|
@@ -4450,6 +4450,27 @@ static int print_bss_info(struct wpa_supplicant *wpa_s, struct wpa_bss *bss,
|
|
|
pos += ret;
|
|
|
}
|
|
|
|
|
|
+ if ((mask & WPA_BSS_MASK_BEACON_IE) && bss->beacon_ie_len) {
|
|
|
+ ret = os_snprintf(pos, end - pos, "beacon_ie=");
|
|
|
+ if (os_snprintf_error(end - pos, ret))
|
|
|
+ return 0;
|
|
|
+ pos += ret;
|
|
|
+
|
|
|
+ ie = (const u8 *) (bss + 1);
|
|
|
+ ie += bss->ie_len;
|
|
|
+ for (i = 0; i < bss->beacon_ie_len; i++) {
|
|
|
+ ret = os_snprintf(pos, end - pos, "%02x", *ie++);
|
|
|
+ if (os_snprintf_error(end - pos, ret))
|
|
|
+ return 0;
|
|
|
+ pos += ret;
|
|
|
+ }
|
|
|
+
|
|
|
+ ret = os_snprintf(pos, end - pos, "\n");
|
|
|
+ if (os_snprintf_error(end - pos, ret))
|
|
|
+ return 0;
|
|
|
+ pos += ret;
|
|
|
+ }
|
|
|
+
|
|
|
if (mask & WPA_BSS_MASK_DELIM) {
|
|
|
ret = os_snprintf(pos, end - pos, "====\n");
|
|
|
if (os_snprintf_error(end - pos, ret))
|