Lines Matching +full:ftm +full:- +full:src

3  * Copyright (c) 2003-2017, Jouni Malinen <j@w1.fi>
74 * enum reg_change_initiator - Regulatory change initiator
85 * enum reg_type - Regulatory change types
96 * struct hostapd_wmm_rule - WMM regulatory rule
110 * struct hostapd_channel_data - Channel information
114 * chan - Channel number (IEEE 802.11)
119 * freq - Frequency in MHz
124 * flag - Channel flags (HOSTAPD_CHAN_*)
129 * allowed_bw - Allowed channel width bitmask
136 * max_tx_power - Regulatory transmit power limit in dBm
141 * survey_list - Linked list of surveys (struct freq_survey)
146 * min_nf - Minimum observed noise floor, in dBm, based on all
153 * interference_factor - Computed interference factor on this
154 * channel (used internally in src/ap/acs.c; driver wrappers do not
161 * dfs_cac_ms - DFS CAC time in milliseconds
166 * wmm_rules_valid - Indicates wmm_rules state
171 * wmm_rules - WMM regulatory rules
176 * punct_bitmap - RU puncturing bitmap
188 * struct he_capabilities - IEEE 802.11ax HE capabilities
199 /* struct eht_capabilities - IEEE 802.11be EHT capabilities */
224 * struct ieee80211_edmg_config - EDMG configuration
242 * struct hostapd_hw_modes - Supported hardware mode information
246 * mode - Hardware mode
251 * is_6ghz - Whether the mode information is for the 6 GHz band
256 * num_channels - Number of entries in the channels array
261 * channels - Array of supported channels
266 * num_rates - Number of entries in the rates array
271 * rates - Array of supported rates in 100 kbps units
276 * ht_capab - HT (IEEE 802.11n) capabilities
281 * mcs_set - MCS (IEEE 802.11n) rate parameters
286 * a_mpdu_params - A-MPDU (IEEE 802.11n) parameters
291 * vht_capab - VHT (IEEE 802.11ac) capabilities
296 * vht_mcs_set - VHT MCS (IEEE 802.11ac) rate parameters
303 * he_capab - HE (IEEE 802.11ax) capabilities
314 * eht_capab - EHT (IEEE 802.11be) capabilities
326 /* type - bits 0..1 */
339 * struct wpa_scan_res - Scan result for an BSS/IBSS
355 * @snr: Signal-to-noise ratio in dB (calculated during scan result processing)
400 * struct wpa_scan_results - Scan results
412 * struct wpa_interface_info - Network interface information
431 * struct wpa_driver_scan_ssid - SSIDs to scan for
432 * @ssid - specific SSID to scan for (ProbeReq)
433 * %NULL or zero-length SSID is used to indicate active scan
435 * @ssid_len - Length of the SSID in octets
444 * downlink - Bitmap of TIDs mapped with a link in downlink direction
449 * uplink - Bitmap of TIDs mapped with a link in uplink direction
455 * struct wpa_driver_scan_params - Scan parameters
460 * ssids - SSIDs to scan for
465 * num_ssids - Number of entries in ssids array
471 * extra_ies - Extra IE(s) to add into Probe Request or %NULL
476 * extra_ies_len - Length of extra_ies in octets
481 * freqs - Array of frequencies to scan or %NULL for all frequencies
483 * The frequency is set in MHz. The array is zero-terminated.
488 * filter_ssids - Filter for reporting SSIDs
507 * num_filter_ssids - Number of entries in filter_ssids array
512 * filter_rssi - Filter by RSSI
521 * p2p_probe - Used to disable CCK (802.11b) rates for P2P probes
530 * only_new_results - Request driver to report only new results
539 * low_priority - Requests driver to use a lower scan priority
547 * mac_addr_rand - Requests driver to randomize MAC address
552 * mac_addr - MAC address used with randomization. The address cannot be
558 * mac_addr_mask - MAC address mask used with randomization.
568 * sched_scan_plans - Scan plans for scheduled scan
585 * sched_scan_plans_num - Number of scan plans in sched_scan_plans array
590 * sched_scan_start_delay - Delay to use before starting the first scan
599 * bssid - Specific BSSID to scan for
608 * scan_cookie - Unique identification representing the scan request
622 * duration - Dwell time on each channel
630 * duration_mandatory - Whether the specified duration is mandatory
640 * relative_rssi_set - Whether relative RSSI parameters are set
645 * relative_rssi - Relative RSSI for reporting better BSSs
653 * relative_adjust_band - Band to which RSSI should be adjusted
661 * relative_adjust_rssi - RSSI to be added to relative_adjust_band
673 * - Accept broadcast Probe Response frame.
674 * - Probe Request frame deferral and suppression.
675 * - Max Channel Time - driver fills FILS request params IE with
677 * - Send 1st Probe Request frame in rate of minimum 5.5 Mbps.
682 * p2p_include_6ghz - Include 6 GHz channels for P2P full scan
688 * non_coloc_6ghz - Force scanning of non-PSC 6 GHz channels
690 * If this is set, the driver should scan non-PSC channels from the
692 * report a co-located AP on these channels. The default is to scan
693 * non-PSC channels only if a co-located AP was reported on the channel.
698 * min_probe_req_content - Minimize probe request content to only have
705 * link_id - Specify the link that is requesting the scan on an MLD
708 * -1 indicates that no particular link ID is set.
720 * struct wpa_driver_auth_params - Authentication parameters
737 * p2p - Whether this connection is a P2P group
742 * auth_data - Additional elements for Authentication frame
751 * auth_data_len - Length of auth_data buffer in octets
756 * mld - Establish an MLD connection
761 * mld_link_id - The link ID of the MLD AP to which we are associating
772 * enum wps_mode - WPS mode
776 * WPS_MODE_NONE - No WPS provisioning being used
781 * WPS_MODE_OPEN - WPS provisioning with AP that is in open mode
786 * WPS_MODE_PRIVACY - WPS provisioning with AP that is using protection
792 * struct hostapd_freq_params - Channel parameters
796 * mode - Mode/band (HOSTAPD_MODE_IEEE80211A, ..)
801 * freq - Primary channel center frequency in MHz
806 * channel - Channel number
811 * ht_enabled - Whether HT is enabled
816 * sec_channel_offset - Secondary channel offset for HT40
819 * -1 = HT40 enabled, secondary channel below primary,
825 * vht_enabled - Whether VHT is enabled
830 * he_enabled - Whether HE is enabled
835 * center_freq1 - Segment 0 center frequency in MHz
842 * center_freq2 - Segment 1 center frequency in MHz
844 * Non-zero only for bandwidth 80 and an 80+80 channel
849 * bandwidth - Channel bandwidth in MHz (20, 40, 80, 160)
860 * radar_background - Whether radar/CAC background is requested
865 * eht_enabled - Whether EHT is enabled
876 * struct wpa_driver_sta_auth_params - Authentication parameters
882 * own_addr - Source address and BSSID for authentication frame
887 * addr - MAC address of the station to associate
892 * seq - authentication sequence number
897 * status - authentication response status code
902 * ie - authentication frame ie buffer
907 * len - ie buffer length
912 * fils_auth - Indicates whether FILS authentication is being performed
917 * fils_anonce - ANonce (required for FILS)
922 * fils_snonce - SNonce (required for FILS)
927 * fils_kek - key for encryption (required for FILS)
932 * fils_kek_len - Length of the fils_kek in octets (required for FILS)
939 * mld_addr - AP's MLD address
944 * valid_links - The valid links including the association link
949 * assoc_link_id - The link on which the association is performed
954 * mld_links - Link information
972 * struct wpa_driver_associate_params - Association parameters
977 * bssid - BSSID of the selected AP
983 * bssid_hint - BSSID of a proposed AP
986 * initial association for drivers that use driver/firmwate-based BSS
993 * ssid - The selected SSID
998 * ssid_len - Length of the SSID (1..32)
1003 * freq - channel parameters
1008 * freq_hint - Frequency of the channel the proposed AP is using
1013 * driver/firmware-based BSS selection.
