[sr-dev] git:master:8736b2dc: tls: fix line breaks

Phil Lavin phil.lavin at synety.com
Tue Mar 1 08:47:28 CET 2016


Module: kamailio
Branch: master
Commit: 8736b2dc8dcd5fd8ee253134b19cb8ce0aa1c0b4
URL: https://github.com/kamailio/kamailio/commit/8736b2dc8dcd5fd8ee253134b19cb8ce0aa1c0b4

Author: Phil Lavin <phil.lavin at synety.com>
Committer: Phil Lavin <phil.lavin at synety.com>
Date: 2016-02-24T12:21:42Z

tls: fix line breaks

- fix line breaks in previous logging commit

---

Modified: modules/tls/tls_server.c

---

Diff:  https://github.com/kamailio/kamailio/commit/8736b2dc8dcd5fd8ee253134b19cb8ce0aa1c0b4.diff
Patch: https://github.com/kamailio/kamailio/commit/8736b2dc8dcd5fd8ee253134b19cb8ce0aa1c0b4.patch

---

diff --git a/modules/tls/tls_server.c b/modules/tls/tls_server.c
index 3627f07..880fae2 100644
--- a/modules/tls/tls_server.c
+++ b/modules/tls/tls_server.c
@@ -186,7 +186,8 @@ static int tls_complete_init(struct tcp_connection* c)
 
 	if (LOW_MEM_NEW_CONNECTION_TEST()){
 		ERR("tls: ssl bug #1491 workaround: not enough memory for safe"
-				" operation: shm=%lu threshold1=%d\n", shm_available_safe(), cfg_get(tls, tls_cfg, low_mem_threshold1));
+				" operation: shm=%lu threshold1=%d\n", shm_available_safe(),
+				cfg_get(tls, tls_cfg, low_mem_threshold1));
 		goto error2;
 	}
 	     /* Get current TLS configuration and increase reference
@@ -294,7 +295,8 @@ static int tls_fix_connection_unsafe(struct tcp_connection* c)
 		}
 	}else if (unlikely(LOW_MEM_CONNECTED_TEST())){
 		ERR("tls: ssl bug #1491 workaround: not enough memory for safe"
-				" operation: shm=%lu threshold2=%d\n", shm_available_safe(), cfg_get(tls, tls_cfg, low_mem_threshold2));
+				" operation: shm=%lu threshold2=%d\n", shm_available_safe(),
+				cfg_get(tls, tls_cfg, low_mem_threshold2));
 		return -1;
 	}
 	return 0;
@@ -324,7 +326,8 @@ static int tls_fix_connection(struct tcp_connection* c)
 	}
 	if (unlikely(LOW_MEM_CONNECTED_TEST())){
 		ERR("tls: ssl bug #1491 workaround: not enough memory for safe"
-				" operation: shm=%lu threshold2=%d\n", shm_available_safe(), cfg_get(tls, tls_cfg, low_mem_threshold2));
+				" operation: shm=%lu threshold2=%d\n", shm_available_safe(),
+				cfg_get(tls, tls_cfg, low_mem_threshold2));
 		return -1;
 	}
 	return 0;
@@ -527,7 +530,8 @@ static int tls_shutdown(struct tcp_connection *c)
 		return 0;
 	if (unlikely(LOW_MEM_CONNECTED_TEST())){
 		ERR("tls: ssl bug #1491 workaround: not enough memory for safe"
-				" operation: shm=%lu threshold2=%d\n", shm_available_safe(), cfg_get(tls, tls_cfg, low_mem_threshold2));
+				" operation: shm=%lu threshold2=%d\n", shm_available_safe(),
+				cfg_get(tls, tls_cfg, low_mem_threshold2));
 		goto err;
 	}
 	




More information about the sr-dev mailing list