Lines Matching full:driver

2  * Driver interface definition
8 * This file defines a driver interface used by both %wpa_supplicant and
10 * driver operations. This is followed by the struct wpa_driver_ops that each
11 * driver wrapper will beed to define with callback functions for requesting
12 * driver operations. After this, there are definitions for driver event
154 * channel (used internally in src/ap/acs.c; driver wrappers do not
354 * scan result processing if left zero by the driver wrapper)
364 * driver. Each driver interface implementation is responsible for converting
365 * the driver or OS specific scan results into this format.
367 * If the driver does not support reporting all IEs, the IE data structure is
373 * frame (or if the driver does not indicate source of IEs, these may also be
375 * (with beacon_ie_len octets of data) if the driver provides both IE sets.
403 * @fetch_time: Time when the results were fetched from the driver
490 * This optional parameter can be used to request the driver wrapper to
496 * The driver wrapper is allowed to take this allocated buffer into its
497 * own use by setting the pointer to %NULL. In that case, the driver
514 * The driver may filter scan results in firmware to reduce host
523 * When set, the driver is expected to remove rates 1, 2, 5.5, and 11
530 * only_new_results - Request driver to report only new results
532 * This is used to request the driver to report only BSSes that have
539 * low_priority - Requests driver to use a lower scan priority
541 * This is used to request the driver to use a lower scan priority
547 * mac_addr_rand - Requests driver to randomize MAC address
593 * driver may ignore this parameter and start immediately (or at any
611 * scan request if the host driver/kernel supports concurrent scan
612 * requests. This cookie is returned from the corresponding driver
633 * mandatory (and the driver should reject the scan request if it is
675 * - Max Channel Time - driver fills FILS request params IE with
690 * If this is set, the driver should scan non-PSC channels from the
978 * This can be %NULL, if ap_scan=2 mode is used and the driver is
986 * initial association for drivers that use driver/firmwate-based BSS
988 * the driver from selecting other BSSes in the ESS.
1011 * hint for the driver. Unlike the @freq parameter, @freq_hint does not
1012 * limit the driver from selecting other channels for
1013 * driver/firmware-based BSS selection.
1019 * background scan, or -1 to indicate no change to default driver
1025 * beacon_int - Beacon interval for IBSS or 0 to use driver default
1033 * of this WPA IE is optional. If the driver generates the WPA
1036 * the driver has to notify wpa_supplicant about the used WPA
1041 * instead. The driver can determine which version is used by
1092 * SME in the driver may choose key_mgmt from this list for the initial
1093 * connection or roaming. The driver which doesn't support this
1145 * is the 32-octet (256-bit) PSK, if available. The driver wrapper
1170 * Configure the driver to drop all non-EAPOL frames (both receive and
1187 * If the driver needs to do special configuration for WPS association,
1595 * This is used by driver which advertises this capability.
1810 * The driver will use these to include RNR elements in EMA beacons.
1838 * psk - PSK passed to the driver for 4-way handshake offload
1925 * Only used when driver does not support separate unicast/individual
1994 * Key ID is supported by the driver.)
