|
@@ -879,72 +879,6 @@ static int wma_fill_roam_synch_buffer(tp_wma_handle wma,
|
|
|
return 0;
|
|
|
}
|
|
|
|
|
|
-static void wma_update_roamed_peer_unicast_cipher(tp_wma_handle wma,
|
|
|
- uint32_t uc_cipher,
|
|
|
- uint32_t cipher_cap,
|
|
|
- uint8_t *peer_mac)
|
|
|
-{
|
|
|
- struct wlan_objmgr_peer *peer;
|
|
|
-
|
|
|
- if (!peer_mac) {
|
|
|
- wma_err("wma ctx or peer mac is NULL");
|
|
|
- return;
|
|
|
- }
|
|
|
-
|
|
|
- peer = wlan_objmgr_get_peer(wma->psoc,
|
|
|
- wlan_objmgr_pdev_get_pdev_id(wma->pdev),
|
|
|
- peer_mac, WLAN_LEGACY_WMA_ID);
|
|
|
- if (!peer) {
|
|
|
- wma_err("Peer of peer_mac "QDF_MAC_ADDR_FMT" not found",
|
|
|
- QDF_MAC_ADDR_REF(peer_mac));
|
|
|
- return;
|
|
|
- }
|
|
|
- wlan_crypto_set_peer_param(peer, WLAN_CRYPTO_PARAM_CIPHER_CAP,
|
|
|
- cipher_cap);
|
|
|
- wlan_crypto_set_peer_param(peer, WLAN_CRYPTO_PARAM_UCAST_CIPHER,
|
|
|
- uc_cipher);
|
|
|
-
|
|
|
- wlan_objmgr_peer_release_ref(peer, WLAN_LEGACY_WMA_ID);
|
|
|
-
|
|
|
- wma_debug("Set unicast cipher %x and cap %x for "QDF_MAC_ADDR_FMT,
|
|
|
- uc_cipher, cipher_cap, QDF_MAC_ADDR_REF(peer_mac));
|
|
|
-}
|
|
|
-
|
|
|
-static void wma_get_peer_uc_cipher(tp_wma_handle wma, uint8_t *peer_mac,
|
|
|
- uint32_t *uc_cipher, uint32_t *cipher_cap)
|
|
|
-{
|
|
|
- int32_t cipher, cap;
|
|
|
- struct wlan_objmgr_peer *peer;
|
|
|
-
|
|
|
- if (!peer_mac) {
|
|
|
- wma_err("wma ctx or peer_mac is NULL");
|
|
|
- return;
|
|
|
- }
|
|
|
- peer = wlan_objmgr_get_peer(wma->psoc,
|
|
|
- wlan_objmgr_pdev_get_pdev_id(wma->pdev),
|
|
|
- peer_mac, WLAN_LEGACY_WMA_ID);
|
|
|
- if (!peer) {
|
|
|
- wma_err("Peer of peer_mac "QDF_MAC_ADDR_FMT" not found",
|
|
|
- QDF_MAC_ADDR_REF(peer_mac));
|
|
|
- return;
|
|
|
- }
|
|
|
-
|
|
|
- cipher = wlan_crypto_get_peer_param(peer,
|
|
|
- WLAN_CRYPTO_PARAM_UCAST_CIPHER);
|
|
|
- cap = wlan_crypto_get_peer_param(peer, WLAN_CRYPTO_PARAM_CIPHER_CAP);
|
|
|
- wlan_objmgr_peer_release_ref(peer, WLAN_LEGACY_WMA_ID);
|
|
|
-
|
|
|
- if (cipher < 0 || cap < 0) {
|
|
|
- wma_err("Invalid mgmt cipher");
|
|
|
- return;
|
|
|
- }
|
|
|
-
|
|
|
- if (uc_cipher)
|
|
|
- *uc_cipher = cipher;
|
|
|
- if (cipher_cap)
|
|
|
- *cipher_cap = cap;
|
|
|
-}
|
|
|
-
|
|
|
/**
|
|
|
* wma_roam_update_vdev() - Update the STA and BSS
|
|
|
* @wma: Global WMA Handle
|
|
@@ -962,8 +896,8 @@ wma_roam_update_vdev(tp_wma_handle wma,
|
|
|
{
|
|
|
tDeleteStaParams *del_sta_params;
|
|
|
tAddStaParams *add_sta_params;
|
|
|
- uint32_t uc_cipher = 0, cipher_cap = 0;
|
|
|
uint8_t vdev_id, *bssid;
|
|
|
+ int32_t uc_cipher, cipher_cap;
|
|
|
|
|
|
vdev_id = roam_synch_ind_ptr->roamed_vdev_id;
|
|
|
wma->interfaces[vdev_id].nss = roam_synch_ind_ptr->nss;
|
|
@@ -995,21 +929,18 @@ wma_roam_update_vdev(tp_wma_handle wma,
|
|
|
return;
|
|
|
}
|
|
|
|
|
|
- /*
|
|
|
- * Get uc cipher of old peer to update new peer as it doesnt
|
|
|
- * change in roaming
|
|
|
- */
|
|
|
- wma_get_peer_uc_cipher(wma, bssid,
|
|
|
- &uc_cipher, &cipher_cap);
|
|
|
-
|
|
|
wma_delete_sta(wma, del_sta_params);
|
|
|
wma_delete_bss(wma, vdev_id);
|
|
|
wma_create_peer(wma, roam_synch_ind_ptr->bssid.bytes,
|
|
|
WMI_PEER_TYPE_DEFAULT, vdev_id);
|
|
|
|
|
|
/* Update new peer's uc cipher */
|
|
|
- wma_update_roamed_peer_unicast_cipher(wma, uc_cipher, cipher_cap,
|
|
|
- roam_synch_ind_ptr->bssid.bytes);
|
|
|
+ uc_cipher = wlan_crypto_get_param(wma->interfaces[vdev_id].vdev,
|
|
|
+ WLAN_CRYPTO_PARAM_UCAST_CIPHER);
|
|
|
+ cipher_cap = wlan_crypto_get_param(wma->interfaces[vdev_id].vdev,
|
|
|
+ WLAN_CRYPTO_PARAM_CIPHER_CAP);
|
|
|
+ wma_set_peer_ucast_cipher(roam_synch_ind_ptr->bssid.bytes, uc_cipher,
|
|
|
+ cipher_cap);
|
|
|
wma_add_bss_lfr3(wma, roam_synch_ind_ptr->add_bss_params);
|
|
|
wma_add_sta(wma, add_sta_params);
|
|
|
qdf_mem_copy(bssid, roam_synch_ind_ptr->bssid.bytes,
|