wlan : To remove PAL memory wrapper in PE(3)

This is to remove the PAL memory wrapper in PE and replace with vos calls.

CRs-Fixed: 520321
Change-Id: Icdde33e9c2a906d98be775bc00214f3d86d54906
diff --git a/CORE/MAC/src/pe/lim/limProcessAuthFrame.c b/CORE/MAC/src/pe/lim/limProcessAuthFrame.c
index 5280483..5bf4232 100644
--- a/CORE/MAC/src/pe/lim/limProcessAuthFrame.c
+++ b/CORE/MAC/src/pe/lim/limProcessAuthFrame.c
@@ -446,7 +446,7 @@
                 {   
                     tpSirKeys pKey;
                     pKey =  &psessionEntry->WEPKeyMaterial[keyId].key[0];              
-                    palCopyMemory( pMac->hHdd, defaultKey, pKey->key, pKey->keyLength);
+                    vos_mem_copy(defaultKey, pKey->key, pKey->keyLength);
                     val = pKey->keyLength;
                 }                   
                 else                              
@@ -571,9 +571,9 @@
                 tLimMlmDeauthReq        *pMlmDeauthReq = NULL;
                 pMlmDisassocReq = pMac->lim.limDisassocDeauthCnfReq.pMlmDisassocReq;
                 if (pMlmDisassocReq &&
-                        (palEqualMemory( pMac->hHdd,(tANI_U8 *) pHdr->sa,
+                        (vos_mem_compare((tANI_U8 *) pHdr->sa,
                                          (tANI_U8 *) &pMlmDisassocReq->peerMacAddr,
-                                         sizeof(tSirMacAddr))))
+                                          sizeof(tSirMacAddr))))
                 {
                     PELOGE(limLog(pMac, LOGE, FL("\nTODO:Ack for disassoc "
                                 "frame is pending Issue delsta for"
@@ -588,7 +588,7 @@
                 }
                 pMlmDeauthReq = pMac->lim.limDisassocDeauthCnfReq.pMlmDeauthReq;
                 if (pMlmDeauthReq &&
-                        (palEqualMemory( pMac->hHdd,(tANI_U8 *) pHdr->sa,
+                        (vos_mem_compare((tANI_U8 *) pHdr->sa,
                                          (tANI_U8 *) &pMlmDeauthReq->peerMacAddr,
                                          sizeof(tSirMacAddr))))
                 {
@@ -644,7 +644,7 @@
 
                         if (pStaDs->valid)
                         {
-                             if (palEqualMemory( pMac->hHdd,(tANI_U8 *) &pStaDs->staAddr,
+                             if (vos_mem_compare((tANI_U8 *) &pStaDs->staAddr,
                                       (tANI_U8 *) &(pHdr->sa), (tANI_U8) (sizeof(tSirMacAddr))) )
                                   break;
                         }
@@ -725,10 +725,9 @@
                         PELOG1(limLog(pMac, LOG1, FL("Alloc new data: %x peer "), pAuthNode);
                         limPrintMacAddr(pMac, pHdr->sa, LOG1);)
 
-                        palCopyMemory( pMac->hHdd,
-                                     (tANI_U8 *) pAuthNode->peerMacAddr,
-                                     pHdr->sa,
-                                     sizeof(tSirMacAddr));
+                        vos_mem_copy((tANI_U8 *) pAuthNode->peerMacAddr,
+                                      pHdr->sa,
+                                      sizeof(tSirMacAddr));
 
                         pAuthNode->mlmState =
                         eLIM_MLM_AUTHENTICATED_STATE;
@@ -755,8 +754,7 @@
 
                         /// Send Auth indication to SME
 
-                        palCopyMemory( pMac->hHdd,
-                                     (tANI_U8 *) mlmAuthInd.peerMacAddr,
+                        vos_mem_copy((tANI_U8 *) mlmAuthInd.peerMacAddr,
                                      (tANI_U8 *) pHdr->sa,
                                      sizeof(tSirMacAddr));
                         mlmAuthInd.authType = (tAniAuthType)
@@ -831,10 +829,9 @@
                                 return;
                             }
 
