Received: by 2002:a05:6358:111d:b0:dc:6189:e246 with SMTP id f29csp475674rwi; Wed, 2 Nov 2022 14:15:59 -0700 (PDT) X-Google-Smtp-Source: AMsMyM6EatXQEEFJF/4+NkBbBwEp6JczRB+iBVH5VqXCGgo9kNEHIYE24MrJhk6X3CPr69lTS+DM X-Received: by 2002:a17:90b:1c0d:b0:213:1a9c:5b1 with SMTP id oc13-20020a17090b1c0d00b002131a9c05b1mr43581534pjb.188.1667423759304; Wed, 02 Nov 2022 14:15:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1667423759; cv=none; d=google.com; s=arc-20160816; b=Eh7c2Vm/2WGV36bJdaCntFzLLU3SChnNx1Ssr48IAHuNzkXG7IRUuCcA3lIg0ojmqc 4sZbtht3IMpnxJNfpeIh//xSKAYbYimUhzGLoeSJibo2TJtiubq6L6VRejHEGqTLkvVy uLwSfgfwnR3oLx5now5tzEG+C4EXJEUMjyfUNt503z7zwLEbokNue2IcakR40ni7v+7i qUH/KPQmdP8fxSm7paKGHr2FcqdRLNKcMfInjC0kRVwaBwo4BMO/0gsn0sVhZVM/YKqD OCWr+tDjQRKlT8MJ9qkeNQhiQqNbtEsDp7MvsdTegZqvB8oU0h6rrxB3dXw7WqCHDmtp HPsQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-disposition:mime-version:message-id :subject:to:from:date:dkim-signature; bh=eAXASzw9Lf0myuG+yWDZ1yNNfw0jbeLQUNvT/k9csEM=; b=Xj9NrOPI0sO6U983KAO6UQQBgzra0EeEz+GyHWtLf1HD0RBvsRNcbEsBj9TONcTas+ sgi9mW4Xj1ZYlOgndvafRVbAdp37jWnjEC0CP7LoYLDnWVVRmLFwCnlR4y2PEPJ7Ouoj ev9DQ557fBXVqZ34MZf4eXWh/knHZFQ/S+hk13cULYtx/xqf58Ndc/JD4UZaXDRChDMj bnPM375oxwq2zP23WbmnefLGlnlhgEDtccr4aj8RIi1me71w7aao2OZdjqNv7PTii7Yd fIUnayMTQM1jOf/SvNdr7caQ7Ixc0fViuMnws1a25HqJtIdyC5dJRs2t4IH4aZsyLO9r rA0g== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@mailo.com header.s=mailo header.b=Z+spEJBz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mailo.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id jg11-20020a17090326cb00b00182b78df2f8si15315650plb.495.2022.11.02.14.15.46; Wed, 02 Nov 2022 14:15:59 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=fail header.i=@mailo.com header.s=mailo header.b=Z+spEJBz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mailo.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231326AbiKBUxq (ORCPT + 98 others); Wed, 2 Nov 2022 16:53:46 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43648 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230353AbiKBUxo (ORCPT ); Wed, 2 Nov 2022 16:53:44 -0400 Received: from msg-4.mailo.com (msg-4.mailo.com [213.182.54.15]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 14ACB6443 for ; Wed, 2 Nov 2022 13:53:42 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=mailo.com; s=mailo; t=1667422403; bh=ErI90by0HaqztfHJ1f4QhDxXIDPNR+OgRqtS9KaMhGY=; h=X-EA-Auth:Date:From:To:Subject:Message-ID:MIME-Version: Content-Type; b=Z+spEJBzMVi5xKT7d/GwOuRCDppU2VG8/klxJ3GlwSg6QNuK+Dx/tsUnv1wDwlDBz ZxyoM1pKg3fwc1LCDN3r18jkY7dG2QY6HCHtQNZkEZPlhXyKhe+j7wtc7xrL3BhCrF BfDQyAv1c7PDMvQj2e/1RUkP6iUg/ND7BVa9a0aY= Received: by b-3.in.mailobj.net [192.168.90.13] with ESMTP via [213.182.55.206] Wed, 2 Nov 2022 21:53:23 +0100 (CET) X-EA-Auth: LajOJuXyvXTUK3TXRm9ZGJ+afNBNj9R0X2uGkBJY7ohaa+hZqXsqAMEV8G34qM/KM2uQ69ONy5JEI2kOjTS9Yr4+pu9o4qKv Date: Thu, 3 Nov 2022 02:23:18 +0530 From: Deepak R Varma To: outreachy@lists.linux.dev, Larry Finger , Phillip Potter , Pavel Skripkin , Greg Kroah-Hartman , linux-staging@lists.linux.dev, linux-kernel@vger.kernel.org Subject: [PATCH] staging: r8188eu: remove unused struct declarations Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Some structures are only declared but have not been used anywhere in the code. Remove such unused structs. Issue identified as part of coccicheck report driven code investigation. Suggested-by: Pavel Skripkin Signed-off-by: Deepak R Varma --- drivers/staging/r8188eu/include/wlan_bssdef.h | 42 ------------------- 1 file changed, 42 deletions(-) diff --git a/drivers/staging/r8188eu/include/wlan_bssdef.h b/drivers/staging/r8188eu/include/wlan_bssdef.h index 831c465df500..ffeafa19ef26 100644 --- a/drivers/staging/r8188eu/include/wlan_bssdef.h +++ b/drivers/staging/r8188eu/include/wlan_bssdef.h @@ -177,20 +177,6 @@ struct ndis_802_11_status_ind { /* MIC check time, 60 seconds. */ #define MIC_CHECK_TIME 60000000 -struct ndis_802_11_auth_evt { - struct ndis_802_11_status_ind Status; - struct ndis_802_11_auth_req Request[1]; -}; - -struct ndis_802_11_test { - u32 Length; - u32 Type; - union { - struct ndis_802_11_auth_evt AuthenticationEvent; - NDIS_802_11_RSSI RssiTrigger; - } tt; -}; - #ifndef Ndis802_11APMode #define Ndis802_11APMode (Ndis802_11InfrastructureMax+1) #endif @@ -279,34 +265,6 @@ enum UAPSD_MAX_SP { #define NUM_PRE_AUTH_KEY 16 #define NUM_PMKID_CACHE NUM_PRE_AUTH_KEY -/* -* WPA2 -*/ - -struct pmkid_candidate { - unsigned char BSSID[ETH_ALEN]; - u32 Flags; -}; - -struct ndis_802_11_pmkid_list { - u32 Version; /* Version of the structure */ - u32 NumCandidates; /* No. of pmkid candidates */ - struct pmkid_candidate CandidateList[1]; -}; - -struct ndis_802_11_auth_encrypt { - enum ndis_802_11_auth_mode AuthModeSupported; - enum ndis_802_11_wep_status EncryptStatusSupported; -}; - -struct ndis_802_11_cap { - u32 Length; - u32 Version; - u32 NoOfPMKIDs; - u32 NoOfAuthEncryptPairsSupported; - struct ndis_802_11_auth_encrypt AuthenticationEncryptionSupported[1]; -}; - u8 key_2char2num(u8 hch, u8 lch); u8 key_char2num(u8 ch); u8 str_2char2num(u8 hch, u8 lch); -- 2.34.1