1 /* 2 * wpa_supplicant - Event notifications 3 * Copyright (c) 2009-2010, Jouni Malinen <j@w1.fi> 4 * 5 * This program is free software; you can redistribute it and/or modify 6 * it under the terms of the GNU General Public License version 2 as 7 * published by the Free Software Foundation. 8 * 9 * Alternatively, this software may be distributed under the terms of BSD 10 * license. 11 * 12 * See README and COPYING for more details. 13 */ 14 15 #include "utils/includes.h" 16 17 #include "utils/common.h" 18 #include "common/wpa_ctrl.h" 19 #include "config.h" 20 #include "wpa_supplicant_i.h" 21 #include "wps_supplicant.h" 22 #include "dbus/dbus_common.h" 23 #include "dbus/dbus_old.h" 24 #include "dbus/dbus_new.h" 25 #include "rsn_supp/wpa.h" 26 #include "driver_i.h" 27 #include "scan.h" 28 #include "p2p_supplicant.h" 29 #include "sme.h" 30 #include "notify.h" 31 32 int wpas_notify_supplicant_initialized(struct wpa_global *global) 33 { 34 #ifdef CONFIG_DBUS 35 if (global->params.dbus_ctrl_interface) { 36 global->dbus = wpas_dbus_init(global); 37 if (global->dbus == NULL) 38 return -1; 39 } 40 #endif /* CONFIG_DBUS */ 41 42 return 0; 43 } 44 45 46 void wpas_notify_supplicant_deinitialized(struct wpa_global *global) 47 { 48 #ifdef CONFIG_DBUS 49 if (global->dbus) 50 wpas_dbus_deinit(global->dbus); 51 #endif /* CONFIG_DBUS */ 52 } 53 54 55 int wpas_notify_iface_added(struct wpa_supplicant *wpa_s) 56 { 57 if (wpas_dbus_register_iface(wpa_s)) 58 return -1; 59 60 if (wpas_dbus_register_interface(wpa_s)) 61 return -1; 62 63 return 0; 64 } 65 66 67 void wpas_notify_iface_removed(struct wpa_supplicant *wpa_s) 68 { 69 /* unregister interface in old DBus ctrl iface */ 70 wpas_dbus_unregister_iface(wpa_s); 71 72 /* unregister interface in new DBus ctrl iface */ 73 wpas_dbus_unregister_interface(wpa_s); 74 } 75 76 77 void wpas_notify_state_changed(struct wpa_supplicant *wpa_s, 78 enum wpa_states new_state, 79 enum wpa_states old_state) 80 { 81 /* notify the old DBus API */ 82 wpa_supplicant_dbus_notify_state_change(wpa_s, new_state, 83 old_state); 84 85 /* notify the new DBus API */ 86 wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_STATE); 87 88 #ifdef CONFIG_P2P 89 if (new_state == WPA_COMPLETED) 90 wpas_p2p_notif_connected(wpa_s); 91 else if (old_state >= WPA_ASSOCIATED && new_state < WPA_ASSOCIATED) 92 wpas_p2p_notif_disconnected(wpa_s); 93 #endif /* CONFIG_P2P */ 94 95 sme_state_changed(wpa_s); 96 97 #ifdef ANDROID 98 wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_STATE_CHANGE 99 "id=%d state=%d BSSID=" MACSTR, 100 wpa_s->current_ssid ? wpa_s->current_ssid->id : -1, 101 new_state, MAC2STR(wpa_s->pending_bssid)); 102 #endif /* ANDROID */ 103 } 104 105 106 void wpas_notify_network_changed(struct wpa_supplicant *wpa_s) 107 { 108 wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_CURRENT_NETWORK); 109 } 110 111 112 void wpas_notify_ap_scan_changed(struct wpa_supplicant *wpa_s) 113 { 114 wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_AP_SCAN); 115 } 116 117 118 void wpas_notify_bssid_changed(struct wpa_supplicant *wpa_s) 119 { 120 wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_CURRENT_BSS); 121 } 122 123 124 void wpas_notify_auth_changed(struct wpa_supplicant *wpa_s) 125 { 126 wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_CURRENT_AUTH_MODE); 127 } 128 129 130 void wpas_notify_network_enabled_changed(struct wpa_supplicant *wpa_s, 131 struct wpa_ssid *ssid) 132 { 133 wpas_dbus_signal_network_enabled_changed(wpa_s, ssid); 134 } 135 136 137 void wpas_notify_network_selected(struct wpa_supplicant *wpa_s, 138 struct wpa_ssid *ssid) 139 { 140 wpas_dbus_signal_network_selected(wpa_s, ssid->id); 141 } 142 143 144 void wpas_notify_network_request(struct wpa_supplicant *wpa_s, 145 struct wpa_ssid *ssid, 146 enum wpa_ctrl_req_type rtype, 147 const char *default_txt) 148 { 149 wpas_dbus_signal_network_request(wpa_s, ssid, rtype, default_txt); 150 } 151 152 153 void wpas_notify_scanning(struct wpa_supplicant *wpa_s) 154 { 155 /* notify the old DBus API */ 156 wpa_supplicant_dbus_notify_scanning(wpa_s); 157 158 /* notify the new DBus API */ 159 wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_SCANNING); 160 } 161 162 163 void wpas_notify_scan_done(struct wpa_supplicant *wpa_s, int success) 164 { 165 wpas_dbus_signal_scan_done(wpa_s, success); 166 } 167 168 169 void wpas_notify_scan_results(struct wpa_supplicant *wpa_s) 170 { 171 /* notify the old DBus API */ 172 wpa_supplicant_dbus_notify_scan_results(wpa_s); 173 174 wpas_wps_notify_scan_results(wpa_s); 175 } 176 177 178 void wpas_notify_wps_credential(struct wpa_supplicant *wpa_s, 179 const struct wps_credential *cred) 180 { 181 #ifdef CONFIG_WPS 182 /* notify the old DBus API */ 183 wpa_supplicant_dbus_notify_wps_cred(wpa_s, cred); 184 /* notify the new DBus API */ 185 wpas_dbus_signal_wps_cred(wpa_s, cred); 186 #endif /* CONFIG_WPS */ 187 } 188 189 190 void wpas_notify_wps_event_m2d(struct wpa_supplicant *wpa_s, 191 struct wps_event_m2d *m2d) 192 { 193 #ifdef CONFIG_WPS 194 wpas_dbus_signal_wps_event_m2d(wpa_s, m2d); 195 #endif /* CONFIG_WPS */ 196 } 197 198 199 void wpas_notify_wps_event_fail(struct wpa_supplicant *wpa_s, 200 struct wps_event_fail *fail) 201 { 202 #ifdef CONFIG_WPS 203 wpas_dbus_signal_wps_event_fail(wpa_s, fail); 204 #endif /* CONFIG_WPS */ 205 } 206 207 208 void wpas_notify_wps_event_success(struct wpa_supplicant *wpa_s) 209 { 210 #ifdef CONFIG_WPS 211 wpas_dbus_signal_wps_event_success(wpa_s); 212 #endif /* CONFIG_WPS */ 213 } 214 215 216 void wpas_notify_network_added(struct wpa_supplicant *wpa_s, 217 struct wpa_ssid *ssid) 218 { 219 /* 220 * Networks objects created during any P2P activities should not be 221 * exposed out. They might/will confuse certain non-P2P aware 222 * applications since these network objects won't behave like 223 * regular ones. 224 */ 225 if (wpa_s->global->p2p_group_formation != wpa_s) 226 wpas_dbus_register_network(wpa_s, ssid); 227 } 228 229 230 void wpas_notify_persistent_group_added(struct wpa_supplicant *wpa_s, 231 struct wpa_ssid *ssid) 232 { 233 #ifdef CONFIG_P2P 234 wpas_dbus_register_persistent_group(wpa_s, ssid); 235 #endif /* CONFIG_P2P */ 236 } 237 238 239 void wpas_notify_persistent_group_removed(struct wpa_supplicant *wpa_s, 240 struct wpa_ssid *ssid) 241 { 242 #ifdef CONFIG_P2P 243 wpas_dbus_unregister_persistent_group(wpa_s, ssid->id); 244 #endif /* CONFIG_P2P */ 245 } 246 247 248 void wpas_notify_network_removed(struct wpa_supplicant *wpa_s, 249 struct