summaryrefslogtreecommitdiffstats
path: root/drivers/staging/rt2860/common/cmm_wep.c
diff options
context:
space:
mode:
Diffstat (limited to 'drivers/staging/rt2860/common/cmm_wep.c')
-rw-r--r--drivers/staging/rt2860/common/cmm_wep.c86
1 files changed, 43 insertions, 43 deletions
diff --git a/drivers/staging/rt2860/common/cmm_wep.c b/drivers/staging/rt2860/common/cmm_wep.c
index db40139d1fb8..05a921410caa 100644
--- a/drivers/staging/rt2860/common/cmm_wep.c
+++ b/drivers/staging/rt2860/common/cmm_wep.c
@@ -37,7 +37,7 @@
#include "../rt_config.h"
-UINT FCSTAB_32[256] = {
+u32 FCSTAB_32[256] = {
0x00000000, 0x77073096, 0xee0e612c, 0x990951ba,
0x076dc419, 0x706af48f, 0xe963a535, 0x9e6495a3,
0x0edb8832, 0x79dcb8a4, 0xe0d5e91e, 0x97d2d988,
@@ -105,7 +105,7 @@ UINT FCSTAB_32[256] = {
};
/*
-UCHAR WEPKEY[] = {
+u8 WEPKEY[] = {
//IV
0x00, 0x11, 0x22,
//WEP KEY
@@ -135,12 +135,12 @@ UCHAR WEPKEY[] = {
========================================================================
*/
-VOID RTMPInitWepEngine(IN PRTMP_ADAPTER pAd,
- IN PUCHAR pKey,
- IN UCHAR KeyId, IN UCHAR KeyLen, IN OUT PUCHAR pDest)
+void RTMPInitWepEngine(IN PRTMP_ADAPTER pAd,
+ u8 *pKey,
+ u8 KeyId, u8 KeyLen, IN u8 *pDest)
{
- UINT i;
- UCHAR WEPKEY[] = {
+ u32 i;
+ u8 WEPKEY[] = {
/*IV */
0x00, 0x11, 0x22,
/*WEP KEY */
@@ -184,8 +184,8 @@ VOID RTMPInitWepEngine(IN PRTMP_ADAPTER pAd,
========================================================================
*/
-VOID RTMPEncryptData(IN PRTMP_ADAPTER pAd,
- IN PUCHAR pSrc, IN PUCHAR pDest, IN UINT Len)
+void RTMPEncryptData(IN PRTMP_ADAPTER pAd,
+ u8 *pSrc, u8 *pDest, u32 Len)
{
pAd->PrivateInfo.FCSCRC32 =
RTMP_CALC_FCS32(pAd->PrivateInfo.FCSCRC32, pSrc, Len);
@@ -212,21 +212,21 @@ VOID RTMPEncryptData(IN PRTMP_ADAPTER pAd,
========================================================================
*/
BOOLEAN RTMPSoftDecryptWEP(IN PRTMP_ADAPTER pAd,
- IN PUCHAR pData,
- IN ULONG DataByteCnt, IN PCIPHER_KEY pGroupKey)
+ u8 *pData,
+ unsigned long DataByteCnt, IN PCIPHER_KEY pGroupKey)
{
- UINT trailfcs;
- UINT crc32;
- UCHAR KeyIdx;
- UCHAR WEPKEY[] = {
+ u32 trailfcs;
+ u32 crc32;
+ u8 KeyIdx;
+ u8 WEPKEY[] = {
/*IV */
0x00, 0x11, 0x22,
/*WEP KEY */
0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99,
0xAA, 0xBB, 0xCC
};
- UCHAR *pPayload = (UCHAR *) pData + LENGTH_802_11;
- ULONG payload_len = DataByteCnt - LENGTH_802_11;
+ u8 *pPayload = (u8 *) pData + LENGTH_802_11;
+ unsigned long payload_len = DataByteCnt - LENGTH_802_11;
NdisMoveMemory(WEPKEY, pPayload, 3); /*Get WEP IV */
@@ -271,19 +271,19 @@ BOOLEAN RTMPSoftDecryptWEP(IN PRTMP_ADAPTER pAd,
========================================================================
*/
-VOID ARCFOUR_INIT(IN PARCFOURCONTEXT Ctx, IN PUCHAR pKey, IN UINT KeyLen)
+void ARCFOUR_INIT(IN PARCFOURCONTEXT Ctx, u8 *pKey, u32 KeyLen)
{
- UCHAR t, u;
- UINT keyindex;
- UINT stateindex;
- PUCHAR state;
- UINT counter;
+ u8 t, u;
+ u32 keyindex;
+ u32 stateindex;
+ u8 *state;
+ u32 counter;
state = Ctx->STATE;
Ctx->X = 0;
