aboutsummaryrefslogtreecommitdiffstats
path: root/net/xfrm/xfrm_user.c
diff options
context:
space:
mode:
authorStephen Hemminger <shemminger@linux-foundation.org>2007-04-20 20:09:22 -0400
committerDavid S. Miller <davem@sunset.davemloft.net>2007-04-26 01:29:24 -0400
commit3ff50b7997fe06cd5d276b229967bb52d6b3b6c1 (patch)
tree4f0f57123a945c3e6c39759456b6187bb78c4b1f /net/xfrm/xfrm_user.c
parentc462238d6a6d8ee855bda10f9fff442971540ed2 (diff)
[NET]: cleanup extra semicolons
Spring cleaning time... There seems to be a lot of places in the network code that have extra bogus semicolons after conditionals. Most commonly is a bogus semicolon after: switch() { } Signed-off-by: Stephen Hemminger <shemminger@linux-foundation.org> Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/xfrm/xfrm_user.c')
-rw-r--r--net/xfrm/xfrm_user.c22
1 files changed, 11 insertions, 11 deletions
diff --git a/net/xfrm/xfrm_user.c b/net/xfrm/xfrm_user.c
index 88659edc9b1a..f91521d5f2ab 100644
--- a/net/xfrm/xfrm_user.c
+++ b/net/xfrm/xfrm_user.c
@@ -71,7 +71,7 @@ static int verify_one_alg(struct rtattr **xfrma, enum xfrm_attr_type_t type)
71 71
72 default: 72 default:
73 return -EINVAL; 73 return -EINVAL;
74 }; 74 }
75 75
76 algp->alg_name[CRYPTO_MAX_ALG_NAME - 1] = '\0'; 76 algp->alg_name[CRYPTO_MAX_ALG_NAME - 1] = '\0';
77 return 0; 77 return 0;
@@ -152,7 +152,7 @@ static int verify_newsa_info(struct xfrm_usersa_info *p,
152 152
153 default: 153 default:
154 goto out; 154 goto out;
155 }; 155 }
156 156
157 err = -EINVAL; 157 err = -EINVAL;
158 switch (p->id.proto) { 158 switch (p->id.proto) {
@@ -192,7 +192,7 @@ static int verify_newsa_info(struct xfrm_usersa_info *p,
192 192
193 default: 193 default:
194 goto out; 194 goto out;
195 }; 195 }
196 196
197 if ((err = verify_one_alg(xfrma, XFRMA_ALG_AUTH))) 197 if ((err = verify_one_alg(xfrma, XFRMA_ALG_AUTH)))
198 goto out; 198 goto out;
@@ -217,7 +217,7 @@ static int verify_newsa_info(struct xfrm_usersa_info *p,
217 217
218 default: 218 default:
219 goto out; 219 goto out;
220 }; 220 }
221 221
222 err = 0; 222 err = 0;
223 223
@@ -711,7 +711,7 @@ static int verify_userspi_info(struct xfrm_userspi_info *p)
711 711
712 default: 712 default:
713 return -EINVAL; 713 return -EINVAL;
714 }; 714 }
715 715
716 if (p->min > p->max) 716 if (p->min > p->max)
717 return -EINVAL; 717 return -EINVAL;
@@ -789,7 +789,7 @@ static int verify_policy_dir(u8 dir)
789 789
790 default: 790 default:
791 return -EINVAL; 791 return -EINVAL;
792 }; 792 }
793 793
794 return 0; 794 return 0;
795} 795}
@@ -805,7 +805,7 @@ static int verify_policy_type(u8 type)
805 805
806 default: 806 default:
807 return -EINVAL; 807 return -EINVAL;
808 }; 808 }
809 809
810 return 0; 810 return 0;
811} 811}
@@ -821,7 +821,7 @@ static int verify_newpolicy_info(struct xfrm_userpolicy_info *p)
821 821
822 default: 822 default:
823 return -EINVAL; 823 return -EINVAL;
824 }; 824 }
825 825
826 switch (p->action) { 826 switch (p->action) {
827 case XFRM_POLICY_ALLOW: 827 case XFRM_POLICY_ALLOW:
@@ -830,7 +830,7 @@ static int verify_newpolicy_info(struct xfrm_userpolicy_info *p)
830 830
831 default: 831 default:
832 return -EINVAL; 832 return -EINVAL;
833 }; 833 }
834 834
835 switch (p->sel.family) { 835 switch (p->sel.family) {
836 case AF_INET: 836 case AF_INET:
@@ -845,7 +845,7 @@ static int verify_newpolicy_info(struct xfrm_userpolicy_info *p)
845 845
846 default: 846 default:
847 return -EINVAL; 847 return -EINVAL;
848 }; 848 }
849 849
850 return verify_policy_dir(p->dir); 850 return verify_policy_dir(p->dir);
851} 851}
@@ -912,7 +912,7 @@ static int validate_tmpl(int nr, struct xfrm_user_tmpl *ut, u16 family)
912#endif 912#endif
913 default: 913 default:
914 return -EINVAL; 914 return -EINVAL;
915 }; 915 }
916 } 916 }
917 917
918 return 0; 918 return 0;