break;
case LFT_REQUEST_METHOD:
- {
- const SBuf s(al->getLogMethod());
- sb.append(s.rawContent(), s.length());
- out = sb.termedBuf();
- quote = 1;
- }
- break;
+ {
+ const SBuf s(al->getLogMethod());
+ sb.append(s.rawContent(), s.length());
+ out = sb.termedBuf();
+ quote = 1;
+ }
+ break;
case LFT_REQUEST_URI:
out = al->url;
// for Ssl::bumpEnd, Ssl::bumpMode() returns NULL and we log '-'
out = Ssl::bumpMode(mode);
}
- break;
+ break;
case LFT_EXT_ACL_USER_CERT_RAW:
if (al->request) {
ConnStateData *conn = al->request->clientConnectionManager.get();
if (conn != NULL && Comm::IsConnOpen(conn->clientConnection)) {
if (SSL *ssl = fd_table[conn->clientConnection->fd].ssl)
- out = sslGetCAAttribute(ssl, format->data.header.header);
+ out = sslGetCAAttribute(ssl, format->data.header.header);
}
}
break;
newout = mbq.content();
mbq.stolen = 1;
newfree = 1;
- } break;
+ }
+ break;
case LOG_QUOTE_RAW:
break;
void Security::ServerOptions::parse(const char *) STUB
void Security::ServerOptions::dumpCfg(Packable *, const char *) const STUB
void Security::ServerOptions::updateContextEecdh(Security::ContextPointer &) STUB
+