Commit f9bd64952037d0f58eeffa07e30da1fff4c39b8f

Authored by Christos Tzoumakis
Committed by Greg Kroah-Hartman
1 parent 717f4a5f55

Staging: wlan-ng : fixing coding style issues in prism2sta.c

Signed-off-by: Christos Tzoumakis <ctzocy@gmail.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>

Showing 1 changed file with 37 additions and 34 deletions Side-by-side Diff

drivers/staging/wlan-ng/prism2sta.c
... ... @@ -426,7 +426,7 @@
426 426 * msgp ptr to msg buffer
427 427 *
428 428 * Returns:
429   -* A p80211 message resultcode value.
  429 +* A p80211 message resultcode value.
430 430 *
431 431 * Side effects:
432 432 *
... ... @@ -458,7 +458,7 @@
458 458 "hfa384x_drvr_start() failed,"
459 459 "result=%d\n", (int)result);
460 460 result =
461   - P80211ENUM_resultcode_implementation_failure;
  461 + P80211ENUM_resultcode_implementation_failure;
462 462 wlandev->msdstate = WLAN_MSD_HWPRESENT;
463 463 break;
464 464 }
... ... @@ -503,7 +503,7 @@
503 503 "hfa384x_drvr_start() failed,"
504 504 "result=%d\n", (int)result);
505 505 result =
506   - P80211ENUM_resultcode_implementation_failure;
  506 + P80211ENUM_resultcode_implementation_failure;
507 507 wlandev->msdstate = WLAN_MSD_HWPRESENT;
508 508 break;
509 509 }
... ... @@ -514,7 +514,7 @@
514 514 "prism2sta_getcardinfo() failed,"
515 515 "result=%d\n", (int)result);
516 516 result =
517   - P80211ENUM_resultcode_implementation_failure;
  517 + P80211ENUM_resultcode_implementation_failure;
518 518 hfa384x_drvr_stop(hw);
519 519 wlandev->msdstate = WLAN_MSD_HWPRESENT;
520 520 break;
... ... @@ -525,7 +525,7 @@
525 525 "prism2sta_globalsetup() failed,"
526 526 "result=%d\n", (int)result);
527 527 result =
528   - P80211ENUM_resultcode_implementation_failure;
  528 + P80211ENUM_resultcode_implementation_failure;
529 529 hfa384x_drvr_stop(hw);
530 530 wlandev->msdstate = WLAN_MSD_HWPRESENT;
531 531 break;
... ... @@ -1178,8 +1178,8 @@
1178 1178 chinforesult->active =
1179 1179 le16_to_cpu(inf->info.chinforesult.result[n].
1180 1180 active);
1181   - pr_debug
1182   - ("chinfo: channel %d, %s level (avg/peak)=%d/%d dB, pcf %d\n",
  1181 + pr_debug
  1182 + ("chinfo: channel %d, %s level (avg/peak)=%d/%d dB, pcf %d\n",
1183 1183 channel + 1,
1184 1184 chinforesult->
1185 1185 active & HFA384x_CHINFORESULT_BSSACTIVE ? "signal"
... ... @@ -1246,7 +1246,9 @@
1246 1246  
1247 1247 netif_carrier_on(wlandev->netdev);
1248 1248  
1249   - /* If we are joining a specific AP, set our state and reset retries */
  1249 + /* If we are joining a specific AP, set our
  1250 + * state and reset retries
  1251 + */
1250 1252 if (hw->join_ap == 1)
1251 1253 hw->join_ap = 2;
1252 1254 hw->join_retries = 60;
... ... @@ -1261,9 +1263,9 @@
1261 1263 /* Collect the BSSID, and set state to allow tx */
1262 1264  
1263 1265 result = hfa384x_drvr_getconfig(hw,
1264   - HFA384x_RID_CURRENTBSSID,
1265   - wlandev->bssid,
1266   - WLAN_BSSID_LEN);
  1266 + HFA384x_RID_CURRENTBSSID,
  1267 + wlandev->bssid,
  1268 + WLAN_BSSID_LEN);
1267 1269 if (result) {
1268 1270 pr_debug
1269 1271 ("getconfig(0x%02x) failed, result = %d\n",
... ... @@ -1286,8 +1288,8 @@
1286 1288  
1287 1289 /* Collect the port status */
1288 1290 result = hfa384x_drvr_getconfig16(hw,
1289   - HFA384x_RID_PORTSTATUS,
1290   - &portstatus);
  1291 + HFA384x_RID_PORTSTATUS,
  1292 + &portstatus);
1291 1293 if (result) {
1292 1294 pr_debug
1293 1295 ("getconfig(0x%02x) failed, result = %d\n",
... ... @@ -1322,7 +1324,7 @@
1322 1324 &joinreq,
1323 1325 HFA384x_RID_JOINREQUEST_LEN);
1324 1326 printk(KERN_INFO
1325   - "linkstatus=DISCONNECTED (re-submitting join)\n");
  1327 + "linkstatus=DISCONNECTED (re-submitting join)\n");
1326 1328 } else {
1327 1329 if (wlandev->netdev->type == ARPHRD_ETHER)
1328 1330 printk(KERN_INFO
... ... @@ -1509,14 +1511,15 @@
1509 1511 rec.reason = le16_to_cpu(rec.reason);
1510 1512  
1511 1513 /*
