[PATCH 1/3] staging: vt6656: dpc.c: Remove commented code
Marcos Paulo de Souza
marcos.mage at gmail.com
Fri Dec 2 19:01:30 UTC 2011
This patch removes commented code and some blank lines.
Signed-off-by: Marcos Paulo de Souza <marcos.mage at gmail.com>
Cc: Greg Kroah-Hartman <gregkh at suse.de>
Cc: devel at driverdev.osuosl.org
---
drivers/staging/vt6656/dpc.c | 78 ------------------------------------------
1 files changed, 0 insertions(+), 78 deletions(-)
diff --git a/drivers/staging/vt6656/dpc.c b/drivers/staging/vt6656/dpc.c
index c0edf97..bc96127 100644
--- a/drivers/staging/vt6656/dpc.c
+++ b/drivers/staging/vt6656/dpc.c
@@ -56,24 +56,11 @@
#include "datarate.h"
#include "usbpipe.h"
-/*--------------------- Static Definitions -------------------------*/
-
-/*--------------------- Static Classes ----------------------------*/
-
-/*--------------------- Static Variables --------------------------*/
-//static int msglevel =MSG_LEVEL_DEBUG;
static int msglevel =MSG_LEVEL_INFO;
const BYTE acbyRxRate[MAX_RATE] =
{2, 4, 11, 22, 12, 18, 24, 36, 48, 72, 96, 108};
-
-/*--------------------- Static Functions --------------------------*/
-
-/*--------------------- Static Definitions -------------------------*/
-
-/*--------------------- Static Functions --------------------------*/
-
static BYTE s_byGetRateIdx(BYTE byRate);
static
@@ -140,8 +127,6 @@ static BOOL s_bHostWepRxEncryption(
);
-/*--------------------- Export Variables --------------------------*/
-
/*+
*
* Description:
@@ -241,9 +226,6 @@ s_vProcessRxMACHeader (
*pcbHeadSize = cbHeaderSize;
}
-
-
-
static BYTE s_byGetRateIdx(BYTE byRate)
{
BYTE byRateIdx;
@@ -309,9 +291,6 @@ s_vGetDASA (
*pcbHeaderSize = cbHeaderSize;
}
-
-
-
BOOL
RXbBulkInProcessData (
PSDevice pDevice,
@@ -543,7 +522,6 @@ RXbBulkInProcessData (
} else if ((pKey != NULL) && (pKey->byCipherSuite == KEY_CTL_CCMP)) {
pDevice->s802_11Counter.CCMPDecryptErrors++;
} else if ((pKey != NULL) && (pKey->byCipherSuite == KEY_CTL_WEP)) {
-// pDevice->s802_11Counter.WEPICVErrorCount.QuadPart++;
}
}
return FALSE;
@@ -625,8 +603,6 @@ RXbBulkInProcessData (
// hostap Deamon handle 802.11 management
if (pDevice->bEnableHostapd) {
skb->dev = pDevice->apdev;
- //skb->data += 4;
- //skb->tail += 4;
skb->data += 8;
skb->tail += 8;
skb_put(skb, FrameSize);
@@ -703,10 +679,8 @@ RXbBulkInProcessData (
Descriptor_type = skb->data[cbIVOffset + 8 + 24 + 6 + 1 +1+1+1+2];
Key_info = (skb->data[cbIVOffset + 8 + 24 + 6 + 1 +1+1+1+2+1]<<8) |skb->data[cbIVOffset + 8 + 24 + 6 + 1 +1+1+1+2+2] ;
if(Descriptor_type==2) { //RSN
- // printk("WPA2_Rx_eapol-key_info<-----:%x\n",Key_info);
}
else if(Descriptor_type==254) {
- // printk("WPA_Rx_eapol-key_info<-----:%x\n",Key_info);
}
}
}
@@ -715,14 +689,11 @@ RXbBulkInProcessData (
}
}
-
// Data frame Handle
-
if (pDevice->bEnablePSMode) {
if (IS_FC_MOREDATA((pbyFrame))) {
if (*pbyRsr & RSR_ADDROK) {
- //PSbSendPSPOLL((PSDevice)pDevice);
}
}
else {
@@ -743,27 +714,6 @@ RXbBulkInProcessData (
pDevice->uCurrRSSI = *pbyRSSI;
pDevice->byCurrSQ = *pbySQ;
- // todo
-/*
- if ((*pbyRSSI != 0) &&
- (pMgmt->pCurrBSS!=NULL)) {
- RFvRSSITodBm(pDevice, *pbyRSSI, &ldBm);
- // Moniter if RSSI is too strong.
