diff options
author | Joe Orton <jorton@apache.org> | 2009-10-28 14:58:56 +0100 |
---|---|---|
committer | Joe Orton <jorton@apache.org> | 2009-10-28 14:58:56 +0100 |
commit | 080f897928dc46ae87b0377aa3982d501e49da3b (patch) | |
tree | 09d886641a486d85235db9ba10eff5eb1a6d8277 /modules/ssl/ssl_util_stapling.c | |
parent | Fix a lot of doxygen warnings. Thanks to Brad Hards for the patch. (diff) | |
download | apache2-080f897928dc46ae87b0377aa3982d501e49da3b.tar.xz apache2-080f897928dc46ae87b0377aa3982d501e49da3b.zip |
* module/ssl/ssl_util_stapling.c: Style fixes, no functional change.
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@830544 13f79535-47bb-0310-9956-ffa450edef68
Diffstat (limited to 'modules/ssl/ssl_util_stapling.c')
-rw-r--r-- | modules/ssl/ssl_util_stapling.c | 18 |
1 files changed, 12 insertions, 6 deletions
diff --git a/modules/ssl/ssl_util_stapling.c b/modules/ssl/ssl_util_stapling.c index b27aed5a96..76c6d06af0 100644 --- a/modules/ssl/ssl_util_stapling.c +++ b/modules/ssl/ssl_util_stapling.c @@ -210,7 +210,8 @@ static BOOL stapling_cache_response(server_rec *s, modssl_ctx_t *mctx, if (ok == TRUE) { *p++ = 1; timeout = mctx->stapling_cache_timeout; - } else { + } + else { *p++ = 0; timeout = mctx->stapling_errcache_timeout; } @@ -325,7 +326,8 @@ static int stapling_check_response(server_rec *s, modssl_ctx_t *mctx, /* If ID not present just pass back to client */ ap_log_error(APLOG_MARK, APLOG_ERR, 0, s, "stapling_check_response: certificate ID not present in response!"); - } else { + } + else { if (OCSP_check_validity(thisupd, nextupd, mctx->stapling_resptime_skew, mctx->stapling_resp_maxage)) { @@ -340,7 +342,8 @@ static int stapling_check_response(server_rec *s, modssl_ctx_t *mctx, if (pok) { ap_log_error(APLOG_MARK, APLOG_ERR, 0, s, "stapling_check_response: response times invalid"); - } else { + } + else { ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, s, "stapling_check_response: cached response expired"); } @@ -407,7 +410,8 @@ static BOOL stapling_renew_response(server_rec *s, modssl_ctx_t *mctx, SSL *ssl, ocspuri); rv = FALSE; goto done; - } else if (strcmp(uri.scheme, "http")) { + } + else if (strcmp(uri.scheme, "http")) { ap_log_error(APLOG_MARK, APLOG_ERR, 0, s, "stapling_renew_response: Unsupported uri %s", ocspuri); rv = FALSE; @@ -428,7 +432,8 @@ static BOOL stapling_renew_response(server_rec *s, modssl_ctx_t *mctx, SSL *ssl, else { goto done; } - } else { + } + else { int response_status = OCSP_response_status(*prsp); if (response_status == OCSP_RESPONSE_STATUS_SUCCESSFUL) { @@ -439,7 +444,8 @@ static BOOL stapling_renew_response(server_rec *s, modssl_ctx_t *mctx, SSL *ssl, ap_log_error(APLOG_MARK, APLOG_ERR, 0, s, "stapling_renew_response: error in retreived response!"); } - } else { + } + else { ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, s, "stapling_renew_response: responder error %s", OCSP_response_status_str(response_status)); |