2
* WPA Supplicant / dbus-based control interface
3
* Copyright (c) 2006, Dan Williams <dcbw@redhat.com> and Red Hat, Inc.
5
* This program is free software; you can redistribute it and/or modify
6
* it under the terms of the GNU General Public License version 2 as
7
* published by the Free Software Foundation.
9
* Alternatively, this software may be distributed under the terms of BSD
12
* See README and COPYING for more details.
17
#include <dbus/dbus.h>
22
#include "wpa_supplicant.h"
25
#include "wpa_supplicant_i.h"
26
#include "ctrl_iface_dbus.h"
27
#include "ctrl_iface_dbus_handlers.h"
28
#include "l2_packet.h"
33
struct ctrl_iface_dbus_priv {
36
struct wpa_global *global;
42
static void process_watch(struct ctrl_iface_dbus_priv *iface,
43
DBusWatch *watch, eloop_event_type type)
45
dbus_connection_ref(iface->con);
47
iface->should_dispatch = 0;
49
if (type == EVENT_TYPE_READ)
50
dbus_watch_handle(watch, DBUS_WATCH_READABLE);
51
else if (type == EVENT_TYPE_WRITE)
52
dbus_watch_handle(watch, DBUS_WATCH_WRITABLE);
53
else if (type == EVENT_TYPE_EXCEPTION)
54
dbus_watch_handle(watch, DBUS_WATCH_ERROR);
56
if (iface->should_dispatch) {
57
while (dbus_connection_get_dispatch_status(iface->con) ==
58
DBUS_DISPATCH_DATA_REMAINS)
59
dbus_connection_dispatch(iface->con);
60
iface->should_dispatch = 0;
63
dbus_connection_unref(iface->con);
67
static void process_watch_exception(int sock, void *eloop_ctx, void *sock_ctx)
69
process_watch(eloop_ctx, sock_ctx, EVENT_TYPE_EXCEPTION);
73
static void process_watch_read(int sock, void *eloop_ctx, void *sock_ctx)
75
process_watch(eloop_ctx, sock_ctx, EVENT_TYPE_READ);
79
static void process_watch_write(int sock, void *eloop_ctx, void *sock_ctx)
81
process_watch(eloop_ctx, sock_ctx, EVENT_TYPE_WRITE);
85
static void connection_setup_add_watch(struct ctrl_iface_dbus_priv *iface,
91
if (!dbus_watch_get_enabled(watch))
94
flags = dbus_watch_get_flags(watch);
95
fd = dbus_watch_get_fd(watch);
97
eloop_register_sock(fd, EVENT_TYPE_EXCEPTION, process_watch_exception,
100
if (flags & DBUS_WATCH_READABLE) {
101
eloop_register_sock(fd, EVENT_TYPE_READ, process_watch_read,
104
if (flags & DBUS_WATCH_WRITABLE) {
105
eloop_register_sock(fd, EVENT_TYPE_WRITE, process_watch_write,
109
dbus_watch_set_data(watch, iface, NULL);
113
static void connection_setup_remove_watch(struct ctrl_iface_dbus_priv *iface,
119
flags = dbus_watch_get_flags(watch);
120
fd = dbus_watch_get_fd(watch);
122
eloop_unregister_sock(fd, EVENT_TYPE_EXCEPTION);
124
if (flags & DBUS_WATCH_READABLE)
125
eloop_unregister_sock(fd, EVENT_TYPE_READ);
126
if (flags & DBUS_WATCH_WRITABLE)
127
eloop_unregister_sock(fd, EVENT_TYPE_WRITE);
129
dbus_watch_set_data(watch, NULL, NULL);
133
static dbus_bool_t add_watch(DBusWatch *watch, void *data)
135
connection_setup_add_watch(data, watch);
140
static void remove_watch(DBusWatch *watch, void *data)
142
connection_setup_remove_watch(data, watch);
146
static void watch_toggled(DBusWatch *watch, void *data)
148
if (dbus_watch_get_enabled(watch))
149
add_watch(watch, data);
151
remove_watch(watch, data);
