Hi,

On 30/11/2018 23:56, Gert Doering wrote:

[cut]

> diff --git a/src/openvpn/cryptoapi.c b/src/openvpn/cryptoapi.c
> index fa057cb2..9687d8c2 100644
> --- a/src/openvpn/cryptoapi.c
> +++ b/src/openvpn/cryptoapi.c
> @@ -159,7 +159,8 @@ ms_error_text(DWORD ms_err)
>          /* trim to the left */
>          if (rv)
>          {
> -            for (p = rv + strlen(rv) - 1; p >= rv; p--) {
> +            for (p = rv + strlen(rv) - 1; p >= rv; p--)
> +            {
>                  if (isspace(*p))
>                  {
>                      *p = '\0';
> @@ -198,7 +199,8 @@ err_put_ms_error(DWORD ms_err, int func, const char 
> *file, int line)
>      }
>      /* since MS error codes are 32 bit, and the ones in the ERR_... system is
>       * only 12, we must have a mapping table between them.  */
> -    for (i = 0; i < ERR_MAP_SZ; i++) {
> +    for (i = 0; i < ERR_MAP_SZ; i++)
> +    {
>          if (err_map[i].ms_err == ms_err)
>          {
>              ERR_PUT_error(ERR_LIB_CRYPTOAPI, func, err_map[i].err, file, 
> line);
> @@ -267,8 +269,8 @@ priv_enc_CNG(const CAPI_DATA *cd, const wchar_t 
> *hash_algo, const unsigned char
>      BCRYPT_PKCS1_PADDING_INFO padinfo = {hash_algo};
>      DWORD status;
>  
> -    status = NCryptSignHash(hkey, padding? &padinfo : NULL, (BYTE*) from, 
> flen,
> -                            to, tlen, &len, padding? BCRYPT_PAD_PKCS1 : 0);
> +    status = NCryptSignHash(hkey, padding ? &padinfo : NULL, (BYTE *) from, 
> flen,
> +                            to, tlen, &len, padding ? BCRYPT_PAD_PKCS1 : 0);
>      if (status != ERROR_SUCCESS)
>      {
>          SetLastError(status);
> @@ -375,7 +377,7 @@ rsa_priv_enc(int flen, const unsigned char *from, 
> unsigned char *to, RSA *rsa, i
>   */
>  static int
>  rsa_sign_CNG(int type, const unsigned char *m, unsigned int m_len,
> -              unsigned char *sig, unsigned int *siglen, const RSA *rsa)
> +             unsigned char *sig, unsigned int *siglen, const RSA *rsa)
>  {
>      CAPI_DATA *cd = (CAPI_DATA *) 
> RSA_meth_get0_app_data(RSA_get_method(rsa));
>      const wchar_t *alg = NULL;
> @@ -419,6 +421,7 @@ rsa_sign_CNG(int type, const unsigned char *m, unsigned 
> int m_len,
>              /* No DigestInfo header is required -- set alg-name to NULL */
>              alg = NULL;
>              break;
> +
>          default:
>              msg(M_WARN, "cryptoapicert: Unknown hash type NID=0x%x", type);
>              RSAerr(RSA_F_RSA_SIGN, RSA_R_UNKNOWN_ALGORITHM_TYPE);
> @@ -459,7 +462,7 @@ finish(RSA *rsa)
>          return 0;
>      }
>      CAPI_DATA_free(cd);
> -    RSA_meth_free((RSA_METHOD*) rsa_meth);
> +    RSA_meth_free((RSA_METHOD *) rsa_meth);
>      return 1;
>  }
>  
> @@ -586,7 +589,7 @@ ssl_ctx_set_eckey(SSL_CTX *ssl_ctx, CAPI_DATA *cd, 
> EVP_PKEY *pkey)
>      if (cd->key_spec != CERT_NCRYPT_KEY_SPEC)
>      {
>          msg(M_NONFATAL, "ERROR: cryptoapicert with only legacy private key 
> handle available."
> -                    " EC certificate not supported.");
> +            " EC certificate not supported.");
>          goto err;
>      }
>      /* create a method struct with default callbacks filled in */
> @@ -686,7 +689,8 @@ find_certificate_in_store(const char *cert_prop, 
> HCERTSTORE cert_store)
>  
>          /* skip the tag */
>          cert_prop += 6;
> -        for (p = (char *) cert_prop, i = 0; *p && i < sizeof(hash); i++) {
> +        for (p = (char *) cert_prop, i = 0; *p && i < sizeof(hash); i++)
> +        {
>              if (*p >= '0' && *p <= '9')
>              {
>                  x = (*p - '0') << 4;
> @@ -739,7 +743,7 @@ ssl_ctx_set_rsakey(SSL_CTX *ssl_ctx, CAPI_DATA *cd, 
> EVP_PKEY *pkey)
>      bool rsa_method_set = false;
>  
>      my_rsa_method = RSA_meth_new("Microsoft Cryptography API RSA Method",
> -                                  RSA_METHOD_FLAG_NO_CHECK);
> +                                 RSA_METHOD_FLAG_NO_CHECK);
>      check_malloc_return(my_rsa_method);
>      RSA_meth_set_pub_enc(my_rsa_method, rsa_pub_enc);
>      RSA_meth_set_pub_dec(my_rsa_method, rsa_pub_dec);
> @@ -797,7 +801,7 @@ ssl_ctx_set_rsakey(SSL_CTX *ssl_ctx, CAPI_DATA *cd, 
> EVP_PKEY *pkey)
>          goto err;
>      }
>      /* SSL_CTX_use_RSAPrivateKey() increased the reference count in 'rsa', so
> -     * we decrease it here with RSA_free(), or it will never be cleaned up. 
> */
> +    * we decrease it here with RSA_free(), or it will never be cleaned up. */

Is the above change right? Maybe it would make more sense to move the */
to the new line too, but regardless, this change is clearly breaking the
alignment of the *s.

>      RSA_free(rsa);
>      return 1;
>  
> @@ -867,7 +871,7 @@ SSL_CTX_use_CryptoAPI_certificate(SSL_CTX *ssl_ctx, const 
> char *cert_prop)
>      DWORD flags = CRYPT_ACQUIRE_COMPARE_KEY_FLAG
>                    | CRYPT_ACQUIRE_PREFER_NCRYPT_KEY_FLAG;
>      if (!CryptAcquireCertificatePrivateKey(cd->cert_context, flags, NULL,
> -                    &cd->crypt_prov, &cd->key_spec, &cd->free_crypt_prov))
> +                                           &cd->crypt_prov, &cd->key_spec, 
> &cd->free_crypt_prov))
>      {
>          /* if we don't have a smart card reader here, and we try to access a
>           * smart card certificate, we get:

[cut]


