summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorUtkarsh Bhatnagar <ubhatnag@codeaurora.org>2020-12-01 18:11:03 +0530
committerchenpaul <chenpaul@google.com>2020-12-04 15:15:29 +0800
commit8554bfc3e2c9a640e3bacbfa430496e6748f731f (patch)
tree3711583fbe860d08fe5265a8deceaecb5f5a42be
parent20ad328bd46d682e64357ed0a2617fce1e9e9a24 (diff)
downloadqcacld-8554bfc3e2c9a640e3bacbfa430496e6748f731f.tar.gz
qcacld-3.0: Remove csr_roam_save_security_rsp_ie()
Remove csr_roam_save_security_rsp_ie() which is using unused variables pWapiRspIE, nWapiRspIeLength, nWpaRsnRspIeLength, pWpaRsnRspIE. Also remove the functions which are used to get the value of these variables. Change-Id: I526fd492e98c119c51f760f7bfb58f454e5bebdf CRs-Fixed: 2829557 Bug: 174210785 Signed-off-by: Srinivas Girigowda <quic_sgirigow@quicinc.com>
-rw-r--r--core/hdd/src/wlan_hdd_assoc.c6
-rw-r--r--core/sme/inc/csr_internal.h11
-rw-r--r--core/sme/inc/sme_api.h19
-rw-r--r--core/sme/src/common/sme_api.c19
-rw-r--r--core/sme/src/csr/csr_api_roam.c311
-rw-r--r--core/sme/src/csr/csr_inside_api.h13
6 files changed, 1 insertions, 378 deletions
diff --git a/core/hdd/src/wlan_hdd_assoc.c b/core/hdd/src/wlan_hdd_assoc.c
index e2e48dffef..d4cf809328 100644
--- a/core/hdd/src/wlan_hdd_assoc.c
+++ b/core/hdd/src/wlan_hdd_assoc.c
@@ -2966,8 +2966,6 @@ hdd_association_completion_handler(struct hdd_adapter *adapter,
u8 *pFTAssocReq = NULL;
unsigned int assocReqlen = 0;
struct ieee80211_channel *chan;
- uint8_t rspRsnIe[DOT11F_IE_RSN_MAX_LEN];
- uint32_t rspRsnLength = DOT11F_IE_RSN_MAX_LEN;
/* add bss_id to cfg80211 data base */
bss =
@@ -3182,10 +3180,6 @@ hdd_association_completion_handler(struct hdd_adapter *adapter,
&reqRsnLength,
reqRsnIe);
- sme_roam_get_wpa_rsn_rsp_ie(mac_handle,
- adapter->session_id,
- &rspRsnLength,
- rspRsnIe);
if (!hddDisconInProgress) {
if (ft_carrier_on)
hdd_send_re_assoc_event(dev,
diff --git a/core/sme/inc/csr_internal.h b/core/sme/inc/csr_internal.h
index b1610a9fa5..f8b598f63f 100644
--- a/core/sme/inc/csr_internal.h
+++ b/core/sme/inc/csr_internal.h
@@ -879,19 +879,11 @@ struct csr_roam_session {
uint32_t nWpaRsnReqIeLength;
/* contain the WPA/RSN IE in assoc req or one sent in beacon(IBSS) */
uint8_t *pWpaRsnReqIE;
- /* the byte count for pWpaRsnRspIE */
- uint32_t nWpaRsnRspIeLength;
- /* this contain the WPA/RSN IE in beacon/probe rsp */
- uint8_t *pWpaRsnRspIE;
#ifdef FEATURE_WLAN_WAPI
/* the byte count of pWapiReqIE; */
uint32_t nWapiReqIeLength;
/* this contain the WAPI IE in assoc req or one sent in beacon (IBSS) */
uint8_t *pWapiReqIE;
- /* the byte count for pWapiRspIE */
- uint32_t nWapiRspIeLength;
- /* this contain the WAPI IE in beacon/probe rsp */
- uint8_t *pWapiRspIE;
#endif /* FEATURE_WLAN_WAPI */
uint32_t nAddIEScanLength; /* the byte count of pAddIeScanIE; */
/* contains the additional IE in (unicast) probe req at time of join */
@@ -1243,9 +1235,6 @@ QDF_STATUS csr_ready(tpAniSirGlobal pMac);
#ifdef FEATURE_WLAN_WAPI
QDF_STATUS csr_roam_get_wapi_req_ie(tpAniSirGlobal pMac,
