]> CyberLeo.Net >> Repos - FreeBSD/releng/8.1.git/blob - contrib/wpa/wpa_supplicant/ctrl_iface_dbus.c
Copy stable/8 to releng/8.1 in preparation for 8.1-RC1.
[FreeBSD/releng/8.1.git] / contrib / wpa / wpa_supplicant / ctrl_iface_dbus.c
1 /*
2  * WPA Supplicant / dbus-based control interface
3  * Copyright (c) 2006, Dan Williams <dcbw@redhat.com> and Red Hat, Inc.
4  *
5  * This program is free software; you can redistribute it and/or modify
6  * it under the terms of the GNU General Public License version 2 as
7  * published by the Free Software Foundation.
8  *
9  * Alternatively, this software may be distributed under the terms of BSD
10  * license.
11  *
12  * See README and COPYING for more details.
13  */
14
15 #include "includes.h"
16
17 #include "common.h"
18 #include "eloop.h"
19 #include "config.h"
20 #include "wpa_supplicant_i.h"
21 #include "wps/wps.h"
22 #include "ctrl_iface_dbus.h"
23 #include "ctrl_iface_dbus_handlers.h"
24
25 #define _DBUS_VERSION (DBUS_VERSION_MAJOR << 8 | DBUS_VERSION_MINOR)
26 #define DBUS_VER(major, minor) ((major) << 8 | (minor))
27
28 #if _DBUS_VERSION < DBUS_VER(1,1)
29 #define dbus_watch_get_unix_fd dbus_watch_get_fd
30 #endif
31
32
33 struct ctrl_iface_dbus_priv {
34         DBusConnection *con;
35         int should_dispatch;
36         struct wpa_global *global;
37
38         u32 next_objid;
39 };
40
41
42 static void process_watch(struct ctrl_iface_dbus_priv *iface,
43                           DBusWatch *watch, eloop_event_type type)
44 {
45         dbus_connection_ref(iface->con);
46
47         iface->should_dispatch = 0;
48
49         if (type == EVENT_TYPE_READ)
50                 dbus_watch_handle(watch, DBUS_WATCH_READABLE);
51         else if (type == EVENT_TYPE_WRITE)
52                 dbus_watch_handle(watch, DBUS_WATCH_WRITABLE);
53         else if (type == EVENT_TYPE_EXCEPTION)
54                 dbus_watch_handle(watch, DBUS_WATCH_ERROR);
55
56         if (iface->should_dispatch) {
57                 while (dbus_connection_get_dispatch_status(iface->con) ==
58                        DBUS_DISPATCH_DATA_REMAINS)
59                         dbus_connection_dispatch(iface->con);
60                 iface->should_dispatch = 0;
61         }
62
63         dbus_connection_unref(iface->con);
64 }
65
66
67 static void process_watch_exception(int sock, void *eloop_ctx, void *sock_ctx)
68 {
69         process_watch(eloop_ctx, sock_ctx, EVENT_TYPE_EXCEPTION);
70 }
71
72
73 static void process_watch_read(int sock, void *eloop_ctx, void *sock_ctx)
74 {
75         process_watch(eloop_ctx, sock_ctx, EVENT_TYPE_READ);
76 }
77
78
79 static void process_watch_write(int sock, void *eloop_ctx, void *sock_ctx)
80 {
81         process_watch(eloop_ctx, sock_ctx, EVENT_TYPE_WRITE);
82 }
83
84
85 static void connection_setup_add_watch(struct ctrl_iface_dbus_priv *iface,
86                                        DBusWatch *watch)
87 {
88         unsigned int flags;
89         int fd;
90
91         if (!dbus_watch_get_enabled(watch))
92                 return;
93
94         flags = dbus_watch_get_flags(watch);
95         fd = dbus_watch_get_unix_fd(watch);
96
97         eloop_register_sock(fd, EVENT_TYPE_EXCEPTION, process_watch_exception,
98                             iface, watch);
99
100         if (flags & DBUS_WATCH_READABLE) {
101                 eloop_register_sock(fd, EVENT_TYPE_READ, process_watch_read,
102                                     iface, watch);
103         }
104         if (flags & DBUS_WATCH_WRITABLE) {
105                 eloop_register_sock(fd, EVENT_TYPE_WRITE, process_watch_write,
106                                     iface, watch);
107         }
108
109         dbus_watch_set_data(watch, iface, NULL);
110 }
111
112
113 static void connection_setup_remove_watch(struct ctrl_iface_dbus_priv *iface,
114                                           DBusWatch *watch)
115 {
116         unsigned int flags;
117         int fd;
118
119         flags = dbus_watch_get_flags(watch);
120         fd = dbus_watch_get_unix_fd(watch);
121
122         eloop_unregister_sock(fd, EVENT_TYPE_EXCEPTION);
123
124         if (flags & DBUS_WATCH_READABLE)
125                 eloop_unregister_sock(fd, EVENT_TYPE_READ);
126         if (flags & DBUS_WATCH_WRITABLE)
127                 eloop_unregister_sock(fd, EVENT_TYPE_WRITE);
128
129         dbus_watch_set_data(watch, NULL, NULL);
130 }
131
132
133 static dbus_bool_t add_watch(DBusWatch *watch, void *data)
134 {
135         connection_setup_add_watch(data, watch);
