1
0

qcacld-3.0: Remove unused PMF code

PMF logic is moved to crypto so remove unused PMF code.

Change-Id: I141a7683879da8f1961183db6dd26285c7bf4c4a
CRs-Fixed: 2678890
Este cometimento está contido em:
Utkarsh Bhatnagar
2020-05-05 15:13:43 +05:30
cometido por nshrivas
ascendente 03aa3d8d58
cometimento 83a3de0def
6 ficheiros modificados com 4 adições e 206 eliminações

Ver ficheiro

@@ -5375,8 +5375,10 @@ static int32_t hdd_process_genie(struct hdd_adapter *adapter,
hdd_translate_rsn_to_csr_encryption_type(
dot11_rsn_ie.gp_cipher_suite);
#ifdef WLAN_FEATURE_11W
*mfp_required = (dot11_rsn_ie.RSN_Cap[0] >> 6) & 0x1;
*mfp_capable = csr_is_mfpc_capable(&dot11_rsn_ie);
*mfp_required = dot11_rsn_ie.RSN_Cap[0] &
WLAN_CRYPTO_RSN_CAP_MFP_REQUIRED;
*mfp_capable = dot11_rsn_ie.RSN_Cap[0] &
WLAN_CRYPTO_RSN_CAP_MFP_ENABLED;
#endif
qdf_mem_copy(&rsn_cap, dot11_rsn_ie.RSN_Cap, sizeof(rsn_cap));
wlan_crypto_set_vdev_param(adapter->vdev,

Ver ficheiro

@@ -944,10 +944,6 @@ struct join_req {
tAniEdType MCEncryptionType;
enum ani_akm_type akm;
#ifdef WLAN_FEATURE_11W
tAniEdType MgmtEncryptionType;
#endif
bool is11Rconnection;
bool is_adaptive_11r_connection;
#ifdef FEATURE_WLAN_ESE

Ver ficheiro

@@ -709,7 +709,6 @@ struct csr_roam_profile {
uint8_t MFPRequired;
uint8_t MFPCapable;
#endif
tAniEdType mgmt_encryption_type;
tCsrKeys Keys;
tCsrChannelInfo ChannelInfo;
uint32_t op_freq;
@@ -806,8 +805,6 @@ typedef struct tagCsrRoamConnectedProfile {
tCsrEncryptionList EncryptionInfo;
eCsrEncryptionType mcEncryptionType;
tCsrEncryptionList mcEncryptionInfo;
/* group management cipher suite used for 11w */
tAniEdType mgmt_encryption_type;
uint8_t country_code[WNI_CFG_COUNTRY_CODE_LEN];
uint32_t vht_channel_width;
tCsrKeys Keys;

Ver ficheiro

@@ -9389,8 +9389,6 @@ csr_roam_save_connected_information(struct mac_context *mac,
pConnectProfile->mcEncryptionType =
pProfile->negotiatedMCEncryptionType;
pConnectProfile->mcEncryptionInfo = pProfile->mcEncryptionType;
pConnectProfile->mgmt_encryption_type =
pProfile->mgmt_encryption_type;
pConnectProfile->BSSType = pProfile->BSSType;
pConnectProfile->modifyProfileFields.uapsd_mask =
pProfile->uapsd_mask;
@@ -15269,55 +15267,6 @@ static QDF_STATUS csr_set_ldpc_exception(struct mac_context *mac_ctx,
return QDF_STATUS_SUCCESS;
}
#ifdef WLAN_FEATURE_11W
/**
* csr_is_mfpc_capable() - is MFPC capable
* @ies: AP information element
*
* Return: true if MFPC capable, false otherwise
*/
bool csr_is_mfpc_capable(struct sDot11fIERSN *rsn)
{
bool mfpc_capable = false;
if (rsn && rsn->present &&
((rsn->RSN_Cap[0] >> 7) & 0x01))
mfpc_capable = true;
return mfpc_capable;
}
/**
* csr_set_mgmt_enc_type() - set mgmt enc type for PMF
* @profile: roam profile
* @ies: AP ie
* @csr_join_req: csr join req
*
* Return: void
*/
static void csr_set_mgmt_enc_type(struct csr_roam_profile *profile,
tDot11fBeaconIEs *ies,
struct join_req *csr_join_req)
{
if (profile->MFPEnabled)
csr_join_req->MgmtEncryptionType =
profile->mgmt_encryption_type;
else
csr_join_req->MgmtEncryptionType = eSIR_ED_NONE;
if (profile->MFPEnabled &&
!(profile->MFPRequired) &&
!csr_is_mfpc_capable(&ies->RSN))
csr_join_req->MgmtEncryptionType = eSIR_ED_NONE;
}
#else
static inline void csr_set_mgmt_enc_type(struct csr_roam_profile *profile,
tDot11fBeaconIEs *pIes,
struct join_req *csr_join_req)
{
}
#endif
#ifdef WLAN_FEATURE_FILS_SK
/*
* csr_update_fils_connection_info: Copy fils connection info to join request
@@ -16224,7 +16173,6 @@ QDF_STATUS csr_send_join_req_msg(struct mac_context *mac, uint32_t sessionId,
csr_join_req->MCEncryptionType =
csr_translate_encrypt_type_to_ed_type
(pProfile->negotiatedMCEncryptionType);
csr_set_mgmt_enc_type(pProfile, pIes, csr_join_req);
#ifdef FEATURE_WLAN_ESE
ese_config = mac->mlme_cfg->lfr.ese_enabled;
#endif