> --- a/src/openvpn/forward.c
> +++ b/src/openvpn/forward.c
> @@ -757,7 +757,7 @@ static void
>  process_coarse_timers(struct context *c)
>  {
>      /* flush current packet-id to file once per 60
> -     * seconds if --replay-persist was specified */
> +    * seconds if --replay-persist was specified */

same here

>      check_packet_id_persist_flush(c);
>  
>      /* should we update status file? */
> @@ -836,7 +836,7 @@ check_coarse_timers_dowork(struct context *c)
>      process_coarse_timers(c);
>      c->c2.coarse_timer_wakeup = now + c->c2.timeval.tv_sec;
>  
> -    dmsg(D_INTERVAL, "TIMER: coarse timer wakeup %"PRIi64" seconds", 
> (int64_t)c->c2.timeval.tv_sec);
> +    dmsg(D_INTERVAL, "TIMER: coarse timer wakeup %" PRIi64 " seconds", 
> (int64_t)c->c2.timeval.tv_sec);
>  
>      /* Is the coarse timeout NOT the earliest one? */
>      if (c->c2.timeval.tv_sec > save.tv_sec)

[cut]

> --- a/src/openvpn/ntlm.c
> +++ b/src/openvpn/ntlm.c
> @@ -314,8 +314,8 @@ ntlm_phase_3(const struct http_proxy_info *p, const char 
> *phase_2,
>           * byte order on the wire for the NTLM header is LE.
>           */
>          const size_t hoff = 0x14;
> -        unsigned long flags = buf2[hoff] | (buf2[hoff + 1] << 8) |
> -                              (buf2[hoff + 2] << 16) | (buf2[hoff + 3] << 
> 24);
> +        unsigned long flags = buf2[hoff] | (buf2[hoff + 1] << 8)
> +                              |(buf2[hoff + 2] << 16) | (buf2[hoff + 3] << 
> 24);

shouldn't there be a space between | and the opening ( ?

>          if ((flags & 0x00800000) == 0x00800000)
>          {
>              tib_len = buf2[0x28];            /* Get Target Information block 
> size */
> diff --git a/src/openvpn/openssl_compat.h b/src/openvpn/openssl_compat.h
> index 9560b29f..a4072b9a 100644
> --- a/src/openvpn/openssl_compat.h
> +++ b/src/openvpn/openssl_compat.h
> @@ -193,8 +193,8 @@ X509_get0_pubkey(const X509 *x)
>   * @param store              X509 object store
>   * @return                   the X509 object stack
>   */
> -static inline STACK_OF(X509_OBJECT) *
> -X509_STORE_get0_objects(X509_STORE *store)
> +static inline STACK_OF(X509_OBJECT)
> +*X509_STORE_get0_objects(X509_STORE *store)

This is kind of wierd, isn't it? normally the * is kept on the same line
as the type, exactly because it is part of the return type. no?

>  {
>      return store ? store->objs : NULL;
>  }
> @@ -369,7 +369,7 @@ RSA_set0_key(RSA *rsa, BIGNUM *n, BIGNUM *e, BIGNUM *d)
>  
>      return 1;
>  }
> -#endif
> +#endif /* if !defined(HAVE_RSA_SET0_KEY) */
>  
>  #if !defined(HAVE_RSA_BITS)
>  /**
> @@ -483,9 +483,9 @@ RSA_meth_free(RSA_METHOD *meth)
>   */
>  static inline int
>  RSA_meth_set_pub_enc(RSA_METHOD *meth,
> -                     int (*pub_enc) (int flen, const unsigned char *from,
> -                                     unsigned char *to, RSA *rsa,
> -                                     int padding))
> +                     int (*pub_enc)(int flen, const unsigned char *from,
> +                                    unsigned char *to, RSA *rsa,
> +                                    int padding))
>  {
>      if (meth)
>      {
> @@ -506,9 +506,9 @@ RSA_meth_set_pub_enc(RSA_METHOD *meth,
>   */
>  static inline int
>  RSA_meth_set_pub_dec(RSA_METHOD *meth,
> -                     int (*pub_dec) (int flen, const unsigned char *from,
> -                                     unsigned char *to, RSA *rsa,
> -                                     int padding))
> +                     int (*pub_dec)(int flen, const unsigned char *from,
> +                                    unsigned char *to, RSA *rsa,
> +                                    int padding))
>  {
>      if (meth)
>      {
> @@ -529,9 +529,9 @@ RSA_meth_set_pub_dec(RSA_METHOD *meth,
>   */
>  static inline int
>  RSA_meth_set_priv_enc(RSA_METHOD *meth,
> -                      int (*priv_enc) (int flen, const unsigned char *from,
> -                                       unsigned char *to, RSA *rsa,
> -                                       int padding))
> +                      int (*priv_enc)(int flen, const unsigned char *from,
> +                                      unsigned char *to, RSA *rsa,
> +                                      int padding))
>  {
>      if (meth)
>      {
> @@ -552,9 +552,9 @@ RSA_meth_set_priv_enc(RSA_METHOD *meth,
>   */
>  static inline int
>  RSA_meth_set_priv_dec(RSA_METHOD *meth,
> -                      int (*priv_dec) (int flen, const unsigned char *from,
> -                                       unsigned char *to, RSA *rsa,
> -                                       int padding))
> +                      int (*priv_dec)(int flen, const unsigned char *from,
> +                                      unsigned char *to, RSA *rsa,
> +                                      int padding))
>  {
>      if (meth)
>      {
> @@ -574,7 +574,7 @@ RSA_meth_set_priv_dec(RSA_METHOD *meth,
>   * @return                   1 on success, 0 on error
>   */
>  static inline int
> -RSA_meth_set_init(RSA_METHOD *meth, int (*init) (RSA *rsa))
> +RSA_meth_set_init(RSA_METHOD *meth, int (*init)(RSA *rsa))
>  {
>      if (meth)
>      {
> @@ -594,11 +594,12 @@ RSA_meth_set_init(RSA_METHOD *meth, int (*init) (RSA 
> *rsa))
>   * @return                   1 on success, 0 on error
>   */
>  static inline
> -int RSA_meth_set_sign(RSA_METHOD *meth,
> -                      int (*sign) (int type, const unsigned char *m,
> -                                   unsigned int m_length,
> -                                   unsigned char *sigret, unsigned int 
> *siglen,
> -                                   const RSA *rsa))
> +int

shouldn't int go on the same line as 'static inline' ?

