xref: /netbsd-src/external/bsd/wpa/dist/wpa_supplicant/notify.c (revision e61202360d5611414dd6f6115934a96aa1f50b1a)
1 /*
2  * wpa_supplicant - Event notifications
3  * Copyright (c) 2009-2010, Jouni Malinen <j@w1.fi>
4  *
5  * This program is free software; you can redistribute it and/or modify
6  * it under the terms of the GNU General Public License version 2 as
7  * published by the Free Software Foundation.
8  *
9  * Alternatively, this software may be distributed under the terms of BSD
10  * license.
11  *
12  * See README and COPYING for more details.
13  */
14 
15 #include "utils/includes.h"
16 
17 #include "utils/common.h"
18 #include "common/wpa_ctrl.h"
19 #include "config.h"
20 #include "wpa_supplicant_i.h"
21 #include "wps_supplicant.h"
22 #include "dbus/dbus_common.h"
23 #include "dbus/dbus_old.h"
24 #include "dbus/dbus_new.h"
25 #include "rsn_supp/wpa.h"
26 #include "driver_i.h"
27 #include "scan.h"
28 #include "p2p_supplicant.h"
29 #include "sme.h"
30 #include "notify.h"
31 
32 int wpas_notify_supplicant_initialized(struct wpa_global *global)
33 {
34 #ifdef CONFIG_DBUS
35 	if (global->params.dbus_ctrl_interface) {
36 		global->dbus = wpas_dbus_init(global);
37 		if (global->dbus == NULL)
38 			return -1;
39 	}
40 #endif /* CONFIG_DBUS */
41 
42 	return 0;
43 }
44 
45 
46 void wpas_notify_supplicant_deinitialized(struct wpa_global *global)
47 {
48 #ifdef CONFIG_DBUS
49 	if (global->dbus)
50 		wpas_dbus_deinit(global->dbus);
51 #endif /* CONFIG_DBUS */
52 }
53 
54 
55 int wpas_notify_iface_added(struct wpa_supplicant *wpa_s)
56 {
57 	if (wpas_dbus_register_iface(wpa_s))
58 		return -1;
59 
60 	if (wpas_dbus_register_interface(wpa_s))
61 		return -1;
62 
63 	return 0;
64 }
65 
66 
67 void wpas_notify_iface_removed(struct wpa_supplicant *wpa_s)
68 {
69 	/* unregister interface in old DBus ctrl iface */
70 	wpas_dbus_unregister_iface(wpa_s);
71 
72 	/* unregister interface in new DBus ctrl iface */
73 	wpas_dbus_unregister_interface(wpa_s);
74 }
75 
76 
77 void wpas_notify_state_changed(struct wpa_supplicant *wpa_s,
78 			       enum wpa_states new_state,
79 			       enum wpa_states old_state)
80 {
81 	/* notify the old DBus API */
82 	wpa_supplicant_dbus_notify_state_change(wpa_s, new_state,
83 						old_state);
84 
85 	/* notify the new DBus API */
86 	wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_STATE);
87 
88 #ifdef CONFIG_P2P
89 	if (new_state == WPA_COMPLETED)
90 		wpas_p2p_notif_connected(wpa_s);
91 	else if (old_state >= WPA_ASSOCIATED && new_state < WPA_ASSOCIATED)
92 		wpas_p2p_notif_disconnected(wpa_s);
93 #endif /* CONFIG_P2P */
94 
95 	sme_state_changed(wpa_s);
96 
97 #ifdef ANDROID
98 	wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_STATE_CHANGE
99 		     "id=%d state=%d BSSID=" MACSTR,
100 		     wpa_s->current_ssid ? wpa_s->current_ssid->id : -1,
101 		     new_state, MAC2STR(wpa_s->pending_bssid));
102 #endif /* ANDROID */
103 }
104 
105 
106 void wpas_notify_network_changed(struct wpa_supplicant *wpa_s)
107 {
108 	wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_CURRENT_NETWORK);
109 }
110 
111 
