Hi,

On 16/04/2020 10:49, Arne Schwabe wrote:
> After the last big formatting patch a number of changes have been
> commited that do not conform with our style/uncrustify config. This
> has lead to the problem that running uncrustify on before sending PR
> some of the changes made by uncrustify need to be backed out again.
> 
> To bring everything back to the agreed upon style, run uncrustify once
> more. Uncrustify version used:
> 
>       Uncrustify-0.70.1_f
> 
> I double checked the result by running uncrustify (Uncrustify-0.69.0_f)
> from Ubuntu focal/20.04 which does not do any further changes and
> uncrustify 0.66.1_f from Ubuntu bionic/18.04, which only produces one
> small change:
> 
> -gc_addspecial(void *addr, void(free_function)(void *), struct gc_arena *a)
> +gc_addspecial(void *addr, void (free_function)(void *), struct gc_arena *a)
> 
> I therefore went with the variant produced by the newer versions of
> uncrustify.
> 
> The version uncrustify 0.59 produced a lot of changes, many of which
> were not changed by this commit, so that version is too old.
> 
> Signed-off-by: Arne Schwabe <a...@rfc2549.org>
> ---
>  src/compat/compat-strsep.c        |  2 +-
>  src/compat/compat.h               |  3 +-
>  src/openvpn/buffer.c              |  2 +-
>  src/openvpn/crypto.c              |  9 +++---
>  src/openvpn/crypto.h              |  2 +-
>  src/openvpn/cryptoapi.c           |  5 +--
>  src/openvpn/forward.c             |  2 +-
>  src/openvpn/forward.h             |  2 +-
>  src/openvpn/manage.c              |  6 ++--
>  src/openvpn/misc.c                |  2 +-
>  src/openvpn/mroute.c              |  2 +-
>  src/openvpn/networking.h          |  6 ++--
>  src/openvpn/networking_iproute2.c | 14 ++++++++
>  src/openvpn/networking_sitnl.h    |  2 +-
>  src/openvpn/openvpn.h             |  2 +-
>  src/openvpn/options.c             | 10 +++---
>  src/openvpn/options.h             |  4 +--
>  src/openvpn/proto.h               |  2 +-
>  src/openvpn/push.c                | 20 ++++++------
>  src/openvpn/route.c               |  2 +-
>  src/openvpn/socket.h              | 54 +++++++++++++++----------------
>  src/openvpn/ssl.c                 |  6 ++--
>  src/openvpn/ssl.h                 |  1 +
>  src/openvpn/ssl_mbedtls.c         | 21 ++++++------
>  src/openvpn/ssl_openssl.c         | 28 ++++++++--------
>  src/openvpn/ssl_verify.c          | 18 +++++------
>  src/openvpn/ssl_verify.h          |  3 +-
>  src/openvpn/vlan.c                |  4 +--
>  src/openvpn/win32.h               |  2 +-
>  29 files changed, 130 insertions(+), 106 deletions(-)
> 
> diff --git a/src/compat/compat-strsep.c b/src/compat/compat-strsep.c
> index 42ff6414..e6518db6 100644
> --- a/src/compat/compat-strsep.c
> +++ b/src/compat/compat-strsep.c
> @@ -58,4 +58,4 @@ strsep(char **stringp, const char *delim)
>      }
>      return begin;
>  }
> -#endif
> +#endif /* ifndef HAVE_STRSEP */
> diff --git a/src/compat/compat.h b/src/compat/compat.h
> index 592881df..a66a4235 100644
> --- a/src/compat/compat.h
> +++ b/src/compat/compat.h
> @@ -71,7 +71,8 @@ int inet_pton(int af, const char *src, void *dst);
>  #endif
>  
>  #ifndef HAVE_STRSEP
> -char* strsep(char **stringp, const char *delim);
> +char *strsep(char **stringp, const char *delim);
> +
>  #endif
>  
>  #endif /* COMPAT_H */
> diff --git a/src/openvpn/buffer.c b/src/openvpn/buffer.c
> index 8575e295..681d4541 100644
> --- a/src/openvpn/buffer.c
> +++ b/src/openvpn/buffer.c
> @@ -474,7 +474,7 @@ x_gc_freespecial(struct gc_arena *a)
>  }
>  
>  void
> -gc_addspecial(void *addr, void (free_function)(void *), struct gc_arena *a)
> +gc_addspecial(void *addr, void(free_function)(void *), struct gc_arena *a)


This looks wrong to me. we want a space between the return type and the
prototype name. no?


