| // Copyright (c) 2012 The Chromium OS Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "shill/wifi.h" |
| |
| #include <stdio.h> |
| #include <string.h> |
| #include <netinet/ether.h> |
| #include <linux/if.h> // Needs definitions from netinet/ether.h |
| |
| #include <algorithm> |
| #include <map> |
| #include <set> |
| #include <string> |
| #include <vector> |
| |
| #include <base/bind.h> |
| #include <base/logging.h> |
| #include <base/stringprintf.h> |
| #include <base/string_number_conversions.h> |
| #include <base/string_util.h> |
| #include <chromeos/dbus/service_constants.h> |
| #include <glib.h> |
| |
| #include "shill/control_interface.h" |
| #include "shill/dbus_adaptor.h" |
| #include "shill/device.h" |
| #include "shill/error.h" |
| #include "shill/event_dispatcher.h" |
| #include "shill/key_value_store.h" |
| #include "shill/ieee80211.h" |
| #include "shill/manager.h" |
| #include "shill/metrics.h" |
| #include "shill/power_manager.h" |
| #include "shill/profile.h" |
| #include "shill/property_accessor.h" |
| #include "shill/proxy_factory.h" |
| #include "shill/rtnl_handler.h" |
| #include "shill/scope_logger.h" |
| #include "shill/shill_time.h" |
| #include "shill/store_interface.h" |
| #include "shill/supplicant_interface_proxy_interface.h" |
| #include "shill/supplicant_process_proxy_interface.h" |
| #include "shill/technology.h" |
| #include "shill/wifi_endpoint.h" |
| #include "shill/wifi_service.h" |
| #include "shill/wpa_supplicant.h" |
| |
| using base::Bind; |
| using base::StringPrintf; |
| using std::map; |
| using std::set; |
| using std::string; |
| using std::vector; |
| |
| namespace shill { |
| |
| // statics |
| const char *WiFi::kDefaultBgscanMethod = |
| wpa_supplicant::kNetworkBgscanMethodSimple; |
| const uint16 WiFi::kDefaultBgscanShortIntervalSeconds = 30; |
| const int32 WiFi::kDefaultBgscanSignalThresholdDbm = -50; |
| const uint16 WiFi::kDefaultScanIntervalSeconds = 180; |
| // Scan interval while connected. |
| const uint16 WiFi::kBackgroundScanIntervalSeconds = 3601; |
| // Note that WiFi generates some manager-level errors, because it implements |
| // the Manager.GetWiFiService flimflam API. The API is implemented here, |
| // rather than in manager, to keep WiFi-specific logic in the right place. |
| const char WiFi::kManagerErrorSSIDRequired[] = "must specify SSID"; |
| const char WiFi::kManagerErrorSSIDTooLong[] = "SSID is too long"; |
| const char WiFi::kManagerErrorSSIDTooShort[] = "SSID is too short"; |
| const char WiFi::kManagerErrorUnsupportedSecurityMode[] = |
| "security mode is unsupported"; |
| const char WiFi::kManagerErrorUnsupportedServiceMode[] = |
| "service mode is unsupported"; |
| // Age (in seconds) beyond which a BSS cache entry will not be preserved, |
| // across a suspend/resume. |
| const time_t WiFi::kMaxBSSResumeAgeSeconds = 10; |
| const char WiFi::kInterfaceStateUnknown[] = "shill-unknown"; |
| const time_t WiFi::kRescanIntervalSeconds = 1; |
| const int WiFi::kNumFastScanAttempts = 3; |
| const int WiFi::kFastScanIntervalSeconds = 10; |
| const int WiFi::kPendingTimeoutSeconds = 15; |
| |
| WiFi::WiFi(ControlInterface *control_interface, |
| EventDispatcher *dispatcher, |
| Metrics *metrics, |
| Manager *manager, |
| const string& link, |
| const string &address, |
| int interface_index) |
| : Device(control_interface, |
| dispatcher, |
| metrics, |
| manager, |
| link, |
| address, |
| interface_index, |
| Technology::kWifi), |
| weak_ptr_factory_(this), |
| proxy_factory_(ProxyFactory::GetInstance()), |
| time_(Time::GetInstance()), |
| supplicant_present_(false), |
| supplicant_state_(kInterfaceStateUnknown), |
| supplicant_bss_("(unknown)"), |
| clear_cached_credentials_pending_(false), |
| need_bss_flush_(false), |
| resumed_at_((struct timeval){0}), |
| fast_scans_remaining_(kNumFastScanAttempts), |
| bgscan_short_interval_seconds_(kDefaultBgscanShortIntervalSeconds), |
| bgscan_signal_threshold_dbm_(kDefaultBgscanSignalThresholdDbm), |
| scan_pending_(false), |
| scan_interval_seconds_(kDefaultScanIntervalSeconds) { |
| PropertyStore *store = this->mutable_store(); |
| store->RegisterDerivedString( |
| flimflam::kBgscanMethodProperty, |
| StringAccessor( |
| // TODO(petkov): CustomMappedAccessor is used for convenience because |
| // it provides a way to define a custom clearer (unlike |
| // CustomAccessor). We need to implement a fully custom accessor with |
| // no extra argument. |
| new CustomMappedAccessor<WiFi, string, int>(this, |
| &WiFi::ClearBgscanMethod, |
| &WiFi::GetBgscanMethod, |
| &WiFi::SetBgscanMethod, |
| 0))); // Unused. |
| HelpRegisterDerivedUint16(store, |
| flimflam::kBgscanShortIntervalProperty, |
| &WiFi::GetBgscanShortInterval, |
| &WiFi::SetBgscanShortInterval); |
| HelpRegisterDerivedInt32(store, |
| flimflam::kBgscanSignalThresholdProperty, |
| &WiFi::GetBgscanSignalThreshold, |
| &WiFi::SetBgscanSignalThreshold); |
| |
| // TODO(quiche): Decide if scan_pending_ is close enough to |
| // "currently scanning" that we don't care, or if we want to track |
| // scan pending/currently scanning/no scan scheduled as a tri-state |
| // kind of thing. |
| store->RegisterConstBool(flimflam::kScanningProperty, &scan_pending_); |
| HelpRegisterDerivedUint16(store, |
| flimflam::kScanIntervalProperty, |
| &WiFi::GetScanInterval, |
| &WiFi::SetScanInterval); |
| SLOG(WiFi, 2) << "WiFi device " << link_name() << " initialized."; |
| } |
| |
| WiFi::~WiFi() {} |
| |
| void WiFi::Start(Error *error, const EnabledStateChangedCallback &callback) { |
| SLOG(WiFi, 2) << "WiFi " << link_name() << " starting."; |
| if (enabled()) { |
| return; |
| } |
| OnEnabledStateChanged(EnabledStateChangedCallback(), Error()); |
| if (error) { |
| error->Reset(); // indicate immediate completion |
| } |
| if (on_supplicant_appear_.IsCancelled()) { |
| // Registers the WPA supplicant appear/vanish callbacks only once per WiFi |
| // device instance. |
| on_supplicant_appear_.Reset( |
| Bind(&WiFi::OnSupplicantAppear, Unretained(this))); |
| on_supplicant_vanish_.Reset( |
| Bind(&WiFi::OnSupplicantVanish, Unretained(this))); |
| manager()->dbus_manager()->WatchName(wpa_supplicant::kDBusAddr, |
| on_supplicant_appear_.callback(), |
| on_supplicant_vanish_.callback()); |
| } |
| // Connect to WPA supplicant if it's already present. If not, we'll connect to |
| // it when it appears. |
| ConnectToSupplicant(); |
| } |
| |
| void WiFi::Stop(Error *error, const EnabledStateChangedCallback &callback) { |
| SLOG(WiFi, 2) << "WiFi " << link_name() << " stopping."; |
| DropConnection(); |
| StopScanTimer(); |
| endpoint_by_rpcid_.clear(); |
| manager()->power_manager()->RemoveStateChangeCallback(UniqueName()); |
| |
| for (vector<WiFiServiceRefPtr>::const_iterator it = services_.begin(); |
| it != services_.end(); |
| ++it) { |
