Staging: rt28x0: fix comments in common/*.c files
[deliverable/linux.git] / drivers / staging / rt2860 / common / cmm_sanity.c
index 92c44c7ab99fba0faaeb85aee047440432563c4a..bd1202532aa04cb53efb906ab1a0bc37fb8f6c78 100644 (file)
@@ -144,7 +144,7 @@ BOOLEAN PeerAddBAReqActionSanity(IN PRTMP_ADAPTER pAd,
                          MsgLen));
                return FALSE;
        }
-       // we support immediate BA.
+       /* we support immediate BA. */
        *(USHORT *) (&pAddFrame->BaParm) =
            cpu2le16(*(USHORT *) (&pAddFrame->BaParm));
        pAddFrame->TimeOutValue = cpu2le16(pAddFrame->TimeOutValue);
@@ -160,7 +160,7 @@ BOOLEAN PeerAddBAReqActionSanity(IN PRTMP_ADAPTER pAd,
                          pAddFrame->BaParm.AMSDUSupported));
                return FALSE;
        }
-       // we support immediate BA.
+       /* we support immediate BA. */
        if (pAddFrame->BaParm.TID & 0xfff0) {
                DBGPRINT(RT_DEBUG_ERROR,
                         ("PeerAddBAReqActionSanity: ADDBA Request incorrect TID = %d\n",
@@ -183,7 +183,7 @@ BOOLEAN PeerAddBARspActionSanity(IN PRTMP_ADAPTER pAd,
                          MsgLen));
                return FALSE;
        }
-       // we support immediate BA.
+       /* we support immediate BA. */
        *(USHORT *) (&pAddFrame->BaParm) =
            cpu2le16(*(USHORT *) (&pAddFrame->BaParm));
        pAddFrame->StatusCode = cpu2le16(pAddFrame->StatusCode);
@@ -195,7 +195,7 @@ BOOLEAN PeerAddBARspActionSanity(IN PRTMP_ADAPTER pAd,
                          pAddFrame->BaParm.BAPolicy));
                return FALSE;
        }
-       // we support immediate BA.
+       /* we support immediate BA. */
        if (pAddFrame->BaParm.TID & 0xfff0) {
                DBGPRINT(RT_DEBUG_ERROR,
                         ("PeerAddBARspActionSanity: ADDBA Response incorrect TID = %d\n",
@@ -209,7 +209,7 @@ BOOLEAN PeerAddBARspActionSanity(IN PRTMP_ADAPTER pAd,
 BOOLEAN PeerDelBAActionSanity(IN PRTMP_ADAPTER pAd,
                              IN UCHAR Wcid, IN VOID * pMsg, IN ULONG MsgLen)
 {
-       //PFRAME_802_11 pFrame = (PFRAME_802_11)pMsg;
+       /*PFRAME_802_11 pFrame = (PFRAME_802_11)pMsg; */
        PFRAME_DELBA_REQ pDelFrame;
        if (MsgLen != (sizeof(FRAME_DELBA_REQ)))
                return FALSE;
@@ -240,7 +240,7 @@ BOOLEAN PeerDelBAActionSanity(IN PRTMP_ADAPTER pAd,
 
     ==========================================================================
  */
-BOOLEAN PeerBeaconAndProbeRspSanity(IN PRTMP_ADAPTER pAd, IN VOID * Msg, IN ULONG MsgLen, IN UCHAR MsgChannel, OUT PUCHAR pAddr2, OUT PUCHAR pBssid, OUT CHAR Ssid[], OUT UCHAR * pSsidLen, OUT UCHAR * pBssType, OUT USHORT * pBeaconPeriod, OUT UCHAR * pChannel, OUT UCHAR * pNewChannel, OUT LARGE_INTEGER * pTimestamp, OUT CF_PARM * pCfParm, OUT USHORT * pAtimWin, OUT USHORT * pCapabilityInfo, OUT UCHAR * pErp, OUT UCHAR * pDtimCount, OUT UCHAR * pDtimPeriod, OUT UCHAR * pBcastFlag, OUT UCHAR * pMessageToMe, OUT UCHAR SupRate[], OUT UCHAR * pSupRateLen, OUT UCHAR ExtRate[], OUT UCHAR * pExtRateLen, OUT UCHAR * pCkipFlag, OUT UCHAR * pAironetCellPowerLimit, OUT PEDCA_PARM pEdcaParm, OUT PQBSS_LOAD_PARM pQbssLoad, OUT PQOS_CAPABILITY_PARM pQosCapability, OUT ULONG * pRalinkIe, OUT UCHAR * pHtCapabilityLen, OUT UCHAR * pPreNHtCapabilityLen, OUT HT_CAPABILITY_IE * pHtCapability, OUT UCHAR * AddHtInfoLen, OUT ADD_HT_INFO_IE * AddHtInfo, OUT UCHAR * NewExtChannelOffset, // Ht extension channel offset(above or below)
+BOOLEAN PeerBeaconAndProbeRspSanity(IN PRTMP_ADAPTER pAd, IN VOID * Msg, IN ULONG MsgLen, IN UCHAR MsgChannel, OUT PUCHAR pAddr2, OUT PUCHAR pBssid, OUT CHAR Ssid[], OUT UCHAR * pSsidLen, OUT UCHAR * pBssType, OUT USHORT * pBeaconPeriod, OUT UCHAR * pChannel, OUT UCHAR * pNewChannel, OUT LARGE_INTEGER * pTimestamp, OUT CF_PARM * pCfParm, OUT USHORT * pAtimWin, OUT USHORT * pCapabilityInfo, OUT UCHAR * pErp, OUT UCHAR * pDtimCount, OUT UCHAR * pDtimPeriod, OUT UCHAR * pBcastFlag, OUT UCHAR * pMessageToMe, OUT UCHAR SupRate[], OUT UCHAR * pSupRateLen, OUT UCHAR ExtRate[], OUT UCHAR * pExtRateLen, OUT UCHAR * pCkipFlag, OUT UCHAR * pAironetCellPowerLimit, OUT PEDCA_PARM pEdcaParm, OUT PQBSS_LOAD_PARM pQbssLoad, OUT PQOS_CAPABILITY_PARM pQosCapability, OUT ULONG * pRalinkIe, OUT UCHAR * pHtCapabilityLen, OUT UCHAR * pPreNHtCapabilityLen, OUT HT_CAPABILITY_IE * pHtCapability, OUT UCHAR * AddHtInfoLen, OUT ADD_HT_INFO_IE * AddHtInfo, OUT UCHAR * NewExtChannelOffset, /* Ht extension channel offset(above or below) */
                                    OUT USHORT * LengthVIE,
                                    OUT PNDIS_802_11_VARIABLE_IEs pVIE)
 {
@@ -250,16 +250,16 @@ BOOLEAN PeerBeaconAndProbeRspSanity(IN PRTMP_ADAPTER pAd, IN VOID * Msg, IN ULON
        PEID_STRUCT pEid;
        UCHAR SubType;
        UCHAR Sanity;
-       //UCHAR                             ECWMin, ECWMax;
-       //MAC_CSR9_STRUC            Csr9;
+       /*UCHAR                             ECWMin, ECWMax; */
+       /*MAC_CSR9_STRUC            Csr9; */
        ULONG Length = 0;
 
