Lines Matching full:authentication

186  * preshared key authentication in station mode. In %NL80211_CMD_CONNECT
194 * handshakes during 802.1X authentication in station mode. In order to
202 * preshared key authentication in AP mode. In %NL80211_CMD_START_AP
214 * DOC: FILS shared key authentication offload
216 * FILS shared key authentication offload can be advertized by drivers by
218 * FILS shared key authentication offload should be able to construct the
219 * authentication and association frames for FILS shared key authentication and
227 * rIK should be used to generate an authentication tag on the ERP message and
232 * When FILS shared key authentication is completed, driver needs to provide the
252 * DOC: SAE authentication offload
255 * support offloading SAE authentication for WPA3-Personal networks in station
510 * authentication where %NL80211_ATTR_FILS_CACHE_ID is the identifier
516 * authentication.
546 * @NL80211_CMD_AUTHENTICATE: authentication request and notification.
549 * authentication process.
553 * the SSID (mainly for association, but is included in authentication
557 * authentication type. %NL80211_ATTR_IE is used to define IEs
560 * When used as an event, this reports reception of an Authentication
567 * also used to indicate if the authentication attempt timed out. In that
570 * pending authentication timed out).
651 * authentication/association or not receiving a response from the AP.
800 * reoccurring, the userspace authentication daemon may want to create the
802 * depending on the authentication result.
1093 * drivers that do not define separate commands for authentication and
1094 * association, but rely on user space for the authentication to happen.
1096 * to trigger the authentication and command response (userspace to
1097 * driver) to indicate the authentication status.
1101 * this interface to offload only the authentication part to the user
1102 * space. Authentication frames are passed between the driver and user
1104 * further with the association after getting successful authentication
1105 * status. User space indicates the authentication status through
1109 * Host driver reports this status on an authentication failure to the
1811 * is requesting a local authentication/association state change without
2041 * @NL80211_ATTR_AUTH_DATA: Fields and elements in Authentication frames.
2042 * This contains the authentication frame body (non-IE and IE data),
2043 * excluding the Authentication algorithm number, i.e., starting at the
2044 * Authentication transaction sequence number field. It is used with
2045 * authentication algorithms that need special fields to be added into
2047 * initial two fields (Authentication transaction sequence number and
2049 * for all authentication algorithms to keep the attribute definition
2390 * @NL80211_ATTR_FILS_ERP_USERNAME: EAP Re-authentication Protocol (ERP)
2394 * @NL80211_ATTR_FILS_ERP_REALM: EAP Re-authentication Protocol (ERP) realm part
2400 * for FILS authentication and is used with %NL80211_CMD_CONNECT.
2402 * @NL80211_ATTR_FILS_ERP_RRK: ERP re-authentication Root Key (rRK) for the
2405 * from successful FILS authentication and is used with
2416 * authentication it is used with %NL80211_CMD_SET_PMK. For offloaded FT
2426 * in %NL80211_CMD_CONNECT to indicate that for 802.1X authentication it
2432 * authentication operation (u32 attribute with an
2436 * space supports external authentication. This attribute shall be used
2438 * may offload authentication processing to user space if this capability
2489 * SAE authentication for WPA3-Personal networks.
2528 * authentication. This timeout helps authentication methods like SAE,
2530 * authentication instead of getting updated during an association for EAP
2531 * authentication. No new full authentication within the PMK expiry shall
2538 * driver to trigger a full authentication roam (without PMKSA caching)
2542 * Authentication methods like SAE need to be able to generate a new PMKSA
2573 * derivation in WPA3-Personal networks which are using SAE authentication.
3497 * authentication server (u8, 0 or 1)
4392 * will advertise that it is connected to a authentication server
4457 * @NL80211_MESH_SETUP_USERSPACE_AUTH: Enable this option if an authentication
4460 * @NL80211_MESH_SETUP_USERSPACE_AMPE: Enable this option if an authentication
4477 * @NL80211_MESH_SETUP_AUTH_PROTOCOL: Inform the kernel of the authentication
4479 * Default is no authentication method required.
4724 * keeps track of whether or not authentication was done with
4741 * @NL80211_AUTHTYPE_OPEN_SYSTEM: Open System authentication
4742 * @NL80211_AUTHTYPE_SHARED_KEY: Shared Key authentication (WEP only)
4745 * @NL80211_AUTHTYPE_SAE: Simultaneous authentication of equals
5656 * @NL80211_PMKSA_CANDIDATE_PREAUTH: RSN pre-authentication supported (flag)
5710 * @NL80211_FEATURE_SAE: This driver supports simultaneous authentication of
5729 * they should be added before even sending the authentication reply
5868 * authentication with %NL80211_CMD_CONNECT.
5930 * @NL80211_EXT_FEATURE_SAE_OFFLOAD: Device wants to do SAE authentication in
5973 * @NL80211_EXT_FEATURE_SAE_OFFLOAD_AP: Device wants to do SAE authentication
6106 * @NL80211_TIMEOUT_AUTH: Authentication timed out.
6322 * the authentication. Exclusively defined for host drivers that
6324 * to handle certain authentication algorithms (e.g. SAE).
6607 * authentication request. Used by NL80211_ATTR_EXTERNAL_AUTH_ACTION.
6608 * @NL80211_EXTERNAL_AUTH_START: Start the authentication.
6609 * @NL80211_EXTERNAL_AUTH_ABORT: Abort the ongoing authentication.
7244 * derivation. Applicable only when WPA3-Personal SAE authentication is