Espandi Riduci a icona

DOT11_AUTH_ALGORITHM enumeration

The DOT11_AUTH_ALGORITHM enumeration defines a wireless LAN (WLAN) authentication algorithm.

Syntax


typedef enum _DOT11_AUTH_ALGORITHM { 
  DOT11_AUTH_ALGO_80211_OPEN        = 1,
  DOT11_AUTH_ALGO_80211_SHARED_KEY  = 2,
  DOT11_AUTH_ALGO_WPA               = 3,
  DOT11_AUTH_ALGO_WPA_PSK           = 4,
  DOT11_AUTH_ALGO_WPA_NONE          = 5,
  DOT11_AUTH_ALGO_RSNA              = 6,
  DOT11_AUTH_ALGO_RSNA_PSK          = 7,
  DOT11_AUTH_ALGO_IHV_START         = 0x80000000,
  DOT11_AUTH_ALGO_IHV_END           = 0xffffffff
} DOT11_AUTH_ALGORITHM, *PDOT11_AUTH_ALGORITHM;

Constants

DOT11_AUTH_ALGO_80211_OPEN

Specifies an IEEE 802.11 Open System authentication algorithm.

DOT11_AUTH_ALGO_80211_SHARED_KEY

Specifies an IEEE 802.11 Shared Key authentication algorithm that requires the use of a pre-shared Wired Equivalent Privacy (WEP) key for the 802.11 authentication.

DOT11_AUTH_ALGO_WPA

Specifies a Wi-Fi Protected Access (WPA) algorithm. IEEE 802.1X port authorization is performed by the supplicant, authenticator, and authentication server. Cipher keys are dynamically derived through the authentication process.

This algorithm is valid only for basic service set (BSS) types of dot11_BSS_type_infrastructure.

When the WPA algorithm is enabled, the 802.11 station associates only with an access point whose beacon or probe responses contain the authentication suite of type 1 (802.1X) within the WPA information element (IE).

DOT11_AUTH_ALGO_WPA_PSK

Specifies a Wi-Fi Protected Access (WPA) algorithm that uses preshared keys (PSK). IEEE 802.1X port authorization is performed by the supplicant and authenticator. Cipher keys are dynamically derived through a preshared key that is used on both the supplicant and authenticator.

This algorithm is valid only for BSS types of dot11_BSS_type_infrastructure.

When the WPA PSK algorithm is enabled, the 802.11 station will associate only with an access point whose beacon or probe responses contain the authentication suite of type 2 (preshared key) within the WPA IE.

DOT11_AUTH_ALGO_WPA_NONE

This value is not supported.

DOT11_AUTH_ALGO_RSNA

Specifies an IEEE 802.11i Robust Security Network Association (RSNA) algorithm. IEEE 802.1X port authorization is performed by the supplicant, authenticator, and authentication server. Cipher keys are dynamically derived through the authentication process.

This algorithm is valid only for BSS types of dot11_BSS_type_infrastructure.

When the RSNA algorithm is enabled, the 802.11 station will associate only with an access point whose beacon or probe responses contain the authentication suite of type 1 (802.1X) within the Robust Security Network (RSN) IE.

DOT11_AUTH_ALGO_RSNA_PSK

Specifies an IEEE 802.11i RSNA algorithm that uses PSK. IEEE 802.1X port authorization is performed by the supplicant and authenticator. Cipher keys are dynamically derived through a pre-shared key that is used on both the supplicant and authenticator.

When the RSNA PSK algorithm is enabled, the 802.11 station will associate only with an access point whose beacon or probe responses contain the authentication suite of type 2 (preshared key) within the RSN IE.

DOT11_AUTH_ALGO_IHV_START

Specifies the start of the range that specifies proprietary authentication algorithms that are developed by an IHV.

The DOT11_AUTH_ALGO_IHV_START enumerator is valid only when the miniport driver is operating in Extensible Station (ExtSTA) mode.

DOT11_AUTH_ALGO_IHV_END

Specifies the end of the range that specifies proprietary authentication algorithms that are developed by an IHV.

The DOT11_AUTH_ALGO_IHV_END enumerator is valid only when the miniport driver is operating in ExtSTA mode.

Remarks

An IHV can assign a value for its proprietary authentication algorithms from DOT11_AUTH_ALGO_IHV_START through DOT11_AUTH_ALGO_IHV_END. The IHV must assign a unique number from this range for each of its proprietary authentication algorithms.

If the IHV develops its own support for an authentication algorithm supported by the operating system, the IHV must also assign a unique number from this range. For example, if the IHV develops its own version of RSNA, it must assign a value for this version from DOT11_AUTH_ALGO_IHV_START through DOT11_AUTH_ALGO_IHV_END.

Note  The 802.11 station must implicitly enable the 802.11 Open System authentication algorithm whenever it enables a WPA or RSNA authentication algorithm.

Starting with Windows 7, an 802.11 miniport driver can report any combination of supported authentication and cipher algorithm pairs in the DOT11_AUTH_CIPHER_PAIR_LIST structure. However, if the operating system starts Soft AP, it enables only the DOT11_AUTH_ALGO_RSNA_PSK authentication algorithm and the DOT11_CIPHER_ALGO_CCMP cipher algorithm. To support Soft AP, the miniport driver must support this authentication/cipher pair.

If WPS is enabled on a NIC that is operating in Extensible AP mode, the miniport driver must allow peer stations to associate with the Extensible AP by using Open System Authentication or Wired Equivalent Privacy (WEP) algorithms, regardless of the enabled authorization and cipher algorithms. For more information about WPS and Extensible AP, see OID_DOT11_WPS_ENABLED.

Requirements

Version

Available in Windows Vista and later versions of the Windows operating systems.

Header

Wlantypes.h (include Ndis.h)

See also

DOT11_ASSOCIATION_COMPLETION_PARAMETERS
DOT11_AUTH_CIPHER_PAIR
DOT11_AUTH_CIPHER_PAIR_LIST
OID_DOT11_ENABLED_AUTHENTICATION_ALGORITHM

 

 

Send comments about this topic to Microsoft

Mostra:
© 2014 Microsoft