using System; using System.Runtime.InteropServices; using Vanara.Extensions; using Vanara.InteropServices; namespace Vanara.PInvoke { /// Functions, structures and constants from wlanapi.h. public static partial class WlanApi { // L2 reason codes from l2cmn.h private const uint L2_REASON_CODE_DOT11_AC_BASE = (L2_REASON_CODE_GEN_BASE + L2_REASON_CODE_GROUP_SIZE); private const uint L2_REASON_CODE_DOT11_MSM_BASE = (L2_REASON_CODE_DOT11_AC_BASE + L2_REASON_CODE_GROUP_SIZE); private const uint L2_REASON_CODE_DOT11_SECURITY_BASE = (L2_REASON_CODE_DOT11_MSM_BASE + L2_REASON_CODE_GROUP_SIZE); private const uint L2_REASON_CODE_DOT3_AC_BASE = (L2_REASON_CODE_ONEX_BASE + L2_REASON_CODE_GROUP_SIZE); private const uint L2_REASON_CODE_DOT3_MSM_BASE = (L2_REASON_CODE_DOT3_AC_BASE + L2_REASON_CODE_GROUP_SIZE); private const uint L2_REASON_CODE_GEN_BASE = 0x10000; private const uint L2_REASON_CODE_GROUP_SIZE = 0x10000; private const uint L2_REASON_CODE_IHV_BASE = (L2_REASON_CODE_PROFILE_BASE + L2_REASON_CODE_GROUP_SIZE); private const uint L2_REASON_CODE_ONEX_BASE = (L2_REASON_CODE_DOT11_SECURITY_BASE + L2_REASON_CODE_GROUP_SIZE); private const uint L2_REASON_CODE_PROFILE_BASE = (L2_REASON_CODE_DOT3_MSM_BASE + L2_REASON_CODE_GROUP_SIZE); private const uint L2_REASON_CODE_RESERVED_BASE = (L2_REASON_CODE_WIMAX_BASE + L2_REASON_CODE_GROUP_SIZE); private const uint L2_REASON_CODE_SUCCESS = 0; private const uint L2_REASON_CODE_UNKNOWN = (L2_REASON_CODE_GEN_BASE + 1); private const uint L2_REASON_CODE_WIMAX_BASE = (L2_REASON_CODE_IHV_BASE + L2_REASON_CODE_GROUP_SIZE); /// The DOT11_AUTH_ALGORITHM enumerated type defines a wireless LAN authentication algorithm. // https://docs.microsoft.com/en-us/windows/win32/nativewifi/dot11-auth-algorithm typedef enum _DOT11_AUTH_ALGORITHM { // DOT11_AUTH_ALGO_80211_OPEN = 1, DOT11_AUTH_ALGO_80211_SHARED_KEY = 2, DOT11_AUTH_ALGO_WPA = 3, DOT11_AUTH_ALGO_WPA_PSK = 4, // DOT11_AUTH_ALGO_WPA_NONE = 5, DOT11_AUTH_ALGO_RSNA = 6, DOT11_AUTH_ALGO_RSNA_PSK = 7, DOT11_AUTH_ALGO_IHV_START = 0x80000000, // DOT11_AUTH_ALGO_IHV_END = 0xffffffff } DOT11_AUTH_ALGORITHM, *PDOT11_AUTH_ALGORITHM; [PInvokeData("windot11.h", MSDNShortId = "ac4097df-46dc-4c64-b72a-7cb9dce8b418")] // public enum DOT11_AUTH_ALGORITHM{DOT11_AUTH_ALGO_80211_OPEN = 1, DOT11_AUTH_ALGO_80211_SHARED_KEY = 2, DOT11_AUTH_ALGO_WPA = 3, // DOT11_AUTH_ALGO_WPA_PSK = 4, DOT11_AUTH_ALGO_WPA_NONE = 5, DOT11_AUTH_ALGO_RSNA = 6, DOT11_AUTH_ALGO_RSNA_PSK = 7, // DOT11_AUTH_ALGO_IHV_START = 0x80000000, DOT11_AUTH_ALGO_IHV_END = 0xffffffff, DOT11_AUTH_ALGORITHM, *PDOT11_AUTH_ALGORITHM} public enum DOT11_AUTH_ALGORITHM : uint { /// Specifies an IEEE 802.11 Open System authentication algorithm. DOT11_AUTH_ALGO_80211_OPEN = 1, /// /// Specifies an 802.11 Shared Key authentication algorithm that requires the use of a pre-shared Wired Equivalent Privacy (WEP) /// key for the 802.11 authentication. /// DOT11_AUTH_ALGO_80211_SHARED_KEY, /// /// /// Specifies a Wi-Fi Protected Access (WPA) algorithm. IEEE 802.1X port authentication is performed by the supplicant, /// authenticator, and authentication server. Cipher keys are dynamically derived through the authentication process. /// /// This algorithm is valid only for BSS types of dot11_BSS_type_infrastructure. /// /// When the WPA algorithm is enabled, the 802.11 station will associate only with an access point whose beacon or probe /// responses contain the authentication suite of type 1 (802.1X) within the WPA information element (IE). /// /// DOT11_AUTH_ALGO_WPA, /// /// /// Specifies a WPA algorithm that uses preshared keys (PSK). IEEE 802.1X port authentication is performed by the supplicant and /// authenticator. Cipher keys are dynamically derived through a preshared key that is used on both the supplicant and authenticator. /// /// This algorithm is valid only for BSS types of dot11_BSS_type_infrastructure. /// /// When the WPA PSK algorithm is enabled, the 802.11 station will associate only with an access point whose beacon or probe /// responses contain the authentication suite of type 2 (preshared key) within the WPA IE. /// /// DOT11_AUTH_ALGO_WPA_PSK, /// This value is not supported. DOT11_AUTH_ALGO_WPA_NONE, /// /// /// Specifies an 802.11i Robust Security Network Association (RSNA) algorithm. WPA2 is one such algorithm. IEEE 802.1X port /// authentication is performed by the supplicant, authenticator, and authentication server. Cipher keys are dynamically derived /// through the authentication process. /// /// This algorithm is valid only for BSS types of dot11_BSS_type_infrastructure. /// /// When the RSNA algorithm is enabled, the 802.11 station will associate only with an access point whose beacon or probe /// responses contain the authentication suite of type 1 (802.1X) within the RSN IE. /// /// DOT11_AUTH_ALGO_RSNA, /// /// /// Specifies an 802.11i RSNA algorithm that uses PSK. IEEE 802.1X port authentication is performed by the supplicant and /// authenticator. Cipher keys are dynamically derived through a preshared key that is used on both the supplicant and authenticator. /// /// This algorithm is valid only for BSS types of dot11_BSS_type_infrastructure. /// /// When the RSNA PSK algorithm is enabled, the 802.11 station will associate only with an access point whose beacon or probe /// responses contain the authentication suite of type 2(preshared key) within the RSN IE. /// /// DOT11_AUTH_ALGO_RSNA_PSK, /// /// Indicates the start of the range that specifies proprietary authentication algorithms that are developed by an IHV. /// /// The DOT11_AUTH_ALGO_IHV_START enumerator is valid only when the miniport driver is operating in Extensible Station /// (ExtSTA) mode. /// /// DOT11_AUTH_ALGO_IHV_START = 0x80000000, /// /// Indicates the end of the range that specifies proprietary authentication algorithms that are developed by an IHV. /// The DOT11_AUTH_ALGO_IHV_END enumerator is valid only when the miniport driver is operating in ExtSTA mode. /// DOT11_AUTH_ALGO_IHV_END = 0xffffffff, } /// The DOT11_BSS_TYPE enumerated type defines a basic service set (BSS) network type. // https://docs.microsoft.com/en-us/windows/win32/nativewifi/dot11-bss-type typedef enum _DOT11_BSS_TYPE { // dot11_BSS_type_infrastructure = 1, dot11_BSS_type_independent = 2, dot11_BSS_type_any = 3 } DOT11_BSS_TYPE, *PDOT11_BSS_TYPE; [PInvokeData("windot11.h", MSDNShortId = "13d57339-655e-4978-974e-e7b12a83d18a")] public enum DOT11_BSS_TYPE { /// Specifies an infrastructure BSS network. dot11_BSS_type_infrastructure = 1, /// Specifies an independent BSS (IBSS) network. dot11_BSS_type_independent, /// Specifies either infrastructure or IBSS network. dot11_BSS_type_any, } /// The DOT11_CIPHER_ALGORITHM enumerated type defines a cipher algorithm for data encryption and decryption. // https://docs.microsoft.com/en-us/windows/win32/nativewifi/dot11-cipher-algorithm typedef enum _DOT11_CIPHER_ALGORITHM { // DOT11_CIPHER_ALGO_NONE = 0x00, DOT11_CIPHER_ALGO_WEP40 = 0x01, DOT11_CIPHER_ALGO_TKIP = 0x02, DOT11_CIPHER_ALGO_CCMP = 0x04, // DOT11_CIPHER_ALGO_WEP104 = 0x05, DOT11_CIPHER_ALGO_WPA_USE_GROUP = 0x100, DOT11_CIPHER_ALGO_RSN_USE_GROUP = 0x100, // DOT11_CIPHER_ALGO_WEP = 0x101, DOT11_CIPHER_ALGO_IHV_START = 0x80000000, DOT11_CIPHER_ALGO_IHV_END = 0xffffffff } // DOT11_CIPHER_ALGORITHM, *PDOT11_CIPHER_ALGORITHM; [PInvokeData("windot11.h", MSDNShortId = "6b634d76-a159-438e-8fc6-5f05b326ed68")] public enum DOT11_CIPHER_ALGORITHM : uint { /// Specifies that no cipher algorithm is enabled or supported. DOT11_CIPHER_ALGO_NONE = 0x00, /// /// Specifies a Wired Equivalent Privacy (WEP) algorithm, which is the RC4-based algorithm that is specified in the 802.11-1999 /// standard. This enumerator specifies the WEP cipher algorithm with a 40-bit cipher key. /// DOT11_CIPHER_ALGO_WEP40 = 0x01, /// /// Specifies a Temporal Key Integrity Protocol (TKIP) algorithm, which is the RC4-based cipher suite that is based on the /// algorithms that are defined in the WPA specification and IEEE 802.11i-2004 standard. This cipher also uses the Michael /// Message Integrity Code (MIC) algorithm for forgery protection. /// DOT11_CIPHER_ALGO_TKIP = 0x02, /// /// Specifies an AES-CCMP algorithm, as specified in the IEEE 802.11i-2004 standard and RFC 3610. Advanced Encryption Standard /// (AES) is the encryption algorithm defined in FIPS PUB 197. /// DOT11_CIPHER_ALGO_CCMP = 0x04, /// Specifies a WEP cipher algorithm with a 104-bit cipher key. DOT11_CIPHER_ALGO_WEP104 = 0x05, /// /// Specifies a Wi-Fi Protected Access (WPA) Use Group Key cipher suite. For more information about the Use Group Key cipher /// suite, refer to Clause 7.3.2.25.1 of the IEEE 802.11i-2004 standard. /// DOT11_CIPHER_ALGO_WPA_USE_GROUP = 0x100, /// /// Specifies a Robust Security Network (RSN) Use Group Key cipher suite. For more information about the Use Group Key cipher /// suite, refer to Clause 7.3.2.25.1 of the IEEE 802.11i-2004 standard. /// DOT11_CIPHER_ALGO_RSN_USE_GROUP = 0x100, /// Specifies a WEP cipher algorithm with a cipher key of any length. DOT11_CIPHER_ALGO_WEP = 0x101, /// /// Specifies the start of the range that is used to define proprietary cipher algorithms that are developed by an independent /// hardware vendor (IHV). /// DOT11_CIPHER_ALGO_IHV_START = 0x80000000, /// /// Specifies the end of the range that is used to define proprietary cipher algorithms that are developed by an IHV. /// DOT11_CIPHER_ALGO_IHV_END = 0xffffffff, } /// A bitmask of the miniport driver's supported operation modes. [PInvokeData("windot11.h", MSDNShortId = "e20eb9a3-5824-48ee-b13e-b0252bbf495e")] [Flags] public enum DOT11_OPERATION_MODE : uint { /// DOT11_OPERATION_MODE_UNKNOWN = 0x00000000, /// DOT11_OPERATION_MODE_STATION = 0x00000001, /// DOT11_OPERATION_MODE_AP = 0x00000002, /// Specifies that the miniport driver supports the Extensible Station (ExtSTA) operation mode. DOT11_OPERATION_MODE_EXTENSIBLE_STATION = 0x00000004, /// Specifies that the miniport driver supports the Extensible Access Point (ExtAP) operation mode. DOT11_OPERATION_MODE_EXTENSIBLE_AP = 0x00000008, /// DOT11_OPERATION_MODE_WFD_DEVICE = 0x00000010, /// DOT11_OPERATION_MODE_WFD_GROUP_OWNER = 0x00000020, /// DOT11_OPERATION_MODE_WFD_CLIENT = 0x00000040, /// DOT11_OPERATION_MODE_MANUFACTURING = 0x40000000, /// Specifies that the miniport driver supports the Network Monitor (NetMon) operation mode. DOT11_OPERATION_MODE_NETWORK_MONITOR = 0x80000000, } /// The DOT11_PHY_TYPE enumeration defines an 802.11 PHY and media type. /// /// An IHV can assign a value for its proprietary PHY types from dot11_phy_type_IHV_start through /// dot11_phy_type_IHV_end. The IHV must assign a unique number from this range for each of its proprietary PHY types. /// // https://docs.microsoft.com/en-us/windows/win32/nativewifi/dot11-phy-type typedef enum _DOT11_PHY_TYPE { dot11_phy_type_unknown = // 0, dot11_phy_type_any = 0, dot11_phy_type_fhss = 1, dot11_phy_type_dsss = 2, dot11_phy_type_irbaseband = 3, dot11_phy_type_ofdm = // 4, dot11_phy_type_hrdsss = 5, dot11_phy_type_erp = 6, dot11_phy_type_ht = 7, dot11_phy_type_vht = 8, dot11_phy_type_IHV_start = // 0x80000000, dot11_phy_type_IHV_end = 0xffffffff } DOT11_PHY_TYPE, *PDOT11_PHY_TYPE; [PInvokeData("windot11.h", MSDNShortId = "f3804e57-c633-4288-9749-2b267b1353ae")] public enum DOT11_PHY_TYPE : uint { /// Specifies an unknown or uninitialized PHY type. dot11_phy_type_unknown = 0, /// Specifies any PHY type. dot11_phy_type_any = 0, /// /// Specifies a frequency-hopping spread-spectrum (FHSS) PHY. Bluetooth devices can use FHSS or an adaptation of FHSS. /// dot11_phy_type_fhss = 1, /// Specifies a direct sequence spread spectrum (DSSS) PHY type. dot11_phy_type_dsss, /// Specifies an infrared (IR) baseband PHY type. dot11_phy_type_irbaseband, /// Specifies an orthogonal frequency division multiplexing (OFDM) PHY type. 802.11a devices can use OFDM. dot11_phy_type_ofdm, /// Specifies a high-rate DSSS (HRDSSS) PHY type. dot11_phy_type_hrdsss, /// Specifies an extended rate PHY type (ERP). 