P2P: Fix persistent group profile on manual disabled=2 change
[mech_eap.git] / wpa_supplicant / notify.c
1 /*
2  * wpa_supplicant - Event notifications
3  * Copyright (c) 2009-2010, Jouni Malinen <j@w1.fi>
4  *
5  * This software may be distributed under the terms of the BSD license.
6  * See README for more details.
7  */
8
9 #include "utils/includes.h"
10
11 #include "utils/common.h"
12 #include "common/wpa_ctrl.h"
13 #include "config.h"
14 #include "wpa_supplicant_i.h"
15 #include "wps_supplicant.h"
16 #include "dbus/dbus_common.h"
17 #include "dbus/dbus_old.h"
18 #include "dbus/dbus_new.h"
19 #include "rsn_supp/wpa.h"
20 #include "driver_i.h"
21 #include "scan.h"
22 #include "p2p_supplicant.h"
23 #include "sme.h"
24 #include "notify.h"
25
26 int wpas_notify_supplicant_initialized(struct wpa_global *global)
27 {
28 #ifdef CONFIG_DBUS
29         if (global->params.dbus_ctrl_interface) {
30                 global->dbus = wpas_dbus_init(global);
31                 if (global->dbus == NULL)
32                         return -1;
33         }
34 #endif /* CONFIG_DBUS */
35
36         return 0;
37 }
38
39
40 void wpas_notify_supplicant_deinitialized(struct wpa_global *global)
41 {
42 #ifdef CONFIG_DBUS
43         if (global->dbus)
44                 wpas_dbus_deinit(global->dbus);
45 #endif /* CONFIG_DBUS */
46 }
47
48
49 int wpas_notify_iface_added(struct wpa_supplicant *wpa_s)
50 {
51         if (wpa_s->p2p_mgmt)
52                 return 0;
53
54         if (wpas_dbus_register_iface(wpa_s))
55                 return -1;
56
57         if (wpas_dbus_register_interface(wpa_s))
58                 return -1;
59
60         return 0;
61 }
62
63
64 void wpas_notify_iface_removed(struct wpa_supplicant *wpa_s)
65 {
66         if (wpa_s->p2p_mgmt)
67                 return;
68
69         /* unregister interface in old DBus ctrl iface */
70         wpas_dbus_unregister_iface(wpa_s);
71
72         /* unregister interface in new DBus ctrl iface */
73         wpas_dbus_unregister_interface(wpa_s);
74 }
75
76
77 void wpas_notify_state_changed(struct wpa_supplicant *wpa_s,
78                                enum wpa_states new_state,
79                                enum wpa_states old_state)
80 {
81         if (wpa_s->p2p_mgmt)
82                 return;
83
84         /* notify the old DBus API */
85         wpa_supplicant_dbus_notify_state_change(wpa_s, new_state,
86                                                 old_state);
87
88         /* notify the new DBus API */
89         wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_STATE);
90
91         if (new_state == WPA_COMPLETED)
92                 wpas_p2p_notif_connected(wpa_s);
93         else if (old_state >= WPA_ASSOCIATED && new_state < WPA_ASSOCIATED)
94                 wpas_p2p_notif_disconnected(wpa_s);
95
96         sme_state_changed(wpa_s);
97
98 #ifdef ANDROID
99         wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_STATE_CHANGE
100                      "id=%d state=%d BSSID=" MACSTR " SSID=%s",
101                      wpa_s->current_ssid ? wpa_s->current_ssid->id : -1,
102                      new_state,
103                      MAC2STR(wpa_s->bssid),
104                      wpa_s->current_ssid && wpa_s->current_ssid->ssid ?
