Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

staging: r8188eu: remove some structure definitions from wlan_bssdef.h

ndis_802_11_ai_reqfi, ndis_802_11_ai_resfi, ndis_802_11_assoc_info,
ndis_802_11_remove_key, ndis_802_11_auth_req, ndis_802_11_status_ind,
ndis_802_11_auth_evt, ndis_802_11_test, pmkid_candidate, ndis_802_11_pmkid_list,
ndis_802_11_auth_encrypt and ndis_802_11_cap structures are not used.

Signed-off-by: Ivan Safonov <insafonov@gmail.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

authored by

Ivan Safonov and committed by
Greg Kroah-Hartman
21b8461f 50a619d5

-83
-83
drivers/staging/rtl8188eu/include/wlan_bssdef.h
··· 123 123 #define NDIS_802_11_AI_RESFI_STATUSCODE 2 124 124 #define NDIS_802_11_AI_RESFI_ASSOCIATIONID 4 125 125 126 - struct ndis_802_11_ai_reqfi { 127 - u16 Capabilities; 128 - u16 ListenInterval; 129 - unsigned char CurrentAPAddress[ETH_ALEN]; 130 - }; 131 - 132 - struct ndis_802_11_ai_resfi { 133 - u16 Capabilities; 134 - u16 StatusCode; 135 - u16 AssociationId; 136 - }; 137 - 138 - struct ndis_802_11_assoc_info { 139 - u32 Length; 140 - u16 AvailableRequestFixedIEs; 141 - struct ndis_802_11_ai_reqfi RequestFixedIEs; 142 - u32 RequestIELength; 143 - u32 OffsetRequestIEs; 144 - u16 AvailableResponseFixedIEs; 145 - struct ndis_802_11_ai_resfi ResponseFixedIEs; 146 - u32 ResponseIELength; 147 - u32 OffsetResponseIEs; 148 - }; 149 - 150 126 enum ndis_802_11_reload_def { 151 127 Ndis802_11ReloadWEPKeys 152 - }; 153 - 154 - struct ndis_802_11_remove_key { 155 - u32 Length; /* Length */ 156 - u32 KeyIndex; 157 - unsigned char BSSID[ETH_ALEN]; 158 128 }; 159 129 160 130 struct ndis_802_11_wep { ··· 135 165 u8 KeyMaterial[16];/* variable len depending on above field */ 136 166 }; 137 167 138 - struct ndis_802_11_auth_req { 139 - u32 Length; /* Length of structure */ 140 - unsigned char Bssid[ETH_ALEN]; 141 - u32 Flags; 142 - }; 143 - 144 168 enum ndis_802_11_status_type { 145 169 Ndis802_11StatusType_Authentication, 146 170 Ndis802_11StatusType_MediaStreamMode, 147 171 Ndis802_11StatusType_PMKID_CandidateList, 148 172 Ndis802_11StatusTypeMax /* not a real type, defined as 149 173 * an upper bound */ 150 - }; 151 - 152 - struct ndis_802_11_status_ind { 153 - enum ndis_802_11_status_type StatusType; 154 174 }; 155 175 156 176 /* mask for authentication/integrity fields */ ··· 152 192 153 193 /* MIC check time, 60 seconds. */ 154 194 #define MIC_CHECK_TIME 60000000 155 - 156 - struct ndis_802_11_auth_evt { 157 - struct ndis_802_11_status_ind Status; 158 - struct ndis_802_11_auth_req Request[1]; 159 - }; 160 - 161 - struct ndis_802_11_test { 162 - u32 Length; 163 - u32 Type; 164 - union { 165 - struct ndis_802_11_auth_evt AuthenticationEvent; 166 - NDIS_802_11_RSSI RssiTrigger; 167 - } tt; 168 - }; 169 - 170 195 171 196 #ifndef Ndis802_11APMode 172 197 #define Ndis802_11APMode (Ndis802_11InfrastructureMax+1) ··· 241 296 242 297 #define NUM_PRE_AUTH_KEY 16 243 298 #define NUM_PMKID_CACHE NUM_PRE_AUTH_KEY 244 - 245 - /* 246 - * WPA2 247 - */ 248 - 249 - struct pmkid_candidate { 250 - unsigned char BSSID[ETH_ALEN]; 251 - u32 Flags; 252 - }; 253 - 254 - struct ndis_802_11_pmkid_list { 255 - u32 Version; /* Version of the structure */ 256 - u32 NumCandidates; /* No. of pmkid candidates */ 257 - struct pmkid_candidate CandidateList[1]; 258 - }; 259 - 260 - struct ndis_802_11_auth_encrypt { 261 - enum ndis_802_11_auth_mode AuthModeSupported; 262 - enum ndis_802_11_wep_status EncryptStatusSupported; 263 - }; 264 - 265 - struct ndis_802_11_cap { 266 - u32 Length; 267 - u32 Version; 268 - u32 NoOfPMKIDs; 269 - u32 NoOfAuthEncryptPairsSupported; 270 - struct ndis_802_11_auth_encrypt AuthenticationEncryptionSupported[1]; 271 - }; 272 299 273 300 #endif /* ifndef WLAN_BSSDEF_H_ */