136         return TRUE;
137 }
138
139
140 static void remove_watch(DBusWatch *watch, void *data)
141 {
142         connection_setup_remove_watch(data, watch);
143 }
144
145
146 static void watch_toggled(DBusWatch *watch, void *data)
147 {
148         if (dbus_watch_get_enabled(watch))
149                 add_watch(watch, data);
150         else
151                 remove_watch(watch, data);
152 }
153
154
155 static void process_timeout(void *eloop_ctx, void *sock_ctx)
156 {
157         DBusTimeout *timeout = sock_ctx;
158
159         dbus_timeout_handle(timeout);
160 }
161
162
163 static void connection_setup_add_timeout(struct ctrl_iface_dbus_priv *iface,
164                                          DBusTimeout *timeout)
165 {
166         if (!dbus_timeout_get_enabled(timeout))
167                 return;
168
169         eloop_register_timeout(0, dbus_timeout_get_interval(timeout) * 1000,
170                                process_timeout, iface, timeout);
171
172         dbus_timeout_set_data(timeout, iface, NULL);
173 }
174
175
176 static void connection_setup_remove_timeout(struct ctrl_iface_dbus_priv *iface,
177                                             DBusTimeout *timeout)
178 {
179         eloop_cancel_timeout(process_timeout, iface, timeout);
180         dbus_timeout_set_data(timeout, NULL, NULL);
181 }
182
183
184 static dbus_bool_t add_timeout(DBusTimeout *timeout, void *data)
185 {
186         if (!dbus_timeout_get_enabled(timeout))
187                 return TRUE;
188
189         connection_setup_add_timeout(data, timeout);
190
191         return TRUE;
192 }
193
194
195 static void remove_timeout(DBusTimeout *timeout, void *data)
196 {
197         connection_setup_remove_timeout(data, timeout);
198 }
199
200
201 static void timeout_toggled(DBusTimeout *timeout, void *data)
202 {
203         if (dbus_timeout_get_enabled(timeout))
204                 add_timeout(timeout, data);
205         else
206                 remove_timeout(timeout, data);
207 }
208
209
210 static void process_wakeup_main(int sig, void *eloop_ctx, void *signal_ctx)
211 {
212         struct ctrl_iface_dbus_priv *iface = signal_ctx;
213
214         if (sig != SIGPOLL || !iface->con)
215                 return;
216
217         if (dbus_connection_get_dispatch_status(iface->con) !=
218             DBUS_DISPATCH_DATA_REMAINS)
219                 return;
220
221         /* Only dispatch once - we do not want to starve other events */
222         dbus_connection_ref(iface->con);
223         dbus_connection_dispatch(iface->con);
224         dbus_connection_unref(iface->con);
225 }
226
227
228 /**
229  * wakeup_main - Attempt to wake our mainloop up
230  * @data: dbus control interface private data
231  *
232  * Try to wake up the main eloop so it will process
233  * dbus events that may have happened.
234  */
235 static void wakeup_main(void *data)
236 {
237         struct ctrl_iface_dbus_priv *iface = data;
238
239         /* Use SIGPOLL to break out of the eloop select() */
240         raise(SIGPOLL);
241         iface->should_dispatch = 1;
242 }
243
244
245 /**
246  * connection_setup_wakeup_main - Tell dbus about our wakeup_main function
247  * @iface: dbus control interface private data
248  * Returns: 0 on success, -1 on failure
249  *
250  * Register our wakeup_main handler with dbus
251  */
252 static int connection_setup_wakeup_main(struct ctrl_iface_dbus_priv *iface)
253 {
254         if (eloop_register_signal(SIGPOLL, process_wakeup_main, iface))
255                 return -1;
256
257         dbus_connection_set_wakeup_main_function(iface->con, wakeup_main,
258                                                  iface, NULL);
259
260         return 0;
261 }
262
263
264 /**
265  * wpa_supplicant_dbus_next_objid - Return next available object id
266  * @iface: dbus control interface private data
267  * Returns: Object id
268  */
269 u32 wpa_supplicant_dbus_next_objid (struct ctrl_iface_dbus_priv *iface)
270 {
271         return iface->next_objid++;
272 }
273
274
275 /**
276  * wpas_dbus_decompose_object_path - Decompose an interface object path into parts
277  * @path: The dbus object path
278  * @network: (out) the configured network this object path refers to, if any
279  * @bssid: (out) the scanned bssid this object path refers to, if any
280  * Returns: The object path of the network interface this path refers to
281  *
282  * For a given object path, decomposes the object path into object id, network,
283  * and BSSID parts, if those parts exist.
