceTemplate ()->SetInternalFieldCount (1 );
316
316
Local<String> secureContextString =
317
317
FIXED_ONE_BYTE_STRING (env->isolate (), " SecureContext" );
@@ -464,8 +464,7 @@ void SecureContext::Init(const FunctionCallbackInfo<Value>& args) {
464
464
RAND_bytes (sc->ticket_key_aes_ , sizeof (sc->ticket_key_aes_ )) <= 0 ) {
465
465
return env->ThrowError (" Error generating ticket keys" );
466
466
}
467
- SSL_CTX_set_tlsext_ticket_key_cb (sc->ctx_ .get (),
468
- SecureContext::TicketCompatibilityCallback);
467
+ SSL_CTX_set_tlsext_ticket_key_cb (sc->ctx_ .get (), TicketCompatibilityCallback);
469
468
}
470
469
471
470
@@ -1916,8 +1915,7 @@ void SSLWrap<Base>::SetSession(const FunctionCallbackInfo<Value>& args) {
1916
1915
sbuf.assign (p, p + slen);
1917
1916
1918
1917
const unsigned char * p = reinterpret_cast <const unsigned char *>(sbuf.data ());
1919
- SSLSessionPointer sess (
1920
- d2i_SSL_SESSION (nullptr , &p, slen));
1918
+ SSLSessionPointer sess (d2i_SSL_SESSION (nullptr , &p, slen));
1921
1919
1922
1920
if (sess == nullptr )
1923
1921
return ;
@@ -2020,8 +2018,7 @@ void SSLWrap<Base>::NewSessionDone(const FunctionCallbackInfo<Value>& args) {
2020
2018
2021
2019
2022
2020
template <class Base >
2023
- void SSLWrap<Base>::SetOCSPResponse(
2024
- const v8::FunctionCallbackInfo<v8::Value>& args) {
2021
+ void SSLWrap<Base>::SetOCSPResponse(const FunctionCallbackInfo<Value>& args) {
2025
2022
#ifdef NODE__HAVE_TLSEXT_STATUS_CB
2026
2023
Base* w;
2027
2024
ASSIGN_OR_RETURN_UNWRAP (&w, args.Holder ());
@@ -2038,8 +2035,7 @@ void SSLWrap<Base>::SetOCSPResponse(
2038
2035
2039
2036
2040
2037
template <class Base >
2041
- void SSLWrap<Base>::RequestOCSP(
2042
- const v8::FunctionCallbackInfo<v8::Value>& args) {
2038
+ void SSLWrap<Base>::RequestOCSP(const FunctionCallbackInfo<Value>& args) {
2043
2039
#ifdef NODE__HAVE_TLSEXT_STATUS_CB
2044
2040
Base* w;
2045
2041
ASSIGN_OR_RETURN_UNWRAP (&w, args.Holder ());
@@ -2051,7 +2047,7 @@ void SSLWrap<Base>::RequestOCSP(
2051
2047
2052
2048
template <class Base >
2053
2049
void SSLWrap<Base>::GetEphemeralKeyInfo(
2054
- const v8:: FunctionCallbackInfo<v8:: Value>& args) {
2050
+ const FunctionCallbackInfo<Value>& args) {
2055
2051
Base* w;
2056
2052
ASSIGN_OR_RETURN_UNWRAP (&w, args.Holder ());
2057
2053
Environment* env = Environment::GetCurrent (args);
@@ -2111,7 +2107,7 @@ void SSLWrap<Base>::GetEphemeralKeyInfo(
2111
2107
#ifdef SSL_set_max_send_fragment
2112
2108
template <class Base >
2113
2109
void SSLWrap<Base>::SetMaxSendFragment(
2114
- const v8:: FunctionCallbackInfo<v8:: Value>& args) {
2110
+ const FunctionCallbackInfo<Value>& args) {
2115
2111
CHECK (args.Length () >= 1 && args[0 ]->IsNumber ());
2116
2112
2117
2113
Base* w;
@@ -2265,7 +2261,7 @@ int SSLWrap<Base>::SelectALPNCallback(SSL* s,
2265
2261
2266
2262
template <class Base >
2267
2263
void SSLWrap<Base>::GetALPNNegotiatedProto(
