2007-04-24 03:20:05 +08:00
|
|
|
#ifndef __NET_CFG80211_H
|
|
|
|
#define __NET_CFG80211_H
|
2009-04-20 20:31:42 +08:00
|
|
|
/*
|
|
|
|
* 802.11 device and configuration interface
|
|
|
|
*
|
2010-02-15 18:53:10 +08:00
|
|
|
* Copyright 2006-2010 Johannes Berg <johannes@sipsolutions.net>
|
2009-04-20 20:31:42 +08:00
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License version 2 as
|
|
|
|
* published by the Free Software Foundation.
|
|
|
|
*/
|
2007-04-24 03:20:05 +08:00
|
|
|
|
2009-04-20 20:31:42 +08:00
|
|
|
#include <linux/netdevice.h>
|
|
|
|
#include <linux/debugfs.h>
|
|
|
|
#include <linux/list.h>
|
2007-04-24 03:20:05 +08:00
|
|
|
#include <linux/netlink.h>
|
|
|
|
#include <linux/skbuff.h>
|
2007-09-21 01:09:35 +08:00
|
|
|
#include <linux/nl80211.h>
|
2009-02-11 04:25:55 +08:00
|
|
|
#include <linux/if_ether.h>
|
|
|
|
#include <linux/ieee80211.h>
|
2009-04-20 20:31:42 +08:00
|
|
|
#include <net/regulatory.h>
|
|
|
|
|
2010-08-19 22:11:27 +08:00
|
|
|
/**
|
|
|
|
* DOC: Introduction
|
|
|
|
*
|
|
|
|
* cfg80211 is the configuration API for 802.11 devices in Linux. It bridges
|
|
|
|
* userspace and drivers, and offers some utility functionality associated
|
|
|
|
* with 802.11. cfg80211 must, directly or indirectly via mac80211, be used
|
|
|
|
* by all modern wireless drivers in Linux, so that they offer a consistent
|
|
|
|
* API through nl80211. For backward compatibility, cfg80211 also offers
|
|
|
|
* wireless extensions to userspace, but hides them from drivers completely.
|
|
|
|
*
|
|
|
|
* Additionally, cfg80211 contains code to help enforce regulatory spectrum
|
|
|
|
* use restrictions.
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* DOC: Device registration
|
|
|
|
*
|
|
|
|
* In order for a driver to use cfg80211, it must register the hardware device
|
|
|
|
* with cfg80211. This happens through a number of hardware capability structs
|
|
|
|
* described below.
|
|
|
|
*
|
|
|
|
* The fundamental structure for each device is the 'wiphy', of which each
|
|
|
|
* instance describes a physical wireless device connected to the system. Each
|
|
|
|
* such wiphy can have zero, one, or many virtual interfaces associated with
|
|
|
|
* it, which need to be identified as such by pointing the network interface's
|
|
|
|
* @ieee80211_ptr pointer to a &struct wireless_dev which further describes
|
|
|
|
* the wireless part of the interface, normally this struct is embedded in the
|
|
|
|
* network interface's private data area. Drivers can optionally allow creating
|
|
|
|
* or destroying virtual interfaces on the fly, but without at least one or the
|
|
|
|
* ability to create some the wireless device isn't useful.
|
|
|
|
*
|
|
|
|
* Each wiphy structure contains device capability information, and also has
|
|
|
|
* a pointer to the various operations the driver offers. The definitions and
|
|
|
|
* structures here describe these capabilities in detail.
|
|
|
|
*/
|
|
|
|
|
2007-04-24 03:20:05 +08:00
|
|
|
/*
|
2009-04-20 20:31:42 +08:00
|
|
|
* wireless hardware capability structures
|
|
|
|
*/
|
|
|
|
|
|
|
|
/**
|
|
|
|
* enum ieee80211_band - supported frequency bands
|
|
|
|
*
|
|
|
|
* The bands are assigned this way because the supported
|
|
|
|
* bitrates differ in these bands.
|
2007-04-24 03:20:05 +08:00
|
|
|
*
|
2009-04-20 20:31:42 +08:00
|
|
|
* @IEEE80211_BAND_2GHZ: 2.4GHz ISM band
|
|
|
|
* @IEEE80211_BAND_5GHZ: around 5GHz band (4.9-5.7)
|
2010-06-07 17:12:27 +08:00
|
|
|
* @IEEE80211_NUM_BANDS: number of defined bands
|
2007-04-24 03:20:05 +08:00
|
|
|
*/
|
2009-04-20 20:31:42 +08:00
|
|
|
enum ieee80211_band {
|
2009-12-29 18:59:45 +08:00
|
|
|
IEEE80211_BAND_2GHZ = NL80211_BAND_2GHZ,
|
|
|
|
IEEE80211_BAND_5GHZ = NL80211_BAND_5GHZ,
|
2009-04-20 20:31:42 +08:00
|
|
|
|
|
|
|
/* keep last */
|
|
|
|
IEEE80211_NUM_BANDS
|
|
|
|
};
|
2007-04-24 03:20:05 +08:00
|
|
|
|
2008-02-23 22:17:06 +08:00
|
|
|
/**
|
2009-04-20 20:31:42 +08:00
|
|
|
* enum ieee80211_channel_flags - channel flags
|
|
|
|
*
|
|
|
|
* Channel flags set by the regulatory control code.
|
|
|
|
*
|
|
|
|
* @IEEE80211_CHAN_DISABLED: This channel is disabled.
|
|
|
|
* @IEEE80211_CHAN_PASSIVE_SCAN: Only passive scanning is permitted
|
|
|
|
* on this channel.
|
|
|
|
* @IEEE80211_CHAN_NO_IBSS: IBSS is not allowed on this channel.
|
|
|
|
* @IEEE80211_CHAN_RADAR: Radar detection is required on this channel.
|
2009-05-02 12:37:18 +08:00
|
|
|
* @IEEE80211_CHAN_NO_HT40PLUS: extension channel above this channel
|
2009-04-20 20:31:42 +08:00
|
|
|
* is not permitted.
|
2009-05-02 12:37:18 +08:00
|
|
|
* @IEEE80211_CHAN_NO_HT40MINUS: extension channel below this channel
|
2009-04-20 20:31:42 +08:00
|
|
|
* is not permitted.
|
2008-02-23 22:17:06 +08:00
|
|
|
*/
|
2009-04-20 20:31:42 +08:00
|
|
|
enum ieee80211_channel_flags {
|
|
|
|
IEEE80211_CHAN_DISABLED = 1<<0,
|
|
|
|
IEEE80211_CHAN_PASSIVE_SCAN = 1<<1,
|
|
|
|
IEEE80211_CHAN_NO_IBSS = 1<<2,
|
|
|
|
IEEE80211_CHAN_RADAR = 1<<3,
|
2009-05-02 12:37:18 +08:00
|
|
|
IEEE80211_CHAN_NO_HT40PLUS = 1<<4,
|
|
|
|
IEEE80211_CHAN_NO_HT40MINUS = 1<<5,
|
2008-02-23 22:17:06 +08:00
|
|
|
};
|
|
|
|
|
2009-05-02 12:37:17 +08:00
|
|
|
#define IEEE80211_CHAN_NO_HT40 \
|
2009-05-02 12:37:18 +08:00
|
|
|
(IEEE80211_CHAN_NO_HT40PLUS | IEEE80211_CHAN_NO_HT40MINUS)
|
2009-05-02 12:37:17 +08:00
|
|
|
|
2009-04-20 20:31:42 +08:00
|
|
|
/**
|
|
|
|
* struct ieee80211_channel - channel definition
|
|
|
|
*
|
|
|
|
* This structure describes a single channel for use
|
|
|
|
* with cfg80211.
|
|
|
|
*
|
|
|
|
* @center_freq: center frequency in MHz
|
|
|
|
* @hw_value: hardware-specific value for the channel
|
|
|
|
* @flags: channel flags from &enum ieee80211_channel_flags.
|
|
|
|
* @orig_flags: channel flags at registration time, used by regulatory
|
|
|
|
* code to support devices with additional restrictions
|
|
|
|
* @band: band this channel belongs to.
|
|
|
|
* @max_antenna_gain: maximum antenna gain in dBi
|
|
|
|
* @max_power: maximum transmission power (in dBm)
|
2012-01-12 02:33:39 +08:00
|
|
|
* @max_reg_power: maximum regulatory transmission power (in dBm)
|
2009-04-20 20:31:42 +08:00
|
|
|
* @beacon_found: helper to regulatory code to indicate when a beacon
|
|
|
|
* has been found on this channel. Use regulatory_hint_found_beacon()
|
2010-05-18 19:44:54 +08:00
|
|
|
* to enable this, this is useful only on 5 GHz band.
|
2009-04-20 20:31:42 +08:00
|
|
|
* @orig_mag: internal use
|
|
|
|
* @orig_mpwr: internal use
|
2007-07-11 01:29:38 +08:00
|
|
|
*/
|
2009-04-20 20:31:42 +08:00
|
|
|
struct ieee80211_channel {
|
|
|
|
enum ieee80211_band band;
|
|
|
|
u16 center_freq;
|
|
|
|
u16 hw_value;
|
|
|
|
u32 flags;
|
|
|
|
int max_antenna_gain;
|
|
|
|
int max_power;
|
2012-01-12 02:33:39 +08:00
|
|
|
int max_reg_power;
|
2009-04-20 20:31:42 +08:00
|
|
|
bool beacon_found;
|
|
|
|
u32 orig_flags;
|
|
|
|
int orig_mag, orig_mpwr;
|
|
|
|
};
|
|
|
|
|
2007-07-11 01:29:38 +08:00
|
|
|
/**
|
2009-04-20 20:31:42 +08:00
|
|
|
* enum ieee80211_rate_flags - rate flags
|
|
|
|
*
|
|
|
|
* Hardware/specification flags for rates. These are structured
|
|
|
|
* in a way that allows using the same bitrate structure for
|
|
|
|
* different bands/PHY modes.
|
|
|
|
*
|
|
|
|
* @IEEE80211_RATE_SHORT_PREAMBLE: Hardware can send with short
|
|
|
|
* preamble on this bitrate; only relevant in 2.4GHz band and
|
|
|
|
* with CCK rates.
|
|
|
|
* @IEEE80211_RATE_MANDATORY_A: This bitrate is a mandatory rate
|
|
|
|
* when used with 802.11a (on the 5 GHz band); filled by the
|
|
|
|
* core code when registering the wiphy.
|
|
|
|
* @IEEE80211_RATE_MANDATORY_B: This bitrate is a mandatory rate
|
|
|
|
* when used with 802.11b (on the 2.4 GHz band); filled by the
|
|
|
|
* core code when registering the wiphy.
|
|
|
|
* @IEEE80211_RATE_MANDATORY_G: This bitrate is a mandatory rate
|
|
|
|
* when used with 802.11g (on the 2.4 GHz band); filled by the
|
|
|
|
* core code when registering the wiphy.
|
|
|
|
* @IEEE80211_RATE_ERP_G: This is an ERP rate in 802.11g mode.
|
2007-07-11 01:29:38 +08:00
|
|
|
*/
|
2009-04-20 20:31:42 +08:00
|
|
|
enum ieee80211_rate_flags {
|
|
|
|
IEEE80211_RATE_SHORT_PREAMBLE = 1<<0,
|
|
|
|
IEEE80211_RATE_MANDATORY_A = 1<<1,
|
|
|
|
IEEE80211_RATE_MANDATORY_B = 1<<2,
|
|
|
|
IEEE80211_RATE_MANDATORY_G = 1<<3,
|
|
|
|
IEEE80211_RATE_ERP_G = 1<<4,
|
|
|
|
};
|
2007-07-11 01:29:38 +08:00
|
|
|
|
2009-04-20 20:31:42 +08:00
|
|
|
/**
|
|
|
|
* struct ieee80211_rate - bitrate definition
|
|
|
|
*
|
|
|
|
* This structure describes a bitrate that an 802.11 PHY can
|
|
|
|
* operate with. The two values @hw_value and @hw_value_short
|
|
|
|
* are only for driver use when pointers to this structure are
|
|
|
|
* passed around.
|
|
|
|
*
|
|
|
|
* @flags: rate-specific flags
|
|
|
|
* @bitrate: bitrate in units of 100 Kbps
|
|
|
|
* @hw_value: driver/hardware value for this rate
|
|
|
|
* @hw_value_short: driver/hardware value for this rate when
|
|
|
|
* short preamble is used
|
|
|
|
*/
|
|
|
|
struct ieee80211_rate {
|
|
|
|
u32 flags;
|
|
|
|
u16 bitrate;
|
|
|
|
u16 hw_value, hw_value_short;
|
|
|
|
};
|
2007-07-11 01:29:38 +08:00
|
|
|
|
2009-04-20 20:31:42 +08:00
|
|
|
/**
|
|
|
|
* struct ieee80211_sta_ht_cap - STA's HT capabilities
|
|
|
|
*
|
|
|
|
* This structure describes most essential parameters needed
|
|
|
|
* to describe 802.11n HT capabilities for an STA.
|
|
|
|
*
|
|
|
|
* @ht_supported: is HT supported by the STA
|
|
|
|
* @cap: HT capabilities map as described in 802.11n spec
|
|
|
|
* @ampdu_factor: Maximum A-MPDU length factor
|
|
|
|
* @ampdu_density: Minimum A-MPDU spacing
|
|
|
|
* @mcs: Supported MCS rates
|
|
|
|
*/
|
|
|
|
struct ieee80211_sta_ht_cap {
|
|
|
|
u16 cap; /* use IEEE80211_HT_CAP_ */
|
|
|
|
bool ht_supported;
|
|
|
|
u8 ampdu_factor;
|
|
|
|
u8 ampdu_density;
|
|
|
|
struct ieee80211_mcs_info mcs;
|
2007-07-11 01:29:38 +08:00
|
|
|
};
|
|
|
|
|
2009-04-20 20:31:42 +08:00
|
|
|
/**
|
|
|
|
* struct ieee80211_supported_band - frequency band definition
|
|
|
|
*
|
|
|
|
* This structure describes a frequency band a wiphy
|
|
|
|
* is able to operate in.
|
|
|
|
*
|
|
|
|
* @channels: Array of channels the hardware can operate in
|
|
|
|
* in this band.
|
|
|
|
* @band: the band this structure represents
|
|
|
|
* @n_channels: Number of channels in @channels
|
|
|
|
* @bitrates: Array of bitrates the hardware can operate with
|
|
|
|
* in this band. Must be sorted to give a valid "supported
|
|
|
|
* rates" IE, i.e. CCK rates first, then OFDM.
|
|
|
|
* @n_bitrates: Number of bitrates in @bitrates
|
2010-06-07 17:12:27 +08:00
|
|
|
* @ht_cap: HT capabilities in this band
|
2009-04-20 20:31:42 +08:00
|
|
|
*/
|
|
|
|
struct ieee80211_supported_band {
|
|
|
|
struct ieee80211_channel *channels;
|
|
|
|
struct ieee80211_rate *bitrates;
|
|
|
|
enum ieee80211_band band;
|
|
|
|
int n_channels;
|
|
|
|
int n_bitrates;
|
|
|
|
struct ieee80211_sta_ht_cap ht_cap;
|
|
|
|
};
|
2007-07-11 01:29:38 +08:00
|
|
|
|
2009-04-20 20:31:42 +08:00
|
|
|
/*
|
|
|
|
* Wireless hardware/device configuration structures and methods
|
|
|
|
*/
|
2007-07-11 01:29:38 +08:00
|
|
|
|
2010-08-19 22:11:27 +08:00
|
|
|
/**
|
|
|
|
* DOC: Actions and configuration
|
|
|
|
*
|
|
|
|
* Each wireless device and each virtual interface offer a set of configuration
|
|
|
|
* operations and other actions that are invoked by userspace. Each of these
|
|
|
|
* actions is described in the operations structure, and the parameters these
|
|
|
|
* operations use are described separately.
|
|
|
|
*
|
|
|
|
* Additionally, some operations are asynchronous and expect to get status
|
|
|
|
* information via some functions that drivers need to call.
|
|
|
|
*
|
|
|
|
* Scanning and BSS list handling with its associated functionality is described
|
|
|
|
* in a separate chapter.
|
|
|
|
*/
|
|
|
|
|
2009-04-20 20:31:42 +08:00
|
|
|
/**
|
|
|
|
* struct vif_params - describes virtual interface parameters
|
2009-11-11 01:53:10 +08:00
|
|
|
* @use_4addr: use 4-address frames
|
2009-04-20 20:31:42 +08:00
|
|
|
*/
|
|
|
|
struct vif_params {
|
2009-11-11 01:53:10 +08:00
|
|
|
int use_4addr;
|
2009-04-20 20:31:42 +08:00
|
|
|
};
|
2007-07-11 01:29:38 +08:00
|
|
|
|
2009-04-20 20:31:42 +08:00
|
|
|
/**
|
2007-12-19 09:03:29 +08:00
|
|
|
* struct key_params - key information
|
|
|
|
*
|
|
|
|
* Information about a key
|
|
|
|
*
|
|
|
|
* @key: key material
|
|
|
|
* @key_len: length of key material
|
|
|
|
* @cipher: cipher suite selector
|
|
|
|
* @seq: sequence counter (IV/PN) for TKIP and CCMP keys, only used
|
|
|
|
* with the get_key() callback, must be in little endian,
|
|
|
|
* length given by @seq_len.
|
2010-06-07 17:12:27 +08:00
|
|
|
* @seq_len: length of @seq.
|
2007-12-19 09:03:29 +08:00
|
|
|
*/
|
|
|
|
struct key_params {
|
|
|
|
u8 *key;
|
|
|
|
u8 *seq;
|
|
|
|
int key_len;
|
|
|
|
int seq_len;
|
|
|
|
u32 cipher;
|
|
|
|
};
|
|
|
|
|
2009-11-11 19:25:40 +08:00
|
|
|
/**
|
|
|
|
* enum survey_info_flags - survey information flags
|
|
|
|
*
|
2010-06-07 17:12:27 +08:00
|
|
|
* @SURVEY_INFO_NOISE_DBM: noise (in dBm) was filled in
|
2010-09-29 23:15:30 +08:00
|
|
|
* @SURVEY_INFO_IN_USE: channel is currently being used
|
2010-10-09 08:39:29 +08:00
|
|
|
* @SURVEY_INFO_CHANNEL_TIME: channel active time (in ms) was filled in
|
|
|
|
* @SURVEY_INFO_CHANNEL_TIME_BUSY: channel busy time was filled in
|
|
|
|
* @SURVEY_INFO_CHANNEL_TIME_EXT_BUSY: extension channel busy time was filled in
|
|
|
|
* @SURVEY_INFO_CHANNEL_TIME_RX: channel receive time was filled in
|
|
|
|
* @SURVEY_INFO_CHANNEL_TIME_TX: channel transmit time was filled in
|
2010-06-07 17:12:27 +08:00
|
|
|
*
|
2009-11-11 19:25:40 +08:00
|
|
|
* Used by the driver to indicate which info in &struct survey_info
|
|
|
|
* it has filled in during the get_survey().
|
|
|
|
*/
|
|
|
|
enum survey_info_flags {
|
|
|
|
SURVEY_INFO_NOISE_DBM = 1<<0,
|
2010-09-29 23:15:30 +08:00
|
|
|
SURVEY_INFO_IN_USE = 1<<1,
|
2010-10-09 08:39:29 +08:00
|
|
|
SURVEY_INFO_CHANNEL_TIME = 1<<2,
|
|
|
|
SURVEY_INFO_CHANNEL_TIME_BUSY = 1<<3,
|
|
|
|
SURVEY_INFO_CHANNEL_TIME_EXT_BUSY = 1<<4,
|
|
|
|
SURVEY_INFO_CHANNEL_TIME_RX = 1<<5,
|
|
|
|
SURVEY_INFO_CHANNEL_TIME_TX = 1<<6,
|
2009-11-11 19:25:40 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* struct survey_info - channel survey response
|
|
|
|
*
|
|
|
|
* @channel: the channel this survey record reports, mandatory
|
|
|
|
* @filled: bitflag of flags from &enum survey_info_flags
|
|
|
|
* @noise: channel noise in dBm. This and all following fields are
|
|
|
|
* optional
|
2010-10-09 08:39:29 +08:00
|
|
|
* @channel_time: amount of time in ms the radio spent on the channel
|
|
|
|
* @channel_time_busy: amount of time the primary channel was sensed busy
|
|
|
|
* @channel_time_ext_busy: amount of time the extension channel was sensed busy
|
|
|
|
* @channel_time_rx: amount of time the radio spent receiving data
|
|
|
|
* @channel_time_tx: amount of time the radio spent transmitting data
|
2009-11-11 19:25:40 +08:00
|
|
|
*
|
2010-06-07 17:12:27 +08:00
|
|
|
* Used by dump_survey() to report back per-channel survey information.
|
|
|
|
*
|
2009-11-11 19:25:40 +08:00
|
|
|
* This structure can later be expanded with things like
|
|
|
|
* channel duty cycle etc.
|
|
|
|
*/
|
|
|
|
struct survey_info {
|
|
|
|
struct ieee80211_channel *channel;
|
2010-10-09 08:39:29 +08:00
|
|
|
u64 channel_time;
|
|
|
|
u64 channel_time_busy;
|
|
|
|
u64 channel_time_ext_busy;
|
|
|
|
u64 channel_time_rx;
|
|
|
|
u64 channel_time_tx;
|
2009-11-11 19:25:40 +08:00
|
|
|
u32 filled;
|
|
|
|
s8 noise;
|
|
|
|
};
|
|
|
|
|
2011-08-11 04:54:35 +08:00
|
|
|
/**
|
|
|
|
* struct cfg80211_crypto_settings - Crypto settings
|
|
|
|
* @wpa_versions: indicates which, if any, WPA versions are enabled
|
|
|
|
* (from enum nl80211_wpa_versions)
|
|
|
|
* @cipher_group: group key cipher suite (or 0 if unset)
|
|
|
|
* @n_ciphers_pairwise: number of AP supported unicast ciphers
|
|
|
|
* @ciphers_pairwise: unicast key cipher suites
|
|
|
|
* @n_akm_suites: number of AKM suites
|
|
|
|
* @akm_suites: AKM suites
|
|
|
|
* @control_port: Whether user space controls IEEE 802.1X port, i.e.,
|
|
|
|
* sets/clears %NL80211_STA_FLAG_AUTHORIZED. If true, the driver is
|
|
|
|
* required to assume that the port is unauthorized until authorized by
|
|
|
|
* user space. Otherwise, port is marked authorized by default.
|
|
|
|
* @control_port_ethertype: the control port protocol that should be
|
|
|
|
* allowed through even on unauthorized ports
|
|
|
|
* @control_port_no_encrypt: TRUE to prevent encryption of control port
|
|
|
|
* protocol frames.
|
|
|
|
*/
|
|
|
|
struct cfg80211_crypto_settings {
|
|
|
|
u32 wpa_versions;
|
|
|
|
u32 cipher_group;
|
|
|
|
int n_ciphers_pairwise;
|
|
|
|
u32 ciphers_pairwise[NL80211_MAX_NR_CIPHER_SUITES];
|
|
|
|
int n_akm_suites;
|
|
|
|
u32 akm_suites[NL80211_MAX_NR_AKM_SUITES];
|
|
|
|
bool control_port;
|
|
|
|
__be16 control_port_ethertype;
|
|
|
|
bool control_port_no_encrypt;
|
|
|
|
};
|
|
|
|
|
2007-12-19 09:03:32 +08:00
|
|
|
/**
|
2012-02-13 22:17:18 +08:00
|
|
|
* struct cfg80211_beacon_data - beacon data
|
2007-12-19 09:03:32 +08:00
|
|
|
* @head: head portion of beacon (before TIM IE)
|
|
|
|
* or %NULL if not changed
|
|
|
|
* @tail: tail portion of beacon (after TIM IE)
|
|
|
|
* or %NULL if not changed
|
|
|
|
* @head_len: length of @head
|
|
|
|
* @tail_len: length of @tail
|
2011-08-11 04:55:56 +08:00
|
|
|
* @beacon_ies: extra information element(s) to add into Beacon frames or %NULL
|
|
|
|
* @beacon_ies_len: length of beacon_ies in octets
|
|
|
|
* @proberesp_ies: extra information element(s) to add into Probe Response
|
|
|
|
* frames or %NULL
|
|
|
|
* @proberesp_ies_len: length of proberesp_ies in octets
|
|
|
|
* @assocresp_ies: extra information element(s) to add into (Re)Association
|
|
|
|
* Response frames or %NULL
|
|
|
|
* @assocresp_ies_len: length of assocresp_ies in octets
|
2011-11-10 17:28:56 +08:00
|
|
|
* @probe_resp_len: length of probe response template (@probe_resp)
|
|
|
|
* @probe_resp: probe response template (AP mode only)
|
2007-12-19 09:03:32 +08:00
|
|
|
*/
|
2012-02-13 22:17:18 +08:00
|
|
|
struct cfg80211_beacon_data {
|
|
|
|
const u8 *head, *tail;
|
|
|
|
const u8 *beacon_ies;
|
|
|
|
const u8 *proberesp_ies;
|
|
|
|
const u8 *assocresp_ies;
|
|
|
|
const u8 *probe_resp;
|
|
|
|
|
|
|
|
size_t head_len, tail_len;
|
|
|
|
size_t beacon_ies_len;
|
|
|
|
size_t proberesp_ies_len;
|
|
|
|
size_t assocresp_ies_len;
|
|
|
|
size_t probe_resp_len;
|
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* struct cfg80211_ap_settings - AP configuration
|
|
|
|
*
|
|
|
|
* Used to configure an AP interface.
|
|
|
|
*
|
|
|
|
* @beacon: beacon data
|
|
|
|
* @beacon_interval: beacon interval
|
|
|
|
* @dtim_period: DTIM period
|
|
|
|
* @ssid: SSID to be used in the BSS (note: may be %NULL if not provided from
|
|
|
|
* user space)
|
|
|
|
* @ssid_len: length of @ssid
|
|
|
|
* @hidden_ssid: whether to hide the SSID in Beacon/Probe Response frames
|
|
|
|
* @crypto: crypto settings
|
|
|
|
* @privacy: the BSS uses privacy
|
|
|
|
* @auth_type: Authentication type (algorithm)
|
|
|
|
*/
|
|
|
|
struct cfg80211_ap_settings {
|
|
|
|
struct cfg80211_beacon_data beacon;
|
|
|
|
|
|
|
|
int beacon_interval, dtim_period;
|
2011-08-11 04:53:31 +08:00
|
|
|
const u8 *ssid;
|
|
|
|
size_t ssid_len;
|
|
|
|
enum nl80211_hidden_ssid hidden_ssid;
|
2011-08-11 04:54:35 +08:00
|
|
|
struct cfg80211_crypto_settings crypto;
|
|
|
|
bool privacy;
|
|
|
|
enum nl80211_auth_type auth_type;
|
2007-12-19 09:03:32 +08:00
|
|
|
};
|
|
|
|
|
2008-02-23 22:17:06 +08:00
|
|
|
/**
|
|
|
|
* enum plink_action - actions to perform in mesh peers
|
|
|
|
*
|
|
|
|
* @PLINK_ACTION_INVALID: action 0 is reserved
|
|
|
|
* @PLINK_ACTION_OPEN: start mesh peer link establishment
|
2010-06-07 17:12:27 +08:00
|
|
|
* @PLINK_ACTION_BLOCK: block traffic from this mesh peer
|
2008-02-23 22:17:06 +08:00
|
|
|
*/
|
|
|
|
enum plink_actions {
|
|
|
|
PLINK_ACTION_INVALID,
|
|
|
|
PLINK_ACTION_OPEN,
|
|
|
|
PLINK_ACTION_BLOCK,
|
|
|
|
};
|
|
|
|
|
2011-09-28 02:56:12 +08:00
|
|
|
/**
|
|
|
|
* enum station_parameters_apply_mask - station parameter values to apply
|
|
|
|
* @STATION_PARAM_APPLY_UAPSD: apply new uAPSD parameters (uapsd_queues, max_sp)
|
|
|
|
*
|
|
|
|
* Not all station parameters have in-band "no change" signalling,
|
|
|
|
* for those that don't these flags will are used.
|
|
|
|
*/
|
|
|
|
enum station_parameters_apply_mask {
|
|
|
|
STATION_PARAM_APPLY_UAPSD = BIT(0),
|
|
|
|
};
|
|
|
|
|
2007-12-19 09:03:34 +08:00
|
|
|
/**
|
|
|
|
* struct station_parameters - station parameters
|
|
|
|
*
|
|
|
|
* Used to change and create a new station.
|
|
|
|
*
|
|
|
|
* @vlan: vlan interface station should belong to
|
|
|
|
* @supported_rates: supported rates in IEEE 802.11 format
|
|
|
|
* (or NULL for no change)
|
|
|
|
* @supported_rates_len: number of supported rates
|
2009-05-12 02:57:56 +08:00
|
|
|
* @sta_flags_mask: station flags that changed
|
|
|
|
* (bitmask of BIT(NL80211_STA_FLAG_...))
|
|
|
|
* @sta_flags_set: station flags values
|
|
|
|
* (bitmask of BIT(NL80211_STA_FLAG_...))
|
2007-12-19 09:03:34 +08:00
|
|
|
* @listen_interval: listen interval or -1 for no change
|
|
|
|
* @aid: AID or zero for no change
|
2010-06-07 17:12:27 +08:00
|
|
|
* @plink_action: plink action to take
|
2011-05-04 07:57:11 +08:00
|
|
|
* @plink_state: set the peer link state for a station
|
2010-06-07 17:12:27 +08:00
|
|
|
* @ht_capa: HT capabilities of station
|
2011-09-11 14:46:55 +08:00
|
|
|
* @uapsd_queues: bitmap of queues configured for uapsd. same format
|
|
|
|
* as the AC bitmap in the QoS info field
|
|
|
|
* @max_sp: max Service Period. same format as the MAX_SP in the
|
|
|
|
* QoS info field (but already shifted down)
|
2011-11-08 16:20:07 +08:00
|
|
|
* @sta_modify_mask: bitmap indicating which parameters changed
|
|
|
|
* (for those that don't have a natural "no change" value),
|
|
|
|
* see &enum station_parameters_apply_mask
|
2007-12-19 09:03:34 +08:00
|
|
|
*/
|
|
|
|
struct station_parameters {
|
|
|
|
u8 *supported_rates;
|
|
|
|
struct net_device *vlan;
|
2009-05-12 02:57:56 +08:00
|
|
|
u32 sta_flags_mask, sta_flags_set;
|
2011-09-28 02:56:12 +08:00
|
|
|
u32 sta_modify_mask;
|
2007-12-19 09:03:34 +08:00
|
|
|
int listen_interval;
|
|
|
|
u16 aid;
|
|
|
|
u8 supported_rates_len;
|
2008-02-23 22:17:06 +08:00
|
|
|
u8 plink_action;
|
2011-05-04 07:57:11 +08:00
|
|
|
u8 plink_state;
|
2008-08-25 16:58:58 +08:00
|
|
|
struct ieee80211_ht_cap *ht_capa;
|
2011-08-23 19:37:46 +08:00
|
|
|
u8 uapsd_queues;
|
|
|
|
u8 max_sp;
|
2007-12-19 09:03:34 +08:00
|
|
|
};
|
|
|
|
|
2007-12-19 09:03:36 +08:00
|
|
|
/**
|
2008-02-23 22:17:06 +08:00
|
|
|
* enum station_info_flags - station information flags
|
2007-12-19 09:03:36 +08:00
|
|
|
*
|
2008-02-23 22:17:06 +08:00
|
|
|
* Used by the driver to indicate which info in &struct station_info
|
|
|
|
* it has filled in during get_station() or dump_station().
