2014-10-26 11:02:36 +01:00
|
|
|
/*
|
|
|
|
* Driver interaction with Linux nl80211/cfg80211 - definitions
|
|
|
|
* Copyright (c) 2002-2014, Jouni Malinen <j@w1.fi>
|
|
|
|
* Copyright (c) 2003-2004, Instant802 Networks, Inc.
|
|
|
|
* Copyright (c) 2005-2006, Devicescape Software, Inc.
|
|
|
|
* Copyright (c) 2007, Johannes Berg <johannes@sipsolutions.net>
|
|
|
|
* Copyright (c) 2009-2010, Atheros Communications
|
|
|
|
*
|
|
|
|
* This software may be distributed under the terms of the BSD license.
|
|
|
|
* See README for more details.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef DRIVER_NL80211_H
|
|
|
|
#define DRIVER_NL80211_H
|
|
|
|
|
|
|
|
#include "nl80211_copy.h"
|
|
|
|
#include "utils/list.h"
|
|
|
|
#include "driver.h"
|
|
|
|
|
2020-02-17 16:25:05 +01:00
|
|
|
#ifndef NL_CAPABILITY_VERSION_3_5_0
|
|
|
|
#define nla_nest_start(msg, attrtype) \
|
|
|
|
nla_nest_start(msg, NLA_F_NESTED | (attrtype))
|
|
|
|
#endif
|
|
|
|
|
2014-10-26 11:02:36 +01:00
|
|
|
struct nl80211_global {
|
2016-03-15 14:02:08 +01:00
|
|
|
void *ctx;
|
2014-10-26 11:02:36 +01:00
|
|
|
struct dl_list interfaces;
|
|
|
|
int if_add_ifindex;
|
|
|
|
u64 if_add_wdevid;
|
|
|
|
int if_add_wdevid_set;
|
|
|
|
struct netlink_data *netlink;
|
|
|
|
struct nl_cb *nl_cb;
|
2020-01-02 16:27:02 +01:00
|
|
|
struct nl_sock *nl;
|
2014-10-26 11:02:36 +01:00
|
|
|
int nl80211_id;
|
2021-08-20 11:26:33 +02:00
|
|
|
int nlctrl_id;
|
2014-10-26 11:02:36 +01:00
|
|
|
int ioctl_sock; /* socket for ioctl() use */
|
|
|
|
|
2020-01-02 16:27:02 +01:00
|
|
|
struct nl_sock *nl_event;
|
2014-10-26 11:02:36 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
struct nl80211_wiphy_data {
|
|
|
|
struct dl_list list;
|
|
|
|
struct dl_list bsss;
|
|
|
|
struct dl_list drvs;
|
|
|
|
|
2020-01-02 16:27:02 +01:00
|
|
|
struct nl_sock *nl_beacons;
|
2014-10-26 11:02:36 +01:00
|
|
|
struct nl_cb *nl_cb;
|
|
|
|
|
|
|
|
int wiphy_idx;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct i802_bss {
|
|
|
|
struct wpa_driver_nl80211_data *drv;
|
|
|
|
struct i802_bss *next;
|
|
|
|
int ifindex;
|
2014-09-10 07:25:16 +02:00
|
|
|
int br_ifindex;
|
2014-10-26 11:02:36 +01:00
|
|
|
u64 wdev_id;
|
|
|
|
char ifname[IFNAMSIZ + 1];
|
|
|
|
char brname[IFNAMSIZ];
|
|
|
|
unsigned int beacon_set:1;
|
|
|
|
unsigned int added_if_into_bridge:1;
|
2018-07-04 11:31:02 +02:00
|
|
|
unsigned int already_in_bridge:1;
