Received: by 10.213.65.68 with SMTP id h4csp427363imn; Tue, 27 Mar 2018 01:50:58 -0700 (PDT) X-Google-Smtp-Source: AG47ELvIMWKgFHD4BQwzXQYNrvgdJ8QrIHizLAT0K2SxsBQzAMzImHWm6kOwJysn0/oovLad3r7o X-Received: by 2002:a17:902:341:: with SMTP id 59-v6mr42915188pld.407.1522140658722; Tue, 27 Mar 2018 01:50:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1522140658; cv=none; d=google.com; s=arc-20160816; b=Rp9Y3eiZBoNfCCcETONtbKmX35XTEvsSbFsynh7cDwW8r8gLB8SJyNVid/Ndc+3Oxi 0JC3fC58K0ByA7djCgr1eGaINDA8uT2YQ99oO+mBLESJ6VL3/BYC5raequ6PtSVN2JW4 CKMP/O0Izl2NIhMvEjrSrpZvCNRCr9jPykrCbFvdWpsLNgMoY798YGY5fhiz+HA/l6QR 7Us3H7vWQAvsckTYosceHolDwAUKKeNB9GuBR9/qw9HlenktPHkgzWDYP3WSBu+CD6Fz TbeKPuVS44RmiLusYZaGKzCiViZSZngERdj9SALSVk3aXjpCjpyN08YndqkeC/dgdgzo 2z1A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=AsRNyiHRyoMTjGDGDkBSNblwFVSq+5s7mCYINrMmGuo=; b=jT6OoHgc1k2j7PfDT3crNkKiOz1LjN+pCc+VKRmJih0zRxP1MoYboUZL+w7JPGsKFL F15xQ5E2qvr+qd2L/28YrXpy1MLjmJwv8gRC5S2mftLdhzmQhPWf9wPAa6Gn1ojelCV9 2xwpWBEY9ESy2o4FItUQ3dBJMxHw2jihcIqjrghQO3ijRQeL3HvQ+uruOyjA7cvN5+Zs 7xUefrobE+/b9r+E2SmtVpGLwVWo1v5dnK7FLWU15XvFQBUJpGBzPR6ooYoFcRkfqC5o isNdHGv6tyWPCOY7h/0cSfrez43etJy1m9mh3AsPNmlzfMjSHtKE7NKtWeA0+hUnw58F XYoA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d2-v6si835409plh.44.2018.03.27.01.50.44; Tue, 27 Mar 2018 01:50:58 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752394AbeC0ItU (ORCPT + 99 others); Tue, 27 Mar 2018 04:49:20 -0400 Received: from mout.perfora.net ([74.208.4.194]:44857 "EHLO mout.perfora.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751046AbeC0Ilb (ORCPT ); Tue, 27 Mar 2018 04:41:31 -0400 Received: from kahja.local ([73.170.116.139]) by mrelay.perfora.net (mreueus002 [74.208.5.2]) with ESMTPSA (Nemesis) id 0MPFiA-1ewMRs2Que-004Tci; Tue, 27 Mar 2018 10:41:28 +0200 From: Quytelda Kahja To: gregkh@linuxfoundation.org Cc: linux-kernel@vger.kernel.org, Quytelda Kahja Subject: [PATCH 07/23] staging: rtl8723bs: Remove unecessary braces from switch statement. Date: Tue, 27 Mar 2018 01:40:59 -0700 Message-Id: <20180327084115.16129-7-quytelda@tamalin.org> X-Mailer: git-send-email 2.16.3 In-Reply-To: <20180327084115.16129-1-quytelda@tamalin.org> References: <20180327084115.16129-1-quytelda@tamalin.org> X-Provags-ID: V03:K0:7TNfIfmgLs+ZgrW8y3lGRYoWB5nnvF9Y9WuM0667VGxE4MbjTAF nn5BgdCxue3IhUWNdEM4nNYM7LYotcisf8lGN8P9gXd3lwPXIOzzPf5JJ3Jkiz40wtxiUZb tlbWyvxzc7Zv3ViTnmt2qDpVqZrJMExtWwZ0yue5aryZ2bVRxB9J52SktBfwfGg/ly/yKTm oHFUW2CCV2OB1aZylYR6w== X-UI-Out-Filterresults: notjunk:1;V01:K0:DycugQy4U30=:uFFFXB/sGz5k4Tk7ZPS4la 6QNCJMgwzlBTpBy8pzdwTZq/dwSK8+KidRDgBvqM1J67YQzmoztdptEGfTBoZ7twwwY7GH8B9 KgWyCvAoQs9v2s1R9C2ZZWiU5+WtCoMvcXU0rwkTxD7fcsyinqC/FVIPQI9+xGdpTiPJdVFTy hWpZxcj5EM6VcDIbSDW6RhKJd4xpzVO3TM9iraNnP5lY5DBRFJmDJTd+8HuMqazZDBaKFKq1p gc3HXK0DgHxAXNHgUSqmMrXnJPtag53zjb4VpdiaQqkjOUTQNjsiTyw9N+cssa2CDgBGlVx6H +TMlJvwP61R2dszFQOvjfE0zbTfRDSck/QyJzxGfB0TbjOcXSZzviBVTrvS02rSdOJxhDmVVA pv+u+zDXuWef9TkApsE4+DqyeRMq3VTVgCFZDEFoIta+c3DRT5mv2AaOdO8JfnHsGcHJZa3MO +jvnuLEVsvDvif/j79XFCCoHdNudF5KQM2bg6jc6di8Wo8vKbRzqAbMzKbLK2VkokrU/k7UQy eHPZzWjjvrD2QSRiE49F0ZjYJZirfib+HjY10YIuENZ2/nnqXX9B7JAh71m/pKacf41bGjdpe x8sr5R5eUlINOq7vSz4W7gieDz2WNMUnGnffVu/FgHtKaIYekpOBawO/LDfHjazV8imHmOE6s fhPVKcD0eC6na/5vWk9B7rd+RIetBacnMRDRwCuuVolyJJbGXzbtN3f7f7/s2oiThcqSOK8nE