112 void wpas_notify_ap_scan_changed(struct wpa_supplicant *wpa_s)
113 {
114 	wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_AP_SCAN);
115 }
116 
117 
118 void wpas_notify_bssid_changed(struct wpa_supplicant *wpa_s)
119 {
120 	wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_CURRENT_BSS);
121 }
122 
123 
124 void wpas_notify_auth_changed(struct wpa_supplicant *wpa_s)
125 {
126 	wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_CURRENT_AUTH_MODE);
127 }
128 
129 
130 void wpas_notify_network_enabled_changed(struct wpa_supplicant *wpa_s,
131 					 struct wpa_ssid *ssid)
132 {
133 	wpas_dbus_signal_network_enabled_changed(wpa_s, ssid);
134 }
135 
136 
137 void wpas_notify_network_selected(struct wpa_supplicant *wpa_s,
138 				  struct wpa_ssid *ssid)
139 {
140 	wpas_dbus_signal_network_selected(wpa_s, ssid->id);
141 }
142 
143 
144 void wpas_notify_network_request(struct wpa_supplicant *wpa_s,
145 				 struct wpa_ssid *ssid,
146 				 enum wpa_ctrl_req_type rtype,
147 				 const char *default_txt)
148 {
149 	wpas_dbus_signal_network_request(wpa_s, ssid, rtype, default_txt);
150 }
151 
152 
153 void wpas_notify_scanning(struct wpa_supplicant *wpa_s)
154 {
155 	/* notify the old DBus API */
156 	wpa_supplicant_dbus_notify_scanning(wpa_s);
157 
158 	/* notify the new DBus API */
159 	wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_SCANNING);
160 }
161 
162 
163 void wpas_notify_scan_done(struct wpa_supplicant *wpa_s, int success)
164 {
165 	wpas_dbus_signal_scan_done(wpa_s, success);
166 }
167 
168 
169 void wpas_notify_scan_results(struct wpa_supplicant *wpa_s)
170 {
171 	/* notify the old DBus API */
172 	wpa_supplicant_dbus_notify_scan_results(wpa_s);
173 
174 	wpas_wps_notify_scan_results(wpa_s);
175 }
176 
177 
178 void wpas_notify_wps_credential(struct wpa_supplicant *wpa_s,
179 				const struct wps_credential *cred)
180 {
181 #ifdef CONFIG_WPS
182 	/* notify the old DBus API */
183 	wpa_supplicant_dbus_notify_wps_cred(wpa_s, cred);
184 	/* notify the new DBus API */
185 	wpas_dbus_signal_wps_cred(wpa_s, cred);
186 #endif /* CONFIG_WPS */
187 }
188 
189 
190 void wpas_notify_wps_event_m2d(struct wpa_supplicant *wpa_s,
191 			       struct wps_event_m2d *m2d)
192 {
193 #ifdef CONFIG_WPS
194 	wpas_dbus_signal_wps_event_m2d(wpa_s, m2d);
195 #endif /* CONFIG_WPS */
196 }
197 
198 
199 void wpas_notify_wps_event_fail(struct wpa_supplicant *wpa_s,
200 				struct wps_event_fail *fail)
201 {
202 #ifdef CONFIG_WPS
203 	wpas_dbus_signal_wps_event_fail(wpa_s, fail);
204 #endif /* CONFIG_WPS */
205 }
206 
207 
208 void wpas_notify_wps_event_success(struct wpa_supplicant *wpa_s)
209 {
210 #ifdef CONFIG_WPS
211 	wpas_dbus_signal_wps_event_success(wpa_s);
212 #endif /* CONFIG_WPS */
213 }
214 
215 
216 void wpas_notify_network_added(struct wpa_supplicant *wpa_s,
217 			       struct wpa_ssid *ssid)
218 {
219 	/*
220 	 * Networks objects created during any P2P activities should not be
221 	 * exposed out. They might/will confuse certain non-P2P aware
222 	 * applications since these network objects won't behave like
223 	 * regular ones.
