notify.c revision 1f69aa52ea2e0a73ac502565df8c666ee49cab6a
1/* 2 * wpa_supplicant - Event notifications 3 * Copyright (c) 2009-2010, Jouni Malinen <j@w1.fi> 4 * 5 * This program is free software; you can redistribute it and/or modify 6 * it under the terms of the GNU General Public License version 2 as 7 * published by the Free Software Foundation. 8 * 9 * Alternatively, this software may be distributed under the terms of BSD 10 * license. 11 * 12 * See README and COPYING for more details. 13 */ 14 15#include "utils/includes.h" 16 17#include "utils/common.h" 18#include "common/wpa_ctrl.h" 19#include "config.h" 20#include "wpa_supplicant_i.h" 21#include "wps_supplicant.h" 22#include "dbus/dbus_common.h" 23#include "dbus/dbus_old.h" 24#include "dbus/dbus_new.h" 25#include "rsn_supp/wpa.h" 26#include "driver_i.h" 27#include "scan.h" 28#include "p2p_supplicant.h" 29#include "sme.h" 30#include "notify.h" 31 32int wpas_notify_supplicant_initialized(struct wpa_global *global) 33{ 34#ifdef CONFIG_DBUS 35 if (global->params.dbus_ctrl_interface) { 36 global->dbus = wpas_dbus_init(global); 37 if (global->dbus == NULL) 38 return -1; 39 } 40#endif /* CONFIG_DBUS */ 41 42 return 0; 43} 44 45 46void wpas_notify_supplicant_deinitialized(struct wpa_global *global) 47{ 48#ifdef CONFIG_DBUS 49 if (global->dbus) 50 wpas_dbus_deinit(global->dbus); 51#endif /* CONFIG_DBUS */ 52} 53 54 55int wpas_notify_iface_added(struct wpa_supplicant *wpa_s) 56{ 57 if (wpas_dbus_register_iface(wpa_s)) 58 return -1; 59 60 if (wpas_dbus_register_interface(wpa_s)) 61 return -1; 62 63 return 0; 64} 65 66 67void wpas_notify_iface_removed(struct wpa_supplicant *wpa_s) 68{ 69 /* unregister interface in old DBus ctrl iface */ 70 wpas_dbus_unregister_iface(wpa_s); 71 72 /* unregister interface in new DBus ctrl iface */ 73 wpas_dbus_unregister_interface(wpa_s); 74} 75 76 77void wpas_notify_state_changed(struct wpa_supplicant *wpa_s, 78 enum wpa_states new_state, 79 enum wpa_states old_state) 80{ 81 /* notify the old DBus API */ 82 wpa_supplicant_dbus_notify_state_change(wpa_s, new_state, 83 old_state); 84 85 /* notify the new DBus API */ 86 wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_STATE); 87 88#ifdef CONFIG_P2P 89 if (new_state == WPA_COMPLETED) 90 wpas_p2p_notif_connected(wpa_s); 91 else if (new_state < WPA_ASSOCIATED) 92 wpas_p2p_notif_disconnected(wpa_s); 93#endif /* CONFIG_P2P */ 94 95 sme_state_changed(wpa_s); 96 97#ifdef ANDROID 98 wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_STATE_CHANGE 99 "id=%d state=%d BSSID=" MACSTR, 100 wpa_s->current_ssid ? wpa_s->current_ssid->id : -1, 101 new_state, MAC2STR(wpa_s->pending_bssid)); 102#endif /* ANDROID */ 103} 104 105 106void wpas_notify_network_changed(struct wpa_supplicant *wpa_s) 107{ 108 wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_CURRENT_NETWORK); 109} 110 111 112void wpas_notify_ap_scan_changed(struct wpa_supplicant *wpa_s) 113{ 114 wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_AP_SCAN); 115} 116 117 118void wpas_notify_bssid_changed(struct wpa_supplicant *wpa_s) 119{ 120 wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_CURRENT_BSS); 121} 122 123 124void wpas_notify_auth_changed(struct wpa_supplicant *wpa_s) 125{ 126 wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_CURRENT_AUTH_MODE); 127} 128 129 130void wpas_notify_network_enabled_changed(struct wpa_supplicant *wpa_s, 131 struct wpa_ssid *ssid) 132{ 133 wpas_dbus_signal_network_enabled_changed(wpa_s, ssid); 134} 135 136 137void wpas_notify_network_selected(struct wpa_supplicant *wpa_s, 138 struct wpa_ssid *ssid) 139{ 140 wpas_dbus_signal_network_selected(wpa_s, ssid->id); 141} 142 143 144void wpas_notify_network_request(struct wpa_supplicant *wpa_s, 145 struct wpa_ssid *ssid, 146 enum wpa_ctrl_req_type rtype, 147 const char *default_txt) 148{ 149 wpas_dbus_signal_network_request(wpa_s, ssid, rtype, default_txt); 150} 151 152 153void wpas_notify_scanning(struct wpa_supplicant *wpa_s) 154{ 155 /* notify the old DBus API */ 156 wpa_supplicant_dbus_notify_scanning(wpa_s); 157 158 /* notify the new DBus API */ 159 wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_SCANNING); 160} 161 162 163void wpas_notify_scan_done(struct wpa_supplicant *wpa_s, int success) 164{ 165 wpas_dbus_signal_scan_done(wpa_s, success); 166} 167 168 169void wpas_notify_scan_results(struct wpa_supplicant *wpa_s) 170{ 171 /* notify the old DBus API */ 172 wpa_supplicant_dbus_notify_scan_results(wpa_s); 173 174 wpas_wps_notify_scan_results(wpa_s); 175} 176 177 178void wpas_notify_wps_credential(struct wpa_supplicant *wpa_s, 179 const struct wps_credential *cred) 180{ 181#ifdef CONFIG_WPS 182 /* notify the old DBus API */ 183 wpa_supplicant_dbus_notify_wps_cred(wpa_s, cred); 184 /* notify the new DBus API */ 185 wpas_dbus_signal_wps_cred(wpa_s, cred); 186#endif /* CONFIG_WPS */ 187} 188 189 190void wpas_notify_wps_event_m2d(struct wpa_supplicant *wpa_s, 191 struct wps_event_m2d *m2d) 192{ 193#ifdef CONFIG_WPS 194 wpas_dbus_signal_wps_event_m2d(wpa_s, m2d); 195#endif /* CONFIG_WPS */ 196} 197 198 199void wpas_notify_wps_event_fail(struct wpa_supplicant *wpa_s, 200 struct wps_event_fail *fail) 201{ 202#ifdef CONFIG_WPS 203 wpas_dbus_signal_wps_event_fail(wpa_s, fail); 204#endif /* CONFIG_WPS */ 205} 206 207 208void wpas_notify_wps_event_success(struct wpa_supplicant *wpa_s) 209{ 210#ifdef CONFIG_WPS 211 wpas_dbus_signal_wps_event_success(wpa_s); 212#endif /* CONFIG_WPS */ 213} 214 215 216void wpas_notify_network_added(struct wpa_supplicant *wpa_s, 217 struct wpa_ssid *ssid) 218{ 219 /* 220 * Networks objects created during any P2P activities should not be 221 * exposed out. They might/will confuse certain non-P2P aware 222 * applications since these network objects won't behave like 223 * regular ones. 224 */ 225 if (wpa_s->global->p2p_group_formation != wpa_s) 226 wpas_dbus_register_network(wpa_s, ssid); 227} 228 229 230void wpas_notify_persistent_group_added(struct wpa_supplicant *wpa_s, 231 struct wpa_ssid *ssid) 232{ 233#ifdef CONFIG_P2P 234 wpas_dbus_register_persistent_group(wpa_s, ssid); 235#endif /* CONFIG_P2P */ 236} 237 238 239void wpas_notify_persistent_group_removed(struct wpa_supplicant *wpa_s, 240 struct wpa_ssid *ssid) 241{ 242#ifdef CONFIG_P2P 243 wpas_dbus_unregister_persistent_group(wpa_s, ssid->id); 244#endif /* CONFIG_P2P */ 245} 246 247 248void wpas_notify_network_removed(struct wpa_supplicant *wpa_s, 249 struct