Ctx->Y = 0;
for (counter = 0; counter < 256; counter++)
- state[counter] = (UCHAR) counter;
+ state[counter] = (u8)counter;
keyindex = 0;
stateindex = 0;
for (counter = 0; counter < 256; counter++) {
@@ -307,18 +307,18 @@ VOID ARCFOUR_INIT(IN PARCFOURCONTEXT Ctx, IN PUCHAR pKey, IN UINT KeyLen)
Ctx Pointer to ARCFOUR CONTEXT (SBOX)
Return Value:
- UCHAR - the value of the ARCFOUR CONTEXT (S-BOX)
+ u8 - the value of the ARCFOUR CONTEXT (S-BOX)
Note:
========================================================================
*/
-UCHAR ARCFOUR_BYTE(IN PARCFOURCONTEXT Ctx)
+u8 ARCFOUR_BYTE(IN PARCFOURCONTEXT Ctx)
{
- UINT x;
- UINT y;
- UCHAR sx, sy;
- PUCHAR state;
+ u32 x;
+ u32 y;
+ u8 sx, sy;
+ u8 *state;
state = Ctx->STATE;
x = (Ctx->X + 1) & 0xff;
@@ -353,10 +353,10 @@ UCHAR ARCFOUR_BYTE(IN PARCFOURCONTEXT Ctx)
========================================================================
*/
-VOID ARCFOUR_DECRYPT(IN PARCFOURCONTEXT Ctx,
- IN PUCHAR pDest, IN PUCHAR pSrc, IN UINT Len)
+void ARCFOUR_DECRYPT(IN PARCFOURCONTEXT Ctx,
+ u8 *pDest, u8 *pSrc, u32 Len)
{
- UINT i;
+ u32 i;
for (i = 0; i < Len; i++)
pDest[i] = pSrc[i] ^ ARCFOUR_BYTE(Ctx);
@@ -383,10 +383,10 @@ VOID ARCFOUR_DECRYPT(IN PARCFOURCONTEXT Ctx,
========================================================================
*/
-VOID ARCFOUR_ENCRYPT(IN PARCFOURCONTEXT Ctx,
- IN PUCHAR pDest, IN PUCHAR pSrc, IN UINT Len)
+void ARCFOUR_ENCRYPT(IN PARCFOURCONTEXT Ctx,
+ u8 *pDest, u8 *pSrc, u32 Len)
{
- UINT i;
+ u32 i;
for (i = 0; i < Len; i++)
pDest[i] = pSrc[i] ^ ARCFOUR_BYTE(Ctx);
@@ -407,10 +407,10 @@ VOID ARCFOUR_ENCRYPT(IN PARCFOURCONTEXT Ctx,
========================================================================
*/
-VOID WPAARCFOUR_ENCRYPT(IN PARCFOURCONTEXT Ctx,
- IN PUCHAR pDest, IN PUCHAR pSrc, IN UINT Len)
+void WPAARCFOUR_ENCRYPT(IN PARCFOURCONTEXT Ctx,
+ u8 *pDest, u8 *pSrc, u32 Len)
{
- UINT i;
+ u32 i;
/*discard first 256 bytes */
for (i = 0; i < 256; i++)
ARCFOUR_BYTE(Ctx);
@@ -431,7 +431,7 @@ VOID WPAARCFOUR_ENCRYPT(IN PARCFOURCONTEXT Ctx,
Len the length of the data
Return Value:
- UINT - FCS 32 bits
+ u32 - FCS 32 bits
IRQL = DISPATCH_LEVEL
@@ -439,7 +439,7 @@ VOID WPAARCFOUR_ENCRYPT(IN PARCFOURCONTEXT Ctx,
========================================================================
*/
-UINT RTMP_CALC_FCS32(IN UINT Fcs, IN PUCHAR Cp, IN INT Len)
+u32 RTMP_CALC_FCS32(u32 Fcs, u8 *Cp, int Len)
{
while (Len--)
Fcs = (((Fcs) >> 8) ^ FCSTAB_32[((Fcs) ^ (*Cp++)) & 0xff]);
@@ -463,11 +463,11 @@ UINT RTMP_CALC_FCS32(IN UINT Fcs, IN PUCHAR Cp, IN INT Len)
========================================================================
*/
-VOID RTMPSetICV(IN PRTMP_ADAPTER pAd, IN PUCHAR pDest)
+void RTMPSetICV(IN PRTMP_ADAPTER pAd, u8 *pDest)
{
pAd->PrivateInfo.FCSCRC32 ^= 0xffffffff; /* complement */
pAd->PrivateInfo.FCSCRC32 = cpu2le32(pAd->PrivateInfo.FCSCRC32);
ARCFOUR_ENCRYPT(&pAd->PrivateInfo.WEPCONTEXT, pDest,
- (PUCHAR) & pAd->PrivateInfo.FCSCRC32, 4);
+ (u8 *)& pAd->PrivateInfo.FCSCRC32, 4);
}