105                      wpa_ssid_txt(wpa_s->current_ssid->ssid,
106                                   wpa_s->current_ssid->ssid_len) : "");
107 #endif /* ANDROID */
108 }
109
110
111 void wpas_notify_disconnect_reason(struct wpa_supplicant *wpa_s)
112 {
113         if (wpa_s->p2p_mgmt)
114                 return;
115
116         wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_DISCONNECT_REASON);
117 }
118
119
120 void wpas_notify_network_changed(struct wpa_supplicant *wpa_s)
121 {
122         if (wpa_s->p2p_mgmt)
123                 return;
124
125         wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_CURRENT_NETWORK);
126 }
127
128
129 void wpas_notify_ap_scan_changed(struct wpa_supplicant *wpa_s)
130 {
131         if (wpa_s->p2p_mgmt)
132                 return;
133
134         wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_AP_SCAN);
135 }
136
137
138 void wpas_notify_bssid_changed(struct wpa_supplicant *wpa_s)
139 {
140         if (wpa_s->p2p_mgmt)
141                 return;
142
143         wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_CURRENT_BSS);
144 }
145
146
147 void wpas_notify_auth_changed(struct wpa_supplicant *wpa_s)
148 {
149         if (wpa_s->p2p_mgmt)
150                 return;
151
152         wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_CURRENT_AUTH_MODE);
153 }
154
155
156 void wpas_notify_network_enabled_changed(struct wpa_supplicant *wpa_s,
157                                          struct wpa_ssid *ssid)
158 {
159         if (wpa_s->p2p_mgmt)
160                 return;
161
162         wpas_dbus_signal_network_enabled_changed(wpa_s, ssid);
163 }
164
165
166 void wpas_notify_network_selected(struct wpa_supplicant *wpa_s,
167                                   struct wpa_ssid *ssid)
168 {
169         if (wpa_s->p2p_mgmt)
170                 return;
171
172         wpas_dbus_signal_network_selected(wpa_s, ssid->id);
173 }
174
175
176 void wpas_notify_network_request(struct wpa_supplicant *wpa_s,
177                                  struct wpa_ssid *ssid,
178                                  enum wpa_ctrl_req_type rtype,
179                                  const char *default_txt)
180 {
181         if (wpa_s->p2p_mgmt)
182                 return;
183
184         wpas_dbus_signal_network_request(wpa_s, ssid, rtype, default_txt);
185 }
186
187
188 void wpas_notify_scanning(struct wpa_supplicant *wpa_s)
189 {
190         if (wpa_s->p2p_mgmt)
191                 return;
192
193         /* notify the old DBus API */
194         wpa_supplicant_dbus_notify_scanning(wpa_s);
195
196         /* notify the new DBus API */
197         wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_SCANNING);
198 }
199
200
201 void wpas_notify_scan_done(struct wpa_supplicant *wpa_s, int success)
202 {
203         if (wpa_s->p2p_mgmt)
204                 return;
205
206         wpas_dbus_signal_scan_done(wpa_s, success);
207 }
208
209
210 void wpas_notify_scan_results(struct wpa_supplicant *wpa_s)
211 {
212         if (wpa_s->p2p_mgmt)
213                 return;
214
215         /* notify the old DBus API */
216         wpa_supplicant_dbus_notify_scan_results(wpa_s);
217
218         wpas_wps_notify_scan_results(wpa_s);
219 }
220
221
222 void wpas_notify_wps_credential(struct wpa_supplicant *wpa_s,
223                                 const struct wps_credential *cred)
224 {
225         if (wpa_s->p2p_mgmt)
226                 return;
227
228 #ifdef CONFIG_WPS
229         /* notify the old DBus API */
230         wpa_supplicant_dbus_notify_wps_cred(wpa_s, cred);
231         /* notify the new DBus API */
232         wpas_dbus_signal_wps_cred(wpa_s, cred);
233 #endif /* CONFIG_WPS */
234 }
235
236
237 void wpas_notify_wps_event_m2d(struct wpa_supplicant *wpa_s,
238                                struct wps_event_m2d *m2d)
239 {
240         if (wpa_s->p2p_mgmt)