|
2007-12-19 09:03:36 +08:00
|
|
|
*
|
2008-02-23 22:17:06 +08:00
|
|
|
* @STATION_INFO_INACTIVE_TIME: @inactive_time filled
|
|
|
|
* @STATION_INFO_RX_BYTES: @rx_bytes filled
|
|
|
|
* @STATION_INFO_TX_BYTES: @tx_bytes filled
|
|
|
|
* @STATION_INFO_LLID: @llid filled
|
|
|
|
* @STATION_INFO_PLID: @plid filled
|
|
|
|
* @STATION_INFO_PLINK_STATE: @plink_state filled
|
2008-12-12 05:04:19 +08:00
|
|
|
* @STATION_INFO_SIGNAL: @signal filled
|
2011-02-28 05:08:00 +08:00
|
|
|
* @STATION_INFO_TX_BITRATE: @txrate fields are filled
|
2008-12-12 05:04:19 +08:00
|
|
|
* (tx_bitrate, tx_bitrate_flags and tx_bitrate_mcs)
|
2009-02-17 19:24:57 +08:00
|
|
|
* @STATION_INFO_RX_PACKETS: @rx_packets filled
|
|
|
|
* @STATION_INFO_TX_PACKETS: @tx_packets filled
|
2010-10-06 17:34:12 +08:00
|
|
|
* @STATION_INFO_TX_RETRIES: @tx_retries filled
|
|
|
|
* @STATION_INFO_TX_FAILED: @tx_failed filled
|
2010-10-08 07:39:20 +08:00
|
|
|
* @STATION_INFO_RX_DROP_MISC: @rx_dropped_misc filled
|
2010-12-02 18:12:43 +08:00
|
|
|
* @STATION_INFO_SIGNAL_AVG: @signal_avg filled
|
2011-02-28 05:08:00 +08:00
|
|
|
* @STATION_INFO_RX_BITRATE: @rxrate fields are filled
|
2011-04-01 00:25:41 +08:00
|
|
|
* @STATION_INFO_BSS_PARAM: @bss_param filled
|
2011-04-08 23:54:24 +08:00
|
|
|
* @STATION_INFO_CONNECTED_TIME: @connected_time filled
|
2011-08-11 09:00:33 +08:00
|
|
|
* @STATION_INFO_ASSOC_REQ_IES: @assoc_req_ies filled
|
2011-10-13 22:30:39 +08:00
|
|
|
* @STATION_INFO_STA_FLAGS: @sta_flags filled
|
2011-12-10 03:01:49 +08:00
|
|
|
* @STATION_INFO_BEACON_LOSS_COUNT: @beacon_loss_count filled
|
2007-12-19 09:03:36 +08:00
|
|
|
*/
|
2008-02-23 22:17:06 +08:00
|
|
|
enum station_info_flags {
|
|
|
|
STATION_INFO_INACTIVE_TIME = 1<<0,
|
|
|
|
STATION_INFO_RX_BYTES = 1<<1,
|
|
|
|
STATION_INFO_TX_BYTES = 1<<2,
|
|
|
|
STATION_INFO_LLID = 1<<3,
|
|
|
|
STATION_INFO_PLID = 1<<4,
|
|
|
|
STATION_INFO_PLINK_STATE = 1<<5,
|
2008-12-12 05:04:19 +08:00
|
|
|
STATION_INFO_SIGNAL = 1<<6,
|
|
|
|
STATION_INFO_TX_BITRATE = 1<<7,
|
2009-02-17 19:24:57 +08:00
|
|
|
STATION_INFO_RX_PACKETS = 1<<8,
|
|
|
|
STATION_INFO_TX_PACKETS = 1<<9,
|
2010-10-06 17:34:12 +08:00
|
|
|
STATION_INFO_TX_RETRIES = 1<<10,
|
|
|
|
STATION_INFO_TX_FAILED = 1<<11,
|
2010-10-08 07:39:20 +08:00
|
|
|
STATION_INFO_RX_DROP_MISC = 1<<12,
|
2010-12-02 18:12:43 +08:00
|
|
|
STATION_INFO_SIGNAL_AVG = 1<<13,
|
2011-02-28 05:08:00 +08:00
|
|
|
STATION_INFO_RX_BITRATE = 1<<14,
|
2011-04-01 00:25:41 +08:00
|
|
|
STATION_INFO_BSS_PARAM = 1<<15,
|
2011-08-11 09:00:33 +08:00
|
|
|
STATION_INFO_CONNECTED_TIME = 1<<16,
|
2011-10-13 22:30:39 +08:00
|
|
|
STATION_INFO_ASSOC_REQ_IES = 1<<17,
|
2011-12-10 03:01:49 +08:00
|
|
|
STATION_INFO_STA_FLAGS = 1<<18,
|
|
|
|
STATION_INFO_BEACON_LOSS_COUNT = 1<<19
|
2008-12-12 05:04:19 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* enum station_info_rate_flags - bitrate info flags
|
|
|
|
*
|
|
|
|
* Used by the driver to indicate the specific rate transmission
|
|
|
|
* type for 802.11n transmissions.
|
|
|
|
*
|
|
|
|
* @RATE_INFO_FLAGS_MCS: @tx_bitrate_mcs filled
|
|
|
|
* @RATE_INFO_FLAGS_40_MHZ_WIDTH: 40 Mhz width transmission
|
|
|
|
* @RATE_INFO_FLAGS_SHORT_GI: 400ns guard interval
|
|
|
|
*/
|
|
|
|
enum rate_info_flags {
|
|
|
|
RATE_INFO_FLAGS_MCS = 1<<0,
|
|
|
|
RATE_INFO_FLAGS_40_MHZ_WIDTH = 1<<1,
|
|
|
|
RATE_INFO_FLAGS_SHORT_GI = 1<<2,
|
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* struct rate_info - bitrate information
|
|
|
|
*
|
|
|
|
* Information about a receiving or transmitting bitrate
|
|
|
|
*
|
|
|
|
* @flags: bitflag of flags from &enum rate_info_flags
|
|
|
|
* @mcs: mcs index if struct describes a 802.11n bitrate
|
|
|
|
* @legacy: bitrate in 100kbit/s for 802.11abg
|
|
|
|
*/
|
|
|
|
struct rate_info {
|
|
|
|
u8 flags;
|
|
|
|
u8 mcs;
|
|
|
|
u16 legacy;
|
2007-12-19 09:03:36 +08:00
|
|
|
};
|
|
|
|
|
2011-04-01 00:25:41 +08:00
|
|
|
/**
|
|
|
|
* enum station_info_rate_flags - bitrate info flags
|
|
|
|
*
|
|
|
|
* Used by the driver to indicate the specific rate transmission
|
|
|
|
* type for 802.11n transmissions.
|
|
|
|
*
|
|
|
|
* @BSS_PARAM_FLAGS_CTS_PROT: whether CTS protection is enabled
|
|
|
|
* @BSS_PARAM_FLAGS_SHORT_PREAMBLE: whether short preamble is enabled
|
|
|
|
* @BSS_PARAM_FLAGS_SHORT_SLOT_TIME: whether short slot time is enabled
|
|
|
|
*/
|
|
|
|
enum bss_param_flags {
|
|
|
|
BSS_PARAM_FLAGS_CTS_PROT = 1<<0,
|
|
|
|
BSS_PARAM_FLAGS_SHORT_PREAMBLE = 1<<1,
|
|
|
|
BSS_PARAM_FLAGS_SHORT_SLOT_TIME = 1<<2,
|
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* struct sta_bss_parameters - BSS parameters for the attached station
|
|
|
|
*
|
|
|
|
* Information about the currently associated BSS
|
|
|
|
*
|
|
|
|
* @flags: bitflag of flags from &enum bss_param_flags
|
|
|
|
* @dtim_period: DTIM period for the BSS
|
|
|
|
* @beacon_interval: beacon interval
|
|
|
|
*/
|
|
|
|
struct sta_bss_parameters {
|
|
|
|
u8 flags;
|
|
|
|
u8 dtim_period;
|
|
|
|
u16 beacon_interval;
|
|
|
|
};
|
|
|
|
|
2007-12-19 09:03:36 +08:00
|
|
|
/**
|
2008-02-23 22:17:06 +08:00
|
|
|
* struct station_info - station information
|
2007-12-19 09:03:36 +08:00
|
|
|
*
|
2008-02-23 22:17:06 +08:00
|
|
|
* Station information filled by driver for get_station() and dump_station.
|
2007-12-19 09:03:36 +08:00
|
|
|
*
|
2008-02-23 22:17:06 +08:00
|
|
|
* @filled: bitflag of flags from &enum station_info_flags
|
2011-04-08 23:54:24 +08:00
|
|
|
* @connected_time: time(in secs) since a station is last connected
|
2007-12-19 09:03:36 +08:00
|
|
|
* @inactive_time: time since last station activity (tx/rx) in milliseconds
|
|
|
|
* @rx_bytes: bytes received from this station
|
|
|
|
* @tx_bytes: bytes transmitted to this station
|
2008-02-23 22:17:06 +08:00
|
|
|
* @llid: mesh local link id
|
|
|
|
* @plid: mesh peer link id
|
|
|
|
* @plink_state: mesh peer link state
|
2008-12-12 05:04:19 +08:00
|
|
|
* @signal: signal strength of last received packet in dBm
|
2010-12-02 18:12:43 +08:00
|
|
|
* @signal_avg: signal strength average in dBm
|
2011-03-19 00:33:02 +08:00
|
|
|
* @txrate: current unicast bitrate from this station
|
|
|
|
* @rxrate: current unicast bitrate to this station
|
2009-02-17 19:24:57 +08:00
|
|
|
* @rx_packets: packets received from this station
|
|
|
|
* @tx_packets: packets transmitted to this station
|
2010-10-06 17:34:12 +08:00
|
|
|
* @tx_retries: cumulative retry counts
|
|
|
|
* @tx_failed: number of failed transmissions (retries exceeded, no ACK)
|
2010-10-08 07:39:20 +08:00
|
|
|
* @rx_dropped_misc: Dropped for un-specified reason.
|
2011-05-23 08:16:20 +08:00
|
|
|
* @bss_param: current BSS parameters
|
2009-08-07 22:17:38 +08:00
|
|
|
* @generation: generation number for nl80211 dumps.
|
|
|
|
* This number should increase every time the list of stations
|
|
|
|
* changes, i.e. when a station is added or removed, so that
|
|
|
|
* userspace can tell whether it got a consistent snapshot.
|
2011-08-08 17:11:52 +08:00
|
|
|
* @assoc_req_ies: IEs from (Re)Association Request.
|
|
|
|
* This is used only when in AP mode with drivers that do not use
|
|
|
|
* user space MLME/SME implementation. The information is provided for
|
|
|
|
* the cfg80211_new_sta() calls to notify user space of the IEs.
|
|
|
|
* @assoc_req_ies_len: Length of assoc_req_ies buffer in octets.
|
2011-11-08 16:20:07 +08:00
|
|
|
* @sta_flags: station flags mask & values
|
2011-12-10 03:01:49 +08:00
|
|
|
* @beacon_loss_count: Number of times beacon loss event has triggered.
|
2007-12-19 09:03:36 +08:00
|
|
|
*/
|
2008-02-23 22:17:06 +08:00
|
|
|
struct station_info {
|
2007-12-19 09:03:36 +08:00
|
|
|
u32 filled;
|
2011-04-08 23:54:24 +08:00
|
|
|
u32 connected_time;
|
2007-12-19 09:03:36 +08:00
|
|
|
u32 inactive_time;
|
|
|
|
u32 rx_bytes;
|
|
|
|
u32 tx_bytes;
|
2008-02-23 22:17:06 +08:00
|
|
|
u16 llid;
|
|
|
|
u16 plid;
|
|
|
|
u8 plink_state;
|
2008-12-12 05:04:19 +08:00
|
|
|
s8 signal;
|
2010-12-02 18:12:43 +08:00
|
|
|
s8 signal_avg;
|
2008-12-12 05:04:19 +08:00
|
|
|
struct rate_info txrate;
|
2011-02-28 05:08:00 +08:00
|
|
|
struct rate_info rxrate;
|
2009-02-17 19:24:57 +08:00
|
|
|
u32 rx_packets;
|
|
|
|
u32 tx_packets;
|
2010-10-06 17:34:12 +08:00
|
|
|
u32 tx_retries;
|
|
|
|
u32 tx_failed;
|
2010-10-08 07:39:20 +08:00
|
|
|
u32 rx_dropped_misc;
|
2011-04-01 00:25:41 +08:00
|
|
|
struct sta_bss_parameters bss_param;
|
2011-10-13 22:30:39 +08:00
|
|
|
struct nl80211_sta_flag_update sta_flags;
|
2009-08-07 22:17:38 +08:00
|
|
|
|
|
|
|
int generation;
|
2011-08-08 17:11:52 +08:00
|
|
|
|
|
|
|
const u8 *assoc_req_ies;
|
|
|
|
size_t assoc_req_ies_len;
|
2011-08-11 16:46:22 +08:00
|
|
|
|
2011-12-10 03:01:49 +08:00
|
|
|
u32 beacon_loss_count;
|
|
|
|
|
2011-08-11 16:46:22 +08:00
|
|
|
/*
|
|
|
|
* Note: Add a new enum station_info_flags value for each new field and
|
|
|
|
* use it to check which fields are initialized.
|
|
|
|
*/
|
2007-12-19 09:03:36 +08:00
|
|
|
};
|
|
|
|
|
2008-02-01 02:48:22 +08:00
|
|
|
/**
|
|
|
|
* enum monitor_flags - monitor flags
|
|
|
|
*
|
|
|
|
* Monitor interface configuration flags. Note that these must be the bits
|
|
|
|
* according to the nl80211 flags.
|
|
|
|
*
|
|
|
|
* @MONITOR_FLAG_FCSFAIL: pass frames with bad FCS
|
|
|
|
* @MONITOR_FLAG_PLCPFAIL: pass frames with bad PLCP
|
|
|
|
* @MONITOR_FLAG_CONTROL: pass control frames
|
|
|
|
* @MONITOR_FLAG_OTHER_BSS: disable BSSID filtering
|
|
|
|
* @MONITOR_FLAG_COOK_FRAMES: report frames after processing
|
|
|
|
*/
|
|
|
|
enum monitor_flags {
|
|
|
|
MONITOR_FLAG_FCSFAIL = 1<<NL80211_MNTR_FLAG_FCSFAIL,
|
|
|
|
MONITOR_FLAG_PLCPFAIL = 1<<NL80211_MNTR_FLAG_PLCPFAIL,
|
|
|
|
MONITOR_FLAG_CONTROL = 1<<NL80211_MNTR_FLAG_CONTROL,
|
|
|
|
MONITOR_FLAG_OTHER_BSS = 1<<NL80211_MNTR_FLAG_OTHER_BSS,
|
|
|
|
MONITOR_FLAG_COOK_FRAMES = 1<<NL80211_MNTR_FLAG_COOK_FRAMES,
|
|
|
|
};
|
|
|
|
|
2008-02-23 22:17:06 +08:00
|
|
|
/**
|
|
|
|
* enum mpath_info_flags - mesh path information flags
|
|
|
|
*
|
|
|
|
* Used by the driver to indicate which info in &struct mpath_info it has filled
|
|
|
|
* in during get_station() or dump_station().
|
|
|
|
*
|
2010-06-07 17:12:27 +08:00
|
|
|
* @MPATH_INFO_FRAME_QLEN: @frame_qlen filled
|
|
|
|
* @MPATH_INFO_SN: @sn filled
|
|
|
|
* @MPATH_INFO_METRIC: @metric filled
|
|
|
|
* @MPATH_INFO_EXPTIME: @exptime filled
|
|
|
|
* @MPATH_INFO_DISCOVERY_TIMEOUT: @discovery_timeout filled
|
|
|
|
* @MPATH_INFO_DISCOVERY_RETRIES: @discovery_retries filled
|
|
|
|
* @MPATH_INFO_FLAGS: @flags filled
|
2008-02-23 22:17:06 +08:00
|
|
|
*/
|
|
|
|
enum mpath_info_flags {
|
|
|
|
MPATH_INFO_FRAME_QLEN = BIT(0),
|
2009-11-10 07:46:55 +08:00
|
|
|
MPATH_INFO_SN = BIT(1),
|
2008-02-23 22:17:06 +08:00
|
|
|
MPATH_INFO_METRIC = BIT(2),
|
|
|
|
MPATH_INFO_EXPTIME = BIT(3),
|
|
|
|
MPATH_INFO_DISCOVERY_TIMEOUT = BIT(4),
|
|
|
|
MPATH_INFO_DISCOVERY_RETRIES = BIT(5),
|
|
|
|
MPATH_INFO_FLAGS = BIT(6),
|
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* struct mpath_info - mesh path information
|
|
|
|
*
|
|
|
|
* Mesh path information filled by driver for get_mpath() and dump_mpath().
|
|
|
|
*
|
|
|
|
* @filled: bitfield of flags from &enum mpath_info_flags
|
|
|
|
* @frame_qlen: number of queued frames for this destination
|
2009-11-10 07:46:55 +08:00
|
|
|
* @sn: target sequence number
|
2008-02-23 22:17:06 +08:00
|
|
|
* @metric: metric (cost) of this mesh path
|
|
|
|
* @exptime: expiration time for the mesh path from now, in msecs
|
|
|
|
* @flags: mesh path flags
|
|
|
|
* @discovery_timeout: total mesh path discovery timeout, in msecs
|
|
|
|
* @discovery_retries: mesh path discovery retries
|
2009-08-07 22:17:38 +08:00
|
|
|
* @generation: generation number for nl80211 dumps.
|
|
|
|
* This number should increase every time the list of mesh paths
|
|
|
|
* changes, i.e. when a station is added or removed, so that
|
|
|
|
* userspace can tell whether it got a consistent snapshot.
|
2008-02-23 22:17:06 +08:00
|
|
|
*/
|
|
|
|
struct mpath_info {
|
|
|
|
u32 filled;
|
|
|
|
u32 frame_qlen;
|
2009-11-10 07:46:55 +08:00
|
|
|
u32 sn;
|
2008-02-23 22:17:06 +08:00
|
|
|
u32 metric;
|
|
|
|
u32 exptime;
|
|
|
|
u32 discovery_timeout;
|
|
|
|
u8 discovery_retries;
|
|
|
|
u8 flags;
|
2009-08-07 22:17:38 +08:00
|
|
|
|
|
|
|
int generation;
|
2008-02-23 22:17:06 +08:00
|
|
|
};
|
|
|
|
|
2008-08-08 01:07:01 +08:00
|
|
|
/**
|
|
|
|
* struct bss_parameters - BSS parameters
|
|
|
|
*
|
|
|
|
* Used to change BSS parameters (mainly for AP mode).
|
|
|
|
*
|
|
|
|
* @use_cts_prot: Whether to use CTS protection
|
|
|
|
* (0 = no, 1 = yes, -1 = do not change)
|
|
|
|
* @use_short_preamble: Whether the use of short preambles is allowed
|
|
|
|
* (0 = no, 1 = yes, -1 = do not change)
|
|
|
|
* @use_short_slot_time: Whether the use of short slot time is allowed
|
|
|
|
* (0 = no, 1 = yes, -1 = do not change)
|
2008-10-30 22:59:22 +08:00
|
|
|
* @basic_rates: basic rates in IEEE 802.11 format
|
|
|
|
* (or NULL for no change)
|
|
|
|
* @basic_rates_len: number of basic rates
|
2010-04-27 07:23:35 +08:00
|
|
|
* @ap_isolate: do not forward packets between connected stations
|
2010-11-19 19:40:25 +08:00
|
|
|
* @ht_opmode: HT Operation mode
|
|
|
|
* (u16 = opmode, -1 = do not change)
|
2008-08-08 01:07:01 +08:00
|
|
|
*/
|
|
|
|
struct bss_parameters {
|
|
|
|
int use_cts_prot;
|
|
|
|
int use_short_preamble;
|
|
|
|
int use_short_slot_time;
|
2008-10-30 22:59:22 +08:00
|
|
|
u8 *basic_rates;
|
|
|
|
u8 basic_rates_len;
|
2010-04-27 07:23:35 +08:00
|
|
|
int ap_isolate;
|
2010-11-19 19:40:25 +08:00
|
|
|
int ht_opmode;
|
2008-08-08 01:07:01 +08:00
|
|
|
};
|
2008-02-23 22:17:06 +08:00
|
|
|
|
2010-12-03 16:20:44 +08:00
|
|
|
/*
|
|
|
|
* struct mesh_config - 802.11s mesh configuration
|
|
|
|
*
|
|
|
|
* These parameters can be changed while the mesh is active.
|
|
|
|
*/
|
2008-10-22 03:03:48 +08:00
|
|
|
struct mesh_config {
|
|
|
|
/* Timeouts in ms */
|
|
|
|
/* Mesh plink management parameters */
|
|
|
|
u16 dot11MeshRetryTimeout;
|
|
|
|
u16 dot11MeshConfirmTimeout;
|
|
|
|
u16 dot11MeshHoldingTimeout;
|
|
|
|
u16 dot11MeshMaxPeerLinks;
|
|
|
|
u8 dot11MeshMaxRetries;
|
|
|
|
u8 dot11MeshTTL;
|
2010-12-03 16:20:40 +08:00
|
|
|
/* ttl used in path selection information elements */
|
|
|
|
u8 element_ttl;
|
2008-10-22 03:03:48 +08:00
|
|
|
bool auto_open_plinks;
|
|
|
|
/* HWMP parameters */
|
|
|
|
u8 dot11MeshHWMPmaxPREQretries;
|
|
|
|
u32 path_refresh_time;
|
|
|
|
u16 min_discovery_timeout;
|
|
|
|
u32 dot11MeshHWMPactivePathTimeout;
|
|
|
|
u16 dot11MeshHWMPpreqMinInterval;
|
2011-11-25 09:15:24 +08:00
|
|
|
u16 dot11MeshHWMPperrMinInterval;
|
2008-10-22 03:03:48 +08:00
|
|
|
u16 dot11MeshHWMPnetDiameterTraversalTime;
|
2009-11-10 07:46:57 +08:00
|
|
|
u8 dot11MeshHWMPRootMode;
|
2011-08-10 07:45:10 +08:00
|
|
|
u16 dot11MeshHWMPRannInterval;
|
2011-08-10 07:45:11 +08:00
|
|
|
/* This is missnamed in draft 12.0: dot11MeshGateAnnouncementProtocol
|
|
|
|
* set to true only means that the station will announce others it's a
|
|
|
|
* mesh gate, but not necessarily using the gate announcement protocol.
|
|
|
|
* Still keeping the same nomenclature to be in sync with the spec. */
|
|
|
|
bool dot11MeshGateAnnouncementProtocol;
|
2012-01-21 01:02:16 +08:00
|
|
|
bool dot11MeshForwarding;
|
2012-02-29 09:04:08 +08:00
|
|
|
s32 rssi_threshold;
|
2008-10-22 03:03:48 +08:00
|
|
|
};
|
|
|
|
|
2010-12-03 16:20:44 +08:00
|
|
|
/**
|
|
|
|
* struct mesh_setup - 802.11s mesh setup configuration
|
|
|
|
* @mesh_id: the mesh ID
|
|
|
|
* @mesh_id_len: length of the mesh ID, at least 1 and at most 32 bytes
|
2010-12-17 09:37:49 +08:00
|
|
|
* @path_sel_proto: which path selection protocol to use
|
|
|
|
* @path_metric: which metric to use
|
2011-04-08 06:08:27 +08:00
|
|
|
* @ie: vendor information elements (optional)
|
|
|
|
* @ie_len: length of vendor information elements
|
2011-05-04 07:57:07 +08:00
|
|
|
* @is_authenticated: this mesh requires authentication
|
|
|
|
* @is_secure: this mesh uses security
|
2011-11-25 09:15:20 +08:00
|
|
|
* @mcast_rate: multicat rate for Mesh Node [6Mbps is the default for 802.11a]
|
2010-12-03 16:20:44 +08:00
|
|
|
*
|
|
|
|
* These parameters are fixed when the mesh is created.
|
|
|
|
*/
|
|
|
|
struct mesh_setup {
|
|
|
|
const u8 *mesh_id;
|
|
|
|
u8 mesh_id_len;
|
2010-12-17 09:37:49 +08:00
|
|
|
u8 path_sel_proto;
|
|
|
|
u8 path_metric;
|
2011-04-08 06:08:27 +08:00
|
|
|
const u8 *ie;
|
|
|
|
u8 ie_len;
|
2011-05-04 07:57:07 +08:00
|
|
|
bool is_authenticated;
|
2011-04-08 06:08:28 +08:00
|
|
|
bool is_secure;
|
2011-11-25 09:15:20 +08:00
|
|
|
int mcast_rate[IEEE80211_NUM_BANDS];
|
2010-12-03 16:20:44 +08:00
|
|
|
};
|
|
|
|
|
2008-10-30 22:59:24 +08:00
|
|
|
/**
|
|
|
|
* struct ieee80211_txq_params - TX queue parameters
|
|
|
|
* @queue: TX queue identifier (NL80211_TXQ_Q_*)
|
|
|
|
* @txop: Maximum burst time in units of 32 usecs, 0 meaning disabled
|
|
|
|
* @cwmin: Minimum contention window [a value of the form 2^n-1 in the range
|
|
|
|
* 1..32767]
|
|
|
|
* @cwmax: Maximum contention window [a value of the form 2^n-1 in the range
|
|
|
|
* 1..32767]
|
|
|
|
* @aifs: Arbitration interframe space [0..255]
|
|
|
|
*/
|
|
|
|
struct ieee80211_txq_params {
|
|
|
|
enum nl80211_txq_q queue;
|
|
|
|
u16 txop;
|
|
|
|
u16 cwmin;
|
|
|
|
u16 cwmax;
|
|
|
|
u8 aifs;
|
|
|
|
};
|
|
|
|
|
2007-04-24 03:20:05 +08:00
|
|
|
/* from net/wireless.h */
|
|
|
|
struct wiphy;
|
|
|
|
|
2010-08-19 22:11:27 +08:00
|
|
|
/**
|
|
|
|
* DOC: Scanning and BSS list handling
|
|
|
|
*
|
|
|
|
* The scanning process itself is fairly simple, but cfg80211 offers quite
|
|
|
|
* a bit of helper functionality. To start a scan, the scan operation will
|
|
|
|
* be invoked with a scan definition. This scan definition contains the
|
|
|
|
* channels to scan, and the SSIDs to send probe requests for (including the
|
|
|
|
* wildcard, if desired). A passive scan is indicated by having no SSIDs to
|
|
|
|
* probe. Additionally, a scan request may contain extra information elements
|
|
|
|
* that should be added to the probe request. The IEs are guaranteed to be
|
|
|
|
* well-formed, and will not exceed the maximum length the driver advertised
|
|
|
|
* in the wiphy structure.
|
|
|
|
*
|
|
|
|
* When scanning finds a BSS, cfg80211 needs to be notified of that, because
|
|
|
|
* it is responsible for maintaining the BSS list; the driver should not
|
|
|
|
* maintain a list itself. For this notification, various functions exist.
|
|
|
|
*
|
|
|
|
* Since drivers do not maintain a BSS list, there are also a number of
|
|
|
|
* functions to search for a BSS and obtain information about it from the
|
|
|
|
* BSS structure cfg80211 maintains. The BSS list is also made available
|
|
|
|
* to userspace.
|
|
|
|
*/
|
2008-11-26 22:15:24 +08:00
|
|
|
|
2009-02-11 04:25:55 +08:00
|
|
|
/**
|
|
|
|
* struct cfg80211_ssid - SSID description
|
|
|
|
* @ssid: the SSID
|
|
|
|
* @ssid_len: length of the ssid
|
|
|
|
*/
|
|
|
|
struct cfg80211_ssid {
|
|
|
|
u8 ssid[IEEE80211_MAX_SSID_LEN];
|
|
|
|
u8 ssid_len;
|
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* struct cfg80211_scan_request - scan request description
|
|
|
|
*
|
|
|
|
* @ssids: SSIDs to scan for (active scan only)
|
|
|
|
* @n_ssids: number of SSIDs
|
|
|
|
* @channels: channels to scan on.
|
2009-07-10 20:54:58 +08:00
|
|
|
* @n_channels: total number of channels to scan
|
2009-02-17 01:39:13 +08:00
|
|
|
* @ie: optional information element(s) to add into Probe Request or %NULL
|
|
|
|
* @ie_len: length of ie in octets
|
2011-07-19 00:08:35 +08:00
|
|
|
* @rates: bitmap of rates to advertise for each band
|
2009-02-11 04:25:55 +08:00
|
|
|
* @wiphy: the wiphy this was for
|
2009-07-14 06:33:35 +08:00
|
|
|
* @dev: the interface
|
2010-06-07 17:12:27 +08:00
|
|
|
* @aborted: (internal) scan request was notified as aborted
|
2011-09-25 17:23:30 +08:00
|
|
|
* @no_cck: used to send probe requests at non CCK rate in 2GHz band
|
2009-02-11 04:25:55 +08:00
|
|
|
*/
|
|
|
|
struct cfg80211_scan_request {
|
|
|
|
struct cfg80211_ssid *ssids;
|
|
|
|
int n_ssids;
|
|
|
|
u32 n_channels;
|
2009-04-01 17:58:36 +08:00
|
|
|
const u8 *ie;
|
2009-02-17 01:39:13 +08:00
|
|
|
size_t ie_len;
|
2009-02-11 04:25:55 +08:00
|
|
|
|
2011-07-19 00:08:35 +08:00
|
|
|
u32 rates[IEEE80211_NUM_BANDS];
|
|
|
|
|
2009-02-11 04:25:55 +08:00
|
|
|
/* internal */
|
|
|
|
struct wiphy *wiphy;
|
2009-07-14 06:33:35 +08:00
|
|
|
struct net_device *dev;
|
2009-07-07 09:56:11 +08:00
|
|
|
bool aborted;
|
2011-09-25 17:23:30 +08:00
|
|
|
bool no_cck;
|
2009-08-07 23:54:07 +08:00
|
|
|
|
|
|
|
/* keep last */
|
|
|
|
struct ieee80211_channel *channels[0];
|
2009-02-11 04:25:55 +08:00
|
|
|
};
|
|
|
|
|
2011-08-31 21:01:48 +08:00
|
|
|
/**
|
|
|
|
* struct cfg80211_match_set - sets of attributes to match
|
|
|
|
*
|
|
|
|
* @ssid: SSID to be matched
|
|
|
|
*/
|
|
|
|
struct cfg80211_match_set {
|
|
|
|
struct cfg80211_ssid ssid;
|
|
|
|
};
|
|
|
|
|
2011-05-11 22:09:35 +08:00
|
|
|
/**
|
|
|
|
* struct cfg80211_sched_scan_request - scheduled scan request description
|
|
|
|
*
|
|
|
|
* @ssids: SSIDs to scan for (passed in the probe_reqs in active scans)
|
|
|
|
* @n_ssids: number of SSIDs
|
|
|
|
* @n_channels: total number of channels to scan
|
2011-05-11 22:09:37 +08:00
|
|
|
* @interval: interval between each scheduled scan cycle
|
2011-05-11 22:09:35 +08:00
|
|
|
* @ie: optional information element(s) to add into Probe Request or %NULL
|
|
|
|
* @ie_len: length of ie in octets
|
2011-08-31 21:01:48 +08:00
|
|
|
* @match_sets: sets of parameters to be matched for a scan result
|
|
|
|
* entry to be considered valid and to be passed to the host
|
|
|
|
* (others are filtered out).
|
|
|
|
* If ommited, all results are passed.
