亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? wpa_supplicant.h

?? WPA在Linux下實現的原代碼 WPA在Linux下實現的原代碼
?? H
字號:
/* * wpa_supplicant - Exported functions for wpa_supplicant modules * Copyright (c) 2003-2005, Jouni Malinen <j@w1.fi> * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2 as * published by the Free Software Foundation. * * Alternatively, this software may be distributed under the terms of BSD * license. * * See README and COPYING for more details. */#ifndef WPA_SUPPLICANT_H#define WPA_SUPPLICANT_H/* Driver wrappers are not supposed to directly touch the internal data * structure used in wpa_supplicant, so that definition is not provided here. */struct wpa_supplicant;/** * enum wpa_event_type - Event type for wpa_supplicant_event() calls */typedef enum wpa_event_type {	/**	 * EVENT_ASSOC - Association completed	 *	 * This event needs to be delivered when the driver completes IEEE	 * 802.11 association or reassociation successfully.	 * wpa_driver_ops::get_bssid() is expected to provide the current BSSID	 * after this even has been generated. In addition, optional	 * EVENT_ASSOCINFO may be generated just before EVENT_ASSOC to provide	 * more information about the association. If the driver interface gets	 * both of these events at the same time, it can also include the	 * assoc_info data in EVENT_ASSOC call.	 */	EVENT_ASSOC,	/**	 * EVENT_DISASSOC - Association lost	 *	 * This event should be called when association is lost either due to	 * receiving deauthenticate or disassociate frame from the AP or when	 * sending either of these frames to the current AP.	 */	EVENT_DISASSOC,	/**	 * EVENT_MICHAEL_MIC_FAILURE - Michael MIC (TKIP) detected	 *	 * This event must be delivered when a Michael MIC error is detected by	 * the local driver. Additional data is for event processing is	 * provided with union wpa_event_data::michael_mic_failure. This	 * information is used to request new encyption key and to initiate	 * TKIP countermeasures if needed.	 */	EVENT_MICHAEL_MIC_FAILURE,	/**	 * EVENT_SCAN_RESULTS - Scan results available	 *	 * This event must be called whenever scan results are available to be	 * fetched with struct wpa_driver_ops::get_scan_results(). This event	 * is expected to be used some time after struct wpa_driver_ops::scan()	 * is called. If the driver provides an unsolicited event when the scan	 * has been completed, this event can be used to trigger	 * EVENT_SCAN_RESULTS call. If such event is not available from the	 * driver, the driver wrapper code is expected to use a registered	 * timeout to generate EVENT_SCAN_RESULTS call after the time that the	 * scan is expected to be completed.	 */	EVENT_SCAN_RESULTS,	/**	 * EVENT_ASSOCINFO - Report optional extra information for association	 *	 * This event can be used to report extra association information for	 * EVENT_ASSOC processing. This extra information includes IEs from	 * association frames and Beacon/Probe Response frames in union	 * wpa_event_data::assoc_info. EVENT_ASSOCINFO must be send just before	 * EVENT_ASSOC. Alternatively, the driver interface can include	 * assoc_info data in the EVENT_ASSOC call if it has all the	 * information available at the same point.	 */	EVENT_ASSOCINFO,	/**	 * EVENT_INTERFACE_STATUS - Report interface status changes	 *	 * This optional event can be used to report changes in interface	 * status (interface added/removed) using union	 * wpa_event_data::interface_status. This can be used to trigger	 * wpa_supplicant to stop and re-start processing for the interface,	 * e.g., when a cardbus card is ejected/inserted.	 */	EVENT_INTERFACE_STATUS,	/**	 * EVENT_PMKID_CANDIDATE - Report a candidate AP for pre-authentication	 *	 * This event can be used to inform wpa_supplicant about candidates for	 * RSN (WPA2) pre-authentication. If wpa_supplicant is not responsible	 * for scan request (ap_scan=2 mode), this event is required for	 * pre-authentication. If wpa_supplicant is performing scan request	 * (ap_scan=1), this event is optional since scan results can be used	 * to add pre-authentication candidates. union	 * wpa_event_data::pmkid_candidate is used to report the BSSID of the	 * candidate and priority of the candidate, e.g., based on the signal	 * strength, in order to try to pre-authenticate first with candidates	 * that are most likely targets for re-association.	 *	 * EVENT_PMKID_CANDIDATE can be called whenever the driver has updates	 * on the candidate list. In addition, it can be called for the current	 * AP and APs that have existing PMKSA cache entries. wpa_supplicant	 * will automatically skip pre-authentication in cases where a valid	 * PMKSA exists. When more than one candidate exists, this event should	 * be generated once for each candidate.	 *	 * Driver will be notified about successful pre-authentication with	 * struct wpa_driver_ops::add_pmkid() calls.	 */	EVENT_PMKID_CANDIDATE} wpa_event_type;/** * union wpa_event_data - Additional data for wpa_supplicant_event() calls */union wpa_event_data {	/**	 * struct assoc_info - Data for EVENT_ASSOC and EVENT_ASSOCINFO events	 *	 * This structure is optional for EVENT_ASSOC calls and required for	 * EVENT_ASSOCINFO calls. By using EVENT_ASSOC with this data, the	 * driver interface does not need to generate separate EVENT_ASSOCINFO	 * calls.	 */	struct assoc_info {		/**		 * req_ies - (Re)Association Request IEs		 *		 * If the driver generates WPA/RSN IE, this event data must be		 * returned for WPA handshake to have needed information. If		 * wpa_supplicant-generated WPA/RSN IE is used, this		 * information event is optional.		 *		 * This should start with the first IE (fixed fields before IEs		 * are not included).		 */		u8 *req_ies;		/**		 * req_ies_len - Length of req_ies in bytes		 */		size_t req_ies_len;		/**		 * resp_ies - (Re)Association Response IEs		 *		 * Optional association data from the driver. This data is not		 * required WPA, but may be useful for some protocols and as		 * such, should be reported if this is available to the driver		 * interface.		 *		 * This should start with the first IE (fixed fields before IEs		 * are not included).		 */		u8 *resp_ies;		/**		 * resp_ies_len - Length of resp_ies in bytes		 */		size_t resp_ies_len;		/**		 * beacon_ies - Beacon or Probe Response IEs		 *		 * Optional Beacon/ProbeResp data: IEs included in Beacon or		 * Probe Response frames from the current AP (i.e., the one		 * that the client just associated with). This information is		 * used to update WPA/RSN IE for the AP. If this field is not		 * set, the results from previous scan will be used. If no		 * data for the new AP is found, scan results will be requested		 * again (without scan request). At this point, the driver is		 * expected to provide WPA/RSN IE for the AP (if WPA/WPA2 is		 * used).		 *		 * This should start with the first IE (fixed fields before IEs		 * are not included).		 */		u8 *beacon_ies;		/**		 * beacon_ies_len - Length of beacon_ies */		size_t beacon_ies_len;	} assoc_info;	/**	 * struct michael_mic_failure - Data for EVENT_MICHAEL_MIC_FAILURE	 */	struct michael_mic_failure {		int unicast;	} michael_mic_failure;	/**	 * struct interface_status - Data for EVENT_INTERFACE_STATUS	 */	struct interface_status {		char ifname[20];		enum {			EVENT_INTERFACE_ADDED, EVENT_INTERFACE_REMOVED		} ievent;	} interface_status;	/**	 * struct pmkid_candidate - Data for EVENT_PMKID_CANDIDATE	 */	struct pmkid_candidate {		/** BSSID of the PMKID candidate */		u8 bssid[ETH_ALEN];		/** Smaller the index, higher the priority */		int index;		/** Whether RSN IE includes pre-authenticate flag */		int preauth;	} pmkid_candidate;};/** * wpa_supplicant_event - Report a driver event for wpa_supplicant * @wpa_s: pointer to wpa_supplicant data; this is the ctx variable registered *	with struct wpa_driver_ops::init() * @event: event type (defined above) * @data: possible extra data for the event * * Driver wrapper code should call this function whenever an event is received * from the driver. */void wpa_supplicant_event(struct wpa_supplicant *wpa_s, wpa_event_type event,			  union wpa_event_data *data);/** * wpa_msg - Conditional printf for default target and ctrl_iface monitors * @wpa_s: pointer to wpa_supplicant data; this is the ctx variable registered *	with struct wpa_driver_ops::init() * @level: priority level (MSG_*) of the message * @fmt: printf format string, followed by optional arguments * * This function is used to print conditional debugging and error messages. The * output may be directed to stdout, stderr, and/or syslog based on * configuration. This function is like wpa_printf(), but it also sends the * same message to all attached ctrl_iface monitors. * * Note: New line '\n' is added to the end of the text when printing to stdout. */void wpa_msg(struct wpa_supplicant *wpa_s, int level, char *fmt, ...)