LCOV - code coverage report
Current view: top level - wpa_supplicant/dbus - dbus_new_handlers_wps.c (source / functions) Hit Total Coverage
Test: wpa_supplicant/hostapd combined for hwsim test run 1475438200 Lines: 169 176 96.0 %
Date: 2016-10-02 Functions: 12 12 100.0 %

          Line data    Source code
       1             : /*
       2             :  * WPA Supplicant / dbus-based control interface (WPS)
       3             :  * Copyright (c) 2006, Dan Williams <dcbw@redhat.com> and Red Hat, Inc.
       4             :  * Copyright (c) 2009, Witold Sowa <witold.sowa@gmail.com>
       5             :  *
       6             :  * This software may be distributed under the terms of the BSD license.
       7             :  * See README for more details.
       8             :  */
       9             : 
      10             : #include "includes.h"
      11             : 
      12             : #include "common.h"
      13             : #include "../config.h"
      14             : #include "../wpa_supplicant_i.h"
      15             : #include "../wps_supplicant.h"
      16             : #include "../driver_i.h"
      17             : #include "../ap.h"
      18             : #include "dbus_new_helpers.h"
      19             : #include "dbus_new.h"
      20             : #include "dbus_new_handlers.h"
      21             : #include "dbus_dict_helpers.h"
      22             : 
      23             : 
      24             : struct wps_start_params {
      25             :         int role; /* 0 - not set, 1 - enrollee, 2 - registrar */
      26             :         int type; /* 0 - not set, 1 - pin,      2 - pbc       */
      27             :         u8 *bssid;
      28             :         char *pin;
      29             :         u8 *p2p_dev_addr;
      30             : };
      31             : 
      32             : 
      33          23 : static int wpas_dbus_handler_wps_role(DBusMessage *message,
      34             :                                       DBusMessageIter *entry_iter,
      35             :                                       struct wps_start_params *params,
      36             :                                       DBusMessage **reply)
      37             : {
      38             :         DBusMessageIter variant_iter;
      39             :         char *val;
      40             : 
      41          23 :         dbus_message_iter_recurse(entry_iter, &variant_iter);
      42          23 :         if (dbus_message_iter_get_arg_type(&variant_iter) !=
      43             :             DBUS_TYPE_STRING) {
      44           1 :                 wpa_printf(MSG_DEBUG,
      45             :                            "dbus: WPS.Start - Wrong Role type, string required");
      46           1 :                 *reply = wpas_dbus_error_invalid_args(message,
      47             :                                                       "Role must be a string");
      48           1 :                 return -1;
      49             :         }
      50          22 :         dbus_message_iter_get_basic(&variant_iter, &val);
      51          22 :         if (os_strcmp(val, "enrollee") == 0)
      52          15 :                 params->role = 1;
      53           7 :         else if (os_strcmp(val, "registrar") == 0)
      54           6 :                 params->role = 2;
      55             :         else {
      56           1 :                 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Unknown role %s", val);
      57           1 :                 *reply = wpas_dbus_error_invalid_args(message, val);
      58           1 :                 return -1;
      59             :         }
      60          21 :         return 0;
      61             : }
      62             : 
      63             : 
      64          25 : static int wpas_dbus_handler_wps_type(DBusMessage *message,
      65             :                                       DBusMessageIter *entry_iter,
      66             :                                       struct wps_start_params *params,
      67             :                                       DBusMessage **reply)
      68             : {
      69             :         DBusMessageIter variant_iter;
      70             :         char *val;
      71             : 
      72          25 :         dbus_message_iter_recurse(entry_iter, &variant_iter);
      73          25 :         if (dbus_message_iter_get_arg_type(&variant_iter) != DBUS_TYPE_STRING) {
      74           1 :                 wpa_printf(MSG_DEBUG,
      75             :                            "dbus: WPS.Start - Wrong Type type, string required");
      76           1 :                 *reply = wpas_dbus_error_invalid_args(message,