284  */
285 char * wpas_dbus_decompose_object_path(const char *path, char **network,
286                                        char **bssid)
287 {
288         const unsigned int dev_path_prefix_len =
289                 strlen(WPAS_DBUS_PATH_INTERFACES "/");
290         char *obj_path_only;
291         char *next_sep;
292
293         /* Be a bit paranoid about path */
294         if (!path || strncmp(path, WPAS_DBUS_PATH_INTERFACES "/",
295                              dev_path_prefix_len))
296                 return NULL;
297
298         /* Ensure there's something at the end of the path */
299         if ((path + dev_path_prefix_len)[0] == '\0')
300                 return NULL;
301
302         obj_path_only = strdup(path);
303         if (obj_path_only == NULL)
304                 return NULL;
305
306         next_sep = strchr(obj_path_only + dev_path_prefix_len, '/');
307         if (next_sep != NULL) {
308                 const char *net_part = strstr(next_sep,
309                                               WPAS_DBUS_NETWORKS_PART "/");
310                 const char *bssid_part = strstr(next_sep,
311                                                 WPAS_DBUS_BSSIDS_PART "/");
312
313                 if (network && net_part) {
314                         /* Deal with a request for a configured network */
315                         const char *net_name = net_part +
316                                 strlen(WPAS_DBUS_NETWORKS_PART "/");
317                         *network = NULL;
318                         if (strlen(net_name))
319                                 *network = strdup(net_name);
320                 } else if (bssid && bssid_part) {
321                         /* Deal with a request for a scanned BSSID */
322                         const char *bssid_name = bssid_part +
323                                 strlen(WPAS_DBUS_BSSIDS_PART "/");
324                         if (strlen(bssid_name))
325                                 *bssid = strdup(bssid_name);
326                         else
327                                 *bssid = NULL;
328                 }
329
330                 /* Cut off interface object path before "/" */
331                 *next_sep = '\0';
332         }
333
334         return obj_path_only;
335 }
336
337
338 /**
339  * wpas_dbus_new_invalid_iface_error - Return a new invalid interface error message
340  * @message: Pointer to incoming dbus message this error refers to
341  * Returns: A dbus error message
342  *
343  * Convenience function to create and return an invalid interface error
344  */
345 DBusMessage * wpas_dbus_new_invalid_iface_error(DBusMessage *message)
346 {
347         return dbus_message_new_error(message, WPAS_ERROR_INVALID_IFACE,
348                                       "wpa_supplicant knows nothing about "
349                                       "this interface.");
350 }
351
352
353 /**
354  * wpas_dbus_new_invalid_network_error - Return a new invalid network error message
355  * @message: Pointer to incoming dbus message this error refers to
356  * Returns: a dbus error message
357  *
358  * Convenience function to create and return an invalid network error
359  */
360 DBusMessage * wpas_dbus_new_invalid_network_error(DBusMessage *message)
361 {
362         return dbus_message_new_error(message, WPAS_ERROR_INVALID_NETWORK,
363                                       "The requested network does not exist.");
364 }
365
366
367 /**
368  * wpas_dbus_new_invalid_bssid_error - Return a new invalid bssid error message
369  * @message: Pointer to incoming dbus message this error refers to
370  * Returns: a dbus error message
371  *
372  * Convenience function to create and return an invalid bssid error
373  */
374 static DBusMessage * wpas_dbus_new_invalid_bssid_error(DBusMessage *message)
375 {
376         return dbus_message_new_error(message, WPAS_ERROR_INVALID_BSSID,
377                                       "The BSSID requested was invalid.");
378 }
379
380
381 /**
382  * wpas_dispatch_network_method - dispatch messages for configured networks
383  * @message: the incoming dbus message
384  * @wpa_s: a network interface's data
385  * @network_id: id of the configured network we're interested in
386  * Returns: a reply dbus message, or a dbus error message
387  *
388  * This function dispatches all incoming dbus messages for configured networks.
389  */
390 static DBusMessage * wpas_dispatch_network_method(DBusMessage *message,
391                                                   struct wpa_supplicant *wpa_s,
392                                                   int network_id)
393 {
394         DBusMessage *reply = NULL;
395         const char *method = dbus_message_get_member(message);
396         struct wpa_ssid *ssid;
397
398         ssid = wpa_config_get_network(wpa_s->conf, network_id);
399         if (ssid == NULL)
400                 return wpas_dbus_new_invalid_network_error(message);
401
402         if (!strcmp(method, "set"))
403                 reply = wpas_dbus_iface_set_network(message, wpa_s, ssid);
404         else if (!strcmp(method, "enable"))
405                 reply = wpas_dbus_iface_enable_network(message, wpa_s, ssid);
406         else if (!strcmp(method, "disable"))
407                 reply = wpas_dbus_iface_disable_network(message, wpa_s, ssid);
408
409         return reply;
410 }
411
412
413 /**
414  * wpas_dispatch_bssid_method - dispatch messages for scanned networks
415  * @message: the incoming dbus message
416  * @wpa_s: a network interface's data
417  * @bssid: bssid of the scanned network we're interested in
418  * Returns: a reply dbus message, or a dbus error message
419  *
420  * This function dispatches all incoming dbus messages for scanned networks.
421  */
422 static DBusMessage * wpas_dispatch_bssid_method(DBusMessage *message,
423                                                 struct wpa_supplicant *wpa_s,
424                                                 const char *bssid)
425 {
426         DBusMessage *reply = NULL;
427         const char *method = dbus_message_get_member(message);
428         struct wpa_scan_res *res = NULL;
429         size_t i;
430
431         /* Ensure we actually have scan data */
432         if (wpa_s->scan_res == NULL &&
433             wpa_supplicant_get_scan_results(wpa_s) < 0) {
434                 reply = wpas_dbus_new_invalid_bssid_error(message);
435                 goto out;
436         }
437
438         /* Find the bssid's scan data */
439         for (i = 0; i < wpa_s->scan_res->num; i++) {
440                 struct wpa_scan_res *search_res = wpa_s->scan_res->res[i];
441                 char mac_str[18];
442
443                 memset(mac_str, 0, sizeof(mac_str));
444                 snprintf(mac_str, sizeof(mac_str) - 1, WPAS_DBUS_BSSID_FORMAT,
445                          MAC2STR(search_res->bssid));
446                 if (!strcmp(bssid, mac_str)) {
447                         res = search_res;
448                         break;
449                 }
450         }
451
452         if (!res) {
453                 reply = wpas_dbus_new_invalid_bssid_error(message);
454                 goto out;
455         }
456
457         /* Dispatch the method call against the scanned bssid */
458         if (!strcmp(method, "properties"))
459                 reply = wpas_dbus_bssid_properties(message, wpa_s, res);
460
461 out:
462         return reply;
463 }
464
465
466 /**
467  * wpas_iface_message_handler - Dispatch messages for interfaces or networks
468  * @connection: Connection to the system message bus
469  * @message: An incoming dbus message
470  * @user_data: A pointer to a dbus control interface data structure
471  * Returns: Whether or not the message was handled
472  *
473  * This function dispatches all incoming dbus messages for network interfaces,
474  * or objects owned by them, such as scanned BSSIDs and configured networks.
