diff options
author | Stephen Hemminger <shemminger@linux-foundation.org> | 2007-04-20 20:09:22 -0400 |
---|---|---|
committer | David S. Miller <davem@sunset.davemloft.net> | 2007-04-26 01:29:24 -0400 |
commit | 3ff50b7997fe06cd5d276b229967bb52d6b3b6c1 (patch) | |
tree | 4f0f57123a945c3e6c39759456b6187bb78c4b1f /net/xfrm/xfrm_user.c | |
parent | c462238d6a6d8ee855bda10f9fff442971540ed2 (diff) |
[NET]: cleanup extra semicolons
Spring cleaning time...
There seems to be a lot of places in the network code that have
extra bogus semicolons after conditionals. Most commonly is a
bogus semicolon after: switch() { }
Signed-off-by: Stephen Hemminger <shemminger@linux-foundation.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/xfrm/xfrm_user.c')
-rw-r--r-- | net/xfrm/xfrm_user.c | 22 |
1 files changed, 11 insertions, 11 deletions
diff --git a/net/xfrm/xfrm_user.c b/net/xfrm/xfrm_user.c index 88659edc9b1a..f91521d5f2ab 100644 --- a/net/xfrm/xfrm_user.c +++ b/net/xfrm/xfrm_user.c | |||
@@ -71,7 +71,7 @@ static int verify_one_alg(struct rtattr **xfrma, enum xfrm_attr_type_t type) | |||
71 | 71 | ||
72 | default: | 72 | default: |
73 | return -EINVAL; | 73 | return -EINVAL; |
74 | }; | 74 | } |
75 | 75 | ||
76 | algp->alg_name[CRYPTO_MAX_ALG_NAME - 1] = '\0'; | 76 | algp->alg_name[CRYPTO_MAX_ALG_NAME - 1] = '\0'; |
77 | return 0; | 77 | return 0; |
@@ -152,7 +152,7 @@ static int verify_newsa_info(struct xfrm_usersa_info *p, | |||
152 | 152 | ||
153 | default: | 153 | default: |
154 | goto out; | 154 | goto out; |
155 | }; | 155 | } |
156 | 156 | ||
157 | err = -EINVAL; | 157 | err = -EINVAL; |
158 | switch (p->id.proto) { | 158 | switch (p->id.proto) { |
@@ -192,7 +192,7 @@ static int verify_newsa_info(struct xfrm_usersa_info *p, | |||
192 | 192 | ||
193 | default: | 193 | default: |
194 | goto out; | 194 | goto out; |
195 | }; | 195 | } |
196 | 196 | ||
197 | if ((err = verify_one_alg(xfrma, XFRMA_ALG_AUTH))) | 197 | if ((err = verify_one_alg(xfrma, XFRMA_ALG_AUTH))) |
198 | goto out; | 198 | goto out; |
@@ -217,7 +217,7 @@ static int verify_newsa_info(struct xfrm_usersa_info *p, | |||
217 | 217 | ||
218 | default: | 218 | default: |
219 | goto out; | 219 | goto out; |
220 | }; | 220 | } |
221 | 221 | ||
222 | err = 0; | 222 | err = 0; |
223 | 223 | ||
@@ -711,7 +711,7 @@ static int verify_userspi_info(struct xfrm_userspi_info *p) | |||
711 | 711 | ||
712 | default: | 712 | default: |
713 | return -EINVAL; | 713 | return -EINVAL; |
714 | }; | 714 | } |
715 | 715 | ||
716 | if (p->min > p->max) | 716 | if (p->min > p->max) |
717 | return -EINVAL; | 717 | return -EINVAL; |
@@ -789,7 +789,7 @@ static int verify_policy_dir(u8 dir) | |||
789 | 789 | ||
790 | default: | 790 | default: |
791 | return -EINVAL; | 791 | return -EINVAL; |
792 | }; | 792 | } |
793 | 793 | ||
794 | return 0; | 794 | return 0; |
795 | } | 795 | } |
@@ -805,7 +805,7 @@ static int verify_policy_type(u8 type) | |||
805 | 805 | ||
806 | default: | 806 | default: |
807 | return -EINVAL; | 807 | return -EINVAL; |
808 | }; | 808 | } |
809 | 809 | ||
810 | return 0; | 810 | return 0; |
811 | } | 811 | } |
@@ -821,7 +821,7 @@ static int verify_newpolicy_info(struct xfrm_userpolicy_info *p) | |||
821 | 821 | ||
822 | default: | 822 | default: |
823 | return -EINVAL; | 823 | return -EINVAL; |
824 | }; | 824 | } |
825 | 825 | ||
826 | switch (p->action) { | 826 | switch (p->action) { |
827 | case XFRM_POLICY_ALLOW: | 827 | case XFRM_POLICY_ALLOW: |
@@ -830,7 +830,7 @@ static int verify_newpolicy_info(struct xfrm_userpolicy_info *p) | |||
830 | 830 | ||
831 | default: | 831 | default: |
832 | return -EINVAL; | 832 | return -EINVAL; |
833 | }; | 833 | } |
834 | 834 | ||
835 | switch (p->sel.family) { | 835 | switch (p->sel.family) { |
836 | case AF_INET: | 836 | case AF_INET: |
@@ -845,7 +845,7 @@ static int verify_newpolicy_info(struct xfrm_userpolicy_info *p) | |||
845 | 845 | ||
846 | default: | 846 | default: |
847 | return -EINVAL; | 847 | return -EINVAL; |
848 | }; | 848 | } |
849 | 849 | ||
850 | return verify_policy_dir(p->dir); | 850 | return verify_policy_dir(p->dir); |
851 | } | 851 | } |
@@ -912,7 +912,7 @@ static int validate_tmpl(int nr, struct xfrm_user_tmpl *ut, u16 family) | |||
912 | #endif | 912 | #endif |
913 | default: | 913 | default: |
914 | return -EINVAL; | 914 | return -EINVAL; |
915 | }; | 915 | } |
916 | } | 916 | } |
917 | 917 | ||
918 | return 0; | 918 | return 0; |