802.11g devices can use ERP. dot11_phy_type_erp, /// Specifies the 802.11n PHY type. dot11_phy_type_ht, /// /// Specifies the 802.11ac PHY type. This is the very high throughput PHY type specified in IEEE 802.11ac. /// This value is supported on Windows 8.1, Windows Server 2012 R2, and later. /// dot11_phy_type_vht, /// /// Specifies the start of the range that is used to define PHY types that are developed by an independent hardware vendor (IHV). /// dot11_phy_type_IHV_start = 0x80000000, /// /// Specifies the start of the range that is used to define PHY types that are developed by an independent hardware vendor (IHV). /// dot11_phy_type_IHV_end = 0xffffffff, } /// The DOT11_RADIO_STATE enumeration specifies an 802.11 radio state. // https://docs.microsoft.com/en-us/windows/win32/api/wlanapi/ne-wlanapi-dot11_radio_state~r1 typedef enum _DOT11_RADIO_STATE { // dot11_radio_state_unknown, dot11_radio_state_on, dot11_radio_state_off } DOT11_RADIO_STATE, *PDOT11_RADIO_STATE; [PInvokeData("wlanapi.h")] public enum DOT11_RADIO_STATE { /// dot11_radio_state_unknown, /// dot11_radio_state_on, /// dot11_radio_state_off } /// Specifies the active tab when the wireless profile user interface dialog box appears. // https://docs.microsoft.com/en-us/windows/win32/api/wlanapi/ne-wlanapi-wl_display_pages typedef enum _WL_DISPLAY_PAGES { // WLConnectionPage, WLSecurityPage, WLAdvPage } WL_DISPLAY_PAGES, *PWL_DISPLAY_PAGES; [PInvokeData("wlanapi.h", MSDNShortId = "040433b7-9204-4462-a8fd-7b65bcd1880b")] public enum WL_DISPLAY_PAGES { /// Displays the Connection tab. WLConnectionPage, /// Displays the Security tab. WLSecurityPage, /// WLAdvPage, } /// The access mask of the object. [PInvokeData("wlanapi.h", MSDNShortId = "5e14a70c-c049-4cd1-8675-2b01ed11463f")] public enum WLAN_ACCCESS : uint { /// The caller can view the object's permissions. WLAN_READ_ACCESS = ACCESS_MASK.STANDARD_RIGHTS_READ | 1U /*FILE_READ_DATA*/, /// /// The caller can read from and execute the object. WLAN_EXECUTE_ACCESS has the same value as the bitwise OR combination /// WLAN_READ_ACCESS | WLAN_EXECUTE_ACCESS. /// WLAN_EXECUTE_ACCESS = WLAN_READ_ACCESS | ACCESS_MASK.STANDARD_RIGHTS_EXECUTE | 32 /*FILE_EXECUTE*/, /// /// The caller can read from, execute, and write to the object. WLAN_WRITE_ACCESS has the same value as the bitwise OR /// combination WLAN_READ_ACCESS | WLAN_EXECUTE_ACCESS | WLAN_WRITE_ACCESS. /// WLAN_WRITE_ACCESS = WLAN_READ_ACCESS | WLAN_EXECUTE_ACCESS | ACCESS_MASK.STANDARD_RIGHTS_WRITE | 2 /*FILE_WRITE_DATA*/ | ACCESS_MASK.DELETE | ACCESS_MASK.WRITE_DAC, } /// The WLAN_ADHOC_NETWORK_STATE enumerated type specifies the connection state of an ad hoc network. // https://docs.microsoft.com/en-us/windows/win32/api/wlanapi/ne-wlanapi-wlan_adhoc_network_state~r1 typedef enum // _WLAN_ADHOC_NETWORK_STATE { wlan_adhoc_network_state_formed, wlan_adhoc_network_state_connected } WLAN_ADHOC_NETWORK_STATE, *PWLAN_ADHOC_NETWORK_STATE; [PInvokeData("wlanapi.h")] public enum WLAN_ADHOC_NETWORK_STATE { /// wlan_adhoc_network_state_formed = 0, /// wlan_adhoc_network_state_connected } /// The WLAN_AUTOCONF_OPCODE enumerated type specifies an automatic configuration parameter. /// /// /// The WLAN_AUTOCONF_OPCODE enumerated type is used by the Auto Configuration Module (ACM), the wireless configuration /// component supported on Windows Vista and later. /// /// /// The WLAN_AUTOCONF_OPCODE specifies the possible values for the OpCode parameter passed to the /// WlanQueryAutoConfigParameter and WlanSetAutoConfigParameter functions. /// /// // https://docs.microsoft.com/en-us/windows/win32/api/wlanapi/ne-wlanapi-wlan_autoconf_opcode~r1 typedef enum _WLAN_AUTOCONF_OPCODE // { wlan_autoconf_opcode_start, wlan_autoconf_opcode_show_denied_networks, wlan_autoconf_opcode_power_setting, // wlan_autoconf_opcode_only_use_gp_profiles_for_allowed_networks, wlan_autoconf_opcode_allow_explicit_creds, // wlan_autoconf_opcode_block_period, wlan_autoconf_opcode_allow_virtual_station_extensibility, wlan_autoconf_opcode_end } // WLAN_AUTOCONF_OPCODE, *PWLAN_AUTOCONF_OPCODE; [PInvokeData("wlanapi.h")] public enum WLAN_AUTOCONF_OPCODE { /// wlan_autoconf_opcode_start, /// [CorrespondingType(typeof(BOOL))] wlan_autoconf_opcode_show_denied_networks, /// [CorrespondingType(typeof(WLAN_POWER_SETTING), CorrespondingAction.Get)] wlan_autoconf_opcode_power_setting, /// [CorrespondingType(typeof(BOOL), CorrespondingAction.Get)] wlan_autoconf_opcode_only_use_gp_profiles_for_allowed_networks, /// [CorrespondingType(typeof(BOOL))] wlan_autoconf_opcode_allow_explicit_creds, /// [CorrespondingType(typeof(uint))] wlan_autoconf_opcode_block_period, /// [CorrespondingType(typeof(BOOL))] wlan_autoconf_opcode_allow_virtual_station_extensibility, /// wlan_autoconf_opcode_end } /// Available network flags. [PInvokeData("wlanapi.h", MSDNShortId = "82883cea-515b-426d-9961-c144ce99b3db")] [Flags] public enum WLAN_AVAILABLE_NETWORK_FLAGS { /// This network is currently connected. WLAN_AVAILABLE_NETWORK_CONNECTED = 0x00000001, /// There is a profile for this network. WLAN_AVAILABLE_NETWORK_HAS_PROFILE = 0x00000002, /// WLAN_AVAILABLE_NETWORK_CONSOLE_USER_PROFILE = 0x00000004, /// WLAN_AVAILABLE_NETWORK_INTERWORKING_SUPPORTED = 0x00000008, /// WLAN_AVAILABLE_NETWORK_HOTSPOT2_ENABLED = 0x00000010, /// WLAN_AVAILABLE_NETWORK_ANQP_SUPPORTED = 0x00000020, /// WLAN_AVAILABLE_NETWORK_HOTSPOT2_DOMAIN = 0x00000040, /// WLAN_AVAILABLE_NETWORK_HOTSPOT2_ROAMING = 0x00000080, /// WLAN_AVAILABLE_NETWORK_AUTO_CONNECT_FAILED = 0x00000100, } /// Flags used to specify the connection parameters. [PInvokeData("wlanapi.h", MSDNShortId = "e0321447-b89a-4f4e-929e-eb6db76f7283")] [Flags] public enum WLAN_CONNECTION_FLAGS { /// /// Connect to the destination network even if the destination is a hidden network. A hidden network does not broadcast its /// SSID. Do not use this flag if the destination network is an ad-hoc network.If the profile specified by strProfile is not /// NULL, then this flag is ignored and the nonBroadcast profile element determines whether to connect to a hidden network. /// WLAN_CONNECTION_HIDDEN_NETWORK = 0x00000001, /// /// Do not form an ad-hoc network. Only join an ad-hoc network if the network already exists. Do not use this flag if the /// destination network is an infrastructure network. /// WLAN_CONNECTION_ADHOC_JOIN_ONLY = 0x00000002, /// /// Ignore the privacy bit when connecting to the network. Ignoring the privacy bit has the effect of ignoring whether packets /// are encrypted and ignoring the method of encryption used. Only use this flag when connecting to an infrastructure network /// using a temporary profile. /// WLAN_CONNECTION_IGNORE_PRIVACY_BIT = 0x00000004, /// /// Exempt EAPOL traffic from encryption and decryption. This flag is used when an application must send EAPOL traffic over an /// infrastructure network that uses Open authentication and WEP encryption. This flag must not be used to connect to networks /// that require 802.1X authentication. This flag is only valid when wlanConnectionMode is set to /// wlan_connection_mode_temporary_profile. Avoid using this flag whenever possible. /// WLAN_CONNECTION_EAPOL_PASSTHROUGH = 0x00000008, /// /// Automatically persist discovery profile on successful connection completion. This flag is only valid for /// wlan_connection_mode_discovery_secure or wlan_connection_mode_discovery_unsecure. The profile will be saved as an all user /// profile, with the name generated from the SSID using WlanUtf8SsidToDisplayName. If there is already a profile with the same /// name, a number will be appended to the end of the profile name. The profile will be saved with manual connection mode, /// unless WLAN_CONNECTION_PERSIST_DISCOVERY_PROFILE_CONNECTION_MODE_AUTO is also specified. /// WLAN_CONNECTION_PERSIST_DISCOVERY_PROFILE = 0x00000010, /// /// To be used in conjunction with WLAN_CONNECTION_PERSIST_DISCOVERY_PROFILE. The discovery profile will be persisted with /// automatic connection mode. /// WLAN_CONNECTION_PERSIST_DISCOVERY_PROFILE_CONNECTION_MODE_AUTO = 0x00000020, /// /// To be used in conjunction with WLAN_CONNECTION_PERSIST_DISCOVERY_PROFILE. The discovery profile will be persisted and /// attempt to overwrite an existing profile with the same name. /// WLAN_CONNECTION_PERSIST_DISCOVERY_PROFILE_OVERWRITE_EXISTING = 0x00000040, } /// /// The WLAN_CONNECTION_MODE enumerated type defines the mode of connection. Windows XP with SP3 and Wireless LAN API for /// Windows XP with SP2: Only the wlan_connection_mode_profile value is supported. /// // https://docs.microsoft.com/en-us/windows/win32/api/wlanapi/ne-wlanapi-wlan_connection_mode typedef enum _WLAN_CONNECTION_MODE { // wlan_connection_mode_profile, wlan_connection_mode_temporary_profile, wlan_connection_mode_discovery_secure, // wlan_connection_mode_discovery_unsecure, wlan_connection_mode_auto, wlan_connection_mode_invalid } WLAN_CONNECTION_MODE, *PWLAN_CONNECTION_MODE; [PInvokeData("wlanapi.h", MSDNShortId = "d62e863f-2aa8-49b1-9e27-8d9d053026f0")] public enum WLAN_CONNECTION_MODE { /// A profile will be used to make the connection. wlan_connection_mode_profile, /// A temporary profile will be used to make the connection. wlan_connection_mode_temporary_profile, /// Secure discovery will be used to make the connection. wlan_connection_mode_discovery_secure, /// Unsecure discovery will be used to make the connection. wlan_connection_mode_discovery_unsecure, /// The connection is initiated by the wireless service automatically using a persistent profile. wlan_connection_mode_auto, /// Not used. wlan_connection_mode_invalid, } /// /// A set of flags that provide additional information for the network connection. /// [PInvokeData("wlanapi.h", MSDNShortId = "005af5ef-994d-425a-be4b-54567a733fb3")] [Flags] public enum WLAN_CONNECTION_NOTIFICATION { /// Indicates that an adhoc network is formed. WLAN_CONNECTION_NOTIFICATION_ADHOC_NETWORK_FORMED = 1, /// /// Indicates that the connection uses a per-user profile owned by the console user. Non-console users will not be able to see /// the profile in their profile list. /// WLAN_CONNECTION_NOTIFICATION_CONSOLE_USER_PROFILE = 4 } /// The WLAN_FILTER_LIST_TYPE enumerated type indicates types of filter lists. // https://docs.microsoft.com/en-us/windows/win32/api/wlanapi/ne-wlanapi-wlan_filter_list_type typedef enum _WLAN_FILTER_LIST_TYPE { // wlan_filter_list_type_gp_permit, wlan_filter_list_type_gp_deny, wlan_filter_list_type_user_permit, // wlan_filter_list_type_user_deny } WLAN_FILTER_LIST_TYPE, *PWLAN_FILTER_LIST_TYPE; [PInvokeData("wlanapi.h", MSDNShortId = "b53b9a6c-6453-4828-9662-589a1b99614c")] public enum WLAN_FILTER_LIST_TYPE { /// Group policy permit list. wlan_filter_list_type_gp_permit, /// Group policy deny list. wlan_filter_list_type_gp_deny, /// User permit list. wlan_filter_list_type_user_permit, /// User deny list. wlan_filter_list_type_user_deny, } /// /// The WLAN_HOSTED_NETWORK_NOTIFICATION_CODE enumerated type specifies the possible values of the NotificationCode parameter /// for received notifications on the wireless Hosted Network. /// /// /// /// The WLAN_HOSTED_NETWORK_NOTIFICATION_CODE enumerated type is an extension to native wireless APIs added to support the /// wireless Hosted Network on Windows 7 and on Windows Server 2008 R2 with the Wireless LAN Service installed. /// /// /// The WLAN_HOSTED_NETWORK_NOTIFICATION_CODE specifies the possible values for the NotificationCode parameter for received /// notifications when the NotificationSource parameter is WLAN_NOTIFICATION_SOURCE_HNWK on the wireless Hosted Network. /// /// /// The starting value for the WLAN_HOSTED_NETWORK_NOTIFICATION_CODE enumeration is defined as L2_NOTIFICATION_CODE_V2_BEGIN, /// which is defined in the l2cmn.h header file. Note that the l2cmn.h header is automatically included by the wlanapi.h header file. /// /// /// The WlanRegisterNotification function is used by an application to register and unregister notifications on all wireless /// interfaces. When registering for notifications, an application must provide a callback function pointed to by the funcCallback /// parameter passed to the WlanRegisterNotification function. The prototype for this callback function is the /// WLAN_NOTIFICATION_CALLBACK. This callback function will receive notifications that have been registered in the dwNotifSource /// parameter passed to the WlanRegisterNotification function. /// /// /// The callback function is called with a pointer to a WLAN_NOTIFICATION_DATA structure as the first parameter that contains /// detailed information on the notification. The callback function also receives a second parameter that contains a pointer to the /// client context passed in the pCallbackContext parameter to the WlanRegisterNotification function. This client context can be a /// NULL pointer if that is what was passed to the WlanRegisterNotification function. /// /// /// If the NotificationSource member of the WLAN_NOTIFICATION_DATA structure received by the callback function is /// WLAN_NOTIFICATION_SOURCE_HNWK, then the received notification is a wireless Hosted Network notification. The /// NotificationCode member of the WLAN_NOTIFICATION_DATA structure passed to the WLAN_NOTIFICATION_CALLBACK function /// determines the interpretation of the pData member of