ed466bdc4c80a5d09dd0f636dd3654fe2306b84c
[mech_eap.git] / wpa_supplicant / notify.c
1 /*
2  * wpa_supplicant - Event notifications
3  * Copyright (c) 2009-2010, Jouni Malinen <j@w1.fi>
4  *
5  * This program is free software; you can redistribute it and/or modify
6  * it under the terms of the GNU General Public License version 2 as
7  * published by the Free Software Foundation.
8  *
9  * Alternatively, this software may be distributed under the terms of BSD
10  * license.
11  *
12  * See README and COPYING for more details.
13  */
14
15 #include "utils/includes.h"
16
17 #include "utils/common.h"
18 #include "common/wpa_ctrl.h"
19 #include "config.h"
20 #include "wpa_supplicant_i.h"
21 #include "wps_supplicant.h"
22 #include "dbus/dbus_common.h"
23 #include "dbus/dbus_old.h"
24 #include "dbus/dbus_new.h"
25 #include "rsn_supp/wpa.h"
26 #include "driver_i.h"
27 #include "scan.h"
28 #include "p2p_supplicant.h"
29 #include "sme.h"
30 #include "notify.h"
31
32 int wpas_notify_supplicant_initialized(struct wpa_global *global)
33 {
34 #ifdef CONFIG_DBUS
35         if (global->params.dbus_ctrl_interface) {
36                 global->dbus = wpas_dbus_init(global);
37                 if (global->dbus == NULL)
38                         return -1;
39         }
40 #endif /* CONFIG_DBUS */
41
42         return 0;
43 }
44
45
46 void wpas_notify_supplicant_deinitialized(struct wpa_global *global)
47 {
48 #ifdef CONFIG_DBUS
49         if (global->dbus)
50                 wpas_dbus_deinit(global->dbus);
51 #endif /* CONFIG_DBUS */
52 }
53
54
55 int wpas_notify_iface_added(struct wpa_supplicant *wpa_s)
56 {
57         if (wpas_dbus_register_iface(wpa_s))
58                 return -1;
59
60         if (wpas_dbus_register_interface(wpa_s))
61                 return -1;
62
63         return 0;
64 }
65
66
67 void wpas_notify_iface_removed(struct wpa_supplicant *wpa_s)
68 {
69         /* unregister interface in old DBus ctrl iface */
70         wpas_dbus_unregister_iface(wpa_s);
71
72         /* unregister interface in new DBus ctrl iface */
73         wpas_dbus_unregister_interface(wpa_s);
74 }
75
76
77 void wpas_notify_state_changed(struct wpa_supplicant *wpa_s,
78                                enum wpa_states new_state,
79                                enum wpa_states old_state)
80 {
81         /* notify the old DBus API */
82         wpa_supplicant_dbus_notify_state_change(wpa_s, new_state,
83                                                 old_state);
84
85         /* notify the new DBus API */
86         wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_STATE);
87
88 #ifdef CONFIG_P2P
89         if (new_state == WPA_COMPLETED)
90                 wpas_p2p_notif_connected(wpa_s);
91         else if (new_state < WPA_ASSOCIATED)
92                 wpas_p2p_notif_disconnected(wpa_s);
93 #endif /* CONFIG_P2P */
94
95         sme_state_changed(wpa_s);
96
97 #ifdef ANDROID
98         wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_STATE_CHANGE
99                      "id=%d state=%d BSSID=" MACSTR,
100                      wpa_s->current_ssid ? wpa_s->current_ssid->id : -1,
101                      new_state, MAC2STR(wpa_s->pending_bssid));
102 #endif /* ANDROID */
103 }
104
105
106 void wpas_notify_network_changed(struct wpa_supplicant *wpa_s)
