2008-02-27 20:34:43 -05:00
|
|
|
/*
|
|
|
|
* wpa_supplicant - WPA definitions
|
|
|
|
* Copyright (c) 2003-2007, Jouni Malinen <j@w1.fi>
|
|
|
|
*
|
2012-02-11 09:46:35 -05:00
|
|
|
* This software may be distributed under the terms of the BSD license.
|
|
|
|
* See README for more details.
|
2008-02-27 20:34:43 -05:00
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef WPA_H
|
|
|
|
#define WPA_H
|
|
|
|
|
2009-11-29 10:51:55 -05:00
|
|
|
#include "common/defs.h"
|
|
|
|
#include "common/eapol_common.h"
|
|
|
|
#include "common/wpa_common.h"
|
2013-02-05 09:41:01 -05:00
|
|
|
#include "common/ieee802_11_defs.h"
|
2008-02-27 20:34:43 -05:00
|
|
|
|
|
|
|
struct wpa_sm;
|
|
|
|
struct eapol_sm;
|
|
|
|
struct wpa_config_blob;
|
|
|
|
|
|
|
|
struct wpa_sm_ctx {
|
|
|
|
void *ctx; /* pointer to arbitrary upper level context */
|
2009-01-17 10:54:40 -05:00
|
|
|
void *msg_ctx; /* upper level context for wpa_msg() calls */
|
2008-02-27 20:34:43 -05:00
|
|
|
|
2009-12-26 03:35:08 -05:00
|
|
|
void (*set_state)(void *ctx, enum wpa_states state);
|
|
|
|
enum wpa_states (*get_state)(void *ctx);
|
2008-02-27 20:34:43 -05:00
|
|
|
void (*deauthenticate)(void * ctx, int reason_code);
|
2009-12-26 03:35:08 -05:00
|
|
|
int (*set_key)(void *ctx, enum wpa_alg alg,
|
2008-02-27 20:34:43 -05:00
|
|
|
const u8 *addr, int key_idx, int set_tx,
|
|
|
|
const u8 *seq, size_t seq_len,
|
|
|
|
const u8 *key, size_t key_len);
|
|
|
|
void * (*get_network_ctx)(void *ctx);
|
|
|
|
int (*get_bssid)(void *ctx, u8 *bssid);
|
|
|
|
int (*ether_send)(void *ctx, const u8 *dest, u16 proto, const u8 *buf,
|
|
|
|
size_t len);
|
|
|
|
int (*get_beacon_ie)(void *ctx);
|
|
|
|
void (*cancel_auth_timeout)(void *ctx);
|
|
|
|
u8 * (*alloc_eapol)(void *ctx, u8 type, const void *data, u16 data_len,
|
|
|
|
size_t *msg_len, void **data_pos);
|
|
|
|
int (*add_pmkid)(void *ctx, const u8 *bssid, const u8 *pmkid);
|
|
|
|
int (*remove_pmkid)(void *ctx, const u8 *bssid, const u8 *pmkid);
|
|
|
|
void (*set_config_blob)(void *ctx, struct wpa_config_blob *blob);
|
|
|
|
const struct wpa_config_blob * (*get_config_blob)(void *ctx,
|
|
|
|
const char *name);
|
|
|
|
int (*mlme_setprotection)(void *ctx, const u8 *addr,
|
|
|
|
int protection_type, int key_type);
|
|
|
|
int (*update_ft_ies)(void *ctx, const u8 *md, const u8 *ies,
|
|
|
|
size_t ies_len);
|
|
|
|
int (*send_ft_action)(void *ctx, u8 action, const u8 *target_ap,
|
|
|
|
const u8 *ies, size_t ies_len);
|
2010-03-13 11:28:15 -05:00
|
|
|
int (*mark_authenticated)(void *ctx, const u8 *target_ap);
|
2010-10-07 03:26:56 -04:00
|
|
|
#ifdef CONFIG_TDLS
|
2011-09-26 06:55:25 -04:00
|
|
|
int (*tdls_get_capa)(void *ctx, int *tdls_supported,
|
|
|
|
int *tdls_ext_setup);
|
2010-10-07 03:26:56 -04:00
|
|
|
int (*send_tdls_mgmt)(void *ctx, const u8 *dst,
|
|
|
|
u8 action_code, u8 dialog_token,
|
2014-03-26 12:04:50 -04:00
|
|
|
u16 status_code, u32 peer_capab,
|
|
|
|
const u8 *buf, size_t len);
|
2010-10-07 03:26:56 -04:00
|
|
|
int (*tdls_oper)(void *ctx, int oper, const u8 *peer);
|
2013-05-06 08:47:44 -04:00
|
|
|
int (*tdls_peer_addset)(void *ctx, const u8 *addr, int add, u16 aid,
|
2011-10-23 07:02:57 -04:00
|
|
|