475  */
476 static DBusHandlerResult wpas_iface_message_handler(DBusConnection *connection,
477                                                     DBusMessage *message,
478                                                     void *user_data)
479 {
480         struct wpa_supplicant *wpa_s = user_data;
481         const char *method = dbus_message_get_member(message);
482         const char *path = dbus_message_get_path(message);
483         const char *msg_interface = dbus_message_get_interface(message);
484         char *iface_obj_path = NULL;
485         char *network = NULL;
486         char *bssid = NULL;
487         DBusMessage *reply = NULL;
488
489         /* Caller must specify a message interface */
490         if (!msg_interface)
491                 goto out;
492
493         iface_obj_path = wpas_dbus_decompose_object_path(path, &network,
494                                                          &bssid);
495         if (iface_obj_path == NULL) {
496                 reply = wpas_dbus_new_invalid_iface_error(message);
497                 goto out;
498         }
499
500         /* Make sure the message's object path actually refers to the
501          * wpa_supplicant structure it's supposed to (which is wpa_s)
502          */
503         if (wpa_supplicant_get_iface_by_dbus_path(wpa_s->global,
504                                                   iface_obj_path) != wpa_s) {
505                 reply = wpas_dbus_new_invalid_iface_error(message);
506                 goto out;
507         }
508
509         if (network && !strcmp(msg_interface, WPAS_DBUS_IFACE_NETWORK)) {
510                 /* A method for one of this interface's configured networks */
511                 int nid = strtoul(network, NULL, 10);
512                 if (errno != EINVAL)
513                         reply = wpas_dispatch_network_method(message, wpa_s,
514                                                              nid);
515                 else
516                         reply = wpas_dbus_new_invalid_network_error(message);
517         } else if (bssid && !strcmp(msg_interface, WPAS_DBUS_IFACE_BSSID)) {
518                 /* A method for one of this interface's scanned BSSIDs */
519                 reply = wpas_dispatch_bssid_method(message, wpa_s, bssid);
520         } else if (!strcmp(msg_interface, WPAS_DBUS_IFACE_INTERFACE)) {
521                 /* A method for an interface only. */
522                 if (!strcmp(method, "scan"))
523                         reply = wpas_dbus_iface_scan(message, wpa_s);
524                 else if (!strcmp(method, "scanResults"))
525                         reply = wpas_dbus_iface_scan_results(message, wpa_s);
526                 else if (!strcmp(method, "addNetwork"))
527                         reply = wpas_dbus_iface_add_network(message, wpa_s);
528                 else if (!strcmp(method, "removeNetwork"))
529                         reply = wpas_dbus_iface_remove_network(message, wpa_s);
530                 else if (!strcmp(method, "selectNetwork"))
531                         reply = wpas_dbus_iface_select_network(message, wpa_s);
532                 else if (!strcmp(method, "capabilities"))
533                         reply = wpas_dbus_iface_capabilities(message, wpa_s);
534                 else if (!strcmp(method, "disconnect"))
535                         reply = wpas_dbus_iface_disconnect(message, wpa_s);
536                 else if (!strcmp(method, "setAPScan"))
537                         reply = wpas_dbus_iface_set_ap_scan(message, wpa_s);
538                 else if (!strcmp(method, "setSmartcardModules"))
539                         reply = wpas_dbus_iface_set_smartcard_modules(message,
540                                                                       wpa_s);
541                 else if (!strcmp(method, "state"))
542                         reply = wpas_dbus_iface_get_state(message, wpa_s);
543                 else if (!strcmp(method, "setBlobs"))
544                         reply = wpas_dbus_iface_set_blobs(message, wpa_s);
545                 else if (!strcmp(method, "removeBlobs"))
546                         reply = wpas_dbus_iface_remove_blobs(message, wpa_s);
547         }
548
549         /* If the message was handled, send back the reply */
550         if (reply) {
551                 if (!dbus_message_get_no_reply(message))
552                         dbus_connection_send(connection, reply, NULL);
553                 dbus_message_unref(reply);
554         }
555
556 out:
557         free(iface_obj_path);
558         free(network);
559         free(bssid);
560         return reply ? DBUS_HANDLER_RESULT_HANDLED :
561                 DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
562 }
563
564
565 /**
566  * wpas_message_handler - dispatch incoming dbus messages
567  * @connection: connection to the system message bus
568  * @message: an incoming dbus message
569  * @user_data: a pointer to a dbus control interface data structure
570  * Returns: whether or not the message was handled
571  *
572  * This function dispatches all incoming dbus messages to the correct
573  * handlers, depending on what the message's target object path is,
574  * and what the method call is.