wpa_ssid *ssid) 250{ 251 if (wpa_s->wpa) 252 wpa_sm_pmksa_cache_flush(wpa_s->wpa, ssid); 253 if (wpa_s->global->p2p_group_formation != wpa_s) 254 wpas_dbus_unregister_network(wpa_s, ssid->id); 255#ifdef CONFIG_P2P 256 wpas_p2p_network_removed(wpa_s, ssid); 257#endif /* CONFIG_P2P */ 258} 259 260 261void wpas_notify_bss_added(struct wpa_supplicant *wpa_s, 262 u8 bssid[], unsigned int id) 263{ 264 wpas_dbus_register_bss(wpa_s, bssid, id); 265 wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_BSS_ADDED "%u " MACSTR, 266 id, MAC2STR(bssid)); 267} 268 269 270void wpas_notify_bss_removed(struct wpa_supplicant *wpa_s, 271 u8 bssid[], unsigned int id) 272{ 273 wpas_dbus_unregister_bss(wpa_s, bssid, id); 274 wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_BSS_REMOVED "%u " MACSTR, 275 id, MAC2STR(bssid)); 276} 277 278 279void wpas_notify_bss_freq_changed(struct wpa_supplicant *wpa_s, 280 unsigned int id) 281{ 282 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_FREQ, id); 283} 284 285 286void wpas_notify_bss_signal_changed(struct wpa_supplicant *wpa_s, 287 unsigned int id) 288{ 289 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_SIGNAL, 290 id); 291} 292 293 294void wpas_notify_bss_privacy_changed(struct wpa_supplicant *wpa_s, 295 unsigned int id) 296{ 297 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_PRIVACY, 298 id); 299} 300 301 302void wpas_notify_bss_mode_changed(struct wpa_supplicant *wpa_s, 303 unsigned int id) 304{ 305 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_MODE, id); 306} 307 308 309void wpas_notify_bss_wpaie_changed(struct wpa_supplicant *wpa_s, 310 unsigned int id) 311{ 312 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_WPA, id); 313} 314 315 316void wpas_notify_bss_rsnie_changed(struct wpa_supplicant *wpa_s, 317 unsigned int id) 318{ 319 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_RSN, id); 320} 321 322 323void wpas_notify_bss_wps_changed(struct wpa_supplicant *wpa_s, 324 unsigned int id) 325{ 326} 327 328 329void wpas_notify_bss_ies_changed(struct wpa_supplicant *wpa_s, 330 unsigned int id) 331{ 332 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_IES, id); 333} 334 335 336void wpas_notify_bss_rates_changed(struct wpa_supplicant *wpa_s, 337 unsigned int id) 338{ 339 wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_RATES, id); 340} 341 342 343void wpas_notify_blob_added(struct wpa_supplicant *wpa_s, const char *name) 344{ 345 wpas_dbus_signal_blob_added(wpa_s, name); 346} 347 348 349void wpas_notify_blob_removed(struct wpa_supplicant *wpa_s, const char *name) 350{ 351 wpas_dbus_signal_blob_removed(wpa_s, name); 352} 353 354 355void wpas_notify_debug_level_changed(struct wpa_global *global) 356{ 357 wpas_dbus_signal_debug_level_changed(global); 358} 359 360 361void wpas_notify_debug_timestamp_changed(struct wpa_global *global) 362{ 363 wpas_dbus_signal_debug_timestamp_changed(global); 364} 365 366 367void wpas_notify_debug_show_keys_changed(struct wpa_global *global) 368{ 369 wpas_dbus_signal_debug_show_keys_changed(global); 370} 371 372 373void wpas_notify_suspend(struct wpa_global *global) 374{ 375 struct wpa_supplicant *wpa_s; 376 377 os_get_time(&global->suspend_time); 378 