2051 * abstracted P2P Device function in the driver
2080 * struct wpa_driver_capa - Driver capability information
2135 /** Driver generated WPA/RSN IE */
2137 /** Driver needs static WEP key setup after association command */
2139 /** Driver takes care of all DFS operations */
2141 /** Driver takes care of RSN 4-way handshake internally; PMK is configured with
2144 /** Driver is for a wired Ethernet interface */
2146 /** Driver provides separate commands for authentication and association (SME in
2149 /** Driver supports AP mode */
2151 /** Driver needs static WEP key setup after association has been completed */
2153 /** Driver supports dynamic HT 20/40 MHz channel changes during BSS lifetime */
2155 /** Driver supports concurrent P2P operations */
2158 * Driver uses the initial interface as a dedicated management interface, i.e.,
2164 /** Driver supports station and key removal when stopping an AP */
2167 * Driver uses the initial interface for P2P management interface and non-P2P
2173 * Driver is known to use valid error codes, i.e., when it indicates that
2178 /** Driver supports off-channel TX */
2180 /** Driver indicates TX status events for EAPOL Data frames */
2182 /** Driver indicates TX status events for Deauth/Disassoc frames */
2184 /** Driver supports roaming (BSS selection) in firmware */
2186 /** Driver supports operating as a TDLS peer */
2188 /** Driver requires external TDLS setup/teardown/discovery */
2190 /** Driver indicates support for Probe Response offloading in AP mode */
2192 /** Driver supports U-APSD in AP mode */
2194 /** Driver supports inactivity timer in AP mode */
2196 /** Driver expects user space implementation of MLME in AP mode */
2198 /** Driver supports SAE with user space SME */
2200 /** Driver makes use of OBSS scan mechanism in wpa_supplicant */
2202 /** Driver supports IBSS (Ad-hoc) mode */
2204 /** Driver supports radar detection */
2206 /** Driver supports a dedicated interface for P2P Device */
2208 /** Driver supports QoS Mapping */
2210 /** Driver supports CSA in AP mode */
2212 /** Driver supports mesh */
2214 /** Driver support ACS offload */
2216 /** Driver supports key management offload */
2218 /** Driver supports TDLS channel switching */
2220 /** Driver supports IBSS with HT datarates */
2222 /** Driver supports IBSS with VHT datarates */
2224 /** Driver supports automatic band selection */
2226 /** Driver supports simultaneous off-channel operations */
2228 /** Driver supports full AP client state */
2230 /** Driver supports P2P Listen offload */
2232 /** Driver supports FILS */
2234 /** Driver supports Beacon frame TX rate configuration (legacy rates) */
2236 /** Driver supports Beacon frame TX rate configuration (HT rates) */
2238 /** Driver supports Beacon frame TX rate configuration (VHT rates) */
2240 /** Driver supports mgmt_tx with random TX address in non-connected state */
2242 /** Driver supports mgmt_tx with random TX addr in connected state */
2244 /** Driver supports better BSS reporting with sched_scan in connected mode */
2246 /** Driver supports HE capabilities */
2248 /** Driver supports FILS shared key offload */
2250 /** Driver supports all OCE STA specific mandatory features */
2252 /** Driver supports all OCE AP specific mandatory features */
2255 * Driver supports all OCE STA-CFON specific mandatory features only.
2256 * If a driver sets this bit but not the %WPA_DRIVER_FLAGS_OCE_AP, the
2257 * userspace shall assume that this driver may not support all OCE AP
2261 /** Driver supports MFP-optional in the connect command */
2263 /** Driver is a self-managed regulatory device */
2265 /** Driver supports FTM responder functionality */
2267 /** Driver support 4-way handshake offload for WPA-Personal */
2269 /** Driver supports a separate control port TX for EAPOL frames */
2271 /** Driver supports VLAN offload */
2273 /** Driver supports UPDATE_FT_IES command */
2275 /** Driver can correctly rekey PTKs without Extended Key ID */
2277 /** Driver supports Beacon protection */
2279 /** Driver supports Extended Key ID */
2283 /** Driver supports a separate control port RX for EAPOL frames */
2285 /** Driver supports TX status reports for EAPOL frames through control port */
2287 /** Driver supports secure LTF in AP mode */
2289 /** Driver supports secure RTT measurement exchange in AP mode */
2292 * Driver supports protection of range negotiation and measurement management
2296 /** Driver supports Beacon frame TX rate configuration (HE rates) */
2298 /** Driver supports Beacon protection only in client mode */
2300 /** Driver supports Operating Channel Validation */
