From: Frédéric Lécaille Date: Mon, 13 Mar 2017 10:02:01 +0000 (+0100) Subject: CLEANUP: server: code alignement. X-Git-Tag: v1.8-dev1~42 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=ec16f0300a99142accbcc03d92c8ea3712c8c655;p=thirdparty%2Fhaproxy.git CLEANUP: server: code alignement. Code alignement. --- diff --git a/src/ssl_sock.c b/src/ssl_sock.c index 925d0a542f..2e7ae4b88e 100644 --- a/src/ssl_sock.c +++ b/src/ssl_sock.c @@ -7416,32 +7416,32 @@ static struct bind_kw_list bind_kws = { "SSL", { }, { * not enabled. */ static struct srv_kw_list srv_kws = { "SSL", { }, { - { "ca-file", srv_parse_ca_file, 1, 0 }, /* set CAfile to process verify server cert */ - { "check-ssl", srv_parse_check_ssl, 0, 1 }, /* enable SSL for health checks */ - { "ciphers", srv_parse_ciphers, 1, 0 }, /* select the cipher suite */ - { "crl-file", srv_parse_crl_file, 1, 0 }, /* set certificate revocation list file use on server cert verify */ - { "crt", srv_parse_crt, 1, 0 }, /* set client certificate */ - { "force-sslv3", srv_parse_force_sslv3, 0, 1 }, /* force SSLv3 */ - { "force-tlsv10", srv_parse_force_tlsv10, 0, 1 }, /* force TLSv10 */ - { "force-tlsv11", srv_parse_force_tlsv11, 0, 1 }, /* force TLSv11 */ - { "force-tlsv12", srv_parse_force_tlsv12, 0, 1 }, /* force TLSv12 */ - { "no-check-ssl", srv_parse_no_check_ssl, 0, 1 }, /* disable SSL for health checks */ + { "ca-file", srv_parse_ca_file, 1, 0 }, /* set CAfile to process verify server cert */ + { "check-ssl", srv_parse_check_ssl, 0, 1 }, /* enable SSL for health checks */ + { "ciphers", srv_parse_ciphers, 1, 0 }, /* select the cipher suite */ + { "crl-file", srv_parse_crl_file, 1, 0 }, /* set certificate revocation list file use on server cert verify */ + { "crt", srv_parse_crt, 1, 0 }, /* set client certificate */ + { "force-sslv3", srv_parse_force_sslv3, 0, 1 }, /* force SSLv3 */ + { "force-tlsv10", srv_parse_force_tlsv10, 0, 1 }, /* force TLSv10 */ + { "force-tlsv11", srv_parse_force_tlsv11, 0, 1 }, /* force TLSv11 */ + { "force-tlsv12", srv_parse_force_tlsv12, 0, 1 }, /* force TLSv12 */ + { "no-check-ssl", srv_parse_no_check_ssl, 0, 1 }, /* disable SSL for health checks */ { "no-force-sslv3", srv_parse_no_force_sslv3, 0, 1 }, /* do not force SSLv3 */ { "no-force-tlsv10", srv_parse_no_force_tlsv10, 0, 1 }, /* do not force TLSv10 */ { "no-force-tlsv11", srv_parse_no_force_tlsv11, 0, 1 }, /* do not force TLSv11 */ { "no-force-tlsv12", srv_parse_no_force_tlsv12, 0, 1 }, /* do not force TLSv12 */ - { "no-ssl-reuse", srv_parse_no_ssl_reuse, 0, 0 }, /* disable session reuse */ - { "no-sslv3", srv_parse_no_sslv3, 0, 0 }, /* disable SSLv3 */ - { "no-tlsv10", srv_parse_no_tlsv10, 0, 0 }, /* disable TLSv10 */ - { "no-tlsv11", srv_parse_no_tlsv11, 0, 0 }, /* disable TLSv11 */ - { "no-tlsv12", srv_parse_no_tlsv12, 0, 0 }, /* disable TLSv12 */ - { "no-tls-tickets", srv_parse_no_tls_tickets, 0, 0 }, /* disable session resumption tickets */ - { "send-proxy-v2-ssl", srv_parse_send_proxy_ssl, 0, 0 }, /* send PROXY protocol header v2 with SSL info */ - { "send-proxy-v2-ssl-cn", srv_parse_send_proxy_cn, 0, 0 }, /* send PROXY protocol header v2 with CN */ - { "sni", srv_parse_sni, 1, 0 }, /* send SNI extension */ - { "ssl", srv_parse_ssl, 0, 0 }, /* enable SSL processing */ - { "verify", srv_parse_verify, 1, 0 }, /* set SSL verify method */ - { "verifyhost", srv_parse_verifyhost, 1, 0 }, /* require that SSL cert verifies for hostname */ + { "no-ssl-reuse", srv_parse_no_ssl_reuse, 0, 0 }, /* disable session reuse */ + { "no-sslv3", srv_parse_no_sslv3, 0, 0 }, /* disable SSLv3 */ + { "no-tlsv10", srv_parse_no_tlsv10, 0, 0 }, /* disable TLSv10 */ + { "no-tlsv11", srv_parse_no_tlsv11, 0, 0 }, /* disable TLSv11 */ + { "no-tlsv12", srv_parse_no_tlsv12, 0, 0 }, /* disable TLSv12 */ + { "no-tls-tickets", srv_parse_no_tls_tickets, 0, 0 }, /* disable session resumption tickets */ + { "send-proxy-v2-ssl", srv_parse_send_proxy_ssl, 0, 0 }, /* send PROXY protocol header v2 with SSL info */ + { "send-proxy-v2-ssl-cn", srv_parse_send_proxy_cn, 0, 0 }, /* send PROXY protocol header v2 with CN */ + { "sni", srv_parse_sni, 1, 0 }, /* send SNI extension */ + { "ssl", srv_parse_ssl, 0, 0 }, /* enable SSL processing */ + { "verify", srv_parse_verify, 1, 0 }, /* set SSL verify method */ + { "verifyhost", srv_parse_verifyhost, 1, 0 }, /* require that SSL cert verifies for hostname */ { NULL, NULL, 0, 0 }, }};