575  */
576 static DBusHandlerResult wpas_message_handler(DBusConnection *connection,
577         DBusMessage *message, void *user_data)
578 {
579         struct ctrl_iface_dbus_priv *ctrl_iface = user_data;
580         const char *method;
581         const char *path;
582         const char *msg_interface;
583         DBusMessage *reply = NULL;
584
585         method = dbus_message_get_member(message);
586         path = dbus_message_get_path(message);
587         msg_interface = dbus_message_get_interface(message);
588         if (!method || !path || !ctrl_iface || !msg_interface)
589                 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
590
591         /* Validate the method interface */
592         if (strcmp(msg_interface, WPAS_DBUS_INTERFACE) != 0)
593                 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
594
595         if (!strcmp(path, WPAS_DBUS_PATH)) {
596                 /* dispatch methods against our global dbus interface here */
597                 if (!strcmp(method, "addInterface")) {
598                         reply = wpas_dbus_global_add_interface(
599                                 message, ctrl_iface->global);
600                 } else if (!strcmp(method, "removeInterface")) {
601                         reply = wpas_dbus_global_remove_interface(
602                                 message, ctrl_iface->global);
603                 } else if (!strcmp(method, "getInterface")) {
604                         reply = wpas_dbus_global_get_interface(
605                                 message, ctrl_iface->global);
606                 }
607         }
608
609         /* If the message was handled, send back the reply */
610         if (reply) {
611                 if (!dbus_message_get_no_reply(message))
612                         dbus_connection_send(connection, reply, NULL);
613                 dbus_message_unref(reply);
614         }
615
616         return reply ? DBUS_HANDLER_RESULT_HANDLED :
617                 DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
618 }
619
620
621 /**
622  * wpa_supplicant_dbus_notify_scan_results - Send a scan results signal
623  * @wpa_s: %wpa_supplicant network interface data
624  * Returns: 0 on success, -1 on failure
625  *
626  * Notify listeners that this interface has updated scan results.
627  */
628 void wpa_supplicant_dbus_notify_scan_results(struct wpa_supplicant *wpa_s)
629 {
630         struct ctrl_iface_dbus_priv *iface = wpa_s->global->dbus_ctrl_iface;
631         DBusMessage *_signal;
632         const char *path;
633
634         /* Do nothing if the control interface is not turned on */
635         if (iface == NULL)
636                 return;
637
638         path = wpa_supplicant_get_dbus_path(wpa_s);
639         if (path == NULL) {
640                 perror("wpa_supplicant_dbus_notify_scan_results[dbus]: "
641                        "interface didn't have a dbus path");
642                 wpa_printf(MSG_ERROR,
643                            "wpa_supplicant_dbus_notify_scan_results[dbus]: "
644                            "interface didn't have a dbus path; can't send "
645                            "scan result signal.");
646                 return;
647         }
648         _signal = dbus_message_new_signal(path, WPAS_DBUS_IFACE_INTERFACE,
649                                           "ScanResultsAvailable");
650         if (_signal == NULL) {
651                 perror("wpa_supplicant_dbus_notify_scan_results[dbus]: "
652                        "couldn't create dbus signal; likely out of memory");
653                 wpa_printf(MSG_ERROR, "dbus control interface: not enough "
654                            "memory to send scan results signal.");
655                 return;
656         }
657         dbus_connection_send(iface->con, _signal, NULL);
658         dbus_message_unref(_signal);
659 }
660
661
662 /**
663  * wpa_supplicant_dbus_notify_state_change - Send a state change signal
664  * @wpa_s: %wpa_supplicant network interface data
665  * @new_state: new state wpa_supplicant is entering
666  * @old_state: old state wpa_supplicant is leaving
667  * Returns: 0 on success, -1 on failure
668  *
669  * Notify listeners that wpa_supplicant has changed state
670  */
671 void wpa_supplicant_dbus_notify_state_change(struct wpa_supplicant *wpa_s,
672                                              wpa_states new_state,
673                                              wpa_states old_state)
674 {
675         struct ctrl_iface_dbus_priv *iface;
676         DBusMessage *_signal = NULL;
677         const char *path;
678         const char *new_state_str, *old_state_str;
679
680         /* Do nothing if the control interface is not turned on */
681         if (wpa_s->global == NULL)
682                 return;
683         iface = wpa_s->global->dbus_ctrl_iface;
684         if (iface == NULL)
685                 return;
686
687         /* Only send signal if state really changed */
688         if (new_state == old_state)
689                 return;
690
691         path = wpa_supplicant_get_dbus_path(wpa_s);
692         if (path == NULL) {
693                 perror("wpa_supplicant_dbus_notify_state_change[dbus]: "
694                        "interface didn't have a dbus path");
695                 wpa_printf(MSG_ERROR,
696                            "wpa_supplicant_dbus_notify_state_change[dbus]: "
697                            "interface didn't have a dbus path; can't send "
698                            "signal.");
699                 return;
700         }
701         _signal = dbus_message_new_signal(path, WPAS_DBUS_IFACE_INTERFACE,
702                                           "StateChange");
703         if (_signal == NULL) {
704                 perror("wpa_supplicant_dbus_notify_state_change[dbus]: "
705                        "couldn't create dbus signal; likely out of memory");
706                 wpa_printf(MSG_ERROR,
707                            "wpa_supplicant_dbus_notify_state_change[dbus]: "
708                            "couldn't create dbus signal; likely out of "
