|
@@ -793,14 +793,14 @@ QDF_STATUS wlan_crypto_setkey(struct wlan_objmgr_vdev *vdev,
|
|
|
return QDF_STATUS_SUCCESS;
|
|
|
}
|
|
|
crypto_err("req_key len zero");
|
|
|
- return QDF_STATUS_E_INVAL;
|
|
|
+ return QDF_STATUS_CRYPTO_INVALID_KEYLEN;
|
|
|
}
|
|
|
|
|
|
cipher = wlan_crypto_cipher_ops[req_key->type];
|
|
|
|
|
|
if (!cipher && !IS_MGMT_CIPHER(req_key->type)) {
|
|
|
crypto_err("cipher invalid");
|
|
|
- return QDF_STATUS_E_INVAL;
|
|
|
+ return QDF_STATUS_CRYPTO_INVALID_CIPHERTYPE;
|
|
|
}
|
|
|
|
|
|
if (cipher && (!IS_FILS_CIPHER(req_key->type)) &&
|
|
@@ -808,13 +808,13 @@ QDF_STATUS wlan_crypto_setkey(struct wlan_objmgr_vdev *vdev,
|
|
|
((req_key->keylen != (cipher->keylen / CRYPTO_NBBY)) &&
|
|
|
(req_key->type != WLAN_CRYPTO_CIPHER_WEP))) {
|
|
|
crypto_err("cipher invalid");
|
|
|
- return QDF_STATUS_E_INVAL;
|
|
|
+ return QDF_STATUS_CRYPTO_INVALID_CIPHERTYPE;
|
|
|
} else if ((req_key->type == WLAN_CRYPTO_CIPHER_WEP) &&
|
|
|
!((req_key->keylen == WLAN_CRYPTO_KEY_WEP40_LEN)
|
|
|
|| (req_key->keylen == WLAN_CRYPTO_KEY_WEP104_LEN)
|
|
|
|| (req_key->keylen == WLAN_CRYPTO_KEY_WEP128_LEN))) {
|
|
|
crypto_err("wep key len invalid. keylen: %d", req_key->keylen);
|
|
|
- return QDF_STATUS_E_INVAL;
|
|
|
+ return QDF_STATUS_CRYPTO_INVALID_KEYLEN;
|
|
|
}
|
|
|
|
|
|
if (req_key->keyix == WLAN_CRYPTO_KEYIX_NONE) {
|
|
@@ -826,7 +826,7 @@ QDF_STATUS wlan_crypto_setkey(struct wlan_objmgr_vdev *vdev,
|
|
|
} else {
|
|
|
if ((req_key->keyix >= WLAN_CRYPTO_MAX_VLANKEYIX)
|
|
|
&& (!IS_MGMT_CIPHER(req_key->type))) {
|
|
|
- return QDF_STATUS_E_INVAL;
|
|
|
+ return QDF_STATUS_CRYPTO_INVALID_KEYID;
|
|
|
}
|
|
|
|
|
|
req_key->flags |= (WLAN_CRYPTO_KEY_XMIT
|
|
@@ -874,7 +874,7 @@ QDF_STATUS wlan_crypto_setkey(struct wlan_objmgr_vdev *vdev,
|
|
|
!(is_bigtk(req_key->keyix))) {
|
|
|
crypto_err("igtk/bigtk key invalid keyid %d",
|
|
|
req_key->keyix);
|
|
|
- return QDF_STATUS_E_INVAL;
|
|
|
+ return QDF_STATUS_CRYPTO_INVALID_KEYID;
|
|
|
}
|
|
|
key = qdf_mem_malloc(sizeof(struct wlan_crypto_key));
|
|
|
if (!key)
|
|
@@ -902,11 +902,11 @@ QDF_STATUS wlan_crypto_setkey(struct wlan_objmgr_vdev *vdev,
|
|
|
} else {
|
|
|
if (IS_FILS_CIPHER(req_key->type)) {
|
|
|
crypto_err("FILS key is not for BroadCast pkt");
|
|
|
- return QDF_STATUS_E_INVAL;
|
|
|
+ return QDF_STATUS_CRYPTO_INVALID_CIPHERTYPE;
|
|
|
}
|
|
|
if (!HAS_MCAST_CIPHER(crypto_params, req_key->type)
|
|
|
&& (req_key->type != WLAN_CRYPTO_CIPHER_WEP)) {
|
|
|
- return QDF_STATUS_E_INVAL;
|
|
|
+ return QDF_STATUS_CRYPTO_INVALID_CIPHERTYPE;
|
|
|
}
|
|
|
if (!priv_key->key[req_key->keyix]) {
|
|
|
priv_key->key[req_key->keyix]
|
|
@@ -979,7 +979,7 @@ QDF_STATUS wlan_crypto_setkey(struct wlan_objmgr_vdev *vdev,
|
|
|
!(is_bigtk(req_key->keyix))) {
|
|
|
crypto_err("igtk/bigtk key invalid keyid %d",
|
|
|
req_key->keyix);
|
|
|
- status = QDF_STATUS_E_INVAL;
|
|
|
+ status = QDF_STATUS_CRYPTO_INVALID_KEYID;
|
|
|
goto err;
|
|
|
}
|
|
|
key = qdf_mem_malloc(sizeof(struct wlan_crypto_key));
|
|
@@ -1010,7 +1010,7 @@ QDF_STATUS wlan_crypto_setkey(struct wlan_objmgr_vdev *vdev,
|
|
|
kid = 0;
|
|
|
if (kid >= WLAN_CRYPTO_MAX_VLANKEYIX) {
|
|
|
crypto_err("invalid keyid %d", kid);
|
|
|
- status = QDF_STATUS_E_INVAL;
|
|
|
+ status = QDF_STATUS_CRYPTO_INVALID_KEYID;
|
|
|
goto err;
|
|
|
}
|
|
|
if (!priv_key->key[kid]) {
|