uint32_t sessionId, uint32_t *pLen, uint8_t *pBuf);
-QDF_STATUS csr_roam_get_wapi_rsp_ie(tpAniSirGlobal pMac,
- uint32_t sessionId,
- uint32_t *pLen, uint8_t *pBuf);
uint8_t csr_construct_wapi_ie(tpAniSirGlobal pMac, uint32_t sessionId,
struct csr_roam_profile *pProfile,
tSirBssDescription *pSirBssDesc,
diff --git a/core/sme/inc/sme_api.h b/core/sme/inc/sme_api.h
index 32d939b862..35c3022a97 100644
--- a/core/sme/inc/sme_api.h
+++ b/core/sme/inc/sme_api.h
@@ -495,25 +495,6 @@ QDF_STATUS sme_roam_set_psk_pmk(tHalHandle hHal, uint8_t sessionId,
QDF_STATUS sme_roam_get_wpa_rsn_req_ie(tHalHandle hal, uint8_t session_id,
uint32_t *len, uint8_t *buf);
-/**
- * sme_roam_get_wpa_rsn_rsp_ie() - Retrieve WPA/RSN Response IE
- * @hal: HAL handle
- * @session_id: ID of the specific session
- * @len: Caller allocated memory that has the length of @buf as input.
- * Upon returned, @len has the length of the IE store in @buf
- * @buf: Caller allocated memory that contain the IE field, if any,
- * upon return
- *
- * A wrapper function to request CSR to return the WPA or RSN IE CSR
- * passes to PE to JOIN request or START_BSS request
- * This is a synchronous call.
- *
- * Return: QDF_STATUS - when fail, it usually means the buffer allocated is not
- * big enough
- */
-QDF_STATUS sme_roam_get_wpa_rsn_rsp_ie(tHalHandle hal, uint8_t session_id,
- uint32_t *len, uint8_t *buf);
-
uint32_t sme_roam_get_num_pmkid_cache(tHalHandle hHal, uint8_t sessionId);
QDF_STATUS sme_roam_get_pmkid_cache(tHalHandle hHal, uint8_t sessionId,
uint32_t *pNum,
diff --git a/core/sme/src/common/sme_api.c b/core/sme/src/common/sme_api.c
index f3baaac4f8..550f8ae676 100644
--- a/core/sme/src/common/sme_api.c
+++ b/core/sme/src/common/sme_api.c
@@ -3642,25 +3642,6 @@ QDF_STATUS sme_roam_get_wpa_rsn_req_ie(tHalHandle hal, uint8_t session_id,
return status;
}
-QDF_STATUS sme_roam_get_wpa_rsn_rsp_ie(tHalHandle hal, uint8_t session_id,
- uint32_t *len, uint8_t *buf)
-{
- QDF_STATUS status;
- tpAniSirGlobal mac = PMAC_STRUCT(hal);
-
- status = sme_acquire_global_lock(&mac->sme);
- if (QDF_IS_STATUS_SUCCESS(status)) {
- if (CSR_IS_SESSION_VALID(mac, session_id))
- status = csr_roam_get_wpa_rsn_rsp_ie(mac, session_id,
- len, buf);
- else
- status = QDF_STATUS_E_INVAL;
- sme_release_global_lock(&mac->sme);
- }
-
- return status;
-}
-
/*
* sme_roam_get_num_pmkid_cache() -
* A wrapper function to request CSR to return number of PMKID cache
diff --git a/core/sme/src/csr/csr_api_roam.c b/core/sme/src/csr/csr_api_roam.c
index edb2f2d5c4..60bc82aac2 100644
--- a/core/sme/src/csr/csr_api_roam.c
+++ b/core/sme/src/csr/csr_api_roam.c
@@ -7000,235 +7000,6 @@ void csr_reset_bkid_candidate_list(tpAniSirGlobal pMac, uint32_t sessionId)
}
#endif /* FEATURE_WLAN_WAPI */
-/**
- * csr_roam_save_params() - Helper function to save params
- * @mac_ctx: pointer to mac context
- * @session_ptr: Session pointer
- * @auth_type: auth type
- * @ie_ptr: pointer to ie
- * @ie_local: pointr to local ie
- *
- * This function will save params to session
- *
- * Return: none.
