Hi, On 10-10-18 16:25, Arne Schwabe wrote: > These defines are always defined when management is enabled. > > We still have --disable-management as configure option, so we need > to replace these with ENABLE_MANAGEMENT in some cases. >
Very nice, cleans up a lot of cruft. > PATCH v3: Rebase directly on master > > Signed-off-by: Arne Schwabe <a...@rfc2549.org> > --- > src/openvpn/init.c | 4 ++-- > src/openvpn/manage.c | 38 +++----------------------------------- > src/openvpn/manage.h | 10 ---------- > src/openvpn/misc.c | 14 ++++++-------- > src/openvpn/misc.h | 6 +++--- > src/openvpn/options.c | 24 ++++++++++++------------ > src/openvpn/options.h | 2 +- > src/openvpn/push.c | 2 +- > src/openvpn/ssl.c | 16 ++++++++-------- > src/openvpn/ssl.h | 3 ++- > src/openvpn/ssl_backend.h | 4 ++-- > src/openvpn/ssl_common.h | 2 +- > src/openvpn/ssl_mbedtls.c | 4 ++-- > src/openvpn/ssl_openssl.c | 4 ++-- > src/openvpn/syshead.h | 22 ---------------------- > 15 files changed, 45 insertions(+), 110 deletions(-) > > diff --git a/src/openvpn/init.c b/src/openvpn/init.c > index 52c64da4..1b9f19d0 100644 > --- a/src/openvpn/init.c > +++ b/src/openvpn/init.c > @@ -540,7 +540,7 @@ init_query_passwords(const struct context *c) > /* Auth user/pass input */ > if (c->options.auth_user_pass_file) > { > -#ifdef ENABLE_CLIENT_CR > +#ifdef ENABLE_MANAGEMENT > auth_user_pass_setup(c->options.auth_user_pass_file, > &c->options.sc_info); > #else > auth_user_pass_setup(c->options.auth_user_pass_file, NULL); > @@ -2800,7 +2800,7 @@ do_init_crypto_tls(struct context *c, const unsigned > int flags) > to.x509_track = options->x509_track; > > #if P2MP > -#ifdef ENABLE_CLIENT_CR > +#ifdef ENABLE_MANAGEMENT > to.sci = &options->sc_info; > #endif > #endif > diff --git a/src/openvpn/manage.c b/src/openvpn/manage.c > index ed981ab9..8b633f20 100644 > --- a/src/openvpn/manage.c > +++ b/src/openvpn/manage.c > @@ -110,14 +110,12 @@ man_help(void) > msg(M_CLIENT, "client-pf CID : Define packet filter for client > CID (MULTILINE)"); > #endif > #endif > -#ifdef MANAGMENT_EXTERNAL_KEY > msg(M_CLIENT, "rsa-sig : Enter a signature in response to > >RSA_SIGN challenge"); > msg(M_CLIENT, " Enter signature base64 on > subsequent lines followed by END"); > msg(M_CLIENT, "pk-sig : Enter a signature in response to > >PK_SIGN challenge"); > msg(M_CLIENT, " Enter signature base64 on > subsequent lines followed by END"); > msg(M_CLIENT, "certificate : Enter a client certificate in > response to >NEED-CERT challenge"); > msg(M_CLIENT, " Enter certificate base64 on > subsequent lines followed by END"); > -#endif > msg(M_CLIENT, "signal s : Send signal s to daemon,"); > msg(M_CLIENT, " s = > SIGHUP|SIGTERM|SIGUSR1|SIGUSR2."); > msg(M_CLIENT, "state [on|off] [N|all] : Like log, but show state > history."); > @@ -847,8 +845,6 @@ man_hold(struct management *man, const char *cmd) > } > } > > -#ifdef MANAGEMENT_IN_EXTRA > - > #define IER_RESET 0 > #define IER_NEW 1 > > @@ -936,7 +932,6 @@ in_extra_dispatch(struct management *man) > break; > > #endif /* ifdef MANAGEMENT_PF */ > -#ifdef MANAGMENT_EXTERNAL_KEY > case IEC_PK_SIGN: > man->connection.ext_key_state = EKS_READY; > buffer_list_free(man->connection.ext_key_input); > @@ -950,13 +945,10 @@ in_extra_dispatch(struct management *man) > man->connection.ext_cert_input = man->connection.in_extra; > man->connection.in_extra = NULL; > return; > -#endif > } > in_extra_reset(&man->connection, IER_RESET); > } > > -#endif /* MANAGEMENT_IN_EXTRA */ > - > #ifdef MANAGEMENT_DEF_AUTH > > static bool > @@ -1102,8 +1094,6 @@ man_client_pf(struct management *man, const char > *cid_str) > #endif /* MANAGEMENT_PF */ > #endif /* MANAGEMENT_DEF_AUTH */ > > -#ifdef MANAGMENT_EXTERNAL_KEY > - > static void > man_pk_sig(struct management *man, const char *cmd_name) > { > @@ -1136,8 +1126,6 @@ man_certificate(struct management *man) > } > } > > -#endif /* ifdef MANAGMENT_EXTERNAL_KEY */ > - > static void > man_load_stats(struct management *man) > { > @@ -1526,7 +1514,6 @@ man_dispatch_command(struct management *man, struct > status_output *so, const cha > } > #endif > #endif /* ifdef MANAGEMENT_DEF_AUTH */ > -#ifdef MANAGMENT_EXTERNAL_KEY > else if (streq(p[0], "rsa-sig")) > { > man_pk_sig(man, "rsa-sig"); > @@ -1539,7 +1526,6 @@ man_dispatch_command(struct management *man, struct > status_output *so, const cha > { > man_certificate(man); > } > -#endif > #ifdef ENABLE_PKCS11 > else if (streq(p[0], "pkcs11-id-count")) > { > @@ -1928,9 +1914,7 @@ man_reset_client_socket(struct management *man, const > bool exiting) > man->connection.state = MS_INITIAL; > command_line_reset(man->connection.in); > buffer_list_reset(man->connection.out); > -#ifdef MANAGEMENT_IN_EXTRA > in_extra_reset(&man->connection, IER_RESET); > -#endif > msg(D_MANAGEMENT, "MANAGEMENT: Client disconnected"); > } > if (!exiting) > @@ -1972,9 +1956,7 @@ man_process_command(struct management *man, const char > *line) > > CLEAR(parms); > so = status_open(NULL, 0, -1, &man->persist.vout, 0); > -#ifdef MANAGEMENT_IN_EXTRA > in_extra_reset(&man->connection, IER_RESET); > -#endif > > if (man_password_needed(man)) > { > @@ -2212,7 +2194,6 @@ man_read(struct management *man) > const char *line; > while ((line = command_line_get(man->connection.in))) > { > -#ifdef MANAGEMENT_IN_EXTRA > if (man->connection.in_extra) > { > if (!strcmp(line, "END")) > @@ -2225,8 +2206,9 @@ man_read(struct management *man) > } > } > else > -#endif > - man_process_command(man, (char *) line); > + { > + man_process_command(man, (char *) line); > + } > if (man->connection.halt) > { > break; > @@ -2572,12 +2554,8 @@ man_connection_close(struct management *man) > { > buffer_list_free(mc->out); > } > -#ifdef MANAGEMENT_IN_EXTRA > in_extra_reset(&man->connection, IER_RESET); > -#endif > -#ifdef MANAGMENT_EXTERNAL_KEY > buffer_list_free(mc->ext_key_input); > -#endif > man_connection_clear(mc); > } > > @@ -3412,9 +3390,7 @@ management_query_user_pass(struct management *man, > const char *alert_type = NULL; > const