Line data Source code
1 : /*
2 : * WPA Supplicant / dbus-based control interface
3 : * Copyright (c) 2006, Dan Williams <dcbw@redhat.com> and Red Hat, Inc.
4 : *
5 : * This software may be distributed under the terms of the BSD license.
6 : * See README for more details.
7 : */
8 :
9 : #include "includes.h"
10 : #include <dbus/dbus.h>
11 :
12 : #include "common.h"
13 : #include "eap_peer/eap_methods.h"
14 : #include "common/ieee802_11_defs.h"
15 : #include "eapol_supp/eapol_supp_sm.h"
16 : #include "rsn_supp/wpa.h"
17 : #include "../config.h"
18 : #include "../wpa_supplicant_i.h"
19 : #include "../driver_i.h"
20 : #include "../notify.h"
21 : #include "../wpas_glue.h"
22 : #include "../bss.h"
23 : #include "../scan.h"
24 : #include "dbus_old.h"
25 : #include "dbus_old_handlers.h"
26 : #include "dbus_dict_helpers.h"
27 :
28 : /**
29 : * wpas_dbus_new_invalid_opts_error - Return a new invalid options error message
30 : * @message: Pointer to incoming dbus message this error refers to
31 : * Returns: a dbus error message
32 : *
33 : * Convenience function to create and return an invalid options error
34 : */
35 48 : DBusMessage * wpas_dbus_new_invalid_opts_error(DBusMessage *message,
36 : const char *arg)
37 : {
38 : DBusMessage *reply;
39 :
40 48 : reply = dbus_message_new_error(
41 : message, WPAS_ERROR_INVALID_OPTS,
42 : "Did not receive correct message arguments.");
43 48 : if (arg != NULL)
44 12 : dbus_message_append_args(reply, DBUS_TYPE_STRING, &arg,
45 : DBUS_TYPE_INVALID);
46 :
47 48 : return reply;
48 : }
49 :
50 :
51 : /**
52 : * wpas_dbus_new_success_reply - Return a new success reply message
53 : * @message: Pointer to incoming dbus message this reply refers to
54 : * Returns: a dbus message containing a single UINT32 that indicates
55 : * success (ie, a value of 1)
56 : *
57 : * Convenience function to create and return a success reply message
58 : */
59 29 : DBusMessage * wpas_dbus_new_success_reply(DBusMessage *message)
60 : {
61 : DBusMessage *reply;
62 29 : unsigned int success = 1;
63 :
64 29 : reply = dbus_message_new_method_return(message);
65 29 : dbus_message_append_args(reply, DBUS_TYPE_UINT32, &success,
66 : DBUS_TYPE_INVALID);
67 29 : return reply;
68 : }
69 :
70 :
71 : /**
72 : * wpas_dbus_global_add_interface - Request registration of a network interface
73 : * @message: Pointer to incoming dbus message
74 : * @global: %wpa_supplicant global data structure
75 : * Returns: The object path of the new interface object,
76 : * or a dbus error message with more information
77 : *
78 : * Handler function for "addInterface" method call. Handles requests
79 : * by dbus clients to register a network interface that wpa_supplicant
80 : * will manage.
81 : */
82 13 : DBusMessage * wpas_dbus_global_add_interface(DBusMessage *message,
83 : struct wpa_global *global)
84 : {
85 13 : char *ifname = NULL;
86 13 : char *driver = NULL;
87 13 : char *driver_param = NULL;
88 13 : char *confname = NULL;
89 13 : char *bridge_ifname = NULL;
90 13 : DBusMessage *reply = NULL;
91 : DBusMessageIter iter;
92 :
93 13 : dbus_message_iter_init(message, &iter);
94 :
95 : /* First argument: interface name (DBUS_TYPE_STRING)
96 : * Required; must be non-zero length
97 : */
98 13 : if (dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_STRING)
99 1 : goto error;
100 12 : dbus_message_iter_get_basic(&iter, &ifname);
101 12 : if (!os_strlen(ifname))
102 1 : goto error;
103 :
104 : /* Second argument: dict of options */
105 11 : if (dbus_message_iter_next(&iter)) {
106 : DBusMessageIter iter_dict;
107 : struct wpa_dbus_dict_entry entry;
108 :
109 9 : if (!wpa_dbus_dict_open_read(&iter, &iter_dict, NULL))
110 8 : goto error;
111 21 : while (wpa_dbus_dict_has_dict_entry(&iter_dict)) {
112 11 : if (!wpa_dbus_dict_get_entry(&iter_dict, &entry))
113 1 : goto error;
114 13 : if (!strcmp(entry.key, "driver") &&
115 3 : entry.type == DBUS_TYPE_STRING) {
116 3 : os_free(driver);
117 3 : driver = os_strdup(entry.str_value);
118 3 : wpa_dbus_dict_entry_clear(&entry);
119 5 : if (driver == NULL)
120 1 : goto error;
121 9 : } else if (!strcmp(entry.key, "driver-params") &&
122 2 : entry.type == DBUS_TYPE_STRING) {
123 2 : os_free(driver_param);
124 2 : driver_param = os_strdup(entry.str_value);
125 2 : wpa_dbus_dict_entry_clear(&entry);
126 3 : if (driver_param == NULL)
127 1 : goto error;
128 7 : } else if (!strcmp(entry.key, "config-file") &&
129 2 : entry.type == DBUS_TYPE_STRING) {
130 2 : os_free(confname);
131 2 : confname = os_strdup(entry.str_value);
132 2 : wpa_dbus_dict_entry_clear(&entry);
133 3 : if (confname == NULL)
134 1 : goto error;
135 5 : } else if (!strcmp(entry.key, "bridge-ifname") &&
136 2 : entry.type == DBUS_TYPE_STRING) {
137 2 : os_free(bridge_ifname);
138 2 : bridge_ifname = os_strdup(entry.str_value);
139 2 : wpa_dbus_dict_entry_clear(&entry);
140 3 : if (bridge_ifname == NULL)
141 1 : goto error;
142 : } else {
143 1 : wpa_dbus_dict_entry_clear(&entry);
144 1 : goto error;
145 : }
146 : }
147 : }
148 :
149 : /*
150 : * Try to get the wpa_supplicant record for this iface, return
151 : * an error if we already control it.
152 : */
153 4 : if (wpa_supplicant_get_iface(global, ifname) != NULL) {
154 1 : reply = dbus_message_new_error(
155 : message, WPAS_ERROR_EXISTS_ERROR,
156 : "wpa_supplicant already controls this interface.");
157 : } else {
158 : struct wpa_supplicant *wpa_s;
159 : struct wpa_interface iface;
160 :
161 3 : os_memset(&iface, 0, sizeof(iface));
162 3 : iface.ifname = ifname;
163 3 : iface.driver = driver;
164 3 : iface.driver_param = driver_param;
165 3 : iface.confname = confname;
166 3 : iface.bridge_ifname = bridge_ifname;
167 : /* Otherwise, have wpa_supplicant attach to it. */
168 3 : wpa_s = wpa_supplicant_add_iface(global, &iface, NULL);
169 4 : if (wpa_s && wpa_s->dbus_path) {
170 1 : const char *path = wpa_s->dbus_path;
171 :
172 1 : reply = dbus_message_new_method_return(message);
173 1 : dbus_message_append_args(reply, DBUS_TYPE_OBJECT_PATH,
174 : &path, DBUS_TYPE_INVALID);
175 : } else {
176 2 : reply = dbus_message_new_error(
177 : message, WPAS_ERROR_ADD_ERROR,
178 : "wpa_supplicant couldn't grab this interface.");
179 : }
180 : }
181 :
182 : out:
183 13 : os_free(driver);
184 13 : os_free(driver_param);
185 13 : os_free(confname);
186 13 : os_free(bridge_ifname);
187 26 : return reply;
188 :
189 : error:
190 9 : reply = wpas_dbus_new_invalid_opts_error(message, NULL);
191 9 : goto out;
192 : }
193 :
194 :
195 : /**
196 : * wpas_dbus_global_remove_interface - Request deregistration of an interface
197 : * @message: Pointer to incoming dbus message
198 : * @global: wpa_supplicant global data structure
199 : * Returns: a dbus message containing a UINT32 indicating success (1) or
200 : * failure (0), or returns a dbus error message with more information
201 : *
202 : * Handler function for "removeInterface" method call. Handles requests
203 : * by dbus clients to deregister a network interface that wpa_supplicant
204 : * currently manages.