1512   - ** Find the address in the list of authenticated stations. If it wasn't
1513   - ** found, then this address has not been previously authenticated and
1514   - ** something weird has happened if this is anything other than an
1515   - ** "authentication failed" message. If the address was found, then
1516   - ** set the "associated" flag for that station, based on whether the
1517   - ** station is associating or losing its association. Something weird
1518   - ** has also happened if we find the address in the list of authenticated
1519   - ** stations but we are getting an "authentication failed" message.
  1514 + ** Find the address in the list of authenticated stations.
  1515 + ** If it wasn't found, then this address has not been previously
  1516 + ** authenticated and something weird has happened if this is
  1517 + ** anything other than an "authentication failed" message.
  1518 + ** If the address was found, then set the "associated" flag for
  1519 + ** that station, based on whether the station is associating or
  1520 + ** losing its association. Something weird has also happened
  1521 + ** if we find the address in the list of authenticated stations
  1522 + ** but we are getting an "authentication failed" message.
1520 1523 */
1521 1524  
1522 1525 for (i = 0; i < hw->authlist.cnt; i++)
... ... @@ -1526,7 +1529,7 @@
1526 1529 if (i >= hw->authlist.cnt) {
1527 1530 if (rec.assocstatus != HFA384x_ASSOCSTATUS_AUTHFAIL)
1528 1531 printk(KERN_WARNING
1529   - "assocstatus info frame received for non-authenticated station.\n");
  1532 + "assocstatus info frame received for non-authenticated station.\n");
1530 1533 } else {
1531 1534 hw->authlist.assoc[i] =
1532 1535 (rec.assocstatus == HFA384x_ASSOCSTATUS_STAASSOC ||
... ... @@ -1534,7 +1537,7 @@
1534 1537  
1535 1538 if (rec.assocstatus == HFA384x_ASSOCSTATUS_AUTHFAIL)
1536 1539 printk(KERN_WARNING
1537   - "authfail assocstatus info frame received for authenticated station.\n");
  1540 +"authfail assocstatus info frame received for authenticated station.\n");
1538 1541 }
1539 1542  
1540 1543 return;
... ... @@ -1681,12 +1684,12 @@
1681 1684 }
1682 1685  
1683 1686 /*
1684   - ** If the authentication is okay, then add the MAC address to the list
1685   - ** of authenticated stations. Don't add the address if it is already in
1686   - ** the list. (802.11b does not seem to disallow a station from issuing
1687   - ** an authentication request when the station is already authenticated.
1688   - ** Does this sort of thing ever happen? We might as well do the check
1689   - ** just in case.)
  1687 + ** If the authentication is okay, then add the MAC address to the
  1688 + ** list of authenticated stations. Don't add the address if it
  1689 + ** is already in the list. (802.11b does not seem to disallow
  1690 + ** a station from issuing an authentication request when the
  1691 + ** station is already authenticated. Does this sort of thing
  1692 + ** ever happen? We might as well do the check just in case.)
1690 1693 */
1691 1694  
1692 1695 added = 0;
... ... @@ -1931,7 +1934,7 @@
1931 1934 * the created wlandevice_t structure.
1932 1935 *
1933 1936 * Side effects:
1934   -* also allocates the priv/hw structures.
  1937 +* also allocates the priv/hw structures.
1935 1938 *
1936 1939 * Call context:
1937 1940 * process thread
... ... @@ -1995,9 +1998,9 @@
1995 1998  
1996 1999 /* It only makes sense to poll these in non-IBSS */
1997 2000 if (wlandev->macmode != WLAN_MACMODE_IBSS_STA) {
1998   - result = hfa384x_drvr_getconfig(hw, HFA384x_RID_DBMCOMMSQUALITY,
1999   - &hw->qual,
2000   - HFA384x_RID_DBMCOMMSQUALITY_LEN);
  2001 + result = hfa384x_drvr_getconfig(
  2002 + hw, HFA384x_RID_DBMCOMMSQUALITY,
  2003 + &hw->qual, HFA384x_RID_DBMCOMMSQUALITY_LEN);
2001 2004  
2002 2005 if (result) {
2003 2006 printk(KERN_ERR "error fetching commsqual\n");