-                            palCopyMemory( pMac->hHdd,
-                                         (tANI_U8 *) pAuthNode->peerMacAddr,
-                                         pHdr->sa,
-                                         sizeof(tSirMacAddr));
+                            vos_mem_copy((tANI_U8 *) pAuthNode->peerMacAddr,
+                                          pHdr->sa,
+                                          sizeof(tSirMacAddr));
 
                             pAuthNode->mlmState =
                             eLIM_MLM_WT_AUTH_FRAME3_STATE;
@@ -892,10 +889,9 @@
                             
                             pChallenge = pAuthNode->challengeText;
 
-                            palCopyMemory( pMac->hHdd,
-                                           pChallenge,
-                                          (tANI_U8 *) challengeTextArray,
-                                          sizeof(challengeTextArray));
+                            vos_mem_copy(pChallenge,
+                                        (tANI_U8 *) challengeTextArray,
+                                         sizeof(challengeTextArray));
 
                             /**
                              * Sending Authenticaton frame with challenge.
@@ -909,8 +905,7 @@
                             eSIR_MAC_SUCCESS_STATUS;
                             authFrame.type   = SIR_MAC_CHALLENGE_TEXT_EID;
                             authFrame.length = SIR_MAC_AUTH_CHALLENGE_LENGTH;
-                            palCopyMemory( pMac->hHdd,
-                                         authFrame.challengeText,
+                            vos_mem_copy(authFrame.challengeText,
                                          pAuthNode->challengeText,
                                          SIR_MAC_AUTH_CHALLENGE_LENGTH);
 
@@ -998,9 +993,9 @@
                 return;
             }
 
-            if ( !palEqualMemory( pMac->hHdd,(tANI_U8 *) pHdr->sa,
-                          (tANI_U8 *) &pMac->lim.gpLimMlmAuthReq->peerMacAddr,
-                          sizeof(tSirMacAddr)) )
+            if ( !vos_mem_compare((tANI_U8 *) pHdr->sa,
+                                  (tANI_U8 *) &pMac->lim.gpLimMlmAuthReq->peerMacAddr,
+                                  sizeof(tSirMacAddr)) )
             {
                 /**
                  * Received Authentication frame from an entity
@@ -1075,8 +1070,7 @@
                     PELOG1(limLog(pMac, LOG1, FL("Alloc new data: %x peer "), pAuthNode);)
                     PELOG1(limPrintMacAddr(pMac, pHdr->sa, LOG1);)
 
-                    palCopyMemory( pMac->hHdd,
-                                 (tANI_U8 *) pAuthNode->peerMacAddr,
+                    vos_mem_copy((tANI_U8 *) pAuthNode->peerMacAddr,
                                  pMac->lim.gpLimMlmAuthReq->peerMacAddr,
                                  sizeof(tSirMacAddr));
                     pAuthNode->fTimerStarted = 0;
@@ -1191,7 +1185,7 @@
                                 ((tpSirMacAuthFrameBody) plainBody)->authStatusCode = eSIR_MAC_SUCCESS_STATUS;
                                 ((tpSirMacAuthFrameBody) plainBody)->type   = SIR_MAC_CHALLENGE_TEXT_EID;
                                 ((tpSirMacAuthFrameBody) plainBody)->length = SIR_MAC_AUTH_CHALLENGE_LENGTH;
-                                palCopyMemory( pMac->hHdd, (tANI_U8 *) ((tpSirMacAuthFrameBody) plainBody)->challengeText,
+                                vos_mem_copy((tANI_U8 *) ((tpSirMacAuthFrameBody) plainBody)->challengeText,
                                               pRxAuthFrameBody->challengeText,
                                               SIR_MAC_AUTH_CHALLENGE_LENGTH);
 