> +RSA_meth_set_sign(RSA_METHOD *meth,
> +                  int (*sign)(int type, const unsigned char *m,
> +                              unsigned int m_length,
> +                              unsigned char *sigret, unsigned int *siglen,
> +                              const RSA *rsa))
>  {
>      meth->rsa_sign = sign;
>      return 1;
> @@ -614,7 +615,7 @@ int RSA_meth_set_sign(RSA_METHOD *meth,
>   * @return                   1 on success, 0 on error
>   */
>  static inline int
> -RSA_meth_set_finish(RSA_METHOD *meth, int (*finish) (RSA *rsa))
> +RSA_meth_set_finish(RSA_METHOD *meth, int (*finish)(RSA *rsa))
>  {
>      if (meth)
>      {
> @@ -669,7 +670,7 @@ RSA_meth_get0_app_data(const RSA_METHOD *meth)
>  static inline int
>  EC_GROUP_order_bits(const EC_GROUP *group)
>  {
> -    BIGNUM* order = BN_new();
> +    BIGNUM *order = BN_new();
>      EC_GROUP_get_order(group, order, NULL);
>      int bits = BN_num_bits(order);
>      BN_free(order);
> diff --git a/src/openvpn/options.c b/src/openvpn/options.c
> index 9ee1836b..6d53dea5 100644
> --- a/src/openvpn/options.c
> +++ b/src/openvpn/options.c
> @@ -2134,7 +2134,7 @@ options_postprocess_verify_ce(const struct options 
> *options, const struct connec
>              "passwords is STRONGLY discouraged and considered insecure");
>      }
>  
> -#endif
> +#endif /* ifdef ENABLE_MANAGEMENT */
>  
>      /*
>       * Windows-specific options.
> @@ -2859,8 +2859,10 @@ options_postprocess_mutate_ce(struct options *o, 
> struct connection_entry *ce)
>          {
>              struct buffer in = buffer_read_from_file(o->tls_auth_file, 
> &o->gc);
>              if (!buf_valid(&in))
> +            {
>                  msg(M_FATAL, "Cannot pre-load tls-auth keyfile (%s)",
>                      o->tls_auth_file);
> +            }
>  
>              ce->tls_auth_file = INLINE_FILE_TAG;
>              ce->tls_auth_file_inline = (char *)in.data;
> @@ -2870,8 +2872,10 @@ options_postprocess_mutate_ce(struct options *o, 
> struct connection_entry *ce)
>          {
>              struct buffer in = buffer_read_from_file(o->tls_crypt_file, 
> &o->gc);
>              if (!buf_valid(&in))
> +            {
>                  msg(M_FATAL, "Cannot pre-load tls-crypt keyfile (%s)",
>                      o->tls_auth_file);
> +            }
>  
>              ce->tls_crypt_file = INLINE_FILE_TAG;
>              ce->tls_crypt_inline = (char *)in.data;
> @@ -3040,7 +3044,7 @@ options_postprocess_mutate(struct options *o)
>      {
>          /* DH file is only meaningful in a tls-server context. */
>          msg(M_WARN, "WARNING: Ignoring option 'dh' in tls-client mode, 
> please only "
> -                    "include this in your server configuration");
> +            "include this in your server configuration");
>          o->dh_file = NULL;
>      }
>  
> @@ -7146,7 +7150,7 @@ add_option(struct options *options,
>          {
>              if (strstr(p[2], ":"))
>              {
> -                ipv6dns=true;
> +                ipv6dns = true;
>                  foreign_option(options, p, 3, es);
>                  dhcp_option_dns6_parse(p[2], o->dns6, &o->dns6_len, 
> msglevel);
>              }
> diff --git a/src/openvpn/otime.c b/src/openvpn/otime.c
> index e0b1b0ee..759a7fb5 100644
> --- a/src/openvpn/otime.c
> +++ b/src/openvpn/otime.c
> @@ -88,7 +88,7 @@ const char *
>  tv_string(const struct timeval *tv, struct gc_arena *gc)
>  {
>      struct buffer out = alloc_buf_gc(64, gc);
> -    buf_printf(&out, "[%"PRIi64"/%ld]",
> +    buf_printf(&out, "[%" PRIi64 "/%ld]",
>                 (int64_t)tv->tv_sec,
>                 (long)tv->tv_usec);
>      return BSTR(&out);
> @@ -198,7 +198,7 @@ time_test(void)
>          t = time(NULL);
>          gettimeofday(&tv, NULL);
>  #if 1
> -        msg(M_INFO, "t=%"PRIi64" s=%"PRIi64" us=%ld",
> +        msg(M_INFO, "t=%" PRIi64 " s=%" PRIi64 " us=%ld",
>              (int64_t)t,
>              (int64_t)tv.tv_sec,
>              (long)tv.tv_usec);
> diff --git a/src/openvpn/packet_id.c b/src/openvpn/packet_id.c
> index dc44f36b..0c744875 100644
> --- a/src/openvpn/packet_id.c
> +++ b/src/openvpn/packet_id.c
> @@ -347,7 +347,7 @@ packet_id_send_update(struct packet_id_send *p, bool 
> long_form)
>  
>  bool
>  packet_id_write(struct packet_id_send *p, struct buffer *buf, bool long_form,
> -        bool prepend)
> +                bool prepend)
>  {
>      if (!packet_id_send_update(p, long_form))
>      {
> @@ -606,13 +606,13 @@ packet_id_debug_print(int msglevel,
>          }
>          buf_printf(&out, "%c", c);
>      }
> -    buf_printf(&out, "] %"PRIi64":" packet_id_format, (int64_t)p->time, 
> (packet_id_print_type)p->id);
> +    buf_printf(&out, "] %" PRIi64 ":" packet_id_format, (int64_t)p->time, 
> (packet_id_print_type)p->id);
>      if (pin)
>      {
> -        buf_printf(&out, " %"PRIi64":" packet_id_format, (int64_t)pin->time, 
> (packet_id_print_type)pin->id);
> +        buf_printf(&out, " %" PRIi64 ":" packet_id_format, 
> (int64_t)pin->time, (packet_id_print_type)pin->id);
>      }
>  
> -    buf_printf(&out, " t=%"PRIi64"[%d]",
> +    buf_printf(&out, " t=%" PRIi64 "[%d]",
>                 (int64_t)prev_now,
>                 (int)(prev_now - tv.tv_sec));
>  
> @@ -666,7 +666,7 @@ packet_id_interactive_test(void)
>          {
>              packet_id_reap_test(&pid.rec);
>              test = packet_id_test(&pid.rec, &pin);
> -            printf("packet_id_test (%"PRIi64", " packet_id_format ") 
> returned %d\n",
> +            printf("packet_id_test (%" PRIi64 ", " packet_id_format ") 
> returned %d\n",
>                     (int64_t)pin.time,
>                     (packet_id_print_type)pin.id,
>                     test);
> @@ -679,7 +679,7 @@ packet_id_interactive_test(void)
>          {
>              long_form = (count < 20);
>              packet_id_alloc_outgoing(&pid.send, &pin, long_form);
> -            printf("(%"PRIi64"(" packet_id_format "), %d)\n",
> +            printf("(%" PRIi64 "(" packet_id_format "), %d)\n",
>                     (int64_t)pin.time,
>                     (packet_id_print_type)pin.id,
>                     long_form);
> diff --git a/src/openvpn/packet_id.h b/src/openvpn/packet_id.h
> index ec03e348..26b07975 100644
> --- a/src/openvpn/packet_id.h
> +++ b/src/openvpn/packet_id.h
> @@ -263,7 +263,7 @@ bool packet_id_read(struct packet_id_net *pin, struct 
> buffer *buf, bool long_for
>   * @return true if successful, false otherwise.
>   */
>  bool packet_id_write(struct packet_id_send *p, struct buffer *buf,
> -        bool long_form, bool prepend);
> +                     bool long_form, bool prepend);
>  
>  /*
>   * Inline functions.
> diff --git a/src/openvpn/ping.h b/src/openvpn/ping.h
> index a196b32b..b51f082a 100644
> --- a/src/openvpn/ping.h
> +++ b/src/openvpn/ping.h
> @@ -84,4 +84,4 @@ check_ping_send(struct context *c)
>      }
>  }
>  
> -#endif
> +#endif /* ifndef PING_H */
> diff --git a/src/openvpn/plugin.c b/src/openvpn/plugin.c
> index 4d17c821..33687d44 100644
> --- a/src/openvpn/plugin.c
> +++ b/src/openvpn/plugin.c
> @@ -552,8 +552,7 @@ plugin_call_item(const struct plugin *p,
>                                                          p->plugin_handle,
>                                                          per_client_context,
>                                                          (current_cert ? 
> certdepth : -1),
> -                                                        current_cert
> -            };
> +                                                        current_cert};

why does the closing bracket go on the same line of the last field ? I
think in general we wanted to keep it aligned to where the opening line
starts, no?

