|
@@ -53,7 +53,7 @@ static struct wlan_crypto_params *wlan_crypto_vdev_get_comp_params(
|
|
|
*crypto_priv = (struct wlan_crypto_comp_priv *)
|
|
|
wlan_get_vdev_crypto_obj(vdev);
|
|
|
if (*crypto_priv == NULL) {
|
|
|
- qdf_print("%s[%d] crypto_priv NULL\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] crypto_priv NULL", __func__, __LINE__);
|
|
|
return NULL;
|
|
|
}
|
|
|
|
|
@@ -75,7 +75,7 @@ static struct wlan_crypto_params *wlan_crypto_peer_get_comp_params(
|
|
|
*crypto_priv = (struct wlan_crypto_comp_priv *)
|
|
|
wlan_get_peer_crypto_obj(peer);
|
|
|
if (*crypto_priv == NULL) {
|
|
|
- qdf_print("%s[%d] crypto_priv NULL\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] crypto_priv NULL", __func__, __LINE__);
|
|
|
return NULL;
|
|
|
}
|
|
|
|
|
@@ -151,7 +151,7 @@ QDF_STATUS wlan_crypto_set_vdev_param(struct wlan_objmgr_vdev *vdev,
|
|
|
wlan_get_vdev_crypto_obj(vdev);
|
|
|
|
|
|
if (crypto_priv == NULL) {
|
|
|
- qdf_print("%s[%d] crypto_priv NULL\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] crypto_priv NULL", __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
|
|
@@ -184,7 +184,7 @@ QDF_STATUS wlan_crypto_set_peer_param(struct wlan_objmgr_peer *peer,
|
|
|
&crypto_priv);
|
|
|
|
|
|
if (crypto_priv == NULL) {
|
|
|
- qdf_print("%s[%d] crypto_priv NULL\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] crypto_priv NULL", __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
|
|
@@ -257,7 +257,7 @@ int32_t wlan_crypto_get_param(struct wlan_objmgr_vdev *vdev,
|
|
|
wlan_get_vdev_crypto_obj(vdev);
|
|
|
|
|
|
if (crypto_priv == NULL) {
|
|
|
- qdf_print("%s[%d] crypto_priv NULL\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] crypto_priv NULL", __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
|
|
@@ -286,7 +286,7 @@ int32_t wlan_crypto_get_peer_param(struct wlan_objmgr_peer *peer,
|
|
|
&crypto_priv);
|
|
|
|
|
|
if (crypto_params == NULL) {
|
|
|
- qdf_print("%s[%d] crypto_params NULL\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] crypto_params NULL", __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
value = wlan_crypto_get_param_value(param, crypto_params);
|
|
@@ -310,7 +310,7 @@ uint8_t wlan_crypto_is_htallowed(struct wlan_objmgr_vdev *vdev,
|
|
|
int32_t ucast_cipher;
|
|
|
|
|
|
if (!(vdev || peer)) {
|
|
|
- qdf_print("%s[%d] Invalid params\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] Invalid params", __func__, __LINE__);
|
|
|
return 0;
|
|
|
}
|
|
|
|
|
@@ -355,8 +355,8 @@ QDF_STATUS wlan_crypto_setkey(struct wlan_objmgr_vdev *vdev,
|
|
|
uint8_t igtk_idx = 0;
|
|
|
|
|
|
if (!vdev || !req_key || req_key->keylen > (sizeof(req_key->keydata))) {
|
|
|
- qdf_print("%s[%d] Invalid params vdev%pK, req_key%pK\n",
|
|
|
- __func__, __LINE__, vdev, req_key);
|
|
|
+ qdf_print("%s[%d] Invalid params vdev%pK, req_key%pK",
|
|
|
+ __func__, __LINE__, vdev, req_key);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
|
|
@@ -373,14 +373,14 @@ QDF_STATUS wlan_crypto_setkey(struct wlan_objmgr_vdev *vdev,
|
|
|
!isbcast);
|
|
|
return QDF_STATUS_SUCCESS;
|
|
|
}
|
|
|
- qdf_print("%s[%d] req_key len zero\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] req_key len zero", __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
|
|
|
cipher = wlan_crypto_cipher_ops[req_key->type];
|
|
|
|
|
|
if (!cipher && !IS_MGMT_CIPHER(req_key->type)) {
|
|
|
- qdf_print("%s[%d] cipher invalid\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] cipher invalid", __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
|
|
@@ -388,13 +388,13 @@ QDF_STATUS wlan_crypto_setkey(struct wlan_objmgr_vdev *vdev,
|
|
|
(!IS_MGMT_CIPHER(req_key->type)) &&
|
|
|
((req_key->keylen != (cipher->keylen / CRYPTO_NBBY)) &&
|
|
|
(req_key->type != WLAN_CRYPTO_CIPHER_WEP))) {
|
|
|
- qdf_print("%s[%d] cipher invalid\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] cipher invalid", __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
