wpa_ctrl.c 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734
  1. /*
  2. * wpa_supplicant/hostapd control interface library
  3. * Copyright (c) 2004-2007, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "includes.h"
  9. #ifdef CONFIG_CTRL_IFACE
  10. #ifdef CONFIG_CTRL_IFACE_UNIX
  11. #include <sys/un.h>
  12. #include <unistd.h>
  13. #include <fcntl.h>
  14. #endif /* CONFIG_CTRL_IFACE_UNIX */
  15. #ifdef CONFIG_CTRL_IFACE_UDP_REMOTE
  16. #include <netdb.h>
  17. #endif /* CONFIG_CTRL_IFACE_UDP_REMOTE */
  18. #ifdef ANDROID
  19. #include <dirent.h>
  20. #include <cutils/sockets.h>
  21. #include "private/android_filesystem_config.h"
  22. #endif /* ANDROID */
  23. #ifdef CONFIG_CTRL_IFACE_UDP_IPV6
  24. #include <net/if.h>
  25. #endif /* CONFIG_CTRL_IFACE_UDP_IPV6 */
  26. #include "wpa_ctrl.h"
  27. #include "common.h"
  28. #if defined(CONFIG_CTRL_IFACE_UNIX) || defined(CONFIG_CTRL_IFACE_UDP)
  29. #define CTRL_IFACE_SOCKET
  30. #endif /* CONFIG_CTRL_IFACE_UNIX || CONFIG_CTRL_IFACE_UDP */
  31. /**
  32. * struct wpa_ctrl - Internal structure for control interface library
  33. *
  34. * This structure is used by the wpa_supplicant/hostapd control interface
  35. * library to store internal data. Programs using the library should not touch
  36. * this data directly. They can only use the pointer to the data structure as
  37. * an identifier for the control interface connection and use this as one of
  38. * the arguments for most of the control interface library functions.
  39. */
  40. struct wpa_ctrl {
  41. #ifdef CONFIG_CTRL_IFACE_UDP
  42. int s;
  43. #ifdef CONFIG_CTRL_IFACE_UDP_IPV6
  44. struct sockaddr_in6 local;
  45. struct sockaddr_in6 dest;
  46. #else /* CONFIG_CTRL_IFACE_UDP_IPV6 */
  47. struct sockaddr_in local;
  48. struct sockaddr_in dest;
  49. #endif /* CONFIG_CTRL_IFACE_UDP_IPV6 */
  50. char *cookie;
  51. char *remote_ifname;
  52. char *remote_ip;
  53. #endif /* CONFIG_CTRL_IFACE_UDP */
  54. #ifdef CONFIG_CTRL_IFACE_UNIX
  55. int s;
  56. struct sockaddr_un local;
  57. struct sockaddr_un dest;
  58. #endif /* CONFIG_CTRL_IFACE_UNIX */
  59. #ifdef CONFIG_CTRL_IFACE_NAMED_PIPE
  60. HANDLE pipe;
  61. #endif /* CONFIG_CTRL_IFACE_NAMED_PIPE */
  62. };
  63. #ifdef CONFIG_CTRL_IFACE_UNIX
  64. #ifndef CONFIG_CTRL_IFACE_CLIENT_DIR
  65. #define CONFIG_CTRL_IFACE_CLIENT_DIR "/tmp"
  66. #endif /* CONFIG_CTRL_IFACE_CLIENT_DIR */
  67. #ifndef CONFIG_CTRL_IFACE_CLIENT_PREFIX
  68. #define CONFIG_CTRL_IFACE_CLIENT_PREFIX "wpa_ctrl_"
  69. #endif /* CONFIG_CTRL_IFACE_CLIENT_PREFIX */
  70. struct wpa_ctrl * wpa_ctrl_open(const char *ctrl_path)
  71. {
  72. struct wpa_ctrl *ctrl;
  73. static int counter = 0;
  74. int ret;
  75. size_t res;
  76. int tries = 0;
  77. int flags;
  78. if (ctrl_path == NULL)
  79. return NULL;
  80. ctrl = os_malloc(sizeof(*ctrl));
  81. if (ctrl == NULL)
  82. return NULL;
  83. os_memset(ctrl, 0, sizeof(*ctrl));
  84. ctrl->s = socket(PF_UNIX, SOCK_DGRAM, 0);
  85. if (ctrl->s < 0) {
  86. os_free(ctrl);
  87. return NULL;
  88. }
  89. ctrl->local.sun_family = AF_UNIX;
  90. counter++;
  91. try_again:
  92. ret = os_snprintf(ctrl->local.sun_path, sizeof(ctrl->local.sun_path),
  93. CONFIG_CTRL_IFACE_CLIENT_DIR "/"
  94. CONFIG_CTRL_IFACE_CLIENT_PREFIX "%d-%d",
  95. (int) getpid(), counter);
  96. if (ret < 0 || (size_t) ret >= sizeof(ctrl->local.sun_path)) {
  97. close(ctrl->s);
  98. os_free(ctrl);
  99. return NULL;
  100. }
  101. tries++;
  102. if (bind(ctrl->s, (struct sockaddr *) &ctrl->local,
  103. sizeof(ctrl->local)) < 0) {
  104. if (errno == EADDRINUSE && tries < 2) {
  105. /*
  106. * getpid() returns unique identifier for this instance
  107. * of wpa_ctrl, so the existing socket file must have
  108. * been left by unclean termination of an earlier run.
