]> git.ipfire.org Git - thirdparty/hostap.git/blame - wpa_supplicant/notify.c
tests: Extend D-Bus test cases to cover separate P2P Device operations
[thirdparty/hostap.git] / wpa_supplicant / notify.c
CommitLineData
8bac466b
JM
1/*
2 * wpa_supplicant - Event notifications
207ef3fb 3 * Copyright (c) 2009-2010, Jouni Malinen <j@w1.fi>
8bac466b 4 *
0f3d578e
JM
5 * This software may be distributed under the terms of the BSD license.
6 * See README for more details.
8bac466b
JM
7 */
8
f0d126d3 9#include "utils/includes.h"
8bac466b 10
f0d126d3
JM
11#include "utils/common.h"
12#include "common/wpa_ctrl.h"
8bac466b
JM
13#include "config.h"
14#include "wpa_supplicant_i.h"
15#include "wps_supplicant.h"
8ddef94b 16#include "dbus/dbus_common.h"
bacfd05f 17#include "dbus/dbus_old.h"
6d59e14c 18#include "dbus/dbus_new.h"
d8a790b9 19#include "rsn_supp/wpa.h"
207ef3fb
JM
20#include "driver_i.h"
21#include "scan.h"
72044390 22#include "p2p_supplicant.h"
e29853bb 23#include "sme.h"
8bac466b
JM
24#include "notify.h"
25
dc461de4
WS
26int wpas_notify_supplicant_initialized(struct wpa_global *global)
27{
8ddef94b 28#ifdef CONFIG_DBUS
dc461de4 29 if (global->params.dbus_ctrl_interface) {
8ddef94b
JM
30 global->dbus = wpas_dbus_init(global);
31 if (global->dbus == NULL)
85d3f273 32 return -1;
dc461de4 33 }
8ddef94b 34#endif /* CONFIG_DBUS */
dc461de4
WS
35
36 return 0;
37}
38
39
40void wpas_notify_supplicant_deinitialized(struct wpa_global *global)
41{
8ddef94b
JM
42#ifdef CONFIG_DBUS
43 if (global->dbus)
44 wpas_dbus_deinit(global->dbus);
45#endif /* CONFIG_DBUS */
dc461de4
WS
46}
47
48
49int wpas_notify_iface_added(struct wpa_supplicant *wpa_s)
50{
bb3df9a5
TB
51 if (wpa_s->p2p_mgmt)
52 return 0;
53
dc461de4
WS
54 if (wpas_dbus_register_iface(wpa_s))
55 return -1;
56
52bdd880 57 if (wpas_dbus_register_interface(wpa_s))
8fc2fb56
WS
58 return -1;
59
dc461de4
WS
60 return 0;
61}
62
63
dc461de4
WS
64void wpas_notify_iface_removed(struct wpa_supplicant *wpa_s)
65{
bb3df9a5
TB
66 if (wpa_s->p2p_mgmt)
67 return;
68
dc461de4
WS
69 /* unregister interface in old DBus ctrl iface */
70 wpas_dbus_unregister_iface(wpa_s);
8fc2fb56
WS
71
72 /* unregister interface in new DBus ctrl iface */
52bdd880 73 wpas_dbus_unregister_interface(wpa_s);
dc461de4
WS
74}
75
8bac466b
JM
76
77void wpas_notify_state_changed(struct wpa_supplicant *wpa_s,
71934751
JM
78 enum wpa_states new_state,
79 enum wpa_states old_state)
8bac466b 80{
bb3df9a5
TB
81 if (wpa_s->p2p_mgmt)
82 return;
83
8bac466b
JM
84 /* notify the old DBus API */
85 wpa_supplicant_dbus_notify_state_change(wpa_s, new_state,
86 old_state);
8fc2fb56
WS
87
88 /* notify the new DBus API */
27f43d8d 89 wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_STATE);
72044390 90
72044390
JM
91 if (new_state == WPA_COMPLETED)
92 wpas_p2p_notif_connected(wpa_s);
dbe7aa22 93 else if (old_state >= WPA_ASSOCIATED && new_state < WPA_ASSOCIATED)
72044390 94 wpas_p2p_notif_disconnected(wpa_s);
e29853bb
BG
95
96 sme_state_changed(wpa_s);
4e2ead7a
DS
97
98#ifdef ANDROID
99 wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_STATE_CHANGE
6b499076 100 "id=%d state=%d BSSID=" MACSTR " SSID=%s",
4e2ead7a 101 wpa_s->current_ssid ? wpa_s->current_ssid->id : -1,
6b499076
DS
102 new_state,
103 MAC2STR(wpa_s->bssid),
104 wpa_s->current_ssid && wpa_s->current_ssid->ssid ?