wpa_printf(MSG_DEBUG, "System suspend notification"); 379 for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next) 380 wpa_drv_suspend(wpa_s); 381} 382 383 384void wpas_notify_resume(struct wpa_global *global) 385{ 386 struct os_time now; 387 int slept; 388 struct wpa_supplicant *wpa_s; 389 390 if (global->suspend_time.sec == 0) 391 slept = -1; 392 else { 393 os_get_time(&now); 394 slept = now.sec - global->suspend_time.sec; 395 } 396 wpa_printf(MSG_DEBUG, "System resume notification (slept %d seconds)", 397 slept); 398 399 for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next) { 400 wpa_drv_resume(wpa_s); 401 if (wpa_s->wpa_state == WPA_DISCONNECTED) 402 wpa_supplicant_req_scan(wpa_s, 0, 100000); 403 } 404} 405 406 407#ifdef CONFIG_P2P 408 409void wpas_notify_p2p_device_found(struct wpa_supplicant *wpa_s, 410 const u8 *dev_addr, int new_device) 411{ 412 if (new_device) { 413 /* Create the new peer object */ 414 wpas_dbus_register_peer(wpa_s, dev_addr); 415 } 416 417 /* Notify a new peer has been detected*/ 418 wpas_dbus_signal_peer_device_found(wpa_s, dev_addr); 419} 420 421 422void wpas_notify_p2p_device_lost(struct wpa_supplicant *wpa_s, 423 const u8 *dev_addr) 424{ 425 wpas_dbus_unregister_peer(wpa_s, dev_addr); 426 427 /* Create signal on interface object*/ 428 wpas_dbus_signal_peer_device_lost(wpa_s, dev_addr); 429} 430 431 432void wpas_notify_p2p_group_removed(struct wpa_supplicant *wpa_s, 433 const struct wpa_ssid *ssid, 434 const char *role) 435{ 436 wpas_dbus_unregister_p2p_group(wpa_s, ssid); 437 438 wpas_dbus_signal_p2p_group_removed(wpa_s, role); 439} 440 441 442void wpas_notify_p2p_go_neg_req(struct wpa_supplicant *wpa_s, 443 const u8 *src, u16 dev_passwd_id) 444{ 445 wpas_dbus_signal_p2p_go_neg_req(wpa_s, src, dev_passwd_id); 446} 447 448 449void wpas_notify_p2p_go_neg_completed(struct wpa_supplicant *wpa_s, 450 struct p2p_go_neg_results *res) 451{ 452 wpas_dbus_signal_p2p_go_neg_resp(wpa_s, res); 453} 454 455 456void wpas_notify_p2p_invitation_result(struct wpa_supplicant *wpa_s, 457 int status, const u8 *bssid) 458{ 459 wpas_dbus_signal_p2p_invitation_result(wpa_s, status, bssid); 460} 461 462 463void wpas_notify_p2p_sd_request(struct wpa_supplicant *wpa_s, 464 int freq, const u8 *sa, u8 dialog_token, 465 u16 update_indic, const u8 *tlvs, 466 size_t tlvs_len) 467{ 468 wpas_dbus_signal_p2p_sd_request(wpa_s, freq, sa, dialog_token, 469 update_indic, tlvs, tlvs_len); 470} 471 472 473void wpas_notify_p2p_sd_response(struct wpa_supplicant *wpa_s, 474 const u8 *sa, u16 update_indic, 475 const u8 *tlvs, size_t tlvs_len) 476{ 477 wpas_dbus_signal_p2p_sd_response(wpa_s, sa, update_indic, 478 tlvs, tlvs_len); 479} 480 481 482/** 483 * wpas_notify_p2p_provision_discovery - Notification of provision discovery 484 * @dev_addr: Who sent the request or responded to our request. 485 * @request: Will be 1 if request, 0 for response. 