Home | History | Annotate | Download | only in wpa_supplicant
      1 /*
      2  * wpa_supplicant - Event notifications
      3  * Copyright (c) 2009-2010, Jouni Malinen <j (at) w1.fi>
      4  *
      5  * This program is free software; you can redistribute it and/or modify
      6  * it under the terms of the GNU General Public License version 2 as
      7  * published by the Free Software Foundation.
      8  *
      9  * Alternatively, this software may be distributed under the terms of BSD
     10  * license.
     11  *
     12  * See README and COPYING for more details.
     13  */
     14 
     15 #include "utils/includes.h"
     16 
     17 #include "utils/common.h"
     18 #include "common/wpa_ctrl.h"
     19 #include "config.h"
     20 #include "wpa_supplicant_i.h"
     21 #include "wps_supplicant.h"
     22 #include "dbus/dbus_common.h"
     23 #include "dbus/dbus_old.h"
     24 #include "dbus/dbus_new.h"
     25 #include "driver_i.h"
     26 #include "scan.h"
     27 #include "p2p_supplicant.h"
     28 #include "sme.h"
     29 #include "notify.h"
     30 
     31 int wpas_notify_supplicant_initialized(struct wpa_global *global)
     32 {
     33 #ifdef CONFIG_DBUS
     34 	if (global->params.dbus_ctrl_interface) {
     35 		global->dbus = wpas_dbus_init(global);
     36 		if (global->dbus == NULL)
     37 			return -1;
     38 	}
     39 #endif /* CONFIG_DBUS */
     40 
     41 	return 0;
     42 }
     43 
     44 
     45 void wpas_notify_supplicant_deinitialized(struct wpa_global *global)
     46 {
     47 #ifdef CONFIG_DBUS
     48 	if (global->dbus)
     49 		wpas_dbus_deinit(global->dbus);
     50 #endif /* CONFIG_DBUS */
     51 }
     52 
     53 
     54 int wpas_notify_iface_added(struct wpa_supplicant *wpa_s)
     55 {
     56 	if (wpas_dbus_register_iface(wpa_s))
     57 		return -1;
     58 
     59 	if (wpas_dbus_register_interface(wpa_s))
     60 		return -1;
     61 
     62 	return 0;
     63 }
     64 
     65 
     66 void wpas_notify_iface_removed(struct wpa_supplicant *wpa_s)
     67 {
     68 	/* unregister interface in old DBus ctrl iface */
     69 	wpas_dbus_unregister_iface(wpa_s);
     70 
     71 	/* unregister interface in new DBus ctrl iface */
     72 	wpas_dbus_unregister_interface(wpa_s);
     73 }
     74 
     75 
     76 void wpas_notify_state_changed(struct wpa_supplicant *wpa_s,
     77 			       enum wpa_states new_state,
     78 			       enum wpa_states old_state)
     79 {
     80 	/* notify the old DBus API */
     81 	wpa_supplicant_dbus_notify_state_change(wpa_s, new_state,
     82 						old_state);
     83 
     84 	/* notify the new DBus API */
     85 	wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_STATE);
     86 
     87 #ifdef CONFIG_P2P
     88 	if (new_state == WPA_COMPLETED)
     89 		wpas_p2p_notif_connected(wpa_s);
     90 	else if (new_state < WPA_ASSOCIATED)
     91 		wpas_p2p_notif_disconnected(wpa_s);
     92 #endif /* CONFIG_P2P */
     93 
     94 	sme_state_changed(wpa_s);
     95 
     96 #ifdef ANDROID
     97 	wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_STATE_CHANGE
     98 		     "id=%d state=%d BSSID=" MACSTR,
     99 		     wpa_s->current_ssid ? wpa_s->current_ssid->id : -1,
    100 		     new_state, MAC2STR(wpa_s->pending_bssid));
    101 #endif /* ANDROID */
    102 }
    103 
    104 
    105 void wpas_notify_network_changed(struct wpa_supplicant *wpa_s)