      77             :                                                       "Type must be a string");
      78           1 :                 return -1;
      79             :         }
      80          24 :         dbus_message_iter_get_basic(&variant_iter, &val);
      81          24 :         if (os_strcmp(val, "pin") == 0)
      82          12 :                 params->type = 1;
      83          12 :         else if (os_strcmp(val, "pbc") == 0)
      84          11 :                 params->type = 2;
      85             :         else {
      86           1 :                 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Unknown type %s",
      87             :                            val);
      88           1 :                 *reply = wpas_dbus_error_invalid_args(message, val);
      89           1 :                 return -1;
      90             :         }
      91          23 :         return 0;
      92             : }
      93             : 
      94             : 
      95          10 : static int wpas_dbus_handler_wps_bssid(DBusMessage *message,
      96             :                                        DBusMessageIter *entry_iter,
      97             :                                        struct wps_start_params *params,
      98             :                                        DBusMessage **reply)
      99             : {
     100             :         DBusMessageIter variant_iter, array_iter;
     101             :         int len;
     102             : 
     103          10 :         dbus_message_iter_recurse(entry_iter, &variant_iter);
     104          19 :         if (dbus_message_iter_get_arg_type(&variant_iter) != DBUS_TYPE_ARRAY ||
     105           9 :             dbus_message_iter_get_element_type(&variant_iter) !=
     106             :             DBUS_TYPE_BYTE) {
     107           1 :                 wpa_printf(MSG_DEBUG,
     108             :                            "dbus: WPS.Start - Wrong Bssid type, byte array required");
     109           1 :                 *reply = wpas_dbus_error_invalid_args(
     110             :                         message, "Bssid must be a byte array");
     111           1 :                 return -1;
     112             :         }
     113           9 :         dbus_message_iter_recurse(&variant_iter, &array_iter);
     114           9 :         dbus_message_iter_get_fixed_array(&array_iter, &params->bssid, &len);
     115           9 :         if (len != ETH_ALEN) {
     116           1 :                 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Wrong Bssid length %d",
     117             :                            len);
     118           1 :                 *reply = wpas_dbus_error_invalid_args(message,
     119             :                                                       "Bssid is wrong length");
     120           1 :                 return -1;
     121             :         }
     122           8 :         return 0;
     123             : }
     124             : 
     125             : 
     126          10 : static int wpas_dbus_handler_wps_pin(DBusMessage *message,
     127             :                                      DBusMessageIter *entry_iter,
     128             :                                      struct wps_start_params *params,
     129             :                                      DBusMessage **reply)
     130             : {
     131             :         DBusMessageIter variant_iter;
     132             : 
     133          10 :         dbus_message_iter_recurse(entry_iter, &variant_iter);
     134          10 :         if (dbus_message_iter_get_arg_type(&variant_iter) != DBUS_TYPE_STRING) {
     135           1 :                 wpa_printf(MSG_DEBUG,
     136             :                            "dbus: WPS.Start - Wrong Pin type, string required");
     137           1 :                 *reply = wpas_dbus_error_invalid_args(message,
     138             :                                                       "Pin must be a string");
     139           1 :                 return -1;
     140             :         }
     141           9 :         dbus_message_iter_get_basic(&variant_iter, &params->pin);
     142           9 :         return 0;
     143             : }
     144             : 
     145             : 
     146             : #ifdef CONFIG_P2P
     147           7 : static int wpas_dbus_handler_wps_p2p_dev_addr(DBusMessage *message,
     148             :                                               DBusMessageIter *entry_iter,
     149             :                                               struct wps_start_params *params,
     150             :                                               DBusMessage **reply)
