Initial import of binutils 2.22 on the new vendor branch
[dragonfly.git] / contrib / wpa_supplicant / wpa_supplicant / ctrl_iface_dbus.c
1 /*
2  * WPA Supplicant / dbus-based control interface
3  * Copyright (c) 2006, Dan Williams <dcbw@redhat.com> and Red Hat, Inc.
4  *
5  * This program is free software; you can redistribute it and/or modify
6  * it under the terms of the GNU General Public License version 2 as
7  * published by the Free Software Foundation.
8  *
9  * Alternatively, this software may be distributed under the terms of BSD
10  * license.
11  *
12  * See README and COPYING for more details.
13  */
14
15 #include "includes.h"
16
17 #include "common.h"
18 #include "eloop.h"
19 #include "config.h"
20 #include "wpa_supplicant_i.h"
21 #include "wps/wps.h"
22 #include "ctrl_iface_dbus.h"
23 #include "ctrl_iface_dbus_handlers.h"
24
25 #define _DBUS_VERSION (DBUS_VERSION_MAJOR << 8 | DBUS_VERSION_MINOR)
26 #define DBUS_VER(major, minor) ((major) << 8 | (minor))
27
28 #if _DBUS_VERSION < DBUS_VER(1,1)
29 #define dbus_watch_get_unix_fd dbus_watch_get_fd
30 #endif
31
32
33 struct ctrl_iface_dbus_priv {
34         DBusConnection *con;
35         int should_dispatch;
36         struct wpa_global *global;
37
38         u32 next_objid;
39 };
40
41
42 static void process_watch(struct ctrl_iface_dbus_priv *iface,
43                           DBusWatch *watch, eloop_event_type type)
44 {
45         dbus_connection_ref(iface->con);
46
47         iface->should_dispatch = 0;
48
49         if (type == EVENT_TYPE_READ)
50                 dbus_watch_handle(watch, DBUS_WATCH_READABLE);
51         else if (type == EVENT_TYPE_WRITE)
52                 dbus_watch_handle(watch, DBUS_WATCH_WRITABLE);
53         else if (type == EVENT_TYPE_EXCEPTION)
54                 dbus_watch_handle(watch, DBUS_WATCH_ERROR);
55
56         if (iface->should_dispatch) {
57                 while (dbus_connection_get_dispatch_status(iface->con) ==
58                        DBUS_DISPATCH_DATA_REMAINS)
59                         dbus_connection_dispatch(iface->con);
60                 iface->should_dispatch = 0;
61         }
62
63         dbus_connection_unref(iface->con);
64 }
65
66
67 static void process_watch_exception(int sock, void *eloop_ctx, void *sock_ctx)
68 {
69         process_watch(eloop_ctx, sock_ctx, EVENT_TYPE_EXCEPTION);
70 }
71
72
73 static void process_watch_read(int sock, void *eloop_ctx, void *sock_ctx)
74 {
75         process_watch(eloop_ctx, sock_ctx, EVENT_TYPE_READ);
76 }
77
78
79 static void process_watch_write(int sock, void *eloop_ctx, void *sock_ctx)
80 {
81         process_watch(eloop_ctx, sock_ctx, EVENT_TYPE_WRITE);
82 }
83
84
85 static void connection_setup_add_watch(struct ctrl_iface_dbus_priv *iface,
86                                        DBusWatch *watch)
87 {
88         unsigned int flags;
89         int fd;
90
91         if (!dbus_watch_get_enabled(watch))
92                 return;
93
94         flags = dbus_watch_get_flags(watch);
95         fd = dbus_watch_get_unix_fd(watch);
96
97         eloop_register_sock(fd, EVENT_TYPE_EXCEPTION, process_watch_exception,
98                             iface, watch);
99
100         if (flags & DBUS_WATCH_READABLE) {
101                 eloop_register_sock(fd, EVENT_TYPE_READ, process_watch_read,
102                                     iface, watch);
103         }
104         if (flags & DBUS_WATCH_WRITABLE) {
105                 eloop_register_sock(fd, EVENT_TYPE_WRITE, process_watch_write,
106                                     iface, watch);
107         }
108
109         dbus_watch_set_data(watch, iface, NULL);
110 }
111
112
113 static void connection_setup_remove_watch(struct ctrl_iface_dbus_priv *iface,
114                                           DBusWatch *watch)
115 {
116         unsigned int flags;
117         int fd;
118
119         flags = dbus_watch_get_flags(watch);
120         fd = dbus_watch_get_unix_fd(watch);
121
122         eloop_unregister_sock(fd, EVENT_TYPE_EXCEPTION);
123
124         if (flags & DBUS_WATCH_READABLE)
125                 eloop_unregister_sock(fd, EVENT_TYPE_READ);
126         if (flags & DBUS_WATCH_WRITABLE)
127                 eloop_unregister_sock(fd, EVENT_TYPE_WRITE);
128
129         dbus_watch_set_data(watch, NULL, NULL);
130 }
131
132
133 static dbus_bool_t add_watch(DBusWatch *watch, void *data)
134 {
135         connection_setup_add_watch(data, watch);
136         return TRUE;
137 }
138
139
140 static void remove_watch(DBusWatch *watch, void *data)
141 {
142         connection_setup_remove_watch(data, watch);
143 }
144
145
146 static void watch_toggled(DBusWatch *watch, void *data)
147 {
148         if (dbus_watch_get_enabled(watch))
149                 add_watch(watch, data);
150         else
151                 remove_watch(watch, data);
152 }
153
154
155 static void process_timeout(void *eloop_ctx, void *sock_ctx)
156 {
157         DBusTimeout *timeout = sock_ctx;
158
159         dbus_timeout_handle(timeout);
160 }
161
162
163 static void connection_setup_add_timeout(struct ctrl_iface_dbus_priv *iface,
164                                          DBusTimeout *timeout)
165 {
166         if (!dbus_timeout_get_enabled(timeout))
167                 return;
168
169         eloop_register_timeout(0, dbus_timeout_get_interval(timeout) * 1000,
170                                process_timeout, iface, timeout);
171
172         dbus_timeout_set_data(timeout, iface, NULL);
173 }
174
175
176 static void connection_setup_remove_timeout(struct ctrl_iface_dbus_priv *iface,
177                                             DBusTimeout *timeout)
