aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorM. Vefa Bicakci <m.v.b@runbox.com>2015-03-28 21:07:57 -0400
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2015-04-03 09:25:46 -0400
commit58b39a90977c3ac067895c87c3940132f6adc1c4 (patch)
tree6634a29651513cf6c577139d8d6fce3fbf96664c
parent87a432944f13b408167208dc509a8af62c66312c (diff)
staging: rtl8723au: Use __func__ in trace logs
Rework the trace log-related lines in rtl8723au's rtw_security.c to use the __func__ GCC magic variable instead of hardcoding the function names into the trace log strings. This also corrects a copy-paste-related typo in the function named rtw_tkip_decrypt23a. Thanks to Jes Sorensen for the suggestion to use __func__. Signed-off-by: M. Vefa Bicakci <m.v.b@runbox.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-rw-r--r--drivers/staging/rtl8723au/core/rtw_security.c41
1 files changed, 22 insertions, 19 deletions
diff --git a/drivers/staging/rtl8723au/core/rtw_security.c b/drivers/staging/rtl8723au/core/rtw_security.c
index 0ed048fcb36f..5ef16bb30dc4 100644
--- a/drivers/staging/rtl8723au/core/rtw_security.c
+++ b/drivers/staging/rtl8723au/core/rtw_security.c
@@ -248,9 +248,9 @@ void rtw_wep_decrypt23a(struct rtw_adapter *padapter,
248 248
249 if (actual_crc != expected_crc) { 249 if (actual_crc != expected_crc) {
250 RT_TRACE(_module_rtl871x_security_c_, _drv_err_, 250 RT_TRACE(_module_rtl871x_security_c_, _drv_err_,
251 "rtw_wep_decrypt23a:icv CRC mismatch: " 251 "%s:icv CRC mismatch: "
252 "actual: %08x, expected: %08x\n", 252 "actual: %08x, expected: %08x\n",
253 actual_crc, expected_crc); 253 __func__, actual_crc, expected_crc);
254 } 254 }
255} 255}
256 256
@@ -635,13 +635,13 @@ int rtw_tkip_encrypt23a(struct rtw_adapter *padapter,
635 635
636 if (stainfo == NULL) { 636 if (stainfo == NULL) {
637 RT_TRACE(_module_rtl871x_security_c_, _drv_err_, 637 RT_TRACE(_module_rtl871x_security_c_, _drv_err_,
638 "rtw_tkip_encrypt23a: stainfo == NULL!!!\n"); 638 "%s: stainfo == NULL!!!\n", __func__);
639 DBG_8723A("%s, psta == NUL\n", __func__); 639 DBG_8723A("%s, psta == NUL\n", __func__);
640 return _FAIL; 640 return _FAIL;
641 } 641 }
642 642
643 RT_TRACE(_module_rtl871x_security_c_, _drv_err_, 643 RT_TRACE(_module_rtl871x_security_c_, _drv_err_,
644 "rtw_tkip_encrypt23a: stainfo!= NULL!!!\n"); 644 "%s: stainfo!= NULL!!!\n", __func__);
645 645
646 if (!(stainfo->state & _FW_LINKED)) { 646 if (!(stainfo->state & _FW_LINKED)) {
647 DBG_8723A("%s, psta->state(0x%x) != _FW_LINKED\n", __func__, stainfo->state); 647 DBG_8723A("%s, psta->state(0x%x) != _FW_LINKED\n", __func__, stainfo->state);
@@ -733,7 +733,7 @@ int rtw_tkip_decrypt23a(struct rtw_adapter *padapter,
733 &prxattrib->ta[0]); 733 &prxattrib->ta[0]);
