diff options
| author | M. Vefa Bicakci <m.v.b@runbox.com> | 2015-03-28 21:07:57 -0400 |
|---|---|---|
| committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2015-04-03 09:25:46 -0400 |
| commit | 58b39a90977c3ac067895c87c3940132f6adc1c4 (patch) | |
| tree | 6634a29651513cf6c577139d8d6fce3fbf96664c | |
| parent | 87a432944f13b408167208dc509a8af62c66312c (diff) | |
staging: rtl8723au: Use __func__ in trace logs
Rework the trace log-related lines in rtl8723au's rtw_security.c
to use the __func__ GCC magic variable instead of hardcoding the
function names into the trace log strings. This also corrects a
copy-paste-related typo in the function named rtw_tkip_decrypt23a.
Thanks to Jes Sorensen for the suggestion to use __func__.
Signed-off-by: M. Vefa Bicakci <m.v.b@runbox.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
| -rw-r--r-- | drivers/staging/rtl8723au/core/rtw_security.c | 41 |
1 files changed, 22 insertions, 19 deletions
diff --git a/drivers/staging/rtl8723au/core/rtw_security.c b/drivers/staging/rtl8723au/core/rtw_security.c index 0ed048fcb36f..5ef16bb30dc4 100644 --- a/drivers/staging/rtl8723au/core/rtw_security.c +++ b/drivers/staging/rtl8723au/core/rtw_security.c | |||
| @@ -248,9 +248,9 @@ void rtw_wep_decrypt23a(struct rtw_adapter *padapter, | |||
| 248 | 248 | ||
| 249 | if (actual_crc != expected_crc) { | 249 | if (actual_crc != expected_crc) { |
| 250 | RT_TRACE(_module_rtl871x_security_c_, _drv_err_, | 250 | RT_TRACE(_module_rtl871x_security_c_, _drv_err_, |
| 251 | "rtw_wep_decrypt23a:icv CRC mismatch: " | 251 | "%s:icv CRC mismatch: " |
| 252 | "actual: %08x, expected: %08x\n", | 252 | "actual: %08x, expected: %08x\n", |
| 253 | actual_crc, expected_crc); | 253 | __func__, actual_crc, expected_crc); |
| 254 | } | 254 | } |
| 255 | } | 255 | } |
| 256 | 256 | ||
| @@ -635,13 +635,13 @@ int rtw_tkip_encrypt23a(struct rtw_adapter *padapter, | |||
| 635 | 635 | ||
| 636 | if (stainfo == NULL) { | 636 | if (stainfo == NULL) { |
| 637 | RT_TRACE(_module_rtl871x_security_c_, _drv_err_, | 637 | RT_TRACE(_module_rtl871x_security_c_, _drv_err_, |
| 638 | "rtw_tkip_encrypt23a: stainfo == NULL!!!\n"); | 638 | "%s: stainfo == NULL!!!\n", __func__); |
| 639 | DBG_8723A("%s, psta == NUL\n", __func__); | 639 | DBG_8723A("%s, psta == NUL\n", __func__); |
| 640 | return _FAIL; | 640 | return _FAIL; |
| 641 | } | 641 | } |
| 642 | 642 | ||
| 643 | RT_TRACE(_module_rtl871x_security_c_, _drv_err_, | 643 | RT_TRACE(_module_rtl871x_security_c_, _drv_err_, |
| 644 | "rtw_tkip_encrypt23a: stainfo!= NULL!!!\n"); | 644 | "%s: stainfo!= NULL!!!\n", __func__); |
| 645 | 645 | ||
| 646 | if (!(stainfo->state & _FW_LINKED)) { | 646 | if (!(stainfo->state & _FW_LINKED)) { |
| 647 | DBG_8723A("%s, psta->state(0x%x) != _FW_LINKED\n", __func__, stainfo->state); | 647 | DBG_8723A("%s, psta->state(0x%x) != _FW_LINKED\n", __func__, stainfo->state); |
| @@ -733,7 +733,7 @@ int rtw_tkip_decrypt23a(struct rtw_adapter *padapter, | |||
| 733 | &prxattrib->ta[0]); | 733 | &prxattrib->ta[0]); |
| 734 | if (stainfo == NULL) { | 734 | if (stainfo == NULL) { |