|
|
|
|
* @n_match_sets: number of match sets
|
2011-05-11 22:09:35 +08:00
|
|
|
* @wiphy: the wiphy this was for
|
|
|
|
* @dev: the interface
|
|
|
|
* @channels: channels to scan
|
|
|
|
*/
|
|
|
|
struct cfg80211_sched_scan_request {
|
|
|
|
struct cfg80211_ssid *ssids;
|
|
|
|
int n_ssids;
|
|
|
|
u32 n_channels;
|
2011-05-11 22:09:37 +08:00
|
|
|
u32 interval;
|
2011-05-11 22:09:35 +08:00
|
|
|
const u8 *ie;
|
|
|
|
size_t ie_len;
|
2011-08-31 21:01:48 +08:00
|
|
|
struct cfg80211_match_set *match_sets;
|
|
|
|
int n_match_sets;
|
2011-05-11 22:09:35 +08:00
|
|
|
|
|
|
|
/* internal */
|
|
|
|
struct wiphy *wiphy;
|
|
|
|
struct net_device *dev;
|
|
|
|
|
|
|
|
/* keep last */
|
|
|
|
struct ieee80211_channel *channels[0];
|
|
|
|
};
|
|
|
|
|
2009-02-11 04:25:55 +08:00
|
|
|
/**
|
|
|
|
* enum cfg80211_signal_type - signal type
|
|
|
|
*
|
|
|
|
* @CFG80211_SIGNAL_TYPE_NONE: no signal strength information available
|
|
|
|
* @CFG80211_SIGNAL_TYPE_MBM: signal strength in mBm (100*dBm)
|
|
|
|
* @CFG80211_SIGNAL_TYPE_UNSPEC: signal strength, increasing from 0 through 100
|
|
|
|
*/
|
|
|
|
enum cfg80211_signal_type {
|
|
|
|
CFG80211_SIGNAL_TYPE_NONE,
|
|
|
|
CFG80211_SIGNAL_TYPE_MBM,
|
|
|
|
CFG80211_SIGNAL_TYPE_UNSPEC,
|
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* struct cfg80211_bss - BSS description
|
|
|
|
*
|
|
|
|
* This structure describes a BSS (which may also be a mesh network)
|
|
|
|
* for use in scan results and similar.
|
|
|
|
*
|
2010-06-07 17:12:27 +08:00
|
|
|
* @channel: channel this BSS is on
|
2009-02-11 04:25:55 +08:00
|
|
|
* @bssid: BSSID of the BSS
|
|
|
|
* @tsf: timestamp of last received update
|
|
|
|
* @beacon_interval: the beacon interval as from the frame
|
|
|
|
* @capability: the capability field in host byte order
|
|
|
|
* @information_elements: the information elements (Note that there
|
2010-01-06 22:19:24 +08:00
|
|
|
* is no guarantee that these are well-formed!); this is a pointer to
|
|
|
|
* either the beacon_ies or proberesp_ies depending on whether Probe
|
|
|
|
* Response frame has been received
|
2009-02-11 04:25:55 +08:00
|
|
|
* @len_information_elements: total length of the information elements
|
2010-01-06 22:19:24 +08:00
|
|
|
* @beacon_ies: the information elements from the last Beacon frame
|
|
|
|
* @len_beacon_ies: total length of the beacon_ies
|
|
|
|
* @proberesp_ies: the information elements from the last Probe Response frame
|
|
|
|
* @len_proberesp_ies: total length of the proberesp_ies
|
2009-02-19 01:45:06 +08:00
|
|
|
* @signal: signal strength value (type depends on the wiphy's signal_type)
|
2009-02-11 04:25:57 +08:00
|
|
|
* @free_priv: function pointer to free private data
|
2009-02-11 04:25:55 +08:00
|
|
|
* @priv: private area for driver use, has at least wiphy->bss_priv_size bytes
|
|
|
|
*/
|
|
|
|
struct cfg80211_bss {
|
|
|
|
struct ieee80211_channel *channel;
|
|
|
|
|
|
|
|
u8 bssid[ETH_ALEN];
|
|
|
|
u64 tsf;
|
|
|
|
u16 beacon_interval;
|
|
|
|
u16 capability;
|
|
|
|
u8 *information_elements;
|
|
|
|
size_t len_information_elements;
|
2010-01-06 22:19:24 +08:00
|
|
|
u8 *beacon_ies;
|
|
|
|
size_t len_beacon_ies;
|
|
|
|
u8 *proberesp_ies;
|
|
|
|
size_t len_proberesp_ies;
|
2009-02-11 04:25:55 +08:00
|
|
|
|
|
|
|
s32 signal;
|
|
|
|
|
2009-02-11 04:25:57 +08:00
|
|
|
void (*free_priv)(struct cfg80211_bss *bss);
|
2009-02-11 04:25:55 +08:00
|
|
|
u8 priv[0] __attribute__((__aligned__(sizeof(void *))));
|
|
|
|
};
|
|
|
|
|
2009-07-02 23:18:40 +08:00
|
|
|
/**
|
|
|
|
* ieee80211_bss_get_ie - find IE with given ID
|
|
|
|
* @bss: the bss to search
|
|
|
|
* @ie: the IE ID
|
|
|
|
* Returns %NULL if not found.
|
|
|
|
*/
|
|
|
|
const u8 *ieee80211_bss_get_ie(struct cfg80211_bss *bss, u8 ie);
|
|
|
|
|
|
|
|
|
2009-03-19 19:39:22 +08:00
|
|
|
/**
|
|
|
|
* struct cfg80211_auth_request - Authentication request data
|
|
|
|
*
|
|
|
|
* This structure provides information needed to complete IEEE 802.11
|
|
|
|
* authentication.
|
2009-07-02 23:20:43 +08:00
|
|
|
*
|
|
|
|
* @bss: The BSS to authenticate with.
|
2009-03-19 19:39:22 +08:00
|
|
|
* @auth_type: Authentication type (algorithm)
|
|
|
|
* @ie: Extra IEs to add to Authentication frame or %NULL
|
|
|
|
* @ie_len: Length of ie buffer in octets
|
cfg80211: rework key operation
This reworks the key operation in cfg80211, and now only
allows, from userspace, configuring keys (via nl80211)
after the connection has been established (in managed
mode), the IBSS been joined (in IBSS mode), at any time
(in AP[_VLAN] modes) or never for all the other modes.
In order to do shared key authentication correctly, it
is now possible to give a WEP key to the AUTH command.
To configure static WEP keys, these are given to the
CONNECT or IBSS_JOIN command directly, for a userspace
SME it is assumed it will configure it properly after
the connection has been established.
Since mac80211 used to check the default key in IBSS
mode to see whether or not the network is protected,
it needs an update in that area, as well as an update
to make use of the WEP key passed to auth() for shared
key authentication.
Signed-off-by: Johannes Berg <johannes@sipsolutions.net>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2009-07-08 20:22:54 +08:00
|
|
|
* @key_len: length of WEP key for shared key authentication
|
|
|
|
* @key_idx: index of WEP key for shared key authentication
|
|
|
|
* @key: WEP key for shared key authentication
|
2009-03-19 19:39:22 +08:00
|
|
|
*/
|
|
|
|
struct cfg80211_auth_request {
|
2009-07-02 23:20:43 +08:00
|
|
|
struct cfg80211_bss *bss;
|
2009-03-19 19:39:22 +08:00
|
|
|
const u8 *ie;
|
|
|
|
size_t ie_len;
|
2009-07-02 23:20:43 +08:00
|
|
|
enum nl80211_auth_type auth_type;
|
cfg80211: rework key operation
This reworks the key operation in cfg80211, and now only
allows, from userspace, configuring keys (via nl80211)
after the connection has been established (in managed
mode), the IBSS been joined (in IBSS mode), at any time
(in AP[_VLAN] modes) or never for all the other modes.
In order to do shared key authentication correctly, it
is now possible to give a WEP key to the AUTH command.
To configure static WEP keys, these are given to the
CONNECT or IBSS_JOIN command directly, for a userspace
SME it is assumed it will configure it properly after
the connection has been established.
Since mac80211 used to check the default key in IBSS
mode to see whether or not the network is protected,
it needs an update in that area, as well as an update
to make use of the WEP key passed to auth() for shared
key authentication.
Signed-off-by: Johannes Berg <johannes@sipsolutions.net>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2009-07-08 20:22:54 +08:00
|
|
|
const u8 *key;
|
|
|
|
u8 key_len, key_idx;
|
2009-03-19 19:39:22 +08:00
|
|
|
};
|
|
|
|
|
2011-11-19 03:31:59 +08:00
|
|
|
/**
|
|
|
|
* enum cfg80211_assoc_req_flags - Over-ride default behaviour in association.
|
|
|
|
*
|
|
|
|
* @ASSOC_REQ_DISABLE_HT: Disable HT (802.11n)
|
|
|
|
*/
|
|
|
|
enum cfg80211_assoc_req_flags {
|
|
|
|
ASSOC_REQ_DISABLE_HT = BIT(0),
|
|
|
|
};
|
|
|
|
|
2009-03-19 19:39:22 +08:00
|
|
|
/**
|
|
|
|
* struct cfg80211_assoc_request - (Re)Association request data
|
|
|
|
*
|
|
|
|
* This structure provides information needed to complete IEEE 802.11
|
|
|
|
* (re)association.
|
2012-01-20 20:55:25 +08:00
|
|
|
* @bss: The BSS to associate with. If the call is successful the driver
|
|
|
|
* is given a reference that it must release, normally via a call to
|
|
|
|
* cfg80211_send_rx_assoc(), or, if association timed out, with a
|
|
|
|
* call to cfg80211_put_bss() (in addition to calling
|
|
|
|
* cfg80211_send_assoc_timeout())
|
2009-03-19 19:39:22 +08:00
|
|
|
* @ie: Extra IEs to add to (Re)Association Request frame or %NULL
|
|
|
|
* @ie_len: Length of ie buffer in octets
|
2009-05-07 03:09:37 +08:00
|
|
|
* @use_mfp: Use management frame protection (IEEE 802.11w) in this association
|
2009-07-02 03:26:54 +08:00
|
|
|
* @crypto: crypto settings
|
2009-07-07 20:37:26 +08:00
|
|
|
* @prev_bssid: previous BSSID, if not %NULL use reassociate frame
|
2011-11-19 03:31:59 +08:00
|
|
|
* @flags: See &enum cfg80211_assoc_req_flags
|
|
|
|
* @ht_capa: HT Capabilities over-rides. Values set in ht_capa_mask
|
|
|
|
* will be used in ht_capa. Un-supported values will be ignored.
|
|
|
|
* @ht_capa_mask: The bits of ht_capa which are to be used.
|
2009-03-19 19:39:22 +08:00
|
|
|
*/
|
|
|
|
struct cfg80211_assoc_request {
|
2009-07-02 23:20:43 +08:00
|
|
|
struct cfg80211_bss *bss;
|
2009-07-07 20:37:26 +08:00
|
|
|
const u8 *ie, *prev_bssid;
|
2009-03-19 19:39:22 +08:00
|
|
|
size_t ie_len;
|
2009-07-02 03:26:54 +08:00
|
|
|
struct cfg80211_crypto_settings crypto;
|
2009-07-02 23:20:43 +08:00
|
|
|
bool use_mfp;
|
2011-11-19 03:31:59 +08:00
|
|
|
u32 flags;
|
|
|
|
struct ieee80211_ht_cap ht_capa;
|
|
|
|
struct ieee80211_ht_cap ht_capa_mask;
|
2009-03-19 19:39:22 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* struct cfg80211_deauth_request - Deauthentication request data
|
|
|
|
*
|
|
|
|
* This structure provides information needed to complete IEEE 802.11
|
|
|
|
* deauthentication.
|
|
|
|
*
|
2012-01-20 20:55:25 +08:00
|
|
|
* @bssid: the BSSID of the BSS to deauthenticate from
|
2009-03-19 19:39:22 +08:00
|
|
|
* @ie: Extra IEs to add to Deauthentication frame or %NULL
|
|
|
|
* @ie_len: Length of ie buffer in octets
|
2009-07-02 23:20:43 +08:00
|
|
|
* @reason_code: The reason code for the deauthentication
|
2009-03-19 19:39:22 +08:00
|
|
|
*/
|
|
|
|
struct cfg80211_deauth_request {
|
2012-01-20 20:55:25 +08:00
|
|
|
const u8 *bssid;
|
2009-03-19 19:39:22 +08:00
|
|
|
const u8 *ie;
|
|
|
|
size_t ie_len;
|
2009-07-02 23:20:43 +08:00
|
|
|
u16 reason_code;
|
2009-03-19 19:39:22 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* struct cfg80211_disassoc_request - Disassociation request data
|
|
|
|
*
|
|
|
|
* This structure provides information needed to complete IEEE 802.11
|
|
|
|
* disassocation.
|
|
|
|
*
|
2009-07-02 23:20:43 +08:00
|
|
|
* @bss: the BSS to disassociate from
|
2009-03-19 19:39:22 +08:00
|
|
|
* @ie: Extra IEs to add to Disassociation frame or %NULL
|
|
|
|
* @ie_len: Length of ie buffer in octets
|
2009-07-02 23:20:43 +08:00
|
|
|
* @reason_code: The reason code for the disassociation
|
2010-04-04 14:37:19 +08:00
|
|
|
* @local_state_change: This is a request for a local state only, i.e., no
|
|
|
|
* Disassociation frame is to be transmitted.
|
2009-03-19 19:39:22 +08:00
|
|
|
*/
|
|
|
|
struct cfg80211_disassoc_request {
|
2009-07-02 23:20:43 +08:00
|
|
|
struct cfg80211_bss *bss;
|
2009-03-19 19:39:22 +08:00
|
|
|
const u8 *ie;
|
|
|
|
size_t ie_len;
|
2009-07-02 23:20:43 +08:00
|
|
|
u16 reason_code;
|
2010-04-04 14:37:19 +08:00
|
|
|
bool local_state_change;
|
2009-03-19 19:39:22 +08:00
|
|
|
};
|
|
|
|
|
2009-04-20 03:24:32 +08:00
|
|
|
/**
|
|
|
|
* struct cfg80211_ibss_params - IBSS parameters
|
|
|
|
*
|
|
|
|
* This structure defines the IBSS parameters for the join_ibss()
|
|
|
|
* method.
|
|
|
|
*
|
|
|
|
* @ssid: The SSID, will always be non-null.
|
|
|
|
* @ssid_len: The length of the SSID, will always be non-zero.
|
|
|
|
* @bssid: Fixed BSSID requested, maybe be %NULL, if set do not
|
|
|
|
* search for IBSSs with a different BSSID.
|
|
|
|
* @channel: The channel to use if no IBSS can be found to join.
|
2012-01-22 03:03:00 +08:00
|
|
|
* @channel_type: channel type (HT mode)
|
2009-04-20 03:24:32 +08:00
|
|
|
* @channel_fixed: The channel should be fixed -- do not search for
|
|
|
|
* IBSSs to join on other channels.
|
|
|
|
* @ie: information element(s) to include in the beacon
|
|
|
|
* @ie_len: length of that
|
2009-04-22 23:45:38 +08:00
|
|
|
* @beacon_interval: beacon interval to use
|
cfg80211: rework key operation
This reworks the key operation in cfg80211, and now only
allows, from userspace, configuring keys (via nl80211)
after the connection has been established (in managed
mode), the IBSS been joined (in IBSS mode), at any time
(in AP[_VLAN] modes) or never for all the other modes.
In order to do shared key authentication correctly, it
is now possible to give a WEP key to the AUTH command.
To configure static WEP keys, these are given to the
CONNECT or IBSS_JOIN command directly, for a userspace
SME it is assumed it will configure it properly after
the connection has been established.
Since mac80211 used to check the default key in IBSS
mode to see whether or not the network is protected,
it needs an update in that area, as well as an update
to make use of the WEP key passed to auth() for shared
key authentication.
Signed-off-by: Johannes Berg <johannes@sipsolutions.net>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2009-07-08 20:22:54 +08:00
|
|
|
* @privacy: this is a protected network, keys will be configured
|
|
|
|
* after joining
|
2012-02-01 03:25:47 +08:00
|
|
|
* @control_port: whether user space controls IEEE 802.1X port, i.e.,
|
|
|
|
* sets/clears %NL80211_STA_FLAG_AUTHORIZED. If true, the driver is
|
|
|
|
* required to assume that the port is unauthorized until authorized by
|
|
|
|
* user space. Otherwise, port is marked authorized by default.
|
2010-06-14 17:55:31 +08:00
|
|
|
* @basic_rates: bitmap of basic rates to use when creating the IBSS
|
2010-11-23 03:58:24 +08:00
|
|
|
* @mcast_rate: per-band multicast rate index + 1 (0: disabled)
|
2009-04-20 03:24:32 +08:00
|
|
|
*/
|
|
|
|
struct cfg80211_ibss_params {
|
|
|
|
u8 *ssid;
|
|
|
|
u8 *bssid;
|
|
|
|
struct ieee80211_channel *channel;
|
2011-11-30 23:56:32 +08:00
|
|
|
enum nl80211_channel_type channel_type;
|
2009-04-20 03:24:32 +08:00
|
|
|
u8 *ie;
|
|
|
|
u8 ssid_len, ie_len;
|
2009-04-22 23:45:38 +08:00
|
|
|
u16 beacon_interval;
|
2010-06-14 17:55:31 +08:00
|
|
|
u32 basic_rates;
|
2009-04-20 03:24:32 +08:00
|
|
|
bool channel_fixed;
|
cfg80211: rework key operation
This reworks the key operation in cfg80211, and now only
allows, from userspace, configuring keys (via nl80211)
after the connection has been established (in managed
mode), the IBSS been joined (in IBSS mode), at any time
(in AP[_VLAN] modes) or never for all the other modes.
In order to do shared key authentication correctly, it
is now possible to give a WEP key to the AUTH command.
To configure static WEP keys, these are given to the
CONNECT or IBSS_JOIN command directly, for a userspace
SME it is assumed it will configure it properly after
the connection has been established.
Since mac80211 used to check the default key in IBSS
mode to see whether or not the network is protected,
it needs an update in that area, as well as an update
to make use of the WEP key passed to auth() for shared
key authentication.
Signed-off-by: Johannes Berg <johannes@sipsolutions.net>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2009-07-08 20:22:54 +08:00
|
|
|
bool privacy;
|
2012-02-01 03:25:47 +08:00
|
|
|
bool control_port;
|
2010-11-23 03:58:24 +08:00
|
|
|
int mcast_rate[IEEE80211_NUM_BANDS];
|
2009-04-20 03:24:32 +08:00
|
|
|
};
|
|
|
|
|
2009-07-02 03:26:54 +08:00
|
|
|
/**
|
|
|
|
* struct cfg80211_connect_params - Connection parameters
|
|
|
|
*
|
|
|
|
* This structure provides information needed to complete IEEE 802.11
|
|
|
|
* authentication and association.
|
|
|
|
*
|
|
|
|
* @channel: The channel to use or %NULL if not specified (auto-select based
|
|
|
|
* on scan results)
|
|
|
|
* @bssid: The AP BSSID or %NULL if not specified (auto-select based on scan
|
|
|
|
* results)
|
|
|
|
* @ssid: SSID
|
|
|
|
* @ssid_len: Length of ssid in octets
|
|
|
|
* @auth_type: Authentication type (algorithm)
|
2010-06-07 17:12:27 +08:00
|
|
|
* @ie: IEs for association request
|
|
|
|
* @ie_len: Length of assoc_ie in octets
|
2009-07-02 03:26:54 +08:00
|
|
|
* @privacy: indicates whether privacy-enabled APs should be used
|
|
|
|
* @crypto: crypto settings
|
cfg80211: rework key operation
This reworks the key operation in cfg80211, and now only
allows, from userspace, configuring keys (via nl80211)
after the connection has been established (in managed
mode), the IBSS been joined (in IBSS mode), at any time
(in AP[_VLAN] modes) or never for all the other modes.
In order to do shared key authentication correctly, it
is now possible to give a WEP key to the AUTH command.
To configure static WEP keys, these are given to the
CONNECT or IBSS_JOIN command directly, for a userspace
SME it is assumed it will configure it properly after
the connection has been established.
Since mac80211 used to check the default key in IBSS
mode to see whether or not the network is protected,
it needs an update in that area, as well as an update
to make use of the WEP key passed to auth() for shared
key authentication.
Signed-off-by: Johannes Berg <johannes@sipsolutions.net>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2009-07-08 20:22:54 +08:00
|
|
|
* @key_len: length of WEP key for shared key authentication
|
|
|
|
* @key_idx: index of WEP key for shared key authentication
|
|
|
|
* @key: WEP key for shared key authentication
|
2011-11-19 03:31:59 +08:00
|
|
|
* @flags: See &enum cfg80211_assoc_req_flags
|
|
|
|
* @ht_capa: HT Capabilities over-rides. Values set in ht_capa_mask
|
|
|
|
* will be used in ht_capa. Un-supported values will be ignored.
|
|
|
|
* @ht_capa_mask: The bits of ht_capa which are to be used.
|
2009-07-02 03:26:54 +08:00
|
|
|
*/
|
|
|
|
struct cfg80211_connect_params {
|
|
|
|
struct ieee80211_channel *channel;
|
|
|
|
u8 *bssid;
|
|
|
|
u8 *ssid;
|
|
|
|
size_t ssid_len;
|
|
|
|
enum nl80211_auth_type auth_type;
|
|
|
|
u8 *ie;
|
|
|
|
size_t ie_len;
|
|
|
|
bool privacy;
|
|
|
|
struct cfg80211_crypto_settings crypto;
|
cfg80211: rework key operation
This reworks the key operation in cfg80211, and now only
allows, from userspace, configuring keys (via nl80211)
after the connection has been established (in managed
mode), the IBSS been joined (in IBSS mode), at any time
(in AP[_VLAN] modes) or never for all the other modes.
In order to do shared key authentication correctly, it
is now possible to give a WEP key to the AUTH command.
To configure static WEP keys, these are given to the
CONNECT or IBSS_JOIN command directly, for a userspace
SME it is assumed it will configure it properly after
the connection has been established.
Since mac80211 used to check the default key in IBSS
mode to see whether or not the network is protected,
it needs an update in that area, as well as an update
to make use of the WEP key passed to auth() for shared
key authentication.
Signed-off-by: Johannes Berg <johannes@sipsolutions.net>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2009-07-08 20:22:54 +08:00
|
|
|
const u8 *key;
|
|
|
|
u8 key_len, key_idx;
|
2011-11-19 03:31:59 +08:00
|
|
|
u32 flags;
|
|
|
|
struct ieee80211_ht_cap ht_capa;
|
|
|
|
struct ieee80211_ht_cap ht_capa_mask;
|
2009-07-02 03:26:54 +08:00
|
|
|
};
|
|
|
|
|
2009-04-21 00:39:05 +08:00
|
|
|
/**
|
|
|
|
* enum wiphy_params_flags - set_wiphy_params bitfield values
|
2010-06-07 17:12:27 +08:00
|
|
|
* @WIPHY_PARAM_RETRY_SHORT: wiphy->retry_short has changed
|
|
|
|
* @WIPHY_PARAM_RETRY_LONG: wiphy->retry_long has changed
|
|
|
|
* @WIPHY_PARAM_FRAG_THRESHOLD: wiphy->frag_threshold has changed
|
|
|
|
* @WIPHY_PARAM_RTS_THRESHOLD: wiphy->rts_threshold has changed
|
|
|
|
* @WIPHY_PARAM_COVERAGE_CLASS: coverage class changed
|
2009-04-21 00:39:05 +08:00
|
|
|
*/
|
|
|
|
enum wiphy_params_flags {
|
|
|
|
WIPHY_PARAM_RETRY_SHORT = 1 << 0,
|
|
|
|
WIPHY_PARAM_RETRY_LONG = 1 << 1,
|
|
|
|
WIPHY_PARAM_FRAG_THRESHOLD = 1 << 2,
|
|
|
|
WIPHY_PARAM_RTS_THRESHOLD = 1 << 3,
|
2009-12-22 05:50:47 +08:00
|
|
|
WIPHY_PARAM_COVERAGE_CLASS = 1 << 4,
|
2009-04-21 00:39:05 +08:00
|
|
|
};
|
|
|
|
|
2009-07-02 03:26:59 +08:00
|
|
|
/*
|
|
|
|
* cfg80211_bitrate_mask - masks for bitrate control
|
|
|
|
*/
|
|
|
|
struct cfg80211_bitrate_mask {
|
|
|
|
struct {
|
|
|
|
u32 legacy;
|
2012-01-29 00:25:32 +08:00
|
|
|
u8 mcs[IEEE80211_HT_MCS_MASK_LEN];
|
2009-07-02 03:26:59 +08:00
|
|
|
} control[IEEE80211_NUM_BANDS];
|
|
|
|
};
|
2009-11-25 06:59:15 +08:00
|
|
|
/**
|
|
|
|
* struct cfg80211_pmksa - PMK Security Association
|
|
|
|
*
|
|
|
|
* This structure is passed to the set/del_pmksa() method for PMKSA
|
|
|
|
* caching.
|
|
|
|
*
|
|
|
|
* @bssid: The AP's BSSID.
|
|
|
|
* @pmkid: The PMK material itself.
|
|
|
|
*/
|
|
|
|
struct cfg80211_pmksa {
|
|
|
|
u8 *bssid;
|
|
|
|
u8 *pmkid;
|
|
|
|
};
|
2009-07-02 03:26:59 +08:00
|
|
|
|
2011-05-04 21:37:28 +08:00
|
|
|
/**
|
|
|
|
* struct cfg80211_wowlan_trig_pkt_pattern - packet pattern
|
|
|
|
* @mask: bitmask where to match pattern and where to ignore bytes,
|
|
|
|
* one bit per byte, in same format as nl80211
|
|
|
|
* @pattern: bytes to match where bitmask is 1
|
|
|
|
* @pattern_len: length of pattern (in bytes)
|
|
|
|
*
|
|
|
|
* Internal note: @mask and @pattern are allocated in one chunk of
|
|
|
|
* memory, free @mask only!
|
|
|
|
*/
|
|
|
|
struct cfg80211_wowlan_trig_pkt_pattern {
|
|
|
|
u8 *mask, *pattern;
|
|
|
|
int pattern_len;
|
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* struct cfg80211_wowlan - Wake on Wireless-LAN support info
|
|
|
|
*
|
|
|
|
* This structure defines the enabled WoWLAN triggers for the device.
|
|
|
|
* @any: wake up on any activity -- special trigger if device continues
|
|
|
|
* operating as normal during suspend
|
|
|
|
* @disconnect: wake up if getting disconnected
|
|
|
|
* @magic_pkt: wake up on receiving magic packet
|
|
|
|
* @patterns: wake up on receiving packet matching a pattern
|
|
|
|
* @n_patterns: number of patterns
|
2011-07-13 16:48:55 +08:00
|
|
|
* @gtk_rekey_failure: wake up on GTK rekey failure
|
|
|
|
* @eap_identity_req: wake up on EAP identity request packet
|
|
|
|
* @four_way_handshake: wake up on 4-way handshake
|
|
|
|
* @rfkill_release: wake up when rfkill is released
|
2011-05-04 21:37:28 +08:00
|
|
|
*/
|
|
|
|
struct cfg80211_wowlan {
|
2011-07-13 16:48:55 +08:00
|
|
|
bool any, disconnect, magic_pkt, gtk_rekey_failure,
|
|
|
|
eap_identity_req, four_way_handshake,
|
|
|
|
rfkill_release;
|
2011-05-04 21:37:28 +08:00
|
|
|
struct cfg80211_wowlan_trig_pkt_pattern *patterns;
|
|
|
|
int n_patterns;
|
|
|
|
};
|
|
|
|
|
2011-07-05 22:35:40 +08:00
|
|
|
/**
|
|
|
|
* struct cfg80211_gtk_rekey_data - rekey data
|
|
|
|
* @kek: key encryption key
|
|
|
|
* @kck: key confirmation key
|
|
|
|
* @replay_ctr: replay counter
|
|
|
|
*/
|
|
|
|
struct cfg80211_gtk_rekey_data {
|
|
|
|
u8 kek[NL80211_KEK_LEN];
|
|
|
|
u8 kck[NL80211_KCK_LEN];
|
|
|
|
u8 replay_ctr[NL80211_REPLAY_CTR_LEN];
|
|
|
|
};
|
|
|
|
|
2007-04-24 03:20:05 +08:00
|
|
|
/**
|
|
|
|
* struct cfg80211_ops - backend description for wireless configuration
|
|
|
|
*
|
|
|
|
* This struct is registered by fullmac card drivers and/or wireless stacks
|
|
|
|
* in order to handle configuration requests on their interfaces.
|
|
|
|
*
|
|
|
|
* All callbacks except where otherwise noted should return 0
|
|
|
|
* on success or a negative error code.
|
|
|
|
*
|
2007-04-25 05:07:27 +08:00
|
|
|
* All operations are currently invoked under rtnl for consistency with the
|
|
|
|
* wireless extensions but this is subject to reevaluation as soon as this
|
|
|
|
* code is used more widely and we have a first user without wext.
|
|
|
|
*
|
2011-05-04 21:37:28 +08:00
|
|
|
* @suspend: wiphy device needs to be suspended. The variable @wow will
|
|
|
|
* be %NULL or contain the enabled Wake-on-Wireless triggers that are
|
|
|
|
* configured for the device.
|
2009-01-20 00:20:52 +08:00
|
|
|
* @resume: wiphy device needs to be resumed
|
|
|
|
*
|
2008-09-16 20:55:09 +08:00
|
|
|
* @add_virtual_intf: create a new virtual interface with the given name,
|
2009-07-14 06:33:35 +08:00
|
|
|
* must set the struct wireless_dev's iftype. Beware: You must create
|
2010-12-03 16:20:42 +08:00
|
|
|
* the new netdev in the wiphy's network namespace! Returns the netdev,
|
|
|
|
* or an ERR_PTR.
|
2007-04-24 03:20:05 +08:00
|
|
|
*
|
|
|
|
* @del_virtual_intf: remove the virtual interface determined by ifindex.
|
2007-09-21 01:09:35 +08:00
|
|
|
*
|
2008-09-16 20:55:09 +08:00
|
|
|
* @change_virtual_intf: change type/configuration of virtual interface,
|
|
|
|
* keep the struct wireless_dev's iftype updated.
|
2007-09-21 01:09:35 +08:00
|
|
|
*
|
2007-12-19 09:03:29 +08:00
|
|
|
* @add_key: add a key with the given parameters. @mac_addr will be %NULL
|
|
|
|
* when adding a group key.
|
|
|
|
*
|
|
|
|
* @get_key: get information about the key with the given parameters.
|
|
|
|
* @mac_addr will be %NULL when requesting information for a group
|
|
|
|
* key. All pointers given to the @callback function need not be valid
|
2009-05-19 01:56:36 +08:00
|
|
|
* after it returns. This function should return an error if it is
|
|
|
|
* not possible to retrieve the key, -ENOENT if it doesn't exist.
|
2007-12-19 09:03:29 +08:00
|
|
|
*
|
|
|
|
* @del_key: remove a key given the @mac_addr (%NULL for a group key)
|
2009-05-19 01:56:36 +08:00
|
|
|
* and @key_index, return -ENOENT if the key doesn't exist.
|
2007-12-19 09:03:29 +08:00
|
|
|
*
|
|
|
|
* @set_default_key: set the default key on an interface
|
2007-12-19 09:03:32 +08:00
|
|
|
*
|
2009-01-08 19:32:02 +08:00
|
|
|
* @set_default_mgmt_key: set the default management frame key on an interface
|
|
|
|
*
|
2011-07-05 22:35:40 +08:00
|
|
|
* @set_rekey_data: give the data necessary for GTK rekeying to the driver
|
|
|
|
*
|
2007-12-19 09:03:32 +08:00
|
|
|
* @add_beacon: Add a beacon with given parameters, @head, @interval
|
|
|
|
* and @dtim_period will be valid, @tail is optional.
|
|
|
|
* @set_beacon: Change the beacon parameters for an access point mode
|
|
|
|
* interface. This should reject the call when no beacon has been
|
|
|
|
* configured.
|
|
|
|
* @del_beacon: Remove beacon configuration and stop sending the beacon.
|
2007-12-19 09:03:34 +08:00
|
|
|
*
|
|
|
|
* @add_station: Add a new station.
|
|
|
|
* @del_station: Remove a station; @mac may be NULL to remove all stations.
|
2011-12-14 19:20:27 +08:00
|
|
|
* @change_station: Modify a given station. Note that flags changes are not much
|
|
|
|
* validated in cfg80211, in particular the auth/assoc/authorized flags
|
|
|
|
* might come to the driver in invalid combinations -- make sure to check
|
|
|
|
* them, also against the existing state! Also, supported_rates changes are
|
|
|
|
* not checked in station mode -- drivers need to reject (or ignore) them
|
|
|
|
* for anything but TDLS peers.
|
2010-06-07 17:12:27 +08:00
|
|
|
* @get_station: get station information for the station identified by @mac
|
|
|
|
* @dump_station: dump station callback -- resume dump at index @idx
|
|
|
|
*
|
|
|
|
* @add_mpath: add a fixed mesh path
|
|
|
|
* @del_mpath: delete a given mesh path
|
|
|
|
* @change_mpath: change a given mesh path
|
|
|
|
* @get_mpath: get a mesh path for the given parameters
|
|
|
|
* @dump_mpath: dump mesh path callback -- resume dump at index @idx
|
2011-01-07 05:36:45 +08:00
|
|
|
* @join_mesh: join the mesh network with the specified parameters
|
|
|
|
* @leave_mesh: leave the current mesh network
|
2008-02-23 22:17:06 +08:00
|
|
|
*
|
2010-12-17 09:37:48 +08:00
|
|
|
* @get_mesh_config: Get the current mesh configuration
|
2008-10-22 03:03:48 +08:00
|
|
|
*
|
2010-12-17 09:37:48 +08:00
|
|
|
* @update_mesh_config: Update mesh parameters on a running mesh.
|
2008-10-22 03:03:48 +08:00
|
|
|
* The mask is a bitfield which tells us which parameters to
|
|
|
|
* set, and which to leave alone.
|
|
|
|
*
|
2008-08-08 01:07:01 +08:00
|
|
|
* @change_bss: Modify parameters for a given BSS.
|
2008-10-30 22:59:24 +08:00
|
|
|
*
|
|
|
|
* @set_txq_params: Set TX queue parameters
|
2008-11-26 22:15:24 +08:00
|
|
|
*
|
cfg80211/mac80211: better channel handling
Currently (all tested with hwsim) you can do stupid
things like setting up an AP on a certain channel,
then adding another virtual interface and making
that associate on another channel -- this will make
the beaconing to move channel but obviously without
the necessary IEs data update.
