亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? driver.h

?? WPA在Linux下實現的原代碼 WPA在Linux下實現的原代碼
?? H
?? 第 1 頁 / 共 2 頁
字號:
/* * WPA Supplicant - driver interface definition * Copyright (c) 2003-2005, Jouni Malinen <j@w1.fi> * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2 as * published by the Free Software Foundation. * * Alternatively, this software may be distributed under the terms of BSD * license. * * See README and COPYING for more details. */#ifndef DRIVER_H#define DRIVER_H#define WPA_SUPPLICANT_DRIVER_VERSION 2#include "defs.h"#define AUTH_ALG_OPEN_SYSTEM	0x01#define AUTH_ALG_SHARED_KEY	0x02#define AUTH_ALG_LEAP		0x04#define IEEE80211_MODE_INFRA	0#define IEEE80211_MODE_IBSS	1#define IEEE80211_CAP_ESS	0x0001#define IEEE80211_CAP_IBSS	0x0002#define IEEE80211_CAP_PRIVACY	0x0010#define SSID_MAX_WPA_IE_LEN 40/** * struct wpa_scan_result - Scan results * @bssid: BSSID * @ssid: SSID * @ssid_len: length of the ssid * @wpa_ie: WPA IE * @wpa_ie_len: length of the wpa_ie * @rsn_ie: RSN IE * @rsn_ie_len: length of the RSN IE * @freq: frequency of the channel in MHz (e.g., 2412 = channel 1) * @caps: capability information field in host byte order * @qual: signal quality * @noise: noise level * @level: signal level * @maxrate: maximum supported rate * * This structure is used as a generic format for scan results from the * driver. Each driver interface implementation is responsible for converting * the driver or OS specific scan results into this format. */struct wpa_scan_result {	u8 bssid[ETH_ALEN];	u8 ssid[32];	size_t ssid_len;	u8 wpa_ie[SSID_MAX_WPA_IE_LEN];	size_t wpa_ie_len;	u8 rsn_ie[SSID_MAX_WPA_IE_LEN];	size_t rsn_ie_len;	int freq;	u16 caps;	int qual;	int noise;	int level;	int maxrate;};/** * struct wpa_driver_associate_params - Association parameters * Data for struct wpa_driver_ops::associate(). */struct wpa_driver_associate_params {	/**	 * bssid - BSSID of the selected AP	 * This can be %NULL, if ap_scan=2 mode is used and the driver is	 * responsible for selecting with which BSS to associate. */	const u8 *bssid;	/**	 * ssid - The selected SSID	 */	const u8 *ssid;	size_t ssid_len;	/**	 * freq - Frequency of the channel the selected AP is using	 * Frequency that the selected AP is using (in MHz as	 * reported in the scan results)	 */	int freq;	/**	 * wpa_ie - WPA information element for (Re)Association Request	 * WPA information element to be included in (Re)Association	 * Request (including information element id and length). Use	 * of this WPA IE is optional. If the driver generates the WPA	 * IE, it can use pairwise_suite, group_suite, and	 * key_mgmt_suite to select proper algorithms. In this case,	 * the driver has to notify wpa_supplicant about the used WPA	 * IE by generating an event that the interface code will	 * convert into EVENT_ASSOCINFO data (see wpa_supplicant.h).	 * When using WPA2/IEEE 802.11i, wpa_ie is used for RSN IE	 * instead. The driver can determine which version is used by	 * looking at the first byte of the IE (0xdd for WPA, 0x30 for	 * WPA2/RSN).	 */	const u8 *wpa_ie;	/**	 * wpa_ie_len - length of the wpa_ie	 */	size_t wpa_ie_len;	/* The selected pairwise/group cipher and key management	 * suites. These are usually ignored if @wpa_ie is used. */	wpa_cipher pairwise_suite;	wpa_cipher group_suite;	wpa_key_mgmt key_mgmt_suite;	/**	 * auth_alg - Allowed authentication algorithms	 * Bit field of AUTH_ALG_*	 */	int auth_alg;	/**	 * mode - Operation mode (infra/ibss) IEEE80211_MODE_*	 */	int mode;	/**	 * wep_key - WEP keys for static WEP configuration	 */	const u8 *wep_key[4];	/**	 * wep_key_len - WEP key length for static WEP configuration	 */	size_t wep_key_len[4];	/**	 * wep_tx_keyidx - WEP TX key index for static WEP configuration	 */	int wep_tx_keyidx;};/** * struct wpa_driver_capa - Driver capability information */struct wpa_driver_capa {#define WPA_DRIVER_CAPA_KEY_MGMT_WPA		0x00000001#define WPA_DRIVER_CAPA_KEY_MGMT_WPA2		0x00000002#define WPA_DRIVER_CAPA_KEY_MGMT_WPA_PSK	0x00000004#define WPA_DRIVER_CAPA_KEY_MGMT_WPA2_PSK	0x00000008#define WPA_DRIVER_CAPA_KEY_MGMT_WPA_NONE	0x00000010	unsigned int key_mgmt;#define WPA_DRIVER_CAPA_ENC_WEP40	0x00000001#define WPA_DRIVER_CAPA_ENC_WEP104	0x00000002#define WPA_DRIVER_CAPA_ENC_TKIP	0x00000004#define WPA_DRIVER_CAPA_ENC_CCMP	0x00000008	unsigned int enc;#define WPA_DRIVER_AUTH_OPEN		0x00000001#define WPA_DRIVER_AUTH_SHARED		0x00000002#define WPA_DRIVER_AUTH_LEAP		0x00000004	unsigned int auth;/* Driver generated WPA/RSN IE */#define WPA_DRIVER_FLAGS_DRIVER_IE	0x00000001#define WPA_DRIVER_FLAGS_SET_KEYS_AFTER_ASSOC 0x00000002	unsigned int flags;};/** * struct wpa_driver_ops - Driver interface API definition * * This structure defines the API that each driver interface needs to implement * for core wpa_supplicant code. All driver specific functionality is captured * in this wrapper. */struct wpa_driver_ops {	/** Name of the driver interface */	const char *name;	/** One line description of the driver interface */	const char *desc;	/**	 * get_bssid - Get the current BSSID	 * @priv: private driver interface data	 * @bssid: buffer for BSSID (ETH_ALEN = 6 bytes)	 *	 * Returns: 0 on success, -1 on failure	 *	 * Query kernel driver for the current BSSID and copy it to bssid.	 * Setting bssid to 00:00:00:00:00:00 is recommended if the STA is not	 * associated.	 */	int (*get_bssid)(void *priv, u8 *bssid);	/**	 * get_ssid - Get the current SSID	 * @priv: private driver interface data	 * @ssid: buffer for SSID (at least 32 bytes)	 *	 * Returns: Length of the SSID on success, -1 on failure	 *	 * Query kernel driver for the current SSID and copy it to ssid.	 * Returning zero is recommended if the STA is not associated.	 *	 * Note: SSID is an array of octets, i.e., it is not nul terminated and	 * can, at least in theory, contain control characters (including nul)	 * and as such, should be processed as binary data, not a printable	 * string.	 */	int (*get_ssid)(void *priv, u8 *ssid);	/**	 * set_wpa - Enable/disable WPA support (OBSOLETE)	 * @priv: private driver interface data	 * @enabled: 1 = enable, 0 = disable	 *	 * Returns: 0 on success, -1 on failure	 *	 * Note: This function is included for backwards compatibility. This is	 * called only just after init and just before deinit, so these	 * functions can be used to implement same functionality and the driver	 * interface need not define this function.	 *	 * Configure the kernel driver to enable/disable WPA support. This may	 * be empty function, if WPA support is always enabled. Common	 * configuration items are WPA IE (clearing it when WPA support is	 * disabled), Privacy flag configuration for capability field (note:	 * this the value need to set in associate handler to allow plaintext	 * mode to be used) when trying to associate with, roaming mode (can	 * allow wpa_supplicant to control roaming if ap_scan=1 is used;	 * however, drivers can also implement roaming if desired, especially	 * ap_scan=2 mode is used for this).	 */	int (*set_wpa)(void *priv, int enabled);	/**	 * set_key - Configure encryption key	 * @priv: private driver interface data	 * @alg: encryption algorithm (%WPA_ALG_NONE, %WPA_ALG_WEP,	 *	%WPA_ALG_TKIP, %WPA_ALG_CCMP); %WPA_ALG_NONE clears the key.	 * @addr: address of the peer STA or ff:ff:ff:ff:ff:ff for	 *	broadcast/default keys	 * @key_idx: key index (0..3), usually 0 for unicast keys	 * @set_tx: configure this key as the default Tx key (only used when	 *	driver does not support separate unicast/individual key	 * @seq: sequence number/packet number, seq_len octets, the next	 *	packet number to be used for in replay protection; configured	 *	for Rx keys (in most cases, this is only used with broadcast	 *	keys and set to zero for unicast keys)	 * @seq_len: length of the seq, depends on the algorithm:	 *	TKIP: 6 octets, CCMP: 6 octets	 * @key: key buffer; TKIP: 16-byte temporal key, 8-byte Tx Mic key,	 *	8-byte Rx Mic Key	 * @key_len: length of the key buffer in octets (WEP: 5 or 13,	 *	TKIP: 32, CCMP: 16)	 *	 * Returns: 0 on success, -1 on failure	 *	 * Configure the given key for the kernel driver. If the driver	 * supports separate individual keys (4 default keys + 1 individual),	 * addr can be used to determine whether the key is default or	 * individual. If only 4 keys are supported, the default key with key	 * index 0 is used as the individual key. STA must be configured to use	 * it as the default Tx key (set_tx is set) and accept Rx for all the	 * key indexes. In most cases, WPA uses only key indexes 1 and 2 for	 * broadcast keys, so key index 0 is available for this kind of	 * configuration.	 *	 * Please note that TKIP keys include separate TX and RX MIC keys and	 * some drivers may expect them in different order than wpa_supplicant	 * is using. If the TX/RX keys are swapped, all TKIP encrypted packets	 * will tricker Michael MIC errors. This can be fixed by changing the	 * order of MIC keys by swapping te bytes 16..23 and 24..31 of the key	 * in driver_*.c set_key() implementation, see driver_ndis.c for an	 * example on how this can be done.	 */	int (*set_key)(void *priv, wpa_alg alg, const u8 *addr,		       int key_idx, int set_tx, const u8 *seq, size_t seq_len,		       const u8 *key, size_t key_len);

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
天天操天天综合网| 国产婷婷一区二区| 欧美日韩成人综合在线一区二区| 国产精品短视频| 99麻豆久久久国产精品免费| 欧美丰满嫩嫩电影| 最新国产成人在线观看| 99视频有精品| 337p粉嫩大胆色噜噜噜噜亚洲| 激情欧美日韩一区二区| 国产欧美一区二区三区网站| 蜜桃精品视频在线| 久久久久久久免费视频了| 亚洲高清视频中文字幕| 日韩视频一区二区三区在线播放| 中文字幕一区二区三区在线播放| 91美女在线观看| 欧美激情在线免费观看| 久久国产精品99久久久久久老狼| 色综合视频一区二区三区高清| 一二三区精品视频| 欧美一区二区三区在线观看视频| 亚洲精品综合在线| 欧美一区二区免费视频| 午夜激情综合网| 久久久亚洲午夜电影| 色综合天天综合在线视频| 欧美激情一二三区| 欧美日韩专区在线| 亚洲一区在线视频观看| 色一情一乱一乱一91av| 国产婷婷色一区二区三区在线| 91成人免费在线| 精品一区二区三区视频| 亚洲精品日日夜夜| 精品美女在线播放| 国产最新精品免费| 日韩欧美国产综合| 老司机精品视频在线| 日韩欧美国产麻豆| 色综合激情久久| 国产一区二区在线免费观看| 成人av网站免费观看| 亚洲成a人片综合在线| 国产精品少妇自拍| caoporm超碰国产精品| 麻豆成人综合网| 亚洲电影在线播放| 欧美日韩中文字幕一区二区| 成人免费黄色在线| 韩国精品主播一区二区在线观看| 亚洲国产欧美在线| ●精品国产综合乱码久久久久| bt7086福利一区国产| 亚洲男人电影天堂| 久久久久97国产精华液好用吗| 欧美日韩免费一区二区三区视频| 日韩va欧美va亚洲va久久| 亚洲日本护士毛茸茸| 国产农村妇女毛片精品久久麻豆| 日韩女优电影在线观看| 欧美精品vⅰdeose4hd| 日韩电影在线免费观看| 欧美电影免费观看高清完整版在线观看 | 亚洲一区二区三区爽爽爽爽爽| 亚洲国产成人自拍| 国产网站一区二区三区| 精品国产露脸精彩对白| 欧美一区国产二区| 国产成人久久精品77777最新版本| 中文字幕一区av| 欧美经典三级视频一区二区三区| 久久久国产综合精品女国产盗摄| 99国产精品久| 91丨porny丨最新| 99国产精品久久久久久久久久 | 日韩三级免费观看| 东方aⅴ免费观看久久av| 亚洲尤物视频在线| 久久夜色精品国产噜噜av| 91一区二区在线| 97精品国产露脸对白| 视频在线观看91| 日本亚洲电影天堂| 久久成人18免费观看| 精品一区二区三区免费播放| 激情文学综合网| 亚洲综合久久久| 午夜a成v人精品| 亚洲三级在线播放| 亚洲精品一区二区三区99| 精品国产青草久久久久福利| 91在线视频网址| 国产精品一区在线观看你懂的| 国产成人精品免费网站| 福利电影一区二区三区| 91婷婷韩国欧美一区二区| 欧美在线观看一区| 日韩三级精品电影久久久| 久久免费的精品国产v∧| 欧美日韩另类一区| 欧美一级高清片在线观看| 久久久亚洲精品石原莉奈| 中文字幕乱码亚洲精品一区| 久久免费视频一区| 欧美一区三区四区| 日本一二三四高清不卡| 一区二区三区免费网站| 日本成人在线网站| 成人中文字幕合集| 国产一区高清在线| 91麻豆视频网站| 日韩三级高清在线| 亚洲精品成人在线| 老司机精品视频线观看86| eeuss国产一区二区三区| 欧美一区二区精品在线| 中文字幕一区二区三区在线观看 | 亚洲国产wwwccc36天堂| 日韩久久一区二区| 国产精品久久午夜| 三级久久三级久久| 天使萌一区二区三区免费观看| 精品影院一区二区久久久| 91色综合久久久久婷婷| 狠狠色2019综合网| 在线观看亚洲a| 中文字幕av免费专区久久| 欧美激情综合五月色丁香| 亚洲成av人影院在线观看网| 高清成人免费视频| 成人av免费在线观看| 久久精品噜噜噜成人88aⅴ| 成人国产精品免费观看视频| 一区二区成人在线视频| 自拍偷在线精品自拍偷无码专区| 国产精品无遮挡| 久久精品国产77777蜜臀| 91久久精品一区二区三| 欧美三级蜜桃2在线观看| 中文字幕精品在线不卡| 亚洲欧美日韩成人高清在线一区| 精品一区二区在线看| 国产精品99精品久久免费| 成人三级伦理片| 久久综合色婷婷| 国产精品亲子伦对白| 久久精品国产精品亚洲红杏| 欧美日韩黄色影视| 日韩欧美黄色影院| 午夜精品久久久久久不卡8050| 丝袜亚洲另类丝袜在线| 欧美日韩综合在线免费观看| 亚洲美女偷拍久久| 92国产精品观看| 亚洲欧洲国产日本综合| 亚洲一区二区三区在线播放| 人人精品人人爱| 在线不卡a资源高清| 亚洲国产精品天堂| 免费成人结看片| 7777精品伊人久久久大香线蕉超级流畅 | 婷婷综合久久一区二区三区| 色94色欧美sute亚洲线路二| 亚洲视频在线一区观看| 91在线精品秘密一区二区| 亚洲欧洲国产日韩| 亚洲大尺度视频在线观看| 欧美探花视频资源| 久久久久国产精品厨房| 国产在线不卡一区| 久久久久久久久久电影| 国产成a人亚洲| 国产精品久久免费看| 色综合夜色一区| 欧美电视剧免费观看| 亚洲女女做受ⅹxx高潮| 裸体歌舞表演一区二区| 色综合久久中文字幕| 日韩你懂的在线播放| 国产精品538一区二区在线| 欧美视频一区二| 免费观看30秒视频久久| 久久久久久一二三区| 国产精品系列在线观看| 制服.丝袜.亚洲.中文.综合| 日韩电影在线观看网站| 丁香六月综合激情| 亚洲猫色日本管| 欧美日韩和欧美的一区二区| 国产精品丝袜久久久久久app| 91尤物视频在线观看| 午夜欧美一区二区三区在线播放| 日韩欧美不卡一区| 亚洲v中文字幕| 91麻豆免费看| 免费观看日韩电影| 日本一区二区在线不卡| 久久66热偷产精品| 国产精品成人午夜|