亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? dot11lib.c

?? PNE 3.3 wlan source code, running at more than vxworks6.x version
?? C
?? 第 1 頁 / 共 5 頁
字號:
This IOCTL is only applicable in ESS mode.\i WIOCSPWRMAN : Set Power Management StatusIn an ESS, this IOCTL turns power management mode on or off.  When enabled, the station will go to sleep, waking periodically to check for messages that the AP has queued for it.  <data> should contain a boolean value, either TRUEor FALSE.  This IOCTL is only applicable in ESS mode.\i WIOCGCARDTYPE : Get Card TypeReturns the detected card type.  <data> is a pointer to a UINT32.  The following card types are returned.   Atheros AR5211 based card : 5211   Atheros AR5212+ based card : 5212\i WIOCGCHANNEL : Get channel used for AP or IBSS  Returns the channel used to create new IBSSs and APs.  <data> should be a pointer to a UINT32, where the default channel will be placed.  This IOCTL isonly applicable in IBSS and AP modes.\i WIOCSCHANNEL : Set channel used for AP or IBSS Sets the channel used to create new IBSSs and APs.  Allowed values  (for North America) are 1 - 11 for 802.11b and 802.11g modes, and 36, 40, 44,48, 52, 56, 60, 64, 149, 153, 157, 161, 165 for 802.11a mode.  If the defaultchannel is set to an invalid channel the card will be placed in an inoperable state.\i WIOCGWEPAVAIL : Get WEP AvailabilityReturns a boolean value indicating whether or not WEP is available on thiscard. <data> should be a pointer to a UINT32\i WIOCSWEPKEY0 : Set value for WEP KEY 0 Sets the value for KEY0.  <data> is a DOT11_KEY * containing the encryptionkey (and the associated type of key) to be set.  Use the ennumeration type to handle differing key lengths.\i WIOCSWEPKEY1 : Set value for WEP KEY 1   Sets the value for key 1.  See EIOCSWEPKEY0 for description\i WIOCSWEPKEY2 : Set value for WEP KEY 2        Sets the value for key 2.  See EIOCSWEPKEY0 for description\i WIOCSWEPKEY3 : Set value for WEP KEY 3        Sets the value for key 3.  See EIOCSWEPKEY0 for description\i WIOCSWEPDEFAULTKEY : Set WEP default keyChooses which key to use when encryting data for transmission.  <data> is an integer between 0 and 3.\i WEIOCSENCRYPTTYPE : Set currently used encryption typeSets the currently used encryption type.  This can also be used to turn off encryption completely.  <data> is a UINT32 containing one of the following values:    DOT11_ENCRYPT_NONE       0     DOT11_ENCRYPT_WEP40      1    DOT11_ENCRYPT_WEP104     2\i WIOCASTA : Adds a Station to the Access Control ListAdds the station to the access control list.  The effect this has depends onthe setting of WIOCSACLMODE.\i WIOCDSTA : Deletes a Station from the Access Control ListRemoves a station from the access control list\i WIOCSACLMODE       : Set ACL mode Sets the mode of the ACL.  <data> contains the mode, one of	0 = DOT11_AP_ACL_DISABLED - ACL does nothing	1 = DOT11_AP_ACL_ALLOW - Only those stations on the ACL may authenticate	2 = DOT11_AP_ACL_DENY - Those stations on the ACL may NOT authenticate.                              Others may.This IOCTL is only applicable to AP and IBSS modes.\i WIOCGACLMODE : Get ACL modeGets the mode of the ACL.  <Data> is a UINT32 * where the current ACL modewill be placed.  See the reference entry for WIOCSACLMODE for the values.\i WIOCSEXUNENCRYPT : Set unencrypted packet policyThis command sets the policy for handing unencrypted packets when encryption is enabled.  The available policies are:   DOT11_EX_UNENCRYPTED:  Exclude unencrypted packets.  