亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? sanity.c

?? r73模塊的無線網(wǎng)卡在Linux下的驅(qū)動程序
?? C
?? 第 1 頁 / 共 3 頁
字號:
    OUT UCHAR *TimLen,    OUT UCHAR *BcastFlag,    OUT UCHAR *DtimCount,    OUT UCHAR *DtimPeriod,    OUT UCHAR *MessageToMe){    UCHAR          BitCntl, N1, N2, MyByte, MyBit;    CHAR          *IdxPtr;    IdxPtr = Ptr;    IdxPtr ++;    *TimLen = *IdxPtr;    // get DTIM Count from TIM element    IdxPtr ++;    *DtimCount = *IdxPtr;    // get DTIM Period from TIM element    IdxPtr++;    *DtimPeriod = *IdxPtr;    // get Bitmap Control from TIM element    IdxPtr++;    BitCntl = *IdxPtr;    if ((*DtimCount == 0) && (BitCntl & 0x01))        *BcastFlag = TRUE;    else        *BcastFlag = FALSE;    // Parse Partial Virtual Bitmap from TIM element    N1 = BitCntl & 0xfe;    // N1 is the first bitmap byte#    N2 = *TimLen - 4 + N1;  // N2 is the last bitmap byte#    if ((Aid < (N1 << 3)) || (Aid >= ((N2 + 1) << 3)))        *MessageToMe = FALSE;    else    {        MyByte = (Aid >> 3) - N1;                       // my byte position in the bitmap byte-stream        MyBit = Aid % 16 - ((MyByte & 0x01)? 8:0);        IdxPtr += (MyByte + 1);        //if (*IdxPtr)        //    DBGPRINT(RT_DEBUG_WARN, "TIM bitmap = 0x%02x\n", *IdxPtr);        if (*IdxPtr & (0x01 << MyBit))            *MessageToMe = TRUE;        else            *MessageToMe = FALSE;    }    return TRUE;}UCHAR ChannelSanity(    IN PRTMP_ADAPTER pAd,    IN UCHAR channel){    int i;    for (i = 0; i < pAd->ChannelListNum; i ++)    {        if (channel == pAd->ChannelList[i].Channel)            return 1;    }    return 0;}/*	========================================================================	Routine Description:		Sanity check NetworkType (11b, 11g or 11a)	Arguments:		Channel				Current Channel		SupRate				Peer's Supported Rate Buffer		SupRateLen			Peer's Supported Rate Length		ExtRate				Peer's Extended Rate Buffer		ExtRateLen			Peer's Extended Rate Length	Return Value:		Ndis802_11DS .......(11b)        Ndis802_11OFDM24....(11bg mixed)		Ndis802_11OFDM5.....(11a)	========================================================================*/NDIS_802_11_NETWORK_TYPE NetworkTypeInUseSanity(	IN UCHAR  Channel,	IN UCHAR  SupRate[],	IN UCHAR  SupRateLen,	IN UCHAR  ExtRate[],	IN UCHAR  ExtRateLen){	NDIS_802_11_NETWORK_TYPE	NetWorkType;	UCHAR						Type = 0;	//UCHAR						rate, i;	Type = PeerTxTypeInUseSanity(Channel, SupRate, SupRateLen, ExtRate, ExtRateLen);	switch (Type)	{		case CCK_RATE:			NetWorkType = Ndis802_11DS;			break;		case OFDM_RATE:			if (Channel > 14)				NetWorkType = Ndis802_11OFDM5;			else				NetWorkType = Ndis802_11OFDM24;			break;		case CCKOFDM_RATE:			NetWorkType = Ndis802_11OFDM24;			break;		default:			NetWorkType = Ndis802_11DS;			break;	}	return NetWorkType;}/*	========================================================================	Routine Description:		Get Peer TX phy mode(CCK or OFDM)	