]> git.ipfire.org Git - thirdparty/squid.git/commitdiff
SourceFormat Enforcement
authorAutomatic source maintenance <squidadm@squid-cache.org>
Wed, 5 Dec 2012 01:13:21 +0000 (18:13 -0700)
committerAutomatic source maintenance <squidadm@squid-cache.org>
Wed, 5 Dec 2012 01:13:21 +0000 (18:13 -0700)
helpers/ssl/cert_valid.pl [changed mode: 0644->0755]
src/forward.cc
src/ssl/support.cc

old mode 100644 (file)
new mode 100755 (executable)
index 7802234cc689e1352d98f115877655cb61632de4..8b5adde40768b16d49eb8279586fb16708a2edd7 100644 (file)
@@ -822,7 +822,7 @@ FwdState::sslCrtvdHandleReply(const HelperReply &reply)
         std::string error;
         STACK_OF(X509) *peerCerts = SSL_get_peer_cert_chain(ssl);
         if (replyMsg.parse(reply.other().content(), reply.other().contentSize()) != Ssl::CrtdMessage::OK ||
-                   !replyMsg.parseResponse(validationResponse, peerCerts, error) ) {
+                !replyMsg.parseResponse(validationResponse, peerCerts, error) ) {
             debugs(83, 5, "Reply from ssl_crtvd for " << request->GetHost() << " is incorrect");
             validatorFailed = true;
         } else {
index c1889a8b9d8597b344609f7e53eb73764809063f..660fa8f86662f02adda8ed0ee39579ec9f5f0489 100644 (file)
@@ -289,7 +289,7 @@ ssl_verify_cb(int ok, X509_STORE_CTX * ctx)
             filledCheck->sslErrors = NULL;
         }
 #if 1 // USE_SSL_CERT_VALIDATOR
-        // If the certificate validator is used then we need to allow all errors and 
+        // If the certificate validator is used then we need to allow all errors and
         // pass them to certficate validator for more processing
         else if (Ssl::TheConfig.ssl_crt_validator)
             ok = 1;