summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorOwenLiu <oliu@qca.qualcomm.com>2014-06-06 20:47:43 +0800
committerAkash Patel <c_akashp@qca.qualcomm.com>2014-06-13 11:49:46 -0700
commitba455e00548831a5686dc36b840fd2f7d85a91ff (patch)
tree7c2343c1f66930b5ac5749c0db3cc006b208f582
parentdfbad60cf4506b967c076816d97825248a206468 (diff)
qcacld: Correct wrong usage of memcmp
In memory comparison of "WPA.unicast_ciphers" and "\x00\x0f\xac\x02": if the beacon received carries WPA ie with AES cipher, then this may cause wrong channel bandwidth to be set. Change-Id: I1fc640a1b509bf77ca74806958f58c1570ead30d CRs-Fixed: 674575
-rw-r--r--CORE/SME/src/csr/csrApiRoam.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/CORE/SME/src/csr/csrApiRoam.c b/CORE/SME/src/csr/csrApiRoam.c
index 6d8a9b9ff4ef..c2ade716c149 100644
--- a/CORE/SME/src/csr/csrApiRoam.c
+++ b/CORE/SME/src/csr/csrApiRoam.c
@@ -11418,7 +11418,7 @@ tANI_BOOLEAN csrRoamIsValid40MhzChannel(tpAniSirGlobal pMac, tANI_U8 channel)
|| (((NULL != &(pIes->WPA)) &&
(pIes->WPA.unicast_cipher_count == 1))
&& ((NULL != &(pIes->WPA.unicast_ciphers[0]))
- && memcmp(&(pIes->WPA.unicast_ciphers[0]),
+ && !memcmp(&(pIes->WPA.unicast_ciphers[0]),
"\x00\x0f\xac\x02", 4))))
{
smsLog(pMac, LOGW, " No channel bonding in TKIP mode ");