- */
-static QDF_STATUS csr_roam_save_params(tpAniSirGlobal mac_ctx,
- struct csr_roam_session *session_ptr,
- eCsrAuthType auth_type,
- tDot11fBeaconIEs *ie_ptr,
- tDot11fBeaconIEs *ie_local)
-{
- uint32_t nIeLen;
- uint8_t *pIeBuf;
-
- if ((eCSR_AUTH_TYPE_RSN == auth_type) ||
- (eCSR_AUTH_TYPE_FT_RSN == auth_type) ||
- (eCSR_AUTH_TYPE_FT_RSN_PSK == auth_type) ||
-#if defined WLAN_FEATURE_11W
- (eCSR_AUTH_TYPE_RSN_PSK_SHA256 == auth_type) ||
- (eCSR_AUTH_TYPE_RSN_8021X_SHA256 == auth_type) ||
-#endif
- (eCSR_AUTH_TYPE_RSN_PSK == auth_type)) {
- if (ie_local->RSN.present) {
- tDot11fIERSN *rsnie = &ie_local->RSN;
- /*
- * Calculate the actual length
- * version + gp_cipher_suite + pwise_cipher_suite_count
- * + akm_suite_cnt + reserved + pwise_cipher_suites
- */
- nIeLen = 8 + 2 + 2
- + (rsnie->pwise_cipher_suite_count * 4)
- + (rsnie->akm_suite_cnt * 4);
- if (rsnie->pmkid_count)
- /* pmkid */
- nIeLen += 2 + rsnie->pmkid_count * 4;
-
- /* nIeLen doesn't count EID and length fields */
- session_ptr->pWpaRsnRspIE = qdf_mem_malloc(nIeLen + 2);
- if (NULL == session_ptr->pWpaRsnRspIE)
- return QDF_STATUS_E_NOMEM;
-
- session_ptr->pWpaRsnRspIE[0] = DOT11F_EID_RSN;
- session_ptr->pWpaRsnRspIE[1] = (uint8_t) nIeLen;
- /* copy upto akm_suite */
- pIeBuf = session_ptr->pWpaRsnRspIE + 2;
- qdf_mem_copy(pIeBuf, &rsnie->version,
- sizeof(rsnie->version));
- pIeBuf += sizeof(rsnie->version);
- qdf_mem_copy(pIeBuf, &rsnie->gp_cipher_suite,
- sizeof(rsnie->gp_cipher_suite));
- pIeBuf += sizeof(rsnie->gp_cipher_suite);
- qdf_mem_copy(pIeBuf, &rsnie->pwise_cipher_suite_count,
- sizeof(rsnie->pwise_cipher_suite_count));
- pIeBuf += sizeof(rsnie->pwise_cipher_suite_count);
- if (rsnie->pwise_cipher_suite_count) {
- /* copy pwise_cipher_suites */
- qdf_mem_copy(pIeBuf, rsnie->pwise_cipher_suites,
- rsnie->pwise_cipher_suite_count * 4);
- pIeBuf += rsnie->pwise_cipher_suite_count * 4;
- }
- qdf_mem_copy(pIeBuf, &rsnie->akm_suite_cnt, 2);
- pIeBuf += 2;
- if (rsnie->akm_suite_cnt) {
- /* copy akm_suite */
- qdf_mem_copy(pIeBuf, rsnie->akm_suite,
- rsnie->akm_suite_cnt * 4);
- pIeBuf += rsnie->akm_suite_cnt * 4;
- }
- /* copy the rest */
- qdf_mem_copy(pIeBuf, rsnie->akm_suite +
- rsnie->akm_suite_cnt * 4,
- 2 + rsnie->pmkid_count * 4);
- session_ptr->nWpaRsnRspIeLength = nIeLen + 2;
- }
- } else if ((eCSR_AUTH_TYPE_WPA == auth_type) ||
- (eCSR_AUTH_TYPE_WPA_PSK == auth_type)) {
