亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? ctrl_iface.doxygen

?? via usb driver that support vt6656 chipsets
?? DOXYGEN
字號:
/**\page ctrl_iface_page Control interface%wpa_supplicant implements a control interface that can be used byexternal programs to control the operations of the %wpa_supplicantdaemon and to get status information and event notifications. There isa small C library, in a form of a single C file, wpa_ctrl.c, thatprovides helper functions to facilitate the use of the controlinterface. External programs can link this file into them and then usethe library functions documented in wpa_ctrl.h to interact with%wpa_supplicant. This library can also be used with C++. wpa_cli.c andwpa_gui are example programs using this library.There are multiple mechanisms for inter-process communication. Forexample, Linux version of %wpa_supplicant is using UNIX domain socketsfor the control interface and Windows version UDP sockets. The use ofthe functions defined in wpa_ctrl.h can be used to hide the details ofthe used IPC from external programs.\section using_ctrl_iface Using the control interfaceExternal programs, e.g., a GUI or a configuration utility, that need tocommunicate with %wpa_supplicant should link in wpa_ctrl.c. Thisallows them to use helper functions to open connection to the controlinterface with wpa_ctrl_open() and to send commands withwpa_ctrl_request().%wpa_supplicant uses the control interface for two types of communication:commands and unsolicited event messages. Commands are a pair ofmessages, a request from the external program and a response from%wpa_supplicant. These can be executed using wpa_ctrl_request().Unsolicited event messages are sent by %wpa_supplicant to the controlinterface connection without specific request from the external programfor receiving each message. However, the external program needs toattach to the control interface with wpa_ctrl_attach() to receive theseunsolicited messages.If the control interface connection is used both for commands andunsolicited event messages, there is potential for receiving anunsolicited message between the command request and response.wpa_ctrl_request() caller will need to supply a callback, msg_cb,for processing these messages. Often it is easier to open twocontrol interface connections by calling wpa_ctrl_open() twice andthen use one of the connections for commands and the other one forunsolicited messages. This way command request/response pairs willnot be broken by unsolicited messages. wpa_cli is an example of howto use only one connection for both purposes and wpa_gui demonstrateshow to use two separate connections.Once the control interface connection is not needed anymore, it shouldbe closed by calling wpa_ctrl_close(). If the connection was used forunsolicited event messages, it should be first detached by callingwpa_ctrl_detach().