>  {
>      ASSERT(a);
>      struct gc_entry_special *e;
> diff --git a/src/openvpn/crypto.c b/src/openvpn/crypto.c
> index 453cb20a..1678cba8 100644
> --- a/src/openvpn/crypto.c
> +++ b/src/openvpn/crypto.c
> @@ -736,13 +736,14 @@ crypto_max_overhead(void)
>             +max_int(OPENVPN_MAX_HMAC_SIZE, OPENVPN_AEAD_TAG_LENGTH);
>  }
>  
> -static void warn_insecure_key_type(const char* ciphername, const cipher_kt_t 
> *cipher)
> +static void
> +warn_insecure_key_type(const char *ciphername, const cipher_kt_t *cipher)
>  {
>      if (cipher_kt_insecure(cipher))
>      {
>          msg(M_WARN, "WARNING: INSECURE cipher (%s) with block size less than 
> 128"
> -                    " bit (%d bit).  This allows attacks like SWEET32.  
> Mitigate by "
> -                    "using a --cipher with a larger block size (e.g. 
> AES-256-CBC).",
> +            " bit (%d bit).  This allows attacks like SWEET32.  Mitigate by "
> +            "using a --cipher with a larger block size (e.g. AES-256-CBC).",
>              ciphername, cipher_kt_block_size(cipher)*8);
>      }
>  }
> @@ -846,7 +847,7 @@ init_key_ctx(struct key_ctx *ctx, const struct key *key,
>          cipher_ctx_init(ctx->cipher, key->cipher, kt->cipher_length,
>                          kt->cipher, enc);
>  
> -        const char* ciphername = 
> translate_cipher_name_to_openvpn(cipher_kt_name(kt->cipher));
> +        const char *ciphername = 
> translate_cipher_name_to_openvpn(cipher_kt_name(kt->cipher));
>          msg(D_HANDSHAKE, "%s: Cipher '%s' initialized with %d bit key",
>              prefix,
>              ciphername,
> diff --git a/src/openvpn/crypto.h b/src/openvpn/crypto.h
> index 18a86ceb..af3b382b 100644
> --- a/src/openvpn/crypto.h
> +++ b/src/openvpn/crypto.h
> @@ -538,7 +538,7 @@ memcmp_constant_time(const void *a, const void *b, size_t 
> size)
>  
>      for (i = 0; i < size; i++)
>      {
> -        ret |= *a1++ ^ *b1++;
> +        ret |= *a1++ ^*b1++;

This is also non-expected - we always want spaces around binary bitwise
operators.

