wlan : To remove PAL memory wrapper in PE(3)
This is to remove the PAL memory wrapper in PE and replace with vos calls.
CRs-Fixed: 520321
Change-Id: Icdde33e9c2a906d98be775bc00214f3d86d54906
diff --git a/CORE/MAC/src/pe/lim/limProcessAuthFrame.c b/CORE/MAC/src/pe/lim/limProcessAuthFrame.c
index 5280483..5bf4232 100644
--- a/CORE/MAC/src/pe/lim/limProcessAuthFrame.c
+++ b/CORE/MAC/src/pe/lim/limProcessAuthFrame.c
@@ -446,7 +446,7 @@
{
tpSirKeys pKey;
pKey = &psessionEntry->WEPKeyMaterial[keyId].key[0];
- palCopyMemory( pMac->hHdd, defaultKey, pKey->key, pKey->keyLength);
+ vos_mem_copy(defaultKey, pKey->key, pKey->keyLength);
val = pKey->keyLength;
}
else
@@ -571,9 +571,9 @@
tLimMlmDeauthReq *pMlmDeauthReq = NULL;
pMlmDisassocReq = pMac->lim.limDisassocDeauthCnfReq.pMlmDisassocReq;
if (pMlmDisassocReq &&
- (palEqualMemory( pMac->hHdd,(tANI_U8 *) pHdr->sa,
+ (vos_mem_compare((tANI_U8 *) pHdr->sa,
(tANI_U8 *) &pMlmDisassocReq->peerMacAddr,
- sizeof(tSirMacAddr))))
+ sizeof(tSirMacAddr))))
{
PELOGE(limLog(pMac, LOGE, FL("\nTODO:Ack for disassoc "
"frame is pending Issue delsta for"
@@ -588,7 +588,7 @@
}
pMlmDeauthReq = pMac->lim.limDisassocDeauthCnfReq.pMlmDeauthReq;
if (pMlmDeauthReq &&
- (palEqualMemory( pMac->hHdd,(tANI_U8 *) pHdr->sa,
+ (vos_mem_compare((tANI_U8 *) pHdr->sa,
(tANI_U8 *) &pMlmDeauthReq->peerMacAddr,
sizeof(tSirMacAddr))))
{
@@ -644,7 +644,7 @@
if (pStaDs->valid)
{
- if (palEqualMemory( pMac->hHdd,(tANI_U8 *) &pStaDs->staAddr,
+ if (vos_mem_compare((tANI_U8 *) &pStaDs->staAddr,
(tANI_U8 *) &(pHdr->sa), (tANI_U8) (sizeof(tSirMacAddr))) )
break;
}
@@ -725,10 +725,9 @@
PELOG1(limLog(pMac, LOG1, FL("Alloc new data: %x peer "), pAuthNode);
limPrintMacAddr(pMac, pHdr->sa, LOG1);)
- palCopyMemory( pMac->hHdd,
- (tANI_U8 *) pAuthNode->peerMacAddr,
- pHdr->sa,
- sizeof(tSirMacAddr));
+ vos_mem_copy((tANI_U8 *) pAuthNode->peerMacAddr,
+ pHdr->sa,
+ sizeof(tSirMacAddr));
pAuthNode->mlmState =
eLIM_MLM_AUTHENTICATED_STATE;
@@ -755,8 +754,7 @@
/// Send Auth indication to SME
- palCopyMemory( pMac->hHdd,
- (tANI_U8 *) mlmAuthInd.peerMacAddr,
+ vos_mem_copy((tANI_U8 *) mlmAuthInd.peerMacAddr,
(tANI_U8 *) pHdr->sa,
sizeof(tSirMacAddr));
mlmAuthInd.authType = (tAniAuthType)
@@ -831,10 +829,9 @@
return;
}
- palCopyMemory( pMac->hHdd,
- (tANI_U8 *) pAuthNode->peerMacAddr,
- pHdr->sa,
- sizeof(tSirMacAddr));
+ vos_mem_copy((tANI_U8 *) pAuthNode->peerMacAddr,
+ pHdr->sa,
+ sizeof(tSirMacAddr));
pAuthNode->mlmState =
eLIM_MLM_WT_AUTH_FRAME3_STATE;
@@ -892,10 +889,9 @@
pChallenge = pAuthNode->challengeText;
- palCopyMemory( pMac->hHdd,
- pChallenge,
- (tANI_U8 *) challengeTextArray,
- sizeof(challengeTextArray));
+ vos_mem_copy(pChallenge,
+ (tANI_U8 *) challengeTextArray,
+ sizeof(challengeTextArray));
/**
* Sending Authenticaton frame with challenge.