2302 /** Driver expects user space implementation of SME in AP mode */
2304 /** Driver handles SA Query procedures in AP mode */
2306 /** Driver supports background radar/CAC detection */
2308 /** Driver supports secure LTF in STA mode */
2310 /** Driver supports secure RTT measurement exchange in STA mode */
2313 * Driver supports protection of range negotiation and measurement management
2317 /** Driver supports MLO in station/AP mode */
2319 /** Driver supports minimal scan request probe content */
2321 /** Driver supports SAE authentication offload in STA mode */
2323 /** Driver support AP_PSK authentication offload */
2325 /** Driver supports OWE STA offload */
2327 /** Driver supports OWE AP offload */
2329 /** Driver support AP SAE authentication offload */
2331 /** Driver supports TWT responder in HT and VHT modes */
2370 * max_stations - Maximum number of associated stations the driver
2376 * probe_resp_offloads - Bitmap of supported protocols by the driver
2379 /** Driver Probe Response offloading support for WPS ver. 1 */
2381 /** Driver Probe Response offloading support for WPS ver. 2 */
2383 /** Driver Probe Response offloading support for P2P */
2385 /** Driver Probe Response offloading support for IEEE 802.11u (Interworking) */
2397 * extended_capa - extended capabilities in driver/device
2399 * Must be allocated and freed by driver and the pointers must be
2400 * valid for the lifetime of the driver, i.e., freed in deinit()
2407 /** Driver adds the DS Params Set IE in Probe Request frames */
2409 /** Driver adds the WFA TPC IE in Probe Request frames */
2411 /** Driver handles quiet period requests */
2414 * Driver is capable of inserting the current TX power value into the body of
2424 * Driver supports RRM. With this support, the driver will accept to use RRM in
2429 /** Driver supports setting the scan dwell time */
2431 /** Driver supports Beacon Report Measurement */
2436 /* Driver concurrency capabilities */
2622 WNM_SLEEP_TFS_REQ_IE_ADD, /* STA requests driver to add TFS req IE */
2624 WNM_SLEEP_TFS_REQ_IE_SET, /* AP requests driver to set TFS req IE for
2626 WNM_SLEEP_TFS_RESP_IE_ADD, /* AP requests driver to add TFS resp IE
2629 WNM_SLEEP_TFS_RESP_IE_SET, /* AP requests driver to set TFS resp IE
2904 * from user space to the driver.
2932 * Used to process the PASN authentication event from the driver to
2934 * @own_addr: Own MAC address specified by the driver to use for PASN
2950 * the driver
2966 * These are used across the PASN authentication event from the driver to
2986 * @action: Add or delete a security context to the driver.
3046 * struct wpa_driver_ops - Driver interface API definition
3048 * This structure defines the API that each driver interface needs to implement
3049 * for core wpa_supplicant code. All driver specific functionality is captured
3053 /** Name of the driver interface */
3055 /** One line description of the driver interface */
3060 * @priv: private driver interface data
3065 * Query kernel driver for the current BSSID and copy it to bssid.
3073 * @priv: private driver interface data
3078 * Query kernel driver for the current SSID and copy it to ssid.
3090 * @priv: private driver interface data
3094 * Configure the given key for the kernel driver. If the driver
3115 * init - Initialize driver interface
3122 * Initialize driver interface, including event processing for kernel
3123 * driver events (e.g., associated, scan results, Michael MIC failure).
3126 * needed in future driver operations. If this is not used, non-NULL
3140 * deinit - Deinitialize driver interface
3141 * @priv: private driver interface data from init()
3143 * Shut down driver interface and processing of driver events. Free
3149 * set_param - Set driver configuration parameters
3150 * @priv: private driver interface data from init()
3151 * @param: driver specific configuration parameters
3155 * Optional handler for notifying driver interface about configuration
3162 * @priv: private driver interface data
3167 * Configure TKIP countermeasures. When these are enabled, the driver
3173 * deauthenticate - Request driver to deauthenticate
3174 * @priv: private driver interface data
3184 * associate - Request driver to associate
3185 * @priv: private driver interface data
3194 * add_pmkid - Add PMKSA cache entry to the driver
3195 * @priv: private driver interface data
3205 * If the driver generates RSN IE, i.e., it does not use wpa_ie in
3207 * in the driver. If the driver uses wpa_ie from wpa_supplicant, this
3209 * the driver does not support WPA, this function is not needed.