734 if (stainfo == NULL) { 734 if (stainfo == NULL) {
735 RT_TRACE(_module_rtl871x_security_c_, _drv_err_, 735 RT_TRACE(_module_rtl871x_security_c_, _drv_err_,
736 "rtw_tkip_decrypt23a: stainfo == NULL!!!\n"); 736 "%s: stainfo == NULL!!!\n", __func__);
737 return _FAIL; 737 return _FAIL;
738 } 738 }
739 739
@@ -748,7 +748,7 @@ int rtw_tkip_decrypt23a(struct rtw_adapter *padapter,
748 prwskeylen = 16; 748 prwskeylen = 16;
749 } else { 749 } else {
750 RT_TRACE(_module_rtl871x_security_c_, _drv_err_, 750 RT_TRACE(_module_rtl871x_security_c_, _drv_err_,
751 "rtw_tkip_decrypt23a: stainfo!= NULL!!!\n"); 751 "%s: stainfo!= NULL!!!\n", __func__);
752 prwskey = &stainfo->dot118021x_UncstKey.skey[0]; 752 prwskey = &stainfo->dot118021x_UncstKey.skey[0];
753 prwskeylen = 16; 753 prwskeylen = 16;
754 } 754 }
@@ -774,9 +774,9 @@ int rtw_tkip_decrypt23a(struct rtw_adapter *padapter,
774 774
775 if (actual_crc != expected_crc) { 775 if (actual_crc != expected_crc) {
776 RT_TRACE(_module_rtl871x_security_c_, _drv_err_, 776 RT_TRACE(_module_rtl871x_security_c_, _drv_err_,
777 "rtw_wep_decrypt23a:icv CRC mismatch: " 777 "%s:icv CRC mismatch: "
778 "actual: %08x, expected: %08x\n", 778 "actual: %08x, expected: %08x\n",
779 actual_crc, expected_crc); 779 __func__, actual_crc, expected_crc);
780 res = _FAIL; 780 res = _FAIL;
781 } 781 }
782 782
@@ -1313,7 +1313,7 @@ int rtw_aes_encrypt23a(struct rtw_adapter *padapter,
1313 1313
1314 if (!stainfo) { 1314 if (!stainfo) {
1315 RT_TRACE(_module_rtl871x_security_c_, _drv_err_, 1315 RT_TRACE(_module_rtl871x_security_c_, _drv_err_,
1316 "rtw_aes_encrypt23a: stainfo == NULL!!!\n"); 1316 "%s: stainfo == NULL!!!\n", __func__);
1317 DBG_8723A("%s, psta == NUL\n", __func__); 1317 DBG_8723A("%s, psta == NUL\n", __func__);
1318 res = _FAIL; 1318 res = _FAIL;
1319 goto out; 1319 goto out;
@@ -1324,7 +1324,7 @@ int rtw_aes_encrypt23a(struct rtw_adapter *padapter,
1324 return _FAIL; 1324 return _FAIL;
1325 } 1325 }
1326 RT_TRACE(_module_rtl871x_security_c_, _drv_err_, 1326 RT_TRACE(_module_rtl871x_security_c_, _drv_err_,
1327 "rtw_aes_encrypt23a: stainfo!= NULL!!!\n"); 1327 "%s: stainfo!= NULL!!!\n", __func__);
1328 1328
1329 if (is_multicast_ether_addr(pattrib->ra)) 1329 if (is_multicast_ether_addr(pattrib->ra))
1330 prwskey = psecuritypriv->dot118021XGrpKey[psecuritypriv->dot118021XGrpKeyid].skey; 1330 prwskey = psecuritypriv->dot118021XGrpKey[psecuritypriv->dot118021XGrpKeyid].skey;
@@ -1552,11 +1552,14 @@ static int aes_decipher(u8 *key, uint hdrlen, u8 *pframe, uint plen)
1552 for (i = 0; i < 8; i++) { 1552 for (i = 0; i < 8; i++) {
1553 if (pframe[hdrlen + 8 + plen - 8 + i] != message[hdrlen + 8 + plen - 8 + i]) { 1553 if (pframe[hdrlen + 8 + plen - 8 + i] != message[hdrlen + 8 + plen - 8 + i]) {
