1 /* 2 * wpa_supplicant - Event notifications 3 * Copyright (c) 2009-2010, Jouni Malinen <j (at) w1.fi> 4 * 5 * This software may be distributed under the terms of the BSD license. 6 * See README for more details. 7 */ 8 9 #include "utils/includes.h" 10 11 #include "utils/common.h" 12 #include "common/wpa_ctrl.h" 13 #include "config.h" 14 #include "wpa_supplicant_i.h" 15 #include "wps_supplicant.h" 16 #include "dbus/dbus_common.h" 17 #include "dbus/dbus_old.h" 18 #include "dbus/dbus_new.h" 19 #include "rsn_supp/wpa.h" 20 #include "driver_i.h" 21 #include "scan.h" 22 #include "p2p_supplicant.h" 23 #include "sme.h" 24 #include "notify.h" 25 26 int wpas_notify_supplicant_initialized(struct wpa_global *global) 27 { 28 #ifdef CONFIG_DBUS 29 if (global->params.dbus_ctrl_interface) { 30 global->dbus = wpas_dbus_init(global); 31 if (global->dbus == NULL) 32 return -1; 33 } 34 #endif /* CONFIG_DBUS */ 35 36 return 0; 37 } 38 39 40 void wpas_notify_supplicant_deinitialized(struct wpa_global *global) 41 { 42 #ifdef CONFIG_DBUS 43 if (global->dbus) 44 wpas_dbus_deinit(global->dbus); 45 #endif /* CONFIG_DBUS */ 46 } 47 48 49 int wpas_notify_iface_added(struct wpa_supplicant *wpa_s) 50 { 51 if (wpas_dbus_register_iface(wpa_s)) 52 return -1; 53 54 if (wpas_dbus_register_interface(wpa_s)) 55 return -1; 56 57 return 0; 58 } 59 60 61 void wpas_notify_iface_removed(struct wpa_supplicant *wpa_s) 62 { 63 /* unregister interface in old DBus ctrl iface */ 64 wpas_dbus_unregister_iface(wpa_s); 65 66 /* unregister interface in new DBus ctrl iface */ 67 wpas_dbus_unregister_interface(wpa_s); 68 } 69 70 71 void wpas_notify_state_changed(struct wpa_supplicant *wpa_s, 72 enum wpa_states new_state, 73 enum wpa_states old_state) 74 { 75 /* notify the old DBus API */ 76 wpa_supplicant_dbus_notify_state_change(wpa_s, new_state, 77 old_state); 78 79 /* notify the new DBus API */ 80 wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_STATE); 81 82 if (new_state == WPA_COMPLETED) 83 wpas_p2p_notif_connected(wpa_s); 84 else if (old_state >= WPA_ASSOCIATED && new_state < WPA_ASSOCIATED) 85 wpas_p2p_notif_disconnected(wpa_s); 86 87 sme_state_changed(wpa_s); 88 89 #ifdef ANDROID 90 wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_STATE_CHANGE 91 "id=%d state=%d BSSID=" MACSTR " SSID=%s", 92 wpa_s->current_ssid ? wpa_s->current_ssid->id : -1, 93 new_state, 94 MAC2STR(wpa_s->bssid), 95 wpa_s->current_ssid && wpa_s->current_ssid->ssid ? 96 wpa_ssid_txt(wpa_s->current_ssid->ssid, 97 wpa_s->current_ssid->ssid_len) : ""); 98 #endif /* ANDROID */ 99 } 100 101 102 void wpas_notify_disconnect_reason(struct wpa_supplicant *wpa_s) 103 { 104 wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_DISCONNECT_REASON); 105 } 106 107 108 void wpas_notify_network_changed(struct wpa_supplicant *wpa_s) 109 { 110 wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_CURRENT_NETWORK); 111 } 112 113 114 void wpas_notify_ap_scan_changed(struct wpa_supplicant *wpa_s) 115 { 116 wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_AP_SCAN); 117 } 118 119 120 void wpas_notify_bssid_changed(struct wpa_supplicant *wpa_s) 121 { 122 wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_CURRENT_BSS); 123 } 124 125 126 void wpas_notify_auth_changed(struct wpa_supplicant *wpa_s) 127 { 128 wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_CURRENT_AUTH_MODE); 129 } 130 131 132 void wpas_notify_network_enabled_changed(struct wpa_supplicant *wpa_s, 133 struct wpa_ssid *ssid) 134 { 135 wpas_dbus_signal_network_enabled_changed(wpa_s, ssid); 