178 {
179         eloop_cancel_timeout(process_timeout, iface, timeout);
180         dbus_timeout_set_data(timeout, NULL, NULL);
181 }
182
183
184 static dbus_bool_t add_timeout(DBusTimeout *timeout, void *data)
185 {
186         if (!dbus_timeout_get_enabled(timeout))
187                 return TRUE;
188
189         connection_setup_add_timeout(data, timeout);
190
191         return TRUE;
192 }
193
194
195 static void remove_timeout(DBusTimeout *timeout, void *data)
196 {
197         connection_setup_remove_timeout(data, timeout);
198 }
199
200
201 static void timeout_toggled(DBusTimeout *timeout, void *data)
202 {
203         if (dbus_timeout_get_enabled(timeout))
204                 add_timeout(timeout, data);
205         else
206                 remove_timeout(timeout, data);
207 }
208
209
210 static void process_wakeup_main(int sig, void *eloop_ctx, void *signal_ctx)
211 {
212         struct ctrl_iface_dbus_priv *iface = signal_ctx;
213
214         if (sig != SIGPOLL || !iface->con)
215                 return;
216
217         if (dbus_connection_get_dispatch_status(iface->con) !=
218             DBUS_DISPATCH_DATA_REMAINS)
219                 return;
220
221         /* Only dispatch once - we do not want to starve other events */
222         dbus_connection_ref(iface->con);
223         dbus_connection_dispatch(iface->con);
224         dbus_connection_unref(iface->con);
225 }
226
227
228 /**
229  * wakeup_main - Attempt to wake our mainloop up
230  * @data: dbus control interface private data
231  *
232  * Try to wake up the main eloop so it will process
233  * dbus events that may have happened.
234  */
235 static void wakeup_main(void *data)
236 {
237         struct ctrl_iface_dbus_priv *iface = data;
238
239         /* Use SIGPOLL to break out of the eloop select() */
240         raise(SIGPOLL);
241         iface->should_dispatch = 1;
242 }
243
244
245 /**
246  * connection_setup_wakeup_main - Tell dbus about our wakeup_main function
247  * @iface: dbus control interface private data
248  * Returns: 0 on success, -1 on failure
249  *
250  * Register our wakeup_main handler with dbus
251  */
252 static int connection_setup_wakeup_main(struct ctrl_iface_dbus_priv *iface)
253 {
254         if (eloop_register_signal(SIGPOLL, process_wakeup_main, iface))
255                 return -1;
256
257         dbus_connection_set_wakeup_main_function(iface->con, wakeup_main,
258                                                  iface, NULL);
259
260         return 0;
261 }
262
263
264 /**
265  * wpa_supplicant_dbus_next_objid - Return next available object id
266  * @iface: dbus control interface private data
267  * Returns: Object id
268  */
269 u32 wpa_supplicant_dbus_next_objid (struct ctrl_iface_dbus_priv *iface)
270 {
271         return iface->next_objid++;
272 }
273
274
275 /**
276  * wpas_dbus_decompose_object_path - Decompose an interface object path into parts
277  * @path: The dbus object path
278  * @network: (out) the configured network this object path refers to, if any
279  * @bssid: (out) the scanned bssid this object path refers to, if any
280  * Returns: The object path of the network interface this path refers to
281  *
282  * For a given object path, decomposes the object path into object id, network,
283  * and BSSID parts, if those parts exist.
284  */
285 char * wpas_dbus_decompose_object_path(const char *path, char **network,
286                                        char **bssid)
287 {
288         const unsigned int dev_path_prefix_len =
289                 strlen(WPAS_DBUS_PATH_INTERFACES "/");
290         char *obj_path_only;
291         char *next_sep;
292
293         /* Be a bit paranoid about path */
294         if (!path || strncmp(path, WPAS_DBUS_PATH_INTERFACES "/",
295                              dev_path_prefix_len))
296                 return NULL;
297
298         /* Ensure there's something at the end of the path */
299         if ((path + dev_path_prefix_len)[0] == '\0')
300                 return NULL;
301
302         obj_path_only = strdup(path);
303         if (obj_path_only == NULL)
304                 return NULL;
305
306         next_sep = strchr(obj_path_only + dev_path_prefix_len, '/');
307         if (next_sep != NULL) {
308                 const char *net_part = strstr(next_sep,
309                                               WPAS_DBUS_NETWORKS_PART "/");
310                 const char *bssid_part = strstr(next_sep,
311                                                 WPAS_DBUS_BSSIDS_PART "/");
312
313                 if (network && net_part) {
314                         /* Deal with a request for a configured network */
315                         const char *net_name = net_part +
316                                 strlen(WPAS_DBUS_NETWORKS_PART "/");
317                         *network = NULL;
318                         if (strlen(net_name))
319                                 *network = strdup(net_name);
320                 } else if (bssid && bssid_part) {
321                         /* Deal with a request for a scanned BSSID */
322                         const char *bssid_name = bssid_part +
323                                 strlen(WPAS_DBUS_BSSIDS_PART "/");
324                         if (strlen(bssid_name))
325                                 *bssid = strdup(bssid_name);
326                         else
327                                 *bssid = NULL;
328                 }
329
330                 /* Cut off interface object path before "/" */
331                 *next_sep = '\0';
332         }
333
334         return obj_path_only;
335 }
336
337
338 /**
