Solve the checkpatch issue: space prohibited before close parenthesis ')' space prohibited after open parenthesis '(' Signed-off-by: Arushi Singhal <arushisinghal19971997@xxxxxxxxx> --- extensions/libip6t_ah.c | 4 ++-- extensions/libip6t_dst.c | 6 +++--- extensions/libip6t_hbh.c | 6 +++--- 3 files changed, 8 insertions(+), 8 deletions(-) diff --git a/extensions/libip6t_ah.c b/extensions/libip6t_ah.c index 38c71f2..fc3e524 100644 --- a/extensions/libip6t_ah.c +++ b/extensions/libip6t_ah.c @@ -118,13 +118,13 @@ static void ah_save(const void *ip, const struct xt_entry_match *match) ahinfo->spis[0]); } - if (ahinfo->hdrlen != 0 || (ahinfo->invflags & IP6T_AH_INV_LEN) ) { + if (ahinfo->hdrlen != 0 || (ahinfo->invflags & IP6T_AH_INV_LEN)) { printf("%s --ahlen %u", (ahinfo->invflags & IP6T_AH_INV_LEN) ? " !" : "", ahinfo->hdrlen); } - if (ahinfo->hdrres != 0 ) + if (ahinfo->hdrres != 0) printf(" --ahres"); } diff --git a/extensions/libip6t_dst.c b/extensions/libip6t_dst.c index 321e1f4..83358ab 100644 --- a/extensions/libip6t_dst.c +++ b/extensions/libip6t_dst.c @@ -36,16 +36,16 @@ parse_opts_num(const char *idstr, const char *typestr) id = strtoul(idstr, &ep, 0); - if ( idstr == ep ) { + if (idstr == ep) { xtables_error(PARAMETER_PROBLEM, "dst: no valid digits in %s `%s'", typestr, idstr); } - if ( id == ULONG_MAX && errno == ERANGE ) { + if (id == ULONG_MAX && errno == ERANGE) { xtables_error(PARAMETER_PROBLEM, "%s `%s' specified too big: would overflow", typestr, idstr); } - if ( *idstr != '\0' && *ep != '\0' ) { + if (*idstr != '\0' && *ep != '\0') { xtables_error(PARAMETER_PROBLEM, "dst: error parsing %s `%s'", typestr, idstr); } diff --git a/extensions/libip6t_hbh.c b/extensions/libip6t_hbh.c index 8e1b0ac..469fecf 100644 --- a/extensions/libip6t_hbh.c +++ b/extensions/libip6t_hbh.c @@ -38,16 +38,16 @@ parse_opts_num(const char *idstr, const char *typestr) id = strtoul(idstr,&ep,0) ; - if ( idstr == ep ) { + if (idstr == ep) { xtables_error(PARAMETER_PROBLEM, "hbh: no valid digits in %s `%s'", typestr, idstr); } - if ( id == ULONG_MAX && errno == ERANGE ) { + if (id == ULONG_MAX && errno == ERANGE) { xtables_error(PARAMETER_PROBLEM, "%s `%s' specified too big: would overflow", typestr, idstr); } - if ( *idstr != '\0' && *ep != '\0' ) { + if (*idstr != '\0' && *ep != '\0') { xtables_error(PARAMETER_PROBLEM, "hbh: error parsing %s `%s'", typestr, idstr); } -- 2.11.0 -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html