78 for (ii=0; ii < 4; ii ++)
80 pBSSList->wPKCount = 0;
81 for (ii=0; ii < 4; ii ++)
83 pBSSList->wAuthCount = 0;
84 pBSSList->byDefaultK_as_PK = 0;
85 pBSSList->byReplayIdx = 0;
86 pBSSList->sRSNCapObj.bRSNCapExist =
FALSE;
87 pBSSList->sRSNCapObj.wRSNCap = 0;
88 pBSSList->bWPAValid =
FALSE;
153 if(pRSN->
len >= 12+i*4+4) {
155 pBSSList->abyPKType[j++] =
WPA_NONE;
157 pBSSList->abyPKType[j++] =
WPA_TKIP;
170 pBSSList->wPKCount = (
WORD)j;
178 if (pRSN->
len >= 14+m*4) {
183 pIE_RSN_Auth->
wAuthCount,
sizeof(pBSSList->abyAuthType));
185 (j <
ARRAY_SIZE(pBSSList->abyAuthType)); i++) {
186 if(pRSN->
len >= 14+4+(m+i)*4) {
200 pBSSList->wAuthCount = (
WORD)j;
204 if (pIE_RSN_Auth !=
NULL) {
211 if(pRSN->
len+2 >= 14+4+(m+n)*4) {
215 pBSSList->sRSNCapObj.bRSNCapExist =
TRUE;
216 pBSSList->sRSNCapObj.wRSNCap = *(
PWORD)pbyCaps;
222 pBSSList->bWPAValid =
TRUE;
252 if (pBSSList->bWPAValid ==
FALSE)
258 if (byEncrypt != pBSSList->byGKType)
261 if (pBSSList->wPKCount > 0) {
262 for (ii = 0; ii < pBSSList->wPKCount; ii ++) {
272 if (byEncrypt != byPKType)
310 if ((pRSN->
len >= 6) &&