155
static void process_timeout(void *eloop_ctx, void *sock_ctx)
157
DBusTimeout *timeout = sock_ctx;
159
dbus_timeout_handle(timeout);
163
static void connection_setup_add_timeout(struct ctrl_iface_dbus_priv *iface,
164
DBusTimeout *timeout)
166
if (!dbus_timeout_get_enabled(timeout))
169
eloop_register_timeout(0, dbus_timeout_get_interval(timeout) * 1000,
170
process_timeout, iface, timeout);
172
dbus_timeout_set_data(timeout, iface, NULL);
176
static void connection_setup_remove_timeout(struct ctrl_iface_dbus_priv *iface,
177
DBusTimeout *timeout)
179
eloop_cancel_timeout(process_timeout, iface, timeout);
180
dbus_timeout_set_data(timeout, NULL, NULL);
184
static dbus_bool_t add_timeout(DBusTimeout *timeout, void *data)
186
if (!dbus_timeout_get_enabled(timeout))
189
connection_setup_add_timeout(data, timeout);
195
static void remove_timeout(DBusTimeout *timeout, void *data)
197
connection_setup_remove_timeout(data, timeout);
201
static void timeout_toggled(DBusTimeout *timeout, void *data)
203
if (dbus_timeout_get_enabled(timeout))
204
add_timeout(timeout, data);
206
remove_timeout(timeout, data);
210
static void process_wakeup_main(int sig, void *eloop_ctx, void *signal_ctx)
212
struct ctrl_iface_dbus_priv *iface = signal_ctx;
214
if (sig != SIGPOLL || !iface->con)
217
if (dbus_connection_get_dispatch_status(iface->con) !=
218
DBUS_DISPATCH_DATA_REMAINS)
221
/* Only dispatch once - we do not want to starve other events */
222
dbus_connection_ref(iface->con);
223
dbus_connection_dispatch(iface->con);
224
dbus_connection_unref(iface->con);
229
* wakeup_main - Attempt to wake our mainloop up
230
* @data: dbus control interface private data
232
* Try to wake up the main eloop so it will process
233
* dbus events that may have happened.
235
static void wakeup_main(void *data)
237
struct ctrl_iface_dbus_priv *iface = data;
239
/* Use SIGPOLL to break out of the eloop select() */
241
iface->should_dispatch = 1;
246
* connection_setup_wakeup_main - Tell dbus about our wakeup_main function
247
* @iface: dbus control interface private data
248
* Returns: 0 on success, -1 on failure
250
* Register our wakeup_main handler with dbus
252
static int connection_setup_wakeup_main(struct ctrl_iface_dbus_priv *iface)
254
if (eloop_register_signal(SIGPOLL, process_wakeup_main, iface))
257
dbus_connection_set_wakeup_main_function(iface->con, wakeup_main,
265
* wpa_supplicant_dbus_next_objid - Return next available object id
266
* @iface: dbus control interface private data
269
u32 wpa_supplicant_dbus_next_objid (struct ctrl_iface_dbus_priv *iface)
271
return iface->next_objid++;
276
* wpas_dbus_decompose_object_path - Decompose an interface object path into parts
277
* @path: The dbus object path
278
* @network: (out) the configured network this object path refers to, if any
279
* @bssid: (out) the scanned bssid this object path refers to, if any
280
* Returns: The object path of the network interface this path refers to
282
* For a given object path, decomposes the object path into object id, network,
283
* and BSSID parts, if those parts exist.
