Add ApSelectionMethod config option
[platform/upstream/connman.git] / gsupplicant / supplicant.c
1 /*
2  *
3  *  WPA supplicant library with GLib integration
4  *
5  *  Copyright (C) 2012-2013  Intel Corporation. All rights reserved.
6  *
7  *  This program is free software; you can redistribute it and/or modify
8  *  it under the terms of the GNU General Public License version 2 as
9  *  published by the Free Software Foundation.
10  *
11  *  This program is distributed in the hope that it will be useful,
12  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
13  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14  *  GNU General Public License for more details.
15  *
16  *  You should have received a copy of the GNU General Public License
17  *  along with this program; if not, write to the Free Software
18  *  Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA
19  *
20  */
21
22 #ifdef HAVE_CONFIG_H
23 #include <config.h>
24 #endif
25
26 #include <errno.h>
27 #include <stdio.h>
28 #include <stdlib.h>
29 #include <string.h>
30 #include <stdint.h>
31 #include <syslog.h>
32 #include <ctype.h>
33 #include <stdbool.h>
34 #include <netinet/if_ether.h>
35 #include <netinet/in.h>
36
37 #include <glib.h>
38 #include <gdbus.h>
39
40 #include "dbus.h"
41 #include "gsupplicant.h"
42
43 #if defined TIZEN_EXT
44 #include "setting.h"
45 #endif
46
47 #define IEEE80211_CAP_ESS       0x0001
48 #define IEEE80211_CAP_IBSS      0x0002
49 #define IEEE80211_CAP_PRIVACY   0x0010
50
51 #if defined TIZEN_EXT
52 #define WLAN_EID_HT_CAP 45
53 #define WLAN_EID_VHT_CAP 191
54 #define WLAN_EID_SUPP_RATES 1
55 #define WLAN_EID_EXT_SUPP_RATES 50
56 #define COUNTRY_CODE_LENGTH     2
57 #endif
58
59 #if defined TIZEN_EXT
60 #define LAST_CONNECTED_TIMEOUT       (5 * 60)
61 #define ASSOC_REJECT_TIMEOUT         10
62 #define FREQ_RANGE_24GHZ_CHANNEL_1   2412
63 #define FREQ_RANGE_24GHZ_CHANNEL_14  2484
64 #define FREQ_RANGE_5GHZ_CHANNEL_32   5160
65 #define FREQ_RANGE_5GHZ_CHANNEL_165  5825
66
67 #define MAC2STR(a) (a)[0], (a)[1], (a)[2], (a)[3], (a)[4], (a)[5]
68 #define MACSTR "%02x:%02x:%02x:%02x:%02x:%02x"
69 #endif
70
71 #define BSS_UNKNOWN_STRENGTH    -90
72
73 static DBusConnection *connection;
74
75 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
76 static GSupplicantCallbacks *callbacks_pointer;
77 #else /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
78 static const GSupplicantCallbacks *callbacks_pointer;
79 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
80
81 static dbus_bool_t system_available = FALSE;
82 static dbus_bool_t system_ready = FALSE;
83
84 static dbus_int32_t debug_level;
85 static dbus_bool_t debug_timestamp = FALSE;
86 static dbus_bool_t debug_showkeys = FALSE;
87
88 static const char *debug_strings[] = {
89         "msgdump", "debug", "info", "warning", "error", NULL
90 };
91
92 static unsigned int eap_methods;
93
94 struct strvalmap {
95         const char *str;
96         unsigned int val;
97 };
98
99 static struct strvalmap eap_method_map[] = {
100         { "MD5",        G_SUPPLICANT_EAP_METHOD_MD5     },
101         { "TLS",        G_SUPPLICANT_EAP_METHOD_TLS     },
102         { "MSCHAPV2",   G_SUPPLICANT_EAP_METHOD_MSCHAPV2        },
103         { "PEAP",       G_SUPPLICANT_EAP_METHOD_PEAP    },
104         { "TTLS",       G_SUPPLICANT_EAP_METHOD_TTLS    },
105         { "GTC",        G_SUPPLICANT_EAP_METHOD_GTC     },
106         { "OTP",        G_SUPPLICANT_EAP_METHOD_OTP     },
107         { "LEAP",       G_SUPPLICANT_EAP_METHOD_LEAP    },
108         { "WSC",        G_SUPPLICANT_EAP_METHOD_WSC     },
109         { }
110 };
111
112 static struct strvalmap keymgmt_map[] = {
113         { "none",               G_SUPPLICANT_KEYMGMT_NONE               },
114         { "ieee8021x",          G_SUPPLICANT_KEYMGMT_IEEE8021X  },
115         { "wpa-none",           G_SUPPLICANT_KEYMGMT_WPA_NONE   },
116         { "wpa-psk",            G_SUPPLICANT_KEYMGMT_WPA_PSK    },
117         { "wpa-psk-sha256",     G_SUPPLICANT_KEYMGMT_WPA_PSK_256        },
118         { "wpa-ft-psk",         G_SUPPLICANT_KEYMGMT_WPA_FT_PSK },
119         { "wpa-ft-eap",         G_SUPPLICANT_KEYMGMT_WPA_FT_EAP },
120         { "wpa-eap",            G_SUPPLICANT_KEYMGMT_WPA_EAP    },
121         { "wpa-eap-sha256",     G_SUPPLICANT_KEYMGMT_WPA_EAP_256        },
122         { "wps",                G_SUPPLICANT_KEYMGMT_WPS                },
123 #if defined TIZEN_EXT
124         { "sae",                G_SUPPLICANT_KEYMGMT_SAE                },
125         { "ft-sae",             G_SUPPLICANT_KEYMGMT_FT_SAE             },
126         { "owe",                G_SUPPLICANT_KEYMGMT_OWE                },
127         { "dpp",                G_SUPPLICANT_KEYMGMT_DPP                },
128 #endif
129         { }
130 };
131
132 static struct strvalmap authalg_capa_map[] = {
133         { "open",       G_SUPPLICANT_CAPABILITY_AUTHALG_OPEN    },
134         { "shared",     G_SUPPLICANT_CAPABILITY_AUTHALG_SHARED  },
135         { "leap",       G_SUPPLICANT_CAPABILITY_AUTHALG_LEAP    },
136         { }
137 };
138
139 static struct strvalmap proto_capa_map[] = {
140         { "wpa",        G_SUPPLICANT_CAPABILITY_PROTO_WPA               },
141         { "rsn",        G_SUPPLICANT_CAPABILITY_PROTO_RSN               },
142         { }
143 };
144
145 static struct strvalmap group_map[] = {
146         { "wep40",      G_SUPPLICANT_GROUP_WEP40        },
147         { "wep104",     G_SUPPLICANT_GROUP_WEP104       },
148         { "tkip",       G_SUPPLICANT_GROUP_TKIP },
149         { "ccmp",       G_SUPPLICANT_GROUP_CCMP },
150         { }
151 };
152
153 static struct strvalmap pairwise_map[] = {
154         { "none",       G_SUPPLICANT_PAIRWISE_NONE      },
155         { "tkip",       G_SUPPLICANT_PAIRWISE_TKIP      },
156         { "ccmp",       G_SUPPLICANT_PAIRWISE_CCMP      },
157         { }
158 };
159
160 static struct strvalmap scan_capa_map[] = {
161         { "active",     G_SUPPLICANT_CAPABILITY_SCAN_ACTIVE     },
162         { "passive",    G_SUPPLICANT_CAPABILITY_SCAN_PASSIVE    },
163         { "ssid",       G_SUPPLICANT_CAPABILITY_SCAN_SSID               },
164         { }
165 };
166
167 static struct strvalmap mode_capa_map[] = {
168         { "infrastructure",     G_SUPPLICANT_CAPABILITY_MODE_INFRA      },
169         { "ad-hoc",             G_SUPPLICANT_CAPABILITY_MODE_IBSS       },
170         { "ap",                 G_SUPPLICANT_CAPABILITY_MODE_AP         },
171         { "p2p",                G_SUPPLICANT_CAPABILITY_MODE_P2P        },
172 #if defined TIZEN_EXT_WIFI_MESH
173         { "mesh",               G_SUPPLICANT_CAPABILITY_MODE_MESH       },
174 #endif
175         { }
176 };
177
178 #if defined TIZEN_EXT
179 struct _GSupplicantINSSettings {
180         GSupplicantINSPreferredFreq preferred_freq_bssid;
181         unsigned int preferred_freq_bssid_score;
182         bool last_connected_bssid;
183         unsigned int last_connected_bssid_score;
184         bool assoc_reject;
185         unsigned int assoc_reject_score;
186         bool signal_bssid;
187         int signal_level3_5ghz;
188         int signal_level3_24ghz;
189 };
190
191 static struct _GSupplicantINSSettings ins_settings;
192
193 static unsigned char invalid_bssid[WIFI_BSSID_LEN_MAX] = {
194         0x00, 0x00, 0x00, 0x00, 0x00, 0x00
195 };
196 #endif /* defined TIZEN_EXT */
197
198 static GHashTable *interface_table;
199 static GHashTable *bss_mapping;
200 static GHashTable *peer_mapping;
201 static GHashTable *group_mapping;
202 static GHashTable *pending_peer_connection;
203 static GHashTable *config_file_table;
204
205 struct _GSupplicantWpsCredentials {
206         unsigned char ssid[32];
207         unsigned int ssid_len;
208         char *key;
209 };
210
211 struct added_network_information {
212         char * ssid;
213         GSupplicantSecurity security;
214         char * passphrase;
215         char * private_passphrase;
216 #if defined TIZEN_EXT
217         char *connector;
218         char *c_sign_key;
219         char *net_access_key;
220 #endif
221 };
222
223 #if defined TIZEN_EXT_WIFI_MESH
224 struct _GSupplicantMeshGroupInfo {
225         unsigned char ssid[32];
226         unsigned int ssid_len;
227         int disconnect_reason;
228 };
229 #endif
230
231 struct _GSupplicantInterface {
232         char *path;
233         char *network_path;
234         unsigned int keymgmt_capa;
235         unsigned int authalg_capa;
236         unsigned int proto_capa;
237         unsigned int group_capa;
238         unsigned int pairwise_capa;
239         unsigned int scan_capa;
240         unsigned int mode_capa;
241         unsigned int max_scan_ssids;
242         bool p2p_support;
243         bool p2p_finding;
244         bool ap_create_in_progress;
245         dbus_bool_t ready;
246         GSupplicantState state;
247         dbus_bool_t scanning;
248         GSupplicantInterfaceCallback scan_callback;
249         void *scan_data;
250         int apscan;
251         char *ifname;
252         char *driver;
253         char *bridge;
254         struct _GSupplicantWpsCredentials wps_cred;
255         GSupplicantWpsState wps_state;
256         GHashTable *network_table;
257         GHashTable *peer_table;
258         GHashTable *group_table;
259         GHashTable *bss_mapping;
260         void *data;
261         const char *pending_peer_path;
262         GSupplicantNetwork *current_network;
263         struct added_network_information network_info;
264 #if defined TIZEN_EXT
265         dbus_bool_t is_5_0_Ghz_supported;
266         dbus_bool_t is_6_0_Ghz_supported;
267         int disconnect_reason;
268 #endif
269 #if defined TIZEN_EXT
270         unsigned char add_network_bssid[WIFI_BSSID_LEN_MAX];
271         unsigned char connected_bssid[WIFI_BSSID_LEN_MAX];
272 #endif
273 #if defined TIZEN_EXT_WIFI_MESH
274         bool mesh_support;
275         struct _GSupplicantMeshGroupInfo group_info;
276 #endif
277 };
278
279 struct g_supplicant_bss {
280         GSupplicantInterface *interface;
281         char *path;
282         unsigned char bssid[6];
283         unsigned char ssid[32];
284         unsigned int ssid_len;
285         dbus_uint16_t frequency;
286         dbus_uint32_t maxrate;
287         dbus_int16_t signal;
288         GSupplicantMode mode;
289         GSupplicantSecurity security;
290         dbus_bool_t rsn_selected;
291         unsigned int wpa_keymgmt;
292         unsigned int wpa_pairwise;
293         unsigned int wpa_group;
294         unsigned int rsn_keymgmt;
295         unsigned int rsn_pairwise;
296         unsigned int rsn_group;
297         unsigned int keymgmt;
298         dbus_bool_t privacy;
299         dbus_bool_t psk;
300         dbus_bool_t ieee8021x;
301 #if defined TIZEN_EXT
302         dbus_bool_t ft_psk;
303         dbus_bool_t ft_ieee8021x;
304         GSList *vsie_list;
305         dbus_bool_t hs20;
306         unsigned char country_code[COUNTRY_CODE_LENGTH];
307         GSupplicantPhy_mode phy_mode;
308         dbus_int16_t snr;
309         dbus_uint32_t est_throughput;
310         dbus_bool_t psk_sha256;
311 #endif
312         unsigned int wps_capabilities;
313 #if defined TIZEN_EXT
314         dbus_bool_t sae;
315         dbus_bool_t owe;
316         dbus_bool_t dpp;
317         dbus_bool_t owe_transition_mode;
318         unsigned int transition_mode_ssid_len;
319         unsigned char transition_mode_bssid[6];
320         unsigned char transition_mode_ssid[32];
321         dbus_bool_t pmf_required;
322 #endif
323 };
324
325 struct _GSupplicantNetwork {
326         GSupplicantInterface *interface;
327         char *path;
328         char *group;
329         char *name;
330         unsigned char ssid[32];
331         unsigned int ssid_len;
332         dbus_int16_t signal;
333         dbus_uint16_t frequency;
334         struct g_supplicant_bss *best_bss;
335         GSupplicantMode mode;
336         GSupplicantSecurity security;
337         dbus_bool_t wps;
338         unsigned int wps_capabilities;
339         GHashTable *bss_table;
340         GHashTable *config_table;
341 #if defined TIZEN_EXT
342         bool isHS20AP;
343         char *eap;
344         char *identity;
345         char *phase2;
346         unsigned int keymgmt;
347         GSList *vsie_list;
348         unsigned char country_code[COUNTRY_CODE_LENGTH];
349         GSupplicantPhy_mode phy_mode;
350         dbus_bool_t owe_transition_mode;
351         dbus_bool_t privacy;
352         unsigned int transition_mode_ssid_len;
353         unsigned char transition_mode_bssid[6];
354         unsigned char transition_mode_ssid[32];
355         unsigned char last_connected_bssid[WIFI_BSSID_LEN_MAX];
356         GHashTable *assoc_reject_table;
357 #endif
358 };
359
360 struct _GSupplicantPeer {
361         GSupplicantInterface *interface;
362         char *path;
363         unsigned char device_address[ETH_ALEN];
364         unsigned char iface_address[ETH_ALEN];
365         char *name;
366         unsigned char *widi_ies;
367         int widi_ies_length;
368         char *identifier;
369         unsigned int wps_capabilities;
370         GSList *groups;
371         const GSupplicantInterface *current_group_iface;
372         bool connection_requested;
373 };
374
375 struct _GSupplicantGroup {
376         GSupplicantInterface *interface;
377         GSupplicantInterface *orig_interface;
378         char *path;
379         int role;
380         GSList *members;
381 };
382
383 struct interface_data {
384         GSupplicantInterface *interface;
385         char *path; /* Interface path cannot be taken from interface (above) as
386                      * it might have been freed already.
387                      */
388         GSupplicantInterfaceCallback callback;
389         void *user_data;
390         bool network_remove_in_progress;
391         GSupplicantSSID *ssid;
392 };
393
394 #if defined TIZEN_EXT
395 struct interface_signalpoll_data {
396         GSupplicantInterface *interface;
397         char *path;
398         GSupplicantMaxSpeedCallback callback;
399         void *user_data;
400 };
401 #endif
402
403 struct interface_create_data {
404         char *ifname;
405         char *driver;
406         char *bridge;
407 #if defined TIZEN_EXT
408         unsigned int mac_addr;
409         unsigned int preassoc_mac_addr;
410         unsigned int random_mac_lifetime;
411 #endif /* TIZEN_EXT */
412 #if defined TIZEN_EXT_WIFI_MESH
413         char *parent_ifname;
414         bool is_mesh_interface;
415 #endif
416         GSupplicantInterface *interface;
417         GSupplicantInterfaceCallback callback;
418         void *user_data;
419 };
420
421 struct interface_connect_data {
422         GSupplicantInterface *interface;
423         char *path;
424         GSupplicantInterfaceCallback callback;
425         void *user_data;
426         union {
427                 GSupplicantSSID *ssid;
428                 GSupplicantPeerParams *peer;
429         };
430 };
431
432 struct interface_scan_data {
433         GSupplicantInterface *interface;
434         char *path;
435         GSupplicantInterfaceCallback callback;
436         GSupplicantScanParams *scan_params;
437         void *user_data;
438 };
439
440 #if defined TIZEN_EXT
441 struct update_bssid_data {
442         GSupplicantNetwork *network;
443         unsigned char last_connected_bssid[WIFI_BSSID_LEN_MAX];
444         GHashTable *assoc_reject_table;
445         GSList *bssid_list;
446 };
447
448 struct assoc_reject_data {
449         char *bssid;
450         GSList *reject_time_list;
451 };
452
453 struct assoc_count_data {
454         time_t ref_time;
455         int assoc_count;
456 };
457
458 static unsigned int last_connected_bss_timeout = 0;
459 static bool simplified_log = true;
460 #endif
461
462 static int network_remove(struct interface_data *data);
463
464 #if defined TIZEN_EXT_WIFI_MESH
465 struct _GSupplicantMeshPeer {
466         GSupplicantInterface *interface;
467         char *peer_address;
468         int disconnect_reason;
469 };
470 #endif
471
472 static inline void debug(const char *format, ...)
473 {
474         char str[256];
475         va_list ap;
476
477         if (!callbacks_pointer || !callbacks_pointer->debug)
478                 return;
479
480         va_start(ap, format);
481
482         if (vsnprintf(str, sizeof(str), format, ap) > 0)
483                 callbacks_pointer->debug(str);
484
485         va_end(ap);
486 }
487
488 #define SUPPLICANT_DBG(fmt, arg...) \
489         debug("%s:%s() " fmt, __FILE__, __FUNCTION__ , ## arg);
490
491 static GSupplicantMode string2mode(const char *mode)
492 {
493         if (!mode)
494                 return G_SUPPLICANT_MODE_UNKNOWN;
495
496         if (g_str_equal(mode, "infrastructure"))
497                 return G_SUPPLICANT_MODE_INFRA;
498         else if (g_str_equal(mode, "ad-hoc"))
499                 return G_SUPPLICANT_MODE_IBSS;
500 #if defined TIZEN_EXT_WIFI_MESH
501         else if (g_str_equal(mode, "mesh"))
502                 return G_SUPPLICANT_MODE_MESH;
503 #endif
504
505         return G_SUPPLICANT_MODE_UNKNOWN;
506 }
507
508 static const char *mode2string(GSupplicantMode mode)
509 {
510         switch (mode) {
511         case G_SUPPLICANT_MODE_UNKNOWN:
512                 break;
513         case G_SUPPLICANT_MODE_INFRA:
514                 return "managed";
515         case G_SUPPLICANT_MODE_IBSS:
516                 return "adhoc";
517         case G_SUPPLICANT_MODE_MASTER:
518                 return "ap";
519 #if defined TIZEN_EXT_WIFI_MESH
520         case G_SUPPLICANT_MODE_MESH:
521                 return "mesh";
522 #endif
523         }
524
525         return NULL;
526 }
527
528 static const char *security2string(GSupplicantSecurity security)
529 {
530         switch (security) {
531         case G_SUPPLICANT_SECURITY_UNKNOWN:
532                 break;
533         case G_SUPPLICANT_SECURITY_NONE:
534                 return "none";
535         case G_SUPPLICANT_SECURITY_WEP:
536                 return "wep";
537         case G_SUPPLICANT_SECURITY_PSK:
538                 return "psk";
539         case G_SUPPLICANT_SECURITY_IEEE8021X:
540                 return "ieee8021x";
541 #if defined TIZEN_EXT
542         case G_SUPPLICANT_SECURITY_PSK_SHA256:
543                 return "psk_sha256";
544         case G_SUPPLICANT_SECURITY_FT_PSK:
545                 return "ft_psk";
546         case G_SUPPLICANT_SECURITY_FT_IEEE8021X:
547                 return "ft_ieee8021x";
548         case G_SUPPLICANT_SECURITY_SAE:
549                 return "sae";
550         case G_SUPPLICANT_SECURITY_OWE:
551                 return "owe";
552         case G_SUPPLICANT_SECURITY_DPP:
553                 return "dpp";
554 #endif
555         }
556
557         return NULL;
558 }
559
560 static GSupplicantState string2state(const char *state)
561 {
562         if (!state)
563                 return G_SUPPLICANT_STATE_UNKNOWN;
564
565         if (g_str_equal(state, "unknown"))
566                 return G_SUPPLICANT_STATE_UNKNOWN;
567         else if (g_str_equal(state, "interface_disabled"))
568                 return G_SUPPLICANT_STATE_DISABLED;
569         else if (g_str_equal(state, "disconnected"))
570                 return G_SUPPLICANT_STATE_DISCONNECTED;
571         else if (g_str_equal(state, "inactive"))
572                 return G_SUPPLICANT_STATE_INACTIVE;
573         else if (g_str_equal(state, "scanning"))
574                 return G_SUPPLICANT_STATE_SCANNING;
575         else if (g_str_equal(state, "authenticating"))
576                 return G_SUPPLICANT_STATE_AUTHENTICATING;
577         else if (g_str_equal(state, "associating"))
578                 return G_SUPPLICANT_STATE_ASSOCIATING;
579         else if (g_str_equal(state, "associated"))
580                 return G_SUPPLICANT_STATE_ASSOCIATED;
581         else if (g_str_equal(state, "group_handshake"))
582                 return G_SUPPLICANT_STATE_GROUP_HANDSHAKE;
583         else if (g_str_equal(state, "4way_handshake"))
584                 return G_SUPPLICANT_STATE_4WAY_HANDSHAKE;
585         else if (g_str_equal(state, "completed"))
586                 return G_SUPPLICANT_STATE_COMPLETED;
587
588         return G_SUPPLICANT_STATE_UNKNOWN;
589 }
590
591 static bool compare_network_parameters(GSupplicantInterface *interface,
592                                 GSupplicantSSID *ssid)
593 {
594 #if defined TIZEN_EXT
595         if (!interface->network_info.ssid)
596                 return FALSE;
597 #endif
598
599         if (memcmp(interface->network_info.ssid, ssid->ssid, ssid->ssid_len))
600                 return FALSE;
601
602         if (interface->network_info.security != ssid->security)
603                 return FALSE;
604
605         if (interface->network_info.passphrase &&
606                         g_strcmp0(interface->network_info.passphrase,
607                                 ssid->passphrase) != 0) {
608                 return FALSE;
609         }
610
611         if (interface->network_info.private_passphrase &&
612                         g_strcmp0(interface->network_info.private_passphrase,
613                                 ssid->private_key_passphrase) != 0) {
614                 return FALSE;
615         }
616
617 #if defined TIZEN_EXT
618         if (interface->network_info.connector &&
619                         g_strcmp0(interface->network_info.connector,
620                                 ssid->connector) != 0) {
621                 return FALSE;
622         }
623         if (interface->network_info.c_sign_key &&
624                         g_strcmp0(interface->network_info.c_sign_key,
625                                 ssid->c_sign_key) != 0) {
626                 return FALSE;
627         }
628         if (interface->network_info.net_access_key &&
629                         g_strcmp0(interface->network_info.net_access_key,
630                                 ssid->net_access_key) != 0) {
631                 return FALSE;
632         }
633 #endif
634         return TRUE;
635 }
636
637 static void remove_network_information(GSupplicantInterface * interface)
638 {
639         g_free(interface->network_info.ssid);
640         g_free(interface->network_info.passphrase);
641         g_free(interface->network_info.private_passphrase);
642 #if defined TIZEN_EXT
643         g_free(interface->network_info.connector);
644         g_free(interface->network_info.c_sign_key);
645         g_free(interface->network_info.net_access_key);
646 #endif
647         interface->network_info.ssid = NULL;
648         interface->network_info.passphrase = NULL;
649         interface->network_info.private_passphrase = NULL;
650 #if defined TIZEN_EXT
651         interface->network_info.connector = NULL;
652         interface->network_info.c_sign_key = NULL;
653         interface->network_info.net_access_key = NULL;
654 #endif
655 }
656
657 static int store_network_information(GSupplicantInterface * interface,
658                                 GSupplicantSSID *ssid)
659 {
660         interface->network_info.ssid = g_malloc(ssid->ssid_len + 1);
661         if (interface->network_info.ssid != NULL) {
662                 memcpy(interface->network_info.ssid, ssid->ssid,
663                         ssid->ssid_len);
664                 interface->network_info.ssid[ssid->ssid_len] = '\0';
665         } else {
666                 return -ENOMEM;
667         }
668
669         interface->network_info.security = ssid->security;
670
671         if ((ssid->security == G_SUPPLICANT_SECURITY_WEP ||
672                 ssid->security == G_SUPPLICANT_SECURITY_PSK ||
673 #if defined TIZEN_EXT
674                 ssid->security == G_SUPPLICANT_SECURITY_SAE ||
675                 ssid->security == G_SUPPLICANT_SECURITY_PSK_SHA256 ||
676 #endif
677                 ssid->security == G_SUPPLICANT_SECURITY_NONE) &&
678                 ssid->passphrase) {
679                 interface->network_info.passphrase = g_strdup(ssid->passphrase);
680         }
681
682         if (ssid->security == G_SUPPLICANT_SECURITY_IEEE8021X &&
683                         ssid->private_key_passphrase) {
684                 interface->network_info.private_passphrase =
685                         g_strdup(ssid->private_key_passphrase);
686         }
687
688         return 0;
689 }
690
691 static void callback_system_ready(void)
692 {
693         if (system_ready)
694                 return;
695
696         system_ready = TRUE;
697
698         if (!callbacks_pointer)
699                 return;
700
701         if (!callbacks_pointer->system_ready)
702                 return;
703
704         callbacks_pointer->system_ready();
705 }
706
707 static void callback_system_killed(void)
708 {
709         system_ready = FALSE;
710
711         if (!callbacks_pointer)
712                 return;
713
714         if (!callbacks_pointer->system_killed)
715                 return;
716
717         callbacks_pointer->system_killed();
718 }
719
720 static void callback_interface_added(GSupplicantInterface *interface)
721 {
722         SUPPLICANT_DBG("");
723
724         if (!callbacks_pointer)
725                 return;
726
727         if (!callbacks_pointer->interface_added)
728                 return;
729
730         callbacks_pointer->interface_added(interface);
731 }
732
733 static void callback_interface_state(GSupplicantInterface *interface)
734 {
735         if (!callbacks_pointer)
736                 return;
737
738         if (!callbacks_pointer->interface_state)
739                 return;
740
741         callbacks_pointer->interface_state(interface);
742 }
743
744 static void callback_interface_removed(GSupplicantInterface *interface)
745 {
746         if (!callbacks_pointer)
747                 return;
748
749         if (!callbacks_pointer->interface_removed)
750                 return;
751
752         callbacks_pointer->interface_removed(interface);
753 }
754
755 #if !defined TIZEN_EXT
756 static void callback_p2p_support(GSupplicantInterface *interface)
757 {
758         SUPPLICANT_DBG("");
759
760         if (!interface->p2p_support)
761                 return;
762
763         if (callbacks_pointer && callbacks_pointer->p2p_support)
764                 callbacks_pointer->p2p_support(interface);
765 }
766 #endif
767
768 #if defined TIZEN_EXT_WIFI_MESH
769 static void callback_mesh_support(GSupplicantInterface *interface)
770 {
771         SUPPLICANT_DBG("");
772
773         if (!interface->mesh_support)
774                 return;
775
776         if (callbacks_pointer && callbacks_pointer->mesh_support)
777                 callbacks_pointer->mesh_support(interface);
778 }
779
780 bool g_supplicant_interface_has_mesh(GSupplicantInterface *interface)
781 {
782         if (!interface)
783                 return false;
784
785         return interface->mesh_support;
786 }
787 #endif
788
789 static void callback_scan_started(GSupplicantInterface *interface)
790 {
791         if (!callbacks_pointer)
792                 return;
793
794         if (!callbacks_pointer->scan_started)
795                 return;
796
797         callbacks_pointer->scan_started(interface);
798 }
799
800 static void callback_ap_create_fail(GSupplicantInterface *interface)
801 {
802         if (!callbacks_pointer)
803                 return;
804
805         if (!callbacks_pointer->ap_create_fail)
806                 return;
807
808         callbacks_pointer->ap_create_fail(interface);
809 }
810
811 static void callback_scan_finished(GSupplicantInterface *interface)
812 {
813         if (!callbacks_pointer)
814                 return;
815
816         if (!callbacks_pointer->scan_finished)
817                 return;
818
819         callbacks_pointer->scan_finished(interface);
820 }
821
822 static void callback_network_added(GSupplicantNetwork *network)
823 {
824         if (!callbacks_pointer)
825                 return;
826
827         if (!callbacks_pointer->network_added)
828                 return;
829
830         callbacks_pointer->network_added(network);
831 }
832
833 static void callback_network_removed(GSupplicantNetwork *network)
834 {
835         if (!callbacks_pointer)
836                 return;
837
838         if (!callbacks_pointer->network_removed)
839                 return;
840
841         callbacks_pointer->network_removed(network);
842 }
843
844 #if defined TIZEN_EXT
845 static void callback_network_merged(GSupplicantNetwork *network)
846 {
847         if (!callbacks_pointer)
848                 return;
849
850         if (!callbacks_pointer->network_merged)
851                 return;
852
853         callbacks_pointer->network_merged(network);
854 }
855
856 static void callback_assoc_failed(void *user_data)
857 {
858         if (!callbacks_pointer)
859                 return;
860
861         if (!callbacks_pointer->assoc_failed)
862                 return;
863
864         callbacks_pointer->assoc_failed(user_data);
865 }
866
867 static void callback_scan_done(GSupplicantInterface *interface)
868 {
869         if (!callbacks_pointer)
870                 return;
871
872         if (!callbacks_pointer->scan_done)
873                 return;
874
875         callbacks_pointer->scan_done(interface);
876 }
877 #endif
878
879 static void callback_network_changed(GSupplicantNetwork *network,
880                                         const char *property)
881 {
882         if (!callbacks_pointer)
883                 return;
884
885         if (!callbacks_pointer->network_changed)
886                 return;
887
888         callbacks_pointer->network_changed(network, property);
889 }
890
891 static void callback_network_associated(GSupplicantNetwork *network)
892 {
893         if (!callbacks_pointer)
894                 return;
895
896         if (!callbacks_pointer->network_associated)
897                 return;
898
899         callbacks_pointer->network_associated(network);
900 }
901
902 static void callback_sta_authorized(GSupplicantInterface *interface,
903                                         const char *addr)
904 {
905         if (!callbacks_pointer)
906                 return;
907
908         if (!callbacks_pointer->sta_authorized)
909                 return;
910
911         callbacks_pointer->sta_authorized(interface, addr);
912 }
913
914 static void callback_sta_deauthorized(GSupplicantInterface *interface,
915                                         const char *addr)
916 {
917         if (!callbacks_pointer)
918                 return;
919
920         if (!callbacks_pointer->sta_deauthorized)
921                 return;
922
923         callbacks_pointer->sta_deauthorized(interface, addr);
924 }
925
926 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
927 static void callback_eap(GSupplicantInterface *interface, bool status)
928 {
929         if (!callbacks_pointer)
930                 return;
931
932         if (!callbacks_pointer->eap)
933                 return;
934
935         callbacks_pointer->eap(interface, status);
936 }
937 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
938
939 static void callback_peer_found(GSupplicantPeer *peer)
940 {
941         if (!callbacks_pointer)
942                 return;
943
944         if (!callbacks_pointer->peer_found)
945                 return;
946
947         callbacks_pointer->peer_found(peer);
948 }
949
950 static void callback_peer_lost(GSupplicantPeer *peer)
951 {
952         if (!callbacks_pointer)
953                 return;
954
955         if (!callbacks_pointer->peer_lost)
956                 return;
957
958         callbacks_pointer->peer_lost(peer);
959 }
960
961 static void callback_peer_changed(GSupplicantPeer *peer,
962                                                 GSupplicantPeerState state)
963 {
964         if (!callbacks_pointer)
965                 return;
966
967         if (!callbacks_pointer->peer_changed)
968                 return;
969
970         callbacks_pointer->peer_changed(peer, state);
971 }
972
973 static void callback_peer_request(GSupplicantPeer *peer)
974 {
975         if (!callbacks_pointer)
976                 return;
977
978         if (!callbacks_pointer->peer_request)
979                 return;
980
981         peer->connection_requested = true;
982
983         callbacks_pointer->peer_request(peer);
984 }
985
986 static void callback_disconnect_reason_code(GSupplicantInterface *interface,
987                                         int reason_code)
988 {
989         if (!callbacks_pointer)
990                 return;
991
992         if (!callbacks_pointer->disconnect_reasoncode)
993                 return;
994
995         if (reason_code != 0)
996                 callbacks_pointer->disconnect_reasoncode(interface,
997                                                         reason_code);
998 }
999
1000 static void callback_assoc_status_code(GSupplicantInterface *interface,
1001                                 int status_code)
1002 {
1003         if (!callbacks_pointer)
1004                 return;
1005
1006         if (!callbacks_pointer->assoc_status_code)
1007                 return;
1008
1009         callbacks_pointer->assoc_status_code(interface, status_code);
1010
1011 }
1012
1013 static void remove_group(gpointer data)
1014 {
1015         GSupplicantGroup *group = data;
1016
1017         if (group->members)
1018                 g_slist_free_full(group->members, g_free);
1019
1020         g_free(group->path);
1021         g_free(group);
1022 }
1023
1024 static void remove_interface(gpointer data)
1025 {
1026         GSupplicantInterface *interface = data;
1027
1028         g_hash_table_destroy(interface->bss_mapping);
1029         g_hash_table_destroy(interface->network_table);
1030         g_hash_table_destroy(interface->peer_table);
1031         g_hash_table_destroy(interface->group_table);
1032
1033         if (interface->scan_callback) {
1034                 SUPPLICANT_DBG("call interface %p callback %p scanning %d",
1035                                 interface, interface->scan_callback,
1036                                 interface->scanning);
1037
1038                 interface->scan_callback(-EIO, interface, interface->scan_data);
1039                 interface->scan_callback = NULL;
1040                 interface->scan_data = NULL;
1041
1042                 if (interface->scanning) {
1043                         interface->scanning = FALSE;
1044                         callback_scan_finished(interface);
1045                 }
1046         }
1047
1048         callback_interface_removed(interface);
1049
1050         g_free(interface->wps_cred.key);
1051         g_free(interface->path);
1052         g_free(interface->network_path);
1053 #if defined TIZEN_EXT
1054         interface->network_path = NULL;
1055 #endif
1056         g_free(interface->ifname);
1057         g_free(interface->driver);
1058         g_free(interface->bridge);
1059         remove_network_information(interface);
1060         g_free(interface);
1061 }
1062
1063 static void remove_network(gpointer data)
1064 {
1065         GSupplicantNetwork *network = data;
1066
1067         g_hash_table_destroy(network->bss_table);
1068
1069         callback_network_removed(network);
1070
1071         g_hash_table_destroy(network->config_table);
1072 #if defined TIZEN_EXT
1073         g_hash_table_destroy(network->assoc_reject_table);
1074 #endif
1075
1076         g_free(network->path);
1077         g_free(network->group);
1078         g_free(network->name);
1079 #if defined TIZEN_EXT
1080         g_free(network->eap);
1081         g_free(network->identity);
1082         g_free(network->phase2);
1083 #endif
1084 #if defined TIZEN_EXT
1085         g_slist_free_full(network->vsie_list, g_free);
1086 #endif
1087
1088         g_free(network);
1089 }
1090
1091 static void remove_bss(gpointer data)
1092 {
1093         struct g_supplicant_bss *bss = data;
1094
1095         supplicant_dbus_property_call_cancel_all(bss);
1096
1097         g_free(bss->path);
1098 #if defined TIZEN_EXT
1099         g_slist_free_full(bss->vsie_list, g_free);
1100 #endif
1101         g_free(bss);
1102 }
1103
1104 static void remove_peer(gpointer data)
1105 {
1106         GSupplicantPeer *peer = data;
1107
1108         callback_peer_lost(peer);
1109
1110         if (peer->groups)
1111                 g_slist_free_full(peer->groups, g_free);
1112
1113         if (peer_mapping)
1114                 g_hash_table_remove(peer_mapping, peer->path);
1115
1116         if (pending_peer_connection)
1117                 g_hash_table_remove(pending_peer_connection, peer->path);
1118
1119         g_free(peer->path);
1120         g_free(peer->name);
1121         g_free(peer->identifier);
1122         g_free(peer->widi_ies);
1123
1124         g_free(peer);
1125 }
1126
1127 #if defined TIZEN_EXT
1128 static void remove_assoc_data(gpointer data)
1129 {
1130         struct assoc_reject_data *assoc_data = data;
1131
1132         g_free(assoc_data->bssid);
1133         g_slist_free(assoc_data->reject_time_list);
1134
1135         g_free(assoc_data);
1136 }
1137 #endif
1138
1139 static void debug_strvalmap(const char *label, struct strvalmap *map,
1140                                                         unsigned int val)
1141 {
1142         int i;
1143 #if defined TIZEN_EXT
1144         if (!simplified_log)
1145 #endif
1146         for (i = 0; map[i].str; i++) {
1147                 if (val & map[i].val)
1148                         SUPPLICANT_DBG("%s: %s", label, map[i].str);
1149         }
1150 }
1151
1152 static void interface_capability_keymgmt(DBusMessageIter *iter, void *user_data)
1153 {
1154         GSupplicantInterface *interface = user_data;
1155         const char *str = NULL;
1156         int i;
1157
1158         dbus_message_iter_get_basic(iter, &str);
1159         if (!str)
1160                 return;
1161
1162         for (i = 0; keymgmt_map[i].str; i++)
1163                 if (strcmp(str, keymgmt_map[i].str) == 0) {
1164                         interface->keymgmt_capa |= keymgmt_map[i].val;
1165                         break;
1166                 }
1167 }
1168
1169 static void interface_capability_authalg(DBusMessageIter *iter, void *user_data)
1170 {
1171         GSupplicantInterface *interface = user_data;
1172         const char *str = NULL;
1173         int i;
1174
1175         dbus_message_iter_get_basic(iter, &str);
1176         if (!str)
1177                 return;
1178
1179         for (i = 0; authalg_capa_map[i].str; i++)
1180                 if (strcmp(str, authalg_capa_map[i].str) == 0) {
1181                         interface->authalg_capa |= authalg_capa_map[i].val;
1182                         break;
1183                 }
1184 }
1185
1186 static void interface_capability_proto(DBusMessageIter *iter, void *user_data)
1187 {
1188         GSupplicantInterface *interface = user_data;
1189         const char *str = NULL;
1190         int i;
1191
1192         dbus_message_iter_get_basic(iter, &str);
1193         if (!str)
1194                 return;
1195
1196         for (i = 0; proto_capa_map[i].str; i++)
1197                 if (strcmp(str, proto_capa_map[i].str) == 0) {
1198                         interface->proto_capa |= proto_capa_map[i].val;
1199                         break;
1200                 }
1201 }
1202
1203 static void interface_capability_pairwise(DBusMessageIter *iter,
1204                                                         void *user_data)
1205 {
1206         GSupplicantInterface *interface = user_data;
1207         const char *str = NULL;
1208         int i;
1209
1210         dbus_message_iter_get_basic(iter, &str);
1211         if (!str)
1212                 return;
1213
1214         for (i = 0; pairwise_map[i].str; i++)
1215                 if (strcmp(str, pairwise_map[i].str) == 0) {
1216                         interface->pairwise_capa |= pairwise_map[i].val;
1217                         break;
1218                 }
1219 }
1220
1221 static void interface_capability_group(DBusMessageIter *iter, void *user_data)
1222 {
1223         GSupplicantInterface *interface = user_data;
1224         const char *str = NULL;
1225         int i;
1226
1227         dbus_message_iter_get_basic(iter, &str);
1228         if (!str)
1229                 return;
1230
1231         for (i = 0; group_map[i].str; i++)
1232                 if (strcmp(str, group_map[i].str) == 0) {
1233                         interface->group_capa |= group_map[i].val;
1234                         break;
1235                 }
1236 }
1237
1238 static void interface_capability_scan(DBusMessageIter *iter, void *user_data)
1239 {
1240         GSupplicantInterface *interface = user_data;
1241         const char *str = NULL;
1242         int i;
1243
1244         dbus_message_iter_get_basic(iter, &str);
1245         if (!str)
1246                 return;
1247
1248         for (i = 0; scan_capa_map[i].str; i++)
1249                 if (strcmp(str, scan_capa_map[i].str) == 0) {
1250                         interface->scan_capa |= scan_capa_map[i].val;
1251                         break;
1252                 }
1253 }
1254
1255 static void interface_capability_mode(DBusMessageIter *iter, void *user_data)
1256 {
1257         GSupplicantInterface *interface = user_data;
1258         const char *str = NULL;
1259         int i;
1260
1261         dbus_message_iter_get_basic(iter, &str);
1262         if (!str)
1263                 return;
1264
1265         for (i = 0; mode_capa_map[i].str; i++)
1266                 if (strcmp(str, mode_capa_map[i].str) == 0) {
1267                         interface->mode_capa |= mode_capa_map[i].val;
1268                         break;
1269                 }
1270 }
1271
1272 static void interface_capability(const char *key, DBusMessageIter *iter,
1273                                                         void *user_data)
1274 {
1275         GSupplicantInterface *interface = user_data;
1276
1277         if (!key)
1278                 return;
1279
1280         if (g_strcmp0(key, "KeyMgmt") == 0)
1281                 supplicant_dbus_array_foreach(iter,
1282                                 interface_capability_keymgmt, interface);
1283         else if (g_strcmp0(key, "AuthAlg") == 0)
1284                 supplicant_dbus_array_foreach(iter,
1285                                 interface_capability_authalg, interface);
1286         else if (g_strcmp0(key, "Protocol") == 0)
1287                 supplicant_dbus_array_foreach(iter,
1288                                 interface_capability_proto, interface);
1289         else if (g_strcmp0(key, "Pairwise") == 0)
1290                 supplicant_dbus_array_foreach(iter,
1291                                 interface_capability_pairwise, interface);
1292         else if (g_strcmp0(key, "Group") == 0)
1293                 supplicant_dbus_array_foreach(iter,
1294                                 interface_capability_group, interface);
1295         else if (g_strcmp0(key, "Scan") == 0)
1296                 supplicant_dbus_array_foreach(iter,
1297                                 interface_capability_scan, interface);
1298         else if (g_strcmp0(key, "Modes") == 0)
1299                 supplicant_dbus_array_foreach(iter,
1300                                 interface_capability_mode, interface);
1301         else if (g_strcmp0(key, "MaxScanSSID") == 0) {
1302                 dbus_int32_t max_scan_ssid;
1303
1304                 dbus_message_iter_get_basic(iter, &max_scan_ssid);
1305                 if (max_scan_ssid < 2)
1306                         max_scan_ssid = 0;
1307                 interface->max_scan_ssids = max_scan_ssid;
1308 #if defined TIZEN_EXT
1309         } else if (g_strcmp0(key, "Is5GhzSupported") == 0) {
1310                 dbus_bool_t is_5_0_Ghz_supported;
1311
1312                 dbus_message_iter_get_basic(iter, &is_5_0_Ghz_supported);
1313                 interface->is_5_0_Ghz_supported = is_5_0_Ghz_supported;
1314         } else if (g_strcmp0(key, "Is6GhzSupported") == 0) {
1315                 dbus_bool_t is_6_0_Ghz_supported;
1316
1317                 dbus_message_iter_get_basic(iter, &is_6_0_Ghz_supported);
1318                 interface->is_6_0_Ghz_supported = is_6_0_Ghz_supported;
1319 #endif
1320         } else
1321                 SUPPLICANT_DBG("key %s type %c",
1322                                 key, dbus_message_iter_get_arg_type(iter));
1323 }
1324
1325 static void set_bss_expiration_age(DBusMessageIter *iter, void *user_data)
1326 {
1327         unsigned int bss_expiration_age = GPOINTER_TO_UINT(user_data);
1328
1329         dbus_message_iter_append_basic(iter, DBUS_TYPE_UINT32,
1330                                 &bss_expiration_age);
1331 }
1332
1333 int g_supplicant_interface_set_bss_expiration_age(GSupplicantInterface *interface,
1334                                         unsigned int bss_expiration_age)
1335 {
1336        return supplicant_dbus_property_set(interface->path,
1337                                        SUPPLICANT_INTERFACE ".Interface",
1338                                        "BSSExpireAge", DBUS_TYPE_UINT32_AS_STRING,
