亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? driver.h

?? IEEE802.11 a/b/g 客戶端應(yīng)用程序源代碼
?? H
?? 第 1 頁(yè) / 共 3 頁(yè)
字號(hào):
	 * @ssid_len: SSID length	 * Returns: 0 on success, -1 on failure	 *	 * This function is only needed for drivers that export MLME	 * (management frame processing) to wpa_supplicant.	 */	int (*set_ssid)(void *priv, const u8 *ssid, size_t ssid_len);	/**	 * set_bssid - Set BSSID	 * @priv: Private driver interface data	 * @bssid: BSSID	 * Returns: 0 on success, -1 on failure	 *	 * This function is only needed for drivers that export MLME	 * (management frame processing) to wpa_supplicant.	 */	int (*set_bssid)(void *priv, const u8 *bssid);	/**	 * send_mlme - Send management frame from MLME	 * @priv: Private driver interface data	 * @data: IEEE 802.11 management frame with IEEE 802.11 header	 * @data_len: Size of the management frame	 * Returns: 0 on success, -1 on failure	 *	 * This function is only needed for drivers that export MLME	 * (management frame processing) to wpa_supplicant.	 */	int (*send_mlme)(void *priv, const u8 *data, size_t data_len);	/**	 * mlme_add_sta - Add a STA entry into the driver/netstack	 * @priv: Private driver interface data	 * @addr: MAC address of the STA (e.g., BSSID of the AP)	 * @supp_rates: Supported rate set (from (Re)AssocResp); in IEEE 802.11	 * format (one octet per rate, 1 = 0.5 Mbps)	 * @supp_rates_len: Number of entries in supp_rates	 * Returns: 0 on success, -1 on failure	 *	 * This function is only needed for drivers that export MLME	 * (management frame processing) to wpa_supplicant. When the MLME code	 * completes association with an AP, this function is called to	 * configure the driver/netstack with a STA entry for data frame	 * processing (TX rate control, encryption/decryption).	 */	int (*mlme_add_sta)(void *priv, const u8 *addr, const u8 *supp_rates,			    size_t supp_rates_len);	/**	 * mlme_remove_sta - Remove a STA entry from the driver/netstack	 * @priv: Private driver interface data	 * @addr: MAC address of the STA (e.g., BSSID of the AP)	 * Returns: 0 on success, -1 on failure	 *	 * This function is only needed for drivers that export MLME	 * (management frame processing) to wpa_supplicant.	 */	int (*mlme_remove_sta)(void *priv, const u8 *addr);	/**	 * update_ft_ies - Update FT (IEEE 802.11r) IEs	 * @priv: Private driver interface data	 * @md: Mobility domain (2 octets) (also included inside ies)	 * @ies: FT IEs (MDIE, FTIE, ...) or %NULL to remove IEs	 * @ies_len: Length of FT IEs in bytes	 * Returns: 0 on success, -1 on failure	 *	 * The supplicant uses this callback to let the driver know that keying	 * material for FT is available and that the driver can use the	 * provided IEs in the next message in FT authentication sequence.	 *	 * This function is only needed for driver that support IEEE 802.11r	 * (Fast BSS Transition).	 */	int (*update_ft_ies)(void *priv, const u8 *md, const u8 *ies,			     size_t ies_len);	/**	 * send_ft_action - Send FT Action frame (IEEE 802.11r)	 * @priv: Private driver interface data	 * @action: Action field value	 * @target_ap: Target AP address	 * @ies: FT IEs (MDIE, FTIE, ...) (FT Request action frame body)	 * @ies_len: Length of FT IEs in bytes	 * Returns: 0 on success, -1 on failure	 *	 * The supplicant uses this callback to request the driver to transmit	 * an FT Action frame (action category 6) for over-the-DS fast BSS	 * transition.	 */	int (*send_ft_action)(void *priv, u8 action, const u8 *target_ap,			      const u8 *ies, size_t ies_len);	/**	 * get_scan_results2 - Fetch the latest scan results	 * @priv: private driver interface data	 *	 * Returns: Allocated buffer of scan results (caller is responsible for	 * freeing the data structure) on success, NULL on failure	 */	 struct wpa_scan_results * (*get_scan_results2)(void *priv);	/**	 * * set_probe_req_ie - Set information element(s) for Probe Request	 * @priv: private driver interface data	 * @ies: Information elements to append or %NULL to remove extra IEs	 * @ies_len: Length of the IE buffer in octets	 * Returns: 0 on success, -1 on failure	 */	int (*set_probe_req_ie)(void *, const u8 *ies, size_t ies_len);};/** * enum wpa_event_type - Event type for wpa_supplicant_event() calls */typedef enum wpa_event_type {	/**	 * EVENT_ASSOC - Association completed	 *	 * This event needs to be delivered when the driver completes IEEE	 * 802.11 association or reassociation successfully.	 * wpa_driver_ops::get_bssid() is expected to provide the current BSSID	 * after this event has been generated. In addition, optional	 * EVENT_ASSOCINFO may be generated just before EVENT_ASSOC to provide	 * more information about the association. If the driver interface gets	 * both of these events at the same time, it can also include the	 * assoc_info data in EVENT_ASSOC call.	 */	EVENT_ASSOC,	/**	 * EVENT_DISASSOC - Association lost	 *	 * This event should be called when association is lost either due to	 * receiving deauthenticate or disassociate frame from the AP or when	 * sending either of these frames to the current AP.	 */	EVENT_DISASSOC,	/**	 * EVENT_MICHAEL_MIC_FAILURE - Michael MIC (TKIP) detected	 *	 * This event must be delivered when a Michael MIC error is detected by	 * the local driver. Additional data for event processing is	 * provided with union wpa_event_data::michael_mic_failure. This	 * information is used to request new encyption key and to initiate	 * TKIP countermeasures if needed.	 */	EVENT_MICHAEL_MIC_FAILURE,	/**	 * EVENT_SCAN_RESULTS - Scan results available	 *	 * This event must be called whenever scan results are available to be	 * fetched with struct wpa_driver_ops::get_scan_results(). This event	 * is expected to be used some time after struct wpa_driver_ops::scan()	 * is called. If the driver provides an unsolicited event when the scan	 * has been completed, this event can be used to trigger	 * EVENT_SCAN_RESULTS call. If such event is not available from the	 * driver, the driver wrapper code is expected to use a registered	 * timeout to generate EVENT_SCAN_RESULTS call after the time that the	 * scan is expected to be completed.	 */	EVENT_SCAN_RESULTS,	/**	 * EVENT_ASSOCINFO - Report optional extra information for association	 *	 * This event can be used to report extra association information for	 * EVENT_ASSOC processing. This extra information includes IEs from	 * association frames and Beacon/Probe Response frames in union	 * wpa_event_data::assoc_info. EVENT_ASSOCINFO must be send just before	 * EVENT_ASSOC. Alternatively, the driver interface can include	 * assoc_info data in the EVENT_ASSOC call if it has all the	 * information available at the same point.	 */	EVENT_ASSOCINFO,	/**	 * EVENT_INTERFACE_STATUS - Report interface status changes	 *	 * This optional event can be used to report changes in interface	 * status (interface added/removed) using union	 * wpa_event_data::interface_status. This can be used to trigger	 * wpa_supplicant to stop and re-start processing for the interface,	 * e.g., when a cardbus card is ejected/inserted.	 */	EVENT_INTERFACE_STATUS,	/**	 * EVENT_PMKID_CANDIDATE - Report a candidate AP for pre-authentication	 *	 * This event can be used to inform wpa_supplicant about candidates for	 * RSN (WPA2) pre-authentication. If wpa_supplicant is not responsible	 * for scan request (ap_scan=2 mode), this event is required for	 * pre-authentication. If wpa_supplicant is performing scan request	 * (ap_scan=1), this event is optional since scan results can be used	 * to add pre-authentication candidates. union	 * wpa_event_data::pmkid_candidate is used to report the BSSID of the	 * candidate and priority of the candidate, e.g., based on the signal	 * strength, in order to try to pre-authenticate first with candidates	 * that are most likely targets for re-association.	 *	 * EVENT_PMKID_CANDIDATE can be called whenever the driver has updates	 * on the candidate list. In addition, it can be called for the current	 * AP and APs that have existing PMKSA cache entries. wpa_supplicant	 * will automatically skip pre-authentication in cases where a valid	 * PMKSA exists. When more than one candidate exists, this event should	 * be generated once for each candidate.	 *	 * Driver will be notified about successful pre-authentication with	 * struct wpa_driver_ops::add_pmkid() calls.	 */	EVENT_PMKID_CANDIDATE,	/**	 * EVENT_STKSTART - Request STK handshake (MLME-STKSTART.request)	 *	 * This event can be used to inform wpa_supplicant about desire to set	 * up secure direct link connection between two stations as defined in	 * IEEE 802.11e with a new PeerKey mechanism that replaced the original	 * STAKey negotiation. The caller will need to set peer address for the	 * event.	 */	EVENT_STKSTART,	/**	 * EVENT_FT_RESPONSE - Report FT (IEEE 802.11r) response IEs	 *	 * The driver is expected to report the received FT IEs from	 * FT authentication sequence from the AP. The FT IEs are included in	 * the extra information in union wpa_event_data::ft_ies.	 */	EVENT_FT_RESPONSE} wpa_event_type;/** * union wpa_event_data - Additional data for wpa_supplicant_event() calls */union wpa_event_data {	/**	 * struct assoc_info - Data for EVENT_ASSOC and EVENT_ASSOCINFO events	 *	 * This structure is optional for EVENT_ASSOC calls and required for	 * EVENT_ASSOCINFO calls. By using EVENT_ASSOC with this data, the	 * driver interface does not need to generate separate EVENT_ASSOCINFO	 * calls.	 */	struct assoc_info {		/**		 * req_ies - (Re)Association Request IEs		 *		 * If the driver generates WPA/RSN IE, this event data must be		 * returned for WPA handshake to have needed information. If		 * wpa_supplicant-generated WPA/RSN IE is used, this		 * information event is optional.		 *		 * This should start with the first IE (fixed fields before IEs		 * are not included).		 */		u8 *req_ies;		/**		 * req_ies_len - Length of req_ies in bytes		 */		size_t req_ies_len;		/**		 * resp_ies - (Re)Association Response IEs		 *		 * Optional association data from the driver. This data is not		 * required WPA, but may be useful for some protocols and as		 * such, should be reported if this is available to the driver		 * interface.		 *		 * This should start with the first IE (fixed fields before IEs		 * are not included).		 */		u8 *resp_ies;		/**		 * resp_ies_len - Length of resp_ies in bytes		 */		size_t resp_ies_len;		/**		 * beacon_ies - Beacon or Probe Response IEs		 *		 * Optional Beacon/ProbeResp data: IEs included in Beacon or		 * Probe Response frames from the current AP (i.e., the one		 * that the client just associated with). This information is		 * used to update WPA/RSN IE for the AP. If this field is not		 * set, the results from previous scan will be used. If no		 * data for the new AP is found, scan results will be requested		 * again (without scan request). At this point, the driver is		 * expected to provide WPA/RSN IE for the AP (if WPA/WPA2 is		 * used).		 *		 * This should start with the first IE (fixed fields before IEs		 * are not included).		 */		u8 *beacon_ies;		/**		 * beacon_ies_len - Length of beacon_ies */		size_t beacon_ies_len;	} assoc_info;	/**	 * struct michael_mic_failure - Data for EVENT_MICHAEL_MIC_FAILURE	 */	struct michael_mic_failure {		int unicast;	} michael_mic_failure;	/**	 * struct interface_status - Data for EVENT_INTERFACE_STATUS	 */	struct interface_status {		char ifname[100];		enum {			EVENT_INTERFACE_ADDED, EVENT_INTERFACE_REMOVED		} ievent;	} interface_status;	/**	 * struct pmkid_candidate - Data for EVENT_PMKID_CANDIDATE	 */	struct pmkid_candidate {		/** BSSID of the PMKID candidate */		u8 bssid[ETH_ALEN];		/** Smaller the index, higher the priority */		int index;		/** Whether RSN IE includes pre-authenticate flag */		int preauth;	} pmkid_candidate;	/**	 * struct stkstart - Data for EVENT_STKSTART	 */	struct stkstart {		u8 peer[ETH_ALEN];	} stkstart;	/**	 * struct ft_ies - FT information elements (EVENT_FT_RESPONSE)	 *	 * During FT (IEEE 802.11r) authentication sequence, the driver is	 * expected to use this event to report received FT IEs (MDIE, FTIE,	 * RSN IE, TIE, possible resource request) to the supplicant. The FT	 * IEs for the next message will be delivered through the	 * struct wpa_driver_ops::update_ft_ies() callback.	 */	struct ft_ies {		const u8 *ies;		size_t ies_len;		int ft_action;		u8 target_ap[ETH_ALEN];	} ft_ies;};/** * wpa_supplicant_event - Report a driver event for wpa_supplicant * @ctx: Context pointer (wpa_s); this is the ctx variable registered *	with struct wpa_driver_ops::init() * @event: event type (defined above) * @data: possible extra data for the event * * Driver wrapper code should call this function whenever an event is received * from the driver. */void wpa_supplicant_event(void *ctx, wpa_event_type event,			  union wpa_event_data *data);/** * wpa_supplicant_rx_eapol - Deliver a received EAPOL frame to wpa_supplicant * @ctx: Context pointer (wpa_s); this is the ctx variable registered *	with struct wpa_driver_ops::init() * @src_addr: Source address of the EAPOL frame * @buf: EAPOL data starting from the EAPOL header (i.e., no Ethernet header) * @len: Length of the EAPOL data * * This function is called for each received EAPOL frame. Most driver * interfaces rely on more generic OS mechanism for receiving frames through * l2_packet, but if such a mechanism is not available, the