mirror of https://gitee.com/openkylin/linux.git
staging: vt6656: added spaces around '||'
Cleared checkpatch ERROR: spaces required around that '||' Signed-off-by: Andres More <more.andres@gmail.com> Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
This commit is contained in:
parent
a3d7fc5ce9
commit
bd2bc4c763
|
@ -377,9 +377,9 @@ RXbBulkInProcessData (
|
|||
return FALSE;
|
||||
}
|
||||
|
||||
if ((BytesToIndicate > 2372)||(BytesToIndicate <= 40)) {
|
||||
if ((BytesToIndicate > 2372) || (BytesToIndicate <= 40)) {
|
||||
// Frame Size error drop this packet.
|
||||
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"---------- WRONG Length 2 \n");
|
||||
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "---------- WRONG Length 2\n");
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
|
|
|
@ -1598,7 +1598,8 @@ int iwctl_siwauth(struct net_device *dev,
|
|||
pDevice->eEncryptionStatus = Ndis802_11Encryption3Enabled;
|
||||
}else if(pairwise == IW_AUTH_CIPHER_TKIP){
|
||||
pDevice->eEncryptionStatus = Ndis802_11Encryption2Enabled;
|
||||
}else if(pairwise == IW_AUTH_CIPHER_WEP40||pairwise == IW_AUTH_CIPHER_WEP104){
|
||||
} else if (pairwise == IW_AUTH_CIPHER_WEP40 ||
|
||||
pairwise == IW_AUTH_CIPHER_WEP104) {
|
||||
pDevice->eEncryptionStatus = Ndis802_11Encryption1Enabled;
|
||||
}else if(pairwise == IW_AUTH_CIPHER_NONE){
|
||||
//do nothing,einsn liu
|
||||
|
|
|
@ -841,8 +841,8 @@ s_uFillDataHead (
|
|||
}
|
||||
|
||||
if (byPktType == PK_TYPE_11GB || byPktType == PK_TYPE_11GA) {
|
||||
if((uDMAIdx==TYPE_ATIMDMA)||(uDMAIdx==TYPE_BEACONDMA)) {
|
||||
PSTxDataHead_ab pBuf = (PSTxDataHead_ab)pTxDataHead;
|
||||
if ((uDMAIdx == TYPE_ATIMDMA) || (uDMAIdx == TYPE_BEACONDMA)) {
|
||||
PSTxDataHead_ab pBuf = (PSTxDataHead_ab) pTxDataHead;
|
||||
//Get SignalField,ServiceField,Length
|
||||
BBvCaculateParameter(pDevice, cbFrameLength, wCurrentRate, byPktType,
|
||||
(PWORD)&(pBuf->wTransmitLength), (PBYTE)&(pBuf->byServiceField), (PBYTE)&(pBuf->bySignalField)
|
||||
|
|
|
@ -2638,8 +2638,9 @@ void vMgrJoinBSSBegin(void *hDeviceContext, PCMD_STATUS pStatus)
|
|||
|
||||
if (WLAN_GET_CAP_INFO_ESS(cpu_to_le16(pCurr->wCapInfo))){
|
||||
|
||||
if ((pMgmt->eAuthenMode == WMAC_AUTH_WPA)||(pMgmt->eAuthenMode == WMAC_AUTH_WPAPSK)) {
|
||||
/*
|
||||
if ((pMgmt->eAuthenMode == WMAC_AUTH_WPA) ||
|
||||
(pMgmt->eAuthenMode == WMAC_AUTH_WPAPSK)) {
|
||||
/*
|
||||
if (pDevice->eEncryptionStatus == Ndis802_11Encryption2Enabled) {
|
||||
if (WPA_SearchRSN(0, WPA_TKIP, pCurr) == FALSE) {
|
||||
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"No match RSN info. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++\n");
|
||||
|
@ -4768,7 +4769,8 @@ s_bCipherMatch (
|
|||
if ((WLAN_GET_CAP_INFO_PRIVACY(pBSSNode->wCapInfo) != 0) &&
|
||||
(pBSSNode->bWPA2Valid == TRUE) &&
|
||||
//20080123-01,<Add> by Einsn Liu
|
||||
((EncStatus == Ndis802_11Encryption3Enabled)||(EncStatus == Ndis802_11Encryption2Enabled))) {
|
||||
((EncStatus == Ndis802_11Encryption3Enabled) ||
|
||||
(EncStatus == Ndis802_11Encryption2Enabled))) {
|
||||
//WPA2
|
||||
// check Group Key Cipher
|
||||
if ((pBSSNode->byCSSGK == WLAN_11i_CSS_WEP40) ||
|
||||
|
|
Loading…
Reference in New Issue