}
struct buffer
-clear_buf()
+clear_buf(void)
{
struct buffer buf;
CLEAR(buf);
void
-query_user_clear()
+query_user_clear(void)
{
int i;
* Wipes all data put into all of the query_user structs
*
*/
-void query_user_clear();
+void query_user_clear(void);
/**
*
* @return True if executing all the defined steps completed successfully
*/
-bool query_user_exec_builtin();
+bool query_user_exec_builtin(void);
#if defined(ENABLE_SYSTEMD)
*
* @return True if executing all the defined steps completed successfully
*/
-bool query_user_exec();
+bool query_user_exec(void);
#else /* ENABLE_SYSTEMD not defined*/
/**
*
*/
static bool
-query_user_exec()
+query_user_exec(void)
{
return query_user_exec_builtin();
}
*
*/
bool
-query_user_exec_builtin()
+query_user_exec_builtin(void)
{
bool ret = true; /* Presume everything goes okay */
int i;
*/
static bool
-check_systemd_running()
+check_systemd_running(void)
{
struct stat c;
*
*/
bool
-query_user_exec()
+query_user_exec(void)
{
bool ret = true; /* Presume everything goes okay */
int i;
/* Reset the nonce value, also done periodically to refresh entropy */
static void
-prng_reset_nonce()
+prng_reset_nonce(void)
{
const int size = md_kt_size(nonce_md) + nonce_secret_len;
#if 1 /* Must be 1 for real usage */
/* an analogue to the random() function, but use prng_bytes */
long int
-get_random()
+get_random(void)
{
long int l;
prng_bytes((unsigned char *)&l, sizeof(l));
*/
void prng_bytes(uint8_t *output, int len);
-void prng_uninit();
+void prng_uninit(void);
void test_crypto(struct crypto_options *co, struct frame *f);
}
void
-show_available_ciphers()
+show_available_ciphers(void)
{
const int *ciphers = mbedtls_cipher_list();
}
void
-show_available_digests()
+show_available_digests(void)
{
const int *digests = mbedtls_md_list();
}
void
-show_available_engines()
+show_available_engines(void)
{
printf("Sorry, mbed TLS hardware crypto engine functionality is not "
"available\n");
* entropy gathering function.
*/
mbedtls_ctr_drbg_context *
-rand_ctx_get()
+rand_ctx_get(void)
{
static mbedtls_entropy_context ec = {0};
static mbedtls_ctr_drbg_context cd_ctx = {0};
#ifdef ENABLE_PREDICTION_RESISTANCE
void
-rand_ctx_enable_prediction_resistance()
+rand_ctx_enable_prediction_resistance(void)
{
mbedtls_ctr_drbg_context *cd_ctx = rand_ctx_get();
* added. During initialisation, a personalisation string will be added based
* on the time, the PID, and a pointer to the random context.
*/
-mbedtls_ctr_drbg_context *rand_ctx_get();
+mbedtls_ctr_drbg_context *rand_ctx_get(void);
#ifdef ENABLE_PREDICTION_RESISTANCE
/**
* Enable prediction resistance on the random number generator.