  109. * Remove the file and try again.
  110. */
  111. unlink(ctrl->local.sun_path);
  112. goto try_again;
  113. }
  114. close(ctrl->s);
  115. os_free(ctrl);
  116. return NULL;
  117. }
  118. #ifdef ANDROID
  119. chmod(ctrl->local.sun_path, S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP);
  120. chown(ctrl->local.sun_path, AID_SYSTEM, AID_WIFI);
  121. if (os_strncmp(ctrl_path, "@android:", 9) == 0) {
  122. if (socket_local_client_connect(
  123. ctrl->s, ctrl_path + 9,
  124. ANDROID_SOCKET_NAMESPACE_RESERVED,
  125. SOCK_DGRAM) < 0) {
  126. close(ctrl->s);
  127. unlink(ctrl->local.sun_path);
  128. os_free(ctrl);
  129. return NULL;
  130. }
  131. return ctrl;
  132. }
  133. /*
  134. * If the ctrl_path isn't an absolute pathname, assume that
  135. * it's the name of a socket in the Android reserved namespace.
  136. * Otherwise, it's a normal UNIX domain socket appearing in the
  137. * filesystem.
  138. */
  139. if (*ctrl_path != '/') {
  140. char buf[21];
  141. os_snprintf(buf, sizeof(buf), "wpa_%s", ctrl_path);
  142. if (socket_local_client_connect(
  143. ctrl->s, buf,
  144. ANDROID_SOCKET_NAMESPACE_RESERVED,
  145. SOCK_DGRAM) < 0) {
  146. close(ctrl->s);
  147. unlink(ctrl->local.sun_path);
  148. os_free(ctrl);
  149. return NULL;
  150. }
  151. return ctrl;
  152. }
  153. #endif /* ANDROID */
  154. ctrl->dest.sun_family = AF_UNIX;
  155. if (os_strncmp(ctrl_path, "@abstract:", 10) == 0) {
  156. ctrl->dest.sun_path[0] = '\0';
  157. os_strlcpy(ctrl->dest.sun_path + 1, ctrl_path + 10,
  158. sizeof(ctrl->dest.sun_path) - 1);
  159. } else {
  160. res = os_strlcpy(ctrl->dest.sun_path, ctrl_path,
  161. sizeof(ctrl->dest.sun_path));
  162. if (res >= sizeof(ctrl->dest.sun_path)) {
  163. close(ctrl->s);
  164. os_free(ctrl);
  165. return NULL;
  166. }
  167. }
  168. if (connect(ctrl->s, (struct sockaddr *) &ctrl->dest,
  169. sizeof(ctrl->dest)) < 0) {
  170. close(ctrl->s);
  171. unlink(ctrl->local.sun_path);
  172. os_free(ctrl);
  173. return NULL;
  174. }
  175. /*
  176. * Make socket non-blocking so that we don't hang forever if
  177. * target dies unexpectedly.