driver wrapper may * take care of received EAPOL frames and deliver them to the core supplicant * code by calling this function. */void wpa_supplicant_rx_eapol(void *ctx, const u8 *src_addr,			     const u8 *buf, size_t len);void wpa_supplicant_sta_rx(void *ctx, const u8 *buf, size_t len,			   struct ieee80211_rx_status *rx_status);void wpa_supplicant_sta_free_hw_features(struct wpa_hw_modes *hw_features,					 size_t num_hw_features);const u8 * wpa_scan_get_ie(const struct wpa_scan_res *res, u8 ie);#define WPA_IE_VENDOR_TYPE 0x0050f201const u8 * wpa_scan_get_vendor_ie(const struct wpa_scan_res *res,				  u32 vendor_type);int wpa_scan_get_max_rate(const struct wpa_scan_res *res);void wpa_scan_results_free(struct wpa_scan_results *res);void wpa_scan_sort_results(struct wpa_scan_results *res);#endif /* DRIVER_H */

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲综合色区另类av| 97超碰欧美中文字幕| 欧美日韩视频第一区| 亚洲国产欧美一区二区三区丁香婷| 91麻豆精品在线观看| 亚洲午夜影视影院在线观看| 在线观看av不卡| 午夜视频一区二区三区| 欧美一级理论片| 九九精品一区二区| 中文字幕日韩一区| 欧美在线免费播放| 久久99精品久久久久| 亚洲视频精选在线| 日韩视频一区在线观看| 国产成人在线电影| 一级做a爱片久久| 久久女同性恋中文字幕| 色久综合一二码| 精品无人区卡一卡二卡三乱码免费卡| 精品电影一区二区三区| 色哟哟一区二区在线观看| 麻豆精品在线看| 国产在线不卡一区| 午夜电影网一区| 亚洲精品中文在线观看| 亚洲精品一区二区三区精华液| 99re这里只有精品首页| 国产最新精品精品你懂的| 亚洲成人精品在线观看| 午夜电影网亚洲视频| 欧美最猛性xxxxx直播| 国产99久久久久久免费看农村| 亚洲成人三级小说| 亚洲免费资源在线播放| 久久毛片高清国产| 日韩免费电影网站| 91精品国产综合久久精品| 91女厕偷拍女厕偷拍高清| 成人黄色在线网站| 国产精品一品视频| 国产高清在线观看免费不卡| 九九热在线视频观看这里只有精品| 婷婷成人激情在线网| 狠狠色丁香九九婷婷综合五月| 日韩电影在线观看网站| 日韩成人午夜电影| 麻豆成人综合网| 黑人巨大精品欧美一区| 国产精品一区二区三区乱码 | 欧美在线观看18| 精品视频在线看| 日韩一区二区三区在线| 精品国产麻豆免费人成网站| 国产香蕉久久精品综合网| 国产精品美女一区二区| 亚洲一区二区av电影| 久久精品国产精品亚洲红杏| 精品一区二区影视| av成人动漫在线观看| 欧洲视频一区二区| 精品国产91九色蝌蚪| 一区二区三区在线视频免费观看 | 国产欧美一区二区精品忘忧草| 久久久99精品久久| 一区二区三区四区精品在线视频| 午夜国产精品影院在线观看| 国产麻豆午夜三级精品| 91免费看`日韩一区二区| 欧美一二三四在线| 狠狠v欧美v日韩v亚洲ⅴ| 欧美性受xxxx黑人xyx性爽| 一区二区三区精品视频在线| 国产成人三级在线观看| 在线电影欧美成精品| ...xxx性欧美| 国产精品自拍av| 日韩一卡二卡三卡| 香蕉久久夜色精品国产使用方法 | 久久久不卡网国产精品一区| 亚洲va欧美va天堂v国产综合| av高清不卡在线| 国产亚洲成av人在线观看导航| 日本不卡一二三| 欧美高清性hdvideosex| 国产精品护士白丝一区av| 国产一区二区三区香蕉| 久久一区二区视频| 久久er99精品| 久久综合成人精品亚洲另类欧美| 日韩精品成人一区二区在线| 欧美日韩亚洲另类| 日韩在线播放一区二区| 日韩一区二区视频在线观看| 日韩高清在线电影| 亚洲精品在线三区| 国产盗摄视频一区二区三区| 久久精品男人天堂av| 99麻豆久久久国产精品免费优播| 国产欧美视频一区二区三区| 成人精品gif动图一区| 亚洲美女区一区| 7777女厕盗摄久久久| 久久爱www久久做| 亚洲欧洲精品一区二区三区不卡| 97精品久久久午夜一区二区三区 | eeuss影院一区二区三区| 亚洲欧洲三级电影| 欧美视频一区在线观看| 韩国v欧美v亚洲v日本v| 亚洲免费在线视频| wwwwxxxxx欧美| 欧美在线999| 国产乱妇无码大片在线观看| 亚洲一区二区三区四区在线观看| 日韩一区二区免费视频| 成人黄色在线视频| 精品一区二区三区久久| 亚洲视频一区二区在线| 在线91免费看| 色94色欧美sute亚洲线路一久| 免费观看在线色综合| 亚洲精品国久久99热| 国产日产欧美精品一区二区三区| 欧美日韩精品综合在线| 99久久精品免费看国产| 国产成人丝袜美腿| 青草av.久久免费一区| 亚洲精品老司机| 亚洲欧洲中文日韩久久av乱码| 中文字幕av一区二区三区免费看| 欧美高清你懂得| 欧美精品丝袜中出| 欧美色精品在线视频| 成人av在线电影| 成人美女视频在线看| 成人午夜又粗又硬又大| 成人小视频在线观看| 国产中文字幕一区| 国产精品一区二区你懂的| 国产精品一区二区视频| 国产成人免费在线观看不卡| 激情小说欧美图片| 成人国产精品免费网站| 91在线观看成人| 91国偷自产一区二区三区观看| 91蝌蚪porny成人天涯| 在线观看av一区| 日韩欧美一区在线| 久久久午夜电影| 日韩理论片一区二区| 亚洲chinese男男1069| 奇米四色…亚洲| 国产在线精品一区二区夜色| 国产91精品一区二区麻豆网站 | 欧美中文一区二区三区| 欧美少妇bbb| 久久美女艺术照精彩视频福利播放 | 青青草一区二区三区| 国产成人午夜精品5599| www.欧美日韩| 日韩色视频在线观看| 亚洲欧美日韩在线| 韩国视频一区二区| 欧美主播一区二区三区| 久久久久久久久久久99999| 亚洲制服欧美中文字幕中文字幕| 九色综合狠狠综合久久| 色综合久久88色综合天天 | 精品日本一线二线三线不卡| 国产精品久久久一本精品| 日韩成人精品在线观看| 色综合婷婷久久| 久久久电影一区二区三区| 美腿丝袜在线亚洲一区| 一道本成人在线| 国产日韩欧美一区二区三区乱码| 视频一区在线播放| 欧美图区在线视频| 国产精品国产三级国产aⅴ无密码| 久久国产视频网| 日韩女优电影在线观看| 日本成人在线不卡视频| 欧美羞羞免费网站| 午夜在线电影亚洲一区| 91在线观看一区二区| 亚洲日本丝袜连裤袜办公室| 色综合天天综合网天天看片| 日韩美女久久久| 欧美日韩三级一区| 麻豆传媒一区二区三区| 日韩欧美一区二区不卡| 日韩黄色小视频| 911国产精品| 久热成人在线视频| 久久久噜噜噜久久人人看 | 欧美一区二区视频在线观看2020| 日韩成人伦理电影在线观看| 日韩精品一区二区三区视频播放| 免费观看在线色综合|