Merge "Start scan for wifi roaming when SNR and signal are weakened" into tizen
[platform/upstream/connman.git] / gsupplicant / supplicant.c
1 /*
2  *
3  *  WPA supplicant library with GLib integration
4  *
5  *  Copyright (C) 2012-2013  Intel Corporation. All rights reserved.
6  *
7  *  This program is free software; you can redistribute it and/or modify
8  *  it under the terms of the GNU General Public License version 2 as
9  *  published by the Free Software Foundation.
10  *
11  *  This program is distributed in the hope that it will be useful,
12  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
13  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14  *  GNU General Public License for more details.
15  *
16  *  You should have received a copy of the GNU General Public License
17  *  along with this program; if not, write to the Free Software
18  *  Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA
19  *
20  */
21
22 #ifdef HAVE_CONFIG_H
23 #include <config.h>
24 #endif
25
26 #include <errno.h>
27 #include <stdio.h>
28 #include <stdlib.h>
29 #include <string.h>
30 #include <stdint.h>
31 #include <syslog.h>
32 #include <ctype.h>
33 #include <stdbool.h>
34 #include <netinet/if_ether.h>
35 #include <netinet/in.h>
36
37 #include <glib.h>
38 #include <gdbus.h>
39
40 #include "dbus.h"
41 #include "gsupplicant.h"
42
43 #if defined TIZEN_EXT
44 #include "setting.h"
45 #endif
46
47 #define IEEE80211_CAP_ESS       0x0001
48 #define IEEE80211_CAP_IBSS      0x0002
49 #define IEEE80211_CAP_PRIVACY   0x0010
50
51 #if defined TIZEN_EXT
52 #define WLAN_EID_HT_CAP 45
53 #define WLAN_EID_VHT_CAP 191
54 #define WLAN_EID_SUPP_RATES 1
55 #define WLAN_EID_EXT_SUPP_RATES 50
56 #define COUNTRY_CODE_LENGTH     2
57 #define WIFI_BSSID_LEN_MAX 6
58 #endif
59
60 #if defined TIZEN_EXT
61 #define LAST_CONNECTED_TIMEOUT       (5 * 60)
62 #define ASSOC_REJECT_TIMEOUT         10
63 #define FREQ_RANGE_24GHZ_CHANNEL_1   2412
64 #define FREQ_RANGE_24GHZ_CHANNEL_14  2484
65 #define FREQ_RANGE_5GHZ_CHANNEL_32   5160
66 #define FREQ_RANGE_5GHZ_CHANNEL_165  5825
67
68 #define MAC2STR(a) (a)[0], (a)[1], (a)[2], (a)[3], (a)[4], (a)[5]
69 #define MACSTR "%02x:%02x:%02x:%02x:%02x:%02x"
70 #endif
71
72 #define BSS_UNKNOWN_STRENGTH    -90
73
74 static DBusConnection *connection;
75
76 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
77 static GSupplicantCallbacks *callbacks_pointer;
78 #else /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
79 static const GSupplicantCallbacks *callbacks_pointer;
80 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
81
82 static dbus_bool_t system_available = FALSE;
83 static dbus_bool_t system_ready = FALSE;
84
85 static dbus_int32_t debug_level;
86 static dbus_bool_t debug_timestamp = FALSE;
87 static dbus_bool_t debug_showkeys = FALSE;
88
89 static const char *debug_strings[] = {
90         "msgdump", "debug", "info", "warning", "error", NULL
91 };
92
93 static unsigned int eap_methods;
94
95 struct strvalmap {
96         const char *str;
97         unsigned int val;
98 };
99
100 static struct strvalmap eap_method_map[] = {
101         { "MD5",        G_SUPPLICANT_EAP_METHOD_MD5     },
102         { "TLS",        G_SUPPLICANT_EAP_METHOD_TLS     },
103         { "MSCHAPV2",   G_SUPPLICANT_EAP_METHOD_MSCHAPV2        },
104         { "PEAP",       G_SUPPLICANT_EAP_METHOD_PEAP    },
105         { "TTLS",       G_SUPPLICANT_EAP_METHOD_TTLS    },
106         { "GTC",        G_SUPPLICANT_EAP_METHOD_GTC     },
107         { "OTP",        G_SUPPLICANT_EAP_METHOD_OTP     },
108         { "LEAP",       G_SUPPLICANT_EAP_METHOD_LEAP    },
109         { "WSC",        G_SUPPLICANT_EAP_METHOD_WSC     },
110         { }
111 };
112
113 static struct strvalmap keymgmt_map[] = {
114         { "none",               G_SUPPLICANT_KEYMGMT_NONE               },
115         { "ieee8021x",          G_SUPPLICANT_KEYMGMT_IEEE8021X  },
116         { "wpa-none",           G_SUPPLICANT_KEYMGMT_WPA_NONE   },
117         { "wpa-psk",            G_SUPPLICANT_KEYMGMT_WPA_PSK    },
118         { "wpa-psk-sha256",     G_SUPPLICANT_KEYMGMT_WPA_PSK_256        },
119         { "wpa-ft-psk",         G_SUPPLICANT_KEYMGMT_WPA_FT_PSK },
120         { "wpa-ft-eap",         G_SUPPLICANT_KEYMGMT_WPA_FT_EAP },
121         { "wpa-eap",            G_SUPPLICANT_KEYMGMT_WPA_EAP    },
122         { "wpa-eap-sha256",     G_SUPPLICANT_KEYMGMT_WPA_EAP_256        },
123         { "wps",                G_SUPPLICANT_KEYMGMT_WPS                },
124 #if defined TIZEN_EXT
125         { "sae",                G_SUPPLICANT_KEYMGMT_SAE                },
126         { "owe",                G_SUPPLICANT_KEYMGMT_OWE                },
127         { "dpp",                G_SUPPLICANT_KEYMGMT_DPP                },
128 #endif
129         { }
130 };
131
132 static struct strvalmap authalg_capa_map[] = {
133         { "open",       G_SUPPLICANT_CAPABILITY_AUTHALG_OPEN    },
134         { "shared",     G_SUPPLICANT_CAPABILITY_AUTHALG_SHARED  },
135         { "leap",       G_SUPPLICANT_CAPABILITY_AUTHALG_LEAP    },
136         { }
137 };
138
139 static struct strvalmap proto_capa_map[] = {
140         { "wpa",        G_SUPPLICANT_CAPABILITY_PROTO_WPA               },
141         { "rsn",        G_SUPPLICANT_CAPABILITY_PROTO_RSN               },
142         { }
143 };
144
145 static struct strvalmap group_map[] = {
146         { "wep40",      G_SUPPLICANT_GROUP_WEP40        },
147         { "wep104",     G_SUPPLICANT_GROUP_WEP104       },
148         { "tkip",       G_SUPPLICANT_GROUP_TKIP },
149         { "ccmp",       G_SUPPLICANT_GROUP_CCMP },
150         { }
151 };
152
153 static struct strvalmap pairwise_map[] = {
154         { "none",       G_SUPPLICANT_PAIRWISE_NONE      },
155         { "tkip",       G_SUPPLICANT_PAIRWISE_TKIP      },
156         { "ccmp",       G_SUPPLICANT_PAIRWISE_CCMP      },
157         { }
158 };
159
160 static struct strvalmap scan_capa_map[] = {
161         { "active",     G_SUPPLICANT_CAPABILITY_SCAN_ACTIVE     },
162         { "passive",    G_SUPPLICANT_CAPABILITY_SCAN_PASSIVE    },
163         { "ssid",       G_SUPPLICANT_CAPABILITY_SCAN_SSID               },
164         { }
165 };
166
167 static struct strvalmap mode_capa_map[] = {
168         { "infrastructure",     G_SUPPLICANT_CAPABILITY_MODE_INFRA      },
169         { "ad-hoc",             G_SUPPLICANT_CAPABILITY_MODE_IBSS       },
170         { "ap",                 G_SUPPLICANT_CAPABILITY_MODE_AP         },
171         { "p2p",                G_SUPPLICANT_CAPABILITY_MODE_P2P        },
172 #if defined TIZEN_EXT_WIFI_MESH
173         { "mesh",               G_SUPPLICANT_CAPABILITY_MODE_MESH       },
174 #endif
175         { }
176 };
177
178 #if defined TIZEN_EXT && defined TIZEN_EXT_INS
179 struct _GSupplicantINSSettings {
180         GSupplicantINSPreferredFreq preferred_freq_bssid;
181         unsigned int preferred_freq_bssid_score;
182         bool last_connected_bssid;
183         unsigned int last_connected_bssid_score;
184         bool assoc_reject;
185         unsigned int assoc_reject_score;
186         bool signal_bssid;
187         int signal_level3_5ghz;
188         int signal_level3_24ghz;
189 };
190
191 static struct _GSupplicantINSSettings ins_settings;
192 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_INS */
193
194 #if defined TIZEN_EXT
195 static unsigned char invalid_bssid[WIFI_BSSID_LEN_MAX] = {
196         0x00, 0x00, 0x00, 0x00, 0x00, 0x00
197 };
198 #endif
199
200 static GHashTable *interface_table;
201 static GHashTable *bss_mapping;
202 static GHashTable *peer_mapping;
203 static GHashTable *group_mapping;
204 static GHashTable *pending_peer_connection;
205 static GHashTable *config_file_table;
206
207 struct _GSupplicantWpsCredentials {
208         unsigned char ssid[32];
209         unsigned int ssid_len;
210         char *key;
211 };
212
213 struct added_network_information {
214         char * ssid;
215         GSupplicantSecurity security;
216         char * passphrase;
217         char * private_passphrase;
218 #if defined TIZEN_EXT
219         char *connector;
220         char *c_sign_key;
221         char *net_access_key;
222 #endif
223 };
224
225 #if defined TIZEN_EXT_WIFI_MESH
226 struct _GSupplicantMeshGroupInfo {
227         unsigned char ssid[32];
228         unsigned int ssid_len;
229         int disconnect_reason;
230 };
231 #endif
232
233 struct _GSupplicantInterface {
234         char *path;
235         char *network_path;
236         unsigned int keymgmt_capa;
237         unsigned int authalg_capa;
238         unsigned int proto_capa;
239         unsigned int group_capa;
240         unsigned int pairwise_capa;
241         unsigned int scan_capa;
242         unsigned int mode_capa;
243         unsigned int max_scan_ssids;
244         bool p2p_support;
245         bool p2p_finding;
246         bool ap_create_in_progress;
247         dbus_bool_t ready;
248         GSupplicantState state;
249         dbus_bool_t scanning;
250         GSupplicantInterfaceCallback scan_callback;
251         void *scan_data;
252         int apscan;
253         char *ifname;
254         char *driver;
255         char *bridge;
256         struct _GSupplicantWpsCredentials wps_cred;
257         GSupplicantWpsState wps_state;
258         GHashTable *network_table;
259         GHashTable *peer_table;
260         GHashTable *group_table;
261         GHashTable *bss_mapping;
262         void *data;
263         const char *pending_peer_path;
264         GSupplicantNetwork *current_network;
265         struct added_network_information network_info;
266 #if defined TIZEN_EXT
267         dbus_bool_t is_5_0_Ghz_supported;
268         int disconnect_reason;
269 #endif
270 #if defined TIZEN_EXT
271         unsigned char add_network_bssid[WIFI_BSSID_LEN_MAX];
272         unsigned char connected_bssid[WIFI_BSSID_LEN_MAX];
273 #endif
274 #if defined TIZEN_EXT_WIFI_MESH
275         bool mesh_support;
276         struct _GSupplicantMeshGroupInfo group_info;
277 #endif
278 };
279
280 struct g_supplicant_bss {
281         GSupplicantInterface *interface;
282         char *path;
283         unsigned char bssid[6];
284         unsigned char ssid[32];
285         unsigned int ssid_len;
286         dbus_uint16_t frequency;
287         dbus_uint32_t maxrate;
288         dbus_int16_t signal;
289         GSupplicantMode mode;
290         GSupplicantSecurity security;
291         dbus_bool_t rsn_selected;
292         unsigned int wpa_keymgmt;
293         unsigned int wpa_pairwise;
294         unsigned int wpa_group;
295         unsigned int rsn_keymgmt;
296         unsigned int rsn_pairwise;
297         unsigned int rsn_group;
298         unsigned int keymgmt;
299         dbus_bool_t privacy;
300         dbus_bool_t psk;
301         dbus_bool_t ieee8021x;
302 #if defined TIZEN_EXT
303         dbus_bool_t ft_psk;
304         dbus_bool_t ft_ieee8021x;
305         GSList *vsie_list;
306         dbus_bool_t hs20;
307         unsigned char country_code[COUNTRY_CODE_LENGTH];
308         GSupplicantPhy_mode phy_mode;
309         dbus_int16_t snr;
310         dbus_uint32_t est_throughput;
311 #endif
312         unsigned int wps_capabilities;
313 #if defined TIZEN_EXT
314         dbus_bool_t sae;
315         dbus_bool_t owe;
316         dbus_bool_t dpp;
317         dbus_bool_t owe_transition_mode;
318         unsigned int transition_mode_ssid_len;
319         unsigned char transition_mode_bssid[6];
320         unsigned char transition_mode_ssid[32];
321 #endif
322 };
323
324 struct _GSupplicantNetwork {
325         GSupplicantInterface *interface;
326         char *path;
327         char *group;
328         char *name;
329         unsigned char ssid[32];
330         unsigned int ssid_len;
331         dbus_int16_t signal;
332         dbus_uint16_t frequency;
333         struct g_supplicant_bss *best_bss;
334         GSupplicantMode mode;
335         GSupplicantSecurity security;
336         dbus_bool_t wps;
337         unsigned int wps_capabilities;
338         GHashTable *bss_table;
339         GHashTable *config_table;
340 #if defined TIZEN_EXT
341         bool isHS20AP;
342         char *eap;
343         char *identity;
344         char *phase2;
345         unsigned int keymgmt;
346         GSList *vsie_list;
347         unsigned char country_code[COUNTRY_CODE_LENGTH];
348         GSupplicantPhy_mode phy_mode;
349         dbus_bool_t owe_transition_mode;
350         dbus_bool_t privacy;
351         unsigned int transition_mode_ssid_len;
352         unsigned char transition_mode_bssid[6];
353         unsigned char transition_mode_ssid[32];
354         unsigned char last_connected_bssid[WIFI_BSSID_LEN_MAX];
355         GHashTable *assoc_reject_table;
356 #endif
357 };
358
359 struct _GSupplicantPeer {
360         GSupplicantInterface *interface;
361         char *path;
362         unsigned char device_address[ETH_ALEN];
363         unsigned char iface_address[ETH_ALEN];
364         char *name;
365         unsigned char *widi_ies;
366         int widi_ies_length;
367         char *identifier;
368         unsigned int wps_capabilities;
369         GSList *groups;
370         const GSupplicantInterface *current_group_iface;
371         bool connection_requested;
372 };
373
374 struct _GSupplicantGroup {
375         GSupplicantInterface *interface;
376         GSupplicantInterface *orig_interface;
377         char *path;
378         int role;
379         GSList *members;
380 };
381
382 struct interface_data {
383         GSupplicantInterface *interface;
384         char *path; /* Interface path cannot be taken from interface (above) as
385                      * it might have been freed already.
386                      */
387         GSupplicantInterfaceCallback callback;
388         void *user_data;
389         bool network_remove_in_progress;
390         GSupplicantSSID *ssid;
391 };
392
393 #if defined TIZEN_EXT
394 struct interface_signalpoll_data {
395         GSupplicantInterface *interface;
396         char *path;
397         GSupplicantMaxSpeedCallback callback;
398         void *user_data;
399 };
400 #endif
401
402 struct interface_create_data {
403         char *ifname;
404         char *driver;
405         char *bridge;
406 #if defined TIZEN_EXT
407         unsigned int mac_addr;
408         unsigned int preassoc_mac_addr;
409         unsigned int random_mac_lifetime;
410 #endif /* TIZEN_EXT */
411 #if defined TIZEN_EXT_WIFI_MESH
412         char *parent_ifname;
413         bool is_mesh_interface;
414 #endif
415         GSupplicantInterface *interface;
416         GSupplicantInterfaceCallback callback;
417         void *user_data;
418 };
419
420 struct interface_connect_data {
421         GSupplicantInterface *interface;
422         char *path;
423         GSupplicantInterfaceCallback callback;
424         void *user_data;
425         union {
426                 GSupplicantSSID *ssid;
427                 GSupplicantPeerParams *peer;
428         };
429 };
430
431 struct interface_scan_data {
432         GSupplicantInterface *interface;
433         char *path;
434         GSupplicantInterfaceCallback callback;
435         GSupplicantScanParams *scan_params;
436         void *user_data;
437 };
438
439 #if defined TIZEN_EXT
440 struct g_connman_bssids {
441         unsigned char bssid[WIFI_BSSID_LEN_MAX];
442         uint16_t strength;
443         uint16_t frequency;
444         uint16_t assoc_reject_cnt;
445         bool is_last_connected;
446 #if defined TIZEN_EXT_INS
447         int score_last_connected_bssid;
448         int score_assoc_reject;
449         int score_frequency;
450         int score_strength;
451         int score_snr;
452         int score_est_throughput;
453 #endif
454         int ins_score;
455 };
456
457 struct update_bssid_data {
458         GSupplicantNetwork *network;
459         unsigned char last_connected_bssid[WIFI_BSSID_LEN_MAX];
460         GHashTable *assoc_reject_table;
461         GSList *bssid_list;
462 };
463
464 struct assoc_reject_data {
465         char *bssid;
466         GSList *reject_time_list;
467 };
468
469 struct assoc_count_data {
470         time_t ref_time;
471         int assoc_count;
472 };
473
474 static unsigned int last_connected_bss_timeout = 0;
475 static bool simplified_log = true;
476 #endif
477
478 static int network_remove(struct interface_data *data);
479
480 #if defined TIZEN_EXT_WIFI_MESH
481 struct _GSupplicantMeshPeer {
482         GSupplicantInterface *interface;
483         char *peer_address;
484         int disconnect_reason;
485 };
486 #endif
487
488 static inline void debug(const char *format, ...)
489 {
490         char str[256];
491         va_list ap;
492
493         if (!callbacks_pointer || !callbacks_pointer->debug)
494                 return;
495
496         va_start(ap, format);
497
498         if (vsnprintf(str, sizeof(str), format, ap) > 0)
499                 callbacks_pointer->debug(str);
500
501         va_end(ap);
502 }
503
504 #define SUPPLICANT_DBG(fmt, arg...) \
505         debug("%s:%s() " fmt, __FILE__, __FUNCTION__ , ## arg);
506
507 static GSupplicantMode string2mode(const char *mode)
508 {
509         if (!mode)
510                 return G_SUPPLICANT_MODE_UNKNOWN;
511
512         if (g_str_equal(mode, "infrastructure"))
513                 return G_SUPPLICANT_MODE_INFRA;
514         else if (g_str_equal(mode, "ad-hoc"))
515                 return G_SUPPLICANT_MODE_IBSS;
516 #if defined TIZEN_EXT_WIFI_MESH
517         else if (g_str_equal(mode, "mesh"))
518                 return G_SUPPLICANT_MODE_MESH;
519 #endif
520
521         return G_SUPPLICANT_MODE_UNKNOWN;
522 }
523
524 static const char *mode2string(GSupplicantMode mode)
525 {
526         switch (mode) {
527         case G_SUPPLICANT_MODE_UNKNOWN:
528                 break;
529         case G_SUPPLICANT_MODE_INFRA:
530                 return "managed";
531         case G_SUPPLICANT_MODE_IBSS:
532                 return "adhoc";
533         case G_SUPPLICANT_MODE_MASTER:
534                 return "ap";
535 #if defined TIZEN_EXT_WIFI_MESH
536         case G_SUPPLICANT_MODE_MESH:
537                 return "mesh";
538 #endif
539         }
540
541         return NULL;
542 }
543
544 static const char *security2string(GSupplicantSecurity security)
545 {
546         switch (security) {
547         case G_SUPPLICANT_SECURITY_UNKNOWN:
548                 break;
549         case G_SUPPLICANT_SECURITY_NONE:
550                 return "none";
551         case G_SUPPLICANT_SECURITY_WEP:
552                 return "wep";
553         case G_SUPPLICANT_SECURITY_PSK:
554                 return "psk";
555         case G_SUPPLICANT_SECURITY_IEEE8021X:
556                 return "ieee8021x";
557 #if defined TIZEN_EXT
558         case G_SUPPLICANT_SECURITY_FT_PSK:
559                 return "ft_psk";
560         case G_SUPPLICANT_SECURITY_FT_IEEE8021X:
561                 return "ft_ieee8021x";
562         case G_SUPPLICANT_SECURITY_SAE:
563                 return "sae";
564         case G_SUPPLICANT_SECURITY_OWE:
565                 return "owe";
566         case G_SUPPLICANT_SECURITY_DPP:
567                 return "dpp";
568 #endif
569         }
570
571         return NULL;
572 }
573
574 static GSupplicantState string2state(const char *state)
575 {
576         if (!state)
577                 return G_SUPPLICANT_STATE_UNKNOWN;
578
579         if (g_str_equal(state, "unknown"))
580                 return G_SUPPLICANT_STATE_UNKNOWN;
581         else if (g_str_equal(state, "interface_disabled"))
582                 return G_SUPPLICANT_STATE_DISABLED;
583         else if (g_str_equal(state, "disconnected"))
584                 return G_SUPPLICANT_STATE_DISCONNECTED;
585         else if (g_str_equal(state, "inactive"))
586                 return G_SUPPLICANT_STATE_INACTIVE;
587         else if (g_str_equal(state, "scanning"))
588                 return G_SUPPLICANT_STATE_SCANNING;
589         else if (g_str_equal(state, "authenticating"))
590                 return G_SUPPLICANT_STATE_AUTHENTICATING;
591         else if (g_str_equal(state, "associating"))
592                 return G_SUPPLICANT_STATE_ASSOCIATING;
593         else if (g_str_equal(state, "associated"))
594                 return G_SUPPLICANT_STATE_ASSOCIATED;
595         else if (g_str_equal(state, "group_handshake"))
596                 return G_SUPPLICANT_STATE_GROUP_HANDSHAKE;
597         else if (g_str_equal(state, "4way_handshake"))
598                 return G_SUPPLICANT_STATE_4WAY_HANDSHAKE;
599         else if (g_str_equal(state, "completed"))
600                 return G_SUPPLICANT_STATE_COMPLETED;
601
602         return G_SUPPLICANT_STATE_UNKNOWN;
603 }
604
605 static bool compare_network_parameters(GSupplicantInterface *interface,
606                                 GSupplicantSSID *ssid)
607 {
608 #if defined TIZEN_EXT
609         if (!interface->network_info.ssid)
610                 return FALSE;
611 #endif
612
613         if (memcmp(interface->network_info.ssid, ssid->ssid, ssid->ssid_len))
614                 return FALSE;
615
616         if (interface->network_info.security != ssid->security)
617                 return FALSE;
618
619         if (interface->network_info.passphrase &&
620                         g_strcmp0(interface->network_info.passphrase,
621                                 ssid->passphrase) != 0) {
622                 return FALSE;
623         }
624
625         if (interface->network_info.private_passphrase &&
626                         g_strcmp0(interface->network_info.private_passphrase,
627                                 ssid->private_key_passphrase) != 0) {
628                 return FALSE;
629         }
630
631 #if defined TIZEN_EXT
632         if (interface->network_info.connector &&
633                         g_strcmp0(interface->network_info.connector,
634                                 ssid->connector) != 0) {
635                 return FALSE;
636         }
637         if (interface->network_info.c_sign_key &&
638                         g_strcmp0(interface->network_info.c_sign_key,
639                                 ssid->c_sign_key) != 0) {
640                 return FALSE;
641         }
642         if (interface->network_info.net_access_key &&
643                         g_strcmp0(interface->network_info.net_access_key,
644                                 ssid->net_access_key) != 0) {
645                 return FALSE;
646         }
647 #endif
648         return TRUE;
649 }
650
651 static void remove_network_information(GSupplicantInterface * interface)
652 {
653         g_free(interface->network_info.ssid);
654         g_free(interface->network_info.passphrase);
655         g_free(interface->network_info.private_passphrase);
656 #if defined TIZEN_EXT
657         g_free(interface->network_info.connector);
658         g_free(interface->network_info.c_sign_key);
659         g_free(interface->network_info.net_access_key);
660 #endif
661         interface->network_info.ssid = NULL;
662         interface->network_info.passphrase = NULL;
663         interface->network_info.private_passphrase = NULL;
664 #if defined TIZEN_EXT
665         interface->network_info.connector = NULL;
666         interface->network_info.c_sign_key = NULL;
667         interface->network_info.net_access_key = NULL;
668 #endif
669 }
670
671 static int store_network_information(GSupplicantInterface * interface,
672                                 GSupplicantSSID *ssid)
673 {
674         interface->network_info.ssid = g_malloc(ssid->ssid_len + 1);
675         if (interface->network_info.ssid != NULL) {
676                 memcpy(interface->network_info.ssid, ssid->ssid,
677                         ssid->ssid_len);
678                 interface->network_info.ssid[ssid->ssid_len] = '\0';
679         } else {
680                 return -ENOMEM;
681         }
682
683         interface->network_info.security = ssid->security;
684
685         if ((ssid->security == G_SUPPLICANT_SECURITY_WEP ||
686                 ssid->security == G_SUPPLICANT_SECURITY_PSK ||
687                 ssid->security == G_SUPPLICANT_SECURITY_NONE) &&
688                 ssid->passphrase) {
689                 interface->network_info.passphrase = g_strdup(ssid->passphrase);
690         }
691
692         if (ssid->security == G_SUPPLICANT_SECURITY_IEEE8021X &&
693                         ssid->private_key_passphrase) {
694                 interface->network_info.private_passphrase =
695                         g_strdup(ssid->private_key_passphrase);
696         }
697
698         return 0;
699 }
700
701 static void callback_system_ready(void)
702 {
703         if (system_ready)
704                 return;
705
706         system_ready = TRUE;
707
708         if (!callbacks_pointer)
709                 return;
710
711         if (!callbacks_pointer->system_ready)
712                 return;
713
714         callbacks_pointer->system_ready();
715 }
716
717 static void callback_system_killed(void)
718 {
719         system_ready = FALSE;
720
721         if (!callbacks_pointer)
722                 return;
723
724         if (!callbacks_pointer->system_killed)
725                 return;
726
727         callbacks_pointer->system_killed();
728 }
729
730 static void callback_interface_added(GSupplicantInterface *interface)
731 {
732         SUPPLICANT_DBG("");
733
734         if (!callbacks_pointer)
735                 return;
736
737         if (!callbacks_pointer->interface_added)
738                 return;
739
740         callbacks_pointer->interface_added(interface);
741 }
742
743 static void callback_interface_state(GSupplicantInterface *interface)
744 {
745         if (!callbacks_pointer)
746                 return;
747
748         if (!callbacks_pointer->interface_state)
749                 return;
750
751         callbacks_pointer->interface_state(interface);
752 }
753
754 static void callback_interface_removed(GSupplicantInterface *interface)
755 {
756         if (!callbacks_pointer)
757                 return;
758
759         if (!callbacks_pointer->interface_removed)
760                 return;
761
762         callbacks_pointer->interface_removed(interface);
763 }
764
765 #if !defined TIZEN_EXT
766 static void callback_p2p_support(GSupplicantInterface *interface)
767 {
768         SUPPLICANT_DBG("");
769
770         if (!interface->p2p_support)
771                 return;
772
773         if (callbacks_pointer && callbacks_pointer->p2p_support)
774                 callbacks_pointer->p2p_support(interface);
775 }
776 #endif
777
778 #if defined TIZEN_EXT_WIFI_MESH
779 static void callback_mesh_support(GSupplicantInterface *interface)
780 {
781         SUPPLICANT_DBG("");
782
783         if (!interface->mesh_support)
784                 return;
785
786         if (callbacks_pointer && callbacks_pointer->mesh_support)
787                 callbacks_pointer->mesh_support(interface);
788 }
789
790 bool g_supplicant_interface_has_mesh(GSupplicantInterface *interface)
791 {
792         if (!interface)
793                 return false;
794
795         return interface->mesh_support;
796 }
797 #endif
798
799 static void callback_scan_started(GSupplicantInterface *interface)
800 {
801         if (!callbacks_pointer)
802                 return;
803
804         if (!callbacks_pointer->scan_started)
805                 return;
806
807         callbacks_pointer->scan_started(interface);
808 }
809
810 static void callback_ap_create_fail(GSupplicantInterface *interface)
811 {
812         if (!callbacks_pointer)
813                 return;
814
815         if (!callbacks_pointer->ap_create_fail)
816                 return;
817
818         callbacks_pointer->ap_create_fail(interface);
819 }
820
821 static void callback_scan_finished(GSupplicantInterface *interface)
822 {
823         if (!callbacks_pointer)
824                 return;
825
826         if (!callbacks_pointer->scan_finished)
827                 return;
828
829         callbacks_pointer->scan_finished(interface);
830 }
831
832 static void callback_network_added(GSupplicantNetwork *network)
833 {
834         if (!callbacks_pointer)
835                 return;
836
837         if (!callbacks_pointer->network_added)
838                 return;
839
840         callbacks_pointer->network_added(network);
841 }
842
843 static void callback_network_removed(GSupplicantNetwork *network)
844 {
845         if (!callbacks_pointer)
846                 return;
847
848         if (!callbacks_pointer->network_removed)
849                 return;
850
851         callbacks_pointer->network_removed(network);
852 }
853
854 #if defined TIZEN_EXT
855 static void callback_network_merged(GSupplicantNetwork *network)
856 {
857         if (!callbacks_pointer)
858                 return;
859
860         if (!callbacks_pointer->network_merged)
861                 return;
862
863         callbacks_pointer->network_merged(network);
864 }
865
866 static void callback_assoc_failed(void *user_data)
867 {
868         if (!callbacks_pointer)
869                 return;
870
871         if (!callbacks_pointer->assoc_failed)
872                 return;
873
874         callbacks_pointer->assoc_failed(user_data);
875 }
876
877 static void callback_scan_done(GSupplicantInterface *interface)
878 {
879         if (!callbacks_pointer)
880                 return;
881
882         if (!callbacks_pointer->scan_done)
883                 return;
884
885         callbacks_pointer->scan_done(interface);
886 }
887 #endif
888
889 static void callback_network_changed(GSupplicantNetwork *network,
890                                         const char *property)
891 {
892         if (!callbacks_pointer)
893                 return;
894
895         if (!callbacks_pointer->network_changed)
896                 return;
897
898         callbacks_pointer->network_changed(network, property);
899 }
900
901 static void callback_network_associated(GSupplicantNetwork *network)
902 {
903         if (!callbacks_pointer)
904                 return;
905
906         if (!callbacks_pointer->network_associated)
907                 return;
908
909         callbacks_pointer->network_associated(network);
910 }
911
912 static void callback_sta_authorized(GSupplicantInterface *interface,
913                                         const char *addr)
914 {
915         if (!callbacks_pointer)
916                 return;
917
918         if (!callbacks_pointer->sta_authorized)
919                 return;
920
921         callbacks_pointer->sta_authorized(interface, addr);
922 }
923
924 static void callback_sta_deauthorized(GSupplicantInterface *interface,
925                                         const char *addr)
926 {
927         if (!callbacks_pointer)
928                 return;
929
930         if (!callbacks_pointer->sta_deauthorized)
931                 return;
932
933         callbacks_pointer->sta_deauthorized(interface, addr);
934 }
935
936 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
937 static void callback_eap(GSupplicantInterface *interface, bool status)
938 {
939         if (!callbacks_pointer)
940                 return;
941
942         if (!callbacks_pointer->eap)
943                 return;
944
945         callbacks_pointer->eap(interface, status);
946 }
947 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
948
949 static void callback_peer_found(GSupplicantPeer *peer)
950 {
951         if (!callbacks_pointer)
952                 return;
953
954         if (!callbacks_pointer->peer_found)
955                 return;
956
957         callbacks_pointer->peer_found(peer);
958 }
959
960 static void callback_peer_lost(GSupplicantPeer *peer)
961 {
962         if (!callbacks_pointer)
963                 return;
964
965         if (!callbacks_pointer->peer_lost)
966                 return;
967
968         callbacks_pointer->peer_lost(peer);
969 }
970
971 static void callback_peer_changed(GSupplicantPeer *peer,
972                                                 GSupplicantPeerState state)
973 {
974         if (!callbacks_pointer)
975                 return;
976
977         if (!callbacks_pointer->peer_changed)
978                 return;
979
980         callbacks_pointer->peer_changed(peer, state);
981 }
982
983 static void callback_peer_request(GSupplicantPeer *peer)
984 {
985         if (!callbacks_pointer)
986                 return;
987
988         if (!callbacks_pointer->peer_request)
989                 return;
990
991         peer->connection_requested = true;
992
993         callbacks_pointer->peer_request(peer);
994 }
995
996 static void callback_disconnect_reason_code(GSupplicantInterface *interface,
997                                         int reason_code)
998 {
999         if (!callbacks_pointer)
1000                 return;
1001
1002         if (!callbacks_pointer->disconnect_reasoncode)
1003                 return;
1004
1005         if (reason_code != 0)
1006                 callbacks_pointer->disconnect_reasoncode(interface,
1007                                                         reason_code);
1008 }
1009
1010 static void callback_assoc_status_code(GSupplicantInterface *interface,
1011                                 int status_code)
1012 {
1013         if (!callbacks_pointer)
1014                 return;
1015
1016         if (!callbacks_pointer->assoc_status_code)
1017                 return;
1018
1019         callbacks_pointer->assoc_status_code(interface, status_code);
1020
1021 }
1022
1023 static void remove_group(gpointer data)
1024 {
1025         GSupplicantGroup *group = data;
1026
1027         if (group->members)
1028                 g_slist_free_full(group->members, g_free);
1029
1030         g_free(group->path);
1031         g_free(group);
1032 }
1033
1034 static void remove_interface(gpointer data)
1035 {
1036         GSupplicantInterface *interface = data;
1037
1038         g_hash_table_destroy(interface->bss_mapping);
1039         g_hash_table_destroy(interface->network_table);
1040         g_hash_table_destroy(interface->peer_table);
1041         g_hash_table_destroy(interface->group_table);
1042
1043         if (interface->scan_callback) {
1044                 SUPPLICANT_DBG("call interface %p callback %p scanning %d",
1045                                 interface, interface->scan_callback,
1046                                 interface->scanning);
1047
1048                 interface->scan_callback(-EIO, interface, interface->scan_data);
1049                 interface->scan_callback = NULL;
1050                 interface->scan_data = NULL;
1051
1052                 if (interface->scanning) {
1053                         interface->scanning = FALSE;
1054                         callback_scan_finished(interface);
1055                 }
1056         }
1057
1058         callback_interface_removed(interface);
1059
1060         g_free(interface->wps_cred.key);
1061         g_free(interface->path);
1062         g_free(interface->network_path);
1063 #if defined TIZEN_EXT
1064         interface->network_path = NULL;
1065 #endif
1066         g_free(interface->ifname);
1067         g_free(interface->driver);
1068         g_free(interface->bridge);
1069         remove_network_information(interface);
1070         g_free(interface);
1071 }
1072
1073 static void remove_network(gpointer data)
1074 {
1075         GSupplicantNetwork *network = data;
1076
1077         g_hash_table_destroy(network->bss_table);
1078
1079         callback_network_removed(network);
1080
1081         g_hash_table_destroy(network->config_table);
1082 #if defined TIZEN_EXT
1083         g_hash_table_destroy(network->assoc_reject_table);
1084 #endif
1085
1086         g_free(network->path);
1087         g_free(network->group);
1088         g_free(network->name);
1089 #if defined TIZEN_EXT
1090         g_free(network->eap);
1091         g_free(network->identity);
1092         g_free(network->phase2);
1093 #endif
1094 #if defined TIZEN_EXT
1095         g_slist_free_full(network->vsie_list, g_free);
1096 #endif
1097
1098         g_free(network);
1099 }
1100
1101 static void remove_bss(gpointer data)
1102 {
1103         struct g_supplicant_bss *bss = data;
1104
1105         supplicant_dbus_property_call_cancel_all(bss);
1106
1107         g_free(bss->path);
1108 #if defined TIZEN_EXT
1109         g_slist_free_full(bss->vsie_list, g_free);
1110 #endif
1111         g_free(bss);
1112 }
1113
1114 static void remove_peer(gpointer data)
1115 {
1116         GSupplicantPeer *peer = data;
1117
1118         callback_peer_lost(peer);
1119
1120         if (peer->groups)
1121                 g_slist_free_full(peer->groups, g_free);
1122
1123         if (peer_mapping)
1124                 g_hash_table_remove(peer_mapping, peer->path);
1125
1126         if (pending_peer_connection)
1127                 g_hash_table_remove(pending_peer_connection, peer->path);
1128
1129         g_free(peer->path);
1130         g_free(peer->name);
1131         g_free(peer->identifier);
1132         g_free(peer->widi_ies);
1133
1134         g_free(peer);
1135 }
1136
1137 #if defined TIZEN_EXT
1138 static void remove_assoc_data(gpointer data)
1139 {
1140         struct assoc_reject_data *assoc_data = data;
1141
1142         g_free(assoc_data->bssid);
1143         g_slist_free(assoc_data->reject_time_list);
1144
1145         g_free(assoc_data);
1146 }
1147 #endif
1148
1149 static void debug_strvalmap(const char *label, struct strvalmap *map,
1150                                                         unsigned int val)
1151 {
1152         int i;
1153 #if defined TIZEN_EXT
1154         if (!simplified_log)
1155 #endif
1156         for (i = 0; map[i].str; i++) {
1157                 if (val & map[i].val)
1158                         SUPPLICANT_DBG("%s: %s", label, map[i].str);
1159         }
1160 }
1161
1162 static void interface_capability_keymgmt(DBusMessageIter *iter, void *user_data)
1163 {
1164         GSupplicantInterface *interface = user_data;
1165         const char *str = NULL;
1166         int i;
1167
1168         dbus_message_iter_get_basic(iter, &str);
1169         if (!str)
1170                 return;
1171
1172         for (i = 0; keymgmt_map[i].str; i++)
1173                 if (strcmp(str, keymgmt_map[i].str) == 0) {
1174                         interface->keymgmt_capa |= keymgmt_map[i].val;
1175                         break;
1176                 }
1177 }
1178
1179 static void interface_capability_authalg(DBusMessageIter *iter, void *user_data)
1180 {
1181         GSupplicantInterface *interface = user_data;
1182         const char *str = NULL;
1183         int i;
1184
1185         dbus_message_iter_get_basic(iter, &str);
1186         if (!str)
1187                 return;
1188
1189         for (i = 0; authalg_capa_map[i].str; i++)
1190                 if (strcmp(str, authalg_capa_map[i].str) == 0) {
1191                         interface->authalg_capa |= authalg_capa_map[i].val;
1192                         break;
1193                 }
1194 }
1195
1196 static void interface_capability_proto(DBusMessageIter *iter, void *user_data)
1197 {
1198         GSupplicantInterface *interface = user_data;
1199         const char *str = NULL;
1200         int i;
1201
1202         dbus_message_iter_get_basic(iter, &str);
1203         if (!str)
1204                 return;
1205
1206         for (i = 0; proto_capa_map[i].str; i++)
1207                 if (strcmp(str, proto_capa_map[i].str) == 0) {
1208                         interface->proto_capa |= proto_capa_map[i].val;
1209                         break;
1210                 }
1211 }
1212
1213 static void interface_capability_pairwise(DBusMessageIter *iter,
1214                                                         void *user_data)
1215 {
1216         GSupplicantInterface *interface = user_data;
1217         const char *str = NULL;
1218         int i;
1219
1220         dbus_message_iter_get_basic(iter, &str);
1221         if (!str)
1222                 return;
1223
1224         for (i = 0; pairwise_map[i].str; i++)
1225                 if (strcmp(str, pairwise_map[i].str) == 0) {
1226                         interface->pairwise_capa |= pairwise_map[i].val;
1227                         break;
1228                 }
1229 }
1230
1231 static void interface_capability_group(DBusMessageIter *iter, void *user_data)
1232 {
1233         GSupplicantInterface *interface = user_data;
1234         const char *str = NULL;
1235         int i;
1236
1237         dbus_message_iter_get_basic(iter, &str);
1238         if (!str)
1239                 return;
1240
1241         for (i = 0; group_map[i].str; i++)
1242                 if (strcmp(str, group_map[i].str) == 0) {
1243                         interface->group_capa |= group_map[i].val;
1244                         break;
1245                 }
1246 }
1247
1248 static void interface_capability_scan(DBusMessageIter *iter, void *user_data)
1249 {
1250         GSupplicantInterface *interface = user_data;
1251         const char *str = NULL;
1252         int i;
1253
1254         dbus_message_iter_get_basic(iter, &str);
1255         if (!str)
1256                 return;
1257
1258         for (i = 0; scan_capa_map[i].str; i++)
1259                 if (strcmp(str, scan_capa_map[i].str) == 0) {
1260                         interface->scan_capa |= scan_capa_map[i].val;
1261                         break;
1262                 }
1263 }
1264
1265 static void interface_capability_mode(DBusMessageIter *iter, void *user_data)
1266 {
1267         GSupplicantInterface *interface = user_data;
1268         const char *str = NULL;
1269         int i;
1270
1271         dbus_message_iter_get_basic(iter, &str);
1272         if (!str)
1273                 return;
1274
1275         for (i = 0; mode_capa_map[i].str; i++)
1276                 if (strcmp(str, mode_capa_map[i].str) == 0) {
1277                         interface->mode_capa |= mode_capa_map[i].val;
1278                         break;
1279                 }
1280 }
1281
1282 static void interface_capability(const char *key, DBusMessageIter *iter,
1283                                                         void *user_data)
1284 {
1285         GSupplicantInterface *interface = user_data;
1286
1287         if (!key)
1288                 return;
1289
1290         if (g_strcmp0(key, "KeyMgmt") == 0)
1291                 supplicant_dbus_array_foreach(iter,
1292                                 interface_capability_keymgmt, interface);
1293         else if (g_strcmp0(key, "AuthAlg") == 0)
1294                 supplicant_dbus_array_foreach(iter,
1295                                 interface_capability_authalg, interface);
1296         else if (g_strcmp0(key, "Protocol") == 0)
1297                 supplicant_dbus_array_foreach(iter,
1298                                 interface_capability_proto, interface);
1299         else if (g_strcmp0(key, "Pairwise") == 0)
1300                 supplicant_dbus_array_foreach(iter,
1301                                 interface_capability_pairwise, interface);
1302         else if (g_strcmp0(key, "Group") == 0)
1303                 supplicant_dbus_array_foreach(iter,
1304                                 interface_capability_group, interface);
1305         else if (g_strcmp0(key, "Scan") == 0)
1306                 supplicant_dbus_array_foreach(iter,
1307                                 interface_capability_scan, interface);
1308         else if (g_strcmp0(key, "Modes") == 0)
1309                 supplicant_dbus_array_foreach(iter,
1310                                 interface_capability_mode, interface);
1311         else if (g_strcmp0(key, "MaxScanSSID") == 0) {
1312                 dbus_int32_t max_scan_ssid;
1313
1314                 dbus_message_iter_get_basic(iter, &max_scan_ssid);
1315                 if (max_scan_ssid < 2)
1316                         max_scan_ssid = 0;
1317                 interface->max_scan_ssids = max_scan_ssid;
1318 #if defined TIZEN_EXT
1319         } else if (g_strcmp0(key, "Is5GhzSupported") == 0) {
1320                 dbus_bool_t is_5_0_Ghz_supported;
1321
1322                 dbus_message_iter_get_basic(iter, &is_5_0_Ghz_supported);
1323                 interface->is_5_0_Ghz_supported = is_5_0_Ghz_supported;
1324 #endif
1325         } else
1326                 SUPPLICANT_DBG("key %s type %c",
1327                                 key, dbus_message_iter_get_arg_type(iter));
1328 }
1329
1330 static void set_bss_expiration_age(DBusMessageIter *iter, void *user_data)
1331 {
1332         unsigned int bss_expiration_age = GPOINTER_TO_UINT(user_data);
1333
1334         dbus_message_iter_append_basic(iter, DBUS_TYPE_UINT32,
1335                                 &bss_expiration_age);
1336 }
1337
1338 int g_supplicant_interface_set_bss_expiration_age(GSupplicantInterface *interface,
1339                                         unsigned int bss_expiration_age)
1340 {
1341        return supplicant_dbus_property_set(interface->path,
1342                                        SUPPLICANT_INTERFACE ".Interface",
1343                                        "BSSExpireAge", DBUS_TYPE_UINT32_AS_STRING,
1344                                        set_bss_expiration_age, NULL,
1345                                        GUINT_TO_POINTER(bss_expiration_age), NULL);
1346 }
1347
1348 struct set_apscan_data
1349 {
1350         unsigned int ap_scan;
1351         GSupplicantInterface *interface;
1352 };
1353
1354 static void set_apscan(DBusMessageIter *iter, void *user_data)
1355 {
1356         struct set_apscan_data *data = user_data;
1357         unsigned int ap_scan = data->ap_scan;
1358
1359         dbus_message_iter_append_basic(iter, DBUS_TYPE_UINT32, &ap_scan);
1360 }
1361
1362 static void set_apscan_complete(const char *error,
1363                 DBusMessageIter *iter, void *user_data)
1364 {
1365         struct set_apscan_data *data = user_data;
1366         GSupplicantInterface *interface = data->interface;
1367
1368         if (error) {
1369                 interface->ap_create_in_progress = false;
1370                 SUPPLICANT_DBG("Set AP scan error %s", error);
1371                 goto error;
1372         }