>  
>              struct openvpn_plugin_args_func_return retargs;
>  
> diff --git a/src/openvpn/proxy.c b/src/openvpn/proxy.c
> index fdad3ed5..c8bd86dd 100644
> --- a/src/openvpn/proxy.c
> +++ b/src/openvpn/proxy.c
> @@ -884,10 +884,10 @@ establish_http_proxy_passthru(struct http_proxy_info *p,
>                  const char *algor = get_pa_var("algorithm", pa, &gc);
>                  const char *opaque = get_pa_var("opaque", pa, &gc);
>  
> -                if ( !realm || !nonce )
> +                if (!realm || !nonce)
>                  {
>                      msg(D_LINK_ERRORS, "HTTP proxy: digest auth failed, 
> malformed response "
> -                            "from server: realm= or nonce= missing" );
> +                        "from server: realm= or nonce= missing" );
>                      goto error;
>                  }
>  
> diff --git a/src/openvpn/reliable.c b/src/openvpn/reliable.c
> index a7f4ed96..eae1e0cb 100644
> --- a/src/openvpn/reliable.c
> +++ b/src/openvpn/reliable.c
> @@ -762,14 +762,14 @@ reliable_debug_print(const struct reliable *rel, char 
> *desc)
>      printf("********* struct reliable %s\n", desc);
>      printf("  initial_timeout=%d\n", (int)rel->initial_timeout);
>      printf("  packet_id=" packet_id_format "\n", rel->packet_id);
> -    printf("  now=%"PRIi64"\n", (int64_t)now);
> +    printf("  now=%" PRIi64 "\n", (int64_t)now);
>      for (i = 0; i < rel->size; ++i)
>      {
>          const struct reliable_entry *e = &rel->array[i];
>          if (e->active)
>          {
>              printf("  %d: packet_id=" packet_id_format " len=%d", i, 
> e->packet_id, e->buf.len);
> -            printf(" next_try=%"PRIi64, (int64_t)e->next_try);
> +            printf(" next_try=%" PRIi64, (int64_t)e->next_try);
>              printf("\n");
>          }
>      }
> diff --git a/src/openvpn/route.c b/src/openvpn/route.c
> index d97e8dba..346f08e2 100644
> --- a/src/openvpn/route.c
> +++ b/src/openvpn/route.c
> @@ -3074,7 +3074,7 @@ do_route_ipv6_service(const bool add, const struct 
> route_ipv6 *r, const struct t
>       * (only do this for routes actually using the tun/tap device)
>       */
>      if (tt->type == DEV_TYPE_TUN
> -      && msg.iface.index == tt->adapter_index )
> +        && msg.iface.index == tt->adapter_index)
>      {
>          inet_pton(AF_INET6, "fe80::8", &msg.gateway.ipv6);
>      }
> @@ -3298,7 +3298,7 @@ get_default_gateway(struct route_gateway_info *rgi)
>                  if (rgi->flags & RGI_ON_LINK)
>                  {
>                      /* check that interface name of current interface
> -                     * matches interface name of best default route */
> +                    * matches interface name of best default route */

same in previous patterns.