241                 return;
242
243 #ifdef CONFIG_WPS
244         wpas_dbus_signal_wps_event_m2d(wpa_s, m2d);
245 #endif /* CONFIG_WPS */
246 }
247
248
249 void wpas_notify_wps_event_fail(struct wpa_supplicant *wpa_s,
250                                 struct wps_event_fail *fail)
251 {
252         if (wpa_s->p2p_mgmt)
253                 return;
254
255 #ifdef CONFIG_WPS
256         wpas_dbus_signal_wps_event_fail(wpa_s, fail);
257 #endif /* CONFIG_WPS */
258 }
259
260
261 void wpas_notify_wps_event_success(struct wpa_supplicant *wpa_s)
262 {
263         if (wpa_s->p2p_mgmt)
264                 return;
265
266 #ifdef CONFIG_WPS
267         wpas_dbus_signal_wps_event_success(wpa_s);
268 #endif /* CONFIG_WPS */
269 }
270
271 void wpas_notify_wps_event_pbc_overlap(struct wpa_supplicant *wpa_s)
272 {
273         if (wpa_s->p2p_mgmt)
274                 return;
275
276 #ifdef CONFIG_WPS
277         wpas_dbus_signal_wps_event_pbc_overlap(wpa_s);
278 #endif /* CONFIG_WPS */
279 }
280
281
282 void wpas_notify_network_added(struct wpa_supplicant *wpa_s,
283                                struct wpa_ssid *ssid)
284 {
285         if (wpa_s->p2p_mgmt)
286                 return;
287
288         /*
289          * Networks objects created during any P2P activities should not be
290          * exposed out. They might/will confuse certain non-P2P aware
291          * applications since these network objects won't behave like
292          * regular ones.
293          */
294         if (!ssid->p2p_group && wpa_s->global->p2p_group_formation != wpa_s)
295                 wpas_dbus_register_network(wpa_s, ssid);
296 }
297
298
299 void wpas_notify_persistent_group_added(struct wpa_supplicant *wpa_s,
300                                         struct wpa_ssid *ssid)
301 {
302 #ifdef CONFIG_P2P
303         wpas_dbus_register_persistent_group(wpa_s, ssid);
304 #endif /* CONFIG_P2P */
305 }
306
307
308 void wpas_notify_persistent_group_removed(struct wpa_supplicant *wpa_s,
309                                           struct wpa_ssid *ssid)
310 {
311 #ifdef CONFIG_P2P
312         wpas_dbus_unregister_persistent_group(wpa_s, ssid->id);
313 #endif /* CONFIG_P2P */
314 }
315
316
317 void wpas_notify_network_removed(struct wpa_supplicant *wpa_s,
318                                  struct wpa_ssid *ssid)
319 {
320         if (wpa_s->next_ssid == ssid)
321                 wpa_s->next_ssid = NULL;
322         if (wpa_s->wpa)
323                 wpa_sm_pmksa_cache_flush(wpa_s->wpa, ssid);
324         if (!ssid->p2p_group && wpa_s->global->p2p_group_formation != wpa_s &&
325             !wpa_s->p2p_mgmt)
326                 wpas_dbus_unregister_network(wpa_s, ssid->id);
327         if (network_is_persistent_group(ssid))
328                 wpas_notify_persistent_group_removed(wpa_s, ssid);
329
330         wpas_p2p_network_removed(wpa_s, ssid);
331 }
332
333
334 void wpas_notify_bss_added(struct wpa_supplicant *wpa_s,
335                            u8 bssid[], unsigned int id)
336 {
337         if (wpa_s->p2p_mgmt)
338                 return;
339
340         wpas_dbus_register_bss(wpa_s, bssid, id);
341         wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_BSS_ADDED "%u " MACSTR,
342                      id, MAC2STR(bssid));
343 }
344
345
346 void wpas_notify_bss_removed(struct wpa_supplicant *wpa_s,
347                              u8 bssid[], unsigned int id)
348 {
349         if (wpa_s->p2p_mgmt)
350                 return;
351
352         wpas_dbus_unregister_bss(wpa_s, bssid, id);
353         wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_BSS_REMOVED "%u " MACSTR,
354                      id, MAC2STR(bssid));
355 }
356
357
358 void wpas_notify_bss_freq_changed(struct wpa_supplicant *wpa_s,
359                                   unsigned int id)
360 {
361         if (wpa_s->p2p_mgmt)
362                 return;
363
