Commit 0f65bec1 authored by Bartlomiej Zolnierkiewicz's avatar Bartlomiej Zolnierkiewicz Committed by Greg Kroah-Hartman

Staging: rt28x0: run sta/*.c files through Lindent

Signed-off-by: default avatarBartlomiej Zolnierkiewicz <bzolnier@gmail.com>
Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
parent 96b3c83d
This diff is collapsed.
This diff is collapsed.
...@@ -47,18 +47,21 @@ ...@@ -47,18 +47,21 @@
========================================================================== ==========================================================================
*/ */
VOID AuthRspStateMachineInit( VOID AuthRspStateMachineInit(IN PRTMP_ADAPTER pAd,
IN PRTMP_ADAPTER pAd, IN PSTATE_MACHINE Sm,
IN PSTATE_MACHINE Sm, IN STATE_MACHINE_FUNC Trans[])
IN STATE_MACHINE_FUNC Trans[])
{ {
StateMachineInit(Sm, Trans, MAX_AUTH_RSP_STATE, MAX_AUTH_RSP_MSG, (STATE_MACHINE_FUNC)Drop, AUTH_RSP_IDLE, AUTH_RSP_MACHINE_BASE); StateMachineInit(Sm, Trans, MAX_AUTH_RSP_STATE, MAX_AUTH_RSP_MSG,
(STATE_MACHINE_FUNC) Drop, AUTH_RSP_IDLE,
AUTH_RSP_MACHINE_BASE);
// column 1 // column 1
StateMachineSetAction(Sm, AUTH_RSP_IDLE, MT2_PEER_DEAUTH, (STATE_MACHINE_FUNC)PeerDeauthAction); StateMachineSetAction(Sm, AUTH_RSP_IDLE, MT2_PEER_DEAUTH,
(STATE_MACHINE_FUNC) PeerDeauthAction);
// column 2 // column 2
StateMachineSetAction(Sm, AUTH_RSP_WAIT_CHAL, MT2_PEER_DEAUTH, (STATE_MACHINE_FUNC)PeerDeauthAction); StateMachineSetAction(Sm, AUTH_RSP_WAIT_CHAL, MT2_PEER_DEAUTH,
(STATE_MACHINE_FUNC) PeerDeauthAction);
} }
...@@ -70,39 +73,32 @@ VOID AuthRspStateMachineInit( ...@@ -70,39 +73,32 @@ VOID AuthRspStateMachineInit(
========================================================================== ==========================================================================
*/ */
VOID PeerAuthSimpleRspGenAndSend( VOID PeerAuthSimpleRspGenAndSend(IN PRTMP_ADAPTER pAd,
IN PRTMP_ADAPTER pAd, IN PHEADER_802_11 pHdr80211,
IN PHEADER_802_11 pHdr80211, IN USHORT Alg,
IN USHORT Alg, IN USHORT Seq,
IN USHORT Seq, IN USHORT Reason, IN USHORT Status)
IN USHORT Reason,
IN USHORT Status)
{ {
HEADER_802_11 AuthHdr; HEADER_802_11 AuthHdr;
ULONG FrameLen = 0; ULONG FrameLen = 0;
PUCHAR pOutBuffer = NULL; PUCHAR pOutBuffer = NULL;
NDIS_STATUS NStatus; NDIS_STATUS NStatus;
if (Reason != MLME_SUCCESS) if (Reason != MLME_SUCCESS) {
{ DBGPRINT(RT_DEBUG_TRACE, ("Peer AUTH fail...\n"));
DBGPRINT(RT_DEBUG_TRACE, ("Peer AUTH fail...\n")); return;
return; }
}
//Get an unused nonpaged memory //Get an unused nonpaged memory
NStatus = MlmeAllocateMemory(pAd, &pOutBuffer); NStatus = MlmeAllocateMemory(pAd, &pOutBuffer);