|
2014-10-26 11:02:36 +01:00
|
|
|
unsigned int added_bridge:1;
|
|
|
|
unsigned int in_deinit:1;
|
|
|
|
unsigned int wdev_id_set:1;
|
|
|
|
unsigned int added_if:1;
|
|
|
|
unsigned int static_ap:1;
|
2018-11-26 08:44:02 +01:00
|
|
|
unsigned int use_nl_connect:1;
|
2014-10-26 11:02:36 +01:00
|
|
|
|
|
|
|
u8 addr[ETH_ALEN];
|
2022-06-13 14:09:13 +02:00
|
|
|
u8 prev_addr[ETH_ALEN];
|
2014-10-26 11:02:36 +01:00
|
|
|
|
|
|
|
int freq;
|
|
|
|
int bandwidth;
|
|
|
|
int if_dynamic;
|
|
|
|
|
|
|
|
void *ctx;
|
2020-01-02 16:27:02 +01:00
|
|
|
struct nl_sock *nl_preq, *nl_mgmt, *nl_connect;
|
2014-10-26 11:02:36 +01:00
|
|
|
struct nl_cb *nl_cb;
|
|
|
|
|
|
|
|
struct nl80211_wiphy_data *wiphy_data;
|
|
|
|
struct dl_list wiphy_list;
|
2016-12-08 17:21:25 +01:00
|
|
|
u8 rand_addr[ETH_ALEN];
|
2014-10-26 11:02:36 +01:00
|
|
|
};
|
|
|
|
|
2019-04-28 20:05:54 +02:00
|
|
|
struct drv_nl80211_if_info {
|
|
|
|
int ifindex;
|
|
|
|
/* the AP/AP_VLAN iface that is in this bridge */
|
|
|
|
int reason;
|
|
|
|
};
|
|
|
|
|
2014-10-26 11:02:36 +01:00
|
|
|
struct wpa_driver_nl80211_data {
|
|
|
|
struct nl80211_global *global;
|
|
|
|
struct dl_list list;
|
|
|
|
struct dl_list wiphy_list;
|
|
|
|
char phyname[32];
|
2015-12-17 14:54:11 +01:00
|
|
|
unsigned int wiphy_idx;
|
2014-10-26 11:02:36 +01:00
|
|
|
u8 perm_addr[ETH_ALEN];
|
|
|
|
void *ctx;
|
|
|
|
int ifindex;
|
|
|
|
int if_removed;
|
|
|
|
int if_disabled;
|
|
|
|
int ignore_if_down_event;
|
|
|
|
struct rfkill_data *rfkill;
|
|
|
|
struct wpa_driver_capa capa;
|
|
|
|
u8 *extended_capa, *extended_capa_mask;
|
|
|
|
unsigned int extended_capa_len;
|
2016-04-12 10:01:42 +02:00
|
|
|
struct drv_nl80211_ext_capa {
|
|
|
|
enum nl80211_iftype iftype;
|
|
|
|
u8 *ext_capa, *ext_capa_mask;
|
|
|
|
unsigned int ext_capa_len;
|
|
|
|
} iface_ext_capa[NL80211_IFTYPE_MAX];
|
|
|
|
unsigned int num_iface_ext_capa;
|
|
|
|
|
2014-10-26 11:02:36 +01:00
|
|
|
int has_capability;
|
2020-04-24 19:19:25 +02:00
|
|
|
int has_driver_key_mgmt;
|
2014-10-26 11:02:36 +01:00
|
|
|
|
|
|
|
int operstate;
|
|
|
|
|
|
|
|
int scan_complete_events;
|
|
|
|
enum scan_states {
|
|
|
|
NO_SCAN, SCAN_REQUESTED, SCAN_STARTED, SCAN_COMPLETED,
|
|
|
|
SCAN_ABORTED, SCHED_SCAN_STARTED, SCHED_SCAN_STOPPED,
|
|
|
|
SCHED_SCAN_RESULTS
|
|
|
|
} scan_state;
|
|
|
|
|
|
|
|
u8 auth_bssid[ETH_ALEN];
|
|
|
|
u8 auth_attempt_bssid[ETH_ALEN];
|
|
|
|
