Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit 0f65bec1 authored by Bartlomiej Zolnierkiewicz's avatar Bartlomiej Zolnierkiewicz Committed by Greg Kroah-Hartman
Browse files

Staging: rt28x0: run sta/*.c files through Lindent

parent 96b3c83d
Loading
Loading
Loading
Loading
+839 −740

File changed.

Preview size limit exceeded, changes collapsed.

+324 −297

File changed.

Preview size limit exceeded, changes collapsed.

+59 −65
Original line number Original line Diff line number Diff line
@@ -47,18 +47,21 @@


    ==========================================================================
    ==========================================================================
 */
 */
VOID AuthRspStateMachineInit(
VOID AuthRspStateMachineInit(IN PRTMP_ADAPTER pAd,
    IN PRTMP_ADAPTER pAd,
			     IN PSTATE_MACHINE Sm,
			     IN PSTATE_MACHINE Sm,
			     IN STATE_MACHINE_FUNC Trans[])
			     IN STATE_MACHINE_FUNC Trans[])
{
{
    StateMachineInit(Sm, Trans, MAX_AUTH_RSP_STATE, MAX_AUTH_RSP_MSG, (STATE_MACHINE_FUNC)Drop, AUTH_RSP_IDLE, AUTH_RSP_MACHINE_BASE);
	StateMachineInit(Sm, Trans, MAX_AUTH_RSP_STATE, MAX_AUTH_RSP_MSG,
			 (STATE_MACHINE_FUNC) Drop, AUTH_RSP_IDLE,
			 AUTH_RSP_MACHINE_BASE);


	// column 1
	// column 1
    StateMachineSetAction(Sm, AUTH_RSP_IDLE, MT2_PEER_DEAUTH, (STATE_MACHINE_FUNC)PeerDeauthAction);
	StateMachineSetAction(Sm, AUTH_RSP_IDLE, MT2_PEER_DEAUTH,
			      (STATE_MACHINE_FUNC) PeerDeauthAction);


	// column 2
	// column 2
    StateMachineSetAction(Sm, AUTH_RSP_WAIT_CHAL, MT2_PEER_DEAUTH, (STATE_MACHINE_FUNC)PeerDeauthAction);
	StateMachineSetAction(Sm, AUTH_RSP_WAIT_CHAL, MT2_PEER_DEAUTH,
			      (STATE_MACHINE_FUNC) PeerDeauthAction);


}
}


@@ -70,38 +73,31 @@ VOID AuthRspStateMachineInit(


    ==========================================================================
    ==========================================================================
*/
*/
VOID PeerAuthSimpleRspGenAndSend(
VOID PeerAuthSimpleRspGenAndSend(IN PRTMP_ADAPTER pAd,
    IN PRTMP_ADAPTER pAd,
				 IN PHEADER_802_11 pHdr80211,
				 IN PHEADER_802_11 pHdr80211,
				 IN USHORT Alg,
				 IN USHORT Alg,
				 IN USHORT Seq,
				 IN USHORT Seq,
    IN USHORT Reason,
				 IN USHORT Reason, IN USHORT Status)
    IN USHORT Status)
{
{
	HEADER_802_11 AuthHdr;
	HEADER_802_11 AuthHdr;
	ULONG FrameLen = 0;
	ULONG FrameLen = 0;
	PUCHAR pOutBuffer = NULL;
	PUCHAR pOutBuffer = NULL;
	NDIS_STATUS NStatus;
	NDIS_STATUS NStatus;


    if (Reason != MLME_SUCCESS)
	if (Reason != MLME_SUCCESS) {
    {
		DBGPRINT(RT_DEBUG_TRACE, ("Peer AUTH fail...\n"));
		DBGPRINT(RT_DEBUG_TRACE, ("Peer AUTH fail...\n"));
		return;
		return;
	}
	}

	//Get an unused nonpaged memory
	//Get an unused nonpaged memory
	NStatus = MlmeAllocateMemory(pAd, &pOutBuffer);
	NStatus = MlmeAllocateMemory(pAd, &pOutBuffer);
	if (NStatus != NDIS_STATUS_SUCCESS)
	if (NStatus != NDIS_STATUS_SUCCESS)
		return;
		return;