  178. */
  179. flags = fcntl(ctrl->s, F_GETFL);
  180. if (flags >= 0) {
  181. flags |= O_NONBLOCK;
  182. if (fcntl(ctrl->s, F_SETFL, flags) < 0) {
  183. perror("fcntl(ctrl->s, O_NONBLOCK)");
  184. /* Not fatal, continue on.*/
  185. }
  186. }
  187. return ctrl;
  188. }
  189. void wpa_ctrl_close(struct wpa_ctrl *ctrl)
  190. {
  191. if (ctrl == NULL)
  192. return;
  193. unlink(ctrl->local.sun_path);
  194. if (ctrl->s >= 0)
  195. close(ctrl->s);
  196. os_free(ctrl);
  197. }
  198. #ifdef ANDROID
  199. /**
  200. * wpa_ctrl_cleanup() - Delete any local UNIX domain socket files that
  201. * may be left over from clients that were previously connected to
  202. * wpa_supplicant. This keeps these files from being orphaned in the
  203. * event of crashes that prevented them from being removed as part
  204. * of the normal orderly shutdown.
  205. */
  206. void wpa_ctrl_cleanup(void)
  207. {
  208. DIR *dir;
  209. struct dirent entry;
  210. struct dirent *result;
  211. size_t dirnamelen;
  212. size_t maxcopy;
  213. char pathname[PATH_MAX];
  214. char *namep;
  215. if ((dir = opendir(CONFIG_CTRL_IFACE_CLIENT_DIR)) == NULL)
  216. return;
  217. dirnamelen = (size_t) os_snprintf(pathname, sizeof(pathname), "%s/",
  218. CONFIG_CTRL_IFACE_CLIENT_DIR);
  219. if (dirnamelen >= sizeof(pathname)) {
  220. closedir(dir);
  221. return;
  222. }
  223. namep = pathname + dirnamelen;
  224. maxcopy = PATH_MAX - dirnamelen;
  225. while (readdir_r(dir, &entry, &result) == 0 && result != NULL) {
  226. if (os_strlcpy(namep, entry.d_name, maxcopy) < maxcopy)
  227. unlink(pathname);
  228. }
  229. closedir(dir);
  230. }
  231. #endif /* ANDROID */
  232. #else /* CONFIG_CTRL_IFACE_UNIX */
  233. #ifdef ANDROID
  234. void wpa_ctrl_cleanup(void)
  235. {
  236. }
  237. #endif /* ANDROID */
  238. #endif /* CONFIG_CTRL_IFACE_UNIX */
  239. #ifdef CONFIG_CTRL_IFACE_UDP
  240. struct wpa_ctrl * wpa_ctrl_open(const char *ctrl_path)
  241. {
  242. struct wpa_ctrl *ctrl;
  243. char buf[128];
  244. size_t len;
  245. #ifdef CONFIG_CTRL_IFACE_UDP_REMOTE
  246. struct hostent *h;
  247. #endif /* CONFIG_CTRL_IFACE_UDP_REMOTE */
  248. ctrl = os_malloc(sizeof(*ctrl));
  249. if (ctrl == NULL)
  250. return NULL;
  251. os_memset(ctrl, 0, sizeof(*ctrl));
  252. #ifdef CONFIG_CTRL_IFACE_UDP_IPV6
  253. ctrl->s = socket(PF_INET6, SOCK_DGRAM, 0);
  254. #else /* CONFIG_CTRL_IFACE_UDP_IPV6 */
  255. ctrl->s = socket(PF_INET, SOCK_DGRAM, 0);
  256. #endif /* CONFIG_CTRL_IFACE_UDP_IPV6 */
  257. if (ctrl->s < 0) {
  258. perror("socket");
  259. os_free(ctrl);
  260. return NULL;
  261. }
  262. #ifdef CONFIG_CTRL_IFACE_UDP_IPV6
  263. ctrl->local.sin6_family = AF_INET6;
  264. #ifdef CONFIG_CTRL_IFACE_UDP_REMOTE
  265. ctrl->local.sin6_addr = in6addr_any;
  266. #else /* CONFIG_CTRL_IFACE_UDP_REMOTE */