| 735 | RT_TRACE(_module_rtl871x_security_c_, _drv_err_, | 735 | RT_TRACE(_module_rtl871x_security_c_, _drv_err_, |
| 736 | "rtw_tkip_decrypt23a: stainfo == NULL!!!\n"); | 736 | "%s: stainfo == NULL!!!\n", __func__); |
| 737 | return _FAIL; | 737 | return _FAIL; |
| 738 | } | 738 | } |
| 739 | 739 | ||
| @@ -748,7 +748,7 @@ int rtw_tkip_decrypt23a(struct rtw_adapter *padapter, | |||
| 748 | prwskeylen = 16; | 748 | prwskeylen = 16; |
| 749 | } else { | 749 | } else { |
| 750 | RT_TRACE(_module_rtl871x_security_c_, _drv_err_, | 750 | RT_TRACE(_module_rtl871x_security_c_, _drv_err_, |
| 751 | "rtw_tkip_decrypt23a: stainfo!= NULL!!!\n"); | 751 | "%s: stainfo!= NULL!!!\n", __func__); |
| 752 | prwskey = &stainfo->dot118021x_UncstKey.skey[0]; | 752 | prwskey = &stainfo->dot118021x_UncstKey.skey[0]; |
| 753 | prwskeylen = 16; | 753 | prwskeylen = 16; |
| 754 | } | 754 | } |
| @@ -774,9 +774,9 @@ int rtw_tkip_decrypt23a(struct rtw_adapter *padapter, | |||
| 774 | 774 | ||
| 775 | if (actual_crc != expected_crc) { | 775 | if (actual_crc != expected_crc) { |
| 776 | RT_TRACE(_module_rtl871x_security_c_, _drv_err_, | 776 | RT_TRACE(_module_rtl871x_security_c_, _drv_err_, |
| 777 | "rtw_wep_decrypt23a:icv CRC mismatch: " | 777 | "%s:icv CRC mismatch: " |
| 778 | "actual: %08x, expected: %08x\n", | 778 | "actual: %08x, expected: %08x\n", |
| 779 | actual_crc, expected_crc); | 779 | __func__, actual_crc, expected_crc); |
| 780 | res = _FAIL; | 780 | res = _FAIL; |
| 781 | } | 781 | } |
| 782 | 782 | ||
| @@ -1313,7 +1313,7 @@ int rtw_aes_encrypt23a(struct rtw_adapter *padapter, | |||
| 1313 | 1313 | ||
| 1314 | if (!stainfo) { | 1314 | if (!stainfo) { |
| 1315 | RT_TRACE(_module_rtl871x_security_c_, _drv_err_, | 1315 | RT_TRACE(_module_rtl871x_security_c_, _drv_err_, |
| 1316 | "rtw_aes_encrypt23a: stainfo == NULL!!!\n"); | 1316 | "%s: stainfo == NULL!!!\n", __func__); |
| 1317 | DBG_8723A("%s, psta == NUL\n", __func__); | 1317 | DBG_8723A("%s, psta == NUL\n", __func__); |
| 1318 | res = _FAIL; | 1318 | res = _FAIL; |
| 1319 | goto out; | 1319 | goto out; |
| @@ -1324,7 +1324,7 @@ int rtw_aes_encrypt23a(struct rtw_adapter *padapter, | |||
| 1324 | return _FAIL; | 1324 | return _FAIL; |
| 1325 | } | 1325 | } |
| 1326 | RT_TRACE(_module_rtl871x_security_c_, _drv_err_, | 1326 | RT_TRACE(_module_rtl871x_security_c_, _drv_err_, |
| 1327 | "rtw_aes_encrypt23a: stainfo!= NULL!!!\n"); | 1327 | "%s: stainfo!= NULL!!!\n", __func__); |
| 1328 | 1328 | ||
| 1329 | if (is_multicast_ether_addr(pattrib->ra)) | 1329 | if (is_multicast_ether_addr(pattrib->ra)) |
| 1330 | prwskey = psecuritypriv->dot118021XGrpKey[psecuritypriv->dot118021XGrpKeyid].skey; | 1330 | prwskey = psecuritypriv->dot118021XGrpKey[psecuritypriv->dot118021XGrpKeyid].skey; |
| @@ -1552,11 +1552,14 @@ static int aes_decipher(u8 *key, uint hdrlen, u8 *pframe, uint plen) | |||
| 1552 | for (i = 0; i < 8; i++) { | 1552 | for (i = 0; i < 8; i++) { |
| 1553 | if (pframe[hdrlen + 8 + plen - 8 + i] != message[hdrlen + 8 + plen - 8 + i]) { | 1553 | if (pframe[hdrlen + 8 + plen - 8 + i] != message[hdrlen + 8 + plen - 8 + i]) { |
