3 * WPA supplicant library with GLib integration
5 * Copyright (C) 2012-2013 Intel Corporation. All rights reserved.
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
34 #include <netinet/if_ether.h>
35 #include <netinet/in.h>
41 #include "gsupplicant.h"
47 #define IEEE80211_CAP_ESS 0x0001
48 #define IEEE80211_CAP_IBSS 0x0002
49 #define IEEE80211_CAP_PRIVACY 0x0010
52 #define WLAN_EID_HT_CAP 45
53 #define WLAN_EID_VHT_CAP 191
54 #define WLAN_EID_SUPP_RATES 1
55 #define WLAN_EID_EXT_SUPP_RATES 50
56 #define COUNTRY_CODE_LENGTH 2
60 #define LAST_CONNECTED_TIMEOUT (5 * 60)
61 #define ASSOC_REJECT_TIMEOUT 10
62 #define FREQ_RANGE_24GHZ_CHANNEL_1 2412
63 #define FREQ_RANGE_24GHZ_CHANNEL_14 2484
64 #define FREQ_RANGE_5GHZ_CHANNEL_32 5160
65 #define FREQ_RANGE_5GHZ_CHANNEL_165 5825
67 #define MAC2STR(a) (a)[0], (a)[1], (a)[2], (a)[3], (a)[4], (a)[5]
68 #define MACSTR "%02x:%02x:%02x:%02x:%02x:%02x"
71 #define BSS_UNKNOWN_STRENGTH -90
73 static DBusConnection *connection;
75 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
76 static GSupplicantCallbacks *callbacks_pointer;
77 #else /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
78 static const GSupplicantCallbacks *callbacks_pointer;
79 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
81 static dbus_bool_t system_available = FALSE;
82 static dbus_bool_t system_ready = FALSE;
84 static dbus_int32_t debug_level;
85 static dbus_bool_t debug_timestamp = FALSE;
86 static dbus_bool_t debug_showkeys = FALSE;
88 static const char *debug_strings[] = {
89 "msgdump", "debug", "info", "warning", "error", NULL
92 static unsigned int eap_methods;
99 static struct strvalmap eap_method_map[] = {
100 { "MD5", G_SUPPLICANT_EAP_METHOD_MD5 },
101 { "TLS", G_SUPPLICANT_EAP_METHOD_TLS },
102 { "MSCHAPV2", G_SUPPLICANT_EAP_METHOD_MSCHAPV2 },
103 { "PEAP", G_SUPPLICANT_EAP_METHOD_PEAP },
104 { "TTLS", G_SUPPLICANT_EAP_METHOD_TTLS },
105 { "GTC", G_SUPPLICANT_EAP_METHOD_GTC },
106 { "OTP", G_SUPPLICANT_EAP_METHOD_OTP },
107 { "LEAP", G_SUPPLICANT_EAP_METHOD_LEAP },
108 { "WSC", G_SUPPLICANT_EAP_METHOD_WSC },
112 static struct strvalmap keymgmt_map[] = {
113 { "none", G_SUPPLICANT_KEYMGMT_NONE },
114 { "ieee8021x", G_SUPPLICANT_KEYMGMT_IEEE8021X },
115 { "wpa-none", G_SUPPLICANT_KEYMGMT_WPA_NONE },
116 { "wpa-psk", G_SUPPLICANT_KEYMGMT_WPA_PSK },
117 { "wpa-psk-sha256", G_SUPPLICANT_KEYMGMT_WPA_PSK_256 },
118 { "wpa-ft-psk", G_SUPPLICANT_KEYMGMT_WPA_FT_PSK },
119 { "wpa-ft-eap", G_SUPPLICANT_KEYMGMT_WPA_FT_EAP },
120 { "wpa-eap", G_SUPPLICANT_KEYMGMT_WPA_EAP },
121 { "wpa-eap-sha256", G_SUPPLICANT_KEYMGMT_WPA_EAP_256 },
122 { "wps", G_SUPPLICANT_KEYMGMT_WPS },
123 #if defined TIZEN_EXT
124 { "sae", G_SUPPLICANT_KEYMGMT_SAE },
125 { "ft-sae", G_SUPPLICANT_KEYMGMT_FT_SAE },
126 { "owe", G_SUPPLICANT_KEYMGMT_OWE },
127 { "dpp", G_SUPPLICANT_KEYMGMT_DPP },
132 static struct strvalmap authalg_capa_map[] = {
133 { "open", G_SUPPLICANT_CAPABILITY_AUTHALG_OPEN },
134 { "shared", G_SUPPLICANT_CAPABILITY_AUTHALG_SHARED },
135 { "leap", G_SUPPLICANT_CAPABILITY_AUTHALG_LEAP },
139 static struct strvalmap proto_capa_map[] = {
140 { "wpa", G_SUPPLICANT_CAPABILITY_PROTO_WPA },
141 { "rsn", G_SUPPLICANT_CAPABILITY_PROTO_RSN },
145 static struct strvalmap group_map[] = {
146 { "wep40", G_SUPPLICANT_GROUP_WEP40 },
147 { "wep104", G_SUPPLICANT_GROUP_WEP104 },
148 { "tkip", G_SUPPLICANT_GROUP_TKIP },
149 { "ccmp", G_SUPPLICANT_GROUP_CCMP },
153 static struct strvalmap pairwise_map[] = {
154 { "none", G_SUPPLICANT_PAIRWISE_NONE },
155 { "tkip", G_SUPPLICANT_PAIRWISE_TKIP },
156 { "ccmp", G_SUPPLICANT_PAIRWISE_CCMP },
160 static struct strvalmap scan_capa_map[] = {
161 { "active", G_SUPPLICANT_CAPABILITY_SCAN_ACTIVE },
162 { "passive", G_SUPPLICANT_CAPABILITY_SCAN_PASSIVE },
163 { "ssid", G_SUPPLICANT_CAPABILITY_SCAN_SSID },
167 static struct strvalmap mode_capa_map[] = {
168 { "infrastructure", G_SUPPLICANT_CAPABILITY_MODE_INFRA },
169 { "ad-hoc", G_SUPPLICANT_CAPABILITY_MODE_IBSS },
170 { "ap", G_SUPPLICANT_CAPABILITY_MODE_AP },
171 { "p2p", G_SUPPLICANT_CAPABILITY_MODE_P2P },
172 #if defined TIZEN_EXT_WIFI_MESH
173 { "mesh", G_SUPPLICANT_CAPABILITY_MODE_MESH },
178 #if defined TIZEN_EXT && defined TIZEN_EXT_INS
179 struct _GSupplicantINSSettings {
180 GSupplicantINSPreferredFreq preferred_freq_bssid;
181 unsigned int preferred_freq_bssid_score;
182 bool last_connected_bssid;
183 unsigned int last_connected_bssid_score;
185 unsigned int assoc_reject_score;
187 int signal_level3_5ghz;
188 int signal_level3_24ghz;
191 static struct _GSupplicantINSSettings ins_settings;
192 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_INS */
194 #if defined TIZEN_EXT
195 static unsigned char invalid_bssid[WIFI_BSSID_LEN_MAX] = {
196 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
200 static GHashTable *interface_table;
201 static GHashTable *bss_mapping;
202 static GHashTable *peer_mapping;
203 static GHashTable *group_mapping;
204 static GHashTable *pending_peer_connection;
205 static GHashTable *config_file_table;
207 struct _GSupplicantWpsCredentials {
208 unsigned char ssid[32];
209 unsigned int ssid_len;
213 struct added_network_information {
215 GSupplicantSecurity security;
217 char * private_passphrase;
218 #if defined TIZEN_EXT
221 char *net_access_key;
225 #if defined TIZEN_EXT_WIFI_MESH
226 struct _GSupplicantMeshGroupInfo {
227 unsigned char ssid[32];
228 unsigned int ssid_len;
229 int disconnect_reason;
233 struct _GSupplicantInterface {
236 unsigned int keymgmt_capa;
237 unsigned int authalg_capa;
238 unsigned int proto_capa;
239 unsigned int group_capa;
240 unsigned int pairwise_capa;
241 unsigned int scan_capa;
242 unsigned int mode_capa;
243 unsigned int max_scan_ssids;
246 bool ap_create_in_progress;
248 GSupplicantState state;
249 dbus_bool_t scanning;
250 GSupplicantInterfaceCallback scan_callback;
256 struct _GSupplicantWpsCredentials wps_cred;
257 GSupplicantWpsState wps_state;
258 GHashTable *network_table;
259 GHashTable *peer_table;
260 GHashTable *group_table;
261 GHashTable *bss_mapping;
263 const char *pending_peer_path;
264 GSupplicantNetwork *current_network;
265 struct added_network_information network_info;
266 #if defined TIZEN_EXT
267 dbus_bool_t is_5_0_Ghz_supported;
268 int disconnect_reason;
270 #if defined TIZEN_EXT
271 unsigned char add_network_bssid[WIFI_BSSID_LEN_MAX];
272 unsigned char connected_bssid[WIFI_BSSID_LEN_MAX];
274 #if defined TIZEN_EXT_WIFI_MESH
276 struct _GSupplicantMeshGroupInfo group_info;
280 struct g_supplicant_bss {
281 GSupplicantInterface *interface;
283 unsigned char bssid[6];
284 unsigned char ssid[32];
285 unsigned int ssid_len;
286 dbus_uint16_t frequency;
287 dbus_uint32_t maxrate;
289 GSupplicantMode mode;
290 GSupplicantSecurity security;
291 dbus_bool_t rsn_selected;
292 unsigned int wpa_keymgmt;
293 unsigned int wpa_pairwise;
294 unsigned int wpa_group;
295 unsigned int rsn_keymgmt;
296 unsigned int rsn_pairwise;
297 unsigned int rsn_group;
298 unsigned int keymgmt;
301 dbus_bool_t ieee8021x;
302 #if defined TIZEN_EXT
304 dbus_bool_t ft_ieee8021x;
307 unsigned char country_code[COUNTRY_CODE_LENGTH];
308 GSupplicantPhy_mode phy_mode;
310 dbus_uint32_t est_throughput;
311 dbus_bool_t psk_sha256;
313 unsigned int wps_capabilities;
314 #if defined TIZEN_EXT
318 dbus_bool_t owe_transition_mode;
319 unsigned int transition_mode_ssid_len;
320 unsigned char transition_mode_bssid[6];
321 unsigned char transition_mode_ssid[32];
322 dbus_bool_t pmf_required;
326 struct _GSupplicantNetwork {
327 GSupplicantInterface *interface;
331 unsigned char ssid[32];
332 unsigned int ssid_len;
334 dbus_uint16_t frequency;
335 struct g_supplicant_bss *best_bss;
336 GSupplicantMode mode;
337 GSupplicantSecurity security;
339 unsigned int wps_capabilities;
340 GHashTable *bss_table;
341 GHashTable *config_table;
342 #if defined TIZEN_EXT
347 unsigned int keymgmt;
349 unsigned char country_code[COUNTRY_CODE_LENGTH];
350 GSupplicantPhy_mode phy_mode;
351 dbus_bool_t owe_transition_mode;
353 unsigned int transition_mode_ssid_len;
354 unsigned char transition_mode_bssid[6];
355 unsigned char transition_mode_ssid[32];
356 unsigned char last_connected_bssid[WIFI_BSSID_LEN_MAX];
357 GHashTable *assoc_reject_table;
361 struct _GSupplicantPeer {
362 GSupplicantInterface *interface;
364 unsigned char device_address[ETH_ALEN];
365 unsigned char iface_address[ETH_ALEN];
367 unsigned char *widi_ies;
370 unsigned int wps_capabilities;
372 const GSupplicantInterface *current_group_iface;
373 bool connection_requested;
376 struct _GSupplicantGroup {
377 GSupplicantInterface *interface;
378 GSupplicantInterface *orig_interface;
384 struct interface_data {
385 GSupplicantInterface *interface;
386 char *path; /* Interface path cannot be taken from interface (above) as
387 * it might have been freed already.
389 GSupplicantInterfaceCallback callback;
391 bool network_remove_in_progress;
392 GSupplicantSSID *ssid;
395 #if defined TIZEN_EXT
396 struct interface_signalpoll_data {
397 GSupplicantInterface *interface;
399 GSupplicantMaxSpeedCallback callback;
404 struct interface_create_data {
408 #if defined TIZEN_EXT
409 unsigned int mac_addr;
410 unsigned int preassoc_mac_addr;
411 unsigned int random_mac_lifetime;
412 #endif /* TIZEN_EXT */
413 #if defined TIZEN_EXT_WIFI_MESH
415 bool is_mesh_interface;
417 GSupplicantInterface *interface;
418 GSupplicantInterfaceCallback callback;
422 struct interface_connect_data {
423 GSupplicantInterface *interface;
425 GSupplicantInterfaceCallback callback;
428 GSupplicantSSID *ssid;
429 GSupplicantPeerParams *peer;
433 struct interface_scan_data {
434 GSupplicantInterface *interface;
436 GSupplicantInterfaceCallback callback;
437 GSupplicantScanParams *scan_params;
441 #if defined TIZEN_EXT
442 struct update_bssid_data {
443 GSupplicantNetwork *network;
444 unsigned char last_connected_bssid[WIFI_BSSID_LEN_MAX];
445 GHashTable *assoc_reject_table;
449 struct assoc_reject_data {
451 GSList *reject_time_list;
454 struct assoc_count_data {
459 static unsigned int last_connected_bss_timeout = 0;
460 static bool simplified_log = true;
463 static int network_remove(struct interface_data *data);
465 #if defined TIZEN_EXT_WIFI_MESH
466 struct _GSupplicantMeshPeer {
467 GSupplicantInterface *interface;
469 int disconnect_reason;
473 static inline void debug(const char *format, ...)
478 if (!callbacks_pointer || !callbacks_pointer->debug)
481 va_start(ap, format);
483 if (vsnprintf(str, sizeof(str), format, ap) > 0)
484 callbacks_pointer->debug(str);
489 #define SUPPLICANT_DBG(fmt, arg...) \
490 debug("%s:%s() " fmt, __FILE__, __FUNCTION__ , ## arg);
492 static GSupplicantMode string2mode(const char *mode)
495 return G_SUPPLICANT_MODE_UNKNOWN;
497 if (g_str_equal(mode, "infrastructure"))
498 return G_SUPPLICANT_MODE_INFRA;
499 else if (g_str_equal(mode, "ad-hoc"))
500 return G_SUPPLICANT_MODE_IBSS;
501 #if defined TIZEN_EXT_WIFI_MESH
502 else if (g_str_equal(mode, "mesh"))
503 return G_SUPPLICANT_MODE_MESH;
506 return G_SUPPLICANT_MODE_UNKNOWN;
509 static const char *mode2string(GSupplicantMode mode)
512 case G_SUPPLICANT_MODE_UNKNOWN:
514 case G_SUPPLICANT_MODE_INFRA:
516 case G_SUPPLICANT_MODE_IBSS:
518 case G_SUPPLICANT_MODE_MASTER:
520 #if defined TIZEN_EXT_WIFI_MESH
521 case G_SUPPLICANT_MODE_MESH:
529 static const char *security2string(GSupplicantSecurity security)
532 case G_SUPPLICANT_SECURITY_UNKNOWN:
534 case G_SUPPLICANT_SECURITY_NONE:
536 case G_SUPPLICANT_SECURITY_WEP:
538 case G_SUPPLICANT_SECURITY_PSK:
540 case G_SUPPLICANT_SECURITY_IEEE8021X:
542 #if defined TIZEN_EXT
543 case G_SUPPLICANT_SECURITY_PSK_SHA256:
545 case G_SUPPLICANT_SECURITY_FT_PSK:
547 case G_SUPPLICANT_SECURITY_FT_IEEE8021X:
548 return "ft_ieee8021x";
549 case G_SUPPLICANT_SECURITY_SAE:
551 case G_SUPPLICANT_SECURITY_OWE:
553 case G_SUPPLICANT_SECURITY_DPP:
561 static GSupplicantState string2state(const char *state)
564 return G_SUPPLICANT_STATE_UNKNOWN;
566 if (g_str_equal(state, "unknown"))
567 return G_SUPPLICANT_STATE_UNKNOWN;
568 else if (g_str_equal(state, "interface_disabled"))
569 return G_SUPPLICANT_STATE_DISABLED;
570 else if (g_str_equal(state, "disconnected"))
571 return G_SUPPLICANT_STATE_DISCONNECTED;
572 else if (g_str_equal(state, "inactive"))
573 return G_SUPPLICANT_STATE_INACTIVE;
574 else if (g_str_equal(state, "scanning"))
575 return G_SUPPLICANT_STATE_SCANNING;
576 else if (g_str_equal(state, "authenticating"))
577 return G_SUPPLICANT_STATE_AUTHENTICATING;
578 else if (g_str_equal(state, "associating"))
579 return G_SUPPLICANT_STATE_ASSOCIATING;
580 else if (g_str_equal(state, "associated"))
581 return G_SUPPLICANT_STATE_ASSOCIATED;
582 else if (g_str_equal(state, "group_handshake"))
583 return G_SUPPLICANT_STATE_GROUP_HANDSHAKE;
584 else if (g_str_equal(state, "4way_handshake"))
585 return G_SUPPLICANT_STATE_4WAY_HANDSHAKE;
586 else if (g_str_equal(state, "completed"))
587 return G_SUPPLICANT_STATE_COMPLETED;
589 return G_SUPPLICANT_STATE_UNKNOWN;
592 static bool compare_network_parameters(GSupplicantInterface *interface,
593 GSupplicantSSID *ssid)
595 #if defined TIZEN_EXT
596 if (!interface->network_info.ssid)
600 if (memcmp(interface->network_info.ssid, ssid->ssid, ssid->ssid_len))
603 if (interface->network_info.security != ssid->security)
606 if (interface->network_info.passphrase &&
607 g_strcmp0(interface->network_info.passphrase,
608 ssid->passphrase) != 0) {
612 if (interface->network_info.private_passphrase &&
613 g_strcmp0(interface->network_info.private_passphrase,
614 ssid->private_key_passphrase) != 0) {
618 #if defined TIZEN_EXT
619 if (interface->network_info.connector &&
620 g_strcmp0(interface->network_info.connector,
621 ssid->connector) != 0) {
624 if (interface->network_info.c_sign_key &&
625 g_strcmp0(interface->network_info.c_sign_key,
626 ssid->c_sign_key) != 0) {
629 if (interface->network_info.net_access_key &&
630 g_strcmp0(interface->network_info.net_access_key,
631 ssid->net_access_key) != 0) {
638 static void remove_network_information(GSupplicantInterface * interface)
640 g_free(interface->network_info.ssid);
641 g_free(interface->network_info.passphrase);
642 g_free(interface->network_info.private_passphrase);
643 #if defined TIZEN_EXT
644 g_free(interface->network_info.connector);
645 g_free(interface->network_info.c_sign_key);
646 g_free(interface->network_info.net_access_key);
648 interface->network_info.ssid = NULL;
649 interface->network_info.passphrase = NULL;
650 interface->network_info.private_passphrase = NULL;
651 #if defined TIZEN_EXT
652 interface->network_info.connector = NULL;
653 interface->network_info.c_sign_key = NULL;
654 interface->network_info.net_access_key = NULL;
658 static int store_network_information(GSupplicantInterface * interface,
659 GSupplicantSSID *ssid)
661 interface->network_info.ssid = g_malloc(ssid->ssid_len + 1);
662 if (interface->network_info.ssid != NULL) {
663 memcpy(interface->network_info.ssid, ssid->ssid,
665 interface->network_info.ssid[ssid->ssid_len] = '\0';
670 interface->network_info.security = ssid->security;
672 if ((ssid->security == G_SUPPLICANT_SECURITY_WEP ||
673 ssid->security == G_SUPPLICANT_SECURITY_PSK ||
674 #if defined TIZEN_EXT
675 ssid->security == G_SUPPLICANT_SECURITY_SAE ||
676 ssid->security == G_SUPPLICANT_SECURITY_PSK_SHA256 ||
678 ssid->security == G_SUPPLICANT_SECURITY_NONE) &&
680 interface->network_info.passphrase = g_strdup(ssid->passphrase);
683 if (ssid->security == G_SUPPLICANT_SECURITY_IEEE8021X &&
684 ssid->private_key_passphrase) {
685 interface->network_info.private_passphrase =
686 g_strdup(ssid->private_key_passphrase);
692 static void callback_system_ready(void)
699 if (!callbacks_pointer)
702 if (!callbacks_pointer->system_ready)
705 callbacks_pointer->system_ready();
708 static void callback_system_killed(void)
710 system_ready = FALSE;
712 if (!callbacks_pointer)
715 if (!callbacks_pointer->system_killed)
718 callbacks_pointer->system_killed();
721 static void callback_interface_added(GSupplicantInterface *interface)
725 if (!callbacks_pointer)
728 if (!callbacks_pointer->interface_added)
731 callbacks_pointer->interface_added(interface);
734 static void callback_interface_state(GSupplicantInterface *interface)
736 if (!callbacks_pointer)
739 if (!callbacks_pointer->interface_state)
742 callbacks_pointer->interface_state(interface);
745 static void callback_interface_removed(GSupplicantInterface *interface)
747 if (!callbacks_pointer)
750 if (!callbacks_pointer->interface_removed)
753 callbacks_pointer->interface_removed(interface);
756 #if !defined TIZEN_EXT
757 static void callback_p2p_support(GSupplicantInterface *interface)
761 if (!interface->p2p_support)
764 if (callbacks_pointer && callbacks_pointer->p2p_support)
765 callbacks_pointer->p2p_support(interface);
769 #if defined TIZEN_EXT_WIFI_MESH
770 static void callback_mesh_support(GSupplicantInterface *interface)
774 if (!interface->mesh_support)
777 if (callbacks_pointer && callbacks_pointer->mesh_support)
778 callbacks_pointer->mesh_support(interface);
781 bool g_supplicant_interface_has_mesh(GSupplicantInterface *interface)
786 return interface->mesh_support;
790 static void callback_scan_started(GSupplicantInterface *interface)
792 if (!callbacks_pointer)
795 if (!callbacks_pointer->scan_started)
798 callbacks_pointer->scan_started(interface);
801 static void callback_ap_create_fail(GSupplicantInterface *interface)
803 if (!callbacks_pointer)
806 if (!callbacks_pointer->ap_create_fail)
809 callbacks_pointer->ap_create_fail(interface);
812 static void callback_scan_finished(GSupplicantInterface *interface)
814 if (!callbacks_pointer)
817 if (!callbacks_pointer->scan_finished)
820 callbacks_pointer->scan_finished(interface);
823 static void callback_network_added(GSupplicantNetwork *network)
825 if (!callbacks_pointer)
828 if (!callbacks_pointer->network_added)
831 callbacks_pointer->network_added(network);
834 static void callback_network_removed(GSupplicantNetwork *network)
836 if (!callbacks_pointer)
839 if (!callbacks_pointer->network_removed)
842 callbacks_pointer->network_removed(network);
845 #if defined TIZEN_EXT
846 static void callback_network_merged(GSupplicantNetwork *network)
848 if (!callbacks_pointer)
851 if (!callbacks_pointer->network_merged)
854 callbacks_pointer->network_merged(network);
857 static void callback_assoc_failed(void *user_data)
859 if (!callbacks_pointer)
862 if (!callbacks_pointer->assoc_failed)
865 callbacks_pointer->assoc_failed(user_data);
868 static void callback_scan_done(GSupplicantInterface *interface)
870 if (!callbacks_pointer)
873 if (!callbacks_pointer->scan_done)
876 callbacks_pointer->scan_done(interface);
880 static void callback_network_changed(GSupplicantNetwork *network,
881 const char *property)
883 if (!callbacks_pointer)
886 if (!callbacks_pointer->network_changed)
889 callbacks_pointer->network_changed(network, property);
892 static void callback_network_associated(GSupplicantNetwork *network)
894 if (!callbacks_pointer)
897 if (!callbacks_pointer->network_associated)
900 callbacks_pointer->network_associated(network);
903 static void callback_sta_authorized(GSupplicantInterface *interface,
906 if (!callbacks_pointer)
909 if (!callbacks_pointer->sta_authorized)
912 callbacks_pointer->sta_authorized(interface, addr);
915 static void callback_sta_deauthorized(GSupplicantInterface *interface,
918 if (!callbacks_pointer)
921 if (!callbacks_pointer->sta_deauthorized)
924 callbacks_pointer->sta_deauthorized(interface, addr);
927 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
928 static void callback_eap(GSupplicantInterface *interface, bool status)
930 if (!callbacks_pointer)
933 if (!callbacks_pointer->eap)
936 callbacks_pointer->eap(interface, status);
938 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
940 static void callback_peer_found(GSupplicantPeer *peer)
942 if (!callbacks_pointer)
945 if (!callbacks_pointer->peer_found)
948 callbacks_pointer->peer_found(peer);
951 static void callback_peer_lost(GSupplicantPeer *peer)
953 if (!callbacks_pointer)
956 if (!callbacks_pointer->peer_lost)
959 callbacks_pointer->peer_lost(peer);
962 static void callback_peer_changed(GSupplicantPeer *peer,
963 GSupplicantPeerState state)
965 if (!callbacks_pointer)
968 if (!callbacks_pointer->peer_changed)
971 callbacks_pointer->peer_changed(peer, state);
974 static void callback_peer_request(GSupplicantPeer *peer)
976 if (!callbacks_pointer)
979 if (!callbacks_pointer->peer_request)
982 peer->connection_requested = true;
984 callbacks_pointer->peer_request(peer);
987 static void callback_disconnect_reason_code(GSupplicantInterface *interface,
990 if (!callbacks_pointer)
993 if (!callbacks_pointer->disconnect_reasoncode)
996 if (reason_code != 0)
997 callbacks_pointer->disconnect_reasoncode(interface,
1001 static void callback_assoc_status_code(GSupplicantInterface *interface,
1004 if (!callbacks_pointer)
1007 if (!callbacks_pointer->assoc_status_code)
1010 callbacks_pointer->assoc_status_code(interface, status_code);
1014 static void remove_group(gpointer data)
1016 GSupplicantGroup *group = data;
1019 g_slist_free_full(group->members, g_free);
1021 g_free(group->path);
1025 static void remove_interface(gpointer data)
1027 GSupplicantInterface *interface = data;
1029 g_hash_table_destroy(interface->bss_mapping);
1030 g_hash_table_destroy(interface->network_table);
1031 g_hash_table_destroy(interface->peer_table);
1032 g_hash_table_destroy(interface->group_table);
1034 if (interface->scan_callback) {
1035 SUPPLICANT_DBG("call interface %p callback %p scanning %d",
1036 interface, interface->scan_callback,
1037 interface->scanning);
1039 interface->scan_callback(-EIO, interface, interface->scan_data);
1040 interface->scan_callback = NULL;
1041 interface->scan_data = NULL;
1043 if (interface->scanning) {
1044 interface->scanning = FALSE;
1045 callback_scan_finished(interface);
1049 callback_interface_removed(interface);
1051 g_free(interface->wps_cred.key);
1052 g_free(interface->path);
1053 g_free(interface->network_path);
1054 #if defined TIZEN_EXT
1055 interface->network_path = NULL;
1057 g_free(interface->ifname);
1058 g_free(interface->driver);
1059 g_free(interface->bridge);
1060 remove_network_information(interface);
1064 static void remove_network(gpointer data)
1066 GSupplicantNetwork *network = data;
1068 g_hash_table_destroy(network->bss_table);
1070 callback_network_removed(network);
1072 g_hash_table_destroy(network->config_table);
1073 #if defined TIZEN_EXT
1074 g_hash_table_destroy(network->assoc_reject_table);
1077 g_free(network->path);
1078 g_free(network->group);
1079 g_free(network->name);
1080 #if defined TIZEN_EXT
1081 g_free(network->eap);
1082 g_free(network->identity);
1083 g_free(network->phase2);
1085 #if defined TIZEN_EXT
1086 g_slist_free_full(network->vsie_list, g_free);
1092 static void remove_bss(gpointer data)
1094 struct g_supplicant_bss *bss = data;
1096 supplicant_dbus_property_call_cancel_all(bss);
1099 #if defined TIZEN_EXT
1100 g_slist_free_full(bss->vsie_list, g_free);
1105 static void remove_peer(gpointer data)
1107 GSupplicantPeer *peer = data;
1109 callback_peer_lost(peer);
1112 g_slist_free_full(peer->groups, g_free);
1115 g_hash_table_remove(peer_mapping, peer->path);
1117 if (pending_peer_connection)
1118 g_hash_table_remove(pending_peer_connection, peer->path);
1122 g_free(peer->identifier);
1123 g_free(peer->widi_ies);
1128 #if defined TIZEN_EXT
1129 static void remove_assoc_data(gpointer data)
1131 struct assoc_reject_data *assoc_data = data;
1133 g_free(assoc_data->bssid);
1134 g_slist_free(assoc_data->reject_time_list);
1140 static void debug_strvalmap(const char *label, struct strvalmap *map,
1144 #if defined TIZEN_EXT
1145 if (!simplified_log)
1147 for (i = 0; map[i].str; i++) {
1148 if (val & map[i].val)
1149 SUPPLICANT_DBG("%s: %s", label, map[i].str);
1153 static void interface_capability_keymgmt(DBusMessageIter *iter, void *user_data)
1155 GSupplicantInterface *interface = user_data;
1156 const char *str = NULL;
1159 dbus_message_iter_get_basic(iter, &str);
1163 for (i = 0; keymgmt_map[i].str; i++)
1164 if (strcmp(str, keymgmt_map[i].str) == 0) {
1165 interface->keymgmt_capa |= keymgmt_map[i].val;
1170 static void interface_capability_authalg(DBusMessageIter *iter, void *user_data)
1172 GSupplicantInterface *interface = user_data;
1173 const char *str = NULL;
1176 dbus_message_iter_get_basic(iter, &str);
1180 for (i = 0; authalg_capa_map[i].str; i++)
1181 if (strcmp(str, authalg_capa_map[i].str) == 0) {
1182 interface->authalg_capa |= authalg_capa_map[i].val;
1187 static void interface_capability_proto(DBusMessageIter *iter, void *user_data)
1189 GSupplicantInterface *interface = user_data;
1190 const char *str = NULL;
1193 dbus_message_iter_get_basic(iter, &str);
1197 for (i = 0; proto_capa_map[i].str; i++)
1198 if (strcmp(str, proto_capa_map[i].str) == 0) {
1199 interface->proto_capa |= proto_capa_map[i].val;
1204 static void interface_capability_pairwise(DBusMessageIter *iter,
1207 GSupplicantInterface *interface = user_data;
1208 const char *str = NULL;
1211 dbus_message_iter_get_basic(iter, &str);
1215 for (i = 0; pairwise_map[i].str; i++)
1216 if (strcmp(str, pairwise_map[i].str) == 0) {
1217 interface->pairwise_capa |= pairwise_map[i].val;
1222 static void interface_capability_group(DBusMessageIter *iter, void *user_data)
1224 GSupplicantInterface *interface = user_data;
1225 const char *str = NULL;
1228 dbus_message_iter_get_basic(iter, &str);
1232 for (i = 0; group_map[i].str; i++)
1233 if (strcmp(str, group_map[i].str) == 0) {
1234 interface->group_capa |= group_map[i].val;
1239 static void interface_capability_scan(DBusMessageIter *iter, void *user_data)
1241 GSupplicantInterface *interface = user_data;
1242 const char *str = NULL;
1245 dbus_message_iter_get_basic(iter, &str);
1249 for (i = 0; scan_capa_map[i].str; i++)
1250 if (strcmp(str, scan_capa_map[i].str) == 0) {
1251 interface->scan_capa |= scan_capa_map[i].val;
1256 static void interface_capability_mode(DBusMessageIter *iter, void *user_data)
1258 GSupplicantInterface *interface = user_data;
1259 const char *str = NULL;
1262 dbus_message_iter_get_basic(iter, &str);
1266 for (i = 0; mode_capa_map[i].str; i++)
1267 if (strcmp(str, mode_capa_map[i].str) == 0) {
1268 interface->mode_capa |= mode_capa_map[i].val;
1273 static void interface_capability(const char *key, DBusMessageIter *iter,
1276 GSupplicantInterface *interface = user_data;
1281 if (g_strcmp0(key, "KeyMgmt") == 0)
1282 supplicant_dbus_array_foreach(iter,
1283 interface_capability_keymgmt, interface);
1284 else if (g_strcmp0(key, "AuthAlg") == 0)
1285 supplicant_dbus_array_foreach(iter,
1286 interface_capability_authalg, interface);
1287 else if (g_strcmp0(key, "Protocol") == 0)
1288 supplicant_dbus_array_foreach(iter,
1289 interface_capability_proto, interface);
1290 else if (g_strcmp0(key, "Pairwise") == 0)
1291 supplicant_dbus_array_foreach(iter,
1292 interface_capability_pairwise, interface);
1293 else if (g_strcmp0(key, "Group") == 0)
1294 supplicant_dbus_array_foreach(iter,
1295 interface_capability_group, interface);
1296 else if (g_strcmp0(key, "Scan") == 0)
1297 supplicant_dbus_array_foreach(iter,
1298 interface_capability_scan, interface);
1299 else if (g_strcmp0(key, "Modes") == 0)
1300 supplicant_dbus_array_foreach(iter,
1301 interface_capability_mode, interface);
1302 else if (g_strcmp0(key, "MaxScanSSID") == 0) {
1303 dbus_int32_t max_scan_ssid;
1305 dbus_message_iter_get_basic(iter, &max_scan_ssid);
1306 if (max_scan_ssid < 2)
1308 interface->max_scan_ssids = max_scan_ssid;
1309 #if defined TIZEN_EXT
1310 } else if (g_strcmp0(key, "Is5GhzSupported") == 0) {
1311 dbus_bool_t is_5_0_Ghz_supported;
1313 dbus_message_iter_get_basic(iter, &is_5_0_Ghz_supported);
1314 interface->is_5_0_Ghz_supported = is_5_0_Ghz_supported;
1317 SUPPLICANT_DBG("key %s type %c",
1318 key, dbus_message_iter_get_arg_type(iter));
1321 static void set_bss_expiration_age(DBusMessageIter *iter, void *user_data)
1323 unsigned int bss_expiration_age = GPOINTER_TO_UINT(user_data);
1325 dbus_message_iter_append_basic(iter, DBUS_TYPE_UINT32,
1326 &bss_expiration_age);
1329 int g_supplicant_interface_set_bss_expiration_age(GSupplicantInterface *interface,
1330 unsigned int bss_expiration_age)
1332 return supplicant_dbus_property_set(interface->path,
1333 SUPPLICANT_INTERFACE ".Interface",
1334 "BSSExpireAge", DBUS_TYPE_UINT32_AS_STRING,
1335 set_bss_expiration_age, NULL,
1336 GUINT_TO_POINTER(bss_expiration_age), NULL);
1339 struct set_apscan_data
1341 unsigned int ap_scan;
1342 GSupplicantInterface *interface;
1345 static void set_apscan(DBusMessageIter *iter, void *user_data)
1347 struct set_apscan_data *data = user_data;
1348 unsigned int ap_scan = data->ap_scan;
1350 dbus_message_iter_append_basic(iter, DBUS_TYPE_UINT32, &ap_scan);
1353 static void set_apscan_complete(const char *error,
1354 DBusMessageIter *iter, void *user_data)
1356 struct set_apscan_data *data = user_data;
1357 GSupplicantInterface *interface = data->interface;
1360 interface->ap_create_in_progress = false;
1361 SUPPLICANT_DBG("Set AP scan error %s", error);
1365 interface->ap_create_in_progress = true;
1370 int g_supplicant_interface_set_apscan(GSupplicantInterface *interface,
1371 unsigned int ap_scan)
1373 struct set_apscan_data *data;
1376 data = dbus_malloc0(sizeof(*data));
1381 data->ap_scan = ap_scan;
1382 data->interface = interface;
1384 ret = supplicant_dbus_property_set(interface->path,
1385 SUPPLICANT_INTERFACE ".Interface",
1386 "ApScan", DBUS_TYPE_UINT32_AS_STRING,
1387 set_apscan, set_apscan_complete, data, NULL);
1394 void g_supplicant_interface_set_data(GSupplicantInterface *interface,
1400 interface->data = data;
1403 interface->scan_callback = NULL;
1406 void *g_supplicant_interface_get_data(GSupplicantInterface *interface)
1411 return interface->data;
1414 const char *g_supplicant_interface_get_ifname(GSupplicantInterface *interface)
1419 return interface->ifname;
1422 #if defined TIZEN_EXT
1423 bool g_supplicant_interface_get_is_5_0_ghz_supported(GSupplicantInterface *interface)
1428 return interface->is_5_0_Ghz_supported;
1431 unsigned char *g_supplicant_interface_get_add_network_bssid(GSupplicantInterface *interface)
1436 return (unsigned char *)interface->add_network_bssid;
1440 const char *g_supplicant_interface_get_driver(GSupplicantInterface *interface)
1445 return interface->driver;
1448 GSupplicantState g_supplicant_interface_get_state(
1449 GSupplicantInterface *interface)
1452 return G_SUPPLICANT_STATE_UNKNOWN;
1454 return interface->state;
1457 const char *g_supplicant_interface_get_wps_key(GSupplicantInterface *interface)
1462 return (const char *)interface->wps_cred.key;
1465 const void *g_supplicant_interface_get_wps_ssid(GSupplicantInterface *interface,
1466 unsigned int *ssid_len)
1471 if (!interface || interface->wps_cred.ssid_len == 0) {
1476 *ssid_len = interface->wps_cred.ssid_len;
1477 return interface->wps_cred.ssid;
1480 GSupplicantWpsState g_supplicant_interface_get_wps_state(
1481 GSupplicantInterface *interface)
1484 return G_SUPPLICANT_WPS_STATE_UNKNOWN;
1486 return interface->wps_state;
1489 unsigned int g_supplicant_interface_get_mode(GSupplicantInterface *interface)
1494 return interface->mode_capa;
1497 unsigned int g_supplicant_interface_get_max_scan_ssids(
1498 GSupplicantInterface *interface)
1503 if (interface->max_scan_ssids == 0)
1504 return WPAS_MAX_SCAN_SSIDS;
1506 return interface->max_scan_ssids;
1509 static void set_network_enabled(DBusMessageIter *iter, void *user_data)
1511 dbus_bool_t enable = *(dbus_bool_t *)user_data;
1513 dbus_message_iter_append_basic(iter, DBUS_TYPE_BOOLEAN, &enable);
1516 int g_supplicant_interface_enable_selected_network(GSupplicantInterface *interface,
1522 if (!interface->network_path)
1525 SUPPLICANT_DBG(" ");
1526 return supplicant_dbus_property_set(interface->network_path,
1527 SUPPLICANT_INTERFACE ".Network",
1528 "Enabled", DBUS_TYPE_BOOLEAN_AS_STRING,
1529 set_network_enabled, NULL, &enable, NULL);
1532 dbus_bool_t g_supplicant_interface_get_ready(GSupplicantInterface *interface)
1537 return interface->ready;
1540 GSupplicantInterface *g_supplicant_network_get_interface(
1541 GSupplicantNetwork *network)
1546 return network->interface;
1549 const char *g_supplicant_network_get_name(GSupplicantNetwork *network)
1551 if (!network || !network->name)
1554 return network->name;
1557 const char *g_supplicant_network_get_identifier(GSupplicantNetwork *network)
1559 if (!network || !network->group)
1562 return network->group;
1565 const char *g_supplicant_network_get_path(GSupplicantNetwork *network)
1567 if (!network || !network->path)
1570 return network->path;
1573 const char *g_supplicant_network_get_mode(GSupplicantNetwork *network)
1576 return G_SUPPLICANT_MODE_UNKNOWN;
1578 return mode2string(network->mode);
1581 const char *g_supplicant_network_get_security(GSupplicantNetwork *network)
1584 return G_SUPPLICANT_SECURITY_UNKNOWN;
1586 return security2string(network->security);
1589 const void *g_supplicant_network_get_ssid(GSupplicantNetwork *network,
1590 unsigned int *ssid_len)
1597 *ssid_len = network->ssid_len;
1598 return network->ssid;
1601 dbus_int16_t g_supplicant_network_get_signal(GSupplicantNetwork *network)
1606 return network->signal;
1609 #if defined TIZEN_EXT
1610 void g_supplicant_network_set_signal(GSupplicantNetwork *network, int signal)
1615 network->signal = (dbus_int16_t)signal;
1618 void g_supplicant_network_set_bss_signal(GSupplicantNetwork *network,
1619 int signal, int snr)
1621 struct g_supplicant_bss *best_bss;
1626 best_bss = network->best_bss;
1630 best_bss->signal = (dbus_int16_t)signal;
1631 best_bss->snr = (dbus_int16_t)snr;
1635 dbus_uint16_t g_supplicant_network_get_frequency(GSupplicantNetwork *network)
1640 return network->frequency;
1643 dbus_bool_t g_supplicant_network_get_wps(GSupplicantNetwork *network)
1648 return network->wps;
1651 dbus_bool_t g_supplicant_network_is_wps_active(GSupplicantNetwork *network)
1656 if (network->wps_capabilities & G_SUPPLICANT_WPS_CONFIGURED)
1662 dbus_bool_t g_supplicant_network_is_wps_pbc(GSupplicantNetwork *network)
1667 if (network->wps_capabilities & G_SUPPLICANT_WPS_PBC)
1673 dbus_bool_t g_supplicant_network_is_wps_advertizing(GSupplicantNetwork *network)
1678 if (network->wps_capabilities & G_SUPPLICANT_WPS_REGISTRAR)
1685 GSupplicantPhy_mode g_supplicant_network_get_phy_mode(GSupplicantNetwork *network)
1688 return G_SUPPLICANT_MODE_IEEE80211_UNKNOWN;
1690 return network->phy_mode;
1694 GSupplicantInterface *g_supplicant_peer_get_interface(GSupplicantPeer *peer)
1699 return peer->interface;
1702 const char *g_supplicant_peer_get_path(GSupplicantPeer *peer)
1710 const char *g_supplicant_peer_get_identifier(GSupplicantPeer *peer)
1715 return peer->identifier;
1718 const void *g_supplicant_peer_get_device_address(GSupplicantPeer *peer)
1723 return peer->device_address;
1726 const void *g_supplicant_peer_get_iface_address(GSupplicantPeer *peer)
1731 return peer->iface_address;
1734 const char *g_supplicant_peer_get_name(GSupplicantPeer *peer)
1742 #if defined TIZEN_EXT
1743 bool g_supplicant_network_is_hs20AP(GSupplicantNetwork *network)
1748 return network->isHS20AP;
1751 const char *g_supplicant_network_get_eap(GSupplicantNetwork *network)
1753 if (!network || !network->eap)
1756 return network->eap;
1759 const char *g_supplicant_network_get_identity(GSupplicantNetwork *network)
1761 if (!network || !network->identity)
1764 return network->identity;
1767 const char *g_supplicant_network_get_phase2(GSupplicantNetwork *network)
1769 if (!network || !network->phase2)
1772 return network->phase2;
1775 unsigned int g_supplicant_network_get_keymgmt(GSupplicantNetwork *network)
1780 return network->keymgmt;
1783 dbus_bool_t g_supplicant_network_get_privacy(GSupplicantNetwork *network)
1788 return network->privacy;
1791 const unsigned char *g_supplicant_network_get_countrycode(GSupplicantNetwork
1797 return network->country_code;
1800 dbus_bool_t g_supplicant_network_is_pmf_required(GSupplicantNetwork *network)
1805 return network->best_bss->pmf_required;
1809 const unsigned char *g_supplicant_peer_get_widi_ies(GSupplicantPeer *peer,
1812 if (!peer || !length)
1815 *length = peer->widi_ies_length;
1816 return peer->widi_ies;
1819 bool g_supplicant_peer_is_wps_pbc(GSupplicantPeer *peer)
1824 if (peer->wps_capabilities & G_SUPPLICANT_WPS_PBC)
1830 bool g_supplicant_peer_is_wps_pin(GSupplicantPeer *peer)
1835 if (peer->wps_capabilities & G_SUPPLICANT_WPS_PIN)
1841 bool g_supplicant_peer_is_in_a_group(GSupplicantPeer *peer)
1843 if (!peer || !peer->groups)
1849 GSupplicantInterface *g_supplicant_peer_get_group_interface(GSupplicantPeer *peer)
1854 return (GSupplicantInterface *) peer->current_group_iface;
1857 bool g_supplicant_peer_is_client(GSupplicantPeer *peer)
1859 GSupplicantGroup *group;
1865 for (list = peer->groups; list; list = list->next) {
1866 const char *path = list->data;
1868 group = g_hash_table_lookup(group_mapping, path);
1872 if (group->role != G_SUPPLICANT_GROUP_ROLE_CLIENT ||
1873 group->orig_interface != peer->interface)
1876 if (group->interface == peer->current_group_iface)
1883 bool g_supplicant_peer_has_requested_connection(GSupplicantPeer *peer)
1888 return peer->connection_requested;
1891 #if defined TIZEN_EXT
1893 * Description: Network client requires additional wifi specific info
1895 const unsigned char *g_supplicant_network_get_bssid(GSupplicantNetwork *network)
1897 if (network == NULL || network->best_bss == NULL)
1900 return (const unsigned char *)network->best_bss->bssid;
1903 dbus_bool_t g_supplicant_network_get_transition_mode(GSupplicantNetwork *network)
1905 if (network == NULL)
1908 return network->owe_transition_mode;
1911 const unsigned char *g_supplicant_network_get_transition_mode_bssid(GSupplicantNetwork *network)
1913 if (network == NULL)
1916 return (const unsigned char *)network->transition_mode_bssid;
1919 const void *g_supplicant_network_get_transition_mode_ssid(GSupplicantNetwork *network,
1920 unsigned int *transition_mode_ssid_len)
1923 *transition_mode_ssid_len = 0;
1927 *transition_mode_ssid_len = network->transition_mode_ssid_len;
1928 return network->transition_mode_ssid;
1931 unsigned int g_supplicant_network_get_maxrate(GSupplicantNetwork *network)
1933 if (network == NULL || network->best_bss == NULL)
1936 return network->best_bss->maxrate;
1939 const char *g_supplicant_network_get_enc_mode(GSupplicantNetwork *network)
1941 if (network == NULL || network->best_bss == NULL)
1944 if (network->best_bss->security == G_SUPPLICANT_SECURITY_PSK ||
1945 network->best_bss->security == G_SUPPLICANT_SECURITY_SAE ||
1946 network->best_bss->security == G_SUPPLICANT_SECURITY_OWE ||
1947 network->best_bss->security == G_SUPPLICANT_SECURITY_DPP ||
1948 network->best_bss->security == G_SUPPLICANT_SECURITY_PSK_SHA256 ||
1949 network->best_bss->security == G_SUPPLICANT_SECURITY_IEEE8021X) {
1950 unsigned int pairwise;
1952 pairwise = network->best_bss->rsn_pairwise |
1953 network->best_bss->wpa_pairwise;
1955 if ((pairwise & G_SUPPLICANT_PAIRWISE_CCMP) &&
1956 (pairwise & G_SUPPLICANT_PAIRWISE_TKIP))
1958 else if (pairwise & G_SUPPLICANT_PAIRWISE_CCMP)
1960 else if (pairwise & G_SUPPLICANT_PAIRWISE_TKIP)
1963 } else if (network->best_bss->security == G_SUPPLICANT_SECURITY_WEP)
1965 else if (network->best_bss->security == G_SUPPLICANT_SECURITY_NONE)
1971 bool g_supplicant_network_get_rsn_mode(GSupplicantNetwork *network)
1973 if (network == NULL || network->best_bss == NULL)
1976 if (network->best_bss->security == G_SUPPLICANT_SECURITY_OWE ||
1977 network->best_bss->security == G_SUPPLICANT_SECURITY_DPP)
1980 if (network->best_bss->rsn_selected) {
1981 const char *mode = g_supplicant_network_get_enc_mode(network);
1982 if (g_strcmp0(mode, "aes") == 0 ||
1983 g_strcmp0(mode, "mixed") == 0)
1991 void *g_supplicant_network_get_wifi_vsie(GSupplicantNetwork *network)
1993 GSList *vsie_list = NULL;
1998 if (g_slist_length(network->vsie_list) > 0) {
1999 GSList *list = NULL;
2000 unsigned char *vsie = NULL;
2001 for (list = network->vsie_list; list; list = list->next) {
2002 unsigned char *ie = (unsigned char *)list->data;
2005 vsie = (unsigned char *)g_try_malloc0(ie[1]+2); // tag number size(1), tag length size(1)
2008 memcpy(vsie, ie, ie[1]+2);
2009 vsie_list = g_slist_append(vsie_list, vsie);
2011 SUPPLICANT_DBG("Failed to allocate memory");
2018 static bool compare_bssid(unsigned char *bssid_a, unsigned char *bssid_b)
2020 if (!memcmp(bssid_a, bssid_b, WIFI_BSSID_LEN_MAX))
2026 static gchar *convert_bssid_to_str(unsigned char *bssid)
2031 bssid_str = g_string_sized_new(18);
2035 for (i = 0; i < WIFI_BSSID_LEN_MAX; i++) {
2036 g_string_append_printf(bssid_str, "%02x", bssid[i]);
2037 if (i < WIFI_BSSID_LEN_MAX - 1)
2038 g_string_append(bssid_str, ":");
2041 return g_string_free(bssid_str, FALSE);
2044 #if defined TIZEN_EXT_INS
2045 static void count_assoc_reject(gpointer data, gpointer user_data)
2047 time_t assoc_reject_time = GPOINTER_TO_INT(data);
2048 struct assoc_count_data *assoc_count = user_data;
2050 if (assoc_reject_time > assoc_count->ref_time)
2051 assoc_count->assoc_count++;
2054 static uint16_t get_assoc_reject_cnt(GHashTable *assoc_reject_table, unsigned char *bssid)
2057 struct assoc_reject_data *assoc_data;
2058 struct assoc_count_data assoc_count;
2060 struct tm* timeinfo;
2062 if (g_hash_table_size(assoc_reject_table) < 1)
2068 if (!memcmp(bssid, invalid_bssid, WIFI_BSSID_LEN_MAX))
2071 bssid_str = convert_bssid_to_str(bssid);
2075 assoc_data = g_hash_table_lookup(assoc_reject_table, bssid_str);
2081 if (g_slist_length(assoc_data->reject_time_list) < 1) {
2086 /* Only events that occur within one hour are appened. */
2087 curr_time = time(NULL);
2088 timeinfo = localtime(&curr_time);
2089 timeinfo->tm_hour -= 1;
2091 assoc_count.ref_time = mktime(timeinfo);
2092 assoc_count.assoc_count = 0;
2094 g_slist_foreach(assoc_data->reject_time_list, count_assoc_reject, &assoc_count);
2097 return assoc_count.assoc_count;
2100 static int calculate_score_last_connected_bssid(bool is_last_connected)
2104 if (ins_settings.last_connected_bssid) {
2105 if (is_last_connected)
2106 score += ins_settings.last_connected_bssid_score;
2112 static int calculate_score_assoc_reject(uint16_t assoc_reject_cnt)
2116 if (ins_settings.assoc_reject)
2117 score -= (assoc_reject_cnt * ins_settings.assoc_reject_score);
2122 static int calculate_score_frequency(dbus_int16_t strength, dbus_uint16_t frequency)
2126 switch (ins_settings.preferred_freq_bssid) {
2127 case G_SUPPLICANT_INS_PREFERRED_FREQ_24GHZ:
2128 if ((frequency >= FREQ_RANGE_24GHZ_CHANNEL_1 &&
2129 frequency <= FREQ_RANGE_24GHZ_CHANNEL_14) &&
2130 (strength > ins_settings.signal_level3_24ghz))
2131 score += ins_settings.preferred_freq_bssid_score;
2134 case G_SUPPLICANT_INS_PREFERRED_FREQ_5GHZ:
2135 if ((frequency >= FREQ_RANGE_5GHZ_CHANNEL_32 &&
2136 frequency <= FREQ_RANGE_5GHZ_CHANNEL_165) &&
2137 (strength > ins_settings.signal_level3_5ghz))
2138 score += ins_settings.preferred_freq_bssid_score;
2148 static int calculate_score_strength(dbus_int16_t strength)
2152 if (ins_settings.signal_bssid)
2153 score += (((strength > -60) ? -60 : strength) + 85);
2158 static int calculate_score_est_throughput(dbus_uint32_t est_throughput)
2162 if (est_throughput >= 10000)
2163 score = est_throughput / 10000;
2171 static int calculate_score(bool is_last_connected, uint16_t assoc_reject_cnt,
2172 dbus_uint16_t frequency, dbus_int16_t strength,
2173 dbus_int16_t snr, dbus_uint32_t est_throughput)
2177 score += calculate_score_last_connected_bssid(is_last_connected);
2178 score += calculate_score_assoc_reject(assoc_reject_cnt);
2179 score += calculate_score_frequency(strength, frequency);
2180 score += calculate_score_strength(strength);
2182 score += calculate_score_est_throughput(est_throughput);
2188 static void update_bssid_list(gpointer key, gpointer value, gpointer user_data)
2190 struct g_supplicant_bss *bss = value;
2191 struct g_connman_bssids *bssids = NULL;
2192 struct update_bssid_data *bssid_data = (struct update_bssid_data *)user_data;
2194 bssids = (struct g_connman_bssids *)g_try_malloc0(sizeof(struct g_connman_bssids));
2197 memcpy(bssids->bssid, bss->bssid, WIFI_BSSID_LEN_MAX);
2199 bssids->strength = bss->signal;
2200 bssids->strength += 120;
2202 if (bssids->strength > 100)
2203 bssids->strength = 100;
2205 bssids->frequency = bss->frequency;
2206 bssids->score_snr = (int)bss->snr;
2208 #if defined TIZEN_EXT_INS
2209 bssids->assoc_reject_cnt = get_assoc_reject_cnt(bssid_data->assoc_reject_table, bssids->bssid);
2210 bssids->is_last_connected = compare_bssid(bssids->bssid, bssid_data->last_connected_bssid);
2212 bssids->score_last_connected_bssid = calculate_score_last_connected_bssid(bssids->is_last_connected);
2213 bssids->score_assoc_reject = calculate_score_assoc_reject(bssids->assoc_reject_cnt);
2214 bssids->score_frequency = calculate_score_frequency(bss->signal, bssids->frequency);
2215 bssids->score_strength = calculate_score_strength(bss->signal);
2216 bssids->score_est_throughput = calculate_score_est_throughput(bss->est_throughput);
2218 bssids->ins_score = calculate_score(bssids->is_last_connected,
2219 bssids->assoc_reject_cnt, bssids->frequency, bss->signal,
2220 bss->snr, bss->est_throughput);
2222 bssids->ins_score = bss->signal;
2224 bssid_data->bssid_list = g_slist_append(bssid_data->bssid_list, bssids);
2226 SUPPLICANT_DBG("Failed to allocate memory");
2229 static gint cmp_bss(gconstpointer a, gconstpointer b)
2231 struct g_connman_bssids *entry_a = (struct g_connman_bssids *)a;
2232 struct g_connman_bssids *entry_b = (struct g_connman_bssids *)b;
2234 if (entry_a->ins_score > entry_b->ins_score)
2237 if (entry_a->ins_score < entry_b->ins_score)
2240 if (entry_a->ins_score == entry_b->ins_score) {
2241 if (entry_a->strength >= entry_b->strength)
2250 #if defined TIZEN_EXT_INS
2251 static void print_bssid_sort(gpointer data, gpointer user_data)
2253 struct g_connman_bssids *bssids = data;
2255 GSupplicantNetwork *network = (GSupplicantNetwork *) user_data;
2257 if (!bssids || !network)
2260 SUPPLICANT_DBG("ssid [%-20s] bssid[" MACSTR "] total[%2d] freq[%2d] "
2261 "last_conn[%2d] assoc_reject[%2d] strength[%2d] rssi[%2d]",
2262 network->ssid, MAC2STR(bssids->bssid), bssids->ins_score,
2263 bssids->score_frequency, bssids->score_last_connected_bssid,
2264 bssids->score_assoc_reject, bssids->score_strength, bssids->strength - 120);
2268 void *g_supplicant_network_get_bssid_list(GSupplicantNetwork *network)
2270 struct update_bssid_data bssid_data;
2272 if (g_hash_table_size(network->bss_table) < 1)
2275 bssid_data.network = network;
2276 memset(&bssid_data, 0, sizeof(bssid_data));
2277 memcpy(bssid_data.last_connected_bssid, network->last_connected_bssid, WIFI_BSSID_LEN_MAX);
2278 bssid_data.assoc_reject_table = network->assoc_reject_table;
2280 g_hash_table_foreach(network->bss_table, update_bssid_list, &bssid_data);
2281 bssid_data.bssid_list = g_slist_sort(bssid_data.bssid_list, cmp_bss);
2282 #if defined TIZEN_EXT_INS
2283 g_slist_foreach(bssid_data.bssid_list, print_bssid_sort, (gpointer)network);
2286 return bssid_data.bssid_list;
2289 void g_supplicant_network_set_last_connected_bssid(GSupplicantNetwork *network, const unsigned char *bssid)
2294 if (!memcmp(bssid, invalid_bssid, WIFI_BSSID_LEN_MAX))
2297 memcpy(network->last_connected_bssid, bssid, WIFI_BSSID_LEN_MAX);
2299 SUPPLICANT_DBG("last connected bssid [" MACSTR "]", MAC2STR(bssid));
2302 const unsigned char *g_supplicant_network_get_last_connected_bssid(GSupplicantNetwork *network)
2304 if (network == NULL)
2307 return (const unsigned char *)network->last_connected_bssid;
2310 void g_supplicant_network_update_assoc_reject(GSupplicantInterface *interface,
2311 GSupplicantNetwork *network)
2313 struct assoc_reject_data *assoc_data;
2320 bssid_str = convert_bssid_to_str(interface->add_network_bssid);
2324 assoc_data = g_hash_table_lookup(network->assoc_reject_table, bssid_str);
2326 assoc_data = g_try_new0(struct assoc_reject_data, 1);
2332 assoc_data->bssid = g_strdup(bssid_str);
2333 g_hash_table_insert(network->assoc_reject_table, assoc_data->bssid, assoc_data);
2336 curr_time = time(NULL);
2337 assoc_data->reject_time_list = g_slist_append(assoc_data->reject_time_list, GINT_TO_POINTER(curr_time));
2339 SUPPLICANT_DBG("bssid [%s] time [%u]", bssid_str, curr_time);
2343 callback_network_changed(network, "UpdateAssocReject");
2346 GHashTable *g_supplicant_network_get_assoc_reject_table(GSupplicantNetwork *network)
2351 return network->assoc_reject_table;
2354 GSupplicantNetwork *g_supplicant_interface_get_network(GSupplicantInterface *interface,
2360 return g_hash_table_lookup(interface->network_table, group);
2363 static void copy_assoc_reject(gpointer key, gpointer value, gpointer user_data)
2365 struct assoc_reject_data *cloned_assoc_data;
2366 struct assoc_reject_data *assoc_data = value;
2367 GHashTable *cloned_assoc_reject_table = user_data;
2369 if (assoc_data && cloned_assoc_reject_table) {
2370 cloned_assoc_data = g_try_new0(struct assoc_reject_data, 1);
2371 if (!cloned_assoc_data)
2374 cloned_assoc_data->bssid = g_strdup(assoc_data->bssid);
2375 cloned_assoc_data->reject_time_list = g_slist_copy(assoc_data->reject_time_list);
2376 g_hash_table_insert(cloned_assoc_reject_table,
2377 cloned_assoc_data->bssid, cloned_assoc_data);
2381 GHashTable *g_supplicant_network_clone_assoc_reject_table(GSupplicantNetwork *network)
2383 GHashTable *cloned_assoc_reject_table;
2388 GHashTable *assoc_reject_table = g_supplicant_network_get_assoc_reject_table(network);
2389 if (!assoc_reject_table)
2392 cloned_assoc_reject_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2393 NULL, remove_assoc_data);
2394 g_hash_table_foreach(assoc_reject_table, copy_assoc_reject, cloned_assoc_reject_table);
2396 return cloned_assoc_reject_table;
2401 static void merge_network(GSupplicantNetwork *network)
2404 const char *ssid, *mode, *key_mgmt;
2405 #if defined TIZEN_EXT
2406 const char *isHS20AP;
2407 const char *eap, *identity, *phase2;
2409 unsigned int i, ssid_len;
2412 ssid = g_hash_table_lookup(network->config_table, "ssid");
2413 mode = g_hash_table_lookup(network->config_table, "mode");
2414 key_mgmt = g_hash_table_lookup(network->config_table, "key_mgmt");
2415 #if defined TIZEN_EXT
2416 isHS20AP = g_hash_table_lookup(network->config_table, "isHS20AP");
2417 eap = g_hash_table_lookup(network->config_table, "eap");
2418 identity = g_hash_table_lookup(network->config_table, "identity");
2419 phase2 = g_hash_table_lookup(network->config_table, "phase2");
2422 SUPPLICANT_DBG("ssid %s mode %s", ssid, mode);
2425 ssid_len = strlen(ssid);
2429 str = g_string_sized_new((ssid_len * 2) + 24);
2433 for (i = 0; i < ssid_len; i++)
2434 #if defined TIZEN_EXT
2438 g_string_append_printf(str, "%02x", ssid[i]);
2439 #if defined TIZEN_EXT
2443 if (g_strcmp0(mode, "0") == 0)
2444 g_string_append_printf(str, "_managed");
2445 else if (g_strcmp0(mode, "1") == 0)
2446 g_string_append_printf(str, "_adhoc");
2447 #if defined TIZEN_EXT_WIFI_MESH
2448 else if (g_strcmp0(mode, "5") == 0)
2449 g_string_append_printf(str, "_mesh");
2452 if (g_strcmp0(key_mgmt, "WPA-PSK") == 0)
2453 g_string_append_printf(str, "_psk");
2454 #if defined TIZEN_EXT
2455 else if (g_strcmp0(key_mgmt, "WPA-EAP") == 0)
2456 g_string_append_printf(str, "_ieee8021x");
2458 g_string_append_printf(str, "_none");
2461 group = g_string_free(str, FALSE);
2463 SUPPLICANT_DBG("%s", group);
2465 #if defined TIZEN_EXT
2466 if (g_strcmp0(isHS20AP, "1") == 0) {
2467 network->isHS20AP = 1;
2469 g_free(network->eap);
2470 network->eap = g_strdup(eap);
2472 if (network->identity)
2473 g_free(network->identity);
2474 network->identity = g_strdup(identity);
2476 if (network->phase2)
2477 g_free(network->phase2);
2478 network->phase2 = g_strdup(phase2);
2480 network->isHS20AP = 0;
2482 network->group = g_strdup(group);
2483 callback_network_merged(network);
2484 g_free(network->group);
2489 g_hash_table_destroy(network->config_table);
2491 g_free(network->path);
2495 static void network_property(const char *key, DBusMessageIter *iter,
2498 GSupplicantNetwork *network = user_data;
2500 if (!network->interface)
2504 merge_network(network);
2508 if (g_strcmp0(key, "Enabled") == 0) {
2509 dbus_bool_t enabled = FALSE;
2511 dbus_message_iter_get_basic(iter, &enabled);
2512 } else if (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_STRING) {
2513 const char *str = NULL;
2515 dbus_message_iter_get_basic(iter, &str);
2517 g_hash_table_replace(network->config_table,
2518 g_strdup(key), g_strdup(str));
2521 SUPPLICANT_DBG("key %s type %c",
2522 key, dbus_message_iter_get_arg_type(iter));
2525 static void interface_network_added(DBusMessageIter *iter, void *user_data)
2527 GSupplicantInterface *interface = user_data;
2528 GSupplicantNetwork *network;
2529 const char *path = NULL;
2533 dbus_message_iter_get_basic(iter, &path);
2537 if (g_strcmp0(path, "/") == 0)
2540 network = g_try_new0(GSupplicantNetwork, 1);
2544 network->interface = interface;
2545 network->path = g_strdup(path);
2547 network->config_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2550 dbus_message_iter_next(iter);
2551 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
2552 supplicant_dbus_property_foreach(iter, network_property,
2554 network_property(NULL, NULL, network);
2558 supplicant_dbus_property_get_all(path,
2559 SUPPLICANT_INTERFACE ".Network",
2560 network_property, network, NULL);
2563 static void interface_network_removed(DBusMessageIter *iter, void *user_data)
2568 static char *create_name(unsigned char *ssid, int ssid_len)
2571 const gchar *remainder, *invalid;
2572 int valid_bytes, remaining_bytes;
2574 if (ssid_len < 1 || ssid[0] == '\0')
2575 return g_strdup("");
2578 remainder = (const gchar *)ssid;
2579 remaining_bytes = ssid_len;
2581 while (remaining_bytes != 0) {
2582 if (g_utf8_validate(remainder, remaining_bytes,
2587 valid_bytes = invalid - remainder;
2590 string = g_string_sized_new(remaining_bytes);
2592 g_string_append_len(string, remainder, valid_bytes);
2594 /* append U+FFFD REPLACEMENT CHARACTER */
2595 g_string_append(string, "\357\277\275");
2597 remaining_bytes -= valid_bytes + 1;
2598 remainder = invalid + 1;
2602 return g_strndup((const gchar *)ssid, ssid_len + 1);
2604 g_string_append(string, remainder);
2606 return g_string_free(string, FALSE);
2609 static char *create_group(struct g_supplicant_bss *bss)
2613 const char *mode, *security;
2615 str = g_string_sized_new((bss->ssid_len * 2) + 24);
2619 if (bss->ssid_len > 0 && bss->ssid[0] != '\0') {
2620 for (i = 0; i < bss->ssid_len; i++)
2621 g_string_append_printf(str, "%02x", bss->ssid[i]);
2623 g_string_append_printf(str, "hidden");
2625 mode = mode2string(bss->mode);
2627 g_string_append_printf(str, "_%s", mode);
2629 #if defined TIZEN_EXT
2630 if (bss->security == G_SUPPLICANT_SECURITY_PSK_SHA256)
2633 security = security2string(bss->security);
2635 security = security2string(bss->security);
2638 g_string_append_printf(str, "_%s", security);
2640 return g_string_free(str, FALSE);
2642 #if defined TIZEN_EXT
2643 static void update_network_with_best_bss(GSupplicantNetwork *network,
2644 struct g_supplicant_bss *best_bss)
2647 * Do not change best BSS if we are connected.
