mirror of
https://github.com/lwfinger/rtl8188eu.git
synced 2025-06-23 08:34:20 +00:00
rtl8188eu: Make this code look exactly like the code in the kernel version
Signed-off-by: Larry Finger <Larry.Finger@lwfinger.net>
This commit is contained in:
parent
9ac6886fe0
commit
91938194fd
43 changed files with 182 additions and 845 deletions
|
@ -938,7 +938,7 @@ static int rtw_wx_set_pmkid(struct net_device *dev,
|
|||
memcpy(strIssueBssid, pPMK->bssid.sa_data, ETH_ALEN);
|
||||
if (pPMK->cmd == IW_PMKSA_ADD) {
|
||||
DBG_88E("[rtw_wx_set_pmkid] IW_PMKSA_ADD!\n");
|
||||
if (!memcmp(strIssueBssid, strZeroMacAddress, ETH_ALEN) == true)
|
||||
if (!memcmp(strIssueBssid, strZeroMacAddress, ETH_ALEN))
|
||||
return ret;
|
||||
else
|
||||
ret = true;
|
||||
|
@ -1039,7 +1039,7 @@ static int rtw_wx_get_range(struct net_device *dev,
|
|||
|
||||
range->avg_qual.qual = 92; /* > 8% missed beacons is 'bad' */
|
||||
/* TODO: Find real 'good' to 'bad' threshol value for RSSI */
|
||||
range->avg_qual.level = 20 + -98;
|
||||
range->avg_qual.level = 178; /* -78 dBm */
|
||||
range->avg_qual.noise = 0;
|
||||
range->avg_qual.updated = 7; /* Updated all three */
|
||||
|
||||
|
@ -1074,7 +1074,7 @@ static int rtw_wx_get_range(struct net_device *dev,
|
|||
|
||||
/* The following code will proivde the security capability to network manager. */
|
||||
/* If the driver doesn't provide this capability to network manager, */
|
||||
/* the WPA/WPA2 routers can't be choosen in the network manager. */
|
||||
/* the WPA/WPA2 routers can't be chosen in the network manager. */
|
||||
|
||||
/*
|
||||
#define IW_SCAN_CAPA_NONE 0x00
|
||||
|
@ -1373,7 +1373,7 @@ _func_enter_;
|
|||
}
|
||||
}
|
||||
|
||||
/* it has still some scan paramater to parse, we only do this now... */
|
||||
/* it has still some scan parameter to parse, we only do this now... */
|
||||
_status = rtw_set_802_11_bssid_list_scan(padapter, ssid, RTW_SSID_SCAN_AMOUNT);
|
||||
} else {
|
||||
_status = rtw_set_802_11_bssid_list_scan(padapter, NULL, 0);
|
||||
|
@ -2626,7 +2626,7 @@ static int rtw_get_ap_info(struct net_device *dev,
|
|||
return -EINVAL;
|
||||
}
|
||||
|
||||
if (!memcmp(bssid, pnetwork->network.MacAddress, ETH_ALEN) == true) {
|
||||
if (!memcmp(bssid, pnetwork->network.MacAddress, ETH_ALEN)) {
|
||||
/* BSSID match, then check if supporting wpa/wpa2 */
|
||||
DBG_88E("BSSID:%pM\n", (bssid));
|
||||
|
||||
|
@ -2961,7 +2961,7 @@ static int rtw_p2p_get_status(struct net_device *dev,
|
|||
|
||||
/* Commented by Albert 20110520 */
|
||||
/* This function will return the config method description */
|
||||
/* This config method description will show us which config method the remote P2P device is intented to use */
|
||||
/* This config method description will show us which config method the remote P2P device is intended to use */
|
||||
/* by sending the provisioning discovery request frame. */
|
||||
|
||||
static int rtw_p2p_get_req_cm(struct net_device *dev,
|
||||
|
