aboutsummaryrefslogtreecommitdiffstats
path: root/drivers/staging/rtl8192e/rtllib_crypt_tkip.c
diff options
context:
space:
mode:
authorLarry Finger <Larry.Finger@lwfinger.net>2011-08-25 15:07:03 -0400
committerGreg Kroah-Hartman <gregkh@suse.de>2011-08-25 18:36:34 -0400
commitac50ddaaeeca4f649c53ce31175aa68d26420138 (patch)
tree0d3d6d5d854101a64a7e302d823351979ae5aff3 /drivers/staging/rtl8192e/rtllib_crypt_tkip.c
parent18d08aff878c827e8a7a0ea10da597a44ddfe7bc (diff)
staging: rtl8192e: Remove MAC_FMT and MAC_ARG for %pM
Signed-off-by: Larry Finger <Larry.Finger@lwfinger.net> Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
Diffstat (limited to 'drivers/staging/rtl8192e/rtllib_crypt_tkip.c')
-rw-r--r--drivers/staging/rtl8192e/rtllib_crypt_tkip.c21
1 files changed, 10 insertions, 11 deletions
diff --git a/drivers/staging/rtl8192e/rtllib_crypt_tkip.c b/drivers/staging/rtl8192e/rtllib_crypt_tkip.c
index c4e490e57ad..6a0c8788642 100644
--- a/drivers/staging/rtl8192e/rtllib_crypt_tkip.c
+++ b/drivers/staging/rtl8192e/rtllib_crypt_tkip.c
@@ -400,7 +400,7 @@ static int rtllib_tkip_decrypt(struct sk_buff *skb, int hdr_len, void *priv)
400 if (!(keyidx & (1 << 5))) { 400 if (!(keyidx & (1 << 5))) {
401 if (net_ratelimit()) { 401 if (net_ratelimit()) {
402 printk(KERN_DEBUG "TKIP: received packet without ExtIV" 402 printk(KERN_DEBUG "TKIP: received packet without ExtIV"
403 " flag from " MAC_FMT "\n", MAC_ARG(hdr->addr2)); 403 " flag from %pM\n", hdr->addr2);
404 } 404 }
405 return -2; 405 return -2;
406 } 406 }
@@ -412,9 +412,9 @@ static int rtllib_tkip_decrypt(struct sk_buff *skb, int hdr_len, void *priv)
412 } 412 }
413 if (!tkey->key_set) { 413 if (!tkey->key_set) {
414 if (net_ratelimit()) { 414 if (net_ratelimit()) {
415 printk(KERN_DEBUG "TKIP: received packet from " MAC_FMT 415 printk(KERN_DEBUG "TKIP: received packet from %pM"
416 " with keyid=%d that does not have a configured" 416 " with keyid=%d that does not have a configured"
417 " key\n", MAC_ARG(hdr->addr2), keyidx); 417 " key\n", hdr->addr2, keyidx);
418 } 418 }
419 return -3; 419 return -3;
420 } 420 }
@@ -428,9 +428,8 @@ static int rtllib_tkip_decrypt(struct sk_buff *skb, int hdr_len, void *priv)
428 tkey->initialized) { 428 tkey->initialized) {
429 if (net_ratelimit()) { 429 if (net_ratelimit()) {
430 printk(KERN_DEBUG "TKIP: replay detected: STA=" 430 printk(KERN_DEBUG "TKIP: replay detected: STA="
431 MAC_FMT 431 " %pM previous TSC %08x%04x received "
432 " previous TSC %08x%04x received TSC " 432 "TSC %08x%04x\n",hdr->addr2,
433 "%08x%04x\n", MAC_ARG(hdr->addr2),
434 tkey->rx_iv32, tkey->rx_iv16, iv32, iv16); 433 tkey->rx_iv32, tkey->rx_iv16, iv32, iv16);
435 } 434 }
436 tkey->dot11RSNAStatsTKIPReplays++; 435 tkey->dot11RSNAStatsTKIPReplays++;
@@ -453,8 +452,8 @@ static int rtllib_tkip_decrypt(struct sk_buff *skb, int hdr_len, void *priv)
453 if (crypto_blkcipher_decrypt(&desc, &sg, &sg, plen + 4)) { 452 if (crypto_blkcipher_decrypt(&desc, &sg, &sg, plen + 4)) {
454 if (net_ratelimit()) { 453 if (net_ratelimit()) {
455 printk(KERN_DEBUG ": TKIP: failed to decrypt " 454 printk(KERN_DEBUG ": TKIP: failed to decrypt "
456 "received packet from " MAC_FMT "\n", 455 "received packet from %pM\n",
457 MAC_ARG(hdr->addr2)); 456 hdr->addr2);
458 } 457 }
459 return -7; 458 return -7;
460 } 459 }
@@ -474,7 +473,7 @@ static int rtllib_tkip_decrypt(struct sk_buff *skb, int hdr_len, void *priv)
474 } 473 }
475 if (net_ratelimit()) { 474 if (net_ratelimit()) {
476 printk(KERN_DEBUG "TKIP: ICV error detected: STA=" 475 printk(KERN_DEBUG "TKIP: ICV error detected: STA="
477 MAC_FMT "\n", MAC_ARG(hdr->addr2)); 476 " %pM\n", hdr->addr2);
478 } 477 }
479 tkey->dot11RSNAStatsTKIPICVErrors++; 478 tkey->dot11RSNAStatsTKIPICVErrors++;
480 return -5; 479 return -5;
@@ -624,8 +623,8 @@ static int rtllib_michael_mic_verify(struct sk_buff *skb, int keyidx,
624 struct rtllib_hdr_4addr *hdr; 623 struct rtllib_hdr_4addr *hdr;
625 hdr = (struct rtllib_hdr_4addr *) skb->data; 624 hdr = (struct rtllib_hdr_4addr *) skb->data;
626 printk(KERN_DEBUG "%s: Michael MIC verification failed for " 625 printk(KERN_DEBUG "%s: Michael MIC verification failed for "
627 "MSDU from " MAC_FMT " keyidx=%d\n", 626 "MSDU from %pM keyidx=%d\n",
628 skb->dev ? skb->dev->name : "N/A", MAC_ARG(hdr->addr2), 627 skb->dev ? skb->dev->name : "N/A", hdr->addr2,
629 keyidx); 628 keyidx);
630 printk(KERN_DEBUG "%d, force_mic_error = %d\n", 629 printk(KERN_DEBUG "%d, force_mic_error = %d\n",
631 (memcmp(mic, skb->data + skb->len - 8, 8) != 0),\ 630 (memcmp(mic, skb->data + skb->len - 8, 8) != 0),\