In order to improve this situation, first make the
configuration APIs (cfg80211 and nl80211) aware of
multi-channel operation -- we'll eventually need
that in the future anyway. There's one userland API
change and one API addition. The API change is that
now SET_WIPHY must be called with virtual interface
index rather than only wiphy index in order to take
effect for that interface -- luckily all current
users (hostapd) do that. For monitor interfaces, the
old setting is preserved, but monitors are always
slaved to other devices anyway so no guarantees.
The second userland API change is the introduction
of a per virtual interface SET_CHANNEL command, that
hostapd should use going forward to make it easier
to understand what's going on (it can automatically
detect a kernel with this command).
Other than mac80211, no existing cfg80211 drivers
are affected by this change because they only allow
a single virtual interface.
mac80211, however, now needs to be aware that the
channel settings are per interface now, and needs
to disallow (for now) real multi-channel operation,
which is another important part of this patch.
One of the immediate benefits is that you can now
start hostapd to operate on a hardware that already
has a connection on another virtual interface, as
long as you specify the same channel.
Note that two things are left unhandled (this is an
improvement -- not a complete fix):
* different HT/no-HT modes
currently you could start an HT AP and then
connect to a non-HT network on the same channel
which would configure the hardware for no HT;
that can be fixed fairly easily
* CSA
An AP we're connected to on a virtual interface
might indicate switching channels, and in that
case we would follow it, regardless of how many
other interfaces are operating; this requires
more effort to fix but is pretty rare after all
Signed-off-by: Johannes Berg <johannes@sipsolutions.net>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2010-05-05 21:25:02 +08:00
|
|
|
* @set_channel: Set channel for a given wireless interface. Some devices
|
|
|
|
* may support multi-channel operation (by channel hopping) so cfg80211
|
|
|
|
* doesn't verify much. Note, however, that the passed netdev may be
|
|
|
|
* %NULL as well if the user requested changing the channel for the
|
|
|
|
* device itself, or for a monitor interface.
|
2011-11-09 17:30:21 +08:00
|
|
|
* @get_channel: Get the current operating channel, should return %NULL if
|
|
|
|
* there's no single defined operating channel if for example the
|
|
|
|
* device implements channel hopping for multi-channel virtual interfaces.
|
2009-01-13 22:03:29 +08:00
|
|
|
*
|
2009-02-11 04:25:55 +08:00
|
|
|
* @scan: Request to do a scan. If returning zero, the scan request is given
|
|
|
|
* the driver, and will be valid until passed to cfg80211_scan_done().
|
|
|
|
* For scan results, call cfg80211_inform_bss(); you can call this outside
|
|
|
|
* the scan/scan_done bracket too.
|
2009-03-19 19:39:22 +08:00
|
|
|
*
|
|
|
|
* @auth: Request to authenticate with the specified peer
|
|
|
|
* @assoc: Request to (re)associate with the specified peer
|
|
|
|
* @deauth: Request to deauthenticate from the specified peer
|
|
|
|
* @disassoc: Request to disassociate from the specified peer
|
2009-04-20 03:24:32 +08:00
|
|
|
*
|
2009-07-02 03:26:54 +08:00
|
|
|
* @connect: Connect to the ESS with the specified parameters. When connected,
|
|
|
|
* call cfg80211_connect_result() with status code %WLAN_STATUS_SUCCESS.
|
|
|
|
* If the connection fails for some reason, call cfg80211_connect_result()
|
|
|
|
* with the status from the AP.
|
|
|
|
* @disconnect: Disconnect from the BSS/ESS.
|
|
|
|
*
|
2009-04-20 03:24:32 +08:00
|
|
|
* @join_ibss: Join the specified IBSS (or create if necessary). Once done, call
|
|
|
|
* cfg80211_ibss_joined(), also call that function when changing BSSID due
|
|
|
|
* to a merge.
|
|
|
|
* @leave_ibss: Leave the IBSS.
|
2009-04-21 00:39:05 +08:00
|
|
|
*
|
|
|
|
* @set_wiphy_params: Notify that wiphy parameters have changed;
|
|
|
|
* @changed bitfield (see &enum wiphy_params_flags) describes which values
|
|
|
|
* have changed. The actual parameter values are available in
|
|
|
|
* struct wiphy. If returning an error, no value should be changed.
|
2009-06-02 19:01:39 +08:00
|
|
|
*
|
2011-11-29 05:38:46 +08:00
|
|
|
* @set_tx_power: set the transmit power according to the parameters,
|
|
|
|
* the power passed is in mBm, to get dBm use MBM_TO_DBM().
|
2009-06-02 19:01:39 +08:00
|
|
|
* @get_tx_power: store the current TX power into the dbm variable;
|
2009-06-02 19:01:41 +08:00
|
|
|
* return 0 if successful
|
|
|
|
*
|
2010-06-07 17:12:27 +08:00
|
|
|
* @set_wds_peer: set the WDS peer for a WDS interface
|
|
|
|
*
|
2009-06-02 19:01:41 +08:00
|
|
|
* @rfkill_poll: polls the hw rfkill line, use cfg80211 reporting
|
|
|
|
* functions to adjust rfkill hw state
|
2009-07-02 03:26:51 +08:00
|
|
|
*
|
2009-11-11 19:25:40 +08:00
|
|
|
* @dump_survey: get site survey information.
|
|
|
|
*
|
2009-12-23 20:15:41 +08:00
|
|
|
* @remain_on_channel: Request the driver to remain awake on the specified
|
|
|
|
* channel for the specified duration to complete an off-channel
|
|
|
|
* operation (e.g., public action frame exchange). When the driver is
|
|
|
|
* ready on the requested channel, it must indicate this with an event
|
|
|
|
* notification by calling cfg80211_ready_on_channel().
|
|
|
|
* @cancel_remain_on_channel: Cancel an on-going remain-on-channel operation.
|
|
|
|
* This allows the operation to be terminated prior to timeout based on
|
|
|
|
* the duration value.
|
2010-11-25 17:02:29 +08:00
|
|
|
* @mgmt_tx: Transmit a management frame.
|
|
|
|
* @mgmt_tx_cancel_wait: Cancel the wait time from transmitting a management
|
|
|
|
* frame on another channel
|
2009-12-23 20:15:41 +08:00
|
|
|
*
|
2009-07-02 03:26:51 +08:00
|
|
|
* @testmode_cmd: run a test mode command
|
2011-05-21 00:05:54 +08:00
|
|
|
* @testmode_dump: Implement a test mode dump. The cb->args[2] and up may be
|
|
|
|
* used by the function, but 0 and 1 must not be touched. Additionally,
|
|
|
|
* return error codes other than -ENOBUFS and -ENOENT will terminate the
|
|
|
|
* dump and return to userspace with an error, so be careful. If any data
|
|
|
|
* was passed in from userspace then the data/len arguments will be present
|
|
|
|
* and point to the data contained in %NL80211_ATTR_TESTDATA.
|
2009-11-25 06:59:15 +08:00
|
|
|
*
|
2010-06-07 17:12:27 +08:00
|
|
|
* @set_bitrate_mask: set the bitrate mask configuration
|
|
|
|
*
|
2009-11-25 06:59:15 +08:00
|
|
|
* @set_pmksa: Cache a PMKID for a BSSID. This is mostly useful for fullmac
|
|
|
|
* devices running firmwares capable of generating the (re) association
|
|
|
|
* RSN IE. It allows for faster roaming between WPA2 BSSIDs.
|
|
|
|
* @del_pmksa: Delete a cached PMKID.
|
|
|
|
* @flush_pmksa: Flush all cached PMKIDs.
|
2010-04-27 17:47:41 +08:00
|
|
|
* @set_power_mgmt: Configure WLAN power management. A timeout value of -1
|
|
|
|
* allows the driver to adjust the dynamic ps timeout value.
|
2010-03-23 15:02:33 +08:00
|
|
|
* @set_cqm_rssi_config: Configure connection quality monitor RSSI threshold.
|
2011-05-11 22:09:35 +08:00
|
|
|
* @sched_scan_start: Tell the driver to start a scheduled scan.
|
|
|
|
* @sched_scan_stop: Tell the driver to stop an ongoing scheduled
|
|
|
|
* scan. The driver_initiated flag specifies whether the driver
|
|
|
|
* itself has informed that the scan has stopped.
|
2009-11-25 06:59:15 +08:00
|
|
|
*
|
2010-10-13 18:06:23 +08:00
|
|
|
* @mgmt_frame_register: Notify driver that a management frame type was
|
|
|
|
* registered. Note that this callback may not sleep, and cannot run
|
|
|
|
* concurrently with itself.
|
2010-12-02 15:23:12 +08:00
|
|
|
*
|
|
|
|
* @set_antenna: Set antenna configuration (tx_ant, rx_ant) on the device.
|
|
|
|
* Parameters are bitmaps of allowed antennas to use for TX/RX. Drivers may
|
|
|
|
* reject TX/RX mask combinations they cannot support by returning -EINVAL
|
|
|
|
* (also see nl80211.h @NL80211_ATTR_WIPHY_ANTENNA_TX).
|
|
|
|
*
|
|
|
|
* @get_antenna: Get current antenna configuration from device (tx_ant, rx_ant).
|
2011-03-08 05:17:59 +08:00
|
|
|
*
|
|
|
|
* @set_ringparam: Set tx and rx ring sizes.
|
|
|
|
*
|
|
|
|
* @get_ringparam: Get tx and rx ring current and maximum sizes.
|
2011-09-28 19:12:50 +08:00
|
|
|
*
|
|
|
|
* @tdls_mgmt: Transmit a TDLS management frame.
|
|
|
|
* @tdls_oper: Perform a high-level TDLS operation (e.g. TDLS link setup).
|
2011-11-04 18:18:15 +08:00
|
|
|
*
|
|
|
|
* @probe_client: probe an associated client, must return a cookie that it
|
|
|
|
* later passes to cfg80211_probe_status().
|
2011-11-18 21:20:43 +08:00
|
|
|
*
|
|
|
|
* @set_noack_map: Set the NoAck Map for the TIDs.
|
2007-04-24 03:20:05 +08:00
|
|
|
*/
|
|
|
|
struct cfg80211_ops {
|
2011-05-04 21:37:28 +08:00
|
|
|
int (*suspend)(struct wiphy *wiphy, struct cfg80211_wowlan *wow);
|
2009-01-20 00:20:52 +08:00
|
|
|
int (*resume)(struct wiphy *wiphy);
|
|
|
|
|
2010-12-03 16:20:42 +08:00
|
|
|
struct net_device * (*add_virtual_intf)(struct wiphy *wiphy,
|
|
|
|
char *name,
|
|
|
|
enum nl80211_iftype type,
|
|
|
|
u32 *flags,
|
|
|
|
struct vif_params *params);
|
2009-07-14 06:33:35 +08:00
|
|
|
int (*del_virtual_intf)(struct wiphy *wiphy, struct net_device *dev);
|
2009-06-10 03:04:43 +08:00
|
|
|
int (*change_virtual_intf)(struct wiphy *wiphy,
|
|
|
|
struct net_device *dev,
|
2008-02-23 22:17:06 +08:00
|
|
|
enum nl80211_iftype type, u32 *flags,
|
|
|
|
struct vif_params *params);
|
2007-12-19 09:03:29 +08:00
|
|
|
|
|
|
|
int (*add_key)(struct wiphy *wiphy, struct net_device *netdev,
|
2010-10-06 01:39:30 +08:00
|
|
|
u8 key_index, bool pairwise, const u8 *mac_addr,
|
2007-12-19 09:03:29 +08:00
|
|
|
struct key_params *params);
|
|
|
|
int (*get_key)(struct wiphy *wiphy, struct net_device *netdev,
|
2010-10-06 01:39:30 +08:00
|
|
|
u8 key_index, bool pairwise, const u8 *mac_addr,
|
|
|
|
void *cookie,
|
2007-12-19 09:03:29 +08:00
|
|
|
void (*callback)(void *cookie, struct key_params*));
|
|
|
|
int (*del_key)(struct wiphy *wiphy, struct net_device *netdev,
|
2010-10-06 01:39:30 +08:00
|
|
|
u8 key_index, bool pairwise, const u8 *mac_addr);
|
2007-12-19 09:03:29 +08:00
|
|
|
int (*set_default_key)(struct wiphy *wiphy,
|
|
|
|
struct net_device *netdev,
|
2010-12-10 02:58:59 +08:00
|
|
|
u8 key_index, bool unicast, bool multicast);
|
2009-01-08 19:32:02 +08:00
|
|
|
int (*set_default_mgmt_key)(struct wiphy *wiphy,
|
|
|
|
struct net_device *netdev,
|
|
|
|
u8 key_index);
|
2007-12-19 09:03:32 +08:00
|
|
|
|
2012-02-13 22:17:18 +08:00
|
|
|
int (*start_ap)(struct wiphy *wiphy, struct net_device *dev,
|
|
|
|
struct cfg80211_ap_settings *settings);
|
|
|
|
int (*change_beacon)(struct wiphy *wiphy, struct net_device *dev,
|
|
|
|
struct cfg80211_beacon_data *info);
|
|
|
|
int (*stop_ap)(struct wiphy *wiphy, struct net_device *dev);
|
2007-12-19 09:03:34 +08:00
|
|
|
|
|
|
|
|
|
|
|
int (*add_station)(struct wiphy *wiphy, struct net_device *dev,
|
|
|
|
u8 *mac, struct station_parameters *params);
|
|
|
|
int (*del_station)(struct wiphy *wiphy, struct net_device *dev,
|
|
|
|
u8 *mac);
|
|
|
|
int (*change_station)(struct wiphy *wiphy, struct net_device *dev,
|
|
|
|
u8 *mac, struct station_parameters *params);
|
2007-12-19 09:03:36 +08:00
|
|
|
int (*get_station)(struct wiphy *wiphy, struct net_device *dev,
|
2008-02-23 22:17:06 +08:00
|
|
|
u8 *mac, struct station_info *sinfo);
|
|
|
|
int (*dump_station)(struct wiphy *wiphy, struct net_device *dev,
|
|
|
|
int idx, u8 *mac, struct station_info *sinfo);
|
|
|
|
|
|
|
|
int (*add_mpath)(struct wiphy *wiphy, struct net_device *dev,
|
|
|
|
u8 *dst, u8 *next_hop);
|
|
|
|
int (*del_mpath)(struct wiphy *wiphy, struct net_device *dev,
|
|
|
|
u8 *dst);
|
|
|
|
int (*change_mpath)(struct wiphy *wiphy, struct net_device *dev,
|
|
|
|
u8 *dst, u8 *next_hop);
|
|
|
|
int (*get_mpath)(struct wiphy *wiphy, struct net_device *dev,
|
|
|
|
u8 *dst, u8 *next_hop,
|
|
|
|
struct mpath_info *pinfo);
|
|
|
|
int (*dump_mpath)(struct wiphy *wiphy, struct net_device *dev,
|
|
|
|
int idx, u8 *dst, u8 *next_hop,
|
|
|
|
struct mpath_info *pinfo);
|
2010-12-17 09:37:48 +08:00
|
|
|
int (*get_mesh_config)(struct wiphy *wiphy,
|
2008-10-22 03:03:48 +08:00
|
|
|
struct net_device *dev,
|
|
|
|
struct mesh_config *conf);
|
2010-12-17 09:37:48 +08:00
|
|
|
int (*update_mesh_config)(struct wiphy *wiphy,
|
2010-12-03 16:20:44 +08:00
|
|
|
struct net_device *dev, u32 mask,
|
|
|
|
const struct mesh_config *nconf);
|
|
|
|
int (*join_mesh)(struct wiphy *wiphy, struct net_device *dev,
|
|
|
|
const struct mesh_config *conf,
|
|
|
|
const struct mesh_setup *setup);
|
|
|
|
int (*leave_mesh)(struct wiphy *wiphy, struct net_device *dev);
|
|
|
|
|
2008-08-08 01:07:01 +08:00
|
|
|
int (*change_bss)(struct wiphy *wiphy, struct net_device *dev,
|
|
|
|
struct bss_parameters *params);
|
2008-10-30 22:59:24 +08:00
|
|
|
|
2011-09-26 01:06:53 +08:00
|
|
|
int (*set_txq_params)(struct wiphy *wiphy, struct net_device *dev,
|
2008-10-30 22:59:24 +08:00
|
|
|
struct ieee80211_txq_params *params);
|
2008-11-26 22:15:24 +08:00
|
|
|
|
cfg80211/mac80211: better channel handling
Currently (all tested with hwsim) you can do stupid
things like setting up an AP on a certain channel,
then adding another virtual interface and making
that associate on another channel -- this will make
the beaconing to move channel but obviously without
the necessary IEs data update.
In order to improve this situation, first make the
configuration APIs (cfg80211 and nl80211) aware of
multi-channel operation -- we'll eventually need
that in the future anyway. There's one userland API
change and one API addition. The API change is that
now SET_WIPHY must be called with virtual interface
index rather than only wiphy index in order to take
effect for that interface -- luckily all current
users (hostapd) do that. For monitor interfaces, the
old setting is preserved, but monitors are always
slaved to other devices anyway so no guarantees.
The second userland API change is the introduction
of a per virtual interface SET_CHANNEL command, that
hostapd should use going forward to make it easier
to understand what's going on (it can automatically
detect a kernel with this command).
Other than mac80211, no existing cfg80211 drivers
are affected by this change because they only allow
a single virtual interface.
mac80211, however, now needs to be aware that the
channel settings are per interface now, and needs
to disallow (for now) real multi-channel operation,
which is another important part of this patch.
One of the immediate benefits is that you can now
start hostapd to operate on a hardware that already
has a connection on another virtual interface, as
long as you specify the same channel.
Note that two things are left unhandled (this is an
improvement -- not a complete fix):
* different HT/no-HT modes
currently you could start an HT AP and then
connect to a non-HT network on the same channel
which would configure the hardware for no HT;
that can be fixed fairly easily
* CSA
An AP we're connected to on a virtual interface
might indicate switching channels, and in that
case we would follow it, regardless of how many
other interfaces are operating; this requires
more effort to fix but is pretty rare after all
Signed-off-by: Johannes Berg <johannes@sipsolutions.net>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2010-05-05 21:25:02 +08:00
|
|
|
int (*set_channel)(struct wiphy *wiphy, struct net_device *dev,
|
2008-11-26 22:15:24 +08:00
|
|
|
struct ieee80211_channel *chan,
|
2008-12-12 14:27:43 +08:00
|
|
|
enum nl80211_channel_type channel_type);
|
2009-01-13 22:03:29 +08:00
|
|
|
|
2009-02-11 04:25:55 +08:00
|
|
|
int (*scan)(struct wiphy *wiphy, struct net_device *dev,
|
|
|
|
struct cfg80211_scan_request *request);
|
2009-03-19 19:39:22 +08:00
|
|
|
|
|
|
|
int (*auth)(struct wiphy *wiphy, struct net_device *dev,
|
|
|
|
struct cfg80211_auth_request *req);
|
|
|
|
int (*assoc)(struct wiphy *wiphy, struct net_device *dev,
|
|
|
|
struct cfg80211_assoc_request *req);
|
|
|
|
int (*deauth)(struct wiphy *wiphy, struct net_device *dev,
|
2012-02-24 20:50:51 +08:00
|
|
|
struct cfg80211_deauth_request *req);
|
2009-03-19 19:39:22 +08:00
|
|
|
int (*disassoc)(struct wiphy *wiphy, struct net_device *dev,
|
2012-02-24 20:50:51 +08:00
|
|
|
struct cfg80211_disassoc_request *req);
|
2009-04-20 03:24:32 +08:00
|
|
|
|
2009-07-02 03:26:54 +08:00
|
|
|
int (*connect)(struct wiphy *wiphy, struct net_device *dev,
|
|
|
|
struct cfg80211_connect_params *sme);
|
|
|
|
int (*disconnect)(struct wiphy *wiphy, struct net_device *dev,
|
|
|
|
u16 reason_code);
|
|
|
|
|
2009-04-20 03:24:32 +08:00
|
|
|
int (*join_ibss)(struct wiphy *wiphy, struct net_device *dev,
|
|
|
|
struct cfg80211_ibss_params *params);
|
|
|
|
int (*leave_ibss)(struct wiphy *wiphy, struct net_device *dev);
|
2009-04-21 00:39:05 +08:00
|
|
|
|
|
|
|
int (*set_wiphy_params)(struct wiphy *wiphy, u32 changed);
|
2009-06-02 19:01:39 +08:00
|
|
|
|
|
|
|
int (*set_tx_power)(struct wiphy *wiphy,
|
2010-06-23 17:12:37 +08:00
|
|
|
enum nl80211_tx_power_setting type, int mbm);
|
2009-06-02 19:01:39 +08:00
|
|
|
int (*get_tx_power)(struct wiphy *wiphy, int *dbm);
|
2009-06-02 19:01:41 +08:00
|
|
|
|
2009-07-02 03:26:58 +08:00
|
|
|
int (*set_wds_peer)(struct wiphy *wiphy, struct net_device *dev,
|
2010-10-07 19:11:09 +08:00
|
|
|
const u8 *addr);
|
2009-07-02 03:26:58 +08:00
|
|
|
|
2009-06-02 19:01:41 +08:00
|
|
|
void (*rfkill_poll)(struct wiphy *wiphy);
|
2009-07-02 03:26:51 +08:00
|
|
|
|
|
|
|
#ifdef CONFIG_NL80211_TESTMODE
|
|
|
|
int (*testmode_cmd)(struct wiphy *wiphy, void *data, int len);
|
2011-05-21 00:05:54 +08:00
|
|
|
int (*testmode_dump)(struct wiphy *wiphy, struct sk_buff *skb,
|
|
|
|
struct netlink_callback *cb,
|
|
|
|
void *data, int len);
|
2009-07-02 03:26:51 +08:00
|
|
|
#endif
|
2009-07-02 03:26:57 +08:00
|
|
|
|
2009-07-02 03:26:59 +08:00
|
|
|
int (*set_bitrate_mask)(struct wiphy *wiphy,
|
|
|
|
struct net_device *dev,
|
|
|
|
const u8 *peer,
|
|
|
|
const struct cfg80211_bitrate_mask *mask);
|
|
|
|
|
2009-11-11 19:25:40 +08:00
|
|
|
int (*dump_survey)(struct wiphy *wiphy, struct net_device *netdev,
|
|
|
|
int idx, struct survey_info *info);
|
|
|
|
|
2009-11-25 06:59:15 +08:00
|
|
|
int (*set_pmksa)(struct wiphy *wiphy, struct net_device *netdev,
|
|
|
|
struct cfg80211_pmksa *pmksa);
|
|
|
|
int (*del_pmksa)(struct wiphy *wiphy, struct net_device *netdev,
|
|
|
|
struct cfg80211_pmksa *pmksa);
|
|
|
|
int (*flush_pmksa)(struct wiphy *wiphy, struct net_device *netdev);
|
|
|
|
|
2009-12-23 20:15:41 +08:00
|
|
|
int (*remain_on_channel)(struct wiphy *wiphy,
|
|
|
|
struct net_device *dev,
|
|
|
|
struct ieee80211_channel *chan,
|
|
|
|
enum nl80211_channel_type channel_type,
|
|
|
|
unsigned int duration,
|
|
|
|
u64 *cookie);
|
|
|
|
int (*cancel_remain_on_channel)(struct wiphy *wiphy,
|
|
|
|
struct net_device *dev,
|
|
|
|
u64 cookie);
|
|
|
|
|
2010-08-12 21:38:38 +08:00
|
|
|
int (*mgmt_tx)(struct wiphy *wiphy, struct net_device *dev,
|
2010-11-25 17:02:29 +08:00
|
|
|
struct ieee80211_channel *chan, bool offchan,
|
2010-02-15 18:53:10 +08:00
|
|
|
enum nl80211_channel_type channel_type,
|
2010-11-25 17:02:29 +08:00
|
|
|
bool channel_type_valid, unsigned int wait,
|
2011-09-25 17:23:30 +08:00
|
|
|
const u8 *buf, size_t len, bool no_cck,
|
2011-11-04 18:18:21 +08:00
|
|
|
bool dont_wait_for_ack, u64 *cookie);
|
2010-11-25 17:02:29 +08:00
|
|
|
int (*mgmt_tx_cancel_wait)(struct wiphy *wiphy,
|
|
|
|
struct net_device *dev,
|
|
|
|
u64 cookie);
|
2010-02-15 18:53:10 +08:00
|
|
|
|
2009-07-02 03:26:57 +08:00
|
|
|
int (*set_power_mgmt)(struct wiphy *wiphy, struct net_device *dev,
|
|
|
|
bool enabled, int timeout);
|
2010-03-23 15:02:33 +08:00
|
|
|
|
|
|
|
int (*set_cqm_rssi_config)(struct wiphy *wiphy,
|
|
|
|
struct net_device *dev,
|
|
|
|
s32 rssi_thold, u32 rssi_hyst);
|
2010-10-13 18:06:23 +08:00
|
|
|
|
|
|
|
void (*mgmt_frame_register)(struct wiphy *wiphy,
|
|
|
|
struct net_device *dev,
|
|
|
|
u16 frame_type, bool reg);
|
cfg80211: Add nl80211 antenna configuration
Allow setting of TX and RX antennas configuration via nl80211.
The antenna configuration is defined as a bitmap of allowed antennas to use.
This API can be used to mask out antennas which are not attached or should not
be used for other reasons like regulatory concerns or special setups.
Separate bitmaps are used for RX and TX to allow configuring different antennas
for receiving and transmitting. Each bitmap is 32 bit long, each bit
representing one antenna, starting with antenna 1 at the first bit. If an
antenna bit is set, this means the driver is allowed to use this antenna for RX
or TX respectively; if the bit is not set the hardware is not allowed to use
this antenna.
Using bitmaps has the benefit of allowing for a flexible configuration
interface which can support many different configurations and which can be used
for 802.11n as well as non-802.11n devices. Instead of relying on some hardware
specific assumptions, drivers can use this information to know which antennas
are actually attached to the system and derive their capabilities based on
that.
802.11n devices should enable or disable chains, based on which antennas are
present (If all antennas belonging to a particular chain are disabled, the
entire chain should be disabled). HT capabilities (like STBC, TX Beamforming,
Antenna selection) should be calculated based on the available chains after
applying the antenna masks. Should a 802.11n device have diversity antennas
attached to one of their chains, diversity can be enabled or disabled based on
the antenna information.
Non-802.11n drivers can use the antenna masks to select RX and TX antennas and
to enable or disable antenna diversity.
While covering chainmasks for 802.11n and the standard "legacy" modes "fixed
antenna 1", "fixed antenna 2" and "diversity" this API also allows more rare,
but useful configurations as follows:
1) Send on antenna 1, receive on antenna 2 (or vice versa). This can be used to
have a low gain antenna for TX in order to keep within the regulatory
constraints and a high gain antenna for RX in order to receive weaker signals
("speak softly, but listen harder"). This can be useful for building long-shot
outdoor links. Another usage of this setup is having a low-noise pre-amplifier
on antenna 1 and a power amplifier on the other antenna. This way transmit
noise is mostly kept out of the low noise receive channel.
(This would be bitmaps: tx 1 rx 2).
2) Another similar setup is: Use RX diversity on both antennas, but always send
on antenna 1. Again that would allow us to benefit from a higher gain RX
antenna, while staying within the legal limits.
(This would be: tx 0 rx 3).
3) And finally there can be special experimental setups in research and
development even with pre 802.11n hardware where more than 2 antennas are
available. It's good to keep the API simple, yet flexible.
Signed-off-by: Bruno Randolf <br1@einfach.org>
--
v7: Made bitmasks 32 bit wide and rebased to latest wireless-testing.