>      }
>  
>      return ret;
> diff --git a/src/openvpn/cryptoapi.c b/src/openvpn/cryptoapi.c
> index 30eba7b2..6c4df9e3 100644
> --- a/src/openvpn/cryptoapi.c
> +++ b/src/openvpn/cryptoapi.c
> @@ -803,12 +803,13 @@ find_certificate_in_store(const char *cert_prop, 
> HCERTSTORE cert_store)
>          }
>          blob.cbData = i;
>      }
> -    else {
> +    else
> +    {
>          msg(M_WARN, "WARNING: cryptoapicert: unsupported certificate 
> specification <%s>", cert_prop);
>          goto out;
>      }
>  
> -    while(true)
> +    while (true)
>      {
>          int validity = 1;
>          /* this frees previous rv, if not NULL */
> diff --git a/src/openvpn/forward.c b/src/openvpn/forward.c
> index ea10f0bf..2082b9ea 100644
> --- a/src/openvpn/forward.c
> +++ b/src/openvpn/forward.c
> @@ -1278,7 +1278,7 @@ read_incoming_tun(struct context *c)
>      ASSERT(buf_init(&c->c2.buf, FRAME_HEADROOM(&c->c2.frame)));
>      ASSERT(buf_safe(&c->c2.buf, MAX_RW_SIZE_TUN(&c->c2.frame)));
>      c->c2.buf.len = read_tun(c->c1.tuntap, BPTR(&c->c2.buf), 
> MAX_RW_SIZE_TUN(&c->c2.frame));
> -#endif
> +#endif /* ifdef _WIN32 */
>  
>  #ifdef PACKET_TRUNCATION_CHECK
>      ipv4_packet_size_verify(BPTR(&c->c2.buf),
> diff --git a/src/openvpn/forward.h b/src/openvpn/forward.h
> index b711ff00..ff898133 100644
> --- a/src/openvpn/forward.h
> +++ b/src/openvpn/forward.h
> @@ -434,7 +434,7 @@ io_wait(struct context *c, const unsigned int flags)
>              c->c2.event_set_status = ret;
>          }
>          else
> -#endif
> +#endif /* ifdef _WIN32 */
>          {
>              /* slow path */
>              io_wait_dowork(c, flags);
> diff --git a/src/openvpn/manage.c b/src/openvpn/manage.c
> index 49864c0a..195941ca 100644
> --- a/src/openvpn/manage.c
> +++ b/src/openvpn/manage.c
> @@ -3660,9 +3660,9 @@ management_query_pk_sig(struct management *man, const 
> char *b64_data,
>          buf_write(&buf_data, ",", (int) strlen(","));
>          buf_write(&buf_data, algorithm, (int) strlen(algorithm));
>      }
> -    char* ret = management_query_multiline_flatten(man,
> -            (char *)buf_bptr(&buf_data), prompt, desc,
> -            &man->connection.ext_key_state, &man->connection.ext_key_input);
> +    char *ret = management_query_multiline_flatten(man,
> +                                                   (char 
> *)buf_bptr(&buf_data), prompt, desc,
> +                                                   
> &man->connection.ext_key_state, &man->connection.ext_key_input);
>      free_buf(&buf_data);
>      return ret;
>  }
> diff --git a/src/openvpn/misc.c b/src/openvpn/misc.c
> index 1c17948c..a10888ed 100644
> --- a/src/openvpn/misc.c
> +++ b/src/openvpn/misc.c
> @@ -146,7 +146,7 @@ auth_user_pass_mgmt(struct user_pass *up, const char 
> *prefix, const unsigned int
>      }
>      return true;
>  }
> -#endif
> +#endif /* ifdef ENABLE_MANAGEMENT */
>  
>  /*
>   * Get and store a username/password
> diff --git a/src/openvpn/mroute.c b/src/openvpn/mroute.c
> index bdb1b0c0..a7e78213 100644
> --- a/src/openvpn/mroute.c
> +++ b/src/openvpn/mroute.c
> @@ -324,7 +324,7 @@ mroute_extract_addr_ether(struct mroute_addr *src,
>                      break;
>              }
>          }
> -#endif
> +#endif /* ifdef ENABLE_PF */
>      }
>      return ret;
>  }
> diff --git a/src/openvpn/networking.h b/src/openvpn/networking.h
> index 5e6d898f..9c1d1696 100644
> --- a/src/openvpn/networking.h
> +++ b/src/openvpn/networking.h
> @@ -31,8 +31,8 @@ struct context;
>  #include "networking_iproute2.h"
>  #else
>  /* define mock types to ensure code builds on any platform */
> -typedef void * openvpn_net_ctx_t;
> -typedef void * openvpn_net_iface_t;
> +typedef void *openvpn_net_ctx_t;
> +typedef void *openvpn_net_iface_t;
>  
>  static inline int
>  net_ctx_init(struct context *c, openvpn_net_ctx_t *ctx)
> @@ -51,7 +51,7 @@ net_ctx_free(openvpn_net_ctx_t *ctx)
>  {
>      (void)ctx;
>  }
> -#endif
> +#endif /* ifdef ENABLE_SITNL */
>  
>  #if defined(ENABLE_SITNL) || defined(ENABLE_IPROUTE)
>  
> diff --git a/src/openvpn/networking_iproute2.c 
> b/src/openvpn/networking_iproute2.c
> index 0f9e899a..f3b9c614 100644
> --- a/src/openvpn/networking_iproute2.c
> +++ b/src/openvpn/networking_iproute2.c
> @@ -43,7 +43,9 @@ net_ctx_init(struct context *c, openvpn_net_ctx_t *ctx)
>  {
>      ctx->es = NULL;
>      if (c)
> +    {