Ver ficheiro

@@ -1020,15 +1020,6 @@ csr_roam_set_bss_config_cfg(struct mac_context *mac_ctx, uint32_t session_id,
void csr_prune_channel_list_for_mode(struct mac_context *mac,
struct csr_channel *pChannelList);
#ifdef WLAN_FEATURE_11W
bool csr_is_mfpc_capable(struct sDot11fIERSN *rsn);
#else
static inline bool csr_is_mfpc_capable(struct sDot11fIERSN *rsn)
{
return false;
}
#endif
/**
* csr_get_rf_band()
*

Ver ficheiro

@@ -2627,68 +2627,6 @@ bool csr_is_profile_wapi(struct csr_roam_profile *pProfile)
}
#endif /* FEATURE_WLAN_WAPI */
#ifdef WLAN_FEATURE_11W
static bool csr_is_wpa_oui_equal(struct mac_context *mac, uint8_t *Oui1,
uint8_t *Oui2)
{
return !qdf_mem_cmp(Oui1, Oui2, CSR_WPA_OUI_SIZE);
}
static bool csr_is_oui_match(struct mac_context *mac,
uint8_t AllCyphers[][CSR_WPA_OUI_SIZE],
uint8_t cAllCyphers, uint8_t Cypher[], uint8_t Oui[])
{
bool fYes = false;
uint8_t idx;
for (idx = 0; idx < cAllCyphers; idx++) {
if (csr_is_wpa_oui_equal(mac, AllCyphers[idx], Cypher)) {
fYes = true;
break;
}
}
if (fYes && Oui)
qdf_mem_copy(Oui, AllCyphers[idx], CSR_WPA_OUI_SIZE);
return fYes;
}
/*
* csr_is_group_mgmt_gmac_128() - check whether oui is GMAC_128
* @mac: Global MAC context
* @all_suites: pointer to all supported akm suites
* @suite_count: all supported akm suites count
* @oui: Oui needs to be matched
*
* Return: True if OUI is GMAC_128, false otherwise
*/
static bool csr_is_group_mgmt_gmac_128(struct mac_context *mac,
uint8_t AllSuites[][CSR_RSN_OUI_SIZE],
uint8_t cAllSuites, uint8_t Oui[])
{
return csr_is_oui_match(mac, AllSuites, cAllSuites,
csr_group_mgmt_oui[ENUM_GMAC_128], Oui);
}
/*
* csr_is_group_mgmt_gmac_256() - check whether oui is GMAC_256
* @mac: Global MAC context
* @all_suites: pointer to all supported akm suites
* @suite_count: all supported akm suites count
* @oui: Oui needs to be matched
*
* Return: True if OUI is GMAC_256, false otherwise
*/
static bool csr_is_group_mgmt_gmac_256(struct mac_context *mac,
uint8_t AllSuites[][CSR_RSN_OUI_SIZE],
uint8_t cAllSuites, uint8_t Oui[])
{
return csr_is_oui_match(mac, AllSuites, cAllSuites,
csr_group_mgmt_oui[ENUM_GMAC_256], Oui);
}
#endif
bool csr_is_pmkid_found_for_peer(struct mac_context *mac,
struct csr_roam_session *session,
tSirMacAddr peer_mac_addr,
@@ -2976,78 +2914,6 @@ uint8_t csr_retrieve_wpa_ie(struct mac_context *mac, uint8_t session_id,