| 1554 | RT_TRACE(_module_rtl871x_security_c_, _drv_err_, | 1554 | RT_TRACE(_module_rtl871x_security_c_, _drv_err_, |
| 1555 | "aes_decipher:mic check error mic[%d]: pframe(%x) != message(%x)\n", | 1555 | "%s:mic check error mic[%d]: pframe(%x) != message(%x)\n", |
| 1556 | i, pframe[hdrlen + 8 + plen - 8 + i], | 1556 | __func__, i, |
| 1557 | pframe[hdrlen + 8 + plen - 8 + i], | ||
| 1557 | message[hdrlen + 8 + plen - 8 + i]); | 1558 | message[hdrlen + 8 + plen - 8 + i]); |
| 1558 | DBG_8723A("aes_decipher:mic check error mic[%d]: pframe(%x) != message(%x)\n", | 1559 | DBG_8723A("%s:mic check error mic[%d]: pframe(%x) != message(%x)\n", |
| 1559 | i, pframe[hdrlen + 8 + plen - 8 + i], message[hdrlen + 8 + plen - 8 + i]); | 1560 | __func__, i, |
| 1561 | pframe[hdrlen + 8 + plen - 8 + i], | ||
| 1562 | message[hdrlen + 8 + plen - 8 + i]); | ||
| 1560 | res = _FAIL; | 1563 | res = _FAIL; |
| 1561 | } | 1564 | } |
| 1562 | } | 1565 | } |
| @@ -1582,13 +1585,13 @@ int rtw_aes_decrypt23a(struct rtw_adapter *padapter, | |||
| 1582 | stainfo = rtw_get_stainfo23a(&padapter->stapriv, &prxattrib->ta[0]); | 1585 | stainfo = rtw_get_stainfo23a(&padapter->stapriv, &prxattrib->ta[0]); |
| 1583 | if (!stainfo) { | 1586 | if (!stainfo) { |
| 1584 | RT_TRACE(_module_rtl871x_security_c_, _drv_err_, | 1587 | RT_TRACE(_module_rtl871x_security_c_, _drv_err_, |
| 1585 | "rtw_aes_encrypt23a: stainfo == NULL!!!\n"); | 1588 | "%s: stainfo == NULL!!!\n", __func__); |
| 1586 | res = _FAIL; | 1589 | res = _FAIL; |
| 1587 | goto exit; | 1590 | goto exit; |
| 1588 | } | 1591 | } |
| 1589 | 1592 | ||
| 1590 | RT_TRACE(_module_rtl871x_security_c_, _drv_err_, | 1593 | RT_TRACE(_module_rtl871x_security_c_, _drv_err_, |
| 1591 | "rtw_aes_decrypt23a: stainfo!= NULL!!!\n"); | 1594 | "%s: stainfo!= NULL!!!\n", __func__); |
| 1592 | 1595 | ||
| 1593 | if (is_multicast_ether_addr(prxattrib->ra)) { | 1596 | if (is_multicast_ether_addr(prxattrib->ra)) { |
| 1594 | /* in concurrent we should use sw decrypt in | 1597 | /* in concurrent we should use sw decrypt in |
| @@ -1624,9 +1627,9 @@ void rtw_use_tkipkey_handler23a(void *FunctionContext) | |||
| 1624 | struct rtw_adapter *padapter = (struct rtw_adapter *)FunctionContext; | 1627 | struct rtw_adapter *padapter = (struct rtw_adapter *)FunctionContext; |
| 1625 | 1628 | ||
| 1626 | RT_TRACE(_module_rtl871x_security_c_, _drv_err_, | 1629 | RT_TRACE(_module_rtl871x_security_c_, _drv_err_, |
| 1627 | "^^^rtw_use_tkipkey_handler23a ^^^\n"); | 1630 | "^^^%s ^^^\n", __func__); |
| 1628 | padapter->securitypriv.busetkipkey = 1; | 1631 | padapter->securitypriv.busetkipkey = 1; |
| 1629 | RT_TRACE(_module_rtl871x_security_c_, _drv_err_, | 1632 | RT_TRACE(_module_rtl871x_security_c_, _drv_err_, |
| 1630 | "^^^rtw_use_tkipkey_handler23a padapter->securitypriv.busetkipkey =%d^^^\n", | 1633 | "^^^%s padapter->securitypriv.busetkipkey =%d^^^\n", |
| 1631 | padapter->securitypriv.busetkipkey); | 1634 | __func__, padapter->securitypriv.busetkipkey); |
| 1632 | } | 1635 | } |