486 * @status: Valid only in case of response (0 in case of success) 487 * @config_methods: WPS config methods 488 * @generated_pin: PIN to be displayed in case of WPS_CONFIG_DISPLAY method 489 * 490 * This can be used to notify: 491 * - Requests or responses 492 * - Various config methods 493 * - Failure condition in case of response 494 */ 495void wpas_notify_p2p_provision_discovery(struct wpa_supplicant *wpa_s, 496 const u8 *dev_addr, int request, 497 enum p2p_prov_disc_status status, 498 u16 config_methods, 499 unsigned int generated_pin) 500{ 501 wpas_dbus_signal_p2p_provision_discovery(wpa_s, dev_addr, request, 502 status, config_methods, 503 generated_pin); 504} 505 506 507void wpas_notify_p2p_group_started(struct wpa_supplicant *wpa_s, 508 struct wpa_ssid *ssid, int network_id, 509 int client) 510{ 511 /* Notify a group has been started */ 512 wpas_dbus_register_p2p_group(wpa_s, ssid); 513 514 wpas_dbus_signal_p2p_group_started(wpa_s, ssid, client, network_id); 515} 516 517 518void wpas_notify_p2p_wps_failed(struct wpa_supplicant *wpa_s, 519 struct wps_event_fail *fail) 520{ 521 wpas_dbus_signal_p2p_wps_failed(wpa_s, fail); 522} 523 524#endif /* CONFIG_P2P */ 525 526 527static void wpas_notify_ap_sta_authorized(struct wpa_supplicant *wpa_s, 528 const u8 *sta, 529 const u8 *p2p_dev_addr) 530{ 531#ifdef CONFIG_P2P 532 wpas_p2p_notify_ap_sta_authorized(wpa_s, p2p_dev_addr); 533 534 /* 535 * Register a group member object corresponding to this peer and 536 * emit a PeerJoined signal. This will check if it really is a 537 * P2P group. 538 */ 539 wpas_dbus_register_p2p_groupmember(wpa_s, sta); 540 541 /* 542 * Create 'peer-joined' signal on group object -- will also 543 * check P2P itself. 544 */ 545 wpas_dbus_signal_p2p_peer_joined(wpa_s, sta); 546#endif /* CONFIG_P2P */ 547} 548 549 550static void wpas_notify_ap_sta_deauthorized(struct wpa_supplicant *wpa_s, 551 const u8 *sta) 552{ 553#ifdef CONFIG_P2P 554 /* 555 * Unregister a group member object corresponding to this peer 556 * if this is a P2P group. 557 */ 558 wpas_dbus_unregister_p2p_groupmember(wpa_s, sta); 559 560 /* 561 * Create 'peer-disconnected' signal on group object if this 562 * is a P2P group. 563 */ 564 wpas_dbus_signal_p2p_peer_disconnected(wpa_s, sta); 565#endif /* CONFIG_P2P */ 566} 567 568 569void wpas_notify_sta_authorized(struct wpa_supplicant *wpa_s, 570 const u8 *mac_addr, int authorized, 571 const u8 *p2p_dev_addr) 572{ 573 if (authorized) 574 wpas_notify_ap_sta_authorized(wpa_s, mac_addr, p2p_dev_addr); 575 else 576 wpas_notify_ap_sta_deauthorized(wpa_s, mac_addr); 577} 578 579 580void wpas_notify_certification(struct wpa_supplicant *wpa_s, int depth, 581 const char *subject, const char *cert_hash, 582 const struct wpabuf *cert) 583{ 584 wpa_msg(wpa_s, MSG_INFO, WPA_EVENT_EAP_PEER_CERT 585 "depth=%d subject='%s'%s%s", 586 depth, subject, 587 cert_hash ? " hash=" : "", 588 cert_hash ? cert_hash : ""); 589 590 if (cert) { 591 char *cert_hex; 592 size_t len = wpabuf_len(cert) * 2 + 1; 593 cert_hex = os_malloc(len); 594 if (cert_hex) { 595 wpa_snprintf_hex(cert_hex, len, wpabuf_head(cert), 596 wpabuf_len(cert)); 597 wpa_msg_ctrl(wpa_s, MSG_INFO, 598 WPA_EVENT_EAP_PEER_CERT 599 "depth=%d subject='%s' cert=%s", 600 depth, subject, cert_hex); 601 os_free(cert_hex); 602 } 603 } 604 605 /* notify the old DBus API */ 606 wpa_supplicant_dbus_notify_certification(wpa_s, depth, subject, 607 cert_hash, cert); 608 /* notify the new DBus API */ 609 wpas_dbus_signal_certification(wpa_s, depth, subject, cert_hash, cert); 610} 611