339  * wpas_dbus_new_invalid_iface_error - Return a new invalid interface error message
340  * @message: Pointer to incoming dbus message this error refers to
341  * Returns: A dbus error message
342  *
343  * Convenience function to create and return an invalid interface error
344  */
345 DBusMessage * wpas_dbus_new_invalid_iface_error(DBusMessage *message)
346 {
347         return dbus_message_new_error(message, WPAS_ERROR_INVALID_IFACE,
348                                       "wpa_supplicant knows nothing about "
349                                       "this interface.");
350 }
351
352
353 /**
354  * wpas_dbus_new_invalid_network_error - Return a new invalid network error message
355  * @message: Pointer to incoming dbus message this error refers to
356  * Returns: a dbus error message
357  *
358  * Convenience function to create and return an invalid network error
359  */
360 DBusMessage * wpas_dbus_new_invalid_network_error(DBusMessage *message)
361 {
362         return dbus_message_new_error(message, WPAS_ERROR_INVALID_NETWORK,
363                                       "The requested network does not exist.");
364 }
365
366
367 /**
368  * wpas_dbus_new_invalid_bssid_error - Return a new invalid bssid error message
369  * @message: Pointer to incoming dbus message this error refers to
370  * Returns: a dbus error message
371  *
372  * Convenience function to create and return an invalid bssid error
373  */
374 static DBusMessage * wpas_dbus_new_invalid_bssid_error(DBusMessage *message)
375 {
376         return dbus_message_new_error(message, WPAS_ERROR_INVALID_BSSID,
377                                       "The BSSID requested was invalid.");
378 }
379
380
381 /**
382  * wpas_dispatch_network_method - dispatch messages for configured networks
383  * @message: the incoming dbus message
384  * @wpa_s: a network interface's data
385  * @network_id: id of the configured network we're interested in
386  * Returns: a reply dbus message, or a dbus error message
387  *
388  * This function dispatches all incoming dbus messages for configured networks.
389  */
390 static DBusMessage * wpas_dispatch_network_method(DBusMessage *message,
391                                                   struct wpa_supplicant *wpa_s,
392                                                   int network_id)
393 {
394         DBusMessage *reply = NULL;
395         const char *method = dbus_message_get_member(message);
396         struct wpa_ssid *ssid;
397
398         ssid = wpa_config_get_network(wpa_s->conf, network_id);
399         if (ssid == NULL)
400                 return wpas_dbus_new_invalid_network_error(message);
401
402         if (!strcmp(method, "set"))
403                 reply = wpas_dbus_iface_set_network(message, wpa_s, ssid);
404         else if (!strcmp(method, "enable"))
405                 reply = wpas_dbus_iface_enable_network(message, wpa_s, ssid);
406         else if (!strcmp(method, "disable"))
407                 reply = wpas_dbus_iface_disable_network(message, wpa_s, ssid);
408
409         return reply;
410 }
411
412
413 /**
414  * wpas_dispatch_bssid_method - dispatch messages for scanned networks
415  * @message: the incoming dbus message
416  * @wpa_s: a network interface's data
417  * @bssid: bssid of the scanned network we're interested in
418  * Returns: a reply dbus message, or a dbus error message
419  *
420  * This function dispatches all incoming dbus messages for scanned networks.
421  */
422 static DBusMessage * wpas_dispatch_bssid_method(DBusMessage *message,
423                                                 struct wpa_supplicant *wpa_s,
424                                                 const char *bssid)
425 {
426         DBusMessage *reply = NULL;
427         const char *method = dbus_message_get_member(message);
428         struct wpa_scan_res *res = NULL;
429         size_t i;
430
431         /* Ensure we actually have scan data */
432         if (wpa_s->scan_res == NULL &&
433             wpa_supplicant_get_scan_results(wpa_s) < 0) {
434                 reply = wpas_dbus_new_invalid_bssid_error(message);
435                 goto out;
436         }
437
438         /* Find the bssid's scan data */
439         for (i = 0; i < wpa_s->scan_res->num; i++) {
440                 struct wpa_scan_res *search_res = wpa_s->scan_res->res[i];
441                 char mac_str[18];
442
443                 memset(mac_str, 0, sizeof(mac_str));
444                 snprintf(mac_str, sizeof(mac_str) - 1, WPAS_DBUS_BSSID_FORMAT,
445                          MAC2STR(search_res->bssid));
446                 if (!strcmp(bssid, mac_str)) {
447                         res = search_res;
448                         break;
449                 }
450         }
451
452         if (!res) {
453                 reply = wpas_dbus_new_invalid_bssid_error(message);
454                 goto out;
455         }
456
457         /* Dispatch the method call against the scanned bssid */
458         if (!strcmp(method, "properties"))
459                 reply = wpas_dbus_bssid_properties(message, wpa_s, res);
460
461 out:
462         return reply;
463 }
464
465
466 /**
467  * wpas_iface_message_handler - Dispatch messages for interfaces or networks
468  * @connection: Connection to the system message bus
469  * @message: An incoming dbus message
470  * @user_data: A pointer to a dbus control interface data structure
471  * Returns: Whether or not the message was handled
472  *
473  * This function dispatches all incoming dbus messages for network interfaces,
474  * or objects owned by them, such as scanned BSSIDs and configured networks.
