Move peer certificate wpa_msg() calls to notify.c
[mech_eap.git] / wpa_supplicant / notify.c
1 /*
2  * wpa_supplicant - Event notifications
3  * Copyright (c) 2009-2010, Jouni Malinen <j@w1.fi>
4  *
5  * This program is free software; you can redistribute it and/or modify
6  * it under the terms of the GNU General Public License version 2 as
7  * published by the Free Software Foundation.
8  *
9  * Alternatively, this software may be distributed under the terms of BSD
10  * license.
11  *
12  * See README and COPYING for more details.
13  */
14
15 #include "utils/includes.h"
16
17 #include "utils/common.h"
18 #include "common/wpa_ctrl.h"
19 #include "config.h"
20 #include "wpa_supplicant_i.h"
21 #include "wps_supplicant.h"
22 #include "dbus/dbus_common.h"
23 #include "dbus/dbus_old.h"
24 #include "dbus/dbus_new.h"
25 #include "driver_i.h"
26 #include "scan.h"
27 #include "p2p_supplicant.h"
28 #include "sme.h"
29 #include "notify.h"
30
31 int wpas_notify_supplicant_initialized(struct wpa_global *global)
32 {
33 #ifdef CONFIG_DBUS
34         if (global->params.dbus_ctrl_interface) {
35                 global->dbus = wpas_dbus_init(global);
36                 if (global->dbus == NULL)
37                         return -1;
38         }
39 #endif /* CONFIG_DBUS */
40
41         return 0;
42 }
43
44
45 void wpas_notify_supplicant_deinitialized(struct wpa_global *global)
46 {
47 #ifdef CONFIG_DBUS
48         if (global->dbus)
49                 wpas_dbus_deinit(global->dbus);
50 #endif /* CONFIG_DBUS */
51 }
52
53
54 int wpas_notify_iface_added(struct wpa_supplicant *wpa_s)
55 {
56         if (wpas_dbus_register_iface(wpa_s))
57                 return -1;
58
59         if (wpas_dbus_register_interface(wpa_s))
60                 return -1;
61
62         return 0;
63 }
64
65
66 void wpas_notify_iface_removed(struct wpa_supplicant *wpa_s)
67 {
68         /* unregister interface in old DBus ctrl iface */
69         wpas_dbus_unregister_iface(wpa_s);
70
71         /* unregister interface in new DBus ctrl iface */
72         wpas_dbus_unregister_interface(wpa_s);
73 }
74
75
76 void wpas_notify_state_changed(struct wpa_supplicant *wpa_s,
77                                enum wpa_states new_state,
78                                enum wpa_states old_state)
79 {
80         /* notify the old DBus API */
81         wpa_supplicant_dbus_notify_state_change(wpa_s, new_state,
82                                                 old_state);
83
84         /* notify the new DBus API */
85         wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_STATE);
86
87 #ifdef CONFIG_P2P
88         if (new_state == WPA_COMPLETED)
89                 wpas_p2p_notif_connected(wpa_s);
90         else if (new_state < WPA_ASSOCIATED)
91                 wpas_p2p_notif_disconnected(wpa_s);
92 #endif /* CONFIG_P2P */
93
94         sme_state_changed(wpa_s);
95
96 #ifdef ANDROID
97         wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_STATE_CHANGE
98                      "id=%d state=%d BSSID=" MACSTR,
99                      wpa_s->current_ssid ? wpa_s->current_ssid->id : -1,
100                      new_state, MAC2STR(wpa_s->pending_bssid));
101 #endif /* ANDROID */
102 }
103
104
105 void wpas_notify_network_changed(struct wpa_supplicant *wpa_s)