u8 bssid[ETH_ALEN];
|
|
|
|
u8 prev_bssid[ETH_ALEN];
|
|
|
|
int associated;
|
2022-09-08 16:44:09 +02:00
|
|
|
struct driver_sta_mlo_info sta_mlo_info;
|
2015-04-07 11:00:13 +02:00
|
|
|
u8 ssid[SSID_MAX_LEN];
|
2014-10-26 11:02:36 +01:00
|
|
|
size_t ssid_len;
|
|
|
|
enum nl80211_iftype nlmode;
|
|
|
|
enum nl80211_iftype ap_scan_as_station;
|
|
|
|
unsigned int assoc_freq;
|
|
|
|
|
|
|
|
int monitor_sock;
|
|
|
|
int monitor_ifidx;
|
|
|
|
int monitor_refcount;
|
|
|
|
|
|
|
|
unsigned int disabled_11b_rates:1;
|
|
|
|
unsigned int pending_remain_on_chan:1;
|
|
|
|
unsigned int in_interface_list:1;
|
|
|
|
unsigned int device_ap_sme:1;
|
|
|
|
unsigned int poll_command_supported:1;
|
|
|
|
unsigned int data_tx_status:1;
|
|
|
|
unsigned int scan_for_auth:1;
|
|
|
|
unsigned int retry_auth:1;
|
|
|
|
unsigned int use_monitor:1;
|
|
|
|
unsigned int ignore_next_local_disconnect:1;
|
|
|
|
unsigned int ignore_next_local_deauth:1;
|
|
|
|
unsigned int hostapd:1;
|
2021-03-11 21:58:48 +01:00
|
|
|
unsigned int start_mode_sta:1;
|
2014-10-26 11:02:36 +01:00
|
|
|
unsigned int start_iface_up:1;
|
|
|
|
unsigned int test_use_roc_tx:1;
|
|
|
|
unsigned int ignore_deauth_event:1;
|
2015-02-09 16:26:54 +01:00
|
|
|
unsigned int vendor_cmd_test_avail:1;
|
2014-10-26 11:02:36 +01:00
|
|
|
unsigned int roaming_vendor_cmd_avail:1;
|
|
|
|
unsigned int dfs_vendor_cmd_avail:1;
|
|
|
|
unsigned int have_low_prio_scan:1;
|
|
|
|
unsigned int force_connect_cmd:1;
|
|
|
|
unsigned int addr_changed:1;
|
2014-12-06 01:48:23 +01:00
|
|
|
unsigned int get_features_vendor_cmd_avail:1;
|
2015-01-05 11:00:09 +01:00
|
|
|
unsigned int set_rekey_offload:1;
|
2015-02-18 03:35:13 +01:00
|
|
|
unsigned int p2p_go_ctwindow_supported:1;
|
2015-07-27 12:14:22 +02:00
|
|
|
unsigned int setband_vendor_cmd_avail:1;
|
2015-07-24 01:32:58 +02:00
|
|
|
unsigned int get_pref_freq_list:1;
|
2015-07-24 02:07:55 +02:00
|
|
|
unsigned int set_prob_oper_freq:1;
|
2015-09-15 15:54:43 +02:00
|
|
|
unsigned int scan_vendor_cmd_avail:1;
|
2016-03-24 21:33:48 +01:00
|
|
|
unsigned int connect_reassoc:1;
|
2016-07-19 09:11:15 +02:00
|
|
|
unsigned int set_wifi_conf_vendor_cmd_avail:1;
|
2017-03-06 12:43:10 +01:00
|
|
|
unsigned int fetch_bss_trans_status:1;
|
2017-06-21 16:46:07 +02:00
|
|
|
unsigned int roam_vendor_cmd_avail:1;
|
2019-10-16 09:43:32 +02:00
|
|
|
unsigned int add_sta_node_vendor_cmd_avail:1;
|
