Revert "[wpa_supplicant] Cumulative patch from b8491ae5a"

This reverts commit 878cf7bcbf2d7d8f08c3d060b8c5fbfcf0743eda.

Reason for revert: git_master/sdk_phone_armv7-sdk

Change-Id: I6070fc5c1f9c20867f6dfce90e529e35578d572e
diff --git a/src/crypto/sha256-tlsprf.c b/src/crypto/sha256-tlsprf.c
index 9045cd3..0528dad 100644
--- a/src/crypto/sha256-tlsprf.c
+++ b/src/crypto/sha256-tlsprf.c
@@ -26,8 +26,8 @@
  * This function is used to derive new, cryptographically separate keys from a
  * given key in TLS. This PRF is defined in RFC 2246, Chapter 5.
  */
-int tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label,
-		   const u8 *seed, size_t seed_len, u8 *out, size_t outlen)
+void tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label,
+		    const u8 *seed, size_t seed_len, u8 *out, size_t outlen)
 {
 	size_t clen;
 	u8 A[SHA256_MAC_LEN];
@@ -50,15 +50,12 @@
 	 * PRF(secret, label, seed) = P_SHA256(secret, label + seed)
 	 */
 
-	if (hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A) < 0)
-		return -1;
+	hmac_sha256_vector(secret, secret_len, 2, &addr[1], &len[1], A);
 
 	pos = 0;
 	while (pos < outlen) {
-		if (hmac_sha256_vector(secret, secret_len, 3, addr, len, P) <
-		    0 ||
-		    hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A) < 0)
-			return -1;
+		hmac_sha256_vector(secret, secret_len, 3, addr, len, P);
+		hmac_sha256(secret, secret_len, A, SHA256_MAC_LEN, A);
 
 		clen = outlen - pos;
 		if (clen > SHA256_MAC_LEN)
@@ -66,6 +63,4 @@
 		os_memcpy(out + pos, P, clen);
 		pos += clen;
 	}
-
-	return 0;
 }