285
char * wpas_dbus_decompose_object_path(const char *path, char **network,
288
const unsigned int dev_path_prefix_len =
289
strlen(WPAS_DBUS_PATH_INTERFACES "/");
293
/* Be a bit paranoid about path */
294
if (!path || strncmp(path, WPAS_DBUS_PATH_INTERFACES "/",
295
dev_path_prefix_len))
298
/* Ensure there's something at the end of the path */
299
if ((path + dev_path_prefix_len)[0] == '\0')
302
obj_path_only = strdup(path);
303
if (obj_path_only == NULL)
306
next_sep = strchr(obj_path_only + dev_path_prefix_len, '/');
307
if (next_sep != NULL) {
308
const char *net_part = strstr(next_sep,
309
WPAS_DBUS_NETWORKS_PART "/");
310
const char *bssid_part = strstr(next_sep,
311
WPAS_DBUS_BSSIDS_PART "/");
313
if (network && net_part) {
314
/* Deal with a request for a configured network */
315
const char *net_name = net_part +
316
strlen(WPAS_DBUS_NETWORKS_PART "/");
318
if (strlen(net_name))
319
*network = strdup(net_name);
320
} else if (bssid && bssid_part) {
321
/* Deal with a request for a scanned BSSID */
322
const char *bssid_name = bssid_part +
323
strlen(WPAS_DBUS_BSSIDS_PART "/");
324
if (strlen(bssid_name))
325
*bssid = strdup(bssid_name);
330
/* Cut off interface object path before "/" */
334
return obj_path_only;
339
* wpas_dbus_new_invalid_iface_error - Return a new invalid interface error message
340
* @message: Pointer to incoming dbus message this error refers to
341
* Returns: A dbus error message
343
* Convenience function to create and return an invalid interface error
345
DBusMessage * wpas_dbus_new_invalid_iface_error(DBusMessage *message)
347
return dbus_message_new_error(message, WPAS_ERROR_INVALID_IFACE,
348
"wpa_supplicant knows nothing about "
354
* wpas_dbus_new_invalid_network_error - Return a new invalid network error message
355
* @message: Pointer to incoming dbus message this error refers to
356
* Returns: a dbus error message
358
* Convenience function to create and return an invalid network error
360
DBusMessage * wpas_dbus_new_invalid_network_error(DBusMessage *message)
362
return dbus_message_new_error(message, WPAS_ERROR_INVALID_NETWORK,
363
"The requested network does not exist.");
368
* wpas_dbus_new_invalid_bssid_error - Return a new invalid bssid error message
369
* @message: Pointer to incoming dbus message this error refers to
370
* Returns: a dbus error message
372
* Convenience function to create and return an invalid bssid error
374
static DBusMessage * wpas_dbus_new_invalid_bssid_error(DBusMessage *message)
376
return dbus_message_new_error(message, WPAS_ERROR_INVALID_BSSID,
377
"The BSSID requested was invalid.");
382
* wpas_dispatch_network_method - dispatch messages for configured networks
383
* @message: the incoming dbus message
384
* @wpa_s: a network interface's data
385
* @network_id: id of the configured network we're interested in
386
* Returns: a reply dbus message, or a dbus error message
388
* This function dispatches all incoming dbus messages for configured networks.
390
static DBusMessage * wpas_dispatch_network_method(DBusMessage *message,
391
struct wpa_supplicant *wpa_s,
394
DBusMessage *reply = NULL;
395
const char *method = dbus_message_get_member(message);
396
struct wpa_ssid *ssid;
398
ssid = wpa_config_get_network(wpa_s->conf, network_id);
400
return wpas_dbus_new_invalid_network_error(message);
402
if (!strcmp(method, "set"))
403
reply = wpas_dbus_iface_set_network(message, wpa_s, ssid);
404
else if (!strcmp(method, "enable"))
405
reply = wpas_dbus_iface_enable_network(message, wpa_s, ssid);
406
else if (!strcmp(method, "disable"))
407
reply = wpas_dbus_iface_disable_network(message, wpa_s, ssid);
414
* wpas_dispatch_bssid_method - dispatch messages for scanned networks
415
* @message: the incoming dbus message
416
* @wpa_s: a network interface's data
417
* @bssid: bssid of the scanned network we're interested in
418
* Returns: a reply dbus message, or a dbus error message
420
* This function dispatches all incoming dbus messages for scanned networks.