    106 {
    107 	wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_CURRENT_NETWORK);
    108 }
    109 
    110 
    111 void wpas_notify_ap_scan_changed(struct wpa_supplicant *wpa_s)
    112 {
    113 	wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_AP_SCAN);
    114 }
    115 
    116 
    117 void wpas_notify_bssid_changed(struct wpa_supplicant *wpa_s)
    118 {
    119 	wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_CURRENT_BSS);
    120 }
    121 
    122 
    123 void wpas_notify_auth_changed(struct wpa_supplicant *wpa_s)
    124 {
    125 	wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_CURRENT_AUTH_MODE);
    126 }
    127 
    128 
    129 void wpas_notify_network_enabled_changed(struct wpa_supplicant *wpa_s,
    130 					 struct wpa_ssid *ssid)
    131 {
    132 	wpas_dbus_signal_network_enabled_changed(wpa_s, ssid);
    133 }
    134 
    135 
    136 void wpas_notify_network_selected(struct wpa_supplicant *wpa_s,
    137 				  struct wpa_ssid *ssid)
    138 {
    139 	wpas_dbus_signal_network_selected(wpa_s, ssid->id);
    140 }
    141 
    142 
    143 void wpas_notify_scanning(struct wpa_supplicant *wpa_s)
    144 {
    145 	/* notify the old DBus API */
    146 	wpa_supplicant_dbus_notify_scanning(wpa_s);
    147 
    148 	/* notify the new DBus API */
    149 	wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_SCANNING);
    150 }
    151 
    152 
    153 void wpas_notify_scan_done(struct wpa_supplicant *wpa_s, int success)
    154 {
    155 	wpas_dbus_signal_scan_done(wpa_s, success);
    156 }
    157 
    158 
    159 void wpas_notify_scan_results(struct wpa_supplicant *wpa_s)
    160 {
    161 	/* notify the old DBus API */
    162 	wpa_supplicant_dbus_notify_scan_results(wpa_s);
    163 
    164 	wpas_wps_notify_scan_results(wpa_s);
    165 }
    166 
    167 
    168 void wpas_notify_wps_credential(struct wpa_supplicant *wpa_s,
    169 				const struct wps_credential *cred)
    170 {
    171 #ifdef CONFIG_WPS
    172 	/* notify the old DBus API */
    173 	wpa_supplicant_dbus_notify_wps_cred(wpa_s, cred);
    174 	/* notify the new DBus API */
    175 	wpas_dbus_signal_wps_cred(wpa_s, cred);
    176 #endif /* CONFIG_WPS */
    177 }
    178 
    179 
    180 void wpas_notify_wps_event_m2d(struct wpa_supplicant *wpa_s,
    181 			       struct wps_event_m2d *m2d)
    182 {
    183 #ifdef CONFIG_WPS
    184 	wpas_dbus_signal_wps_event_m2d(wpa_s, m2d);
    185 #endif /* CONFIG_WPS */
    186 }
    187 
    188 
    189 void wpas_notify_wps_event_fail(struct wpa_supplicant *wpa_s,
    190 				struct wps_event_fail *fail)
    191 {
    192 #ifdef CONFIG_WPS
    193 	wpas_dbus_signal_wps_event_fail(wpa_s, fail);
    194 #endif /* CONFIG_WPS */
    195 }
    196 
    197 
    198 void wpas_notify_wps_event_success(struct wpa_supplicant *wpa_s)
    199 {
    200 #ifdef CONFIG_WPS
    201 	wpas_dbus_signal_wps_event_success(wpa_s);
    202 #endif /* CONFIG_WPS */
    203 }
    204 
    205 
    206 void wpas_notify_network_added(struct wpa_supplicant *wpa_s,
    207 			       struct wpa_ssid *ssid)
    208 {
    209 	/*
    210 	 * Networks objects created during any P2P activities should not be
    211 	 * exposed out. They might/will confuse certain non-P2P aware
    212 	 * applications since these network objects won't behave like
    213 	 * regular ones.
