From bbd84bcdf2e01d1a8fee10b6c5f590d3ec1e4758 Mon Sep 17 00:00:00 2001 From: Automatic source maintenance Date: Tue, 4 Dec 2012 18:13:21 -0700 Subject: [PATCH] SourceFormat Enforcement --- helpers/ssl/cert_valid.pl | 0 src/forward.cc | 2 +- src/ssl/support.cc | 2 +- 3 files changed, 2 insertions(+), 2 deletions(-) mode change 100644 => 100755 helpers/ssl/cert_valid.pl diff --git a/helpers/ssl/cert_valid.pl b/helpers/ssl/cert_valid.pl old mode 100644 new mode 100755 diff --git a/src/forward.cc b/src/forward.cc index 7802234cc6..8b5adde407 100644 --- a/src/forward.cc +++ b/src/forward.cc @@ -822,7 +822,7 @@ FwdState::sslCrtvdHandleReply(const HelperReply &reply) std::string error; STACK_OF(X509) *peerCerts = SSL_get_peer_cert_chain(ssl); if (replyMsg.parse(reply.other().content(), reply.other().contentSize()) != Ssl::CrtdMessage::OK || - !replyMsg.parseResponse(validationResponse, peerCerts, error) ) { + !replyMsg.parseResponse(validationResponse, peerCerts, error) ) { debugs(83, 5, "Reply from ssl_crtvd for " << request->GetHost() << " is incorrect"); validatorFailed = true; } else { diff --git a/src/ssl/support.cc b/src/ssl/support.cc index c1889a8b9d..660fa8f866 100644 --- a/src/ssl/support.cc +++ b/src/ssl/support.cc @@ -289,7 +289,7 @@ ssl_verify_cb(int ok, X509_STORE_CTX * ctx) filledCheck->sslErrors = NULL; } #if 1 // USE_SSL_CERT_VALIDATOR - // If the certificate validator is used then we need to allow all errors and + // If the certificate validator is used then we need to allow all errors and // pass them to certficate validator for more processing else if (Ssl::TheConfig.ssl_crt_validator) ok = 1; -- 2.47.2