422
static DBusMessage * wpas_dispatch_bssid_method(DBusMessage *message,
423
struct wpa_supplicant *wpa_s,
426
DBusMessage *reply = NULL;
427
const char *method = dbus_message_get_member(message);
428
struct wpa_scan_result * res = NULL;
431
/* Ensure we actually have scan data */
432
if (wpa_s->scan_results == NULL &&
433
wpa_supplicant_get_scan_results(wpa_s) < 0) {
434
reply = wpas_dbus_new_invalid_bssid_error(message);
438
/* Find the bssid's scan data */
439
for (i = 0; i < wpa_s->num_scan_results; i++) {
440
struct wpa_scan_result * search_res = &wpa_s->scan_results[i];
443
memset(mac_str, 0, sizeof(mac_str));
444
snprintf(mac_str, sizeof(mac_str) - 1, WPAS_DBUS_BSSID_FORMAT,
445
MAC2STR(search_res->bssid));
446
if (!strcmp(bssid, mac_str)) {
452
reply = wpas_dbus_new_invalid_bssid_error(message);
456
/* Dispatch the method call against the scanned bssid */
457
if (!strcmp(method, "properties"))
458
reply = wpas_dbus_bssid_properties(message, wpa_s, res);
466
* wpas_iface_message_handler - Dispatch messages for interfaces or networks
467
* @connection: Connection to the system message bus
468
* @message: An incoming dbus message
469
* @user_data: A pointer to a dbus control interface data structure
470
* Returns: Whether or not the message was handled
472
* This function dispatches all incoming dbus messages for network interfaces,
473
* or objects owned by them, such as scanned BSSIDs and configured networks.
475
static DBusHandlerResult wpas_iface_message_handler(DBusConnection *connection,
476
DBusMessage *message,
479
struct wpa_supplicant *wpa_s = user_data;
480
const char *method = dbus_message_get_member(message);
481
const char *path = dbus_message_get_path(message);
482
const char *msg_interface = dbus_message_get_interface(message);
483
char *iface_obj_path = NULL;
484
char *network = NULL;
486
DBusMessage *reply = NULL;
488
/* Caller must specify a message interface */
492
iface_obj_path = wpas_dbus_decompose_object_path(path, &network,
494
if (iface_obj_path == NULL) {
495
reply = wpas_dbus_new_invalid_iface_error(message);
499
/* Make sure the message's object path actually refers to the
500
* wpa_supplicant structure it's supposed to (which is wpa_s)
502
if (wpa_supplicant_get_iface_by_dbus_path(wpa_s->global,
503
iface_obj_path) != wpa_s) {
504
reply = wpas_dbus_new_invalid_iface_error(message);
508
if (network && !strcmp(msg_interface, WPAS_DBUS_IFACE_NETWORK)) {
509
/* A method for one of this interface's configured networks */
510
int nid = strtoul(network, NULL, 10);
512
reply = wpas_dispatch_network_method(message, wpa_s,
515
reply = wpas_dbus_new_invalid_network_error(message);
516
} else if (bssid && !strcmp(msg_interface, WPAS_DBUS_IFACE_BSSID)) {
517
/* A method for one of this interface's scanned BSSIDs */
518
reply = wpas_dispatch_bssid_method(message, wpa_s, bssid);
519
} else if (!strcmp(msg_interface, WPAS_DBUS_IFACE_INTERFACE)) {
520
/* A method for an interface only. */
521
if (!strcmp(method, "scan"))
522
reply = wpas_dbus_iface_scan(message, wpa_s);
523
else if (!strcmp(method, "scanResults"))
524
reply = wpas_dbus_iface_scan_results(message, wpa_s);
525
else if (!strcmp(method, "addNetwork"))
526
reply = wpas_dbus_iface_add_network(message, wpa_s);
527
else if (!strcmp(method, "removeNetwork"))
528
reply = wpas_dbus_iface_remove_network(message, wpa_s);
529
else if (!strcmp(method, "selectNetwork"))
530
reply = wpas_dbus_iface_select_network(message, wpa_s);
531
else if (!strcmp(method, "capabilities"))
532
reply = wpas_dbus_iface_capabilities(message, wpa_s);
533
else if (!strcmp(method, "disconnect"))
534
reply = wpas_dbus_iface_disconnect(message, wpa_s);
535
else if (!strcmp(method, "setAPScan"))
536
reply = wpas_dbus_iface_set_ap_scan(message, wpa_s);
537
else if (!strcmp(method, "state"))
538
reply = wpas_dbus_iface_get_state(message, wpa_s);
541
/* If the message was handled, send back the reply */
543
dbus_connection_send(connection, reply, NULL);
544
dbus_message_unref(reply);
548
free(iface_obj_path);
551
return reply ? DBUS_HANDLER_RESULT_HANDLED :
552
DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
557
* wpas_message_handler - dispatch incoming dbus messages
558
* @connection: connection to the system message bus
559
* @message: an incoming dbus message
560
* @user_data: a pointer to a dbus control interface data structure
561
* Returns: whether or not the message was handled
563
* This function dispatches all incoming dbus messages to the correct
564
* handlers, depending on what the message's target object path is,
565
* and what the method call is.