>          ctx->es = c->es;
> +    }
>      ctx->gc = gc_new();
>  
>      return 0;
> @@ -207,10 +209,14 @@ net_route_v4_add(openvpn_net_ctx_t *ctx, const 
> in_addr_t *dst, int prefixlen,
>      argv_printf(&argv, "%s route add %s/%d", iproute_path, dst_str, 
> prefixlen);
>  
>      if (metric > 0)
> +    {
>          argv_printf_cat(&argv, "metric %d", metric);
> +    }
>  
>      if (iface)
> +    {
>          argv_printf_cat(&argv, "dev %s", iface);
> +    }
>  
>      if (gw)
>      {
> @@ -246,7 +252,9 @@ net_route_v6_add(openvpn_net_ctx_t *ctx, const struct 
> in6_addr *dst,
>      }
>  
>      if (metric > 0)
> +    {
>          argv_printf_cat(&argv, "metric %d", metric);
> +    }
>  
>      argv_msg(D_ROUTE, &argv);
>      openvpn_execve_check(&argv, ctx->es, 0, "ERROR: Linux route -6 add 
> command failed");
> @@ -267,7 +275,9 @@ net_route_v4_del(openvpn_net_ctx_t *ctx, const in_addr_t 
> *dst, int prefixlen,
>      argv_printf(&argv, "%s route del %s/%d", iproute_path, dst_str, 
> prefixlen);
>  
>      if (metric > 0)
> +    {
>          argv_printf_cat(&argv, "metric %d", metric);
> +    }
>  
>      argv_msg(D_ROUTE, &argv);
>      openvpn_execve_check(&argv, ctx->es, 0, "ERROR: Linux route delete 
> command failed");
> @@ -296,7 +306,9 @@ net_route_v6_del(openvpn_net_ctx_t *ctx, const struct 
> in6_addr *dst,
>      }
>  
>      if (metric > 0)
> +    {
>          argv_printf_cat(&argv, "metric %d", metric);
> +    }
>  
>      argv_msg(D_ROUTE, &argv);
>      openvpn_execve_check(&argv, ctx->es, 0, "ERROR: Linux route -6 del 
> command failed");
> @@ -314,7 +326,9 @@ net_route_v4_best_gw(openvpn_net_ctx_t *ctx, const 
> in_addr_t *dst,
>  
>      FILE *fp = fopen("/proc/net/route", "r");
>      if (!fp)
> +    {
>          return -1;
> +    }
>  
>      char line[256];
>      int count = 0;
> diff --git a/src/openvpn/networking_sitnl.h b/src/openvpn/networking_sitnl.h
> index f39d426d..6396b06e 100644
> --- a/src/openvpn/networking_sitnl.h
> +++ b/src/openvpn/networking_sitnl.h
> @@ -23,6 +23,6 @@
>  #define NETWORKING_SITNL_H_
>  
>  typedef char openvpn_net_iface_t;
> -typedef void * openvpn_net_ctx_t;
> +typedef void *openvpn_net_ctx_t;
>  
>  #endif /* NETWORKING_SITNL_H_ */
> diff --git a/src/openvpn/openvpn.h b/src/openvpn/openvpn.h
> index 900db7e1..595a9b1d 100644
> --- a/src/openvpn/openvpn.h
> +++ b/src/openvpn/openvpn.h
> @@ -524,7 +524,7 @@ struct context
>  
>      struct env_set *es;         /**< Set of environment variables. */
>  
> -    openvpn_net_ctx_t net_ctx;       /**< Networking API opaque context */
> +    openvpn_net_ctx_t net_ctx;  /**< Networking API opaque context */
>  
>      struct signal_info *sig;    /**< Internal error signaling object. */
>  
> diff --git a/src/openvpn/options.c b/src/openvpn/options.c
> index 49df8df1..63dc53c3 100644
> --- a/src/openvpn/options.c
> +++ b/src/openvpn/options.c
> @@ -1241,8 +1241,10 @@ print_vlan_accept(enum vlan_acceptable_frames mode)
>      {
>          case VLAN_ONLY_TAGGED:
>              return "tagged";
> +
>          case VLAN_ONLY_UNTAGGED_OR_PRIORITY:
>              return "untagged";
> +
>          case VLAN_ALL:
>              return "all";
>      }
> @@ -1320,7 +1322,7 @@ show_p2mp_parms(const struct options *o)
>      SHOW_STR(port_share_port);
>  #endif
>      SHOW_BOOL(vlan_tagging);
> -    msg(D_SHOW_PARMS, "  vlan_accept = %s", print_vlan_accept 
> (o->vlan_accept));
> +    msg(D_SHOW_PARMS, "  vlan_accept = %s", 
> print_vlan_accept(o->vlan_accept));
>      SHOW_INT(vlan_pvid);
>  #endif /* P2MP_SERVER */
>  
> @@ -5301,7 +5303,7 @@ add_option(struct options *options,
>          options->management_flags |= MF_EXTERNAL_CERT;
>          options->management_certificate = p[1];
>      }
> -#endif
> +#endif /* ifdef ENABLE_MANAGEMENT */
>  #ifdef MANAGEMENT_DEF_AUTH
>      else if (streq(p[0], "management-client-auth") && !p[1])
>      {
> @@ -7711,8 +7713,8 @@ add_option(struct options *options,
>          }
>          else
>          {
> -            if (streq(p[1], "secret") || streq(p[1], "tls-auth") ||
> -                streq(p[1], "tls-crypt"))
> +            if (streq(p[1], "secret") || streq(p[1], "tls-auth")
> +                || streq(p[1], "tls-crypt"))
>              {
>                  options->genkey_type = GENKEY_SECRET;
>              }
> diff --git a/src/openvpn/options.h b/src/openvpn/options.h
