@@ -500,7 +500,7 @@
push_option(o, print_opt_route_gateway_dhcp(&o->gc), M_USAGE);
}
}
- else
+
/*
* HELPER DIRECTIVE:
*
@@ -511,7 +511,7 @@
* pull
* tls-client
*/
- if (o->client)
+ else if (o->client)
{
o->pull = true;
o->tls_client = true;
@@ -1822,7 +1822,9 @@
}
else
#endif
- man->connection.sd_cli = socket_do_accept(man->connection.sd_top, &act, false);
+ {
+ man->connection.sd_cli = socket_do_accept(man->connection.sd_top, &act, false);
+ }
if (socket_defined(man->connection.sd_cli))
{
@@ -1971,9 +1973,11 @@
}
else
#endif
- msg(D_LINK_ERRORS | M_ERRNO,
- "MANAGEMENT: connect to %s failed",
- print_sockaddr(man->settings.local->ai_addr, &gc));
+ {
+ msg(D_LINK_ERRORS | M_ERRNO,
+ "MANAGEMENT: connect to %s failed",
+ print_sockaddr(man->settings.local->ai_addr, &gc));
+ }
throw_signal_soft(SIGTERM, "management-connect-failed");
goto done;
}
@@ -274,10 +274,10 @@
/* Query passwords before becoming a daemon if we don't use the
* management interface to get them. */
-#ifdef ENABLE_MANAGEMENT
if (!(c.options.management_flags & MF_QUERY_PASSWORDS))
-#endif
- init_query_passwords(&c);
+ {
+ init_query_passwords(&c);
+ }
/* become a daemon if --daemon */
if (c.first_time)
@@ -3861,8 +3861,9 @@
}
else
#endif
-
- rgi6->gateway.addr_ipv6 = gw;
+ {
+ rgi6->gateway.addr_ipv6 = gw;
+ }
rgi6->flags |= RGI_ADDR_DEFINED;
if (ifp)
@@ -3389,8 +3389,10 @@
}
else
#endif
- buf->len = recvfrom(sock->sd, BPTR(buf), buf_forward_capacity(buf), 0,
- &from->dest.addr.sa, &fromlen);
+ {
+ buf->len = recvfrom(sock->sd, BPTR(buf), buf_forward_capacity(buf), 0,
+ &from->dest.addr.sa, &fromlen);
+ }
/* FIXME: won't do anything when sock->info.af == AF_UNSPEC */
if (buf->len >= 0 && expectedlen && fromlen != expectedlen)
{
@@ -327,7 +327,9 @@
}
else
#endif /* ifdef ENABLE_MANAGEMENT */
- get_user_pass(&auth_user_pass, auth_file, UP_TYPE_AUTH, flags);
+ {
+ get_user_pass(&auth_user_pass, auth_file, UP_TYPE_AUTH, flags);
+ }
}
}