2649 if (network->interface->state == G_SUPPLICANT_STATE_COMPLETED)
2652 network->signal = best_bss->signal;
2653 network->frequency = best_bss->frequency;
2654 network->best_bss = best_bss;
2657 static bool update_best_bss(GSupplicantNetwork *network,
2658 struct g_supplicant_bss *bss, struct g_supplicant_bss *best_bss)
2663 if (network->best_bss == NULL) {
2664 update_network_with_best_bss(network, bss);
2668 #if defined TIZEN_EXT_INS
2669 score_new = calculate_score(
2670 compare_bssid(bss->bssid, network->last_connected_bssid),
2671 get_assoc_reject_cnt(network->assoc_reject_table, bss->bssid),
2672 bss->frequency, bss->signal, bss->snr, bss->est_throughput);
2674 score_best = calculate_score(
2675 compare_bssid(network->best_bss->bssid, network->last_connected_bssid),
2676 get_assoc_reject_cnt(network->assoc_reject_table, network->best_bss->bssid),
2677 network->best_bss->frequency, network->best_bss->signal,
2678 network->best_bss->snr, network->best_bss->est_throughput);
2680 score_new = bss->signal;
2681 score_best = network->best_bss->signal;
2684 if (score_new > score_best) {
2685 SUPPLICANT_DBG("new[" MACSTR "][%d] : best[" MACSTR "][%d]",
2686 MAC2STR(bss->bssid), score_new,
2687 MAC2STR(network->best_bss->bssid), score_best);
2689 update_network_with_best_bss(network, bss);
2691 SUPPLICANT_DBG("Update best BSS for %s", network->name);
2699 static int add_or_replace_bss_to_network(struct g_supplicant_bss *bss)
2701 GSupplicantInterface *interface = bss->interface;
2702 GSupplicantNetwork *network;
2704 bool is_new_network;
2706 group = create_group(bss);
2707 SUPPLICANT_DBG("New group created: %s", group);
2712 network = g_hash_table_lookup(interface->network_table, group);
2715 SUPPLICANT_DBG("Network %s already exist", network->name);
2716 is_new_network = false;
2721 is_new_network = true;
2723 network = g_try_new0(GSupplicantNetwork, 1);
2729 network->interface = interface;
2731 network->path = g_strdup(bss->path);
2732 network->group = group;
2733 network->name = create_name(bss->ssid, bss->ssid_len);
2734 network->mode = bss->mode;
2735 network->security = bss->security;
2736 network->ssid_len = bss->ssid_len;
2737 memcpy(network->ssid, bss->ssid, bss->ssid_len);
2738 network->signal = bss->signal;
2739 network->frequency = bss->frequency;
2740 network->best_bss = bss;
2742 if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
2743 network->wps = TRUE;
2744 network->wps_capabilities = bss->wps_capabilities;
2747 #if defined TIZEN_EXT
2748 network->owe_transition_mode = bss->owe_transition_mode;
2749 network->privacy = bss->privacy;
2750 memcpy(network->transition_mode_ssid, bss->transition_mode_ssid, bss->transition_mode_ssid_len);
2751 memcpy(network->transition_mode_bssid, bss->transition_mode_bssid, WIFI_BSSID_LEN_MAX);
2753 network->keymgmt = bss->keymgmt;
2755 if (g_slist_length(bss->vsie_list) > 0) {
2756 GSList *list = NULL;
2757 unsigned char *vsie = NULL;
2758 for (list = bss->vsie_list; list; list = list->next) {
2759 unsigned char *ie = (unsigned char *)list->data;
2760 vsie = (unsigned char *)g_try_malloc0(ie[1]+2); // tag number size(1), tag length size(1)
2763 memcpy(vsie, ie, ie[1]+2);
2764 network->vsie_list = g_slist_append(network->vsie_list, vsie);
2766 SUPPLICANT_DBG("Failed to allocate memory.");
2770 network->isHS20AP = bss->hs20;
2771 memcpy(network->country_code, bss->country_code, COUNTRY_CODE_LENGTH);
2772 network->phy_mode = bss->phy_mode;
2775 SUPPLICANT_DBG("New network %s created", network->name);
2777 network->bss_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2780 network->config_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2783 #if defined TIZEN_EXT
2784 network->assoc_reject_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2785 NULL, remove_assoc_data);
2788 g_hash_table_replace(interface->network_table,
2789 network->group, network);
2791 callback_network_added(network);
2794 /* We update network's WPS properties if only bss provides WPS. */
2795 if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
2796 network->wps = TRUE;
2797 network->wps_capabilities = bss->wps_capabilities;
2799 if (!is_new_network)
2800 callback_network_changed(network, "WPSCapabilities");
2804 * Do not change best BSS if we are connected. It will be done through
2805 * CurrentBSS property in case of misalignment with wpa_s or roaming.
2807 #if defined TIZEN_EXT
2808 if (network != interface->current_network) {
2809 if (update_best_bss(network, bss, network->best_bss))
2810 callback_network_changed(network, "Signal");
2813 if (network != interface->current_network &&
2814 bss->signal > network->signal) {
2815 network->signal = bss->signal;
2816 network->best_bss = bss;
2817 callback_network_changed(network, "Signal");
2821 g_hash_table_replace(interface->bss_mapping, bss->path, network);
2822 g_hash_table_replace(network->bss_table, bss->path, bss);
2824 g_hash_table_replace(bss_mapping, bss->path, interface);
2829 static void bss_rates(DBusMessageIter *iter, void *user_data)
2831 struct g_supplicant_bss *bss = user_data;
2832 dbus_uint32_t rate = 0;
2834 dbus_message_iter_get_basic(iter, &rate);
2838 if (rate > bss->maxrate)
2839 bss->maxrate = rate;
2842 static void bss_keymgmt(DBusMessageIter *iter, void *user_data)
2844 unsigned int *keymgmt = user_data;
2845 const char *str = NULL;
2848 dbus_message_iter_get_basic(iter, &str);
2852 for (i = 0; keymgmt_map[i].str; i++)
2853 if (strcmp(str, keymgmt_map[i].str) == 0) {
2854 SUPPLICANT_DBG("Keymgmt: %s", str);
2855 *keymgmt |= keymgmt_map[i].val;
2860 static void bss_group(DBusMessageIter *iter, void *user_data)
2862 unsigned int *group = user_data;
2863 const char *str = NULL;
2866 dbus_message_iter_get_basic(iter, &str);
2870 for (i = 0; group_map[i].str; i++)
2871 if (strcmp(str, group_map[i].str) == 0) {
2872 SUPPLICANT_DBG("Group: %s", str);
2873 *group |= group_map[i].val;
2878 static void bss_pairwise(DBusMessageIter *iter, void *user_data)
2880 unsigned int *pairwise = user_data;
2881 const char *str = NULL;
2884 dbus_message_iter_get_basic(iter, &str);
2888 for (i = 0; pairwise_map[i].str; i++)
2889 if (strcmp(str, pairwise_map[i].str) == 0) {
2890 SUPPLICANT_DBG("Pairwise: %s", str);
2891 *pairwise |= pairwise_map[i].val;
2896 static void bss_wpa(const char *key, DBusMessageIter *iter,
2899 struct g_supplicant_bss *bss = user_data;
2900 unsigned int value = 0;
2902 SUPPLICANT_DBG("Key: %s", key);
2904 if (g_strcmp0(key, "KeyMgmt") == 0) {
2905 supplicant_dbus_array_foreach(iter, bss_keymgmt, &value);
2907 if (bss->rsn_selected)
2908 bss->rsn_keymgmt = value;
2910 bss->wpa_keymgmt = value;
2911 } else if (g_strcmp0(key, "Group") == 0) {
2912 supplicant_dbus_array_foreach(iter, bss_group, &value);
2914 if (bss->rsn_selected)
2915 bss->rsn_group = value;
2917 bss->wpa_group = value;
2918 } else if (g_strcmp0(key, "Pairwise") == 0) {
2919 supplicant_dbus_array_foreach(iter, bss_pairwise, &value);
2921 if (bss->rsn_selected)
2922 bss->rsn_pairwise = value;
2924 bss->wpa_pairwise = value;
2928 static unsigned int get_tlv(unsigned char *ie, unsigned int ie_size,
2931 unsigned int len = 0;
2933 while (len + 4 < ie_size) {
2934 unsigned int hi = ie[len];
2935 unsigned int lo = ie[len + 1];
2936 unsigned int tmp_type = (hi << 8) + lo;
2937 unsigned int v_len = 0;
2939 /* hi and lo are used to recreate an unsigned int
2940 * based on 2 8bits length unsigned int. */
2944 v_len = (hi << 8) + lo;
2946 if (tmp_type == type) {
2947 unsigned int ret_value = 0;
2948 unsigned char *value = (unsigned char *)&ret_value;
2950 SUPPLICANT_DBG("IE: match type 0x%x", type);
2952 /* Verifying length relevance */
2953 if (v_len > sizeof(unsigned int) ||
2954 len + 4 + v_len > ie_size)
2957 memcpy(value, ie + len + 4, v_len);
2959 SUPPLICANT_DBG("returning 0x%x", ret_value);
2966 SUPPLICANT_DBG("returning 0");
2970 #if defined TIZEN_EXT
2971 static void get_bss_phy_mode(unsigned int max_rate,
2972 unsigned int max_ext_rate, bool ht, bool vht, void *data)
2974 struct g_supplicant_bss *bss = data;
2975 unsigned int freq = bss->frequency;
2977 /* Following conditions are used to determine
2978 * IEEE 802.11 Protocol Modes:-
2980 * 1. If “Supported rates” is only till 11 Mbps,
2981 * and frequency is in 2.4GHz band, then protocol is 11B.
2982 * 2. If “Supported rates” is till 54Mbps or
2983 * “Extended supported rates” are present,
2984 * and frequency is in 2.4GHz band, then protocol is 11G.
2985 * 3. If “Supported rates” is only till 54 Mbps,
2986 * frequency is in 5GHz band , then protocol is 11A.
2987 * 4. If “HT capabilities” is supported , then protocol is 11N.
2988 * 5. If “HT capabilities” & “VHT” is supported and
2989 * frequency is in 5 GHz band, then protocol is 11AC.
2992 if (freq >= 2412 && freq <= 2484) { /* 2.4 Ghz Band */
2993 if (max_rate <= 11 && max_ext_rate <= 0 && !ht)
2994 bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211B;
2995 else if ((max_rate <= 54 || max_ext_rate > 0) && !ht)
2996 bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211BG;
2997 else if ((max_rate >= 54 || max_ext_rate > 0) && ht)
2998 bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211BGN;
3000 bss->phy_mode = G_SUPPLICANT_MODE_UNKNOWN;
3001 } else if (freq >= 5180 && freq <= 5825) { /* 5 Ghz Band */
3002 if (max_rate <= 54 && !ht)
3003 bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211A;
3004 else if ((max_rate >= 54 || max_ext_rate > 0) && ht && !vht)
3005 bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211AN;
3006 else if ((max_rate >= 54 || max_ext_rate > 0) && ht && vht)
3007 bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211ANAC;
3009 bss->phy_mode = G_SUPPLICANT_MODE_UNKNOWN;
3014 static void bss_process_ies(DBusMessageIter *iter, void *user_data)
3016 struct g_supplicant_bss *bss = user_data;
3017 const unsigned char WPS_OUI[] = { 0x00, 0x50, 0xf2, 0x04 };
3018 unsigned char *ie, *ie_end;
3019 DBusMessageIter array;
3022 #if defined TIZEN_EXT
3023 const unsigned char OWE_WFA_OUI[] = { 0x50, 0x6f, 0x9a, 0x1c };
3025 unsigned char *rates = NULL;
3026 unsigned char *ext_rates = NULL;
3027 unsigned int max_rate = 0;
3028 unsigned int max_ext_rate = 0;
3029 unsigned int offset = 0;
3034 #define WMM_WPA1_WPS_INFO 221
3035 #define WPS_INFO_MIN_LEN 6
3036 #define WPS_VERSION_TLV 0x104A
3037 #define WPS_STATE_TLV 0x1044
3038 #define WPS_METHODS_TLV 0x1012
3039 #define WPS_REGISTRAR_TLV 0x1041
3040 #define WPS_VERSION 0x10
3041 #define WPS_PBC 0x04
3042 #define WPS_PIN 0x00
3043 #define WPS_CONFIGURED 0x02
3044 #if defined TIZEN_EXT
3045 #define VENDOR_SPECIFIC_INFO 0xDD
3046 #define WLAN_EID_COUNTRY 7
3047 #define WLAN_EID_RSN_INFO 48
3048 #define RSN_CAPABILITY_MFP_REQ (1 << 6)
3051 dbus_message_iter_recurse(iter, &array);
3052 dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
3054 if (!ie || ie_len < 2)
3057 bss->wps_capabilities = 0;
3060 for (ie_end = ie + ie_len; ie < ie_end && ie + ie[1] + 1 <= ie_end;
3062 #if defined TIZEN_EXT
3063 unsigned char *vsie;
3066 if (ie[0] == VENDOR_SPECIFIC_INFO && memcmp(ie+2, OWE_WFA_OUI, sizeof(OWE_WFA_OUI)) == 0) {
3067 SUPPLICANT_DBG("IE: match vendor specific data : OWE Transition Mode");
3070 Tag: Vendor Specific: Wi-Fi Alliance: OWE Transition Mode
3071 Tag Number: Vendor Specific (221) -> ie[0]
3072 Tag length: 26 -> ie[1]
3073 OUI: 50:6f:9a (Wi-Fi Alliance) -> ie[2]
3074 Vendor Specific OUI Type: 28 -> ie[5]
3075 BSSID: 92:fd:f0:20:2b:09 -> ie[6]
3076 SSID length: 15 -> ie[12]
3077 SSID: Wi-Fi-5.2.3-owe -> ie[13]
3079 0000 dd 1a 50 6f 9a 1c 92 fd f0 20 2b 09 0f 57 69 2d ..Po..... +..Wi-
3080 0010 46 69 2d 35 2e 32 2e 33 2d 6f 77 65 Fi-5.2.3-owe
3083 bss->owe_transition_mode = TRUE;
3084 if (ie[1] >= 11) { // Tag length is at least up to ssid length position.
3085 memcpy(bss->transition_mode_bssid, ie+6, WIFI_BSSID_LEN_MAX);
3086 if (ie[12] > 0 && ie[12] < 32) {
3087 memcpy(bss->transition_mode_ssid, ie+13, ie[12]);
3088 bss->transition_mode_ssid_len = ie[12];
3090 bss->transition_mode_ssid_len = 0;
3092 bss->owe_transition_mode = FALSE;
3096 if (ie[0] == VENDOR_SPECIFIC_INFO && memcmp(ie+2, WPS_OUI, sizeof(WPS_OUI)) != 0) {
3098 if (!simplified_log)
3099 SUPPLICANT_DBG("IE: match vendor specific data");
3101 vsie_len = ie[1]+2; // tag number size(1), tag length size(1)
3102 vsie = (unsigned char *)g_try_malloc0(vsie_len);
3105 memcpy(vsie, ie, vsie_len);
3106 bss->vsie_list = g_slist_append(bss->vsie_list, vsie);
3108 SUPPLICANT_DBG("Failed to allocate memory");
3112 if (ie[0] == WLAN_EID_COUNTRY && ie[1] >= 2) {
3113 /* Add country code only if it is a valid alphabet */
3114 if (ie[2] >= 65 && ie[2] <= 90 && ie[3] >= 65 && ie[3] <= 90) {
3115 memcpy(bss->country_code, ie+2, COUNTRY_CODE_LENGTH);
3120 if (ie[0] == WLAN_EID_HT_CAP && ie[1]) {
3125 if (ie[0] == WLAN_EID_VHT_CAP && ie[1]) {
3130 if (ie[0] == WLAN_EID_SUPP_RATES && ie[1]) {
3132 rates = g_malloc0(r_len);
3136 for (j = 0; ie && j < r_len; j++) {
3137 rates[j] = ((ie[j + 2] & 0x7f) * 500000)/1000000;
3138 if (max_rate < rates[j])
3139 max_rate = rates[j];
3144 if (ie[0] == WLAN_EID_EXT_SUPP_RATES && ie[1] > 0) {
3146 ext_rates = g_malloc0(r_len);
3150 for (j = 0; ie && j < r_len; j++) {
3151 ext_rates[j] = ((ie[j + 2] & 0x7f) * 500000)/1000000;
3152 if (max_ext_rate < ext_rates[j])
3153 max_ext_rate = ext_rates[j];
3158 if (ie[0] == WLAN_EID_RSN_INFO && ie[1] >= 20) {
3160 offset = 10 + ie[8] * 4;
3161 offset += ie[offset] * 4 + 2;
3163 if (offset <= r_len + 1 &&
3164 (ie[offset] & RSN_CAPABILITY_MFP_REQ) != 0)
3165 bss->pmf_required = TRUE;
3170 if (ie[0] != WMM_WPA1_WPS_INFO || ie[1] < WPS_INFO_MIN_LEN ||
3171 memcmp(ie+2, WPS_OUI, sizeof(WPS_OUI)) != 0)
3174 SUPPLICANT_DBG("IE: match WPS_OUI");
3176 value = get_tlv(&ie[6], ie[1], WPS_STATE_TLV);
3177 if (get_tlv(&ie[6], ie[1], WPS_VERSION_TLV) == WPS_VERSION &&
3179 bss->keymgmt |= G_SUPPLICANT_KEYMGMT_WPS;
3181 if (value == WPS_CONFIGURED)
3182 bss->wps_capabilities |=
3183 G_SUPPLICANT_WPS_CONFIGURED;
3186 value = get_tlv(&ie[6], ie[1], WPS_METHODS_TLV);
3188 if (GUINT16_FROM_BE(value) == WPS_PBC)
3189 bss->wps_capabilities |= G_SUPPLICANT_WPS_PBC;
3190 if (GUINT16_FROM_BE(value) == WPS_PIN)
3191 bss->wps_capabilities |= G_SUPPLICANT_WPS_PIN;
3193 bss->wps_capabilities |=
3194 G_SUPPLICANT_WPS_PBC | G_SUPPLICANT_WPS_PIN;
3196 /* If the AP sends this it means it's advertizing
3197 * as a registrar and the WPS process is launched
3199 if (get_tlv(&ie[6], ie[1], WPS_REGISTRAR_TLV) != 0)
3200 bss->wps_capabilities |= G_SUPPLICANT_WPS_REGISTRAR;
3202 SUPPLICANT_DBG("WPS Methods 0x%x", bss->wps_capabilities);
3205 get_bss_phy_mode(max_rate, max_ext_rate, ht, vht, user_data);
3213 static void bss_compute_security(struct g_supplicant_bss *bss)
3216 * Combining RSN and WPA keymgmt
3217 * We combine it since parsing IEs might have set something for WPS. */
3218 bss->keymgmt |= bss->rsn_keymgmt | bss->wpa_keymgmt;
3220 bss->ieee8021x = FALSE;
3222 #if defined TIZEN_EXT
3223 bss->ft_ieee8021x = FALSE;
3224 bss->ft_psk = FALSE;
3227 #if defined TIZEN_EXT
3229 (G_SUPPLICANT_KEYMGMT_WPA_EAP |
3230 G_SUPPLICANT_KEYMGMT_WPA_EAP_256))
3231 bss->ieee8021x = TRUE;
3232 else if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_EAP)
3233 bss->ft_ieee8021x = TRUE;
3236 (G_SUPPLICANT_KEYMGMT_WPA_EAP |
3237 G_SUPPLICANT_KEYMGMT_WPA_FT_EAP |
3238 G_SUPPLICANT_KEYMGMT_WPA_EAP_256))
3239 bss->ieee8021x = TRUE;
3242 #if defined TIZEN_EXT
3244 G_SUPPLICANT_KEYMGMT_WPA_PSK_256) {
3245 bss->psk_sha256 = TRUE;
3249 (G_SUPPLICANT_KEYMGMT_WPA_PSK |
3250 G_SUPPLICANT_KEYMGMT_WPA_PSK_256))
3252 else if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_PSK)
3256 (G_SUPPLICANT_KEYMGMT_WPA_PSK |
3257 G_SUPPLICANT_KEYMGMT_WPA_FT_PSK |
3258 G_SUPPLICANT_KEYMGMT_WPA_PSK_256))
3262 #if defined TIZEN_EXT
3263 if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_SAE |
3264 bss->keymgmt & G_SUPPLICANT_KEYMGMT_FT_SAE)
3266 if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_OWE)
3268 if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_DPP)
3273 bss->security = G_SUPPLICANT_SECURITY_IEEE8021X;
3274 #if defined TIZEN_EXT
3275 else if (bss->ft_ieee8021x)
3276 bss->security = G_SUPPLICANT_SECURITY_IEEE8021X;
3278 bss->security = G_SUPPLICANT_SECURITY_SAE;
3279 else if (bss->psk_sha256)
3280 bss->security = G_SUPPLICANT_SECURITY_PSK_SHA256;
3283 bss->security = G_SUPPLICANT_SECURITY_PSK;
3284 #if defined TIZEN_EXT
3285 else if (bss->ft_psk)
3286 bss->security = G_SUPPLICANT_SECURITY_FT_PSK;
3287 else if (bss->owe || bss->owe_transition_mode)
3288 bss->security = G_SUPPLICANT_SECURITY_OWE;
3290 bss->security = G_SUPPLICANT_SECURITY_DPP;
3292 else if (bss->privacy)
3293 bss->security = G_SUPPLICANT_SECURITY_WEP;
3295 bss->security = G_SUPPLICANT_SECURITY_NONE;
3299 static void bss_property(const char *key, DBusMessageIter *iter,
3302 struct g_supplicant_bss *bss = user_data;
3304 if (!bss->interface)
3306 #if defined TIZEN_EXT
3307 if (!simplified_log)
3309 SUPPLICANT_DBG("key %s", key);
3314 if (g_strcmp0(key, "BSSID") == 0) {
3315 DBusMessageIter array;
3316 unsigned char *addr;
3319 dbus_message_iter_recurse(iter, &array);
3320 dbus_message_iter_get_fixed_array(&array, &addr, &addr_len);
3323 memcpy(bss->bssid, addr, addr_len);
3324 } else if (g_strcmp0(key, "SSID") == 0) {
3325 DBusMessageIter array;
3326 unsigned char *ssid;
3329 dbus_message_iter_recurse(iter, &array);
3330 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
3332 if (ssid_len > 0 && ssid_len < 33) {
3333 memcpy(bss->ssid, ssid, ssid_len);
3334 bss->ssid_len = ssid_len;
3336 memset(bss->ssid, 0, sizeof(bss->ssid));
3339 } else if (g_strcmp0(key, "Capabilities") == 0) {
3340 dbus_uint16_t capabilities = 0x0000;
3342 dbus_message_iter_get_basic(iter, &capabilities);
3344 if (capabilities & IEEE80211_CAP_ESS)
3345 bss->mode = G_SUPPLICANT_MODE_INFRA;
3346 else if (capabilities & IEEE80211_CAP_IBSS)
3347 bss->mode = G_SUPPLICANT_MODE_IBSS;
3349 if (capabilities & IEEE80211_CAP_PRIVACY)
3350 bss->privacy = TRUE;
3351 } else if (g_strcmp0(key, "Mode") == 0) {
3352 const char *mode = NULL;
3354 dbus_message_iter_get_basic(iter, &mode);
3355 bss->mode = string2mode(mode);
3356 } else if (g_strcmp0(key, "Frequency") == 0) {
3357 dbus_uint16_t frequency = 0;
3359 dbus_message_iter_get_basic(iter, &frequency);
3360 bss->frequency = frequency;
3361 } else if (g_strcmp0(key, "Signal") == 0) {
3362 dbus_int16_t signal = 0;
3364 dbus_message_iter_get_basic(iter, &signal);
3366 bss->signal = signal;
3368 bss->signal = BSS_UNKNOWN_STRENGTH;
3370 } else if (g_strcmp0(key, "Level") == 0) {
3371 dbus_int32_t level = 0;
3373 dbus_message_iter_get_basic(iter, &level);
3374 } else if (g_strcmp0(key, "Rates") == 0) {
3375 supplicant_dbus_array_foreach(iter, bss_rates, bss);
3376 } else if (g_strcmp0(key, "MaxRate") == 0) {
3377 dbus_uint32_t maxrate = 0;
3379 dbus_message_iter_get_basic(iter, &maxrate);
3381 bss->maxrate = maxrate;
3382 } else if (g_strcmp0(key, "Privacy") == 0) {
3383 dbus_bool_t privacy = FALSE;
3385 dbus_message_iter_get_basic(iter, &privacy);
3386 bss->privacy = privacy;
3387 } else if (g_strcmp0(key, "RSN") == 0) {
3388 bss->rsn_selected = TRUE;
3390 supplicant_dbus_property_foreach(iter, bss_wpa, bss);
3391 } else if (g_strcmp0(key, "WPA") == 0) {
3392 bss->rsn_selected = FALSE;
3394 supplicant_dbus_property_foreach(iter, bss_wpa, bss);
3395 #if defined TIZEN_EXT
3396 } else if (g_strcmp0(key, "HS20") == 0) {
3397 dbus_bool_t hs20 = FALSE;
3398 dbus_message_iter_get_basic(iter, &hs20);
3400 } else if (g_strcmp0(key, "SNR") == 0) {
3401 dbus_int16_t snr = 0;
3403 dbus_message_iter_get_basic(iter, &snr);
3405 } else if (g_strcmp0(key, "EstThroughput") == 0) {
3406 dbus_uint32_t est_throughput = 0;
3408 dbus_message_iter_get_basic(iter, &est_throughput);
3409 if (est_throughput != 0)
3410 bss->est_throughput = est_throughput;
3412 } else if (g_strcmp0(key, "IEs") == 0)
3413 bss_process_ies(iter, bss);
3415 SUPPLICANT_DBG("key %s type %c",
3416 key, dbus_message_iter_get_arg_type(iter));
3419 static struct g_supplicant_bss *interface_bss_added(DBusMessageIter *iter,
3422 GSupplicantInterface *interface = user_data;
3423 GSupplicantNetwork *network;
3424 struct g_supplicant_bss *bss;
3425 const char *path = NULL;
3426 #if defined TIZEN_EXT
3427 if (!simplified_log)
3431 dbus_message_iter_get_basic(iter, &path);
3435 if (g_strcmp0(path, "/") == 0)
3437 #if defined TIZEN_EXT
3438 if (!simplified_log)
3440 SUPPLICANT_DBG("%s", path);
3442 network = g_hash_table_lookup(interface->bss_mapping, path);
3444 bss = g_hash_table_lookup(network->bss_table, path);
3449 bss = g_try_new0(struct g_supplicant_bss, 1);
3453 bss->interface = interface;
3454 bss->path = g_strdup(path);
3455 bss->signal = BSS_UNKNOWN_STRENGTH;
3460 static void interface_bss_added_with_keys(DBusMessageIter *iter,
3463 struct g_supplicant_bss *bss;
3464 #if defined TIZEN_EXT
3465 if (!simplified_log)
3469 bss = interface_bss_added(iter, user_data);
3473 dbus_message_iter_next(iter);
3475 if (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_INVALID)
3476 #if defined TIZEN_EXT
3486 supplicant_dbus_property_foreach(iter, bss_property, bss);
3488 bss_compute_security(bss);
3489 if (add_or_replace_bss_to_network(bss) < 0)
3490 SUPPLICANT_DBG("add_or_replace_bss_to_network failed");
3493 static void interface_bss_added_without_keys(DBusMessageIter *iter,
3496 struct g_supplicant_bss *bss;
3497 #if defined TIZEN_EXT
3498 if (!simplified_log)
3502 bss = interface_bss_added(iter, user_data);
3506 supplicant_dbus_property_get_all(bss->path,
3507 SUPPLICANT_INTERFACE ".BSS",
3508 bss_property, bss, bss);
3510 bss_compute_security(bss);
3511 if (add_or_replace_bss_to_network(bss) < 0)
3512 SUPPLICANT_DBG("add_or_replace_bss_to_network failed");
3515 static void update_signal(gpointer key, gpointer value,
3518 struct g_supplicant_bss *bss = value;
3519 GSupplicantNetwork *network = user_data;
3521 #if defined TIZEN_EXT
3522 if (!network->best_bss || (network->best_bss == bss)) {
3523 if (bss->signal > network->signal) {
3524 network->signal = bss->signal;
3525 network->best_bss = bss;
3530 update_best_bss(network, bss, network->best_bss);
3532 if (bss->signal > network->signal) {
3533 network->signal = bss->signal;
3534 network->best_bss = bss;
3539 static void update_network_signal(GSupplicantNetwork *network)
3541 if (g_hash_table_size(network->bss_table) <= 1 && network->best_bss)
3544 g_hash_table_foreach(network->bss_table,
3545 update_signal, network);
3547 SUPPLICANT_DBG("New network signal %d", network->signal);
3550 #if defined TIZEN_EXT
3551 static gboolean last_connected_timeout(gpointer data)
3553 GSupplicantInterface *interface = data;
3554 GSupplicantNetwork *current_network = interface->current_network;
3556 SUPPLICANT_DBG("Timeout last connected bss");
3558 if (current_network && current_network->best_bss) {
3559 if (compare_bssid(current_network->best_bss->bssid, interface->connected_bssid)) {
3560 g_supplicant_network_set_last_connected_bssid(current_network, interface->connected_bssid);
3561 callback_network_changed(current_network, "LastConnectedBSSID");
3565 last_connected_bss_timeout = 0;
3569 static void add_timer_for_last_connected(GSupplicantInterface *interface)
3571 GSupplicantNetwork *current_network = interface->current_network;
3573 if (interface->state == G_SUPPLICANT_STATE_COMPLETED) {
3574 if (current_network) {
3575 struct g_supplicant_bss *best_bss = current_network->best_bss;
3577 memcpy(interface->connected_bssid, best_bss->bssid, WIFI_BSSID_LEN_MAX);
3579 if (last_connected_bss_timeout)
3580 g_source_remove(last_connected_bss_timeout);
3582 last_connected_bss_timeout = g_timeout_add_seconds(LAST_CONNECTED_TIMEOUT,
3583 last_connected_timeout, interface);
3585 SUPPLICANT_DBG("Add timer for last connected bssid [" MACSTR "]",
3586 MAC2STR(best_bss->bssid));
3591 static void remove_timer_for_last_connected(GSupplicantInterface *interface)
3593 if (interface->state == G_SUPPLICANT_STATE_DISCONNECTED) {
3594 if (last_connected_bss_timeout != 0) {
3595 g_source_remove(last_connected_bss_timeout);
3596 last_connected_bss_timeout = 0;
3597 SUPPLICANT_DBG("Remove timer for last connected bss");
3603 static void interface_current_bss(GSupplicantInterface *interface,
3604 DBusMessageIter *iter)
3606 GSupplicantNetwork *network;
3607 struct g_supplicant_bss *bss;
3609 #if defined TIZEN_EXT
3610 char bssid_buff1[WIFI_BSSID_STR_LEN] = {0,};
3611 char bssid_buff2[WIFI_BSSID_STR_LEN] = {0,};
3612 char *bssid_str1 = bssid_buff1;
3613 char *bssid_str2 = bssid_buff2;
3614 gboolean update = FALSE;
3617 dbus_message_iter_get_basic(iter, &path);
3618 if (g_strcmp0(path, "/") == 0) {
3619 interface->current_network = NULL;
3623 interface_bss_added_without_keys(iter, interface);
3625 network = g_hash_table_lookup(interface->bss_mapping, path);
3629 bss = g_hash_table_lookup(network->bss_table, path);
3633 interface->current_network = network;
3634 #if defined TIZEN_EXT
3635 snprintf(bssid_str1, WIFI_BSSID_STR_LEN, MACSTR, MAC2STR(bss->bssid));
3636 snprintf(bssid_str2, WIFI_BSSID_STR_LEN, MACSTR, MAC2STR(network->best_bss->bssid));
3638 SUPPLICANT_DBG("current network [%p], Passed bss %s, best bss %s",
3639 interface->current_network, bssid_str1, bssid_str2);
3641 if (network->frequency != bss->frequency) {
3642 network->frequency = bss->frequency;
3647 if (bss != network->best_bss) {
3649 * This is the case where either wpa_s got associated
3650 * to a BSS different than the one ConnMan considers
3651 * the best, or we are roaming.