136 } 137 138 139 void wpas_notify_network_selected(struct wpa_supplicant *wpa_s, 140 struct wpa_ssid *ssid) 141 { 142 wpas_dbus_signal_network_selected(wpa_s, ssid->id); 143 } 144 145 146 void wpas_notify_network_request(struct wpa_supplicant *wpa_s, 147 struct wpa_ssid *ssid, 148 enum wpa_ctrl_req_type rtype, 149 const char *default_txt) 150 { 151 wpas_dbus_signal_network_request(wpa_s, ssid, rtype, default_txt); 152 } 153 154 155 void wpas_notify_scanning(struct wpa_supplicant *wpa_s) 156 { 157 /* notify the old DBus API */ 158 wpa_supplicant_dbus_notify_scanning(wpa_s); 159 160 /* notify the new DBus API */ 161 wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_SCANNING); 162 } 163 164 165 void wpas_notify_scan_done(struct wpa_supplicant *wpa_s, int success) 166 { 167 wpas_dbus_signal_scan_done(wpa_s, success); 168 } 169 170 171 void wpas_notify_scan_results(struct wpa_supplicant *wpa_s) 172 { 173 /* notify the old DBus API */ 174 wpa_supplicant_dbus_notify_scan_results(wpa_s); 175 176 wpas_wps_notify_scan_results(wpa_s); 177 } 178 179 180 void wpas_notify_wps_credential(struct wpa_supplicant *wpa_s, 181 const struct wps_credential *cred) 182 { 183 #ifdef CONFIG_WPS 184 /* notify the old DBus API */ 185 wpa_supplicant_dbus_notify_wps_cred(wpa_s, cred); 186 /* notify the new DBus API */ 187 wpas_dbus_signal_wps_cred(wpa_s, cred); 188 #endif /* CONFIG_WPS */ 189 } 190 191 192 void wpas_notify_wps_event_m2d(struct wpa_supplicant *wpa_s, 193 struct wps_event_m2d *m2d) 194 { 195 #ifdef CONFIG_WPS 196 wpas_dbus_signal_wps_event_m2d(wpa_s, m2d); 197 #endif /* CONFIG_WPS */ 198 } 199 200 201 void wpas_notify_wps_event_fail(struct wpa_supplicant *wpa_s, 202 struct wps_event_fail *fail) 203 { 204 #ifdef CONFIG_WPS 205 wpas_dbus_signal_wps_event_fail(wpa_s, fail); 206 #endif /* CONFIG_WPS */ 207 } 208 209 210 void wpas_notify_wps_event_success(struct wpa_supplicant *wpa_s) 211 { 212 #ifdef CONFIG_WPS 213 wpas_dbus_signal_wps_event_success(wpa_s); 214 #endif /* CONFIG_WPS */ 215 } 216 217 218 void wpas_notify_network_added(struct wpa_supplicant *wpa_s, 219 struct wpa_ssid *ssid) 220 { 221 /* 222 * Networks objects created during any P2P activities should not be 223 * exposed out. They might/will confuse certain non-P2P aware 224 * applications since these network objects won't behave like 225 * regular ones. 226 */ 227 if (!ssid->p2p_group && wpa_s->global->p2p_group_formation != wpa_s) 228 wpas_dbus_register_network(wpa_s, ssid); 229 } 230 231 232 void wpas_notify_persistent_group_added(struct wpa_supplicant *wpa_s, 233 struct wpa_ssid *ssid) 234 { 235 #ifdef CONFIG_P2P 236 wpas_dbus_register_persistent_group(wpa_s, ssid); 237 #endif /* CONFIG_P2P */ 238 } 239 240 241 void wpas_notify_persistent_group_removed(struct wpa_supplicant *wpa_s, 242 struct wpa_ssid *ssid) 243 { 244 #ifdef CONFIG_P2P 245 wpas_dbus_unregister_persistent_group(wpa_s, ssid->id); 246 #endif /* CONFIG_P2P */ 247 } 248 249 250 void wpas_notify_network_removed(struct wpa_supplicant *wpa_s, 251 struct wpa_ssid *ssid) 252 { 253 if (wpa_s->next_ssid == ssid) 254 wpa_s->next_ssid = NULL; 255 if (wpa_s->wpa) 256 wpa_sm_pmksa_cache_flush(wpa_s->wpa, ssid); 257 if (!ssid->p2p_group && wpa_s->global->p2p_group_formation != wpa_s) 258 wpas_dbus_unregister_network(wpa_s, ssid->id); 259 wpas_p2p_network_removed(wpa_s, ssid); 260 } 261 262 263 void wpas_notify_bss_added(struct wpa_supplicant *wpa_s, 264 u8 bssid[], unsigned int id) 265 { 266 wpas_dbus_register_bss(wpa_s, bssid, id); 