     151             : {
     152             :         DBusMessageIter variant_iter, array_iter;
     153             :         int len;
     154             : 
     155           7 :         dbus_message_iter_recurse(entry_iter, &variant_iter);
     156          13 :         if (dbus_message_iter_get_arg_type(&variant_iter) != DBUS_TYPE_ARRAY ||
     157           6 :             dbus_message_iter_get_element_type(&variant_iter) !=
     158             :             DBUS_TYPE_BYTE) {
     159           1 :                 wpa_printf(MSG_DEBUG,
     160             :                            "dbus: WPS.Start - Wrong P2PDeviceAddress type, byte array required");
     161           1 :                 *reply = wpas_dbus_error_invalid_args(
     162             :                         message, "P2PDeviceAddress must be a byte array");
     163           1 :                 return -1;
     164             :         }
     165           6 :         dbus_message_iter_recurse(&variant_iter, &array_iter);
     166           6 :         dbus_message_iter_get_fixed_array(&array_iter, &params->p2p_dev_addr,
     167             :                                           &len);
     168           6 :         if (len != ETH_ALEN) {
     169           1 :                 wpa_printf(MSG_DEBUG,
     170             :                            "dbus: WPS.Start - Wrong P2PDeviceAddress length %d",
     171             :                            len);
     172           1 :                 *reply = wpas_dbus_error_invalid_args(
     173             :                         message, "P2PDeviceAddress has wrong length");
     174           1 :                 return -1;
     175             :         }
     176           5 :         return 0;
     177             : }
     178             : #endif /* CONFIG_P2P */
     179             : 
     180             : 
     181          76 : static int wpas_dbus_handler_wps_start_entry(DBusMessage *message, char *key,
     182             :                                              DBusMessageIter *entry_iter,
     183             :                                              struct wps_start_params *params,
     184             :                                              DBusMessage **reply)
     185             : {
     186          76 :         if (os_strcmp(key, "Role") == 0)
     187          23 :                 return wpas_dbus_handler_wps_role(message, entry_iter,
     188             :                                                   params, reply);
     189          53 :         else if (os_strcmp(key, "Type") == 0)
     190          25 :                 return wpas_dbus_handler_wps_type(message, entry_iter,
     191             :                                                   params, reply);
     192          28 :         else if (os_strcmp(key, "Bssid") == 0)
     193          10 :                 return wpas_dbus_handler_wps_bssid(message, entry_iter,
     194             :                                                    params, reply);
     195          18 :         else if (os_strcmp(key, "Pin") == 0)
     196          10 :                 return wpas_dbus_handler_wps_pin(message, entry_iter,
     197             :                                                  params, reply);
     198             : #ifdef CONFIG_P2P
     199           8 :         else if (os_strcmp(key, "P2PDeviceAddress") == 0)
     200           7 :                 return wpas_dbus_handler_wps_p2p_dev_addr(message, entry_iter,
     201             :                                                           params, reply);
     202             : #endif /* CONFIG_P2P */
     203             : 
     204           1 :         wpa_printf(MSG_DEBUG, "dbus: WPS.Start - unknown key %s", key);
     205           1 :         *reply = wpas_dbus_error_invalid_args(message, key);
     206           1 :         return -1;
     207             : }
     208             : 
     209             : 
     210             : /**
     211             :  * wpas_dbus_handler_wps_start - Start WPS configuration
     212             :  * @message: Pointer to incoming dbus message
     213             :  * @wpa_s: %wpa_supplicant data structure
     214             :  * Returns: DBus message dictionary on success or DBus error on failure
     215             :  *
     216             :  * Handler for "Start" method call. DBus dictionary argument contains
     217             :  * information about role (enrollee or registrar), authorization method
     218             :  * (pin or push button) and optionally pin and bssid. Returned message
     219             :  * has a dictionary argument which may contain newly generated pin (optional).