All packets that are                          received in the clear will be dropped when encryption                          is enabled.  *DEFAULT*   DOT11_EX_DOT1X:        Excludes all unencrypted packets except EAPOL types                          which are permitted   DOT11_EX_NONE:         Allows reception of unencrypted packets when                          encryption is specified.\i WIOCGEXUNENCRYPT: Get unencrypted packet policyReturns the currently applied policy for handling unencryted packets when WEPis enabled.  The values returned are the same as those set in WIOCSEXUNENCRYPT\i WIOCGAUTHTYPE : Get authentication protocol Returns the authentication protocol currently in use.  1 = Open System, 2 = Shared Key, 3 = Both (AP only).  This IOCTL is only applicable to ESS and AP mode, since there is no authentication in an IBSS. <data> is a pointer to a UINT32.\i WIOCSAUTHTYPE : Set authentication protocol Sets the currently used authentication protocol.  1=Open System, 2=SharedKey, 3=Both (AP Only)   Note : Shared key cannot be enabled unless WEP is enabled.\i WIOCSUSERAUTHCALLBACK : Regerister user authentication callbackRegisters a callback that will be called whenever the device connects or disconnects from a device. <data> is a function pointer to the function, NULLto disable.  This IOCTL is supported in AP and ESS modes.  The callback shouldhave the following prototype:   void userCallback(int unitNum, int event, UINT8 macAddr[6]);<unitNum> is the unit number of the device calling the callback.<event> is DOT11_CALLBACK_CONNECT or DOT11_CALLBACK_DISCONNECT<macAddr> is the MAC address of the device connecting/disconnecting if knownThis IOCTL is supported in AP and ESS modes.\i WIOCSDOT1XPORTSTATUS: Sets the status of an 802.1X portThis IOCTL should only be called by the 802.1X Authenticator and Supplicantmodules to notify the driver of a status change in the specified port.<data> is a pointer to a structure containing a UINT32 with the status  (0=uncontrolled, 1=closed, 2=open) of the port followed by the MAC address ofthe other end of the port. \i WIOCSBEACONRATE : Sets the AP beacon rateSets the beacon rate to the specified rate in 802.11 time units (1024 microseconds, or approx 1ms).  This only has effect in an IBSS or on a AP.  <data> is a UINT32.\i WIOCGBEACONRATE : Gets the AP beacon rateGets the currently set beacon rate and places it in <data>.  <data> is aUINT32 *.  This IOCTL is only supported in AP or IBSS mode.\i WIOCSCTSRTS : Set CTS/RTSSets the CTS/RTS threshold.  If packets larger than this size are sent, thenthey are protected with a CTS/RTS pair.  The default setting is 2304, whicheffectively disables this feature (MTU==1500 bytes).  <data> is a UINT32.\i WIOCGCTSRTS : Get CTS/RTSReturns the current CTS/RTS threshold.  <data> should be a UINT32 *\i WIOCSSHORTRETRY : Set Short Retry LimitSet the Short Retry limit, indicates the maximum number of transmissionattempts of a frame, with a length less than or equal to dot11RTSThreshold,The default value is 7. <data> is a UINT32.\i WIOCGSHORTRETRY : Get Short Retry LimitReturns the Short Retry limit.  <data> is a UINT32 *  \i WIOCSLONGRETRY : Set Long Retry Limit               Set the Long Retry Limit, indicates the maximum number of transmissionattempts of a frame, with a length greater than dot11RTSThreshold, The default value is 4. <data> is a UINT32  \i WIOCGLONGRETRY : Get Long Retry Limit               Returns the Long retry limit. <data> is a UINT32 *  \i WIOCSFRAGTHRESH : Set Fragmentation thresholdSets the fragmentation threshold.  