char *prefix = NULL; > unsigned int up_query_mode = 0; > -#ifdef ENABLE_CLIENT_CR > const char *sc = NULL; > -#endif > ret = true; > man->persist.standalone_disabled = false; /* This is so M_CLIENT > messages will be correctly passed through msg() */ > man->persist.special_state_msg = NULL; > @@ -3444,12 +3420,10 @@ management_query_user_pass(struct management *man, > up_query_mode = UP_QUERY_USER_PASS; > prefix = "PASSWORD"; > alert_type = "username/password"; > -#ifdef ENABLE_CLIENT_CR > if (static_challenge) > { > sc = static_challenge; > } > -#endif > } > buf_printf(&alert_msg, ">%s:Need '%s' %s", > prefix, > @@ -3461,14 +3435,12 @@ management_query_user_pass(struct management *man, > buf_printf(&alert_msg, " MSG:%s", up->username); > } > > -#ifdef ENABLE_CLIENT_CR > if (sc) > { > buf_printf(&alert_msg, " SC:%d,%s", > BOOL_CAST(flags & > GET_USER_PASS_STATIC_CHALLENGE_ECHO), > sc); > } > -#endif > > man_wait_for_client_connection(man, &signal_received, 0, > MWCC_PASSWORD_WAIT); > if (signal_received) > @@ -3531,8 +3503,6 @@ management_query_user_pass(struct management *man, > return ret; > } > > -#ifdef MANAGMENT_EXTERNAL_KEY > - > static int > management_query_multiline(struct management *man, > const char *b64_data, const char *prompt, const > char *cmd, int *state, struct buffer_list **input) > @@ -3699,8 +3669,6 @@ management_query_cert(struct management *man, const > char *cert_name) > return result; > } > > -#endif /* ifdef MANAGMENT_EXTERNAL_KEY */ > - > /* > * Return true if management_hold() would block > */ > diff --git a/src/openvpn/manage.h b/src/openvpn/manage.h > index ff143fc1..d24abe09 100644 > --- a/src/openvpn/manage.h > +++ b/src/openvpn/manage.h > @@ -275,7 +275,6 @@ struct man_connection { > struct command_line *in; > struct buffer_list *out; > > -#ifdef MANAGEMENT_IN_EXTRA > #define IEC_UNDEF 0 > #define IEC_CLIENT_AUTH 1 > #define IEC_CLIENT_PF 2 > @@ -288,7 +287,6 @@ struct man_connection { > unsigned long in_extra_cid; > unsigned int in_extra_kid; > #endif > -#ifdef MANAGMENT_EXTERNAL_KEY > #define EKS_UNDEF 0 > #define EKS_SOLICIT 1 > #define EKS_INPUT 2 > @@ -297,8 +295,6 @@ struct man_connection { > struct buffer_list *ext_key_input; > int ext_cert_state; > struct buffer_list *ext_cert_input; > -#endif > -#endif /* ifdef MANAGEMENT_IN_EXTRA */ > struct event_set *es; > int env_filter_level; > > @@ -346,9 +342,7 @@ struct management *management_init(void); > #define MF_CLIENT_PF (1<<7) > #endif > #define MF_UNIX_SOCK (1<<8) > -#ifdef MANAGMENT_EXTERNAL_KEY > #define MF_EXTERNAL_KEY (1<<9) > -#endif > #define MF_UP_DOWN (1<<10) > #define MF_QUERY_REMOTE (1<<11) > #define MF_QUERY_PROXY (1<<12) > @@ -436,14 +430,10 @@ void management_learn_addr(struct management > *management, > > #endif > > -#ifdef MANAGMENT_EXTERNAL_KEY > - > char *management_query_pk_sig(struct management *man, const char *b64_data); > > char *management_query_cert(struct management *man, const char *cert_name); > > -#endif > - > static inline bool > management_connected(const struct management *man) > { > diff --git a/src/openvpn/misc.c b/src/openvpn/misc.c > index 2759d98d..d75b7685 100644 > --- a/src/openvpn/misc.c > +++ b/src/openvpn/misc.c > @@ -157,12 +157,10 @@ get_user_pass_cr(struct user_pass *up, > management_auth_failure(management, prefix, "previous auth > credentials failed"); > } > > -#ifdef ENABLE_CLIENT_CR > if (auth_challenge && (flags & GET_USER_PASS_STATIC_CHALLENGE)) > { > sc = auth_challenge; > } > -#endif > if (!management_query_user_pass(management, up, prefix, flags, > sc)) > { > if ((flags & GET_USER_PASS_NOFATAL) != 0) > @@ -272,7 +270,7 @@ get_user_pass_cr(struct user_pass *up, > */ > if (username_from_stdin || password_from_stdin || > response_from_stdin) > { > -#ifdef ENABLE_CLIENT_CR > +#ifdef ENABLE_MANAGEMENT > if (auth_challenge && (flags & GET_USER_PASS_DYNAMIC_CHALLENGE) > && response_from_stdin) > { > struct auth_challenge_info *ac = > get_auth_challenge(auth_challenge, &gc); > @@ -299,7 +297,7 @@ get_user_pass_cr(struct user_pass *up, > } > } > else > -#endif /* ifdef ENABLE_CLIENT_CR */ > +#endif /* ifdef ENABLE_MANAGEMENT */ > { > struct buffer user_prompt = alloc_buf_gc(128, &gc); > struct buffer pass_prompt = alloc_buf_gc(128, &gc); > @@ -333,7 +331,7 @@ get_user_pass_cr(struct user_pass *up, > } > } > > -#ifdef ENABLE_CLIENT_CR > +#ifdef ENABLE_MANAGEMENT > if (auth_challenge && (flags & > GET_USER_PASS_STATIC_CHALLENGE) && response_from_stdin) > { > char *response = (char *) gc_malloc(USER_PASS_LEN, > false, &gc); > @@ -361,7 +359,7 @@ get_user_pass_cr(struct user_pass *up, > string_clear(resp64); > free(resp64); > } > -#endif /* ifdef ENABLE_CLIENT_CR */ > +#endif /* ifdef ENABLE_MANAGEMENT */ > } > } > > @@ -380,7 +378,7 @@ get_user_pass_cr(struct user_pass *up, > return true; > } > > -#ifdef ENABLE_CLIENT_CR > +#ifdef ENABLE_MANAGEMENT > > /* > * See management/management-notes.txt for more info on the > @@ -455,7 +453,7 @@ get_auth_challenge(const char *auth_challenge, struct > gc_arena *gc) > } > } > > -#endif /* ifdef ENABLE_CLIENT_CR */ > +#endif /* ifdef ENABLE_MANAGEMENT */ > > void > purge_user_pass(struct user_pass *up, const bool force) > diff --git a/src/openvpn/misc.h b/src/openvpn/misc.h > index b4d9d035..a54185f0 100644 > --- a/src/openvpn/misc.h > +++ b/src/openvpn/misc.h > @@ -76,7 +76,7 @@ struct user_pass > char password[USER_PASS_LEN]; > }; > > -#ifdef ENABLE_CLIENT_CR > +#ifdef ENABLE_MANAGEMENT > /* > * Challenge response info on client as pushed by server. > */ > @@ -102,10 +102,10 @@ struct static_challenge_info { > const char *challenge_text; > }; > > -#else /* ifdef ENABLE_CLIENT_CR */ > +#else /* ifdef ENABLE_MANAGEMENT */ > struct auth_challenge_info {}; > struct static_challenge_info {}; > -#endif /* ifdef ENABLE_CLIENT_CR */ > +#endif /* ifdef ENABLE_MANAGEMENT */ > > /* > * Flags for get_user_pass and management_query_user_pass > diff --git a/src/openvpn/options.c b/src/openvpn/options.c > index e42029c5..f0762f2e 100644 > --- a/src/openvpn/options.c > +++ b/src/openvpn/options.c > @@ -1735,7 +1735,7 @@ show_settings(const struct options *o) > SHOW_STR(ca_file); > SHOW_STR(ca_path); > SHOW_STR(dh_file); > -#ifdef MANAGMENT_EXTERNAL_KEY > +#ifdef ENABLE_MANAGEMENT > if ((o->management_flags & MF_EXTERNAL_CERT)) > { > SHOW_PARM("cert_file","EXTERNAL_CERT","%s"); > @@ -1745,7 +1745,7 @@ show_settings(const struct options *o) > SHOW_STR(cert_file); > SHOW_STR(extra_certs_file); > > -#ifdef MANAGMENT_EXTERNAL_KEY > +#ifdef ENABLE_MANAGEMENT > if ((o->management_flags & MF_EXTERNAL_KEY)) > { > SHOW_PARM("priv_key_file","EXTERNAL_PRIVATE_KEY","%s"); > @@ -2567,7 +2567,7 @@ options_postprocess_verify_ce(const struct options > *options, const struct connec > { > msg(M_USAGE, "Parameter --key cannot be used when > --pkcs11-provider is also specified."); > } > -#ifdef MANAGMENT_EXTERNAL_KEY > +#ifdef ENABLE_MANAGEMENT > if (options->management_flags & MF_EXTERNAL_KEY) > { > msg(M_USAGE, "Parameter --management-external-key cannot be > used when --pkcs11-provider is also specified."); > @@ -2590,7 +2590,7 @@ options_postprocess_verify_ce(const struct options > *options, const struct connec > } > else > #endif /* ifdef ENABLE_PKCS11 */ > -#ifdef MANAGMENT_EXTERNAL_KEY > +#ifdef ENABLE_MANAGEMENT > if ((options->management_flags & MF_EXTERNAL_KEY) && > options->priv_key_file) > { > msg(M_USAGE, "--key and --management-external-key are mutually > exclusive"); > @@ -2627,7 +2627,7 @@ options_postprocess_verify_ce(const struct options > *options, const struct connec > { > msg(M_USAGE, "Parameter --pkcs12 cannot be used when > --cryptoapicert is also specified."); > } > -#ifdef MANAGMENT_EXTERNAL_KEY > +#ifdef ENABLE_MANAGEMENT > if (options->management_flags & MF_EXTERNAL_KEY) > { > msg(M_USAGE, "Parameter --management-external-key cannot be > used when --cryptoapicert is also specified."); > @@ -2657,7 +2657,7 @@ options_postprocess_verify_ce(const struct options > *options, const struct connec > { > msg(M_USAGE, "Parameter --key cannot be used when --pkcs12 > is also specified."); > } > -#ifdef MANAGMENT_EXTERNAL_KEY > +#ifdef ENABLE_MANAGEMENT > if (options->management_flags & MF_EXTERNAL_KEY) > { > msg(M_USAGE, "Parameter --management-external-key cannot be > used when --pkcs12 is also specified."); > @@ -2690,7 +2690,7 @@ options_postprocess_verify_ce(const struct options > *options, const struct connec > { > > const int sum = > -#ifdef MANAGMENT_EXTERNAL_KEY > +#ifdef ENABLE_MANAGEMENT > ((options->cert_file != NULL) || > (options->management_flags & MF_EXTERNAL_CERT)) > +((options->priv_key_file != NULL) || > (options->management_flags & MF_EXTERNAL_KEY)); > #else > @@ -2714,11 +2714,11 @@ options_postprocess_verify_ce(const struct options > *options, const struct connec > } > else > { > -#ifdef MANAGMENT_EXTERNAL_KEY > +#ifdef ENABLE_MANAGEMENT > if (!(options->management_flags & MF_EXTERNAL_CERT)) > #endif > notnull(options->cert_file, "certificate file (--cert) or > PKCS#12 file (--pkcs12)"); > -#ifdef MANAGMENT_EXTERNAL_KEY > +#ifdef ENABLE_MANAGEMENT > if (!