475  */
476 static DBusHandlerResult wpas_iface_message_handler(DBusConnection *connection,
477                                                     DBusMessage *message,
478                                                     void *user_data)
479 {
480         struct wpa_supplicant *wpa_s = user_data;
481         const char *method = dbus_message_get_member(message);
482         const char *path = dbus_message_get_path(message);
483         const char *msg_interface = dbus_message_get_interface(message);
484         char *iface_obj_path = NULL;
485         char *network = NULL;
486         char *bssid = NULL;
487         DBusMessage *reply = NULL;
488
489         /* Caller must specify a message interface */
490         if (!msg_interface)
491                 goto out;
492
493         iface_obj_path = wpas_dbus_decompose_object_path(path, &network,
494                                                          &bssid);
495         if (iface_obj_path == NULL) {
496                 reply = wpas_dbus_new_invalid_iface_error(message);
497                 goto out;
498         }
499
500         /* Make sure the message's object path actually refers to the
501          * wpa_supplicant structure it's supposed to (which is wpa_s)
502          */
503         if (wpa_supplicant_get_iface_by_dbus_path(wpa_s->global,
504                                                   iface_obj_path) != wpa_s) {
505                 reply = wpas_dbus_new_invalid_iface_error(message);
506                 goto out;
507         }
508
509         if (network && !strcmp(msg_interface, WPAS_DBUS_IFACE_NETWORK)) {
510                 /* A method for one of this interface's configured networks */
511                 int nid = strtoul(network, NULL, 10);
512                 if (errno != EINVAL)
513                         reply = wpas_dispatch_network_method(message, wpa_s,
514                                                              nid);
515                 else
516                         reply = wpas_dbus_new_invalid_network_error(message);
517         } else if (bssid && !strcmp(msg_interface, WPAS_DBUS_IFACE_BSSID)) {
518                 /* A method for one of this interface's scanned BSSIDs */
519                 reply = wpas_dispatch_bssid_method(message, wpa_s, bssid);
520         } else if (!strcmp(msg_interface, WPAS_DBUS_IFACE_INTERFACE)) {
521                 /* A method for an interface only. */
522                 if (!strcmp(method, "scan"))
523                         reply = wpas_dbus_iface_scan(message, wpa_s);
524                 else if (!strcmp(method, "scanResults"))
525                         reply = wpas_dbus_iface_scan_results(message, wpa_s);
526                 else if (!strcmp(method, "addNetwork"))
527                         reply = wpas_dbus_iface_add_network(message, wpa_s);
528                 else if (!strcmp(method, "removeNetwork"))
529                         reply = wpas_dbus_iface_remove_network(message, wpa_s);
530                 else if (!strcmp(method, "selectNetwork"))
531                         reply = wpas_dbus_iface_select_network(message, wpa_s);
532                 else if (!strcmp(method, "capabilities"))
533                         reply = wpas_dbus_iface_capabilities(message, wpa_s);
534                 else if (!strcmp(method, "disconnect"))
535                         reply = wpas_dbus_iface_disconnect(message, wpa_s);
536                 else if (!strcmp(method, "setAPScan"))
537                         reply = wpas_dbus_iface_set_ap_scan(message, wpa_s);
538                 else if (!strcmp(method, "setSmartcardModules"))
539                         reply = wpas_dbus_iface_set_smartcard_modules(message,
540                                                                       wpa_s);
541                 else if (!strcmp(method, "state"))
542                         reply = wpas_dbus_iface_get_state(message, wpa_s);
543                 else if (!strcmp(method, "scanning"))
544                         reply = wpas_dbus_iface_get_scanning(message, wpa_s);
545                 else if (!strcmp(method, "setBlobs"))
546                         reply = wpas_dbus_iface_set_blobs(message, wpa_s);
547                 else if (!strcmp(method, "removeBlobs"))
548                         reply = wpas_dbus_iface_remove_blobs(message, wpa_s);
549         }
550
551         /* If the message was handled, send back the reply */
552         if (reply) {
553                 if (!dbus_message_get_no_reply(message))
554                         dbus_connection_send(connection, reply, NULL);
555                 dbus_message_unref(reply);
556         }
557
558 out:
559         free(iface_obj_path);
560         free(network);
561         free(bssid);
562         return reply ? DBUS_HANDLER_RESULT_HANDLED :
563                 DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
564 }
565
566
567 /**
568  * wpas_message_handler - dispatch incoming dbus messages
569  * @connection: connection to the system message bus
570  * @message: an incoming dbus message
571  * @user_data: a pointer to a dbus control interface data structure
572  * Returns: whether or not the message was handled
573  *
574  * This function dispatches all incoming dbus messages to the correct
575  * handlers, depending on what the message's target object path is,
576  * and what the method call is.
577  */
578 static DBusHandlerResult wpas_message_handler(DBusConnection *connection,
579         DBusMessage *message, void *user_data)
580 {
581         struct ctrl_iface_dbus_priv *ctrl_iface = user_data;
582         const char *method;
583         const char *path;
584         const char *msg_interface;
585         DBusMessage *reply = NULL;
586
587         method = dbus_message_get_member(message);
588         path = dbus_message_get_path(message);
589         msg_interface = dbus_message_get_interface(message);
590         if (!method || !path || !ctrl_iface || !msg_interface)
591                 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
592
593         /* Validate the method interface */
594         if (strcmp(msg_interface, WPAS_DBUS_INTERFACE) != 0)
595                 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
596
597         if (!strcmp(path, WPAS_DBUS_PATH)) {
598                 /* dispatch methods against our global dbus interface here */
599                 if (!strcmp(method, "addInterface")) {
600                         reply = wpas_dbus_global_add_interface(
601                                 message, ctrl_iface->global);
602                 } else if (!strcmp(method, "removeInterface")) {
603                         reply = wpas_dbus_global_remove_interface(
604                                 message, ctrl_iface->global);
605                 } else if (!strcmp(method, "getInterface")) {
606                         reply = wpas_dbus_global_get_interface(
607                                 message, ctrl_iface->global);
608                 } else if (!strcmp(method, "setDebugParams")) {
609                         reply = wpas_dbus_global_set_debugparams(
610                                 message, ctrl_iface->global);
611                 }
612         }
613
614         /* If the message was handled, send back the reply */
615         if (reply) {
616                 if (!dbus_message_get_no_reply(message))
617                         dbus_connection_send(connection, reply, NULL);
618                 dbus_message_unref(reply);
619         }
620
621         return reply ? DBUS_HANDLER_RESULT_HANDLED :
622                 DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
623 }
624
625
626 /**
627  * wpa_supplicant_dbus_notify_scan_results - Send a scan results signal
628  * @wpa_s: %wpa_supplicant network interface data
629  * Returns: 0 on success, -1 on failure
630  *
631  * Notify listeners that this interface has updated scan results.