205 : */
206 3 : DBusMessage * wpas_dbus_global_remove_interface(DBusMessage *message,
207 : struct wpa_global *global)
208 : {
209 : struct wpa_supplicant *wpa_s;
210 : char *path;
211 3 : DBusMessage *reply = NULL;
212 :
213 3 : if (!dbus_message_get_args(message, NULL,
214 : DBUS_TYPE_OBJECT_PATH, &path,
215 : DBUS_TYPE_INVALID)) {
216 1 : reply = wpas_dbus_new_invalid_opts_error(message, NULL);
217 1 : goto out;
218 : }
219 :
220 2 : wpa_s = wpa_supplicant_get_iface_by_dbus_path(global, path);
221 2 : if (wpa_s == NULL) {
222 1 : reply = wpas_dbus_new_invalid_iface_error(message);
223 1 : goto out;
224 : }
225 :
226 1 : if (!wpa_supplicant_remove_iface(global, wpa_s, 0)) {
227 1 : reply = wpas_dbus_new_success_reply(message);
228 : } else {
229 0 : reply = dbus_message_new_error(
230 : message, WPAS_ERROR_REMOVE_ERROR,
231 : "wpa_supplicant couldn't remove this interface.");
232 : }
233 :
234 : out:
235 3 : return reply;
236 : }
237 :
238 :
239 : /**
240 : * wpas_dbus_global_get_interface - Get the object path for an interface name
241 : * @message: Pointer to incoming dbus message
242 : * @global: %wpa_supplicant global data structure
243 : * Returns: The object path of the interface object,
244 : * or a dbus error message with more information
245 : *
246 : * Handler function for "getInterface" method call. Handles requests
247 : * by dbus clients for the object path of an specific network interface.
248 : */
249 20 : DBusMessage * wpas_dbus_global_get_interface(DBusMessage *message,
250 : struct wpa_global *global)
251 : {
252 20 : DBusMessage *reply = NULL;
253 : const char *ifname;
254 : const char *path;
255 : struct wpa_supplicant *wpa_s;
256 :
257 20 : if (!dbus_message_get_args(message, NULL,
258 : DBUS_TYPE_STRING, &ifname,
259 : DBUS_TYPE_INVALID)) {
260 1 : reply = wpas_dbus_new_invalid_opts_error(message, NULL);
261 1 : goto out;
262 : }
263 :
264 19 : wpa_s = wpa_supplicant_get_iface(global, ifname);
265 19 : if (wpa_s == NULL || !wpa_s->dbus_path) {
266 1 : reply = wpas_dbus_new_invalid_iface_error(message);
267 1 : goto out;
268 : }
269 :
270 18 : path = wpa_s->dbus_path;
271 18 : reply = dbus_message_new_method_return(message);
272 18 : dbus_message_append_args(reply,
273 : DBUS_TYPE_OBJECT_PATH, &path,
274 : DBUS_TYPE_INVALID);
275 :
276 : out:
277 20 : return reply;
278 : }
279 :
280 :
281 : /**
282 : * wpas_dbus_global_set_debugparams- Set the debug params
283 : * @message: Pointer to incoming dbus message
284 : * @global: %wpa_supplicant global data structure
285 : * Returns: a dbus message containing a UINT32 indicating success (1) or
286 : * failure (0), or returns a dbus error message with more information
287 : *
288 : * Handler function for "setDebugParams" method call. Handles requests
289 : * by dbus clients for the object path of an specific network interface.
290 : */
291 3 : DBusMessage * wpas_dbus_global_set_debugparams(DBusMessage *message,
292 : struct wpa_global *global)
293 : {
294 3 : DBusMessage *reply = NULL;
295 : int debug_level;
296 : dbus_bool_t debug_timestamp;
297 : dbus_bool_t debug_show_keys;
298 :
299 3 : if (!dbus_message_get_args(message, NULL,
300 : DBUS_TYPE_INT32, &debug_level,
301 : DBUS_TYPE_BOOLEAN, &debug_timestamp,
302 : DBUS_TYPE_BOOLEAN, &debug_show_keys,
303 : DBUS_TYPE_INVALID)) {
304 1 : return wpas_dbus_new_invalid_opts_error(message, NULL);
305 : }
306 :
307 2 : if (wpa_supplicant_set_debug_params(global, debug_level,
308 : debug_timestamp ? 1 : 0,
309 : debug_show_keys ? 1 : 0)) {
310 1 : return wpas_dbus_new_invalid_opts_error(message, NULL);
311 : }
312 :
313 1 : reply = wpas_dbus_new_success_reply(message);
314 :
315 1 : return reply;
316 : }
317 :
318 :
319 : /**
320 : * wpas_dbus_iface_scan - Request a wireless scan on an interface
321 : * @message: Pointer to incoming dbus message
322 : * @wpa_s: wpa_supplicant structure for a network interface
323 : * Returns: a dbus message containing a UINT32 indicating success (1) or
324 : * failure (0)
325 : *
326 : * Handler function for "scan" method call of a network device. Requests
327 : * that wpa_supplicant perform a wireless scan as soon as possible
328 : * on a particular wireless interface.
329 : */
330 1 : DBusMessage * wpas_dbus_iface_scan(DBusMessage *message,
331 : struct wpa_supplicant *wpa_s)
332 : {
333 1 : wpa_s->scan_req = MANUAL_SCAN_REQ;
334 1 : wpa_supplicant_req_scan(wpa_s, 0, 0);
335 1 : return wpas_dbus_new_success_reply(message);
336 : }
337 :
338 :
339 : /**
340 : * wpas_dbus_iface_scan_results - Get the results of a recent scan request
341 : * @message: Pointer to incoming dbus message
342 : * @wpa_s: wpa_supplicant structure for a network interface
343 : * Returns: a dbus message containing a dbus array of objects paths, or returns
344 : * a dbus error message if not scan results could be found
345 : *
346 : * Handler function for "scanResults" method call of a network device. Returns
347 : * a dbus message containing the object paths of wireless networks found.
348 : */
349 3 : DBusMessage * wpas_dbus_iface_scan_results(DBusMessage *message,
350 : struct wpa_supplicant *wpa_s)
351 : {
352 : DBusMessage *reply;
353 : DBusMessageIter iter;
354 : DBusMessageIter sub_iter;
355 : struct wpa_bss *bss;
356 :
357 3 : if (!wpa_s->dbus_path)
358 0 : return dbus_message_new_error(message,
359 : WPAS_ERROR_INTERNAL_ERROR,
360 : "no D-Bus interface available");
361 :
362 : /* Create and initialize the return message */
363 3 : reply = dbus_message_new_method_return(message);
364 3 : dbus_message_iter_init_append(reply, &iter);
365 3 : if (!dbus_message_iter_open_container(&iter, DBUS_TYPE_ARRAY,
366 : DBUS_TYPE_OBJECT_PATH_AS_STRING,
367 : &sub_iter))
368 0 : goto error;
369 :
370 : /* Loop through scan results and append each result's object path */
371 6 : dl_list_for_each(bss, &wpa_s->bss_id, struct wpa_bss, list_id) {
372 : char path_buf[WPAS_DBUS_OBJECT_PATH_MAX];
373 3 : char *path = path_buf;
374 :
375 : /* Construct the object path for this network. Note that ':'
376 : * is not a valid character in dbus object paths.