>                      if (strcmp(ifreq.ifr_name, best_name))
>                      {
>                          continue;
> diff --git a/src/openvpn/run_command.c b/src/openvpn/run_command.c
> index 4e198676..04ad2312 100644
> --- a/src/openvpn/run_command.c
> +++ b/src/openvpn/run_command.c
> @@ -41,12 +41,14 @@
>  /* contains an SSEC_x value defined in platform.h */
>  static int script_security_level = SSEC_BUILT_IN; /* GLOBAL */
>  
> -int script_security(void)
> +int
> +script_security(void)
>  {
>      return script_security_level;
>  }
>  
> -void script_security_set(int level)
> +void
> +script_security_set(int level)
>  {
>      script_security_level = level;
>  }
> diff --git a/src/openvpn/shaper.c b/src/openvpn/shaper.c
> index 92364f29..62579840 100644
> --- a/src/openvpn/shaper.c
> +++ b/src/openvpn/shaper.c
> @@ -76,7 +76,7 @@ shaper_soonest_event(struct timeval *tv, int delay)
>          }
>      }
>  #ifdef SHAPER_DEBUG
> -    dmsg(D_SHAPER_DEBUG, "SHAPER shaper_soonest_event sec=%"PRIi64" usec=%ld 
> ret=%d",
> +    dmsg(D_SHAPER_DEBUG, "SHAPER shaper_soonest_event sec=%" PRIi64 " 
> usec=%ld ret=%d",
>           (int64_t)tv->tv_sec, (long)tv->tv_usec, (int)ret);
>  #endif
>      return ret;
> diff --git a/src/openvpn/shaper.h b/src/openvpn/shaper.h
> index 4efe398a..bcdb5e36 100644
> --- a/src/openvpn/shaper.h
> +++ b/src/openvpn/shaper.h
> @@ -147,7 +147,7 @@ shaper_wrote_bytes(struct shaper *s, int nbytes)
>          tv_add(&s->wakeup, &tv);
>  
>  #ifdef SHAPER_DEBUG
> -        dmsg(D_SHAPER_DEBUG, "SHAPER shaper_wrote_bytes bytes=%d delay=%ld 
> sec=%"PRIi64" usec=%ld",
> +        dmsg(D_SHAPER_DEBUG, "SHAPER shaper_wrote_bytes bytes=%d delay=%ld 
> sec=%" PRIi64 " usec=%ld",
>               nbytes,
>               (long)tv.tv_usec,
>               (int64_t)s->wakeup.tv_sec,
> diff --git a/src/openvpn/socket.c b/src/openvpn/socket.c
> index 3f2b97e4..db944245 100644
> --- a/src/openvpn/socket.c
> +++ b/src/openvpn/socket.c
> @@ -100,10 +100,12 @@ get_addr_generic(sa_family_t af, unsigned int flags, 
> const char *hostname,
>              bits = 0;
>              max_bits = sizeof(in_addr_t) * 8;
>              break;
> +
>          case AF_INET6:
>              bits = 64;
>              max_bits = sizeof(struct in6_addr) * 8;
>              break;
> +
>          default:
>              msg(M_WARN,
>                  "Unsupported AF family passed to getaddrinfo for %s (%d)",
> @@ -125,7 +127,7 @@ get_addr_generic(sa_family_t af, unsigned int flags, 
> const char *hostname,
>      }
>  
>      /* check if this hostname has a /bits suffix */
> -    sep = strchr(var_host , '/');
> +    sep = strchr(var_host, '/');
>      if (sep)
>      {
>          bits = strtoul(sep + 1, &endp, 10);
> @@ -156,10 +158,12 @@ get_addr_generic(sa_family_t af, unsigned int flags, 
> const char *hostname,
>                      *ip4 = ntohl(*ip4);
>                  }
>                  break;
> +
>              case AF_INET6:
>                  ip6 = network;
>                  *ip6 = ((struct sockaddr_in6 *)ai->ai_addr)->sin6_addr;
>                  break;
> +
>              default:
>                  /* can't get here because 'af' was previously checked */
>                  msg(M_WARN,
> diff --git a/src/openvpn/socket.h b/src/openvpn/socket.h
> index 0f22d479..17801418 100644
> --- a/src/openvpn/socket.h
> +++ b/src/openvpn/socket.h
> @@ -138,7 +138,7 @@ struct stream_buf
>      int len;   /* -1 if not yet known */
>  
>      bool error; /* if true, fatal TCP error has occurred,
> -                *  requiring that connection be restarted */
> +                 *  requiring that connection be restarted */
>  #if PORT_SHARE
>  #define PS_DISABLED 0
>  #define PS_ENABLED  1
> diff --git a/src/openvpn/ssl.c b/src/openvpn/ssl.c
> index 74b88ce6..d783c598 100644
> --- a/src/openvpn/ssl.c
> +++ b/src/openvpn/ssl.c
> @@ -680,7 +680,7 @@ init_ssl(const struct options *options, struct 
> tls_root_ctx *new_ctx)
>      {
>          if (tls_ctx_use_management_external_key(new_ctx))
>          {
> -            msg (M_WARN, "Cannot initialize mamagement-external-key");
> +            msg(M_WARN, "Cannot initialize mamagement-external-key");
>              goto err;
>          }
>      }
> @@ -1099,7 +1099,7 @@ tls_session_init(struct tls_multi *multi, struct 
> tls_session *session)
>          else
>          {
>              session->initial_opcode = session->opt->tls_crypt_v2 ?
> -                    P_CONTROL_HARD_RESET_CLIENT_V3 : 
> P_CONTROL_HARD_RESET_CLIENT_V2;
> +                                      P_CONTROL_HARD_RESET_CLIENT_V3 : 
> P_CONTROL_HARD_RESET_CLIENT_V2;
>          }
>      }
>  
> @@ -1527,9 +1527,9 @@ read_control_auth(struct buffer *buf,
>      if (opcode == P_CONTROL_HARD_RESET_CLIENT_V3
>          && !tls_crypt_v2_extract_client_key(buf, ctx, opt))
>      {
> -        msg (D_TLS_ERRORS,
> -             "TLS Error: can not extract tls-crypt-v2 client key from %s",
> -             print_link_socket_actual(from, &gc));
> +        msg(D_TLS_ERRORS,
> +            "TLS Error: can not extract tls-crypt-v2 client key from %s",
> +            print_link_socket_actual(from, &gc));
>          goto cleanup;
>      }
>  
> @@ -3781,7 +3781,7 @@ tls_pre_decrypt(struct tls_multi *multi,
>                                  /* Save incoming ciphertext packet to 
> reliable buffer */
>                                  struct buffer *in = 
> reliable_get_buf(ks->rec_reliable);
>                                  ASSERT(in);
> -                                if(!buf_copy(in, buf))
> +                                if (!buf_copy(in, buf))
>                                  {
>                                      msg(D_MULTI_DROPPED,
>                                          "Incoming control channel packet too 
> big, dropping.");
> @@ -4182,10 +4182,10 @@ show_available_tls_ciphers(const char *cipher_list,
>      show_available_tls_ciphers_list(cipher_list, tls_cert_profile, false);
>  
>      printf("\n"
> -    "Be aware that that whether a cipher suite in this list can actually 
> work\n"
> -    "depends on the specific setup of both peers. See the man page entries 
> of\n"
> -    "--tls-cipher and --show-tls for more details.\n\n"
> -    );
> +           "Be aware that that whether a cipher suite in this list can 
> actually work\n"
> +           "depends on the specific setup of both peers. See the man page 
> entries of\n"
> +           "--tls-cipher and --show-tls for more details.\n\n"
> +           );

since you are there you could move the closing parenthesis to the line
before :)

>  }
>  
>  /*
> diff --git a/src/openvpn/ssl_common.h b/src/openvpn/ssl_common.h
> index 7bf82b3a..410b2163 100644
> --- a/src/openvpn/ssl_common.h
> +++ b/src/openvpn/ssl_common.h
> @@ -215,10 +215,10 @@ struct tls_wrap_ctx
>      struct buffer work;         /**< Work buffer (only for --tls-crypt) */
>      struct key_ctx tls_crypt_v2_server_key;  /**< Decrypts client keys */
>      const struct buffer *tls_crypt_v2_wkc;   /**< Wrapped client key,
> -                                                  sent to server */
> +                                              *   sent to server */
>      struct buffer tls_crypt_v2_metadata;     /**< Received from client */
>      bool cleanup_key_ctx;                    /**< opt.key_ctx_bi is owned by
> -                                                  this context */
> +                                              *   this context */
>  };
>  
>  /*
> diff --git a/src/openvpn/ssl_mbedtls.c b/src/openvpn/ssl_mbedtls.c
> index f7e8c2d0..a4197cba 100644
> --- a/src/openvpn/ssl_mbedtls.c
> +++ b/src/openvpn/ssl_mbedtls.c
> @@ -65,12 +65,12 @@
>  static const mbedtls_x509_crt_profile openvpn_x509_crt_profile_legacy =
>  {
>      /* Hashes from SHA-1 and above */
> -    MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA1 ) |
> -    MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_RIPEMD160 ) |
> -    MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA224 ) |
> -    MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA256 ) |
> -    MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA384 ) |
> -    MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA512 ),
> +    MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA1 )
> +    |MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_RIPEMD160 )
> +    |MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA224 )
> +    |MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA256 )
> +    |MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA384 )
> +    |MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA512 ),

space missing?

>      0xFFFFFFF, /* Any PK alg    */
>      0xFFFFFFF, /* Any curve     */
>      1024,      /* RSA-1024 and larger */
> @@ -79,10 +79,10 @@ static const mbedtls_x509_crt_profile 
> openvpn_x509_crt_profile_legacy =
>  static const mbedtls_x509_crt_profile openvpn_x509_crt_profile_preferred =
>  {
>      /* SHA-2 and above */
> -    MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA224 ) |
> -    MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA256 ) |
> -    MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA384 ) |
> -    MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA512 ),
> +    MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA224 )
> +    |MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA256 )
> +    |MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA384 )
> +    |MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA512 ),

space missing?