1373
1374         interface->ap_create_in_progress = true;
1375 error:
1376         dbus_free(data);
1377 }
1378
1379 int g_supplicant_interface_set_apscan(GSupplicantInterface *interface,
1380                                                         unsigned int ap_scan)
1381 {
1382         struct set_apscan_data *data;
1383         int ret;
1384
1385         data = dbus_malloc0(sizeof(*data));
1386
1387         if (!data)
1388                 return -ENOMEM;
1389
1390         data->ap_scan = ap_scan;
1391         data->interface = interface;
1392
1393         ret = supplicant_dbus_property_set(interface->path,
1394                         SUPPLICANT_INTERFACE ".Interface",
1395                         "ApScan", DBUS_TYPE_UINT32_AS_STRING,
1396                         set_apscan, set_apscan_complete, data, NULL);
1397         if (ret < 0)
1398                 dbus_free(data);
1399
1400         return ret;
1401 }
1402
1403 void g_supplicant_interface_set_data(GSupplicantInterface *interface,
1404                                                                 void *data)
1405 {
1406         if (!interface)
1407                 return;
1408
1409         interface->data = data;
1410
1411         if (!data)
1412                 interface->scan_callback = NULL;
1413 }
1414
1415 void *g_supplicant_interface_get_data(GSupplicantInterface *interface)
1416 {
1417         if (!interface)
1418                 return NULL;
1419
1420         return interface->data;
1421 }
1422
1423 const char *g_supplicant_interface_get_ifname(GSupplicantInterface *interface)
1424 {
1425         if (!interface)
1426                 return NULL;
1427
1428         return interface->ifname;
1429 }
1430
1431 #if defined TIZEN_EXT
1432 bool g_supplicant_interface_get_is_5_0_ghz_supported(GSupplicantInterface *interface)
1433 {
1434         if (!interface)
1435                 return NULL;
1436
1437         return interface->is_5_0_Ghz_supported;
1438 }
1439 #endif
1440
1441 const char *g_supplicant_interface_get_driver(GSupplicantInterface *interface)
1442 {
1443         if (!interface)
1444                 return NULL;
1445
1446         return interface->driver;
1447 }
1448
1449 GSupplicantState g_supplicant_interface_get_state(
1450                                         GSupplicantInterface *interface)
1451 {
1452         if (!interface)
1453                 return G_SUPPLICANT_STATE_UNKNOWN;
1454
1455         return interface->state;
1456 }
1457
1458 const char *g_supplicant_interface_get_wps_key(GSupplicantInterface *interface)
1459 {
1460         if (!interface)
1461                 return NULL;
1462
1463         return (const char *)interface->wps_cred.key;
1464 }
1465
1466 const void *g_supplicant_interface_get_wps_ssid(GSupplicantInterface *interface,
1467                                                         unsigned int *ssid_len)
1468 {
1469         if (!ssid_len)
1470                 return NULL;
1471
1472         if (!interface || interface->wps_cred.ssid_len == 0) {
1473                 *ssid_len = 0;
1474                 return NULL;
1475         }
1476
1477         *ssid_len = interface->wps_cred.ssid_len;
1478         return interface->wps_cred.ssid;
1479 }
1480
1481 GSupplicantWpsState g_supplicant_interface_get_wps_state(
1482                                         GSupplicantInterface *interface)
1483 {
1484         if (!interface)
1485                 return G_SUPPLICANT_WPS_STATE_UNKNOWN;
1486
1487         return interface->wps_state;
1488 }
1489
1490 unsigned int g_supplicant_interface_get_mode(GSupplicantInterface *interface)
1491 {
1492         if (!interface)
1493                 return 0;
1494
1495         return interface->mode_capa;
1496 }
1497
1498 unsigned int g_supplicant_interface_get_max_scan_ssids(
1499                                 GSupplicantInterface *interface)
1500 {
1501         if (!interface)
1502                 return 0;
1503
1504         if (interface->max_scan_ssids == 0)
1505                 return WPAS_MAX_SCAN_SSIDS;
1506
1507         return interface->max_scan_ssids;
1508 }
1509
1510 static void set_network_enabled(DBusMessageIter *iter, void *user_data)
1511 {
1512         dbus_bool_t enable = *(dbus_bool_t *)user_data;
1513
1514         dbus_message_iter_append_basic(iter, DBUS_TYPE_BOOLEAN, &enable);
1515 }
1516
1517 int g_supplicant_interface_enable_selected_network(GSupplicantInterface *interface,
1518                                                         dbus_bool_t enable)
1519 {
1520         if (!interface)
1521                 return -1;
1522
1523         if (!interface->network_path)
1524                 return -1;
1525
1526         SUPPLICANT_DBG(" ");
1527         return supplicant_dbus_property_set(interface->network_path,
1528                                 SUPPLICANT_INTERFACE ".Network",
1529                                 "Enabled", DBUS_TYPE_BOOLEAN_AS_STRING,
1530                                 set_network_enabled, NULL, &enable, NULL);
1531 }
1532
1533 dbus_bool_t g_supplicant_interface_get_ready(GSupplicantInterface *interface)
1534 {
1535         if (!interface)
1536                 return FALSE;
1537
1538         return interface->ready;
1539 }
1540
1541 GSupplicantInterface *g_supplicant_network_get_interface(
1542                                         GSupplicantNetwork *network)
1543 {
1544         if (!network)
1545                 return NULL;
1546
1547         return network->interface;
1548 }
1549
1550 const char *g_supplicant_network_get_name(GSupplicantNetwork *network)
1551 {
1552         if (!network || !network->name)
1553                 return "";
1554
1555         return network->name;
1556 }
1557
1558 const char *g_supplicant_network_get_identifier(GSupplicantNetwork *network)
1559 {
1560         if (!network || !network->group)
1561                 return "";
1562
1563         return network->group;
1564 }
1565
1566 const char *g_supplicant_network_get_path(GSupplicantNetwork *network)
1567 {
1568         if (!network || !network->path)
1569                 return NULL;
1570
1571         return network->path;
1572 }
1573
1574 const char *g_supplicant_network_get_mode(GSupplicantNetwork *network)
1575 {
1576         if (!network)
1577                 return G_SUPPLICANT_MODE_UNKNOWN;
1578
1579         return mode2string(network->mode);
1580 }
1581
1582 const char *g_supplicant_network_get_security(GSupplicantNetwork *network)
1583 {
1584         if (!network)
1585                 return G_SUPPLICANT_SECURITY_UNKNOWN;
1586
1587         return security2string(network->security);
1588 }
1589
1590 const void *g_supplicant_network_get_ssid(GSupplicantNetwork *network,
1591                                                 unsigned int *ssid_len)
1592 {
1593         if (!network) {
1594                 *ssid_len = 0;
1595                 return NULL;
1596         }
1597
1598         *ssid_len = network->ssid_len;
1599         return network->ssid;
1600 }
1601
1602 dbus_int16_t g_supplicant_network_get_signal(GSupplicantNetwork *network)
1603 {
1604         if (!network)
1605                 return 0;
1606
1607         return network->signal;
1608 }
1609
1610 dbus_uint16_t g_supplicant_network_get_frequency(GSupplicantNetwork *network)
1611 {
1612         if (!network)
1613                 return 0;
1614
1615         return network->frequency;
1616 }
1617
1618 dbus_bool_t g_supplicant_network_get_wps(GSupplicantNetwork *network)
1619 {
1620         if (!network)
1621                 return FALSE;
1622
1623         return network->wps;
1624 }
1625
1626 dbus_bool_t g_supplicant_network_is_wps_active(GSupplicantNetwork *network)
1627 {
1628         if (!network)
1629                 return FALSE;
1630
1631         if (network->wps_capabilities & G_SUPPLICANT_WPS_CONFIGURED)
1632                 return TRUE;
1633
1634         return FALSE;
1635 }
1636
1637 dbus_bool_t g_supplicant_network_is_wps_pbc(GSupplicantNetwork *network)
1638 {
1639         if (!network)
1640                 return FALSE;
1641
1642         if (network->wps_capabilities & G_SUPPLICANT_WPS_PBC)
1643                 return TRUE;
1644
1645         return FALSE;
1646 }
1647
1648 dbus_bool_t g_supplicant_network_is_wps_advertizing(GSupplicantNetwork *network)
1649 {
1650         if (!network)
1651                 return FALSE;
1652
1653         if (network->wps_capabilities & G_SUPPLICANT_WPS_REGISTRAR)
1654                 return TRUE;
1655
1656         return FALSE;
1657 }
1658
1659 #ifdef TIZEN_EXT
1660 GSupplicantPhy_mode g_supplicant_network_get_phy_mode(GSupplicantNetwork *network)
1661 {
1662         if (!network)
1663                 return G_SUPPLICANT_MODE_IEEE80211_UNKNOWN;
1664
1665         return network->phy_mode;
1666 }
1667 #endif
1668
1669 GSupplicantInterface *g_supplicant_peer_get_interface(GSupplicantPeer *peer)
1670 {
1671         if (!peer)
1672                 return NULL;
1673
1674         return peer->interface;
1675 }
1676
1677 const char *g_supplicant_peer_get_path(GSupplicantPeer *peer)
1678 {
1679         if (!peer)
1680                 return NULL;
1681
1682         return peer->path;
1683 }
1684
1685 const char *g_supplicant_peer_get_identifier(GSupplicantPeer *peer)
1686 {
1687         if (!peer)
1688                 return NULL;
1689
1690         return peer->identifier;
1691 }
1692
1693 const void *g_supplicant_peer_get_device_address(GSupplicantPeer *peer)
1694 {
1695         if (!peer)
1696                 return NULL;
1697
1698         return peer->device_address;
1699 }
1700
1701 const void *g_supplicant_peer_get_iface_address(GSupplicantPeer *peer)
1702 {
1703         if (!peer)
1704                 return NULL;
1705
1706         return peer->iface_address;
1707 }
1708
1709 const char *g_supplicant_peer_get_name(GSupplicantPeer *peer)
1710 {
1711         if (!peer)
1712                 return NULL;
1713
1714         return peer->name;
1715 }
1716
1717 #if defined TIZEN_EXT
1718 bool g_supplicant_network_is_hs20AP(GSupplicantNetwork *network)
1719 {
1720         if (!network)
1721                 return 0;
1722
1723         return network->isHS20AP;
1724 }
1725
1726 const char *g_supplicant_network_get_eap(GSupplicantNetwork *network)
1727 {
1728         if (!network || !network->eap)
1729                 return NULL;
1730
1731         return network->eap;
1732 }
1733
1734 const char *g_supplicant_network_get_identity(GSupplicantNetwork *network)
1735 {
1736         if (!network || !network->identity)
1737                 return NULL;
1738
1739         return network->identity;
1740 }
1741
1742 const char *g_supplicant_network_get_phase2(GSupplicantNetwork *network)
1743 {
1744         if (!network || !network->phase2)
1745                 return NULL;
1746
1747         return network->phase2;
1748 }
1749
1750 unsigned int g_supplicant_network_get_keymgmt(GSupplicantNetwork *network)
1751 {
1752         if (!network)
1753                 return 0;
1754
1755         return network->keymgmt;
1756 }
1757
1758 dbus_bool_t g_supplicant_network_get_privacy(GSupplicantNetwork *network)
1759 {
1760         if (!network)
1761                 return FALSE;
1762
1763         return network->privacy;
1764 }
1765
1766 const unsigned char *g_supplicant_network_get_countrycode(GSupplicantNetwork
1767                                                           *network)
1768 {
1769         if (!network)
1770                 return NULL;
1771
1772         return network->country_code;
1773 }
1774 #endif
1775
1776 const unsigned char *g_supplicant_peer_get_widi_ies(GSupplicantPeer *peer,
1777                                                                 int *length)
1778 {
1779         if (!peer || !length)
1780                 return NULL;
1781
1782         *length = peer->widi_ies_length;
1783         return peer->widi_ies;
1784 }
1785
1786 bool g_supplicant_peer_is_wps_pbc(GSupplicantPeer *peer)
1787 {
1788         if (!peer)
1789                 return false;
1790
1791         if (peer->wps_capabilities & G_SUPPLICANT_WPS_PBC)
1792                 return true;
1793
1794         return false;
1795 }
1796
1797 bool g_supplicant_peer_is_wps_pin(GSupplicantPeer *peer)
1798 {
1799         if (!peer)
1800                 return false;
1801
1802         if (peer->wps_capabilities & G_SUPPLICANT_WPS_PIN)
1803                 return true;
1804
1805         return false;
1806 }
1807
1808 bool g_supplicant_peer_is_in_a_group(GSupplicantPeer *peer)
1809 {
1810         if (!peer || !peer->groups)
1811                 return false;
1812
1813         return true;
1814 }
1815
1816 GSupplicantInterface *g_supplicant_peer_get_group_interface(GSupplicantPeer *peer)
1817 {
1818         if (!peer)
1819                 return NULL;
1820
1821         return (GSupplicantInterface *) peer->current_group_iface;
1822 }
1823
1824 bool g_supplicant_peer_is_client(GSupplicantPeer *peer)
1825 {
1826         GSupplicantGroup *group;
1827         GSList *list;
1828
1829         if (!peer)
1830                 return false;
1831
1832         for (list = peer->groups; list; list = list->next) {
1833                 const char *path = list->data;
1834
1835                 group = g_hash_table_lookup(group_mapping, path);
1836                 if (!group)
1837                         continue;
1838
1839                 if (group->role != G_SUPPLICANT_GROUP_ROLE_CLIENT ||
1840                                 group->orig_interface != peer->interface)
1841                         continue;
1842
1843                 if (group->interface == peer->current_group_iface)
1844                         return true;
1845         }
1846
1847         return false;
1848 }
1849
1850 bool g_supplicant_peer_has_requested_connection(GSupplicantPeer *peer)
1851 {
1852         if (!peer)
1853                 return false;
1854
1855         return peer->connection_requested;
1856 }
1857
1858 #if defined TIZEN_EXT
1859 /*
1860  * Description: Network client requires additional wifi specific info
1861  */
1862 const unsigned char *g_supplicant_network_get_bssid(GSupplicantNetwork *network)
1863 {
1864         if (network == NULL || network->best_bss == NULL)
1865                 return NULL;
1866
1867         return (const unsigned char *)network->best_bss->bssid;
1868 }
1869
1870 dbus_bool_t g_supplicant_network_get_transition_mode(GSupplicantNetwork *network)
1871 {
1872         if (network == NULL)
1873                 return FALSE;
1874
1875         return network->owe_transition_mode;
1876 }
1877
1878 const unsigned char *g_supplicant_network_get_transition_mode_bssid(GSupplicantNetwork *network)
1879 {
1880         if (network == NULL)
1881                 return NULL;
1882
1883         return (const unsigned char *)network->transition_mode_bssid;
1884 }
1885
1886 const void *g_supplicant_network_get_transition_mode_ssid(GSupplicantNetwork *network,
1887                                                 unsigned int *transition_mode_ssid_len)
1888 {
1889         if (!network) {
1890                 *transition_mode_ssid_len = 0;
1891                 return NULL;
1892         }
1893
1894         *transition_mode_ssid_len = network->transition_mode_ssid_len;
1895         return network->transition_mode_ssid;
1896 }
1897
1898 unsigned int g_supplicant_network_get_maxrate(GSupplicantNetwork *network)
1899 {
1900         if (network == NULL || network->best_bss == NULL)
1901                 return 0;
1902
1903         return network->best_bss->maxrate;
1904 }
1905
1906 const char *g_supplicant_network_get_enc_mode(GSupplicantNetwork *network)
1907 {
1908         if (network == NULL || network->best_bss == NULL)
1909                 return NULL;
1910
1911         if (network->best_bss->security == G_SUPPLICANT_SECURITY_PSK ||
1912             network->best_bss->security == G_SUPPLICANT_SECURITY_SAE ||
1913             network->best_bss->security == G_SUPPLICANT_SECURITY_OWE ||
1914             network->best_bss->security == G_SUPPLICANT_SECURITY_DPP ||
1915             network->best_bss->security == G_SUPPLICANT_SECURITY_IEEE8021X) {
1916                 unsigned int pairwise;
1917
1918                 pairwise = network->best_bss->rsn_pairwise |
1919                                 network->best_bss->wpa_pairwise;
1920
1921                 if ((pairwise & G_SUPPLICANT_PAIRWISE_CCMP) &&
1922                     (pairwise & G_SUPPLICANT_PAIRWISE_TKIP))
1923                         return "mixed";
1924                 else if (pairwise & G_SUPPLICANT_PAIRWISE_CCMP)
1925                         return "aes";
1926                 else if (pairwise & G_SUPPLICANT_PAIRWISE_TKIP)
1927                         return "tkip";
1928
1929         } else if (network->best_bss->security == G_SUPPLICANT_SECURITY_WEP)
1930                 return "wep";
1931         else if (network->best_bss->security == G_SUPPLICANT_SECURITY_NONE)
1932                 return "none";
1933
1934         return NULL;
1935 }
1936
1937 bool g_supplicant_network_get_rsn_mode(GSupplicantNetwork *network)
1938 {
1939         if (network == NULL || network->best_bss == NULL)
1940                 return 0;
1941
1942         if (network->best_bss->security == G_SUPPLICANT_SECURITY_OWE ||
1943                         network->best_bss->security == G_SUPPLICANT_SECURITY_DPP)
1944                 return false;
1945
1946         if (network->best_bss->rsn_selected) {
1947                 const char *mode = g_supplicant_network_get_enc_mode(network);
1948                 if (g_strcmp0(mode, "aes") == 0 ||
1949                                 g_strcmp0(mode, "mixed") == 0)
1950                         return true;
1951                 else
1952                         return false;
1953         } else
1954                 return false;
1955 }
1956
1957 void *g_supplicant_network_get_wifi_vsie(GSupplicantNetwork *network)
1958 {
1959         GSList *vsie_list = NULL;
1960
1961         if (!network)
1962                 return NULL;
1963
1964         if (g_slist_length(network->vsie_list) > 0) {
1965                 GSList *list = NULL;
1966                 unsigned char *vsie = NULL;
1967                 for (list = network->vsie_list; list; list = list->next) {
1968                         unsigned char *ie = (unsigned char *)list->data;
1969                         if (ie == NULL)
1970                                 continue;
1971                         vsie = (unsigned char *)g_try_malloc0(ie[1]+2); // tag number size(1), tag length size(1)
1972
1973                         if (vsie) {
1974                                 memcpy(vsie, ie, ie[1]+2);
1975                                 vsie_list = g_slist_append(vsie_list, vsie);
1976                         } else
1977                                 SUPPLICANT_DBG("Failed to allocate memory");
1978                 }
1979         }
1980
1981         return vsie_list;
1982 }
1983
1984 static bool compare_bssid(unsigned char *bssid_a, unsigned char *bssid_b)
1985 {
1986         if (!memcmp(bssid_a, bssid_b, WIFI_BSSID_LEN_MAX))
1987                 return true;
1988
1989         return false;
1990 }
1991
1992 static gchar *convert_bssid_to_str(unsigned char *bssid)
1993 {
1994         GString *bssid_str;
1995         unsigned int i;
1996
1997         bssid_str = g_string_sized_new(18);
1998         if (!bssid_str)
1999                 return NULL;
2000
2001         for (i = 0; i < WIFI_BSSID_LEN_MAX; i++) {
2002                 g_string_append_printf(bssid_str, "%02x", bssid[i]);
2003                 if (i < WIFI_BSSID_LEN_MAX - 1)
2004                         g_string_append(bssid_str, ":");
2005         }
2006
2007         return g_string_free(bssid_str, FALSE);
2008 }
2009
2010 #if defined TIZEN_EXT_INS
2011 static void count_assoc_reject(gpointer data, gpointer user_data)
2012 {
2013         time_t assoc_reject_time = GPOINTER_TO_INT(data);
2014         struct assoc_count_data *assoc_count = user_data;
2015
2016         if (assoc_reject_time > assoc_count->ref_time)
2017                 assoc_count->assoc_count++;
2018 }
2019
2020 static uint16_t get_assoc_reject_cnt(GHashTable *assoc_reject_table, unsigned char *bssid)
2021 {
2022         gchar *bssid_str;
2023         struct assoc_reject_data *assoc_data;
2024         struct assoc_count_data assoc_count;
2025         time_t curr_time;
2026         struct tm* timeinfo;
2027
2028         if (g_hash_table_size(assoc_reject_table) < 1)
2029                 return 0;
2030
2031         if (!bssid)
2032                 return 0;
2033
2034         if (!memcmp(bssid, invalid_bssid, WIFI_BSSID_LEN_MAX))
2035                 return 0;
2036
2037         bssid_str = convert_bssid_to_str(bssid);
2038         if (!bssid_str)
2039                 return 0;
2040
2041         assoc_data = g_hash_table_lookup(assoc_reject_table, bssid_str);
2042         if (!assoc_data) {
2043                 g_free(bssid_str);
2044                 return 0;
2045         }
2046
2047         if (g_slist_length(assoc_data->reject_time_list) < 1) {
2048                 g_free(bssid_str);
2049                 return 0;
2050         }
2051
2052         /* Only events that occur within one hour are appened. */
2053         curr_time = time(NULL);
2054         timeinfo = localtime(&curr_time);
2055         timeinfo->tm_hour -= 1;
2056
2057         assoc_count.ref_time = mktime(timeinfo);
2058         assoc_count.assoc_count = 0;
2059
2060         g_slist_foreach(assoc_data->reject_time_list, count_assoc_reject, &assoc_count);
2061
2062         g_free(bssid_str);
2063         return assoc_count.assoc_count;
2064 }
2065
2066 static int calculate_score_last_connected_bssid(bool is_last_connected)
2067 {
2068         int score = 0;
2069
2070         if (ins_settings.last_connected_bssid) {
2071                 if (is_last_connected)
2072                         score += ins_settings.last_connected_bssid_score;
2073         }
2074
2075         return score;
2076 }
2077
2078 static int calculate_score_assoc_reject(uint16_t assoc_reject_cnt)
2079 {
2080         int score = 0;
2081
2082         if (ins_settings.assoc_reject)
2083                 score -= (assoc_reject_cnt * ins_settings.assoc_reject_score);
2084
2085         return score;
2086 }
2087
2088 static int calculate_score_frequency(dbus_int16_t strength, dbus_uint16_t frequency)
2089 {
2090         int score = 0;
2091
2092         switch (ins_settings.preferred_freq_bssid) {
2093         case G_SUPPLICANT_INS_PREFERRED_FREQ_24GHZ:
2094                 if ((frequency >= FREQ_RANGE_24GHZ_CHANNEL_1 &&
2095                         frequency <= FREQ_RANGE_24GHZ_CHANNEL_14) &&
2096                         (strength > ins_settings.signal_level3_24ghz))
2097                         score += ins_settings.preferred_freq_bssid_score;
2098
2099                 break;
2100         case G_SUPPLICANT_INS_PREFERRED_FREQ_5GHZ:
2101                 if ((frequency >= FREQ_RANGE_5GHZ_CHANNEL_32 &&
2102                         frequency <= FREQ_RANGE_5GHZ_CHANNEL_165) &&
2103                         (strength > ins_settings.signal_level3_5ghz))
2104                         score += ins_settings.preferred_freq_bssid_score;
2105
2106                 break;
2107         default:
2108                 break;
2109         }
2110
2111         return score;
2112 }
2113
2114 static int calculate_score_strength(dbus_int16_t strength)
2115 {
2116         int score = 0;
2117
2118         if (ins_settings.signal_bssid)
2119                 score += (((strength > -60) ? -60 : strength) + 85);
2120
2121         return score;
2122 }
2123
2124 static int calculate_score_est_throughput(dbus_uint32_t est_throughput)
2125 {
2126         int score = 0;
2127
2128         if (est_throughput >= 10000)
2129                 score = est_throughput / 10000;
2130
2131         if (score > 40)
2132                 score = 40;
2133
2134         return score;
2135 }
2136 #endif
2137
2138 static int calculate_score(bool is_last_connected, uint16_t assoc_reject_cnt,
2139                 dbus_uint16_t frequency, dbus_int16_t strength,
2140                 dbus_int16_t snr, dbus_uint32_t est_throughput)
2141 {
2142         int score = 0;
2143
2144         score += calculate_score_last_connected_bssid(is_last_connected);
2145         score += calculate_score_assoc_reject(assoc_reject_cnt);
2146         score += calculate_score_frequency(strength, frequency);
2147         score += calculate_score_strength(strength);
2148         score += (int)snr;
2149         score += calculate_score_est_throughput(est_throughput);
2150
2151         return score;
2152 }
2153
2154 static void update_bssid_list(gpointer key, gpointer value, gpointer user_data)
2155 {
2156         struct g_supplicant_bss *bss = value;
2157         struct g_connman_bssids *bssids = NULL;
2158         struct update_bssid_data *bssid_data = (struct update_bssid_data *)user_data;
2159
2160         bssids = (struct g_connman_bssids *)g_try_malloc0(sizeof(struct g_connman_bssids));
2161
2162         if (bssids) {
2163                 memcpy(bssids->bssid, bss->bssid, WIFI_BSSID_LEN_MAX);
2164
2165                 bssids->strength = bss->signal;
2166                 bssids->strength += 120;
2167
2168                 if (bssids->strength > 100)
2169                         bssids->strength = 100;
2170
2171                 bssids->frequency = bss->frequency;
2172
2173 #if defined TIZEN_EXT_INS
2174                 bssids->assoc_reject_cnt = get_assoc_reject_cnt(bssid_data->assoc_reject_table, bssids->bssid);
2175                 bssids->is_last_connected = compare_bssid(bssids->bssid, bssid_data->last_connected_bssid);
2176
2177                 bssids->score_last_connected_bssid = calculate_score_last_connected_bssid(bssids->is_last_connected);
2178                 bssids->score_assoc_reject = calculate_score_assoc_reject(bssids->assoc_reject_cnt);
2179                 bssids->score_frequency = calculate_score_frequency(bss->signal, bssids->frequency);
2180                 bssids->score_strength = calculate_score_strength(bss->signal);
2181                 bssids->score_snr = (int)bss->snr;
2182                 bssids->score_est_throughput = calculate_score_est_throughput(bss->est_throughput);
2183
2184                 bssids->ins_score = calculate_score(bssids->is_last_connected,
2185                         bssids->assoc_reject_cnt, bssids->frequency, bss->signal,
2186                         bss->snr, bss->est_throughput);
2187 #else
2188                 bssids->ins_score = bss->signal;
2189 #endif
2190                 bssid_data->bssid_list = g_slist_append(bssid_data->bssid_list, bssids);
2191         } else
2192                 SUPPLICANT_DBG("Failed to allocate memory");
2193 }
2194
2195 static gint cmp_bss(gconstpointer a, gconstpointer b)
2196 {
2197         struct g_connman_bssids *entry_a = (struct g_connman_bssids *)a;
2198         struct g_connman_bssids *entry_b = (struct g_connman_bssids *)b;
2199
2200         if (entry_a->ins_score > entry_b->ins_score)
2201                 return -1;
2202
2203         if (entry_a->ins_score < entry_b->ins_score)
2204                 return 1;
2205
2206         return 0;
2207 }
2208
2209 #if defined TIZEN_EXT_INS
2210 static void print_bssid_sort(gpointer data, gpointer user_data)
2211 {
2212         struct g_connman_bssids *bssids = data;
2213
2214         SUPPLICANT_DBG("bssid[" MACSTR "] total[%2d] freq[%2d] "
2215                         "last_conn[%2d] assoc_reject[%2d] strength[%2d]",
2216                         MAC2STR(bssids->bssid), bssids->ins_score,
2217                         bssids->score_frequency, bssids->score_last_connected_bssid,
2218                         bssids->score_assoc_reject, bssids->score_strength);
2219 }
2220 #endif
2221
2222 void *g_supplicant_network_get_bssid_list(GSupplicantNetwork *network)
2223 {
2224         struct update_bssid_data bssid_data;
2225
2226         if (g_hash_table_size(network->bss_table) < 1)
2227                 return NULL;
2228
2229         bssid_data.network = network;
2230         memset(&bssid_data, 0, sizeof(bssid_data));
2231         memcpy(bssid_data.last_connected_bssid, network->last_connected_bssid, WIFI_BSSID_LEN_MAX);
2232         bssid_data.assoc_reject_table = network->assoc_reject_table;
2233
2234         g_hash_table_foreach(network->bss_table, update_bssid_list, &bssid_data);
2235         bssid_data.bssid_list = g_slist_sort(bssid_data.bssid_list, cmp_bss);
2236 #if defined TIZEN_EXT_INS
2237         g_slist_foreach(bssid_data.bssid_list, print_bssid_sort, NULL);
2238 #endif
2239
2240         return bssid_data.bssid_list;
2241 }
2242
2243 void g_supplicant_network_set_last_connected_bssid(GSupplicantNetwork *network, const unsigned char *bssid)
2244 {
2245         if (!bssid)
2246                 return;
2247
2248         if (!memcmp(bssid, invalid_bssid, WIFI_BSSID_LEN_MAX))
2249                 return;
2250
2251         memcpy(network->last_connected_bssid, bssid, WIFI_BSSID_LEN_MAX);
2252
2253         SUPPLICANT_DBG("last connected bssid [" MACSTR "]", MAC2STR(bssid));
2254 }
2255
2256 const unsigned char *g_supplicant_network_get_last_connected_bssid(GSupplicantNetwork *network)
2257 {
2258         if (network == NULL)
2259                 return NULL;
2260
2261         return (const unsigned char *)network->last_connected_bssid;
2262 }
2263
2264 void g_supplicant_network_update_assoc_reject(GSupplicantInterface *interface,
2265                 GSupplicantNetwork *network)
2266 {
2267         struct assoc_reject_data *assoc_data;
2268         gchar *bssid_str;
2269         time_t curr_time;
2270
2271         if (!network)
2272                 return;
2273
2274         bssid_str = convert_bssid_to_str(interface->add_network_bssid);
2275         if (!bssid_str)
2276                 return;
2277
2278         assoc_data = g_hash_table_lookup(network->assoc_reject_table, bssid_str);
2279         if (!assoc_data) {
2280                 assoc_data = g_try_new0(struct assoc_reject_data, 1);
2281                 if (!assoc_data) {
2282                         g_free(bssid_str);
2283                         return;
2284                 }
2285
2286                 assoc_data->bssid = g_strdup(bssid_str);
2287                 g_hash_table_insert(network->assoc_reject_table, assoc_data->bssid, assoc_data);
2288         }
2289
2290         curr_time = time(NULL);
2291         assoc_data->reject_time_list = g_slist_append(assoc_data->reject_time_list, GINT_TO_POINTER(curr_time));
2292
2293         SUPPLICANT_DBG("bssid [%s] time [%u]", bssid_str, curr_time);
2294
2295         g_free(bssid_str);
2296
2297         callback_network_changed(network, "UpdateAssocReject");
2298 }
2299
2300 GHashTable *g_supplicant_network_get_assoc_reject_table(GSupplicantNetwork *network)
2301 {
2302         if (!network)
2303                 return NULL;
2304
2305         return network->assoc_reject_table;
2306 }
2307
2308 GSupplicantNetwork *g_supplicant_interface_get_network(GSupplicantInterface *interface,
2309                 const char *group)
2310 {
2311         if (!interface)
2312                 return NULL;
2313
2314         return g_hash_table_lookup(interface->network_table, group);
2315 }
2316 #endif
2317
2318 static void merge_network(GSupplicantNetwork *network)
2319 {
2320         GString *str;
2321         const char *ssid, *mode, *key_mgmt;
2322 #if defined TIZEN_EXT
2323         const char *isHS20AP;
2324         const char *eap, *identity, *phase2;
2325 #endif
2326         unsigned int i, ssid_len;
2327         char *group;
2328
2329         ssid = g_hash_table_lookup(network->config_table, "ssid");
2330         mode = g_hash_table_lookup(network->config_table, "mode");
2331         key_mgmt = g_hash_table_lookup(network->config_table, "key_mgmt");
2332 #if defined TIZEN_EXT
2333         isHS20AP = g_hash_table_lookup(network->config_table, "isHS20AP");
2334         eap = g_hash_table_lookup(network->config_table, "eap");
2335         identity = g_hash_table_lookup(network->config_table, "identity");
2336         phase2 = g_hash_table_lookup(network->config_table, "phase2");
2337 #endif
2338
2339         SUPPLICANT_DBG("ssid %s mode %s", ssid, mode);
2340
2341         if (ssid)
2342                 ssid_len = strlen(ssid);
2343         else
2344                 ssid_len = 0;
2345
2346         str = g_string_sized_new((ssid_len * 2) + 24);
2347         if (!str)
2348                 return;
2349
2350         for (i = 0; i < ssid_len; i++)
2351 #if defined TIZEN_EXT
2352         {
2353                 if (ssid[i] != '"')
2354 #endif
2355                 g_string_append_printf(str, "%02x", ssid[i]);
2356 #if defined TIZEN_EXT
2357         }
2358 #endif
2359
2360         if (g_strcmp0(mode, "0") == 0)
2361                 g_string_append_printf(str, "_managed");
2362         else if (g_strcmp0(mode, "1") == 0)
2363                 g_string_append_printf(str, "_adhoc");
2364 #if defined TIZEN_EXT_WIFI_MESH
2365         else if (g_strcmp0(mode, "5") == 0)
2366                 g_string_append_printf(str, "_mesh");
2367 #endif
2368
2369         if (g_strcmp0(key_mgmt, "WPA-PSK") == 0)
2370                 g_string_append_printf(str, "_psk");
2371 #if defined TIZEN_EXT
2372         else if (g_strcmp0(key_mgmt, "WPA-EAP") == 0)
2373                 g_string_append_printf(str, "_ieee8021x");
2374         else
2375                 g_string_append_printf(str, "_none");
2376 #endif
2377
2378         group = g_string_free(str, FALSE);
2379
2380         SUPPLICANT_DBG("%s", group);
2381
2382 #if defined TIZEN_EXT
2383         if (g_strcmp0(isHS20AP, "1") == 0) {
2384                 network->isHS20AP = 1;
2385                 if (network->eap)
2386                         g_free(network->eap);
2387                 network->eap = g_strdup(eap);
2388
2389                 if (network->identity)
2390                         g_free(network->identity);
2391                 network->identity = g_strdup(identity);
2392
2393                 if (network->phase2)
2394                         g_free(network->phase2);
2395                 network->phase2 = g_strdup(phase2);
2396         } else
2397                 network->isHS20AP = 0;
2398
2399         network->group = g_strdup(group);
2400         callback_network_merged(network);
2401         g_free(network->group);
2402 #endif
2403
2404         g_free(group);
2405
2406         g_hash_table_destroy(network->config_table);
2407
2408         g_free(network->path);
2409         g_free(network);
2410 }
2411
2412 static void network_property(const char *key, DBusMessageIter *iter,
2413                                                         void *user_data)
2414 {
2415         GSupplicantNetwork *network = user_data;
2416
2417         if (!network->interface)
2418                 return;
2419
2420         if (!key) {
2421                 merge_network(network);
2422                 return;
2423         }
2424
2425         if (g_strcmp0(key, "Enabled") == 0) {
2426                 dbus_bool_t enabled = FALSE;
2427
2428                 dbus_message_iter_get_basic(iter, &enabled);
2429         } else if (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_STRING) {
2430                 const char *str = NULL;
2431
2432                 dbus_message_iter_get_basic(iter, &str);
2433                 if (str) {
2434                         g_hash_table_replace(network->config_table,
2435                                                 g_strdup(key), g_strdup(str));
2436                 }
2437         } else
2438                 SUPPLICANT_DBG("key %s type %c",
2439                                 key, dbus_message_iter_get_arg_type(iter));
2440 }
2441
2442 static void interface_network_added(DBusMessageIter *iter, void *user_data)
2443 {
2444         GSupplicantInterface *interface = user_data;
2445         GSupplicantNetwork *network;
2446         const char *path = NULL;
2447
2448         SUPPLICANT_DBG("");
2449
2450         dbus_message_iter_get_basic(iter, &path);
2451         if (!path)
2452                 return;
2453
2454         if (g_strcmp0(path, "/") == 0)
2455                 return;
2456
2457         network = g_try_new0(GSupplicantNetwork, 1);
2458         if (!network)
2459                 return;
2460
2461         network->interface = interface;
2462         network->path = g_strdup(path);
2463
2464         network->config_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2465                                                         g_free, g_free);
2466
2467         dbus_message_iter_next(iter);
2468         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
2469                 supplicant_dbus_property_foreach(iter, network_property,
2470                                                                 network);
2471                 network_property(NULL, NULL, network);
2472                 return;
2473         }
2474
2475         supplicant_dbus_property_get_all(path,
2476                                 SUPPLICANT_INTERFACE ".Network",
2477                                         network_property, network, NULL);
2478 }
2479
2480 static void interface_network_removed(DBusMessageIter *iter, void *user_data)
2481 {
2482         SUPPLICANT_DBG("");
2483 }
2484
2485 static char *create_name(unsigned char *ssid, int ssid_len)
2486 {
2487         GString *string;
2488         const gchar *remainder, *invalid;
2489         int valid_bytes, remaining_bytes;
2490
2491         if (ssid_len < 1 || ssid[0] == '\0')
2492                 return g_strdup("");
2493
2494         string = NULL;
2495         remainder = (const gchar *)ssid;
2496         remaining_bytes = ssid_len;
2497
2498         while (remaining_bytes != 0) {
2499                 if (g_utf8_validate(remainder, remaining_bytes,
2500                                         &invalid)) {
2501                         break;
2502                 }
2503
2504                 valid_bytes = invalid - remainder;
2505
2506                 if (!string)
2507                         string = g_string_sized_new(remaining_bytes);
2508
2509                 g_string_append_len(string, remainder, valid_bytes);
2510
2511                 /* append U+FFFD REPLACEMENT CHARACTER */
2512                 g_string_append(string, "\357\277\275");
2513
2514                 remaining_bytes -= valid_bytes + 1;
2515                 remainder = invalid + 1;
2516         }
2517
2518         if (!string)
2519                 return g_strndup((const gchar *)ssid, ssid_len + 1);
2520
2521         g_string_append(string, remainder);
2522
2523         return g_string_free(string, FALSE);
2524 }
2525
2526 static char *create_group(struct g_supplicant_bss *bss)
2527 {
2528         GString *str;
2529         unsigned int i;
2530         const char *mode, *security;
2531
2532         str = g_string_sized_new((bss->ssid_len * 2) + 24);
2533         if (!str)
2534                 return NULL;
2535
2536         if (bss->ssid_len > 0 && bss->ssid[0] != '\0') {
2537                 for (i = 0; i < bss->ssid_len; i++)
2538                         g_string_append_printf(str, "%02x", bss->ssid[i]);
2539         } else
2540                 g_string_append_printf(str, "hidden");
2541
2542         mode = mode2string(bss->mode);
2543         if (mode)
2544                 g_string_append_printf(str, "_%s", mode);
2545
2546         security = security2string(bss->security);
2547         if (security)
2548                 g_string_append_printf(str, "_%s", security);
2549
2550         return g_string_free(str, FALSE);
2551 }
2552 #if defined TIZEN_EXT
2553 static void update_network_with_best_bss(GSupplicantNetwork *network,
2554                 struct g_supplicant_bss *best_bss)
2555 {
2556         network->signal = best_bss->signal;
2557         network->frequency = best_bss->frequency;
2558         network->best_bss = best_bss;
2559 }
2560
2561 static bool update_best_bss(GSupplicantNetwork *network,
2562                 struct g_supplicant_bss *bss, struct g_supplicant_bss *best_bss)
2563 {
2564         int score_new;
2565         int score_best;
2566
2567         if (network->best_bss == NULL) {
2568                 update_network_with_best_bss(network, bss);
2569                 return true;
2570         }
2571
2572 #if defined TIZEN_EXT_INS
2573         score_new = calculate_score(
2574                 compare_bssid(bss->bssid, network->last_connected_bssid),
2575                 get_assoc_reject_cnt(network->assoc_reject_table, bss->bssid),
2576                 bss->frequency, bss->signal, bss->snr, bss->est_throughput);
2577
2578         score_best = calculate_score(
2579                 compare_bssid(network->best_bss->bssid, network->last_connected_bssid),
2580                 get_assoc_reject_cnt(network->assoc_reject_table, network->best_bss->bssid),
2581                 network->best_bss->frequency, network->best_bss->signal,
2582                 network->best_bss->snr, network->best_bss->est_throughput);
2583 #else
2584         score_new = bss->signal;
2585         score_best = network->best_bss->signal;
2586 #endif
2587
2588         if (score_new > score_best) {
2589                 SUPPLICANT_DBG("new[" MACSTR "][%u] : best[" MACSTR "][%u]",
2590                         MAC2STR(bss->bssid), score_new,
2591                         MAC2STR(network->best_bss->bssid), score_best);
2592
2593                 update_network_with_best_bss(network, bss);
2594
2595                 SUPPLICANT_DBG("Update best BSS for %s", network->name);
2596
2597                 return true;
2598         }
2599
2600         return false;
2601 }
2602 #endif
2603 static int add_or_replace_bss_to_network(struct g_supplicant_bss *bss)
2604 {
2605         GSupplicantInterface *interface = bss->interface;
2606         GSupplicantNetwork *network;
2607         char *group;
2608         bool is_new_network;
2609
2610         group = create_group(bss);
2611         SUPPLICANT_DBG("New group created: %s", group);
2612
2613         if (!group)
2614                 return -ENOMEM;
2615
2616         network = g_hash_table_lookup(interface->network_table, group);
2617         if (network) {
2618                 g_free(group);
2619                 SUPPLICANT_DBG("Network %s already exist", network->name);
2620                 is_new_network = false;
2621
2622                 goto done;
2623         }
2624
2625         is_new_network = true;
2626
2627         network = g_try_new0(GSupplicantNetwork, 1);
2628         if (!network) {
2629                 g_free(group);
2630                 return -ENOMEM;
2631         }
2632
2633         network->interface = interface;
2634         if (!network->path)
2635                 network->path = g_strdup(bss->path);
2636         network->group = group;
2637         network->name = create_name(bss->ssid, bss->ssid_len);
2638         network->mode = bss->mode;
2639         network->security = bss->security;
2640         network->ssid_len = bss->ssid_len;
2641         memcpy(network->ssid, bss->ssid, bss->ssid_len);
2642         network->signal = bss->signal;
2643         network->frequency = bss->frequency;
2644         network->best_bss = bss;
2645
2646         if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
2647                 network->wps = TRUE;
2648                 network->wps_capabilities = bss->wps_capabilities;
2649         }
2650
2651 #if defined TIZEN_EXT
2652         network->owe_transition_mode = bss->owe_transition_mode;
2653         network->privacy = bss->privacy;
2654         memcpy(network->transition_mode_ssid, bss->transition_mode_ssid, bss->transition_mode_ssid_len);
2655         memcpy(network->transition_mode_bssid, bss->transition_mode_bssid, WIFI_BSSID_LEN_MAX);
2656
2657         network->keymgmt = bss->keymgmt;
2658
2659         if (g_slist_length(bss->vsie_list) > 0) {
2660                 GSList *list = NULL;
2661                 unsigned char *vsie = NULL;
2662                 for (list = bss->vsie_list; list; list = list->next) {
2663                         unsigned char *ie = (unsigned char *)list->data;
2664                         vsie = (unsigned char *)g_try_malloc0(ie[1]+2); // tag number size(1), tag length size(1)
2665
2666                         if (vsie) {
2667                                 memcpy(vsie, ie, ie[1]+2);
2668                                 network->vsie_list = g_slist_append(network->vsie_list, vsie);
2669                         } else
2670                                 SUPPLICANT_DBG("Failed to allocate memory.");
2671                 }
2672         }
2673
2674         network->isHS20AP = bss->hs20;
2675         memcpy(network->country_code, bss->country_code, COUNTRY_CODE_LENGTH);
2676         network->phy_mode = bss->phy_mode;
2677 #endif
2678
2679         SUPPLICANT_DBG("New network %s created", network->name);
2680
2681         network->bss_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2682                                                         NULL, remove_bss);
2683
2684         network->config_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2685                                                         g_free, g_free);
2686
2687 #if defined TIZEN_EXT
2688         network->assoc_reject_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2689                                                         NULL, remove_assoc_data);
2690 #endif
2691
2692         g_hash_table_replace(interface->network_table,
2693                                                 network->group, network);
2694
2695         callback_network_added(network);
2696
2697 done:
2698         /* We update network's WPS properties if only bss provides WPS. */
2699         if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
2700                 network->wps = TRUE;
2701                 network->wps_capabilities = bss->wps_capabilities;
2702
2703                 if (!is_new_network)
2704                         callback_network_changed(network, "WPSCapabilities");
2705         }
2706
2707         /*
2708          * Do not change best BSS if we are connected. It will be done through
2709          * CurrentBSS property in case of misalignment with wpa_s or roaming.