377 : */
378 18 : os_snprintf(path, WPAS_DBUS_OBJECT_PATH_MAX,
379 : "%s/" WPAS_DBUS_BSSIDS_PART "/"
380 : WPAS_DBUS_BSSID_FORMAT,
381 18 : wpa_s->dbus_path, MAC2STR(bss->bssid));
382 3 : if (!dbus_message_iter_append_basic(&sub_iter,
383 : DBUS_TYPE_OBJECT_PATH,
384 : &path))
385 0 : goto error;
386 : }
387 :
388 3 : if (!dbus_message_iter_close_container(&iter, &sub_iter))
389 0 : goto error;
390 :
391 3 : return reply;
392 :
393 : error:
394 0 : dbus_message_unref(reply);
395 0 : return dbus_message_new_error(message, WPAS_ERROR_INTERNAL_ERROR,
396 : "an internal error occurred returning scan results");
397 : }
398 :
399 :
400 : /**
401 : * wpas_dbus_bssid_properties - Return the properties of a scanned network
402 : * @message: Pointer to incoming dbus message
403 : * @wpa_s: wpa_supplicant structure for a network interface
404 : * @res: wpa_supplicant scan result for which to get properties
405 : * Returns: a dbus message containing the properties for the requested network
406 : *
407 : * Handler function for "properties" method call of a scanned network.
408 : * Returns a dbus message containing the the properties.
409 : */
410 3 : DBusMessage * wpas_dbus_bssid_properties(DBusMessage *message,
411 : struct wpa_supplicant *wpa_s,
412 : struct wpa_bss *bss)
413 : {
414 : DBusMessage *reply;
415 : DBusMessageIter iter, iter_dict;
416 : const u8 *wpa_ie, *rsn_ie, *wps_ie;
417 :
418 : /* Dump the properties into a dbus message */
419 3 : reply = dbus_message_new_method_return(message);
420 :
421 3 : wpa_ie = wpa_bss_get_vendor_ie(bss, WPA_IE_VENDOR_TYPE);
422 3 : rsn_ie = wpa_bss_get_ie(bss, WLAN_EID_RSN);
423 3 : wps_ie = wpa_bss_get_vendor_ie(bss, WPS_IE_VENDOR_TYPE);
424 :
425 3 : dbus_message_iter_init_append(reply, &iter);
426 6 : if (!wpa_dbus_dict_open_write(&iter, &iter_dict) ||
427 3 : !wpa_dbus_dict_append_byte_array(&iter_dict, "bssid",
428 3 : (const char *) bss->bssid,
429 3 : ETH_ALEN) ||
430 6 : !wpa_dbus_dict_append_byte_array(&iter_dict, "ssid",
431 3 : (const char *) bss->ssid,
432 6 : bss->ssid_len) ||
433 1 : (wpa_ie &&
434 1 : !wpa_dbus_dict_append_byte_array(&iter_dict, "wpaie",
435 : (const char *) wpa_ie,
436 4 : wpa_ie[1] + 2)) ||
437 2 : (rsn_ie &&
438 2 : !wpa_dbus_dict_append_byte_array(&iter_dict, "rsnie",
439 : (const char *) rsn_ie,
440 5 : rsn_ie[1] + 2)) ||
441 1 : (wps_ie &&
442 1 : !wpa_dbus_dict_append_byte_array(&iter_dict, "wpsie",
443 : (const char *) wps_ie,
444 4 : wps_ie[1] + 2)) ||
445 6 : (bss->freq &&
446 6 : !wpa_dbus_dict_append_int32(&iter_dict, "frequency", bss->freq)) ||
447 3 : !wpa_dbus_dict_append_uint16(&iter_dict, "capabilities",
448 6 : bss->caps) ||
449 3 : (!(bss->flags & WPA_BSS_QUAL_INVALID) &&
450 3 : !wpa_dbus_dict_append_int32(&iter_dict, "quality", bss->qual)) ||
451 6 : (!(bss->flags & WPA_BSS_NOISE_INVALID) &&
452 6 : !wpa_dbus_dict_append_int32(&iter_dict, "noise", bss->noise)) ||
453 6 : (!(bss->flags & WPA_BSS_LEVEL_INVALID) &&
454 6 : !wpa_dbus_dict_append_int32(&iter_dict, "level", bss->level)) ||
455 3 : !wpa_dbus_dict_append_int32(&iter_dict, "maxrate",
456 6 : wpa_bss_get_max_rate(bss) * 500000) ||
457 3 : !wpa_dbus_dict_close_write(&iter, &iter_dict)) {
458 0 : if (reply)
459 0 : dbus_message_unref(reply);
460 0 : reply = dbus_message_new_error(
461 : message, WPAS_ERROR_INTERNAL_ERROR,
462 : "an internal error occurred returning BSSID properties.");
463 : }
464 :
465 3 : return reply;
466 : }
467 :
468 :
469 : /**
470 : * wpas_dbus_iface_capabilities - Return interface capabilities
471 : * @message: Pointer to incoming dbus message
472 : * @wpa_s: wpa_supplicant structure for a network interface
473 : * Returns: A dbus message containing a dict of strings
474 : *
475 : * Handler function for "capabilities" method call of an interface.