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2010-11-10 11:50:50 +08:00
|
|
|
|
|
|
|
int (*set_antenna)(struct wiphy *wiphy, u32 tx_ant, u32 rx_ant);
|
|
|
|
int (*get_antenna)(struct wiphy *wiphy, u32 *tx_ant, u32 *rx_ant);
|
2011-03-08 05:17:59 +08:00
|
|
|
|
|
|
|
int (*set_ringparam)(struct wiphy *wiphy, u32 tx, u32 rx);
|
|
|
|
void (*get_ringparam)(struct wiphy *wiphy,
|
|
|
|
u32 *tx, u32 *tx_max, u32 *rx, u32 *rx_max);
|
2011-05-11 22:09:35 +08:00
|
|
|
|
|
|
|
int (*sched_scan_start)(struct wiphy *wiphy,
|
|
|
|
struct net_device *dev,
|
|
|
|
struct cfg80211_sched_scan_request *request);
|
2011-05-12 21:28:29 +08:00
|
|
|
int (*sched_scan_stop)(struct wiphy *wiphy, struct net_device *dev);
|
2011-07-05 22:35:40 +08:00
|
|
|
|
|
|
|
int (*set_rekey_data)(struct wiphy *wiphy, struct net_device *dev,
|
|
|
|
struct cfg80211_gtk_rekey_data *data);
|
2011-09-28 19:12:50 +08:00
|
|
|
|
|
|
|
int (*tdls_mgmt)(struct wiphy *wiphy, struct net_device *dev,
|
|
|
|
u8 *peer, u8 action_code, u8 dialog_token,
|
|
|
|
u16 status_code, const u8 *buf, size_t len);
|
|
|
|
int (*tdls_oper)(struct wiphy *wiphy, struct net_device *dev,
|
|
|
|
u8 *peer, enum nl80211_tdls_operation oper);
|
2011-11-04 18:18:15 +08:00
|
|
|
|
|
|
|
int (*probe_client)(struct wiphy *wiphy, struct net_device *dev,
|
|
|
|
const u8 *peer, u64 *cookie);
|
2011-11-09 17:30:21 +08:00
|
|
|
|
2011-11-18 21:20:43 +08:00
|
|
|
int (*set_noack_map)(struct wiphy *wiphy,
|
|
|
|
struct net_device *dev,
|
|
|
|
u16 noack_map);
|
|
|
|
|
2011-11-09 17:30:21 +08:00
|
|
|
struct ieee80211_channel *(*get_channel)(struct wiphy *wiphy);
|
2007-04-24 03:20:05 +08:00
|
|
|
};
|
|
|
|
|
2009-04-20 20:31:42 +08:00
|
|
|
/*
|
|
|
|
* wireless hardware and networking interfaces structures
|
|
|
|
* and registration/helper functions
|
|
|
|
*/
|
|
|
|
|
|
|
|
/**
|
2009-11-19 07:56:28 +08:00
|
|
|
* enum wiphy_flags - wiphy capability flags
|
|
|
|
*
|
|
|
|
* @WIPHY_FLAG_CUSTOM_REGULATORY: tells us the driver for this device
|
2009-04-20 20:31:42 +08:00
|
|
|
* has its own custom regulatory domain and cannot identify the
|
|
|
|
* ISO / IEC 3166 alpha2 it belongs to. When this is enabled
|
|
|
|
* we will disregard the first regulatory hint (when the
|
|
|
|
* initiator is %REGDOM_SET_BY_CORE).
|
2009-11-19 07:56:28 +08:00
|
|
|
* @WIPHY_FLAG_STRICT_REGULATORY: tells us the driver for this device will
|
|
|
|
* ignore regulatory domain settings until it gets its own regulatory
|
2010-10-21 01:18:54 +08:00
|
|
|
* domain via its regulatory_hint() unless the regulatory hint is
|
|
|
|
* from a country IE. After its gets its own regulatory domain it will
|
|
|
|
* only allow further regulatory domain settings to further enhance
|
|
|
|
* compliance. For example if channel 13 and 14 are disabled by this
|
|
|
|
* regulatory domain no user regulatory domain can enable these channels
|
|
|
|
* at a later time. This can be used for devices which do not have
|
|
|
|
* calibration information guaranteed for frequencies or settings
|
2011-12-08 00:20:07 +08:00
|
|
|
* outside of its regulatory domain. If used in combination with
|
|
|
|
* WIPHY_FLAG_CUSTOM_REGULATORY the inspected country IE power settings
|
|
|
|
* will be followed.
|
2009-11-19 07:56:28 +08:00
|
|
|
* @WIPHY_FLAG_DISABLE_BEACON_HINTS: enable this if your driver needs to ensure
|
|
|
|
* that passive scan flags and beaconing flags may not be lifted by
|
|
|
|
* cfg80211 due to regulatory beacon hints. For more information on beacon
|
2009-07-31 08:43:48 +08:00
|
|
|
* hints read the documenation for regulatory_hint_found_beacon()
|
2009-11-19 07:56:28 +08:00
|
|
|
* @WIPHY_FLAG_NETNS_OK: if not set, do not allow changing the netns of this
|
|
|
|
* wiphy at all
|
2011-05-13 16:58:57 +08:00
|
|
|
* @WIPHY_FLAG_ENFORCE_COMBINATIONS: Set this flag to enforce interface
|
|
|
|
* combinations for this device. This flag is used for backward
|
|
|
|
* compatibility only until all drivers advertise combinations and
|
|
|
|
* they will always be enforced.
|
2009-11-19 07:56:28 +08:00
|
|
|
* @WIPHY_FLAG_PS_ON_BY_DEFAULT: if set to true, powersave will be enabled
|
|
|
|
* by default -- this flag will be set depending on the kernel's default
|
|
|
|
* on wiphy_new(), but can be changed by the driver if it has a good
|
|
|
|
* reason to override the default
|
2009-11-19 18:55:19 +08:00
|
|
|
* @WIPHY_FLAG_4ADDR_AP: supports 4addr mode even on AP (with a single station
|
|
|
|
* on a VLAN interface)
|
|
|
|
* @WIPHY_FLAG_4ADDR_STATION: supports 4addr mode even as a station
|
2010-08-27 19:26:53 +08:00
|
|
|
* @WIPHY_FLAG_CONTROL_PORT_PROTOCOL: This device supports setting the
|
|
|
|
* control port protocol ethertype. The device also honours the
|
|
|
|
* control_port_no_encrypt flag.
|
2010-10-06 01:39:30 +08:00
|
|
|
* @WIPHY_FLAG_IBSS_RSN: The device supports IBSS RSN.
|
2011-04-08 06:08:28 +08:00
|
|
|
* @WIPHY_FLAG_MESH_AUTH: The device supports mesh authentication by routing
|
|
|
|
* auth frames to userspace. See @NL80211_MESH_SETUP_USERSPACE_AUTH.
|
2011-05-23 08:16:20 +08:00
|
|
|
* @WIPHY_FLAG_SUPPORTS_SCHED_SCAN: The device supports scheduled scans.
|
2011-08-29 16:53:03 +08:00
|
|
|
* @WIPHY_FLAG_SUPPORTS_FW_ROAM: The device supports roaming feature in the
|
|
|
|
* firmware.
|
2011-08-31 16:29:43 +08:00
|
|
|
* @WIPHY_FLAG_AP_UAPSD: The device supports uapsd on AP.
|
2011-09-28 19:12:50 +08:00
|
|
|
* @WIPHY_FLAG_SUPPORTS_TDLS: The device supports TDLS (802.11z) operation.
|
|
|
|
* @WIPHY_FLAG_TDLS_EXTERNAL_SETUP: The device does not handle TDLS (802.11z)
|
|
|
|
* link setup/discovery operations internally. Setup, discovery and
|
|
|
|
* teardown packets should be sent through the @NL80211_CMD_TDLS_MGMT
|
|
|
|
* command. When this flag is not set, @NL80211_CMD_TDLS_OPER should be
|
|
|
|
* used for asking the driver/firmware to perform a TDLS operation.
|
2011-11-07 19:39:33 +08:00
|
|
|
* @WIPHY_FLAG_HAVE_AP_SME: device integrates AP SME
|
2011-11-04 18:18:17 +08:00
|
|
|
* @WIPHY_FLAG_REPORTS_OBSS: the device will report beacons from other BSSes
|
|
|
|
* when there are virtual interfaces in AP mode by calling
|
|
|
|
* cfg80211_report_obss_beacon().
|
2011-11-10 17:28:55 +08:00
|
|
|
* @WIPHY_FLAG_AP_PROBE_RESP_OFFLOAD: When operating as an AP, the device
|
|
|
|
* responds to probe-requests in hardware.
|
2011-11-18 22:33:48 +08:00
|
|
|
* @WIPHY_FLAG_OFFCHAN_TX: Device supports direct off-channel TX.
|
|
|
|
* @WIPHY_FLAG_HAS_REMAIN_ON_CHANNEL: Device supports remain-on-channel call.
|
2009-11-19 07:56:28 +08:00
|
|
|
*/
|
|
|
|
enum wiphy_flags {
|
2010-08-27 19:26:53 +08:00
|
|
|
WIPHY_FLAG_CUSTOM_REGULATORY = BIT(0),
|
|
|
|
WIPHY_FLAG_STRICT_REGULATORY = BIT(1),
|
|
|
|
WIPHY_FLAG_DISABLE_BEACON_HINTS = BIT(2),
|
|
|
|
WIPHY_FLAG_NETNS_OK = BIT(3),
|
|
|
|
WIPHY_FLAG_PS_ON_BY_DEFAULT = BIT(4),
|
|
|
|
WIPHY_FLAG_4ADDR_AP = BIT(5),
|
|
|
|
WIPHY_FLAG_4ADDR_STATION = BIT(6),
|
|
|
|
WIPHY_FLAG_CONTROL_PORT_PROTOCOL = BIT(7),
|
2010-11-12 14:53:56 +08:00
|
|
|
WIPHY_FLAG_IBSS_RSN = BIT(8),
|
2011-04-08 06:08:28 +08:00
|
|
|
WIPHY_FLAG_MESH_AUTH = BIT(10),
|
2011-05-11 22:09:35 +08:00
|
|
|
WIPHY_FLAG_SUPPORTS_SCHED_SCAN = BIT(11),
|
2011-05-13 16:58:57 +08:00
|
|
|
WIPHY_FLAG_ENFORCE_COMBINATIONS = BIT(12),
|
2011-08-29 16:53:03 +08:00
|
|
|
WIPHY_FLAG_SUPPORTS_FW_ROAM = BIT(13),
|
2011-08-31 16:29:43 +08:00
|
|
|
WIPHY_FLAG_AP_UAPSD = BIT(14),
|
2011-09-28 19:12:50 +08:00
|
|
|
WIPHY_FLAG_SUPPORTS_TDLS = BIT(15),
|
|
|
|
WIPHY_FLAG_TDLS_EXTERNAL_SETUP = BIT(16),
|
2011-11-07 19:39:33 +08:00
|
|
|
WIPHY_FLAG_HAVE_AP_SME = BIT(17),
|
2011-11-04 18:18:17 +08:00
|
|
|
WIPHY_FLAG_REPORTS_OBSS = BIT(18),
|
2011-11-10 17:28:55 +08:00
|
|
|
WIPHY_FLAG_AP_PROBE_RESP_OFFLOAD = BIT(19),
|
2011-11-18 22:33:48 +08:00
|
|
|
WIPHY_FLAG_OFFCHAN_TX = BIT(20),
|
|
|
|
WIPHY_FLAG_HAS_REMAIN_ON_CHANNEL = BIT(21),
|
2011-05-13 16:58:57 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* struct ieee80211_iface_limit - limit on certain interface types
|
|
|
|
* @max: maximum number of interfaces of these types
|
|
|
|
* @types: interface types (bits)
|
|
|
|
*/
|
|
|
|
struct ieee80211_iface_limit {
|
|
|
|
u16 max;
|
|
|
|
u16 types;
|
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* struct ieee80211_iface_combination - possible interface combination
|
|
|
|
* @limits: limits for the given interface types
|
|
|
|
* @n_limits: number of limitations
|
|
|
|
* @num_different_channels: can use up to this many different channels
|
|
|
|
* @max_interfaces: maximum number of interfaces in total allowed in this
|
|
|
|
* group
|
|
|
|
* @beacon_int_infra_match: In this combination, the beacon intervals
|
|
|
|
* between infrastructure and AP types must match. This is required
|
|
|
|
* only in special cases.
|
|
|
|
*
|
|
|
|
* These examples can be expressed as follows:
|
|
|
|
*
|
|
|
|
* Allow #STA <= 1, #AP <= 1, matching BI, channels = 1, 2 total:
|
|
|
|
*
|
|
|
|
* struct ieee80211_iface_limit limits1[] = {
|
|
|
|
* { .max = 1, .types = BIT(NL80211_IFTYPE_STATION), },
|
|
|
|
* { .max = 1, .types = BIT(NL80211_IFTYPE_AP}, },
|
|
|
|
* };
|
|
|
|
* struct ieee80211_iface_combination combination1 = {
|
|
|
|
* .limits = limits1,
|
|
|
|
* .n_limits = ARRAY_SIZE(limits1),
|
|
|
|
* .max_interfaces = 2,
|
|
|
|
* .beacon_int_infra_match = true,
|
|
|
|
* };
|
|
|
|
*
|
|
|
|
*
|
|
|
|
* Allow #{AP, P2P-GO} <= 8, channels = 1, 8 total:
|
|
|
|
*
|
|
|
|
* struct ieee80211_iface_limit limits2[] = {
|
|
|
|
* { .max = 8, .types = BIT(NL80211_IFTYPE_AP) |
|
|
|
|
* BIT(NL80211_IFTYPE_P2P_GO), },
|
|
|
|
* };
|
|
|
|
* struct ieee80211_iface_combination combination2 = {
|
|
|
|
* .limits = limits2,
|
|
|
|
* .n_limits = ARRAY_SIZE(limits2),
|
|
|
|
* .max_interfaces = 8,
|
|
|
|
* .num_different_channels = 1,
|
|
|
|
* };
|
|
|
|
*
|
|
|
|
*
|
|
|
|
* Allow #STA <= 1, #{P2P-client,P2P-GO} <= 3 on two channels, 4 total.
|
|
|
|
* This allows for an infrastructure connection and three P2P connections.
|
|
|
|
*
|
|
|
|
* struct ieee80211_iface_limit limits3[] = {
|
|
|
|
* { .max = 1, .types = BIT(NL80211_IFTYPE_STATION), },
|
|
|
|
* { .max = 3, .types = BIT(NL80211_IFTYPE_P2P_GO) |
|
|
|
|
* BIT(NL80211_IFTYPE_P2P_CLIENT), },
|
|
|
|
* };
|
|
|
|
* struct ieee80211_iface_combination combination3 = {
|
|
|
|
* .limits = limits3,
|
|
|
|
* .n_limits = ARRAY_SIZE(limits3),
|
|
|
|
* .max_interfaces = 4,
|
|
|
|
* .num_different_channels = 2,
|
|
|
|
* };
|
|
|
|
*/
|
|
|
|
struct ieee80211_iface_combination {
|
|
|
|
const struct ieee80211_iface_limit *limits;
|
|
|
|
u32 num_different_channels;
|
|
|
|
u16 max_interfaces;
|
|
|
|
u8 n_limits;
|
|
|
|
bool beacon_int_infra_match;
|
2009-11-19 07:56:28 +08:00
|
|
|
};
|
|
|
|
|
2010-01-20 19:02:33 +08:00
|
|
|
struct mac_address {
|
|
|
|
u8 addr[ETH_ALEN];
|
|
|
|
};
|
|
|
|
|
2010-08-12 21:38:38 +08:00
|
|
|
struct ieee80211_txrx_stypes {
|
|
|
|
u16 tx, rx;
|
|
|
|
};
|
|
|
|
|
2011-05-04 21:37:28 +08:00
|
|
|
/**
|
|
|
|
* enum wiphy_wowlan_support_flags - WoWLAN support flags
|
|
|
|
* @WIPHY_WOWLAN_ANY: supports wakeup for the special "any"
|
|
|
|
* trigger that keeps the device operating as-is and
|
|
|
|
* wakes up the host on any activity, for example a
|
|
|
|
* received packet that passed filtering; note that the
|
|
|
|
* packet should be preserved in that case
|
|
|
|
* @WIPHY_WOWLAN_MAGIC_PKT: supports wakeup on magic packet
|
|
|
|
* (see nl80211.h)
|
|
|
|
* @WIPHY_WOWLAN_DISCONNECT: supports wakeup on disconnect
|
2011-07-13 16:48:55 +08:00
|
|
|
* @WIPHY_WOWLAN_SUPPORTS_GTK_REKEY: supports GTK rekeying while asleep
|
|
|
|
* @WIPHY_WOWLAN_GTK_REKEY_FAILURE: supports wakeup on GTK rekey failure
|
|
|
|
* @WIPHY_WOWLAN_EAP_IDENTITY_REQ: supports wakeup on EAP identity request
|
|
|
|
* @WIPHY_WOWLAN_4WAY_HANDSHAKE: supports wakeup on 4-way handshake failure
|
|
|
|
* @WIPHY_WOWLAN_RFKILL_RELEASE: supports wakeup on RF-kill release
|
2011-05-04 21:37:28 +08:00
|
|
|
*/
|
|
|
|
enum wiphy_wowlan_support_flags {
|
2011-07-13 16:48:55 +08:00
|
|
|
WIPHY_WOWLAN_ANY = BIT(0),
|
|
|
|
WIPHY_WOWLAN_MAGIC_PKT = BIT(1),
|
|
|
|
WIPHY_WOWLAN_DISCONNECT = BIT(2),
|
|
|
|
WIPHY_WOWLAN_SUPPORTS_GTK_REKEY = BIT(3),
|
|
|
|
WIPHY_WOWLAN_GTK_REKEY_FAILURE = BIT(4),
|
|
|
|
WIPHY_WOWLAN_EAP_IDENTITY_REQ = BIT(5),
|
|
|
|
WIPHY_WOWLAN_4WAY_HANDSHAKE = BIT(6),
|
|
|
|
WIPHY_WOWLAN_RFKILL_RELEASE = BIT(7),
|
2011-05-04 21:37:28 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* struct wiphy_wowlan_support - WoWLAN support data
|
|
|
|
* @flags: see &enum wiphy_wowlan_support_flags
|
|
|
|
* @n_patterns: number of supported wakeup patterns
|
|
|
|
* (see nl80211.h for the pattern definition)
|
|
|
|
* @pattern_max_len: maximum length of each pattern
|
|
|
|
* @pattern_min_len: minimum length of each pattern
|
|
|
|
*/
|
|
|
|
struct wiphy_wowlan_support {
|
|
|
|
u32 flags;
|
|
|
|
int n_patterns;
|
|
|
|
int pattern_max_len;
|
|
|
|
int pattern_min_len;
|
|
|
|
};
|
|
|
|
|
2009-11-19 07:56:28 +08:00
|
|
|
/**
|
|
|
|
* struct wiphy - wireless hardware description
|
2010-12-16 11:24:11 +08:00
|
|
|
* @reg_notifier: the driver's regulatory notification callback,
|
|
|
|
* note that if your driver uses wiphy_apply_custom_regulatory()
|
|
|
|
* the reg_notifier's request can be passed as NULL
|
2009-04-20 20:31:42 +08:00
|
|
|
* @regd: the driver's regulatory domain, if one was requested via
|
|
|
|
* the regulatory_hint() API. This can be used by the driver
|
|
|
|
* on the reg_notifier() if it chooses to ignore future
|
|
|
|
* regulatory domain changes caused by other drivers.
|
|
|
|
* @signal_type: signal type reported in &struct cfg80211_bss.
|
|
|
|
* @cipher_suites: supported cipher suites
|
|
|
|
* @n_cipher_suites: number of supported cipher suites
|
2009-04-21 00:39:05 +08:00
|
|
|
* @retry_short: Retry limit for short frames (dot11ShortRetryLimit)
|
|
|
|
* @retry_long: Retry limit for long frames (dot11LongRetryLimit)
|
|
|
|
* @frag_threshold: Fragmentation threshold (dot11FragmentationThreshold);
|
|
|
|
* -1 = fragmentation disabled, only odd values >= 256 used
|
|
|
|
* @rts_threshold: RTS threshold (dot11RTSThreshold); -1 = RTS/CTS disabled
|
2010-06-07 17:12:27 +08:00
|
|
|
* @_net: the network namespace this wiphy currently lives in
|
2010-01-20 19:02:33 +08:00
|
|
|
* @perm_addr: permanent MAC address of this device
|
|
|
|
* @addr_mask: If the device supports multiple MAC addresses by masking,
|
|
|
|
* set this to a mask with variable bits set to 1, e.g. if the last
|
|
|
|
* four bits are variable then set it to 00:...:00:0f. The actual
|
|
|
|
* variable bits shall be determined by the interfaces added, with
|
|
|
|
* interfaces not matching the mask being rejected to be brought up.
|
|
|
|
* @n_addresses: number of addresses in @addresses.
|
|
|
|
* @addresses: If the device has more than one address, set this pointer
|
|
|
|
* to a list of addresses (6 bytes each). The first one will be used
|
|
|
|
* by default for perm_addr. In this case, the mask should be set to
|
|
|
|
* all-zeroes. In this case it is assumed that the device can handle
|
|
|
|
* the same number of arbitrary MAC addresses.
|
2011-09-09 01:16:50 +08:00
|
|
|
* @registered: protects ->resume and ->suspend sysfs callbacks against
|
|
|
|
* unregister hardware
|
2010-06-07 17:12:27 +08:00
|
|
|
* @debugfsdir: debugfs directory used for this wiphy, will be renamed
|
|
|
|
* automatically on wiphy renames
|
|
|
|
* @dev: (virtual) struct device for this wiphy
|
2011-08-25 23:07:24 +08:00
|
|
|
* @registered: helps synchronize suspend/resume with wiphy unregister
|
2010-06-07 17:12:27 +08:00
|
|
|
* @wext: wireless extension handlers
|
|
|
|
* @priv: driver private data (sized according to wiphy_new() parameter)
|
|
|
|
* @interface_modes: bitmask of interfaces types valid for this wiphy,
|
|
|
|
* must be set by driver
|
2011-05-13 16:58:57 +08:00
|
|
|
* @iface_combinations: Valid interface combinations array, should not
|
|
|
|
* list single interface types.
|
|
|
|
* @n_iface_combinations: number of entries in @iface_combinations array.
|
|
|
|
* @software_iftypes: bitmask of software interface types, these are not
|
|
|
|
* subject to any restrictions since they are purely managed in SW.
|
2010-06-07 17:12:27 +08:00
|
|
|
* @flags: wiphy flags, see &enum wiphy_flags
|
2011-11-06 21:13:33 +08:00
|
|
|
* @features: features advertised to nl80211, see &enum nl80211_feature_flags.
|
2010-06-07 17:12:27 +08:00
|
|
|
* @bss_priv_size: each BSS struct has private data allocated with it,
|
|
|
|
* this variable determines its size
|
|
|
|
* @max_scan_ssids: maximum number of SSIDs the device can scan for in
|
|
|
|
* any given scan
|
2011-07-13 19:57:28 +08:00
|
|
|
* @max_sched_scan_ssids: maximum number of SSIDs the device can scan
|
|
|
|
* for in any given scheduled scan
|
2011-08-31 21:01:48 +08:00
|
|
|
* @max_match_sets: maximum number of match sets the device can handle
|
|
|
|
* when performing a scheduled scan, 0 if filtering is not
|
|
|
|
* supported.
|
2010-06-07 17:12:27 +08:00
|
|
|
* @max_scan_ie_len: maximum length of user-controlled IEs device can
|
|
|
|
* add to probe request frames transmitted during a scan, must not
|
|
|
|
* include fixed IEs like supported rates
|
2011-07-13 19:57:29 +08:00
|
|
|
* @max_sched_scan_ie_len: same as max_scan_ie_len, but for scheduled
|
|
|
|
* scans
|
2010-06-07 17:12:27 +08:00
|
|
|
* @coverage_class: current coverage class
|
|
|
|
* @fw_version: firmware version for ethtool reporting
|
|
|
|
* @hw_version: hardware version for ethtool reporting
|
|
|
|
* @max_num_pmkids: maximum number of PMKIDs supported by device
|
|
|
|
* @privid: a pointer that drivers can use to identify if an arbitrary
|
|
|
|
* wiphy is theirs, e.g. in global notifiers
|
|
|
|
* @bands: information about bands/channels supported by this device
|
2010-08-12 21:38:38 +08:00
|
|
|
*
|
|
|
|
* @mgmt_stypes: bitmasks of frame subtypes that can be subscribed to or
|
|
|
|
* transmitted through nl80211, points to an array indexed by interface
|
|
|
|
* type
|
2010-12-08 12:59:24 +08:00
|
|
|
*
|
2010-12-16 10:30:22 +08:00
|
|
|
* @available_antennas_tx: bitmap of antennas which are available to be
|
|
|
|
* configured as TX antennas. Antenna configuration commands will be
|
|
|
|
* rejected unless this or @available_antennas_rx is set.
|
|
|
|
*
|
|
|
|
* @available_antennas_rx: bitmap of antennas which are available to be
|
|
|
|
* configured as RX antennas. Antenna configuration commands will be
|
|
|
|
* rejected unless this or @available_antennas_tx is set.
|
2010-12-15 00:54:28 +08:00
|
|
|
*
|
2012-01-22 03:03:00 +08:00
|
|
|
* @probe_resp_offload:
|
|
|
|
* Bitmap of supported protocols for probe response offloading.
|
|
|
|
* See &enum nl80211_probe_resp_offload_support_attr. Only valid
|
|
|
|
* when the wiphy flag @WIPHY_FLAG_AP_PROBE_RESP_OFFLOAD is set.
|
|
|
|
*
|
2010-12-15 00:54:28 +08:00
|
|
|
* @max_remain_on_channel_duration: Maximum time a remain-on-channel operation
|
|
|
|
* may request, if implemented.
|
2011-05-04 21:37:28 +08:00
|
|
|
*
|
|
|
|
* @wowlan: WoWLAN support information
|
2011-11-07 19:39:33 +08:00
|
|
|
*
|
|
|
|
* @ap_sme_capa: AP SME capabilities, flags from &enum nl80211_ap_sme_features.
|
2011-11-19 03:31:59 +08:00
|
|
|
* @ht_capa_mod_mask: Specify what ht_cap values can be over-ridden.
|
|
|
|
* If null, then none can be over-ridden.
|
2009-04-20 20:31:42 +08:00
|
|
|
*/
|
|
|
|
struct wiphy {
|
|
|
|
/* assign these fields before you register the wiphy */
|
|
|
|
|
2010-01-20 19:02:33 +08:00
|
|
|
/* permanent MAC address(es) */
|
2009-04-20 20:31:42 +08:00
|
|
|
u8 perm_addr[ETH_ALEN];
|
2010-01-20 19:02:33 +08:00
|
|
|
u8 addr_mask[ETH_ALEN];
|
|
|
|
|
|
|
|
struct mac_address *addresses;
|
2009-04-20 20:31:42 +08:00
|
|
|
|
2010-08-12 21:38:38 +08:00
|
|
|
const struct ieee80211_txrx_stypes *mgmt_stypes;
|
|
|
|
|
2011-05-13 16:58:57 +08:00
|
|
|
const struct ieee80211_iface_combination *iface_combinations;
|
|
|
|
int n_iface_combinations;
|
|
|
|
u16 software_iftypes;
|
|
|
|
|
2010-08-12 21:38:38 +08:00
|
|
|
u16 n_addresses;
|
|
|
|
|
2009-04-20 20:31:42 +08:00
|
|
|
/* Supported interface modes, OR together BIT(NL80211_IFTYPE_...) */
|
|
|
|
u16 interface_modes;
|
|
|
|
|
2011-11-06 21:13:33 +08:00
|
|
|
u32 flags, features;
|
2009-07-14 06:33:35 +08:00
|
|
|
|
2011-11-07 19:39:33 +08:00
|
|
|
u32 ap_sme_capa;
|
|
|
|
|
2009-04-20 20:31:42 +08:00
|
|
|
enum cfg80211_signal_type signal_type;
|
|
|
|
|
|
|
|
int bss_priv_size;
|
|
|
|
u8 max_scan_ssids;
|
2011-07-13 19:57:28 +08:00
|
|
|
u8 max_sched_scan_ssids;
|
2011-08-31 21:01:48 +08:00
|
|
|
u8 max_match_sets;
|
2009-04-20 20:31:42 +08:00
|
|
|
u16 max_scan_ie_len;
|
2011-07-13 19:57:29 +08:00
|
|
|
u16 max_sched_scan_ie_len;
|
2009-04-20 20:31:42 +08:00
|
|
|
|
|
|
|
int n_cipher_suites;
|
|
|
|
const u32 *cipher_suites;
|
|
|
|
|
2009-04-21 00:39:05 +08:00
|
|
|
u8 retry_short;
|
|
|
|
u8 retry_long;
|
|
|
|
u32 frag_threshold;
|
|
|
|
u32 rts_threshold;
|
2009-12-22 05:50:47 +08:00
|
|
|
u8 coverage_class;
|
2009-04-21 00:39:05 +08:00
|
|
|
|
2009-09-25 02:02:42 +08:00
|
|
|
char fw_version[ETHTOOL_BUSINFO_LEN];
|
|
|
|
u32 hw_version;
|
|
|
|
|
2011-05-04 21:37:28 +08:00
|
|
|
struct wiphy_wowlan_support wowlan;
|
|
|
|
|
2010-12-15 00:54:28 +08:00
|
|
|
u16 max_remain_on_channel_duration;
|
|
|
|
|
2009-11-25 06:59:15 +08:00
|
|
|
u8 max_num_pmkids;
|
|
|
|
|
2010-12-16 10:30:22 +08:00
|
|
|
u32 available_antennas_tx;
|
|
|
|
u32 available_antennas_rx;
|
2010-12-08 12:59:24 +08:00
|
|
|
|
2011-11-10 17:28:55 +08:00
|
|
|
/*
|
|
|
|
* Bitmap of supported protocols for probe response offloading
|
|
|
|
* see &enum nl80211_probe_resp_offload_support_attr. Only valid
|
|
|
|
* when the wiphy flag @WIPHY_FLAG_AP_PROBE_RESP_OFFLOAD is set.
|
|
|
|
*/
|
|
|
|
u32 probe_resp_offload;
|
|
|
|
|
2009-04-20 20:31:42 +08:00
|
|
|
/* If multiple wiphys are registered and you're handed e.g.
|
|
|
|
* a regular netdev with assigned ieee80211_ptr, you won't
|
|
|
|
* know whether it points to a wiphy your driver has registered
|
|
|
|
* or not. Assign this to something global to your driver to
|
|
|
|
* help determine whether you own this wiphy or not. */
|
2009-05-17 06:13:47 +08:00
|
|
|
const void *privid;
|
2009-04-20 20:31:42 +08:00
|
|
|
|
|
|
|
struct ieee80211_supported_band *bands[IEEE80211_NUM_BANDS];
|
|
|
|
|
|
|
|
/* Lets us get back the wiphy on the callback */
|
|
|
|
int (*reg_notifier)(struct wiphy *wiphy,
|
|
|
|
struct regulatory_request *request);
|
|
|
|
|
|
|
|
/* fields below are read-only, assigned by cfg80211 */
|
|
|
|
|
|
|
|
const struct ieee80211_regdomain *regd;
|
|
|
|
|
|
|
|
/* the item in /sys/class/ieee80211/ points to this,
|
|
|
|
* you need use set_wiphy_dev() (see below) */
|
|
|
|
struct device dev;
|
|
|
|
|
2011-08-12 20:00:59 +08:00
|
|
|
/* protects ->resume, ->suspend sysfs callbacks against unregister hw */
|
|
|
|
bool registered;
|
|
|
|
|
2009-04-20 20:31:42 +08:00
|
|
|
/* dir in debugfs: ieee80211/<wiphyname> */
|
|
|
|
struct dentry *debugfsdir;
|
|
|
|
|
2011-11-19 03:31:59 +08:00
|
|
|
const struct ieee80211_ht_cap *ht_capa_mod_mask;
|
|
|
|
|
2009-07-14 06:33:35 +08:00
|
|
|
#ifdef CONFIG_NET_NS
|
|
|
|
/* the network namespace this phy lives in currently */
|
|
|
|
struct net *_net;
|
|
|
|
#endif
|
|
|
|
|
2009-09-30 05:27:28 +08:00
|
|
|
#ifdef CONFIG_CFG80211_WEXT
|
|
|
|
const struct iw_handler_def *wext;
|
|
|
|
#endif
|
|
|
|
|
2009-04-20 20:31:42 +08:00
|
|
|
char priv[0] __attribute__((__aligned__(NETDEV_ALIGN)));
|
|
|
|
};
|
|
|
|
|
2009-07-14 06:33:35 +08:00
|
|
|
static inline struct net *wiphy_net(struct wiphy *wiphy)
|
|
|
|
{
|
2010-06-01 14:51:19 +08:00
|
|
|
return read_pnet(&wiphy->_net);
|
2009-07-14 06:33:35 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline void wiphy_net_set(struct wiphy *wiphy, struct net *net)
|
|
|
|
{
|
2010-06-01 14:51:19 +08:00
|
|
|
write_pnet(&wiphy->_net, net);
|
2009-07-14 06:33:35 +08:00
|
|
|
}
|
|
|
|
|
2009-04-20 20:31:42 +08:00
|
|
|
/**
|
|
|
|
* wiphy_priv - return priv from wiphy
|
|
|
|
*
|
|
|
|
* @wiphy: the wiphy whose priv pointer to return
|
|
|
|
*/
|
|
|
|
static inline void *wiphy_priv(struct wiphy *wiphy)
|
|
|
|
{
|
|
|
|
BUG_ON(!wiphy);
|
|
|
|
return &wiphy->priv;
|
|
|
|
}
|
|
|
|
|
2009-06-19 06:21:13 +08:00
|
|
|
/**
|
|
|
|
* priv_to_wiphy - return the wiphy containing the priv
|
|
|
|
*
|
|
|
|
* @priv: a pointer previously returned by wiphy_priv
|
|
|
|
*/
|
|
|
|
static inline struct wiphy *priv_to_wiphy(void *priv)
|
|
|
|
{
|
|
|
|
BUG_ON(!priv);
|
|
|
|
return container_of(priv, struct wiphy, priv);
|
|
|
|
}
|
|
|
|
|
2009-04-20 20:31:42 +08:00
|
|
|
/**
|
|
|
|
* set_wiphy_dev - set device pointer for wiphy
|
|
|
|
*
|
|
|
|
* @wiphy: The wiphy whose device to bind
|
|
|
|
* @dev: The device to parent it to
|
|
|
|
*/
|
|
|
|
static inline void set_wiphy_dev(struct wiphy *wiphy, struct device *dev)
|
|
|
|
{
|
|
|
|
wiphy->dev.parent = dev;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* wiphy_dev - get wiphy dev pointer
|
|
|
|
*
|
|
|
|
* @wiphy: The wiphy whose device struct to look up
|
|
|
|
*/
|
|
|
|
static inline struct device *wiphy_dev(struct wiphy *wiphy)
|
|
|
|
{
|
|
|
|
return wiphy->dev.parent;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* wiphy_name - get wiphy name
|
|
|
|
*
|
|
|
|
* @wiphy: The wiphy whose name to return
|
|
|
|
*/
|
2010-07-27 05:39:57 +08:00
|
|
|
static inline const char *wiphy_name(const struct wiphy *wiphy)
|
2009-04-20 20:31:42 +08:00
|
|
|
{
|
|
|
|
return dev_name(&wiphy->dev);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* wiphy_new - create a new wiphy for use with cfg80211
|
|
|
|
*
|
|
|
|
* @ops: The configuration operations for this device
|
|
|
|
* @sizeof_priv: The size of the private area to allocate
|
|
|
|
*
|
|
|
|
* Create a new wiphy and associate the given operations with it.
|
|
|
|
* @sizeof_priv bytes are allocated for private use.
|
|
|
|
*
|
|
|
|
* The returned pointer must be assigned to each netdev's
|
|
|
|
* ieee80211_ptr for proper operation.
|
|
|
|
*/
|
2009-05-17 06:13:46 +08:00
|
|
|
struct wiphy *wiphy_new(const struct cfg80211_ops *ops, int sizeof_priv);
|
2009-04-20 20:31:42 +08:00
|
|
|
|
|
|
|
/**
|
|
|
|
* wiphy_register - register a wiphy with cfg80211
|
|
|
|
*
|
|
|
|
* @wiphy: The wiphy to register.
|
|
|
|
*
|
|
|
|
* Returns a non-negative wiphy index or a negative error code.
|
|
|
|
*/
|
|
|
|
extern int wiphy_register(struct wiphy *wiphy);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* wiphy_unregister - deregister a wiphy from cfg80211
|
|
|
|
*
|
|
|
|
* @wiphy: The wiphy to unregister.
|
|
|
|
*
|
|
|
|
* After this call, no more requests can be made with this priv
|
|
|
|
* pointer, but the call may sleep to wait for an outstanding
|
|
|
|
* request that is being handled.
|
|
|
|
*/
|
|
|
|
extern void wiphy_unregister(struct wiphy *wiphy);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* wiphy_free - free wiphy
|
|
|
|
*
|
|
|
|
* @wiphy: The wiphy to free
|
|
|
|
*/
|
|
|
|
extern void wiphy_free(struct wiphy *wiphy);
|
|
|
|
|
cfg80211: rework key operation
This reworks the key operation in cfg80211, and now only
allows, from userspace, configuring keys (via nl80211)
after the connection has been established (in managed
mode), the IBSS been joined (in IBSS mode), at any time
(in AP[_VLAN] modes) or never for all the other modes.