\section ctrl_iface_cmds Control interface commandsFollowing commands can be used with wpa_ctrl_request():\subsection ctrl_iface_PING PINGThis command can be used to test whether %wpa_supplicant is replyingto the control interface commands. The expected reply is \c PONG if theconnection is open and %wpa_supplicant is processing commands.\subsection ctrl_iface_MIB MIBRequest a list of MIB variables (dot1x, dot11). The output is a textblock with each line in \c variable=value format. For example:\verbatimdot11RSNAOptionImplemented=TRUEdot11RSNAPreauthenticationImplemented=TRUEdot11RSNAEnabled=FALSEdot11RSNAPreauthenticationEnabled=FALSEdot11RSNAConfigVersion=1dot11RSNAConfigPairwiseKeysSupported=5dot11RSNAConfigGroupCipherSize=128dot11RSNAConfigPMKLifetime=43200dot11RSNAConfigPMKReauthThreshold=70dot11RSNAConfigNumberOfPTKSAReplayCounters=1dot11RSNAConfigSATimeout=60dot11RSNAAuthenticationSuiteSelected=00-50-f2-2dot11RSNAPairwiseCipherSelected=00-50-f2-4dot11RSNAGroupCipherSelected=00-50-f2-4dot11RSNAPMKIDUsed=dot11RSNAAuthenticationSuiteRequested=00-50-f2-2dot11RSNAPairwiseCipherRequested=00-50-f2-4dot11RSNAGroupCipherRequested=00-50-f2-4dot11RSNAConfigNumberOfGTKSAReplayCounters=0dot11RSNA4WayHandshakeFailures=0dot1xSuppPaeState=5dot1xSuppHeldPeriod=60dot1xSuppAuthPeriod=30dot1xSuppStartPeriod=30dot1xSuppMaxStart=3dot1xSuppSuppControlledPortStatus=Authorizeddot1xSuppBackendPaeState=2dot1xSuppEapolFramesRx=0dot1xSuppEapolFramesTx=440dot1xSuppEapolStartFramesTx=2dot1xSuppEapolLogoffFramesTx=0dot1xSuppEapolRespFramesTx=0dot1xSuppEapolReqIdFramesRx=0dot1xSuppEapolReqFramesRx=0dot1xSuppInvalidEapolFramesRx=0dot1xSuppEapLengthErrorFramesRx=0dot1xSuppLastEapolFrameVersion=0dot1xSuppLastEapolFrameSource=00:00:00:00:00:00\endverbatim\subsection ctrl_iface_STATUS STATUSRequest current WPA/EAPOL/EAP status information. The output is a textblock with each line in \c variable=value format. For example:\verbatimbssid=02:00:01:02:03:04ssid=test networkpairwise_cipher=CCMPgroup_cipher=CCMPkey_mgmt=WPA-PSKwpa_state=COMPLETEDip_address=192.168.1.21Supplicant PAE state=AUTHENTICATEDsuppPortStatus=AuthorizedEAP state=SUCCESS\endverbatim\subsection ctrl_iface_STATUS-VERBOSE STATUS-VERBOSESame as STATUS, but with more verbosity (i.e., more \c variable=value pairs).