1018 * bg_scan_period - Background scan period in seconds, 0 to disable
1019 * background scan, or -1 to indicate no change to default driver
1025 * beacon_int - Beacon interval for IBSS or 0 to use driver default
1030 * wpa_ie - WPA information element for (Re)Association Request
1050 * wpa_ie_len - length of the wpa_ie
1055 * wpa_proto - Bitfield of WPA_PROTO_* values to indicate WPA/WPA2
1060 * pairwise_suite - Selected pairwise cipher suite (WPA_CIPHER_*)
1067 * group_suite - Selected group cipher suite (WPA_CIPHER_*)
1074 * mgmt_group_suite - Selected group management cipher suite (WPA_CIPHER_*)
1081 * key_mgmt_suite - Selected key management suite (WPA_KEY_MGMT_*)
1088 * allowed_key_mgmts - Bitfield of allowed key management suites
1099 * auth_alg - Allowed authentication algorithms
1105 * mode - Operation mode (infra/ibss) IEEE80211_MODE_*
1110 * wep_key - WEP keys for static WEP configuration
1115 * wep_key_len - WEP key length for static WEP configuration
1120 * wep_tx_keyidx - WEP TX key index for static WEP configuration
1125 * mgmt_frame_protection - IEEE 802.11w management frame protection
1130 * passphrase - RSN passphrase for PSK
1132 * This value is made available only for WPA/WPA2-Personal (PSK) and
1141 * psk - RSN PSK (alternative for passphrase for PSK)
1143 * This value is made available only for WPA/WPA2-Personal (PSK) and
1145 * is the 32-octet (256-bit) PSK, if available. The driver wrapper
1151 * sae_password - Password for SAE authentication
1153 * This value is made available only for WPA3-Personal (SAE) and only
1159 * sae_password_id - Password Identifier for SAE authentication
1161 * This value is made available only for WPA3-Personal (SAE) and only
1168 * drop_unencrypted - Enable/disable unencrypted frame filtering
1170 * Configure the driver to drop all non-EAPOL frames (both receive and
1177 * prev_bssid - Previously used BSSID in this ESS
1185 * wps - WPS mode
1194 * p2p - Whether this connection is a P2P group
1199 * uapsd - UAPSD parameters for the network
1200 * -1 = do not change defaults
1207 * fixed_bssid - Whether to force this BSSID in IBSS mode
1214 * fixed_freq - Fix control channel in IBSS mode
1222 * disable_ht - Disable HT (IEEE 802.11n) for this connection
1227 * htcaps - HT Capabilities over-rides
1237 * htcaps_mask - HT Capabilities over-rides mask
1245 * disable_vht - Disable VHT for this connection
1258 * disable_he - Disable HE for this connection
1264 * req_key_mgmt_offload - Request key management offload for connection
1272 * req_handshake_offload - Request EAPOL handshake offload
1286 * pbss - If set, connect to a PCP in a PBSS. Otherwise, connect to an
1292 * fils_kek - KEK for FILS association frame protection (AES-SIV)
1302 * fils_nonces - Nonces for FILS association frame protection
1303 * (AES-SIV AAD)
1313 * fils_erp_username - Username part of keyName-NAI
1318 * fils_erp_username_len - Length of fils_erp_username in bytes
1323 * fils_erp_realm - Realm/domain name to use in FILS ERP
1328 * fils_erp_realm_len - Length of fils_erp_realm in bytes
1333 * fils_erp_next_seq_num - The next sequence number to use in FILS ERP
1339 * fils_erp_rrk - Re-authentication root key (rRK) for the keyName-NAI
1345 * fils_erp_rrk_len - Length of fils_erp_rrk in bytes
1350 * sae_pwe - SAE mechanism for PWE derivation
1351 * 0 = hunting-and-pecking loop only
1352 * 1 = hash-to-element only
1353 * 2 = both hunting-and-pecking loop and hash-to-element enabled
1358 * disable_eht - Disable EHT for this connection
1363 * mld_params - MLD association parameters
1408 * head - Beacon head from IEEE 802.11 header to IEs before TIM IE
1413 * head_len - Length of the head buffer in octets
1418 * tail - Beacon tail following TIM IE
1423 * tail_len - Length of the tail buffer in octets
1428 * dtim_period - DTIM period
1433 * beacon_int - Beacon interval
1438 * basic_rates: -1 terminated array of basic rates in 100 kbps
1450 * rate_type (legacy: in 100 kbps units, HT: HT-MCS, VHT: VHT-MCS,
1451 * HE: HE-MCS). If beacon_rate == 0 and rate_type == 0
1462 * proberesp - Probe Response template
1470 * proberesp_len - Length of the proberesp buffer in octets
1475 * ssid - The SSID to use in Beacon/Probe Response frames
1480 * ssid_len - Length of the SSID (1..32)
1485 * hide_ssid - Whether to hide the SSID
1490 * pairwise_ciphers - WPA_CIPHER_* bitfield
1495 * group_cipher - WPA_CIPHER_*
1500 * key_mgmt_suites - WPA_KEY_MGMT_* bitfield
1505 * auth_algs - WPA_AUTH_ALG_* bitfield
1510 * wpa_version - WPA_PROTO_* bitfield
1515 * privacy - Whether privacy is used in the BSS
1520 * beacon_ies - WPS/P2P IE(s) for Beacon frames
1528 * proberesp_ies - P2P/WPS IE(s) for Probe Response frames
1536 * assocresp_ies - WPS IE(s) for (Re)Association Response frames
1544 * isolate - Whether to isolate frames between associated stations
1546 * If this is non-zero, the AP is requested to disable forwarding of
1552 * cts_protect - Whether CTS protection is enabled
1557 * preamble - Whether short preamble is enabled
1562 * short_slot_time - Whether short slot time is enabled
1564 * 0 = short slot time disable, 1 = short slot time enabled, -1 = do
1570 * ht_opmode - HT operation mode or -1 if HT not in use
1575 * interworking - Whether Interworking is enabled
1580 * hessid - Homogeneous ESS identifier or %NULL if not set
1585 * access_network_type - Access Network Type (0..15)
1593 * ap_max_inactivity - Timeout in seconds to detect STA's inactivity
1600 * ctwindow - Client Traffic Window (in TUs)
1605 * disable_dgaf - Whether group-addressed frames are disabled
1610 * osen - Whether OSEN security is enabled
1615 * freq - Channel parameters for dynamic bandwidth changes
1620 * reenable - Whether this is to re-enable beaconing
1625 * pbss - Whether to start a PCP (in PBSS) instead of an AP in
1631 * multicast_to_unicast - Whether to use multicast_to_unicast
1633 * If this is non-zero, the AP is requested to perform multicast to
1652 * ftm_responder - Whether FTM responder is enabled
1657 * lci - Binary data, the content of an LCI report IE with type 8 as
1658 * defined in IEEE Std 802.11-2016, 9.4.2.22.10
1663 * civic - Binary data, the content of a measurement report IE with
1664 * type 11 as defined in IEEE Std 802.11-2016, 9.4.2.22.13
1669 * he_spr_ctrl - Spatial Reuse control field of SPR element
1674 * he_spr_non_srg_obss_pd_max_offset - Non-SRG Maximum TX power offset
1679 * he_spr_srg_obss_pd_min_offset - Minimum TX power offset
1684 * he_spr_srg_obss_pd_max_offset - Maximum TX power offset
1689 * he_spr_bss_color_bitmap - BSS color values used by members of the
1695 * he_spr_partial_bssid_bitmap - Partial BSSID values used by members
1701 * he_bss_color - Whether the BSS Color is disabled
1706 * he_bss_color_partial - The BSS Color AID equation
1711 * he_bss_color - The BSS Color of the AP
1716 * twt_responder - Whether Target Wait Time responder is enabled
1721 * sae_pwe - SAE mechanism for PWE derivation
1722 * 0 = hunting-and-pecking loop only
1723 * 1 = hash-to-element only
1724 * 2 = both hunting-and-pecking loop and hash-to-element enabled
1749 * mbssid_tx_iface - Transmitting interface of the MBSSID set
1754 * mbssid_index - The index of this BSS in the MBSSID set
1759 * mbssid_elem - Buffer containing all MBSSID elements
1764 * mbssid_elem_len - Total length of all MBSSID elements
1769 * mbssid_elem_count - The number of MBSSID elements
1774 * mbssid_elem_offset - Offsets to elements in mbssid_elem.