709                            "memory.");
710                 return;
711         }
712
713         new_state_str = wpa_supplicant_state_txt(new_state);
714         old_state_str = wpa_supplicant_state_txt(old_state);
715         if (new_state_str == NULL || old_state_str == NULL) {
716                 perror("wpa_supplicant_dbus_notify_state_change[dbus]: "
717                        "couldn't convert state strings");
718                 wpa_printf(MSG_ERROR,
719                            "wpa_supplicant_dbus_notify_state_change[dbus]: "
720                            "couldn't convert state strings.");
721                 goto out;
722         }
723
724         if (!dbus_message_append_args(_signal,
725                                       DBUS_TYPE_STRING, &new_state_str,
726                                       DBUS_TYPE_STRING, &old_state_str,
727                                       DBUS_TYPE_INVALID)) {
728                 perror("wpa_supplicant_dbus_notify_state_change[dbus]: "
729                        "not enough memory to construct state change signal.");
730                 wpa_printf(MSG_ERROR,
731                            "wpa_supplicant_dbus_notify_state_change[dbus]: "
732                            "not enough memory to construct state change "
733                            "signal.");
734                 goto out;
735         }
736
737         dbus_connection_send(iface->con, _signal, NULL);
738
739 out:
740         dbus_message_unref(_signal);
741 }
742
743
744 #ifdef CONFIG_WPS
745 void wpa_supplicant_dbus_notify_wps_cred(struct wpa_supplicant *wpa_s,
746                                          const struct wps_credential *cred)
747 {
748         struct ctrl_iface_dbus_priv *iface;
749         DBusMessage *_signal = NULL;
750         const char *path;
751
752         /* Do nothing if the control interface is not turned on */
753         if (wpa_s->global == NULL)
754                 return;
755         iface = wpa_s->global->dbus_ctrl_iface;
756         if (iface == NULL)
757                 return;
758
759         path = wpa_supplicant_get_dbus_path(wpa_s);
760         if (path == NULL) {
761                 perror("wpa_supplicant_dbus_notify_wps_cred[dbus]: "
762                        "interface didn't have a dbus path");
763                 wpa_printf(MSG_ERROR,
764                            "wpa_supplicant_dbus_notify_wps_cred[dbus]: "
765                            "interface didn't have a dbus path; can't send "
766                            "signal.");
767                 return;
768         }
769         _signal = dbus_message_new_signal(path, WPAS_DBUS_IFACE_INTERFACE,
770                                           "WpsCred");
771         if (_signal == NULL) {
772                 perror("wpa_supplicant_dbus_notify_wps_cred[dbus]: "
773                        "couldn't create dbus signal; likely out of memory");
774                 wpa_printf(MSG_ERROR,
775                            "wpa_supplicant_dbus_notify_wps_cred[dbus]: "
776                            "couldn't create dbus signal; likely out of "
777                            "memory.");
778                 return;
779         }
780
781         if (!dbus_message_append_args(_signal,
782                                       DBUS_TYPE_ARRAY, DBUS_TYPE_BYTE,
783                                       &cred->cred_attr, cred->cred_attr_len,
784                                       DBUS_TYPE_INVALID)) {
785                 perror("wpa_supplicant_dbus_notify_wps_cred[dbus]: "
786                        "not enough memory to construct signal.");
787                 wpa_printf(MSG_ERROR,
788                            "wpa_supplicant_dbus_notify_wps_cred[dbus]: "
789                            "not enough memory to construct signal.");
790                 goto out;
791         }
792
793         dbus_connection_send(iface->con, _signal, NULL);
794
795 out:
796         dbus_message_unref(_signal);
797 }
798 #endif /* CONFIG_WPS */
799
800
801 /**
802  * integrate_with_eloop - Register our mainloop integration with dbus
803  * @connection: connection to the system message bus
804  * @iface: a dbus control interface data structure
805  * Returns: 0 on success, -1 on failure
806  *
807  * We register our mainloop integration functions with dbus here.
808  */
809 static int integrate_with_eloop(DBusConnection *connection,
810         struct ctrl_iface_dbus_priv *iface)
811 {
812         if (!dbus_connection_set_watch_functions(connection, add_watch,
813                                                  remove_watch, watch_toggled,
814                                                  iface, NULL)) {
815                 perror("dbus_connection_set_watch_functions[dbus]");
816                 wpa_printf(MSG_ERROR, "Not enough memory to set up dbus.");
817                 return -1;
818         }
819
820         if (!dbus_connection_set_timeout_functions(connection, add_timeout,
821                                                    remove_timeout,
822                                                    timeout_toggled, iface,
823                                                    NULL)) {
824                 perror("dbus_connection_set_timeout_functions[dbus]");
825                 wpa_printf(MSG_ERROR, "Not enough memory to set up dbus.");
826                 return -1;
827         }
828
829         if (connection_setup_wakeup_main(iface) < 0) {
830                 perror("connection_setup_wakeup_main[dbus]");
831                 wpa_printf(MSG_ERROR, "Could not setup main wakeup function.");
832                 return -1;
833         }
834
835         return 0;
836 }
837
838
839 /**
840  * dispatch_initial_dbus_messages - Dispatch initial dbus messages after
841  *     claiming bus name
842  * @eloop_ctx: the DBusConnection to dispatch on
843  * @timeout_ctx: unused
844  *
845  * If clients are quick to notice that wpa_supplicant claimed its bus name,
846  * there may have been messages that came in before initialization was
847  * all finished.  Dispatch those here.