@@ -1231,7 +1225,7 @@
                             {
                                 tpSirKeys pKey;
                                 pKey =  &psessionEntry->WEPKeyMaterial[keyId].key[0];
-                                palCopyMemory( pMac->hHdd, defaultKey, pKey->key, pKey->keyLength);
+                                vos_mem_copy(defaultKey, pKey->key, pKey->keyLength);
                             }
                             else
                             if (wlan_cfgGetStr(pMac, (tANI_U16) (WNI_CFG_WEP_DEFAULT_KEY_1 + keyId),
@@ -1269,7 +1263,7 @@
                                 ((tpSirMacAuthFrameBody) plainBody)->authStatusCode = eSIR_MAC_SUCCESS_STATUS;
                                 ((tpSirMacAuthFrameBody) plainBody)->type   = SIR_MAC_CHALLENGE_TEXT_EID;
                                 ((tpSirMacAuthFrameBody) plainBody)->length = SIR_MAC_AUTH_CHALLENGE_LENGTH;
-                                palCopyMemory( pMac->hHdd, (tANI_U8 *) ((tpSirMacAuthFrameBody) plainBody)->challengeText,
+                                vos_mem_copy((tANI_U8 *) ((tpSirMacAuthFrameBody) plainBody)->challengeText,
                                               pRxAuthFrameBody->challengeText,
                                               SIR_MAC_AUTH_CHALLENGE_LENGTH);
 
@@ -1450,9 +1444,9 @@
                  * Authentication frame3
                  */
 
-                if (palEqualMemory( pMac->hHdd,pRxAuthFrameBody->challengeText,
-                              pAuthNode->challengeText,
-                              SIR_MAC_AUTH_CHALLENGE_LENGTH))
+                if (vos_mem_compare(pRxAuthFrameBody->challengeText,
+                                    pAuthNode->challengeText,
+                                    SIR_MAC_AUTH_CHALLENGE_LENGTH))
                 {
                     /// Challenge match. STA is autheticated !
 
@@ -1477,10 +1471,9 @@
                                          LIM_NO_WEP_IN_FC,psessionEntry);
 
                     /// Send Auth indication to SME
-                    palCopyMemory( pMac->hHdd,
-                                 (tANI_U8 *) mlmAuthInd.peerMacAddr,
+                    vos_mem_copy((tANI_U8 *) mlmAuthInd.peerMacAddr,
                                  (tANI_U8 *) pHdr->sa,
-                                 sizeof(tSirMacAddr));
+                                  sizeof(tSirMacAddr));
                     mlmAuthInd.authType = (tAniAuthType)
                                           pRxAuthFrameBody->authAlgoNumber;
                     mlmAuthInd.sessionId = psessionEntry->smeSessionId;
@@ -1557,9 +1550,9 @@
                 return;
             }
 
-            if ( !palEqualMemory( pMac->hHdd,(tANI_U8 *) pHdr->sa,
-                          (tANI_U8 *) &pMac->lim.gpLimMlmAuthReq->peerMacAddr,
-                          sizeof(tSirMacAddr)) )
+            if ( !vos_mem_compare((tANI_U8 *) pHdr->sa,
+                                  (tANI_U8 *) &pMac->lim.gpLimMlmAuthReq->peerMacAddr,
+                                  sizeof(tSirMacAddr)) )
             {
                 /**
                  * Received Authentication frame from an entity
@@ -1614,8 +1607,7 @@
                 PELOG1(limLog(pMac, LOG1, FL("Alloc new data: %x peer "), pAuthNode);
                 limPrintMacAddr(pMac, pHdr->sa, LOG1);)
 
-                palCopyMemory( pMac->hHdd,
-                             (tANI_U8 *) pAuthNode->peerMacAddr,
+                vos_mem_copy((tANI_U8 *) pAuthNode->peerMacAddr,
                              pMac->lim.gpLimMlmAuthReq->peerMacAddr,
                              sizeof(tSirMacAddr));
                 pAuthNode->fTimerStarted = 0;
@@ -1720,8 +1712,8 @@
 #endif
 
     // Check that its the same bssId we have for preAuth
-    if (!palEqualMemory( pMac->hHdd, pMac->ft.ftPEContext.pFTPreAuthReq->preAuthbssId,
-        pHdr->bssId, sizeof( tSirMacAddr )))
+    if (!vos_mem_compare(pMac->ft.ftPEContext.pFTPreAuthReq->preAuthbssId,
+                         pHdr->bssId, sizeof( tSirMacAddr )))
     {
         // In this case SME if indeed has triggered a 
         // pre auth it will time out.