> index 2f1f6faf..4c1737e1 100644
> --- a/src/openvpn/options.h
> +++ b/src/openvpn/options.h
> @@ -222,8 +222,8 @@ struct options
>      bool show_curves;
>      bool genkey;
>      enum genkey_type genkey_type;
> -    const char* genkey_filename;
> -    const char* genkey_extra_data;
> +    const char *genkey_filename;
> +    const char *genkey_extra_data;
>  
>      /* Networking parms */
>      int connect_retry_max;
> diff --git a/src/openvpn/proto.h b/src/openvpn/proto.h
> index c1ff3e14..c2517674 100644
> --- a/src/openvpn/proto.h
> +++ b/src/openvpn/proto.h
> @@ -67,7 +67,7 @@ struct openvpn_ethhdr
>  struct openvpn_8021qhdr
>  {
>      uint8_t dest[OPENVPN_ETH_ALEN];     /* destination ethernet addr */
> -    uint8_t source[OPENVPN_ETH_ALEN];   /* source ethernet addr      */
> +    uint8_t source[OPENVPN_ETH_ALEN];   /* source ethernet addr */
>  
>      uint16_t tpid;                      /* 802.1Q Tag Protocol Identifier */
>  #define OPENVPN_8021Q_MASK_PCP htons(0xE000) /* mask PCP out of pcp_cfi_vid 
> */
> diff --git a/src/openvpn/push.c b/src/openvpn/push.c
> index aef00d34..39a906d4 100644
> --- a/src/openvpn/push.c
> +++ b/src/openvpn/push.c
> @@ -72,19 +72,19 @@ receive_auth_failed(struct context *c, const struct 
> buffer *buffer)
>          {
>              switch (auth_retry_get())
>              {
> -            case AR_NONE:
> -                c->sig->signal_received = SIGTERM; /* SOFT-SIGTERM -- Auth 
> failure error */
> -                break;
> +                case AR_NONE:
> +                    c->sig->signal_received = SIGTERM; /* SOFT-SIGTERM -- 
> Auth failure error */
> +                    break;
>  
> -            case AR_INTERACT:
> -                ssl_purge_auth(false);
> +                case AR_INTERACT:
> +                    ssl_purge_auth(false);
>  
> -            case AR_NOINTERACT:
> -                c->sig->signal_received = SIGUSR1; /* SOFT-SIGUSR1 -- Auth 
> failure error */
> -                break;
> +                case AR_NOINTERACT:
> +                    c->sig->signal_received = SIGUSR1; /* SOFT-SIGUSR1 -- 
> Auth failure error */
> +                    break;
>  
> -            default:
> -                ASSERT(0);
> +                default:
> +                    ASSERT(0);
>              }
>              c->sig->signal_text = "auth-failure";
>          }
> diff --git a/src/openvpn/route.c b/src/openvpn/route.c
> index e0f8d201..51f76318 100644
> --- a/src/openvpn/route.c
> +++ b/src/openvpn/route.c
> @@ -2152,7 +2152,7 @@ delete_route(struct route_ipv4 *r,
>  #if !defined(TARGET_ANDROID)
>      const char *gateway;
>  #endif
> -#else
> +#else  /* if !defined(TARGET_LINUX) */
>      int metric;
>  #endif
>      int is_local_route;
> diff --git a/src/openvpn/socket.h b/src/openvpn/socket.h
> index e95547d1..21e4ccf8 100644
> --- a/src/openvpn/socket.h
> +++ b/src/openvpn/socket.h
> @@ -298,35 +298,35 @@ int openvpn_connect(socket_descriptor_t sd,
>   */
>  
>  void
> -link_socket_init_phase1(struct link_socket *sock,
> -                        const char *local_host,
> -                        const char *local_port,
> -                        const char *remote_host,
> -                        const char *remote_port,
> -                        struct cached_dns_entry *dns_cache,
> -                        int proto,
> -                        sa_family_t af,
> -                        bool bind_ipv6_only,
> -                        int mode,
> -                        const struct link_socket *accept_from,
> -                        struct http_proxy_info *http_proxy,
> -                        struct socks_proxy_info *socks_proxy,
> +    link_socket_init_phase1(struct link_socket *sock,
> +                            const char *local_host,
> +                            const char *local_port,
> +                            const char *remote_host,
> +                            const char *remote_port,
> +                            struct cached_dns_entry *dns_cache,
> +                            int proto,
> +                            sa_family_t af,
> +                            bool bind_ipv6_only,
> +                            int mode,
> +                            const struct link_socket *accept_from,
> +                            struct http_proxy_info *http_proxy,
> +                            struct socks_proxy_info *socks_proxy,