WLAN_NOTIFICATION_DATA structure. /// /// /// /// NotificationCode /// Description /// /// /// wlan_hosted_network_state_change /// /// The pData member of WLAN_NOTIFICATION_DATA structure should be cast to a pointer to a WLAN_HOSTED_NETWORK_STATE_CHANGE structure /// and dwDataSize member would be at least as large as sizeof(WLAN_HOSTED_NETWORK_STATE_CHANGE). /// /// /// /// wlan_hosted_network_peer_state_change /// /// the pData member of WLAN_NOTIFICATION_DATA structure should be cast to a pointer to a WLAN_HOSTED_NETWORK_DATA_PEER_STATE_CHANGE /// structure and dwDataSize member would be at least as large as sizeof(WLAN_HOSTED_NETWORK_DATA_PEER_STATE_CHANGE). /// /// /// /// wlan_hosted_network_radio_state_change /// /// the pData member of WLAN_NOTIFICATION_DATA structure should be cast to a pointer to a WLAN_HOSTED_NETWORK_RADIO_STATE structure /// and dwDataSize member would be at least as large as sizeof(WLAN_HOSTED_NETWORK_RADIO_STATE ). /// /// /// /// // https://docs.microsoft.com/en-us/windows/win32/api/wlanapi/ne-wlanapi-wlan_hosted_network_notification_code typedef enum // _WLAN_HOSTED_NETWORK_NOTIFICATION_CODE { wlan_hosted_network_state_change, wlan_hosted_network_peer_state_change, // wlan_hosted_network_radio_state_change } WLAN_HOSTED_NETWORK_NOTIFICATION_CODE, *PWLAN_HOSTED_NETWORK_NOTIFICATION_CODE; [PInvokeData("wlanapi.h", MSDNShortId = "f01e4a42-3378-4ceb-b23b-5deb78fb18ca")] public enum WLAN_HOSTED_NETWORK_NOTIFICATION_CODE : uint { /// /// The wireless Hosted Network state has changed. /// The pData member points to a WLAN_HOSTED_NETWORK_STATE_CHANGE structure that identifies the state change. /// [CorrespondingType(typeof(WLAN_HOSTED_NETWORK_STATE_CHANGE))] wlan_hosted_network_state_change = 0x00001000, /// /// The wireless Hosted Network peer state has changed. /// The pData member points to a WLAN_HOSTED_NETWORK_DATA_PEER_STATE_CHANGE structure that identifies the peer state change. /// [CorrespondingType(typeof(WLAN_HOSTED_NETWORK_DATA_PEER_STATE_CHANGE))] wlan_hosted_network_peer_state_change = 0x00001001, /// /// The wireless Hosted Network radio state has changed. /// The pData member points to a WLAN_HOSTED_NETWORK_RADIO_STATE structure that identifies the radio state change. /// [CorrespondingType(typeof(WLAN_HOSTED_NETWORK_RADIO_STATE))] wlan_hosted_network_radio_state_change = 0x00001002, } /// /// The WLAN_HOSTED_NETWORK_OPCODE enumerated type specifies the possible values of the operation code for the properties to /// query or set on the wireless Hosted Network. /// /// /// /// The WLAN_HOSTED_NETWORK_OPCODE enumerated type is an extension to native wireless APIs added to support the wireless /// Hosted Network on Windows 7 and later. /// /// /// The WLAN_HOSTED_NETWORK_OPCODE specifies the possible values of the operation code for the properties to query or set on /// the wireless Hosted Network. /// /// // https://docs.microsoft.com/en-us/windows/win32/api/wlanapi/ne-wlanapi-wlan_hosted_network_opcode typedef enum // _WLAN_HOSTED_NETWORK_OPCODE { wlan_hosted_network_opcode_connection_settings, wlan_hosted_network_opcode_security_settings, // wlan_hosted_network_opcode_station_profile, wlan_hosted_network_opcode_enable } WLAN_HOSTED_NETWORK_OPCODE, *PWLAN_HOSTED_NETWORK_OPCODE; [PInvokeData("wlanapi.h", MSDNShortId = "e4acd7ad-c8f2-4ece-8d27-ced879baa9e7")] public enum WLAN_HOSTED_NETWORK_OPCODE { /// The opcode used to query or set the wireless Hosted Network connection settings. [CorrespondingType(typeof(WLAN_HOSTED_NETWORK_CONNECTION_SETTINGS))] wlan_hosted_network_opcode_connection_settings, /// The opcode used to query the wireless Hosted Network security settings. [CorrespondingType(typeof(WLAN_HOSTED_NETWORK_SECURITY_SETTINGS), CorrespondingAction.Get)] wlan_hosted_network_opcode_security_settings, /// The opcode used to query the wireless Hosted Network station profile. [CorrespondingType(typeof(string), CorrespondingAction.Get)] wlan_hosted_network_opcode_station_profile, /// The opcode used to query or set the wireless Hosted Network enabled flag. [CorrespondingType(typeof(BOOL))] wlan_hosted_network_opcode_enable, } /// /// The WLAN_HOSTED_NETWORK_PEER_AUTH_STATE enumerated type specifies the possible values for the authentication state of a /// peer on the wireless Hosted Network. /// /// /// The WLAN_HOSTED_NETWORK_PEER_AUTH_STATE enumerated type is an extension to native wireless APIs added to support the /// wireless Hosted Network on Windows 7 and later. /// // https://docs.microsoft.com/en-us/windows/win32/api/wlanapi/ne-wlanapi-wlan_hosted_network_peer_auth_state typedef enum // _WLAN_HOSTED_NETWORK_PEER_AUTH_STATE { wlan_hosted_network_peer_state_invalid, wlan_hosted_network_peer_state_authenticated } // WLAN_HOSTED_NETWORK_PEER_AUTH_STATE, *PWLAN_HOSTED_NETWORK_PEER_AUTH_STATE; [PInvokeData("wlanapi.h", MSDNShortId = "9953ad0c-eafc-49ad-b9a3-09fbfba805e5")] public enum WLAN_HOSTED_NETWORK_PEER_AUTH_STATE { /// An invalid peer state. wlan_hosted_network_peer_state_invalid, /// The peer is authenticated. wlan_hosted_network_peer_state_authenticated, } /// /// The WLAN_HOSTED_NETWORK_REASON enumerated type specifies the possible values for the result of a wireless Hosted Network /// function call. /// /// /// /// The WLAN_HOSTED_NETWORK_REASON enumerated type is an extension to native wireless APIs added to support the wireless /// Hosted Network on Windows 7 and later. /// /// /// The WLAN_HOSTED_NETWORK_REASON enumerates the possible reasons that a wireless Hosted Network function call failed or the /// reasons why a particular wireless Hosted Network notification was generated. /// /// /// On Windows 7 and later, the operating system installs a virtual device if a Hosted Network capable wireless adapter is present /// on the machine. This virtual device normally shows up in the “Network Connections Folder” as ‘Wireless Network Connection 2’ /// with a Device Name of ‘Microsoft Virtual WiFi Miniport adapter’ if the computer has a single wireless network adapter. This /// virtual device is used exclusively for performing software access point (SoftAP) connections and is not present in the list /// returned by the WlanEnumInterfaces function. The lifetime of this virtual device is tied to the physical wireless adapter. If /// the physical wireless adapter is disabled, this virtual device will be removed as well. /// /// // https://docs.microsoft.com/en-us/windows/win32/api/wlanapi/ne-wlanapi-wlan_hosted_network_reason typedef enum // _WLAN_HOSTED_NETWORK_REASON { wlan_hosted_network_reason_success, wlan_hosted_network_reason_unspecified, // wlan_hosted_network_reason_bad_parameters, wlan_hosted_network_reason_service_shutting_down, // wlan_hosted_network_reason_insufficient_resources, wlan_hosted_network_reason_elevation_required, // wlan_hosted_network_reason_read_only, wlan_hosted_network_reason_persistence_failed, wlan_hosted_network_reason_crypt_error, // wlan_hosted_network_reason_impersonation, wlan_hosted_network_reason_stop_before_start, // wlan_hosted_network_reason_interface_available, wlan_hosted_network_reason_interface_unavailable, // wlan_hosted_network_reason_miniport_stopped, wlan_hosted_network_reason_miniport_started, // wlan_hosted_network_reason_incompatible_connection_started, wlan_hosted_network_reason_incompatible_connection_stopped, // wlan_hosted_network_reason_user_action, wlan_hosted_network_reason_client_abort, wlan_hosted_network_reason_ap_start_failed, // wlan_hosted_network_reason_peer_arrived, wlan_hosted_network_reason_peer_departed, wlan_hosted_network_reason_peer_timeout, // wlan_hosted_network_reason_gp_denied, wlan_hosted_network_reason_service_unavailable, wlan_hosted_network_reason_device_change, // wlan_hosted_network_reason_properties_change, wlan_hosted_network_reason_virtual_station_blocking_use, // wlan_hosted_network_reason_service_available_on_virtual_station } WLAN_HOSTED_NETWORK_REASON, *PWLAN_HOSTED_NETWORK_REASON; [PInvokeData("wlanapi.h", MSDNShortId = "affca9ab-fcd4-474d-993c-f6bb6b1f967c")] public enum WLAN_HOSTED_NETWORK_REASON { /// The operation was successful. wlan_hosted_network_reason_success, /// Unknown error. wlan_hosted_network_reason_unspecified, /// /// Bad parameters.For example, this reason code is returned if an application failed to reference the client context from the /// correct handle (the handle returned by the WlanOpenHandle function). /// wlan_hosted_network_reason_bad_parameters, /// Service is shutting down. wlan_hosted_network_reason_service_shutting_down, /// Service is out of resources. wlan_hosted_network_reason_insufficient_resources, /// This operation requires elevation. wlan_hosted_network_reason_elevation_required, /// An attempt was made to write read-only data. wlan_hosted_network_reason_read_only, /// Data persistence failed. wlan_hosted_network_reason_persistence_failed, /// A cryptographic error occurred. wlan_hosted_network_reason_crypt_error, /// User impersonation failed. wlan_hosted_network_reason_impersonation, /// An incorrect function call sequence was made. wlan_hosted_network_reason_stop_before_start, /// A wireless interface has become available. wlan_hosted_network_reason_interface_available, /// /// A wireless interface has become unavailable.This reason code is returned by the wireless Hosted Network functions any time /// the network state of the wireless Hosted Network is wlan_hosted_network_unavailable. For example if the wireless Hosted /// Network is disabled by group policy on a domain, then the network state of the wireless Hosted Network is /// wlan_hosted_network_unavailable. In this case, any calls to the WlanHostedNetworkStartUsing or WlanHostedNetworkForceStart /// function would return this reason code. /// wlan_hosted_network_reason_interface_unavailable, /// The wireless miniport driver stopped the Hosted Network. wlan_hosted_network_reason_miniport_stopped, /// The wireless miniport driver status changed. wlan_hosted_network_reason_miniport_started, /// /// An incompatible connection started.An incompatible connection refers to one of the following cases:Windows will stop the /// wireless Hosted Network on the software-based wireless access point (AP) adapter when an incompatible connection starts on /// the primary station adapter. The network state of the wireless Hosted Network state would become wlan_hosted_network_unavailable. /// wlan_hosted_network_reason_incompatible_connection_started, /// /// An incompatible connection stopped.An incompatible connection previously started on the primary station adapter /// (wlan_hosted_network_reason_incompatible_connection_started), but the incompatible connection has stopped. If the wireless /// Hosted Network was previously stopped as a result of an incompatible connection being started, Windows will not /// automatically restart the wireless Hosted Network. Applications can restart the wireless Hosted Network on the AP adapter by /// calling the WlanHostedNetworkStartUsing or WlanHostedNetworkForceStart function. /// wlan_hosted_network_reason_incompatible_connection_stopped, /// A state change occurred that was caused by explicit user action. wlan_hosted_network_reason_user_action, /// A state change occurred that was caused by client abort. wlan_hosted_network_reason_client_abort, /// The driver for the wireless Hosted Network failed to start. wlan_hosted_network_reason_ap_start_failed, /// A peer connected to the wireless Hosted Network. wlan_hosted_network_reason_peer_arrived, /// A peer disconnected from the wireless Hosted Network. wlan_hosted_network_reason_peer_departed, /// A peer timed out. wlan_hosted_network_reason_peer_timeout, /// The operation was denied by group policy. wlan_hosted_network_reason_gp_denied, /// The Wireless LAN service is not running. wlan_hosted_network_reason_service_unavailable, /// The wireless adapter used by the wireless Hosted Network changed. wlan_hosted_network_reason_device_change, /// The properties of the wireless Hosted Network changed. wlan_hosted_network_reason_properties_change, /// A virtual station is active and blocking operation. wlan_hosted_network_reason_virtual_station_blocking_use, /// An identical service is available on a virtual station. wlan_hosted_network_reason_service_available_on_virtual_station, } /// /// The WLAN_HOSTED_NETWORK_STATE enumerated type specifies the possible values for the network state of the wireless Hosted Network. /// /// /// The WLAN_HOSTED_NETWORK_STATE enumerated type is an extension to native wireless APIs added to support the wireless /// Hosted Network on Windows 7 and later. /// // https://docs.microsoft.com/en-us/windows/win32/api/wlanapi/ne-wlanapi-wlan_hosted_network_state typedef enum // _WLAN_HOSTED_NETWORK_STATE { wlan_hosted_network_unavailable, wlan_hosted_network_idle, wlan_hosted_network_active } // WLAN_HOSTED_NETWORK_STATE, *PWLAN_HOSTED_NETWORK_STATE; [PInvokeData("wlanapi.h", MSDNShortId = "4c845df3-6bc8-4e09-ac01-6c9180d43b16")] public enum WLAN_HOSTED_NETWORK_STATE { /// The wireless Hosted Network is unavailable. wlan_hosted_network_unavailable, /// The wireless Hosted Network is idle. wlan_hosted_network_idle, /// The wireless Hosted Network is active. wlan_hosted_network_active, } /// The WLAN_IHV_CONTROL_TYPE enumeration specifies the type of software bypassed by a vendor-specific method. // https://docs.microsoft.com/en-us/windows/win32/api/wlanapi/ne-wlanapi-wlan_ihv_control_type~r1 typedef enum // _WLAN_IHV_CONTROL_TYPE { wlan_ihv_control_type_service, wlan_ihv_control_type_driver } WLAN_IHV_CONTROL_TYPE, *PWLAN_IHV_CONTROL_TYPE; [PInvokeData("wlanapi.h")] public enum WLAN_IHV_CONTROL_TYPE { /// wlan_ihv_control_type_service, /// wlan_ihv_control_type_driver } /// /// The WLAN_INTERFACE_STATE enumerated type indicates the state of an interface. /// /// Windows XP with SP3 and Wireless LAN API for Windows XP with SP2: Only the wlan_interface_state_connected, /// wlan_interface_state_disconnected, and wlan_interface_state_authenticating values are supported. /// /// // https://docs.microsoft.com/en-us/windows/win32/api/wlanapi/ne-wlanapi-wlan_interface_state~r1 typedef enum _WLAN_INTERFACE_STATE // { wlan_interface_state_not_ready, wlan_interface_state_connected, wlan_interface_state_ad_hoc_network_formed, // wlan_interface_state_disconnecting, wlan_interface_state_disconnected, wlan_interface_state_associating, // wlan_interface_state_discovering, wlan_interface_state_authenticating } WLAN_INTERFACE_STATE, *PWLAN_INTERFACE_STATE; [PInvokeData("wlanapi.h")] public enum WLAN_INTERFACE_STATE { /// wlan_interface_state_not_ready, /// wlan_interface_state_connected, /// wlan_interface_state_ad_hoc_network_formed, /// wlan_interface_state_disconnecting, /// wlan_interface_state_disconnected, /// wlan_interface_state_associating, /// wlan_interface_state_discovering, /// wlan_interface_state_authenticating } /// The WLAN_INTERFACE_TYPE enumeration specifies the wireless interface type. // https://docs.microsoft.com/en-us/windows/win32/api/wlanapi/ne-wlanapi-wlan_interface_type typedef enum _WLAN_INTERFACE_TYPE { // wlan_interface_type_emulated_802_11, wlan_interface_type_native_802_11, wlan_interface_type_invalid } WLAN_INTERFACE_TYPE, *PWLAN_INTERFACE_TYPE; [PInvokeData("wlanapi.h", MSDNShortId = "c7a3aa6c-2f66-4d45-a975-f6da433e368f")] public enum WLAN_INTERFACE_TYPE { /// Specifies an emulated 802.11 interface. wlan_interface_type_emulated_802_11, /// Specifies a native 802.11 interface. wlan_interface_type_native_802_11, /// The interface specified is invalid. wlan_interface_type_invalid, } /// /// The WLAN_INTF_OPCODE enumerated type defines various opcodes used to set and query parameters on a wireless interface. /// /// /// The WLAN_INTF_OPCODE enumerated type defines the possible opcodes that can be passed in the OpCode parameter to the /// WlanQueryInterface and WlanSetInterface functions to query or set parameters on a wireless interface. /// // https://docs.microsoft.com/en-us/windows/win32/api/wlanapi/ne-wlanapi-wlan_intf_opcode~r1 typedef enum _WLAN_INTF_OPCODE { // wlan_intf_opcode_autoconf_start, wlan_intf_opcode_autoconf_enabled, wlan_intf_opcode_background_scan_enabled, // wlan_intf_opcode_media_streaming_mode, wlan_intf_opcode_radio_state, wlan_intf_opcode_bss_type, wlan_intf_opcode_interface_state, // wlan_intf_opcode_current_connection, wlan_intf_opcode_channel_number, // wlan_intf_opcode_supported_infrastructure_auth_cipher_pairs, wlan_intf_opcode_supported_adhoc_auth_cipher_pairs, // wlan_intf_opcode_supported_country_or_region_string_list, wlan_intf_opcode_current_operation_mode, // wlan_intf_opcode_supported_safe_mode, wlan_intf_opcode_certified_safe_mode, wlan_intf_opcode_hosted_network_capable, // wlan_intf_opcode_management_frame_protection_capable, wlan_intf_opcode_autoconf_end, wlan_intf_opcode_msm_start, // wlan_intf_opcode_statistics, wlan_intf_opcode_rssi, wlan_intf_opcode_msm_end, wlan_intf_opcode_security_start, // wlan_intf_opcode_security_end, wlan_intf_opcode_ihv_start, wlan_intf_opcode_ihv_end } WLAN_INTF_OPCODE, *PWLAN_INTF_OPCODE; [PInvokeData("wlanapi.h")] public enum WLAN_INTF_OPCODE : uint { /// wlan_intf_opcode_autoconf_start = 0, /// Enables or disables auto config for the indicated interface. [CorrespondingType(typeof(BOOL))] wlan_intf_opcode_autoconf_enabled, /// Enables or disables background scan for the indicated interface. [CorrespondingType(typeof(BOOL))] wlan_intf_opcode_background_scan_enabled, /// Sets media streaming mode for the driver. [CorrespondingType(typeof(BOOL))] wlan_intf_opcode_media_streaming_mode, /// Sets the software radio state of a specific physical layer (PHY) for the interface. [CorrespondingType(typeof(WLAN_RADIO_STATE))] wlan_intf_opcode_radio_state, /// Sets the BSS type. [CorrespondingType(typeof(DOT11_BSS_TYPE))] wlan_intf_opcode_bss_type, /// [CorrespondingType(typeof(WLAN_INTERFACE_STATE), CorrespondingAction.Get)] wlan_intf_opcode_interface_state, /// [CorrespondingType(typeof(WLAN_CONNECTION_ATTRIBUTES), CorrespondingAction.Get)] wlan_intf_opcode_current_connection, /// [CorrespondingType(typeof(uint), CorrespondingAction.Get)] wlan_intf_opcode_channel_number, /// [CorrespondingType(typeof(WLAN_AUTH_CIPHER_PAIR_LIST), CorrespondingAction.Get)] wlan_intf_opcode_supported_infrastructure_auth_cipher_pairs, /// [CorrespondingType(typeof(WLAN_AUTH_CIPHER_PAIR_LIST), CorrespondingAction.Get)] wlan_intf_opcode_supported_adhoc_auth_cipher_pairs, /// [CorrespondingType(typeof(WLAN_COUNTRY_OR_REGION_STRING_LIST), CorrespondingAction.Get)] wlan_intf_opcode_supported_country_or_region_string_list, /// Sets the current operation mode for the interface. For more information, see Remarks. [CorrespondingType(typeof(DOT11_OPERATION_MODE))] wlan_intf_opcode_current_operation_mode, /// [CorrespondingType(typeof(BOOL), CorrespondingAction.Get)] wlan_intf_opcode_supported_safe_mode, /// [CorrespondingType(typeof(BOOL), CorrespondingAction.Get)] wlan_intf_opcode_certified_safe_mode, /// [CorrespondingType(typeof(BOOL), CorrespondingAction.Get)] wlan_intf_opcode_hosted_network_capable, /// [CorrespondingType(typeof(BOOL), CorrespondingAction.Get)] wlan_intf_opcode_management_frame_protection_capable, /// wlan_intf_opcode_autoconf_end = 0x0fffffff, /// wlan_intf_opcode_msm_start = 0x10000100, /// [CorrespondingType(typeof(WLAN_STATISTICS), CorrespondingAction.Get)] wlan_intf_opcode_statistics, /// [CorrespondingType(typeof(int), CorrespondingAction.Get)] wlan_intf_opcode_rssi, /// wlan_intf_opcode_msm_end = 0x1fffffff, /// wlan_intf_opcode_security_start = 0x20010000, /// wlan_intf_opcode_security_end = 0x2fffffff, /// wlan_intf_opcode_ihv_start = 0x30000000, /// wlan_intf_opcode_ihv_end = 0x3fffffff } /// /// The WLAN_NOTIFICATION_ACM enumerated type specifies the possible values of the NotificationCode member of the /// WLAN_NOTIFICATION_DATA structure for Auto Configuration Module (ACM) notifications. /// /// /// /// The WLAN_NOTIFICATION_ACM enumerated type is used by the Auto Configuration Module, the new wireless configuration /// component supported on Windows Vista and later. /// /// /// The WLAN_NOTIFICATION_ACM specifies the possible values for the NotificationCode member of the /// WLAN_NOTIFICATION_DATA structure for received notifications when the NotificationSource member of the /// WLAN_NOTIFICATION_DATA structure is WLAN_NOTIFICATION_SOURCE_ACM. /// /// /// The starting value for the WLAN_NOTIFICATION_ACM enumeration is defined as L2_NOTIFICATION_CODE_V2_BEGIN in the l2cmn.h /// header file. Note that the l2cmn.h header is automatically included by the wlanapi.h header file. /// /// /// The WlanRegisterNotification function is used by an application to register and unregister notifications on all wireless /// interfaces. When registering for notifications, an application must provide a callback function pointed to by the funcCallback /// parameter passed to the WlanRegisterNotification function. The prototype for this callback function is the /// WLAN_NOTIFICATION_CALLBACK. This callback function will receive notifications that have been registered in the dwNotifSource /// parameter passed to the WlanRegisterNotification function. /// /// /// The callback function is called with a pointer to a WLAN_NOTIFICATION_DATA structure as the first parameter that contains /// detailed information on the notification. The callback function also receives a second parameter that contains a pointer to the /// client context passed in the pCallbackContext parameter to the WlanRegisterNotification function. This client context can be a /// NULL pointer if that is what was passed to the WlanRegisterNotification function. /// /// /// Windows XP with SP3 and Wireless LAN API for Windows XP with SP2: Only the /// wlan_notification_acm_connection_complete and wlan_notification_acm_disconnected notifications are available. /// /// // https://docs.microsoft.com/en-us/windows/win32/api/wlanapi/ne-wlanapi-wlan_notification_acm~r1 typedef enum // _WLAN_NOTIFICATION_ACM { wlan_notification_acm_start, wlan_notification_acm_autoconf_enabled, // wlan_notification_acm_autoconf_disabled, wlan_notification_acm_background_scan_enabled, // wlan_notification_acm_background_scan_disabled, wlan_notification_acm_bss_type_change, // wlan_notification_acm_power_setting_change, wlan_notification_acm_scan_complete, wlan_notification_acm_scan_fail, // wlan_notification_acm_connection_start, wlan_notification_acm_connection_complete, wlan_notification_acm_connection_attempt_fail, // wlan_notification_acm_filter_list_change, wlan_notification_acm_interface_arrival, wlan_notification_acm_interface_removal, // wlan_notification_acm_profile_change, wlan_notification_acm_profile_name_change, wlan_notification_acm_profiles_exhausted, // wlan_notification_acm_network_not_available, wlan_notification_acm_network_available, wlan_notification_acm_disconnecting, // wlan_notification_acm_disconnected, wlan_notification_acm_adhoc_network_state_change, wlan_notification_acm_profile_unblocked, // wlan_notification_acm_screen_power_change, wlan_notification_acm_profile_blocked, wlan_notification_acm_scan_list_refresh, // wlan_notification_acm_operational_state_change, wlan_notification_acm_end } WLAN_NOTIFICATION_ACM, *PWLAN_NOTIFICATION_ACM; [PInvokeData("wlanapi.h")] public enum WLAN_NOTIFICATION_ACM : uint { /// wlan_notification_acm_start = 0, /// Autoconfiguration is enabled. wlan_notification_acm_autoconf_enabled = 0x00000001, /// Autoconfiguration is disabled. wlan_notification_acm_autoconf_disabled = 0x00000002, /// Background scans are enabled. wlan_notification_acm_background_scan_enabled = 0x00000003, /// Background scans are disabled. wlan_notification_acm_background_scan_disabled = 0x00000004, /// /// The BSS type for an interface has changed. /// The pData member points to a DOT11_BSS_TYPE enumeration value that identifies the new basic service set (BSS) type. /// wlan_notification_acm_bss_type_change = 0x00000005, /// /// The power setting for an interface has changed. /// The pData member points to a WLAN_POWER_SETTING enumeration value that identifies the new power setting of an interface. /// wlan_notification_acm_power_setting_change = 0x00000006, /// A scan for networks has completed. wlan_notification_acm_scan_complete = 0x00000007, /// /// A scan for connectable networks failed. /// The pData member points to a WLAN_REASON_CODE data type value that identifies the reason the WLAN operation failed. /// wlan_notification_acm_scan_fail = 0x00000008, /// /// A connection has started to a network in range. /// /// The pData member points to a WLAN_CONNECTION_NOTIFICATION_DATA structure that identifies the network information for the /// connection attempt. /// /// wlan_notification_acm_connection_start = 0x00000009, /// /// A connection has completed. /// /// The pData member points to a WLAN_CONNECTION_NOTIFICATION_DATA structure that identifies the network information for the /// connection attempt that completed. The connection succeeded if the wlanReasonCode in WLAN_CONNECTION_NOTIFICATION_DATA is /// WLAN_REASON_CODE_SUCCESS. Otherwise, the connection has failed. /// /// wlan_notification_acm_connection_complete = 0x0000000a, /// /// A connection attempt has failed. /// /// A connection consists of one or more connection attempts. An application may