]> www.infradead.org Git - users/dwmw2/openconnect.git/commitdiff
Uniform coding style: no {} for single statement
authorAntonio Borneo <borneo.antonio@gmail.com>
Sun, 10 Mar 2013 11:06:09 +0000 (19:06 +0800)
committerDavid Woodhouse <David.Woodhouse@intel.com>
Sun, 10 Mar 2013 11:53:17 +0000 (11:53 +0000)
Signed-off-by: Antonio Borneo <borneo.antonio@gmail.com>
Signed-off-by: David Woodhouse <David.Woodhouse@intel.com>
cstp.c
main.c
openssl.c

diff --git a/cstp.c b/cstp.c
index dbe1947c4bdc58b56c97c8c31043539ccbd6e4ce..bb79e7ec8aa35102aba7aad000ef4c20e3d42499 100644 (file)
--- a/cstp.c
+++ b/cstp.c
@@ -610,9 +610,8 @@ static int inflate_and_queue_packet(struct openconnect_info *vpninfo,
        pkt_sum = buf[len - 1] | (buf[len - 2] << 8) |
                (buf[len - 3] << 16) | (buf[len - 4] << 24);
 
-       if (vpninfo->inflate_adler32 != pkt_sum) {
+       if (vpninfo->inflate_adler32 != pkt_sum)
                vpninfo->quit_reason = "Compression (inflate) adler32 failure";
-       }
 
        vpn_progress(vpninfo, PRG_TRACE,
                     _("Received compressed data packet of %ld bytes\n"),
diff --git a/main.c b/main.c
index 1cbcb82890fecde147fc897de708188d84242634..dfb7d3be234e45224a68cce1057ca8542754ac81 100644 (file)
--- a/main.c
+++ b/main.c
@@ -541,9 +541,8 @@ int main(int argc, char **argv)
                case OPT_COOKIE_ON_STDIN:
                        read_stdin(&vpninfo->cookie);
                        /* If the cookie is empty, ignore it */
-                       if (!*vpninfo->cookie) {
+                       if (!*vpninfo->cookie)
                                vpninfo->cookie = NULL;
-                       }
                        break;
                case OPT_PASSWORD_ON_STDIN:
                        read_stdin(&vpninfo->password);
index 36897f2ef07f97de5fb69ad2dd47a1682b507803..741f5517b11a48b4f0f134b2f4e45238d574c799 100644 (file)
--- a/openssl.c
+++ b/openssl.c
@@ -1241,9 +1241,8 @@ static int check_certificate_expiry(struct openconnect_info *vpninfo)
        } else {
                t += vpninfo->cert_expire_warning;
                i = X509_cmp_time(notAfter, &t);
-               if (i < 0) {
+               if (i < 0)
                        reason = _("Client certificate expires soon at");
-               }
        }
        if (reason) {
                BIO *bp = BIO_new(BIO_s_mem());