2020-04-19 14:43:41 +02:00
|
|
|
unsigned int control_port_ap:1;
|
2020-04-20 22:53:21 +02:00
|
|
|
unsigned int multicast_registrations:1;
|
2020-04-27 11:06:16 +02:00
|
|
|
unsigned int no_rrm:1;
|
2020-10-15 16:58:17 +02:00
|
|
|
unsigned int get_sta_info_vendor_cmd_avail:1;
|
2020-12-15 03:04:28 +01:00
|
|
|
unsigned int fils_discovery:1;
|
2020-09-11 04:45:47 +02:00
|
|
|
unsigned int unsol_bcast_probe_resp:1;
|
2021-02-27 16:57:08 +01:00
|
|
|
unsigned int qca_do_acs:1;
|
|
|
|
unsigned int brcm_do_acs:1;
|
2022-07-28 15:40:05 +02:00
|
|
|
unsigned int uses_6ghz:1;
|
2022-07-26 12:56:25 +02:00
|
|
|
unsigned int secure_ranging_ctx_vendor_cmd_avail:1;
|
2014-10-26 11:02:36 +01:00
|
|
|
|
2015-09-15 15:54:43 +02:00
|
|
|
u64 vendor_scan_cookie;
|
2014-10-26 11:02:36 +01:00
|
|
|
u64 remain_on_chan_cookie;
|
2020-01-03 14:23:49 +01:00
|
|
|
u64 send_frame_cookie;
|
|
|
|
#define MAX_SEND_FRAME_COOKIES 20
|
|
|
|
u64 send_frame_cookies[MAX_SEND_FRAME_COOKIES];
|
|
|
|
unsigned int num_send_frame_cookies;
|
2020-06-21 16:32:00 +02:00
|
|
|
u64 eapol_tx_cookie;
|
2014-10-26 11:02:36 +01:00
|
|
|
|
|
|
|
unsigned int last_mgmt_freq;
|
|
|
|
|
|
|
|
struct wpa_driver_scan_filter *filter_ssids;
|
|
|
|
size_t num_filter_ssids;
|
|
|
|
|
|
|
|
struct i802_bss *first_bss;
|
|
|
|
|
|
|
|
int eapol_tx_sock;
|
|
|
|
|
|
|
|
int eapol_sock; /* socket for EAPOL frames */
|
|
|
|
|
2020-01-02 16:27:02 +01:00
|
|
|
struct nl_sock *rtnl_sk; /* nl_sock for NETLINK_ROUTE */
|
2014-10-26 11:02:36 +01:00
|
|
|
|
2019-04-28 20:05:54 +02:00
|
|
|
struct drv_nl80211_if_info default_if_indices[16];
|
|
|
|
struct drv_nl80211_if_info *if_indices;
|
2014-10-26 11:02:36 +01:00
|
|
|
int num_if_indices;
|
|
|
|
|
|
|
|
/* From failed authentication command */
|
|
|
|
int auth_freq;
|
|
|
|
u8 auth_bssid_[ETH_ALEN];
|
2015-04-07 11:00:13 +02:00
|
|
|
u8 auth_ssid[SSID_MAX_LEN];
|
2014-10-26 11:02:36 +01:00
|
|
|
size_t auth_ssid_len;
|
|
|
|
int auth_alg;
|
|
|
|
u8 *auth_ie;
|
|
|
|
size_t auth_ie_len;
|
nl80211: Add missing WPA3-SAE auth_data in auth retry case
When wpa_supplicant sends NL80211_CMD_AUTHENTICATE to kernel, it is
possible that the cfg80211 in kernel has expired the BSS entry that
we are trying to auth with. Then cfg80211 will reject the auth cmd.
In this case, wpa_supplicant will trigger a single channel scan to
refresh cfg80211 BSS entry, and retry the auth when scan is finished.
