diff options
author | Kamil Dudka <kdudka@redhat.com> | 2012-05-21 16:31:21 +0200 |
---|---|---|
committer | Kamil Dudka <kdudka@redhat.com> | 2012-05-25 13:35:23 +0200 |
commit | 74be99357669da26900ae23b5005ddeabb91b453 (patch) | |
tree | 3eca3ff824f5bf9a5c94488548f6d1abd9e1f69f | |
parent | 4f3ec68dc77ffbdaef0283f12243c6ebf7127264 (diff) |
nss: avoid using explicit casts of code pointers
-rw-r--r-- | lib/nss.c | 11 |
1 files changed, 4 insertions, 7 deletions
@@ -670,11 +670,10 @@ static SECStatus BadCertHandler(void *arg, PRFileDesc *sock) /** * Inform the application that the handshake is complete. */ -static SECStatus HandshakeCallback(PRFileDesc *sock, void *arg) +static void HandshakeCallback(PRFileDesc *sock, void *arg) { (void)sock; (void)arg; - return SECSuccess; } static void display_cert_info(struct SessionHandle *data, @@ -1341,12 +1340,10 @@ CURLcode Curl_nss_connect(struct connectdata *conn, int sockindex) goto error; data->set.ssl.certverifyresult=0; /* not checked yet */ - if(SSL_BadCertHook(model, (SSLBadCertHandler) BadCertHandler, conn) - != SECSuccess) { + if(SSL_BadCertHook(model, BadCertHandler, conn) != SECSuccess) goto error; - } - if(SSL_HandshakeCallback(model, (SSLHandshakeCallback) HandshakeCallback, - NULL) != SECSuccess) + + if(SSL_HandshakeCallback(model, HandshakeCallback, NULL) != SECSuccess) goto error; if(data->set.ssl.verifypeer) { |