亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? driver.h

?? WLAN無線網(wǎng)絡(luò)管理的最新程序
?? H
?? 第 1 頁 / 共 2 頁
字號:
	/**	 * set_param - Set driver configuration parameters	 * @priv: private driver interface data from init()	 * @param: driver specific configuration parameters	 *	 * Returns: 0 on success, -1 on failure	 *	 * Optional handler for notifying driver interface about configuration	 * parameters (driver_param).	 */	int (*set_param)(void *priv, const char *param);	/**	 * set_countermeasures - Enable/disable TKIP countermeasures	 * @priv: private driver interface data	 * @enabled: 1 = countermeasures enabled, 0 = disabled	 *	 * Returns: 0 on success, -1 on failure	 *	 * Configure TKIP countermeasures. When these are enabled, the driver	 * should drop all received and queued frames that are using TKIP.	 */	int (*set_countermeasures)(void *priv, int enabled);	/**	 * set_drop_unencrypted - Enable/disable unencrypted frame filtering	 * @priv: private driver interface data	 * @enabled: 1 = unencrypted Tx/Rx frames will be dropped, 0 = disabled	 *	 * Returns: 0 on success, -1 on failure	 *	 * Configure the driver to drop all non-EAPOL frames (both receive and	 * transmit paths). Unencrypted EAPOL frames (ethertype 0x888e) must	 * still be allowed for key negotiation.	 */	int (*set_drop_unencrypted)(void *priv, int enabled);	/**	 * scan - Request the driver to initiate scan	 * @priv: private driver interface data	 * @ssid: specific SSID to scan for (ProbeReq) or %NULL to scan for	 *	all SSIDs (either active scan with broadcast SSID or passive	 *	scan	 * @ssid_len: length of the SSID	 *	 * Returns: 0 on success, -1 on failure	 *	 * Once the scan results are ready, the driver should report scan	 * results event for wpa_supplicant which will eventually request the	 * results with wpa_driver_get_scan_results().	 */	int (*scan)(void *priv, const u8 *ssid, size_t ssid_len);	/**	 * get_scan_results - Fetch the latest scan results	 * @priv: private driver interface data	 * @results: pointer to buffer for scan results	 * @max_size: maximum number of entries (buffer size)	 *	 * Returns: Number of scan result entries used on success, -1 on	 * failure	 *	 * If scan results include more than max_size BSSes, max_size will be	 * returned and the remaining entries will not be included in the	 * buffer.	 */	int (*get_scan_results)(void *priv,				struct wpa_scan_result *results,				size_t max_size);	/**	 * deauthenticate - Request driver to deauthenticate	 * @priv: private driver interface data	 * @addr: peer address (BSSID of the AP)	 * @reason_code: 16-bit reason code to be sent in the deauthentication	 *	frame	 *	 * Returns: 0 on success, -1 on failure	 */	int (*deauthenticate)(void *priv, const u8 *addr, int reason_code);	/**	 * disassociate - Request driver to disassociate	 * @priv: private driver interface data	 * @addr: peer address (BSSID of the AP)	 * @reason_code: 16-bit reason code to be sent in the disassociation	 *	frame	 *	 * Returns: 0 on success, -1 on failure	 */	int (*disassociate)(void *priv, const u8 *addr, int reason_code);	/**	 * associate - Request driver to associate	 * @priv: private driver interface data	 * @params: association