struct cfg80211_assoc_request — (Re)Association request data
struct cfg80211_assoc_request { struct cfg80211_bss * bss; const u8 * ie; const u8 * prev_bssid; size_t ie_len; struct cfg80211_crypto_settings crypto; bool use_mfp; u32 flags; struct ieee80211_ht_cap ht_capa; struct ieee80211_ht_cap ht_capa_mask; struct ieee80211_vht_cap vht_capa; struct ieee80211_vht_cap vht_capa_mask; const u8 * fils_kek; size_t fils_kek_len; const u8 * fils_nonces; };
The BSS to associate with. If the call is successful the driver is
given a reference that it must give back to cfg80211_send_rx_assoc
or to cfg80211_assoc_timeout
. To ensure proper refcounting, new
association requests while already associating must be rejected.
Extra IEs to add to (Re)Association Request frame or NULL
previous BSSID, if not NULL
use reassociate frame. This is used
to indicate a request to reassociate within the ESS instead of a request
do the initial association with the ESS. When included, this is set to
the BSSID of the current association, i.e., to the value that is
included in the Current AP address field of the Reassociation Request
frame.
Length of ie buffer in octets
crypto settings
Use management frame protection (IEEE 802.11w) in this association
See enum cfg80211_assoc_req_flags
HT Capabilities over-rides. Values set in ht_capa_mask will be used in ht_capa. Un-supported values will be ignored.
The bits of ht_capa which are to be used.
VHT capability override
VHT capability mask indicating which fields to use
FILS KEK for protecting (Re)Association Request/Response frame or
NULL
if FILS is not used.
Length of fils_kek in octets
FILS nonces (part of AAD) for protecting (Re)Association
Request/Response frame or NULL
if FILS is not used. This field starts
with 16 octets of STA Nonce followed by 16 octets of AP Nonce.