} else if ((req_key->type == WLAN_CRYPTO_CIPHER_WEP) &&
|
|
|
!((req_key->keylen == WLAN_CRYPTO_KEY_WEP40_LEN)
|
|
|
|| (req_key->keylen == WLAN_CRYPTO_KEY_WEP104_LEN)
|
|
|
|| (req_key->keylen == WLAN_CRYPTO_KEY_WEP128_LEN))) {
|
|
|
- qdf_print("%s[%d] wep key len invalid\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] wep key len invalid", __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
|
|
@@ -423,7 +423,7 @@ QDF_STATUS wlan_crypto_setkey(struct wlan_objmgr_vdev *vdev,
|
|
|
psoc = wlan_vdev_get_psoc(vdev);
|
|
|
if (!psoc) {
|
|
|
wlan_vdev_obj_unlock(vdev);
|
|
|
- qdf_print("%s[%d] psoc NULL\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] psoc NULL", __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
wlan_vdev_obj_unlock(vdev);
|
|
@@ -439,22 +439,22 @@ QDF_STATUS wlan_crypto_setkey(struct wlan_objmgr_vdev *vdev,
|
|
|
crypto_params = wlan_crypto_vdev_get_comp_params(vdev,
|
|
|
&crypto_priv);
|
|
|
if (crypto_priv == NULL) {
|
|
|
- qdf_print("%s[%d] crypto_priv NULL\n",
|
|
|
- __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] crypto_priv NULL",
|
|
|
+ __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
|
|
|
if (IS_MGMT_CIPHER(req_key->type)) {
|
|
|
igtk_idx = req_key->keyix - WLAN_CRYPTO_MAXKEYIDX;
|
|
|
if (igtk_idx >= WLAN_CRYPTO_MAXIGTKKEYIDX) {
|
|
|
- qdf_print("%s[%d] igtk key invalid keyid %d \n",
|
|
|
- __func__, __LINE__, igtk_idx);
|
|
|
+ qdf_print("%s[%d] igtk key invalid keyid %d ",
|
|
|
+ __func__, __LINE__, igtk_idx);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
key = qdf_mem_malloc(sizeof(struct wlan_crypto_key));
|
|
|
if (key == NULL) {
|
|
|
- qdf_print("%s[%d] igtk key alloc failed\n",
|
|
|
- __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] igtk key alloc failed",
|
|
|
+ __func__, __LINE__);
|
|
|
return QDF_STATUS_E_NOMEM;
|
|
|
}
|
|
|
|
|
@@ -466,7 +466,7 @@ QDF_STATUS wlan_crypto_setkey(struct wlan_objmgr_vdev *vdev,
|
|
|
crypto_priv->def_igtk_tx_keyid = igtk_idx;
|
|
|
} else {
|
|
|
if (IS_FILS_CIPHER(req_key->type)) {
|
|
|
- qdf_print("FILS key is not for BroadCast pkt");
|
|
|
+ qdf_err("FILS key is not for BroadCast pkt");
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
if (!HAS_MCAST_CIPHER(crypto_params, req_key->type)
|
|
@@ -487,8 +487,8 @@ QDF_STATUS wlan_crypto_setkey(struct wlan_objmgr_vdev *vdev,
|
|
|
if (!(peer && (QDF_STATUS_SUCCESS
|
|
|
== wlan_objmgr_peer_try_get_ref(peer,
|
|
|
WLAN_CRYPTO_ID)))) {
|
|
|
- qdf_print("%s[%d] peer %pK failed\n",
|
|
|
- __func__, __LINE__, peer);
|
|
|
+ qdf_print("%s[%d] peer %pK failed",
|
|
|
+ __func__, __LINE__, peer);
|
|
|
if (IS_MGMT_CIPHER(req_key->type)) {
|
|
|
crypto_priv->igtk_key[igtk_idx] = NULL;
|
|
|
crypto_priv->igtk_key_type
|
|
@@ -516,7 +516,7 @@ QDF_STATUS wlan_crypto_setkey(struct wlan_objmgr_vdev *vdev,
|
|
|
WLAN_CRYPTO_ID);
|
|
|
|
|
|
if (peer == NULL) {
|
|
|
- qdf_print("%s[%d] peer NULL\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] peer NULL", __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
|
|
@@ -526,21 +526,21 @@ QDF_STATUS wlan_crypto_setkey(struct wlan_objmgr_vdev *vdev,
|
|
|
wlan_objmgr_peer_release_ref(peer, WLAN_CRYPTO_ID);
|
|
|
|
|
|
if (crypto_priv == NULL) {
|
|
|
- qdf_print("%s[%d] crypto_priv NULL\n",
|
|
|
- __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] crypto_priv NULL",
|
|
|
+ __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
if (IS_MGMT_CIPHER(req_key->type)) {
|
|
|
igtk_idx = req_key->keyix - WLAN_CRYPTO_MAXKEYIDX;
|
|
|
if (igtk_idx >= WLAN_CRYPTO_MAXIGTKKEYIDX) {
|
|
|
- qdf_print("%s[%d] igtk key invalid keyid %d \n",
|
|
|
- __func__, __LINE__, igtk_idx);
|
|
|
+ qdf_print("%s[%d] igtk key invalid keyid %d ",
|
|
|
+ __func__, __LINE__, igtk_idx);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
key = qdf_mem_malloc(sizeof(struct wlan_crypto_key));
|
|
|
if (key == NULL) {
|
|
|
- qdf_print("%s[%d] igtk key alloc failed\n",
|
|
|
- __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] igtk key alloc failed",