107 {
108         wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_CURRENT_NETWORK);
109 }
110
111
112 void wpas_notify_ap_scan_changed(struct wpa_supplicant *wpa_s)
113 {
114         wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_AP_SCAN);
115 }
116
117
118 void wpas_notify_bssid_changed(struct wpa_supplicant *wpa_s)
119 {
120         wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_CURRENT_BSS);
121 }
122
123
124 void wpas_notify_auth_changed(struct wpa_supplicant *wpa_s)
125 {
126         wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_CURRENT_AUTH_MODE);
127 }
128
129
130 void wpas_notify_network_enabled_changed(struct wpa_supplicant *wpa_s,
131                                          struct wpa_ssid *ssid)
132 {
133         wpas_dbus_signal_network_enabled_changed(wpa_s, ssid);
134 }
135
136
137 void wpas_notify_network_selected(struct wpa_supplicant *wpa_s,
138                                   struct wpa_ssid *ssid)
139 {
140         wpas_dbus_signal_network_selected(wpa_s, ssid->id);
141 }
142
143
144 void wpas_notify_scanning(struct wpa_supplicant *wpa_s)
145 {
146         /* notify the old DBus API */
147         wpa_supplicant_dbus_notify_scanning(wpa_s);
148
149         /* notify the new DBus API */
150         wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_SCANNING);
151 }
152
153
154 void wpas_notify_scan_done(struct wpa_supplicant *wpa_s, int success)
155 {
156         wpas_dbus_signal_scan_done(wpa_s, success);
157 }
158
159
160 void wpas_notify_scan_results(struct wpa_supplicant *wpa_s)
161 {
162         /* notify the old DBus API */
163         wpa_supplicant_dbus_notify_scan_results(wpa_s);
164
165         wpas_wps_notify_scan_results(wpa_s);
166 }
167
168
169 void wpas_notify_wps_credential(struct wpa_supplicant *wpa_s,
170                                 const struct wps_credential *cred)
171 {
172 #ifdef CONFIG_WPS
173         /* notify the old DBus API */
174         wpa_supplicant_dbus_notify_wps_cred(wpa_s, cred);
175         /* notify the new DBus API */
176         wpas_dbus_signal_wps_cred(wpa_s, cred);
177 #endif /* CONFIG_WPS */
178 }
179
180
181 void wpas_notify_wps_event_m2d(struct wpa_supplicant *wpa_s,
182                                struct wps_event_m2d *m2d)
183 {
184 #ifdef CONFIG_WPS
185         wpas_dbus_signal_wps_event_m2d(wpa_s, m2d);
186 #endif /* CONFIG_WPS */
187 }
188
189
190 void wpas_notify_wps_event_fail(struct wpa_supplicant *wpa_s,
191                                 struct wps_event_fail *fail)
192 {
193 #ifdef CONFIG_WPS
194         wpas_dbus_signal_wps_event_fail(wpa_s, fail);
195 #endif /* CONFIG_WPS */
196 }
197
198
199 void wpas_notify_wps_event_success(struct wpa_supplicant *wpa_s)
200 {
201 #ifdef CONFIG_WPS
202         wpas_dbus_signal_wps_event_success(wpa_s);
203 #endif /* CONFIG_WPS */
204 }
205
206
207 void wpas_notify_network_added(struct wpa_supplicant *wpa_s,
208                                struct wpa_ssid *ssid)
209 {
210         /*
211          * Networks objects created during any P2P activities should not be
212          * exposed out. They might/will confuse certain non-P2P aware
213          * applications since these network objects won't behave like
214          * regular ones.