- if (ie_local->WPA.present) {
- tDot11fIEWPA *wpaie = &ie_local->WPA;
- /* Calculate the actual length wpaie */
- nIeLen = 12 + 2 /* auth_suite_count */
- + wpaie->unicast_cipher_count * 4
- + wpaie->auth_suite_count * 4;
-
- /* The WPA capabilities follows the Auth Suite
- * (two octects)-- this field is optional, and
- * we always "send" zero, so just remove it. This is
- * consistent with our assumptions in the frames
- * compiler; nIeLen doesn't count EID & length fields
- */
- session_ptr->pWpaRsnRspIE = qdf_mem_malloc(nIeLen + 2);
- if (NULL == session_ptr->pWpaRsnRspIE)
- return QDF_STATUS_E_NOMEM;
- session_ptr->pWpaRsnRspIE[0] = DOT11F_EID_WPA;
- session_ptr->pWpaRsnRspIE[1] = (uint8_t) nIeLen;
- pIeBuf = session_ptr->pWpaRsnRspIE + 2;
- /* Copy WPA OUI */
- qdf_mem_copy(pIeBuf, &csr_wpa_oui[1], 4);
- pIeBuf += 4;
- qdf_mem_copy(pIeBuf, &wpaie->version,
- 8 + wpaie->unicast_cipher_count * 4);
- pIeBuf += 8 + wpaie->unicast_cipher_count * 4;
- qdf_mem_copy(pIeBuf, &wpaie->auth_suite_count,
- 2 + wpaie->auth_suite_count * 4);
- pIeBuf += wpaie->auth_suite_count * 4;
- session_ptr->nWpaRsnRspIeLength = nIeLen + 2;
- }
- }
-#ifdef FEATURE_WLAN_WAPI
- else if ((eCSR_AUTH_TYPE_WAPI_WAI_PSK == auth_type) ||
- (eCSR_AUTH_TYPE_WAPI_WAI_CERTIFICATE ==
- auth_type)) {
- if (ie_local->WAPI.present) {
- tDot11fIEWAPI *wapi_ie = &ie_local->WAPI;
- /* Calculate the actual length of wapi ie*/
- nIeLen = 4 + 2 /* pwise_cipher_suite_count */
- + wapi_ie->akm_suite_count * 4
- + wapi_ie->unicast_cipher_suite_count * 4
- + 6; /* gp_cipher_suite + preauth + reserved */
-
- if (wapi_ie->bkid_count)
- nIeLen += 2 + wapi_ie->bkid_count * 4;
-
- /* nIeLen doesn't count EID and length fields */
- session_ptr->pWapiRspIE =
- qdf_mem_malloc(nIeLen + 2);
- if (NULL == session_ptr->pWapiRspIE)
- return QDF_STATUS_E_NOMEM;
- session_ptr->pWapiRspIE[0] = DOT11F_EID_WAPI;
- session_ptr->pWapiRspIE[1] = (uint8_t) nIeLen;
- pIeBuf = session_ptr->pWapiRspIE + 2;
- /* copy upto akm_suite_count */
- qdf_mem_copy(pIeBuf, &wapi_ie->version, 2);
- pIeBuf += 4;
- if (wapi_ie->akm_suite_count) {
- /* copy akm_suites */
- qdf_mem_copy(pIeBuf,
- wapi_ie->akm_suites,
- wapi_ie->akm_suite_count * 4);
- pIeBuf += wapi_ie->akm_suite_count * 4;
- }
- qdf_mem_copy(pIeBuf,
- &wapi_ie->unicast_cipher_suite_count, 2);
- pIeBuf += 2;
- if (wapi_ie->unicast_cipher_suite_count) {
- uint16_t suite_size =
