Fix segfault on error path if driver initialization fails
[mech_eap.git] / wpa_supplicant / notify.c
1 /*
2  * wpa_supplicant - Event notifications
3  * Copyright (c) 2009-2010, Jouni Malinen <j@w1.fi>
4  *
5  * This program is free software; you can redistribute it and/or modify
6  * it under the terms of the GNU General Public License version 2 as
7  * published by the Free Software Foundation.
8  *
9  * Alternatively, this software may be distributed under the terms of BSD
10  * license.
11  *
12  * See README and COPYING for more details.
13  */
14
15 #include "utils/includes.h"
16
17 #include "utils/common.h"
18 #include "common/wpa_ctrl.h"
19 #include "config.h"
20 #include "wpa_supplicant_i.h"
21 #include "wps_supplicant.h"
22 #include "dbus/dbus_common.h"
23 #include "dbus/dbus_old.h"
24 #include "dbus/dbus_new.h"
25 #include "rsn_supp/wpa.h"
26 #include "driver_i.h"
27 #include "scan.h"
28 #include "p2p_supplicant.h"
29 #include "sme.h"
30 #include "notify.h"
31
32 int wpas_notify_supplicant_initialized(struct wpa_global *global)
33 {
34 #ifdef CONFIG_DBUS
35         if (global->params.dbus_ctrl_interface) {
36                 global->dbus = wpas_dbus_init(global);
37                 if (global->dbus == NULL)
38                         return -1;
39         }
40 #endif /* CONFIG_DBUS */
41
42         return 0;
43 }
44
45
46 void wpas_notify_supplicant_deinitialized(struct wpa_global *global)
47 {
48 #ifdef CONFIG_DBUS
49         if (global->dbus)
50                 wpas_dbus_deinit(global->dbus);
51 #endif /* CONFIG_DBUS */
52 }
53
54
55 int wpas_notify_iface_added(struct wpa_supplicant *wpa_s)
56 {
57         if (wpas_dbus_register_iface(wpa_s))
58                 return -1;
59
60         if (wpas_dbus_register_interface(wpa_s))
61                 return -1;
62
63         return 0;
64 }
65
66
67 void wpas_notify_iface_removed(struct wpa_supplicant *wpa_s)
68 {
69         /* unregister interface in old DBus ctrl iface */
70         wpas_dbus_unregister_iface(wpa_s);
71
72         /* unregister interface in new DBus ctrl iface */
73         wpas_dbus_unregister_interface(wpa_s);
74 }
75
76
77 void wpas_notify_state_changed(struct wpa_supplicant *wpa_s,
78                                enum wpa_states new_state,
79                                enum wpa_states old_state)
80 {
81         /* notify the old DBus API */
82         wpa_supplicant_dbus_notify_state_change(wpa_s, new_state,
83                                                 old_state);
84
85         /* notify the new DBus API */
86         wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_STATE);
87
88 #ifdef CONFIG_P2P
89         if (new_state == WPA_COMPLETED)
90                 wpas_p2p_notif_connected(wpa_s);
91         else if (new_state < WPA_ASSOCIATED)
92                 wpas_p2p_notif_disconnected(wpa_s);
93 #endif /* CONFIG_P2P */
94
95         sme_state_changed(wpa_s);
96
97 #ifdef ANDROID
98         wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_STATE_CHANGE
99                      "id=%d state=%d BSSID=" MACSTR,
100                      wpa_s->current_ssid ? wpa_s->current_ssid->id : -1,
101                      new_state, MAC2STR(wpa_s->pending_bssid));
102 #endif /* ANDROID */
103 }
104
105
106 void wpas_notify_network_changed(struct wpa_supplicant *wpa_s)
