pmksa_cache_clear_current - Clear the current PMKSA entry selection @sm: Pointer to WPA state machine data from wpa_sm_init()
wpa_sm_set_ft_params - Set FT (IEEE 802.11r) parameters @sm: Pointer to WPA state machine data from wpa_sm_init() @ies: Association Response IEs or %NULL to clear FT parameters @ies_len: Length of ies buffer in octets Returns: 0 on success, -1 on failure
wpa_sm_set_pmk_from_pmksa - Set PMK based on the current PMKSA @sm: Pointer to WPA state machine data from wpa_sm_init() Take the PMK from the current PMKSA into use. If no PMKSA is active, the PMK will be cleared.
wpa_eapol_key_send - Send WPA/RSN EAPOL-Key message @sm: Pointer to WPA state machine data from wpa_sm_init() @kck: Key Confirmation Key (KCK, part of PTK) @kck_len: KCK length in octets @ver: Version field from Key Info @dest: Destination address for the frame @proto: Ethertype (usually ETH_P_EAPOL) @msg: EAPOL-Key message @msg_len: Length of message @key_mic: Pointer to the buffer to which the EAPOL-Key MIC is written
set_key - Configure encryption key @ifname: Interface name (for multi-SSID/VLAN support) @priv: private driver interface data @alg: encryption algorithm (%WPA_ALG_NONE, %WPA_ALG_WEP, %WPA_ALG_TKIP, %WPA_ALG_CCMP, %WPA_ALG_IGTK, %WPA_ALG_PMK); %WPA_ALG_NONE clears the key. @addr: address of the peer STA or ff:ff:ff:ff:ff:ff for broadcast/default keys @key_idx: key index (0..3), usually 0 for unicast keys; 0..4095 for IGTK @set_tx: configure this key as the default Tx key (only used when driver does not support separate unicast/individual key @seq: sequence number/packet number, seq_len octets, the next packet number to be used for in replay protection; configured for Rx keys (in most cases, this is only used with broadcast keys and set to zero for unicast keys) @seq_len: length of the seq, depends on the algorithm: TKIP: 6 octets, CCMP: 6 octets, IGTK: 6 octets @key: key buffer; TKIP: 16-byte temporal key, 8-byte Tx Mic key, 8-byte Rx Mic Key @key_len: length of the key buffer in octets (WEP: 5 or 13, TKIP: 32, CCMP: 16, IGTK: 16) Returns: 0 on success, -1 on failure Configure the given key for the kernel driver. If the driver supports separate individual keys (4 default keys + 1 individual), addr can be used to determine whether the key is default or individual. If only 4 keys are supported, the default key with key index 0 is used as the individual key. STA must be configured to use it as the default Tx key (set_tx is set) and accept Rx for all the key indexes. In most cases, WPA uses only key indexes 1 and 2 for broadcast keys, so key index 0 is available for this kind of configuration. Please note that TKIP keys include separate TX and RX MIC keys and some drivers may expect them in different order than wpa_supplicant is using. If the TX/RX keys are swapped, all TKIP encrypted packets will tricker Michael MIC errors. This can be fixed by changing the order of MIC keys by swapping te bytes 16..23 and 24..31 of the key in driver_*.c set_key() implementation, see driver_ndis.c for an example on how this can be done.
mlme_setprotection - MLME-SETPROTECTION.request primitive @priv: Private driver interface data @addr: Address of the station for which to set protection (may be %NULL for group keys) @protect_type: MLME_SETPROTECTION_PROTECT_TYPE_* @key_type: MLME_SETPROTECTION_KEY_TYPE_* Returns: 0 on success, -1 on failure This is an optional function that can be used to set the driver to require protection for Tx and/or Rx frames. This uses the layer interface defined in IEEE 802.11i-2004 clause 10.3.22.1 (MLME-SETPROTECTION.request). Many drivers do not use explicit set protection operation; instead, they set protection implicitly based on configured keys.