wpa_ssid *ssid) 250 { 251 if (wpa_s->wpa) 252 wpa_sm_pmksa_cache_flush(wpa_s->wpa, ssid); 253 if (wpa_s->global->p2p_group_formation != wpa_s) 254 wpas_dbus_unregister_network(wpa_s, ssid->id); 255 #ifdef CONFIG_P2P 256 wpas_p2p_network_removed(wpa_s, ssid); 257 #endif /* CONFIG_P2P */ 258 } 259 260 261 void wpas_notify_bss_added(struct wpa_supplicant *wpa_s, 262 u8 bssid[], unsigned int id) 263 { 264 wpas_dbus_register_bss(wpa_s, bssid, id); 265 wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_BSS_ADDED "%u " MACSTR, 266 id, MAC2STR(bssid)); 267 } 268 269 270 void wpas_notify_bss_removed(struct wpa_supplicant *wpa_s, 271 u8 bssid[], unsigned int id) 272 { 273 wpas_dbus_unregister_bss(wpa_s, bssid, id); 274 wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_BSS_REMOVED "%u " MACSTR, 275 id, MAC2STR(bssid)); 276 } 277 278 279 void wpas_notify_bss_freq_changed(struct wpa_supplicant *wpa_s, 280 unsigned int id) 281 { 282 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_FREQ, id); 283 } 284 285 286 void wpas_notify_bss_signal_changed(struct wpa_supplicant *wpa_s, 287 unsigned int id) 288 { 289 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_SIGNAL, 290 id); 291 } 292 293 294 void wpas_notify_bss_privacy_changed(struct wpa_supplicant *wpa_s, 295 unsigned int id) 296 { 297 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_PRIVACY, 298 id); 299 } 300 301 302 void wpas_notify_bss_mode_changed(struct wpa_supplicant *wpa_s, 303 unsigned int id) 304 { 305 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_MODE, id); 306 } 307 308 309 void wpas_notify_bss_wpaie_changed(struct wpa_supplicant *wpa_s, 310 unsigned int id) 311 { 312 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_WPA, id); 313 } 314 315 316 void wpas_notify_bss_rsnie_changed(struct wpa_supplicant *wpa_s, 317 unsigned int id) 318 { 319 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_RSN, id); 320 } 321 322 323 void wpas_notify_bss_wps_changed(struct wpa_supplicant *wpa_s, 324 unsigned int id) 325 { 326 } 327 328 329 void wpas_notify_bss_ies_changed(struct wpa_supplicant *wpa_s, 330 unsigned int id) 331 { 332 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_IES, id); 333 } 334 335 336 void wpas_notify_bss_rates_changed(struct wpa_supplicant *wpa_s, 337 unsigned int id) 338 { 339 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_RATES, id); 340 } 341 342 343 void wpas_notify_blob_added(struct wpa_supplicant *wpa_s, const char *name) 344 { 345 wpas_dbus_signal_blob_added(wpa_s, name); 346 } 347 348 349 void wpas_notify_blob_removed(struct wpa_supplicant *wpa_s, const char *name) 350 { 351 wpas_dbus_signal_blob_removed(wpa_s, name); 352 } 353 354 355 void wpas_notify_debug_level_changed(struct wpa_global *global) 356 { 357 wpas_dbus_signal_debug_level_changed(global); 358 } 359 360 361 void wpas_notify_debug_timestamp_changed(struct wpa_global *global) 362 { 363 wpas_dbus_signal_debug_timestamp_changed(global); 364 } 365 366 367 void wpas_notify_debug_show_keys_changed(struct wpa_global *global) 368 { 369 wpas_dbus_signal_debug_show_keys_changed(global); 370 } 371 372 373 void wpas_notify_suspend(struct wpa_global *global) 374 { 375 struct wpa_supplicant *wpa_s; 376 377 os_get_time(&global->suspend_time); 