|
|
|
+ __func__, __LINE__);
|
|
|
return QDF_STATUS_E_NOMEM;
|
|
|
}
|
|
|
if (crypto_priv->igtk_key[igtk_idx])
|
|
@@ -554,8 +554,8 @@ QDF_STATUS wlan_crypto_setkey(struct wlan_objmgr_vdev *vdev,
|
|
|
if (kid == WLAN_CRYPTO_KEYIX_NONE)
|
|
|
kid = 0;
|
|
|
if (kid >= WLAN_CRYPTO_MAXKEYIDX) {
|
|
|
- qdf_print("%s[%d] invalid keyid %d \n",
|
|
|
- __func__, __LINE__, kid);
|
|
|
+ qdf_print("%s[%d] invalid keyid %d ",
|
|
|
+ __func__, __LINE__, kid);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
if (!crypto_priv->key[kid]) {
|
|
@@ -696,7 +696,7 @@ struct wlan_crypto_key *wlan_crypto_vdev_getkey(struct wlan_objmgr_vdev *vdev,
|
|
|
crypto_params = wlan_crypto_vdev_get_comp_params(vdev, &crypto_priv);
|
|
|
|
|
|
if (crypto_priv == NULL) {
|
|
|
- qdf_print("%s[%d] crypto_priv NULL\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] crypto_priv NULL", __func__, __LINE__);
|
|
|
return NULL;
|
|
|
}
|
|
|
|
|
@@ -730,7 +730,7 @@ struct wlan_crypto_key *wlan_crypto_peer_getkey(struct wlan_objmgr_peer *peer,
|
|
|
crypto_params = wlan_crypto_peer_get_comp_params(peer, &crypto_priv);
|
|
|
|
|
|
if (crypto_priv == NULL) {
|
|
|
- qdf_print("%s[%d] crypto_priv NULL\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] crypto_priv NULL", __func__, __LINE__);
|
|
|
return NULL;
|
|
|
}
|
|
|
|
|
@@ -767,8 +767,8 @@ QDF_STATUS wlan_crypto_getkey(struct wlan_objmgr_vdev *vdev,
|
|
|
|
|
|
if ((req_key->keyix != WLAN_CRYPTO_KEYIX_NONE) &&
|
|
|
(req_key->keyix >= WLAN_CRYPTO_MAXKEYIDX)) {
|
|
|
- qdf_print("%s[%d] invalid keyix %d\n", __func__, __LINE__,
|
|
|
- req_key->keyix);
|
|
|
+ qdf_print("%s[%d] invalid keyix %d", __func__, __LINE__,
|
|
|
+ req_key->keyix);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
|
|
@@ -777,7 +777,7 @@ QDF_STATUS wlan_crypto_getkey(struct wlan_objmgr_vdev *vdev,
|
|
|
psoc = wlan_vdev_get_psoc(vdev);
|
|
|
if (!psoc) {
|
|
|
wlan_vdev_obj_unlock(vdev);
|
|
|
- qdf_print("%s[%d] psoc NULL\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] psoc NULL", __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
wlan_vdev_obj_unlock(vdev);
|
|
@@ -800,7 +800,7 @@ QDF_STATUS wlan_crypto_getkey(struct wlan_objmgr_vdev *vdev,
|
|
|
WLAN_CRYPTO_ID);
|
|
|
if (peer == NULL) {
|
|
|
QDF_TRACE(QDF_MODULE_ID_CRYPTO, QDF_TRACE_LEVEL_ERROR,
|
|
|
- "%s[%d] peer NULL\n", __func__, __LINE__);
|
|
|
+ "%s[%d] peer NULL", __func__, __LINE__);
|
|
|
return QDF_STATUS_E_NOENT;
|
|
|
}
|
|
|
key = wlan_crypto_peer_getkey(peer, req_key->keyix);
|
|
@@ -864,9 +864,9 @@ QDF_STATUS wlan_crypto_delkey(struct wlan_objmgr_vdev *vdev,
|
|
|
(key_idx >=
|
|
|
(WLAN_CRYPTO_MAXKEYIDX + WLAN_CRYPTO_MAXIGTKKEYIDX))) {
|
|
|
QDF_TRACE(QDF_MODULE_ID_CRYPTO, QDF_TRACE_LEVEL_ERROR,
|
|
|
- "%s[%d] Invalid params vdev %pK, macaddr %pK"
|
|
|
- "keyidx %d\n", __func__, __LINE__, vdev,
|
|
|
- macaddr, key_idx);
|
|
|
+ "%s[%d] Invalid params vdev %pK, macaddr %pK, keyidx %d",
|
|
|
+ __func__, __LINE__, vdev,
|
|
|
+ macaddr, key_idx);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
|
|
@@ -875,7 +875,7 @@ QDF_STATUS wlan_crypto_delkey(struct wlan_objmgr_vdev *vdev,
|
|
|
psoc = wlan_vdev_get_psoc(vdev);
|
|
|
if (!psoc) {
|
|
|
wlan_vdev_obj_unlock(vdev);
|
|
|
- qdf_print("%s[%d] psoc NULL\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] psoc NULL", __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
wlan_vdev_obj_unlock(vdev);
|
|
@@ -884,8 +884,8 @@ QDF_STATUS wlan_crypto_delkey(struct wlan_objmgr_vdev *vdev,
|
|
|
crypto_params = wlan_crypto_vdev_get_comp_params(vdev,
|
|
|
&crypto_priv);
|
|
|
if (crypto_priv == NULL) {
|
|
|
- qdf_print("%s[%d] crypto_priv NULL\n",
|
|
|
- __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] crypto_priv NULL",
|
|
|
+ __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
} else {
|
|
@@ -906,8 +906,8 @@ QDF_STATUS wlan_crypto_delkey(struct wlan_objmgr_vdev *vdev,
|
|
|
&crypto_priv);
|
|
|
wlan_objmgr_peer_release_ref(peer, WLAN_CRYPTO_ID);