When this case happens, wpa_supplicant makes a copy of auth params,
such as frequency, bssid, ssid, ie and so on. So when we retry auth,
the copy of these params will be used. The problem is, a param named
auth_data is missed when making the copy. The auth_data is used by
NL80211_ATTR_SAE_DATA which is a mandatory field for WPA3-SAE auth.
In WPA3-SAE case the auth retry will always fail because auth_data is
missing. This patch fixes the issue.
Signed-off-by: hongwang.li <hongwang.li@sonos.com>
2021-01-12 03:12:58 +01:00
|
|
|
u8 *auth_data;
|
|
|
|
size_t auth_data_len;
|
2014-10-26 11:02:36 +01:00
|
|
|
u8 auth_wep_key[4][16];
|
|
|
|
size_t auth_wep_key_len[4];
|
|
|
|
int auth_wep_tx_keyidx;
|
|
|
|
int auth_local_state_change;
|
|
|
|
int auth_p2p;
|
2015-09-16 14:15:05 +02:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Tells whether the last scan issued from wpa_supplicant was a normal
|
|
|
|
* scan (NL80211_CMD_TRIGGER_SCAN) or a vendor scan
|
|
|
|
* (NL80211_CMD_VENDOR). 0 if no pending scan request.
|
|
|
|
*/
|
|
|
|
int last_scan_cmd;
|
2020-11-27 11:23:33 +01:00
|
|
|
#ifdef CONFIG_DRIVER_NL80211_QCA
|
|
|
|
bool roam_indication_done;
|
|
|
|
u8 *pending_roam_data;
|
|
|
|
size_t pending_roam_data_len;
|
|
|
|
#endif /* CONFIG_DRIVER_NL80211_QCA */
|
2014-10-26 11:02:36 +01:00
|
|
|
};
|
|
|
|
|
2014-10-26 16:20:37 +01:00
|
|
|
struct nl_msg;
|
|
|
|
|
|
|
|
void * nl80211_cmd(struct wpa_driver_nl80211_data *drv,
|
|
|
|
struct nl_msg *msg, int flags, uint8_t cmd);
|
2014-12-06 11:56:05 +01:00
|
|
|
struct nl_msg * nl80211_cmd_msg(struct i802_bss *bss, int flags, uint8_t cmd);
|
|
|
|
struct nl_msg * nl80211_drv_msg(struct wpa_driver_nl80211_data *drv, int flags,
|
|
|
|
uint8_t cmd);
|
|
|
|
struct nl_msg * nl80211_bss_msg(struct i802_bss *bss, int flags, uint8_t cmd);
|
2014-10-26 16:20:37 +01:00
|
|
|
int send_and_recv_msgs(struct wpa_driver_nl80211_data *drv, struct nl_msg *msg,
|
|
|
|
int (*valid_handler)(struct nl_msg *, void *),
|
2020-06-10 10:32:56 +02:00
|
|
|
void *valid_data,
|
|
|
|
int (*ack_handler_custom)(struct nl_msg *, void *),
|
|
|
|
void *ack_data);
|
2020-04-11 12:25:22 +02:00
|
|
|
struct nl_sock * get_connect_handle(struct i802_bss *bss);
|
2014-10-26 16:20:37 +01:00
|
|
|
int nl80211_create_iface(struct wpa_driver_nl80211_data *drv,
|
|
|
|
const char *ifname, enum nl80211_iftype iftype,
|
|
|
|
const u8 *addr, int wds,
|
|
|
|
int (*handler)(struct nl_msg *, void *),
|
|
|
|
void *arg, int use_existing);
|
|
|
|
void nl80211_remove_iface(struct wpa_driver_nl80211_data *drv, int ifidx);
|
|
|
|
unsigned int nl80211_get_assoc_freq(struct wpa_driver_nl80211_data *drv);
|
2016-10-24 19:59:52 +02:00
|
|
|
int nl80211_get_assoc_ssid(struct wpa_driver_nl80211_data *drv, u8 *ssid);