     220             :  */
     221          27 : DBusMessage * wpas_dbus_handler_wps_start(DBusMessage *message,
     222             :                                           struct wpa_supplicant *wpa_s)
     223             : {
     224          27 :         DBusMessage *reply = NULL;
     225             :         DBusMessageIter iter, dict_iter, entry_iter;
     226             :         struct wps_start_params params;
     227             :         char *key;
     228          27 :         char npin[9] = { '\0' };
     229             :         int ret;
     230             : 
     231          27 :         os_memset(&params, 0, sizeof(params));
     232          27 :         dbus_message_iter_init(message, &iter);
     233             : 
     234          27 :         dbus_message_iter_recurse(&iter, &dict_iter);
     235         120 :         while (dbus_message_iter_get_arg_type(&dict_iter) ==
     236             :                DBUS_TYPE_DICT_ENTRY) {
     237          76 :                 dbus_message_iter_recurse(&dict_iter, &entry_iter);
     238             : 
     239          76 :                 dbus_message_iter_get_basic(&entry_iter, &key);
     240          76 :                 dbus_message_iter_next(&entry_iter);
     241             : 
     242          76 :                 if (wpas_dbus_handler_wps_start_entry(message, key,
     243             :                                                       &entry_iter,
     244             :                                                       &params, &reply))
     245          10 :                         return reply;
     246             : 
     247          66 :                 dbus_message_iter_next(&dict_iter);
     248             :         }
     249             : 
     250             : #ifdef CONFIG_AP
     251          17 :         if (wpa_s->ap_iface && params.type == 1) {
     252           5 :                 if (params.pin == NULL) {
     253           1 :                         wpa_printf(MSG_DEBUG,
     254             :                                    "dbus: WPS.Start - Pin required for registrar role");
     255           1 :                         return wpas_dbus_error_invalid_args(
     256             :                                 message, "Pin required for registrar role.");
     257             :                 }
     258           4 :                 ret = wpa_supplicant_ap_wps_pin(wpa_s,
     259           4 :                                                 params.bssid,
     260           4 :                                                 params.pin,
     261             :                                                 npin, sizeof(npin), 0);
     262          12 :         } else if (wpa_s->ap_iface) {
     263           1 :                 ret = wpa_supplicant_ap_wps_pbc(wpa_s,
     264           1 :                                                 params.bssid,
     265           1 :                                                 params.p2p_dev_addr);
     266             :         } else
     267             : #endif /* CONFIG_AP */
     268          11 :         if (params.role == 0) {
     269           1 :                 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Role not specified");
     270           1 :                 return wpas_dbus_error_invalid_args(message,
     271             :                                                     "Role not specified");
     272          10 :         } else if (params.role == 2) {
     273           2 :                 if (params.pin == NULL) {
     274           1 :                         wpa_printf(MSG_DEBUG,
     275             :                                    "dbus: WPS.Start - Pin required for registrar role");
     276           1 :                         return wpas_dbus_error_invalid_args(
     277             :                                 message, "Pin required for registrar role.");
     278             :                 }
     279           1 :                 ret = wpas_wps_start_reg(wpa_s, params.bssid, params.pin,
     280             :                                          NULL);
     281           8 :         } else if (params.type == 0) {
     282           1 :                 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Type not specified");
     283           1 :                 return wpas_dbus_error_invalid_args(message,
     284             :                                                     "Type not specified");
     285           7 :         } else if (params.type == 1) {
     286           5 :                 ret = wpas_wps_start_pin(wpa_s, params.bssid,
     287           5 :                                          params.pin, 0,
     288             :                                          DEV_PW_DEFAULT);
     289           5 :                 if (ret > 0)
     290           1 :                         os_snprintf(npin, sizeof(npin), "%08d", ret);