267 wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_BSS_ADDED "%u " MACSTR, 268 id, MAC2STR(bssid)); 269 } 270 271 272 void wpas_notify_bss_removed(struct wpa_supplicant *wpa_s, 273 u8 bssid[], unsigned int id) 274 { 275 wpas_dbus_unregister_bss(wpa_s, bssid, id); 276 wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_BSS_REMOVED "%u " MACSTR, 277 id, MAC2STR(bssid)); 278 } 279 280 281 void wpas_notify_bss_freq_changed(struct wpa_supplicant *wpa_s, 282 unsigned int id) 283 { 284 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_FREQ, id); 285 } 286 287 288 void wpas_notify_bss_signal_changed(struct wpa_supplicant *wpa_s, 289 unsigned int id) 290 { 291 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_SIGNAL, 292 id); 293 } 294 295 296 void wpas_notify_bss_privacy_changed(struct wpa_supplicant *wpa_s, 297 unsigned int id) 298 { 299 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_PRIVACY, 300 id); 301 } 302 303 304 void wpas_notify_bss_mode_changed(struct wpa_supplicant *wpa_s, 305 unsigned int id) 306 { 307 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_MODE, id); 308 } 309 310 311 void wpas_notify_bss_wpaie_changed(struct wpa_supplicant *wpa_s, 312 unsigned int id) 313 { 314 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_WPA, id); 315 } 316 317 318 void wpas_notify_bss_rsnie_changed(struct wpa_supplicant *wpa_s, 319 unsigned int id) 320 { 321 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_RSN, id); 322 } 323 324 325 void wpas_notify_bss_wps_changed(struct wpa_supplicant *wpa_s, 326 unsigned int id) 327 { 328 #ifdef CONFIG_WPS 329 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_WPS, id); 330 #endif /* CONFIG_WPS */ 331 } 332 333 334 void wpas_notify_bss_ies_changed(struct wpa_supplicant *wpa_s, 335 unsigned int id) 336 { 337 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_IES, id); 338 } 339 340 341 void wpas_notify_bss_rates_changed(struct wpa_supplicant *wpa_s, 342 unsigned int id) 343 { 344 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_RATES, id); 345 } 346 347 348 void wpas_notify_bss_seen(struct wpa_supplicant *wpa_s, unsigned int id) 349 { 350 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_AGE, id); 351 } 352 353 354 void wpas_notify_blob_added(struct wpa_supplicant *wpa_s, const char *name) 355 { 356 wpas_dbus_signal_blob_added(wpa_s, name); 357 } 358 359 360 void wpas_notify_blob_removed(struct wpa_supplicant *wpa_s, const char *name) 361 { 362 wpas_dbus_signal_blob_removed(wpa_s, name); 363 } 364 365 366 void wpas_notify_debug_level_changed(struct wpa_global *global) 367 { 368 wpas_dbus_signal_debug_level_changed(global); 369 } 370 371 372 void wpas_notify_debug_timestamp_changed(struct wpa_global *global) 373 { 374 wpas_dbus_signal_debug_timestamp_changed(global); 375 } 376 377 378 void wpas_notify_debug_show_keys_changed(struct wpa_global *global) 379 { 380 wpas_dbus_signal_debug_show_keys_changed(global); 381 } 382 383 384 void wpas_notify_suspend(struct wpa_global *global) 385 { 386 struct wpa_supplicant *wpa_s; 387 388 os_get_time(&global->suspend_time); 389 wpa_printf(MSG_DEBUG, "System suspend notification"); 390 for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next) 391 wpa_drv_suspend(wpa_s); 392 } 393 394 395 void wpas_notify_resume(struct wpa_global *global) 396 { 397 struct os_time now; 398 int slept; 399 struct wpa_supplicant *wpa_s; 400 401 if (global->suspend_time.sec == 0) 402 slept = -1; 403 else { 404 os_get_time(&now); 405 slept = now.sec - global->suspend_time.sec; 406 } 407 wpa_printf(MSG_DEBUG, "System resume notification (slept %d seconds)", 408 slept); 409 410 for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next) { 411 wpa_drv_resume(wpa_s); 412 if (wpa_s->wpa_state == WPA_DISCONNECTED) 413 wpa_supplicant_req_scan(wpa_s, 0, 100000); 414 } 415 } 416 417 418 #ifdef CONFIG_P2P 419 420 void wpas_notify_p2p_device_found(struct wpa_supplicant *wpa_s, 421 const u8 *dev_addr, int new_device) 422 { 423 if (new_device) { 424 /* Create the new peer object */ 425 wpas_dbus_register_peer(wpa_s, dev_addr); 426 } 427 428 /* Notify a new peer has been detected*/ 429 wpas_dbus_signal_peer_device_found(wpa_s, dev_addr); 430 } 431 432 433 void wpas_notify_p2p_device_lost(struct wpa_supplicant *wpa_s, 434 const u8 *dev_addr) 435 { 436 wpas_dbus_unregister_peer(wpa_s, dev_addr); 437 438 /* Create signal on interface object*/ 439 wpas_dbus_signal_peer_device_lost(wpa_s, dev_addr); 440 } 441 442 443 void wpas_notify_p2p_group_removed(struct wpa_supplicant *wpa_s, 444 const struct wpa_ssid *ssid, 445 const char *role) 446 { 447 wpas_dbus_signal_p2p_group_removed(wpa_s, role); 448 449 wpas_dbus_unregister_p2p_group(wpa_s, ssid); 450 } 451 452 453 void wpas_notify_p2p_go_neg_req(struct wpa_supplicant *wpa_s, 454 const u8 *src, u16 dev_passwd_id) 455 { 456 wpas_dbus_signal_p2p_go_neg_req(wpa_s, src, dev_passwd_id); 457 } 458 459 460 void wpas_notify_p2p_go_neg_completed(struct wpa_supplicant *wpa_s, 461 struct p2p_go_neg_results *res) 462 { 463 wpas_dbus_signal_p2p_go_neg_resp(wpa_s, res); 464 } 465 466 467 void wpas_notify_p2p_invitation_result(struct wpa_supplicant *wpa_s, 468 int status, const u8 *bssid) 469 { 470 wpas_dbus_signal_p2p_invitation_result(wpa_s, status, bssid); 471 } 472 473 474 void wpas_notify_p2p_sd_request(struct wpa_supplicant *wpa_s, 475 int freq, const u8 *sa, u8 dialog_token, 476 u16 update_indic, const u8 *tlvs, 477 size_t tlvs_len) 478 { 479 wpas_dbus_signal_p2p_sd_request(wpa_s, freq, sa, dialog_token, 480 update_indic, tlvs, tlvs_len); 481 } 482 483 484 void wpas_notify_p2p_sd_response(struct wpa_supplicant *wpa_s, 485 const u8 *sa, u16 update_indic, 486 const u8 *tlvs, size_t tlvs_len) 487 { 488 wpas_dbus_signal_p2p_sd_response(wpa_s, sa, update_indic, 489 tlvs, tlvs_len); 490 } 491 492 493 /** 494 * wpas_notify_p2p_provision_discovery - Notification of provision discovery 495 * @dev_addr: Who sent the request or responded to our request. 496 * @request: Will be 1 if request, 0 for response. 497 * @status: Valid only in case of response (0 in case of success) 498 * @config_methods: WPS config methods 499 * @generated_pin: PIN to be displayed in case of WPS_CONFIG_DISPLAY method 500 * 501 * This can be used to notify: 502 * - Requests or responses 503 * - Various config methods 504 * - Failure condition in case of response 505 */ 506 void wpas_notify_p2p_provision_discovery(struct wpa_supplicant *wpa_s, 507 const u8 *dev_addr, int request, 508 enum p2p_prov_disc_status status, 509 u16 config_methods, 510 unsigned int generated_pin) 511 { 512 wpas_dbus_signal_p2p_provision_discovery(wpa_s, dev_addr, request, 513 status, config_methods, 514 generated_pin); 515 } 516 517 518 void wpas_notify_p2p_group_started(struct wpa_supplicant *wpa_s, 519 struct wpa_ssid *ssid, int network_id, 520 int client) 521 { 522 /* Notify a group has been started */ 523 wpas_dbus_register_p2p_group(wpa_s, ssid); 524 525 wpas_dbus_signal_p2p_group_started(wpa_s, ssid, client, network_id); 526 } 527 528 529 void wpas_notify_p2p_wps_failed(struct wpa_supplicant *wpa_s, 530 struct wps_event_fail *fail) 531 { 532 wpas_dbus_signal_p2p_wps_failed(wpa_s, fail); 533 } 534 535 #endif /* CONFIG_P2P */ 536 537 538 static void wpas_notify_ap_sta_authorized(struct wpa_supplicant *wpa_s, 539 const u8 *sta, 540 const u8 *p2p_dev_addr) 541 { 542 #ifdef CONFIG_P2P 543 wpas_p2p_notify_ap_sta_authorized(wpa_s, p2p_dev_addr); 544 545 /* 546 * Create 'peer-joined' signal on group object -- will also 547 * check P2P itself. 