TGlxXO3YQbXcET8ggI4OCNtBSraJLpmiGRwVlw== Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The switch statement in rtw_wx_set_auth() wraps individual cases in braces for no reason. Remove those braces and unindent the code. Signed-off-by: Quytelda Kahja --- drivers/staging/rtl8723bs/os_dep/ioctl_linux.c | 50 ++++++++++++-------------- 1 file changed, 23 insertions(+), 27 deletions(-) diff --git a/drivers/staging/rtl8723bs/os_dep/ioctl_linux.c b/drivers/staging/rtl8723bs/os_dep/ioctl_linux.c index 1b458074b7f9..3e78fc28a8eb 100644 --- a/drivers/staging/rtl8723bs/os_dep/ioctl_linux.c +++ b/drivers/staging/rtl8723bs/os_dep/ioctl_linux.c @@ -2151,7 +2151,6 @@ static int rtw_wx_set_auth(struct net_device *dev, */ break; case IW_AUTH_TKIP_COUNTERMEASURES: - { if (param->value) { /* wpa_supplicant is enabling the tkip countermeasure. */ padapter->securitypriv.btkip_countermeasure = true; @@ -2160,36 +2159,33 @@ static int rtw_wx_set_auth(struct net_device *dev, padapter->securitypriv.btkip_countermeasure = false; } break; - } case IW_AUTH_DROP_UNENCRYPTED: - { - /* HACK: - * - * wpa_supplicant calls set_wpa_enabled when the driver - * is loaded and unloaded, regardless of if WPA is being - * used. No other calls are made which can be used to - * determine if encryption will be used or not prior to - * association being expected. If encryption is not being - * used, drop_unencrypted is set to false, else true -- we - * can use this to determine if the CAP_PRIVACY_ON bit should - * be set. - */ - - if (padapter->securitypriv.ndisencryptstatus == Ndis802_11Encryption1Enabled) { - break;/* it means init value, or using wep, ndisencryptstatus = Ndis802_11Encryption1Enabled, */ - /* then it needn't reset it; */ - } + /* HACK: + * + * wpa_supplicant calls set_wpa_enabled when the driver + * is loaded and unloaded, regardless of if WPA is being + * used. No other calls are made which can be used to + * determine if encryption will be used or not prior to + * association being expected. If encryption is not being + * used, drop_unencrypted is set to false, else true -- we + * can use this to determine if the CAP_PRIVACY_ON bit should + * be set. + */ - if (param->value) { - padapter->securitypriv.ndisencryptstatus = Ndis802_11EncryptionDisabled; - padapter->securitypriv.dot11PrivacyAlgrthm = _NO_PRIVACY_; - padapter->securitypriv.dot118021XGrpPrivacy = _NO_PRIVACY_; - padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Open; /* open system */ - padapter->securitypriv.ndisauthtype =Ndis802_11AuthModeOpen; - } + if (padapter->securitypriv.ndisencryptstatus == Ndis802_11Encryption1Enabled) { + break;/* it means init value, or using wep, ndisencryptstatus = Ndis802_11Encryption1Enabled, */ + /* then it needn't reset it; */ + } - break; + if (param->value) { + padapter->securitypriv.ndisencryptstatus = Ndis802_11EncryptionDisabled; + padapter->securitypriv.dot11PrivacyAlgrthm = _NO_PRIVACY_; + padapter->securitypriv.dot118021XGrpPrivacy = _NO_PRIVACY_; + padapter->securitypriv.dot11AuthAlgrthm = dot11AuthAlgrthm_Open; /* open system */ + padapter->securitypriv.ndisauthtype =Ndis802_11AuthModeOpen; } + + break; case IW_AUTH_80211_AUTH_ALG: /* * It's the starting point of a link layer connection using wpa_supplicant -- 2.16.3