diff options
| author | OwenLiu <oliu@qca.qualcomm.com> | 2014-06-06 20:47:43 +0800 |
|---|---|---|
| committer | Akash Patel <c_akashp@qca.qualcomm.com> | 2014-06-13 11:49:46 -0700 |
| commit | ba455e00548831a5686dc36b840fd2f7d85a91ff (patch) | |
| tree | 7c2343c1f66930b5ac5749c0db3cc006b208f582 | |
| parent | dfbad60cf4506b967c076816d97825248a206468 (diff) | |
qcacld: Correct wrong usage of memcmp
In memory comparison of "WPA.unicast_ciphers" and "\x00\x0f\xac\x02":
if the beacon received carries WPA ie with AES cipher, then this
may cause wrong channel bandwidth to be set.
Change-Id: I1fc640a1b509bf77ca74806958f58c1570ead30d
CRs-Fixed: 674575
| -rw-r--r-- | CORE/SME/src/csr/csrApiRoam.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/CORE/SME/src/csr/csrApiRoam.c b/CORE/SME/src/csr/csrApiRoam.c index 6d8a9b9ff4ef..c2ade716c149 100644 --- a/CORE/SME/src/csr/csrApiRoam.c +++ b/CORE/SME/src/csr/csrApiRoam.c @@ -11418,7 +11418,7 @@ tANI_BOOLEAN csrRoamIsValid40MhzChannel(tpAniSirGlobal pMac, tANI_U8 channel) || (((NULL != &(pIes->WPA)) && (pIes->WPA.unicast_cipher_count == 1)) && ((NULL != &(pIes->WPA.unicast_ciphers[0])) - && memcmp(&(pIes->WPA.unicast_ciphers[0]), + && !memcmp(&(pIes->WPA.unicast_ciphers[0]), "\x00\x0f\xac\x02", 4)))) { smsLog(pMac, LOGW, " No channel bonding in TKIP mode "); |