107 {
108         wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_CURRENT_NETWORK);
109 }
110
111
112 void wpas_notify_ap_scan_changed(struct wpa_supplicant *wpa_s)
113 {
114         wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_AP_SCAN);
115 }
116
117
118 void wpas_notify_bssid_changed(struct wpa_supplicant *wpa_s)
119 {
120         wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_CURRENT_BSS);
121 }
122
123
124 void wpas_notify_auth_changed(struct wpa_supplicant *wpa_s)
125 {
126         wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_CURRENT_AUTH_MODE);
127 }
128
129
130 void wpas_notify_network_enabled_changed(struct wpa_supplicant *wpa_s,
131                                          struct wpa_ssid *ssid)
132 {
133         wpas_dbus_signal_network_enabled_changed(wpa_s, ssid);
134 }
135
136
137 void wpas_notify_network_selected(struct wpa_supplicant *wpa_s,
138                                   struct wpa_ssid *ssid)
139 {
140         wpas_dbus_signal_network_selected(wpa_s, ssid->id);
141 }
142
143
144 void wpas_notify_scanning(struct wpa_supplicant *wpa_s)
145 {
146         /* notify the old DBus API */
147         wpa_supplicant_dbus_notify_scanning(wpa_s);
148
149         /* notify the new DBus API */
150         wpas_dbus_signal_prop_changed(wpa_s, WPAS_DBUS_PROP_SCANNING);
151 }
152
153
154 void wpas_notify_scan_done(struct wpa_supplicant *wpa_s, int success)
155 {
156         wpas_dbus_signal_scan_done(wpa_s, success);
157 }
158
159
160 void wpas_notify_scan_results(struct wpa_supplicant *wpa_s)
161 {
162         /* notify the old DBus API */
163         wpa_supplicant_dbus_notify_scan_results(wpa_s);
164
165         wpas_wps_notify_scan_results(wpa_s);
166 }
167
168
169 void wpas_notify_wps_credential(struct wpa_supplicant *wpa_s,
170                                 const struct wps_credential *cred)
171 {
172 #ifdef CONFIG_WPS
173         /* notify the old DBus API */
174         wpa_supplicant_dbus_notify_wps_cred(wpa_s, cred);
175         /* notify the new DBus API */
176         wpas_dbus_signal_wps_cred(wpa_s, cred);
177 #endif /* CONFIG_WPS */
178 }
179
180
181 void wpas_notify_wps_event_m2d(struct wpa_supplicant *wpa_s,
182                                struct wps_event_m2d *m2d)
183 {
184 #ifdef CONFIG_WPS
185         wpas_dbus_signal_wps_event_m2d(wpa_s, m2d);
186 #endif /* CONFIG_WPS */
187 }
188
189
190 void wpas_notify_wps_event_fail(struct wpa_supplicant *wpa_s,
191                                 struct wps_event_fail *fail)
192 {
193 #ifdef CONFIG_WPS
194         wpas_dbus_signal_wps_event_fail(wpa_s, fail);
195 #endif /* CONFIG_WPS */
196 }
197
198
199 void wpas_notify_wps_event_success(struct wpa_supplicant *wpa_s)
200 {
201 #ifdef CONFIG_WPS
202         wpas_dbus_signal_wps_event_success(wpa_s);
203 #endif /* CONFIG_WPS */
204 }
205
206
207 void wpas_notify_network_added(struct wpa_supplicant *wpa_s,
208                                struct wpa_ssid *ssid)
209 {
210         /*
211          * Networks objects created during any P2P activities should not be
212          * exposed out. They might/will confuse certain non-P2P aware
213          * applications since these network objects won't behave like
214          * regular ones.