567
static DBusHandlerResult wpas_message_handler(DBusConnection *connection,
568
DBusMessage *message, void *user_data)
570
struct ctrl_iface_dbus_priv *ctrl_iface = user_data;
573
const char *msg_interface;
574
DBusMessage *reply = NULL;
576
method = dbus_message_get_member(message);
577
path = dbus_message_get_path(message);
578
msg_interface = dbus_message_get_interface(message);
579
if (!method || !path || !ctrl_iface || !msg_interface)
580
return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
582
/* Validate the method interface */
583
if (strcmp(msg_interface, WPAS_DBUS_INTERFACE) != 0)
584
return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
586
if (!strcmp(path, WPAS_DBUS_PATH)) {
587
/* dispatch methods against our global dbus interface here */
588
if (!strcmp(method, "addInterface")) {
589
reply = wpas_dbus_global_add_interface(
590
message, ctrl_iface->global);
591
} else if (!strcmp(method, "removeInterface")) {
592
reply = wpas_dbus_global_remove_interface(
593
message, ctrl_iface->global);
594
} else if (!strcmp(method, "getInterface")) {
595
reply = wpas_dbus_global_get_interface(
596
message, ctrl_iface->global);
600
/* If the message was handled, send back the reply */
602
dbus_connection_send(connection, reply, NULL);
603
dbus_message_unref(reply);
606
return reply ? DBUS_HANDLER_RESULT_HANDLED :
607
DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
612
* wpa_supplicant_dbus_notify_scan_results - Send a scan results signal
613
* @wpa_s: %wpa_supplicant network interface data
614
* Returns: 0 on success, -1 on failure
616
* Notify listeners that this interface has updated scan results.
618
void wpa_supplicant_dbus_notify_scan_results(struct wpa_supplicant *wpa_s)
620
struct ctrl_iface_dbus_priv *iface = wpa_s->global->dbus_ctrl_iface;
624
/* Do nothing if the control interface is not turned on */
628
path = wpa_supplicant_get_dbus_path(wpa_s);
630
perror("wpa_supplicant_dbus_notify_scan_results[dbus]: "
631
"interface didn't have a dbus path");
632
wpa_printf(MSG_ERROR,
633
"wpa_supplicant_dbus_notify_scan_results[dbus]: "
634
"interface didn't have a dbus path; can't send "
635
"scan result signal.");
638
signal = dbus_message_new_signal(path, WPAS_DBUS_IFACE_INTERFACE,
639
"ScanResultsAvailable");
640
if (signal == NULL) {
641
perror("wpa_supplicant_dbus_notify_scan_results[dbus]: "
642
"couldn't create dbus signal; likely out of memory");
643
wpa_printf(MSG_ERROR, "dbus control interface: not enough "
644
"memory to send scan results signal.");
647
dbus_connection_send(iface->con, signal, NULL);
652
* wpa_supplicant_dbus_notify_state_change - Send a state change signal
653
* @wpa_s: %wpa_supplicant network interface data
654
* @new_state: new state wpa_supplicant is entering
655
* @old_state: old state wpa_supplicant is leaving
656
* Returns: 0 on success, -1 on failure
658
* Notify listeners that wpa_supplicant has changed state
660
void wpa_supplicant_dbus_notify_state_change(struct wpa_supplicant *wpa_s,
661
wpa_states new_state,
662
wpa_states old_state)
664
struct ctrl_iface_dbus_priv *iface;
667
