Commit 64ddba52 authored by Pranjal Bhor's avatar Pranjal Bhor Committed by Greg Kroah-Hartman

staging: wlan-ng: Open parenthesis alignment style fix

Alignment of lines matched with open parenthesis
Signed-off-by: default avatarPranjal Bhor <bhor.pranjal@gmail.com>
Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
parent 40defde4
...@@ -215,8 +215,8 @@ int skb_ether_to_p80211(wlandevice_t *wlandev, u32 ethconv, ...@@ -215,8 +215,8 @@ int skb_ether_to_p80211(wlandevice_t *wlandev, u32 ethconv,
p80211_wep->iv, p80211_wep->icv); p80211_wep->iv, p80211_wep->icv);
if (foo) { if (foo) {
netdev_warn(wlandev->netdev, netdev_warn(wlandev->netdev,
"Host en-WEP failed, dropping frame (%d).\n", "Host en-WEP failed, dropping frame (%d).\n",
foo); foo);
return 2; return 2;
} }
fc |= cpu_to_le16(WLAN_SET_FC_ISWEP(1)); fc |= cpu_to_le16(WLAN_SET_FC_ISWEP(1));
...@@ -330,10 +330,10 @@ int skb_p80211_to_ether(wlandevice_t *wlandev, u32 ethconv, ...@@ -330,10 +330,10 @@ int skb_p80211_to_ether(wlandevice_t *wlandev, u32 ethconv,
return 1; return 1;
} }
foo = wep_decrypt(wlandev, skb->data + payload_offset + 4, foo = wep_decrypt(wlandev, skb->data + payload_offset + 4,
payload_length - 8, -1, payload_length - 8, -1,
skb->data + payload_offset, skb->data + payload_offset,
skb->data + payload_offset + skb->data + payload_offset +
payload_length - 4); payload_length - 4);
if (foo) { if (foo) {
/* de-wep failed, drop skb. */ /* de-wep failed, drop skb. */
pr_debug("Host de-WEP failed, dropping frame (%d).\n", pr_debug("Host de-WEP failed, dropping frame (%d).\n",
...@@ -371,7 +371,7 @@ int skb_p80211_to_ether(wlandevice_t *wlandev, u32 ethconv, ...@@ -371,7 +371,7 @@ int skb_p80211_to_ether(wlandevice_t *wlandev, u32 ethconv,
/* A bogus length ethfrm has been encap'd. */ /* A bogus length ethfrm has been encap'd. */
/* Is someone trying an oflow attack? */ /* Is someone trying an oflow attack? */
netdev_err(netdev, "ENCAP frame too large (%d > %d)\n", netdev_err(netdev, "ENCAP frame too large (%d > %d)\n",
payload_length, netdev->mtu + ETH_HLEN); payload_length, netdev->mtu + ETH_HLEN);
return 1; return 1;
} }
...@@ -400,7 +400,7 @@ int skb_p80211_to_ether(wlandevice_t *wlandev, u32 ethconv, ...@@ -400,7 +400,7 @@ int skb_p80211_to_ether(wlandevice_t *wlandev, u32 ethconv,
/* A bogus length ethfrm has been sent. */ /* A bogus length ethfrm has been sent. */
/* Is someone trying an oflow attack? */ /* Is someone trying an oflow attack? */
netdev_err(netdev, "SNAP frame too large (%d > %d)\n", netdev_err(netdev, "SNAP frame too large (%d > %d)\n",
payload_length, netdev->mtu); payload_length, netdev->mtu);
return 1; return 1;
} }
...@@ -433,9 +433,9 @@ int skb_p80211_to_ether(wlandevice_t *wlandev, u32 ethconv, ...@@ -433,9 +433,9 @@ int skb_p80211_to_ether(wlandevice_t *wlandev, u32 ethconv,
/* A bogus length ethfrm has been sent. */ /* A bogus length ethfrm has been sent. */
/* Is someone trying an oflow attack? */ /* Is someone trying an oflow attack? */
netdev_err(netdev, "DIXII frame too large (%ld > %d)\n", netdev_err(netdev, "DIXII frame too large (%ld > %d)\n",
(long int)(payload_length - (long int)(payload_length -
sizeof(struct wlan_llc) - sizeof(struct wlan_llc) -
sizeof(struct wlan_snap)), netdev->mtu); sizeof(struct wlan_snap)), netdev->mtu);
return 1; return 1;
} }
...@@ -468,7 +468,7 @@ int skb_p80211_to_ether(wlandevice_t *wlandev, u32 ethconv, ...@@ -468,7 +468,7 @@ int skb_p80211_to_ether(wlandevice_t *wlandev, u32 ethconv,
/* A bogus length ethfrm has been sent. */ /* A bogus length ethfrm has been sent. */
/* Is someone trying an oflow attack? */ /* Is someone trying an oflow attack? */
netdev_err(netdev, "OTHER frame too large (%d > %d)\n", netdev_err(netdev, "OTHER frame too large (%d > %d)\n",
payload_length, netdev->mtu); payload_length, netdev->mtu);
return 1; return 1;
} }
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment