Revert syntactic/style changes

So actual changes aren't obfuscated
This commit is contained in:
Willem Toorop 2015-12-17 12:37:33 +01:00
parent 0d6d8116bc
commit a2e15a169d
3 changed files with 54 additions and 58 deletions

View File

@ -429,8 +429,6 @@ case "$enable_stub_only" in
;; ;;
esac esac
# search to set include and library paths right # search to set include and library paths right
# find libidn # find libidn
my_with_libidn=1 my_with_libidn=1

View File

@ -1920,7 +1920,8 @@ invalid_parameter:
error: error:
_getdns_upstreams_dereference(upstreams); _getdns_upstreams_dereference(upstreams);
return GETDNS_RETURN_CONTEXT_UPDATE_FAIL; return GETDNS_RETURN_CONTEXT_UPDATE_FAIL;
} } /* getdns_context_set_upstream_recursive_servers */
static void static void
set_ub_edns_maximum_udp_payload_size(struct getdns_context* context, set_ub_edns_maximum_udp_payload_size(struct getdns_context* context,
@ -2364,16 +2365,13 @@ _getdns_context_prepare_for_resolution(struct getdns_context *context,
/* Be strict and only use the cipher suites recommended in RFC7525 /* Be strict and only use the cipher suites recommended in RFC7525
Unless we later fallback to opportunistic. */ Unless we later fallback to opportunistic. */
const char* const PREFERRED_CIPHERS = "EECDH+aRSA+AESGCM:EECDH+aECDSA+AESGCM:EDH+aRSA+AESGCM"; const char* const PREFERRED_CIPHERS = "EECDH+aRSA+AESGCM:EECDH+aECDSA+AESGCM:EDH+aRSA+AESGCM";
if (!SSL_CTX_set_cipher_list(context->tls_ctx, PREFERRED_CIPHERS)) { if (!SSL_CTX_set_cipher_list(context->tls_ctx, PREFERRED_CIPHERS))
return GETDNS_RETURN_BAD_CONTEXT; return GETDNS_RETURN_BAD_CONTEXT;
} if (!SSL_CTX_set_default_verify_paths(context->tls_ctx))
if (!SSL_CTX_set_default_verify_paths(context->tls_ctx)) {
return GETDNS_RETURN_BAD_CONTEXT; return GETDNS_RETURN_BAD_CONTEXT;
}
#else #else
if (tls_only_is_in_transports_list(context) == 1) { if (tls_only_is_in_transports_list(context) == 1)
return GETDNS_RETURN_BAD_CONTEXT; return GETDNS_RETURN_BAD_CONTEXT;
}
/* A null tls_ctx will make TLS fail and fallback to the other /* A null tls_ctx will make TLS fail and fallback to the other
transports will kick-in.*/ transports will kick-in.*/
#endif #endif

View File

@ -1374,7 +1374,7 @@ stub_tcp_read_cb(void *userarg)
int q; int q;
switch ((q = stub_tcp_read(netreq->fd, &netreq->tcp, switch ((q = stub_tcp_read(netreq->fd, &netreq->tcp,
&dnsreq->context->mf, &netreq->event))) { &dnsreq->context->mf))) {
case STUB_TCP_AGAIN: case STUB_TCP_AGAIN:
return; return;
@ -1452,7 +1452,7 @@ upstream_read_cb(void *userarg)
&upstream->upstreams->mf); &upstream->upstreams->mf);
else else
q = stub_tcp_read(upstream->fd, &upstream->tcp, q = stub_tcp_read(upstream->fd, &upstream->tcp,
&upstream->upstreams->mf, &netreq->event); &upstream->upstreams->mf);
switch (q) { switch (q) {
case STUB_TCP_AGAIN: case STUB_TCP_AGAIN: