aboutsummaryrefslogtreecommitdiff
path: root/src/gns/test_gns_proxy.c
diff options
context:
space:
mode:
authorChristian Grothoff <christian@grothoff.org>2013-10-06 20:55:28 +0000
committerChristian Grothoff <christian@grothoff.org>2013-10-06 20:55:28 +0000
commit61c39c60565b386e0e12ea669556b030e8cd7180 (patch)
tree59109aeab8297bdc996faca8c4e38ec7426c36cf /src/gns/test_gns_proxy.c
parent780eb09dd8040ecf8649d40ddf8314464e0fc48e (diff)
downloadgnunet-61c39c60565b386e0e12ea669556b030e8cd7180.tar.gz
gnunet-61c39c60565b386e0e12ea669556b030e8cd7180.zip
-remove trailing whitespace
Diffstat (limited to 'src/gns/test_gns_proxy.c')
-rw-r--r--src/gns/test_gns_proxy.c26
1 files changed, 13 insertions, 13 deletions
diff --git a/src/gns/test_gns_proxy.c b/src/gns/test_gns_proxy.c
index 16c94eced..8563eda2f 100644
--- a/src/gns/test_gns_proxy.c
+++ b/src/gns/test_gns_proxy.c
@@ -220,9 +220,9 @@ curl_main ()
220 } 220 }
221 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Download complete, shutting down!\n"); 221 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Download complete, shutting down!\n");
222 do_shutdown (); 222 do_shutdown ();
223 return; 223 return;
224 } 224 }
225 GNUNET_assert (CURLM_OK == curl_multi_fdset (multi, &rs, &ws, &es, &max)); 225 GNUNET_assert (CURLM_OK == curl_multi_fdset (multi, &rs, &ws, &es, &max));
226 if ( (CURLM_OK != curl_multi_timeout (multi, &timeout)) || 226 if ( (CURLM_OK != curl_multi_timeout (multi, &timeout)) ||
227 (-1 == timeout) ) 227 (-1 == timeout) )
228 delay = GNUNET_TIME_UNIT_SECONDS; 228 delay = GNUNET_TIME_UNIT_SECONDS;
@@ -239,13 +239,13 @@ curl_main ()
239 &nrs, 239 &nrs,
240 &nws, 240 &nws,
241 &curl_task, 241 &curl_task,
242 NULL); 242 NULL);
243} 243}
244 244
245static void 245static void
246start_curl (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc) 246start_curl (void *cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
247{ 247{
248 GNUNET_asprintf (&url, 248 GNUNET_asprintf (&url,
249 "http://%s:%d/hello_world", 249 "http://%s:%d/hello_world",
250 TEST_DOMAIN, PORT); 250 TEST_DOMAIN, PORT);
251 curl = curl_easy_init (); 251 curl = curl_easy_init ();
@@ -280,7 +280,7 @@ disco_ns (void* cls, const struct GNUNET_SCHEDULER_TaskContext *tc)
280 * will match 'result_af' from the request 280 * will match 'result_af' from the request
281 * @param address IP address (struct in_addr or struct in_addr6, depending on 'af') 281 * @param address IP address (struct in_addr or struct in_addr6, depending on 'af')
282 * that the VPN allocated for the redirection; 282 * that the VPN allocated for the redirection;
283 * traffic to this IP will now be redirected to the 283 * traffic to this IP will now be redirected to the
284 * specified target peer; NULL on error 284 * specified target peer; NULL on error
285 */ 285 */
286static void 286static void
@@ -290,12 +290,12 @@ commence_testing (void *cls, int32_t success, const char *emsg)
290 290
291 if ((emsg != NULL) && (GNUNET_YES != success)) 291 if ((emsg != NULL) && (GNUNET_YES != success))
292 { 292 {
293 fprintf (stderr, 293 fprintf (stderr,
294 "NS failed to create record %s\n", emsg); 294 "NS failed to create record %s\n", emsg);
295 GNUNET_SCHEDULER_shutdown (); 295 GNUNET_SCHEDULER_shutdown ();
296 return; 296 return;
297 } 297 }
298 298
299 GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_SECONDS, 1), start_curl, NULL); 299 GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_relative_multiply (GNUNET_TIME_UNIT_SECONDS, 1), start_curl, NULL);
300 300
301} 301}
@@ -306,7 +306,7 @@ commence_testing (void *cls, int32_t success, const char *emsg)
306/** 306/**
307 * Function to keep the HTTP server running. 307 * Function to keep the HTTP server running.
308 */ 308 */
309static void 309static void
310mhd_main (void); 310mhd_main (void);
311 311
312 312
@@ -320,7 +320,7 @@ mhd_task (void *cls,
320} 320}
321 321
322 322
323static void 323static void
324mhd_main () 324mhd_main ()
325{ 325{
326 struct GNUNET_NETWORK_FDSet nrs; 326 struct GNUNET_NETWORK_FDSet nrs;
@@ -355,7 +355,7 @@ mhd_main ()
355 &nrs, 355 &nrs,
356 &nws, 356 &nws,
357 &mhd_task, 357 &mhd_task,
358 NULL); 358 NULL);
359} 359}
360 360
361static void 361static void
@@ -367,7 +367,7 @@ run (void *cls,
367 struct GNUNET_CRYPTO_EccPrivateKey *host_key; 367 struct GNUNET_CRYPTO_EccPrivateKey *host_key;
368 struct GNUNET_NAMESTORE_RecordData rd; 368 struct GNUNET_NAMESTORE_RecordData rd;
369 char *zone_keyfile; 369 char *zone_keyfile;
370 370
371 namestore = GNUNET_NAMESTORE_connect (cfg); 371 namestore = GNUNET_NAMESTORE_connect (cfg);
372 GNUNET_assert (NULL != namestore); 372 GNUNET_assert (NULL != namestore);
373 flags = MHD_USE_DEBUG; 373 flags = MHD_USE_DEBUG;
@@ -396,7 +396,7 @@ run (void *cls,
396 do_shutdown (); 396 do_shutdown ();
397 return; 397 return;
398 } 398 }
399 399
400 proxy_proc = GNUNET_OS_start_process (GNUNET_NO, 400 proxy_proc = GNUNET_OS_start_process (GNUNET_NO,
401 GNUNET_OS_INHERIT_STD_ALL, 401 GNUNET_OS_INHERIT_STD_ALL,
402 NULL, 402 NULL,
@@ -412,7 +412,7 @@ run (void *cls,
412 do_shutdown (); 412 do_shutdown ();
413 return; 413 return;
414 } 414 }
415 415
416 if (GNUNET_OK != GNUNET_CONFIGURATION_get_value_filename (cfg, "gns", 416 if (GNUNET_OK != GNUNET_CONFIGURATION_get_value_filename (cfg, "gns",
417 "ZONEKEY", 417 "ZONEKEY",
418 &zone_keyfile)) 418 &zone_keyfile))