1339                                        set_bss_expiration_age, NULL,
1340                                        GUINT_TO_POINTER(bss_expiration_age), NULL);
1341 }
1342
1343 struct set_apscan_data
1344 {
1345         unsigned int ap_scan;
1346         GSupplicantInterface *interface;
1347 };
1348
1349 static void set_apscan(DBusMessageIter *iter, void *user_data)
1350 {
1351         struct set_apscan_data *data = user_data;
1352         unsigned int ap_scan = data->ap_scan;
1353
1354         dbus_message_iter_append_basic(iter, DBUS_TYPE_UINT32, &ap_scan);
1355 }
1356
1357 static void set_apscan_complete(const char *error,
1358                 DBusMessageIter *iter, void *user_data)
1359 {
1360         struct set_apscan_data *data = user_data;
1361         GSupplicantInterface *interface = data->interface;
1362
1363         if (error) {
1364                 interface->ap_create_in_progress = false;
1365                 SUPPLICANT_DBG("Set AP scan error %s", error);
1366                 goto error;
1367         }
1368
1369         interface->ap_create_in_progress = true;
1370 error:
1371         dbus_free(data);
1372 }
1373
1374 int g_supplicant_interface_set_apscan(GSupplicantInterface *interface,
1375                                                         unsigned int ap_scan)
1376 {
1377         struct set_apscan_data *data;
1378         int ret;
1379
1380         data = dbus_malloc0(sizeof(*data));
1381
1382         if (!data)
1383                 return -ENOMEM;
1384
1385         data->ap_scan = ap_scan;
1386         data->interface = interface;
1387
1388         ret = supplicant_dbus_property_set(interface->path,
1389                         SUPPLICANT_INTERFACE ".Interface",
1390                         "ApScan", DBUS_TYPE_UINT32_AS_STRING,
1391                         set_apscan, set_apscan_complete, data, NULL);
1392         if (ret < 0)
1393                 dbus_free(data);
1394
1395         return ret;
1396 }
1397
1398 void g_supplicant_interface_set_data(GSupplicantInterface *interface,
1399                                                                 void *data)
1400 {
1401         if (!interface)
1402                 return;
1403
1404         interface->data = data;
1405
1406         if (!data)
1407                 interface->scan_callback = NULL;
1408 }
1409
1410 void *g_supplicant_interface_get_data(GSupplicantInterface *interface)
1411 {
1412         if (!interface)
1413                 return NULL;
1414
1415         return interface->data;
1416 }
1417
1418 const char *g_supplicant_interface_get_ifname(GSupplicantInterface *interface)
1419 {
1420         if (!interface)
1421                 return NULL;
1422
1423         return interface->ifname;
1424 }
1425
1426 #if defined TIZEN_EXT
1427 bool g_supplicant_interface_get_is_5_0_ghz_supported(GSupplicantInterface *interface)
1428 {
1429         if (!interface)
1430                 return false;
1431
1432         return interface->is_5_0_Ghz_supported;
1433 }
1434
1435 bool g_supplicant_interface_get_is_6_0_ghz_supported(GSupplicantInterface *interface)
1436 {
1437         if (!interface)
1438                 return false;
1439
1440         return interface->is_6_0_Ghz_supported;
1441 }
1442
1443 unsigned char *g_supplicant_interface_get_add_network_bssid(GSupplicantInterface *interface)
1444 {
1445         if (!interface)
1446                 return NULL;
1447
1448         return (unsigned char *)interface->add_network_bssid;
1449 }
1450 #endif
1451
1452 const char *g_supplicant_interface_get_driver(GSupplicantInterface *interface)
1453 {
1454         if (!interface)
1455                 return NULL;
1456
1457         return interface->driver;
1458 }
1459
1460 GSupplicantState g_supplicant_interface_get_state(
1461                                         GSupplicantInterface *interface)
1462 {
1463         if (!interface)
1464                 return G_SUPPLICANT_STATE_UNKNOWN;
1465
1466         return interface->state;
1467 }
1468
1469 const char *g_supplicant_interface_get_wps_key(GSupplicantInterface *interface)
1470 {
1471         if (!interface)
1472                 return NULL;
1473
1474         return (const char *)interface->wps_cred.key;
1475 }
1476
1477 const void *g_supplicant_interface_get_wps_ssid(GSupplicantInterface *interface,
1478                                                         unsigned int *ssid_len)
1479 {
1480         if (!ssid_len)
1481                 return NULL;
1482
1483         if (!interface || interface->wps_cred.ssid_len == 0) {
1484                 *ssid_len = 0;
1485                 return NULL;
1486         }
1487
1488         *ssid_len = interface->wps_cred.ssid_len;
1489         return interface->wps_cred.ssid;
1490 }
1491
1492 GSupplicantWpsState g_supplicant_interface_get_wps_state(
1493                                         GSupplicantInterface *interface)
1494 {
1495         if (!interface)
1496                 return G_SUPPLICANT_WPS_STATE_UNKNOWN;
1497
1498         return interface->wps_state;
1499 }
1500
1501 unsigned int g_supplicant_interface_get_mode(GSupplicantInterface *interface)
1502 {
1503         if (!interface)
1504                 return 0;
1505
1506         return interface->mode_capa;
1507 }
1508
1509 unsigned int g_supplicant_interface_get_max_scan_ssids(
1510                                 GSupplicantInterface *interface)
1511 {
1512         if (!interface)
1513                 return 0;
1514
1515         if (interface->max_scan_ssids == 0)
1516                 return WPAS_MAX_SCAN_SSIDS;
1517
1518         return interface->max_scan_ssids;
1519 }
1520
1521 static void set_network_enabled(DBusMessageIter *iter, void *user_data)
1522 {
1523         dbus_bool_t enable = *(dbus_bool_t *)user_data;
1524
1525         dbus_message_iter_append_basic(iter, DBUS_TYPE_BOOLEAN, &enable);
1526 }
1527
1528 int g_supplicant_interface_enable_selected_network(GSupplicantInterface *interface,
1529                                                         dbus_bool_t enable)
1530 {
1531         if (!interface)
1532                 return -1;
1533
1534         if (!interface->network_path)
1535                 return -1;
1536
1537         SUPPLICANT_DBG(" ");
1538         return supplicant_dbus_property_set(interface->network_path,
1539                                 SUPPLICANT_INTERFACE ".Network",
1540                                 "Enabled", DBUS_TYPE_BOOLEAN_AS_STRING,
1541                                 set_network_enabled, NULL, &enable, NULL);
1542 }
1543
1544 dbus_bool_t g_supplicant_interface_get_ready(GSupplicantInterface *interface)
1545 {
1546         if (!interface)
1547                 return FALSE;
1548
1549         return interface->ready;
1550 }
1551
1552 GSupplicantInterface *g_supplicant_network_get_interface(
1553                                         GSupplicantNetwork *network)
1554 {
1555         if (!network)
1556                 return NULL;
1557
1558         return network->interface;
1559 }
1560
1561 const char *g_supplicant_network_get_name(GSupplicantNetwork *network)
1562 {
1563         if (!network || !network->name)
1564                 return "";
1565
1566         return network->name;
1567 }
1568
1569 const char *g_supplicant_network_get_identifier(GSupplicantNetwork *network)
1570 {
1571         if (!network || !network->group)
1572                 return "";
1573
1574         return network->group;
1575 }
1576
1577 const char *g_supplicant_network_get_path(GSupplicantNetwork *network)
1578 {
1579         if (!network || !network->path)
1580                 return NULL;
1581
1582         return network->path;
1583 }
1584
1585 const char *g_supplicant_network_get_mode(GSupplicantNetwork *network)
1586 {
1587         if (!network)
1588                 return NULL;
1589
1590         return mode2string(network->mode);
1591 }
1592
1593 const char *g_supplicant_network_get_security(GSupplicantNetwork *network)
1594 {
1595         if (!network)
1596                 return NULL;
1597
1598         return security2string(network->security);
1599 }
1600
1601 const void *g_supplicant_network_get_ssid(GSupplicantNetwork *network,
1602                                                 unsigned int *ssid_len)
1603 {
1604         if (!network) {
1605                 *ssid_len = 0;
1606                 return NULL;
1607         }
1608
1609         *ssid_len = network->ssid_len;
1610         return network->ssid;
1611 }
1612
1613 dbus_int16_t g_supplicant_network_get_signal(GSupplicantNetwork *network)
1614 {
1615         if (!network)
1616                 return 0;
1617
1618         return network->signal;
1619 }
1620
1621 #if defined TIZEN_EXT
1622 void g_supplicant_network_set_signal(GSupplicantNetwork *network, int signal)
1623 {
1624         if (!network)
1625                 return;
1626
1627         network->signal = (dbus_int16_t)signal;
1628 }
1629
1630 void g_supplicant_network_set_bss_signal(GSupplicantNetwork *network,
1631                 int signal, int snr)
1632 {
1633         struct g_supplicant_bss *best_bss;
1634
1635         if (!network)
1636                 return;
1637
1638         best_bss = network->best_bss;
1639         if (!best_bss)
1640                 return;
1641
1642         best_bss->signal = (dbus_int16_t)signal;
1643         best_bss->snr = (dbus_int16_t)snr;
1644 }
1645 #endif
1646
1647 dbus_uint16_t g_supplicant_network_get_frequency(GSupplicantNetwork *network)
1648 {
1649         if (!network)
1650                 return 0;
1651
1652         return network->frequency;
1653 }
1654
1655 dbus_bool_t g_supplicant_network_get_wps(GSupplicantNetwork *network)
1656 {
1657         if (!network)
1658                 return FALSE;
1659
1660         return network->wps;
1661 }
1662
1663 dbus_bool_t g_supplicant_network_is_wps_active(GSupplicantNetwork *network)
1664 {
1665         if (!network)
1666                 return FALSE;
1667
1668         if (network->wps_capabilities & G_SUPPLICANT_WPS_CONFIGURED)
1669                 return TRUE;
1670
1671         return FALSE;
1672 }
1673
1674 dbus_bool_t g_supplicant_network_is_wps_pbc(GSupplicantNetwork *network)
1675 {
1676         if (!network)
1677                 return FALSE;
1678
1679         if (network->wps_capabilities & G_SUPPLICANT_WPS_PBC)
1680                 return TRUE;
1681
1682         return FALSE;
1683 }
1684
1685 dbus_bool_t g_supplicant_network_is_wps_advertizing(GSupplicantNetwork *network)
1686 {
1687         if (!network)
1688                 return FALSE;
1689
1690         if (network->wps_capabilities & G_SUPPLICANT_WPS_REGISTRAR)
1691                 return TRUE;
1692
1693         return FALSE;
1694 }
1695
1696 #ifdef TIZEN_EXT
1697 GSupplicantPhy_mode g_supplicant_network_get_phy_mode(GSupplicantNetwork *network)
1698 {
1699         if (!network)
1700                 return G_SUPPLICANT_MODE_IEEE80211_UNKNOWN;
1701
1702         return network->phy_mode;
1703 }
1704 #endif
1705
1706 GSupplicantInterface *g_supplicant_peer_get_interface(GSupplicantPeer *peer)
1707 {
1708         if (!peer)
1709                 return NULL;
1710
1711         return peer->interface;
1712 }
1713
1714 const char *g_supplicant_peer_get_path(GSupplicantPeer *peer)
1715 {
1716         if (!peer)
1717                 return NULL;
1718
1719         return peer->path;
1720 }
1721
1722 const char *g_supplicant_peer_get_identifier(GSupplicantPeer *peer)
1723 {
1724         if (!peer)
1725                 return NULL;
1726
1727         return peer->identifier;
1728 }
1729
1730 const void *g_supplicant_peer_get_device_address(GSupplicantPeer *peer)
1731 {
1732         if (!peer)
1733                 return NULL;
1734
1735         return peer->device_address;
1736 }
1737
1738 const void *g_supplicant_peer_get_iface_address(GSupplicantPeer *peer)
1739 {
1740         if (!peer)
1741                 return NULL;
1742
1743         return peer->iface_address;
1744 }
1745
1746 const char *g_supplicant_peer_get_name(GSupplicantPeer *peer)
1747 {
1748         if (!peer)
1749                 return NULL;
1750
1751         return peer->name;
1752 }
1753
1754 #if defined TIZEN_EXT
1755 bool g_supplicant_network_is_hs20AP(GSupplicantNetwork *network)
1756 {
1757         if (!network)
1758                 return 0;
1759
1760         return network->isHS20AP;
1761 }
1762
1763 const char *g_supplicant_network_get_eap(GSupplicantNetwork *network)
1764 {
1765         if (!network || !network->eap)
1766                 return NULL;
1767
1768         return network->eap;
1769 }
1770
1771 const char *g_supplicant_network_get_identity(GSupplicantNetwork *network)
1772 {
1773         if (!network || !network->identity)
1774                 return NULL;
1775
1776         return network->identity;
1777 }
1778
1779 const char *g_supplicant_network_get_phase2(GSupplicantNetwork *network)
1780 {
1781         if (!network || !network->phase2)
1782                 return NULL;
1783
1784         return network->phase2;
1785 }
1786
1787 unsigned int g_supplicant_network_get_keymgmt(GSupplicantNetwork *network)
1788 {
1789         if (!network)
1790                 return 0;
1791
1792         return network->keymgmt;
1793 }
1794
1795 dbus_bool_t g_supplicant_network_get_privacy(GSupplicantNetwork *network)
1796 {
1797         if (!network)
1798                 return FALSE;
1799
1800         return network->privacy;
1801 }
1802
1803 const unsigned char *g_supplicant_network_get_countrycode(GSupplicantNetwork
1804                                                           *network)
1805 {
1806         if (!network)
1807                 return NULL;
1808
1809         return network->country_code;
1810 }
1811
1812 dbus_bool_t g_supplicant_network_is_pmf_required(GSupplicantNetwork *network)
1813 {
1814         if (!network || !network->best_bss)
1815                 return FALSE;
1816
1817         return network->best_bss->pmf_required;
1818 }
1819 #endif
1820
1821 const unsigned char *g_supplicant_peer_get_widi_ies(GSupplicantPeer *peer,
1822                                                                 int *length)
1823 {
1824         if (!peer || !length)
1825                 return NULL;
1826
1827         *length = peer->widi_ies_length;
1828         return peer->widi_ies;
1829 }
1830
1831 bool g_supplicant_peer_is_wps_pbc(GSupplicantPeer *peer)
1832 {
1833         if (!peer)
1834                 return false;
1835
1836         if (peer->wps_capabilities & G_SUPPLICANT_WPS_PBC)
1837                 return true;
1838
1839         return false;
1840 }
1841
1842 bool g_supplicant_peer_is_wps_pin(GSupplicantPeer *peer)
1843 {
1844         if (!peer)
1845                 return false;
1846
1847         if (peer->wps_capabilities & G_SUPPLICANT_WPS_PIN)
1848                 return true;
1849
1850         return false;
1851 }
1852
1853 bool g_supplicant_peer_is_in_a_group(GSupplicantPeer *peer)
1854 {
1855         if (!peer || !peer->groups)
1856                 return false;
1857
1858         return true;
1859 }
1860
1861 GSupplicantInterface *g_supplicant_peer_get_group_interface(GSupplicantPeer *peer)
1862 {
1863         if (!peer)
1864                 return NULL;
1865
1866         return (GSupplicantInterface *) peer->current_group_iface;
1867 }
1868
1869 bool g_supplicant_peer_is_client(GSupplicantPeer *peer)
1870 {
1871         GSupplicantGroup *group;
1872         GSList *list;
1873
1874         if (!peer)
1875                 return false;
1876
1877         for (list = peer->groups; list; list = list->next) {
1878                 const char *path = list->data;
1879
1880                 group = g_hash_table_lookup(group_mapping, path);
1881                 if (!group)
1882                         continue;
1883
1884                 if (group->role != G_SUPPLICANT_GROUP_ROLE_CLIENT ||
1885                                 group->orig_interface != peer->interface)
1886                         continue;
1887
1888                 if (group->interface == peer->current_group_iface)
1889                         return true;
1890         }
1891
1892         return false;
1893 }
1894
1895 bool g_supplicant_peer_has_requested_connection(GSupplicantPeer *peer)
1896 {
1897         if (!peer)
1898                 return false;
1899
1900         return peer->connection_requested;
1901 }
1902
1903 #if defined TIZEN_EXT
1904 /*
1905  * Description: Network client requires additional wifi specific info
1906  */
1907 const unsigned char *g_supplicant_network_get_bssid(GSupplicantNetwork *network)
1908 {
1909         if (network == NULL || network->best_bss == NULL)
1910                 return NULL;
1911
1912         return (const unsigned char *)network->best_bss->bssid;
1913 }
1914
1915 dbus_bool_t g_supplicant_network_get_transition_mode(GSupplicantNetwork *network)
1916 {
1917         if (network == NULL)
1918                 return FALSE;
1919
1920         return network->owe_transition_mode;
1921 }
1922
1923 const unsigned char *g_supplicant_network_get_transition_mode_bssid(GSupplicantNetwork *network)
1924 {
1925         if (network == NULL)
1926                 return NULL;
1927
1928         return (const unsigned char *)network->transition_mode_bssid;
1929 }
1930
1931 const void *g_supplicant_network_get_transition_mode_ssid(GSupplicantNetwork *network,
1932                                                 unsigned int *transition_mode_ssid_len)
1933 {
1934         if (!network) {
1935                 *transition_mode_ssid_len = 0;
1936                 return NULL;
1937         }
1938
1939         *transition_mode_ssid_len = network->transition_mode_ssid_len;
1940         return network->transition_mode_ssid;
1941 }
1942
1943 unsigned int g_supplicant_network_get_maxrate(GSupplicantNetwork *network)
1944 {
1945         if (network == NULL || network->best_bss == NULL)
1946                 return 0;
1947
1948         return network->best_bss->maxrate;
1949 }
1950
1951 const char *g_supplicant_network_get_enc_mode(GSupplicantNetwork *network)
1952 {
1953         if (network == NULL || network->best_bss == NULL)
1954                 return NULL;
1955
1956         if (network->best_bss->security == G_SUPPLICANT_SECURITY_PSK ||
1957                         network->best_bss->security == G_SUPPLICANT_SECURITY_SAE ||
1958                         network->best_bss->security == G_SUPPLICANT_SECURITY_OWE ||
1959                         network->best_bss->security == G_SUPPLICANT_SECURITY_DPP ||
1960                         network->best_bss->security == G_SUPPLICANT_SECURITY_PSK_SHA256 ||
1961                         network->best_bss->security == G_SUPPLICANT_SECURITY_IEEE8021X) {
1962                 unsigned int pairwise;
1963
1964                 pairwise = network->best_bss->rsn_pairwise |
1965                                 network->best_bss->wpa_pairwise;
1966
1967                 if ((pairwise & G_SUPPLICANT_PAIRWISE_CCMP) &&
1968                     (pairwise & G_SUPPLICANT_PAIRWISE_TKIP))
1969                         return "mixed";
1970                 else if (pairwise & G_SUPPLICANT_PAIRWISE_CCMP)
1971                         return "aes";
1972                 else if (pairwise & G_SUPPLICANT_PAIRWISE_TKIP)
1973                         return "tkip";
1974
1975         } else if (network->best_bss->security == G_SUPPLICANT_SECURITY_WEP)
1976                 return "wep";
1977         else if (network->best_bss->security == G_SUPPLICANT_SECURITY_NONE)
1978                 return "none";
1979
1980         return NULL;
1981 }
1982
1983 bool g_supplicant_network_get_rsn_mode(GSupplicantNetwork *network)
1984 {
1985         if (network == NULL || network->best_bss == NULL)
1986                 return 0;
1987
1988         if (network->best_bss->security == G_SUPPLICANT_SECURITY_OWE ||
1989                         network->best_bss->security == G_SUPPLICANT_SECURITY_DPP)
1990                 return false;
1991
1992         if (network->best_bss->rsn_selected) {
1993                 const char *mode = g_supplicant_network_get_enc_mode(network);
1994                 if (g_strcmp0(mode, "aes") == 0 ||
1995                                 g_strcmp0(mode, "mixed") == 0)
1996                         return true;
1997                 else
1998                         return false;
1999         } else
2000                 return false;
2001 }
2002
2003 void *g_supplicant_network_get_wifi_vsie(GSupplicantNetwork *network)
2004 {
2005         GSList *vsie_list = NULL;
2006
2007         if (!network)
2008                 return NULL;
2009
2010         if (g_slist_length(network->vsie_list) > 0) {
2011                 GSList *list = NULL;
2012                 unsigned char *vsie = NULL;
2013                 for (list = network->vsie_list; list; list = list->next) {
2014                         unsigned char *ie = (unsigned char *)list->data;
2015                         if (ie == NULL)
2016                                 continue;
2017                         vsie = (unsigned char *)g_try_malloc0(ie[1]+2); // tag number size(1), tag length size(1)
2018
2019                         if (vsie) {
2020                                 memcpy(vsie, ie, ie[1]+2);
2021                                 vsie_list = g_slist_append(vsie_list, vsie);
2022                         } else
2023                                 SUPPLICANT_DBG("Failed to allocate memory");
2024                 }
2025         }
2026
2027         return vsie_list;
2028 }
2029
2030 static bool compare_bssid(unsigned char *bssid_a, unsigned char *bssid_b)
2031 {
2032         if (!memcmp(bssid_a, bssid_b, WIFI_BSSID_LEN_MAX))
2033                 return true;
2034
2035         return false;
2036 }
2037
2038 static gchar *convert_bssid_to_str(unsigned char *bssid)
2039 {
2040         GString *bssid_str;
2041         unsigned int i;
2042
2043         bssid_str = g_string_sized_new(18);
2044         if (!bssid_str)
2045                 return NULL;
2046
2047         for (i = 0; i < WIFI_BSSID_LEN_MAX; i++) {
2048                 g_string_append_printf(bssid_str, "%02x", bssid[i]);
2049                 if (i < WIFI_BSSID_LEN_MAX - 1)
2050                         g_string_append(bssid_str, ":");
2051         }
2052
2053         return g_string_free(bssid_str, FALSE);
2054 }
2055
2056 static void count_assoc_reject(gpointer data, gpointer user_data)
2057 {
2058         time_t assoc_reject_time = GPOINTER_TO_INT(data);
2059         struct assoc_count_data *assoc_count = user_data;
2060
2061         if (assoc_reject_time > assoc_count->ref_time)
2062                 assoc_count->assoc_count++;
2063 }
2064
2065 static uint16_t get_assoc_reject_cnt(GHashTable *assoc_reject_table, unsigned char *bssid)
2066 {
2067         gchar *bssid_str;
2068         struct assoc_reject_data *assoc_data;
2069         struct assoc_count_data assoc_count;
2070         time_t curr_time;
2071         struct tm* timeinfo;
2072
2073         if (g_hash_table_size(assoc_reject_table) < 1)
2074                 return 0;
2075
2076         if (!bssid)
2077                 return 0;
2078
2079         if (!memcmp(bssid, invalid_bssid, WIFI_BSSID_LEN_MAX))
2080                 return 0;
2081
2082         bssid_str = convert_bssid_to_str(bssid);
2083         if (!bssid_str)
2084                 return 0;
2085
2086         assoc_data = g_hash_table_lookup(assoc_reject_table, bssid_str);
2087         if (!assoc_data) {
2088                 g_free(bssid_str);
2089                 return 0;
2090         }
2091
2092         if (g_slist_length(assoc_data->reject_time_list) < 1) {
2093                 g_free(bssid_str);
2094                 return 0;
2095         }
2096
2097         /* Only events that occur within one hour are appened. */
2098         curr_time = time(NULL);
2099         timeinfo = localtime(&curr_time);
2100         timeinfo->tm_hour -= 1;
2101
2102         assoc_count.ref_time = mktime(timeinfo);
2103         assoc_count.assoc_count = 0;
2104
2105         g_slist_foreach(assoc_data->reject_time_list, count_assoc_reject, &assoc_count);
2106
2107         g_free(bssid_str);
2108         return assoc_count.assoc_count;
2109 }
2110
2111 static int calculate_score_last_connected_bssid(bool is_last_connected)
2112 {
2113         int score = 0;
2114
2115         if (ins_settings.last_connected_bssid) {
2116                 if (is_last_connected)
2117                         score += ins_settings.last_connected_bssid_score;
2118         }
2119
2120         return score;
2121 }
2122
2123 static int calculate_score_assoc_reject(uint16_t assoc_reject_cnt)
2124 {
2125         int score = 0;
2126
2127         if (ins_settings.assoc_reject)
2128                 score -= (assoc_reject_cnt * ins_settings.assoc_reject_score);
2129
2130         return score;
2131 }
2132
2133 static int calculate_score_frequency(dbus_int16_t strength, dbus_uint16_t frequency)
2134 {
2135         int score = 0;
2136
2137         switch (ins_settings.preferred_freq_bssid) {
2138         case G_SUPPLICANT_INS_PREFERRED_FREQ_24GHZ:
2139                 if ((frequency >= FREQ_RANGE_24GHZ_CHANNEL_1 &&
2140                         frequency <= FREQ_RANGE_24GHZ_CHANNEL_14) &&
2141                         (strength > ins_settings.signal_level3_24ghz))
2142                         score += ins_settings.preferred_freq_bssid_score;
2143
2144                 break;
2145         case G_SUPPLICANT_INS_PREFERRED_FREQ_5GHZ:
2146                 if ((frequency >= FREQ_RANGE_5GHZ_CHANNEL_32 &&
2147                         frequency <= FREQ_RANGE_5GHZ_CHANNEL_165) &&
2148                         (strength > ins_settings.signal_level3_5ghz))
2149                         score += ins_settings.preferred_freq_bssid_score;
2150
2151                 break;
2152         default:
2153                 break;
2154         }
2155
2156         return score;
2157 }
2158
2159 static int calculate_score_strength(dbus_int16_t strength)
2160 {
2161         int score = 0;
2162
2163         if (ins_settings.signal_bssid)
2164                 score += (((strength > -60) ? -60 : strength) + 85);
2165
2166         return score;
2167 }
2168
2169 static int calculate_score_est_throughput(dbus_uint32_t est_throughput)
2170 {
2171         int score = 0;
2172
2173         if (est_throughput >= 10000)
2174                 score = est_throughput / 10000;
2175
2176         if (score > 40)
2177                 score = 40;
2178
2179         return score;
2180 }
2181
2182 static int calculate_score(bool is_last_connected, uint16_t assoc_reject_cnt,
2183                 dbus_uint16_t frequency, dbus_int16_t strength,
2184                 dbus_int16_t snr, dbus_uint32_t est_throughput)
2185 {
2186         int score = 0;
2187
2188         score += calculate_score_last_connected_bssid(is_last_connected);
2189         score += calculate_score_assoc_reject(assoc_reject_cnt);
2190         score += calculate_score_frequency(strength, frequency);
2191         score += calculate_score_strength(strength);
2192         score += (int)snr;
2193         score += calculate_score_est_throughput(est_throughput);
2194
2195         return score;
2196 }
2197
2198 static void update_bssid_list(gpointer key, gpointer value, gpointer user_data)
2199 {
2200         struct g_supplicant_bss *bss = value;
2201         struct g_connman_bssids *bssids = NULL;
2202         struct update_bssid_data *bssid_data = (struct update_bssid_data *)user_data;
2203
2204         bssids = (struct g_connman_bssids *)g_try_malloc0(sizeof(struct g_connman_bssids));
2205
2206         if (bssids) {
2207                 memcpy(bssids->bssid, bss->bssid, WIFI_BSSID_LEN_MAX);
2208
2209                 bssids->strength = bss->signal;
2210                 bssids->strength += 120;
2211
2212                 if (bssids->strength > 100)
2213                         bssids->strength = 100;
2214
2215                 bssids->frequency = bss->frequency;
2216                 bssids->est_throughput = bss->est_throughput;
2217                 bssids->score_snr = (int)bss->snr;
2218
2219                 if (TIZEN_INS_ENABLED) {
2220                         bssids->assoc_reject_cnt = get_assoc_reject_cnt(bssid_data->assoc_reject_table, bssids->bssid);
2221                         bssids->is_last_connected = compare_bssid(bssids->bssid, bssid_data->last_connected_bssid);
2222
2223                         bssids->score_last_connected_bssid = calculate_score_last_connected_bssid(bssids->is_last_connected);
2224                         bssids->score_assoc_reject = calculate_score_assoc_reject(bssids->assoc_reject_cnt);
2225                         bssids->score_frequency = calculate_score_frequency(bss->signal, bssids->frequency);
2226                         bssids->score_strength = calculate_score_strength(bss->signal);
2227                         bssids->score_est_throughput = calculate_score_est_throughput(bss->est_throughput);
2228
2229                         bssids->ins_score = calculate_score(bssids->is_last_connected,
2230                                         bssids->assoc_reject_cnt, bssids->frequency, bss->signal,
2231                                         bss->snr, bss->est_throughput);
2232                 } else {
2233                         bssids->ins_score = bss->signal;
2234                 }
2235
2236                 bssid_data->bssid_list = g_slist_append(bssid_data->bssid_list, bssids);
2237         } else
2238                 SUPPLICANT_DBG("Failed to allocate memory");
2239 }
2240
2241 static gint cmp_bss(gconstpointer a, gconstpointer b)
2242 {
2243         struct g_connman_bssids *entry_a = (struct g_connman_bssids *)a;
2244         struct g_connman_bssids *entry_b = (struct g_connman_bssids *)b;
2245
2246         if (entry_a->ins_score > entry_b->ins_score)
2247                 return -1;
2248
2249         if (entry_a->ins_score < entry_b->ins_score)
2250                 return 1;
2251
2252         if (entry_a->ins_score == entry_b->ins_score) {
2253                 if (entry_a->strength >= entry_b->strength)
2254                         return -1;
2255                 else
2256                         return 1;
2257         }
2258
2259         return 0;
2260 }
2261
2262 static void print_bssid_sort(gpointer data, gpointer user_data)
2263 {
2264         struct g_connman_bssids *bssids = data;
2265
2266         GSupplicantNetwork *network = (GSupplicantNetwork *) user_data;
2267
2268         if (!bssids || !network)
2269                 return;
2270
2271         SUPPLICANT_DBG("ssid [%-20s] bssid[" MACSTR "] total[%2d] freq[%2d] "
2272                         "last_conn[%2d] assoc_reject[%2d] strength[%2d] rssi[%2d]",
2273                         network->ssid, MAC2STR(bssids->bssid), bssids->ins_score,
2274                         bssids->score_frequency, bssids->score_last_connected_bssid,
2275                         bssids->score_assoc_reject, bssids->score_strength, bssids->strength - 120);
2276 }
2277
2278 void *g_supplicant_network_get_bssid_list(GSupplicantNetwork *network)
2279 {
2280         struct update_bssid_data bssid_data;
2281
2282         if (g_hash_table_size(network->bss_table) < 1)
2283                 return NULL;
2284
2285         bssid_data.network = network;
2286         memset(&bssid_data, 0, sizeof(bssid_data));
2287         memcpy(bssid_data.last_connected_bssid, network->last_connected_bssid, WIFI_BSSID_LEN_MAX);
2288         bssid_data.assoc_reject_table = network->assoc_reject_table;
2289
2290         g_hash_table_foreach(network->bss_table, update_bssid_list, &bssid_data);
2291         bssid_data.bssid_list = g_slist_sort(bssid_data.bssid_list, cmp_bss);
2292         if (TIZEN_INS_ENABLED && !simplified_log)
2293                 g_slist_foreach(bssid_data.bssid_list, print_bssid_sort, (gpointer)network);
2294
2295         return bssid_data.bssid_list;
2296 }
2297
2298 void g_supplicant_network_set_last_connected_bssid(GSupplicantNetwork *network, const unsigned char *bssid)
2299 {
2300         if (!bssid)
2301                 return;
2302
2303         if (!memcmp(bssid, invalid_bssid, WIFI_BSSID_LEN_MAX))
2304                 return;
2305
2306         memcpy(network->last_connected_bssid, bssid, WIFI_BSSID_LEN_MAX);
2307
2308         SUPPLICANT_DBG("last connected bssid [" MACSTR "]", MAC2STR(bssid));
2309 }
2310
2311 const unsigned char *g_supplicant_network_get_last_connected_bssid(GSupplicantNetwork *network)
2312 {
2313         if (network == NULL)
2314                 return NULL;
2315
2316         return (const unsigned char *)network->last_connected_bssid;
2317 }
2318
2319 void g_supplicant_network_update_assoc_reject(GSupplicantInterface *interface,
2320                 GSupplicantNetwork *network)
2321 {
2322         struct assoc_reject_data *assoc_data;
2323         gchar *bssid_str;
2324         time_t curr_time;
2325
2326         if (!network)
2327                 return;
2328
2329         bssid_str = convert_bssid_to_str(interface->add_network_bssid);
2330         if (!bssid_str)
2331                 return;
2332
2333         assoc_data = g_hash_table_lookup(network->assoc_reject_table, bssid_str);
2334         if (!assoc_data) {
2335                 assoc_data = g_try_new0(struct assoc_reject_data, 1);
2336                 if (!assoc_data) {
2337                         g_free(bssid_str);
2338                         return;
2339                 }
2340
2341                 assoc_data->bssid = g_strdup(bssid_str);
2342                 g_hash_table_insert(network->assoc_reject_table, assoc_data->bssid, assoc_data);
2343         }
2344
2345         curr_time = time(NULL);
2346         assoc_data->reject_time_list = g_slist_append(assoc_data->reject_time_list, GINT_TO_POINTER(curr_time));
2347
2348         SUPPLICANT_DBG("bssid [%s] time [%u]", bssid_str, curr_time);
2349
2350         g_free(bssid_str);
2351
2352         callback_network_changed(network, "UpdateAssocReject");
2353 }
2354
2355 GHashTable *g_supplicant_network_get_assoc_reject_table(GSupplicantNetwork *network)
2356 {
2357         if (!network)
2358                 return NULL;
2359
2360         return network->assoc_reject_table;
2361 }
2362
2363 static void copy_assoc_reject(gpointer key, gpointer value, gpointer user_data)
2364 {
2365         struct assoc_reject_data *cloned_assoc_data;
2366         struct assoc_reject_data *assoc_data = value;
2367         GHashTable *cloned_assoc_reject_table = user_data;
2368
2369         if (assoc_data && cloned_assoc_reject_table) {
2370                 cloned_assoc_data = g_try_new0(struct assoc_reject_data, 1);
2371                 if (!cloned_assoc_data)
2372                         return;
2373
2374                 cloned_assoc_data->bssid = g_strdup(assoc_data->bssid);
2375                 cloned_assoc_data->reject_time_list = g_slist_copy(assoc_data->reject_time_list);
2376                 g_hash_table_insert(cloned_assoc_reject_table,
2377                                         cloned_assoc_data->bssid, cloned_assoc_data);
2378         }
2379 }
2380
2381 GHashTable *g_supplicant_network_clone_assoc_reject_table(GSupplicantNetwork *network)
2382 {
2383         GHashTable *cloned_assoc_reject_table;
2384
2385         if (!network)
2386                 return NULL;
2387
2388         GHashTable *assoc_reject_table = g_supplicant_network_get_assoc_reject_table(network);
2389         if (!assoc_reject_table)
2390                 return NULL;
2391
2392         cloned_assoc_reject_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2393                                                                 NULL, remove_assoc_data);
2394         g_hash_table_foreach(assoc_reject_table, copy_assoc_reject, cloned_assoc_reject_table);
2395
2396         return cloned_assoc_reject_table;
2397 }
2398
2399 GSupplicantNetwork *g_supplicant_interface_get_network(GSupplicantInterface *interface,
2400                 const char *group)
2401 {
2402         if (!interface)
2403                 return NULL;
2404
2405         return g_hash_table_lookup(interface->network_table, group);
2406 }
2407 #endif /* defined TIZEN_EXT */
2408
2409 static void merge_network(GSupplicantNetwork *network)
2410 {
2411         GString *str;
2412         const char *ssid, *mode, *key_mgmt;
2413 #if defined TIZEN_EXT
2414         const char *isHS20AP;
2415         const char *eap, *identity, *phase2;
2416 #endif
2417         unsigned int i, ssid_len;
2418         char *group;
2419
2420         ssid = g_hash_table_lookup(network->config_table, "ssid");
2421         mode = g_hash_table_lookup(network->config_table, "mode");
2422         key_mgmt = g_hash_table_lookup(network->config_table, "key_mgmt");
2423 #if defined TIZEN_EXT
2424         isHS20AP = g_hash_table_lookup(network->config_table, "isHS20AP");
2425         eap = g_hash_table_lookup(network->config_table, "eap");
2426         identity = g_hash_table_lookup(network->config_table, "identity");
2427         phase2 = g_hash_table_lookup(network->config_table, "phase2");
2428 #endif
2429
2430         SUPPLICANT_DBG("ssid %s mode %s", ssid, mode);
2431
2432         if (ssid)
2433                 ssid_len = strlen(ssid);
2434         else
2435                 ssid_len = 0;
2436
2437         str = g_string_sized_new((ssid_len * 2) + 24);
2438         if (!str)
2439                 return;
2440
2441         for (i = 0; i < ssid_len; i++)
2442 #if defined TIZEN_EXT
2443         {
2444                 if (ssid[i] != '"')
2445 #endif
2446                 g_string_append_printf(str, "%02x", ssid[i]);
2447 #if defined TIZEN_EXT
2448         }
2449 #endif
2450
2451         if (g_strcmp0(mode, "0") == 0)
2452                 g_string_append_printf(str, "_managed");
2453         else if (g_strcmp0(mode, "1") == 0)
2454                 g_string_append_printf(str, "_adhoc");
2455 #if defined TIZEN_EXT_WIFI_MESH
2456         else if (g_strcmp0(mode, "5") == 0)
2457                 g_string_append_printf(str, "_mesh");
2458 #endif
2459
2460 #if defined TIZEN_EXT
2461         if (g_strcmp0(key_mgmt, "WPA-PSK") == 0)
2462                 g_string_append_printf(str, "_psk");
2463         else if (g_strcmp0(key_mgmt, "SAE") == 0)
2464                 g_string_append_printf(str, "_sae");
2465 #else
2466         if ((g_strcmp0(key_mgmt, "WPA-PSK") == 0) ||
2467             (g_strcmp0(key_mgmt, "SAE") == 0))
2468                 g_string_append_printf(str, "_psk");
2469 #endif
2470 #if defined TIZEN_EXT
2471         else if (g_strcmp0(key_mgmt, "WPA-EAP") == 0)
2472                 g_string_append_printf(str, "_ieee8021x");
2473         else
2474                 g_string_append_printf(str, "_none");
2475 #endif
2476
2477         group = g_string_free(str, FALSE);
2478
2479         SUPPLICANT_DBG("%s", group);
2480
2481 #if defined TIZEN_EXT
2482         if (g_strcmp0(isHS20AP, "1") == 0) {
2483                 network->isHS20AP = 1;
2484                 if (network->eap)
2485                         g_free(network->eap);
2486                 network->eap = g_strdup(eap);
2487
2488                 if (network->identity)
2489                         g_free(network->identity);
2490                 network->identity = g_strdup(identity);
2491
2492                 if (network->phase2)
2493                         g_free(network->phase2);
2494                 network->phase2 = g_strdup(phase2);
2495         } else
2496                 network->isHS20AP = 0;
2497
2498         network->group = g_strdup(group);
2499         callback_network_merged(network);
2500         g_free(network->group);
2501 #endif
2502
2503         g_free(group);
2504
2505         g_hash_table_destroy(network->config_table);
2506
2507         g_free(network->path);
2508         g_free(network);
2509 }
2510
2511 static void network_property(const char *key, DBusMessageIter *iter,
2512                                                         void *user_data)
2513 {
2514         GSupplicantNetwork *network = user_data;
2515
2516         if (!network->interface)
2517                 return;
2518
2519         if (!key) {
2520                 merge_network(network);
2521                 return;
2522         }
2523
2524         if (g_strcmp0(key, "Enabled") == 0) {
2525                 dbus_bool_t enabled = FALSE;
2526
2527                 dbus_message_iter_get_basic(iter, &enabled);
2528         } else if (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_STRING) {
2529                 const char *str = NULL;
2530
2531                 dbus_message_iter_get_basic(iter, &str);
2532                 if (str) {
2533                         g_hash_table_replace(network->config_table,
2534                                                 g_strdup(key), g_strdup(str));
2535                 }
2536         } else
2537                 SUPPLICANT_DBG("key %s type %c",
2538                                 key, dbus_message_iter_get_arg_type(iter));
2539 }
2540
2541 static void interface_network_added(DBusMessageIter *iter, void *user_data)
2542 {
2543         GSupplicantInterface *interface = user_data;
2544         GSupplicantNetwork *network;
2545         const char *path = NULL;
2546
2547         SUPPLICANT_DBG("");
2548
2549         dbus_message_iter_get_basic(iter, &path);
2550         if (!path)
2551                 return;
2552
2553         if (g_strcmp0(path, "/") == 0)
2554                 return;
2555
2556         network = g_try_new0(GSupplicantNetwork, 1);
2557         if (!network)
2558                 return;
2559
2560         network->interface = interface;
2561         network->path = g_strdup(path);
2562
2563         network->config_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2564                                                         g_free, g_free);
2565
2566         dbus_message_iter_next(iter);
2567         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
2568                 supplicant_dbus_property_foreach(iter, network_property,
2569                                                                 network);
2570                 network_property(NULL, NULL, network);
2571                 return;
2572         }
2573
2574         supplicant_dbus_property_get_all(path,
2575                                 SUPPLICANT_INTERFACE ".Network",
2576                                         network_property, network, NULL);
2577 }
2578
2579 static void interface_network_removed(DBusMessageIter *iter, void *user_data)
2580 {
2581         SUPPLICANT_DBG("");
2582 }
2583
2584 static char *create_name(unsigned char *ssid, int ssid_len)
2585 {
2586         GString *string;
2587         const gchar *remainder, *invalid;
2588         int valid_bytes, remaining_bytes;
2589
2590         if (ssid_len < 1 || ssid[0] == '\0')
2591                 return g_strdup("");
2592
2593         string = NULL;
2594         remainder = (const gchar *)ssid;
2595         remaining_bytes = ssid_len;
2596
2597         while (remaining_bytes != 0) {
2598                 if (g_utf8_validate(remainder, remaining_bytes,
2599                                         &invalid)) {
2600                         break;
2601                 }
2602
2603                 valid_bytes = invalid - remainder;
2604
2605                 if (!string)
2606                         string = g_string_sized_new(remaining_bytes);
2607
2608                 g_string_append_len(string, remainder, valid_bytes);
2609
2610                 /* append U+FFFD REPLACEMENT CHARACTER */
2611                 g_string_append(string, "\357\277\275");
2612
2613                 remaining_bytes -= valid_bytes + 1;
2614                 remainder = invalid + 1;
2615         }
2616
2617         if (!string)
2618                 return g_strndup((const gchar *)ssid, ssid_len + 1);
2619
2620         g_string_append(string, remainder);
2621
2622         return g_string_free(string, FALSE);
2623 }
2624
2625 static char *create_group(struct g_supplicant_bss *bss)
2626 {
2627         GString *str;
2628         unsigned int i;
2629         const char *mode, *security;
2630
2631         str = g_string_sized_new((bss->ssid_len * 2) + 24);
2632         if (!str)
2633                 return NULL;
2634
2635         if (bss->ssid_len > 0 && bss->ssid[0] != '\0') {
2636                 for (i = 0; i < bss->ssid_len; i++)
2637                         g_string_append_printf(str, "%02x", bss->ssid[i]);
2638         } else
2639                 g_string_append_printf(str, "hidden");
2640
2641         mode = mode2string(bss->mode);
2642         if (mode)
2643                 g_string_append_printf(str, "_%s", mode);
2644
2645 #if defined TIZEN_EXT
2646         if (bss->security == G_SUPPLICANT_SECURITY_PSK_SHA256)
2647                 security = "psk";
2648         else
2649                 security = security2string(bss->security);
2650 #else
2651         security = security2string(bss->security);
2652 #endif
2653         if (security)
2654                 g_string_append_printf(str, "_%s", security);
2655
2656         return g_string_free(str, FALSE);
2657 }
2658 #if defined TIZEN_EXT
2659 static void update_network_with_best_bss(GSupplicantNetwork *network,
2660                 struct g_supplicant_bss *best_bss)
2661 {
2662         /*
2663          * Do not change best BSS if we are connected.