105 wpa_ssid_txt(wpa_s->current_ssid->ssid,
106 wpa_s->current_ssid->ssid_len) : "");
4e2ead7a 107#endif /* ANDROID */
8bac466b
JM
108}
109
110
0bb1e425
GM
111void wpas_notify_disconnect_reason(struct wpa_supplicant *wpa_s)
112{
bb3df9a5
TB
113 if (wpa_s->p2p_mgmt)
114 return;
115
0bb1e425
GM
116 wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_DISCONNECT_REASON);
117}
118
119
8bac466b
JM
120void wpas_notify_network_changed(struct wpa_supplicant *wpa_s)
121{
bb3df9a5
TB
122 if (wpa_s->p2p_mgmt)
123 return;
124
52bdd880 125 wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_CURRENT_NETWORK);
8bac466b
JM
126}
127
128
129void wpas_notify_ap_scan_changed(struct wpa_supplicant *wpa_s)
130{
bb3df9a5
TB
131 if (wpa_s->p2p_mgmt)
132 return;
133
52bdd880 134 wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_AP_SCAN);
8bac466b
JM
135}
136
137
138void wpas_notify_bssid_changed(struct wpa_supplicant *wpa_s)
139{
bb3df9a5
TB
140 if (wpa_s->p2p_mgmt)
141 return;
142
52bdd880 143 wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_CURRENT_BSS);
8bac466b
JM
144}
145
146
5bbf9f10
PS
147void wpas_notify_auth_changed(struct wpa_supplicant *wpa_s)
148{
bb3df9a5
TB
149 if (wpa_s->p2p_mgmt)
150 return;
151
5bbf9f10
PS
152 wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_CURRENT_AUTH_MODE);
153}
154
155
8bac466b
JM
156void wpas_notify_network_enabled_changed(struct wpa_supplicant *wpa_s,
157 struct wpa_ssid *ssid)
158{
bb3df9a5
TB
159 if (wpa_s->p2p_mgmt)
160 return;
161
52bdd880 162 wpas_dbus_signal_network_enabled_changed(wpa_s, ssid);
8bac466b
JM
163}
164
165
166void wpas_notify_network_selected(struct wpa_supplicant *wpa_s,
167 struct wpa_ssid *ssid)
168{
bb3df9a5
TB
169 if (wpa_s->p2p_mgmt)
170 return;
171
52bdd880 172 wpas_dbus_signal_network_selected(wpa_s, ssid->id);
8bac466b
JM
173}
174
175
a9022616
DW
176void wpas_notify_network_request(struct wpa_supplicant *wpa_s,
177 struct wpa_ssid *ssid,
178 enum wpa_ctrl_req_type rtype,
179 const char *default_txt)
180{
bb3df9a5
TB
181 if (wpa_s->p2p_mgmt)
182 return;
183
a9022616
DW
184 wpas_dbus_signal_network_request(wpa_s, ssid, rtype, default_txt);
185}
186
187
8bac466b
JM
188void wpas_notify_scanning(struct wpa_supplicant *wpa_s)
189{
bb3df9a5
TB
190 if (wpa_s->p2p_mgmt)
191 return;
192
8bac466b
JM
193 /* notify the old DBus API */
194 wpa_supplicant_dbus_notify_scanning(wpa_s);
