Lines Matching full:driver
2 * Driver interface definition
8 * This file defines a driver interface used by both %wpa_supplicant and
10 * driver operations. This is followed by the struct wpa_driver_ops that each
11 * driver wrapper will beed to define with callback functions for requesting
12 * driver operations. After this, there are definitions for driver event
163 * channel (used internally in src/ap/acs.c; driver wrappers do not
336 * scan result processing if left zero by the driver wrapper)
345 * driver. Each driver interface implementation is responsible for converting
346 * the driver or OS specific scan results into this format.
348 * If the driver does not support reporting all IEs, the IE data structure is
354 * frame (or if the driver does not indicate source of IEs, these may also be
356 * (with beacon_ie_len octets of data) if the driver provides both IE sets.
382 * @fetch_time: Time when the results were fetched from the driver
457 * This optional parameter can be used to request the driver wrapper to
463 * The driver wrapper is allowed to take this allocated buffer into its
464 * own use by setting the pointer to %NULL. In that case, the driver
481 * The driver may filter scan results in firmware to reduce host
490 * When set, the driver is expected to remove rates 1, 2, 5.5, and 11
497 * only_new_results - Request driver to report only new results
499 * This is used to request the driver to report only BSSes that have
506 * low_priority - Requests driver to use a lower scan priority
508 * This is used to request the driver to use a lower scan priority
514 * mac_addr_rand - Requests driver to randomize MAC address
560 * driver may ignore this parameter and start immediately (or at any
578 * scan request if the host driver/kernel supports concurrent scan
579 * requests. This cookie is returned from the corresponding driver
600 * mandatory (and the driver should reject the scan request if it is
642 * - Max Channel Time - driver fills FILS request params IE with
850 * This can be %NULL, if ap_scan=2 mode is used and the driver is
858 * initial association for drivers that use driver/firmwate-based BSS
860 * the driver from selecting other BSSes in the ESS.
883 * hint for the driver. Unlike the @freq parameter, @freq_hint does not
884 * limit the driver from selecting other channels for
885 * driver/firmware-based BSS selection.
891 * background scan, or -1 to indicate no change to default driver
897 * beacon_int - Beacon interval for IBSS or 0 to use driver default
905 * of this WPA IE is optional. If the driver generates the WPA
908 * the driver has to notify wpa_supplicant about the used WPA
913 * instead. The driver can determine which version is used by
1006 * is the 32-octet (256-bit) PSK, if available. The driver wrapper
1014 * Configure the driver to drop all non-EAPOL frames (both receive and
1031 * If the driver needs to do special configuration for WPS association,
1412 * This is used by driver which advertises this capability.
1651 * Only used when driver does not support separate unicast/individual
1720 * Key ID is supported by the driver.)
1771 * abstracted P2P Device function in the driver
1800 * struct wpa_driver_capa - Driver capability information
1853 /** Driver generated WPA/RSN IE */
1855 /** Driver needs static WEP key setup after association command */
1857 /** Driver takes care of all DFS operations */
1859 /** Driver takes care of RSN 4-way handshake internally; PMK is configured with
1862 /** Driver is for a wired Ethernet interface */
1864 /** Driver provides separate commands for authentication and association (SME in
1867 /** Driver supports AP mode */
1869 /** Driver needs static WEP key setup after association has been completed */
1871 /** Driver supports dynamic HT 20/40 MHz channel changes during BSS lifetime */
1873 /** Driver supports concurrent P2P operations */
1876 * Driver uses the initial interface as a dedicated management interface, i.e.,
1882 /** Driver supports station and key removal when stopping an AP */
1885 * Driver uses the initial interface for P2P management interface and non-P2P
1891 * Driver is known to use sane error codes, i.e., when it indicates that
1896 /** Driver supports off-channel TX */
1898 /** Driver indicates TX status events for EAPOL Data frames */
1900 /** Driver indicates TX status events for Deauth/Disassoc frames */
1902 /** Driver supports roaming (BSS selection) in firmware */
1904 /** Driver supports operating as a TDLS peer */
1906 /** Driver requires external TDLS setup/teardown/discovery */
1908 /** Driver indicates support for Probe Response offloading in AP mode */
