1 /* 2 * WPA Supplicant / dbus-based control interface 3 * Copyright (c) 2006, Dan Williams <dcbw (at) redhat.com> and Red Hat, Inc. 4 * 5 * This program is free software; you can redistribute it and/or modify 6 * it under the terms of the GNU General Public License version 2 as 7 * published by the Free Software Foundation. 8 * 9 * Alternatively, this software may be distributed under the terms of BSD 10 * license. 11 * 12 * See README and COPYING for more details. 13 */ 14 15 #include "includes.h" 16 17 #include "common.h" 18 #include "eloop.h" 19 #include "config.h" 20 #include "wpa_supplicant_i.h" 21 #include "wps/wps.h" 22 #include "ctrl_iface_dbus.h" 23 #include "ctrl_iface_dbus_handlers.h" 24 25 #define _DBUS_VERSION (DBUS_VERSION_MAJOR << 8 | DBUS_VERSION_MINOR) 26 #define DBUS_VER(major, minor) ((major) << 8 | (minor)) 27 28 #if _DBUS_VERSION < DBUS_VER(1,1) 29 #define dbus_watch_get_unix_fd dbus_watch_get_fd 30 #endif 31 32 33 struct ctrl_iface_dbus_priv { 34 DBusConnection *con; 35 int should_dispatch; 36 struct wpa_global *global; 37 38 u32 next_objid; 39 }; 40 41 42 static void process_watch(struct ctrl_iface_dbus_priv *iface, 43 DBusWatch *watch, eloop_event_type type) 44 { 45 dbus_connection_ref(iface->con); 46 47 iface->should_dispatch = 0; 48 49 if (type == EVENT_TYPE_READ) 50 dbus_watch_handle(watch, DBUS_WATCH_READABLE); 51 else if (type == EVENT_TYPE_WRITE) 52 dbus_watch_handle(watch, DBUS_WATCH_WRITABLE); 53 else if (type == EVENT_TYPE_EXCEPTION) 54 dbus_watch_handle(watch, DBUS_WATCH_ERROR); 55 56 if (iface->should_dispatch) { 57 while (dbus_connection_get_dispatch_status(iface->con) == 58 DBUS_DISPATCH_DATA_REMAINS) 59 dbus_connection_dispatch(iface->con); 60 iface->should_dispatch = 0; 61 } 62 63 dbus_connection_unref(iface->con); 64 } 65 66 67 static void process_watch_exception(int sock, void *eloop_ctx, void *sock_ctx) 68 { 69 process_watch(eloop_ctx, sock_ctx, EVENT_TYPE_EXCEPTION); 70 } 71 72 73 static void process_watch_read(int sock, void *eloop_ctx, void *sock_ctx) 74 { 75 process_watch(eloop_ctx, sock_ctx, EVENT_TYPE_READ); 76 } 77 78 79 static void process_watch_write(int sock, void *eloop_ctx, void *sock_ctx) 80 { 81 process_watch(eloop_ctx, sock_ctx, EVENT_TYPE_WRITE); 82 } 83 84 85 static void connection_setup_add_watch(struct ctrl_iface_dbus_priv *iface, 86 DBusWatch *watch) 87 { 88 unsigned int flags; 89 int fd; 90 91 if (!dbus_watch_get_enabled(watch)) 92 return; 93 94 flags = dbus_watch_get_flags(watch); 95 fd = dbus_watch_get_unix_fd(watch); 96 97 eloop_register_sock(fd, EVENT_TYPE_EXCEPTION, process_watch_exception, 98 iface, watch); 99 100 if (flags & DBUS_WATCH_READABLE) { 101 eloop_register_sock(fd, EVENT_TYPE_READ, process_watch_read, 102 iface, watch); 103 } 104 if (flags & DBUS_WATCH_WRITABLE) { 105 eloop_register_sock(fd, EVENT_TYPE_WRITE, process_watch_write, 106 iface, watch); 107 } 108 109 dbus_watch_set_data(watch, iface, NULL); 110 } 111 112 113 static void connection_setup_remove_watch(struct ctrl_iface_dbus_priv *iface, 114 DBusWatch *watch) 115 { 116 unsigned int flags; 117 int fd; 118 119 flags = dbus_watch_get_flags(watch); 120 fd = dbus_watch_get_unix_fd(watch); 121 122 eloop_unregister_sock(fd, EVENT_TYPE_EXCEPTION); 123 124 if (flags & DBUS_WATCH_READABLE) 125 eloop_unregister_sock(fd, EVENT_TYPE_READ); 126 if (flags & DBUS_WATCH_WRITABLE) 127 eloop_unregister_sock(fd, EVENT_TYPE_WRITE); 128 129 dbus_watch_set_data(watch, NULL, NULL); 130 } 131 132 133 static dbus_bool_t add_watch(DBusWatch *watch, void *data) 134 { 135 connection_setup_add_watch(data, watch); 136 return TRUE; 137 } 138 139 140 static void remove_watch(DBusWatch *watch, void *data) 141 { 142 connection_setup_remove_watch(data, watch); 143 } 144 145 146 static void watch_toggled(DBusWatch *watch, void *data) 147 { 148 if (dbus_watch_get_enabled(watch)) 149 add_watch(watch, data); 150 else 151 remove_watch(watch, data); 152 } 153 154 155 static void process_timeout(void *eloop_ctx, void *sock_ctx) 156 { 157 DBusTimeout *timeout = sock_ctx; 158 159 dbus_timeout_handle(timeout); 160 } 161 162 163 static void connection_setup_add_timeout(struct ctrl_iface_dbus_priv *iface, 164 DBusTimeout *timeout) 165 { 166 if (!dbus_timeout_get_enabled(timeout)) 167 return; 168 169 eloop_register_timeout(0, dbus_timeout_get_interval(timeout) * 1000, 170 process_timeout, iface, timeout); 171 172 dbus_timeout_set_data(timeout, iface, NULL); 173 } 174 175 176 static void connection_setup_remove_timeout(struct ctrl_iface_dbus_priv *iface, 177 DBusTimeout *timeout) 178 { 179 