3653 SUPPLICANT_DBG("Update best BSS for %s", network->name);
3655 network->best_bss = bss;
3657 if (network->signal != bss->signal) {
3658 SUPPLICANT_DBG("New network signal %d dBm",
3661 network->signal = bss->signal;
3662 callback_network_changed(network, "Signal");
3663 #if defined TIZEN_EXT
3671 #if defined TIZEN_EXT
3673 callback_network_changed(network, "");
3677 * wpa_s could notify about CurrentBSS in any state once
3678 * it got associated. It is not sure such notification will
3679 * arrive together with transition to ASSOCIATED state.
3680 * In fact, for networks with security WEP or OPEN, it
3681 * always arrives together with transition to COMPLETED.
3683 switch (interface->state) {
3684 case G_SUPPLICANT_STATE_UNKNOWN:
3685 case G_SUPPLICANT_STATE_DISABLED:
3686 case G_SUPPLICANT_STATE_DISCONNECTED:
3687 case G_SUPPLICANT_STATE_INACTIVE:
3688 case G_SUPPLICANT_STATE_SCANNING:
3689 case G_SUPPLICANT_STATE_AUTHENTICATING:
3690 case G_SUPPLICANT_STATE_ASSOCIATING:
3692 case G_SUPPLICANT_STATE_ASSOCIATED:
3693 case G_SUPPLICANT_STATE_4WAY_HANDSHAKE:
3694 case G_SUPPLICANT_STATE_GROUP_HANDSHAKE:
3695 case G_SUPPLICANT_STATE_COMPLETED:
3696 callback_network_associated(network);
3697 #if defined TIZEN_EXT
3698 add_timer_for_last_connected(interface);
3704 static void interface_bss_removed(DBusMessageIter *iter, void *user_data)
3706 GSupplicantInterface *interface = user_data;
3707 GSupplicantNetwork *network;
3708 struct g_supplicant_bss *bss = NULL;
3709 const char *path = NULL;
3710 bool is_current_network_bss = false;
3712 dbus_message_iter_get_basic(iter, &path);
3716 network = g_hash_table_lookup(interface->bss_mapping, path);
3720 bss = g_hash_table_lookup(network->bss_table, path);
3721 if (network->best_bss == bss) {
3722 network->best_bss = NULL;
3723 network->signal = BSS_UNKNOWN_STRENGTH;
3724 is_current_network_bss = true;
3727 g_hash_table_remove(bss_mapping, path);
3729 g_hash_table_remove(interface->bss_mapping, path);
3730 g_hash_table_remove(network->bss_table, path);
3732 update_network_signal(network);
3734 if (g_hash_table_size(network->bss_table) == 0) {
3735 g_hash_table_remove(interface->network_table, network->group);
3737 if (is_current_network_bss && network->best_bss)
3738 #if defined TIZEN_EXT
3739 callback_network_changed(network, "CheckMultiBssidConnect");
3741 callback_network_changed(network, "");
3746 static void set_config_methods(DBusMessageIter *iter, void *user_data)
3748 dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, user_data);
3751 static void wps_property(const char *key, DBusMessageIter *iter,
3754 GSupplicantInterface *interface = user_data;
3758 #if defined TIZEN_EXT
3759 if (!simplified_log)
3761 SUPPLICANT_DBG("key: %s", key);
3763 if (g_strcmp0(key, "ConfigMethods") == 0) {
3764 const char *config_methods = "push_button", *str = NULL;
3766 dbus_message_iter_get_basic(iter, &str);
3767 if (str && strlen(str) > 0) {
3768 /* It was already set at wpa_s level, don't modify it. */
3769 SUPPLICANT_DBG("%s", str);
3773 supplicant_dbus_property_set(interface->path,
3774 SUPPLICANT_INTERFACE ".Interface.WPS",
3775 "ConfigMethods", DBUS_TYPE_STRING_AS_STRING,
3776 set_config_methods, NULL, &config_methods, NULL);
3778 SUPPLICANT_DBG("No value. Set %s", config_methods);
3783 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
3784 void g_supplicant_replace_config_file(const char *ifname, const char *config_file)
3792 SUPPLICANT_DBG("New {%s, %s}", ifname, config_file);
3793 g_hash_table_replace(config_file_table,
3794 g_strdup(ifname), g_strdup(config_file));
3796 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
3798 static void interface_property(const char *key, DBusMessageIter *iter,
3801 GSupplicantInterface *interface = user_data;
3805 #if defined TIZEN_EXT
3806 if (!simplified_log)
3808 SUPPLICANT_DBG("%s", key);
3811 debug_strvalmap("KeyMgmt capability", keymgmt_map,
3812 interface->keymgmt_capa);
3813 debug_strvalmap("AuthAlg capability", authalg_capa_map,
3814 interface->authalg_capa);
3815 debug_strvalmap("Protocol capability", proto_capa_map,
3816 interface->proto_capa);
3817 debug_strvalmap("Pairwise capability", pairwise_map,
3818 interface->pairwise_capa);
3819 debug_strvalmap("Group capability", group_map,
3820 interface->group_capa);
3821 debug_strvalmap("Scan capability", scan_capa_map,
3822 interface->scan_capa);
3823 debug_strvalmap("Mode capability", mode_capa_map,
3824 interface->mode_capa);
3826 supplicant_dbus_property_get_all(interface->path,
3827 SUPPLICANT_INTERFACE ".Interface.WPS",
3828 wps_property, interface, interface);
3830 if (interface->ready)
3831 callback_interface_added(interface);
3836 if (g_strcmp0(key, "Capabilities") == 0) {
3837 supplicant_dbus_property_foreach(iter, interface_capability,
3839 #if !defined TIZEN_EXT
3840 if (interface->mode_capa & G_SUPPLICANT_CAPABILITY_MODE_P2P)
3841 interface->p2p_support = true;
3843 #if defined TIZEN_EXT_WIFI_MESH
3844 if (interface->mode_capa & G_SUPPLICANT_CAPABILITY_MODE_MESH)
3845 interface->mesh_support = true;
3847 } else if (g_strcmp0(key, "State") == 0) {
3848 const char *str = NULL;
3850 dbus_message_iter_get_basic(iter, &str);
3852 if (string2state(str) != interface->state) {
3853 interface->state = string2state(str);
3854 callback_interface_state(interface);
3856 #if defined TIZEN_EXT
3857 switch (interface->state) {
3858 case G_SUPPLICANT_STATE_COMPLETED:
3859 add_timer_for_last_connected(interface);
3861 case G_SUPPLICANT_STATE_DISCONNECTED:
3862 remove_timer_for_last_connected(interface);
3868 if (interface->ap_create_in_progress) {
3869 if (interface->state == G_SUPPLICANT_STATE_DISCONNECTED)
3870 callback_ap_create_fail(interface);
3872 interface->ap_create_in_progress = false;
3875 if (interface->state == G_SUPPLICANT_STATE_DISABLED)
3876 interface->ready = FALSE;
3878 interface->ready = TRUE;
3880 SUPPLICANT_DBG("state %s (%d)", str, interface->state);
3881 } else if (g_strcmp0(key, "Scanning") == 0) {
3882 dbus_bool_t scanning = FALSE;
3884 dbus_message_iter_get_basic(iter, &scanning);
3885 interface->scanning = scanning;
3887 if (interface->ready) {
3888 if (interface->scanning)
3889 callback_scan_started(interface);
3891 callback_scan_finished(interface);
3893 } else if (g_strcmp0(key, "ApScan") == 0) {
3896 dbus_message_iter_get_basic(iter, &apscan);
3897 interface->apscan = apscan;
3898 } else if (g_strcmp0(key, "Ifname") == 0) {
3899 const char *str = NULL;
3901 dbus_message_iter_get_basic(iter, &str);
3903 g_free(interface->ifname);
3904 interface->ifname = g_strdup(str);
3906 } else if (g_strcmp0(key, "Driver") == 0) {
3907 const char *str = NULL;
3909 dbus_message_iter_get_basic(iter, &str);
3911 g_free(interface->driver);
3912 interface->driver = g_strdup(str);
3914 } else if (g_strcmp0(key, "BridgeIfname") == 0) {
3915 const char *str = NULL;
3917 dbus_message_iter_get_basic(iter, &str);
3919 g_free(interface->bridge);
3920 interface->bridge = g_strdup(str);
3922 } else if (g_strcmp0(key, "ConfigFile") == 0) {
3923 const char *str = NULL;
3925 dbus_message_iter_get_basic(iter, &str);
3926 if (str && strlen(str) > 0 && interface->ifname) {
3927 SUPPLICANT_DBG("New {%s, %s}", interface->ifname, str);
3928 g_hash_table_replace(config_file_table,
3929 g_strdup(interface->ifname), g_strdup(str));
3931 } else if (g_strcmp0(key, "CurrentBSS") == 0) {
3932 interface_current_bss(interface, iter);
3933 } else if (g_strcmp0(key, "CurrentNetwork") == 0) {
3934 #if defined TIZEN_EXT
3935 if (interface->state != G_SUPPLICANT_STATE_COMPLETED)
3937 interface_network_added(iter, interface);
3938 } else if (g_strcmp0(key, "BSSs") == 0) {
3939 supplicant_dbus_array_foreach(iter,
3940 interface_bss_added_without_keys,
3942 } else if (g_strcmp0(key, "Blobs") == 0) {
3944 } else if (g_strcmp0(key, "Networks") == 0) {
3945 supplicant_dbus_array_foreach(iter, interface_network_added,
3947 } else if (g_strcmp0(key, "DisconnectReason") == 0) {
3949 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
3950 dbus_message_iter_get_basic(iter, &reason_code);
3951 callback_disconnect_reason_code(interface, reason_code);
3952 #if defined TIZEN_EXT
3953 SUPPLICANT_DBG("reason code (%d)", reason_code);
3956 } else if (g_strcmp0(key, "AssocStatusCode") == 0) {
3958 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
3959 dbus_message_iter_get_basic(iter, &status_code);
3960 callback_assoc_status_code(interface, status_code);
3961 #if defined TIZEN_EXT
3962 SUPPLICANT_DBG("status code (%d)", status_code);
3966 SUPPLICANT_DBG("key %s type %c",
3967 key, dbus_message_iter_get_arg_type(iter));
3971 static void scan_network_update(DBusMessageIter *iter, void *user_data)
3973 GSupplicantInterface *interface = user_data;
3974 GSupplicantNetwork *network;
3980 dbus_message_iter_get_basic(iter, &path);
3985 if (g_strcmp0(path, "/") == 0)
3988 /* Update the network details based on scan BSS data */
3989 network = g_hash_table_lookup(interface->bss_mapping, path);
3991 callback_network_added(network);
3994 static void scan_bss_data(const char *key, DBusMessageIter *iter,
3997 GSupplicantInterface *interface = user_data;
3999 /*Fixed : stucking in scanning state when scan failed*/
4000 #if defined TIZEN_EXT
4001 GSupplicantInterfaceCallback scan_callback;
4006 supplicant_dbus_array_foreach(iter, scan_network_update,
4009 #if defined TIZEN_EXT
4010 scan_callback = interface->scan_callback;
4011 callback_scan_done(interface);
4014 if (interface->scan_callback)
4015 interface->scan_callback(0, interface, interface->scan_data);
4017 #if defined TIZEN_EXT
4018 if (interface->scan_callback == scan_callback) {
4020 interface->scan_callback = NULL;
4021 interface->scan_data = NULL;
4022 #if defined TIZEN_EXT
4027 static GSupplicantInterface *interface_alloc(const char *path)
4029 GSupplicantInterface *interface;
4031 interface = g_try_new0(GSupplicantInterface, 1);
4035 interface->path = g_strdup(path);
4037 interface->network_table = g_hash_table_new_full(g_str_hash,
4038 g_str_equal, NULL, remove_network);
4039 interface->peer_table = g_hash_table_new_full(g_str_hash,
4040 g_str_equal, NULL, remove_peer);
4041 interface->group_table = g_hash_table_new_full(g_str_hash,
4042 g_str_equal, NULL, remove_group);
4043 interface->bss_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
4046 g_hash_table_replace(interface_table, interface->path, interface);
4051 static void interface_added(DBusMessageIter *iter, void *user_data)
4053 GSupplicantInterface *interface;
4054 const char *path = NULL;
4055 bool properties_appended = GPOINTER_TO_UINT(user_data);
4059 dbus_message_iter_get_basic(iter, &path);
4063 if (g_strcmp0(path, "/") == 0)
4066 interface = g_hash_table_lookup(interface_table, path);
4070 interface = interface_alloc(path);
4074 if (!properties_appended) {
4075 supplicant_dbus_property_get_all(path,
4076 SUPPLICANT_INTERFACE ".Interface",
4077 interface_property, interface,
4082 dbus_message_iter_next(iter);
4083 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
4084 supplicant_dbus_property_foreach(iter, interface_property,
4086 interface_property(NULL, NULL, interface);
4090 static void interface_removed(DBusMessageIter *iter, void *user_data)
4092 const char *path = NULL;
4093 GSupplicantInterface *interface = user_data;
4095 dbus_message_iter_get_basic(iter, &path);
4099 interface = g_hash_table_lookup(interface_table, path);
4100 g_supplicant_interface_cancel(interface);
4102 g_hash_table_remove(interface_table, path);
4105 static void eap_method(DBusMessageIter *iter, void *user_data)
4107 const char *str = NULL;
4110 dbus_message_iter_get_basic(iter, &str);
4114 for (i = 0; eap_method_map[i].str; i++)
4115 if (strcmp(str, eap_method_map[i].str) == 0) {
4116 eap_methods |= eap_method_map[i].val;
4121 static void service_property(const char *key, DBusMessageIter *iter,
4125 callback_system_ready();
4129 if (g_strcmp0(key, "DebugLevel") == 0) {
4130 const char *str = NULL;
4133 dbus_message_iter_get_basic(iter, &str);
4134 for (i = 0; debug_strings[i]; i++)
4135 if (g_strcmp0(debug_strings[i], str) == 0) {
4139 SUPPLICANT_DBG("Debug level %d", debug_level);
4140 } else if (g_strcmp0(key, "DebugTimestamp") == 0) {
4141 dbus_message_iter_get_basic(iter, &debug_timestamp);
4142 SUPPLICANT_DBG("Debug timestamp %u", debug_timestamp);
4143 } else if (g_strcmp0(key, "DebugShowKeys") == 0) {
4144 dbus_message_iter_get_basic(iter, &debug_showkeys);
4145 SUPPLICANT_DBG("Debug show keys %u", debug_showkeys);
4146 } else if (g_strcmp0(key, "Interfaces") == 0) {
4147 supplicant_dbus_array_foreach(iter, interface_added, NULL);
4148 } else if (g_strcmp0(key, "EapMethods") == 0) {
4149 supplicant_dbus_array_foreach(iter, eap_method, NULL);
4150 debug_strvalmap("EAP method", eap_method_map, eap_methods);
4151 } else if (g_strcmp0(key, "Country") == 0) {
4152 const char *country = NULL;
4154 dbus_message_iter_get_basic(iter, &country);
4155 SUPPLICANT_DBG("Country %s", country);
4157 SUPPLICANT_DBG("key %s type %c",
4158 key, dbus_message_iter_get_arg_type(iter));
4161 static void signal_name_owner_changed(const char *path, DBusMessageIter *iter)
4163 const char *name = NULL, *old = NULL, *new = NULL;
4167 if (g_strcmp0(path, DBUS_PATH_DBUS) != 0)
4170 dbus_message_iter_get_basic(iter, &name);
4174 if (g_strcmp0(name, SUPPLICANT_SERVICE) != 0)
4177 dbus_message_iter_next(iter);
4178 dbus_message_iter_get_basic(iter, &old);
4179 dbus_message_iter_next(iter);
4180 dbus_message_iter_get_basic(iter, &new);
4185 if (strlen(old) > 0 && strlen(new) == 0) {
4186 system_available = FALSE;
4187 g_hash_table_remove_all(bss_mapping);
4188 g_hash_table_remove_all(peer_mapping);
4189 g_hash_table_remove_all(group_mapping);
4190 g_hash_table_remove_all(config_file_table);
4191 g_hash_table_remove_all(interface_table);
4192 callback_system_killed();
4195 if (strlen(new) > 0 && strlen(old) == 0) {
4196 system_available = TRUE;
4197 supplicant_dbus_property_get_all(SUPPLICANT_PATH,
4198 SUPPLICANT_INTERFACE,
4199 service_property, NULL, NULL);
4203 static void signal_properties_changed(const char *path, DBusMessageIter *iter)
4207 if (g_strcmp0(path, SUPPLICANT_PATH) != 0)
4210 supplicant_dbus_property_foreach(iter, service_property, NULL);
4213 static void signal_interface_added(const char *path, DBusMessageIter *iter)
4215 SUPPLICANT_DBG("path %s %s", path, SUPPLICANT_PATH);
4217 if (g_strcmp0(path, SUPPLICANT_PATH) == 0)
4218 interface_added(iter, GUINT_TO_POINTER(true));
4221 static void signal_interface_removed(const char *path, DBusMessageIter *iter)
4225 if (g_strcmp0(path, SUPPLICANT_PATH) == 0)
4226 interface_removed(iter, NULL);
4229 static void signal_interface_changed(const char *path, DBusMessageIter *iter)
4231 GSupplicantInterface *interface;
4232 #if defined TIZEN_EXT
4233 if (!simplified_log)
4237 interface = g_hash_table_lookup(interface_table, path);
4241 supplicant_dbus_property_foreach(iter, interface_property, interface);
4244 static void signal_scan_done(const char *path, DBusMessageIter *iter)
4246 GSupplicantInterface *interface;
4247 dbus_bool_t success = FALSE;
4251 interface = g_hash_table_lookup(interface_table, path);
4255 dbus_message_iter_get_basic(iter, &success);
4257 if (interface->scanning) {
4258 callback_scan_finished(interface);
4259 interface->scanning = FALSE;
4263 * If scan is unsuccessful return -EIO else get the scanned BSSs
4264 * and update the network details accordingly
4267 if (interface->scan_callback)
4268 interface->scan_callback(-EIO, interface,
4269 interface->scan_data);
4271 interface->scan_callback = NULL;
4272 interface->scan_data = NULL;
4277 supplicant_dbus_property_get(path, SUPPLICANT_INTERFACE ".Interface",
4278 "BSSs", scan_bss_data, interface, interface);
4281 static void signal_bss_added(const char *path, DBusMessageIter *iter)
4283 GSupplicantInterface *interface;
4284 #if defined TIZEN_EXT
4285 if (!simplified_log)
4289 interface = g_hash_table_lookup(interface_table, path);
4293 interface_bss_added_with_keys(iter, interface);
4296 static void signal_bss_removed(const char *path, DBusMessageIter *iter)
4298 GSupplicantInterface *interface;
4302 interface = g_hash_table_lookup(interface_table, path);
4306 interface_bss_removed(iter, interface);
4309 static void signal_network_added(const char *path, DBusMessageIter *iter)
4311 GSupplicantInterface *interface;
4315 interface = g_hash_table_lookup(interface_table, path);
4319 interface_network_added(iter, interface);
4322 static void signal_network_removed(const char *path, DBusMessageIter *iter)
4324 GSupplicantInterface *interface;
4328 interface = g_hash_table_lookup(interface_table, path);
4332 interface_network_removed(iter, interface);
4334 #if defined TIZEN_EXT
4335 void *copy_vsie_list(gconstpointer src, gpointer data)
4337 return g_strdup(src);
4342 static void signal_sta_authorized(const char *path, DBusMessageIter *iter)
4344 GSupplicantInterface *interface;
4345 const char *addr = NULL;
4349 interface = g_hash_table_lookup(interface_table, path);
4353 dbus_message_iter_get_basic(iter, &addr);
4357 callback_sta_authorized(interface, addr);
4360 static void signal_sta_deauthorized(const char *path, DBusMessageIter *iter)
4362 GSupplicantInterface *interface;
4363 const char *addr = NULL;
4367 interface = g_hash_table_lookup(interface_table, path);
4371 dbus_message_iter_get_basic(iter, &addr);
4375 callback_sta_deauthorized(interface, addr);
4378 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
4379 static void signal_eap(const char *path, DBusMessageIter *iter)
4381 GSupplicantInterface *interface;
4382 const char *str = NULL;
4384 SUPPLICANT_DBG("EAPOL_DEBUG callback eap signal");
4386 interface = g_hash_table_lookup(interface_table, path);
4390 // TODO: Identify EAP fail condition, currently timeout is used for failure.
4392 dbus_message_iter_get_basic(iter, &str);
4396 if (g_strcmp0("completion", str))
4399 dbus_message_iter_next(iter);
4401 dbus_message_iter_get_basic(iter, &str);
4405 if (!g_strcmp0("success", str))
4406 callback_eap(interface, true);
4408 callback_eap(interface, false);
4410 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
4412 static void signal_bss_changed(const char *path, DBusMessageIter *iter)
4414 GSupplicantInterface *interface;
4415 GSupplicantNetwork *network;
4416 GSupplicantSecurity old_security;
4417 unsigned int old_wps_capabilities;
4418 struct g_supplicant_bss *bss;
4420 #if defined TIZEN_EXT
4421 if (!simplified_log)
4425 interface = g_hash_table_lookup(bss_mapping, path);
4429 network = g_hash_table_lookup(interface->bss_mapping, path);
4433 bss = g_hash_table_lookup(network->bss_table, path);
4437 supplicant_dbus_property_foreach(iter, bss_property, bss);
4439 #if defined TIZEN_EXT
4440 if (network->interface->state != G_SUPPLICANT_STATE_COMPLETED) {
4441 network->frequency = bss->frequency;
4442 network->phy_mode = bss->phy_mode;
4445 old_security = network->security;
4446 bss_compute_security(bss);
4448 if (old_security != bss->security) {
4449 struct g_supplicant_bss *new_bss;
4451 SUPPLICANT_DBG("New network security for %s with path %s",
4452 bss->ssid, bss->path);
4455 * Security change policy:
4456 * - We first copy the current bss into a new one with
4457 * its own pointer (path)
4458 * - Clear the old bss pointer and remove the network completely
4459 * if there are no more BSSs in the bss table.
4460 * - The new bss will be added either to an existing network
4461 * or an additional network will be created
4464 new_bss = g_try_new0(struct g_supplicant_bss, 1);
4468 memcpy(new_bss, bss, sizeof(struct g_supplicant_bss));
4469 new_bss->path = g_strdup(bss->path);
4470 #if defined TIZEN_EXT
4471 new_bss->vsie_list = g_slist_copy_deep(bss->vsie_list, copy_vsie_list, NULL);
4474 if (network->best_bss == bss) {
4475 network->best_bss = NULL;
4476 network->signal = BSS_UNKNOWN_STRENGTH;
4479 g_hash_table_remove(bss_mapping, path);
4481 g_hash_table_remove(interface->bss_mapping, path);
4482 g_hash_table_remove(network->bss_table, path);
4484 update_network_signal(network);
4486 if (g_hash_table_size(network->bss_table) == 0)
4487 g_hash_table_remove(interface->network_table,
4490 if (add_or_replace_bss_to_network(new_bss) < 0) {
4492 * Prevent a memory leak on failure in
4493 * add_or_replace_bss_to_network
4495 SUPPLICANT_DBG("Failed to add bss %s to network table",
4497 g_free(new_bss->path);
4504 old_wps_capabilities = network->wps_capabilities;
4506 if (old_wps_capabilities != bss->wps_capabilities) {
4507 network->wps_capabilities = bss->wps_capabilities;
4508 callback_network_changed(network, "WPSCapabilities");
4511 #if defined TIZEN_EXT
4512 if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
4513 network->wps = TRUE;
4514 network->wps_capabilities |= bss->wps_capabilities;
4516 network->wps = FALSE;
4519 /* Consider only property changes of the connected BSS */
4520 if (network == interface->current_network && bss != network->best_bss)
4523 if (bss->signal == network->signal)
4528 callback_network_changed(network, "");
4534 * If the new signal is lower than the SSID signal, we need
4535 * to check for the new maximum.