(options->management_flags & MF_EXTERNAL_KEY)) > #endif > notnull(options->priv_key_file, "private key file (--key) or > PKCS#12 file (--pkcs12)"); > @@ -3308,7 +3308,7 @@ options_postprocess_filechecks(struct options *options) > errs |= check_file_access(CHKACC_FILE|CHKACC_INLINE, options->cert_file, > R_OK, "--cert"); > errs |= check_file_access(CHKACC_FILE|CHKACC_INLINE, > options->extra_certs_file, R_OK, > "--extra-certs"); > -#ifdef MANAGMENT_EXTERNAL_KEY > +#ifdef ENABLE_MANAGEMENT > if (!(options->management_flags & MF_EXTERNAL_KEY)) > #endif > { > @@ -5155,7 +5155,7 @@ add_option(struct options *options, > options->management_flags |= MF_CONNECT_AS_CLIENT; > options->management_write_peer_info_file = p[1]; > } > -#ifdef MANAGMENT_EXTERNAL_KEY > +#ifdef ENABLE_MANAGEMENT > else if (streq(p[0], "management-external-key") && !p[1]) > { > VERIFY_PERMISSION(OPT_P_GENERAL); > @@ -7023,7 +7023,7 @@ add_option(struct options *options, > VERIFY_PERMISSION(OPT_P_GENERAL); > auth_retry_set(msglevel, p[1]); > } > -#ifdef ENABLE_CLIENT_CR > +#ifdef ENABLE_MANAGEMENT > else if (streq(p[0], "static-challenge") && p[1] && p[2] && !p[3]) > { > VERIFY_PERMISSION(OPT_P_GENERAL); > diff --git a/src/openvpn/options.h b/src/openvpn/options.h > index acbd1087..33aa71f7 100644 > --- a/src/openvpn/options.h > +++ b/src/openvpn/options.h > @@ -469,7 +469,7 @@ struct options > > int scheduled_exit_interval; > > -#ifdef ENABLE_CLIENT_CR > +#ifdef ENABLE_MANAGEMENT > struct static_challenge_info sc_info; > #endif > #endif /* if P2MP */ > diff --git a/src/openvpn/push.c b/src/openvpn/push.c > index a7ec4dd6..72f09962 100644 > --- a/src/openvpn/push.c > +++ b/src/openvpn/push.c > @@ -88,7 +88,7 @@ receive_auth_failed(struct context *c, const struct buffer > *buffer) > * Save the dynamic-challenge text even when management is defined > */ > { > -#ifdef ENABLE_CLIENT_CR > +#ifdef ENABLE_MANAGEMENT > struct buffer buf = *buffer; > if (buf_string_match_head_str(&buf, "AUTH_FAILED,CRV1:") && > BLEN(&buf)) > { > diff --git a/src/openvpn/ssl.c b/src/openvpn/ssl.c > index 455adfb7..58261e66 100644 > --- a/src/openvpn/ssl.c > +++ b/src/openvpn/ssl.c > @@ -399,7 +399,7 @@ pem_password_callback(char *buf, int size, int rwflag, > void *u) > static bool auth_user_pass_enabled; /* GLOBAL */ > static struct user_pass auth_user_pass; /* GLOBAL */ > > -#ifdef ENABLE_CLIENT_CR > +#ifdef ENABLE_MANAGEMENT > static char *auth_challenge; /* GLOBAL */ > #endif > > @@ -409,7 +409,7 @@ auth_user_pass_setup(const char *auth_file, const struct > static_challenge_info * > auth_user_pass_enabled = true; > if (!auth_user_pass.defined) > { > -#ifdef ENABLE_CLIENT_CR > +#ifdef ENABLE_MANAGEMENT > if (auth_challenge) /* dynamic challenge/response */ > { > get_user_pass_cr(&auth_user_pass, > @@ -432,7 +432,7 @@ auth_user_pass_setup(const char *auth_file, const struct > static_challenge_info * > sci->challenge_text); > } > else > -#endif /* ifdef ENABLE_CLIENT_CR */ > +#endif /* ifdef ENABLE_MANAGEMENT */ > get_user_pass(&auth_user_pass, auth_file, UP_TYPE_AUTH, > GET_USER_PASS_MANAGEMENT); > } > } > @@ -480,12 +480,12 @@ ssl_purge_auth(const bool auth_user_pass_only) > purge_user_pass(&passbuf, true); > } > purge_user_pass(&auth_user_pass, true); > -#ifdef ENABLE_CLIENT_CR > +#ifdef ENABLE_MANAGEMENT > ssl_purge_auth_challenge(); > #endif > } > > -#ifdef ENABLE_CLIENT_CR > +#ifdef ENABLE_MANAGEMENT > > void > ssl_purge_auth_challenge(void) > @@ -652,7 +652,7 @@ init_ssl(const struct options *options, struct > tls_root_ctx *new_ctx) > tls_ctx_load_cryptoapi(new_ctx, options->cryptoapi_cert); > } > #endif > -#ifdef MANAGMENT_EXTERNAL_KEY > +#ifdef ENABLE_MANAGEMENT > else if (options->management_flags & MF_EXTERNAL_CERT) > { > char *cert = management_query_cert(management, > @@ -674,7 +674,7 @@ init_ssl(const struct options *options, struct > tls_root_ctx *new_ctx) > goto err; > } > } > -#ifdef MANAGMENT_EXTERNAL_KEY > +#ifdef ENABLE_MANAGEMENT > else if (options->management_flags & MF_EXTERNAL_KEY) > { > if (tls_ctx_use_management_external_key(new_ctx)) > @@ -2364,7 +2364,7 @@ key_method_2_write(struct buffer *buf, struct > tls_session *session) > /* write username/password if specified */ > if (auth_user_pass_enabled) > { > -#ifdef ENABLE_CLIENT_CR > +#ifdef ENABLE_MANAGEMENT > auth_user_pass_setup(session->opt->auth_user_pass_file, > session->opt->sci); > #else > auth_user_pass_setup(session->opt->auth_user_pass_file, NULL); > diff --git a/src/openvpn/ssl.h b/src/openvpn/ssl.h > index 72227d97..a1bd9bf0 100644 > --- a/src/openvpn/ssl.h > +++ b/src/openvpn/ssl.h > @@ -428,7 +428,8 @@ void ssl_purge_auth(const bool auth_user_pass_only); > > void ssl_set_auth_token(const char *token); > > -#ifdef ENABLE_CLIENT_CR > + > +#ifdef ENABLE_MANAGEMENT This inserts a superfluous newline and space. > /* > * ssl_get_auth_challenge will parse the server-pushed auth-failed > * reason string and return a dynamically allocated > diff --git a/src/openvpn/ssl_backend.h b/src/openvpn/ssl_backend.h > index 5023c02a..856e809f 100644 > --- a/src/openvpn/ssl_backend.h > +++ b/src/openvpn/ssl_backend.h > @@ -272,7 +272,7 @@ void tls_ctx_load_cert_file(struct tls_root_ctx *ctx, > const char *cert_file, > int tls_ctx_load_priv_file(struct tls_root_ctx *ctx, const char > *priv_key_file, > const char *priv_key_file_inline); > > -#ifdef MANAGMENT_EXTERNAL_KEY > +#ifdef ENABLE_MANAGEMENT > > /** > * Tell the management interface to load the given certificate and the > external > @@ -284,7 +284,7 @@ int tls_ctx_load_priv_file(struct tls_root_ctx *ctx, > const char *priv_key_file, > */ > int tls_ctx_use_management_external_key(struct tls_root_ctx *ctx); > > -#endif /* MANAGMENT_EXTERNAL_KEY */ > +#endif /* ENABLE_MANAGEMENT */ > > /** > * Load certificate authority certificates from the given file or path. > diff --git a/src/openvpn/ssl_common.h b/src/openvpn/ssl_common.h > index 08ef6ffa..919ec57c 100644 > --- a/src/openvpn/ssl_common.h > +++ b/src/openvpn/ssl_common.h > @@ -332,7 +332,7 @@ struct tls_options > > const struct x509_track *x509_track; > > -#ifdef ENABLE_CLIENT_CR > +#ifdef ENABLE_MANAGEMENT > const struct static_challenge_info *sci; > #endif > > diff --git a/src/openvpn/ssl_mbedtls.c b/src/openvpn/ssl_mbedtls.c > index e4850cb6..00e5d819 100644 > --- a/src/openvpn/ssl_mbedtls.c > +++ b/src/openvpn/ssl_mbedtls.c > @@ -605,7 +605,7 @@ tls_ctx_use_external_signing_func(struct tls_root_ctx > *ctx, > return 0; > } > > -#ifdef MANAGMENT_EXTERNAL_KEY > +#ifdef ENABLE_MANAGEMENT > > /** Query the management interface for a signature, see external_sign_func. > */ > static bool > @@ -645,7 +645,7 @@ tls_ctx_use_management_external_key(struct tls_root_ctx > *ctx) > return tls_ctx_use_external_signing_func(ctx, management_sign_func, > NULL); > } > > -#endif /* ifdef MANAGMENT_EXTERNAL_KEY */ > +#endif /* ifdef ENABLE_MANAGEMENT */ > > void > tls_ctx_load_ca(struct tls_root_ctx *ctx, const char *ca_file, > diff --git a/src/openvpn/ssl_openssl.c b/src/openvpn/ssl_openssl.c > index 1a66d178..0858d5eb 100644 > --- a/src/openvpn/ssl_openssl.c > +++ b/src/openvpn/ssl_openssl.c > @@ -997,7 +997,7 @@ end: > } > > > -#ifdef MANAGMENT_EXTERNAL_KEY > +#ifdef ENABLE_MANAGEMENT > > /* encrypt */ > static int > @@ -1340,7 +1340,7 @@ cleanup: > return ret; > } > > -#endif /* ifdef MANAGMENT_EXTERNAL_KEY */ > +#endif /* ifdef ENABLE_MANAGEMENT */ > > static int > sk_x509_name_cmp(const X509_NAME *const *a, const X509_NAME *const *b) > diff --git a/src/openvpn/syshead.h b/src/openvpn/syshead.h > index 487b32a6..d2a50341 100644 > --- a/src/openvpn/syshead.h > +++ b/src/openvpn/syshead.h > @@ -548,26 +548,11 @@ socket_defined(const socket_descriptor_t sd) > #undef ENABLE_DEF_AUTH > #endif > > -/* > - * Enable external private key > - */ > -#if defined(ENABLE_MANAGEMENT) > -#define MANAGMENT_EXTERNAL_KEY > -#endif > - > /* Enable mbed TLS RNG prediction resistance support */ > #ifdef ENABLE_CRYPTO_MBEDTLS > #define ENABLE_PREDICTION_RESISTANCE > #endif /* ENABLE_CRYPTO_MBEDTLS */ > > -/* > - * MANAGEMENT_IN_EXTRA allows the management interface to > - * read multi-line inputs from clients. > - */ > -#if defined(MANAGEMENT_DEF_AUTH) || defined(MANAGMENT_EXTERNAL_KEY) > -#define MANAGEMENT_IN_EXTRA > -#endif > - > /* > * Enable packet filter? > */ > @@ -658,13 +643,6 @@ socket_defined(const socket_descriptor_t sd) > #define CONNECT_NONBLOCK > #endif > > -/* > - * Do we support challenge/response authentication as client? > - */ > -#if defined(ENABLE_MANAGEMENT) > -#define ENABLE_CLIENT_CR > -#endif > - > /* > * Compression support > */ > Apart from the single whitespace nit, this looks good, compiles fine with and without --disable-management, and passes basic sanity checks. Acked-by: Steffan Karger <steffan.kar...@fox-it.com> -Steffan _______________________________________________ Openvpn-devel mailing list Openvpn-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-devel