1780 * ema - Enhanced MBSSID advertisements support.
1785 * punct_bitmap - Preamble puncturing bitmap
1793 * rnr_elem - This buffer contains all of reduced neighbor report (RNR)
1799 * rnr_elem_len - Length of rnr_elem buffer
1804 * rnr_elem_count - Number of RNR elements
1809 * rnr_elem_offset - The offsets to the elements in rnr_elem.
1818 * allowed_freqs - List of allowed 20 MHz channel center frequencies in
1828 * mld_ap - Whether operating as an AP MLD
1833 * mld_link_id - Link id for MLD BSS's
1838 * psk - PSK passed to the driver for 4-way handshake offload
1843 * psk_len - PSK length in bytes (0 = not set)
1848 * sae_password - SAE password for SAE offload
1893 * ifname - Interface name (for multi-SSID/VLAN support) */
1897 * alg - Encryption algorithm
1907 * addr - Address of the peer STA
1912 * is used to indicate that both the broadcast-only and default key of
1917 * key_idx - Key index
1923 * set_tx - Configure this key as the default Tx key
1930 * seq - Sequence number/packet number
1939 * seq_len - Length of the seq, depends on the algorithm
1945 * key - Key buffer
1947 * TKIP: 16-byte temporal key, 8-byte Tx Mic key, 8-byte Rx Mic Key */
1951 * key_len - Length of the key buffer in octets
1957 * vlan_id - VLAN index (0..4095) for VLAN offload cases */
1961 * key_flag - Additional key flags
1965 * So far the only use-case is changing RX/TX status for
1981 * Valid and pre-defined combinations are:
1985 * Default WEP or WPA-NONE key.
1999 * Not a valid standalone key type but pre-defined to be combined
2006 * link_id - MLO Link ID
2008 * Set to a valid Link ID (0-14) when applicable, otherwise -1. */
2014 * WPA_IF_STATION - Station mode interface
2019 * WPA_IF_AP_VLAN - AP mode VLAN interface
2027 * WPA_IF_AP_BSS - AP mode BSS interface
2034 * WPA_IF_P2P_GO - P2P Group Owner
2039 * WPA_IF_P2P_CLIENT - P2P Client
2044 * WPA_IF_P2P_GROUP - P2P Group interface (will become either
2050 * WPA_IF_P2P_DEVICE - P2P Device interface is used to identify the
2056 * WPA_IF_MESH - Mesh interface
2061 * WPA_IF_TDLS - TDLS offchannel interface (used for pref freq only)
2066 * WPA_IF_IBSS - IBSS interface (used for pref freq only)
2071 * WPA_IF_NAN - NAN Device
2080 * struct wpa_driver_capa - Driver capability information
2141 /** Driver takes care of RSN 4-way handshake internally; PMK is configured with
2159 * it cannot be used for P2P group operations or non-P2P purposes.
2167 * Driver uses the initial interface for P2P management interface and non-P2P
2178 /** Driver supports off-channel TX */
2192 /** Driver supports U-APSD in AP mode */
2202 /** Driver supports IBSS (Ad-hoc) mode */
2226 /** Driver supports simultaneous off-channel operations */
2240 /** Driver supports mgmt_tx with random TX address in non-connected state */
2255 * Driver supports all OCE STA-CFON specific mandatory features only.
2258 * functionality but can support only OCE STA-CFON functionality.
2261 /** Driver supports MFP-optional in the connect command */
2263 /** Driver is a self-managed regulatory device */
2265 /** Driver supports FTM responder functionality */
2267 /** Driver support 4-way handshake offload for WPA-Personal */
2365 * max_remain_on_chan - Maximum remain-on-channel duration in msec
2370 * max_stations - Maximum number of associated stations the driver
2376 * probe_resp_offloads - Bitmap of supported protocols by the driver
2397 * extended_capa - extended capabilities in driver/device
2489 int bytes_64bit; /* whether 64-bit byte counters are supported */
2506 int signal; /* dBm; or -WPA_INVALID_NOISE */
2585 /** Interface name (for multi-SSID/VLAN support) */
2634 /* enum smps_mode - SMPS mode definitions */
2648 * struct wpa_signal_info - Information about channel signal quality
2674 * struct wpa_channel_info - Information about the current channel
2677 * @sec_channel: Location of the secondary 20 MHz channel (either +1 or -1).