4537 #if defined TIZEN_EXT
4538 if (!update_best_bss(network, bss, network->best_bss)) {
4539 if (bss != network->best_bss) {
4540 callback_network_changed(network, "");
4544 network->signal = bss->signal;
4545 update_network_signal(network);
4548 if (bss->signal < network->signal) {
4549 if (bss != network->best_bss)
4552 network->signal = bss->signal;
4553 update_network_signal(network);
4555 network->signal = bss->signal;
4556 network->best_bss = bss;
4560 SUPPLICANT_DBG("New network signal for %s %d dBm", network->ssid,
4563 callback_network_changed(network, "Signal");
4566 static void wps_credentials(const char *key, DBusMessageIter *iter,
4569 GSupplicantInterface *interface = user_data;
4574 SUPPLICANT_DBG("key %s", key);
4576 if (g_strcmp0(key, "Key") == 0) {
4577 DBusMessageIter array;
4578 unsigned char *key_val;
4581 dbus_message_iter_recurse(iter, &array);
4582 dbus_message_iter_get_fixed_array(&array, &key_val, &key_len);
4584 g_free(interface->wps_cred.key);
4585 interface->wps_cred.key = g_try_malloc0(
4586 sizeof(char) * key_len + 1);
4588 if (!interface->wps_cred.key)
4591 memcpy(interface->wps_cred.key, key_val,
4592 sizeof(char) * key_len);
4594 SUPPLICANT_DBG("WPS key present");
4595 } else if (g_strcmp0(key, "SSID") == 0) {
4596 DBusMessageIter array;
4597 unsigned char *ssid;
4600 dbus_message_iter_recurse(iter, &array);
4601 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
4603 if (ssid_len > 0 && ssid_len < 33) {
4604 memcpy(interface->wps_cred.ssid, ssid, ssid_len);
4605 interface->wps_cred.ssid_len = ssid_len;
4607 memset(interface->wps_cred.ssid, 0, 32);
4608 interface->wps_cred.ssid_len = 0;
4613 static void signal_wps_credentials(const char *path, DBusMessageIter *iter)
4615 GSupplicantInterface *interface;
4619 interface = g_hash_table_lookup(interface_table, path);
4623 supplicant_dbus_property_foreach(iter, wps_credentials, interface);
4626 static void wps_event_args(const char *key, DBusMessageIter *iter,
4629 GSupplicantInterface *interface = user_data;
4631 if (!key || !interface)
4634 SUPPLICANT_DBG("Arg Key %s", key);
4637 static void signal_wps_event(const char *path, DBusMessageIter *iter)
4639 GSupplicantInterface *interface;
4640 const char *name = NULL;
4644 interface = g_hash_table_lookup(interface_table, path);
4648 dbus_message_iter_get_basic(iter, &name);
4650 SUPPLICANT_DBG("Name: %s", name);
4652 if (g_strcmp0(name, "success") == 0)
4653 interface->wps_state = G_SUPPLICANT_WPS_STATE_SUCCESS;
4654 else if (g_strcmp0(name, "fail") == 0)
4655 interface->wps_state = G_SUPPLICANT_WPS_STATE_FAIL;
4657 interface->wps_state = G_SUPPLICANT_WPS_STATE_UNKNOWN;
4659 if (!dbus_message_iter_has_next(iter))
4662 dbus_message_iter_next(iter);
4664 supplicant_dbus_property_foreach(iter, wps_event_args, interface);
4667 #if defined TIZEN_EXT
4668 static void signal_power_off(const char *path, DBusMessageIter *iter)
4670 int poweroff_state = 0;
4672 dbus_message_iter_get_basic(iter, &poweroff_state);
4674 SUPPLICANT_DBG("poweroff_state(%d)", poweroff_state);
4676 /* POWER_OFF_DIRECT 2 && POWER_OFF_RESTART 3 */
4677 if (poweroff_state != 2 && poweroff_state != 3)
4680 if (callbacks_pointer == NULL)
4683 if (callbacks_pointer->system_power_off == NULL)
4686 callbacks_pointer->system_power_off();
4690 static void create_peer_identifier(GSupplicantPeer *peer)
4692 const unsigned char test[ETH_ALEN] = {};
4697 if (!memcmp(peer->device_address, test, ETH_ALEN)) {
4698 peer->identifier = g_strdup(peer->name);
4702 peer->identifier = g_malloc0(19);
4703 snprintf(peer->identifier, 19, "%02x%02x%02x%02x%02x%02x",
4704 peer->device_address[0],
4705 peer->device_address[1],
4706 peer->device_address[2],
4707 peer->device_address[3],
4708 peer->device_address[4],
4709 peer->device_address[5]);
4712 struct peer_property_data {
4713 GSupplicantPeer *peer;
4715 bool groups_changed;
4716 bool services_changed;
4719 static void peer_groups_relation(DBusMessageIter *iter, void *user_data)
4721 struct peer_property_data *data = user_data;
4722 GSupplicantPeer *peer = data->peer;
4723 GSupplicantGroup *group;
4724 const char *str = NULL;
4727 dbus_message_iter_get_basic(iter, &str);
4731 group = g_hash_table_lookup(group_mapping, str);
4735 elem = g_slist_find_custom(data->old_groups, str, (GCompareFunc)g_strcmp0);
4737 data->old_groups = g_slist_remove_link(data->old_groups, elem);
4738 peer->groups = g_slist_concat(elem, peer->groups);
4740 peer->groups = g_slist_prepend(peer->groups, g_strdup(str));
4741 data->groups_changed = true;
4745 static void peer_property(const char *key, DBusMessageIter *iter,
4748 GSupplicantPeer *pending_peer;
4749 struct peer_property_data *data = user_data;
4750 GSupplicantPeer *peer = data->peer;
4752 SUPPLICANT_DBG("key: %s", key);
4754 if (!peer->interface)
4759 create_peer_identifier(peer);
4760 callback_peer_found(peer);
4761 pending_peer = g_hash_table_lookup(
4762 pending_peer_connection, peer->path);
4764 if (pending_peer && pending_peer == peer) {
4765 callback_peer_request(peer);
4766 g_hash_table_remove(pending_peer_connection,
4776 if (g_strcmp0(key, "DeviceAddress") == 0) {
4777 unsigned char *dev_addr;
4778 DBusMessageIter array;
4781 dbus_message_iter_recurse(iter, &array);
4782 dbus_message_iter_get_fixed_array(&array, &dev_addr, &len);
4784 if (len == ETH_ALEN)
4785 memcpy(peer->device_address, dev_addr, len);
4786 } else if (g_strcmp0(key, "DeviceName") == 0) {
4787 const char *str = NULL;
4789 dbus_message_iter_get_basic(iter, &str);
4791 peer->name = g_strdup(str);
4792 } else if (g_strcmp0(key, "config_method") == 0) {
4793 uint16_t wps_config;
4795 dbus_message_iter_get_basic(iter, &wps_config);
4797 if (wps_config & G_SUPPLICANT_WPS_CONFIG_PBC)
4798 peer->wps_capabilities |= G_SUPPLICANT_WPS_PBC;
4799 if (wps_config & ~G_SUPPLICANT_WPS_CONFIG_PBC)
4800 peer->wps_capabilities |= G_SUPPLICANT_WPS_PIN;
4801 } else if (g_strcmp0(key, "Groups") == 0) {
4802 data->old_groups = peer->groups;
4803 peer->groups = NULL;
4805 supplicant_dbus_array_foreach(iter,
4806 peer_groups_relation, data);
4807 if (g_slist_length(data->old_groups) > 0) {
4808 g_slist_free_full(data->old_groups, g_free);
4809 data->groups_changed = true;
4811 } else if (g_strcmp0(key, "IEs") == 0) {
4812 DBusMessageIter array;
4816 dbus_message_iter_recurse(iter, &array);
4817 dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
4819 if (!ie || ie_len < 2)
4822 if (peer->widi_ies) {
4823 if (memcmp(peer->widi_ies, ie, ie_len) == 0)
4826 g_free(peer->widi_ies);
4827 peer->widi_ies_length = 0;
4830 peer->widi_ies = g_malloc0(ie_len * sizeof(unsigned char));
4832 memcpy(peer->widi_ies, ie, ie_len);
4833 peer->widi_ies_length = ie_len;
4834 data->services_changed = true;
4838 static void signal_peer_found(const char *path, DBusMessageIter *iter)
4840 struct peer_property_data *property_data;
4841 GSupplicantInterface *interface;
4842 const char *obj_path = NULL;
4843 GSupplicantPeer *peer;
4847 interface = g_hash_table_lookup(interface_table, path);
4851 dbus_message_iter_get_basic(iter, &obj_path);
4852 if (!obj_path || g_strcmp0(obj_path, "/") == 0)
4855 peer = g_hash_table_lookup(interface->peer_table, obj_path);
4859 peer = g_try_new0(GSupplicantPeer, 1);
4863 peer->interface = interface;
4864 peer->path = g_strdup(obj_path);
4865 g_hash_table_insert(interface->peer_table, peer->path, peer);
4866 g_hash_table_replace(peer_mapping, peer->path, interface);
4868 property_data = dbus_malloc0(sizeof(struct peer_property_data));
4869 property_data->peer = peer;
4871 dbus_message_iter_next(iter);
4872 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
4873 supplicant_dbus_property_foreach(iter, peer_property,
4875 peer_property(NULL, NULL, property_data);
4879 supplicant_dbus_property_get_all(obj_path,
4880 SUPPLICANT_INTERFACE ".Peer",
4881 peer_property, property_data, NULL);
4884 static void signal_peer_lost(const char *path, DBusMessageIter *iter)
4886 GSupplicantInterface *interface;
4887 const char *obj_path = NULL;
4888 GSupplicantPeer *peer;
4892 interface = g_hash_table_lookup(interface_table, path);
4896 dbus_message_iter_get_basic(iter, &obj_path);
4897 if (!obj_path || g_strcmp0(obj_path, "/") == 0)
4900 peer = g_hash_table_lookup(interface->peer_table, obj_path);
4904 g_hash_table_remove(interface->peer_table, obj_path);
4907 static void signal_peer_changed(const char *path, DBusMessageIter *iter)
4909 struct peer_property_data *property_data;
4910 GSupplicantInterface *interface;
4911 GSupplicantPeer *peer;
4915 interface = g_hash_table_lookup(peer_mapping, path);
4919 peer = g_hash_table_lookup(interface->peer_table, path);
4921 g_hash_table_remove(peer_mapping, path);
4925 property_data = dbus_malloc0(sizeof(struct peer_property_data));
4926 property_data->peer = peer;
4928 supplicant_dbus_property_foreach(iter, peer_property, property_data);
4929 if (property_data->services_changed)
4930 callback_peer_changed(peer,
4931 G_SUPPLICANT_PEER_SERVICES_CHANGED);
4933 if (property_data->groups_changed)
4934 callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_CHANGED);
4936 dbus_free(property_data);
4938 if (!g_supplicant_peer_is_in_a_group(peer))
4939 peer->connection_requested = false;
4942 struct group_sig_data {
4943 const char *peer_obj_path;
4944 unsigned char iface_address[ETH_ALEN];
4945 const char *interface_obj_path;
4946 const char *group_obj_path;
4950 static void group_sig_property(const char *key, DBusMessageIter *iter,
4953 struct group_sig_data *data = user_data;
4958 if (g_strcmp0(key, "peer_interface_addr") == 0) {
4959 unsigned char *dev_addr;
4960 DBusMessageIter array;
4963 dbus_message_iter_recurse(iter, &array);
4964 dbus_message_iter_get_fixed_array(&array, &dev_addr, &len);
4966 if (len == ETH_ALEN)
4967 memcpy(data->iface_address, dev_addr, len);
4968 } else if (g_strcmp0(key, "role") == 0) {
4969 const char *str = NULL;
4971 dbus_message_iter_get_basic(iter, &str);
4972 if (g_strcmp0(str, "GO") == 0)
4973 data->role = G_SUPPLICANT_GROUP_ROLE_GO;
4975 data->role = G_SUPPLICANT_GROUP_ROLE_CLIENT;
4976 } else if (g_strcmp0(key, "peer_object") == 0)
4977 dbus_message_iter_get_basic(iter, &data->peer_obj_path);
4978 else if (g_strcmp0(key, "interface_object") == 0)
4979 dbus_message_iter_get_basic(iter, &data->interface_obj_path);
4980 else if (g_strcmp0(key, "group_object") == 0)
4981 dbus_message_iter_get_basic(iter, &data->group_obj_path);
4985 static void signal_group_success(const char *path, DBusMessageIter *iter)
4987 GSupplicantInterface *interface;
4988 struct group_sig_data data = {};
4989 GSupplicantPeer *peer;
4993 interface = g_hash_table_lookup(interface_table, path);
4997 supplicant_dbus_property_foreach(iter, group_sig_property, &data);
4998 if (!data.peer_obj_path)
5001 peer = g_hash_table_lookup(interface->peer_table, data.peer_obj_path);
5005 memcpy(peer->iface_address, data.iface_address, ETH_ALEN);
5006 interface->pending_peer_path = peer->path;
5009 static void signal_group_failure(const char *path, DBusMessageIter *iter)
5011 GSupplicantInterface *interface;
5012 struct group_sig_data data = {};
5013 GSupplicantPeer *peer;
5017 interface = g_hash_table_lookup(interface_table, path);
5021 supplicant_dbus_property_foreach(iter, group_sig_property, &data);
5022 if (!data.peer_obj_path)
5025 peer = g_hash_table_lookup(interface->peer_table, data.peer_obj_path);
5029 callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_FAILED);
5030 peer->connection_requested = false;
5033 static void signal_group_started(const char *path, DBusMessageIter *iter)
5035 GSupplicantInterface *interface, *g_interface;
5036 struct group_sig_data data = {};
5037 GSupplicantGroup *group;
5038 GSupplicantPeer *peer;
5042 interface = g_hash_table_lookup(interface_table, path);
5046 supplicant_dbus_property_foreach(iter, group_sig_property, &data);
5047 if (!data.interface_obj_path || !data.group_obj_path)
5050 peer = g_hash_table_lookup(interface->peer_table,
5051 interface->pending_peer_path);
5052 interface->pending_peer_path = NULL;
5056 g_interface = g_hash_table_lookup(interface_table,
5057 data.interface_obj_path);
5061 group = g_hash_table_lookup(interface->group_table,
5062 data.group_obj_path);
5066 group = g_try_new0(GSupplicantGroup, 1);
5070 group->interface = g_interface;
5071 group->orig_interface = interface;
5072 group->path = g_strdup(data.group_obj_path);
5073 group->role = data.role;
5075 g_hash_table_insert(interface->group_table, group->path, group);
5076 g_hash_table_replace(group_mapping, group->path, group);
5078 peer->current_group_iface = g_interface;
5079 callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_STARTED);
5082 static void remove_peer_group_interface(GHashTable *group_table,
5085 GSupplicantGroup *group;
5086 GHashTableIter iter;
5087 gpointer value, key;
5092 group = g_hash_table_lookup(group_table, path);
5094 if (!group || !group->orig_interface)
5097 g_hash_table_iter_init(&iter, group->orig_interface->peer_table);
5099 while (g_hash_table_iter_next(&iter, &key, &value)) {
5100 GSupplicantPeer *peer = value;
5102 if (peer->current_group_iface == group->interface)
5103 peer->current_group_iface = NULL;
5107 static void signal_group_finished(const char *path, DBusMessageIter *iter)
5109 GSupplicantInterface *interface;
5110 struct group_sig_data data = {};
5114 interface = g_hash_table_lookup(interface_table, path);
5118 supplicant_dbus_property_foreach(iter, group_sig_property, &data);
5119 if (!data.interface_obj_path || !data.group_obj_path)
5122 remove_peer_group_interface(interface->group_table, data.group_obj_path);
5124 g_hash_table_remove(group_mapping, data.group_obj_path);
5126 g_hash_table_remove(interface->group_table, data.group_obj_path);
5129 static void signal_group_request(const char *path, DBusMessageIter *iter)
5131 GSupplicantInterface *interface;
5132 GSupplicantPeer *peer;
5133 const char *obj_path;
5137 interface = g_hash_table_lookup(interface_table, path);
5141 dbus_message_iter_get_basic(iter, &obj_path);
5142 if (!obj_path || !g_strcmp0(obj_path, "/"))
5145 peer = g_hash_table_lookup(interface->peer_table, obj_path);
5150 * Peer has been previously found and property set,
5151 * otherwise, defer connection to when peer property
5154 if (peer->identifier)
5155 callback_peer_request(peer);
5157 g_hash_table_replace(pending_peer_connection, peer->path, peer);
5160 static void signal_group_peer_joined(const char *path, DBusMessageIter *iter)
5162 const char *peer_path = NULL;
5163 GSupplicantInterface *interface;
5164 GSupplicantGroup *group;
5165 GSupplicantPeer *peer;
5169 group = g_hash_table_lookup(group_mapping, path);
5173 dbus_message_iter_get_basic(iter, &peer_path);
5177 interface = g_hash_table_lookup(peer_mapping, peer_path);
5181 peer = g_hash_table_lookup(interface->peer_table, peer_path);
5185 group->members = g_slist_prepend(group->members, g_strdup(peer_path));
5187 callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_JOINED);
5190 static void signal_group_peer_disconnected(const char *path, DBusMessageIter *iter)
5192 const char *peer_path = NULL;
5193 GSupplicantInterface *interface;
5194 GSupplicantGroup *group;
5195 GSupplicantPeer *peer;
5200 group = g_hash_table_lookup(group_mapping, path);
5204 dbus_message_iter_get_basic(iter, &peer_path);
5208 for (elem = group->members; elem; elem = elem->next) {
5209 if (!g_strcmp0(elem->data, peer_path))
5217 group->members = g_slist_delete_link(group->members, elem);
5219 interface = g_hash_table_lookup(peer_mapping, peer_path);
5223 peer = g_hash_table_lookup(interface->peer_table, peer_path);
5227 callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_DISCONNECTED);
5228 peer->connection_requested = false;
5231 #if defined TIZEN_EXT_WIFI_MESH
5232 const void *g_supplicant_interface_get_mesh_group_ssid(
5233 GSupplicantInterface *interface,
5234 unsigned int *ssid_len)
5239 if (!interface || interface->group_info.ssid_len == 0) {
5244 *ssid_len = interface->group_info.ssid_len;
5245 return interface->group_info.ssid;
5248 int g_supplicant_mesh_get_disconnect_reason(GSupplicantInterface *interface)
5253 return interface->group_info.disconnect_reason;
5256 const char *g_supplicant_mesh_peer_get_address(GSupplicantMeshPeer *mesh_peer)
5258 if (!mesh_peer || !mesh_peer->peer_address)
5261 return mesh_peer->peer_address;
5264 int g_supplicant_mesh_peer_get_disconnect_reason(GSupplicantMeshPeer *mesh_peer)
5269 return mesh_peer->disconnect_reason;
5272 static void callback_mesh_group_started(GSupplicantInterface *interface)
5274 if (!callbacks_pointer)
5277 if (!callbacks_pointer->mesh_group_started)
5280 callbacks_pointer->mesh_group_started(interface);
5283 static void callback_mesh_group_removed(GSupplicantInterface *interface)
5285 if (!callbacks_pointer)
5288 if (!callbacks_pointer->mesh_group_removed)
5291 callbacks_pointer->mesh_group_removed(interface);
5294 static void mesh_group_info(const char *key, DBusMessageIter *iter,
5297 GSupplicantInterface *interface = user_data;
5301 if (g_strcmp0(key, "SSID") == 0) {
5302 DBusMessageIter array;
5303 unsigned char *ssid;
5306 dbus_message_iter_recurse(iter, &array);
5307 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
5309 if (ssid_len > 0 && ssid_len < 33) {
5310 memcpy(interface->group_info.ssid, ssid, ssid_len);
5311 interface->group_info.ssid_len = ssid_len;
5313 memset(interface->group_info.ssid, 0, 32);
5314 interface->group_info.ssid_len = 0;
5316 } else if (g_strcmp0(key, "DisconnectReason") == 0) {
5317 int disconnect_reason = 0;
5318 dbus_message_iter_get_basic(iter, &disconnect_reason);
5319 interface->group_info.disconnect_reason = disconnect_reason;
5323 static void signal_mesh_group_started(const char *path, DBusMessageIter *iter)
5325 GSupplicantInterface *interface;
5327 interface = g_hash_table_lookup(interface_table, path);
5331 supplicant_dbus_property_foreach(iter, mesh_group_info, interface);
5333 callback_mesh_group_started(interface);
5336 static void signal_mesh_group_removed(const char *path, DBusMessageIter *iter)
5338 GSupplicantInterface *interface;
5340 interface = g_hash_table_lookup(interface_table, path);
5344 supplicant_dbus_property_foreach(iter, mesh_group_info, interface);
5346 callback_mesh_group_removed(interface);
5349 static void callback_mesh_peer_connected(GSupplicantMeshPeer *mesh_peer)
5351 if (!callbacks_pointer)
5354 if (!callbacks_pointer->mesh_peer_connected)
5357 callbacks_pointer->mesh_peer_connected(mesh_peer);
5360 static void callback_mesh_peer_disconnected(GSupplicantMeshPeer *mesh_peer)
5362 if (!callbacks_pointer)
5365 if (!callbacks_pointer->mesh_peer_disconnected)
5368 callbacks_pointer->mesh_peer_disconnected(mesh_peer);
5371 static void mesh_peer_info(const char *key, DBusMessageIter *iter,
5374 GSupplicantMeshPeer *mesh_peer = user_data;
5378 if (g_strcmp0(key, "PeerAddress") == 0) {
5379 DBusMessageIter array;
5380 unsigned char *addr;
5383 dbus_message_iter_recurse(iter, &array);
5384 dbus_message_iter_get_fixed_array(&array, &addr, &addr_len);
5386 if (addr_len == 6) {
5387 mesh_peer->peer_address = g_malloc0(19);
5388 snprintf(mesh_peer->peer_address, 19,
5389 "%02x:%02x:%02x:%02x:%02x:%02x", addr[0], addr[1],
5390 addr[2], addr[3], addr[4], addr[5]);
5392 } else if (g_strcmp0(key, "DisconnectReason") == 0) {
5393 int disconnect_reason = 0;
5394 dbus_message_iter_get_basic(iter, &disconnect_reason);
5395 mesh_peer->disconnect_reason = disconnect_reason;
5399 static void signal_mesh_peer_connected(const char *path, DBusMessageIter *iter)
5401 GSupplicantInterface *interface;
5402 GSupplicantMeshPeer *mesh_peer;
5404 interface = g_hash_table_lookup(interface_table, path);
5408 mesh_peer = dbus_malloc0(sizeof(GSupplicantMeshPeer));
5409 mesh_peer->interface = interface;
5411 supplicant_dbus_property_foreach(iter, mesh_peer_info, mesh_peer);
5413 callback_mesh_peer_connected(mesh_peer);
5414 g_free(mesh_peer->peer_address);
5418 static void signal_mesh_peer_disconnected(const char *path,
5419 DBusMessageIter *iter)
5421 GSupplicantInterface *interface;
5422 GSupplicantMeshPeer *mesh_peer;
5424 interface = g_hash_table_lookup(interface_table, path);
5428 mesh_peer = dbus_malloc0(sizeof(GSupplicantMeshPeer));
5429 mesh_peer->interface = interface;
5431 supplicant_dbus_property_foreach(iter, mesh_peer_info, mesh_peer);
5433 callback_mesh_peer_disconnected(mesh_peer);
5434 g_free(mesh_peer->peer_address);
5440 const char *interface;
5442 void (*function) (const char *path, DBusMessageIter *iter);
5444 { DBUS_INTERFACE_DBUS, "NameOwnerChanged", signal_name_owner_changed },
5446 { SUPPLICANT_INTERFACE, "PropertiesChanged", signal_properties_changed },
5447 { SUPPLICANT_INTERFACE, "InterfaceAdded", signal_interface_added },
5448 { SUPPLICANT_INTERFACE, "InterfaceCreated", signal_interface_added },
5449 { SUPPLICANT_INTERFACE, "InterfaceRemoved", signal_interface_removed },
5451 { SUPPLICANT_INTERFACE ".Interface", "PropertiesChanged", signal_interface_changed },
5452 { SUPPLICANT_INTERFACE ".Interface", "ScanDone", signal_scan_done },
5453 { SUPPLICANT_INTERFACE ".Interface", "BSSAdded", signal_bss_added },
5454 { SUPPLICANT_INTERFACE ".Interface", "BSSRemoved", signal_bss_removed },
5455 { SUPPLICANT_INTERFACE ".Interface", "NetworkAdded", signal_network_added },
5456 { SUPPLICANT_INTERFACE ".Interface", "NetworkRemoved", signal_network_removed },
5457 { SUPPLICANT_INTERFACE ".Interface", "StaAuthorized", signal_sta_authorized },
5458 { SUPPLICANT_INTERFACE ".Interface", "StaDeauthorized", signal_sta_deauthorized },
5460 { SUPPLICANT_INTERFACE ".BSS", "PropertiesChanged", signal_bss_changed },
5462 { SUPPLICANT_INTERFACE ".Interface.WPS", "Credentials", signal_wps_credentials },
5463 { SUPPLICANT_INTERFACE ".Interface.WPS", "Event", signal_wps_event },
5464 #if defined TIZEN_EXT
5465 { "org.tizen.system.deviced.PowerOff", "ChangeState", signal_power_off },
5468 { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeviceFound", signal_peer_found },
5469 { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeviceLost", signal_peer_lost },
5471 { SUPPLICANT_INTERFACE ".Peer", "PropertiesChanged", signal_peer_changed },
5473 { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationSuccess", signal_group_success },
5474 { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationFailure", signal_group_failure },
5475 { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GroupStarted", signal_group_started },
5476 { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GroupFinished", signal_group_finished },
5477 { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationRequest", signal_group_request },
5479 { SUPPLICANT_INTERFACE ".Group", "PeerJoined", signal_group_peer_joined },
5480 { SUPPLICANT_INTERFACE ".Group", "PeerDisconnected", signal_group_peer_disconnected },
5481 #if defined TIZEN_EXT_WIFI_MESH
5482 { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshGroupStarted",
5483 signal_mesh_group_started },
5484 { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshGroupRemoved",
5485 signal_mesh_group_removed },
5486 { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshPeerConnected",
5487 signal_mesh_peer_connected },
5488 { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshPeerDisconnected",
5489 signal_mesh_peer_disconnected },
5492 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
5493 { SUPPLICANT_INTERFACE ".Interface", "EAP", signal_eap },
5494 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
5499 static DBusHandlerResult g_supplicant_filter(DBusConnection *conn,
5500 DBusMessage *message, void *data)
5502 DBusMessageIter iter;
5506 path = dbus_message_get_path(message);
5508 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
5510 if (!dbus_message_iter_init(message, &iter))
5511 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
5513 for (i = 0; signal_map[i].interface; i++) {
5514 if (!dbus_message_has_interface(message, signal_map[i].interface))
5517 if (!dbus_message_has_member(message, signal_map[i].member))
5520 signal_map[i].function(path, &iter);
5524 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
5527 void g_supplicant_interface_cancel(GSupplicantInterface *interface)
5529 SUPPLICANT_DBG("Cancelling any pending DBus calls");
5530 supplicant_dbus_method_call_cancel_all(interface);
5531 supplicant_dbus_property_call_cancel_all(interface);
5534 struct supplicant_regdom {
5535 GSupplicantCountryCallback callback;
5537 const void *user_data;
5540 static void country_result(const char *error,
5541 DBusMessageIter *iter, void *user_data)
5543 struct supplicant_regdom *regdom = user_data;
5546 SUPPLICANT_DBG("Country setting result");
5552 SUPPLICANT_DBG("Country setting failure %s", error);
5556 if (regdom->callback)
5557 regdom->callback(result, regdom->alpha2,
5558 (void *) regdom->user_data);
5563 static void country_params(DBusMessageIter *iter, void *user_data)
5565 struct supplicant_regdom *regdom = user_data;
5567 dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING,
5571 int g_supplicant_set_country(const char *alpha2,
5572 GSupplicantCountryCallback callback,
5573 const void *user_data)
5575 struct supplicant_regdom *regdom;
5578 SUPPLICANT_DBG("Country setting %s", alpha2);
5580 if (!system_available)
5583 regdom = dbus_malloc0(sizeof(*regdom));
5587 regdom->callback = callback;
5588 regdom->alpha2 = alpha2;
5589 regdom->user_data = user_data;
5591 ret = supplicant_dbus_property_set(SUPPLICANT_PATH, SUPPLICANT_INTERFACE,
5592 "Country", DBUS_TYPE_STRING_AS_STRING,
5593 country_params, country_result,
5597 SUPPLICANT_DBG("Unable to set Country configuration");
5602 int g_supplicant_interface_set_country(GSupplicantInterface *interface,
5603 GSupplicantCountryCallback callback,
5607 struct supplicant_regdom *regdom;
5610 regdom = dbus_malloc0(sizeof(*regdom));
5614 regdom->callback = callback;
5615 regdom->alpha2 = alpha2;
5616 regdom->user_data = user_data;
5618 ret = supplicant_dbus_property_set(interface->path,
5619 SUPPLICANT_INTERFACE ".Interface",
5620 "Country", DBUS_TYPE_STRING_AS_STRING,
5621 country_params, country_result,
5625 SUPPLICANT_DBG("Unable to set Country configuration");
5631 bool g_supplicant_interface_has_p2p(GSupplicantInterface *interface)
5636 return interface->p2p_support;
5639 struct supplicant_p2p_dev_config {
5644 static void p2p_device_config_result(const char *error,
5645 DBusMessageIter *iter, void *user_data)
5647 struct supplicant_p2p_dev_config *config = user_data;
5650 SUPPLICANT_DBG("Unable to set P2P Device configuration: %s",
5653 g_free(config->device_name);
5654 g_free(config->dev_type);
5658 static int dev_type_str2bin(const char *type, unsigned char dev_type[8])
