xref: /freebsd/contrib/wpa/wpa_supplicant/notify.c (revision 4436b51dff5736e74da464946049ea6899a88938)
1 /*
2  * wpa_supplicant - Event notifications
3  * Copyright (c) 2009-2010, Jouni Malinen <j@w1.fi>
4  *
5  * This software may be distributed under the terms of the BSD license.
6  * See README for more details.
7  */
8 
9 #include "utils/includes.h"
10 
11 #include "utils/common.h"
12 #include "common/wpa_ctrl.h"
13 #include "config.h"
14 #include "wpa_supplicant_i.h"
15 #include "wps_supplicant.h"
16 #include "dbus/dbus_common.h"
17 #include "dbus/dbus_old.h"
18 #include "dbus/dbus_new.h"
19 #include "rsn_supp/wpa.h"
20 #include "driver_i.h"
21 #include "scan.h"
22 #include "p2p_supplicant.h"
23 #include "sme.h"
24 #include "notify.h"
25 
26 int wpas_notify_supplicant_initialized(struct wpa_global *global)
27 {
28 #ifdef CONFIG_DBUS
29 	if (global->params.dbus_ctrl_interface) {
30 		global->dbus = wpas_dbus_init(global);
31 		if (global->dbus == NULL)
32 			return -1;
33 	}
34 #endif /* CONFIG_DBUS */
35 
36 	return 0;
37 }
38 
39 
40 void wpas_notify_supplicant_deinitialized(struct wpa_global *global)
41 {
42 #ifdef CONFIG_DBUS
43 	if (global->dbus)
44 		wpas_dbus_deinit(global->dbus);
45 #endif /* CONFIG_DBUS */
46 }
47 
48 
49 int wpas_notify_iface_added(struct wpa_supplicant *wpa_s)
50 {
51 	if (wpa_s->p2p_mgmt)
52 		return 0;
53 
54 	if (wpas_dbus_register_iface(wpa_s))
55 		return -1;
56 
57 	if (wpas_dbus_register_interface(wpa_s))
58 		return -1;
59 
60 	return 0;
61 }
62 
63 
64 void wpas_notify_iface_removed(struct wpa_supplicant *wpa_s)
65 {
66 	if (wpa_s->p2p_mgmt)
67 		return;
68 
69 	/* unregister interface in old DBus ctrl iface */
70 	wpas_dbus_unregister_iface(wpa_s);
71 
72 	/* unregister interface in new DBus ctrl iface */
73 	wpas_dbus_unregister_interface(wpa_s);
74 }
75 
76 
77 void wpas_notify_state_changed(struct wpa_supplicant *wpa_s,
78 			       enum wpa_states new_state,
79 			       enum wpa_states old_state)
80 {
81 	if (wpa_s->p2p_mgmt)
82 		return;
83 
84 	/* notify the old DBus API */
85 	wpa_supplicant_dbus_notify_state_change(wpa_s, new_state,
86 						old_state);
87 
88 	/* notify the new DBus API */
89 	wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_STATE);
90 
91 	if (new_state == WPA_COMPLETED)
92 		wpas_p2p_notif_connected(wpa_s);
93 	else if (old_state >= WPA_ASSOCIATED && new_state < WPA_ASSOCIATED)
94 		wpas_p2p_notif_disconnected(wpa_s);
95 
96 	sme_state_changed(wpa_s);
97 
98 #ifdef ANDROID
99 	wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_STATE_CHANGE
100 		     "id=%d state=%d BSSID=" MACSTR " SSID=%s",
101 		     wpa_s->current_ssid ? wpa_s->current_ssid->id : -1,
102 		     new_state,
103 		     MAC2STR(wpa_s->bssid),
104 		     wpa_s->current_ssid && wpa_s->current_ssid->ssid ?