632  */
633 void wpa_supplicant_dbus_notify_scan_results(struct wpa_supplicant *wpa_s)
634 {
635         struct ctrl_iface_dbus_priv *iface = wpa_s->global->dbus_ctrl_iface;
636         DBusMessage *_signal;
637         const char *path;
638
639         /* Do nothing if the control interface is not turned on */
640         if (iface == NULL)
641                 return;
642
643         path = wpa_supplicant_get_dbus_path(wpa_s);
644         if (path == NULL) {
645                 perror("wpa_supplicant_dbus_notify_scan_results[dbus]: "
646                        "interface didn't have a dbus path");
647                 wpa_printf(MSG_ERROR,
648                            "wpa_supplicant_dbus_notify_scan_results[dbus]: "
649                            "interface didn't have a dbus path; can't send "
650                            "scan result signal.");
651                 return;
652         }
653         _signal = dbus_message_new_signal(path, WPAS_DBUS_IFACE_INTERFACE,
654                                           "ScanResultsAvailable");
655         if (_signal == NULL) {
656                 perror("wpa_supplicant_dbus_notify_scan_results[dbus]: "
657                        "couldn't create dbus signal; likely out of memory");
658                 wpa_printf(MSG_ERROR, "dbus control interface: not enough "
659                            "memory to send scan results signal.");
660                 return;
661         }
662         dbus_connection_send(iface->con, _signal, NULL);
663         dbus_message_unref(_signal);
664 }
665
666
667 /**
668  * wpa_supplicant_dbus_notify_state_change - Send a state change signal
669  * @wpa_s: %wpa_supplicant network interface data
670  * @new_state: new state wpa_supplicant is entering
671  * @old_state: old state wpa_supplicant is leaving
672  * Returns: 0 on success, -1 on failure
673  *
674  * Notify listeners that wpa_supplicant has changed state
675  */
676 void wpa_supplicant_dbus_notify_state_change(struct wpa_supplicant *wpa_s,
677                                              wpa_states new_state,
678                                              wpa_states old_state)
679 {
680         struct ctrl_iface_dbus_priv *iface;
681         DBusMessage *_signal = NULL;
682         const char *path;
683         const char *new_state_str, *old_state_str;
684
685         /* Do nothing if the control interface is not turned on */
686         if (wpa_s->global == NULL)
687                 return;
688         iface = wpa_s->global->dbus_ctrl_iface;
689         if (iface == NULL)
690                 return;
691
692         /* Only send signal if state really changed */
693         if (new_state == old_state)
694                 return;
695
696         path = wpa_supplicant_get_dbus_path(wpa_s);
697         if (path == NULL) {
698                 perror("wpa_supplicant_dbus_notify_state_change[dbus]: "
699                        "interface didn't have a dbus path");
700                 wpa_printf(MSG_ERROR,
701                            "wpa_supplicant_dbus_notify_state_change[dbus]: "
702                            "interface didn't have a dbus path; can't send "
703                            "signal.");
704                 return;
705         }
706         _signal = dbus_message_new_signal(path, WPAS_DBUS_IFACE_INTERFACE,
707                                           "StateChange");
708         if (_signal == NULL) {
709                 perror("wpa_supplicant_dbus_notify_state_change[dbus]: "
710                        "couldn't create dbus signal; likely out of memory");
711                 wpa_printf(MSG_ERROR,
712                            "wpa_supplicant_dbus_notify_state_change[dbus]: "
713                            "couldn't create dbus signal; likely out of "
714                            "memory.");
715                 return;
716         }
717
718         new_state_str = wpa_supplicant_state_txt(new_state);
719         old_state_str = wpa_supplicant_state_txt(old_state);
720         if (new_state_str == NULL || old_state_str == NULL) {
721                 perror("wpa_supplicant_dbus_notify_state_change[dbus]: "
722                        "couldn't convert state strings");
723                 wpa_printf(MSG_ERROR,
724                            "wpa_supplicant_dbus_notify_state_change[dbus]: "
725                            "couldn't convert state strings.");
726                 goto out;
727         }
728
729         if (!dbus_message_append_args(_signal,
730                                       DBUS_TYPE_STRING, &new_state_str,
731                                       DBUS_TYPE_STRING, &old_state_str,
732                                       DBUS_TYPE_INVALID)) {
733                 perror("wpa_supplicant_dbus_notify_state_change[dbus]: "
734                        "not enough memory to construct state change signal.");
735                 wpa_printf(MSG_ERROR,
736                            "wpa_supplicant_dbus_notify_state_change[dbus]: "
737                            "not enough memory to construct state change "
738                            "signal.");
739                 goto out;
740         }
741
742         dbus_connection_send(iface->con, _signal, NULL);
743
744 out:
745         dbus_message_unref(_signal);
746 }
747
748
749 /**