eloop_cancel_timeout(process_timeout, iface, timeout); 180 dbus_timeout_set_data(timeout, NULL, NULL); 181 } 182 183 184 static dbus_bool_t add_timeout(DBusTimeout *timeout, void *data) 185 { 186 if (!dbus_timeout_get_enabled(timeout)) 187 return TRUE; 188 189 connection_setup_add_timeout(data, timeout); 190 191 return TRUE; 192 } 193 194 195 static void remove_timeout(DBusTimeout *timeout, void *data) 196 { 197 connection_setup_remove_timeout(data, timeout); 198 } 199 200 201 static void timeout_toggled(DBusTimeout *timeout, void *data) 202 { 203 if (dbus_timeout_get_enabled(timeout)) 204 add_timeout(timeout, data); 205 else 206 remove_timeout(timeout, data); 207 } 208 209 210 static void process_wakeup_main(int sig, void *eloop_ctx, void *signal_ctx) 211 { 212 struct ctrl_iface_dbus_priv *iface = signal_ctx; 213 214 if (sig != SIGPOLL || !iface->con) 215 return; 216 217 if (dbus_connection_get_dispatch_status(iface->con) != 218 DBUS_DISPATCH_DATA_REMAINS) 219 return; 220 221 /* Only dispatch once - we do not want to starve other events */ 222 dbus_connection_ref(iface->con); 223 dbus_connection_dispatch(iface->con); 224 dbus_connection_unref(iface->con); 225 } 226 227 228 /** 229 * wakeup_main - Attempt to wake our mainloop up 230 * @data: dbus control interface private data 231 * 232 * Try to wake up the main eloop so it will process 233 * dbus events that may have happened. 234 */ 235 static void wakeup_main(void *data) 236 { 237 struct ctrl_iface_dbus_priv *iface = data; 238 239 /* Use SIGPOLL to break out of the eloop select() */ 240 raise(SIGPOLL); 241 iface->should_dispatch = 1; 242 } 243 244 245 /** 246 * connection_setup_wakeup_main - Tell dbus about our wakeup_main function 247 * @iface: dbus control interface private data 248 * Returns: 0 on success, -1 on failure 249 * 250 * Register our wakeup_main handler with dbus 251 */ 252 static int connection_setup_wakeup_main(struct ctrl_iface_dbus_priv *iface) 253 { 254 if (eloop_register_signal(SIGPOLL, process_wakeup_main, iface)) 255 return -1; 256 257 dbus_connection_set_wakeup_main_function(iface->con, wakeup_main, 258 iface, NULL); 259 260 return 0; 261 } 262 263 264 /** 265 * wpa_supplicant_dbus_next_objid - Return next available object id 266 * @iface: dbus control interface private data 267 * Returns: Object id 268 */ 269 u32 wpa_supplicant_dbus_next_objid (struct ctrl_iface_dbus_priv *iface) 270 { 271 return iface->next_objid++; 272 } 273 274 275 /** 276 * wpas_dbus_decompose_object_path - Decompose an interface object path into parts 277 * @path: The dbus object path 278 * @network: (out) the configured network this object path refers to, if any 279 * @bssid: (out) the scanned bssid this object path refers to, if any 280 * Returns: The object path of the network interface this path refers to 281 * 282 * For a given object path, decomposes the object path into object id, network, 283 * and BSSID parts, if those parts exist. 284 */ 285 char * wpas_dbus_decompose_object_path(const char *path, char **network, 286 char **bssid) 287 { 288 const unsigned int dev_path_prefix_len = 289 strlen(WPAS_DBUS_PATH_INTERFACES "/"); 290 char *obj_path_only; 291 char *next_sep; 292 293 /* Be a bit paranoid about path */ 294 if (!path || strncmp(path, WPAS_DBUS_PATH_INTERFACES "/", 295 dev_path_prefix_len)) 296 return NULL; 297 298 /* Ensure there's something at the end of the path */ 299 if ((path + dev_path_prefix_len)[0] == '\0') 300 return NULL; 301 302 obj_path_only = strdup(path); 303 if (obj_path_only == NULL) 304 return NULL; 305 306 next_sep = strchr(obj_path_only + dev_path_prefix_len, '/'); 307 if (next_sep != NULL) { 308 const char *net_part = strstr(next_sep, 309 WPAS_DBUS_NETWORKS_PART "/"); 310 const char *bssid_part = strstr(next_sep, 311 WPAS_DBUS_BSSIDS_PART "/"); 312 313 if (network && net_part) { 314 /* Deal with a request for a configured network */ 315 const char *net_name = net_part + 316 strlen(WPAS_DBUS_NETWORKS_PART "/"); 317 *network = NULL; 318 if (strlen(net_name)) 319 *network = strdup(net_name); 320 } else if (bssid && bssid_part) { 321 /* Deal with a request for a scanned BSSID */ 322 const char *bssid_name = bssid_part + 323 strlen(WPAS_DBUS_BSSIDS_PART "/"); 324 if (strlen(bssid_name)) 325 *bssid = strdup(bssid_name); 326 else 327 *bssid = NULL; 328 } 329 330 /* Cut off interface object path before "/" */ 331 *next_sep = '\0'; 332 } 333 334 return obj_path_only; 335 } 336 337 338 /** 339 * wpas_dbus_new_invalid_iface_error - Return a new invalid interface error message 340 * @message: Pointer to incoming dbus message this error