| SLOG(WiFi, 3) << "WiFi " << link_name() << " deregistering service " |
| << (*it)->friendly_name(); |
| manager()->DeregisterService(*it); |
| } |
| rpcid_by_service_.clear(); |
| services_.clear(); // breaks reference cycles |
| supplicant_interface_proxy_.reset(); // breaks a reference cycle |
| // TODO(quiche): Remove interface from supplicant. |
| supplicant_process_proxy_.reset(); |
| current_service_ = NULL; // breaks a reference cycle |
| pending_service_ = NULL; // breaks a reference cycle |
| scan_pending_ = false; |
| StopPendingTimer(); |
| |
| OnEnabledStateChanged(EnabledStateChangedCallback(), Error()); |
| if (error) |
| error->Reset(); // indicate immediate completion |
| weak_ptr_factory_.InvalidateWeakPtrs(); |
| |
| SLOG(WiFi, 3) << "WiFi " << link_name() << " supplicant_process_proxy_ " |
| << (supplicant_process_proxy_.get() ? |
| "is set." : "is not set."); |
| SLOG(WiFi, 3) << "WiFi " << link_name() << " supplicant_interface_proxy_ " |
| << (supplicant_interface_proxy_.get() ? |
| "is set." : "is not set."); |
| SLOG(WiFi, 3) << "WiFi " << link_name() << " pending_service_ " |
| << (pending_service_.get() ? "is set." : "is not set."); |
| SLOG(WiFi, 3) << "WiFi " << link_name() << " has " |
| << endpoint_by_rpcid_.size() << " EndpointMap entries."; |
| SLOG(WiFi, 3) << "WiFi " << link_name() << " has " << services_.size() |
| << " Services."; |
| } |
| |
| bool WiFi::Load(StoreInterface *storage) { |
| LoadHiddenServices(storage); |
| return Device::Load(storage); |
| } |
| |
| void WiFi::Scan(Error */*error*/) { |
| LOG(INFO) << __func__; |
| |
| // Needs to send a D-Bus message, but may be called from D-Bus |
| // signal handler context (via Manager::RequestScan). So defer work |
| // to event loop. |
| dispatcher()->PostTask(Bind(&WiFi::ScanTask, weak_ptr_factory_.GetWeakPtr())); |
| } |
| |
| void WiFi::BSSAdded(const ::DBus::Path &path, |
| const map<string, ::DBus::Variant> &properties) { |
| // Called from a D-Bus signal handler, and may need to send a D-Bus |
| // message. So defer work to event loop. |
| dispatcher()->PostTask(Bind(&WiFi::BSSAddedTask, |
| weak_ptr_factory_.GetWeakPtr(), |
| path, properties)); |
| } |
| |
| void WiFi::BSSRemoved(const ::DBus::Path &path) { |
| // Called from a D-Bus signal handler, and may need to send a D-Bus |
| // message. So defer work to event loop. |
| dispatcher()->PostTask(Bind(&WiFi::BSSRemovedTask, |
| weak_ptr_factory_.GetWeakPtr(), path)); |
| } |
| |
| void WiFi::Certification(const map<string, ::DBus::Variant> &properties) { |
| dispatcher()->PostTask(Bind(&WiFi::CertificationTask, |
| weak_ptr_factory_.GetWeakPtr(), properties)); |
| } |
| |
| void WiFi::PropertiesChanged(const map<string, ::DBus::Variant> &properties) { |
| SLOG(WiFi, 2) << __func__; |
| // Called from D-Bus signal handler, but may need to send a D-Bus |
| // message. So defer work to event loop. |
| dispatcher()->PostTask(Bind(&WiFi::PropertiesChangedTask, |
| weak_ptr_factory_.GetWeakPtr(), properties)); |
| } |
| |
| void WiFi::ScanDone() { |
| LOG(INFO) << __func__; |
| |
| // Defer handling of scan result processing, because that processing |
| // may require the the registration of new D-Bus objects. And such |
| // registration can't be done in the context of a D-Bus signal |
| // handler. |
| dispatcher()->PostTask(Bind(&WiFi::ScanDoneTask, |
| weak_ptr_factory_.GetWeakPtr())); |
| } |
| |
| void WiFi::ConnectTo(WiFiService *service, |
| map<string, DBus::Variant> service_params) { |
| CHECK(service) << "Can't connect to NULL service."; |
| DBus::Path network_path; |
| |
| // TODO(quiche): Handle cases where already connected. |
| if (pending_service_ && pending_service_ == service) { |
| // TODO(quiche): Return an error to the caller. crosbug.com/23832 |
| LOG(INFO) << "WiFi " << link_name() << " ignoring ConnectTo " |
| << service->friendly_name() |
| << ", which is already pending."; |
| return; |
| } |
| |
| if (pending_service_ && pending_service_ != service) { |
| // Since wpa_supplicant has not yet set CurrentBSS, we can't depend |
| // on this to drive the service state back to idle. Do that here. |
| pending_service_->SetState(Service::kStateIdle); |
| DisconnectFrom(pending_service_); |
| } |
| |
| try { |
| const uint32_t scan_ssid = 1; // "True": Use directed probe. |
| service_params[wpa_supplicant::kNetworkPropertyScanSSID].writer(). |
| append_uint32(scan_ssid); |
| AppendBgscan(service, &service_params); |
| network_path = supplicant_interface_proxy_->AddNetwork(service_params); |
| rpcid_by_service_[service] = network_path; |
| } catch (const DBus::Error &e) { // NOLINT |
| LOG(ERROR) << "exception while adding network: " << e.what(); |
| return; |
| } |
| |
| supplicant_interface_proxy_->SelectNetwork(network_path); |
| SetPendingService(service); |
| CHECK(current_service_.get() != pending_service_.get()); |
| |
| // SelectService here (instead of in LinkEvent, like Ethernet), so |
| // that, if we fail to bring up L2, we can attribute failure correctly. |
| // |
| // TODO(quiche): When we add code for dealing with connection failures, |
| // reconsider if this is the right place to change the selected service. |
| // see discussion in crosbug.com/20191. |
| SelectService(service); |
| } |
| |
| void WiFi::DisconnectFrom(WiFiService *service) { |
| if (service != current_service_ && service != pending_service_) { |
| // TODO(quiche): Once we have asynchronous reply support, we should |
| // generate a D-Bus error here. (crosbug.com/23832) |
| LOG(WARNING) << "In " << __func__ << "(): " |
| << " ignoring request to disconnect from service " |
| << service->friendly_name() |
| << " which is neither current nor pending"; |
| return; |
| } |
| |
| if (pending_service_ && service != pending_service_) { |
| // TODO(quiche): Once we have asynchronous reply support, we should |
| // generate a D-Bus error here. (crosbug.com/23832) |
| LOG(WARNING) << "In " << __func__ << "(): " |
| << " ignoring request to disconnect from service " |
| << service->friendly_name() |
| << " which is not the pending service."; |
| return; |
| } |
| |
| if (!pending_service_ && service != current_service_) { |
| // TODO(quiche): Once we have asynchronous reply support, we should |
| // generate a D-Bus error here. (crosbug.com/23832) |
| LOG(WARNING) << "In " << __func__ << "(): " |
| << " ignoring request to disconnect from service " |
| << service->friendly_name() |
| << " which is not the current service."; |
| return; |
| } |
| |
| SetPendingService(NULL); |
| |
| if (!supplicant_present_) { |
| LOG(INFO) << "In " << __func__ << "(): " |
| << "wpa_supplicant is not present; silently resetting " |
| << "current_service_."; |
| current_service_ = NULL; |
| return; |
| } |
| |
| try { |
| supplicant_interface_proxy_->Disconnect(); |
| // We'll call RemoveNetwork and reset |current_service_| after |