2710          */
2711 #if defined TIZEN_EXT
2712         if (network != interface->current_network) {
2713                 if (update_best_bss(network, bss, network->best_bss))
2714                         callback_network_changed(network, "Signal");
2715         }
2716 #else
2717         if (network != interface->current_network &&
2718                                 bss->signal > network->signal) {
2719                 network->signal = bss->signal;
2720                 network->best_bss = bss;
2721                 callback_network_changed(network, "Signal");
2722         }
2723 #endif
2724
2725         g_hash_table_replace(interface->bss_mapping, bss->path, network);
2726         g_hash_table_replace(network->bss_table, bss->path, bss);
2727
2728         g_hash_table_replace(bss_mapping, bss->path, interface);
2729
2730         return 0;
2731 }
2732
2733 static void bss_rates(DBusMessageIter *iter, void *user_data)
2734 {
2735         struct g_supplicant_bss *bss = user_data;
2736         dbus_uint32_t rate = 0;
2737
2738         dbus_message_iter_get_basic(iter, &rate);
2739         if (rate == 0)
2740                 return;
2741
2742         if (rate > bss->maxrate)
2743                 bss->maxrate = rate;
2744 }
2745
2746 static void bss_keymgmt(DBusMessageIter *iter, void *user_data)
2747 {
2748         unsigned int *keymgmt = user_data;
2749         const char *str = NULL;
2750         int i;
2751
2752         dbus_message_iter_get_basic(iter, &str);
2753         if (!str)
2754                 return;
2755
2756         for (i = 0; keymgmt_map[i].str; i++)
2757                 if (strcmp(str, keymgmt_map[i].str) == 0) {
2758                         SUPPLICANT_DBG("Keymgmt: %s", str);
2759                         *keymgmt |= keymgmt_map[i].val;
2760                         break;
2761                 }
2762 }
2763
2764 static void bss_group(DBusMessageIter *iter, void *user_data)
2765 {
2766         unsigned int *group = user_data;
2767         const char *str = NULL;
2768         int i;
2769
2770         dbus_message_iter_get_basic(iter, &str);
2771         if (!str)
2772                 return;
2773
2774         for (i = 0; group_map[i].str; i++)
2775                 if (strcmp(str, group_map[i].str) == 0) {
2776                         SUPPLICANT_DBG("Group: %s", str);
2777                         *group |= group_map[i].val;
2778                         break;
2779                 }
2780 }
2781
2782 static void bss_pairwise(DBusMessageIter *iter, void *user_data)
2783 {
2784         unsigned int *pairwise = user_data;
2785         const char *str = NULL;
2786         int i;
2787
2788         dbus_message_iter_get_basic(iter, &str);
2789         if (!str)
2790                 return;
2791
2792         for (i = 0; pairwise_map[i].str; i++)
2793                 if (strcmp(str, pairwise_map[i].str) == 0) {
2794                         SUPPLICANT_DBG("Pairwise: %s", str);
2795                         *pairwise |= pairwise_map[i].val;
2796                         break;
2797                 }
2798 }
2799
2800 static void bss_wpa(const char *key, DBusMessageIter *iter,
2801                         void *user_data)
2802 {
2803         struct g_supplicant_bss *bss = user_data;
2804         unsigned int value = 0;
2805
2806         SUPPLICANT_DBG("Key: %s", key);
2807
2808         if (g_strcmp0(key, "KeyMgmt") == 0) {
2809                 supplicant_dbus_array_foreach(iter, bss_keymgmt, &value);
2810
2811                 if (bss->rsn_selected)
2812                         bss->rsn_keymgmt = value;
2813                 else
2814                         bss->wpa_keymgmt = value;
2815         } else if (g_strcmp0(key, "Group") == 0) {
2816                 supplicant_dbus_array_foreach(iter, bss_group, &value);
2817
2818                 if (bss->rsn_selected)
2819                         bss->rsn_group = value;
2820                 else
2821                         bss->wpa_group = value;
2822         } else if (g_strcmp0(key, "Pairwise") == 0) {
2823                 supplicant_dbus_array_foreach(iter, bss_pairwise, &value);
2824
2825                 if (bss->rsn_selected)
2826                         bss->rsn_pairwise = value;
2827                 else
2828                         bss->wpa_pairwise = value;
2829         }
2830 }
2831
2832 static unsigned int get_tlv(unsigned char *ie, unsigned int ie_size,
2833                                                         unsigned int type)
2834 {
2835         unsigned int len = 0;
2836
2837         while (len + 4 < ie_size) {
2838                 unsigned int hi = ie[len];
2839                 unsigned int lo = ie[len + 1];
2840                 unsigned int tmp_type = (hi << 8) + lo;
2841                 unsigned int v_len = 0;
2842
2843                 /* hi and lo are used to recreate an unsigned int
2844                  * based on 2 8bits length unsigned int. */
2845
2846                 hi = ie[len + 2];
2847                 lo = ie[len + 3];
2848                 v_len = (hi << 8) + lo;
2849
2850                 if (tmp_type == type) {
2851                         unsigned int ret_value = 0;
2852                         unsigned char *value = (unsigned char *)&ret_value;
2853
2854                         SUPPLICANT_DBG("IE: match type 0x%x", type);
2855
2856                         /* Verifying length relevance */
2857                         if (v_len > sizeof(unsigned int) ||
2858                                 len + 4 + v_len > ie_size)
2859                                 break;
2860
2861                         memcpy(value, ie + len + 4, v_len);
2862
2863                         SUPPLICANT_DBG("returning 0x%x", ret_value);
2864                         return ret_value;
2865                 }
2866
2867                 len += v_len + 4;
2868         }
2869
2870         SUPPLICANT_DBG("returning 0");
2871         return 0;
2872 }
2873
2874 #if defined TIZEN_EXT
2875 static void get_bss_phy_mode(unsigned int max_rate,
2876                 unsigned int max_ext_rate, bool ht, bool vht, void *data)
2877 {
2878         struct g_supplicant_bss *bss = data;
2879         unsigned int freq = bss->frequency;
2880
2881         /* Following conditions are used to determine
2882          * IEEE 802.11 Protocol Modes:-
2883          *
2884          * 1. If “Supported rates” is only till 11 Mbps,
2885          *    and frequency is in 2.4GHz band, then protocol is 11B.
2886          * 2. If “Supported rates” is till 54Mbps or
2887          *    “Extended supported rates” are present,
2888          *    and frequency is in 2.4GHz band, then protocol is 11G.
2889          * 3. If “Supported rates” is only till 54 Mbps,
2890          *    frequency is in 5GHz band , then protocol is 11A.
2891          * 4. If “HT capabilities” is supported , then protocol is 11N.
2892          * 5. If “HT capabilities” & “VHT” is supported and
2893          *    frequency is in 5 GHz band, then protocol is 11AC.
2894          * */
2895
2896         if (freq >= 2412 && freq <= 2484) { /* 2.4 Ghz Band */
2897                 if (max_rate <= 11 && max_ext_rate <= 0 && !ht)
2898                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211B;
2899                 else if ((max_rate <= 54 || max_ext_rate > 0) && !ht)
2900                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211BG;
2901                 else if ((max_rate >= 54 || max_ext_rate > 0) && ht)
2902                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211BGN;
2903                 else
2904                         bss->phy_mode = G_SUPPLICANT_MODE_UNKNOWN;
2905         } else if (freq >= 5180 && freq <= 5825) { /* 5 Ghz Band */
2906                 if (max_rate <= 54 && !ht)
2907                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211A;
2908                 else if ((max_rate >= 54 || max_ext_rate > 0) && ht && !vht)
2909                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211AN;
2910                 else if ((max_rate >= 54 || max_ext_rate > 0) && ht && vht)
2911                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211ANAC;
2912                 else
2913                         bss->phy_mode = G_SUPPLICANT_MODE_UNKNOWN;
2914         }
2915 }
2916 #endif
2917
2918 static void bss_process_ies(DBusMessageIter *iter, void *user_data)
2919 {
2920         struct g_supplicant_bss *bss = user_data;
2921         const unsigned char WPS_OUI[] = { 0x00, 0x50, 0xf2, 0x04 };
2922         unsigned char *ie, *ie_end;
2923         DBusMessageIter array;
2924         unsigned int value;
2925         int ie_len;
2926 #if defined TIZEN_EXT
2927         const unsigned char OWE_WFA_OUI[] = { 0x50, 0x6f, 0x9a, 0x1c };
2928         int r_len, j;
2929         unsigned char *rates = NULL;
2930         unsigned char *ext_rates = NULL;
2931         unsigned int max_rate = 0;
2932         unsigned int max_ext_rate = 0;
2933         bool ht = false;
2934         bool vht = false;
2935 #endif
2936
2937 #define WMM_WPA1_WPS_INFO 221
2938 #define WPS_INFO_MIN_LEN  6
2939 #define WPS_VERSION_TLV   0x104A
2940 #define WPS_STATE_TLV     0x1044
2941 #define WPS_METHODS_TLV   0x1012
2942 #define WPS_REGISTRAR_TLV 0x1041
2943 #define WPS_VERSION       0x10
2944 #define WPS_PBC           0x04
2945 #define WPS_PIN           0x00
2946 #define WPS_CONFIGURED    0x02
2947 #if defined TIZEN_EXT
2948 #define VENDOR_SPECIFIC_INFO 0xDD
2949 #define WLAN_EID_COUNTRY 7
2950 #endif
2951
2952         dbus_message_iter_recurse(iter, &array);
2953         dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
2954
2955         if (!ie || ie_len < 2)
2956                 return;
2957
2958         bss->wps_capabilities = 0;
2959         bss->keymgmt = 0;
2960
2961         for (ie_end = ie + ie_len; ie < ie_end && ie + ie[1] + 1 <= ie_end;
2962                                                         ie += ie[1] + 2) {
2963 #if defined TIZEN_EXT
2964                 unsigned char *vsie;
2965                 int vsie_len = 0;
2966
2967                 if(ie[0] == VENDOR_SPECIFIC_INFO && memcmp(ie+2, OWE_WFA_OUI, sizeof(OWE_WFA_OUI)) == 0) {
2968                         SUPPLICANT_DBG("IE: match vendor specific data : OWE Transition Mode");
2969
2970 /*
2971                 Tag: Vendor Specific: Wi-Fi Alliance: OWE Transition Mode
2972                         Tag Number: Vendor Specific (221)    -> ie[0]
2973                         Tag length: 26                       -> ie[1]
2974                         OUI: 50:6f:9a (Wi-Fi Alliance)       -> ie[2]
2975                         Vendor Specific OUI Type: 28         -> ie[5]
2976                         BSSID: 92:fd:f0:20:2b:09             -> ie[6]
2977                         SSID length: 15                      -> ie[12]
2978                         SSID: Wi-Fi-5.2.3-owe                -> ie[13]
2979
2980 0000   dd 1a 50 6f 9a 1c 92 fd f0 20 2b 09 0f 57 69 2d   ..Po..... +..Wi-
2981 0010   46 69 2d 35 2e 32 2e 33 2d 6f 77 65               Fi-5.2.3-owe
2982
2983 */
2984                         bss->owe_transition_mode = TRUE;
2985                         if (ie[1] >= 11) { // Tag length is at least up to ssid length position.
2986                                 memcpy(bss->transition_mode_bssid, ie+6, WIFI_BSSID_LEN_MAX);
2987                                 if (ie[12] > 0 && ie[12] < 32) {
2988                                         memcpy(bss->transition_mode_ssid, ie+13, ie[12]);
2989                                         bss->transition_mode_ssid_len = ie[12];
2990                                 } else
2991                                         bss->transition_mode_ssid_len = 0;
2992                         } else
2993                                 bss->owe_transition_mode = FALSE;
2994                         continue;
2995                 }
2996
2997                 if(ie[0] == VENDOR_SPECIFIC_INFO && memcmp(ie+2, WPS_OUI, sizeof(WPS_OUI)) != 0) {
2998
2999                         if (!simplified_log)
3000                                 SUPPLICANT_DBG("IE: match vendor specific data");
3001
3002                         vsie_len = ie[1]+2;     // tag number size(1), tag length size(1)
3003                         vsie = (unsigned char *)g_try_malloc0(vsie_len);
3004
3005                         if (vsie) {
3006                                 memcpy(vsie, ie, vsie_len);
3007                                 bss->vsie_list = g_slist_append(bss->vsie_list, vsie);
3008                         } else
3009                                 SUPPLICANT_DBG("Failed to allocate memory");
3010                         continue;
3011                 }
3012
3013                 if(ie[0] == WLAN_EID_COUNTRY && ie[1] >= 2) {
3014                         /* Add country code only if it is a valid alphabet */
3015                         if (ie[2] >= 65 && ie[2] <= 90 && ie[3] >= 65 && ie[3] <= 90) {
3016                                 memcpy(bss->country_code, ie+2, COUNTRY_CODE_LENGTH);
3017                                 continue;
3018                         }
3019                 }
3020
3021                 if (ie[0] == WLAN_EID_HT_CAP && ie[1]) {
3022                         ht = true;
3023                         continue;
3024                 }
3025
3026                 if (ie[0] == WLAN_EID_VHT_CAP && ie[1]) {
3027                         vht = true;
3028                         continue;
3029                 }
3030
3031                 if (ie[0] == WLAN_EID_SUPP_RATES && ie[1]) {
3032                         r_len = ie[1];
3033                         rates = g_malloc0(r_len);
3034                         if (!rates)
3035                                 continue;
3036
3037                         for (j = 0; ie && j < r_len; j++) {
3038                                 rates[j] = ((ie[j + 2] & 0x7f) * 500000)/1000000;
3039                                 if (max_rate < rates[j])
3040                                         max_rate = rates[j];
3041                         }
3042                         continue;
3043                 }
3044
3045                 if (ie[0] == WLAN_EID_EXT_SUPP_RATES && ie[1] > 0) {
3046                         r_len = ie[1];
3047                         ext_rates = g_malloc0(r_len);
3048                         if (!ext_rates)
3049                                 continue;
3050
3051                         for (j = 0; ie && j < r_len; j++) {
3052                                 ext_rates[j] = ((ie[j + 2] & 0x7f) * 500000)/1000000;
3053                                 if (max_ext_rate < ext_rates[j])
3054                                         max_ext_rate = ext_rates[j];
3055                         }
3056                         continue;
3057                 }
3058 #endif
3059                 if (ie[0] != WMM_WPA1_WPS_INFO || ie[1] < WPS_INFO_MIN_LEN ||
3060                         memcmp(ie+2, WPS_OUI, sizeof(WPS_OUI)) != 0)
3061                         continue;
3062
3063                 SUPPLICANT_DBG("IE: match WPS_OUI");
3064
3065                 value = get_tlv(&ie[6], ie[1], WPS_STATE_TLV);
3066                 if (get_tlv(&ie[6], ie[1], WPS_VERSION_TLV) == WPS_VERSION &&
3067                                                                 value != 0) {
3068                         bss->keymgmt |= G_SUPPLICANT_KEYMGMT_WPS;
3069
3070                         if (value == WPS_CONFIGURED)
3071                                 bss->wps_capabilities |=
3072                                         G_SUPPLICANT_WPS_CONFIGURED;
3073                 }
3074
3075                 value = get_tlv(&ie[6], ie[1], WPS_METHODS_TLV);
3076                 if (value != 0) {
3077                         if (GUINT16_FROM_BE(value) == WPS_PBC)
3078                                 bss->wps_capabilities |= G_SUPPLICANT_WPS_PBC;
3079                         if (GUINT16_FROM_BE(value) == WPS_PIN)
3080                                 bss->wps_capabilities |= G_SUPPLICANT_WPS_PIN;
3081                 } else
3082                         bss->wps_capabilities |=
3083                                 G_SUPPLICANT_WPS_PBC | G_SUPPLICANT_WPS_PIN;
3084
3085                 /* If the AP sends this it means it's advertizing
3086                  * as a registrar and the WPS process is launched
3087                  * on its side */
3088                 if (get_tlv(&ie[6], ie[1], WPS_REGISTRAR_TLV) != 0)
3089                         bss->wps_capabilities |= G_SUPPLICANT_WPS_REGISTRAR;
3090
3091                 SUPPLICANT_DBG("WPS Methods 0x%x", bss->wps_capabilities);
3092         }
3093 #ifdef TIZEN_EXT
3094         get_bss_phy_mode(max_rate, max_ext_rate, ht, vht, user_data);
3095         if (rates)
3096                 g_free(rates);
3097         if (ext_rates)
3098                 g_free(ext_rates);
3099 #endif
3100 }
3101
3102 static void bss_compute_security(struct g_supplicant_bss *bss)
3103 {
3104         /*
3105          * Combining RSN and WPA keymgmt
3106          * We combine it since parsing IEs might have set something for WPS. */
3107         bss->keymgmt |= bss->rsn_keymgmt | bss->wpa_keymgmt;
3108
3109         bss->ieee8021x = FALSE;
3110         bss->psk = FALSE;
3111 #if defined TIZEN_EXT
3112         bss->ft_ieee8021x = FALSE;
3113         bss->ft_psk = FALSE;
3114 #endif
3115
3116 #if defined TIZEN_EXT
3117         if (bss->keymgmt &
3118                         (G_SUPPLICANT_KEYMGMT_WPA_EAP |
3119                                         G_SUPPLICANT_KEYMGMT_WPA_EAP_256))
3120                 bss->ieee8021x = TRUE;
3121         else if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_EAP)
3122                 bss->ft_ieee8021x = TRUE;
3123 #else
3124         if (bss->keymgmt &
3125                         (G_SUPPLICANT_KEYMGMT_WPA_EAP |
3126                                 G_SUPPLICANT_KEYMGMT_WPA_FT_EAP |
3127                                 G_SUPPLICANT_KEYMGMT_WPA_EAP_256))
3128                 bss->ieee8021x = TRUE;
3129 #endif
3130
3131 #if defined TIZEN_EXT
3132         if (bss->keymgmt &
3133                         (G_SUPPLICANT_KEYMGMT_WPA_PSK |
3134                                         G_SUPPLICANT_KEYMGMT_WPA_PSK_256))
3135                 bss->psk = TRUE;
3136         else if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_PSK)
3137                 bss->ft_psk = TRUE;
3138 #else
3139         if (bss->keymgmt &
3140                         (G_SUPPLICANT_KEYMGMT_WPA_PSK |
3141                                 G_SUPPLICANT_KEYMGMT_WPA_FT_PSK |
3142                                 G_SUPPLICANT_KEYMGMT_WPA_PSK_256))
3143                 bss->psk = TRUE;
3144 #endif
3145
3146 #if defined TIZEN_EXT
3147         if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_SAE)
3148                 bss->sae = TRUE;
3149         if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_OWE)
3150                 bss->owe = TRUE;
3151         if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_DPP)
3152                 bss->dpp = TRUE;
3153 #endif
3154
3155         if (bss->ieee8021x)
3156                 bss->security = G_SUPPLICANT_SECURITY_IEEE8021X;
3157 #if defined TIZEN_EXT
3158         else if (bss->sae)
3159                 bss->security = G_SUPPLICANT_SECURITY_SAE;
3160 #endif
3161         else if (bss->psk)
3162                 bss->security = G_SUPPLICANT_SECURITY_PSK;
3163 #if defined TIZEN_EXT
3164         else if (bss->ft_psk)
3165                 bss->security = G_SUPPLICANT_SECURITY_FT_PSK;
3166         else if (bss->ft_ieee8021x == TRUE)
3167                 bss->security = G_SUPPLICANT_SECURITY_IEEE8021X;
3168         else if (bss->owe || bss->owe_transition_mode)
3169                 bss->security = G_SUPPLICANT_SECURITY_OWE;
3170         else if (bss->dpp)
3171                 bss->security = G_SUPPLICANT_SECURITY_DPP;
3172 #endif
3173         else if (bss->privacy)
3174                 bss->security = G_SUPPLICANT_SECURITY_WEP;
3175         else
3176                 bss->security = G_SUPPLICANT_SECURITY_NONE;
3177 }
3178
3179
3180 static void bss_property(const char *key, DBusMessageIter *iter,
3181                                                         void *user_data)
3182 {
3183         struct g_supplicant_bss *bss = user_data;
3184
3185         if (!bss->interface)
3186                 return;
3187 #if defined TIZEN_EXT
3188         if (!simplified_log)
3189 #endif
3190         SUPPLICANT_DBG("key %s", key);
3191
3192         if (!key)
3193                 return;
3194
3195         if (g_strcmp0(key, "BSSID") == 0) {
3196                 DBusMessageIter array;
3197                 unsigned char *addr;
3198                 int addr_len;
3199
3200                 dbus_message_iter_recurse(iter, &array);
3201                 dbus_message_iter_get_fixed_array(&array, &addr, &addr_len);
3202
3203                 if (addr_len == 6)
3204                         memcpy(bss->bssid, addr, addr_len);
3205         } else if (g_strcmp0(key, "SSID") == 0) {
3206                 DBusMessageIter array;
3207                 unsigned char *ssid;
3208                 int ssid_len;
3209
3210                 dbus_message_iter_recurse(iter, &array);
3211                 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
3212
3213                 if (ssid_len > 0 && ssid_len < 33) {
3214                         memcpy(bss->ssid, ssid, ssid_len);
3215                         bss->ssid_len = ssid_len;
3216                 } else {
3217                         memset(bss->ssid, 0, sizeof(bss->ssid));
3218                         bss->ssid_len = 0;
3219                 }
3220         } else if (g_strcmp0(key, "Capabilities") == 0) {
3221                 dbus_uint16_t capabilities = 0x0000;
3222
3223                 dbus_message_iter_get_basic(iter, &capabilities);
3224
3225                 if (capabilities & IEEE80211_CAP_ESS)
3226                         bss->mode = G_SUPPLICANT_MODE_INFRA;
3227                 else if (capabilities & IEEE80211_CAP_IBSS)
3228                         bss->mode = G_SUPPLICANT_MODE_IBSS;
3229
3230                 if (capabilities & IEEE80211_CAP_PRIVACY)
3231                         bss->privacy = TRUE;
3232         } else if (g_strcmp0(key, "Mode") == 0) {
3233                 const char *mode = NULL;
3234
3235                 dbus_message_iter_get_basic(iter, &mode);
3236                 bss->mode = string2mode(mode);
3237         } else if (g_strcmp0(key, "Frequency") == 0) {
3238                 dbus_uint16_t frequency = 0;
3239
3240                 dbus_message_iter_get_basic(iter, &frequency);
3241                 bss->frequency = frequency;
3242         } else if (g_strcmp0(key, "Signal") == 0) {
3243                 dbus_int16_t signal = 0;
3244
3245                 dbus_message_iter_get_basic(iter, &signal);
3246
3247                 bss->signal = signal;
3248                 if (!bss->signal)
3249                         bss->signal = BSS_UNKNOWN_STRENGTH;
3250
3251         } else if (g_strcmp0(key, "Level") == 0) {
3252                 dbus_int32_t level = 0;
3253
3254                 dbus_message_iter_get_basic(iter, &level);
3255         } else if (g_strcmp0(key, "Rates") == 0) {
3256                 supplicant_dbus_array_foreach(iter, bss_rates, bss);
3257         } else if (g_strcmp0(key, "MaxRate") == 0) {
3258                 dbus_uint32_t maxrate = 0;
3259
3260                 dbus_message_iter_get_basic(iter, &maxrate);
3261                 if (maxrate != 0)
3262                         bss->maxrate = maxrate;
3263         } else if (g_strcmp0(key, "Privacy") == 0) {
3264                 dbus_bool_t privacy = FALSE;
3265
3266                 dbus_message_iter_get_basic(iter, &privacy);
3267                 bss->privacy = privacy;
3268         } else if (g_strcmp0(key, "RSN") == 0) {
3269                 bss->rsn_selected = TRUE;
3270
3271                 supplicant_dbus_property_foreach(iter, bss_wpa, bss);
3272         } else if (g_strcmp0(key, "WPA") == 0) {
3273                 bss->rsn_selected = FALSE;
3274
3275                 supplicant_dbus_property_foreach(iter, bss_wpa, bss);
3276 #if defined TIZEN_EXT
3277         } else if (g_strcmp0(key, "HS20") == 0) {
3278                 dbus_bool_t hs20 = FALSE;
3279                 dbus_message_iter_get_basic(iter, &hs20);
3280                 bss->hs20 = hs20;
3281         } else if (g_strcmp0(key, "SNR") == 0) {
3282                 dbus_int16_t snr = 0;
3283
3284                 dbus_message_iter_get_basic(iter, &snr);
3285                 bss->snr = snr;
3286         } else if (g_strcmp0(key, "EstThroughput") == 0) {
3287                 dbus_uint32_t est_throughput = 0;
3288
3289                 dbus_message_iter_get_basic(iter, &est_throughput);
3290                 if (est_throughput != 0)
3291                         bss->est_throughput = est_throughput;
3292 #endif
3293         } else if (g_strcmp0(key, "IEs") == 0)
3294                 bss_process_ies(iter, bss);
3295         else
3296                 SUPPLICANT_DBG("key %s type %c",
3297                                 key, dbus_message_iter_get_arg_type(iter));
3298 }
3299
3300 static struct g_supplicant_bss *interface_bss_added(DBusMessageIter *iter,
3301                                                         void *user_data)
3302 {
3303         GSupplicantInterface *interface = user_data;
3304         GSupplicantNetwork *network;
3305         struct g_supplicant_bss *bss;
3306         const char *path = NULL;
3307 #if defined TIZEN_EXT
3308         if (!simplified_log)
3309 #endif
3310         SUPPLICANT_DBG("");
3311
3312         dbus_message_iter_get_basic(iter, &path);
3313         if (!path)
3314                 return NULL;
3315
3316         if (g_strcmp0(path, "/") == 0)
3317                 return NULL;
3318 #if defined TIZEN_EXT
3319         if (!simplified_log)
3320 #endif
3321         SUPPLICANT_DBG("%s", path);
3322
3323         network = g_hash_table_lookup(interface->bss_mapping, path);
3324         if (network) {
3325                 bss = g_hash_table_lookup(network->bss_table, path);
3326                 if (bss)
3327                         return NULL;
3328         }
3329
3330         bss = g_try_new0(struct g_supplicant_bss, 1);
3331         if (!bss)
3332                 return NULL;
3333
3334         bss->interface = interface;
3335         bss->path = g_strdup(path);
3336         bss->signal = BSS_UNKNOWN_STRENGTH;
3337
3338         return bss;
3339 }
3340
3341 static void interface_bss_added_with_keys(DBusMessageIter *iter,
3342                                                 void *user_data)
3343 {
3344         struct g_supplicant_bss *bss;
3345 #if defined TIZEN_EXT
3346         if (!simplified_log)
3347 #endif
3348         SUPPLICANT_DBG("");
3349
3350         bss = interface_bss_added(iter, user_data);
3351         if (!bss)
3352                 return;
3353
3354         dbus_message_iter_next(iter);
3355
3356         if (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_INVALID)
3357 #if defined TIZEN_EXT
3358         {
3359                 g_free(bss->path);
3360                 g_free(bss);
3361                 return;
3362         }
3363 #else
3364                 return;
3365 #endif
3366
3367         supplicant_dbus_property_foreach(iter, bss_property, bss);
3368
3369         bss_compute_security(bss);
3370         if (add_or_replace_bss_to_network(bss) < 0)
3371                 SUPPLICANT_DBG("add_or_replace_bss_to_network failed");
3372 }
3373
3374 static void interface_bss_added_without_keys(DBusMessageIter *iter,
3375                                                 void *user_data)
3376 {
3377         struct g_supplicant_bss *bss;
3378 #if defined TIZEN_EXT
3379         if (!simplified_log)
3380 #endif
3381         SUPPLICANT_DBG("");
3382
3383         bss = interface_bss_added(iter, user_data);
3384         if (!bss)
3385                 return;
3386
3387         supplicant_dbus_property_get_all(bss->path,
3388                                         SUPPLICANT_INTERFACE ".BSS",
3389                                         bss_property, bss, bss);
3390
3391         bss_compute_security(bss);
3392         if (add_or_replace_bss_to_network(bss) < 0)
3393                         SUPPLICANT_DBG("add_or_replace_bss_to_network failed");
3394 }
3395
3396 static void update_signal(gpointer key, gpointer value,
3397                                                 gpointer user_data)
3398 {
3399         struct g_supplicant_bss *bss = value;
3400         GSupplicantNetwork *network = user_data;
3401
3402 #if defined TIZEN_EXT
3403         if (!network->best_bss || (network->best_bss == bss)) {
3404                 if (bss->signal > network->signal) {
3405                         network->signal = bss->signal;
3406                         network->best_bss = bss;
3407                 }
3408                 return;
3409         }
3410
3411         update_best_bss(network, bss, network->best_bss);
3412 #else
3413         if (bss->signal > network->signal) {
3414                 network->signal = bss->signal;
3415                 network->best_bss = bss;
3416         }
3417 #endif
3418 }
3419
3420 static void update_network_signal(GSupplicantNetwork *network)
3421 {
3422         if (g_hash_table_size(network->bss_table) <= 1 && network->best_bss)
3423                 return;
3424
3425         g_hash_table_foreach(network->bss_table,
3426                                 update_signal, network);
3427
3428         SUPPLICANT_DBG("New network signal %d", network->signal);
3429 }
3430
3431 #if defined TIZEN_EXT
3432 static gboolean last_connected_timeout(gpointer data)
3433 {
3434         GSupplicantInterface *interface = data;
3435         GSupplicantNetwork *current_network = interface->current_network;
3436
3437         SUPPLICANT_DBG("Timeout last connected bss");
3438
3439         if (current_network && current_network->best_bss) {
3440                 if (compare_bssid(current_network->best_bss->bssid, interface->connected_bssid)) {
3441                         g_supplicant_network_set_last_connected_bssid(current_network, interface->connected_bssid);
3442                         callback_network_changed(current_network, "LastConnectedBSSID");
3443                 }
3444         }
3445
3446         last_connected_bss_timeout = 0;
3447         return FALSE;
3448 }
3449
3450 static void add_timer_for_last_connected(GSupplicantInterface *interface)
3451 {
3452         GSupplicantNetwork *current_network = interface->current_network;
3453
3454         if (interface->state == G_SUPPLICANT_STATE_COMPLETED) {
3455                 if (current_network) {
3456                         struct g_supplicant_bss *best_bss = current_network->best_bss;
3457
3458                         memcpy(interface->connected_bssid, best_bss->bssid, WIFI_BSSID_LEN_MAX);
3459
3460                         if (last_connected_bss_timeout)
3461                                 g_source_remove(last_connected_bss_timeout);
3462
3463                         last_connected_bss_timeout = g_timeout_add_seconds(LAST_CONNECTED_TIMEOUT,
3464                                 last_connected_timeout, interface);
3465
3466                         SUPPLICANT_DBG("Add timer for last connected bssid [" MACSTR "]",
3467                                         MAC2STR(best_bss->bssid));
3468                 }
3469         }
3470 }
3471
3472 static void remove_timer_for_last_connected(GSupplicantInterface *interface)
3473 {
3474         if (interface->state == G_SUPPLICANT_STATE_DISCONNECTED) {
3475                 if (last_connected_bss_timeout != 0) {
3476                         g_source_remove(last_connected_bss_timeout);
3477                         last_connected_bss_timeout = 0;
3478                         SUPPLICANT_DBG("Remove timer for last connected bss");
3479                 }
3480         }
3481 }
3482 #endif
3483
3484 static void interface_current_bss(GSupplicantInterface *interface,
3485                                                 DBusMessageIter *iter)
3486 {
3487         GSupplicantNetwork *network;
3488         struct g_supplicant_bss *bss;
3489         const char *path;
3490
3491         dbus_message_iter_get_basic(iter, &path);
3492         if (g_strcmp0(path, "/") == 0) {
3493                 interface->current_network = NULL;
3494                 return;
3495         }
3496
3497         interface_bss_added_without_keys(iter, interface);
3498
3499         network = g_hash_table_lookup(interface->bss_mapping, path);
3500         if (!network)
3501                 return;
3502
3503         bss = g_hash_table_lookup(network->bss_table, path);
3504         if (!bss)
3505                 return;
3506
3507         interface->current_network = network;
3508 #if defined TIZEN_EXT
3509         SUPPLICANT_DBG("current network [%p]", interface->current_network);
3510 #endif
3511
3512         if (bss != network->best_bss) {
3513                 /*
3514                  * This is the case where either wpa_s got associated
3515                  * to a BSS different than the one ConnMan considers
3516                  * the best, or we are roaming.
3517                  */
3518                 SUPPLICANT_DBG("Update best BSS for %s", network->name);
3519
3520                 network->best_bss = bss;
3521
3522                 if (network->signal != bss->signal) {
3523                         SUPPLICANT_DBG("New network signal %d dBm",
3524                                                 bss->signal);
3525
3526                         network->signal = bss->signal;
3527                         callback_network_changed(network, "Signal");
3528                 }
3529         }
3530
3531         /*
3532          * wpa_s could notify about CurrentBSS in any state once
3533          * it got associated. It is not sure such notification will
3534          * arrive together with transition to ASSOCIATED state.
3535          * In fact, for networks with security WEP or OPEN, it
3536          * always arrives together with transition to COMPLETED.
3537          */
3538         switch (interface->state) {
3539         case G_SUPPLICANT_STATE_UNKNOWN:
3540         case G_SUPPLICANT_STATE_DISABLED:
3541         case G_SUPPLICANT_STATE_DISCONNECTED:
3542         case G_SUPPLICANT_STATE_INACTIVE:
3543         case G_SUPPLICANT_STATE_SCANNING:
3544         case G_SUPPLICANT_STATE_AUTHENTICATING:
3545         case G_SUPPLICANT_STATE_ASSOCIATING:
3546                 return;
3547         case G_SUPPLICANT_STATE_ASSOCIATED:
3548         case G_SUPPLICANT_STATE_4WAY_HANDSHAKE:
3549         case G_SUPPLICANT_STATE_GROUP_HANDSHAKE:
3550         case G_SUPPLICANT_STATE_COMPLETED:
3551                 callback_network_associated(network);
3552 #if defined TIZEN_EXT
3553                 add_timer_for_last_connected(interface);
3554 #endif
3555                 break;
3556         }
3557 }
3558
3559 static void interface_bss_removed(DBusMessageIter *iter, void *user_data)
3560 {
3561         GSupplicantInterface *interface = user_data;
3562         GSupplicantNetwork *network;
3563         struct g_supplicant_bss *bss = NULL;
3564         const char *path = NULL;
3565         bool is_current_network_bss = false;
3566
3567         dbus_message_iter_get_basic(iter, &path);
3568         if (!path)
3569                 return;
3570
3571         network = g_hash_table_lookup(interface->bss_mapping, path);
3572         if (!network)
3573                 return;
3574
3575         bss = g_hash_table_lookup(network->bss_table, path);
3576         if (network->best_bss == bss) {
3577                 network->best_bss = NULL;
3578                 network->signal = BSS_UNKNOWN_STRENGTH;
3579                 is_current_network_bss = true;
3580         }
3581
3582         g_hash_table_remove(bss_mapping, path);
3583
3584         g_hash_table_remove(interface->bss_mapping, path);
3585         g_hash_table_remove(network->bss_table, path);
3586
3587         update_network_signal(network);
3588
3589         if (g_hash_table_size(network->bss_table) == 0) {
3590                 g_hash_table_remove(interface->network_table, network->group);
3591         } else {
3592                 if (is_current_network_bss && network->best_bss)
3593 #if defined TIZEN_EXT
3594                         callback_network_changed(network, "CheckMultiBssidConnect");
3595 #else
3596                         callback_network_changed(network, "");
3597 #endif
3598         }
3599 }
3600
3601 static void set_config_methods(DBusMessageIter *iter, void *user_data)
3602 {
3603         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, user_data);
3604 }
3605
3606 static void wps_property(const char *key, DBusMessageIter *iter,
3607                                                         void *user_data)
3608 {
3609         GSupplicantInterface *interface = user_data;
3610
3611         if (!interface)
3612                 return;
3613 #if defined TIZEN_EXT
3614         if (!simplified_log)
3615 #endif
3616         SUPPLICANT_DBG("key: %s", key);
3617
3618         if (g_strcmp0(key, "ConfigMethods") == 0) {
3619                 const char *config_methods = "push_button", *str = NULL;
3620
3621                 dbus_message_iter_get_basic(iter, &str);
3622                 if (str && strlen(str) > 0) {
3623                         /* It was already set at wpa_s level, don't modify it. */
3624                         SUPPLICANT_DBG("%s", str);
3625                         return;
3626                 }
3627
3628                 supplicant_dbus_property_set(interface->path,
3629                         SUPPLICANT_INTERFACE ".Interface.WPS",
3630                         "ConfigMethods", DBUS_TYPE_STRING_AS_STRING,
3631                         set_config_methods, NULL, &config_methods, NULL);
3632
3633                 SUPPLICANT_DBG("No value. Set %s", config_methods);
3634         }
3635
3636 }
3637
3638 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
3639 void g_supplicant_replace_config_file(const char *ifname, const char *config_file)
3640 {
3641         if (!ifname)
3642                return;
3643
3644         if (!config_file)
3645                 return;
3646
3647         SUPPLICANT_DBG("New {%s, %s}", ifname, config_file);
3648         g_hash_table_replace(config_file_table,
3649                         g_strdup(ifname), g_strdup(config_file));
3650 }
3651 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
3652
3653 static void interface_property(const char *key, DBusMessageIter *iter,
3654                                                         void *user_data)
3655 {
3656         GSupplicantInterface *interface = user_data;
3657
3658         if (!interface)
3659                 return;
3660 #if defined TIZEN_EXT
3661         if (!simplified_log)
3662 #endif
3663         SUPPLICANT_DBG("%s", key);
3664
3665         if (!key) {
3666                 debug_strvalmap("KeyMgmt capability", keymgmt_map,
3667                                                 interface->keymgmt_capa);
3668                 debug_strvalmap("AuthAlg capability", authalg_capa_map,
3669                                                 interface->authalg_capa);
3670                 debug_strvalmap("Protocol capability", proto_capa_map,
3671                                                 interface->proto_capa);
3672                 debug_strvalmap("Pairwise capability", pairwise_map,
3673                                                 interface->pairwise_capa);
3674                 debug_strvalmap("Group capability", group_map,
3675                                                 interface->group_capa);
3676                 debug_strvalmap("Scan capability", scan_capa_map,
3677                                                 interface->scan_capa);
3678                 debug_strvalmap("Mode capability", mode_capa_map,
3679                                                 interface->mode_capa);
3680
3681                 supplicant_dbus_property_get_all(interface->path,
3682                                 SUPPLICANT_INTERFACE ".Interface.WPS",
3683                                 wps_property, interface, interface);
3684
3685                 if (interface->ready)
3686                         callback_interface_added(interface);
3687
3688                 return;
3689         }
3690
3691         if (g_strcmp0(key, "Capabilities") == 0) {
3692                 supplicant_dbus_property_foreach(iter, interface_capability,
3693                                                                 interface);
3694 #if !defined TIZEN_EXT
3695                 if (interface->mode_capa & G_SUPPLICANT_CAPABILITY_MODE_P2P)
3696                         interface->p2p_support = true;
3697 #endif
3698 #if defined TIZEN_EXT_WIFI_MESH
3699                 if (interface->mode_capa & G_SUPPLICANT_CAPABILITY_MODE_MESH)
3700                         interface->mesh_support = true;
3701 #endif
3702         } else if (g_strcmp0(key, "State") == 0) {
3703                 const char *str = NULL;
3704
3705                 dbus_message_iter_get_basic(iter, &str);
3706                 if (str)
3707                         if (string2state(str) != interface->state) {
3708                                 interface->state = string2state(str);
3709                                 callback_interface_state(interface);
3710                         }
3711 #if defined TIZEN_EXT
3712                 switch (interface->state) {
3713                 case G_SUPPLICANT_STATE_COMPLETED:
3714                         add_timer_for_last_connected(interface);
3715                         break;
3716                 case G_SUPPLICANT_STATE_DISCONNECTED:
3717                         remove_timer_for_last_connected(interface);
3718                         break;
3719                 default:
3720                         break;
3721                 }
3722 #endif
3723                 if (interface->ap_create_in_progress) {
3724                         if (interface->state == G_SUPPLICANT_STATE_DISCONNECTED)
3725                                 callback_ap_create_fail(interface);
3726
3727                         interface->ap_create_in_progress = false;
3728                 }
3729
3730                 if (interface->state == G_SUPPLICANT_STATE_DISABLED)
3731                         interface->ready = FALSE;
3732                 else
3733                         interface->ready = TRUE;
3734
3735                 SUPPLICANT_DBG("state %s (%d)", str, interface->state);
3736         } else if (g_strcmp0(key, "Scanning") == 0) {
3737                 dbus_bool_t scanning = FALSE;
3738
3739                 dbus_message_iter_get_basic(iter, &scanning);
3740                 interface->scanning = scanning;
3741
3742                 if (interface->ready) {
3743                         if (interface->scanning)
3744                                 callback_scan_started(interface);
3745                         else
3746                                 callback_scan_finished(interface);
3747                 }
3748         } else if (g_strcmp0(key, "ApScan") == 0) {
3749                 int apscan = 1;
3750
3751                 dbus_message_iter_get_basic(iter, &apscan);
3752                 interface->apscan = apscan;
3753         } else if (g_strcmp0(key, "Ifname") == 0) {
3754                 const char *str = NULL;
3755
3756                 dbus_message_iter_get_basic(iter, &str);
3757                 if (str) {
3758                         g_free(interface->ifname);
3759                         interface->ifname = g_strdup(str);
3760                 }
3761         } else if (g_strcmp0(key, "Driver") == 0) {
3762                 const char *str = NULL;
3763
3764                 dbus_message_iter_get_basic(iter, &str);
3765                 if (str) {
3766                         g_free(interface->driver);
3767                         interface->driver = g_strdup(str);
3768                 }
3769         } else if (g_strcmp0(key, "BridgeIfname") == 0) {
3770                 const char *str = NULL;
3771
3772                 dbus_message_iter_get_basic(iter, &str);
3773                 if (str) {
3774                         g_free(interface->bridge);
3775                         interface->bridge = g_strdup(str);
3776                 }
3777         } else if (g_strcmp0(key, "ConfigFile") == 0) {
3778                 const char *str = NULL;
3779
3780                 dbus_message_iter_get_basic(iter, &str);
3781                 if (str && strlen(str) > 0 && interface->ifname) {
3782                         SUPPLICANT_DBG("New {%s, %s}", interface->ifname, str);
3783                         g_hash_table_replace(config_file_table,
3784                                 g_strdup(interface->ifname), g_strdup(str));
3785                 }
3786         } else if (g_strcmp0(key, "CurrentBSS") == 0) {
3787                 interface_current_bss(interface, iter);
3788         } else if (g_strcmp0(key, "CurrentNetwork") == 0) {
3789 #if defined TIZEN_EXT
3790                 if (interface->state != G_SUPPLICANT_STATE_COMPLETED)
3791 #endif
3792                 interface_network_added(iter, interface);
3793         } else if (g_strcmp0(key, "BSSs") == 0) {
3794                 supplicant_dbus_array_foreach(iter,
3795                                         interface_bss_added_without_keys,
3796                                         interface);
3797         } else if (g_strcmp0(key, "Blobs") == 0) {
3798                 /* Nothing */
3799         } else if (g_strcmp0(key, "Networks") == 0) {
3800                 supplicant_dbus_array_foreach(iter, interface_network_added,
3801                                                                 interface);
3802         } else if (g_strcmp0(key, "DisconnectReason") == 0) {
3803                 int reason_code;
3804                 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
3805                         dbus_message_iter_get_basic(iter, &reason_code);
3806                         callback_disconnect_reason_code(interface, reason_code);
3807 #if defined TIZEN_EXT
3808                         SUPPLICANT_DBG("reason code (%d)", reason_code);
3809 #endif
3810                 }
3811         } else if (g_strcmp0(key, "AssocStatusCode") == 0) {
3812                 int status_code;
3813                 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
3814                         dbus_message_iter_get_basic(iter, &status_code);
3815                         callback_assoc_status_code(interface, status_code);
3816 #if defined TIZEN_EXT
3817                         SUPPLICANT_DBG("status code (%d)", status_code);
3818 #endif
3819                 }
3820         } else {
3821                 SUPPLICANT_DBG("key %s type %c",
3822                                 key, dbus_message_iter_get_arg_type(iter));
3823         }
3824 }
3825
3826 static void scan_network_update(DBusMessageIter *iter, void *user_data)
3827 {
3828         GSupplicantInterface *interface = user_data;
3829         GSupplicantNetwork *network;
3830         char *path;
3831
3832         if (!iter)
3833                 return;
3834
3835         dbus_message_iter_get_basic(iter, &path);
3836
3837         if (!path)
3838                 return;
3839
3840         if (g_strcmp0(path, "/") == 0)
3841                 return;
3842
3843         /* Update the network details based on scan BSS data */
3844         network = g_hash_table_lookup(interface->bss_mapping, path);
3845         if (network)
3846                 callback_network_added(network);
3847 }
3848
3849 static void scan_bss_data(const char *key, DBusMessageIter *iter,
3850                                 void *user_data)
3851 {
3852         GSupplicantInterface *interface = user_data;
3853
3854 /*Fixed : stucking in scanning state when scan failed*/
3855 #if defined TIZEN_EXT
3856         GSupplicantInterfaceCallback scan_callback;
3857         SUPPLICANT_DBG("");
3858 #endif
3859
3860         if (iter)
3861                 supplicant_dbus_array_foreach(iter, scan_network_update,
3862                                                 interface);
3863
3864 #if defined TIZEN_EXT
3865         scan_callback = interface->scan_callback;
3866         callback_scan_done(interface);
3867 #endif
3868
3869         if (interface->scan_callback)
3870                 interface->scan_callback(0, interface, interface->scan_data);
3871
3872 #if defined TIZEN_EXT
3873         if (interface->scan_callback == scan_callback) {
3874 #endif
3875         interface->scan_callback = NULL;
3876         interface->scan_data = NULL;
3877 #if defined TIZEN_EXT
3878         }
3879 #endif
3880 }
3881
3882 static GSupplicantInterface *interface_alloc(const char *path)
3883 {
3884         GSupplicantInterface *interface;
3885
3886         interface = g_try_new0(GSupplicantInterface, 1);
3887         if (!interface)
3888                 return NULL;
3889
3890         interface->path = g_strdup(path);
3891
3892         interface->network_table = g_hash_table_new_full(g_str_hash,
3893                                         g_str_equal, NULL, remove_network);
3894         interface->peer_table = g_hash_table_new_full(g_str_hash,
3895                                         g_str_equal, NULL, remove_peer);
3896         interface->group_table = g_hash_table_new_full(g_str_hash,
3897                                         g_str_equal, NULL, remove_group);
3898         interface->bss_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
3899                                                                 NULL, NULL);
3900
3901         g_hash_table_replace(interface_table, interface->path, interface);
3902
3903         return interface;
3904 }
3905
3906 static void interface_added(DBusMessageIter *iter, void *user_data)
3907 {
3908         GSupplicantInterface *interface;
3909         const char *path = NULL;
3910         bool properties_appended = GPOINTER_TO_UINT(user_data);
3911
3912         SUPPLICANT_DBG("");
3913
3914         dbus_message_iter_get_basic(iter, &path);
3915         if (!path)
3916                 return;
3917
3918         if (g_strcmp0(path, "/") == 0)
3919                 return;
3920
3921         interface = g_hash_table_lookup(interface_table, path);
3922         if (interface)
3923                 return;
3924
3925         interface = interface_alloc(path);
3926         if (!interface)
3927                 return;
3928
3929         if (!properties_appended) {
3930                 supplicant_dbus_property_get_all(path,
3931                                                 SUPPLICANT_INTERFACE ".Interface",
3932                                                 interface_property, interface,
3933                                                 interface);
3934                 return;
3935         }
3936
3937         dbus_message_iter_next(iter);
3938         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
3939                 supplicant_dbus_property_foreach(iter, interface_property,
3940                                                                 interface);
3941                 interface_property(NULL, NULL, interface);
3942         }
3943 }
3944
3945 static void interface_removed(DBusMessageIter *iter, void *user_data)
3946 {
3947         const char *path = NULL;
3948         GSupplicantInterface *interface = user_data;
3949
3950         dbus_message_iter_get_basic(iter, &path);
3951         if (!path)
3952                 return;
3953
3954         interface = g_hash_table_lookup(interface_table, path);
3955         g_supplicant_interface_cancel(interface);
3956
3957         g_hash_table_remove(interface_table, path);
3958 }
3959
3960 static void eap_method(DBusMessageIter *iter, void *user_data)
3961 {
3962         const char *str = NULL;
3963         int i;
3964
3965         dbus_message_iter_get_basic(iter, &str);
3966         if (!str)
3967                 return;
3968
3969         for (i = 0; eap_method_map[i].str; i++)
3970                 if (strcmp(str, eap_method_map[i].str) == 0) {
3971                         eap_methods |= eap_method_map[i].val;
3972                         break;
3973                 }
3974 }
3975
3976 static void service_property(const char *key, DBusMessageIter *iter,
3977                                                         void *user_data)
3978 {
3979         if (!key) {
3980                 callback_system_ready();
3981                 return;
3982         }
3983
3984         if (g_strcmp0(key, "DebugLevel") == 0) {
3985                 const char *str = NULL;
3986                 int i;
3987
3988                 dbus_message_iter_get_basic(iter, &str);
3989                 for (i = 0; debug_strings[i]; i++)
3990                         if (g_strcmp0(debug_strings[i], str) == 0) {
3991                                 debug_level = i;
3992                                 break;
3993                         }
3994                 SUPPLICANT_DBG("Debug level %d", debug_level);
3995         } else if (g_strcmp0(key, "DebugTimestamp") == 0) {
3996                 dbus_message_iter_get_basic(iter, &debug_timestamp);
3997                 SUPPLICANT_DBG("Debug timestamp %u", debug_timestamp);
3998         } else if (g_strcmp0(key, "DebugShowKeys") == 0) {
3999                 dbus_message_iter_get_basic(iter, &debug_showkeys);
4000                 SUPPLICANT_DBG("Debug show keys %u", debug_showkeys);
4001         } else if (g_strcmp0(key, "Interfaces") == 0) {
4002                 supplicant_dbus_array_foreach(iter, interface_added, NULL);
4003         } else if (g_strcmp0(key, "EapMethods") == 0) {
4004                 supplicant_dbus_array_foreach(iter, eap_method, NULL);
4005                 debug_strvalmap("EAP method", eap_method_map, eap_methods);
4006         } else if (g_strcmp0(key, "Country") == 0) {
4007                 const char *country = NULL;
4008
4009                 dbus_message_iter_get_basic(iter, &country);
4010                 SUPPLICANT_DBG("Country %s", country);
4011         } else
4012                 SUPPLICANT_DBG("key %s type %c",
4013                                 key, dbus_message_iter_get_arg_type(iter));
4014 }
4015
4016 static void signal_name_owner_changed(const char *path, DBusMessageIter *iter)
4017 {
4018         const char *name = NULL, *old = NULL, *new = NULL;
4019
4020         SUPPLICANT_DBG("");
4021
4022         if (g_strcmp0(path, DBUS_PATH_DBUS) != 0)
4023                 return;
4024
4025         dbus_message_iter_get_basic(iter, &name);
4026         if (!name)
4027                 return;
4028
4029         if (g_strcmp0(name, SUPPLICANT_SERVICE) != 0)
4030                 return;
4031
4032         dbus_message_iter_next(iter);
4033         dbus_message_iter_get_basic(iter, &old);
4034         dbus_message_iter_next(iter);
4035         dbus_message_iter_get_basic(iter, &new);
4036
4037         if (!old || !new)
4038                 return;
4039
4040         if (strlen(old) > 0 && strlen(new) == 0) {
4041                 system_available = FALSE;
4042                 g_hash_table_remove_all(bss_mapping);
4043                 g_hash_table_remove_all(peer_mapping);
4044                 g_hash_table_remove_all(group_mapping);
4045                 g_hash_table_remove_all(config_file_table);
4046                 g_hash_table_remove_all(interface_table);
4047                 callback_system_killed();
4048         }
4049
4050         if (strlen(new) > 0 && strlen(old) == 0) {
4051                 system_available = TRUE;
4052                 supplicant_dbus_property_get_all(SUPPLICANT_PATH,
4053                                                 SUPPLICANT_INTERFACE,
4054                                                 service_property, NULL, NULL);
4055         }
4056 }
4057
4058 static void signal_properties_changed(const char *path, DBusMessageIter *iter)
4059 {
4060         SUPPLICANT_DBG("");
4061
4062         if (g_strcmp0(path, SUPPLICANT_PATH) != 0)
4063                 return;
4064
4065         supplicant_dbus_property_foreach(iter, service_property, NULL);
4066 }
4067
4068 static void signal_interface_added(const char *path, DBusMessageIter *iter)
4069 {
4070         SUPPLICANT_DBG("path %s %s", path, SUPPLICANT_PATH);
4071
4072         if (g_strcmp0(path, SUPPLICANT_PATH) == 0)
4073                 interface_added(iter, GUINT_TO_POINTER(true));
4074 }
4075
4076 static void signal_interface_removed(const char *path, DBusMessageIter *iter)
4077 {
4078         SUPPLICANT_DBG("");
4079
4080         if (g_strcmp0(path, SUPPLICANT_PATH) == 0)
4081                 interface_removed(iter, NULL);
4082 }
4083
4084 static void signal_interface_changed(const char *path, DBusMessageIter *iter)
4085 {
4086         GSupplicantInterface *interface;
4087 #if defined TIZEN_EXT
4088         if (!simplified_log)
4089 #endif
4090         SUPPLICANT_DBG("");
4091
4092         interface = g_hash_table_lookup(interface_table, path);
4093         if (!interface)
4094                 return;
4095
4096         supplicant_dbus_property_foreach(iter, interface_property, interface);
4097 }
4098
4099 static void signal_scan_done(const char *path, DBusMessageIter *iter)
4100 {
4101         GSupplicantInterface *interface;
4102         dbus_bool_t success = FALSE;
4103
4104         SUPPLICANT_DBG("");
4105
4106         interface = g_hash_table_lookup(interface_table, path);
4107         if (!interface)
4108                 return;
4109
4110         dbus_message_iter_get_basic(iter, &success);
4111
4112         if (interface->scanning) {
4113                 callback_scan_finished(interface);
4114                 interface->scanning = FALSE;
4115         }
4116
4117         /*
4118          * If scan is unsuccessful return -EIO else get the scanned BSSs
4119          * and update the network details accordingly
4120          */
4121         if (!success) {
4122                 if (interface->scan_callback)
4123                         interface->scan_callback(-EIO, interface,
4124                                                 interface->scan_data);
4125
4126                 interface->scan_callback = NULL;
4127                 interface->scan_data = NULL;
4128
4129                 return;
4130         }
4131
4132         supplicant_dbus_property_get(path, SUPPLICANT_INTERFACE ".Interface",
4133                                 "BSSs", scan_bss_data, interface, interface);
4134 }
4135
4136 static void signal_bss_added(const char *path, DBusMessageIter *iter)
4137 {
4138         GSupplicantInterface *interface;
4139 #if defined TIZEN_EXT
4140         if (!simplified_log)
4141 #endif
4142         SUPPLICANT_DBG("");
4143
4144         interface = g_hash_table_lookup(interface_table, path);
4145         if (!interface)
4146                 return;
4147
4148         interface_bss_added_with_keys(iter, interface);
4149 }
4150
4151 static void signal_bss_removed(const char *path, DBusMessageIter *iter)
4152 {
4153         GSupplicantInterface *interface;
4154
4155         SUPPLICANT_DBG("");
4156
4157         interface = g_hash_table_lookup(interface_table, path);
4158         if (!interface)
4159                 return;
4160
4161         interface_bss_removed(iter, interface);
4162 }
4163
4164 static void signal_network_added(const char *path, DBusMessageIter *iter)
4165 {
4166         GSupplicantInterface *interface;
4167
4168         SUPPLICANT_DBG("");
4169
4170         interface = g_hash_table_lookup(interface_table, path);
4171         if (!interface)
4172                 return;
4173
4174         interface_network_added(iter, interface);
4175 }
4176
4177 static void signal_network_removed(const char *path, DBusMessageIter *iter)
4178 {
4179         GSupplicantInterface *interface;
4180
4181         SUPPLICANT_DBG("");
4182
4183         interface = g_hash_table_lookup(interface_table, path);
4184         if (!interface)
4185                 return;
4186
4187         interface_network_removed(iter, interface);
4188 }
4189 #if defined TIZEN_EXT
4190 void *copy_vsie_list(gconstpointer src, gpointer data)
4191 {
4192         return g_strdup(src);
4193 }
4194 #endif
4195
4196
4197 static void signal_sta_authorized(const char *path, DBusMessageIter *iter)
4198 {
4199         GSupplicantInterface *interface;
4200         const char *addr = NULL;
4201
4202         SUPPLICANT_DBG("");
4203
4204         interface = g_hash_table_lookup(interface_table, path);
4205         if (!interface)
4206                 return;
4207
4208         dbus_message_iter_get_basic(iter, &addr);
4209         if (!addr)
4210                 return;
4211
4212         callback_sta_authorized(interface, addr);
4213 }
4214
4215 static void signal_sta_deauthorized(const char *path, DBusMessageIter *iter)
4216 {
4217         GSupplicantInterface *interface;
4218         const char *addr = NULL;
4219
4220         SUPPLICANT_DBG("");
4221
4222         interface = g_hash_table_lookup(interface_table, path);
4223         if (!interface)
4224                 return;
4225
4226         dbus_message_iter_get_basic(iter, &addr);
4227         if (!addr)
4228                 return;
4229
4230         callback_sta_deauthorized(interface, addr);
4231 }
4232
4233 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
4234 static void signal_eap(const char *path, DBusMessageIter *iter)
4235 {
4236         GSupplicantInterface *interface;
4237         const char *str = NULL;
4238
4239         SUPPLICANT_DBG("EAPOL_DEBUG callback eap signal");
4240
4241         interface = g_hash_table_lookup(interface_table, path);
4242         if (!interface)
4243                 return;
4244
4245         // TODO: Identify EAP fail condition, currently timeout is used for failure.
4246
4247         dbus_message_iter_get_basic(iter, &str);
4248         if (!str)
4249                 return;
4250
4251         if (g_strcmp0("completion", str))
4252                 return;
4253
4254         dbus_message_iter_next(iter);
4255
4256         dbus_message_iter_get_basic(iter, &str);
4257         if (!str)
4258                 return;
4259
4260         if (!g_strcmp0("success", str))
4261                 callback_eap(interface, true);
4262         else
4263                 callback_eap(interface, false);
4264 }
4265 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
4266
4267 static void signal_bss_changed(const char *path, DBusMessageIter *iter)
4268 {
4269         GSupplicantInterface *interface;
4270         GSupplicantNetwork *network;
4271         GSupplicantSecurity old_security;
4272         unsigned int old_wps_capabilities;
4273         struct g_supplicant_bss *bss;
4274
4275 #if defined TIZEN_EXT
4276         if (!simplified_log)
4277 #endif
4278         SUPPLICANT_DBG("");
4279
4280         interface = g_hash_table_lookup(bss_mapping, path);
4281         if (!interface)
4282                 return;
4283
4284         network = g_hash_table_lookup(interface->bss_mapping, path);
4285         if (!network)
4286                 return;
4287
4288         bss = g_hash_table_lookup(network->bss_table, path);
4289         if (!bss)
4290                 return;
4291
4292         supplicant_dbus_property_foreach(iter, bss_property, bss);
4293
4294 #if defined TIZEN_EXT
4295         network->frequency = bss->frequency;
4296         network->phy_mode = bss->phy_mode;
4297 #endif
4298         old_security = network->security;
4299         bss_compute_security(bss);
4300
4301         if (old_security != bss->security) {
4302                 struct g_supplicant_bss *new_bss;
4303
4304                 SUPPLICANT_DBG("New network security for %s with path %s",
4305                                bss->ssid, bss->path);
4306
4307                 /*
4308                  * Security change policy:
4309                  * - We first copy the current bss into a new one with
4310                  *   its own pointer (path)
4311                  * - Clear the old bss pointer and remove the network completely
4312                  *   if there are no more BSSs in the bss table.
4313                  * - The new bss will be added either to an existing network
4314                  *   or an additional network will be created
4315                  */
4316
4317                 new_bss = g_try_new0(struct g_supplicant_bss, 1);
4318                 if (!new_bss)
4319                         return;
4320
4321                 memcpy(new_bss, bss, sizeof(struct g_supplicant_bss));
4322                 new_bss->path = g_strdup(bss->path);
4323 #if defined TIZEN_EXT
4324                 new_bss->vsie_list = g_slist_copy_deep(bss->vsie_list, copy_vsie_list, NULL);
4325 #endif
4326
4327                 if (network->best_bss == bss) {
4328                         network->best_bss = NULL;
4329                         network->signal = BSS_UNKNOWN_STRENGTH;
4330                 }
4331
4332                 g_hash_table_remove(bss_mapping, path);
4333
4334                 g_hash_table_remove(interface->bss_mapping, path);
4335                 g_hash_table_remove(network->bss_table, path);
4336
4337                 update_network_signal(network);
4338
4339                 if (g_hash_table_size(network->bss_table) == 0)
4340                         g_hash_table_remove(interface->network_table,
4341                                             network->group);
4342
4343                 if (add_or_replace_bss_to_network(new_bss) < 0) {
4344                         /*
4345                          * Prevent a memory leak on failure in
4346                          * add_or_replace_bss_to_network
4347                          */
4348                         SUPPLICANT_DBG("Failed to add bss %s to network table",
4349                                        new_bss->path);
4350                         g_free(new_bss->path);
4351                         g_free(new_bss);
4352                 }
4353
4354                 return;
4355         }
4356
4357         old_wps_capabilities = network->wps_capabilities;
4358
4359         if (old_wps_capabilities != bss->wps_capabilities) {
4360                 network->wps_capabilities = bss->wps_capabilities;
4361                 callback_network_changed(network, "WPSCapabilities");
4362         }
4363
4364 #if defined TIZEN_EXT
4365         if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
4366                 network->wps = TRUE;
4367                 network->wps_capabilities |= bss->wps_capabilities;
4368         } else
4369                 network->wps = FALSE;
4370 #endif
4371
4372         /* Consider only property changes of the connected BSS */
4373         if (network == interface->current_network && bss != network->best_bss)
4374                 return;
4375
4376         if (bss->signal == network->signal)
4377 #ifndef TIZEN_EXT
4378                 return;
4379 #else
4380         {
4381                 callback_network_changed(network, "");
4382                 return;
4383         }
4384 #endif
4385
4386         /*
4387          * If the new signal is lower than the SSID signal, we need
4388          * to check for the new maximum.
