qcacld-3.0: Rename pMac in lim_security_utils
Per the Linux coding style "mixed-case names are frowned upon" and "so-called Hungarian notation [...] is brain damaged." One identifier used extensively throughout the driver that violates both of these tenants is "pMac." In order to be compliant with the Linux coding style there is a campaign to rename all instances of this identifier. For this change rename all instances of "pMac" to "mac" in: lim_security_utils.c lim_security_utils.h Change-Id: I90e8e20148a6314ac7a53d71ce9bc5838c1d5d86 CRs-Fixed: 2355458
此提交包含在:
@@ -71,11 +71,11 @@
|
||||
* @return true if passed authType is enabled else false
|
||||
*/
|
||||
uint8_t
|
||||
lim_is_auth_algo_supported(tpAniSirGlobal pMac, tAniAuthType authType,
|
||||
lim_is_auth_algo_supported(tpAniSirGlobal mac, tAniAuthType authType,
|
||||
tpPESession psessionEntry)
|
||||
{
|
||||
bool algoEnable, privacyOptImp;
|
||||
struct wlan_mlme_wep_cfg *wep_params = &pMac->mlme_cfg->wep_params;
|
||||
struct wlan_mlme_wep_cfg *wep_params = &mac->mlme_cfg->wep_params;
|
||||
|
||||
if (authType == eSIR_OPEN_SYSTEM) {
|
||||
|
||||
@@ -127,13 +127,13 @@ lim_is_auth_algo_supported(tpAniSirGlobal pMac, tAniAuthType authType,
|
||||
*
|
||||
***NOTE:
|
||||
*
|
||||
* @param pMac - Pointer to Global MAC structure
|
||||
* @param mac - Pointer to Global MAC structure
|
||||
* @return None
|
||||
*/
|
||||
|
||||
void lim_init_pre_auth_list(tpAniSirGlobal pMac)
|
||||
void lim_init_pre_auth_list(tpAniSirGlobal mac)
|
||||
{
|
||||
pMac->lim.pLimPreAuthList = NULL;
|
||||
mac->lim.pLimPreAuthList = NULL;
|
||||
|
||||
} /*** end lim_init_pre_auth_list() ***/
|
||||
|
||||
@@ -150,22 +150,22 @@ void lim_init_pre_auth_list(tpAniSirGlobal pMac)
|
||||
*
|
||||
***NOTE:
|
||||
*
|
||||
* @param pMac - Pointer to Global MAC structure
|
||||
* @param mac - Pointer to Global MAC structure
|
||||
* @return None
|
||||
*/
|
||||
|
||||
void lim_delete_pre_auth_list(tpAniSirGlobal pMac)
|
||||
void lim_delete_pre_auth_list(tpAniSirGlobal mac)
|
||||
{
|
||||
struct tLimPreAuthNode *pCurrNode, *pTempNode;
|
||||
|
||||
pCurrNode = pTempNode = pMac->lim.pLimPreAuthList;
|
||||
pCurrNode = pTempNode = mac->lim.pLimPreAuthList;
|
||||
while (pCurrNode != NULL) {
|
||||
pTempNode = pCurrNode->next;
|
||||
lim_release_pre_auth_node(pMac, pCurrNode);
|
||||
lim_release_pre_auth_node(mac, pCurrNode);
|
||||
|
||||
pCurrNode = pTempNode;
|
||||
}
|
||||
pMac->lim.pLimPreAuthList = NULL;
|
||||
mac->lim.pLimPreAuthList = NULL;
|
||||
} /*** end lim_delete_pre_auth_list() ***/
|
||||
|
||||
/**
|
||||
@@ -189,10 +189,10 @@ void lim_delete_pre_auth_list(tpAniSirGlobal pMac)
|
||||
* @return Pointer to pre-auth node if found, else NULL
|
||||
*/
|
||||
|
||||
struct tLimPreAuthNode *lim_search_pre_auth_list(tpAniSirGlobal pMac,
|
||||
struct tLimPreAuthNode *lim_search_pre_auth_list(tpAniSirGlobal mac,
|
||||
tSirMacAddr macAddr)
|
||||
{
|
||||
struct tLimPreAuthNode *pTempNode = pMac->lim.pLimPreAuthList;
|
||||
struct tLimPreAuthNode *pTempNode = mac->lim.pLimPreAuthList;
|
||||
|
||||
while (pTempNode != NULL) {
|
||||
if (!qdf_mem_cmp((uint8_t *) macAddr,
|
||||
@@ -270,19 +270,19 @@ lim_delete_open_auth_pre_auth_node(tpAniSirGlobal mac_ctx)
|
||||
*
|
||||
***NOTE:
|
||||
*
|
||||
* @param pMac - Pointer to Global MAC structure
|
||||
* @param mac - Pointer to Global MAC structure
|
||||
* @param pAuthNode - Pointer to pre-auth node to be added to the list.