\verbatimbssid=02:00:01:02:03:04ssid=test networkpairwise_cipher=CCMPgroup_cipher=CCMPkey_mgmt=WPA-PSKwpa_state=COMPLETEDip_address=192.168.1.21Supplicant PAE state=AUTHENTICATEDsuppPortStatus=AuthorizedheldPeriod=60authPeriod=30startPeriod=30maxStart=3portControl=AutoSupplicant Backend state=IDLEEAP state=SUCCESSreqMethod=0methodState=NONEdecision=COND_SUCCClientTimeout=60\endverbatim\subsection ctrl_iface_PMKSA PMKSAShow PMKSA cache\verbatimIndex / AA / PMKID / expiration (in seconds) / opportunistic1 / 02:00:01:02:03:04 / 000102030405060708090a0b0c0d0e0f / 41362 / 02 / 02:00:01:33:55:77 / 928389281928383b34afb34ba4212345 / 362 / 1\endverbatim\subsection ctrl_iface_SET SET <variable> <value>Set variables:- EAPOL::heldPeriod- EAPOL::authPeriod- EAPOL::startPeriod- EAPOL::maxStart- dot11RSNAConfigPMKLifetime- dot11RSNAConfigPMKReauthThreshold- dot11RSNAConfigSATimeoutExample command:\verbatimSET EAPOL::heldPeriod 45\endverbatim\subsection ctrl_iface_LOGON LOGONIEEE 802.1X EAPOL state machine logon.\subsection ctrl_iface_LOGOFF LOGOFFIEEE 802.1X EAPOL state machine logoff.\subsection ctrl_iface_REASSOCIATE REASSOCIATEForce reassociation.\subsection ctrl_iface_PREAUTH PREAUTH <BSSID>Start pre-authentication with the given BSSID.\subsection ctrl_iface_ATTACH ATTACHAttach the connection as a monitor for unsolicited events. This canbe done with wpa_ctrl_attach().\subsection ctrl_iface_DETACH DETACHDetach the connection as a monitor for unsolicited events. This canbe done with wpa_ctrl_detach().\subsection ctrl_iface_LEVEL LEVEL <debug level>Change debug level.\subsection ctrl_iface_RECONFIGURE RECONFIGUREForce %wpa_supplicant to re-read its configuration data.\subsection ctrl_iface_TERMINATE TERMINATETerminate %wpa_supplicant process.\subsection ctrl_iface_BSSID BSSID <network id> <BSSID>Set preferred BSSID for a network. Network id can be received from the\c LIST_NETWORKS command output.\subsection ctrl_iface_LIST_NETWORKS LIST_NETWORKSList configured networks.\verbatimnetwork id / ssid / bssid / flags0	example network	any	[CURRENT]\endverbatim(note: fields are separated with tabs)\subsection ctrl_iface_DISCONNECT DISCONNECTDisconnect and wait for \c REASSOCIATE command before connecting.\subsection ctrl_iface_SCAN SCANRequest a new BSS scan.\subsection ctrl_iface_SCAN_RESULTS SCAN_RESULTSGet the latest scan results.\verbatimbssid / frequency / signal level / flags / ssid00:09:5b:95:e0:4e	2412	208	[WPA-PSK-CCMP]	jkm private02:55:24:33:77:a3	2462	187	[WPA-PSK-TKIP]	testing00:09:5b:95:e0:4f	2412	209		jkm guest\endverbatim(note: fields are separated with tabs)\subsection ctrl_iface_SELECT_NETWORK SELECT_NETWORK <network id>Select a network (disable others). Network id can be received from the\c LIST_NETWORKS command output.\subsection ctrl_iface_ENABLE_NETWORK ENABLE_NETWORK <network id>Enable a network. Network id can be received from the\c LIST_NETWORKS command output.\subsection ctrl_iface_DISABLE_NETWORK DISABLE_NETWORK <network id>Disable a network. Network id can be received from the\c LIST_NETWORKS command output.