|
|
|
if (crypto_priv == NULL) {
|
|
|
- qdf_print("%s[%d] crypto_priv NULL\n",
|
|
|
- __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] crypto_priv NULL",
|
|
|
+ __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
}
|
|
@@ -915,8 +915,8 @@ QDF_STATUS wlan_crypto_delkey(struct wlan_objmgr_vdev *vdev,
|
|
|
if (key_idx >= WLAN_CRYPTO_MAXKEYIDX) {
|
|
|
uint8_t igtk_idx = key_idx - WLAN_CRYPTO_MAXKEYIDX;
|
|
|
if (igtk_idx >= WLAN_CRYPTO_MAXIGTKKEYIDX) {
|
|
|
- qdf_print("%s[%d] Igtk key invalid keyid %d\n",
|
|
|
- __func__, __LINE__, igtk_idx);
|
|
|
+ qdf_print("%s[%d] Igtk key invalid keyid %d",
|
|
|
+ __func__, __LINE__, igtk_idx);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
key = crypto_priv->igtk_key[igtk_idx];
|
|
@@ -967,9 +967,9 @@ QDF_STATUS wlan_crypto_default_key(struct wlan_objmgr_vdev *vdev,
|
|
|
uint8_t bssid_mac[WLAN_ALEN];
|
|
|
|
|
|
if (!vdev || !macaddr || (key_idx >= WLAN_CRYPTO_MAXKEYIDX)) {
|
|
|
- qdf_print("%s[%d] Invalid params vdev %pK, macaddr %pK"
|
|
|
- "keyidx %d\n", __func__, __LINE__,
|
|
|
- vdev, macaddr, key_idx);
|
|
|
+ qdf_print("%s[%d] Invalid params vdev %pK, macaddr %pK keyidx %d",
|
|
|
+ __func__, __LINE__,
|
|
|
+ vdev, macaddr, key_idx);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
|
|
@@ -978,7 +978,7 @@ QDF_STATUS wlan_crypto_default_key(struct wlan_objmgr_vdev *vdev,
|
|
|
psoc = wlan_vdev_get_psoc(vdev);
|
|
|
if (!psoc) {
|
|
|
wlan_vdev_obj_unlock(vdev);
|
|
|
- qdf_print("%s[%d] psoc NULL\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] psoc NULL", __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
wlan_vdev_obj_unlock(vdev);
|
|
@@ -987,8 +987,8 @@ QDF_STATUS wlan_crypto_default_key(struct wlan_objmgr_vdev *vdev,
|
|
|
crypto_params = wlan_crypto_vdev_get_comp_params(vdev,
|
|
|
&crypto_priv);
|
|
|
if (crypto_priv == NULL) {
|
|
|
- qdf_print("%s[%d] crypto_priv NULL\n",
|
|
|
- __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] crypto_priv NULL",
|
|
|
+ __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
|
|
@@ -1008,15 +1008,15 @@ QDF_STATUS wlan_crypto_default_key(struct wlan_objmgr_vdev *vdev,
|
|
|
WLAN_CRYPTO_ID);
|
|
|
|
|
|
if (peer == NULL) {
|
|
|
- qdf_print("%s[%d] peer NULL\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] peer NULL", __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
crypto_params = wlan_crypto_peer_get_comp_params(peer,
|
|
|
&crypto_priv);
|
|
|
wlan_objmgr_peer_release_ref(peer, WLAN_CRYPTO_ID);
|
|
|
if (crypto_priv == NULL) {
|
|
|
- qdf_print("%s[%d] crypto_priv NULL\n",
|
|
|
- __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] crypto_priv NULL",
|
|
|
+ __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
|
|
@@ -1069,7 +1069,7 @@ QDF_STATUS wlan_crypto_encap(struct wlan_objmgr_vdev *vdev,
|
|
|
psoc = wlan_vdev_get_psoc(vdev);
|
|
|
if (!psoc) {
|
|
|
wlan_vdev_obj_unlock(vdev);
|
|
|
- qdf_print("%s[%d] psoc NULL\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] psoc NULL", __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
wlan_vdev_obj_unlock(vdev);
|
|
@@ -1091,8 +1091,8 @@ QDF_STATUS wlan_crypto_encap(struct wlan_objmgr_vdev *vdev,
|
|
|
crypto_params = wlan_crypto_vdev_get_comp_params(vdev,
|
|
|
&crypto_priv);
|
|
|
if (crypto_priv == NULL) {
|
|
|
- qdf_print("%s[%d] crypto_priv NULL\n",
|
|
|
- __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] crypto_priv NULL",
|
|
|
+ __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
|
|
@@ -1111,8 +1111,8 @@ QDF_STATUS wlan_crypto_encap(struct wlan_objmgr_vdev *vdev,
|
|
|
WLAN_CRYPTO_ID);
|
|
|
|
|
|
if (peer == NULL) {
|
|
|
- qdf_print("%s[%d] crypto_priv NULL\n",
|
|
|
- __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] crypto_priv NULL",
|
|
|
+ __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
crypto_params = wlan_crypto_peer_get_comp_params(peer,
|
|
@@ -1120,8 +1120,8 @@ QDF_STATUS wlan_crypto_encap(struct wlan_objmgr_vdev *vdev,
|