why is everything being moved forward by one tab ?
Weird that this is being applied to this function only (?)


>  #ifdef ENABLE_DEBUG
> -                        int gremlin,
> +                            int gremlin,
>  #endif
> -                        bool bind_local,
> -                        bool remote_float,
> -                        int inetd,
> -                        struct link_socket_addr *lsa,
> -                        const char *ipchange_command,
> -                        const struct plugin_list *plugins,
> -                        int resolve_retry_seconds,
> -                        int mtu_discover_type,
> -                        int rcvbuf,
> -                        int sndbuf,
> -                        int mark,
> -                        struct event_timeout *server_poll_timeout,
> -                        unsigned int sockflags);
> +                            bool bind_local,
> +                            bool remote_float,
> +                            int inetd,
> +                            struct link_socket_addr *lsa,
> +                            const char *ipchange_command,
> +                            const struct plugin_list *plugins,
> +                            int resolve_retry_seconds,
> +                            int mtu_discover_type,
> +                            int rcvbuf,
> +                            int sndbuf,
> +                            int mark,
> +                            struct event_timeout *server_poll_timeout,
> +                            unsigned int sockflags);
>  
>  void link_socket_init_phase2(struct link_socket *sock,
>                               const struct frame *frame,
> diff --git a/src/openvpn/ssl.c b/src/openvpn/ssl.c
> index 56d0576a..80e0d5ac 100644
> --- a/src/openvpn/ssl.c
> +++ b/src/openvpn/ssl.c
> @@ -466,7 +466,7 @@ ssl_set_auth_token(const char *token)
>   * Cleans an auth token and checks if it was active
>   */
>  bool
> -ssl_clean_auth_token (void)
> +ssl_clean_auth_token(void)
>  {
>      bool wasdefined = auth_token.defined;
>      purge_user_pass(&auth_token, true);
> @@ -2015,7 +2015,7 @@ tls_session_update_crypto_params(struct tls_session 
> *session,
>      {
>          frame_remove_from_extra_frame(frame_fragment, crypto_max_overhead());
>          crypto_adjust_frame_parameters(frame_fragment, 
> &session->opt->key_type,
> -                                    options->replay, packet_id_long_form);
> +                                       options->replay, packet_id_long_form);
>          frame_set_mtu_dynamic(frame_fragment, options->ce.fragment, 
> SET_MTU_UPPER_BOUND);
>          frame_print(frame_fragment, D_MTU_INFO, "Fragmentation MTU parms");
>      }
> @@ -2411,7 +2411,9 @@ key_method_2_write(struct buffer *buf, struct 
> tls_session *session)
>           * username/password
>           */
>          if (auth_token.defined)
> +        {
>              up = &auth_token;
> +        }
>  
>          if (!write_string(buf, up->username, -1))
>          {
> diff --git a/src/openvpn/ssl.h b/src/openvpn/ssl.h
> index f0a8ef54..2f6f7657 100644
> --- a/src/openvpn/ssl.h
> +++ b/src/openvpn/ssl.h
> @@ -607,4 +607,5 @@ void
>  show_available_tls_ciphers(const char *cipher_list,
>                             const char *cipher_list_tls13,
>                             const char *tls_cert_profile);
> +
>  #endif /* ifndef OPENVPN_SSL_H */
> diff --git a/src/openvpn/ssl_mbedtls.c b/src/openvpn/ssl_mbedtls.c
> index 4f194ad7..727d295a 100644
> --- a/src/openvpn/ssl_mbedtls.c
> +++ b/src/openvpn/ssl_mbedtls.c
> @@ -191,12 +191,13 @@ tls_ctx_initialised(struct tls_root_ctx *ctx)
>  }
>  
>  #ifdef HAVE_EXPORT_KEYING_MATERIAL
> -int mbedtls_ssl_export_keys_cb(void *p_expkey, const unsigned char *ms,
> -                               const unsigned char *kb, size_t maclen,
> -                               size_t keylen, size_t ivlen,
> -                               const unsigned char client_random[32],
> -                               const unsigned char server_random[32],
> -                               mbedtls_tls_prf_types tls_prf_type)
> +int
> +mbedtls_ssl_export_keys_cb(void *p_expkey, const unsigned char *ms,
> +                           const unsigned char *kb, size_t maclen,
> +                           size_t keylen, size_t ivlen,
> +                           const unsigned char client_random[32],
> +                           const unsigned char server_random[32],
> +                           mbedtls_tls_prf_types tls_prf_type)
>  {
>      struct tls_session *session = p_expkey;
>      struct key_state_ssl *ks_ssl = &session->key[KS_PRIMARY].ks_ssl;
> @@ -210,9 +211,9 @@ int mbedtls_ssl_export_keys_cb(void *p_expkey, const 
> unsigned char *ms,
>  
>      const size_t ms_len = sizeof(ks_ssl->ctx->session->master);
>      int ret = mbedtls_ssl_tls_prf(
> -            tls_prf_type, ms, ms_len, session->opt->ekm_label,
> -            client_server_random, sizeof(client_server_random),
> -            ks_ssl->exported_key_material, session->opt->ekm_size);
> +        tls_prf_type, ms, ms_len, session->opt->ekm_label,
> +        client_server_random, sizeof(client_server_random),
> +        ks_ssl->exported_key_material, session->opt->ekm_size);