27f43d8d 195
8fc2fb56 196 /* notify the new DBus API */
52bdd880 197 wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_SCANNING);
8bac466b
JM
198}
199
200
201void wpas_notify_scan_done(struct wpa_supplicant *wpa_s, int success)
202{
bb3df9a5
TB
203 if (wpa_s->p2p_mgmt)
204 return;
205
52bdd880 206 wpas_dbus_signal_scan_done(wpa_s, success);
8bac466b
JM
207}
208
209
210void wpas_notify_scan_results(struct wpa_supplicant *wpa_s)
211{
bb3df9a5
TB
212 if (wpa_s->p2p_mgmt)
213 return;
214
8bac466b
JM
215 /* notify the old DBus API */
216 wpa_supplicant_dbus_notify_scan_results(wpa_s);
217
218 wpas_wps_notify_scan_results(wpa_s);
219}
220
221
222void wpas_notify_wps_credential(struct wpa_supplicant *wpa_s,
223 const struct wps_credential *cred)
224{
bb3df9a5
TB
225 if (wpa_s->p2p_mgmt)
226 return;
227
b99b8e15 228#ifdef CONFIG_WPS
8bac466b
JM
229 /* notify the old DBus API */
230 wpa_supplicant_dbus_notify_wps_cred(wpa_s, cred);
8fc2fb56 231 /* notify the new DBus API */
52bdd880 232 wpas_dbus_signal_wps_cred(wpa_s, cred);
b99b8e15 233#endif /* CONFIG_WPS */
8bac466b
JM
234}
235
236
237void wpas_notify_wps_event_m2d(struct wpa_supplicant *wpa_s,
238 struct wps_event_m2d *m2d)
239{
bb3df9a5
TB
240 if (wpa_s->p2p_mgmt)
241 return;
242
b99b8e15 243#ifdef CONFIG_WPS
52bdd880 244 wpas_dbus_signal_wps_event_m2d(wpa_s, m2d);
b99b8e15 245#endif /* CONFIG_WPS */
8bac466b
JM
246}
247
248
249void wpas_notify_wps_event_fail(struct wpa_supplicant *wpa_s,
250 struct wps_event_fail *fail)
251{
bb3df9a5
TB
252 if (wpa_s->p2p_mgmt)
253 return;
254
b99b8e15 255#ifdef CONFIG_WPS
52bdd880 256 wpas_dbus_signal_wps_event_fail(wpa_s, fail);
b99b8e15 257#endif /* CONFIG_WPS */
8bac466b
JM
258}
259
260
261void wpas_notify_wps_event_success(struct wpa_supplicant *wpa_s)
262{
bb3df9a5
TB
263 if (wpa_s->p2p_mgmt)
264 return;
265
b99b8e15 266#ifdef CONFIG_WPS
52bdd880 267 wpas_dbus_signal_wps_event_success(wpa_s);
b99b8e15 268#endif /* CONFIG_WPS */
8bac466b
JM
269}
270
271
272void wpas_notify_network_added(struct wpa_supplicant *wpa_s,
273 struct wpa_ssid *ssid)
274{
bb3df9a5
TB
275 if (wpa_s->p2p_mgmt)
276 return;
277
c2762e41
JS
278 /*
279 * Networks objects created during any P2P activities should not be
280 * exposed out. They might/will confuse certain non-P2P aware
281 * applications since these network objects won't behave like
282 * regular ones.