4389          */
4390 #if defined TIZEN_EXT
4391         if (!update_best_bss(network, bss, network->best_bss)) {
4392                 if (bss != network->best_bss) {
4393                         callback_network_changed(network, "");
4394                         return;
4395                 }
4396
4397                 network->signal = bss->signal;
4398                 update_network_signal(network);
4399         }
4400 #else
4401         if (bss->signal < network->signal) {
4402                 if (bss != network->best_bss)
4403                         return;
4404
4405                 network->signal = bss->signal;
4406                 update_network_signal(network);
4407         } else {
4408                 network->signal = bss->signal;
4409                 network->best_bss = bss;
4410         }
4411 #endif
4412
4413         SUPPLICANT_DBG("New network signal for %s %d dBm", network->ssid,
4414                         network->signal);
4415
4416         callback_network_changed(network, "Signal");
4417 }
4418
4419 static void wps_credentials(const char *key, DBusMessageIter *iter,
4420                         void *user_data)
4421 {
4422         GSupplicantInterface *interface = user_data;
4423
4424         if (!key)
4425                 return;
4426
4427         SUPPLICANT_DBG("key %s", key);
4428
4429         if (g_strcmp0(key, "Key") == 0) {
4430                 DBusMessageIter array;
4431                 unsigned char *key_val;
4432                 int key_len;
4433
4434                 dbus_message_iter_recurse(iter, &array);
4435                 dbus_message_iter_get_fixed_array(&array, &key_val, &key_len);
4436
4437                 g_free(interface->wps_cred.key);
4438                 interface->wps_cred.key = g_try_malloc0(
4439                                                 sizeof(char) * key_len + 1);
4440
4441                 if (!interface->wps_cred.key)
4442                         return;
4443
4444                 memcpy(interface->wps_cred.key, key_val,
4445                                                 sizeof(char) * key_len);
4446
4447                 SUPPLICANT_DBG("WPS key present");
4448         } else if (g_strcmp0(key, "SSID") == 0) {
4449                 DBusMessageIter array;
4450                 unsigned char *ssid;
4451                 int ssid_len;
4452
4453                 dbus_message_iter_recurse(iter, &array);
4454                 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
4455
4456                 if (ssid_len > 0 && ssid_len < 33) {
4457                         memcpy(interface->wps_cred.ssid, ssid, ssid_len);
4458                         interface->wps_cred.ssid_len = ssid_len;
4459                 } else {
4460                         memset(interface->wps_cred.ssid, 0, 32);
4461                         interface->wps_cred.ssid_len = 0;
4462                 }
4463         }
4464 }
4465
4466 static void signal_wps_credentials(const char *path, DBusMessageIter *iter)
4467 {
4468         GSupplicantInterface *interface;
4469
4470         SUPPLICANT_DBG("");
4471
4472         interface = g_hash_table_lookup(interface_table, path);
4473         if (!interface)
4474                 return;
4475
4476         supplicant_dbus_property_foreach(iter, wps_credentials, interface);
4477 }
4478
4479 static void wps_event_args(const char *key, DBusMessageIter *iter,
4480                         void *user_data)
4481 {
4482         GSupplicantInterface *interface = user_data;
4483
4484         if (!key || !interface)
4485                 return;
4486
4487         SUPPLICANT_DBG("Arg Key %s", key);
4488 }
4489
4490 static void signal_wps_event(const char *path, DBusMessageIter *iter)
4491 {
4492         GSupplicantInterface *interface;
4493         const char *name = NULL;
4494
4495         SUPPLICANT_DBG("");
4496
4497         interface = g_hash_table_lookup(interface_table, path);
4498         if (!interface)
4499                 return;
4500
4501         dbus_message_iter_get_basic(iter, &name);
4502
4503         SUPPLICANT_DBG("Name: %s", name);
4504
4505         if (g_strcmp0(name, "success") == 0)
4506                 interface->wps_state = G_SUPPLICANT_WPS_STATE_SUCCESS;
4507         else if (g_strcmp0(name, "fail") == 0)
4508                 interface->wps_state = G_SUPPLICANT_WPS_STATE_FAIL;
4509         else
4510                 interface->wps_state = G_SUPPLICANT_WPS_STATE_UNKNOWN;
4511
4512         if (!dbus_message_iter_has_next(iter))
4513                 return;
4514
4515         dbus_message_iter_next(iter);
4516
4517         supplicant_dbus_property_foreach(iter, wps_event_args, interface);
4518 }
4519
4520 #if defined TIZEN_EXT
4521 static void signal_power_off(const char *path, DBusMessageIter *iter)
4522 {
4523         int poweroff_state = 0;
4524
4525         dbus_message_iter_get_basic(iter, &poweroff_state);
4526
4527         SUPPLICANT_DBG("poweroff_state(%d)", poweroff_state);
4528
4529         /* POWER_OFF_DIRECT 2 && POWER_OFF_RESTART 3 */
4530         if (poweroff_state != 2 && poweroff_state != 3)
4531                 return;
4532
4533         if (callbacks_pointer == NULL)
4534                 return;
4535
4536         if (callbacks_pointer->system_power_off == NULL)
4537                 return;
4538
4539         callbacks_pointer->system_power_off();
4540 }
4541 #endif
4542
4543 static void create_peer_identifier(GSupplicantPeer *peer)
4544 {
4545         const unsigned char test[ETH_ALEN] = {};
4546
4547         if (!peer)
4548                 return;
4549
4550         if (!memcmp(peer->device_address, test, ETH_ALEN)) {
4551                 peer->identifier = g_strdup(peer->name);
4552                 return;
4553         }
4554
4555         peer->identifier = g_malloc0(19);
4556         snprintf(peer->identifier, 19, "%02x%02x%02x%02x%02x%02x",
4557                                                 peer->device_address[0],
4558                                                 peer->device_address[1],
4559                                                 peer->device_address[2],
4560                                                 peer->device_address[3],
4561                                                 peer->device_address[4],
4562                                                 peer->device_address[5]);
4563 }
4564
4565 struct peer_property_data {
4566         GSupplicantPeer *peer;
4567         GSList *old_groups;
4568         bool groups_changed;
4569         bool services_changed;
4570 };
4571
4572 static void peer_groups_relation(DBusMessageIter *iter, void *user_data)
4573 {
4574         struct peer_property_data *data = user_data;
4575         GSupplicantPeer *peer = data->peer;
4576         GSupplicantGroup *group;
4577         const char *str = NULL;
4578         GSList *elem;
4579
4580         dbus_message_iter_get_basic(iter, &str);
4581         if (!str)
4582                 return;
4583
4584         group = g_hash_table_lookup(group_mapping, str);
4585         if (!group)
4586                 return;
4587
4588         elem = g_slist_find_custom(data->old_groups, str, (GCompareFunc)g_strcmp0);
4589         if (elem) {
4590                 data->old_groups = g_slist_remove_link(data->old_groups, elem);
4591                 peer->groups = g_slist_concat(elem, peer->groups);
4592         } else {
4593                 peer->groups = g_slist_prepend(peer->groups, g_strdup(str));
4594                 data->groups_changed = true;
4595         }
4596 }
4597
4598 static void peer_property(const char *key, DBusMessageIter *iter,
4599                                                         void *user_data)
4600 {
4601         GSupplicantPeer *pending_peer;
4602         struct peer_property_data *data = user_data;
4603         GSupplicantPeer *peer = data->peer;
4604
4605         SUPPLICANT_DBG("key: %s", key);
4606
4607         if (!peer->interface)
4608                 return;
4609
4610         if (!key) {
4611                 if (peer->name) {
4612                         create_peer_identifier(peer);
4613                         callback_peer_found(peer);
4614                         pending_peer = g_hash_table_lookup(
4615                                         pending_peer_connection, peer->path);
4616
4617                         if (pending_peer && pending_peer == peer) {
4618                                 callback_peer_request(peer);
4619                                 g_hash_table_remove(pending_peer_connection,
4620                                                 peer->path);
4621                         }
4622
4623                         dbus_free(data);
4624                 }
4625
4626                 return;
4627         }
4628
4629         if (g_strcmp0(key, "DeviceAddress") == 0) {
4630                 unsigned char *dev_addr;
4631                 DBusMessageIter array;
4632                 int len;
4633
4634                 dbus_message_iter_recurse(iter, &array);
4635                 dbus_message_iter_get_fixed_array(&array, &dev_addr, &len);
4636
4637                 if (len == ETH_ALEN)
4638                         memcpy(peer->device_address, dev_addr, len);
4639         } else if (g_strcmp0(key, "DeviceName") == 0) {
4640                 const char *str = NULL;
4641
4642                 dbus_message_iter_get_basic(iter, &str);
4643                 if (str)
4644                         peer->name = g_strdup(str);
4645         } else if (g_strcmp0(key, "config_method") == 0) {
4646                 uint16_t wps_config;
4647
4648                 dbus_message_iter_get_basic(iter, &wps_config);
4649
4650                 if (wps_config & G_SUPPLICANT_WPS_CONFIG_PBC)
4651                         peer->wps_capabilities |= G_SUPPLICANT_WPS_PBC;
4652                 if (wps_config & ~G_SUPPLICANT_WPS_CONFIG_PBC)
4653                         peer->wps_capabilities |= G_SUPPLICANT_WPS_PIN;
4654         } else if (g_strcmp0(key, "Groups") == 0) {
4655                 data->old_groups = peer->groups;
4656                 peer->groups = NULL;
4657
4658                 supplicant_dbus_array_foreach(iter,
4659                                                 peer_groups_relation, data);
4660                 if (g_slist_length(data->old_groups) > 0) {
4661                         g_slist_free_full(data->old_groups, g_free);
4662                         data->groups_changed = true;
4663                 }
4664         } else if (g_strcmp0(key, "IEs") == 0) {
4665                 DBusMessageIter array;
4666                 unsigned char *ie;
4667                 int ie_len;
4668
4669                 dbus_message_iter_recurse(iter, &array);
4670                 dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
4671
4672                 if (!ie || ie_len < 2)
4673                         return;
4674
4675                 if (peer->widi_ies) {
4676                         if (memcmp(peer->widi_ies, ie, ie_len) == 0)
4677                                 return;
4678
4679                         g_free(peer->widi_ies);
4680                         peer->widi_ies_length = 0;
4681                 }
4682
4683                 peer->widi_ies = g_malloc0(ie_len * sizeof(unsigned char));
4684
4685                 memcpy(peer->widi_ies, ie, ie_len);
4686                 peer->widi_ies_length = ie_len;
4687                 data->services_changed = true;
4688         }
4689 }
4690
4691 static void signal_peer_found(const char *path, DBusMessageIter *iter)
4692 {
4693         struct peer_property_data *property_data;
4694         GSupplicantInterface *interface;
4695         const char *obj_path = NULL;
4696         GSupplicantPeer *peer;
4697
4698         SUPPLICANT_DBG("");
4699
4700         interface = g_hash_table_lookup(interface_table, path);
4701         if (!interface)
4702                 return;
4703
4704         dbus_message_iter_get_basic(iter, &obj_path);
4705         if (!obj_path || g_strcmp0(obj_path, "/") == 0)
4706                 return;
4707
4708         peer = g_hash_table_lookup(interface->peer_table, obj_path);
4709         if (peer)
4710                 return;
4711
4712         peer = g_try_new0(GSupplicantPeer, 1);
4713         if (!peer)
4714                 return;
4715
4716         peer->interface = interface;
4717         peer->path = g_strdup(obj_path);
4718         g_hash_table_insert(interface->peer_table, peer->path, peer);
4719         g_hash_table_replace(peer_mapping, peer->path, interface);
4720
4721         property_data = dbus_malloc0(sizeof(struct peer_property_data));
4722         property_data->peer = peer;
4723
4724         dbus_message_iter_next(iter);
4725         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
4726                 supplicant_dbus_property_foreach(iter, peer_property,
4727                                                         property_data);
4728                 peer_property(NULL, NULL, property_data);
4729                 return;
4730         }
4731
4732         supplicant_dbus_property_get_all(obj_path,
4733                                         SUPPLICANT_INTERFACE ".Peer",
4734                                         peer_property, property_data, NULL);
4735 }
4736
4737 static void signal_peer_lost(const char *path, DBusMessageIter *iter)
4738 {
4739         GSupplicantInterface *interface;
4740         const char *obj_path = NULL;
4741         GSupplicantPeer *peer;
4742
4743         SUPPLICANT_DBG("");
4744
4745         interface = g_hash_table_lookup(interface_table, path);
4746         if (!interface)
4747                 return;
4748
4749         dbus_message_iter_get_basic(iter, &obj_path);
4750         if (!obj_path || g_strcmp0(obj_path, "/") == 0)
4751                 return;
4752
4753         peer = g_hash_table_lookup(interface->peer_table, obj_path);
4754         if (!peer)
4755                 return;
4756
4757         g_hash_table_remove(interface->peer_table, obj_path);
4758 }
4759
4760 static void signal_peer_changed(const char *path, DBusMessageIter *iter)
4761 {
4762         struct peer_property_data *property_data;
4763         GSupplicantInterface *interface;
4764         GSupplicantPeer *peer;
4765
4766         SUPPLICANT_DBG("");
4767
4768         interface = g_hash_table_lookup(peer_mapping, path);
4769         if (!interface)
4770                 return;
4771
4772         peer = g_hash_table_lookup(interface->peer_table, path);
4773         if (!peer) {
4774                 g_hash_table_remove(peer_mapping, path);
4775                 return;
4776         }
4777
4778         property_data = dbus_malloc0(sizeof(struct peer_property_data));
4779         property_data->peer = peer;
4780
4781         supplicant_dbus_property_foreach(iter, peer_property, property_data);
4782         if (property_data->services_changed)
4783                 callback_peer_changed(peer,
4784                                         G_SUPPLICANT_PEER_SERVICES_CHANGED);
4785
4786         if (property_data->groups_changed)
4787                 callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_CHANGED);
4788
4789         dbus_free(property_data);
4790
4791         if (!g_supplicant_peer_is_in_a_group(peer))
4792                 peer->connection_requested = false;
4793 }
4794
4795 struct group_sig_data {
4796         const char *peer_obj_path;
4797         unsigned char iface_address[ETH_ALEN];
4798         const char *interface_obj_path;
4799         const char *group_obj_path;
4800         int role;
4801 };
4802
4803 static void group_sig_property(const char *key, DBusMessageIter *iter,
4804                                                         void *user_data)
4805 {
4806         struct group_sig_data *data = user_data;
4807
4808         if (!key)
4809                 return;
4810
4811         if (g_strcmp0(key, "peer_interface_addr") == 0) {
4812                 unsigned char *dev_addr;
4813                 DBusMessageIter array;
4814                 int len;
4815
4816                 dbus_message_iter_recurse(iter, &array);
4817                 dbus_message_iter_get_fixed_array(&array, &dev_addr, &len);
4818
4819                 if (len == ETH_ALEN)
4820                         memcpy(data->iface_address, dev_addr, len);
4821         } else if (g_strcmp0(key, "role") == 0) {
4822                 const char *str = NULL;
4823
4824                 dbus_message_iter_get_basic(iter, &str);
4825                 if (g_strcmp0(str, "GO") == 0)
4826                         data->role = G_SUPPLICANT_GROUP_ROLE_GO;
4827                 else
4828                         data->role = G_SUPPLICANT_GROUP_ROLE_CLIENT;
4829         } else if (g_strcmp0(key, "peer_object") == 0)
4830                 dbus_message_iter_get_basic(iter, &data->peer_obj_path);
4831         else if (g_strcmp0(key, "interface_object") == 0)
4832                 dbus_message_iter_get_basic(iter, &data->interface_obj_path);
4833         else if (g_strcmp0(key, "group_object") == 0)
4834                 dbus_message_iter_get_basic(iter, &data->group_obj_path);
4835
4836 }
4837
4838 static void signal_group_success(const char *path, DBusMessageIter *iter)
4839 {
4840         GSupplicantInterface *interface;
4841         struct group_sig_data data = {};
4842         GSupplicantPeer *peer;
4843
4844         SUPPLICANT_DBG("");
4845
4846         interface = g_hash_table_lookup(interface_table, path);
4847         if (!interface)
4848                 return;
4849
4850         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
4851         if (!data.peer_obj_path)
4852                 return;
4853
4854         peer = g_hash_table_lookup(interface->peer_table, data.peer_obj_path);
4855         if (!peer)
4856                 return;
4857
4858         memcpy(peer->iface_address, data.iface_address, ETH_ALEN);
4859         interface->pending_peer_path = peer->path;
4860 }
4861
4862 static void signal_group_failure(const char *path, DBusMessageIter *iter)
4863 {
4864         GSupplicantInterface *interface;
4865         struct group_sig_data data = {};
4866         GSupplicantPeer *peer;
4867
4868         SUPPLICANT_DBG("");
4869
4870         interface = g_hash_table_lookup(interface_table, path);
4871         if (!interface)
4872                 return;
4873
4874         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
4875         if (!data.peer_obj_path)
4876                 return;
4877
4878         peer = g_hash_table_lookup(interface->peer_table, data.peer_obj_path);
4879         if (!peer)
4880                 return;
4881
4882         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_FAILED);
4883         peer->connection_requested = false;
4884 }
4885
4886 static void signal_group_started(const char *path, DBusMessageIter *iter)
4887 {
4888         GSupplicantInterface *interface, *g_interface;
4889         struct group_sig_data data = {};
4890         GSupplicantGroup *group;
4891         GSupplicantPeer *peer;
4892
4893         SUPPLICANT_DBG("");
4894
4895         interface = g_hash_table_lookup(interface_table, path);
4896         if (!interface)
4897                 return;
4898
4899         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
4900         if (!data.interface_obj_path || !data.group_obj_path)
4901                 return;
4902
4903         peer = g_hash_table_lookup(interface->peer_table,
4904                                                 interface->pending_peer_path);
4905         interface->pending_peer_path = NULL;
4906         if (!peer)
4907                 return;
4908
4909         g_interface = g_hash_table_lookup(interface_table,
4910                                                 data.interface_obj_path);
4911         if (!g_interface)
4912                 return;
4913
4914         group = g_hash_table_lookup(interface->group_table,
4915                                                 data.group_obj_path);
4916         if (group)
4917                 return;
4918
4919         group = g_try_new0(GSupplicantGroup, 1);
4920         if (!group)
4921                 return;
4922
4923         group->interface = g_interface;
4924         group->orig_interface = interface;
4925         group->path = g_strdup(data.group_obj_path);
4926         group->role = data.role;
4927
4928         g_hash_table_insert(interface->group_table, group->path, group);
4929         g_hash_table_replace(group_mapping, group->path, group);
4930
4931         peer->current_group_iface = g_interface;
4932         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_STARTED);
4933 }
4934
4935 static void remove_peer_group_interface(GHashTable *group_table,
4936                                 const char* path)
4937 {
4938         GSupplicantGroup *group;
4939         GHashTableIter iter;
4940         gpointer value, key;
4941
4942         if (!group_table)
4943                 return;
4944
4945         group = g_hash_table_lookup(group_table, path);
4946
4947         if (!group || !group->orig_interface)
4948                 return;
4949
4950         g_hash_table_iter_init(&iter, group->orig_interface->peer_table);
4951
4952         while (g_hash_table_iter_next(&iter, &key, &value)) {
4953                 GSupplicantPeer *peer = value;
4954
4955                 if (peer->current_group_iface == group->interface)
4956                         peer->current_group_iface = NULL;
4957         }
4958 }
4959
4960 static void signal_group_finished(const char *path, DBusMessageIter *iter)
4961 {
4962         GSupplicantInterface *interface;
4963         struct group_sig_data data = {};
4964
4965         SUPPLICANT_DBG("");
4966
4967         interface = g_hash_table_lookup(interface_table, path);
4968         if (!interface)
4969                 return;
4970
4971         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
4972         if (!data.interface_obj_path || !data.group_obj_path)
4973                 return;
4974
4975         remove_peer_group_interface(interface->group_table, data.group_obj_path);
4976
4977         g_hash_table_remove(group_mapping, data.group_obj_path);
4978
4979         g_hash_table_remove(interface->group_table, data.group_obj_path);
4980 }
4981
4982 static void signal_group_request(const char *path, DBusMessageIter *iter)
4983 {
4984         GSupplicantInterface *interface;
4985         GSupplicantPeer *peer;
4986         const char *obj_path;
4987
4988         SUPPLICANT_DBG("");
4989
4990         interface = g_hash_table_lookup(interface_table, path);
4991         if (!interface)
4992                 return;
4993
4994         dbus_message_iter_get_basic(iter, &obj_path);
4995         if (!obj_path || !g_strcmp0(obj_path, "/"))
4996                 return;
4997
4998         peer = g_hash_table_lookup(interface->peer_table, obj_path);
4999         if (!peer)
5000                 return;
5001
5002         /*
5003          * Peer has been previously found and property set,
5004          * otherwise, defer connection to when peer property
5005          * is set.
5006          */
5007         if (peer->identifier)
5008                 callback_peer_request(peer);
5009         else
5010                 g_hash_table_replace(pending_peer_connection, peer->path, peer);
5011 }
5012
5013 static void signal_group_peer_joined(const char *path, DBusMessageIter *iter)
5014 {
5015         const char *peer_path = NULL;
5016         GSupplicantInterface *interface;
5017         GSupplicantGroup *group;
5018         GSupplicantPeer *peer;
5019
5020         SUPPLICANT_DBG("");
5021
5022         group = g_hash_table_lookup(group_mapping, path);
5023         if (!group)
5024                 return;
5025
5026         dbus_message_iter_get_basic(iter, &peer_path);
5027         if (!peer_path)
5028                 return;
5029
5030         interface = g_hash_table_lookup(peer_mapping, peer_path);
5031         if (!interface)
5032                 return;
5033
5034         peer = g_hash_table_lookup(interface->peer_table, peer_path);
5035         if (!peer)
5036                 return;
5037
5038         group->members = g_slist_prepend(group->members, g_strdup(peer_path));
5039
5040         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_JOINED);
5041 }
5042
5043 static void signal_group_peer_disconnected(const char *path, DBusMessageIter *iter)
5044 {
5045         const char *peer_path = NULL;
5046         GSupplicantInterface *interface;
5047         GSupplicantGroup *group;
5048         GSupplicantPeer *peer;
5049         GSList *elem;
5050
5051         SUPPLICANT_DBG("");
5052
5053         group = g_hash_table_lookup(group_mapping, path);
5054         if (!group)
5055                 return;
5056
5057         dbus_message_iter_get_basic(iter, &peer_path);
5058         if (!peer_path)
5059                 return;
5060
5061         for (elem = group->members; elem; elem = elem->next) {
5062                 if (!g_strcmp0(elem->data, peer_path))
5063                         break;
5064         }
5065
5066         if (!elem)
5067                 return;
5068
5069         g_free(elem->data);
5070         group->members = g_slist_delete_link(group->members, elem);
5071
5072         interface = g_hash_table_lookup(peer_mapping, peer_path);
5073         if (!interface)
5074                 return;
5075
5076         peer = g_hash_table_lookup(interface->peer_table, peer_path);
5077         if (!peer)
5078                 return;
5079
5080         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_DISCONNECTED);
5081         peer->connection_requested = false;
5082 }
5083
5084 #if defined TIZEN_EXT_WIFI_MESH
5085 const void *g_supplicant_interface_get_mesh_group_ssid(
5086                                                         GSupplicantInterface *interface,
5087                                                         unsigned int *ssid_len)
5088 {
5089         if (!ssid_len)
5090                 return NULL;
5091
5092         if (!interface || interface->group_info.ssid_len == 0) {
5093                 *ssid_len = 0;
5094                 return NULL;
5095         }
5096
5097         *ssid_len = interface->group_info.ssid_len;
5098         return interface->group_info.ssid;
5099 }
5100
5101 int g_supplicant_mesh_get_disconnect_reason(GSupplicantInterface *interface)
5102 {
5103         if (!interface)
5104                 return -EINVAL;
5105
5106         return interface->group_info.disconnect_reason;
5107 }
5108
5109 const char *g_supplicant_mesh_peer_get_address(GSupplicantMeshPeer *mesh_peer)
5110 {
5111         if (!mesh_peer || !mesh_peer->peer_address)
5112                 return NULL;
5113
5114         return mesh_peer->peer_address;
5115 }
5116
5117 int g_supplicant_mesh_peer_get_disconnect_reason(GSupplicantMeshPeer *mesh_peer)
5118 {
5119         if (!mesh_peer)
5120                 return -EINVAL;
5121
5122         return mesh_peer->disconnect_reason;
5123 }
5124
5125 static void callback_mesh_group_started(GSupplicantInterface *interface)
5126 {
5127         if (!callbacks_pointer)
5128                 return;
5129
5130         if (!callbacks_pointer->mesh_group_started)
5131                 return;
5132
5133         callbacks_pointer->mesh_group_started(interface);
5134 }
5135
5136 static void callback_mesh_group_removed(GSupplicantInterface *interface)
5137 {
5138         if (!callbacks_pointer)
5139                 return;
5140
5141         if (!callbacks_pointer->mesh_group_removed)
5142                 return;
5143
5144         callbacks_pointer->mesh_group_removed(interface);
5145 }
5146
5147 static void mesh_group_info(const char *key, DBusMessageIter *iter,
5148                                                         void *user_data)
5149 {
5150         GSupplicantInterface *interface = user_data;
5151         if (!key)
5152                 return;
5153
5154         if (g_strcmp0(key, "SSID") == 0) {
5155                 DBusMessageIter array;
5156                 unsigned char *ssid;
5157                 int ssid_len;
5158
5159                 dbus_message_iter_recurse(iter, &array);
5160                 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
5161
5162                 if (ssid_len > 0 && ssid_len < 33) {
5163                         memcpy(interface->group_info.ssid, ssid, ssid_len);
5164                         interface->group_info.ssid_len = ssid_len;
5165                 } else {
5166                         memset(interface->group_info.ssid, 0, 32);
5167                         interface->group_info.ssid_len = 0;
5168                 }
5169         } else if (g_strcmp0(key, "DisconnectReason") == 0) {
5170                 int disconnect_reason = 0;
5171                 dbus_message_iter_get_basic(iter, &disconnect_reason);
5172                 interface->group_info.disconnect_reason = disconnect_reason;
5173         }
5174 }
5175
5176 static void signal_mesh_group_started(const char *path, DBusMessageIter *iter)
5177 {
5178         GSupplicantInterface *interface;
5179
5180         interface = g_hash_table_lookup(interface_table, path);
5181         if (!interface)
5182                 return;
5183
5184         supplicant_dbus_property_foreach(iter, mesh_group_info, interface);
5185
5186         callback_mesh_group_started(interface);
5187 }
5188
5189 static void signal_mesh_group_removed(const char *path, DBusMessageIter *iter)
5190 {
5191         GSupplicantInterface *interface;
5192
5193         interface = g_hash_table_lookup(interface_table, path);
5194         if (!interface)
5195                 return;
5196
5197         supplicant_dbus_property_foreach(iter, mesh_group_info, interface);
5198
5199         callback_mesh_group_removed(interface);
5200 }
5201
5202 static void callback_mesh_peer_connected(GSupplicantMeshPeer *mesh_peer)
5203 {
5204         if (!callbacks_pointer)
5205                 return;
5206
5207         if (!callbacks_pointer->mesh_peer_connected)
5208                 return;
5209
5210         callbacks_pointer->mesh_peer_connected(mesh_peer);
5211 }
5212
5213 static void callback_mesh_peer_disconnected(GSupplicantMeshPeer *mesh_peer)
5214 {
5215         if (!callbacks_pointer)
5216                 return;
5217
5218         if (!callbacks_pointer->mesh_peer_disconnected)
5219                 return;
5220
5221         callbacks_pointer->mesh_peer_disconnected(mesh_peer);
5222 }
5223
5224 static void mesh_peer_info(const char *key, DBusMessageIter *iter,
5225                                                         void *user_data)
5226 {
5227         GSupplicantMeshPeer *mesh_peer = user_data;
5228         if (!key)
5229                 return;
5230
5231         if (g_strcmp0(key, "PeerAddress") == 0) {
5232                 DBusMessageIter array;
5233                 unsigned char *addr;
5234                 int addr_len;
5235
5236                 dbus_message_iter_recurse(iter, &array);
5237                 dbus_message_iter_get_fixed_array(&array, &addr, &addr_len);
5238
5239                 if (addr_len == 6) {
5240                         mesh_peer->peer_address = g_malloc0(19);
5241                         snprintf(mesh_peer->peer_address, 19,
5242                                          "%02x:%02x:%02x:%02x:%02x:%02x", addr[0], addr[1],
5243                                          addr[2], addr[3], addr[4], addr[5]);
5244                 }
5245         } else if (g_strcmp0(key, "DisconnectReason") == 0) {
5246                 int disconnect_reason = 0;
5247                 dbus_message_iter_get_basic(iter, &disconnect_reason);
5248                 mesh_peer->disconnect_reason = disconnect_reason;
5249         }
5250 }
5251
5252 static void signal_mesh_peer_connected(const char *path, DBusMessageIter *iter)
5253 {
5254         GSupplicantInterface *interface;
5255         GSupplicantMeshPeer *mesh_peer;
5256
5257         interface = g_hash_table_lookup(interface_table, path);
5258         if (!interface)
5259                 return;
5260
5261         mesh_peer = dbus_malloc0(sizeof(GSupplicantMeshPeer));
5262         mesh_peer->interface = interface;
5263
5264         supplicant_dbus_property_foreach(iter, mesh_peer_info, mesh_peer);
5265
5266         callback_mesh_peer_connected(mesh_peer);
5267         g_free(mesh_peer->peer_address);
5268         g_free(mesh_peer);
5269 }
5270
5271 static void signal_mesh_peer_disconnected(const char *path,
5272                                                                 DBusMessageIter *iter)
5273 {
5274         GSupplicantInterface *interface;
5275         GSupplicantMeshPeer *mesh_peer;
5276
5277         interface = g_hash_table_lookup(interface_table, path);
5278         if (!interface)
5279                 return;
5280
5281         mesh_peer = dbus_malloc0(sizeof(GSupplicantMeshPeer));
5282         mesh_peer->interface = interface;
5283
5284         supplicant_dbus_property_foreach(iter, mesh_peer_info, mesh_peer);
5285
5286         callback_mesh_peer_disconnected(mesh_peer);
5287         g_free(mesh_peer->peer_address);
5288         g_free(mesh_peer);
5289 }
5290 #endif
5291
5292 static struct {
5293         const char *interface;
5294         const char *member;
5295         void (*function) (const char *path, DBusMessageIter *iter);
5296 } signal_map[] = {
5297         { DBUS_INTERFACE_DBUS,  "NameOwnerChanged",  signal_name_owner_changed },
5298
5299         { SUPPLICANT_INTERFACE, "PropertiesChanged", signal_properties_changed },
5300         { SUPPLICANT_INTERFACE, "InterfaceAdded",    signal_interface_added    },
5301         { SUPPLICANT_INTERFACE, "InterfaceCreated",  signal_interface_added    },
5302         { SUPPLICANT_INTERFACE, "InterfaceRemoved",  signal_interface_removed  },
5303
5304         { SUPPLICANT_INTERFACE ".Interface", "PropertiesChanged", signal_interface_changed },
5305         { SUPPLICANT_INTERFACE ".Interface", "ScanDone",          signal_scan_done         },
5306         { SUPPLICANT_INTERFACE ".Interface", "BSSAdded",          signal_bss_added         },
5307         { SUPPLICANT_INTERFACE ".Interface", "BSSRemoved",        signal_bss_removed       },
5308         { SUPPLICANT_INTERFACE ".Interface", "NetworkAdded",      signal_network_added     },
5309         { SUPPLICANT_INTERFACE ".Interface", "NetworkRemoved",    signal_network_removed   },
5310         { SUPPLICANT_INTERFACE ".Interface", "StaAuthorized",     signal_sta_authorized    },
5311         { SUPPLICANT_INTERFACE ".Interface", "StaDeauthorized",   signal_sta_deauthorized  },
5312
5313         { SUPPLICANT_INTERFACE ".BSS", "PropertiesChanged", signal_bss_changed   },
5314
5315         { SUPPLICANT_INTERFACE ".Interface.WPS", "Credentials", signal_wps_credentials },
5316         { SUPPLICANT_INTERFACE ".Interface.WPS", "Event",       signal_wps_event       },
5317 #if defined TIZEN_EXT
5318         { "org.tizen.system.deviced.PowerOff", "ChangeState", signal_power_off },
5319 #endif
5320
5321         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeviceFound", signal_peer_found },
5322         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeviceLost",  signal_peer_lost  },
5323
5324         { SUPPLICANT_INTERFACE ".Peer", "PropertiesChanged", signal_peer_changed },
5325
5326         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationSuccess", signal_group_success },
5327         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationFailure", signal_group_failure },
5328         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GroupStarted", signal_group_started },
5329         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GroupFinished", signal_group_finished },
5330         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationRequest", signal_group_request },
5331
5332         { SUPPLICANT_INTERFACE ".Group", "PeerJoined", signal_group_peer_joined },
5333         { SUPPLICANT_INTERFACE ".Group", "PeerDisconnected", signal_group_peer_disconnected },
5334 #if defined TIZEN_EXT_WIFI_MESH
5335         { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshGroupStarted",
5336                 signal_mesh_group_started },
5337         { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshGroupRemoved",
5338                 signal_mesh_group_removed },
5339         { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshPeerConnected",
5340                 signal_mesh_peer_connected },
5341         { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshPeerDisconnected",
5342                 signal_mesh_peer_disconnected },
5343 #endif
5344
5345 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
5346         { SUPPLICANT_INTERFACE ".Interface", "EAP", signal_eap },
5347 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
5348
5349         { }
5350 };
5351
5352 static DBusHandlerResult g_supplicant_filter(DBusConnection *conn,
5353                                         DBusMessage *message, void *data)
5354 {
5355         DBusMessageIter iter;
5356         const char *path;
5357         int i;
5358
5359         path = dbus_message_get_path(message);
5360         if (!path)
5361                 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
5362
5363         if (!dbus_message_iter_init(message, &iter))
5364                 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
5365
5366         for (i = 0; signal_map[i].interface; i++) {
5367                 if (!dbus_message_has_interface(message, signal_map[i].interface))
5368                         continue;
5369
5370                 if (!dbus_message_has_member(message, signal_map[i].member))
5371                         continue;
5372
5373                 signal_map[i].function(path, &iter);
5374                 break;
5375         }
5376
5377         return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
5378 }
5379
5380 void g_supplicant_interface_cancel(GSupplicantInterface *interface)
5381 {
5382         SUPPLICANT_DBG("Cancelling any pending DBus calls");
5383         supplicant_dbus_method_call_cancel_all(interface);
5384         supplicant_dbus_property_call_cancel_all(interface);
5385 }
5386
5387 struct supplicant_regdom {
5388         GSupplicantCountryCallback callback;
5389         const char *alpha2;
5390         const void *user_data;
5391 };
5392
5393 static void country_result(const char *error,
5394                                 DBusMessageIter *iter, void *user_data)
5395 {
5396         struct supplicant_regdom *regdom = user_data;
5397         int result = 0;
5398
5399         SUPPLICANT_DBG("Country setting result");
5400
5401         if (!user_data)
5402                 return;
5403
5404         if (error) {
5405                 SUPPLICANT_DBG("Country setting failure %s", error);
5406                 result = -EINVAL;
5407         }
5408
5409         if (regdom->callback)
5410                 regdom->callback(result, regdom->alpha2,
5411                                         (void *) regdom->user_data);
5412
5413         dbus_free(regdom);
5414 }
5415
5416 static void country_params(DBusMessageIter *iter, void *user_data)
5417 {
5418         struct supplicant_regdom *regdom = user_data;
5419
5420         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING,
5421                                                         &regdom->alpha2);
5422 }
5423
5424 int g_supplicant_set_country(const char *alpha2,
5425                                 GSupplicantCountryCallback callback,
5426                                         const void *user_data)
5427 {
5428         struct supplicant_regdom *regdom;
5429         int ret;
5430
5431         SUPPLICANT_DBG("Country setting %s", alpha2);
5432
5433         if (!system_available)
5434                 return -EFAULT;
5435
5436         regdom = dbus_malloc0(sizeof(*regdom));
5437         if (!regdom)
5438                 return -ENOMEM;
5439
5440         regdom->callback = callback;
5441         regdom->alpha2 = alpha2;
5442         regdom->user_data = user_data;
5443
5444         ret =  supplicant_dbus_property_set(SUPPLICANT_PATH, SUPPLICANT_INTERFACE,
5445                                         "Country", DBUS_TYPE_STRING_AS_STRING,
5446                                         country_params, country_result,
5447                                         regdom, NULL);
5448         if (ret < 0) {
5449                 dbus_free(regdom);
5450                 SUPPLICANT_DBG("Unable to set Country configuration");
5451         }
5452         return ret;
5453 }
5454
5455 int g_supplicant_interface_set_country(GSupplicantInterface *interface,
5456                                         GSupplicantCountryCallback callback,
5457                                                         const char *alpha2,
5458                                                         void *user_data)
5459 {
5460         struct supplicant_regdom *regdom;
5461         int ret;
5462
5463         regdom = dbus_malloc0(sizeof(*regdom));
5464         if (!regdom)
5465                 return -ENOMEM;
5466
5467         regdom->callback = callback;
5468         regdom->alpha2 = alpha2;
5469         regdom->user_data = user_data;
5470
5471         ret =  supplicant_dbus_property_set(interface->path,
5472                                 SUPPLICANT_INTERFACE ".Interface",
5473                                 "Country", DBUS_TYPE_STRING_AS_STRING,
5474                                 country_params, country_result,
5475                                         regdom, NULL);
5476         if (ret < 0) {
5477                 dbus_free(regdom);
5478                 SUPPLICANT_DBG("Unable to set Country configuration");
5479         }
5480
5481         return ret;
5482 }
5483
5484 bool g_supplicant_interface_has_p2p(GSupplicantInterface *interface)
5485 {
5486         if (!interface)
5487                 return false;
5488
5489         return interface->p2p_support;
5490 }
5491
5492 struct supplicant_p2p_dev_config {
5493         char *device_name;
5494         char *dev_type;
5495 };
5496
5497 static void p2p_device_config_result(const char *error,
5498                                         DBusMessageIter *iter, void *user_data)
5499 {
5500         struct supplicant_p2p_dev_config *config = user_data;
5501
5502         if (error)
5503                 SUPPLICANT_DBG("Unable to set P2P Device configuration: %s",
5504                                                                         error);
5505
5506         g_free(config->device_name);
5507         g_free(config->dev_type);
5508         dbus_free(config);
5509 }
5510
5511 static int dev_type_str2bin(const char *type, unsigned char dev_type[8])
5512 {
5513         int length, pos, end;
5514         char b[3] = {};
5515         char *e = NULL;
5516
5517         end = strlen(type);
5518         for (length = pos = 0; type[pos] != '\0' && length < 8; length++) {
5519                 if (pos+2 > end)
5520                         return 0;
5521
5522                 b[0] = type[pos];
5523                 b[1] = type[pos+1];
5524
5525                 dev_type[length] = strtol(b, &e, 16);
5526                 if (e && *e != '\0')
5527                         return 0;
5528
5529                 pos += 2;
5530         }
5531
5532         return 8;
5533 }
5534
5535 static void p2p_device_config_params(DBusMessageIter *iter, void *user_data)
5536 {
5537         struct supplicant_p2p_dev_config *config = user_data;
5538         DBusMessageIter dict;
5539
5540         supplicant_dbus_dict_open(iter, &dict);
5541
5542         supplicant_dbus_dict_append_basic(&dict, "DeviceName",
5543                                 DBUS_TYPE_STRING, &config->device_name);
5544
5545         if (config->dev_type) {
5546                 unsigned char dev_type[8] = {}, *type;
5547                 int len;
5548
5549                 len = dev_type_str2bin(config->dev_type, dev_type);
5550                 if (len) {
5551                         type = dev_type;
5552                         supplicant_dbus_dict_append_fixed_array(&dict,
5553                                         "PrimaryDeviceType",
5554                                         DBUS_TYPE_BYTE, &type, len);
5555                 }
5556         }
5557
5558         supplicant_dbus_dict_close(iter, &dict);
5559 }
5560
5561 int g_supplicant_interface_set_p2p_device_config(GSupplicantInterface *interface,
5562                                         const char *device_name,
5563                                         const char *primary_dev_type)
5564 {
5565         struct supplicant_p2p_dev_config *config;
5566         int ret;
5567
5568         SUPPLICANT_DBG("P2P Device settings %s/%s",
5569                                         device_name, primary_dev_type);
5570
5571         config = dbus_malloc0(sizeof(*config));
5572         if (!config)
5573                 return -ENOMEM;
5574
5575         config->device_name = g_strdup(device_name);
5576         config->dev_type = g_strdup(primary_dev_type);
5577
5578         ret = supplicant_dbus_property_set(interface->path,
5579                                 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
5580                                 "P2PDeviceConfig",
5581                                 DBUS_TYPE_ARRAY_AS_STRING
5582                                 DBUS_DICT_ENTRY_BEGIN_CHAR_AS_STRING
5583                                 DBUS_TYPE_STRING_AS_STRING
5584                                 DBUS_TYPE_VARIANT_AS_STRING
5585                                 DBUS_DICT_ENTRY_END_CHAR_AS_STRING,
5586                                 p2p_device_config_params,
5587                                 p2p_device_config_result, config, NULL);
5588         if (ret < 0) {
5589                 g_free(config->device_name);
5590                 g_free(config->dev_type);
5591                 dbus_free(config);
5592                 SUPPLICANT_DBG("Unable to set P2P Device configuration");
5593         }
5594
5595         return ret;
5596 }
5597
5598 static gboolean peer_lookup_by_identifier(gpointer key, gpointer value,
5599                                                         gpointer user_data)