>      0xFFFFFFF, /* Any PK alg    */
>      0xFFFFFFF, /* Any curve     */
>      2048,      /* RSA-2048 and larger */
> @@ -232,7 +232,7 @@ tls_ctx_restrict_ciphers_tls13(struct tls_root_ctx *ctx, 
> const char *ciphers)
>      }
>  
>      msg(M_WARN, "mbed TLS does not support setting tls-ciphersuites. "
> -                "Ignoring TLS 1.3 cipher list: %s", ciphers);
> +        "Ignoring TLS 1.3 cipher list: %s", ciphers);
>  }
>  
>  void
> @@ -299,7 +299,7 @@ tls_ctx_set_cert_profile(struct tls_root_ctx *ctx, const 
> char *profile)
>      }
>      else
>      {
> -        msg (M_FATAL, "ERROR: Invalid cert profile: %s", profile);
> +        msg(M_FATAL, "ERROR: Invalid cert profile: %s", profile);
>      }
>  }
>  
> @@ -600,14 +600,14 @@ tls_ctx_use_external_signing_func(struct tls_root_ctx 
> *ctx,
>  
>      if (ctx->crt_chain == NULL)
>      {
> -        msg (M_WARN, "ERROR: external key requires a certificate.");
> +        msg(M_WARN, "ERROR: external key requires a certificate.");
>          return 1;
>      }
>  
>      if (mbedtls_pk_get_type(&ctx->crt_chain->pk) != MBEDTLS_PK_RSA)
>      {
>          msg(M_WARN, "ERROR: external key with mbed TLS requires a "
> -                     "certificate with an RSA key.");
> +            "certificate with an RSA key.");
>          return 1;
>      }
>  
> @@ -653,8 +653,8 @@ management_sign_func(void *sign_ctx, const void *src, 
> size_t src_len,
>  
>      ret = true;
>  cleanup:
> -    free (src_b64);
> -    free (dst_b64);
> +    free(src_b64);
> +    free(dst_b64);
>  
>      return ret;
>  }
> diff --git a/src/openvpn/ssl_mbedtls.h b/src/openvpn/ssl_mbedtls.h
> index 998d6f2f..1328ceb7 100644
> --- a/src/openvpn/ssl_mbedtls.h
> +++ b/src/openvpn/ssl_mbedtls.h
> @@ -71,8 +71,8 @@ typedef struct {
>   * @return true if signing succeeded, false otherwise.
>   */
>  typedef bool (*external_sign_func)(
> -        void *sign_ctx, const void *src, size_t src_size,
> -        void *dst, size_t dst_size);
> +    void *sign_ctx, const void *src, size_t src_size,
> +    void *dst, size_t dst_size);
>  
>  /** Context used by external_pkcs1_sign() */
>  struct external_context {
> diff --git a/src/openvpn/ssl_openssl.c b/src/openvpn/ssl_openssl.c
> index da573cfa..ddb78da7 100644
> --- a/src/openvpn/ssl_openssl.c
> +++ b/src/openvpn/ssl_openssl.c
> @@ -217,7 +217,7 @@ tls_version_max(void)
>      return TLS_VER_1_2;
>  #elif defined(TLS1_1_VERSION) || defined(SSL_OP_NO_TLSv1_1)
>      return TLS_VER_1_1;
> -#else
> +#else  /* if defined(TLS1_3_VERSION) */
>      return TLS_VER_1_0;
>  #endif
>  }
> @@ -322,7 +322,7 @@ tls_ctx_set_options(struct tls_root_ctx *ctx, unsigned 
> int ssl_flags)
>  }
>  
>  void
> -convert_tls_list_to_openssl(char* openssl_ciphers, size_t len,const char 
> *ciphers)
> +convert_tls_list_to_openssl(char *openssl_ciphers, size_t len,const char 
> *ciphers)
>  {
>      /* Parse supplied cipher list and pass on to OpenSSL */
>      size_t begin_of_cipher, end_of_cipher;
> @@ -466,9 +466,9 @@ tls_ctx_restrict_ciphers_tls13(struct tls_root_ctx *ctx, 
> const char *ciphers)
>      }
>  
>  #if (OPENSSL_VERSION_NUMBER < 0x1010100fL)
> -        crypto_msg(M_WARN, "Not compiled with OpenSSL 1.1.1 or higher. "
> -                       "Ignoring TLS 1.3 only tls-ciphersuites '%s' 
> setting.",
> -                        ciphers);
> +    crypto_msg(M_WARN, "Not compiled with OpenSSL 1.1.1 or higher. "
> +               "Ignoring TLS 1.3 only tls-ciphersuites '%s' setting.",
> +               ciphers);
>  #else
>      ASSERT(NULL != ctx);
>  
> @@ -509,13 +509,13 @@ tls_ctx_set_cert_profile(struct tls_root_ctx *ctx, 
> const char *profile)
>      {
>          msg(M_FATAL, "ERROR: Invalid cert profile: %s", profile);
>      }
> -#else
> +#else  /* ifdef HAVE_SSL_CTX_SET_SECURITY_LEVEL */
>      if (profile)
>      {
>          msg(M_WARN, "WARNING: OpenSSL 1.0.1 does not support 
> --tls-cert-profile"
>              ", ignoring user-set profile: '%s'", profile);
>      }
> -#endif
> +#endif /* ifdef HAVE_SSL_CTX_SET_SECURITY_LEVEL */
>  }
>  
>  void
> @@ -658,7 +658,7 @@ tls_ctx_load_ecdh_params(struct tls_root_ctx *ctx, const 
> char *curve_name
>          {
>              nid = EC_GROUP_get_curve_name(ecgrp);
>          }
> -#endif
> +#endif /* if OPENSSL_VERSION_NUMBER >= 0x10002000L */
>      }
>  
>      /* Translate NID back to name , just for kicks */
> @@ -1137,7 +1137,7 @@ rsa_priv_enc(int flen, const unsigned char *from, 
> unsigned char *to, RSA *rsa, i
>  
>      ret = get_sig_from_man(from, flen, to, len);
>  
> -    return (ret == len)? ret : -1;
> +    return (ret == len) ? ret : -1;
>  }
>  
>  static int
> @@ -1325,7 +1325,7 @@ err:
>      {
>          EVP_PKEY_free(privkey);
>      }
> -    if(ec)
> +    if (ec)
>      {
>          EC_KEY_free(ec);
>      }
> @@ -1375,7 +1375,7 @@ tls_ctx_use_management_external_key(struct tls_root_ctx 
> *ctx)
>          crypto_msg(M_WARN, "management-external-key requires an RSA or EC 
> certificate");
>          goto cleanup;
>      }
> -#else
> +#else  /* if OPENSSL_VERSION_NUMBER > 0x10100000L && !defined(OPENSSL_NO_EC) 
> && !defined(LIBRESSL_VERSION_NUMBER) */
>      else
>      {
>          crypto_msg(M_WARN, "management-external-key requires an RSA 
> certificate");
> @@ -1644,7 +1644,7 @@ bio_debug_data(const char *mode, BIO *bio, const 
> uint8_t *buf, int len, const ch
>      if (len > 0)
>      {
>          open_biofp();
> -        fprintf(biofp, "BIO_%s %s time=%"PRIi64" bio=" ptr_format " len=%d 
> data=%s\n",
> +        fprintf(biofp, "BIO_%s %s time=%" PRIi64 " bio=" ptr_format " len=%d 
> data=%s\n",
>                  mode, desc, (int64_t)time(NULL), (ptr_type)bio, len, 
> format_hex(buf, len, 0, &gc));
>          fflush(biofp);
>      }
> @@ -1655,7 +1655,7 @@ static void
>  bio_debug_oc(const char *mode, BIO *bio)
>  {
>      open_biofp();