    214 	 */
    215 	if (wpa_s->global->p2p_group_formation != wpa_s)
    216 		wpas_dbus_register_network(wpa_s, ssid);
    217 }
    218 
    219 
    220 void wpas_notify_persistent_group_added(struct wpa_supplicant *wpa_s,
    221 					struct wpa_ssid *ssid)
    222 {
    223 #ifdef CONFIG_P2P
    224 	wpas_dbus_register_persistent_group(wpa_s, ssid);
    225 #endif /* CONFIG_P2P */
    226 }
    227 
    228 
    229 void wpas_notify_persistent_group_removed(struct wpa_supplicant *wpa_s,
    230 					  struct wpa_ssid *ssid)
    231 {
    232 #ifdef CONFIG_P2P
    233 	wpas_dbus_unregister_persistent_group(wpa_s, ssid->id);
    234 #endif /* CONFIG_P2P */
    235 }
    236 
    237 
    238 void wpas_notify_network_removed(struct wpa_supplicant *wpa_s,
    239 				 struct wpa_ssid *ssid)
    240 {
    241 	if (wpa_s->global->p2p_group_formation != wpa_s)
    242 		wpas_dbus_unregister_network(wpa_s, ssid->id);
    243 }
    244 
    245 
    246 void wpas_notify_bss_added(struct wpa_supplicant *wpa_s,
    247 			   u8 bssid[], unsigned int id)
    248 {
    249 	wpas_dbus_register_bss(wpa_s, bssid, id);
    250 	wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_BSS_ADDED "%u " MACSTR,
    251 		     id, MAC2STR(bssid));
    252 }
    253 
    254 
    255 void wpas_notify_bss_removed(struct wpa_supplicant *wpa_s,
    256 			     u8 bssid[], unsigned int id)
    257 {
    258 	wpas_dbus_unregister_bss(wpa_s, bssid, id);
    259 	wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_BSS_REMOVED "%u " MACSTR,
    260 		     id, MAC2STR(bssid));
    261 }
    262 
    263 
    264 void wpas_notify_bss_freq_changed(struct wpa_supplicant *wpa_s,
    265 				  unsigned int id)
    266 {
    267 	wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_FREQ, id);
    268 }
    269 
    270 
    271 void wpas_notify_bss_signal_changed(struct wpa_supplicant *wpa_s,
    272 				    unsigned int id)
    273 {
    274 	wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_SIGNAL,
    275 					  id);
    276 }
    277 
    278 
    279 void wpas_notify_bss_privacy_changed(struct wpa_supplicant *wpa_s,
    280 				     unsigned int id)
    281 {
    282 	wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_PRIVACY,
    283 					  id);
    284 }
    285 
    286 
    287 void wpas_notify_bss_mode_changed(struct wpa_supplicant *wpa_s,
    288 				  unsigned int id)
    289 {
    290 	wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_MODE, id);
    291 }
    292 
    293 
    294 void wpas_notify_bss_wpaie_changed(struct wpa_supplicant *wpa_s,
    295 				   unsigned int id)
    296 {
    297 	wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_WPA, id);
    298 }
    299 
    300 
    301 void wpas_notify_bss_rsnie_changed(struct wpa_supplicant *wpa_s,
    302 				   unsigned int id)
    303 {
    304 	wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_RSN, id);
    305 }
    306 
    307 
    308 void wpas_notify_bss_wps_changed(struct wpa_supplicant *wpa_s,
    309 				 unsigned int id)
    310 {
    311 }
    312 
    313 
    314 void wpas_notify_bss_ies_changed(struct wpa_supplicant *wpa_s,
    315 				   unsigned int id)
    316 {
    317 	wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_IES, id);
    318 }
    319 
    320 
    321 void wpas_notify_bss_rates_changed(struct wpa_supplicant *wpa_s,
    322 				   unsigned int id)
    323 {
    324 	wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_RATES, id);
    325 }
    326 
    327 
    328 void wpas_notify_blob_added(struct wpa_supplicant *wpa_s, const char *name)
    329 {
    330 	wpas_dbus_signal_blob_added(wpa_s, name);
    331 }
    332 
    333 
    334 void wpas_notify_blob_removed(struct wpa_supplicant *wpa_s, const char *name)
    335 {
    336 	wpas_dbus_signal_blob_removed(wpa_s, name);
    337 }
    338 
    339 
    340 void wpas_notify_debug_level_changed(struct wpa_global *global)
    341 {
    342 	wpas_dbus_signal_debug_level_changed(global);
    343 }
