48 const unsigned char abyOUI00[4] = { 0x00, 0x50, 0xf2, 0x00 };
49 const unsigned char abyOUI01[4] = { 0x00, 0x50, 0xf2, 0x01 };
50 const unsigned char abyOUI02[4] = { 0x00, 0x50, 0xf2, 0x02 };
51 const unsigned char abyOUI03[4] = { 0x00, 0x50, 0xf2, 0x03 };
52 const unsigned char abyOUI04[4] = { 0x00, 0x50, 0xf2, 0x04 };
53 const unsigned char abyOUI05[4] = { 0x00, 0x50, 0xf2, 0x05 };
78 for (ii=0; ii < 4; ii ++)
80 pBSSList->wPKCount = 0;
81 for (ii=0; ii < 4; ii ++)
83 pBSSList->wAuthCount = 0;
84 pBSSList->byDefaultK_as_PK = 0;
85 pBSSList->byReplayIdx = 0;
86 pBSSList->sRSNCapObj.bRSNCapExist =
false;
87 pBSSList->sRSNCapObj.wRSNCap = 0;
88 pBSSList->bWPAValid =
false;
115 unsigned char *pbyCaps;
152 if(pRSN->
len >= 12+i*4+4) {
154 pBSSList->abyPKType[j++] =
WPA_NONE;
156 pBSSList->abyPKType[j++] =
WPA_TKIP;
169 pBSSList->wPKCount = (
unsigned short)j;
177 if (pRSN->
len >= 14+m*4) {
182 pIE_RSN_Auth->
wAuthCount,
sizeof(pBSSList->abyAuthType));
184 if(pRSN->
len >= 14+4+(m+i)*4) {
198 pBSSList->wAuthCount = (
unsigned short)j;
202 if (pIE_RSN_Auth !=
NULL) {
209 if(pRSN->
len+2 >= 14+4+(m+n)*4) {
210 pbyCaps = (
unsigned char *)pIE_RSN_Auth->
AuthKSList[n].abyOUI;
213 pBSSList->sRSNCapObj.bRSNCapExist =
true;
214 pBSSList->sRSNCapObj.wRSNCap = *(
unsigned short *)pbyCaps;
220 pBSSList->bWPAValid =
true;
243 unsigned char byEncrypt,
250 if (pBSSList->bWPAValid ==
false)
256 if (byEncrypt != pBSSList->byGKType)
259 if (pBSSList->wPKCount > 0) {
260 for (ii = 0; ii < pBSSList->wPKCount; ii ++) {
270 if (byEncrypt != byPKType)
308 if ((pRSN->
len >= 6) &&