parameters	 *	 * Returns: 0 on success, -1 on failure	 */	int (*associate)(void *priv,			 struct wpa_driver_associate_params *params);	/**	 * set_auth_alg - Set IEEE 802.11 authentication algorithm	 * @priv: private driver interface data	 * @auth_alg: bit field of AUTH_ALG_*	 *	 * If the driver supports more than one authentication algorithm at the	 * same time, it should configure all supported algorithms. If not, one	 * algorithm needs to be selected arbitrarily. Open System	 * authentication should be ok for most cases and it is recommended to	 * be used if other options are not supported. Static WEP configuration	 * may also use Shared Key authentication and LEAP requires its own	 * algorithm number. For LEAP, user can make sure that only one	 * algorithm is used at a time by configuring LEAP as the only	 * supported EAP method. This information is also available in	 * associate() params, so set_auth_alg may not be needed in case of	 * most drivers.	 *	 * Returns: 0 on success, -1 on failure	 */	int (*set_auth_alg)(void *priv, int auth_alg);	/**	 * add_pmkid - Add PMKSA cache entry to the driver	 * @priv: private driver interface data	 * @bssid: BSSID for the PMKSA cache entry	 * @pmkid: PMKID for the PMKSA cache entry	 *	 * Returns: 0 on success, -1 on failure	 *	 * This function is called when a new PMK is received, as a result of	 * either normal authentication or RSN pre-authentication.	 *	 * If the driver generates RSN IE, i.e., it does not use wpa_ie in	 * associate(), add_pmkid() can be used to add new PMKSA cache entries	 * in the driver. If the driver uses wpa_ie from wpa_supplicant, this	 * driver_ops function does not need to be implemented. Likewise, if	 * the driver does not support WPA, this function is not needed.	 */	int (*add_pmkid)(void *priv, const u8 *bssid, const u8 *pmkid);	/**	 * remove_pmkid - Remove PMKSA cache entry to the driver	 * @priv: private driver interface data	 * @bssid: BSSID for the PMKSA cache entry	 * @pmkid: PMKID for the PMKSA cache entry	 *	 * Returns: 0 on success, -1 on failure	 *	 * This function is called when the supplicant drops a PMKSA cache	 * entry for any reason.	 *	 * If the driver generates RSN IE, i.e., it does not use wpa_ie in	 * associate(), remove_pmkid() can be used to synchronize PMKSA caches	 * between the driver and wpa_supplicant. If the driver uses wpa_ie	 * from wpa_supplicant, this driver_ops function does not need to be	 * implemented. Likewise, if the driver does not support WPA, this	 * function is not needed.	 */	int (*remove_pmkid)(void *priv, const u8 *bssid, const u8 *pmkid);	/**	 * flush_pmkid - Flush PMKSA cache	 * @priv: private driver interface data	 *	 * Returns: 0 on success, -1 on failure	 *	 * This function is called when the supplicant drops all PMKSA cache	 * entries for any reason.	 *	 * If the driver generates RSN IE, i.e., it does not use wpa_ie in	 * associate(), remove_pmkid() can be used to synchronize PMKSA caches	 * between the driver and wpa_supplicant. If the driver uses wpa_ie	 * from wpa_supplicant, this driver_ops function does not need to be	 * implemented. Likewise, if the driver does not support WPA, this	 * function is not needed.	 */	int (*flush_pmkid)(void *priv);	/**	 * flush_pmkid - Flush PMKSA cache	 * @priv: private driver interface data	 *	 * Returns: 0 on success, -1 on failure	 *	 * Get driver/firmware/hardware capabilities.	 */	int (*get_capa)(void *priv, struct wpa_driver_capa *capa);	/**	 * poll - Poll driver for association information	 * @priv: private driver interface data	 *	 * This is an option callback that can be used when the driver does not	 * provide event mechanism for association events. This is called when	 * receiving WPA EAPOL-Key messages that require association	 * information. The driver interface is supposed to generate associnfo	 * event before returning from this callback function. In addition, the	 * driver interface should generate an association event after having	 * sent out associnfo.	 */	void (*poll)(void *priv);	/**	 * get_ifname - Get interface name	 * @priv: private driver interface data	 *	 * Returns: Pointer to the interface name. This can differ from the	 * interface name used in init() call.	 *	 * This optional function can be used to allow the driver interface to	 * replace the interface name with something else, e.g., based on an	 * interface mapping from a more descriptive name.	 */	const char * (*get_ifname)(void *priv);	/**	 * get_mac_addr - Get own MAC address	 * @priv: private driver interface data	 *	 * Returns: Pointer to own MAC address or %NULL on failure	 *	 * This optional function can be used to get the own MAC address of the	 * device from the driver interface code. This is only needed if the	 * l2_packet implementation for the OS does not provide easy access to	 * a MAC address. */	const u8 * (*get_mac_addr)(void *priv);	/**	 * send_eapol - Optional function for sending EAPOL packets	 * @priv: private driver interface data	 * @dest: Destination MAC address	 * @proto: Ethertype	 * @data: EAPOL packet starting with IEEE 802.1X header	 * @data_len: Size of the EAPOL packet	 *	 * Returns: 0 on success, -1 on failure	 *	 * This optional function can be used to override l2_packet operations	 * with driver specific functionality. If this function pointer is set,	 * l2_packet module is not used at all and the driver interface code is	 * responsible for receiving and sending all EAPOL packets. The	 * received EAPOL packets are sent to core code by calling	 * wpa_supplicant_rx_eapol(). The driver interface is required to	 * implement get_mac_addr() handler if send_eapol() is used.	 */	int (*send_eapol)(void *priv, const u8 *dest, u16 proto,			  const u8 *data, size_t data_len);	/**	 * set_operstate - Sets device operating state to DORMANT or UP	 * @priv: private driver interface data	 * @state: 0 = dormant, 1 = up	 * Returns: 0 on success, -1 on failure	 *	 * This is an optional function that can be used on operating systems	 * that support a concept of controlling network device state from user	 * space applications. This function, if set, gets called with	 * state = 1 when authentication has been completed and with state = 0	 * when connection is lost.	 */	int (*set_operstate)(void *priv, int state);	/**	 * mlme_setprotection - MLME-SETPROTECTION.request primitive	 * @priv: Private driver interface data	 * @addr: Address of the station for which to set protection (may be	 * %NULL for group keys)	 * @protect_type: MLME_SETPROTECTION_PROTECT_TYPE_*	 * @key_type: MLME_SETPROTECTION_KEY_TYPE_*	 * Returns: 0 on success, -1 on failure	 *	 * This is an optional function that can be used to set the driver to	 * require protection for Tx and/or Rx frames. This uses the layer	 * interface defined in IEEE 802.11i-2004 clause 10.3.22.1	 * (MLME-SETPROTECTION.request). Many drivers do not use explicit	 * set protection operation; instead, they set protection implicitly	 * based on configured keys.	 */	int (*mlme_setprotection)(void *priv, const u8 *addr, int protect_type,				  int key_type);	/**	 * get_hw_feature_data - Get hardware support data (channels and rates)	 * @priv: Private driver interface data	 * @num_modes: Variable for returning the number of returned modes	 * flags: Variable for returning hardware feature flags	 * Returns: Pointer to allocated hardware data on success or %NULL on	 * failure. Caller is responsible for freeing this.	 *	 * This function is only needed for drivers that export MLME	 * (management frame processing) to wpa_supplicant.	 */	struct wpa_hw_modes * (*get_hw_feature_data)(void *priv,						     u16 *num_modes,						     u16 *flags);	/**	 * set_channel - Set channel	 * @priv: Private driver interface data	 * @phymode: WPA_MODE_IEEE80211B, ..	 * @chan: IEEE 802.11 channel number	 * @freq: Frequency of the channel in MHz	 * Returns: 0 on success, -1 on failure	 *	 * This function is only needed for drivers that export MLME	 * (management frame processing) to wpa_supplicant.	 */	int (*set_channel)(void *priv, wpa_hw_mode phymode, int chan,			   int freq);	/**	 * set_ssid - Set SSID	 * @priv: Private driver interface data	 * @ssid: SSID	 * @ssid_len: SSID length	 * Returns: 0 on success, -1 on failure	 *	 * This function is only needed for drivers that export MLME	 * (management frame processing) to wpa_supplicant.	 */	int (*set_ssid)(void *priv, const u8 *ssid, size_t ssid_len);	/**	 * set_bssid - Set BSSID	 * @priv: Private driver interface data	 * @bssid: BSSID	 * Returns: 0 on success, -1 on failure	 *	 * This function is only needed for drivers that export MLME	 * (management frame processing) to wpa_supplicant.	 */	int (*set_bssid)(void *priv, const u8 *bssid);	/**	 * send_mlme - Send management frame from MLME	 * @priv: Private driver interface data	 * @data: IEEE 802.11 management frame with IEEE 802.11 header	 * @data_len: Size of the management frame	 * Returns: 0 on success, -1 on failure	 *	 * This function is only needed for drivers that export MLME	 * (management frame processing) to wpa_supplicant.	 */	int (*send_mlme)(void *priv, const u8 *data, size_t data_len);	/**	 * mlme_add_sta - Add a STA entry into the driver/netstack	 * @priv: Private driver interface data	 * @addr: MAC address of the STA (e.g., BSSID of the AP)	 * @supp_rates: Supported rate set (from (Re)AssocResp); in IEEE 802.11	 * format (one octet per rate, 1 = 0.5 Mbps)	 * @supp_rates_len: Number of entries in supp_rates	 * Returns: 0 on success, -1 on failure	 *	 * This function is only needed for drivers that export MLME	 * (management frame processing) to wpa_supplicant. When the MLME code	 * completes association with an AP, this function is called to	 * configure the driver/netstack with a STA entry for data frame	 * processing (TX rate control, encryption/decryption).	 */	 int (*mlme_add_sta)(void *priv, const u8 *addr, const u8 *supp_rates,			     size_t supp_rates_len);	/**	 * mlme_remove_sta - Remove a STA entry from the driver/netstack	 * @priv: Private driver interface data	 * @addr: MAC address of the STA (e.g., BSSID of the AP)	 * Returns: 0 on success, -1 on failure	 *	 * This function is only needed for drivers that export MLME	 * (management frame processing) to wpa_supplicant.	 */	 int (*mlme_remove_sta)(void *priv, const u8 *addr);};#endif /* DRIVER_H */

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲女人的天堂| 开心九九激情九九欧美日韩精美视频电影 | 国产人伦精品一区二区| 美女视频一区在线观看| 激情综合色综合久久综合| 久久九九影视网| 久久99久久99| 日韩欧美亚洲国产另类| 老司机免费视频一区二区| 在线观看日韩国产| 亚洲第四色夜色| 欧美日韩在线播| 热久久一区二区| 欧美大片在线观看一区| 国内精品在线播放| 久久久精品天堂| a在线欧美一区| 亚洲欧美色图小说| 成人app在线观看| 亚洲欧美另类综合偷拍| 欧美日韩一区三区| 男女激情视频一区| 日韩午夜精品电影| 国产精华液一区二区三区| 国产精品色哟哟网站| 91国产成人在线| 亚洲美女淫视频| 在线成人av影院| 国产激情偷乱视频一区二区三区| 国产精品国产三级国产有无不卡 | 国产精品成人一区二区艾草 | 亚洲人成在线播放网站岛国| 欧亚洲嫩模精品一区三区| 免费观看在线综合色| 久久久精品天堂| 在线这里只有精品| 精品中文字幕一区二区| 日韩一区二区三区在线观看| 国产白丝网站精品污在线入口| 日韩欧美在线综合网| 成人高清视频免费观看| 亚洲资源中文字幕| 久久久久久久久久看片| av一本久道久久综合久久鬼色| 亚洲 欧美综合在线网络| 久久日一线二线三线suv| 色综合一区二区三区| 免费在线观看不卡| 国产精品电影院| 在线91免费看| eeuss国产一区二区三区| 日韩激情av在线| 日韩一区在线播放| 欧美高清www午色夜在线视频| 国产一区二区不卡| 亚洲va国产va欧美va观看| 中文字幕二三区不卡| 欧美一级欧美三级| 91蜜桃视频在线| 国产大片一区二区| 亚洲欧美成aⅴ人在线观看| 久久综合九色综合97婷婷女人| 欧美午夜理伦三级在线观看| 国产999精品久久久久久绿帽| 日韩电影在线一区二区三区| 亚洲日本va在线观看| 欧美日韩亚洲综合| 91网址在线看| 色综合久久天天综合网| a亚洲天堂av| 91亚洲精品久久久蜜桃网站| 91亚洲精品久久久蜜桃| 色综合久久精品| 在线观看区一区二| 欧美日韩在线不卡| 9191久久久久久久久久久| 在线成人av网站| 欧美变态口味重另类| 欧美精品一区二区三区蜜桃视频 | 天堂一区二区在线免费观看| 午夜精品一区二区三区电影天堂| 午夜激情一区二区| 日本网站在线观看一区二区三区| 日韩黄色片在线观看| 久久99蜜桃精品| 国产精品 日产精品 欧美精品| 成人免费av资源| 91久久精品一区二区| 在线观看日韩高清av| 91.成人天堂一区| 欧美v日韩v国产v| 国产视频在线观看一区二区三区| 国产精品毛片久久久久久久 | 亚洲午夜久久久久久久久电影院 | 国产精品国产三级国产有无不卡| 亚洲精品国产成人久久av盗摄| 亚洲一区二区综合| 蜜臀a∨国产成人精品| 国产高清视频一区| 99国产精品久久久久久久久久久| 欧美日韩另类国产亚洲欧美一级| 精品日韩一区二区| 亚洲色图视频网| 亚洲国产精品一区二区尤物区| 免费看欧美女人艹b| 精品午夜一区二区三区在线观看| 日韩欧美国产电影| 久久久亚洲精华液精华液精华液| 国产精品人人做人人爽人人添| 夜夜嗨av一区二区三区| 蜜臀av一区二区在线免费观看| 国产精品1024| 欧美剧在线免费观看网站 | 在线播放国产精品二区一二区四区| 欧美一区二区视频观看视频| 久久精品日产第一区二区三区高清版 | 日韩欧美中文字幕一区| 国产精品伦一区| 青椒成人免费视频| 欧美精品一卡二卡| 欧美激情资源网| 午夜av一区二区| 成人精品视频一区二区三区尤物| 精品视频一区二区不卡| 国产伦理精品不卡| 日本韩国欧美三级| 欧美va在线播放| 亚洲靠逼com| 国产高清在线精品| 7777精品伊人久久久大香线蕉最新版| 国产精品网站在线| 美女视频一区二区| 欧美三级电影精品| 亚洲欧洲精品天堂一级| 国产麻豆视频精品| 欧美肥胖老妇做爰| 一区二区三区在线影院| 国产成人欧美日韩在线电影| 日韩欧美精品在线视频| 亚洲综合色成人| 播五月开心婷婷综合| 精品国产91乱码一区二区三区| 亚洲一区二区三区自拍| 成人福利视频网站| 国产日韩精品久久久| 激情国产一区二区| 91精品国产品国语在线不卡| 亚洲最色的网站| 色婷婷一区二区| 亚洲美女区一区| 97久久超碰精品国产| 国产精品视频一区二区三区不卡| 欧美一级视频精品观看| 久久久精品国产免大香伊| 婷婷综合在线观看| 欧美日韩精品欧美日韩精品一综合 | 国产亚洲一区二区三区| 美女网站视频久久| 日韩女同互慰一区二区| 日韩在线一区二区三区| 久久精品免费在线观看| 激情六月婷婷久久| 精品久久国产字幕高潮| 久久精品72免费观看| 日韩欧美一级精品久久| 调教+趴+乳夹+国产+精品| 欧美精三区欧美精三区| 天天色综合天天| 欧美一卡二卡在线观看| 美女在线观看视频一区二区| 日韩三级在线观看| 精品在线播放午夜| 久久久91精品国产一区二区精品 | 精品一区二区三区日韩| 日韩欧美123| 日本不卡视频在线观看| 日韩一区二区电影在线| 精品无人码麻豆乱码1区2区| 久久你懂得1024| 成人午夜在线视频| 亚洲欧美成人一区二区三区| 欧洲精品一区二区| 日韩va欧美va亚洲va久久| 欧美成人精品福利| 国产精品1区2区| 亚洲天堂成人网| 欧美精品久久久久久久久老牛影院| 日韩av一区二区三区四区| 久久色在线观看| 99久久久精品| 天堂蜜桃91精品| 久久久久九九视频| av在线综合网| 日韩福利视频导航| 久久精品视频在线免费观看| 色欧美日韩亚洲| 美女在线视频一区| 国产精品国产三级国产aⅴ原创 | 国产精品久久久久国产精品日日| 国产91丝袜在线播放九色|