| // supplicant notifies us that the CurrentBSS has changed. |
| } catch (const DBus::Error &e) { // NOLINT |
| // Can't depend on getting a notification of CurrentBSS change. |
| // So effect changes immediately. |
| ReverseServiceMap::const_iterator rpcid_it = |
| rpcid_by_service_.find(service); |
| DCHECK(rpcid_it != rpcid_by_service_.end()); |
| if (rpcid_it == rpcid_by_service_.end()) { |
| LOG(WARNING) << "WiFi " << link_name() << " can not disconnect from " |
| << service->friendly_name() << ": " |
| << "could not find supplicant network to disable."; |
| } else { |
| supplicant_interface_proxy_->RemoveNetwork(rpcid_it->second); |
| } |
| current_service_ = NULL; |
| } |
| |
| CHECK(current_service_ == NULL || |
| current_service_.get() != pending_service_.get()); |
| } |
| |
| bool WiFi::IsIdle() const { |
| return !current_service_ && !pending_service_; |
| } |
| |
| void WiFi::ClearCachedCredentials() { |
| LOG(INFO) << __func__; |
| |
| // Needs to send a D-Bus message, but may be called from D-Bus |
| // caller context (via Manager::PopProfile). So defer work |
| // to event loop. |
| if (!clear_cached_credentials_pending_) { |
| clear_cached_credentials_pending_ = true; |
| dispatcher()->PostTask(Bind(&WiFi::ClearCachedCredentialsTask, |
| weak_ptr_factory_.GetWeakPtr())); |
| } |
| } |
| |
| void WiFi::NotifyEndpointChanged(const WiFiEndpoint &endpoint) { |
| WiFiService *service = FindServiceForEndpoint(endpoint); |
| DCHECK(service); |
| if (service) { |
| service->NotifyEndpointUpdated(endpoint); |
| } |
| } |
| |
| void WiFi::AppendBgscan(WiFiService *service, |
| map<string, DBus::Variant> *service_params) const { |
| int scan_interval = kBackgroundScanIntervalSeconds; |
| string method = bgscan_method_; |
| if (method.empty()) { |
| // If multiple APs are detected for this SSID, configure the default method. |
| // Otherwise, disable background scanning completely. |
| if (service->GetEndpointCount() > 1) { |
| method = kDefaultBgscanMethod; |
| } else { |
| LOG(INFO) << "Background scan disabled -- single Endpoint for Service."; |
| return; |
| } |
| } else if (method.compare(wpa_supplicant::kNetworkBgscanMethodNone) == 0) { |
| LOG(INFO) << "Background scan disabled -- chose None method."; |
| return; |
| } else { |
| // If the background scan method was explicitly specified, honor the |
| // configured background scan interval. |
| scan_interval = scan_interval_seconds_; |
| } |
| DCHECK(!method.empty()); |
| string config_string = StringPrintf("%s:%d:%d:%d", |
| method.c_str(), |
| bgscan_short_interval_seconds_, |
| bgscan_signal_threshold_dbm_, |
| scan_interval); |
| LOG(INFO) << "Background scan: " << config_string; |
| (*service_params)[wpa_supplicant::kNetworkPropertyBgscan].writer() |
| .append_string(config_string.c_str()); |
| } |
| |
| string WiFi::GetBgscanMethod(const int &/*argument*/, Error */* error */) { |
| return bgscan_method_.empty() ? kDefaultBgscanMethod : bgscan_method_; |
| } |
| |
| void WiFi::SetBgscanMethod( |
| const int &/*argument*/, const string &method, Error *error) { |
| if (method != wpa_supplicant::kNetworkBgscanMethodSimple && |
| method != wpa_supplicant::kNetworkBgscanMethodLearn && |
| method != wpa_supplicant::kNetworkBgscanMethodNone) { |
| const string error_message = |
| StringPrintf("Unrecognized bgscan method %s", method.c_str()); |
| LOG(WARNING) << error_message; |
| error->Populate(Error::kInvalidArguments, error_message); |
| return; |
| } |
| |
| bgscan_method_ = method; |
| // We do not update kNetworkPropertyBgscan for |pending_service_| or |
| // |current_service_|, because supplicant does not allow for |
| // reconfiguration without disconnect and reconnect. |
| } |
| |
| void WiFi::SetBgscanShortInterval(const uint16 &seconds, Error */*error*/) { |
| bgscan_short_interval_seconds_ = seconds; |
| // We do not update kNetworkPropertyBgscan for |pending_service_| or |
| // |current_service_|, because supplicant does not allow for |
| // reconfiguration without disconnect and reconnect. |
| } |
| |
| void WiFi::SetBgscanSignalThreshold(const int32 &dbm, Error */*error*/) { |
| bgscan_signal_threshold_dbm_ = dbm; |
| // We do not update kNetworkPropertyBgscan for |pending_service_| or |
| // |current_service_|, because supplicant does not allow for |
| // reconfiguration without disconnect and reconnect. |
| } |
| |
| void WiFi::SetScanInterval(const uint16 &seconds, Error */*error*/) { |
| scan_interval_seconds_ = seconds; |
| if (running()) { |
| StartScanTimer(); |
| } |
| // The scan interval affects both foreground scans (handled by |
| // |scan_timer_callback_|), and background scans (handled by |
| // supplicant). However, we do not update |pending_service_| or |
| // |current_service_|, because supplicant does not allow for |
| // reconfiguration without disconnect and reconnect. |
| } |
| |
| void WiFi::ClearBgscanMethod(const int &/*argument*/, Error */*error*/) { |
| bgscan_method_.clear(); |
| } |
| |
| // To avoid creating duplicate services, call FindServiceForEndpoint |
| // before calling this method. |
| WiFiServiceRefPtr WiFi::CreateServiceForEndpoint(const WiFiEndpoint &endpoint, |
| bool hidden_ssid) { |
| WiFiServiceRefPtr service = |
| new WiFiService(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager(), |
| this, |
| endpoint.ssid(), |
| endpoint.network_mode(), |
| endpoint.security_mode(), |
| hidden_ssid); |
| services_.push_back(service); |
| return service; |
| } |
| |
| void WiFi::CurrentBSSChanged(const ::DBus::Path &new_bss) { |
| SLOG(WiFi, 3) << "WiFi " << link_name() << " CurrentBSS " |
| << supplicant_bss_ << " -> " << new_bss; |
| supplicant_bss_ = new_bss; |
| if (new_bss == wpa_supplicant::kCurrentBSSNull) { |
| HandleDisconnect(); |
| if (!GetHiddenSSIDList().empty()) { |
| // Before disconnecting, wpa_supplicant probably scanned for |
| // APs. So, in the normal case, we defer to the timer for the next scan. |
| // |
| // However, in the case of hidden SSIDs, supplicant knows about |
| // at most one of them. (That would be the hidden SSID we were |
| // connected to, if applicable.) |
| // |
| // So, in this case, we initiate an immediate scan. This scan |
| // will include the hidden SSIDs we know about (up to the limit of |
| // kScanMAxSSIDsPerScan). |
| // |
| // We may want to reconsider this immediate scan, if/when shill |
| // takes greater responsibility for scanning (vs. letting |
| // supplicant handle most of it). |
| Scan(NULL); |
| } |
| } else { |
| HandleRoam(new_bss); |
| } |
| |
| // If we are selecting a new service, or if we're clearing selection |
| // of a something other than the pending service, call SelectService. |
| // Otherwise skip SelectService, since this will cause the pending |
| // service to be marked as Idle. |
| if (current_service_ || selected_service() != pending_service_) { |