750  * wpa_supplicant_dbus_notify_scanning - send scanning status
751  * @wpa_s: %wpa_supplicant network interface data
752  * Returns: 0 on success, -1 on failure
753  *
754  * Notify listeners of interface scanning state changes
755  */
756 void wpa_supplicant_dbus_notify_scanning(struct wpa_supplicant *wpa_s)
757 {
758         struct ctrl_iface_dbus_priv *iface = wpa_s->global->dbus_ctrl_iface;
759         DBusMessage *_signal;
760         const char *path;
761         dbus_bool_t scanning = wpa_s->scanning ? TRUE : FALSE;
762
763         /* Do nothing if the control interface is not turned on */
764         if (iface == NULL)
765                 return;
766
767         path = wpa_supplicant_get_dbus_path(wpa_s);
768         if (path == NULL) {
769                 perror("wpa_supplicant_dbus_notify_scanning[dbus]: interface "
770                        "didn't have a dbus path");
771                 wpa_printf(MSG_ERROR,
772                            "%s[dbus]: interface didn't have a dbus path; "
773                            "can't send scanning signal.", __FUNCTION__);
774                 return;
775         }
776         _signal = dbus_message_new_signal(path, WPAS_DBUS_IFACE_INTERFACE,
777                                           "Scanning");
778         if (_signal == NULL) {
779                 perror("wpa_supplicant_dbus_notify_scanning[dbus]: couldn't "
780                        "create dbus signal; likely out of memory");
781                 wpa_printf(MSG_ERROR, "%s[dbus]: dbus control interface: not "
782                            "enough memory to send scan results signal.",
783                            __FUNCTION__);
784                 return;
785         }
786
787         if (dbus_message_append_args(_signal,
788                                      DBUS_TYPE_BOOLEAN, &scanning,
789                                      DBUS_TYPE_INVALID)) {
790                 dbus_connection_send(iface->con, _signal, NULL);
791         } else {
792                 perror("wpa_supplicant_dbus_notify_scanning[dbus]: not enough "
793                        "memory to construct signal.");
794                 wpa_printf(MSG_ERROR, "%s[dbus]: not enough memory to "
795                            "construct signal.", __FUNCTION__);
796         }
797         dbus_message_unref(_signal);
798 }
799
800
801 #ifdef CONFIG_WPS
802 void wpa_supplicant_dbus_notify_wps_cred(struct wpa_supplicant *wpa_s,
803                                          const struct wps_credential *cred)
804 {
805         struct ctrl_iface_dbus_priv *iface;
806         DBusMessage *_signal = NULL;
807         const char *path;
808
809         /* Do nothing if the control interface is not turned on */
810         if (wpa_s->global == NULL)
811                 return;
812         iface = wpa_s->global->dbus_ctrl_iface;
813         if (iface == NULL)
814                 return;
815
816         path = wpa_supplicant_get_dbus_path(wpa_s);
817         if (path == NULL) {
818                 perror("wpa_supplicant_dbus_notify_wps_cred[dbus]: "
819                        "interface didn't have a dbus path");
820                 wpa_printf(MSG_ERROR,
821                            "wpa_supplicant_dbus_notify_wps_cred[dbus]: "
822                            "interface didn't have a dbus path; can't send "
823                            "signal.");
824                 return;
825         }
826         _signal = dbus_message_new_signal(path, WPAS_DBUS_IFACE_INTERFACE,
827                                           "WpsCred");
828         if (_signal == NULL) {
829                 perror("wpa_supplicant_dbus_notify_wps_cred[dbus]: "
830                        "couldn't create dbus signal; likely out of memory");
831                 wpa_printf(MSG_ERROR,
832                            "wpa_supplicant_dbus_notify_wps_cred[dbus]: "
833                            "couldn't create dbus signal; likely out of "
834                            "memory.");
835                 return;
836         }
837
838         if (!dbus_message_append_args(_signal,
839                                       DBUS_TYPE_ARRAY, DBUS_TYPE_BYTE,
840                                       &cred->cred_attr, cred->cred_attr_len,
841                                       DBUS_TYPE_INVALID)) {
842                 perror("wpa_supplicant_dbus_notify_wps_cred[dbus]: "
843                        "not enough memory to construct signal.");
844                 wpa_printf(MSG_ERROR,
845                            "wpa_supplicant_dbus_notify_wps_cred[dbus]: "
846                            "not enough memory to construct signal.");
847                 goto out;
848         }
849
850         dbus_connection_send(iface->con, _signal, NULL);
851
852 out:
853         dbus_message_unref(_signal);
854 }
855 #else /* CONFIG_WPS */
856 void wpa_supplicant_dbus_notify_wps_cred(struct wpa_supplicant *wpa_s,
857                                          const struct wps_credential *cred)
858 {
859 }
860 #endif /* CONFIG_WPS */
861
862
863 /**
864  * integrate_with_eloop - Register our mainloop integration with dbus
865  * @connection: connection to the system message bus
866  * @iface: a dbus control interface data structure
867  * Returns: 0 on success, -1 on failure
868  *
869  * We register our mainloop integration functions with dbus here.