2664          */
2665         if (network->interface->state == G_SUPPLICANT_STATE_COMPLETED && network->best_bss)
2666                 return;
2667
2668         network->signal = best_bss->signal;
2669         network->frequency = best_bss->frequency;
2670         network->phy_mode = best_bss->phy_mode;
2671         network->best_bss = best_bss;
2672 }
2673
2674 static bool update_best_bss(GSupplicantNetwork *network,
2675                 struct g_supplicant_bss *bss, struct g_supplicant_bss *best_bss)
2676 {
2677         int score_new;
2678         int score_best;
2679
2680         if (network->best_bss == NULL) {
2681                 update_network_with_best_bss(network, bss);
2682                 return true;
2683         }
2684
2685         if (TIZEN_INS_ENABLED) {
2686                 score_new = calculate_score(
2687                                 compare_bssid(bss->bssid, network->last_connected_bssid),
2688                                 get_assoc_reject_cnt(network->assoc_reject_table, bss->bssid),
2689                                 bss->frequency, bss->signal, bss->snr, bss->est_throughput);
2690
2691                 score_best = calculate_score(
2692                                 compare_bssid(network->best_bss->bssid, network->last_connected_bssid),
2693                                 get_assoc_reject_cnt(network->assoc_reject_table, network->best_bss->bssid),
2694                                 network->best_bss->frequency, network->best_bss->signal,
2695                                 network->best_bss->snr, network->best_bss->est_throughput);
2696         } else {
2697                 score_new = bss->signal;
2698                 score_best = network->best_bss->signal;
2699         }
2700
2701         if (score_new > score_best) {
2702                 SUPPLICANT_DBG("new[" MACSTR "][%d] : best[" MACSTR "][%d]",
2703                         MAC2STR(bss->bssid), score_new,
2704                         MAC2STR(network->best_bss->bssid), score_best);
2705
2706                 update_network_with_best_bss(network, bss);
2707
2708                 SUPPLICANT_DBG("Update best BSS for %s", network->name);
2709
2710                 return true;
2711         }
2712
2713         return false;
2714 }
2715 #endif
2716 static int add_or_replace_bss_to_network(struct g_supplicant_bss *bss)
2717 {
2718         GSupplicantInterface *interface = bss->interface;
2719         GSupplicantNetwork *network;
2720         char *group;
2721         bool is_new_network;
2722
2723         group = create_group(bss);
2724         SUPPLICANT_DBG("New group created: %s", group);
2725
2726         if (!group)
2727                 return -ENOMEM;
2728
2729         network = g_hash_table_lookup(interface->network_table, group);
2730         if (network) {
2731                 g_free(group);
2732                 SUPPLICANT_DBG("Network %s already exist", network->name);
2733                 is_new_network = false;
2734
2735                 goto done;
2736         }
2737
2738         is_new_network = true;
2739
2740         network = g_try_new0(GSupplicantNetwork, 1);
2741         if (!network) {
2742                 g_free(group);
2743                 return -ENOMEM;
2744         }
2745
2746         network->interface = interface;
2747         if (!network->path)
2748                 network->path = g_strdup(bss->path);
2749         network->group = group;
2750         network->name = create_name(bss->ssid, bss->ssid_len);
2751         network->mode = bss->mode;
2752         network->security = bss->security;
2753         network->keymgmt = bss->keymgmt;
2754         network->ssid_len = bss->ssid_len;
2755         memcpy(network->ssid, bss->ssid, bss->ssid_len);
2756         network->signal = bss->signal;
2757         network->frequency = bss->frequency;
2758         network->best_bss = bss;
2759
2760         if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
2761                 network->wps = TRUE;
2762                 network->wps_capabilities = bss->wps_capabilities;
2763         }
2764
2765 #if defined TIZEN_EXT
2766         network->owe_transition_mode = bss->owe_transition_mode;
2767         network->privacy = bss->privacy;
2768         memcpy(network->transition_mode_ssid, bss->transition_mode_ssid, bss->transition_mode_ssid_len);
2769         memcpy(network->transition_mode_bssid, bss->transition_mode_bssid, WIFI_BSSID_LEN_MAX);
2770
2771         network->keymgmt = bss->keymgmt;
2772
2773         if (g_slist_length(bss->vsie_list) > 0) {
2774                 GSList *list = NULL;
2775                 unsigned char *vsie = NULL;
2776                 for (list = bss->vsie_list; list; list = list->next) {
2777                         unsigned char *ie = (unsigned char *)list->data;
2778                         vsie = (unsigned char *)g_try_malloc0(ie[1]+2); // tag number size(1), tag length size(1)
2779
2780                         if (vsie) {
2781                                 memcpy(vsie, ie, ie[1]+2);
2782                                 network->vsie_list = g_slist_append(network->vsie_list, vsie);
2783                         } else
2784                                 SUPPLICANT_DBG("Failed to allocate memory.");
2785                 }
2786         }
2787
2788         network->isHS20AP = bss->hs20;
2789         memcpy(network->country_code, bss->country_code, COUNTRY_CODE_LENGTH);
2790         network->phy_mode = bss->phy_mode;
2791 #endif
2792
2793         SUPPLICANT_DBG("New network %s created", network->name);
2794
2795         network->bss_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2796                                                         NULL, remove_bss);
2797
2798         network->config_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2799                                                         g_free, g_free);
2800
2801 #if defined TIZEN_EXT
2802         network->assoc_reject_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2803                                                         NULL, remove_assoc_data);
2804 #endif
2805
2806         g_hash_table_replace(interface->network_table,
2807                                                 network->group, network);
2808
2809         callback_network_added(network);
2810
2811 done:
2812         /* We update network's WPS properties if only bss provides WPS. */
2813         if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
2814                 network->wps = TRUE;
2815                 network->wps_capabilities = bss->wps_capabilities;
2816
2817                 if (!is_new_network)
2818                         callback_network_changed(network, "WPSCapabilities");
2819         }
2820
2821         /*
2822          * Do not change best BSS if we are connected. It will be done through
2823          * CurrentBSS property in case of misalignment with wpa_s or roaming.
2824          */
2825 #if defined TIZEN_EXT
2826         if (network != interface->current_network) {
2827                 if (update_best_bss(network, bss, network->best_bss))
2828                         callback_network_changed(network, "Signal");
2829         }
2830 #else
2831         if (network != interface->current_network &&
2832                                 bss->signal > network->signal) {
2833                 network->signal = bss->signal;
2834                 network->best_bss = bss;
2835                 callback_network_changed(network, "Signal");
2836         }
2837 #endif
2838
2839         g_hash_table_replace(interface->bss_mapping, bss->path, network);
2840         g_hash_table_replace(network->bss_table, bss->path, bss);
2841
2842         g_hash_table_replace(bss_mapping, bss->path, interface);
2843
2844         return 0;
2845 }
2846
2847 static void bss_rates(DBusMessageIter *iter, void *user_data)
2848 {
2849         struct g_supplicant_bss *bss = user_data;
2850         dbus_uint32_t rate = 0;
2851
2852         dbus_message_iter_get_basic(iter, &rate);
2853         if (rate == 0)
2854                 return;
2855
2856         if (rate > bss->maxrate)
2857                 bss->maxrate = rate;
2858 }
2859
2860 static void bss_keymgmt(DBusMessageIter *iter, void *user_data)
2861 {
2862         unsigned int *keymgmt = user_data;
2863         const char *str = NULL;
2864         int i;
2865
2866         dbus_message_iter_get_basic(iter, &str);
2867         if (!str)
2868                 return;
2869
2870         for (i = 0; keymgmt_map[i].str; i++)
2871                 if (strcmp(str, keymgmt_map[i].str) == 0) {
2872                         SUPPLICANT_DBG("Keymgmt: %s", str);
2873                         *keymgmt |= keymgmt_map[i].val;
2874                         break;
2875                 }
2876 }
2877
2878 static void bss_group(DBusMessageIter *iter, void *user_data)
2879 {
2880         unsigned int *group = user_data;
2881         const char *str = NULL;
2882         int i;
2883
2884         dbus_message_iter_get_basic(iter, &str);
2885         if (!str)
2886                 return;
2887
2888         for (i = 0; group_map[i].str; i++)
2889                 if (strcmp(str, group_map[i].str) == 0) {
2890                         SUPPLICANT_DBG("Group: %s", str);
2891                         *group |= group_map[i].val;
2892                         break;
2893                 }
2894 }
2895
2896 static void bss_pairwise(DBusMessageIter *iter, void *user_data)
2897 {
2898         unsigned int *pairwise = user_data;
2899         const char *str = NULL;
2900         int i;
2901
2902         dbus_message_iter_get_basic(iter, &str);
2903         if (!str)
2904                 return;
2905
2906         for (i = 0; pairwise_map[i].str; i++)
2907                 if (strcmp(str, pairwise_map[i].str) == 0) {
2908                         SUPPLICANT_DBG("Pairwise: %s", str);
2909                         *pairwise |= pairwise_map[i].val;
2910                         break;
2911                 }
2912 }
2913
2914 static void bss_wpa(const char *key, DBusMessageIter *iter,
2915                         void *user_data)
2916 {
2917         struct g_supplicant_bss *bss = user_data;
2918         unsigned int value = 0;
2919
2920         SUPPLICANT_DBG("Key: %s", key);
2921
2922         if (g_strcmp0(key, "KeyMgmt") == 0) {
2923                 supplicant_dbus_array_foreach(iter, bss_keymgmt, &value);
2924
2925                 if (bss->rsn_selected)
2926                         bss->rsn_keymgmt = value;
2927                 else
2928                         bss->wpa_keymgmt = value;
2929         } else if (g_strcmp0(key, "Group") == 0) {
2930                 supplicant_dbus_array_foreach(iter, bss_group, &value);
2931
2932                 if (bss->rsn_selected)
2933                         bss->rsn_group = value;
2934                 else
2935                         bss->wpa_group = value;
2936         } else if (g_strcmp0(key, "Pairwise") == 0) {
2937                 supplicant_dbus_array_foreach(iter, bss_pairwise, &value);
2938
2939                 if (bss->rsn_selected)
2940                         bss->rsn_pairwise = value;
2941                 else
2942                         bss->wpa_pairwise = value;
2943         }
2944 }
2945
2946 static unsigned int get_tlv(unsigned char *ie, unsigned int ie_size,
2947                                                         unsigned int type)
2948 {
2949         unsigned int len = 0;
2950
2951         while (len + 4 < ie_size) {
2952                 unsigned int hi = ie[len];
2953                 unsigned int lo = ie[len + 1];
2954                 unsigned int tmp_type = (hi << 8) + lo;
2955                 unsigned int v_len = 0;
2956
2957                 /* hi and lo are used to recreate an unsigned int
2958                  * based on 2 8bits length unsigned int. */
2959
2960                 hi = ie[len + 2];
2961                 lo = ie[len + 3];
2962                 v_len = (hi << 8) + lo;
2963
2964                 if (tmp_type == type) {
2965                         unsigned int ret_value = 0;
2966                         unsigned char *value = (unsigned char *)&ret_value;
2967
2968                         SUPPLICANT_DBG("IE: match type 0x%x", type);
2969
2970                         /* Verifying length relevance */
2971                         if (v_len > sizeof(unsigned int) ||
2972                                 len + 4 + v_len > ie_size)
2973                                 break;
2974
2975                         memcpy(value, ie + len + 4, v_len);
2976
2977                         SUPPLICANT_DBG("returning 0x%x", ret_value);
2978                         return ret_value;
2979                 }
2980
2981                 len += v_len + 4;
2982         }
2983
2984         SUPPLICANT_DBG("returning 0");
2985         return 0;
2986 }
2987
2988 #if defined TIZEN_EXT
2989 static void get_bss_phy_mode(unsigned int max_rate,
2990                 unsigned int max_ext_rate, bool ht, bool vht, void *data)
2991 {
2992         struct g_supplicant_bss *bss = data;
2993         unsigned int freq = bss->frequency;
2994
2995         /* Following conditions are used to determine
2996          * IEEE 802.11 Protocol Modes:-
2997          *
2998          * 1. If “Supported rates” is only till 11 Mbps,
2999          *    and frequency is in 2.4GHz band, then protocol is 11B.
3000          * 2. If “Supported rates” is till 54Mbps or
3001          *    “Extended supported rates” are present,
3002          *    and frequency is in 2.4GHz band, then protocol is 11G.
3003          * 3. If “Supported rates” is only till 54 Mbps,
3004          *    frequency is in 5GHz band , then protocol is 11A.
3005          * 4. If “HT capabilities” is supported , then protocol is 11N.
3006          * 5. If “HT capabilities” & “VHT” is supported and
3007          *    frequency is in 5 GHz band, then protocol is 11AC.
3008          * */
3009
3010         if (freq >= 2412 && freq <= 2484) { /* 2.4 Ghz Band */
3011                 if (max_rate <= 11 && max_ext_rate <= 0 && !ht)
3012                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211B;
3013                 else if ((max_rate <= 54 || max_ext_rate > 0) && !ht)
3014                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211BG;
3015                 else if ((max_rate >= 54 || max_ext_rate > 0) && ht)
3016                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211BGN;
3017                 else
3018                         bss->phy_mode = G_SUPPLICANT_MODE_UNKNOWN;
3019         } else if (freq >= 5180 && freq <= 5825) { /* 5 Ghz Band */
3020                 if (max_rate <= 54 && !ht)
3021                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211A;
3022                 else if ((max_rate >= 54 || max_ext_rate > 0) && ht && !vht)
3023                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211AN;
3024                 else if ((max_rate >= 54 || max_ext_rate > 0) && ht && vht)
3025                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211ANAC;
3026                 else
3027                         bss->phy_mode = G_SUPPLICANT_MODE_UNKNOWN;
3028         }
3029 }
3030 #endif
3031
3032 static void bss_process_ies(DBusMessageIter *iter, void *user_data)
3033 {
3034         struct g_supplicant_bss *bss = user_data;
3035         const unsigned char WPS_OUI[] = { 0x00, 0x50, 0xf2, 0x04 };
3036         unsigned char *ie, *ie_end;
3037         DBusMessageIter array;
3038         unsigned int value;
3039         int ie_len;
3040 #if defined TIZEN_EXT
3041         const unsigned char OWE_WFA_OUI[] = { 0x50, 0x6f, 0x9a, 0x1c };
3042         int r_len, j;
3043         unsigned char *rates = NULL;
3044         unsigned char *ext_rates = NULL;
3045         unsigned int max_rate = 0;
3046         unsigned int max_ext_rate = 0;
3047         unsigned int offset = 0;
3048         bool ht = false;
3049         bool vht = false;
3050 #endif
3051
3052 #define WMM_WPA1_WPS_INFO 221
3053 #define WPS_INFO_MIN_LEN  6
3054 #define WPS_VERSION_TLV   0x104A
3055 #define WPS_STATE_TLV     0x1044
3056 #define WPS_METHODS_TLV   0x1012
3057 #define WPS_REGISTRAR_TLV 0x1041
3058 #define WPS_VERSION       0x10
3059 #define WPS_PBC           0x04
3060 #define WPS_PIN           0x00
3061 #define WPS_CONFIGURED    0x02
3062 #if defined TIZEN_EXT
3063 #define VENDOR_SPECIFIC_INFO 0xDD
3064 #define WLAN_EID_COUNTRY 7
3065 #define WLAN_EID_RSN_INFO 48
3066 #define RSN_CAPABILITY_MFP_REQ (1 << 6)
3067 #endif
3068
3069         dbus_message_iter_recurse(iter, &array);
3070         dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
3071
3072         if (!ie || ie_len < 2)
3073                 return;
3074
3075         bss->wps_capabilities = 0;
3076         bss->keymgmt = 0;
3077
3078         for (ie_end = ie + ie_len; ie < ie_end && ie + ie[1] + 1 <= ie_end;
3079                                                         ie += ie[1] + 2) {
3080 #if defined TIZEN_EXT
3081                 unsigned char *vsie;
3082                 int vsie_len = 0;
3083
3084                 if (ie[0] == VENDOR_SPECIFIC_INFO && memcmp(ie+2, OWE_WFA_OUI, sizeof(OWE_WFA_OUI)) == 0) {
3085                         SUPPLICANT_DBG("IE: match vendor specific data : OWE Transition Mode");
3086
3087 /*
3088                 Tag: Vendor Specific: Wi-Fi Alliance: OWE Transition Mode
3089                         Tag Number: Vendor Specific (221)    -> ie[0]
3090                         Tag length: 26                       -> ie[1]
3091                         OUI: 50:6f:9a (Wi-Fi Alliance)       -> ie[2]
3092                         Vendor Specific OUI Type: 28         -> ie[5]
3093                         BSSID: 92:fd:f0:20:2b:09             -> ie[6]
3094                         SSID length: 15                      -> ie[12]
3095                         SSID: Wi-Fi-5.2.3-owe                -> ie[13]
3096
3097 0000   dd 1a 50 6f 9a 1c 92 fd f0 20 2b 09 0f 57 69 2d   ..Po..... +..Wi-
3098 0010   46 69 2d 35 2e 32 2e 33 2d 6f 77 65               Fi-5.2.3-owe
3099
3100 */
3101                         bss->owe_transition_mode = TRUE;
3102                         if (ie[1] >= 11) { // Tag length is at least up to ssid length position.
3103                                 memcpy(bss->transition_mode_bssid, ie+6, WIFI_BSSID_LEN_MAX);
3104                                 if (ie[12] > 0 && ie[12] < 32) {
3105                                         memcpy(bss->transition_mode_ssid, ie+13, ie[12]);
3106                                         bss->transition_mode_ssid_len = ie[12];
3107                                 } else
3108                                         bss->transition_mode_ssid_len = 0;
3109                         } else
3110                                 bss->owe_transition_mode = FALSE;
3111                         continue;
3112                 }
3113
3114                 if (ie[0] == VENDOR_SPECIFIC_INFO && memcmp(ie+2, WPS_OUI, sizeof(WPS_OUI)) != 0) {
3115
3116                         if (!simplified_log)
3117                                 SUPPLICANT_DBG("IE: match vendor specific data");
3118
3119                         vsie_len = ie[1]+2;     // tag number size(1), tag length size(1)
3120                         vsie = (unsigned char *)g_try_malloc0(vsie_len);
3121
3122                         if (vsie) {
3123                                 memcpy(vsie, ie, vsie_len);
3124                                 bss->vsie_list = g_slist_append(bss->vsie_list, vsie);
3125                         } else
3126                                 SUPPLICANT_DBG("Failed to allocate memory");
3127                         continue;
3128                 }
3129
3130                 if (ie[0] == WLAN_EID_COUNTRY && ie[1] >= 2) {
3131                         /* Add country code only if it is a valid alphabet */
3132                         if (ie[2] >= 65 && ie[2] <= 90 && ie[3] >= 65 && ie[3] <= 90) {
3133                                 memcpy(bss->country_code, ie+2, COUNTRY_CODE_LENGTH);
3134                                 continue;
3135                         }
3136                 }
3137
3138                 if (ie[0] == WLAN_EID_HT_CAP && ie[1]) {
3139                         ht = true;
3140                         continue;
3141                 }
3142
3143                 if (ie[0] == WLAN_EID_VHT_CAP && ie[1]) {
3144                         vht = true;
3145                         continue;
3146                 }
3147
3148                 if (ie[0] == WLAN_EID_SUPP_RATES && ie[1]) {
3149                         r_len = ie[1];
3150                         rates = g_malloc0(r_len);
3151                         if (!rates)
3152                                 continue;
3153
3154                         for (j = 0; ie && j < r_len; j++) {
3155                                 rates[j] = ((ie[j + 2] & 0x7f) * 500000)/1000000;
3156                                 if (max_rate < rates[j])
3157                                         max_rate = rates[j];
3158                         }
3159                         continue;
3160                 }
3161
3162                 if (ie[0] == WLAN_EID_EXT_SUPP_RATES && ie[1] > 0) {
3163                         r_len = ie[1];
3164                         ext_rates = g_malloc0(r_len);
3165                         if (!ext_rates)
3166                                 continue;
3167
3168                         for (j = 0; ie && j < r_len; j++) {
3169                                 ext_rates[j] = ((ie[j + 2] & 0x7f) * 500000)/1000000;
3170                                 if (max_ext_rate < ext_rates[j])
3171                                         max_ext_rate = ext_rates[j];
3172                         }
3173                         continue;
3174                 }
3175
3176                 if (ie[0] == WLAN_EID_RSN_INFO && ie[1] >= 20) {
3177                         r_len = ie[1];
3178                         offset = 10 + ie[8] * 4;
3179                         offset += ie[offset] * 4 + 2;
3180
3181                         if (offset <= r_len + 1 &&
3182                                         (ie[offset] & RSN_CAPABILITY_MFP_REQ) != 0)
3183                                 bss->pmf_required = TRUE;
3184
3185                         continue;
3186                 }
3187 #endif
3188                 if (ie[0] != WMM_WPA1_WPS_INFO || ie[1] < WPS_INFO_MIN_LEN ||
3189                         memcmp(ie+2, WPS_OUI, sizeof(WPS_OUI)) != 0)
3190                         continue;
3191
3192                 SUPPLICANT_DBG("IE: match WPS_OUI");
3193
3194                 value = get_tlv(&ie[6], ie[1], WPS_STATE_TLV);
3195                 if (get_tlv(&ie[6], ie[1], WPS_VERSION_TLV) == WPS_VERSION &&
3196                                                                 value != 0) {
3197                         bss->keymgmt |= G_SUPPLICANT_KEYMGMT_WPS;
3198
3199                         if (value == WPS_CONFIGURED)
3200                                 bss->wps_capabilities |=
3201                                         G_SUPPLICANT_WPS_CONFIGURED;
3202                 }
3203
3204                 value = get_tlv(&ie[6], ie[1], WPS_METHODS_TLV);
3205                 if (value != 0) {
3206                         if (GUINT16_FROM_BE(value) == WPS_PBC)
3207                                 bss->wps_capabilities |= G_SUPPLICANT_WPS_PBC;
3208                         if (GUINT16_FROM_BE(value) == WPS_PIN)
3209                                 bss->wps_capabilities |= G_SUPPLICANT_WPS_PIN;
3210                 } else
3211                         bss->wps_capabilities |=
3212                                 G_SUPPLICANT_WPS_PBC | G_SUPPLICANT_WPS_PIN;
3213
3214                 /* If the AP sends this it means it's advertizing
3215                  * as a registrar and the WPS process is launched
3216                  * on its side */
3217                 if (get_tlv(&ie[6], ie[1], WPS_REGISTRAR_TLV) != 0)
3218                         bss->wps_capabilities |= G_SUPPLICANT_WPS_REGISTRAR;
3219
3220                 SUPPLICANT_DBG("WPS Methods 0x%x", bss->wps_capabilities);
3221         }
3222 #ifdef TIZEN_EXT
3223         get_bss_phy_mode(max_rate, max_ext_rate, ht, vht, user_data);
3224         if (rates)
3225                 g_free(rates);
3226         if (ext_rates)
3227                 g_free(ext_rates);
3228 #endif
3229 }
3230
3231 static void bss_compute_security(struct g_supplicant_bss *bss)
3232 {
3233         /*
3234          * Combining RSN and WPA keymgmt
3235          * We combine it since parsing IEs might have set something for WPS. */
3236         bss->keymgmt |= bss->rsn_keymgmt | bss->wpa_keymgmt;
3237
3238         bss->ieee8021x = FALSE;
3239         bss->psk = FALSE;
3240 #if defined TIZEN_EXT
3241         bss->ft_ieee8021x = FALSE;
3242         bss->ft_psk = FALSE;
3243 #endif
3244
3245 #if defined TIZEN_EXT
3246         if (bss->keymgmt &
3247                         (G_SUPPLICANT_KEYMGMT_WPA_EAP |
3248                                 G_SUPPLICANT_KEYMGMT_WPA_EAP_256))
3249                 bss->ieee8021x = TRUE;
3250         else if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_EAP)
3251                 bss->ft_ieee8021x = TRUE;
3252 #else
3253         if (bss->keymgmt &
3254                         (G_SUPPLICANT_KEYMGMT_WPA_EAP |
3255                                 G_SUPPLICANT_KEYMGMT_WPA_FT_EAP |
3256                                 G_SUPPLICANT_KEYMGMT_WPA_EAP_256))
3257                 bss->ieee8021x = TRUE;
3258 #endif
3259
3260 #if defined TIZEN_EXT
3261         if (bss->keymgmt &
3262                         G_SUPPLICANT_KEYMGMT_WPA_PSK_256) {
3263                 bss->psk_sha256 = TRUE;
3264         }
3265
3266         if (bss->keymgmt &
3267                         (G_SUPPLICANT_KEYMGMT_WPA_PSK |
3268                                 G_SUPPLICANT_KEYMGMT_WPA_PSK_256))
3269                 bss->psk = TRUE;
3270         else if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_PSK)
3271                 bss->ft_psk = TRUE;
3272 #else
3273         if (bss->keymgmt &
3274                         (G_SUPPLICANT_KEYMGMT_WPA_PSK |
3275                                 G_SUPPLICANT_KEYMGMT_WPA_FT_PSK |
3276                                 G_SUPPLICANT_KEYMGMT_WPA_PSK_256))
3277                 bss->psk = TRUE;
3278 #endif
3279
3280 #if defined TIZEN_EXT
3281         if (bss->keymgmt &
3282                         (G_SUPPLICANT_KEYMGMT_SAE |
3283                                 G_SUPPLICANT_KEYMGMT_FT_SAE))
3284                 bss->sae = TRUE;
3285         if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_OWE)
3286                 bss->owe = TRUE;
3287         if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_DPP)
3288                 bss->dpp = TRUE;
3289 #endif
3290
3291         if (bss->ieee8021x)
3292                 bss->security = G_SUPPLICANT_SECURITY_IEEE8021X;
3293 #if defined TIZEN_EXT
3294         else if (bss->ft_ieee8021x)
3295                 bss->security = G_SUPPLICANT_SECURITY_IEEE8021X;
3296         else if (bss->sae)
3297                 bss->security = G_SUPPLICANT_SECURITY_SAE;
3298         else if (bss->psk_sha256)
3299                 bss->security = G_SUPPLICANT_SECURITY_PSK_SHA256;
3300 #endif
3301         else if (bss->psk)
3302                 bss->security = G_SUPPLICANT_SECURITY_PSK;
3303 #if defined TIZEN_EXT
3304         else if (bss->ft_psk)
3305                 bss->security = G_SUPPLICANT_SECURITY_FT_PSK;
3306         else if (bss->owe || bss->owe_transition_mode)
3307                 bss->security = G_SUPPLICANT_SECURITY_OWE;
3308         else if (bss->dpp)
3309                 bss->security = G_SUPPLICANT_SECURITY_DPP;
3310 #endif
3311         else if (bss->privacy)
3312                 bss->security = G_SUPPLICANT_SECURITY_WEP;
3313         else
3314                 bss->security = G_SUPPLICANT_SECURITY_NONE;
3315 }
3316
3317
3318 static void bss_property(const char *key, DBusMessageIter *iter,
3319                                                         void *user_data)
3320 {
3321         struct g_supplicant_bss *bss = user_data;
3322
3323         if (!bss->interface)
3324                 return;
3325 #if defined TIZEN_EXT
3326         if (!simplified_log)
3327 #endif
3328         SUPPLICANT_DBG("key %s", key);
3329
3330         if (!key)
3331                 return;
3332
3333         if (g_strcmp0(key, "BSSID") == 0) {
3334                 DBusMessageIter array;
3335                 unsigned char *addr;
3336                 int addr_len;
3337
3338                 dbus_message_iter_recurse(iter, &array);
3339                 dbus_message_iter_get_fixed_array(&array, &addr, &addr_len);
3340
3341                 if (addr_len == 6)
3342                         memcpy(bss->bssid, addr, addr_len);
3343         } else if (g_strcmp0(key, "SSID") == 0) {
3344                 DBusMessageIter array;
3345                 unsigned char *ssid;
3346                 int ssid_len;
3347
3348                 dbus_message_iter_recurse(iter, &array);
3349                 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
3350
3351                 if (ssid_len > 0 && ssid_len < 33) {
3352                         memcpy(bss->ssid, ssid, ssid_len);
3353                         bss->ssid_len = ssid_len;
3354                 } else {
3355                         memset(bss->ssid, 0, sizeof(bss->ssid));
3356                         bss->ssid_len = 0;
3357                 }
3358         } else if (g_strcmp0(key, "Capabilities") == 0) {
3359                 dbus_uint16_t capabilities = 0x0000;
3360
3361                 dbus_message_iter_get_basic(iter, &capabilities);
3362
3363                 if (capabilities & IEEE80211_CAP_ESS)
3364                         bss->mode = G_SUPPLICANT_MODE_INFRA;
3365                 else if (capabilities & IEEE80211_CAP_IBSS)
3366                         bss->mode = G_SUPPLICANT_MODE_IBSS;
3367
3368                 if (capabilities & IEEE80211_CAP_PRIVACY)
3369                         bss->privacy = TRUE;
3370         } else if (g_strcmp0(key, "Mode") == 0) {
3371                 const char *mode = NULL;
3372
3373                 dbus_message_iter_get_basic(iter, &mode);
3374                 bss->mode = string2mode(mode);
3375         } else if (g_strcmp0(key, "Frequency") == 0) {
3376                 dbus_uint16_t frequency = 0;
3377
3378                 dbus_message_iter_get_basic(iter, &frequency);
3379                 bss->frequency = frequency;
3380         } else if (g_strcmp0(key, "Signal") == 0) {
3381                 dbus_int16_t signal = 0;
3382
3383                 dbus_message_iter_get_basic(iter, &signal);
3384
3385                 bss->signal = signal;
3386                 if (!bss->signal)
3387                         bss->signal = BSS_UNKNOWN_STRENGTH;
3388
3389         } else if (g_strcmp0(key, "Level") == 0) {
3390                 dbus_int32_t level = 0;
3391
3392                 dbus_message_iter_get_basic(iter, &level);
3393         } else if (g_strcmp0(key, "Rates") == 0) {
3394                 supplicant_dbus_array_foreach(iter, bss_rates, bss);
3395         } else if (g_strcmp0(key, "MaxRate") == 0) {
3396                 dbus_uint32_t maxrate = 0;
3397
3398                 dbus_message_iter_get_basic(iter, &maxrate);
3399                 if (maxrate != 0)
3400                         bss->maxrate = maxrate;
3401         } else if (g_strcmp0(key, "Privacy") == 0) {
3402                 dbus_bool_t privacy = FALSE;
3403
3404                 dbus_message_iter_get_basic(iter, &privacy);
3405                 bss->privacy = privacy;
3406         } else if (g_strcmp0(key, "RSN") == 0) {
3407                 bss->rsn_selected = TRUE;
3408
3409                 supplicant_dbus_property_foreach(iter, bss_wpa, bss);
3410         } else if (g_strcmp0(key, "WPA") == 0) {
3411                 bss->rsn_selected = FALSE;
3412
3413                 supplicant_dbus_property_foreach(iter, bss_wpa, bss);
3414 #if defined TIZEN_EXT
3415         } else if (g_strcmp0(key, "HS20") == 0) {
3416                 dbus_bool_t hs20 = FALSE;
3417                 dbus_message_iter_get_basic(iter, &hs20);
3418                 bss->hs20 = hs20;
3419         } else if (g_strcmp0(key, "SNR") == 0) {
3420                 dbus_int16_t snr = 0;
3421
3422                 dbus_message_iter_get_basic(iter, &snr);
3423                 bss->snr = snr;
3424         } else if (g_strcmp0(key, "EstThroughput") == 0) {
3425                 dbus_uint32_t est_throughput = 0;
3426
3427                 dbus_message_iter_get_basic(iter, &est_throughput);
3428                 if (est_throughput != 0)
3429                         bss->est_throughput = est_throughput;
3430 #endif
3431         } else if (g_strcmp0(key, "IEs") == 0)
3432                 bss_process_ies(iter, bss);
3433         else
3434                 SUPPLICANT_DBG("key %s type %c",
3435                                 key, dbus_message_iter_get_arg_type(iter));
3436 }
3437
3438 static struct g_supplicant_bss *interface_bss_added(DBusMessageIter *iter,
3439                                                         void *user_data)
3440 {
3441         GSupplicantInterface *interface = user_data;
3442         GSupplicantNetwork *network;
3443         struct g_supplicant_bss *bss;
3444         const char *path = NULL;
3445 #if defined TIZEN_EXT
3446         if (!simplified_log)
3447 #endif
3448         SUPPLICANT_DBG("");
3449
3450         dbus_message_iter_get_basic(iter, &path);
3451         if (!path)
3452                 return NULL;
3453
3454         if (g_strcmp0(path, "/") == 0)
3455                 return NULL;
3456 #if defined TIZEN_EXT
3457         if (!simplified_log)
3458 #endif
3459         SUPPLICANT_DBG("%s", path);
3460
3461         network = g_hash_table_lookup(interface->bss_mapping, path);
3462         if (network) {
3463                 bss = g_hash_table_lookup(network->bss_table, path);
3464                 if (bss)
3465                         return NULL;
3466         }
3467
3468         bss = g_try_new0(struct g_supplicant_bss, 1);
3469         if (!bss)
3470                 return NULL;
3471
3472         bss->interface = interface;
3473         bss->path = g_strdup(path);
3474         bss->signal = BSS_UNKNOWN_STRENGTH;
3475
3476         return bss;
3477 }
3478
3479 static void interface_bss_added_with_keys(DBusMessageIter *iter,
3480                                                 void *user_data)
3481 {
3482         struct g_supplicant_bss *bss;
3483 #if defined TIZEN_EXT
3484         if (!simplified_log)
3485 #endif
3486         SUPPLICANT_DBG("");
3487
3488         bss = interface_bss_added(iter, user_data);
3489         if (!bss)
3490                 return;
3491
3492         dbus_message_iter_next(iter);
3493
3494         if (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_INVALID)
3495 #if defined TIZEN_EXT
3496         {
3497                 g_free(bss->path);
3498                 g_free(bss);
3499                 return;
3500         }
3501 #else
3502                 return;
3503 #endif
3504
3505         supplicant_dbus_property_foreach(iter, bss_property, bss);
3506
3507         bss_compute_security(bss);
3508         if (add_or_replace_bss_to_network(bss) < 0)
3509                 SUPPLICANT_DBG("add_or_replace_bss_to_network failed");
3510 }
3511
3512 static void interface_bss_added_without_keys(DBusMessageIter *iter,
3513                                                 void *user_data)
3514 {
3515         struct g_supplicant_bss *bss;
3516 #if defined TIZEN_EXT
3517         if (!simplified_log)
3518 #endif
3519         SUPPLICANT_DBG("");
3520
3521         bss = interface_bss_added(iter, user_data);
3522         if (!bss)
3523                 return;
3524
3525         supplicant_dbus_property_get_all(bss->path,
3526                                         SUPPLICANT_INTERFACE ".BSS",
3527                                         bss_property, bss, bss);
3528
3529         bss_compute_security(bss);
3530         if (add_or_replace_bss_to_network(bss) < 0)
3531                         SUPPLICANT_DBG("add_or_replace_bss_to_network failed");
3532 }
3533
3534 static void update_signal(gpointer key, gpointer value,
3535                                                 gpointer user_data)
3536 {
3537         struct g_supplicant_bss *bss = value;
3538         GSupplicantNetwork *network = user_data;
3539
3540 #if defined TIZEN_EXT
3541         if (!network->best_bss || (network->best_bss == bss)) {
3542                 if (bss->signal > network->signal) {
3543                         network->signal = bss->signal;
3544                         network->frequency = bss->frequency;
3545                         network->phy_mode = bss->phy_mode;
3546                         network->best_bss = bss;
3547                 }
3548                 return;
3549         }
3550
3551         update_best_bss(network, bss, network->best_bss);
3552 #else
3553         if (bss->signal > network->signal) {
3554                 network->signal = bss->signal;
3555                 network->best_bss = bss;
3556         }
3557 #endif
3558 }
3559
3560 static void update_network_signal(GSupplicantNetwork *network)
3561 {
3562         if (g_hash_table_size(network->bss_table) <= 1 && network->best_bss)
3563                 return;
3564
3565         g_hash_table_foreach(network->bss_table,
3566                                 update_signal, network);
3567
3568         SUPPLICANT_DBG("New network signal %d", network->signal);
3569 }
3570
3571 #if defined TIZEN_EXT
3572 static gboolean last_connected_timeout(gpointer data)
3573 {
3574         GSupplicantInterface *interface = data;
3575         GSupplicantNetwork *current_network = interface->current_network;
3576
3577         SUPPLICANT_DBG("Timeout last connected bss");
3578
3579         if (current_network && current_network->best_bss) {
3580                 if (compare_bssid(current_network->best_bss->bssid, interface->connected_bssid)) {
3581                         g_supplicant_network_set_last_connected_bssid(current_network, interface->connected_bssid);
3582                         callback_network_changed(current_network, "LastConnectedBSSID");
3583                 }
3584         }
3585
3586         last_connected_bss_timeout = 0;
3587         return FALSE;
3588 }
3589
3590 static void add_timer_for_last_connected(GSupplicantInterface *interface)
3591 {
3592         GSupplicantNetwork *current_network = interface->current_network;
3593
3594         if (interface->state == G_SUPPLICANT_STATE_COMPLETED) {
3595                 if (current_network) {
3596                         struct g_supplicant_bss *best_bss = current_network->best_bss;
3597
3598                         memcpy(interface->connected_bssid, best_bss->bssid, WIFI_BSSID_LEN_MAX);
3599
3600                         if (last_connected_bss_timeout)
3601                                 g_source_remove(last_connected_bss_timeout);
3602
3603                         last_connected_bss_timeout = g_timeout_add_seconds(LAST_CONNECTED_TIMEOUT,
3604                                 last_connected_timeout, interface);
3605
3606                         SUPPLICANT_DBG("Add timer for last connected bssid [" MACSTR "]",
3607                                         MAC2STR(best_bss->bssid));
3608                 }
3609         }
3610 }
3611
3612 static void remove_timer_for_last_connected(GSupplicantInterface *interface)
3613 {
3614         if (interface->state == G_SUPPLICANT_STATE_DISCONNECTED) {
3615                 if (last_connected_bss_timeout != 0) {
3616                         g_source_remove(last_connected_bss_timeout);
3617                         last_connected_bss_timeout = 0;
3618                         SUPPLICANT_DBG("Remove timer for last connected bss");
3619                 }
3620         }
3621 }
3622 #endif /* defined TIZEN_EXT */
3623
3624 static void interface_current_bss(GSupplicantInterface *interface,
3625                                                 DBusMessageIter *iter)
3626 {
3627         GSupplicantNetwork *network;
3628         struct g_supplicant_bss *bss;
3629         const char *path;
3630 #if defined TIZEN_EXT
3631         char curr_bssid_buff[WIFI_BSSID_STR_LEN] = {0,};
3632         char best_bssid_buff[WIFI_BSSID_STR_LEN] = {0,};
3633         char *curr_bssid_str = curr_bssid_buff;
3634         char *best_bssid_str = best_bssid_buff;
3635         gboolean update = FALSE;
3636 #endif
3637
3638         dbus_message_iter_get_basic(iter, &path);
3639         if (g_strcmp0(path, "/") == 0) {
3640                 interface->current_network = NULL;
3641                 return;
3642         }
3643
3644         interface_bss_added_without_keys(iter, interface);
3645
3646         network = g_hash_table_lookup(interface->bss_mapping, path);
3647         if (!network)
3648                 return;
3649
3650         bss = g_hash_table_lookup(network->bss_table, path);
3651         if (!bss)
3652                 return;
3653
3654         interface->current_network = network;
3655 #if defined TIZEN_EXT
3656         snprintf(curr_bssid_str, WIFI_BSSID_STR_LEN, MACSTR, MAC2STR(bss->bssid));
3657         snprintf(best_bssid_str, WIFI_BSSID_STR_LEN, MACSTR, MAC2STR(network->best_bss->bssid));
3658
3659         SUPPLICANT_DBG("current network [%p], Passed bss %s, best bss %s",
3660                         interface->current_network, curr_bssid_str, best_bssid_str);
3661
3662         if (network->frequency != bss->frequency) {
3663                 network->frequency = bss->frequency;
3664                 network->phy_mode = bss->phy_mode;
3665                 update = TRUE;
3666         }
3667 #endif
3668
3669         if (bss != network->best_bss) {
3670                 /*
3671                  * This is the case where either wpa_s got associated
3672                  * to a BSS different than the one ConnMan considers
3673                  * the best, or we are roaming.
3674                  */
3675                 SUPPLICANT_DBG("Update best BSS for %s", network->name);
3676
3677                 network->best_bss = bss;
3678
3679                 if (network->signal != bss->signal) {
3680                         SUPPLICANT_DBG("New network signal %d dBm",
3681                                                 bss->signal);
3682
3683                         network->signal = bss->signal;
3684                         callback_network_changed(network, "Signal");
3685 #if defined TIZEN_EXT
3686                         update = FALSE;
3687                 } else {
3688                         update = TRUE;
3689 #endif
3690                 }
3691         }
3692
3693 #if defined TIZEN_EXT
3694         if (update)
3695                 callback_network_changed(network, "");
3696 #endif
3697
3698         /*
3699          * wpa_s could notify about CurrentBSS in any state once
3700          * it got associated. It is not sure such notification will
3701          * arrive together with transition to ASSOCIATED state.
3702          * In fact, for networks with security WEP or OPEN, it
3703          * always arrives together with transition to COMPLETED.
3704          */
3705         switch (interface->state) {
3706         case G_SUPPLICANT_STATE_UNKNOWN:
3707         case G_SUPPLICANT_STATE_DISABLED:
3708         case G_SUPPLICANT_STATE_DISCONNECTED:
3709         case G_SUPPLICANT_STATE_INACTIVE:
3710         case G_SUPPLICANT_STATE_SCANNING:
3711         case G_SUPPLICANT_STATE_AUTHENTICATING:
3712         case G_SUPPLICANT_STATE_ASSOCIATING:
3713                 return;
3714         case G_SUPPLICANT_STATE_ASSOCIATED:
3715         case G_SUPPLICANT_STATE_4WAY_HANDSHAKE:
3716         case G_SUPPLICANT_STATE_GROUP_HANDSHAKE:
3717         case G_SUPPLICANT_STATE_COMPLETED:
3718                 callback_network_associated(network);
3719 #if defined TIZEN_EXT
3720                 if (TIZEN_INS_ENABLED)
3721                         add_timer_for_last_connected(interface);
3722 #endif
3723                 break;
3724         }
3725 }
3726
3727 static void interface_bss_removed(DBusMessageIter *iter, void *user_data)
3728 {
3729         GSupplicantInterface *interface = user_data;
3730         GSupplicantNetwork *network;
3731         struct g_supplicant_bss *bss = NULL;
3732         const char *path = NULL;
3733         bool is_current_network_bss = false;
3734
3735         dbus_message_iter_get_basic(iter, &path);
3736         if (!path)
3737                 return;
3738
3739         network = g_hash_table_lookup(interface->bss_mapping, path);
3740         if (!network)
3741                 return;
3742
3743         bss = g_hash_table_lookup(network->bss_table, path);
3744         if (network->best_bss == bss) {
3745                 network->best_bss = NULL;
3746                 network->signal = BSS_UNKNOWN_STRENGTH;
3747                 is_current_network_bss = true;
3748         }
3749
3750         g_hash_table_remove(bss_mapping, path);
3751
3752         g_hash_table_remove(interface->bss_mapping, path);
3753         g_hash_table_remove(network->bss_table, path);
3754
3755         update_network_signal(network);
3756
3757         if (g_hash_table_size(network->bss_table) == 0) {
3758                 g_hash_table_remove(interface->network_table, network->group);
3759         } else {
3760                 if (is_current_network_bss && network->best_bss)
3761 #if defined TIZEN_EXT
3762                         callback_network_changed(network, "CheckMultiBssidConnect");
3763 #else
3764                         callback_network_changed(network, "");
3765 #endif
3766         }
3767 }
3768
3769 static void set_config_methods(DBusMessageIter *iter, void *user_data)
3770 {
3771         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, user_data);
3772 }
3773
3774 static void wps_property(const char *key, DBusMessageIter *iter,
3775                                                         void *user_data)
3776 {
3777         GSupplicantInterface *interface = user_data;
3778
3779         if (!interface)
3780                 return;
3781 #if defined TIZEN_EXT
3782         if (!simplified_log)
3783 #endif
3784         SUPPLICANT_DBG("key: %s", key);
3785
3786         if (g_strcmp0(key, "ConfigMethods") == 0) {
3787                 const char *config_methods = "push_button", *str = NULL;
3788
3789                 dbus_message_iter_get_basic(iter, &str);
3790                 if (str && strlen(str) > 0) {
3791                         /* It was already set at wpa_s level, don't modify it. */
3792                         SUPPLICANT_DBG("%s", str);
3793                         return;
3794                 }
3795
3796                 supplicant_dbus_property_set(interface->path,
3797                         SUPPLICANT_INTERFACE ".Interface.WPS",
3798                         "ConfigMethods", DBUS_TYPE_STRING_AS_STRING,
3799                         set_config_methods, NULL, &config_methods, NULL);
3800
3801                 SUPPLICANT_DBG("No value. Set %s", config_methods);
3802         }
3803
3804 }
3805
3806 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
3807 void g_supplicant_replace_config_file(const char *ifname, const char *config_file)
3808 {
3809         if (!ifname)
3810                return;
3811
3812         if (!config_file)
3813                 return;
3814
3815         SUPPLICANT_DBG("New {%s, %s}", ifname, config_file);
3816         g_hash_table_replace(config_file_table,
3817                         g_strdup(ifname), g_strdup(config_file));
3818 }
3819 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
3820
3821 static void interface_property(const char *key, DBusMessageIter *iter,
3822                                                         void *user_data)
3823 {
3824         GSupplicantInterface *interface = user_data;
3825
3826         if (!interface)
3827                 return;
3828 #if defined TIZEN_EXT
3829         if (!simplified_log)
3830 #endif
3831         SUPPLICANT_DBG("%s", key);
3832
3833         if (!key) {
3834                 debug_strvalmap("KeyMgmt capability", keymgmt_map,
3835                                                 interface->keymgmt_capa);
3836                 debug_strvalmap("AuthAlg capability", authalg_capa_map,
3837                                                 interface->authalg_capa);
3838                 debug_strvalmap("Protocol capability", proto_capa_map,
3839                                                 interface->proto_capa);
3840                 debug_strvalmap("Pairwise capability", pairwise_map,
3841                                                 interface->pairwise_capa);
3842                 debug_strvalmap("Group capability", group_map,
3843                                                 interface->group_capa);
3844                 debug_strvalmap("Scan capability", scan_capa_map,
3845                                                 interface->scan_capa);
3846                 debug_strvalmap("Mode capability", mode_capa_map,
3847                                                 interface->mode_capa);
3848
3849                 supplicant_dbus_property_get_all(interface->path,
3850                                 SUPPLICANT_INTERFACE ".Interface.WPS",
3851                                 wps_property, interface, interface);
3852
3853                 if (interface->ready)
3854                         callback_interface_added(interface);
3855
3856                 return;
3857         }
3858
3859         if (g_strcmp0(key, "Capabilities") == 0) {
3860                 supplicant_dbus_property_foreach(iter, interface_capability,
3861                                                                 interface);
3862 #if !defined TIZEN_EXT
3863                 if (interface->mode_capa & G_SUPPLICANT_CAPABILITY_MODE_P2P)
3864                         interface->p2p_support = true;
3865 #endif
3866 #if defined TIZEN_EXT_WIFI_MESH
3867                 if (interface->mode_capa & G_SUPPLICANT_CAPABILITY_MODE_MESH)
3868                         interface->mesh_support = true;
3869 #endif
3870         } else if (g_strcmp0(key, "State") == 0) {
3871                 const char *str = NULL;
3872
3873                 dbus_message_iter_get_basic(iter, &str);
3874                 if (str)
3875                         if (string2state(str) != interface->state) {
3876                                 interface->state = string2state(str);
3877                                 callback_interface_state(interface);
3878                         }
3879 #if defined TIZEN_EXT
3880                 if (TIZEN_INS_ENABLED) {
3881                         switch (interface->state) {
3882                         case G_SUPPLICANT_STATE_COMPLETED:
3883                                 add_timer_for_last_connected(interface);
3884                                 break;
3885                         case G_SUPPLICANT_STATE_DISCONNECTED:
3886                                 remove_timer_for_last_connected(interface);
3887                                 break;
3888                         default:
3889                                 break;
3890                         }
3891                 }
3892 #endif
3893                 if (interface->ap_create_in_progress) {
3894                         if (interface->state == G_SUPPLICANT_STATE_DISCONNECTED)
3895                                 callback_ap_create_fail(interface);
3896
3897                         interface->ap_create_in_progress = false;
3898                 }
3899
3900                 if (interface->state == G_SUPPLICANT_STATE_DISABLED)
3901                         interface->ready = FALSE;
3902                 else
3903                         interface->ready = TRUE;
3904
3905                 SUPPLICANT_DBG("state %s (%d)", str, interface->state);
3906         } else if (g_strcmp0(key, "Scanning") == 0) {
3907                 dbus_bool_t scanning = FALSE;
3908
3909                 dbus_message_iter_get_basic(iter, &scanning);
3910                 interface->scanning = scanning;
3911
3912                 if (interface->ready) {
3913                         if (interface->scanning)
3914                                 callback_scan_started(interface);
3915                         else
3916                                 callback_scan_finished(interface);
3917                 }
3918         } else if (g_strcmp0(key, "ApScan") == 0) {
3919                 int apscan = 1;
3920
3921                 dbus_message_iter_get_basic(iter, &apscan);
3922                 interface->apscan = apscan;
3923         } else if (g_strcmp0(key, "Ifname") == 0) {
3924                 const char *str = NULL;
3925
3926                 dbus_message_iter_get_basic(iter, &str);
3927                 if (str) {
3928                         g_free(interface->ifname);
3929                         interface->ifname = g_strdup(str);
3930                 }
3931         } else if (g_strcmp0(key, "Driver") == 0) {
3932                 const char *str = NULL;
3933
3934                 dbus_message_iter_get_basic(iter, &str);
3935                 if (str) {
3936                         g_free(interface->driver);
3937                         interface->driver = g_strdup(str);
3938                 }
3939         } else if (g_strcmp0(key, "BridgeIfname") == 0) {
3940                 const char *str = NULL;
3941
3942                 dbus_message_iter_get_basic(iter, &str);
3943                 if (str) {
3944                         g_free(interface->bridge);
3945                         interface->bridge = g_strdup(str);
3946                 }
3947         } else if (g_strcmp0(key, "ConfigFile") == 0) {
3948                 const char *str = NULL;
3949
3950                 dbus_message_iter_get_basic(iter, &str);
3951                 if (str && strlen(str) > 0 && interface->ifname) {
3952                         SUPPLICANT_DBG("New {%s, %s}", interface->ifname, str);
3953                         g_hash_table_replace(config_file_table,
3954                                 g_strdup(interface->ifname), g_strdup(str));
3955                 }
3956         } else if (g_strcmp0(key, "CurrentBSS") == 0) {
3957                 interface_current_bss(interface, iter);
3958         } else if (g_strcmp0(key, "CurrentNetwork") == 0) {
3959 #if defined TIZEN_EXT
3960                 if (interface->state != G_SUPPLICANT_STATE_COMPLETED)
3961 #endif
3962                 interface_network_added(iter, interface);
3963         } else if (g_strcmp0(key, "BSSs") == 0) {
3964                 supplicant_dbus_array_foreach(iter,
3965                                         interface_bss_added_without_keys,
3966                                         interface);
3967         } else if (g_strcmp0(key, "Blobs") == 0) {
3968                 /* Nothing */
3969         } else if (g_strcmp0(key, "Networks") == 0) {
3970                 supplicant_dbus_array_foreach(iter, interface_network_added,
3971                                                                 interface);
3972         } else if (g_strcmp0(key, "DisconnectReason") == 0) {
3973                 int reason_code;
3974                 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
3975                         dbus_message_iter_get_basic(iter, &reason_code);
3976                         callback_disconnect_reason_code(interface, reason_code);
3977 #if defined TIZEN_EXT
3978                         SUPPLICANT_DBG("reason code (%d)", reason_code);
3979 #endif
3980                 }
3981         } else if (g_strcmp0(key, "AssocStatusCode") == 0) {
3982                 int status_code;
3983                 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
3984                         dbus_message_iter_get_basic(iter, &status_code);
3985                         callback_assoc_status_code(interface, status_code);
3986 #if defined TIZEN_EXT
3987                         SUPPLICANT_DBG("status code (%d)", status_code);
3988 #endif
3989                 }
3990         } else {
3991                 SUPPLICANT_DBG("key %s type %c",
3992                                 key, dbus_message_iter_get_arg_type(iter));
3993         }
3994 }
3995
3996 static void scan_network_update(DBusMessageIter *iter, void *user_data)
3997 {
3998         GSupplicantInterface *interface = user_data;
3999         GSupplicantNetwork *network;
4000         char *path;
4001
4002         if (!iter)
4003                 return;
4004
4005         dbus_message_iter_get_basic(iter, &path);
4006
4007         if (!path)
4008                 return;
4009
4010         if (g_strcmp0(path, "/") == 0)
4011                 return;
4012
4013         /* Update the network details based on scan BSS data */
4014         network = g_hash_table_lookup(interface->bss_mapping, path);
4015         if (network)
4016                 callback_network_added(network);
4017 }
4018
4019 static void scan_bss_data(const char *key, DBusMessageIter *iter,
4020                                 void *user_data)
4021 {
4022         GSupplicantInterface *interface = user_data;
4023
4024 /*Fixed : stucking in scanning state when scan failed*/
4025 #if defined TIZEN_EXT
4026         GSupplicantInterfaceCallback scan_callback;
4027         SUPPLICANT_DBG("");
4028 #endif
4029
4030         if (iter)
4031                 supplicant_dbus_array_foreach(iter, scan_network_update,
4032                                                 interface);
4033
4034 #if defined TIZEN_EXT
4035         scan_callback = interface->scan_callback;
4036         callback_scan_done(interface);
4037 #endif
4038
4039         if (interface->scan_callback)
4040                 interface->scan_callback(0, interface, interface->scan_data);
4041
4042 #if defined TIZEN_EXT
4043         if (interface->scan_callback == scan_callback) {
4044 #endif
4045         interface->scan_callback = NULL;
4046         interface->scan_data = NULL;
4047 #if defined TIZEN_EXT
4048         }
4049 #endif
4050 }
4051
4052 static GSupplicantInterface *interface_alloc(const char *path)
4053 {
4054         GSupplicantInterface *interface;
4055
4056         interface = g_try_new0(GSupplicantInterface, 1);
4057         if (!interface)
4058                 return NULL;
4059
4060         interface->path = g_strdup(path);
4061
4062         interface->network_table = g_hash_table_new_full(g_str_hash,
4063                                         g_str_equal, NULL, remove_network);
4064         interface->peer_table = g_hash_table_new_full(g_str_hash,
4065                                         g_str_equal, NULL, remove_peer);
4066         interface->group_table = g_hash_table_new_full(g_str_hash,
4067                                         g_str_equal, NULL, remove_group);
4068         interface->bss_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
4069                                                                 NULL, NULL);
4070
4071         g_hash_table_replace(interface_table, interface->path, interface);
4072
4073         return interface;
4074 }
4075
4076 static void interface_added(DBusMessageIter *iter, void *user_data)
4077 {
4078         GSupplicantInterface *interface;
4079         const char *path = NULL;
4080         bool properties_appended = GPOINTER_TO_UINT(user_data);
4081
4082         SUPPLICANT_DBG("");
4083
4084         dbus_message_iter_get_basic(iter, &path);
4085         if (!path)
4086                 return;
4087
4088         if (g_strcmp0(path, "/") == 0)
4089                 return;
4090
4091         interface = g_hash_table_lookup(interface_table, path);
4092         if (interface)
4093                 return;
4094
4095         interface = interface_alloc(path);
4096         if (!interface)
4097                 return;
4098
4099         if (!properties_appended) {
4100                 supplicant_dbus_property_get_all(path,
4101                                                 SUPPLICANT_INTERFACE ".Interface",
4102                                                 interface_property, interface,
4103                                                 interface);
4104                 return;
4105         }
4106
4107         dbus_message_iter_next(iter);
4108         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
4109                 supplicant_dbus_property_foreach(iter, interface_property,
4110                                                                 interface);
4111                 interface_property(NULL, NULL, interface);
4112         }
4113 }
4114
4115 static void interface_removed(DBusMessageIter *iter, void *user_data)
4116 {
4117         const char *path = NULL;
4118         GSupplicantInterface *interface = user_data;
4119
4120         dbus_message_iter_get_basic(iter, &path);
4121         if (!path)
4122                 return;
4123
4124         interface = g_hash_table_lookup(interface_table, path);
4125         g_supplicant_interface_cancel(interface);
4126
4127         g_hash_table_remove(interface_table, path);
4128 }
4129
4130 static void eap_method(DBusMessageIter *iter, void *user_data)
4131 {
4132         const char *str = NULL;
4133         int i;
4134
4135         dbus_message_iter_get_basic(iter, &str);
4136         if (!str)
4137                 return;
4138
4139         for (i = 0; eap_method_map[i].str; i++)
4140                 if (strcmp(str, eap_method_map[i].str) == 0) {
4141                         eap_methods |= eap_method_map[i].val;
4142                         break;
4143                 }
4144 }
4145
4146 static void service_property(const char *key, DBusMessageIter *iter,
4147                                                         void *user_data)
4148 {
4149         if (!key) {
4150                 callback_system_ready();
4151                 return;
4152         }
4153
4154         if (g_strcmp0(key, "DebugLevel") == 0) {
4155                 const char *str = NULL;
4156                 int i;
4157
4158                 dbus_message_iter_get_basic(iter, &str);
4159                 for (i = 0; debug_strings[i]; i++)
4160                         if (g_strcmp0(debug_strings[i], str) == 0) {
4161                                 debug_level = i;
4162                                 break;
4163                         }
4164                 SUPPLICANT_DBG("Debug level %d", debug_level);
4165         } else if (g_strcmp0(key, "DebugTimestamp") == 0) {
4166                 dbus_message_iter_get_basic(iter, &debug_timestamp);
4167                 SUPPLICANT_DBG("Debug timestamp %u", debug_timestamp);
4168         } else if (g_strcmp0(key, "DebugShowKeys") == 0) {
4169                 dbus_message_iter_get_basic(iter, &debug_showkeys);
4170                 SUPPLICANT_DBG("Debug show keys %u", debug_showkeys);
4171         } else if (g_strcmp0(key, "Interfaces") == 0) {
4172                 supplicant_dbus_array_foreach(iter, interface_added, NULL);
4173         } else if (g_strcmp0(key, "EapMethods") == 0) {
4174                 supplicant_dbus_array_foreach(iter, eap_method, NULL);
4175                 debug_strvalmap("EAP method", eap_method_map, eap_methods);
4176         } else if (g_strcmp0(key, "Country") == 0) {
4177                 const char *country = NULL;
4178
4179                 dbus_message_iter_get_basic(iter, &country);
4180                 SUPPLICANT_DBG("Country %s", country);
4181         } else
4182                 SUPPLICANT_DBG("key %s type %c",
4183                                 key, dbus_message_iter_get_arg_type(iter));
4184 }
4185
4186 static void signal_name_owner_changed(const char *path, DBusMessageIter *iter)
4187 {
4188         const char *name = NULL, *old = NULL, *new = NULL;
4189
4190         SUPPLICANT_DBG("");
4191
4192         if (g_strcmp0(path, DBUS_PATH_DBUS) != 0)
4193                 return;
4194
4195         dbus_message_iter_get_basic(iter, &name);
4196         if (!name)
4197                 return;
4198
4199         if (g_strcmp0(name, SUPPLICANT_SERVICE) != 0)
4200                 return;
4201
4202         dbus_message_iter_next(iter);
4203         dbus_message_iter_get_basic(iter, &old);
4204         dbus_message_iter_next(iter);
4205         dbus_message_iter_get_basic(iter, &new);
4206
4207         if (!old || !new)
4208                 return;
4209
4210         if (strlen(old) > 0 && strlen(new) == 0) {
4211                 system_available = FALSE;
4212                 g_hash_table_remove_all(bss_mapping);
4213                 g_hash_table_remove_all(peer_mapping);
4214                 g_hash_table_remove_all(group_mapping);
4215                 g_hash_table_remove_all(config_file_table);
4216                 g_hash_table_remove_all(interface_table);
4217                 callback_system_killed();
4218         }
4219
4220         if (strlen(new) > 0 && strlen(old) == 0) {
4221                 system_available = TRUE;
4222                 supplicant_dbus_property_get_all(SUPPLICANT_PATH,
4223                                                 SUPPLICANT_INTERFACE,
4224                                                 service_property, NULL, NULL);
4225         }
4226 }
4227
4228 static void signal_properties_changed(const char *path, DBusMessageIter *iter)
4229 {
4230         SUPPLICANT_DBG("");
4231
4232         if (g_strcmp0(path, SUPPLICANT_PATH) != 0)
4233                 return;
4234
4235         supplicant_dbus_property_foreach(iter, service_property, NULL);
4236 }
4237
4238 static void signal_interface_added(const char *path, DBusMessageIter *iter)
4239 {
4240         SUPPLICANT_DBG("path %s %s", path, SUPPLICANT_PATH);
4241
4242         if (g_strcmp0(path, SUPPLICANT_PATH) == 0)
4243                 interface_added(iter, GUINT_TO_POINTER(true));
4244 }
4245
4246 static void signal_interface_removed(const char *path, DBusMessageIter *iter)
4247 {
4248         SUPPLICANT_DBG("");
4249
4250         if (g_strcmp0(path, SUPPLICANT_PATH) == 0)
4251                 interface_removed(iter, NULL);
4252 }
4253
4254 static void signal_interface_changed(const char *path, DBusMessageIter *iter)
4255 {
4256         GSupplicantInterface *interface;
4257 #if defined TIZEN_EXT
4258         if (!simplified_log)
4259 #endif
4260         SUPPLICANT_DBG("");
4261
4262         interface = g_hash_table_lookup(interface_table, path);
4263         if (!interface)
4264                 return;
4265
4266         supplicant_dbus_property_foreach(iter, interface_property, interface);
4267 }
4268
4269 static void signal_scan_done(const char *path, DBusMessageIter *iter)
4270 {
4271         GSupplicantInterface *interface;
4272         dbus_bool_t success = FALSE;
4273
4274         SUPPLICANT_DBG("");
4275
4276         interface = g_hash_table_lookup(interface_table, path);
4277         if (!interface)
4278                 return;
4279
4280         dbus_message_iter_get_basic(iter, &success);
4281
4282         if (interface->scanning) {
4283                 callback_scan_finished(interface);
4284                 interface->scanning = FALSE;
4285         }
4286
4287         /*
4288          * If scan is unsuccessful return -EIO else get the scanned BSSs
4289          * and update the network details accordingly
4290          */
4291         if (!success) {
4292                 if (interface->scan_callback)
4293                         interface->scan_callback(-EIO, interface,
4294                                                 interface->scan_data);
4295
4296                 interface->scan_callback = NULL;
4297                 interface->scan_data = NULL;
4298
4299                 return;
4300         }
4301
4302         supplicant_dbus_property_get(path, SUPPLICANT_INTERFACE ".Interface",
4303                                 "BSSs", scan_bss_data, interface, interface);
4304 }
4305
4306 static void signal_bss_added(const char *path, DBusMessageIter *iter)
4307 {
4308         GSupplicantInterface *interface;
4309 #if defined TIZEN_EXT
4310         if (!simplified_log)
4311 #endif
4312         SUPPLICANT_DBG("");
4313
4314         interface = g_hash_table_lookup(interface_table, path);
4315         if (!interface)
4316                 return;
4317
4318         interface_bss_added_with_keys(iter, interface);
4319 }
4320
4321 static void signal_bss_removed(const char *path, DBusMessageIter *iter)
4322 {
4323         GSupplicantInterface *interface;
4324
4325         SUPPLICANT_DBG("");
4326
4327         interface = g_hash_table_lookup(interface_table, path);
4328         if (!interface)
4329                 return;
4330
4331         interface_bss_removed(iter, interface);
4332 }
4333
4334 static void signal_network_added(const char *path, DBusMessageIter *iter)
4335 {
4336         GSupplicantInterface *interface;
4337
4338         SUPPLICANT_DBG("");
4339
4340         interface = g_hash_table_lookup(interface_table, path);
4341         if (!interface)
4342                 return;
4343
4344         interface_network_added(iter, interface);
4345 }
4346
4347 static void signal_network_removed(const char *path, DBusMessageIter *iter)
4348 {
4349         GSupplicantInterface *interface;
4350
4351         SUPPLICANT_DBG("");
4352
4353         interface = g_hash_table_lookup(interface_table, path);
4354         if (!interface)
4355                 return;
4356
4357         interface_network_removed(iter, interface);
4358 }
4359 #if defined TIZEN_EXT
4360 void *copy_vsie_list(gconstpointer src, gpointer data)
4361 {
4362         return g_strdup(src);
4363 }
4364 #endif
4365
4366
4367 static void signal_sta_authorized(const char *path, DBusMessageIter *iter)
4368 {
4369         GSupplicantInterface *interface;
4370         const char *addr = NULL;
4371
4372         SUPPLICANT_DBG("");
4373
4374         interface = g_hash_table_lookup(interface_table, path);
4375         if (!interface)
4376                 return;
4377
4378         dbus_message_iter_get_basic(iter, &addr);
4379         if (!addr)
4380                 return;
4381
4382         callback_sta_authorized(interface, addr);
4383 }
4384
4385 static void signal_sta_deauthorized(const char *path, DBusMessageIter *iter)
4386 {
4387         GSupplicantInterface *interface;
4388         const char *addr = NULL;
4389
4390         SUPPLICANT_DBG("");
4391
4392         interface = g_hash_table_lookup(interface_table, path);
4393         if (!interface)
4394                 return;
4395
4396         dbus_message_iter_get_basic(iter, &addr);
4397         if (!addr)
4398                 return;
4399
4400         callback_sta_deauthorized(interface, addr);
4401 }
4402
4403 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
4404 static void signal_eap(const char *path, DBusMessageIter *iter)
4405 {
4406         GSupplicantInterface *interface;
4407         const char *str = NULL;
4408
4409         SUPPLICANT_DBG("EAPOL_DEBUG callback eap signal");
4410
4411         interface = g_hash_table_lookup(interface_table, path);
4412         if (!interface)
4413                 return;
4414
4415         // TODO: Identify EAP fail condition, currently timeout is used for failure.
4416
4417         dbus_message_iter_get_basic(iter, &str);
4418         if (!str)
4419                 return;
4420
4421         if (g_strcmp0("completion", str))
4422                 return;
4423
4424         dbus_message_iter_next(iter);
4425
4426         dbus_message_iter_get_basic(iter, &str);
4427         if (!str)
4428                 return;
4429
4430         if (!g_strcmp0("success", str))
4431                 callback_eap(interface, true);
4432         else
4433                 callback_eap(interface, false);
4434 }
4435 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
4436
4437 static void signal_bss_changed(const char *path, DBusMessageIter *iter)
4438 {
4439         GSupplicantInterface *interface;
4440         GSupplicantNetwork *network;
4441         GSupplicantSecurity old_security;
4442         unsigned int old_wps_capabilities;
4443         struct g_supplicant_bss *bss;
4444
4445 #if defined TIZEN_EXT
4446         if (!simplified_log)
4447 #endif
4448         SUPPLICANT_DBG("");
4449
4450         interface = g_hash_table_lookup(bss_mapping, path);
4451         if (!interface)
4452                 return;
4453
4454         network = g_hash_table_lookup(interface->bss_mapping, path);
4455         if (!network)
4456                 return;
4457
4458         bss = g_hash_table_lookup(network->bss_table, path);
4459         if (!bss)
4460                 return;
4461
4462         supplicant_dbus_property_foreach(iter, bss_property, bss);
4463
4464 #if defined TIZEN_EXT
4465         if (network->interface->state != G_SUPPLICANT_STATE_COMPLETED &&
4466                         bss == network->best_bss) {
4467                 network->frequency = bss->frequency;
4468                 network->phy_mode = bss->phy_mode;
4469         }
4470 #endif
4471         old_security = network->security;
4472         bss_compute_security(bss);
4473
4474         if (old_security != bss->security) {
4475                 struct g_supplicant_bss *new_bss;
4476
4477                 SUPPLICANT_DBG("New network security for %s with path %s",
4478                                bss->ssid, bss->path);
4479
4480                 /*
4481                  * Security change policy:
4482                  * - We first copy the current bss into a new one with
4483                  *   its own pointer (path)
4484                  * - Clear the old bss pointer and remove the network completely
4485                  *   if there are no more BSSs in the bss table.
4486                  * - The new bss will be added either to an existing network
4487                  *   or an additional network will be created
4488                  */
4489
4490                 new_bss = g_try_new0(struct g_supplicant_bss, 1);
4491                 if (!new_bss)
4492                         return;
4493
4494                 memcpy(new_bss, bss, sizeof(struct g_supplicant_bss));
4495                 new_bss->path = g_strdup(bss->path);
4496 #if defined TIZEN_EXT
4497                 new_bss->vsie_list = g_slist_copy_deep(bss->vsie_list, copy_vsie_list, NULL);
4498 #endif
4499
4500                 if (network->best_bss == bss) {
4501                         network->best_bss = NULL;
4502                         network->signal = BSS_UNKNOWN_STRENGTH;
4503                 }
4504
4505                 g_hash_table_remove(bss_mapping, path);
4506
4507                 g_hash_table_remove(interface->bss_mapping, path);
4508                 g_hash_table_remove(network->bss_table, path);
4509
4510                 update_network_signal(network);
4511
4512                 if (g_hash_table_size(network->bss_table) == 0)
4513                         g_hash_table_remove(interface->network_table,
4514                                             network->group);
4515
4516                 if (add_or_replace_bss_to_network(new_bss) < 0) {
4517                         /*
4518                          * Prevent a memory leak on failure in
4519                          * add_or_replace_bss_to_network
4520                          */
4521                         SUPPLICANT_DBG("Failed to add bss %s to network table",
4522                                        new_bss->path);
4523                         g_free(new_bss->path);
4524                         g_free(new_bss);
4525                 }
4526
4527                 return;
4528         }
4529
4530         old_wps_capabilities = network->wps_capabilities;
4531
4532         if (old_wps_capabilities != bss->wps_capabilities) {
4533                 network->wps_capabilities = bss->wps_capabilities;
4534                 callback_network_changed(network, "WPSCapabilities");
4535         }
4536
4537 #if defined TIZEN_EXT
4538         if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
4539                 network->wps = TRUE;
4540                 network->wps_capabilities |= bss->wps_capabilities;
4541         } else
4542                 network->wps = FALSE;
4543 #endif
4544
4545         /* Consider only property changes of the connected BSS */
4546         if (network == interface->current_network && bss != network->best_bss)
4547                 return;
4548
4549         if (bss->signal == network->signal)
4550 #ifndef TIZEN_EXT
4551                 return;
4552 #else
4553         {
4554                 callback_network_changed(network, "");
4555                 return;
4556         }
4557 #endif
4558
4559         /*
4560          * If the new signal is lower than the SSID signal, we need
4561          * to check for the new maximum.