215          */
216         if (wpa_s->global->p2p_group_formation != wpa_s)
217                 wpas_dbus_register_network(wpa_s, ssid);
218 }
219
220
221 void wpas_notify_persistent_group_added(struct wpa_supplicant *wpa_s,
222                                         struct wpa_ssid *ssid)
223 {
224 #ifdef CONFIG_P2P
225         wpas_dbus_register_persistent_group(wpa_s, ssid);
226 #endif /* CONFIG_P2P */
227 }
228
229
230 void wpas_notify_persistent_group_removed(struct wpa_supplicant *wpa_s,
231                                           struct wpa_ssid *ssid)
232 {
233 #ifdef CONFIG_P2P
234         wpas_dbus_unregister_persistent_group(wpa_s, ssid->id);
235 #endif /* CONFIG_P2P */
236 }
237
238
239 void wpas_notify_network_removed(struct wpa_supplicant *wpa_s,
240                                  struct wpa_ssid *ssid)
241 {
242         wpa_sm_pmksa_cache_flush(wpa_s->wpa, ssid);
243         if (wpa_s->global->p2p_group_formation != wpa_s)
244                 wpas_dbus_unregister_network(wpa_s, ssid->id);
245 }
246
247
248 void wpas_notify_bss_added(struct wpa_supplicant *wpa_s,
249                            u8 bssid[], unsigned int id)
250 {
251         wpas_dbus_register_bss(wpa_s, bssid, id);
252         wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_BSS_ADDED "%u " MACSTR,
253                      id, MAC2STR(bssid));
254 }
255
256
257 void wpas_notify_bss_removed(struct wpa_supplicant *wpa_s,
258                              u8 bssid[], unsigned int id)
259 {
260         wpas_dbus_unregister_bss(wpa_s, bssid, id);
261         wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_BSS_REMOVED "%u " MACSTR,
262                      id, MAC2STR(bssid));
263 }
264
265
266 void wpas_notify_bss_freq_changed(struct wpa_supplicant *wpa_s,
267                                   unsigned int id)
268 {
269         wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_FREQ, id);
270 }
271
272
273 void wpas_notify_bss_signal_changed(struct wpa_supplicant *wpa_s,
274                                     unsigned int id)
275 {
276         wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_SIGNAL,
277                                           id);
278 }
279
280
281 void wpas_notify_bss_privacy_changed(struct wpa_supplicant *wpa_s,
282                                      unsigned int id)
283 {
284         wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_PRIVACY,
285                                           id);
286 }
287
288
289 void wpas_notify_bss_mode_changed(struct wpa_supplicant *wpa_s,
290                                   unsigned int id)
291 {
292         wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_MODE, id);
293 }
294
295
296 void wpas_notify_bss_wpaie_changed(struct wpa_supplicant *wpa_s,
297                                    unsigned int id)
298 {
299         wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_WPA, id);
300 }
301
302
303 void wpas_notify_bss_rsnie_changed(struct wpa_supplicant *wpa_s,
304                                    unsigned int id)
305 {
306         wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_RSN, id);
307 }
308
309
310 void wpas_notify_bss_wps_changed(struct wpa_supplicant *wpa_s,
311                                  unsigned int id)
312 {
313 }
314
315
316 void wpas_notify_bss_ies_changed(struct wpa_supplicant *wpa_s,
317                                    unsigned int id)
318 {
319         wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_IES, id);
320 }
321
322
323 void wpas_notify_bss_rates_changed(struct wpa_supplicant *wpa_s,
324                                    unsigned int id)
325 {
326         wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_RATES, id);
327 }
328
329
330 void wpas_notify_blob_added(struct wpa_supplicant *wpa_s, const char *name)
331 {
332         wpas_dbus_signal_blob_added(wpa_s, name);
333 }
334
335
336 void wpas_notify_blob_removed(struct wpa_supplicant *wpa_s, const char *name)
337 {
338         wpas_dbus_signal_blob_removed(wpa_s, name);
339 }
340
341
342 void wpas_notify_debug_level_changed(struct wpa_global *global)
343 {
344         wpas_dbus_signal_debug_level_changed(global);
345 }
346
347
