Lines Matching defs:frame

1107  * @tmpl: Template data for FILS discovery frame including the action
1108 * frame headers.
1393 * @subtype: Management frame subtype to use for indicating removal
1395 * @reason_code: Reason code for the Disassociation/Deauthentication frame
1663 * @ack_signal: signal strength (in dBm) of the last ACK frame.
1905 * which a mesh STA can send only one action frame containing a PREQ
1908 * which a mesh STA can send only one Action frame containing a PERR
1934 * during which a mesh STA can send only one Action frame containing
2360 * @chan: channel the frame was received on
2365 * received; should match the time when the frame was actually
2368 * If the frame isn't buffered, just passing the return value of
2371 * timestamp field of the frame. The time is the TSF of the BSS specified
2391 * @tsf: TSF contained in the frame that carried these IEs
2414 * @beacon_interval: the beacon interval as from the frame
2418 * proberesp_ies depending on whether Probe Response frame has been
2420 * @beacon_ies: the information elements from the last Beacon frame
2424 * @proberesp_ies: the information elements from the last Probe Response frame
2502 * @ie: Extra IEs to add to Authentication frame or %NULL
2508 * the authentication frame body (non-IE and IE data), excluding the
2551 * @ie: Extra IEs to add to (Re)Association Request frame or %NULL
2553 * @use_mfp: Use management frame protection (IEEE 802.11w) in this association
2555 * @prev_bssid: previous BSSID, if not %NULL use reassociate frame. This is used
2560 * frame.
2567 * @fils_kek: FILS KEK for protecting (Re)Association Request/Response frame or
2571 * Request/Response frame or %NULL if FILS is not used. This field starts
2599 * @ie: Extra IEs to add to Deauthentication frame or %NULL
2603 * do not set a deauth frame
2620 * @ie: Extra IEs to add to Disassociation frame or %NULL
2624 * Disassociation frame is to be transmitted.
2728 * @mfp: indicate whether management frame protection is used
2744 * @prev_bssid: previous BSSID, if not %NULL use reassociate frame. This is used
2749 * frame.
3047 * frame triggers an 802.3 frame should be reported, for
3048 * disconnect due to deauth 802.11 frame. This indicates which
3099 * This structure provides information needed to transmit a mgmt frame
3106 * @no_cck: don't use cck rates for this frame
3109 * @csa_offsets: array of all the csa offsets in the frame
3362 * @tx_rate: bitrate for transmitted FTM action frame response
3363 * @rx_rate: bitrate of received FTM action frame
3454 * @preamble: frame preamble to use
3560 * struct mgmt_frame_regs - management frame registrations data
3561 * @global_stypes: bitmap of management frame subtypes registered
3563 * @interface_stypes: bitmap of management frame subtypes registered
3620 * @set_default_mgmt_key: set the default management frame key on an interface
3622 * @set_default_beacon_key: set the default Beacon frame key on an interface
3692 * from the AP or cfg80211_connect_timeout() if no frame with status code
3698 * frame instead of Association Request frame.
3751 * operation (e.g., public action frame exchange). When the driver is
3757 * @mgmt_tx: Transmit a management frame.
3759 * frame on another channel
3798 * @update_mgmt_frame_registrations: Notify the driver that management frame
3808 * @tdls_mgmt: Transmit a TDLS management frame.
3860 * with the given parameters; action frame exchange has been handled by
3909 * @tx_control_port: TX a control port frame (EAPoL). The noencrypt parameter
3910 * tells the driver that the frame should not be encrypted.
3921 * @probe_mesh_link: Probe direct Mesh peer's link quality by sending data frame
4785 * @mgmt_stypes: bitmasks of frame subtypes that can be subscribed to or
4859 * @txq_limit: configuration of internal TX queue frame limit
5581 * @skb: the frame
5593 * ieee80211_hdrlen - get header length in bytes from frame control
5594 * @fc: frame control field in little-endian format
5617 * ieee80211_data_to_8023_exthdr - convert an 802.11 data frame to 802.3
5618 * @skb: the 802.11 data frame
5631 * ieee80211_data_to_8023 - convert an 802.11 data frame to 802.3
5632 * @skb: the 802.11 data frame
5644 * ieee80211_amsdu_to_8023s - decode an IEEE 802.11n A-MSDU frame
5650 * @skb: The input A-MSDU frame without any headers.
5665 * cfg80211_classify8021d - determine the 802.1p/1d tag for a data frame
5666 * @skb: the data frame
5869 * cfg80211_send_layer2_update - send layer 2 update frame
6069 * cfg80211_inform_bss_frame_data - inform cfg80211 of a received BSS frame
6072 * @mgmt: the management frame (probe response or beacon)
6073 * @len: length of the management frame
6163 * enum cfg80211_bss_frame_type - frame type that the BSS data came from
6180 * @ftype: frame type (if known)
6332 * cfg80211_rx_mlme_mgmt - notification of processed MLME management frame
6334 * @buf: authentication frame (header + body)
6335 * @len: length of the frame data
6338 * deauthentication frame has been received and processed in station mode.