476 : */
477 2 : DBusMessage * wpas_dbus_iface_capabilities(DBusMessage *message,
478 : struct wpa_supplicant *wpa_s)
479 : {
480 2 : DBusMessage *reply = NULL;
481 : struct wpa_driver_capa capa;
482 : int res;
483 : DBusMessageIter iter, iter_dict;
484 : char **eap_methods;
485 : size_t num_items;
486 2 : dbus_bool_t strict = FALSE;
487 : DBusMessageIter iter_dict_entry, iter_dict_val, iter_array;
488 :
489 2 : if (!dbus_message_get_args(message, NULL,
490 : DBUS_TYPE_BOOLEAN, &strict,
491 : DBUS_TYPE_INVALID))
492 1 : strict = FALSE;
493 :
494 2 : reply = dbus_message_new_method_return(message);
495 :
496 2 : dbus_message_iter_init_append(reply, &iter);
497 2 : if (!wpa_dbus_dict_open_write(&iter, &iter_dict))
498 0 : goto error;
499 :
500 : /* EAP methods */
501 2 : eap_methods = eap_get_names_as_string_array(&num_items);
502 2 : if (eap_methods) {
503 : dbus_bool_t success;
504 2 : size_t i = 0;
505 :
506 2 : success = wpa_dbus_dict_append_string_array(
507 : &iter_dict, "eap", (const char **) eap_methods,
508 : num_items);
509 :
510 : /* free returned method array */
511 52 : while (eap_methods[i])
512 48 : os_free(eap_methods[i++]);
513 2 : os_free(eap_methods);
514 :
515 2 : if (!success)
516 0 : goto error;
517 : }
518 :
519 2 : res = wpa_drv_get_capa(wpa_s, &capa);
520 :
521 : /***** pairwise cipher */
522 2 : if (res < 0) {
523 0 : if (!strict) {
524 0 : const char *args[] = {"CCMP", "TKIP", "NONE"};
525 :
526 0 : if (!wpa_dbus_dict_append_string_array(
527 : &iter_dict, "pairwise", args,
528 : ARRAY_SIZE(args)))
529 0 : goto error;
530 : }
531 : } else {
532 2 : if (!wpa_dbus_dict_begin_string_array(&iter_dict, "pairwise",
533 : &iter_dict_entry,
534 : &iter_dict_val,
535 2 : &iter_array) ||
536 4 : ((capa.enc & WPA_DRIVER_CAPA_ENC_CCMP) &&
537 2 : !wpa_dbus_dict_string_array_add_element(
538 2 : &iter_array, "CCMP")) ||
539 4 : ((capa.enc & WPA_DRIVER_CAPA_ENC_TKIP) &&
540 2 : !wpa_dbus_dict_string_array_add_element(
541 2 : &iter_array, "TKIP")) ||
542 2 : ((capa.key_mgmt & WPA_DRIVER_CAPA_KEY_MGMT_WPA_NONE) &&
543 0 : !wpa_dbus_dict_string_array_add_element(
544 2 : &iter_array, "NONE")) ||
545 2 : !wpa_dbus_dict_end_string_array(&iter_dict,
546 : &iter_dict_entry,
547 : &iter_dict_val,
548 : &iter_array))
549 : goto error;
550 : }
551 :
552 : /***** group cipher */
553 2 : if (res < 0) {
554 0 : if (!strict) {
555 0 : const char *args[] = {
556 : "CCMP", "TKIP", "WEP104", "WEP40"
557 : };
558 :
559 0 : if (!wpa_dbus_dict_append_string_array(
560 : &iter_dict, "group", args,
561 : ARRAY_SIZE(args)))
562 0 : goto error;
563 : }
564 : } else {
565 2 : if (!wpa_dbus_dict_begin_string_array(&iter_dict, "group",
566 : &iter_dict_entry,
567 : &iter_dict_val,
568 : &iter_array))
569 0 : goto error;
570 :
571 4 : if (((capa.enc & WPA_DRIVER_CAPA_ENC_CCMP) &&
572 2 : !wpa_dbus_dict_string_array_add_element(
573 2 : &iter_array, "CCMP")) ||
574 4 : ((capa.enc & WPA_DRIVER_CAPA_ENC_TKIP) &&
575 2 : !wpa_dbus_dict_string_array_add_element(
576 2 : &iter_array, "TKIP")) ||
577 4 : ((capa.enc & WPA_DRIVER_CAPA_ENC_WEP104) &&
578 2 : !wpa_dbus_dict_string_array_add_element(
579 2 : &iter_array, "WEP104")) ||
580 4 : ((capa.enc & WPA_DRIVER_CAPA_ENC_WEP40) &&
581 2 : !wpa_dbus_dict_string_array_add_element(
582 2 : &iter_array, "WEP40")) ||
583 2 : !wpa_dbus_dict_end_string_array(&iter_dict,
584 : &iter_dict_entry,
585 : &iter_dict_val,
586 : &iter_array))
587 : goto error;
588 : }
589 :
590 : /***** key management */
591 2 : if (res < 0) {
592 0 : if (!strict) {
593 0 : const char *args[] = {
594 : "WPA-PSK", "WPA-EAP", "IEEE8021X", "WPA-NONE",
595 : "NONE"
596 : };
597 0 : if (!wpa_dbus_dict_append_string_array(
598 : &iter_dict, "key_mgmt", args,
599 : ARRAY_SIZE(args)))
600 0 : goto error;
601 : }
602 : } else {
603 2 : if (!wpa_dbus_dict_begin_string_array(&iter_dict, "key_mgmt",
604 : &iter_dict_entry,
605 : &iter_dict_val,
606 2 : &iter_array) ||
607 2 : !wpa_dbus_dict_string_array_add_element(&iter_array,
608 2 : "NONE") ||
609 2 : !wpa_dbus_dict_string_array_add_element(&iter_array,
610 2 : "IEEE8021X") ||
611 2 : ((capa.key_mgmt & (WPA_DRIVER_CAPA_KEY_MGMT_WPA |
612 2 : WPA_DRIVER_CAPA_KEY_MGMT_WPA2)) &&
613 2 : !wpa_dbus_dict_string_array_add_element(
614 2 : &iter_array, "WPA-EAP")) ||
615 2 : ((capa.key_mgmt & (WPA_DRIVER_CAPA_KEY_MGMT_WPA_PSK |
616 2 : WPA_DRIVER_CAPA_KEY_MGMT_WPA2_PSK)) &&
617 2 : !wpa_dbus_dict_string_array_add_element(
618 2 : &iter_array, "WPA-PSK")) ||
619 2 : ((capa.key_mgmt & WPA_DRIVER_CAPA_KEY_MGMT_WPA_NONE) &&
620 0 : !wpa_dbus_dict_string_array_add_element(
621 2 : &iter_array, "WPA-NONE")) ||
622 2 : !wpa_dbus_dict_end_string_array(&iter_dict,
623 : &iter_dict_entry,
624 : &iter_dict_val,
625 : &iter_array))
626 : goto error;
627 : }
628 :
629 : /***** WPA protocol */
630 2 : if (res < 0) {
631 0 : if (!strict) {
632 0 : const char *args[] = { "RSN", "WPA" };
633 :
634 0 : if (!wpa_dbus_dict_append_string_array(
635 : &iter_dict, "proto", args,
636 : ARRAY_SIZE(args)))
637 0 : goto error;
638 : }
639 : } else {
640 2 : if (!wpa_dbus_dict_begin_string_array(&iter_dict, "proto",
641 : &iter_dict_entry,
642 : &iter_dict_val,
643 2 : &iter_array) ||
644 2 : ((capa.key_mgmt & (WPA_DRIVER_CAPA_KEY_MGMT_WPA2 |
645 2 : WPA_DRIVER_CAPA_KEY_MGMT_WPA2_PSK)) &&
646 2 : !wpa_dbus_dict_string_array_add_element(
647 2 : &iter_array, "RSN")) ||
648 2 : ((capa.key_mgmt & (WPA_DRIVER_CAPA_KEY_MGMT_WPA |
649 2 : WPA_DRIVER_CAPA_KEY_MGMT_WPA_PSK)) &&
650 2 : !wpa_dbus_dict_string_array_add_element(
651 2 : &iter_array, "WPA")) ||
652 2 : !wpa_dbus_dict_end_string_array(&iter_dict,
653 : &iter_dict_entry,
654 : &iter_dict_val,
655 : &iter_array))
656 : goto error;
657 : }
658 :
659 : /***** auth alg */
660 2 : if (res < 0) {
661 0 : if (!strict) {
662 0 : const char *args[] = { "OPEN", "SHARED", "LEAP" };
663 :
664 0 : if (!wpa_dbus_dict_append_string_array(
665 : &iter_dict, "auth_alg", args,
666 : ARRAY_SIZE(args)))
667 0 : goto error;
668 : }
669 : } else {
670 2 : if (!wpa_dbus_dict_begin_string_array(&iter_dict, "auth_alg",
671 : &iter_dict_entry,
672 : &iter_dict_val,
673 2 : &iter_array) ||
674 4 : ((capa.auth & WPA_DRIVER_AUTH_OPEN) &&
675 2 : !wpa_dbus_dict_string_array_add_element(
676 2 : &iter_array, "OPEN")) ||
677 4 : ((capa.auth & WPA_DRIVER_AUTH_SHARED) &&
678 2 : !wpa_dbus_dict_string_array_add_element(
679 2 : &iter_array, "SHARED")) ||
680 4 : ((capa.auth & WPA_DRIVER_AUTH_LEAP) &&
681 2 : !wpa_dbus_dict_string_array_add_element(
682 2 : &iter_array, "LEAP")) ||
683 2 : !wpa_dbus_dict_end_string_array(&iter_dict,
684 : &iter_dict_entry,
685 : &iter_dict_val,
686 : &iter_array))
687 : goto error;
688 : }
689 :
690 2 : if (!wpa_dbus_dict_close_write(&iter, &iter_dict))
691 0 : goto error;
692 :
693 2 : return reply;
694 :
695 : error:
696 0 : if (reply)
697 0 : dbus_message_unref(reply);
698 0 : return dbus_message_new_error(
699 : message, WPAS_ERROR_INTERNAL_ERROR,
700 : "an internal error occurred returning interface capabilities.");
701 : }
702 :
703 :
704 : /**
705 : * wpas_dbus_iface_add_network - Add a new configured network
706 : * @message: Pointer to incoming dbus message
707 : * @wpa_s: wpa_supplicant structure for a network interface
708 : * Returns: A dbus message containing the object path of the new network
709 : *
710 : * Handler function for "addNetwork" method call of a network interface.