3214 * remove_pmkid - Remove PMKSA cache entry to the driver
3215 * @priv: private driver interface data
3224 * If the driver generates RSN IE, i.e., it does not use wpa_ie in
3226 * between the driver and wpa_supplicant. If the driver uses wpa_ie
3228 * implemented. Likewise, if the driver does not support WPA, this
3235 * @priv: private driver interface data
3242 * If the driver generates RSN IE, i.e., it does not use wpa_ie in
3244 * between the driver and wpa_supplicant. If the driver uses wpa_ie
3246 * implemented. Likewise, if the driver does not support WPA, this
3252 * get_capa - Get driver capabilities
3253 * @priv: private driver interface data
3257 * Get driver/firmware/hardware capabilities.
3262 * poll - Poll driver for association information
3263 * @priv: private driver interface data
3265 * This is an optional callback that can be used when the driver does
3268 * information. The driver interface is supposed to generate associnfo
3270 * driver interface should generate an association event after having
3277 * @priv: private driver interface data
3285 * @priv: private driver interface data
3290 * This optional function can be used to allow the driver interface to
3298 * @priv: private driver interface data
3303 * device from the driver interface code. This is only needed if the
3310 * @priv: private driver interface data
3324 * @priv: Private driver interface data
3331 * This is an optional function that can be used to set the driver to
3343 * @priv: Private driver interface data
3356 * @priv: Private driver interface data
3361 * driver decide
3377 * @priv: Private driver interface data
3383 * The supplicant uses this callback to let the driver know that keying
3384 * material for FT is available and that the driver can use the
3387 * This function is only needed for driver that support IEEE 802.11r
3395 * @priv: Private driver interface data
3406 * @priv: private driver interface data
3415 * @priv: Private driver interface data
3426 * @priv: Private driver interface data
3433 * global_init - Global driver initialization
3437 * This optional function is called to initialize the driver wrapper
3440 * implemented to free the private data. The driver will also likely
3447 * global_deinit - Global driver deinitialization
3448 * @priv: private driver global data from global_init()
3450 * Terminate any global driver related functionality and free the
3456 * init2 - Initialize driver interface (with global data)
3460 * @global_priv: private driver global data from global_init()
3463 * This function can be used instead of init() if the driver wrapper
3470 * @global_priv: private driver global data from global_init()
3478 * scan2 - Request the driver to initiate scan
3479 * @priv: private driver interface data
3484 * Once the scan results are ready, the driver should report scan
3491 * authenticate - Request driver to authenticate
3492 * @priv: private driver interface data
3507 * @priv: Private driver interface data
3511 * to add for Beacon and Probe Response frames for the driver in
3512 * AP mode. The driver is responsible for building the full Beacon
3514 * driver/firmware and finishing with the tail part. Depending on the
3515 * driver architectue, this can be done either by using the full
3517 * Similarly, Probe Response processing depends on the driver design.
3518 * If the driver (or firmware) takes care of replying to Probe Request
3528 * @priv: Private driver interface data
3537 * hapd_init - Initialize driver interface (hostapd only)
3539 * @params: Configuration for the driver wrapper
3542 * This function is used instead of init() or init2() when the driver
3549 * hapd_deinit - Deinitialize driver interface (hostapd only)
3550 * @priv: Private driver interface data from hapd_init()
3556 * @priv: Private driver interface data
3560 * This is an optional function to configure the kernel driver to
3563 * always enabled and the driver uses set_ap() to set WPA/RSN IE
3572 * @priv: Private driver interface data
3577 * kernel driver for Beacon frames. This can be left undefined (set to
3578 * %NULL) if the driver uses the Beacon template from set_ap().
3587 * @priv: Private driver interface data
3604 * @priv: Private driver interface data
3609 * This function requests the driver to disassociate all associated
3611 * driver does not process association frames internally.
3617 * @priv: Private driver interface data
3623 * kernel driver for Beacon and Probe Response frames. This can be left
3624 * undefined (set to %NULL) if the driver uses the Beacon template from
3633 * @priv: Private driver interface data
3643 * @priv: Private driver interface data
3653 * This is like a normal Ethernet send except that the driver is aware
3656 * the frame and other driver management operations such as key
3661 * This function is only used for a given interface if the driver
3671 * @priv: private driver interface data
3688 * @priv: Private driver interface data
3703 * @priv: Private driver interface data
3717 * @priv: Private driver interface data
3725 * @priv: Private driver interface data
3730 * This function need not be implemented if the driver uses Beacon
3737 * @priv: Private driver interface data
3748 * @priv: Private driver interface data
3752 * This need not be implemented if the driver does not take care of
3759 * @priv: Private driver interface data
3764 * entry in the driver. Adding STA entries is used only if the driver
3768 * is used to add a station entry to the driver once the station has
3779 * @priv: Private driver interface data
3787 * @priv: Private driver interface data
3795 * @priv: Private driver interface data
3803 * @priv: Private driver interface data
3811 * @priv: Private driver interface data
3819 * @priv: Private driver interface data
3832 * @priv: Private driver interface data
3842 * @priv: Private driver interface data
3855 * @priv: Private driver interface data
3861 * @drv_priv: Pointer for overwriting the driver context or %NULL if
3864 * driver ended up using if it differs from the requested ifname
3866 * (this may differ from the requested addr if the driver cannot
3880 * @priv: Private driver interface data
3890 * @priv: Private driver interface data
3908 * @priv: driver private data
3911 * This optional handler function can be registered if the driver
3920 * @priv: Private driver interface data
3931 * @priv: Private driver interface data
3939 * @priv: Private driver interface data
3947 * This is an optional function to add WPS IE in the kernel driver for
3949 * to %NULL) if the driver uses the Beacon template from set_ap()
3950 * and does not process Probe Request frames. If the driver takes care
3956 * frames when operating as a GO. The driver is responsible for adding
3971 * @priv: Private driver interface data
3979 * @priv: Private driver interface data
3994 * @priv: Private driver interface data
4005 * This command can be used to request the driver to transmit an action
4027 * @priv: Private driver interface data
4031 * set in the driver flags.
4037 * @priv: Private driver interface data
4042 * This command is used to request the driver to remain awake on the
4048 * The driver may not be at the requested channel when this function
4051 * EVENT_REMAIN_ON_CHANNEL event indicates that the driver has
4062 * @priv: Private driver interface data
4075 * @priv: Private driver interface data
4079 * This command can be used to request the driver to indicate when
4084 * used to notify the driver when the Probe Request frames need to be
4091 * @priv: Private driver interface data
4096 * change the driver mode to station mode to allow normal station
4103 * @priv: Private driver interface data
4114 * @priv: Private driver interface data
4120 * @priv: Private driver interface data
4126 * @priv: Private driver interface data
4142 * @priv: Private driver interface data
4155 * @priv: Private driver interface data
4169 * @priv: Private driver interface data
4180 * @priv: Private driver interface data
4188 * @priv: Private driver interface data
4201 * @priv: private driver interface data
4214 * This optional function can be used to send packet to driver which is
4223 * tdls_oper - Ask the driver to perform high-level TDLS operations
4224 * @priv: Private driver interface data
4230 * to the driver.
4235 * wnm_oper - Notify driver of the WNM frame reception
4236 * @priv: Private driver interface data
4239 * @buf: Buffer for the driver to fill in (for getting IE)
4248 * @priv: Private driver interface data
4257 * @priv: Private driver interface data
4269 * @priv: Private driver interface data
4296 * @priv: Private driver interface data
4302 * @priv: Private driver interface data
4309 * @priv: Private driver interface data
4316 * @priv: Private driver interface data
4324 * @priv: Private driver interface data
4332 * @priv: Private driver interface data
4337 * mode when static WEP is used. If the driver uses user space MLME/SME
4346 * driver_cmd - Execute driver-specific command
4347 * @priv: Private driver interface data
4358 * @priv: Private driver interface data
4369 * the driver/device. The command is identified by vendor id and
4375 * The exact driver behavior is driver interface and vendor specific. As
4377 * command in case of the nl80211 driver interface.
