>From bed0db831d2cd504f3d66df21fd53c92dc4be52a Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Fr=C3=A9d=C3=A9ric=20L=C3=A9caille?= <flecai...@haproxy.com>
Date: Mon, 13 Mar 2017 11:02:01 +0100
Subject: [PATCH 09/31] CLEANUP: server: code alignement.
X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4

Code alignement.
---
 src/ssl_sock.c | 44 ++++++++++++++++++++++----------------------
 1 file changed, 22 insertions(+), 22 deletions(-)

diff --git a/src/ssl_sock.c b/src/ssl_sock.c
index 925d0a5..2e7ae4b 100644
--- a/src/ssl_sock.c
+++ b/src/ssl_sock.c
@@ -7416,32 +7416,32 @@ static struct bind_kw_list bind_kws = { "SSL", { }, {
  * not enabled.
  */
 static struct srv_kw_list srv_kws = { "SSL", { }, {
-	{ "ca-file",               srv_parse_ca_file,        1, 0 }, /* set CAfile to process verify server cert */
-	{ "check-ssl",             srv_parse_check_ssl,      0, 1 }, /* enable SSL for health checks */
-	{ "ciphers",               srv_parse_ciphers,        1, 0 }, /* select the cipher suite */
-	{ "crl-file",              srv_parse_crl_file,       1, 0 }, /* set certificate revocation list file use on server cert verify */
-	{ "crt",                   srv_parse_crt,            1, 0 }, /* set client certificate */
-	{ "force-sslv3",           srv_parse_force_sslv3,    0, 1 }, /* force SSLv3 */
-	{ "force-tlsv10",          srv_parse_force_tlsv10,   0, 1 }, /* force TLSv10 */
-	{ "force-tlsv11",          srv_parse_force_tlsv11,   0, 1 }, /* force TLSv11 */
-	{ "force-tlsv12",          srv_parse_force_tlsv12,   0, 1 }, /* force TLSv12 */
-	{ "no-check-ssl",          srv_parse_no_check_ssl,   0, 1 }, /* disable SSL for health checks */
+	{ "ca-file",               srv_parse_ca_file,         1, 0 }, /* set CAfile to process verify server cert */
+	{ "check-ssl",             srv_parse_check_ssl,       0, 1 }, /* enable SSL for health checks */
+	{ "ciphers",               srv_parse_ciphers,         1, 0 }, /* select the cipher suite */
+	{ "crl-file",              srv_parse_crl_file,        1, 0 }, /* set certificate revocation list file use on server cert verify */
+	{ "crt",                   srv_parse_crt,             1, 0 }, /* set client certificate */
+	{ "force-sslv3",           srv_parse_force_sslv3,     0, 1 }, /* force SSLv3 */
+	{ "force-tlsv10",          srv_parse_force_tlsv10,    0, 1 }, /* force TLSv10 */
+	{ "force-tlsv11",          srv_parse_force_tlsv11,    0, 1 }, /* force TLSv11 */
+	{ "force-tlsv12",          srv_parse_force_tlsv12,    0, 1 }, /* force TLSv12 */
+	{ "no-check-ssl",          srv_parse_no_check_ssl,    0, 1 }, /* disable SSL for health checks */
 	{ "no-force-sslv3",        srv_parse_no_force_sslv3,  0, 1 }, /* do not force SSLv3 */
 	{ "no-force-tlsv10",       srv_parse_no_force_tlsv10, 0, 1 }, /* do not force TLSv10 */
 	{ "no-force-tlsv11",       srv_parse_no_force_tlsv11, 0, 1 }, /* do not force TLSv11 */
 	{ "no-force-tlsv12",       srv_parse_no_force_tlsv12, 0, 1 }, /* do not force TLSv12 */
-	{ "no-ssl-reuse",          srv_parse_no_ssl_reuse,   0, 0 }, /* disable session reuse */
-	{ "no-sslv3",              srv_parse_no_sslv3,       0, 0 }, /* disable SSLv3 */
-	{ "no-tlsv10",             srv_parse_no_tlsv10,      0, 0 }, /* disable TLSv10 */
-	{ "no-tlsv11",             srv_parse_no_tlsv11,      0, 0 }, /* disable TLSv11 */
-	{ "no-tlsv12",             srv_parse_no_tlsv12,      0, 0 }, /* disable TLSv12 */
-	{ "no-tls-tickets",        srv_parse_no_tls_tickets, 0, 0 }, /* disable session resumption tickets */
-	{ "send-proxy-v2-ssl",     srv_parse_send_proxy_ssl, 0, 0 }, /* send PROXY protocol header v2 with SSL info */
-	{ "send-proxy-v2-ssl-cn",  srv_parse_send_proxy_cn,  0, 0 }, /* send PROXY protocol header v2 with CN */
-	{ "sni",                   srv_parse_sni,            1, 0 }, /* send SNI extension */
-	{ "ssl",                   srv_parse_ssl,            0, 0 }, /* enable SSL processing */
-	{ "verify",                srv_parse_verify,         1, 0 }, /* set SSL verify method */
-	{ "verifyhost",            srv_parse_verifyhost,     1, 0 }, /* require that SSL cert verifies for hostname */
+	{ "no-ssl-reuse",          srv_parse_no_ssl_reuse,    0, 0 }, /* disable session reuse */
+	{ "no-sslv3",              srv_parse_no_sslv3,        0, 0 }, /* disable SSLv3 */
+	{ "no-tlsv10",             srv_parse_no_tlsv10,       0, 0 }, /* disable TLSv10 */
+	{ "no-tlsv11",             srv_parse_no_tlsv11,       0, 0 }, /* disable TLSv11 */
+	{ "no-tlsv12",             srv_parse_no_tlsv12,       0, 0 }, /* disable TLSv12 */
+	{ "no-tls-tickets",        srv_parse_no_tls_tickets,  0, 0 }, /* disable session resumption tickets */
+	{ "send-proxy-v2-ssl",     srv_parse_send_proxy_ssl,  0, 0 }, /* send PROXY protocol header v2 with SSL info */
+	{ "send-proxy-v2-ssl-cn",  srv_parse_send_proxy_cn,   0, 0 }, /* send PROXY protocol header v2 with CN */
+	{ "sni",                   srv_parse_sni,             1, 0 }, /* send SNI extension */
+	{ "ssl",                   srv_parse_ssl,             0, 0 }, /* enable SSL processing */
+	{ "verify",                srv_parse_verify,          1, 0 }, /* set SSL verify method */
+	{ "verifyhost",            srv_parse_verifyhost,      1, 0 }, /* require that SSL cert verifies for hostname */
 	{ NULL, NULL, 0, 0 },
 }};
 
-- 
2.1.4

Reply via email to