711 : */
712 6 : DBusMessage * wpas_dbus_iface_add_network(DBusMessage *message,
713 : struct wpa_supplicant *wpa_s)
714 : {
715 6 : DBusMessage *reply = NULL;
716 6 : struct wpa_ssid *ssid = NULL;
717 6 : char path_buf[WPAS_DBUS_OBJECT_PATH_MAX], *path = path_buf;
718 :
719 6 : if (wpa_s->dbus_path)
720 6 : ssid = wpa_supplicant_add_network(wpa_s);
721 6 : if (ssid == NULL) {
722 1 : reply = dbus_message_new_error(
723 : message, WPAS_ERROR_ADD_NETWORK_ERROR,
724 : "wpa_supplicant could not add a network on this interface.");
725 1 : goto out;
726 : }
727 :
728 : /* Construct the object path for this network. */
729 5 : os_snprintf(path, WPAS_DBUS_OBJECT_PATH_MAX,
730 : "%s/" WPAS_DBUS_NETWORKS_PART "/%d",
731 : wpa_s->dbus_path, ssid->id);
732 :
733 5 : reply = dbus_message_new_method_return(message);
734 5 : dbus_message_append_args(reply, DBUS_TYPE_OBJECT_PATH,
735 : &path, DBUS_TYPE_INVALID);
736 :
737 : out:
738 6 : return reply;
739 : }
740 :
741 :
742 : /**
743 : * wpas_dbus_iface_remove_network - Remove a configured network
744 : * @message: Pointer to incoming dbus message
745 : * @wpa_s: wpa_supplicant structure for a network interface
746 : * Returns: A dbus message containing a UINT32 indicating success (1) or
747 : * failure (0)
748 : *
749 : * Handler function for "removeNetwork" method call of a network interface.
750 : */
751 10 : DBusMessage * wpas_dbus_iface_remove_network(DBusMessage *message,
752 : struct wpa_supplicant *wpa_s)
753 : {
754 10 : DBusMessage *reply = NULL;
755 : const char *op;
756 10 : char *iface = NULL, *net_id = NULL;
757 : int id;
758 : int result;
759 :
760 10 : if (!dbus_message_get_args(message, NULL,
761 : DBUS_TYPE_OBJECT_PATH, &op,
762 : DBUS_TYPE_INVALID)) {
763 1 : reply = wpas_dbus_new_invalid_opts_error(message, NULL);
764 1 : goto out;
765 : }
766 :
767 : /* Extract the network ID */
768 9 : iface = wpas_dbus_decompose_object_path(op, &net_id, NULL);
769 9 : if (iface == NULL || net_id == NULL) {
770 3 : reply = wpas_dbus_new_invalid_network_error(message);
771 3 : goto out;
772 : }
773 :
774 : /* Ensure the network is actually a child of this interface */
775 6 : if (!wpa_s->dbus_path || os_strcmp(iface, wpa_s->dbus_path) != 0) {
776 1 : reply = wpas_dbus_new_invalid_network_error(message);
777 1 : goto out;
778 : }
779 :
780 5 : id = strtoul(net_id, NULL, 10);
781 5 : result = wpa_supplicant_remove_network(wpa_s, id);
782 5 : if (result == -1) {
783 3 : reply = wpas_dbus_new_invalid_network_error(message);
784 3 : goto out;
785 : }
786 2 : if (result == -2) {
787 0 : reply = dbus_message_new_error(
788 : message, WPAS_ERROR_REMOVE_NETWORK_ERROR,
789 : "error removing the specified on this interface.");
790 0 : goto out;
791 : }
792 :
793 2 : reply = wpas_dbus_new_success_reply(message);
794 :
795 : out:
796 10 : os_free(iface);
797 10 : os_free(net_id);
798 10 : return reply;
799 : }
800 :
801 :
802 : static const char * const dont_quote[] = {
803 : "key_mgmt", "proto", "pairwise", "auth_alg", "group", "eap",
804 : "opensc_engine_path", "pkcs11_engine_path", "pkcs11_module_path",
805 : "bssid", "scan_freq", "freq_list", NULL
806 : };
807 :
808 :
809 19 : static dbus_bool_t should_quote_opt(const char *key)
810 : {
811 19 : int i = 0;
812 :
813 213 : while (dont_quote[i] != NULL) {
814 182 : if (os_strcmp(key, dont_quote[i]) == 0)
815 7 : return FALSE;
816 175 : i++;
817 : }
818 12 : return TRUE;
819 : }
820 :
821 :
822 : /**
823 : * wpas_dbus_iface_set_network - Set options for a configured network
824 : * @message: Pointer to incoming dbus message
825 : * @wpa_s: wpa_supplicant structure for a network interface
826 : * @ssid: wpa_ssid structure for a configured network
827 : * Returns: a dbus message containing a UINT32 indicating success (1) or
828 : * failure (0)
829 : *
830 : * Handler function for "set" method call of a configured network.