870  */
871 static int integrate_with_eloop(DBusConnection *connection,
872         struct ctrl_iface_dbus_priv *iface)
873 {
874         if (!dbus_connection_set_watch_functions(connection, add_watch,
875                                                  remove_watch, watch_toggled,
876                                                  iface, NULL)) {
877                 perror("dbus_connection_set_watch_functions[dbus]");
878                 wpa_printf(MSG_ERROR, "Not enough memory to set up dbus.");
879                 return -1;
880         }
881
882         if (!dbus_connection_set_timeout_functions(connection, add_timeout,
883                                                    remove_timeout,
884                                                    timeout_toggled, iface,
885                                                    NULL)) {
886                 perror("dbus_connection_set_timeout_functions[dbus]");
887                 wpa_printf(MSG_ERROR, "Not enough memory to set up dbus.");
888                 return -1;
889         }
890
891         if (connection_setup_wakeup_main(iface) < 0) {
892                 perror("connection_setup_wakeup_main[dbus]");
893                 wpa_printf(MSG_ERROR, "Could not setup main wakeup function.");
894                 return -1;
895         }
896
897         return 0;
898 }
899
900
901 /**
902  * dispatch_initial_dbus_messages - Dispatch initial dbus messages after
903  *     claiming bus name
904  * @eloop_ctx: the DBusConnection to dispatch on
905  * @timeout_ctx: unused
906  *
907  * If clients are quick to notice that wpa_supplicant claimed its bus name,
908  * there may have been messages that came in before initialization was
909  * all finished.  Dispatch those here.
910  */
911 static void dispatch_initial_dbus_messages(void *eloop_ctx, void *timeout_ctx)
912 {
913         DBusConnection *con = eloop_ctx;
914
915         while (dbus_connection_get_dispatch_status(con) ==
916                DBUS_DISPATCH_DATA_REMAINS)
917                 dbus_connection_dispatch(con);
918 }
919
920
921 /**
922  * wpa_supplicant_dbus_ctrl_iface_init - Initialize dbus control interface
923  * @global: Pointer to global data from wpa_supplicant_init()
924  * Returns: Pointer to dbus_ctrl_iface date or %NULL on failure
925  *
926  * Initialize the dbus control interface and start receiving commands from
927  * external programs over the bus.
928  */
929 struct ctrl_iface_dbus_priv *
930 wpa_supplicant_dbus_ctrl_iface_init(struct wpa_global *global)
931 {
932         struct ctrl_iface_dbus_priv *iface;
933         DBusError error;
934         int ret = -1;
935         DBusObjectPathVTable wpas_vtable = {
936                 NULL, &wpas_message_handler, NULL, NULL, NULL, NULL
937         };
938
939         iface = os_zalloc(sizeof(struct ctrl_iface_dbus_priv));
940         if (iface == NULL)
941                 return NULL;
942
943         iface->global = global;
944
945         /* Get a reference to the system bus */
946         dbus_error_init(&error);
947         iface->con = dbus_bus_get(DBUS_BUS_SYSTEM, &error);
948         dbus_error_free(&error);
949         if (!iface->con) {
950                 perror("dbus_bus_get[ctrl_iface_dbus]");
951                 wpa_printf(MSG_ERROR, "Could not acquire the system bus.");
952                 goto fail;
953         }
954
955         /* Tell dbus about our mainloop integration functions */
956         if (integrate_with_eloop(iface->con, iface))
957                 goto fail;
958
959         /* Register the message handler for the global dbus interface */
960         if (!dbus_connection_register_object_path(iface->con,
961                                                   WPAS_DBUS_PATH, &wpas_vtable,
962                                                   iface)) {
963                 perror("dbus_connection_register_object_path[dbus]");
964                 wpa_printf(MSG_ERROR, "Could not set up DBus message "
965                            "handler.");
966                 goto fail;
967         }
968
969         /* Register our service with the message bus */
970         dbus_error_init(&error);
971         switch (dbus_bus_request_name(iface->con, WPAS_DBUS_SERVICE,
972                                       0, &error)) {
973         case DBUS_REQUEST_NAME_REPLY_PRIMARY_OWNER:
974                 ret = 0;
975                 break;
976         case DBUS_REQUEST_NAME_REPLY_EXISTS:
977         case DBUS_REQUEST_NAME_REPLY_IN_QUEUE:
978         case DBUS_REQUEST_NAME_REPLY_ALREADY_OWNER:
979                 perror("dbus_bus_request_name[dbus]");
980                 wpa_printf(MSG_ERROR, "Could not request DBus service name: "
981                            "already registered.");
982                 break;
983         default:
984                 perror("dbus_bus_request_name[dbus]");
985                 wpa_printf(MSG_ERROR, "Could not request DBus service name: "
986                            "%s %s.", error.name, error.message);
987                 break;
988         }
989         dbus_error_free(&error);
990
991         if (ret != 0)
992                 goto fail;
993
994         wpa_printf(MSG_DEBUG, "Providing DBus service '" WPAS_DBUS_SERVICE
995                    "'.");
996
997         /*
998          * Dispatch initial DBus messages that may have come in since the bus
999          * name was claimed above. Happens when clients are quick to notice the
1000          * wpa_supplicant service.
1001          *
1002          * FIXME: is there a better solution to this problem?
1003          */
1004         eloop_register_timeout(0, 50, dispatch_initial_dbus_messages,
1005                                iface->con, NULL);
1006
1007         return iface;
1008
1009 fail:
1010         wpa_supplicant_dbus_ctrl_iface_deinit(iface);
1011         return NULL;
1012 }
1013
1014
1015 /**
1016  * wpa_supplicant_dbus_ctrl_iface_deinit - Deinitialize dbus ctrl interface
1017  * @iface: Pointer to dbus private data from
1018  * wpa_supplicant_dbus_ctrl_iface_init()
1019  *
1020  * Deinitialize the dbus control interface that was initialized with
1021  * wpa_supplicant_dbus_ctrl_iface_init().