1910 /** Driver supports U-APSD in AP mode */
1912 /** Driver supports inactivity timer in AP mode */
1914 /** Driver expects user space implementation of MLME in AP mode */
1916 /** Driver supports SAE with user space SME */
1918 /** Driver makes use of OBSS scan mechanism in wpa_supplicant */
1920 /** Driver supports IBSS (Ad-hoc) mode */
1922 /** Driver supports radar detection */
1924 /** Driver supports a dedicated interface for P2P Device */
1926 /** Driver supports QoS Mapping */
1928 /** Driver supports CSA in AP mode */
1930 /** Driver supports mesh */
1932 /** Driver support ACS offload */
1934 /** Driver supports key management offload */
1936 /** Driver supports TDLS channel switching */
1938 /** Driver supports IBSS with HT datarates */
1940 /** Driver supports IBSS with VHT datarates */
1942 /** Driver supports automatic band selection */
1944 /** Driver supports simultaneous off-channel operations */
1946 /** Driver supports full AP client state */
1948 /** Driver supports P2P Listen offload */
1950 /** Driver supports FILS */
1952 /** Driver supports Beacon frame TX rate configuration (legacy rates) */
1954 /** Driver supports Beacon frame TX rate configuration (HT rates) */
1956 /** Driver supports Beacon frame TX rate configuration (VHT rates) */
1958 /** Driver supports mgmt_tx with random TX address in non-connected state */
1960 /** Driver supports mgmt_tx with random TX addr in connected state */
1962 /** Driver supports better BSS reporting with sched_scan in connected mode */
1964 /** Driver supports HE capabilities */
1966 /** Driver supports FILS shared key offload */
1968 /** Driver supports all OCE STA specific mandatory features */
1970 /** Driver supports all OCE AP specific mandatory features */
1973 * Driver supports all OCE STA-CFON specific mandatory features only.
1974 * If a driver sets this bit but not the %WPA_DRIVER_FLAGS_OCE_AP, the
1975 * userspace shall assume that this driver may not support all OCE AP
1979 /** Driver supports MFP-optional in the connect command */
1981 /** Driver is a self-managed regulatory device */
1983 /** Driver supports FTM responder functionality */
1985 /** Driver support 4-way handshake offload for WPA-Personal */
1987 /** Driver supports a separate control port TX for EAPOL frames */
1989 /** Driver supports VLAN offload */
1991 /** Driver supports UPDATE_FT_IES command */
1993 /** Driver can correctly rekey PTKs without Extended Key ID */
1995 /** Driver supports Beacon protection */
1997 /** Driver supports Extended Key ID */
2001 /** Driver supports a separate control port RX for EAPOL frames */
2003 /** Driver supports TX status reports for EAPOL frames through control port */
2005 /** Driver supports secure LTF */
2007 /** Driver supports secure RTT measurement exchange */
2010 * Driver supports protection of range negotiation and measurement management
2014 /** Driver supports Beacon frame TX rate configuration (HE rates) */
2016 /** Driver supports Beacon protection only in client mode */
2018 /** Driver supports Operating Channel Validation */
2020 /** Driver expects user space implementation of SME in AP mode */
2059 * max_stations - Maximum number of associated stations the driver
2065 * probe_resp_offloads - Bitmap of supported protocols by the driver
2068 /** Driver Probe Response offloading support for WPS ver. 1 */
2070 /** Driver Probe Response offloading support for WPS ver. 2 */
2072 /** Driver Probe Response offloading support for P2P */
2074 /** Driver Probe Response offloading support for IEEE 802.11u (Interworking) */
2086 * extended_capa - extended capabilities in driver/device
2088 * Must be allocated and freed by driver and the pointers must be
2089 * valid for the lifetime of the driver, i.e., freed in deinit()
2096 /** Driver adds the DS Params Set IE in Probe Request frames */
2098 /** Driver adds the WFA TPC IE in Probe Request frames */
2100 /** Driver handles quiet period requests */
2103 * Driver is capable of inserting the current TX power value into the body of
2113 * Driver supports RRM. With this support, the driver will accept to use RRM in
2118 /** Driver supports setting the scan dwell time */
2120 /** Driver supports Beacon Report Measurement */
2125 /* Driver concurrency capabilities */
2265 WNM_SLEEP_TFS_REQ_IE_ADD, /* STA requests driver to add TFS req IE */
2267 WNM_SLEEP_TFS_REQ_IE_SET, /* AP requests driver to set TFS req IE for
2269 WNM_SLEEP_TFS_RESP_IE_ADD, /* AP requests driver to add TFS resp IE
2272 WNM_SLEEP_TFS_RESP_IE_SET, /* AP requests driver to set TFS resp IE
2505 * from user space to the driver.