- wapi_ie->unicast_cipher_suite_count * 4;
- /* copy pwise_cipher_suites */
- qdf_mem_copy(pIeBuf,
- wapi_ie->unicast_cipher_suites,
- suite_size);
- pIeBuf += suite_size;
- }
- /* gp_cipher_suite */
- qdf_mem_copy(pIeBuf,
- wapi_ie->multicast_cipher_suite, 4);
- pIeBuf += 4;
- /* preauth + reserved */
- qdf_mem_copy(pIeBuf,
- wapi_ie->multicast_cipher_suite + 4, 2);
- pIeBuf += 2;
- if (wapi_ie->bkid_count) {
- /* bkid_count */
- qdf_mem_copy(pIeBuf, &wapi_ie->bkid_count, 2);
- pIeBuf += 2;
- /* copy akm_suites */
- qdf_mem_copy(pIeBuf, wapi_ie->bkid,
- wapi_ie->bkid_count * 4);
- pIeBuf += wapi_ie->bkid_count * 4;
- }
- session_ptr->nWapiRspIeLength = nIeLen + 2;
- }
- }
-#endif /* FEATURE_WLAN_WAPI */
- return QDF_STATUS_SUCCESS;
-}
-
-static QDF_STATUS csr_roam_save_security_rsp_ie(tpAniSirGlobal pMac,
- uint32_t sessionId,
- eCsrAuthType authType,
- tSirBssDescription *pSirBssDesc,
- tDot11fBeaconIEs *pIes)
-{
- QDF_STATUS status = QDF_STATUS_SUCCESS;
- struct csr_roam_session *pSession = CSR_GET_SESSION(pMac, sessionId);
- tDot11fBeaconIEs *pIesLocal = pIes;
-
- if (!pSession) {
- sme_err("session %d not found", sessionId);
- return QDF_STATUS_E_FAILURE;
- }
-
- sme_debug("authType %d session %d", authType, sessionId);
- if ((eCSR_AUTH_TYPE_WPA == authType) ||
- (eCSR_AUTH_TYPE_WPA_PSK == authType) ||
- (eCSR_AUTH_TYPE_RSN == authType) ||
- (eCSR_AUTH_TYPE_RSN_PSK == authType)
- || (eCSR_AUTH_TYPE_FT_RSN == authType) ||
- (eCSR_AUTH_TYPE_FT_RSN_PSK == authType)
-#ifdef FEATURE_WLAN_WAPI
- || (eCSR_AUTH_TYPE_WAPI_WAI_PSK == authType) ||
- (eCSR_AUTH_TYPE_WAPI_WAI_CERTIFICATE == authType)
-#endif /* FEATURE_WLAN_WAPI */
-#ifdef WLAN_FEATURE_11W
- || (eCSR_AUTH_TYPE_RSN_PSK_SHA256 == authType) ||
- (eCSR_AUTH_TYPE_RSN_8021X_SHA256 == authType)
-#endif /* FEATURE_WLAN_WAPI */
- || (eCSR_AUTH_TYPE_SAE == authType)) {
- if (!pIesLocal && !QDF_IS_STATUS_SUCCESS
- (csr_get_parsed_bss_description_ies(pMac,
- pSirBssDesc, &pIesLocal)))
- sme_err(" cannot parse IEs");
- if (pIesLocal) {
- status = csr_roam_save_params(pMac, pSession, authType,
- pIes, pIesLocal);
- if (!pIes)
- /* locally allocated */
- qdf_mem_free(pIesLocal);
- }
- }
- return status;
-}
-
/* Returns whether the current association is a 11r assoc or not */
bool csr_roam_is11r_assoc(tpAniSirGlobal pMac, uint8_t sessionId)
{
@@ -8054,19 +7825,6 @@ static void csr_roam_process_join_res(tpAniSirGlobal mac_ctx,