364         wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_FREQ, id);
365 }
366
367
368 void wpas_notify_bss_signal_changed(struct wpa_supplicant *wpa_s,
369                                     unsigned int id)
370 {
371         if (wpa_s->p2p_mgmt)
372                 return;
373
374         wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_SIGNAL,
375                                           id);
376 }
377
378
379 void wpas_notify_bss_privacy_changed(struct wpa_supplicant *wpa_s,
380                                      unsigned int id)
381 {
382         if (wpa_s->p2p_mgmt)
383                 return;
384
385         wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_PRIVACY,
386                                           id);
387 }
388
389
390 void wpas_notify_bss_mode_changed(struct wpa_supplicant *wpa_s,
391                                   unsigned int id)
392 {
393         if (wpa_s->p2p_mgmt)
394                 return;
395
396         wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_MODE, id);
397 }
398
399
400 void wpas_notify_bss_wpaie_changed(struct wpa_supplicant *wpa_s,
401                                    unsigned int id)
402 {
403         if (wpa_s->p2p_mgmt)
404                 return;
405
406         wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_WPA, id);
407 }
408
409
410 void wpas_notify_bss_rsnie_changed(struct wpa_supplicant *wpa_s,
411                                    unsigned int id)
412 {
413         if (wpa_s->p2p_mgmt)
414                 return;
415
416         wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_RSN, id);
417 }
418
419
420 void wpas_notify_bss_wps_changed(struct wpa_supplicant *wpa_s,
421                                  unsigned int id)
422 {
423         if (wpa_s->p2p_mgmt)
424                 return;
425
426 #ifdef CONFIG_WPS
427         wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_WPS, id);
428 #endif /* CONFIG_WPS */
429 }
430
431
432 void wpas_notify_bss_ies_changed(struct wpa_supplicant *wpa_s,
433                                    unsigned int id)
434 {
435         if (wpa_s->p2p_mgmt)
436                 return;
437
438         wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_IES, id);
439 }
440
441
442 void wpas_notify_bss_rates_changed(struct wpa_supplicant *wpa_s,
443                                    unsigned int id)
444 {
445         if (wpa_s->p2p_mgmt)
446                 return;
447
448         wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_RATES, id);
449 }
450
451
452 void wpas_notify_bss_seen(struct wpa_supplicant *wpa_s, unsigned int id)
453 {
454         if (wpa_s->p2p_mgmt)
455                 return;
456
457         wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_AGE, id);
458 }
459
460
461 void wpas_notify_blob_added(struct wpa_supplicant *wpa_s, const char *name)
462 {
463         if (wpa_s->p2p_mgmt)
464                 return;
465
466         wpas_dbus_signal_blob_added(wpa_s, name);
467 }
468
469
470 void wpas_notify_blob_removed(struct wpa_supplicant *wpa_s, const char *name)
471 {
472         if (wpa_s->p2p_mgmt)
473                 return;
474
475         wpas_dbus_signal_blob_removed(wpa_s, name);
476 }
477
478
479 void wpas_notify_debug_level_changed(struct wpa_global *global)
480 {
481         wpas_dbus_signal_debug_level_changed(global);
482 }
483
484
485 void wpas_notify_debug_timestamp_changed(struct wpa_global *global)
486 {
487         wpas_dbus_signal_debug_timestamp_changed(global);
488 }
489
490
491 void wpas_notify_debug_show_keys_changed(struct wpa_global *global)
492 {
493         wpas_dbus_signal_debug_show_keys_changed(global);
494 }
495
496
497 void wpas_notify_suspend(struct wpa_global *global)
498 {
499         struct wpa_supplicant *wpa_s;
500
501         os_get_time(&global->suspend_time);
502         wpa_printf(MSG_DEBUG, "System suspend notification");