|
|
wlan_objmgr_peer_release_ref(peer, WLAN_CRYPTO_ID);
|
|
|
|
|
|
if (crypto_priv == NULL) {
|
|
|
- qdf_print("%s[%d] crypto_priv NULL\n",
|
|
|
- __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] crypto_priv NULL",
|
|
|
+ __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
|
|
@@ -1178,7 +1178,7 @@ QDF_STATUS wlan_crypto_decap(struct wlan_objmgr_vdev *vdev,
|
|
|
psoc = wlan_vdev_get_psoc(vdev);
|
|
|
if (!psoc) {
|
|
|
wlan_vdev_obj_unlock(vdev);
|
|
|
- qdf_print("%s[%d] psoc NULL\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] psoc NULL", __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
wlan_vdev_obj_unlock(vdev);
|
|
@@ -1211,8 +1211,8 @@ QDF_STATUS wlan_crypto_decap(struct wlan_objmgr_vdev *vdev,
|
|
|
crypto_params = wlan_crypto_vdev_get_comp_params(vdev,
|
|
|
&crypto_priv);
|
|
|
if (crypto_priv == NULL) {
|
|
|
- qdf_print("%s[%d] crypto_priv NULL\n",
|
|
|
- __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] crypto_priv NULL",
|
|
|
+ __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
|
|
@@ -1230,7 +1230,7 @@ QDF_STATUS wlan_crypto_decap(struct wlan_objmgr_vdev *vdev,
|
|
|
psoc, pdev_id, bssid_mac,
|
|
|
mac_addr, WLAN_CRYPTO_ID);
|
|
|
if (peer == NULL) {
|
|
|
- qdf_print("%s[%d] peer NULL\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] peer NULL", __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
|
|
@@ -1239,8 +1239,8 @@ QDF_STATUS wlan_crypto_decap(struct wlan_objmgr_vdev *vdev,
|
|
|
wlan_objmgr_peer_release_ref(peer, WLAN_CRYPTO_ID);
|
|
|
|
|
|
if (crypto_priv == NULL) {
|
|
|
- qdf_print("%s[%d] crypto_priv NULL\n",
|
|
|
- __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] crypto_priv NULL",
|
|
|
+ __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
|
|
@@ -1288,7 +1288,7 @@ QDF_STATUS wlan_crypto_enmic(struct wlan_objmgr_vdev *vdev,
|
|
|
psoc = wlan_vdev_get_psoc(vdev);
|
|
|
if (!psoc) {
|
|
|
wlan_vdev_obj_unlock(vdev);
|
|
|
- qdf_print("%s[%d] psoc NULL\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] psoc NULL", __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
wlan_vdev_obj_unlock(vdev);
|
|
@@ -1297,8 +1297,8 @@ QDF_STATUS wlan_crypto_enmic(struct wlan_objmgr_vdev *vdev,
|
|
|
crypto_params = wlan_crypto_vdev_get_comp_params(vdev,
|
|
|
&crypto_priv);
|
|
|
if (crypto_priv == NULL) {
|
|
|
- qdf_print("%s[%d] crypto_priv NULL\n",
|
|
|
- __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] crypto_priv NULL",
|
|
|
+ __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
|
|
@@ -1316,8 +1316,8 @@ QDF_STATUS wlan_crypto_enmic(struct wlan_objmgr_vdev *vdev,
|
|
|
psoc, pdev_id, bssid_mac,
|
|
|
mac_addr, WLAN_CRYPTO_ID);
|
|
|
if (peer == NULL) {
|
|
|
- qdf_print("%s[%d] crypto_priv NULL\n",
|
|
|
- __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] crypto_priv NULL",
|
|
|
+ __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
|
|
@@ -1326,8 +1326,8 @@ QDF_STATUS wlan_crypto_enmic(struct wlan_objmgr_vdev *vdev,
|
|
|
wlan_objmgr_peer_release_ref(peer, WLAN_CRYPTO_ID);
|
|
|
|
|
|
if (crypto_priv == NULL) {
|
|
|
- qdf_print("%s[%d] crypto_priv NULL\n",
|
|
|
- __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] crypto_priv NULL",
|
|
|
+ __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
|
|
@@ -1388,7 +1388,7 @@ QDF_STATUS wlan_crypto_demic(struct wlan_objmgr_vdev *vdev,
|
|
|
psoc = wlan_vdev_get_psoc(vdev);
|
|
|
if (!psoc) {
|
|
|
wlan_vdev_obj_unlock(vdev);
|
|
|
- qdf_print("%s[%d] psoc NULL\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] psoc NULL", __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
wlan_vdev_obj_unlock(vdev);
|
|
@@ -1397,8 +1397,8 @@ QDF_STATUS wlan_crypto_demic(struct wlan_objmgr_vdev *vdev,
|
|
|
crypto_params = wlan_crypto_vdev_get_comp_params(vdev,
|
|
|
&crypto_priv);
|
|
|
if (crypto_priv == NULL) {
|
|
|
- qdf_print("%s[%d] crypto_priv NULL\n",
|
|
|
- __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] crypto_priv NULL",
|
|
|
