wlan: encrypt gtk 2/2 message during wpa authentication

The TL state machine does not move to authenticated state till
GTK is installed. And TL does not allow encrypted data in case
of WPA(2) till it goes to authenticated state.
In case of WPA after the 4 way handshake when AP and STA do the
GTK handshake the STA does not encrypt the GTK 2/2 message and
the AP drops it. Some APs detect MIC failures in such a case.
Make changes to encrypt the GTK 2/2 message even when TL is not
in authenticated state.

CRs-Fixed: 453977
Change-Id: I93ab0304186645996bbfe2e2a895e8fb3c082235
diff --git a/CORE/TL/inc/wlan_qct_tl.h b/CORE/TL/inc/wlan_qct_tl.h
index 3276d09..90f7077 100644
--- a/CORE/TL/inc/wlan_qct_tl.h
+++ b/CORE/TL/inc/wlan_qct_tl.h
@@ -1100,6 +1100,44 @@
 
 /*===========================================================================
 
+  FUNCTION    WLANTL_STAPtkInstalled
+
+  DESCRIPTION
+
+    HDD will make this notification whenever PTK is installed for the STA
+
+  DEPENDENCIES
+
+    A station must have been registered before the change state can be
+    called.
+
+  PARAMETERS
+
+   pvosGCtx:        pointer to the global vos context; a handle to TL's
+                    control block can be extracted from its context
+   ucSTAId:         identifier for the STA for which Pairwise key is
+                    installed
+
+  RETURN VALUE
+
+    The result code associated with performing the operation
+
+    VOS_STATUS_E_FAULT:  Station ID is outside array boundaries or pointer to
+                         TL cb is NULL ; access would cause a page fault
+    VOS_STATUS_E_EXISTS: Station was not registered
+    VOS_STATUS_SUCCESS:  Everything is good :)
+
+  SIDE EFFECTS
+
+============================================================================*/
+VOS_STATUS
+WLANTL_STAPtkInstalled
+(
+  v_PVOID_t             pvosGCtx,
+  v_U8_t                ucSTAId
+);
+/*===========================================================================
+
   FUNCTION    WLANTL_GetSTAState
 
   DESCRIPTION