283 */
447969e0 284 if (!ssid->p2p_group && wpa_s->global->p2p_group_formation != wpa_s)
c2762e41
JS
285 wpas_dbus_register_network(wpa_s, ssid);
286}
287
288
289void wpas_notify_persistent_group_added(struct wpa_supplicant *wpa_s,
290 struct wpa_ssid *ssid)
291{
7a2b53b4 292#ifdef CONFIG_P2P
c2762e41 293 wpas_dbus_register_persistent_group(wpa_s, ssid);
7a2b53b4 294#endif /* CONFIG_P2P */
8bac466b
JM
295}
296
297
28550706
JS
298void wpas_notify_persistent_group_removed(struct wpa_supplicant *wpa_s,
299 struct wpa_ssid *ssid)
300{
7a2b53b4 301#ifdef CONFIG_P2P
28550706 302 wpas_dbus_unregister_persistent_group(wpa_s, ssid->id);
7a2b53b4 303#endif /* CONFIG_P2P */
28550706
JS
304}
305
306
8bac466b
JM
307void wpas_notify_network_removed(struct wpa_supplicant *wpa_s,
308 struct wpa_ssid *ssid)
309{
bb3df9a5
TB
310 if (wpa_s->p2p_mgmt)
311 return;
312
3d910ef4
JM
313 if (wpa_s->next_ssid == ssid)
314 wpa_s->next_ssid = NULL;
8c0d3b4f
JM
315 if (wpa_s->wpa)
316 wpa_sm_pmksa_cache_flush(wpa_s->wpa, ssid);
447969e0 317 if (!ssid->p2p_group && wpa_s->global->p2p_group_formation != wpa_s)
c2762e41 318 wpas_dbus_unregister_network(wpa_s, ssid->id);
5f136bc1
JM
319 if (network_is_persistent_group(ssid))
320 wpas_notify_persistent_group_removed(wpa_s, ssid);
321
502618f7 322 wpas_p2p_network_removed(wpa_s, ssid);
8bac466b
JM
323}
324
325
71f6e1f6 326void wpas_notify_bss_added(struct wpa_supplicant *wpa_s,
f0d126d3 327 u8 bssid[], unsigned int id)
71f6e1f6 328{
bb3df9a5
TB
329 if (wpa_s->p2p_mgmt)
330 return;
331
52bdd880 332 wpas_dbus_register_bss(wpa_s, bssid, id);
f0d126d3
JM
333 wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_BSS_ADDED "%u " MACSTR,
334 id, MAC2STR(bssid));
71f6e1f6
WS
335}
336
337
338void wpas_notify_bss_removed(struct wpa_supplicant *wpa_s,
f0d126d3 339 u8 bssid[], unsigned int id)
71f6e1f6 340{
bb3df9a5
TB
341 if (wpa_s->p2p_mgmt)
342 return;
343
52bdd880 344 wpas_dbus_unregister_bss(wpa_s, bssid, id);
f0d126d3
JM
345 wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_BSS_REMOVED "%u " MACSTR,
346 id, MAC2STR(bssid));
71f6e1f6
WS
347}
348
349
158c6c74
WS
350void wpas_notify_bss_freq_changed(struct wpa_supplicant *wpa_s,
351 unsigned int id)
352{
bb3df9a5
TB
353 if (wpa_s->p2p_mgmt)
354 return;
355
158c6c74
WS
356 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_FREQ, id);
357}
358
359
360void wpas_notify_bss_signal_changed(struct wpa_supplicant *wpa_s,
361 unsigned int id)
362{
bb3df9a5
TB
363 if (wpa_s->p2p_mgmt)
364 return;
365
158c6c74
WS
366 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_SIGNAL,
367 id);
368}
369
370
371void wpas_notify_bss_privacy_changed(struct wpa_supplicant *wpa_s,
372 unsigned int id)
373{
bb3df9a5
TB
374 if (wpa_s->p2p_mgmt)
375 return;
376
158c6c74
WS
377 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_PRIVACY,
378 id);
379}
380
381
382void wpas_notify_bss_mode_changed(struct wpa_supplicant *wpa_s,
383 unsigned int id)
384{
bb3df9a5
TB
385 if (wpa_s->p2p_mgmt)
386 return;