106 {
107         wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_CURRENT_NETWORK);
108 }
109
110
111 void wpas_notify_ap_scan_changed(struct wpa_supplicant *wpa_s)
112 {
113         wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_AP_SCAN);
114 }
115
116
117 void wpas_notify_bssid_changed(struct wpa_supplicant *wpa_s)
118 {
119         wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_CURRENT_BSS);
120 }
121
122
123 void wpas_notify_auth_changed(struct wpa_supplicant *wpa_s)
124 {
125         wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_CURRENT_AUTH_MODE);
126 }
127
128
129 void wpas_notify_network_enabled_changed(struct wpa_supplicant *wpa_s,
130                                          struct wpa_ssid *ssid)
131 {
132         wpas_dbus_signal_network_enabled_changed(wpa_s, ssid);
133 }
134
135
136 void wpas_notify_network_selected(struct wpa_supplicant *wpa_s,
137                                   struct wpa_ssid *ssid)
138 {
139         wpas_dbus_signal_network_selected(wpa_s, ssid->id);
140 }
141
142
143 void wpas_notify_scanning(struct wpa_supplicant *wpa_s)
144 {
145         /* notify the old DBus API */
146         wpa_supplicant_dbus_notify_scanning(wpa_s);
147
148         /* notify the new DBus API */
149         wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_SCANNING);
150 }
151
152
153 void wpas_notify_scan_done(struct wpa_supplicant *wpa_s, int success)
154 {
155         wpas_dbus_signal_scan_done(wpa_s, success);
156 }
157
158
159 void wpas_notify_scan_results(struct wpa_supplicant *wpa_s)
160 {
161         /* notify the old DBus API */
162         wpa_supplicant_dbus_notify_scan_results(wpa_s);
163
164         wpas_wps_notify_scan_results(wpa_s);
165 }
166
167
168 void wpas_notify_wps_credential(struct wpa_supplicant *wpa_s,
169                                 const struct wps_credential *cred)
170 {
171 #ifdef CONFIG_WPS
172         /* notify the old DBus API */
173         wpa_supplicant_dbus_notify_wps_cred(wpa_s, cred);
174         /* notify the new DBus API */
175         wpas_dbus_signal_wps_cred(wpa_s, cred);
176 #endif /* CONFIG_WPS */
177 }
178
179
180 void wpas_notify_wps_event_m2d(struct wpa_supplicant *wpa_s,
181                                struct wps_event_m2d *m2d)
182 {
183 #ifdef CONFIG_WPS
184         wpas_dbus_signal_wps_event_m2d(wpa_s, m2d);
185 #endif /* CONFIG_WPS */
186 }
187
188
189 void wpas_notify_wps_event_fail(struct wpa_supplicant *wpa_s,
190                                 struct wps_event_fail *fail)
191 {
192 #ifdef CONFIG_WPS
193         wpas_dbus_signal_wps_event_fail(wpa_s, fail);
194 #endif /* CONFIG_WPS */
195 }
196
197
198 void wpas_notify_wps_event_success(struct wpa_supplicant *wpa_s)
199 {
200 #ifdef CONFIG_WPS
201         wpas_dbus_signal_wps_event_success(wpa_s);
202 #endif /* CONFIG_WPS */
203 }
204
205
206 void wpas_notify_network_added(struct wpa_supplicant *wpa_s,
207                                struct wpa_ssid *ssid)
208 {
209         /*
210          * Networks objects created during any P2P activities should not be
211          * exposed out. They might/will confuse certain non-P2P aware
212          * applications since these network objects won't behave like
213          * regular ones.