If packets larger than this threshold aresent, then they are fragmented into smaller packets (of this maximum size).Note that this is 802.11 fragmentation and not IP fragmentation - reassemblyis performed by the receiving MAC.  The default settings is 2304, which effectively disables this feature. (MTU==1500) <data> is a UINT32\i WIOCGFRAGTHRESH : Get Fragmentation thresholdReturns the current CTS/RTS threshold.  <data> should be a UINT32 * \i WIOCSADVSECURITY : Set advanced security optionsEnables two advanced security features - hide SSID and block response to "Unspecified SSID".  The hide SSID feature prevents the AP from broadcastingits SSID in beacon frames.  The "block response to unspecified SSID" preventsthe AP from responding to a probe request with a null SSID.Bit 0 - Hide SSID name in beacon frameBit 1 - Block response to, "Unspecified SSID"Bit 2-15 Reserved (set to 0)\i WIOCGADVSECURITY : Get advanced security optionsReturns the status of the enhanced security features as specified in the reference entry for WIOCSADVSECURITY.  <data> is a UINT32 *.\i WIOCSDTIMRATE : Set DTIM rate               Set the number of beacon intervals between transmission ofBeacons frames containing a TIM element whose DTIM Count field is 0.  The default value is 1 and the maximum value is 10.  <data> is a UINT32. \i WIOCGDTIMRATE : Get DTIM rate              Returns the number of beacon intervals that between transmission ofBeacons frames containing a TIM element whose DTIM Count field is 0.  <data> isa UINT32 *. \i WIOCGSUPPTXRATE    : Get Supported Tx rates           Returns supported transmit data rates.  <data> is a pointer to a DOT11_RATES structure with the length field containing the number of spaces available.\i WIOCGSUPPRXRATE    : Get Supported Rx Rates          Returns supported receive data rates.  <data> is a pointer to a DOT11_RATES structure with the length field containing the number of spaces available.\i WIOCBSSSCAN : Perform BSS scan and wait for resultsThis IOCTL stops the current SME mode and initiates a BSS Scan.  <data> isa pointer to a DOT11_SCAN_REQ structure, which contains the SSID to search forand a pointer to a preallocated array of DOT11_SCAN_RESULTS structures, along with the number of entries in the pre-allocated array. All BSSs (IBSSs or APs)in all channels in the currently set radio modes (see WIOCSRADIOMODE) that match the specified SSID are placed in the pre-allocated array, up to themaximum specified.  The number of results actually written to the array is placed in the <numResults> member of the DOT11_SCAN_REQ structure.  Use an SSID of "" (empty string) to get all APs/IBSSs.  Warning : this is a blocking call that may block for up to twenty seconds depending on the number of channels in the current radio mode and country code.\i WIOCAPAIRWISEKEY : Adds a static pairwise keyThis function is used to set up legacy WEP key mapping.  In this mode, staticWEP is used, but each station known to this station is given its own uniquekey.  The multicast keys, as configured by WIOCSWEPKEYx will be used for stations that do not have a pairwise key, and for multi/broadcast packets.This IOCTL takes a pointer to a filled in DOT11_KEY structure.  The MAC addressof the station must be included, as must the type of the key.  Note that TKIPand AES do not work in legacy WEP key mapping mode.\i WIOCDPAIRWISEKEY : Removes a static pairwise keyThis function is used to remove a static WEP key added by WIOCAPAIRWISEKEY.  <data> is a pointer to the MAC addresses that was used in the key structure.