|
2014-10-26 16:20:37 +01:00
|
|
|
enum chan_width convert2width(int width);
|
|
|
|
void nl80211_mark_disconnected(struct wpa_driver_nl80211_data *drv);
|
|
|
|
struct i802_bss * get_bss_ifindex(struct wpa_driver_nl80211_data *drv,
|
|
|
|
int ifindex);
|
|
|
|
int is_ap_interface(enum nl80211_iftype nlmode);
|
2014-12-06 16:59:26 +01:00
|
|
|
int is_sta_interface(enum nl80211_iftype nlmode);
|
2014-10-26 16:20:37 +01:00
|
|
|
int wpa_driver_nl80211_authenticate_retry(struct wpa_driver_nl80211_data *drv);
|
|
|
|
int nl80211_get_link_signal(struct wpa_driver_nl80211_data *drv,
|
2022-09-08 16:44:19 +02:00
|
|
|
const u8 *bssid, struct wpa_signal_info *sig);
|
2014-10-26 16:20:37 +01:00
|
|
|
int nl80211_get_link_noise(struct wpa_driver_nl80211_data *drv,
|
|
|
|
struct wpa_signal_info *sig_change);
|
|
|
|
int nl80211_get_wiphy_index(struct i802_bss *bss);
|
|
|
|
int wpa_driver_nl80211_set_mode(struct i802_bss *bss,
|
|
|
|
enum nl80211_iftype nlmode);
|
2014-12-06 16:59:26 +01:00
|
|
|
int wpa_driver_nl80211_mlme(struct wpa_driver_nl80211_data *drv,
|
|
|
|
const u8 *addr, int cmd, u16 reason_code,
|
2018-11-26 08:44:02 +01:00
|
|
|
int local_state_change,
|
nl80211: Use process_bss_event() for the nl_connect handler
The nl_connect is initialized with the process_bss_event() handler.
However, it is used several times with the default valid handler. As a
result, if a message that is only valid for process_bss_event() is
received while the default handler is used, it will be dropped.
This has been observed in a case where during the 4-way handshake, a
Beacon frame is received on the AP side, which triggers a beacon update,
just before receiving the next EAPOL. When send_and_recv_msgs_owner() is
called for sending the NL80211_CMD_SET_BEACON command, the
NL80211_CMD_CONTROL_PORT_FRAME event is already pending. As a result, it
is received with the default handler, which drops it. Since the EAPOL
frame is dropped, the connection attempt fails.
Fix it by using the process_bss_event() handler when the nl_connect
handler is used.
Signed-off-by: Avraham Stern <avraham.stern@intel.com>
2021-02-17 11:14:33 +01:00
|
|
|
struct i802_bss *bss);
|
2014-10-26 16:20:37 +01:00
|
|
|
|
2014-10-26 11:40:10 +01:00
|
|
|
int nl80211_create_monitor_interface(struct wpa_driver_nl80211_data *drv);
|
|
|
|
void nl80211_remove_monitor_interface(struct wpa_driver_nl80211_data *drv);
|
|
|
|
int nl80211_send_monitor(struct wpa_driver_nl80211_data *drv,
|
|
|
|
const void *data, size_t len,
|
|
|
|
int encrypt, int noack);
|
|
|
|
|
2014-10-26 12:28:39 +01:00
|
|
|
int wpa_driver_nl80211_capa(struct wpa_driver_nl80211_data *drv);
|
|
|
|
struct hostapd_hw_modes *
|
2017-05-12 09:48:00 +02:00
|
|
|
