#include <driver.h>
Public Attributes | |
int | auth_alg |
const u8 * | bssid |
int | drop_unencrypted |
int | freq |
const u8 * | ft_ies |
size_t | ft_ies_len |
const u8 * | ft_md |
enum wpa_cipher | group_suite |
enum wpa_key_mgmt | key_mgmt_suite |
enum mfp_options | mgmt_frame_protection |
int | mode |
enum wpa_cipher | pairwise_suite |
const char * | passphrase |
const u8 * | prev_bssid |
const u8 * | psk |
const u8 * | ssid |
size_t | ssid_len |
const u8 * | wep_key [4] |
size_t | wep_key_len [4] |
int | wep_tx_keyidx |
const u8 * | wpa_ie |
size_t | wpa_ie_len |
struct wpa_driver_associate_params - Association parameters Data for struct wpa_driver_ops::associate().
const u8* wpa_driver_associate_params::bssid |
const u8* wpa_driver_associate_params::ft_ies |
ft_ies - IEEE 802.11r / FT information elements If the supplicant is using IEEE 802.11r (FT) and has the needed keys for fast transition, this parameter is set to include the IEs that are to be sent in the next FT Authentication Request message. update_ft_ies() handler is called to update the IEs for further FT messages in the sequence.
The driver should use these IEs only if the target AP is advertising the same mobility domain as the one included in the MDIE here.
In ap_scan=2 mode, the driver can use these IEs when moving to a new AP after the initial association. These IEs can only be used if the target AP is advertising support for FT and is using the same MDIE and SSID as the current AP.
The driver is responsible for reporting the FT IEs received from the AP's response using wpa_supplicant_event() with EVENT_FT_RESPONSE type. update_ft_ies() handler will then be called with the FT IEs to include in the next frame in the authentication sequence.
const u8* wpa_driver_associate_params::ft_md |
const char* wpa_driver_associate_params::passphrase |
passphrase - RSN passphrase for PSK
This value is made available only for WPA/WPA2-Personal (PSK) and only for drivers that set WPA_DRIVER_FLAGS_4WAY_HANDSHAKE. This is the 8..63 character ASCII passphrase, if available. Please note that this can be NULL if passphrase was not used to generate the PSK. In that case, the psk field must be used to fetch the PSK.
const u8* wpa_driver_associate_params::prev_bssid |
const u8* wpa_driver_associate_params::psk |
psk - RSN PSK (alternative for passphrase for PSK)
This value is made available only for WPA/WPA2-Personal (PSK) and only for drivers that set WPA_DRIVER_FLAGS_4WAY_HANDSHAKE. This is the 32-octet (256-bit) PSK, if available. The driver wrapper should be prepared to handle NULL value as an error.
const u8* wpa_driver_associate_params::ssid |
const u8* wpa_driver_associate_params::wep_key[4] |
size_t wpa_driver_associate_params::wep_key_len[4] |
const u8* wpa_driver_associate_params::wpa_ie |
wpa_ie - WPA information element for (Re)Association Request WPA information element to be included in (Re)Association Request (including information element id and length). Use of this WPA IE is optional. If the driver generates the WPA IE, it can use pairwise_suite, group_suite, and key_mgmt_suite to select proper algorithms. In this case, the driver has to notify wpa_supplicant about the used WPA IE by generating an event that the interface code will convert into EVENT_ASSOCINFO data (see below).
When using WPA2/IEEE 802.11i, wpa_ie is used for RSN IE instead. The driver can determine which version is used by looking at the first byte of the IE (0xdd for WPA, 0x30 for WPA2/RSN).
When using WPS, wpa_ie is used for WPS IE instead of WPA/RSN IE.