2694 * struct beacon_data - Beacon data
2725 * struct csa_settings - Settings for channel switch command
2727 * @block_tx: 1 - block transmission for CSA period
2733 * @punct_bitmap - Preamble puncturing bitmap
2734 * @link_id: Link ID to determine the link for MLD; -1 for non-MLD
2755 * struct cca_settings - Settings for color switch command
2795 * struct wmm_params - WMM parameterss configured for this association
2850 /* Indicates the link if MLO case; -1 otherwise */
2889 * struct external_auth - External authentication trigger parameters
2930 * struct pasn_peer - PASN peer parameters
2964 * struct pasn_auth - PASN authentication trigger parameters
2983 * struct secure_ranging_params - Parameters required to set secure ranging
3006 /* enum nested_attr - Used to specify if subcommand uses nested attributes */
3046 * struct wpa_driver_ops - Driver interface API definition
3059 * get_bssid - Get the current BSSID
3063 * Returns: 0 on success, -1 on failure
3072 * get_ssid - Get the current SSID
3076 * Returns: Length of the SSID on success, -1 on failure
3089 * set_key - Configure encryption key
3092 * Returns: 0 on success, -1 on failure
3115 * init - Initialize driver interface
3126 * needed in future driver operations. If this is not used, non-NULL
3140 * deinit - Deinitialize driver interface
3149 * set_param - Set driver configuration parameters
3153 * Returns: 0 on success, -1 on failure
3161 * set_countermeasures - Enable/disable TKIP countermeasures
3165 * Returns: 0 on success, -1 on failure
3173 * deauthenticate - Request driver to deauthenticate
3176 * @reason_code: 16-bit reason code to be sent in the deauthentication
3179 * Returns: 0 on success, -1 on failure
3184 * associate - Request driver to associate
3188 * Returns: 0 on success, -1 on failure
3194 * add_pmkid - Add PMKSA cache entry to the driver
3198 * Returns: 0 on success, -1 on failure
3201 * either normal authentication or RSN pre-authentication. The PMKSA
3214 * remove_pmkid - Remove PMKSA cache entry to the driver
3218 * Returns: 0 on success, -1 on failure
3234 * flush_pmkid - Flush PMKSA cache
3237 * Returns: 0 on success, -1 on failure
3252 * get_capa - Get driver capabilities
3255 * Returns: 0 on success, -1 on failure
3262 * poll - Poll driver for association information
3267 * when receiving WPA/RSN EAPOL-Key messages that require association
3276 * get_ifindex - Get interface index
3284 * get_ifname - Get interface name
3297 * get_mac_addr - Get own MAC address
3309 * set_operstate - Sets device operating state to DORMANT or UP
3312 * Returns: 0 on success, -1 on failure
3323 * mlme_setprotection - MLME-SETPROTECTION.request primitive
3329 * Returns: 0 on success, -1 on failure
3333 * interface defined in IEEE 802.11i-2004 clause 10.3.22.1
3334 * (MLME-SETPROTECTION.request). Many drivers do not use explicit
3342 * get_hw_feature_data - Get hardware support data (channels and rates)
3355 * send_mlme - Send management frame from MLME
3366 * @wait: Time to wait off-channel for a response (in ms), or zero
3367 * @link_id: Link ID to use for TX, or -1 if not set
3368 * Returns: 0 on success, -1 on failure
3376 * update_ft_ies - Update FT (IEEE 802.11r) IEs
3381 * Returns: 0 on success, -1 on failure
3394 * get_scan_results - Fetch the latest scan results
3405 * get_scan_results2 - Fetch the latest scan results
3414 * set_country - Set country
3417 * Returns: 0 on success, -1 on failure
3425 * get_country - Get country
3428 * Returns: 0 on success, -1 on failure
3433 * global_init - Global driver initialization
3442 * data available to per-interface initializer.
3447 * global_deinit - Global driver deinitialization
3456 * init2 - Initialize driver interface (with global data)
3469 * get_interfaces - Get information about available interfaces
3478 * scan2 - Request the driver to initiate scan
3482 * Returns: 0 on success, -1 on failure
3491 * authenticate - Request driver to authenticate
3494 * Returns: 0 on success, -1 on failure
3506 * set_ap - Set Beacon and Probe Response information for AP mode
3522 * Returns: 0 on success, -1 on failure
3527 * set_acl - Set ACL in AP mode
3530 * Returns: 0 on success, -1 on failure
3537 * hapd_init - Initialize driver interface (hostapd only)
3549 * hapd_deinit - Deinitialize driver interface (hostapd only)
3555 * set_ieee8021x - Enable/disable IEEE 802.1X support (AP only)
3558 * Returns: 0 on success, -1 on failure
3566 * DEPRECATED - use set_ap() instead
3571 * set_privacy - Enable/disable privacy (AP only)
3574 * Returns: 0 on success, -1 on failure
3580 * DEPRECATED - use set_ap() instead
3585 * get_seqnum - Fetch the current TSC/packet number (AP only)
3590 * @link_id: Link ID for a group key, or -1 if not set
3592 * Returns: 0 on success, -1 on failure
3603 * flush - Flush all association stations (AP only)
3606 * stations will be flushed, -1 otherwise.
3607 * Returns: 0 on success, -1 on failure
3616 * set_generic_elem - Add IEs into Beacon/Probe Response frames (AP)
3620 * Returns: 0 on success, -1 on failure
3627 * DEPRECATED - use set_ap() instead
3632 * read_sta_data - Fetch station data
3636 * Returns: 0 on success, -1 on failure
3642 * tx_control_port - Send a frame over the 802.1X controlled port
3649 * @link_id: Link ID to use for TX, or -1 if not set
3658 * IEEE 802.11 protocols such as race conditions between rekeying 4-way
3670 * hapd_send_eapol - Send an EAPOL packet (AP only)
3678 * @link_id: Link ID to use for TX, or -1 if not set
3680 * Returns: 0 on success, -1 on failure
3687 * sta_deauth - Deauthenticate a station (AP only)
3692 * @link_id: Link ID to use for Deauthentication frame, or -1 if not set
3693 * Returns: 0 on success, -1 on failure
3702 * sta_disassoc - Disassociate a station (AP only)
3707 * Returns: 0 on success, -1 on failure
3716 * sta_remove - Remove a station entry (AP only)
3719 * Returns: 0 on success, -1 on failure
3724 * hapd_get_ssid - Get the current SSID (AP only)
3728 * Returns: Length of the SSID on success, -1 on failure
3736 * hapd_set_ssid - Set SSID (AP only)
3740 * Returns: 0 on success, -1 on failure
3742 * DEPRECATED - use set_ap() instead
3747 * hapd_set_countermeasures - Enable/disable TKIP countermeasures (AP)
3750 * Returns: 0 on success, -1 on failure
3758 * sta_add - Add a station entry
3761 * Returns: 0 on success, -1 on failure
3763 * This function is used to add or set (params->set 1) a station
3771 * With TDLS, this function is used to add or set (params->set 1)
3778 * get_inact_sec - Get station inactivity duration (AP only)
3781 * Returns: Number of seconds station has been inactive, -1 on failure
3786 * sta_clear_stats - Clear station statistics (AP only)
3789 * Returns: 0 on success, -1 on failure
3794 * set_freq - Set channel/frequency (AP only)
3797 * Returns: 0 on success, -1 on failure
3802 * set_rts - Set RTS threshold
3805 * Returns: 0 on success, -1 on failure
3810 * set_frag - Set fragmentation threshold
3813 * Returns: 0 on success, -1 on failure
3818 * sta_set_flags - Set station flags (AP only)
3824 * Returns: 0 on success, -1 on failure
3831 * sta_set_airtime_weight - Set station airtime weight (AP only)
3835 * Returns: 0 on success, -1 on failure
3841 * set_tx_queue_params - Set TX queue parameters
3848 * @link_id: Link ID to use, or -1 for non MLD.