-       // For some 11a AP which didn't have DS_IE, we use two conditions to decide the channel
-       //      1. If the AP is 11n enabled, then check the control channel.
-       //      2. If the AP didn't have any info about channel, use the channel we received this frame as the channel. (May inaccuracy!!)
+       /* For some 11a AP which didn't have DS_IE, we use two conditions to decide the channel */
+       /*      1. If the AP is 11n enabled, then check the control channel. */
+       /*      2. If the AP didn't have any info about channel, use the channel we received this frame as the channel. (May inaccuracy!!) */
        UCHAR CtrlChannel = 0;
 
-       // Add for 3 necessary EID field check
+       /* Add for 3 necessary EID field check */
        Sanity = 0;
 
        *pAtimWin = 0;
@@ -269,34 +269,34 @@ BOOLEAN PeerBeaconAndProbeRspSanity(IN PRTMP_ADAPTER pAd, IN VOID * Msg, IN ULON
        *pBcastFlag = 0;
        *pMessageToMe = 0;
        *pExtRateLen = 0;
-       *pCkipFlag = 0;         // Default of CkipFlag is 0
-       *pAironetCellPowerLimit = 0xFF; // Default of AironetCellPowerLimit is 0xFF
-       *LengthVIE = 0;         // Set the length of VIE to init value 0
-       *pHtCapabilityLen = 0;  // Set the length of VIE to init value 0
+       *pCkipFlag = 0;         /* Default of CkipFlag is 0 */
+       *pAironetCellPowerLimit = 0xFF; /* Default of AironetCellPowerLimit is 0xFF */
+       *LengthVIE = 0;         /* Set the length of VIE to init value 0 */
+       *pHtCapabilityLen = 0;  /* Set the length of VIE to init value 0 */
        if (pAd->OpMode == OPMODE_STA)
-               *pPreNHtCapabilityLen = 0;      // Set the length of VIE to init value 0
-       *AddHtInfoLen = 0;      // Set the length of VIE to init value 0
+               *pPreNHtCapabilityLen = 0;      /* Set the length of VIE to init value 0 */
+       *AddHtInfoLen = 0;      /* Set the length of VIE to init value 0 */
        *pRalinkIe = 0;
        *pNewChannel = 0;
-       *NewExtChannelOffset = 0xff;    //Default 0xff means no such IE
-       pCfParm->bValid = FALSE;        // default: no IE_CF found
-       pQbssLoad->bValid = FALSE;      // default: no IE_QBSS_LOAD found
-       pEdcaParm->bValid = FALSE;      // default: no IE_EDCA_PARAMETER found
-       pQosCapability->bValid = FALSE; // default: no IE_QOS_CAPABILITY found
+       *NewExtChannelOffset = 0xff;    /*Default 0xff means no such IE */
+       pCfParm->bValid = FALSE;        /* default: no IE_CF found */
+       pQbssLoad->bValid = FALSE;      /* default: no IE_QBSS_LOAD found */
+       pEdcaParm->bValid = FALSE;      /* default: no IE_EDCA_PARAMETER found */
+       pQosCapability->bValid = FALSE; /* default: no IE_QOS_CAPABILITY found */
 
        pFrame = (PFRAME_802_11) Msg;
 
-       // get subtype from header
+       /* get subtype from header */
        SubType = (UCHAR) pFrame->Hdr.FC.SubType;
 
-       // get Addr2 and BSSID from header
+       /* get Addr2 and BSSID from header */
        COPY_MAC_ADDR(pAddr2, pFrame->Hdr.Addr2);
        COPY_MAC_ADDR(pBssid, pFrame->Hdr.Addr3);
 
        Ptr = pFrame->Octet;
        Length += LENGTH_802_11;
 