Arguments:		Channel				Current Channel		SupRate				Peer's Supported Rate Buffer		SupRateLen			Peer's Supported Rate Length		ExtRate				Peer's Extended Rate Buffer		ExtRateLen			Peer's Extended Rate Length	Return Value:    		1 - CCK    		2 - OFDM    		3 - CCK+OFDM	========================================================================*/UCHAR PeerTxTypeInUseSanity(	IN UCHAR  Channel,	IN UCHAR  SupRate[],	IN UCHAR  SupRateLen,	IN UCHAR  ExtRate[],	IN UCHAR  ExtRateLen){	UCHAR						rate, i;	UCHAR						Type = 0;	if (Channel <= 14)	{		//		// First check support Rate.		//		for (i = 0; i < SupRateLen; i++)		{			rate = SupRate[i] & 0x7f; // Mask out basic rate set bit			if ((rate == 2) || (rate == 4) || (rate == 11) || (rate == 22))			{				Type |= 0x01;   //CCK				continue;			}			else			{				//				// Otherwise (even rate > 108) means Ndis802_11OFDM24				//				Type |= 0x02;   // OFDM				break;			}		}		//		// Second check Extend Rate.		// Maybe OFDM rate store on Extend Rate.		//		if ((Type & 0x02) == 0)		{			for (i = 0; i < ExtRateLen; i++)			{				rate = ExtRate[i] & 0x7f; // Mask out basic rate set bit				if ((rate == 2) || (rate == 4) || (rate == 11) || (rate == 22))				{					continue;				}				else				{					//					// Otherwise (even rate > 108) means Ndis802_11OFDM24					//					Type |= 0x02;  //OFDM					break;				}			}		}	}	else	{		Type |= 0x02;  //OFDM	}	return Type;}/*	========================================================================	Routine Description:		Sanity check pairwise key on Encryption::Ndis802_11Encryption1Enabled	Arguments:		pAd      - Pointer to our adapter		pBuf 	 - Pointer to NDIS_802_11_KEY structure	Return Value:		NDIS_STATUS_SUCCESS		NDIS_STATUS_FAILURE	Note:		For OID_802_11_ADD_KEY setting, on old wep stuff also need to verify		the structure of NIDS_802_11_KEY	========================================================================*/NDIS_STATUS	RTMPWPAWepKeySanity(	IN	PRTMP_ADAPTER	pAd,	IN	PVOID			pBuf){	PNDIS_802_11_KEY	pKey;	ULONG				KeyIdx;	NDIS_STATUS			Status = NDIS_STATUS_SUCCESS;	BOOLEAN 			bTxKey; 		// Set the key as transmit key	BOOLEAN 			bPairwise;		// Indicate the key is pairwise key	//UCHAR			CipherAlg;	//UINT			i;	pKey = (PNDIS_802_11_KEY) pBuf;	KeyIdx = pKey->KeyIndex & 0x0fffffff;	// Bit 31 of Add-key, Tx Key	bTxKey		   = (pKey->KeyIndex & 0x80000000) ? TRUE : FALSE;	// Bit 30 of Add-key PairwiseKey	bPairwise	   = (pKey->KeyIndex & 0x40000000) ? TRUE : FALSE;	// 1. Check Group / Pairwise Key	if (bPairwise)	// Pairwise Key	{		// 1. Check KeyIdx		// it is a shared key		if (KeyIdx > 4)			return (NDIS_STATUS_FAILURE);		// 2. Check bTx, it must be true, otherwise, return NDIS_STATUS_FAILURE		if (bTxKey == FALSE)			return(NDIS_STATUS_FAILURE);		// 3. If BSSID is all 0xff, return NDIS_STATUS_FAILURE		if (MAC_ADDR_EQUAL(pKey->BSSID, BROADCAST_ADDR))			return(NDIS_STATUS_FAILURE);		// check key length		if ((pKey->KeyLength != 5) && (pKey->KeyLength != 13))		    return(NDIS_STATUS_FAILURE);	}	else	{		// Group Key		// 1. Check BSSID, if not current BSSID or Bcast, return NDIS_STATUS_FAILURE		if ((! MAC_ADDR_EQUAL(pKey->BSSID, BROADCAST_ADDR)) &&			(! MAC_ADDR_EQUAL(pKey->BSSID, pAd->PortCfg.Bssid)))			return(NDIS_STATUS_FAILURE);		// 2. Check Key index for supported Group Key		if (KeyIdx > 4)			return(NDIS_STATUS_FAILURE);	}	if (pKey->KeyIndex & 0x80000000)	{		// Default key for tx (shared key)		pAd->PortCfg.DefaultKeyId = (UCHAR) KeyIdx;	}    //always use BSS0=0//	AsicAddSharedKeyEntry(pAd, 0, (UCHAR)KeyIdx, CipherAlg, pAd->SharedKey[KeyIdx].Key, NULL, NULL);     	pAd->PortCfg.PortSecured = WPA_802_1X_PORT_SECURED;	//For Test	return (Status);}NDIS_STATUS	RTMPRemoveKeySanity(	IN	PRTMP_ADAPTER	pAd,	IN	PVOID			pBuf){	PNDIS_802_11_REMOVE_KEY	pKey;	ULONG					KeyIdx;	NDIS_STATUS				Status = NDIS_STATUS_FAILURE;	BOOLEAN 	bTxKey; 		// Set the key as transmit key	BOOLEAN 	bPairwise;		// Indicate the key is pairwise key	BOOLEAN 	bKeyRSC;		// indicate the receive  SC set by KeyRSC value.								// Otherwise, it will set by the NIC.	BOOLEAN 	bAuthenticator; // indicate key is set by authenticator.	INT 		i;	DBGPRINT(RT_DEBUG_TRACE,"---> RTMPWPARemoveKeyProc\n");	pKey = (PNDIS_802_11_REMOVE_KEY) pBuf;	if (pAd->PortCfg.AuthMode >= Ndis802_11AuthModeWPA)	{		pKey = (PNDIS_802_11_REMOVE_KEY) pBuf;		KeyIdx = pKey->KeyIndex & 0xff;		// Bit 31 of Add-key, Tx Key		bTxKey		   = (pKey->KeyIndex & 0x80000000) ? TRUE : FALSE;		// Bit 30 of Add-key PairwiseKey		bPairwise	   = (pKey->KeyIndex & 0x40000000) ? TRUE : FALSE;		// Bit 29 of Add-key KeyRSC		bKeyRSC 	   = (pKey->KeyIndex & 0x20000000) ? TRUE : FALSE;		// Bit 28 of Add-key Authenticator		bAuthenticator = (pKey->KeyIndex & 0x10000000) ? TRUE : FALSE;		// 1. If bTx is TRUE, return failure information		if (bTxKey == TRUE)			return(NDIS_STATUS_FAILURE);		// 2. Check Pairwise Key		if (bPairwise)		{			// a. If BSSID is broadcast, remove all pairwise keys.			// b. If not broadcast, remove the pairwise specified by BSSID			for (i = 0; i < SHARE_KEY_NUM; i++)			{				if (MAC_ADDR_EQUAL(pAd->SharedKey[i].BssId, pKey->BSSID))				{					DBGPRINT(RT_DEBUG_TRACE,"RTMPWPARemoveKeyProc(KeyIdx=%d)\n", i);					pAd->SharedKey[i].KeyLen = 0;					pAd->SharedKey[i].CipherAlg = CIPHER_NONE;					Status = NDIS_STATUS_SUCCESS;					break;				}			}		}		// 3. Group Key		else		{			// a. If BSSID is broadcast, remove all group keys indexed			// b. If BSSID matched, delete the group key indexed.			