In order to do shared key authentication correctly, it
is now possible to give a WEP key to the AUTH command.
To configure static WEP keys, these are given to the
CONNECT or IBSS_JOIN command directly, for a userspace
SME it is assumed it will configure it properly after
the connection has been established.
Since mac80211 used to check the default key in IBSS
mode to see whether or not the network is protected,
it needs an update in that area, as well as an update
to make use of the WEP key passed to auth() for shared
key authentication.
Signed-off-by: Johannes Berg <johannes@sipsolutions.net>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2009-07-08 20:22:54 +08:00
|
|
|
/* internal structs */
|
2009-07-02 15:13:27 +08:00
|
|
|
struct cfg80211_conn;
|
2009-07-02 23:20:43 +08:00
|
|
|
struct cfg80211_internal_bss;
|
cfg80211: rework key operation
This reworks the key operation in cfg80211, and now only
allows, from userspace, configuring keys (via nl80211)
after the connection has been established (in managed
mode), the IBSS been joined (in IBSS mode), at any time
(in AP[_VLAN] modes) or never for all the other modes.
In order to do shared key authentication correctly, it
is now possible to give a WEP key to the AUTH command.
To configure static WEP keys, these are given to the
CONNECT or IBSS_JOIN command directly, for a userspace
SME it is assumed it will configure it properly after
the connection has been established.
Since mac80211 used to check the default key in IBSS
mode to see whether or not the network is protected,
it needs an update in that area, as well as an update
to make use of the WEP key passed to auth() for shared
key authentication.
Signed-off-by: Johannes Berg <johannes@sipsolutions.net>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2009-07-08 20:22:54 +08:00
|
|
|
struct cfg80211_cached_keys;
|
2009-07-02 23:20:43 +08:00
|
|
|
|
2009-04-20 20:31:42 +08:00
|
|
|
/**
|
|
|
|
* struct wireless_dev - wireless per-netdev state
|
|
|
|
*
|
|
|
|
* This structure must be allocated by the driver/stack
|
|
|
|
* that uses the ieee80211_ptr field in struct net_device
|
|
|
|
* (this is intentional so it can be allocated along with
|
|
|
|
* the netdev.)
|
|
|
|
*
|
|
|
|
* @wiphy: pointer to hardware description
|
|
|
|
* @iftype: interface type
|
|
|
|
* @list: (private) Used to collect the interfaces
|
|
|
|
* @netdev: (private) Used to reference back to the netdev
|
|
|
|
* @current_bss: (private) Used by the internal configuration code
|
cfg80211/mac80211: better channel handling
Currently (all tested with hwsim) you can do stupid
things like setting up an AP on a certain channel,
then adding another virtual interface and making
that associate on another channel -- this will make
the beaconing to move channel but obviously without
the necessary IEs data update.
In order to improve this situation, first make the
configuration APIs (cfg80211 and nl80211) aware of
multi-channel operation -- we'll eventually need
that in the future anyway. There's one userland API
change and one API addition. The API change is that
now SET_WIPHY must be called with virtual interface
index rather than only wiphy index in order to take
effect for that interface -- luckily all current
users (hostapd) do that. For monitor interfaces, the
old setting is preserved, but monitors are always
slaved to other devices anyway so no guarantees.
The second userland API change is the introduction
of a per virtual interface SET_CHANNEL command, that
hostapd should use going forward to make it easier
to understand what's going on (it can automatically
detect a kernel with this command).
Other than mac80211, no existing cfg80211 drivers
are affected by this change because they only allow
a single virtual interface.
mac80211, however, now needs to be aware that the
channel settings are per interface now, and needs
to disallow (for now) real multi-channel operation,
which is another important part of this patch.
One of the immediate benefits is that you can now
start hostapd to operate on a hardware that already
has a connection on another virtual interface, as
long as you specify the same channel.
Note that two things are left unhandled (this is an
improvement -- not a complete fix):
* different HT/no-HT modes
currently you could start an HT AP and then
connect to a non-HT network on the same channel
which would configure the hardware for no HT;
that can be fixed fairly easily
* CSA
An AP we're connected to on a virtual interface
might indicate switching channels, and in that
case we would follow it, regardless of how many
other interfaces are operating; this requires
more effort to fix but is pretty rare after all
Signed-off-by: Johannes Berg <johannes@sipsolutions.net>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2010-05-05 21:25:02 +08:00
|
|
|
* @channel: (private) Used by the internal configuration code to track
|
|
|
|
* user-set AP, monitor and WDS channels for wireless extensions
|
2009-04-20 20:31:42 +08:00
|
|
|
* @bssid: (private) Used by the internal configuration code
|
|
|
|
* @ssid: (private) Used by the internal configuration code
|
|
|
|
* @ssid_len: (private) Used by the internal configuration code
|
2010-12-03 16:20:44 +08:00
|
|
|
* @mesh_id_len: (private) Used by the internal configuration code
|
|
|
|
* @mesh_id_up_len: (private) Used by the internal configuration code
|
2009-04-20 20:31:42 +08:00
|
|
|
* @wext: (private) Used by the internal wireless extensions compat code
|
2009-11-19 18:55:19 +08:00
|
|
|
* @use_4addr: indicates 4addr mode is used on this interface, must be
|
|
|
|
* set by driver (if supported) on add_interface BEFORE registering the
|
|
|
|
* netdev and may otherwise be used by driver read-only, will be update
|
|
|
|
* by cfg80211 on change_interface
|
2010-08-12 21:38:38 +08:00
|
|
|
* @mgmt_registrations: list of registrations for management frames
|
|
|
|
* @mgmt_registrations_lock: lock for the list
|
2010-06-07 17:12:27 +08:00
|
|
|
* @mtx: mutex used to lock data in this struct
|
|
|
|
* @cleanup_work: work struct used for cleanup that can't be done directly
|
2011-05-10 00:41:15 +08:00
|
|
|
* @beacon_interval: beacon interval used on this device for transmitting
|
|
|
|
* beacons, 0 when not valid
|
2009-04-20 20:31:42 +08:00
|
|
|
*/
|
|
|
|
struct wireless_dev {
|
|
|
|
struct wiphy *wiphy;
|
|
|
|
enum nl80211_iftype iftype;
|
|
|
|
|
2009-07-07 09:56:11 +08:00
|
|
|
/* the remainder of this struct should be private to cfg80211 */
|
2009-04-20 20:31:42 +08:00
|
|
|
struct list_head list;
|
|
|
|
struct net_device *netdev;
|
|
|
|
|
2010-08-12 21:38:38 +08:00
|
|
|
struct list_head mgmt_registrations;
|
|
|
|
spinlock_t mgmt_registrations_lock;
|
2010-02-15 18:53:10 +08:00
|
|
|
|
2009-07-07 09:56:11 +08:00
|
|
|
struct mutex mtx;
|
|
|
|
|
2009-08-19 01:51:57 +08:00
|
|
|
struct work_struct cleanup_work;
|
|
|
|
|
2009-11-19 18:55:19 +08:00
|
|
|
bool use_4addr;
|
|
|
|
|
2009-07-02 03:26:54 +08:00
|
|
|
/* currently used for IBSS and SME - might be rearranged later */
|
2009-04-20 20:31:42 +08:00
|
|
|
u8 ssid[IEEE80211_MAX_SSID_LEN];
|
2010-12-03 16:20:44 +08:00
|
|
|
u8 ssid_len, mesh_id_len, mesh_id_up_len;
|
2009-07-02 03:26:54 +08:00
|
|
|
enum {
|
|
|
|
CFG80211_SME_IDLE,
|
2009-07-02 15:13:27 +08:00
|
|
|
CFG80211_SME_CONNECTING,
|
2009-07-02 03:26:54 +08:00
|
|
|
CFG80211_SME_CONNECTED,
|
|
|
|
} sme_state;
|
2009-07-02 15:13:27 +08:00
|
|
|
struct cfg80211_conn *conn;
|
cfg80211: rework key operation
This reworks the key operation in cfg80211, and now only
allows, from userspace, configuring keys (via nl80211)
after the connection has been established (in managed
mode), the IBSS been joined (in IBSS mode), at any time
(in AP[_VLAN] modes) or never for all the other modes.
In order to do shared key authentication correctly, it
is now possible to give a WEP key to the AUTH command.
To configure static WEP keys, these are given to the
CONNECT or IBSS_JOIN command directly, for a userspace
SME it is assumed it will configure it properly after
the connection has been established.
Since mac80211 used to check the default key in IBSS
mode to see whether or not the network is protected,
it needs an update in that area, as well as an update
to make use of the WEP key passed to auth() for shared
key authentication.
Signed-off-by: Johannes Berg <johannes@sipsolutions.net>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2009-07-08 20:22:54 +08:00
|
|
|
struct cfg80211_cached_keys *connect_keys;
|
2009-04-20 20:31:42 +08:00
|
|
|
|
2009-07-07 09:56:11 +08:00
|
|
|
struct list_head event_list;
|
|
|
|
spinlock_t event_lock;
|
|
|
|
|
2009-07-02 23:20:43 +08:00
|
|
|
struct cfg80211_internal_bss *current_bss; /* associated / joined */
|
cfg80211/mac80211: better channel handling
Currently (all tested with hwsim) you can do stupid
things like setting up an AP on a certain channel,
then adding another virtual interface and making
that associate on another channel -- this will make
the beaconing to move channel but obviously without
the necessary IEs data update.
In order to improve this situation, first make the
configuration APIs (cfg80211 and nl80211) aware of
multi-channel operation -- we'll eventually need
that in the future anyway. There's one userland API
change and one API addition. The API change is that
now SET_WIPHY must be called with virtual interface
index rather than only wiphy index in order to take
effect for that interface -- luckily all current
users (hostapd) do that. For monitor interfaces, the
old setting is preserved, but monitors are always
slaved to other devices anyway so no guarantees.
The second userland API change is the introduction
of a per virtual interface SET_CHANNEL command, that
hostapd should use going forward to make it easier
to understand what's going on (it can automatically
detect a kernel with this command).
Other than mac80211, no existing cfg80211 drivers
are affected by this change because they only allow
a single virtual interface.
mac80211, however, now needs to be aware that the
channel settings are per interface now, and needs
to disallow (for now) real multi-channel operation,
which is another important part of this patch.
One of the immediate benefits is that you can now
start hostapd to operate on a hardware that already
has a connection on another virtual interface, as
long as you specify the same channel.
Note that two things are left unhandled (this is an
improvement -- not a complete fix):
* different HT/no-HT modes
currently you could start an HT AP and then
connect to a non-HT network on the same channel
which would configure the hardware for no HT;
that can be fixed fairly easily
* CSA
An AP we're connected to on a virtual interface
might indicate switching channels, and in that
case we would follow it, regardless of how many
other interfaces are operating; this requires
more effort to fix but is pretty rare after all
Signed-off-by: Johannes Berg <johannes@sipsolutions.net>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2010-05-05 21:25:02 +08:00
|
|
|
struct ieee80211_channel *channel;
|
2009-07-02 23:20:43 +08:00
|
|
|
|
nl80211: add power save commands
The most needed command from nl80211, which Wireless Extensions had,
is support for power save mode. Add a simple command to make it possible
to enable and disable power save via nl80211.
I was also planning about extending the interface, for example adding the
timeout value, but after thinking more about this I decided not to do it.
Basically there were three reasons:
Firstly, the parameters for power save are very much hardware dependent.
Trying to find a unified interface which would work with all hardware, and
still make sense to users, will be very difficult.
Secondly, IEEE 802.11 power save implementation in Linux is still in state
of flux. We have a long way to still to go and there is no way to predict
what kind of implementation we will have after few years. And because we
need to support nl80211 interface a long time, practically forever, adding
now parameters to nl80211 might create maintenance problems later on.
Third issue are the users. Power save parameters are mostly used for
debugging, so debugfs is better, more flexible, interface for this.
For example, wpa_supplicant currently doesn't configure anything related
to power save mode. It's better to strive that kernel can automatically
optimise the power save parameters, like with help of pm qos network
and other traffic parameters.
Later on, when we have better understanding of power save, we can extend
this command with more features, if there's a need for that.
Signed-off-by: Kalle Valo <kalle.valo@nokia.com>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2010-02-17 23:58:10 +08:00
|
|
|
bool ps;
|
|
|
|
int ps_timeout;
|
|
|
|
|
2011-05-10 00:41:15 +08:00
|
|
|
int beacon_interval;
|
|
|
|
|
2011-11-04 18:18:12 +08:00
|
|
|
u32 ap_unexpected_nlpid;
|
|
|
|
|
2009-09-30 05:27:28 +08:00
|
|
|
#ifdef CONFIG_CFG80211_WEXT
|
2009-04-20 20:31:42 +08:00
|
|
|
/* wext data */
|
2009-05-10 02:09:03 +08:00
|
|
|
struct {
|
2009-07-07 09:56:06 +08:00
|
|
|
struct cfg80211_ibss_params ibss;
|
|
|
|
struct cfg80211_connect_params connect;
|
cfg80211: rework key operation
This reworks the key operation in cfg80211, and now only
allows, from userspace, configuring keys (via nl80211)
after the connection has been established (in managed
mode), the IBSS been joined (in IBSS mode), at any time
(in AP[_VLAN] modes) or never for all the other modes.
In order to do shared key authentication correctly, it
is now possible to give a WEP key to the AUTH command.
To configure static WEP keys, these are given to the
CONNECT or IBSS_JOIN command directly, for a userspace
SME it is assumed it will configure it properly after
the connection has been established.
Since mac80211 used to check the default key in IBSS
mode to see whether or not the network is protected,
it needs an update in that area, as well as an update
to make use of the WEP key passed to auth() for shared
key authentication.
Signed-off-by: Johannes Berg <johannes@sipsolutions.net>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2009-07-08 20:22:54 +08:00
|
|
|
struct cfg80211_cached_keys *keys;
|
2009-07-02 03:26:56 +08:00
|
|
|
u8 *ie;
|
|
|
|
size_t ie_len;
|
2009-08-07 20:51:05 +08:00
|
|
|
u8 bssid[ETH_ALEN], prev_bssid[ETH_ALEN];
|
2009-07-02 03:26:56 +08:00
|
|
|
u8 ssid[IEEE80211_MAX_SSID_LEN];
|
2009-05-11 19:54:58 +08:00
|
|
|
s8 default_key, default_mgmt_key;
|
nl80211: add power save commands
The most needed command from nl80211, which Wireless Extensions had,
is support for power save mode. Add a simple command to make it possible
to enable and disable power save via nl80211.
I was also planning about extending the interface, for example adding the
timeout value, but after thinking more about this I decided not to do it.
Basically there were three reasons:
Firstly, the parameters for power save are very much hardware dependent.
Trying to find a unified interface which would work with all hardware, and
still make sense to users, will be very difficult.
Secondly, IEEE 802.11 power save implementation in Linux is still in state
of flux. We have a long way to still to go and there is no way to predict
what kind of implementation we will have after few years. And because we
need to support nl80211 interface a long time, practically forever, adding
now parameters to nl80211 might create maintenance problems later on.
Third issue are the users. Power save parameters are mostly used for
debugging, so debugfs is better, more flexible, interface for this.
For example, wpa_supplicant currently doesn't configure anything related
to power save mode. It's better to strive that kernel can automatically
optimise the power save parameters, like with help of pm qos network
and other traffic parameters.
Later on, when we have better understanding of power save, we can extend
this command with more features, if there's a need for that.
Signed-off-by: Kalle Valo <kalle.valo@nokia.com>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2010-02-17 23:58:10 +08:00
|
|
|
bool prev_bssid_valid;
|
2009-05-10 02:09:03 +08:00
|
|
|
} wext;
|
2009-04-20 20:31:42 +08:00
|
|
|
#endif
|
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* wdev_priv - return wiphy priv from wireless_dev
|
|
|
|
*
|
|
|
|
* @wdev: The wireless device whose wiphy's priv pointer to return
|
|
|
|
*/
|
|
|
|
static inline void *wdev_priv(struct wireless_dev *wdev)
|
|
|
|
{
|
|
|
|
BUG_ON(!wdev);
|
|
|
|
return wiphy_priv(wdev->wiphy);
|
|
|
|
}
|
|
|
|
|
2010-08-19 22:11:27 +08:00
|
|
|
/**
|
|
|
|
* DOC: Utility functions
|
|
|
|
*
|
|
|
|
* cfg80211 offers a number of utility functions that can be useful.
|
2009-04-20 20:31:42 +08:00
|
|
|
*/
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ieee80211_channel_to_frequency - convert channel number to frequency
|
2010-06-07 17:12:27 +08:00
|
|
|
* @chan: channel number
|
2011-01-17 12:37:28 +08:00
|
|
|
* @band: band, necessary due to channel number overlap
|
2009-04-20 20:31:42 +08:00
|
|
|
*/
|
2011-01-17 12:37:28 +08:00
|
|
|
extern int ieee80211_channel_to_frequency(int chan, enum ieee80211_band band);
|
2009-04-20 20:31:42 +08:00
|
|
|
|
|
|
|
/**
|
|
|
|
* ieee80211_frequency_to_channel - convert frequency to channel number
|
2010-06-07 17:12:27 +08:00
|
|
|
* @freq: center frequency
|
2009-04-20 20:31:42 +08:00
|
|
|
*/
|
|
|
|
extern int ieee80211_frequency_to_channel(int freq);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Name indirection necessary because the ieee80211 code also has
|
|
|
|
* a function named "ieee80211_get_channel", so if you include
|
|
|
|
* cfg80211's header file you get cfg80211's version, if you try
|
|
|
|
* to include both header files you'll (rightfully!) get a symbol
|
|
|
|
* clash.
|
|
|
|
*/
|
|
|
|
extern struct ieee80211_channel *__ieee80211_get_channel(struct wiphy *wiphy,
|
|
|
|
int freq);
|
|
|
|
/**
|
|
|
|
* ieee80211_get_channel - get channel struct from wiphy for specified frequency
|
2010-06-07 17:12:27 +08:00
|
|
|
* @wiphy: the struct wiphy to get the channel for
|
|
|
|
* @freq: the center frequency of the channel
|
2009-04-20 20:31:42 +08:00
|
|
|
*/
|
|
|
|
static inline struct ieee80211_channel *
|
|
|
|
ieee80211_get_channel(struct wiphy *wiphy, int freq)
|
|
|
|
{
|
|
|
|
return __ieee80211_get_channel(wiphy, freq);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ieee80211_get_response_rate - get basic rate for a given rate
|
|
|
|
*
|
|
|
|
* @sband: the band to look for rates in
|
|
|
|
* @basic_rates: bitmap of basic rates
|
|
|
|
* @bitrate: the bitrate for which to find the basic rate
|
|
|
|
*
|
|
|
|
* This function returns the basic rate corresponding to a given
|
|
|
|
* bitrate, that is the next lower bitrate contained in the basic
|
|
|
|
* rate map, which is, for this function, given as a bitmap of
|
|
|
|
* indices of rates in the band's bitrate table.
|
|
|
|
*/
|
|
|
|
struct ieee80211_rate *
|
|
|
|
ieee80211_get_response_rate(struct ieee80211_supported_band *sband,
|
|
|
|
u32 basic_rates, int bitrate);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Radiotap parsing functions -- for controlled injection support
|
|
|
|
*
|
|
|
|
* Implemented in net/wireless/radiotap.c
|
|
|
|
* Documentation in Documentation/networking/radiotap-headers.txt
|
|
|
|
*/
|
|
|
|
|
2010-02-03 17:24:30 +08:00
|
|
|
struct radiotap_align_size {
|
|
|
|
uint8_t align:4, size:4;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct ieee80211_radiotap_namespace {
|
|
|
|
const struct radiotap_align_size *align_size;
|
|
|
|
int n_bits;
|
|
|
|
uint32_t oui;
|
|
|
|
uint8_t subns;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct ieee80211_radiotap_vendor_namespaces {
|
|
|
|
const struct ieee80211_radiotap_namespace *ns;
|
|
|
|
int n_ns;
|
|
|
|
};
|
|
|
|
|
2009-04-20 20:31:42 +08:00
|
|
|
/**
|
|
|
|
* struct ieee80211_radiotap_iterator - tracks walk thru present radiotap args
|
2010-02-03 17:24:30 +08:00
|
|
|
* @this_arg_index: index of current arg, valid after each successful call
|
|
|
|
* to ieee80211_radiotap_iterator_next()
|
|
|
|
* @this_arg: pointer to current radiotap arg; it is valid after each
|
|
|
|
* call to ieee80211_radiotap_iterator_next() but also after
|
|
|
|
* ieee80211_radiotap_iterator_init() where it will point to
|
|
|
|
* the beginning of the actual data portion
|
|
|
|
* @this_arg_size: length of the current arg, for convenience
|
|
|
|
* @current_namespace: pointer to the current namespace definition
|
|
|
|
* (or internally %NULL if the current namespace is unknown)
|
|
|
|
* @is_radiotap_ns: indicates whether the current namespace is the default
|
|
|
|
* radiotap namespace or not
|
|
|
|
*
|
|
|
|
* @_rtheader: pointer to the radiotap header we are walking through
|
|
|
|
* @_max_length: length of radiotap header in cpu byte ordering
|
|
|
|
* @_arg_index: next argument index
|
|
|
|
* @_arg: next argument pointer
|
|
|
|
* @_next_bitmap: internal pointer to next present u32
|
|
|
|
* @_bitmap_shifter: internal shifter for curr u32 bitmap, b0 set == arg present
|
|
|
|
* @_vns: vendor namespace definitions
|
|
|
|
* @_next_ns_data: beginning of the next namespace's data
|
|
|
|
* @_reset_on_ext: internal; reset the arg index to 0 when going to the
|
|
|
|
* next bitmap word
|
|
|
|
*
|
|
|
|
* Describes the radiotap parser state. Fields prefixed with an underscore
|
|
|
|
* must not be used by users of the parser, only by the parser internally.
|
2009-04-20 20:31:42 +08:00
|
|
|
*/
|
|
|
|
|
|
|
|
struct ieee80211_radiotap_iterator {
|
2010-02-03 17:24:30 +08:00
|
|
|
struct ieee80211_radiotap_header *_rtheader;
|
|
|
|
const struct ieee80211_radiotap_vendor_namespaces *_vns;
|
|
|
|
const struct ieee80211_radiotap_namespace *current_namespace;
|
|
|
|
|
|
|
|
unsigned char *_arg, *_next_ns_data;
|
2010-04-21 16:25:36 +08:00
|
|
|
__le32 *_next_bitmap;
|
2010-02-03 17:24:30 +08:00
|
|
|
|
|
|
|
unsigned char *this_arg;
|
2009-04-20 20:31:42 +08:00
|
|
|
int this_arg_index;
|
2010-02-03 17:24:30 +08:00
|
|
|
int this_arg_size;
|
2009-04-20 20:31:42 +08:00
|
|
|
|
2010-02-03 17:24:30 +08:00
|
|
|
int is_radiotap_ns;
|
|
|
|
|
|
|
|
int _max_length;
|
|
|
|
int _arg_index;
|
|
|
|
uint32_t _bitmap_shifter;
|
|
|
|
int _reset_on_ext;
|
2009-04-20 20:31:42 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
extern int ieee80211_radiotap_iterator_init(
|
2010-02-03 17:24:30 +08:00
|
|
|
struct ieee80211_radiotap_iterator *iterator,
|
|
|
|
struct ieee80211_radiotap_header *radiotap_header,
|
|
|
|
int max_length, const struct ieee80211_radiotap_vendor_namespaces *vns);
|
2009-04-20 20:31:42 +08:00
|
|
|
|
|
|
|
extern int ieee80211_radiotap_iterator_next(
|
2010-02-03 17:24:30 +08:00
|
|
|
struct ieee80211_radiotap_iterator *iterator);
|
|
|
|
|
2009-04-20 20:31:42 +08:00
|
|
|
|
2009-05-21 21:47:03 +08:00
|
|
|
extern const unsigned char rfc1042_header[6];
|
|
|
|
extern const unsigned char bridge_tunnel_header[6];
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ieee80211_get_hdrlen_from_skb - get header length from data
|
|
|
|
*
|
|
|
|
* Given an skb with a raw 802.11 header at the data pointer this function
|
|
|
|
* returns the 802.11 header length in bytes (not including encryption
|
|
|
|
* headers). If the data in the sk_buff is too short to contain a valid 802.11
|
|
|
|
* header the function returns 0.
|
|
|
|
*
|
|
|
|
* @skb: the frame
|
|
|
|
*/
|
|
|
|
unsigned int ieee80211_get_hdrlen_from_skb(const struct sk_buff *skb);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ieee80211_hdrlen - get header length in bytes from frame control
|
|
|
|
* @fc: frame control field in little-endian format
|
|
|
|
*/
|
2010-08-12 20:49:58 +08:00
|
|
|
unsigned int __attribute_const__ ieee80211_hdrlen(__le16 fc);
|
2009-05-21 21:47:03 +08:00
|
|
|
|
2010-08-19 22:11:27 +08:00
|
|
|
/**
|
|
|
|
* DOC: Data path helpers
|
|
|
|
*
|
|
|
|
* In addition to generic utilities, cfg80211 also offers
|
|
|
|
* functions that help implement the data path for devices
|
|
|
|
* that do not do the 802.11/802.3 conversion on the device.
|
|
|
|
*/
|
|
|
|
|
2009-05-21 21:47:03 +08:00
|
|
|
/**
|
|
|
|
* ieee80211_data_to_8023 - convert an 802.11 data frame to 802.3
|
|
|
|
* @skb: the 802.11 data frame
|
|
|
|
* @addr: the device MAC address
|
|
|
|
* @iftype: the virtual interface type
|
|
|
|
*/
|
2009-12-01 10:18:37 +08:00
|
|
|
int ieee80211_data_to_8023(struct sk_buff *skb, const u8 *addr,
|
2009-05-21 21:47:03 +08:00
|
|
|
enum nl80211_iftype iftype);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ieee80211_data_from_8023 - convert an 802.3 frame to 802.11
|
|
|
|
* @skb: the 802.3 frame
|
|
|
|
* @addr: the device MAC address
|
|
|
|
* @iftype: the virtual interface type
|
|
|
|
* @bssid: the network bssid (used only for iftype STATION and ADHOC)
|
|
|
|
* @qos: build 802.11 QoS data frame
|
|
|
|
*/
|
2009-12-01 10:18:37 +08:00
|
|
|
int ieee80211_data_from_8023(struct sk_buff *skb, const u8 *addr,
|
2009-05-21 21:47:03 +08:00
|
|
|
enum nl80211_iftype iftype, u8 *bssid, bool qos);
|
|
|
|
|
2009-12-01 10:18:37 +08:00
|
|
|
/**
|
|
|
|
* ieee80211_amsdu_to_8023s - decode an IEEE 802.11n A-MSDU frame
|
|
|
|
*
|
|
|
|
* Decode an IEEE 802.11n A-MSDU frame and convert it to a list of
|
|
|
|
* 802.3 frames. The @list will be empty if the decode fails. The
|
|
|
|
* @skb is consumed after the function returns.
|
|
|
|
*
|
|
|
|
* @skb: The input IEEE 802.11n A-MSDU frame.
|
|
|
|
* @list: The output list of 802.3 frames. It must be allocated and
|
|
|
|
* initialized by by the caller.
|
|
|
|
* @addr: The device MAC address.
|
|
|
|
* @iftype: The device interface type.
|
|
|
|
* @extra_headroom: The hardware extra headroom for SKBs in the @list.
|
2011-05-14 02:22:31 +08:00
|
|
|
* @has_80211_header: Set it true if SKB is with IEEE 802.11 header.
|
2009-12-01 10:18:37 +08:00
|
|
|
*/
|
|
|
|
void ieee80211_amsdu_to_8023s(struct sk_buff *skb, struct sk_buff_head *list,
|
|
|
|
const u8 *addr, enum nl80211_iftype iftype,
|
2011-05-14 02:22:31 +08:00
|
|
|
const unsigned int extra_headroom,
|
|
|
|
bool has_80211_header);
|
2009-12-01 10:18:37 +08:00
|
|
|
|
2009-05-21 21:47:03 +08:00
|
|
|
/**
|
|
|
|
* cfg80211_classify8021d - determine the 802.1p/1d tag for a data frame
|
|
|
|
* @skb: the data frame
|
|
|
|
*/
|
|
|
|
unsigned int cfg80211_classify8021d(struct sk_buff *skb);
|
|
|
|
|
2010-01-26 21:15:46 +08:00
|
|
|
/**
|
|
|
|
* cfg80211_find_ie - find information element in data
|
|
|
|
*
|
|
|
|
* @eid: element ID
|
|
|
|
* @ies: data consisting of IEs
|
|
|
|
* @len: length of data
|
|
|
|
*
|
|
|
|
* This function will return %NULL if the element ID could
|
|
|
|
* not be found or if the element is invalid (claims to be
|
|
|
|
* longer than the given data), or a pointer to the first byte
|
|
|
|
* of the requested element, that is the byte containing the
|
|
|
|
* element ID. There are no checks on the element length
|
|
|
|
* other than having to fit into the given data.