> -    fprintf(biofp, "BIO %s time=%"PRIi64" bio=" ptr_format "\n",
> +    fprintf(biofp, "BIO %s time=%" PRIi64 " bio=" ptr_format "\n",
>              mode, (int64_t)time(NULL), (ptr_type)bio);
>      fflush(biofp);
>  }
> @@ -1963,7 +1963,7 @@ print_details(struct key_state_ssl *ks_ssl, const char 
> *prefix)
>              {
>                  EC_KEY *ec = EVP_PKEY_get0_EC_KEY(pkey);
>                  const EC_GROUP *group = EC_KEY_get0_group(ec);
> -                const char* curve;
> +                const char *curve;
>  
>                  int nid = EC_GROUP_get_curve_name(group);
>                  if (nid == 0 || (curve = OBJ_nid2sn(nid)) == NULL)
> @@ -2024,7 +2024,7 @@ show_available_tls_ciphers_list(const char *cipher_list,
>  #else
>      STACK_OF(SSL_CIPHER) *sk = SSL_get1_supported_ciphers(ssl);
>  #endif
> -    for (int i=0;i < sk_SSL_CIPHER_num(sk);i++)
> +    for (int i = 0; i < sk_SSL_CIPHER_num(sk); i++)
>      {
>          const SSL_CIPHER *c = sk_SSL_CIPHER_value(sk, i);
>  
> @@ -2035,7 +2035,7 @@ show_available_tls_ciphers_list(const char *cipher_list,
>  
>          if (tls13)
>          {
> -              printf("%s\n", cipher_name);
> +            printf("%s\n", cipher_name);
>          }
>          else if (NULL == pair)
>          {
> diff --git a/src/openvpn/ssl_verify.c b/src/openvpn/ssl_verify.c
> index 03c0b661..a7f51751 100644
> --- a/src/openvpn/ssl_verify.c
> +++ b/src/openvpn/ssl_verify.c
> @@ -72,7 +72,7 @@ setenv_untrusted(struct tls_session *session)
>  static void
>  wipe_auth_token(struct tls_multi *multi)
>  {
> -    if(multi)
> +    if (multi)
>      {
>          if (multi->auth_token)
>          {
> @@ -712,24 +712,24 @@ verify_cert(struct tls_session *session, 
> openvpn_x509_cert_t *cert, int cert_dep
>  
>          switch (opt->verify_hash_algo)
>          {
> -        case MD_SHA1:
> -            ca_hash = x509_get_sha1_fingerprint(cert, &gc);
> -            break;
> -
> -        case MD_SHA256:
> -            ca_hash = x509_get_sha256_fingerprint(cert, &gc);
> -            break;
> -
> -        default:
> -            /* This should normally not happen at all; the algorithm used
> -             * is parsed by add_option() [options.c] and set to a predefined
> -             * value in an enumerated type.  So if this unlikely scenario
> -             * happens, consider this a failure
> -             */
> -            msg(M_WARN, "Unexpected invalid algorithm used with "
> -                "--verify-hash (%i)", opt->verify_hash_algo);
> -            ret = FAILURE;
> -            goto cleanup;
> +            case MD_SHA1:
> +                ca_hash = x509_get_sha1_fingerprint(cert, &gc);
> +                break;
> +
> +            case MD_SHA256:
> +                ca_hash = x509_get_sha256_fingerprint(cert, &gc);
> +                break;
> +
> +            default:
> +                /* This should normally not happen at all; the algorithm used
> +                 * is parsed by add_option() [options.c] and set to a 
> predefined
> +                 * value in an enumerated type.  So if this unlikely scenario
> +                 * happens, consider this a failure
> +                 */
> +                msg(M_WARN, "Unexpected invalid algorithm used with "
> +                    "--verify-hash (%i)", opt->verify_hash_algo);
> +                ret = FAILURE;
> +                goto cleanup;
>          }
>  
>          if (memcmp(BPTR(&ca_hash), opt->verify_hash, BLEN(&ca_hash)))
> @@ -1178,8 +1178,8 @@ verify_user_pass_plugin(struct tls_session *session, 
> const struct user_pass *up)
>          /* generate filename for deferred auth control file */
>          if (!key_state_gen_auth_control_file(ks, session->opt))
>          {
> -            msg (D_TLS_ERRORS, "TLS Auth Error (%s): "
> -                 "could not create deferred auth control file", __func__);
> +            msg(D_TLS_ERRORS, "TLS Auth Error (%s): "
> +                "could not create deferred auth control file", __func__);
>              goto cleanup;
>          }
>  #endif
> diff --git a/src/openvpn/ssl_verify_backend.h 
> b/src/openvpn/ssl_verify_backend.h
> index 2a9e8bb7..f4cc2c54 100644
> --- a/src/openvpn/ssl_verify_backend.h
> +++ b/src/openvpn/ssl_verify_backend.h
> @@ -130,6 +130,7 @@ result_t backend_x509_get_username(char *common_name, int 
> cn_len,
>   * --x509-username-field option.
>   */
>  bool x509_username_field_ext_supported(const char *extname);
> +
>  #endif
>  
>  /*
> diff --git a/src/openvpn/ssl_verify_openssl.c 
> b/src/openvpn/ssl_verify_openssl.c
> index 10085b29..ff14db23 100644
> --- a/src/openvpn/ssl_verify_openssl.c
> +++ b/src/openvpn/ssl_verify_openssl.c
> @@ -114,7 +114,8 @@ cleanup:
>  }
>  
>  #ifdef ENABLE_X509ALTUSERNAME
> -bool x509_username_field_ext_supported(const char *fieldname)
> +bool
> +x509_username_field_ext_supported(const char *fieldname)
>  {
>      int nid = OBJ_txt2nid(fieldname);
>      return nid == NID_subject_alt_name || nid == NID_issuer_alt_name;
> @@ -587,7 +588,7 @@ x509_verify_ns_cert_type(openvpn_x509_cert_t *peer_cert, 
> const int usage)
>           * prevent it to take a const argument
>           */
>          result_t result = X509_check_purpose(peer_cert, 
> X509_PURPOSE_SSL_CLIENT, 0) ?
> -            SUCCESS : FAILURE;
> +                          SUCCESS : FAILURE;
>  
>          /*
>           * old versions of OpenSSL allow us to make the less strict check we 
> used to
> @@ -615,7 +616,7 @@ x509_verify_ns_cert_type(openvpn_x509_cert_t *peer_cert, 
> const int usage)
>           * prevent it to take a const argument
>           */
>          result_t result = X509_check_purpose(peer_cert, 
> X509_PURPOSE_SSL_SERVER, 0) ?
> -            SUCCESS : FAILURE;
> +                          SUCCESS : FAILURE;
>  
>          /*
>           * old versions of OpenSSL allow us to make the less strict check we 
> used to