const char *new_state_str, *old_state_str;
669
/* Do nothing if the control interface is not turned on */
670
if (wpa_s->global == NULL)
672
iface = wpa_s->global->dbus_ctrl_iface;
676
/* Only send signal if state really changed */
677
if (new_state == old_state)
680
path = wpa_supplicant_get_dbus_path(wpa_s);
682
perror("wpa_supplicant_dbus_notify_state_change[dbus]: "
683
"interface didn't have a dbus path");
684
wpa_printf(MSG_ERROR,
685
"wpa_supplicant_dbus_notify_state_change[dbus]: "
686
"interface didn't have a dbus path; can't send "
690
signal = dbus_message_new_signal(path, WPAS_DBUS_IFACE_INTERFACE,
692
if (signal == NULL) {
693
perror("wpa_supplicant_dbus_notify_state_change[dbus]: "
694
"couldn't create dbus signal; likely out of memory");
695
wpa_printf(MSG_ERROR,
696
"wpa_supplicant_dbus_notify_state_change[dbus]: "
697
"couldn't create dbus signal; likely out of "
702
new_state_str = wpa_supplicant_state_txt(new_state);
703
old_state_str = wpa_supplicant_state_txt(old_state);
704
if (new_state_str == NULL || old_state_str == NULL) {
705
perror("wpa_supplicant_dbus_notify_state_change[dbus]: "
706
"couldn't convert state strings");
707
wpa_printf(MSG_ERROR,
708
"wpa_supplicant_dbus_notify_state_change[dbus]: "
709
"couldn't convert state strings.");
713
if (!dbus_message_append_args(signal,
714
DBUS_TYPE_STRING, &new_state_str,
715
DBUS_TYPE_STRING, &old_state_str,
716
DBUS_TYPE_INVALID)) {
717
perror("wpa_supplicant_dbus_notify_state_change[dbus]: "
718
"not enough memory to construct state change signal.");
719
wpa_printf(MSG_ERROR,
720
"wpa_supplicant_dbus_notify_state_change[dbus]: "
721
"not enough memory to construct state change "
724
dbus_connection_send(iface->con, signal, NULL);
729
* integrate_with_eloop - Register our mainloop integration with dbus
730
* @connection: connection to the system message bus
731
* @iface: a dbus control interface data structure
732
* Returns: 0 on success, -1 on failure
734
* We register our mainloop integration functions with dbus here.
736
static int integrate_with_eloop(DBusConnection *connection,
737
struct ctrl_iface_dbus_priv *iface)
739
if (!dbus_connection_set_watch_functions(connection, add_watch,
740
remove_watch, watch_toggled,
742
perror("dbus_connection_set_watch_functions[dbus]");
743
wpa_printf(MSG_ERROR, "Not enough memory to set up dbus.");
747
if (!dbus_connection_set_timeout_functions(connection, add_timeout,
749
timeout_toggled, iface,
751
perror("dbus_connection_set_timeout_functions[dbus]");
752
wpa_printf(MSG_ERROR, "Not enough memory to set up dbus.");
756
if (connection_setup_wakeup_main(iface) < 0) {
757
perror("connection_setup_wakeup_main[dbus]");
758
wpa_printf(MSG_ERROR, "Could not setup main wakeup function.");
767
* dispatch_initial_dbus_messages - Dispatch initial dbus messages after
769
* @eloop_ctx: the DBusConnection to dispatch on
770
* @timeout_ctx: unused
772
* If clients are quick to notice that wpa_supplicant claimed its bus name,
773
* there may have been messages that came in before initialization was
774
* all finished. Dispatch those here.
