>From bed0db831d2cd504f3d66df21fd53c92dc4be52a Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Fr=C3=A9d=C3=A9ric=20L=C3=A9caille?= <flecai...@haproxy.com> Date: Mon, 13 Mar 2017 11:02:01 +0100 Subject: [PATCH 09/31] CLEANUP: server: code alignement. X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4
Code alignement. --- src/ssl_sock.c | 44 ++++++++++++++++++++++---------------------- 1 file changed, 22 insertions(+), 22 deletions(-) diff --git a/src/ssl_sock.c b/src/ssl_sock.c index 925d0a5..2e7ae4b 100644 --- a/src/ssl_sock.c +++ b/src/ssl_sock.c @@ -7416,32 +7416,32 @@ static struct bind_kw_list bind_kws = { "SSL", { }, { * not enabled. */ static struct srv_kw_list srv_kws = { "SSL", { }, { - { "ca-file", srv_parse_ca_file, 1, 0 }, /* set CAfile to process verify server cert */ - { "check-ssl", srv_parse_check_ssl, 0, 1 }, /* enable SSL for health checks */ - { "ciphers", srv_parse_ciphers, 1, 0 }, /* select the cipher suite */ - { "crl-file", srv_parse_crl_file, 1, 0 }, /* set certificate revocation list file use on server cert verify */ - { "crt", srv_parse_crt, 1, 0 }, /* set client certificate */ - { "force-sslv3", srv_parse_force_sslv3, 0, 1 }, /* force SSLv3 */ - { "force-tlsv10", srv_parse_force_tlsv10, 0, 1 }, /* force TLSv10 */ - { "force-tlsv11", srv_parse_force_tlsv11, 0, 1 }, /* force TLSv11 */ - { "force-tlsv12", srv_parse_force_tlsv12, 0, 1 }, /* force TLSv12 */ - { "no-check-ssl", srv_parse_no_check_ssl, 0, 1 }, /* disable SSL for health checks */ + { "ca-file", srv_parse_ca_file, 1, 0 }, /* set CAfile to process verify server cert */ + { "check-ssl", srv_parse_check_ssl, 0, 1 }, /* enable SSL for health checks */ + { "ciphers", srv_parse_ciphers, 1, 0 }, /* select the cipher suite */ + { "crl-file", srv_parse_crl_file, 1, 0 }, /* set certificate revocation list file use on server cert verify */ + { "crt", srv_parse_crt, 1, 0 }, /* set client certificate */ + { "force-sslv3", srv_parse_force_sslv3, 0, 1 }, /* force SSLv3 */ + { "force-tlsv10", srv_parse_force_tlsv10, 0, 1 }, /* force TLSv10 */ + { "force-tlsv11", srv_parse_force_tlsv11, 0, 1 }, /* force TLSv11 */ + { "force-tlsv12", srv_parse_force_tlsv12, 0, 1 }, /* force TLSv12 */ + { "no-check-ssl", srv_parse_no_check_ssl, 0, 1 }, /* disable SSL for health checks */ { "no-force-sslv3", srv_parse_no_force_sslv3, 0, 1 }, /* do not force SSLv3 */ { "no-force-tlsv10", srv_parse_no_force_tlsv10, 0, 1 }, /* do not force TLSv10 */ { "no-force-tlsv11", srv_parse_no_force_tlsv11, 0, 1 }, /* do not force TLSv11 */ { "no-force-tlsv12", srv_parse_no_force_tlsv12, 0, 1 }, /* do not force TLSv12 */ - { "no-ssl-reuse", srv_parse_no_ssl_reuse, 0, 0 }, /* disable session reuse */ - { "no-sslv3", srv_parse_no_sslv3, 0, 0 }, /* disable SSLv3 */ - { "no-tlsv10", srv_parse_no_tlsv10, 0, 0 }, /* disable TLSv10 */ - { "no-tlsv11", srv_parse_no_tlsv11, 0, 0 }, /* disable TLSv11 */ - { "no-tlsv12", srv_parse_no_tlsv12, 0, 0 }, /* disable TLSv12 */ - { "no-tls-tickets", srv_parse_no_tls_tickets, 0, 0 }, /* disable session resumption tickets */ - { "send-proxy-v2-ssl", srv_parse_send_proxy_ssl, 0, 0 }, /* send PROXY protocol header v2 with SSL info */ - { "send-proxy-v2-ssl-cn", srv_parse_send_proxy_cn, 0, 0 }, /* send PROXY protocol header v2 with CN */ - { "sni", srv_parse_sni, 1, 0 }, /* send SNI extension */ - { "ssl", srv_parse_ssl, 0, 0 }, /* enable SSL processing */ - { "verify", srv_parse_verify, 1, 0 }, /* set SSL verify method */ - { "verifyhost", srv_parse_verifyhost, 1, 0 }, /* require that SSL cert verifies for hostname */ + { "no-ssl-reuse", srv_parse_no_ssl_reuse, 0, 0 }, /* disable session reuse */ + { "no-sslv3", srv_parse_no_sslv3, 0, 0 }, /* disable SSLv3 */ + { "no-tlsv10", srv_parse_no_tlsv10, 0, 0 }, /* disable TLSv10 */ + { "no-tlsv11", srv_parse_no_tlsv11, 0, 0 }, /* disable TLSv11 */ + { "no-tlsv12", srv_parse_no_tlsv12, 0, 0 }, /* disable TLSv12 */ + { "no-tls-tickets", srv_parse_no_tls_tickets, 0, 0 }, /* disable session resumption tickets */ + { "send-proxy-v2-ssl", srv_parse_send_proxy_ssl, 0, 0 }, /* send PROXY protocol header v2 with SSL info */ + { "send-proxy-v2-ssl-cn", srv_parse_send_proxy_cn, 0, 0 }, /* send PROXY protocol header v2 with CN */ + { "sni", srv_parse_sni, 1, 0 }, /* send SNI extension */ + { "ssl", srv_parse_ssl, 0, 0 }, /* enable SSL processing */ + { "verify", srv_parse_verify, 1, 0 }, /* set SSL verify method */ + { "verifyhost", srv_parse_verifyhost, 1, 0 }, /* require that SSL cert verifies for hostname */ { NULL, NULL, 0, 0 }, }}; -- 2.1.4