378 wpa_printf(MSG_DEBUG, "System suspend notification"); 379 for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next) 380 wpa_drv_suspend(wpa_s); 381 } 382 383 384 void wpas_notify_resume(struct wpa_global *global) 385 { 386 struct os_time now; 387 int slept; 388 struct wpa_supplicant *wpa_s; 389 390 if (global->suspend_time.sec == 0) 391 slept = -1; 392 else { 393 os_get_time(&now); 394 slept = now.sec - global->suspend_time.sec; 395 } 396 wpa_printf(MSG_DEBUG, "System resume notification (slept %d seconds)", 397 slept); 398 399 for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next) { 400 wpa_drv_resume(wpa_s); 401 if (wpa_s->wpa_state == WPA_DISCONNECTED) 402 wpa_supplicant_req_scan(wpa_s, 0, 100000); 403 } 404 } 405 406 407 #ifdef CONFIG_P2P 408 409 void wpas_notify_p2p_device_found(struct wpa_supplicant *wpa_s, 410 const u8 *dev_addr, int new_device) 411 { 412 if (new_device) { 413 /* Create the new peer object */ 414 wpas_dbus_register_peer(wpa_s, dev_addr); 415 } 416 417 /* Notify a new peer has been detected*/ 418 wpas_dbus_signal_peer_device_found(wpa_s, dev_addr); 419 } 420 421 422 void wpas_notify_p2p_device_lost(struct wpa_supplicant *wpa_s, 423 const u8 *dev_addr) 424 { 425 wpas_dbus_unregister_peer(wpa_s, dev_addr); 426 427 /* Create signal on interface object*/ 428 wpas_dbus_signal_peer_device_lost(wpa_s, dev_addr); 429 } 430 431 432 void wpas_notify_p2p_group_removed(struct wpa_supplicant *wpa_s, 433 const struct wpa_ssid *ssid, 434 const char *role) 435 { 436 wpas_dbus_unregister_p2p_group(wpa_s, ssid); 437 438 wpas_dbus_signal_p2p_group_removed(wpa_s, role); 439 } 440 441 442 void wpas_notify_p2p_go_neg_req(struct wpa_supplicant *wpa_s, 443 const u8 *src, u16 dev_passwd_id) 444 { 445 wpas_dbus_signal_p2p_go_neg_req(wpa_s, src, dev_passwd_id); 446 } 447 448 449 void wpas_notify_p2p_go_neg_completed(struct wpa_supplicant *wpa_s, 450 struct p2p_go_neg_results *res) 451 { 452 wpas_dbus_signal_p2p_go_neg_resp(wpa_s, res); 453 } 454 455 456 void wpas_notify_p2p_invitation_result(struct wpa_supplicant *wpa_s, 457 int status, const u8 *bssid) 458 { 459 wpas_dbus_signal_p2p_invitation_result(wpa_s, status, bssid); 460 } 461 462 463 void wpas_notify_p2p_sd_request(struct wpa_supplicant *wpa_s, 464 int freq, const u8 *sa, u8 dialog_token, 465 u16 update_indic, const u8 *tlvs, 466 size_t tlvs_len) 467 { 468 wpas_dbus_signal_p2p_sd_request(wpa_s, freq, sa, dialog_token, 469 update_indic, tlvs, tlvs_len); 470 } 471 472 473 void wpas_notify_p2p_sd_response(struct wpa_supplicant *wpa_s, 474 const u8 *sa, u16 update_indic, 475 const u8 *tlvs, size_t tlvs_len) 476 { 477 wpas_dbus_signal_p2p_sd_response(wpa_s, sa, update_indic, 478 tlvs, tlvs_len); 479 } 480 481 482 /** 483 * wpas_notify_p2p_provision_discovery - Notification of provision discovery 484 * @dev_addr: Who sent the request or responded to our request. 485 * @request: Will be 1 if request, 0 for response. 