-       // get timestamp from payload and advance the pointer
+       /* get timestamp from payload and advance the pointer */
        NdisMoveMemory(pTimestamp, Ptr, TIMESTAMP_LEN);
 
        pTimestamp->u.LowPart = cpu2le32(pTimestamp->u.LowPart);
@@ -305,12 +305,12 @@ BOOLEAN PeerBeaconAndProbeRspSanity(IN PRTMP_ADAPTER pAd, IN VOID * Msg, IN ULON
        Ptr += TIMESTAMP_LEN;
        Length += TIMESTAMP_LEN;
 
-       // get beacon interval from payload and advance the pointer
+       /* get beacon interval from payload and advance the pointer */
        NdisMoveMemory(pBeaconPeriod, Ptr, 2);
        Ptr += 2;
        Length += 2;
 
-       // get capability info from payload and advance the pointer
+       /* get capability info from payload and advance the pointer */
        NdisMoveMemory(pCapabilityInfo, Ptr, 2);
        Ptr += 2;
        Length += 2;
@@ -322,11 +322,11 @@ BOOLEAN PeerBeaconAndProbeRspSanity(IN PRTMP_ADAPTER pAd, IN VOID * Msg, IN ULON
 
        pEid = (PEID_STRUCT) Ptr;
 
-       // get variable fields from payload and advance the pointer
+       /* get variable fields from payload and advance the pointer */
        while ((Length + 2 + pEid->Len) <= MsgLen) {
-               //
-               // Secure copy VIE to VarIE[MAX_VIE_LEN] didn't overflow.
-               //
+               /* */
+               /* Secure copy VIE to VarIE[MAX_VIE_LEN] didn't overflow. */
+               /* */
                if ((*LengthVIE + pEid->Len + 2) >= MAX_VIE_LEN) {
                        DBGPRINT(RT_DEBUG_WARN,
                                 ("PeerBeaconAndProbeRspSanity - Variable IEs out of resource [len(=%d) > MAX_VIE_LEN(=%d)]\n",
@@ -336,7 +336,7 @@ BOOLEAN PeerBeaconAndProbeRspSanity(IN PRTMP_ADAPTER pAd, IN VOID * Msg, IN ULON
 
                switch (pEid->Eid) {
                case IE_SSID:
-                       // Already has one SSID EID in this beacon, ignore the second one
+                       /* Already has one SSID EID in this beacon, ignore the second one */
                        if (Sanity & 0x1)
                                break;
                        if (pEid->Len <= MAX_LEN_OF_SSID) {
@@ -357,11 +357,11 @@ BOOLEAN PeerBeaconAndProbeRspSanity(IN PRTMP_ADAPTER pAd, IN VOID * Msg, IN ULON
                                NdisMoveMemory(SupRate, pEid->Octet, pEid->Len);
                                *pSupRateLen = pEid->Len;
 
-                               // TODO: 2004-09-14 not a good design here, cause it exclude extra rates
-                               // from ScanTab. We should report as is. And filter out unsupported
-                               // rates in MlmeAux.
-                               // Check against the supported rates
-                               // RTMPCheckRates(pAd, SupRate, pSupRateLen);
+                               /* TODO: 2004-09-14 not a good design here, cause it exclude extra rates */
+                               /* from ScanTab. We should report as is. And filter out unsupported */
+                               /* rates in MlmeAux. */
+                               /* Check against the supported rates */
+                               /* RTMPCheckRates(pAd, SupRate, pSupRateLen); */
                        } else {
                                DBGPRINT(RT_DEBUG_TRACE,
                                         ("PeerBeaconAndProbeRspSanity - wrong IE_SUPP_RATES (len=%d)\n",
@@ -371,11 +371,11 @@ BOOLEAN PeerBeaconAndProbeRspSanity(IN PRTMP_ADAPTER pAd, IN VOID * Msg, IN ULON
                        break;
 
                case IE_HT_CAP:
-                       if (pEid->Len >= SIZE_HT_CAP_IE)        //Note: allow extension.!!
+                       if (pEid->Len >= SIZE_HT_CAP_IE)        /*Note: allow extension.!! */
                        {
                                NdisMoveMemory(pHtCapability, pEid->Octet,
                                               sizeof(HT_CAPABILITY_IE));
-                               *pHtCapabilityLen = SIZE_HT_CAP_IE;     // Nnow we only support 26 bytes.
+                               *pHtCapabilityLen = SIZE_HT_CAP_IE;     /* Nnow we only support 26 bytes. */
 
                                *(USHORT *) (&pHtCapability->HtCapInfo) =
                                    cpu2le16(*(USHORT *)
@@ -385,7 +385,7 @@ BOOLEAN PeerBeaconAndProbeRspSanity(IN PRTMP_ADAPTER pAd, IN VOID * Msg, IN ULON
                                             (&pHtCapability->ExtHtCapInfo));
 
                                {
-                                       *pPreNHtCapabilityLen = 0;      // Nnow we only support 26 bytes.
+                                       *pPreNHtCapabilityLen = 0;      /* Nnow we only support 26 bytes. */
 