503         for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next)
504                 wpa_drv_suspend(wpa_s);
505 }
506
507
508 void wpas_notify_resume(struct wpa_global *global)
509 {
510         struct os_time now;
511         int slept;
512         struct wpa_supplicant *wpa_s;
513
514         if (global->suspend_time.sec == 0)
515                 slept = -1;
516         else {
517                 os_get_time(&now);
518                 slept = now.sec - global->suspend_time.sec;
519         }
520         wpa_printf(MSG_DEBUG, "System resume notification (slept %d seconds)",
521                    slept);
522
523         for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next) {
524                 wpa_drv_resume(wpa_s);
525                 if (wpa_s->wpa_state == WPA_DISCONNECTED)
526                         wpa_supplicant_req_scan(wpa_s, 0, 100000);
527         }
528 }
529
530
531 #ifdef CONFIG_P2P
532
533 void wpas_notify_p2p_find_stopped(struct wpa_supplicant *wpa_s)
534 {
535         /* Notify P2P find has stopped */
536         wpas_dbus_signal_p2p_find_stopped(wpa_s);
537 }
538
539
540 void wpas_notify_p2p_device_found(struct wpa_supplicant *wpa_s,
541                                   const u8 *dev_addr, int new_device)
542 {
543         if (new_device) {
544                 /* Create the new peer object */
545                 wpas_dbus_register_peer(wpa_s, dev_addr);
546         }
547
548         /* Notify a new peer has been detected*/
549         wpas_dbus_signal_peer_device_found(wpa_s, dev_addr);
550 }
551
552
553 void wpas_notify_p2p_device_lost(struct wpa_supplicant *wpa_s,
554                                  const u8 *dev_addr)
555 {
556         wpas_dbus_unregister_peer(wpa_s, dev_addr);
557
558         /* Create signal on interface object*/
559         wpas_dbus_signal_peer_device_lost(wpa_s, dev_addr);
560 }
561
562
563 void wpas_notify_p2p_group_removed(struct wpa_supplicant *wpa_s,
564                                    const struct wpa_ssid *ssid,
565                                    const char *role)
566 {
567         wpas_dbus_signal_p2p_group_removed(wpa_s, role);
568
569         wpas_dbus_unregister_p2p_group(wpa_s, ssid);
570 }
571
572
573 void wpas_notify_p2p_go_neg_req(struct wpa_supplicant *wpa_s,
574                                 const u8 *src, u16 dev_passwd_id, u8 go_intent)
575 {
576         wpas_dbus_signal_p2p_go_neg_req(wpa_s, src, dev_passwd_id, go_intent);
577 }
578
579
580 void wpas_notify_p2p_go_neg_completed(struct wpa_supplicant *wpa_s,
581                                       struct p2p_go_neg_results *res)
582 {
583         wpas_dbus_signal_p2p_go_neg_resp(wpa_s, res);
584 }
585
586
587 void wpas_notify_p2p_invitation_result(struct wpa_supplicant *wpa_s,
588                                        int status, const u8 *bssid)
589 {
590         wpas_dbus_signal_p2p_invitation_result(wpa_s, status, bssid);
591 }
592
593
594 void wpas_notify_p2p_sd_request(struct wpa_supplicant *wpa_s,
595                                 int freq, const u8 *sa, u8 dialog_token,
596                                 u16 update_indic, const u8 *tlvs,
597                                 size_t tlvs_len)
598 {
599         wpas_dbus_signal_p2p_sd_request(wpa_s, freq, sa, dialog_token,
600                                         update_indic, tlvs, tlvs_len);
601 }
602
603
604 void wpas_notify_p2p_sd_response(struct wpa_supplicant *wpa_s,
605                                  const u8 *sa, u16 update_indic,
606                                  const u8 *tlvs, size_t tlvs_len)
607 {
608         wpas_dbus_signal_p2p_sd_response(wpa_s, sa, update_indic,
609                                          tlvs, tlvs_len);
610 }
611
612
613 /**
614  * wpas_notify_p2p_provision_discovery - Notification of provision discovery
615  * @dev_addr: Who sent the request or responded to our request.