224 	 */
225 	if (wpa_s->global->p2p_group_formation != wpa_s)
226 		wpas_dbus_register_network(wpa_s, ssid);
227 }
228 
229 
230 void wpas_notify_persistent_group_added(struct wpa_supplicant *wpa_s,
231 					struct wpa_ssid *ssid)
232 {
233 #ifdef CONFIG_P2P
234 	wpas_dbus_register_persistent_group(wpa_s, ssid);
235 #endif /* CONFIG_P2P */
236 }
237 
238 
239 void wpas_notify_persistent_group_removed(struct wpa_supplicant *wpa_s,
240 					  struct wpa_ssid *ssid)
241 {
242 #ifdef CONFIG_P2P
243 	wpas_dbus_unregister_persistent_group(wpa_s, ssid->id);
244 #endif /* CONFIG_P2P */
245 }
246 
247 
248 void wpas_notify_network_removed(struct wpa_supplicant *wpa_s,
249 				 struct wpa_ssid *ssid)
250 {
251 	if (wpa_s->wpa)
252 		wpa_sm_pmksa_cache_flush(wpa_s->wpa, ssid);
253 	if (wpa_s->global->p2p_group_formation != wpa_s)
254 		wpas_dbus_unregister_network(wpa_s, ssid->id);
255 #ifdef CONFIG_P2P
256 	wpas_p2p_network_removed(wpa_s, ssid);
257 #endif /* CONFIG_P2P */
258 }
259 
260 
261 void wpas_notify_bss_added(struct wpa_supplicant *wpa_s,
262 			   u8 bssid[], unsigned int id)
263 {
264 	wpas_dbus_register_bss(wpa_s, bssid, id);
265 	wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_BSS_ADDED "%u " MACSTR,
266 		     id, MAC2STR(bssid));
267 }
268 
269 
270 void wpas_notify_bss_removed(struct wpa_supplicant *wpa_s,
271 			     u8 bssid[], unsigned int id)
272 {
273 	wpas_dbus_unregister_bss(wpa_s, bssid, id);
274 	wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_BSS_REMOVED "%u " MACSTR,
275 		     id, MAC2STR(bssid));
276 }
277 
278 
279 void wpas_notify_bss_freq_changed(struct wpa_supplicant *wpa_s,
280 				  unsigned int id)
281 {
282 	wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_FREQ, id);
283 }
284 
285 
286 void wpas_notify_bss_signal_changed(struct wpa_supplicant *wpa_s,
287 				    unsigned int id)
288 {
289 	wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_SIGNAL,
290 					  id);
291 }
292 
293 
294 void wpas_notify_bss_privacy_changed(struct wpa_supplicant *wpa_s,
295 				     unsigned int id)
296 {
297 	wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_PRIVACY,
298 					  id);
299 }
300 
301 
302 void wpas_notify_bss_mode_changed(struct wpa_supplicant *wpa_s,
303 				  unsigned int id)
304 {
305 	wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_MODE, id);
306 }
307 
308 
309 void wpas_notify_bss_wpaie_changed(struct wpa_supplicant *wpa_s,
310 				   unsigned int id)
311 {
312 	wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_WPA, id);
313 }
314 
315 
316 void wpas_notify_bss_rsnie_changed(struct wpa_supplicant *wpa_s,
317 				   unsigned int id)
318 {
319 	wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_RSN, id);
320 }
321 
322 
323 void wpas_notify_bss_wps_changed(struct wpa_supplicant *wpa_s,
324 				 unsigned int id)
325 {
326 }
327 
328 
329 void wpas_notify_bss_ies_changed(struct wpa_supplicant *wpa_s,
330 				   unsigned int id)
331 {
332 	wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_IES, id);
333 }
334 
335 
336 void wpas_notify_bss_rates_changed(struct wpa_supplicant *wpa_s,
337 				   unsigned int id)
338 {
339 	wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_RATES, id);
340 }
341 
342 
343 void wpas_notify_blob_added(struct wpa_supplicant *wpa_s, const char *name)
344 {
345 	wpas_dbus_signal_blob_added(wpa_s, name);
346 }
347 
348 
349 void wpas_notify_blob_removed(struct wpa_supplicant *wpa_s, const char *name)
350 {
351 	wpas_dbus_signal_blob_removed(wpa_s, name);
352 }
353 
354 
355 void wpas_notify_debug_level_changed(struct wpa_global *global)
