亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? wpa.c

?? r73模塊的無線網卡在Linux下的驅動程序
?? C
?? 第 1 頁 / 共 5 頁
字號:
				    WpaGroupMsg1Action(pAd, Elem);				    pAd->PortCfg.WpaState = SS_FINISH;			    }			    break;		    default:			    break;	    }    }	DBGPRINT(RT_DEBUG_TRACE, "<----- WpaEAPOLKeyAction\n");}/*	========================================================================	Routine Description:		Process Pairwise key 4-way handshaking	Arguments:		pAd	Pointer	to our adapter		Elem		Message body	Return Value:		None	Note:	========================================================================*/VOID	WpaPairMsg1Action(	IN	PRTMP_ADAPTER	pAd,	IN	MLME_QUEUE_ELEM	*Elem){	PHEADER_802_11		pHeader;	UCHAR				PTK[80];	PUCHAR				pOutBuffer = NULL;	HEADER_802_11		Header_802_11;	UCHAR				AckRate = RATE_2;	USHORT				AckDuration = 0;	ULONG				FrameLen = 0;	UCHAR				EAPHEAD[8] = {0xaa,	0xaa, 0x03,	0x00, 0x00,	0x00,0x88,0x8e};	PEAPOL_PACKET		pMsg1;	EAPOL_PACKET		Packet;	UCHAR				Mic[16];	USHORT              NStatus;	DBGPRINT(RT_DEBUG_TRACE, "WpaPairMsg1Action ----->\n");	pHeader	= (PHEADER_802_11) Elem->Msg;	// Save Data Length to pDesc for receiving packet, then put in outgoing frame	Data Len fields.	pMsg1 = (PEAPOL_PACKET) &Elem->Msg[LENGTH_802_11 + LENGTH_802_1_H];	// Process message 1 from authenticator	// Key must be Pairwise key, already verified at callee.	// 1. Save Replay counter, it will use to verify message 3 and construct message 2	memcpy(pAd->PortCfg.ReplayCounter, pMsg1->KeyDesc.ReplayCounter, LEN_KEY_DESC_REPLAY);	// 2. Save ANonce	memcpy(pAd->PortCfg.ANonce, pMsg1->KeyDesc.KeyNonce, LEN_KEY_DESC_NONCE);	// TSNonce <--- SNonce	// Generate random SNonce	GenRandom(pAd,	pAd->PortCfg.SNonce);    // TPTK <--- Calc PTK(ANonce, TSNonce)    WpaCountPTK(pAd->PortCfg.PskKey.Key,		        pAd->PortCfg.ANonce,			    pAd->PortCfg.Bssid,			    pAd->PortCfg.SNonce,			    pAd->CurrentAddress,			    PTK,			    LEN_PTK);	// Save key to PTK entry	memcpy(pAd->PortCfg.PTK, PTK, LEN_PTK);	// =====================================	// Use Priority Ring & MiniportMMRequest	// =====================================	pAd->Sequence = ((pAd->Sequence) + 1) & (MAX_SEQ_NUMBER);	WpaMacHeaderInit(pAd, &Header_802_11, 0, pAd->PortCfg.Bssid);	// ACK size	is 14 include CRC, and its rate	is based on real time information	AckRate = pAd->PortCfg.ExpectedACKRate[pAd->PortCfg.TxRate];	AckDuration = RTMPCalcDuration(pAd, AckRate, 14);	Header_802_11.Duration = pAd->PortCfg.Dsifs + AckDuration;	