mka: Fix a typo in macsec_capbility
Spell "capability" correctly in the variable name. Signed-off-by: Sabrina Dubroca <sd@queasysnail.net>
This commit is contained in:
parent
cb320a6d2d
commit
2e9448989f
2 changed files with 10 additions and 10 deletions
|
@ -122,7 +122,7 @@ ieee802_1x_mka_dump_basic_body(struct ieee802_1x_mka_basic_body *body)
|
||||||
wpa_printf(MSG_DEBUG, "\tPriority......: %d", body->priority);
|
wpa_printf(MSG_DEBUG, "\tPriority......: %d", body->priority);
|
||||||
wpa_printf(MSG_DEBUG, "\tKeySvr........: %d", body->key_server);
|
wpa_printf(MSG_DEBUG, "\tKeySvr........: %d", body->key_server);
|
||||||
wpa_printf(MSG_DEBUG, "\tMACSecDesired.: %d", body->macsec_desired);
|
wpa_printf(MSG_DEBUG, "\tMACSecDesired.: %d", body->macsec_desired);
|
||||||
wpa_printf(MSG_DEBUG, "\tMACSecCapable.: %d", body->macsec_capbility);
|
wpa_printf(MSG_DEBUG, "\tMACSecCapable.: %d", body->macsec_capability);
|
||||||
wpa_printf(MSG_DEBUG, "\tBody Length...: %d", (int) body_len);
|
wpa_printf(MSG_DEBUG, "\tBody Length...: %d", (int) body_len);
|
||||||
wpa_printf(MSG_DEBUG, "\tSCI MAC.......: " MACSTR,
|
wpa_printf(MSG_DEBUG, "\tSCI MAC.......: " MACSTR,
|
||||||
MAC2STR(body->actor_sci.addr));
|
MAC2STR(body->actor_sci.addr));
|
||||||
|
@ -680,7 +680,7 @@ ieee802_1x_mka_encode_basic_body(
|
||||||
body->key_server = participant->can_be_key_server;
|
body->key_server = participant->can_be_key_server;
|
||||||
|
|
||||||
body->macsec_desired = kay->macsec_desired;
|
body->macsec_desired = kay->macsec_desired;
|
||||||
body->macsec_capbility = kay->macsec_capable;
|
body->macsec_capability = kay->macsec_capable;
|
||||||
set_mka_param_body_len(body, length - MKA_HDR_LEN);
|
set_mka_param_body_len(body, length - MKA_HDR_LEN);
|
||||||
|
|
||||||
os_memcpy(body->actor_sci.addr, kay->actor_sci.addr,
|
os_memcpy(body->actor_sci.addr, kay->actor_sci.addr,
|
||||||
|
@ -766,14 +766,14 @@ ieee802_1x_mka_decode_basic_body(struct ieee802_1x_kay *kay, const u8 *mka_msg,
|
||||||
return NULL;
|
return NULL;
|
||||||
|
|
||||||
peer->macsec_desired = body->macsec_desired;
|
peer->macsec_desired = body->macsec_desired;
|
||||||
peer->macsec_capbility = body->macsec_capbility;
|
peer->macsec_capability = body->macsec_capability;
|
||||||
peer->is_key_server = (Boolean) body->key_server;
|
peer->is_key_server = (Boolean) body->key_server;
|
||||||
peer->key_server_priority = body->priority;
|
peer->key_server_priority = body->priority;
|
||||||
} else if (peer->mn < be_to_host32(body->actor_mn)) {
|
} else if (peer->mn < be_to_host32(body->actor_mn)) {
|
||||||
peer->mn = be_to_host32(body->actor_mn);
|
peer->mn = be_to_host32(body->actor_mn);
|
||||||
peer->expire = time(NULL) + MKA_LIFE_TIME / 1000;
|
peer->expire = time(NULL) + MKA_LIFE_TIME / 1000;
|
||||||
peer->macsec_desired = body->macsec_desired;
|
peer->macsec_desired = body->macsec_desired;
|
||||||
peer->macsec_capbility = body->macsec_capbility;
|
peer->macsec_capability = body->macsec_capability;
|
||||||
peer->is_key_server = (Boolean) body->key_server;
|
peer->is_key_server = (Boolean) body->key_server;
|
||||||
peer->key_server_priority = body->priority;
|
peer->key_server_priority = body->priority;
|
||||||
} else {
|
} else {
|
||||||
|
@ -2237,11 +2237,11 @@ ieee802_1x_kay_decide_macsec_use(
|
||||||
if (!peer->macsec_desired)
|
if (!peer->macsec_desired)
|
||||||
continue;
|
continue;
|
||||||
|
|
||||||
if (peer->macsec_capbility == MACSEC_CAP_NOT_IMPLEMENTED)
|
if (peer->macsec_capability == MACSEC_CAP_NOT_IMPLEMENTED)
|
||||||
continue;
|
continue;
|
||||||
|
|
||||||
less_capability = (less_capability < peer->macsec_capbility) ?
|
less_capability = (less_capability < peer->macsec_capability) ?
|
||||||
less_capability : peer->macsec_capbility;
|
less_capability : peer->macsec_capability;
|
||||||
has_peer = TRUE;
|
has_peer = TRUE;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -49,7 +49,7 @@ struct ieee802_1x_kay_peer {
|
||||||
Boolean is_key_server;
|
Boolean is_key_server;
|
||||||
u8 key_server_priority;
|
u8 key_server_priority;
|
||||||
Boolean macsec_desired;
|
Boolean macsec_desired;
|
||||||
enum macsec_cap macsec_capbility;
|
enum macsec_cap macsec_capability;
|
||||||
Boolean sak_used;
|
Boolean sak_used;
|
||||||
struct dl_list list;
|
struct dl_list list;
|
||||||
};
|
};
|
||||||
|
@ -268,13 +268,13 @@ struct ieee802_1x_mka_basic_body {
|
||||||
/* octet 3 */
|
/* octet 3 */
|
||||||
#if __BYTE_ORDER == __LITTLE_ENDIAN
|
#if __BYTE_ORDER == __LITTLE_ENDIAN
|
||||||
u32 length:4;
|
u32 length:4;
|
||||||
u32 macsec_capbility:2;
|
u32 macsec_capability:2;
|
||||||
u32 macsec_desired:1;
|
u32 macsec_desired:1;
|
||||||
u32 key_server:1;
|
u32 key_server:1;
|
||||||
#elif __BYTE_ORDER == __BIG_ENDIAN
|
#elif __BYTE_ORDER == __BIG_ENDIAN
|
||||||
u32 key_server:1;
|
u32 key_server:1;
|
||||||
u32 macsec_desired:1;
|
u32 macsec_desired:1;
|
||||||
u32 macsec_capbility:2;
|
u32 macsec_capability:2;
|
||||||
u32 length:4;
|
u32 length:4;
|
||||||
#endif
|
#endif
|
||||||
/* octet 4 */
|
/* octet 4 */
|
||||||
|
|
Loading…
Reference in a new issue