356 {
357 	wpas_dbus_signal_debug_level_changed(global);
358 }
359 
360 
361 void wpas_notify_debug_timestamp_changed(struct wpa_global *global)
362 {
363 	wpas_dbus_signal_debug_timestamp_changed(global);
364 }
365 
366 
367 void wpas_notify_debug_show_keys_changed(struct wpa_global *global)
368 {
369 	wpas_dbus_signal_debug_show_keys_changed(global);
370 }
371 
372 
373 void wpas_notify_suspend(struct wpa_global *global)
374 {
375 	struct wpa_supplicant *wpa_s;
376 
377 	os_get_time(&global->suspend_time);
378 	wpa_printf(MSG_DEBUG, "System suspend notification");
379 	for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next)
380 		wpa_drv_suspend(wpa_s);
381 }
382 
383 
384 void wpas_notify_resume(struct wpa_global *global)
385 {
386 	struct os_time now;
387 	int slept;
388 	struct wpa_supplicant *wpa_s;
389 
390 	if (global->suspend_time.sec == 0)
391 		slept = -1;
392 	else {
393 		os_get_time(&now);
394 		slept = now.sec - global->suspend_time.sec;
395 	}
396 	wpa_printf(MSG_DEBUG, "System resume notification (slept %d seconds)",
397 		   slept);
398 
399 	for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next) {
400 		wpa_drv_resume(wpa_s);
401 		if (wpa_s->wpa_state == WPA_DISCONNECTED)
402 			wpa_supplicant_req_scan(wpa_s, 0, 100000);
403 	}
404 }
405 
406 
407 #ifdef CONFIG_P2P
408 
409 void wpas_notify_p2p_device_found(struct wpa_supplicant *wpa_s,
410 				  const u8 *dev_addr, int new_device)
411 {
412 	if (new_device) {
413 		/* Create the new peer object */
414 		wpas_dbus_register_peer(wpa_s, dev_addr);
415 	}
416 
417 	/* Notify a new peer has been detected*/
418 	wpas_dbus_signal_peer_device_found(wpa_s, dev_addr);
419 }
420 
421 
422 void wpas_notify_p2p_device_lost(struct wpa_supplicant *wpa_s,
423 				 const u8 *dev_addr)
424 {
425 	wpas_dbus_unregister_peer(wpa_s, dev_addr);
426 
427 	/* Create signal on interface object*/
428 	wpas_dbus_signal_peer_device_lost(wpa_s, dev_addr);
429 }
430 
431 
432 void wpas_notify_p2p_group_removed(struct wpa_supplicant *wpa_s,
433 				   const struct wpa_ssid *ssid,
434 				   const char *role)
435 {
436 	wpas_dbus_unregister_p2p_group(wpa_s, ssid);
437 
438 	wpas_dbus_signal_p2p_group_removed(wpa_s, role);
439 }
440 
441 
442 void wpas_notify_p2p_go_neg_req(struct wpa_supplicant *wpa_s,
443 				const u8 *src, u16 dev_passwd_id)
444 {
445 	wpas_dbus_signal_p2p_go_neg_req(wpa_s, src, dev_passwd_id);
446 }
447 
448 
449 void wpas_notify_p2p_go_neg_completed(struct wpa_supplicant *wpa_s,
450 				      struct p2p_go_neg_results *res)
451 {
452 	wpas_dbus_signal_p2p_go_neg_resp(wpa_s, res);
453 }
454 
455 
456 void wpas_notify_p2p_invitation_result(struct wpa_supplicant *wpa_s,
457 				       int status, const u8 *bssid)
458 {
459 	wpas_dbus_signal_p2p_invitation_result(wpa_s, status, bssid);
460 }
461 
462 
463 void wpas_notify_p2p_sd_request(struct wpa_supplicant *wpa_s,
464 				int freq, const u8 *sa, u8 dialog_token,
465 				u16 update_indic, const u8 *tlvs,
466 				size_t tlvs_len)
467 {
468 	wpas_dbus_signal_p2p_sd_request(wpa_s, freq, sa, dialog_token,
469 					update_indic, tlvs, tlvs_len);
470 }
471 
472 
473 void wpas_notify_p2p_sd_response(struct wpa_supplicant *wpa_s,
474 				 const u8 *sa, u16 update_indic,
475 				 const u8 *tlvs, size_t tlvs_len)
476 {
477 	wpas_dbus_signal_p2p_sd_response(wpa_s, sa, update_indic,
478 					 tlvs, tlvs_len);
479 }
480 
481 
482 /**
483  * wpas_notify_p2p_provision_discovery - Notification of provision discovery
484  * @dev_addr: Who sent the request or responded to our request.
485  * @request: Will be 1 if request, 0 for response.