848  */
849 static void dispatch_initial_dbus_messages(void *eloop_ctx, void *timeout_ctx)
850 {
851         DBusConnection *con = eloop_ctx;
852
853         while (dbus_connection_get_dispatch_status(con) ==
854                DBUS_DISPATCH_DATA_REMAINS)
855                 dbus_connection_dispatch(con);
856 }
857
858
859 /**
860  * wpa_supplicant_dbus_ctrl_iface_init - Initialize dbus control interface
861  * @global: Pointer to global data from wpa_supplicant_init()
862  * Returns: Pointer to dbus_ctrl_iface date or %NULL on failure
863  *
864  * Initialize the dbus control interface and start receiving commands from
865  * external programs over the bus.
866  */
867 struct ctrl_iface_dbus_priv *
868 wpa_supplicant_dbus_ctrl_iface_init(struct wpa_global *global)
869 {
870         struct ctrl_iface_dbus_priv *iface;
871         DBusError error;
872         int ret = -1;
873         DBusObjectPathVTable wpas_vtable = {
874                 NULL, &wpas_message_handler, NULL, NULL, NULL, NULL
875         };
876
877         iface = os_zalloc(sizeof(struct ctrl_iface_dbus_priv));
878         if (iface == NULL)
879                 return NULL;
880
881         iface->global = global;
882
883         /* Get a reference to the system bus */
884         dbus_error_init(&error);
885         iface->con = dbus_bus_get(DBUS_BUS_SYSTEM, &error);
886         dbus_error_free(&error);
887         if (!iface->con) {
888                 perror("dbus_bus_get[ctrl_iface_dbus]");
889                 wpa_printf(MSG_ERROR, "Could not acquire the system bus.");
890                 goto fail;
891         }
892
893         /* Tell dbus about our mainloop integration functions */
894         if (integrate_with_eloop(iface->con, iface))
895                 goto fail;
896
897         /* Register the message handler for the global dbus interface */
898         if (!dbus_connection_register_object_path(iface->con,
899                                                   WPAS_DBUS_PATH, &wpas_vtable,
900                                                   iface)) {
901                 perror("dbus_connection_register_object_path[dbus]");
902                 wpa_printf(MSG_ERROR, "Could not set up DBus message "
903                            "handler.");
904                 goto fail;
905         }
906
907         /* Register our service with the message bus */
908         dbus_error_init(&error);
909         switch (dbus_bus_request_name(iface->con, WPAS_DBUS_SERVICE,
910                                       0, &error)) {
911         case DBUS_REQUEST_NAME_REPLY_PRIMARY_OWNER:
912                 ret = 0;
913                 break;
914         case DBUS_REQUEST_NAME_REPLY_EXISTS:
915         case DBUS_REQUEST_NAME_REPLY_IN_QUEUE:
916         case DBUS_REQUEST_NAME_REPLY_ALREADY_OWNER:
917                 perror("dbus_bus_request_name[dbus]");
918                 wpa_printf(MSG_ERROR, "Could not request DBus service name: "
919                            "already registered.");
920                 break;
921         default:
922                 perror("dbus_bus_request_name[dbus]");
923                 wpa_printf(MSG_ERROR, "Could not request DBus service name: "
924                            "%s %s.", error.name, error.message);
925                 break;
926         }
927         dbus_error_free(&error);
928
929         if (ret != 0)
930                 goto fail;
931
932         wpa_printf(MSG_DEBUG, "Providing DBus service '" WPAS_DBUS_SERVICE
933                    "'.");
934
935         /*
936          * Dispatch initial DBus messages that may have come in since the bus
937          * name was claimed above. Happens when clients are quick to notice the
938          * wpa_supplicant service.
939          *
940          * FIXME: is there a better solution to this problem?
941          */
942         eloop_register_timeout(0, 50, dispatch_initial_dbus_messages,
943                                iface->con, NULL);
944
945         return iface;
946
947 fail:
948         wpa_supplicant_dbus_ctrl_iface_deinit(iface);
949         return NULL;
950 }
951
952
953 /**
954  * wpa_supplicant_dbus_ctrl_iface_deinit - Deinitialize dbus ctrl interface
955  * @iface: Pointer to dbus private data from
956  * wpa_supplicant_dbus_ctrl_iface_init()
957  *
958  * Deinitialize the dbus control interface that was initialized with
959  * wpa_supplicant_dbus_ctrl_iface_init().
960  */
961 void wpa_supplicant_dbus_ctrl_iface_deinit(struct ctrl_iface_dbus_priv *iface)
962 {
963         if (iface == NULL)
964                 return;
965
966         if (iface->con) {
967                 eloop_cancel_timeout(dispatch_initial_dbus_messages,
968                                      iface->con, NULL);
969                 dbus_connection_set_watch_functions(iface->con, NULL, NULL,
970                                                     NULL, NULL, NULL);
971                 dbus_connection_set_timeout_functions(iface->con, NULL, NULL,
972                                                       NULL, NULL, NULL);
973                 dbus_connection_unref(iface->con);
974         }
975
976         memset(iface, 0, sizeof(struct ctrl_iface_dbus_priv));
977         free(iface);
978 }
979
980
981 /**
982  * wpas_dbus_register_new_iface - Register a new interface with dbus
983  * @wpa_s: %wpa_supplicant interface description structure to register
984  * Returns: 0 on success, -1 on error
985  *
986  * Registers a new interface with dbus and assigns it a dbus object path.