// Zero message 2 body	memset(&Packet, 0, sizeof(Packet));	Packet.Version = pAd->EAPOLVer;	Packet.Type    = EAPOLKey;	//	// Message 2 as  EAPOL-Key(0,1,0,0,0,P,0,SNonce,MIC,RSN IE)	//	Packet.KeyDesc.Type = RSN_KEY_DESC;	// 1. Key descriptor version and appropriate RSN IE	if (pAd->PortCfg.WepStatus	== Ndis802_11Encryption3Enabled)	{		Packet.KeyDesc.KeyInfo.KeyDescVer = 2;	}	else	// TKIP	{        Packet.KeyDesc.KeyInfo.KeyDescVer = 1;	}    Packet.KeyDesc.KeyDataLen[1] = pAd->PortCfg.RSN_IELen;    memcpy(Packet.KeyDesc.KeyData, pAd->PortCfg.RSN_IE, pAd->PortCfg.RSN_IELen);	// Update packet length after decide Key data payload	Packet.Len[1]  = sizeof(KEY_DESCRIPTER) - MAX_LEN_OF_RSNIE + Packet.KeyDesc.KeyDataLen[1];	// Update Key length	Packet.KeyDesc.KeyLength[0] = pMsg1->KeyDesc.KeyLength[0];	Packet.KeyDesc.KeyLength[1] = pMsg1->KeyDesc.KeyLength[1];	// 2. Key Type PeerKey	Packet.KeyDesc.KeyInfo.KeyType = 1;	// 3. KeyMic field presented	Packet.KeyDesc.KeyInfo.KeyMic  = 1;	// 4. Fill SNonce	memcpy(Packet.KeyDesc.KeyNonce, pAd->PortCfg.SNonce, LEN_KEY_DESC_NONCE);	// 5. Key Replay Count	memcpy(Packet.KeyDesc.ReplayCounter, pAd->PortCfg.ReplayCounter, LEN_KEY_DESC_REPLAY);#ifdef BIG_ENDIAN    // recovery original byte order, before forward Elem to another routine{    USHORT	tmpKeyinfo;    memcpy(&tmpKeyinfo, &Packet.KeyDesc.KeyInfo, sizeof(USHORT));    tmpKeyinfo = SWAP16(tmpKeyinfo);    memcpy(&Packet.KeyDesc.KeyInfo, &tmpKeyinfo, sizeof(USHORT));}//	*(USHORT *)(&(Packet.KeyDesc.KeyInfo)) = SWAP16(*(USHORT *)(&(Packet.KeyDesc.KeyInfo)));#endif	// Send EAPOL(0, 1, 0, 0, 0, K, 0, TSNonce, 0, MIC(TPTK), 0)	// Out buffer for transmitting message 2    NStatus = MlmeAllocateMemory(pAd, (PVOID)&pOutBuffer);  //Get an unused nonpaged memory    if (NStatus != NDIS_STATUS_SUCCESS)		return;	// Prepare EAPOL frame for MIC calculation	// Be careful, only EAPOL frame is counted for MIC calculation	MakeOutgoingFrame(pOutBuffer,           &FrameLen,		              Packet.Len[1] + 4,    &Packet,		              END_OF_ARGS);	// 5. Prepare and Fill MIC value	memset(Mic, 0, sizeof(Mic));	if (pAd->PortCfg.WepStatus	== Ndis802_11Encryption3Enabled)	{		// AES		UCHAR digest[80];		HMAC_SHA1(pOutBuffer, FrameLen, PTK, LEN_EAP_MICK, digest);		memcpy(Mic,	digest,	LEN_KEY_DESC_MIC);	}	else	{		INT i;		DBGPRINT(RT_DEBUG_INFO, " PMK = ");		for (i = 0; i < 16; i++)			DBGPRINT_RAW(RT_DEBUG_INFO, "%2x-", pAd->PortCfg.PskKey.Key[i]);		DBGPRINT_RAW(RT_DEBUG_INFO, "\n");		DBGPRINT(RT_DEBUG_INFO, "PTK = ");		for (i = 0; i < 64; i++)			DBGPRINT_RAW(RT_DEBUG_INFO, "%2x-", pAd->PortCfg.PTK[i]);		DBGPRINT_RAW(RT_DEBUG_INFO, "\n");		DBGPRINT(RT_DEBUG_INFO, "FrameLen = %d\n", FrameLen);	    hmac_md5(PTK,  LEN_EAP_MICK, pOutBuffer, FrameLen, Mic);	}	memcpy(Packet.KeyDesc.KeyMic, Mic, LEN_KEY_DESC_MIC);    FrameLen = 0;	MakeOutgoingFrame(pOutBuffer,           &FrameLen,	                  sizeof(HEADER_802_11),&Header_802_11,		              sizeof(EAPHEAD),      EAPHEAD,		              Packet.Len[1] + 4,    &Packet,		              END_OF_ARGS);	// Send using priority queue	MiniportMMRequest(pAd, pOutBuffer, FrameLen);	DBGPRINT(RT_DEBUG_TRACE, "WpaPairMsg1Action <-----\n");}VOID    Wpa2PairMsg1Action(    IN  PRTMP_ADAPTER   pAd,    IN  MLME_QUEUE_ELEM *Elem){    PHEADER_802_11      pHeader;    UCHAR               PTK[80];    PUCHAR              pOutBuffer = NULL;    HEADER_802_11       Header_802_11;    UCHAR               AckRate = RATE_2;    USHORT              AckDuration = 0;    ULONG               FrameLen = 0;    UCHAR               EAPHEAD[8] = {0xaa, 0xaa, 0x03, 0x00, 0x00, 0x00,0x88,0x8e};    PEAPOL_PACKET       pMsg1;    EAPOL_PACKET        Packet;    UCHAR               Mic[16];    USHORT              NStatus;    DBGPRINT(RT_DEBUG_TRACE, "Wpa2PairMsg1Action ----->\n");    pHeader = (PHEADER_802_11) Elem->Msg;    // Save Data Length to pDesc for receiving packet, then put in outgoing frame   Data Len fields.    pMsg1 = (PEAPOL_PACKET) &Elem->Msg[LENGTH_802_11 + LENGTH_802_1_H];    // Process message 1 from authenticator    // Key must be Pairwise key, already verified at callee.    // 1. Save Replay counter, it will use to verify message 3 and construct message 2    memcpy(pAd->PortCfg.ReplayCounter, pMsg1->KeyDesc.ReplayCounter, LEN_KEY_DESC_REPLAY);    // 2. Save ANonce    memcpy(pAd->PortCfg.ANonce, pMsg1->KeyDesc.KeyNonce, LEN_KEY_DESC_NONCE);    // TSNonce <--- SNonce    // Generate random SNonce    GenRandom(pAd, pAd->PortCfg.SNonce);    if (pMsg1->KeyDesc.KeyDataLen[1] > 0 )    {        // cached PMKID    }    // TPTK <--- Calc PTK(ANonce, TSNonce)    WpaCountPTK(pAd->PortCfg.PskKey.Key,        pAd->PortCfg.ANonce,        pAd->PortCfg.Bssid,        pAd->PortCfg.SNonce,        pAd->CurrentAddress,        PTK,        LEN_PTK);    // Save key to PTK entry    memcpy(pAd->PortCfg.PTK, PTK, LEN_PTK);    // =====================================    // Use Priority Ring & MiniportMMRequest    // =====================================    