3854 * if_add - Add a virtual interface
3871 * Returns: 0 on success, -1 on failure
3879 * if_remove - Remove a virtual interface
3883 * Returns: 0 on success, -1 on failure
3889 * set_sta_vlan - Bind a station into a specific interface (AP only)
3894 * @link_id: The link ID or -1 for non-MLO
3895 * Returns: 0 on success, -1 on failure
3907 * commit - Optional commit changes handler (AP only)
3909 * Returns: 0 on success, -1 on failure
3919 * set_radius_acl_auth - Notification of RADIUS ACL change
3924 * Returns: 0 on success, -1 on failure
3930 * set_radius_acl_expire - Notification of RADIUS ACL expiration
3933 * Returns: 0 on success, -1 on failure
3938 * set_ap_wps_ie - Add WPS IE(s) into Beacon/Probe Response frames (AP)
3945 * Returns: 0 on success, -1 on failure
3963 * DEPRECATED - use set_ap() instead
3970 * set_supp_port - Set IEEE 802.1X Supplicant Port status
3973 * Returns: 0 on success, -1 on failure
3978 * set_wds_sta - Bind a station into a 4-address WDS (AP only)
3982 * @val: 1 = bind to 4-address WDS; 0 = unbind
3987 * Returns: 0 on success, -1 on failure
3993 * send_action - Transmit an Action frame
3996 * @wait: Time to wait off-channel for a response (in ms), or zero
3998 * @src: Source MAC address (Address 2)
4003 * Returns: 0 on success, -1 on failure
4013 * if a remain-on-channel duration is in progress, the frame must be
4018 * If @src differs from the device MAC address, use of a random
4022 const u8 *dst, const u8 *src, const u8 *bssid,
4026 * send_action_cancel_wait - Cancel action frame TX wait
4036 * remain_on_channel - Remain awake on a channel
4040 * Returns: 0 on success, -1 on failure
4061 * cancel_remain_on_channel - Cancel remain-on-channel operation
4064 * This command can be used to cancel a remain-on-channel operation
4069 * remain-on-channel operation.
4074 * probe_req_report - Request Probe Request frames to be indicated
4077 * Returns: 0 on success, -1 on failure (or if not supported)
4085 * reported, e.g., during remain-on-channel operations.
4090 * deinit_ap - Deinitialize AP mode
4092 * Returns: 0 on success, -1 on failure (or if not supported)
4102 * deinit_p2p_cli - Deinitialize P2P client mode
4104 * Returns: 0 on success, -1 on failure (or if not supported)
4113 * suspend - Notification on system suspend/hibernate event
4119 * resume - Notification on system resume/thaw event
4125 * signal_monitor - Set signal monitoring parameters
4130 * Returns: 0 on success, -1 on failure (or if not supported)
4141 * get_noa - Get current Notice of Absence attribute payload
4146 * advertized, or -1 on failure
4154 * set_noa - Set Notice of Absence parameters for GO (testing)
4159 * Returns: 0 on success or -1 on failure
4168 * set_p2p_powersave - Set P2P power save options
4170 * @legacy_ps: 0 = disable, 1 = enable, 2 = maximum PS, -1 = no change
4171 * @opp_ps: 0 = disable, 1 = enable, -1 = no change
4172 * @ctwindow: 0.. = change (msec), -1 = no change
4173 * Returns: 0 on success or -1 on failure
4179 * ampdu - Enable/disable aggregation
4181 * @ampdu: 1/0 = enable/disable A-MPDU aggregation
4182 * Returns: 0 on success or -1 on failure
4187 * get_radio_name - Get physical radio name for the device
4200 * send_tdls_mgmt - for sending TDLS management packets
4223 * tdls_oper - Ask the driver to perform high-level TDLS operations
4225 * @oper: TDLS high-level operation. See %enum tdls_oper
4229 * This optional function can be used to send high-level TDLS commands
4235 * wnm_oper - Notify driver of the WNM frame reception
4247 * set_qos_map - Set QoS Map
4256 * br_add_ip_neigh - Add a neigh to the bridge ip neigh table
4268 * br_delete_ip_neigh - Remove a neigh from the bridge ip neigh table
4277 * br_port_set_attr - Set a bridge port attribute
4286 * br_port_set_attr - Set a bridge network parameter
4295 * get_wowlan - Get wake-on-wireless status
4301 * set_wowlan - Set wake-on-wireless triggers
4308 * signal_poll - Get current connection information
4315 * mlo_signal_poll - Get current MLO connection information
4323 * channel_info - Get parameters of the current operating channel
4331 * set_authmode - Set authentication algorithm(s) for static WEP
4334 * Returns: 0 on success, -1 on failure
4340 * DEPRECATED - use set_ap() instead
4346 * driver_cmd - Execute driver-specific command
4351 * Returns: 0 on success, -1 on failure
4357 * vendor_cmd - Execute vendor specific command
4385 * set_rekey_info - Set rekey information
4391 * @replay_ctr: Current EAPOL-Key Replay Counter
4394 * driver/firmware to process EAPOL-Key frames in Group Key Handshake
4402 * sta_assoc - Station association indication
4406 * @reassoc: flag to indicate re-association
4410 * Returns: 0 on success, -1 on failure
4419 * sta_auth - Station authentication indication
4423 * Returns: 0 on success, -1 on failure
4429 * add_tspec - Add traffic stream
4434 * Returns: 0 on success, -1 on failure
4443 * add_sta_node - Add a station node in the driver
4447 * Returns: 0 on success, -1 on failure
4450 * the station gets added by FT-over-DS.
4455 * sched_scan - Request the driver to initiate scheduled scan
4458 * Returns: 0 on success, -1 on failure
4465 * and if not provided or if it returns -1, we fall back to
4466 * normal host-scheduled scans.