*/
-void rand_ctx_enable_prediction_resistance();
+void rand_ctx_enable_prediction_resistance(void);
#endif
}
void
-show_available_ciphers()
+show_available_ciphers(void)
{
int nid;
size_t i;
}
void
-show_available_digests()
+show_available_digests(void)
{
int nid;
}
void
-show_available_engines()
+show_available_engines(void)
{
#if HAVE_OPENSSL_ENGINE /* Only defined for OpenSSL */
ENGINE *e;
}
void
-error_reset()
+error_reset(void)
{
use_syslog = std_redir = false;
suppress_timestamps = false;
}
void
-close_syslog()
+close_syslog(void)
{
#if SYSLOG_CAPABILITY
if (use_syslog)
unsigned int x_cs_err_delay_ms; /* GLOBAL */
void
-reset_check_status()
+reset_check_status(void)
{
x_cs_info_level = 0;
x_cs_verbose_level = 0;
void open_syslog(const char *pgmname, bool stdio_to_null);
-void close_syslog();
+void close_syslog(void);
/* log file output */
void redirect_stdout_stderr(const char *file, bool append);
}
void
-tun_abort()
+tun_abort(void)
{
struct context *c = static_context;
if (c)
}
static inline struct event_timeout
-event_timeout_clear_ret()
+event_timeout_clear_ret(void)
{
struct event_timeout ret;
event_timeout_clear(&ret);
static void man_reset_client_socket(struct management *man, const bool exiting);
static void
-man_help()
+man_help(void)
{
msg(M_CLIENT, "Management Interface for %s", title_string);
msg(M_CLIENT, "Commands:");
*/
static inline int
-occ_reset_op()
+occ_reset_op(void)
{
return -1;
}
#ifdef PID_TEST
void
-packet_id_interactive_test()
+packet_id_interactive_test(void)
{
struct packet_id pid;
struct packet_id_net pin;
const char *packet_id_net_print(const struct packet_id_net *pin, bool print_timestamp, struct gc_arena *gc);
#ifdef PID_TEST
-void packet_id_interactive_test();
+void packet_id_interactive_test(void);
#endif
}
void
-pkcs11_terminate()
+pkcs11_terminate(void)
{
dmsg(
D_PKCS11_DEBUG,
}
int
-pkcs11_logout()
+pkcs11_logout(void)
{
return pkcs11h_logout() == CKR_OK;
}
int
-pkcs11_management_id_count()
+pkcs11_management_id_count(void)
{
pkcs11h_certificate_id_list_t id_list = NULL;
pkcs11h_certificate_id_list_t t = NULL;
/* Get current PID */
unsigned int
-platform_getpid()
+platform_getpid(void)
{
#ifdef _WIN32
return (unsigned int) GetCurrentProcessId();
}
static int
-cmsg_size()
+cmsg_size(void)
{
return CMSG_SPACE(sizeof(socket_descriptor_t));
}
}
void
-init_ssl_lib()
+init_ssl_lib(void)
{
tls_init_lib();
}
void
-free_ssl_lib()
+free_ssl_lib(void)
{
crypto_uninit_lib();
prng_uninit();
* Perform any static initialisation necessary by the library.
* Called on OpenVPN initialisation
*/
-void tls_init_lib();
+void tls_init_lib(void);
/**
* Free any global SSL library-specific data structures.
*/
-void tls_free_lib();
+void tls_free_lib(void);
/**
* Clear the underlying SSL library's error state.
*/
-void tls_clear_error();
+void tls_clear_error(void);
/**
* Parse a TLS version specifier
#include <mbedtls/sha256.h>
void
-tls_init_lib()
+tls_init_lib(void)
{
}
void
-tls_free_lib()
+tls_free_lib(void)
{
}
void
-tls_clear_error()
+tls_clear_error(void)
{
}
int mydata_index; /* GLOBAL */
void
-tls_init_lib()
+tls_init_lib(void)
{
SSL_library_init();
#ifndef ENABLE_SMALL
}
void
-tls_free_lib()
+tls_free_lib(void)
{
EVP_cleanup();
#ifndef ENABLE_SMALL
}
void
-tls_clear_error()
+tls_clear_error(void)
{
ERR_clear_error();
}
static const int biofp_reopen_interval = 600; /* GLOBAL */
static void
-close_biofp()
+close_biofp(void)
{
if (biofp)
{
}
static void
-open_biofp()
+open_biofp(void)
{
const time_t current = time(NULL);
const pid_t pid = getpid();
* in the OpenSSL library.
*/
void
-show_available_curves()
+show_available_curves(void)
{
#ifndef OPENSSL_NO_EC
EC_builtin_curve *curves = NULL;
const char *
-win_get_tempdir()
+win_get_tempdir(void)
{
static char tmpdir[MAX_PATH];
WCHAR wtmpdir[MAX_PATH];
}
int
-win32_version_info()
+win32_version_info(void)
{
if (!IsWindowsXPOrGreater())
{
}
bool
-win32_is_64bit()
+win32_is_64bit(void)
{
#if defined(_WIN64)
return true; /* 64-bit programs run only on Win64 */
void fork_to_self(const char *cmdline);
/* Find temporary directory */
-const char *win_get_tempdir();
+const char *win_get_tempdir(void);
/* Convert a string from UTF-8 to UCS-2 */
WCHAR *wide_string(const char *utf8, struct gc_arena *gc);
#define WIN_7 2
#define WIN_8 3
-int win32_version_info();
+int win32_version_info(void);
/*
* String representation of Windows version number and name, see