486  * @status: Valid only in case of response (0 in case of success)
487  * @config_methods: WPS config methods
488  * @generated_pin: PIN to be displayed in case of WPS_CONFIG_DISPLAY method
489  *
490  * This can be used to notify:
491  * - Requests or responses
492  * - Various config methods
493  * - Failure condition in case of response
494  */
495 void wpas_notify_p2p_provision_discovery(struct wpa_supplicant *wpa_s,
496 					 const u8 *dev_addr, int request,
497 					 enum p2p_prov_disc_status status,
498 					 u16 config_methods,
499 					 unsigned int generated_pin)
500 {
501 	wpas_dbus_signal_p2p_provision_discovery(wpa_s, dev_addr, request,
502 						 status, config_methods,
503 						 generated_pin);
504 }
505 
506 
507 void wpas_notify_p2p_group_started(struct wpa_supplicant *wpa_s,
508 				   struct wpa_ssid *ssid, int network_id,
509 				   int client)
510 {
511 	/* Notify a group has been started */
512 	wpas_dbus_register_p2p_group(wpa_s, ssid);
513 
514 	wpas_dbus_signal_p2p_group_started(wpa_s, ssid, client, network_id);
515 }
516 
517 
518 void wpas_notify_p2p_wps_failed(struct wpa_supplicant *wpa_s,
519 				struct wps_event_fail *fail)
520 {
521 	wpas_dbus_signal_p2p_wps_failed(wpa_s, fail);
522 }
523 
524 #endif /* CONFIG_P2P */
525 
526 
527 static void wpas_notify_ap_sta_authorized(struct wpa_supplicant *wpa_s,
528 					  const u8 *sta,
529 					  const u8 *p2p_dev_addr)
530 {
531 #ifdef CONFIG_P2P
532 	wpas_p2p_notify_ap_sta_authorized(wpa_s, p2p_dev_addr);
533 
534 	/*
535 	 * Register a group member object corresponding to this peer and
536 	 * emit a PeerJoined signal. This will check if it really is a
537 	 * P2P group.
538 	 */
539 	wpas_dbus_register_p2p_groupmember(wpa_s, sta);
540 
541 	/*
542 	 * Create 'peer-joined' signal on group object -- will also
543 	 * check P2P itself.
544 	 */
545 	wpas_dbus_signal_p2p_peer_joined(wpa_s, sta);
546 #endif /* CONFIG_P2P */
547 }
548 
549 
550 static void wpas_notify_ap_sta_deauthorized(struct wpa_supplicant *wpa_s,
551 					    const u8 *sta)
552 {
553 #ifdef CONFIG_P2P
554 	/*
555 	 * Unregister a group member object corresponding to this peer
556 	 * if this is a P2P group.
557 	 */
558 	wpas_dbus_unregister_p2p_groupmember(wpa_s, sta);
559 
560 	/*
561 	 * Create 'peer-disconnected' signal on group object if this
562 	 * is a P2P group.
563 	 */
564 	wpas_dbus_signal_p2p_peer_disconnected(wpa_s, sta);
565 #endif /* CONFIG_P2P */
566 }
567 
568 
569 void wpas_notify_sta_authorized(struct wpa_supplicant *wpa_s,
570 				const u8 *mac_addr, int authorized,
571 				const u8 *p2p_dev_addr)
572 {
573 	if (authorized)
574 		wpas_notify_ap_sta_authorized(wpa_s, mac_addr, p2p_dev_addr);
575 	else
576 		wpas_notify_ap_sta_deauthorized(wpa_s, mac_addr);
577 }
578 
579 
580 void wpas_notify_certification(struct wpa_supplicant *wpa_s, int depth,
581 			       const char *subject, const char *cert_hash,
582 			       const struct wpabuf *cert)
583 {
584 	wpa_msg(wpa_s, MSG_INFO, WPA_EVENT_EAP_PEER_CERT
585 		"depth=%d subject='%s'%s%s",
586 		depth, subject,
587 		cert_hash ? " hash=" : "",
588 		cert_hash ? cert_hash : "");
589 
590 	if (cert) {
591 		char *cert_hex;
592 		size_t len = wpabuf_len(cert) * 2 + 1;
593 		cert_hex = os_malloc(len);
594 		if (cert_hex) {
595 			wpa_snprintf_hex(cert_hex, len, wpabuf_head(cert),
596 					 wpabuf_len(cert));
597 			wpa_msg_ctrl(wpa_s, MSG_INFO,
598 				     WPA_EVENT_EAP_PEER_CERT
599 				     "depth=%d subject='%s' cert=%s",
600 				     depth, subject, cert_hex);
601 			os_free(cert_hex);
602 		}
603 	}
604 
605 	/* notify the old DBus API */
606 	wpa_supplicant_dbus_notify_certification(wpa_s, depth, subject,
607 						 cert_hash, cert);
608 	/* notify the new DBus API */
609 	wpas_dbus_signal_certification(wpa_s, depth, subject, cert_hash, cert);
610 }
611