486 * @status: Valid only in case of response (0 in case of success) 487 * @config_methods: WPS config methods 488 * @generated_pin: PIN to be displayed in case of WPS_CONFIG_DISPLAY method 489 * 490 * This can be used to notify: 491 * - Requests or responses 492 * - Various config methods 493 * - Failure condition in case of response 494 */ 495 void wpas_notify_p2p_provision_discovery(struct wpa_supplicant *wpa_s, 496 const u8 *dev_addr, int request, 497 enum p2p_prov_disc_status status, 498 u16 config_methods, 499 unsigned int generated_pin) 500 { 501 wpas_dbus_signal_p2p_provision_discovery(wpa_s, dev_addr, request, 502 status, config_methods, 503 generated_pin); 504 } 505 506 507 void wpas_notify_p2p_group_started(struct wpa_supplicant *wpa_s, 508 struct wpa_ssid *ssid, int network_id, 509 int client) 510 { 511 /* Notify a group has been started */ 512 wpas_dbus_register_p2p_group(wpa_s, ssid); 513 514 wpas_dbus_signal_p2p_group_started(wpa_s, ssid, client, network_id); 515 } 516 517 518 void wpas_notify_p2p_wps_failed(struct wpa_supplicant *wpa_s, 519 struct wps_event_fail *fail) 520 { 521 wpas_dbus_signal_p2p_wps_failed(wpa_s, fail); 522 } 523 524 #endif /* CONFIG_P2P */ 525 526 527 static void wpas_notify_ap_sta_authorized(struct wpa_supplicant *wpa_s, 528 const u8 *sta, 529 const u8 *p2p_dev_addr) 530 { 531 #ifdef CONFIG_P2P 532 wpas_p2p_notify_ap_sta_authorized(wpa_s, p2p_dev_addr); 533 534 /* 535 * Register a group member object corresponding to this peer and 536 * emit a PeerJoined signal. This will check if it really is a 537 * P2P group. 538 */ 539 wpas_dbus_register_p2p_groupmember(wpa_s, sta); 540 541 /* 542 * Create 'peer-joined' signal on group object -- will also 543 * check P2P itself. 544 */ 545 wpas_dbus_signal_p2p_peer_joined(wpa_s, sta); 546 #endif /* CONFIG_P2P */ 547 } 548 549 550 static void wpas_notify_ap_sta_deauthorized(struct wpa_supplicant *wpa_s, 551 const u8 *sta) 552 { 553 #ifdef CONFIG_P2P 554 /* 555 * Unregister a group member object corresponding to this peer 556 * if this is a P2P group. 557 */ 558 wpas_dbus_unregister_p2p_groupmember(wpa_s, sta); 559 560 /* 561 * Create 'peer-disconnected' signal on group object if this 562 * is a P2P group. 563 */ 564 wpas_dbus_signal_p2p_peer_disconnected(wpa_s, sta); 565 #endif /* CONFIG_P2P */ 566 } 567 568 569 void wpas_notify_sta_authorized(struct wpa_supplicant *wpa_s, 570 const u8 *mac_addr, int authorized, 571 const u8 *p2p_dev_addr) 572 { 573 if (authorized) 574 wpas_notify_ap_sta_authorized(wpa_s, mac_addr, p2p_dev_addr); 575 else 576 wpas_notify_ap_sta_deauthorized(wpa_s, mac_addr); 577 } 578 579 580 void wpas_notify_certification(struct wpa_supplicant *wpa_s, int depth, 581 const char *subject, const char *cert_hash, 582 const struct wpabuf *cert) 583 { 584 wpa_msg(wpa_s, MSG_INFO, WPA_EVENT_EAP_PEER_CERT 585 "depth=%d subject='%s'%s%s", 586 depth, subject, 587 cert_hash ? " hash=" : "", 588 cert_hash ? cert_hash : ""); 589 590 if (cert) { 591 char *cert_hex; 592 size_t len = wpabuf_len(cert) * 2 + 1; 593 cert_hex = os_malloc(len); 594 if (cert_hex) { 595 wpa_snprintf_hex(cert_hex, len, wpabuf_head(cert), 596 wpabuf_len(cert)); 597 wpa_msg_ctrl(wpa_s, MSG_INFO, 598 WPA_EVENT_EAP_PEER_CERT 599 "depth=%d subject='%s' cert=%s", 600 depth, subject, cert_hex); 601 os_free(cert_hex); 602 } 603 } 604 605 /* notify the old DBus API */ 606 wpa_supplicant_dbus_notify_certification(wpa_s, depth, subject, 607 cert_hash, cert); 608 /* notify the new DBus API */ 609 wpas_dbus_signal_certification(wpa_s, depth, subject, cert_hash, cert); 610 } 611