1554 RT_TRACE(_module_rtl871x_security_c_, _drv_err_, 1554 RT_TRACE(_module_rtl871x_security_c_, _drv_err_,
1555 "aes_decipher:mic check error mic[%d]: pframe(%x) != message(%x)\n", 1555 "%s:mic check error mic[%d]: pframe(%x) != message(%x)\n",
1556 i, pframe[hdrlen + 8 + plen - 8 + i], 1556 __func__, i,
1557 pframe[hdrlen + 8 + plen - 8 + i],
1557 message[hdrlen + 8 + plen - 8 + i]); 1558 message[hdrlen + 8 + plen - 8 + i]);
1558 DBG_8723A("aes_decipher:mic check error mic[%d]: pframe(%x) != message(%x)\n", 1559 DBG_8723A("%s:mic check error mic[%d]: pframe(%x) != message(%x)\n",
1559 i, pframe[hdrlen + 8 + plen - 8 + i], message[hdrlen + 8 + plen - 8 + i]); 1560 __func__, i,
1561 pframe[hdrlen + 8 + plen - 8 + i],
1562 message[hdrlen + 8 + plen - 8 + i]);
1560 res = _FAIL; 1563 res = _FAIL;
1561 } 1564 }
1562 } 1565 }
@@ -1582,13 +1585,13 @@ int rtw_aes_decrypt23a(struct rtw_adapter *padapter,
1582 stainfo = rtw_get_stainfo23a(&padapter->stapriv, &prxattrib->ta[0]); 1585 stainfo = rtw_get_stainfo23a(&padapter->stapriv, &prxattrib->ta[0]);
1583 if (!stainfo) { 1586 if (!stainfo) {
1584 RT_TRACE(_module_rtl871x_security_c_, _drv_err_, 1587 RT_TRACE(_module_rtl871x_security_c_, _drv_err_,
1585 "rtw_aes_encrypt23a: stainfo == NULL!!!\n"); 1588 "%s: stainfo == NULL!!!\n", __func__);
1586 res = _FAIL; 1589 res = _FAIL;
1587 goto exit; 1590 goto exit;
1588 } 1591 }
1589 1592
1590 RT_TRACE(_module_rtl871x_security_c_, _drv_err_, 1593 RT_TRACE(_module_rtl871x_security_c_, _drv_err_,
1591 "rtw_aes_decrypt23a: stainfo!= NULL!!!\n"); 1594 "%s: stainfo!= NULL!!!\n", __func__);
1592 1595
1593 if (is_multicast_ether_addr(prxattrib->ra)) { 1596 if (is_multicast_ether_addr(prxattrib->ra)) {
1594 /* in concurrent we should use sw decrypt in 1597 /* in concurrent we should use sw decrypt in
@@ -1624,9 +1627,9 @@ void rtw_use_tkipkey_handler23a(void *FunctionContext)
1624 struct rtw_adapter *padapter = (struct rtw_adapter *)FunctionContext; 1627 struct rtw_adapter *padapter = (struct rtw_adapter *)FunctionContext;
1625 1628
1626 RT_TRACE(_module_rtl871x_security_c_, _drv_err_, 1629 RT_TRACE(_module_rtl871x_security_c_, _drv_err_,
1627 "^^^rtw_use_tkipkey_handler23a ^^^\n"); 1630 "^^^%s ^^^\n", __func__);
1628 padapter->securitypriv.busetkipkey = 1; 1631 padapter->securitypriv.busetkipkey = 1;
1629 RT_TRACE(_module_rtl871x_security_c_, _drv_err_, 1632 RT_TRACE(_module_rtl871x_security_c_, _drv_err_,
1630 "^^^rtw_use_tkipkey_handler23a padapter->securitypriv.busetkipkey =%d^^^\n", 1633 "^^^%s padapter->securitypriv.busetkipkey =%d^^^\n",
1631 padapter->securitypriv.busetkipkey); 1634 __func__, padapter->securitypriv.busetkipkey);
1632} 1635}