4471 * stop_sched_scan - Request the driver to stop a scheduled scan
4473 * Returns: 0 on success, -1 on failure
4482 * poll_client - Probe (null data or such) the given station
4496 * radio_disable - Disable/enable radio
4499 * Returns: 0 on success, -1 on failure
4502 * disable the radio on a testbed device to simulate out-of-radio-range
4508 * switch_channel - Announce channel switch and migrate the GO to the
4512 * Returns: 0 on success, -1 on failure
4520 * switch_color - Announce color switch and migrate the BSS to the
4524 * Returns: 0 on success, -1 on failure
4531 * add_tx_ts - Add traffic stream
4538 * Returns: 0 on success, -1 on failure
4544 * del_tx_ts - Delete traffic stream
4548 * Returns: 0 on success, -1 on failure
4553 * Enable channel-switching with TDLS peer
4558 * Returns: 0 on success, -1 on failure
4572 * Returns: 0 on success, -1 on failure
4580 * start_dfs_cac - Listen for radar interference on the channel
4583 * Returns: 0 on success, -1 on failure
4588 * stop_ap - Removes beacon from AP
4590 * @link_id: Link ID of the specified link; -1 for non-MLD
4591 * Returns: 0 on success, -1 on failure (or if not supported)
4600 * get_survey - Retrieve survey data
4604 * Returns: 0 on success, -1 on failure
4608 * - the observed channel noise floor
4609 * - the amount of time we have spent on the channel
4610 * - the amount of time during which we have spent on the channel that
4613 * - the amount of time we have spent receiving data
4614 * - the amount of time we have spent transmitting data
4625 * status - Get driver interface status information
4629 * Returns: Length of written status information or -1 on failure
4634 * roaming - Set roaming policy for driver-based BSS selection
4638 * Returns: Length of written status information or -1 on failure
4650 * disable_fils - Enable/disable FILS feature
4652 * @disable: 0-enable and 1-disable FILS feature
4653 * Returns: 0 on success, -1 on failure
4661 * set_mac_addr - Set MAC address
4664 * Returns: 0 on success, -1 on failure
4674 * macsec_get_capability - Inform MKA of this driver's capability
4677 * Returns: 0 on success, -1 on failure
4682 * enable_protect_frames - Set protect frames status
4686 * Returns: 0 on success, -1 on failure (or if not supported)
4691 * enable_encrypt - Set encryption status
4694 * false = integrity-only protection on outgoing traffic
4695 * Returns: 0 on success, -1 on failure (or if not supported)
4700 * set_replay_protect - Set replay protect status and window size
4705 * Returns: 0 on success, -1 on failure (or if not supported)
4710 * set_offload - Set MACsec hardware offload
4715 * Returns: 0 on success, -1 on failure (or if not supported)
4720 * set_current_cipher_suite - Set current cipher suite
4723 * Returns: 0 on success, -1 on failure (or if not supported)
4728 * enable_controlled_port - Set controlled port status
4732 * Returns: 0 on success, -1 on failure (or if not supported)
4737 * get_receive_lowest_pn - Get receive lowest pn
4740 * Returns: 0 on success, -1 on failure (or if not supported)
4745 * get_transmit_next_pn - Get transmit next pn
4748 * Returns: 0 on success, -1 on failure (or if not supported)
4753 * set_transmit_next_pn - Set transmit next pn
4756 * Returns: 0 on success, -1 on failure (or if not supported)
4761 * set_receive_lowest_pn - Set receive lowest PN
4764 * Returns: 0 on success, -1 on failure (or if not supported)
4769 * create_receive_sc - create secure channel for receiving
4775 * Returns: 0 on success, -1 on failure (or if not supported)
4782 * delete_receive_sc - delete secure connection for receiving
4785 * Returns: 0 on success, -1 on failure
4790 * create_receive_sa - create secure association for receive
4793 * Returns: 0 on success, -1 on failure
4798 * delete_receive_sa - Delete secure association for receive
4801 * Returns: 0 on success, -1 on failure
4806 * enable_receive_sa - enable the SA for receive
4809 * Returns: 0 on success, -1 on failure
4814 * disable_receive_sa - disable SA for receive
4817 * Returns: 0 on success, -1 on failure
4822 * create_transmit_sc - create secure connection for transmit
4826 * Returns: 0 on success, -1 on failure
4832 * delete_transmit_sc - delete secure connection for transmit
4835 * Returns: 0 on success, -1 on failure
4840 * create_transmit_sa - create secure association for transmit
4843 * Returns: 0 on success, -1 on failure
4848 * delete_transmit_sa - Delete secure association for transmit
4851 * Returns: 0 on success, -1 on failure
4856 * enable_transmit_sa - enable SA for transmit
4859 * Returns: 0 on success, -1 on failure
4864 * disable_transmit_sa - disable SA for transmit
4867 * Returns: 0 on success, -1 on failure
4873 * init_mesh - Driver specific initialization for mesh
4875 * Returns: 0 on success, -1 on failure
4880 * join_mesh - Join a mesh network
4883 * Returns: 0 on success, -1 on failure
4889 * leave_mesh - Leave a mesh network
4891 * Returns 0 on success, -1 on failure
4896 * probe_mesh_link - Inject a frame over direct mesh link to a given
4902 * Returns 0 on success, -1 on failure
4908 * do_acs - Automatically select channel
4911 * Returns 0 on success, -1 on failure
4919 * set_band - Notify driver of band(s) selection
4922 * Returns 0 on success, -1 on failure
4927 * get_pref_freq_list - Get preferred frequency list for an interface
4932 * Returns 0 on success, -1 on failure
4944 * set_prob_oper_freq - Indicate probable P2P operating channel
4947 * Returns 0 on success, -1 on failure
4956 * abort_scan - Request the driver to abort an ongoing scan
4961 * Returns 0 on success, -1 on failure
4966 * configure_data_frame_filters - Request to configure frame filters
4970 * Returns: 0 on success or -1 on failure
4975 * get_ext_capab - Get extended capabilities for the specified interface
4981 * Returns: 0 on success or -1 on failure
4988 * get_mld_capab - Get MLD capabilities for the specified interface
4993 * Returns: 0 on success or -1 on failure
4999 * p2p_lo_start - Start offloading P2P listen to device
5009 * Returns: 0 on success or -1 on failure
5018 * p2p_lo_stop - Stop P2P listen offload
5020 * Returns: 0 on success or -1 on failure
5025 * set_default_scan_ies - Set default scan IEs
5029 * Returns: 0 on success or -1 on failure
5041 * set_tdls_mode - Set TDLS trigger mode to the host driver
5052 * get_bss_transition_status - Get candidate BSS's transition status
5063 * ignore_assoc_disallow - Configure driver to ignore assoc_disallow
5066 * Returns: 0 on success, -1 on failure
5071 * set_bssid_tmp_disallow - Set disallowed BSSIDs to the driver
5080 * update_connect_params - Update the connection parameters
5085 * Returns: 0 on success, -1 on failure
5097 * send_external_auth_status - Indicate the status of external
5101 * Returns: 0 on success, -1 on failure
5107 * set_4addr_mode - Set 4-address mode
5110 * @val: 0 - disable 4addr mode, 1 - enable 4addr mode
5116 * update_dh_ie - Update DH IE
5122 * Returns: 0 on success, -1 on failure
5131 * dpp_listen - Notify driver about start/stop of DPP listen
5134 * Returns: 0 on success, -1 on failure
5142 * set_secure_ranging_ctx - Add or delete secure ranging parameters of
5146 * Returns: 0 on success, -1 on failure
5153 * send_pasn_resp - Send PASN response for a set of peers to the
5157 * Returns: 0 on success, -1 on failure
5162 * get_sta_mlo_info - Get the current multi-link association info
5164 * @mlo: Pointer to fill multi-link association info
5165 * Returns: 0 on success, -1 on failure
5167 * This callback is used to fetch multi-link of the current association.
5173 * link_add - Add a link to the AP MLD interface
5183 * link_remove - Remove a link from the AP MLD interface
5189 * Returns: 0 on success, -1 on failure
5195 * is_drv_shared - Check whether the driver interface is shared
5208 * link_sta_remove - Remove a link STA from an MLD STA
5224 * enum wpa_event_type - Event type for wpa_supplicant_event() calls
5228 * EVENT_ASSOC - Association completed
5242 * EVENT_DISASSOC - Association lost
5254 * EVENT_MICHAEL_MIC_FAILURE - Michael MIC (TKIP) detected
5265 * EVENT_SCAN_RESULTS - Scan results available
5281 * EVENT_ASSOCINFO - Report optional extra information for association
5294 * EVENT_INTERFACE_STATUS - Report interface status changes
5299 * wpa_supplicant to stop and re-start processing for the interface,
5305 * EVENT_PMKID_CANDIDATE - Report a candidate AP for pre-authentication
5308 * RSN (WPA2) pre-authentication. If wpa_supplicant is not responsible
5310 * pre-authentication. If wpa_supplicant is performing scan request
5312 * to add pre-authentication candidates. union
5315 * strength, in order to try to pre-authenticate first with candidates
5316 * that are most likely targets for re-association.