     291             :         } else {
     292           2 :                 ret = wpas_wps_start_pbc(wpa_s, params.bssid, 0);
     293             :         }
     294             : 
     295          13 :         if (ret < 0) {
     296           3 :                 wpa_printf(MSG_DEBUG,
     297             :                            "dbus: WPS.Start wpas_wps_failed in role %s and key %s",
     298           1 :                            (params.role == 1 ? "enrollee" : "registrar"),
     299           1 :                            (params.type == 0 ? "" :
     300           1 :                             (params.type == 1 ? "pin" : "pbc")));
     301           1 :                 return wpas_dbus_error_unknown_error(message,
     302             :                                                      "WPS start failed");
     303             :         }
     304             : 
     305          12 :         reply = dbus_message_new_method_return(message);
     306          12 :         if (!reply)
     307           0 :                 return wpas_dbus_error_no_memory(message);
     308             : 
     309          12 :         dbus_message_iter_init_append(reply, &iter);
     310          24 :         if (!wpa_dbus_dict_open_write(&iter, &dict_iter) ||
     311          17 :             (os_strlen(npin) > 0 &&
     312          17 :              !wpa_dbus_dict_append_string(&dict_iter, "Pin", npin)) ||
     313          12 :             !wpa_dbus_dict_close_write(&iter, &dict_iter)) {
     314           0 :                 dbus_message_unref(reply);
     315           0 :                 return wpas_dbus_error_no_memory(message);
     316             :         }
     317             : 
     318          12 :         return reply;
     319             : }
     320             : 
     321             : 
     322             : /**
     323             :  * wpas_dbus_handler_wps_cancel - Cancel ongoing WPS configuration
     324             :  * @message: Pointer to incoming dbus message
     325             :  * @wpa_s: %wpa_supplicant data structure
     326             :  * Returns: NULL on success or DBus error on failure
     327             :  *
     328             :  * Handler for "Cancel" method call. Returns NULL if WPS cancel successful
     329             :  * or DBus error on WPS cancel failure
     330             :  */
     331           2 : DBusMessage * wpas_dbus_handler_wps_cancel(DBusMessage *message,
     332             :                                            struct wpa_supplicant *wpa_s)
     333             : {
     334           2 :         if (wpas_wps_cancel(wpa_s))
     335           0 :                 return wpas_dbus_error_unknown_error(message,
     336             :                                                      "WPS cancel failed");
     337             : 
     338           2 :         return NULL;
     339             : }
     340             : 
     341             : 
     342             : /**
     343             :  * wpas_dbus_getter_process_credentials - Check if credentials are processed
     344             :  * @message: Pointer to incoming dbus message
     345             :  * @wpa_s: %wpa_supplicant data structure
     346             :  * Returns: TRUE on success, FALSE on failure
     347             :  *
     348             :  * Getter for "ProcessCredentials" property. Returns returned boolean will be
     349             :  * true if wps_cred_processing configuration field is not equal to 1 or false
     350             :  * if otherwise.
     351             :  */
     352           8 : dbus_bool_t wpas_dbus_getter_process_credentials(
     353             :         const struct wpa_dbus_property_desc *property_desc,
     354             :         DBusMessageIter *iter, DBusError *error, void *user_data)
     355             : {
     356           8 :         struct wpa_supplicant *wpa_s = user_data;
     357           8 :         dbus_bool_t process = wpa_s->conf->wps_cred_processing != 1;
     358             : 
     359           8 :         return wpas_dbus_simple_property_getter(iter, DBUS_TYPE_BOOLEAN,
     360             :                                                 &process, error);
     361             : }
     362             : 
     363             : 
     364             : /**
     365             :  * wpas_dbus_setter_process_credentials - Set credentials_processed conf param
     366             :  * @iter: Pointer to incoming dbus message iter
     367             :  * @error: Location to store error on failure
     368             :  * @user_data: Function specific data
     369             :  * Returns: TRUE on success, FALSE on failure
     370             :  *
     371             :  * Setter for "ProcessCredentials" property. Sets credentials_processed on 2
     372             :  * if boolean argument is true or on 1 if otherwise.
