pmksa_cache_clear_current - Clear the current PMKSA entry selection @sm: Pointer to WPA state machine data from wpa_sm_init()
wpa_sm_set_ft_params - Set FT (IEEE 802.11r) parameters @sm: Pointer to WPA state machine data from wpa_sm_init() @ies: Association Response IEs or %NULL to clear FT parameters @ies_len: Length of ies buffer in octets Returns: 0 on success, -1 on failure
wpa_sm_set_pmk_from_pmksa - Set PMK based on the current PMKSA @sm: Pointer to WPA state machine data from wpa_sm_init() Take the PMK from the current PMKSA into use. If no PMKSA is active, the PMK will be cleared.
wpa_eapol_key_send - Send WPA/RSN EAPOL-Key message @sm: Pointer to WPA state machine data from wpa_sm_init() @kck: Key Confirmation Key (KCK, part of PTK) @kck_len: KCK length in octets @ver: Version field from Key Info @dest: Destination address for the frame @proto: Ethertype (usually ETH_P_EAPOL) @msg: EAPOL-Key message @msg_len: Length of message @key_mic: Pointer to the buffer to which the EAPOL-Key MIC is written
mlme_setprotection - MLME-SETPROTECTION.request primitive @priv: Private driver interface data @addr: Address of the station for which to set protection (may be %NULL for group keys) @protect_type: MLME_SETPROTECTION_PROTECT_TYPE_* @key_type: MLME_SETPROTECTION_KEY_TYPE_* Returns: 0 on success, -1 on failure This is an optional function that can be used to set the driver to require protection for Tx and/or Rx frames. This uses the layer interface defined in IEEE 802.11i-2004 clause 10.3.22.1 (MLME-SETPROTECTION.request). Many drivers do not use explicit set protection operation; instead, they set protection implicitly based on configured keys.
pmksa_cache_get_current - Get the current used PMKSA entry @sm: Pointer to WPA state machine data from wpa_sm_init() Returns: Pointer to the current PMKSA cache entry or %NULL if not available
pmksa_cache_set_current - Set the current PMKSA entry selection @sm: Pointer to WPA state machine data from wpa_sm_init() @pmkid: PMKID for selecting PMKSA or %NULL if not used @bssid: BSSID for PMKSA or %NULL if not used @network_ctx: Network configuration context @try_opportunistic: Whether to allow opportunistic PMKSA caching Returns: 0 if PMKSA was found or -1 if no matching entry was found
wpa_sm_key_request - Send EAPOL-Key Request @sm: Pointer to WPA state machine data from wpa_sm_init() @error: Indicate whether this is an Michael MIC error report @pairwise: 1 = error report for pairwise packet, 0 = for group packet Send an EAPOL-Key Request to the current authenticator. This function is used to request rekeying and it is usually called when a local Michael MIC failure is detected.
wpa_ft_prepare_auth_request - Generate over-the-air auth request @sm: Pointer to WPA state machine data from wpa_sm_init() @mdie: Target AP MDIE Returns: 0 on success, -1 on failure
wpa_ft_gen_req_ies - Generate FT (IEEE 802.11r) IEs for Auth/ReAssoc Request @sm: Pointer to WPA state machine data from wpa_sm_init() @len: Buffer for returning the length of the IEs @anonce: ANonce or %NULL if not yet available @pmk_name: PMKR0Name or PMKR1Name to be added into the RSN IE PMKID List @kck: 128-bit KCK for MIC or %NULL if no MIC is used @kck_len: KCK length in octet @target_ap: Target AP address @ric_ies: Optional IE(s), e.g., WMM TSPEC(s), for RIC-Request or %NULL @ric_ies_len: Length of ric_ies buffer in octets @ap_mdie: Mobility Domain IE from the target AP Returns: Pointer to buffer with IEs or %NULL on failure Caller is responsible for freeing the returned buffer with os_free();
wpa_sm_notify_assoc - Notify WPA state machine about association @sm: Pointer to WPA state machine data from wpa_sm_init() @bssid: The BSSID of the new association This function is called to let WPA state machine know that the connection was established.
wpa_sm_notify_disassoc - Notify WPA state machine about disassociation @sm: Pointer to WPA state machine data from wpa_sm_init() This function is called to let WPA state machine know that the connection was lost. This will abort any existing pre-authentication session.
wpa_supplicant_disassociate - Disassociate the current connection @wpa_s: Pointer to wpa_supplicant data @reason_code: IEEE 802.11 reason code for the disassociate frame This function is used to request %wpa_supplicant to disassociate with the current AP.
pmksa_cache_init - Initialize PMKSA cache @free_cb: Callback function to be called when a PMKSA cache entry is freed @ctx: Context pointer for free_cb function @sm: Pointer to WPA state machine data from wpa_sm_init() Returns: Pointer to PMKSA cache data or %NULL on failure
wpa_gen_wpa_ie - Generate WPA/RSN IE based on current security policy @sm: Pointer to WPA state machine data from wpa_sm_init() @wpa_ie: Pointer to memory area for the generated WPA/RSN IE @wpa_ie_len: Maximum length of the generated WPA/RSN IE Returns: Length of the generated WPA/RSN IE or -1 on failure
wpa_supplicant_send_2_of_4 - Send message 2 of WPA/RSN 4-Way Handshake @sm: Pointer to WPA state machine data from wpa_sm_init() @dst: Destination address for the frame @key: Pointer to the EAPOL-Key frame header @ver: Version bits from EAPOL-Key Key Info @nonce: Nonce value for the EAPOL-Key frame @wpa_ie: WPA/RSN IE @wpa_ie_len: Length of the WPA/RSN IE @ptk: PTK to use for keyed hash and encryption Returns: 0 on success, -1 on failure
wpa_supplicant_send_4_of_4 - Send message 4 of WPA/RSN 4-Way Handshake @sm: Pointer to WPA state machine data from wpa_sm_init() @dst: Destination address for the frame @key: Pointer to the EAPOL-Key frame header @ver: Version bits from EAPOL-Key Key Info @key_info: Key Info @ptk: PTK to use for keyed hash and encryption Returns: 0 on success, -1 on failure
wpa_ft_start_over_ds - Generate over-the-DS auth request @sm: Pointer to WPA state machine data from wpa_sm_init() @target_ap: Target AP Address @mdie: Mobility Domain IE from the target AP Returns: 0 on success, -1 on failure
wpa_sm_set_pmk - Set PMK @sm: Pointer to WPA state machine data from wpa_sm_init() @pmk: The new PMK @pmk_len: The length of the new PMK in bytes @bssid: AA to add into PMKSA cache or %NULL to not cache the PMK Configure the PMK for WPA state machine.