|
||||
*
|
||||
* @return None
|
||||
*/
|
||||
|
||||
void lim_add_pre_auth_node(tpAniSirGlobal pMac, struct tLimPreAuthNode *pAuthNode)
|
||||
void lim_add_pre_auth_node(tpAniSirGlobal mac, struct tLimPreAuthNode *pAuthNode)
|
||||
{
|
||||
pMac->lim.gLimNumPreAuthContexts++;
|
||||
mac->lim.gLimNumPreAuthContexts++;
|
||||
|
||||
pAuthNode->next = pMac->lim.pLimPreAuthList;
|
||||
pAuthNode->next = mac->lim.pLimPreAuthList;
|
||||
|
||||
pMac->lim.pLimPreAuthList = pAuthNode;
|
||||
mac->lim.pLimPreAuthList = pAuthNode;
|
||||
} /*** end lim_add_pre_auth_node() ***/
|
||||
|
||||
/**
|
||||
@@ -298,19 +298,19 @@ void lim_add_pre_auth_node(tpAniSirGlobal pMac, struct tLimPreAuthNode *pAuthNod
|
||||
*
|
||||
***NOTE:
|
||||
*
|
||||
* @param pMac - Pointer to Global MAC structure
|
||||
* @param mac - Pointer to Global MAC structure
|
||||
* @param pAuthNode - Pointer to Pre Auth node to be released
|
||||
* @return None
|
||||
*/
|
||||
|
||||
void lim_release_pre_auth_node(tpAniSirGlobal pMac, tpLimPreAuthNode pAuthNode)
|
||||
void lim_release_pre_auth_node(tpAniSirGlobal mac, tpLimPreAuthNode pAuthNode)
|
||||
{
|
||||
pAuthNode->fFree = 1;
|
||||
MTRACE(mac_trace
|
||||
(pMac, TRACE_CODE_TIMER_DEACTIVATE, NO_SESSION,
|
||||
(mac, TRACE_CODE_TIMER_DEACTIVATE, NO_SESSION,
|
||||
eLIM_PRE_AUTH_CLEANUP_TIMER));
|
||||
tx_timer_deactivate(&pAuthNode->timer);
|
||||
pMac->lim.gLimNumPreAuthContexts--;
|
||||
mac->lim.gLimNumPreAuthContexts--;
|
||||
} /*** end lim_release_pre_auth_node() ***/
|
||||
|
||||
/**
|
||||
@@ -329,18 +329,18 @@ void lim_release_pre_auth_node(tpAniSirGlobal pMac, tpLimPreAuthNode pAuthNode)
|
||||
*
|
||||
***NOTE:
|
||||
*
|
||||
* @param pMac - Pointer to Global MAC structure
|
||||
* @param mac - Pointer to Global MAC structure
|
||||
* @param peerMacAddr - MAC address of the STA that need to be deleted
|
||||
* from pre-auth node list.
