Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

staging: wfx: indent functions arguments

Function arguments must be aligned with first argument. Apply that
rule.

Signed-off-by: Jérôme Pouiller <jerome.pouiller@silabs.com>
Link: https://lore.kernel.org/r/20210913130203.1903622-32-Jerome.Pouiller@silabs.com
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

authored by

Jérôme Pouiller and committed by
Greg Kroah-Hartman
94975513 c382d79a

+14 -14
+1 -1
drivers/staging/wfx/hif_tx_mib.c
··· 75 75 } else { 76 76 return hif_read_mib(wdev, vif_id, 77 77 HIF_MIB_ID_EXTENDED_COUNTERS_TABLE, arg, 78 - sizeof(struct hif_mib_extended_count_table)); 78 + sizeof(struct hif_mib_extended_count_table)); 79 79 } 80 80 } 81 81
+13 -13
drivers/staging/wfx/key.c
··· 31 31 } 32 32 33 33 static u8 fill_wep_pair(struct hif_wep_pairwise_key *msg, 34 - struct ieee80211_key_conf *key, u8 *peer_addr) 34 + struct ieee80211_key_conf *key, u8 *peer_addr) 35 35 { 36 36 WARN(key->keylen > sizeof(msg->key_data), "inconsistent data"); 37 37 msg->key_length = key->keylen; ··· 41 41 } 42 42 43 43 static u8 fill_wep_group(struct hif_wep_group_key *msg, 44 - struct ieee80211_key_conf *key) 44 + struct ieee80211_key_conf *key) 45 45 { 46 46 WARN(key->keylen > sizeof(msg->key_data), "inconsistent data"); 47 47 msg->key_id = key->keyidx; ··· 51 51 } 52 52 53 53 static u8 fill_tkip_pair(struct hif_tkip_pairwise_key *msg, 54 - struct ieee80211_key_conf *key, u8 *peer_addr) 54 + struct ieee80211_key_conf *key, u8 *peer_addr) 55 55 { 56 56 u8 *keybuf = key->key; 57 57 ··· 68 68 } 69 69 70 70 static u8 fill_tkip_group(struct hif_tkip_group_key *msg, 71 - struct ieee80211_key_conf *key, 72 - struct ieee80211_key_seq *seq, 73 - enum nl80211_iftype iftype) 71 + struct ieee80211_key_conf *key, 72 + struct ieee80211_key_seq *seq, 73 + enum nl80211_iftype iftype) 74 74 { 75 75 u8 *keybuf = key->key; 76 76 ··· 93 93 } 94 94 95 95 static u8 fill_ccmp_pair(struct hif_aes_pairwise_key *msg, 96 - struct ieee80211_key_conf *key, u8 *peer_addr) 96 + struct ieee80211_key_conf *key, u8 *peer_addr) 97 97 { 98 98 WARN(key->keylen != sizeof(msg->aes_key_data), "inconsistent data"); 99 99 ether_addr_copy(msg->peer_address, peer_addr); ··· 102 102 } 103 103 104 104 static u8 fill_ccmp_group(struct hif_aes_group_key *msg, 105 - struct ieee80211_key_conf *key, 106 - struct ieee80211_key_seq *seq) 105 + struct ieee80211_key_conf *key, 106 + struct ieee80211_key_seq *seq) 107 107 { 108 108 WARN(key->keylen != sizeof(msg->aes_key_data), "inconsistent data"); 109 109 memcpy(msg->aes_key_data, key->key, key->keylen); ··· 114 114 } 115 115 116 116 static u8 fill_sms4_pair(struct hif_wapi_pairwise_key *msg, 117 - struct ieee80211_key_conf *key, u8 *peer_addr) 117 + struct ieee80211_key_conf *key, u8 *peer_addr) 118 118 { 119 119 u8 *keybuf = key->key; 120 120 ··· 129 129 } 130 130 131 131 static u8 fill_sms4_group(struct hif_wapi_group_key *msg, 132 - struct ieee80211_key_conf *key) 132 + struct ieee80211_key_conf *key) 133 133 { 134 134 u8 *keybuf = key->key; 135 135 ··· 143 143 } 144 144 145 145 static u8 fill_aes_cmac_group(struct hif_igtk_group_key *msg, 146 - struct ieee80211_key_conf *key, 147 - struct ieee80211_key_seq *seq) 146 + struct ieee80211_key_conf *key, 147 + struct ieee80211_key_seq *seq) 148 148 { 149 149 WARN(key->keylen != sizeof(msg->igtk_key_data), "inconsistent data"); 150 150 memcpy(msg->igtk_key_data, key->key, key->keylen);