387
158c6c74
WS
388 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_MODE, id);
389}
390
391
392void wpas_notify_bss_wpaie_changed(struct wpa_supplicant *wpa_s,
393 unsigned int id)
394{
bb3df9a5
TB
395 if (wpa_s->p2p_mgmt)
396 return;
397
7899e2f4 398 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_WPA, id);
158c6c74
WS
399}
400
401
402void wpas_notify_bss_rsnie_changed(struct wpa_supplicant *wpa_s,
403 unsigned int id)
404{
bb3df9a5
TB
405 if (wpa_s->p2p_mgmt)
406 return;
407
7899e2f4 408 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_RSN, id);
158c6c74
WS
409}
410
411
412void wpas_notify_bss_wps_changed(struct wpa_supplicant *wpa_s,
7899e2f4
WS
413 unsigned int id)
414{
bb3df9a5
TB
415 if (wpa_s->p2p_mgmt)
416 return;
417
caff3992
SN
418#ifdef CONFIG_WPS
419 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_WPS, id);
420#endif /* CONFIG_WPS */
7899e2f4
WS
421}
422
423
424void wpas_notify_bss_ies_changed(struct wpa_supplicant *wpa_s,
158c6c74
WS
425 unsigned int id)
426{
bb3df9a5
TB
427 if (wpa_s->p2p_mgmt)
428 return;
429
7899e2f4 430 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_IES, id);
158c6c74
WS
431}
432
433
434void wpas_notify_bss_rates_changed(struct wpa_supplicant *wpa_s,
435 unsigned int id)
436{
bb3df9a5
TB
437 if (wpa_s->p2p_mgmt)
438 return;
439
158c6c74
WS
440 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_RATES, id);
441}
442
443
3bd3257a
DW
444void wpas_notify_bss_seen(struct wpa_supplicant *wpa_s, unsigned int id)
445{
bb3df9a5
TB
446 if (wpa_s->p2p_mgmt)
447 return;
448
3bd3257a
DW
449 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_AGE, id);
450}
451
452
8bac466b
JM
453void wpas_notify_blob_added(struct wpa_supplicant *wpa_s, const char *name)
454{
bb3df9a5
TB
455 if (wpa_s->p2p_mgmt)
456 return;
457
52bdd880 458 wpas_dbus_signal_blob_added(wpa_s, name);
8bac466b
JM
459}
460
461
462void wpas_notify_blob_removed(struct wpa_supplicant *wpa_s, const char *name)
463{
bb3df9a5
TB
464 if (wpa_s->p2p_mgmt)
465 return;
466
52bdd880 467 wpas_dbus_signal_blob_removed(wpa_s, name);
8bac466b
JM
468}
469
470
db9133ac 471void wpas_notify_debug_level_changed(struct wpa_global *global)
8bac466b 472{
52bdd880 473 wpas_dbus_signal_debug_level_changed(global);
db9133ac
WS
474}
475
476
477void wpas_notify_debug_timestamp_changed(struct wpa_global *global)
478{
52bdd880 479 wpas_dbus_signal_debug_timestamp_changed(global);
db9133ac
WS
480}
481
482
483void wpas_notify_debug_show_keys_changed(struct wpa_global *global)
484{
52bdd880 485 wpas_dbus_signal_debug_show_keys_changed(global);
8bac466b 486}
207ef3fb
JM
487
488
489void wpas_notify_suspend(struct wpa_global *global)
490{
491 struct wpa_supplicant *wpa_s;
492
493 os_get_time(&global->suspend_time);
494 wpa_printf(MSG_DEBUG, "System suspend notification");
495 for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next)
496 wpa_drv_suspend(wpa_s);
497}
498
499
500void wpas_notify_resume(struct wpa_global *global)
501{
502 struct os_time now;