|
||||
*
|
||||
* @return None
|
||||
*/
|
||||
|
||||
void lim_delete_pre_auth_node(tpAniSirGlobal pMac, tSirMacAddr macAddr)
|
||||
void lim_delete_pre_auth_node(tpAniSirGlobal mac, tSirMacAddr macAddr)
|
||||
{
|
||||
struct tLimPreAuthNode *pPrevNode, *pTempNode;
|
||||
|
||||
pTempNode = pPrevNode = pMac->lim.pLimPreAuthList;
|
||||
pTempNode = pPrevNode = mac->lim.pLimPreAuthList;
|
||||
|
||||
if (pTempNode == NULL)
|
||||
return;
|
||||
@@ -350,12 +350,12 @@ void lim_delete_pre_auth_node(tpAniSirGlobal pMac, tSirMacAddr macAddr)
|
||||
sizeof(tSirMacAddr))) {
|
||||
/* First node to be deleted */
|
||||
|
||||
pMac->lim.pLimPreAuthList = pTempNode->next;
|
||||
mac->lim.pLimPreAuthList = pTempNode->next;
|
||||
|
||||
pe_debug("first node to delete, Release data entry: %pK id %d peer",
|
||||
pTempNode, pTempNode->authNodeIdx);
|
||||
lim_print_mac_addr(pMac, macAddr, LOGD);
|
||||
lim_release_pre_auth_node(pMac, pTempNode);
|
||||
lim_print_mac_addr(mac, macAddr, LOGD);
|
||||
lim_release_pre_auth_node(mac, pTempNode);
|
||||
|
||||
return;
|
||||
}
|
||||
@@ -372,8 +372,8 @@ void lim_delete_pre_auth_node(tpAniSirGlobal pMac, tSirMacAddr macAddr)
|
||||
|
||||
pe_debug("subsequent node to delete, Release data entry: %pK id %d peer",
|
||||
pTempNode, pTempNode->authNodeIdx);
|
||||
lim_print_mac_addr(pMac, macAddr, LOG1);
|
||||
lim_release_pre_auth_node(pMac, pTempNode);
|
||||
lim_print_mac_addr(mac, macAddr, LOG1);
|
||||
lim_release_pre_auth_node(mac, pTempNode);
|
||||
|
||||
return;
|
||||
}
|
||||
@@ -383,7 +383,7 @@ void lim_delete_pre_auth_node(tpAniSirGlobal pMac, tSirMacAddr macAddr)
|
||||
}
|
||||
|
||||
pe_err("peer not found in pre-auth list, addr= ");
|
||||
lim_print_mac_addr(pMac, macAddr, LOGE);
|
||||
lim_print_mac_addr(mac, macAddr, LOGE);
|
||||
|
||||
} /*** end lim_delete_pre_auth_node() ***/
|
||||
|
||||
@@ -405,27 +405,27 @@ void lim_delete_pre_auth_node(tpAniSirGlobal pMac, tSirMacAddr macAddr)
|
||||
*
|
||||
***NOTE:
|
||||
*
|
||||
* @param pMac - Pointer to Global MAC structure
|
||||
* @param mac - Pointer to Global MAC structure
|
||||
* @param resultCode - result of authentication attempt
|
||||
* @return None
|
||||
*/
|
||||
|
||||
void
|
||||
lim_restore_from_auth_state(tpAniSirGlobal pMac, tSirResultCodes resultCode,
|
||||
lim_restore_from_auth_state(tpAniSirGlobal mac, tSirResultCodes resultCode,
|
||||
uint16_t protStatusCode, tpPESession sessionEntry)
|
||||
{
|
||||
tSirMacAddr currentBssId;
|
||||
tLimMlmAuthCnf mlmAuthCnf;
|
||||
|
||||
#ifdef FEATURE_WLAN_DIAG_SUPPORT
|
||||
lim_diag_event_report(pMac, WLAN_PE_DIAG_AUTH_COMP_EVENT, sessionEntry,
|
||||
lim_diag_event_report(mac, WLAN_PE_DIAG_AUTH_COMP_EVENT, sessionEntry,
|
||||
resultCode, protStatusCode);
|
||||
#endif
|
||||
|
||||
qdf_mem_copy((uint8_t *) &mlmAuthCnf.peerMacAddr,
|
||||
(uint8_t *) &pMac->lim.gpLimMlmAuthReq->peerMacAddr,
|
||||
(uint8_t *) &mac->lim.gpLimMlmAuthReq->peerMacAddr,
|
||||
sizeof(tSirMacAddr));
|
||||
mlmAuthCnf.authType = pMac->lim.gpLimMlmAuthReq->authType;
|
||||
mlmAuthCnf.authType = mac->lim.gpLimMlmAuthReq->authType;
|
||||
mlmAuthCnf.resultCode = resultCode;
|
||||
mlmAuthCnf.protStatusCode = protStatusCode;
|
||||
|
||||
@@ -433,14 +433,14 @@ lim_restore_from_auth_state(tpAniSirGlobal pMac, tSirResultCodes resultCode,
|
||||
mlmAuthCnf.sessionId = sessionEntry->peSessionId;
|
||||
|
||||
/* / Free up buffer allocated */
|
||||
/* / for pMac->lim.gLimMlmAuthReq */
|
||||
qdf_mem_free(pMac->lim.gpLimMlmAuthReq);
|
||||
pMac->lim.gpLimMlmAuthReq = NULL;
|
||||
/* / for mac->lim.gLimMlmAuthReq */
|
||||
qdf_mem_free(mac->lim.gpLimMlmAuthReq);
|
||||
mac->lim.gpLimMlmAuthReq = NULL;
|
||||
|
||||
sessionEntry->limMlmState = sessionEntry->limPrevMlmState;
|
||||
|
||||
MTRACE(mac_trace
|
||||
(pMac, TRACE_CODE_MLM_STATE, sessionEntry->peSessionId,
|
||||
(mac, TRACE_CODE_MLM_STATE, sessionEntry->peSessionId,
|
||||
sessionEntry->limMlmState));
|
||||
|
||||
/*
|
||||
@@ -448,26 +448,26 @@ lim_restore_from_auth_state(tpAniSirGlobal pMac, tSirResultCodes resultCode,
|
||||
* host have received the auth rsp and no longer auth
|
||||
* retry is needed also cancel the auth rety timer
|
||||
*/
|
||||
pMac->auth_ack_status = LIM_AUTH_ACK_RCD_SUCCESS;
|
||||
mac->auth_ack_status = LIM_AUTH_ACK_RCD_SUCCESS;
|
||||
|
||||
/* Auth retry and AUth failure timers are not started for SAE */
|
||||
/* 'Change' timer for future activations */
|
||||
if (tx_timer_running(&pMac->lim.limTimers.
|
||||
if (tx_timer_running(&mac->lim.limTimers.
|
||||
g_lim_periodic_auth_retry_timer))
|
||||
lim_deactivate_and_change_timer(pMac,
|
||||
lim_deactivate_and_change_timer(mac,
|
||||
eLIM_AUTH_RETRY_TIMER);
|
||||
/* 'Change' timer for future activations */
|
||||
if (tx_timer_running(&pMac->lim.limTimers.gLimAuthFailureTimer))
|
||||
lim_deactivate_and_change_timer(pMac,
|
||||
if (tx_timer_running(&mac->lim.limTimers.gLimAuthFailureTimer))
|
||||
lim_deactivate_and_change_timer(mac,
|
||||
eLIM_AUTH_FAIL_TIMER);
|
||||
|
||||
sir_copy_mac_addr(currentBssId, sessionEntry->bssId);
|
||||
|
||||
if (sessionEntry->limSmeState == eLIM_SME_WT_PRE_AUTH_STATE) {
|
||||
pMac->lim.gLimPreAuthChannelNumber = 0;
|
||||
mac->lim.gLimPreAuthChannelNumber = 0;
|
||||
}
|
||||
|
||||
lim_post_sme_message(pMac, LIM_MLM_AUTH_CNF, (uint32_t *) &mlmAuthCnf);
|
||||
lim_post_sme_message(mac, LIM_MLM_AUTH_CNF, (uint32_t *) &mlmAuthCnf);
|
||||
} /*** end lim_restore_from_auth_state() ***/
|
||||
|
||||
/**
|
||||
@@ -485,7 +485,7 @@ lim_restore_from_auth_state(tpAniSirGlobal pMac, tSirResultCodes resultCode,
