Mercurial > hg > nginx
changeset 9015:a2fbae359828 quic
QUIC: fixed indentation.
author | Sergey Kandaurov <pluknet@nginx.com> |
---|---|
date | Wed, 16 Feb 2022 15:45:47 +0300 |
parents | 8d11e2171697 |
children | 55b38514729b |
files | src/event/quic/bpf/ngx_quic_reuseport_helper.c src/event/quic/ngx_event_quic.c src/event/quic/ngx_event_quic_ack.c src/event/quic/ngx_event_quic_migration.c src/event/quic/ngx_event_quic_socket.c src/event/quic/ngx_event_quic_ssl.c src/event/quic/ngx_event_quic_tokens.c src/event/quic/ngx_event_quic_transport.c |
diffstat | 8 files changed, 22 insertions(+), 22 deletions(-) [+] |
line wrap: on
line diff
--- a/src/event/quic/bpf/ngx_quic_reuseport_helper.c Mon Feb 14 14:54:34 2022 +0300 +++ b/src/event/quic/bpf/ngx_quic_reuseport_helper.c Wed Feb 16 15:45:47 2022 +0300 @@ -126,7 +126,7 @@ default: debugmsg("nginx quic bpf_sk_select_reuseport err: %d key 0x%llx", - rc, key); + rc, key); goto failed; }
--- a/src/event/quic/ngx_event_quic.c Mon Feb 14 14:54:34 2022 +0300 +++ b/src/event/quic/ngx_event_quic.c Wed Feb 16 15:45:47 2022 +0300 @@ -491,9 +491,9 @@ /* this case also handles some errors from ngx_quic_run() */ - ngx_log_debug2(NGX_LOG_DEBUG_EVENT, c->log, 0, - "quic close silent drain:%d timedout:%d", - qc->draining, c->read->timedout); + ngx_log_debug2(NGX_LOG_DEBUG_EVENT, c->log, 0, + "quic close silent drain:%d timedout:%d", + qc->draining, c->read->timedout); } else { /* @@ -816,7 +816,7 @@ { /* packet comes from unknown path, possibly migration */ ngx_log_debug0(NGX_LOG_DEBUG_EVENT, c->log, 0, - "quic too early migration attempt"); + "quic too early migration attempt"); return NGX_DONE; } }
--- a/src/event/quic/ngx_event_quic_ack.c Mon Feb 14 14:54:34 2022 +0300 +++ b/src/event/quic/ngx_event_quic_ack.c Wed Feb 16 15:45:47 2022 +0300 @@ -834,7 +834,7 @@ for (i = 0; i < NGX_QUIC_SEND_CTX_LAST; i++) { - ctx = &qc->send_ctx[i]; + ctx = &qc->send_ctx[i]; if (ngx_queue_empty(&ctx->sent)) { continue; @@ -1166,7 +1166,7 @@ return NGX_OK; } - if (ctx->level == ssl_encryption_application) { + if (ctx->level == ssl_encryption_application) { delay = ngx_current_msec - ctx->ack_delay_start; qc = ngx_quic_get_connection(c);
--- a/src/event/quic/ngx_event_quic_migration.c Mon Feb 14 14:54:34 2022 +0300 +++ b/src/event/quic/ngx_event_quic_migration.c Wed Feb 16 15:45:47 2022 +0300 @@ -108,7 +108,7 @@ } ngx_log_debug0(NGX_LOG_DEBUG_EVENT, c->log, 0, - "quic stale PATH_RESPONSE ignored"); + "quic stale PATH_RESPONSE ignored"); return NGX_OK; @@ -387,7 +387,7 @@ { size_t len; - ngx_memcpy(c->sockaddr, path->sockaddr, path->socklen); + ngx_memcpy(c->sockaddr, path->sockaddr, path->socklen); c->socklen = path->socklen; if (c->addr_text.data) {
--- a/src/event/quic/ngx_event_quic_socket.c Mon Feb 14 14:54:34 2022 +0300 +++ b/src/event/quic/ngx_event_quic_socket.c Wed Feb 16 15:45:47 2022 +0300 @@ -38,7 +38,7 @@ qc->tp.original_dcid.len = pkt->odcid.len; qc->tp.original_dcid.data = ngx_pstrdup(c->pool, &pkt->odcid); if (qc->tp.original_dcid.data == NULL) { - return NGX_ERROR; + return NGX_ERROR; } /* socket to use for further processing (id auto-generated) */
--- a/src/event/quic/ngx_event_quic_ssl.c Mon Feb 14 14:54:34 2022 +0300 +++ b/src/event/quic/ngx_event_quic_ssl.c Wed Feb 16 15:45:47 2022 +0300 @@ -212,16 +212,16 @@ #if defined(TLSEXT_TYPE_application_layer_protocol_negotiation) - SSL_get0_alpn_selected(ssl_conn, &alpn_data, &alpn_len); + SSL_get0_alpn_selected(ssl_conn, &alpn_data, &alpn_len); - if (alpn_len == 0) { - qc->error = 0x100 + SSL_AD_NO_APPLICATION_PROTOCOL; - qc->error_reason = "unsupported protocol in ALPN extension"; + if (alpn_len == 0) { + qc->error = 0x100 + SSL_AD_NO_APPLICATION_PROTOCOL; + qc->error_reason = "unsupported protocol in ALPN extension"; - ngx_log_error(NGX_LOG_INFO, c->log, 0, - "quic unsupported protocol in ALPN extension"); - return 0; - } + ngx_log_error(NGX_LOG_INFO, c->log, 0, + "quic unsupported protocol in ALPN extension"); + return 0; + } #endif
--- a/src/event/quic/ngx_event_quic_tokens.c Mon Feb 14 14:54:34 2022 +0300 +++ b/src/event/quic/ngx_event_quic_tokens.c Wed Feb 16 15:45:47 2022 +0300 @@ -27,7 +27,7 @@ ngx_quic_new_sr_token(ngx_connection_t *c, ngx_str_t *cid, u_char *secret, u_char *token) { - ngx_str_t tmp; + ngx_str_t tmp; tmp.data = secret; tmp.len = NGX_QUIC_SR_KEY_LEN;
--- a/src/event/quic/ngx_event_quic_transport.c Mon Feb 14 14:54:34 2022 +0300 +++ b/src/event/quic/ngx_event_quic_transport.c Wed Feb 16 15:45:47 2022 +0300 @@ -588,7 +588,7 @@ /* flags, version, dcid and scid with lengths and zero-length token */ len = 5 + 2 + pkt->dcid.len + pkt->scid.len - + (pkt->level == ssl_encryption_initial ? 1 : 0); + + (pkt->level == ssl_encryption_initial ? 1 : 0); if (len > pkt_len) { return 0; @@ -1052,7 +1052,7 @@ goto error; } - p = ngx_quic_parse_int(p, end, &f->u.max_stream_data.limit); + p = ngx_quic_parse_int(p, end, &f->u.max_stream_data.limit); if (p == NULL) { goto error; } @@ -1555,7 +1555,7 @@ u_char *start; ngx_uint_t type; - type = ms->bidi ? NGX_QUIC_FT_MAX_STREAMS : NGX_QUIC_FT_MAX_STREAMS2; + type = ms->bidi ? NGX_QUIC_FT_MAX_STREAMS : NGX_QUIC_FT_MAX_STREAMS2; if (p == NULL) { len = ngx_quic_varint_len(type);