105 		     wpa_ssid_txt(wpa_s->current_ssid->ssid,
106 				  wpa_s->current_ssid->ssid_len) : "");
107 #endif /* ANDROID */
108 }
109 
110 
111 void wpas_notify_disconnect_reason(struct wpa_supplicant *wpa_s)
112 {
113 	if (wpa_s->p2p_mgmt)
114 		return;
115 
116 	wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_DISCONNECT_REASON);
117 }
118 
119 
120 void wpas_notify_network_changed(struct wpa_supplicant *wpa_s)
121 {
122 	if (wpa_s->p2p_mgmt)
123 		return;
124 
125 	wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_CURRENT_NETWORK);
126 }
127 
128 
129 void wpas_notify_ap_scan_changed(struct wpa_supplicant *wpa_s)
130 {
131 	if (wpa_s->p2p_mgmt)
132 		return;
133 
134 	wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_AP_SCAN);
135 }
136 
137 
138 void wpas_notify_bssid_changed(struct wpa_supplicant *wpa_s)
139 {
140 	if (wpa_s->p2p_mgmt)
141 		return;
142 
143 	wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_CURRENT_BSS);
144 }
145 
146 
147 void wpas_notify_auth_changed(struct wpa_supplicant *wpa_s)
148 {
149 	if (wpa_s->p2p_mgmt)
150 		return;
151 
152 	wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_CURRENT_AUTH_MODE);
153 }
154 
155 
156 void wpas_notify_network_enabled_changed(struct wpa_supplicant *wpa_s,
157 					 struct wpa_ssid *ssid)
158 {
159 	if (wpa_s->p2p_mgmt)
160 		return;
161 
162 	wpas_dbus_signal_network_enabled_changed(wpa_s, ssid);
163 }
164 
165 
166 void wpas_notify_network_selected(struct wpa_supplicant *wpa_s,
167 				  struct wpa_ssid *ssid)
168 {
169 	if (wpa_s->p2p_mgmt)
170 		return;
171 
172 	wpas_dbus_signal_network_selected(wpa_s, ssid->id);
173 }
174 
175 
176 void wpas_notify_network_request(struct wpa_supplicant *wpa_s,
177 				 struct wpa_ssid *ssid,
178 				 enum wpa_ctrl_req_type rtype,
179 				 const char *default_txt)
180 {
181 	if (wpa_s->p2p_mgmt)
182 		return;
183 
184 	wpas_dbus_signal_network_request(wpa_s, ssid, rtype, default_txt);
185 }
186 
187 
188 void wpas_notify_scanning(struct wpa_supplicant *wpa_s)
189 {
190 	if (wpa_s->p2p_mgmt)
191 		return;
192 
193 	/* notify the old DBus API */
194 	wpa_supplicant_dbus_notify_scanning(wpa_s);
195 
196 	/* notify the new DBus API */
197 	wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_SCANNING);
198 }
199 
200 
201 void wpas_notify_scan_done(struct wpa_supplicant *wpa_s, int success)
202 {
203 	if (wpa_s->p2p_mgmt)
204 		return;
205 
206 	wpas_dbus_signal_scan_done(wpa_s, success);
207 }
208 
209 
210 void wpas_notify_scan_results(struct wpa_supplicant *wpa_s)
211 {
212 	if (wpa_s->p2p_mgmt)
213 		return;
214 
215 	/* notify the old DBus API */
216 	wpa_supplicant_dbus_notify_scan_results(wpa_s);
217 
218 	wpas_wps_notify_scan_results(wpa_s);
219 }
220 
221 
222 void wpas_notify_wps_credential(struct wpa_supplicant *wpa_s,
223 				const struct wps_credential *cred)
224 {
225 	if (wpa_s->p2p_mgmt)
226 		return;
227 
228 #ifdef CONFIG_WPS
229 	/* notify the old DBus API */
230 	wpa_supplicant_dbus_notify_wps_cred(wpa_s, cred);
231 	/* notify the new DBus API */
232 	wpas_dbus_signal_wps_cred(wpa_s, cred);
233 #endif /* CONFIG_WPS */
234 }
235 
236 