receive zero or more /// wlan_notification_acm_connection_attempt_fail notifications between receiving the wlan_notification_acm_connection_start /// notification and the wlan_notification_acm_connection_complete notification. /// /// /// The pData member points to a WLAN_CONNECTION_NOTIFICATION_DATA structure that identifies the network information for the /// connection attempt that failed. /// /// wlan_notification_acm_connection_attempt_fail = 0x0000000b, /// /// A change in the filter list has occurred, either through group policy or a call to the WlanSetFilterList function. /// An application can call the WlanGetFilterList function to retrieve the new filter list. /// wlan_notification_acm_filter_list_change = 0x0000000c, /// A wireless LAN interface is been added to or enabled on the local computer. wlan_notification_acm_interface_arrival = 0x0000000d, /// A wireless LAN interface has been removed or disabled on the local computer. wlan_notification_acm_interface_removal = 0x0000000e, /// /// A change in a profile or the profile list has occurred, either through group policy or by calls to Native Wifi functions. /// /// An application can call the WlanGetProfileList and WlanGetProfile functions to retrieve the updated profiles. The interface /// on which the profile list changes is identified by the InterfaceGuid member. /// /// wlan_notification_acm_profile_change = 0x0000000f, /// /// A profile name has changed, either through group policy or by calls to Native Wifi functions. /// /// The pData member points to a buffer that contains two NULL-terminated WCHAR strings, the old profile name followed by the /// new profile name. /// /// wlan_notification_acm_profile_name_change = 0x00000010, /// All profiles were exhausted in an attempt to autoconnect. wlan_notification_acm_profiles_exhausted = 0x00000011, /// /// The wireless service cannot find any connectable network after a scan. /// The interface on which no connectable network is found is identified by identified by the InterfaceGuid member. /// wlan_notification_acm_network_not_available = 0x00000012, /// /// The wireless service found a connectable network after a scan, the interface was in the disconnected state, and there is no /// compatible auto-connect profile that the wireless service can use to connect . /// The interface on which connectable networks are found is identified by the InterfaceGuid member. /// wlan_notification_acm_network_available = 0x00000013, /// /// The wireless service is disconnecting from a connectable network. /// /// The pData member points to a WLAN_CONNECTION_NOTIFICATION_DATA structure that identifies the network information for the /// connection that is disconnecting. /// /// wlan_notification_acm_disconnecting = 0x00000014, /// /// The wireless service has disconnected from a connectable network. /// /// The pData member points to a WLAN_CONNECTION_NOTIFICATION_DATA structure that identifies the network information for the /// connection that disconnected. /// /// wlan_notification_acm_disconnected = 0x00000015, /// /// A state change has occurred for an adhoc network. /// The pData member points to a WLAN_ADHOC_NETWORK_STATE enumeration value that identifies the new adhoc network state. /// wlan_notification_acm_adhoc_network_state_change = 0x00000016, /// This value is supported on Windows 8 and later. wlan_notification_acm_profile_unblocked = 0x00000017, /// /// The screen power has changed. /// /// The pData member points to a BOOL value that indicates the value of the screen power change. When this value is TRUE, the /// screen changed to on. When this value is FALSE, the screen changed to off. /// /// This value is supported on Windows 8 and later. /// wlan_notification_acm_screen_power_change = 0x00000018, /// This value is supported on Windows 8 and later. wlan_notification_acm_profile_blocked = 0x00000019, /// This value is supported on Windows 8 and later. wlan_notification_acm_scan_list_refresh = 0x0000001a, /// wlan_notification_acm_operational_state_change, /// wlan_notification_acm_end, } /// /// The WLAN_NOTIFICATION_MSM enumerated type specifies the possible values of the NotificationCode member of the /// WLAN_NOTIFICATION_DATA structure for Media Specific Module (MSM) notifications. /// /// /// /// The WLAN_NOTIFICATION_ACM enumerated type is used by the Media Specific Module, the new wireless configuration component /// supported on Windows Vista and later. /// /// /// The WLAN_NOTIFICATION_MSM specifies the possible values for the NotificationCode member of the /// WLAN_NOTIFICATION_DATA structure for received notifications when the NotificationSource member of the /// WLAN_NOTIFICATION_DATA structure is WLAN_NOTIFICATION_SOURCE_MSM. /// /// /// The starting value for the WLAN_NOTIFICATION_MSM enumeration is defined as L2_NOTIFICATION_CODE_PUBLIC_BEGIN in the /// l2cmn.h header file. Note that the l2cmn.h header is automatically included by the wlanapi.h header file. /// /// /// The WlanRegisterNotification function is used by an application to register and unregister notifications on all wireless /// interfaces. When registering for notifications, an application must provide a callback function pointed to by the funcCallback /// parameter passed to the WlanRegisterNotification function. The prototype for this callback function is the /// WLAN_NOTIFICATION_CALLBACK. This callback function will receive notifications that have been registered in the dwNotifSource /// parameter passed to the WlanRegisterNotification function. /// /// /// The callback function is called with a pointer to a WLAN_NOTIFICATION_DATA structure as the first parameter that contains /// detailed information on the notification. The callback function also receives a second parameter that contains a pointer to the /// client context passed in the pCallbackContext parameter to the WlanRegisterNotification function. This client context can be a /// NULL pointer if that is what was passed to the WlanRegisterNotification function. /// /// // https://docs.microsoft.com/en-us/windows/win32/api/wlanapi/ne-wlanapi-wlan_notification_msm~r1 typedef enum // _WLAN_NOTIFICATION_MSM { wlan_notification_msm_start, wlan_notification_msm_associating, wlan_notification_msm_associated, // wlan_notification_msm_authenticating, wlan_notification_msm_connected, wlan_notification_msm_roaming_start, // wlan_notification_msm_roaming_end, wlan_notification_msm_radio_state_change, wlan_notification_msm_signal_quality_change, // wlan_notification_msm_disassociating, wlan_notification_msm_disconnected, wlan_notification_msm_peer_join, // wlan_notification_msm_peer_leave, wlan_notification_msm_adapter_removal, wlan_notification_msm_adapter_operation_mode_change, // wlan_notification_msm_link_degraded, wlan_notification_msm_link_improved, wlan_notification_msm_end } WLAN_NOTIFICATION_MSM, *PWLAN_NOTIFICATION_MSM; [PInvokeData("wlanapi.h")] public enum WLAN_NOTIFICATION_MSM : uint { /// wlan_notification_msm_start, /// /// A wireless device is in the process of associating with an access point or a peer station. /// The pData member points to a WLAN_MSM_NOTIFICATION_DATA structure that contains connection-related information. /// wlan_notification_msm_associating = 0x00000001, /// /// The wireless device has associated with an access point or a peer station. /// The pData member points to a WLAN_MSM_NOTIFICATION_DATA structure that contains connection-related information. /// wlan_notification_msm_associated = 0x00000002, /// /// The wireless device is in the process of authenticating. /// /// The pData member of the WLAN_NOTIFICATION_DATA structure points to a WLAN_MSM_NOTIFICATION_DATA structure that contains /// connection-related information. /// /// wlan_notification_msm_authenticating = 0x00000003, /// /// The wireless device is associated with an access point or a peer station, keys have been exchanged, and the wireless device /// is available to send data. /// The pData member points to a WLAN_MSM_NOTIFICATION_DATA structure that contains connection-related information. /// wlan_notification_msm_connected = 0x00000004, /// /// The wireless device is connected to an access point and has initiated roaming to another access point. /// The pData member points to a WLAN_MSM_NOTIFICATION_DATA structure that contains connection-related information. /// wlan_notification_msm_roaming_start = 0x00000005, /// /// The wireless device was connected to an access point and has completed roaming to another access point. /// The pData member points to a WLAN_MSM_NOTIFICATION_DATA structure that contains connection-related information. /// wlan_notification_msm_roaming_end = 0x00000006, /// /// The radio state for an adapter has changed. Each physical layer (PHY) has its own radio state. The radio for an adapter is /// switched off when the radio state of every PHY is off. /// The pData member points to a WLAN_PHY_RADIO_STATE structure that identifies the new radio state. /// wlan_notification_msm_radio_state_change = 0x00000007, /// /// A signal quality change for the currently associated access point or peer station. /// The pData member points to a ULONG value for the WLAN_SIGNAL_QUALITY that identifies the new signal quality. /// wlan_notification_msm_signal_quality_change = 0x00000008, /// /// A wireless device is in the process of disassociating from an access point or a peer station. /// The pData member points to a WLAN_MSM_NOTIFICATION_DATA structure that contains connection-related information. /// wlan_notification_msm_disassociating = 0x00000009, /// /// The wireless device is not associated with an access point or a peer station. /// /// The pData member points to a WLAN_MSM_NOTIFICATION_DATA structure that contains connection-related information. The /// wlanReasonCode member of the WLAN_MSM_NOTIFICATION_DATA structure indicates the reason for the disconnect. /// /// wlan_notification_msm_disconnected = 0x0000000a, /// /// A peer has joined an adhoc network. /// The pData member points to a WLAN_MSM_NOTIFICATION_DATA structure that contains connection-related information. /// wlan_notification_msm_peer_join = 0x0000000b, /// /// A peer has left an adhoc network. /// /// The pData member of the WLAN_NOTIFICATION_DATA structure points to a WLAN_MSM_NOTIFICATION_DATA structure that contains /// connection-related information. /// /// wlan_notification_msm_peer_leave = 0x0000000c, /// /// A wireless adapter has been removed from the local computer. /// The pData member points to a WLAN_MSM_NOTIFICATION_DATA structure that contains connection-related information. /// wlan_notification_msm_adapter_removal = 0x0000000d, /// /// The operation mode of the wireless device has changed. /// The pData member points to a ULONG that identifies the new operation mode. /// wlan_notification_msm_adapter_operation_mode_change = 0x0000000e, /// wlan_notification_msm_link_degraded, /// wlan_notification_msm_link_improved, /// wlan_notification_msm_end } /// A value that indicates the source of the notification. [PInvokeData("wlanapi.h")] [Flags] public enum WLAN_NOTIFICATION_SOURCE { /// A notification generated by an unknown source. WLAN_NOTIFICATION_SOURCE_NONE = 0, /// /// A notification generated by the 802.1X module. For more information on these notifications, see the ONEX_NOTIFICATION_TYPE /// enumeration reference. /// WLAN_NOTIFICATION_SOURCE_ONEX = 0x00000004, /// /// A notification generated by the auto configuration module. For more information on these notifications, see the /// WLAN_NOTIFICATION_ACM enumeration reference. /// WLAN_NOTIFICATION_SOURCE_ACM = 0x00000008, /// /// A notification generated by the media specific module (MSM). For more information on these notifications, see the /// WLAN_NOTIFICATION_MSM enumeration reference. /// WLAN_NOTIFICATION_SOURCE_MSM = 0x00000010, /// /// A notification generated by the security module. /// No notifications are currently defined for WLAN_NOTIFICATION_SOURCE_SECURITY. /// WLAN_NOTIFICATION_SOURCE_SECURITY = 0x00000020, /// A notification generated by independent hardware vendors (IHV). WLAN_NOTIFICATION_SOURCE_IHV = 0x00000040, /// /// A notification generated by the wireless Hosted Network. For more information on these notifications, see the /// WLAN_HOSTED_NETWORK_NOTIFICATION_CODE enumeration reference. /// This notification source is available on Windows 7 and on Windows Server 2008 R2 with the Wireless LAN Service installed. /// WLAN_NOTIFICATION_SOURCE_HNWK = 0x00000080, /// A notification generated by the 802.1X module. WLAN_NOTIFICATION_SOURCE_ALL = 0x0000FFFF, } /// The WLAN_OPCODE_VALUE_TYPE enumeration specifies the origin of automatic configuration (auto config) settings. // https://docs.microsoft.com/en-us/windows/win32/api/wlanapi/ne-wlanapi-wlan_opcode_value_type~r1 typedef enum // _WLAN_OPCODE_VALUE_TYPE { wlan_opcode_value_type_query_only, wlan_opcode_value_type_set_by_group_policy, // wlan_opcode_value_type_set_by_user, wlan_opcode_value_type_invalid } WLAN_OPCODE_VALUE_TYPE, *PWLAN_OPCODE_VALUE_TYPE; [PInvokeData("wlanapi.h")] public enum WLAN_OPCODE_VALUE_TYPE { /// wlan_opcode_value_type_query_only, /// wlan_opcode_value_type_set_by_group_policy, /// wlan_opcode_value_type_set_by_user, /// wlan_opcode_value_type_invalid } /// The WLAN_POWER_SETTING enumerated type specifies the power setting of an interface. // https://docs.microsoft.com/en-us/windows/win32/api/wlanapi/ne-wlanapi-wlan_power_setting~r1 typedef enum _WLAN_POWER_SETTING { // wlan_power_setting_no_saving, wlan_power_setting_low_saving, wlan_power_setting_medium_saving, wlan_power_setting_maximum_saving, // wlan_power_setting_invalid } WLAN_POWER_SETTING, *PWLAN_POWER_SETTING; [PInvokeData("wlanapi.h")] public enum WLAN_POWER_SETTING { /// wlan_power_setting_no_saving, /// wlan_power_setting_low_saving, /// wlan_power_setting_medium_saving, /// wlan_power_setting_maximum_saving, /// wlan_power_setting_invalid } /// Specifies the flags to set on the profile. [PInvokeData("wlanapi.h", MSDNShortId = "ca45278c-2e1e-4080-825a-d6a05e463858")] [Flags] public enum WLAN_PROFILE_FLAGS { /// /// This flag indicates that this profile was created by group policy. A group policy profile is read-only. Neither the content /// nor the preference order of the profile can be changed. /// WLAN_PROFILE_GROUP_POLICY = 0x00000001, /// This flag indicates that the profile is a per-user profile. If not set, this profile is an all-user profile. WLAN_PROFILE_USER = 0x00000002, /// /// /// On input, this flag indicates that the caller wants to retrieve the plain text key from a wireless profile. If the calling /// thread has the required permissions, the WlanGetProfile function returns the plain text key in the keyMaterial element of /// the profile returned in the buffer pointed to by the pstrProfileXml parameter. /// /// /// For the WlanGetProfile call to return the plain text key, the wlan_secure_get_plaintext_key permissions from the /// WLAN_SECURABLE_OBJECT enumerated type must be set on the calling thread. The DACL must also contain an ACE that grants /// WLAN_READ_ACCESS permission to the access token of the calling thread. By default, the permissions for retrieving the plain /// text key is allowed only to the members of the Administrators group on a local machine. /// /// /// If the calling thread lacks the required permissions, the WlanGetProfile function returns the encrypted key in the /// keyMaterial element of the profile returned in the buffer pointed to by the pstrProfileXml parameter. No error is returned /// if the calling thread lacks the required permissions. /// /// /// Windows 7: This flag passed on input is an extension to native wireless APIs added on Windows 7 and later. The pdwFlags /// parameter is an __inout_opt parameter on Windows 7 and later. /// /// WLAN_PROFILE_GET_PLAINTEXT_KEY = 0x00000004, /// The profile was created by the client. WLAN_PROFILE_CONNECTION_MODE_SET_BY_CLIENT = 0x00010000, /// The profile was created by the automatic configuration module. WLAN_PROFILE_CONNECTION_MODE_AUTO = 0x00020000, } /// /// The WLAN_REASON_CODE type indicates the reason a WLAN operation has failed. /// /// You can use the WlanReasonCodeToString function to map a numeric reason code (for example, 0x00050007) to its text /// meaning. You can also use the lookup table to help interpret the numeric value of the reason code. To view the lookup table, see /// Appendix E: Mapping of reason codes to event messages in the document Troubleshooting Windows Vista 802.11 Wireless Connections. /// /// /// /// /// A limited set of reason codes are supported on Windows XP with Service Pack 3 (SP3) and on the Wireless LAN API for Windows XP /// with Service Pack 2 (SP2). The profile validation error codes supported on Windows XP with SP3 and on the Wireless LAN API for /// Windows XP with SP2 are as follows: /// /// /// /// WLAN_REASON_CODE_INVALID_PROFILE_SCHEMA /// /// /// WLAN_REASON_CODE_PROFILE_MISSING /// /// /// WLAN_REASON_CODE_PROFILE_SSID_INVALID /// /// /// /// The MSM security error codes supported on Windows XP with SP3 and on the Wireless LAN API for Windows XP with SP2 are as follows: /// /// /// /// WLAN_REASON_CODE_MSMSEC_PROFILE_INVALID_KEY_INDEX /// /// /// WLAN_REASON_CODE_MSMSEC_PROFILE_KEY_LENGTH /// /// /// WLAN_REASON_CODE_MSMSEC_PROFILE_PSK_LENGTH /// /// /// WLAN_REASON_CODE_MSMSEC_PROFILE_INVALID_AUTH_CIPHER /// /// /// WLAN_REASON_CODE_MSMSEC_PROFILE_ONEX_DISABLED /// /// /// WLAN_REASON_CODE_MSMSEC_PROFILE_ONEX_ENABLED /// /// /// WLAN_REASON_CODE_MSMSEC_CAPABILITY_NETWORK /// /// /// WLAN_REASON_CODE_MSMSEC_CAPABILITY_NIC /// /// /// WLAN_REASON_CODE_MSMSEC_PROFILE_KEYMATERIAL_CHAR /// /// /// WLAN_REASON_CODE_MSMSEC_PROFILE_WRONG_KEYTYPE /// /// /// The 802.1x error codes supported on Windows XP with SP3 and on the Wireless LAN API for Windows XP with SP2 are as follows: /// /// /// ONEX_PROFILE_INVALID_LENGTH /// /// /// ONEX_PROFILE_INVALID_EAP_TYPE_OR_FLAG /// /// /// ONEX_PROFILE_INVALID_AUTH_MODE /// /// /// ONEX_PROFILE_INVALID_EAP_CONNECTION_PROPERTIES /// /// /// // https://docs.microsoft.com/en-us/windows/win32/nativewifi/wlan-reason-code [PInvokeData("", MSDNShortId = "7b267f0b-b3f7-4729-bab4-de3bdd0a35a2")] public enum WLAN_REASON_CODE : uint { /// The operation succeeds. WLAN_REASON_CODE_SUCCESS = L2_REASON_CODE_SUCCESS, /// The reason for failure is unknown. WLAN_REASON_CODE_UNKNOWN = L2_REASON_CODE_UNKNOWN, /// WLAN_REASON_CODE_AC_BASE = L2_REASON_CODE_DOT11_AC_BASE, /// WLAN_REASON_CODE_AC_CONNECT_BASE = (WLAN_REASON_CODE_AC_BASE + WLAN_REASON_CODE_RANGE_SIZE / 2), /// WLAN_REASON_CODE_AC_END = (WLAN_REASON_CODE_AC_BASE + WLAN_REASON_CODE_RANGE_SIZE - 1), /// Failed to start security for ad hoc peer. WLAN_REASON_CODE_ADHOC_SECURITY_FAILURE = (WLAN_REASON_CODE_MSM_CONNECT_BASE + 10), /// /// An application tried to apply a wireless Hosted Network profile to a physical wireless network adapter using the /// WlanSetProfile function, rather than to a virtual device. /// WLAN_REASON_CODE_AP_PROFILE_NOT_ALLOWED = (WLAN_REASON_CODE_AC_CONNECT_BASE + 16), /// /// An application tried to apply a wireless Hosted Network profile to a physical wireless network adapter using the /// WlanSetProfile function, rather than to a virtual device. /// WLAN_REASON_CODE_AP_PROFILE_NOT_ALLOWED_FOR_CLIENT = (WLAN_REASON_CODE_AC_CONNECT_BASE + 15), /// An internal operating system error occurred that resulted in a failure to start the wireless Hosted Network. WLAN_REASON_CODE_AP_STARTING_FAILURE = (WLAN_REASON_CODE_MSM_CONNECT_BASE + 19), /// Driver disconnected while associating. WLAN_REASON_CODE_ASSOCIATION_FAILURE = (WLAN_REASON_CODE_MSM_CONNECT_BASE + 2), /// Association timed out. WLAN_REASON_CODE_ASSOCIATION_TIMEOUT = (WLAN_REASON_CODE_MSM_CONNECT_BASE + 3), /// An internal operating system error occurred with the wireless Hosted Network. WLAN_REASON_CODE_AUTO_AP_PROFILE_NOT_ALLOWED = (WLAN_REASON_CODE_PROFILE_BASE + 25), /// WLAN_REASON_CODE_AUTO_CONNECTION_NOT_ALLOWED = (WLAN_REASON_CODE_PROFILE_BASE + 26), /// Auto-switch cannot be set for an ad hoc network. WLAN_REASON_CODE_AUTO_SWITCH_SET_FOR_ADHOC = (WLAN_REASON_CODE_PROFILE_BASE + 16), /// Auto-switch cannot be set for a manual connection profile. WLAN_REASON_CODE_AUTO_SWITCH_SET_FOR_MANUAL_CONNECTION = (WLAN_REASON_CODE_PROFILE_BASE + 17), /// /// An application tried to apply a wireless Hosted Network profile to a physical network adapter NIC using the WlanSetProfile /// function, and specified an unacceptable value for the maximum number of clients allowed. /// WLAN_REASON_CODE_BAD_MAX_NUMBER_OF_CLIENTS_FOR_AP = (WLAN_REASON_CODE_PROFILE_BASE + 22), /// WLAN_REASON_CODE_BASE = L2_REASON_CODE_DOT11_AC_BASE, /// The basic service set (BSS) type is not allowed on this wireless adapter. WLAN_REASON_CODE_BSS_TYPE_NOT_ALLOWED = (WLAN_REASON_CODE_AC_CONNECT_BASE + 5), /// The BSS type does not match. WLAN_REASON_CODE_BSS_TYPE_UNMATCH = (WLAN_REASON_CODE_MSM_BASE + 3), /// The security settings conflict. WLAN_REASON_CODE_CONFLICT_SECURITY = (WLAN_REASON_CODE_PROFILE_BASE + 11), /// The Media Specific Module (MSM) connect call fails. WLAN_REASON_CODE_CONNECT_CALL_FAIL = (WLAN_REASON_CODE_AC_CONNECT_BASE + 9), /// The data rate does not match. WLAN_REASON_CODE_DATARATE_UNMATCH = (WLAN_REASON_CODE_MSM_BASE + 5), /// Timed out waiting for the driver to disconnect. WLAN_REASON_CODE_DISCONNECT_TIMEOUT = (WLAN_REASON_CODE_MSM_CONNECT_BASE + 15), /// Driver disconnected. WLAN_REASON_CODE_DRIVER_DISCONNECTED = (WLAN_REASON_CODE_MSM_CONNECT_BASE + 11), /// Driver failed to perform some operations. WLAN_REASON_CODE_DRIVER_OPERATION_FAILURE = (WLAN_REASON_CODE_MSM_CONNECT_BASE + 12), /// The wireless network is blocked by group policy. WLAN_REASON_CODE_GP_DENIED = (WLAN_REASON_CODE_AC_CONNECT_BASE + 3), /// WLAN_REASON_CODE_HOTSPOT2_PROFILE_DENIED = (WLAN_REASON_CODE_AC_CONNECT_BASE + 17), /// WLAN_REASON_CODE_HOTSPOT2_PROFILE_NOT_ALLOWED = (WLAN_REASON_CODE_PROFILE_BASE + 27), /// WLAN_REASON_CODE_IHV_CONNECTIVITY_NOT_SUPPORTED = (WLAN_REASON_CODE_PROFILE_BASE + 21), /// The IHV service is not available. WLAN_REASON_CODE_IHV_NOT_AVAILABLE = (WLAN_REASON_CODE_MSM_CONNECT_BASE + 13), /// The response from the IHV service timed out. WLAN_REASON_CODE_IHV_NOT_RESPONDING = (WLAN_REASON_CODE_MSM_CONNECT_BASE + 14), /// The IHV profile OUI did not match with the adapter OUI. WLAN_REASON_CODE_IHV_OUI_MISMATCH = (WLAN_REASON_CODE_PROFILE_BASE + 8), /// The IHV OUI settings are missing. WLAN_REASON_CODE_IHV_OUI_MISSING = (WLAN_REASON_CODE_PROFILE_BASE + 9), /// The independent hardware vendor (IHV) security settings are missing. WLAN_REASON_CODE_IHV_SECURITY_NOT_SUPPORTED = (WLAN_REASON_CODE_PROFILE_BASE + 7), /// The IHV 802.1X security settings are missing. WLAN_REASON_CODE_IHV_SECURITY_ONEX_MISSING = (WLAN_REASON_CODE_PROFILE_BASE + 18), /// The IHV security settings are missing. WLAN_REASON_CODE_IHV_SETTINGS_MISSING = (WLAN_REASON_CODE_PROFILE_BASE + 10), /// The wireless network is in the blocked list. WLAN_REASON_CODE_IN_BLOCKED_LIST = (WLAN_REASON_CODE_AC_CONNECT_BASE + 7), /// The wireless network is in the failed list. WLAN_REASON_CODE_IN_FAILED_LIST = (WLAN_REASON_CODE_AC_CONNECT_BASE + 6), /// An internal error prevented the operation from being completed. WLAN_REASON_CODE_INTERNAL_FAILURE = (WLAN_REASON_CODE_MSM_CONNECT_BASE + 16), /// Automatic connection cannot be set for an ad hoc network. WLAN_REASON_CODE_INVALID_ADHOC_CONNECTION_MODE = (WLAN_REASON_CODE_PROFILE_BASE + 14), /// The BSS type is not valid. WLAN_REASON_CODE_INVALID_BSS_TYPE = (WLAN_REASON_CODE_PROFILE_BASE + 13), /// The channel specified is invalid. WLAN_REASON_CODE_INVALID_CHANNEL = (WLAN_REASON_CODE_PROFILE_BASE + 23), /// The PHY type is invalid. WLAN_REASON_CODE_INVALID_PHY_TYPE = (WLAN_REASON_CODE_PROFILE_BASE + 5), /// The name of the profile is invalid. WLAN_REASON_CODE_INVALID_PROFILE_NAME = (WLAN_REASON_CODE_PROFILE_BASE + 3), /// The profile invalid according to the schema. WLAN_REASON_CODE_INVALID_PROFILE_SCHEMA = (WLAN_REASON_CODE_PROFILE_BASE + 1), /// The type of the profile is invalid. WLAN_REASON_CODE_INVALID_PROFILE_TYPE = (WLAN_REASON_CODE_PROFILE_BASE + 4), /// The profile key does not match the network key. WLAN_REASON_CODE_KEY_MISMATCH = (WLAN_REASON_CODE_AC_CONNECT_BASE + 13), /// WLAN_REASON_CODE_MSM_BASE = L2_REASON_CODE_DOT11_MSM_BASE, /// WLAN_REASON_CODE_MSM_CONNECT_BASE = (WLAN_REASON_CODE_MSM_BASE + WLAN_REASON_CODE_RANGE_SIZE / 2), /// WLAN_REASON_CODE_MSM_END = (WLAN_REASON_CODE_MSM_BASE + WLAN_REASON_CODE_RANGE_SIZE - 1), /// The MSM security settings are missing. WLAN_REASON_CODE_MSM_SECURITY_MISSING = (WLAN_REASON_CODE_PROFILE_BASE + 6), /// 802.1X authentication did not start within configured time. WLAN_REASON_CODE_MSMSEC_AUTH_START_TIMEOUT = (WLAN_REASON_CODE_MSMSEC_CONNECT_BASE + 2), /// 802.1X authentication did not complete within configured time. WLAN_REASON_CODE_MSMSEC_AUTH_SUCCESS_TIMEOUT = (WLAN_REASON_CODE_MSMSEC_CONNECT_BASE + 3), /// WLAN_REASON_CODE_MSMSEC_AUTH_WCN_COMPLETED = (WLAN_REASON_CODE_MSMSEC_CONNECT_BASE + 25), /// WLAN_REASON_CODE_MSMSEC_BASE = L2_REASON_CODE_DOT11_SECURITY_BASE, /// Operation was canceled by a caller. WLAN_REASON_CODE_MSMSEC_CANCELLED = (WLAN_REASON_CODE_MSMSEC_CONNECT_BASE + 17), /// Network does not support specified capability