why not moving some arguments to the first line and then aligning
everything below the ( ?

>  
>      if (!mbed_ok(ret))
>      {
> @@ -1126,7 +1127,7 @@ key_state_ssl_init(struct key_state_ssl *ks_ssl,
>      if (session->opt->ekm_size)
>      {
>          mbedtls_ssl_conf_export_keys_ext_cb(ks_ssl->ssl_config,
> -                mbedtls_ssl_export_keys_cb, session);
> +                                            mbedtls_ssl_export_keys_cb, 
> session);
>      }
>  #endif
>  
> diff --git a/src/openvpn/ssl_openssl.c b/src/openvpn/ssl_openssl.c
> index d7bd6aa2..5955c6bd 100644
> --- a/src/openvpn/ssl_openssl.c
> +++ b/src/openvpn/ssl_openssl.c
> @@ -683,7 +683,7 @@ tls_ctx_load_ecdh_params(struct tls_root_ctx *ctx, const 
> char *curve_name
>           * so do nothing */
>  #endif
>          return;
> -#else
> +#else  /* if OPENSSL_VERSION_NUMBER >= 0x10002000L */
>          /* For older OpenSSL we have to extract the curve from key on our 
> own */
>          EC_KEY *eckey = NULL;
>          const EC_GROUP *ecgrp = NULL;
> @@ -1173,7 +1173,7 @@ openvpn_extkey_rsa_finish(RSA *rsa)
>   * interface query
>   */
>  const char *
> -get_rsa_padding_name (const int padding)
> +get_rsa_padding_name(const int padding)
>  {
>      switch (padding)
>      {
> @@ -1190,14 +1190,14 @@ get_rsa_padding_name (const int padding)
>  
>  /**
>   * Pass the input hash in 'dgst' to management and get the signature back.
> -  *
> - * @param dgst               hash to be signed
> - * @param dgstlen    len of data in dgst
> - * @param sig                On successful return signature is in sig.
> - * @param siglen     length of buffer sig
> - * @param algorithm  padding/hashing algorithm for the signature
>   *
> - * @return           signature length or -1 on error.
> + * @param dgst          hash to be signed
> + * @param dgstlen       len of data in dgst
> + * @param sig           On successful return signature is in sig.
> + * @param siglen        length of buffer sig
> + * @param algorithm     padding/hashing algorithm for the signature
> + *
> + * @return              signature length or -1 on error.
>   */
>  static int
>  get_sig_from_man(const unsigned char *dgst, unsigned int dgstlen,
> @@ -1239,7 +1239,7 @@ rsa_priv_enc(int flen, const unsigned char *from, 
> unsigned char *to, RSA *rsa,
>          return -1;
>      }
>  
> -    ret = get_sig_from_man(from, flen, to, len, get_rsa_padding_name 
> (padding));
> +    ret = get_sig_from_man(from, flen, to, len, 
> get_rsa_padding_name(padding));
>  
>      return (ret == len) ? ret : -1;
>  }
> @@ -1314,7 +1314,7 @@ err:
>  }
>  
>  #if ((OPENSSL_VERSION_NUMBER > 0x10100000L && 
> !defined(LIBRESSL_VERSION_NUMBER)) \
> -     || LIBRESSL_VERSION_NUMBER > 0x2090000fL) \
> +    || LIBRESSL_VERSION_NUMBER > 0x2090000fL) \

this seems wrong, no?

>      && !defined(OPENSSL_NO_EC)
>  
>  /* called when EC_KEY is destroyed */
> @@ -1475,7 +1475,7 @@ tls_ctx_use_management_external_key(struct tls_root_ctx 
> *ctx)
>          }
>      }
>  #if ((OPENSSL_VERSION_NUMBER > 0x10100000L && 
> !defined(LIBRESSL_VERSION_NUMBER)) \
> -     || LIBRESSL_VERSION_NUMBER > 0x2090000fL) \
> +    || LIBRESSL_VERSION_NUMBER > 0x2090000fL) \