776
static void dispatch_initial_dbus_messages(void *eloop_ctx, void *timeout_ctx)
778
DBusConnection *con = eloop_ctx;
780
while (dbus_connection_get_dispatch_status(con) ==
781
DBUS_DISPATCH_DATA_REMAINS)
782
dbus_connection_dispatch(con);
787
* wpa_supplicant_dbus_ctrl_iface_init - Initialize dbus control interface
788
* @global: Pointer to global data from wpa_supplicant_init()
789
* Returns: Pointer to dbus_ctrl_iface date or %NULL on failure
791
* Initialize the dbus control interface and start receiving commands from
792
* external programs over the bus.
794
struct ctrl_iface_dbus_priv *
795
wpa_supplicant_dbus_ctrl_iface_init(struct wpa_global *global)
797
struct ctrl_iface_dbus_priv *iface;
800
DBusObjectPathVTable wpas_vtable = {
801
NULL, &wpas_message_handler, NULL, NULL, NULL, NULL
804
iface = wpa_zalloc(sizeof(struct ctrl_iface_dbus_priv));
808
iface->global = global;
810
/* Get a reference to the system bus */
811
dbus_error_init(&error);
812
iface->con = dbus_bus_get(DBUS_BUS_SYSTEM, &error);
813
dbus_error_free(&error);
815
perror("dbus_bus_get[ctrl_iface_dbus]");
816
wpa_printf(MSG_ERROR, "Could not acquire the system bus.");
820
/* Tell dbus about our mainloop integration functions */
821
if (integrate_with_eloop(iface->con, iface))
824
/* Register the message handler for the global dbus interface */
825
if (!dbus_connection_register_object_path(iface->con,
826
WPAS_DBUS_PATH, &wpas_vtable,
828
perror("dbus_connection_register_object_path[dbus]");
829
wpa_printf(MSG_ERROR, "Could not set up DBus message "
834
/* Register our service with the message bus */
835
dbus_error_init(&error);
836
switch (dbus_bus_request_name(iface->con, WPAS_DBUS_SERVICE,
838
case DBUS_REQUEST_NAME_REPLY_PRIMARY_OWNER:
841
case DBUS_REQUEST_NAME_REPLY_EXISTS:
842
case DBUS_REQUEST_NAME_REPLY_IN_QUEUE:
843
case DBUS_REQUEST_NAME_REPLY_ALREADY_OWNER:
844
perror("dbus_bus_request_name[dbus]");
845
wpa_printf(MSG_ERROR, "Could not request DBus service name: "
846
"already registered.");
849
perror("dbus_bus_request_name[dbus]");
850
wpa_printf(MSG_ERROR, "Could not request DBus service name: "
851
"%s %s.", error.name, error.message);
854
dbus_error_free(&error);
859
wpa_printf(MSG_DEBUG, "Providing DBus service '" WPAS_DBUS_SERVICE
863
* Dispatch initial DBus messages that may have come in since the bus
864
* name was claimed above. Happens when clients are quick to notice the
865
* wpa_supplicant service.
867
* FIXME: is there a better solution to this problem?
869
eloop_register_timeout(0, 50, dispatch_initial_dbus_messages,
875
wpa_supplicant_dbus_ctrl_iface_deinit(iface);
881
* wpa_supplicant_dbus_ctrl_iface_deinit - Deinitialize dbus ctrl interface
882
* @iface: Pointer to dbus private data from
883
* wpa_supplicant_dbus_ctrl_iface_init()
885
* Deinitialize the dbus control interface that was initialized with
886
* wpa_supplicant_dbus_ctrl_iface_init().
888
void wpa_supplicant_dbus_ctrl_iface_deinit(struct ctrl_iface_dbus_priv *iface)
894
eloop_cancel_timeout(dispatch_initial_dbus_messages,
896
dbus_connection_set_watch_functions(iface->con, NULL, NULL,
898
dbus_connection_set_timeout_functions(iface->con, NULL, NULL,
900
dbus_connection_unref(iface->con);
903
memset(iface, 0, sizeof(struct ctrl_iface_dbus_priv));
909
* wpas_dbus_register_new_iface - Register a new interface with dbus
910
* @global: Global %wpa_supplicant data
911
* @wpa_s: %wpa_supplicant interface description structure to register
912
* Returns: 0 on success, -1 on error
914
* Registers a new interface with dbus and assigns it a dbus object path.