\i WIOCSSECPOL : Set current WPA/RSN security policiesThis routine sets the current WPA/802.11i security policy, which controls whether WPA and/or 802.11i (WPA2) is allowed, as well as whether legacy WEP stations should be accepted (TSN).  <Data> is a UINT32 that contains one or more of the following macros or'd together: DOT11_SECPOL_WPA (2), DOT11_SECPOL_11i (4), DOT11_SECPOL_TSN (1).  A TSN may not be used unless oneof the other modes (WPA, 802.11i) is present.  Setting the security policy to DOT11_SECPOL_NONE (0) prevents the WPA/802.11i module from activating, but does not preclude the useof WEP or legacy-mode 802.1x.\i WIOCGSECPOL : Get current WPA/RSN security policyThis routine returns the current security policies, placed into <data> which is a pointer to a UINT32.  \i WIOCSAUTHPOL : Set current WPA/RSN authentication policyThis routine sets the available authentication policies.  <data> is a UINT32 that contains none or more of DOT11_AUTHPOL_PSK(2), DOT11_AUTHPOL_8021X(1).  The configuration of both policies is a valid choice on both an AP and a station. If both the AP and the station have both policies set, IEEE 802.11i specifies that 802.1X is the preferred mode.  If 802.1X is set as an available policy, it is assumed that the appropriate 802.1X component (802.1X Supplicant for ESS mode, 802.1X Authenticator or AP mode) is properly configured.  This routine has no effect on the operation of the system while the security policyis DOT11_SECPOL_NONE, although the setting is changed and will take effect when a security policy is set.\i WIOCGAUTHPOL : Get current WPA/RSN authentication policyThis IOCTL returns the current authentication policies as set by WIOCSAUTHPOL.The results are returned in the UINT32 that <data> points to.\i WIOCSCIPHPOL : Set current WPA/RSN cipher policyThis IOCTL sets the allowed ciphers.  These are used when negotiating a connection with another station or AP.  <data> is a bitmap consisting of oneor more of the following cipher suites:        DOT11_CIPHPOL_WEP40                1        DOT11_CIPHPOL_WEP104               2        DOT11_CIPHPOL_TKIP                 4        DOT11_CIPHPOL_AES                  8The following restrictions apply to the choice of cipher policies       1. DOT11_CIPHPOL_WEP40 and DOT11_CIPHPOL_WEP104 require that the           security policy include DOT11_SECPOL_TSN       2. DOT11_CIPHPOL_AES requires that the security policy include          DOT11_SECPOL_11i\i WIOCGCIPHPOL : Get current WPA/RSN cipher policyThis IOCTL returns the bitmap of supported cipher suites as set by WIOCSCIPHPOL. <data> is a pointer to a UINT32 into which the results will be placed.\i WIOCSPASSPHRASE : Set WPA/RSN passphrase for pre-shared key modeThis sets the passphrase that will be used to generate the pre-shared key if the current authentication mode is PreShared Key.  <data> is a pointer to a character string containing the passphase, which is 8-63 bytes in length.  This setting will be used preferentially to the direct PSK as set by WIOCSPSK.Use a NULL value of <data> to erase a PSK setting.\i WIOCSPSK : Set WPA/RSN pre-shared keyThis IOCTL directly sets the pre-shared key that will be used for pre-shared key authentication.  <data> is a pointer to a 64 byte array of binary data.\i WIOCSPMK : <Internal> Set WPA/RSN PMK directlyThis internal IOCTL is used by the 802.1X module to set the PMK and trigger thefour-way key exchange.\i WIOCSAUTHCALLBACK : <Internal> Set association callbackThis internal IOCTL is used by the 802.1X module to registe an association callback to notify the 802.1X module of state changes.