214          */
215         if (wpa_s->global->p2p_group_formation != wpa_s)
216                 wpas_dbus_register_network(wpa_s, ssid);
217 }
218
219
220 void wpas_notify_persistent_group_added(struct wpa_supplicant *wpa_s,
221                                         struct wpa_ssid *ssid)
222 {
223 #ifdef CONFIG_P2P
224         wpas_dbus_register_persistent_group(wpa_s, ssid);
225 #endif /* CONFIG_P2P */
226 }
227
228
229 void wpas_notify_persistent_group_removed(struct wpa_supplicant *wpa_s,
230                                           struct wpa_ssid *ssid)
231 {
232 #ifdef CONFIG_P2P
233         wpas_dbus_unregister_persistent_group(wpa_s, ssid->id);
234 #endif /* CONFIG_P2P */
235 }
236
237
238 void wpas_notify_network_removed(struct wpa_supplicant *wpa_s,
239                                  struct wpa_ssid *ssid)
240 {
241         if (wpa_s->global->p2p_group_formation != wpa_s)
242                 wpas_dbus_unregister_network(wpa_s, ssid->id);
243 }
244
245
246 void wpas_notify_bss_added(struct wpa_supplicant *wpa_s,
247                            u8 bssid[], unsigned int id)
248 {
249         wpas_dbus_register_bss(wpa_s, bssid, id);
250         wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_BSS_ADDED "%u " MACSTR,
251                      id, MAC2STR(bssid));
252 }
253
254
255 void wpas_notify_bss_removed(struct wpa_supplicant *wpa_s,
256                              u8 bssid[], unsigned int id)
257 {
258         wpas_dbus_unregister_bss(wpa_s, bssid, id);
259         wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_BSS_REMOVED "%u " MACSTR,
260                      id, MAC2STR(bssid));
261 }
262
263
264 void wpas_notify_bss_freq_changed(struct wpa_supplicant *wpa_s,
265                                   unsigned int id)
266 {
267         wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_FREQ, id);
268 }
269
270
271 void wpas_notify_bss_signal_changed(struct wpa_supplicant *wpa_s,
272                                     unsigned int id)
273 {
274         wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_SIGNAL,
275                                           id);
276 }
277
278
279 void wpas_notify_bss_privacy_changed(struct wpa_supplicant *wpa_s,
280                                      unsigned int id)
281 {
282         wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_PRIVACY,
283                                           id);
284 }
285
286
287 void wpas_notify_bss_mode_changed(struct wpa_supplicant *wpa_s,
288                                   unsigned int id)
289 {
290         wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_MODE, id);
291 }
292
293
294 void wpas_notify_bss_wpaie_changed(struct wpa_supplicant *wpa_s,
295                                    unsigned int id)
296 {
297         wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_WPA, id);
298 }
299
300
301 void wpas_notify_bss_rsnie_changed(struct wpa_supplicant *wpa_s,
302                                    unsigned int id)
303 {
304         wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_RSN, id);
305 }
306
307
308 void wpas_notify_bss_wps_changed(struct wpa_supplicant *wpa_s,
309                                  unsigned int id)
310 {
311 }
312
313
314 void wpas_notify_bss_ies_changed(struct wpa_supplicant *wpa_s,
315                                    unsigned int id)
316 {
317         wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_IES, id);
318 }
319
320
321 void wpas_notify_bss_rates_changed(struct wpa_supplicant *wpa_s,
322                                    unsigned int id)
323 {
324         wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_RATES, id);
325 }
326
327
328 void wpas_notify_blob_added(struct wpa_supplicant *wpa_s, const char *name)
329 {
330         wpas_dbus_signal_blob_added(wpa_s, name);
331 }
332
333
334 void wpas_notify_blob_removed(struct wpa_supplicant *wpa_s, const char *name)
335 {
336         wpas_dbus_signal_blob_removed(wpa_s, name);
337 }
338
339
340 void wpas_notify_debug_level_changed(struct wpa_global *global)
341 {
342         wpas_dbus_signal_debug_level_changed(global);
343 }
344
345