pAd->Sequence = ((pAd->Sequence) + 1) & (MAX_SEQ_NUMBER);    WpaMacHeaderInit(pAd, &Header_802_11, 0, pAd->PortCfg.Bssid);    // ACK size is 14 include CRC, and its rate is based on real time information    AckRate = pAd->PortCfg.ExpectedACKRate[pAd->PortCfg.TxRate];    AckDuration = RTMPCalcDuration(pAd, AckRate, 14);    Header_802_11.Duration = pAd->PortCfg.Dsifs + AckDuration;    // Zero message 2 body    memset(&Packet, 0, sizeof(Packet));    Packet.Version = pAd->EAPOLVer;    Packet.Type    = EAPOLKey;    //    // Message 2 as  EAPOL-Key(0,1,0,0,0,P,0,SNonce,MIC,RSN IE)    //    Packet.KeyDesc.Type = WPA2_KEY_DESC;    // 1. Key descriptor version and appropriate RSN IE    memcpy(Packet.KeyDesc.KeyData, pAd->PortCfg.RSN_IE, pAd->PortCfg.RSN_IELen);    Packet.KeyDesc.KeyDataLen[1] = pAd->PortCfg.RSN_IELen;    if (pAd->PortCfg.WepStatus == Ndis802_11Encryption3Enabled)    {        Packet.KeyDesc.KeyInfo.KeyDescVer = 2;    }    else    // TKIP    {        Packet.KeyDesc.KeyInfo.KeyDescVer = 1;    }    // Update packet length after decide Key data payload    Packet.Len[1]  = sizeof(KEY_DESCRIPTER) - MAX_LEN_OF_RSNIE + Packet.KeyDesc.KeyDataLen[1];    // 2. Key Type PeerKey    Packet.KeyDesc.KeyInfo.KeyType = 1;    // 3. KeyMic field presented    Packet.KeyDesc.KeyInfo.KeyMic  = 1;    // Update Key Length    Packet.KeyDesc.KeyLength[0] = 0;    Packet.KeyDesc.KeyLength[1] = pMsg1->KeyDesc.KeyLength[1];    // 4. Fill SNonce    memcpy(Packet.KeyDesc.KeyNonce, pAd->PortCfg.SNonce, LEN_KEY_DESC_NONCE);    // 5. Key Replay Count    memcpy(Packet.KeyDesc.ReplayCounter, pAd->PortCfg.ReplayCounter, LEN_KEY_DESC_REPLAY);#ifdef BIG_ENDIAN    // recovery original byte order, before forward Elem to another routine{    USHORT	tmpKeyinfo;    memcpy(&tmpKeyinfo, &Packet.KeyDesc.KeyInfo, sizeof(USHORT));    tmpKeyinfo = SWAP16(tmpKeyinfo);    memcpy(&Packet.KeyDesc.KeyInfo, &tmpKeyinfo, sizeof(USHORT));}#endif    // Send EAPOL(0, 1, 0, 0, 0, K, 0, TSNonce, 0, MIC(TPTK), 0)    // Out buffer for transmitting message 2    NStatus = MlmeAllocateMemory(pAd, (PVOID)&pOutBuffer);  //Get an unused nonpaged memory    if (NStatus != NDIS_STATUS_SUCCESS)        return;    // Prepare EAPOL frame for MIC calculation    // Be careful, only EAPOL frame is counted for MIC calculation    MakeOutgoingFrame(pOutBuffer,        &FrameLen,                      Packet.Len[1] + 4, &Packet,                      END_OF_ARGS);    // 5. Prepare and Fill MIC value    memset(Mic, 0, sizeof(Mic));    