6344 * disassociation and deauthentication frames. If the frame couldn't be used
6367 * @buf: (Re)Association Response frame (header + body)
6368 * @len: length of the frame data
6371 * @req_ies: information elements from the (Re)Association Request frame
6406 * cfg80211_tx_mlme_mgmt - notification of transmitted deauth/disassoc frame
6408 * @buf: 802.11 frame (header + body)
6409 * @len: length of the frame data
6419 * cfg80211_rx_unprot_mlme_mgmt - notification of unprotected mlme mgmt frame
6421 * @buf: received management frame (header + body)
6422 * @len: length of the frame data
6425 * frame has been dropped in station mode because of MFP being used but the
6426 * frame was not protected. This is also used to notify reception of a Beacon
6427 * frame that was dropped because it did not include a valid MME MIC while
6438 * @addr: The source MAC address of the frame
6439 * @key_type: The key type that the received frame used
6441 * @tsc: The TSC value of the frame that generated the MIC failure (6 octets)
6445 * received frame. This matches with MLME-MICHAELMICFAILURE.indication()
6826 * failure due to a timeout (e.g., not receiving an Authentication frame
6898 * failure due to a timeout (e.g., not receiving an Authentication frame
6984 * out the Authentication or Association Request frame or timing out while
7063 * @ie: information elements of the deauth/disassoc frame (may be %NULL)
7185 * cfg80211_rx_mgmt_khz - notification of received, unprocessed management frame
7186 * @wdev: wireless device receiving the frame
7187 * @freq: Frequency on which the frame was received in KHz
7189 * @buf: Management frame (header + body)
7190 * @len: length of the frame data
7193 * This function is called whenever an Action frame is received for a station
7196 * Return: %true if a user space application has registered for this frame.
7199 * driver is responsible for rejecting the frame.
7205 * cfg80211_rx_mgmt - notification of received, unprocessed management frame
7206 * @wdev: wireless device receiving the frame
7207 * @freq: Frequency on which the frame was received in MHz
7209 * @buf: Management frame (header + body)
7210 * @len: length of the frame data
7213 * This function is called whenever an Action frame is received for a station
7216 * Return: %true if a user space application has registered for this frame.
7219 * driver is responsible for rejecting the frame.
7230 * cfg80211_mgmt_tx_status - notification of TX status for management frame
7231 * @wdev: wireless device receiving the frame
7233 * @buf: Management frame (header + body)
7234 * @len: length of the frame data
7235 * @ack: Whether frame was acknowledged
7238 * This function is called whenever a management frame was requested to be
7248 * @wdev: wireless device receiving the frame
7250 * @buf: Data frame (header + body)
7251 * @len: length of the frame data
7252 * @ack: Whether frame was acknowledged
7255 * This function is called whenever a control port frame was requested to be
7264 * cfg80211_rx_control_port - notification about a received control port frame
7265 * @dev: The device the frame matched to
7266 * @skb: The skbuf with the control port frame. It is assumed that the skbuf
7271 * @unencrypted: Whether the frame was received unencrypted
7274 * frame. It should only be used if userspace indicated it wants to receive
7277 * The frame is the data portion of the 802.3 or 802.11 data frame with all
7278 * network layer headers removed (e.g. the raw EAPoL frame).
7280 * Return: %true if the frame was passed to userspace
7354 * frame.
7398 * cfg80211_rx_spurious_frame - inform userspace about a spurious frame
7399 * @dev: The device the frame matched to
7404 * a spurious class 3 frame was received, to be able to deauth the
7406 * Return: %true if the frame was passed to userspace (or this failed
7413 * cfg80211_rx_unexpected_4addr_frame - inform about unexpected WDS frame
7414 * @dev: The device the frame matched to
7419 * an associated station sent a 4addr frame but that wasn't expected.
7422 * Return: %true if the frame was passed to userspace (or this failed
7434 * @ack_signal: signal strength (in dBm) of the ACK frame.
7445 * @frame: the frame
7446 * @len: length of the frame
7447 * @freq: frequency the frame was received on in KHz
7454 void cfg80211_report_obss_beacon_khz(struct wiphy *wiphy, const u8 *frame,
7460 * @frame: the frame
7461 * @len: length of the frame
7462 * @freq: frequency the frame was received on
7470 const u8 *frame, size_t len,
7473 cfg80211_report_obss_beacon_khz(wiphy, frame, len, MHZ_TO_KHZ(freq),