Automatic Configuration Functions
Other versions of this page are also available for the following:
8/28/2008
The following table shows the Automatic Configuration functions with a description of the purpose of each.
Programming element | Description |
---|---|
This function releases memory associated from a corresponding call to WZCQueryInterface by deleting an INTF_ENTRY object that is allocated within a remote procedure call (RPC). |
|
This function releases memory associated from a corresponding call to WZCQueryInterfaceEx by deleting an INTF_ENTRY_EX object that is allocated within an RPC. |
|
This function provides a table containing key information for all managed interfaces. |
|
This function translates a user password into a 256-bit network key. |
|
This function retrieves Wireless Zero Configuration (WZC) service parameters. |
|
This function provides detailed information for a given interface. |
|
This extended function provides detailed information for the specified Wireless Network Interface Card (WNIC) as they are cached in the Wireless Automatic Configuration driver (WZCSVC) as the internal context associated with the interface. It also returns information about the NIC capabilities and version, which is useful for determining whether the network adapter supports specific security modes. |
|
This function refreshes specific interface information. |
|
This extended function refreshes specific information in the interface. It also refreshes information about the NIC capabilities and version, which is useful for determining whether the network adapter supports specific security modes. |
|
This function sets specified WZC service parameters. |
|
This function sets specific interface information. |
|
This extended function sets detailed information for the specified Wireless NIC as they are cached in the Wireless Automatic Configuration driver (WZCSVC) as the internal context associated with the interface. It also sets information about the NIC capabilities and version, which is useful for determining whether the network adapter supports specific security modes. |
|
This function enumerates all of the Extensible Authentication Protocol (EAP) extensions currently installed on the device. |
|
This function is called when an application starts or stops a stream with real-time periodic data. |
|
This function is called to query the current latency-sensitive mode settings. |