215          */
216         if (wpa_s->global->p2p_group_formation != wpa_s)
217                 wpas_dbus_register_network(wpa_s, ssid);
218 }
219
220
221 void wpas_notify_persistent_group_added(struct wpa_supplicant *wpa_s,
222                                         struct wpa_ssid *ssid)
223 {
224 #ifdef CONFIG_P2P
225         wpas_dbus_register_persistent_group(wpa_s, ssid);
226 #endif /* CONFIG_P2P */
227 }
228
229
230 void wpas_notify_persistent_group_removed(struct wpa_supplicant *wpa_s,
231                                           struct wpa_ssid *ssid)
232 {
233 #ifdef CONFIG_P2P
234         wpas_dbus_unregister_persistent_group(wpa_s, ssid->id);
235 #endif /* CONFIG_P2P */
236 }
237
238
239 void wpas_notify_network_removed(struct wpa_supplicant *wpa_s,
240                                  struct wpa_ssid *ssid)
241 {
242         if (wpa_s->wpa)
243                 wpa_sm_pmksa_cache_flush(wpa_s->wpa, ssid);
244         if (wpa_s->global->p2p_group_formation != wpa_s)
245                 wpas_dbus_unregister_network(wpa_s, ssid->id);
246 }
247
248
249 void wpas_notify_bss_added(struct wpa_supplicant *wpa_s,
250                            u8 bssid[], unsigned int id)
251 {
252         wpas_dbus_register_bss(wpa_s, bssid, id);
253         wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_BSS_ADDED "%u " MACSTR,
254                      id, MAC2STR(bssid));
255 }
256
257
258 void wpas_notify_bss_removed(struct wpa_supplicant *wpa_s,
259                              u8 bssid[], unsigned int id)
260 {
261         wpas_dbus_unregister_bss(wpa_s, bssid, id);
262         wpa_msg_ctrl(wpa_s, MSG_INFO, WPA_EVENT_BSS_REMOVED "%u " MACSTR,
263                      id, MAC2STR(bssid));
264 }
265
266
267 void wpas_notify_bss_freq_changed(struct wpa_supplicant *wpa_s,
268                                   unsigned int id)
269 {
270         wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_FREQ, id);
271 }
272
273
274 void wpas_notify_bss_signal_changed(struct wpa_supplicant *wpa_s,
275                                     unsigned int id)
276 {
277         wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_SIGNAL,
278                                           id);
279 }
280
281
282 void wpas_notify_bss_privacy_changed(struct wpa_supplicant *wpa_s,
283                                      unsigned int id)
284 {
285         wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_PRIVACY,
286                                           id);
287 }
288
289
290 void wpas_notify_bss_mode_changed(struct wpa_supplicant *wpa_s,
291                                   unsigned int id)
292 {
293         wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_MODE, id);
294 }
295
296
297 void wpas_notify_bss_wpaie_changed(struct wpa_supplicant *wpa_s,
298                                    unsigned int id)
299 {
300         wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_WPA, id);
301 }
302
303
304 void wpas_notify_bss_rsnie_changed(struct wpa_supplicant *wpa_s,
305                                    unsigned int id)
306 {
307         wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_RSN, id);
308 }
309
310
311 void wpas_notify_bss_wps_changed(struct wpa_supplicant *wpa_s,
312                                  unsigned int id)
313 {
314 }
315
316
317 void wpas_notify_bss_ies_changed(struct wpa_supplicant *wpa_s,
318                                    unsigned int id)
319 {
320         wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_IES, id);
321 }
322
323
324 void wpas_notify_bss_rates_changed(struct wpa_supplicant *wpa_s,
325                                    unsigned int id)
326 {
327         wpas_dbus_bss_signal_prop_changed(wpa_s, WPAS_DBUS_BSS_PROP_RATES, id);
328 }
329
330
331 void wpas_notify_blob_added(struct wpa_supplicant *wpa_s, const char *name)
332 {
333         wpas_dbus_signal_blob_added(wpa_s, name);
334 }
335
336
337 void wpas_notify_blob_removed(struct wpa_supplicant *wpa_s, const char *name)
338 {
339         wpas_dbus_signal_blob_removed(wpa_s, name);
340 }
341
342
343 void wpas_notify_debug_level_changed(struct wpa_global *global)
344 {
345         wpas_dbus_signal_debug_level_changed(global);
346 }