5660 int length, pos, end;
5665 for (length = pos = 0; type[pos] != '\0' && length < 8; length++) {
5672 dev_type[length] = strtol(b, &e, 16);
5673 if (e && *e != '\0')
5682 static void p2p_device_config_params(DBusMessageIter *iter, void *user_data)
5684 struct supplicant_p2p_dev_config *config = user_data;
5685 DBusMessageIter dict;
5687 supplicant_dbus_dict_open(iter, &dict);
5689 supplicant_dbus_dict_append_basic(&dict, "DeviceName",
5690 DBUS_TYPE_STRING, &config->device_name);
5692 if (config->dev_type) {
5693 unsigned char dev_type[8] = {}, *type;
5696 len = dev_type_str2bin(config->dev_type, dev_type);
5699 supplicant_dbus_dict_append_fixed_array(&dict,
5700 "PrimaryDeviceType",
5701 DBUS_TYPE_BYTE, &type, len);
5705 supplicant_dbus_dict_close(iter, &dict);
5708 int g_supplicant_interface_set_p2p_device_config(GSupplicantInterface *interface,
5709 const char *device_name,
5710 const char *primary_dev_type)
5712 struct supplicant_p2p_dev_config *config;
5715 SUPPLICANT_DBG("P2P Device settings %s/%s",
5716 device_name, primary_dev_type);
5718 config = dbus_malloc0(sizeof(*config));
5722 config->device_name = g_strdup(device_name);
5723 config->dev_type = g_strdup(primary_dev_type);
5725 ret = supplicant_dbus_property_set(interface->path,
5726 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
5728 DBUS_TYPE_ARRAY_AS_STRING
5729 DBUS_DICT_ENTRY_BEGIN_CHAR_AS_STRING
5730 DBUS_TYPE_STRING_AS_STRING
5731 DBUS_TYPE_VARIANT_AS_STRING
5732 DBUS_DICT_ENTRY_END_CHAR_AS_STRING,
5733 p2p_device_config_params,
5734 p2p_device_config_result, config, NULL);
5736 g_free(config->device_name);
5737 g_free(config->dev_type);
5739 SUPPLICANT_DBG("Unable to set P2P Device configuration");
5745 static gboolean peer_lookup_by_identifier(gpointer key, gpointer value,
5748 const GSupplicantPeer *peer = value;
5749 const char *identifier = user_data;
5751 if (!g_strcmp0(identifier, peer->identifier))
5757 GSupplicantPeer *g_supplicant_interface_peer_lookup(GSupplicantInterface *interface,
5758 const char *identifier)
5760 GSupplicantPeer *peer;
5762 peer = g_hash_table_find(interface->peer_table,
5763 peer_lookup_by_identifier,
5764 (void *) identifier);
5768 static void interface_create_data_free(struct interface_create_data *data)
5770 g_free(data->ifname);
5771 g_free(data->driver);
5772 g_free(data->bridge);
5773 #if defined TIZEN_EXT_WIFI_MESH
5774 g_free(data->parent_ifname);
5779 static bool interface_exists(GSupplicantInterface *interface,
5782 GSupplicantInterface *tmp;
5784 tmp = g_hash_table_lookup(interface_table, path);
5785 if (tmp && tmp == interface)
5791 static void interface_create_property(const char *key, DBusMessageIter *iter,
5794 struct interface_create_data *data = user_data;
5795 GSupplicantInterface *interface = data->interface;
5798 if (data->callback) {
5799 data->callback(0, data->interface, data->user_data);
5800 #if !defined TIZEN_EXT
5801 callback_p2p_support(interface);
5803 #if defined TIZEN_EXT_WIFI_MESH
5804 callback_mesh_support(interface);
5808 interface_create_data_free(data);
5811 interface_property(key, iter, interface);
5814 static void interface_create_result(const char *error,
5815 DBusMessageIter *iter, void *user_data)
5817 struct interface_create_data *data = user_data;
5818 const char *path = NULL;
5824 g_warning("error %s", error);
5829 dbus_message_iter_get_basic(iter, &path);
5835 if (!system_available) {
5840 data->interface = g_hash_table_lookup(interface_table, path);
5841 if (!data->interface) {
5842 data->interface = interface_alloc(path);
5843 if (!data->interface) {
5849 err = supplicant_dbus_property_get_all(path,
5850 SUPPLICANT_INTERFACE ".Interface",
5851 interface_create_property, data,
5858 data->callback(err, NULL, data->user_data);
5860 interface_create_data_free(data);
5863 static void interface_create_params(DBusMessageIter *iter, void *user_data)
5865 struct interface_create_data *data = user_data;
5866 DBusMessageIter dict;
5867 char *config_file = NULL;
5871 supplicant_dbus_dict_open(iter, &dict);
5873 supplicant_dbus_dict_append_basic(&dict, "Ifname",
5874 DBUS_TYPE_STRING, &data->ifname);
5877 supplicant_dbus_dict_append_basic(&dict, "Driver",
5878 DBUS_TYPE_STRING, &data->driver);
5881 supplicant_dbus_dict_append_basic(&dict, "BridgeIfname",
5882 DBUS_TYPE_STRING, &data->bridge);
5884 config_file = g_hash_table_lookup(config_file_table, data->ifname);
5886 SUPPLICANT_DBG("[%s] ConfigFile %s", data->ifname, config_file);
5888 supplicant_dbus_dict_append_basic(&dict, "ConfigFile",
5889 DBUS_TYPE_STRING, &config_file);
5893 if (data->driver && g_strstr_len(data->driver, strlen(data->driver), "nl80211")) {
5894 supplicant_dbus_dict_append_basic(&dict, "MacAddr",
5895 DBUS_TYPE_UINT32, &data->mac_addr);
5897 supplicant_dbus_dict_append_basic(&dict, "PreassocMacAddr",
5898 DBUS_TYPE_UINT32, &data->preassoc_mac_addr);
5900 supplicant_dbus_dict_append_basic(&dict, "RandAddrLifetime",
5901 DBUS_TYPE_UINT32, &data->random_mac_lifetime);
5903 #endif /* TIZEN_EXT */
5905 #if defined TIZEN_EXT_WIFI_MESH
5906 if (data->is_mesh_interface) {
5907 if (data->parent_ifname)
5908 supplicant_dbus_dict_append_basic(&dict, "ParentIfname",
5909 DBUS_TYPE_STRING, &data->parent_ifname);
5911 supplicant_dbus_dict_append_basic(&dict, "IsMeshInterface",
5912 DBUS_TYPE_BOOLEAN, &data->is_mesh_interface);
5916 supplicant_dbus_dict_close(iter, &dict);
5919 #if defined TIZEN_EXT
5920 static void interface_get_state(const char *key, DBusMessageIter *iter,
5923 struct interface_create_data *data = user_data;
5924 GSupplicantInterface *interface = NULL;
5925 const char *str = NULL;
5927 SUPPLICANT_DBG("key[%s]", key);
5930 SUPPLICANT_DBG("data is NULL");
5934 interface = data->interface;
5936 SUPPLICANT_DBG("interface is NULL");
5941 dbus_message_iter_get_basic(iter, &str);
5944 if (string2state(str) != interface->state)
5945 interface->state = string2state(str);
5948 if (interface->state == G_SUPPLICANT_STATE_DISABLED)
5949 interface->ready = FALSE;
5951 interface->ready = TRUE;
5953 SUPPLICANT_DBG("state %s (%d)", str, interface->state);
5955 if (data->callback) {
5956 data->callback(0, interface, data->user_data);
5957 #if defined TIZEN_EXT_WIFI_MESH
5958 callback_mesh_support(interface);
5962 interface_create_data_free(data);
5966 static void interface_get_result(const char *error,
5967 DBusMessageIter *iter, void *user_data)
5969 struct interface_create_data *data = user_data;
5970 GSupplicantInterface *interface;
5971 const char *path = NULL;
5974 #if defined TIZEN_EXT
5975 if (!simplified_log)
5980 SUPPLICANT_DBG("Interface not created yet");
5984 dbus_message_iter_get_basic(iter, &path);
5990 interface = g_hash_table_lookup(interface_table, path);
5996 #if defined TIZEN_EXT
5997 data->interface = interface;
5998 err = supplicant_dbus_property_get(path,
5999 SUPPLICANT_INTERFACE ".Interface",
6000 "State", interface_get_state, data, NULL);
6006 if (data->callback) {
6007 data->callback(0, interface, data->user_data);
6008 #if !defined TIZEN_EXT
6009 callback_p2p_support(interface);
6011 #if defined TIZEN_EXT_WIFI_MESH
6012 callback_mesh_support(interface);
6016 interface_create_data_free(data);
6021 if (!system_available) {
6026 SUPPLICANT_DBG("Creating interface");
6028 err = supplicant_dbus_method_call(SUPPLICANT_PATH,
6029 SUPPLICANT_INTERFACE,
6031 interface_create_params,
6032 interface_create_result, data,
6039 data->callback(err, NULL, data->user_data);
6041 interface_create_data_free(data);
6044 static void interface_get_params(DBusMessageIter *iter, void *user_data)
6046 struct interface_create_data *data = user_data;
6047 #if defined TIZEN_EXT
6048 if (!simplified_log)
6052 dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, &data->ifname);
6055 #if defined TIZEN_EXT_WIFI_MESH
6056 int g_supplicant_mesh_interface_create(const char *ifname, const char *driver,
6057 const char *bridge, const char *parent_ifname,
6058 GSupplicantInterfaceCallback callback, void *user_data)
6060 struct interface_create_data *data;
6063 SUPPLICANT_DBG("ifname %s", ifname);
6065 if (!ifname || !parent_ifname)
6068 if (!system_available)
6071 data = dbus_malloc0(sizeof(*data));
6075 data->ifname = g_strdup(ifname);
6076 data->driver = g_strdup(driver);
6077 data->bridge = g_strdup(bridge);
6078 data->is_mesh_interface = true;
6079 data->parent_ifname = g_strdup(parent_ifname);
6080 data->callback = callback;
6081 data->user_data = user_data;
6083 ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
6084 SUPPLICANT_INTERFACE,
6086 interface_create_params,
6087 interface_create_result, data,
6092 struct interface_mesh_peer_data {
6095 GSupplicantInterface *interface;
6096 GSupplicantInterfaceCallback callback;
6100 static void interface_mesh_change_peer_params(DBusMessageIter *iter,
6103 struct interface_mesh_peer_data *data = user_data;
6107 dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, &data->peer_address);
6110 static void interface_mesh_change_peer_result(const char *error,
6111 DBusMessageIter *iter, void *user_data)
6113 struct interface_mesh_peer_data *data = user_data;
6116 SUPPLICANT_DBG("%s", data->method);
6120 SUPPLICANT_DBG("error %s", error);
6124 data->callback(err, data->interface, data->user_data);
6126 g_free(data->peer_address);
6127 g_free(data->method);
6131 int g_supplicant_interface_mesh_peer_change_status(
6132 GSupplicantInterface *interface,
6133 GSupplicantInterfaceCallback callback, const char *peer_address,
6134 const char *method, void *user_data)
6136 struct interface_mesh_peer_data *data;
6142 data = dbus_malloc0(sizeof(*data));
6146 data->peer_address = g_strdup(peer_address);
6147 data->method = g_strdup(method);
6148 data->interface = interface;
6149 data->callback = callback;
6150 data->user_data = user_data;
6152 ret = supplicant_dbus_method_call(interface->path,
6153 SUPPLICANT_INTERFACE ".Interface.Mesh",
6154 method, interface_mesh_change_peer_params,
6155 interface_mesh_change_peer_result, data, NULL);
6157 g_free(data->peer_address);
6158 g_free(data->method);
6166 int g_supplicant_interface_create(const char *ifname, const char *driver,
6169 unsigned int mac_policy,
6170 unsigned int preassoc_mac_policy,
6171 unsigned int random_mac_lifetime,
6172 #endif /* TIZEN_EXT */
6173 GSupplicantInterfaceCallback callback,
6176 struct interface_create_data *data;
6179 SUPPLICANT_DBG("ifname %s", ifname);
6184 if (!system_available)
6187 data = dbus_malloc0(sizeof(*data));
6191 data->ifname = g_strdup(ifname);
6192 data->driver = g_strdup(driver);
6193 data->bridge = g_strdup(bridge);
6194 data->callback = callback;
6196 data->mac_addr = mac_policy;
6197 data->preassoc_mac_addr = preassoc_mac_policy;
6198 data->random_mac_lifetime = random_mac_lifetime;
6199 #endif /* TIZEN_EXT */
6200 data->user_data = user_data;
6202 ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
6203 SUPPLICANT_INTERFACE,
6205 interface_get_params,
6206 interface_get_result, data,
6209 interface_create_data_free(data);
6214 static void interface_remove_result(const char *error,
6215 DBusMessageIter *iter, void *user_data)
6217 struct interface_data *data = user_data;
6222 SUPPLICANT_DBG("error: %s", error);
6226 if (!system_available) {
6232 * The gsupplicant interface is already freed by the InterfaceRemoved
6233 * signal callback. Simply invoke the interface_data callback.
6241 data->callback(err, NULL, data->user_data);
6247 static void interface_remove_params(DBusMessageIter *iter, void *user_data)
6249 struct interface_data *data = user_data;
6251 dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
6252 &data->interface->path);
6255 int g_supplicant_interface_remove(GSupplicantInterface *interface,
6256 GSupplicantInterfaceCallback callback,
6259 struct interface_data *data;
6265 if (!system_available)
6268 g_supplicant_interface_cancel(interface);
6270 data = dbus_malloc0(sizeof(*data));
6274 data->interface = interface;
6275 data->path = g_strdup(interface->path);
6276 data->callback = callback;
6277 data->user_data = user_data;
6279 ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
6280 SUPPLICANT_INTERFACE,
6282 interface_remove_params,
6283 interface_remove_result, data,
6292 static void interface_scan_result(const char *error,
6293 DBusMessageIter *iter, void *user_data)
6295 struct interface_scan_data *data = user_data;
6299 SUPPLICANT_DBG("error %s", error);
6303 /* A non ready interface cannot send/receive anything */
6304 if (interface_exists(data->interface, data->path)) {
6305 if (!data->interface->ready)
6313 data->callback(err, data->interface, data->user_data);
6315 data->interface->scan_callback = data->callback;
6316 data->interface->scan_data = data->user_data;
6319 if (data->scan_params)
6320 g_supplicant_free_scan_params(data->scan_params);
6325 static void add_scan_frequency(DBusMessageIter *iter, unsigned int freq)
6327 DBusMessageIter data;
6328 unsigned int width = 0; /* Not used by wpa_supplicant atm */
6330 dbus_message_iter_open_container(iter, DBUS_TYPE_STRUCT, NULL, &data);
6332 dbus_message_iter_append_basic(&data, DBUS_TYPE_UINT32, &freq);
6333 dbus_message_iter_append_basic(&data, DBUS_TYPE_UINT32, &width);
6335 dbus_message_iter_close_container(iter, &data);
6338 static void add_scan_frequencies(DBusMessageIter *iter,
6341 GSupplicantScanParams *scan_data = user_data;
6345 for (i = 0; i < scan_data->num_freqs; i++) {
6346 freq = scan_data->freqs[i];
6350 add_scan_frequency(iter, freq);
6354 static void append_ssid(DBusMessageIter *iter,
6355 const void *ssid, unsigned int len)
6357 DBusMessageIter array;
6359 dbus_message_iter_open_container(iter, DBUS_TYPE_ARRAY,
6360 DBUS_TYPE_BYTE_AS_STRING, &array);
6362 dbus_message_iter_append_fixed_array(&array, DBUS_TYPE_BYTE,
6364 dbus_message_iter_close_container(iter, &array);
6367 static void append_ssids(DBusMessageIter *iter, void *user_data)
6369 GSupplicantScanParams *scan_data = user_data;
6372 for (list = scan_data->ssids; list; list = list->next) {
6373 struct scan_ssid *scan_ssid = list->data;
6375 append_ssid(iter, scan_ssid->ssid, scan_ssid->ssid_len);
6379 static void supplicant_add_scan_frequency(DBusMessageIter *dict,
6380 supplicant_dbus_array_function function,
6383 GSupplicantScanParams *scan_params = user_data;
6384 DBusMessageIter entry, value, array;
6385 const char *key = "Channels";
6387 if (scan_params->freqs && scan_params->freqs[0] != 0) {
6388 dbus_message_iter_open_container(dict, DBUS_TYPE_DICT_ENTRY,
6391 dbus_message_iter_append_basic(&entry, DBUS_TYPE_STRING, &key);
6393 dbus_message_iter_open_container(&entry, DBUS_TYPE_VARIANT,
6394 DBUS_TYPE_ARRAY_AS_STRING
6395 DBUS_STRUCT_BEGIN_CHAR_AS_STRING
6396 DBUS_TYPE_UINT32_AS_STRING
6397 DBUS_TYPE_UINT32_AS_STRING
6398 DBUS_STRUCT_END_CHAR_AS_STRING,
6401 dbus_message_iter_open_container(&value, DBUS_TYPE_ARRAY,
6402 DBUS_STRUCT_BEGIN_CHAR_AS_STRING
6403 DBUS_TYPE_UINT32_AS_STRING
6404 DBUS_TYPE_UINT32_AS_STRING
6405 DBUS_STRUCT_END_CHAR_AS_STRING,
6409 function(&array, user_data);
6411 dbus_message_iter_close_container(&value, &array);
6412 dbus_message_iter_close_container(&entry, &value);
6413 dbus_message_iter_close_container(dict, &entry);
6417 static void interface_scan_params(DBusMessageIter *iter, void *user_data)
6419 DBusMessageIter dict;
6420 const char *type = "passive";
6421 struct interface_scan_data *data = user_data;
6423 supplicant_dbus_dict_open(iter, &dict);
6425 if (data && data->scan_params) {
6428 supplicant_dbus_dict_append_basic(&dict, "Type",
6429 DBUS_TYPE_STRING, &type);
6431 #if defined TIZEN_EXT
6432 SUPPLICANT_DBG("[specific_scan] num_ssids %d",
6433 data->scan_params->num_ssids);
6436 if (data->scan_params->ssids) {
6437 supplicant_dbus_dict_append_array(&dict, "SSIDs",
6442 supplicant_add_scan_frequency(&dict, add_scan_frequencies,
6445 supplicant_dbus_dict_append_basic(&dict, "Type",
6446 DBUS_TYPE_STRING, &type);
6448 supplicant_dbus_dict_close(iter, &dict);
6451 static int interface_ready_to_scan(GSupplicantInterface *interface)
6456 if (!system_available)
6459 if (interface->scanning)
6462 switch (interface->state) {
6463 case G_SUPPLICANT_STATE_AUTHENTICATING:
6464 case G_SUPPLICANT_STATE_ASSOCIATING:
6465 case G_SUPPLICANT_STATE_ASSOCIATED:
6466 case G_SUPPLICANT_STATE_4WAY_HANDSHAKE:
6467 case G_SUPPLICANT_STATE_GROUP_HANDSHAKE:
6469 #if defined TIZEN_EXT
6470 case G_SUPPLICANT_STATE_DISABLED:
6472 case G_SUPPLICANT_STATE_UNKNOWN:
6474 case G_SUPPLICANT_STATE_UNKNOWN:
6475 case G_SUPPLICANT_STATE_DISABLED:
6477 case G_SUPPLICANT_STATE_DISCONNECTED:
6478 case G_SUPPLICANT_STATE_INACTIVE:
6479 case G_SUPPLICANT_STATE_SCANNING:
6480 case G_SUPPLICANT_STATE_COMPLETED:
6487 #if defined TIZEN_EXT_WIFI_MESH
6488 static void interface_abort_scan_result(const char *error,
6489 DBusMessageIter *iter, void *user_data)
6491 struct interface_scan_data *data = user_data;
6495 SUPPLICANT_DBG("error %s", error);
6502 data->callback(err, data->interface, data->user_data);
6507 int g_supplicant_interface_abort_scan(GSupplicantInterface *interface,
6508 GSupplicantInterfaceCallback callback, void *user_data)
6510 struct interface_scan_data *data;
6513 if (!interface->scanning)
6516 data = dbus_malloc0(sizeof(*data));
6520 data->interface = interface;
6521 data->path = g_strdup(interface->path);
6522 data->callback = callback;
6523 data->user_data = user_data;
6525 ret = supplicant_dbus_method_call(interface->path,
6526 SUPPLICANT_INTERFACE ".Interface", "AbortScan", NULL,
6527 interface_abort_scan_result, data, interface);
6538 int g_supplicant_interface_scan(GSupplicantInterface *interface,
6539 GSupplicantScanParams *scan_data,
6540 GSupplicantInterfaceCallback callback,
6543 struct interface_scan_data *data;
6546 ret = interface_ready_to_scan(interface);
6550 data = dbus_malloc0(sizeof(*data));
6554 data->interface = interface;
6555 data->path = g_strdup(interface->path);
6556 #if defined TIZEN_EXT
6557 data->interface->scan_callback = data->callback = callback;
6558 data->interface->scan_data = data->user_data = user_data;
6560 data->callback = callback;
6561 data->user_data = user_data;
6563 data->scan_params = scan_data;
6565 interface->scan_callback = callback;
6566 interface->scan_data = user_data;
6568 ret = supplicant_dbus_method_call(interface->path,
6569 SUPPLICANT_INTERFACE ".Interface", "Scan",
6570 interface_scan_params, interface_scan_result, data,
6581 #if defined TIZEN_EXT
6582 static void interface_signalpoll_result(const char *error,
6583 DBusMessageIter *iter, void *user_data)
6585 struct interface_signalpoll_data *data = user_data;
6587 dbus_int32_t maxspeed = 0;
6588 dbus_int32_t strength = 0;
6589 dbus_int32_t snr = 0;
6590 DBusMessageIter sub_iter, dict;
6594 SUPPLICANT_DBG("error: %s", error);
6598 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_VARIANT) {
6600 SUPPLICANT_DBG("invalid reply");
6604 dbus_message_iter_recurse(iter, &sub_iter);
6605 dbus_message_iter_recurse(&sub_iter, &dict);
6607 while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_DICT_ENTRY) {
6608 DBusMessageIter entry, value;
6611 dbus_message_iter_recurse(&dict, &entry);
6612 dbus_message_iter_get_basic(&entry, &key);
6613 dbus_message_iter_next(&entry);
6614 dbus_message_iter_recurse(&entry, &value);
6616 switch (dbus_message_iter_get_arg_type(&value)) {
6617 case DBUS_TYPE_INT32:
6618 if (g_strcmp0(key, "linkspeed") == 0) {
6619 dbus_message_iter_get_basic(&value, &maxspeed);
6620 SUPPLICANT_DBG("linkspeed = %d", maxspeed);
6622 } else if (g_strcmp0(key, "rssi") == 0) {
6623 dbus_message_iter_get_basic(&value, &strength);
6624 SUPPLICANT_DBG("Strength = %d", strength);
6626 } else if (g_strcmp0(key, "SNR") == 0) {
6627 dbus_message_iter_get_basic(&value, &snr);
6628 SUPPLICANT_DBG("SNR = %d", snr);
6632 dbus_message_iter_next(&dict);
6637 data->callback(err, maxspeed, strength, snr, data->user_data);
6643 int g_supplicant_interface_signalpoll(GSupplicantInterface *interface,
6644 GSupplicantMaxSpeedCallback callback,
6647 struct interface_signalpoll_data *data;
6653 if (!system_available)
6656 data = dbus_malloc0(sizeof(*data));
6660 data->interface = interface;
6661 data->path = g_strdup(interface->path);
6662 data->callback = callback;
6663 data->user_data = user_data;
6665 ret = supplicant_dbus_method_call(interface->path,
6666 SUPPLICANT_INTERFACE ".Interface", "SignalPoll",
6667 NULL, interface_signalpoll_result, data,
6679 static int parse_supplicant_error(DBusMessageIter *iter)
6681 int err = -ECONNABORTED;
6687 /* If the given passphrase is malformed wpa_s returns
6688 * "invalid message format" but this error should be interpreted as
6691 while (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_STRING) {
6692 dbus_message_iter_get_basic(iter, &key);
6693 if (strncmp(key, "psk", 3) == 0 ||
6694 strncmp(key, "wep_key", 7) == 0 ||
6695 strcmp(key, "invalid message format") == 0) {
6699 dbus_message_iter_next(iter);
6705 static void interface_select_network_result(const char *error,
6706 DBusMessageIter *iter, void *user_data)
6708 struct interface_connect_data *data = user_data;
6715 #if defined TIZEN_EXT
6716 SUPPLICANT_DBG("SelectNetwork errorFreq %s", error);
6718 SUPPLICANT_DBG("SelectNetwork error %s", error);
6720 err = parse_supplicant_error(iter);
6726 data->callback(err, data->interface, data->user_data);
6728 #if defined TIZEN_EXT
6729 g_free(data->ssid->ssid);
6730 g_free((char *)data->ssid->passphrase);
6731 g_free((char *)data->ssid->connector);
6732 g_free((char *)data->ssid->c_sign_key);
6733 g_free((char *)data->ssid->net_access_key);
6739 static void interface_select_network_params(DBusMessageIter *iter,
6742 struct interface_connect_data *data = user_data;
6743 GSupplicantInterface *interface = data->interface;
6744 #if defined TIZEN_EXT
6745 GSupplicantSSID *ssid = data->ssid;
6748 dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
6749 &interface->network_path);
6750 #if defined TIZEN_EXT
6751 if (!ssid->bssid_for_connect_len)
6752 dbus_message_iter_append_basic(iter, DBUS_TYPE_INT32, &ssid->freq);
6756 static void interface_add_network_result(const char *error,
6757 DBusMessageIter *iter, void *user_data)
6759 struct interface_connect_data *data = user_data;
6760 GSupplicantInterface *interface = data->interface;
6767 dbus_message_iter_get_basic(iter, &path);
6771 SUPPLICANT_DBG("PATH: %s", path);
6773 #if defined TIZEN_EXT
6774 if (interface->network_path)
6775 g_free(interface->network_path);
6777 interface->network_path = g_strdup(path);
6779 store_network_information(interface, data->ssid);
6781 #if defined TIZEN_EXT
6782 SUPPLICANT_DBG(".Interface.SelectNetworkFreq");
6783 GSupplicantSSID *ssid = data->ssid;
6785 if (!ssid->bssid_for_connect_len)
6786 supplicant_dbus_method_call(data->interface->path,
6787 SUPPLICANT_INTERFACE ".Interface", "SelectNetworkFreq",
6788 interface_select_network_params,
6789 interface_select_network_result, data,
6792 supplicant_dbus_method_call(data->interface->path,
6793 SUPPLICANT_INTERFACE ".Interface", "SelectNetwork",
6794 interface_select_network_params,
6795 interface_select_network_result, data,
6798 supplicant_dbus_method_call(data->interface->path,
6799 SUPPLICANT_INTERFACE ".Interface", "SelectNetwork",
6800 interface_select_network_params,
6801 interface_select_network_result, data,
6808 SUPPLICANT_DBG("AddNetwork error %s", error);
6810 if (interface_exists(data->interface, data->interface->path)) {
6811 err = parse_supplicant_error(iter);
6813 data->callback(err, data->interface, data->user_data);
6815 g_free(interface->network_path);
6816 interface->network_path = NULL;
6820 #if defined TIZEN_EXT
6821 g_free(data->ssid->ssid);
6822 g_free((char *)data->ssid->passphrase);
6823 g_free((char *)data->ssid->connector);
6824 g_free((char *)data->ssid->c_sign_key);
6825 g_free((char *)data->ssid->net_access_key);
6831 static void add_network_security_none(DBusMessageIter *dict)
6833 const char *auth_alg = "OPEN";
6835 supplicant_dbus_dict_append_basic(dict, "auth_alg",
6836 DBUS_TYPE_STRING, &auth_alg);
6839 static void add_network_security_wep(DBusMessageIter *dict,
6840 GSupplicantSSID *ssid)
6842 const char *auth_alg = "OPEN SHARED";
6843 dbus_uint32_t key_index = 0;
6845 supplicant_dbus_dict_append_basic(dict, "auth_alg",
6846 DBUS_TYPE_STRING, &auth_alg);
6848 if (ssid->passphrase) {
6849 int size = strlen(ssid->passphrase);
6850 if (size == 10 || size == 26) {
6851 unsigned char *key = g_try_malloc(13);
6855 memset(tmp, 0, sizeof(tmp));
6859 for (i = 0; i < size / 2; i++) {
6860 memcpy(tmp, ssid->passphrase + (i * 2), 2);
6861 key[i] = (unsigned char) strtol(tmp, NULL, 16);
6864 supplicant_dbus_dict_append_fixed_array(dict,
6869 } else if (size == 5 || size == 13) {
6870 unsigned char *key = g_try_malloc(13);
6876 for (i = 0; i < size; i++)
6877 key[i] = (unsigned char) ssid->passphrase[i];
6879 supplicant_dbus_dict_append_fixed_array(dict,
6885 supplicant_dbus_dict_append_basic(dict,
6890 supplicant_dbus_dict_append_basic(dict, "wep_tx_keyidx",
6891 DBUS_TYPE_UINT32, &key_index);
6895 static dbus_bool_t is_psk_raw_key(const char *psk)
6899 /* A raw key is always 64 bytes length... */
6900 if (strlen(psk) != 64)
6903 /* ... and its content is in hex representation */
6904 for (i = 0; i < 64; i++)
6905 if (!isxdigit((unsigned char) psk[i]))
6911 static unsigned char hexchar2bin(char c)
6913 if ((c >= '0') && (c <= '9'))
6915 else if ((c >= 'A') && (c <= 'F'))
6916 return c - 'A' + 10;
6917 else if ((c >= 'a') && (c <= 'f'))
6918 return c - 'a' + 10;
6923 static void hexstring2bin(const char *string, unsigned char *data,
6928 for (i = 0; i < data_len; i++)
6929 data[i] = (hexchar2bin(string[i * 2 + 0]) << 4 |
6930 hexchar2bin(string[i * 2 + 1]) << 0);
6933 static void add_network_security_psk(DBusMessageIter *dict,
6934 GSupplicantSSID *ssid)
6936 if (ssid->passphrase && strlen(ssid->passphrase) > 0) {
6937 const char *key = "psk";
6939 if (is_psk_raw_key(ssid->passphrase)) {
6940 unsigned char data[32];
6941 unsigned char *datap = data;
6943 /* The above pointer alias is required by D-Bus because
6944 * with D-Bus and GCC, non-heap-allocated arrays cannot
6945 * be passed directly by their base pointer. */
6947 hexstring2bin(ssid->passphrase, datap, sizeof(data));
6949 supplicant_dbus_dict_append_fixed_array(dict,
6950 key, DBUS_TYPE_BYTE,
6951 &datap, sizeof(data));
6953 supplicant_dbus_dict_append_basic(dict,
6954 key, DBUS_TYPE_STRING,
6959 static void add_network_security_tls(DBusMessageIter *dict,
6960 GSupplicantSSID *ssid)
6963 * For TLS, we at least need:
6964 * The client certificate
6965 * The client private key file
6966 * The client private key file password
6968 * The Authority certificate is optional.