type. WLAN_REASON_CODE_MSMSEC_CAPABILITY_DISCOVERY = (WLAN_REASON_CODE_MSMSEC_BASE + 21), /// /// The wireless LAN requires Management Frame Protection (MFP) and the network interface does not suppport MFP. For more /// informarion, see the IEEE 802.11w amendment to the 802.11 standard. /// WLAN_REASON_CODE_MSMSEC_CAPABILITY_MFP_NW_NIC = (WLAN_REASON_CODE_MSMSEC_BASE + 37), /// Capability matching failed at network. WLAN_REASON_CODE_MSMSEC_CAPABILITY_NETWORK = (WLAN_REASON_CODE_MSMSEC_BASE + 18), /// Capability matching failed at NIC. WLAN_REASON_CODE_MSMSEC_CAPABILITY_NIC = (WLAN_REASON_CODE_MSMSEC_BASE + 19), /// Capability matching failed at profile. WLAN_REASON_CODE_MSMSEC_CAPABILITY_PROFILE = (WLAN_REASON_CODE_MSMSEC_BASE + 20), /// Capability matching failed because the network does not support the authentication method in the profile. WLAN_REASON_CODE_MSMSEC_CAPABILITY_PROFILE_AUTH = (WLAN_REASON_CODE_MSMSEC_BASE + 30), /// Capability matching failed because the network does not support the cipher algorithm in the profile. WLAN_REASON_CODE_MSMSEC_CAPABILITY_PROFILE_CIPHER = (WLAN_REASON_CODE_MSMSEC_BASE + 31), /// Profile requires FIPS 140-2 mode, which is not supported by network interface card (NIC). WLAN_REASON_CODE_MSMSEC_CAPABILITY_PROFILE_SAFE_MODE_NIC = (WLAN_REASON_CODE_MSMSEC_BASE + 33), /// Profile requires FIPS 140-2 mode, which is not supported by network. WLAN_REASON_CODE_MSMSEC_CAPABILITY_PROFILE_SAFE_MODE_NW = (WLAN_REASON_CODE_MSMSEC_BASE + 34), /// WLAN_REASON_CODE_MSMSEC_CONNECT_BASE = (WLAN_REASON_CODE_MSMSEC_BASE + WLAN_REASON_CODE_RANGE_SIZE / 2), /// A security downgrade was detected. WLAN_REASON_CODE_MSMSEC_DOWNGRADE_DETECTED = (WLAN_REASON_CODE_MSMSEC_CONNECT_BASE + 19), /// WLAN_REASON_CODE_MSMSEC_END = (WLAN_REASON_CODE_MSMSEC_BASE + WLAN_REASON_CODE_RANGE_SIZE - 1), /// There was a forced failure because the connection method was not secure. WLAN_REASON_CODE_MSMSEC_FORCED_FAILURE = (WLAN_REASON_CODE_MSMSEC_CONNECT_BASE + 21), /// Message 1 of group key handshake has no group key. WLAN_REASON_CODE_MSMSEC_G1_MISSING_GRP_KEY = (WLAN_REASON_CODE_MSMSEC_CONNECT_BASE + 13), /// Message 1 of group key handshake has no key data. WLAN_REASON_CODE_MSMSEC_G1_MISSING_KEY_DATA = (WLAN_REASON_CODE_MSMSEC_CONNECT_BASE + 12), /// Message 1 of group key handshake has no group management key. WLAN_REASON_CODE_MSMSEC_G1_MISSING_MGMT_GRP_KEY = (WLAN_REASON_CODE_MSMSEC_CONNECT_BASE + 27), /// Entered key format is not in a valid format. WLAN_REASON_CODE_MSMSEC_KEY_FORMAT = (WLAN_REASON_CODE_MSMSEC_CONNECT_BASE + 18), /// Dynamic key exchange did not start within configured time. WLAN_REASON_CODE_MSMSEC_KEY_START_TIMEOUT = (WLAN_REASON_CODE_MSMSEC_CONNECT_BASE + 4), /// Dynamic key exchange did not complete within configured time. WLAN_REASON_CODE_MSMSEC_KEY_SUCCESS_TIMEOUT = (WLAN_REASON_CODE_MSMSEC_CONNECT_BASE + 5), /// Message 2 of 4 way handshake has no IE (RSN Adhoc). WLAN_REASON_CODE_MSMSEC_M2_MISSING_IE = (WLAN_REASON_CODE_MSMSEC_CONNECT_BASE + 24), /// Message 2 of 4 way handshake has no key data (RSN Adhoc). WLAN_REASON_CODE_MSMSEC_M2_MISSING_KEY_DATA = (WLAN_REASON_CODE_MSMSEC_CONNECT_BASE + 23), /// Message 3 of 4-way handshake has no GRP key. WLAN_REASON_CODE_MSMSEC_M3_MISSING_GRP_KEY = (WLAN_REASON_CODE_MSMSEC_CONNECT_BASE + 8), /// Message 3 of 4-way handshake has no IE. WLAN_REASON_CODE_MSMSEC_M3_MISSING_IE = (WLAN_REASON_CODE_MSMSEC_CONNECT_BASE + 7), /// Message 3 of 4-way handshake has no key data. WLAN_REASON_CODE_MSMSEC_M3_MISSING_KEY_DATA = (WLAN_REASON_CODE_MSMSEC_CONNECT_BASE + 6), /// Message 3 of 4 way handshake has no Mgmt Group Key (RSN). WLAN_REASON_CODE_MSMSEC_M3_MISSING_MGMT_GRP_KEY = (WLAN_REASON_CODE_MSMSEC_CONNECT_BASE + 26), /// Message 3 of 4 way handshake contains too many RSN IE (RSN). WLAN_REASON_CODE_MSMSEC_M3_TOO_MANY_RSNIE = (WLAN_REASON_CODE_MSMSEC_CONNECT_BASE + 22), /// WLAN_REASON_CODE_MSMSEC_MAX = WLAN_REASON_CODE_MSMSEC_END, /// WLAN_REASON_CODE_MSMSEC_MIN = WLAN_REASON_CODE_MSMSEC_BASE, /// A mixed cell is suspected. The AP is not signaling that it is compatible with a privacy-enabled profile. WLAN_REASON_CODE_MSMSEC_MIXED_CELL = (WLAN_REASON_CODE_MSMSEC_BASE + 25), /// Plumbing settings to NIC failed. WLAN_REASON_CODE_MSMSEC_NIC_FAILURE = (WLAN_REASON_CODE_MSMSEC_CONNECT_BASE + 16), /// 802.1X indicated that there is no authenticator, but the profile requires one. WLAN_REASON_CODE_MSMSEC_NO_AUTHENTICATOR = (WLAN_REASON_CODE_MSMSEC_CONNECT_BASE + 15), /// Required a pairwise key but access point (AP) configured only group keys. WLAN_REASON_CODE_MSMSEC_NO_PAIRWISE_KEY = (WLAN_REASON_CODE_MSMSEC_CONNECT_BASE + 11), /// AP reset secure bit after connection was secured. WLAN_REASON_CODE_MSMSEC_PEER_INDICATED_INSECURE = (WLAN_REASON_CODE_MSMSEC_CONNECT_BASE + 14), /// Matching security capabilities of IE in M3 failed. WLAN_REASON_CODE_MSMSEC_PR_IE_MATCHING = (WLAN_REASON_CODE_MSMSEC_CONNECT_BASE + 9), /// The number of authentication timers or the number of timeouts specified in the profile is invalid. WLAN_REASON_CODE_MSMSEC_PROFILE_AUTH_TIMERS_INVALID = (WLAN_REASON_CODE_MSMSEC_BASE + 26), /// Profile contains duplicate auth/cipher pair. WLAN_REASON_CODE_MSMSEC_PROFILE_DUPLICATE_AUTH_CIPHER = (WLAN_REASON_CODE_MSMSEC_BASE + 7), /// Invalid auth/cipher combination. WLAN_REASON_CODE_MSMSEC_PROFILE_INVALID_AUTH_CIPHER = (WLAN_REASON_CODE_MSMSEC_BASE + 9), /// The group key update interval specified in the profile is invalid. WLAN_REASON_CODE_MSMSEC_PROFILE_INVALID_GKEY_INTV = (WLAN_REASON_CODE_MSMSEC_BASE + 27), /// Key index specified is not valid. WLAN_REASON_CODE_MSMSEC_PROFILE_INVALID_KEY_INDEX = (WLAN_REASON_CODE_MSMSEC_BASE + 1), /// Invalid PMK cache mode. WLAN_REASON_CODE_MSMSEC_PROFILE_INVALID_PMKCACHE_MODE = (WLAN_REASON_CODE_MSMSEC_BASE + 12), /// Invalid PMK cache size. WLAN_REASON_CODE_MSMSEC_PROFILE_INVALID_PMKCACHE_SIZE = (WLAN_REASON_CODE_MSMSEC_BASE + 13), /// Invalid PMK cache TTL. WLAN_REASON_CODE_MSMSEC_PROFILE_INVALID_PMKCACHE_TTL = (WLAN_REASON_CODE_MSMSEC_BASE + 14), /// Invalid preauth mode. WLAN_REASON_CODE_MSMSEC_PROFILE_INVALID_PREAUTH_MODE = (WLAN_REASON_CODE_MSMSEC_BASE + 15), /// Invalid preauth throttle. WLAN_REASON_CODE_MSMSEC_PROFILE_INVALID_PREAUTH_THROTTLE = (WLAN_REASON_CODE_MSMSEC_BASE + 16), /// Invalid key length. WLAN_REASON_CODE_MSMSEC_PROFILE_KEY_LENGTH = (WLAN_REASON_CODE_MSMSEC_BASE + 3), /// The key contains characters that are not in the ASCII character set. WLAN_REASON_CODE_MSMSEC_PROFILE_KEY_UNMAPPED_CHAR = (WLAN_REASON_CODE_MSMSEC_BASE + 29), /// Key material contains invalid character. WLAN_REASON_CODE_MSMSEC_PROFILE_KEYMATERIAL_CHAR = (WLAN_REASON_CODE_MSMSEC_BASE + 23), /// No auth/cipher pairs specified. WLAN_REASON_CODE_MSMSEC_PROFILE_NO_AUTH_CIPHER_SPECIFIED = (WLAN_REASON_CODE_MSMSEC_BASE + 5), /// 802.1X disabled when it is required to be enabled. WLAN_REASON_CODE_MSMSEC_PROFILE_ONEX_DISABLED = (WLAN_REASON_CODE_MSMSEC_BASE + 10), /// 802.1X enabled when it is required to be disabled. WLAN_REASON_CODE_MSMSEC_PROFILE_ONEX_ENABLED = (WLAN_REASON_CODE_MSMSEC_BASE + 11), /// Passphrase contains invalid character. WLAN_REASON_CODE_MSMSEC_PROFILE_PASSPHRASE_CHAR = (WLAN_REASON_CODE_MSMSEC_BASE + 22), /// Preauth enabled when PMK cache is disabled. WLAN_REASON_CODE_MSMSEC_PROFILE_PREAUTH_ONLY_ENABLED = (WLAN_REASON_CODE_MSMSEC_BASE + 17), /// Invalid PSK length. WLAN_REASON_CODE_MSMSEC_PROFILE_PSK_LENGTH = (WLAN_REASON_CODE_MSMSEC_BASE + 4), /// Key required, PSK present. WLAN_REASON_CODE_MSMSEC_PROFILE_PSK_PRESENT = (WLAN_REASON_CODE_MSMSEC_BASE + 2), /// Profile raw data is invalid. WLAN_REASON_CODE_MSMSEC_PROFILE_RAWDATA_INVALID = (WLAN_REASON_CODE_MSMSEC_BASE + 8), /// FIPS 140-2 mode value in the profile is invalid. WLAN_REASON_CODE_MSMSEC_PROFILE_SAFE_MODE = (WLAN_REASON_CODE_MSMSEC_BASE + 32), /// Too many auth/cipher pairs specified. WLAN_REASON_CODE_MSMSEC_PROFILE_TOO_MANY_AUTH_CIPHER_SPECIFIED = (WLAN_REASON_CODE_MSMSEC_BASE + 6), /// Profile specifies an unsupported authentication mechanism. WLAN_REASON_CODE_MSMSEC_PROFILE_UNSUPPORTED_AUTH = (WLAN_REASON_CODE_MSMSEC_BASE + 35), /// Profile specifies an unsupported cipher. WLAN_REASON_CODE_MSMSEC_PROFILE_UNSUPPORTED_CIPHER = (WLAN_REASON_CODE_MSMSEC_BASE + 36), /// The key type specified does not match the key material. WLAN_REASON_CODE_MSMSEC_PROFILE_WRONG_KEYTYPE = (WLAN_REASON_CODE_MSMSEC_BASE + 24), /// A PSK mismatch is suspected. WLAN_REASON_CODE_MSMSEC_PSK_MISMATCH_SUSPECTED = (WLAN_REASON_CODE_MSMSEC_CONNECT_BASE + 20), /// Matching security capabilities of secondary IE in M3 failed. WLAN_REASON_CODE_MSMSEC_SEC_IE_MATCHING = (WLAN_REASON_CODE_MSMSEC_CONNECT_BASE + 10), /// A "transition network" is suspected. Legacy 802.11 security is used for the next authentication attempt. WLAN_REASON_CODE_MSMSEC_TRANSITION_NETWORK = (WLAN_REASON_CODE_MSMSEC_BASE + 28), /// Failed to queue the user interface request. WLAN_REASON_CODE_MSMSEC_UI_REQUEST_FAILURE = (WLAN_REASON_CODE_MSMSEC_CONNECT_BASE + 1), /// /// The specified network is not available.This reason code is also used when there is a mismatch between capabilities specified /// in an XML profile and interface and/or network capabilities. For example, if a profile specifies the use of WPA2 when the /// NIC only supports WPA, then this error code is returned. Also, if a profile specifies the use of FIPS mode when the NIC does /// not support FIPS mode, then this error code is returned. /// WLAN_REASON_CODE_NETWORK_NOT_AVAILABLE = (WLAN_REASON_CODE_AC_CONNECT_BASE + 11), /// The wireless network is not compatible. WLAN_REASON_CODE_NETWORK_NOT_COMPATIBLE = (WLAN_REASON_CODE_AC_BASE + 1), /// The profile specifies no auto connection. WLAN_REASON_CODE_NO_AUTO_CONNECTION = (WLAN_REASON_CODE_AC_CONNECT_BASE + 1), /// Non-broadcast cannot be set for an ad hoc network. WLAN_REASON_CODE_NON_BROADCAST_SET_FOR_ADHOC = (WLAN_REASON_CODE_PROFILE_BASE + 15), /// The wireless network is not visible. WLAN_REASON_CODE_NOT_VISIBLE = (WLAN_REASON_CODE_AC_CONNECT_BASE + 2), /// WLAN_REASON_CODE_OPERATION_MODE_NOT_SUPPORTED = (WLAN_REASON_CODE_PROFILE_BASE + 24), /// The PHY type does not match. WLAN_REASON_CODE_PHY_TYPE_UNMATCH = (WLAN_REASON_CODE_MSM_BASE + 4), /// Pre-association security failure. WLAN_REASON_CODE_PRE_SECURITY_FAILURE = (WLAN_REASON_CODE_MSM_CONNECT_BASE + 4), /// WLAN_REASON_CODE_PROFILE_BASE = L2_REASON_CODE_PROFILE_BASE, /// The profile was changed or deleted before the connection was established. WLAN_REASON_CODE_PROFILE_CHANGED_OR_DELETED = (WLAN_REASON_CODE_AC_CONNECT_BASE + 12), /// WLAN_REASON_CODE_PROFILE_CONNECT_BASE = (WLAN_REASON_CODE_PROFILE_BASE + WLAN_REASON_CODE_RANGE_SIZE / 2), /// WLAN_REASON_CODE_PROFILE_END = (WLAN_REASON_CODE_PROFILE_BASE + WLAN_REASON_CODE_RANGE_SIZE - 1), /// The WLANProfile element is missing. WLAN_REASON_CODE_PROFILE_MISSING = (WLAN_REASON_CODE_PROFILE_BASE + 2), /// The wireless network profile is not compatible. WLAN_REASON_CODE_PROFILE_NOT_COMPATIBLE = (WLAN_REASON_CODE_AC_BASE + 2), /// The SSID in the profile is invalid or missing. WLAN_REASON_CODE_PROFILE_SSID_INVALID = (WLAN_REASON_CODE_PROFILE_BASE + 19), /// WLAN_REASON_CODE_RANGE_SIZE = L2_REASON_CODE_GROUP_SIZE, /// WLAN_REASON_CODE_RESERVED_BASE = L2_REASON_CODE_RESERVED_BASE, /// WLAN_REASON_CODE_RESERVED_END = (WLAN_REASON_CODE_RESERVED_BASE + WLAN_REASON_CODE_RANGE_SIZE - 1), /// Driver disconnected while roaming. WLAN_REASON_CODE_ROAMING_FAILURE = (WLAN_REASON_CODE_MSM_CONNECT_BASE + 8), /// Failed to start security for roaming. WLAN_REASON_CODE_ROAMING_SECURITY_FAILURE = (WLAN_REASON_CODE_MSM_CONNECT_BASE + 9), /// The MSM scan call fails. WLAN_REASON_CODE_SCAN_CALL_FAIL = (WLAN_REASON_CODE_AC_CONNECT_BASE + 10), /// Security ends up with failure. WLAN_REASON_CODE_SECURITY_FAILURE = (WLAN_REASON_CODE_MSM_CONNECT_BASE + 6), /// The security settings are missing. WLAN_REASON_CODE_SECURITY_MISSING = (WLAN_REASON_CODE_PROFILE_BASE + 12), /// Security operation times out. WLAN_REASON_CODE_SECURITY_TIMEOUT = (WLAN_REASON_CODE_MSM_CONNECT_BASE + 7), /// The size of the service set identifiers (SSID) list exceeds the maximum size supported by the adapter. WLAN_REASON_CODE_SSID_LIST_TOO_LONG = (WLAN_REASON_CODE_AC_CONNECT_BASE + 8), /// Failed to start security after association. WLAN_REASON_CODE_START_SECURITY_FAILURE = (WLAN_REASON_CODE_MSM_CONNECT_BASE + 5), /// Roaming too often. Post security was not completed after 5 attempts. WLAN_REASON_CODE_TOO_MANY_SECURITY_ATTEMPTS = (WLAN_REASON_CODE_MSM_CONNECT_BASE + 18), /// Too many SSIDs were specified in the profile. WLAN_REASON_CODE_TOO_MANY_SSID = (WLAN_REASON_CODE_PROFILE_BASE + 20), /// A user