616  * @request: Will be 1 if request, 0 for response.
617  * @status: Valid only in case of response (0 in case of success)
618  * @config_methods: WPS config methods
619  * @generated_pin: PIN to be displayed in case of WPS_CONFIG_DISPLAY method
620  *
621  * This can be used to notify:
622  * - Requests or responses
623  * - Various config methods
624  * - Failure condition in case of response
625  */
626 void wpas_notify_p2p_provision_discovery(struct wpa_supplicant *wpa_s,
627                                          const u8 *dev_addr, int request,
628                                          enum p2p_prov_disc_status status,
629                                          u16 config_methods,
630                                          unsigned int generated_pin)
631 {
632         wpas_dbus_signal_p2p_provision_discovery(wpa_s, dev_addr, request,
633                                                  status, config_methods,
634                                                  generated_pin);
635 }
636
637
638 void wpas_notify_p2p_group_started(struct wpa_supplicant *wpa_s,
639                                    struct wpa_ssid *ssid, int network_id,
640                                    int client)
641 {
642         /* Notify a group has been started */
643         wpas_dbus_register_p2p_group(wpa_s, ssid);
644
645         wpas_dbus_signal_p2p_group_started(wpa_s, ssid, client, network_id);
646 }
647
648
649 void wpas_notify_p2p_wps_failed(struct wpa_supplicant *wpa_s,
650                                 struct wps_event_fail *fail)
651 {
652         wpas_dbus_signal_p2p_wps_failed(wpa_s, fail);
653 }
654
655 #endif /* CONFIG_P2P */
656
657
658 static void wpas_notify_ap_sta_authorized(struct wpa_supplicant *wpa_s,
659                                           const u8 *sta,
660                                           const u8 *p2p_dev_addr)
661 {
662 #ifdef CONFIG_P2P
663         wpas_p2p_notify_ap_sta_authorized(wpa_s, p2p_dev_addr);
664
665         /*
666          * Create 'peer-joined' signal on group object -- will also
667          * check P2P itself.
668          */
669         if (p2p_dev_addr)
670                 wpas_dbus_signal_p2p_peer_joined(wpa_s, p2p_dev_addr);
671 #endif /* CONFIG_P2P */
672
673         /* Notify listeners a new station has been authorized */
674         wpas_dbus_signal_sta_authorized(wpa_s, sta);
675 }
676
677
678 static void wpas_notify_ap_sta_deauthorized(struct wpa_supplicant *wpa_s,
679                                             const u8 *sta,
680                                             const u8 *p2p_dev_addr)
681 {
682 #ifdef CONFIG_P2P
683         /*
684          * Create 'peer-disconnected' signal on group object if this
685          * is a P2P group.