+ __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
|
|
@@ -1416,7 +1416,7 @@ QDF_STATUS wlan_crypto_demic(struct wlan_objmgr_vdev *vdev,
|
|
|
psoc, pdev_id, bssid_mac,
|
|
|
mac_addr, WLAN_CRYPTO_ID);
|
|
|
if (peer == NULL) {
|
|
|
- qdf_print("%s[%d] peer NULL\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] peer NULL", __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
|
|
@@ -1425,8 +1425,8 @@ QDF_STATUS wlan_crypto_demic(struct wlan_objmgr_vdev *vdev,
|
|
|
wlan_objmgr_peer_release_ref(peer, WLAN_CRYPTO_ID);
|
|
|
|
|
|
if (crypto_priv == NULL) {
|
|
|
- qdf_print("%s[%d] crypto_priv NULL\n",
|
|
|
- __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] crypto_priv NULL",
|
|
|
+ __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
|
|
@@ -1460,7 +1460,7 @@ bool wlan_crypto_vdev_is_pmf_enabled(struct wlan_objmgr_vdev *vdev)
|
|
|
vdev_crypto_params = wlan_crypto_vdev_get_comp_params(vdev,
|
|
|
&crypto_priv);
|
|
|
if (crypto_priv == NULL) {
|
|
|
- qdf_print("%s[%d] crypto_priv NULL\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] crypto_priv NULL", __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
|
|
@@ -1494,14 +1494,14 @@ bool wlan_crypto_is_pmf_enabled(struct wlan_objmgr_vdev *vdev,
|
|
|
vdev_crypto_params = wlan_crypto_vdev_get_comp_params(vdev,
|
|
|
&crypto_priv);
|
|
|
if (crypto_priv == NULL) {
|
|
|
- qdf_print("%s[%d] crypto_priv NULL\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] crypto_priv NULL", __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
|
|
|
peer_crypto_params = wlan_crypto_peer_get_comp_params(peer,
|
|
|
&crypto_priv);
|
|
|
if (crypto_priv == NULL) {
|
|
|
- qdf_print("%s[%d] crypto_priv NULL\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] crypto_priv NULL", __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
if (((vdev_crypto_params->rsn_caps &
|
|
@@ -1550,26 +1550,26 @@ uint8_t *wlan_crypto_add_mmie(struct wlan_objmgr_vdev *vdev,
|
|
|
int32_t ret = -1;
|
|
|
|
|
|
if (!bfrm) {
|
|
|
- qdf_print("%s[%d] frame is NULL\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] frame is NULL", __func__, __LINE__);
|
|
|
return NULL;
|
|
|
}
|
|
|
|
|
|
crypto_params = wlan_crypto_vdev_get_comp_params(vdev,
|
|
|
&crypto_priv);
|
|
|
if (crypto_priv == NULL) {
|
|
|
- qdf_print("%s[%d] crypto_priv NULL\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] crypto_priv NULL", __func__, __LINE__);
|
|
|
return NULL;
|
|
|
}
|
|
|
|
|
|
if (crypto_priv->def_igtk_tx_keyid >= WLAN_CRYPTO_MAXIGTKKEYIDX) {
|
|
|
- qdf_print("%s[%d] igtk key invalid keyid %d \n",
|
|
|
- __func__, __LINE__, crypto_priv->def_igtk_tx_keyid);
|
|
|
+ qdf_print("%s[%d] igtk key invalid keyid %d ",
|
|
|
+ __func__, __LINE__, crypto_priv->def_igtk_tx_keyid);
|
|
|
return NULL;
|
|
|
}
|
|
|
|
|
|
key = crypto_priv->igtk_key[crypto_priv->def_igtk_tx_keyid];
|
|
|
if (!key) {
|
|
|
- qdf_print("%s[%d] No igtk key present\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] No igtk key present", __func__, __LINE__);
|
|
|
return NULL;
|
|
|
}
|
|
|
mic_len = (crypto_priv->igtk_key_type
|
|
@@ -1608,7 +1608,7 @@ uint8_t *wlan_crypto_add_mmie(struct wlan_objmgr_vdev *vdev,
|
|
|
|
|
|
buf = qdf_mem_malloc(len - hdrlen + 20);
|
|
|
if (!buf) {
|
|
|
- qdf_print("%s[%d] malloc failed\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] malloc failed", __func__, __LINE__);
|
|
|
return NULL;
|
|
|
}
|
|
|
qdf_mem_zero(buf, len - hdrlen + 20);
|
|
@@ -1654,7 +1654,7 @@ uint8_t *wlan_crypto_add_mmie(struct wlan_objmgr_vdev *vdev,
|
|
|
}
|
|
|
qdf_mem_free(buf);
|
|
|
if (ret < 0) {
|
|
|
- qdf_print("%s[%d] add mmie failed\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] add mmie failed", __func__, __LINE__);
|
|
|
return NULL;
|
|
|
}
|
|
|
|
|
@@ -1687,14 +1687,14 @@ bool wlan_crypto_is_mmie_valid(struct wlan_objmgr_vdev *vdev,
|
|
|
/* check if frame is illegal length */
|
|
|
if (!frm || !efrm || (efrm < frm)
|
|
|
|| ((efrm - frm) < sizeof(struct ieee80211_hdr))) {