\subsection ctrl_iface_ADD_NETWORK ADD_NETWORKAdd a new network. This command creates a new network with emptyconfiguration. The new network is disabled and once it has beenconfigured it can be enabled with \c ENABLE_NETWORK command. \c ADD_NETWORKreturns the network id of the new network or FAIL on failure.\subsection ctrl_iface_REMOVE_NETWORK REMOVE_NETWORK <network id>Remove a network. Network id can be received from the\c LIST_NETWORKS command output.\subsection ctrl_iface_SET_NETWORK SET_NETWORK <network id> <variable> <value>Set network variables. Network id can be received from the\c LIST_NETWORKS command output.This command uses the same variables and data formats as theconfiguration file. See example wpa_supplicant.conf for more details.- ssid (network name, SSID)- psk (WPA passphrase or pre-shared key)- key_mgmt (key management protocol)- identity (EAP identity)- password (EAP password)- ...\subsection ctrl_iface_GET_NETWORK GET_NETWORK <network id> <variable>Get network variables. Network id can be received from the\c LIST_NETWORKS command output.\subsection ctrl_iface_SAVE_CONFIG SAVE_CONFIGSave the current configuration.\section ctrl_iface_interactive Interactive requestsIf %wpa_supplicant needs additional information during authentication(e.g., password), it will use a specific prefix, \c CTRL-REQ-(\a WPA_CTRL_REQ macro) in an unsolicited event message. An externalprogram, e.g., a GUI, can provide such information by using\c CTRL-RSP- (\a WPA_CTRL_RSP macro) prefix in a command with matchingfield name.The following fields can be requested in this way from the user:- IDENTITY (EAP identity/user name)- PASSWORD (EAP password)- NEW_PASSWORD (New password if the server is requesting password change)- PIN (PIN code for accessing a SIM or smartcard)- OTP (one-time password; like password, but the value is used only once)- PASSPHRASE (passphrase for a private key file)\verbatimCTRL-REQ-<field name>-<network id>-<human readable text>CTRL-RSP-<field name>-<network id>-<value>\endverbatimFor example, request from %wpa_supplicant:\verbatimCTRL-REQ-PASSWORD-1-Password needed for SSID test-network\endverbatimAnd a matching reply from the GUI:\verbatimCTRL-RSP-PASSWORD-1-secret\endverbatim\subsection ctrl_iface_GET_CAPABILITY GET_CAPABILITY <option>Get list of supported functionality (eap, pairwise, group,proto). Supported functionality is shown as space separate lists ofvalues used in the same format as in %wpa_supplicant configuration.Example request/reply pairs:\verbatimGET_CAPABILITY eapAKA FAST GTC LEAP MD5 MSCHAPV2 OTP PAX PEAP PSK SIM TLS TTLS\endverbatim\verbatimGET_CAPABILITY pairwiseCCMP TKIP NONE\endverbatim\verbatimGET_CAPABILITY groupCCMP TKIP WEP104 WEP40\endverbatim\verbatimGET_CAPABILITY key_mgmtWPA-PSK WPA-EAP IEEE8021X NONE\endverbatim\verbatimGET_CAPABILITY protoRSN WPA\endverbatim\verbatimGET_CAPABILITY auth_algOPEN SHARED LEAP\endverbatim*/

