diff options
author | Larry Finger <Larry.Finger@lwfinger.net> | 2011-08-25 15:07:03 -0400 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@suse.de> | 2011-08-25 18:36:34 -0400 |
commit | ac50ddaaeeca4f649c53ce31175aa68d26420138 (patch) | |
tree | 0d3d6d5d854101a64a7e302d823351979ae5aff3 /drivers/staging/rtl8192e/rtllib_crypt_tkip.c | |
parent | 18d08aff878c827e8a7a0ea10da597a44ddfe7bc (diff) |
staging: rtl8192e: Remove MAC_FMT and MAC_ARG for %pM
Signed-off-by: Larry Finger <Larry.Finger@lwfinger.net>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
Diffstat (limited to 'drivers/staging/rtl8192e/rtllib_crypt_tkip.c')
-rw-r--r-- | drivers/staging/rtl8192e/rtllib_crypt_tkip.c | 21 |
1 files changed, 10 insertions, 11 deletions
diff --git a/drivers/staging/rtl8192e/rtllib_crypt_tkip.c b/drivers/staging/rtl8192e/rtllib_crypt_tkip.c index c4e490e57ad..6a0c8788642 100644 --- a/drivers/staging/rtl8192e/rtllib_crypt_tkip.c +++ b/drivers/staging/rtl8192e/rtllib_crypt_tkip.c | |||
@@ -400,7 +400,7 @@ static int rtllib_tkip_decrypt(struct sk_buff *skb, int hdr_len, void *priv) | |||
400 | if (!(keyidx & (1 << 5))) { | 400 | if (!(keyidx & (1 << 5))) { |
401 | if (net_ratelimit()) { | 401 | if (net_ratelimit()) { |
402 | printk(KERN_DEBUG "TKIP: received packet without ExtIV" | 402 | printk(KERN_DEBUG "TKIP: received packet without ExtIV" |
403 | " flag from " MAC_FMT "\n", MAC_ARG(hdr->addr2)); | 403 | " flag from %pM\n", hdr->addr2); |
404 | } | 404 | } |
405 | return -2; | 405 | return -2; |
406 | } | 406 | } |
@@ -412,9 +412,9 @@ static int rtllib_tkip_decrypt(struct sk_buff *skb, int hdr_len, void *priv) | |||
412 | } | 412 | } |
413 | if (!tkey->key_set) { | 413 | if (!tkey->key_set) { |
414 | if (net_ratelimit()) { | 414 | if (net_ratelimit()) { |
415 | printk(KERN_DEBUG "TKIP: received packet from " MAC_FMT | 415 | printk(KERN_DEBUG "TKIP: received packet from %pM" |
416 | " with keyid=%d that does not have a configured" | 416 | " with keyid=%d that does not have a configured" |
417 | " key\n", MAC_ARG(hdr->addr2), keyidx); | 417 | " key\n", hdr->addr2, keyidx); |
418 | } | 418 | } |
419 | return -3; | 419 | return -3; |
420 | } | 420 | } |
@@ -428,9 +428,8 @@ static int rtllib_tkip_decrypt(struct sk_buff *skb, int hdr_len, void *priv) | |||
428 | tkey->initialized) { | 428 | tkey->initialized) { |
429 | if (net_ratelimit()) { | 429 | if (net_ratelimit()) { |
430 | printk(KERN_DEBUG "TKIP: replay detected: STA=" | 430 | printk(KERN_DEBUG "TKIP: replay detected: STA=" |
431 | MAC_FMT | 431 | " %pM previous TSC %08x%04x received " |
432 | " previous TSC %08x%04x received TSC " | 432 | "TSC %08x%04x\n",hdr->addr2, |
433 | "%08x%04x\n", MAC_ARG(hdr->addr2), | ||
434 | tkey->rx_iv32, tkey->rx_iv16, iv32, iv16); | 433 | tkey->rx_iv32, tkey->rx_iv16, iv32, iv16); |
435 | } | 434 | } |
436 | tkey->dot11RSNAStatsTKIPReplays++; | 435 | tkey->dot11RSNAStatsTKIPReplays++; |
@@ -453,8 +452,8 @@ static int rtllib_tkip_decrypt(struct sk_buff *skb, int hdr_len, void *priv) | |||
453 | if (crypto_blkcipher_decrypt(&desc, &sg, &sg, plen + 4)) { | 452 | if (crypto_blkcipher_decrypt(&desc, &sg, &sg, plen + 4)) { |
454 | if (net_ratelimit()) { | 453 | if (net_ratelimit()) { |
455 | printk(KERN_DEBUG ": TKIP: failed to decrypt " | 454 | printk(KERN_DEBUG ": TKIP: failed to decrypt " |
456 | "received packet from " MAC_FMT "\n", | 455 | "received packet from %pM\n", |
457 | MAC_ARG(hdr->addr2)); | 456 | hdr->addr2); |
458 | } | 457 | } |
459 | return -7; | 458 | return -7; |
460 | } | 459 | } |
@@ -474,7 +473,7 @@ static int rtllib_tkip_decrypt(struct sk_buff *skb, int hdr_len, void *priv) | |||
474 | } | 473 | } |
475 | if (net_ratelimit()) { | 474 | if (net_ratelimit()) { |
476 | printk(KERN_DEBUG "TKIP: ICV error detected: STA=" | 475 | printk(KERN_DEBUG "TKIP: ICV error detected: STA=" |
477 | MAC_FMT "\n", MAC_ARG(hdr->addr2)); | 476 | " %pM\n", hdr->addr2); |
478 | } | 477 | } |
479 | tkey->dot11RSNAStatsTKIPICVErrors++; | 478 | tkey->dot11RSNAStatsTKIPICVErrors++; |
480 | return -5; | 479 | return -5; |
@@ -624,8 +623,8 @@ static int rtllib_michael_mic_verify(struct sk_buff *skb, int keyidx, | |||
624 | struct rtllib_hdr_4addr *hdr; | 623 | struct rtllib_hdr_4addr *hdr; |
625 | hdr = (struct rtllib_hdr_4addr *) skb->data; | 624 | hdr = (struct rtllib_hdr_4addr *) skb->data; |
626 | printk(KERN_DEBUG "%s: Michael MIC verification failed for " | 625 | printk(KERN_DEBUG "%s: Michael MIC verification failed for " |
627 | "MSDU from " MAC_FMT " keyidx=%d\n", | 626 | "MSDU from %pM keyidx=%d\n", |
628 | skb->dev ? skb->dev->name : "N/A", MAC_ARG(hdr->addr2), | 627 | skb->dev ? skb->dev->name : "N/A", hdr->addr2, |
629 | keyidx); | 628 | keyidx); |
630 | printk(KERN_DEBUG "%d, force_mic_error = %d\n", | 629 | printk(KERN_DEBUG "%d, force_mic_error = %d\n", |
631 | (memcmp(mic, skb->data + skb->len - 8, 8) != 0),\ | 630 | (memcmp(mic, skb->data + skb->len - 8, 8) != 0),\ |