503 int slept;
504 struct wpa_supplicant *wpa_s;
505
506 if (global->suspend_time.sec == 0)
507 slept = -1;
508 else {
509 os_get_time(&now);
510 slept = now.sec - global->suspend_time.sec;
511 }
512 wpa_printf(MSG_DEBUG, "System resume notification (slept %d seconds)",
513 slept);
514
515 for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next) {
516 wpa_drv_resume(wpa_s);
517 if (wpa_s->wpa_state == WPA_DISCONNECTED)
518 wpa_supplicant_req_scan(wpa_s, 0, 100000);
519 }
520}
d642d2d2
JB
521
522
523#ifdef CONFIG_P2P
56eeb8f2 524
d642d2d2
JB
525void wpas_notify_p2p_device_found(struct wpa_supplicant *wpa_s,
526 const u8 *dev_addr, int new_device)
527{
9abafccc
JB
528 if (new_device) {
529 /* Create the new peer object */
530 wpas_dbus_register_peer(wpa_s, dev_addr);
531 }
532
533 /* Notify a new peer has been detected*/
534 wpas_dbus_signal_peer_device_found(wpa_s, dev_addr);
d642d2d2 535}
56eeb8f2
JB
536
537
538void wpas_notify_p2p_device_lost(struct wpa_supplicant *wpa_s,
539 const u8 *dev_addr)
540{
9abafccc
JB
541 wpas_dbus_unregister_peer(wpa_s, dev_addr);
542
543 /* Create signal on interface object*/
544 wpas_dbus_signal_peer_device_lost(wpa_s, dev_addr);
56eeb8f2
JB
545}
546
408af93e
JB
547
548void wpas_notify_p2p_group_removed(struct wpa_supplicant *wpa_s,
549 const struct wpa_ssid *ssid,
550 const char *role)
551{
9abafccc 552 wpas_dbus_signal_p2p_group_removed(wpa_s, role);
4a0693a4
TB
553
554 wpas_dbus_unregister_p2p_group(wpa_s, ssid);
408af93e
JB
555}
556
32d1bce0
KRK
557
558void wpas_notify_p2p_go_neg_req(struct wpa_supplicant *wpa_s,
559 const u8 *src, u16 dev_passwd_id)
560{
9abafccc 561 wpas_dbus_signal_p2p_go_neg_req(wpa_s, src, dev_passwd_id);
32d1bce0
KRK
562}
563
c2641bf7 564
e5a359cf
RC
565void wpas_notify_p2p_go_neg_completed(struct wpa_supplicant *wpa_s,
566 struct p2p_go_neg_results *res)
c2641bf7 567{
e5a359cf 568 wpas_dbus_signal_p2p_go_neg_resp(wpa_s, res);
c2641bf7
JS
569}
570
5ccdf84f
JMB
571
572void wpas_notify_p2p_invitation_result(struct wpa_supplicant *wpa_s,
573 int status, const u8 *bssid)
574{
9abafccc 575 wpas_dbus_signal_p2p_invitation_result(wpa_s, status, bssid);
5ccdf84f
JMB
576}
577
e1653cac
KRK
578
579void wpas_notify_p2p_sd_request(struct wpa_supplicant *wpa_s,
580 int freq, const u8 *sa, u8 dialog_token,
581 u16 update_indic, const u8 *tlvs,
582 size_t tlvs_len)
583{
9abafccc
JB
584 wpas_dbus_signal_p2p_sd_request(wpa_s, freq, sa, dialog_token,
585 update_indic, tlvs, tlvs_len);
e1653cac
KRK
586}
587
43a26f60
KRK
588
589void wpas_notify_p2p_sd_response(struct wpa_supplicant *wpa_s,
590 const u8 *sa, u16 update_indic,
591 const u8 *tlvs, size_t tlvs_len)
592{
9abafccc
JB
593 wpas_dbus_signal_p2p_sd_response(wpa_s, sa, update_indic,
594 tlvs, tlvs_len);
43a26f60
KRK
595}
596
dd8a7e05
JB
597
598/**
599 * wpas_notify_p2p_provision_discovery - Notification of provision discovery
600 * @dev_addr: Who sent the request or responded to our request.
601 * @request: Will be 1 if request, 0 for response.