interaction request timed out. WLAN_REASON_CODE_UI_REQUEST_TIMEOUT = (WLAN_REASON_CODE_MSM_CONNECT_BASE + 17), /// The security settings are not supported. WLAN_REASON_CODE_UNSUPPORTED_SECURITY_SET = (WLAN_REASON_CODE_MSM_BASE + 2), /// The security settings are not supported by the operating system. WLAN_REASON_CODE_UNSUPPORTED_SECURITY_SET_BY_OS = (WLAN_REASON_CODE_MSM_BASE + 1), /// User has canceled the operation. WLAN_REASON_CODE_USER_CANCELLED = (WLAN_REASON_CODE_MSM_CONNECT_BASE + 1), /// The wireless network is blocked by the user. WLAN_REASON_CODE_USER_DENIED = (WLAN_REASON_CODE_AC_CONNECT_BASE + 4), /// The user is not responding. WLAN_REASON_CODE_USER_NOT_RESPOND = (WLAN_REASON_CODE_AC_CONNECT_BASE + 14), } /// /// The WLAN_SECURABLE_OBJECT enumerated type defines the securable objects used by Native Wifi Functions. /// /// These objects can be secured using WlanSetSecuritySettings. The current permissions associated with these objects can be /// retrieved using WlanGetSecuritySettings. For more information about the use of securable objects, see How DACLs Control Access /// to an Object. /// /// /// /// These objects can be secured using WlanSetSecuritySettings. The current permissions associated with these objects can be /// retrieved using WlanGetSecuritySettings. For more information about the use of securable objects, see How DACLs Control Access /// to an Object and Native Wifi API Permissions. /// // https://docs.microsoft.com/en-us/windows/win32/api/wlanapi/ne-wlanapi-wlan_securable_object typedef enum _WLAN_SECURABLE_OBJECT { // wlan_secure_permit_list, wlan_secure_deny_list, wlan_secure_ac_enabled, wlan_secure_bc_scan_enabled, wlan_secure_bss_type, // wlan_secure_show_denied, wlan_secure_interface_properties, wlan_secure_ihv_control, wlan_secure_all_user_profiles_order, // wlan_secure_add_new_all_user_profiles, wlan_secure_add_new_per_user_profiles, wlan_secure_media_streaming_mode_enabled, // wlan_secure_current_operation_mode, wlan_secure_get_plaintext_key, wlan_secure_hosted_network_elevated_access, // wlan_secure_virtual_station_extensibility, wlan_secure_wfd_elevated_access, WLAN_SECURABLE_OBJECT_COUNT } WLAN_SECURABLE_OBJECT, *PWLAN_SECURABLE_OBJECT; [PInvokeData("wlanapi.h", MSDNShortId = "1f6e1460-d27f-4800-8a32-6f9f509753cf")] public enum WLAN_SECURABLE_OBJECT { /// /// The permissions for modifying the permit list for user profiles.The discretionary access control lists (DACL) associated /// with this securable object is retrieved when either WlanGetFilterList or WlanSetFilterList is called with wlanFilterListType /// set to wlan_filter_list_type_user_permit. For the WlanGetFilterList call to succeed, the DACL must contain an access control /// entry (ACE) that grants WLAN_READ_ACCESS permission to the access token of the calling thread. For the WlanSetFilterList /// call to succeed, the DACL must contain an ACE that grants WLAN_WRITE_ACCESS permission to the access token of the calling thread. /// wlan_secure_permit_list, /// /// The permissions for modifying the deny list for user profiles. The auto config service will not establish a connection to a /// network on the deny list.The DACL associated with this securable object is retrieved when either WlanGetFilterList or /// WlanSetFilterList is called with wlanFilterListType set to wlan_filter_list_type_user_deny. For the WlanGetFilterList call /// to succeed, the DACL must contain an ACE that grants WLAN_READ_ACCESS permission to the access token of the calling thread. /// For the WlanSetFilterList call to succeed, the DACL must contain an ACE that grants WLAN_WRITE_ACCESS permission to the /// access token of the calling thread. /// wlan_secure_deny_list, /// /// The permissions for enabling the auto config service.The DACL associated with this securable object is retrieved when either /// WlanQueryInterface or WlanSetInterface is called with OpCode set to wlan_intf_opcode_autoconf_enabled. For the /// WlanQueryInterface call to succeed, the DACL must contain an ACE that grants WLAN_READ_ACCESS permission to the access token /// of the calling thread. For the WlanSetInterface call to succeed, the DACL must contain an ACE that grants WLAN_WRITE_ACCESS /// permission to the access token of the calling thread. /// wlan_secure_ac_enabled, /// /// The permissions for enabling background scans.The DACL associated with this securable object is retrieved when either /// WlanQueryInterface or WlanSetInterface is called with OpCode set to wlan_intf_opcode_background_scan_enabled. For the /// WlanQueryInterface call to succeed, the DACL must contain an ACE that grants WLAN_READ_ACCESS permission to the access token /// of the calling thread. For the WlanSetInterface call to succeed, the DACL must contain an ACE that grants WLAN_WRITE_ACCESS /// permission to the access token of the calling thread. /// wlan_secure_bc_scan_enabled, /// /// The permissions for altering the basic service set type.The DACL associated with this securable object is retrieved when /// either WlanQueryInterface or WlanSetInterface is called with OpCode set to wlan_intf_opcode_bss_type. For the /// WlanQueryInterface call to succeed, the DACL must contain an ACE that grants WLAN_READ_ACCESS permission to the access token /// of the calling thread. For the WlanSetInterface call to succeed, the DACL must contain an ACE that grants WLAN_WRITE_ACCESS /// permission to the access token of the calling thread. /// wlan_secure_bss_type, /// /// The permissions for modifying whether networks on the deny list appear in the available networks list.The DACL associated /// with this securable object is retrieved when either WlanQueryAutoConfigParameter or WlanSetAutoConfigParameter is called /// with OpCode set to wlan_autoconf_opcode_show_denied_networks. For the WlanQueryAutoConfigParameter call to succeed, the DACL /// must contain an ACE that grants WLAN_READ_ACCESS permission to the access token of the calling thread. For the /// WlanSetAutoConfigParameter call to succeed, the DACL must contain an ACE that grants WLAN_WRITE_ACCESS permission to the /// access token of the calling thread. /// wlan_secure_show_denied, /// /// The permissions for changing interface properties.This is the generic securable object used by WlanQueryInterface or /// WlanSetInterface when another more specific securable object is not used. Its DACL is retrieved whenever WlanQueryInterface /// or WlanSetInterface is access token of the calling thread and the OpCode is set to a value other than /// wlan_intf_opcode_autoconf_enabled, wlan_intf_opcode_background_scan_enabled, wlan_intf_opcode_media_streaming_mode, /// wlan_intf_opcode_bss_type, or wlan_intf_opcode_current_operation_mode. The DACL is also not retrieved when OpCode is set to /// wlan_intf_opcode_radio_state and the caller is the console user.For the WlanQueryInterface call to succeed, the DACL must /// contain an ACE that grants WLAN_READ_ACCESS permission to the access token of the calling thread. For the WlanSetInterface /// call to succeed, the DACL must contain an ACE that grants WLAN_WRITE_ACCESS permission to the access token of the calling thread. /// wlan_secure_interface_properties, /// /// The permissions for using the WlanIhvControl function for independent hardware vendor (IHV) control of WLAN drivers or /// services.The DACL associated with this securable object is retrieved when WlanIhvControl is called. For the call to succeed, /// the DACL must contain an ACE that grants WLAN_WRITE_ACCESS permission to the access token of the calling thread. /// wlan_secure_ihv_control, /// /// The permissions for modifying the order of all-user profiles.The DACL associated with this securable object is retrieved /// before WlanSetProfileList or WlanSetProfilePosition performs an operation that changes the relative order of all-user /// profiles in the profile list or moves an all-user profile to a lower position in the profile list. For either call to /// succeed, the DACL must contain an ACE that grants WLAN_WRITE_ACCESS permission to the access token of the calling thread. /// wlan_secure_all_user_profiles_order, /// /// The permissions for adding new all-user profiles.The DACL associated with this securable object is retrieved when /// WlanSetProfile is called with dwFlags set to 0. For the call to succeed, the DACL must contain an ACE that grants /// WLAN_WRITE_ACCESS permission to the access token of the calling thread. /// wlan_secure_add_new_all_user_profiles, /// /// The permissions for adding new per-user profiles.The DACL associated with this securable object is retrieved when /// WlanSetProfile is called with dwFlags set to WLAN_PROFILE_USER. For the call to succeed, the DACL must contain an ACE that /// grants WLAN_WRITE_ACCESS permission to the access token of the calling thread. /// wlan_secure_add_new_per_user_profiles, /// /// The permissions for setting or querying the media streaming mode.The DACL associated with this securable object is retrieved /// when either WlanQueryInterface or WlanSetInterface is called with OpCode set to wlan_intf_opcode_media_streaming_mode. For /// the WlanQueryInterface call to succeed, the DACL must contain an ACE that grants WLAN_READ_ACCESS permission to the access /// token of the calling thread. For the WlanSetInterface call to succeed, the DACL must contain an ACE that grants /// WLAN_WRITE_ACCESS permission to the access token of the calling thread. /// wlan_secure_media_streaming_mode_enabled, /// /// The permissions for setting or querying the operation mode of the wireless interface.The DACL associated with this securable /// object is retrieved when either WlanQueryInterface or WlanSetInterface is called with OpCode set to /// wlan_intf_opcode_current_operation_mode. For the WlanQueryInterface call to succeed, the DACL must contain an ACE that /// grants WLAN_READ_ACCESS permission to the access token of the calling thread. For the WlanSetInterface call to succeed, the /// DACL must contain an ACE that grants WLAN_WRITE_ACCESS permission to the access token of the calling thread. /// wlan_secure_current_operation_mode, /// /// The permissions for retrieving the plain text key from a wireless profile. The DACL associated with this securable object is /// retrieved when the WlanGetProfile function is called with the WLAN_PROFILE_GET_PLAINTEXT_KEY flag set in the value pointed /// to by the pdwFlags parameter on input. For the WlanGetProfile call to succeed, the DACL must contain an ACE that grants /// WLAN_READ_ACCESS permission to the access token of the calling thread. By default, the permissions for retrieving the plain /// text key is allowed only to the members of the Administrators group on a local computer.Windows 7: This value is an /// extension to native wireless APIs added on Windows 7 and later. /// wlan_secure_get_plaintext_key, /// /// The permissions that have elevated access to call the privileged Hosted Network functions. The DACL associated with this /// securable object is retrieved when the WlanHostedNetworkSetProperty function is called with the OpCode parameter set to /// wlan_hosted_network_opcode_enable. For the WlanHostedNetworkSetProperty call to succeed, the DACL must contain an ACE that /// grants WLAN_WRITE_ACCESS permission to the access token of the calling thread. By default, the permission to set the /// wireless Hosted Network property to wlan_hosted_network_opcode_enable is allowed only to the members of the Administrators /// group on a local computer. The DACL associated with this securable object is retrieved when the WlanHostedNetworkForceStart /// function is called. For the WlanHostedNetworkForceStart call to succeed, the DACL must contain an ACE that grants /// WLAN_WRITE_ACCESS permission to the access token of the calling thread. By default, the permission to force start the /// wireless Hosted Network is allowed only to the members of the Administrators group on a local computer.Windows 7: This value /// is an extension to native wireless APIs added on Windows 7 and later. /// wlan_secure_hosted_network_elevated_access, /// Windows 7: This value is an extension to native wireless APIs added on Windows 7 and later. wlan_secure_virtual_station_extensibility, /// /// This value is reserved for internal use by the Wi-Fi Direct service. Windows 8: This value is an extension to native /// wireless APIs added on Windows 8 and later. /// wlan_secure_wfd_elevated_access, /// WLAN_SECURABLE_OBJECT_COUNT, } /// EAPHost data storage flags [PInvokeData("wlanapi.h")] public enum WLAN_SET_EAPHOST { /// Set EAP host data for all users of this profile. WLAN_SET_EAPHOST_DATA_ALL_USERS = 0x00000001 } } }