346 void wpas_notify_debug_timestamp_changed(struct wpa_global *global)
347 {
348         wpas_dbus_signal_debug_timestamp_changed(global);
349 }
350
351
352 void wpas_notify_debug_show_keys_changed(struct wpa_global *global)
353 {
354         wpas_dbus_signal_debug_show_keys_changed(global);
355 }
356
357
358 void wpas_notify_suspend(struct wpa_global *global)
359 {
360         struct wpa_supplicant *wpa_s;
361
362         os_get_time(&global->suspend_time);
363         wpa_printf(MSG_DEBUG, "System suspend notification");
364         for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next)
365                 wpa_drv_suspend(wpa_s);
366 }
367
368
369 void wpas_notify_resume(struct wpa_global *global)
370 {
371         struct os_time now;
372         int slept;
373         struct wpa_supplicant *wpa_s;
374
375         if (global->suspend_time.sec == 0)
376                 slept = -1;
377         else {
378                 os_get_time(&now);
379                 slept = now.sec - global->suspend_time.sec;
380         }
381         wpa_printf(MSG_DEBUG, "System resume notification (slept %d seconds)",
382                    slept);
383
384         for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next) {
385                 wpa_drv_resume(wpa_s);
386                 if (wpa_s->wpa_state == WPA_DISCONNECTED)
387                         wpa_supplicant_req_scan(wpa_s, 0, 100000);
388         }
389 }
390
391
392 #ifdef CONFIG_P2P
393
394 void wpas_notify_p2p_device_found(struct wpa_supplicant *wpa_s,
395                                   const u8 *dev_addr, int new_device)
396 {
397         if (new_device) {
398                 /* Create the new peer object */
399                 wpas_dbus_register_peer(wpa_s, dev_addr);
400         }
401
402         /* Notify a new peer has been detected*/
403         wpas_dbus_signal_peer_device_found(wpa_s, dev_addr);
404 }
405
406
407 void wpas_notify_p2p_device_lost(struct wpa_supplicant *wpa_s,
408                                  const u8 *dev_addr)
409 {
410         wpas_dbus_unregister_peer(wpa_s, dev_addr);
411
412         /* Create signal on interface object*/
413         wpas_dbus_signal_peer_device_lost(wpa_s, dev_addr);
414 }
415
416
417 void wpas_notify_p2p_group_removed(struct wpa_supplicant *wpa_s,
418                                    const struct wpa_ssid *ssid,
419                                    const char *role)
420 {
421         wpas_dbus_unregister_p2p_group(wpa_s, ssid);
422
423         wpas_dbus_signal_p2p_group_removed(wpa_s, role);
424 }
425
426
427 void wpas_notify_p2p_go_neg_req(struct wpa_supplicant *wpa_s,
428                                 const u8 *src, u16 dev_passwd_id)
429 {
430         wpas_dbus_signal_p2p_go_neg_req(wpa_s, src, dev_passwd_id);
431 }
432
433
434 void wpas_notify_p2p_go_neg_completed(struct wpa_supplicant *wpa_s, int status)
435 {
436         wpas_dbus_signal_p2p_go_neg_resp(wpa_s, status);
437 }
438
439
440 void wpas_notify_p2p_invitation_result(struct wpa_supplicant *wpa_s,
441                                        int status, const u8 *bssid)
442 {
443         wpas_dbus_signal_p2p_invitation_result(wpa_s, status, bssid);
444 }
445
446
447 void wpas_notify_p2p_sd_request(struct wpa_supplicant *wpa_s,
448                                 int freq, const u8 *sa, u8 dialog_token,
449                                 u16 update_indic, const u8 *tlvs,
450                                 size_t tlvs_len)
451 {
452         wpas_dbus_signal_p2p_sd_request(wpa_s, freq, sa, dialog_token,
453                                         update_indic, tlvs, tlvs_len);
454 }
455
456
457 void wpas_notify_p2p_sd_response(struct wpa_supplicant *wpa_s,
458                                  const u8 *sa, u16 update_indic,
459                                  const u8 *tlvs, size_t tlvs_len)
460 {
461         wpas_dbus_signal_p2p_sd_response(wpa_s, sa, update_indic,
462                                          tlvs, tlvs_len);
463 }
464
465
466 /**
467  * wpas_notify_p2p_provision_discovery - Notification of provision discovery
468  * @dev_addr: Who sent the request or responded to our request.
469  * @request: Will be 1 if request, 0 for response.