| SelectService(current_service_); |
| } |
| |
| // Invariant check: a Service can either be current, or pending, but |
| // not both. |
| CHECK(current_service_.get() != pending_service_.get() || |
| current_service_.get() == NULL); |
| } |
| |
| void WiFi::HandleDisconnect() { |
| // Identify the affected service. We expect to get a disconnect |
| // event when we fall off a Service that we were connected |
| // to. However, we also allow for the case where we get a disconnect |
| // event while attempting to connect from a disconnected state. |
| WiFiService *affected_service = |
| current_service_.get() ? current_service_.get() : pending_service_.get(); |
| |
| current_service_ = NULL; |
| if (!affected_service) { |
| SLOG(WiFi, 2) << "WiFi " << link_name() |
| << " disconnected while not connected or connecting"; |
| return; |
| } else if (affected_service == selected_service()) { |
| // If our selected service has disconnected, destroy IP configuration state. |
| DestroyIPConfig(); |
| } |
| |
| ReverseServiceMap::const_iterator rpcid_it = |
| rpcid_by_service_.find(affected_service); |
| if (rpcid_it == rpcid_by_service_.end()) { |
| SLOG(WiFi, 2) << "WiFi " << link_name() << " disconnected from " |
| << " (or failed to connect to) " |
| << affected_service->friendly_name() << ", " |
| << "but could not find supplicant network to disable."; |
| } else { |
| // TODO(quiche): Reconsider giving up immediately. Maybe give |
| // wpa_supplicant some time to retry, first. |
| supplicant_interface_proxy_->RemoveNetwork(rpcid_it->second); |
| } |
| |
| SLOG(WiFi, 2) << "WiFi " << link_name() << " disconnected from " |
| << " (or failed to connect to) " |
| << affected_service->friendly_name(); |
| if (SuspectCredentials(*affected_service)) { |
| // If we suspect bad credentials, set failure, to trigger an error |
| // mole in Chrome. Failure is a transient state, so we'll |
| // transition out of it immediately after with SetFailureSilent. |
| affected_service->SetFailure(Service::kFailureBadPassphrase); |
| affected_service->SetFailureSilent(Service::kFailureBadPassphrase); |
| LOG(ERROR) << "Connection failure during 4-Way Handshake. Bad passphrase?"; |
| } else { |
| affected_service->SetFailureSilent(Service::kFailureUnknown); |
| } |
| affected_service->NotifyCurrentEndpoint(NULL); |
| metrics()->NotifyServiceDisconnect(affected_service); |
| |
| if (affected_service == pending_service_.get()) { |
| // The attempt to connect to |pending_service_| failed. Clear |
| // |pending_service_|, to indicate we're no longer in the middle |
| // of a connect request. |
| SetPendingService(NULL); |
| } else if (pending_service_.get()) { |
| // We've attributed the disconnection to what was the |
| // |current_service_|, rather than the |pending_service_|. |
| // |
| // If we're wrong about that (i.e. supplicant reported this |
| // CurrentBSS change after attempting to connect to |
| // |pending_service_|), we're depending on supplicant to retry |
| // connecting to |pending_service_|, and delivering another |
| // CurrentBSS change signal in the future. |
| // |
| // Log this fact, to help us debug (in case our assumptions are |
| // wrong). |
| SLOG(WiFi, 2) << "WiFi " << link_name() << " pending connection to " |
| << pending_service_->friendly_name() |
| << " after disconnect"; |
| } |
| |
| // If we disconnect, initially scan at a faster frequency, to make sure |
| // we've found all available APs. |
| RestartFastScanAttempts(); |
| } |
| |
| // We use the term "Roam" loosely. In particular, we include the case |
| // where we "Roam" to a BSS from the disconnected state. |
| void WiFi::HandleRoam(const ::DBus::Path &new_bss) { |
| EndpointMap::iterator endpoint_it = endpoint_by_rpcid_.find(new_bss); |
| if (endpoint_it == endpoint_by_rpcid_.end()) { |
| LOG(WARNING) << "WiFi " << link_name() << " connected to unknown BSS " |
| << new_bss; |
| return; |
| } |
| |
| const WiFiEndpoint &endpoint(*endpoint_it->second); |
| WiFiServiceRefPtr service = FindServiceForEndpoint(endpoint); |
| if (!service.get()) { |
| LOG(WARNING) << "WiFi " << link_name() |
| << " could not find Service for Endpoint " |
| << endpoint.bssid_string() |
| << " (service will be unchanged)"; |
| return; |
| } |
| |
| SLOG(WiFi, 2) << "WiFi " << link_name() |
| << " roamed to Endpoint " << endpoint.bssid_string() |
| << " (SSID " << endpoint.ssid_string() << ")"; |
| |
| service->NotifyCurrentEndpoint(&endpoint); |
| |
| if (pending_service_.get() && |
| service.get() != pending_service_.get()) { |
| // The Service we've roamed on to is not the one we asked for. |
| // We assume that this is transient, and that wpa_supplicant |
| // is trying / will try to connect to |pending_service_|. |
| // |
| // If it succeeds, we'll end up back here, but with |service| |
| // pointing at the same service as |pending_service_|. |
| // |
| // If it fails, we'll process things in HandleDisconnect. |
| // |
| // So we leave |pending_service_| untouched. |
| SLOG(WiFi, 2) << "WiFi " << link_name() |
| << " new current Endpoint " |
| << endpoint.bssid_string() |
| << " is not part of pending service " |
| << pending_service_->friendly_name(); |
| |
| // Sanity check: if we didn't roam onto |pending_service_|, we |
| // should still be on |current_service_|. |
| if (service.get() != current_service_.get()) { |
| LOG(WARNING) << "WiFi " << link_name() |
| << " new current Endpoint " |
| << endpoint.bssid_string() |
| << " is neither part of pending service " |
| << pending_service_->friendly_name() |
| << " nor part of current service " |
| << (current_service_.get() ? |
| current_service_->friendly_name() : |
| "(NULL)"); |
| // Although we didn't expect to get here, we should keep |
| // |current_service_| in sync with what supplicant has done. |
| current_service_ = service; |
| } |
| return; |
| } |
| |
| if (pending_service_.get()) { |
| // We assume service.get() == pending_service_.get() here, because |
| // of the return in the previous if clause. |
| // |
| // Boring case: we've connected to the service we asked |
| // for. Simply update |current_service_| and |pending_service_|. |
| current_service_ = service; |
| SetPendingService(NULL); |
| return; |
| } |
| |
| // |pending_service_| was NULL, so we weren't attempting to connect |
| // to a new Service. Sanity check that we're still on |
| // |current_service_|. |
| if (service.get() != current_service_.get()) { |
| LOG(WARNING) |
| << "WiFi " << link_name() |
| << " new current Endpoint " |
| << endpoint.bssid_string() |
| << (current_service_.get() ? |
| StringPrintf(" is not part of current service %s", |
| current_service_->friendly_name().c_str()) : |
| " with no current service"); |
| // We didn't expect to be here, but let's cope as well as we |
| // can. Update |current_service_| to keep it in sync with |