5600 {
5601         const GSupplicantPeer *peer = value;
5602         const char *identifier = user_data;
5603
5604         if (!g_strcmp0(identifier, peer->identifier))
5605                 return TRUE;
5606
5607         return FALSE;
5608 }
5609
5610 GSupplicantPeer *g_supplicant_interface_peer_lookup(GSupplicantInterface *interface,
5611                                                         const char *identifier)
5612 {
5613         GSupplicantPeer *peer;
5614
5615         peer = g_hash_table_find(interface->peer_table,
5616                                         peer_lookup_by_identifier,
5617                                         (void *) identifier);
5618         return peer;
5619 }
5620
5621 static void interface_create_data_free(struct interface_create_data *data)
5622 {
5623         g_free(data->ifname);
5624         g_free(data->driver);
5625         g_free(data->bridge);
5626 #if defined TIZEN_EXT_WIFI_MESH
5627         g_free(data->parent_ifname);
5628 #endif
5629         dbus_free(data);
5630 }
5631
5632 static bool interface_exists(GSupplicantInterface *interface,
5633                                 const char *path)
5634 {
5635         GSupplicantInterface *tmp;
5636
5637         tmp = g_hash_table_lookup(interface_table, path);
5638         if (tmp && tmp == interface)
5639                 return true;
5640
5641         return false;
5642 }
5643
5644 static void interface_create_property(const char *key, DBusMessageIter *iter,
5645                                                         void *user_data)
5646 {
5647         struct interface_create_data *data = user_data;
5648         GSupplicantInterface *interface = data->interface;
5649
5650         if (!key) {
5651                 if (data->callback) {
5652                         data->callback(0, data->interface, data->user_data);
5653 #if !defined TIZEN_EXT
5654                         callback_p2p_support(interface);
5655 #endif
5656 #if defined TIZEN_EXT_WIFI_MESH
5657                         callback_mesh_support(interface);
5658 #endif
5659                 }
5660
5661                 interface_create_data_free(data);
5662         }
5663
5664         interface_property(key, iter, interface);
5665 }
5666
5667 static void interface_create_result(const char *error,
5668                                 DBusMessageIter *iter, void *user_data)
5669 {
5670         struct interface_create_data *data = user_data;
5671         const char *path = NULL;
5672         int err;
5673
5674         SUPPLICANT_DBG("");
5675
5676         if (error) {
5677                 g_message("error %s", error);
5678                 err = -EIO;
5679                 goto done;
5680         }
5681
5682         dbus_message_iter_get_basic(iter, &path);
5683         if (!path) {
5684                 err = -EINVAL;
5685                 goto done;
5686         }
5687
5688         if (!system_available) {
5689                 err = -EFAULT;
5690                 goto done;
5691         }
5692
5693         data->interface = g_hash_table_lookup(interface_table, path);
5694         if (!data->interface) {
5695                 data->interface = interface_alloc(path);
5696                 if (!data->interface) {
5697                         err = -ENOMEM;
5698                         goto done;
5699                 }
5700         }
5701
5702         err = supplicant_dbus_property_get_all(path,
5703                                         SUPPLICANT_INTERFACE ".Interface",
5704                                         interface_create_property, data,
5705                                         NULL);
5706         if (err == 0)
5707                 return;
5708
5709 done:
5710         if (data->callback)
5711                 data->callback(err, NULL, data->user_data);
5712
5713         interface_create_data_free(data);
5714 }
5715
5716 static void interface_create_params(DBusMessageIter *iter, void *user_data)
5717 {
5718         struct interface_create_data *data = user_data;
5719         DBusMessageIter dict;
5720         char *config_file = NULL;
5721
5722         SUPPLICANT_DBG("");
5723
5724         supplicant_dbus_dict_open(iter, &dict);
5725
5726         supplicant_dbus_dict_append_basic(&dict, "Ifname",
5727                                         DBUS_TYPE_STRING, &data->ifname);
5728
5729         if (data->driver)
5730                 supplicant_dbus_dict_append_basic(&dict, "Driver",
5731                                         DBUS_TYPE_STRING, &data->driver);
5732
5733         if (data->bridge)
5734                 supplicant_dbus_dict_append_basic(&dict, "BridgeIfname",
5735                                         DBUS_TYPE_STRING, &data->bridge);
5736
5737         config_file = g_hash_table_lookup(config_file_table, data->ifname);
5738         if (config_file) {
5739                 SUPPLICANT_DBG("[%s] ConfigFile %s", data->ifname, config_file);
5740
5741                 supplicant_dbus_dict_append_basic(&dict, "ConfigFile",
5742                                         DBUS_TYPE_STRING, &config_file);
5743         }
5744
5745 #ifdef TIZEN_EXT
5746         if (data->driver && g_strstr_len(data->driver, strlen(data->driver), "nl80211")) {
5747                 supplicant_dbus_dict_append_basic(&dict, "MacAddr",
5748                                 DBUS_TYPE_UINT32, &data->mac_addr);
5749
5750                 supplicant_dbus_dict_append_basic(&dict, "PreassocMacAddr",
5751                                 DBUS_TYPE_UINT32, &data->preassoc_mac_addr);
5752
5753                 supplicant_dbus_dict_append_basic(&dict, "RandAddrLifetime",
5754                                 DBUS_TYPE_UINT32, &data->random_mac_lifetime);
5755         }
5756 #endif /* TIZEN_EXT */
5757
5758 #if defined TIZEN_EXT_WIFI_MESH
5759         if (data->is_mesh_interface) {
5760                 if (data->parent_ifname)
5761                         supplicant_dbus_dict_append_basic(&dict, "ParentIfname",
5762                                         DBUS_TYPE_STRING, &data->parent_ifname);
5763
5764                 supplicant_dbus_dict_append_basic(&dict, "IsMeshInterface",
5765                                         DBUS_TYPE_BOOLEAN, &data->is_mesh_interface);
5766         }
5767 #endif
5768
5769         supplicant_dbus_dict_close(iter, &dict);
5770 }
5771
5772 #if defined TIZEN_EXT
5773 static void interface_get_state(const char *key, DBusMessageIter *iter,
5774                 void *user_data)
5775 {
5776         struct interface_create_data *data = user_data;
5777         GSupplicantInterface *interface = NULL;
5778         const char *str = NULL;
5779
5780         SUPPLICANT_DBG("key[%s]", key);
5781
5782         if (!data) {
5783                 SUPPLICANT_DBG("data is NULL");
5784                 return;
5785         }
5786
5787         interface = data->interface;
5788         if (!interface) {
5789                 SUPPLICANT_DBG("interface is NULL");
5790                 return;
5791         }
5792
5793         if (iter)
5794                 dbus_message_iter_get_basic(iter, &str);
5795
5796         if (str) {
5797                 if (string2state(str) != interface->state)
5798                         interface->state = string2state(str);
5799         }
5800
5801         if (interface->state == G_SUPPLICANT_STATE_DISABLED)
5802                 interface->ready = FALSE;
5803         else
5804                 interface->ready = TRUE;
5805
5806         SUPPLICANT_DBG("state %s (%d)", str, interface->state);
5807
5808         if (data->callback) {
5809                 data->callback(0, interface, data->user_data);
5810 #if defined TIZEN_EXT_WIFI_MESH
5811                 callback_mesh_support(interface);
5812 #endif
5813         }
5814
5815         interface_create_data_free(data);
5816 }
5817 #endif
5818
5819 static void interface_get_result(const char *error,
5820                                 DBusMessageIter *iter, void *user_data)
5821 {
5822         struct interface_create_data *data = user_data;
5823         GSupplicantInterface *interface;
5824         const char *path = NULL;
5825         int err;
5826
5827 #if defined TIZEN_EXT
5828         if (!simplified_log)
5829 #endif
5830         SUPPLICANT_DBG("");
5831
5832         if (error) {
5833                 SUPPLICANT_DBG("Interface not created yet");
5834                 goto create;
5835         }
5836
5837         dbus_message_iter_get_basic(iter, &path);
5838         if (!path) {
5839                 err = -EINVAL;
5840                 goto done;
5841         }
5842
5843         interface = g_hash_table_lookup(interface_table, path);
5844         if (!interface) {
5845                 err = -ENOENT;
5846                 goto done;
5847         }
5848
5849 #if defined TIZEN_EXT
5850         data->interface = interface;
5851         err = supplicant_dbus_property_get(path,
5852                         SUPPLICANT_INTERFACE ".Interface",
5853                         "State", interface_get_state, data, NULL);
5854
5855         if (err == 0)
5856                 return;
5857 #endif
5858
5859         if (data->callback) {
5860                 data->callback(0, interface, data->user_data);
5861 #if !defined TIZEN_EXT
5862                 callback_p2p_support(interface);
5863 #endif
5864 #if defined TIZEN_EXT_WIFI_MESH
5865                 callback_mesh_support(interface);
5866 #endif
5867         }
5868
5869         interface_create_data_free(data);
5870
5871         return;
5872
5873 create:
5874         if (!system_available) {
5875                 err = -EFAULT;
5876                 goto done;
5877         }
5878
5879         SUPPLICANT_DBG("Creating interface");
5880
5881         err = supplicant_dbus_method_call(SUPPLICANT_PATH,
5882                                                 SUPPLICANT_INTERFACE,
5883                                                 "CreateInterface",
5884                                                 interface_create_params,
5885                                                 interface_create_result, data,
5886                                                 NULL);
5887         if (err == 0)
5888                 return;
5889
5890 done:
5891         if (data->callback)
5892                 data->callback(err, NULL, data->user_data);
5893
5894         interface_create_data_free(data);
5895 }
5896
5897 static void interface_get_params(DBusMessageIter *iter, void *user_data)
5898 {
5899         struct interface_create_data *data = user_data;
5900 #if defined TIZEN_EXT
5901         if (!simplified_log)
5902 #endif
5903         SUPPLICANT_DBG("");
5904
5905         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, &data->ifname);
5906 }
5907
5908 #if defined TIZEN_EXT_WIFI_MESH
5909 int g_supplicant_mesh_interface_create(const char *ifname, const char *driver,
5910                                                 const char *bridge, const char *parent_ifname,
5911                                                 GSupplicantInterfaceCallback callback, void *user_data)
5912 {
5913         struct interface_create_data *data;
5914         int ret;
5915
5916         SUPPLICANT_DBG("ifname %s", ifname);
5917
5918         if (!ifname || !parent_ifname)
5919                 return -EINVAL;
5920
5921         if (!system_available)
5922                 return -EFAULT;
5923
5924         data = dbus_malloc0(sizeof(*data));
5925         if (!data)
5926                 return -ENOMEM;
5927
5928         data->ifname = g_strdup(ifname);
5929         data->driver = g_strdup(driver);
5930         data->bridge = g_strdup(bridge);
5931         data->is_mesh_interface = true;
5932         data->parent_ifname = g_strdup(parent_ifname);
5933         data->callback = callback;
5934         data->user_data = user_data;
5935
5936         ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
5937                                                 SUPPLICANT_INTERFACE,
5938                                                 "CreateInterface",
5939                                                 interface_create_params,
5940                                                 interface_create_result, data,
5941                                                 NULL);
5942         return ret;
5943 }
5944
5945 struct interface_mesh_peer_data {
5946         char *peer_address;
5947         char *method;
5948         GSupplicantInterface *interface;
5949         GSupplicantInterfaceCallback callback;
5950         void *user_data;
5951 };
5952
5953 static void interface_mesh_change_peer_params(DBusMessageIter *iter,
5954                                                 void *user_data)
5955 {
5956         struct interface_mesh_peer_data *data = user_data;
5957
5958         SUPPLICANT_DBG("");
5959
5960         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, &data->peer_address);
5961 }
5962
5963 static void interface_mesh_change_peer_result(const char *error,
5964                                 DBusMessageIter *iter, void *user_data)
5965 {
5966         struct interface_mesh_peer_data *data = user_data;
5967         int err = 0;
5968
5969         SUPPLICANT_DBG("%s", data->method);
5970
5971         if (error) {
5972                 err = -EIO;
5973                 SUPPLICANT_DBG("error %s", error);
5974         }
5975
5976         if (data->callback)
5977                 data->callback(err, data->interface, data->user_data);
5978
5979         g_free(data->peer_address);
5980         g_free(data->method);
5981         dbus_free(data);
5982 }
5983
5984 int g_supplicant_interface_mesh_peer_change_status(
5985                                 GSupplicantInterface *interface,
5986                                 GSupplicantInterfaceCallback callback, const char *peer_address,
5987                                 const char *method, void *user_data)
5988 {
5989         struct interface_mesh_peer_data *data;
5990         int ret;
5991
5992         if (!peer_address)
5993                 return -EINVAL;
5994
5995         data = dbus_malloc0(sizeof(*data));
5996         if (!data)
5997                 return -ENOMEM;
5998
5999         data->peer_address = g_strdup(peer_address);
6000         data->method = g_strdup(method);
6001         data->interface = interface;
6002         data->callback = callback;
6003         data->user_data = user_data;
6004
6005         ret = supplicant_dbus_method_call(interface->path,
6006                                                 SUPPLICANT_INTERFACE ".Interface.Mesh",
6007                                                 method, interface_mesh_change_peer_params,
6008                                                 interface_mesh_change_peer_result, data, NULL);
6009         if (ret < 0) {
6010                 g_free(data->peer_address);
6011                 g_free(data->method);
6012                 dbus_free(data);
6013         }
6014
6015         return ret;
6016 }
6017 #endif
6018
6019 int g_supplicant_interface_create(const char *ifname, const char *driver,
6020                                         const char *bridge,
6021 #ifdef TIZEN_EXT
6022                                         unsigned int mac_policy,
6023                                         unsigned int preassoc_mac_policy,
6024                                         unsigned int random_mac_lifetime,
6025 #endif /* TIZEN_EXT */
6026                                         GSupplicantInterfaceCallback callback,
6027                                                         void *user_data)
6028 {
6029         struct interface_create_data *data;
6030         int ret;
6031
6032         SUPPLICANT_DBG("ifname %s", ifname);
6033
6034         if (!ifname)
6035                 return -EINVAL;
6036
6037         if (!system_available)
6038                 return -EFAULT;
6039
6040         data = dbus_malloc0(sizeof(*data));
6041         if (!data)
6042                 return -ENOMEM;
6043
6044         data->ifname = g_strdup(ifname);
6045         data->driver = g_strdup(driver);
6046         data->bridge = g_strdup(bridge);
6047         data->callback = callback;
6048 #ifdef TIZEN_EXT
6049         data->mac_addr = mac_policy;
6050         data->preassoc_mac_addr = preassoc_mac_policy;
6051         data->random_mac_lifetime = random_mac_lifetime;
6052 #endif /* TIZEN_EXT */
6053         data->user_data = user_data;
6054
6055         ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
6056                                                 SUPPLICANT_INTERFACE,
6057                                                 "GetInterface",
6058                                                 interface_get_params,
6059                                                 interface_get_result, data,
6060                                                 NULL);
6061         if (ret < 0)
6062                 interface_create_data_free(data);
6063
6064         return ret;
6065 }
6066
6067 static void interface_remove_result(const char *error,
6068                                 DBusMessageIter *iter, void *user_data)
6069 {
6070         struct interface_data *data = user_data;
6071         int err;
6072
6073         if (error) {
6074                 err = -EIO;
6075                 SUPPLICANT_DBG("error: %s", error);
6076                 goto done;
6077         }
6078
6079         if (!system_available) {
6080                 err = -EFAULT;
6081                 goto done;
6082         }
6083
6084         /*
6085          * The gsupplicant interface is already freed by the InterfaceRemoved
6086          * signal callback. Simply invoke the interface_data callback.
6087          */
6088         err = 0;
6089
6090 done:
6091         g_free(data->path);
6092
6093         if (data->callback)
6094                 data->callback(err, NULL, data->user_data);
6095
6096         dbus_free(data);
6097 }
6098
6099
6100 static void interface_remove_params(DBusMessageIter *iter, void *user_data)
6101 {
6102         struct interface_data *data = user_data;
6103
6104         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
6105                                                         &data->interface->path);
6106 }
6107
6108 int g_supplicant_interface_remove(GSupplicantInterface *interface,
6109                         GSupplicantInterfaceCallback callback,
6110                                                         void *user_data)
6111 {
6112         struct interface_data *data;
6113         int ret;
6114
6115         if (!interface)
6116                 return -EINVAL;
6117
6118         if (!system_available)
6119                 return -EFAULT;
6120
6121         g_supplicant_interface_cancel(interface);
6122
6123         data = dbus_malloc0(sizeof(*data));
6124         if (!data)
6125                 return -ENOMEM;
6126
6127         data->interface = interface;
6128         data->path = g_strdup(interface->path);
6129         data->callback = callback;
6130         data->user_data = user_data;
6131
6132         ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
6133                                                 SUPPLICANT_INTERFACE,
6134                                                 "RemoveInterface",
6135                                                 interface_remove_params,
6136                                                 interface_remove_result, data,
6137                                                 NULL);
6138         if (ret < 0) {
6139                 g_free(data->path);
6140                 dbus_free(data);
6141         }
6142         return ret;
6143 }
6144
6145 static void interface_scan_result(const char *error,
6146                                 DBusMessageIter *iter, void *user_data)
6147 {
6148         struct interface_scan_data *data = user_data;
6149         int err = 0;
6150
6151         if (error) {
6152                 SUPPLICANT_DBG("error %s", error);
6153                 err = -EIO;
6154         }
6155
6156         /* A non ready interface cannot send/receive anything */
6157         if (interface_exists(data->interface, data->path)) {
6158                 if (!data->interface->ready)
6159                         err = -ENOLINK;
6160         }
6161
6162         g_free(data->path);
6163
6164         if (err != 0) {
6165                 if (data->callback)
6166                         data->callback(err, data->interface, data->user_data);
6167         } else {
6168                 data->interface->scan_callback = data->callback;
6169                 data->interface->scan_data = data->user_data;
6170         }
6171
6172         if (data->scan_params)
6173                 g_supplicant_free_scan_params(data->scan_params);
6174
6175         dbus_free(data);
6176 }
6177
6178 static void add_scan_frequency(DBusMessageIter *iter, unsigned int freq)
6179 {
6180         DBusMessageIter data;
6181         unsigned int width = 0; /* Not used by wpa_supplicant atm */
6182
6183         dbus_message_iter_open_container(iter, DBUS_TYPE_STRUCT, NULL, &data);
6184
6185         dbus_message_iter_append_basic(&data, DBUS_TYPE_UINT32, &freq);
6186         dbus_message_iter_append_basic(&data, DBUS_TYPE_UINT32, &width);
6187
6188         dbus_message_iter_close_container(iter, &data);
6189 }
6190
6191 static void add_scan_frequencies(DBusMessageIter *iter,
6192                                                 void *user_data)
6193 {
6194         GSupplicantScanParams *scan_data = user_data;
6195         unsigned int freq;
6196         int i;
6197
6198         for (i = 0; i < scan_data->num_freqs; i++) {
6199                 freq = scan_data->freqs[i];
6200                 if (!freq)
6201                         break;
6202
6203                 add_scan_frequency(iter, freq);
6204         }
6205 }
6206
6207 static void append_ssid(DBusMessageIter *iter,
6208                         const void *ssid, unsigned int len)
6209 {
6210         DBusMessageIter array;
6211
6212         dbus_message_iter_open_container(iter, DBUS_TYPE_ARRAY,
6213         DBUS_TYPE_BYTE_AS_STRING, &array);
6214
6215         dbus_message_iter_append_fixed_array(&array, DBUS_TYPE_BYTE,
6216                                                                 &ssid, len);
6217         dbus_message_iter_close_container(iter, &array);
6218 }
6219
6220 static void append_ssids(DBusMessageIter *iter, void *user_data)
6221 {
6222         GSupplicantScanParams *scan_data = user_data;
6223         GSList *list;
6224
6225         for (list = scan_data->ssids; list; list = list->next) {
6226                 struct scan_ssid *scan_ssid = list->data;
6227
6228                 append_ssid(iter, scan_ssid->ssid, scan_ssid->ssid_len);
6229         }
6230 }
6231
6232 static void supplicant_add_scan_frequency(DBusMessageIter *dict,
6233                 supplicant_dbus_array_function function,
6234                                         void *user_data)
6235 {
6236         GSupplicantScanParams *scan_params = user_data;
6237         DBusMessageIter entry, value, array;
6238         const char *key = "Channels";
6239
6240         if (scan_params->freqs && scan_params->freqs[0] != 0) {
6241                 dbus_message_iter_open_container(dict, DBUS_TYPE_DICT_ENTRY,
6242                                                 NULL, &entry);
6243
6244                 dbus_message_iter_append_basic(&entry, DBUS_TYPE_STRING, &key);
6245
6246                 dbus_message_iter_open_container(&entry, DBUS_TYPE_VARIANT,
6247                                         DBUS_TYPE_ARRAY_AS_STRING
6248                                         DBUS_STRUCT_BEGIN_CHAR_AS_STRING
6249                                         DBUS_TYPE_UINT32_AS_STRING
6250                                         DBUS_TYPE_UINT32_AS_STRING
6251                                         DBUS_STRUCT_END_CHAR_AS_STRING,
6252                                         &value);
6253
6254                 dbus_message_iter_open_container(&value, DBUS_TYPE_ARRAY,
6255                                         DBUS_STRUCT_BEGIN_CHAR_AS_STRING
6256                                         DBUS_TYPE_UINT32_AS_STRING
6257                                         DBUS_TYPE_UINT32_AS_STRING
6258                                         DBUS_STRUCT_END_CHAR_AS_STRING,
6259                                         &array);
6260
6261                 if (function)
6262                         function(&array, user_data);
6263
6264                 dbus_message_iter_close_container(&value, &array);
6265                 dbus_message_iter_close_container(&entry, &value);
6266                 dbus_message_iter_close_container(dict, &entry);
6267         }
6268 }
6269
6270 static void interface_scan_params(DBusMessageIter *iter, void *user_data)
6271 {
6272         DBusMessageIter dict;
6273         const char *type = "passive";
6274         struct interface_scan_data *data = user_data;
6275
6276         supplicant_dbus_dict_open(iter, &dict);
6277
6278         if (data && data->scan_params) {
6279                 type = "active";
6280
6281                 supplicant_dbus_dict_append_basic(&dict, "Type",
6282                                         DBUS_TYPE_STRING, &type);
6283
6284 #if defined TIZEN_EXT
6285                 SUPPLICANT_DBG("[specific_scan] num_ssids %d",
6286                                data->scan_params->num_ssids);
6287 #endif
6288
6289                 if (data->scan_params->ssids) {
6290                         supplicant_dbus_dict_append_array(&dict, "SSIDs",
6291                                                         DBUS_TYPE_STRING,
6292                                                         append_ssids,
6293                                                         data->scan_params);
6294                 }
6295                 supplicant_add_scan_frequency(&dict, add_scan_frequencies,
6296                                                 data->scan_params);
6297         } else
6298                 supplicant_dbus_dict_append_basic(&dict, "Type",
6299                                         DBUS_TYPE_STRING, &type);
6300
6301         supplicant_dbus_dict_close(iter, &dict);
6302 }
6303
6304 static int interface_ready_to_scan(GSupplicantInterface *interface)
6305 {
6306         if (!interface)
6307                 return -EINVAL;
6308
6309         if (!system_available)
6310                 return -EFAULT;
6311
6312         if (interface->scanning)
6313                 return -EALREADY;
6314
6315         switch (interface->state) {
6316         case G_SUPPLICANT_STATE_AUTHENTICATING:
6317         case G_SUPPLICANT_STATE_ASSOCIATING:
6318         case G_SUPPLICANT_STATE_ASSOCIATED:
6319         case G_SUPPLICANT_STATE_4WAY_HANDSHAKE:
6320         case G_SUPPLICANT_STATE_GROUP_HANDSHAKE:
6321                 return -EBUSY;
6322 #if defined TIZEN_EXT
6323         case G_SUPPLICANT_STATE_DISABLED:
6324                 return -ENOLINK;
6325         case G_SUPPLICANT_STATE_UNKNOWN:
6326 #else
6327         case G_SUPPLICANT_STATE_UNKNOWN:
6328         case G_SUPPLICANT_STATE_DISABLED:
6329 #endif
6330         case G_SUPPLICANT_STATE_DISCONNECTED:
6331         case G_SUPPLICANT_STATE_INACTIVE:
6332         case G_SUPPLICANT_STATE_SCANNING:
6333         case G_SUPPLICANT_STATE_COMPLETED:
6334                 break;
6335         }
6336
6337         return 0;
6338 }
6339
6340 #if defined TIZEN_EXT_WIFI_MESH
6341 static void interface_abort_scan_result(const char *error,
6342                                 DBusMessageIter *iter, void *user_data)
6343 {
6344         struct interface_scan_data *data = user_data;
6345         int err = 0;
6346
6347         if (error) {
6348                 SUPPLICANT_DBG("error %s", error);
6349                 err = -EIO;
6350         }
6351
6352         g_free(data->path);
6353
6354                 if (data->callback)
6355                         data->callback(err, data->interface, data->user_data);
6356
6357         dbus_free(data);
6358 }
6359
6360 int g_supplicant_interface_abort_scan(GSupplicantInterface *interface,
6361                                 GSupplicantInterfaceCallback callback, void *user_data)
6362 {
6363         struct interface_scan_data *data;
6364         int ret;
6365
6366         if (!interface->scanning)
6367                 return -EEXIST;
6368
6369         data = dbus_malloc0(sizeof(*data));
6370         if (!data)
6371                 return -ENOMEM;
6372
6373         data->interface = interface;
6374         data->path = g_strdup(interface->path);
6375         data->callback = callback;
6376         data->user_data = user_data;
6377
6378         ret = supplicant_dbus_method_call(interface->path,
6379                         SUPPLICANT_INTERFACE ".Interface", "AbortScan", NULL,
6380                         interface_abort_scan_result, data, interface);
6381
6382         if (ret < 0) {
6383                 g_free(data->path);
6384                 dbus_free(data);
6385         }
6386
6387         return ret;
6388 }
6389 #endif
6390
6391 int g_supplicant_interface_scan(GSupplicantInterface *interface,
6392                                 GSupplicantScanParams *scan_data,
6393                                 GSupplicantInterfaceCallback callback,
6394                                                         void *user_data)
6395 {
6396         struct interface_scan_data *data;
6397         int ret;
6398
6399         ret = interface_ready_to_scan(interface);
6400         if (ret)
6401                 return ret;
6402
6403         data = dbus_malloc0(sizeof(*data));
6404         if (!data)
6405                 return -ENOMEM;
6406
6407         data->interface = interface;
6408         data->path = g_strdup(interface->path);
6409 #if defined TIZEN_EXT
6410         data->interface->scan_callback = data->callback = callback;
6411         data->interface->scan_data = data->user_data = user_data;
6412 #else
6413         data->callback = callback;
6414         data->user_data = user_data;
6415 #endif
6416         data->scan_params = scan_data;
6417
6418         interface->scan_callback = callback;
6419         interface->scan_data = user_data;
6420
6421         ret = supplicant_dbus_method_call(interface->path,
6422                         SUPPLICANT_INTERFACE ".Interface", "Scan",
6423                         interface_scan_params, interface_scan_result, data,
6424                         interface);
6425
6426         if (ret < 0) {
6427                 g_free(data->path);
6428                 dbus_free(data);
6429         }
6430
6431         return ret;
6432 }
6433
6434 #if defined TIZEN_EXT
6435 static void interface_signalpoll_result(const char *error,
6436                                 DBusMessageIter *iter, void *user_data)
6437 {
6438         struct interface_signalpoll_data *data = user_data;
6439         int err = 0;
6440         dbus_int32_t maxspeed = 0;
6441         dbus_int32_t strength = 0;
6442         dbus_int32_t snr = 0;
6443         DBusMessageIter sub_iter, dict;
6444
6445         if (error) {
6446                 err = -EIO;
6447                 SUPPLICANT_DBG("error: %s", error);
6448                 goto out;
6449         }
6450
6451         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_VARIANT) {
6452                 err = -EINVAL;
6453                 SUPPLICANT_DBG("invalid reply");
6454                 goto out;
6455         }
6456
6457         dbus_message_iter_recurse(iter, &sub_iter);
6458         dbus_message_iter_recurse(&sub_iter, &dict);
6459
6460         while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_DICT_ENTRY) {
6461                 DBusMessageIter entry, value;
6462                 const char *key;
6463
6464                 dbus_message_iter_recurse(&dict, &entry);
6465                 dbus_message_iter_get_basic(&entry, &key);
6466                 dbus_message_iter_next(&entry);
6467                 dbus_message_iter_recurse(&entry, &value);
6468
6469                 switch (dbus_message_iter_get_arg_type(&value)) {
6470                 case DBUS_TYPE_INT32:
6471                         if (g_strcmp0(key, "linkspeed") == 0) {
6472                                 dbus_message_iter_get_basic(&value, &maxspeed);
6473                                 SUPPLICANT_DBG("linkspeed = %d", maxspeed);
6474                                 break;
6475                         } else if (g_strcmp0(key, "rssi") == 0) {
6476                                 dbus_message_iter_get_basic(&value, &strength);
6477                                 SUPPLICANT_DBG("Strength = %d", strength);
6478                                 break;
6479                         } else if (g_strcmp0(key, "SNR") == 0) {
6480                                 dbus_message_iter_get_basic(&value, &snr);
6481                                 SUPPLICANT_DBG("SNR = %d", snr);
6482                                 break;
6483                         }
6484                 }
6485                 dbus_message_iter_next(&dict);
6486         }
6487
6488 out:
6489         if(data->callback)
6490                 data->callback(err, maxspeed, strength, snr, data->user_data);
6491
6492         g_free(data->path);
6493         dbus_free(data);
6494 }
6495
6496 int g_supplicant_interface_signalpoll(GSupplicantInterface *interface,
6497                                 GSupplicantMaxSpeedCallback callback,
6498                                 void *user_data)
6499 {
6500         struct interface_signalpoll_data *data;
6501         int ret;
6502
6503         if (!interface)
6504                 return -EINVAL;
6505
6506         if (!system_available)
6507                 return -EFAULT;
6508
6509         data = dbus_malloc0(sizeof(*data));
6510         if (!data)
6511                 return -ENOMEM;
6512
6513         data->interface = interface;
6514         data->path = g_strdup(interface->path);
6515         data->callback = callback;
6516         data->user_data = user_data;
6517
6518         ret = supplicant_dbus_method_call(interface->path,
6519                         SUPPLICANT_INTERFACE ".Interface", "SignalPoll",
6520                         NULL, interface_signalpoll_result, data,
6521                         interface);
6522
6523         if (ret < 0) {
6524                 g_free(data->path);
6525                 dbus_free(data);
6526         }
6527
6528         return ret;
6529 }
6530 #endif
6531
6532 static int parse_supplicant_error(DBusMessageIter *iter)
6533 {
6534         int err = -ECONNABORTED;
6535         char *key;
6536
6537         if (!iter)
6538                 return err;
6539
6540         /* If the given passphrase is malformed wpa_s returns
6541          * "invalid message format" but this error should be interpreted as
6542          * invalid-key.
6543          */
6544         while (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_STRING) {
6545                 dbus_message_iter_get_basic(iter, &key);
6546                 if (strncmp(key, "psk", 3) == 0 ||
6547                                 strncmp(key, "wep_key", 7) == 0 ||
6548                                 strcmp(key, "invalid message format") == 0) {
6549                         err = -ENOKEY;
6550                         break;
6551                 }
6552                 dbus_message_iter_next(iter);
6553         }
6554
6555         return err;
6556 }
6557
6558 static void interface_select_network_result(const char *error,
6559                                 DBusMessageIter *iter, void *user_data)
6560 {
6561         struct interface_connect_data *data = user_data;
6562         int err;
6563
6564         SUPPLICANT_DBG("");
6565
6566         err = 0;
6567         if (error) {
6568 #if defined TIZEN_EXT
6569                 SUPPLICANT_DBG("SelectNetwork errorFreq %s", error);
6570 #else
6571                 SUPPLICANT_DBG("SelectNetwork error %s", error);
6572 #endif
6573                 err = parse_supplicant_error(iter);
6574         }
6575
6576         g_free(data->path);
6577
6578         if (data->callback)
6579                 data->callback(err, data->interface, data->user_data);
6580
6581 #if defined TIZEN_EXT
6582         g_free(data->ssid->ssid);
6583         g_free((char *)data->ssid->passphrase);
6584         g_free((char *)data->ssid->connector);
6585         g_free((char *)data->ssid->c_sign_key);
6586         g_free((char *)data->ssid->net_access_key);
6587 #endif
6588         g_free(data->ssid);
6589         dbus_free(data);
6590 }
6591
6592 static void interface_select_network_params(DBusMessageIter *iter,
6593                                                         void *user_data)
6594 {
6595         struct interface_connect_data *data = user_data;
6596         GSupplicantInterface *interface = data->interface;
6597 #if defined TIZEN_EXT
6598         GSupplicantSSID *ssid = data->ssid;
6599 #endif
6600
6601         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
6602                                         &interface->network_path);
6603 #if defined TIZEN_EXT
6604         if (!ssid->bssid_for_connect_len)
6605                 dbus_message_iter_append_basic(iter, DBUS_TYPE_INT32, &ssid->freq);
6606 #endif
6607 }
6608
6609 static void interface_add_network_result(const char *error,
6610                                 DBusMessageIter *iter, void *user_data)
6611 {
6612         struct interface_connect_data *data = user_data;
6613         GSupplicantInterface *interface = data->interface;
6614         const char *path;
6615         int err;
6616
6617         if (error)
6618                 goto error;
6619
6620         dbus_message_iter_get_basic(iter, &path);
6621         if (!path)
6622                 goto error;
6623
6624         SUPPLICANT_DBG("PATH: %s", path);
6625
6626 #if defined TIZEN_EXT
6627         if (interface->network_path)
6628                 g_free(interface->network_path);
6629 #endif
6630         interface->network_path = g_strdup(path);
6631
6632         store_network_information(interface, data->ssid);
6633
6634 #if defined TIZEN_EXT
6635         SUPPLICANT_DBG(".Interface.SelectNetworkFreq");
6636         GSupplicantSSID *ssid = data->ssid;
6637
6638         if (!ssid->bssid_for_connect_len)
6639                 supplicant_dbus_method_call(data->interface->path,
6640                                 SUPPLICANT_INTERFACE ".Interface", "SelectNetworkFreq",
6641                                 interface_select_network_params,
6642                                 interface_select_network_result, data,
6643                                 interface);
6644         else
6645                 supplicant_dbus_method_call(data->interface->path,
6646                                 SUPPLICANT_INTERFACE ".Interface", "SelectNetwork",
6647                                 interface_select_network_params,
6648                                 interface_select_network_result, data,
6649                                 interface);
6650 #else
6651         supplicant_dbus_method_call(data->interface->path,
6652                         SUPPLICANT_INTERFACE ".Interface", "SelectNetwork",
6653                         interface_select_network_params,
6654                         interface_select_network_result, data,
6655                         interface);
6656 #endif
6657
6658         return;
6659
6660 error:
6661         SUPPLICANT_DBG("AddNetwork error %s", error);
6662
6663         if (interface_exists(data->interface, data->interface->path)) {
6664                 err = parse_supplicant_error(iter);
6665                 if (data->callback)
6666                         data->callback(err, data->interface, data->user_data);
6667
6668                 g_free(interface->network_path);
6669                 interface->network_path = NULL;
6670         }
6671
6672         g_free(data->path);
6673 #if defined TIZEN_EXT
6674         g_free(data->ssid->ssid);
6675         g_free((char *)data->ssid->passphrase);
6676         g_free((char *)data->ssid->connector);
6677         g_free((char *)data->ssid->c_sign_key);
6678         g_free((char *)data->ssid->net_access_key);
6679 #endif
6680         g_free(data->ssid);
6681         g_free(data);
6682 }
6683
6684 static void add_network_security_none(DBusMessageIter *dict)
6685 {
6686         const char *auth_alg = "OPEN";
6687
6688         supplicant_dbus_dict_append_basic(dict, "auth_alg",
6689                                         DBUS_TYPE_STRING, &auth_alg);
6690 }
6691
6692 static void add_network_security_wep(DBusMessageIter *dict,
6693                                         GSupplicantSSID *ssid)
6694 {
6695         const char *auth_alg = "OPEN SHARED";
6696         dbus_uint32_t key_index = 0;
6697
6698         supplicant_dbus_dict_append_basic(dict, "auth_alg",
6699                                         DBUS_TYPE_STRING, &auth_alg);
6700
6701         if (ssid->passphrase) {
6702                 int size = strlen(ssid->passphrase);
6703                 if (size == 10 || size == 26) {
6704                         unsigned char *key = g_try_malloc(13);
6705                         char tmp[3];
6706                         int i;
6707
6708                         memset(tmp, 0, sizeof(tmp));
6709                         if (!key)
6710                                 size = 0;
6711
6712                         for (i = 0; i < size / 2; i++) {
6713                                 memcpy(tmp, ssid->passphrase + (i * 2), 2);
6714                                 key[i] = (unsigned char) strtol(tmp, NULL, 16);
6715                         }
6716
6717                         supplicant_dbus_dict_append_fixed_array(dict,
6718                                                         "wep_key0",
6719                                                         DBUS_TYPE_BYTE,
6720                                                         &key, size / 2);
6721                         g_free(key);
6722                 } else if (size == 5 || size == 13) {
6723                         unsigned char *key = g_try_malloc(13);
6724                         int i;
6725
6726                         if (!key)
6727                                 size = 0;
6728
6729                         for (i = 0; i < size; i++)
6730                                 key[i] = (unsigned char) ssid->passphrase[i];
6731
6732                         supplicant_dbus_dict_append_fixed_array(dict,
6733                                                                 "wep_key0",
6734                                                                 DBUS_TYPE_BYTE,
6735                                                                 &key, size);
6736                         g_free(key);
6737                 } else
6738                         supplicant_dbus_dict_append_basic(dict,
6739                                                         "wep_key0",
6740                                                         DBUS_TYPE_STRING,
6741                                                         &ssid->passphrase);
6742
6743                 supplicant_dbus_dict_append_basic(dict, "wep_tx_keyidx",
6744                                         DBUS_TYPE_UINT32, &key_index);
6745         }
6746 }
6747
6748 static dbus_bool_t is_psk_raw_key(const char *psk)
6749 {
6750         int i;
6751
6752         /* A raw key is always 64 bytes length... */
6753         if (strlen(psk) != 64)
6754                 return FALSE;
6755
6756         /* ... and its content is in hex representation */
6757         for (i = 0; i < 64; i++)
6758                 if (!isxdigit((unsigned char) psk[i]))
6759                         return FALSE;
6760
6761         return TRUE;
6762 }
6763
6764 static unsigned char hexchar2bin(char c)
6765 {
6766         if ((c >= '0') && (c <= '9'))
6767                 return c - '0';
6768         else if ((c >= 'A') && (c <= 'F'))
6769                 return c - 'A' + 10;
6770         else if ((c >= 'a') && (c <= 'f'))
6771                 return c - 'a' + 10;
6772         else
6773                 return c;
6774 }
6775
6776 static void hexstring2bin(const char *string, unsigned char *data,
6777                                 size_t data_len)
6778 {
6779         size_t i;
6780
6781         for (i = 0; i < data_len; i++)
6782                 data[i] = (hexchar2bin(string[i * 2 + 0]) << 4 |
6783                            hexchar2bin(string[i * 2 + 1]) << 0);
6784 }
6785
6786 static void add_network_security_psk(DBusMessageIter *dict,
6787                                         GSupplicantSSID *ssid)
6788 {
6789         if (ssid->passphrase && strlen(ssid->passphrase) > 0) {
6790                 const char *key = "psk";
6791
6792                 if (is_psk_raw_key(ssid->passphrase)) {
6793                         unsigned char data[32];
6794                         unsigned char *datap = data;
6795
6796                         /* The above pointer alias is required by D-Bus because
6797                          * with D-Bus and GCC, non-heap-allocated arrays cannot
6798                          * be passed directly by their base pointer. */
6799
6800                         hexstring2bin(ssid->passphrase, datap, sizeof(data));
6801
6802                         supplicant_dbus_dict_append_fixed_array(dict,
6803                                                         key, DBUS_TYPE_BYTE,
6804                                                         &datap, sizeof(data));
6805                 } else
6806                         supplicant_dbus_dict_append_basic(dict,
6807                                                         key, DBUS_TYPE_STRING,
6808                                                         &ssid->passphrase);
6809         }
6810 }
6811
6812 static void add_network_security_tls(DBusMessageIter *dict,
6813                                         GSupplicantSSID *ssid)
6814 {
6815         /*
6816          * For TLS, we at least need:
6817          *              The client certificate
6818          *              The client private key file
6819          *              The client private key file password
6820          *
6821          * The Authority certificate is optional.