470  * @status: Valid only in case of response (0 in case of success)
471  * @config_methods: WPS config methods
472  * @generated_pin: PIN to be displayed in case of WPS_CONFIG_DISPLAY method
473  *
474  * This can be used to notify:
475  * - Requests or responses
476  * - Various config methods
477  * - Failure condition in case of response
478  */
479 void wpas_notify_p2p_provision_discovery(struct wpa_supplicant *wpa_s,
480                                          const u8 *dev_addr, int request,
481                                          enum p2p_prov_disc_status status,
482                                          u16 config_methods,
483                                          unsigned int generated_pin)
484 {
485         wpas_dbus_signal_p2p_provision_discovery(wpa_s, dev_addr, request,
486                                                  status, config_methods,
487                                                  generated_pin);
488 }
489
490
491 void wpas_notify_p2p_group_started(struct wpa_supplicant *wpa_s,
492                                    struct wpa_ssid *ssid, int network_id,
493                                    int client)
494 {
495         /* Notify a group has been started */
496         wpas_dbus_register_p2p_group(wpa_s, ssid);
497
498         wpas_dbus_signal_p2p_group_started(wpa_s, ssid, client, network_id);
499 }
500
501
502 void wpas_notify_p2p_wps_failed(struct wpa_supplicant *wpa_s,
503                                 struct wps_event_fail *fail)
504 {
505         wpas_dbus_signal_p2p_wps_failed(wpa_s, fail);
506 }
507
508 #endif /* CONFIG_P2P */
509
510
511 static void wpas_notify_ap_sta_authorized(struct wpa_supplicant *wpa_s,
512                                           const u8 *sta)
513 {
514 #ifdef CONFIG_P2P
515         /*
516          * Register a group member object corresponding to this peer and
517          * emit a PeerJoined signal. This will check if it really is a
518          * P2P group.
519          */
520         wpas_dbus_register_p2p_groupmember(wpa_s, sta);
521
522         /*
523          * Create 'peer-joined' signal on group object -- will also
524          * check P2P itself.
525          */
526         wpas_dbus_signal_p2p_peer_joined(wpa_s, sta);
527 #endif /* CONFIG_P2P */
528 }
529
530
531 static void wpas_notify_ap_sta_deauthorized(struct wpa_supplicant *wpa_s,
532                                             const u8 *sta)
533 {
534 #ifdef CONFIG_P2P
535         /*
536          * Unregister a group member object corresponding to this peer
537          * if this is a P2P group.
538          */
539         wpas_dbus_unregister_p2p_groupmember(wpa_s, sta);
540
541         /*
542          * Create 'peer-disconnected' signal on group object if this
543          * is a P2P group.
544          */
545         wpas_dbus_signal_p2p_peer_disconnected(wpa_s, sta);
546 #endif /* CONFIG_P2P */
547 }
548
549
550 void wpas_notify_sta_authorized(struct wpa_supplicant *wpa_s,
551                                 const u8 *mac_addr, int authorized)
552 {
553         if (authorized)
554                 wpas_notify_ap_sta_authorized(wpa_s, mac_addr);
555         else
556                 wpas_notify_ap_sta_deauthorized(wpa_s, mac_addr);
557 }
558
559
560 void wpas_notify_certification(struct wpa_supplicant *wpa_s, int depth,
561                                const char *subject, const char *cert_hash,
562                                const struct wpabuf *cert)
563 {
564         wpa_msg(wpa_s, MSG_INFO, WPA_EVENT_EAP_PEER_CERT
565                 "depth=%d subject='%s'%s%s",
566                 depth, subject,
567                 cert_hash ? " hash=" : "",
568                 cert_hash ? cert_hash : "");
569
570         if (cert) {
571                 char *cert_hex;
572                 size_t len = wpabuf_len(cert) * 2 + 1;
573                 cert_hex = os_malloc(len);
574                 if (cert_hex) {
575                         wpa_snprintf_hex(cert_hex, len, wpabuf_head(cert),
576                                          wpabuf_len(cert));
577                         wpa_msg_ctrl(wpa_s, MSG_INFO,
578                                      WPA_EVENT_EAP_PEER_CERT
579                                      "depth=%d subject='%s' cert=%s",
580                                      depth, subject, cert_hex);
581                         os_free(cert_hex);
582                 }
583         }
584
585         /* notify the old DBus API */
586         wpa_supplicant_dbus_notify_certification(wpa_s, depth, subject,
587                                                  cert_hash, cert);
588         /* notify the new DBus API */
589         wpas_dbus_signal_certification(wpa_s, depth, subject, cert_hash, cert);
590 }