| // supplicant. |
| current_service_ = service; |
| |
| // If this service isn't already marked as actively connecting (likely, |
| // since this service is a bit of a surprise) set the service as |
| // associating. |
| if (!current_service_->IsConnecting()) { |
| current_service_->SetState(Service::kStateAssociating); |
| } |
| |
| return; |
| } |
| |
| // At this point, we know that |pending_service_| was NULL, and that |
| // we're still on |current_service_|. This is the most boring case |
| // of all, because there's no state to update here. |
| return; |
| } |
| |
| WiFiServiceRefPtr WiFi::FindService(const vector<uint8_t> &ssid, |
| const string &mode, |
| const string &security) const { |
| for (vector<WiFiServiceRefPtr>::const_iterator it = services_.begin(); |
| it != services_.end(); |
| ++it) { |
| if ((*it)->ssid() == ssid && (*it)->mode() == mode && |
| (*it)->IsSecurityMatch(security)) { |
| return *it; |
| } |
| } |
| return NULL; |
| } |
| |
| WiFiServiceRefPtr WiFi::FindServiceForEndpoint(const WiFiEndpoint &endpoint) { |
| return FindService(endpoint.ssid(), |
| endpoint.network_mode(), |
| endpoint.security_mode()); |
| } |
| |
| ByteArrays WiFi::GetHiddenSSIDList() { |
| // Create a unique set of hidden SSIDs. |
| set<ByteArray> hidden_ssids_set; |
| for (vector<WiFiServiceRefPtr>::const_iterator it = services_.begin(); |
| it != services_.end(); |
| ++it) { |
| if ((*it)->hidden_ssid() && (*it)->IsRemembered()) { |
| hidden_ssids_set.insert((*it)->ssid()); |
| } |
| } |
| SLOG(WiFi, 2) << "Found " << hidden_ssids_set.size() << " hidden services"; |
| ByteArrays hidden_ssids(hidden_ssids_set.begin(), hidden_ssids_set.end()); |
| if (!hidden_ssids.empty()) { |
| // TODO(pstew): Devise a better method for time-sharing with SSIDs that do |
| // not fit in. |
| if (hidden_ssids.size() >= wpa_supplicant::kScanMaxSSIDsPerScan) { |
| hidden_ssids.erase( |
| hidden_ssids.begin() + wpa_supplicant::kScanMaxSSIDsPerScan - 1, |
| hidden_ssids.end()); |
| } |
| // Add Broadcast SSID, signified by an empty ByteArray. If we specify |
| // SSIDs to wpa_supplicant, we need to explicitly specify the default |
| // behavior of doing a broadcast probe. |
| hidden_ssids.push_back(ByteArray()); |
| } |
| return hidden_ssids; |
| } |
| |
| bool WiFi::LoadHiddenServices(StoreInterface *storage) { |
| bool created_hidden_service = false; |
| set<string> groups = storage->GetGroupsWithKey(flimflam::kWifiHiddenSsid); |
| for (set<string>::iterator it = groups.begin(); it != groups.end(); ++it) { |
| bool is_hidden = false; |
| if (!storage->GetBool(*it, flimflam::kWifiHiddenSsid, &is_hidden)) { |
| SLOG(WiFi, 2) << "Storage group " << *it << " returned by " |
| << "GetGroupsWithKey failed for GetBool(" |
| << flimflam::kWifiHiddenSsid |
| << ") -- possible non-bool key"; |
| continue; |
| } |
| if (!is_hidden) { |
| continue; |
| } |
| string ssid_hex; |
| vector<uint8_t> ssid_bytes; |
| if (!storage->GetString(*it, flimflam::kSSIDProperty, &ssid_hex) || |
| !base::HexStringToBytes(ssid_hex, &ssid_bytes)) { |
| SLOG(WiFi, 2) << "Hidden network is missing/invalid \"" |
| << flimflam::kSSIDProperty << "\" property"; |
| continue; |
| } |
| string device_address; |
| string network_mode; |
| string security; |
| // It is gross that we have to do this, but the only place we can |
| // get information about the service is from its storage name. |
| if (!WiFiService::ParseStorageIdentifier(*it, &device_address, |
| &network_mode, &security) || |
| device_address != address()) { |
| SLOG(WiFi, 2) << "Hidden network has unparsable storage identifier \"" |
| << *it << "\""; |
| continue; |
| } |
| if (FindService(ssid_bytes, network_mode, security).get()) { |
| // If service already exists, we have nothing to do, since the |
| // service has already loaded its configuration from storage. |
| // This is guaranteed to happen in both cases where Load() is |
| // called on a device (via a ConfigureDevice() call on the |
| // profile): |
| // - In RegisterDevice() the Device hasn't been started yet, |
| // so it has no services registered, except for those |
| // created by previous iterations of LoadHiddenService(). |
| // The latter can happen if another profile in the Manager's |
| // stack defines the same ssid/mode/security. Even this |
| // case is okay, since even if the profiles differ |
| // materially on configuration and credentials, the "right" |
| // one will be configured in the course of the |
| // RegisterService() call below. |
| // - In PushProfile(), all registered services have been |
| // introduced to the profile via ConfigureService() prior |
| // to calling ConfigureDevice() on the profile. |
| continue; |
| } |
| WiFiServiceRefPtr service(new WiFiService(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager(), |
| this, |
| ssid_bytes, |
| network_mode, |
| security, |
| true)); |
| services_.push_back(service); |
| |
| // By registering the service, the rest of the configuration |
| // will be loaded from the profile into the service via ConfigureService(). |
| manager()->RegisterService(service); |
| |
| created_hidden_service = true; |
| } |
| |
| // If we are idle and we created a service as a result of opening the |
| // profile, we should initiate a scan for our new hidden SSID. |
| if (running() && created_hidden_service && |
| supplicant_state_ == wpa_supplicant::kInterfaceStateInactive) { |
| Scan(NULL); |
| } |
| |
| return created_hidden_service; |
| } |
| |
| void WiFi::ClearCachedCredentialsTask() { |
| try { |
| supplicant_interface_proxy_->ClearCachedCredentials(); |
| } catch (const DBus::Error &e) { // NOLINT |
| LOG(WARNING) << "Clear of cached credentials failed."; |
| } |
| clear_cached_credentials_pending_ = false; |
| } |
| |
| void WiFi::BSSAddedTask( |
| const ::DBus::Path &path, |
| const map<string, ::DBus::Variant> &properties) { |
| // Note: we assume that BSSIDs are unique across endpoints. This |
| // means that if an AP reuses the same BSSID for multiple SSIDs, we |
| // lose. |
| WiFiEndpointRefPtr endpoint( |
| new WiFiEndpoint(proxy_factory_, this, path, properties)); |
| LOG(INFO) << "Found endpoint. " |
| << "RPC path: " << path << ", " |
| << "ssid: " << endpoint->ssid_string() << ", " |
| << "bssid: " << endpoint->bssid_string() << ", " |
| << "signal: " << endpoint->signal_strength() << ", " |
| << "security: " << endpoint->security_mode() << ", " |
| << "frequency: " << endpoint->frequency(); |
| |
| if (endpoint->ssid_string().empty()) { |
| // Don't bother trying to find or create a Service for an Endpoint |
| // without an SSID. We wouldn't be able to connect to it anyway. |
| return; |
| } |
| |
| if (endpoint->ssid()[0] == 0) { |
| // Assume that an SSID starting with NULL is bogus/misconfigured, |
| // and filter it out. |
| return; |
| } |
| |