831 : */
832 13 : DBusMessage * wpas_dbus_iface_set_network(DBusMessage *message,
833 : struct wpa_supplicant *wpa_s,
834 : struct wpa_ssid *ssid)
835 : {
836 13 : DBusMessage *reply = NULL;
837 13 : struct wpa_dbus_dict_entry entry = { .type = DBUS_TYPE_STRING };
838 : DBusMessageIter iter, iter_dict;
839 :
840 13 : dbus_message_iter_init(message, &iter);
841 :
842 13 : if (!wpa_dbus_dict_open_read(&iter, &iter_dict, NULL)) {
843 1 : reply = wpas_dbus_new_invalid_opts_error(message, NULL);
844 1 : goto out;
845 : }
846 :
847 45 : while (wpa_dbus_dict_has_dict_entry(&iter_dict)) {
848 29 : char *value = NULL;
849 29 : size_t size = 50;
850 : int ret;
851 :
852 29 : if (!wpa_dbus_dict_get_entry(&iter_dict, &entry)) {
853 1 : reply = wpas_dbus_new_invalid_opts_error(message,
854 : NULL);
855 1 : goto out;
856 : }
857 :
858 : /* Type conversions, since wpa_supplicant wants strings */
859 30 : if (entry.type == DBUS_TYPE_ARRAY &&
860 2 : entry.array_type == DBUS_TYPE_BYTE) {
861 2 : if (entry.array_len <= 0)
862 0 : goto error;
863 :
864 2 : size = entry.array_len * 2 + 1;
865 2 : value = os_zalloc(size);
866 2 : if (value == NULL)
867 1 : goto error;
868 2 : ret = wpa_snprintf_hex(value, size,
869 1 : (u8 *) entry.bytearray_value,
870 1 : entry.array_len);
871 2 : if (ret <= 0)
872 0 : goto error;
873 26 : } else if (entry.type == DBUS_TYPE_STRING) {
874 19 : if (should_quote_opt(entry.key)) {
875 12 : size = os_strlen(entry.str_value);
876 : /* Zero-length option check */
877 12 : if (size == 0)
878 0 : goto error;
879 12 : size += 3; /* For quotes and terminator */
880 12 : value = os_zalloc(size);
881 12 : if (value == NULL)
882 1 : goto error;
883 11 : ret = os_snprintf(value, size, "\"%s\"",
884 : entry.str_value);
885 11 : if (os_snprintf_error(size, ret))
886 0 : goto error;
887 : } else {
888 7 : value = os_strdup(entry.str_value);
889 7 : if (value == NULL)
890 1 : goto error;
891 : }
892 7 : } else if (entry.type == DBUS_TYPE_UINT32) {
893 2 : value = os_zalloc(size);
894 2 : if (value == NULL)
895 1 : goto error;
896 1 : ret = os_snprintf(value, size, "%u",
897 : entry.uint32_value);
898 1 : if (os_snprintf_error(size, ret))
899 0 : goto error;
900 5 : } else if (entry.type == DBUS_TYPE_INT32) {
901 4 : value = os_zalloc(size);
902 4 : if (value == NULL)
903 1 : goto error;
904 3 : ret = os_snprintf(value, size, "%d",
905 : entry.int32_value);
906 3 : if (os_snprintf_error(size, ret))
907 0 : goto error;
908 : } else
909 1 : goto error;
910 :
911 22 : if (wpa_config_set(ssid, entry.key, value, 0) < 0)
912 1 : goto error;
913 :
914 23 : if ((os_strcmp(entry.key, "psk") == 0 &&
915 25 : value[0] == '"' && ssid->ssid_len) ||
916 24 : (os_strcmp(entry.key, "ssid") == 0 && ssid->passphrase))
917 2 : wpa_config_update_psk(ssid);
918 19 : else if (os_strcmp(entry.key, "priority") == 0)
919 1 : wpa_config_update_prio_list(wpa_s->conf);
920 :
921 21 : os_free(value);
922 21 : wpa_dbus_dict_entry_clear(&entry);
923 21 : continue;
924 :
925 : error:
926 7 : os_free(value);
927 7 : reply = wpas_dbus_new_invalid_opts_error(message, entry.key);
928 7 : wpa_dbus_dict_entry_clear(&entry);
929 7 : break;
930 : }
931 :
932 11 : if (!reply)
933 4 : reply = wpas_dbus_new_success_reply(message);
934 :
935 : out:
936 13 : return reply;
937 : }
938 :
939 :
940 : /**
941 : * wpas_dbus_iface_enable_network - Mark a configured network as enabled
942 : * @message: Pointer to incoming dbus message
943 : * @wpa_s: wpa_supplicant structure for a network interface
944 : * @ssid: wpa_ssid structure for a configured network
945 : * Returns: A dbus message containing a UINT32 indicating success (1) or
946 : * failure (0)
947 : *
948 : * Handler function for "enable" method call of a configured network.
949 : */
950 3 : DBusMessage * wpas_dbus_iface_enable_network(DBusMessage *message,
951 : struct wpa_supplicant *wpa_s,
952 : struct wpa_ssid *ssid)
953 : {
954 3 : wpa_supplicant_enable_network(wpa_s, ssid);
955 3 : return wpas_dbus_new_success_reply(message);
956 : }
957 :
958 :
959 : /**
960 : * wpas_dbus_iface_disable_network - Mark a configured network as disabled
961 : * @message: Pointer to incoming dbus message
962 : * @wpa_s: wpa_supplicant structure for a network interface
963 : * @ssid: wpa_ssid structure for a configured network
964 : * Returns: A dbus message containing a UINT32 indicating success (1) or
965 : * failure (0)
966 : *
967 : * Handler function for "disable" method call of a configured network.
968 : */
969 4 : DBusMessage * wpas_dbus_iface_disable_network(DBusMessage *message,
970 : struct wpa_supplicant *wpa_s,
971 : struct wpa_ssid *ssid)
972 : {
973 4 : wpa_supplicant_disable_network(wpa_s, ssid);
974 4 : return wpas_dbus_new_success_reply(message);
975 : }
976 :
977 :
978 : /**
979 : * wpas_dbus_iface_select_network - Attempt association with a configured network
980 : * @message: Pointer to incoming dbus message
981 : * @wpa_s: wpa_supplicant structure for a network interface
982 : * Returns: A dbus message containing a UINT32 indicating success (1) or
983 : * failure (0)
984 : *
985 : * Handler function for "selectNetwork" method call of network interface.
986 : */
987 7 : DBusMessage * wpas_dbus_iface_select_network(DBusMessage *message,
988 : struct wpa_supplicant *wpa_s)
989 : {
990 7 : DBusMessage *reply = NULL;
991 : const char *op;
992 : struct wpa_ssid *ssid;
993 7 : char *iface_obj_path = NULL;
994 7 : char *network = NULL;
995 :
996 7 : if (os_strlen(dbus_message_get_signature(message)) == 0) {
997 : /* Any network */
998 1 : ssid = NULL;
999 : } else {
1000 : int nid;
1001 :
1002 6 : if (!dbus_message_get_args(message, NULL,
1003 : DBUS_TYPE_OBJECT_PATH, &op,
1004 : DBUS_TYPE_INVALID)) {
1005 1 : reply = wpas_dbus_new_invalid_opts_error(message,
1006 : NULL);
1007 1 : goto out;
1008 : }
1009 :
1010 : /* Extract the network number */
1011 5 : iface_obj_path = wpas_dbus_decompose_object_path(op,
1012 : &network,
1013 : NULL);
1014 5 : if (iface_obj_path == NULL) {
1015 1 : reply = wpas_dbus_new_invalid_iface_error(message);
1016 1 : goto out;
1017 : }
1018 : /* Ensure the object path really points to this interface */
1019 7 : if (network == NULL || !wpa_s->dbus_path ||
1020 3 : os_strcmp(iface_obj_path, wpa_s->dbus_path) != 0) {
1021 1 : reply = wpas_dbus_new_invalid_network_error(message);
1022 1 : goto out;
1023 : }
1024 :
1025 3 : nid = strtoul(network, NULL, 10);
1026 3 : if (errno == EINVAL) {
1027 0 : reply = wpas_dbus_new_invalid_network_error(message);
1028 0 : goto out;
1029 : }
1030 :
1031 3 : ssid = wpa_config_get_network(wpa_s->conf, nid);
1032 3 : if (ssid == NULL) {
1033 2 : reply = wpas_dbus_new_invalid_network_error(message);
1034 2 : goto out;
1035 : }
1036 : }
1037 :
1038 : /* Finally, associate with the network */
1039 2 : wpa_supplicant_select_network(wpa_s, ssid);
1040 :
1041 2 : reply = wpas_dbus_new_success_reply(message);
1042 :
1043 : out:
1044 7 : os_free(iface_obj_path);
1045 7 : os_free(network);
1046 7 : return reply;
1047 : }
1048 :
1049 :
1050 : /**
1051 : * wpas_dbus_iface_disconnect - Terminate the current connection
1052 : * @message: Pointer to incoming dbus message
1053 : * @wpa_s: wpa_supplicant structure for a network interface
1054 : * Returns: A dbus message containing a UINT32 indicating success (1) or
1055 : * failure (0)
1056 : *
1057 : * Handler function for "disconnect" method call of network interface.