if (pAd->PortCfg.WepStatus == Ndis802_11Encryption3Enabled)    {        // AES        UCHAR digest[80];        HMAC_SHA1(pOutBuffer, FrameLen, PTK, LEN_EAP_MICK, digest);        memcpy(Mic, digest, LEN_KEY_DESC_MIC);    }    else    {        hmac_md5(PTK,  LEN_EAP_MICK, pOutBuffer, FrameLen, Mic);    }    memcpy(Packet.KeyDesc.KeyMic, Mic, LEN_KEY_DESC_MIC);    FrameLen = 0;    // Make  Transmitting frame    MakeOutgoingFrame(pOutBuffer,             &FrameLen,                      sizeof(HEADER_802_11),  &Header_802_11,                      sizeof(EAPHEAD),        EAPHEAD,                      Packet.Len[1] + 4,      &Packet,                      END_OF_ARGS);    // Send using priority queue    MiniportMMRequest(pAd, pOutBuffer, FrameLen);    DBGPRINT(RT_DEBUG_TRACE, "Wpa2PairMsg1Action <-----\n");}/*	========================================================================	Routine Description:		Process Pairwise key 4-way handshaking	Arguments:		pAd	Pointer	to our adapter		Elem		Message body	Return Value:		None	Note:	========================================================================*/VOID	WpaPairMsg3Action(	IN	PRTMP_ADAPTER	pAd,	IN	MLME_QUEUE_ELEM	*Elem){	PHEADER_802_11		pHeader;	PUCHAR				pOutBuffer = NULL;	HEADER_802_11		Header_802_11;	UCHAR				AckRate = RATE_2;	USHORT				AckDuration = 0;	ULONG				FrameLen = 0;	UCHAR				EAPHEAD[8] = {0xaa,	0xaa, 0x03,	0x00, 0x00,	0x00,0x88,0x8e};	EAPOL_PACKET		Packet;	PEAPOL_PACKET		pMsg3;	UCHAR				Mic[16], OldMic[16];	PNDIS_802_11_KEY	pPeerKey;	USHORT              NStatus;	DBGPRINT(RT_DEBUG_TRACE, "WpaPairMsg3Action ----->\n");	pHeader	= (PHEADER_802_11) Elem->Msg;	// Process message 3 frame.	pMsg3 = (PEAPOL_PACKET) &Elem->Msg[LENGTH_802_11 + LENGTH_802_1_H];#ifdef BIG_ENDIAN   // recovery original byte order, before forward Elem to another routine{    USHORT	tmpKeyinfo;    memcpy(&tmpKeyinfo, &pMsg3->KeyDesc.KeyInfo, sizeof(USHORT));    tmpKeyinfo = SWAP16(tmpKeyinfo);    memcpy(&pMsg3->KeyDesc.KeyInfo, &tmpKeyinfo, sizeof(USHORT));}//	*(USHORT *)(&(pMsg3->KeyDesc.KeyInfo)) = SWAP16(*(USHORT *)(&(pMsg3->KeyDesc.KeyInfo)));#endif	// 1. Verify RSN IE & cipher type match	if (pAd->PortCfg.WepStatus	== Ndis802_11Encryption3Enabled && (pMsg3->KeyDesc.KeyInfo.KeyDescVer != 2))	{	    return;	}	else if (pAd->PortCfg.WepStatus == Ndis802_11Encryption2Enabled && (pMsg3->KeyDesc.KeyInfo.KeyDescVer != 1))	{	    return;	}#ifdef BIG_ENDIAN   // recovery original byte order, before forward Elem to another routine