u16 capability, const u8 *supp_rates,
|
2013-02-05 09:41:01 -05:00
|
|
|
size_t supp_rates_len,
|
|
|
|
const struct ieee80211_ht_capabilities *ht_capab,
|
2013-02-25 03:31:50 -05:00
|
|
|
const struct ieee80211_vht_capabilities *vht_capab,
|
2013-02-05 09:50:36 -05:00
|
|
|
u8 qosinfo, const u8 *ext_capab,
|
2014-01-06 08:06:13 -05:00
|
|
|
size_t ext_capab_len, const u8 *supp_channels,
|
|
|
|
size_t supp_channels_len,
|
|
|
|
const u8 *supp_oper_classes,
|
|
|
|
size_t supp_oper_classes_len);
|
2010-10-07 03:26:56 -04:00
|
|
|
#endif /* CONFIG_TDLS */
|
2011-07-12 14:22:51 -04:00
|
|
|
void (*set_rekey_offload)(void *ctx, const u8 *kek, const u8 *kck,
|
|
|
|
const u8 *replay_ctr);
|
2008-02-27 20:34:43 -05:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
enum wpa_sm_conf_params {
|
|
|
|
RSNA_PMK_LIFETIME /* dot11RSNAConfigPMKLifetime */,
|
|
|
|
RSNA_PMK_REAUTH_THRESHOLD /* dot11RSNAConfigPMKReauthThreshold */,
|
|
|
|
RSNA_SA_TIMEOUT /* dot11RSNAConfigSATimeout */,
|
|
|
|
WPA_PARAM_PROTO,
|
|
|
|
WPA_PARAM_PAIRWISE,
|
|
|
|
WPA_PARAM_GROUP,
|
|
|
|
WPA_PARAM_KEY_MGMT,
|
|
|
|
WPA_PARAM_MGMT_GROUP,
|
2010-03-29 13:48:01 -04:00
|
|
|
WPA_PARAM_RSN_ENABLED,
|
|
|
|
WPA_PARAM_MFP
|
2008-02-27 20:34:43 -05:00
|
|
|
};
|
|
|
|
|
|
|
|
struct rsn_supp_config {
|
|
|
|
void *network_ctx;
|
|
|
|
int peerkey_enabled;
|
|
|
|
int allowed_pairwise_cipher; /* bitfield of WPA_CIPHER_* */
|
|
|
|
int proactive_key_caching;
|
|
|
|
int eap_workaround;
|
|
|
|
void *eap_conf_ctx;
|
|
|
|
const u8 *ssid;
|
|
|
|
size_t ssid_len;
|
2008-11-06 12:57:21 -05:00
|
|
|
int wpa_ptk_rekey;
|
2013-03-16 13:13:31 -04:00
|
|
|
int p2p;
|
2008-02-27 20:34:43 -05:00
|
|
|
};
|
|
|
|
|
|
|
|
#ifndef CONFIG_NO_WPA
|
|
|
|
|
|
|
|
struct wpa_sm * wpa_sm_init(struct wpa_sm_ctx *ctx);
|
|
|
|
void wpa_sm_deinit(struct wpa_sm *sm);
|
|
|
|
void wpa_sm_notify_assoc(struct wpa_sm *sm, const u8 *bssid);
|
|
|
|
void wpa_sm_notify_disassoc(struct wpa_sm *sm);
|
|
|
|
void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len);
|
|
|
|
void wpa_sm_set_pmk_from_pmksa(struct wpa_sm *sm);
|
|
|
|
void wpa_sm_set_fast_reauth(struct wpa_sm *sm, int fast_reauth);
|
|
|
|
void wpa_sm_set_scard_ctx(struct wpa_sm *sm, void *scard_ctx);
|
|
|
|
void wpa_sm_set_config(struct wpa_sm *sm, struct rsn_supp_config *config);
|
|
|
|
void wpa_sm_set_own_addr(struct wpa_sm *sm, const u8 *addr);
|
|
|
|
void wpa_sm_set_ifname(struct wpa_sm *sm, const char *ifname,
|
|
|
|
const char *bridge_ifname);
|
|
|
|
void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol);
|
|
|
|
int wpa_sm_set_assoc_wpa_ie(struct wpa_sm *sm, const u8 *ie, size_t len);
|
|
|
|
int wpa_sm_set_assoc_wpa_ie_default(struct wpa_sm *sm, u8 *wpa_ie,
|
|
|
|
size_t *wpa_ie_len);
|
|
|
|
int wpa_sm_set_ap_wpa_ie(struct wpa_sm *sm, const u8 *ie, size_t len);
|
|
|
|
int wpa_sm_set_ap_rsn_ie(struct wpa_sm *sm, const u8 *ie, size_t len);
|
|
|
|
int wpa_sm_get_mib(struct wpa_sm *sm, char *buf, size_t buflen);
|
|
|
|
|
|
|
|
int wpa_sm_set_param(struct wpa_sm *sm, enum wpa_sm_conf_params param,
|
|
|
|
unsigned int value);
|
|
|
|
|
|
|
|
int wpa_sm_get_status(struct wpa_sm *sm, char *buf, size_t buflen,
|
|
|
|
int verbose);
|