  267. inet_pton(AF_INET6, "::1", &ctrl->local.sin6_addr);
  268. #endif /* CONFIG_CTRL_IFACE_UDP_REMOTE */
  269. #else /* CONFIG_CTRL_IFACE_UDP_IPV6 */
  270. ctrl->local.sin_family = AF_INET;
  271. #ifdef CONFIG_CTRL_IFACE_UDP_REMOTE
  272. ctrl->local.sin_addr.s_addr = INADDR_ANY;
  273. #else /* CONFIG_CTRL_IFACE_UDP_REMOTE */
  274. ctrl->local.sin_addr.s_addr = htonl((127 << 24) | 1);
  275. #endif /* CONFIG_CTRL_IFACE_UDP_REMOTE */
  276. #endif /* CONFIG_CTRL_IFACE_UDP_IPV6 */
  277. if (bind(ctrl->s, (struct sockaddr *) &ctrl->local,
  278. sizeof(ctrl->local)) < 0) {
  279. close(ctrl->s);
  280. os_free(ctrl);
  281. return NULL;
  282. }
  283. #ifdef CONFIG_CTRL_IFACE_UDP_IPV6
  284. ctrl->dest.sin6_family = AF_INET6;
  285. inet_pton(AF_INET6, "::1", &ctrl->dest.sin6_addr);
  286. ctrl->dest.sin6_port = htons(WPA_CTRL_IFACE_PORT);
  287. #else /* CONFIG_CTRL_IFACE_UDP_IPV6 */
  288. ctrl->dest.sin_family = AF_INET;
  289. ctrl->dest.sin_addr.s_addr = htonl((127 << 24) | 1);
  290. ctrl->dest.sin_port = htons(WPA_CTRL_IFACE_PORT);
  291. #endif /* CONFIG_CTRL_IFACE_UDP_IPV6 */
  292. #ifdef CONFIG_CTRL_IFACE_UDP_REMOTE
  293. if (ctrl_path) {
  294. char *port, *name;
  295. int port_id;
  296. #ifdef CONFIG_CTRL_IFACE_UDP_IPV6
  297. char *scope;
  298. int scope_id = 0;
  299. #endif /* CONFIG_CTRL_IFACE_UDP_IPV6 */
  300. name = os_strdup(ctrl_path);
  301. if (name == NULL) {
  302. close(ctrl->s);
  303. os_free(ctrl);
  304. return NULL;
  305. }
  306. #ifdef CONFIG_CTRL_IFACE_UDP_IPV6
  307. port = os_strchr(name, ',');
  308. #else /* CONFIG_CTRL_IFACE_UDP_IPV6 */
  309. port = os_strchr(name, ':');
  310. #endif /* CONFIG_CTRL_IFACE_UDP_IPV6 */
  311. if (port) {
  312. port_id = atoi(&port[1]);
  313. port[0] = '\0';
  314. } else
  315. port_id = WPA_CTRL_IFACE_PORT;
  316. #ifdef CONFIG_CTRL_IFACE_UDP_IPV6
  317. scope = os_strchr(name, '%');
  318. if (scope) {
  319. scope_id = if_nametoindex(&scope[1]);
  320. scope[0] = '\0';
  321. }
  322. h = gethostbyname2(name, AF_INET6);
  323. #else /* CONFIG_CTRL_IFACE_UDP_IPV6 */
  324. h = gethostbyname(name);
  325. #endif /* CONFIG_CTRL_IFACE_UDP_IPV6 */
  326. ctrl->remote_ip = os_strdup(name);
  327. os_free(name);
  328. if (h == NULL) {
  329. perror("gethostbyname");
  330. close(ctrl->s);
  331. os_free(ctrl->remote_ip);
  332. os_free(ctrl);
  333. return NULL;
  334. }
  335. #ifdef CONFIG_CTRL_IFACE_UDP_IPV6
  336. ctrl->dest.sin6_scope_id = scope_id;
  337. ctrl->dest.sin6_port = htons(port_id);
  338. os_memcpy(&ctrl->dest.sin6_addr, h->h_addr, h->h_length);
  339. #else /* CONFIG_CTRL_IFACE_UDP_IPV6 */
  340. ctrl->dest.sin_port = htons(port_id);
  341. os_memcpy(&ctrl->dest.sin_addr.s_addr, h->h_addr, h->h_length);
  342. #endif /* CONFIG_CTRL_IFACE_UDP_IPV6 */
  343. } else
  344. ctrl->remote_ip = os_strdup("localhost");
  345. #endif /* CONFIG_CTRL_IFACE_UDP_REMOTE */
