From d17a17ea785f91c18b5694eab3372c4e4564d95e Mon Sep 17 00:00:00 2001 From: Christian Grothoff Date: Sun, 24 Nov 2019 19:13:00 +0100 Subject: fix pointer indentation --- src/util/crypto_abe.c | 20 ++++++++++---------- src/util/crypto_ecc_dlog.c | 4 ++-- src/util/crypto_hash.c | 4 ++-- src/util/gnunet-resolver.c | 2 +- src/util/test_common_logging_runtime_loglevels.c | 6 +++--- src/util/test_socks.c | 2 +- 6 files changed, 19 insertions(+), 19 deletions(-) (limited to 'src/util') diff --git a/src/util/crypto_abe.c b/src/util/crypto_abe.c index 97ff01680..c089b29db 100644 --- a/src/util/crypto_abe.c +++ b/src/util/crypto_abe.c @@ -55,7 +55,7 @@ init_aes (element_t k, int enc, unsigned char*key_buf; key_len = element_length_in_bytes (k) < 33 ? 3 : element_length_in_bytes (k); - key_buf = (unsigned char*) malloc (key_len); + key_buf = (unsigned char *) malloc (key_len); element_to_bytes (key_buf, k); GNUNET_memcpy (key->aes_key, @@ -219,15 +219,15 @@ write_cpabe (void **result, *result = GNUNET_malloc (12 + cph_buf_len + aes_buf_len); ptr = *result; - len = (uint32_t*) ptr; + len = (uint32_t *) ptr; *len = htonl (file_len); ptr += 4; - len = (uint32_t*) ptr; + len = (uint32_t *) ptr; *len = htonl (aes_buf_len); ptr += 4; GNUNET_memcpy (ptr, aes_buf, aes_buf_len); ptr += aes_buf_len; - len = (uint32_t*) ptr; + len = (uint32_t *) ptr; *len = htonl (cph_buf_len); ptr += 4; GNUNET_memcpy (ptr, cph_buf, cph_buf_len); @@ -246,17 +246,17 @@ read_cpabe (const void *data, char *ptr; uint32_t *len; - ptr = (char*) data; - len = (uint32_t*) ptr; + ptr = (char *) data; + len = (uint32_t *) ptr; buf_len = ntohl (*len); ptr += 4; - len = (uint32_t*) ptr; + len = (uint32_t *) ptr; *aes_buf_len = ntohl (*len); ptr += 4; *aes_buf = GNUNET_malloc (*aes_buf_len); GNUNET_memcpy (*aes_buf, ptr, *aes_buf_len); ptr += *aes_buf_len; - len = (uint32_t*) ptr; + len = (uint32_t *) ptr; *cph_buf_len = ntohl (*len); ptr += 4; *cph_buf = GNUNET_malloc (*cph_buf_len); @@ -282,7 +282,7 @@ GNUNET_CRYPTO_cpabe_encrypt (const void *block, int aes_buf_len; ssize_t result_len; - if (! (cph = gabe_enc (key->pub, m, (char*) policy))) + if (! (cph = gabe_enc (key->pub, m, (char *) policy))) return GNUNET_SYSERR; cph_buf_len = gabe_cph_serialize (cph, &cph_buf); @@ -329,7 +329,7 @@ GNUNET_CRYPTO_cpabe_decrypt (const void *block, } gabe_cph_free (cph); GNUNET_free (cph); - plt_len = aes_128_cbc_decrypt (aes_buf, aes_buf_size, m, (char**) result); + plt_len = aes_128_cbc_decrypt (aes_buf, aes_buf_size, m, (char **) result); GNUNET_free (cph_buf); GNUNET_free (aes_buf); element_clear (m); diff --git a/src/util/crypto_ecc_dlog.c b/src/util/crypto_ecc_dlog.c index 6b0dc3503..408d64e58 100644 --- a/src/util/crypto_ecc_dlog.c +++ b/src/util/crypto_ecc_dlog.c @@ -189,7 +189,7 @@ GNUNET_CRYPTO_ecc_dlog_prepare (unsigned int max, GNUNET_assert (GNUNET_OK == GNUNET_CONTAINER_multipeermap_put (edc->map, &key, - (void*) (long) i + max, + (void *) (long) i + max, GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY)); } /* negative values */ @@ -203,7 +203,7 @@ GNUNET_CRYPTO_ecc_dlog_prepare (unsigned int max, GNUNET_assert (GNUNET_OK == GNUNET_CONTAINER_multipeermap_put (edc->map, &key, - (void*) (long) max - i, + (void *) (long) max - i, GNUNET_CONTAINER_MULTIHASHMAPOPTION_UNIQUE_ONLY)); } gcry_mpi_release (fact); diff --git a/src/util/crypto_hash.c b/src/util/crypto_hash.c index 2bf03db58..c41c419ff 100644 --- a/src/util/crypto_hash.c +++ b/src/util/crypto_hash.c @@ -105,7 +105,7 @@ GNUNET_CRYPTO_hash_from_string2 (const char *enc, GNUNET_STRINGS_utf8_toupper (enc, up_ptr); return GNUNET_STRINGS_string_to_data (upper_enc, enclen, - (unsigned char*) result, + (unsigned char *) result, sizeof(struct GNUNET_HashCode)); } @@ -439,7 +439,7 @@ GNUNET_CRYPTO_hmac (const struct GNUNET_CRYPTO_AuthKey *key, const void *plaintext, size_t plaintext_len, struct GNUNET_HashCode *hmac) { - GNUNET_CRYPTO_hmac_raw ((void*) key->key, sizeof(key->key), + GNUNET_CRYPTO_hmac_raw ((void *) key->key, sizeof(key->key), plaintext, plaintext_len, hmac); } diff --git a/src/util/gnunet-resolver.c b/src/util/gnunet-resolver.c index d2f3acd45..6a602c64e 100644 --- a/src/util/gnunet-resolver.c +++ b/src/util/gnunet-resolver.c @@ -178,7 +178,7 @@ main (int argc, char *const *argv) GNUNET_PROGRAM_run (argc, argv, "gnunet-resolver [hostname]", gettext_noop ("Use build-in GNUnet stub resolver"), options, &run, NULL)) ? 0 : 1; - GNUNET_free ((void*) argv); + GNUNET_free ((void *) argv); return ret; } diff --git a/src/util/test_common_logging_runtime_loglevels.c b/src/util/test_common_logging_runtime_loglevels.c index 2f5efa198..e6d83d52c 100644 --- a/src/util/test_common_logging_runtime_loglevels.c +++ b/src/util/test_common_logging_runtime_loglevels.c @@ -207,7 +207,7 @@ read_output_line (int phase_from1, int phase_to1, int phase_from2, */ #define LOG_MAX_LINE_LENGTH (17) -#define LOG_BUFFER_SIZE LOG_MAX_NUM_LINES *LOG_MAX_LINE_LENGTH +#define LOG_BUFFER_SIZE LOG_MAX_NUM_LINES * LOG_MAX_LINE_LENGTH static char buf[LOG_BUFFER_SIZE]; @@ -238,7 +238,7 @@ read_call (void *cls) read_task = GNUNET_SCHEDULER_add_read_file (GNUNET_TIME_UNIT_FOREVER_REL, stdout_read_handle, &read_call, - (void*) stdout_read_handle); + (void *) stdout_read_handle); return; } @@ -430,7 +430,7 @@ runone () read_task = GNUNET_SCHEDULER_add_read_file (GNUNET_TIME_UNIT_FOREVER_REL, stdout_read_handle, &read_call, - (void*) stdout_read_handle); + (void *) stdout_read_handle); } diff --git a/src/util/test_socks.c b/src/util/test_socks.c index f7e0596eb..c5a703db4 100644 --- a/src/util/test_socks.c +++ b/src/util/test_socks.c @@ -193,7 +193,7 @@ main (int argc, char *argv[]) "-o", "BatchMode yes", "-o", "UserKnownHostsFile /tmp/gnunet_test_socks_ssh_garbage", "-o", "StrictHostKeyChecking no", - "127.0.0.1", "-N", (char*) NULL); + "127.0.0.1", "-N", (char *) NULL); perror ( "execlp (\"ssh\",\"ssh\",...,\"-D\",\"1081\",\"127.0.0.1\",\"-N\") "); printf ("" -- cgit v1.2.3