4562          */
4563 #if defined TIZEN_EXT
4564         if (!update_best_bss(network, bss, network->best_bss)) {
4565                 if (bss != network->best_bss) {
4566                         callback_network_changed(network, "");
4567                         return;
4568                 }
4569
4570                 network->signal = bss->signal;
4571                 update_network_signal(network);
4572         }
4573 #else
4574         if (bss->signal < network->signal) {
4575                 if (bss != network->best_bss)
4576                         return;
4577
4578                 network->signal = bss->signal;
4579                 update_network_signal(network);
4580         } else {
4581                 network->signal = bss->signal;
4582                 network->best_bss = bss;
4583         }
4584 #endif
4585
4586         SUPPLICANT_DBG("New network signal for %s %d dBm", network->ssid,
4587                         network->signal);
4588
4589         callback_network_changed(network, "Signal");
4590 }
4591
4592 static void wps_credentials(const char *key, DBusMessageIter *iter,
4593                         void *user_data)
4594 {
4595         GSupplicantInterface *interface = user_data;
4596
4597         if (!key)
4598                 return;
4599
4600         SUPPLICANT_DBG("key %s", key);
4601
4602         if (g_strcmp0(key, "Key") == 0) {
4603                 DBusMessageIter array;
4604                 unsigned char *key_val;
4605                 int key_len;
4606
4607                 dbus_message_iter_recurse(iter, &array);
4608                 dbus_message_iter_get_fixed_array(&array, &key_val, &key_len);
4609
4610                 g_free(interface->wps_cred.key);
4611                 interface->wps_cred.key = g_try_malloc0(
4612                                                 sizeof(char) * key_len + 1);
4613
4614                 if (!interface->wps_cred.key)
4615                         return;
4616
4617                 memcpy(interface->wps_cred.key, key_val,
4618                                                 sizeof(char) * key_len);
4619
4620                 SUPPLICANT_DBG("WPS key present");
4621         } else if (g_strcmp0(key, "SSID") == 0) {
4622                 DBusMessageIter array;
4623                 unsigned char *ssid;
4624                 int ssid_len;
4625
4626                 dbus_message_iter_recurse(iter, &array);
4627                 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
4628
4629                 if (ssid_len > 0 && ssid_len < 33) {
4630                         memcpy(interface->wps_cred.ssid, ssid, ssid_len);
4631                         interface->wps_cred.ssid_len = ssid_len;
4632                 } else {
4633                         memset(interface->wps_cred.ssid, 0, 32);
4634                         interface->wps_cred.ssid_len = 0;
4635                 }
4636         }
4637 }
4638
4639 static void signal_wps_credentials(const char *path, DBusMessageIter *iter)
4640 {
4641         GSupplicantInterface *interface;
4642
4643         SUPPLICANT_DBG("");
4644
4645         interface = g_hash_table_lookup(interface_table, path);
4646         if (!interface)
4647                 return;
4648
4649         supplicant_dbus_property_foreach(iter, wps_credentials, interface);
4650 }
4651
4652 static void wps_event_args(const char *key, DBusMessageIter *iter,
4653                         void *user_data)
4654 {
4655         GSupplicantInterface *interface = user_data;
4656
4657         if (!key || !interface)
4658                 return;
4659
4660         SUPPLICANT_DBG("Arg Key %s", key);
4661 }
4662
4663 static void signal_wps_event(const char *path, DBusMessageIter *iter)
4664 {
4665         GSupplicantInterface *interface;
4666         const char *name = NULL;
4667
4668         SUPPLICANT_DBG("");
4669
4670         interface = g_hash_table_lookup(interface_table, path);
4671         if (!interface)
4672                 return;
4673
4674         dbus_message_iter_get_basic(iter, &name);
4675
4676         SUPPLICANT_DBG("Name: %s", name);
4677
4678         if (g_strcmp0(name, "success") == 0)
4679                 interface->wps_state = G_SUPPLICANT_WPS_STATE_SUCCESS;
4680         else if (g_strcmp0(name, "fail") == 0)
4681                 interface->wps_state = G_SUPPLICANT_WPS_STATE_FAIL;
4682         else
4683                 interface->wps_state = G_SUPPLICANT_WPS_STATE_UNKNOWN;
4684
4685         if (!dbus_message_iter_has_next(iter))
4686                 return;
4687
4688         dbus_message_iter_next(iter);
4689
4690         supplicant_dbus_property_foreach(iter, wps_event_args, interface);
4691 }
4692
4693 #if defined TIZEN_EXT
4694 static void signal_power_off(const char *path, DBusMessageIter *iter)
4695 {
4696         int poweroff_state = 0;
4697
4698         dbus_message_iter_get_basic(iter, &poweroff_state);
4699
4700         SUPPLICANT_DBG("poweroff_state(%d)", poweroff_state);
4701
4702         /* POWER_OFF_DIRECT 2 && POWER_OFF_RESTART 3 */
4703         if (poweroff_state != 2 && poweroff_state != 3)
4704                 return;
4705
4706         if (callbacks_pointer == NULL)
4707                 return;
4708
4709         if (callbacks_pointer->system_power_off == NULL)
4710                 return;
4711
4712         callbacks_pointer->system_power_off();
4713 }
4714 #endif
4715
4716 static void create_peer_identifier(GSupplicantPeer *peer)
4717 {
4718         const unsigned char test[ETH_ALEN] = {};
4719
4720         if (!peer)
4721                 return;
4722
4723         if (!memcmp(peer->device_address, test, ETH_ALEN)) {
4724                 peer->identifier = g_strdup(peer->name);
4725                 return;
4726         }
4727
4728         peer->identifier = g_malloc0(19);
4729         snprintf(peer->identifier, 19, "%02x%02x%02x%02x%02x%02x",
4730                                                 peer->device_address[0],
4731                                                 peer->device_address[1],
4732                                                 peer->device_address[2],
4733                                                 peer->device_address[3],
4734                                                 peer->device_address[4],
4735                                                 peer->device_address[5]);
4736 }
4737
4738 struct peer_property_data {
4739         GSupplicantPeer *peer;
4740         GSList *old_groups;
4741         bool groups_changed;
4742         bool services_changed;
4743 };
4744
4745 static void peer_groups_relation(DBusMessageIter *iter, void *user_data)
4746 {
4747         struct peer_property_data *data = user_data;
4748         GSupplicantPeer *peer = data->peer;
4749         GSupplicantGroup *group;
4750         const char *str = NULL;
4751         GSList *elem;
4752
4753         dbus_message_iter_get_basic(iter, &str);
4754         if (!str)
4755                 return;
4756
4757         group = g_hash_table_lookup(group_mapping, str);
4758         if (!group)
4759                 return;
4760
4761         elem = g_slist_find_custom(data->old_groups, str, (GCompareFunc)g_strcmp0);
4762         if (elem) {
4763                 data->old_groups = g_slist_remove_link(data->old_groups, elem);
4764                 peer->groups = g_slist_concat(elem, peer->groups);
4765         } else {
4766                 peer->groups = g_slist_prepend(peer->groups, g_strdup(str));
4767                 data->groups_changed = true;
4768         }
4769 }
4770
4771 static void peer_property(const char *key, DBusMessageIter *iter,
4772                                                         void *user_data)
4773 {
4774         GSupplicantPeer *pending_peer;
4775         struct peer_property_data *data = user_data;
4776         GSupplicantPeer *peer = data->peer;
4777
4778         SUPPLICANT_DBG("key: %s", key);
4779
4780         if (!peer->interface)
4781                 return;
4782
4783         if (!key) {
4784                 if (peer->name) {
4785                         create_peer_identifier(peer);
4786                         callback_peer_found(peer);
4787                         pending_peer = g_hash_table_lookup(
4788                                         pending_peer_connection, peer->path);
4789
4790                         if (pending_peer && pending_peer == peer) {
4791                                 callback_peer_request(peer);
4792                                 g_hash_table_remove(pending_peer_connection,
4793                                                 peer->path);
4794                         }
4795
4796                         dbus_free(data);
4797                 }
4798
4799                 return;
4800         }
4801
4802         if (g_strcmp0(key, "DeviceAddress") == 0) {
4803                 unsigned char *dev_addr;
4804                 DBusMessageIter array;
4805                 int len;
4806
4807                 dbus_message_iter_recurse(iter, &array);
4808                 dbus_message_iter_get_fixed_array(&array, &dev_addr, &len);
4809
4810                 if (len == ETH_ALEN)
4811                         memcpy(peer->device_address, dev_addr, len);
4812         } else if (g_strcmp0(key, "DeviceName") == 0) {
4813                 const char *str = NULL;
4814
4815                 dbus_message_iter_get_basic(iter, &str);
4816                 if (str)
4817                         peer->name = g_strdup(str);
4818         } else if (g_strcmp0(key, "config_method") == 0) {
4819                 uint16_t wps_config;
4820
4821                 dbus_message_iter_get_basic(iter, &wps_config);
4822
4823                 if (wps_config & G_SUPPLICANT_WPS_CONFIG_PBC)
4824                         peer->wps_capabilities |= G_SUPPLICANT_WPS_PBC;
4825                 if (wps_config & ~G_SUPPLICANT_WPS_CONFIG_PBC)
4826                         peer->wps_capabilities |= G_SUPPLICANT_WPS_PIN;
4827         } else if (g_strcmp0(key, "Groups") == 0) {
4828                 data->old_groups = peer->groups;
4829                 peer->groups = NULL;
4830
4831                 supplicant_dbus_array_foreach(iter,
4832                                                 peer_groups_relation, data);
4833                 if (g_slist_length(data->old_groups) > 0) {
4834                         g_slist_free_full(data->old_groups, g_free);
4835                         data->groups_changed = true;
4836                 }
4837         } else if (g_strcmp0(key, "IEs") == 0) {
4838                 DBusMessageIter array;
4839                 unsigned char *ie;
4840                 int ie_len;
4841
4842                 dbus_message_iter_recurse(iter, &array);
4843                 dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
4844
4845                 if (!ie || ie_len < 2)
4846                         return;
4847
4848                 if (peer->widi_ies) {
4849                         if (memcmp(peer->widi_ies, ie, ie_len) == 0)
4850                                 return;
4851
4852                         g_free(peer->widi_ies);
4853                         peer->widi_ies_length = 0;
4854                 }
4855
4856                 peer->widi_ies = g_malloc0(ie_len * sizeof(unsigned char));
4857
4858                 memcpy(peer->widi_ies, ie, ie_len);
4859                 peer->widi_ies_length = ie_len;
4860                 data->services_changed = true;
4861         }
4862 }
4863
4864 static void signal_peer_found(const char *path, DBusMessageIter *iter)
4865 {
4866         struct peer_property_data *property_data;
4867         GSupplicantInterface *interface;
4868         const char *obj_path = NULL;
4869         GSupplicantPeer *peer;
4870
4871         SUPPLICANT_DBG("");
4872
4873         interface = g_hash_table_lookup(interface_table, path);
4874         if (!interface)
4875                 return;
4876
4877         dbus_message_iter_get_basic(iter, &obj_path);
4878         if (!obj_path || g_strcmp0(obj_path, "/") == 0)
4879                 return;
4880
4881         peer = g_hash_table_lookup(interface->peer_table, obj_path);
4882         if (peer)
4883                 return;
4884
4885         peer = g_try_new0(GSupplicantPeer, 1);
4886         if (!peer)
4887                 return;
4888
4889         peer->interface = interface;
4890         peer->path = g_strdup(obj_path);
4891         g_hash_table_insert(interface->peer_table, peer->path, peer);
4892         g_hash_table_replace(peer_mapping, peer->path, interface);
4893
4894         property_data = dbus_malloc0(sizeof(struct peer_property_data));
4895         property_data->peer = peer;
4896
4897         dbus_message_iter_next(iter);
4898         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
4899                 supplicant_dbus_property_foreach(iter, peer_property,
4900                                                         property_data);
4901                 peer_property(NULL, NULL, property_data);
4902                 return;
4903         }
4904
4905         supplicant_dbus_property_get_all(obj_path,
4906                                         SUPPLICANT_INTERFACE ".Peer",
4907                                         peer_property, property_data, NULL);
4908 }
4909
4910 static void signal_peer_lost(const char *path, DBusMessageIter *iter)
4911 {
4912         GSupplicantInterface *interface;
4913         const char *obj_path = NULL;
4914         GSupplicantPeer *peer;
4915
4916         SUPPLICANT_DBG("");
4917
4918         interface = g_hash_table_lookup(interface_table, path);
4919         if (!interface)
4920                 return;
4921
4922         dbus_message_iter_get_basic(iter, &obj_path);
4923         if (!obj_path || g_strcmp0(obj_path, "/") == 0)
4924                 return;
4925
4926         peer = g_hash_table_lookup(interface->peer_table, obj_path);
4927         if (!peer)
4928                 return;
4929
4930         g_hash_table_remove(interface->peer_table, obj_path);
4931 }
4932
4933 static void signal_peer_changed(const char *path, DBusMessageIter *iter)
4934 {
4935         struct peer_property_data *property_data;
4936         GSupplicantInterface *interface;
4937         GSupplicantPeer *peer;
4938
4939         SUPPLICANT_DBG("");
4940
4941         interface = g_hash_table_lookup(peer_mapping, path);
4942         if (!interface)
4943                 return;
4944
4945         peer = g_hash_table_lookup(interface->peer_table, path);
4946         if (!peer) {
4947                 g_hash_table_remove(peer_mapping, path);
4948                 return;
4949         }
4950
4951         property_data = dbus_malloc0(sizeof(struct peer_property_data));
4952         property_data->peer = peer;
4953
4954         supplicant_dbus_property_foreach(iter, peer_property, property_data);
4955         if (property_data->services_changed)
4956                 callback_peer_changed(peer,
4957                                         G_SUPPLICANT_PEER_SERVICES_CHANGED);
4958
4959         if (property_data->groups_changed)
4960                 callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_CHANGED);
4961
4962         dbus_free(property_data);
4963
4964         if (!g_supplicant_peer_is_in_a_group(peer))
4965                 peer->connection_requested = false;
4966 }
4967
4968 struct group_sig_data {
4969         const char *peer_obj_path;
4970         unsigned char iface_address[ETH_ALEN];
4971         const char *interface_obj_path;
4972         const char *group_obj_path;
4973         int role;
4974 };
4975
4976 static void group_sig_property(const char *key, DBusMessageIter *iter,
4977                                                         void *user_data)
4978 {
4979         struct group_sig_data *data = user_data;
4980
4981         if (!key)
4982                 return;
4983
4984         if (g_strcmp0(key, "peer_interface_addr") == 0) {
4985                 unsigned char *dev_addr;
4986                 DBusMessageIter array;
4987                 int len;
4988
4989                 dbus_message_iter_recurse(iter, &array);
4990                 dbus_message_iter_get_fixed_array(&array, &dev_addr, &len);
4991
4992                 if (len == ETH_ALEN)
4993                         memcpy(data->iface_address, dev_addr, len);
4994         } else if (g_strcmp0(key, "role") == 0) {
4995                 const char *str = NULL;
4996
4997                 dbus_message_iter_get_basic(iter, &str);
4998                 if (g_strcmp0(str, "GO") == 0)
4999                         data->role = G_SUPPLICANT_GROUP_ROLE_GO;
5000                 else
5001                         data->role = G_SUPPLICANT_GROUP_ROLE_CLIENT;
5002         } else if (g_strcmp0(key, "peer_object") == 0)
5003                 dbus_message_iter_get_basic(iter, &data->peer_obj_path);
5004         else if (g_strcmp0(key, "interface_object") == 0)
5005                 dbus_message_iter_get_basic(iter, &data->interface_obj_path);
5006         else if (g_strcmp0(key, "group_object") == 0)
5007                 dbus_message_iter_get_basic(iter, &data->group_obj_path);
5008
5009 }
5010
5011 static void signal_group_success(const char *path, DBusMessageIter *iter)
5012 {
5013         GSupplicantInterface *interface;
5014         struct group_sig_data data = {};
5015         GSupplicantPeer *peer;
5016
5017         SUPPLICANT_DBG("");
5018
5019         interface = g_hash_table_lookup(interface_table, path);
5020         if (!interface)
5021                 return;
5022
5023         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
5024         if (!data.peer_obj_path)
5025                 return;
5026
5027         peer = g_hash_table_lookup(interface->peer_table, data.peer_obj_path);
5028         if (!peer)
5029                 return;
5030
5031         memcpy(peer->iface_address, data.iface_address, ETH_ALEN);
5032         interface->pending_peer_path = peer->path;
5033 }
5034
5035 static void signal_group_failure(const char *path, DBusMessageIter *iter)
5036 {
5037         GSupplicantInterface *interface;
5038         struct group_sig_data data = {};
5039         GSupplicantPeer *peer;
5040
5041         SUPPLICANT_DBG("");
5042
5043         interface = g_hash_table_lookup(interface_table, path);
5044         if (!interface)
5045                 return;
5046
5047         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
5048         if (!data.peer_obj_path)
5049                 return;
5050
5051         peer = g_hash_table_lookup(interface->peer_table, data.peer_obj_path);
5052         if (!peer)
5053                 return;
5054
5055         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_FAILED);
5056         peer->connection_requested = false;
5057 }
5058
5059 static void signal_group_started(const char *path, DBusMessageIter *iter)
5060 {
5061         GSupplicantInterface *interface, *g_interface;
5062         struct group_sig_data data = {};
5063         GSupplicantGroup *group;
5064         GSupplicantPeer *peer;
5065
5066         SUPPLICANT_DBG("");
5067
5068         interface = g_hash_table_lookup(interface_table, path);
5069         if (!interface)
5070                 return;
5071
5072         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
5073         if (!data.interface_obj_path || !data.group_obj_path)
5074                 return;
5075
5076         peer = g_hash_table_lookup(interface->peer_table,
5077                                                 interface->pending_peer_path);
5078         interface->pending_peer_path = NULL;
5079         if (!peer)
5080                 return;
5081
5082         g_interface = g_hash_table_lookup(interface_table,
5083                                                 data.interface_obj_path);
5084         if (!g_interface)
5085                 return;
5086
5087         group = g_hash_table_lookup(interface->group_table,
5088                                                 data.group_obj_path);
5089         if (group)
5090                 return;
5091
5092         group = g_try_new0(GSupplicantGroup, 1);
5093         if (!group)
5094                 return;
5095
5096         group->interface = g_interface;
5097         group->orig_interface = interface;
5098         group->path = g_strdup(data.group_obj_path);
5099         group->role = data.role;
5100
5101         g_hash_table_insert(interface->group_table, group->path, group);
5102         g_hash_table_replace(group_mapping, group->path, group);
5103
5104         peer->current_group_iface = g_interface;
5105         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_STARTED);
5106 }
5107
5108 static void remove_peer_group_interface(GHashTable *group_table,
5109                                 const char* path)
5110 {
5111         GSupplicantGroup *group;
5112         GHashTableIter iter;
5113         gpointer value, key;
5114
5115         if (!group_table)
5116                 return;
5117
5118         group = g_hash_table_lookup(group_table, path);
5119
5120         if (!group || !group->orig_interface)
5121                 return;
5122
5123         g_hash_table_iter_init(&iter, group->orig_interface->peer_table);
5124
5125         while (g_hash_table_iter_next(&iter, &key, &value)) {
5126                 GSupplicantPeer *peer = value;
5127
5128                 if (peer->current_group_iface == group->interface)
5129                         peer->current_group_iface = NULL;
5130         }
5131 }
5132
5133 static void signal_group_finished(const char *path, DBusMessageIter *iter)
5134 {
5135         GSupplicantInterface *interface;
5136         struct group_sig_data data = {};
5137
5138         SUPPLICANT_DBG("");
5139
5140         interface = g_hash_table_lookup(interface_table, path);
5141         if (!interface)
5142                 return;
5143
5144         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
5145         if (!data.interface_obj_path || !data.group_obj_path)
5146                 return;
5147
5148         remove_peer_group_interface(interface->group_table, data.group_obj_path);
5149
5150         g_hash_table_remove(group_mapping, data.group_obj_path);
5151
5152         g_hash_table_remove(interface->group_table, data.group_obj_path);
5153 }
5154
5155 static void signal_group_request(const char *path, DBusMessageIter *iter)
5156 {
5157         GSupplicantInterface *interface;
5158         GSupplicantPeer *peer;
5159         const char *obj_path;
5160
5161         SUPPLICANT_DBG("");
5162
5163         interface = g_hash_table_lookup(interface_table, path);
5164         if (!interface)
5165                 return;
5166
5167         dbus_message_iter_get_basic(iter, &obj_path);
5168         if (!obj_path || !g_strcmp0(obj_path, "/"))
5169                 return;
5170
5171         peer = g_hash_table_lookup(interface->peer_table, obj_path);
5172         if (!peer)
5173                 return;
5174
5175         /*
5176          * Peer has been previously found and property set,
5177          * otherwise, defer connection to when peer property
5178          * is set.
5179          */
5180         if (peer->identifier)
5181                 callback_peer_request(peer);
5182         else
5183                 g_hash_table_replace(pending_peer_connection, peer->path, peer);
5184 }
5185
5186 static void signal_group_peer_joined(const char *path, DBusMessageIter *iter)
5187 {
5188         const char *peer_path = NULL;
5189         GSupplicantInterface *interface;
5190         GSupplicantGroup *group;
5191         GSupplicantPeer *peer;
5192
5193         SUPPLICANT_DBG("");
5194
5195         group = g_hash_table_lookup(group_mapping, path);
5196         if (!group)
5197                 return;
5198
5199         dbus_message_iter_get_basic(iter, &peer_path);
5200         if (!peer_path)
5201                 return;
5202
5203         interface = g_hash_table_lookup(peer_mapping, peer_path);
5204         if (!interface)
5205                 return;
5206
5207         peer = g_hash_table_lookup(interface->peer_table, peer_path);
5208         if (!peer)
5209                 return;
5210
5211         group->members = g_slist_prepend(group->members, g_strdup(peer_path));
5212
5213         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_JOINED);
5214 }
5215
5216 static void signal_group_peer_disconnected(const char *path, DBusMessageIter *iter)
5217 {
5218         const char *peer_path = NULL;
5219         GSupplicantInterface *interface;
5220         GSupplicantGroup *group;
5221         GSupplicantPeer *peer;
5222         GSList *elem;
5223
5224         SUPPLICANT_DBG("");
5225
5226         group = g_hash_table_lookup(group_mapping, path);
5227         if (!group)
5228                 return;
5229
5230         dbus_message_iter_get_basic(iter, &peer_path);
5231         if (!peer_path)
5232                 return;
5233
5234         for (elem = group->members; elem; elem = elem->next) {
5235                 if (!g_strcmp0(elem->data, peer_path))
5236                         break;
5237         }
5238
5239         if (!elem)
5240                 return;
5241
5242         g_free(elem->data);
5243         group->members = g_slist_delete_link(group->members, elem);
5244
5245         interface = g_hash_table_lookup(peer_mapping, peer_path);
5246         if (!interface)
5247                 return;
5248
5249         peer = g_hash_table_lookup(interface->peer_table, peer_path);
5250         if (!peer)
5251                 return;
5252
5253         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_DISCONNECTED);
5254         peer->connection_requested = false;
5255 }
5256
5257 #if defined TIZEN_EXT_WIFI_MESH
5258 const void *g_supplicant_interface_get_mesh_group_ssid(
5259                                                         GSupplicantInterface *interface,
5260                                                         unsigned int *ssid_len)
5261 {
5262         if (!ssid_len)
5263                 return NULL;
5264
5265         if (!interface || interface->group_info.ssid_len == 0) {
5266                 *ssid_len = 0;
5267                 return NULL;
5268         }
5269
5270         *ssid_len = interface->group_info.ssid_len;
5271         return interface->group_info.ssid;
5272 }
5273
5274 int g_supplicant_mesh_get_disconnect_reason(GSupplicantInterface *interface)
5275 {
5276         if (!interface)
5277                 return -EINVAL;
5278
5279         return interface->group_info.disconnect_reason;
5280 }
5281
5282 const char *g_supplicant_mesh_peer_get_address(GSupplicantMeshPeer *mesh_peer)
5283 {
5284         if (!mesh_peer || !mesh_peer->peer_address)
5285                 return NULL;
5286
5287         return mesh_peer->peer_address;
5288 }
5289
5290 int g_supplicant_mesh_peer_get_disconnect_reason(GSupplicantMeshPeer *mesh_peer)
5291 {
5292         if (!mesh_peer)
5293                 return -EINVAL;
5294
5295         return mesh_peer->disconnect_reason;
5296 }
5297
5298 static void callback_mesh_group_started(GSupplicantInterface *interface)
5299 {
5300         if (!callbacks_pointer)
5301                 return;
5302
5303         if (!callbacks_pointer->mesh_group_started)
5304                 return;
5305
5306         callbacks_pointer->mesh_group_started(interface);
5307 }
5308
5309 static void callback_mesh_group_removed(GSupplicantInterface *interface)
5310 {
5311         if (!callbacks_pointer)
5312                 return;
5313
5314         if (!callbacks_pointer->mesh_group_removed)
5315                 return;
5316
5317         callbacks_pointer->mesh_group_removed(interface);
5318 }
5319
5320 static void mesh_group_info(const char *key, DBusMessageIter *iter,
5321                                                         void *user_data)
5322 {
5323         GSupplicantInterface *interface = user_data;
5324         if (!key)
5325                 return;
5326
5327         if (g_strcmp0(key, "SSID") == 0) {
5328                 DBusMessageIter array;
5329                 unsigned char *ssid;
5330                 int ssid_len;
5331
5332                 dbus_message_iter_recurse(iter, &array);
5333                 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
5334
5335                 if (ssid_len > 0 && ssid_len < 33) {
5336                         memcpy(interface->group_info.ssid, ssid, ssid_len);
5337                         interface->group_info.ssid_len = ssid_len;
5338                 } else {
5339                         memset(interface->group_info.ssid, 0, 32);
5340                         interface->group_info.ssid_len = 0;
5341                 }
5342         } else if (g_strcmp0(key, "DisconnectReason") == 0) {
5343                 int disconnect_reason = 0;
5344                 dbus_message_iter_get_basic(iter, &disconnect_reason);
5345                 interface->group_info.disconnect_reason = disconnect_reason;
5346         }
5347 }
5348
5349 static void signal_mesh_group_started(const char *path, DBusMessageIter *iter)
5350 {
5351         GSupplicantInterface *interface;
5352
5353         interface = g_hash_table_lookup(interface_table, path);
5354         if (!interface)
5355                 return;
5356
5357         supplicant_dbus_property_foreach(iter, mesh_group_info, interface);
5358
5359         callback_mesh_group_started(interface);
5360 }
5361
5362 static void signal_mesh_group_removed(const char *path, DBusMessageIter *iter)
5363 {
5364         GSupplicantInterface *interface;
5365
5366         interface = g_hash_table_lookup(interface_table, path);
5367         if (!interface)
5368                 return;
5369
5370         supplicant_dbus_property_foreach(iter, mesh_group_info, interface);
5371
5372         callback_mesh_group_removed(interface);
5373 }
5374
5375 static void callback_mesh_peer_connected(GSupplicantMeshPeer *mesh_peer)
5376 {
5377         if (!callbacks_pointer)
5378                 return;
5379
5380         if (!callbacks_pointer->mesh_peer_connected)
5381                 return;
5382
5383         callbacks_pointer->mesh_peer_connected(mesh_peer);
5384 }
5385
5386 static void callback_mesh_peer_disconnected(GSupplicantMeshPeer *mesh_peer)
5387 {
5388         if (!callbacks_pointer)
5389                 return;
5390
5391         if (!callbacks_pointer->mesh_peer_disconnected)
5392                 return;
5393
5394         callbacks_pointer->mesh_peer_disconnected(mesh_peer);
5395 }
5396
5397 static void mesh_peer_info(const char *key, DBusMessageIter *iter,
5398                                                         void *user_data)
5399 {
5400         GSupplicantMeshPeer *mesh_peer = user_data;
5401         if (!key)
5402                 return;
5403
5404         if (g_strcmp0(key, "PeerAddress") == 0) {
5405                 DBusMessageIter array;
5406                 unsigned char *addr;
5407                 int addr_len;
5408
5409                 dbus_message_iter_recurse(iter, &array);
5410                 dbus_message_iter_get_fixed_array(&array, &addr, &addr_len);
5411
5412                 if (addr_len == 6) {
5413                         mesh_peer->peer_address = g_malloc0(19);
5414                         snprintf(mesh_peer->peer_address, 19,
5415                                          "%02x:%02x:%02x:%02x:%02x:%02x", addr[0], addr[1],
5416                                          addr[2], addr[3], addr[4], addr[5]);
5417                 }
5418         } else if (g_strcmp0(key, "DisconnectReason") == 0) {
5419                 int disconnect_reason = 0;
5420                 dbus_message_iter_get_basic(iter, &disconnect_reason);
5421                 mesh_peer->disconnect_reason = disconnect_reason;
5422         }
5423 }
5424
5425 static void signal_mesh_peer_connected(const char *path, DBusMessageIter *iter)
5426 {
5427         GSupplicantInterface *interface;
5428         GSupplicantMeshPeer *mesh_peer;
5429
5430         interface = g_hash_table_lookup(interface_table, path);
5431         if (!interface)
5432                 return;
5433
5434         mesh_peer = dbus_malloc0(sizeof(GSupplicantMeshPeer));
5435         mesh_peer->interface = interface;
5436
5437         supplicant_dbus_property_foreach(iter, mesh_peer_info, mesh_peer);
5438
5439         callback_mesh_peer_connected(mesh_peer);
5440         g_free(mesh_peer->peer_address);
5441         g_free(mesh_peer);
5442 }
5443
5444 static void signal_mesh_peer_disconnected(const char *path,
5445                                                                 DBusMessageIter *iter)
5446 {
5447         GSupplicantInterface *interface;
5448         GSupplicantMeshPeer *mesh_peer;
5449
5450         interface = g_hash_table_lookup(interface_table, path);
5451         if (!interface)
5452                 return;
5453
5454         mesh_peer = dbus_malloc0(sizeof(GSupplicantMeshPeer));
5455         mesh_peer->interface = interface;
5456
5457         supplicant_dbus_property_foreach(iter, mesh_peer_info, mesh_peer);
5458
5459         callback_mesh_peer_disconnected(mesh_peer);
5460         g_free(mesh_peer->peer_address);
5461         g_free(mesh_peer);
5462 }
5463 #endif
5464
5465 static struct {
5466         const char *interface;
5467         const char *member;
5468         void (*function) (const char *path, DBusMessageIter *iter);
5469 } signal_map[] = {
5470         { DBUS_INTERFACE_DBUS,  "NameOwnerChanged",  signal_name_owner_changed },
5471
5472         { SUPPLICANT_INTERFACE, "PropertiesChanged", signal_properties_changed },
5473         { SUPPLICANT_INTERFACE, "InterfaceAdded",    signal_interface_added    },
5474         { SUPPLICANT_INTERFACE, "InterfaceCreated",  signal_interface_added    },
5475         { SUPPLICANT_INTERFACE, "InterfaceRemoved",  signal_interface_removed  },
5476
5477         { SUPPLICANT_INTERFACE ".Interface", "PropertiesChanged", signal_interface_changed },
5478         { SUPPLICANT_INTERFACE ".Interface", "ScanDone",          signal_scan_done         },
5479         { SUPPLICANT_INTERFACE ".Interface", "BSSAdded",          signal_bss_added         },
5480         { SUPPLICANT_INTERFACE ".Interface", "BSSRemoved",        signal_bss_removed       },
5481         { SUPPLICANT_INTERFACE ".Interface", "NetworkAdded",      signal_network_added     },
5482         { SUPPLICANT_INTERFACE ".Interface", "NetworkRemoved",    signal_network_removed   },
5483         { SUPPLICANT_INTERFACE ".Interface", "StaAuthorized",     signal_sta_authorized    },
5484         { SUPPLICANT_INTERFACE ".Interface", "StaDeauthorized",   signal_sta_deauthorized  },
5485
5486         { SUPPLICANT_INTERFACE ".BSS", "PropertiesChanged", signal_bss_changed   },
5487
5488         { SUPPLICANT_INTERFACE ".Interface.WPS", "Credentials", signal_wps_credentials },
5489         { SUPPLICANT_INTERFACE ".Interface.WPS", "Event",       signal_wps_event       },
5490 #if defined TIZEN_EXT
5491         { "org.tizen.system.deviced.PowerOff", "ChangeState", signal_power_off },
5492 #endif
5493
5494         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeviceFound", signal_peer_found },
5495         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeviceLost",  signal_peer_lost  },
5496
5497         { SUPPLICANT_INTERFACE ".Peer", "PropertiesChanged", signal_peer_changed },
5498
5499         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationSuccess", signal_group_success },
5500         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationFailure", signal_group_failure },
5501         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GroupStarted", signal_group_started },
5502         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GroupFinished", signal_group_finished },
5503         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationRequest", signal_group_request },
5504
5505         { SUPPLICANT_INTERFACE ".Group", "PeerJoined", signal_group_peer_joined },
5506         { SUPPLICANT_INTERFACE ".Group", "PeerDisconnected", signal_group_peer_disconnected },
5507 #if defined TIZEN_EXT_WIFI_MESH
5508         { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshGroupStarted",
5509                 signal_mesh_group_started },
5510         { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshGroupRemoved",
5511                 signal_mesh_group_removed },
5512         { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshPeerConnected",
5513                 signal_mesh_peer_connected },
5514         { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshPeerDisconnected",
5515                 signal_mesh_peer_disconnected },
5516 #endif
5517
5518 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
5519         { SUPPLICANT_INTERFACE ".Interface", "EAP", signal_eap },
5520 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
5521
5522         { }
5523 };
5524
5525 static DBusHandlerResult g_supplicant_filter(DBusConnection *conn,
5526                                         DBusMessage *message, void *data)
5527 {
5528         DBusMessageIter iter;
5529         const char *path;
5530         int i;
5531
5532         path = dbus_message_get_path(message);
5533         if (!path)
5534                 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
5535
5536         if (!dbus_message_iter_init(message, &iter))
5537                 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
5538
5539         for (i = 0; signal_map[i].interface; i++) {
5540                 if (!dbus_message_has_interface(message, signal_map[i].interface))
5541                         continue;
5542
5543                 if (!dbus_message_has_member(message, signal_map[i].member))
5544                         continue;
5545
5546                 signal_map[i].function(path, &iter);
5547                 break;
5548         }
5549
5550         return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
5551 }
5552
5553 void g_supplicant_interface_cancel(GSupplicantInterface *interface)
5554 {
5555         SUPPLICANT_DBG("Cancelling any pending DBus calls");
5556         supplicant_dbus_method_call_cancel_all(interface);
5557         supplicant_dbus_property_call_cancel_all(interface);
5558 }
5559
5560 struct supplicant_regdom {
5561         GSupplicantCountryCallback callback;
5562         const char *alpha2;
5563         const void *user_data;
5564 };
5565
5566 static void country_result(const char *error,
5567                                 DBusMessageIter *iter, void *user_data)
5568 {
5569         struct supplicant_regdom *regdom = user_data;
5570         int result = 0;
5571
5572         SUPPLICANT_DBG("Country setting result");
5573
5574         if (!user_data)
5575                 return;
5576
5577         if (error) {
5578                 SUPPLICANT_DBG("Country setting failure %s", error);
5579                 result = -EINVAL;
5580         }
5581
5582         if (regdom->callback)
5583                 regdom->callback(result, regdom->alpha2,
5584                                         (void *) regdom->user_data);
5585
5586         g_free(regdom);
5587 }
5588
5589 static void country_params(DBusMessageIter *iter, void *user_data)
5590 {
5591         struct supplicant_regdom *regdom = user_data;
5592
5593         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING,
5594                                                         &regdom->alpha2);
5595 }
5596
5597 int g_supplicant_set_country(const char *alpha2,
5598                                 GSupplicantCountryCallback callback,
5599                                         const void *user_data)
5600 {
5601         struct supplicant_regdom *regdom;
5602         int ret;
5603
5604         SUPPLICANT_DBG("Country setting %s", alpha2);
5605
5606         if (!system_available)
5607                 return -EFAULT;
5608
5609         regdom = dbus_malloc0(sizeof(*regdom));
5610         if (!regdom)
5611                 return -ENOMEM;
5612
5613         regdom->callback = callback;
5614         regdom->alpha2 = alpha2;
5615         regdom->user_data = user_data;
5616
5617         ret =  supplicant_dbus_property_set(SUPPLICANT_PATH, SUPPLICANT_INTERFACE,
5618                                         "Country", DBUS_TYPE_STRING_AS_STRING,
5619                                         country_params, country_result,
5620                                         regdom, NULL);
5621         if (ret < 0) {
5622                 dbus_free(regdom);
5623                 SUPPLICANT_DBG("Unable to set Country configuration");
5624         }
5625         return ret;
5626 }
5627
5628 int g_supplicant_interface_set_country(GSupplicantInterface *interface,
5629                                         GSupplicantCountryCallback callback,
5630                                                         const char *alpha2,
5631                                                         void *user_data)
5632 {
5633         struct supplicant_regdom *regdom;
5634         int ret;
5635
5636         regdom = dbus_malloc0(sizeof(*regdom));
5637         if (!regdom)
5638                 return -ENOMEM;
5639
5640         regdom->callback = callback;
5641         regdom->alpha2 = alpha2;
5642         regdom->user_data = user_data;
5643
5644         ret =  supplicant_dbus_property_set(interface->path,
5645                                 SUPPLICANT_INTERFACE ".Interface",
5646                                 "Country", DBUS_TYPE_STRING_AS_STRING,
5647                                 country_params, country_result,
5648                                         regdom, NULL);
5649         if (ret < 0) {
5650                 dbus_free(regdom);
5651                 SUPPLICANT_DBG("Unable to set Country configuration");
5652         }
5653
5654         return ret;
5655 }
5656
5657 bool g_supplicant_interface_has_p2p(GSupplicantInterface *interface)
5658 {
5659         if (!interface)
5660                 return false;
5661
5662         return interface->p2p_support;
5663 }
5664
5665 struct supplicant_p2p_dev_config {
5666         char *device_name;
5667         char *dev_type;
5668 };
5669
5670 static void p2p_device_config_result(const char *error,
5671                                         DBusMessageIter *iter, void *user_data)
5672 {
5673         struct supplicant_p2p_dev_config *config = user_data;
5674
5675         if (error)
5676                 SUPPLICANT_DBG("Unable to set P2P Device configuration: %s",
5677                                                                         error);
5678
5679         g_free(config->device_name);
5680         g_free(config->dev_type);
5681         dbus_free(config);
5682 }
5683
5684 static int dev_type_str2bin(const char *type, unsigned char dev_type[8])
5685 {
5686         int length, pos, end;
5687         char b[3] = {};
5688         char *e = NULL;
5689
5690         end = strlen(type);
5691         for (length = pos = 0; type[pos] != '\0' && length < 8; length++) {
5692                 if (pos+2 > end)
5693                         return 0;
5694
5695                 b[0] = type[pos];
5696                 b[1] = type[pos+1];
5697
5698                 dev_type[length] = strtol(b, &e, 16);
5699                 if (e && *e != '\0')
5700                         return 0;
5701
5702                 pos += 2;
5703         }
5704
5705         return 8;
5706 }
5707
5708 static void p2p_device_config_params(DBusMessageIter *iter, void *user_data)
5709 {
5710         struct supplicant_p2p_dev_config *config = user_data;
5711         DBusMessageIter dict;
5712
5713         supplicant_dbus_dict_open(iter, &dict);
5714
5715         supplicant_dbus_dict_append_basic(&dict, "DeviceName",
5716                                 DBUS_TYPE_STRING, &config->device_name);
5717
5718         if (config->dev_type) {
5719                 unsigned char dev_type[8] = {}, *type;
5720                 int len;
5721
5722                 len = dev_type_str2bin(config->dev_type, dev_type);
5723                 if (len) {
5724                         type = dev_type;
5725                         supplicant_dbus_dict_append_fixed_array(&dict,
5726                                         "PrimaryDeviceType",
5727                                         DBUS_TYPE_BYTE, &type, len);
5728                 }
5729         }
5730
5731         supplicant_dbus_dict_close(iter, &dict);
5732 }
5733
5734 int g_supplicant_interface_set_p2p_device_config(GSupplicantInterface *interface,
5735                                         const char *device_name,
5736                                         const char *primary_dev_type)
5737 {
5738         struct supplicant_p2p_dev_config *config;
5739         int ret;
5740
5741         SUPPLICANT_DBG("P2P Device settings %s/%s",
5742                                         device_name, primary_dev_type);
5743
5744         config = dbus_malloc0(sizeof(*config));
5745         if (!config)
5746                 return -ENOMEM;
5747
5748         config->device_name = g_strdup(device_name);
5749         config->dev_type = g_strdup(primary_dev_type);
5750
5751         ret = supplicant_dbus_property_set(interface->path,
5752                                 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
5753                                 "P2PDeviceConfig",
5754                                 DBUS_TYPE_ARRAY_AS_STRING
5755                                 DBUS_DICT_ENTRY_BEGIN_CHAR_AS_STRING
5756                                 DBUS_TYPE_STRING_AS_STRING
5757                                 DBUS_TYPE_VARIANT_AS_STRING
5758                                 DBUS_DICT_ENTRY_END_CHAR_AS_STRING,
5759                                 p2p_device_config_params,
5760                                 p2p_device_config_result, config, NULL);
5761         if (ret < 0) {
5762                 g_free(config->device_name);
5763                 g_free(config->dev_type);
5764                 dbus_free(config);
5765                 SUPPLICANT_DBG("Unable to set P2P Device configuration");
5766         }
5767
5768         return ret;
5769 }
5770
5771 static gboolean peer_lookup_by_identifier(gpointer key, gpointer value,
5772                                                         gpointer user_data)
5773 {
5774         const GSupplicantPeer *peer = value;
5775         const char *identifier = user_data;
5776
5777         if (!g_strcmp0(identifier, peer->identifier))
5778                 return TRUE;
5779
5780         return FALSE;
5781 }
5782
5783 GSupplicantPeer *g_supplicant_interface_peer_lookup(GSupplicantInterface *interface,
5784                                                         const char *identifier)
5785 {
5786         GSupplicantPeer *peer;
5787
5788         peer = g_hash_table_find(interface->peer_table,
5789                                         peer_lookup_by_identifier,
5790                                         (void *) identifier);
5791         return peer;
5792 }
5793
5794 static void interface_create_data_free(struct interface_create_data *data)
5795 {
5796         g_free(data->ifname);
5797         g_free(data->driver);
5798         g_free(data->bridge);
5799 #if defined TIZEN_EXT_WIFI_MESH
5800         g_free(data->parent_ifname);
5801 #endif
5802         dbus_free(data);
5803 }
5804
5805 static bool interface_exists(GSupplicantInterface *interface,
5806                                 const char *path)
5807 {
5808         GSupplicantInterface *tmp;
5809
5810         tmp = g_hash_table_lookup(interface_table, path);
5811         if (tmp && tmp == interface)
5812                 return true;
5813
5814         return false;
5815 }
5816
5817 static void interface_create_property(const char *key, DBusMessageIter *iter,
5818                                                         void *user_data)
5819 {
5820         struct interface_create_data *data = user_data;
5821         GSupplicantInterface *interface = data->interface;
5822
5823         if (!key) {
5824                 if (data->callback) {
5825                         data->callback(0, data->interface, data->user_data);
5826 #if !defined TIZEN_EXT
5827                         callback_p2p_support(interface);
5828 #endif
5829 #if defined TIZEN_EXT_WIFI_MESH
5830                         callback_mesh_support(interface);
5831 #endif
5832                 }
5833
5834                 interface_create_data_free(data);
5835         }
5836
5837         interface_property(key, iter, interface);
5838 }
5839
5840 static void interface_create_result(const char *error,
5841                                 DBusMessageIter *iter, void *user_data)
5842 {
5843         struct interface_create_data *data = user_data;
5844         const char *path = NULL;
5845         int err;
5846
5847         SUPPLICANT_DBG("");
5848
5849         if (error) {
5850                 g_warning("error %s", error);
5851                 err = -EIO;
5852                 goto done;
5853         }
5854
5855         dbus_message_iter_get_basic(iter, &path);
5856         if (!path) {
5857                 err = -EINVAL;
5858                 goto done;
5859         }
5860
5861         if (!system_available) {
5862                 err = -EFAULT;
5863                 goto done;
5864         }
5865
5866         data->interface = g_hash_table_lookup(interface_table, path);
5867         if (!data->interface) {
5868                 data->interface = interface_alloc(path);
5869                 if (!data->interface) {
5870                         err = -ENOMEM;
5871                         goto done;
5872                 }
5873         }
5874
5875         err = supplicant_dbus_property_get_all(path,
5876                                         SUPPLICANT_INTERFACE ".Interface",
5877                                         interface_create_property, data,
5878                                         NULL);
5879         if (err == 0)
5880                 return;
5881
5882 done:
5883         if (data->callback)
5884                 data->callback(err, NULL, data->user_data);
5885
5886         interface_create_data_free(data);
5887 }
5888
5889 static void interface_create_params(DBusMessageIter *iter, void *user_data)
5890 {
5891         struct interface_create_data *data = user_data;
5892         DBusMessageIter dict;
5893         char *config_file = NULL;
5894
5895         SUPPLICANT_DBG("");
5896
5897         supplicant_dbus_dict_open(iter, &dict);
5898
5899         supplicant_dbus_dict_append_basic(&dict, "Ifname",
5900                                         DBUS_TYPE_STRING, &data->ifname);
5901
5902         if (data->driver)
5903                 supplicant_dbus_dict_append_basic(&dict, "Driver",
5904                                         DBUS_TYPE_STRING, &data->driver);
5905
5906         if (data->bridge)
5907                 supplicant_dbus_dict_append_basic(&dict, "BridgeIfname",
5908                                         DBUS_TYPE_STRING, &data->bridge);
5909
5910         config_file = g_hash_table_lookup(config_file_table, data->ifname);
5911         if (config_file) {
5912                 SUPPLICANT_DBG("[%s] ConfigFile %s", data->ifname, config_file);
5913
5914                 supplicant_dbus_dict_append_basic(&dict, "ConfigFile",
5915                                         DBUS_TYPE_STRING, &config_file);
5916         }
5917
5918 #ifdef TIZEN_EXT
5919         if (data->driver && g_strstr_len(data->driver, strlen(data->driver), "nl80211")) {
5920                 supplicant_dbus_dict_append_basic(&dict, "MacAddr",
5921                                 DBUS_TYPE_UINT32, &data->mac_addr);
5922
5923                 supplicant_dbus_dict_append_basic(&dict, "PreassocMacAddr",
5924                                 DBUS_TYPE_UINT32, &data->preassoc_mac_addr);
5925
5926                 supplicant_dbus_dict_append_basic(&dict, "RandAddrLifetime",
5927                                 DBUS_TYPE_UINT32, &data->random_mac_lifetime);
5928         }
5929 #endif /* TIZEN_EXT */
5930
5931 #if defined TIZEN_EXT_WIFI_MESH
5932         if (data->is_mesh_interface) {
5933                 if (data->parent_ifname)
5934                         supplicant_dbus_dict_append_basic(&dict, "ParentIfname",
5935                                         DBUS_TYPE_STRING, &data->parent_ifname);
5936
5937                 supplicant_dbus_dict_append_basic(&dict, "IsMeshInterface",
5938                                         DBUS_TYPE_BOOLEAN, &data->is_mesh_interface);
5939         }
5940 #endif
5941
5942         supplicant_dbus_dict_close(iter, &dict);
5943 }
5944
5945 #if defined TIZEN_EXT
5946 static void interface_get_state(const char *key, DBusMessageIter *iter,
5947                 void *user_data)
5948 {
5949         struct interface_create_data *data = user_data;
5950         GSupplicantInterface *interface = NULL;
5951         const char *str = NULL;
5952
5953         SUPPLICANT_DBG("key[%s]", key);
5954
5955         if (!data) {
5956                 SUPPLICANT_DBG("data is NULL");
5957                 return;
5958         }
5959
5960         interface = data->interface;
5961         if (!interface) {
5962                 SUPPLICANT_DBG("interface is NULL");
5963                 return;
5964         }
5965
5966         if (iter)
5967                 dbus_message_iter_get_basic(iter, &str);
5968
5969         if (str) {
5970                 if (string2state(str) != interface->state)
5971                         interface->state = string2state(str);
5972         }
5973
5974         if (interface->state == G_SUPPLICANT_STATE_DISABLED)
5975                 interface->ready = FALSE;
5976         else
5977                 interface->ready = TRUE;
5978
5979         SUPPLICANT_DBG("state %s (%d)", str, interface->state);
5980
5981         if (data->callback) {
5982                 data->callback(0, interface, data->user_data);
5983 #if defined TIZEN_EXT_WIFI_MESH
5984                 callback_mesh_support(interface);
5985 #endif
5986         }
5987
5988         interface_create_data_free(data);
5989 }
5990 #endif
5991
5992 static void interface_get_result(const char *error,
5993                                 DBusMessageIter *iter, void *user_data)
5994 {
5995         struct interface_create_data *data = user_data;
5996         GSupplicantInterface *interface;
5997         const char *path = NULL;
5998         int err;
5999
6000 #if defined TIZEN_EXT
6001         if (!simplified_log)
6002 #endif
6003         SUPPLICANT_DBG("");
6004
6005         if (error) {
6006                 SUPPLICANT_DBG("Interface not created yet");
6007                 goto create;
6008         }
6009
6010         dbus_message_iter_get_basic(iter, &path);
6011         if (!path) {
6012                 err = -EINVAL;
6013                 goto done;
6014         }
6015
6016         interface = g_hash_table_lookup(interface_table, path);
6017         if (!interface) {
6018                 err = -ENOENT;
6019                 goto done;
6020         }
6021
6022 #if defined TIZEN_EXT
6023         data->interface = interface;
6024         err = supplicant_dbus_property_get(path,
6025                         SUPPLICANT_INTERFACE ".Interface",
6026                         "State", interface_get_state, data, NULL);
6027
6028         if (err == 0)
6029                 return;
6030 #endif
6031
6032         if (data->callback) {
6033                 data->callback(0, interface, data->user_data);
6034 #if !defined TIZEN_EXT
6035                 callback_p2p_support(interface);
6036 #endif
6037 #if defined TIZEN_EXT_WIFI_MESH
6038                 callback_mesh_support(interface);
6039 #endif
6040         }
6041
6042         interface_create_data_free(data);
6043
6044         return;
6045
6046 create:
6047         if (!system_available) {
6048                 err = -EFAULT;
6049                 goto done;
6050         }
6051
6052         SUPPLICANT_DBG("Creating interface");
6053
6054         err = supplicant_dbus_method_call(SUPPLICANT_PATH,
6055                                                 SUPPLICANT_INTERFACE,
6056                                                 "CreateInterface",
6057                                                 interface_create_params,
6058                                                 interface_create_result, data,
6059                                                 NULL);
6060         if (err == 0)
6061                 return;
6062
6063 done:
6064         if (data->callback)
6065                 data->callback(err, NULL, data->user_data);
6066
6067         interface_create_data_free(data);
6068 }
6069
6070 static void interface_get_params(DBusMessageIter *iter, void *user_data)
6071 {
6072         struct interface_create_data *data = user_data;
6073 #if defined TIZEN_EXT
6074         if (!simplified_log)
6075 #endif
6076         SUPPLICANT_DBG("");
6077
6078         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, &data->ifname);
6079 }
6080
6081 #if defined TIZEN_EXT_WIFI_MESH
6082 int g_supplicant_mesh_interface_create(const char *ifname, const char *driver,
6083                                                 const char *bridge, const char *parent_ifname,
6084                                                 GSupplicantInterfaceCallback callback, void *user_data)
6085 {
6086         struct interface_create_data *data;
6087         int ret;
6088
6089         SUPPLICANT_DBG("ifname %s", ifname);
6090
6091         if (!ifname || !parent_ifname)
6092                 return -EINVAL;
6093
6094         if (!system_available)
6095                 return -EFAULT;
6096
6097         data = dbus_malloc0(sizeof(*data));
6098         if (!data)
6099                 return -ENOMEM;
6100
6101         data->ifname = g_strdup(ifname);
6102         data->driver = g_strdup(driver);
6103         data->bridge = g_strdup(bridge);
6104         data->is_mesh_interface = true;
6105         data->parent_ifname = g_strdup(parent_ifname);
6106         data->callback = callback;
6107         data->user_data = user_data;
6108
6109         ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
6110                                                 SUPPLICANT_INTERFACE,
6111                                                 "CreateInterface",
6112                                                 interface_create_params,
6113                                                 interface_create_result, data,
6114                                                 NULL);
6115         return ret;
6116 }
6117
6118 struct interface_mesh_peer_data {
6119         char *peer_address;
6120         char *method;
6121         GSupplicantInterface *interface;
6122         GSupplicantInterfaceCallback callback;
6123         void *user_data;
6124 };
6125
6126 static void interface_mesh_change_peer_params(DBusMessageIter *iter,
6127                                                 void *user_data)
6128 {
6129         struct interface_mesh_peer_data *data = user_data;
6130
6131         SUPPLICANT_DBG("");
6132
6133         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, &data->peer_address);
6134 }
6135
6136 static void interface_mesh_change_peer_result(const char *error,
6137                                 DBusMessageIter *iter, void *user_data)
6138 {
6139         struct interface_mesh_peer_data *data = user_data;
6140         int err = 0;
6141
6142         SUPPLICANT_DBG("%s", data->method);
6143
6144         if (error) {
6145                 err = -EIO;
6146                 SUPPLICANT_DBG("error %s", error);
6147         }
6148
6149         if (data->callback)
6150                 data->callback(err, data->interface, data->user_data);
6151
6152         g_free(data->peer_address);
6153         g_free(data->method);
6154         dbus_free(data);
6155 }
6156
6157 int g_supplicant_interface_mesh_peer_change_status(
6158                                 GSupplicantInterface *interface,
6159                                 GSupplicantInterfaceCallback callback, const char *peer_address,
6160                                 const char *method, void *user_data)
6161 {
6162         struct interface_mesh_peer_data *data;
6163         int ret;
6164
6165         if (!peer_address)
6166                 return -EINVAL;
6167
6168         data = dbus_malloc0(sizeof(*data));
6169         if (!data)
6170                 return -ENOMEM;
6171
6172         data->peer_address = g_strdup(peer_address);
6173         data->method = g_strdup(method);
6174         data->interface = interface;
6175         data->callback = callback;
6176         data->user_data = user_data;
6177
6178         ret = supplicant_dbus_method_call(interface->path,
6179                                                 SUPPLICANT_INTERFACE ".Interface.Mesh",
6180                                                 method, interface_mesh_change_peer_params,
6181                                                 interface_mesh_change_peer_result, data, NULL);
6182         if (ret < 0) {
6183                 g_free(data->peer_address);
6184                 g_free(data->method);
6185                 dbus_free(data);
6186         }
6187
6188         return ret;
6189 }
6190 #endif
6191
6192 int g_supplicant_interface_create(const char *ifname, const char *driver,
6193                                         const char *bridge,
6194 #ifdef TIZEN_EXT
6195                                         unsigned int mac_policy,
6196                                         unsigned int preassoc_mac_policy,
6197                                         unsigned int random_mac_lifetime,
6198 #endif /* TIZEN_EXT */
6199                                         GSupplicantInterfaceCallback callback,
6200                                                         void *user_data)
6201 {
6202         struct interface_create_data *data;
6203         int ret;
6204
6205         SUPPLICANT_DBG("ifname %s", ifname);
6206
6207         if (!ifname)
6208                 return -EINVAL;
6209
6210         if (!system_available)
6211                 return -EFAULT;
6212
6213         data = dbus_malloc0(sizeof(*data));
6214         if (!data)
6215                 return -ENOMEM;
6216
6217         data->ifname = g_strdup(ifname);
6218         data->driver = g_strdup(driver);
6219         data->bridge = g_strdup(bridge);
6220         data->callback = callback;
6221 #ifdef TIZEN_EXT
6222         data->mac_addr = mac_policy;
6223         data->preassoc_mac_addr = preassoc_mac_policy;
6224         data->random_mac_lifetime = random_mac_lifetime;
6225 #endif /* TIZEN_EXT */
6226         data->user_data = user_data;
6227
6228         ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
6229                                                 SUPPLICANT_INTERFACE,
6230                                                 "GetInterface",
6231                                                 interface_get_params,
6232                                                 interface_get_result, data,
6233                                                 NULL);
6234         if (ret < 0)
6235                 interface_create_data_free(data);
6236
6237         return ret;
6238 }
6239
6240 static void interface_remove_result(const char *error,
6241                                 DBusMessageIter *iter, void *user_data)
6242 {
6243         struct interface_data *data = user_data;
6244         int err;
6245
6246         if (error) {
6247                 err = -EIO;
6248                 SUPPLICANT_DBG("error: %s", error);
6249                 goto done;
6250         }
6251
6252         if (!system_available) {
6253                 err = -EFAULT;
6254                 goto done;
6255         }
6256
6257         /*
6258          * The gsupplicant interface is already freed by the InterfaceRemoved
6259          * signal callback. Simply invoke the interface_data callback.
6260          */
6261         err = 0;
6262
6263 done:
6264         g_free(data->path);
6265
6266         if (data->callback)
6267                 data->callback(err, NULL, data->user_data);
6268
6269         dbus_free(data);
6270 }
6271
6272
6273 static void interface_remove_params(DBusMessageIter *iter, void *user_data)
6274 {
6275         struct interface_data *data = user_data;
6276
6277         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
6278                                                         &data->interface->path);
6279 }
6280
6281 int g_supplicant_interface_remove(GSupplicantInterface *interface,
6282                         GSupplicantInterfaceCallback callback,
6283                                                         void *user_data)
6284 {
6285         struct interface_data *data;
6286         int ret;
6287
6288         if (!interface)
6289                 return -EINVAL;
6290
6291         if (!system_available)
6292                 return -EFAULT;
6293
6294         g_supplicant_interface_cancel(interface);
6295
6296         data = dbus_malloc0(sizeof(*data));
6297         if (!data)
6298                 return -ENOMEM;
6299
6300         data->interface = interface;
6301         data->path = g_strdup(interface->path);
6302         data->callback = callback;
6303         data->user_data = user_data;
6304
6305         ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
6306                                                 SUPPLICANT_INTERFACE,
6307                                                 "RemoveInterface",
6308                                                 interface_remove_params,
6309                                                 interface_remove_result, data,
6310                                                 NULL);
6311         if (ret < 0) {
6312                 g_free(data->path);
6313                 dbus_free(data);
6314         }
6315         return ret;
6316 }
6317
6318 static void interface_scan_result(const char *error,
6319                                 DBusMessageIter *iter, void *user_data)
6320 {
6321         struct interface_scan_data *data = user_data;
6322         int err = 0;
6323
6324         if (error) {
6325                 SUPPLICANT_DBG("error %s", error);
6326                 err = -EIO;
6327         }
6328
6329         /* A non ready interface cannot send/receive anything */
6330         if (interface_exists(data->interface, data->path)) {
6331                 if (!data->interface->ready)
6332                         err = -ENOLINK;
6333         }
6334
6335         g_free(data->path);
6336
6337         if (err != 0) {
6338                 if (data->callback)
6339                         data->callback(err, data->interface, data->user_data);
6340         } else {
6341                 data->interface->scan_callback = data->callback;
6342                 data->interface->scan_data = data->user_data;
6343         }
6344
6345         if (data->scan_params)
6346                 g_supplicant_free_scan_params(data->scan_params);
6347
6348         dbus_free(data);
6349 }
6350
6351 static void add_scan_frequency(DBusMessageIter *iter, unsigned int freq)
6352 {
6353         DBusMessageIter data;
6354         unsigned int width = 0; /* Not used by wpa_supplicant atm */
6355
6356         dbus_message_iter_open_container(iter, DBUS_TYPE_STRUCT, NULL, &data);
6357
6358         dbus_message_iter_append_basic(&data, DBUS_TYPE_UINT32, &freq);
6359         dbus_message_iter_append_basic(&data, DBUS_TYPE_UINT32, &width);
6360
6361         dbus_message_iter_close_container(iter, &data);
6362 }
6363
6364 static void add_scan_frequencies(DBusMessageIter *iter,
6365                                                 void *user_data)
6366 {
6367         GSupplicantScanParams *scan_data = user_data;
6368         unsigned int freq;
6369         int i;
6370
6371         for (i = 0; i < scan_data->num_freqs; i++) {
6372                 freq = scan_data->freqs[i];
6373                 if (!freq)
6374                         break;
6375
6376                 add_scan_frequency(iter, freq);
6377         }
6378 }
6379
6380 static void append_ssid(DBusMessageIter *iter,
6381                         const void *ssid, unsigned int len)
6382 {
6383         DBusMessageIter array;
6384
6385         dbus_message_iter_open_container(iter, DBUS_TYPE_ARRAY,
6386         DBUS_TYPE_BYTE_AS_STRING, &array);
6387
6388         dbus_message_iter_append_fixed_array(&array, DBUS_TYPE_BYTE,
6389                                                                 &ssid, len);
6390         dbus_message_iter_close_container(iter, &array);
6391 }
6392
6393 static void append_ssids(DBusMessageIter *iter, void *user_data)
6394 {
6395         GSupplicantScanParams *scan_data = user_data;
6396         GSList *list;
6397
6398         for (list = scan_data->ssids; list; list = list->next) {
6399                 struct scan_ssid *scan_ssid = list->data;
6400
6401                 append_ssid(iter, scan_ssid->ssid, scan_ssid->ssid_len);
6402         }
6403 }
6404
6405 static void supplicant_add_scan_frequency(DBusMessageIter *dict,
6406                 supplicant_dbus_array_function function,
6407                                         void *user_data)
6408 {
6409         GSupplicantScanParams *scan_params = user_data;
6410         DBusMessageIter entry, value, array;
6411         const char *key = "Channels";
6412
6413         if (scan_params->freqs && scan_params->freqs[0] != 0) {
6414                 dbus_message_iter_open_container(dict, DBUS_TYPE_DICT_ENTRY,
6415                                                 NULL, &entry);
6416
6417                 dbus_message_iter_append_basic(&entry, DBUS_TYPE_STRING, &key);
6418
6419                 dbus_message_iter_open_container(&entry, DBUS_TYPE_VARIANT,
6420                                         DBUS_TYPE_ARRAY_AS_STRING
6421                                         DBUS_STRUCT_BEGIN_CHAR_AS_STRING
6422                                         DBUS_TYPE_UINT32_AS_STRING
6423                                         DBUS_TYPE_UINT32_AS_STRING
6424                                         DBUS_STRUCT_END_CHAR_AS_STRING,
6425                                         &value);
6426
6427                 dbus_message_iter_open_container(&value, DBUS_TYPE_ARRAY,
6428                                         DBUS_STRUCT_BEGIN_CHAR_AS_STRING
6429                                         DBUS_TYPE_UINT32_AS_STRING
6430                                         DBUS_TYPE_UINT32_AS_STRING
6431                                         DBUS_STRUCT_END_CHAR_AS_STRING,
6432                                         &array);
6433
6434                 if (function)
6435                         function(&array, user_data);
6436
6437                 dbus_message_iter_close_container(&value, &array);
6438                 dbus_message_iter_close_container(&entry, &value);
6439                 dbus_message_iter_close_container(dict, &entry);
6440         }
6441 }
6442
6443 static void interface_scan_params(DBusMessageIter *iter, void *user_data)
6444 {
6445         DBusMessageIter dict;
6446         const char *type = "passive";
6447         struct interface_scan_data *data = user_data;
6448
6449         supplicant_dbus_dict_open(iter, &dict);
6450
6451         if (data && data->scan_params) {
6452                 type = "active";
6453
6454                 supplicant_dbus_dict_append_basic(&dict, "Type",
6455                                         DBUS_TYPE_STRING, &type);
6456
6457 #if defined TIZEN_EXT
6458                 SUPPLICANT_DBG("[specific_scan] num_ssids %d",
6459                                data->scan_params->num_ssids);
6460 #endif
6461
6462                 if (data->scan_params->ssids) {
6463                         supplicant_dbus_dict_append_array(&dict, "SSIDs",
6464                                                         DBUS_TYPE_STRING,
6465                                                         append_ssids,
6466                                                         data->scan_params);
6467                 }
6468                 supplicant_add_scan_frequency(&dict, add_scan_frequencies,
6469                                                 data->scan_params);
6470         } else
6471                 supplicant_dbus_dict_append_basic(&dict, "Type",
6472                                         DBUS_TYPE_STRING, &type);
6473
6474         supplicant_dbus_dict_close(iter, &dict);
6475 }
6476
6477 static int interface_ready_to_scan(GSupplicantInterface *interface)
6478 {
6479         if (!interface)
6480                 return -EINVAL;
6481
6482         if (!system_available)
6483                 return -EFAULT;
6484
6485         if (interface->scanning)
6486                 return -EALREADY;
6487
6488         switch (interface->state) {
6489         case G_SUPPLICANT_STATE_AUTHENTICATING:
6490         case G_SUPPLICANT_STATE_ASSOCIATING:
6491         case G_SUPPLICANT_STATE_ASSOCIATED:
6492         case G_SUPPLICANT_STATE_4WAY_HANDSHAKE:
6493         case G_SUPPLICANT_STATE_GROUP_HANDSHAKE:
6494                 return -EBUSY;
6495 #if defined TIZEN_EXT
6496         case G_SUPPLICANT_STATE_DISABLED:
6497                 return -ENOLINK;
6498         case G_SUPPLICANT_STATE_UNKNOWN:
6499 #else
6500         case G_SUPPLICANT_STATE_UNKNOWN:
6501         case G_SUPPLICANT_STATE_DISABLED:
6502 #endif
6503         case G_SUPPLICANT_STATE_DISCONNECTED:
6504         case G_SUPPLICANT_STATE_INACTIVE:
6505         case G_SUPPLICANT_STATE_SCANNING:
6506         case G_SUPPLICANT_STATE_COMPLETED:
6507                 break;
6508         }
6509
6510         return 0;
6511 }
6512
6513 #if defined TIZEN_EXT_WIFI_MESH
6514 static void interface_abort_scan_result(const char *error,
6515                                 DBusMessageIter *iter, void *user_data)
6516 {
6517         struct interface_scan_data *data = user_data;
6518         int err = 0;
6519
6520         if (error) {
6521                 SUPPLICANT_DBG("error %s", error);
6522                 err = -EIO;
6523         }
6524
6525         g_free(data->path);
6526
6527                 if (data->callback)
6528                         data->callback(err, data->interface, data->user_data);
6529
6530         dbus_free(data);
6531 }
6532
6533 int g_supplicant_interface_abort_scan(GSupplicantInterface *interface,
6534                                 GSupplicantInterfaceCallback callback, void *user_data)
6535 {
6536         struct interface_scan_data *data;
6537         int ret;
6538
6539         if (!interface->scanning)
6540                 return -EEXIST;
6541
6542         data = dbus_malloc0(sizeof(*data));
6543         if (!data)
6544                 return -ENOMEM;
6545
6546         data->interface = interface;
6547         data->path = g_strdup(interface->path);
6548         data->callback = callback;
6549         data->user_data = user_data;
6550
6551         ret = supplicant_dbus_method_call(interface->path,
6552                         SUPPLICANT_INTERFACE ".Interface", "AbortScan", NULL,
6553                         interface_abort_scan_result, data, interface);
6554
6555         if (ret < 0) {
6556                 g_free(data->path);
6557                 dbus_free(data);
6558         }
6559
6560         return ret;
6561 }
6562 #endif
6563
6564 int g_supplicant_interface_scan(GSupplicantInterface *interface,
6565                                 GSupplicantScanParams *scan_data,
6566                                 GSupplicantInterfaceCallback callback,
6567                                                         void *user_data)
6568 {
6569         struct interface_scan_data *data;
6570         int ret;
6571
6572         ret = interface_ready_to_scan(interface);
6573         if (ret)
6574                 return ret;
6575
6576         data = dbus_malloc0(sizeof(*data));
6577         if (!data)
6578                 return -ENOMEM;
6579
6580         data->interface = interface;
6581         data->path = g_strdup(interface->path);
6582 #if defined TIZEN_EXT
6583         data->interface->scan_callback = data->callback = callback;
6584         data->interface->scan_data = data->user_data = user_data;
6585 #else
6586         data->callback = callback;
6587         data->user_data = user_data;
6588 #endif
6589         data->scan_params = scan_data;
6590
6591         interface->scan_callback = callback;
6592         interface->scan_data = user_data;
6593
6594         ret = supplicant_dbus_method_call(interface->path,
6595                         SUPPLICANT_INTERFACE ".Interface", "Scan",
6596                         interface_scan_params, interface_scan_result, data,
6597                         interface);
6598
6599         if (ret < 0) {
6600                 g_free(data->path);
6601                 dbus_free(data);
6602         }
6603
6604         return ret;
6605 }
6606
6607 #if defined TIZEN_EXT
6608 static void interface_signalpoll_result(const char *error,
6609                                 DBusMessageIter *iter, void *user_data)
6610 {
6611         struct interface_signalpoll_data *data = user_data;
6612         int err = 0;
6613         dbus_int32_t maxspeed = 0;
6614         dbus_int32_t strength = 0;
6615         dbus_int32_t snr = 0;
6616         dbus_uint32_t est_throughput = 0;
6617         DBusMessageIter sub_iter, dict;
6618
6619         if (error) {
6620                 err = -EIO;
6621                 SUPPLICANT_DBG("error: %s", error);
6622                 goto out;
6623         }
6624
6625         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_VARIANT) {
6626                 err = -EINVAL;
6627                 SUPPLICANT_DBG("invalid reply");
6628                 goto out;
6629         }
6630
6631         dbus_message_iter_recurse(iter, &sub_iter);
6632         dbus_message_iter_recurse(&sub_iter, &dict);
6633
6634         while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_DICT_ENTRY) {
6635                 DBusMessageIter entry, value;
6636                 const char *key;
6637
6638                 dbus_message_iter_recurse(&dict, &entry);
6639                 dbus_message_iter_get_basic(&entry, &key);
6640                 dbus_message_iter_next(&entry);
6641                 dbus_message_iter_recurse(&entry, &value);
6642
6643                 switch (dbus_message_iter_get_arg_type(&value)) {
6644                 case DBUS_TYPE_INT32:
6645                         if (g_strcmp0(key, "linkspeed") == 0) {
6646                                 dbus_message_iter_get_basic(&value, &maxspeed);
6647                                 SUPPLICANT_DBG("linkspeed = %d", maxspeed);
6648                         } else if (g_strcmp0(key, "rssi") == 0) {
6649                                 dbus_message_iter_get_basic(&value, &strength);
6650                                 SUPPLICANT_DBG("Strength = %d", strength);
6651                         } else if (g_strcmp0(key, "SNR") == 0) {
6652                                 dbus_message_iter_get_basic(&value, &snr);
6653                                 SUPPLICANT_DBG("SNR = %d", snr);
6654                         }
6655                         break;
6656                 case DBUS_TYPE_UINT32:
6657                         if (g_strcmp0(key, "est_throughput") == 0) {
6658                                 dbus_message_iter_get_basic(&value, &est_throughput);
6659                                 SUPPLICANT_DBG("est_throughput = %u", est_throughput);
6660                         }
6661                         break;
6662                 }
6663                 dbus_message_iter_next(&dict);
6664         }
6665
6666 out:
6667         if(data->callback)
6668                 data->callback(err, maxspeed, strength, snr, data->user_data, est_throughput);
6669
6670         g_free(data->path);
6671         dbus_free(data);
6672 }
6673
6674 int g_supplicant_interface_signalpoll(GSupplicantInterface *interface,
6675                                 GSupplicantMaxSpeedCallback callback,
6676                                 void *user_data)
6677 {
6678         struct interface_signalpoll_data *data;
6679         int ret;
6680
6681         if (!interface)
6682                 return -EINVAL;
6683
6684         if (!system_available)
6685                 return -EFAULT;
6686
6687         data = dbus_malloc0(sizeof(*data));
6688         if (!data)
6689                 return -ENOMEM;
6690
6691         data->interface = interface;
6692         data->path = g_strdup(interface->path);
6693         data->callback = callback;
6694         data->user_data = user_data;
6695
6696         ret = supplicant_dbus_method_call(interface->path,
6697                         SUPPLICANT_INTERFACE ".Interface", "SignalPoll",
6698                         NULL, interface_signalpoll_result, data,
6699                         interface);
6700
6701         if (ret < 0) {
6702                 g_free(data->path);
6703                 dbus_free(data);
6704         }
6705
6706         return ret;
6707 }
6708 #endif
6709
6710 static int parse_supplicant_error(DBusMessageIter *iter)
6711 {
6712         int err = -ECONNABORTED;
6713         char *key;
6714
6715         if (!iter)
6716                 return err;
6717
6718         /* If the given passphrase is malformed wpa_s returns
6719          * "invalid message format" but this error should be interpreted as
6720          * invalid-key.
6721          */
6722         while (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_STRING) {
6723                 dbus_message_iter_get_basic(iter, &key);
6724                 if (strncmp(key, "psk", 3) == 0 ||
6725                                 strncmp(key, "wep_key", 7) == 0 ||
6726                                 strcmp(key, "invalid message format") == 0) {
6727                         err = -ENOKEY;
6728                         break;
6729                 }
6730                 dbus_message_iter_next(iter);
6731         }
6732
6733         return err;
6734 }
6735
6736 static void interface_select_network_result(const char *error,
6737                                 DBusMessageIter *iter, void *user_data)
6738 {
6739         struct interface_connect_data *data = user_data;
6740         int err;
6741
6742         SUPPLICANT_DBG("");
6743
6744         err = 0;
6745         if (error) {
6746 #if defined TIZEN_EXT
6747                 SUPPLICANT_DBG("SelectNetwork errorFreq %s", error);
6748 #else
6749                 SUPPLICANT_DBG("SelectNetwork error %s", error);
6750 #endif
6751                 err = parse_supplicant_error(iter);
6752         }
6753
6754         g_free(data->path);
6755
6756         if (data->callback)
6757                 data->callback(err, data->interface, data->user_data);
6758
6759 #if defined TIZEN_EXT
6760         g_free(data->ssid->ssid);
6761         if (data->ssid->is_passphrase_alloc)
6762                 g_free((char *)data->ssid->passphrase);
6763         if (data->ssid->is_connector_alloc)
6764                 g_free((char *)data->ssid->connector);
6765         if (data->ssid->is_c_sign_key_alloc)
6766                 g_free((char *)data->ssid->c_sign_key);
6767         if (data->ssid->is_net_access_key_alloc)
6768                 g_free((char *)data->ssid->net_access_key);
6769 #endif
6770         g_free(data->ssid);
6771         dbus_free(data);
6772 }
6773
6774 static void interface_select_network_params(DBusMessageIter *iter,
6775                                                         void *user_data)
6776 {
6777         struct interface_connect_data *data = user_data;
6778         GSupplicantInterface *interface = data->interface;
6779 #if defined TIZEN_EXT
6780         GSupplicantSSID *ssid = data->ssid;
6781 #endif
6782
6783         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
6784                                         &interface->network_path);
6785 #if defined TIZEN_EXT
6786         if (!ssid->bssid_for_connect_len)
6787                 dbus_message_iter_append_basic(iter, DBUS_TYPE_INT32, &ssid->freq);
6788 #endif
6789 }
6790
6791 static void interface_add_network_result(const char *error,
6792                                 DBusMessageIter *iter, void *user_data)
6793 {
6794         struct interface_connect_data *data = user_data;
6795         GSupplicantInterface *interface = data->interface;
6796         const char *path;
6797         int err;
6798
6799         if (error)
6800                 goto error;
6801
6802         dbus_message_iter_get_basic(iter, &path);
6803         if (!path)
6804                 goto error;
6805
6806         SUPPLICANT_DBG("PATH: %s", path);
6807
6808 #if defined TIZEN_EXT
6809         if (interface->network_path)
6810                 g_free(interface->network_path);
6811 #endif
6812         interface->network_path = g_strdup(path);
6813
6814         store_network_information(interface, data->ssid);
6815
6816 #if defined TIZEN_EXT
6817         SUPPLICANT_DBG(".Interface.SelectNetworkFreq");
6818         GSupplicantSSID *ssid = data->ssid;
6819
6820         if (!ssid->bssid_for_connect_len)
6821                 supplicant_dbus_method_call(data->interface->path,
6822                                 SUPPLICANT_INTERFACE ".Interface", "SelectNetworkFreq",
6823                                 interface_select_network_params,
6824                                 interface_select_network_result, data,
6825                                 interface);
6826         else
6827                 supplicant_dbus_method_call(data->interface->path,
6828                                 SUPPLICANT_INTERFACE ".Interface", "SelectNetwork",
6829                                 interface_select_network_params,
6830                                 interface_select_network_result, data,
6831                                 interface);
6832 #else
6833         supplicant_dbus_method_call(data->interface->path,
6834                         SUPPLICANT_INTERFACE ".Interface", "SelectNetwork",
6835                         interface_select_network_params,
6836                         interface_select_network_result, data,
6837                         interface);
6838 #endif
6839
6840         return;
6841
6842 error:
6843         SUPPLICANT_DBG("AddNetwork error %s", error);
6844
6845         if (interface_exists(data->interface, data->interface->path)) {
6846                 err = parse_supplicant_error(iter);
6847                 if (data->callback)
6848                         data->callback(err, data->interface, data->user_data);
6849
6850                 g_free(interface->network_path);
6851                 interface->network_path = NULL;
6852         }
6853
6854         g_free(data->path);
6855 #if defined TIZEN_EXT
6856         g_free(data->ssid->ssid);
6857         if (data->ssid->is_passphrase_alloc)
6858                 g_free((char *)data->ssid->passphrase);
6859         if (data->ssid->is_connector_alloc)
6860                 g_free((char *)data->ssid->connector);
6861         if (data->ssid->is_c_sign_key_alloc)
6862                 g_free((char *)data->ssid->c_sign_key);
6863         if (data->ssid->is_net_access_key_alloc)
6864                 g_free((char *)data->ssid->net_access_key);
6865 #endif
6866         g_free(data->ssid);
6867         g_free(data);
6868 }
6869
6870 static void add_network_security_none(DBusMessageIter *dict)
6871 {
6872         const char *auth_alg = "OPEN";
6873
6874         supplicant_dbus_dict_append_basic(dict, "auth_alg",
6875                                         DBUS_TYPE_STRING, &auth_alg);
6876 }
6877
6878 static void add_network_security_wep(DBusMessageIter *dict,
6879                                         GSupplicantSSID *ssid)
6880 {
6881         const char *auth_alg = "OPEN SHARED";
6882         dbus_uint32_t key_index = 0;
6883
6884         supplicant_dbus_dict_append_basic(dict, "auth_alg",
6885                                         DBUS_TYPE_STRING, &auth_alg);
6886
6887         if (ssid->passphrase) {
6888                 int size = strlen(ssid->passphrase);
6889                 if (size == 10 || size == 26) {
6890                         unsigned char *key = g_try_malloc(13);
6891                         char tmp[3];
6892                         int i;
6893
6894                         memset(tmp, 0, sizeof(tmp));
6895                         if (!key)
6896                                 size = 0;
6897
6898                         for (i = 0; i < size / 2; i++) {
6899                                 memcpy(tmp, ssid->passphrase + (i * 2), 2);
6900                                 key[i] = (unsigned char) strtol(tmp, NULL, 16);
6901                         }
6902
6903                         supplicant_dbus_dict_append_fixed_array(dict,
6904                                                         "wep_key0",
6905                                                         DBUS_TYPE_BYTE,
6906                                                         &key, size / 2);
6907                         g_free(key);
6908                 } else if (size == 5 || size == 13) {
6909                         unsigned char *key = g_try_malloc(13);
6910                         int i;
6911
6912                         if (!key)
6913                                 size = 0;
6914
6915                         for (i = 0; i < size; i++)
6916                                 key[i] = (unsigned char) ssid->passphrase[i];
6917
6918                         supplicant_dbus_dict_append_fixed_array(dict,
6919                                                                 "wep_key0",
6920                                                                 DBUS_TYPE_BYTE,
6921                                                                 &key, size);
6922                         g_free(key);
6923                 } else
6924                         supplicant_dbus_dict_append_basic(dict,
6925                                                         "wep_key0",
6926                                                         DBUS_TYPE_STRING,
6927                                                         &ssid->passphrase);
6928
6929                 supplicant_dbus_dict_append_basic(dict, "wep_tx_keyidx",
6930                                         DBUS_TYPE_UINT32, &key_index);
6931         }
6932 }
6933
6934 static dbus_bool_t is_psk_raw_key(const char *psk)
6935 {
6936         int i;
6937
6938         /* A raw key is always 64 bytes length... */
6939         if (strlen(psk) != 64)
6940                 return FALSE;
6941
6942         /* ... and its content is in hex representation */
6943         for (i = 0; i < 64; i++)
6944                 if (!isxdigit((unsigned char) psk[i]))
6945                         return FALSE;
6946
6947         return TRUE;
6948 }
6949
6950 static unsigned char hexchar2bin(char c)
6951 {
6952         if ((c >= '0') && (c <= '9'))
6953                 return c - '0';
6954         else if ((c >= 'A') && (c <= 'F'))
6955                 return c - 'A' + 10;
6956         else if ((c >= 'a') && (c <= 'f'))
6957                 return c - 'a' + 10;
6958         else
6959                 return c;
6960 }
6961
6962 static void hexstring2bin(const char *string, unsigned char *data,
6963                                 size_t data_len)
6964 {
6965         size_t i;
6966
6967         for (i = 0; i < data_len; i++)
6968                 data[i] = (hexchar2bin(string[i * 2 + 0]) << 4 |
6969                            hexchar2bin(string[i * 2 + 1]) << 0);
6970 }
6971
6972 static void add_network_security_psk(DBusMessageIter *dict,
6973                                         GSupplicantSSID *ssid)
6974 {
6975         if (ssid->passphrase && strlen(ssid->passphrase) > 0) {
6976                 const char *key = "psk";
6977
6978                 if (is_psk_raw_key(ssid->passphrase)) {
6979                         unsigned char data[32];
6980                         unsigned char *datap = data;
6981
6982                         /* The above pointer alias is required by D-Bus because
6983                          * with D-Bus and GCC, non-heap-allocated arrays cannot
6984                          * be passed directly by their base pointer. */
6985
6986                         hexstring2bin(ssid->passphrase, datap, sizeof(data));
6987
6988                         supplicant_dbus_dict_append_fixed_array(dict,
6989                                                         key, DBUS_TYPE_BYTE,
6990                                                         &datap, sizeof(data));
6991                 } else
6992                         supplicant_dbus_dict_append_basic(dict,
6993                                                         key, DBUS_TYPE_STRING,
6994                                                         &ssid->passphrase);
6995         }
6996 }
6997
6998 static void add_network_security_tls(DBusMessageIter *dict,
6999                                         GSupplicantSSID *ssid)
7000 {
7001         /*
7002          * For TLS, we at least need:
7003          *              The client certificate
7004          *              The client private key file
7005          *              The client private key file password
7006          *
7007          * The Authority certificate is optional.
7008          */
7009         if (!ssid->client_cert_path)
7010                 return;
7011
7012         if (!ssid->private_key_path)
7013                 return;
7014
7015         if (!ssid->private_key_passphrase)
7016                 return;
7017
7018         if (ssid->ca_cert_path)
7019                 supplicant_dbus_dict_append_basic(dict, "ca_cert",
7020                                         DBUS_TYPE_STRING, &ssid->ca_cert_path);
7021
7022         supplicant_dbus_dict_append_basic(dict, "private_key",
7023                                                 DBUS_TYPE_STRING,
7024                                                 &ssid->private_key_path);
7025         supplicant_dbus_dict_append_basic(dict, "private_key_passwd",
7026                                                 DBUS_TYPE_STRING,
7027                                                 &ssid->private_key_passphrase);
7028         supplicant_dbus_dict_append_basic(dict, "client_cert",
7029                                                 DBUS_TYPE_STRING,
7030                                                 &ssid->client_cert_path);
7031 }
7032
7033 static void add_network_security_peap(DBusMessageIter *dict,
7034                                         GSupplicantSSID *ssid)
7035 {
7036         char *phase2_auth;
7037
7038         /*
7039          * For PEAP/TTLS, we at least need
7040          *              The authority certificate
7041          *              The 2nd phase authentication method
7042          *              The 2nd phase passphrase
7043          *
7044          * The Client certificate is optional although strongly recommended
7045          * When setting it, we need in addition
7046          *              The Client private key file
7047          *              The Client private key file password
7048          */
7049         if (!ssid->passphrase)
7050                 return;
7051
7052         if (!ssid->phase2_auth)
7053                 return;
7054
7055         if (ssid->client_cert_path) {
7056                 if (!ssid->private_key_path)
7057                         return;
7058
7059 #if !defined TIZEN_EXT
7060                 if (!ssid->private_key_passphrase)
7061                         return;
7062 #endif
7063
7064                 supplicant_dbus_dict_append_basic(dict, "client_cert",
7065                                                 DBUS_TYPE_STRING,
7066                                                 &ssid->client_cert_path);
7067
7068                 supplicant_dbus_dict_append_basic(dict, "private_key",
7069                                                 DBUS_TYPE_STRING,
7070                                                 &ssid->private_key_path);
7071
7072 #if !defined TIZEN_EXT
7073                 supplicant_dbus_dict_append_basic(dict, "private_key_passwd",
7074                                                 DBUS_TYPE_STRING,
7075                                                 &ssid->private_key_passphrase);
7076 #endif
7077
7078         }
7079
7080         if(g_strcmp0(ssid->phase2_auth, "GTC") == 0 && g_strcmp0(ssid->eap, "ttls") == 0)
7081                 phase2_auth = g_strdup_printf("autheap=%s", ssid->phase2_auth);
7082         else if (g_str_has_prefix(ssid->phase2_auth, "EAP-")) {
7083                 phase2_auth = g_strdup_printf("autheap=%s",
7084                                         ssid->phase2_auth + strlen("EAP-"));
7085         } else
7086                 phase2_auth = g_strdup_printf("auth=%s", ssid->phase2_auth);
7087
7088         supplicant_dbus_dict_append_basic(dict, "password",
7089                                                 DBUS_TYPE_STRING,
7090                                                 &ssid->passphrase);
7091
7092         if (ssid->ca_cert_path)
7093                 supplicant_dbus_dict_append_basic(dict, "ca_cert",
7094                                                 DBUS_TYPE_STRING,
7095                                                 &ssid->ca_cert_path);
7096
7097         supplicant_dbus_dict_append_basic(dict, "phase2",
7098                                                 DBUS_TYPE_STRING,
7099                                                 &phase2_auth);
7100
7101         g_free(phase2_auth);
7102 }
7103
7104 #if defined TIZEN_EXT
7105 static void add_network_security_aka_sim(DBusMessageIter *dict,
7106                                         GSupplicantSSID *ssid)
7107 {
7108         if (!ssid->passphrase)
7109                 return;
7110
7111         supplicant_dbus_dict_append_basic(dict, "password",
7112                         DBUS_TYPE_STRING,
7113                         &ssid->passphrase);
7114 }
7115
7116 static void add_network_security_fast(DBusMessageIter *dict,
7117                 GSupplicantSSID *ssid)
7118 {
7119         /*
7120          * For FAST, we at least need:
7121          *              id / password
7122          *              phase1 (provisiong information)
7123          *              pac_file
7124          */
7125
7126         /* Allow provisioing both authenticated and unauthenticated */
7127         const char *phase1 = "fast_provisioning=2";
7128         supplicant_dbus_dict_append_basic(dict, "phase1",
7129                         DBUS_TYPE_STRING,
7130                         &phase1);
7131
7132         SUPPLICANT_DBG("pac_file [%s]", ssid->pac_file);
7133         if(ssid->pac_file)
7134                 supplicant_dbus_dict_append_basic(dict, "pac_file",
7135                                 DBUS_TYPE_STRING,
7136                                 &ssid->pac_file);
7137
7138         supplicant_dbus_dict_append_basic(dict, "password",
7139                         DBUS_TYPE_STRING,
7140                         &ssid->passphrase);
7141 }
7142 #endif
7143
7144 static void add_network_security_eap(DBusMessageIter *dict,
7145                                         GSupplicantSSID *ssid)
7146 {
7147         char *eap_value;
7148
7149 #if defined TIZEN_EXT
7150         if (!ssid->eap)
7151 #else
7152         if (!ssid->eap || !ssid->identity)
7153 #endif
7154                 return;
7155
7156         if (g_strcmp0(ssid->eap, "tls") == 0) {
7157                 add_network_security_tls(dict, ssid);
7158         } else if (g_strcmp0(ssid->eap, "peap") == 0 ||
7159                                 g_strcmp0(ssid->eap, "ttls") == 0) {
7160 #if defined TIZEN_EXT
7161                 if (!ssid->identity)
7162                         return;
7163 #endif
7164                 add_network_security_peap(dict, ssid);
7165
7166 #if defined TIZEN_EXT
7167         } else if (g_strcmp0(ssid->eap, "sim") == 0 ||
7168                         g_strcmp0(ssid->eap, "aka") == 0 ||
7169                         g_strcmp0(ssid->eap, "aka'") == 0) {
7170                 add_network_security_aka_sim(dict, ssid);
7171         } else if (g_strcmp0(ssid->eap, "pwd") == 0) {
7172                 if(!ssid->passphrase)
7173                         return;
7174                 supplicant_dbus_dict_append_basic(dict, "password",
7175                                 DBUS_TYPE_STRING,
7176                                 &ssid->passphrase);
7177         } else if (g_strcmp0(ssid->eap, "fast") == 0){
7178                 if (!ssid->identity || !ssid->passphrase)
7179                         return;
7180
7181                 add_network_security_fast(dict, ssid);
7182 #endif
7183         } else
7184                 return;
7185
7186         eap_value = g_ascii_strup(ssid->eap, -1);
7187
7188         supplicant_dbus_dict_append_basic(dict, "eap",
7189                                                 DBUS_TYPE_STRING,
7190                                                 &eap_value);
7191 #if defined TIZEN_EXT
7192         if (ssid->identity != NULL)
7193                 supplicant_dbus_dict_append_basic(dict, "identity",
7194                                                         DBUS_TYPE_STRING,
7195                                                         &ssid->identity);
7196 #else
7197         supplicant_dbus_dict_append_basic(dict, "identity",
7198                                                 DBUS_TYPE_STRING,
7199                                                 &ssid->identity);
7200 #endif
7201         if(ssid->anonymous_identity)
7202                 supplicant_dbus_dict_append_basic(dict, "anonymous_identity",
7203                                                      DBUS_TYPE_STRING,
7204                                                      &ssid->anonymous_identity);
7205
7206         if(ssid->subject_match)
7207                 supplicant_dbus_dict_append_basic(dict, "subject_match",
7208                                                      DBUS_TYPE_STRING,
7209                                                      &ssid->subject_match);
7210
7211         if(ssid->altsubject_match)
7212                 supplicant_dbus_dict_append_basic(dict, "altsubject_match",
7213                                                      DBUS_TYPE_STRING,
7214                                                      &ssid->altsubject_match);
7215
7216         if(ssid->domain_suffix_match)
7217                 supplicant_dbus_dict_append_basic(dict, "domain_suffix_match",
7218                                                      DBUS_TYPE_STRING,
7219                                                      &ssid->domain_suffix_match);
7220
7221         if(ssid->domain_match)
7222                 supplicant_dbus_dict_append_basic(dict, "domain_match",
7223                                                      DBUS_TYPE_STRING,
7224                                                      &ssid->domain_match);
7225
7226         g_free(eap_value);
7227 }
7228
7229 static void add_network_security_ciphers(DBusMessageIter *dict,
7230                                                 GSupplicantSSID *ssid)
7231 {
7232         unsigned int p_cipher, g_cipher, i;
7233         char *pairwise, *group;
7234         char *pair_ciphers[4];
7235         char *group_ciphers[5];
7236
7237         p_cipher = ssid->pairwise_cipher;
7238         g_cipher = ssid->group_cipher;
7239
7240         if (p_cipher == 0 && g_cipher == 0)
7241                 return;
7242
7243         i = 0;
7244
7245         if (p_cipher & G_SUPPLICANT_PAIRWISE_CCMP)
7246                 pair_ciphers[i++] = "CCMP";
7247
7248         if (p_cipher & G_SUPPLICANT_PAIRWISE_TKIP)
7249                 pair_ciphers[i++] = "TKIP";
7250
7251         if (p_cipher & G_SUPPLICANT_PAIRWISE_NONE)
7252                 pair_ciphers[i++] = "NONE";
7253
7254         pair_ciphers[i] = NULL;
7255
7256         i = 0;
7257
7258         if (g_cipher & G_SUPPLICANT_GROUP_CCMP)
7259                 group_ciphers[i++] = "CCMP";
7260
7261         if (g_cipher & G_SUPPLICANT_GROUP_TKIP)
7262                 group_ciphers[i++] = "TKIP";
7263
7264         if (g_cipher & G_SUPPLICANT_GROUP_WEP104)
7265                 group_ciphers[i++] = "WEP104";
7266
7267         if (g_cipher & G_SUPPLICANT_GROUP_WEP40)
7268                 group_ciphers[i++] = "WEP40";
7269
7270         group_ciphers[i] = NULL;
7271
7272         pairwise = g_strjoinv(" ", pair_ciphers);
7273         group = g_strjoinv(" ", group_ciphers);
7274
7275         SUPPLICANT_DBG("cipher %s %s", pairwise, group);
7276
7277         supplicant_dbus_dict_append_basic(dict, "pairwise",
7278                                                 DBUS_TYPE_STRING,
7279                                                 &pairwise);
7280         supplicant_dbus_dict_append_basic(dict, "group",
7281                                                 DBUS_TYPE_STRING,
7282                                                 &group);
7283
7284         g_free(pairwise);
7285         g_free(group);
7286 }
7287
7288 static void add_network_security_proto(DBusMessageIter *dict,
7289                                                 GSupplicantSSID *ssid)
7290 {
7291         unsigned int protocol, i;
7292         char *proto;
7293         char *protos[3];
7294
7295         protocol = ssid->protocol;
7296
7297         if (protocol == 0)
7298                 return;
7299
7300         i = 0;
7301
7302         if (protocol & G_SUPPLICANT_PROTO_RSN)
7303                 protos[i++] = "RSN";
7304
7305         if (protocol & G_SUPPLICANT_PROTO_WPA)
7306                 protos[i++] = "WPA";
7307
7308         protos[i] = NULL;
7309
7310         proto = g_strjoinv(" ", protos);
7311
7312         SUPPLICANT_DBG("proto %s", proto);
7313
7314         supplicant_dbus_dict_append_basic(dict, "proto",
7315                                                 DBUS_TYPE_STRING,
7316                                                 &proto);
7317
7318         g_free(proto);
7319 }
7320
7321 #if defined TIZEN_EXT
7322 static void add_network_security_connector(DBusMessageIter *dict, GSupplicantSSID *ssid)
7323 {
7324         if (ssid->connector && strlen(ssid->connector) > 0) {
7325                 const char *key = "dpp_connector";
7326
7327                 supplicant_dbus_dict_append_basic(dict,
7328                                 key, DBUS_TYPE_STRING,
7329                                 &ssid->connector);
7330         }
7331 }
7332
7333 static size_t convert_hexstr_to_bin(const char *hex_str, unsigned char **bin)
7334 {
7335         unsigned char *bin_res = NULL;
7336         unsigned int i, j, hex;
7337         size_t hex_str_len;
7338
7339         if (!hex_str || strlen(hex_str) == 0)
7340                 return 0;
7341
7342         hex_str_len = strlen(hex_str);
7343         bin_res = g_try_malloc0(hex_str_len / 2);
7344         if (!bin_res)
7345                 return 0;
7346
7347         j = 0;
7348         for (i = 0; i < hex_str_len; i+=2) {
7349                 sscanf(hex_str + i, "%02x", &hex);
7350                 bin_res[j++] = hex;
7351         }
7352
7353         *bin = bin_res;
7354         return hex_str_len / 2;
7355 }
7356
7357 static void add_network_security_c_sign_key(DBusMessageIter *dict, GSupplicantSSID *ssid)
7358 {
7359         if (ssid->c_sign_key && strlen(ssid->c_sign_key) > 0) {
7360                 const char *key = "dpp_csign";
7361                 unsigned char *bin_csign = NULL;
7362                 size_t bin_csign_len = convert_hexstr_to_bin(ssid->c_sign_key, &bin_csign);
7363                 if  (bin_csign_len != 0)
7364                         supplicant_dbus_dict_append_fixed_array(dict,
7365                                         key, DBUS_TYPE_BYTE,
7366                                         &bin_csign, bin_csign_len);
7367                 g_free(bin_csign);
7368         }
7369 }
7370
7371 static void add_network_security_net_access_key(DBusMessageIter *dict, GSupplicantSSID *ssid)
7372 {
7373         if (ssid->net_access_key && strlen(ssid->net_access_key) > 0) {
7374                 const char *key = "dpp_netaccesskey";
7375                 unsigned char *bin_netaccesskey = NULL;
7376                 size_t bin_netaccesskey_len = convert_hexstr_to_bin(ssid->net_access_key, &bin_netaccesskey);
7377                 if  (bin_netaccesskey_len != 0)
7378                         supplicant_dbus_dict_append_fixed_array(dict,
7379                                         key, DBUS_TYPE_BYTE,
7380                                         &bin_netaccesskey, bin_netaccesskey_len);
7381                 g_free(bin_netaccesskey);
7382         }
7383 }
7384
7385 #endif
7386
7387 static void add_network_ieee80211w(DBusMessageIter *dict, GSupplicantSSID *ssid,
7388                                    GSupplicantMfpOptions ieee80211w)
7389 {
7390         supplicant_dbus_dict_append_basic(dict, "ieee80211w", DBUS_TYPE_UINT32,
7391                                           &ieee80211w);
7392 }
7393
7394 static void add_network_security(DBusMessageIter *dict, GSupplicantSSID *ssid)
7395 {
7396         GSupplicantMfpOptions ieee80211w;
7397         char *key_mgmt;
7398
7399         switch (ssid->security) {
7400         case G_SUPPLICANT_SECURITY_NONE:
7401                 key_mgmt = "NONE";
7402                 add_network_security_none(dict);
7403                 add_network_security_ciphers(dict, ssid);
7404                 break;
7405         case G_SUPPLICANT_SECURITY_UNKNOWN:
7406         case G_SUPPLICANT_SECURITY_WEP:
7407                 key_mgmt = "NONE";
7408                 add_network_security_wep(dict, ssid);
7409                 add_network_security_ciphers(dict, ssid);
7410                 break;
7411         case G_SUPPLICANT_SECURITY_PSK:
7412 #if defined TIZEN_EXT
7413                 if (ssid->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_PSK)
7414                         key_mgmt = "FT-PSK WPA-PSK";
7415                 else
7416                         key_mgmt = "WPA-PSK";
7417 #else
7418                 key_mgmt = "WPA-PSK";
7419 #endif
7420                 add_network_security_psk(dict, ssid);
7421                 add_network_security_ciphers(dict, ssid);
7422                 add_network_security_proto(dict, ssid);
7423                 break;
7424         case G_SUPPLICANT_SECURITY_IEEE8021X:
7425                 key_mgmt = "WPA-EAP";
7426                 add_network_security_eap(dict, ssid);
7427                 add_network_security_ciphers(dict, ssid);
7428                 add_network_security_proto(dict, ssid);
7429                 break;
7430 #if defined TIZEN_EXT
7431         case G_SUPPLICANT_SECURITY_PSK_SHA256:
7432                 if (ssid->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_PSK)
7433                         key_mgmt = "WPA-PSK-SHA256 WPA-PSK";
7434                 else
7435                         key_mgmt = "WPA-PSK-SHA256";
7436                 add_network_security_psk(dict, ssid);
7437                 add_network_security_ciphers(dict, ssid);
7438                 add_network_security_proto(dict, ssid);
7439                 break;
7440         case G_SUPPLICANT_SECURITY_FT_PSK:
7441                 key_mgmt = "FT-PSK";
7442                 add_network_security_psk(dict, ssid);
7443                 add_network_security_ciphers(dict, ssid);
7444                 add_network_security_proto(dict, ssid);
7445                 break;
7446         case G_SUPPLICANT_SECURITY_FT_IEEE8021X:
7447                 key_mgmt = "FT-EAP";
7448                 add_network_security_eap(dict, ssid);
7449                 add_network_security_ciphers(dict, ssid);
7450                 add_network_security_proto(dict, ssid);
7451                 break;
7452         case G_SUPPLICANT_SECURITY_SAE:
7453                 if (ssid->keymgmt & G_SUPPLICANT_KEYMGMT_FT_SAE) {
7454                         if (ssid->keymgmt & G_SUPPLICANT_KEYMGMT_SAE)
7455                                 key_mgmt = "FT-SAE SAE";
7456                         else
7457                                 key_mgmt = "FT-SAE";
7458                 } else {
7459                         if (ssid->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_PSK) {
7460                         key_mgmt = "SAE WPA-PSK";
7461                         ieee80211w = G_SUPPLICANT_MFP_OPTIONAL;
7462                         } else {
7463                                 key_mgmt = "SAE";
7464                                 ieee80211w = G_SUPPLICANT_MFP_REQUIRED;
7465                         }
7466                         add_network_ieee80211w(dict, ssid, ieee80211w);
7467                 }
7468                 add_network_security_psk(dict, ssid);
7469                 add_network_security_ciphers(dict, ssid);
7470                 add_network_security_proto(dict, ssid);
7471                 break;
7472         case G_SUPPLICANT_SECURITY_OWE:
7473                 key_mgmt = "OWE";
7474                 add_network_security_ciphers(dict, ssid);
7475                 add_network_security_proto(dict, ssid);
7476                 break;
7477         case G_SUPPLICANT_SECURITY_DPP:
7478                 key_mgmt = "DPP";
7479                 add_network_security_connector(dict, ssid);
7480                 add_network_security_c_sign_key(dict, ssid);
7481                 add_network_security_net_access_key(dict, ssid);
7482                 break;
7483 #endif
7484         }
7485
7486         supplicant_dbus_dict_append_basic(dict, "key_mgmt",
7487                                 DBUS_TYPE_STRING, &key_mgmt);
7488 }
7489
7490 static void add_network_mode(DBusMessageIter *dict, GSupplicantSSID *ssid)
7491 {
7492         dbus_uint32_t mode;
7493
7494         switch (ssid->mode) {
7495         case G_SUPPLICANT_MODE_UNKNOWN:
7496         case G_SUPPLICANT_MODE_INFRA:
7497                 mode = 0;
7498                 break;
7499         case G_SUPPLICANT_MODE_IBSS:
7500                 mode = 1;
7501                 break;
7502         case G_SUPPLICANT_MODE_MASTER:
7503                 mode = 2;
7504                 break;
7505 #if defined TIZEN_EXT_WIFI_MESH
7506         case G_SUPPLICANT_MODE_MESH:
7507                 mode = 5;
7508                 break;
7509 #endif
7510         }
7511
7512         supplicant_dbus_dict_append_basic(dict, "mode",
7513                                 DBUS_TYPE_UINT32, &mode);
7514 }
7515
7516 static void interface_add_network_params(DBusMessageIter *iter, void *user_data)
7517 {
7518         DBusMessageIter dict;
7519         struct interface_connect_data *data = user_data;
7520         GSupplicantSSID *ssid = data->ssid;
7521 #if defined TIZEN_EXT
7522         GSupplicantInterface *interface = data->interface;
7523 #endif
7524
7525         supplicant_dbus_dict_open(iter, &dict);
7526
7527         if (ssid->scan_ssid)
7528                 supplicant_dbus_dict_append_basic(&dict, "scan_ssid",
7529                                          DBUS_TYPE_UINT32, &ssid->scan_ssid);
7530
7531         if (ssid->freq)
7532                 supplicant_dbus_dict_append_basic(&dict, "frequency",
7533                                          DBUS_TYPE_UINT32, &ssid->freq);
7534
7535         if (ssid->bgscan)
7536                 supplicant_dbus_dict_append_basic(&dict, "bgscan",
7537                                         DBUS_TYPE_STRING, &ssid->bgscan);
7538
7539         add_network_mode(&dict, ssid);
7540
7541         add_network_security(&dict, ssid);
7542
7543         supplicant_dbus_dict_append_fixed_array(&dict, "ssid",
7544                                         DBUS_TYPE_BYTE, &ssid->ssid,
7545                                                 ssid->ssid_len);
7546
7547 #if defined TIZEN_EXT
7548         bool owe_transition_mode = FALSE;
7549         if ((ssid->security == G_SUPPLICANT_SECURITY_OWE) && !(ssid->keymgmt & G_SUPPLICANT_KEYMGMT_OWE))
7550                 owe_transition_mode = TRUE;
7551
7552         if (ssid->bssid && !owe_transition_mode) {
7553                 char *bssid = NULL;
7554                 bssid = g_try_malloc0(18);
7555                 if (bssid == NULL) {
7556                         SUPPLICANT_DBG("memory allocation error");
7557                         supplicant_dbus_dict_close(iter, &dict);
7558                         return;
7559                 }
7560
7561                 if (ssid->bssid_for_connect_len) {
7562                         snprintf(bssid, 18, MACSTR, MAC2STR(ssid->bssid_for_connect));
7563                         memcpy(interface->add_network_bssid, ssid->bssid_for_connect, WIFI_BSSID_LEN_MAX);
7564                 } else {
7565                         snprintf(bssid, 18, MACSTR, MAC2STR(ssid->bssid));
7566                         memcpy(interface->add_network_bssid, ssid->bssid, WIFI_BSSID_LEN_MAX);
7567                 }
7568
7569                 SUPPLICANT_DBG("bssid [" MACSTR "]", MAC2STR(interface->add_network_bssid));
7570
7571                 supplicant_dbus_dict_append_basic(&dict, "bssid",
7572                                         DBUS_TYPE_STRING, &bssid);
7573                 g_free(bssid);
7574         }
7575 #endif
7576
7577         supplicant_dbus_dict_close(iter, &dict);
7578 }
7579
7580 static void interface_wps_start_result(const char *error,
7581                                 DBusMessageIter *iter, void *user_data)
7582 {
7583         struct interface_connect_data *data = user_data;
7584         int err;
7585
7586         SUPPLICANT_DBG("");
7587
7588         err = 0;
7589         if (error) {
7590                 SUPPLICANT_DBG("error: %s", error);
7591                 err = parse_supplicant_error(iter);
7592         }
7593
7594         if(data->callback)
7595                 data->callback(err, data->interface, data->user_data);
7596
7597         g_free(data->path);
7598         g_free(data->ssid);
7599         dbus_free(data);
7600 }
7601
7602 static void interface_add_wps_params(DBusMessageIter *iter, void *user_data)
7603 {
7604         struct interface_connect_data *data = user_data;
7605         GSupplicantSSID *ssid = data->ssid;
7606         const char *role = "enrollee", *type;
7607         DBusMessageIter dict;
7608
7609         SUPPLICANT_DBG("");
7610
7611         supplicant_dbus_dict_open(iter, &dict);
7612
7613         supplicant_dbus_dict_append_basic(&dict, "Role",
7614                                                 DBUS_TYPE_STRING, &role);
7615
7616         type = "pbc";
7617         if (ssid->pin_wps) {
7618                 type = "pin";
7619                 supplicant_dbus_dict_append_basic(&dict, "Pin",
7620                                         DBUS_TYPE_STRING, &ssid->pin_wps);
7621         }
7622
7623         supplicant_dbus_dict_append_basic(&dict, "Type",
7624                                         DBUS_TYPE_STRING, &type);
7625
7626 #if defined TIZEN_EXT
7627         if (ssid->bssid)
7628                 supplicant_dbus_dict_append_fixed_array(&dict, "Bssid",
7629                                                 DBUS_TYPE_BYTE, &ssid->bssid, 6);
7630 #endif
7631
7632         supplicant_dbus_dict_close(iter, &dict);
7633 }
7634
7635 static void wps_start(const char *error, DBusMessageIter *iter, void *user_data)
7636 {
7637         struct interface_connect_data *data = user_data;
7638
7639         SUPPLICANT_DBG("");
7640
7641         if (error) {
7642                 SUPPLICANT_DBG("error: %s", error);
7643                 g_free(data->path);
7644                 g_free(data->ssid);
7645                 dbus_free(data);
7646                 return;
7647         }
7648
7649 #if defined TIZEN_EXT
7650         GSupplicantSSID *ssid = data->ssid;
7651         if (ssid->pin_wps != NULL) {
7652                 if (!g_utf8_validate(ssid->pin_wps, 8, NULL)) {
7653                         SUPPLICANT_DBG("Invalid characters in WPS_PIN");
7654                         g_free(data->ssid);
7655                         dbus_free(data);
7656                         return;
7657                 }
7658         }
7659 #endif
7660         supplicant_dbus_method_call(data->interface->path,
7661                         SUPPLICANT_INTERFACE ".Interface.WPS", "Start",
7662                         interface_add_wps_params,
7663                         interface_wps_start_result, data, NULL);
7664 }
7665
7666 static void wps_process_credentials(DBusMessageIter *iter, void *user_data)
7667 {
7668         dbus_bool_t credentials = TRUE;
7669
7670         SUPPLICANT_DBG("");
7671
7672         dbus_message_iter_append_basic(iter, DBUS_TYPE_BOOLEAN, &credentials);
7673 }
7674
7675
7676 #if defined TIZEN_EXT
7677 #define NETCONFIG_SERVICE "net.netconfig"
7678 #define NETCONFIG_WIFI_PATH "/net/netconfig/wifi"
7679 #define NETCONFIG_WIFI_INTERFACE NETCONFIG_SERVICE ".wifi"
7680
7681 struct dec_method_call_data {
7682         struct interface_connect_data *data;
7683         DBusPendingCall *pending_call;
7684 };
7685
7686 static struct dec_method_call_data decrypt_request_data;
7687
7688 static void crypt_method_call_cancel(void)
7689 {
7690         if (decrypt_request_data.pending_call) {
7691                 dbus_pending_call_cancel(decrypt_request_data.pending_call);
7692                 dbus_pending_call_unref(decrypt_request_data.pending_call);
7693                 decrypt_request_data.pending_call = NULL;
7694         }
7695
7696         g_free(decrypt_request_data.data->path);
7697         g_free(decrypt_request_data.data->ssid);
7698         dbus_free(decrypt_request_data.data);
7699         decrypt_request_data.data = NULL;
7700 }
7701
7702 static void decryption_request_reply(DBusPendingCall *call,
7703                                                 void *user_data)
7704 {
7705         DBusMessage *reply;
7706         DBusError error;
7707         DBusMessageIter args;
7708         char *out_data;
7709         int ret;
7710         struct interface_connect_data *data = user_data;
7711
7712         SUPPLICANT_DBG("");
7713
7714         reply = dbus_pending_call_steal_reply(call);
7715
7716         dbus_error_init(&error);
7717         if (dbus_set_error_from_message(&error, reply)) {
7718                 SUPPLICANT_DBG("decryption_request_reply() %s %s", error.name, error.message);
7719                 dbus_error_free(&error);
7720                 ret = -EINVAL;
7721                 goto done;
7722         }
7723
7724         if (!g_str_has_prefix(data->interface->path, "/")) {
7725                 SUPPLICANT_DBG("Invalid path %s", data->interface->path);
7726                 ret = -EINVAL;
7727                 goto done;
7728         }
7729
7730         if (dbus_message_iter_init(reply, &args) == FALSE) {
7731                 SUPPLICANT_DBG("dbus_message_iter_init() failed");
7732                 ret = -EINVAL;
7733                 goto done;
7734         }
7735
7736         dbus_message_iter_get_basic(&args, &out_data);
7737         data->ssid->passphrase = g_strdup((const gchar *)out_data);
7738         data->ssid->is_passphrase_alloc = true;
7739
7740         ret = supplicant_dbus_method_call(data->interface->path,
7741                 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
7742                 interface_add_network_params,
7743                 interface_add_network_result, data,
7744                 data->interface);
7745
7746 done:
7747         if (ret < 0) {
7748                 SUPPLICANT_DBG("AddNetwork failed %d", ret);
7749                 callback_assoc_failed(decrypt_request_data.data->user_data);
7750                 g_free(data->path);
7751                 g_free(data->ssid->ssid);
7752                 if (data->ssid->is_passphrase_alloc)
7753                         g_free((char *)data->ssid->passphrase);
7754                 if (data->ssid->is_connector_alloc)
7755                         g_free((char *)data->ssid->connector);
7756                 if (data->ssid->is_c_sign_key_alloc)
7757                         g_free((char *)data->ssid->c_sign_key);
7758                 if (data->ssid->is_net_access_key_alloc)
7759                         g_free((char *)data->ssid->net_access_key);
7760                 g_free(data->ssid);
7761                 dbus_free(data);
7762         }
7763
7764         dbus_message_unref(reply);
7765         dbus_pending_call_unref(call);
7766
7767         decrypt_request_data.pending_call = NULL;
7768         decrypt_request_data.data = NULL;
7769 }
7770
7771 static int send_decryption_request(const char *passphrase,
7772                         struct interface_connect_data *data)
7773 {
7774         DBusMessage *msg = NULL;
7775         DBusPendingCall *call;
7776
7777         SUPPLICANT_DBG("Decryption request");
7778
7779         if (!passphrase) {
7780                 SUPPLICANT_DBG("Invalid parameter");
7781                 return -EINVAL;
7782         }
7783
7784         if (!connection)
7785                 return -EINVAL;
7786
7787         msg = dbus_message_new_method_call(NETCONFIG_SERVICE, NETCONFIG_WIFI_PATH,
7788                         NETCONFIG_WIFI_INTERFACE, "DecryptPassphrase");
7789         if (!msg)
7790                 return -EINVAL;
7791
7792 #if defined TIZEN_EXT
7793         if (!dbus_message_append_args(msg, DBUS_TYPE_STRING, &passphrase,
7794                                                         DBUS_TYPE_INVALID)) {
7795                 SUPPLICANT_DBG("Could not fulfill decryption request");
7796                 return -ENOMEM;
7797         }
7798 #else
7799         dbus_message_append_args(msg, DBUS_TYPE_STRING, &passphrase,
7800                                                         DBUS_TYPE_INVALID);
7801 #endif
7802
7803         if (!dbus_connection_send_with_reply(connection, msg,
7804                                 &call, DBUS_TIMEOUT_USE_DEFAULT)) {
7805                 dbus_message_unref(msg);
7806                 return -EIO;
7807         }
7808
7809         if (!call) {
7810                 dbus_message_unref(msg);
7811                 return -EIO;
7812         }
7813
7814         decrypt_request_data.pending_call = call;
7815         decrypt_request_data.data = data;
7816
7817         dbus_pending_call_set_notify(call, decryption_request_reply, data, NULL);
7818         dbus_message_unref(msg);
7819
7820         SUPPLICANT_DBG("Decryption request succeeded");
7821
7822         return 0;
7823 }
7824
7825 static void decrypt_conf_obj_reply(DBusPendingCall *call,
7826                                                 void *user_data)
7827 {
7828         DBusMessage *reply;
7829         DBusError error;
7830         DBusMessageIter iter, dict;
7831         char *out_data;
7832         int ret;
7833         struct interface_connect_data *data = user_data;
7834
7835         reply = dbus_pending_call_steal_reply(call);
7836
7837         dbus_error_init(&error);
7838         if (dbus_set_error_from_message(&error, reply)) {
7839                 SUPPLICANT_DBG("decryption_conf_obj_reply() %s %s", error.name, error.message);
7840                 dbus_error_free(&error);
7841                 ret = -EINVAL;
7842                 goto done;
7843         }
7844
7845         if (dbus_message_iter_init(reply, &iter) == FALSE) {
7846                 SUPPLICANT_DBG("dbus_message_iter_init() failed");
7847                 ret = -EINVAL;
7848                 goto done;
7849         }
7850
7851         dbus_message_iter_recurse(&iter, &dict);
7852
7853         while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_DICT_ENTRY) {
7854                 DBusMessageIter entry, value;
7855                 const char *key;
7856
7857                 dbus_message_iter_recurse(&dict, &entry);
7858                 dbus_message_iter_get_basic(&entry, &key);
7859                 dbus_message_iter_next(&entry);
7860                 dbus_message_iter_recurse(&entry, &value);
7861                 if (dbus_message_iter_get_arg_type(&value) == DBUS_TYPE_STRING) {
7862                         if (g_strcmp0(key, "connector") == 0) {
7863                                 dbus_message_iter_get_basic(&value, &out_data);
7864                                 data->ssid->connector = g_strdup((const gchar *)out_data);
7865                                 data->ssid->is_connector_alloc = true;
7866                                 SUPPLICANT_DBG("connector %s", data->ssid->connector);
7867                         } else if (g_strcmp0(key, "c_sign_key") == 0) {
7868                                 dbus_message_iter_get_basic(&value, &out_data);
7869                                 data->ssid->c_sign_key = g_strdup((const gchar *)out_data);
7870                                 data->ssid->is_c_sign_key_alloc = true;
7871                                 SUPPLICANT_DBG("c_sign_key %s", data->ssid->c_sign_key);
7872                         } else if (g_strcmp0(key, "net_access_key") == 0) {
7873                                 dbus_message_iter_get_basic(&value, &out_data);
7874                                 data->ssid->net_access_key = g_strdup((const gchar *)out_data);
7875                                 data->ssid->is_net_access_key_alloc = true;
7876                                 SUPPLICANT_DBG("net_access_key %s", data->ssid->net_access_key);
7877                         }
7878                 }
7879                 dbus_message_iter_next(&dict);
7880         }
7881
7882         ret = supplicant_dbus_method_call(data->interface->path,
7883                 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
7884                 interface_add_network_params,
7885                 interface_add_network_result, data,
7886                 data->interface);
7887
7888 done:
7889         if (ret < 0) {
7890                 SUPPLICANT_DBG("AddNetwork failed %d", ret);
7891                 callback_assoc_failed(decrypt_request_data.data->user_data);
7892                 g_free(data->path);
7893                 g_free(data->ssid->ssid);
7894                 if (data->ssid->is_connector_alloc)
7895                         g_free((char *)data->ssid->connector);
7896                 if (data->ssid->is_c_sign_key_alloc)
7897                         g_free((char *)data->ssid->c_sign_key);
7898                 if (data->ssid->is_net_access_key_alloc)
7899                         g_free((char *)data->ssid->net_access_key);
7900                 g_free(data->ssid);
7901                 dbus_free(data);
7902         }
7903
7904         dbus_message_unref(reply);
7905         dbus_pending_call_unref(call);
7906
7907         decrypt_request_data.pending_call = NULL;
7908         decrypt_request_data.data = NULL;
7909 }
7910
7911 static int send_decryption_conf_obj_request(GSupplicantSSID *ssid,
7912                         struct interface_connect_data *data)
7913 {
7914         DBusMessage *msg = NULL;
7915         DBusPendingCall *call;
7916
7917         SUPPLICANT_DBG("Decryption configuration object request");
7918
7919         if (!ssid) {
7920                 SUPPLICANT_DBG("Invalid parameter");
7921                 return -EINVAL;
7922         }
7923
7924         if (!connection)
7925                 return -EINVAL;
7926
7927         msg = dbus_message_new_method_call(NETCONFIG_SERVICE, NETCONFIG_WIFI_PATH,
7928                         NETCONFIG_WIFI_INTERFACE, "DecryptConfObj");
7929         if (!msg)
7930                 return -EINVAL;
7931
7932         dbus_message_append_args(msg, DBUS_TYPE_STRING, &ssid->connector,
7933                                                         DBUS_TYPE_INVALID);
7934         dbus_message_append_args(msg, DBUS_TYPE_STRING, &ssid->c_sign_key,
7935                                                         DBUS_TYPE_INVALID);
7936         dbus_message_append_args(msg, DBUS_TYPE_STRING, &ssid->net_access_key,
7937                                                         DBUS_TYPE_INVALID);
7938
7939         if (!dbus_connection_send_with_reply(connection, msg,
7940                                 &call, DBUS_TIMEOUT_USE_DEFAULT)) {
7941                 dbus_message_unref(msg);
7942                 return -EIO;
7943         }
7944
7945         if (!call) {
7946                 dbus_message_unref(msg);
7947                 return -EIO;
7948         }
7949
7950         decrypt_request_data.pending_call = call;
7951         decrypt_request_data.data = data;
7952
7953         dbus_pending_call_set_notify(call, decrypt_conf_obj_reply, data, NULL);
7954         dbus_message_unref(msg);
7955
7956         SUPPLICANT_DBG("Decrypt Conf Obj request succeeded");
7957
7958         return 0;
7959 }
7960
7961 static bool is_valid_config_object(GSupplicantSSID *ssid)
7962 {
7963         return ((ssid->connector &&
7964                         g_strcmp0(ssid->connector, "") != 0) &&
7965                         (ssid->c_sign_key &&
7966                         g_strcmp0(ssid->c_sign_key, "") != 0) &&
7967                         (ssid->net_access_key &&
7968                         g_strcmp0(ssid->net_access_key, "") != 0));
7969 }
7970 #endif
7971
7972 int g_supplicant_interface_connect(GSupplicantInterface *interface,
7973                                 GSupplicantSSID *ssid,
7974                                 GSupplicantInterfaceCallback callback,
7975                                                         void *user_data)
7976 {
7977         struct interface_connect_data *data;
7978         struct interface_data *intf_data;
7979         int ret = 0;
7980
7981         SUPPLICANT_DBG("");
7982
7983         if (!interface)
7984                 return -EINVAL;
7985
7986         if (!system_available)
7987                 return -EFAULT;
7988
7989         /* TODO: Check if we're already connected and switch */
7990
7991         data = dbus_malloc0(sizeof(*data));
7992         if (!data)
7993                 return -ENOMEM;
7994
7995         data->interface = interface;
7996         data->path = g_strdup(interface->path);
7997         data->callback = callback;
7998         data->ssid = ssid;
7999         data->user_data = user_data;
8000
8001         if (ssid->use_wps) {
8002                 g_free(interface->wps_cred.key);
8003                 memset(&interface->wps_cred, 0,
8004                                 sizeof(struct _GSupplicantWpsCredentials));
8005
8006                 ret = supplicant_dbus_property_set(interface->path,
8007                         SUPPLICANT_INTERFACE ".Interface.WPS",
8008                         "ProcessCredentials", DBUS_TYPE_BOOLEAN_AS_STRING,
8009                         wps_process_credentials, wps_start, data, interface);
8010         } else {
8011                 /* By the time there is a request for connect and the network
8012                  * path is not NULL it means that connman has not removed the
8013                  * previous network pointer. This can happen in the case AP
8014                  * deauthenticated client and connman does not remove the
8015                  * previously connected network pointer. This causes supplicant
8016                  * to reallocate the memory for struct wpa_ssid again even if it
8017                  * is the same SSID. This causes memory usage of wpa_supplicnat
8018                  * to go high. The idea here is that if the previously connected
8019                  * network is not removed at the time of next connection attempt
8020                  * check if the network path is not NULL. In case it is non-NULL
8021                  * first remove the network and then once removal is successful, add
8022                  * the network.
8023                  */
8024
8025                 if (interface->network_path != NULL) {
8026                         g_free(data->path);
8027                         dbus_free(data);
8028
8029                         /*
8030                          * If this add network is for the same network for
8031                          * which wpa_supplicant already has a profile then do
8032                          * not need to add another profile. Only if the
8033                          * profile that needs to get added is different from
8034                          * what is there in wpa_s delete the current one. A
8035                          * network is identified by its SSID, security_type
8036                          * and passphrase (private passphrase in case security
8037                          * type is 802.11x).
8038                          */
8039                         if (compare_network_parameters(interface, ssid)) {
8040                                 return -EALREADY;
8041                         }
8042
8043                         intf_data = dbus_malloc0(sizeof(*intf_data));
8044                         if (!intf_data)
8045                                 return -ENOMEM;
8046
8047                         intf_data->interface = interface;
8048                         intf_data->path = g_strdup(interface->path);
8049                         intf_data->callback = callback;
8050                         intf_data->ssid = ssid;
8051                         intf_data->user_data = user_data;
8052                         intf_data->network_remove_in_progress = TRUE;
8053                         network_remove(intf_data);
8054                 } else {
8055 #if defined TIZEN_EXT
8056                         if (ssid->passphrase &&
8057                             g_strcmp0(ssid->passphrase, "") != 0 &&
8058 #if defined TIZEN_EXT_WIFI_MESH
8059                             ssid->mode != G_SUPPLICANT_MODE_MESH &&
8060 #endif
8061                             !ssid->eap) {
8062                                 ret = send_decryption_request(ssid->passphrase, data);
8063                                 if (ret < 0)
8064                                         SUPPLICANT_DBG("Decryption request failed %d", ret);
8065                         } else if (is_valid_config_object(ssid)) {
8066                                 ret = send_decryption_conf_obj_request(ssid, data);
8067                                 if (ret < 0)
8068                                         SUPPLICANT_DBG("Decryption Conf Obj request failed %d", ret);
8069
8070                         } else
8071 #endif
8072                         ret = supplicant_dbus_method_call(interface->path,
8073                                         SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
8074                                         interface_add_network_params,
8075                                         interface_add_network_result, data,
8076                                         interface);
8077                 }
8078         }
8079
8080         if (ret < 0) {
8081                 g_free(data->path);
8082                 dbus_free(data);
8083                 return ret;
8084         }
8085
8086         return -EINPROGRESS;
8087 }
8088
8089 static void network_remove_result(const char *error,
8090                                 DBusMessageIter *iter, void *user_data)
8091 {
8092         struct interface_data *data = user_data;
8093         struct interface_connect_data *connect_data;
8094         int result = 0;
8095
8096         SUPPLICANT_DBG("");
8097
8098         if (error) {
8099                 result = -EIO;
8100                 SUPPLICANT_DBG("error: %s", error);
8101
8102                 if (g_strcmp0("org.freedesktop.DBus.Error.UnknownMethod",
8103                                                 error) == 0)
8104                         result = -ECONNABORTED;
8105         }
8106
8107         g_free(data->interface->network_path);
8108         data->interface->network_path = NULL;
8109
8110         remove_network_information(data->interface);
8111
8112         if (data->network_remove_in_progress == TRUE) {
8113                 data->network_remove_in_progress = FALSE;
8114                 connect_data = dbus_malloc0(sizeof(*connect_data));
8115                 if (!connect_data)
8116                         return;
8117
8118                 connect_data->interface = data->interface;
8119                 connect_data->path = g_strdup(data->path);
8120                 connect_data->callback = data->callback;
8121                 connect_data->ssid = data->ssid;
8122                 connect_data->user_data = data->user_data;
8123
8124 #if defined TIZEN_EXT
8125                 int ret;
8126                 if (data->ssid->passphrase && g_strcmp0(data->ssid->passphrase, "") != 0
8127                         && !data->ssid->eap) {
8128                         ret = send_decryption_request(data->ssid->passphrase, connect_data);
8129                         if (ret < 0) {
8130                                 SUPPLICANT_DBG("Decryption request failed %d", ret);
8131                                 g_free(connect_data->ssid);
8132                                 g_free(connect_data->path);
8133                                 dbus_free(connect_data);
8134                         }
8135                 } else if (is_valid_config_object(data->ssid)) {
8136                         ret = send_decryption_conf_obj_request(data->ssid, connect_data);
8137                         if (ret < 0) {
8138                                 SUPPLICANT_DBG("Decryption Conf Obj request failed %d", ret);
8139                                 g_free(connect_data->ssid);
8140                                 g_free(connect_data->path);
8141                                 dbus_free(connect_data);
8142                         }
8143                 } else
8144 #endif
8145                 supplicant_dbus_method_call(data->interface->path,
8146                         SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
8147                         interface_add_network_params,
8148                         interface_add_network_result, connect_data,
8149                         connect_data->interface);
8150         } else {
8151                 if (data->callback)
8152                         data->callback(result, data->interface, data->user_data);
8153         }
8154         g_free(data->path);
8155         dbus_free(data);
8156 }
8157
8158 static void network_remove_params(DBusMessageIter *iter, void *user_data)
8159 {
8160         struct interface_data *data = user_data;
8161         const char *path = data->interface->network_path;
8162
8163         SUPPLICANT_DBG("path %s", path);
8164
8165         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH, &path);
8166 }
8167
8168 static int network_remove(struct interface_data *data)
8169 {
8170         GSupplicantInterface *interface = data->interface;
8171
8172         SUPPLICANT_DBG("");
8173
8174 #if defined TIZEN_EXT
8175         GSupplicantInterface *intf = NULL;
8176         /*
8177          * Check if 'interface' is valid
8178          */
8179         intf = g_hash_table_lookup(interface_table, interface->path);
8180         if (intf == NULL)
8181                 return -EINVAL;
8182 #endif
8183
8184         return supplicant_dbus_method_call(interface->path,
8185                         SUPPLICANT_INTERFACE ".Interface", "RemoveNetwork",
8186                         network_remove_params, network_remove_result, data,
8187                         interface);
8188 }
8189
8190 static void interface_disconnect_result(const char *error,
8191                                 DBusMessageIter *iter, void *user_data)
8192 {
8193         struct interface_data *data = user_data;
8194         int result = 0;
8195
8196         SUPPLICANT_DBG("");
8197
8198         if (error) {
8199                 result = -EIO;
8200                 SUPPLICANT_DBG("error: %s", error);
8201
8202                 if (g_strcmp0("org.freedesktop.DBus.Error.UnknownMethod",
8203                                                 error) == 0)
8204                         result = -ECONNABORTED;
8205         }
8206
8207         /* If we are disconnecting from previous WPS successful
8208          * association. i.e.: it did not went through AddNetwork,
8209          * and interface->network_path was never set. */
8210         if (!data->interface->network_path) {
8211                 if (data->callback)
8212                         data->callback(result, data->interface,
8213                                                         data->user_data);
8214
8215                 g_free(data->path);
8216                 dbus_free(data);
8217                 return;
8218         }
8219
8220         if (result < 0 && data->callback) {
8221                 data->callback(result, data->interface, data->user_data);
8222                 data->callback = NULL;
8223         }
8224
8225         if (result != -ECONNABORTED) {
8226                 if (network_remove(data) < 0) {
8227                         g_free(data->path);
8228                         dbus_free(data);
8229                 }
8230         } else {
8231                 g_free(data->path);
8232                 dbus_free(data);
8233         }
8234 }
8235
8236 int g_supplicant_interface_disconnect(GSupplicantInterface *interface,
8237                                         GSupplicantInterfaceCallback callback,
8238                                                         void *user_data)
8239 {
8240         struct interface_data *data;
8241         int ret;
8242
8243         SUPPLICANT_DBG("");
8244
8245         if (!interface)
8246                 return -EINVAL;
8247
8248         if (!system_available)
8249                 return -EFAULT;
8250 #if defined TIZEN_EXT
8251         if (decrypt_request_data.pending_call &&
8252                         decrypt_request_data.data &&
8253                         decrypt_request_data.data->user_data == user_data) {
8254
8255                 callback_assoc_failed(decrypt_request_data.data->user_data);
8256                 crypt_method_call_cancel();
8257
8258                 return 0;
8259         }
8260 #endif
8261         data = dbus_malloc0(sizeof(*data));
8262         if (!data)
8263                 return -ENOMEM;
8264
8265         data->interface = interface;
8266         data->path = g_strdup(interface->path);
8267         data->callback = callback;
8268         data->user_data = user_data;
8269
8270         ret = supplicant_dbus_method_call(interface->path,
8271                         SUPPLICANT_INTERFACE ".Interface", "Disconnect",
8272                         NULL, interface_disconnect_result, data,
8273                         interface);
8274
8275         if (ret < 0) {
8276                 g_free(data->path);
8277                 dbus_free(data);
8278         }
8279
8280         return ret;
8281 }
8282
8283 #if defined TIZEN_EXT
8284 void g_supplicant_interface_remove_network(GSupplicantInterface *interface,
8285                                 GSupplicantSSID *ssid)
8286 {
8287         struct interface_data *data;
8288         int ret;
8289
8290         SUPPLICANT_DBG("");
8291
8292         if (!interface)
8293                 return;
8294
8295         if (interface->network_path == NULL)
8296                 return;
8297
8298         if (!interface->network_info.ssid)
8299                 return;
8300
8301         if (memcmp(interface->network_info.ssid, ssid->ssid, ssid->ssid_len))
8302                 return;
8303
8304         if (interface->network_info.security != ssid->security)
8305                 return;
8306
8307         data = dbus_malloc0(sizeof(*data));
8308         if (!data)
8309                 return;
8310
8311         data->interface = interface;
8312         data->path = g_strdup(interface->path);
8313
8314         ret = supplicant_dbus_method_call(interface->path,
8315                         SUPPLICANT_INTERFACE ".Interface", "RemoveNetwork",
8316                         network_remove_params, network_remove_result, data,
8317                         interface);
8318
8319         if (ret < 0) {
8320                 g_free(data->path);
8321                 dbus_free(data);
8322         }
8323 }
8324 #endif
8325
8326 static void interface_p2p_find_result(const char *error,
8327                                         DBusMessageIter *iter, void *user_data)
8328 {
8329         struct interface_scan_data *data = user_data;
8330         int err = 0;
8331
8332         SUPPLICANT_DBG("error %s", error);
8333
8334         if (error)
8335                 err = -EIO;
8336
8337         if (interface_exists(data->interface, data->path)) {
8338                 if (!data->interface->ready)
8339                         err = -ENOLINK;
8340                 if (!err)
8341                         data->interface->p2p_finding = true;
8342         }
8343
8344         if (data->callback)
8345                 data->callback(err, data->interface, data->user_data);
8346
8347         g_free(data->path);
8348         dbus_free(data);
8349 }
8350
8351 static void interface_p2p_find_params(DBusMessageIter *iter, void *user_data)
8352 {
8353         DBusMessageIter dict;
8354
8355         supplicant_dbus_dict_open(iter, &dict);
8356         supplicant_dbus_dict_close(iter, &dict);
8357 }
8358
8359 int g_supplicant_interface_p2p_find(GSupplicantInterface *interface,
8360                                         GSupplicantInterfaceCallback callback,
8361                                                         void *user_data)
8362 {
8363         struct interface_scan_data *data;
8364         int ret;
8365
8366         if (!interface->p2p_support)
8367                 return -ENOTSUP;
8368
8369         ret = interface_ready_to_scan(interface);
8370         if (ret && ret != -EALREADY)
8371                 return ret;
8372
8373         data = dbus_malloc0(sizeof(*data));
8374         if (!data)
8375                 return -ENOMEM;
8376
8377         data->interface = interface;
8378         data->path = g_strdup(interface->path);
8379         data->callback = callback;
8380         data->user_data = user_data;
8381
8382         ret = supplicant_dbus_method_call(interface->path,
8383                         SUPPLICANT_INTERFACE ".Interface.P2PDevice", "Find",
8384                         interface_p2p_find_params, interface_p2p_find_result,
8385                         data, interface);
8386         if (ret < 0) {
8387                 g_free(data->path);
8388                 dbus_free(data);
8389         }
8390
8391         return ret;
8392 }
8393
8394 bool g_supplicant_interface_is_p2p_finding(GSupplicantInterface *interface)
8395 {
8396         if (!interface)
8397                 return false;
8398
8399         return interface->p2p_finding;
8400 }
8401
8402 int g_supplicant_interface_p2p_stop_find(GSupplicantInterface *interface)
8403 {
8404         if (!interface->p2p_finding)
8405                 return 0;
8406
8407         SUPPLICANT_DBG("");
8408
8409         interface->p2p_finding = false;
8410
8411         return supplicant_dbus_method_call(interface->path,
8412                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "StopFind",
8413                 NULL, NULL, NULL, NULL);
8414 }
8415
8416 static void interface_p2p_connect_result(const char *error,
8417                                         DBusMessageIter *iter, void *user_data)
8418 {
8419         struct interface_connect_data *data = user_data;
8420         int err = 0;
8421
8422         SUPPLICANT_DBG("");
8423
8424         if (error) {
8425                 SUPPLICANT_DBG("error: %s", error);
8426                 err = parse_supplicant_error(iter);
8427         }
8428
8429         if (data->callback)
8430                 data->callback(err, data->interface, data->user_data);
8431
8432         g_free(data->path);
8433         g_free(data->peer->wps_pin);
8434         g_free(data->peer->path);
8435         g_free(data->peer);
8436         g_free(data);
8437 }
8438
8439 static void interface_p2p_connect_params(DBusMessageIter *iter, void *user_data)
8440 {
8441         struct interface_connect_data *data = user_data;
8442         const char *wps = "pbc";
8443         DBusMessageIter dict;
8444         int go_intent = 7;
8445
8446         SUPPLICANT_DBG("");
8447
8448         supplicant_dbus_dict_open(iter, &dict);
8449
8450         if (data->peer->master)
8451                 go_intent = 15;
8452
8453         if (data->peer->wps_pin)
8454                 wps = "pin";
8455
8456         supplicant_dbus_dict_append_basic(&dict, "peer",
8457                                 DBUS_TYPE_OBJECT_PATH, &data->peer->path);
8458         supplicant_dbus_dict_append_basic(&dict, "wps_method",
8459                                 DBUS_TYPE_STRING, &wps);
8460         if (data->peer->wps_pin) {
8461                 supplicant_dbus_dict_append_basic(&dict, "pin",
8462                                 DBUS_TYPE_STRING, &data->peer->wps_pin);
8463         }
8464
8465         supplicant_dbus_dict_append_basic(&dict, "go_intent",
8466                                         DBUS_TYPE_INT32, &go_intent);
8467
8468         supplicant_dbus_dict_close(iter, &dict);
8469 }
8470
8471 int g_supplicant_interface_p2p_connect(GSupplicantInterface *interface,
8472                                         GSupplicantPeerParams *peer_params,
8473                                         GSupplicantInterfaceCallback callback,
8474                                         void *user_data)
8475 {
8476         struct interface_connect_data *data;
8477         int ret;
8478
8479         SUPPLICANT_DBG("");
8480
8481         if (!interface->p2p_support)
8482                 return -ENOTSUP;
8483
8484         data = dbus_malloc0(sizeof(*data));
8485         if (!data)
8486                 return -ENOMEM;
8487
8488         data->interface = interface;
8489         data->path = g_strdup(interface->path);
8490         data->peer = peer_params;
8491         data->callback = callback;
8492         data->user_data = user_data;
8493
8494         ret = supplicant_dbus_method_call(interface->path,
8495                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "Connect",
8496                 interface_p2p_connect_params, interface_p2p_connect_result,
8497                 data, interface);
8498         if (ret < 0) {
8499                 g_free(data->path);
8500                 dbus_free(data);
8501                 return ret;
8502         }
8503
8504         return -EINPROGRESS;
8505 }
8506
8507 int g_supplicant_interface_p2p_disconnect(GSupplicantInterface *interface,
8508                                         GSupplicantPeerParams *peer_params)
8509 {
8510         GSupplicantPeer *peer;
8511         int count = 0;
8512         GSList *list;
8513
8514         SUPPLICANT_DBG("");
8515
8516         if (!interface->p2p_support)
8517                 return -ENOTSUP;
8518
8519         peer = g_hash_table_lookup(interface->peer_table, peer_params->path);
8520         if (!peer)
8521                 return -ENODEV;
8522
8523         for (list = peer->groups; list; list = list->next, count++) {
8524                 const char *group_obj_path = list->data;
8525                 GSupplicantInterface *g_interface;
8526                 GSupplicantGroup *group;
8527
8528                 group = g_hash_table_lookup(group_mapping, group_obj_path);
8529                 if (!group || !group->interface)
8530                         continue;
8531
8532                 g_interface = group->interface;
8533                 supplicant_dbus_method_call(g_interface->path,
8534                                 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
8535                                 "Disconnect", NULL, NULL, NULL, g_interface);
8536         }
8537
8538         if (count == 0 && peer->current_group_iface) {
8539                 supplicant_dbus_method_call(peer->current_group_iface->path,
8540                                 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
8541                                 "Disconnect", NULL, NULL, NULL,
8542                                 peer->current_group_iface->path);
8543         }
8544
8545         peer->current_group_iface = NULL;
8546
8547         return -EINPROGRESS;
8548 }
8549
8550 struct p2p_service_data {
8551         bool registration;
8552         GSupplicantInterface *interface;
8553         GSupplicantP2PServiceParams *service;
8554         GSupplicantInterfaceCallback callback;
8555         void *user_data;
8556 };
8557
8558 static void interface_p2p_service_result(const char *error,
8559                                         DBusMessageIter *iter, void *user_data)
8560 {
8561         struct p2p_service_data *data = user_data;
8562         int result = 0;
8563
8564         SUPPLICANT_DBG("%s result - %s", data->registration ?
8565                                 "Registration" : "Deletion",
8566                                 error ? error : "Success");
8567         if (error)
8568                 result = -EINVAL;
8569
8570         if (data->callback)
8571                 data->callback(result, data->interface, data->user_data);
8572
8573         g_free(data->service->query);
8574         g_free(data->service->response);
8575         g_free(data->service->service);
8576         g_free(data->service->wfd_ies);
8577         g_free(data->service);
8578         dbus_free(data);
8579 }
8580
8581 static void interface_p2p_service_params(DBusMessageIter *iter,
8582                                                         void *user_data)
8583 {
8584         struct p2p_service_data *data = user_data;
8585         GSupplicantP2PServiceParams *service;
8586         DBusMessageIter dict;
8587         const char *type;
8588
8589         SUPPLICANT_DBG("");
8590
8591         service = data->service;
8592
8593         supplicant_dbus_dict_open(iter, &dict);
8594
8595         if (service->query && service->response) {
8596                 type = "bonjour";
8597                 supplicant_dbus_dict_append_basic(&dict, "service_type",
8598                                                 DBUS_TYPE_STRING, &type);
8599                 supplicant_dbus_dict_append_fixed_array(&dict, "query",
8600                                         DBUS_TYPE_BYTE, &service->query,
8601                                         service->query_length);
8602                 supplicant_dbus_dict_append_fixed_array(&dict, "response",
8603                                         DBUS_TYPE_BYTE, &service->response,
8604                                         service->response_length);
8605         } else if (service->version && service->service) {
8606                 type = "upnp";
8607                 supplicant_dbus_dict_append_basic(&dict, "service_type",
8608                                                 DBUS_TYPE_STRING, &type);
8609                 supplicant_dbus_dict_append_basic(&dict, "version",
8610                                         DBUS_TYPE_INT32, &service->version);
8611                 supplicant_dbus_dict_append_basic(&dict, "service",
8612                                         DBUS_TYPE_STRING, &service->service);
8613         }
8614
8615         supplicant_dbus_dict_close(iter, &dict);
8616 }
8617
8618 int g_supplicant_interface_p2p_add_service(GSupplicantInterface *interface,
8619                                 GSupplicantInterfaceCallback callback,
8620                                 GSupplicantP2PServiceParams *p2p_service_params,
8621                                 void *user_data)
8622 {
8623         struct p2p_service_data *data;
8624         int ret;
8625
8626         SUPPLICANT_DBG("");
8627
8628         if (!interface->p2p_support)
8629                 return -ENOTSUP;
8630
8631         data = dbus_malloc0(sizeof(*data));
8632         if (!data)
8633                 return -ENOMEM;
8634
8635         data->registration = true;
8636         data->interface = interface;
8637         data->service = p2p_service_params;
8638         data->callback = callback;
8639         data->user_data = user_data;
8640
8641         ret = supplicant_dbus_method_call(interface->path,
8642                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "AddService",
8643                 interface_p2p_service_params, interface_p2p_service_result,
8644                 data, interface);
8645         if (ret < 0) {
8646                 dbus_free(data);
8647                 return ret;
8648         }
8649
8650         return -EINPROGRESS;
8651 }
8652
8653 int g_supplicant_interface_p2p_del_service(GSupplicantInterface *interface,
8654                                 GSupplicantP2PServiceParams *p2p_service_params)
8655 {
8656         struct p2p_service_data *data;
8657         int ret;
8658
8659         SUPPLICANT_DBG("");
8660
8661         if (!interface->p2p_support)
8662                 return -ENOTSUP;
8663
8664         data = dbus_malloc0(sizeof(*data));
8665         if (!data)
8666                 return -ENOMEM;
8667
8668         data->interface = interface;
8669         data->service = p2p_service_params;
8670
8671         ret = supplicant_dbus_method_call(interface->path,
8672                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeleteService",
8673                 interface_p2p_service_params, interface_p2p_service_result,
8674                 data, interface);
8675         if (ret < 0) {
8676                 dbus_free(data);
8677                 return ret;
8678         }
8679
8680         return -EINPROGRESS;
8681 }
8682
8683 struct p2p_listen_data {
8684         int period;
8685         int interval;
8686 };
8687
8688 static void interface_p2p_listen_params(DBusMessageIter *iter, void *user_data)
8689 {
8690         struct p2p_listen_data *params = user_data;
8691         DBusMessageIter dict;
8692
8693         supplicant_dbus_dict_open(iter, &dict);
8694
8695         supplicant_dbus_dict_append_basic(&dict, "period",
8696                                         DBUS_TYPE_INT32, &params->period);
8697         supplicant_dbus_dict_append_basic(&dict, "interval",
8698                                         DBUS_TYPE_INT32, &params->interval);
8699         supplicant_dbus_dict_close(iter, &dict);
8700 }
8701
8702 int g_supplicant_interface_p2p_listen(GSupplicantInterface *interface,
8703                                                 int period, int interval)
8704 {
8705         struct p2p_listen_data params;
8706
8707         SUPPLICANT_DBG("");
8708
8709         if (!interface->p2p_support)
8710                 return -ENOTSUP;
8711
8712         params.period = period;
8713         params.interval = interval;
8714
8715         return supplicant_dbus_method_call(interface->path,
8716                         SUPPLICANT_INTERFACE ".Interface.P2PDevice",
8717                         "ExtendedListen", interface_p2p_listen_params,
8718                         NULL, &params, NULL);
8719 }
8720
8721 static void widi_ies_params(DBusMessageIter *iter, void *user_data)
8722 {
8723         struct p2p_service_data *data = user_data;
8724         GSupplicantP2PServiceParams *service = data->service;
8725         DBusMessageIter array;
8726
8727         SUPPLICANT_DBG("%p - %d", service->wfd_ies, service->wfd_ies_length);
8728
8729         dbus_message_iter_open_container(iter, DBUS_TYPE_ARRAY,
8730                                         DBUS_TYPE_BYTE_AS_STRING, &array);
8731
8732         if (service->wfd_ies && service->wfd_ies_length > 0) {
8733                 dbus_message_iter_append_fixed_array(&array, DBUS_TYPE_BYTE,
8734                                 &service->wfd_ies, service->wfd_ies_length);
8735         }
8736
8737         dbus_message_iter_close_container(iter, &array);
8738 }
8739
8740 int g_supplicant_set_widi_ies(GSupplicantP2PServiceParams *p2p_service_params,
8741                                         GSupplicantInterfaceCallback callback,
8742                                         void *user_data)
8743 {
8744         struct p2p_service_data *data;
8745         int ret;
8746
8747         SUPPLICANT_DBG("");
8748
8749         if (!system_available)
8750                 return -EFAULT;
8751
8752         data = dbus_malloc0(sizeof(*data));
8753         if (!data)
8754                 return -ENOMEM;
8755
8756         data->service = p2p_service_params;
8757         data->callback = callback;
8758         data->user_data = user_data;
8759
8760         if (p2p_service_params->wfd_ies)
8761                 data->registration = true;
8762
8763         ret = supplicant_dbus_property_set(SUPPLICANT_PATH,
8764                                         SUPPLICANT_INTERFACE, "WFDIEs",
8765                                         DBUS_TYPE_ARRAY_AS_STRING
8766                                         DBUS_TYPE_BYTE_AS_STRING,
8767                                         widi_ies_params,
8768                                         interface_p2p_service_result,
8769                                         data, NULL);
8770         if (ret < 0 && ret != -EINPROGRESS) {
8771                 dbus_free(data);
8772                 return ret;
8773         }
8774
8775         return -EINPROGRESS;
8776 }
8777
8778
8779 static const char *g_supplicant_rule0 = "type=signal,"
8780                                         "path=" DBUS_PATH_DBUS ","
8781                                         "sender=" DBUS_SERVICE_DBUS ","
8782                                         "interface=" DBUS_INTERFACE_DBUS ","
8783                                         "member=NameOwnerChanged,"
8784                                         "arg0=" SUPPLICANT_SERVICE;
8785 static const char *g_supplicant_rule1 = "type=signal,"
8786                         "interface=" SUPPLICANT_INTERFACE;
8787 static const char *g_supplicant_rule2 = "type=signal,"
8788                         "interface=" SUPPLICANT_INTERFACE ".Interface";
8789 static const char *g_supplicant_rule3 = "type=signal,"
8790                         "interface=" SUPPLICANT_INTERFACE ".Interface.WPS";
8791 static const char *g_supplicant_rule4 = "type=signal,"
8792                         "interface=" SUPPLICANT_INTERFACE ".BSS";
8793 static const char *g_supplicant_rule5 = "type=signal,"
8794                         "interface=" SUPPLICANT_INTERFACE ".Network";
8795 #if !defined TIZEN_EXT
8796 static const char *g_supplicant_rule6 = "type=signal,"
8797                 "interface=" SUPPLICANT_INTERFACE ".Interface.P2PDevice";
8798 static const char *g_supplicant_rule7 = "type=signal,"
8799                 "interface=" SUPPLICANT_INTERFACE ".Peer";
8800 static const char *g_supplicant_rule8 = "type=signal,"
8801                 "interface=" SUPPLICANT_INTERFACE ".Group";
8802 #endif
8803 #if defined TIZEN_EXT_WIFI_MESH
8804 static const char *g_supplicant_rule9 = "type=signal,"
8805                 "interface=" SUPPLICANT_INTERFACE ".Interface.Mesh";
8806 #endif
8807
8808 static void invoke_introspect_method(void)
8809 {
8810         DBusMessage *message;
8811
8812         message = dbus_message_new_method_call(SUPPLICANT_SERVICE,
8813                                         SUPPLICANT_PATH,
8814                                         DBUS_INTERFACE_INTROSPECTABLE,
8815                                         "Introspect");
8816
8817         if (!message)
8818                 return;
8819
8820         dbus_message_set_no_reply(message, TRUE);
8821         dbus_connection_send(connection, message, NULL);
8822         dbus_message_unref(message);
8823 }
8824
8825 #if defined TIZEN_EXT
8826 void g_supplicant_set_ins_settings(GSupplicantINSPreferredFreq preferred_freq_bssid,
8827                 bool last_connected_bssid, bool assoc_reject, bool signal_bssid,
8828                 unsigned int preferred_freq_bssid_score, unsigned int last_connected_bssid_score,
8829                 unsigned int assoc_reject_score, int signal_level3_5ghz, int signal_level3_24ghz)
8830 {
8831         ins_settings.preferred_freq_bssid = preferred_freq_bssid;
8832         ins_settings.last_connected_bssid = last_connected_bssid;
8833         ins_settings.assoc_reject = assoc_reject;
8834         ins_settings.signal_bssid = signal_bssid;
8835         ins_settings.preferred_freq_bssid_score = preferred_freq_bssid_score;
8836         ins_settings.last_connected_bssid_score = last_connected_bssid_score;
8837         ins_settings.assoc_reject_score = assoc_reject_score;
8838         ins_settings.signal_level3_5ghz = signal_level3_5ghz;
8839         ins_settings.signal_level3_24ghz = signal_level3_24ghz;
8840
8841         SUPPLICANT_DBG("preferred_freq_bssid [%s]", preferred_freq_bssid ? "true" : "false");
8842         SUPPLICANT_DBG("preferred_freq_bssid_score [%d]", preferred_freq_bssid_score);
8843         SUPPLICANT_DBG("last_connected_bssid [%s]", last_connected_bssid ? "true" : "false");
8844         SUPPLICANT_DBG("last_connected_bssid_score [%d]", last_connected_bssid_score);
8845         SUPPLICANT_DBG("assoc_reject [%s]", assoc_reject ? "true" : "false");
8846         SUPPLICANT_DBG("assoc_reject_score [%d]", assoc_reject_score);
8847         SUPPLICANT_DBG("signal_bssid [%s]", signal_bssid ? "true" : "false");
8848         SUPPLICANT_DBG("signal_level3_5ghz [%d]", signal_level3_5ghz);
8849         SUPPLICANT_DBG("signal_level3_24ghz [%d]", signal_level3_24ghz);
8850 }
8851 #endif /* defined TIZEN_EXT */
8852
8853 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
8854 void g_supplicant_register_eap_callback(g_supplicant_eap_callback cb)
8855 {
8856         SUPPLICANT_DBG("g_supplicant_register_eap_callback %p", cb);
8857
8858         if (!callbacks_pointer) {
8859                 SUPPLICANT_DBG("callbacks_pointer is NULL");
8860                 return;
8861         }
8862
8863         callbacks_pointer->eap = cb;
8864 }
8865
8866 void g_supplicant_unregister_eap_callback(void)
8867 {
8868         SUPPLICANT_DBG("g_supplicant_unregister_eap_callback");
8869
8870         if (!callbacks_pointer) {
8871                 SUPPLICANT_DBG("callbacks_pointer is NULL");
8872                 return;
8873         }
8874
8875         callbacks_pointer->eap = NULL;
8876 }
8877 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
8878
8879 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
8880 int g_supplicant_register(GSupplicantCallbacks *callbacks)
8881 #else /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
8882 int g_supplicant_register(const GSupplicantCallbacks *callbacks)
8883 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
8884 {
8885         connection = dbus_bus_get(DBUS_BUS_SYSTEM, NULL);
8886         if (!connection)
8887                 return -EIO;
8888
8889         if (!dbus_connection_add_filter(connection, g_supplicant_filter,
8890                                                 NULL, NULL)) {
8891                 dbus_connection_unref(connection);
8892                 connection = NULL;
8893                 return -EIO;
8894         }
8895 #if defined TIZEN_EXT
8896         simplified_log = connman_setting_get_bool("SimplifiedLog");
8897 #endif
8898         callbacks_pointer = callbacks;
8899         eap_methods = 0;
8900
8901         interface_table = g_hash_table_new_full(g_str_hash, g_str_equal,
8902                                                 NULL, remove_interface);
8903
8904         bss_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
8905                                                                 NULL, NULL);
8906         peer_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
8907                                                                 NULL, NULL);
8908         group_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
8909                                                                 NULL, NULL);
8910         pending_peer_connection = g_hash_table_new_full(g_str_hash, g_str_equal,
8911                                                                 NULL, NULL);
8912         config_file_table = g_hash_table_new_full(g_str_hash, g_str_equal,
8913                                                                 g_free, g_free);
8914
8915         supplicant_dbus_setup(connection);
8916
8917         dbus_bus_add_match(connection, g_supplicant_rule0, NULL);
8918         dbus_bus_add_match(connection, g_supplicant_rule1, NULL);
8919         dbus_bus_add_match(connection, g_supplicant_rule2, NULL);
8920         dbus_bus_add_match(connection, g_supplicant_rule3, NULL);
8921         dbus_bus_add_match(connection, g_supplicant_rule4, NULL);
8922         dbus_bus_add_match(connection, g_supplicant_rule5, NULL);
8923 #if defined TIZEN_EXT
8924         dbus_bus_add_match(connection,
8925                         "type=signal,interface=org.tizen.system.deviced.PowerOff,"
8926                         "member=ChangeState", NULL);
8927 #endif
8928 #if !defined TIZEN_EXT
8929         dbus_bus_add_match(connection, g_supplicant_rule6, NULL);
8930         dbus_bus_add_match(connection, g_supplicant_rule7, NULL);
8931         dbus_bus_add_match(connection, g_supplicant_rule8, NULL);
8932 #endif
8933 #if defined TIZEN_EXT_WIFI_MESH
8934         dbus_bus_add_match(connection, g_supplicant_rule9, NULL);
8935 #endif
8936         dbus_connection_flush(connection);
8937
8938         if (dbus_bus_name_has_owner(connection,
8939                                         SUPPLICANT_SERVICE, NULL)) {
8940                 system_available = TRUE;
8941                 supplicant_dbus_property_get_all(SUPPLICANT_PATH,
8942                                                 SUPPLICANT_INTERFACE,
8943                                                 service_property, NULL, NULL);
8944         } else
8945                 invoke_introspect_method();
8946
8947         SUPPLICANT_DBG("supplicant dbus setup completed");
8948         return 0;
8949 }
8950
8951 static void unregister_interface_remove_params(DBusMessageIter *iter,
8952                                                 void *user_data)
8953 {
8954         const char *path = user_data;
8955
8956         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
8957                                                         &path);
8958 }
8959
8960
8961 static void unregister_remove_interface(gpointer key, gpointer value,
8962                                                 gpointer user_data)
8963 {
8964         GSupplicantInterface *interface = value;
8965
8966         supplicant_dbus_method_call(SUPPLICANT_PATH,
8967                                         SUPPLICANT_INTERFACE,
8968                                         "RemoveInterface",
8969                                         unregister_interface_remove_params,
8970                                         NULL, interface->path, NULL);
8971 }
8972
8973 void g_supplicant_unregister(const GSupplicantCallbacks *callbacks)
8974 {
8975         SUPPLICANT_DBG("");
8976
8977         if (connection) {
8978 #if defined TIZEN_EXT_WIFI_MESH
8979                 dbus_bus_remove_match(connection, g_supplicant_rule9, NULL);
8980 #endif
8981 #if !defined TIZEN_EXT
8982                 dbus_bus_remove_match(connection, g_supplicant_rule8, NULL);
8983                 dbus_bus_remove_match(connection, g_supplicant_rule7, NULL);
8984                 dbus_bus_remove_match(connection, g_supplicant_rule6, NULL);
8985 #endif
8986                 dbus_bus_remove_match(connection, g_supplicant_rule5, NULL);
8987                 dbus_bus_remove_match(connection, g_supplicant_rule4, NULL);
8988                 dbus_bus_remove_match(connection, g_supplicant_rule3, NULL);
8989                 dbus_bus_remove_match(connection, g_supplicant_rule2, NULL);
8990                 dbus_bus_remove_match(connection, g_supplicant_rule1, NULL);
8991                 dbus_bus_remove_match(connection, g_supplicant_rule0, NULL);
8992                 dbus_connection_flush(connection);
8993
8994                 dbus_connection_remove_filter(connection,
8995                                                 g_supplicant_filter, NULL);
8996         }
8997
8998         if (config_file_table) {
8999                 g_hash_table_destroy(config_file_table);
9000                 config_file_table = NULL;
9001         }
9002
9003         if (bss_mapping) {
9004                 g_hash_table_destroy(bss_mapping);
9005                 bss_mapping = NULL;
9006         }
9007
9008         if (peer_mapping) {
9009                 g_hash_table_destroy(peer_mapping);
9010                 peer_mapping = NULL;
9011         }
9012
9013         if (group_mapping) {
9014                 g_hash_table_destroy(group_mapping);
9015                 group_mapping = NULL;
9016         }
9017
9018         if (interface_table) {
9019                 g_hash_table_foreach(interface_table,
9020                                         unregister_remove_interface, NULL);
9021                 g_hash_table_destroy(interface_table);
9022                 interface_table = NULL;
9023         }
9024
9025         if (system_available)
9026                 callback_system_killed();
9027
9028         if (connection) {
9029                 dbus_connection_unref(connection);
9030                 connection = NULL;
9031         }
9032
9033         callbacks_pointer = NULL;
9034         eap_methods = 0;
9035 }
9036
9037 #ifdef TIZEN_EXT
9038 struct supplicant_mac_policy {
9039         GSupplicantMacPolicyCallback callback;
9040         dbus_uint32_t policy;
9041         const void *user_data;
9042 };
9043
9044 static void mac_policy_result(const char *error,
9045                                 DBusMessageIter *iter, void *user_data)
9046 {
9047         struct supplicant_mac_policy *data = user_data;
9048         int result = 0;
9049
9050         if (!user_data)
9051                 return;
9052
9053         if (error) {
9054                 SUPPLICANT_DBG("Mac policy setting failure %s", error);
9055                 result = -EINVAL;
9056         }
9057
9058         if (data->callback)
9059                 data->callback(result, data->policy,
9060                                         (void *) data->user_data);
9061
9062         dbus_free(data);
9063 }
9064
9065 static void mac_policy_params(DBusMessageIter *iter, void *user_data)
9066 {
9067         struct supplicant_mac_policy *data = user_data;
9068
9069         dbus_message_iter_append_basic(iter, DBUS_TYPE_INT32, &(data->policy));
9070 }
9071
9072 int g_supplicant_interface_set_mac_policy(GSupplicantInterface *interface,
9073                                         GSupplicantMacPolicyCallback callback,
9074                                                         unsigned int policy,
9075                                                         void *user_data)
9076 {
9077         struct supplicant_mac_policy *data = NULL;
9078         int ret;
9079
9080         if (!system_available)
9081                 return -EFAULT;
9082
9083         if (!interface)
9084                 return -EINVAL;
9085
9086         data = dbus_malloc0(sizeof(*data));
9087         if (!data)
9088                 return -ENOMEM;
9089
9090         data->callback = callback;
9091         data->policy = policy;
9092         data->user_data = user_data;
9093
9094         ret =  supplicant_dbus_property_set(interface->path,
9095                                 SUPPLICANT_INTERFACE ".Interface",
9096                                 "MacAddr", DBUS_TYPE_INT32_AS_STRING,
9097                                 mac_policy_params, mac_policy_result, data, NULL);
9098         if (ret < 0) {
9099                 SUPPLICANT_DBG("Unable to set MacAddr configuration");
9100                 dbus_free(data);
9101         }
9102
9103         return ret;
9104 }
9105
9106 int g_supplicant_interface_set_preassoc_mac_policy(GSupplicantInterface *interface,
9107                                         GSupplicantMacPolicyCallback callback,
9108                                                         unsigned int policy,
9109                                                         void *user_data)
9110 {
9111         struct supplicant_mac_policy *data;
9112         int ret;
9113
9114         if (!system_available)
9115                 return -EFAULT;
9116
9117         if (!interface)
9118                 return -EINVAL;
9119
9120         data = dbus_malloc0(sizeof(*data));
9121         if (!data)
9122                 return -ENOMEM;
9123
9124         data->callback = callback;
9125         data->policy = policy;
9126         data->user_data = user_data;
9127
9128         ret =  supplicant_dbus_property_set(interface->path,
9129                                 SUPPLICANT_INTERFACE ".Interface",
9130                                 "PreassocMacAddr", DBUS_TYPE_INT32_AS_STRING,
9131                                 mac_policy_params, mac_policy_result, data, NULL);
9132         if (ret < 0) {
9133                 SUPPLICANT_DBG("Unable to set PreassocMacAddr configuration");
9134                 dbus_free(data);
9135         }
9136
9137         return ret;
9138 }
9139
9140 struct supplicant_random_mac_lifetime {
9141         GSupplicantRandomMaclifetimeCallback callback;
9142         dbus_uint32_t lifetime;
9143         const void *user_data;
9144 };
9145
9146 static void random_mac_lifetime_result(const char *error,
9147                                 DBusMessageIter *iter, void *user_data)
9148 {
9149         struct supplicant_random_mac_lifetime *data = user_data;
9150         int result = 0;
9151
9152         if (!user_data)
9153                 return;
9154
9155         if (error) {
9156                 SUPPLICANT_DBG("Random Mac lifetime setting failure %s", error);
9157                 result = -EINVAL;
9158         }
9159
9160         if (data->callback)
9161                 data->callback(result, data->lifetime,
9162                                         (void *) data->user_data);
9163
9164         dbus_free(data);
9165 }
9166
9167 static void random_mac_lifetime_params(DBusMessageIter *iter, void *user_data)
9168 {
9169         struct supplicant_random_mac_lifetime *data = user_data;
9170
9171         dbus_message_iter_append_basic(iter, DBUS_TYPE_UINT32, &(data->lifetime));
9172 }
9173
9174 int g_supplicant_interface_set_random_mac_lifetime(GSupplicantInterface *interface,
9175                                         GSupplicantRandomMaclifetimeCallback callback,
9176                                                         unsigned int lifetime,
9177                                                         void *user_data)
9178 {
9179         struct supplicant_random_mac_lifetime *data;
9180         int ret;
9181
9182         if (!system_available)
9183                 return -EFAULT;
9184
9185         if (!interface)
9186                 return -EINVAL;
9187
9188         data = dbus_malloc0(sizeof(*data));
9189         if (!data)
9190                 return -ENOMEM;
9191
9192         data->callback = callback;
9193         data->lifetime = lifetime;
9194         data->user_data = user_data;
9195
9196         ret =  supplicant_dbus_property_set(interface->path,
9197                                 SUPPLICANT_INTERFACE ".Interface",
9198                                 "RandAddrLifetime", DBUS_TYPE_UINT32_AS_STRING,
9199                                 random_mac_lifetime_params, random_mac_lifetime_result,
9200                                 data, NULL);
9201         if (ret < 0) {
9202                 SUPPLICANT_DBG("Unable to set RandAddrLifetime configuration");
9203                 dbus_free(data);
9204         }
9205
9206         return ret;
9207 }
9208 #endif