1058 : */
1059 2 : DBusMessage * wpas_dbus_iface_disconnect(DBusMessage *message,
1060 : struct wpa_supplicant *wpa_s)
1061 : {
1062 2 : wpas_request_disconnection(wpa_s);
1063 :
1064 2 : return wpas_dbus_new_success_reply(message);
1065 : }
1066 :
1067 :
1068 : /**
1069 : * wpas_dbus_iface_set_ap_scan - Control roaming mode
1070 : * @message: Pointer to incoming dbus message
1071 : * @wpa_s: wpa_supplicant structure for a network interface
1072 : * Returns: A dbus message containing a UINT32 indicating success (1) or
1073 : * failure (0)
1074 : *
1075 : * Handler function for "setAPScan" method call.
1076 : */
1077 3 : DBusMessage * wpas_dbus_iface_set_ap_scan(DBusMessage *message,
1078 : struct wpa_supplicant *wpa_s)
1079 : {
1080 3 : DBusMessage *reply = NULL;
1081 3 : dbus_uint32_t ap_scan = 1;
1082 :
1083 3 : if (!dbus_message_get_args(message, NULL, DBUS_TYPE_UINT32, &ap_scan,
1084 : DBUS_TYPE_INVALID)) {
1085 1 : reply = wpas_dbus_new_invalid_opts_error(message, NULL);
1086 1 : goto out;
1087 : }
1088 :
1089 2 : if (wpa_supplicant_set_ap_scan(wpa_s, ap_scan)) {
1090 1 : reply = wpas_dbus_new_invalid_opts_error(message, NULL);
1091 1 : goto out;
1092 : }
1093 :
1094 1 : reply = wpas_dbus_new_success_reply(message);
1095 :
1096 : out:
1097 3 : return reply;
1098 : }
1099 :
1100 :
1101 : /**
1102 : * wpas_dbus_iface_set_smartcard_modules - Set smartcard related module paths
1103 : * @message: Pointer to incoming dbus message
1104 : * @wpa_s: wpa_supplicant structure for a network interface
1105 : * Returns: A dbus message containing a UINT32 indicating success (1) or
1106 : * failure (0)
1107 : *
1108 : * Handler function for "setSmartcardModules" method call.
1109 : */
1110 10 : DBusMessage * wpas_dbus_iface_set_smartcard_modules(
1111 : DBusMessage *message, struct wpa_supplicant *wpa_s)
1112 : {
1113 : DBusMessageIter iter, iter_dict;
1114 10 : char *opensc_engine_path = NULL;
1115 10 : char *pkcs11_engine_path = NULL;
1116 10 : char *pkcs11_module_path = NULL;
1117 : struct wpa_dbus_dict_entry entry;
1118 :
1119 10 : if (!dbus_message_iter_init(message, &iter))
1120 0 : goto error;
1121 :
1122 10 : if (!wpa_dbus_dict_open_read(&iter, &iter_dict, NULL))
1123 1 : goto error;
1124 :
1125 22 : while (wpa_dbus_dict_has_dict_entry(&iter_dict)) {
1126 12 : if (!wpa_dbus_dict_get_entry(&iter_dict, &entry))
1127 1 : goto error;
1128 13 : if (!strcmp(entry.key, "opensc_engine_path") &&
1129 2 : entry.type == DBUS_TYPE_STRING) {
1130 2 : os_free(opensc_engine_path);
1131 2 : opensc_engine_path = os_strdup(entry.str_value);
1132 2 : wpa_dbus_dict_entry_clear(&entry);
1133 3 : if (opensc_engine_path == NULL)
1134 1 : goto error;
1135 12 : } else if (!strcmp(entry.key, "pkcs11_engine_path") &&
1136 3 : entry.type == DBUS_TYPE_STRING) {
1137 3 : os_free(pkcs11_engine_path);
1138 3 : pkcs11_engine_path = os_strdup(entry.str_value);
1139 3 : wpa_dbus_dict_entry_clear(&entry);
1140 5 : if (pkcs11_engine_path == NULL)
1141 1 : goto error;
1142 8 : } else if (!strcmp(entry.key, "pkcs11_module_path") &&
1143 2 : entry.type == DBUS_TYPE_STRING) {
1144 2 : os_free(pkcs11_module_path);
1145 2 : pkcs11_module_path = os_strdup(entry.str_value);
1146 2 : wpa_dbus_dict_entry_clear(&entry);
1147 3 : if (pkcs11_module_path == NULL)
1148 1 : goto error;
1149 : } else {
1150 4 : wpa_dbus_dict_entry_clear(&entry);
1151 4 : goto error;
1152 : }
1153 : }
1154 :
1155 1 : os_free(wpa_s->conf->opensc_engine_path);
1156 1 : wpa_s->conf->opensc_engine_path = opensc_engine_path;
1157 1 : os_free(wpa_s->conf->pkcs11_engine_path);
1158 1 : wpa_s->conf->pkcs11_engine_path = pkcs11_engine_path;
1159 1 : os_free(wpa_s->conf->pkcs11_module_path);
1160 1 : wpa_s->conf->pkcs11_module_path = pkcs11_module_path;
1161 :
1162 1 : wpa_sm_set_eapol(wpa_s->wpa, NULL);
1163 1 : eapol_sm_deinit(wpa_s->eapol);
1164 1 : wpa_s->eapol = NULL;
1165 1 : wpa_supplicant_init_eapol(wpa_s);
1166 1 : wpa_sm_set_eapol(wpa_s->wpa, wpa_s->eapol);
1167 :
1168 1 : return wpas_dbus_new_success_reply(message);
1169 :
1170 : error:
1171 9 : os_free(opensc_engine_path);
1172 9 : os_free(pkcs11_engine_path);
1173 9 : os_free(pkcs11_module_path);
1174 9 : return wpas_dbus_new_invalid_opts_error(message, NULL);
1175 : }
1176 :
1177 :
1178 : /**
1179 : * wpas_dbus_iface_get_state - Get interface state
1180 : * @message: Pointer to incoming dbus message
1181 : * @wpa_s: wpa_supplicant structure for a network interface
1182 : * Returns: A dbus message containing a STRING representing the current
1183 : * interface state
1184 : *
1185 : * Handler function for "state" method call.
1186 : */
1187 1 : DBusMessage * wpas_dbus_iface_get_state(DBusMessage *message,
1188 : struct wpa_supplicant *wpa_s)
1189 : {
1190 1 : DBusMessage *reply = NULL;
1191 : const char *str_state;
1192 :
1193 1 : reply = dbus_message_new_method_return(message);
1194 1 : if (reply != NULL) {
1195 1 : str_state = wpa_supplicant_state_txt(wpa_s->wpa_state);
1196 1 : dbus_message_append_args(reply, DBUS_TYPE_STRING, &str_state,
1197 : DBUS_TYPE_INVALID);
1198 : }
1199 :
1200 1 : return reply;
1201 : }
1202 :
1203 :
1204 : /**
1205 : * wpas_dbus_iface_get_scanning - Get interface scanning state
1206 : * @message: Pointer to incoming dbus message
1207 : * @wpa_s: wpa_supplicant structure for a network interface
1208 : * Returns: A dbus message containing whether the interface is scanning
1209 : *
1210 : * Handler function for "scanning" method call.
1211 : */
1212 1 : DBusMessage * wpas_dbus_iface_get_scanning(DBusMessage *message,
1213 : struct wpa_supplicant *wpa_s)
1214 : {
1215 1 : DBusMessage *reply = NULL;
1216 1 : dbus_bool_t scanning = wpa_s->scanning ? TRUE : FALSE;
1217 :
1218 1 : reply = dbus_message_new_method_return(message);
1219 1 : if (reply != NULL) {
1220 1 : dbus_message_append_args(reply, DBUS_TYPE_BOOLEAN, &scanning,
1221 : DBUS_TYPE_INVALID);
1222 : } else {
1223 0 : wpa_printf(MSG_ERROR,
1224 : "dbus: Not enough memory to return scanning state");
1225 : }
1226 :
1227 1 : return reply;
1228 : }
1229 :
1230 :
1231 : #ifndef CONFIG_NO_CONFIG_BLOBS
1232 :
1233 : /**
1234 : * wpas_dbus_iface_set_blobs - Store named binary blobs (ie, for certificates)
1235 : * @message: Pointer to incoming dbus message
1236 : * @wpa_s: %wpa_supplicant data structure
1237 : * Returns: A dbus message containing a UINT32 indicating success (1) or
1238 : * failure (0)
1239 : *
1240 : * Asks wpa_supplicant to internally store a one or more binary blobs.