    344 
    345 
    346 void wpas_notify_debug_timestamp_changed(struct wpa_global *global)
    347 {
    348 	wpas_dbus_signal_debug_timestamp_changed(global);
    349 }
    350 
    351 
    352 void wpas_notify_debug_show_keys_changed(struct wpa_global *global)
    353 {
    354 	wpas_dbus_signal_debug_show_keys_changed(global);
    355 }
    356 
    357 
    358 void wpas_notify_suspend(struct wpa_global *global)
    359 {
    360 	struct wpa_supplicant *wpa_s;
    361 
    362 	os_get_time(&global->suspend_time);
    363 	wpa_printf(MSG_DEBUG, "System suspend notification");
    364 	for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next)
    365 		wpa_drv_suspend(wpa_s);
    366 }
    367 
    368 
    369 void wpas_notify_resume(struct wpa_global *global)
    370 {
    371 	struct os_time now;
    372 	int slept;
    373 	struct wpa_supplicant *wpa_s;
    374 
    375 	if (global->suspend_time.sec == 0)
    376 		slept = -1;
    377 	else {
    378 		os_get_time(&now);
    379 		slept = now.sec - global->suspend_time.sec;
    380 	}
    381 	wpa_printf(MSG_DEBUG, "System resume notification (slept %d seconds)",
    382 		   slept);
    383 
    384 	for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next) {
    385 		wpa_drv_resume(wpa_s);
    386 		if (wpa_s->wpa_state == WPA_DISCONNECTED)
    387 			wpa_supplicant_req_scan(wpa_s, 0, 100000);
    388 	}
    389 }
    390 
    391 
    392 #ifdef CONFIG_P2P
    393 
    394 void wpas_notify_p2p_device_found(struct wpa_supplicant *wpa_s,
    395 				  const u8 *dev_addr, int new_device)
    396 {
    397 	if (new_device) {
    398 		/* Create the new peer object */
    399 		wpas_dbus_register_peer(wpa_s, dev_addr);
    400 	}
    401 
    402 	/* Notify a new peer has been detected*/
    403 	wpas_dbus_signal_peer_device_found(wpa_s, dev_addr);
    404 }
    405 
    406 
    407 void wpas_notify_p2p_device_lost(struct wpa_supplicant *wpa_s,
    408 				 const u8 *dev_addr)
    409 {
    410 	wpas_dbus_unregister_peer(wpa_s, dev_addr);
    411 
    412 	/* Create signal on interface object*/
    413 	wpas_dbus_signal_peer_device_lost(wpa_s, dev_addr);
    414 }
    415 
    416 
    417 void wpas_notify_p2p_group_removed(struct wpa_supplicant *wpa_s,
    418 				   const struct wpa_ssid *ssid,
    419 				   const char *role)
    420 {
    421 	wpas_dbus_unregister_p2p_group(wpa_s, ssid);
    422 
    423 	wpas_dbus_signal_p2p_group_removed(wpa_s, role);
    424 }
    425 
    426 
    427 void wpas_notify_p2p_go_neg_req(struct wpa_supplicant *wpa_s,
    428 				const u8 *src, u16 dev_passwd_id)
    429 {
    430 	wpas_dbus_signal_p2p_go_neg_req(wpa_s, src, dev_passwd_id);
    431 }
    432 
    433 
    434 void wpas_notify_p2p_go_neg_completed(struct wpa_supplicant *wpa_s, int status)
    435 {
    436 	wpas_dbus_signal_p2p_go_neg_resp(wpa_s, status);
    437 }
    438 
    439 
    440 void wpas_notify_p2p_invitation_result(struct wpa_supplicant *wpa_s,
    441 				       int status, const u8 *bssid)
    442 {
    443 	wpas_dbus_signal_p2p_invitation_result(wpa_s, status, bssid);
    444 }
    445 
    446 
    447 void wpas_notify_p2p_sd_request(struct wpa_supplicant *wpa_s,
    448 				int freq, const u8 *sa, u8 dialog_token,
    449 				u16 update_indic, const u8 *tlvs,
    450 				size_t tlvs_len)
    451 {
    452 	wpas_dbus_signal_p2p_sd_request(wpa_s, freq, sa, dialog_token,
    453 					update_indic, tlvs, tlvs_len);
    454 }
    455 
    456 
    457 void wpas_notify_p2p_sd_response(struct wpa_supplicant *wpa_s,
    458 				 const u8 *sa, u16 update_indic,
    459 				 const u8 *tlvs, size_t tlvs_len)
    460 {
    461 	wpas_dbus_signal_p2p_sd_response(wpa_s, sa, update_indic,
    462 					 tlvs, tlvs_len);
    463 }
    464 
    465 
    466 /**
    467  * wpas_notify_p2p_provision_discovery - Notification of provision discovery
    468  * @dev_addr: Who sent the request or responded to our request.
    469  * @request: Will be 1 if request, 0 for response.