602 * @status: Valid only in case of response (0 in case of success)
603 * @config_methods: WPS config methods
604 * @generated_pin: PIN to be displayed in case of WPS_CONFIG_DISPLAY method
605 *
606 * This can be used to notify:
607 * - Requests or responses
608 * - Various config methods
609 * - Failure condition in case of response
610 */
611void wpas_notify_p2p_provision_discovery(struct wpa_supplicant *wpa_s,
612 const u8 *dev_addr, int request,
613 enum p2p_prov_disc_status status,
614 u16 config_methods,
615 unsigned int generated_pin)
616{
9abafccc
JB
617 wpas_dbus_signal_p2p_provision_discovery(wpa_s, dev_addr, request,
618 status, config_methods,
619 generated_pin);
dd8a7e05 620}
4b6baa2f
JMB
621
622
623void wpas_notify_p2p_group_started(struct wpa_supplicant *wpa_s,
624 struct wpa_ssid *ssid, int network_id,
625 int client)
626{
9abafccc
JB
627 /* Notify a group has been started */
628 wpas_dbus_register_p2p_group(wpa_s, ssid);
629
630 wpas_dbus_signal_p2p_group_started(wpa_s, ssid, client, network_id);
4b6baa2f 631}
3734552f
JS
632
633
634void wpas_notify_p2p_wps_failed(struct wpa_supplicant *wpa_s,
635 struct wps_event_fail *fail)
636{
637 wpas_dbus_signal_p2p_wps_failed(wpa_s, fail);
638}
639
d642d2d2 640#endif /* CONFIG_P2P */
d8a43924
JB
641
642
643static void wpas_notify_ap_sta_authorized(struct wpa_supplicant *wpa_s,
fbdcfd57
JM
644 const u8 *sta,
645 const u8 *p2p_dev_addr)
d8a43924 646{
692cb226 647#ifdef CONFIG_P2P
fbdcfd57
JM
648 wpas_p2p_notify_ap_sta_authorized(wpa_s, p2p_dev_addr);
649
9abafccc
JB
650 /*
651 * Create 'peer-joined' signal on group object -- will also
652 * check P2P itself.
653 */
11973b26
JM
654 if (p2p_dev_addr)
655 wpas_dbus_signal_p2p_peer_joined(wpa_s, p2p_dev_addr);
692cb226 656#endif /* CONFIG_P2P */
8a901d75
CZ
657
658 /* Notify listeners a new station has been authorized */
659 wpas_dbus_signal_sta_authorized(wpa_s, sta);
d8a43924
JB
660}
661
662
663static void wpas_notify_ap_sta_deauthorized(struct wpa_supplicant *wpa_s,
bf035663
TB
664 const u8 *sta,
665 const u8 *p2p_dev_addr)
d8a43924 666{
692cb226 667#ifdef CONFIG_P2P
9abafccc
JB
668 /*
669 * Create 'peer-disconnected' signal on group object if this
670 * is a P2P group.
671 */
11973b26
JM
672 if (p2p_dev_addr)
673 wpas_dbus_signal_p2p_peer_disconnected(wpa_s, p2p_dev_addr);
692cb226 674#endif /* CONFIG_P2P */
8a901d75
CZ
675
676 /* Notify listeners a station has been deauthorized */
677 wpas_dbus_signal_sta_deauthorized(wpa_s, sta);
d8a43924
JB
678}
679
680
681void wpas_notify_sta_authorized(struct wpa_supplicant *wpa_s,
fbdcfd57
JM
682 const u8 *mac_addr, int authorized,
683 const u8 *p2p_dev_addr)
d8a43924
JB
684{
685 if (authorized)
fbdcfd57 686 wpas_notify_ap_sta_authorized(wpa_s, mac_addr, p2p_dev_addr);
d8a43924 687 else
bf035663 688 wpas_notify_ap_sta_deauthorized(wpa_s, mac_addr, p2p_dev_addr);
d8a43924 689}
ade74830
MC
690
691
692void wpas_notify_certification(struct wpa_supplicant *wpa_s, int depth,
