1STRUCT CFG80211_CONN(9) Actions and configuration STRUCT CFG80211_CONN(9)
2
3
4
6 struct_cfg80211_connect_params - Connection parameters
7
9 struct cfg80211_connect_params {
10 struct ieee80211_channel * channel;
11 struct ieee80211_channel * channel_hint;
12 const u8 * bssid;
13 const u8 * bssid_hint;
14 const u8 * ssid;
15 size_t ssid_len;
16 enum nl80211_auth_type auth_type;
17 const u8 * ie;
18 size_t ie_len;
19 bool privacy;
20 enum nl80211_mfp mfp;
21 struct cfg80211_crypto_settings crypto;
22 const u8 * key;
23 u8 key_len;
24 u8 key_idx;
25 u32 flags;
26 int bg_scan_period;
27 struct ieee80211_ht_cap ht_capa;
28 struct ieee80211_ht_cap ht_capa_mask;
29 struct ieee80211_vht_cap vht_capa;
30 struct ieee80211_vht_cap vht_capa_mask;
31 bool pbss;
32 struct cfg80211_bss_selection bss_select;
33 const u8 * prev_bssid;
34 const u8 * fils_erp_username;
35 size_t fils_erp_username_len;
36 const u8 * fils_erp_realm;
37 size_t fils_erp_realm_len;
38 u16 fils_erp_next_seq_num;
39 const u8 * fils_erp_rrk;
40 size_t fils_erp_rrk_len;
41 bool want_1x;
42 };
43
45 channel
46 The channel to use or NULL if not specified (auto-select based on
47 scan results)
48
49 channel_hint
50 The channel of the recommended BSS for initial connection or NULL
51 if not specified
52
53 bssid
54 The AP BSSID or NULL if not specified (auto-select based on scan
55 results)
56
57 bssid_hint
58 The recommended AP BSSID for initial connection to the BSS or NULL
59 if not specified. Unlike the bssid parameter, the driver is allowed
60 to ignore this bssid_hint if it has knowledge of a better BSS to
61 use.
62
63 ssid
64 SSID
65
66 ssid_len
67 Length of ssid in octets
68
69 auth_type
70 Authentication type (algorithm)
71
72 ie
73 IEs for association request
74
75 ie_len
76 Length of assoc_ie in octets
77
78 privacy
79 indicates whether privacy-enabled APs should be used
80
81 mfp
82 indicate whether management frame protection is used
83
84 crypto
85 crypto settings
86
87 key
88 WEP key for shared key authentication
89
90 key_len
91 length of WEP key for shared key authentication
92
93 key_idx
94 index of WEP key for shared key authentication
95
96 flags
97 See enum cfg80211_assoc_req_flags
98
99 bg_scan_period
100 Background scan period in seconds or -1 to indicate that default
101 value is to be used.
102
103 ht_capa
104 HT Capabilities over-rides. Values set in ht_capa_mask will be used
105 in ht_capa. Un-supported values will be ignored.
106
107 ht_capa_mask
108 The bits of ht_capa which are to be used.
109
110 vht_capa
111 VHT Capability overrides
112
113 vht_capa_mask
114 The bits of vht_capa which are to be used.
115
116 pbss
117 if set, connect to a PCP instead of AP. Valid for DMG networks.
118
119 bss_select
120 criteria to be used for BSS selection.
121
122 prev_bssid
123 previous BSSID, if not NULL use reassociate frame. This is used to
124 indicate a request to reassociate within the ESS instead of a
125 request do the initial association with the ESS. When included,
126 this is set to the BSSID of the current association, i.e., to the
127 value that is included in the Current AP address field of the
128 Reassociation Request frame.
129
130 fils_erp_username
131 EAP re-authentication protocol (ERP) username part of the NAI or
132 NULL if not specified. This is used to construct FILS wrapped data
133 IE.
134
135 fils_erp_username_len
136 Length of fils_erp_username in octets.
137
138 fils_erp_realm
139 EAP re-authentication protocol (ERP) realm part of NAI or NULL if
140 not specified. This specifies the domain name of ER server and is
141 used to construct FILS wrapped data IE.
142
143 fils_erp_realm_len
144 Length of fils_erp_realm in octets.
145
146 fils_erp_next_seq_num
147 The next sequence number to use in the FILS ERP messages. This is
148 also used to construct FILS wrapped data IE.
149
150 fils_erp_rrk
151 ERP re-authentication Root Key (rRK) used to derive additional keys
152 in FILS or NULL if not specified.
153
154 fils_erp_rrk_len
155 Length of fils_erp_rrk in octets.
156
157 want_1x
158 indicates user-space supports and wants to use 802.1X driver
159 offload of 4-way handshake.
160
162 This structure provides information needed to complete IEEE 802.11
163 authentication and association.
164
166 Johannes Berg <johannes@sipsolutions.net>
167 Author.
168
170Kernel Hackers Manual 3.10 June 2019 STRUCT CFG80211_CONN(9)