237 void wpas_notify_wps_event_m2d(struct wpa_supplicant *wpa_s,
238 			       struct wps_event_m2d *m2d)
239 {
240 	if (wpa_s->p2p_mgmt)
241 		return;
242 
243 #ifdef CONFIG_WPS
244 	wpas_dbus_signal_wps_event_m2d(wpa_s, m2d);
245 #endif /* CONFIG_WPS */
246 }
247 
248 
249 void wpas_notify_wps_event_fail(struct wpa_supplicant *wpa_s,
250 				struct wps_event_fail *fail)
251 {
252 	if (wpa_s->p2p_mgmt)
253 		return;
254 
255 #ifdef CONFIG_WPS
256 	wpas_dbus_signal_wps_event_fail(wpa_s, fail);
257 #endif /* CONFIG_WPS */
258 }
259 
260 
261 void wpas_notify_wps_event_success(struct wpa_supplicant *wpa_s)
262 {
263 	if (wpa_s->p2p_mgmt)
264 		return;
265 
266 #ifdef CONFIG_WPS
267 	wpas_dbus_signal_wps_event_success(wpa_s);
268 #endif /* CONFIG_WPS */
269 }
270 
271 
272 void wpas_notify_network_added(struct wpa_supplicant *wpa_s,
273 			       struct wpa_ssid *ssid)
274 {
275 	if (wpa_s->p2p_mgmt)
276 		return;
277 
278 	/*
279 	 * Networks objects created during any P2P activities should not be
280 	 * exposed out. They might/will confuse certain non-P2P aware
281 	 * applications since these network objects won't behave like
282 	 * regular ones.
283 	 */
284 	if (!ssid->p2p_group && wpa_s->global->p2p_group_formation != wpa_s)
285 		wpas_dbus_register_network(wpa_s, ssid);
286 }
287 
288 
289 void wpas_notify_persistent_group_added(struct wpa_supplicant *wpa_s,
290 					struct wpa_ssid *ssid)
291 {
292 #ifdef CONFIG_P2P
293 	wpas_dbus_register_persistent_group(wpa_s, ssid);
294 #endif /* CONFIG_P2P */
295 }
296 
297 
298 void wpas_notify_persistent_group_removed(struct wpa_supplicant *wpa_s,
299 					  struct wpa_ssid *ssid)
300 {
301 #ifdef CONFIG_P2P
302 	wpas_dbus_unregister_persistent_group(wpa_s, ssid->id);
303 #endif /* CONFIG_P2P */
304 }
305 
306 
307 void wpas_notify_network_removed(struct wpa_supplicant *wpa_s,
308 				 struct wpa_ssid *ssid)
309 {
310 	if (wpa_s->p2p_mgmt)
311 		return;
312 
313 	if (wpa_s->next_ssid == ssid)
314 		wpa_s->next_ssid = NULL;
315 	if (wpa_s->wpa)
316 		wpa_sm_pmksa_cache_flush(wpa_s->wpa, ssid);
317 	if (!ssid->p2p_group && wpa_s->global->p2p_group_formation != wpa_s)
318 		wpas_dbus_unregister_network(wpa_s, ssid->id);
319 	if (network_is_persistent_group(ssid))
320 		wpas_notify_persistent_group_removed(wpa_s, ssid);
321 
322 	wpas_p2p_network_removed(wpa_s, ssid);
323 }
324 
325 
326 void wpas_notify_bss_added(struct wpa_supplicant *wpa_s,
327 			   u8 bssid[], unsigned int id)
328 {
329 	if (wpa_s->p2p_mgmt)
330 		return;
331 
332 	wpas_dbus_register_bss(wpa_s, bssid, id);
333 	wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_BSS_ADDED "%u " MACSTR,
334 		     id, MAC2STR(bssid));
335 }
336 
337 
338 void wpas_notify_bss_removed(struct wpa_supplicant *wpa_s,
339 			     u8 bssid[], unsigned int id)
340 {
341 	if (wpa_s->p2p_mgmt)
342 		return;
343 
344 	wpas_dbus_unregister_bss(wpa_s, bssid, id);
345 	wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_BSS_REMOVED "%u " MACSTR,
346 		     id, MAC2STR(bssid));
347 }
348 
349 
350 void wpas_notify_bss_freq_changed(struct wpa_supplicant *wpa_s,
351 				  unsigned int id)
352 {
353 	if (wpa_s->p2p_mgmt)
