| .. | .. |
|---|
| 16 | 16 | /********************************************************************/ |
|---|
| 17 | 17 | int orinoco_mic_init(struct orinoco_private *priv) |
|---|
| 18 | 18 | { |
|---|
| 19 | | - priv->tx_tfm_mic = crypto_alloc_shash("michael_mic", 0, |
|---|
| 20 | | - CRYPTO_ALG_ASYNC); |
|---|
| 19 | + priv->tx_tfm_mic = crypto_alloc_shash("michael_mic", 0, 0); |
|---|
| 21 | 20 | if (IS_ERR(priv->tx_tfm_mic)) { |
|---|
| 22 | | - printk(KERN_DEBUG "orinoco_mic_init: could not allocate " |
|---|
| 23 | | - "crypto API michael_mic\n"); |
|---|
| 21 | + printk(KERN_DEBUG "%s: could not allocate " |
|---|
| 22 | + "crypto API michael_mic\n", __func__); |
|---|
| 24 | 23 | priv->tx_tfm_mic = NULL; |
|---|
| 25 | 24 | return -ENOMEM; |
|---|
| 26 | 25 | } |
|---|
| 27 | 26 | |
|---|
| 28 | | - priv->rx_tfm_mic = crypto_alloc_shash("michael_mic", 0, |
|---|
| 29 | | - CRYPTO_ALG_ASYNC); |
|---|
| 27 | + priv->rx_tfm_mic = crypto_alloc_shash("michael_mic", 0, 0); |
|---|
| 30 | 28 | if (IS_ERR(priv->rx_tfm_mic)) { |
|---|
| 31 | | - printk(KERN_DEBUG "orinoco_mic_init: could not allocate " |
|---|
| 32 | | - "crypto API michael_mic\n"); |
|---|
| 29 | + printk(KERN_DEBUG "%s: could not allocate " |
|---|
| 30 | + "crypto API michael_mic\n", __func__); |
|---|
| 33 | 31 | priv->rx_tfm_mic = NULL; |
|---|
| 34 | 32 | return -ENOMEM; |
|---|
| 35 | 33 | } |
|---|
| .. | .. |
|---|
| 54 | 52 | int err; |
|---|
| 55 | 53 | |
|---|
| 56 | 54 | if (tfm_michael == NULL) { |
|---|
| 57 | | - printk(KERN_WARNING "orinoco_mic: tfm_michael == NULL\n"); |
|---|
| 55 | + printk(KERN_WARNING "%s: tfm_michael == NULL\n", __func__); |
|---|
| 58 | 56 | return -1; |
|---|
| 59 | 57 | } |
|---|
| 60 | 58 | |
|---|
| .. | .. |
|---|
| 67 | 65 | hdr[ETH_ALEN * 2 + 3] = 0; |
|---|
| 68 | 66 | |
|---|
| 69 | 67 | desc->tfm = tfm_michael; |
|---|
| 70 | | - desc->flags = 0; |
|---|
| 71 | 68 | |
|---|
| 72 | 69 | err = crypto_shash_setkey(tfm_michael, key, MIC_KEYLEN); |
|---|
| 73 | 70 | if (err) |
|---|