|
|
|
|
*/
|
|
|
|
const u8 *cfg80211_find_ie(u8 eid, const u8 *ies, int len);
|
|
|
|
|
2011-09-15 16:53:01 +08:00
|
|
|
/**
|
|
|
|
* cfg80211_find_vendor_ie - find vendor specific information element in data
|
|
|
|
*
|
|
|
|
* @oui: vendor OUI
|
|
|
|
* @oui_type: vendor-specific OUI type
|
|
|
|
* @ies: data consisting of IEs
|
|
|
|
* @len: length of data
|
|
|
|
*
|
|
|
|
* This function will return %NULL if the vendor specific element ID
|
|
|
|
* could not be found or if the element is invalid (claims to be
|
|
|
|
* longer than the given data), or a pointer to the first byte
|
|
|
|
* of the requested element, that is the byte containing the
|
|
|
|
* element ID. There are no checks on the element length
|
|
|
|
* other than having to fit into the given data.
|
|
|
|
*/
|
|
|
|
const u8 *cfg80211_find_vendor_ie(unsigned int oui, u8 oui_type,
|
|
|
|
const u8 *ies, int len);
|
|
|
|
|
2010-08-19 22:11:27 +08:00
|
|
|
/**
|
|
|
|
* DOC: Regulatory enforcement infrastructure
|
|
|
|
*
|
|
|
|
* TODO
|
2009-04-20 20:31:42 +08:00
|
|
|
*/
|
|
|
|
|
|
|
|
/**
|
|
|
|
* regulatory_hint - driver hint to the wireless core a regulatory domain
|
|
|
|
* @wiphy: the wireless device giving the hint (used only for reporting
|
|
|
|
* conflicts)
|
|
|
|
* @alpha2: the ISO/IEC 3166 alpha2 the driver claims its regulatory domain
|
|
|
|
* should be in. If @rd is set this should be NULL. Note that if you
|
|
|
|
* set this to NULL you should still set rd->alpha2 to some accepted
|
|
|
|
* alpha2.
|
|
|
|
*
|
|
|
|
* Wireless drivers can use this function to hint to the wireless core
|
|
|
|
* what it believes should be the current regulatory domain by
|
|
|
|
* giving it an ISO/IEC 3166 alpha2 country code it knows its regulatory
|
|
|
|
* domain should be in or by providing a completely build regulatory domain.
|
|
|
|
* If the driver provides an ISO/IEC 3166 alpha2 userspace will be queried
|
|
|
|
* for a regulatory domain structure for the respective country.
|
|
|
|
*
|
|
|
|
* The wiphy must have been registered to cfg80211 prior to this call.
|
|
|
|
* For cfg80211 drivers this means you must first use wiphy_register(),
|
|
|
|
* for mac80211 drivers you must first use ieee80211_register_hw().
|
|
|
|
*
|
|
|
|
* Drivers should check the return value, its possible you can get
|
|
|
|
* an -ENOMEM.
|
|
|
|
*/
|
|
|
|
extern int regulatory_hint(struct wiphy *wiphy, const char *alpha2);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* wiphy_apply_custom_regulatory - apply a custom driver regulatory domain
|
|
|
|
* @wiphy: the wireless device we want to process the regulatory domain on
|
|
|
|
* @regd: the custom regulatory domain to use for this wiphy
|
|
|
|
*
|
|
|
|
* Drivers can sometimes have custom regulatory domains which do not apply
|
|
|
|
* to a specific country. Drivers can use this to apply such custom regulatory
|
|
|
|
* domains. This routine must be called prior to wiphy registration. The
|
|
|
|
* custom regulatory domain will be trusted completely and as such previous
|
|
|
|
* default channel settings will be disregarded. If no rule is found for a
|
|
|
|
* channel on the regulatory domain the channel will be disabled.
|
|
|
|
*/
|
|
|
|
extern void wiphy_apply_custom_regulatory(
|
|
|
|
struct wiphy *wiphy,
|
|
|
|
const struct ieee80211_regdomain *regd);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* freq_reg_info - get regulatory information for the given frequency
|
|
|
|
* @wiphy: the wiphy for which we want to process this rule for
|
|
|
|
* @center_freq: Frequency in KHz for which we want regulatory information for
|
2009-05-02 12:37:17 +08:00
|
|
|
* @desired_bw_khz: the desired max bandwidth you want to use per
|
|
|
|
* channel. Note that this is still 20 MHz if you want to use HT40
|
|
|
|
* as HT40 makes use of two channels for its 40 MHz width bandwidth.
|
|
|
|
* If set to 0 we'll assume you want the standard 20 MHz.
|
2009-04-20 20:31:42 +08:00
|
|
|
* @reg_rule: the regulatory rule which we have for this frequency
|
|
|
|
*
|
|
|
|
* Use this function to get the regulatory rule for a specific frequency on
|
|
|
|
* a given wireless device. If the device has a specific regulatory domain
|
|
|
|
* it wants to follow we respect that unless a country IE has been received
|
|
|
|
* and processed already.
|
|
|
|
*
|
|
|
|
* Returns 0 if it was able to find a valid regulatory rule which does
|
|
|
|
* apply to the given center_freq otherwise it returns non-zero. It will
|
|
|
|
* also return -ERANGE if we determine the given center_freq does not even have
|
|
|
|
* a regulatory rule for a frequency range in the center_freq's band. See
|
|
|
|
* freq_in_rule_band() for our current definition of a band -- this is purely
|
|
|
|
* subjective and right now its 802.11 specific.
|
|
|
|
*/
|
2009-05-02 12:37:17 +08:00
|
|
|
extern int freq_reg_info(struct wiphy *wiphy,
|
|
|
|
u32 center_freq,
|
|
|
|
u32 desired_bw_khz,
|
2009-04-20 20:31:42 +08:00
|
|
|
const struct ieee80211_reg_rule **reg_rule);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* callbacks for asynchronous cfg80211 methods, notification
|
|
|
|
* functions and BSS handling helpers
|
|
|
|
*/
|
|
|
|
|
2009-02-11 04:25:55 +08:00
|
|
|
/**
|
|
|
|
* cfg80211_scan_done - notify that scan finished
|
|
|
|
*
|
|
|
|
* @request: the corresponding scan request
|
|
|
|
* @aborted: set to true if the scan was aborted for any reason,
|
|
|
|
* userspace will be notified of that
|
|
|
|
*/
|
|
|
|
void cfg80211_scan_done(struct cfg80211_scan_request *request, bool aborted);
|
|
|
|
|
2011-05-11 22:09:35 +08:00
|
|
|
/**
|
|
|
|
* cfg80211_sched_scan_results - notify that new scan results are available
|
|
|
|
*
|
|
|
|
* @wiphy: the wiphy which got scheduled scan results
|
|
|
|
*/
|
|
|
|
void cfg80211_sched_scan_results(struct wiphy *wiphy);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* cfg80211_sched_scan_stopped - notify that the scheduled scan has stopped
|
|
|
|
*
|
|
|
|
* @wiphy: the wiphy on which the scheduled scan stopped
|
|
|
|
*
|
|
|
|
* The driver can call this function to inform cfg80211 that the
|
|
|
|
* scheduled scan had to be stopped, for whatever reason. The driver
|
|
|
|
* is then called back via the sched_scan_stop operation when done.
|
|
|
|
*/
|
|
|
|
void cfg80211_sched_scan_stopped(struct wiphy *wiphy);
|
|
|
|
|
2009-02-11 04:25:55 +08:00
|
|
|
/**
|
2010-06-07 17:12:27 +08:00
|
|
|
* cfg80211_inform_bss_frame - inform cfg80211 of a received BSS frame
|
2009-02-11 04:25:55 +08:00
|
|
|
*
|
|
|
|
* @wiphy: the wiphy reporting the BSS
|
2010-06-07 17:12:27 +08:00
|
|
|
* @channel: The channel the frame was received on
|
|
|
|
* @mgmt: the management frame (probe response or beacon)
|
|
|
|
* @len: length of the management frame
|
2009-02-19 01:45:06 +08:00
|
|
|
* @signal: the signal strength, type depends on the wiphy's signal_type
|
2009-02-11 04:25:55 +08:00
|
|
|
* @gfp: context flags
|
|
|
|
*
|
|
|
|
* This informs cfg80211 that BSS information was found and
|
|
|
|
* the BSS should be updated/added.
|
2011-10-27 20:45:02 +08:00
|
|
|
*
|
|
|
|
* NOTE: Returns a referenced struct, must be released with cfg80211_put_bss()!
|
2009-02-11 04:25:55 +08:00
|
|
|
*/
|
2011-10-27 20:45:02 +08:00
|
|
|
struct cfg80211_bss * __must_check
|
2009-02-11 04:25:55 +08:00
|
|
|
cfg80211_inform_bss_frame(struct wiphy *wiphy,
|
|
|
|
struct ieee80211_channel *channel,
|
|
|
|
struct ieee80211_mgmt *mgmt, size_t len,
|
2009-02-19 01:45:06 +08:00
|
|
|
s32 signal, gfp_t gfp);
|
2009-02-11 04:25:55 +08:00
|
|
|
|
2010-06-07 17:12:27 +08:00
|
|
|
/**
|
|
|
|
* cfg80211_inform_bss - inform cfg80211 of a new BSS
|
|
|
|
*
|
|
|
|
* @wiphy: the wiphy reporting the BSS
|
|
|
|
* @channel: The channel the frame was received on
|
|
|
|
* @bssid: the BSSID of the BSS
|
|
|
|
* @timestamp: the TSF timestamp sent by the peer
|
|
|
|
* @capability: the capability field sent by the peer
|
|
|
|
* @beacon_interval: the beacon interval announced by the peer
|
|
|
|
* @ie: additional IEs sent by the peer
|
|
|
|
* @ielen: length of the additional IEs
|
|
|
|
* @signal: the signal strength, type depends on the wiphy's signal_type
|
|
|
|
* @gfp: context flags
|
|
|
|
*
|
|
|
|
* This informs cfg80211 that BSS information was found and
|
|
|
|
* the BSS should be updated/added.
|
2011-10-27 20:45:02 +08:00
|
|
|
*
|
|
|
|
* NOTE: Returns a referenced struct, must be released with cfg80211_put_bss()!
|
2010-06-07 17:12:27 +08:00
|
|
|
*/
|
2011-10-27 20:45:02 +08:00
|
|
|
struct cfg80211_bss * __must_check
|
2009-03-27 05:40:09 +08:00
|
|
|
cfg80211_inform_bss(struct wiphy *wiphy,
|
|
|
|
struct ieee80211_channel *channel,
|
|
|
|
const u8 *bssid,
|
|
|
|
u64 timestamp, u16 capability, u16 beacon_interval,
|
|
|
|
const u8 *ie, size_t ielen,
|
|
|
|
s32 signal, gfp_t gfp);
|
|
|
|
|
2009-02-11 04:25:55 +08:00
|
|
|
struct cfg80211_bss *cfg80211_get_bss(struct wiphy *wiphy,
|
|
|
|
struct ieee80211_channel *channel,
|
|
|
|
const u8 *bssid,
|
2009-02-11 04:25:59 +08:00
|
|
|
const u8 *ssid, size_t ssid_len,
|
|
|
|
u16 capa_mask, u16 capa_val);
|
|
|
|
static inline struct cfg80211_bss *
|
|
|
|
cfg80211_get_ibss(struct wiphy *wiphy,
|
|
|
|
struct ieee80211_channel *channel,
|
|
|
|
const u8 *ssid, size_t ssid_len)
|
|
|
|
{
|
|
|
|
return cfg80211_get_bss(wiphy, channel, NULL, ssid, ssid_len,
|
|
|
|
WLAN_CAPABILITY_IBSS, WLAN_CAPABILITY_IBSS);
|
|
|
|
}
|
|
|
|
|
2009-02-11 04:25:55 +08:00
|
|
|
struct cfg80211_bss *cfg80211_get_mesh(struct wiphy *wiphy,
|
|
|
|
struct ieee80211_channel *channel,
|
|
|
|
const u8 *meshid, size_t meshidlen,
|
|
|
|
const u8 *meshcfg);
|
2012-01-20 20:55:26 +08:00
|
|
|
/**
|
|
|
|
* cfg80211_ref_bss - reference BSS struct
|
|
|
|
* @bss: the BSS struct to reference
|
|
|
|
*
|
|
|
|
* Increments the refcount of the given BSS struct.
|
|
|
|
*/
|
|
|
|
void cfg80211_ref_bss(struct cfg80211_bss *bss);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* cfg80211_put_bss - unref BSS struct
|
|
|
|
* @bss: the BSS struct
|
|
|
|
*
|
|
|
|
* Decrements the refcount of the given BSS struct.
|
|
|
|
*/
|
2009-02-11 04:25:55 +08:00
|
|
|
void cfg80211_put_bss(struct cfg80211_bss *bss);
|
2009-04-20 20:31:42 +08:00
|
|
|
|
2009-02-11 04:25:58 +08:00
|
|
|
/**
|
|
|
|
* cfg80211_unlink_bss - unlink BSS from internal data structures
|
|
|
|
* @wiphy: the wiphy
|
|
|
|
* @bss: the bss to remove
|
|
|
|
*
|
|
|
|
* This function removes the given BSS from the internal data structures
|
|
|
|
* thereby making it no longer show up in scan results etc. Use this
|
|
|
|
* function when you detect a BSS is gone. Normally BSSes will also time
|
|
|
|
* out, so it is not necessary to use this function at all.
|
|
|
|
*/
|
|
|
|
void cfg80211_unlink_bss(struct wiphy *wiphy, struct cfg80211_bss *bss);
|
2008-11-27 05:36:31 +08:00
|
|
|
|
nl80211: Event notifications for MLME events
Add new nl80211 event notifications (and a new multicast group, "mlme")
for informing user space about received and processed Authentication,
(Re)Association Response, Deauthentication, and Disassociation frames in
station and IBSS modes (i.e., MLME SAP interface primitives
MLME-AUTHENTICATE.confirm, MLME-ASSOCIATE.confirm,
MLME-REASSOCIATE.confirm, MLME-DEAUTHENTICATE.indicate, and
MLME-DISASSOCIATE.indication). The event data is encapsulated as the 802.11
management frame since we already have the frame in that format and it
includes all the needed information.
This is the initial step in providing MLME SAP interface for
authentication and association with nl80211. In other words, kernel code
will act as the MLME and a user space application can control it as the
SME.
Signed-off-by: Jouni Malinen <j@w1.fi>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2009-03-19 19:39:21 +08:00
|
|
|
/**
|
|
|
|
* cfg80211_send_rx_auth - notification of processed authentication
|
|
|
|
* @dev: network device
|
|
|
|
* @buf: authentication frame (header + body)
|
|
|
|
* @len: length of the frame data
|
|
|
|
*
|
|
|
|
* This function is called whenever an authentication has been processed in
|
2009-04-23 02:38:25 +08:00
|
|
|
* station mode. The driver is required to call either this function or
|
|
|
|
* cfg80211_send_auth_timeout() to indicate the result of cfg80211_ops::auth()
|
2009-07-07 09:56:07 +08:00
|
|
|
* call. This function may sleep.
|
nl80211: Event notifications for MLME events
Add new nl80211 event notifications (and a new multicast group, "mlme")
for informing user space about received and processed Authentication,
(Re)Association Response, Deauthentication, and Disassociation frames in
station and IBSS modes (i.e., MLME SAP interface primitives
MLME-AUTHENTICATE.confirm, MLME-ASSOCIATE.confirm,
MLME-REASSOCIATE.confirm, MLME-DEAUTHENTICATE.indicate, and
MLME-DISASSOCIATE.indication). The event data is encapsulated as the 802.11
management frame since we already have the frame in that format and it
includes all the needed information.
This is the initial step in providing MLME SAP interface for
authentication and association with nl80211. In other words, kernel code
will act as the MLME and a user space application can control it as the
SME.
Signed-off-by: Jouni Malinen <j@w1.fi>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2009-03-19 19:39:21 +08:00
|
|
|
*/
|
2009-07-07 09:56:07 +08:00
|
|
|
void cfg80211_send_rx_auth(struct net_device *dev, const u8 *buf, size_t len);
|
nl80211: Event notifications for MLME events
Add new nl80211 event notifications (and a new multicast group, "mlme")
for informing user space about received and processed Authentication,
(Re)Association Response, Deauthentication, and Disassociation frames in
station and IBSS modes (i.e., MLME SAP interface primitives
MLME-AUTHENTICATE.confirm, MLME-ASSOCIATE.confirm,
MLME-REASSOCIATE.confirm, MLME-DEAUTHENTICATE.indicate, and
MLME-DISASSOCIATE.indication). The event data is encapsulated as the 802.11
management frame since we already have the frame in that format and it
includes all the needed information.
This is the initial step in providing MLME SAP interface for
authentication and association with nl80211. In other words, kernel code
will act as the MLME and a user space application can control it as the
SME.
Signed-off-by: Jouni Malinen <j@w1.fi>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2009-03-19 19:39:21 +08:00
|
|
|
|
2009-04-23 02:38:25 +08:00
|
|
|
/**
|
|
|
|
* cfg80211_send_auth_timeout - notification of timed out authentication
|
|
|
|
* @dev: network device
|
|
|
|
* @addr: The MAC address of the device with which the authentication timed out
|
2009-07-07 09:56:07 +08:00
|
|
|
*
|
|
|
|
* This function may sleep.
|
2009-04-23 02:38:25 +08:00
|
|
|
*/
|
2009-07-07 09:56:07 +08:00
|
|
|
void cfg80211_send_auth_timeout(struct net_device *dev, const u8 *addr);
|
2009-04-23 02:38:25 +08:00
|
|
|
|
nl80211: Event notifications for MLME events
Add new nl80211 event notifications (and a new multicast group, "mlme")
for informing user space about received and processed Authentication,
(Re)Association Response, Deauthentication, and Disassociation frames in
station and IBSS modes (i.e., MLME SAP interface primitives
MLME-AUTHENTICATE.confirm, MLME-ASSOCIATE.confirm,
MLME-REASSOCIATE.confirm, MLME-DEAUTHENTICATE.indicate, and
MLME-DISASSOCIATE.indication). The event data is encapsulated as the 802.11
management frame since we already have the frame in that format and it
includes all the needed information.
This is the initial step in providing MLME SAP interface for
authentication and association with nl80211. In other words, kernel code
will act as the MLME and a user space application can control it as the
SME.
Signed-off-by: Jouni Malinen <j@w1.fi>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2009-03-19 19:39:21 +08:00
|
|
|
/**
|
|
|
|
* cfg80211_send_rx_assoc - notification of processed association
|
|
|
|
* @dev: network device
|
2012-01-20 20:55:25 +08:00
|
|
|
* @bss: the BSS struct association was requested for, the struct reference
|
|
|
|
* is owned by cfg80211 after this call
|
nl80211: Event notifications for MLME events
Add new nl80211 event notifications (and a new multicast group, "mlme")
for informing user space about received and processed Authentication,
(Re)Association Response, Deauthentication, and Disassociation frames in
station and IBSS modes (i.e., MLME SAP interface primitives
MLME-AUTHENTICATE.confirm, MLME-ASSOCIATE.confirm,
MLME-REASSOCIATE.confirm, MLME-DEAUTHENTICATE.indicate, and
MLME-DISASSOCIATE.indication). The event data is encapsulated as the 802.11
management frame since we already have the frame in that format and it
includes all the needed information.
This is the initial step in providing MLME SAP interface for
authentication and association with nl80211. In other words, kernel code
will act as the MLME and a user space application can control it as the
SME.
Signed-off-by: Jouni Malinen <j@w1.fi>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2009-03-19 19:39:21 +08:00
|
|
|
* @buf: (re)association response frame (header + body)
|
|
|
|
* @len: length of the frame data
|
|
|
|
*
|
|
|
|
* This function is called whenever a (re)association response has been
|
2009-04-23 02:38:25 +08:00
|
|
|
* processed in station mode. The driver is required to call either this
|
|
|
|
* function or cfg80211_send_assoc_timeout() to indicate the result of
|
2009-07-07 09:56:07 +08:00
|
|
|
* cfg80211_ops::assoc() call. This function may sleep.
|
nl80211: Event notifications for MLME events
Add new nl80211 event notifications (and a new multicast group, "mlme")
for informing user space about received and processed Authentication,
(Re)Association Response, Deauthentication, and Disassociation frames in
station and IBSS modes (i.e., MLME SAP interface primitives
MLME-AUTHENTICATE.confirm, MLME-ASSOCIATE.confirm,
MLME-REASSOCIATE.confirm, MLME-DEAUTHENTICATE.indicate, and
MLME-DISASSOCIATE.indication). The event data is encapsulated as the 802.11
management frame since we already have the frame in that format and it
includes all the needed information.
This is the initial step in providing MLME SAP interface for
authentication and association with nl80211. In other words, kernel code
will act as the MLME and a user space application can control it as the
SME.
Signed-off-by: Jouni Malinen <j@w1.fi>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2009-03-19 19:39:21 +08:00
|
|
|
*/
|
2012-01-20 20:55:25 +08:00
|
|
|
void cfg80211_send_rx_assoc(struct net_device *dev, struct cfg80211_bss *bss,
|
|
|
|
const u8 *buf, size_t len);
|
nl80211: Event notifications for MLME events
Add new nl80211 event notifications (and a new multicast group, "mlme")
for informing user space about received and processed Authentication,
(Re)Association Response, Deauthentication, and Disassociation frames in
station and IBSS modes (i.e., MLME SAP interface primitives
MLME-AUTHENTICATE.confirm, MLME-ASSOCIATE.confirm,
MLME-REASSOCIATE.confirm, MLME-DEAUTHENTICATE.indicate, and
MLME-DISASSOCIATE.indication). The event data is encapsulated as the 802.11
management frame since we already have the frame in that format and it
includes all the needed information.
This is the initial step in providing MLME SAP interface for
authentication and association with nl80211. In other words, kernel code
will act as the MLME and a user space application can control it as the
SME.
Signed-off-by: Jouni Malinen <j@w1.fi>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2009-03-19 19:39:21 +08:00
|
|
|
|
2009-04-23 02:38:25 +08:00
|
|
|
/**
|
|
|
|
* cfg80211_send_assoc_timeout - notification of timed out association
|
|
|
|
* @dev: network device
|
|
|
|
* @addr: The MAC address of the device with which the association timed out
|
2009-07-07 09:56:07 +08:00
|
|
|
*
|
|
|
|
* This function may sleep.
|
2009-04-23 02:38:25 +08:00
|
|
|
*/
|
2009-07-07 09:56:07 +08:00
|
|
|
void cfg80211_send_assoc_timeout(struct net_device *dev, const u8 *addr);
|
2009-04-23 02:38:25 +08:00
|
|
|
|
nl80211: Event notifications for MLME events
Add new nl80211 event notifications (and a new multicast group, "mlme")
for informing user space about received and processed Authentication,
(Re)Association Response, Deauthentication, and Disassociation frames in
station and IBSS modes (i.e., MLME SAP interface primitives
MLME-AUTHENTICATE.confirm, MLME-ASSOCIATE.confirm,
MLME-REASSOCIATE.confirm, MLME-DEAUTHENTICATE.indicate, and
MLME-DISASSOCIATE.indication). The event data is encapsulated as the 802.11
management frame since we already have the frame in that format and it
includes all the needed information.
This is the initial step in providing MLME SAP interface for
authentication and association with nl80211. In other words, kernel code
will act as the MLME and a user space application can control it as the
SME.
Signed-off-by: Jouni Malinen <j@w1.fi>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2009-03-19 19:39:21 +08:00
|
|
|
/**
|
2009-03-28 02:53:56 +08:00
|
|
|
* cfg80211_send_deauth - notification of processed deauthentication
|
nl80211: Event notifications for MLME events
Add new nl80211 event notifications (and a new multicast group, "mlme")
for informing user space about received and processed Authentication,
(Re)Association Response, Deauthentication, and Disassociation frames in
station and IBSS modes (i.e., MLME SAP interface primitives
MLME-AUTHENTICATE.confirm, MLME-ASSOCIATE.confirm,
MLME-REASSOCIATE.confirm, MLME-DEAUTHENTICATE.indicate, and
MLME-DISASSOCIATE.indication). The event data is encapsulated as the 802.11
management frame since we already have the frame in that format and it
includes all the needed information.
This is the initial step in providing MLME SAP interface for
authentication and association with nl80211. In other words, kernel code
will act as the MLME and a user space application can control it as the
SME.
Signed-off-by: Jouni Malinen <j@w1.fi>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2009-03-19 19:39:21 +08:00
|
|
|
* @dev: network device
|
|
|
|
* @buf: deauthentication frame (header + body)
|
|
|
|
* @len: length of the frame data
|
|
|
|
*
|
|
|
|
* This function is called whenever deauthentication has been processed in
|
2009-03-28 02:53:56 +08:00
|
|
|
* station mode. This includes both received deauthentication frames and
|
2009-07-07 09:56:07 +08:00
|
|
|
* locally generated ones. This function may sleep.
|
nl80211: Event notifications for MLME events
Add new nl80211 event notifications (and a new multicast group, "mlme")
for informing user space about received and processed Authentication,
(Re)Association Response, Deauthentication, and Disassociation frames in
station and IBSS modes (i.e., MLME SAP interface primitives
MLME-AUTHENTICATE.confirm, MLME-ASSOCIATE.confirm,
MLME-REASSOCIATE.confirm, MLME-DEAUTHENTICATE.indicate, and
MLME-DISASSOCIATE.indication). The event data is encapsulated as the 802.11
management frame since we already have the frame in that format and it
includes all the needed information.
This is the initial step in providing MLME SAP interface for
authentication and association with nl80211. In other words, kernel code
will act as the MLME and a user space application can control it as the
SME.
Signed-off-by: Jouni Malinen <j@w1.fi>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2009-03-19 19:39:21 +08:00
|
|
|
*/
|
2009-10-13 19:28:13 +08:00
|
|
|
void cfg80211_send_deauth(struct net_device *dev, const u8 *buf, size_t len);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* __cfg80211_send_deauth - notification of processed deauthentication
|
|
|
|
* @dev: network device
|
|
|
|
* @buf: deauthentication frame (header + body)
|
|
|
|
* @len: length of the frame data
|
|
|
|
*
|
|
|
|
* Like cfg80211_send_deauth(), but doesn't take the wdev lock.
|
|
|
|
*/
|
|
|
|
void __cfg80211_send_deauth(struct net_device *dev, const u8 *buf, size_t len);
|
nl80211: Event notifications for MLME events
Add new nl80211 event notifications (and a new multicast group, "mlme")
for informing user space about received and processed Authentication,
(Re)Association Response, Deauthentication, and Disassociation frames in
station and IBSS modes (i.e., MLME SAP interface primitives
MLME-AUTHENTICATE.confirm, MLME-ASSOCIATE.confirm,
MLME-REASSOCIATE.confirm, MLME-DEAUTHENTICATE.indicate, and
MLME-DISASSOCIATE.indication). The event data is encapsulated as the 802.11
management frame since we already have the frame in that format and it
includes all the needed information.
This is the initial step in providing MLME SAP interface for
authentication and association with nl80211. In other words, kernel code
will act as the MLME and a user space application can control it as the
SME.
Signed-off-by: Jouni Malinen <j@w1.fi>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2009-03-19 19:39:21 +08:00
|
|
|
|
|
|
|
/**
|
2009-03-28 02:53:56 +08:00
|
|
|
* cfg80211_send_disassoc - notification of processed disassociation
|
nl80211: Event notifications for MLME events
Add new nl80211 event notifications (and a new multicast group, "mlme")
for informing user space about received and processed Authentication,
(Re)Association Response, Deauthentication, and Disassociation frames in
station and IBSS modes (i.e., MLME SAP interface primitives
MLME-AUTHENTICATE.confirm, MLME-ASSOCIATE.confirm,
MLME-REASSOCIATE.confirm, MLME-DEAUTHENTICATE.indicate, and
MLME-DISASSOCIATE.indication). The event data is encapsulated as the 802.11
management frame since we already have the frame in that format and it
includes all the needed information.
This is the initial step in providing MLME SAP interface for
authentication and association with nl80211. In other words, kernel code
will act as the MLME and a user space application can control it as the
SME.
Signed-off-by: Jouni Malinen <j@w1.fi>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2009-03-19 19:39:21 +08:00
|
|
|
* @dev: network device
|
|
|
|
* @buf: disassociation response frame (header + body)
|
|
|
|
* @len: length of the frame data
|
|
|
|
*
|
|
|
|
* This function is called whenever disassociation has been processed in
|
2009-03-28 02:53:56 +08:00
|
|
|
* station mode. This includes both received disassociation frames and locally
|
2009-07-07 09:56:07 +08:00
|
|
|
* generated ones. This function may sleep.
|
nl80211: Event notifications for MLME events
Add new nl80211 event notifications (and a new multicast group, "mlme")
for informing user space about received and processed Authentication,
(Re)Association Response, Deauthentication, and Disassociation frames in
station and IBSS modes (i.e., MLME SAP interface primitives
MLME-AUTHENTICATE.confirm, MLME-ASSOCIATE.confirm,
MLME-REASSOCIATE.confirm, MLME-DEAUTHENTICATE.indicate, and
MLME-DISASSOCIATE.indication). The event data is encapsulated as the 802.11
management frame since we already have the frame in that format and it
includes all the needed information.
This is the initial step in providing MLME SAP interface for
authentication and association with nl80211. In other words, kernel code
will act as the MLME and a user space application can control it as the
SME.
Signed-off-by: Jouni Malinen <j@w1.fi>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2009-03-19 19:39:21 +08:00
|
|
|
*/
|
2009-10-13 19:28:13 +08:00
|
|
|
void cfg80211_send_disassoc(struct net_device *dev, const u8 *buf, size_t len);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* __cfg80211_send_disassoc - notification of processed disassociation
|
|
|
|
* @dev: network device
|
|
|
|
* @buf: disassociation response frame (header + body)
|
|
|
|
* @len: length of the frame data
|
|
|
|
*
|
|
|
|
* Like cfg80211_send_disassoc(), but doesn't take the wdev lock.
|
|
|
|
*/
|
|
|
|
void __cfg80211_send_disassoc(struct net_device *dev, const u8 *buf,
|
|
|
|
size_t len);
|
nl80211: Event notifications for MLME events
Add new nl80211 event notifications (and a new multicast group, "mlme")
for informing user space about received and processed Authentication,
(Re)Association Response, Deauthentication, and Disassociation frames in
station and IBSS modes (i.e., MLME SAP interface primitives
MLME-AUTHENTICATE.confirm, MLME-ASSOCIATE.confirm,
MLME-REASSOCIATE.confirm, MLME-DEAUTHENTICATE.indicate, and
MLME-DISASSOCIATE.indication). The event data is encapsulated as the 802.11
management frame since we already have the frame in that format and it
includes all the needed information.
This is the initial step in providing MLME SAP interface for
authentication and association with nl80211. In other words, kernel code
will act as the MLME and a user space application can control it as the
SME.