| WiFiServiceRefPtr service = FindServiceForEndpoint(*endpoint); |
| if (service) { |
| LOG(INFO) << "Assigned endpoint " << endpoint->bssid_string() |
| << " to service " << service->friendly_name() << "."; |
| service->AddEndpoint(endpoint); |
| |
| if (manager()->HasService(service)) { |
| manager()->UpdateService(service); |
| } else { |
| // Expect registered by now if >1. |
| DCHECK_EQ(1, service->GetEndpointCount()); |
| manager()->RegisterService(service); |
| } |
| } else { |
| const bool hidden_ssid = false; |
| service = CreateServiceForEndpoint(*endpoint, hidden_ssid); |
| LOG(INFO) << "New service " << service->GetRpcIdentifier() |
| << " (" << service->friendly_name() << ")"; |
| service->AddEndpoint(endpoint); |
| manager()->RegisterService(service); |
| } |
| |
| // Do this last, to maintain the invariant that any Endpoint we |
| // know about has a corresponding Service. |
| // |
| // TODO(quiche): Write test to verify correct behavior in the case |
| // where we get multiple BSSAdded events for a single endpoint. |
| // (Old Endpoint's refcount should fall to zero, and old Endpoint |
| // should be destroyed.) |
| endpoint_by_rpcid_[path] = endpoint; |
| endpoint->Start(); |
| } |
| |
| void WiFi::BSSRemovedTask(const ::DBus::Path &path) { |
| EndpointMap::iterator i = endpoint_by_rpcid_.find(path); |
| if (i == endpoint_by_rpcid_.end()) { |
| LOG(WARNING) << "WiFi " << link_name() |
| << " could not find BSS " << path |
| << " to remove."; |
| return; |
| } |
| |
| WiFiEndpointRefPtr endpoint = i->second; |
| CHECK(endpoint); |
| endpoint_by_rpcid_.erase(i); |
| |
| WiFiServiceRefPtr service = FindServiceForEndpoint(*endpoint); |
| CHECK(service) << "Can't find Service for Endpoint " |
| << path << " " |
| << "(with BSSID " << endpoint->bssid_string() << ")."; |
| SLOG(WiFi, 2) << "Removing Endpoint " << endpoint->bssid_string() |
| << " from Service " << service->friendly_name(); |
| service->RemoveEndpoint(endpoint); |
| |
| bool disconnect_service = !service->HasEndpoints() && |
| (service->IsConnecting() || service->IsConnected()); |
| bool forget_service = |
| // Forget Services without Endpoints, except that we always keep |
| // hidden services around. (We need them around to populate the |
| // hidden SSIDs list.) |
| !service->HasEndpoints() && !service->hidden_ssid(); |
| bool deregister_service = |
| // Only deregister a Service if we're forgetting it. Otherwise, |
| // Manager can't keep our configuration up-to-date (as Profiles |
| // change). |
| forget_service; |
| |
| if (disconnect_service) { |
| DisconnectFrom(service); |
| } |
| |
| if (deregister_service) { |
| manager()->DeregisterService(service); |
| } else { |
| manager()->UpdateService(service); |
| } |
| |
| if (forget_service) { |
| vector<WiFiServiceRefPtr>::iterator it; |
| it = std::find(services_.begin(), services_.end(), service); |
| if (it != services_.end()) { |
| services_.erase(it); |
| } |
| } |
| } |
| |
| void WiFi::CertificationTask( |
| const map<string, ::DBus::Variant> &properties) { |
| if (!current_service_) { |
| LOG(ERROR) << "WiFi " << link_name() << " " << __func__ |
| << " with no current service."; |
| return; |
| } |
| |
| map<string, ::DBus::Variant>::const_iterator properties_it = |
| properties.find(wpa_supplicant::kInterfacePropertyDepth); |
| if (properties_it == properties.end()) { |
| LOG(ERROR) << __func__ << " no depth parameter."; |
| return; |
| } |
| uint32 depth = properties_it->second.reader().get_uint32(); |
| properties_it = properties.find(wpa_supplicant::kInterfacePropertySubject); |
| if (properties_it == properties.end()) { |
| LOG(ERROR) << __func__ << " no subject parameter."; |
| return; |
| } |
| string subject(properties_it->second.reader().get_string()); |
| current_service_->AddEAPCertification(subject, depth); |
| } |
| |
| void WiFi::PropertiesChangedTask( |
| const map<string, ::DBus::Variant> &properties) { |
| // TODO(quiche): Handle changes in other properties (e.g. signal |
| // strength). |
| |
| // Note that order matters here. In particular, we want to process |
| // changes in the current BSS before changes in state. This is so |
| // that we update the state of the correct Endpoint/Service. |
| |
| map<string, ::DBus::Variant>::const_iterator properties_it = |
| properties.find(wpa_supplicant::kInterfacePropertyCurrentBSS); |
| if (properties_it != properties.end()) { |
| CurrentBSSChanged(properties_it->second.reader().get_path()); |
| } |
| |
| properties_it = properties.find(wpa_supplicant::kInterfacePropertyState); |
| if (properties_it != properties.end()) { |
| StateChanged(properties_it->second.reader().get_string()); |
| } |
| } |
| |
| void WiFi::ScanDoneTask() { |
| SLOG(WiFi, 2) << __func__ << " need_bss_flush_ " << need_bss_flush_; |
| if (need_bss_flush_) { |
| CHECK(supplicant_interface_proxy_ != NULL); |
| // Compute |max_age| relative to |resumed_at_|, to account for the |
| // time taken to scan. |
| struct timeval now; |
| uint32_t max_age; |
| time_->GetTimeMonotonic(&now); |
| max_age = kMaxBSSResumeAgeSeconds + (now.tv_sec - resumed_at_.tv_sec); |
| supplicant_interface_proxy_->FlushBSS(max_age); |
| need_bss_flush_ = false; |
| } |
| scan_pending_ = false; |
| StartScanTimer(); |
| } |
| |
| void WiFi::ScanTask() { |
| SLOG(WiFi, 2) << "WiFi " << link_name() << " scan requested."; |
| map<string, DBus::Variant> scan_args; |
| scan_args[wpa_supplicant::kPropertyScanType].writer(). |
| append_string(wpa_supplicant::kScanTypeActive); |
| |
| ByteArrays hidden_ssids = GetHiddenSSIDList(); |
| if (!hidden_ssids.empty()) { |
| scan_args[wpa_supplicant::kPropertyScanSSIDs] = |
| DBusAdaptor::ByteArraysToVariant(hidden_ssids); |
| } |
| |
| // TODO(quiche): Indicate scanning in UI. crosbug.com/14887 |
| try { |
| supplicant_interface_proxy_->Scan(scan_args); |
| scan_pending_ = true; |
| } catch (const DBus::Error &e) { // NOLINT |
| // A scan may fail if, for example, the wpa_supplicant vanishing |
| // notification is posted after this task has already started running. |
| LOG(WARNING) << "Scan failed: " << e.what(); |
| } |
| } |
| |
| void WiFi::StateChanged(const string &new_state) { |
| const string old_state = supplicant_state_; |
| supplicant_state_ = new_state; |
| LOG(INFO) << "WiFi " << link_name() << " " << __func__ << " " |
| << old_state << " -> " << new_state; |
| |
| WiFiService *affected_service; |
| // Identify the service to which the state change applies. If |
| // |pending_service_| is non-NULL, then the state change applies to |
| // |pending_service_|. Otherwise, it applies to |current_service_|. |
| // |
| // This policy is driven by the fact that the |pending_service_| |
| // doesn't become the |current_service_| until wpa_supplicant |
| // reports a CurrentBSS change to the |pending_service_|. And the |
| // CurrentBSS change won't be reported until the |pending_service_| |
| // reaches the wpa_supplicant::kInterfaceStateCompleted state. |
| affected_service = |
| pending_service_.get() ? pending_service_.get() : current_service_.get(); |
| if (!affected_service) { |
| SLOG(WiFi, 2) << "WiFi " << link_name() << " " << __func__ |
| << " with no service"; |
| return; |
| } |
| |
| if (new_state == wpa_supplicant::kInterfaceStateCompleted && |
| !affected_service->IsConnected()) { |
| if (AcquireIPConfigWithLeaseName( |
| affected_service->GetStorageIdentifier())) { |
| LOG(INFO) << link_name() << " is up; started L3 configuration."; |
| affected_service->SetState(Service::kStateConfiguring); |
| } else { |
| LOG(ERROR) << "Unable to acquire DHCP config."; |
| } |
| } else if (new_state == wpa_supplicant::kInterfaceStateAssociated) { |
| affected_service->SetState(Service::kStateAssociating); |
| } else if (new_state == wpa_supplicant::kInterfaceStateAuthenticating || |
| new_state == wpa_supplicant::kInterfaceStateAssociating || |
| new_state == wpa_supplicant::kInterfaceState4WayHandshake || |
| new_state == wpa_supplicant::kInterfaceStateGroupHandshake) { |
| // Ignore transitions into these states from Completed, to avoid |
| // bothering the user when roaming, or re-keying. |
| if (old_state != wpa_supplicant::kInterfaceStateCompleted) |
| affected_service->SetState(Service::kStateAssociating); |
| // TOOD(quiche): On backwards transitions, we should probably set |
| // a timeout for getting back into the completed state. At present, |
| // we depend on wpa_supplicant eventually reporting that CurrentBSS |
| // has changed. But there may be cases where that signal is not sent. |
| // (crosbug.com/23207) |
| } else { |
| // Other transitions do not affect Service state. |
| // |
| // Note in particular that we ignore a State change into |
| // kInterfaceStateDisconnected, in favor of observing the corresponding |
| // change in CurrentBSS. |
| } |
| } |
| |
| bool WiFi::SuspectCredentials(const WiFiService &service) const { |
| if (!service.IsSecurityMatch(flimflam::kSecurityPsk)) { |
| // We can only diagnose credentials for WPA/RSN networks. For |
| // others, assume the failure was not credential related. |
| return false; |
| } |
| |
| return supplicant_state_ == wpa_supplicant::kInterfaceState4WayHandshake && |
| !service.has_ever_connected(); |
| } |
| |
| // Used by Manager. |
| WiFiServiceRefPtr WiFi::GetService(const KeyValueStore &args, Error *error) { |
| CHECK_EQ(args.GetString(flimflam::kTypeProperty), flimflam::kTypeWifi); |
| |
| if (args.ContainsString(flimflam::kModeProperty) && |
| args.GetString(flimflam::kModeProperty) != |
| flimflam::kModeManaged) { |
| Error::PopulateAndLog(error, Error::kNotSupported, |
| kManagerErrorUnsupportedServiceMode); |
| return NULL; |
| } |
| |
| if (!args.ContainsString(flimflam::kSSIDProperty)) { |
| Error::PopulateAndLog(error, Error::kInvalidArguments, |
| kManagerErrorSSIDRequired); |
| return NULL; |
| } |
| |
| string ssid = args.GetString(flimflam::kSSIDProperty); |
| if (ssid.length() < 1) { |
| Error::PopulateAndLog(error, Error::kInvalidNetworkName, |
| kManagerErrorSSIDTooShort); |
| return NULL; |
| } |
| |
| if (ssid.length() > IEEE_80211::kMaxSSIDLen) { |
| Error::PopulateAndLog(error, Error::kInvalidNetworkName, |
| kManagerErrorSSIDTooLong); |
| return NULL; |
| } |
| |
| string security_method; |
| if (args.ContainsString(flimflam::kSecurityProperty)) { |
| security_method = args.GetString(flimflam::kSecurityProperty); |
| } else { |
| security_method = flimflam::kSecurityNone; |
| } |
| |
| if (security_method != flimflam::kSecurityNone && |
| security_method != flimflam::kSecurityWep && |
| security_method != flimflam::kSecurityPsk && |
| security_method != flimflam::kSecurityWpa && |
| security_method != flimflam::kSecurityRsn && |
| security_method != flimflam::kSecurity8021x) { |
| Error::PopulateAndLog(error, Error::kNotSupported, |
| kManagerErrorUnsupportedSecurityMode); |
| return NULL; |
| } |
| |
| bool hidden_ssid; |
| if (args.ContainsBool(flimflam::kWifiHiddenSsid)) { |
| hidden_ssid = args.GetBool(flimflam::kWifiHiddenSsid); |
| } else { |
| // If the service is not found, and the caller hasn't specified otherwise, |
| // we assume this is is a hidden network. |
| hidden_ssid = true; |
| } |
| |
| vector<uint8_t> ssid_bytes(ssid.begin(), ssid.end()); |
| WiFiServiceRefPtr service(FindService(ssid_bytes, flimflam::kModeManaged, |
| security_method)); |
| if (!service.get()) { |
| service = new WiFiService(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager(), |
| this, |
| ssid_bytes, |
| flimflam::kModeManaged, |
| security_method, |
| hidden_ssid); |
| services_.push_back(service); |
| // NB: We do not register the newly created Service with the Manager. |
| // The Service will be registered if/when we find Endpoints for it. |
| } |
| |
| if ((security_method == flimflam::kSecurityWep || |
| security_method == flimflam::kSecurityPsk || |
| security_method == flimflam::kSecurityWpa || |
| security_method == flimflam::kSecurityRsn) && |
| args.ContainsString(flimflam::kPassphraseProperty)) { |
| service->SetPassphrase(args.GetString(flimflam::kPassphraseProperty), |
| error); |
| if (error->IsFailure()) { |
| return NULL; |
| } |
| } |
| |
| service->Configure(args, error); |
| |
| // TODO(pstew): Schedule a task to forget up all non-hidden services that |
| // have no endpoints like the one we may have just created. crosbug.com/28224 |
| |
| return service; |
| } |
| |
| // static |
| bool WiFi::SanitizeSSID(string *ssid) { |
| CHECK(ssid); |
| |
| size_t ssid_len = ssid->length(); |
| size_t i; |
| bool changed = false; |
| |
| for (i = 0; i < ssid_len; ++i) { |
| if (!g_ascii_isprint((*ssid)[i])) { |
| (*ssid)[i] = '?'; |
| changed = true; |
| } |
| } |
| |
| return changed; |
| } |
| |
| void WiFi::HelpRegisterDerivedInt32( |
| PropertyStore *store, |
| const string &name, |
| int32(WiFi::*get)(Error *error), |
| void(WiFi::*set)(const int32 &value, Error *error)) { |
| store->RegisterDerivedInt32( |
| name, |
| Int32Accessor(new CustomAccessor<WiFi, int32>(this, get, set))); |
| } |
| |
| void WiFi::HelpRegisterDerivedUint16( |
| PropertyStore *store, |
| const string &name, |
| uint16(WiFi::*get)(Error *error), |
| void(WiFi::*set)(const uint16 &value, Error *error)) { |
| store->RegisterDerivedUint16( |
| name, |
| Uint16Accessor(new CustomAccessor<WiFi, uint16>(this, get, set))); |
| } |
| |
| void WiFi::HandlePowerStateChange(PowerManager::SuspendState new_state) { |
| LOG(INFO) << __func__; |
| if (new_state == PowerManagerProxyDelegate::kOn) { |
| // We want to flush the BSS cache, but we don't want to conflict |
| // with a running scan or an active connection attempt. So record |
| // the need to flush, and take care of flushing when the next scan |
| // completes. |