348 void wpas_notify_debug_timestamp_changed(struct wpa_global *global)
349 {
350         wpas_dbus_signal_debug_timestamp_changed(global);
351 }
352
353
354 void wpas_notify_debug_show_keys_changed(struct wpa_global *global)
355 {
356         wpas_dbus_signal_debug_show_keys_changed(global);
357 }
358
359
360 void wpas_notify_suspend(struct wpa_global *global)
361 {
362         struct wpa_supplicant *wpa_s;
363
364         os_get_time(&global->suspend_time);
365         wpa_printf(MSG_DEBUG, "System suspend notification");
366         for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next)
367                 wpa_drv_suspend(wpa_s);
368 }
369
370
371 void wpas_notify_resume(struct wpa_global *global)
372 {
373         struct os_time now;
374         int slept;
375         struct wpa_supplicant *wpa_s;
376
377         if (global->suspend_time.sec == 0)
378                 slept = -1;
379         else {
380                 os_get_time(&now);
381                 slept = now.sec - global->suspend_time.sec;
382         }
383         wpa_printf(MSG_DEBUG, "System resume notification (slept %d seconds)",
384                    slept);
385
386         for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next) {
387                 wpa_drv_resume(wpa_s);
388                 if (wpa_s->wpa_state == WPA_DISCONNECTED)
389                         wpa_supplicant_req_scan(wpa_s, 0, 100000);
390         }
391 }
392
393
394 #ifdef CONFIG_P2P
395
396 void wpas_notify_p2p_device_found(struct wpa_supplicant *wpa_s,
397                                   const u8 *dev_addr, int new_device)
398 {
399         if (new_device) {
400                 /* Create the new peer object */
401                 wpas_dbus_register_peer(wpa_s, dev_addr);
402         }
403
404         /* Notify a new peer has been detected*/
405         wpas_dbus_signal_peer_device_found(wpa_s, dev_addr);
406 }
407
408
409 void wpas_notify_p2p_device_lost(struct wpa_supplicant *wpa_s,
410                                  const u8 *dev_addr)
411 {
412         wpas_dbus_unregister_peer(wpa_s, dev_addr);
413
414         /* Create signal on interface object*/
415         wpas_dbus_signal_peer_device_lost(wpa_s, dev_addr);
416 }
417
418
419 void wpas_notify_p2p_group_removed(struct wpa_supplicant *wpa_s,
420                                    const struct wpa_ssid *ssid,
421                                    const char *role)
422 {
423         wpas_dbus_unregister_p2p_group(wpa_s, ssid);
424
425         wpas_dbus_signal_p2p_group_removed(wpa_s, role);
426 }
427
428
429 void wpas_notify_p2p_go_neg_req(struct wpa_supplicant *wpa_s,
430                                 const u8 *src, u16 dev_passwd_id)
431 {
432         wpas_dbus_signal_p2p_go_neg_req(wpa_s, src, dev_passwd_id);
433 }
434
435
436 void wpas_notify_p2p_go_neg_completed(struct wpa_supplicant *wpa_s, int status)
437 {
438         wpas_dbus_signal_p2p_go_neg_resp(wpa_s, status);
439 }
440
441
442 void wpas_notify_p2p_invitation_result(struct wpa_supplicant *wpa_s,
443                                        int status, const u8 *bssid)
444 {
445         wpas_dbus_signal_p2p_invitation_result(wpa_s, status, bssid);
446 }
447
448
449 void wpas_notify_p2p_sd_request(struct wpa_supplicant *wpa_s,
450                                 int freq, const u8 *sa, u8 dialog_token,
451                                 u16 update_indic, const u8 *tlvs,
452                                 size_t tlvs_len)
453 {
454         wpas_dbus_signal_p2p_sd_request(wpa_s, freq, sa, dialog_token,
455                                         update_indic, tlvs, tlvs_len);
456 }
457
458
459 void wpas_notify_p2p_sd_response(struct wpa_supplicant *wpa_s,
460                                  const u8 *sa, u16 update_indic,
461                                  const u8 *tlvs, size_t tlvs_len)
462 {
463         wpas_dbus_signal_p2p_sd_response(wpa_s, sa, update_indic,
464                                          tlvs, tlvs_len);
465 }
466
467
468 /**
469  * wpas_notify_p2p_provision_discovery - Notification of provision discovery
470  * @dev_addr: Who sent the request or responded to our request.
471  * @request: Will be 1 if request, 0 for response.