2268
- const FunctionCallbackInfo<v8:: Value>& args) {
2264
+ const FunctionCallbackInfo<Value>& args) {
2269
2265
#ifdef TLSEXT_TYPE_application_layer_protocol_negotiation
2270
2266
Base* w;
2271
2267
ASSIGN_OR_RETURN_UNWRAP (&w, args.Holder ());
@@ -2285,8 +2281,7 @@ void SSLWrap<Base>::GetALPNNegotiatedProto(
2285
2281
2286
2282
2287
2283
template <class Base >
2288
- void SSLWrap<Base>::SetALPNProtocols(
2289
- const FunctionCallbackInfo<v8::Value>& args) {
2284
+ void SSLWrap<Base>::SetALPNProtocols(const FunctionCallbackInfo<Value>& args) {
2290
2285
#ifdef TLSEXT_TYPE_application_layer_protocol_negotiation
2291
2286
Base* w;
2292
2287
ASSIGN_OR_RETURN_UNWRAP (&w, args.Holder ());
@@ -3162,7 +3157,7 @@ void CipherBase::Final(const FunctionCallbackInfo<Value>& args) {
3162
3157
}
3163
3158
3164
3159
3165
- void Hmac::Initialize (Environment* env, v8::Local<v8:: Object> target) {
3160
+ void Hmac::Initialize (Environment* env, v8::Local<Object> target) {
3166
3161
Local<FunctionTemplate> t = env->NewFunctionTemplate (New);
3167
3162
3168
3163
t->InstanceTemplate ()->SetInternalFieldCount (1 );
@@ -3282,7 +3277,7 @@ void Hmac::HmacDigest(const FunctionCallbackInfo<Value>& args) {
3282
3277
}
3283
3278
3284
3279
3285
- void Hash::Initialize (Environment* env, v8::Local<v8:: Object> target) {
3280
+ void Hash::Initialize (Environment* env, v8::Local<Object> target) {
3286
3281
Local<FunctionTemplate> t = env->NewFunctionTemplate (New);
3287
3282
3288
3283
t->InstanceTemplate ()->SetInternalFieldCount (1 );
@@ -3474,7 +3469,7 @@ static bool ApplyRSAOptions(const EVPKeyPointer& pkey,
3474
3469
3475
3470
3476
3471
3477
- void Sign::Initialize (Environment* env, v8::Local<v8:: Object> target) {
3472
+ void Sign::Initialize (Environment* env, v8::Local<Object> target) {
3478
3473
Local<FunctionTemplate> t = env->NewFunctionTemplate (New);
3479
3474
3480
3475
t->InstanceTemplate ()->SetInternalFieldCount (1 );
@@ -3640,7 +3635,7 @@ void Sign::SignFinal(const FunctionCallbackInfo<Value>& args) {
3640
3635
}
3641
3636
3642
3637
3643
- void Verify::Initialize (Environment* env, v8::Local<v8:: Object> target) {
3638
+ void Verify::Initialize (Environment* env, v8::Local<Object> target) {
3644
3639
Local<FunctionTemplate> t = env->NewFunctionTemplate (New);
3645
3640
3646
3641
t->InstanceTemplate ()->SetInternalFieldCount (1 );
@@ -4220,7 +4215,7 @@ void DiffieHellman::ComputeSecret(const FunctionCallbackInfo<Value>& args) {
4220
4215
Buffer::New (env->isolate (), data.release (), data.size ).ToLocalChecked ());
4221
4216
}
4222
4217
4223
- void DiffieHellman::SetKey (const v8::FunctionCallbackInfo<v8:: Value>& args,
4218
+ void DiffieHellman::SetKey (const v8::FunctionCallbackInfo<Value>& args,
4224
4219
int (*set_field)(DH*, BIGNUM*), const char* what) {
4225
4220
Environment* env = Environment::GetCurrent (args);
4226
4221
0 commit comments