]> git.ipfire.org Git - thirdparty/squid.git/commitdiff
SourceFormat Enforcement
authorSource Maintenance <squidadm@squid-cache.org>
Fri, 10 Apr 2015 12:12:08 +0000 (12:12 +0000)
committerSource Maintenance <squidadm@squid-cache.org>
Fri, 10 Apr 2015 12:12:08 +0000 (12:12 +0000)
src/acl/ServerName.cc
src/acl/ServerName.h
src/ssl/PeerConnector.cc

index 31a85c1c14e2289f8d0c6111729f5bc94487d80e..27884e9c282ff8693b13605d087ff058b8082402 100644 (file)
@@ -10,9 +10,9 @@
 
 #include "squid.h"
 #include "acl/Checklist.h"
-#include "acl/ServerName.h"
 #include "acl/DomainData.h"
 #include "acl/RegexData.h"
+#include "acl/ServerName.h"
 #include "client_side.h"
 #include "fde.h"
 #include "HttpRequest.h"
@@ -70,7 +70,7 @@ check_cert_domain( void *check_data, ASN1_STRING *cn_data)
 
     if (cn_data->length > (int)sizeof(cn) - 1)
         return 1; // ignore data that does not fit our buffer
+
     memcpy(cn, cn_data->data, cn_data->length);
     cn[cn_data->length] = '\0';
     debugs(28, 4, "Verifying certificate name/subjectAltName " << cn);
index 9ba3fba73bf387a2abbce4ffdbefdf759a9d1602..fd89250ed4edc5abac1612cb757ef0b5e78b124f 100644 (file)
 #include "acl/Acl.h"
 #include "acl/Checklist.h"
 #include "acl/Data.h"
-#include "acl/Strategised.h"
 #include "acl/DomainData.h"
+#include "acl/Strategised.h"
 
 class ACLServerNameData : public ACLDomainData {
     MEMPROXY_CLASS(ACLServerNameData);
 public:
-    ACLServerNameData() : ACLDomainData(){}
+    ACLServerNameData() : ACLDomainData() {}
     virtual bool match(const char *);
     virtual ACLData<char const *> *clone() const;
 };
index 5348432c7af3dd7242e0888f25ef200abba14037..e690e366d178ecc4d321521b169eff9805330e1e 100644 (file)
@@ -281,7 +281,7 @@ Ssl::PeerConnector::handleServerCertificate()
 
         // remember the server certificate for later use
         if (Ssl::ServerBump *serverBump = csd->serverBump()) {
-            serverBump->serverCert.reset(serverCert.release());   
+            serverBump->serverCert.reset(serverCert.release());
         }
     }
 }