__attribute__ ((format (printf, 3, 4)));const char * wpa_ssid_txt(u8 *ssid, size_t ssid_len);/** * wpa_supplicant_rx_eapol - Deliver a received EAPOL frame to wpa_supplicant * @ctx: Context pointer (wpa_s) * @src_addr: Source address of the EAPOL frame * @buf: EAPOL data starting from the EAPOL header (i.e., no Ethernet header) * @len: Length of the EAPOL data * * This function is called for each received EAPOL frame. */void wpa_supplicant_rx_eapol(void *ctx, const u8 *src_addr,			     const u8 *buf, size_t len);#endif /* WPA_SUPPLICANT_H */

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美高清视频在线高清观看mv色露露十八 | 麻豆国产一区二区| 亚洲一区在线电影| 国产精品久久久久婷婷| 欧美一区二区三区在线看| 色欲综合视频天天天| kk眼镜猥琐国模调教系列一区二区| 韩国精品一区二区| 久99久精品视频免费观看| 老司机一区二区| 日本不卡免费在线视频| 亚洲午夜久久久久久久久电影网 | 日韩二区三区四区| 亚洲国产综合人成综合网站| 亚洲免费观看高清完整版在线观看熊 | 首页综合国产亚洲丝袜| 亚洲一区二区三区小说| 亚洲综合一区二区三区| 亚洲激情av在线| 亚洲男人的天堂网| 洋洋成人永久网站入口| 国产午夜精品一区二区三区四区| 欧美性大战久久久久久久蜜臀| 99久久精品国产精品久久| 九九视频精品免费| 国产乱码字幕精品高清av| 精品一区二区三区久久久| 日日摸夜夜添夜夜添亚洲女人| 性欧美大战久久久久久久久| 亚洲图片欧美色图| 日产欧产美韩系列久久99| 日韩av一区二区三区| 日本不卡的三区四区五区| 精品伊人久久久久7777人| 激情综合色播激情啊| 国产精品一卡二卡| caoporm超碰国产精品| 色婷婷av一区二区| 3d成人动漫网站| 久久蜜桃香蕉精品一区二区三区| 国产日本欧美一区二区| 国产精品理论片在线观看| 亚洲精品视频免费看| 日韩影院免费视频| 国产精品77777| 91麻豆国产香蕉久久精品| 欧美中文字幕亚洲一区二区va在线| 成人黄色电影在线| 色综合 综合色| 欧美区一区二区三区| 精品久久久久久久一区二区蜜臀| 91精品国产综合久久久久久漫画| 日韩一本二本av| 国产精品色噜噜| 亚洲已满18点击进入久久| 国产精品 日产精品 欧美精品| 欧美在线播放高清精品| 久久蜜桃av一区精品变态类天堂| 亚洲国产裸拍裸体视频在线观看乱了| 国产一区二区三区四区五区美女| 色爱区综合激月婷婷| 欧美精品久久一区二区三区| 中文一区二区完整视频在线观看| 人妖欧美一区二区| 欧洲精品在线观看| 欧美国产成人精品| 九九国产精品视频| 欧美老女人第四色| 亚洲人成影院在线观看| 国产精品一线二线三线| 在线播放日韩导航| 亚洲一区在线观看视频| 成人激情综合网站| www一区二区| 日本视频中文字幕一区二区三区| 在线精品视频一区二区| 中日韩av电影| 国产乱码精品1区2区3区| 欧美一区二区女人| 亚洲成人激情av| 在线区一区二视频| 亚洲精品一二三区| 91免费精品国自产拍在线不卡| 久久久一区二区三区捆绑**| 久久成人麻豆午夜电影| 91麻豆精品91久久久久同性| 亚洲综合自拍偷拍| 日本道在线观看一区二区| 国产精品久久久久久久久免费相片 | 久久久亚洲综合| 欧美又粗又大又爽| 欧美国产精品一区| 国产乱对白刺激视频不卡| 欧美videofree性高清杂交| 日韩av电影免费观看高清完整版 | 国产精品小仙女| 精品国产免费人成电影在线观看四季 | 男男视频亚洲欧美| 欧美顶级少妇做爰| 免费久久精品视频| 欧美一区二区视频免费观看| 日韩和欧美的一区| 欧美一区二区三区啪啪| 日韩1区2区3区| 日韩欧美二区三区| 精品亚洲成a人| 久久伊人蜜桃av一区二区| 国产在线精品一区在线观看麻豆| 欧美精品一区视频| 国产成人一区二区精品非洲| 欧美激情一区三区| 不卡在线视频中文字幕| 国产精品久久久久久久久免费丝袜 | 欧美精品一卡两卡| 一二三区精品视频| 国产精品丝袜一区| 国产福利视频一区二区三区| 日本一区二区三区四区在线视频| 粉嫩一区二区三区在线看| 亚洲国产精品激情在线观看| 成人av网址在线观看| 亚洲男同性恋视频| 欧美二区三区的天堂| 九色|91porny| 国产精品久久久久久久久免费桃花 | 欧美精品日日鲁夜夜添| 亚洲一区二区在线视频| 欧美日韩久久久| 狠狠色狠狠色综合系列| 国产精品精品国产色婷婷| 成人av在线网站| 亚洲一区二区三区精品在线| 国模少妇一区二区三区| 久久精品人人做人人综合| 暴力调教一区二区三区| 亚洲国产精品自拍| 久久色在线观看| 成人99免费视频| 日产欧产美韩系列久久99| 国产亚洲欧美色| 欧美综合视频在线观看| 久久成人羞羞网站| 亚洲视频1区2区| 欧美一区二区三区不卡| 不卡的av在线| 日韩国产欧美在线播放| 中文字幕不卡在线| 欧美猛男gaygay网站| 大胆欧美人体老妇| 日韩福利视频网| 日韩美女视频一区二区| 精品欧美久久久| 欧美在线看片a免费观看| 国产黄色成人av| 无吗不卡中文字幕| 亚洲丝袜精品丝袜在线| 日韩欧美色综合网站| 日本道色综合久久| 国产精品一区二区免费不卡| 午夜精品久久久久久久久久| 国产精品―色哟哟| 精品国产精品一区二区夜夜嗨| 色猫猫国产区一区二在线视频| 国内精品伊人久久久久av影院| 亚洲最色的网站| 国产精品福利一区| 久久综合色播五月| 欧美一区2区视频在线观看| 97精品电影院| 国产精品亚洲一区二区三区在线| 午夜精品福利一区二区三区蜜桃| 国产精品色哟哟| 久久久久久影视| 日韩一级大片在线| 欧美日韩久久不卡| 91久久国产最好的精华液| 成人h动漫精品| 国产美女视频91| 麻豆精品久久久| 日韩精品欧美精品| 亚洲国产精品一区二区久久恐怖片 | 成人动漫中文字幕| 国产一区二区三区电影在线观看 | 欧美日韩一区二区三区四区 | 日韩视频不卡中文| 欧美日韩三级一区二区| 色噜噜狠狠成人中文综合| 成人黄色a**站在线观看| 国产经典欧美精品| 国产一区二区中文字幕| 久久99国产精品久久| 日韩国产欧美在线观看| 三级欧美韩日大片在线看| 午夜精品一区二区三区三上悠亚| 亚洲永久免费视频| 夜夜精品浪潮av一区二区三区| **欧美大码日韩| 亚洲欧洲av在线| 17c精品麻豆一区二区免费| 中文幕一区二区三区久久蜜桃|