conman: Handle WPA_EVENT_TEMP_DISABLED

wpa_supplicant sends this when the wrong PSK is used (or the AP
changes its PSK).  WPA_EVENT_AUTH_REJECT, which is what conman *was*
looking for, isn't even in our version of hostapd and has been removed
from conman.  Whoops.

Change-Id: Icf92f0d836fe14d65e6517f646ee4f86ca795f81
diff --git a/conman/interface.py b/conman/interface.py
index 04c809c..7e37306 100755
--- a/conman/interface.py
+++ b/conman/interface.py
@@ -442,7 +442,7 @@
         if event == 'CONNECTED':
           self.wpa_supplicant = True
         elif event in ('DISCONNECTED', 'TERMINATING', 'ASSOC-REJECT',
-                       'AUTH-REJECT'):
+                       'SSID-TEMP-DISABLED', 'AUTH-REJECT'):
           self.wpa_supplicant = False
           if event == 'TERMINATING':
             self.detach_wpa_control()
@@ -520,7 +520,7 @@
     # return 'Error', we are probably not connected, and we don't do anything
     # special with auth/assoc failures specifically.
     if client_mode and status == 'Error' and self._status != 'Error':
-      self._events.append('<2>CTRL-EVENT-AUTH-REJECT')
+      self._events.append('<2>CTRL-EVENT-SSID-TEMP-DISABLED')
 
     # If we left client mode, wpa_supplicant has terminated.
     if self._client_mode and not client_mode: