3 * WPA supplicant library with GLib integration
5 * Copyright (C) 2012-2013 Intel Corporation. All rights reserved.
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
34 #include <netinet/if_ether.h>
35 #include <netinet/in.h>
41 #include "gsupplicant.h"
43 #define IEEE80211_CAP_ESS 0x0001
44 #define IEEE80211_CAP_IBSS 0x0002
45 #define IEEE80211_CAP_PRIVACY 0x0010
48 #define COUNTRY_CODE_LENGTH 2
51 #define BSS_UNKNOWN_STRENGTH -90
53 static DBusConnection *connection;
55 static const GSupplicantCallbacks *callbacks_pointer;
57 static dbus_bool_t system_available = FALSE;
58 static dbus_bool_t system_ready = FALSE;
60 static dbus_int32_t debug_level;
61 static dbus_bool_t debug_timestamp = FALSE;
62 static dbus_bool_t debug_showkeys = FALSE;
64 static const char *debug_strings[] = {
65 "msgdump", "debug", "info", "warning", "error", NULL
68 static unsigned int eap_methods;
75 static struct strvalmap eap_method_map[] = {
76 { "MD5", G_SUPPLICANT_EAP_METHOD_MD5 },
77 { "TLS", G_SUPPLICANT_EAP_METHOD_TLS },
78 { "MSCHAPV2", G_SUPPLICANT_EAP_METHOD_MSCHAPV2 },
79 { "PEAP", G_SUPPLICANT_EAP_METHOD_PEAP },
80 { "TTLS", G_SUPPLICANT_EAP_METHOD_TTLS },
81 { "GTC", G_SUPPLICANT_EAP_METHOD_GTC },
82 { "OTP", G_SUPPLICANT_EAP_METHOD_OTP },
83 { "LEAP", G_SUPPLICANT_EAP_METHOD_LEAP },
84 { "WSC", G_SUPPLICANT_EAP_METHOD_WSC },
88 static struct strvalmap keymgmt_map[] = {
89 { "none", G_SUPPLICANT_KEYMGMT_NONE },
90 { "ieee8021x", G_SUPPLICANT_KEYMGMT_IEEE8021X },
91 { "wpa-none", G_SUPPLICANT_KEYMGMT_WPA_NONE },
92 { "wpa-psk", G_SUPPLICANT_KEYMGMT_WPA_PSK },
93 { "wpa-psk-sha256", G_SUPPLICANT_KEYMGMT_WPA_PSK_256 },
94 { "wpa-ft-psk", G_SUPPLICANT_KEYMGMT_WPA_FT_PSK },
95 { "wpa-ft-eap", G_SUPPLICANT_KEYMGMT_WPA_FT_EAP },
96 { "wpa-eap", G_SUPPLICANT_KEYMGMT_WPA_EAP },
97 { "wpa-eap-sha256", G_SUPPLICANT_KEYMGMT_WPA_EAP_256 },
98 { "wps", G_SUPPLICANT_KEYMGMT_WPS },
102 static struct strvalmap authalg_capa_map[] = {
103 { "open", G_SUPPLICANT_CAPABILITY_AUTHALG_OPEN },
104 { "shared", G_SUPPLICANT_CAPABILITY_AUTHALG_SHARED },
105 { "leap", G_SUPPLICANT_CAPABILITY_AUTHALG_LEAP },
109 static struct strvalmap proto_capa_map[] = {
110 { "wpa", G_SUPPLICANT_CAPABILITY_PROTO_WPA },
111 { "rsn", G_SUPPLICANT_CAPABILITY_PROTO_RSN },
115 static struct strvalmap group_map[] = {
116 { "wep40", G_SUPPLICANT_GROUP_WEP40 },
117 { "wep104", G_SUPPLICANT_GROUP_WEP104 },
118 { "tkip", G_SUPPLICANT_GROUP_TKIP },
119 { "ccmp", G_SUPPLICANT_GROUP_CCMP },
123 static struct strvalmap pairwise_map[] = {
124 { "none", G_SUPPLICANT_PAIRWISE_NONE },
125 { "tkip", G_SUPPLICANT_PAIRWISE_TKIP },
126 { "ccmp", G_SUPPLICANT_PAIRWISE_CCMP },
130 static struct strvalmap scan_capa_map[] = {
131 { "active", G_SUPPLICANT_CAPABILITY_SCAN_ACTIVE },
132 { "passive", G_SUPPLICANT_CAPABILITY_SCAN_PASSIVE },
133 { "ssid", G_SUPPLICANT_CAPABILITY_SCAN_SSID },
137 static struct strvalmap mode_capa_map[] = {
138 { "infrastructure", G_SUPPLICANT_CAPABILITY_MODE_INFRA },
139 { "ad-hoc", G_SUPPLICANT_CAPABILITY_MODE_IBSS },
140 { "ap", G_SUPPLICANT_CAPABILITY_MODE_AP },
141 { "p2p", G_SUPPLICANT_CAPABILITY_MODE_P2P },
145 static GHashTable *interface_table;
146 static GHashTable *bss_mapping;
147 static GHashTable *peer_mapping;
148 static GHashTable *group_mapping;
149 static GHashTable *pending_peer_connection;
150 static GHashTable *config_file_table;
152 struct _GSupplicantWpsCredentials {
153 unsigned char ssid[32];
154 unsigned int ssid_len;
158 struct added_network_information {
160 GSupplicantSecurity security;
162 char * private_passphrase;
165 struct _GSupplicantInterface {
168 unsigned int keymgmt_capa;
169 unsigned int authalg_capa;
170 unsigned int proto_capa;
171 unsigned int group_capa;
172 unsigned int pairwise_capa;
173 unsigned int scan_capa;
174 unsigned int mode_capa;
175 unsigned int max_scan_ssids;
178 bool ap_create_in_progress;
180 GSupplicantState state;
181 dbus_bool_t scanning;
182 GSupplicantInterfaceCallback scan_callback;
188 struct _GSupplicantWpsCredentials wps_cred;
189 GSupplicantWpsState wps_state;
190 GHashTable *network_table;
191 GHashTable *peer_table;
192 GHashTable *group_table;
193 GHashTable *bss_mapping;
195 const char *pending_peer_path;
196 GSupplicantNetwork *current_network;
197 struct added_network_information network_info;
198 #if defined TIZEN_EXT
199 int disconnect_reason;
203 struct g_supplicant_bss {
204 GSupplicantInterface *interface;
206 unsigned char bssid[6];
207 unsigned char ssid[32];
208 unsigned int ssid_len;
209 dbus_uint16_t frequency;
210 dbus_uint32_t maxrate;
212 GSupplicantMode mode;
213 GSupplicantSecurity security;
214 dbus_bool_t rsn_selected;
215 unsigned int wpa_keymgmt;
216 unsigned int wpa_pairwise;
217 unsigned int wpa_group;
218 unsigned int rsn_keymgmt;
219 unsigned int rsn_pairwise;
220 unsigned int rsn_group;
221 unsigned int keymgmt;
224 dbus_bool_t ieee8021x;
225 #if defined TIZEN_EXT
227 dbus_bool_t ft_ieee8021x;
230 unsigned char country_code[COUNTRY_CODE_LENGTH];
232 unsigned int wps_capabilities;
235 struct _GSupplicantNetwork {
236 GSupplicantInterface *interface;
240 unsigned char ssid[32];
241 unsigned int ssid_len;
243 dbus_uint16_t frequency;
244 struct g_supplicant_bss *best_bss;
245 GSupplicantMode mode;
246 GSupplicantSecurity security;
248 unsigned int wps_capabilities;
249 GHashTable *bss_table;
250 GHashTable *config_table;
251 #if defined TIZEN_EXT
256 unsigned int keymgmt;
258 unsigned char country_code[COUNTRY_CODE_LENGTH];
262 struct _GSupplicantPeer {
263 GSupplicantInterface *interface;
265 unsigned char device_address[ETH_ALEN];
266 unsigned char iface_address[ETH_ALEN];
268 unsigned char *widi_ies;
271 unsigned int wps_capabilities;
273 const GSupplicantInterface *current_group_iface;
274 bool connection_requested;
277 struct _GSupplicantGroup {
278 GSupplicantInterface *interface;
279 GSupplicantInterface *orig_interface;
285 struct interface_data {
286 GSupplicantInterface *interface;
287 char *path; /* Interface path cannot be taken from interface (above) as
288 * it might have been freed already.
290 GSupplicantInterfaceCallback callback;
292 bool network_remove_in_progress;
293 GSupplicantSSID *ssid;
296 struct interface_create_data {
300 GSupplicantInterface *interface;
301 GSupplicantInterfaceCallback callback;
305 struct interface_connect_data {
306 GSupplicantInterface *interface;
308 GSupplicantInterfaceCallback callback;
311 GSupplicantSSID *ssid;
312 GSupplicantPeerParams *peer;
316 struct interface_scan_data {
317 GSupplicantInterface *interface;
319 GSupplicantInterfaceCallback callback;
320 GSupplicantScanParams *scan_params;
324 #if defined TIZEN_EXT
325 struct g_connman_bssids {
332 static int network_remove(struct interface_data *data);
334 static inline void debug(const char *format, ...)
339 if (!callbacks_pointer || !callbacks_pointer->debug)
342 va_start(ap, format);
344 if (vsnprintf(str, sizeof(str), format, ap) > 0)
345 callbacks_pointer->debug(str);
350 #define SUPPLICANT_DBG(fmt, arg...) \
351 debug("%s:%s() " fmt, __FILE__, __FUNCTION__ , ## arg);
353 static GSupplicantMode string2mode(const char *mode)
356 return G_SUPPLICANT_MODE_UNKNOWN;
358 if (g_str_equal(mode, "infrastructure"))
359 return G_SUPPLICANT_MODE_INFRA;
360 else if (g_str_equal(mode, "ad-hoc"))
361 return G_SUPPLICANT_MODE_IBSS;
363 return G_SUPPLICANT_MODE_UNKNOWN;
366 static const char *mode2string(GSupplicantMode mode)
369 case G_SUPPLICANT_MODE_UNKNOWN:
371 case G_SUPPLICANT_MODE_INFRA:
373 case G_SUPPLICANT_MODE_IBSS:
375 case G_SUPPLICANT_MODE_MASTER:
382 static const char *security2string(GSupplicantSecurity security)
385 case G_SUPPLICANT_SECURITY_UNKNOWN:
387 case G_SUPPLICANT_SECURITY_NONE:
389 case G_SUPPLICANT_SECURITY_WEP:
391 case G_SUPPLICANT_SECURITY_PSK:
393 case G_SUPPLICANT_SECURITY_IEEE8021X:
395 #if defined TIZEN_EXT
396 case G_SUPPLICANT_SECURITY_FT_PSK:
398 case G_SUPPLICANT_SECURITY_FT_IEEE8021X:
399 return "ft_ieee8021x";
406 static GSupplicantState string2state(const char *state)
409 return G_SUPPLICANT_STATE_UNKNOWN;
411 if (g_str_equal(state, "unknown"))
412 return G_SUPPLICANT_STATE_UNKNOWN;
413 else if (g_str_equal(state, "interface_disabled"))
414 return G_SUPPLICANT_STATE_DISABLED;
415 else if (g_str_equal(state, "disconnected"))
416 return G_SUPPLICANT_STATE_DISCONNECTED;
417 else if (g_str_equal(state, "inactive"))
418 return G_SUPPLICANT_STATE_INACTIVE;
419 else if (g_str_equal(state, "scanning"))
420 return G_SUPPLICANT_STATE_SCANNING;
421 else if (g_str_equal(state, "authenticating"))
422 return G_SUPPLICANT_STATE_AUTHENTICATING;
423 else if (g_str_equal(state, "associating"))
424 return G_SUPPLICANT_STATE_ASSOCIATING;
425 else if (g_str_equal(state, "associated"))
426 return G_SUPPLICANT_STATE_ASSOCIATED;
427 else if (g_str_equal(state, "group_handshake"))
428 return G_SUPPLICANT_STATE_GROUP_HANDSHAKE;
429 else if (g_str_equal(state, "4way_handshake"))
430 return G_SUPPLICANT_STATE_4WAY_HANDSHAKE;
431 else if (g_str_equal(state, "completed"))
432 return G_SUPPLICANT_STATE_COMPLETED;
434 return G_SUPPLICANT_STATE_UNKNOWN;
437 static bool compare_network_parameters(GSupplicantInterface *interface,
438 GSupplicantSSID *ssid)
440 #if defined TIZEN_EXT
441 if (!interface->network_info.ssid)
445 if (memcmp(interface->network_info.ssid, ssid->ssid, ssid->ssid_len))
448 if (interface->network_info.security != ssid->security)
451 if (interface->network_info.passphrase &&
452 g_strcmp0(interface->network_info.passphrase,
453 ssid->passphrase) != 0) {
457 if (interface->network_info.private_passphrase &&
458 g_strcmp0(interface->network_info.private_passphrase,
459 ssid->private_key_passphrase) != 0) {
466 static void remove_network_information(GSupplicantInterface * interface)
468 g_free(interface->network_info.ssid);
469 g_free(interface->network_info.passphrase);
470 g_free(interface->network_info.private_passphrase);
471 interface->network_info.ssid = NULL;
472 interface->network_info.passphrase = NULL;
473 interface->network_info.private_passphrase = NULL;
476 static int store_network_information(GSupplicantInterface * interface,
477 GSupplicantSSID *ssid)
479 interface->network_info.ssid = g_malloc(ssid->ssid_len + 1);
480 if (interface->network_info.ssid != NULL) {
481 memcpy(interface->network_info.ssid, ssid->ssid,
483 interface->network_info.ssid[ssid->ssid_len] = '\0';
488 interface->network_info.security = ssid->security;
490 if ((ssid->security == G_SUPPLICANT_SECURITY_WEP ||
491 ssid->security == G_SUPPLICANT_SECURITY_PSK ||
492 ssid->security == G_SUPPLICANT_SECURITY_NONE) &&
494 interface->network_info.passphrase = g_strdup(ssid->passphrase);
497 if (ssid->security == G_SUPPLICANT_SECURITY_IEEE8021X &&
498 ssid->private_key_passphrase) {
499 interface->network_info.private_passphrase =
500 g_strdup(ssid->private_key_passphrase);
506 static void callback_system_ready(void)
513 if (!callbacks_pointer)
516 if (!callbacks_pointer->system_ready)
519 callbacks_pointer->system_ready();
522 static void callback_system_killed(void)
524 system_ready = FALSE;
526 if (!callbacks_pointer)
529 if (!callbacks_pointer->system_killed)
532 callbacks_pointer->system_killed();
535 static void callback_interface_added(GSupplicantInterface *interface)
539 if (!callbacks_pointer)
542 if (!callbacks_pointer->interface_added)
545 callbacks_pointer->interface_added(interface);
548 static void callback_interface_state(GSupplicantInterface *interface)
550 if (!callbacks_pointer)
553 if (!callbacks_pointer->interface_state)
556 callbacks_pointer->interface_state(interface);
559 static void callback_interface_removed(GSupplicantInterface *interface)
561 if (!callbacks_pointer)
564 if (!callbacks_pointer->interface_removed)
567 callbacks_pointer->interface_removed(interface);
570 #if !defined TIZEN_EXT
571 static void callback_p2p_support(GSupplicantInterface *interface)
575 if (!interface->p2p_support)
578 if (callbacks_pointer && callbacks_pointer->p2p_support)
579 callbacks_pointer->p2p_support(interface);
583 static void callback_scan_started(GSupplicantInterface *interface)
585 if (!callbacks_pointer)
588 if (!callbacks_pointer->scan_started)
591 callbacks_pointer->scan_started(interface);
594 static void callback_ap_create_fail(GSupplicantInterface *interface)
596 if (!callbacks_pointer)
599 if (!callbacks_pointer->ap_create_fail)
602 callbacks_pointer->ap_create_fail(interface);
605 static void callback_scan_finished(GSupplicantInterface *interface)
607 if (!callbacks_pointer)
610 if (!callbacks_pointer->scan_finished)
613 callbacks_pointer->scan_finished(interface);
616 static void callback_network_added(GSupplicantNetwork *network)
618 if (!callbacks_pointer)
621 if (!callbacks_pointer->network_added)
624 callbacks_pointer->network_added(network);
627 static void callback_network_removed(GSupplicantNetwork *network)
629 if (!callbacks_pointer)
632 if (!callbacks_pointer->network_removed)
635 callbacks_pointer->network_removed(network);
638 #if defined TIZEN_EXT
639 static void callback_network_merged(GSupplicantNetwork *network)
641 if (!callbacks_pointer)
644 if (!callbacks_pointer->network_merged)
647 callbacks_pointer->network_merged(network);
650 static void callback_assoc_failed(void *user_data)
652 if (!callbacks_pointer)
655 if (!callbacks_pointer->assoc_failed)
658 callbacks_pointer->assoc_failed(user_data);
662 static void callback_network_changed(GSupplicantNetwork *network,
663 const char *property)
665 if (!callbacks_pointer)
668 if (!callbacks_pointer->network_changed)
671 callbacks_pointer->network_changed(network, property);
674 static void callback_network_associated(GSupplicantNetwork *network)
676 if (!callbacks_pointer)
679 if (!callbacks_pointer->network_associated)
682 callbacks_pointer->network_associated(network);
685 static void callback_peer_found(GSupplicantPeer *peer)
687 if (!callbacks_pointer)
690 if (!callbacks_pointer->peer_found)
693 callbacks_pointer->peer_found(peer);
696 static void callback_peer_lost(GSupplicantPeer *peer)
698 if (!callbacks_pointer)
701 if (!callbacks_pointer->peer_lost)
704 callbacks_pointer->peer_lost(peer);
707 static void callback_peer_changed(GSupplicantPeer *peer,
708 GSupplicantPeerState state)
710 if (!callbacks_pointer)
713 if (!callbacks_pointer->peer_changed)
716 callbacks_pointer->peer_changed(peer, state);
719 static void callback_peer_request(GSupplicantPeer *peer)
721 if (!callbacks_pointer)
724 if (!callbacks_pointer->peer_request)
727 peer->connection_requested = true;
729 callbacks_pointer->peer_request(peer);
732 static void callback_disconnect_reason_code(GSupplicantInterface *interface,
735 if (!callbacks_pointer)
738 if (!callbacks_pointer->disconnect_reasoncode)
741 if (reason_code != 0)
742 callbacks_pointer->disconnect_reasoncode(interface,
746 static void callback_assoc_status_code(GSupplicantInterface *interface,
749 if (!callbacks_pointer)
752 if (!callbacks_pointer->assoc_status_code)
755 callbacks_pointer->assoc_status_code(interface, status_code);
759 static void remove_group(gpointer data)
761 GSupplicantGroup *group = data;
764 g_slist_free_full(group->members, g_free);
770 static void remove_interface(gpointer data)
772 GSupplicantInterface *interface = data;
774 g_hash_table_destroy(interface->bss_mapping);
775 g_hash_table_destroy(interface->network_table);
776 g_hash_table_destroy(interface->peer_table);
777 g_hash_table_destroy(interface->group_table);
779 if (interface->scan_callback) {
780 SUPPLICANT_DBG("call interface %p callback %p scanning %d",
781 interface, interface->scan_callback,
782 interface->scanning);
784 interface->scan_callback(-EIO, interface, interface->scan_data);
785 interface->scan_callback = NULL;
786 interface->scan_data = NULL;
788 if (interface->scanning) {
789 interface->scanning = FALSE;
790 callback_scan_finished(interface);
794 callback_interface_removed(interface);
796 g_free(interface->wps_cred.key);
797 g_free(interface->path);
798 g_free(interface->network_path);
799 #if defined TIZEN_EXT
800 interface->network_path = NULL;
802 g_free(interface->ifname);
803 g_free(interface->driver);
804 g_free(interface->bridge);
805 remove_network_information(interface);
809 static void remove_network(gpointer data)
811 GSupplicantNetwork *network = data;
813 g_hash_table_destroy(network->bss_table);
815 callback_network_removed(network);
817 g_hash_table_destroy(network->config_table);
819 g_free(network->path);
820 g_free(network->group);
821 g_free(network->name);
822 #if defined TIZEN_EXT
823 g_free(network->eap);
824 g_free(network->identity);
825 g_free(network->phase2);
827 #if defined TIZEN_EXT
828 g_slist_free_full(network->vsie_list, g_free);
834 static void remove_bss(gpointer data)
836 struct g_supplicant_bss *bss = data;
839 #if defined TIZEN_EXT
840 g_slist_free_full(bss->vsie_list, g_free);
845 static void remove_peer(gpointer data)
847 GSupplicantPeer *peer = data;
849 callback_peer_lost(peer);
852 g_slist_free_full(peer->groups, g_free);
855 g_hash_table_remove(peer_mapping, peer->path);
857 if (pending_peer_connection)
858 g_hash_table_remove(pending_peer_connection, peer->path);
862 g_free(peer->identifier);
863 g_free(peer->widi_ies);
868 static void debug_strvalmap(const char *label, struct strvalmap *map,
873 for (i = 0; map[i].str; i++) {
874 if (val & map[i].val)
875 SUPPLICANT_DBG("%s: %s", label, map[i].str);
879 static void interface_capability_keymgmt(DBusMessageIter *iter, void *user_data)
881 GSupplicantInterface *interface = user_data;
882 const char *str = NULL;
885 dbus_message_iter_get_basic(iter, &str);
889 for (i = 0; keymgmt_map[i].str; i++)
890 if (strcmp(str, keymgmt_map[i].str) == 0) {
891 interface->keymgmt_capa |= keymgmt_map[i].val;
896 static void interface_capability_authalg(DBusMessageIter *iter, void *user_data)
898 GSupplicantInterface *interface = user_data;
899 const char *str = NULL;
902 dbus_message_iter_get_basic(iter, &str);
906 for (i = 0; authalg_capa_map[i].str; i++)
907 if (strcmp(str, authalg_capa_map[i].str) == 0) {
908 interface->authalg_capa |= authalg_capa_map[i].val;
913 static void interface_capability_proto(DBusMessageIter *iter, void *user_data)
915 GSupplicantInterface *interface = user_data;
916 const char *str = NULL;
919 dbus_message_iter_get_basic(iter, &str);
923 for (i = 0; proto_capa_map[i].str; i++)
924 if (strcmp(str, proto_capa_map[i].str) == 0) {
925 interface->proto_capa |= proto_capa_map[i].val;
930 static void interface_capability_pairwise(DBusMessageIter *iter,
933 GSupplicantInterface *interface = user_data;
934 const char *str = NULL;
937 dbus_message_iter_get_basic(iter, &str);
941 for (i = 0; pairwise_map[i].str; i++)
942 if (strcmp(str, pairwise_map[i].str) == 0) {
943 interface->pairwise_capa |= pairwise_map[i].val;
948 static void interface_capability_group(DBusMessageIter *iter, void *user_data)
950 GSupplicantInterface *interface = user_data;
951 const char *str = NULL;
954 dbus_message_iter_get_basic(iter, &str);
958 for (i = 0; group_map[i].str; i++)
959 if (strcmp(str, group_map[i].str) == 0) {
960 interface->group_capa |= group_map[i].val;
965 static void interface_capability_scan(DBusMessageIter *iter, void *user_data)
967 GSupplicantInterface *interface = user_data;
968 const char *str = NULL;
971 dbus_message_iter_get_basic(iter, &str);
975 for (i = 0; scan_capa_map[i].str; i++)
976 if (strcmp(str, scan_capa_map[i].str) == 0) {
977 interface->scan_capa |= scan_capa_map[i].val;
982 static void interface_capability_mode(DBusMessageIter *iter, void *user_data)
984 GSupplicantInterface *interface = user_data;
985 const char *str = NULL;
988 dbus_message_iter_get_basic(iter, &str);
992 for (i = 0; mode_capa_map[i].str; i++)
993 if (strcmp(str, mode_capa_map[i].str) == 0) {
994 interface->mode_capa |= mode_capa_map[i].val;
999 static void interface_capability(const char *key, DBusMessageIter *iter,
1002 GSupplicantInterface *interface = user_data;
1007 if (g_strcmp0(key, "KeyMgmt") == 0)
1008 supplicant_dbus_array_foreach(iter,
1009 interface_capability_keymgmt, interface);
1010 else if (g_strcmp0(key, "AuthAlg") == 0)
1011 supplicant_dbus_array_foreach(iter,
1012 interface_capability_authalg, interface);
1013 else if (g_strcmp0(key, "Protocol") == 0)
1014 supplicant_dbus_array_foreach(iter,
1015 interface_capability_proto, interface);
1016 else if (g_strcmp0(key, "Pairwise") == 0)
1017 supplicant_dbus_array_foreach(iter,
1018 interface_capability_pairwise, interface);
1019 else if (g_strcmp0(key, "Group") == 0)
1020 supplicant_dbus_array_foreach(iter,
1021 interface_capability_group, interface);
1022 else if (g_strcmp0(key, "Scan") == 0)
1023 supplicant_dbus_array_foreach(iter,
1024 interface_capability_scan, interface);
1025 else if (g_strcmp0(key, "Modes") == 0)
1026 supplicant_dbus_array_foreach(iter,
1027 interface_capability_mode, interface);
1028 else if (g_strcmp0(key, "MaxScanSSID") == 0) {
1029 dbus_int32_t max_scan_ssid;
1031 dbus_message_iter_get_basic(iter, &max_scan_ssid);
1032 if (max_scan_ssid < 2)
1034 interface->max_scan_ssids = max_scan_ssid;
1037 SUPPLICANT_DBG("key %s type %c",
1038 key, dbus_message_iter_get_arg_type(iter));
1041 struct set_apscan_data
1043 unsigned int ap_scan;
1044 GSupplicantInterface *interface;
1047 static void set_apscan(DBusMessageIter *iter, void *user_data)
1049 struct set_apscan_data *data = user_data;
1050 unsigned int ap_scan = data->ap_scan;
1052 dbus_message_iter_append_basic(iter, DBUS_TYPE_UINT32, &ap_scan);
1055 static void set_apscan_complete(const char *error,
1056 DBusMessageIter *iter, void *user_data)
1058 struct set_apscan_data *data = user_data;
1059 GSupplicantInterface *interface = data->interface;
1062 interface->ap_create_in_progress = false;
1063 SUPPLICANT_DBG("Set AP scan error %s", error);
1067 interface->ap_create_in_progress = true;
1072 int g_supplicant_interface_set_apscan(GSupplicantInterface *interface,
1073 unsigned int ap_scan)
1075 struct set_apscan_data *data;
1078 data = dbus_malloc0(sizeof(*data));
1083 data->ap_scan = ap_scan;
1084 data->interface = interface;
1086 ret = supplicant_dbus_property_set(interface->path,
1087 SUPPLICANT_INTERFACE ".Interface",
1088 "ApScan", DBUS_TYPE_UINT32_AS_STRING,
1089 set_apscan, set_apscan_complete, data, NULL);
1096 void g_supplicant_interface_set_data(GSupplicantInterface *interface,
1102 interface->data = data;
1105 interface->scan_callback = NULL;
1108 void *g_supplicant_interface_get_data(GSupplicantInterface *interface)
1113 return interface->data;
1116 const char *g_supplicant_interface_get_ifname(GSupplicantInterface *interface)
1121 return interface->ifname;
1124 const char *g_supplicant_interface_get_driver(GSupplicantInterface *interface)
1129 return interface->driver;
1132 GSupplicantState g_supplicant_interface_get_state(
1133 GSupplicantInterface *interface)
1136 return G_SUPPLICANT_STATE_UNKNOWN;
1138 return interface->state;
1141 const char *g_supplicant_interface_get_wps_key(GSupplicantInterface *interface)
1146 return (const char *)interface->wps_cred.key;
1149 const void *g_supplicant_interface_get_wps_ssid(GSupplicantInterface *interface,
1150 unsigned int *ssid_len)
1155 if (!interface || interface->wps_cred.ssid_len == 0) {
1160 *ssid_len = interface->wps_cred.ssid_len;
1161 return interface->wps_cred.ssid;
1164 GSupplicantWpsState g_supplicant_interface_get_wps_state(
1165 GSupplicantInterface *interface)
1168 return G_SUPPLICANT_WPS_STATE_UNKNOWN;
1170 return interface->wps_state;
1173 unsigned int g_supplicant_interface_get_mode(GSupplicantInterface *interface)
1178 return interface->mode_capa;
1181 unsigned int g_supplicant_interface_get_max_scan_ssids(
1182 GSupplicantInterface *interface)
1187 if (interface->max_scan_ssids == 0)
1188 return WPAS_MAX_SCAN_SSIDS;
1190 return interface->max_scan_ssids;
1193 static void set_network_enabled(DBusMessageIter *iter, void *user_data)
1195 dbus_bool_t enable = *(dbus_bool_t *)user_data;
1197 dbus_message_iter_append_basic(iter, DBUS_TYPE_BOOLEAN, &enable);
1200 int g_supplicant_interface_enable_selected_network(GSupplicantInterface *interface,
1206 if (!interface->network_path)
1209 SUPPLICANT_DBG(" ");
1210 return supplicant_dbus_property_set(interface->network_path,
1211 SUPPLICANT_INTERFACE ".Network",
1212 "Enabled", DBUS_TYPE_BOOLEAN_AS_STRING,
1213 set_network_enabled, NULL, &enable, NULL);
1216 dbus_bool_t g_supplicant_interface_get_ready(GSupplicantInterface *interface)
1221 return interface->ready;
1224 GSupplicantInterface *g_supplicant_network_get_interface(
1225 GSupplicantNetwork *network)
1230 return network->interface;
1233 const char *g_supplicant_network_get_name(GSupplicantNetwork *network)
1235 if (!network || !network->name)
1238 return network->name;
1241 const char *g_supplicant_network_get_identifier(GSupplicantNetwork *network)
1243 if (!network || !network->group)
1246 return network->group;
1249 const char *g_supplicant_network_get_path(GSupplicantNetwork *network)
1251 if (!network || !network->path)
1254 return network->path;
1257 const char *g_supplicant_network_get_mode(GSupplicantNetwork *network)
1260 return G_SUPPLICANT_MODE_UNKNOWN;
1262 return mode2string(network->mode);
1265 const char *g_supplicant_network_get_security(GSupplicantNetwork *network)
1268 return G_SUPPLICANT_SECURITY_UNKNOWN;
1270 return security2string(network->security);
1273 const void *g_supplicant_network_get_ssid(GSupplicantNetwork *network,
1274 unsigned int *ssid_len)
1281 *ssid_len = network->ssid_len;
1282 return network->ssid;
1285 dbus_int16_t g_supplicant_network_get_signal(GSupplicantNetwork *network)
1290 return network->signal;
1293 dbus_uint16_t g_supplicant_network_get_frequency(GSupplicantNetwork *network)
1298 return network->frequency;
1301 dbus_bool_t g_supplicant_network_get_wps(GSupplicantNetwork *network)
1306 return network->wps;
1309 dbus_bool_t g_supplicant_network_is_wps_active(GSupplicantNetwork *network)
1314 if (network->wps_capabilities & G_SUPPLICANT_WPS_CONFIGURED)
1320 dbus_bool_t g_supplicant_network_is_wps_pbc(GSupplicantNetwork *network)
1325 if (network->wps_capabilities & G_SUPPLICANT_WPS_PBC)
1331 dbus_bool_t g_supplicant_network_is_wps_advertizing(GSupplicantNetwork *network)
1336 if (network->wps_capabilities & G_SUPPLICANT_WPS_REGISTRAR)
1342 GSupplicantInterface *g_supplicant_peer_get_interface(GSupplicantPeer *peer)
1347 return peer->interface;
1350 const char *g_supplicant_peer_get_path(GSupplicantPeer *peer)
1358 const char *g_supplicant_peer_get_identifier(GSupplicantPeer *peer)
1363 return peer->identifier;
1366 const void *g_supplicant_peer_get_device_address(GSupplicantPeer *peer)
1371 return peer->device_address;
1374 const void *g_supplicant_peer_get_iface_address(GSupplicantPeer *peer)
1379 return peer->iface_address;
1382 const char *g_supplicant_peer_get_name(GSupplicantPeer *peer)
1390 #if defined TIZEN_EXT
1391 bool g_supplicant_network_is_hs20AP(GSupplicantNetwork *network)
1396 return network->isHS20AP;
1399 const char *g_supplicant_network_get_eap(GSupplicantNetwork *network)
1401 if (!network || !network->eap)
1404 return network->eap;
1407 const char *g_supplicant_network_get_identity(GSupplicantNetwork *network)
1409 if (!network || !network->identity)
1412 return network->identity;
1415 const char *g_supplicant_network_get_phase2(GSupplicantNetwork *network)
1417 if (!network || !network->phase2)
1420 return network->phase2;
1423 unsigned int g_supplicant_network_get_keymgmt(GSupplicantNetwork *network)
1425 if (network == NULL)
1428 return network->keymgmt;
1431 const unsigned char *g_supplicant_network_get_countrycode(GSupplicantNetwork
1437 return network->country_code;
1441 const unsigned char *g_supplicant_peer_get_widi_ies(GSupplicantPeer *peer,
1444 if (!peer || !length)
1447 *length = peer->widi_ies_length;
1448 return peer->widi_ies;
1451 bool g_supplicant_peer_is_wps_pbc(GSupplicantPeer *peer)
1456 if (peer->wps_capabilities & G_SUPPLICANT_WPS_PBC)
1462 bool g_supplicant_peer_is_wps_pin(GSupplicantPeer *peer)
1467 if (peer->wps_capabilities & G_SUPPLICANT_WPS_PIN)
1473 bool g_supplicant_peer_is_in_a_group(GSupplicantPeer *peer)
1475 if (!peer || !peer->groups)
1481 GSupplicantInterface *g_supplicant_peer_get_group_interface(GSupplicantPeer *peer)
1486 return (GSupplicantInterface *) peer->current_group_iface;
1489 bool g_supplicant_peer_is_client(GSupplicantPeer *peer)
1491 GSupplicantGroup *group;
1497 for (list = peer->groups; list; list = list->next) {
1498 const char *path = list->data;
1500 group = g_hash_table_lookup(group_mapping, path);
1504 if (group->role != G_SUPPLICANT_GROUP_ROLE_CLIENT ||
1505 group->orig_interface != peer->interface)
1508 if (group->interface == peer->current_group_iface)
1515 bool g_supplicant_peer_has_requested_connection(GSupplicantPeer *peer)
1520 return peer->connection_requested;
1523 #if defined TIZEN_EXT
1525 * Description: Network client requires additional wifi specific info
1527 const unsigned char *g_supplicant_network_get_bssid(GSupplicantNetwork *network)
1529 if (network == NULL || network->best_bss == NULL)
1532 return (const unsigned char *)network->best_bss->bssid;
1535 unsigned int g_supplicant_network_get_maxrate(GSupplicantNetwork *network)
1537 if (network == NULL || network->best_bss == NULL)
1540 return network->best_bss->maxrate;
1543 const char *g_supplicant_network_get_enc_mode(GSupplicantNetwork *network)
1545 if (network == NULL || network->best_bss == NULL)
1548 if (network->best_bss->security == G_SUPPLICANT_SECURITY_PSK ||
1549 network->best_bss->security == G_SUPPLICANT_SECURITY_IEEE8021X) {
1550 unsigned int pairwise;
1552 pairwise = network->best_bss->rsn_pairwise |
1553 network->best_bss->wpa_pairwise;
1555 if ((pairwise & G_SUPPLICANT_PAIRWISE_CCMP) &&
1556 (pairwise & G_SUPPLICANT_PAIRWISE_TKIP))
1558 else if (pairwise & G_SUPPLICANT_PAIRWISE_CCMP)
1560 else if (pairwise & G_SUPPLICANT_PAIRWISE_TKIP)
1563 } else if (network->best_bss->security == G_SUPPLICANT_SECURITY_WEP)
1565 else if (network->best_bss->security == G_SUPPLICANT_SECURITY_NONE)
1571 bool g_supplicant_network_get_rsn_mode(GSupplicantNetwork *network)
1573 if (network == NULL || network->best_bss == NULL)
1576 if (network->best_bss->rsn_selected) {
1577 const char *mode = g_supplicant_network_get_enc_mode(network);
1578 if (g_strcmp0(mode, "aes") == 0 ||
1579 g_strcmp0(mode, "mixed") == 0)
1587 void *g_supplicant_network_get_wifi_vsie(GSupplicantNetwork *network)
1589 GSList *vsie_list = NULL;
1594 if (g_slist_length(network->vsie_list) > 0) {
1595 GSList *list = NULL;
1596 unsigned char *vsie = NULL;
1597 for (list = network->vsie_list; list; list = list->next) {
1598 unsigned char *ie = (unsigned char *)list->data;
1601 vsie = (unsigned char *)g_try_malloc0(ie[1]+2); // tag number size(1), tag length size(1)
1604 memcpy(vsie, ie, ie[1]+2);
1605 vsie_list = g_slist_append(vsie_list, vsie);
1607 SUPPLICANT_DBG("Failed to allocate memory");
1614 static void update_bssid_list(gpointer key, gpointer value, gpointer user_data)
1616 struct g_supplicant_bss *bss = value;
1617 struct g_connman_bssids *bssids = NULL;
1619 GSList **list = (GSList **)user_data;
1621 bssids = (struct g_connman_bssids *)g_try_malloc0(sizeof(struct g_connman_bssids));
1624 g_snprintf(buff, 18, "%02x:%02x:%02x:%02x:%02x:%02x",
1625 bss->bssid[0], bss->bssid[1], bss->bssid[2], bss->bssid[3],
1626 bss->bssid[4], bss->bssid[5]);
1628 memcpy(bssids->bssid, buff, 18);
1629 bssids->bssid[17] = '\0';
1630 bssids->strength = bss->signal;
1631 bssids->strength += 120;
1633 if (bssids->strength > 100)
1634 bssids->strength = 100;
1636 bssids->frequency = bss->frequency;
1637 *list = g_slist_append(*list, bssids);
1639 SUPPLICANT_DBG("Failed to allocate memory");
1642 void *g_supplicant_network_get_bssid_list(GSupplicantNetwork *network)
1644 GSList *bssid_list = NULL;
1646 if (g_hash_table_size(network->bss_table) < 1)
1649 g_hash_table_foreach(network->bss_table, update_bssid_list, &bssid_list);
1655 static void merge_network(GSupplicantNetwork *network)
1658 const char *ssid, *mode, *key_mgmt;
1659 #if defined TIZEN_EXT
1660 const char *isHS20AP;
1661 const char *eap, *identity, *phase2;
1663 unsigned int i, ssid_len;
1666 ssid = g_hash_table_lookup(network->config_table, "ssid");
1667 mode = g_hash_table_lookup(network->config_table, "mode");
1668 key_mgmt = g_hash_table_lookup(network->config_table, "key_mgmt");
1669 #if defined TIZEN_EXT
1670 isHS20AP = g_hash_table_lookup(network->config_table, "isHS20AP");
1671 eap = g_hash_table_lookup(network->config_table, "eap");
1672 identity = g_hash_table_lookup(network->config_table, "identity");
1673 phase2 = g_hash_table_lookup(network->config_table, "phase2");
1676 SUPPLICANT_DBG("ssid %s mode %s", ssid, mode);
1679 ssid_len = strlen(ssid);
1683 str = g_string_sized_new((ssid_len * 2) + 24);
1687 for (i = 0; i < ssid_len; i++)
1688 #if defined TIZEN_EXT
1692 g_string_append_printf(str, "%02x", ssid[i]);
1693 #if defined TIZEN_EXT
1697 if (g_strcmp0(mode, "0") == 0)
1698 g_string_append_printf(str, "_managed");
1699 else if (g_strcmp0(mode, "1") == 0)
1700 g_string_append_printf(str, "_adhoc");
1702 if (g_strcmp0(key_mgmt, "WPA-PSK") == 0)
1703 g_string_append_printf(str, "_psk");
1704 #if defined TIZEN_EXT
1705 else if (g_strcmp0(key_mgmt, "WPA-EAP") == 0)
1706 g_string_append_printf(str, "_ieee8021x");
1708 g_string_append_printf(str, "_none");
1711 group = g_string_free(str, FALSE);
1713 SUPPLICANT_DBG("%s", group);
1715 #if defined TIZEN_EXT
1716 if (g_strcmp0(isHS20AP, "1") == 0) {
1717 network->isHS20AP = 1;
1719 g_free(network->eap);
1720 network->eap = g_strdup(eap);
1722 if (network->identity)
1723 g_free(network->identity);
1724 network->identity = g_strdup(identity);
1726 if (network->phase2)
1727 g_free(network->phase2);
1728 network->phase2 = g_strdup(phase2);
1730 network->isHS20AP = 0;
1732 network->group = g_strdup(group);
1733 callback_network_merged(network);
1734 g_free(network->group);
1739 g_hash_table_destroy(network->config_table);
1741 g_free(network->path);
1745 static void network_property(const char *key, DBusMessageIter *iter,
1748 GSupplicantNetwork *network = user_data;
1750 if (!network->interface)
1754 merge_network(network);
1758 if (g_strcmp0(key, "Enabled") == 0) {
1759 dbus_bool_t enabled = FALSE;
1761 dbus_message_iter_get_basic(iter, &enabled);
1762 } else if (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_STRING) {
1763 const char *str = NULL;
1765 dbus_message_iter_get_basic(iter, &str);
1767 g_hash_table_replace(network->config_table,
1768 g_strdup(key), g_strdup(str));
1771 SUPPLICANT_DBG("key %s type %c",
1772 key, dbus_message_iter_get_arg_type(iter));
1775 static void interface_network_added(DBusMessageIter *iter, void *user_data)
1777 GSupplicantInterface *interface = user_data;
1778 GSupplicantNetwork *network;
1779 const char *path = NULL;
1783 dbus_message_iter_get_basic(iter, &path);
1787 if (g_strcmp0(path, "/") == 0)
1790 network = g_try_new0(GSupplicantNetwork, 1);
1794 network->interface = interface;
1795 network->path = g_strdup(path);
1797 network->config_table = g_hash_table_new_full(g_str_hash, g_str_equal,
1800 dbus_message_iter_next(iter);
1801 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
1802 supplicant_dbus_property_foreach(iter, network_property,
1804 network_property(NULL, NULL, network);
1808 supplicant_dbus_property_get_all(path,
1809 SUPPLICANT_INTERFACE ".Network",
1810 network_property, network, NULL);
1813 static void interface_network_removed(DBusMessageIter *iter, void *user_data)
1819 static char *create_name(unsigned char *ssid, int ssid_len)
1822 const gchar *remainder, *invalid;
1823 int valid_bytes, remaining_bytes;
1825 if (ssid_len < 1 || ssid[0] == '\0')
1826 return g_strdup("");
1829 remainder = (const gchar *)ssid;
1830 remaining_bytes = ssid_len;
1832 while (remaining_bytes != 0) {
1833 if (g_utf8_validate(remainder, remaining_bytes,
1838 valid_bytes = invalid - remainder;
1841 string = g_string_sized_new(remaining_bytes);
1843 g_string_append_len(string, remainder, valid_bytes);
1845 /* append U+FFFD REPLACEMENT CHARACTER */
1846 g_string_append(string, "\357\277\275");
1848 remaining_bytes -= valid_bytes + 1;
1849 remainder = invalid + 1;
1853 return g_strndup((const gchar *)ssid, ssid_len + 1);
1855 g_string_append(string, remainder);
1857 return g_string_free(string, FALSE);
1860 static char *create_group(struct g_supplicant_bss *bss)
1864 const char *mode, *security;
1866 str = g_string_sized_new((bss->ssid_len * 2) + 24);
1870 if (bss->ssid_len > 0 && bss->ssid[0] != '\0') {
1871 for (i = 0; i < bss->ssid_len; i++)
1872 g_string_append_printf(str, "%02x", bss->ssid[i]);
1874 g_string_append_printf(str, "hidden");
1876 mode = mode2string(bss->mode);
1878 g_string_append_printf(str, "_%s", mode);
1880 security = security2string(bss->security);
1882 g_string_append_printf(str, "_%s", security);
1884 return g_string_free(str, FALSE);
1887 static int add_or_replace_bss_to_network(struct g_supplicant_bss *bss)
1889 GSupplicantInterface *interface = bss->interface;
1890 GSupplicantNetwork *network;
1893 group = create_group(bss);
1894 SUPPLICANT_DBG("New group created: %s", group);
1899 network = g_hash_table_lookup(interface->network_table, group);
1902 SUPPLICANT_DBG("Network %s already exist", network->name);
1907 network = g_try_new0(GSupplicantNetwork, 1);
1913 network->interface = interface;
1915 network->path = g_strdup(bss->path);
1916 network->group = group;
1917 network->name = create_name(bss->ssid, bss->ssid_len);
1918 network->mode = bss->mode;
1919 network->security = bss->security;
1920 network->ssid_len = bss->ssid_len;
1921 memcpy(network->ssid, bss->ssid, bss->ssid_len);
1922 network->signal = bss->signal;
1923 network->frequency = bss->frequency;
1924 network->best_bss = bss;
1926 #if defined TIZEN_EXT
1927 network->keymgmt = bss->keymgmt;
1929 if (g_slist_length(bss->vsie_list) > 0) {
1930 GSList *list = NULL;
1931 unsigned char *vsie = NULL;
1932 for (list = bss->vsie_list; list; list = list->next) {
1933 unsigned char *ie = (unsigned char *)list->data;
1934 vsie = (unsigned char *)g_try_malloc0(ie[1]+2); // tag number size(1), tag length size(1)
1937 memcpy(vsie, ie, ie[1]+2);
1938 network->vsie_list = g_slist_append(network->vsie_list, vsie);
1940 SUPPLICANT_DBG("Failed to allocate memory.");
1944 network->isHS20AP = bss->hs20;
1945 memcpy(network->country_code, bss->country_code, COUNTRY_CODE_LENGTH);
1948 SUPPLICANT_DBG("New network %s created", network->name);
1950 network->bss_table = g_hash_table_new_full(g_str_hash, g_str_equal,
1953 network->config_table = g_hash_table_new_full(g_str_hash, g_str_equal,
1956 g_hash_table_replace(interface->network_table,
1957 network->group, network);
1959 callback_network_added(network);
1962 /* We update network's WPS properties if only bss provides WPS. */
1963 if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
1964 network->wps = TRUE;
1965 network->wps_capabilities |= bss->wps_capabilities;
1969 * Do not change best BSS if we are connected. It will be done through
1970 * CurrentBSS property in case of misalignment with wpa_s or roaming.
1972 if (network != interface->current_network &&
1973 bss->signal > network->signal) {
1974 network->signal = bss->signal;
1975 network->best_bss = bss;
1976 callback_network_changed(network, "Signal");
1979 g_hash_table_replace(interface->bss_mapping, bss->path, network);
1980 g_hash_table_replace(network->bss_table, bss->path, bss);
1982 g_hash_table_replace(bss_mapping, bss->path, interface);
1987 static void bss_rates(DBusMessageIter *iter, void *user_data)
1989 struct g_supplicant_bss *bss = user_data;
1990 dbus_uint32_t rate = 0;
1992 dbus_message_iter_get_basic(iter, &rate);
1996 if (rate > bss->maxrate)
1997 bss->maxrate = rate;
2000 static void bss_keymgmt(DBusMessageIter *iter, void *user_data)
2002 unsigned int *keymgmt = user_data;
2003 const char *str = NULL;
2006 dbus_message_iter_get_basic(iter, &str);
2010 for (i = 0; keymgmt_map[i].str; i++)
2011 if (strcmp(str, keymgmt_map[i].str) == 0) {
2012 SUPPLICANT_DBG("Keymgmt: %s", str);
2013 *keymgmt |= keymgmt_map[i].val;
2018 static void bss_group(DBusMessageIter *iter, void *user_data)
2020 unsigned int *group = user_data;
2021 const char *str = NULL;
2024 dbus_message_iter_get_basic(iter, &str);
2028 for (i = 0; group_map[i].str; i++)
2029 if (strcmp(str, group_map[i].str) == 0) {
2030 SUPPLICANT_DBG("Group: %s", str);
2031 *group |= group_map[i].val;
2036 static void bss_pairwise(DBusMessageIter *iter, void *user_data)
2038 unsigned int *pairwise = user_data;
2039 const char *str = NULL;
2042 dbus_message_iter_get_basic(iter, &str);
2046 for (i = 0; pairwise_map[i].str; i++)
2047 if (strcmp(str, pairwise_map[i].str) == 0) {
2048 SUPPLICANT_DBG("Pairwise: %s", str);
2049 *pairwise |= pairwise_map[i].val;
2054 static void bss_wpa(const char *key, DBusMessageIter *iter,
2057 struct g_supplicant_bss *bss = user_data;
2058 unsigned int value = 0;
2060 SUPPLICANT_DBG("Key: %s", key);
2062 if (g_strcmp0(key, "KeyMgmt") == 0) {
2063 supplicant_dbus_array_foreach(iter, bss_keymgmt, &value);
2065 if (bss->rsn_selected)
2066 bss->rsn_keymgmt = value;
2068 bss->wpa_keymgmt = value;
2069 } else if (g_strcmp0(key, "Group") == 0) {
2070 supplicant_dbus_array_foreach(iter, bss_group, &value);
2072 if (bss->rsn_selected)
2073 bss->rsn_group = value;
2075 bss->wpa_group = value;
2076 } else if (g_strcmp0(key, "Pairwise") == 0) {
2077 supplicant_dbus_array_foreach(iter, bss_pairwise, &value);
2079 if (bss->rsn_selected)
2080 bss->rsn_pairwise = value;
2082 bss->wpa_pairwise = value;
2086 static unsigned int get_tlv(unsigned char *ie, unsigned int ie_size,
2089 unsigned int len = 0;
2091 while (len + 4 < ie_size) {
2092 unsigned int hi = ie[len];
2093 unsigned int lo = ie[len + 1];
2094 unsigned int tmp_type = (hi << 8) + lo;
2095 unsigned int v_len = 0;
2097 /* hi and lo are used to recreate an unsigned int
2098 * based on 2 8bits length unsigned int. */
2102 v_len = (hi << 8) + lo;
2104 if (tmp_type == type) {
2105 unsigned int ret_value = 0;
2106 unsigned char *value = (unsigned char *)&ret_value;
2108 SUPPLICANT_DBG("IE: match type 0x%x", type);
2110 /* Verifying length relevance */
2111 if (v_len > sizeof(unsigned int) ||
2112 len + 4 + v_len > ie_size)
2115 memcpy(value, ie + len + 4, v_len);
2117 SUPPLICANT_DBG("returning 0x%x", ret_value);
2124 SUPPLICANT_DBG("returning 0");
2128 static void bss_process_ies(DBusMessageIter *iter, void *user_data)
2130 struct g_supplicant_bss *bss = user_data;
2131 const unsigned char WPS_OUI[] = { 0x00, 0x50, 0xf2, 0x04 };
2132 unsigned char *ie, *ie_end;
2133 DBusMessageIter array;
2137 #define WMM_WPA1_WPS_INFO 221
2138 #define WPS_INFO_MIN_LEN 6
2139 #define WPS_VERSION_TLV 0x104A
2140 #define WPS_STATE_TLV 0x1044
2141 #define WPS_METHODS_TLV 0x1012
2142 #define WPS_REGISTRAR_TLV 0x1041
2143 #define WPS_VERSION 0x10
2144 #define WPS_PBC 0x04
2145 #define WPS_PIN 0x00
2146 #define WPS_CONFIGURED 0x02
2147 #if defined TIZEN_EXT
2148 #define VENDOR_SPECIFIC_INFO 0xDD
2149 #define WLAN_EID_COUNTRY 7
2152 dbus_message_iter_recurse(iter, &array);
2153 dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
2155 if (!ie || ie_len < 2)
2158 bss->wps_capabilities = 0;
2160 memset(bss->country_code, 0, COUNTRY_CODE_LENGTH);
2162 for (ie_end = ie + ie_len; ie < ie_end && ie + ie[1] + 1 <= ie_end;
2164 #if defined TIZEN_EXT
2165 unsigned char *vsie;
2167 if(ie[0] == VENDOR_SPECIFIC_INFO && memcmp(ie+2, WPS_OUI, sizeof(WPS_OUI)) != 0) {
2168 SUPPLICANT_DBG("IE: match vendor specific data");
2170 vsie_len = ie[1]+2; // tag number size(1), tag length size(1)
2171 vsie = (unsigned char *)g_try_malloc0(vsie_len);
2174 memcpy(vsie, ie, vsie_len);
2175 bss->vsie_list = g_slist_append(bss->vsie_list, vsie);
2177 SUPPLICANT_DBG("Failed to allocate memory");
2181 if(ie[0] == WLAN_EID_COUNTRY && ie[1] >= 2) {
2182 /* Add country code only if it is a valid alphabet */
2183 if (ie[2] >= 65 && ie[2] <= 90 && ie[3] >= 65 && ie[3] <= 90) {
2184 memcpy(bss->country_code, ie+2, COUNTRY_CODE_LENGTH);
2189 if (ie[0] != WMM_WPA1_WPS_INFO || ie[1] < WPS_INFO_MIN_LEN ||
2190 memcmp(ie+2, WPS_OUI, sizeof(WPS_OUI)) != 0)
2193 SUPPLICANT_DBG("IE: match WPS_OUI");
2195 value = get_tlv(&ie[6], ie[1], WPS_STATE_TLV);
2196 if (get_tlv(&ie[6], ie[1], WPS_VERSION_TLV) == WPS_VERSION &&
2198 bss->keymgmt |= G_SUPPLICANT_KEYMGMT_WPS;
2200 if (value == WPS_CONFIGURED)
2201 bss->wps_capabilities |=
2202 G_SUPPLICANT_WPS_CONFIGURED;
2205 value = get_tlv(&ie[6], ie[1], WPS_METHODS_TLV);
2207 if (GUINT16_FROM_BE(value) == WPS_PBC)
2208 bss->wps_capabilities |= G_SUPPLICANT_WPS_PBC;
2209 if (GUINT16_FROM_BE(value) == WPS_PIN)
2210 bss->wps_capabilities |= G_SUPPLICANT_WPS_PIN;
2212 bss->wps_capabilities |=
2213 G_SUPPLICANT_WPS_PBC | G_SUPPLICANT_WPS_PIN;
2215 /* If the AP sends this it means it's advertizing
2216 * as a registrar and the WPS process is launched
2218 if (get_tlv(&ie[6], ie[1], WPS_REGISTRAR_TLV) != 0)
2219 bss->wps_capabilities |= G_SUPPLICANT_WPS_REGISTRAR;
2221 SUPPLICANT_DBG("WPS Methods 0x%x", bss->wps_capabilities);
2225 static void bss_compute_security(struct g_supplicant_bss *bss)
2228 * Combining RSN and WPA keymgmt
2229 * We combine it since parsing IEs might have set something for WPS. */
2230 bss->keymgmt |= bss->rsn_keymgmt | bss->wpa_keymgmt;
2232 bss->ieee8021x = FALSE;
2234 #if defined TIZEN_EXT
2235 bss->ft_ieee8021x = FALSE;
2236 bss->ft_psk = FALSE;
2239 #if defined TIZEN_EXT
2241 (G_SUPPLICANT_KEYMGMT_WPA_EAP |
2242 G_SUPPLICANT_KEYMGMT_WPA_EAP_256))
2243 bss->ieee8021x = TRUE;
2244 else if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_EAP)
2245 bss->ft_ieee8021x = TRUE;
2248 (G_SUPPLICANT_KEYMGMT_WPA_EAP |
2249 G_SUPPLICANT_KEYMGMT_WPA_FT_EAP |
2250 G_SUPPLICANT_KEYMGMT_WPA_EAP_256))
2251 bss->ieee8021x = TRUE;
2254 #if defined TIZEN_EXT
2256 (G_SUPPLICANT_KEYMGMT_WPA_PSK |
2257 G_SUPPLICANT_KEYMGMT_WPA_PSK_256))
2259 else if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_PSK)
2263 (G_SUPPLICANT_KEYMGMT_WPA_PSK |
2264 G_SUPPLICANT_KEYMGMT_WPA_FT_PSK |
2265 G_SUPPLICANT_KEYMGMT_WPA_PSK_256))
2270 bss->security = G_SUPPLICANT_SECURITY_IEEE8021X;
2272 bss->security = G_SUPPLICANT_SECURITY_PSK;
2273 #if defined TIZEN_EXT
2274 else if (bss->ft_psk)
2275 bss->security = G_SUPPLICANT_SECURITY_FT_PSK;
2276 else if (bss->ft_ieee8021x == TRUE)
2277 bss->security = G_SUPPLICANT_SECURITY_IEEE8021X;
2279 else if (bss->privacy)
2280 bss->security = G_SUPPLICANT_SECURITY_WEP;
2282 bss->security = G_SUPPLICANT_SECURITY_NONE;
2286 static void bss_property(const char *key, DBusMessageIter *iter,
2289 struct g_supplicant_bss *bss = user_data;
2291 if (!bss->interface)
2294 SUPPLICANT_DBG("key %s", key);
2299 if (g_strcmp0(key, "BSSID") == 0) {
2300 DBusMessageIter array;
2301 unsigned char *addr;
2304 dbus_message_iter_recurse(iter, &array);
2305 dbus_message_iter_get_fixed_array(&array, &addr, &addr_len);
2308 memcpy(bss->bssid, addr, addr_len);
2309 } else if (g_strcmp0(key, "SSID") == 0) {
2310 DBusMessageIter array;
2311 unsigned char *ssid;
2314 dbus_message_iter_recurse(iter, &array);
2315 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
2317 if (ssid_len > 0 && ssid_len < 33) {
2318 memcpy(bss->ssid, ssid, ssid_len);
2319 bss->ssid_len = ssid_len;
2321 memset(bss->ssid, 0, sizeof(bss->ssid));
2324 } else if (g_strcmp0(key, "Capabilities") == 0) {
2325 dbus_uint16_t capabilities = 0x0000;
2327 dbus_message_iter_get_basic(iter, &capabilities);
2329 if (capabilities & IEEE80211_CAP_ESS)
2330 bss->mode = G_SUPPLICANT_MODE_INFRA;
2331 else if (capabilities & IEEE80211_CAP_IBSS)
2332 bss->mode = G_SUPPLICANT_MODE_IBSS;
2334 if (capabilities & IEEE80211_CAP_PRIVACY)
2335 bss->privacy = TRUE;
2336 } else if (g_strcmp0(key, "Mode") == 0) {
2337 const char *mode = NULL;
2339 dbus_message_iter_get_basic(iter, &mode);
2340 bss->mode = string2mode(mode);
2341 } else if (g_strcmp0(key, "Frequency") == 0) {
2342 dbus_uint16_t frequency = 0;
2344 dbus_message_iter_get_basic(iter, &frequency);
2345 bss->frequency = frequency;
2346 } else if (g_strcmp0(key, "Signal") == 0) {
2347 dbus_int16_t signal = 0;
2349 dbus_message_iter_get_basic(iter, &signal);
2351 bss->signal = signal;
2353 bss->signal = BSS_UNKNOWN_STRENGTH;
2355 } else if (g_strcmp0(key, "Level") == 0) {
2356 dbus_int32_t level = 0;
2358 dbus_message_iter_get_basic(iter, &level);
2359 } else if (g_strcmp0(key, "Rates") == 0) {
2360 supplicant_dbus_array_foreach(iter, bss_rates, bss);
2361 } else if (g_strcmp0(key, "MaxRate") == 0) {
2362 dbus_uint32_t maxrate = 0;
2364 dbus_message_iter_get_basic(iter, &maxrate);
2366 bss->maxrate = maxrate;
2367 } else if (g_strcmp0(key, "Privacy") == 0) {
2368 dbus_bool_t privacy = FALSE;
2370 dbus_message_iter_get_basic(iter, &privacy);
2371 bss->privacy = privacy;
2372 } else if (g_strcmp0(key, "RSN") == 0) {
2373 bss->rsn_selected = TRUE;
2375 supplicant_dbus_property_foreach(iter, bss_wpa, bss);
2376 } else if (g_strcmp0(key, "WPA") == 0) {
2377 bss->rsn_selected = FALSE;
2379 supplicant_dbus_property_foreach(iter, bss_wpa, bss);
2380 #if defined TIZEN_EXT
2381 } else if (g_strcmp0(key, "HS20") == 0) {
2382 dbus_bool_t hs20 = FALSE;
2383 dbus_message_iter_get_basic(iter, &hs20);
2386 } else if (g_strcmp0(key, "IEs") == 0)
2387 bss_process_ies(iter, bss);
2389 SUPPLICANT_DBG("key %s type %c",
2390 key, dbus_message_iter_get_arg_type(iter));
2393 static struct g_supplicant_bss *interface_bss_added(DBusMessageIter *iter,
2396 GSupplicantInterface *interface = user_data;
2397 GSupplicantNetwork *network;
2398 struct g_supplicant_bss *bss;
2399 const char *path = NULL;
2403 dbus_message_iter_get_basic(iter, &path);
2407 if (g_strcmp0(path, "/") == 0)
2410 SUPPLICANT_DBG("%s", path);
2412 network = g_hash_table_lookup(interface->bss_mapping, path);
2414 bss = g_hash_table_lookup(network->bss_table, path);
2419 bss = g_try_new0(struct g_supplicant_bss, 1);
2423 bss->interface = interface;
2424 bss->path = g_strdup(path);
2425 bss->signal = BSS_UNKNOWN_STRENGTH;
2430 static void interface_bss_added_with_keys(DBusMessageIter *iter,
2433 struct g_supplicant_bss *bss;
2437 bss = interface_bss_added(iter, user_data);
2441 dbus_message_iter_next(iter);
2443 if (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_INVALID)
2446 supplicant_dbus_property_foreach(iter, bss_property, bss);
2448 bss_compute_security(bss);
2449 if (add_or_replace_bss_to_network(bss) < 0)
2450 SUPPLICANT_DBG("add_or_replace_bss_to_network failed");
2453 static void interface_bss_added_without_keys(DBusMessageIter *iter,
2456 struct g_supplicant_bss *bss;
2460 bss = interface_bss_added(iter, user_data);
2464 supplicant_dbus_property_get_all(bss->path,
2465 SUPPLICANT_INTERFACE ".BSS",
2466 bss_property, bss, NULL);
2468 bss_compute_security(bss);
2469 if (add_or_replace_bss_to_network(bss) < 0)
2470 SUPPLICANT_DBG("add_or_replace_bss_to_network failed");
2473 static void update_signal(gpointer key, gpointer value,
2476 struct g_supplicant_bss *bss = value;
2477 GSupplicantNetwork *network = user_data;
2479 if (bss->signal > network->signal) {
2480 network->signal = bss->signal;
2481 network->best_bss = bss;
2485 static void update_network_signal(GSupplicantNetwork *network)
2487 if (g_hash_table_size(network->bss_table) <= 1 && network->best_bss)
2490 g_hash_table_foreach(network->bss_table,
2491 update_signal, network);
2493 SUPPLICANT_DBG("New network signal %d", network->signal);
2496 static void interface_current_bss(GSupplicantInterface *interface,
2497 DBusMessageIter *iter)
2499 GSupplicantNetwork *network;
2500 struct g_supplicant_bss *bss;
2503 dbus_message_iter_get_basic(iter, &path);
2504 if (g_strcmp0(path, "/") == 0) {
2505 interface->current_network = NULL;
2509 interface_bss_added_without_keys(iter, interface);
2511 network = g_hash_table_lookup(interface->bss_mapping, path);
2515 bss = g_hash_table_lookup(network->bss_table, path);
2519 interface->current_network = network;
2521 if (bss != network->best_bss) {
2523 * This is the case where either wpa_s got associated
2524 * to a BSS different than the one ConnMan considers
2525 * the best, or we are roaming.
2527 SUPPLICANT_DBG("Update best BSS for %s", network->name);
2529 network->best_bss = bss;
2531 if (network->signal != bss->signal) {
2532 SUPPLICANT_DBG("New network signal %d dBm",
2535 network->signal = bss->signal;
2536 callback_network_changed(network, "Signal");
2541 * wpa_s could notify about CurrentBSS in any state once
2542 * it got associated. It is not sure such notification will
2543 * arrive together with transition to ASSOCIATED state.
2544 * In fact, for networks with security WEP or OPEN, it
2545 * always arrives together with transition to COMPLETED.
2547 switch (interface->state) {
2548 case G_SUPPLICANT_STATE_UNKNOWN:
2549 case G_SUPPLICANT_STATE_DISABLED:
2550 case G_SUPPLICANT_STATE_DISCONNECTED:
2551 case G_SUPPLICANT_STATE_INACTIVE:
2552 case G_SUPPLICANT_STATE_SCANNING:
2553 case G_SUPPLICANT_STATE_AUTHENTICATING:
2554 case G_SUPPLICANT_STATE_ASSOCIATING:
2556 case G_SUPPLICANT_STATE_ASSOCIATED:
2557 case G_SUPPLICANT_STATE_4WAY_HANDSHAKE:
2558 case G_SUPPLICANT_STATE_GROUP_HANDSHAKE:
2559 case G_SUPPLICANT_STATE_COMPLETED:
2560 callback_network_associated(network);
2565 static void interface_bss_removed(DBusMessageIter *iter, void *user_data)
2567 GSupplicantInterface *interface = user_data;
2568 GSupplicantNetwork *network;
2569 struct g_supplicant_bss *bss = NULL;
2570 const char *path = NULL;
2572 dbus_message_iter_get_basic(iter, &path);
2576 network = g_hash_table_lookup(interface->bss_mapping, path);
2580 bss = g_hash_table_lookup(network->bss_table, path);
2581 if (network->best_bss == bss) {
2582 network->best_bss = NULL;
2583 network->signal = BSS_UNKNOWN_STRENGTH;
2586 g_hash_table_remove(bss_mapping, path);
2588 g_hash_table_remove(interface->bss_mapping, path);
2589 g_hash_table_remove(network->bss_table, path);
2591 update_network_signal(network);
2593 if (g_hash_table_size(network->bss_table) == 0)
2594 g_hash_table_remove(interface->network_table, network->group);
2597 static void set_config_methods(DBusMessageIter *iter, void *user_data)
2599 dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, user_data);
2602 static void wps_property(const char *key, DBusMessageIter *iter,
2605 GSupplicantInterface *interface = user_data;
2610 SUPPLICANT_DBG("key: %s", key);
2612 if (g_strcmp0(key, "ConfigMethods") == 0) {
2613 const char *config_methods = "push_button", *str = NULL;
2615 dbus_message_iter_get_basic(iter, &str);
2616 if (str && strlen(str) > 0) {
2617 /* It was already set at wpa_s level, don't modify it. */
2618 SUPPLICANT_DBG("%s", str);
2622 supplicant_dbus_property_set(interface->path,
2623 SUPPLICANT_INTERFACE ".Interface.WPS",
2624 "ConfigMethods", DBUS_TYPE_STRING_AS_STRING,
2625 set_config_methods, NULL, &config_methods, NULL);
2627 SUPPLICANT_DBG("No value. Set %s", config_methods);
2632 static void interface_property(const char *key, DBusMessageIter *iter,
2635 GSupplicantInterface *interface = user_data;
2640 SUPPLICANT_DBG("%s", key);
2643 debug_strvalmap("KeyMgmt capability", keymgmt_map,
2644 interface->keymgmt_capa);
2645 debug_strvalmap("AuthAlg capability", authalg_capa_map,
2646 interface->authalg_capa);
2647 debug_strvalmap("Protocol capability", proto_capa_map,
2648 interface->proto_capa);
2649 debug_strvalmap("Pairwise capability", pairwise_map,
2650 interface->pairwise_capa);
2651 debug_strvalmap("Group capability", group_map,
2652 interface->group_capa);
2653 debug_strvalmap("Scan capability", scan_capa_map,
2654 interface->scan_capa);
2655 debug_strvalmap("Mode capability", mode_capa_map,
2656 interface->mode_capa);
2658 supplicant_dbus_property_get_all(interface->path,
2659 SUPPLICANT_INTERFACE ".Interface.WPS",
2660 wps_property, interface, interface);
2662 if (interface->ready)
2663 callback_interface_added(interface);
2668 if (g_strcmp0(key, "Capabilities") == 0) {
2669 supplicant_dbus_property_foreach(iter, interface_capability,
2671 #if !defined TIZEN_EXT
2672 if (interface->mode_capa & G_SUPPLICANT_CAPABILITY_MODE_P2P)
2673 interface->p2p_support = true;
2675 } else if (g_strcmp0(key, "State") == 0) {
2676 const char *str = NULL;
2678 dbus_message_iter_get_basic(iter, &str);
2680 if (string2state(str) != interface->state) {
2681 interface->state = string2state(str);
2682 callback_interface_state(interface);
2685 if (interface->ap_create_in_progress) {
2686 if (interface->state == G_SUPPLICANT_STATE_DISCONNECTED)
2687 callback_ap_create_fail(interface);
2689 interface->ap_create_in_progress = false;
2692 if (interface->state == G_SUPPLICANT_STATE_DISABLED)
2693 interface->ready = FALSE;
2695 interface->ready = TRUE;
2697 SUPPLICANT_DBG("state %s (%d)", str, interface->state);
2698 } else if (g_strcmp0(key, "Scanning") == 0) {
2699 dbus_bool_t scanning = FALSE;
2701 dbus_message_iter_get_basic(iter, &scanning);
2702 interface->scanning = scanning;
2704 if (interface->ready) {
2705 if (interface->scanning)
2706 callback_scan_started(interface);
2708 callback_scan_finished(interface);
2710 } else if (g_strcmp0(key, "ApScan") == 0) {
2713 dbus_message_iter_get_basic(iter, &apscan);
2714 interface->apscan = apscan;
2715 } else if (g_strcmp0(key, "Ifname") == 0) {
2716 const char *str = NULL;
2718 dbus_message_iter_get_basic(iter, &str);
2720 g_free(interface->ifname);
2721 interface->ifname = g_strdup(str);
2723 } else if (g_strcmp0(key, "Driver") == 0) {
2724 const char *str = NULL;
2726 dbus_message_iter_get_basic(iter, &str);
2728 g_free(interface->driver);
2729 interface->driver = g_strdup(str);
2731 } else if (g_strcmp0(key, "BridgeIfname") == 0) {
2732 const char *str = NULL;
2734 dbus_message_iter_get_basic(iter, &str);
2736 g_free(interface->bridge);
2737 interface->bridge = g_strdup(str);
2739 } else if (g_strcmp0(key, "ConfigFile") == 0) {
2740 const char *str = NULL;
2742 dbus_message_iter_get_basic(iter, &str);
2743 if (str && strlen(str) > 0 && interface->ifname) {
2744 SUPPLICANT_DBG("New {%s, %s}", interface->ifname, str);
2745 g_hash_table_replace(config_file_table,
2746 g_strdup(interface->ifname), g_strdup(str));
2748 } else if (g_strcmp0(key, "CurrentBSS") == 0) {
2749 interface_current_bss(interface, iter);
2750 } else if (g_strcmp0(key, "CurrentNetwork") == 0) {
2751 #if defined TIZEN_EXT
2752 if (interface->state != G_SUPPLICANT_STATE_COMPLETED)
2754 interface_network_added(iter, interface);
2755 } else if (g_strcmp0(key, "BSSs") == 0) {
2756 supplicant_dbus_array_foreach(iter,
2757 interface_bss_added_without_keys,
2759 } else if (g_strcmp0(key, "Blobs") == 0) {
2761 } else if (g_strcmp0(key, "Networks") == 0) {
2762 supplicant_dbus_array_foreach(iter, interface_network_added,
2764 } else if (g_strcmp0(key, "DisconnectReason") == 0) {
2766 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
2767 dbus_message_iter_get_basic(iter, &reason_code);
2768 callback_disconnect_reason_code(interface, reason_code);
2770 } else if (g_strcmp0(key, "AssocStatusCode") == 0) {
2772 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
2773 dbus_message_iter_get_basic(iter, &status_code);
2774 callback_assoc_status_code(interface, status_code);
2777 SUPPLICANT_DBG("key %s type %c",
2778 key, dbus_message_iter_get_arg_type(iter));
2782 static void scan_network_update(DBusMessageIter *iter, void *user_data)
2784 GSupplicantInterface *interface = user_data;
2785 GSupplicantNetwork *network;
2791 dbus_message_iter_get_basic(iter, &path);
2796 if (g_strcmp0(path, "/") == 0)
2799 /* Update the network details based on scan BSS data */
2800 network = g_hash_table_lookup(interface->bss_mapping, path);
2802 callback_network_added(network);
2805 static void scan_bss_data(const char *key, DBusMessageIter *iter,
2808 GSupplicantInterface *interface = user_data;
2810 /*Fixed : stucking in scanning state when scan failed*/
2811 #if defined TIZEN_EXT
2812 GSupplicantInterfaceCallback scan_callback;
2816 supplicant_dbus_array_foreach(iter, scan_network_update,
2819 #if defined TIZEN_EXT
2820 scan_callback = interface->scan_callback;
2823 if (interface->scan_callback)
2824 interface->scan_callback(0, interface, interface->scan_data);
2826 #if defined TIZEN_EXT
2827 if (interface->scan_callback == scan_callback) {
2829 interface->scan_callback = NULL;
2830 interface->scan_data = NULL;
2831 #if defined TIZEN_EXT
2836 static GSupplicantInterface *interface_alloc(const char *path)
2838 GSupplicantInterface *interface;
2840 interface = g_try_new0(GSupplicantInterface, 1);
2844 interface->path = g_strdup(path);
2846 interface->network_table = g_hash_table_new_full(g_str_hash,
2847 g_str_equal, NULL, remove_network);
2848 interface->peer_table = g_hash_table_new_full(g_str_hash,
2849 g_str_equal, NULL, remove_peer);
2850 interface->group_table = g_hash_table_new_full(g_str_hash,
2851 g_str_equal, NULL, remove_group);
2852 interface->bss_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
2855 g_hash_table_replace(interface_table, interface->path, interface);
2860 static void interface_added(DBusMessageIter *iter, void *user_data)
2862 GSupplicantInterface *interface;
2863 const char *path = NULL;
2864 bool properties_appended = GPOINTER_TO_UINT(user_data);
2868 dbus_message_iter_get_basic(iter, &path);
2872 if (g_strcmp0(path, "/") == 0)
2875 interface = g_hash_table_lookup(interface_table, path);
2879 interface = interface_alloc(path);
2883 if (!properties_appended) {
2884 supplicant_dbus_property_get_all(path,
2885 SUPPLICANT_INTERFACE ".Interface",
2886 interface_property, interface,
2891 dbus_message_iter_next(iter);
2892 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
2893 supplicant_dbus_property_foreach(iter, interface_property,
2895 interface_property(NULL, NULL, interface);
2899 static void interface_removed(DBusMessageIter *iter, void *user_data)
2901 const char *path = NULL;
2902 GSupplicantInterface *interface = user_data;
2904 dbus_message_iter_get_basic(iter, &path);
2908 interface = g_hash_table_lookup(interface_table, path);
2909 g_supplicant_interface_cancel(interface);
2911 g_hash_table_remove(interface_table, path);
2914 static void eap_method(DBusMessageIter *iter, void *user_data)
2916 const char *str = NULL;
2919 dbus_message_iter_get_basic(iter, &str);
2923 for (i = 0; eap_method_map[i].str; i++)
2924 if (strcmp(str, eap_method_map[i].str) == 0) {
2925 eap_methods |= eap_method_map[i].val;
2930 static void service_property(const char *key, DBusMessageIter *iter,
2934 callback_system_ready();
2938 if (g_strcmp0(key, "DebugLevel") == 0) {
2939 const char *str = NULL;
2942 dbus_message_iter_get_basic(iter, &str);
2943 for (i = 0; debug_strings[i]; i++)
2944 if (g_strcmp0(debug_strings[i], str) == 0) {
2948 SUPPLICANT_DBG("Debug level %d", debug_level);
2949 } else if (g_strcmp0(key, "DebugTimestamp") == 0) {
2950 dbus_message_iter_get_basic(iter, &debug_timestamp);
2951 SUPPLICANT_DBG("Debug timestamp %u", debug_timestamp);
2952 } else if (g_strcmp0(key, "DebugShowKeys") == 0) {
2953 dbus_message_iter_get_basic(iter, &debug_showkeys);
2954 SUPPLICANT_DBG("Debug show keys %u", debug_showkeys);
2955 } else if (g_strcmp0(key, "Interfaces") == 0) {
2956 supplicant_dbus_array_foreach(iter, interface_added, NULL);
2957 } else if (g_strcmp0(key, "EapMethods") == 0) {
2958 supplicant_dbus_array_foreach(iter, eap_method, NULL);
2959 debug_strvalmap("EAP method", eap_method_map, eap_methods);
2960 } else if (g_strcmp0(key, "Country") == 0) {
2961 const char *country = NULL;
2963 dbus_message_iter_get_basic(iter, &country);
2964 SUPPLICANT_DBG("Country %s", country);
2966 SUPPLICANT_DBG("key %s type %c",
2967 key, dbus_message_iter_get_arg_type(iter));
2970 static void signal_name_owner_changed(const char *path, DBusMessageIter *iter)
2972 const char *name = NULL, *old = NULL, *new = NULL;
2976 if (g_strcmp0(path, DBUS_PATH_DBUS) != 0)
2979 dbus_message_iter_get_basic(iter, &name);
2983 if (g_strcmp0(name, SUPPLICANT_SERVICE) != 0)
2986 dbus_message_iter_next(iter);
2987 dbus_message_iter_get_basic(iter, &old);
2988 dbus_message_iter_next(iter);
2989 dbus_message_iter_get_basic(iter, &new);
2994 if (strlen(old) > 0 && strlen(new) == 0) {
2995 system_available = FALSE;
2996 g_hash_table_remove_all(bss_mapping);
2997 g_hash_table_remove_all(peer_mapping);
2998 g_hash_table_remove_all(group_mapping);
2999 g_hash_table_remove_all(config_file_table);
3000 g_hash_table_remove_all(interface_table);
3001 callback_system_killed();
3004 if (strlen(new) > 0 && strlen(old) == 0) {
3005 system_available = TRUE;
3006 supplicant_dbus_property_get_all(SUPPLICANT_PATH,
3007 SUPPLICANT_INTERFACE,
3008 service_property, NULL, NULL);
3012 static void signal_properties_changed(const char *path, DBusMessageIter *iter)
3016 if (g_strcmp0(path, SUPPLICANT_PATH) != 0)
3019 supplicant_dbus_property_foreach(iter, service_property, NULL);
3022 static void signal_interface_added(const char *path, DBusMessageIter *iter)
3024 SUPPLICANT_DBG("path %s %s", path, SUPPLICANT_PATH);
3026 if (g_strcmp0(path, SUPPLICANT_PATH) == 0)
3027 interface_added(iter, GUINT_TO_POINTER(true));
3030 static void signal_interface_removed(const char *path, DBusMessageIter *iter)
3034 if (g_strcmp0(path, SUPPLICANT_PATH) == 0)
3035 interface_removed(iter, NULL);
3038 static void signal_interface_changed(const char *path, DBusMessageIter *iter)
3040 GSupplicantInterface *interface;
3044 interface = g_hash_table_lookup(interface_table, path);
3048 supplicant_dbus_property_foreach(iter, interface_property, interface);
3051 static void signal_scan_done(const char *path, DBusMessageIter *iter)
3053 GSupplicantInterface *interface;
3054 dbus_bool_t success = FALSE;
3058 interface = g_hash_table_lookup(interface_table, path);
3062 dbus_message_iter_get_basic(iter, &success);
3064 if (interface->scanning) {
3065 callback_scan_finished(interface);
3066 interface->scanning = FALSE;
3070 * If scan is unsuccessful return -EIO else get the scanned BSSs
3071 * and update the network details accordingly
3074 if (interface->scan_callback)
3075 interface->scan_callback(-EIO, interface,
3076 interface->scan_data);
3078 interface->scan_callback = NULL;
3079 interface->scan_data = NULL;
3084 supplicant_dbus_property_get(path, SUPPLICANT_INTERFACE ".Interface",
3085 "BSSs", scan_bss_data, interface, interface);
3088 static void signal_bss_added(const char *path, DBusMessageIter *iter)
3090 GSupplicantInterface *interface;
3094 interface = g_hash_table_lookup(interface_table, path);
3098 interface_bss_added_with_keys(iter, interface);
3101 static void signal_bss_removed(const char *path, DBusMessageIter *iter)
3103 GSupplicantInterface *interface;
3107 interface = g_hash_table_lookup(interface_table, path);
3111 interface_bss_removed(iter, interface);
3114 static void signal_network_added(const char *path, DBusMessageIter *iter)
3116 GSupplicantInterface *interface;
3120 interface = g_hash_table_lookup(interface_table, path);
3124 interface_network_added(iter, interface);
3127 static void signal_network_removed(const char *path, DBusMessageIter *iter)
3129 GSupplicantInterface *interface;
3133 interface = g_hash_table_lookup(interface_table, path);
3137 interface_network_removed(iter, interface);
3140 static void signal_bss_changed(const char *path, DBusMessageIter *iter)
3142 GSupplicantInterface *interface;
3143 GSupplicantNetwork *network;
3144 GSupplicantSecurity old_security;
3145 struct g_supplicant_bss *bss;
3149 interface = g_hash_table_lookup(bss_mapping, path);
3153 network = g_hash_table_lookup(interface->bss_mapping, path);
3157 bss = g_hash_table_lookup(network->bss_table, path);
3161 supplicant_dbus_property_foreach(iter, bss_property, bss);
3162 #if defined TIZEN_EXT
3163 network->frequency = bss->frequency;
3165 old_security = network->security;
3166 bss_compute_security(bss);
3168 if (old_security != bss->security) {
3169 struct g_supplicant_bss *new_bss;
3171 SUPPLICANT_DBG("New network security for %s", bss->ssid);
3173 /* Security change policy:
3174 * - we first copy the current bss into a new one with
3175 * its own pointer (path)
3176 * - we remove the current bss related network which will
3177 * tell the plugin about such removal. This is done due
3178 * to the fact that a security change means a group change
3179 * so a complete network change.
3180 * (current bss becomes invalid as well)
3181 * - we add the new bss: it adds new network and tell the
3182 * plugin about it. */
3184 new_bss = g_try_new0(struct g_supplicant_bss, 1);
3188 memcpy(new_bss, bss, sizeof(struct g_supplicant_bss));
3189 new_bss->path = g_strdup(bss->path);
3190 #if defined TIZEN_EXT
3191 new_bss->vsie_list = NULL;
3194 g_hash_table_remove(interface->network_table, network->group);
3196 if (add_or_replace_bss_to_network(new_bss) < 0) {
3197 /* Remove entries in hash tables to handle the
3198 * failure in add_or_replace_bss_to_network
3200 g_hash_table_remove(bss_mapping, path);
3201 g_hash_table_remove(interface->bss_mapping, path);
3202 g_hash_table_remove(network->bss_table, path);
3208 #if defined TIZEN_EXT
3209 if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
3210 network->wps = TRUE;
3211 network->wps_capabilities |= bss->wps_capabilities;
3213 network->wps = FALSE;
3216 /* Consider only property changes of the connected BSS */
3217 if (network == interface->current_network && bss != network->best_bss)
3220 if (bss->signal == network->signal)
3225 callback_network_changed(network, "");
3231 * If the new signal is lower than the SSID signal, we need
3232 * to check for the new maximum.
3234 if (bss->signal < network->signal) {
3235 if (bss != network->best_bss)
3240 callback_network_changed(network, "");
3244 network->signal = bss->signal;
3245 update_network_signal(network);
3247 network->signal = bss->signal;
3248 network->best_bss = bss;
3251 SUPPLICANT_DBG("New network signal for %s %d dBm", network->ssid,
3254 callback_network_changed(network, "Signal");
3257 static void wps_credentials(const char *key, DBusMessageIter *iter,
3260 GSupplicantInterface *interface = user_data;
3265 SUPPLICANT_DBG("key %s", key);
3267 if (g_strcmp0(key, "Key") == 0) {
3268 DBusMessageIter array;
3269 unsigned char *key_val;
3272 dbus_message_iter_recurse(iter, &array);
3273 dbus_message_iter_get_fixed_array(&array, &key_val, &key_len);
3275 g_free(interface->wps_cred.key);
3276 interface->wps_cred.key = g_try_malloc0(
3277 sizeof(char) * key_len + 1);
3279 if (!interface->wps_cred.key)
3282 memcpy(interface->wps_cred.key, key_val,
3283 sizeof(char) * key_len);
3285 SUPPLICANT_DBG("WPS key present");
3286 } else if (g_strcmp0(key, "SSID") == 0) {
3287 DBusMessageIter array;
3288 unsigned char *ssid;
3291 dbus_message_iter_recurse(iter, &array);
3292 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
3294 if (ssid_len > 0 && ssid_len < 33) {
3295 memcpy(interface->wps_cred.ssid, ssid, ssid_len);
3296 interface->wps_cred.ssid_len = ssid_len;
3298 memset(interface->wps_cred.ssid, 0, 32);
3299 interface->wps_cred.ssid_len = 0;
3304 static void signal_wps_credentials(const char *path, DBusMessageIter *iter)
3306 GSupplicantInterface *interface;
3310 interface = g_hash_table_lookup(interface_table, path);
3314 supplicant_dbus_property_foreach(iter, wps_credentials, interface);
3317 static void wps_event_args(const char *key, DBusMessageIter *iter,
3320 GSupplicantInterface *interface = user_data;
3322 if (!key || !interface)
3325 SUPPLICANT_DBG("Arg Key %s", key);
3328 static void signal_wps_event(const char *path, DBusMessageIter *iter)
3330 GSupplicantInterface *interface;
3331 const char *name = NULL;
3335 interface = g_hash_table_lookup(interface_table, path);
3339 dbus_message_iter_get_basic(iter, &name);
3341 SUPPLICANT_DBG("Name: %s", name);
3343 if (g_strcmp0(name, "success") == 0)
3344 interface->wps_state = G_SUPPLICANT_WPS_STATE_SUCCESS;
3345 else if (g_strcmp0(name, "failed") == 0)
3346 interface->wps_state = G_SUPPLICANT_WPS_STATE_FAIL;
3348 interface->wps_state = G_SUPPLICANT_WPS_STATE_UNKNOWN;
3350 if (!dbus_message_iter_has_next(iter))
3353 dbus_message_iter_next(iter);
3355 supplicant_dbus_property_foreach(iter, wps_event_args, interface);
3358 #if defined TIZEN_EXT
3359 static void signal_power_off(const char *path, DBusMessageIter *iter)
3361 int poweroff_state = 0;
3363 dbus_message_iter_get_basic(iter, &poweroff_state);
3365 SUPPLICANT_DBG("poweroff_state(%d)", poweroff_state);
3367 /* POWER_OFF_DIRECT 2 && POWER_OFF_RESTART 3 */
3368 if (poweroff_state != 2 && poweroff_state != 3)
3371 if (callbacks_pointer == NULL)
3374 if (callbacks_pointer->system_power_off == NULL)
3377 callbacks_pointer->system_power_off();
3381 static void signal_station_connected(const char *path, DBusMessageIter *iter)
3383 GSupplicantInterface *interface;
3384 const char *sta_mac = NULL;
3386 SUPPLICANT_DBG("path %s %s", path, SUPPLICANT_PATH);
3388 if (callbacks_pointer->add_station == NULL)
3391 if (g_strcmp0(path, "/") == 0)
3394 interface = g_hash_table_lookup(interface_table, path);
3395 if (interface == NULL)
3398 dbus_message_iter_get_basic(iter, &sta_mac);
3399 if (sta_mac == NULL)
3402 SUPPLICANT_DBG("New station %s connected", sta_mac);
3403 callbacks_pointer->add_station(sta_mac);
3406 static void signal_station_disconnected(const char *path, DBusMessageIter *iter)
3408 GSupplicantInterface *interface;
3409 const char *sta_mac = NULL;
3411 SUPPLICANT_DBG("path %s %s", path, SUPPLICANT_PATH);
3413 if (callbacks_pointer->remove_station == NULL)
3416 if (g_strcmp0(path, "/") == 0)
3419 interface = g_hash_table_lookup(interface_table, path);
3420 if (interface == NULL)
3423 dbus_message_iter_get_basic(iter, &sta_mac);
3424 if (sta_mac == NULL)
3427 SUPPLICANT_DBG("Station %s disconnected", sta_mac);
3428 callbacks_pointer->remove_station(sta_mac);
3431 static void create_peer_identifier(GSupplicantPeer *peer)
3433 const unsigned char test[ETH_ALEN] = {};
3438 if (!memcmp(peer->device_address, test, ETH_ALEN)) {
3439 peer->identifier = g_strdup(peer->name);
3443 peer->identifier = g_malloc0(19);
3444 snprintf(peer->identifier, 19, "%02x%02x%02x%02x%02x%02x",
3445 peer->device_address[0],
3446 peer->device_address[1],
3447 peer->device_address[2],
3448 peer->device_address[3],
3449 peer->device_address[4],
3450 peer->device_address[5]);
3453 struct peer_property_data {
3454 GSupplicantPeer *peer;
3456 bool groups_changed;
3457 bool services_changed;
3460 static void peer_groups_relation(DBusMessageIter *iter, void *user_data)
3462 struct peer_property_data *data = user_data;
3463 GSupplicantPeer *peer = data->peer;
3464 GSupplicantGroup *group;
3465 const char *str = NULL;
3468 dbus_message_iter_get_basic(iter, &str);
3472 group = g_hash_table_lookup(group_mapping, str);
3476 elem = g_slist_find_custom(data->old_groups, str, (GCompareFunc)g_strcmp0);
3478 data->old_groups = g_slist_remove_link(data->old_groups, elem);
3479 peer->groups = g_slist_concat(elem, peer->groups);
3481 peer->groups = g_slist_prepend(peer->groups, g_strdup(str));
3482 data->groups_changed = true;
3486 static void peer_property(const char *key, DBusMessageIter *iter,
3489 GSupplicantPeer *pending_peer;
3490 struct peer_property_data *data = user_data;
3491 GSupplicantPeer *peer = data->peer;
3493 SUPPLICANT_DBG("key: %s", key);
3495 if (!peer->interface)
3500 create_peer_identifier(peer);
3501 callback_peer_found(peer);
3502 pending_peer = g_hash_table_lookup(
3503 pending_peer_connection, peer->path);
3505 if (pending_peer && pending_peer == peer) {
3506 callback_peer_request(peer);
3507 g_hash_table_remove(pending_peer_connection,
3517 if (g_strcmp0(key, "DeviceAddress") == 0) {
3518 unsigned char *dev_addr;
3519 DBusMessageIter array;
3522 dbus_message_iter_recurse(iter, &array);
3523 dbus_message_iter_get_fixed_array(&array, &dev_addr, &len);
3525 if (len == ETH_ALEN)
3526 memcpy(peer->device_address, dev_addr, len);
3527 } else if (g_strcmp0(key, "DeviceName") == 0) {
3528 const char *str = NULL;
3530 dbus_message_iter_get_basic(iter, &str);
3532 peer->name = g_strdup(str);
3533 } else if (g_strcmp0(key, "config_method") == 0) {
3534 uint16_t wps_config;
3536 dbus_message_iter_get_basic(iter, &wps_config);
3538 if (wps_config & G_SUPPLICANT_WPS_CONFIG_PBC)
3539 peer->wps_capabilities |= G_SUPPLICANT_WPS_PBC;
3540 if (wps_config & ~G_SUPPLICANT_WPS_CONFIG_PBC)
3541 peer->wps_capabilities |= G_SUPPLICANT_WPS_PIN;
3542 } else if (g_strcmp0(key, "Groups") == 0) {
3543 data->old_groups = peer->groups;
3544 peer->groups = NULL;
3546 supplicant_dbus_array_foreach(iter,
3547 peer_groups_relation, data);
3548 if (g_slist_length(data->old_groups) > 0) {
3549 g_slist_free_full(data->old_groups, g_free);
3550 data->groups_changed = true;
3552 } else if (g_strcmp0(key, "IEs") == 0) {
3553 DBusMessageIter array;
3557 dbus_message_iter_recurse(iter, &array);
3558 dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
3560 if (!ie || ie_len < 2)
3563 if (peer->widi_ies) {
3564 if (memcmp(peer->widi_ies, ie, ie_len) == 0)
3567 g_free(peer->widi_ies);
3568 peer->widi_ies_length = 0;
3571 peer->widi_ies = g_malloc0(ie_len * sizeof(unsigned char));
3573 memcpy(peer->widi_ies, ie, ie_len);
3574 peer->widi_ies_length = ie_len;
3575 data->services_changed = true;
3579 static void signal_peer_found(const char *path, DBusMessageIter *iter)
3581 struct peer_property_data *property_data;
3582 GSupplicantInterface *interface;
3583 const char *obj_path = NULL;
3584 GSupplicantPeer *peer;
3588 interface = g_hash_table_lookup(interface_table, path);
3592 dbus_message_iter_get_basic(iter, &obj_path);
3593 if (!obj_path || g_strcmp0(obj_path, "/") == 0)
3596 peer = g_hash_table_lookup(interface->peer_table, obj_path);
3600 peer = g_try_new0(GSupplicantPeer, 1);
3604 peer->interface = interface;
3605 peer->path = g_strdup(obj_path);
3606 g_hash_table_insert(interface->peer_table, peer->path, peer);
3607 g_hash_table_replace(peer_mapping, peer->path, interface);
3609 property_data = dbus_malloc0(sizeof(struct peer_property_data));
3610 property_data->peer = peer;
3612 dbus_message_iter_next(iter);
3613 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
3614 supplicant_dbus_property_foreach(iter, peer_property,
3616 peer_property(NULL, NULL, property_data);
3620 supplicant_dbus_property_get_all(obj_path,
3621 SUPPLICANT_INTERFACE ".Peer",
3622 peer_property, property_data, NULL);
3625 static void signal_peer_lost(const char *path, DBusMessageIter *iter)
3627 GSupplicantInterface *interface;
3628 const char *obj_path = NULL;
3629 GSupplicantPeer *peer;
3633 interface = g_hash_table_lookup(interface_table, path);
3637 dbus_message_iter_get_basic(iter, &obj_path);
3638 if (!obj_path || g_strcmp0(obj_path, "/") == 0)
3641 peer = g_hash_table_lookup(interface->peer_table, obj_path);
3645 g_hash_table_remove(interface->peer_table, obj_path);
3648 static void signal_peer_changed(const char *path, DBusMessageIter *iter)
3650 struct peer_property_data *property_data;
3651 GSupplicantInterface *interface;
3652 GSupplicantPeer *peer;
3656 interface = g_hash_table_lookup(peer_mapping, path);
3660 peer = g_hash_table_lookup(interface->peer_table, path);
3662 g_hash_table_remove(peer_mapping, path);
3666 property_data = dbus_malloc0(sizeof(struct peer_property_data));
3667 property_data->peer = peer;
3669 supplicant_dbus_property_foreach(iter, peer_property, property_data);
3670 if (property_data->services_changed)
3671 callback_peer_changed(peer,
3672 G_SUPPLICANT_PEER_SERVICES_CHANGED);
3674 if (property_data->groups_changed)
3675 callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_CHANGED);
3677 dbus_free(property_data);
3679 if (!g_supplicant_peer_is_in_a_group(peer))
3680 peer->connection_requested = false;
3683 struct group_sig_data {
3684 const char *peer_obj_path;
3685 unsigned char iface_address[ETH_ALEN];
3686 const char *interface_obj_path;
3687 const char *group_obj_path;
3691 static void group_sig_property(const char *key, DBusMessageIter *iter,
3694 struct group_sig_data *data = user_data;
3699 if (g_strcmp0(key, "peer_interface_addr") == 0) {
3700 unsigned char *dev_addr;
3701 DBusMessageIter array;
3704 dbus_message_iter_recurse(iter, &array);
3705 dbus_message_iter_get_fixed_array(&array, &dev_addr, &len);
3707 if (len == ETH_ALEN)
3708 memcpy(data->iface_address, dev_addr, len);
3709 } else if (g_strcmp0(key, "role") == 0) {
3710 const char *str = NULL;
3712 dbus_message_iter_get_basic(iter, &str);
3713 if (g_strcmp0(str, "GO") == 0)
3714 data->role = G_SUPPLICANT_GROUP_ROLE_GO;
3716 data->role = G_SUPPLICANT_GROUP_ROLE_CLIENT;
3717 } else if (g_strcmp0(key, "peer_object") == 0)
3718 dbus_message_iter_get_basic(iter, &data->peer_obj_path);
3719 else if (g_strcmp0(key, "interface_object") == 0)
3720 dbus_message_iter_get_basic(iter, &data->interface_obj_path);
3721 else if (g_strcmp0(key, "group_object") == 0)
3722 dbus_message_iter_get_basic(iter, &data->group_obj_path);
3726 static void signal_group_success(const char *path, DBusMessageIter *iter)
3728 GSupplicantInterface *interface;
3729 struct group_sig_data data = {};
3730 GSupplicantPeer *peer;
3734 interface = g_hash_table_lookup(interface_table, path);
3738 supplicant_dbus_property_foreach(iter, group_sig_property, &data);
3739 if (!data.peer_obj_path)
3742 peer = g_hash_table_lookup(interface->peer_table, data.peer_obj_path);
3746 memcpy(peer->iface_address, data.iface_address, ETH_ALEN);
3747 interface->pending_peer_path = peer->path;
3750 static void signal_group_failure(const char *path, DBusMessageIter *iter)
3752 GSupplicantInterface *interface;
3753 struct group_sig_data data = {};
3754 GSupplicantPeer *peer;
3758 interface = g_hash_table_lookup(interface_table, path);
3762 supplicant_dbus_property_foreach(iter, group_sig_property, &data);
3763 if (!data.peer_obj_path)
3766 peer = g_hash_table_lookup(interface->peer_table, data.peer_obj_path);
3770 callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_FAILED);
3771 peer->connection_requested = false;
3774 static void signal_group_started(const char *path, DBusMessageIter *iter)
3776 GSupplicantInterface *interface, *g_interface;
3777 struct group_sig_data data = {};
3778 GSupplicantGroup *group;
3779 GSupplicantPeer *peer;
3783 interface = g_hash_table_lookup(interface_table, path);
3787 supplicant_dbus_property_foreach(iter, group_sig_property, &data);
3788 if (!data.interface_obj_path || !data.group_obj_path)
3791 peer = g_hash_table_lookup(interface->peer_table,
3792 interface->pending_peer_path);
3793 interface->pending_peer_path = NULL;
3797 g_interface = g_hash_table_lookup(interface_table,
3798 data.interface_obj_path);
3802 group = g_hash_table_lookup(interface->group_table,
3803 data.group_obj_path);
3807 group = g_try_new0(GSupplicantGroup, 1);
3811 group->interface = g_interface;
3812 group->orig_interface = interface;
3813 group->path = g_strdup(data.group_obj_path);
3814 group->role = data.role;
3816 g_hash_table_insert(interface->group_table, group->path, group);
3817 g_hash_table_replace(group_mapping, group->path, group);
3819 peer->current_group_iface = g_interface;
3820 callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_STARTED);
3823 static void remove_peer_group_interface(GHashTable *group_table,
3826 GSupplicantGroup *group;
3827 GHashTableIter iter;
3828 gpointer value, key;
3833 group = g_hash_table_lookup(group_table, path);
3835 if (!group || !group->orig_interface)
3838 g_hash_table_iter_init(&iter, group->orig_interface->peer_table);
3840 while (g_hash_table_iter_next(&iter, &key, &value)) {
3841 GSupplicantPeer *peer = value;
3843 if (peer->current_group_iface == group->interface)
3844 peer->current_group_iface = NULL;
3848 static void signal_group_finished(const char *path, DBusMessageIter *iter)
3850 GSupplicantInterface *interface;
3851 struct group_sig_data data = {};
3855 interface = g_hash_table_lookup(interface_table, path);
3859 supplicant_dbus_property_foreach(iter, group_sig_property, &data);
3860 if (!data.interface_obj_path || !data.group_obj_path)
3863 remove_peer_group_interface(interface->group_table, data.group_obj_path);
3865 g_hash_table_remove(group_mapping, data.group_obj_path);
3867 g_hash_table_remove(interface->group_table, data.group_obj_path);
3870 static void signal_group_request(const char *path, DBusMessageIter *iter)
3872 GSupplicantInterface *interface;
3873 GSupplicantPeer *peer;
3874 const char *obj_path;
3878 interface = g_hash_table_lookup(interface_table, path);
3882 dbus_message_iter_get_basic(iter, &obj_path);
3883 if (!obj_path || !g_strcmp0(obj_path, "/"))
3886 peer = g_hash_table_lookup(interface->peer_table, obj_path);
3891 * Peer has been previously found and property set,
3892 * otherwise, defer connection to when peer property
3895 if (peer->identifier)
3896 callback_peer_request(peer);
3898 g_hash_table_replace(pending_peer_connection, peer->path, peer);
3901 static void signal_group_peer_joined(const char *path, DBusMessageIter *iter)
3903 const char *peer_path = NULL;
3904 GSupplicantInterface *interface;
3905 GSupplicantGroup *group;
3906 GSupplicantPeer *peer;
3910 group = g_hash_table_lookup(group_mapping, path);
3914 dbus_message_iter_get_basic(iter, &peer_path);
3918 interface = g_hash_table_lookup(peer_mapping, peer_path);
3922 peer = g_hash_table_lookup(interface->peer_table, peer_path);
3926 group->members = g_slist_prepend(group->members, g_strdup(peer_path));
3928 callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_JOINED);
3931 static void signal_group_peer_disconnected(const char *path, DBusMessageIter *iter)
3933 const char *peer_path = NULL;
3934 GSupplicantInterface *interface;
3935 GSupplicantGroup *group;
3936 GSupplicantPeer *peer;
3941 group = g_hash_table_lookup(group_mapping, path);
3945 dbus_message_iter_get_basic(iter, &peer_path);
3949 for (elem = group->members; elem; elem = elem->next) {
3950 if (!g_strcmp0(elem->data, peer_path))
3958 group->members = g_slist_delete_link(group->members, elem);
3960 interface = g_hash_table_lookup(peer_mapping, peer_path);
3964 peer = g_hash_table_lookup(interface->peer_table, peer_path);
3968 callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_DISCONNECTED);
3969 peer->connection_requested = false;
3973 const char *interface;
3975 void (*function) (const char *path, DBusMessageIter *iter);
3977 { DBUS_INTERFACE_DBUS, "NameOwnerChanged", signal_name_owner_changed },
3979 { SUPPLICANT_INTERFACE, "PropertiesChanged", signal_properties_changed },
3980 { SUPPLICANT_INTERFACE, "InterfaceAdded", signal_interface_added },
3981 { SUPPLICANT_INTERFACE, "InterfaceCreated", signal_interface_added },
3982 { SUPPLICANT_INTERFACE, "InterfaceRemoved", signal_interface_removed },
3984 { SUPPLICANT_INTERFACE ".Interface", "PropertiesChanged", signal_interface_changed },
3985 { SUPPLICANT_INTERFACE ".Interface", "ScanDone", signal_scan_done },
3986 { SUPPLICANT_INTERFACE ".Interface", "BSSAdded", signal_bss_added },
3987 { SUPPLICANT_INTERFACE ".Interface", "BSSRemoved", signal_bss_removed },
3988 { SUPPLICANT_INTERFACE ".Interface", "NetworkAdded", signal_network_added },
3989 { SUPPLICANT_INTERFACE ".Interface", "NetworkRemoved", signal_network_removed },
3991 { SUPPLICANT_INTERFACE ".BSS", "PropertiesChanged", signal_bss_changed },
3993 { SUPPLICANT_INTERFACE ".Interface.WPS", "Credentials", signal_wps_credentials },
3994 { SUPPLICANT_INTERFACE ".Interface.WPS", "Event", signal_wps_event },
3995 #if defined TIZEN_EXT
3996 { "org.tizen.system.deviced.PowerOff", "ChangeState", signal_power_off },
3999 { SUPPLICANT_INTERFACE".Interface", "StaAuthorized", signal_station_connected },
4000 { SUPPLICANT_INTERFACE".Interface", "StaDeauthorized", signal_station_disconnected },
4002 { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeviceFound", signal_peer_found },
4003 { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeviceLost", signal_peer_lost },
4005 { SUPPLICANT_INTERFACE ".Peer", "PropertiesChanged", signal_peer_changed },
4007 { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationSuccess", signal_group_success },
4008 { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationFailure", signal_group_failure },
4009 { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GroupStarted", signal_group_started },
4010 { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GroupFinished", signal_group_finished },
4011 { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationRequest", signal_group_request },
4013 { SUPPLICANT_INTERFACE ".Group", "PeerJoined", signal_group_peer_joined },
4014 { SUPPLICANT_INTERFACE ".Group", "PeerDisconnected", signal_group_peer_disconnected },
4019 static DBusHandlerResult g_supplicant_filter(DBusConnection *conn,
4020 DBusMessage *message, void *data)
4022 DBusMessageIter iter;
4026 path = dbus_message_get_path(message);
4028 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
4030 if (!dbus_message_iter_init(message, &iter))
4031 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
4033 for (i = 0; signal_map[i].interface; i++) {
4034 if (!dbus_message_has_interface(message, signal_map[i].interface))
4037 if (!dbus_message_has_member(message, signal_map[i].member))
4040 signal_map[i].function(path, &iter);
4044 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
4047 void g_supplicant_interface_cancel(GSupplicantInterface *interface)
4049 SUPPLICANT_DBG("Cancelling any pending DBus calls");
4050 supplicant_dbus_method_call_cancel_all(interface);
4051 supplicant_dbus_property_call_cancel_all(interface);
4054 struct supplicant_regdom {
4055 GSupplicantCountryCallback callback;
4057 const void *user_data;
4060 static void country_result(const char *error,
4061 DBusMessageIter *iter, void *user_data)
4063 struct supplicant_regdom *regdom = user_data;
4066 SUPPLICANT_DBG("Country setting result");
4072 SUPPLICANT_DBG("Country setting failure %s", error);
4076 if (regdom->callback)
4077 regdom->callback(result, regdom->alpha2,
4078 (void *) regdom->user_data);
4083 static void country_params(DBusMessageIter *iter, void *user_data)
4085 struct supplicant_regdom *regdom = user_data;
4087 dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING,
4091 int g_supplicant_set_country(const char *alpha2,
4092 GSupplicantCountryCallback callback,
4093 const void *user_data)
4095 struct supplicant_regdom *regdom;
4098 SUPPLICANT_DBG("Country setting %s", alpha2);
4100 if (!system_available)
4103 regdom = dbus_malloc0(sizeof(*regdom));
4107 regdom->callback = callback;
4108 regdom->alpha2 = alpha2;
4109 regdom->user_data = user_data;
4111 ret = supplicant_dbus_property_set(SUPPLICANT_PATH, SUPPLICANT_INTERFACE,
4112 "Country", DBUS_TYPE_STRING_AS_STRING,
4113 country_params, country_result,
4117 SUPPLICANT_DBG("Unable to set Country configuration");
4122 int g_supplicant_interface_set_country(GSupplicantInterface *interface,
4123 GSupplicantCountryCallback callback,
4127 struct supplicant_regdom *regdom;
4130 regdom = dbus_malloc0(sizeof(*regdom));
4134 regdom->callback = callback;
4135 regdom->alpha2 = alpha2;
4136 regdom->user_data = user_data;
4138 ret = supplicant_dbus_property_set(interface->path,
4139 SUPPLICANT_INTERFACE ".Interface",
4140 "Country", DBUS_TYPE_STRING_AS_STRING,
4141 country_params, country_result,
4145 SUPPLICANT_DBG("Unable to set Country configuration");
4151 bool g_supplicant_interface_has_p2p(GSupplicantInterface *interface)
4156 return interface->p2p_support;
4159 struct supplicant_p2p_dev_config {
4164 static void p2p_device_config_result(const char *error,
4165 DBusMessageIter *iter, void *user_data)
4167 struct supplicant_p2p_dev_config *config = user_data;
4170 SUPPLICANT_DBG("Unable to set P2P Device configuration: %s",
4173 g_free(config->device_name);
4174 g_free(config->dev_type);
4178 static int dev_type_str2bin(const char *type, unsigned char dev_type[8])
4180 int length, pos, end;
4185 for (length = pos = 0; type[pos] != '\0' && length < 8; length++) {
4192 dev_type[length] = strtol(b, &e, 16);
4193 if (e && *e != '\0')
4202 static void p2p_device_config_params(DBusMessageIter *iter, void *user_data)
4204 struct supplicant_p2p_dev_config *config = user_data;
4205 DBusMessageIter dict;
4207 supplicant_dbus_dict_open(iter, &dict);
4209 supplicant_dbus_dict_append_basic(&dict, "DeviceName",
4210 DBUS_TYPE_STRING, &config->device_name);
4212 if (config->dev_type) {
4213 unsigned char dev_type[8] = {}, *type;
4216 len = dev_type_str2bin(config->dev_type, dev_type);
4219 supplicant_dbus_dict_append_fixed_array(&dict,
4220 "PrimaryDeviceType",
4221 DBUS_TYPE_BYTE, &type, len);
4225 supplicant_dbus_dict_close(iter, &dict);
4228 int g_supplicant_interface_set_p2p_device_config(GSupplicantInterface *interface,
4229 const char *device_name,
4230 const char *primary_dev_type)
4232 struct supplicant_p2p_dev_config *config;
4235 SUPPLICANT_DBG("P2P Device settings %s/%s",
4236 device_name, primary_dev_type);
4238 config = dbus_malloc0(sizeof(*config));
4242 config->device_name = g_strdup(device_name);
4243 config->dev_type = g_strdup(primary_dev_type);
4245 ret = supplicant_dbus_property_set(interface->path,
4246 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
4248 DBUS_TYPE_ARRAY_AS_STRING
4249 DBUS_DICT_ENTRY_BEGIN_CHAR_AS_STRING
4250 DBUS_TYPE_STRING_AS_STRING
4251 DBUS_TYPE_VARIANT_AS_STRING
4252 DBUS_DICT_ENTRY_END_CHAR_AS_STRING,
4253 p2p_device_config_params,
4254 p2p_device_config_result, config, NULL);
4256 g_free(config->device_name);
4257 g_free(config->dev_type);
4259 SUPPLICANT_DBG("Unable to set P2P Device configuration");
4265 static gboolean peer_lookup_by_identifier(gpointer key, gpointer value,
4268 const GSupplicantPeer *peer = value;
4269 const char *identifier = user_data;
4271 if (!g_strcmp0(identifier, peer->identifier))
4277 GSupplicantPeer *g_supplicant_interface_peer_lookup(GSupplicantInterface *interface,
4278 const char *identifier)
4280 GSupplicantPeer *peer;
4282 peer = g_hash_table_find(interface->peer_table,
4283 peer_lookup_by_identifier,
4284 (void *) identifier);
4288 static void interface_create_data_free(struct interface_create_data *data)
4290 g_free(data->ifname);
4291 g_free(data->driver);
4292 g_free(data->bridge);
4296 static bool interface_exists(GSupplicantInterface *interface,
4299 GSupplicantInterface *tmp;
4301 tmp = g_hash_table_lookup(interface_table, path);
4302 if (tmp && tmp == interface)
4308 static void interface_create_property(const char *key, DBusMessageIter *iter,
4311 struct interface_create_data *data = user_data;
4312 GSupplicantInterface *interface = data->interface;
4315 if (data->callback) {
4316 data->callback(0, data->interface, data->user_data);
4317 #if !defined TIZEN_EXT
4318 callback_p2p_support(interface);
4322 interface_create_data_free(data);
4325 interface_property(key, iter, interface);
4328 static void interface_create_result(const char *error,
4329 DBusMessageIter *iter, void *user_data)
4331 struct interface_create_data *data = user_data;
4332 const char *path = NULL;
4338 g_warning("error %s", error);
4343 dbus_message_iter_get_basic(iter, &path);
4349 if (!system_available) {
4354 data->interface = g_hash_table_lookup(interface_table, path);
4355 if (!data->interface) {
4356 data->interface = interface_alloc(path);
4357 if (!data->interface) {
4363 err = supplicant_dbus_property_get_all(path,
4364 SUPPLICANT_INTERFACE ".Interface",
4365 interface_create_property, data,
4372 data->callback(err, NULL, data->user_data);
4374 interface_create_data_free(data);
4377 static void interface_create_params(DBusMessageIter *iter, void *user_data)
4379 struct interface_create_data *data = user_data;
4380 DBusMessageIter dict;
4381 char *config_file = NULL;
4385 supplicant_dbus_dict_open(iter, &dict);
4387 supplicant_dbus_dict_append_basic(&dict, "Ifname",
4388 DBUS_TYPE_STRING, &data->ifname);
4391 supplicant_dbus_dict_append_basic(&dict, "Driver",
4392 DBUS_TYPE_STRING, &data->driver);
4395 supplicant_dbus_dict_append_basic(&dict, "BridgeIfname",
4396 DBUS_TYPE_STRING, &data->bridge);
4398 config_file = g_hash_table_lookup(config_file_table, data->ifname);
4400 SUPPLICANT_DBG("[%s] ConfigFile %s", data->ifname, config_file);
4402 supplicant_dbus_dict_append_basic(&dict, "ConfigFile",
4403 DBUS_TYPE_STRING, &config_file);
4406 supplicant_dbus_dict_close(iter, &dict);
4409 static void interface_get_result(const char *error,
4410 DBusMessageIter *iter, void *user_data)
4412 struct interface_create_data *data = user_data;
4413 GSupplicantInterface *interface;
4414 const char *path = NULL;
4420 SUPPLICANT_DBG("Interface not created yet");
4424 dbus_message_iter_get_basic(iter, &path);
4430 interface = g_hash_table_lookup(interface_table, path);
4436 if (data->callback) {
4437 data->callback(0, interface, data->user_data);
4438 #if !defined TIZEN_EXT
4439 callback_p2p_support(interface);
4443 interface_create_data_free(data);
4448 if (!system_available) {
4453 SUPPLICANT_DBG("Creating interface");
4455 err = supplicant_dbus_method_call(SUPPLICANT_PATH,
4456 SUPPLICANT_INTERFACE,
4458 interface_create_params,
4459 interface_create_result, data,
4466 data->callback(err, NULL, data->user_data);
4468 interface_create_data_free(data);
4471 static void interface_get_params(DBusMessageIter *iter, void *user_data)
4473 struct interface_create_data *data = user_data;
4477 dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, &data->ifname);
4480 int g_supplicant_interface_create(const char *ifname, const char *driver,
4482 GSupplicantInterfaceCallback callback,
4485 struct interface_create_data *data;
4488 SUPPLICANT_DBG("ifname %s", ifname);
4493 if (!system_available)
4496 data = dbus_malloc0(sizeof(*data));
4500 data->ifname = g_strdup(ifname);
4501 data->driver = g_strdup(driver);
4502 data->bridge = g_strdup(bridge);
4503 data->callback = callback;
4504 data->user_data = user_data;
4506 ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
4507 SUPPLICANT_INTERFACE,
4509 interface_get_params,
4510 interface_get_result, data,
4513 interface_create_data_free(data);
4518 static void interface_remove_result(const char *error,
4519 DBusMessageIter *iter, void *user_data)
4521 struct interface_data *data = user_data;
4526 SUPPLICANT_DBG("error: %s", error);
4530 if (!system_available) {
4536 * The gsupplicant interface is already freed by the InterfaceRemoved
4537 * signal callback. Simply invoke the interface_data callback.
4545 data->callback(err, NULL, data->user_data);
4551 static void interface_remove_params(DBusMessageIter *iter, void *user_data)
4553 struct interface_data *data = user_data;
4555 dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
4556 &data->interface->path);
4560 int g_supplicant_interface_remove(GSupplicantInterface *interface,
4561 GSupplicantInterfaceCallback callback,
4564 struct interface_data *data;
4570 if (!system_available)
4573 g_supplicant_interface_cancel(interface);
4575 data = dbus_malloc0(sizeof(*data));
4579 data->interface = interface;
4580 data->path = g_strdup(interface->path);
4581 data->callback = callback;
4582 data->user_data = user_data;
4584 ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
4585 SUPPLICANT_INTERFACE,
4587 interface_remove_params,
4588 interface_remove_result, data,
4597 static void interface_scan_result(const char *error,
4598 DBusMessageIter *iter, void *user_data)
4600 struct interface_scan_data *data = user_data;
4604 SUPPLICANT_DBG("error %s", error);
4608 /* A non ready interface cannot send/receive anything */
4609 if (interface_exists(data->interface, data->path)) {
4610 if (!data->interface->ready)
4618 data->callback(err, data->interface, data->user_data);
4620 data->interface->scan_callback = data->callback;
4621 data->interface->scan_data = data->user_data;
4624 if (data->scan_params)
4625 g_supplicant_free_scan_params(data->scan_params);
4630 static void add_scan_frequency(DBusMessageIter *iter, unsigned int freq)
4632 DBusMessageIter data;
4633 unsigned int width = 0; /* Not used by wpa_supplicant atm */
4635 dbus_message_iter_open_container(iter, DBUS_TYPE_STRUCT, NULL, &data);
4637 dbus_message_iter_append_basic(&data, DBUS_TYPE_UINT32, &freq);
4638 dbus_message_iter_append_basic(&data, DBUS_TYPE_UINT32, &width);
4640 dbus_message_iter_close_container(iter, &data);
4643 static void add_scan_frequencies(DBusMessageIter *iter,
4646 GSupplicantScanParams *scan_data = user_data;
4650 for (i = 0; i < scan_data->num_freqs; i++) {
4651 freq = scan_data->freqs[i];
4655 add_scan_frequency(iter, freq);
4659 static void append_ssid(DBusMessageIter *iter,
4660 const void *ssid, unsigned int len)
4662 DBusMessageIter array;
4664 dbus_message_iter_open_container(iter, DBUS_TYPE_ARRAY,
4665 DBUS_TYPE_BYTE_AS_STRING, &array);
4667 dbus_message_iter_append_fixed_array(&array, DBUS_TYPE_BYTE,
4669 dbus_message_iter_close_container(iter, &array);
4672 static void append_ssids(DBusMessageIter *iter, void *user_data)
4674 GSupplicantScanParams *scan_data = user_data;
4677 for (list = scan_data->ssids; list; list = list->next) {
4678 struct scan_ssid *scan_ssid = list->data;
4680 append_ssid(iter, scan_ssid->ssid, scan_ssid->ssid_len);
4684 static void supplicant_add_scan_frequency(DBusMessageIter *dict,
4685 supplicant_dbus_array_function function,
4688 GSupplicantScanParams *scan_params = user_data;
4689 DBusMessageIter entry, value, array;
4690 const char *key = "Channels";
4692 if (scan_params->freqs && scan_params->freqs[0] != 0) {
4693 dbus_message_iter_open_container(dict, DBUS_TYPE_DICT_ENTRY,
4696 dbus_message_iter_append_basic(&entry, DBUS_TYPE_STRING, &key);
4698 dbus_message_iter_open_container(&entry, DBUS_TYPE_VARIANT,
4699 DBUS_TYPE_ARRAY_AS_STRING
4700 DBUS_STRUCT_BEGIN_CHAR_AS_STRING
4701 DBUS_TYPE_UINT32_AS_STRING
4702 DBUS_TYPE_UINT32_AS_STRING
4703 DBUS_STRUCT_END_CHAR_AS_STRING,
4706 dbus_message_iter_open_container(&value, DBUS_TYPE_ARRAY,
4707 DBUS_STRUCT_BEGIN_CHAR_AS_STRING
4708 DBUS_TYPE_UINT32_AS_STRING
4709 DBUS_TYPE_UINT32_AS_STRING
4710 DBUS_STRUCT_END_CHAR_AS_STRING,
4714 function(&array, user_data);
4716 dbus_message_iter_close_container(&value, &array);
4717 dbus_message_iter_close_container(&entry, &value);
4718 dbus_message_iter_close_container(dict, &entry);
4722 static void interface_scan_params(DBusMessageIter *iter, void *user_data)
4724 DBusMessageIter dict;
4725 const char *type = "passive";
4726 struct interface_scan_data *data = user_data;
4728 supplicant_dbus_dict_open(iter, &dict);
4730 if (data && data->scan_params) {
4733 supplicant_dbus_dict_append_basic(&dict, "Type",
4734 DBUS_TYPE_STRING, &type);
4736 #if defined TIZEN_EXT
4737 SUPPLICANT_DBG("[specific_scan] num_ssids %d", data->scan_params->num_ssids);
4738 if (data->scan_params->num_ssids != 0)
4740 supplicant_dbus_dict_append_array(&dict, "SSIDs",
4745 supplicant_add_scan_frequency(&dict, add_scan_frequencies,
4748 supplicant_dbus_dict_append_basic(&dict, "Type",
4749 DBUS_TYPE_STRING, &type);
4751 supplicant_dbus_dict_close(iter, &dict);
4754 static int interface_ready_to_scan(GSupplicantInterface *interface)
4759 if (!system_available)
4762 if (interface->scanning)
4765 switch (interface->state) {
4766 case G_SUPPLICANT_STATE_AUTHENTICATING:
4767 case G_SUPPLICANT_STATE_ASSOCIATING:
4768 case G_SUPPLICANT_STATE_ASSOCIATED:
4769 case G_SUPPLICANT_STATE_4WAY_HANDSHAKE:
4770 case G_SUPPLICANT_STATE_GROUP_HANDSHAKE:
4772 #if defined TIZEN_EXT
4773 case G_SUPPLICANT_STATE_DISABLED:
4775 case G_SUPPLICANT_STATE_UNKNOWN:
4777 case G_SUPPLICANT_STATE_UNKNOWN:
4778 case G_SUPPLICANT_STATE_DISABLED:
4780 case G_SUPPLICANT_STATE_DISCONNECTED:
4781 case G_SUPPLICANT_STATE_INACTIVE:
4782 case G_SUPPLICANT_STATE_SCANNING:
4783 case G_SUPPLICANT_STATE_COMPLETED:
4790 int g_supplicant_interface_scan(GSupplicantInterface *interface,
4791 GSupplicantScanParams *scan_data,
4792 GSupplicantInterfaceCallback callback,
4795 struct interface_scan_data *data;
4798 ret = interface_ready_to_scan(interface);
4802 data = dbus_malloc0(sizeof(*data));
4806 data->interface = interface;
4807 data->path = g_strdup(interface->path);
4808 #if defined TIZEN_EXT
4809 data->interface->scan_callback = data->callback = callback;
4810 data->interface->scan_data = data->user_data = user_data;
4812 data->callback = callback;
4813 data->user_data = user_data;
4815 data->scan_params = scan_data;
4817 interface->scan_callback = callback;
4818 interface->scan_data = user_data;
4820 ret = supplicant_dbus_method_call(interface->path,
4821 SUPPLICANT_INTERFACE ".Interface", "Scan",
4822 interface_scan_params, interface_scan_result, data,
4833 static int parse_supplicant_error(DBusMessageIter *iter)
4835 int err = -ECONNABORTED;
4841 /* If the given passphrase is malformed wpa_s returns
4842 * "invalid message format" but this error should be interpreted as
4845 while (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_STRING) {
4846 dbus_message_iter_get_basic(iter, &key);
4847 if (strncmp(key, "psk", 3) == 0 ||
4848 strncmp(key, "wep_key", 7) == 0 ||
4849 strcmp(key, "invalid message format") == 0) {
4853 dbus_message_iter_next(iter);
4859 static void interface_select_network_result(const char *error,
4860 DBusMessageIter *iter, void *user_data)
4862 struct interface_connect_data *data = user_data;
4869 #if defined TIZEN_EXT
4870 SUPPLICANT_DBG("SelectNetwork errorFreq %s", error);
4872 SUPPLICANT_DBG("SelectNetwork error %s", error);
4874 err = parse_supplicant_error(iter);
4880 data->callback(err, data->interface, data->user_data);
4882 #if defined TIZEN_EXT
4883 g_free(data->ssid->ssid);
4884 g_free(data->ssid->passphrase);
4890 static void interface_select_network_params(DBusMessageIter *iter,
4893 struct interface_connect_data *data = user_data;
4894 GSupplicantInterface *interface = data->interface;
4895 #if defined TIZEN_EXT
4896 GSupplicantSSID *ssid = data->ssid;
4899 dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
4900 &interface->network_path);
4901 #if defined TIZEN_EXT
4902 if (!ssid->bssid_for_connect_len)
4903 dbus_message_iter_append_basic(iter, DBUS_TYPE_INT32, &ssid->freq);
4907 static void interface_add_network_result(const char *error,
4908 DBusMessageIter *iter, void *user_data)
4910 struct interface_connect_data *data = user_data;
4911 GSupplicantInterface *interface = data->interface;
4918 dbus_message_iter_get_basic(iter, &path);
4922 SUPPLICANT_DBG("PATH: %s", path);
4924 #if defined TIZEN_EXT
4925 if (interface->network_path)
4926 g_free(interface->network_path);
4928 interface->network_path = g_strdup(path);
4930 store_network_information(interface, data->ssid);
4932 #if defined TIZEN_EXT
4933 SUPPLICANT_DBG(".Interface.SelectNetworkFreq");
4934 GSupplicantSSID *ssid = data->ssid;
4936 if (!ssid->bssid_for_connect_len)
4937 supplicant_dbus_method_call(data->interface->path,
4938 SUPPLICANT_INTERFACE ".Interface", "SelectNetworkFreq",
4939 interface_select_network_params,
4940 interface_select_network_result, data,
4943 supplicant_dbus_method_call(data->interface->path,
4944 SUPPLICANT_INTERFACE ".Interface", "SelectNetwork",
4945 interface_select_network_params,
4946 interface_select_network_result, data,
4949 supplicant_dbus_method_call(data->interface->path,
4950 SUPPLICANT_INTERFACE ".Interface", "SelectNetwork",
4951 interface_select_network_params,
4952 interface_select_network_result, data,
4959 SUPPLICANT_DBG("AddNetwork error %s", error);
4961 if (interface_exists(data->interface, data->interface->path)) {
4962 err = parse_supplicant_error(iter);
4964 data->callback(err, data->interface, data->user_data);
4966 g_free(interface->network_path);
4967 interface->network_path = NULL;
4971 #if defined TIZEN_EXT
4972 g_free(data->ssid->ssid);
4973 g_free(data->ssid->passphrase);
4979 static void add_network_security_none(DBusMessageIter *dict)
4981 const char *auth_alg = "OPEN";
4983 supplicant_dbus_dict_append_basic(dict, "auth_alg",
4984 DBUS_TYPE_STRING, &auth_alg);
4987 static void add_network_security_wep(DBusMessageIter *dict,
4988 GSupplicantSSID *ssid)
4990 const char *auth_alg = "OPEN SHARED";
4991 dbus_uint32_t key_index = 0;
4993 supplicant_dbus_dict_append_basic(dict, "auth_alg",
4994 DBUS_TYPE_STRING, &auth_alg);
4996 if (ssid->passphrase) {
4997 int size = strlen(ssid->passphrase);
4998 if (size == 10 || size == 26) {
4999 unsigned char *key = g_try_malloc(13);
5003 memset(tmp, 0, sizeof(tmp));
5007 for (i = 0; i < size / 2; i++) {
5008 memcpy(tmp, ssid->passphrase + (i * 2), 2);
5009 key[i] = (unsigned char) strtol(tmp, NULL, 16);
5012 supplicant_dbus_dict_append_fixed_array(dict,
5017 } else if (size == 5 || size == 13) {
5018 unsigned char *key = g_try_malloc(13);
5024 for (i = 0; i < size; i++)
5025 key[i] = (unsigned char) ssid->passphrase[i];
5027 supplicant_dbus_dict_append_fixed_array(dict,
5033 supplicant_dbus_dict_append_basic(dict,
5038 supplicant_dbus_dict_append_basic(dict, "wep_tx_keyidx",
5039 DBUS_TYPE_UINT32, &key_index);
5043 static dbus_bool_t is_psk_raw_key(const char *psk)
5047 /* A raw key is always 64 bytes length... */
5048 if (strlen(psk) != 64)
5051 /* ... and its content is in hex representation */
5052 for (i = 0; i < 64; i++)
5053 if (!isxdigit((unsigned char) psk[i]))
5059 static unsigned char hexchar2bin(char c)
5061 if ((c >= '0') && (c <= '9'))
5063 else if ((c >= 'A') && (c <= 'F'))
5064 return c - 'A' + 10;
5065 else if ((c >= 'a') && (c <= 'f'))
5066 return c - 'a' + 10;
5071 static void hexstring2bin(const char *string, unsigned char *data,
5076 for (i = 0; i < data_len; i++)
5077 data[i] = (hexchar2bin(string[i * 2 + 0]) << 4 |
5078 hexchar2bin(string[i * 2 + 1]) << 0);
5081 static void add_network_security_psk(DBusMessageIter *dict,
5082 GSupplicantSSID *ssid)
5084 if (ssid->passphrase && strlen(ssid->passphrase) > 0) {
5085 const char *key = "psk";
5087 if (is_psk_raw_key(ssid->passphrase)) {
5088 unsigned char data[32];
5089 unsigned char *datap = data;
5091 /* The above pointer alias is required by D-Bus because
5092 * with D-Bus and GCC, non-heap-allocated arrays cannot
5093 * be passed directly by their base pointer. */
5095 hexstring2bin(ssid->passphrase, datap, sizeof(data));
5097 supplicant_dbus_dict_append_fixed_array(dict,
5098 key, DBUS_TYPE_BYTE,
5099 &datap, sizeof(data));
5101 supplicant_dbus_dict_append_basic(dict,
5102 key, DBUS_TYPE_STRING,
5107 static void add_network_security_tls(DBusMessageIter *dict,
5108 GSupplicantSSID *ssid)
5111 * For TLS, we at least need:
5112 * The client certificate
5113 * The client private key file
5114 * The client private key file password
5116 * The Authority certificate is optional.
5118 if (!ssid->client_cert_path)
5121 if (!ssid->private_key_path)
5124 #if !defined TIZEN_EXT
5125 if (!ssid->private_key_passphrase)
5129 if (ssid->ca_cert_path)
5130 supplicant_dbus_dict_append_basic(dict, "ca_cert",
5131 DBUS_TYPE_STRING, &ssid->ca_cert_path);
5133 supplicant_dbus_dict_append_basic(dict, "private_key",
5135 &ssid->private_key_path);
5136 #if !defined TIZEN_EXT
5137 supplicant_dbus_dict_append_basic(dict, "private_key_passwd",
5139 &ssid->private_key_passphrase);
5141 supplicant_dbus_dict_append_basic(dict, "client_cert",
5143 &ssid->client_cert_path);
5146 static void add_network_security_peap(DBusMessageIter *dict,
5147 GSupplicantSSID *ssid)
5152 * For PEAP/TTLS, we at least need
5153 * The authority certificate
5154 * The 2nd phase authentication method
5155 * The 2nd phase passphrase
5157 * The Client certificate is optional although strongly recommended
5158 * When setting it, we need in addition
5159 * The Client private key file
5160 * The Client private key file password
5162 if (!ssid->passphrase)
5165 if (!ssid->phase2_auth)
5168 if (ssid->client_cert_path) {
5169 if (!ssid->private_key_path)
5172 #if !defined TIZEN_EXT
5173 if (!ssid->private_key_passphrase)
5177 supplicant_dbus_dict_append_basic(dict, "client_cert",
5179 &ssid->client_cert_path);
5181 supplicant_dbus_dict_append_basic(dict, "private_key",
5183 &ssid->private_key_path);
5185 #if !defined TIZEN_EXT
5186 supplicant_dbus_dict_append_basic(dict, "private_key_passwd",
5188 &ssid->private_key_passphrase);
5193 if (g_str_has_prefix(ssid->phase2_auth, "EAP-")) {
5194 phase2_auth = g_strdup_printf("autheap=%s",
5195 ssid->phase2_auth + strlen("EAP-"));
5197 phase2_auth = g_strdup_printf("auth=%s", ssid->phase2_auth);
5199 supplicant_dbus_dict_append_basic(dict, "password",
5203 if (ssid->ca_cert_path)
5204 supplicant_dbus_dict_append_basic(dict, "ca_cert",
5206 &ssid->ca_cert_path);
5208 supplicant_dbus_dict_append_basic(dict, "phase2",
5212 g_free(phase2_auth);
5215 #if defined TIZEN_EXT
5216 static void add_network_security_aka_sim(DBusMessageIter *dict,
5217 GSupplicantSSID *ssid)
5219 if (!ssid->passphrase)
5222 supplicant_dbus_dict_append_basic(dict, "password",
5227 static void add_network_security_fast(DBusMessageIter *dict,
5228 GSupplicantSSID *ssid)
5231 * For FAST, we at least need:
5233 * phase1 (provisiong information)
5237 /* Allow provisioing both authenticated and unauthenticated */
5238 const char *phase1 = "fast_provisioning=2";
5239 supplicant_dbus_dict_append_basic(dict, "phase1",
5243 SUPPLICANT_DBG("pac_file [%s]", ssid->pac_file);
5245 supplicant_dbus_dict_append_basic(dict, "pac_file",
5249 supplicant_dbus_dict_append_basic(dict, "password",
5255 static void add_network_security_eap(DBusMessageIter *dict,
5256 GSupplicantSSID *ssid)
5260 #if defined TIZEN_EXT
5263 if (!ssid->eap || !ssid->identity)
5267 if (g_strcmp0(ssid->eap, "tls") == 0) {
5268 add_network_security_tls(dict, ssid);
5269 } else if (g_strcmp0(ssid->eap, "peap") == 0 ||
5270 g_strcmp0(ssid->eap, "ttls") == 0) {
5271 #if defined TIZEN_EXT
5272 if (!ssid->identity)
5275 add_network_security_peap(dict, ssid);
5277 #if defined TIZEN_EXT
5278 } else if (g_strcmp0(ssid->eap, "sim") == 0 ||
5279 g_strcmp0(ssid->eap, "aka") == 0 ||
5280 g_strcmp0(ssid->eap, "aka'") == 0) {
5281 add_network_security_aka_sim(dict, ssid);
5282 } else if (g_strcmp0(ssid->eap, "pwd") == 0) {
5283 if(!ssid->passphrase)
5285 supplicant_dbus_dict_append_basic(dict, "password",
5288 } else if (g_strcmp0(ssid->eap, "fast") == 0){
5289 if (!ssid->identity || !ssid->passphrase)
5292 add_network_security_fast(dict, ssid);
5297 eap_value = g_ascii_strup(ssid->eap, -1);
5299 supplicant_dbus_dict_append_basic(dict, "eap",
5302 #if defined TIZEN_EXT
5303 if (ssid->identity != NULL)
5304 supplicant_dbus_dict_append_basic(dict, "identity",
5308 supplicant_dbus_dict_append_basic(dict, "identity",
5312 if(ssid->anonymous_identity)
5313 supplicant_dbus_dict_append_basic(dict, "anonymous_identity",
5315 &ssid->anonymous_identity);
5317 if(ssid->subject_match)
5318 supplicant_dbus_dict_append_basic(dict, "subject_match",
5320 &ssid->subject_match);
5322 if(ssid->altsubject_match)
5323 supplicant_dbus_dict_append_basic(dict, "altsubject_match",
5325 &ssid->altsubject_match);
5327 if(ssid->domain_suffix_match)
5328 supplicant_dbus_dict_append_basic(dict, "domain_suffix_match",
5330 &ssid->domain_suffix_match);
5332 if(ssid->domain_match)
5333 supplicant_dbus_dict_append_basic(dict, "domain_match",
5335 &ssid->domain_match);
5340 static void add_network_security_ciphers(DBusMessageIter *dict,
5341 GSupplicantSSID *ssid)
5343 unsigned int p_cipher, g_cipher, i;
5344 char *pairwise, *group;
5345 char *pair_ciphers[4];
5346 char *group_ciphers[5];
5348 p_cipher = ssid->pairwise_cipher;
5349 g_cipher = ssid->group_cipher;
5351 if (p_cipher == 0 && g_cipher == 0)
5356 if (p_cipher & G_SUPPLICANT_PAIRWISE_CCMP)
5357 pair_ciphers[i++] = "CCMP";
5359 if (p_cipher & G_SUPPLICANT_PAIRWISE_TKIP)
5360 pair_ciphers[i++] = "TKIP";
5362 if (p_cipher & G_SUPPLICANT_PAIRWISE_NONE)
5363 pair_ciphers[i++] = "NONE";
5365 pair_ciphers[i] = NULL;
5369 if (g_cipher & G_SUPPLICANT_GROUP_CCMP)
5370 group_ciphers[i++] = "CCMP";
5372 if (g_cipher & G_SUPPLICANT_GROUP_TKIP)
5373 group_ciphers[i++] = "TKIP";
5375 if (g_cipher & G_SUPPLICANT_GROUP_WEP104)
5376 group_ciphers[i++] = "WEP104";
5378 if (g_cipher & G_SUPPLICANT_GROUP_WEP40)
5379 group_ciphers[i++] = "WEP40";
5381 group_ciphers[i] = NULL;
5383 pairwise = g_strjoinv(" ", pair_ciphers);
5384 group = g_strjoinv(" ", group_ciphers);
5386 SUPPLICANT_DBG("cipher %s %s", pairwise, group);
5388 supplicant_dbus_dict_append_basic(dict, "pairwise",
5391 supplicant_dbus_dict_append_basic(dict, "group",
5399 static void add_network_security_proto(DBusMessageIter *dict,
5400 GSupplicantSSID *ssid)
5402 unsigned int protocol, i;
5406 protocol = ssid->protocol;
5413 if (protocol & G_SUPPLICANT_PROTO_RSN)
5414 protos[i++] = "RSN";
5416 if (protocol & G_SUPPLICANT_PROTO_WPA)
5417 protos[i++] = "WPA";
5421 proto = g_strjoinv(" ", protos);
5423 SUPPLICANT_DBG("proto %s", proto);
5425 supplicant_dbus_dict_append_basic(dict, "proto",
5432 static void add_network_security(DBusMessageIter *dict, GSupplicantSSID *ssid)
5436 switch (ssid->security) {
5437 case G_SUPPLICANT_SECURITY_NONE:
5439 add_network_security_none(dict);
5440 add_network_security_ciphers(dict, ssid);
5442 case G_SUPPLICANT_SECURITY_UNKNOWN:
5443 case G_SUPPLICANT_SECURITY_WEP:
5445 add_network_security_wep(dict, ssid);
5446 add_network_security_ciphers(dict, ssid);
5448 case G_SUPPLICANT_SECURITY_PSK:
5449 key_mgmt = "WPA-PSK";
5450 add_network_security_psk(dict, ssid);
5451 add_network_security_ciphers(dict, ssid);
5452 add_network_security_proto(dict, ssid);
5454 case G_SUPPLICANT_SECURITY_IEEE8021X:
5455 key_mgmt = "WPA-EAP";
5456 add_network_security_eap(dict, ssid);
5457 add_network_security_ciphers(dict, ssid);
5458 add_network_security_proto(dict, ssid);
5460 #if defined TIZEN_EXT
5461 case G_SUPPLICANT_SECURITY_FT_PSK:
5462 key_mgmt = "FT-PSK";
5463 add_network_security_psk(dict, ssid);
5464 add_network_security_ciphers(dict, ssid);
5465 add_network_security_proto(dict, ssid);
5467 case G_SUPPLICANT_SECURITY_FT_IEEE8021X:
5468 key_mgmt = "FT-EAP";
5469 add_network_security_eap(dict, ssid);
5470 add_network_security_ciphers(dict, ssid);
5471 add_network_security_proto(dict, ssid);
5476 supplicant_dbus_dict_append_basic(dict, "key_mgmt",
5477 DBUS_TYPE_STRING, &key_mgmt);
5480 static void add_network_mode(DBusMessageIter *dict, GSupplicantSSID *ssid)
5484 switch (ssid->mode) {
5485 case G_SUPPLICANT_MODE_UNKNOWN:
5486 case G_SUPPLICANT_MODE_INFRA:
5489 case G_SUPPLICANT_MODE_IBSS:
5492 case G_SUPPLICANT_MODE_MASTER:
5497 supplicant_dbus_dict_append_basic(dict, "mode",
5498 DBUS_TYPE_UINT32, &mode);
5501 static void interface_add_network_params(DBusMessageIter *iter, void *user_data)
5503 DBusMessageIter dict;
5504 struct interface_connect_data *data = user_data;
5505 GSupplicantSSID *ssid = data->ssid;
5507 supplicant_dbus_dict_open(iter, &dict);
5509 if (ssid->scan_ssid)
5510 supplicant_dbus_dict_append_basic(&dict, "scan_ssid",
5511 DBUS_TYPE_UINT32, &ssid->scan_ssid);
5514 supplicant_dbus_dict_append_basic(&dict, "frequency",
5515 DBUS_TYPE_UINT32, &ssid->freq);
5518 supplicant_dbus_dict_append_basic(&dict, "bgscan",
5519 DBUS_TYPE_STRING, &ssid->bgscan);
5521 add_network_mode(&dict, ssid);
5523 add_network_security(&dict, ssid);
5525 supplicant_dbus_dict_append_fixed_array(&dict, "ssid",
5526 DBUS_TYPE_BYTE, &ssid->ssid,
5529 supplicant_dbus_dict_append_basic(&dict, "ignore_broadcast_ssid",
5531 &ssid->ignore_broadcast_ssid);
5533 #if defined TIZEN_EXT
5536 bssid = g_try_malloc0(18);
5537 if (bssid == NULL) {
5538 SUPPLICANT_DBG("memory allocation error");
5539 supplicant_dbus_dict_close(iter, &dict);
5543 if (ssid->bssid_for_connect_len)
5544 snprintf(bssid, 18, "%02x:%02x:%02x:%02x:%02x:%02x",
5545 ssid->bssid_for_connect[0], ssid->bssid_for_connect[1], ssid->bssid_for_connect[2],
5546 ssid->bssid_for_connect[3], ssid->bssid_for_connect[4], ssid->bssid_for_connect[5]);
5548 snprintf(bssid, 18, "%02x:%02x:%02x:%02x:%02x:%02x",
5549 ssid->bssid[0], ssid->bssid[1], ssid->bssid[2],
5550 ssid->bssid[3], ssid->bssid[4], ssid->bssid[5]);
5552 supplicant_dbus_dict_append_basic(&dict, "bssid",
5553 DBUS_TYPE_STRING, &bssid);
5558 supplicant_dbus_dict_close(iter, &dict);
5561 static void interface_wps_start_result(const char *error,
5562 DBusMessageIter *iter, void *user_data)
5564 struct interface_connect_data *data = user_data;
5571 SUPPLICANT_DBG("error: %s", error);
5572 err = parse_supplicant_error(iter);
5576 data->callback(err, data->interface, data->user_data);
5583 static void interface_add_wps_params(DBusMessageIter *iter, void *user_data)
5585 struct interface_connect_data *data = user_data;
5586 GSupplicantSSID *ssid = data->ssid;
5587 const char *role = "enrollee", *type;
5588 DBusMessageIter dict;
5592 supplicant_dbus_dict_open(iter, &dict);
5594 supplicant_dbus_dict_append_basic(&dict, "Role",
5595 DBUS_TYPE_STRING, &role);
5598 if (ssid->pin_wps) {
5600 supplicant_dbus_dict_append_basic(&dict, "Pin",
5601 DBUS_TYPE_STRING, &ssid->pin_wps);
5604 supplicant_dbus_dict_append_basic(&dict, "Type",
5605 DBUS_TYPE_STRING, &type);
5607 #if defined TIZEN_EXT
5609 supplicant_dbus_dict_append_fixed_array(&dict, "Bssid",
5610 DBUS_TYPE_BYTE, &ssid->bssid, 6);
5613 supplicant_dbus_dict_close(iter, &dict);
5616 static void wps_start(const char *error, DBusMessageIter *iter, void *user_data)
5618 struct interface_connect_data *data = user_data;
5623 SUPPLICANT_DBG("error: %s", error);
5629 #if defined TIZEN_EXT
5630 GSupplicantSSID *ssid = data->ssid;
5631 if (ssid->pin_wps != NULL) {
5632 if (!g_utf8_validate(ssid->pin_wps, 8, NULL)) {
5633 SUPPLICANT_DBG("Invalid characters in WPS_PIN");
5640 supplicant_dbus_method_call(data->interface->path,
5641 SUPPLICANT_INTERFACE ".Interface.WPS", "Start",
5642 interface_add_wps_params,
5643 interface_wps_start_result, data, NULL);
5646 static void wps_process_credentials(DBusMessageIter *iter, void *user_data)
5648 dbus_bool_t credentials = TRUE;
5652 dbus_message_iter_append_basic(iter, DBUS_TYPE_BOOLEAN, &credentials);
5656 #if defined TIZEN_EXT
5657 #define NETCONFIG_SERVICE "net.netconfig"
5658 #define NETCONFIG_WIFI_PATH "/net/netconfig/wifi"
5659 #define NETCONFIG_WIFI_INTERFACE NETCONFIG_SERVICE ".wifi"
5661 struct dec_method_call_data {
5662 struct interface_connect_data *data;
5663 DBusPendingCall *pending_call;
5666 static struct dec_method_call_data decrypt_request_data;
5668 static void crypt_method_call_cancel(void)
5670 if (decrypt_request_data.pending_call) {
5671 dbus_pending_call_cancel(decrypt_request_data.pending_call);
5672 dbus_pending_call_unref(decrypt_request_data.pending_call);
5673 decrypt_request_data.pending_call = NULL;
5676 g_free(decrypt_request_data.data->path);
5677 g_free(decrypt_request_data.data->ssid);
5678 dbus_free(decrypt_request_data.data);
5679 decrypt_request_data.data = NULL;
5682 static void decryption_request_reply(DBusPendingCall *call,
5687 DBusMessageIter args;
5690 struct interface_connect_data *data = user_data;
5694 reply = dbus_pending_call_steal_reply(call);
5696 dbus_error_init(&error);
5697 if (dbus_set_error_from_message(&error, reply)) {
5698 SUPPLICANT_DBG("decryption_request_reply() %s %s", error.name, error.message);
5699 dbus_error_free(&error);
5704 if (dbus_message_iter_init(reply, &args) == FALSE) {
5705 SUPPLICANT_DBG("dbus_message_iter_init() failed");
5710 dbus_message_iter_get_basic(&args, &out_data);
5711 data->ssid->passphrase = g_strdup((const gchar *)out_data);
5713 ret = supplicant_dbus_method_call(data->interface->path,
5714 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
5715 interface_add_network_params,
5716 interface_add_network_result, data,
5721 SUPPLICANT_DBG("AddNetwork failed %d", ret);
5722 callback_assoc_failed(decrypt_request_data.data->user_data);
5724 g_free(data->ssid->ssid);
5725 g_free(data->ssid->passphrase);
5730 dbus_message_unref(reply);
5731 dbus_pending_call_unref(call);
5733 decrypt_request_data.pending_call = NULL;
5734 decrypt_request_data.data = NULL;
5737 static int send_decryption_request(const char *passphrase,
5738 struct interface_connect_data *data)
5740 DBusMessage *msg = NULL;
5741 DBusPendingCall *call;
5743 SUPPLICANT_DBG("Decryption request");
5746 SUPPLICANT_DBG("Invalid parameter");
5753 msg = dbus_message_new_method_call(NETCONFIG_SERVICE, NETCONFIG_WIFI_PATH,
5754 NETCONFIG_WIFI_INTERFACE, "DecryptPassphrase");
5758 dbus_message_append_args(msg, DBUS_TYPE_STRING, &passphrase,
5761 if (!dbus_connection_send_with_reply(connection, msg,
5762 &call, DBUS_TIMEOUT_USE_DEFAULT)) {
5763 dbus_message_unref(msg);
5768 dbus_message_unref(msg);
5772 decrypt_request_data.pending_call = call;
5773 decrypt_request_data.data = data;
5775 dbus_pending_call_set_notify(call, decryption_request_reply, data, NULL);
5776 dbus_message_unref(msg);
5778 SUPPLICANT_DBG("Decryption request succeeded");
5784 int g_supplicant_interface_connect(GSupplicantInterface *interface,
5785 GSupplicantSSID *ssid,
5786 GSupplicantInterfaceCallback callback,
5789 struct interface_connect_data *data;
5790 struct interface_data *intf_data;
5798 if (!system_available)
5801 /* TODO: Check if we're already connected and switch */
5803 data = dbus_malloc0(sizeof(*data));
5807 data->interface = interface;
5808 data->path = g_strdup(interface->path);
5809 data->callback = callback;
5811 data->user_data = user_data;
5813 if (ssid->use_wps) {
5814 g_free(interface->wps_cred.key);
5815 memset(&interface->wps_cred, 0,
5816 sizeof(struct _GSupplicantWpsCredentials));
5818 ret = supplicant_dbus_property_set(interface->path,
5819 SUPPLICANT_INTERFACE ".Interface.WPS",
5820 "ProcessCredentials", DBUS_TYPE_BOOLEAN_AS_STRING,
5821 wps_process_credentials, wps_start, data, interface);
5823 /* By the time there is a request for connect and the network
5824 * path is not NULL it means that connman has not removed the
5825 * previous network pointer. This can happen in the case AP
5826 * deauthenticated client and connman does not remove the
5827 * previously connected network pointer. This causes supplicant
5828 * to reallocate the memory for struct wpa_ssid again even if it
5829 * is the same SSID. This causes memory usage of wpa_supplicnat
5830 * to go high. The idea here is that if the previously connected
5831 * network is not removed at the time of next connection attempt
5832 * check if the network path is not NULL. In case it is non-NULL
5833 * first remove the network and then once removal is successful, add
5837 if (interface->network_path != NULL) {
5842 * If this add network is for the same network for
5843 * which wpa_supplicant already has a profile then do
5844 * not need to add another profile. Only if the
5845 * profile that needs to get added is different from
5846 * what is there in wpa_s delete the current one. A
5847 * network is identified by its SSID, security_type
5848 * and passphrase (private passphrase in case security
5851 if (compare_network_parameters(interface, ssid)) {
5855 intf_data = dbus_malloc0(sizeof(*intf_data));
5859 intf_data->interface = interface;
5860 intf_data->path = g_strdup(interface->path);
5861 intf_data->callback = callback;
5862 intf_data->ssid = ssid;
5863 intf_data->user_data = user_data;
5864 intf_data->network_remove_in_progress = TRUE;
5865 network_remove(intf_data);
5867 #if defined TIZEN_EXT
5868 if (ssid->passphrase && g_strcmp0(ssid->passphrase, "") != 0 && !ssid->eap) {
5869 ret = send_decryption_request(ssid->passphrase, data);
5871 SUPPLICANT_DBG("Decryption request failed %d", ret);
5874 ret = supplicant_dbus_method_call(interface->path,
5875 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
5876 interface_add_network_params,
5877 interface_add_network_result, data,
5887 return -EINPROGRESS;
5890 static void network_remove_result(const char *error,
5891 DBusMessageIter *iter, void *user_data)
5893 struct interface_data *data = user_data;
5894 struct interface_connect_data *connect_data;
5901 SUPPLICANT_DBG("error: %s", error);
5903 if (g_strcmp0("org.freedesktop.DBus.Error.UnknownMethod",
5905 result = -ECONNABORTED;
5908 g_free(data->interface->network_path);
5909 data->interface->network_path = NULL;
5911 remove_network_information(data->interface);
5913 if (data->network_remove_in_progress == TRUE) {
5914 data->network_remove_in_progress = FALSE;
5915 connect_data = dbus_malloc0(sizeof(*connect_data));
5919 connect_data->interface = data->interface;
5920 connect_data->path = g_strdup(data->path);
5921 connect_data->callback = data->callback;
5922 connect_data->ssid = data->ssid;
5923 connect_data->user_data = data->user_data;
5925 #if defined TIZEN_EXT
5927 if (data->ssid->passphrase && g_strcmp0(data->ssid->passphrase, "") != 0
5928 && !data->ssid->eap) {
5929 ret = send_decryption_request(data->ssid->passphrase, connect_data);
5931 SUPPLICANT_DBG("Decryption request failed %d", ret);
5932 g_free(connect_data->ssid);
5933 g_free(connect_data->path);
5934 dbus_free(connect_data);
5938 supplicant_dbus_method_call(data->interface->path,
5939 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
5940 interface_add_network_params,
5941 interface_add_network_result, connect_data,
5942 connect_data->interface);
5945 data->callback(result, data->interface, data->user_data);
5951 static void network_remove_params(DBusMessageIter *iter, void *user_data)
5953 struct interface_data *data = user_data;
5954 const char *path = data->interface->network_path;
5956 SUPPLICANT_DBG("path %s", path);
5958 dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH, &path);
5961 static int network_remove(struct interface_data *data)
5963 GSupplicantInterface *interface = data->interface;
5967 #if defined TIZEN_EXT
5968 GSupplicantInterface *intf = NULL;
5970 * Check if 'interface' is valid
5972 intf = g_hash_table_lookup(interface_table, interface->path);
5977 return supplicant_dbus_method_call(interface->path,
5978 SUPPLICANT_INTERFACE ".Interface", "RemoveNetwork",
5979 network_remove_params, network_remove_result, data,
5983 static void interface_disconnect_result(const char *error,
5984 DBusMessageIter *iter, void *user_data)
5986 struct interface_data *data = user_data;
5993 SUPPLICANT_DBG("error: %s", error);
5995 if (g_strcmp0("org.freedesktop.DBus.Error.UnknownMethod",
5997 result = -ECONNABORTED;
6000 /* If we are disconnecting from previous WPS successful
6001 * association. i.e.: it did not went through AddNetwork,
6002 * and interface->network_path was never set. */
6003 if (!data->interface->network_path) {
6005 data->callback(result, data->interface,
6013 if (result < 0 && data->callback) {
6014 data->callback(result, data->interface, data->user_data);
6015 data->callback = NULL;
6018 if (result != -ECONNABORTED) {
6019 if (network_remove(data) < 0) {
6029 int g_supplicant_interface_disconnect(GSupplicantInterface *interface,
6030 GSupplicantInterfaceCallback callback,
6033 struct interface_data *data;
6041 if (!system_available)
6043 #if defined TIZEN_EXT
6044 if (decrypt_request_data.pending_call &&
6045 decrypt_request_data.data &&
6046 decrypt_request_data.data->user_data == user_data) {
6048 callback_assoc_failed(decrypt_request_data.data->user_data);
6049 crypt_method_call_cancel();
6054 data = dbus_malloc0(sizeof(*data));
6058 data->interface = interface;
6059 data->path = g_strdup(interface->path);
6060 data->callback = callback;
6061 data->user_data = user_data;
6063 ret = supplicant_dbus_method_call(interface->path,
6064 SUPPLICANT_INTERFACE ".Interface", "Disconnect",
6065 NULL, interface_disconnect_result, data,
6076 static void interface_p2p_find_result(const char *error,
6077 DBusMessageIter *iter, void *user_data)
6079 struct interface_scan_data *data = user_data;
6082 SUPPLICANT_DBG("error %s", error);
6087 if (interface_exists(data->interface, data->path)) {
6088 if (!data->interface->ready)
6091 data->interface->p2p_finding = true;
6095 data->callback(err, data->interface, data->user_data);
6101 static void interface_p2p_find_params(DBusMessageIter *iter, void *user_data)
6103 DBusMessageIter dict;
6105 supplicant_dbus_dict_open(iter, &dict);
6106 supplicant_dbus_dict_close(iter, &dict);
6109 int g_supplicant_interface_p2p_find(GSupplicantInterface *interface,
6110 GSupplicantInterfaceCallback callback,
6113 struct interface_scan_data *data;
6116 if (!interface->p2p_support)
6119 ret = interface_ready_to_scan(interface);
6120 if (ret && ret != -EALREADY)
6123 data = dbus_malloc0(sizeof(*data));
6127 data->interface = interface;
6128 data->path = g_strdup(interface->path);
6129 data->callback = callback;
6130 data->user_data = user_data;
6132 ret = supplicant_dbus_method_call(interface->path,
6133 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "Find",
6134 interface_p2p_find_params, interface_p2p_find_result,
6144 bool g_supplicant_interface_is_p2p_finding(GSupplicantInterface *interface)
6149 return interface->p2p_finding;
6152 int g_supplicant_interface_p2p_stop_find(GSupplicantInterface *interface)
6154 if (!interface->p2p_finding)
6159 interface->p2p_finding = false;
6161 return supplicant_dbus_method_call(interface->path,
6162 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "StopFind",
6163 NULL, NULL, NULL, NULL);
6166 static void interface_p2p_connect_result(const char *error,
6167 DBusMessageIter *iter, void *user_data)
6169 struct interface_connect_data *data = user_data;
6175 SUPPLICANT_DBG("error: %s", error);
6176 err = parse_supplicant_error(iter);
6180 data->callback(err, data->interface, data->user_data);
6183 g_free(data->peer->wps_pin);
6184 g_free(data->peer->path);
6189 static void interface_p2p_connect_params(DBusMessageIter *iter, void *user_data)
6191 struct interface_connect_data *data = user_data;
6192 const char *wps = "pbc";
6193 DBusMessageIter dict;
6198 supplicant_dbus_dict_open(iter, &dict);
6200 if (data->peer->master)
6203 if (data->peer->wps_pin)
6206 supplicant_dbus_dict_append_basic(&dict, "peer",
6207 DBUS_TYPE_OBJECT_PATH, &data->peer->path);
6208 supplicant_dbus_dict_append_basic(&dict, "wps_method",
6209 DBUS_TYPE_STRING, &wps);
6210 if (data->peer->wps_pin) {
6211 supplicant_dbus_dict_append_basic(&dict, "pin",
6212 DBUS_TYPE_STRING, &data->peer->wps_pin);
6215 supplicant_dbus_dict_append_basic(&dict, "go_intent",
6216 DBUS_TYPE_INT32, &go_intent);
6218 supplicant_dbus_dict_close(iter, &dict);
6221 int g_supplicant_interface_p2p_connect(GSupplicantInterface *interface,
6222 GSupplicantPeerParams *peer_params,
6223 GSupplicantInterfaceCallback callback,
6226 struct interface_connect_data *data;
6231 if (!interface->p2p_support)
6234 data = dbus_malloc0(sizeof(*data));
6238 data->interface = interface;
6239 data->path = g_strdup(interface->path);
6240 data->peer = peer_params;
6241 data->callback = callback;
6242 data->user_data = user_data;
6244 ret = supplicant_dbus_method_call(interface->path,
6245 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "Connect",
6246 interface_p2p_connect_params, interface_p2p_connect_result,
6254 return -EINPROGRESS;
6257 int g_supplicant_interface_p2p_disconnect(GSupplicantInterface *interface,
6258 GSupplicantPeerParams *peer_params)
6260 GSupplicantPeer *peer;
6266 if (!interface->p2p_support)
6269 peer = g_hash_table_lookup(interface->peer_table, peer_params->path);
6273 for (list = peer->groups; list; list = list->next, count++) {
6274 const char *group_obj_path = list->data;
6275 GSupplicantInterface *g_interface;
6276 GSupplicantGroup *group;
6278 group = g_hash_table_lookup(group_mapping, group_obj_path);
6279 if (!group || !group->interface)
6282 g_interface = group->interface;
6283 supplicant_dbus_method_call(g_interface->path,
6284 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
6285 "Disconnect", NULL, NULL, NULL, g_interface);
6288 if (count == 0 && peer->current_group_iface) {
6289 supplicant_dbus_method_call(peer->current_group_iface->path,
6290 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
6291 "Disconnect", NULL, NULL, NULL,
6292 peer->current_group_iface->path);
6295 peer->current_group_iface = NULL;
6297 return -EINPROGRESS;
6300 struct p2p_service_data {
6302 GSupplicantInterface *interface;
6303 GSupplicantP2PServiceParams *service;
6304 GSupplicantInterfaceCallback callback;
6308 static void interface_p2p_service_result(const char *error,
6309 DBusMessageIter *iter, void *user_data)
6311 struct p2p_service_data *data = user_data;
6314 SUPPLICANT_DBG("%s result - %s", data->registration ?
6315 "Registration" : "Deletion",
6316 error ? error : "Success");
6321 data->callback(result, data->interface, data->user_data);
6323 g_free(data->service->query);
6324 g_free(data->service->response);
6325 g_free(data->service->service);
6326 g_free(data->service->wfd_ies);
6327 g_free(data->service);
6331 static void interface_p2p_service_params(DBusMessageIter *iter,
6334 struct p2p_service_data *data = user_data;
6335 GSupplicantP2PServiceParams *service;
6336 DBusMessageIter dict;
6341 service = data->service;
6343 supplicant_dbus_dict_open(iter, &dict);
6345 if (service->query && service->response) {
6347 supplicant_dbus_dict_append_basic(&dict, "service_type",
6348 DBUS_TYPE_STRING, &type);
6349 supplicant_dbus_dict_append_fixed_array(&dict, "query",
6350 DBUS_TYPE_BYTE, &service->query,
6351 service->query_length);
6352 supplicant_dbus_dict_append_fixed_array(&dict, "response",
6353 DBUS_TYPE_BYTE, &service->response,
6354 service->response_length);
6355 } else if (service->version && service->service) {
6357 supplicant_dbus_dict_append_basic(&dict, "service_type",
6358 DBUS_TYPE_STRING, &type);
6359 supplicant_dbus_dict_append_basic(&dict, "version",
6360 DBUS_TYPE_INT32, &service->version);
6361 supplicant_dbus_dict_append_basic(&dict, "service",
6362 DBUS_TYPE_STRING, &service->service);
6365 supplicant_dbus_dict_close(iter, &dict);
6368 int g_supplicant_interface_p2p_add_service(GSupplicantInterface *interface,
6369 GSupplicantInterfaceCallback callback,
6370 GSupplicantP2PServiceParams *p2p_service_params,
6373 struct p2p_service_data *data;
6378 if (!interface->p2p_support)
6381 data = dbus_malloc0(sizeof(*data));
6385 data->registration = true;
6386 data->interface = interface;
6387 data->service = p2p_service_params;
6388 data->callback = callback;
6389 data->user_data = user_data;
6391 ret = supplicant_dbus_method_call(interface->path,
6392 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "AddService",
6393 interface_p2p_service_params, interface_p2p_service_result,
6400 return -EINPROGRESS;
6403 int g_supplicant_interface_p2p_del_service(GSupplicantInterface *interface,
6404 GSupplicantP2PServiceParams *p2p_service_params)
6406 struct p2p_service_data *data;
6411 if (!interface->p2p_support)
6414 data = dbus_malloc0(sizeof(*data));
6418 data->interface = interface;
6419 data->service = p2p_service_params;
6421 ret = supplicant_dbus_method_call(interface->path,
6422 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeleteService",
6423 interface_p2p_service_params, interface_p2p_service_result,
6430 return -EINPROGRESS;
6433 struct p2p_listen_data {
6438 static void interface_p2p_listen_params(DBusMessageIter *iter, void *user_data)
6440 struct p2p_listen_data *params = user_data;
6441 DBusMessageIter dict;
6443 supplicant_dbus_dict_open(iter, &dict);
6445 supplicant_dbus_dict_append_basic(&dict, "period",
6446 DBUS_TYPE_INT32, ¶ms->period);
6447 supplicant_dbus_dict_append_basic(&dict, "interval",
6448 DBUS_TYPE_INT32, ¶ms->interval);
6449 supplicant_dbus_dict_close(iter, &dict);
6452 int g_supplicant_interface_p2p_listen(GSupplicantInterface *interface,
6453 int period, int interval)
6455 struct p2p_listen_data params;
6459 if (!interface->p2p_support)
6462 params.period = period;
6463 params.interval = interval;
6465 return supplicant_dbus_method_call(interface->path,
6466 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
6467 "ExtendedListen", interface_p2p_listen_params,
6468 NULL, ¶ms, NULL);
6471 static void widi_ies_params(DBusMessageIter *iter, void *user_data)
6473 struct p2p_service_data *data = user_data;
6474 GSupplicantP2PServiceParams *service = data->service;
6475 DBusMessageIter array;
6477 SUPPLICANT_DBG("%p - %d", service->wfd_ies, service->wfd_ies_length);
6479 dbus_message_iter_open_container(iter, DBUS_TYPE_ARRAY,
6480 DBUS_TYPE_BYTE_AS_STRING, &array);
6482 if (service->wfd_ies && service->wfd_ies_length > 0) {
6483 dbus_message_iter_append_fixed_array(&array, DBUS_TYPE_BYTE,
6484 &service->wfd_ies, service->wfd_ies_length);
6487 dbus_message_iter_close_container(iter, &array);
6490 int g_supplicant_set_widi_ies(GSupplicantP2PServiceParams *p2p_service_params,
6491 GSupplicantInterfaceCallback callback,
6494 struct p2p_service_data *data;
6499 if (!system_available)
6502 data = dbus_malloc0(sizeof(*data));
6506 data->service = p2p_service_params;
6507 data->callback = callback;
6508 data->user_data = user_data;
6510 if (p2p_service_params->wfd_ies)
6511 data->registration = true;
6513 ret = supplicant_dbus_property_set(SUPPLICANT_PATH,
6514 SUPPLICANT_INTERFACE, "WFDIEs",
6515 DBUS_TYPE_ARRAY_AS_STRING
6516 DBUS_TYPE_BYTE_AS_STRING,
6518 interface_p2p_service_result,
6520 if (ret < 0 && ret != -EINPROGRESS) {
6525 return -EINPROGRESS;
6528 static const char *g_supplicant_rule0 = "type=signal,"
6529 "path=" DBUS_PATH_DBUS ","
6530 "sender=" DBUS_SERVICE_DBUS ","
6531 "interface=" DBUS_INTERFACE_DBUS ","
6532 "member=NameOwnerChanged,"
6533 "arg0=" SUPPLICANT_SERVICE;
6534 static const char *g_supplicant_rule1 = "type=signal,"
6535 "interface=" SUPPLICANT_INTERFACE;
6536 static const char *g_supplicant_rule2 = "type=signal,"
6537 "interface=" SUPPLICANT_INTERFACE ".Interface";
6538 static const char *g_supplicant_rule3 = "type=signal,"
6539 "interface=" SUPPLICANT_INTERFACE ".Interface.WPS";
6540 static const char *g_supplicant_rule4 = "type=signal,"
6541 "interface=" SUPPLICANT_INTERFACE ".BSS";
6542 static const char *g_supplicant_rule5 = "type=signal,"
6543 "interface=" SUPPLICANT_INTERFACE ".Network";
6544 #if !defined TIZEN_EXT
6545 static const char *g_supplicant_rule6 = "type=signal,"
6546 "interface=" SUPPLICANT_INTERFACE ".Interface.P2PDevice";
6547 static const char *g_supplicant_rule7 = "type=signal,"
6548 "interface=" SUPPLICANT_INTERFACE ".Peer";
6549 static const char *g_supplicant_rule8 = "type=signal,"
6550 "interface=" SUPPLICANT_INTERFACE ".Group";
6553 static void invoke_introspect_method(void)
6555 DBusMessage *message;
6557 message = dbus_message_new_method_call(SUPPLICANT_SERVICE,
6559 DBUS_INTERFACE_INTROSPECTABLE,
6565 dbus_message_set_no_reply(message, TRUE);
6566 dbus_connection_send(connection, message, NULL);
6567 dbus_message_unref(message);
6570 int g_supplicant_register(const GSupplicantCallbacks *callbacks)
6572 connection = dbus_bus_get(DBUS_BUS_SYSTEM, NULL);
6576 if (!dbus_connection_add_filter(connection, g_supplicant_filter,
6578 dbus_connection_unref(connection);
6583 callbacks_pointer = callbacks;
6586 interface_table = g_hash_table_new_full(g_str_hash, g_str_equal,
6587 NULL, remove_interface);
6589 bss_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
6591 peer_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
6593 group_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
6595 pending_peer_connection = g_hash_table_new_full(g_str_hash, g_str_equal,
6597 config_file_table = g_hash_table_new_full(g_str_hash, g_str_equal,
6600 supplicant_dbus_setup(connection);
6602 dbus_bus_add_match(connection, g_supplicant_rule0, NULL);
6603 dbus_bus_add_match(connection, g_supplicant_rule1, NULL);
6604 dbus_bus_add_match(connection, g_supplicant_rule2, NULL);
6605 dbus_bus_add_match(connection, g_supplicant_rule3, NULL);
6606 dbus_bus_add_match(connection, g_supplicant_rule4, NULL);
6607 dbus_bus_add_match(connection, g_supplicant_rule5, NULL);
6608 #if defined TIZEN_EXT
6609 dbus_bus_add_match(connection,
6610 "type=signal,interface=org.tizen.system.deviced.PowerOff,"
6611 "member=ChangeState", NULL);
6613 #if !defined TIZEN_EXT
6614 dbus_bus_add_match(connection, g_supplicant_rule6, NULL);
6615 dbus_bus_add_match(connection, g_supplicant_rule7, NULL);
6616 dbus_bus_add_match(connection, g_supplicant_rule8, NULL);
6618 dbus_connection_flush(connection);
6620 if (dbus_bus_name_has_owner(connection,
6621 SUPPLICANT_SERVICE, NULL)) {
6622 system_available = TRUE;
6623 supplicant_dbus_property_get_all(SUPPLICANT_PATH,
6624 SUPPLICANT_INTERFACE,
6625 service_property, NULL, NULL);
6627 invoke_introspect_method();
6632 static void unregister_interface_remove_params(DBusMessageIter *iter,
6635 const char *path = user_data;
6637 dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
6642 static void unregister_remove_interface(gpointer key, gpointer value,
6645 GSupplicantInterface *interface = value;
6647 supplicant_dbus_method_call(SUPPLICANT_PATH,
6648 SUPPLICANT_INTERFACE,
6650 unregister_interface_remove_params,
6651 NULL, interface->path, NULL);
6654 void g_supplicant_unregister(const GSupplicantCallbacks *callbacks)
6659 #if !defined TIZEN_EXT
6660 dbus_bus_remove_match(connection, g_supplicant_rule8, NULL);
6661 dbus_bus_remove_match(connection, g_supplicant_rule7, NULL);
6662 dbus_bus_remove_match(connection, g_supplicant_rule6, NULL);
6664 dbus_bus_remove_match(connection, g_supplicant_rule5, NULL);
6665 dbus_bus_remove_match(connection, g_supplicant_rule4, NULL);
6666 dbus_bus_remove_match(connection, g_supplicant_rule3, NULL);
6667 dbus_bus_remove_match(connection, g_supplicant_rule2, NULL);
6668 dbus_bus_remove_match(connection, g_supplicant_rule1, NULL);
6669 dbus_bus_remove_match(connection, g_supplicant_rule0, NULL);
6670 dbus_connection_flush(connection);
6672 dbus_connection_remove_filter(connection,
6673 g_supplicant_filter, NULL);
6676 if (config_file_table) {
6677 g_hash_table_destroy(config_file_table);
6678 config_file_table = NULL;
6682 g_hash_table_destroy(bss_mapping);
6687 g_hash_table_destroy(peer_mapping);
6688 peer_mapping = NULL;
6691 if (group_mapping) {
6692 g_hash_table_destroy(group_mapping);
6693 group_mapping = NULL;
6696 if (interface_table) {
6697 g_hash_table_foreach(interface_table,
6698 unregister_remove_interface, NULL);
6699 g_hash_table_destroy(interface_table);
6700 interface_table = NULL;
6703 if (system_available)
6704 callback_system_killed();
6707 dbus_connection_unref(connection);
6711 callbacks_pointer = NULL;