2013-04-20 19:48:10 -04:00
|
|
|
int wpa_sm_pmf_enabled(struct wpa_sm *sm);
|
2008-02-27 20:34:43 -05:00
|
|
|
|
|
|
|
void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise);
|
|
|
|
|
|
|
|
int wpa_parse_wpa_ie(const u8 *wpa_ie, size_t wpa_ie_len,
|
|
|
|
struct wpa_ie_data *data);
|
|
|
|
|
|
|
|
void wpa_sm_aborted_cached(struct wpa_sm *sm);
|
|
|
|
int wpa_sm_rx_eapol(struct wpa_sm *sm, const u8 *src_addr,
|
|
|
|
const u8 *buf, size_t len);
|
|
|
|
int wpa_sm_parse_own_wpa_ie(struct wpa_sm *sm, struct wpa_ie_data *data);
|
2009-01-13 13:22:42 -05:00
|
|
|
int wpa_sm_pmksa_cache_list(struct wpa_sm *sm, char *buf, size_t len);
|
2010-03-29 18:42:04 -04:00
|
|
|
void wpa_sm_drop_sa(struct wpa_sm *sm);
|
2010-04-10 15:39:49 -04:00
|
|
|
int wpa_sm_has_ptk(struct wpa_sm *sm);
|
2008-02-27 20:34:43 -05:00
|
|
|
|
2011-07-12 14:22:51 -04:00
|
|
|
void wpa_sm_update_replay_ctr(struct wpa_sm *sm, const u8 *replay_ctr);
|
|
|
|
|
2011-09-07 10:46:00 -04:00
|
|
|
void wpa_sm_pmksa_cache_flush(struct wpa_sm *sm, void *network_ctx);
|
|
|
|
|
2013-03-16 13:13:31 -04:00
|
|
|
int wpa_sm_get_p2p_ip_addr(struct wpa_sm *sm, u8 *buf);
|
|
|
|
|
2008-02-27 20:34:43 -05:00
|
|
|
#else /* CONFIG_NO_WPA */
|
|
|
|
|
|
|
|
static inline struct wpa_sm * wpa_sm_init(struct wpa_sm_ctx *ctx)
|
|
|
|
{
|
|
|
|
return (struct wpa_sm *) 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void wpa_sm_deinit(struct wpa_sm *sm)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void wpa_sm_notify_assoc(struct wpa_sm *sm, const u8 *bssid)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void wpa_sm_notify_disassoc(struct wpa_sm *sm)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk,
|
|
|
|
size_t pmk_len)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void wpa_sm_set_pmk_from_pmksa(struct wpa_sm *sm)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void wpa_sm_set_fast_reauth(struct wpa_sm *sm, int fast_reauth)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void wpa_sm_set_scard_ctx(struct wpa_sm *sm, void *scard_ctx)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void wpa_sm_set_config(struct wpa_sm *sm,
|
|
|
|
struct rsn_supp_config *config)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void wpa_sm_set_own_addr(struct wpa_sm *sm, const u8 *addr)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void wpa_sm_set_ifname(struct wpa_sm *sm, const char *ifname,
|
|
|
|
const char *bridge_ifname)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline int wpa_sm_set_assoc_wpa_ie(struct wpa_sm *sm, const u8 *ie,
|
|
|
|
size_t len)
|
|
|
|
{
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline int wpa_sm_set_assoc_wpa_ie_default(struct wpa_sm *sm,
|
|
|
|
u8 *wpa_ie,
|
|
|
|
size_t *wpa_ie_len)
|
|
|
|
{
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline int wpa_sm_set_ap_wpa_ie(struct wpa_sm *sm, const u8 *ie,
|
|
|
|
size_t len)
|
|
|
|
{
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline int wpa_sm_set_ap_rsn_ie(struct wpa_sm *sm, const u8 *ie,
|
|
|
|
size_t len)
|
|
|
|
{
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline int wpa_sm_get_mib(struct wpa_sm *sm, char *buf, size_t buflen)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline int wpa_sm_set_param(struct wpa_sm *sm,
