aboutsummaryrefslogtreecommitdiff
path: root/lib/nss.c
diff options
context:
space:
mode:
authorKamil Dudka <kdudka@redhat.com>2012-05-21 16:31:21 +0200
committerKamil Dudka <kdudka@redhat.com>2012-05-25 13:35:23 +0200
commit74be99357669da26900ae23b5005ddeabb91b453 (patch)
tree3eca3ff824f5bf9a5c94488548f6d1abd9e1f69f /lib/nss.c
parent4f3ec68dc77ffbdaef0283f12243c6ebf7127264 (diff)
nss: avoid using explicit casts of code pointers
Diffstat (limited to 'lib/nss.c')
-rw-r--r--lib/nss.c11
1 files changed, 4 insertions, 7 deletions
diff --git a/lib/nss.c b/lib/nss.c
index 6b9389343..885a120bb 100644
--- a/lib/nss.c
+++ b/lib/nss.c
@@ -670,11 +670,10 @@ static SECStatus BadCertHandler(void *arg, PRFileDesc *sock)
/**
* Inform the application that the handshake is complete.
*/
-static SECStatus HandshakeCallback(PRFileDesc *sock, void *arg)
+static void HandshakeCallback(PRFileDesc *sock, void *arg)
{
(void)sock;
(void)arg;
- return SECSuccess;
}
static void display_cert_info(struct SessionHandle *data,
@@ -1341,12 +1340,10 @@ CURLcode Curl_nss_connect(struct connectdata *conn, int sockindex)
goto error;
data->set.ssl.certverifyresult=0; /* not checked yet */
- if(SSL_BadCertHook(model, (SSLBadCertHandler) BadCertHandler, conn)
- != SECSuccess) {
+ if(SSL_BadCertHook(model, BadCertHandler, conn) != SECSuccess)
goto error;
- }
- if(SSL_HandshakeCallback(model, (SSLHandshakeCallback) HandshakeCallback,
- NULL) != SECSuccess)
+
+ if(SSL_HandshakeCallback(model, HandshakeCallback, NULL) != SECSuccess)
goto error;
if(data->set.ssl.verifypeer) {