refers to 341 * Returns: A dbus error message 342 * 343 * Convenience function to create and return an invalid interface error 344 */ 345 DBusMessage * wpas_dbus_new_invalid_iface_error(DBusMessage *message) 346 { 347 return dbus_message_new_error(message, WPAS_ERROR_INVALID_IFACE, 348 "wpa_supplicant knows nothing about " 349 "this interface."); 350 } 351 352 353 /** 354 * wpas_dbus_new_invalid_network_error - Return a new invalid network error message 355 * @message: Pointer to incoming dbus message this error refers to 356 * Returns: a dbus error message 357 * 358 * Convenience function to create and return an invalid network error 359 */ 360 DBusMessage * wpas_dbus_new_invalid_network_error(DBusMessage *message) 361 { 362 return dbus_message_new_error(message, WPAS_ERROR_INVALID_NETWORK, 363 "The requested network does not exist."); 364 } 365 366 367 /** 368 * wpas_dbus_new_invalid_bssid_error - Return a new invalid bssid error message 369 * @message: Pointer to incoming dbus message this error refers to 370 * Returns: a dbus error message 371 * 372 * Convenience function to create and return an invalid bssid error 373 */ 374 static DBusMessage * wpas_dbus_new_invalid_bssid_error(DBusMessage *message) 375 { 376 return dbus_message_new_error(message, WPAS_ERROR_INVALID_BSSID, 377 "The BSSID requested was invalid."); 378 } 379 380 381 /** 382 * wpas_dispatch_network_method - dispatch messages for configured networks 383 * @message: the incoming dbus message 384 * @wpa_s: a network interface's data 385 * @network_id: id of the configured network we're interested in 386 * Returns: a reply dbus message, or a dbus error message 387 * 388 * This function dispatches all incoming dbus messages for configured networks. 389 */ 390 static DBusMessage * wpas_dispatch_network_method(DBusMessage *message, 391 struct wpa_supplicant *wpa_s, 392 int network_id) 393 { 394 DBusMessage *reply = NULL; 395 const char *method = dbus_message_get_member(message); 396 struct wpa_ssid *ssid; 397 398 ssid = wpa_config_get_network(wpa_s->conf, network_id); 399 if (ssid == NULL) 400 return wpas_dbus_new_invalid_network_error(message); 401 402 if (!strcmp(method, "set")) 403 reply = wpas_dbus_iface_set_network(message, wpa_s, ssid); 404 else if (!strcmp(method, "enable")) 405 reply = wpas_dbus_iface_enable_network(message, wpa_s, ssid); 406 else if (!strcmp(method, "disable")) 407 reply = wpas_dbus_iface_disable_network(message, wpa_s, ssid); 408 409 return reply; 410 } 411 412 413 /** 414 * wpas_dispatch_bssid_method - dispatch messages for scanned networks 415 * @message: the incoming dbus message 416 * @wpa_s: a network interface's data 417 * @bssid: bssid of the scanned network we're interested in 418 * Returns: a reply dbus message, or a dbus error message 419 * 420 * This function dispatches all incoming dbus messages for scanned networks. 421 */ 422 static DBusMessage * wpas_dispatch_bssid_method(DBusMessage *message, 423 struct wpa_supplicant *wpa_s, 424 const char *bssid) 425 { 426 DBusMessage *reply = NULL; 427 const char *method = dbus_message_get_member(message); 428 struct wpa_scan_res *res = NULL; 429 size_t i; 430 431 /* Ensure we actually have scan data */ 432 if (wpa_s->scan_res == NULL && 433 wpa_supplicant_get_scan_results(wpa_s) < 0) { 434 reply = wpas_dbus_new_invalid_bssid_error(message); 435 goto out; 436 } 437 438 /* Find the bssid's scan data */ 439 for (i = 0; i < wpa_s->scan_res->num; i++) { 440 struct wpa_scan_res *search_res = wpa_s->scan_res->res[i]; 441 char mac_str[18]; 442 443 memset(mac_str, 0, sizeof(mac_str)); 444 snprintf(mac_str, sizeof(mac_str) - 1, WPAS_DBUS_BSSID_FORMAT, 445 MAC2STR(search_res->bssid)); 446 if (!strcmp(bssid, mac_str)) { 447 res = search_res; 448 break; 449 } 450 } 451 452 if (!res) { 453 reply = wpas_dbus_new_invalid_bssid_error(message); 454 goto out; 455 } 456 457 /* Dispatch the method call against the scanned bssid */ 458 if (!strcmp(method, "properties")) 459 reply = wpas_dbus_bssid_properties(message, wpa_s, res); 460 461 out: 462 return reply; 463 } 464 465 466 /** 467 * wpas_iface_message_handler - Dispatch messages for interfaces or networks 468 * @connection: Connection to the system message bus 469 * @message: An incoming dbus message 470 * @user_data: A pointer to a dbus control interface data structure 471 * Returns: Whether or not the message was handled 472 * 473 * This function dispatches all incoming dbus messages for network interfaces, 474 * or objects owned by them, such as scanned BSSIDs and configured networks. 