  346. if (connect(ctrl->s, (struct sockaddr *) &ctrl->dest,
  347. sizeof(ctrl->dest)) < 0) {
  348. #ifdef CONFIG_CTRL_IFACE_UDP_IPV6
  349. char addr[INET6_ADDRSTRLEN];
  350. wpa_printf(MSG_ERROR, "connect(%s:%d) failed: %s",
  351. inet_ntop(AF_INET6, &ctrl->dest.sin6_addr, addr,
  352. sizeof(ctrl->dest)),
  353. ntohs(ctrl->dest.sin6_port),
  354. strerror(errno));
  355. #else /* CONFIG_CTRL_IFACE_UDP_IPV6 */
  356. wpa_printf(MSG_ERROR, "connect(%s:%d) failed: %s",
  357. inet_ntoa(ctrl->dest.sin_addr),
  358. ntohs(ctrl->dest.sin_port),
  359. strerror(errno));
  360. #endif /* CONFIG_CTRL_IFACE_UDP_IPV6 */
  361. close(ctrl->s);
  362. os_free(ctrl->remote_ip);
  363. os_free(ctrl);
  364. return NULL;
  365. }
  366. len = sizeof(buf) - 1;
  367. if (wpa_ctrl_request(ctrl, "GET_COOKIE", 10, buf, &len, NULL) == 0) {
  368. buf[len] = '\0';
  369. ctrl->cookie = os_strdup(buf);
  370. }
  371. if (wpa_ctrl_request(ctrl, "IFNAME", 6, buf, &len, NULL) == 0) {
  372. buf[len] = '\0';
  373. ctrl->remote_ifname = os_strdup(buf);
  374. }
  375. return ctrl;
  376. }
  377. char * wpa_ctrl_get_remote_ifname(struct wpa_ctrl *ctrl)
  378. {
  379. #define WPA_CTRL_MAX_PS_NAME 100
  380. static char ps[WPA_CTRL_MAX_PS_NAME] = {};
  381. os_snprintf(ps, WPA_CTRL_MAX_PS_NAME, "%s/%s",
  382. ctrl->remote_ip, ctrl->remote_ifname);
  383. return ps;
  384. }
  385. void wpa_ctrl_close(struct wpa_ctrl *ctrl)
  386. {
  387. close(ctrl->s);
  388. os_free(ctrl->cookie);
  389. os_free(ctrl->remote_ifname);
  390. os_free(ctrl->remote_ip);
  391. os_free(ctrl);
  392. }
  393. #endif /* CONFIG_CTRL_IFACE_UDP */
  394. #ifdef CTRL_IFACE_SOCKET
  395. int wpa_ctrl_request(struct wpa_ctrl *ctrl, const char *cmd, size_t cmd_len,
  396. char *reply, size_t *reply_len,
  397. void (*msg_cb)(char *msg, size_t len))
  398. {
  399. struct timeval tv;
  400. struct os_reltime started_at;
  401. int res;
  402. fd_set rfds;
  403. const char *_cmd;
  404. char *cmd_buf = NULL;
  405. size_t _cmd_len;
  406. #ifdef CONFIG_CTRL_IFACE_UDP
  407. if (ctrl->cookie) {
  408. char *pos;
  409. _cmd_len = os_strlen(ctrl->cookie) + 1 + cmd_len;
  410. cmd_buf = os_malloc(_cmd_len);
  411. if (cmd_buf == NULL)
  412. return -1;
  413. _cmd = cmd_buf;
  414. pos = cmd_buf;
  415. os_strlcpy(pos, ctrl->cookie, _cmd_len);
  416. pos += os_strlen(ctrl->cookie);
  417. *pos++ = ' ';
  418. os_memcpy(pos, cmd, cmd_len);
  419. } else
  420. #endif /* CONFIG_CTRL_IFACE_UDP */
  421. {
  422. _cmd = cmd;
  423. _cmd_len = cmd_len;
  424. }
  425. errno = 0;
  426. started_at.sec = 0;
  427. started_at.usec = 0;
  428. retry_send:
  429. if (send(ctrl->s, _cmd, _cmd_len, 0) < 0) {
  430. if (errno == EAGAIN || errno == EBUSY || errno == EWOULDBLOCK)
  431. {
  432. /*
  433. * Must be a non-blocking socket... Try for a bit
  434. * longer before giving up.