347
348
349 void wpas_notify_debug_timestamp_changed(struct wpa_global *global)
350 {
351         wpas_dbus_signal_debug_timestamp_changed(global);
352 }
353
354
355 void wpas_notify_debug_show_keys_changed(struct wpa_global *global)
356 {
357         wpas_dbus_signal_debug_show_keys_changed(global);
358 }
359
360
361 void wpas_notify_suspend(struct wpa_global *global)
362 {
363         struct wpa_supplicant *wpa_s;
364
365         os_get_time(&global->suspend_time);
366         wpa_printf(MSG_DEBUG, "System suspend notification");
367         for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next)
368                 wpa_drv_suspend(wpa_s);
369 }
370
371
372 void wpas_notify_resume(struct wpa_global *global)
373 {
374         struct os_time now;
375         int slept;
376         struct wpa_supplicant *wpa_s;
377
378         if (global->suspend_time.sec == 0)
379                 slept = -1;
380         else {
381                 os_get_time(&now);
382                 slept = now.sec - global->suspend_time.sec;
383         }
384         wpa_printf(MSG_DEBUG, "System resume notification (slept %d seconds)",
385                    slept);
386
387         for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next) {
388                 wpa_drv_resume(wpa_s);
389                 if (wpa_s->wpa_state == WPA_DISCONNECTED)
390                         wpa_supplicant_req_scan(wpa_s, 0, 100000);
391         }
392 }
393
394
395 #ifdef CONFIG_P2P
396
397 void wpas_notify_p2p_device_found(struct wpa_supplicant *wpa_s,
398                                   const u8 *dev_addr, int new_device)
399 {
400         if (new_device) {
401                 /* Create the new peer object */
402                 wpas_dbus_register_peer(wpa_s, dev_addr);
403         }
404
405         /* Notify a new peer has been detected*/
406         wpas_dbus_signal_peer_device_found(wpa_s, dev_addr);
407 }
408
409
410 void wpas_notify_p2p_device_lost(struct wpa_supplicant *wpa_s,
411                                  const u8 *dev_addr)
412 {
413         wpas_dbus_unregister_peer(wpa_s, dev_addr);
414
415         /* Create signal on interface object*/
416         wpas_dbus_signal_peer_device_lost(wpa_s, dev_addr);
417 }
418
419
420 void wpas_notify_p2p_group_removed(struct wpa_supplicant *wpa_s,
421                                    const struct wpa_ssid *ssid,
422                                    const char *role)
423 {
424         wpas_dbus_unregister_p2p_group(wpa_s, ssid);
425
426         wpas_dbus_signal_p2p_group_removed(wpa_s, role);
427 }
428
429
430 void wpas_notify_p2p_go_neg_req(struct wpa_supplicant *wpa_s,
431                                 const u8 *src, u16 dev_passwd_id)
432 {
433         wpas_dbus_signal_p2p_go_neg_req(wpa_s, src, dev_passwd_id);
434 }
435
436
437 void wpas_notify_p2p_go_neg_completed(struct wpa_supplicant *wpa_s, int status)
438 {
439         wpas_dbus_signal_p2p_go_neg_resp(wpa_s, status);
440 }
441
442
443 void wpas_notify_p2p_invitation_result(struct wpa_supplicant *wpa_s,
444                                        int status, const u8 *bssid)
445 {
446         wpas_dbus_signal_p2p_invitation_result(wpa_s, status, bssid);
447 }
448
449
450 void wpas_notify_p2p_sd_request(struct wpa_supplicant *wpa_s,
451                                 int freq, const u8 *sa, u8 dialog_token,
452                                 u16 update_indic, const u8 *tlvs,
453                                 size_t tlvs_len)
454 {
455         wpas_dbus_signal_p2p_sd_request(wpa_s, freq, sa, dialog_token,
456                                         update_indic, tlvs, tlvs_len);
457 }
458
459
460 void wpas_notify_p2p_sd_response(struct wpa_supplicant *wpa_s,
461                                  const u8 *sa, u16 update_indic,
462                                  const u8 *tlvs, size_t tlvs_len)
463 {
464         wpas_dbus_signal_p2p_sd_response(wpa_s, sa, update_indic,
465                                          tlvs, tlvs_len);
466 }
467
468
469 /**
470  * wpas_notify_p2p_provision_discovery - Notification of provision discovery
471  * @dev_addr: Who sent the request or responded to our request.
472  * @request: Will be 1 if request, 0 for response.