354 		return;
355 
356 	wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_FREQ, id);
357 }
358 
359 
360 void wpas_notify_bss_signal_changed(struct wpa_supplicant *wpa_s,
361 				    unsigned int id)
362 {
363 	if (wpa_s->p2p_mgmt)
364 		return;
365 
366 	wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_SIGNAL,
367 					  id);
368 }
369 
370 
371 void wpas_notify_bss_privacy_changed(struct wpa_supplicant *wpa_s,
372 				     unsigned int id)
373 {
374 	if (wpa_s->p2p_mgmt)
375 		return;
376 
377 	wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_PRIVACY,
378 					  id);
379 }
380 
381 
382 void wpas_notify_bss_mode_changed(struct wpa_supplicant *wpa_s,
383 				  unsigned int id)
384 {
385 	if (wpa_s->p2p_mgmt)
386 		return;
387 
388 	wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_MODE, id);
389 }
390 
391 
392 void wpas_notify_bss_wpaie_changed(struct wpa_supplicant *wpa_s,
393 				   unsigned int id)
394 {
395 	if (wpa_s->p2p_mgmt)
396 		return;
397 
398 	wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_WPA, id);
399 }
400 
401 
402 void wpas_notify_bss_rsnie_changed(struct wpa_supplicant *wpa_s,
403 				   unsigned int id)
404 {
405 	if (wpa_s->p2p_mgmt)
406 		return;
407 
408 	wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_RSN, id);
409 }
410 
411 
412 void wpas_notify_bss_wps_changed(struct wpa_supplicant *wpa_s,
413 				 unsigned int id)
414 {
415 	if (wpa_s->p2p_mgmt)
416 		return;
417 
418 #ifdef CONFIG_WPS
419 	wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_WPS, id);
420 #endif /* CONFIG_WPS */
421 }
422 
423 
424 void wpas_notify_bss_ies_changed(struct wpa_supplicant *wpa_s,
425 				   unsigned int id)
426 {
427 	if (wpa_s->p2p_mgmt)
428 		return;
429 
430 	wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_IES, id);
431 }
432 
433 
434 void wpas_notify_bss_rates_changed(struct wpa_supplicant *wpa_s,
435 				   unsigned int id)
436 {
437 	if (wpa_s->p2p_mgmt)
438 		return;
439 
440 	wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_RATES, id);
441 }
442 
443 
444 void wpas_notify_bss_seen(struct wpa_supplicant *wpa_s, unsigned int id)
445 {
446 	if (wpa_s->p2p_mgmt)
447 		return;
448 
449 	wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_AGE, id);
450 }
451 
452 
453 void wpas_notify_blob_added(struct wpa_supplicant *wpa_s, const char *name)
454 {
455 	if (wpa_s->p2p_mgmt)
456 		return;
457 
458 	wpas_dbus_signal_blob_added(wpa_s, name);
459 }
460 
461 
462 void wpas_notify_blob_removed(struct wpa_supplicant *wpa_s, const char *name)
463 {
464 	if (wpa_s->p2p_mgmt)
465 		return;
466 
467 	wpas_dbus_signal_blob_removed(wpa_s, name);
468 }
469 
470 
471 void wpas_notify_debug_level_changed(struct wpa_global *global)
472 {
473 	wpas_dbus_signal_debug_level_changed(global);
474 }
475 
476 
477 void wpas_notify_debug_timestamp_changed(struct wpa_global *global)
478 {
479 	wpas_dbus_signal_debug_timestamp_changed(global);
480 }
481 
482 
483 void wpas_notify_debug_show_keys_changed(struct wpa_global *global)
484 {
485 	wpas_dbus_signal_debug_show_keys_changed(global);
486 }
487 
488 
489 void wpas_notify_suspend(struct wpa_global *global)