     373             :  */
     374           2 : dbus_bool_t wpas_dbus_setter_process_credentials(
     375             :         const struct wpa_dbus_property_desc *property_desc,
     376             :         DBusMessageIter *iter, DBusError *error, void *user_data)
     377             : {
     378           2 :         struct wpa_supplicant *wpa_s = user_data;
     379             :         dbus_bool_t process_credentials, old_pc;
     380             : 
     381           2 :         if (!wpa_s->dbus_new_path)
     382           0 :                 return FALSE;
     383           2 :         if (!wpas_dbus_simple_property_setter(iter, error, DBUS_TYPE_BOOLEAN,
     384             :                                               &process_credentials))
     385           0 :                 return FALSE;
     386             : 
     387           2 :         old_pc = wpa_s->conf->wps_cred_processing != 1;
     388           2 :         wpa_s->conf->wps_cred_processing = (process_credentials ? 2 : 1);
     389             : 
     390           2 :         if ((wpa_s->conf->wps_cred_processing != 1) != old_pc)
     391           1 :                 wpa_dbus_mark_property_changed(wpa_s->global->dbus,
     392           1 :                                                wpa_s->dbus_new_path,
     393             :                                                WPAS_DBUS_NEW_IFACE_WPS,
     394             :                                                "ProcessCredentials");
     395             : 
     396           2 :         return TRUE;
     397             : }
     398             : 
     399             : 
     400             : /**
     401             :  * wpas_dbus_getter_config_methods - Get current WPS configuration methods
     402             :  * @iter: Pointer to incoming dbus message iter
     403             :  * @error: Location to store error on failure
     404             :  * @user_data: Function specific data
     405             :  * Returns: TRUE on success, FALSE on failure
     406             :  *
     407             :  * Getter for "ConfigMethods" property. Returned boolean will be true if
     408             :  * providing the relevant string worked, or false otherwise.
     409             :  */
     410           4 : dbus_bool_t wpas_dbus_getter_config_methods(
     411             :         const struct wpa_dbus_property_desc *property_desc,
     412             :         DBusMessageIter *iter, DBusError *error, void *user_data)
     413             : {
     414           4 :         struct wpa_supplicant *wpa_s = user_data;
     415           4 :         char *methods = wpa_s->conf->config_methods;
     416             : 
     417           4 :         if (methods == NULL)
     418           2 :                 methods = "";
     419           4 :         return wpas_dbus_simple_property_getter(iter, DBUS_TYPE_STRING,
     420             :                                                 &methods, error);
     421             : }
     422             : 
     423             : 
     424             : /**
     425             :  * wpas_dbus_setter_config_methods - Set WPS configuration methods
     426             :  * @iter: Pointer to incoming dbus message iter
     427             :  * @error: Location to store error on failure
     428             :  * @user_data: Function specific data
     429             :  * Returns: TRUE on success, FALSE on failure
     430             :  *
     431             :  * Setter for "ConfigMethods" property. Sets the methods string, apply such
     432             :  * change and returns true on success. Returns false otherwise.
     433             :  */
     434           2 : dbus_bool_t wpas_dbus_setter_config_methods(
     435             :         const struct wpa_dbus_property_desc *property_desc,
     436             :         DBusMessageIter *iter, DBusError *error, void *user_data)
     437             : {
     438           2 :         struct wpa_supplicant *wpa_s = user_data;
     439             :         char *methods, *new_methods;
     440             : 
     441           2 :         if (!wpas_dbus_simple_property_setter(iter, error, DBUS_TYPE_STRING,
     442             :                                               &methods))
     443           0 :                 return FALSE;
     444             : 
     445           2 :         new_methods = os_strdup(methods);
     446           2 :         if (!new_methods)
     447           1 :                 return FALSE;
     448             : 
     449           1 :         os_free(wpa_s->conf->config_methods);
     450           1 :         wpa_s->conf->config_methods = new_methods;
     451             : 
     452           1 :         wpa_s->conf->changed_parameters |= CFG_CHANGED_CONFIG_METHODS;
     453           1 :         wpa_supplicant_update_config(wpa_s);
     454             : 
     455           1 :         return TRUE;
     456             : }

Generated by: LCOV version 1.10