亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? wpa_supplicant.h

?? 一個Linux下無線網卡的設置工具
?? H
字號:
/* * wpa_supplicant - Exported functions for wpa_supplicant modules * Copyright (c) 2003-2005, Jouni Malinen <jkmaline@cc.hut.fi> * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2 as * published by the Free Software Foundation. * * Alternatively, this software may be distributed under the terms of BSD * license. * * See README and COPYING for more details. */#ifndef WPA_SUPPLICANT_H#define WPA_SUPPLICANT_H/* Driver wrappers are not supposed to directly touch the internal data * structure used in wpa_supplicant, so that definition is not provided here. */struct wpa_supplicant;/** * enum wpa_event_type - Event type for wpa_supplicant_event() calls */typedef enum wpa_event_type {	/**	 * EVENT_ASSOC - Association completed	 *	 * This event needs to be delivered when the driver completes IEEE	 * 802.11 association or reassociation successfully.	 * wpa_driver_ops::get_bssid() is expected to provide the current BSSID	 * after this even has been generated. In addition, optional	 * EVENT_ASSOCINFO may be generated just before EVENT_ASSOC to provide	 * more information about the association. If the driver interface gets	 * both of these events at the same time, it can also include the	 * assoc_info data in EVENT_ASSOC call.	 */	EVENT_ASSOC,	/**	 * EVENT_DISASSOC - Association lost	 *	 * This event should be called when association is lost either due to	 * receiving deauthenticate or disassociate frame from the AP or when	 * sending either of these frames to the current AP.	 */	EVENT_DISASSOC,	/**	 * EVENT_MICHAEL_MIC_FAILURE - Michael MIC (TKIP) detected	 *	 * This event must be delivered when a Michael MIC error is detected by	 * the local driver. Additional data is for event processing is	 * provided with union wpa_event_data::michael_mic_failure. This	 * information is used to request new encyption key and to initiate	 * TKIP countermeasures if needed.	 */	EVENT_MICHAEL_MIC_FAILURE,	/**	 * EVENT_SCAN_RESULTS - Scan results available	 *	 * This event must be called whenever scan results are available to be	 * fetched with struct wpa_driver_ops::get_scan_results(). This event	 * is expected to be used some time after struct wpa_driver_ops::scan()	 * is called. If the driver provides an unsolicited event when the scan	 * has been completed, this event can be used to trigger	 * EVENT_SCAN_RESULTS call. If such event is not available from the	 * driver, the driver wrapper code is expected to use a registered	 * timeout to generate EVENT_SCAN_RESULTS call after the time that the	 * scan is expected to be completed.	 */	EVENT_SCAN_RESULTS,	/**	 * EVENT_ASSOCINFO - Report optional extra information for association	 *	 * This event can be used to report extra association information for	 * EVENT_ASSOC processing. This extra information includes IEs from	 * association frames and Beacon/Probe Response frames in union	 * wpa_event_data::assoc_info. EVENT_ASSOCINFO must be send just before	 * EVENT_ASSOC. Alternatively, the driver interface can include	 * assoc_info data in the EVENT_ASSOC call if it has all the	 * information available at the same point.	 */	EVENT_ASSOCINFO,	/**	 * EVENT_INTERFACE_STATUS - Report interface status changes	 *	 * This optional event can be used to report changes in interface	 * status (interface added/removed) using union	 * wpa_event_data::interface_status. This can be used to trigger	 * wpa_supplicant to stop and re-start processing for the interface,	 * e.g., when a cardbus card is ejected/inserted.	 */	EVENT_INTERFACE_STATUS,	/**	 * EVENT_PMKID_CANDIDATE - Report a candidate AP for pre-authentication	 *	 * This event can be used to inform wpa_supplicant about candidates for	 * RSN (WPA2) pre-authentication. If wpa_supplicant is not responsible	 * for scan request (ap_scan=2 mode), this event is required for	 * pre-authentication. If wpa_supplicant is performing scan request	 * (ap_scan=1), this event is optional since scan results can be used	 * to add pre-authentication candidates. union	 * wpa_event_data::pmkid_candidate is used to report the BSSID of the	 * candidate and priority of the candidate, e.g., based on the signal	 * strength, in order to try to pre-authenticate first with candidates	 * that are most likely targets for re-association.	 *	 * EVENT_PMKID_CANDIDATE can be called whenever the driver has updates	 * on the candidate list. In addition, it can be called for the current	 * AP and APs that have existing PMKSA cache entries. wpa_supplicant	 * will automatically skip pre-authentication in cases where a valid	 * PMKSA exists. When more than one candidate exists, this event should	 * be generated once for each candidate.	 *	 * Driver will be notified about successful pre-authentication with	 * struct wpa_driver_ops::add_pmkid() calls.	 */	EVENT_PMKID_CANDIDATE} wpa_event_type;/** * union wpa_event_data - Additional data for wpa_supplicant_event() calls */union wpa_event_data {	/**	 * struct assoc_info - Data for EVENT_ASSOC and EVENT_ASSOCINFO events	 *	 * This structure is optional for EVENT_ASSOC calls and required for	 * EVENT_ASSOCINFO calls. By using EVENT_ASSOC with this data, the	 * driver interface does not need to generate separate EVENT_ASSOCINFO	 * calls.	 */	struct assoc_info {		/**		 * req_ies - (Re)Association Request IEs		 *		 * If the driver generates WPA/RSN IE, this event data must be		 * returned for WPA handshake to have needed information. If		 * wpa_supplicant-generated WPA/RSN IE is used, this		 * information event is optional.		 *		 * This should start with the first IE (fixed fields before IEs		 * are not included).		 */		u8 *req_ies;		/**		 * req_ies_len - Length of req_ies in bytes		 */		size_t req_ies_len;		/**		 * resp_ies - (Re)Association Response IEs		 *		 * Optional association data from the driver. This data is not		 * required WPA, but may be useful for some protocols and as		 * such, should be reported if this is available to the driver		 * interface.		 *		 * This should start with the first IE (fixed fields before IEs		 * are not included).		 */		u8 *resp_ies;		/**		 * resp_ies_len - Length of resp_ies in bytes		 */		size_t resp_ies_len;		/**		 * beacon_ies - Beacon or Probe Response IEs		 *		 * Optional Beacon/ProbeResp data: IEs included in Beacon or		 * Probe Response frames from the current AP (i.e., the one		 * that the client just associated with). This information is		 * used to update WPA/RSN IE for the AP. If this field is not		 * set, the results from previous scan will be used. If no		 * data for the new AP is found, scan results will be requested		 * again (without scan request). At this point, the driver is		 * expected to provide WPA/RSN IE for the AP (if WPA/WPA2 is		 * used).		 *		 * This should start with the first IE (fixed fields before IEs		 * are not included).		 */		u8 *beacon_ies;		/**		 * beacon_ies_len - Length of beacon_ies */		size_t beacon_ies_len;	} assoc_info;	/**	 * struct michael_mic_failure - Data for EVENT_MICHAEL_MIC_FAILURE	 */	struct michael_mic_failure {		int unicast;	} michael_mic_failure;	/**	 * struct interface_status - Data for EVENT_INTERFACE_STATUS	 */	struct interface_status {		char ifname[20];		enum {			EVENT_INTERFACE_ADDED, EVENT_INTERFACE_REMOVED		} ievent;	} interface_status;	/**	 * struct pmkid_candidate - Data for EVENT_PMKID_CANDIDATE	 */	struct pmkid_candidate {		/** BSSID of the PMKID candidate */		u8 bssid[ETH_ALEN];		/** Smaller the index, higher the priority */		int index;		/** Whether RSN IE includes pre-authenticate flag */		int preauth;	} pmkid_candidate;};/** * wpa_supplicant_event - Report a driver event for wpa_supplicant * @wpa_s: pointer to wpa_supplicant data; this is the ctx variable registered *	with struct wpa_driver_ops::init() * @event: event type (defined above) * @data: possible extra data for the event * * Driver wrapper code should call this function whenever an event is received * from the driver. */void wpa_supplicant_event(struct wpa_supplicant *wpa_s, wpa_event_type event,			  union wpa_event_data *data);/** * wpa_msg - Conditional printf for default target and ctrl_iface monitors * @wpa_s: pointer to wpa_supplicant data; this is the ctx variable registered *	with struct wpa_driver_ops::init() * @level: priority level (MSG_*) of the message * @fmt: printf format string, followed by optional arguments * * This function is used to print conditional debugging and error messages. The * output may be directed to stdout, stderr, and/or syslog based on * configuration. This function is like wpa_printf(), but it also sends the * same message to all attached ctrl_iface monitors. * * Note: New line '\n' is added to the end of the text when printing to stdout. */void wpa_msg(struct wpa_supplicant *wpa_s, int level, char *fmt, ...)