|
|
|
|
enum wpa_sm_conf_params param,
|
|
|
|
unsigned int value)
|
|
|
|
{
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline int wpa_sm_get_status(struct wpa_sm *sm, char *buf,
|
|
|
|
size_t buflen, int verbose)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-06-07 13:02:50 -04:00
|
|
|
static inline int wpa_sm_pmf_enabled(struct wpa_sm *sm)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2008-02-27 20:34:43 -05:00
|
|
|
static inline void wpa_sm_key_request(struct wpa_sm *sm, int error,
|
|
|
|
int pairwise)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline int wpa_parse_wpa_ie(const u8 *wpa_ie, size_t wpa_ie_len,
|
|
|
|
struct wpa_ie_data *data)
|
|
|
|
{
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void wpa_sm_aborted_cached(struct wpa_sm *sm)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline int wpa_sm_rx_eapol(struct wpa_sm *sm, const u8 *src_addr,
|
|
|
|
const u8 *buf, size_t len)
|
|
|
|
{
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline int wpa_sm_parse_own_wpa_ie(struct wpa_sm *sm,
|
|
|
|
struct wpa_ie_data *data)
|
|
|
|
{
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2009-01-13 13:22:42 -05:00
|
|
|
static inline int wpa_sm_pmksa_cache_list(struct wpa_sm *sm, char *buf,
|
|
|
|
size_t len)
|
|
|
|
{
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2010-03-29 18:42:04 -04:00
|
|
|
static inline void wpa_sm_drop_sa(struct wpa_sm *sm)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2010-04-11 04:39:14 -04:00
|
|
|
static inline int wpa_sm_has_ptk(struct wpa_sm *sm)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2011-07-12 14:22:51 -04:00
|
|
|
static inline void wpa_sm_update_replay_ctr(struct wpa_sm *sm,
|
|
|
|
const u8 *replay_ctr)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2011-09-07 10:46:00 -04:00
|
|
|
static inline void wpa_sm_pmksa_cache_flush(struct wpa_sm *sm,
|
|
|
|
void *network_ctx)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2008-02-27 20:34:43 -05:00
|
|
|
#endif /* CONFIG_NO_WPA */
|
|
|
|
|
|
|
|
#ifdef CONFIG_PEERKEY
|
|
|
|
int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer);
|
2013-12-28 04:40:23 -05:00
|
|
|
int wpa_sm_rx_eapol_peerkey(struct wpa_sm *sm, const u8 *src_addr,
|
|
|
|
const u8 *buf, size_t len);
|
2008-02-27 20:34:43 -05:00
|
|
|
#else /* CONFIG_PEERKEY */
|
|
|
|
static inline int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer)
|
|
|
|
{
|
|
|
|
return -1;
|
|
|
|
}
|
2013-12-28 04:40:23 -05:00
|
|
|
|
|
|
|
static inline int wpa_sm_rx_eapol_peerkey(struct wpa_sm *sm, const u8 *src_addr,
|
|
|
|
const u8 *buf, size_t len)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
2008-02-27 20:34:43 -05:00
|
|
|
#endif /* CONFIG_PEERKEY */
|
|
|
|
|
|
|
|
#ifdef CONFIG_IEEE80211R
|
|
|
|
|
2010-04-10 04:36:35 -04:00
|
|
|
int wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len);
|
2010-04-09 09:26:20 -04:00
|
|
|
int wpa_ft_prepare_auth_request(struct wpa_sm *sm, const u8 *mdie);
|
2008-02-27 20:34:43 -05:00
|
|
|
int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len,
|
2009-03-09 14:45:17 -04:00
|
|
|
int ft_action, const u8 *target_ap,