    470  * @status: Valid only in case of response (0 in case of success)
    471  * @config_methods: WPS config methods
    472  * @generated_pin: PIN to be displayed in case of WPS_CONFIG_DISPLAY method
    473  *
    474  * This can be used to notify:
    475  * - Requests or responses
    476  * - Various config methods
    477  * - Failure condition in case of response
    478  */
    479 void wpas_notify_p2p_provision_discovery(struct wpa_supplicant *wpa_s,
    480 					 const u8 *dev_addr, int request,
    481 					 enum p2p_prov_disc_status status,
    482 					 u16 config_methods,
    483 					 unsigned int generated_pin)
    484 {
    485 	wpas_dbus_signal_p2p_provision_discovery(wpa_s, dev_addr, request,
    486 						 status, config_methods,
    487 						 generated_pin);
    488 }
    489 
    490 
    491 void wpas_notify_p2p_group_started(struct wpa_supplicant *wpa_s,
    492 				   struct wpa_ssid *ssid, int network_id,
    493 				   int client)
    494 {
    495 	/* Notify a group has been started */
    496 	wpas_dbus_register_p2p_group(wpa_s, ssid);
    497 
    498 	wpas_dbus_signal_p2p_group_started(wpa_s, ssid, client, network_id);
    499 }
    500 
    501 
    502 void wpas_notify_p2p_wps_failed(struct wpa_supplicant *wpa_s,
    503 				struct wps_event_fail *fail)
    504 {
    505 	wpas_dbus_signal_p2p_wps_failed(wpa_s, fail);
    506 }
    507 
    508 #endif /* CONFIG_P2P */
    509 
    510 
    511 static void wpas_notify_ap_sta_authorized(struct wpa_supplicant *wpa_s,
    512 					  const u8 *sta)
    513 {
    514 #ifdef CONFIG_P2P
    515 	/*
    516 	 * Register a group member object corresponding to this peer and
    517 	 * emit a PeerJoined signal. This will check if it really is a
    518 	 * P2P group.
    519 	 */
    520 	wpas_dbus_register_p2p_groupmember(wpa_s, sta);
    521 
    522 	/*
    523 	 * Create 'peer-joined' signal on group object -- will also
    524 	 * check P2P itself.
    525 	 */
    526 	wpas_dbus_signal_p2p_peer_joined(wpa_s, sta);
    527 #endif /* CONFIG_P2P */
    528 }
    529 
    530 
    531 static void wpas_notify_ap_sta_deauthorized(struct wpa_supplicant *wpa_s,
    532 					    const u8 *sta)
    533 {
    534 #ifdef CONFIG_P2P
    535 	/*
    536 	 * Unregister a group member object corresponding to this peer
    537 	 * if this is a P2P group.
    538 	 */
    539 	wpas_dbus_unregister_p2p_groupmember(wpa_s, sta);
    540 
    541 	/*
    542 	 * Create 'peer-disconnected' signal on group object if this
    543 	 * is a P2P group.
    544 	 */
    545 	wpas_dbus_signal_p2p_peer_disconnected(wpa_s, sta);
    546 #endif /* CONFIG_P2P */
    547 }
    548 
    549 
    550 void wpas_notify_sta_authorized(struct wpa_supplicant *wpa_s,
    551 				const u8 *mac_addr, int authorized)
    552 {
    553 	if (authorized)
    554 		wpas_notify_ap_sta_authorized(wpa_s, mac_addr);
    555 	else
    556 		wpas_notify_ap_sta_deauthorized(wpa_s, mac_addr);
    557 }
    558 
    559 
    560 void wpas_notify_certification(struct wpa_supplicant *wpa_s, int depth,
    561 			       const char *subject, const char *cert_hash,
    562 			       const struct wpabuf *cert)
    563 {
    564 	wpa_msg(wpa_s, MSG_INFO, WPA_EVENT_EAP_PEER_CERT
    565 		"depth=%d subject='%s'%s%s",
    566 		depth, subject,
    567 		cert_hash ? " hash=" : "",
    568 		cert_hash ? cert_hash : "");
    569 
    570 	if (cert) {
    571 		char *cert_hex;
    572 		size_t len = wpabuf_len(cert) * 2 + 1;
    573 		cert_hex = os_malloc(len);
    574 		if (cert_hex) {
    575 			wpa_snprintf_hex(cert_hex, len, wpabuf_head(cert),
    576 					 wpabuf_len(cert));
    577 			wpa_msg_ctrl(wpa_s, MSG_INFO,
    578 				     WPA_EVENT_EAP_PEER_CERT
    579 				     "depth=%d subject='%s' cert=%s",
    580 				     depth, subject, cert_hex);
    581 			os_free(cert_hex);
    582 		}
    583 	}
    584 
    585 	/* notify the old DBus API */
    586 	wpa_supplicant_dbus_notify_certification(wpa_s, depth, subject,
    587 						 cert_hash, cert);
    588 	/* notify the new DBus API */
    589 	wpas_dbus_signal_certification(wpa_s, depth, subject, cert_hash, cert);
    590 }
    591