490 {
491 	struct wpa_supplicant *wpa_s;
492 
493 	os_get_time(&global->suspend_time);
494 	wpa_printf(MSG_DEBUG, "System suspend notification");
495 	for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next)
496 		wpa_drv_suspend(wpa_s);
497 }
498 
499 
500 void wpas_notify_resume(struct wpa_global *global)
501 {
502 	struct os_time now;
503 	int slept;
504 	struct wpa_supplicant *wpa_s;
505 
506 	if (global->suspend_time.sec == 0)
507 		slept = -1;
508 	else {
509 		os_get_time(&now);
510 		slept = now.sec - global->suspend_time.sec;
511 	}
512 	wpa_printf(MSG_DEBUG, "System resume notification (slept %d seconds)",
513 		   slept);
514 
515 	for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next) {
516 		wpa_drv_resume(wpa_s);
517 		if (wpa_s->wpa_state == WPA_DISCONNECTED)
518 			wpa_supplicant_req_scan(wpa_s, 0, 100000);
519 	}
520 }
521 
522 
523 #ifdef CONFIG_P2P
524 
525 void wpas_notify_p2p_device_found(struct wpa_supplicant *wpa_s,
526 				  const u8 *dev_addr, int new_device)
527 {
528 	if (new_device) {
529 		/* Create the new peer object */
530 		wpas_dbus_register_peer(wpa_s, dev_addr);
531 	}
532 
533 	/* Notify a new peer has been detected*/
534 	wpas_dbus_signal_peer_device_found(wpa_s, dev_addr);
535 }
536 
537 
538 void wpas_notify_p2p_device_lost(struct wpa_supplicant *wpa_s,
539 				 const u8 *dev_addr)
540 {
541 	wpas_dbus_unregister_peer(wpa_s, dev_addr);
542 
543 	/* Create signal on interface object*/
544 	wpas_dbus_signal_peer_device_lost(wpa_s, dev_addr);
545 }
546 
547 
548 void wpas_notify_p2p_group_removed(struct wpa_supplicant *wpa_s,
549 				   const struct wpa_ssid *ssid,
550 				   const char *role)
551 {
552 	wpas_dbus_signal_p2p_group_removed(wpa_s, role);
553 
554 	wpas_dbus_unregister_p2p_group(wpa_s, ssid);
555 }
556 
557 
558 void wpas_notify_p2p_go_neg_req(struct wpa_supplicant *wpa_s,
559 				const u8 *src, u16 dev_passwd_id)
560 {
561 	wpas_dbus_signal_p2p_go_neg_req(wpa_s, src, dev_passwd_id);
562 }
563 
564 
565 void wpas_notify_p2p_go_neg_completed(struct wpa_supplicant *wpa_s,
566 				      struct p2p_go_neg_results *res)
567 {
568 	wpas_dbus_signal_p2p_go_neg_resp(wpa_s, res);
569 }
570 
571 
572 void wpas_notify_p2p_invitation_result(struct wpa_supplicant *wpa_s,
573 				       int status, const u8 *bssid)
574 {
575 	wpas_dbus_signal_p2p_invitation_result(wpa_s, status, bssid);
576 }
577 
578 
579 void wpas_notify_p2p_sd_request(struct wpa_supplicant *wpa_s,
580 				int freq, const u8 *sa, u8 dialog_token,
581 				u16 update_indic, const u8 *tlvs,
582 				size_t tlvs_len)
583 {
584 	wpas_dbus_signal_p2p_sd_request(wpa_s, freq, sa, dialog_token,
585 					update_indic, tlvs, tlvs_len);
586 }
587 
588 
589 void wpas_notify_p2p_sd_response(struct wpa_supplicant *wpa_s,
590 				 const u8 *sa, u16 update_indic,
591 				 const u8 *tlvs, size_t tlvs_len)
592 {
593 	wpas_dbus_signal_p2p_sd_response(wpa_s, sa, update_indic,
594 					 tlvs, tlvs_len);
595 }
596 
597 
598 /**
599  * wpas_notify_p2p_provision_discovery - Notification of provision discovery
600  * @dev_addr: Who sent the request or responded to our request.
601  * @request: Will be 1 if request, 0 for response.
602  * @status: Valid only in case of response (0 in case of success)
603  * @config_methods: WPS config methods
604  * @generated_pin: PIN to be displayed in case of WPS_CONFIG_DISPLAY method
605  *
606  * This can be used to notify:
607  * - Requests or responses
608  * - Various config methods
609  * - Failure condition in case of response
610  */
611 void wpas_notify_p2p_provision_discovery(struct wpa_supplicant *wpa_s,
612 					 const u8 *dev_addr, int request,
613 					 enum p2p_prov_disc_status status,
614 					 u16 config_methods,
615 					 unsigned int generated_pin)
616 {
617 	wpas_dbus_signal_p2p_provision_discovery(wpa_s, dev_addr, request,
618 						 status, config_methods,
619 						 generated_pin);
620 }
621 
622 
623 void wpas_notify_p2p_group_started(struct wpa_supplicant *wpa_s,
624 				   struct wpa_ssid *ssid, int network_id,
625 				   int client)
626 {
627 	/* Notify a group has been started */
628 	wpas_dbus_register_p2p_group(wpa_s, ssid);
629 
630 	wpas_dbus_signal_p2p_group_started(wpa_s, ssid, client, network_id);
631 }
632 
633 
634 void wpas_notify_p2p_wps_failed(struct wpa_supplicant *wpa_s,
635 				struct wps_event_fail *fail)
636 {
637 	wpas_dbus_signal_p2p_wps_failed(wpa_s, fail);
638 }
639 
640 #endif /* CONFIG_P2P */
641 
642 
643 static void wpas_notify_ap_sta_authorized(struct wpa_supplicant *wpa_s,
644 					  const u8 *sta,
645 					  const u8 *p2p_dev_addr)
646 {
647 #ifdef CONFIG_P2P
648 	wpas_p2p_notify_ap_sta_authorized(wpa_s, p2p_dev_addr);
649 
650 	/*
651 	 * Create 'peer-joined' signal on group object -- will also
652 	 * check P2P itself.
653 	 */
654 	if (p2p_dev_addr)
655 		wpas_dbus_signal_p2p_peer_joined(wpa_s, p2p_dev_addr);
656 #endif /* CONFIG_P2P */
657 
658 	/* Notify listeners a new station has been authorized */
659 	wpas_dbus_signal_sta_authorized(wpa_s, sta);
660 }
661 
662 
663 static void wpas_notify_ap_sta_deauthorized(struct wpa_supplicant *wpa_s,
664 					    const u8 *sta,
665 					    const u8 *p2p_dev_addr)
666 {
667 #ifdef CONFIG_P2P
668 	/*
669 	 * Create 'peer-disconnected' signal on group object if this
670 	 * is a P2P group.