473  * @status: Valid only in case of response (0 in case of success)
474  * @config_methods: WPS config methods
475  * @generated_pin: PIN to be displayed in case of WPS_CONFIG_DISPLAY method
476  *
477  * This can be used to notify:
478  * - Requests or responses
479  * - Various config methods
480  * - Failure condition in case of response
481  */
482 void wpas_notify_p2p_provision_discovery(struct wpa_supplicant *wpa_s,
483                                          const u8 *dev_addr, int request,
484                                          enum p2p_prov_disc_status status,
485                                          u16 config_methods,
486                                          unsigned int generated_pin)
487 {
488         wpas_dbus_signal_p2p_provision_discovery(wpa_s, dev_addr, request,
489                                                  status, config_methods,
490                                                  generated_pin);
491 }
492
493
494 void wpas_notify_p2p_group_started(struct wpa_supplicant *wpa_s,
495                                    struct wpa_ssid *ssid, int network_id,
496                                    int client)
497 {
498         /* Notify a group has been started */
499         wpas_dbus_register_p2p_group(wpa_s, ssid);
500
501         wpas_dbus_signal_p2p_group_started(wpa_s, ssid, client, network_id);
502 }
503
504
505 void wpas_notify_p2p_wps_failed(struct wpa_supplicant *wpa_s,
506                                 struct wps_event_fail *fail)
507 {
508         wpas_dbus_signal_p2p_wps_failed(wpa_s, fail);
509 }
510
511 #endif /* CONFIG_P2P */
512
513
514 static void wpas_notify_ap_sta_authorized(struct wpa_supplicant *wpa_s,
515                                           const u8 *sta)
516 {
517 #ifdef CONFIG_P2P
518         /*
519          * Register a group member object corresponding to this peer and
520          * emit a PeerJoined signal. This will check if it really is a
521          * P2P group.
522          */
523         wpas_dbus_register_p2p_groupmember(wpa_s, sta);
524
525         /*
526          * Create 'peer-joined' signal on group object -- will also
527          * check P2P itself.
528          */
529         wpas_dbus_signal_p2p_peer_joined(wpa_s, sta);
530 #endif /* CONFIG_P2P */
531 }
532
533
534 static void wpas_notify_ap_sta_deauthorized(struct wpa_supplicant *wpa_s,
535                                             const u8 *sta)
536 {
537 #ifdef CONFIG_P2P
538         /*
539          * Unregister a group member object corresponding to this peer
540          * if this is a P2P group.
541          */
542         wpas_dbus_unregister_p2p_groupmember(wpa_s, sta);
543
544         /*
545          * Create 'peer-disconnected' signal on group object if this
546          * is a P2P group.
547          */
548         wpas_dbus_signal_p2p_peer_disconnected(wpa_s, sta);
549 #endif /* CONFIG_P2P */
550 }
551
552
553 void wpas_notify_sta_authorized(struct wpa_supplicant *wpa_s,
554                                 const u8 *mac_addr, int authorized)
555 {
556         if (authorized)
557                 wpas_notify_ap_sta_authorized(wpa_s, mac_addr);
558         else
559                 wpas_notify_ap_sta_deauthorized(wpa_s, mac_addr);
560 }
561
562
563 void wpas_notify_certification(struct wpa_supplicant *wpa_s, int depth,
564                                const char *subject, const char *cert_hash,
565                                const struct wpabuf *cert)
566 {
567         wpa_msg(wpa_s, MSG_INFO, WPA_EVENT_EAP_PEER_CERT
568                 "depth=%d subject='%s'%s%s",
569                 depth, subject,
570                 cert_hash ? " hash=" : "",
571                 cert_hash ? cert_hash : "");
572
573         if (cert) {
574                 char *cert_hex;
575                 size_t len = wpabuf_len(cert) * 2 + 1;
576                 cert_hex = os_malloc(len);
577                 if (cert_hex) {
578                         wpa_snprintf_hex(cert_hex, len, wpabuf_head(cert),
579                                          wpabuf_len(cert));
580                         wpa_msg_ctrl(wpa_s, MSG_INFO,
581                                      WPA_EVENT_EAP_PEER_CERT
582                                      "depth=%d subject='%s' cert=%s",
583                                      depth, subject, cert_hex);
584                         os_free(cert_hex);
585                 }
586         }
587
588         /* notify the old DBus API */
589         wpa_supplicant_dbus_notify_certification(wpa_s, depth, subject,
590                                                  cert_hash, cert);
591         /* notify the new DBus API */
592         wpas_dbus_signal_certification(wpa_s, depth, subject, cert_hash, cert);
593 }