5321 * will automatically skip pre-authentication in cases where a valid
5325 * Driver will be notified about successful pre-authentication with
5331 * EVENT_TDLS - Request TDLS operation
5338 * EVENT_FT_RESPONSE - Report FT (IEEE 802.11r) response IEs
5347 * EVENT_IBSS_RSN_START - Request RSN authentication in IBSS
5357 * EVENT_AUTH - Authentication result
5368 * EVENT_DEAUTH - Authentication lost
5378 * EVENT_ASSOC_REJECT - Association rejected
5387 * EVENT_AUTH_TIMED_OUT - Authentication timed out
5392 * EVENT_ASSOC_TIMED_OUT - Association timed out
5397 * EVENT_WPS_BUTTON_PUSHED - Report hardware push button press for WPS
5402 * EVENT_TX_STATUS - Report TX status
5407 * EVENT_RX_FROM_UNKNOWN - Report RX from unknown STA
5412 * EVENT_RX_MGMT - Report RX of a management frame
5417 * EVENT_REMAIN_ON_CHANNEL - Remain-on-channel duration started
5420 * requested remain-on-channel duration. Information about the
5426 * EVENT_CANCEL_REMAIN_ON_CHANNEL - Remain-on-channel timed out
5429 * remain-on-channel duration, i.e., may noot be available on the
5436 * EVENT_RX_PROBE_REQ - Indicate received Probe Request frame
5442 * commands to request the events (i.e., report parameter is non-zero)
5449 * EVENT_NEW_STA - New wired device noticed
5452 * in a network that does not use association-like functionality (i.e.,
5460 * EVENT_EAPOL_RX - Report received EAPOL frame
5468 * EVENT_SIGNAL_CHANGE - Indicate change in signal strength
5477 * EVENT_INTERFACE_ENABLED - Notify that interface was enabled
5485 * EVENT_INTERFACE_DISABLED - Notify that interface was disabled
5493 * EVENT_CHANNEL_LIST_CHANGED - Channel list changed
5502 * EVENT_INTERFACE_UNAVAILABLE - Notify that interface is unavailable
5526 * EVENT_UNPROT_DEAUTH - Unprotected Deauthentication frame received
5536 * EVENT_UNPROT_DISASSOC - Unprotected Disassociation frame received
5555 * EVENT_IBSS_PEER_LOST - IBSS peer not reachable anymore
5560 * EVENT_DRIVER_GTK_REKEY - Device/driver did GTK rekey
5563 * of the current EAPOL-Key Replay Counter in case the driver/firmware
5570 * EVENT_SCHED_SCAN_STOPPED - Scheduled scan was stopped
5575 * EVENT_DRIVER_CLIENT_POLL_OK - Station responded to poll
5583 * EVENT_EAPOL_TX_STATUS - notify of EAPOL TX status
5588 * EVENT_CH_SWITCH - AP or GO decided to switch channels
5595 * EVENT_CH_SWITCH_STARTED - AP or GO started to switch channels
5597 * This is a pre-switch event indicating the shortly following switch
5604 * EVENT_WNM - Request WNM operation
5611 * EVENT_CONNECT_FAILED_REASON - Connection failure reason in AP mode
5620 * EVENT_DFS_RADAR_DETECTED - Notify of radar detection
5628 * EVENT_DFS_CAC_FINISHED - Notify that channel availability check has been completed
5635 * EVENT_DFS_CAC_ABORTED - Notify that channel availability check has been aborted
5644 * EVENT_DFS_NOP_FINISHED - Notify that non-occupancy period is over
5651 * EVENT_SURVEY - Received survey data
5663 * EVENT_SCAN_STARTED - Scan started
5673 * EVENT_AVOID_FREQUENCIES - Received avoid frequency range
5676 * to reduce issues due to interference or internal co-existence
5682 * EVENT_NEW_PEER_CANDIDATE - new (unknown) mesh peer notification
5687 * EVENT_ACS_CHANNEL_SELECTED - Received selected channels by ACS
5695 * EVENT_DFS_CAC_STARTED - Notify that channel availability check has
5704 * EVENT_P2P_LO_STOP - Notify that P2P listen offload is stopped
5709 * EVENT_BEACON_LOSS - Beacon loss detected
5718 * EVENT_DFS_PRE_CAC_EXPIRED - Notify that channel availability check
5719 * done previously (Pre-CAC) on the channel has expired. This would
5720 * normally be on a non-ETSI DFS regulatory domain. DFS state of the
5727 * EVENT_EXTERNAL_AUTH - This event interface is used by host drivers
5737 * EVENT_PORT_AUTHORIZED - Notification that a connection is authorized
5739 * This event should be indicated when the driver completes the 4-way
5746 * EVENT_STATION_OPMODE_CHANGED - Notify STA's HT/VHT operation mode
5752 * EVENT_INTERFACE_MAC_CHANGED - Notify that interface MAC changed
5761 * EVENT_WDS_STA_INTERFACE_STATUS - Notify WDS STA interface status
5768 * EVENT_UPDATE_DH - Notification of updated DH information
5773 * EVENT_UNPROT_BEACON - Unprotected Beacon frame received
5782 * EVENT_TX_WAIT_EXPIRE - TX wait timed out
5786 * non-zero wait time and that has not been explicitly cancelled.
5791 * EVENT_BSS_COLOR_COLLISION - Notification of a BSS color collision
5796 * EVENT_CCA_STARTED_NOTIFY - Notification that CCA has started
5801 * EVENT_CCA_ABORTED_NOTIFY - Notification that CCA has aborted
5806 * EVENT_CCA_NOTIFY - Notification that CCA has completed
5811 * EVENT_PASN_AUTH - This event is used by the driver that requests
5817 * EVENT_LINK_CH_SWITCH - MLD AP link decided to switch channels
5825 * EVENT_LINK_CH_SWITCH_STARTED - MLD AP link started to switch channels
5827 * This is a pre-switch event indicating the shortly following switch
5835 * EVENT_TID_LINK_MAP - MLD event to set TID-to-link mapping
5837 * This event is used by the driver to indicate the received TID-to-link
5845 * EVENT_LINK_RECONFIG - Notification that AP links removed
5852 * struct freq_survey - Channel survey info
5885 * enum sta_connect_fail_reason_codes - STA connect failure reason code values
5914 * union wpa_event_data - Additional data for wpa_supplicant_event() calls
5918 * struct assoc_info - Data for EVENT_ASSOC and EVENT_ASSOCINFO events
5927 * reassoc - Flag to indicate association or reassociation
5932 * req_ies - (Re)Association Request IEs
5936 * wpa_supplicant-generated WPA/RSN IE is used, this
5945 * req_ies_len - Length of req_ies in bytes
5950 * resp_ies - (Re)Association Response IEs
5963 * resp_ies_len - Length of resp_ies in bytes
5968 * resp_frame - (Re)Association Response frame
5973 * resp_frame_len - (Re)Association Response frame length
5978 * beacon_ies - Beacon or Probe Response IEs
5996 * beacon_ies_len - Length of beacon_ies */
6000 * freq - Frequency of the operational channel in MHz
6005 * wmm_params - WMM parameters used in this association.