| // |
| // Note that supplicant will automatically expire old cache |
| // entries (after, e.g., a BSS is not found in two consecutive |
| // scans). However, our explicit flush accelerates re-association |
| // in cases where a BSS disappeared while we were asleep. (See, |
| // e.g. WiFiRoaming.005SuspendRoam.) |
| time_->GetTimeMonotonic(&resumed_at_); |
| need_bss_flush_ = true; |
| |
| if (!scan_pending_ && IsIdle()) { |
| // Not scanning/connecting/connected, so let's get things rolling. |
| Scan(NULL); |
| } else { |
| SLOG(WiFi, 1) << __func__ |
| << " skipping scan, already scanning or connected."; |
| } |
| } |
| } |
| |
| void WiFi::RestartFastScanAttempts() { |
| fast_scans_remaining_ = kNumFastScanAttempts; |
| StartScanTimer(); |
| } |
| |
| void WiFi::StartScanTimer() { |
| if (scan_interval_seconds_ == 0) { |
| StopScanTimer(); |
| return; |
| } |
| scan_timer_callback_.Reset( |
| Bind(&WiFi::ScanTimerHandler, weak_ptr_factory_.GetWeakPtr())); |
| // Repeat the first few scans after disconnect relatively quickly so we |
| // have reasonable trust that no APs we are looking for are present. |
| dispatcher()->PostDelayedTask(scan_timer_callback_.callback(), |
| fast_scans_remaining_ > 0 ? |
| kFastScanIntervalSeconds * 1000 : scan_interval_seconds_ * 1000); |
| } |
| |
| void WiFi::StopScanTimer() { |
| scan_timer_callback_.Cancel(); |
| } |
| |
| void WiFi::ScanTimerHandler() { |
| SLOG(WiFi, 2) << "WiFi Device " << link_name() << ": " << __func__; |
| if (IsIdle() && !scan_pending_) { |
| Scan(NULL); |
| if (fast_scans_remaining_ > 0) { |
| --fast_scans_remaining_; |
| } |
| } |
| StartScanTimer(); |
| } |
| |
| void WiFi::StartPendingTimer() { |
| pending_timeout_callback_.Reset( |
| Bind(&WiFi::PendingTimeoutHandler, weak_ptr_factory_.GetWeakPtr())); |
| dispatcher()->PostDelayedTask(pending_timeout_callback_.callback(), |
| kPendingTimeoutSeconds * 1000); |
| } |
| |
| void WiFi::StopPendingTimer() { |
| pending_timeout_callback_.Cancel(); |
| } |
| |
| void WiFi::SetPendingService(const WiFiServiceRefPtr &service) { |
| if (service) { |
| service->SetState(Service::kStateAssociating); |
| StartPendingTimer(); |
| } else if (pending_service_) { |
| StopPendingTimer(); |
| } |
| pending_service_ = service; |
| } |
| |
| void WiFi::PendingTimeoutHandler() { |
| LOG(INFO) << "WiFi Device " << link_name() << ": " << __func__; |
| CHECK(pending_service_); |
| pending_service_->SetFailure(Service::kFailureOutOfRange); |
| DisconnectFrom(pending_service_); |
| } |
| |
| void WiFi::OnSupplicantAppear(const string &/*owner*/) { |
| LOG(INFO) << "WPA supplicant appeared."; |
| if (supplicant_present_) { |
| // Restart the WiFi device if it's started already. This will reset the |
| // state and connect the device to the new WPA supplicant instance. |
| if (enabled()) { |
| Restart(); |
| } |
| return; |
| } |
| supplicant_present_ = true; |
| ConnectToSupplicant(); |
| } |
| |
| void WiFi::OnSupplicantVanish() { |
| LOG(INFO) << "WPA supplicant vanished."; |
| if (!supplicant_present_) { |
| return; |
| } |
| supplicant_present_ = false; |
| // Restart the WiFi device if it's started already. This will effectively |
| // suspend the device until the WPA supplicant reappears. |
| if (enabled()) { |
| Restart(); |
| } |
| } |
| |
| void WiFi::ConnectToSupplicant() { |
| LOG(INFO) << link_name() << ": " << (enabled() ? "enabled" : "disabled") |
| << " supplicant: " |
| << (supplicant_present_ ? "present" : "absent") |
| << " proxy: " |
| << (supplicant_process_proxy_.get() ? "non-null" : "null"); |
| if (!enabled() || !supplicant_present_ || supplicant_process_proxy_.get()) { |
| return; |
| } |
| supplicant_process_proxy_.reset( |
| proxy_factory_->CreateSupplicantProcessProxy( |
| wpa_supplicant::kDBusPath, wpa_supplicant::kDBusAddr)); |
| ::DBus::Path interface_path; |
| try { |
| map<string, DBus::Variant> create_interface_args; |
| create_interface_args[wpa_supplicant::kInterfacePropertyName].writer(). |
| append_string(link_name().c_str()); |
| create_interface_args[wpa_supplicant::kInterfacePropertyDriver].writer(). |
| append_string(wpa_supplicant::kDriverNL80211); |
| create_interface_args[ |
| wpa_supplicant::kInterfacePropertyConfigFile].writer(). |
| append_string(SCRIPTDIR "/wpa_supplicant.conf"); |
| interface_path = |
| supplicant_process_proxy_->CreateInterface(create_interface_args); |
| } catch (const DBus::Error &e) { // NOLINT |
| if (!strcmp(e.name(), wpa_supplicant::kErrorInterfaceExists)) { |
| interface_path = |
| supplicant_process_proxy_->GetInterface(link_name()); |
| // TODO(quiche): Is it okay to crash here, if device is missing? |
| } else { |
| LOG(ERROR) << __func__ << ": Failed to create interface with supplicant."; |
| return; |
| } |
| } |
| |
| supplicant_interface_proxy_.reset( |
| proxy_factory_->CreateSupplicantInterfaceProxy( |
| this, interface_path, wpa_supplicant::kDBusAddr)); |
| |
| RTNLHandler::GetInstance()->SetInterfaceFlags(interface_index(), IFF_UP, |
| IFF_UP); |
| // TODO(quiche) Set ApScan=1 and BSSExpireAge=190, like flimflam does? |
| |
| // Clear out any networks that might previously have been configured |
| // for this interface. |
| supplicant_interface_proxy_->RemoveAllNetworks(); |
| |
| // Flush interface's BSS cache, so that we get BSSAdded signals for |
| // all BSSes (not just new ones since the last scan). |
| supplicant_interface_proxy_->FlushBSS(0); |
| |
| try { |
| // TODO(pstew): Disable fast_reauth until supplicant can properly deal |
| // with RADIUS servers that respond strangely to such requests. |
| // crosbug.com/25630 |
| supplicant_interface_proxy_->SetFastReauth(false); |
| } catch (const DBus::Error &e) { // NOLINT |
| LOG(INFO) << "Failed to disable fast_reauth." |
| << "May be running an older version of wpa_supplicant."; |
| } |
| |
| try { |
| // Helps with passing WiFiRomaing.001SSIDSwitchBack. |
| supplicant_interface_proxy_->SetScanInterval(kRescanIntervalSeconds); |
| } catch (const DBus::Error &e) { // NOLINT |
| LOG(INFO) << "Failed to set scan_interval. " |
| << "May be running an older version of wpa_supplicant."; |
| } |
| |
| // Register for power state changes. HandlePowerStateChange() will be called |
| // when the power state changes. |
| manager()->power_manager()->AddStateChangeCallback( |
| UniqueName(), |
| Bind(&WiFi::HandlePowerStateChange, weak_ptr_factory_.GetWeakPtr())); |
| |
| Scan(NULL); |
| StartScanTimer(); |
| } |
| |
| void WiFi::Restart() { |
| LOG(INFO) << link_name() << " restarting."; |
| WiFiRefPtr me = this; // Make sure we don't get destructed. |
| // Go through the manager rather than starting and stopping the device |
| // directly so that the device can be configured with the profile. |
| manager()->DeregisterDevice(me); |
| manager()->RegisterDevice(me); |
| } |
| |
| } // namespace shill |