nl80211_get_hw_feature_data(void *priv, u16 *num_modes, u16 *flags,
|
|
|
|
u8 *dfs_domain);
|
2014-10-26 12:28:39 +01:00
|
|
|
|
2014-10-26 15:23:46 +01:00
|
|
|
int process_global_event(struct nl_msg *msg, void *arg);
|
|
|
|
int process_bss_event(struct nl_msg *msg, void *arg);
|
2014-10-26 15:13:27 +01:00
|
|
|
|
2016-04-12 10:01:42 +02:00
|
|
|
const char * nl80211_iftype_str(enum nl80211_iftype mode);
|
|
|
|
|
2020-05-15 20:23:50 +02:00
|
|
|
void nl80211_restore_ap_mode(struct i802_bss *bss);
|
|
|
|
|
2014-10-26 11:27:35 +01:00
|
|
|
#ifdef ANDROID
|
2020-01-02 16:27:02 +01:00
|
|
|
int android_nl_socket_set_nonblocking(struct nl_sock *handle);
|
2014-10-26 11:27:35 +01:00
|
|
|
int android_pno_start(struct i802_bss *bss,
|
|
|
|
struct wpa_driver_scan_params *params);
|
|
|
|
int android_pno_stop(struct i802_bss *bss);
|
|
|
|
extern int wpa_driver_nl80211_driver_cmd(void *priv, char *cmd, char *buf,
|
|
|
|
size_t buf_len);
|
2020-12-11 15:33:48 +01:00
|
|
|
extern int wpa_driver_nl80211_driver_event(struct wpa_driver_nl80211_data *drv,
|
|
|
|
u32 vendor_id, u32 subcmd,
|
|
|
|
u8 *data, size_t len);
|
|
|
|
|
2014-10-26 11:27:35 +01:00
|
|
|
|
|
|
|
#ifdef ANDROID_P2P
|
|
|
|
int wpa_driver_set_p2p_noa(void *priv, u8 count, int start, int duration);
|
|
|
|
int wpa_driver_get_p2p_noa(void *priv, u8 *buf, size_t len);
|
|
|
|
int wpa_driver_set_p2p_ps(void *priv, int legacy_ps, int opp_ps, int ctwindow);
|
|
|
|
int wpa_driver_set_ap_wps_p2p_ie(void *priv, const struct wpabuf *beacon,
|
|
|
|
const struct wpabuf *proberesp,
|
|
|
|
const struct wpabuf *assocresp);
|
|
|
|
#endif /* ANDROID_P2P */
|
|
|
|
#endif /* ANDROID */
|
|
|
|
|
2014-12-06 16:59:26 +01:00
|
|
|
|
|
|
|
/* driver_nl80211_scan.c */
|
|
|
|
|
|
|
|
void wpa_driver_nl80211_scan_timeout(void *eloop_ctx, void *timeout_ctx);
|
|
|
|
int wpa_driver_nl80211_scan(struct i802_bss *bss,
|
|
|
|
struct wpa_driver_scan_params *params);
|
|
|
|
int wpa_driver_nl80211_sched_scan(void *priv,
|
2015-11-17 14:08:23 +01:00
|
|
|
struct wpa_driver_scan_params *params);
|
2014-12-06 16:59:26 +01:00
|
|
|
int wpa_driver_nl80211_stop_sched_scan(void *priv);
|
|
|
|
struct wpa_scan_results * wpa_driver_nl80211_get_scan_results(void *priv);
|
|
|
|
void nl80211_dump_scan(struct wpa_driver_nl80211_data *drv);
|
2016-11-30 05:34:38 +01:00
|
|
|
int wpa_driver_nl80211_abort_scan(void *priv, u64 scan_cookie);
|
2015-09-15 15:54:43 +02:00
|
|
|
int wpa_driver_nl80211_vendor_scan(struct i802_bss *bss,
|
|
|
|
struct wpa_driver_scan_params *params);
|
2016-07-19 09:11:15 +02:00
|
|
|
int nl80211_set_default_scan_ies(void *priv, const u8 *ies, size_t ies_len);
|
2014-12-06 16:59:26 +01:00
|
|
|
|
2014-10-26 11:02:36 +01:00
|
|
|
#endif /* DRIVER_NL80211_H */
|