staging: rtl8192u: Remove space after cast - Coding Style
According to checkpatch - No space is necessary after a cast. Signed-off-by: John Whitmore <johnfwhitmore@gmail.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
This commit is contained in:
parent
bb81b8241f
commit
e19532885f
1 changed files with 15 additions and 15 deletions
|
|
@ -220,7 +220,7 @@ inline void softmac_mgmt_xmit(struct sk_buff *skb, struct ieee80211_device *ieee
|
|||
unsigned long flags;
|
||||
short single = ieee->softmac_features & IEEE_SOFTMAC_SINGLE_QUEUE;
|
||||
struct rtl_80211_hdr_3addr *header=
|
||||
(struct rtl_80211_hdr_3addr *) skb->data;
|
||||
(struct rtl_80211_hdr_3addr *)skb->data;
|
||||
|
||||
struct cb_desc *tcb_desc = (struct cb_desc *)(skb->cb + 8);
|
||||
|
||||
|
|
@ -287,7 +287,7 @@ softmac_ps_mgmt_xmit(struct sk_buff *skb, struct ieee80211_device *ieee)
|
|||
{
|
||||
short single = ieee->softmac_features & IEEE_SOFTMAC_SINGLE_QUEUE;
|
||||
struct rtl_80211_hdr_3addr *header =
|
||||
(struct rtl_80211_hdr_3addr *) skb->data;
|
||||
(struct rtl_80211_hdr_3addr *)skb->data;
|
||||
|
||||
if(single){
|
||||
header->seq_ctl = cpu_to_le16(ieee->seq_ctrl[0] << 4);
|
||||
|
|
@ -710,9 +710,9 @@ static struct sk_buff *ieee80211_probe_resp(struct ieee80211_device *ieee, u8 *d
|
|||
encrypt = ieee->host_encrypt && crypt && crypt->ops &&
|
||||
((0 == strcmp(crypt->ops->name, "WEP") || wpa_ie_len));
|
||||
/* HT ralated element */
|
||||
tmp_ht_cap_buf =(u8 *) &(ieee->pHTInfo->SelfHTCap);
|
||||
tmp_ht_cap_buf =(u8 *)&(ieee->pHTInfo->SelfHTCap);
|
||||
tmp_ht_cap_len = sizeof(ieee->pHTInfo->SelfHTCap);
|
||||
tmp_ht_info_buf =(u8 *) &(ieee->pHTInfo->SelfHTInfo);
|
||||
tmp_ht_info_buf =(u8 *)&(ieee->pHTInfo->SelfHTInfo);
|
||||
tmp_ht_info_len = sizeof(ieee->pHTInfo->SelfHTInfo);
|
||||
HTConstructCapabilityElement(ieee, tmp_ht_cap_buf, &tmp_ht_cap_len,encrypt);
|
||||
HTConstructInfoElement(ieee,tmp_ht_info_buf,&tmp_ht_info_len, encrypt);
|
||||
|
|
@ -765,7 +765,7 @@ static struct sk_buff *ieee80211_probe_resp(struct ieee80211_device *ieee, u8 *d
|
|||
beacon_buf->info_element[0].id = MFIE_TYPE_SSID;
|
||||
beacon_buf->info_element[0].len = ssid_len;
|
||||
|
||||
tag = (u8 *) beacon_buf->info_element[0].data;
|
||||
tag = (u8 *)beacon_buf->info_element[0].data;
|
||||
|
||||
memcpy(tag, ssid, ssid_len);
|
||||
|
||||
|
|
@ -1493,7 +1493,7 @@ static inline u16 auth_parse(struct sk_buff *skb, u8 **challenge, int *chlen)
|
|||
return 0xcafe;
|
||||
}
|
||||
*challenge = NULL;
|
||||
a = (struct ieee80211_authentication *) skb->data;
|
||||
a = (struct ieee80211_authentication *)skb->data;
|
||||
if (skb->len > (sizeof(struct ieee80211_authentication) + 3)) {
|
||||
t = skb->data + sizeof(struct ieee80211_authentication);
|
||||
|
||||
|
|
@ -1516,7 +1516,7 @@ static int auth_rq_parse(struct sk_buff *skb, u8 *dest)
|
|||
IEEE80211_DEBUG_MGMT("invalid len in auth request: %d\n",skb->len);
|
||||
return -1;
|
||||
}
|
||||
a = (struct ieee80211_authentication *) skb->data;
|
||||
a = (struct ieee80211_authentication *)skb->data;
|
||||
|
||||
memcpy(dest,a->header.addr2, ETH_ALEN);
|
||||
|
||||
|
|