2529 * struct wpa_driver_ops - Driver interface API definition
2531 * This structure defines the API that each driver interface needs to implement
2532 * for core wpa_supplicant code. All driver specific functionality is captured
2536 /** Name of the driver interface */
2538 /** One line description of the driver interface */
2543 * @priv: private driver interface data
2548 * Query kernel driver for the current BSSID and copy it to bssid.
2556 * @priv: private driver interface data
2561 * Query kernel driver for the current SSID and copy it to ssid.
2573 * @priv: private driver interface data
2577 * Configure the given key for the kernel driver. If the driver
2598 * init - Initialize driver interface
2605 * Initialize driver interface, including event processing for kernel
2606 * driver events (e.g., associated, scan results, Michael MIC failure).
2609 * needed in future driver operations. If this is not used, non-NULL
2623 * deinit - Deinitialize driver interface
2624 * @priv: private driver interface data from init()
2626 * Shut down driver interface and processing of driver events. Free
2632 * set_param - Set driver configuration parameters
2633 * @priv: private driver interface data from init()
2634 * @param: driver specific configuration parameters
2638 * Optional handler for notifying driver interface about configuration
2645 * @priv: private driver interface data
2650 * Configure TKIP countermeasures. When these are enabled, the driver
2656 * deauthenticate - Request driver to deauthenticate
2657 * @priv: private driver interface data
2667 * associate - Request driver to associate
2668 * @priv: private driver interface data
2677 * add_pmkid - Add PMKSA cache entry to the driver
2678 * @priv: private driver interface data
2688 * If the driver generates RSN IE, i.e., it does not use wpa_ie in
2690 * in the driver. If the driver uses wpa_ie from wpa_supplicant, this
2692 * the driver does not support WPA, this function is not needed.
2697 * remove_pmkid - Remove PMKSA cache entry to the driver
2698 * @priv: private driver interface data
2707 * If the driver generates RSN IE, i.e., it does not use wpa_ie in
2709 * between the driver and wpa_supplicant. If the driver uses wpa_ie
2711 * implemented. Likewise, if the driver does not support WPA, this
2718 * @priv: private driver interface data
2725 * If the driver generates RSN IE, i.e., it does not use wpa_ie in
2727 * between the driver and wpa_supplicant. If the driver uses wpa_ie
2729 * implemented. Likewise, if the driver does not support WPA, this
2735 * get_capa - Get driver capabilities
2736 * @priv: private driver interface data
2740 * Get driver/firmware/hardware capabilities.
2745 * poll - Poll driver for association information
2746 * @priv: private driver interface data
2748 * This is an option callback that can be used when the driver does not
2751 * information. The driver interface is supposed to generate associnfo
2753 * driver interface should generate an association event after having
2760 * @priv: private driver interface data
2768 * @priv: private driver interface data
2773 * This optional function can be used to allow the driver interface to
2781 * @priv: private driver interface data
2786 * device from the driver interface code. This is only needed if the
2793 * @priv: private driver interface data
2807 * @priv: Private driver interface data
2814 * This is an optional function that can be used to set the driver to
2826 * @priv: Private driver interface data
2839 * @priv: Private driver interface data
2844 * driver decide
2859 * @priv: Private driver interface data
2865 * The supplicant uses this callback to let the driver know that keying
2866 * material for FT is available and that the driver can use the
2869 * This function is only needed for driver that support IEEE 802.11r
2877 * @priv: private driver interface data
2886 * @priv: Private driver interface data
2897 * @priv: Private driver interface data
2904 * global_init - Global driver initialization
2908 * This optional function is called to initialize the driver wrapper
2911 * implemented to free the private data. The driver will also likely
2918 * global_deinit - Global driver deinitialization
2919 * @priv: private driver global data from global_init()
2921 * Terminate any global driver related functionality and free the
2927 * init2 - Initialize driver interface (with global data)
2931 * @global_priv: private driver global data from global_init()
2934 * This function can be used instead of init() if the driver wrapper
2941 * @global_priv: private driver global data from global_init()
2949 * scan2 - Request the driver to initiate scan
2950 * @priv: private driver interface data
2955 * Once the scan results are ready, the driver should report scan
2962 * authenticate - Request driver to authenticate
2963 * @priv: private driver interface data
2978 * @priv: Private driver interface data
2982 * to add for Beacon and Probe Response frames for the driver in
2983 * AP mode. The driver is responsible for building the full Beacon
2985 * driver/firmware and finishing with the tail part. Depending on the
2986 * driver architectue, this can be done either by using the full
2988 * Similarly, Probe Response processing depends on the driver design.