6822          */
6823         if (!ssid->client_cert_path)
6824                 return;
6825
6826         if (!ssid->private_key_path)
6827                 return;
6828
6829 #if !defined TIZEN_EXT
6830         if (!ssid->private_key_passphrase)
6831                 return;
6832 #endif
6833
6834         if (ssid->ca_cert_path)
6835                 supplicant_dbus_dict_append_basic(dict, "ca_cert",
6836                                         DBUS_TYPE_STRING, &ssid->ca_cert_path);
6837
6838         supplicant_dbus_dict_append_basic(dict, "private_key",
6839                                                 DBUS_TYPE_STRING,
6840                                                 &ssid->private_key_path);
6841 #if !defined TIZEN_EXT
6842         supplicant_dbus_dict_append_basic(dict, "private_key_passwd",
6843                                                 DBUS_TYPE_STRING,
6844                                                 &ssid->private_key_passphrase);
6845 #endif
6846         supplicant_dbus_dict_append_basic(dict, "client_cert",
6847                                                 DBUS_TYPE_STRING,
6848                                                 &ssid->client_cert_path);
6849 }
6850
6851 static void add_network_security_peap(DBusMessageIter *dict,
6852                                         GSupplicantSSID *ssid)
6853 {
6854         char *phase2_auth;
6855
6856         /*
6857          * For PEAP/TTLS, we at least need
6858          *              The authority certificate
6859          *              The 2nd phase authentication method
6860          *              The 2nd phase passphrase
6861          *
6862          * The Client certificate is optional although strongly recommended
6863          * When setting it, we need in addition
6864          *              The Client private key file
6865          *              The Client private key file password
6866          */
6867         if (!ssid->passphrase)
6868                 return;
6869
6870         if (!ssid->phase2_auth)
6871                 return;
6872
6873         if (ssid->client_cert_path) {
6874                 if (!ssid->private_key_path)
6875                         return;
6876
6877 #if !defined TIZEN_EXT
6878                 if (!ssid->private_key_passphrase)
6879                         return;
6880 #endif
6881
6882                 supplicant_dbus_dict_append_basic(dict, "client_cert",
6883                                                 DBUS_TYPE_STRING,
6884                                                 &ssid->client_cert_path);
6885
6886                 supplicant_dbus_dict_append_basic(dict, "private_key",
6887                                                 DBUS_TYPE_STRING,
6888                                                 &ssid->private_key_path);
6889
6890 #if !defined TIZEN_EXT
6891                 supplicant_dbus_dict_append_basic(dict, "private_key_passwd",
6892                                                 DBUS_TYPE_STRING,
6893                                                 &ssid->private_key_passphrase);
6894 #endif
6895
6896         }
6897
6898         if(g_strcmp0(ssid->phase2_auth, "GTC") == 0 && g_strcmp0(ssid->eap, "ttls") == 0)
6899                 phase2_auth = g_strdup_printf("autheap=%s", ssid->phase2_auth);
6900         else if (g_str_has_prefix(ssid->phase2_auth, "EAP-")) {
6901                 phase2_auth = g_strdup_printf("autheap=%s",
6902                                         ssid->phase2_auth + strlen("EAP-"));
6903         } else
6904                 phase2_auth = g_strdup_printf("auth=%s", ssid->phase2_auth);
6905
6906         supplicant_dbus_dict_append_basic(dict, "password",
6907                                                 DBUS_TYPE_STRING,
6908                                                 &ssid->passphrase);
6909
6910         if (ssid->ca_cert_path)
6911                 supplicant_dbus_dict_append_basic(dict, "ca_cert",
6912                                                 DBUS_TYPE_STRING,
6913                                                 &ssid->ca_cert_path);
6914
6915         supplicant_dbus_dict_append_basic(dict, "phase2",
6916                                                 DBUS_TYPE_STRING,
6917                                                 &phase2_auth);
6918
6919         g_free(phase2_auth);
6920 }
6921
6922 #if defined TIZEN_EXT
6923 static void add_network_security_aka_sim(DBusMessageIter *dict,
6924                                         GSupplicantSSID *ssid)
6925 {
6926         if (!ssid->passphrase)
6927                 return;
6928
6929         supplicant_dbus_dict_append_basic(dict, "password",
6930                         DBUS_TYPE_STRING,
6931                         &ssid->passphrase);
6932 }
6933
6934 static void add_network_security_fast(DBusMessageIter *dict,
6935                 GSupplicantSSID *ssid)
6936 {
6937         /*
6938          * For FAST, we at least need:
6939          *              id / password
6940          *              phase1 (provisiong information)
6941          *              pac_file
6942          */
6943
6944         /* Allow provisioing both authenticated and unauthenticated */
6945         const char *phase1 = "fast_provisioning=2";
6946         supplicant_dbus_dict_append_basic(dict, "phase1",
6947                         DBUS_TYPE_STRING,
6948                         &phase1);
6949
6950         SUPPLICANT_DBG("pac_file [%s]", ssid->pac_file);
6951         if(ssid->pac_file)
6952                 supplicant_dbus_dict_append_basic(dict, "pac_file",
6953                                 DBUS_TYPE_STRING,
6954                                 &ssid->pac_file);
6955
6956         supplicant_dbus_dict_append_basic(dict, "password",
6957                         DBUS_TYPE_STRING,
6958                         &ssid->passphrase);
6959 }
6960 #endif
6961
6962 static void add_network_security_eap(DBusMessageIter *dict,
6963                                         GSupplicantSSID *ssid)
6964 {
6965         char *eap_value;
6966
6967 #if defined TIZEN_EXT
6968         if (!ssid->eap)
6969 #else
6970         if (!ssid->eap || !ssid->identity)
6971 #endif
6972                 return;
6973
6974         if (g_strcmp0(ssid->eap, "tls") == 0) {
6975                 add_network_security_tls(dict, ssid);
6976         } else if (g_strcmp0(ssid->eap, "peap") == 0 ||
6977                                 g_strcmp0(ssid->eap, "ttls") == 0) {
6978 #if defined TIZEN_EXT
6979                 if (!ssid->identity)
6980                         return;
6981 #endif
6982                 add_network_security_peap(dict, ssid);
6983
6984 #if defined TIZEN_EXT
6985         } else if (g_strcmp0(ssid->eap, "sim") == 0 ||
6986                         g_strcmp0(ssid->eap, "aka") == 0 ||
6987                         g_strcmp0(ssid->eap, "aka'") == 0) {
6988                 add_network_security_aka_sim(dict, ssid);
6989         } else if (g_strcmp0(ssid->eap, "pwd") == 0) {
6990                 if(!ssid->passphrase)
6991                         return;
6992                 supplicant_dbus_dict_append_basic(dict, "password",
6993                                 DBUS_TYPE_STRING,
6994                                 &ssid->passphrase);
6995         } else if (g_strcmp0(ssid->eap, "fast") == 0){
6996                 if (!ssid->identity || !ssid->passphrase)
6997                         return;
6998
6999                 add_network_security_fast(dict, ssid);
7000 #endif
7001         } else
7002                 return;
7003
7004         eap_value = g_ascii_strup(ssid->eap, -1);
7005
7006         supplicant_dbus_dict_append_basic(dict, "eap",
7007                                                 DBUS_TYPE_STRING,
7008                                                 &eap_value);
7009 #if defined TIZEN_EXT
7010         if (ssid->identity != NULL)
7011                 supplicant_dbus_dict_append_basic(dict, "identity",
7012                                                         DBUS_TYPE_STRING,
7013                                                         &ssid->identity);
7014 #else
7015         supplicant_dbus_dict_append_basic(dict, "identity",
7016                                                 DBUS_TYPE_STRING,
7017                                                 &ssid->identity);
7018 #endif
7019         if(ssid->anonymous_identity)
7020                 supplicant_dbus_dict_append_basic(dict, "anonymous_identity",
7021                                                      DBUS_TYPE_STRING,
7022                                                      &ssid->anonymous_identity);
7023
7024         if(ssid->subject_match)
7025                 supplicant_dbus_dict_append_basic(dict, "subject_match",
7026                                                      DBUS_TYPE_STRING,
7027                                                      &ssid->subject_match);
7028
7029         if(ssid->altsubject_match)
7030                 supplicant_dbus_dict_append_basic(dict, "altsubject_match",
7031                                                      DBUS_TYPE_STRING,
7032                                                      &ssid->altsubject_match);
7033
7034         if(ssid->domain_suffix_match)
7035                 supplicant_dbus_dict_append_basic(dict, "domain_suffix_match",
7036                                                      DBUS_TYPE_STRING,
7037                                                      &ssid->domain_suffix_match);
7038
7039         if(ssid->domain_match)
7040                 supplicant_dbus_dict_append_basic(dict, "domain_match",
7041                                                      DBUS_TYPE_STRING,
7042                                                      &ssid->domain_match);
7043
7044         g_free(eap_value);
7045 }
7046
7047 static void add_network_security_ciphers(DBusMessageIter *dict,
7048                                                 GSupplicantSSID *ssid)
7049 {
7050         unsigned int p_cipher, g_cipher, i;
7051         char *pairwise, *group;
7052         char *pair_ciphers[4];
7053         char *group_ciphers[5];
7054
7055         p_cipher = ssid->pairwise_cipher;
7056         g_cipher = ssid->group_cipher;
7057
7058         if (p_cipher == 0 && g_cipher == 0)
7059                 return;
7060
7061         i = 0;
7062
7063         if (p_cipher & G_SUPPLICANT_PAIRWISE_CCMP)
7064                 pair_ciphers[i++] = "CCMP";
7065
7066         if (p_cipher & G_SUPPLICANT_PAIRWISE_TKIP)
7067                 pair_ciphers[i++] = "TKIP";
7068
7069         if (p_cipher & G_SUPPLICANT_PAIRWISE_NONE)
7070                 pair_ciphers[i++] = "NONE";
7071
7072         pair_ciphers[i] = NULL;
7073
7074         i = 0;
7075
7076         if (g_cipher & G_SUPPLICANT_GROUP_CCMP)
7077                 group_ciphers[i++] = "CCMP";
7078
7079         if (g_cipher & G_SUPPLICANT_GROUP_TKIP)
7080                 group_ciphers[i++] = "TKIP";
7081
7082         if (g_cipher & G_SUPPLICANT_GROUP_WEP104)
7083                 group_ciphers[i++] = "WEP104";
7084
7085         if (g_cipher & G_SUPPLICANT_GROUP_WEP40)
7086                 group_ciphers[i++] = "WEP40";
7087
7088         group_ciphers[i] = NULL;
7089
7090         pairwise = g_strjoinv(" ", pair_ciphers);
7091         group = g_strjoinv(" ", group_ciphers);
7092
7093         SUPPLICANT_DBG("cipher %s %s", pairwise, group);
7094
7095         supplicant_dbus_dict_append_basic(dict, "pairwise",
7096                                                 DBUS_TYPE_STRING,
7097                                                 &pairwise);
7098         supplicant_dbus_dict_append_basic(dict, "group",
7099                                                 DBUS_TYPE_STRING,
7100                                                 &group);
7101
7102         g_free(pairwise);
7103         g_free(group);
7104 }
7105
7106 static void add_network_security_proto(DBusMessageIter *dict,
7107                                                 GSupplicantSSID *ssid)
7108 {
7109         unsigned int protocol, i;
7110         char *proto;
7111         char *protos[3];
7112
7113         protocol = ssid->protocol;
7114
7115         if (protocol == 0)
7116                 return;
7117
7118         i = 0;
7119
7120         if (protocol & G_SUPPLICANT_PROTO_RSN)
7121                 protos[i++] = "RSN";
7122
7123         if (protocol & G_SUPPLICANT_PROTO_WPA)
7124                 protos[i++] = "WPA";
7125
7126         protos[i] = NULL;
7127
7128         proto = g_strjoinv(" ", protos);
7129
7130         SUPPLICANT_DBG("proto %s", proto);
7131
7132         supplicant_dbus_dict_append_basic(dict, "proto",
7133                                                 DBUS_TYPE_STRING,
7134                                                 &proto);
7135
7136         g_free(proto);
7137 }
7138
7139 #if defined TIZEN_EXT
7140 static void add_network_ieee80211w(DBusMessageIter *dict, GSupplicantSSID *ssid)
7141 {
7142         if (ssid->security != G_SUPPLICANT_SECURITY_SAE
7143                         && ssid->security != G_SUPPLICANT_SECURITY_OWE
7144                         && ssid->security != G_SUPPLICANT_SECURITY_DPP)
7145                 return;
7146
7147         supplicant_dbus_dict_append_basic(dict, "ieee80211w", DBUS_TYPE_UINT32,
7148                                           &ssid->ieee80211w);
7149 }
7150
7151 static void add_network_security_connector(DBusMessageIter *dict, GSupplicantSSID *ssid)
7152 {
7153         if (ssid->connector && strlen(ssid->connector) > 0) {
7154                 const char *key = "dpp_connector";
7155
7156                 supplicant_dbus_dict_append_basic(dict,
7157                                 key, DBUS_TYPE_STRING,
7158                                 &ssid->connector);
7159         }
7160 }
7161
7162 static size_t convert_hexstr_to_bin(const char *hex_str, unsigned char **bin)
7163 {
7164         unsigned char *bin_res = NULL;
7165         unsigned int i, j, hex;
7166         size_t hex_str_len;
7167
7168         if (!hex_str || strlen(hex_str) == 0)
7169                 return 0;
7170
7171         hex_str_len = strlen(hex_str);
7172         bin_res = g_try_malloc0(hex_str_len / 2);
7173         if (!bin_res)
7174                 return 0;
7175
7176         j = 0;
7177         for (i = 0; i < hex_str_len; i+=2) {
7178                 sscanf(hex_str + i, "%02x", &hex);
7179                 bin_res[j++] = hex;
7180         }
7181
7182         *bin = bin_res;
7183         return hex_str_len / 2;
7184 }
7185
7186 static void add_network_security_c_sign_key(DBusMessageIter *dict, GSupplicantSSID *ssid)
7187 {
7188         if (ssid->c_sign_key && strlen(ssid->c_sign_key) > 0) {
7189                 const char *key = "dpp_csign";
7190                 unsigned char *bin_csign = NULL;
7191                 size_t bin_csign_len = convert_hexstr_to_bin(ssid->c_sign_key, &bin_csign);
7192                 if  (bin_csign_len != 0)
7193                         supplicant_dbus_dict_append_fixed_array(dict,
7194                                         key, DBUS_TYPE_BYTE,
7195                                         &bin_csign, bin_csign_len);
7196                 g_free(bin_csign);
7197         }
7198 }
7199
7200 static void add_network_security_net_access_key(DBusMessageIter *dict, GSupplicantSSID *ssid)
7201 {
7202         if (ssid->net_access_key && strlen(ssid->net_access_key) > 0) {
7203                 const char *key = "dpp_netaccesskey";
7204                 unsigned char *bin_netaccesskey = NULL;
7205                 size_t bin_netaccesskey_len = convert_hexstr_to_bin(ssid->net_access_key, &bin_netaccesskey);
7206                 if  (bin_netaccesskey_len != 0)
7207                         supplicant_dbus_dict_append_fixed_array(dict,
7208                                         key, DBUS_TYPE_BYTE,
7209                                         &bin_netaccesskey, bin_netaccesskey_len);
7210                 g_free(bin_netaccesskey);
7211         }
7212 }
7213
7214 #endif
7215
7216 static void add_network_security(DBusMessageIter *dict, GSupplicantSSID *ssid)
7217 {
7218         char *key_mgmt;
7219
7220         switch (ssid->security) {
7221         case G_SUPPLICANT_SECURITY_NONE:
7222                 key_mgmt = "NONE";
7223                 add_network_security_none(dict);
7224                 add_network_security_ciphers(dict, ssid);
7225                 break;
7226         case G_SUPPLICANT_SECURITY_UNKNOWN:
7227         case G_SUPPLICANT_SECURITY_WEP:
7228                 key_mgmt = "NONE";
7229                 add_network_security_wep(dict, ssid);
7230                 add_network_security_ciphers(dict, ssid);
7231                 break;
7232         case G_SUPPLICANT_SECURITY_PSK:
7233                 key_mgmt = "WPA-PSK";
7234                 add_network_security_psk(dict, ssid);
7235                 add_network_security_ciphers(dict, ssid);
7236                 add_network_security_proto(dict, ssid);
7237                 break;
7238         case G_SUPPLICANT_SECURITY_IEEE8021X:
7239                 key_mgmt = "WPA-EAP";
7240                 add_network_security_eap(dict, ssid);
7241                 add_network_security_ciphers(dict, ssid);
7242                 add_network_security_proto(dict, ssid);
7243                 break;
7244 #if defined TIZEN_EXT
7245         case G_SUPPLICANT_SECURITY_FT_PSK:
7246                 key_mgmt = "FT-PSK";
7247                 add_network_security_psk(dict, ssid);
7248                 add_network_security_ciphers(dict, ssid);
7249                 add_network_security_proto(dict, ssid);
7250                 break;
7251         case G_SUPPLICANT_SECURITY_FT_IEEE8021X:
7252                 key_mgmt = "FT-EAP";
7253                 add_network_security_eap(dict, ssid);
7254                 add_network_security_ciphers(dict, ssid);
7255                 add_network_security_proto(dict, ssid);
7256                 break;
7257         case G_SUPPLICANT_SECURITY_SAE:
7258                 if (ssid->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_PSK)
7259                         key_mgmt = "SAE WPA-PSK"; // WFA (WPA3 & WPA2 Mixed -> WPA2 only)
7260                 else
7261                         key_mgmt = "SAE";
7262                 add_network_security_psk(dict, ssid);
7263                 break;
7264         case G_SUPPLICANT_SECURITY_OWE:
7265                 key_mgmt = "OWE";
7266                 add_network_security_ciphers(dict, ssid);
7267                 add_network_security_proto(dict, ssid);
7268                 break;
7269         case G_SUPPLICANT_SECURITY_DPP:
7270                 key_mgmt = "DPP";
7271                 add_network_security_connector(dict, ssid);
7272                 add_network_security_c_sign_key(dict, ssid);
7273                 add_network_security_net_access_key(dict, ssid);
7274                 break;
7275 #endif
7276         }
7277
7278         supplicant_dbus_dict_append_basic(dict, "key_mgmt",
7279                                 DBUS_TYPE_STRING, &key_mgmt);
7280 }
7281
7282 static void add_network_mode(DBusMessageIter *dict, GSupplicantSSID *ssid)
7283 {
7284         dbus_uint32_t mode;
7285
7286         switch (ssid->mode) {
7287         case G_SUPPLICANT_MODE_UNKNOWN:
7288         case G_SUPPLICANT_MODE_INFRA:
7289                 mode = 0;
7290                 break;
7291         case G_SUPPLICANT_MODE_IBSS:
7292                 mode = 1;
7293                 break;
7294         case G_SUPPLICANT_MODE_MASTER:
7295                 mode = 2;
7296                 break;
7297 #if defined TIZEN_EXT_WIFI_MESH
7298         case G_SUPPLICANT_MODE_MESH:
7299                 mode = 5;
7300                 break;
7301 #endif
7302         }
7303
7304         supplicant_dbus_dict_append_basic(dict, "mode",
7305                                 DBUS_TYPE_UINT32, &mode);
7306 }
7307
7308 static void interface_add_network_params(DBusMessageIter *iter, void *user_data)
7309 {
7310         DBusMessageIter dict;
7311         struct interface_connect_data *data = user_data;
7312         GSupplicantSSID *ssid = data->ssid;
7313 #if defined TIZEN_EXT
7314         GSupplicantInterface *interface = data->interface;
7315 #endif
7316
7317         supplicant_dbus_dict_open(iter, &dict);
7318
7319         if (ssid->scan_ssid)
7320                 supplicant_dbus_dict_append_basic(&dict, "scan_ssid",
7321                                          DBUS_TYPE_UINT32, &ssid->scan_ssid);
7322
7323         if (ssid->freq)
7324                 supplicant_dbus_dict_append_basic(&dict, "frequency",
7325                                          DBUS_TYPE_UINT32, &ssid->freq);
7326
7327         if (ssid->bgscan)
7328                 supplicant_dbus_dict_append_basic(&dict, "bgscan",
7329                                         DBUS_TYPE_STRING, &ssid->bgscan);
7330
7331         add_network_mode(&dict, ssid);
7332
7333         add_network_security(&dict, ssid);
7334
7335 #if defined TIZEN_EXT
7336         add_network_ieee80211w(&dict, ssid);
7337 #endif
7338
7339         supplicant_dbus_dict_append_fixed_array(&dict, "ssid",
7340                                         DBUS_TYPE_BYTE, &ssid->ssid,
7341                                                 ssid->ssid_len);
7342
7343 #if defined TIZEN_EXT
7344         bool owe_transition_mode = FALSE;
7345         if ((ssid->security == G_SUPPLICANT_SECURITY_OWE) && !(ssid->keymgmt & G_SUPPLICANT_KEYMGMT_OWE))
7346                 owe_transition_mode = TRUE;
7347
7348         if (ssid->bssid && !owe_transition_mode) {
7349                 char *bssid = NULL;
7350                 bssid = g_try_malloc0(18);
7351                 if (bssid == NULL) {
7352                         SUPPLICANT_DBG("memory allocation error");
7353                         supplicant_dbus_dict_close(iter, &dict);
7354                         return;
7355                 }
7356
7357                 if (ssid->bssid_for_connect_len) {
7358                         snprintf(bssid, 18, MACSTR, MAC2STR(ssid->bssid_for_connect));
7359                         memcpy(interface->add_network_bssid, ssid->bssid_for_connect, WIFI_BSSID_LEN_MAX);
7360                 } else {
7361                         snprintf(bssid, 18, MACSTR, MAC2STR(ssid->bssid));
7362                         memcpy(interface->add_network_bssid, ssid->bssid, WIFI_BSSID_LEN_MAX);
7363                 }
7364
7365                 SUPPLICANT_DBG("bssid [" MACSTR "]", MAC2STR(interface->add_network_bssid));
7366
7367                 supplicant_dbus_dict_append_basic(&dict, "bssid",
7368                                         DBUS_TYPE_STRING, &bssid);
7369                 g_free(bssid);
7370         }
7371 #endif
7372
7373         supplicant_dbus_dict_close(iter, &dict);
7374 }
7375
7376 static void interface_wps_start_result(const char *error,
7377                                 DBusMessageIter *iter, void *user_data)
7378 {
7379         struct interface_connect_data *data = user_data;
7380         int err;
7381
7382         SUPPLICANT_DBG("");
7383
7384         err = 0;
7385         if (error) {
7386                 SUPPLICANT_DBG("error: %s", error);
7387                 err = parse_supplicant_error(iter);
7388         }
7389
7390         if(data->callback)
7391                 data->callback(err, data->interface, data->user_data);
7392
7393         g_free(data->path);
7394         g_free(data->ssid);
7395         dbus_free(data);
7396 }
7397
7398 static void interface_add_wps_params(DBusMessageIter *iter, void *user_data)
7399 {
7400         struct interface_connect_data *data = user_data;
7401         GSupplicantSSID *ssid = data->ssid;
7402         const char *role = "enrollee", *type;
7403         DBusMessageIter dict;
7404
7405         SUPPLICANT_DBG("");
7406
7407         supplicant_dbus_dict_open(iter, &dict);
7408
7409         supplicant_dbus_dict_append_basic(&dict, "Role",
7410                                                 DBUS_TYPE_STRING, &role);
7411
7412         type = "pbc";
7413         if (ssid->pin_wps) {
7414                 type = "pin";
7415                 supplicant_dbus_dict_append_basic(&dict, "Pin",
7416                                         DBUS_TYPE_STRING, &ssid->pin_wps);
7417         }
7418
7419         supplicant_dbus_dict_append_basic(&dict, "Type",
7420                                         DBUS_TYPE_STRING, &type);
7421
7422 #if defined TIZEN_EXT
7423         if (ssid->bssid)
7424                 supplicant_dbus_dict_append_fixed_array(&dict, "Bssid",
7425                                                 DBUS_TYPE_BYTE, &ssid->bssid, 6);
7426 #endif
7427
7428         supplicant_dbus_dict_close(iter, &dict);
7429 }
7430
7431 static void wps_start(const char *error, DBusMessageIter *iter, void *user_data)
7432 {
7433         struct interface_connect_data *data = user_data;
7434
7435         SUPPLICANT_DBG("");
7436
7437         if (error) {
7438                 SUPPLICANT_DBG("error: %s", error);
7439                 g_free(data->path);
7440                 g_free(data->ssid);
7441                 dbus_free(data);
7442                 return;
7443         }
7444
7445 #if defined TIZEN_EXT
7446         GSupplicantSSID *ssid = data->ssid;
7447         if (ssid->pin_wps != NULL) {
7448                 if (!g_utf8_validate(ssid->pin_wps, 8, NULL)) {
7449                         SUPPLICANT_DBG("Invalid characters in WPS_PIN");
7450                         g_free(data->ssid);
7451                         dbus_free(data);
7452                         return;
7453                 }
7454         }
7455 #endif
7456         supplicant_dbus_method_call(data->interface->path,
7457                         SUPPLICANT_INTERFACE ".Interface.WPS", "Start",
7458                         interface_add_wps_params,
7459                         interface_wps_start_result, data, NULL);
7460 }
7461
7462 static void wps_process_credentials(DBusMessageIter *iter, void *user_data)
7463 {
7464         dbus_bool_t credentials = TRUE;
7465
7466         SUPPLICANT_DBG("");
7467
7468         dbus_message_iter_append_basic(iter, DBUS_TYPE_BOOLEAN, &credentials);
7469 }
7470
7471
7472 #if defined TIZEN_EXT
7473 #define NETCONFIG_SERVICE "net.netconfig"
7474 #define NETCONFIG_WIFI_PATH "/net/netconfig/wifi"
7475 #define NETCONFIG_WIFI_INTERFACE NETCONFIG_SERVICE ".wifi"
7476
7477 struct dec_method_call_data {
7478         struct interface_connect_data *data;
7479         DBusPendingCall *pending_call;
7480 };
7481
7482 static struct dec_method_call_data decrypt_request_data;
7483
7484 static void crypt_method_call_cancel(void)
7485 {
7486         if (decrypt_request_data.pending_call) {
7487                 dbus_pending_call_cancel(decrypt_request_data.pending_call);
7488                 dbus_pending_call_unref(decrypt_request_data.pending_call);
7489                 decrypt_request_data.pending_call = NULL;
7490         }
7491
7492         g_free(decrypt_request_data.data->path);
7493         g_free(decrypt_request_data.data->ssid);
7494         dbus_free(decrypt_request_data.data);
7495         decrypt_request_data.data = NULL;
7496 }
7497
7498 static void decryption_request_reply(DBusPendingCall *call,
7499                                                 void *user_data)
7500 {
7501         DBusMessage *reply;
7502         DBusError error;
7503         DBusMessageIter args;
7504         char *out_data;
7505         int ret;
7506         struct interface_connect_data *data = user_data;
7507
7508         SUPPLICANT_DBG("");
7509
7510         reply = dbus_pending_call_steal_reply(call);
7511
7512         dbus_error_init(&error);
7513         if (dbus_set_error_from_message(&error, reply)) {
7514                 SUPPLICANT_DBG("decryption_request_reply() %s %s", error.name, error.message);
7515                 dbus_error_free(&error);
7516                 ret = -EINVAL;
7517                 goto done;
7518         }
7519
7520         if (dbus_message_iter_init(reply, &args) == FALSE) {
7521                 SUPPLICANT_DBG("dbus_message_iter_init() failed");
7522                 ret = -EINVAL;
7523                 goto done;
7524         }
7525
7526         dbus_message_iter_get_basic(&args, &out_data);
7527         data->ssid->passphrase = g_strdup((const gchar *)out_data);
7528
7529         ret = supplicant_dbus_method_call(data->interface->path,
7530                 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
7531                 interface_add_network_params,
7532                 interface_add_network_result, data,
7533                 data->interface);
7534
7535 done:
7536         if (ret < 0) {
7537                 SUPPLICANT_DBG("AddNetwork failed %d", ret);
7538                 callback_assoc_failed(decrypt_request_data.data->user_data);
7539                 g_free(data->path);
7540                 g_free(data->ssid->ssid);
7541                 g_free((char *)data->ssid->passphrase);
7542                 g_free((char *)data->ssid->connector);
7543                 g_free((char *)data->ssid->c_sign_key);
7544                 g_free((char *)data->ssid->net_access_key);
7545                 g_free(data->ssid);
7546                 dbus_free(data);
7547         }
7548
7549         dbus_message_unref(reply);
7550         dbus_pending_call_unref(call);
7551
7552         decrypt_request_data.pending_call = NULL;
7553         decrypt_request_data.data = NULL;
7554 }
7555
7556 static int send_decryption_request(const char *passphrase,
7557                         struct interface_connect_data *data)
7558 {
7559         DBusMessage *msg = NULL;
7560         DBusPendingCall *call;
7561
7562         SUPPLICANT_DBG("Decryption request");
7563
7564         if (!passphrase) {
7565                 SUPPLICANT_DBG("Invalid parameter");
7566                 return -EINVAL;
7567         }
7568
7569         if (!connection)
7570                 return -EINVAL;
7571
7572         msg = dbus_message_new_method_call(NETCONFIG_SERVICE, NETCONFIG_WIFI_PATH,
7573                         NETCONFIG_WIFI_INTERFACE, "DecryptPassphrase");
7574         if (!msg)
7575                 return -EINVAL;
7576
7577 #if defined TIZEN_EXT
7578         if (!dbus_message_append_args(msg, DBUS_TYPE_STRING, &passphrase,
7579                                                         DBUS_TYPE_INVALID)) {
7580                 SUPPLICANT_DBG("Could not fulfill decryption request");
7581                 return -ENOMEM;
7582         }
7583 #else
7584         dbus_message_append_args(msg, DBUS_TYPE_STRING, &passphrase,
7585                                                         DBUS_TYPE_INVALID);
7586 #endif
7587
7588         if (!dbus_connection_send_with_reply(connection, msg,
7589                                 &call, DBUS_TIMEOUT_USE_DEFAULT)) {
7590                 dbus_message_unref(msg);
7591                 return -EIO;
7592         }
7593
7594         if (!call) {
7595                 dbus_message_unref(msg);
7596                 return -EIO;
7597         }
7598
7599         decrypt_request_data.pending_call = call;
7600         decrypt_request_data.data = data;
7601
7602         dbus_pending_call_set_notify(call, decryption_request_reply, data, NULL);
7603         dbus_message_unref(msg);
7604
7605         SUPPLICANT_DBG("Decryption request succeeded");
7606
7607         return 0;
7608 }
7609
7610 static void decrypt_conf_obj_reply(DBusPendingCall *call,
7611                                                 void *user_data)
7612 {
7613         DBusMessage *reply;
7614         DBusError error;
7615         DBusMessageIter iter, dict;
7616         char *out_data;
7617         int ret;
7618         struct interface_connect_data *data = user_data;
7619
7620         reply = dbus_pending_call_steal_reply(call);
7621
7622         dbus_error_init(&error);
7623         if (dbus_set_error_from_message(&error, reply)) {
7624                 SUPPLICANT_DBG("decryption_conf_obj_reply() %s %s", error.name, error.message);
7625                 dbus_error_free(&error);
7626                 ret = -EINVAL;
7627                 goto done;
7628         }
7629
7630         if (dbus_message_iter_init(reply, &iter) == FALSE) {
7631                 SUPPLICANT_DBG("dbus_message_iter_init() failed");
7632                 ret = -EINVAL;
7633                 goto done;
7634         }
7635
7636         dbus_message_iter_recurse(&iter, &dict);
7637
7638         while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_DICT_ENTRY) {
7639                 DBusMessageIter entry, value;
7640                 const char *key;
7641
7642                 dbus_message_iter_recurse(&dict, &entry);
7643                 dbus_message_iter_get_basic(&entry, &key);
7644                 dbus_message_iter_next(&entry);
7645                 dbus_message_iter_recurse(&entry, &value);
7646                 if (dbus_message_iter_get_arg_type(&value) == DBUS_TYPE_STRING) {
7647                         if (g_strcmp0(key, "connector") == 0) {
7648                                 dbus_message_iter_get_basic(&value, &out_data);
7649                                 data->ssid->connector = g_strdup((const gchar *)out_data);
7650                                 SUPPLICANT_DBG("connector %s", data->ssid->connector);
7651                         } else if (g_strcmp0(key, "c_sign_key") == 0) {
7652                                 dbus_message_iter_get_basic(&value, &out_data);
7653                                 data->ssid->c_sign_key = g_strdup((const gchar *)out_data);
7654                                 SUPPLICANT_DBG("c_sign_key %s", data->ssid->c_sign_key);
7655                         } else if (g_strcmp0(key, "net_access_key") == 0) {
7656                                 dbus_message_iter_get_basic(&value, &out_data);
7657                                 data->ssid->net_access_key = g_strdup((const gchar *)out_data);
7658                                 SUPPLICANT_DBG("net_access_key %s", data->ssid->net_access_key);
7659                         }
7660                 }
7661                 dbus_message_iter_next(&dict);
7662         }
7663
7664         ret = supplicant_dbus_method_call(data->interface->path,
7665                 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
7666                 interface_add_network_params,
7667                 interface_add_network_result, data,
7668                 data->interface);
7669
7670 done:
7671         if (ret < 0) {
7672                 SUPPLICANT_DBG("AddNetwork failed %d", ret);
7673                 callback_assoc_failed(decrypt_request_data.data->user_data);
7674                 g_free(data->path);
7675                 g_free(data->ssid->ssid);
7676                 g_free((char *)data->ssid->connector);
7677                 g_free((char *)data->ssid->c_sign_key);
7678                 g_free((char *)data->ssid->net_access_key);
7679                 g_free(data->ssid);
7680                 dbus_free(data);
7681         }
7682
7683         dbus_message_unref(reply);
7684         dbus_pending_call_unref(call);
7685
7686         decrypt_request_data.pending_call = NULL;
7687         decrypt_request_data.data = NULL;
7688 }
7689
7690 static int send_decryption_conf_obj_request(GSupplicantSSID *ssid,
7691                         struct interface_connect_data *data)
7692 {
7693         DBusMessage *msg = NULL;
7694         DBusPendingCall *call;
7695
7696         SUPPLICANT_DBG("Decryption configuration object request");
7697
7698         if (!ssid) {
7699                 SUPPLICANT_DBG("Invalid parameter");
7700                 return -EINVAL;
7701         }
7702
7703         if (!connection)
7704                 return -EINVAL;
7705
7706         msg = dbus_message_new_method_call(NETCONFIG_SERVICE, NETCONFIG_WIFI_PATH,
7707                         NETCONFIG_WIFI_INTERFACE, "DecryptConfObj");
7708         if (!msg)
7709                 return -EINVAL;
7710
7711         dbus_message_append_args(msg, DBUS_TYPE_STRING, &ssid->connector,
7712                                                         DBUS_TYPE_INVALID);
7713         dbus_message_append_args(msg, DBUS_TYPE_STRING, &ssid->c_sign_key,
7714                                                         DBUS_TYPE_INVALID);
7715         dbus_message_append_args(msg, DBUS_TYPE_STRING, &ssid->net_access_key,
7716                                                         DBUS_TYPE_INVALID);
7717
7718         if (!dbus_connection_send_with_reply(connection, msg,
7719                                 &call, DBUS_TIMEOUT_USE_DEFAULT)) {
7720                 dbus_message_unref(msg);
7721                 return -EIO;
7722         }
7723
7724         if (!call) {
7725                 dbus_message_unref(msg);
7726                 return -EIO;
7727         }
7728
7729         decrypt_request_data.pending_call = call;
7730         decrypt_request_data.data = data;
7731
7732         dbus_pending_call_set_notify(call, decrypt_conf_obj_reply, data, NULL);
7733         dbus_message_unref(msg);
7734
7735         SUPPLICANT_DBG("Decrypt Conf Obj request succeeded");
7736
7737         return 0;
7738 }
7739
7740 static bool is_valid_config_object(GSupplicantSSID *ssid)
7741 {
7742         return ((ssid->connector &&
7743                         g_strcmp0(ssid->connector, "") != 0) &&
7744                         (ssid->c_sign_key &&
7745                         g_strcmp0(ssid->c_sign_key, "") != 0) &&
7746                         (ssid->net_access_key &&
7747                         g_strcmp0(ssid->net_access_key, "") != 0));
7748 }
7749 #endif
7750
7751 int g_supplicant_interface_connect(GSupplicantInterface *interface,
7752                                 GSupplicantSSID *ssid,
7753                                 GSupplicantInterfaceCallback callback,
7754                                                         void *user_data)
7755 {
7756         struct interface_connect_data *data;
7757         struct interface_data *intf_data;
7758         int ret = 0;
7759
7760         SUPPLICANT_DBG("");
7761
7762         if (!interface)
7763                 return -EINVAL;
7764
7765         if (!system_available)
7766                 return -EFAULT;
7767
7768         /* TODO: Check if we're already connected and switch */
7769
7770         data = dbus_malloc0(sizeof(*data));
7771         if (!data)
7772                 return -ENOMEM;
7773
7774         data->interface = interface;
7775         data->path = g_strdup(interface->path);
7776         data->callback = callback;
7777         data->ssid = ssid;
7778         data->user_data = user_data;
7779
7780         if (ssid->use_wps) {
7781                 g_free(interface->wps_cred.key);
7782                 memset(&interface->wps_cred, 0,
7783                                 sizeof(struct _GSupplicantWpsCredentials));
7784
7785                 ret = supplicant_dbus_property_set(interface->path,
7786                         SUPPLICANT_INTERFACE ".Interface.WPS",
7787                         "ProcessCredentials", DBUS_TYPE_BOOLEAN_AS_STRING,
7788                         wps_process_credentials, wps_start, data, interface);
7789         } else {
7790                 /* By the time there is a request for connect and the network
7791                  * path is not NULL it means that connman has not removed the
7792                  * previous network pointer. This can happen in the case AP
7793                  * deauthenticated client and connman does not remove the
7794                  * previously connected network pointer. This causes supplicant
7795                  * to reallocate the memory for struct wpa_ssid again even if it
7796                  * is the same SSID. This causes memory usage of wpa_supplicnat
7797                  * to go high. The idea here is that if the previously connected
7798                  * network is not removed at the time of next connection attempt
7799                  * check if the network path is not NULL. In case it is non-NULL
7800                  * first remove the network and then once removal is successful, add
7801                  * the network.
7802                  */
7803
7804                 if (interface->network_path != NULL) {
7805                         g_free(data->path);
7806                         dbus_free(data);
7807
7808                         /*
7809                          * If this add network is for the same network for
7810                          * which wpa_supplicant already has a profile then do
7811                          * not need to add another profile. Only if the
7812                          * profile that needs to get added is different from
7813                          * what is there in wpa_s delete the current one. A
7814                          * network is identified by its SSID, security_type
7815                          * and passphrase (private passphrase in case security
7816                          * type is 802.11x).