Signed-off-by: Jouni Malinen <j@w1.fi>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
2009-03-19 19:39:21 +08:00
|
|
|
|
2010-12-16 06:52:40 +08:00
|
|
|
/**
|
|
|
|
* cfg80211_send_unprot_deauth - notification of unprotected deauthentication
|
|
|
|
* @dev: network device
|
|
|
|
* @buf: deauthentication frame (header + body)
|
|
|
|
* @len: length of the frame data
|
|
|
|
*
|
|
|
|
* This function is called whenever a received Deauthentication frame has been
|
|
|
|
* dropped in station mode because of MFP being used but the Deauthentication
|
|
|
|
* frame was not protected. This function may sleep.
|
|
|
|
*/
|
|
|
|
void cfg80211_send_unprot_deauth(struct net_device *dev, const u8 *buf,
|
|
|
|
size_t len);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* cfg80211_send_unprot_disassoc - notification of unprotected disassociation
|
|
|
|
* @dev: network device
|
|
|
|
* @buf: disassociation frame (header + body)
|
|
|
|
* @len: length of the frame data
|
|
|
|
*
|
|
|
|
* This function is called whenever a received Disassociation frame has been
|
|
|
|
* dropped in station mode because of MFP being used but the Disassociation
|
|
|
|
* frame was not protected. This function may sleep.
|
|
|
|
*/
|
|
|
|
void cfg80211_send_unprot_disassoc(struct net_device *dev, const u8 *buf,
|
|
|
|
size_t len);
|
|
|
|
|
2009-03-28 03:59:49 +08:00
|
|
|
/**
|
|
|
|
* cfg80211_michael_mic_failure - notification of Michael MIC failure (TKIP)
|
|
|
|
* @dev: network device
|
|
|
|
* @addr: The source MAC address of the frame
|
|
|
|
* @key_type: The key type that the received frame used
|
2011-06-23 05:00:24 +08:00
|
|
|
* @key_id: Key identifier (0..3). Can be -1 if missing.
|
2009-03-28 03:59:49 +08:00
|
|
|
* @tsc: The TSC value of the frame that generated the MIC failure (6 octets)
|
2009-07-02 03:26:47 +08:00
|
|
|
* @gfp: allocation flags
|
2009-03-28 03:59:49 +08:00
|
|
|
*
|
|
|
|
* This function is called whenever the local MAC detects a MIC failure in a
|
|
|
|
* received frame. This matches with MLME-MICHAELMICFAILURE.indication()
|
|
|
|
* primitive.
|
|
|
|
*/
|
|
|
|
void cfg80211_michael_mic_failure(struct net_device *dev, const u8 *addr,
|
|
|
|
enum nl80211_key_type key_type, int key_id,
|
2009-07-02 03:26:47 +08:00
|
|
|
const u8 *tsc, gfp_t gfp);
|
2009-03-28 03:59:49 +08:00
|
|
|
|
2009-04-20 03:24:32 +08:00
|
|
|
/**
|
|
|
|
* cfg80211_ibss_joined - notify cfg80211 that device joined an IBSS
|
|
|
|
*
|
|
|
|
* @dev: network device
|
|
|
|
* @bssid: the BSSID of the IBSS joined
|
|
|
|
* @gfp: allocation flags
|
|
|
|
*
|
|
|
|
* This function notifies cfg80211 that the device joined an IBSS or
|
|
|
|
* switched to a different BSSID. Before this function can be called,
|
|
|
|
* either a beacon has to have been received from the IBSS, or one of
|
|
|
|
* the cfg80211_inform_bss{,_frame} functions must have been called
|
|
|
|
* with the locally generated beacon -- this guarantees that there is
|
|
|
|
* always a scan result for this IBSS. cfg80211 will handle the rest.
|
|
|
|
*/
|
|
|
|
void cfg80211_ibss_joined(struct net_device *dev, const u8 *bssid, gfp_t gfp);
|
|
|
|
|
2011-04-08 06:08:34 +08:00
|
|
|
/**
|
|
|
|
* cfg80211_notify_new_candidate - notify cfg80211 of a new mesh peer candidate
|
|
|
|
*
|
|
|
|
* @dev: network device
|
|
|
|
* @macaddr: the MAC address of the new candidate
|
|
|
|
* @ie: information elements advertised by the peer candidate
|
|
|
|
* @ie_len: lenght of the information elements buffer
|
|
|
|
* @gfp: allocation flags
|
|
|
|
*
|
|
|
|
* This function notifies cfg80211 that the mesh peer candidate has been
|
|
|
|
* detected, most likely via a beacon or, less likely, via a probe response.
|
|
|
|
* cfg80211 then sends a notification to userspace.
|
|
|
|
*/
|
|
|
|
void cfg80211_notify_new_peer_candidate(struct net_device *dev,
|
|
|
|
const u8 *macaddr, const u8 *ie, u8 ie_len, gfp_t gfp);
|
|
|
|
|
2010-08-19 22:11:27 +08:00
|
|
|
/**
|
|
|
|
* DOC: RFkill integration
|
|
|
|
*
|
|
|
|
* RFkill integration in cfg80211 is almost invisible to drivers,
|
|
|
|
* as cfg80211 automatically registers an rfkill instance for each
|
|
|
|
* wireless device it knows about. Soft kill is also translated
|
|
|
|
* into disconnecting and turning all interfaces off, drivers are
|
|
|
|
* expected to turn off the device when all interfaces are down.
|
|
|
|
*
|
|
|
|
* However, devices may have a hard RFkill line, in which case they
|
|
|
|
* also need to interact with the rfkill subsystem, via cfg80211.
|
|
|
|
* They can do this with a few helper functions documented here.
|
|
|
|
*/
|
|
|
|
|
2009-06-02 19:01:41 +08:00
|
|
|
/**
|
|
|
|
* wiphy_rfkill_set_hw_state - notify cfg80211 about hw block state
|
|
|
|
* @wiphy: the wiphy
|
|
|
|
* @blocked: block status
|
|
|
|
*/
|
|
|
|
void wiphy_rfkill_set_hw_state(struct wiphy *wiphy, bool blocked);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* wiphy_rfkill_start_polling - start polling rfkill
|
|
|
|
* @wiphy: the wiphy
|
|
|
|
*/
|
|
|
|
void wiphy_rfkill_start_polling(struct wiphy *wiphy);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* wiphy_rfkill_stop_polling - stop polling rfkill
|
|
|
|
* @wiphy: the wiphy
|
|
|
|
*/
|
|
|
|
void wiphy_rfkill_stop_polling(struct wiphy *wiphy);
|
|
|
|
|
2009-07-02 03:26:51 +08:00
|
|
|
#ifdef CONFIG_NL80211_TESTMODE
|
2010-08-19 22:11:27 +08:00
|
|
|
/**
|
|
|
|
* DOC: Test mode
|
|
|
|
*
|
|
|
|
* Test mode is a set of utility functions to allow drivers to
|
|
|
|
* interact with driver-specific tools to aid, for instance,
|
|
|
|
* factory programming.
|
|
|
|
*
|
|
|
|
* This chapter describes how drivers interact with it, for more
|
|
|
|
* information see the nl80211 book's chapter on it.
|
|
|
|
*/
|
|
|
|
|
2009-07-02 03:26:51 +08:00
|
|
|
/**
|
|
|
|
* cfg80211_testmode_alloc_reply_skb - allocate testmode reply
|
|
|
|
* @wiphy: the wiphy
|
|
|
|
* @approxlen: an upper bound of the length of the data that will
|
|
|
|
* be put into the skb
|
|
|
|
*
|
|
|
|
* This function allocates and pre-fills an skb for a reply to
|
|
|
|
* the testmode command. Since it is intended for a reply, calling
|
|
|
|
* it outside of the @testmode_cmd operation is invalid.
|
|
|
|
*
|
|
|
|
* The returned skb (or %NULL if any errors happen) is pre-filled
|
|
|
|
* with the wiphy index and set up in a way that any data that is
|
|
|
|
* put into the skb (with skb_put(), nla_put() or similar) will end
|
|
|
|
* up being within the %NL80211_ATTR_TESTDATA attribute, so all that
|
|
|
|
* needs to be done with the skb is adding data for the corresponding
|
|
|
|
* userspace tool which can then read that data out of the testdata
|
|
|
|
* attribute. You must not modify the skb in any other way.
|
|
|
|
*
|
|
|
|
* When done, call cfg80211_testmode_reply() with the skb and return
|
|
|
|
* its error code as the result of the @testmode_cmd operation.
|
|
|
|
*/
|
|
|
|
struct sk_buff *cfg80211_testmode_alloc_reply_skb(struct wiphy *wiphy,
|
|
|
|
int approxlen);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* cfg80211_testmode_reply - send the reply skb
|
|
|
|
* @skb: The skb, must have been allocated with
|
|
|
|
* cfg80211_testmode_alloc_reply_skb()
|
|
|
|
*
|
|
|
|
* Returns an error code or 0 on success, since calling this
|
|
|
|
* function will usually be the last thing before returning
|
|
|
|
* from the @testmode_cmd you should return the error code.
|
|
|
|
* Note that this function consumes the skb regardless of the
|
|
|
|
* return value.
|
|
|
|
*/
|
|
|
|
int cfg80211_testmode_reply(struct sk_buff *skb);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* cfg80211_testmode_alloc_event_skb - allocate testmode event
|
|
|
|
* @wiphy: the wiphy
|
|
|
|
* @approxlen: an upper bound of the length of the data that will
|
|
|
|
* be put into the skb
|
|
|
|
* @gfp: allocation flags
|
|
|
|
*
|
|
|
|
* This function allocates and pre-fills an skb for an event on the
|
|
|
|
* testmode multicast group.
|
|
|
|
*
|
|
|
|
* The returned skb (or %NULL if any errors happen) is set up in the
|
|
|
|
* same way as with cfg80211_testmode_alloc_reply_skb() but prepared
|
|
|
|
* for an event. As there, you should simply add data to it that will
|
|
|
|
* then end up in the %NL80211_ATTR_TESTDATA attribute. Again, you must
|
|
|
|
* not modify the skb in any other way.
|
|
|
|
*
|
|
|
|
* When done filling the skb, call cfg80211_testmode_event() with the
|
|
|
|
* skb to send the event.
|
|
|
|
*/
|
|
|
|
struct sk_buff *cfg80211_testmode_alloc_event_skb(struct wiphy *wiphy,
|
|
|
|
int approxlen, gfp_t gfp);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* cfg80211_testmode_event - send the event
|
|
|
|
* @skb: The skb, must have been allocated with
|
|
|
|
* cfg80211_testmode_alloc_event_skb()
|
|
|
|
* @gfp: allocation flags
|
|
|
|
*
|
|
|
|
* This function sends the given @skb, which must have been allocated
|
|
|
|
* by cfg80211_testmode_alloc_event_skb(), as an event. It always
|
|
|
|
* consumes it.
|
|
|
|
*/
|
|
|
|
void cfg80211_testmode_event(struct sk_buff *skb, gfp_t gfp);
|
|
|
|
|
|
|
|
#define CFG80211_TESTMODE_CMD(cmd) .testmode_cmd = (cmd),
|
2011-05-21 00:05:54 +08:00
|
|
|
#define CFG80211_TESTMODE_DUMP(cmd) .testmode_dump = (cmd),
|
2009-07-02 03:26:51 +08:00
|
|
|
#else
|
|
|
|
#define CFG80211_TESTMODE_CMD(cmd)
|
2011-05-21 00:05:54 +08:00
|
|
|
#define CFG80211_TESTMODE_DUMP(cmd)
|
2009-07-02 03:26:51 +08:00
|
|
|
#endif
|
|
|
|
|
2009-07-02 03:26:54 +08:00
|
|
|
/**
|
|
|
|
* cfg80211_connect_result - notify cfg80211 of connection result
|
|
|
|
*
|
|
|
|
* @dev: network device
|
|
|
|
* @bssid: the BSSID of the AP
|
|
|
|
* @req_ie: association request IEs (maybe be %NULL)
|
|
|
|
* @req_ie_len: association request IEs length
|
|
|
|
* @resp_ie: association response IEs (may be %NULL)
|
|
|
|
* @resp_ie_len: assoc response IEs length
|
|
|
|
* @status: status code, 0 for successful connection, use
|
|
|
|
* %WLAN_STATUS_UNSPECIFIED_FAILURE if your device cannot give you
|
|
|
|
* the real status code for failures.
|
|
|
|
* @gfp: allocation flags
|
|
|
|
*
|
|
|
|
* It should be called by the underlying driver whenever connect() has
|
|
|
|
* succeeded.
|
|
|
|
*/
|
|
|
|
void cfg80211_connect_result(struct net_device *dev, const u8 *bssid,
|
|
|
|
const u8 *req_ie, size_t req_ie_len,
|
|
|
|
const u8 *resp_ie, size_t resp_ie_len,
|
|
|
|
u16 status, gfp_t gfp);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* cfg80211_roamed - notify cfg80211 of roaming
|
|
|
|
*
|
|
|
|
* @dev: network device
|
2011-05-17 00:40:15 +08:00
|
|
|
* @channel: the channel of the new AP
|
2009-07-02 03:26:54 +08:00
|
|
|
* @bssid: the BSSID of the new AP
|
|
|
|
* @req_ie: association request IEs (maybe be %NULL)
|
|
|
|
* @req_ie_len: association request IEs length
|
|
|
|
* @resp_ie: association response IEs (may be %NULL)
|
|
|
|
* @resp_ie_len: assoc response IEs length
|
|
|
|
* @gfp: allocation flags
|
|
|
|
*
|
|
|
|
* It should be called by the underlying driver whenever it roamed
|
|
|
|
* from one AP to another while connected.
|
|
|
|
*/
|
2011-05-17 00:40:15 +08:00
|
|
|
void cfg80211_roamed(struct net_device *dev,
|
|
|
|
struct ieee80211_channel *channel,
|
|
|
|
const u8 *bssid,
|
2009-07-02 03:26:54 +08:00
|
|
|
const u8 *req_ie, size_t req_ie_len,
|
|
|
|
const u8 *resp_ie, size_t resp_ie_len, gfp_t gfp);
|
|
|
|
|
2011-12-08 16:58:47 +08:00
|
|
|
/**
|
|
|
|
* cfg80211_roamed_bss - notify cfg80211 of roaming
|
|
|
|
*
|
|
|
|
* @dev: network device
|
|
|
|
* @bss: entry of bss to which STA got roamed
|
|
|
|
* @req_ie: association request IEs (maybe be %NULL)
|
|
|
|
* @req_ie_len: association request IEs length
|
|
|
|
* @resp_ie: association response IEs (may be %NULL)
|
|
|
|
* @resp_ie_len: assoc response IEs length
|
|
|
|
* @gfp: allocation flags
|
|
|
|
*
|
|
|
|
* This is just a wrapper to notify cfg80211 of roaming event with driver
|
|
|
|
* passing bss to avoid a race in timeout of the bss entry. It should be
|
|
|
|
* called by the underlying driver whenever it roamed from one AP to another
|
|
|
|
* while connected. Drivers which have roaming implemented in firmware
|
|
|
|
* may use this function to avoid a race in bss entry timeout where the bss
|
|
|
|
* entry of the new AP is seen in the driver, but gets timed out by the time
|
|
|
|
* it is accessed in __cfg80211_roamed() due to delay in scheduling
|
|
|
|
* rdev->event_work. In case of any failures, the reference is released
|
|
|
|
* either in cfg80211_roamed_bss() or in __cfg80211_romed(), Otherwise,
|
|
|
|
* it will be released while diconneting from the current bss.
|
|
|
|
*/
|
|
|
|
void cfg80211_roamed_bss(struct net_device *dev, struct cfg80211_bss *bss,
|
|
|
|
const u8 *req_ie, size_t req_ie_len,
|
|
|
|
const u8 *resp_ie, size_t resp_ie_len, gfp_t gfp);
|
|
|
|
|
2009-07-02 03:26:54 +08:00
|
|
|
/**
|
|
|
|
* cfg80211_disconnected - notify cfg80211 that connection was dropped
|
|
|
|
*
|
|
|
|
* @dev: network device
|
|
|
|
* @ie: information elements of the deauth/disassoc frame (may be %NULL)
|
|
|
|
* @ie_len: length of IEs
|
|
|
|
* @reason: reason code for the disconnection, set it to 0 if unknown
|
|
|
|
* @gfp: allocation flags
|
|
|
|
*
|
|
|
|
* After it calls this function, the driver should enter an idle state
|
|
|
|
* and not try to connect to any AP any more.
|
|
|
|
*/
|
|
|
|
void cfg80211_disconnected(struct net_device *dev, u16 reason,
|
|
|
|
u8 *ie, size_t ie_len, gfp_t gfp);
|
|
|
|
|
2009-12-23 20:15:41 +08:00
|
|
|
/**
|
|
|
|
* cfg80211_ready_on_channel - notification of remain_on_channel start
|
|
|
|
* @dev: network device
|
|
|
|
* @cookie: the request cookie
|
|
|
|
* @chan: The current channel (from remain_on_channel request)
|
|
|
|
* @channel_type: Channel type
|
|
|
|
* @duration: Duration in milliseconds that the driver intents to remain on the
|
|
|
|
* channel
|
|
|
|
* @gfp: allocation flags
|
|
|
|
*/
|
|
|
|
void cfg80211_ready_on_channel(struct net_device *dev, u64 cookie,
|
|
|
|
struct ieee80211_channel *chan,
|
|
|
|
enum nl80211_channel_type channel_type,
|
|
|
|
unsigned int duration, gfp_t gfp);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* cfg80211_remain_on_channel_expired - remain_on_channel duration expired
|
|
|
|
* @dev: network device
|
|
|
|
* @cookie: the request cookie
|
|
|
|
* @chan: The current channel (from remain_on_channel request)
|
|
|
|
* @channel_type: Channel type
|
|
|
|
* @gfp: allocation flags
|
|
|
|
*/
|
|
|
|
void cfg80211_remain_on_channel_expired(struct net_device *dev,
|
|
|
|
u64 cookie,
|
|
|
|
struct ieee80211_channel *chan,
|
|
|
|
enum nl80211_channel_type channel_type,
|
|
|
|
gfp_t gfp);
|
2009-07-02 03:26:54 +08:00
|
|
|
|
2009-12-23 20:15:44 +08:00
|
|
|
|
|
|
|
/**
|
|
|
|
* cfg80211_new_sta - notify userspace about station
|
|
|
|
*
|
|
|
|
* @dev: the netdev
|
|
|
|
* @mac_addr: the station's address
|
|
|
|
* @sinfo: the station information
|
|
|
|
* @gfp: allocation flags
|
|
|
|
*/
|
|
|
|
void cfg80211_new_sta(struct net_device *dev, const u8 *mac_addr,
|
|
|
|
struct station_info *sinfo, gfp_t gfp);
|
|
|
|
|
2011-03-23 21:29:52 +08:00
|
|
|
/**
|
|
|
|
* cfg80211_del_sta - notify userspace about deletion of a station
|
|
|
|
*
|
|
|
|
* @dev: the netdev
|
|
|
|
* @mac_addr: the station's address
|
|
|
|
* @gfp: allocation flags
|
|
|
|
*/
|
|
|
|
void cfg80211_del_sta(struct net_device *dev, const u8 *mac_addr, gfp_t gfp);
|
|
|
|
|
2010-02-15 18:53:10 +08:00
|
|
|
/**
|
2010-08-12 21:38:38 +08:00
|
|
|
* cfg80211_rx_mgmt - notification of received, unprocessed management frame
|
2010-02-15 18:53:10 +08:00
|
|
|
* @dev: network device
|
|
|
|
* @freq: Frequency on which the frame was received in MHz
|
2010-08-12 21:38:38 +08:00
|
|
|
* @buf: Management frame (header + body)
|
2010-02-15 18:53:10 +08:00
|
|
|
* @len: length of the frame data
|
|
|
|
* @gfp: context flags
|
2010-08-12 21:38:38 +08:00
|
|
|
*
|
|
|
|
* Returns %true if a user space application has registered for this frame.
|
|
|
|
* For action frames, that makes it responsible for rejecting unrecognized
|
|
|
|
* action frames; %false otherwise, in which case for action frames the
|
|
|
|
* driver is responsible for rejecting the frame.
|
2010-02-15 18:53:10 +08:00
|
|
|
*
|
|
|
|
* This function is called whenever an Action frame is received for a station
|
|
|
|
* mode interface, but is not processed in kernel.
|
|
|
|
*/
|
2010-08-12 21:38:38 +08:00
|
|
|
bool cfg80211_rx_mgmt(struct net_device *dev, int freq, const u8 *buf,
|
|
|
|
size_t len, gfp_t gfp);
|
2010-02-15 18:53:10 +08:00
|
|
|
|
|
|
|
/**
|
2010-08-12 21:38:38 +08:00
|
|
|
* cfg80211_mgmt_tx_status - notification of TX status for management frame
|
2010-02-15 18:53:10 +08:00
|
|
|
* @dev: network device
|
2010-08-12 21:38:38 +08:00
|
|
|
* @cookie: Cookie returned by cfg80211_ops::mgmt_tx()
|
|
|
|
* @buf: Management frame (header + body)
|
2010-02-15 18:53:10 +08:00
|
|
|
* @len: length of the frame data
|
|
|
|
* @ack: Whether frame was acknowledged
|
|
|
|
* @gfp: context flags
|
|
|
|
*
|
2010-08-12 21:38:38 +08:00
|
|
|
* This function is called whenever a management frame was requested to be
|
|
|
|
* transmitted with cfg80211_ops::mgmt_tx() to report the TX status of the
|
2010-02-15 18:53:10 +08:00
|
|
|
* transmission attempt.
|
|
|
|
*/
|
2010-08-12 21:38:38 +08:00
|
|
|
void cfg80211_mgmt_tx_status(struct net_device *dev, u64 cookie,
|
|
|
|
const u8 *buf, size_t len, bool ack, gfp_t gfp);
|
2010-02-15 18:53:10 +08:00
|
|
|
|
2010-03-23 15:02:33 +08:00
|
|
|
|
|
|
|
/**
|
|
|
|
* cfg80211_cqm_rssi_notify - connection quality monitoring rssi event
|
|
|
|
* @dev: network device
|
|
|
|
* @rssi_event: the triggered RSSI event
|
|
|
|
* @gfp: context flags
|
|
|
|
*
|
|
|
|
* This function is called when a configured connection quality monitoring
|
|
|
|
* rssi threshold reached event occurs.
|
|
|
|
*/
|
|
|
|
void cfg80211_cqm_rssi_notify(struct net_device *dev,
|
|
|
|
enum nl80211_cqm_rssi_threshold_event rssi_event,
|
|
|
|
gfp_t gfp);
|
|
|
|
|
2010-11-24 15:10:05 +08:00
|
|
|
/**
|
|
|
|
* cfg80211_cqm_pktloss_notify - notify userspace about packetloss to peer
|
|
|
|
* @dev: network device
|
|
|
|
* @peer: peer's MAC address
|
|
|
|
* @num_packets: how many packets were lost -- should be a fixed threshold
|
|
|
|
* but probably no less than maybe 50, or maybe a throughput dependent
|
|
|
|
* threshold (to account for temporary interference)
|
|
|
|
* @gfp: context flags
|
|
|
|
*/
|
|
|
|
void cfg80211_cqm_pktloss_notify(struct net_device *dev,
|
|
|
|
const u8 *peer, u32 num_packets, gfp_t gfp);
|
|
|
|
|
2011-07-05 22:35:40 +08:00
|
|
|
/**
|
|
|
|
* cfg80211_gtk_rekey_notify - notify userspace about driver rekeying
|
|
|
|
* @dev: network device
|
|
|
|
* @bssid: BSSID of AP (to avoid races)
|
|
|
|
* @replay_ctr: new replay counter
|
2011-07-09 20:48:30 +08:00
|
|
|
* @gfp: allocation flags
|
2011-07-05 22:35:40 +08:00
|
|
|
*/
|
|
|
|
void cfg80211_gtk_rekey_notify(struct net_device *dev, const u8 *bssid,
|
|
|
|
const u8 *replay_ctr, gfp_t gfp);
|
|
|
|
|
2011-09-16 23:56:23 +08:00
|
|
|
/**
|
|
|
|
* cfg80211_pmksa_candidate_notify - notify about PMKSA caching candidate
|
|
|
|
* @dev: network device
|
|
|
|
* @index: candidate index (the smaller the index, the higher the priority)
|
|
|
|
* @bssid: BSSID of AP
|
|
|
|
* @preauth: Whether AP advertises support for RSN pre-authentication
|
|
|
|
* @gfp: allocation flags
|
|
|
|
*/
|
|
|
|
void cfg80211_pmksa_candidate_notify(struct net_device *dev, int index,
|
|
|
|
const u8 *bssid, bool preauth, gfp_t gfp);
|
|
|
|
|
2011-11-04 18:18:12 +08:00
|
|
|
/**
|
|
|
|
* cfg80211_rx_spurious_frame - inform userspace about a spurious frame
|
|
|
|
* @dev: The device the frame matched to
|
|
|
|
* @addr: the transmitter address
|
|
|
|
* @gfp: context flags
|
|
|
|
*
|
|
|
|
* This function is used in AP mode (only!) to inform userspace that
|
|
|
|
* a spurious class 3 frame was received, to be able to deauth the
|
|
|
|
* sender.
|
|
|
|
* Returns %true if the frame was passed to userspace (or this failed
|
|
|
|
* for a reason other than not having a subscription.)
|
|
|
|
*/
|
|
|
|
bool cfg80211_rx_spurious_frame(struct net_device *dev,
|
|
|
|
const u8 *addr, gfp_t gfp);
|
|
|
|
|
2011-11-04 18:18:19 +08:00
|
|
|
/**
|
|
|
|
* cfg80211_rx_unexpected_4addr_frame - inform about unexpected WDS frame
|
|
|
|
* @dev: The device the frame matched to
|
|
|
|
* @addr: the transmitter address
|
|
|
|
* @gfp: context flags
|
|
|
|
*
|
|
|
|
* This function is used in AP mode (only!) to inform userspace that
|
|
|
|
* an associated station sent a 4addr frame but that wasn't expected.
|
|
|
|
* It is allowed and desirable to send this event only once for each
|
|
|
|
* station to avoid event flooding.
|
|
|
|
* Returns %true if the frame was passed to userspace (or this failed
|
|
|
|
* for a reason other than not having a subscription.)
|
|
|
|
*/
|
|
|
|
bool cfg80211_rx_unexpected_4addr_frame(struct net_device *dev,
|
|
|
|
const u8 *addr, gfp_t gfp);
|
|
|
|
|
2011-11-04 18:18:15 +08:00
|
|
|
/**
|
|
|
|
* cfg80211_probe_status - notify userspace about probe status
|
|
|
|
* @dev: the device the probe was sent on
|
|
|
|
* @addr: the address of the peer
|
|
|
|
* @cookie: the cookie filled in @probe_client previously
|
|
|
|
* @acked: indicates whether probe was acked or not
|
|
|
|
* @gfp: allocation flags
|
|
|
|
*/
|
|
|
|
void cfg80211_probe_status(struct net_device *dev, const u8 *addr,
|
|
|
|
u64 cookie, bool acked, gfp_t gfp);
|
|
|
|
|
2011-11-04 18:18:17 +08:00
|
|
|
/**
|
|
|
|
* cfg80211_report_obss_beacon - report beacon from other APs
|
|
|
|
* @wiphy: The wiphy that received the beacon
|
|
|
|
* @frame: the frame
|
|
|
|
* @len: length of the frame
|
|
|
|
* @freq: frequency the frame was received on
|
|
|
|
* @gfp: allocation flags
|
|
|
|
*
|
|
|
|
* Use this function to report to userspace when a beacon was
|
|
|
|
* received. It is not useful to call this when there is no
|
|
|
|
* netdev that is in AP/GO mode.
|
|
|
|
*/
|
|
|
|
void cfg80211_report_obss_beacon(struct wiphy *wiphy,
|
|
|
|
const u8 *frame, size_t len,
|
|
|
|
int freq, gfp_t gfp);
|
|
|
|
|
2011-11-30 23:56:32 +08:00
|
|
|
/*
|
|
|
|
* cfg80211_can_beacon_sec_chan - test if ht40 on extension channel can be used
|
|
|
|
* @wiphy: the wiphy
|
|
|
|
* @chan: main channel
|
|
|
|
* @channel_type: HT mode
|
|
|
|
*/
|
|
|
|
int cfg80211_can_beacon_sec_chan(struct wiphy *wiphy,
|
|
|
|
struct ieee80211_channel *chan,
|
|
|
|
enum nl80211_channel_type channel_type);
|
|
|
|
|
2010-07-27 05:39:57 +08:00
|
|
|
/* Logging, debugging and troubleshooting/diagnostic helpers. */
|
|
|
|
|
|
|
|
/* wiphy_printk helpers, similar to dev_printk */
|
|
|
|
|
|
|
|
#define wiphy_printk(level, wiphy, format, args...) \
|
2010-08-21 06:13:59 +08:00
|
|
|
dev_printk(level, &(wiphy)->dev, format, ##args)
|
2010-07-27 05:39:57 +08:00
|
|
|
#define wiphy_emerg(wiphy, format, args...) \
|
2010-08-21 06:13:59 +08:00
|
|
|
dev_emerg(&(wiphy)->dev, format, ##args)
|
2010-07-27 05:39:57 +08:00
|
|
|
#define wiphy_alert(wiphy, format, args...) \
|
2010-08-21 06:13:59 +08:00
|
|
|
dev_alert(&(wiphy)->dev, format, ##args)
|
2010-07-27 05:39:57 +08:00
|
|
|
#define wiphy_crit(wiphy, format, args...) \
|
2010-08-21 06:13:59 +08:00
|
|
|
dev_crit(&(wiphy)->dev, format, ##args)
|
2010-07-27 05:39:57 +08:00
|
|
|
#define wiphy_err(wiphy, format, args...) \
|
2010-08-21 06:13:59 +08:00
|
|
|
dev_err(&(wiphy)->dev, format, ##args)
|
2010-07-27 05:39:57 +08:00
|
|
|
#define wiphy_warn(wiphy, format, args...) \
|
2010-08-21 06:13:59 +08:00
|
|
|
dev_warn(&(wiphy)->dev, format, ##args)
|
2010-07-27 05:39:57 +08:00
|
|
|
#define wiphy_notice(wiphy, format, args...) \
|
2010-08-21 06:13:59 +08:00
|
|
|
dev_notice(&(wiphy)->dev, format, ##args)
|
2010-07-27 05:39:57 +08:00
|
|
|
#define wiphy_info(wiphy, format, args...) \
|
2010-08-21 06:13:59 +08:00
|
|
|
dev_info(&(wiphy)->dev, format, ##args)
|
2010-07-27 05:40:00 +08:00
|
|
|
|
2010-08-21 06:13:59 +08:00
|
|
|
#define wiphy_debug(wiphy, format, args...) \
|
2010-07-27 05:39:57 +08:00
|
|
|
wiphy_printk(KERN_DEBUG, wiphy, format, ##args)
|
2010-08-21 06:13:59 +08:00
|
|
|
|
2010-07-27 05:39:57 +08:00
|
|
|
#define wiphy_dbg(wiphy, format, args...) \
|
2010-08-21 06:13:59 +08:00
|
|
|
dev_dbg(&(wiphy)->dev, format, ##args)
|
2010-07-27 05:39:57 +08:00
|
|
|
|
|
|
|
#if defined(VERBOSE_DEBUG)
|
|
|
|
#define wiphy_vdbg wiphy_dbg
|
|
|
|
#else
|
|
|
|
#define wiphy_vdbg(wiphy, format, args...) \
|
|
|
|
({ \
|
|
|
|
if (0) \
|
|
|
|
wiphy_printk(KERN_DEBUG, wiphy, format, ##args); \
|
2010-08-21 06:13:59 +08:00
|
|
|
0; \
|
2010-07-27 05:39:57 +08:00
|
|
|
})
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/*
|
|
|
|
* wiphy_WARN() acts like wiphy_printk(), but with the key difference
|
|
|
|
* of using a WARN/WARN_ON to get the message out, including the
|
|
|
|
* file/line information and a backtrace.
|
|
|
|
*/
|
|
|
|
#define wiphy_WARN(wiphy, format, args...) \
|
|
|
|
WARN(1, "wiphy: %s\n" format, wiphy_name(wiphy), ##args);
|
|
|
|
|
2007-04-24 03:20:05 +08:00
|
|
|
#endif /* __NET_CFG80211_H */
|