2989 * If the driver (or firmware) takes care of replying to Probe Request
2999 * @priv: Private driver interface data
3008 * hapd_init - Initialize driver interface (hostapd only)
3010 * @params: Configuration for the driver wrapper
3013 * This function is used instead of init() or init2() when the driver
3020 * hapd_deinit - Deinitialize driver interface (hostapd only)
3021 * @priv: Private driver interface data from hapd_init()
3027 * @priv: Private driver interface data
3031 * This is an optional function to configure the kernel driver to
3034 * always enabled and the driver uses set_ap() to set WPA/RSN IE
3043 * @priv: Private driver interface data
3048 * kernel driver for Beacon frames. This can be left undefined (set to
3049 * %NULL) if the driver uses the Beacon template from set_ap().
3058 * @priv: Private driver interface data
3074 * @priv: Private driver interface data
3077 * This function requests the driver to disassociate all associated
3079 * driver does not process association frames internally.
3085 * @priv: Private driver interface data
3091 * kernel driver for Beacon and Probe Response frames. This can be left
3092 * undefined (set to %NULL) if the driver uses the Beacon template from
3101 * @priv: Private driver interface data
3111 * @priv: Private driver interface data
3120 * This is like a normal Ethernet send except that the driver is aware
3123 * the frame and other driver management operations such as key
3128 * This function is only used for a given interface if the driver
3138 * @priv: private driver interface data
3154 * @priv: Private driver interface data
3168 * @priv: Private driver interface data
3182 * @priv: Private driver interface data
3190 * @priv: Private driver interface data
3195 * This function need not be implemented if the driver uses Beacon
3202 * @priv: Private driver interface data
3213 * @priv: Private driver interface data
3217 * This need not be implemented if the driver does not take care of
3224 * @priv: Private driver interface data
3229 * entry in the driver. Adding STA entries is used only if the driver
3233 * is used to add a station entry to the driver once the station has
3244 * @priv: Private driver interface data
3252 * @priv: Private driver interface data
3260 * @priv: Private driver interface data
3268 * @priv: Private driver interface data
3276 * @priv: Private driver interface data
3284 * @priv: Private driver interface data
3297 * @priv: Private driver interface data
3307 * @priv: Private driver interface data
3319 * @priv: Private driver interface data
3325 * @drv_priv: Pointer for overwriting the driver context or %NULL if
3328 * driver ended up using if it differs from the requested ifname
3330 * (this may differ from the requested addr if the driver cannot
3344 * @priv: Private driver interface data
3354 * @priv: Private driver interface data
3371 * @priv: driver private data
3374 * This optional handler function can be registered if the driver
3383 * @priv: Private driver interface data
3394 * @priv: Private driver interface data
3402 * @priv: Private driver interface data
3410 * This is an optional function to add WPS IE in the kernel driver for
3412 * to %NULL) if the driver uses the Beacon template from set_ap()
3413 * and does not process Probe Request frames. If the driver takes care
3419 * frames when operating as a GO. The driver is responsible for adding
3434 * @priv: Private driver interface data
3442 * @priv: Private driver interface data
3457 * @priv: Private driver interface data
3468 * This command can be used to request the driver to transmit an action
3490 * @priv: Private driver interface data
3494 * set in the driver flags.
3500 * @priv: Private driver interface data
3505 * This command is used to request the driver to remain awake on the
3511 * The driver may not be at the requested channel when this function
3514 * EVENT_REMAIN_ON_CHANNEL event indicates that the driver has
3525 * @priv: Private driver interface data
3538 * @priv: Private driver interface data
3542 * This command can be used to request the driver to indicate when
3547 * used to notify the driver when the Probe Request frames need to be
3554 * @priv: Private driver interface data
3559 * change the driver mode to station mode to allow normal station
3566 * @priv: Private driver interface data
3577 * @priv: Private driver interface data
3583 * @priv: Private driver interface data
3589 * @priv: Private driver interface data
3605 * @priv: Private driver interface data
3618 * @priv: Private driver interface data
3632 * @priv: Private driver interface data
3643 * @priv: Private driver interface data
3651 * @priv: Private driver interface data
3664 * @priv: private driver interface data
3675 * This optional function can be used to send packet to driver which is
3683 * tdls_oper - Ask the driver to perform high-level TDLS operations
3684 * @priv: Private driver interface data
3690 * to the driver.