return cbWpaIe;
}
#ifdef WLAN_FEATURE_11W
/**
* csr_get_mc_mgmt_cipher(): Get mcast management cipher from profile rsn
* @mac: mac ctx
* @profile: connect profile
* @bss: ap scan entry
* @ap_ie: AP IE's
*
* Return: none
*/
static void csr_get_mc_mgmt_cipher(struct mac_context *mac,
struct csr_roam_profile *profile,
struct bss_description *bss,
tDot11fBeaconIEs *ap_ie)
{
int ret;
tDot11fIERSN rsn_ie = {0};
uint8_t n_mgmt_cipher = 1;
struct rsn_caps rsn_caps;
tDot11fBeaconIEs *local_ap_ie = ap_ie;
uint8_t grp_mgmt_arr[CSR_RSN_MAX_MULTICAST_CYPHERS][CSR_RSN_OUI_SIZE];
if (!profile->MFPEnabled)
return;
if (!local_ap_ie &&
(!QDF_IS_STATUS_SUCCESS(csr_get_parsed_bss_description_ies
(mac, bss, &local_ap_ie))))
return;
qdf_mem_copy(&rsn_caps, local_ap_ie->RSN.RSN_Cap, sizeof(rsn_caps));
if (!ap_ie && local_ap_ie)
/* locally allocated */
qdf_mem_free(local_ap_ie);
/* if AP is not PMF capable return */
if (!rsn_caps.MFPCapable)
return;
ret = dot11f_unpack_ie_rsn(mac, profile->pRSNReqIE + 2,
profile->nRSNReqIELength -2,
&rsn_ie, false);
if (DOT11F_FAILED(ret))
return;
qdf_mem_copy(&rsn_caps, rsn_ie.RSN_Cap, sizeof(rsn_caps));
/* if self cap is not PMF capable return */
if (!rsn_caps.MFPCapable)
return;
qdf_mem_copy(grp_mgmt_arr, rsn_ie.gp_mgmt_cipher_suite,
CSR_RSN_OUI_SIZE);
if (csr_is_group_mgmt_gmac_128(mac, grp_mgmt_arr, n_mgmt_cipher, NULL))
profile->mgmt_encryption_type = eSIR_ED_AES_GMAC_128;
else if (csr_is_group_mgmt_gmac_256(mac, grp_mgmt_arr,
n_mgmt_cipher, NULL))
profile->mgmt_encryption_type = eSIR_ED_AES_GMAC_256;
else
/* Default is CMAC */
profile->mgmt_encryption_type = eSIR_ED_AES_128_CMAC;
}
#else
static inline
void csr_get_mc_mgmt_cipher(struct mac_context *mac,
struct csr_roam_profile *profile,
struct bss_description *bss,
tDot11fBeaconIEs *ap_ie)
{
}
#endif
/* If a RSNIE exists in the profile, just use it. Or else construct
* one from the BSS Caller allocated memory for pWpaIe and guarrantee
* it can contain a max length WPA IE
@@ -3071,8 +2937,6 @@ uint8_t csr_retrieve_rsn_ie(struct mac_context *mac, uint32_t sessionId,
cbRsnIe = (uint8_t) pProfile->nRSNReqIELength;
qdf_mem_copy(pRsnIe, pProfile->pRSNReqIE,
cbRsnIe);
csr_get_mc_mgmt_cipher(mac, pProfile,
pSirBssDesc, pIes);
} else {
sme_warn("Invalid RSN IE length: %d",
pProfile->nRSNReqIELength);