|
@@ -123,8 +123,8 @@ WPA_ParseRSN(
|
|
|
&& (pRSN->wVersion == 1)) {
|
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "Legal RSN\n");
|
|
|
// update each variable if pRSN is long enough to contain the variable
|
|
|
- if (pRSN->len >= 10) //oui1(4)+ver(2)+GKSuite(4)
|
|
|
- {
|
|
|
+ if (pRSN->len >= 10) {
|
|
|
+ //OUI1(4)+ver(2)+GKSuite(4)
|
|
|
if (!memcmp(pRSN->abyMulticast, abyOUI01, 4))
|
|
|
pBSSList->byGKType = WPA_WEP40;
|
|
|
else if (!memcmp(pRSN->abyMulticast, abyOUI02, 4))
|
|
@@ -142,8 +142,8 @@ WPA_ParseRSN(
|
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "byGKType: %x\n", pBSSList->byGKType);
|
|
|
}
|
|
|
|
|
|
- if (pRSN->len >= 12) //oui1(4)+ver(2)+GKS(4)+PKSCnt(2)
|
|
|
- {
|
|
|
+ if (pRSN->len >= 12) {
|
|
|
+ //oui1(4)+ver(2)+GKS(4)+PKSCnt(2)
|
|
|
j = 0;
|
|
|
DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "wPKCount: %d, sizeof(pBSSList->abyPKType): %zu\n", pRSN->wPKCount, sizeof(pBSSList->abyPKType));
|
|
|
for (i = 0; (i < pRSN->wPKCount) && (j < ARRAY_SIZE(pBSSList->abyPKType)); i++) {
|