Lines Matching defs:event
12 * driver operations. After this, there are definitions for driver event
877 * IE by generating an event that the interface code will
1996 * (relevant for a CQM event)
2191 * These are used across the external authentication request and event
2194 * for the event interface.
2196 * by both the request and event interface.
2197 * @ssid: SSID of the AP. Used by both the request and event interface.
2327 * Initialize driver interface, including event processing for kernel
2336 * The main event loop (eloop.c) of wpa_supplicant can be used to
2471 * provide event mechanism for association events. This is called when
2474 * event before returning from this callback function. In addition, the
2475 * driver interface should generate an association event after having
2529 * event. The driver interface is required to implement get_mac_addr()
2697 * results event for wpa_supplicant which will eventually request the
3241 * EVENT_REMAIN_ON_CHANNEL event indicates that the driver has
3303 * suspend - Notification on system suspend/hibernate event
3309 * resume - Notification on system resume/thaw event
3319 * new event
3324 * %threshold value or increases above it, EVENT_SIGNAL_CHANGE event
3326 * least %hysteresis from the previously indicated signal change event.
3645 * driver should report scan results event for wpa_supplicant
4285 * This event needs to be delivered when the driver completes IEEE
4288 * after this event has been generated. In addition, optional
4299 * This event should be called when association is lost either due to
4302 * supports separate deauthentication event, EVENT_DISASSOC should only
4311 * This event must be delivered when a Michael MIC error is detected by
4312 * the local driver. Additional data for event processing is
4322 * This event must be called whenever scan results are available to be
4323 * fetched with struct wpa_driver_ops::get_scan_results(). This event
4325 * is called. If the driver provides an unsolicited event when the scan
4326 * has been completed, this event can be used to trigger
4327 * EVENT_SCAN_RESULTS call. If such event is not available from the
4338 * This event can be used to report extra association information for
4351 * This optional event can be used to report changes in interface
4362 * This event can be used to inform wpa_supplicant about candidates for
4364 * for scan request (ap_scan=2 mode), this event is required for
4366 * (ap_scan=1), this event is optional since scan results can be used
4377 * PMKSA exists. When more than one candidate exists, this event should
4388 * This event can be used to request a TDLS operation to be performed.
4404 * The driver can use this event to inform wpa_supplicant about a STA
4406 * event starts RSN authentication with the other STA to authenticate
4414 * This event should be called when authentication attempt has been
4425 * This event should be called when authentication is lost either due
4435 * This event should be called when (re)association attempt has been
4474 * This event is used to indicate when the driver has started the
4483 * This event is used to indicate when the driver has completed
4493 * This event is used to indicate when a Probe Request frame has been
4506 * This event is used to indicate that a new device has been detected
4517 * When in AP mode with hostapd, this event is required to be used to
4525 * This event is used to indicate changes in the signal strength
4534 * This event is used to indicate that the interface was enabled after
4542 * This event is used to indicate that the interface was disabled,
4550 * This event is used to indicate that the channel list has changed,
4559 * This event is used to indicate that the driver cannot maintain this
4566 * interfaces. This event can be propagated when channel switching
4574 * Driver generates this event whenever it detects a better channel
4583 * This event should be called when a Deauthentication frame is dropped
4593 * This event should be called when a Disassociation frame is dropped
4603 * Driver generates this event whenever it detected that a particular
4617 * This event carries the new replay counter to notify wpa_supplicant
4632 * This event indicates that the station responded to the poll
4652 * This is a pre-switch event indicating the shortly following switch
4661 * This event can be used to request a WNM operation to be performed.
4668 * This event indicates that the driver reported a connection failure
4708 * This event gets triggered when a driver query is issued for survey
4713 * and then os_free()'d, so the event callback must only copy data.
4730 * This event indicates a set of frequency ranges that should be avoided
4753 * This event indicates that channel availability check has been started
4766 * This event indicates that no Beacon frames has been received from
4782 * EVENT_EXTERNAL_AUTH - This event interface is used by host drivers
4785 * authentication to wpa_supplicant. This event carries all the
4794 * This event should be indicated when the driver completes the 4-way
4795 * handshake. This event should be preceded by an EVENT_ASSOC that
4802 * change event.
4809 * This event is emitted when the MAC changes while the interface is
4818 * This event is emitted when an interface is added/removed for WDS STA.
4884 * If the driver generates WPA/RSN IE, this event data must be
4887 * information event is optional.
5179 * expected to use this event to report received FT IEs (MDIE, FTIE,
5344 * @nl_scan_event: 1 if the source of this scan event is a normal scan,
5345 * 0 if the source of the scan event is a vendor scan
5609 * struct p2p_lo_stop - Reason code for P2P Listen offload stop event
5633 * struct sta_opmode - Station's operation mode change event
5671 * wpa_supplicant_event - Report a driver event for wpa_supplicant
5674 * @event: event type (defined above)
5675 * @data: possible extra data for the event
5677 * Driver wrapper code should call this function whenever an event is received
5680 void wpa_supplicant_event(void *ctx, enum wpa_event_type event,
5684 * wpa_supplicant_event_global - Report a driver event for wpa_supplicant
5687 * @event: event type (defined above)
5688 * @data: possible extra data for the event
5693 void wpa_supplicant_event_global(void *ctx, enum wpa_event_type event,
5698 * event indication for some of the common events.
5704 union wpa_event_data event;
5705 os_memset(&event, 0, sizeof(event));
5706 event.assoc_info.reassoc = reassoc;
5707 event.assoc_info.req_ies = ie;
5708 event.assoc_info.req_ies_len = ielen;
5709 event.assoc_info.addr = addr;
5710 wpa_supplicant_event(ctx, EVENT_ASSOC, &event);
5715 union wpa_event_data event;
5716 os_memset(&event, 0, sizeof(event));
5717 event.disassoc_info.addr = addr;
5718 wpa_supplicant_event(ctx, EVENT_DISASSOC, &event);
5724 union wpa_event_data event;
5725 os_memset(&event, 0, sizeof(event));
5726 event.eapol_rx.src = src;
5727 event.eapol_rx.data = data;
5728 event.eapol_rx.data_len = data_len;
5729 wpa_supplicant_event(ctx, EVENT_EAPOL_RX, &event);
5736 const char * event_to_string(enum wpa_event_type event);