4386 * @priv: Private driver interface data
4394 * driver/firmware to process EAPOL-Key frames in Group Key Handshake
4403 * @priv: Private driver interface data
4412 * This function indicates the driver to send (Re)Association
4420 * @priv: private driver interface data
4430 * @priv: Private driver interface data
4443 * add_sta_node - Add a station node in the driver
4444 * @priv: Private driver interface data
4449 * This function adds the station node in the driver, when
4455 * sched_scan - Request the driver to initiate scheduled scan
4456 * @priv: Private driver interface data
4462 * driver should report scan results event for wpa_supplicant
4471 * stop_sched_scan - Request the driver to stop a scheduled scan
4472 * @priv: Private driver interface data
4483 * @priv: Private driver interface data
4490 * driver provides such inactivity polling mechanism.
4497 * @priv: Private driver interface data
4510 * @priv: Private driver interface data
4522 * @priv: Private driver interface data
4532 * @priv: Private driver interface data
4545 * @priv: Private driver interface data
4554 * @priv: Private driver interface data
4560 * The function indicates to driver that it can start switching to a
4570 * @priv: Private driver interface data
4574 * This function indicates to the driver that it should stop switching
4581 * @priv: Private driver interface data
4589 * @priv: Private driver interface data
4601 * @priv: Private driver interface data
4625 * status - Get driver interface status information
4626 * @priv: Private driver interface data
4634 * roaming - Set roaming policy for driver-based BSS selection
4635 * @priv: Private driver interface data
4641 * associate() command (bssid being set there indicates that the driver
4643 * If the driver does not indicate WPA_DRIVER_FLAGS_BSS_SELECTION
4651 * @priv: Private driver interface data
4655 * This callback can be used to configure driver and below layers to
4662 * @priv: Private driver interface data
4674 * macsec_get_capability - Inform MKA of this driver's capability
4675 * @priv: Private driver interface data
4676 * @cap: Driver's capability
4683 * @priv: Private driver interface data
4692 * @priv: Private driver interface data
4701 * @priv: Private driver interface data
4711 * @priv: Private driver interface data
4721 * @priv: Private driver interface data
4729 * @priv: Private driver interface data
4738 * @priv: Private driver interface data
4746 * @priv: Private driver interface data
4754 * @priv: Private driver interface data
4762 * @priv: Private driver interface data
4770 * @priv: Private driver interface data
4783 * @priv: private driver interface data from init()
4791 * @priv: private driver interface data from init()
4799 * @priv: Private driver interface data from init()
4807 * @priv: private driver interface data from init()
4815 * @priv: private driver interface data from init()
4823 * @priv: private driver interface data from init()
4833 * @priv: private driver interface data from init()
4841 * @priv: private driver interface data from init()
4849 * @priv: Private driver interface data from init()
4857 * @priv: private driver interface data from init()
4865 * @priv: private driver interface data from init()
4873 * init_mesh - Driver specific initialization for mesh
4874 * @priv: Private driver interface data
4881 * @priv: Private driver interface data
4890 * @priv: Private driver interface data
4898 * @priv: Private driver interface data
4909 * @priv: Private driver interface data
4913 * This command can be used to offload ACS to the driver if the driver
4919 * set_band - Notify driver of band(s) selection
4920 * @priv: Private driver interface data
4928 * @priv: Private driver interface data
4935 * the driver specific to a particular interface type. The freq_list
4937 * indicate the number of entries fetched from the driver.
4945 * @priv: Private driver interface data
4949 * This command can be used to inform the driver of the operating
4956 * abort_scan - Request the driver to abort an ongoing scan
4957 * @priv: Private driver interface data
4967 * @priv: Private driver interface data
4976 * @priv: Private driver interface data
4989 * @priv: Private driver interface data
5000 * @priv: Private driver interface data
5019 * @priv: Private driver interface data
5026 * @priv: Private driver interface data
5031 * The driver can use these by default when there are no scan IEs coming
5034 * request, the driver should merge the missing scan IEs in the scan
5041 * set_tdls_mode - Set TDLS trigger mode to the host driver
5042 * @priv: Private driver interface data
5047 * trigger control mode to the host driver.