686          */
687         if (p2p_dev_addr)
688                 wpas_dbus_signal_p2p_peer_disconnected(wpa_s, p2p_dev_addr);
689 #endif /* CONFIG_P2P */
690
691         /* Notify listeners a station has been deauthorized */
692         wpas_dbus_signal_sta_deauthorized(wpa_s, sta);
693 }
694
695
696 void wpas_notify_sta_authorized(struct wpa_supplicant *wpa_s,
697                                 const u8 *mac_addr, int authorized,
698                                 const u8 *p2p_dev_addr)
699 {
700         if (authorized)
701                 wpas_notify_ap_sta_authorized(wpa_s, mac_addr, p2p_dev_addr);
702         else
703                 wpas_notify_ap_sta_deauthorized(wpa_s, mac_addr, p2p_dev_addr);
704 }
705
706
707 void wpas_notify_certification(struct wpa_supplicant *wpa_s, int depth,
708                                const char *subject, const char *altsubject[],
709                                int num_altsubject, const char *cert_hash,
710                                const struct wpabuf *cert)
711 {
712         wpa_msg(wpa_s, MSG_INFO, WPA_EVENT_EAP_PEER_CERT
713                 "depth=%d subject='%s'%s%s",
714                 depth, subject, cert_hash ? " hash=" : "",
715                 cert_hash ? cert_hash : "");
716
717         if (cert) {
718                 char *cert_hex;
719                 size_t len = wpabuf_len(cert) * 2 + 1;
720                 cert_hex = os_malloc(len);
721                 if (cert_hex) {
722                         wpa_snprintf_hex(cert_hex, len, wpabuf_head(cert),
723                                          wpabuf_len(cert));
724                         wpa_msg_ctrl(wpa_s, MSG_INFO,
725                                      WPA_EVENT_EAP_PEER_CERT
726                                      "depth=%d subject='%s' cert=%s",
727                                      depth, subject, cert_hex);
728                         os_free(cert_hex);
729                 }
730         }
731
732         if (altsubject) {
733                 int i;
734
735                 for (i = 0; i < num_altsubject; i++)
736                         wpa_msg(wpa_s, MSG_INFO, WPA_EVENT_EAP_PEER_ALT
737                                 "depth=%d %s", depth, altsubject[i]);
738         }
739
740         /* notify the old DBus API */
741         wpa_supplicant_dbus_notify_certification(wpa_s, depth, subject,
742                                                  cert_hash, cert);
743         /* notify the new DBus API */
744         wpas_dbus_signal_certification(wpa_s, depth, subject, altsubject,
745                                        num_altsubject, cert_hash, cert);
746 }
747
748
749 void wpas_notify_preq(struct wpa_supplicant *wpa_s,
750                       const u8 *addr, const u8 *dst, const u8 *bssid,
751                       const u8 *ie, size_t ie_len, u32 ssi_signal)
752 {
753 #ifdef CONFIG_AP
754         wpas_dbus_signal_preq(wpa_s, addr, dst, bssid, ie, ie_len, ssi_signal);
755 #endif /* CONFIG_AP */
756 }
757
758
759 void wpas_notify_eap_status(struct wpa_supplicant *wpa_s, const char *status,
760                             const char *parameter)
761 {
762         wpas_dbus_signal_eap_status(wpa_s, status, parameter);
763         wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_EAP_STATUS
764                      "status='%s' parameter='%s'",
765                      status, parameter);
766 }
767
768
769 void wpas_notify_network_bssid_set_changed(struct wpa_supplicant *wpa_s,
770                                            struct wpa_ssid *ssid)
771 {
772         if (wpa_s->current_ssid != ssid)
773                 return;
774
775         wpa_dbg(wpa_s, MSG_DEBUG,
776                 "Network bssid config changed for the current network - within-ESS roaming %s",
777                 ssid->bssid_set ? "disabled" : "enabled");
778
779         wpa_drv_roaming(wpa_s, !ssid->bssid_set,
780                         ssid->bssid_set ? ssid->bssid : NULL);
781 }
782
783
784 void wpas_notify_network_type_changed(struct wpa_supplicant *wpa_s,
785                                       struct wpa_ssid *ssid)
786 {
787 #ifdef CONFIG_P2P
788         if (ssid->disabled == 2) {
789                 /* Changed from normal network profile to persistent group */
790                 ssid->disabled = 0;
791                 wpas_dbus_unregister_network(wpa_s, ssid->id);
792                 ssid->disabled = 2;
793                 ssid->p2p_persistent_group = 1;
794                 wpas_dbus_register_persistent_group(wpa_s, ssid);
795         } else {
796                 /* Changed from persistent group to normal network profile */
797                 wpas_dbus_unregister_persistent_group(wpa_s, ssid->id);
798                 ssid->p2p_persistent_group = 0;
799                 wpas_dbus_register_network(wpa_s, ssid);
800         }
801 #endif /* CONFIG_P2P */
802 }