@ -3413,7 +3413,7 @@ static int rtw_p2p_get_invitation_procedure(struct net_device *dev,
|
|||
/* +8 is for the str "InvProc =", we have to clear it at wrqu->data.pointer */
|
||||
|
||||
/* Commented by Ouden 20121226 */
|
||||
/* The application wants to know P2P initation procedure is support or not. */
|
||||
/* The application wants to know P2P initiation procedure is supported or not. */
|
||||
/* Format: iwpriv wlanx p2p_get2 InvProc = 00:E0:4C:00:00:05 */
|
||||
|
||||
DBG_88E("[%s] data = %s\n", __func__, (char *)extra);
|
||||
|
@ -4040,7 +4040,7 @@ static int rtw_rereg_nd_name(struct net_device *dev,
|
|||
if (0 != ret)
|
||||
goto exit;
|
||||
|
||||
if (!memcmp(rereg_priv->old_ifname, "disable%d", 9) == true) {
|
||||
if (!memcmp(rereg_priv->old_ifname, "disable%d", 9)) {
|
||||
padapter->ledpriv.bRegUseLed = rereg_priv->old_bRegUseLed;
|
||||
rtw_hal_sw_led_init(padapter);
|
||||
rtw_ips_mode_req(&padapter->pwrctrlpriv, rereg_priv->old_ips_mode);
|
||||
|
@ -4049,7 +4049,7 @@ static int rtw_rereg_nd_name(struct net_device *dev,
|
|||
strncpy(rereg_priv->old_ifname, new_ifname, IFNAMSIZ);
|
||||
rereg_priv->old_ifname[IFNAMSIZ-1] = 0;
|
||||
|
||||
if (!memcmp(new_ifname, "disable%d", 9) == true) {
|
||||
if (!memcmp(new_ifname, "disable%d", 9)) {
|
||||
DBG_88E("%s disable\n", __func__);
|
||||
/* free network queue for Android's timming issue */
|
||||
rtw_free_network_queue(padapter, true);
|
||||
|
@ -4884,7 +4884,6 @@ static int set_group_key(struct adapter *padapter, u8 *key, u8 alg, int keyid)
|
|||
case _TKIP_:
|
||||
case _TKIP_WTMIC_:
|
||||
case _AES_:
|
||||
keylen = 16;
|
||||
default:
|
||||
keylen = 16;
|
||||
}
|
||||
|
@ -6146,7 +6145,7 @@ static int rtw_mp_efuse_set(struct net_device *dev,
|
|||
|
||||
for (jj = 0, kk = 0; jj < cnts; jj++, kk += 2)
|
||||
setdata[jj] = key_2char2num(tmp[2][kk], tmp[2][kk + 1]);
|
||||
/* Change to check TYPE_EFUSE_MAP_LEN, beacuse 8188E raw 256, logic map over 256. */
|
||||
/* Change to check TYPE_EFUSE_MAP_LEN, because 8188E raw 256, logic map over 256. */
|
||||
EFUSE_GetEfuseDefinition(padapter, EFUSE_WIFI, TYPE_EFUSE_MAP_LEN, (void *)&max_available_size, false);
|
||||
if ((addr+cnts) > max_available_size) {
|
||||
DBG_88E("%s: addr(0x%X)+cnts(%d) parameter error!\n", __func__, addr, cnts);
|
||||
|
@ -6221,7 +6220,7 @@ static int rtw_mp_efuse_set(struct net_device *dev,
|
|||
|
||||
for (jj = 0, kk = 0; jj < cnts; jj++, kk += 2)
|
||||
setdata[jj] = key_2char2num(tmp[1][kk], tmp[1][kk + 1]);
|
||||
/* Change to check TYPE_EFUSE_MAP_LEN, beacuse 8188E raw 256, logic map over 256. */
|
||||
/* Change to check TYPE_EFUSE_MAP_LEN, because 8188E raw 256, logic map over 256. */
|
||||
EFUSE_GetEfuseDefinition(padapter, EFUSE_WIFI, TYPE_EFUSE_MAP_LEN, (void *)&max_available_size, false);
|
||||
if ((addr+cnts) > max_available_size) {
|
||||
DBG_88E("%s: addr(0x%X)+cnts(%d) parameter error!\n", __func__, addr, cnts);
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue