diff options
author | Utkarsh Bhatnagar <ubhatnag@codeaurora.org> | 2020-12-01 18:11:03 +0530 |
---|---|---|
committer | chenpaul <chenpaul@google.com> | 2020-12-04 15:15:29 +0800 |
commit | 8554bfc3e2c9a640e3bacbfa430496e6748f731f (patch) | |
tree | 3711583fbe860d08fe5265a8deceaecb5f5a42be | |
parent | 20ad328bd46d682e64357ed0a2617fce1e9e9a24 (diff) | |
download | qcacld-8554bfc3e2c9a640e3bacbfa430496e6748f731f.tar.gz |
qcacld-3.0: Remove csr_roam_save_security_rsp_ie()
Remove csr_roam_save_security_rsp_ie() which is using
unused variables pWapiRspIE, nWapiRspIeLength,
nWpaRsnRspIeLength, pWpaRsnRspIE. Also remove
the functions which are used to get the value of
these variables.
Change-Id: I526fd492e98c119c51f760f7bfb58f454e5bebdf
CRs-Fixed: 2829557
Bug: 174210785
Signed-off-by: Srinivas Girigowda <quic_sgirigow@quicinc.com>
-rw-r--r-- | core/hdd/src/wlan_hdd_assoc.c | 6 | ||||
-rw-r--r-- | core/sme/inc/csr_internal.h | 11 | ||||
-rw-r--r-- | core/sme/inc/sme_api.h | 19 | ||||
-rw-r--r-- | core/sme/src/common/sme_api.c | 19 | ||||
-rw-r--r-- | core/sme/src/csr/csr_api_roam.c | 311 | ||||
-rw-r--r-- | core/sme/src/csr/csr_inside_api.h | 13 |
6 files changed, 1 insertions, 378 deletions
diff --git a/core/hdd/src/wlan_hdd_assoc.c b/core/hdd/src/wlan_hdd_assoc.c index e2e48dffef..d4cf809328 100644 --- a/core/hdd/src/wlan_hdd_assoc.c +++ b/core/hdd/src/wlan_hdd_assoc.c @@ -2966,8 +2966,6 @@ hdd_association_completion_handler(struct hdd_adapter *adapter, u8 *pFTAssocReq = NULL; unsigned int assocReqlen = 0; struct ieee80211_channel *chan; - uint8_t rspRsnIe[DOT11F_IE_RSN_MAX_LEN]; - uint32_t rspRsnLength = DOT11F_IE_RSN_MAX_LEN; /* add bss_id to cfg80211 data base */ bss = @@ -3182,10 +3180,6 @@ hdd_association_completion_handler(struct hdd_adapter *adapter, &reqRsnLength, reqRsnIe); - sme_roam_get_wpa_rsn_rsp_ie(mac_handle, - adapter->session_id, - &rspRsnLength, - rspRsnIe); if (!hddDisconInProgress) { if (ft_carrier_on) hdd_send_re_assoc_event(dev, diff --git a/core/sme/inc/csr_internal.h b/core/sme/inc/csr_internal.h index b1610a9fa5..f8b598f63f 100644 --- a/core/sme/inc/csr_internal.h +++ b/core/sme/inc/csr_internal.h @@ -879,19 +879,11 @@ struct csr_roam_session { uint32_t nWpaRsnReqIeLength; /* contain the WPA/RSN IE in assoc req or one sent in beacon(IBSS) */ uint8_t *pWpaRsnReqIE; - /* the byte count for pWpaRsnRspIE */ - uint32_t nWpaRsnRspIeLength; - /* this contain the WPA/RSN IE in beacon/probe rsp */ - uint8_t *pWpaRsnRspIE; #ifdef FEATURE_WLAN_WAPI /* the byte count of pWapiReqIE; */ uint32_t nWapiReqIeLength; /* this contain the WAPI IE in assoc req or one sent in beacon (IBSS) */ uint8_t *pWapiReqIE; - /* the byte count for pWapiRspIE */ - uint32_t nWapiRspIeLength; - /* this contain the WAPI IE in beacon/probe rsp */ - uint8_t *pWapiRspIE; #endif /* FEATURE_WLAN_WAPI */ uint32_t nAddIEScanLength; /* the byte count of pAddIeScanIE; */ /* contains the additional IE in (unicast) probe req at time of join */ @@ -1243,9 +1235,6 @@ QDF_STATUS csr_ready(tpAniSirGlobal pMac); #ifdef FEATURE_WLAN_WAPI QDF_STATUS csr_roam_get_wapi_req_ie(tpAniSirGlobal pMac, uint32_t sessionId, uint32_t *pLen, uint8_t *pBuf); -QDF_STATUS csr_roam_get_wapi_rsp_ie(tpAniSirGlobal pMac, - uint32_t sessionId, - uint32_t *pLen, uint8_t *pBuf); uint8_t csr_construct_wapi_ie(tpAniSirGlobal pMac, uint32_t sessionId, struct csr_roam_profile *pProfile, tSirBssDescription *pSirBssDesc, diff --git a/core/sme/inc/sme_api.h b/core/sme/inc/sme_api.h index 32d939b862..35c3022a97 100644 --- a/core/sme/inc/sme_api.h +++ b/core/sme/inc/sme_api.h @@ -495,25 +495,6 @@ QDF_STATUS sme_roam_set_psk_pmk(tHalHandle hHal, uint8_t sessionId, QDF_STATUS sme_roam_get_wpa_rsn_req_ie(tHalHandle hal, uint8_t session_id, uint32_t *len, uint8_t *buf); -/** - * sme_roam_get_wpa_rsn_rsp_ie() - Retrieve WPA/RSN Response IE - * @hal: HAL handle - * @session_id: ID of the specific session - * @len: Caller allocated memory that has the length of @buf as input. - * Upon returned, @len has the length of the IE store in @buf - * @buf: Caller allocated memory that contain the IE field, if any, - * upon return - * - * A wrapper function to request CSR to return the WPA or RSN IE CSR - * passes to PE to JOIN request or START_BSS request - * This is a synchronous call. - * - * Return: QDF_STATUS - when fail, it usually means the buffer allocated is not - * big enough - */ -QDF_STATUS sme_roam_get_wpa_rsn_rsp_ie(tHalHandle hal, uint8_t session_id, - uint32_t *len, uint8_t *buf); - uint32_t sme_roam_get_num_pmkid_cache(tHalHandle hHal, uint8_t sessionId); QDF_STATUS sme_roam_get_pmkid_cache(tHalHandle hHal, uint8_t sessionId, uint32_t *pNum, diff --git a/core/sme/src/common/sme_api.c b/core/sme/src/common/sme_api.c index f3baaac4f8..550f8ae676 100644 --- a/core/sme/src/common/sme_api.c +++ b/core/sme/src/common/sme_api.c @@ -3642,25 +3642,6 @@ QDF_STATUS sme_roam_get_wpa_rsn_req_ie(tHalHandle hal, uint8_t session_id, return status; } -QDF_STATUS sme_roam_get_wpa_rsn_rsp_ie(tHalHandle hal, uint8_t session_id, - uint32_t *len, uint8_t *buf) -{ - QDF_STATUS status; - tpAniSirGlobal mac = PMAC_STRUCT(hal); - - status = sme_acquire_global_lock(&mac->sme); - if (QDF_IS_STATUS_SUCCESS(status)) { - if (CSR_IS_SESSION_VALID(mac, session_id)) - status = csr_roam_get_wpa_rsn_rsp_ie(mac, session_id, - len, buf); - else - status = QDF_STATUS_E_INVAL; - sme_release_global_lock(&mac->sme); - } - - return status; -} - /* * sme_roam_get_num_pmkid_cache() - * A wrapper function to request CSR to return number of PMKID cache diff --git a/core/sme/src/csr/csr_api_roam.c b/core/sme/src/csr/csr_api_roam.c index edb2f2d5c4..60bc82aac2 100644 --- a/core/sme/src/csr/csr_api_roam.c +++ b/core/sme/src/csr/csr_api_roam.c @@ -7000,235 +7000,6 @@ void csr_reset_bkid_candidate_list(tpAniSirGlobal pMac, uint32_t sessionId) } #endif /* FEATURE_WLAN_WAPI */ -/** - * csr_roam_save_params() - Helper function to save params - * @mac_ctx: pointer to mac context - * @session_ptr: Session pointer - * @auth_type: auth type - * @ie_ptr: pointer to ie - * @ie_local: pointr to local ie - * - * This function will save params to session - * - * Return: none. - */ -static QDF_STATUS csr_roam_save_params(tpAniSirGlobal mac_ctx, - struct csr_roam_session *session_ptr, - eCsrAuthType auth_type, - tDot11fBeaconIEs *ie_ptr, - tDot11fBeaconIEs *ie_local) -{ - uint32_t nIeLen; - uint8_t *pIeBuf; - - if ((eCSR_AUTH_TYPE_RSN == auth_type) || - (eCSR_AUTH_TYPE_FT_RSN == auth_type) || - (eCSR_AUTH_TYPE_FT_RSN_PSK == auth_type) || -#if defined WLAN_FEATURE_11W - (eCSR_AUTH_TYPE_RSN_PSK_SHA256 == auth_type) || - (eCSR_AUTH_TYPE_RSN_8021X_SHA256 == auth_type) || -#endif - (eCSR_AUTH_TYPE_RSN_PSK == auth_type)) { - if (ie_local->RSN.present) { - tDot11fIERSN *rsnie = &ie_local->RSN; - /* - * Calculate the actual length - * version + gp_cipher_suite + pwise_cipher_suite_count - * + akm_suite_cnt + reserved + pwise_cipher_suites - */ - nIeLen = 8 + 2 + 2 - + (rsnie->pwise_cipher_suite_count * 4) - + (rsnie->akm_suite_cnt * 4); - if (rsnie->pmkid_count) - /* pmkid */ - nIeLen += 2 + rsnie->pmkid_count * 4; - - /* nIeLen doesn't count EID and length fields */ - session_ptr->pWpaRsnRspIE = qdf_mem_malloc(nIeLen + 2); - if (NULL == session_ptr->pWpaRsnRspIE) - return QDF_STATUS_E_NOMEM; - - session_ptr->pWpaRsnRspIE[0] = DOT11F_EID_RSN; - session_ptr->pWpaRsnRspIE[1] = (uint8_t) nIeLen; - /* copy upto akm_suite */ - pIeBuf = session_ptr->pWpaRsnRspIE + 2; - qdf_mem_copy(pIeBuf, &rsnie->version, - sizeof(rsnie->version)); - pIeBuf += sizeof(rsnie->version); - qdf_mem_copy(pIeBuf, &rsnie->gp_cipher_suite, - sizeof(rsnie->gp_cipher_suite)); - pIeBuf += sizeof(rsnie->gp_cipher_suite); - qdf_mem_copy(pIeBuf, &rsnie->pwise_cipher_suite_count, - sizeof(rsnie->pwise_cipher_suite_count)); - pIeBuf += sizeof(rsnie->pwise_cipher_suite_count); - if (rsnie->pwise_cipher_suite_count) { - /* copy pwise_cipher_suites */ - qdf_mem_copy(pIeBuf, rsnie->pwise_cipher_suites, - rsnie->pwise_cipher_suite_count * 4); - pIeBuf += rsnie->pwise_cipher_suite_count * 4; - } - qdf_mem_copy(pIeBuf, &rsnie->akm_suite_cnt, 2); - pIeBuf += 2; - if (rsnie->akm_suite_cnt) { - /* copy akm_suite */ - qdf_mem_copy(pIeBuf, rsnie->akm_suite, - rsnie->akm_suite_cnt * 4); - pIeBuf += rsnie->akm_suite_cnt * 4; - } - /* copy the rest */ - qdf_mem_copy(pIeBuf, rsnie->akm_suite + - rsnie->akm_suite_cnt * 4, - 2 + rsnie->pmkid_count * 4); - session_ptr->nWpaRsnRspIeLength = nIeLen + 2; - } - } else if ((eCSR_AUTH_TYPE_WPA == auth_type) || - (eCSR_AUTH_TYPE_WPA_PSK == auth_type)) { - if (ie_local->WPA.present) { - tDot11fIEWPA *wpaie = &ie_local->WPA; - /* Calculate the actual length wpaie */ - nIeLen = 12 + 2 /* auth_suite_count */ - + wpaie->unicast_cipher_count * 4 - + wpaie->auth_suite_count * 4; - - /* The WPA capabilities follows the Auth Suite - * (two octects)-- this field is optional, and - * we always "send" zero, so just remove it. This is - * consistent with our assumptions in the frames - * compiler; nIeLen doesn't count EID & length fields - */ - session_ptr->pWpaRsnRspIE = qdf_mem_malloc(nIeLen + 2); - if (NULL == session_ptr->pWpaRsnRspIE) - return QDF_STATUS_E_NOMEM; - session_ptr->pWpaRsnRspIE[0] = DOT11F_EID_WPA; - session_ptr->pWpaRsnRspIE[1] = (uint8_t) nIeLen; - pIeBuf = session_ptr->pWpaRsnRspIE + 2; - /* Copy WPA OUI */ - qdf_mem_copy(pIeBuf, &csr_wpa_oui[1], 4); - pIeBuf += 4; - qdf_mem_copy(pIeBuf, &wpaie->version, - 8 + wpaie->unicast_cipher_count * 4); - pIeBuf += 8 + wpaie->unicast_cipher_count * 4; - qdf_mem_copy(pIeBuf, &wpaie->auth_suite_count, - 2 + wpaie->auth_suite_count * 4); - pIeBuf += wpaie->auth_suite_count * 4; - session_ptr->nWpaRsnRspIeLength = nIeLen + 2; - } - } -#ifdef FEATURE_WLAN_WAPI - else if ((eCSR_AUTH_TYPE_WAPI_WAI_PSK == auth_type) || - (eCSR_AUTH_TYPE_WAPI_WAI_CERTIFICATE == - auth_type)) { - if (ie_local->WAPI.present) { - tDot11fIEWAPI *wapi_ie = &ie_local->WAPI; - /* Calculate the actual length of wapi ie*/ - nIeLen = 4 + 2 /* pwise_cipher_suite_count */ - + wapi_ie->akm_suite_count * 4 - + wapi_ie->unicast_cipher_suite_count * 4 - + 6; /* gp_cipher_suite + preauth + reserved */ - - if (wapi_ie->bkid_count) - nIeLen += 2 + wapi_ie->bkid_count * 4; - - /* nIeLen doesn't count EID and length fields */ - session_ptr->pWapiRspIE = - qdf_mem_malloc(nIeLen + 2); - if (NULL == session_ptr->pWapiRspIE) - return QDF_STATUS_E_NOMEM; - session_ptr->pWapiRspIE[0] = DOT11F_EID_WAPI; - session_ptr->pWapiRspIE[1] = (uint8_t) nIeLen; - pIeBuf = session_ptr->pWapiRspIE + 2; - /* copy upto akm_suite_count */ - qdf_mem_copy(pIeBuf, &wapi_ie->version, 2); - pIeBuf += 4; - if (wapi_ie->akm_suite_count) { - /* copy akm_suites */ - qdf_mem_copy(pIeBuf, - wapi_ie->akm_suites, - wapi_ie->akm_suite_count * 4); - pIeBuf += wapi_ie->akm_suite_count * 4; - } - qdf_mem_copy(pIeBuf, - &wapi_ie->unicast_cipher_suite_count, 2); - pIeBuf += 2; - if (wapi_ie->unicast_cipher_suite_count) { - uint16_t suite_size = - wapi_ie->unicast_cipher_suite_count * 4; - /* copy pwise_cipher_suites */ - qdf_mem_copy(pIeBuf, - wapi_ie->unicast_cipher_suites, - suite_size); - pIeBuf += suite_size; - } - /* gp_cipher_suite */ - qdf_mem_copy(pIeBuf, - wapi_ie->multicast_cipher_suite, 4); - pIeBuf += 4; - /* preauth + reserved */ - qdf_mem_copy(pIeBuf, - wapi_ie->multicast_cipher_suite + 4, 2); - pIeBuf += 2; - if (wapi_ie->bkid_count) { - /* bkid_count */ - qdf_mem_copy(pIeBuf, &wapi_ie->bkid_count, 2); - pIeBuf += 2; - /* copy akm_suites */ - qdf_mem_copy(pIeBuf, wapi_ie->bkid, - wapi_ie->bkid_count * 4); - pIeBuf += wapi_ie->bkid_count * 4; - } - session_ptr->nWapiRspIeLength = nIeLen + 2; - } - } -#endif /* FEATURE_WLAN_WAPI */ - return QDF_STATUS_SUCCESS; -} - -static QDF_STATUS csr_roam_save_security_rsp_ie(tpAniSirGlobal pMac, - uint32_t sessionId, - eCsrAuthType authType, - tSirBssDescription *pSirBssDesc, - tDot11fBeaconIEs *pIes) -{ - QDF_STATUS status = QDF_STATUS_SUCCESS; - struct csr_roam_session *pSession = CSR_GET_SESSION(pMac, sessionId); - tDot11fBeaconIEs *pIesLocal = pIes; - - if (!pSession) { - sme_err("session %d not found", sessionId); - return QDF_STATUS_E_FAILURE; - } - - sme_debug("authType %d session %d", authType, sessionId); - if ((eCSR_AUTH_TYPE_WPA == authType) || - (eCSR_AUTH_TYPE_WPA_PSK == authType) || - (eCSR_AUTH_TYPE_RSN == authType) || - (eCSR_AUTH_TYPE_RSN_PSK == authType) - || (eCSR_AUTH_TYPE_FT_RSN == authType) || - (eCSR_AUTH_TYPE_FT_RSN_PSK == authType) -#ifdef FEATURE_WLAN_WAPI - || (eCSR_AUTH_TYPE_WAPI_WAI_PSK == authType) || - (eCSR_AUTH_TYPE_WAPI_WAI_CERTIFICATE == authType) -#endif /* FEATURE_WLAN_WAPI */ -#ifdef WLAN_FEATURE_11W - || (eCSR_AUTH_TYPE_RSN_PSK_SHA256 == authType) || - (eCSR_AUTH_TYPE_RSN_8021X_SHA256 == authType) -#endif /* FEATURE_WLAN_WAPI */ - || (eCSR_AUTH_TYPE_SAE == authType)) { - if (!pIesLocal && !QDF_IS_STATUS_SUCCESS - (csr_get_parsed_bss_description_ies(pMac, - pSirBssDesc, &pIesLocal))) - sme_err(" cannot parse IEs"); - if (pIesLocal) { - status = csr_roam_save_params(pMac, pSession, authType, - pIes, pIesLocal); - if (!pIes) - /* locally allocated */ - qdf_mem_free(pIesLocal); - } - } - return status; -} - /* Returns whether the current association is a 11r assoc or not */ bool csr_roam_is11r_assoc(tpAniSirGlobal pMac, uint8_t sessionId) { @@ -8054,19 +7825,6 @@ static void csr_roam_process_join_res(tpAniSirGlobal mac_ctx, ind_qos = SME_QOS_CSR_ASSOC_COMPLETE; } sme_debug("receives association indication"); - /* always free the memory here */ - if (session->pWpaRsnRspIE) { - session->nWpaRsnRspIeLength = 0; - qdf_mem_free(session->pWpaRsnRspIE); - session->pWpaRsnRspIE = NULL; - } -#ifdef FEATURE_WLAN_WAPI - if (session->pWapiRspIE) { - session->nWapiRspIeLength = 0; - qdf_mem_free(session->pWapiRspIE); - session->pWapiRspIE = NULL; - } -#endif /* FEATURE_WLAN_WAPI */ #ifdef FEATURE_WLAN_BTAMP_UT_RF session->maxRetryCount = 0; csr_roam_stop_join_retry_timer(mac_ctx, session_id); @@ -8109,9 +7867,6 @@ static void csr_roam_process_join_res(tpAniSirGlobal mac_ctx, roam_info.staId = STA_INVALID_IDX; csr_roam_save_connected_information(mac_ctx, session_id, profile, bss_desc, ies_ptr); - /* Save WPA/RSN IE */ - csr_roam_save_security_rsp_ie(mac_ctx, session_id, - profile->negotiatedAuthType, bss_desc, ies_ptr); #ifdef FEATURE_WLAN_ESE roam_info.isESEAssoc = conn_profile->isESEAssoc; #endif @@ -15513,32 +15268,6 @@ QDF_STATUS csr_roam_get_wpa_rsn_req_ie(tpAniSirGlobal pMac, uint32_t sessionId, return status; } -QDF_STATUS csr_roam_get_wpa_rsn_rsp_ie(tpAniSirGlobal pMac, uint32_t sessionId, - uint32_t *pLen, uint8_t *pBuf) -{ - QDF_STATUS status = QDF_STATUS_E_INVAL; - uint32_t len; - struct csr_roam_session *pSession = CSR_GET_SESSION(pMac, sessionId); - - if (!pSession) { - sme_err("session %d not found", sessionId); - return QDF_STATUS_E_FAILURE; - } - - if (pLen) { - len = *pLen; - *pLen = pSession->nWpaRsnRspIeLength; - if (pBuf) { - if (len >= pSession->nWpaRsnRspIeLength) { - qdf_mem_copy(pBuf, pSession->pWpaRsnRspIE, - pSession->nWpaRsnRspIeLength); - status = QDF_STATUS_SUCCESS; - } - } - } - return status; -} - #ifdef FEATURE_WLAN_WAPI QDF_STATUS csr_roam_get_wapi_req_ie(tpAniSirGlobal pMac, uint32_t sessionId, uint32_t *pLen, uint8_t *pBuf) @@ -15565,33 +15294,8 @@ QDF_STATUS csr_roam_get_wapi_req_ie(tpAniSirGlobal pMac, uint32_t sessionId, } return status; } - -QDF_STATUS csr_roam_get_wapi_rsp_ie(tpAniSirGlobal pMac, uint32_t sessionId, - uint32_t *pLen, uint8_t *pBuf) -{ - QDF_STATUS status = QDF_STATUS_E_INVAL; - uint32_t len; - struct csr_roam_session *pSession = CSR_GET_SESSION(pMac, sessionId); - - if (!pSession) { - sme_err("session %d not found", sessionId); - return QDF_STATUS_E_FAILURE; - } - - if (pLen) { - len = *pLen; - *pLen = pSession->nWapiRspIeLength; - if (pBuf) { - if (len >= pSession->nWapiRspIeLength) { - qdf_mem_copy(pBuf, pSession->pWapiRspIE, - pSession->nWapiRspIeLength); - status = QDF_STATUS_SUCCESS; - } - } - } - return status; -} #endif /* FEATURE_WLAN_WAPI */ + eRoamCmdStatus csr_get_roam_complete_status(tpAniSirGlobal pMac, uint32_t sessionId) { @@ -18254,22 +17958,12 @@ static void csr_init_session(tpAniSirGlobal pMac, uint32_t sessionId) pSession->pWpaRsnReqIE = NULL; } pSession->nWpaRsnReqIeLength = 0; - if (pSession->pWpaRsnRspIE) { - qdf_mem_free(pSession->pWpaRsnRspIE); - pSession->pWpaRsnRspIE = NULL; - } - pSession->nWpaRsnRspIeLength = 0; #ifdef FEATURE_WLAN_WAPI if (pSession->pWapiReqIE) { qdf_mem_free(pSession->pWapiReqIE); pSession->pWapiReqIE = NULL; } pSession->nWapiReqIeLength = 0; - if (pSession->pWapiRspIE) { - qdf_mem_free(pSession->pWapiRspIE); - pSession->pWapiRspIE = NULL; - } - pSession->nWapiRspIeLength = 0; #endif /* FEATURE_WLAN_WAPI */ if (pSession->pAddIEScan) { qdf_mem_free(pSession->pAddIEScan); @@ -22735,9 +22429,6 @@ static QDF_STATUS csr_process_roam_sync_callback(tpAniSirGlobal mac_ctx, /* Add new mlme info to new BSSID after upting connectedProfile */ csr_update_scan_entry_associnfo(mac_ctx, session, SCAN_ENTRY_CON_STATE_ASSOC); - csr_roam_save_security_rsp_ie(mac_ctx, session_id, - session->pCurRoamProfile->negotiatedAuthType, - bss_desc, ies_local); #ifdef FEATURE_WLAN_ESE roam_info->isESEAssoc = conn_profile->isESEAssoc; diff --git a/core/sme/src/csr/csr_inside_api.h b/core/sme/src/csr/csr_inside_api.h index e401cf32e7..b2602b127c 100644 --- a/core/sme/src/csr/csr_inside_api.h +++ b/core/sme/src/csr/csr_inside_api.h @@ -792,19 +792,6 @@ QDF_STATUS csr_roam_get_wpa_rsn_req_ie(tpAniSirGlobal pMac, uint32_t sessionId, uint32_t *pLen, uint8_t *pBuf); /* - * csr_roam_get_wpa_rsn_rsp_ie() - - * Return the WPA or RSN IE from the beacon or probe rsp if connected - * - * pLen - caller allocated memory that has the length of pBuf as input. - * Upon returned, *pLen has the needed or IE length in pBuf. - * pBuf - Caller allocated memory that contain the IE field, if any, upon return - * Return QDF_STATUS - when fail, it usually means the buffer allocated is not - * big enough - */ -QDF_STATUS csr_roam_get_wpa_rsn_rsp_ie(tpAniSirGlobal pMac, uint32_t sessionId, - uint32_t *pLen, uint8_t *pBuf); - -/* * csr_roam_get_num_pmkid_cache() - * Return number of PMKID cache entries * |