Lines Matching refs:event

12  * driver operations. After this, there are definitions for driver event
372 * IE by generating an event that the interface code will
1144 * Initialize driver interface, including event processing for kernel
1153 * The main event loop (eloop.c) of wpa_supplicant can be used to
1287 * provide event mechanism for association events. This is called when
1290 * event before returning from this callback function. In addition, the
1291 * driver interface should generate an association event after having
1336 * event. The driver interface is required to implement get_mac_addr()
1504 * results event for wpa_supplicant which will eventually request the
2015 * EVENT_REMAIN_ON_CHANNEL event indicates that the driver has
2075 * suspend - Notification on system suspend/hibernate event
2081 * resume - Notification on system resume/thaw event
2091 * new event
2096 * %threshold value or increases above it, EVENT_SIGNAL_CHANGE event
2098 * least %hysteresis from the previously indicated signal change event.
2305 * with the EVENT_P2P_PROV_DISC_RESPONSE event.
2322 * EVENT_P2P_SD_RESPONSE driver event.
2346 * @freq: Frequency from EVENT_P2P_SD_REQUEST event
2347 * @dst: Destination address from EVENT_P2P_SD_REQUEST event
2348 * @dialog_token: Dialog token from EVENT_P2P_SD_REQUEST event
2353 * the EVENT_P2P_SD_REQUEST driver event.
2548 * driver should report scan results event for wpa_supplicant
2615 * This event needs to be delivered when the driver completes IEEE
2618 * after this event has been generated. In addition, optional
2629 * This event should be called when association is lost either due to
2632 * supports separate deauthentication event, EVENT_DISASSOC should only
2641 * This event must be delivered when a Michael MIC error is detected by
2642 * the local driver. Additional data for event processing is
2652 * This event must be called whenever scan results are available to be
2653 * fetched with struct wpa_driver_ops::get_scan_results(). This event
2655 * is called. If the driver provides an unsolicited event when the scan
2656 * has been completed, this event can be used to trigger
2657 * EVENT_SCAN_RESULTS call. If such event is not available from the
2668 * This event can be used to report extra association information for
2681 * This optional event can be used to report changes in interface
2692 * This event can be used to inform wpa_supplicant about candidates for
2694 * for scan request (ap_scan=2 mode), this event is required for
2696 * (ap_scan=1), this event is optional since scan results can be used
2707 * PMKSA exists. When more than one candidate exists, this event should
2718 * This event can be used to inform wpa_supplicant about desire to set
2722 * event.
2729 * This event can be used to request a TDLS operation to be performed.
2745 * The driver can use this event to inform wpa_supplicant about a STA
2747 * event starts RSN authentication with the other STA to authenticate
2755 * This event should be called when authentication attempt has been
2766 * This event should be called when authentication is lost either due
2776 * This event should be called when (re)association attempt has been
2820 * This event is used to indicate when an Action frame has been
2829 * This event is used to indicate when the driver has started the
2838 * This event is used to indicate when the driver has completed
2848 * This event is used only by driver_test.c and userspace MLME.
2855 * This event is used to indicate when a Probe Request frame has been
2868 * This event is used to indicate that a new device has been detected
2879 * When in AP mode with hostapd, this event is required to be used to
2881 * %wpa_supplicant, this event is used only if the send_eapol() handler
2889 * This event is used to indicate changes in the signal strength
2898 * This event is used to indicate that the interface was enabled after
2906 * This event is used to indicate that the interface was disabled,
2914 * This event is used to indicate that the channel list has changed,
2923 * This event is used to indicate that the driver cannot maintain this
2937 * Driver generates this event whenever it detects a better channel
2946 * This event should be called when a Deauthentication frame is dropped
2956 * This event should be called when a Disassociation frame is dropped
2966 * Driver generates this event whenever it detected that a particular
2975 * This event is used only if the driver implements P2P management
2984 * This event is used only if the driver implements P2P management
2993 * This event is used only if the driver implements P2P management
3012 * This event carries the new replay counter to notify wpa_supplicant
3027 * This event indicates that the station responded to the poll
3047 * This event can be used to request a WNM operation to be performed.
3074 * If the driver generates WPA/RSN IE, this event data must be
3077 * information event is optional.
3273 * expected to use this event to report received FT IEs (MDIE, FTIE,
3677 * wpa_supplicant_event - Report a driver event for wpa_supplicant
3680 * @event: event type (defined above)
3681 * @data: possible extra data for the event
3683 * Driver wrapper code should call this function whenever an event is received
3686 void wpa_supplicant_event(void *ctx, enum wpa_event_type event,
3692 * event indication for some of the common events.
3698 union wpa_event_data event;
3699 os_memset(&event, 0, sizeof(event));
3700 event.assoc_info.reassoc = reassoc;
3701 event.assoc_info.req_ies = ie;
3702 event.assoc_info.req_ies_len = ielen;
3703 event.assoc_info.addr = addr;
3704 wpa_supplicant_event(ctx, EVENT_ASSOC, &event);
3709 union wpa_event_data event;
3710 os_memset(&event, 0, sizeof(event));
3711 event.disassoc_info.addr = addr;
3712 wpa_supplicant_event(ctx, EVENT_DISASSOC, &event);
3718 union wpa_event_data event;
3719 os_memset(&event, 0, sizeof(event));
3720 event.eapol_rx.src = src;
3721 event.eapol_rx.data = data;
3722 event.eapol_rx.data_len = data_len;
3723 wpa_supplicant_event(ctx, EVENT_EAPOL_RX, &event);
3730 const char * event_to_string(enum wpa_event_type event);