FR_PROTO_HEX_DUMP(keys->ck_prime, sizeof(keys->ck_prime), "CK'");
FR_PROTO_HEX_DUMP(keys->ik_prime, sizeof(keys->ik_prime), "IK'");
- EVP_MD_CTX_destroy(md_ctx);;
+ EVP_MD_CTX_destroy(md_ctx);
EVP_PKEY_free(pkey);
return 0;
p += copy;
}
- EVP_MD_CTX_destroy(md_ctx);;
+ EVP_MD_CTX_destroy(md_ctx);
EVP_PKEY_free(pkey);
return 0;
ret = vector_umts_from_quintuplets(request, vps, keys);
if (ret == 0) {
*src = AKA_SIM_VECTOR_SRC_QUINTUPLETS;
- break;;
+ break;
}
if (ret < 0) return -1;
break;
static int8_t address_cmp(void const *one, void const *two)
{
fr_io_address_t const *a = talloc_get_type_abort_const(one, fr_io_address_t);
- fr_io_address_t const *b = talloc_get_type_abort_const(two, fr_io_address_t);;
+ fr_io_address_t const *b = talloc_get_type_abort_const(two, fr_io_address_t);
int8_t ret;
CMP_RETURN(a, b, socket.inet.src_port);
*/
static int _sasl_interact(UNUSED LDAP *handle, UNUSED unsigned flags, void *uctx, void *sasl_callbacks)
{
- fr_ldap_sasl_ctx_t *sasl_ctx = talloc_get_type_abort(uctx, fr_ldap_sasl_ctx_t);;
+ fr_ldap_sasl_ctx_t *sasl_ctx = talloc_get_type_abort(uctx, fr_ldap_sasl_ctx_t);
sasl_interact_t *cb = sasl_callbacks;
sasl_interact_t *cb_p;
*/
int tmpl_attr_unknown_add(tmpl_t *vpt)
{
- tmpl_attr_t *ar = NULL, *next = NULL;;
+ tmpl_attr_t *ar = NULL, *next = NULL;
if (!vpt) return 1;
goto skip_string;
case '\'':
- quote = *(p++);;
+ quote = *(p++);
*type = T_SINGLE_QUOTED_STRING;
goto skip_string;
case '`':
- quote = *(p++);;
+ quote = *(p++);
*type = T_BACK_QUOTED_STRING;
goto skip_string;
case '"':
- quote = *(p++);;
+ quote = *(p++);
*type = T_DOUBLE_QUOTED_STRING;
/*
static void trunk_request_enter_backlog(fr_trunk_request_t *treq, bool new)
{
fr_trunk_connection_t *tconn = treq->pub.tconn;
- fr_trunk_t *trunk = treq->pub.trunk;;
+ fr_trunk_t *trunk = treq->pub.trunk;
switch (treq->pub.state) {
case FR_TRUNK_REQUEST_STATE_INIT:
hash = fr_hash(p, slen);
- start = hash % g->num_children;;
+ start = hash % g->num_children;
}
RDEBUG3("load-balance starting at child %d", (int) start);
{
rlm_eap_t const *inst = talloc_get_type_abort_const(mctx->inst->data, rlm_eap_t);
unsigned int i, s_i = 0;
- fr_pair_t *vp = NULL;;
+ fr_pair_t *vp = NULL;
eap_type_t method = FR_EAP_METHOD_INVALID;
eap_type_t sanitised[nak->length];
fr_assert(ret != 0);
if (!fr_cond_assert(inst)) return RLM_MODULE_FAIL;
- if (!fr_cond_assert(conn)) return RLM_MODULE_FAIL;; /* Silences warnings */
+ if (!fr_cond_assert(conn)) return RLM_MODULE_FAIL; /* Silences warnings */
switch (ret) {
case KRB5_LIBOS_BADPWDMATCH:
/*
* Prioritise status check packets
*/
- ret = (b->status_check - a->status_check);;
+ ret = (b->status_check - a->status_check);
if (ret != 0) return ret;
/*
static void request_demux(UNUSED fr_event_list_t *el, fr_trunk_connection_t *tconn, fr_connection_t *conn, UNUSED void *uctx)
{
- udp_handle_t *h = talloc_get_type_abort(conn->h, udp_handle_t);;
+ udp_handle_t *h = talloc_get_type_abort(conn->h, udp_handle_t);
DEBUG3("%s - Reading data for connection %s", h->module_name, h->name);
break;
}
- return sql_classify_error(inst, status, conn->result);;
+ return sql_classify_error(inst, status, conn->result);
}
static sql_rcode_t sql_select_query(rlm_sql_handle_t * handle, rlm_sql_config_t const *config, char const *query)
unbound_request_t *ur = talloc_get_type_abort(uctx, unbound_request_t);
request_t *request = ur->request;
- REDEBUG("Timeout waiting for DNS resolution");;
+ REDEBUG("Timeout waiting for DNS resolution");
unlang_interpret_mark_runnable(request);
ur->timedout = true;
COPY(tpa, spa); /* answer is sent to the requestor protocol address */
}
- return fr_dbuff_set(dbuff, &work_dbuff);;
+ return fr_dbuff_set(dbuff, &work_dbuff);
}
/** Decode a raw ARP packet into VPs