  435. */
  436. if (started_at.sec == 0)
  437. os_get_reltime(&started_at);
  438. else {
  439. struct os_reltime n;
  440. os_get_reltime(&n);
  441. /* Try for a few seconds. */
  442. if (os_reltime_expired(&n, &started_at, 5))
  443. goto send_err;
  444. }
  445. os_sleep(1, 0);
  446. goto retry_send;
  447. }
  448. send_err:
  449. os_free(cmd_buf);
  450. return -1;
  451. }
  452. os_free(cmd_buf);
  453. for (;;) {
  454. tv.tv_sec = 10;
  455. tv.tv_usec = 0;
  456. FD_ZERO(&rfds);
  457. FD_SET(ctrl->s, &rfds);
  458. res = select(ctrl->s + 1, &rfds, NULL, NULL, &tv);
  459. if (res < 0)
  460. return res;
  461. if (FD_ISSET(ctrl->s, &rfds)) {
  462. res = recv(ctrl->s, reply, *reply_len, 0);
  463. if (res < 0)
  464. return res;
  465. if (res > 0 && reply[0] == '<') {
  466. /* This is an unsolicited message from
  467. * wpa_supplicant, not the reply to the
  468. * request. Use msg_cb to report this to the
  469. * caller. */
  470. if (msg_cb) {
  471. /* Make sure the message is nul
  472. * terminated. */
  473. if ((size_t) res == *reply_len)
  474. res = (*reply_len) - 1;
  475. reply[res] = '\0';
  476. msg_cb(reply, res);
  477. }
  478. continue;
  479. }
  480. *reply_len = res;
  481. break;
  482. } else {
  483. return -2;
  484. }
  485. }
  486. return 0;
  487. }
  488. #endif /* CTRL_IFACE_SOCKET */
  489. static int wpa_ctrl_attach_helper(struct wpa_ctrl *ctrl, int attach)
  490. {
  491. char buf[10];
  492. int ret;
  493. size_t len = 10;
  494. ret = wpa_ctrl_request(ctrl, attach ? "ATTACH" : "DETACH", 6,
  495. buf, &len, NULL);
  496. if (ret < 0)
  497. return ret;
  498. if (len == 3 && os_memcmp(buf, "OK\n", 3) == 0)
  499. return 0;
  500. return -1;
  501. }
  502. int wpa_ctrl_attach(struct wpa_ctrl *ctrl)
  503. {
  504. return wpa_ctrl_attach_helper(ctrl, 1);
  505. }
  506. int wpa_ctrl_detach(struct wpa_ctrl *ctrl)
  507. {
  508. return wpa_ctrl_attach_helper(ctrl, 0);
  509. }
  510. #ifdef CTRL_IFACE_SOCKET
  511. int wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len)
  512. {
  513. int res;
  514. res = recv(ctrl->s, reply, *reply_len, 0);
  515. if (res < 0)
  516. return res;
  517. *reply_len = res;
  518. return 0;
  519. }
  520. int wpa_ctrl_pending(struct wpa_ctrl *ctrl)
  521. {
  522. struct timeval tv;
  523. fd_set rfds;
  524. tv.tv_sec = 0;
  525. tv.tv_usec = 0;
  526. FD_ZERO(&rfds);
  527. FD_SET(ctrl->s, &rfds);
  528. select(ctrl->s + 1, &rfds, NULL, NULL, &tv);
  529. return FD_ISSET(ctrl->s, &rfds);
  530. }
  531. int wpa_ctrl_get_fd(struct wpa_ctrl *ctrl)
  532. {
  533. return ctrl->s;
  534. }
  535. #endif /* CTRL_IFACE_SOCKET */
  536. #ifdef CONFIG_CTRL_IFACE_NAMED_PIPE
  537. #ifndef WPA_SUPPLICANT_NAMED_PIPE
  538. #define WPA_SUPPLICANT_NAMED_PIPE "WpaSupplicant"
  539. #endif
  540. #define NAMED_PIPE_PREFIX TEXT("\\\\.\\pipe\\") TEXT(WPA_SUPPLICANT_NAMED_PIPE)