DBGPRINT(RT_DEBUG_TRACE,"RTMPWPARemoveKeyProc(KeyIdx=%d)\n", KeyIdx);			pAd->SharedKey[KeyIdx].KeyLen = 0;			pAd->SharedKey[KeyIdx].CipherAlg = CIPHER_NONE;			Status = NDIS_STATUS_SUCCESS;		}	}	else	{		KeyIdx = pKey->KeyIndex;		if (KeyIdx & 0x80000000)		{			// Should never set default bit when remove key			Status = NDIS_STATUS_FAILURE;		}		else		{			KeyIdx = KeyIdx & 0x0fffffff;			if (KeyIdx > 4)				Status = NDIS_STATUS_FAILURE;			else			{				pAd->SharedKey[KeyIdx].KeyLen = 0;				pAd->SharedKey[KeyIdx].CipherAlg = CIPHER_NONE;				Status = NDIS_STATUS_SUCCESS;			}		}	}	return (Status);}/*    ==========================================================================    Description:        MLME message sanity check to get config data from AP    Return:        TRUE if all parameters are OK, FALSE otherwise    ========================================================================== */BOOLEAN BackDoorProbeRspSanity(    IN PRTMP_ADAPTER pAd,    IN VOID *Msg,    IN ULONG MsgLen,    OUT CHAR *pCfgDataBuf){    PFRAME_802_11       pFrame = (PFRAME_802_11)Msg;    CHAR                *Ptr, CfgData[255] = {0};    PEID_STRUCT         eid_ptr;    USHORT              cfgDataLen = 0;    Ptr = pFrame->Octet;    // timestamp from payload and advance the pointer    Ptr += TIMESTAMP_LEN;    // beacon interval from payload and advance the pointer    Ptr += 2;    // capability info from payload and advance the pointer    Ptr += 2;    eid_ptr = (PEID_STRUCT) Ptr;    // get variable fields from payload and advance the pointer    while(((UCHAR*)eid_ptr + eid_ptr->Len + 1) < ((UCHAR*)pFrame + MsgLen))    {        memset(CfgData, 0, 255);        switch(eid_ptr->Eid)        {	        case IE_VENDOR_SPECIFIC:                if (NdisEqualMemory(eid_ptr->Octet, RALINK_OUI, 3))                {                    if ((eid_ptr->Octet[3] & 0x80) == 0x80)                    {                        if ( (cfgDataLen + eid_ptr->Len - 4) <= MAX_CFG_BUFFER_LEN)                        {                            //memcpy((pCfgDataBuf + cfgDataLen), (eid_ptr->Octet + 4), (eid_ptr->Len - 4));                            memcpy(CfgData, (eid_ptr->Octet + 4), (eid_ptr->Len - 4));                            DBGPRINT(RT_DEBUG_INFO, "%s\n", CfgData);                            KPRINT(KERN_INFO, "%s\n", CfgData);                            return TRUE;                        }                        else                        {                            DBGPRINT(RT_DEBUG_ERROR, "BackDoorProbeRspSanity: cfgDataLen > MAX_CFG_BUFFER_LEN\n");                            KPRINT(KERN_INFO,								"BackDoorProbeRspSanity: cfgDataLen > MAX_CFG_BUFFER_LEN\n");                            return FALSE;                        }                    }                    else if ((eid_ptr->Octet[3] & 0x40) == 0x40)                    {                        //memcpy((pCfgDataBuf + cfgDataLen), (eid_ptr->Octet + 4), (eid_ptr->Len - 4));                        cfgDataLen += (eid_ptr->Len - 4);                        memcpy(CfgData, (eid_ptr->Octet + 4), (eid_ptr->Len - 4));                        if (cfgDataLen > MAX_CFG_BUFFER_LEN)                        {                            DBGPRINT(RT_DEBUG_ERROR, "BackDoorProbeRspSanity: cfgDataLen > MAX_CFG_BUFFER_LEN\n");                            KPRINT(KERN_INFO,								"BackDoorProbeRspSanity: cfgDataLen > MAX_CFG_BUFFER_LEN\n");                            return FALSE;                        }                        else {                            DBGPRINT(RT_DEBUG_INFO, "%s", CfgData);                            KPRINT(KERN_INFO, "%s", CfgData);						}                    }                    break;                }            default:                break;        }        eid_ptr = (PEID_STRUCT)((UCHAR*)eid_ptr + 2 + eid_ptr->Len);    }    return FALSE;}

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产精品久久看| 日本不卡一区二区三区| 亚洲一区二区三区影院| 狠狠色丁香婷综合久久| 日本高清视频一区二区| 精品国产免费一区二区三区香蕉| 亚洲三级在线看| 懂色中文一区二区在线播放| 欧美视频第二页| 亚洲欧美成aⅴ人在线观看| 国内精品伊人久久久久影院对白| 欧美怡红院视频| 最新中文字幕一区二区三区| 国产在线播放一区二区三区| 欧美高清性hdvideosex| 亚洲六月丁香色婷婷综合久久| 国产福利一区二区三区在线视频| 欧美一区二区免费| 亚洲图片一区二区| 91福利资源站| 亚洲一区二区免费视频| 色综合久久久久综合99| 一区精品在线播放| 波多野结衣亚洲| 中文字幕乱码亚洲精品一区| 国产麻豆日韩欧美久久| 日韩精品自拍偷拍| 久草这里只有精品视频| 日韩欧美一级特黄在线播放| 蜜桃视频第一区免费观看| 91精品国产综合久久精品性色 | 亚洲国产精品久久久久秋霞影院| 成人午夜视频在线| 国产精品蜜臀av| a亚洲天堂av| 亚洲最快最全在线视频| 欧日韩精品视频| 亚洲一区二区不卡免费| 欧美日韩免费电影| 日韩va欧美va亚洲va久久| 欧美成人艳星乳罩| 国产精品一区二区91| 日本一区二区三区久久久久久久久不 | 中文字幕精品在线不卡| 国产不卡高清在线观看视频| 国产亚洲欧洲997久久综合| 高清不卡在线观看| 综合久久久久综合| 欧美精品一卡两卡| 韩国女主播一区| 国产精品三级av| 欧日韩精品视频| 蜜桃视频在线观看一区| 国产日产欧美一区二区视频| 9i在线看片成人免费| 亚洲一区二区三区影院| 日韩精品一区二| 91亚洲国产成人精品一区二区三| 亚洲综合色噜噜狠狠| 精品美女一区二区| 91蜜桃传媒精品久久久一区二区| 亚洲成a天堂v人片| 国产三级精品视频| 欧美三级中文字幕在线观看| 久久国产精品色婷婷| 国产精品色婷婷久久58| 欧美亚洲综合色| 国产麻豆91精品| 图片区小说区国产精品视频| 久久蜜臀精品av| 欧美日韩免费视频| 高清成人免费视频| 男女男精品网站| 亚洲精品视频观看| 国产午夜精品在线观看| 欧美日韩日日夜夜| 成人国产视频在线观看| 婷婷中文字幕综合| 成人欧美一区二区三区白人| 日韩一级欧美一级| 在线免费亚洲电影| 国v精品久久久网| 精品一区二区久久久| 一区av在线播放| 国产精品看片你懂得| 日韩精品一区二区三区四区| 色丁香久综合在线久综合在线观看| 国内成人自拍视频| 日本欧美在线看| 亚洲第一福利视频在线| √…a在线天堂一区| 久久久av毛片精品| 精品欧美黑人一区二区三区| 欧美三级蜜桃2在线观看| 波多野结衣在线一区| 狠狠狠色丁香婷婷综合激情 | 极品少妇xxxx精品少妇偷拍| 亚洲国产精品视频| 尤物av一区二区| 国产精品乱人伦一区二区| 精品成人免费观看| 欧美一区二区在线视频| 欧美日韩精品免费| 91福利资源站| 欧美日韩在线播| 欧美色网站导航| 91久久国产最好的精华液| 99久久国产综合精品麻豆 | 精品在线一区二区| 日本aⅴ亚洲精品中文乱码| 午夜视频在线观看一区二区| 一区二区免费看| 亚洲最大的成人av| 一区二区三区高清在线| 一区二区三区在线视频观看58| 亚洲日本一区二区| 一区二区三区影院| 夜夜夜精品看看| 亚洲国产cao| 日本欧美在线观看| 国内成人自拍视频| 成人短视频下载| 91在线观看一区二区| 一本一道久久a久久精品| 色欧美乱欧美15图片| 日本大香伊一区二区三区| 欧美三级日韩三级国产三级| 欧美一级黄色片| 精品久久久久久久久久久久久久久久久 | 肉色丝袜一区二区| 美国av一区二区| 国产精品一区二区久激情瑜伽| 成人激情黄色小说| 一本高清dvd不卡在线观看| 欧美视频在线一区二区三区| 在线综合亚洲欧美在线视频| 日韩一区二区三区精品视频| 久久综合久久综合九色| 国产精品沙发午睡系列990531| 国产精品久久久久久户外露出| 亚洲久本草在线中文字幕| 亚洲v精品v日韩v欧美v专区| 激情综合一区二区三区| 99在线精品观看| 欧美嫩在线观看| 国产三区在线成人av| 一区二区三区在线播| 久久精品久久久精品美女| 成人黄色软件下载| 欧美日韩国产精品自在自线| 久久亚洲二区三区| 亚洲夂夂婷婷色拍ww47| 久久精品国产一区二区| av一二三不卡影片| 日韩一区二区三区av| 国产精品全国免费观看高清 | 在线不卡免费欧美| ww久久中文字幕| 亚洲国产成人av| 成人午夜电影小说| 精品视频一区二区不卡| 国产日韩欧美高清| 日韩在线a电影| 94色蜜桃网一区二区三区| 日韩一区二区影院| 亚洲美女屁股眼交3| 韩国av一区二区| 欧美三级午夜理伦三级中视频| 国产精品污网站| 精品一区二区国语对白| 欧美性猛交一区二区三区精品| 国产欧美综合色| 激情综合网最新| 欧美一区2区视频在线观看| 亚洲人成网站精品片在线观看| 国产精品一级二级三级| 欧美精品日日鲁夜夜添| 一区二区三区蜜桃网| 丁香天五香天堂综合| 久久夜色精品国产噜噜av| 日韩经典中文字幕一区| 色吧成人激情小说| 国产精品久久久久四虎| 国产在线精品一区二区三区不卡| 欧美一区二区三区不卡| 亚洲成a人在线观看| 欧美日韩一区二区欧美激情| 亚洲欧美激情一区二区| 成人免费黄色大片| 国产精品久久三| 成人做爰69片免费看网站| 国产午夜亚洲精品羞羞网站| 国产在线一区观看| 久久女同互慰一区二区三区| 男人的j进女人的j一区| 欧美一区二区三区免费观看视频| 午夜久久电影网| 日韩欧美中文字幕精品| 蜜桃视频第一区免费观看| 日韩欧美国产一区二区在线播放|