ind_qos = SME_QOS_CSR_ASSOC_COMPLETE;
}
sme_debug("receives association indication");
- /* always free the memory here */
- if (session->pWpaRsnRspIE) {
- session->nWpaRsnRspIeLength = 0;
- qdf_mem_free(session->pWpaRsnRspIE);
- session->pWpaRsnRspIE = NULL;
- }
-#ifdef FEATURE_WLAN_WAPI
- if (session->pWapiRspIE) {
- session->nWapiRspIeLength = 0;
- qdf_mem_free(session->pWapiRspIE);
- session->pWapiRspIE = NULL;
- }
-#endif /* FEATURE_WLAN_WAPI */
#ifdef FEATURE_WLAN_BTAMP_UT_RF
session->maxRetryCount = 0;
csr_roam_stop_join_retry_timer(mac_ctx, session_id);
@@ -8109,9 +7867,6 @@ static void csr_roam_process_join_res(tpAniSirGlobal mac_ctx,
roam_info.staId = STA_INVALID_IDX;
csr_roam_save_connected_information(mac_ctx, session_id,
profile, bss_desc, ies_ptr);
- /* Save WPA/RSN IE */
- csr_roam_save_security_rsp_ie(mac_ctx, session_id,
- profile->negotiatedAuthType, bss_desc, ies_ptr);
#ifdef FEATURE_WLAN_ESE
roam_info.isESEAssoc = conn_profile->isESEAssoc;
#endif
@@ -15513,32 +15268,6 @@ QDF_STATUS csr_roam_get_wpa_rsn_req_ie(tpAniSirGlobal pMac, uint32_t sessionId,
return status;
}
-QDF_STATUS csr_roam_get_wpa_rsn_rsp_ie(tpAniSirGlobal pMac, uint32_t sessionId,
- uint32_t *pLen, uint8_t *pBuf)
-{
- QDF_STATUS status = QDF_STATUS_E_INVAL;
- uint32_t len;
- struct csr_roam_session *pSession = CSR_GET_SESSION(pMac, sessionId);
-
- if (!pSession) {
- sme_err("session %d not found", sessionId);
- return QDF_STATUS_E_FAILURE;
- }
-
- if (pLen) {
- len = *pLen;
- *pLen = pSession->nWpaRsnRspIeLength;
- if (pBuf) {
- if (len >= pSession->nWpaRsnRspIeLength) {
- qdf_mem_copy(pBuf, pSession->pWpaRsnRspIE,
- pSession->nWpaRsnRspIeLength);
- status = QDF_STATUS_SUCCESS;
- }
- }
- }
- return status;
-}
-
#ifdef FEATURE_WLAN_WAPI
QDF_STATUS csr_roam_get_wapi_req_ie(tpAniSirGlobal pMac, uint32_t sessionId,
uint32_t *pLen, uint8_t *pBuf)
@@ -15565,33 +15294,8 @@ QDF_STATUS csr_roam_get_wapi_req_ie(tpAniSirGlobal pMac, uint32_t sessionId,
}
return status;
}
-
-QDF_STATUS csr_roam_get_wapi_rsp_ie(tpAniSirGlobal pMac, uint32_t sessionId,
- uint32_t *pLen, uint8_t *pBuf)
-{
- QDF_STATUS status = QDF_STATUS_E_INVAL;
- uint32_t len;
- struct csr_roam_session *pSession = CSR_GET_SESSION(pMac, sessionId);
-
- if (!pSession) {
- sme_err("session %d not found", sessionId);
- return QDF_STATUS_E_FAILURE;
- }
-
- if (pLen) {
- len = *pLen;
- *pLen = pSession->nWapiRspIeLength;