pmksa_cache_get_current - Get the current used PMKSA entry @sm: Pointer to WPA state machine data from wpa_sm_init() Returns: Pointer to the current PMKSA cache entry or %NULL if not available
pmksa_cache_set_current - Set the current PMKSA entry selection @sm: Pointer to WPA state machine data from wpa_sm_init() @pmkid: PMKID for selecting PMKSA or %NULL if not used @bssid: BSSID for PMKSA or %NULL if not used @network_ctx: Network configuration context @try_opportunistic: Whether to allow opportunistic PMKSA caching Returns: 0 if PMKSA was found or -1 if no matching entry was found
wpa_sm_key_request - Send EAPOL-Key Request @sm: Pointer to WPA state machine data from wpa_sm_init() @error: Indicate whether this is an Michael MIC error report @pairwise: 1 = error report for pairwise packet, 0 = for group packet Send an EAPOL-Key Request to the current authenticator. This function is used to request rekeying and it is usually called when a local Michael MIC failure is detected.
wpa_ft_prepare_auth_request - Generate over-the-air auth request @sm: Pointer to WPA state machine data from wpa_sm_init() @mdie: Target AP MDIE Returns: 0 on success, -1 on failure
wpa_ft_gen_req_ies - Generate FT (IEEE 802.11r) IEs for Auth/ReAssoc Request @sm: Pointer to WPA state machine data from wpa_sm_init() @len: Buffer for returning the length of the IEs @anonce: ANonce or %NULL if not yet available @pmk_name: PMKR0Name or PMKR1Name to be added into the RSN IE PMKID List @kck: 128-bit KCK for MIC or %NULL if no MIC is used @kck_len: KCK length in octet @target_ap: Target AP address @ric_ies: Optional IE(s), e.g., WMM TSPEC(s), for RIC-Request or %NULL @ric_ies_len: Length of ric_ies buffer in octets @ap_mdie: Mobility Domain IE from the target AP Returns: Pointer to buffer with IEs or %NULL on failure Caller is responsible for freeing the returned buffer with os_free();
wpa_sm_notify_assoc - Notify WPA state machine about association @sm: Pointer to WPA state machine data from wpa_sm_init() @bssid: The BSSID of the new association This function is called to let WPA state machine know that the connection was established.
wpa_sm_notify_disassoc - Notify WPA state machine about disassociation @sm: Pointer to WPA state machine data from wpa_sm_init() This function is called to let WPA state machine know that the connection was lost. This will abort any existing pre-authentication session.
wpa_supplicant_disassociate - Disassociate the current connection @wpa_s: Pointer to wpa_supplicant data @reason_code: IEEE 802.11 reason code for the disassociate frame This function is used to request %wpa_supplicant to disassociate with the current AP.
pmksa_cache_init - Initialize PMKSA cache @free_cb: Callback function to be called when a PMKSA cache entry is freed @ctx: Context pointer for free_cb function @sm: Pointer to WPA state machine data from wpa_sm_init() Returns: Pointer to PMKSA cache data or %NULL on failure
wpa_gen_wpa_ie - Generate WPA/RSN IE based on current security policy @sm: Pointer to WPA state machine data from wpa_sm_init() @wpa_ie: Pointer to memory area for the generated WPA/RSN IE @wpa_ie_len: Maximum length of the generated WPA/RSN IE Returns: Length of the generated WPA/RSN IE or -1 on failure
wpa_supplicant_send_2_of_4 - Send message 2 of WPA/RSN 4-Way Handshake @sm: Pointer to WPA state machine data from wpa_sm_init() @dst: Destination address for the frame @key: Pointer to the EAPOL-Key frame header @ver: Version bits from EAPOL-Key Key Info @nonce: Nonce value for the EAPOL-Key frame @wpa_ie: WPA/RSN IE @wpa_ie_len: Length of the WPA/RSN IE @ptk: PTK to use for keyed hash and encryption Returns: 0 on success, -1 on failure
wpa_supplicant_send_4_of_4 - Send message 4 of WPA/RSN 4-Way Handshake @sm: Pointer to WPA state machine data from wpa_sm_init() @dst: Destination address for the frame @key: Pointer to the EAPOL-Key frame header @ver: Version bits from EAPOL-Key Key Info @key_info: Key Info @ptk: PTK to use for keyed hash and encryption Returns: 0 on success, -1 on failure
wpa_ft_start_over_ds - Generate over-the-DS auth request @sm: Pointer to WPA state machine data from wpa_sm_init() @target_ap: Target AP Address @mdie: Mobility Domain IE from the target AP Returns: 0 on success, -1 on failure
wpa_sm_set_pmk - Set PMK @sm: Pointer to WPA state machine data from wpa_sm_init() @pmk: The new PMK @pmk_len: The length of the new PMK in bytes @bssid: AA to add into PMKSA cache or %NULL to not cache the PMK Configure the PMK for WPA state machine.