@@ -909,8 +905,7 @@
eSIR_MAC_SUCCESS_STATUS;
authFrame.type = SIR_MAC_CHALLENGE_TEXT_EID;
authFrame.length = SIR_MAC_AUTH_CHALLENGE_LENGTH;
- palCopyMemory( pMac->hHdd,
- authFrame.challengeText,
+ vos_mem_copy(authFrame.challengeText,
pAuthNode->challengeText,
SIR_MAC_AUTH_CHALLENGE_LENGTH);
@@ -998,9 +993,9 @@
return;
}
- if ( !palEqualMemory( pMac->hHdd,(tANI_U8 *) pHdr->sa,
- (tANI_U8 *) &pMac->lim.gpLimMlmAuthReq->peerMacAddr,
- sizeof(tSirMacAddr)) )
+ if ( !vos_mem_compare((tANI_U8 *) pHdr->sa,
+ (tANI_U8 *) &pMac->lim.gpLimMlmAuthReq->peerMacAddr,
+ sizeof(tSirMacAddr)) )
{
/**
* Received Authentication frame from an entity
@@ -1075,8 +1070,7 @@
PELOG1(limLog(pMac, LOG1, FL("Alloc new data: %x peer "), pAuthNode);)
PELOG1(limPrintMacAddr(pMac, pHdr->sa, LOG1);)
- palCopyMemory( pMac->hHdd,
- (tANI_U8 *) pAuthNode->peerMacAddr,
+ vos_mem_copy((tANI_U8 *) pAuthNode->peerMacAddr,
pMac->lim.gpLimMlmAuthReq->peerMacAddr,
sizeof(tSirMacAddr));
pAuthNode->fTimerStarted = 0;
@@ -1191,7 +1185,7 @@
((tpSirMacAuthFrameBody) plainBody)->authStatusCode = eSIR_MAC_SUCCESS_STATUS;
((tpSirMacAuthFrameBody) plainBody)->type = SIR_MAC_CHALLENGE_TEXT_EID;
((tpSirMacAuthFrameBody) plainBody)->length = SIR_MAC_AUTH_CHALLENGE_LENGTH;
- palCopyMemory( pMac->hHdd, (tANI_U8 *) ((tpSirMacAuthFrameBody) plainBody)->challengeText,
+ vos_mem_copy((tANI_U8 *) ((tpSirMacAuthFrameBody) plainBody)->challengeText,
pRxAuthFrameBody->challengeText,
SIR_MAC_AUTH_CHALLENGE_LENGTH);
@@ -1231,7 +1225,7 @@
{
tpSirKeys pKey;
pKey = &psessionEntry->WEPKeyMaterial[keyId].key[0];
- palCopyMemory( pMac->hHdd, defaultKey, pKey->key, pKey->keyLength);
+ vos_mem_copy(defaultKey, pKey->key, pKey->keyLength);
}
else
if (wlan_cfgGetStr(pMac, (tANI_U16) (WNI_CFG_WEP_DEFAULT_KEY_1 + keyId),
@@ -1269,7 +1263,7 @@
((tpSirMacAuthFrameBody) plainBody)->authStatusCode = eSIR_MAC_SUCCESS_STATUS;
((tpSirMacAuthFrameBody) plainBody)->type = SIR_MAC_CHALLENGE_TEXT_EID;
((tpSirMacAuthFrameBody) plainBody)->length = SIR_MAC_AUTH_CHALLENGE_LENGTH;
- palCopyMemory( pMac->hHdd, (tANI_U8 *) ((tpSirMacAuthFrameBody) plainBody)->challengeText,
+ vos_mem_copy((tANI_U8 *) ((tpSirMacAuthFrameBody) plainBody)->challengeText,
pRxAuthFrameBody->challengeText,
SIR_MAC_AUTH_CHALLENGE_LENGTH);
@@ -1450,9 +1444,9 @@
* Authentication frame3
*/
- if (palEqualMemory( pMac->hHdd,pRxAuthFrameBody->challengeText,
- pAuthNode->challengeText,
- SIR_MAC_AUTH_CHALLENGE_LENGTH))
+ if (vos_mem_compare(pRxAuthFrameBody->challengeText,
+ pAuthNode->challengeText,
+ SIR_MAC_AUTH_CHALLENGE_LENGTH))
{
/// Challenge match. STA is autheticated !
@@ -1477,10 +1471,9 @@
LIM_NO_WEP_IN_FC,psessionEntry);
/// Send Auth indication to SME
- palCopyMemory( pMac->hHdd,
- (tANI_U8 *) mlmAuthInd.peerMacAddr,
+ vos_mem_copy((tANI_U8 *) mlmAuthInd.peerMacAddr,
(tANI_U8 *) pHdr->sa,
- sizeof(tSirMacAddr));
+ sizeof(tSirMacAddr));
mlmAuthInd.authType = (tAniAuthType)
pRxAuthFrameBody->authAlgoNumber;
mlmAuthInd.sessionId = psessionEntry->smeSessionId;
@@ -1557,9 +1550,9 @@
return;
}
- if ( !palEqualMemory( pMac->hHdd,(tANI_U8 *) pHdr->sa,
- (tANI_U8 *) &pMac->lim.gpLimMlmAuthReq->peerMacAddr,
- sizeof(tSirMacAddr)) )
+ if ( !vos_mem_compare((tANI_U8 *) pHdr->sa,
+ (tANI_U8 *) &pMac->lim.gpLimMlmAuthReq->peerMacAddr,
+ sizeof(tSirMacAddr)) )
{
/**
* Received Authentication frame from an entity
@@ -1614,8 +1607,7 @@
PELOG1(limLog(pMac, LOG1, FL("Alloc new data: %x peer "), pAuthNode);
limPrintMacAddr(pMac, pHdr->sa, LOG1);)
- palCopyMemory( pMac->hHdd,
- (tANI_U8 *) pAuthNode->peerMacAddr,
+ vos_mem_copy((tANI_U8 *) pAuthNode->peerMacAddr,
pMac->lim.gpLimMlmAuthReq->peerMacAddr,
sizeof(tSirMacAddr));
pAuthNode->fTimerStarted = 0;
@@ -1720,8 +1712,8 @@
#endif
// Check that its the same bssId we have for preAuth
- if (!palEqualMemory( pMac->hHdd, pMac->ft.ftPEContext.pFTPreAuthReq->preAuthbssId,
- pHdr->bssId, sizeof( tSirMacAddr )))
+ if (!vos_mem_compare(pMac->ft.ftPEContext.pFTPreAuthReq->preAuthbssId,
+ pHdr->bssId, sizeof( tSirMacAddr )))
{
// In this case SME if indeed has triggered a
// pre auth it will time out.