                                        Ptr = (PUCHAR) pVIE;
                                        NdisMoveMemory(Ptr + *LengthVIE,
@@ -402,8 +402,8 @@ BOOLEAN PeerBeaconAndProbeRspSanity(IN PRTMP_ADAPTER pAd, IN VOID * Msg, IN ULON
                        break;
                case IE_ADD_HT:
                        if (pEid->Len >= sizeof(ADD_HT_INFO_IE)) {
-                               // This IE allows extension, but we can ignore extra bytes beyond our knowledge , so only
-                               // copy first sizeof(ADD_HT_INFO_IE)
+                               /* This IE allows extension, but we can ignore extra bytes beyond our knowledge , so only */
+                               /* copy first sizeof(ADD_HT_INFO_IE) */
                                NdisMoveMemory(AddHtInfo, pEid->Octet,
                                               sizeof(ADD_HT_INFO_IE));
                                *AddHtInfoLen = SIZE_ADD_HT_INFO_IE;
@@ -500,17 +500,17 @@ BOOLEAN PeerBeaconAndProbeRspSanity(IN PRTMP_ADAPTER pAd, IN VOID * Msg, IN ULON
                        break;
                case IE_CHANNEL_SWITCH_ANNOUNCEMENT:
                        if (pEid->Len == 3) {
-                               *pNewChannel = pEid->Octet[1];  //extract new channel number
+                               *pNewChannel = pEid->Octet[1];  /*extract new channel number */
                        }
                        break;
 
-                       // New for WPA
-                       // CCX v2 has the same IE, we need to parse that too
-                       // Wifi WMM use the same IE vale, need to parse that too
-                       // case IE_WPA:
+                       /* New for WPA */
+                       /* CCX v2 has the same IE, we need to parse that too */
+                       /* Wifi WMM use the same IE vale, need to parse that too */
+                       /* case IE_WPA: */
                case IE_VENDOR_SPECIFIC:
-                       // Check Broadcom/Atheros 802.11n OUI version, for HT Capability IE.
-                       // This HT IE is before IEEE draft set HT IE value.2006-09-28 by Jan.
+                       /* Check Broadcom/Atheros 802.11n OUI version, for HT Capability IE. */
+                       /* This HT IE is before IEEE draft set HT IE value.2006-09-28 by Jan. */
                        /*if (NdisEqualMemory(pEid->Octet, BROADCOM_OUI, 3) && (pEid->Len >= 4))
                           {
                           if ((pEid->Octet[3] == OUI_BROADCOM_HT) && (pEid->Len >= 30))
@@ -529,19 +529,19 @@ BOOLEAN PeerBeaconAndProbeRspSanity(IN PRTMP_ADAPTER pAd, IN VOID * Msg, IN ULON
                           }
                           }
                         */
-                       // Check the OUI version, filter out non-standard usage
+                       /* Check the OUI version, filter out non-standard usage */
                        if (NdisEqualMemory(pEid->Octet, RALINK_OUI, 3)
                            && (pEid->Len == 7)) {
-                               //*pRalinkIe = pEid->Octet[3];
+                               /**pRalinkIe = pEid->Octet[3]; */
                                if (pEid->Octet[3] != 0)
                                        *pRalinkIe = pEid->Octet[3];
                                else
-                                       *pRalinkIe = 0xf0000000;        // Set to non-zero value (can't set bit0-2) to represent this is Ralink Chip. So at linkup, we will set ralinkchip flag.
+                                       *pRalinkIe = 0xf0000000;        /* Set to non-zero value (can't set bit0-2) to represent this is Ralink Chip. So at linkup, we will set ralinkchip flag. */
                        }
-                       // This HT IE is before IEEE draft set HT IE value.2006-09-28 by Jan.
+                       /* This HT IE is before IEEE draft set HT IE value.2006-09-28 by Jan. */
 
-                       // Other vendors had production before IE_HT_CAP value is assigned. To backward support those old-firmware AP,
-                       // Check broadcom-defiend pre-802.11nD1.0 OUI for HT related IE, including HT Capatilities IE and HT Information IE
+                       /* Other vendors had production before IE_HT_CAP value is assigned. To backward support those old-firmware AP, */
+                       /* Check broadcom-defiend pre-802.11nD1.0 OUI for HT related IE, including HT Capatilities IE and HT Information IE */
                        else if ((*pHtCapabilityLen == 0)
                                 && NdisEqualMemory(pEid->Octet, PRE_N_HT_OUI,
                                                    3) && (pEid->Len >= 4)
@@ -564,7 +564,7 @@ BOOLEAN PeerBeaconAndProbeRspSanity(IN PRTMP_ADAPTER pAd, IN VOID * Msg, IN ULON
                                        *AddHtInfoLen = SIZE_ADD_HT_INFO_IE;
                                }
                        } else if (NdisEqualMemory(pEid->Octet, WPA_OUI, 4)) {
-                               // Copy to pVIE which will report to microsoft bssid list.
+                               /* Copy to pVIE which will report to microsoft bssid list. */
                                Ptr = (PUCHAR) pVIE;
                                NdisMoveMemory(Ptr + *LengthVIE, &pEid->Eid,
                                               pEid->Len + 2);
@@ -575,39 +575,39 @@ BOOLEAN PeerBeaconAndProbeRspSanity(IN PRTMP_ADAPTER pAd, IN VOID * Msg, IN ULON
                                PUCHAR ptr;
                                int i;
 