  541. struct wpa_ctrl * wpa_ctrl_open(const char *ctrl_path)
  542. {
  543. struct wpa_ctrl *ctrl;
  544. DWORD mode;
  545. TCHAR name[256];
  546. int i, ret;
  547. ctrl = os_malloc(sizeof(*ctrl));
  548. if (ctrl == NULL)
  549. return NULL;
  550. os_memset(ctrl, 0, sizeof(*ctrl));
  551. #ifdef UNICODE
  552. if (ctrl_path == NULL)
  553. ret = _snwprintf(name, 256, NAMED_PIPE_PREFIX);
  554. else
  555. ret = _snwprintf(name, 256, NAMED_PIPE_PREFIX TEXT("-%S"),
  556. ctrl_path);
  557. #else /* UNICODE */
  558. if (ctrl_path == NULL)
  559. ret = os_snprintf(name, 256, NAMED_PIPE_PREFIX);
  560. else
  561. ret = os_snprintf(name, 256, NAMED_PIPE_PREFIX "-%s",
  562. ctrl_path);
  563. #endif /* UNICODE */
  564. if (ret < 0 || ret >= 256) {
  565. os_free(ctrl);
  566. return NULL;
  567. }
  568. for (i = 0; i < 10; i++) {
  569. ctrl->pipe = CreateFile(name, GENERIC_READ | GENERIC_WRITE, 0,
  570. NULL, OPEN_EXISTING, 0, NULL);
  571. /*
  572. * Current named pipe server side in wpa_supplicant is
  573. * re-opening the pipe for new clients only after the previous
  574. * one is taken into use. This leaves a small window for race
  575. * conditions when two connections are being opened at almost
  576. * the same time. Retry if that was the case.
  577. */
  578. if (ctrl->pipe != INVALID_HANDLE_VALUE ||
  579. GetLastError() != ERROR_PIPE_BUSY)
  580. break;
  581. WaitNamedPipe(name, 1000);
  582. }
  583. if (ctrl->pipe == INVALID_HANDLE_VALUE) {
  584. os_free(ctrl);
  585. return NULL;
  586. }
  587. mode = PIPE_READMODE_MESSAGE;
  588. if (!SetNamedPipeHandleState(ctrl->pipe, &mode, NULL, NULL)) {
  589. CloseHandle(ctrl->pipe);
  590. os_free(ctrl);
  591. return NULL;
  592. }
  593. return ctrl;
  594. }
  595. void wpa_ctrl_close(struct wpa_ctrl *ctrl)
  596. {
  597. CloseHandle(ctrl->pipe);
  598. os_free(ctrl);
  599. }
  600. int wpa_ctrl_request(struct wpa_ctrl *ctrl, const char *cmd, size_t cmd_len,
  601. char *reply, size_t *reply_len,
  602. void (*msg_cb)(char *msg, size_t len))
  603. {
  604. DWORD written;
  605. DWORD readlen = *reply_len;
  606. if (!WriteFile(ctrl->pipe, cmd, cmd_len, &written, NULL))
  607. return -1;
  608. if (!ReadFile(ctrl->pipe, reply, *reply_len, &readlen, NULL))
  609. return -1;
  610. *reply_len = readlen;
  611. return 0;
  612. }
  613. int wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len)
  614. {
  615. DWORD len = *reply_len;
  616. if (!ReadFile(ctrl->pipe, reply, *reply_len, &len, NULL))
  617. return -1;
  618. *reply_len = len;
  619. return 0;
  620. }
  621. int wpa_ctrl_pending(struct wpa_ctrl *ctrl)
  622. {
  623. DWORD left;
  624. if (!PeekNamedPipe(ctrl->pipe, NULL, 0, NULL, &left, NULL))
  625. return -1;
  626. return left ? 1 : 0;
  627. }
  628. int wpa_ctrl_get_fd(struct wpa_ctrl *ctrl)
  629. {
  630. return -1;
  631. }
  632. #endif /* CONFIG_CTRL_IFACE_NAMED_PIPE */
  633. #endif /* CONFIG_CTRL_IFACE */