\i WIOCSDOT1XPORTSTATUS : <Internal> Set 802.1X status of a port (association)This internal IOCTL operates on a KSL record to change the status of a port from allowed to disallowed depending on 802.1X events.\i WIOCSCOUNTRYCODE : Set country codeThis IOCTL sets the current 802.11d country code.  This controls the range of channels and radio modes available to the driver.  This is also the country code that is advertised in AP mode if 802.11d is enabled.  In ESS mode, thestation will not associate to (or even communicator with) an AP that does not advertise this country code. <data> is a UINT32 that contains the country codeas specified in ISO 3166, or specified in dot11Lib.h by the macros DOT11_COUNTRY_xxx.  <data> should be 0to disable 802.11d mode.  \i WIOCGCOUNTRYCODE : Get country codeThis returns the current country code used by the hardware, even if 802.11d isdisabled.  <data> is a pointer to a UINT32 into which the country code will be placed.\i WIOCS80211D : Sets status of 802.11d modeThis IOCTL enables and disables 802.11d mode.  In 802.11d mode, an AP willadvertise it's current country code in beacons and probe responses.  A station

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
三级不卡在线观看| 狠狠色综合色综合网络| 国产福利一区在线观看| 日韩免费高清视频| 午夜a成v人精品| 欧美日韩在线观看一区二区| 国产精品久久精品日日| 国产福利一区二区三区视频| 亚洲综合色丁香婷婷六月图片| 99riav久久精品riav| 国产精品天干天干在观线| 粉嫩aⅴ一区二区三区四区| 日本一区二区三区国色天香| 久久99国内精品| 久久久久久毛片| 国产激情视频一区二区在线观看| 亚洲成人激情自拍| 欧美成人一级视频| 国产馆精品极品| 男女男精品视频| 久久精品免视看| 99免费精品视频| 亚洲成av人片一区二区三区| 国产精品国产三级国产| 久久九九影视网| 欧美成人video| 日韩免费视频一区| 欧美一级在线视频| 国产精品亚洲专一区二区三区| 亚洲欧洲一区二区在线播放| 欧美性xxxxxxxx| 国产久卡久卡久卡久卡视频精品| 午夜视频一区二区| 亚洲国产欧美一区二区三区丁香婷| 日韩欧美一级特黄在线播放| 欧美丝袜第三区| 欧美剧情片在线观看| 国产乱码精品一品二品| 久久99精品国产| 国产精品中文字幕欧美| 国内精品免费在线观看| 国产自产高清不卡| 国产精品夜夜嗨| 福利一区二区在线| 97精品电影院| 91成人看片片| 国产成人亚洲综合a∨婷婷图片| 国产伦精一区二区三区| 亚洲专区一二三| 亚洲一二三四区不卡| 亚洲福利一区二区| 午夜精品福利一区二区三区蜜桃| 亚洲午夜在线观看视频在线| 亚洲一区国产视频| 视频一区在线播放| 美女mm1313爽爽久久久蜜臀| 亚洲日本va在线观看| 26uuu国产日韩综合| 欧美美女一区二区在线观看| 6080日韩午夜伦伦午夜伦| 在线看国产日韩| 91老师片黄在线观看| 国产白丝精品91爽爽久久| 成人动漫一区二区在线| 国产suv一区二区三区88区| bt7086福利一区国产| 欧洲视频一区二区| 5566中文字幕一区二区电影| 欧美tickling挠脚心丨vk| 国产欧美日韩在线| 一区二区三区视频在线看| 久久久久久麻豆| 亚洲激情中文1区| 日韩理论在线观看| 日韩高清国产一区在线| 日韩高清在线不卡| 国产成人一区二区精品非洲| 欧美午夜精品一区二区三区| 欧美成人性战久久| 亚洲欧美综合色| 天天操天天干天天综合网| 成人毛片老司机大片| 国产成人高清视频| 欧美亚洲精品一区| 久久精品综合网| 亚洲国产精品久久久久秋霞影院| 精品一区二区三区香蕉蜜桃| 99v久久综合狠狠综合久久| 4438x成人网最大色成网站| 中文字幕中文字幕在线一区 | 亚洲一区在线看| 精品一区二区三区av| 色久优优欧美色久优优| 久久综合狠狠综合| 亚洲电影在线免费观看| 懂色av中文字幕一区二区三区 | 欧美日韩一区二区三区不卡| 久久婷婷综合激情| 天天影视网天天综合色在线播放| 成人美女视频在线观看18| 欧美一级国产精品| 精品国产乱码久久久久久久| 久久中文字幕电影| 丝袜诱惑亚洲看片| 91在线看国产| 中文字幕欧美激情| 亚洲视频在线一区观看| 精品午夜一区二区三区在线观看| 日本高清免费不卡视频| 中文字幕中文乱码欧美一区二区 | 国产精品你懂的在线| 久久国产精品99久久人人澡| 国产乱子轮精品视频| 在线电影欧美成精品| 亚洲黄色av一区| 成人成人成人在线视频| 久久久不卡影院| 黄色日韩三级电影| 精品伦理精品一区| 欧美aaaaa成人免费观看视频| 日本精品一区二区三区高清| 国产精品污www在线观看| 韩国成人在线视频| 精品国产凹凸成av人网站| 日本亚洲最大的色成网站www| 欧美性xxxxx极品少妇| 亚洲综合色噜噜狠狠| 色婷婷亚洲精品| 欧美一区二区国产| 日本最新不卡在线| 欧美精品三级日韩久久| 亚洲一区二区四区蜜桃| 在线看国产一区| 亚洲综合男人的天堂| 欧美亚洲一区二区在线| 亚洲福利电影网| 欧美日韩高清一区二区| 精品国产三级电影在线观看| 激情欧美一区二区三区在线观看| 精品卡一卡二卡三卡四在线| 精品在线播放午夜| 久久久久久久久久久久久夜| 国产激情视频一区二区三区欧美| 欧美激情中文字幕一区二区| 国产成人在线网站| 亚洲欧洲韩国日本视频| 日本韩国精品在线| 亚洲成人免费电影| 欧美一区二区黄色| 精品亚洲porn| 欧美激情一区二区在线| 91丝袜国产在线播放| 亚洲综合一二区| 欧美成人激情免费网| 国产精品一线二线三线| 国产精品传媒入口麻豆| 欧美亚男人的天堂| 免费观看成人鲁鲁鲁鲁鲁视频| 精品国内二区三区| 99精品视频在线免费观看| 亚洲一区国产视频| 精品sm捆绑视频| voyeur盗摄精品| 亚洲成人av电影| 精品久久国产字幕高潮| 成人激情黄色小说| 日韩专区在线视频| 久久免费精品国产久精品久久久久| aaa欧美日韩| 日韩av电影天堂| 欧美激情在线一区二区三区| 欧美亚男人的天堂| 国产激情视频一区二区在线观看| 亚洲激情五月婷婷| 久久这里只有精品首页| 91福利视频久久久久| 经典三级一区二区| 亚洲精品成人精品456| xnxx国产精品| 欧美制服丝袜第一页| 韩国在线一区二区| 一区二区三区四区亚洲| 精品少妇一区二区三区在线播放| 成人天堂资源www在线| 午夜电影网亚洲视频| 欧美国产激情二区三区| 欧美日韩免费电影| 不卡区在线中文字幕| 日韩精品亚洲专区| 亚洲视频一区在线| 久久只精品国产| 9191久久久久久久久久久| 成人深夜在线观看| 黄色小说综合网站| 天堂成人免费av电影一区| 日韩一区欧美小说| 精品国产在天天线2019| 欧美色倩网站大全免费| 成人高清伦理免费影院在线观看| 久久99久久99|