- pMgmt->pCurrBSS->byRSSIStatCnt++;
- pMgmt->pCurrBSS->byRSSIStatCnt %= RSSI_STAT_COUNT;
- pMgmt->pCurrBSS->ldBmAverage[pMgmt->pCurrBSS->byRSSIStatCnt] = ldBm;
- for (ii = 0; ii < RSSI_STAT_COUNT; ii++) {
- if (pMgmt->pCurrBSS->ldBmAverage[ii] != 0) {
- pMgmt->pCurrBSS->ldBmMAX =
- max(pMgmt->pCurrBSS->ldBmAverage[ii], ldBm);
- }
- }
- }
-*/
-
-
- // -----------------------------------------------
-
if ((pMgmt->eCurrMode == WMAC_MODE_ESS_AP) && (pDevice->bEnable8021x == TRUE)){
BYTE abyMacHdr[24];
@@ -808,7 +758,6 @@ RXbBulkInProcessData (
}
}
- //--------------------------------------------------------------------------------
// Soft MIC
if ((pKey != NULL) && (pKey->byCipherSuite == KEY_CTL_TKIP)) {
if (bIsWEP) {
@@ -856,7 +805,6 @@ RXbBulkInProcessData (
(pDevice->bRxMICFail == TRUE)) {
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"MIC comparison is fail!\n");
pDevice->bRxMICFail = FALSE;
- //pDevice->s802_11Counter.TKIPLocalMICFailures.QuadPart++;
pDevice->s802_11Counter.TKIPLocalMICFailures++;
if (bDeFragRx) {
if (!device_alloc_frag_buf(pDevice, &pDevice->sRxDFCB[pDevice->uCurrentDFCBIdx])) {
@@ -866,7 +814,6 @@ RXbBulkInProcessData (
}
#ifdef WPA_SUPPLICANT_DRIVER_WEXT_SUPPORT
//send event to wpa_supplicant
- //if(pDevice->bWPASuppWextEnabled == TRUE)
{
union iwreq_data wrqu;
struct iw_michaelmicfailure ev;
@@ -891,16 +838,13 @@ RXbBulkInProcessData (
}
#endif
-
if ((pDevice->bWPADEVUp) && (pDevice->skb != NULL)) {
wpahdr = (viawget_wpa_header *)pDevice->skb->data;
if ((pMgmt->eCurrMode == WMAC_MODE_ESS_STA) &&
(pMgmt->eCurrState == WMAC_STATE_ASSOC) &&
(*pbyRsr & (RSR_ADDRBROAD | RSR_ADDRMULTI)) == 0) {
- //s802_11_Status.Flags = NDIS_802_11_AUTH_REQUEST_PAIRWISE_ERROR;
wpahdr->type = VIAWGET_PTK_MIC_MSG;
} else {
- //s802_11_Status.Flags = NDIS_802_11_AUTH_REQUEST_GROUP_ERROR;
wpahdr->type = VIAWGET_GTK_MIC_MSG;
}
wpahdr->resp_ie_len = 0;
@@ -947,10 +891,8 @@ RXbBulkInProcessData (
!((dwRxTSC47_16 == 0) && (dwLocalTSC47_16 == 0xFFFFFFFF))) {
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"TSC is illegal~~!\n ");
if (pKey->byCipherSuite == KEY_CTL_TKIP)
- //pDevice->s802_11Counter.TKIPReplays.QuadPart++;
pDevice->s802_11Counter.TKIPReplays++;
else
- //pDevice->s802_11Counter.CCMPReplays.QuadPart++;
pDevice->s802_11Counter.CCMPReplays++;
if (bDeFragRx) {
@@ -1013,7 +955,6 @@ RXbBulkInProcessData (
return TRUE;
}
-
static BOOL s_bAPModeRxCtl (
PSDevice pDevice,
PBYTE pbyFrame,
@@ -1199,17 +1140,13 @@ static BOOL s_bHandleRxEncryption (
if (pKey == NULL) {
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"pKey == NULL\n");
if (byDecMode == KEY_CTL_WEP) {
-// pDevice->s802_11Counter.WEPUndecryptableCount.QuadPart++;
} else if (pDevice->bLinkPass == TRUE) {
-// pDevice->s802_11Counter.DecryptFailureCount.QuadPart++;
}
return FALSE;
}
if (byDecMode != pKey->byCipherSuite) {
if (byDecMode == KEY_CTL_WEP) {
-// pDevice->s802_11Counter.WEPUndecryptableCount.QuadPart++;
} else if (pDevice->bLinkPass == TRUE) {
-// pDevice->s802_11Counter.DecryptFailureCount.QuadPart++;
}
*pKeyOut = NULL;
return FALSE;
@@ -1315,9 +1252,7 @@ static BOOL s_bHostWepRxEncryption (
if (byDecMode != pKey->byCipherSuite) {
if (byDecMode == KEY_CTL_WEP) {
-// pDevice->s802_11Counter.WEPUndecryptableCount.QuadPart++;
} else if (pDevice->bLinkPass == TRUE) {
-// pDevice->s802_11Counter.DecryptFailureCount.QuadPart++;
}
return FALSE;
}
@@ -1400,8 +1335,6 @@ static BOOL s_bHostWepRxEncryption (
return TRUE;
}
-
-
static BOOL s_bAPModeRxData (
PSDevice pDevice,
struct sk_buff *skb,
@@ -1493,9 +1426,6 @@ static BOOL s_bAPModeRxData (
return TRUE;
}
-
-
-
void RXvWorkItem(void *Context)
{
PSDevice pDevice = (PSDevice) Context;
@@ -1516,10 +1446,8 @@ void RXvWorkItem(void *Context)
}
pDevice->bIsRxWorkItemQueued = FALSE;
spin_unlock_irq(&pDevice->lock);
-
}
-
void
RXvFreeRCB(
PRCB pRCB,
@@ -1528,7 +1456,6 @@ RXvFreeRCB(
{
PSDevice pDevice = (PSDevice)pRCB->pDevice;
-
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"---->RXvFreeRCB\n");
ASSERT(!pRCB->Ref); // should be 0
@@ -1559,7 +1486,6 @@ RXvFreeRCB(
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"<----RXFreeRCB %d %d\n",pDevice->NumRecvFreeList, pDevice->NumRecvMngList);
}
-
void RXvMngWorkItem(void *Context)
{
PSDevice pDevice = (PSDevice) Context;
@@ -1589,10 +1515,6 @@ void RXvMngWorkItem(void *Context)
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"Rx Mng Only we have the right to free RCB\n");
}
}
-
pDevice->bIsRxMngWorkItemQueued = FALSE;
spin_unlock_irq(&pDevice->lock);
-
}
-
-
--
1.7.4.4
More information about the devel
mailing list