916
int wpas_dbus_register_iface(struct wpa_supplicant *wpa_s)
918
struct ctrl_iface_dbus_priv *ctrl_iface =
919
wpa_s->global->dbus_ctrl_iface;
920
DBusConnection * con;
922
DBusObjectPathVTable vtable = {
923
NULL, &wpas_iface_message_handler, NULL, NULL, NULL, NULL
928
/* Do nothing if the control interface is not turned on */
929
if (ctrl_iface == NULL)
932
con = ctrl_iface->con;
933
next = wpa_supplicant_dbus_next_objid(ctrl_iface);
935
/* Create and set the interface's object path */
936
path = wpa_zalloc(WPAS_DBUS_OBJECT_PATH_MAX);
939
snprintf(path, WPAS_DBUS_OBJECT_PATH_MAX,
940
WPAS_DBUS_PATH_INTERFACES "/%u",
942
if (wpa_supplicant_set_dbus_path(wpa_s, path)) {
943
wpa_printf(MSG_DEBUG,
944
"Failed to set dbus path for interface %s",
949
/* Register the message handler for the interface functions */
950
if (!dbus_connection_register_fallback(con, path, &vtable, wpa_s)) {
951
perror("wpas_dbus_register_iface [dbus]");
952
wpa_printf(MSG_ERROR, "Could not set up DBus message "
953
"handler for interface %s.", wpa_s->ifname);
965
* wpas_dbus_unregister_iface - Unregister an interface from dbus
966
* @wpa_s: wpa_supplicant interface structure
967
* Returns: 0 on success, -1 on failure
969
* Unregisters the interface with dbus
971
int wpas_dbus_unregister_iface(struct wpa_supplicant *wpa_s)
973
struct ctrl_iface_dbus_priv *ctrl_iface;
977
/* Do nothing if the control interface is not turned on */
978
if (wpa_s == NULL || wpa_s->global == NULL)
980
ctrl_iface = wpa_s->global->dbus_ctrl_iface;
981
if (ctrl_iface == NULL)
984
con = ctrl_iface->con;
985
path = wpa_supplicant_get_dbus_path(wpa_s);
987
if (!dbus_connection_unregister_object_path(con, path))
990
free(wpa_s->dbus_path);
991
wpa_s->dbus_path = NULL;
998
* wpa_supplicant_get_iface_by_dbus_path - Get a new network interface
999
* @global: Pointer to global data from wpa_supplicant_init()
1000
* @path: Pointer to a dbus object path representing an interface
1001
* Returns: Pointer to the interface or %NULL if not found
1003
struct wpa_supplicant * wpa_supplicant_get_iface_by_dbus_path(
1004
struct wpa_global *global, const char *path)
1006
struct wpa_supplicant *wpa_s;
1008
for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next) {
1009
if (strcmp(wpa_s->dbus_path, path) == 0)
1017
* wpa_supplicant_set_dbus_path - Assign a dbus path to an interface
1018
* @wpa_s: wpa_supplicant interface structure
1019
* @path: dbus path to set on the interface
1020
* Returns: 0 on succes, -1 on error
1022
int wpa_supplicant_set_dbus_path(struct wpa_supplicant *wpa_s,
1025
u32 len = strlen (path);
1026
if (len >= WPAS_DBUS_OBJECT_PATH_MAX)
1028
if (wpa_s->dbus_path)
1030
wpa_s->dbus_path = strdup(path);
1036
* wpa_supplicant_get_dbus_path - Get an interface's dbus path
1037
* @wpa_s: %wpa_supplicant interface structure
1038
* Returns: Interface's dbus object path, or %NULL on error
1040
const char * wpa_supplicant_get_dbus_path(struct wpa_supplicant *wpa_s)
1042
return wpa_s->dbus_path;