aboutsummaryrefslogtreecommitdiffstats
path: root/drivers/net/wireless/ath/key.c
diff options
context:
space:
mode:
Diffstat (limited to 'drivers/net/wireless/ath/key.c')
-rw-r--r--drivers/net/wireless/ath/key.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/drivers/net/wireless/ath/key.c b/drivers/net/wireless/ath/key.c
index 4cf7c5eb481..0e81904956c 100644
--- a/drivers/net/wireless/ath/key.c
+++ b/drivers/net/wireless/ath/key.c
@@ -143,7 +143,7 @@ static bool ath_hw_set_keycache_entry(struct ath_common *common, u16 entry,
143 break; 143 break;
144 case ATH_CIPHER_AES_CCM: 144 case ATH_CIPHER_AES_CCM:
145 if (!(common->crypt_caps & ATH_CRYPT_CAP_CIPHER_AESCCM)) { 145 if (!(common->crypt_caps & ATH_CRYPT_CAP_CIPHER_AESCCM)) {
146 ath_dbg(common, ATH_DBG_ANY, 146 ath_dbg(common, ANY,
147 "AES-CCM not supported by this mac rev\n"); 147 "AES-CCM not supported by this mac rev\n");
148 return false; 148 return false;
149 } 149 }
@@ -152,15 +152,15 @@ static bool ath_hw_set_keycache_entry(struct ath_common *common, u16 entry,
152 case ATH_CIPHER_TKIP: 152 case ATH_CIPHER_TKIP:
153 keyType = AR_KEYTABLE_TYPE_TKIP; 153 keyType = AR_KEYTABLE_TYPE_TKIP;
154 if (entry + 64 >= common->keymax) { 154 if (entry + 64 >= common->keymax) {
155 ath_dbg(common, ATH_DBG_ANY, 155 ath_dbg(common, ANY,
156 "entry %u inappropriate for TKIP\n", entry); 156 "entry %u inappropriate for TKIP\n", entry);
157 return false; 157 return false;
158 } 158 }
159 break; 159 break;
160 case ATH_CIPHER_WEP: 160 case ATH_CIPHER_WEP:
161 if (k->kv_len < WLAN_KEY_LEN_WEP40) { 161 if (k->kv_len < WLAN_KEY_LEN_WEP40) {
162 ath_dbg(common, ATH_DBG_ANY, 162 ath_dbg(common, ANY, "WEP key length %u too small\n",
163 "WEP key length %u too small\n", k->kv_len); 163 k->kv_len);
164 return false; 164 return false;
165 } 165 }
166 if (k->kv_len <= WLAN_KEY_LEN_WEP40) 166 if (k->kv_len <= WLAN_KEY_LEN_WEP40)