475 */ 476 static DBusHandlerResult wpas_iface_message_handler(DBusConnection *connection, 477 DBusMessage *message, 478 void *user_data) 479 { 480 struct wpa_supplicant *wpa_s = user_data; 481 const char *method = dbus_message_get_member(message); 482 const char *path = dbus_message_get_path(message); 483 const char *msg_interface = dbus_message_get_interface(message); 484 char *iface_obj_path = NULL; 485 char *network = NULL; 486 char *bssid = NULL; 487 DBusMessage *reply = NULL; 488 489 /* Caller must specify a message interface */ 490 if (!msg_interface) 491 goto out; 492 493 iface_obj_path = wpas_dbus_decompose_object_path(path, &network, 494 &bssid); 495 if (iface_obj_path == NULL) { 496 reply = wpas_dbus_new_invalid_iface_error(message); 497 goto out; 498 } 499 500 /* Make sure the message's object path actually refers to the 501 * wpa_supplicant structure it's supposed to (which is wpa_s) 502 */ 503 if (wpa_supplicant_get_iface_by_dbus_path(wpa_s->global, 504 iface_obj_path) != wpa_s) { 505 reply = wpas_dbus_new_invalid_iface_error(message); 506 goto out; 507 } 508 509 if (network && !strcmp(msg_interface, WPAS_DBUS_IFACE_NETWORK)) { 510 /* A method for one of this interface's configured networks */ 511 int nid = strtoul(network, NULL, 10); 512 if (errno != EINVAL) 513 reply = wpas_dispatch_network_method(message, wpa_s, 514 nid); 515 else 516 reply = wpas_dbus_new_invalid_network_error(message); 517 } else if (bssid && !strcmp(msg_interface, WPAS_DBUS_IFACE_BSSID)) { 518 /* A method for one of this interface's scanned BSSIDs */ 519 reply = wpas_dispatch_bssid_method(message, wpa_s, bssid); 520 } else if (!strcmp(msg_interface, WPAS_DBUS_IFACE_INTERFACE)) { 521 /* A method for an interface only. */ 522 if (!strcmp(method, "scan")) 523 reply = wpas_dbus_iface_scan(message, wpa_s); 524 else if (!strcmp(method, "scanResults")) 525 reply = wpas_dbus_iface_scan_results(message, wpa_s); 526 else if (!strcmp(method, "addNetwork")) 527 reply = wpas_dbus_iface_add_network(message, wpa_s); 528 else if (!strcmp(method, "removeNetwork")) 529 reply = wpas_dbus_iface_remove_network(message, wpa_s); 530 else if (!strcmp(method, "selectNetwork")) 531 reply = wpas_dbus_iface_select_network(message, wpa_s); 532 else if (!strcmp(method, "capabilities")) 533 reply = wpas_dbus_iface_capabilities(message, wpa_s); 534 else if (!strcmp(method, "disconnect")) 535 reply = wpas_dbus_iface_disconnect(message, wpa_s); 536 else if (!strcmp(method, "setAPScan")) 537 reply = wpas_dbus_iface_set_ap_scan(message, wpa_s); 538 else if (!strcmp(method, "setSmartcardModules")) 539 reply = wpas_dbus_iface_set_smartcard_modules(message, 540 wpa_s); 541 else if (!strcmp(method, "state")) 542 reply = wpas_dbus_iface_get_state(message, wpa_s); 543 else if (!strcmp(method, "scanning")) 544 reply = wpas_dbus_iface_get_scanning(message, wpa_s); 545 else if (!strcmp(method, "setBlobs")) 546 reply = wpas_dbus_iface_set_blobs(message, wpa_s); 547 else if (!strcmp(method, "removeBlobs")) 548 reply = wpas_dbus_iface_remove_blobs(message, wpa_s); 549 } 550 551 /* If the message was handled, send back the reply */ 552 if (reply) { 553 if (!dbus_message_get_no_reply(message)) 554 dbus_connection_send(connection, reply, NULL); 555 dbus_message_unref(reply); 556 } 557 558 out: 559 free(iface_obj_path); 560 free(network); 561 free(bssid); 562 return reply ? DBUS_HANDLER_RESULT_HANDLED : 563 DBUS_HANDLER_RESULT_NOT_YET_HANDLED; 564 } 565 566 567 /** 568 * wpas_message_handler - dispatch incoming dbus messages 569 * @connection: connection to the system message bus 570 * @message: an incoming dbus message 571 * @user_data: a pointer to a dbus control interface data structure 572 * Returns: whether or not the message was handled 573 * 574 * This function dispatches all incoming dbus messages to the correct 575 * handlers, depending on what the message's target object path is, 576 * and what the method call is. 577 */ 578 static DBusHandlerResult wpas_message_handler(DBusConnection *connection, 579 DBusMessage *message, void *user_data) 580 { 581 struct ctrl_iface_dbus_priv *ctrl_iface = user_data; 582 const char *method; 583 const char *path; 584 const char *msg_interface; 585 DBusMessage *reply = NULL; 586 587 method = dbus_message_get_member(message); 588 path = dbus_message_get_path(message); 589 msg_interface = dbus_message_get_interface(message); 590 if (!method || !path || !ctrl_iface || !msg_interface) 591 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED; 592 593 /* Validate the method interface */ 594 if (strcmp(msg_interface, WPAS_DBUS_INTERFACE) != 0) 