|
||||
***NOTE:
|
||||
* NA
|
||||
*
|
||||
* @param pMac Pointer to Global MAC structure
|
||||
* @param mac Pointer to Global MAC structure
|
||||
* @param keyId key id to used
|
||||
* @param pKey Pointer to the key to be used for encryption
|
||||
* @param pPlainText Pointer to the body to be encrypted
|
||||
@@ -495,7 +495,7 @@ lim_restore_from_auth_state(tpAniSirGlobal pMac, tSirResultCodes resultCode,
|
||||
*/
|
||||
|
||||
void
|
||||
lim_encrypt_auth_frame(tpAniSirGlobal pMac, uint8_t keyId, uint8_t *pKey,
|
||||
lim_encrypt_auth_frame(tpAniSirGlobal mac, uint8_t keyId, uint8_t *pKey,
|
||||
uint8_t *pPlainText, uint8_t *pEncrBody,
|
||||
uint32_t keyLength)
|
||||
{
|
||||
@@ -671,7 +671,7 @@ lim_rc4(uint8_t *pDest, uint8_t *pSrc, uint8_t *seed, uint32_t keyLength,
|
||||
***NOTE:
|
||||
* NA
|
||||
*
|
||||
* @param pMac Pointer to Global MAC structure
|
||||
* @param mac Pointer to Global MAC structure
|
||||
* @param pKey Pointer to the key to be used for decryption
|
||||
* @param pEncrBody Pointer to the body to be decrypted
|
||||
* @param pPlainBody Pointer to the decrypted body
|
||||
@@ -684,7 +684,7 @@ lim_rc4(uint8_t *pDest, uint8_t *pSrc, uint8_t *seed, uint32_t keyLength,
|
||||
*/
|
||||
|
||||
uint8_t
|
||||
lim_decrypt_auth_frame(tpAniSirGlobal pMac, uint8_t *pKey, uint8_t *pEncrBody,
|
||||
lim_decrypt_auth_frame(tpAniSirGlobal mac, uint8_t *pKey, uint8_t *pEncrBody,
|
||||
uint8_t *pPlainBody, uint32_t keyLength, uint16_t frameLen)
|
||||
{
|
||||
uint8_t seed[LIM_SEED_LENGTH], icv[SIR_MAC_WEP_ICV_LENGTH];
|
||||
@@ -726,7 +726,7 @@ lim_decrypt_auth_frame(tpAniSirGlobal pMac, uint8_t *pKey, uint8_t *pEncrBody,
|
||||
*
|
||||
* A utility API to send MLM_SETKEYS_CNF to SME
|
||||
*/
|
||||
void lim_post_sme_set_keys_cnf(tpAniSirGlobal pMac,
|
||||
void lim_post_sme_set_keys_cnf(tpAniSirGlobal mac,
|
||||
tLimMlmSetKeysReq *pMlmSetKeysReq,
|
||||
tLimMlmSetKeysCnf *mlmSetKeysCnf)
|
||||
{
|
||||
@@ -736,9 +736,9 @@ void lim_post_sme_set_keys_cnf(tpAniSirGlobal pMac,
|
||||
|
||||
/* Free up buffer allocated for mlmSetKeysReq */
|
||||
qdf_mem_free(pMlmSetKeysReq);
|
||||
pMac->lim.gpLimMlmSetKeysReq = NULL;
|
||||
mac->lim.gpLimMlmSetKeysReq = NULL;
|
||||
|
||||
lim_post_sme_message(pMac,
|
||||
lim_post_sme_message(mac,
|
||||
LIM_MLM_SETKEYS_CNF, (uint32_t *) mlmSetKeysCnf);
|
||||
}
|
||||
|
||||
@@ -758,11 +758,11 @@ void lim_post_sme_set_keys_cnf(tpAniSirGlobal pMac,
|
||||
***NOTE:
|
||||
* NA
|
||||
*
|
||||
* @param pMac Pointer to Global MAC structure
|
||||
* @param mac Pointer to Global MAC structure
|
||||
* @param pMlmSetKeysReq Pointer to MLM_SETKEYS_REQ buffer
|
||||
* @return none
|
||||
*/
|
||||
void lim_send_set_bss_key_req(tpAniSirGlobal pMac,
|
||||