|
|
|
|
const u8 *ric_ies, size_t ric_ies_len);
|
2008-02-27 20:34:43 -05:00
|
|
|
int wpa_ft_is_completed(struct wpa_sm *sm);
|
2013-04-26 10:56:24 -04:00
|
|
|
void wpa_reset_ft_completed(struct wpa_sm *sm);
|
2008-02-27 20:34:43 -05:00
|
|
|
int wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies,
|
2008-03-12 05:20:20 -04:00
|
|
|
size_t ies_len, const u8 *src_addr);
|
2010-04-09 09:26:20 -04:00
|
|
|
int wpa_ft_start_over_ds(struct wpa_sm *sm, const u8 *target_ap,
|
|
|
|
const u8 *mdie);
|
2008-02-27 20:34:43 -05:00
|
|
|
|
|
|
|
#else /* CONFIG_IEEE80211R */
|
|
|
|
|
|
|
|
static inline int
|
2010-04-11 12:49:32 -04:00
|
|
|
wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len)
|
2008-02-27 20:34:43 -05:00
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2010-04-09 09:26:20 -04:00
|
|
|
static inline int wpa_ft_prepare_auth_request(struct wpa_sm *sm,
|
|
|
|
const u8 *mdie)
|
2008-02-27 20:34:43 -05:00
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline int
|
|
|
|
wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len,
|
|
|
|
int ft_action, const u8 *target_ap)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline int wpa_ft_is_completed(struct wpa_sm *sm)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-04-26 10:56:24 -04:00
|
|
|
static inline void wpa_reset_ft_completed(struct wpa_sm *sm)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2008-02-27 20:34:43 -05:00
|
|
|
static inline int
|
2008-03-12 05:20:20 -04:00
|
|
|
wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies, size_t ies_len,
|
|
|
|
const u8 *src_addr)
|
2008-02-27 20:34:43 -05:00
|
|
|
{
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* CONFIG_IEEE80211R */
|
|
|
|
|
2010-10-07 03:26:56 -04:00
|
|
|
|
|
|
|
/* tdls.c */
|
2011-01-28 12:27:28 -05:00
|
|
|
void wpa_tdls_ap_ies(struct wpa_sm *sm, const u8 *ies, size_t len);
|
|
|
|
void wpa_tdls_assoc_resp_ies(struct wpa_sm *sm, const u8 *ies, size_t len);
|
2010-10-07 03:26:56 -04:00
|
|
|
int wpa_tdls_start(struct wpa_sm *sm, const u8 *addr);
|
2013-02-05 06:27:56 -05:00
|
|
|
void wpa_tdls_remove(struct wpa_sm *sm, const u8 *addr);
|
2011-09-26 06:55:28 -04:00
|
|
|
int wpa_tdls_teardown_link(struct wpa_sm *sm, const u8 *addr, u16 reason_code);
|
2011-09-26 06:55:29 -04:00
|
|
|
int wpa_tdls_send_discovery_request(struct wpa_sm *sm, const u8 *addr);
|
2010-10-07 03:26:56 -04:00
|
|
|
int wpa_tdls_init(struct wpa_sm *sm);
|
2013-02-12 16:25:21 -05:00
|
|
|
void wpa_tdls_teardown_peers(struct wpa_sm *sm);
|
2010-10-07 03:26:56 -04:00
|
|
|
void wpa_tdls_deinit(struct wpa_sm *sm);
|
2011-03-24 14:44:17 -04:00
|
|
|
void wpa_tdls_enable(struct wpa_sm *sm, int enabled);
|
2014-06-10 14:19:04 -04:00
|
|
|
void wpa_tdls_disable_unreachable_link(struct wpa_sm *sm, const u8 *addr);
|
2013-11-11 15:13:55 -05:00
|
|
|
const char * wpa_tdls_get_link_status(struct wpa_sm *sm, const u8 *addr);
|
2011-09-26 06:55:33 -04:00
|
|
|
int wpa_tdls_is_external_setup(struct wpa_sm *sm);
|
2010-10-07 03:26:56 -04:00
|
|
|
|
2012-02-26 10:27:19 -05:00
|
|
|
int wpa_wnmsleep_install_key(struct wpa_sm *sm, u8 subelem_id, u8 *buf);
|
|
|
|
|
2008-02-27 20:34:43 -05:00
|
|
|
#endif /* WPA_H */
|