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日韩欧美电影一区| 亚洲成人av在线电影| 亚洲一区二区三区四区五区黄| 久久91精品久久久久久秒播| 97久久精品人人澡人人爽| 国产无遮挡一区二区三区毛片日本 | 99re8在线精品视频免费播放| 久久婷婷久久一区二区三区| 日本在线播放一区二区三区| 欧美日韩和欧美的一区二区| 亚洲精品视频一区| 色美美综合视频| 一区二区在线看| 色婷婷综合久久久中文字幕| 视频一区二区欧美| 91香蕉视频黄| 亚洲综合色自拍一区| 欧美日韩国产电影| 激情深爱一区二区| 国产目拍亚洲精品99久久精品| 国产精品888| 亚洲激情自拍偷拍| 日韩一区二区在线播放| 韩国av一区二区三区四区| 国产精品萝li| 欧美一级高清大全免费观看| 国产成人无遮挡在线视频| **欧美大码日韩| 日韩免费看的电影| 99re成人精品视频| 激情五月婷婷综合| 亚洲精品视频在线看| 91丨九色丨国产丨porny| 午夜婷婷国产麻豆精品| 久久久精品欧美丰满| 7777精品久久久大香线蕉| 国产福利91精品| 日本va欧美va瓶| 夜夜嗨av一区二区三区网页| 久久精品一区二区三区av| 欧美在线视频全部完| 国产高清久久久久| 久久成人免费网站| 午夜激情一区二区| 亚洲欧美偷拍另类a∨色屁股| 日韩一区二区免费在线观看| av激情综合网| 成人动漫在线一区| 国产高清亚洲一区| 精品中文av资源站在线观看| 亚洲欧美在线观看| 国产精品午夜在线| 国产精品超碰97尤物18| 亚洲国产精品ⅴa在线观看| 精品久久久久香蕉网| 欧美一区二区三区播放老司机| 在线观看av一区二区| 在线看一区二区| 欧美狂野另类xxxxoooo| 欧美放荡的少妇| 精品99一区二区三区| wwwwww.欧美系列| 国产三级一区二区| 国产精品色在线| 亚洲综合久久久| 免费成人性网站| 国产一区不卡在线| 91视频免费播放| 91超碰这里只有精品国产| 日韩欧美国产精品| 国产精品免费久久| 一区二区三区免费观看| 三级久久三级久久| 国产伦精品一区二区三区视频青涩 | 亚洲日穴在线视频| 日韩不卡一二三区| 99久久婷婷国产综合精品电影| 91亚洲永久精品| 欧美刺激午夜性久久久久久久| 国产欧美日韩三区| 日韩不卡手机在线v区| 国产大陆精品国产| 日韩久久免费av| 亚洲成a人片综合在线| 成人小视频免费在线观看| 欧美天天综合网| 亚洲免费av高清| 成人精品一区二区三区四区| 欧美一区二区三区在线电影| 国产精品美女久久久久久久久| 免费黄网站欧美| 3d动漫精品啪啪1区2区免费| 亚洲女与黑人做爰| 99在线视频精品| 亚洲欧洲三级电影| 99久久婷婷国产| 亚洲欧美乱综合| 一本在线高清不卡dvd| 国产精品国产a| 成人一区在线观看| 国产精品午夜春色av| 成熟亚洲日本毛茸茸凸凹| 欧美精品一区二区在线播放| 日韩av网站免费在线| 日韩精品一区在线观看| 蜜桃一区二区三区四区| 日韩欧美不卡在线观看视频| 精品制服美女丁香| 中文字幕欧美国产| 色哟哟一区二区在线观看| 亚洲精品免费视频| 精品视频1区2区3区| 日韩在线一区二区| 精品第一国产综合精品aⅴ| 国产大陆精品国产| 亚洲卡通动漫在线| 7777精品久久久大香线蕉| 蜜桃免费网站一区二区三区| 久久综合色8888| 色嗨嗨av一区二区三区| 婷婷中文字幕一区三区| 欧美精品一区二区三区四区| 成人午夜碰碰视频| 首页国产丝袜综合| 国产精品女人毛片| 欧美肥妇毛茸茸| 成人黄页在线观看| 麻豆国产欧美一区二区三区| 国产亚洲精品超碰| 69久久夜色精品国产69蝌蚪网| 国内精品写真在线观看| 亚洲国产精品久久人人爱| 久久久久久久久一| 717成人午夜免费福利电影| 暴力调教一区二区三区| 蜜乳av一区二区三区| 亚洲欧洲综合另类| 国产人妖乱国产精品人妖| 欧美日韩一二三区| 91福利小视频| av亚洲精华国产精华| 国产suv一区二区三区88区| 丝袜a∨在线一区二区三区不卡| 欧美国产一区二区在线观看| 欧美一区二区日韩一区二区| 欧美三级日韩三级国产三级| 成人动漫一区二区三区| 国产91精品入口| 国产成人欧美日韩在线电影| 黄页网站大全一区二区| 日韩精品一级中文字幕精品视频免费观看 | 欧美丝袜丝nylons| 91在线播放网址| 欧美视频自拍偷拍| 欧美日韩国产三级| 91精品国产手机| 日韩精品影音先锋| 国产日产欧美精品一区二区三区| 久久久久久麻豆| 亚洲免费伊人电影| 午夜精品久久久久久久久久久| 亚洲成人av一区二区三区| 免费在线观看成人| 国产精品一区二区久激情瑜伽| 国产一区二区按摩在线观看| 波多野结衣视频一区| 欧美性大战久久| 久久综合五月天婷婷伊人| 最新成人av在线| 日韩激情视频网站| 国产一区二区精品久久| 欧美亚洲一区二区在线| 欧美tickling挠脚心丨vk| 国产日韩高清在线| 日本中文在线一区| 99r精品视频| 久久久久久久久久美女| 亚洲一区二区在线视频| 国产一区二区三区免费播放| 日本乱码高清不卡字幕| 国产欧美精品一区aⅴ影院| 亚洲成人综合在线| 91小视频在线免费看| 久久久青草青青国产亚洲免观| 夜夜爽夜夜爽精品视频| 丰满亚洲少妇av| 久久综合久久99| 免费观看成人鲁鲁鲁鲁鲁视频| 色偷偷成人一区二区三区91| 久久久久久久久久看片| 麻豆精品视频在线观看视频| 欧美在线免费播放| 一区二区三区中文字幕电影| 国产成人在线影院| 久久久久久一二三区| 精品一区二区免费在线观看| 777奇米成人网| 视频一区视频二区在线观看| 色94色欧美sute亚洲线路二| 亚洲欧美偷拍卡通变态|