-                               // parsing EDCA parameters
+                               /* parsing EDCA parameters */
                                pEdcaParm->bValid = TRUE;
-                               pEdcaParm->bQAck = FALSE;       // pEid->Octet[0] & 0x10;
-                               pEdcaParm->bQueueRequest = FALSE;       // pEid->Octet[0] & 0x20;
-                               pEdcaParm->bTxopRequest = FALSE;        // pEid->Octet[0] & 0x40;
+                               pEdcaParm->bQAck = FALSE;       /* pEid->Octet[0] & 0x10; */
+                               pEdcaParm->bQueueRequest = FALSE;       /* pEid->Octet[0] & 0x20; */
+                               pEdcaParm->bTxopRequest = FALSE;        /* pEid->Octet[0] & 0x40; */
                                pEdcaParm->EdcaUpdateCount =
                                    pEid->Octet[6] & 0x0f;
                                pEdcaParm->bAPSDCapable =
                                    (pEid->Octet[6] & 0x80) ? 1 : 0;
                                ptr = &pEid->Octet[8];
                                for (i = 0; i < 4; i++) {
-                                       UCHAR aci = (*ptr & 0x60) >> 5; // b5~6 is AC INDEX
-                                       pEdcaParm->bACM[aci] = (((*ptr) & 0x10) == 0x10);       // b5 is ACM
-                                       pEdcaParm->Aifsn[aci] = (*ptr) & 0x0f;  // b0~3 is AIFSN
-                                       pEdcaParm->Cwmin[aci] = *(ptr + 1) & 0x0f;      // b0~4 is Cwmin
-                                       pEdcaParm->Cwmax[aci] = *(ptr + 1) >> 4;        // b5~8 is Cwmax
-                                       pEdcaParm->Txop[aci] = *(ptr + 2) + 256 * (*(ptr + 3)); // in unit of 32-us
-                                       ptr += 4;       // point to next AC
+                                       UCHAR aci = (*ptr & 0x60) >> 5; /* b5~6 is AC INDEX */
+                                       pEdcaParm->bACM[aci] = (((*ptr) & 0x10) == 0x10);       /* b5 is ACM */
+                                       pEdcaParm->Aifsn[aci] = (*ptr) & 0x0f;  /* b0~3 is AIFSN */
+                                       pEdcaParm->Cwmin[aci] = *(ptr + 1) & 0x0f;      /* b0~4 is Cwmin */
+                                       pEdcaParm->Cwmax[aci] = *(ptr + 1) >> 4;        /* b5~8 is Cwmax */
+                                       pEdcaParm->Txop[aci] = *(ptr + 2) + 256 * (*(ptr + 3)); /* in unit of 32-us */
+                                       ptr += 4;       /* point to next AC */
                                }
                        } else
                            if (NdisEqualMemory(pEid->Octet, WME_INFO_ELEM, 6)
                                && (pEid->Len == 7)) {
-                               // parsing EDCA parameters
+                               /* parsing EDCA parameters */
                                pEdcaParm->bValid = TRUE;
-                               pEdcaParm->bQAck = FALSE;       // pEid->Octet[0] & 0x10;
-                               pEdcaParm->bQueueRequest = FALSE;       // pEid->Octet[0] & 0x20;
-                               pEdcaParm->bTxopRequest = FALSE;        // pEid->Octet[0] & 0x40;
+                               pEdcaParm->bQAck = FALSE;       /* pEid->Octet[0] & 0x10; */
+                               pEdcaParm->bQueueRequest = FALSE;       /* pEid->Octet[0] & 0x20; */
+                               pEdcaParm->bTxopRequest = FALSE;        /* pEid->Octet[0] & 0x40; */
                                pEdcaParm->EdcaUpdateCount =
                                    pEid->Octet[6] & 0x0f;
                                pEdcaParm->bAPSDCapable =
                                    (pEid->Octet[6] & 0x80) ? 1 : 0;
 
-                               // use default EDCA parameter
+                               /* use default EDCA parameter */
                                pEdcaParm->bACM[QID_AC_BE] = 0;
                                pEdcaParm->Aifsn[QID_AC_BE] = 3;
                                pEdcaParm->Cwmin[QID_AC_BE] = CW_MIN_IN_BITS;
@@ -625,7 +625,7 @@ BOOLEAN PeerBeaconAndProbeRspSanity(IN PRTMP_ADAPTER pAd, IN VOID * Msg, IN ULON
                                pEdcaParm->Cwmin[QID_AC_VI] =
                                    CW_MIN_IN_BITS - 1;
                                pEdcaParm->Cwmax[QID_AC_VI] = CW_MAX_IN_BITS;
-                               pEdcaParm->Txop[QID_AC_VI] = 96;        // AC_VI: 96*32us ~= 3ms
+                               pEdcaParm->Txop[QID_AC_VI] = 96;        /* AC_VI: 96*32us ~= 3ms */
 
                                pEdcaParm->bACM[QID_AC_VO] = 0;
                                pEdcaParm->Aifsn[QID_AC_VO] = 2;
@@ -633,7 +633,7 @@ BOOLEAN PeerBeaconAndProbeRspSanity(IN PRTMP_ADAPTER pAd, IN VOID * Msg, IN ULON
                                    CW_MIN_IN_BITS - 2;
                                pEdcaParm->Cwmax[QID_AC_VO] =
                                    CW_MAX_IN_BITS - 1;
-                               pEdcaParm->Txop[QID_AC_VO] = 48;        // AC_VO: 48*32us ~= 1.5ms
+                               pEdcaParm->Txop[QID_AC_VO] = 48;        /* AC_VO: 48*32us ~= 1.5ms */
                        }
 
                        break;
@@ -643,11 +643,11 @@ BOOLEAN PeerBeaconAndProbeRspSanity(IN PRTMP_ADAPTER pAd, IN VOID * Msg, IN ULON
                                NdisMoveMemory(ExtRate, pEid->Octet, pEid->Len);
                                *pExtRateLen = pEid->Len;
 
