eth = (struct l2_ethhdr *) bp;
memcpy(eth->h_dest, addr, ETH_ALEN);
memcpy(eth->h_source, own_addr, ETH_ALEN);
- eth->h_proto = htons(ETH_P_EAPOL);
+ eth->h_proto = host_to_be16(ETH_P_EAPOL);
memcpy(eth+1, data, data_len);
wpa_hexdump(MSG_MSGDUMP, "TX EAPOL", bp, len);
os_memcpy(ethhdr->h_dest, sta->addr, ETH_ALEN);
os_memcpy(ethhdr->h_source, hapd->own_addr, ETH_ALEN);
- ethhdr->h_proto = htons(ETH_P_PREAUTH);
+ ethhdr->h_proto = host_to_be16(ETH_P_PREAUTH);
os_memcpy(ethhdr + 1, buf, len);
if (l2_packet_send(piface->l2, sta->addr, ETH_P_PREAUTH, (u8 *) ethhdr,
#include "sta_info.h"
#include "mlme.h"
#include "wpa.h"
+#include "tkip_countermeasures.h"
static void ieee80211_tkip_countermeasures_stop(void *eloop_ctx,
{
struct wpa_driver_broadcom_data *drv = priv;
/* SET_EAP_RESTRICT, SET_WEP_RESTRICT */
- int restrict = (enabled ? 1 : 0);
+ int _restrict = (enabled ? 1 : 0);
if (broadcom_ioctl(drv, WLC_SET_WEP_RESTRICT,
- &restrict, sizeof(restrict)) < 0 ||
+ &_restrict, sizeof(_restrict)) < 0 ||
broadcom_ioctl(drv, WLC_SET_EAP_RESTRICT,
- &restrict, sizeof(restrict)) < 0)
+ &_restrict, sizeof(_restrict)) < 0)
return -1;
return 0;
int reason_code)
{
struct wpa_driver_broadcom_data *drv = priv;
- return broadcom_ioctl(drv, WLC_DISASSOC, 0, 0);
+ return broadcom_ioctl(drv, WLC_DISASSOC, NULL, 0);
}
static int