1022  */
1023 void wpa_supplicant_dbus_ctrl_iface_deinit(struct ctrl_iface_dbus_priv *iface)
1024 {
1025         if (iface == NULL)
1026                 return;
1027
1028         if (iface->con) {
1029                 eloop_cancel_timeout(dispatch_initial_dbus_messages,
1030                                      iface->con, NULL);
1031                 dbus_connection_set_watch_functions(iface->con, NULL, NULL,
1032                                                     NULL, NULL, NULL);
1033                 dbus_connection_set_timeout_functions(iface->con, NULL, NULL,
1034                                                       NULL, NULL, NULL);
1035                 dbus_connection_unref(iface->con);
1036         }
1037
1038         memset(iface, 0, sizeof(struct ctrl_iface_dbus_priv));
1039         free(iface);
1040 }
1041
1042
1043 /**
1044  * wpas_dbus_register_new_iface - Register a new interface with dbus
1045  * @wpa_s: %wpa_supplicant interface description structure to register
1046  * Returns: 0 on success, -1 on error
1047  *
1048  * Registers a new interface with dbus and assigns it a dbus object path.
1049  */
1050 int wpas_dbus_register_iface(struct wpa_supplicant *wpa_s)
1051 {
1052         struct ctrl_iface_dbus_priv *ctrl_iface =
1053                 wpa_s->global->dbus_ctrl_iface;
1054         DBusConnection * con;
1055         u32 next;
1056         DBusObjectPathVTable vtable = {
1057                 NULL, &wpas_iface_message_handler, NULL, NULL, NULL, NULL
1058         };
1059         char *path;
1060         int ret = -1;
1061
1062         /* Do nothing if the control interface is not turned on */
1063         if (ctrl_iface == NULL)
1064                 return 0;
1065
1066         con = ctrl_iface->con;
1067         next = wpa_supplicant_dbus_next_objid(ctrl_iface);
1068
1069         /* Create and set the interface's object path */
1070         path = os_zalloc(WPAS_DBUS_OBJECT_PATH_MAX);
1071         if (path == NULL)
1072                 return -1;
1073         snprintf(path, WPAS_DBUS_OBJECT_PATH_MAX,
1074                  WPAS_DBUS_PATH_INTERFACES "/%u",
1075                  next);
1076         if (wpa_supplicant_set_dbus_path(wpa_s, path)) {
1077                 wpa_printf(MSG_DEBUG,
1078                            "Failed to set dbus path for interface %s",
1079                            wpa_s->ifname);
1080                 goto out;
1081         }
1082
1083         /* Register the message handler for the interface functions */
1084         if (!dbus_connection_register_fallback(con, path, &vtable, wpa_s)) {
1085                 perror("wpas_dbus_register_iface [dbus]");
1086                 wpa_printf(MSG_ERROR, "Could not set up DBus message "
1087                            "handler for interface %s.", wpa_s->ifname);
1088                 goto out;
1089         }
1090         ret = 0;
1091
1092 out:
1093         free(path);
1094         return ret;
1095 }
1096
1097
1098 /**
1099  * wpas_dbus_unregister_iface - Unregister an interface from dbus
1100  * @wpa_s: wpa_supplicant interface structure
1101  * Returns: 0 on success, -1 on failure
1102  *
1103  * Unregisters the interface with dbus
1104  */
1105 int wpas_dbus_unregister_iface(struct wpa_supplicant *wpa_s)
1106 {
1107         struct ctrl_iface_dbus_priv *ctrl_iface;
1108         DBusConnection *con;
1109         const char *path;
1110
1111         /* Do nothing if the control interface is not turned on */
1112         if (wpa_s == NULL || wpa_s->global == NULL)
1113                 return 0;
1114         ctrl_iface = wpa_s->global->dbus_ctrl_iface;
1115         if (ctrl_iface == NULL)
1116                 return 0;
1117
1118         con = ctrl_iface->con;
1119         path = wpa_supplicant_get_dbus_path(wpa_s);
1120
1121         if (!dbus_connection_unregister_object_path(con, path))
1122                 return -1;
1123
1124         free(wpa_s->dbus_path);
1125         wpa_s->dbus_path = NULL;
1126
1127         return 0;
1128 }
1129
1130
1131 /**
1132  * wpa_supplicant_get_iface_by_dbus_path - Get a new network interface
1133  * @global: Pointer to global data from wpa_supplicant_init()
1134  * @path: Pointer to a dbus object path representing an interface
1135  * Returns: Pointer to the interface or %NULL if not found
1136  */
1137 struct wpa_supplicant * wpa_supplicant_get_iface_by_dbus_path(
1138         struct wpa_global *global, const char *path)
1139 {
1140         struct wpa_supplicant *wpa_s;
1141
1142         for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next) {
1143                 if (strcmp(wpa_s->dbus_path, path) == 0)
1144                         return wpa_s;
1145         }
1146         return NULL;
1147 }
1148
1149
1150 /**
1151  * wpa_supplicant_set_dbus_path - Assign a dbus path to an interface
1152  * @wpa_s: wpa_supplicant interface structure
1153  * @path: dbus path to set on the interface
1154  * Returns: 0 on succes, -1 on error
1155  */
1156 int wpa_supplicant_set_dbus_path(struct wpa_supplicant *wpa_s,
1157                                   const char *path)
1158 {
1159         u32 len = strlen (path);
1160         if (len >= WPAS_DBUS_OBJECT_PATH_MAX)
1161                 return -1;
1162         if (wpa_s->dbus_path)
1163                 return -1;
1164         wpa_s->dbus_path = strdup(path);
1165         return 0;
1166 }
1167
1168
1169 /**
1170  * wpa_supplicant_get_dbus_path - Get an interface's dbus path
1171  * @wpa_s: %wpa_supplicant interface structure
1172  * Returns: Interface's dbus object path, or %NULL on error
1173  */
1174 const char * wpa_supplicant_get_dbus_path(struct wpa_supplicant *wpa_s)
1175 {
1176         return wpa_s->dbus_path;
1177 }