diff options
Diffstat (limited to 'net/wireless/lib80211_crypt_tkip.c')
-rw-r--r-- | net/wireless/lib80211_crypt_tkip.c | 16 |
1 files changed, 7 insertions, 9 deletions
diff --git a/net/wireless/lib80211_crypt_tkip.c b/net/wireless/lib80211_crypt_tkip.c index 0fe40510e2cb..7ea4f2b0770e 100644 --- a/net/wireless/lib80211_crypt_tkip.c +++ b/net/wireless/lib80211_crypt_tkip.c | |||
@@ -10,6 +10,8 @@ | |||
10 | * more details. | 10 | * more details. |
11 | */ | 11 | */ |
12 | 12 | ||
13 | #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt | ||
14 | |||
13 | #include <linux/err.h> | 15 | #include <linux/err.h> |
14 | #include <linux/module.h> | 16 | #include <linux/module.h> |
15 | #include <linux/init.h> | 17 | #include <linux/init.h> |
@@ -99,8 +101,7 @@ static void *lib80211_tkip_init(int key_idx) | |||
99 | priv->tx_tfm_arc4 = crypto_alloc_blkcipher("ecb(arc4)", 0, | 101 | priv->tx_tfm_arc4 = crypto_alloc_blkcipher("ecb(arc4)", 0, |
100 | CRYPTO_ALG_ASYNC); | 102 | CRYPTO_ALG_ASYNC); |
101 | if (IS_ERR(priv->tx_tfm_arc4)) { | 103 | if (IS_ERR(priv->tx_tfm_arc4)) { |
102 | printk(KERN_DEBUG "lib80211_crypt_tkip: could not allocate " | 104 | printk(KERN_DEBUG pr_fmt("could not allocate crypto API arc4\n")); |
103 | "crypto API arc4\n"); | ||
104 | priv->tx_tfm_arc4 = NULL; | 105 | priv->tx_tfm_arc4 = NULL; |
105 | goto fail; | 106 | goto fail; |
106 | } | 107 | } |
@@ -108,8 +109,7 @@ static void *lib80211_tkip_init(int key_idx) | |||
108 | priv->tx_tfm_michael = crypto_alloc_hash("michael_mic", 0, | 109 | priv->tx_tfm_michael = crypto_alloc_hash("michael_mic", 0, |
109 | CRYPTO_ALG_ASYNC); | 110 | CRYPTO_ALG_ASYNC); |
110 | if (IS_ERR(priv->tx_tfm_michael)) { | 111 | if (IS_ERR(priv->tx_tfm_michael)) { |
111 | printk(KERN_DEBUG "lib80211_crypt_tkip: could not allocate " | 112 | printk(KERN_DEBUG pr_fmt("could not allocate crypto API michael_mic\n")); |
112 | "crypto API michael_mic\n"); | ||
113 | priv->tx_tfm_michael = NULL; | 113 | priv->tx_tfm_michael = NULL; |
114 | goto fail; | 114 | goto fail; |
115 | } | 115 | } |
@@ -117,8 +117,7 @@ static void *lib80211_tkip_init(int key_idx) | |||
117 | priv->rx_tfm_arc4 = crypto_alloc_blkcipher("ecb(arc4)", 0, | 117 | priv->rx_tfm_arc4 = crypto_alloc_blkcipher("ecb(arc4)", 0, |
118 | CRYPTO_ALG_ASYNC); | 118 | CRYPTO_ALG_ASYNC); |
119 | if (IS_ERR(priv->rx_tfm_arc4)) { | 119 | if (IS_ERR(priv->rx_tfm_arc4)) { |
120 | printk(KERN_DEBUG "lib80211_crypt_tkip: could not allocate " | 120 | printk(KERN_DEBUG pr_fmt("could not allocate crypto API arc4\n")); |
121 | "crypto API arc4\n"); | ||
122 | priv->rx_tfm_arc4 = NULL; | 121 | priv->rx_tfm_arc4 = NULL; |
123 | goto fail; | 122 | goto fail; |
124 | } | 123 | } |
@@ -126,8 +125,7 @@ static void *lib80211_tkip_init(int key_idx) | |||
126 | priv->rx_tfm_michael = crypto_alloc_hash("michael_mic", 0, | 125 | priv->rx_tfm_michael = crypto_alloc_hash("michael_mic", 0, |
127 | CRYPTO_ALG_ASYNC); | 126 | CRYPTO_ALG_ASYNC); |
128 | if (IS_ERR(priv->rx_tfm_michael)) { | 127 | if (IS_ERR(priv->rx_tfm_michael)) { |
129 | printk(KERN_DEBUG "lib80211_crypt_tkip: could not allocate " | 128 | printk(KERN_DEBUG pr_fmt("could not allocate crypto API michael_mic\n")); |
130 | "crypto API michael_mic\n"); | ||
131 | priv->rx_tfm_michael = NULL; | 129 | priv->rx_tfm_michael = NULL; |
132 | goto fail; | 130 | goto fail; |
133 | } | 131 | } |
@@ -536,7 +534,7 @@ static int michael_mic(struct crypto_hash *tfm_michael, u8 * key, u8 * hdr, | |||
536 | struct scatterlist sg[2]; | 534 | struct scatterlist sg[2]; |
537 | 535 | ||
538 | if (tfm_michael == NULL) { | 536 | if (tfm_michael == NULL) { |
539 | printk(KERN_WARNING "michael_mic: tfm_michael == NULL\n"); | 537 | pr_warn("%s(): tfm_michael == NULL\n", __func__); |
540 | return -1; | 538 | return -1; |
541 | } | 539 | } |
542 | sg_init_table(sg, 2); | 540 | sg_init_table(sg, 2); |