-                               // TODO: 2004-09-14 not a good design here, cause it exclude extra rates
-                               // from ScanTab. We should report as is. And filter out unsupported
-                               // rates in MlmeAux.
-                               // Check against the supported rates
-                               // RTMPCheckRates(pAd, ExtRate, pExtRateLen);
+                               /* TODO: 2004-09-14 not a good design here, cause it exclude extra rates */
+                               /* from ScanTab. We should report as is. And filter out unsupported */
+                               /* rates in MlmeAux. */
+                               /* Check against the supported rates */
+                               /* RTMPCheckRates(pAd, ExtRate, pExtRateLen); */
                        }
                        break;
 
@@ -658,32 +658,32 @@ BOOLEAN PeerBeaconAndProbeRspSanity(IN PRTMP_ADAPTER pAd, IN VOID * Msg, IN ULON
                        break;
 
                case IE_AIRONET_CKIP:
-                       // 0. Check Aironet IE length, it must be larger or equal to 28
-                       // Cisco AP350 used length as 28
-                       // Cisco AP12XX used length as 30
+                       /* 0. Check Aironet IE length, it must be larger or equal to 28 */
+                       /* Cisco AP350 used length as 28 */
+                       /* Cisco AP12XX used length as 30 */
                        if (pEid->Len < (CKIP_NEGOTIATION_LENGTH - 2))
                                break;
 
-                       // 1. Copy CKIP flag byte to buffer for process
+                       /* 1. Copy CKIP flag byte to buffer for process */
                        *pCkipFlag = *(pEid->Octet + 8);
                        break;
 
                case IE_AP_TX_POWER:
-                       // AP Control of Client Transmit Power
-                       //0. Check Aironet IE length, it must be 6
+                       /* AP Control of Client Transmit Power */
+                       /*0. Check Aironet IE length, it must be 6 */
                        if (pEid->Len != 0x06)
                                break;
 
-                       // Get cell power limit in dBm
+                       /* Get cell power limit in dBm */
                        if (NdisEqualMemory(pEid->Octet, CISCO_OUI, 3) == 1)
                                *pAironetCellPowerLimit = *(pEid->Octet + 4);
                        break;
 
-                       // WPA2 & 802.11i RSN
+                       /* WPA2 & 802.11i RSN */
                case IE_RSN:
-                       // There is no OUI for version anymore, check the group cipher OUI before copying
+                       /* There is no OUI for version anymore, check the group cipher OUI before copying */
                        if (RTMPEqualMemory(pEid->Octet + 2, RSN_OUI, 3)) {
-                               // Copy to pVIE which will report to microsoft bssid list.
+                               /* Copy to pVIE which will report to microsoft bssid list. */
                                Ptr = (PUCHAR) pVIE;
                                NdisMoveMemory(Ptr + *LengthVIE, &pEid->Eid,
                                               pEid->Len + 2);
@@ -695,11 +695,11 @@ BOOLEAN PeerBeaconAndProbeRspSanity(IN PRTMP_ADAPTER pAd, IN VOID * Msg, IN ULON
                        break;
                }
 
-               Length = Length + 2 + pEid->Len;        // Eid[1] + Len[1]+ content[Len]
+               Length = Length + 2 + pEid->Len;        /* Eid[1] + Len[1]+ content[Len] */
                pEid = (PEID_STRUCT) ((UCHAR *) pEid + 2 + pEid->Len);
        }
 
-       // For some 11a AP. it did not have the channel EID, patch here
+       /* For some 11a AP. it did not have the channel EID, patch here */
        {
                UCHAR LatchRfChannel = MsgChannel;
                if ((pAd->LatchRfRegs.Channel > 14) && ((Sanity & 0x4) == 0)) {
@@ -756,7 +756,7 @@ BOOLEAN MlmeScanReqSanity(IN PRTMP_ADAPTER pAd,
        }
 }
 
-// IRQL = DISPATCH_LEVEL
+/* IRQL = DISPATCH_LEVEL */
 UCHAR ChannelSanity(IN PRTMP_ADAPTER pAd, IN UCHAR channel)
 {
        int i;
@@ -897,9 +897,9 @@ BOOLEAN MlmeAssocReqSanity(IN PRTMP_ADAPTER pAd,
        MLME_ASSOC_REQ_STRUCT *pInfo;
 
        pInfo = (MLME_ASSOC_REQ_STRUCT *) Msg;
-       *pTimeout = pInfo->Timeout;     // timeout
-       COPY_MAC_ADDR(pApAddr, pInfo->Addr);    // AP address
-       *pCapabilityInfo = pInfo->CapabilityInfo;       // capability info
+       *pTimeout = pInfo->Timeout;     /* timeout */
+       COPY_MAC_ADDR(pApAddr, pInfo->Addr);    /* AP address */
+       *pCapabilityInfo = pInfo->CapabilityInfo;       /* capability info */
        *pListenIntv = pInfo->ListenIntv;
 
        return TRUE;
@@ -954,36 +954,36 @@ NDIS_802_11_NETWORK_TYPE NetworkTypeInUseSanity(IN PBSS_ENTRY pBss)
        NetWorkType = Ndis802_11DS;
 
        if (pBss->Channel <= 14) {
-               //
-               // First check support Rate.
-               //
+               /* */
+               /* First check support Rate. */
+               /* */
                for (i = 0; i < pBss->SupRateLen; i++) {
-                       rate = pBss->SupRate[i] & 0x7f; // Mask out basic rate set bit
+                       rate = pBss->SupRate[i] & 0x7f; /* Mask out basic rate set bit */
                        if ((rate == 2) || (rate == 4) || (rate == 11)
                            || (rate == 22)) {
                                continue;
                        } else {
-                               //
-                               // Otherwise (even rate > 108) means Ndis802_11OFDM24
-                               //
+                               /* */
+                               /* Otherwise (even rate > 108) means Ndis802_11OFDM24 */
+                               /* */
                                NetWorkType = Ndis802_11OFDM24;
                                break;
                        }
                }
 
