int host_int_add_wep_key_bss_ap(struct host_if_drv *hif_drv,
const u8 *key,
- u8 u8WepKeylen,
+ u8 len,
u8 u8Keyidx,
u8 u8mode,
enum AUTHTYPE tenuAuth_type)
memset(&msg, 0, sizeof(struct host_if_msg));
if (INFO) {
- for (i = 0; i < u8WepKeylen; i++)
+ for (i = 0; i < len; i++)
PRINT_INFO(HOSTAPD_DBG, "KEY is %x\n", key[i]);
}
msg.id = HOST_IF_MSG_KEY;
msg.body.key_info.type = WEP;
msg.body.key_info.action = ADDKEY_AP;
msg.drv = hif_drv;
- msg.body.key_info.attr.wep.key = kmalloc(u8WepKeylen, GFP_KERNEL);
- memcpy(msg.body.key_info.attr.wep.key, key, (u8WepKeylen));
- msg.body.key_info.attr.wep.key_len = (u8WepKeylen);
+ msg.body.key_info.attr.wep.key = kmalloc(len, GFP_KERNEL);
+ memcpy(msg.body.key_info.attr.wep.key, key, len);
+ msg.body.key_info.attr.wep.key_len = len;
msg.body.key_info.attr.wep.index = u8Keyidx;
msg.body.key_info.attr.wep.mode = u8mode;
msg.body.key_info.attr.wep.auth_type = tenuAuth_type;
* @date 28 Feb 2013
* @version 1.0
*/
-int host_int_add_wep_key_bss_ap(struct host_if_drv *hif_drv, const u8 *key, u8 u8WepKeylen, u8 u8Keyidx, u8 u8mode, enum AUTHTYPE tenuAuth_type);
+int host_int_add_wep_key_bss_ap(struct host_if_drv *hif_drv, const u8 *key, u8 len, u8 u8Keyidx, u8 u8mode, enum AUTHTYPE tenuAuth_type);
/**
* @brief adds ptk Key