aboutsummaryrefslogtreecommitdiff
path: root/drivers/staging/vt6656/wpa.c
diff options
context:
space:
mode:
authorAndres More <more.andres@gmail.com>2013-02-12 20:36:29 -0500
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2013-02-15 10:47:52 -0800
commite269fc2d129ade6543c22052755becf37e306e2a (patch)
tree450d3e2d954fe81682b36bf3bf165eec5f6809e1 /drivers/staging/vt6656/wpa.c
parentdfdcc425975d06cbfcc9b5c0fad2f3af5476cd05 (diff)
staging: vt6656: replaced custom FALSE definition with false
Checkpatch findings were not resolved, just direct replacement. sed -i 's/\bFALSE\b/false/g' drivers/staging/vt6656/*.[ch] Signed-off-by: Andres More <more.andres@gmail.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'drivers/staging/vt6656/wpa.c')
-rw-r--r--drivers/staging/vt6656/wpa.c18
1 files changed, 9 insertions, 9 deletions
diff --git a/drivers/staging/vt6656/wpa.c b/drivers/staging/vt6656/wpa.c
index 6336d8850de..568a6f41559 100644
--- a/drivers/staging/vt6656/wpa.c
+++ b/drivers/staging/vt6656/wpa.c
@@ -83,9 +83,9 @@ WPA_ClearRSN(
pBSSList->wAuthCount = 0;
pBSSList->byDefaultK_as_PK = 0;
pBSSList->byReplayIdx = 0;
- pBSSList->sRSNCapObj.bRSNCapExist = FALSE;
+ pBSSList->sRSNCapObj.bRSNCapExist = false;
pBSSList->sRSNCapObj.wRSNCap = 0;
- pBSSList->bWPAValid = FALSE;
+ pBSSList->bWPAValid = false;
}
@@ -249,14 +249,14 @@ WPA_SearchRSN(
int ii;
BYTE byPKType = WPA_NONE;
- if (pBSSList->bWPAValid == FALSE)
- return FALSE;
+ if (pBSSList->bWPAValid == false)
+ return false;
switch(byCmd) {
case 0:
if (byEncrypt != pBSSList->byGKType)
- return FALSE;
+ return false;
if (pBSSList->wPKCount > 0) {
for (ii = 0; ii < pBSSList->wPKCount; ii ++) {
@@ -270,7 +270,7 @@ WPA_SearchRSN(
byPKType = WPA_WEP104;
}
if (byEncrypt != byPKType)
- return FALSE;
+ return false;
}
return TRUE;
// if (pBSSList->wAuthCount > 0)
@@ -282,7 +282,7 @@ WPA_SearchRSN(
default:
break;
}
- return FALSE;
+ return false;
}
/*+
@@ -305,7 +305,7 @@ WPAb_Is_RSN(
)
{
if (pRSN == NULL)
- return FALSE;
+ return false;
if ((pRSN->len >= 6) && // oui1(4)+ver(2)
(pRSN->byElementID == WLAN_EID_RSN_WPA) && !memcmp(pRSN->abyOUI, abyOUI01, 4) &&
@@ -313,6 +313,6 @@ WPAb_Is_RSN(
return TRUE;
}
else
- return FALSE;
+ return false;
}