6010 * addr - Station address (for AP mode)
6026 * authorized - Status of key management offload,
6032 * key_replay_ctr - Key replay counter value last used
6033 * in a valid EAPOL-Key frame
6038 * key_replay_ctr_len - The length of key_replay_ctr
6043 * ptk_kck - The derived PTK KCK
6048 * ptk_kek_len - The length of ptk_kck
6053 * ptk_kek - The derived PTK KEK
6060 * ptk_kek_len - The length of ptk_kek
6065 * subnet_status - The subnet status:
6079 * fils_erp_next_seq_num - The next sequence number to use in
6085 * fils_pmk - A new PMK if generated in case of FILS
6091 * fils_pmk_len - Length of fils_pmk
6096 * fils_pmkid - PMKID used or generated in FILS authentication
6101 * link_addr - Link address of the STA
6106 * assoc_link_id - Association link id of the MLO association or
6107 * -1 if MLO is not used
6113 * struct disassoc_info - Data for EVENT_DISASSOC events
6117 * addr - Station address (for AP mode)
6122 * reason_code - Reason Code (host byte order) used in
6128 * ie - Optional IE(s) in Disassociation frame
6133 * ie_len - Length of ie buffer in octets
6138 * locally_generated - Whether the frame was locally generated
6144 * struct deauth_info - Data for EVENT_DEAUTH events
6148 * addr - Station address (for AP mode)
6153 * reason_code - Reason Code (host byte order) used in
6159 * ie - Optional IE(s) in Deauthentication frame
6164 * ie_len - Length of ie buffer in octets
6169 * locally_generated - Whether the frame was locally generated
6175 * struct michael_mic_failure - Data for EVENT_MICHAEL_MIC_FAILURE
6179 const u8 *src; member
6183 * struct interface_status - Data for EVENT_INTERFACE_STATUS
6194 * struct pmkid_candidate - Data for EVENT_PMKID_CANDIDATE
6201 /** Whether RSN IE includes pre-authenticate flag */
6206 * struct tdls - Data for EVENT_TDLS
6219 * struct wnm - Data for EVENT_WNM
6237 * struct ft_ies - FT information elements (EVENT_FT_RESPONSE)
6250 /** Optional IE(s), e.g., WMM TSPEC(s), for RIC-Request */
6257 * struct ibss_rsn_start - Data for EVENT_IBSS_RSN_START
6264 * struct auth_info - Data for EVENT_AUTH events
6277 * struct assoc_reject - Data for EVENT_ASSOC_REJECT events
6281 * bssid - BSSID of the AP that rejected association
6286 * resp_ies - (Re)Association Response IEs
6299 * resp_ies_len - Length of resp_ies in bytes
6304 * status_code - Status Code from (Re)association Response
6309 * timed_out - Whether failure is due to timeout (etc.) rather
6315 * timeout_reason - Reason for the timeout
6320 * fils_erp_next_seq_num - The next sequence number to use in
6326 * reason_code - Connection failure reason code from the driver
6336 * struct tx_status - Data for EVENT_TX_STATUS events
6349 * struct rx_from_unknown - Data for EVENT_RX_FROM_UNKNOWN events
6358 * struct rx_mgmt - Data for EVENT_RX_MGMT events
6366 * drv_priv - Pointer to store driver private BSS information
6369 * hostapd_data->drv_priv to determine which BSS should process
6375 * ctx - Pointer to store ctx of private BSS information
6383 * freq - Frequency (in MHz) on which the frame was received
6388 * ssi_signal - Signal strength in dBm (or 0 if not available)
6393 * link_id - MLO link on which the frame was received or -1 for
6400 * struct remain_on_channel - Data for EVENT_REMAIN_ON_CHANNEL events
6406 * freq - Channel frequency in MHz
6411 * duration - Duration to remain on the channel in milliseconds
6417 * struct scan_info - Optional data for EVENT_SCAN_RESULTS events
6421 * @ssids: Scanned SSIDs (%NULL or zero-length SSID indicates wildcard
6449 * struct rx_probe_req - Data for EVENT_RX_PROBE_REQ events
6453 * sa - Source address of the received Probe Request frame
6458 * da - Destination address of the received Probe Request frame
6464 * bssid - BSSID of the received Probe Request frame or %NULL
6470 * ie - IEs from the Probe Request body
6475 * ie_len - Length of ie buffer in octets
6480 * signal - signal strength in dBm (or 0 if not available)
6486 * struct new_sta - Data for EVENT_NEW_STA events
6493 * struct eapol_rx - Data for EVENT_EAPOL_RX events
6496 const u8 *src; member
6504 * signal_change - Data for EVENT_SIGNAL_CHANGE events
6509 * struct best_channel - Data for EVENT_BEST_CHANNEL events
6535 * struct low_ack - Data for EVENT_STATION_LOW_ACK events
6546 * struct ibss_peer_lost - Data for EVENT_IBSS_PEER_LOST
6553 * struct driver_gtk_rekey - Data for EVENT_DRIVER_GTK_REKEY
6561 * struct client_poll - Data for EVENT_DRIVER_CLIENT_POLL_OK events
6574 * @link_id: MLD link id used to transmit the frame or -1 for non MLO
6610 * struct connect_failed - Data for EVENT_CONNECT_FAILED_REASON
6623 * struct dfs_event - Data for radar detected events
6638 * survey_results - Survey result data for EVENT_SURVEY
6649 * channel_list_changed - Data for EVENT_CHANNEL_LIST_CHANGED
6672 * freq_range - List of frequency ranges
6694 * struct acs_selected_channels - Data for EVENT_ACS_CHANNEL_SELECTED
6713 * @link_id: Indicate the link id if operating as AP MLD; -1 otherwise
6728 * struct p2p_lo_stop - Reason code for P2P Listen offload stop event
6752 * struct sta_opmode - Station's operation mode change event
6768 * struct wds_sta_interface - Data for EVENT_WDS_STA_INTERFACE_STATUS.
6780 * struct update_dh - Data for EVENT_UPDATE_DH
6791 * struct unprot_beacon - Data for EVENT_UNPROT_BEACON
6798 * struct bss_color_collision - Data for EVENT_BSS_COLOR_COLLISION
6806 * struct pasn_auth - Data for EVENT_PASN_AUTH
6811 * struct port_authorized - Data for EVENT_PORT_AUTHORIZED
6813 * EAPOL-Key msg 3/4
6818 * open for normal data in STA and AP modes when 4-way handshake is
6828 * struct tid_link_map_info - Data for EVENT_TID_LINK_MAP
6838 * wpa_supplicant_event - Report a driver event for wpa_supplicant
6851 * wpa_supplicant_event_global - Report a driver event for wpa_supplicant
6894 static inline void drv_event_eapol_rx(void *ctx, const u8 *src, const u8 *data, in drv_event_eapol_rx() argument
6899 event.eapol_rx.src = src; in drv_event_eapol_rx()
6903 event.eapol_rx.link_id = -1; in drv_event_eapol_rx()
6907 static inline void drv_event_eapol_rx2(void *ctx, const u8 *src, const u8 *data, in drv_event_eapol_rx2() argument
6914 event.eapol_rx.src = src; in drv_event_eapol_rx2()