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美亚洲国产bt| 日韩欧美高清dvd碟片| 韩国女主播成人在线| 亚洲同性gay激情无套| 欧美www视频| 欧美日韩免费高清一区色橹橹| 国产曰批免费观看久久久| 亚洲成人自拍网| 国产精品久久久久久久久动漫 | 欧美老人xxxx18| 成人免费视频一区| 久久er99热精品一区二区| 亚洲成人综合网站| 亚洲欧美一区二区久久| 国产欧美日本一区视频| 精品福利二区三区| 欧美人妖巨大在线| 在线免费观看日本欧美| 成人18视频在线播放| 激情成人综合网| 日本亚洲最大的色成网站www| 一区二区三区波多野结衣在线观看| 国产精品日日摸夜夜摸av| 久久综合久久鬼色| 欧美肥妇bbw| 欧美日韩国产成人在线免费| 色视频成人在线观看免| 972aa.com艺术欧美| 成人免费看视频| 国产xxx精品视频大全| 国产主播一区二区三区| 国内成人精品2018免费看| 天堂在线一区二区| 五月婷婷综合激情| 亚洲国产成人av好男人在线观看| 亚洲激情综合网| 亚洲伦理在线精品| 亚洲欧美乱综合| 亚洲欧美日韩精品久久久久| 亚洲欧美日韩综合aⅴ视频| 亚洲三级在线免费观看| 亚洲欧美视频在线观看| 亚洲制服丝袜av| 亚洲第一搞黄网站| 婷婷久久综合九色综合绿巨人| 亚洲福利电影网| 婷婷激情综合网| 日本aⅴ免费视频一区二区三区| 日韩不卡在线观看日韩不卡视频| 日韩二区三区四区| 精品一区二区三区av| 国模一区二区三区白浆| 丁香一区二区三区| 一本大道久久a久久精二百| 欧洲国产伦久久久久久久| 欧美精品久久一区二区三区| 日韩三级伦理片妻子的秘密按摩| 久久伊99综合婷婷久久伊| 久久婷婷久久一区二区三区| 中文字幕不卡在线| 亚洲欧美一区二区三区久本道91 | 欧美精品一区二区在线观看| 26uuu欧美| 国产精品色呦呦| 一区二区三区国产精华| 免费观看在线色综合| 国产成人在线免费| 在线观看亚洲精品| 日韩精品一区二区在线观看| 国产婷婷色一区二区三区四区| 国产精品每日更新在线播放网址| 一区二区三区在线观看动漫| 蜜桃视频第一区免费观看| 国产福利一区在线| 在线免费观看日韩欧美| 欧美成人精品福利| 亚洲欧洲在线观看av| 日韩精品一区第一页| 国产成人免费在线观看不卡| 欧美日韩亚洲丝袜制服| 久久久九九九九| 亚洲黄色小说网站| 国产一区二区女| 欧美三级电影网站| 国产精品美女久久久久久久久| 午夜激情久久久| 国产**成人网毛片九色| 欧美三级乱人伦电影| 国产精品午夜在线观看| 日韩成人av影视| 97精品久久久午夜一区二区三区 | 日韩一区二区在线看片| 日韩理论片在线| 激情丁香综合五月| 欧美三级在线视频| 国产精品久久久久9999吃药| 青青青伊人色综合久久| 一本色道亚洲精品aⅴ| 久久精品在线免费观看| 五月天丁香久久| 成人av网站免费观看| 日韩精品综合一本久道在线视频| 亚洲人成网站精品片在线观看 | 欧美日韩一区二区三区四区五区 | 亚洲女性喷水在线观看一区| 久久精品国产久精国产爱| 欧洲中文字幕精品| 国产精品人妖ts系列视频| 免费高清在线一区| 欧美日韩精品免费| 一区二区欧美在线观看| 成人福利电影精品一区二区在线观看| 91精品国产欧美一区二区| 亚洲综合视频网| 99久久久国产精品| 欧美国产丝袜视频| 韩国欧美国产1区| 日韩精品中文字幕一区| 日本va欧美va精品| 7777精品伊人久久久大香线蕉经典版下载 | 国产成+人+日韩+欧美+亚洲| 日韩精品一区二区三区在线播放| 亚洲777理论| 欧美唯美清纯偷拍| 一区二区成人在线视频| 91视频免费观看| 亚洲人妖av一区二区| 国产69精品久久久久毛片| 国产日韩欧美在线一区| 国产精一区二区三区| 久久你懂得1024| 国产91高潮流白浆在线麻豆| 国产欧美日本一区视频| 成人激情电影免费在线观看| 国产欧美精品一区aⅴ影院| 国产福利一区在线| 国产精品午夜久久| 成人美女在线观看| 中文字幕日本不卡| 91蝌蚪porny成人天涯| 中文字幕巨乱亚洲| 99九九99九九九视频精品| 亚洲精品欧美综合四区| 欧美色图天堂网| 日本欧美肥老太交大片| 日韩欧美不卡在线观看视频| 久草这里只有精品视频| 欧美精品一区二区三区高清aⅴ | 高清不卡在线观看av| 欧美国产精品v| 91色九色蝌蚪| 亚洲成年人网站在线观看| 9191精品国产综合久久久久久| 卡一卡二国产精品 | 在线免费观看不卡av| 午夜欧美电影在线观看| 日韩欧美你懂的| 福利一区福利二区| 亚洲精品高清在线观看| 欧美一区二区性放荡片| 国产成人日日夜夜| 一区二区欧美国产| 日韩一区二区精品在线观看| 国内外成人在线| 亚洲欧洲精品一区二区精品久久久| 色999日韩国产欧美一区二区| 亚洲成a人片在线不卡一二三区| 欧美一区二区视频在线观看2022 | 亚洲一区二区三区四区五区中文| 欧美日韩精品一区二区| 国产乱码字幕精品高清av| 亚洲日本在线看| 精品日韩一区二区三区| 波多野洁衣一区| 丝袜国产日韩另类美女| 久久久久久久久久久久久夜| 91视频你懂的| 精品一区二区三区日韩| 亚洲图片激情小说| 精品国产免费视频| 99精品视频在线观看免费| 欧美bbbbb| 亚洲柠檬福利资源导航| 日韩欧美中文字幕精品| 91麻豆文化传媒在线观看| 美女视频网站久久| 亚洲精品日韩专区silk| 精品久久久久久久久久久久久久久 | 亚洲精品久久久蜜桃| 欧美一区二区在线看| 91美女在线观看| 国产一区二区三区在线观看精品 | 亚洲第一激情av| 国产精品三级视频| 日韩精品中文字幕一区二区三区 | 日韩亚洲欧美在线| 色av成人天堂桃色av| 国产成人av电影在线播放| 欧美日韩国产经典色站一区二区三区| 亚洲成人在线免费|