-               //
-               // Second check Extend Rate.
-               //
+               /* */
+               /* Second check Extend Rate. */
+               /* */
                if (NetWorkType != Ndis802_11OFDM24) {
                        for (i = 0; i < pBss->ExtRateLen; i++) {
-                               rate = pBss->SupRate[i] & 0x7f; // Mask out basic rate set bit
+                               rate = pBss->SupRate[i] & 0x7f; /* Mask out basic rate set bit */
                                if ((rate == 2) || (rate == 4) || (rate == 11)
                                    || (rate == 22)) {
                                        continue;
                                } else {
-                                       //
-                                       // Otherwise (even rate > 108) means Ndis802_11OFDM24
-                                       //
+                                       /* */
+                                       /* Otherwise (even rate > 108) means Ndis802_11OFDM24 */
+                                       /* */
                                        NetWorkType = Ndis802_11OFDM24;
                                        break;
                                }
@@ -1033,22 +1033,22 @@ BOOLEAN PeerWpaMessageSanity(IN PRTMP_ADAPTER pAd,
 
        *((USHORT *) & EapolKeyInfo) = cpu2le16(*((USHORT *) & EapolKeyInfo));
 
-       // Choose WPA2 or not
+       /* Choose WPA2 or not */
        if ((pEntry->AuthMode == Ndis802_11AuthModeWPA2)
            || (pEntry->AuthMode == Ndis802_11AuthModeWPA2PSK))
                bWPA2 = TRUE;
 
-       // 0. Check MsgType
+       /* 0. Check MsgType */
        if ((MsgType > EAPOL_GROUP_MSG_2) || (MsgType < EAPOL_PAIR_MSG_1)) {
                DBGPRINT(RT_DEBUG_ERROR,
                         ("The message type is invalid(%d)! \n", MsgType));
                return FALSE;
        }
-       // 1. Replay counter check
-       if (MsgType == EAPOL_PAIR_MSG_1 || MsgType == EAPOL_PAIR_MSG_3 || MsgType == EAPOL_GROUP_MSG_1) // For supplicant
+       /* 1. Replay counter check */
+       if (MsgType == EAPOL_PAIR_MSG_1 || MsgType == EAPOL_PAIR_MSG_3 || MsgType == EAPOL_GROUP_MSG_1) /* For supplicant */
        {
-               // First validate replay counter, only accept message with larger replay counter.
-               // Let equal pass, some AP start with all zero replay counter
+               /* First validate replay counter, only accept message with larger replay counter. */
+               /* Let equal pass, some AP start with all zero replay counter */
                UCHAR ZeroReplay[LEN_KEY_DESC_REPLAY];
 
                NdisZeroMemory(ZeroReplay, LEN_KEY_DESC_REPLAY);
@@ -1061,18 +1061,18 @@ BOOLEAN PeerWpaMessageSanity(IN PRTMP_ADAPTER pAd,
                      LEN_KEY_DESC_REPLAY) != 0)) {
                        bReplayDiff = TRUE;
                }
-       } else if (MsgType == EAPOL_PAIR_MSG_2 || MsgType == EAPOL_PAIR_MSG_4 || MsgType == EAPOL_GROUP_MSG_2)  // For authenticator
+       } else if (MsgType == EAPOL_PAIR_MSG_2 || MsgType == EAPOL_PAIR_MSG_4 || MsgType == EAPOL_GROUP_MSG_2)  /* For authenticator */
        {
-               // check Replay Counter coresponds to MSG from authenticator, otherwise discard
+               /* check Replay Counter coresponds to MSG from authenticator, otherwise discard */
                if (!NdisEqualMemory
                    (pMsg->KeyDesc.ReplayCounter, pEntry->R_Counter,
                     LEN_KEY_DESC_REPLAY)) {
                        bReplayDiff = TRUE;
                }
        }
-       // Replay Counter different condition
+       /* Replay Counter different condition */
        if (bReplayDiff) {
-               // send wireless event - for replay counter different
+               /* send wireless event - for replay counter different */
                if (pAd->CommonCfg.bWirelessEvent)
                        RTMPSendWirelessEvent(pAd,
                                              IW_REPLAY_COUNTER_DIFF_EVENT_FLAG,
@@ -1094,20 +1094,20 @@ BOOLEAN PeerWpaMessageSanity(IN PRTMP_ADAPTER pAd,
                         LEN_KEY_DESC_REPLAY);
                return FALSE;
        }
-       // 2. Verify MIC except Pairwise Msg1
+       /* 2. Verify MIC except Pairwise Msg1 */
        if (MsgType != EAPOL_PAIR_MSG_1) {
                UCHAR rcvd_mic[LEN_KEY_DESC_MIC];
 
-               // Record the received MIC for check later
+               /* Record the received MIC for check later */
                NdisMoveMemory(rcvd_mic, pMsg->KeyDesc.KeyMic,
                               LEN_KEY_DESC_MIC);
                NdisZeroMemory(pMsg->KeyDesc.KeyMic, LEN_KEY_DESC_MIC);
 