@ -1534,7 +1534,7 @@ static short probe_rq_parse(struct ieee80211_device *ieee, struct sk_buff *skb,
|
|||
u8 ssidlen = 0;
|
||||
|
||||
struct rtl_80211_hdr_3addr *header =
|
||||
(struct rtl_80211_hdr_3addr *) skb->data;
|
||||
(struct rtl_80211_hdr_3addr *)skb->data;
|
||||
|
||||
if (skb->len < sizeof (struct rtl_80211_hdr_3addr ))
|
||||
return -1; /* corrupted */
|
||||
|
|
@ -1574,7 +1574,7 @@ static int assoc_rq_parse(struct sk_buff *skb, u8 *dest)
|
|||
return -1;
|
||||
}
|
||||
|
||||
a = (struct ieee80211_assoc_request_frame *) skb->data;
|
||||
a = (struct ieee80211_assoc_request_frame *)skb->data;
|
||||
|
||||
memcpy(dest,a->header.addr2,ETH_ALEN);
|
||||
|
||||
|
|
@ -1591,7 +1591,7 @@ static inline u16 assoc_parse(struct ieee80211_device *ieee, struct sk_buff *skb
|
|||
return 0xcafe;
|
||||
}
|
||||
|
||||
response_head = (struct ieee80211_assoc_response_frame *) skb->data;
|
||||
response_head = (struct ieee80211_assoc_response_frame *)skb->data;
|
||||
*aid = le16_to_cpu(response_head->aid) & 0x3fff;
|
||||
|
||||
status_code = le16_to_cpu(response_head->status);
|
||||
|
|
@ -1913,7 +1913,7 @@ ieee80211_rx_frame_softmac(struct ieee80211_device *ieee, struct sk_buff *skb,
|
|||
struct ieee80211_rx_stats *rx_stats, u16 type,
|
||||
u16 stype)
|
||||
{
|
||||
struct rtl_80211_hdr_3addr *header = (struct rtl_80211_hdr_3addr *) skb->data;
|
||||
struct rtl_80211_hdr_3addr *header = (struct rtl_80211_hdr_3addr *)skb->data;
|
||||
u16 errcode;
|
||||
int aid;
|
||||
struct ieee80211_assoc_response_frame *assoc_resp;
|
||||
|
|
@ -2171,7 +2171,7 @@ void ieee80211_wake_queue(struct ieee80211_device *ieee)
|
|||
if (ieee->softmac_features & IEEE_SOFTMAC_SINGLE_QUEUE) {
|
||||
while (!ieee->queue_stop && (skb = dequeue_mgmt(ieee))){
|
||||
|
||||
header = (struct rtl_80211_hdr_3addr *) skb->data;
|
||||
header = (struct rtl_80211_hdr_3addr *)skb->data;
|
||||
|
||||
header->seq_ctl = cpu_to_le16(ieee->seq_ctrl[0] << 4);
|
||||
|
||||
|
|
@ -2469,7 +2469,7 @@ struct sk_buff *ieee80211_get_beacon_(struct ieee80211_device *ieee)
|
|||
if (!skb)
|
||||
return NULL;
|
||||
|
||||
b = (struct ieee80211_probe_response *) skb->data;
|
||||
b = (struct ieee80211_probe_response *)skb->data;
|
||||
b->header.frame_ctl = cpu_to_le16(IEEE80211_STYPE_BEACON);
|
||||
|
||||
return skb;
|
||||
|
|
@ -2484,7 +2484,7 @@ struct sk_buff *ieee80211_get_beacon(struct ieee80211_device *ieee)
|
|||
if(!skb)
|
||||
return NULL;
|
||||
|
||||
b = (struct ieee80211_probe_response *) skb->data;
|
||||
b = (struct ieee80211_probe_response *)skb->data;
|
||||
b->header.seq_ctl = cpu_to_le16(ieee->seq_ctrl[0] << 4);
|
||||
|
||||
if (ieee->seq_ctrl[0] == 0xFFF)
|
||||
|
|
@ -2857,7 +2857,7 @@ static int ieee80211_wpa_set_encryption(struct ieee80211_device *ieee,
|
|||
param->u.crypt.alg[IEEE_CRYPT_ALG_NAME_LEN - 1] = '\0';
|
||||
|
||||
if (param_len !=
|
||||
(int) ((char *) param->u.crypt.key - (char *) param) +
|
||||
(int)((char *)param->u.crypt.key - (char *)param) +
|
||||
param->u.crypt.key_len) {
|
||||
printk("Len mismatch %d, %d\n", param_len,
|
||||
param->u.crypt.key_len);
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue