Staging : ks7010 : Fix block comments warninig
authorMuraru Mihaela <mihaela.muraru21@gmail.com>
Thu, 29 Sep 2016 10:09:56 +0000 (13:09 +0300)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Sun, 2 Oct 2016 15:29:11 +0000 (17:29 +0200)
Move final */ to a new line, to conform to
the kernel coding style for block comments.

Issue found by checkpatch.

Signed-off-by: Muraru Mihaela <mihaela.muraru21@gmail.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
drivers/staging/ks7010/eap_packet.h

index 373c0fe..df7f760 100644 (file)
@@ -53,24 +53,32 @@ enum { EAPOL_KEY_TYPE_RC4 = 1, EAPOL_KEY_TYPE_RSN = 2,
 struct ieee802_1x_eapol_key {
        unsigned char type;
        unsigned short key_length;
-       /* does not repeat within the life of the keying material used to
-        * encrypt the Key field; 64-bit NTP timestamp MAY be used here */
+       /*
+        * does not repeat within the life of the keying material used to
+        * encrypt the Key field; 64-bit NTP timestamp MAY be used here
+        */
        unsigned char replay_counter[IEEE8021X_REPLAY_COUNTER_LEN];
        unsigned char key_iv[IEEE8021X_KEY_IV_LEN];     /* cryptographically random number */
-       unsigned char key_index;        /* key flag in the most significant bit:
+       unsigned char key_index;        /*
+                                        * key flag in the most significant bit:
                                         * 0 = broadcast (default key),
                                         * 1 = unicast (key mapping key); key index is in the
-                                        * 7 least significant bits */
-       /* HMAC-MD5 message integrity check computed with MS-MPPE-Send-Key as
-        * the key */
+                                        * 7 least significant bits
+                                        */
+       /*
+        * HMAC-MD5 message integrity check computed with MS-MPPE-Send-Key as
+        * the key
+        */
        unsigned char key_signature[IEEE8021X_KEY_SIGN_LEN];
 
-       /* followed by key: if packet body length = 44 + key length, then the
+       /*
+        * followed by key: if packet body length = 44 + key length, then the
         * key field (of key_length bytes) contains the key in encrypted form;
         * if packet body length = 44, key field is absent and key_length
         * represents the number of least significant octets from
         * MS-MPPE-Send-Key attribute to be used as the keying material;
-        * RC4 key used in encryption = Key-IV + MS-MPPE-Recv-Key */
+        * RC4 key used in encryption = Key-IV + MS-MPPE-Recv-Key
+        */
 } __packed;
 
 #define WPA_NONCE_LEN 32