595 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED; 596 597 if (!strcmp(path, WPAS_DBUS_PATH)) { 598 /* dispatch methods against our global dbus interface here */ 599 if (!strcmp(method, "addInterface")) { 600 reply = wpas_dbus_global_add_interface( 601 message, ctrl_iface->global); 602 } else if (!strcmp(method, "removeInterface")) { 603 reply = wpas_dbus_global_remove_interface( 604 message, ctrl_iface->global); 605 } else if (!strcmp(method, "getInterface")) { 606 reply = wpas_dbus_global_get_interface( 607 message, ctrl_iface->global); 608 } else if (!strcmp(method, "setDebugParams")) { 609 reply = wpas_dbus_global_set_debugparams( 610 message, ctrl_iface->global); 611 } 612 } 613 614 /* If the message was handled, send back the reply */ 615 if (reply) { 616 if (!dbus_message_get_no_reply(message)) 617 dbus_connection_send(connection, reply, NULL); 618 dbus_message_unref(reply); 619 } 620 621 return reply ? DBUS_HANDLER_RESULT_HANDLED : 622 DBUS_HANDLER_RESULT_NOT_YET_HANDLED; 623 } 624 625 626 /** 627 * wpa_supplicant_dbus_notify_scan_results - Send a scan results signal 628 * @wpa_s: %wpa_supplicant network interface data 629 * Returns: 0 on success, -1 on failure 630 * 631 * Notify listeners that this interface has updated scan results. 632 */ 633 void wpa_supplicant_dbus_notify_scan_results(struct wpa_supplicant *wpa_s) 634 { 635 struct ctrl_iface_dbus_priv *iface = wpa_s->global->dbus_ctrl_iface; 636 DBusMessage *_signal; 637 const char *path; 638 639 /* Do nothing if the control interface is not turned on */ 640 if (iface == NULL) 641 return; 642 643 path = wpa_supplicant_get_dbus_path(wpa_s); 644 if (path == NULL) { 645 perror("wpa_supplicant_dbus_notify_scan_results[dbus]: " 646 "interface didn't have a dbus path"); 647 wpa_printf(MSG_ERROR, 648 "wpa_supplicant_dbus_notify_scan_results[dbus]: " 649 "interface didn't have a dbus path; can't send " 650 "scan result signal."); 651 return; 652 } 653 _signal = dbus_message_new_signal(path, WPAS_DBUS_IFACE_INTERFACE, 654 "ScanResultsAvailable"); 655 if (_signal == NULL) { 656 perror("wpa_supplicant_dbus_notify_scan_results[dbus]: " 657 "couldn't create dbus signal; likely out of memory"); 658 wpa_printf(MSG_ERROR, "dbus control interface: not enough " 659 "memory to send scan results signal."); 660 return; 661 } 662 dbus_connection_send(iface->con, _signal, NULL); 663 dbus_message_unref(_signal); 664 } 665 666 667 /** 668 * wpa_supplicant_dbus_notify_state_change - Send a state change signal 669 * @wpa_s: %wpa_supplicant network interface data 670 * @new_state: new state wpa_supplicant is entering 671 * @old_state: old state wpa_supplicant is leaving 672 * Returns: 0 on success, -1 on failure 673 * 674 * Notify listeners that wpa_supplicant has changed state 675 */ 676 void wpa_supplicant_dbus_notify_state_change(struct wpa_supplicant *wpa_s, 677 wpa_states new_state, 678 wpa_states old_state) 679 { 680 struct ctrl_iface_dbus_priv *iface; 681 DBusMessage *_signal = NULL; 682 const char *path; 683 const char *new_state_str, *old_state_str; 684 685 /* Do nothing if the control interface is not turned on */ 686 if (wpa_s->global == NULL) 687 return; 688 iface = wpa_s->global->dbus_ctrl_iface; 689 if (iface == NULL) 690 return; 691 692 /* Only send signal if state really changed */ 693 if (new_state == old_state) 694 return; 695 696 path = wpa_supplicant_get_dbus_path(wpa_s); 697 if (path == NULL) { 698 perror("wpa_supplicant_dbus_notify_state_change[dbus]: " 699 "interface didn't have a dbus path"); 700 wpa_printf(MSG_ERROR, 701 "wpa_supplicant_dbus_notify_state_change[dbus]: " 702 "interface didn't have a dbus path; can't send " 703 "signal."); 704 return; 705 } 706 _signal = dbus_message_new_signal(path, WPAS_DBUS_IFACE_INTERFACE, 707 "StateChange"); 708 if (_signal == NULL) { 709 perror("wpa_supplicant_dbus_notify_state_change[dbus]: " 710 "couldn't create dbus signal; likely out of memory"); 711 wpa_printf(MSG_ERROR, 712 "wpa_supplicant_dbus_notify_state_change[dbus]: " 713 "couldn't create dbus signal; likely out of " 714 "memory."); 715 return; 716 } 717 718 new_state_str = wpa_supplicant_state_txt(new_state); 719 old_state_str = wpa_supplicant_state_txt(old_state); 720 if (new_state_str == NULL || old_state_str == NULL) { 721 perror("wpa_supplicant_dbus_notify_state_change[dbus]: " 722 "couldn't convert state strings"); 723 wpa_printf(MSG_ERROR, 724 "wpa_supplicant_dbus_notify_state_change[dbus]: " 725 "couldn't convert state strings."); 726 goto out; 727 } 728 729 if (!dbus_message_append_args(_signal, 730 DBUS_TYPE_STRING, &new_state_str, 