1241 : */
1242 8 : DBusMessage * wpas_dbus_iface_set_blobs(DBusMessage *message,
1243 : struct wpa_supplicant *wpa_s)
1244 : {
1245 8 : DBusMessage *reply = NULL;
1246 8 : struct wpa_dbus_dict_entry entry = { .type = DBUS_TYPE_STRING };
1247 : DBusMessageIter iter, iter_dict;
1248 :
1249 8 : dbus_message_iter_init(message, &iter);
1250 :
1251 8 : if (!wpa_dbus_dict_open_read(&iter, &iter_dict, NULL))
1252 1 : return wpas_dbus_new_invalid_opts_error(message, NULL);
1253 :
1254 16 : while (wpa_dbus_dict_has_dict_entry(&iter_dict)) {
1255 : struct wpa_config_blob *blob;
1256 :
1257 8 : if (!wpa_dbus_dict_get_entry(&iter_dict, &entry)) {
1258 1 : reply = wpas_dbus_new_invalid_opts_error(message,
1259 : NULL);
1260 1 : break;
1261 : }
1262 :
1263 13 : if (entry.type != DBUS_TYPE_ARRAY ||
1264 6 : entry.array_type != DBUS_TYPE_BYTE) {
1265 1 : reply = wpas_dbus_new_invalid_opts_error(
1266 : message, "Byte array expected.");
1267 1 : break;
1268 : }
1269 :
1270 12 : if ((entry.array_len <= 0) || (entry.array_len > 65536) ||
1271 6 : !strlen(entry.key)) {
1272 1 : reply = wpas_dbus_new_invalid_opts_error(
1273 : message, "Invalid array size.");
1274 1 : break;
1275 : }
1276 :
1277 5 : blob = os_zalloc(sizeof(*blob));
1278 5 : if (blob == NULL) {
1279 1 : reply = dbus_message_new_error(
1280 : message, WPAS_ERROR_ADD_ERROR,
1281 : "Not enough memory to add blob.");
1282 1 : break;
1283 : }
1284 4 : blob->data = os_zalloc(entry.array_len);
1285 4 : if (blob->data == NULL) {
1286 1 : reply = dbus_message_new_error(
1287 : message, WPAS_ERROR_ADD_ERROR,
1288 : "Not enough memory to add blob data.");
1289 1 : os_free(blob);
1290 1 : break;
1291 : }
1292 :
1293 3 : blob->name = os_strdup(entry.key);
1294 3 : blob->len = entry.array_len;
1295 3 : os_memcpy(blob->data, (u8 *) entry.bytearray_value,
1296 : entry.array_len);
1297 3 : if (blob->name == NULL) {
1298 1 : wpa_config_free_blob(blob);
1299 1 : reply = dbus_message_new_error(
1300 : message, WPAS_ERROR_ADD_ERROR,
1301 : "Error adding blob.");
1302 1 : break;
1303 : }
1304 :
1305 : /* Success */
1306 2 : if (!wpa_config_remove_blob(wpa_s->conf, blob->name))
1307 0 : wpas_notify_blob_removed(wpa_s, blob->name);
1308 2 : wpa_config_set_blob(wpa_s->conf, blob);
1309 2 : wpas_notify_blob_added(wpa_s, blob->name);
1310 :
1311 2 : wpa_dbus_dict_entry_clear(&entry);
1312 : }
1313 7 : wpa_dbus_dict_entry_clear(&entry);
1314 :
1315 7 : return reply ? reply : wpas_dbus_new_success_reply(message);
1316 : }
1317 :
1318 :
1319 : /**
1320 : * wpas_dbus_iface_remove_blob - Remove named binary blobs
1321 : * @message: Pointer to incoming dbus message
1322 : * @wpa_s: %wpa_supplicant data structure
1323 : * Returns: A dbus message containing a UINT32 indicating success (1) or
1324 : * failure (0)
1325 : *
1326 : * Asks wpa_supplicant to remove one or more previously stored binary blobs.
1327 : */
1328 5 : DBusMessage * wpas_dbus_iface_remove_blobs(DBusMessage *message,
1329 : struct wpa_supplicant *wpa_s)
1330 : {
1331 : DBusMessageIter iter, array;
1332 5 : char *err_msg = NULL;
1333 :
1334 5 : dbus_message_iter_init(message, &iter);
1335 :
1336 9 : if (dbus_message_iter_get_arg_type(&iter) != DBUS_TYPE_ARRAY ||
1337 4 : dbus_message_iter_get_element_type(&iter) != DBUS_TYPE_STRING)
1338 2 : return wpas_dbus_new_invalid_opts_error(message, NULL);
1339 :
1340 3 : dbus_message_iter_recurse(&iter, &array);
1341 10 : while (dbus_message_iter_get_arg_type(&array) == DBUS_TYPE_STRING) {
1342 : const char *name;
1343 :
1344 4 : dbus_message_iter_get_basic(&array, &name);
1345 4 : if (!os_strlen(name))
1346 1 : err_msg = "Invalid blob name.";
1347 3 : else if (wpa_config_remove_blob(wpa_s->conf, name) != 0)
1348 1 : err_msg = "Error removing blob.";
1349 : else
1350 2 : wpas_notify_blob_removed(wpa_s, name);
1351 4 : dbus_message_iter_next(&array);
1352 : }
1353 :
1354 3 : if (err_msg)
1355 2 : return dbus_message_new_error(message, WPAS_ERROR_REMOVE_ERROR,
1356 : err_msg);
1357 :
1358 1 : return wpas_dbus_new_success_reply(message);
1359 : }
1360 :
1361 : #endif /* CONFIG_NO_CONFIG_BLOBS */
1362 :
1363 :
1364 : /**
1365 : * wpas_dbus_iface_flush - Clear BSS of old or all inactive entries
1366 : * @message: Pointer to incoming dbus message
1367 : * @wpa_s: %wpa_supplicant data structure
1368 : * Returns: a dbus message containing a UINT32 indicating success (1) or
1369 : * failure (0), or returns a dbus error message with more information
1370 : *
1371 : * Handler function for "flush" method call. Handles requests for an
1372 : * interface with an optional "age" parameter that specifies the minimum
1373 : * age of a BSS to be flushed.
1374 : */
1375 3 : DBusMessage * wpas_dbus_iface_flush(DBusMessage *message,
1376 : struct wpa_supplicant *wpa_s)
1377 : {
1378 3 : int flush_age = 0;
1379 :
1380 6 : if (os_strlen(dbus_message_get_signature(message)) != 0 &&
1381 3 : !dbus_message_get_args(message, NULL,
1382 : DBUS_TYPE_INT32, &flush_age,
1383 : DBUS_TYPE_INVALID)) {
1384 1 : return wpas_dbus_new_invalid_opts_error(message, NULL);
1385 : }
1386 :
1387 2 : if (flush_age == 0)
1388 1 : wpa_bss_flush(wpa_s);
1389 : else
1390 1 : wpa_bss_flush_by_age(wpa_s, flush_age);
1391 :
1392 2 : return wpas_dbus_new_success_reply(message);
1393 : }
|