]> git.ipfire.org Git - thirdparty/squid.git/commitdiff
Sourceformat Enforcement (#148)
authorsquidadm <squidadm@users.noreply.github.com>
Wed, 14 Feb 2018 11:27:56 +0000 (00:27 +1300)
committerAmos Jeffries <yadij@users.noreply.github.com>
Wed, 14 Feb 2018 11:27:56 +0000 (00:27 +1300)
src/security/KeyData.cc
src/security/ServerOptions.cc
src/security/cert_generators/file/security_file_certgen.cc

index 299f1b205109569c8374970ddda12d3f3c5a7ab7..23d1239544aad9927c29d8c8dd22608eb1babbe0 100644 (file)
@@ -1,5 +1,5 @@
 /*
- * Copyright (C) 1996-2017 The Squid Software Foundation and contributors
+ * Copyright (C) 1996-2018 The Squid Software Foundation and contributors
  *
  * Squid software is distributed under GPLv2+ license and includes
  * contributions from numerous individuals and organizations.
@@ -62,9 +62,9 @@ Security::KeyData::loadX509CertFromFile()
 
     if (certificate) {
         cert = Security::CertPointer(certificate, [](gnutls_x509_crt_t p) {
-                   debugs(83, 5, "gnutls_x509_crt_deinit cert=" << (void*)p);
-                   gnutls_x509_crt_deinit(p);
-               });
+            debugs(83, 5, "gnutls_x509_crt_deinit cert=" << (void*)p);
+            gnutls_x509_crt_deinit(p);
+        });
     }
 
 #else
@@ -148,9 +148,9 @@ Security::KeyData::loadX509PrivateKeyFromFile()
             gnutls_privkey_export_x509(key, &xkey);
             gnutls_privkey_deinit(key);
             pkey = Security::PrivateKeyPointer(xkey, [](gnutls_x509_privkey_t p) {
-                       debugs(83, 5, "gnutls_x509_privkey_deinit pkey=" << (void*)p);
-                       gnutls_x509_privkey_deinit(p);
-                   });
+                debugs(83, 5, "gnutls_x509_privkey_deinit pkey=" << (void*)p);
+                gnutls_x509_privkey_deinit(p);
+            });
         }
     }
     gnutls_free(data.data);
@@ -181,3 +181,4 @@ Security::KeyData::loadFromFiles(const AnyP::PortCfg &port, const char *portType
         chain.clear();
     }
 }
+
index 6041c41d377219b3d973737e81efea2952e1c5f0..0f67f4f8d25f6c3523eb24bccb1b2a03e3bc1745 100644 (file)
@@ -260,7 +260,7 @@ Security::ServerOptions::createStaticServerContext(AnyP::PortCfg &port)
                 debugs(83, DBG_CRITICAL, "ERROR: Failed to initialize server context with keys from " << whichFile << ": " << Security::ErrorString(x));
                 return false;
             }
-                // XXX: add cert chain to the context
+            // XXX: add cert chain to the context
         }
 #endif
 
index 6a14013007de121b2fa4969cadaed547403809d3..e8a63472da6e99aa9b1667b7011fa3b6409ca015 100644 (file)
@@ -313,11 +313,11 @@ int main(int argc, char *argv[])
                 struct statvfs sfs;
 
                 if (xstatvfs(db_path.c_str(), &sfs)) {
-                   fs_block_size = 2048;
+                    fs_block_size = 2048;
                 } else {
-                   fs_block_size = sfs.f_frsize;
-                   // Sanity check; make sure we have a meaningful value.
-                   if (fs_block_size < 512)
+                    fs_block_size = sfs.f_frsize;
+                    // Sanity check; make sure we have a meaningful value.
+                    if (fs_block_size < 512)
                         fs_block_size = 2048;
                 }
             }