731 DBUS_TYPE_STRING, &old_state_str, 732 DBUS_TYPE_INVALID)) { 733 perror("wpa_supplicant_dbus_notify_state_change[dbus]: " 734 "not enough memory to construct state change signal."); 735 wpa_printf(MSG_ERROR, 736 "wpa_supplicant_dbus_notify_state_change[dbus]: " 737 "not enough memory to construct state change " 738 "signal."); 739 goto out; 740 } 741 742 dbus_connection_send(iface->con, _signal, NULL); 743 744 out: 745 dbus_message_unref(_signal); 746 } 747 748 749 /** 750 * wpa_supplicant_dbus_notify_scanning - send scanning status 751 * @wpa_s: %wpa_supplicant network interface data 752 * Returns: 0 on success, -1 on failure 753 * 754 * Notify listeners of interface scanning state changes 755 */ 756 void wpa_supplicant_dbus_notify_scanning(struct wpa_supplicant *wpa_s) 757 { 758 struct ctrl_iface_dbus_priv *iface = wpa_s->global->dbus_ctrl_iface; 759 DBusMessage *_signal; 760 const char *path; 761 dbus_bool_t scanning = wpa_s->scanning ? TRUE : FALSE; 762 763 /* Do nothing if the control interface is not turned on */ 764 if (iface == NULL) 765 return; 766 767 path = wpa_supplicant_get_dbus_path(wpa_s); 768 if (path == NULL) { 769 perror("wpa_supplicant_dbus_notify_scanning[dbus]: interface " 770 "didn't have a dbus path"); 771 wpa_printf(MSG_ERROR, 772 "%s[dbus]: interface didn't have a dbus path; " 773 "can't send scanning signal.", __FUNCTION__); 774 return; 775 } 776 _signal = dbus_message_new_signal(path, WPAS_DBUS_IFACE_INTERFACE, 777 "Scanning"); 778 if (_signal == NULL) { 779 perror("wpa_supplicant_dbus_notify_scanning[dbus]: couldn't " 780 "create dbus signal; likely out of memory"); 781 wpa_printf(MSG_ERROR, "%s[dbus]: dbus control interface: not " 782 "enough memory to send scan results signal.", 783 __FUNCTION__); 784 return; 785 } 786 787 if (dbus_message_append_args(_signal, 788 DBUS_TYPE_BOOLEAN, &scanning, 789 DBUS_TYPE_INVALID)) { 790 dbus_connection_send(iface->con, _signal, NULL); 791 } else { 792 perror("wpa_supplicant_dbus_notify_scanning[dbus]: not enough " 793 "memory to construct signal."); 794 wpa_printf(MSG_ERROR, "%s[dbus]: not enough memory to " 795 "construct signal.", __FUNCTION__); 796 } 797 dbus_message_unref(_signal); 798 } 799 800 801 #ifdef CONFIG_WPS 802 void wpa_supplicant_dbus_notify_wps_cred(struct wpa_supplicant *wpa_s, 803 const struct wps_credential *cred) 804 { 805 struct ctrl_iface_dbus_priv *iface; 806 DBusMessage *_signal = NULL; 807 const char *path; 808 809 /* Do nothing if the control interface is not turned on */ 810 if (wpa_s->global == NULL) 811 return; 812 iface = wpa_s->global->dbus_ctrl_iface; 813 if (iface == NULL) 814 return; 815 816 path = wpa_supplicant_get_dbus_path(wpa_s); 817 if (path == NULL) { 818 perror("wpa_supplicant_dbus_notify_wps_cred[dbus]: " 819 "interface didn't have a dbus path"); 820 wpa_printf(MSG_ERROR, 821 "wpa_supplicant_dbus_notify_wps_cred[dbus]: " 822 "interface didn't have a dbus path; can't send " 823 "signal."); 824 return; 825 } 826 _signal = dbus_message_new_signal(path, WPAS_DBUS_IFACE_INTERFACE, 827 "WpsCred"); 828 if (_signal == NULL) { 829 perror("wpa_supplicant_dbus_notify_wps_cred[dbus]: " 830 "couldn't create dbus signal; likely out of memory"); 831 wpa_printf(MSG_ERROR, 832 "wpa_supplicant_dbus_notify_wps_cred[dbus]: " 833 "couldn't create dbus signal; likely out of " 834 "memory."); 835 return; 836 } 837 838 if (!dbus_message_append_args(_signal, 839 DBUS_TYPE_ARRAY, DBUS_TYPE_BYTE, 840 &cred->cred_attr, cred->cred_attr_len, 841 DBUS_TYPE_INVALID)) { 842 perror("wpa_supplicant_dbus_notify_wps_cred[dbus]: " 843 "not enough memory to construct signal."); 844 wpa_printf(MSG_ERROR, 845 "wpa_supplicant_dbus_notify_wps_cred[dbus]: " 846 "not enough memory to construct signal."); 847 goto out; 848 } 849 850 dbus_connection_send(iface->con, _signal, NULL); 851 852 out: 853 dbus_message_unref(_signal); 854 } 855 #else /* CONFIG_WPS */ 856 void wpa_supplicant_dbus_notify_wps_cred(struct wpa_supplicant *wpa_s, 857 const struct wps_credential *cred) 858 { 859 } 860 #endif /* CONFIG_WPS */ 861 862 863 /** 864 * integrate_with_eloop - Register our mainloop integration with dbus 865 * @connection: connection to the system message bus 866 * @iface: a dbus control interface data structure 867 * Returns: 0 on success, -1 on failure 868 * 869 * We register our mainloop integration functions with dbus here. 870 */ 871 static int integrate_with_eloop(DBusConnection *connection, 872 struct ctrl_iface_dbus_priv *iface) 873 { 874 if (!dbus_connection_set_watch_functions(connection, add_watch, 875 