5053 * @priv: Private driver interface data
5063 * ignore_assoc_disallow - Configure driver to ignore assoc_disallow
5064 * @priv: Private driver interface data
5071 * set_bssid_tmp_disallow - Set disallowed BSSIDs to the driver
5072 * @priv: Private driver interface data
5081 * @priv: Private driver interface data
5088 * driver uses the updated parameters for subsequent roaming. This is
5098 * authentication processing to the host driver.
5099 * @priv: Private driver interface data
5108 * @priv: Private driver interface data
5117 * @priv: Private driver interface data
5124 * This callback is used to let the driver know the DH processing result
5131 * dpp_listen - Notify driver about start/stop of DPP listen
5132 * @priv: Private driver interface data
5143 * the specified peer to the driver.
5144 * @priv: Private driver interface data
5154 * driver.
5155 * @priv: Private driver interface data
5163 * @priv: Private driver interface data
5174 * @priv: Private driver interface data
5184 * @priv: Private driver interface data
5195 * is_drv_shared - Check whether the driver interface is shared
5196 * @priv: Private driver interface data from init()
5199 * Checks whether the driver interface is being used by other partner
5200 * BSS(s) or not. This is used to decide whether the driver interface
5209 * @priv: Private driver interface data
5230 * This event needs to be delivered when the driver completes IEEE
5235 * more information about the association. If the driver interface gets
5246 * sending either of these frames to the current AP. If the driver
5257 * the local driver. Additional data for event processing is
5270 * is called. If the driver provides an unsolicited event when the scan
5273 * driver, the driver wrapper code is expected to use a registered
5287 * EVENT_ASSOC. Alternatively, the driver interface can include
5318 * EVENT_PMKID_CANDIDATE can be called whenever the driver has updates
5325 * Driver will be notified about successful pre-authentication with
5340 * The driver is expected to report the received FT IEs from
5349 * The driver can use this event to inform wpa_supplicant about a STA
5360 * completed. This is only used if the driver supports separate
5419 * This event is used to indicate when the driver has started the
5428 * This event is used to indicate when the driver has completed
5440 * union wpa_event_data::rx_probe_req. The driver is required to report
5463 * deliver the receive EAPOL frames from the driver.
5504 * This event is used to indicate that the driver cannot maintain this
5508 * the driver does not support radar detection and another virtual
5519 * Driver generates this event whenever it detects a better channel
5548 * Driver generates this event whenever it detected that a particular
5560 * EVENT_DRIVER_GTK_REKEY - Device/driver did GTK rekey
5563 * of the current EAPOL-Key Replay Counter in case the driver/firmware
5613 * This event indicates that the driver reported a connection failure
5653 * This event gets triggered when a driver query is issued for survey
5665 * This indicates that driver has started a scan operation either based
5677 * information in the driver.
5699 * on a DFS frequency by a driver that supports DFS Offload.
5731 * necessary information from the host driver for the authentication to
5739 * This event should be indicated when the driver completes the 4-way
5784 * This event is used to indicate when the driver has completed
5811 * EVENT_PASN_AUTH - This event is used by the driver that requests
5837 * This event is used by the driver to indicate the received TID-to-link
5922 * driver interface does not need to generate separate EVENT_ASSOCINFO
5934 * If the driver generates WPA/RSN IE, this event data must be
5952 * Optional association data from the driver. This data is not
5954 * such, should be reported if this is available to the driver
5986 * again (without scan request). At this point, the driver is
6239 * During FT (IEEE 802.11r) authentication sequence, the driver is
6288 * Optional association data from the driver. This data is not
6290 * such, should be reported if this is available to the driver
6326 * reason_code - Connection failure reason code from the driver
6366 * drv_priv - Pointer to store driver private BSS information
6708 * @ch_width: Selected Channel width by driver. Driver may choose to
6709 * change hostapd configured ACS channel width due driver internal
6819 * offloaded to the driver.
6838 * wpa_supplicant_event - Report a driver event for wpa_supplicant
6844 * Driver wrapper code should call this function whenever an event is received
6845 * from the driver.
6851 * wpa_supplicant_event_global - Report a driver event for wpa_supplicant
6941 /* Convert driver flag to string */
6945 /* NULL terminated array of linked in driver wrappers */