548 */ 549 wpas_dbus_signal_p2p_peer_joined(wpa_s, p2p_dev_addr); 550 #endif /* CONFIG_P2P */ 551 552 /* Notify listeners a new station has been authorized */ 553 wpas_dbus_signal_sta_authorized(wpa_s, sta); 554 } 555 556 557 static void wpas_notify_ap_sta_deauthorized(struct wpa_supplicant *wpa_s, 558 const u8 *sta, 559 const u8 *p2p_dev_addr) 560 { 561 #ifdef CONFIG_P2P 562 /* 563 * Create 'peer-disconnected' signal on group object if this 564 * is a P2P group. 565 */ 566 wpas_dbus_signal_p2p_peer_disconnected(wpa_s, p2p_dev_addr); 567 #endif /* CONFIG_P2P */ 568 569 /* Notify listeners a station has been deauthorized */ 570 wpas_dbus_signal_sta_deauthorized(wpa_s, sta); 571 } 572 573 574 void wpas_notify_sta_authorized(struct wpa_supplicant *wpa_s, 575 const u8 *mac_addr, int authorized, 576 const u8 *p2p_dev_addr) 577 { 578 if (authorized) 579 wpas_notify_ap_sta_authorized(wpa_s, mac_addr, p2p_dev_addr); 580 else 581 wpas_notify_ap_sta_deauthorized(wpa_s, mac_addr, p2p_dev_addr); 582 } 583 584 585 void wpas_notify_certification(struct wpa_supplicant *wpa_s, int depth, 586 const char *subject, const char *cert_hash, 587 const struct wpabuf *cert) 588 { 589 wpa_msg(wpa_s, MSG_INFO, WPA_EVENT_EAP_PEER_CERT 590 "depth=%d subject='%s'%s%s", 591 depth, subject, 592 cert_hash ? " hash=" : "", 593 cert_hash ? cert_hash : ""); 594 595 if (cert) { 596 char *cert_hex; 597 size_t len = wpabuf_len(cert) * 2 + 1; 598 cert_hex = os_malloc(len); 599 if (cert_hex) { 600 wpa_snprintf_hex(cert_hex, len, wpabuf_head(cert), 601 wpabuf_len(cert)); 602 wpa_msg_ctrl(wpa_s, MSG_INFO, 603 WPA_EVENT_EAP_PEER_CERT 604 "depth=%d subject='%s' cert=%s", 605 depth, subject, cert_hex); 606 os_free(cert_hex); 607 } 608 } 609 610 /* notify the old DBus API */ 611 wpa_supplicant_dbus_notify_certification(wpa_s, depth, subject, 612 cert_hash, cert); 613 /* notify the new DBus API */ 614 wpas_dbus_signal_certification(wpa_s, depth, subject, cert_hash, cert); 615 } 616 617 618 void wpas_notify_preq(struct wpa_supplicant *wpa_s, 619 const u8 *addr, const u8 *dst, const u8 *bssid, 620 const u8 *ie, size_t ie_len, u32 ssi_signal) 621 { 622 #ifdef CONFIG_AP 623 wpas_dbus_signal_preq(wpa_s, addr, dst, bssid, ie, ie_len, ssi_signal); 624 #endif /* CONFIG_AP */ 625 } 626 627 628 void wpas_notify_eap_status(struct wpa_supplicant *wpa_s, const char *status, 629 const char *parameter) 630 { 631 wpas_dbus_signal_eap_status(wpa_s, status, parameter); 632 wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_EAP_STATUS 633 "status='%s' parameter='%s'", 634 status, parameter); 635 } 636 637 638 void wpas_notify_network_bssid_set_changed(struct wpa_supplicant *wpa_s, 639 struct wpa_ssid *ssid) 640 { 641 if (wpa_s->current_ssid != ssid) 642 return; 643 644 wpa_dbg(wpa_s, MSG_DEBUG, 645 "Network bssid config changed for the current network - within-ESS roaming %s", 646 ssid->bssid_set ? "disabled" : "enabled"); 647 648 wpa_drv_roaming(wpa_s, !ssid->bssid_set, 649 ssid->bssid_set ? ssid->bssid : NULL); 650 } 651