7817                          */
7818                         if (compare_network_parameters(interface, ssid)) {
7819                                 return -EALREADY;
7820                         }
7821
7822                         intf_data = dbus_malloc0(sizeof(*intf_data));
7823                         if (!intf_data)
7824                                 return -ENOMEM;
7825
7826                         intf_data->interface = interface;
7827                         intf_data->path = g_strdup(interface->path);
7828                         intf_data->callback = callback;
7829                         intf_data->ssid = ssid;
7830                         intf_data->user_data = user_data;
7831                         intf_data->network_remove_in_progress = TRUE;
7832                         network_remove(intf_data);
7833                 } else {
7834 #if defined TIZEN_EXT
7835                         if (ssid->passphrase &&
7836                             g_strcmp0(ssid->passphrase, "") != 0 &&
7837 #if defined TIZEN_EXT_WIFI_MESH
7838                             ssid->mode != G_SUPPLICANT_MODE_MESH &&
7839 #endif
7840                             !ssid->eap) {
7841                                 ret = send_decryption_request(ssid->passphrase, data);
7842                                 if (ret < 0)
7843                                         SUPPLICANT_DBG("Decryption request failed %d", ret);
7844                         } else if (is_valid_config_object(ssid)) {
7845                                 ret = send_decryption_conf_obj_request(ssid, data);
7846                                 if (ret < 0)
7847                                         SUPPLICANT_DBG("Decryption Conf Obj request failed %d", ret);
7848
7849                         } else
7850 #endif
7851                         ret = supplicant_dbus_method_call(interface->path,
7852                                         SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
7853                                         interface_add_network_params,
7854                                         interface_add_network_result, data,
7855                                         interface);
7856                 }
7857         }
7858
7859         if (ret < 0) {
7860                 g_free(data->path);
7861                 dbus_free(data);
7862                 return ret;
7863         }
7864
7865         return -EINPROGRESS;
7866 }
7867
7868 static void network_remove_result(const char *error,
7869                                 DBusMessageIter *iter, void *user_data)
7870 {
7871         struct interface_data *data = user_data;
7872         struct interface_connect_data *connect_data;
7873         int result = 0;
7874
7875         SUPPLICANT_DBG("");
7876
7877         if (error) {
7878                 result = -EIO;
7879                 SUPPLICANT_DBG("error: %s", error);
7880
7881                 if (g_strcmp0("org.freedesktop.DBus.Error.UnknownMethod",
7882                                                 error) == 0)
7883                         result = -ECONNABORTED;
7884         }
7885
7886         g_free(data->interface->network_path);
7887         data->interface->network_path = NULL;
7888
7889         remove_network_information(data->interface);
7890
7891         if (data->network_remove_in_progress == TRUE) {
7892                 data->network_remove_in_progress = FALSE;
7893                 connect_data = dbus_malloc0(sizeof(*connect_data));
7894                 if (!connect_data)
7895                         return;
7896
7897                 connect_data->interface = data->interface;
7898                 connect_data->path = g_strdup(data->path);
7899                 connect_data->callback = data->callback;
7900                 connect_data->ssid = data->ssid;
7901                 connect_data->user_data = data->user_data;
7902
7903 #if defined TIZEN_EXT
7904                 int ret;
7905                 if (data->ssid->passphrase && g_strcmp0(data->ssid->passphrase, "") != 0
7906                         && !data->ssid->eap) {
7907                         ret = send_decryption_request(data->ssid->passphrase, connect_data);
7908                         if (ret < 0) {
7909                                 SUPPLICANT_DBG("Decryption request failed %d", ret);
7910                                 g_free(connect_data->ssid);
7911                                 g_free(connect_data->path);
7912                                 dbus_free(connect_data);
7913                         }
7914                 } else if (is_valid_config_object(data->ssid)) {
7915                         ret = send_decryption_conf_obj_request(data->ssid, connect_data);
7916                         if (ret < 0) {
7917                                 SUPPLICANT_DBG("Decryption Conf Obj request failed %d", ret);
7918                                 g_free(connect_data->ssid);
7919                                 g_free(connect_data->path);
7920                                 dbus_free(connect_data);
7921                         }
7922                 } else
7923 #endif
7924                 supplicant_dbus_method_call(data->interface->path,
7925                         SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
7926                         interface_add_network_params,
7927                         interface_add_network_result, connect_data,
7928                         connect_data->interface);
7929         } else {
7930                 if (data->callback)
7931                         data->callback(result, data->interface, data->user_data);
7932         }
7933         g_free(data->path);
7934         dbus_free(data);
7935 }
7936
7937 static void network_remove_params(DBusMessageIter *iter, void *user_data)
7938 {
7939         struct interface_data *data = user_data;
7940         const char *path = data->interface->network_path;
7941
7942         SUPPLICANT_DBG("path %s", path);
7943
7944         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH, &path);
7945 }
7946
7947 static int network_remove(struct interface_data *data)
7948 {
7949         GSupplicantInterface *interface = data->interface;
7950
7951         SUPPLICANT_DBG("");
7952
7953 #if defined TIZEN_EXT
7954         GSupplicantInterface *intf = NULL;
7955         /*
7956          * Check if 'interface' is valid
7957          */
7958         intf = g_hash_table_lookup(interface_table, interface->path);
7959         if (intf == NULL)
7960                 return -EINVAL;
7961 #endif
7962
7963         return supplicant_dbus_method_call(interface->path,
7964                         SUPPLICANT_INTERFACE ".Interface", "RemoveNetwork",
7965                         network_remove_params, network_remove_result, data,
7966                         interface);
7967 }
7968
7969 static void interface_disconnect_result(const char *error,
7970                                 DBusMessageIter *iter, void *user_data)
7971 {
7972         struct interface_data *data = user_data;
7973         int result = 0;
7974
7975         SUPPLICANT_DBG("");
7976
7977         if (error) {
7978                 result = -EIO;
7979                 SUPPLICANT_DBG("error: %s", error);
7980
7981                 if (g_strcmp0("org.freedesktop.DBus.Error.UnknownMethod",
7982                                                 error) == 0)
7983                         result = -ECONNABORTED;
7984         }
7985
7986         /* If we are disconnecting from previous WPS successful
7987          * association. i.e.: it did not went through AddNetwork,
7988          * and interface->network_path was never set. */
7989         if (!data->interface->network_path) {
7990                 if (data->callback)
7991                         data->callback(result, data->interface,
7992                                                         data->user_data);
7993
7994                 g_free(data->path);
7995                 dbus_free(data);
7996                 return;
7997         }
7998
7999         if (result < 0 && data->callback) {
8000                 data->callback(result, data->interface, data->user_data);
8001                 data->callback = NULL;
8002         }
8003
8004         if (result != -ECONNABORTED) {
8005                 if (network_remove(data) < 0) {
8006                         g_free(data->path);
8007                         dbus_free(data);
8008                 }
8009         } else {
8010                 g_free(data->path);
8011                 dbus_free(data);
8012         }
8013 }
8014
8015 int g_supplicant_interface_disconnect(GSupplicantInterface *interface,
8016                                         GSupplicantInterfaceCallback callback,
8017                                                         void *user_data)
8018 {
8019         struct interface_data *data;
8020         int ret;
8021
8022         SUPPLICANT_DBG("");
8023
8024         if (!interface)
8025                 return -EINVAL;
8026
8027         if (!system_available)
8028                 return -EFAULT;
8029 #if defined TIZEN_EXT
8030         if (decrypt_request_data.pending_call &&
8031                         decrypt_request_data.data &&
8032                         decrypt_request_data.data->user_data == user_data) {
8033
8034                 callback_assoc_failed(decrypt_request_data.data->user_data);
8035                 crypt_method_call_cancel();
8036
8037                 return 0;
8038         }
8039 #endif
8040         data = dbus_malloc0(sizeof(*data));
8041         if (!data)
8042                 return -ENOMEM;
8043
8044         data->interface = interface;
8045         data->path = g_strdup(interface->path);
8046         data->callback = callback;
8047         data->user_data = user_data;
8048
8049         ret = supplicant_dbus_method_call(interface->path,
8050                         SUPPLICANT_INTERFACE ".Interface", "Disconnect",
8051                         NULL, interface_disconnect_result, data,
8052                         interface);
8053
8054         if (ret < 0) {
8055                 g_free(data->path);
8056                 dbus_free(data);
8057         }
8058
8059         return ret;
8060 }
8061
8062 static void interface_p2p_find_result(const char *error,
8063                                         DBusMessageIter *iter, void *user_data)
8064 {
8065         struct interface_scan_data *data = user_data;
8066         int err = 0;
8067
8068         SUPPLICANT_DBG("error %s", error);
8069
8070         if (error)
8071                 err = -EIO;
8072
8073         if (interface_exists(data->interface, data->path)) {
8074                 if (!data->interface->ready)
8075                         err = -ENOLINK;
8076                 if (!err)
8077                         data->interface->p2p_finding = true;
8078         }
8079
8080         if (data->callback)
8081                 data->callback(err, data->interface, data->user_data);
8082
8083         g_free(data->path);
8084         dbus_free(data);
8085 }
8086
8087 static void interface_p2p_find_params(DBusMessageIter *iter, void *user_data)
8088 {
8089         DBusMessageIter dict;
8090
8091         supplicant_dbus_dict_open(iter, &dict);
8092         supplicant_dbus_dict_close(iter, &dict);
8093 }
8094
8095 int g_supplicant_interface_p2p_find(GSupplicantInterface *interface,
8096                                         GSupplicantInterfaceCallback callback,
8097                                                         void *user_data)
8098 {
8099         struct interface_scan_data *data;
8100         int ret;
8101
8102         if (!interface->p2p_support)
8103                 return -ENOTSUP;
8104
8105         ret = interface_ready_to_scan(interface);
8106         if (ret && ret != -EALREADY)
8107                 return ret;
8108
8109         data = dbus_malloc0(sizeof(*data));
8110         if (!data)
8111                 return -ENOMEM;
8112
8113         data->interface = interface;
8114         data->path = g_strdup(interface->path);
8115         data->callback = callback;
8116         data->user_data = user_data;
8117
8118         ret = supplicant_dbus_method_call(interface->path,
8119                         SUPPLICANT_INTERFACE ".Interface.P2PDevice", "Find",
8120                         interface_p2p_find_params, interface_p2p_find_result,
8121                         data, interface);
8122         if (ret < 0) {
8123                 g_free(data->path);
8124                 dbus_free(data);
8125         }
8126
8127         return ret;
8128 }
8129
8130 bool g_supplicant_interface_is_p2p_finding(GSupplicantInterface *interface)
8131 {
8132         if (!interface)
8133                 return false;
8134
8135         return interface->p2p_finding;
8136 }
8137
8138 int g_supplicant_interface_p2p_stop_find(GSupplicantInterface *interface)
8139 {
8140         if (!interface->p2p_finding)
8141                 return 0;
8142
8143         SUPPLICANT_DBG("");
8144
8145         interface->p2p_finding = false;
8146
8147         return supplicant_dbus_method_call(interface->path,
8148                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "StopFind",
8149                 NULL, NULL, NULL, NULL);
8150 }
8151
8152 static void interface_p2p_connect_result(const char *error,
8153                                         DBusMessageIter *iter, void *user_data)
8154 {
8155         struct interface_connect_data *data = user_data;
8156         int err = 0;
8157
8158         SUPPLICANT_DBG("");
8159
8160         if (error) {
8161                 SUPPLICANT_DBG("error: %s", error);
8162                 err = parse_supplicant_error(iter);
8163         }
8164
8165         if (data->callback)
8166                 data->callback(err, data->interface, data->user_data);
8167
8168         g_free(data->path);
8169         g_free(data->peer->wps_pin);
8170         g_free(data->peer->path);
8171         g_free(data->peer);
8172         g_free(data);
8173 }
8174
8175 static void interface_p2p_connect_params(DBusMessageIter *iter, void *user_data)
8176 {
8177         struct interface_connect_data *data = user_data;
8178         const char *wps = "pbc";
8179         DBusMessageIter dict;
8180         int go_intent = 7;
8181
8182         SUPPLICANT_DBG("");
8183
8184         supplicant_dbus_dict_open(iter, &dict);
8185
8186         if (data->peer->master)
8187                 go_intent = 15;
8188
8189         if (data->peer->wps_pin)
8190                 wps = "pin";
8191
8192         supplicant_dbus_dict_append_basic(&dict, "peer",
8193                                 DBUS_TYPE_OBJECT_PATH, &data->peer->path);
8194         supplicant_dbus_dict_append_basic(&dict, "wps_method",
8195                                 DBUS_TYPE_STRING, &wps);
8196         if (data->peer->wps_pin) {
8197                 supplicant_dbus_dict_append_basic(&dict, "pin",
8198                                 DBUS_TYPE_STRING, &data->peer->wps_pin);
8199         }
8200
8201         supplicant_dbus_dict_append_basic(&dict, "go_intent",
8202                                         DBUS_TYPE_INT32, &go_intent);
8203
8204         supplicant_dbus_dict_close(iter, &dict);
8205 }
8206
8207 int g_supplicant_interface_p2p_connect(GSupplicantInterface *interface,
8208                                         GSupplicantPeerParams *peer_params,
8209                                         GSupplicantInterfaceCallback callback,
8210                                         void *user_data)
8211 {
8212         struct interface_connect_data *data;
8213         int ret;
8214
8215         SUPPLICANT_DBG("");
8216
8217         if (!interface->p2p_support)
8218                 return -ENOTSUP;
8219
8220         data = dbus_malloc0(sizeof(*data));
8221         if (!data)
8222                 return -ENOMEM;
8223
8224         data->interface = interface;
8225         data->path = g_strdup(interface->path);
8226         data->peer = peer_params;
8227         data->callback = callback;
8228         data->user_data = user_data;
8229
8230         ret = supplicant_dbus_method_call(interface->path,
8231                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "Connect",
8232                 interface_p2p_connect_params, interface_p2p_connect_result,
8233                 data, interface);
8234         if (ret < 0) {
8235                 g_free(data->path);
8236                 dbus_free(data);
8237                 return ret;
8238         }
8239
8240         return -EINPROGRESS;
8241 }
8242
8243 int g_supplicant_interface_p2p_disconnect(GSupplicantInterface *interface,
8244                                         GSupplicantPeerParams *peer_params)
8245 {
8246         GSupplicantPeer *peer;
8247         int count = 0;
8248         GSList *list;
8249
8250         SUPPLICANT_DBG("");
8251
8252         if (!interface->p2p_support)
8253                 return -ENOTSUP;
8254
8255         peer = g_hash_table_lookup(interface->peer_table, peer_params->path);
8256         if (!peer)
8257                 return -ENODEV;
8258
8259         for (list = peer->groups; list; list = list->next, count++) {
8260                 const char *group_obj_path = list->data;
8261                 GSupplicantInterface *g_interface;
8262                 GSupplicantGroup *group;
8263
8264                 group = g_hash_table_lookup(group_mapping, group_obj_path);
8265                 if (!group || !group->interface)
8266                         continue;
8267
8268                 g_interface = group->interface;
8269                 supplicant_dbus_method_call(g_interface->path,
8270                                 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
8271                                 "Disconnect", NULL, NULL, NULL, g_interface);
8272         }
8273
8274         if (count == 0 && peer->current_group_iface) {
8275                 supplicant_dbus_method_call(peer->current_group_iface->path,
8276                                 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
8277                                 "Disconnect", NULL, NULL, NULL,
8278                                 peer->current_group_iface->path);
8279         }
8280
8281         peer->current_group_iface = NULL;
8282
8283         return -EINPROGRESS;
8284 }
8285
8286 struct p2p_service_data {
8287         bool registration;
8288         GSupplicantInterface *interface;
8289         GSupplicantP2PServiceParams *service;
8290         GSupplicantInterfaceCallback callback;
8291         void *user_data;
8292 };
8293
8294 static void interface_p2p_service_result(const char *error,
8295                                         DBusMessageIter *iter, void *user_data)
8296 {
8297         struct p2p_service_data *data = user_data;
8298         int result = 0;
8299
8300         SUPPLICANT_DBG("%s result - %s", data->registration ?
8301                                 "Registration" : "Deletion",
8302                                 error ? error : "Success");
8303         if (error)
8304                 result = -EINVAL;
8305
8306         if (data->callback)
8307                 data->callback(result, data->interface, data->user_data);
8308
8309         g_free(data->service->query);
8310         g_free(data->service->response);
8311         g_free(data->service->service);
8312         g_free(data->service->wfd_ies);
8313         g_free(data->service);
8314         dbus_free(data);
8315 }
8316
8317 static void interface_p2p_service_params(DBusMessageIter *iter,
8318                                                         void *user_data)
8319 {
8320         struct p2p_service_data *data = user_data;
8321         GSupplicantP2PServiceParams *service;
8322         DBusMessageIter dict;
8323         const char *type;
8324
8325         SUPPLICANT_DBG("");
8326
8327         service = data->service;
8328
8329         supplicant_dbus_dict_open(iter, &dict);
8330
8331         if (service->query && service->response) {
8332                 type = "bonjour";
8333                 supplicant_dbus_dict_append_basic(&dict, "service_type",
8334                                                 DBUS_TYPE_STRING, &type);
8335                 supplicant_dbus_dict_append_fixed_array(&dict, "query",
8336                                         DBUS_TYPE_BYTE, &service->query,
8337                                         service->query_length);
8338                 supplicant_dbus_dict_append_fixed_array(&dict, "response",
8339                                         DBUS_TYPE_BYTE, &service->response,
8340                                         service->response_length);
8341         } else if (service->version && service->service) {
8342                 type = "upnp";
8343                 supplicant_dbus_dict_append_basic(&dict, "service_type",
8344                                                 DBUS_TYPE_STRING, &type);
8345                 supplicant_dbus_dict_append_basic(&dict, "version",
8346                                         DBUS_TYPE_INT32, &service->version);
8347                 supplicant_dbus_dict_append_basic(&dict, "service",
8348                                         DBUS_TYPE_STRING, &service->service);
8349         }
8350
8351         supplicant_dbus_dict_close(iter, &dict);
8352 }
8353
8354 int g_supplicant_interface_p2p_add_service(GSupplicantInterface *interface,
8355                                 GSupplicantInterfaceCallback callback,
8356                                 GSupplicantP2PServiceParams *p2p_service_params,
8357                                 void *user_data)
8358 {
8359         struct p2p_service_data *data;
8360         int ret;
8361
8362         SUPPLICANT_DBG("");
8363
8364         if (!interface->p2p_support)
8365                 return -ENOTSUP;
8366
8367         data = dbus_malloc0(sizeof(*data));
8368         if (!data)
8369                 return -ENOMEM;
8370
8371         data->registration = true;
8372         data->interface = interface;
8373         data->service = p2p_service_params;
8374         data->callback = callback;
8375         data->user_data = user_data;
8376
8377         ret = supplicant_dbus_method_call(interface->path,
8378                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "AddService",
8379                 interface_p2p_service_params, interface_p2p_service_result,
8380                 data, interface);
8381         if (ret < 0) {
8382                 dbus_free(data);
8383                 return ret;
8384         }
8385
8386         return -EINPROGRESS;
8387 }
8388
8389 int g_supplicant_interface_p2p_del_service(GSupplicantInterface *interface,
8390                                 GSupplicantP2PServiceParams *p2p_service_params)
8391 {
8392         struct p2p_service_data *data;
8393         int ret;
8394
8395         SUPPLICANT_DBG("");
8396
8397         if (!interface->p2p_support)
8398                 return -ENOTSUP;
8399
8400         data = dbus_malloc0(sizeof(*data));
8401         if (!data)
8402                 return -ENOMEM;
8403
8404         data->interface = interface;
8405         data->service = p2p_service_params;
8406
8407         ret = supplicant_dbus_method_call(interface->path,
8408                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeleteService",
8409                 interface_p2p_service_params, interface_p2p_service_result,
8410                 data, interface);
8411         if (ret < 0) {
8412                 dbus_free(data);
8413                 return ret;
8414         }
8415
8416         return -EINPROGRESS;
8417 }
8418
8419 struct p2p_listen_data {
8420         int period;
8421         int interval;
8422 };
8423
8424 static void interface_p2p_listen_params(DBusMessageIter *iter, void *user_data)
8425 {
8426         struct p2p_listen_data *params = user_data;
8427         DBusMessageIter dict;
8428
8429         supplicant_dbus_dict_open(iter, &dict);
8430
8431         supplicant_dbus_dict_append_basic(&dict, "period",
8432                                         DBUS_TYPE_INT32, &params->period);
8433         supplicant_dbus_dict_append_basic(&dict, "interval",
8434                                         DBUS_TYPE_INT32, &params->interval);
8435         supplicant_dbus_dict_close(iter, &dict);
8436 }
8437
8438 int g_supplicant_interface_p2p_listen(GSupplicantInterface *interface,
8439                                                 int period, int interval)
8440 {
8441         struct p2p_listen_data params;
8442
8443         SUPPLICANT_DBG("");
8444
8445         if (!interface->p2p_support)
8446                 return -ENOTSUP;
8447
8448         params.period = period;
8449         params.interval = interval;
8450
8451         return supplicant_dbus_method_call(interface->path,
8452                         SUPPLICANT_INTERFACE ".Interface.P2PDevice",
8453                         "ExtendedListen", interface_p2p_listen_params,
8454                         NULL, &params, NULL);
8455 }
8456
8457 static void widi_ies_params(DBusMessageIter *iter, void *user_data)
8458 {
8459         struct p2p_service_data *data = user_data;
8460         GSupplicantP2PServiceParams *service = data->service;
8461         DBusMessageIter array;
8462
8463         SUPPLICANT_DBG("%p - %d", service->wfd_ies, service->wfd_ies_length);
8464
8465         dbus_message_iter_open_container(iter, DBUS_TYPE_ARRAY,
8466                                         DBUS_TYPE_BYTE_AS_STRING, &array);
8467
8468         if (service->wfd_ies && service->wfd_ies_length > 0) {
8469                 dbus_message_iter_append_fixed_array(&array, DBUS_TYPE_BYTE,
8470                                 &service->wfd_ies, service->wfd_ies_length);
8471         }
8472
8473         dbus_message_iter_close_container(iter, &array);
8474 }
8475
8476 int g_supplicant_set_widi_ies(GSupplicantP2PServiceParams *p2p_service_params,
8477                                         GSupplicantInterfaceCallback callback,
8478                                         void *user_data)
8479 {
8480         struct p2p_service_data *data;
8481         int ret;
8482
8483         SUPPLICANT_DBG("");
8484
8485         if (!system_available)
8486                 return -EFAULT;
8487
8488         data = dbus_malloc0(sizeof(*data));
8489         if (!data)
8490                 return -ENOMEM;
8491
8492         data->service = p2p_service_params;
8493         data->callback = callback;
8494         data->user_data = user_data;
8495
8496         if (p2p_service_params->wfd_ies)
8497                 data->registration = true;
8498
8499         ret = supplicant_dbus_property_set(SUPPLICANT_PATH,
8500                                         SUPPLICANT_INTERFACE, "WFDIEs",
8501                                         DBUS_TYPE_ARRAY_AS_STRING
8502                                         DBUS_TYPE_BYTE_AS_STRING,
8503                                         widi_ies_params,
8504                                         interface_p2p_service_result,
8505                                         data, NULL);
8506         if (ret < 0 && ret != -EINPROGRESS) {
8507                 dbus_free(data);
8508                 return ret;
8509         }
8510
8511         return -EINPROGRESS;
8512 }
8513
8514
8515 static const char *g_supplicant_rule0 = "type=signal,"
8516                                         "path=" DBUS_PATH_DBUS ","
8517                                         "sender=" DBUS_SERVICE_DBUS ","
8518                                         "interface=" DBUS_INTERFACE_DBUS ","
8519                                         "member=NameOwnerChanged,"
8520                                         "arg0=" SUPPLICANT_SERVICE;
8521 static const char *g_supplicant_rule1 = "type=signal,"
8522                         "interface=" SUPPLICANT_INTERFACE;
8523 static const char *g_supplicant_rule2 = "type=signal,"
8524                         "interface=" SUPPLICANT_INTERFACE ".Interface";
8525 static const char *g_supplicant_rule3 = "type=signal,"
8526                         "interface=" SUPPLICANT_INTERFACE ".Interface.WPS";
8527 static const char *g_supplicant_rule4 = "type=signal,"
8528                         "interface=" SUPPLICANT_INTERFACE ".BSS";
8529 static const char *g_supplicant_rule5 = "type=signal,"
8530                         "interface=" SUPPLICANT_INTERFACE ".Network";
8531 #if !defined TIZEN_EXT
8532 static const char *g_supplicant_rule6 = "type=signal,"
8533                 "interface=" SUPPLICANT_INTERFACE ".Interface.P2PDevice";
8534 static const char *g_supplicant_rule7 = "type=signal,"
8535                 "interface=" SUPPLICANT_INTERFACE ".Peer";
8536 static const char *g_supplicant_rule8 = "type=signal,"
8537                 "interface=" SUPPLICANT_INTERFACE ".Group";
8538 #endif
8539 #if defined TIZEN_EXT_WIFI_MESH
8540 static const char *g_supplicant_rule9 = "type=signal,"
8541                 "interface=" SUPPLICANT_INTERFACE ".Interface.Mesh";
8542 #endif
8543
8544 static void invoke_introspect_method(void)
8545 {
8546         DBusMessage *message;
8547
8548         message = dbus_message_new_method_call(SUPPLICANT_SERVICE,
8549                                         SUPPLICANT_PATH,
8550                                         DBUS_INTERFACE_INTROSPECTABLE,
8551                                         "Introspect");
8552
8553         if (!message)
8554                 return;
8555
8556         dbus_message_set_no_reply(message, TRUE);
8557         dbus_connection_send(connection, message, NULL);
8558         dbus_message_unref(message);
8559 }
8560
8561 #if defined TIZEN_EXT && defined TIZEN_EXT_INS
8562 void g_supplicant_set_ins_settings(GSupplicantINSPreferredFreq preferred_freq_bssid,
8563                 bool last_connected_bssid, bool assoc_reject, bool signal_bssid,
8564                 unsigned int preferred_freq_bssid_score, unsigned int last_connected_bssid_score,
8565                 unsigned int assoc_reject_score, int signal_level3_5ghz, int signal_level3_24ghz)
8566 {
8567         ins_settings.preferred_freq_bssid = preferred_freq_bssid;
8568         ins_settings.last_connected_bssid = last_connected_bssid;
8569         ins_settings.assoc_reject = assoc_reject;
8570         ins_settings.signal_bssid = signal_bssid;
8571         ins_settings.preferred_freq_bssid_score = preferred_freq_bssid_score;
8572         ins_settings.last_connected_bssid_score = last_connected_bssid_score;
8573         ins_settings.assoc_reject_score = assoc_reject_score;
8574         ins_settings.signal_level3_5ghz = signal_level3_5ghz;
8575         ins_settings.signal_level3_24ghz = signal_level3_24ghz;
8576
8577         SUPPLICANT_DBG("preferred_freq_bssid [%s]", preferred_freq_bssid ? "true" : "false");
8578         SUPPLICANT_DBG("preferred_freq_bssid_score [%d]", preferred_freq_bssid_score);
8579         SUPPLICANT_DBG("last_connected_bssid [%s]", last_connected_bssid ? "true" : "false");
8580         SUPPLICANT_DBG("last_connected_bssid_score [%d]", last_connected_bssid_score);
8581         SUPPLICANT_DBG("assoc_reject [%s]", assoc_reject ? "true" : "false");
8582         SUPPLICANT_DBG("assoc_reject_score [%d]", assoc_reject_score);
8583         SUPPLICANT_DBG("signal_bssid [%s]", signal_bssid ? "true" : "false");
8584         SUPPLICANT_DBG("signal_level3_5ghz [%d]", signal_level3_5ghz);
8585         SUPPLICANT_DBG("signal_level3_24ghz [%d]", signal_level3_24ghz);
8586 }
8587 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_INS */
8588
8589 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
8590 void g_supplicant_register_eap_callback(g_supplicant_eap_callback cb)
8591 {
8592         SUPPLICANT_DBG("g_supplicant_register_eap_callback %p", cb);
8593
8594         if (!callbacks_pointer) {
8595                 SUPPLICANT_DBG("callbacks_pointer is NULL");
8596                 return;
8597         }
8598
8599         callbacks_pointer->eap = cb;
8600 }
8601
8602 void g_supplicant_unregister_eap_callback(void)
8603 {
8604         SUPPLICANT_DBG("g_supplicant_unregister_eap_callback");
8605
8606         if (!callbacks_pointer) {
8607                 SUPPLICANT_DBG("callbacks_pointer is NULL");
8608                 return;
8609         }
8610
8611         callbacks_pointer->eap = NULL;
8612 }
8613 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
8614
8615 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
8616 int g_supplicant_register(GSupplicantCallbacks *callbacks)
8617 #else /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
8618 int g_supplicant_register(const GSupplicantCallbacks *callbacks)
8619 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
8620 {
8621         connection = dbus_bus_get(DBUS_BUS_SYSTEM, NULL);
8622         if (!connection)
8623                 return -EIO;
8624
8625         if (!dbus_connection_add_filter(connection, g_supplicant_filter,
8626                                                 NULL, NULL)) {
8627                 dbus_connection_unref(connection);
8628                 connection = NULL;
8629                 return -EIO;
8630         }
8631 #if defined TIZEN_EXT
8632         simplified_log = connman_setting_get_bool("SimplifiedLog");
8633 #endif
8634         callbacks_pointer = callbacks;
8635         eap_methods = 0;
8636
8637         interface_table = g_hash_table_new_full(g_str_hash, g_str_equal,
8638                                                 NULL, remove_interface);
8639
8640         bss_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
8641                                                                 NULL, NULL);
8642         peer_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
8643                                                                 NULL, NULL);
8644         group_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
8645                                                                 NULL, NULL);
8646         pending_peer_connection = g_hash_table_new_full(g_str_hash, g_str_equal,
8647                                                                 NULL, NULL);
8648         config_file_table = g_hash_table_new_full(g_str_hash, g_str_equal,
8649                                                                 g_free, g_free);
8650
8651         supplicant_dbus_setup(connection);
8652
8653         dbus_bus_add_match(connection, g_supplicant_rule0, NULL);
8654         dbus_bus_add_match(connection, g_supplicant_rule1, NULL);
8655         dbus_bus_add_match(connection, g_supplicant_rule2, NULL);
8656         dbus_bus_add_match(connection, g_supplicant_rule3, NULL);
8657         dbus_bus_add_match(connection, g_supplicant_rule4, NULL);
8658         dbus_bus_add_match(connection, g_supplicant_rule5, NULL);
8659 #if defined TIZEN_EXT
8660         dbus_bus_add_match(connection,
8661                         "type=signal,interface=org.tizen.system.deviced.PowerOff,"
8662                         "member=ChangeState", NULL);
8663 #endif
8664 #if !defined TIZEN_EXT
8665         dbus_bus_add_match(connection, g_supplicant_rule6, NULL);
8666         dbus_bus_add_match(connection, g_supplicant_rule7, NULL);
8667         dbus_bus_add_match(connection, g_supplicant_rule8, NULL);
8668 #endif
8669 #if defined TIZEN_EXT_WIFI_MESH
8670         dbus_bus_add_match(connection, g_supplicant_rule9, NULL);
8671 #endif
8672         dbus_connection_flush(connection);
8673
8674         if (dbus_bus_name_has_owner(connection,
8675                                         SUPPLICANT_SERVICE, NULL)) {
8676                 system_available = TRUE;
8677                 supplicant_dbus_property_get_all(SUPPLICANT_PATH,
8678                                                 SUPPLICANT_INTERFACE,
8679                                                 service_property, NULL, NULL);
8680         } else
8681                 invoke_introspect_method();
8682
8683         SUPPLICANT_DBG("supplicant dbus setup completed");
8684         return 0;
8685 }
8686
8687 static void unregister_interface_remove_params(DBusMessageIter *iter,
8688                                                 void *user_data)
8689 {
8690         const char *path = user_data;
8691
8692         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
8693                                                         &path);
8694 }
8695
8696
8697 static void unregister_remove_interface(gpointer key, gpointer value,
8698                                                 gpointer user_data)
8699 {
8700         GSupplicantInterface *interface = value;
8701
8702         supplicant_dbus_method_call(SUPPLICANT_PATH,
8703                                         SUPPLICANT_INTERFACE,
8704                                         "RemoveInterface",
8705                                         unregister_interface_remove_params,
8706                                         NULL, interface->path, NULL);
8707 }
8708
8709 void g_supplicant_unregister(const GSupplicantCallbacks *callbacks)
8710 {
8711         SUPPLICANT_DBG("");
8712
8713         if (connection) {
8714 #if defined TIZEN_EXT_WIFI_MESH
8715                 dbus_bus_remove_match(connection, g_supplicant_rule9, NULL);
8716 #endif
8717 #if !defined TIZEN_EXT
8718                 dbus_bus_remove_match(connection, g_supplicant_rule8, NULL);
8719                 dbus_bus_remove_match(connection, g_supplicant_rule7, NULL);
8720                 dbus_bus_remove_match(connection, g_supplicant_rule6, NULL);
8721 #endif
8722                 dbus_bus_remove_match(connection, g_supplicant_rule5, NULL);
8723                 dbus_bus_remove_match(connection, g_supplicant_rule4, NULL);
8724                 dbus_bus_remove_match(connection, g_supplicant_rule3, NULL);
8725                 dbus_bus_remove_match(connection, g_supplicant_rule2, NULL);
8726                 dbus_bus_remove_match(connection, g_supplicant_rule1, NULL);
8727                 dbus_bus_remove_match(connection, g_supplicant_rule0, NULL);
8728                 dbus_connection_flush(connection);
8729
8730                 dbus_connection_remove_filter(connection,
8731                                                 g_supplicant_filter, NULL);
8732         }
8733
8734         if (config_file_table) {
8735                 g_hash_table_destroy(config_file_table);
8736                 config_file_table = NULL;
8737         }
8738
8739         if (bss_mapping) {
8740                 g_hash_table_destroy(bss_mapping);
8741                 bss_mapping = NULL;
8742         }
8743
8744         if (peer_mapping) {
8745                 g_hash_table_destroy(peer_mapping);
8746                 peer_mapping = NULL;
8747         }
8748
8749         if (group_mapping) {
8750                 g_hash_table_destroy(group_mapping);
8751                 group_mapping = NULL;
8752         }
8753
8754         if (interface_table) {
8755                 g_hash_table_foreach(interface_table,
8756                                         unregister_remove_interface, NULL);
8757                 g_hash_table_destroy(interface_table);
8758                 interface_table = NULL;
8759         }
8760
8761         if (system_available)
8762                 callback_system_killed();
8763
8764         if (connection) {
8765                 dbus_connection_unref(connection);
8766                 connection = NULL;
8767         }
8768
8769         callbacks_pointer = NULL;
8770         eap_methods = 0;
8771 }
8772
8773 #ifdef TIZEN_EXT
8774 struct supplicant_mac_policy {
8775         GSupplicantMacPolicyCallback callback;
8776         dbus_uint32_t policy;
8777         const void *user_data;
8778 };
8779
8780 static void mac_policy_result(const char *error,
8781                                 DBusMessageIter *iter, void *user_data)
8782 {
8783         struct supplicant_mac_policy *data = user_data;
8784         int result = 0;
8785
8786         if (!user_data)
8787                 return;
8788
8789         if (error) {
8790                 SUPPLICANT_DBG("Mac policy setting failure %s", error);
8791                 result = -EINVAL;
8792         }
8793
8794         if (data->callback)
8795                 data->callback(result, data->policy,
8796                                         (void *) data->user_data);
8797
8798         dbus_free(data);
8799 }
8800
8801 static void mac_policy_params(DBusMessageIter *iter, void *user_data)
8802 {
8803         struct supplicant_mac_policy *data = user_data;
8804
8805         dbus_message_iter_append_basic(iter, DBUS_TYPE_INT32, &(data->policy));
8806 }
8807
8808 int g_supplicant_interface_set_mac_policy(GSupplicantInterface *interface,
8809                                         GSupplicantMacPolicyCallback callback,
8810                                                         unsigned int policy,
8811                                                         void *user_data)
8812 {
8813         struct supplicant_mac_policy *data = NULL;
8814         int ret;
8815
8816         if (!system_available)
8817                 return -EFAULT;
8818
8819         if (!interface)
8820                 return -EINVAL;
8821
8822         data = dbus_malloc0(sizeof(*data));
8823         if (!data)
8824                 return -ENOMEM;
8825
8826         data->callback = callback;
8827         data->policy = policy;
8828         data->user_data = user_data;
8829
8830         ret =  supplicant_dbus_property_set(interface->path,
8831                                 SUPPLICANT_INTERFACE ".Interface",
8832                                 "MacAddr", DBUS_TYPE_INT32_AS_STRING,
8833                                 mac_policy_params, mac_policy_result, data, NULL);
8834         if (ret < 0) {
8835                 SUPPLICANT_DBG("Unable to set MacAddr configuration");
8836                 dbus_free(data);
8837         }
8838
8839         return ret;
8840 }
8841
8842 int g_supplicant_interface_set_preassoc_mac_policy(GSupplicantInterface *interface,
8843                                         GSupplicantMacPolicyCallback callback,
8844                                                         unsigned int policy,
8845                                                         void *user_data)
8846 {
8847         struct supplicant_mac_policy *data;
8848         int ret;
8849
8850         if (!system_available)
8851                 return -EFAULT;
8852
8853         if (!interface)
8854                 return -EINVAL;
8855
8856         data = dbus_malloc0(sizeof(*data));
8857         if (!data)
8858                 return -ENOMEM;
8859
8860         data->callback = callback;
8861         data->policy = policy;
8862         data->user_data = user_data;
8863
8864         ret =  supplicant_dbus_property_set(interface->path,
8865                                 SUPPLICANT_INTERFACE ".Interface",
8866                                 "PreassocMacAddr", DBUS_TYPE_INT32_AS_STRING,
8867                                 mac_policy_params, mac_policy_result, data, NULL);
8868         if (ret < 0) {
8869                 SUPPLICANT_DBG("Unable to set PreassocMacAddr configuration");
8870                 dbus_free(data);
8871         }
8872
8873         return ret;
8874 }
8875
8876 struct supplicant_random_mac_lifetime {
8877         GSupplicantRandomMaclifetimeCallback callback;
8878         dbus_uint32_t lifetime;
8879         const void *user_data;
8880 };
8881
8882 static void random_mac_lifetime_result(const char *error,
8883                                 DBusMessageIter *iter, void *user_data)
8884 {
8885         struct supplicant_random_mac_lifetime *data = user_data;
8886         int result = 0;
8887
8888         if (!user_data)
8889                 return;
8890
8891         if (error) {
8892                 SUPPLICANT_DBG("Random Mac lifetime setting failure %s", error);
8893                 result = -EINVAL;
8894         }
8895
8896         if (data->callback)
8897                 data->callback(result, data->lifetime,
8898                                         (void *) data->user_data);
8899
8900         dbus_free(data);
8901 }
8902
8903 static void random_mac_lifetime_params(DBusMessageIter *iter, void *user_data)
8904 {
8905         struct supplicant_random_mac_lifetime *data = user_data;
8906
8907         dbus_message_iter_append_basic(iter, DBUS_TYPE_UINT32, &(data->lifetime));
8908 }
8909
8910 int g_supplicant_interface_set_random_mac_lifetime(GSupplicantInterface *interface,
8911                                         GSupplicantRandomMaclifetimeCallback callback,
8912                                                         unsigned int lifetime,
8913                                                         void *user_data)
8914 {
8915         struct supplicant_random_mac_lifetime *data;
8916         int ret;
8917
8918         if (!system_available)
8919                 return -EFAULT;
8920
8921         if (!interface)
8922                 return -EINVAL;
8923
8924         data = dbus_malloc0(sizeof(*data));
8925         if (!data)
8926                 return -ENOMEM;
8927
8928         data->callback = callback;
8929         data->lifetime = lifetime;
8930         data->user_data = user_data;
8931
8932         ret =  supplicant_dbus_property_set(interface->path,
8933                                 SUPPLICANT_INTERFACE ".Interface",
8934                                 "RandAddrLifetime", DBUS_TYPE_UINT32_AS_STRING,
8935                                 random_mac_lifetime_params, random_mac_lifetime_result,
8936                                 data, NULL);
8937         if (ret < 0) {
8938                 SUPPLICANT_DBG("Unable to set RandAddrLifetime configuration");
8939                 dbus_free(data);
8940         }
8941
8942         return ret;
8943 }
8944 #endif