- if (pBuf) {
- if (len >= pSession->nWapiRspIeLength) {
- qdf_mem_copy(pBuf, pSession->pWapiRspIE,
- pSession->nWapiRspIeLength);
- status = QDF_STATUS_SUCCESS;
- }
- }
- }
- return status;
-}
#endif /* FEATURE_WLAN_WAPI */
+
eRoamCmdStatus csr_get_roam_complete_status(tpAniSirGlobal pMac,
uint32_t sessionId)
{
@@ -18254,22 +17958,12 @@ static void csr_init_session(tpAniSirGlobal pMac, uint32_t sessionId)
pSession->pWpaRsnReqIE = NULL;
}
pSession->nWpaRsnReqIeLength = 0;
- if (pSession->pWpaRsnRspIE) {
- qdf_mem_free(pSession->pWpaRsnRspIE);
- pSession->pWpaRsnRspIE = NULL;
- }
- pSession->nWpaRsnRspIeLength = 0;
#ifdef FEATURE_WLAN_WAPI
if (pSession->pWapiReqIE) {
qdf_mem_free(pSession->pWapiReqIE);
pSession->pWapiReqIE = NULL;
}
pSession->nWapiReqIeLength = 0;
- if (pSession->pWapiRspIE) {
- qdf_mem_free(pSession->pWapiRspIE);
- pSession->pWapiRspIE = NULL;
- }
- pSession->nWapiRspIeLength = 0;
#endif /* FEATURE_WLAN_WAPI */
if (pSession->pAddIEScan) {
qdf_mem_free(pSession->pAddIEScan);
@@ -22735,9 +22429,6 @@ static QDF_STATUS csr_process_roam_sync_callback(tpAniSirGlobal mac_ctx,
/* Add new mlme info to new BSSID after upting connectedProfile */
csr_update_scan_entry_associnfo(mac_ctx, session,
SCAN_ENTRY_CON_STATE_ASSOC);
- csr_roam_save_security_rsp_ie(mac_ctx, session_id,
- session->pCurRoamProfile->negotiatedAuthType,
- bss_desc, ies_local);
#ifdef FEATURE_WLAN_ESE
roam_info->isESEAssoc = conn_profile->isESEAssoc;
diff --git a/core/sme/src/csr/csr_inside_api.h b/core/sme/src/csr/csr_inside_api.h
index e401cf32e7..b2602b127c 100644
--- a/core/sme/src/csr/csr_inside_api.h
+++ b/core/sme/src/csr/csr_inside_api.h
@@ -792,19 +792,6 @@ QDF_STATUS csr_roam_get_wpa_rsn_req_ie(tpAniSirGlobal pMac, uint32_t sessionId,
uint32_t *pLen, uint8_t *pBuf);
/*
- * csr_roam_get_wpa_rsn_rsp_ie() -
- * Return the WPA or RSN IE from the beacon or probe rsp if connected
- *
- * pLen - caller allocated memory that has the length of pBuf as input.
- * Upon returned, *pLen has the needed or IE length in pBuf.
- * pBuf - Caller allocated memory that contain the IE field, if any, upon return
- * Return QDF_STATUS - when fail, it usually means the buffer allocated is not
- * big enough
- */
-QDF_STATUS csr_roam_get_wpa_rsn_rsp_ie(tpAniSirGlobal pMac, uint32_t sessionId,
- uint32_t *pLen, uint8_t *pBuf);
-
-/*
* csr_roam_get_num_pmkid_cache() -
* Return number of PMKID cache entries
*