__attribute__ ((format (printf, 3, 4)));const char * wpa_ssid_txt(u8 *ssid, size_t ssid_len);/** * wpa_supplicant_rx_eapol - Deliver a received EAPOL frame to wpa_supplicant * @ctx: Context pointer (wpa_s) * @src_addr: Source address of the EAPOL frame * @buf: EAPOL data starting from the EAPOL header (i.e., no Ethernet header) * @len: Length of the EAPOL data * * This function is called for each received EAPOL frame. */void wpa_supplicant_rx_eapol(void *ctx, const u8 *src_addr,			     const u8 *buf, size_t len);#endif /* WPA_SUPPLICANT_H */

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
成人精品电影在线观看| 欧美成人vps| 日韩午夜激情av| 国产精品久久久久久久久动漫| 亚洲免费观看高清完整| 精品一区二区免费| 日本韩国一区二区三区视频| 精品国产麻豆免费人成网站| 亚洲另类中文字| 国产麻豆精品在线| 日韩视频一区二区三区在线播放| 亚洲色欲色欲www| 国产成人精品免费| 精品欧美黑人一区二区三区| 亚洲成人一区二区| 欧美在线观看视频一区二区| 亚洲国产精品激情在线观看| 美腿丝袜一区二区三区| 欧美高清视频一二三区| 亚洲色图自拍偷拍美腿丝袜制服诱惑麻豆| 国产在线日韩欧美| 日韩精品中文字幕一区| 日韩高清电影一区| 欧美日韩在线一区二区| 一区二区三区四区在线免费观看| 国产成人在线免费| 久久精品综合网| 精品一区二区国语对白| 欧美大片一区二区三区| 青青草国产成人99久久| 欧美一区二区免费| 麻豆91精品91久久久的内涵| 5月丁香婷婷综合| 三级影片在线观看欧美日韩一区二区| 欧美三级视频在线| 午夜国产精品一区| 91精品国产91热久久久做人人 | 97精品视频在线观看自产线路二| 久久久美女艺术照精彩视频福利播放| 久久激情五月婷婷| 久久久久久一二三区| 国产福利一区在线观看| 欧美国产精品中文字幕| 国产成人综合亚洲网站| 自拍av一区二区三区| 欧美在线观看一区二区| 日韩电影在线观看一区| 欧美成人免费网站| 成人午夜碰碰视频| 夜夜揉揉日日人人青青一国产精品 | 不卡的av电影在线观看| 亚洲人成电影网站色mp4| 欧美午夜不卡视频| 日本成人在线看| 久久久久国产精品麻豆ai换脸 | 国产成人免费在线| 亚洲欧美电影一区二区| 欧美一区二区三区的| 国产麻豆一精品一av一免费| 国产精品三级av在线播放| 色综合久久综合网| 久久电影网站中文字幕| 国产精品情趣视频| 8x8x8国产精品| 国产成人丝袜美腿| 视频一区二区三区中文字幕| 国产亚洲精品资源在线26u| 91丨porny丨国产入口| 偷拍亚洲欧洲综合| 国产日韩精品一区二区三区在线| 色婷婷av一区二区三区gif | 成人国产精品免费观看视频| 亚洲成人精品在线观看| 国产精品色哟哟| 欧美一区二区三区啪啪| 97精品久久久午夜一区二区三区 | 精品欧美久久久| 91精彩视频在线观看| 黄色成人免费在线| 亚洲国产日日夜夜| 中文字幕的久久| 精品三级在线观看| 欧美日韩一区成人| av资源网一区| 国产在线精品一区二区不卡了 | 成人一二三区视频| 奇米影视7777精品一区二区| 亚洲美女免费在线| 中文字幕欧美日本乱码一线二线| 欧美一区二区三区喷汁尤物| 在线看不卡av| 91免费精品国自产拍在线不卡| 精品一区二区三区久久| 男女激情视频一区| 亚洲444eee在线观看| 一区二区三区波多野结衣在线观看| 国产亚洲福利社区一区| 精品人在线二区三区| 欧美高清你懂得| 欧美日韩国产首页在线观看| 欧美综合一区二区三区| 色婷婷亚洲精品| 91啪亚洲精品| 91在线小视频| 91亚洲永久精品| 粉嫩av一区二区三区| 国产成人av一区二区| 国产精品一区二区三区网站| 国产一本一道久久香蕉| 久久精品99国产精品| 日本不卡1234视频| 日av在线不卡| 国内精品嫩模私拍在线| 国产在线一区观看| 高清shemale亚洲人妖| 国产成人aaa| www.亚洲精品| 在线视频欧美区| 欧美午夜一区二区三区免费大片| 欧美专区日韩专区| 欧美午夜电影一区| 欧美一区二区久久久| 欧美成人精精品一区二区频| 欧美大片日本大片免费观看| 久久久久久影视| 中文字幕中文在线不卡住| 亚洲欧美日韩在线不卡| 亚洲一区中文在线| 蜜桃久久久久久| 国产乱淫av一区二区三区| 成人美女在线视频| 色婷婷av一区二区三区软件| 欧美精品丝袜久久久中文字幕| 制服丝袜亚洲精品中文字幕| 精品蜜桃在线看| 亚洲乱码中文字幕| 日韩一区精品字幕| 国产在线精品不卡| 99在线视频精品| 欧美日韩国产在线观看| 久久一夜天堂av一区二区三区| 欧美激情在线看| 一区二区三区四区蜜桃| 日韩和欧美一区二区三区| 国产在线精品一区二区三区不卡| 成人午夜私人影院| 欧美猛男男办公室激情| 久久久久99精品国产片| 亚洲激情在线播放| 乱一区二区av| 91老师片黄在线观看| 日韩欧美亚洲国产精品字幕久久久| 久久久久久久免费视频了| 一区二区三区电影在线播| 韩国av一区二区| 欧美性淫爽ww久久久久无| 欧美成人性战久久| 一区二区三区四区在线播放 | 91久久精品一区二区三区| 日韩一卡二卡三卡| 亚洲人成在线播放网站岛国| 美国十次了思思久久精品导航| 成人综合在线网站| 欧美一卡二卡在线| 亚洲欧美另类小说| 国产成人免费在线观看不卡| 欧美日韩成人综合在线一区二区| 国产精品久久久久天堂| 美女视频黄久久| 色94色欧美sute亚洲线路二| 久久嫩草精品久久久精品一| 视频一区欧美精品| 91国内精品野花午夜精品| 国产欧美视频一区二区| 美女精品一区二区| 欧美老女人第四色| 一区二区三区 在线观看视频| 成人高清在线视频| 国产视频在线观看一区二区三区 | 日韩一区二区免费高清| 亚洲欧美一区二区三区孕妇| 国产精品亚洲综合一区在线观看| 91精品国产全国免费观看| 亚洲美女视频在线观看| 成人免费av在线| 国产精品女上位| 粉嫩一区二区三区性色av| 久久蜜桃一区二区| 久久成人久久鬼色| 精品欧美一区二区久久| 毛片av一区二区| 精品入口麻豆88视频| 蜜臀av性久久久久蜜臀av麻豆| 欧美日韩成人一区| 午夜精品久久久久| 91精品在线麻豆| 狂野欧美性猛交blacked| 日韩欧美国产一区二区三区 | 香港成人在线视频| 欧美夫妻性生活|