void lim_send_set_bss_key_req(tpAniSirGlobal mac,
|
||||
tLimMlmSetKeysReq *pMlmSetKeysReq,
|
||||
tpPESession psessionEntry)
|
||||
{
|
||||
@@ -793,7 +793,7 @@ void lim_send_set_bss_key_req(tpAniSirGlobal pMac,
|
||||
pSetBssKeyParams->encType = pMlmSetKeysReq->edType;
|
||||
|
||||
pSetBssKeyParams->singleTidRc =
|
||||
(uint8_t)(pMac->mlme_cfg->sta.single_tid);
|
||||
(uint8_t)(mac->mlme_cfg->sta.single_tid);
|
||||
/* Update PE session Id */
|
||||
pSetBssKeyParams->sessionId = psessionEntry->peSessionId;
|
||||
|
||||
@@ -818,15 +818,15 @@ void lim_send_set_bss_key_req(tpAniSirGlobal pMac,
|
||||
sizeof(tSirKeys) * pMlmSetKeysReq->numKeys);
|
||||
}
|
||||
|
||||
SET_LIM_PROCESS_DEFD_MESGS(pMac, false);
|
||||
SET_LIM_PROCESS_DEFD_MESGS(mac, false);
|
||||
msgQ.type = WMA_SET_BSSKEY_REQ;
|
||||
msgQ.reserved = 0;
|
||||
msgQ.bodyptr = pSetBssKeyParams;
|
||||
msgQ.bodyval = 0;
|
||||
|
||||
pe_debug("Sending WMA_SET_BSSKEY_REQ...");
|
||||
MTRACE(mac_trace_msg_tx(pMac, psessionEntry->peSessionId, msgQ.type));
|
||||
retCode = wma_post_ctrl_msg(pMac, &msgQ);
|
||||
MTRACE(mac_trace_msg_tx(mac, psessionEntry->peSessionId, msgQ.type));
|
||||
retCode = wma_post_ctrl_msg(mac, &msgQ);
|
||||
if (QDF_STATUS_SUCCESS != retCode) {
|
||||
pe_err("Posting SET_BSSKEY to HAL failed, reason=%X",
|
||||
retCode);
|
||||
@@ -837,7 +837,7 @@ void lim_send_set_bss_key_req(tpAniSirGlobal pMac,
|
||||
return; /* Continue after WMA_SET_BSSKEY_RSP... */
|
||||
|
||||
end:
|
||||
lim_post_sme_set_keys_cnf(pMac, pMlmSetKeysReq, &mlmSetKeysCnf);
|
||||
lim_post_sme_set_keys_cnf(mac, pMlmSetKeysReq, &mlmSetKeysCnf);
|
||||
|
||||
}
|
||||
|
||||
@@ -856,13 +856,13 @@ end:
|
||||
***NOTE:
|
||||
* NA
|
||||
*
|
||||
* @param pMac Pointer to Global MAC structure
|
||||
* @param mac Pointer to Global MAC structure
|
||||
* @param pMlmSetKeysReq Pointer to MLM_SETKEYS_REQ buffer
|
||||
* @param staIdx STA index for which the keys are being set
|
||||
* @param defWEPIdx The default WEP key index [0..3]
|
||||
* @return none
|
||||
*/
|
||||
void lim_send_set_sta_key_req(tpAniSirGlobal pMac,
|
||||
void lim_send_set_sta_key_req(tpAniSirGlobal mac,
|
||||
tLimMlmSetKeysReq *pMlmSetKeysReq,
|
||||
uint16_t staIdx,
|
||||
uint8_t defWEPIdx,
|
||||
@@ -883,7 +883,7 @@ void lim_send_set_sta_key_req(tpAniSirGlobal pMac,
|
||||
pSetStaKeyParams->encType = pMlmSetKeysReq->edType;
|
||||
|
||||
pSetStaKeyParams->singleTidRc =
|
||||
(uint8_t)(pMac->mlme_cfg->sta.single_tid);
|
||||
(uint8_t)(mac->mlme_cfg->sta.single_tid);
|
||||
/* Update PE session ID */
|
||||
pSetStaKeyParams->sessionId = sessionEntry->peSessionId;
|
||||
|
||||
@@ -904,7 +904,7 @@ void lim_send_set_sta_key_req(tpAniSirGlobal pMac,
|
||||
if (sendRsp == true) {
|
||||
/** Store the Previous MlmState*/
|
||||
sessionEntry->limPrevMlmState = sessionEntry->limMlmState;
|
||||
SET_LIM_PROCESS_DEFD_MESGS(pMac, false);
|
||||
SET_LIM_PROCESS_DEFD_MESGS(mac, false);
|
||||
}
|
||||
|
||||
if (LIM_IS_IBSS_ROLE(sessionEntry)
|
||||
@@ -920,7 +920,7 @@ void lim_send_set_sta_key_req(tpAniSirGlobal pMac,
|
||||
msgQ.type = WMA_SET_STAKEY_REQ;
|
||||
}
|
||||
MTRACE(mac_trace
|
||||
(pMac, TRACE_CODE_MLM_STATE, sessionEntry->peSessionId,
|
||||
(mac, TRACE_CODE_MLM_STATE, sessionEntry->peSessionId,
|
||||
sessionEntry->limMlmState));
|
||||
|
||||
/**
|
||||
@@ -945,7 +945,7 @@ void lim_send_set_sta_key_req(tpAniSirGlobal pMac,
|
||||
sessionEntry->limMlmState =
|
||||
eLIM_MLM_WT_SET_STA_KEY_STATE;
|
||||
MTRACE(mac_trace
|
||||
(pMac, TRACE_CODE_MLM_STATE,
|
||||
(mac, TRACE_CODE_MLM_STATE,
|
||||
sessionEntry->peSessionId,
|
||||
sessionEntry->limMlmState));
|
||||
} else {
|
||||
@@ -989,8 +989,8 @@ void lim_send_set_sta_key_req(tpAniSirGlobal pMac,
|
||||
msgQ.bodyval = 0;
|
||||
|
||||
pe_debug("Sending WMA_SET_STAKEY_REQ...");
|
||||
MTRACE(mac_trace_msg_tx(pMac, sessionEntry->peSessionId, msgQ.type));
|
||||
retCode = wma_post_ctrl_msg(pMac, &msgQ);
|
||||
MTRACE(mac_trace_msg_tx(mac, sessionEntry->peSessionId, msgQ.type));
|
||||
retCode = wma_post_ctrl_msg(mac, &msgQ);
|
||||
if (QDF_STATUS_SUCCESS != retCode) {
|
||||
pe_err("Posting SET_STAKEY to HAL failed, reason=%X",
|
||||
retCode);
|
||||
@@ -1004,5 +1004,5 @@ fail:
|
||||
/* Respond to SME with LIM_MLM_SETKEYS_CNF */
|
||||
mlmSetKeysCnf.resultCode = eSIR_SME_HAL_SEND_MESSAGE_FAIL;
|
||||
if (sendRsp == true)
|
||||
lim_post_sme_set_keys_cnf(pMac, pMlmSetKeysReq, &mlmSetKeysCnf);
|
||||
lim_post_sme_set_keys_cnf(mac, pMlmSetKeysReq, &mlmSetKeysCnf);
|
||||
}
|
||||
|
@@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (c) 2011-2015, 2017 The Linux Foundation. All rights reserved.
|
||||
* Copyright (c) 2011-2015, 2017-2018 The Linux Foundation. All rights reserved.
|
||||
*
|
||||
* Permission to use, copy, modify, and/or distribute this software for
|
||||
* any purpose with or without fee is hereby granted, provided that the
|
||||
@@ -57,7 +57,7 @@ void lim_delete_pre_auth_list(tpAniSirGlobal);
|
||||
struct tLimPreAuthNode *lim_search_pre_auth_list(tpAniSirGlobal, tSirMacAddr);
|
||||
void lim_add_pre_auth_node(tpAniSirGlobal, struct tLimPreAuthNode *);
|
||||
void lim_delete_pre_auth_node(tpAniSirGlobal, tSirMacAddr);
|
||||
void lim_release_pre_auth_node(tpAniSirGlobal pMac, tpLimPreAuthNode pAuthNode);
|
||||
void lim_release_pre_auth_node(tpAniSirGlobal mac, tpLimPreAuthNode pAuthNode);
|
||||
void lim_restore_from_auth_state(tpAniSirGlobal,
|
||||
tSirResultCodes, uint16_t, tpPESession);
|
||||
uint8_t lim_delete_open_auth_pre_auth_node(tpAniSirGlobal mac_ctx);
|
||||
|
新增問題並參考
封鎖使用者