if (NStatus != NDIS_STATUS_SUCCESS) if (NStatus != NDIS_STATUS_SUCCESS)
return; return;
DBGPRINT(RT_DEBUG_TRACE, ("Send AUTH response (seq#2)...\n")); DBGPRINT(RT_DEBUG_TRACE, ("Send AUTH response (seq#2)...\n"));
MgtMacHeaderInit(pAd, &AuthHdr, SUBTYPE_AUTH, 0, pHdr80211->Addr2, pAd->MlmeAux.Bssid); MgtMacHeaderInit(pAd, &AuthHdr, SUBTYPE_AUTH, 0, pHdr80211->Addr2,
MakeOutgoingFrame(pOutBuffer, &FrameLen, pAd->MlmeAux.Bssid);
sizeof(HEADER_802_11), &AuthHdr, MakeOutgoingFrame(pOutBuffer, &FrameLen, sizeof(HEADER_802_11),
2, &Alg, &AuthHdr, 2, &Alg, 2, &Seq, 2, &Reason, END_OF_ARGS);
2, &Seq, MiniportMMRequest(pAd, 0, pOutBuffer, FrameLen);
2, &Reason,
END_OF_ARGS);
MiniportMMRequest(pAd, 0, pOutBuffer, FrameLen);
MlmeFreeMemory(pAd, pOutBuffer); MlmeFreeMemory(pAd, pOutBuffer);
} }
...@@ -114,35 +110,33 @@ VOID PeerAuthSimpleRspGenAndSend( ...@@ -114,35 +110,33 @@ VOID PeerAuthSimpleRspGenAndSend(
========================================================================== ==========================================================================
*/ */
VOID PeerDeauthAction( VOID PeerDeauthAction(IN PRTMP_ADAPTER pAd, IN PMLME_QUEUE_ELEM Elem)
IN PRTMP_ADAPTER pAd,
IN PMLME_QUEUE_ELEM Elem)
{ {
UCHAR Addr2[MAC_ADDR_LEN]; UCHAR Addr2[MAC_ADDR_LEN];
USHORT Reason; USHORT Reason;
if (PeerDeauthSanity(pAd, Elem->Msg, Elem->MsgLen, Addr2, &Reason))
{
if (INFRA_ON(pAd)
&& MAC_ADDR_EQUAL(Addr2, pAd->CommonCfg.Bssid)
)
{
DBGPRINT(RT_DEBUG_TRACE,("AUTH_RSP - receive DE-AUTH from our AP (Reason=%d)\n", Reason));
if (PeerDeauthSanity(pAd, Elem->Msg, Elem->MsgLen, Addr2, &Reason)) {
if (INFRA_ON(pAd)
&& MAC_ADDR_EQUAL(Addr2, pAd->CommonCfg.Bssid)
) {
DBGPRINT(RT_DEBUG_TRACE,
("AUTH_RSP - receive DE-AUTH from our AP (Reason=%d)\n",
Reason));
RtmpOSWrielessEventSend(pAd, SIOCGIWAP, -1, NULL, NULL, 0); RtmpOSWrielessEventSend(pAd, SIOCGIWAP, -1, NULL, NULL,
0);
// send wireless event - for deauthentication // send wireless event - for deauthentication
if (pAd->CommonCfg.bWirelessEvent) if (pAd->CommonCfg.bWirelessEvent)
RTMPSendWirelessEvent(pAd, IW_DEAUTH_EVENT_FLAG, pAd->MacTab.Content[BSSID_WCID].Addr, BSS0, 0); RTMPSendWirelessEvent(pAd, IW_DEAUTH_EVENT_FLAG,
pAd->MacTab.
LinkDown(pAd, TRUE); Content[BSSID_WCID].Addr,
} BSS0, 0);
}
else LinkDown(pAd, TRUE);
{ }
DBGPRINT(RT_DEBUG_TRACE,("AUTH_RSP - PeerDeauthAction() sanity check fail\n")); } else {
} DBGPRINT(RT_DEBUG_TRACE,
("AUTH_RSP - PeerDeauthAction() sanity check fail\n"));
}
} }
This diff is collapsed.
This diff is collapsed.
This diff is collapsed.
This diff is collapsed.
This diff is collapsed.
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment