亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? driver.h

?? 一個Linux下無線網(wǎng)卡的設(shè)置工具
?? H
?? 第 1 頁 / 共 2 頁
字號:
/* * WPA Supplicant - driver interface definition * Copyright (c) 2003-2005, Jouni Malinen <jkmaline@cc.hut.fi> * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2 as * published by the Free Software Foundation. * * Alternatively, this software may be distributed under the terms of BSD * license. * * See README and COPYING for more details. */#ifndef DRIVER_H#define DRIVER_H#define WPA_SUPPLICANT_DRIVER_VERSION 2#include "defs.h"#define AUTH_ALG_OPEN_SYSTEM	0x01#define AUTH_ALG_SHARED_KEY	0x02#define AUTH_ALG_LEAP		0x04#define IEEE80211_MODE_INFRA	0#define IEEE80211_MODE_IBSS	1#define IEEE80211_CAP_ESS	0x0001#define IEEE80211_CAP_IBSS	0x0002#define IEEE80211_CAP_PRIVACY	0x0010#define SSID_MAX_WPA_IE_LEN 40/** * struct wpa_scan_result - Scan results * @bssid: BSSID * @ssid: SSID * @ssid_len: length of the ssid * @wpa_ie: WPA IE * @wpa_ie_len: length of the wpa_ie * @rsn_ie: RSN IE * @rsn_ie_len: length of the RSN IE * @freq: frequency of the channel in MHz (e.g., 2412 = channel 1) * @caps: capability information field in host byte order * @qual: signal quality * @noise: noise level * @level: signal level * @maxrate: maximum supported rate * * This structure is used as a generic format for scan results from the * driver. Each driver interface implementation is responsible for converting * the driver or OS specific scan results into this format. */struct wpa_scan_result {	u8 bssid[ETH_ALEN];	u8 ssid[32];	size_t ssid_len;	u8 wpa_ie[SSID_MAX_WPA_IE_LEN];	size_t wpa_ie_len;	u8 rsn_ie[SSID_MAX_WPA_IE_LEN];	size_t rsn_ie_len;	int freq;	u16 caps;	int qual;	int noise;	int level;	int maxrate;};/** * struct wpa_driver_associate_params - Association parameters * Data for struct wpa_driver_ops::associate(). */struct wpa_driver_associate_params {	/**	 * bssid - BSSID of the selected AP	 * This can be %NULL, if ap_scan=2 mode is used and the driver is	 * responsible for selecting with which BSS to associate. */	const u8 *bssid;	/**	 * ssid - The selected SSID	 */	const u8 *ssid;	size_t ssid_len;	/**	 * freq - Frequency of the channel the selected AP is using	 * Frequency that the selected AP is using (in MHz as	 * reported in the scan results)	 */	int freq;	/**	 * wpa_ie - WPA information element for (Re)Association Request	 * WPA information element to be included in (Re)Association	 * Request (including information element id and length). Use	 * of this WPA IE is optional. If the driver generates the WPA	 * IE, it can use pairwise_suite, group_suite, and	 * key_mgmt_suite to select proper algorithms. In this case,	 * the driver has to notify wpa_supplicant about the used WPA	 * IE by generating an event that the interface code will	 * convert into EVENT_ASSOCINFO data (see wpa_supplicant.h).	 * When using WPA2/IEEE 802.11i, wpa_ie is used for RSN IE	 * instead. The driver can determine which version is used by	 * looking at the first byte of the IE (0xdd for WPA, 0x30 for	 * WPA2/RSN).	 */	const u8 *wpa_ie;	/**	 * wpa_ie_len - length of the wpa_ie	 */	size_t wpa_ie_len;	/* The selected pairwise/group cipher and key management	 * suites. These are usually ignored if @wpa_ie is used. */	wpa_cipher pairwise_suite;	wpa_cipher group_suite;	wpa_key_mgmt key_mgmt_suite;	/**	 * auth_alg - Allowed authentication algorithms	 * Bit field of AUTH_ALG_*	 */	int auth_alg;	/**	 * mode - Operation mode (infra/ibss) IEEE80211_MODE_*	 */	int mode;};/** * struct wpa_driver_capa - Driver capability information */struct wpa_driver_capa {#define WPA_DRIVER_CAPA_KEY_MGMT_WPA		0x00000001#define WPA_DRIVER_CAPA_KEY_MGMT_WPA2		0x00000002#define WPA_DRIVER_CAPA_KEY_MGMT_WPA_PSK	0x00000004#define WPA_DRIVER_CAPA_KEY_MGMT_WPA2_PSK	0x00000008#define WPA_DRIVER_CAPA_KEY_MGMT_WPA_NONE	0x00000010	unsigned int key_mgmt;#define WPA_DRIVER_CAPA_ENC_WEP40	0x00000001#define WPA_DRIVER_CAPA_ENC_WEP104	0x00000002#define WPA_DRIVER_CAPA_ENC_TKIP	0x00000004#define WPA_DRIVER_CAPA_ENC_CCMP	0x00000008	unsigned int enc;#define WPA_DRIVER_AUTH_OPEN		0x00000001#define WPA_DRIVER_AUTH_SHARED		0x00000002#define WPA_DRIVER_AUTH_LEAP		0x00000004	unsigned int auth;/* Driver generated WPA/RSN IE */#define WPA_DRIVER_FLAGS_DRIVER_IE	0x00000001#define WPA_DRIVER_FLAGS_SET_KEYS_AFTER_ASSOC 0x00000002	unsigned int flags;};/** * struct wpa_driver_ops - Driver interface API definition * * This structure defines the API that each driver interface needs to implement * for core wpa_supplicant code. All driver specific functionality is captured * in this wrapper. */struct wpa_driver_ops {	/** Name of the driver interface */	const char *name;	/** One line description of the driver interface */	const char *desc;	/**	 * get_bssid - Get the current BSSID	 * @priv: private driver interface data	 * @bssid: buffer for BSSID (ETH_ALEN = 6 bytes)	 *	 * Returns: 0 on success, -1 on failure	 *	 * Query kernel driver for the current BSSID and copy it to bssid.	 * Setting bssid to 00:00:00:00:00:00 is recommended if the STA is not	 * associated.	 */	int (*get_bssid)(void *priv, u8 *bssid);	/**	 * get_ssid - Get the current SSID	 * @priv: private driver interface data	 * @ssid: buffer for SSID (at least 32 bytes)	 *	 * Returns: Length of the SSID on success, -1 on failure	 *	 * Query kernel driver for the current SSID and copy it to ssid.	 * Returning zero is recommended if the STA is not associated.	 *	 * Note: SSID is an array of octets, i.e., it is not nul terminated and	 * can, at least in theory, contain control characters (including nul)	 * and as such, should be processed as binary data, not a printable	 * string.	 */	int (*get_ssid)(void *priv, u8 *ssid);	/**	 * set_wpa - Enable/disable WPA support (OBSOLETE)	 * @priv: private driver interface data	 * @enabled: 1 = enable, 0 = disable	 *	 * Returns: 0 on success, -1 on failure	 *	 * Note: This function is included for backwards compatibility. This is	 * called only just after init and just before deinit, so these	 * functions can be used to implement same functionality and the driver	 * interface need not define this function.	 *	 * Configure the kernel driver to enable/disable WPA support. This may	 * be empty function, if WPA support is always enabled. Common	 * configuration items are WPA IE (clearing it when WPA support is	 * disabled), Privacy flag configuration for capability field (note:	 * this the value need to set in associate handler to allow plaintext	 * mode to be used) when trying to associate with, roaming mode (can	 * allow wpa_supplicant to control roaming if ap_scan=1 is used;	 * however, drivers can also implement roaming if desired, especially	 * ap_scan=2 mode is used for this).	 */	int (*set_wpa)(void *priv, int enabled);	/**	 * set_key - Configure encryption key	 * @priv: private driver interface data	 * @alg: encryption algorithm (%WPA_ALG_NONE, %WPA_ALG_WEP,	 *	%WPA_ALG_TKIP, %WPA_ALG_CCMP); %WPA_ALG_NONE clears the key.	 * @addr: address of the peer STA or ff:ff:ff:ff:ff:ff for	 *	broadcast/default keys	 * @key_idx: key index (0..3), usually 0 for unicast keys	 * @set_tx: configure this key as the default Tx key (only used when	 *	driver does not support separate unicast/individual key	 * @seq: sequence number/packet number, seq_len octets, the next	 *	packet number to be used for in replay protection; configured	 *	for Rx keys (in most cases, this is only used with broadcast	 *	keys and set to zero for unicast keys)	 * @seq_len: length of the seq, depends on the algorithm:	 *	TKIP: 6 octets, CCMP: 6 octets	 * @key: key buffer; TKIP: 16-byte temporal key, 8-byte Tx Mic key,	 *	8-byte Rx Mic Key	 * @key_len: length of the key buffer in octets (WEP: 5 or 13,	 *	TKIP: 32, CCMP: 16)	 *	 * Returns: 0 on success, -1 on failure	 *	 * Configure the given key for the kernel driver. If the driver	 * supports separate individual keys (4 default keys + 1 individual),	 * addr can be used to determine whether the key is default or	 * individual. If only 4 keys are supported, the default key with key	 * index 0 is used as the individual key. STA must be configured to use	 * it as the default Tx key (set_tx is set) and accept Rx for all the	 * key indexes. In most cases, WPA uses only key indexes 1 and 2 for	 * broadcast keys, so key index 0 is available for this kind of	 * configuration.	 *	 * Please note that TKIP keys include separate TX and RX MIC keys and	 * some drivers may expect them in different order than wpa_supplicant	 * is using. If the TX/RX keys are swapped, all TKIP encrypted packets	 * will tricker Michael MIC errors. This can be fixed by changing the	 * order of MIC keys by swapping te bytes 16..23 and 24..31 of the key	 * in driver_*.c set_key() implementation, see driver_ndis.c for an	 * example on how this can be done.	 */	int (*set_key)(void *priv, wpa_alg alg, const u8 *addr,		       int key_idx, int set_tx, const u8 *seq, size_t seq_len,		       const u8 *key, size_t key_len);	/**	 * init - Initialize driver interface	 * @ctx: context to be used when calling wpa_supplicant functions,	 * e.g., wpa_supplicant_event()	 * @ifname: interface name, e.g., wlan0	 *	 * Returns: Pointer to private data, %NULL on failure

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美精品一区二区久久婷婷| 欧美视频一区二区三区在线观看| 欧美一区二区在线看| 一区二区欧美视频| 欧美日韩在线观看一区二区| 亚洲国产日韩a在线播放| 欧美日韩的一区二区| 日日夜夜一区二区| 久久中文娱乐网| 成人国产亚洲欧美成人综合网 | 成人精品一区二区三区中文字幕| 国产日韩欧美综合在线| 成人黄色大片在线观看| 亚洲成国产人片在线观看| 在线不卡的av| 国产成人日日夜夜| 亚洲激情欧美激情| 日韩西西人体444www| 国产suv一区二区三区88区| 亚洲色图欧美在线| 538在线一区二区精品国产| 国产一区二区三区四区在线观看 | 日韩西西人体444www| 国产 日韩 欧美大片| 亚洲午夜久久久久| 久久亚洲精华国产精华液| 色屁屁一区二区| 激情五月婷婷综合| 亚洲一区二区三区四区在线| 精品国产一区二区三区不卡| 91小视频免费看| 精彩视频一区二区三区| 亚洲男人的天堂在线aⅴ视频| 欧美一区二区视频观看视频| 福利视频网站一区二区三区| 石原莉奈在线亚洲三区| 国产精品沙发午睡系列990531| 欧美性色aⅴ视频一区日韩精品| 国产尤物一区二区| 午夜精品免费在线| 国产精品美女久久久久aⅴ| 69p69国产精品| 91小视频在线| 国产成人啪免费观看软件| 日韩一区欧美二区| 一区二区在线观看不卡| 久久久一区二区| 在线播放亚洲一区| 色妹子一区二区| 粉嫩蜜臀av国产精品网站| 蜜臀av一区二区三区| 亚洲精品久久7777| 国产精品伦理一区二区| 日韩久久精品一区| 91精品免费在线| 在线观看91视频| 91女神在线视频| 国产a久久麻豆| 国产一区二区调教| 激情欧美一区二区三区在线观看| 午夜国产精品一区| 亚洲最快最全在线视频| 综合激情成人伊人| 国产精品国模大尺度视频| 国产亚洲欧美中文| 久久蜜桃av一区二区天堂| 欧美一区二区三区在线视频| 欧美日韩国产一级二级| 色综合天天综合网国产成人综合天| 国产一区二区视频在线播放| 精品一区二区久久| 久久精品国产精品亚洲精品| 男女性色大片免费观看一区二区 | 国产成人免费在线| 国产精品自拍三区| 国产一区二区精品久久91| 久久99九九99精品| 国产久卡久卡久卡久卡视频精品| 久久99精品国产91久久来源| 麻豆91在线观看| 国产在线精品一区在线观看麻豆| 久久99久久99| 国产一区二区三区观看| 国产精品888| 成人毛片老司机大片| av在线播放成人| 99re亚洲国产精品| 一本色道a无线码一区v| 欧美日韩国产一区| 欧美一二三四在线| 久久精品视频一区| 国产精品国产三级国产三级人妇| 亚洲男人的天堂在线观看| 亚洲图片欧美视频| 麻豆视频一区二区| 国产精品一区二区三区四区| 成人免费视频视频| 在线观看av一区二区| 日韩亚洲电影在线| 久久久国产综合精品女国产盗摄| 久久蜜桃av一区精品变态类天堂| 亚洲欧洲成人自拍| 亚洲线精品一区二区三区八戒| 视频一区国产视频| 国产成人在线视频免费播放| 97精品国产97久久久久久久久久久久| av一区二区三区在线| 欧美日韩午夜在线| 久久人人超碰精品| 亚洲男女一区二区三区| 美日韩黄色大片| 成人福利视频在线看| 欧美亚洲国产怡红院影院| 日韩欧美视频一区| 国产精品久久久久久久第一福利| 亚洲午夜三级在线| 国产一区二区三区日韩| 欧美综合一区二区三区| 精品成人佐山爱一区二区| 国产精品国产成人国产三级 | 久久国产精品色婷婷| 北岛玲一区二区三区四区| 欧美一区二区三区精品| 国产精品久久一卡二卡| 日韩精品福利网| 色综合久久久网| 久久先锋影音av鲁色资源网| 一区二区三区免费网站| 国产一区二区网址| 欧美日韩精品久久久| 国产精品乱码一区二区三区软件 | 亚洲成人免费视频| 成人综合在线观看| 日韩精品中文字幕一区二区三区| 亚洲日本电影在线| 国产福利一区二区三区视频| 欧美欧美午夜aⅴ在线观看| 国产精品理论在线观看| 久久97超碰色| 欧美精品三级日韩久久| 亚洲免费伊人电影| 国产98色在线|日韩| 精品国产不卡一区二区三区| 亚洲成人777| 色综合久久久网| 中文字幕在线观看一区| 国产一区在线不卡| 日韩精品自拍偷拍| 蜜臀av一区二区| 69av一区二区三区| 亚洲综合视频网| 99国产精品99久久久久久| 国产亚洲精品7777| 国产一区在线观看麻豆| 精品99久久久久久| 麻豆一区二区三区| 日韩一区二区在线观看| 日本成人中文字幕| 337p亚洲精品色噜噜噜| 亚洲一区二区三区影院| 在线亚洲+欧美+日本专区| 亚洲色图都市小说| 色悠悠亚洲一区二区| 日韩理论电影院| 99精品久久久久久| 综合婷婷亚洲小说| 色哟哟欧美精品| 一区二区三区四区不卡视频| 色香蕉久久蜜桃| 伊人一区二区三区| 欧美午夜精品一区二区三区| 一区二区在线观看不卡| 欧美性xxxxxx少妇| 亚洲成人激情社区| 欧美日韩国产大片| 久久成人综合网| 国产日韩欧美综合一区| 成人美女视频在线观看18| 中文字幕在线观看不卡视频| 99久久免费精品高清特色大片| 1024精品合集| 在线视频国内自拍亚洲视频| 午夜精品一区二区三区免费视频 | 白白色 亚洲乱淫| 中文字幕一区二区日韩精品绯色 | 欧美人伦禁忌dvd放荡欲情| 人人精品人人爱| 国产欧美精品在线观看| 色综合天天天天做夜夜夜夜做| 一区二区三区不卡视频在线观看 | 亚洲一区二区免费视频| 欧美日韩国产小视频在线观看| 丝袜美腿亚洲色图| 久久久久九九视频| 在线免费一区三区| 美腿丝袜亚洲三区| 国产精品久久久久久久第一福利| 欧美日韩视频一区二区| 国产在线精品免费| 亚洲欧美激情在线|