1 //------------------------------------------------------------------------------
2 // Copyright (c) 2004-2010 Atheros Communications Inc.
3 // All rights reserved.
7 // Permission to use, copy, modify, and/or distribute this software for any
8 // purpose with or without fee is hereby granted, provided that the above
9 // copyright notice and this permission notice appear in all copies.
11 // THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
12 // WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
13 // MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
14 // ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
15 // WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
16 // ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
17 // OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
21 // Author(s): ="Atheros"
22 //------------------------------------------------------------------------------
24 #ifndef _IEEE80211_IOCTL_H_
25 #define _IEEE80211_IOCTL_H_
27 #include <linux/version.h>
34 * Extracted from the MADWIFI net80211/ieee80211_ioctl.h
38 * WPA/RSN get/set key request. Specify the key/cipher
39 * type and whether the key is to be used for sending and/or
40 * receiving. The key index should be set only when working
41 * with global keys (use IEEE80211_KEYIX_NONE for ``no index'').
42 * Otherwise a unicast/pairwise key is specified by the bssid
43 * (on a station) or mac address (on an ap). They key length
44 * must include any MIC key data; otherwise it should be no
45 more than IEEE80211_KEYBUF_SIZE.
47 struct ieee80211req_key {
48 u_int8_t ik_type; /* key/cipher type */
50 u_int16_t ik_keyix; /* key index */
51 u_int8_t ik_keylen; /* key length in bytes */
53 #define IEEE80211_KEY_XMIT 0x01
54 #define IEEE80211_KEY_RECV 0x02
55 #define IEEE80211_KEY_DEFAULT 0x80 /* default xmit key */
56 u_int8_t ik_macaddr[IEEE80211_ADDR_LEN];
57 u_int64_t ik_keyrsc; /* key receive sequence counter */
58 u_int64_t ik_keytsc; /* key transmit sequence counter */
59 u_int8_t ik_keydata[IEEE80211_KEYBUF_SIZE+IEEE80211_MICBUF_SIZE];
62 * Delete a key either by index or address. Set the index
63 * to IEEE80211_KEYIX_NONE when deleting a unicast key.
65 struct ieee80211req_del_key {
66 u_int8_t idk_keyix; /* key index */
67 u_int8_t idk_macaddr[IEEE80211_ADDR_LEN];
70 * MLME state manipulation request. IEEE80211_MLME_ASSOC
71 * only makes sense when operating as a station. The other
72 * requests can be used when operating as a station or an
73 * ap (to effect a station).
75 struct ieee80211req_mlme {
76 u_int8_t im_op; /* operation to perform */
77 #define IEEE80211_MLME_ASSOC 1 /* associate station */
78 #define IEEE80211_MLME_DISASSOC 2 /* disassociate station */
79 #define IEEE80211_MLME_DEAUTH 3 /* deauthenticate station */
80 #define IEEE80211_MLME_AUTHORIZE 4 /* authorize station */
81 #define IEEE80211_MLME_UNAUTHORIZE 5 /* unauthorize station */
82 u_int16_t im_reason; /* 802.11 reason code */
83 u_int8_t im_macaddr[IEEE80211_ADDR_LEN];
86 struct ieee80211req_addpmkid {
87 u_int8_t pi_bssid[IEEE80211_ADDR_LEN];
89 u_int8_t pi_pmkid[16];
92 #define AUTH_ALG_OPEN_SYSTEM 0x01
93 #define AUTH_ALG_SHARED_KEY 0x02
94 #define AUTH_ALG_LEAP 0x04
96 struct ieee80211req_authalg {
101 * Request to add an IE to a Management Frame
104 IEEE80211_APPIE_FRAME_BEACON = 0,
105 IEEE80211_APPIE_FRAME_PROBE_REQ = 1,
106 IEEE80211_APPIE_FRAME_PROBE_RESP = 2,
107 IEEE80211_APPIE_FRAME_ASSOC_REQ = 3,
108 IEEE80211_APPIE_FRAME_ASSOC_RESP = 4,
109 IEEE80211_APPIE_NUM_OF_FRAME = 5
113 * The Maximum length of the IE that can be added to a Management frame
115 #define IEEE80211_APPIE_FRAME_MAX_LEN 200
117 struct ieee80211req_getset_appiebuf {
118 u_int32_t app_frmtype; /* management frame type for which buffer is added */
119 u_int32_t app_buflen; /*application supplied buffer length */
124 * The following definitions are used by an application to set filter
125 * for receiving management frames
128 IEEE80211_FILTER_TYPE_BEACON = 0x1,
129 IEEE80211_FILTER_TYPE_PROBE_REQ = 0x2,
130 IEEE80211_FILTER_TYPE_PROBE_RESP = 0x4,
131 IEEE80211_FILTER_TYPE_ASSOC_REQ = 0x8,
132 IEEE80211_FILTER_TYPE_ASSOC_RESP = 0x10,
133 IEEE80211_FILTER_TYPE_AUTH = 0x20,
134 IEEE80211_FILTER_TYPE_DEAUTH = 0x40,
135 IEEE80211_FILTER_TYPE_DISASSOC = 0x80,
136 IEEE80211_FILTER_TYPE_ALL = 0xFF /* used to check the valid filter bits */
139 struct ieee80211req_set_filter {
140 u_int32_t app_filterype; /* management frame filter type */
144 IEEE80211_PARAM_AUTHMODE = 3, /* Authentication Mode */
145 IEEE80211_PARAM_MCASTCIPHER = 5,
146 IEEE80211_PARAM_MCASTKEYLEN = 6, /* multicast key length */
147 IEEE80211_PARAM_UCASTCIPHER = 8,
148 IEEE80211_PARAM_UCASTKEYLEN = 9, /* unicast key length */
149 IEEE80211_PARAM_WPA = 10, /* WPA mode (0,1,2) */
150 IEEE80211_PARAM_ROAMING = 12, /* roaming mode */
151 IEEE80211_PARAM_PRIVACY = 13, /* privacy invoked */
152 IEEE80211_PARAM_COUNTERMEASURES = 14, /* WPA/TKIP countermeasures */
153 IEEE80211_PARAM_DROPUNENCRYPTED = 15, /* discard unencrypted frames */
154 IEEE80211_PARAM_WAPI = 16, /* WAPI policy from wapid */
158 * Values for IEEE80211_PARAM_WPA
160 #define WPA_MODE_WPA1 1
161 #define WPA_MODE_WPA2 2
162 #define WPA_MODE_AUTO 3
163 #define WPA_MODE_NONE 4
165 struct ieee80211req_wpaie {
166 u_int8_t wpa_macaddr[IEEE80211_ADDR_LEN];
167 u_int8_t wpa_ie[IEEE80211_MAX_IE];
168 u_int8_t rsn_ie[IEEE80211_MAX_IE];
171 #ifndef IW_ENCODE_ALG_PMK
172 #define IW_ENCODE_ALG_PMK 4
179 #endif /* _IEEE80211_IOCTL_H_ */