]> git.karo-electronics.de Git - karo-tx-linux.git/commitdiff
Staging: rtl8723au: core: Remove unused variable
authorShraddha Barke <shraddha.6596@gmail.com>
Sat, 22 Aug 2015 10:58:14 +0000 (16:28 +0530)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Sun, 13 Sep 2015 01:24:37 +0000 (18:24 -0700)
This patch discards the variable as it is not used anywhere throughout
the kernel.

Signed-off-by: Shraddha Barke <shraddha.6596@gmail.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
drivers/staging/rtl8723au/core/rtw_security.c

index 3d40bab1d9c8f1d934f0e49cbdd14bdf632a6e26..82518cd3433a2d186a601c0df27a4b2a15391876 100644 (file)
@@ -608,7 +608,6 @@ int rtw_tkip_encrypt23a(struct rtw_adapter *padapter,
        u8 hw_hdr_offset = 0;
        struct arc4context mycontext;
        int curfragnum, length;
-       u32 prwskeylen;
        u8 *pframe, *payload, *iv, *prwskey;
        union pn48 dot11txpn;
        struct sta_info *stainfo;
@@ -655,8 +654,6 @@ int rtw_tkip_encrypt23a(struct rtw_adapter *padapter,
        else
                prwskey = &stainfo->dot118021x_UncstKey.skey[0];
 
-       prwskeylen = 16;
-
        /* 4 start to encrypt each fragment */
        for (curfragnum = 0; curfragnum < pattrib->nr_frags; curfragnum++) {
                iv = pframe + pattrib->hdrlen;
@@ -719,7 +716,6 @@ int rtw_tkip_decrypt23a(struct rtw_adapter *padapter,
        u32 actual_crc, expected_crc;
        struct arc4context mycontext;
        int length;
-       u32 prwskeylen;
        u8 *pframe, *payload, *iv, *prwskey;
        union pn48 dot11txpn;
        struct sta_info *stainfo;
@@ -749,12 +745,10 @@ int rtw_tkip_decrypt23a(struct rtw_adapter *padapter,
                        goto exit;
                }
                prwskey = psecuritypriv->dot118021XGrpKey[prxattrib->key_index].skey;
-               prwskeylen = 16;
        } else {
                RT_TRACE(_module_rtl871x_security_c_, _drv_err_,
                         "%s: stainfo!= NULL!!!\n", __func__);
                prwskey = &stainfo->dot118021x_UncstKey.skey[0];
-               prwskeylen = 16;
        }
 
        iv = pframe + prxattrib->hdrlen;
@@ -1288,7 +1282,6 @@ int rtw_aes_encrypt23a(struct rtw_adapter *padapter,
 {      /* exclude ICV */
        /* Intermediate Buffers */
        int curfragnum, length;
-       u32 prwskeylen;
        u8 *pframe, *prwskey;
        u8 hw_hdr_offset = 0;
        struct sta_info *stainfo;
@@ -1335,8 +1328,6 @@ int rtw_aes_encrypt23a(struct rtw_adapter *padapter,
        else
                prwskey = &stainfo->dot118021x_UncstKey.skey[0];
 
-       prwskeylen = 16;
-
        for (curfragnum = 0; curfragnum < pattrib->nr_frags; curfragnum++) {
                /* 4 the last fragment */
                if ((curfragnum + 1) == pattrib->nr_frags) {