|
@@ -5241,7 +5241,7 @@ static int32_t hdd_process_genie(struct hdd_adapter *adapter,
|
|
|
uint16_t gen_ie_len, uint8_t *gen_ie)
|
|
|
{
|
|
|
mac_handle_t mac_handle = hdd_adapter_get_mac_handle(adapter);
|
|
|
- tDot11fIERSN dot11RSNIE = {0};
|
|
|
+ tDot11fIERSN dot11_rsn_ie = {0};
|
|
|
tDot11fIEWPA dot11_wpa_ie = {0};
|
|
|
uint8_t *rsn_ie;
|
|
|
uint16_t rsn_ie_len;
|
|
@@ -5255,7 +5255,7 @@ static int32_t hdd_process_genie(struct hdd_adapter *adapter,
|
|
|
* setting present flag to 0.
|
|
|
*/
|
|
|
memset(&dot11_wpa_ie, 0, sizeof(tDot11fIEWPA));
|
|
|
- memset(&dot11RSNIE, 0, sizeof(tDot11fIERSN));
|
|
|
+ memset(&dot11_rsn_ie, 0, sizeof(tDot11fIERSN));
|
|
|
|
|
|
/* Type check */
|
|
|
if (gen_ie[0] == DOT11F_EID_RSN) {
|
|
@@ -5271,38 +5271,38 @@ static int32_t hdd_process_genie(struct hdd_adapter *adapter,
|
|
|
rsn_ie_len = gen_ie_len - 2;
|
|
|
/* Unpack the RSN IE */
|
|
|
parse_status = sme_unpack_rsn_ie(mac_handle, rsn_ie, rsn_ie_len,
|
|
|
- &dot11RSNIE, false);
|
|
|
+ &dot11_rsn_ie, false);
|
|
|
if (!DOT11F_SUCCEEDED(parse_status)) {
|
|
|
hdd_err("Invalid RSN IE: parse status %d",
|
|
|
parse_status);
|
|
|
return -EINVAL;
|
|
|
}
|
|
|
hdd_debug("gp_cipher_suite_present: %d",
|
|
|
- dot11RSNIE.gp_cipher_suite_present);
|
|
|
+ dot11_rsn_ie.gp_cipher_suite_present);
|
|
|
/* Copy out the encryption and authentication types */
|
|
|
hdd_debug("pairwise cipher suite count: %d",
|
|
|
- dot11RSNIE.pwise_cipher_suite_count);
|
|
|
+ dot11_rsn_ie.pwise_cipher_suite_count);
|
|
|
hdd_debug("authentication suite count: %d",
|
|
|
- dot11RSNIE.akm_suite_cnt);
|
|
|
- /* dot11RSNIE.akm_suite_cnt */
|
|
|
+ dot11_rsn_ie.akm_suite_cnt);
|
|
|
+ /* dot11_rsn_ie.akm_suite_cnt */
|
|
|
/* Just translate the FIRST one */
|
|
|
*pAuthType =
|
|
|
hdd_translate_rsn_to_csr_auth_type(
|
|
|
- dot11RSNIE.akm_suite[0]);
|
|
|
- /* dot11RSNIE.pwise_cipher_suite_count */
|
|
|
+ dot11_rsn_ie.akm_suite[0]);
|
|
|
+ /* dot11_rsn_ie.pwise_cipher_suite_count */
|
|
|
*pEncryptType =
|
|
|
hdd_translate_rsn_to_csr_encryption_type(
|
|
|
- dot11RSNIE.pwise_cipher_suites[0]);
|
|
|
- /* dot11RSNIE.gp_cipher_suite_count */
|
|
|
+ dot11_rsn_ie.pwise_cipher_suites[0]);
|
|
|
+ /* dot11_rsn_ie.gp_cipher_suite_count */
|
|
|
*mcEncryptType =
|
|
|
hdd_translate_rsn_to_csr_encryption_type(
|
|
|
- dot11RSNIE.gp_cipher_suite);
|
|
|
+ dot11_rsn_ie.gp_cipher_suite);
|
|
|
#ifdef WLAN_FEATURE_11W
|
|
|
- *pMfpRequired = (dot11RSNIE.RSN_Cap[0] >> 6) & 0x1;
|
|
|
- *pMfpCapable = csr_is_mfpc_capable(&dot11RSNIE);
|
|
|
+ *pMfpRequired = (dot11_rsn_ie.RSN_Cap[0] >> 6) & 0x1;
|
|
|
+ *pMfpCapable = csr_is_mfpc_capable(&dot11_rsn_ie);
|
|
|
#endif
|
|
|
#ifdef WLAN_CONV_CRYPTO_SUPPORTED
|
|
|
- qdf_mem_copy(&rsn_cap, dot11RSNIE.RSN_Cap, sizeof(rsn_cap));
|
|
|
+ qdf_mem_copy(&rsn_cap, dot11_rsn_ie.RSN_Cap, sizeof(rsn_cap));
|
|
|
wlan_crypto_set_vdev_param(adapter->vdev,
|
|
|
WLAN_CRYPTO_PARAM_RSN_CAP, rsn_cap);
|
|
|
#endif
|