|
|
|
- qdf_print("%s[%d] Invalid params\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] Invalid params", __func__, __LINE__);
|
|
|
return false;
|
|
|
}
|
|
|
len = efrm - frm;
|
|
|
crypto_priv = (struct wlan_crypto_comp_priv *)
|
|
|
wlan_get_vdev_crypto_obj(vdev);
|
|
|
if (crypto_priv == NULL) {
|
|
|
- qdf_print("%s[%d] crypto_priv NULL\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] crypto_priv NULL", __func__, __LINE__);
|
|
|
return false;
|
|
|
}
|
|
|
|
|
@@ -1713,33 +1713,33 @@ bool wlan_crypto_is_mmie_valid(struct wlan_objmgr_vdev *vdev,
|
|
|
|
|
|
/* check Elem ID*/
|
|
|
if ((mmie == NULL) || (mmie->element_id != WLAN_ELEMID_MMIE)) {
|
|
|
- qdf_print("%s[%d] IE is not MMIE\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] IE is not MMIE", __func__, __LINE__);
|
|
|
return false;
|
|
|
}
|
|
|
|
|
|
if (mmie->key_id >= (WLAN_CRYPTO_MAXKEYIDX +
|
|
|
WLAN_CRYPTO_MAXIGTKKEYIDX) ||
|
|
|
(mmie->key_id < WLAN_CRYPTO_MAXKEYIDX)) {
|
|
|
- qdf_print("%s[%d] keyid not valid\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] keyid not valid", __func__, __LINE__);
|
|
|
return false;
|
|
|
}
|
|
|
|
|
|
key = crypto_priv->igtk_key[mmie->key_id - WLAN_CRYPTO_MAXKEYIDX];
|
|
|
if (!key) {
|
|
|
- qdf_print("%s[%d] No igtk key present\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] No igtk key present", __func__, __LINE__);
|
|
|
return false;
|
|
|
}
|
|
|
|
|
|
/* validate ipn */
|
|
|
ipn = mmie->sequence_number;
|
|
|
if (qdf_mem_cmp(ipn, key->keyrsc, 6) <= 0) {
|
|
|
- qdf_print("%s[%d] replay error\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] replay error", __func__, __LINE__);
|
|
|
return false;
|
|
|
}
|
|
|
|
|
|
buf = qdf_mem_malloc(len - hdrlen + 20);
|
|
|
if (!buf) {
|
|
|
- qdf_print("%s[%d] malloc failed\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] malloc failed", __func__, __LINE__);
|
|
|
return false;
|
|
|
}
|
|
|
aad = buf;
|
|
@@ -1782,19 +1782,19 @@ bool wlan_crypto_is_mmie_valid(struct wlan_objmgr_vdev *vdev,
|
|
|
qdf_mem_free(buf);
|
|
|
|
|
|
if (ret < 0) {
|
|
|
- qdf_print("%s[%d] genarate mmie failed\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] genarate mmie failed", __func__, __LINE__);
|
|
|
return false;
|
|
|
}
|
|
|
|
|
|
if (qdf_mem_cmp(mic, mmie->mic, mic_len) != 0) {
|
|
|
- qdf_print("%s[%d] mmie mismatch\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] mmie mismatch", __func__, __LINE__);
|
|
|
/* MMIE MIC mismatch */
|
|
|
return false;
|
|
|
}
|
|
|
|
|
|
/* Update the receive sequence number */
|
|
|
qdf_mem_copy(key->keyrsc, ipn, 6);
|
|
|
- qdf_print("%s[%d] mmie matched\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] mmie matched", __func__, __LINE__);
|
|
|
|
|
|
return true;
|
|
|
}
|
|
@@ -2733,14 +2733,14 @@ uint8_t *wlan_crypto_build_wapiie(struct wlan_objmgr_vdev *vdev,
|
|
|
|
|
|
frm = iebuf;
|
|
|
if (!frm) {
|
|
|
- qdf_print("%s[%d] ie buffer NULL\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] ie buffer NULL", __func__, __LINE__);
|
|
|
return NULL;
|
|
|
}
|
|
|
|
|
|
crypto_params = wlan_crypto_vdev_get_comp_params(vdev, &crypto_priv);
|
|
|
|
|
|
if (!crypto_params) {
|
|
|
- qdf_print("%s[%d] crypto_params NULL\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] crypto_params NULL", __func__, __LINE__);
|
|
|
return NULL;
|
|
|
}
|
|
|
|
|
@@ -2854,7 +2854,7 @@ QDF_STATUS wlan_crypto_set_peer_wep_keys(struct wlan_objmgr_vdev *vdev,
|
|
|
return QDF_STATUS_E_NULL_VALUE;
|
|
|
|
|
|
if (!peer) {
|
|
|
- qdf_print("%s[%d] peer NULL\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] peer NULL", __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
|
|
@@ -2862,7 +2862,7 @@ QDF_STATUS wlan_crypto_set_peer_wep_keys(struct wlan_objmgr_vdev *vdev,
|
|
|
psoc = wlan_vdev_get_psoc(vdev);
|
|
|
|
|
|
if (!psoc) {
|
|
|
- qdf_print("%s[%d] psoc NULL\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] psoc NULL", __func__, __LINE__);
|
|
|
return QDF_STATUS_E_NULL_VALUE;
|
|
|
}
|
|
|
|
|
@@ -2873,7 +2873,7 @@ QDF_STATUS wlan_crypto_set_peer_wep_keys(struct wlan_objmgr_vdev *vdev,
|
|
|
crypto_params = wlan_crypto_vdev_get_comp_params(vdev,
|
|
|
&crypto_priv);
|
|
|
if (crypto_priv == NULL) {
|
|
|
- qdf_print("%s[%d] crypto_priv NULL\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] crypto_priv NULL", __func__, __LINE__);
|
|
|
return QDF_STATUS_E_NULL_VALUE;
|
|
|
}
|
|
|
|
|
@@ -2884,14 +2884,14 @@ QDF_STATUS wlan_crypto_set_peer_wep_keys(struct wlan_objmgr_vdev *vdev,
|
|
|
if (opmode == QDF_STA_MODE) {
|
|
|
peer = wlan_vdev_get_bsspeer(vdev);
|
|
|
if (!peer) {
|
|
|
- qdf_print("%s[%d] peer NULL\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] peer NULL", __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
}
|
|
|
|
|
|
wlan_crypto_peer_get_comp_params(peer, &sta_crypto_priv);
|
|
|
if (sta_crypto_priv == NULL) {
|
|
|
- qdf_print("%s[%d] sta priv is null\n", __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] sta priv is null", __func__, __LINE__);
|
|
|
return QDF_STATUS_E_INVAL;
|
|
|
}
|
|
|
|
|
@@ -2908,8 +2908,8 @@ QDF_STATUS wlan_crypto_set_peer_wep_keys(struct wlan_objmgr_vdev *vdev,
|
|
|
sta_key = qdf_mem_malloc(
|
|
|
sizeof(struct wlan_crypto_key));
|
|
|
if (!sta_key) {
|
|
|
- qdf_print("%s[%d] key alloc failed\n",
|
|
|
- __func__, __LINE__);
|
|
|
+ qdf_print("%s[%d] key alloc failed",
|
|
|
+ __func__, __LINE__);
|
|
|
return QDF_STATUS_E_NOMEM;
|
|
|
}
|
|
|
sta_crypto_priv->key[i] = sta_key;
|
|
@@ -3090,13 +3090,13 @@ uint8_t wlan_crypto_get_peer_fils_aead(struct wlan_objmgr_peer *peer)
|
|
|
struct wlan_crypto_comp_priv *crypto_priv = NULL;
|
|
|
|
|
|
if (!peer) {
|
|
|
- qdf_print("Invalid Input");
|
|
|
+ qdf_err("Invalid Input");
|
|
|
return 0;
|
|
|
}
|
|
|
|
|
|
crypto_priv = wlan_get_peer_crypto_obj(peer);
|
|
|
if (!crypto_priv) {
|
|
|
- qdf_print("crypto_priv NULL");
|
|
|
+ qdf_err("crypto_priv NULL");
|
|
|
return 0;
|
|
|
}
|
|
|
|
|
@@ -3109,13 +3109,13 @@ wlan_crypto_set_peer_fils_aead(struct wlan_objmgr_peer *peer, uint8_t value)
|
|
|
struct wlan_crypto_comp_priv *crypto_priv = NULL;
|
|
|
|
|
|
if (!peer) {
|
|
|
- qdf_print("Invalid Input");
|
|
|
+ qdf_err("Invalid Input");
|
|
|
return;
|
|
|
}
|
|
|
|
|
|
crypto_priv = wlan_get_peer_crypto_obj(peer);
|
|
|
if (!crypto_priv) {
|
|
|
- qdf_print("crypto_priv NULL");
|
|
|
+ qdf_err("crypto_priv NULL");
|
|
|
return;
|
|
|
}
|
|
|
|
|
@@ -3245,7 +3245,7 @@ static void crypto_plumb_peer_keys(struct wlan_objmgr_vdev *vdev,
|
|
|
|
|
|
if ((NULL == peer) || (NULL == vdev) || (NULL == psoc)) {
|
|
|
QDF_TRACE(QDF_MODULE_ID_CRYPTO, QDF_TRACE_LEVEL_ERROR,
|
|
|
- "%s[%d] Peer or vdev or psoc objects are null!\n",
|
|
|
+ "%s[%d] Peer or vdev or psoc objects are null!",
|
|
|
__func__, __LINE__);
|
|
|
return;
|
|
|
}
|
|
@@ -3255,7 +3255,7 @@ static void crypto_plumb_peer_keys(struct wlan_objmgr_vdev *vdev,
|
|
|
|
|
|
if (!crypto_priv) {
|
|
|
QDF_TRACE(QDF_MODULE_ID_CRYPTO, QDF_TRACE_LEVEL_ERROR,
|
|
|
- "%s[%d] crypto_priv NULL\n",
|
|
|
+ "%s[%d] crypto_priv NULL",
|
|
|
__func__, __LINE__);
|
|
|
return;
|
|
|
}
|
|
@@ -3299,13 +3299,13 @@ void wlan_crypto_restore_keys(struct wlan_objmgr_vdev *vdev)
|
|
|
psoc = wlan_vdev_get_psoc(vdev);
|
|
|
if (NULL == pdev) {
|
|
|
QDF_TRACE(QDF_MODULE_ID_CRYPTO, QDF_TRACE_LEVEL_ERROR,
|
|
|
- "%s[%d] pdev is NULL\n",
|
|
|
+ "%s[%d] pdev is NULL",
|
|
|
__func__, __LINE__);
|
|
|
return;
|
|
|
}
|
|
|
if (NULL == psoc) {
|
|
|
QDF_TRACE(QDF_MODULE_ID_CRYPTO, QDF_TRACE_LEVEL_ERROR,
|
|
|
- "%s[%d] psoc is NULL\n",
|
|
|
+ "%s[%d] psoc is NULL",
|
|
|
__func__, __LINE__);
|
|
|
return;
|
|
|
}
|
|
@@ -3323,7 +3323,7 @@ void wlan_crypto_restore_keys(struct wlan_objmgr_vdev *vdev)
|
|
|
if (!crypto_priv) {
|
|
|
QDF_TRACE(QDF_MODULE_ID_CRYPTO,
|
|
|
QDF_TRACE_LEVEL_ERROR,
|
|
|
- "%s[%d] crypto_priv is NULL\n",
|
|
|
+ "%s[%d] crypto_priv is NULL",
|
|
|
__func__, __LINE__);
|
|
|
return;
|
|
|
}
|