987  */
988 int wpas_dbus_register_iface(struct wpa_supplicant *wpa_s)
989 {
990         struct ctrl_iface_dbus_priv *ctrl_iface =
991                 wpa_s->global->dbus_ctrl_iface;
992         DBusConnection * con;
993         u32 next;
994         DBusObjectPathVTable vtable = {
995                 NULL, &wpas_iface_message_handler, NULL, NULL, NULL, NULL
996         };
997         char *path;
998         int ret = -1;
999
1000         /* Do nothing if the control interface is not turned on */
1001         if (ctrl_iface == NULL)
1002                 return 0;
1003
1004         con = ctrl_iface->con;
1005         next = wpa_supplicant_dbus_next_objid(ctrl_iface);
1006
1007         /* Create and set the interface's object path */
1008         path = os_zalloc(WPAS_DBUS_OBJECT_PATH_MAX);
1009         if (path == NULL)
1010                 return -1;
1011         snprintf(path, WPAS_DBUS_OBJECT_PATH_MAX,
1012                  WPAS_DBUS_PATH_INTERFACES "/%u",
1013                  next);
1014         if (wpa_supplicant_set_dbus_path(wpa_s, path)) {
1015                 wpa_printf(MSG_DEBUG,
1016                            "Failed to set dbus path for interface %s",
1017                            wpa_s->ifname);
1018                 goto out;
1019         }
1020
1021         /* Register the message handler for the interface functions */
1022         if (!dbus_connection_register_fallback(con, path, &vtable, wpa_s)) {
1023                 perror("wpas_dbus_register_iface [dbus]");
1024                 wpa_printf(MSG_ERROR, "Could not set up DBus message "
1025                            "handler for interface %s.", wpa_s->ifname);
1026                 goto out;
1027         }
1028         ret = 0;
1029
1030 out:
1031         free(path);
1032         return ret;
1033 }
1034
1035
1036 /**
1037  * wpas_dbus_unregister_iface - Unregister an interface from dbus
1038  * @wpa_s: wpa_supplicant interface structure
1039  * Returns: 0 on success, -1 on failure
1040  *
1041  * Unregisters the interface with dbus
1042  */
1043 int wpas_dbus_unregister_iface(struct wpa_supplicant *wpa_s)
1044 {
1045         struct ctrl_iface_dbus_priv *ctrl_iface;
1046         DBusConnection *con;
1047         const char *path;
1048
1049         /* Do nothing if the control interface is not turned on */
1050         if (wpa_s == NULL || wpa_s->global == NULL)
1051                 return 0;
1052         ctrl_iface = wpa_s->global->dbus_ctrl_iface;
1053         if (ctrl_iface == NULL)
1054                 return 0;
1055
1056         con = ctrl_iface->con;
1057         path = wpa_supplicant_get_dbus_path(wpa_s);
1058
1059         if (!dbus_connection_unregister_object_path(con, path))
1060                 return -1;
1061
1062         free(wpa_s->dbus_path);
1063         wpa_s->dbus_path = NULL;
1064
1065         return 0;
1066 }
1067
1068
1069 /**
1070  * wpa_supplicant_get_iface_by_dbus_path - Get a new network interface
1071  * @global: Pointer to global data from wpa_supplicant_init()
1072  * @path: Pointer to a dbus object path representing an interface
1073  * Returns: Pointer to the interface or %NULL if not found
1074  */
1075 struct wpa_supplicant * wpa_supplicant_get_iface_by_dbus_path(
1076         struct wpa_global *global, const char *path)
1077 {
1078         struct wpa_supplicant *wpa_s;
1079
1080         for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next) {
1081                 if (strcmp(wpa_s->dbus_path, path) == 0)
1082                         return wpa_s;
1083         }
1084         return NULL;
1085 }
1086
1087
1088 /**
1089  * wpa_supplicant_set_dbus_path - Assign a dbus path to an interface
1090  * @wpa_s: wpa_supplicant interface structure
1091  * @path: dbus path to set on the interface
1092  * Returns: 0 on succes, -1 on error
1093  */
1094 int wpa_supplicant_set_dbus_path(struct wpa_supplicant *wpa_s,
1095                                   const char *path)
1096 {
1097         u32 len = strlen (path);
1098         if (len >= WPAS_DBUS_OBJECT_PATH_MAX)
1099                 return -1;
1100         if (wpa_s->dbus_path)
1101                 return -1;
1102         wpa_s->dbus_path = strdup(path);
1103         return 0;
1104 }
1105
1106
1107 /**
1108  * wpa_supplicant_get_dbus_path - Get an interface's dbus path
1109  * @wpa_s: %wpa_supplicant interface structure
1110  * Returns: Interface's dbus object path, or %NULL on error
1111  */
1112 const char * wpa_supplicant_get_dbus_path(struct wpa_supplicant *wpa_s)
1113 {
1114         return wpa_s->dbus_path;
1115 }