qcacld-3.0: Remove PTK/GTK debug logs
qcacld-2.0 to qcacld-3.0 propagation
Currently host prints PTK and GTK key information in default logs.
Fix to remove the debug logs which prints sensitive key information.
Change-Id: I358b09b77d23eeb5da7d826859ae119a8ea4af8a
CRs-Fixed: 1097857
diff --git a/core/mac/src/pe/lim/lim_ft.c b/core/mac/src/pe/lim/lim_ft.c
index 955a737..6c4999a 100644
--- a/core/mac/src/pe/lim/lim_ft.c
+++ b/core/mac/src/pe/lim/lim_ft.c
@@ -802,45 +802,6 @@
pAddBssParams->extSetStaKeyParam.sendRsp = false;
- if (pAddBssParams->extSetStaKeyParam.key[0].keyLength == 16) {
- PELOG1(lim_log(pMac, LOG1,
- FL
- ("BSS key = %02X-%02X-%02X-%02X-%02X-%02X-%02X- "
- "%02X-%02X-%02X-%02X-%02X-%02X-%02X-%02X-%02X"),
- pAddBssParams->extSetStaKeyParam.key[0].
- key[0],
- pAddBssParams->extSetStaKeyParam.key[0].
- key[1],
- pAddBssParams->extSetStaKeyParam.key[0].
- key[2],
- pAddBssParams->extSetStaKeyParam.key[0].
- key[3],
- pAddBssParams->extSetStaKeyParam.key[0].
- key[4],
- pAddBssParams->extSetStaKeyParam.key[0].
- key[5],
- pAddBssParams->extSetStaKeyParam.key[0].
- key[6],
- pAddBssParams->extSetStaKeyParam.key[0].
- key[7],
- pAddBssParams->extSetStaKeyParam.key[0].
- key[8],
- pAddBssParams->extSetStaKeyParam.key[0].
- key[9],
- pAddBssParams->extSetStaKeyParam.key[0].
- key[10],
- pAddBssParams->extSetStaKeyParam.key[0].
- key[11],
- pAddBssParams->extSetStaKeyParam.key[0].
- key[12],
- pAddBssParams->extSetStaKeyParam.key[0].
- key[13],
- pAddBssParams->extSetStaKeyParam.key[0].
- key[14],
- pAddBssParams->extSetStaKeyParam.key[0].
- key[15]);
- )
- }
}
return true;
}
diff --git a/core/sme/src/common/sme_ft_api.c b/core/sme/src/common/sme_ft_api.c
index 79f2bd7..ccc249c 100644
--- a/core/sme/src/common/sme_ft_api.c
+++ b/core/sme/src/common/sme_ft_api.c
@@ -268,11 +268,8 @@
tSirKeyMaterial *keymaterial = NULL;
tAniEdType ed_type;
tpAniSirGlobal mac_ctx = PMAC_STRUCT(hal);
- int i = 0;
sms_log(mac_ctx, LOG1, FL("keyLength %d"), ftkey_info->keyLength);
- for (i = 0; i < ftkey_info->keyLength; i++)
- sms_log(mac_ctx, LOG1, FL("%02x"), ftkey_info->Key[i]);
if (ftkey_info->keyLength > CSR_MAX_KEY_LEN) {
sms_log(mac_ctx, LOGE, FL("invalid keyLength %d"),
@@ -302,32 +299,9 @@
keymaterial->key[0].paeRole = ftkey_info->paeRole;
keymaterial->key[0].keyLength = ftkey_info->keyLength;
- if (ftkey_info->keyLength) {
+ if (ftkey_info->keyLength)
qdf_mem_copy(&keymaterial->key[0].key, ftkey_info->Key,
ftkey_info->keyLength);
- if (ftkey_info->keyLength == 16) {
- sms_log(mac_ctx, LOG1,
- FL("set update ind keyidx(%d) encType(%d) key = %02X-%02X-%02X-%02X-%02X-%02X-%02X-%02X-%02X-%02X-%02X-%02X-%02X-%02X-%02X-%02X"),
- msg->keyMaterial.key[0].keyId,
- (tAniEdType) msg->keyMaterial.edType,
- msg->keyMaterial.key[0].key[0],
- msg->keyMaterial.key[0].key[1],
- msg->keyMaterial.key[0].key[2],
- msg->keyMaterial.key[0].key[3],
- msg->keyMaterial.key[0].key[4],
- msg->keyMaterial.key[0].key[5],
- msg->keyMaterial.key[0].key[6],
- msg->keyMaterial.key[0].key[7],
- msg->keyMaterial.key[0].key[8],
- msg->keyMaterial.key[0].key[9],
- msg->keyMaterial.key[0].key[10],
- msg->keyMaterial.key[0].key[11],
- msg->keyMaterial.key[0].key[12],
- msg->keyMaterial.key[0].key[13],
- msg->keyMaterial.key[0].key[14],
- msg->keyMaterial.key[0].key[15]);
- }
- }
qdf_copy_macaddr(&msg->bssid, &ftkey_info->peerMac);
msg->smeSessionId = session_id;
diff --git a/core/sme/src/csr/csr_api_roam.c b/core/sme/src/csr/csr_api_roam.c
index 14b90be..8d36d42 100644
--- a/core/sme/src/csr/csr_api_roam.c
+++ b/core/sme/src/csr/csr_api_roam.c
@@ -14936,15 +14936,9 @@
/* 0 is Supplicant */
pMsg->keyMaterial.key[0].paeRole = paeRole;
pMsg->keyMaterial.key[0].keyLength = keyLength;
- if (keyLength && pKey) {
+ if (keyLength && pKey)
qdf_mem_copy(pMsg->keyMaterial.key[0].key,
pKey, keyLength);
- sms_log(pMac, LOG1,
- FL("SME set keyIndx (%d) encType (%d) key"),
- keyId, edType);
- sir_dump_buf(pMac, SIR_SMS_MODULE_ID, LOG1, pKey,
- keyLength);
- }
status = umac_send_mb_message_to_mac(pMsg);
} while (0);
return status;