6970 if (!ssid->client_cert_path)
6973 if (!ssid->private_key_path)
6976 if (!ssid->private_key_passphrase)
6979 if (ssid->ca_cert_path)
6980 supplicant_dbus_dict_append_basic(dict, "ca_cert",
6981 DBUS_TYPE_STRING, &ssid->ca_cert_path);
6983 supplicant_dbus_dict_append_basic(dict, "private_key",
6985 &ssid->private_key_path);
6986 supplicant_dbus_dict_append_basic(dict, "private_key_passwd",
6988 &ssid->private_key_passphrase);
6989 supplicant_dbus_dict_append_basic(dict, "client_cert",
6991 &ssid->client_cert_path);
6994 static void add_network_security_peap(DBusMessageIter *dict,
6995 GSupplicantSSID *ssid)
7000 * For PEAP/TTLS, we at least need
7001 * The authority certificate
7002 * The 2nd phase authentication method
7003 * The 2nd phase passphrase
7005 * The Client certificate is optional although strongly recommended
7006 * When setting it, we need in addition
7007 * The Client private key file
7008 * The Client private key file password
7010 if (!ssid->passphrase)
7013 if (!ssid->phase2_auth)
7016 if (ssid->client_cert_path) {
7017 if (!ssid->private_key_path)
7020 #if !defined TIZEN_EXT
7021 if (!ssid->private_key_passphrase)
7025 supplicant_dbus_dict_append_basic(dict, "client_cert",
7027 &ssid->client_cert_path);
7029 supplicant_dbus_dict_append_basic(dict, "private_key",
7031 &ssid->private_key_path);
7033 #if !defined TIZEN_EXT
7034 supplicant_dbus_dict_append_basic(dict, "private_key_passwd",
7036 &ssid->private_key_passphrase);
7041 if(g_strcmp0(ssid->phase2_auth, "GTC") == 0 && g_strcmp0(ssid->eap, "ttls") == 0)
7042 phase2_auth = g_strdup_printf("autheap=%s", ssid->phase2_auth);
7043 else if (g_str_has_prefix(ssid->phase2_auth, "EAP-")) {
7044 phase2_auth = g_strdup_printf("autheap=%s",
7045 ssid->phase2_auth + strlen("EAP-"));
7047 phase2_auth = g_strdup_printf("auth=%s", ssid->phase2_auth);
7049 supplicant_dbus_dict_append_basic(dict, "password",
7053 if (ssid->ca_cert_path)
7054 supplicant_dbus_dict_append_basic(dict, "ca_cert",
7056 &ssid->ca_cert_path);
7058 supplicant_dbus_dict_append_basic(dict, "phase2",
7062 g_free(phase2_auth);
7065 #if defined TIZEN_EXT
7066 static void add_network_security_aka_sim(DBusMessageIter *dict,
7067 GSupplicantSSID *ssid)
7069 if (!ssid->passphrase)
7072 supplicant_dbus_dict_append_basic(dict, "password",
7077 static void add_network_security_fast(DBusMessageIter *dict,
7078 GSupplicantSSID *ssid)
7081 * For FAST, we at least need:
7083 * phase1 (provisiong information)
7087 /* Allow provisioing both authenticated and unauthenticated */
7088 const char *phase1 = "fast_provisioning=2";
7089 supplicant_dbus_dict_append_basic(dict, "phase1",
7093 SUPPLICANT_DBG("pac_file [%s]", ssid->pac_file);
7095 supplicant_dbus_dict_append_basic(dict, "pac_file",
7099 supplicant_dbus_dict_append_basic(dict, "password",
7105 static void add_network_security_eap(DBusMessageIter *dict,
7106 GSupplicantSSID *ssid)
7110 #if defined TIZEN_EXT
7113 if (!ssid->eap || !ssid->identity)
7117 if (g_strcmp0(ssid->eap, "tls") == 0) {
7118 add_network_security_tls(dict, ssid);
7119 } else if (g_strcmp0(ssid->eap, "peap") == 0 ||
7120 g_strcmp0(ssid->eap, "ttls") == 0) {
7121 #if defined TIZEN_EXT
7122 if (!ssid->identity)
7125 add_network_security_peap(dict, ssid);
7127 #if defined TIZEN_EXT
7128 } else if (g_strcmp0(ssid->eap, "sim") == 0 ||
7129 g_strcmp0(ssid->eap, "aka") == 0 ||
7130 g_strcmp0(ssid->eap, "aka'") == 0) {
7131 add_network_security_aka_sim(dict, ssid);
7132 } else if (g_strcmp0(ssid->eap, "pwd") == 0) {
7133 if(!ssid->passphrase)
7135 supplicant_dbus_dict_append_basic(dict, "password",
7138 } else if (g_strcmp0(ssid->eap, "fast") == 0){
7139 if (!ssid->identity || !ssid->passphrase)
7142 add_network_security_fast(dict, ssid);
7147 eap_value = g_ascii_strup(ssid->eap, -1);
7149 supplicant_dbus_dict_append_basic(dict, "eap",
7152 #if defined TIZEN_EXT
7153 if (ssid->identity != NULL)
7154 supplicant_dbus_dict_append_basic(dict, "identity",
7158 supplicant_dbus_dict_append_basic(dict, "identity",
7162 if(ssid->anonymous_identity)
7163 supplicant_dbus_dict_append_basic(dict, "anonymous_identity",
7165 &ssid->anonymous_identity);
7167 if(ssid->subject_match)
7168 supplicant_dbus_dict_append_basic(dict, "subject_match",
7170 &ssid->subject_match);
7172 if(ssid->altsubject_match)
7173 supplicant_dbus_dict_append_basic(dict, "altsubject_match",
7175 &ssid->altsubject_match);
7177 if(ssid->domain_suffix_match)
7178 supplicant_dbus_dict_append_basic(dict, "domain_suffix_match",
7180 &ssid->domain_suffix_match);
7182 if(ssid->domain_match)
7183 supplicant_dbus_dict_append_basic(dict, "domain_match",
7185 &ssid->domain_match);
7190 static void add_network_security_ciphers(DBusMessageIter *dict,
7191 GSupplicantSSID *ssid)
7193 unsigned int p_cipher, g_cipher, i;
7194 char *pairwise, *group;
7195 char *pair_ciphers[4];
7196 char *group_ciphers[5];
7198 p_cipher = ssid->pairwise_cipher;
7199 g_cipher = ssid->group_cipher;
7201 if (p_cipher == 0 && g_cipher == 0)
7206 if (p_cipher & G_SUPPLICANT_PAIRWISE_CCMP)
7207 pair_ciphers[i++] = "CCMP";
7209 if (p_cipher & G_SUPPLICANT_PAIRWISE_TKIP)
7210 pair_ciphers[i++] = "TKIP";
7212 if (p_cipher & G_SUPPLICANT_PAIRWISE_NONE)
7213 pair_ciphers[i++] = "NONE";
7215 pair_ciphers[i] = NULL;
7219 if (g_cipher & G_SUPPLICANT_GROUP_CCMP)
7220 group_ciphers[i++] = "CCMP";
7222 if (g_cipher & G_SUPPLICANT_GROUP_TKIP)
7223 group_ciphers[i++] = "TKIP";
7225 if (g_cipher & G_SUPPLICANT_GROUP_WEP104)
7226 group_ciphers[i++] = "WEP104";
7228 if (g_cipher & G_SUPPLICANT_GROUP_WEP40)
7229 group_ciphers[i++] = "WEP40";
7231 group_ciphers[i] = NULL;
7233 pairwise = g_strjoinv(" ", pair_ciphers);
7234 group = g_strjoinv(" ", group_ciphers);
7236 SUPPLICANT_DBG("cipher %s %s", pairwise, group);
7238 supplicant_dbus_dict_append_basic(dict, "pairwise",
7241 supplicant_dbus_dict_append_basic(dict, "group",
7249 static void add_network_security_proto(DBusMessageIter *dict,
7250 GSupplicantSSID *ssid)
7252 unsigned int protocol, i;
7256 protocol = ssid->protocol;
7263 if (protocol & G_SUPPLICANT_PROTO_RSN)
7264 protos[i++] = "RSN";
7266 if (protocol & G_SUPPLICANT_PROTO_WPA)
7267 protos[i++] = "WPA";
7271 proto = g_strjoinv(" ", protos);
7273 SUPPLICANT_DBG("proto %s", proto);
7275 supplicant_dbus_dict_append_basic(dict, "proto",
7282 #if defined TIZEN_EXT
7283 static void add_network_ieee80211w(DBusMessageIter *dict, GSupplicantSSID *ssid)
7285 if (ssid->security != G_SUPPLICANT_SECURITY_SAE
7286 && ssid->security != G_SUPPLICANT_SECURITY_OWE
7287 && ssid->security != G_SUPPLICANT_SECURITY_PSK_SHA256
7288 && ssid->security != G_SUPPLICANT_SECURITY_DPP)
7291 supplicant_dbus_dict_append_basic(dict, "ieee80211w", DBUS_TYPE_UINT32,
7295 static void add_network_security_connector(DBusMessageIter *dict, GSupplicantSSID *ssid)
7297 if (ssid->connector && strlen(ssid->connector) > 0) {
7298 const char *key = "dpp_connector";
7300 supplicant_dbus_dict_append_basic(dict,
7301 key, DBUS_TYPE_STRING,
7306 static size_t convert_hexstr_to_bin(const char *hex_str, unsigned char **bin)
7308 unsigned char *bin_res = NULL;
7309 unsigned int i, j, hex;
7312 if (!hex_str || strlen(hex_str) == 0)
7315 hex_str_len = strlen(hex_str);
7316 bin_res = g_try_malloc0(hex_str_len / 2);
7321 for (i = 0; i < hex_str_len; i+=2) {
7322 sscanf(hex_str + i, "%02x", &hex);
7327 return hex_str_len / 2;
7330 static void add_network_security_c_sign_key(DBusMessageIter *dict, GSupplicantSSID *ssid)
7332 if (ssid->c_sign_key && strlen(ssid->c_sign_key) > 0) {
7333 const char *key = "dpp_csign";
7334 unsigned char *bin_csign = NULL;
7335 size_t bin_csign_len = convert_hexstr_to_bin(ssid->c_sign_key, &bin_csign);
7336 if (bin_csign_len != 0)
7337 supplicant_dbus_dict_append_fixed_array(dict,
7338 key, DBUS_TYPE_BYTE,
7339 &bin_csign, bin_csign_len);
7344 static void add_network_security_net_access_key(DBusMessageIter *dict, GSupplicantSSID *ssid)
7346 if (ssid->net_access_key && strlen(ssid->net_access_key) > 0) {
7347 const char *key = "dpp_netaccesskey";
7348 unsigned char *bin_netaccesskey = NULL;
7349 size_t bin_netaccesskey_len = convert_hexstr_to_bin(ssid->net_access_key, &bin_netaccesskey);
7350 if (bin_netaccesskey_len != 0)
7351 supplicant_dbus_dict_append_fixed_array(dict,
7352 key, DBUS_TYPE_BYTE,
7353 &bin_netaccesskey, bin_netaccesskey_len);
7354 g_free(bin_netaccesskey);
7360 static void add_network_security(DBusMessageIter *dict, GSupplicantSSID *ssid)
7364 switch (ssid->security) {
7365 case G_SUPPLICANT_SECURITY_NONE:
7367 add_network_security_none(dict);
7368 add_network_security_ciphers(dict, ssid);
7370 case G_SUPPLICANT_SECURITY_UNKNOWN:
7371 case G_SUPPLICANT_SECURITY_WEP:
7373 add_network_security_wep(dict, ssid);
7374 add_network_security_ciphers(dict, ssid);
7376 case G_SUPPLICANT_SECURITY_PSK:
7377 #if defined TIZEN_EXT
7378 if (ssid->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_PSK)
7379 key_mgmt = "FT-PSK WPA-PSK";
7381 key_mgmt = "WPA-PSK";
7383 key_mgmt = "WPA-PSK";
7385 add_network_security_psk(dict, ssid);
7386 add_network_security_ciphers(dict, ssid);
7387 add_network_security_proto(dict, ssid);
7389 case G_SUPPLICANT_SECURITY_IEEE8021X:
7390 key_mgmt = "WPA-EAP";
7391 add_network_security_eap(dict, ssid);
7392 add_network_security_ciphers(dict, ssid);
7393 add_network_security_proto(dict, ssid);
7395 #if defined TIZEN_EXT
7396 case G_SUPPLICANT_SECURITY_PSK_SHA256:
7397 if (ssid->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_PSK)
7398 key_mgmt = "WPA-PSK-SHA256 WPA-PSK";
7400 key_mgmt = "WPA-PSK-SHA256";
7401 add_network_security_psk(dict, ssid);
7402 add_network_security_ciphers(dict, ssid);
7403 add_network_security_proto(dict, ssid);
7405 case G_SUPPLICANT_SECURITY_FT_PSK:
7406 key_mgmt = "FT-PSK";
7407 add_network_security_psk(dict, ssid);
7408 add_network_security_ciphers(dict, ssid);
7409 add_network_security_proto(dict, ssid);
7411 case G_SUPPLICANT_SECURITY_FT_IEEE8021X:
7412 key_mgmt = "FT-EAP";
7413 add_network_security_eap(dict, ssid);
7414 add_network_security_ciphers(dict, ssid);
7415 add_network_security_proto(dict, ssid);
7417 case G_SUPPLICANT_SECURITY_SAE:
7418 if (ssid->keymgmt & G_SUPPLICANT_KEYMGMT_FT_SAE) {
7419 if (ssid->keymgmt & G_SUPPLICANT_KEYMGMT_SAE)
7420 key_mgmt = "FT-SAE SAE";
7422 key_mgmt = "FT-SAE";
7423 } else if (ssid->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_PSK)
7424 key_mgmt = "SAE WPA-PSK";
7427 add_network_security_psk(dict, ssid);
7429 case G_SUPPLICANT_SECURITY_OWE:
7431 add_network_security_ciphers(dict, ssid);
7432 add_network_security_proto(dict, ssid);
7434 case G_SUPPLICANT_SECURITY_DPP:
7436 add_network_security_connector(dict, ssid);
7437 add_network_security_c_sign_key(dict, ssid);
7438 add_network_security_net_access_key(dict, ssid);
7443 supplicant_dbus_dict_append_basic(dict, "key_mgmt",
7444 DBUS_TYPE_STRING, &key_mgmt);
7447 static void add_network_mode(DBusMessageIter *dict, GSupplicantSSID *ssid)
7451 switch (ssid->mode) {
7452 case G_SUPPLICANT_MODE_UNKNOWN:
7453 case G_SUPPLICANT_MODE_INFRA:
7456 case G_SUPPLICANT_MODE_IBSS:
7459 case G_SUPPLICANT_MODE_MASTER:
7462 #if defined TIZEN_EXT_WIFI_MESH
7463 case G_SUPPLICANT_MODE_MESH:
7469 supplicant_dbus_dict_append_basic(dict, "mode",
7470 DBUS_TYPE_UINT32, &mode);
7473 static void interface_add_network_params(DBusMessageIter *iter, void *user_data)
7475 DBusMessageIter dict;
7476 struct interface_connect_data *data = user_data;
7477 GSupplicantSSID *ssid = data->ssid;
7478 #if defined TIZEN_EXT
7479 GSupplicantInterface *interface = data->interface;
7482 supplicant_dbus_dict_open(iter, &dict);
7484 if (ssid->scan_ssid)
7485 supplicant_dbus_dict_append_basic(&dict, "scan_ssid",
7486 DBUS_TYPE_UINT32, &ssid->scan_ssid);
7489 supplicant_dbus_dict_append_basic(&dict, "frequency",
7490 DBUS_TYPE_UINT32, &ssid->freq);
7493 supplicant_dbus_dict_append_basic(&dict, "bgscan",
7494 DBUS_TYPE_STRING, &ssid->bgscan);
7496 add_network_mode(&dict, ssid);
7498 add_network_security(&dict, ssid);
7500 #if defined TIZEN_EXT
7501 add_network_ieee80211w(&dict, ssid);
7504 supplicant_dbus_dict_append_fixed_array(&dict, "ssid",
7505 DBUS_TYPE_BYTE, &ssid->ssid,
7508 #if defined TIZEN_EXT
7509 bool owe_transition_mode = FALSE;
7510 if ((ssid->security == G_SUPPLICANT_SECURITY_OWE) && !(ssid->keymgmt & G_SUPPLICANT_KEYMGMT_OWE))
7511 owe_transition_mode = TRUE;
7513 if (ssid->bssid && !owe_transition_mode) {
7515 bssid = g_try_malloc0(18);
7516 if (bssid == NULL) {
7517 SUPPLICANT_DBG("memory allocation error");
7518 supplicant_dbus_dict_close(iter, &dict);
7522 if (ssid->bssid_for_connect_len) {
7523 snprintf(bssid, 18, MACSTR, MAC2STR(ssid->bssid_for_connect));
7524 memcpy(interface->add_network_bssid, ssid->bssid_for_connect, WIFI_BSSID_LEN_MAX);
7526 snprintf(bssid, 18, MACSTR, MAC2STR(ssid->bssid));
7527 memcpy(interface->add_network_bssid, ssid->bssid, WIFI_BSSID_LEN_MAX);
7530 SUPPLICANT_DBG("bssid [" MACSTR "]", MAC2STR(interface->add_network_bssid));
7532 supplicant_dbus_dict_append_basic(&dict, "bssid",
7533 DBUS_TYPE_STRING, &bssid);
7538 supplicant_dbus_dict_close(iter, &dict);
7541 static void interface_wps_start_result(const char *error,
7542 DBusMessageIter *iter, void *user_data)
7544 struct interface_connect_data *data = user_data;
7551 SUPPLICANT_DBG("error: %s", error);
7552 err = parse_supplicant_error(iter);
7556 data->callback(err, data->interface, data->user_data);
7563 static void interface_add_wps_params(DBusMessageIter *iter, void *user_data)
7565 struct interface_connect_data *data = user_data;
7566 GSupplicantSSID *ssid = data->ssid;
7567 const char *role = "enrollee", *type;
7568 DBusMessageIter dict;
7572 supplicant_dbus_dict_open(iter, &dict);
7574 supplicant_dbus_dict_append_basic(&dict, "Role",
7575 DBUS_TYPE_STRING, &role);
7578 if (ssid->pin_wps) {
7580 supplicant_dbus_dict_append_basic(&dict, "Pin",
7581 DBUS_TYPE_STRING, &ssid->pin_wps);
7584 supplicant_dbus_dict_append_basic(&dict, "Type",
7585 DBUS_TYPE_STRING, &type);
7587 #if defined TIZEN_EXT
7589 supplicant_dbus_dict_append_fixed_array(&dict, "Bssid",
7590 DBUS_TYPE_BYTE, &ssid->bssid, 6);
7593 supplicant_dbus_dict_close(iter, &dict);
7596 static void wps_start(const char *error, DBusMessageIter *iter, void *user_data)
7598 struct interface_connect_data *data = user_data;
7603 SUPPLICANT_DBG("error: %s", error);
7610 #if defined TIZEN_EXT
7611 GSupplicantSSID *ssid = data->ssid;
7612 if (ssid->pin_wps != NULL) {
7613 if (!g_utf8_validate(ssid->pin_wps, 8, NULL)) {
7614 SUPPLICANT_DBG("Invalid characters in WPS_PIN");
7621 supplicant_dbus_method_call(data->interface->path,
7622 SUPPLICANT_INTERFACE ".Interface.WPS", "Start",
7623 interface_add_wps_params,
7624 interface_wps_start_result, data, NULL);
7627 static void wps_process_credentials(DBusMessageIter *iter, void *user_data)
7629 dbus_bool_t credentials = TRUE;
7633 dbus_message_iter_append_basic(iter, DBUS_TYPE_BOOLEAN, &credentials);
7637 #if defined TIZEN_EXT
7638 #define NETCONFIG_SERVICE "net.netconfig"
7639 #define NETCONFIG_WIFI_PATH "/net/netconfig/wifi"
7640 #define NETCONFIG_WIFI_INTERFACE NETCONFIG_SERVICE ".wifi"
7642 struct dec_method_call_data {
7643 struct interface_connect_data *data;
7644 DBusPendingCall *pending_call;
7647 static struct dec_method_call_data decrypt_request_data;
7649 static void crypt_method_call_cancel(void)
7651 if (decrypt_request_data.pending_call) {
7652 dbus_pending_call_cancel(decrypt_request_data.pending_call);
7653 dbus_pending_call_unref(decrypt_request_data.pending_call);
7654 decrypt_request_data.pending_call = NULL;
7657 g_free(decrypt_request_data.data->path);
7658 g_free(decrypt_request_data.data->ssid);
7659 dbus_free(decrypt_request_data.data);
7660 decrypt_request_data.data = NULL;
7663 static void decryption_request_reply(DBusPendingCall *call,
7668 DBusMessageIter args;
7671 struct interface_connect_data *data = user_data;
7675 reply = dbus_pending_call_steal_reply(call);
7677 dbus_error_init(&error);
7678 if (dbus_set_error_from_message(&error, reply)) {
7679 SUPPLICANT_DBG("decryption_request_reply() %s %s", error.name, error.message);
7680 dbus_error_free(&error);
7685 if (!g_str_has_prefix(data->interface->path, "/")) {
7686 SUPPLICANT_DBG("Invalid path %s", data->interface->path);
7691 if (dbus_message_iter_init(reply, &args) == FALSE) {
7692 SUPPLICANT_DBG("dbus_message_iter_init() failed");
7697 dbus_message_iter_get_basic(&args, &out_data);
7698 data->ssid->passphrase = g_strdup((const gchar *)out_data);
7700 ret = supplicant_dbus_method_call(data->interface->path,
7701 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
7702 interface_add_network_params,
7703 interface_add_network_result, data,
7708 SUPPLICANT_DBG("AddNetwork failed %d", ret);
7709 callback_assoc_failed(decrypt_request_data.data->user_data);
7711 g_free(data->ssid->ssid);
7712 g_free((char *)data->ssid->passphrase);
7713 g_free((char *)data->ssid->connector);
7714 g_free((char *)data->ssid->c_sign_key);
7715 g_free((char *)data->ssid->net_access_key);
7720 dbus_message_unref(reply);
7721 dbus_pending_call_unref(call);
7723 decrypt_request_data.pending_call = NULL;
7724 decrypt_request_data.data = NULL;
7727 static int send_decryption_request(const char *passphrase,
7728 struct interface_connect_data *data)
7730 DBusMessage *msg = NULL;
7731 DBusPendingCall *call;
7733 SUPPLICANT_DBG("Decryption request");
7736 SUPPLICANT_DBG("Invalid parameter");
7743 msg = dbus_message_new_method_call(NETCONFIG_SERVICE, NETCONFIG_WIFI_PATH,
7744 NETCONFIG_WIFI_INTERFACE, "DecryptPassphrase");
7748 #if defined TIZEN_EXT
7749 if (!dbus_message_append_args(msg, DBUS_TYPE_STRING, &passphrase,
7750 DBUS_TYPE_INVALID)) {
7751 SUPPLICANT_DBG("Could not fulfill decryption request");
7755 dbus_message_append_args(msg, DBUS_TYPE_STRING, &passphrase,
7759 if (!dbus_connection_send_with_reply(connection, msg,
7760 &call, DBUS_TIMEOUT_USE_DEFAULT)) {
7761 dbus_message_unref(msg);
7766 dbus_message_unref(msg);
7770 decrypt_request_data.pending_call = call;
7771 decrypt_request_data.data = data;
7773 dbus_pending_call_set_notify(call, decryption_request_reply, data, NULL);
7774 dbus_message_unref(msg);
7776 SUPPLICANT_DBG("Decryption request succeeded");
7781 static void decrypt_conf_obj_reply(DBusPendingCall *call,
7786 DBusMessageIter iter, dict;
7789 struct interface_connect_data *data = user_data;
7791 reply = dbus_pending_call_steal_reply(call);
7793 dbus_error_init(&error);
7794 if (dbus_set_error_from_message(&error, reply)) {
7795 SUPPLICANT_DBG("decryption_conf_obj_reply() %s %s", error.name, error.message);
7796 dbus_error_free(&error);
7801 if (dbus_message_iter_init(reply, &iter) == FALSE) {
7802 SUPPLICANT_DBG("dbus_message_iter_init() failed");
7807 dbus_message_iter_recurse(&iter, &dict);
7809 while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_DICT_ENTRY) {
7810 DBusMessageIter entry, value;
7813 dbus_message_iter_recurse(&dict, &entry);
7814 dbus_message_iter_get_basic(&entry, &key);
7815 dbus_message_iter_next(&entry);
7816 dbus_message_iter_recurse(&entry, &value);
7817 if (dbus_message_iter_get_arg_type(&value) == DBUS_TYPE_STRING) {
7818 if (g_strcmp0(key, "connector") == 0) {
7819 dbus_message_iter_get_basic(&value, &out_data);
7820 data->ssid->connector = g_strdup((const gchar *)out_data);
7821 SUPPLICANT_DBG("connector %s", data->ssid->connector);
7822 } else if (g_strcmp0(key, "c_sign_key") == 0) {
7823 dbus_message_iter_get_basic(&value, &out_data);
7824 data->ssid->c_sign_key = g_strdup((const gchar *)out_data);
7825 SUPPLICANT_DBG("c_sign_key %s", data->ssid->c_sign_key);
7826 } else if (g_strcmp0(key, "net_access_key") == 0) {
7827 dbus_message_iter_get_basic(&value, &out_data);
7828 data->ssid->net_access_key = g_strdup((const gchar *)out_data);
7829 SUPPLICANT_DBG("net_access_key %s", data->ssid->net_access_key);
7832 dbus_message_iter_next(&dict);
7835 ret = supplicant_dbus_method_call(data->interface->path,
7836 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
7837 interface_add_network_params,
7838 interface_add_network_result, data,
7843 SUPPLICANT_DBG("AddNetwork failed %d", ret);
7844 callback_assoc_failed(decrypt_request_data.data->user_data);
7846 g_free(data->ssid->ssid);
7847 g_free((char *)data->ssid->connector);
7848 g_free((char *)data->ssid->c_sign_key);
7849 g_free((char *)data->ssid->net_access_key);
7854 dbus_message_unref(reply);
7855 dbus_pending_call_unref(call);
7857 decrypt_request_data.pending_call = NULL;
7858 decrypt_request_data.data = NULL;
7861 static int send_decryption_conf_obj_request(GSupplicantSSID *ssid,
7862 struct interface_connect_data *data)
7864 DBusMessage *msg = NULL;
7865 DBusPendingCall *call;
7867 SUPPLICANT_DBG("Decryption configuration object request");
7870 SUPPLICANT_DBG("Invalid parameter");
7877 msg = dbus_message_new_method_call(NETCONFIG_SERVICE, NETCONFIG_WIFI_PATH,
7878 NETCONFIG_WIFI_INTERFACE, "DecryptConfObj");
7882 dbus_message_append_args(msg, DBUS_TYPE_STRING, &ssid->connector,
7884 dbus_message_append_args(msg, DBUS_TYPE_STRING, &ssid->c_sign_key,
7886 dbus_message_append_args(msg, DBUS_TYPE_STRING, &ssid->net_access_key,
7889 if (!dbus_connection_send_with_reply(connection, msg,
7890 &call, DBUS_TIMEOUT_USE_DEFAULT)) {
7891 dbus_message_unref(msg);
7896 dbus_message_unref(msg);
7900 decrypt_request_data.pending_call = call;
7901 decrypt_request_data.data = data;
7903 dbus_pending_call_set_notify(call, decrypt_conf_obj_reply, data, NULL);
7904 dbus_message_unref(msg);
7906 SUPPLICANT_DBG("Decrypt Conf Obj request succeeded");
7911 static bool is_valid_config_object(GSupplicantSSID *ssid)
7913 return ((ssid->connector &&
7914 g_strcmp0(ssid->connector, "") != 0) &&
7915 (ssid->c_sign_key &&
7916 g_strcmp0(ssid->c_sign_key, "") != 0) &&
7917 (ssid->net_access_key &&
7918 g_strcmp0(ssid->net_access_key, "") != 0));
7922 int g_supplicant_interface_connect(GSupplicantInterface *interface,
7923 GSupplicantSSID *ssid,
7924 GSupplicantInterfaceCallback callback,
7927 struct interface_connect_data *data;
7928 struct interface_data *intf_data;
7936 if (!system_available)
7939 /* TODO: Check if we're already connected and switch */
7941 data = dbus_malloc0(sizeof(*data));
7945 data->interface = interface;
7946 data->path = g_strdup(interface->path);
7947 data->callback = callback;
7949 data->user_data = user_data;
7951 if (ssid->use_wps) {
7952 g_free(interface->wps_cred.key);
7953 memset(&interface->wps_cred, 0,
7954 sizeof(struct _GSupplicantWpsCredentials));
7956 ret = supplicant_dbus_property_set(interface->path,
7957 SUPPLICANT_INTERFACE ".Interface.WPS",
7958 "ProcessCredentials", DBUS_TYPE_BOOLEAN_AS_STRING,
7959 wps_process_credentials, wps_start, data, interface);
7961 /* By the time there is a request for connect and the network
7962 * path is not NULL it means that connman has not removed the
7963 * previous network pointer. This can happen in the case AP
7964 * deauthenticated client and connman does not remove the
7965 * previously connected network pointer. This causes supplicant
7966 * to reallocate the memory for struct wpa_ssid again even if it
7967 * is the same SSID. This causes memory usage of wpa_supplicnat
7968 * to go high. The idea here is that if the previously connected
7969 * network is not removed at the time of next connection attempt
7970 * check if the network path is not NULL. In case it is non-NULL
7971 * first remove the network and then once removal is successful, add
7975 if (interface->network_path != NULL) {
7980 * If this add network is for the same network for
7981 * which wpa_supplicant already has a profile then do
7982 * not need to add another profile. Only if the
7983 * profile that needs to get added is different from
7984 * what is there in wpa_s delete the current one. A
7985 * network is identified by its SSID, security_type
7986 * and passphrase (private passphrase in case security
7989 if (compare_network_parameters(interface, ssid)) {
7993 intf_data = dbus_malloc0(sizeof(*intf_data));
7997 intf_data->interface = interface;
7998 intf_data->path = g_strdup(interface->path);
7999 intf_data->callback = callback;
8000 intf_data->ssid = ssid;
8001 intf_data->user_data = user_data;
8002 intf_data->network_remove_in_progress = TRUE;
8003 network_remove(intf_data);
8005 #if defined TIZEN_EXT
8006 if (ssid->passphrase &&
8007 g_strcmp0(ssid->passphrase, "") != 0 &&
8008 #if defined TIZEN_EXT_WIFI_MESH
8009 ssid->mode != G_SUPPLICANT_MODE_MESH &&
8012 ret = send_decryption_request(ssid->passphrase, data);
8014 SUPPLICANT_DBG("Decryption request failed %d", ret);
8015 } else if (is_valid_config_object(ssid)) {
8016 ret = send_decryption_conf_obj_request(ssid, data);
8018 SUPPLICANT_DBG("Decryption Conf Obj request failed %d", ret);
8022 ret = supplicant_dbus_method_call(interface->path,
8023 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
8024 interface_add_network_params,
8025 interface_add_network_result, data,
8036 return -EINPROGRESS;
8039 static void network_remove_result(const char *error,
8040 DBusMessageIter *iter, void *user_data)
8042 struct interface_data *data = user_data;
8043 struct interface_connect_data *connect_data;
8050 SUPPLICANT_DBG("error: %s", error);
8052 if (g_strcmp0("org.freedesktop.DBus.Error.UnknownMethod",
8054 result = -ECONNABORTED;
8057 g_free(data->interface->network_path);
8058 data->interface->network_path = NULL;
8060 remove_network_information(data->interface);