same

>      && !defined(OPENSSL_NO_EC)
>      else if (EVP_PKEY_id(pkey) == EVP_PKEY_EC)
>      {
> @@ -2135,8 +2135,8 @@ show_available_tls_ciphers_list(const char *cipher_list,
>          crypto_msg(M_FATAL, "Cannot create SSL object");
>      }
>  
> -#if (OPENSSL_VERSION_NUMBER < 0x1010000fL) || \
> -    (defined(LIBRESSL_VERSION_NUMBER) && LIBRESSL_VERSION_NUMBER <= 
> 0x2090000fL)
> +#if (OPENSSL_VERSION_NUMBER < 0x1010000fL)    \
> +    || (defined(LIBRESSL_VERSION_NUMBER) && LIBRESSL_VERSION_NUMBER <= 
> 0x2090000fL)
>      STACK_OF(SSL_CIPHER) *sk = SSL_get_ciphers(ssl);
>  #else
>      STACK_OF(SSL_CIPHER) *sk = SSL_get1_supported_ciphers(ssl);
> diff --git a/src/openvpn/ssl_verify.c b/src/openvpn/ssl_verify.c
> index da0966c5..9362b8e9 100644
> --- a/src/openvpn/ssl_verify.c
> +++ b/src/openvpn/ssl_verify.c
> @@ -804,7 +804,7 @@ cleanup:
>  #endif
>  
>  void
> -auth_set_client_reason(struct tls_multi* multi, const char* client_reason)
> +auth_set_client_reason(struct tls_multi *multi, const char *client_reason)
>  {
>      if (multi->client_reason)
>      {
> @@ -1204,7 +1204,7 @@ verify_user_pass_plugin(struct tls_session *session, 
> struct tls_multi *multi,
>  
>  static int
>  verify_user_pass_management(struct tls_session *session,
> -                            struct tls_multi* multi,
> +                            struct tls_multi *multi,
>                              const struct user_pass *up)
>  {
>      int retval = KMDA_ERROR;
> @@ -1301,16 +1301,16 @@ verify_user_pass(struct user_pass *up, struct 
> tls_multi *multi,
>               * for equality with AUTH_TOKEN_HMAC_OK
>               */
>              msg(M_WARN, "TLS: Username/auth-token authentication "
> -                        "succeeded for username '%s'",
> +                "succeeded for username '%s'",
>                  up->username);
> -              skip_auth = true;
> +            skip_auth = true;
>          }
>          else
>          {
>              wipe_auth_token(multi);
>              ks->authenticated = false;
>              msg(M_WARN, "TLS: Username/auth-token authentication "
> -                        "failed for username '%s'", up->username);
> +                "failed for username '%s'", up->username);
>              return;
>          }
>      }
> @@ -1335,12 +1335,12 @@ verify_user_pass(struct user_pass *up, struct 
> tls_multi *multi,
>      }
>  
>      /* check sizing of username if it will become our common name */
> -    if ((session->opt->ssl_flags & SSLF_USERNAME_AS_COMMON_NAME) &&
> -         strlen(up->username)>TLS_USERNAME_LEN)
> +    if ((session->opt->ssl_flags & SSLF_USERNAME_AS_COMMON_NAME)
> +        && strlen(up->username)>TLS_USERNAME_LEN)
>      {
>          msg(D_TLS_ERRORS,
> -                "TLS Auth Error: --username-as-common name specified and 
> username is longer than the maximum permitted Common Name length of %d 
> characters",
> -                TLS_USERNAME_LEN);
> +            "TLS Auth Error: --username-as-common name specified and 
> username is longer than the maximum permitted Common Name length of %d 
> characters",
> +            TLS_USERNAME_LEN);
>          s1 = OPENVPN_PLUGIN_FUNC_ERROR;
>      }
>      /* auth succeeded? */
> diff --git a/src/openvpn/ssl_verify.h b/src/openvpn/ssl_verify.h
> index c54b89a6..21b37a0f 100644
> --- a/src/openvpn/ssl_verify.h
> +++ b/src/openvpn/ssl_verify.h
> @@ -234,7 +234,8 @@ bool tls_authenticate_key(struct tls_multi *multi, const 
> unsigned int mda_key_id
>   * @param multi             The multi tls struct
>   * @param client_reason     The string to send to the client as part of 
> AUTH_FAILED
>   */
> -void auth_set_client_reason(struct tls_multi* multi, const char* 
> client_reason);
> +void auth_set_client_reason(struct tls_multi *multi, const char 
> *client_reason);
> +
>  #endif
>  
>  static inline const char *
> diff --git a/src/openvpn/vlan.c b/src/openvpn/vlan.c
> index a5885de2..9290179d 100644
> --- a/src/openvpn/vlan.c
> +++ b/src/openvpn/vlan.c
> @@ -58,7 +58,7 @@ static void
>  vlanhdr_set_vid(struct openvpn_8021qhdr *hdr, const uint16_t vid)
>  {
>      hdr->pcp_cfi_vid = (hdr->pcp_cfi_vid & ~OPENVPN_8021Q_MASK_VID)
> -                        | (htons(vid) & OPENVPN_8021Q_MASK_VID);
> +                       | (htons(vid) & OPENVPN_8021Q_MASK_VID);
>  }
>  
>  /*
> @@ -135,7 +135,7 @@ vlan_decapsulate(const struct context *c, struct buffer 
> *buf)
>                  goto drop;
>              }
>  
> -            /* vid == 0 means prio-tagged packet: don't drop and 
> fall-through */
> +        /* vid == 0 means prio-tagged packet: don't drop and fall-through */
>          case VLAN_ONLY_TAGGED:
>          case VLAN_ALL:
>              /* tagged frame can be accepted: extract vid and strip 
> encapsulation */
> diff --git a/src/openvpn/win32.h b/src/openvpn/win32.h
> index 4b508c56..79504776 100644
> --- a/src/openvpn/win32.h
> +++ b/src/openvpn/win32.h
> @@ -69,7 +69,7 @@ struct security_attributes
>  struct window_title
>  {
>      bool saved;
> -    char old_window_title [256];
> +    char old_window_title[256];
>  };
>  
>  struct rw_handle {
> 



The rest looks good!

Thanks!


-- 
Antonio Quartulli


_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to