__u8    params[0];
 };
 
-typedef struct sctp_addip_chunk {
+struct sctp_addip_chunk {
        struct sctp_chunkhdr chunk_hdr;
        struct sctp_addiphdr addip_hdr;
-} sctp_addip_chunk_t;
+};
 
 /* AUTH
  * Section 4.1  Authentication Chunk (AUTH)
 
                                        __be16 peer_port,
                                        struct sctp_transport **transportp)
 {
-       sctp_addip_chunk_t *asconf = (struct sctp_addip_chunk *)ch;
+       struct sctp_addip_chunk *asconf = (struct sctp_addip_chunk *)ch;
        struct sctp_af *af;
        union sctp_addr_param *param;
        union sctp_addr paddr;
 
                        struct sctp_chunk *chunk, bool addr_param_needed,
                        struct sctp_paramhdr **errp)
 {
-       sctp_addip_chunk_t *addip = (sctp_addip_chunk_t *) chunk->chunk_hdr;
+       struct sctp_addip_chunk *addip;
        union sctp_params param;
        bool addr_param_seen = false;
 
+       addip = (struct sctp_addip_chunk *)chunk->chunk_hdr;
        sctp_walk_params(param, addip, addip_hdr.params) {
                size_t length = ntohs(param.p->length);
 
 struct sctp_chunk *sctp_process_asconf(struct sctp_association *asoc,
                                       struct sctp_chunk *asconf)
 {
-       sctp_addip_chunk_t *addip = (sctp_addip_chunk_t *) asconf->chunk_hdr;
+       struct sctp_addip_chunk *addip;
        bool all_param_pass = true;
        union sctp_params param;
        struct sctp_addiphdr    *hdr;
        int     chunk_len;
        __u32   serial;
 
+       addip = (struct sctp_addip_chunk *)asconf->chunk_hdr;
        chunk_len = ntohs(asconf->chunk_hdr->length) -
                    sizeof(struct sctp_chunkhdr);
        hdr = (struct sctp_addiphdr *)asconf->skb->data;
        /* Skip the chunkhdr and addiphdr from the last asconf sent and store
         * a pointer to address parameter.
         */
-       length = sizeof(sctp_addip_chunk_t);
+       length = sizeof(struct sctp_addip_chunk);
        addr_param = (union sctp_addr_param *)(asconf->skb->data + length);
        asconf_len -= length;
 
 
         * described in [I-D.ietf-tsvwg-sctp-auth].
         */
        if (!net->sctp.addip_noauth && !chunk->auth)
-               return sctp_sf_discard_chunk(net, ep, asoc, type, arg, commands);
+               return sctp_sf_discard_chunk(net, ep, asoc, type, arg,
+                                            commands);
 
        /* Make sure that the ASCONF ADDIP chunk has a valid length.  */
-       if (!sctp_chunk_length_valid(chunk, sizeof(sctp_addip_chunk_t)))
+       if (!sctp_chunk_length_valid(chunk, sizeof(struct sctp_addip_chunk)))
                return sctp_sf_violation_chunklen(net, ep, asoc, type, arg,
                                                  commands);
 
         * described in [I-D.ietf-tsvwg-sctp-auth].
         */
        if (!net->sctp.addip_noauth && !asconf_ack->auth)
-               return sctp_sf_discard_chunk(net, ep, asoc, type, arg, commands);
+               return sctp_sf_discard_chunk(net, ep, asoc, type, arg,
+                                            commands);
 
        /* Make sure that the ADDIP chunk has a valid length.  */
-       if (!sctp_chunk_length_valid(asconf_ack, sizeof(sctp_addip_chunk_t)))
+       if (!sctp_chunk_length_valid(asconf_ack,
+                                    sizeof(struct sctp_addip_chunk)))
                return sctp_sf_violation_chunklen(net, ep, asoc, type, arg,
                                                  commands);