> diff --git a/src/openvpn/tls_crypt.c b/src/openvpn/tls_crypt.c
> index c3ed2b93..85495d7f 100644
> --- a/src/openvpn/tls_crypt.c
> +++ b/src/openvpn/tls_crypt.c
> @@ -86,7 +86,7 @@ tls_crypt_init_key(struct key_ctx_bi *key, const char 
> *key_file,
>      struct key_type kt = tls_crypt_kt();
>      if (!kt.cipher || !kt.digest)
>      {
> -        msg (M_FATAL, "ERROR: --tls-crypt not supported");
> +        msg(M_FATAL, "ERROR: --tls-crypt not supported");
>      }
>      crypto_read_openvpn_key(&kt, key, key_file, key_inline, key_direction,
>                              "Control Channel Encryption", "tls-crypt");
> @@ -530,7 +530,7 @@ tls_crypt_v2_unwrap_client_key(struct key2 *client_key, 
> struct buffer *metadata,
>      memcpy(&client_key->keys, BPTR(&plaintext), sizeof(client_key->keys));
>      ASSERT(buf_advance(&plaintext, sizeof(client_key->keys)));
>  
> -    if(!buf_copy(metadata, &plaintext))
> +    if (!buf_copy(metadata, &plaintext))
>      {
>          CRYPT_ERROR("metadata too large for supplied buffer");
>      }
> @@ -613,7 +613,7 @@ tls_crypt_v2_extract_client_key(struct buffer *buf,
>      if (!ctx->tls_crypt_v2_server_key.cipher)
>      {
>          msg(D_TLS_ERRORS,
> -             "Client wants tls-crypt-v2, but no server key present.");
> +            "Client wants tls-crypt-v2, but no server key present.");
>          return false;
>      }
>  
> diff --git a/src/openvpn/tls_crypt.h b/src/openvpn/tls_crypt.h
> index 9b5ea971..43bf8122 100644
> --- a/src/openvpn/tls_crypt.h
> +++ b/src/openvpn/tls_crypt.h
> @@ -99,10 +99,10 @@
>  #define TLS_CRYPT_V2_SERVER_KEY_LEN (sizeof(struct key))
>  #define TLS_CRYPT_V2_TAG_SIZE (TLS_CRYPT_TAG_SIZE)
>  #define TLS_CRYPT_V2_MAX_METADATA_LEN (unsigned)(TLS_CRYPT_V2_MAX_WKC_LEN \
> -         - (TLS_CRYPT_V2_CLIENT_KEY_LEN + TLS_CRYPT_V2_TAG_SIZE \
> -            + sizeof(uint16_t)))
> +                                                 - 
> (TLS_CRYPT_V2_CLIENT_KEY_LEN + TLS_CRYPT_V2_TAG_SIZE \
> +                                                    + sizeof(uint16_t)))
>  #define TLS_CRYPT_V2_MAX_B64_METADATA_LEN \
> -        OPENVPN_BASE64_LENGTH(TLS_CRYPT_V2_MAX_METADATA_LEN - 1)
> +    OPENVPN_BASE64_LENGTH(TLS_CRYPT_V2_MAX_METADATA_LEN - 1)
>  
>  /**
>   * Initialize a key_ctx_bi structure for use with --tls-crypt.
> diff --git a/src/openvpn/tun.c b/src/openvpn/tun.c
> index c091401f..12e6eb00 100644
> --- a/src/openvpn/tun.c
> +++ b/src/openvpn/tun.c
> @@ -553,8 +553,8 @@ is_tun_p2p(const struct tuntap *tt)
>      bool tun = false;
>  
>      if (tt->type == DEV_TYPE_TAP
> -          || (tt->type == DEV_TYPE_TUN && tt->topology == TOP_SUBNET)
> -          || tt->type == DEV_TYPE_NULL )
> +        || (tt->type == DEV_TYPE_TUN && tt->topology == TOP_SUBNET)
> +        || tt->type == DEV_TYPE_NULL)
>      {
>          tun = false;
>      }
> @@ -893,7 +893,7 @@ do_ifconfig_ipv6(struct tuntap *tt, const char *ifname, 
> int tun_mtu,
>                  ifconfig_ipv6_local, tt->netbits_ipv6, ifname);
>      argv_msg(M_INFO, &argv);
>      openvpn_execve_check(&argv, es, S_FATAL, "Linux ip -6 addr add failed");
> -#else
> +#else  /* ifdef ENABLE_IPROUTE */
>      argv_printf(&argv, "%s %s add %s/%d mtu %d up", IFCONFIG_PATH, ifname,
>                  ifconfig_ipv6_local, tt->netbits_ipv6, tun_mtu);
>      argv_msg(M_INFO, &argv);
> @@ -1387,6 +1387,7 @@ do_ifconfig_ipv4(struct tuntap *tt, const char *ifname, 
> int tun_mtu,
>                      ifname, ifconfig_local,
>                      print_in_addr_t(tt->adapter_netmask, 0, &gc));
>                  break;
> +
>              case IPW32_SET_NETSH:
>                  netsh_ifconfig(&tt->options, ifname, tt->local,
>                                 tt->adapter_netmask, 
> NI_IP_NETMASK|NI_OPTIONS);
> @@ -2442,7 +2443,7 @@ close_tun(struct tuntap *tt)
>      struct argv argv = argv_new();
>  
>      /* setup command, close tun dev (clears tt->actual_name!), run command
> -    */
> +     */
>  
>      argv_printf(&argv, "%s %s destroy",
>                  IFCONFIG_PATH, tt->actual_name);
> @@ -2528,7 +2529,7 @@ close_tun(struct tuntap *tt)
>      struct argv argv = argv_new();
>  
>      /* setup command, close tun dev (clears tt->actual_name!), run command
> -    */
> +     */
>  
>      argv_printf(&argv, "%s %s destroy",
>                  IFCONFIG_PATH, tt->actual_name);
> @@ -2668,7 +2669,7 @@ close_tun(struct tuntap *tt)
>      struct argv argv = argv_new();
>  
>      /* setup command, close tun dev (clears tt->actual_name!), run command
> -    */
> +     */
>  
>      argv_printf(&argv, "%s %s destroy",
>                  IFCONFIG_PATH, tt->actual_name);
> @@ -5923,7 +5924,7 @@ open_tun(const char *dev, const char *dev_type, const 
> char *dev_node, struct tun
>                  };
>  
>                  if (send_msg_iservice(tt->options.msg_channel, &msg, 
> sizeof(msg),
> -                    &ack, "TUN"))
> +                                      &ack, "TUN"))
>                  {
>                      status = ack.error_number;
>                  }
> diff --git a/src/openvpn/win32.c b/src/openvpn/win32.c
> index e43296eb..be526945 100644
> --- a/src/openvpn/win32.c
> +++ b/src/openvpn/win32.c
> @@ -1481,7 +1481,7 @@ send_msg_iservice(HANDLE pipe, const void *data, size_t 
> size,
>          || !ReadFile(pipe, ack, sizeof(*ack), &len, NULL))
>      {
>          msg(M_WARN, "%s: could not talk to service: %s [%lu]",
> -            context? context : "Unknown",
> +            context ? context : "Unknown",
>              strerror_win32(GetLastError(), &gc), GetLastError());
>          ret = false;
>      }
> 

I know we want to get "uncrustity-clean", but maybe we can tweak some
options to comply with my remarks above? if not...well...uncrustify will
decide for our codestyle ;P


Cheers,


-- 
Antonio Quartulli

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to