Module: kamailio
Branch: master
Commit: 8736b2dc8dcd5fd8ee253134b19cb8ce0aa1c0b4
URL: 
https://github.com/kamailio/kamailio/commit/8736b2dc8dcd5fd8ee253134b19cb8ce0aa1c0b4

Author: Phil Lavin <phil.la...@synety.com>
Committer: Phil Lavin <phil.la...@synety.com>
Date: 2016-02-24T12:21:42Z

tls: fix line breaks

- fix line breaks in previous logging commit

---

Modified: modules/tls/tls_server.c

---

Diff:  
https://github.com/kamailio/kamailio/commit/8736b2dc8dcd5fd8ee253134b19cb8ce0aa1c0b4.diff
Patch: 
https://github.com/kamailio/kamailio/commit/8736b2dc8dcd5fd8ee253134b19cb8ce0aa1c0b4.patch

---

diff --git a/modules/tls/tls_server.c b/modules/tls/tls_server.c
index 3627f07..880fae2 100644
--- a/modules/tls/tls_server.c
+++ b/modules/tls/tls_server.c
@@ -186,7 +186,8 @@ static int tls_complete_init(struct tcp_connection* c)
 
        if (LOW_MEM_NEW_CONNECTION_TEST()){
                ERR("tls: ssl bug #1491 workaround: not enough memory for safe"
-                               " operation: shm=%lu threshold1=%d\n", 
shm_available_safe(), cfg_get(tls, tls_cfg, low_mem_threshold1));
+                               " operation: shm=%lu threshold1=%d\n", 
shm_available_safe(),
+                               cfg_get(tls, tls_cfg, low_mem_threshold1));
                goto error2;
        }
             /* Get current TLS configuration and increase reference
@@ -294,7 +295,8 @@ static int tls_fix_connection_unsafe(struct tcp_connection* 
c)
                }
        }else if (unlikely(LOW_MEM_CONNECTED_TEST())){
                ERR("tls: ssl bug #1491 workaround: not enough memory for safe"
-                               " operation: shm=%lu threshold2=%d\n", 
shm_available_safe(), cfg_get(tls, tls_cfg, low_mem_threshold2));
+                               " operation: shm=%lu threshold2=%d\n", 
shm_available_safe(),
+                               cfg_get(tls, tls_cfg, low_mem_threshold2));
                return -1;
        }
        return 0;
@@ -324,7 +326,8 @@ static int tls_fix_connection(struct tcp_connection* c)
        }
        if (unlikely(LOW_MEM_CONNECTED_TEST())){
                ERR("tls: ssl bug #1491 workaround: not enough memory for safe"
-                               " operation: shm=%lu threshold2=%d\n", 
shm_available_safe(), cfg_get(tls, tls_cfg, low_mem_threshold2));
+                               " operation: shm=%lu threshold2=%d\n", 
shm_available_safe(),
+                               cfg_get(tls, tls_cfg, low_mem_threshold2));
                return -1;
        }
        return 0;
@@ -527,7 +530,8 @@ static int tls_shutdown(struct tcp_connection *c)
                return 0;
        if (unlikely(LOW_MEM_CONNECTED_TEST())){
                ERR("tls: ssl bug #1491 workaround: not enough memory for safe"
-                               " operation: shm=%lu threshold2=%d\n", 
shm_available_safe(), cfg_get(tls, tls_cfg, low_mem_threshold2));
+                               " operation: shm=%lu threshold2=%d\n", 
shm_available_safe(),
+                               cfg_get(tls, tls_cfg, low_mem_threshold2));
                goto err;
        }
        


_______________________________________________
sr-dev mailing list
sr-dev@lists.sip-router.org
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-dev

Reply via email to