671 	 */
672 	if (p2p_dev_addr)
673 		wpas_dbus_signal_p2p_peer_disconnected(wpa_s, p2p_dev_addr);
674 #endif /* CONFIG_P2P */
675 
676 	/* Notify listeners a station has been deauthorized */
677 	wpas_dbus_signal_sta_deauthorized(wpa_s, sta);
678 }
679 
680 
681 void wpas_notify_sta_authorized(struct wpa_supplicant *wpa_s,
682 				const u8 *mac_addr, int authorized,
683 				const u8 *p2p_dev_addr)
684 {
685 	if (authorized)
686 		wpas_notify_ap_sta_authorized(wpa_s, mac_addr, p2p_dev_addr);
687 	else
688 		wpas_notify_ap_sta_deauthorized(wpa_s, mac_addr, p2p_dev_addr);
689 }
690 
691 
692 void wpas_notify_certification(struct wpa_supplicant *wpa_s, int depth,
693 			       const char *subject, const char *altsubject[],
694 			       int num_altsubject, const char *cert_hash,
695 			       const struct wpabuf *cert)
696 {
697 	wpa_msg(wpa_s, MSG_INFO, WPA_EVENT_EAP_PEER_CERT
698 		"depth=%d subject='%s'%s%s",
699 		depth, subject, cert_hash ? " hash=" : "",
700 		cert_hash ? cert_hash : "");
701 
702 	if (cert) {
703 		char *cert_hex;
704 		size_t len = wpabuf_len(cert) * 2 + 1;
705 		cert_hex = os_malloc(len);
706 		if (cert_hex) {
707 			wpa_snprintf_hex(cert_hex, len, wpabuf_head(cert),
708 					 wpabuf_len(cert));
709 			wpa_msg_ctrl(wpa_s, MSG_INFO,
710 				     WPA_EVENT_EAP_PEER_CERT
711 				     "depth=%d subject='%s' cert=%s",
712 				     depth, subject, cert_hex);
713 			os_free(cert_hex);
714 		}
715 	}
716 
717 	if (altsubject) {
718 		int i;
719 
720 		for (i = 0; i < num_altsubject; i++)
721 			wpa_msg(wpa_s, MSG_INFO, WPA_EVENT_EAP_PEER_ALT
722 				"depth=%d %s", depth, altsubject[i]);
723 	}
724 
725 	/* notify the old DBus API */
726 	wpa_supplicant_dbus_notify_certification(wpa_s, depth, subject,
727 						 cert_hash, cert);
728 	/* notify the new DBus API */
729 	wpas_dbus_signal_certification(wpa_s, depth, subject, altsubject,
730 				       num_altsubject, cert_hash, cert);
731 }
732 
733 
734 void wpas_notify_preq(struct wpa_supplicant *wpa_s,
735 		      const u8 *addr, const u8 *dst, const u8 *bssid,
736 		      const u8 *ie, size_t ie_len, u32 ssi_signal)
737 {
738 #ifdef CONFIG_AP
739 	wpas_dbus_signal_preq(wpa_s, addr, dst, bssid, ie, ie_len, ssi_signal);
740 #endif /* CONFIG_AP */
741 }
742 
743 
744 void wpas_notify_eap_status(struct wpa_supplicant *wpa_s, const char *status,
745 			    const char *parameter)
746 {
747 	wpas_dbus_signal_eap_status(wpa_s, status, parameter);
748 	wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_EAP_STATUS
749 		     "status='%s' parameter='%s'",
750 		     status, parameter);
751 }
752 
753 
754 void wpas_notify_network_bssid_set_changed(struct wpa_supplicant *wpa_s,
755 					   struct wpa_ssid *ssid)
756 {
757 	if (wpa_s->current_ssid != ssid)
758 		return;
759 
760 	wpa_dbg(wpa_s, MSG_DEBUG,
761 		"Network bssid config changed for the current network - within-ESS roaming %s",
762 		ssid->bssid_set ? "disabled" : "enabled");
763 
764 	wpa_drv_roaming(wpa_s, !ssid->bssid_set,
765 			ssid->bssid_set ? ssid->bssid : NULL);
766 }
767 
768 
769 void wpas_notify_network_type_changed(struct wpa_supplicant *wpa_s,
770 				      struct wpa_ssid *ssid)
771 {
772 #ifdef CONFIG_P2P
773 	if (ssid->disabled == 2) {
774 		/* Changed from normal network profile to persistent group */
775 		ssid->disabled = 0;
776 		wpas_dbus_unregister_network(wpa_s, ssid->id);
777 		ssid->disabled = 2;
778 		wpas_dbus_register_persistent_group(wpa_s, ssid);
779 	} else {
780 		/* Changed from persistent group to normal network profile */
781 		wpas_dbus_unregister_persistent_group(wpa_s, ssid->id);
782 		wpas_dbus_register_network(wpa_s, ssid);
783 	}
784 #endif /* CONFIG_P2P */
785 }
786