3695 * wnm_oper - Notify driver of the WNM frame reception
3696 * @priv: Private driver interface data
3699 * @buf: Buffer for the driver to fill in (for getting IE)
3708 * @priv: Private driver interface data
3717 * @priv: Private driver interface data
3729 * @priv: Private driver interface data
3756 * @priv: Private driver interface data
3762 * @priv: Private driver interface data
3769 * @priv: Private driver interface data
3776 * @priv: Private driver interface data
3784 * @priv: Private driver interface data
3789 * mode when static WEP is used. If the driver uses user space MLME/SME
3798 * driver_cmd - Execute driver-specific command
3799 * @priv: Private driver interface data
3810 * @priv: Private driver interface data
3821 * the driver/device. The command is identified by vendor id and
3827 * The exact driver behavior is driver interface and vendor specific. As
3829 * command in case of the nl80211 driver interface.
3838 * @priv: Private driver interface data
3846 * driver/firmware to process EAPOL-Key frames in Group Key Handshake
3855 * @priv: Private driver interface data
3864 * This function indicates the driver to send (Re)Association
3872 * @priv: private driver interface data
3882 * @priv: Private driver interface data
3895 * add_sta_node - Add a station node in the driver
3896 * @priv: Private driver interface data
3901 * This function adds the station node in the driver, when
3907 * sched_scan - Request the driver to initiate scheduled scan
3908 * @priv: Private driver interface data
3914 * driver should report scan results event for wpa_supplicant
3923 * stop_sched_scan - Request the driver to stop a scheduled scan
3924 * @priv: Private driver interface data
3935 * @priv: Private driver interface data
3942 * driver provides such inactivity polling mechanism.
3949 * @priv: Private driver interface data
3962 * @priv: Private driver interface data
3973 * @priv: Private driver interface data
3986 * @priv: Private driver interface data
3995 * @priv: Private driver interface data
4001 * The function indicates to driver that it can start switching to a
4011 * @priv: Private driver interface data
4015 * This function indicates to the driver that it should stop switching
4022 * @priv: Private driver interface data
4030 * @priv: Private driver interface data
4041 * @priv: Private driver interface data
4065 * status - Get driver interface status information
4066 * @priv: Private driver interface data
4074 * roaming - Set roaming policy for driver-based BSS selection
4075 * @priv: Private driver interface data
4081 * associate() command (bssid being set there indicates that the driver
4083 * If the driver does not indicate WPA_DRIVER_FLAGS_BSS_SELECTION
4091 * @priv: Private driver interface data
4095 * This callback can be used to configure driver and below layers to
4102 * @priv: Private driver interface data
4114 * macsec_get_capability - Inform MKA of this driver's capability
4115 * @priv: Private driver interface data
4116 * @cap: Driver's capability
4123 * @priv: Private driver interface data
4132 * @priv: Private driver interface data
4141 * @priv: Private driver interface data
4151 * @priv: Private driver interface data
4159 * @priv: Private driver interface data
4168 * @priv: Private driver interface data
4176 * @priv: Private driver interface data
4184 * @priv: Private driver interface data
4192 * @priv: Private driver interface data
4200 * @priv: Private driver interface data
4213 * @priv: private driver interface data from init()
4221 * @priv: private driver interface data from init()
4229 * @priv: Private driver interface data from init()
4237 * @priv: private driver interface data from init()
4245 * @priv: private driver interface data from init()
4253 * @priv: private driver interface data from init()
4263 * @priv: private driver interface data from init()
4271 * @priv: private driver interface data from init()
4279 * @priv: Private driver interface data from init()
4287 * @priv: private driver interface data from init()
4295 * @priv: private driver interface data from init()
4303 * init_mesh - Driver specific initialization for mesh
4304 * @priv: Private driver interface data
4311 * @priv: Private driver interface data
4320 * @priv: Private driver interface data
4328 * @priv: Private driver interface data
4339 * @priv: Private driver interface data
4343 * This command can be used to offload ACS to the driver if the driver
4349 * set_band - Notify driver of band(s) selection
4350 * @priv: Private driver interface data
4358 * @priv: Private driver interface data
4365 * the driver specific to a particular interface type.