d07d3fbd
JM
693 const char *subject, const char *altsubject[],
694 int num_altsubject, const char *cert_hash,
ade74830
MC
695 const struct wpabuf *cert)
696{
4f525d8e
JM
697 wpa_msg(wpa_s, MSG_INFO, WPA_EVENT_EAP_PEER_CERT
698 "depth=%d subject='%s'%s%s",
d07d3fbd 699 depth, subject, cert_hash ? " hash=" : "",
4f525d8e
JM
700 cert_hash ? cert_hash : "");
701
702 if (cert) {
703 char *cert_hex;
704 size_t len = wpabuf_len(cert) * 2 + 1;
705 cert_hex = os_malloc(len);
706 if (cert_hex) {
707 wpa_snprintf_hex(cert_hex, len, wpabuf_head(cert),
708 wpabuf_len(cert));
709 wpa_msg_ctrl(wpa_s, MSG_INFO,
710 WPA_EVENT_EAP_PEER_CERT
711 "depth=%d subject='%s' cert=%s",
712 depth, subject, cert_hex);
713 os_free(cert_hex);
714 }
715 }
716
d07d3fbd
JM
717 if (altsubject) {
718 int i;
719
720 for (i = 0; i < num_altsubject; i++)
721 wpa_msg(wpa_s, MSG_INFO, WPA_EVENT_EAP_PEER_ALT
722 "depth=%d %s", depth, altsubject[i]);
723 }
724
ade74830
MC
725 /* notify the old DBus API */
726 wpa_supplicant_dbus_notify_certification(wpa_s, depth, subject,
727 cert_hash, cert);
728 /* notify the new DBus API */
d07d3fbd
JM
729 wpas_dbus_signal_certification(wpa_s, depth, subject, altsubject,
730 num_altsubject, cert_hash, cert);
ade74830 731}
2d43d37f
JB
732
733
734void wpas_notify_preq(struct wpa_supplicant *wpa_s,
735 const u8 *addr, const u8 *dst, const u8 *bssid,
736 const u8 *ie, size_t ie_len, u32 ssi_signal)
737{
738#ifdef CONFIG_AP
739 wpas_dbus_signal_preq(wpa_s, addr, dst, bssid, ie, ie_len, ssi_signal);
740#endif /* CONFIG_AP */
741}
dd7fec1f
PS
742
743
744void wpas_notify_eap_status(struct wpa_supplicant *wpa_s, const char *status,
745 const char *parameter)
746{
747 wpas_dbus_signal_eap_status(wpa_s, status, parameter);
c7a39ba4
CH
748 wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_EAP_STATUS
749 "status='%s' parameter='%s'",
750 status, parameter);
dd7fec1f 751}
0ef023e4
JM
752
753
754void wpas_notify_network_bssid_set_changed(struct wpa_supplicant *wpa_s,
755 struct wpa_ssid *ssid)
756{
757 if (wpa_s->current_ssid != ssid)
758 return;
759
760 wpa_dbg(wpa_s, MSG_DEBUG,
761 "Network bssid config changed for the current network - within-ESS roaming %s",
762 ssid->bssid_set ? "disabled" : "enabled");
763
764 wpa_drv_roaming(wpa_s, !ssid->bssid_set,
765 ssid->bssid_set ? ssid->bssid : NULL);
766}
1e529832
JM
767
768
769void wpas_notify_network_type_changed(struct wpa_supplicant *wpa_s,
770 struct wpa_ssid *ssid)
771{
772#ifdef CONFIG_P2P
773 if (ssid->disabled == 2) {
774 /* Changed from normal network profile to persistent group */
775 ssid->disabled = 0;
776 wpas_dbus_unregister_network(wpa_s, ssid->id);
777 ssid->disabled = 2;
778 wpas_dbus_register_persistent_group(wpa_s, ssid);
779 } else {
780 /* Changed from persistent group to normal network profile */
781 wpas_dbus_unregister_persistent_group(wpa_s, ssid->id);
782 wpas_dbus_register_network(wpa_s, ssid);
783 }
784#endif /* CONFIG_P2P */
785}