8062 if (data->network_remove_in_progress == TRUE) {
8063 data->network_remove_in_progress = FALSE;
8064 connect_data = dbus_malloc0(sizeof(*connect_data));
8068 connect_data->interface = data->interface;
8069 connect_data->path = g_strdup(data->path);
8070 connect_data->callback = data->callback;
8071 connect_data->ssid = data->ssid;
8072 connect_data->user_data = data->user_data;
8074 #if defined TIZEN_EXT
8076 if (data->ssid->passphrase && g_strcmp0(data->ssid->passphrase, "") != 0
8077 && !data->ssid->eap) {
8078 ret = send_decryption_request(data->ssid->passphrase, connect_data);
8080 SUPPLICANT_DBG("Decryption request failed %d", ret);
8081 g_free(connect_data->ssid);
8082 g_free(connect_data->path);
8083 dbus_free(connect_data);
8085 } else if (is_valid_config_object(data->ssid)) {
8086 ret = send_decryption_conf_obj_request(data->ssid, connect_data);
8088 SUPPLICANT_DBG("Decryption Conf Obj request failed %d", ret);
8089 g_free(connect_data->ssid);
8090 g_free(connect_data->path);
8091 dbus_free(connect_data);
8095 supplicant_dbus_method_call(data->interface->path,
8096 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
8097 interface_add_network_params,
8098 interface_add_network_result, connect_data,
8099 connect_data->interface);
8102 data->callback(result, data->interface, data->user_data);
8108 static void network_remove_params(DBusMessageIter *iter, void *user_data)
8110 struct interface_data *data = user_data;
8111 const char *path = data->interface->network_path;
8113 SUPPLICANT_DBG("path %s", path);
8115 dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH, &path);
8118 static int network_remove(struct interface_data *data)
8120 GSupplicantInterface *interface = data->interface;
8124 #if defined TIZEN_EXT
8125 GSupplicantInterface *intf = NULL;
8127 * Check if 'interface' is valid
8129 intf = g_hash_table_lookup(interface_table, interface->path);
8134 return supplicant_dbus_method_call(interface->path,
8135 SUPPLICANT_INTERFACE ".Interface", "RemoveNetwork",
8136 network_remove_params, network_remove_result, data,
8140 static void interface_disconnect_result(const char *error,
8141 DBusMessageIter *iter, void *user_data)
8143 struct interface_data *data = user_data;
8150 SUPPLICANT_DBG("error: %s", error);
8152 if (g_strcmp0("org.freedesktop.DBus.Error.UnknownMethod",
8154 result = -ECONNABORTED;
8157 /* If we are disconnecting from previous WPS successful
8158 * association. i.e.: it did not went through AddNetwork,
8159 * and interface->network_path was never set. */
8160 if (!data->interface->network_path) {
8162 data->callback(result, data->interface,
8170 if (result < 0 && data->callback) {
8171 data->callback(result, data->interface, data->user_data);
8172 data->callback = NULL;
8175 if (result != -ECONNABORTED) {
8176 if (network_remove(data) < 0) {
8186 int g_supplicant_interface_disconnect(GSupplicantInterface *interface,
8187 GSupplicantInterfaceCallback callback,
8190 struct interface_data *data;
8198 if (!system_available)
8200 #if defined TIZEN_EXT
8201 if (decrypt_request_data.pending_call &&
8202 decrypt_request_data.data &&
8203 decrypt_request_data.data->user_data == user_data) {
8205 callback_assoc_failed(decrypt_request_data.data->user_data);
8206 crypt_method_call_cancel();
8211 data = dbus_malloc0(sizeof(*data));
8215 data->interface = interface;
8216 data->path = g_strdup(interface->path);
8217 data->callback = callback;
8218 data->user_data = user_data;
8220 ret = supplicant_dbus_method_call(interface->path,
8221 SUPPLICANT_INTERFACE ".Interface", "Disconnect",
8222 NULL, interface_disconnect_result, data,
8233 #if defined TIZEN_EXT
8234 void g_supplicant_interface_remove_network(GSupplicantInterface *interface,
8235 GSupplicantSSID *ssid)
8237 struct interface_data *data;
8245 if (interface->network_path == NULL)
8248 if (!interface->network_info.ssid)
8251 if (memcmp(interface->network_info.ssid, ssid->ssid, ssid->ssid_len))
8254 if (interface->network_info.security != ssid->security)
8257 data = dbus_malloc0(sizeof(*data));
8261 data->interface = interface;
8262 data->path = g_strdup(interface->path);
8264 ret = supplicant_dbus_method_call(interface->path,
8265 SUPPLICANT_INTERFACE ".Interface", "RemoveNetwork",
8266 network_remove_params, network_remove_result, data,
8276 static void interface_p2p_find_result(const char *error,
8277 DBusMessageIter *iter, void *user_data)
8279 struct interface_scan_data *data = user_data;
8282 SUPPLICANT_DBG("error %s", error);
8287 if (interface_exists(data->interface, data->path)) {
8288 if (!data->interface->ready)
8291 data->interface->p2p_finding = true;
8295 data->callback(err, data->interface, data->user_data);
8301 static void interface_p2p_find_params(DBusMessageIter *iter, void *user_data)
8303 DBusMessageIter dict;
8305 supplicant_dbus_dict_open(iter, &dict);
8306 supplicant_dbus_dict_close(iter, &dict);
8309 int g_supplicant_interface_p2p_find(GSupplicantInterface *interface,
8310 GSupplicantInterfaceCallback callback,
8313 struct interface_scan_data *data;
8316 if (!interface->p2p_support)
8319 ret = interface_ready_to_scan(interface);
8320 if (ret && ret != -EALREADY)
8323 data = dbus_malloc0(sizeof(*data));
8327 data->interface = interface;
8328 data->path = g_strdup(interface->path);
8329 data->callback = callback;
8330 data->user_data = user_data;
8332 ret = supplicant_dbus_method_call(interface->path,
8333 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "Find",
8334 interface_p2p_find_params, interface_p2p_find_result,
8344 bool g_supplicant_interface_is_p2p_finding(GSupplicantInterface *interface)
8349 return interface->p2p_finding;
8352 int g_supplicant_interface_p2p_stop_find(GSupplicantInterface *interface)
8354 if (!interface->p2p_finding)
8359 interface->p2p_finding = false;
8361 return supplicant_dbus_method_call(interface->path,
8362 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "StopFind",
8363 NULL, NULL, NULL, NULL);
8366 static void interface_p2p_connect_result(const char *error,
8367 DBusMessageIter *iter, void *user_data)
8369 struct interface_connect_data *data = user_data;
8375 SUPPLICANT_DBG("error: %s", error);
8376 err = parse_supplicant_error(iter);
8380 data->callback(err, data->interface, data->user_data);
8383 g_free(data->peer->wps_pin);
8384 g_free(data->peer->path);
8389 static void interface_p2p_connect_params(DBusMessageIter *iter, void *user_data)
8391 struct interface_connect_data *data = user_data;
8392 const char *wps = "pbc";
8393 DBusMessageIter dict;
8398 supplicant_dbus_dict_open(iter, &dict);
8400 if (data->peer->master)
8403 if (data->peer->wps_pin)
8406 supplicant_dbus_dict_append_basic(&dict, "peer",
8407 DBUS_TYPE_OBJECT_PATH, &data->peer->path);
8408 supplicant_dbus_dict_append_basic(&dict, "wps_method",
8409 DBUS_TYPE_STRING, &wps);
8410 if (data->peer->wps_pin) {
8411 supplicant_dbus_dict_append_basic(&dict, "pin",
8412 DBUS_TYPE_STRING, &data->peer->wps_pin);
8415 supplicant_dbus_dict_append_basic(&dict, "go_intent",
8416 DBUS_TYPE_INT32, &go_intent);
8418 supplicant_dbus_dict_close(iter, &dict);
8421 int g_supplicant_interface_p2p_connect(GSupplicantInterface *interface,
8422 GSupplicantPeerParams *peer_params,
8423 GSupplicantInterfaceCallback callback,
8426 struct interface_connect_data *data;
8431 if (!interface->p2p_support)
8434 data = dbus_malloc0(sizeof(*data));
8438 data->interface = interface;
8439 data->path = g_strdup(interface->path);
8440 data->peer = peer_params;
8441 data->callback = callback;
8442 data->user_data = user_data;
8444 ret = supplicant_dbus_method_call(interface->path,
8445 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "Connect",
8446 interface_p2p_connect_params, interface_p2p_connect_result,
8454 return -EINPROGRESS;
8457 int g_supplicant_interface_p2p_disconnect(GSupplicantInterface *interface,
8458 GSupplicantPeerParams *peer_params)
8460 GSupplicantPeer *peer;
8466 if (!interface->p2p_support)
8469 peer = g_hash_table_lookup(interface->peer_table, peer_params->path);
8473 for (list = peer->groups; list; list = list->next, count++) {
8474 const char *group_obj_path = list->data;
8475 GSupplicantInterface *g_interface;
8476 GSupplicantGroup *group;
8478 group = g_hash_table_lookup(group_mapping, group_obj_path);
8479 if (!group || !group->interface)
8482 g_interface = group->interface;
8483 supplicant_dbus_method_call(g_interface->path,
8484 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
8485 "Disconnect", NULL, NULL, NULL, g_interface);
8488 if (count == 0 && peer->current_group_iface) {
8489 supplicant_dbus_method_call(peer->current_group_iface->path,
8490 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
8491 "Disconnect", NULL, NULL, NULL,
8492 peer->current_group_iface->path);
8495 peer->current_group_iface = NULL;
8497 return -EINPROGRESS;
8500 struct p2p_service_data {
8502 GSupplicantInterface *interface;
8503 GSupplicantP2PServiceParams *service;
8504 GSupplicantInterfaceCallback callback;
8508 static void interface_p2p_service_result(const char *error,
8509 DBusMessageIter *iter, void *user_data)
8511 struct p2p_service_data *data = user_data;
8514 SUPPLICANT_DBG("%s result - %s", data->registration ?
8515 "Registration" : "Deletion",
8516 error ? error : "Success");
8521 data->callback(result, data->interface, data->user_data);
8523 g_free(data->service->query);
8524 g_free(data->service->response);
8525 g_free(data->service->service);
8526 g_free(data->service->wfd_ies);
8527 g_free(data->service);
8531 static void interface_p2p_service_params(DBusMessageIter *iter,
8534 struct p2p_service_data *data = user_data;
8535 GSupplicantP2PServiceParams *service;
8536 DBusMessageIter dict;
8541 service = data->service;
8543 supplicant_dbus_dict_open(iter, &dict);
8545 if (service->query && service->response) {
8547 supplicant_dbus_dict_append_basic(&dict, "service_type",
8548 DBUS_TYPE_STRING, &type);
8549 supplicant_dbus_dict_append_fixed_array(&dict, "query",
8550 DBUS_TYPE_BYTE, &service->query,
8551 service->query_length);
8552 supplicant_dbus_dict_append_fixed_array(&dict, "response",
8553 DBUS_TYPE_BYTE, &service->response,
8554 service->response_length);
8555 } else if (service->version && service->service) {
8557 supplicant_dbus_dict_append_basic(&dict, "service_type",
8558 DBUS_TYPE_STRING, &type);
8559 supplicant_dbus_dict_append_basic(&dict, "version",
8560 DBUS_TYPE_INT32, &service->version);
8561 supplicant_dbus_dict_append_basic(&dict, "service",
8562 DBUS_TYPE_STRING, &service->service);
8565 supplicant_dbus_dict_close(iter, &dict);
8568 int g_supplicant_interface_p2p_add_service(GSupplicantInterface *interface,
8569 GSupplicantInterfaceCallback callback,
8570 GSupplicantP2PServiceParams *p2p_service_params,
8573 struct p2p_service_data *data;
8578 if (!interface->p2p_support)
8581 data = dbus_malloc0(sizeof(*data));
8585 data->registration = true;
8586 data->interface = interface;
8587 data->service = p2p_service_params;
8588 data->callback = callback;
8589 data->user_data = user_data;
8591 ret = supplicant_dbus_method_call(interface->path,
8592 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "AddService",
8593 interface_p2p_service_params, interface_p2p_service_result,
8600 return -EINPROGRESS;
8603 int g_supplicant_interface_p2p_del_service(GSupplicantInterface *interface,
8604 GSupplicantP2PServiceParams *p2p_service_params)
8606 struct p2p_service_data *data;
8611 if (!interface->p2p_support)
8614 data = dbus_malloc0(sizeof(*data));
8618 data->interface = interface;
8619 data->service = p2p_service_params;
8621 ret = supplicant_dbus_method_call(interface->path,
8622 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeleteService",
8623 interface_p2p_service_params, interface_p2p_service_result,
8630 return -EINPROGRESS;
8633 struct p2p_listen_data {
8638 static void interface_p2p_listen_params(DBusMessageIter *iter, void *user_data)
8640 struct p2p_listen_data *params = user_data;
8641 DBusMessageIter dict;
8643 supplicant_dbus_dict_open(iter, &dict);
8645 supplicant_dbus_dict_append_basic(&dict, "period",
8646 DBUS_TYPE_INT32, ¶ms->period);
8647 supplicant_dbus_dict_append_basic(&dict, "interval",
8648 DBUS_TYPE_INT32, ¶ms->interval);
8649 supplicant_dbus_dict_close(iter, &dict);
8652 int g_supplicant_interface_p2p_listen(GSupplicantInterface *interface,
8653 int period, int interval)
8655 struct p2p_listen_data params;
8659 if (!interface->p2p_support)
8662 params.period = period;
8663 params.interval = interval;
8665 return supplicant_dbus_method_call(interface->path,
8666 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
8667 "ExtendedListen", interface_p2p_listen_params,
8668 NULL, ¶ms, NULL);
8671 static void widi_ies_params(DBusMessageIter *iter, void *user_data)
8673 struct p2p_service_data *data = user_data;
8674 GSupplicantP2PServiceParams *service = data->service;
8675 DBusMessageIter array;
8677 SUPPLICANT_DBG("%p - %d", service->wfd_ies, service->wfd_ies_length);
8679 dbus_message_iter_open_container(iter, DBUS_TYPE_ARRAY,
8680 DBUS_TYPE_BYTE_AS_STRING, &array);
8682 if (service->wfd_ies && service->wfd_ies_length > 0) {
8683 dbus_message_iter_append_fixed_array(&array, DBUS_TYPE_BYTE,
8684 &service->wfd_ies, service->wfd_ies_length);
8687 dbus_message_iter_close_container(iter, &array);
8690 int g_supplicant_set_widi_ies(GSupplicantP2PServiceParams *p2p_service_params,
8691 GSupplicantInterfaceCallback callback,
8694 struct p2p_service_data *data;
8699 if (!system_available)
8702 data = dbus_malloc0(sizeof(*data));
8706 data->service = p2p_service_params;
8707 data->callback = callback;
8708 data->user_data = user_data;
8710 if (p2p_service_params->wfd_ies)
8711 data->registration = true;
8713 ret = supplicant_dbus_property_set(SUPPLICANT_PATH,
8714 SUPPLICANT_INTERFACE, "WFDIEs",
8715 DBUS_TYPE_ARRAY_AS_STRING
8716 DBUS_TYPE_BYTE_AS_STRING,
8718 interface_p2p_service_result,
8720 if (ret < 0 && ret != -EINPROGRESS) {
8725 return -EINPROGRESS;
8729 static const char *g_supplicant_rule0 = "type=signal,"
8730 "path=" DBUS_PATH_DBUS ","
8731 "sender=" DBUS_SERVICE_DBUS ","
8732 "interface=" DBUS_INTERFACE_DBUS ","
8733 "member=NameOwnerChanged,"
8734 "arg0=" SUPPLICANT_SERVICE;
8735 static const char *g_supplicant_rule1 = "type=signal,"
8736 "interface=" SUPPLICANT_INTERFACE;
8737 static const char *g_supplicant_rule2 = "type=signal,"
8738 "interface=" SUPPLICANT_INTERFACE ".Interface";
8739 static const char *g_supplicant_rule3 = "type=signal,"
8740 "interface=" SUPPLICANT_INTERFACE ".Interface.WPS";
8741 static const char *g_supplicant_rule4 = "type=signal,"
8742 "interface=" SUPPLICANT_INTERFACE ".BSS";
8743 static const char *g_supplicant_rule5 = "type=signal,"
8744 "interface=" SUPPLICANT_INTERFACE ".Network";
8745 #if !defined TIZEN_EXT
8746 static const char *g_supplicant_rule6 = "type=signal,"
8747 "interface=" SUPPLICANT_INTERFACE ".Interface.P2PDevice";
8748 static const char *g_supplicant_rule7 = "type=signal,"
8749 "interface=" SUPPLICANT_INTERFACE ".Peer";
8750 static const char *g_supplicant_rule8 = "type=signal,"
8751 "interface=" SUPPLICANT_INTERFACE ".Group";
8753 #if defined TIZEN_EXT_WIFI_MESH
8754 static const char *g_supplicant_rule9 = "type=signal,"
8755 "interface=" SUPPLICANT_INTERFACE ".Interface.Mesh";
8758 static void invoke_introspect_method(void)
8760 DBusMessage *message;
8762 message = dbus_message_new_method_call(SUPPLICANT_SERVICE,
8764 DBUS_INTERFACE_INTROSPECTABLE,
8770 dbus_message_set_no_reply(message, TRUE);
8771 dbus_connection_send(connection, message, NULL);
8772 dbus_message_unref(message);
8775 #if defined TIZEN_EXT && defined TIZEN_EXT_INS
8776 void g_supplicant_set_ins_settings(GSupplicantINSPreferredFreq preferred_freq_bssid,
8777 bool last_connected_bssid, bool assoc_reject, bool signal_bssid,
8778 unsigned int preferred_freq_bssid_score, unsigned int last_connected_bssid_score,
8779 unsigned int assoc_reject_score, int signal_level3_5ghz, int signal_level3_24ghz)
8781 ins_settings.preferred_freq_bssid = preferred_freq_bssid;
8782 ins_settings.last_connected_bssid = last_connected_bssid;
8783 ins_settings.assoc_reject = assoc_reject;
8784 ins_settings.signal_bssid = signal_bssid;
8785 ins_settings.preferred_freq_bssid_score = preferred_freq_bssid_score;
8786 ins_settings.last_connected_bssid_score = last_connected_bssid_score;
8787 ins_settings.assoc_reject_score = assoc_reject_score;
8788 ins_settings.signal_level3_5ghz = signal_level3_5ghz;
8789 ins_settings.signal_level3_24ghz = signal_level3_24ghz;
8791 SUPPLICANT_DBG("preferred_freq_bssid [%s]", preferred_freq_bssid ? "true" : "false");
8792 SUPPLICANT_DBG("preferred_freq_bssid_score [%d]", preferred_freq_bssid_score);
8793 SUPPLICANT_DBG("last_connected_bssid [%s]", last_connected_bssid ? "true" : "false");
8794 SUPPLICANT_DBG("last_connected_bssid_score [%d]", last_connected_bssid_score);
8795 SUPPLICANT_DBG("assoc_reject [%s]", assoc_reject ? "true" : "false");
8796 SUPPLICANT_DBG("assoc_reject_score [%d]", assoc_reject_score);
8797 SUPPLICANT_DBG("signal_bssid [%s]", signal_bssid ? "true" : "false");
8798 SUPPLICANT_DBG("signal_level3_5ghz [%d]", signal_level3_5ghz);
8799 SUPPLICANT_DBG("signal_level3_24ghz [%d]", signal_level3_24ghz);
8801 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_INS */
8803 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
8804 void g_supplicant_register_eap_callback(g_supplicant_eap_callback cb)
8806 SUPPLICANT_DBG("g_supplicant_register_eap_callback %p", cb);
8808 if (!callbacks_pointer) {
8809 SUPPLICANT_DBG("callbacks_pointer is NULL");
8813 callbacks_pointer->eap = cb;
8816 void g_supplicant_unregister_eap_callback(void)
8818 SUPPLICANT_DBG("g_supplicant_unregister_eap_callback");
8820 if (!callbacks_pointer) {
8821 SUPPLICANT_DBG("callbacks_pointer is NULL");
8825 callbacks_pointer->eap = NULL;
8827 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
8829 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
8830 int g_supplicant_register(GSupplicantCallbacks *callbacks)
8831 #else /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
8832 int g_supplicant_register(const GSupplicantCallbacks *callbacks)
8833 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
8835 connection = dbus_bus_get(DBUS_BUS_SYSTEM, NULL);
8839 if (!dbus_connection_add_filter(connection, g_supplicant_filter,
8841 dbus_connection_unref(connection);
8845 #if defined TIZEN_EXT
8846 simplified_log = connman_setting_get_bool("SimplifiedLog");
8848 callbacks_pointer = callbacks;
8851 interface_table = g_hash_table_new_full(g_str_hash, g_str_equal,
8852 NULL, remove_interface);
8854 bss_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
8856 peer_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
8858 group_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
8860 pending_peer_connection = g_hash_table_new_full(g_str_hash, g_str_equal,
8862 config_file_table = g_hash_table_new_full(g_str_hash, g_str_equal,
8865 supplicant_dbus_setup(connection);
8867 dbus_bus_add_match(connection, g_supplicant_rule0, NULL);
8868 dbus_bus_add_match(connection, g_supplicant_rule1, NULL);
8869 dbus_bus_add_match(connection, g_supplicant_rule2, NULL);
8870 dbus_bus_add_match(connection, g_supplicant_rule3, NULL);
8871 dbus_bus_add_match(connection, g_supplicant_rule4, NULL);
8872 dbus_bus_add_match(connection, g_supplicant_rule5, NULL);
8873 #if defined TIZEN_EXT
8874 dbus_bus_add_match(connection,
8875 "type=signal,interface=org.tizen.system.deviced.PowerOff,"
8876 "member=ChangeState", NULL);
8878 #if !defined TIZEN_EXT
8879 dbus_bus_add_match(connection, g_supplicant_rule6, NULL);
8880 dbus_bus_add_match(connection, g_supplicant_rule7, NULL);
8881 dbus_bus_add_match(connection, g_supplicant_rule8, NULL);
8883 #if defined TIZEN_EXT_WIFI_MESH
8884 dbus_bus_add_match(connection, g_supplicant_rule9, NULL);
8886 dbus_connection_flush(connection);
8888 if (dbus_bus_name_has_owner(connection,
8889 SUPPLICANT_SERVICE, NULL)) {
8890 system_available = TRUE;
8891 supplicant_dbus_property_get_all(SUPPLICANT_PATH,
8892 SUPPLICANT_INTERFACE,
8893 service_property, NULL, NULL);
8895 invoke_introspect_method();
8897 SUPPLICANT_DBG("supplicant dbus setup completed");
8901 static void unregister_interface_remove_params(DBusMessageIter *iter,
8904 const char *path = user_data;
8906 dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
8911 static void unregister_remove_interface(gpointer key, gpointer value,
8914 GSupplicantInterface *interface = value;
8916 supplicant_dbus_method_call(SUPPLICANT_PATH,
8917 SUPPLICANT_INTERFACE,
8919 unregister_interface_remove_params,
8920 NULL, interface->path, NULL);
8923 void g_supplicant_unregister(const GSupplicantCallbacks *callbacks)
8928 #if defined TIZEN_EXT_WIFI_MESH
8929 dbus_bus_remove_match(connection, g_supplicant_rule9, NULL);
8931 #if !defined TIZEN_EXT
8932 dbus_bus_remove_match(connection, g_supplicant_rule8, NULL);
8933 dbus_bus_remove_match(connection, g_supplicant_rule7, NULL);
8934 dbus_bus_remove_match(connection, g_supplicant_rule6, NULL);
8936 dbus_bus_remove_match(connection, g_supplicant_rule5, NULL);
8937 dbus_bus_remove_match(connection, g_supplicant_rule4, NULL);
8938 dbus_bus_remove_match(connection, g_supplicant_rule3, NULL);
8939 dbus_bus_remove_match(connection, g_supplicant_rule2, NULL);
8940 dbus_bus_remove_match(connection, g_supplicant_rule1, NULL);
8941 dbus_bus_remove_match(connection, g_supplicant_rule0, NULL);
8942 dbus_connection_flush(connection);
8944 dbus_connection_remove_filter(connection,
8945 g_supplicant_filter, NULL);
8948 if (config_file_table) {
8949 g_hash_table_destroy(config_file_table);
8950 config_file_table = NULL;
8954 g_hash_table_destroy(bss_mapping);
8959 g_hash_table_destroy(peer_mapping);
8960 peer_mapping = NULL;
8963 if (group_mapping) {
8964 g_hash_table_destroy(group_mapping);
8965 group_mapping = NULL;
8968 if (interface_table) {
8969 g_hash_table_foreach(interface_table,
8970 unregister_remove_interface, NULL);
8971 g_hash_table_destroy(interface_table);
8972 interface_table = NULL;
8975 if (system_available)
8976 callback_system_killed();
8979 dbus_connection_unref(connection);
8983 callbacks_pointer = NULL;
8988 struct supplicant_mac_policy {
8989 GSupplicantMacPolicyCallback callback;
8990 dbus_uint32_t policy;
8991 const void *user_data;
8994 static void mac_policy_result(const char *error,
8995 DBusMessageIter *iter, void *user_data)
8997 struct supplicant_mac_policy *data = user_data;
9004 SUPPLICANT_DBG("Mac policy setting failure %s", error);
9009 data->callback(result, data->policy,
9010 (void *) data->user_data);
9015 static void mac_policy_params(DBusMessageIter *iter, void *user_data)
9017 struct supplicant_mac_policy *data = user_data;
9019 dbus_message_iter_append_basic(iter, DBUS_TYPE_INT32, &(data->policy));
9022 int g_supplicant_interface_set_mac_policy(GSupplicantInterface *interface,
9023 GSupplicantMacPolicyCallback callback,
9024 unsigned int policy,
9027 struct supplicant_mac_policy *data = NULL;
9030 if (!system_available)
9036 data = dbus_malloc0(sizeof(*data));
9040 data->callback = callback;
9041 data->policy = policy;
9042 data->user_data = user_data;
9044 ret = supplicant_dbus_property_set(interface->path,
9045 SUPPLICANT_INTERFACE ".Interface",
9046 "MacAddr", DBUS_TYPE_INT32_AS_STRING,
9047 mac_policy_params, mac_policy_result, data, NULL);
9049 SUPPLICANT_DBG("Unable to set MacAddr configuration");
9056 int g_supplicant_interface_set_preassoc_mac_policy(GSupplicantInterface *interface,
9057 GSupplicantMacPolicyCallback callback,
9058 unsigned int policy,
9061 struct supplicant_mac_policy *data;
9064 if (!system_available)
9070 data = dbus_malloc0(sizeof(*data));
9074 data->callback = callback;
9075 data->policy = policy;
9076 data->user_data = user_data;
9078 ret = supplicant_dbus_property_set(interface->path,
9079 SUPPLICANT_INTERFACE ".Interface",
9080 "PreassocMacAddr", DBUS_TYPE_INT32_AS_STRING,
9081 mac_policy_params, mac_policy_result, data, NULL);
9083 SUPPLICANT_DBG("Unable to set PreassocMacAddr configuration");
9090 struct supplicant_random_mac_lifetime {
9091 GSupplicantRandomMaclifetimeCallback callback;
9092 dbus_uint32_t lifetime;
9093 const void *user_data;
9096 static void random_mac_lifetime_result(const char *error,
9097 DBusMessageIter *iter, void *user_data)
9099 struct supplicant_random_mac_lifetime *data = user_data;
9106 SUPPLICANT_DBG("Random Mac lifetime setting failure %s", error);
9111 data->callback(result, data->lifetime,
9112 (void *) data->user_data);
9117 static void random_mac_lifetime_params(DBusMessageIter *iter, void *user_data)
9119 struct supplicant_random_mac_lifetime *data = user_data;
9121 dbus_message_iter_append_basic(iter, DBUS_TYPE_UINT32, &(data->lifetime));
9124 int g_supplicant_interface_set_random_mac_lifetime(GSupplicantInterface *interface,
9125 GSupplicantRandomMaclifetimeCallback callback,
9126 unsigned int lifetime,
9129 struct supplicant_random_mac_lifetime *data;
9132 if (!system_available)
9138 data = dbus_malloc0(sizeof(*data));
9142 data->callback = callback;
9143 data->lifetime = lifetime;
9144 data->user_data = user_data;
9146 ret = supplicant_dbus_property_set(interface->path,
9147 SUPPLICANT_INTERFACE ".Interface",
9148 "RandAddrLifetime", DBUS_TYPE_UINT32_AS_STRING,
9149 random_mac_lifetime_params, random_mac_lifetime_result,
9152 SUPPLICANT_DBG("Unable to set RandAddrLifetime configuration");