4372 * @priv: Private driver interface data
4376 * This command can be used to inform the driver of the operating
4383 * abort_scan - Request the driver to abort an ongoing scan
4384 * @priv: Private driver interface data
4394 * @priv: Private driver interface data
4403 * @priv: Private driver interface data
4416 * @priv: Private driver interface data
4435 * @priv: Private driver interface data
4442 * @priv: Private driver interface data
4447 * The driver can use these by default when there are no scan IEs coming
4450 * request, the driver should merge the missing scan IEs in the scan
4457 * set_tdls_mode - Set TDLS trigger mode to the host driver
4458 * @priv: Private driver interface data
4463 * trigger control mode to the host driver.
4469 * @priv: Private driver interface data
4479 * ignore_assoc_disallow - Configure driver to ignore assoc_disallow
4480 * @priv: Private driver interface data
4487 * set_bssid_tmp_disallow - Set disallowed BSSIDs to the driver
4488 * @priv: Private driver interface data
4497 * @priv: Private driver interface data
4504 * driver uses the updated parameters for subsequent roaming. This is
4514 * authentication processing to the host driver.
4515 * @priv: Private driver interface data
4524 * @priv: Private driver interface data
4533 * @priv: Private driver interface data
4540 * This callback is used to let the driver know the DH processing result
4547 * dpp_listen - Notify driver about start/stop of DPP listen
4548 * @priv: Private driver interface data
4565 * This event needs to be delivered when the driver completes IEEE
4570 * more information about the association. If the driver interface gets
4581 * sending either of these frames to the current AP. If the driver
4592 * the local driver. Additional data for event processing is
4605 * is called. If the driver provides an unsolicited event when the scan
4608 * driver, the driver wrapper code is expected to use a registered
4622 * EVENT_ASSOC. Alternatively, the driver interface can include
4653 * EVENT_PMKID_CANDIDATE can be called whenever the driver has updates
4660 * Driver will be notified about successful pre-authentication with
4675 * The driver is expected to report the received FT IEs from
4684 * The driver can use this event to inform wpa_supplicant about a STA
4695 * completed. This is only used if the driver supports separate
4754 * This event is used to indicate when the driver has started the
4763 * This event is used to indicate when the driver has completed
4775 * union wpa_event_data::rx_probe_req. The driver is required to report
4798 * deliver the receive EAPOL frames from the driver.
4839 * This event is used to indicate that the driver cannot maintain this
4843 * the driver does not support radar detection and another virtual
4854 * Driver generates this event whenever it detects a better channel
4883 * Driver generates this event whenever it detected that a particular
4895 * EVENT_DRIVER_GTK_REKEY - Device/driver did GTK rekey
4898 * of the current EAPOL-Key Replay Counter in case the driver/firmware
4948 * This event indicates that the driver reported a connection failure
4988 * This event gets triggered when a driver query is issued for survey
5000 * This indicates that driver has started a scan operation either based
5012 * information in the driver.
5034 * on a DFS frequency by a driver that supports DFS Offload.
5066 * necessary information from the host driver for the authentication to
5074 * This event should be indicated when the driver completes the 4-way
5189 * driver interface does not need to generate separate EVENT_ASSOCINFO
5201 * If the driver generates WPA/RSN IE, this event data must be
5219 * Optional association data from the driver. This data is not
5221 * such, should be reported if this is available to the driver
5253 * again (without scan request). At this point, the driver is
5495 * During FT (IEEE 802.11r) authentication sequence, the driver is
5544 * Optional association data from the driver. This data is not
5546 * such, should be reported if this is available to the driver
5582 * reason_code - Connection failure reason code from the driver
5621 * drv_priv - Pointer to store driver private BSS information
5925 * @ch_width: Selected Channel width by driver. Driver may choose to
5926 * change hostapd configured ACS channel width due driver internal
6010 * wpa_supplicant_event - Report a driver event for wpa_supplicant
6016 * Driver wrapper code should call this function whenever an event is received
6017 * from the driver.
6023 * wpa_supplicant_event_global - Report a driver event for wpa_supplicant
6088 /* Convert driver flag to string */
6092 /* NULL terminated array of linked in driver wrappers */