472  * @status: Valid only in case of response (0 in case of success)
473  * @config_methods: WPS config methods
474  * @generated_pin: PIN to be displayed in case of WPS_CONFIG_DISPLAY method
475  *
476  * This can be used to notify:
477  * - Requests or responses
478  * - Various config methods
479  * - Failure condition in case of response
480  */
481 void wpas_notify_p2p_provision_discovery(struct wpa_supplicant *wpa_s,
482                                          const u8 *dev_addr, int request,
483                                          enum p2p_prov_disc_status status,
484                                          u16 config_methods,
485                                          unsigned int generated_pin)
486 {
487         wpas_dbus_signal_p2p_provision_discovery(wpa_s, dev_addr, request,
488                                                  status, config_methods,
489                                                  generated_pin);
490 }
491
492
493 void wpas_notify_p2p_group_started(struct wpa_supplicant *wpa_s,
494                                    struct wpa_ssid *ssid, int network_id,
495                                    int client)
496 {
497         /* Notify a group has been started */
498         wpas_dbus_register_p2p_group(wpa_s, ssid);
499
500         wpas_dbus_signal_p2p_group_started(wpa_s, ssid, client, network_id);
501 }
502
503
504 void wpas_notify_p2p_wps_failed(struct wpa_supplicant *wpa_s,
505                                 struct wps_event_fail *fail)
506 {
507         wpas_dbus_signal_p2p_wps_failed(wpa_s, fail);
508 }
509
510 #endif /* CONFIG_P2P */
511
512
513 static void wpas_notify_ap_sta_authorized(struct wpa_supplicant *wpa_s,
514                                           const u8 *sta)
515 {
516 #ifdef CONFIG_P2P
517         /*
518          * Register a group member object corresponding to this peer and
519          * emit a PeerJoined signal. This will check if it really is a
520          * P2P group.
521          */
522         wpas_dbus_register_p2p_groupmember(wpa_s, sta);
523
524         /*
525          * Create 'peer-joined' signal on group object -- will also
526          * check P2P itself.
527          */
528         wpas_dbus_signal_p2p_peer_joined(wpa_s, sta);
529 #endif /* CONFIG_P2P */
530 }
531
532
533 static void wpas_notify_ap_sta_deauthorized(struct wpa_supplicant *wpa_s,
534                                             const u8 *sta)
535 {
536 #ifdef CONFIG_P2P
537         /*
538          * Unregister a group member object corresponding to this peer
539          * if this is a P2P group.
540          */
541         wpas_dbus_unregister_p2p_groupmember(wpa_s, sta);
542
543         /*
544          * Create 'peer-disconnected' signal on group object if this
545          * is a P2P group.
546          */
547         wpas_dbus_signal_p2p_peer_disconnected(wpa_s, sta);
548 #endif /* CONFIG_P2P */
549 }
550
551
552 void wpas_notify_sta_authorized(struct wpa_supplicant *wpa_s,
553                                 const u8 *mac_addr, int authorized)
554 {
555         if (authorized)
556                 wpas_notify_ap_sta_authorized(wpa_s, mac_addr);
557         else
558                 wpas_notify_ap_sta_deauthorized(wpa_s, mac_addr);
559 }
560
561
562 void wpas_notify_certification(struct wpa_supplicant *wpa_s, int depth,
563                                const char *subject, const char *cert_hash,
564                                const struct wpabuf *cert)
565 {
566         wpa_msg(wpa_s, MSG_INFO, WPA_EVENT_EAP_PEER_CERT
567                 "depth=%d subject='%s'%s%s",
568                 depth, subject,
569                 cert_hash ? " hash=" : "",
570                 cert_hash ? cert_hash : "");
571
572         if (cert) {
573                 char *cert_hex;
574                 size_t len = wpabuf_len(cert) * 2 + 1;
575                 cert_hex = os_malloc(len);
576                 if (cert_hex) {
577                         wpa_snprintf_hex(cert_hex, len, wpabuf_head(cert),
578                                          wpabuf_len(cert));
579                         wpa_msg_ctrl(wpa_s, MSG_INFO,
580                                      WPA_EVENT_EAP_PEER_CERT
581                                      "depth=%d subject='%s' cert=%s",
582                                      depth, subject, cert_hex);
583                         os_free(cert_hex);
584                 }
585         }
586
587         /* notify the old DBus API */
588         wpa_supplicant_dbus_notify_certification(wpa_s, depth, subject,
589                                                  cert_hash, cert);
590         /* notify the new DBus API */
591         wpas_dbus_signal_certification(wpa_s, depth, subject, cert_hash, cert);
592 }