remove_watch, watch_toggled, 876 iface, NULL)) { 877 perror("dbus_connection_set_watch_functions[dbus]"); 878 wpa_printf(MSG_ERROR, "Not enough memory to set up dbus."); 879 return -1; 880 } 881 882 if (!dbus_connection_set_timeout_functions(connection, add_timeout, 883 remove_timeout, 884 timeout_toggled, iface, 885 NULL)) { 886 perror("dbus_connection_set_timeout_functions[dbus]"); 887 wpa_printf(MSG_ERROR, "Not enough memory to set up dbus."); 888 return -1; 889 } 890 891 if (connection_setup_wakeup_main(iface) < 0) { 892 perror("connection_setup_wakeup_main[dbus]"); 893 wpa_printf(MSG_ERROR, "Could not setup main wakeup function."); 894 return -1; 895 } 896 897 return 0; 898 } 899 900 901 /** 902 * dispatch_initial_dbus_messages - Dispatch initial dbus messages after 903 * claiming bus name 904 * @eloop_ctx: the DBusConnection to dispatch on 905 * @timeout_ctx: unused 906 * 907 * If clients are quick to notice that wpa_supplicant claimed its bus name, 908 * there may have been messages that came in before initialization was 909 * all finished. Dispatch those here. 910 */ 911 static void dispatch_initial_dbus_messages(void *eloop_ctx, void *timeout_ctx) 912 { 913 DBusConnection *con = eloop_ctx; 914 915 while (dbus_connection_get_dispatch_status(con) == 916 DBUS_DISPATCH_DATA_REMAINS) 917 dbus_connection_dispatch(con); 918 } 919 920 921 /** 922 * wpa_supplicant_dbus_ctrl_iface_init - Initialize dbus control interface 923 * @global: Pointer to global data from wpa_supplicant_init() 924 * Returns: Pointer to dbus_ctrl_iface date or %NULL on failure 925 * 926 * Initialize the dbus control interface and start receiving commands from 927 * external programs over the bus. 928 */ 929 struct ctrl_iface_dbus_priv * 930 wpa_supplicant_dbus_ctrl_iface_init(struct wpa_global *global) 931 { 932 struct ctrl_iface_dbus_priv *iface; 933 DBusError error; 934 int ret = -1; 935 DBusObjectPathVTable wpas_vtable = { 936 NULL, &wpas_message_handler, NULL, NULL, NULL, NULL 937 }; 938 939 iface = os_zalloc(sizeof(struct ctrl_iface_dbus_priv)); 940 if (iface == NULL) 941 return NULL; 942 943 iface->global = global; 944 945 /* Get a reference to the system bus */ 946 dbus_error_init(&error); 947 iface->con = dbus_bus_get(DBUS_BUS_SYSTEM, &error); 948 dbus_error_free(&error); 949 if (!iface->con) { 950 perror("dbus_bus_get[ctrl_iface_dbus]"); 951 wpa_printf(MSG_ERROR, "Could not acquire the system bus."); 952 goto fail; 953 } 954 955 /* Tell dbus about our mainloop integration functions */ 956 if (integrate_with_eloop(iface->con, iface)) 957 goto fail; 958 959 /* Register the message handler for the global dbus interface */ 960 if (!dbus_connection_register_object_path(iface->con, 961 WPAS_DBUS_PATH, &wpas_vtable, 962 iface)) { 963 perror("dbus_connection_register_object_path[dbus]"); 964 wpa_printf(MSG_ERROR, "Could not set up DBus message " 965 "handler."); 966 goto fail; 967 } 968 969 /* Register our service with the message bus */ 970 dbus_error_init(&error); 971 switch (dbus_bus_request_name(iface->con, WPAS_DBUS_SERVICE, 972 0, &error)) { 973 case DBUS_REQUEST_NAME_REPLY_PRIMARY_OWNER: 974 ret = 0; 975 break; 976 case DBUS_REQUEST_NAME_REPLY_EXISTS: 977 case DBUS_REQUEST_NAME_REPLY_IN_QUEUE: 978 case DBUS_REQUEST_NAME_REPLY_ALREADY_OWNER: 979 perror("dbus_bus_request_name[dbus]"); 980 wpa_printf(MSG_ERROR, "Could not request DBus service name: " 981 "already registered."); 982 break; 983 default: 984 perror("dbus_bus_request_name[dbus]"); 985 wpa_printf(MSG_ERROR, "Could not request DBus service name: " 986 "%s %s.", error.name, error.message); 987 break; 988 } 989 dbus_error_free(&error); 990 991 if (ret != 0) 992 goto fail; 993 994 wpa_printf(MSG_DEBUG, "Providing DBus service '" WPAS_DBUS_SERVICE 995 "'."); 996 997 /* 998 * Dispatch initial DBus messages that may have come in since the bus 999 * name was claimed above. Happens when clients are quick to notice the 1000 * wpa_supplicant service. 1001 * 1002 * FIXME: is there a better solution to this problem? 1003 */ 1004 eloop_register_timeout(0, 50, dispatch_initial_dbus_messages, 1005 iface->con, NULL); 1006 1007 return iface; 1008 1009 fail: 1010 wpa_supplicant_dbus_ctrl_iface_deinit(iface); 1011 return NULL; 1012 } 1013 1014 1015 /** 1016 * wpa_supplicant_dbus_ctrl_iface_deinit - Deinitialize dbus ctrl interface 1017 * @iface: Pointer to dbus private data from 1018 * wpa_supplicant_dbus_ctrl_iface_init() 1019 * 1020 * Deinitialize the dbus control interface that was initialized with 1021 * wpa_supplicant_dbus_ctrl_iface_init(). 