From: Automatic source maintenance Date: Wed, 5 Dec 2012 01:13:21 +0000 (-0700) Subject: SourceFormat Enforcement X-Git-Tag: SQUID_3_4_0_1~459 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=bbd84bcdf2e01d1a8fee10b6c5f590d3ec1e4758;p=thirdparty%2Fsquid.git SourceFormat Enforcement --- diff --git a/helpers/ssl/cert_valid.pl b/helpers/ssl/cert_valid.pl old mode 100644 new mode 100755 diff --git a/src/forward.cc b/src/forward.cc index 7802234cc6..8b5adde407 100644 --- a/src/forward.cc +++ b/src/forward.cc @@ -822,7 +822,7 @@ FwdState::sslCrtvdHandleReply(const HelperReply &reply) std::string error; STACK_OF(X509) *peerCerts = SSL_get_peer_cert_chain(ssl); if (replyMsg.parse(reply.other().content(), reply.other().contentSize()) != Ssl::CrtdMessage::OK || - !replyMsg.parseResponse(validationResponse, peerCerts, error) ) { + !replyMsg.parseResponse(validationResponse, peerCerts, error) ) { debugs(83, 5, "Reply from ssl_crtvd for " << request->GetHost() << " is incorrect"); validatorFailed = true; } else { diff --git a/src/ssl/support.cc b/src/ssl/support.cc index c1889a8b9d..660fa8f866 100644 --- a/src/ssl/support.cc +++ b/src/ssl/support.cc @@ -289,7 +289,7 @@ ssl_verify_cb(int ok, X509_STORE_CTX * ctx) filledCheck->sslErrors = NULL; } #if 1 // USE_SSL_CERT_VALIDATOR - // If the certificate validator is used then we need to allow all errors and + // If the certificate validator is used then we need to allow all errors and // pass them to certficate validator for more processing else if (Ssl::TheConfig.ssl_crt_validator) ok = 1;