-               if (EapolKeyInfo.KeyDescVer == DESC_TYPE_TKIP)  // TKIP
+               if (EapolKeyInfo.KeyDescVer == DESC_TYPE_TKIP)  /* TKIP */
                {
                        HMAC_MD5(pEntry->PTK, LEN_EAP_MICK, (PUCHAR) pMsg,
                                 MsgLen, mic, MD5_DIGEST_SIZE);
-               } else if (EapolKeyInfo.KeyDescVer == DESC_TYPE_AES)    // AES
+               } else if (EapolKeyInfo.KeyDescVer == DESC_TYPE_AES)    /* AES */
                {
                        HMAC_SHA1(pEntry->PTK, LEN_EAP_MICK, (PUCHAR) pMsg,
                                  MsgLen, digest, SHA1_DIGEST_SIZE);
@@ -1115,7 +1115,7 @@ BOOLEAN PeerWpaMessageSanity(IN PRTMP_ADAPTER pAd,
                }
 
                if (!NdisEqualMemory(rcvd_mic, mic, LEN_KEY_DESC_MIC)) {
-                       // send wireless event - for MIC different
+                       /* send wireless event - for MIC different */
                        if (pAd->CommonCfg.bWirelessEvent)
                                RTMPSendWirelessEvent(pAd,
                                                      IW_MIC_DIFF_EVENT_FLAG,
@@ -1138,16 +1138,16 @@ BOOLEAN PeerWpaMessageSanity(IN PRTMP_ADAPTER pAd,
                        return FALSE;
                }
        }
-       // 1. Decrypt the Key Data field if GTK is included.
-       // 2. Extract the context of the Key Data field if it exist.
-       // The field in pairwise_msg_2_WPA1(WPA2) & pairwise_msg_3_WPA1 is clear.
-       // The field in group_msg_1_WPA1(WPA2) & pairwise_msg_3_WPA2 is encrypted.
+       /* 1. Decrypt the Key Data field if GTK is included. */
+       /* 2. Extract the context of the Key Data field if it exist. */
+       /* The field in pairwise_msg_2_WPA1(WPA2) & pairwise_msg_3_WPA1 is clear. */
+       /* The field in group_msg_1_WPA1(WPA2) & pairwise_msg_3_WPA2 is encrypted. */
        if (CONV_ARRARY_TO_UINT16(pMsg->KeyDesc.KeyDataLen) > 0) {
-               // Decrypt this field
+               /* Decrypt this field */
                if ((MsgType == EAPOL_PAIR_MSG_3 && bWPA2)
                    || (MsgType == EAPOL_GROUP_MSG_1)) {
                        if ((EapolKeyInfo.KeyDescVer == DESC_TYPE_AES)) {
-                               // AES
+                               /* AES */
                                AES_GTK_KEY_UNWRAP(&pEntry->PTK[16], KEYDATA,
                                                   CONV_ARRARY_TO_UINT16(pMsg->
                                                                         KeyDesc.
@@ -1156,17 +1156,17 @@ BOOLEAN PeerWpaMessageSanity(IN PRTMP_ADAPTER pAd,
                        } else {
                                INT i;
                                UCHAR Key[32];
-                               // Decrypt TKIP GTK
-                               // Construct 32 bytes RC4 Key
+                               /* Decrypt TKIP GTK */
+                               /* Construct 32 bytes RC4 Key */
                                NdisMoveMemory(Key, pMsg->KeyDesc.KeyIv, 16);
                                NdisMoveMemory(&Key[16], &pEntry->PTK[16], 16);
                                ARCFOUR_INIT(&pAd->PrivateInfo.WEPCONTEXT, Key,
                                             32);
-                               //discard first 256 bytes
+                               /*discard first 256 bytes */
                                for (i = 0; i < 256; i++)
                                        ARCFOUR_BYTE(&pAd->PrivateInfo.
                                                     WEPCONTEXT);
-                               // Decrypt GTK. Becareful, there is no ICV to check the result is correct or not
+                               /* Decrypt GTK. Becareful, there is no ICV to check the result is correct or not */
                                ARCFOUR_DECRYPT(&pAd->PrivateInfo.WEPCONTEXT,
                                                KEYDATA, pMsg->KeyDesc.KeyData,
                                                CONV_ARRARY_TO_UINT16(pMsg->
@@ -1187,10 +1187,10 @@ BOOLEAN PeerWpaMessageSanity(IN PRTMP_ADAPTER pAd,
                        return TRUE;
                }
 
-               // Parse Key Data field to
-               // 1. verify RSN IE for pairwise_msg_2_WPA1(WPA2) ,pairwise_msg_3_WPA1(WPA2)
-               // 2. verify KDE format for pairwise_msg_3_WPA2, group_msg_1_WPA2
-               // 3. update shared key for pairwise_msg_3_WPA2, group_msg_1_WPA1(WPA2)
+               /* Parse Key Data field to */
+               /* 1. verify RSN IE for pairwise_msg_2_WPA1(WPA2) ,pairwise_msg_3_WPA1(WPA2) */
+               /* 2. verify KDE format for pairwise_msg_3_WPA2, group_msg_1_WPA2 */
+               /* 3. update shared key for pairwise_msg_3_WPA2, group_msg_1_WPA1(WPA2) */
                if (!RTMPParseEapolKeyData(pAd, KEYDATA,
                                           CONV_ARRARY_TO_UINT16(pMsg->KeyDesc.
                                                                 KeyDataLen),
This page took 0.03927 seconds and 5 git commands to generate.