1022 */ 1023 void wpa_supplicant_dbus_ctrl_iface_deinit(struct ctrl_iface_dbus_priv *iface) 1024 { 1025 if (iface == NULL) 1026 return; 1027 1028 if (iface->con) { 1029 eloop_cancel_timeout(dispatch_initial_dbus_messages, 1030 iface->con, NULL); 1031 dbus_connection_set_watch_functions(iface->con, NULL, NULL, 1032 NULL, NULL, NULL); 1033 dbus_connection_set_timeout_functions(iface->con, NULL, NULL, 1034 NULL, NULL, NULL); 1035 dbus_connection_unref(iface->con); 1036 } 1037 1038 memset(iface, 0, sizeof(struct ctrl_iface_dbus_priv)); 1039 free(iface); 1040 } 1041 1042 1043 /** 1044 * wpas_dbus_register_new_iface - Register a new interface with dbus 1045 * @wpa_s: %wpa_supplicant interface description structure to register 1046 * Returns: 0 on success, -1 on error 1047 * 1048 * Registers a new interface with dbus and assigns it a dbus object path. 1049 */ 1050 int wpas_dbus_register_iface(struct wpa_supplicant *wpa_s) 1051 { 1052 struct ctrl_iface_dbus_priv *ctrl_iface = 1053 wpa_s->global->dbus_ctrl_iface; 1054 DBusConnection * con; 1055 u32 next; 1056 DBusObjectPathVTable vtable = { 1057 NULL, &wpas_iface_message_handler, NULL, NULL, NULL, NULL 1058 }; 1059 char *path; 1060 int ret = -1; 1061 1062 /* Do nothing if the control interface is not turned on */ 1063 if (ctrl_iface == NULL) 1064 return 0; 1065 1066 con = ctrl_iface->con; 1067 next = wpa_supplicant_dbus_next_objid(ctrl_iface); 1068 1069 /* Create and set the interface's object path */ 1070 path = os_zalloc(WPAS_DBUS_OBJECT_PATH_MAX); 1071 if (path == NULL) 1072 return -1; 1073 snprintf(path, WPAS_DBUS_OBJECT_PATH_MAX, 1074 WPAS_DBUS_PATH_INTERFACES "/%u", 1075 next); 1076 if (wpa_supplicant_set_dbus_path(wpa_s, path)) { 1077 wpa_printf(MSG_DEBUG, 1078 "Failed to set dbus path for interface %s", 1079 wpa_s->ifname); 1080 goto out; 1081 } 1082 1083 /* Register the message handler for the interface functions */ 1084 if (!dbus_connection_register_fallback(con, path, &vtable, wpa_s)) { 1085 perror("wpas_dbus_register_iface [dbus]"); 1086 wpa_printf(MSG_ERROR, "Could not set up DBus message " 1087 "handler for interface %s.", wpa_s->ifname); 1088 goto out; 1089 } 1090 ret = 0; 1091 1092 out: 1093 free(path); 1094 return ret; 1095 } 1096 1097 1098 /** 1099 * wpas_dbus_unregister_iface - Unregister an interface from dbus 1100 * @wpa_s: wpa_supplicant interface structure 1101 * Returns: 0 on success, -1 on failure 1102 * 1103 * Unregisters the interface with dbus 1104 */ 1105 int wpas_dbus_unregister_iface(struct wpa_supplicant *wpa_s) 1106 { 1107 struct ctrl_iface_dbus_priv *ctrl_iface; 1108 DBusConnection *con; 1109 const char *path; 1110 1111 /* Do nothing if the control interface is not turned on */ 1112 if (wpa_s == NULL || wpa_s->global == NULL) 1113 return 0; 1114 ctrl_iface = wpa_s->global->dbus_ctrl_iface; 1115 if (ctrl_iface == NULL) 1116 return 0; 1117 1118 con = ctrl_iface->con; 1119 path = wpa_supplicant_get_dbus_path(wpa_s); 1120 1121 if (!dbus_connection_unregister_object_path(con, path)) 1122 return -1; 1123 1124 free(wpa_s->dbus_path); 1125 wpa_s->dbus_path = NULL; 1126 1127 return 0; 1128 } 1129 1130 1131 /** 1132 * wpa_supplicant_get_iface_by_dbus_path - Get a new network interface 1133 * @global: Pointer to global data from wpa_supplicant_init() 1134 * @path: Pointer to a dbus object path representing an interface 1135 * Returns: Pointer to the interface or %NULL if not found 1136 */ 1137 struct wpa_supplicant * wpa_supplicant_get_iface_by_dbus_path( 1138 struct wpa_global *global, const char *path) 1139 { 1140 struct wpa_supplicant *wpa_s; 1141 1142 for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next) { 1143 if (strcmp(wpa_s->dbus_path, path) == 0) 1144 return wpa_s; 1145 } 1146 return NULL; 1147 } 1148 1149 1150 /** 1151 * wpa_supplicant_set_dbus_path - Assign a dbus path to an interface 1152 * @wpa_s: wpa_supplicant interface structure 1153 * @path: dbus path to set on the interface 1154 * Returns: 0 on succes, -1 on error 1155 */ 1156 int wpa_supplicant_set_dbus_path(struct wpa_supplicant *wpa_s, 1157 const char *path) 1158 { 1159 u32 len = strlen (path); 1160 if (len >= WPAS_DBUS_OBJECT_PATH_MAX) 1161 return -1; 1162 if (wpa_s->dbus_path) 1163 return -1; 1164 wpa_s->dbus_path = strdup(path); 1165 return 0; 1166 } 1167 1168 1169 /** 1170 * wpa_supplicant_get_dbus_path - Get an interface's dbus path 1171 * @wpa_s: %wpa_supplicant interface structure 1172 * Returns: Interface's dbus object path, or %NULL on error 1173 */ 1174 const char * wpa_supplicant_get_dbus_path(struct wpa_supplicant *wpa_s) 1175 { 1176 return wpa_s->dbus_path; 1177 } 1178