CLEANUP: server: code alignement.
Code alignement.
diff --git a/src/ssl_sock.c b/src/ssl_sock.c
index 925d0a5..2e7ae4b 100644
--- a/src/ssl_sock.c
+++ b/src/ssl_sock.c
@@ -7416,32 +7416,32 @@
* not enabled.
*/
static struct srv_kw_list srv_kws = { "SSL", { }, {
- { "ca-file", srv_parse_ca_file, 1, 0 }, /* set CAfile to process verify server cert */
- { "check-ssl", srv_parse_check_ssl, 0, 1 }, /* enable SSL for health checks */
- { "ciphers", srv_parse_ciphers, 1, 0 }, /* select the cipher suite */
- { "crl-file", srv_parse_crl_file, 1, 0 }, /* set certificate revocation list file use on server cert verify */
- { "crt", srv_parse_crt, 1, 0 }, /* set client certificate */
- { "force-sslv3", srv_parse_force_sslv3, 0, 1 }, /* force SSLv3 */
- { "force-tlsv10", srv_parse_force_tlsv10, 0, 1 }, /* force TLSv10 */
- { "force-tlsv11", srv_parse_force_tlsv11, 0, 1 }, /* force TLSv11 */
- { "force-tlsv12", srv_parse_force_tlsv12, 0, 1 }, /* force TLSv12 */
- { "no-check-ssl", srv_parse_no_check_ssl, 0, 1 }, /* disable SSL for health checks */
+ { "ca-file", srv_parse_ca_file, 1, 0 }, /* set CAfile to process verify server cert */
+ { "check-ssl", srv_parse_check_ssl, 0, 1 }, /* enable SSL for health checks */
+ { "ciphers", srv_parse_ciphers, 1, 0 }, /* select the cipher suite */
+ { "crl-file", srv_parse_crl_file, 1, 0 }, /* set certificate revocation list file use on server cert verify */
+ { "crt", srv_parse_crt, 1, 0 }, /* set client certificate */
+ { "force-sslv3", srv_parse_force_sslv3, 0, 1 }, /* force SSLv3 */
+ { "force-tlsv10", srv_parse_force_tlsv10, 0, 1 }, /* force TLSv10 */
+ { "force-tlsv11", srv_parse_force_tlsv11, 0, 1 }, /* force TLSv11 */
+ { "force-tlsv12", srv_parse_force_tlsv12, 0, 1 }, /* force TLSv12 */
+ { "no-check-ssl", srv_parse_no_check_ssl, 0, 1 }, /* disable SSL for health checks */
{ "no-force-sslv3", srv_parse_no_force_sslv3, 0, 1 }, /* do not force SSLv3 */
{ "no-force-tlsv10", srv_parse_no_force_tlsv10, 0, 1 }, /* do not force TLSv10 */
{ "no-force-tlsv11", srv_parse_no_force_tlsv11, 0, 1 }, /* do not force TLSv11 */
{ "no-force-tlsv12", srv_parse_no_force_tlsv12, 0, 1 }, /* do not force TLSv12 */
- { "no-ssl-reuse", srv_parse_no_ssl_reuse, 0, 0 }, /* disable session reuse */
- { "no-sslv3", srv_parse_no_sslv3, 0, 0 }, /* disable SSLv3 */
- { "no-tlsv10", srv_parse_no_tlsv10, 0, 0 }, /* disable TLSv10 */
- { "no-tlsv11", srv_parse_no_tlsv11, 0, 0 }, /* disable TLSv11 */
- { "no-tlsv12", srv_parse_no_tlsv12, 0, 0 }, /* disable TLSv12 */
- { "no-tls-tickets", srv_parse_no_tls_tickets, 0, 0 }, /* disable session resumption tickets */
- { "send-proxy-v2-ssl", srv_parse_send_proxy_ssl, 0, 0 }, /* send PROXY protocol header v2 with SSL info */
- { "send-proxy-v2-ssl-cn", srv_parse_send_proxy_cn, 0, 0 }, /* send PROXY protocol header v2 with CN */
- { "sni", srv_parse_sni, 1, 0 }, /* send SNI extension */
- { "ssl", srv_parse_ssl, 0, 0 }, /* enable SSL processing */
- { "verify", srv_parse_verify, 1, 0 }, /* set SSL verify method */
- { "verifyhost", srv_parse_verifyhost, 1, 0 }, /* require that SSL cert verifies for hostname */
+ { "no-ssl-reuse", srv_parse_no_ssl_reuse, 0, 0 }, /* disable session reuse */
+ { "no-sslv3", srv_parse_no_sslv3, 0, 0 }, /* disable SSLv3 */
+ { "no-tlsv10", srv_parse_no_tlsv10, 0, 0 }, /* disable TLSv10 */
+ { "no-tlsv11", srv_parse_no_tlsv11, 0, 0 }, /* disable TLSv11 */
+ { "no-tlsv12", srv_parse_no_tlsv12, 0, 0 }, /* disable TLSv12 */
+ { "no-tls-tickets", srv_parse_no_tls_tickets, 0, 0 }, /* disable session resumption tickets */
+ { "send-proxy-v2-ssl", srv_parse_send_proxy_ssl, 0, 0 }, /* send PROXY protocol header v2 with SSL info */
+ { "send-proxy-v2-ssl-cn", srv_parse_send_proxy_cn, 0, 0 }, /* send PROXY protocol header v2 with CN */
+ { "sni", srv_parse_sni, 1, 0 }, /* send SNI extension */
+ { "ssl", srv_parse_ssl, 0, 0 }, /* enable SSL processing */
+ { "verify", srv_parse_verify, 1, 0 }, /* set SSL verify method */
+ { "verifyhost", srv_parse_verifyhost, 1, 0 }, /* require that SSL cert verifies for hostname */
{ NULL, NULL, 0, 0 },
}};