	DBGPRINT(RT_DEBUG_TRACE, ("Send AUTH response (seq#2)...\n"));
	DBGPRINT(RT_DEBUG_TRACE, ("Send AUTH response (seq#2)...\n"));
    MgtMacHeaderInit(pAd, &AuthHdr, SUBTYPE_AUTH, 0, pHdr80211->Addr2, pAd->MlmeAux.Bssid);
	MgtMacHeaderInit(pAd, &AuthHdr, SUBTYPE_AUTH, 0, pHdr80211->Addr2,
    MakeOutgoingFrame(pOutBuffer,               &FrameLen,
			 pAd->MlmeAux.Bssid);
                      sizeof(HEADER_802_11),    &AuthHdr,
	MakeOutgoingFrame(pOutBuffer, &FrameLen, sizeof(HEADER_802_11),
                      2,                        &Alg,
			  &AuthHdr, 2, &Alg, 2, &Seq, 2, &Reason, END_OF_ARGS);
                      2,                        &Seq,
                      2,                        &Reason,
                      END_OF_ARGS);
	MiniportMMRequest(pAd, 0, pOutBuffer, FrameLen);
	MiniportMMRequest(pAd, 0, pOutBuffer, FrameLen);
	MlmeFreeMemory(pAd, pOutBuffer);
	MlmeFreeMemory(pAd, pOutBuffer);
}
}
@@ -114,35 +110,33 @@ VOID PeerAuthSimpleRspGenAndSend(


    ==========================================================================
    ==========================================================================
*/
*/
VOID PeerDeauthAction(
VOID PeerDeauthAction(IN PRTMP_ADAPTER pAd, IN PMLME_QUEUE_ELEM Elem)
    IN PRTMP_ADAPTER pAd,
    IN PMLME_QUEUE_ELEM Elem)
{
{
	UCHAR Addr2[MAC_ADDR_LEN];
	UCHAR Addr2[MAC_ADDR_LEN];
	USHORT Reason;
	USHORT Reason;


    if (PeerDeauthSanity(pAd, Elem->Msg, Elem->MsgLen, Addr2, &Reason))
	if (PeerDeauthSanity(pAd, Elem->Msg, Elem->MsgLen, Addr2, &Reason)) {
    {
		if (INFRA_ON(pAd)
		if (INFRA_ON(pAd)
		    && MAC_ADDR_EQUAL(Addr2, pAd->CommonCfg.Bssid)
		    && MAC_ADDR_EQUAL(Addr2, pAd->CommonCfg.Bssid)
			)
		    ) {
        {
			DBGPRINT(RT_DEBUG_TRACE,
            DBGPRINT(RT_DEBUG_TRACE,("AUTH_RSP - receive DE-AUTH from our AP (Reason=%d)\n", Reason));
				 ("AUTH_RSP - receive DE-AUTH from our AP (Reason=%d)\n",

				  Reason));

		RtmpOSWrielessEventSend(pAd, SIOCGIWAP, -1, NULL, NULL, 0);


			RtmpOSWrielessEventSend(pAd, SIOCGIWAP, -1, NULL, NULL,
						0);


			// send wireless event - for deauthentication
			// send wireless event - for deauthentication
			if (pAd->CommonCfg.bWirelessEvent)
			if (pAd->CommonCfg.bWirelessEvent)
				RTMPSendWirelessEvent(pAd, IW_DEAUTH_EVENT_FLAG, pAd->MacTab.Content[BSSID_WCID].Addr, BSS0, 0);
				RTMPSendWirelessEvent(pAd, IW_DEAUTH_EVENT_FLAG,
						      pAd->MacTab.
						      Content[BSSID_WCID].Addr,
						      BSS0, 0);


			LinkDown(pAd, TRUE);
			LinkDown(pAd, TRUE);
		}
		}
    }
	} else {
    else
		DBGPRINT(RT_DEBUG_TRACE,
    {
			 ("AUTH_RSP - PeerDeauthAction() sanity check fail\n"));
        DBGPRINT(RT_DEBUG_TRACE,("AUTH_RSP - PeerDeauthAction() sanity check fail\n"));
	}
	}
}
}
+1219 −1129

File changed.

Preview size limit exceeded, changes collapsed.

+1097 −1099

File changed.

Preview size limit exceeded, changes collapsed.

Loading