5 * Copyright (C) 2007-2010 Intel Corporation. All rights reserved.
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
31 #include <sys/ioctl.h>
32 #include <sys/socket.h>
33 #include <linux/if_arp.h>
34 #include <linux/wireless.h>
35 #include <net/ethernet.h>
39 #define CONNMAN_API_SUBJECT_TO_CHANGE
40 #include <connman/device.h>
41 #include <connman/option.h>
42 #include <connman/inet.h>
43 #include <connman/dbus.h>
44 #include <connman/wifi.h>
45 #include <connman/log.h>
47 #include "supplicant.h"
51 #define IEEE80211_CAP_ESS 0x0001
52 #define IEEE80211_CAP_IBSS 0x0002
53 #define IEEE80211_CAP_PRIVACY 0x0010
55 #define SUPPLICANT_NAME "fi.epitest.hostap.WPASupplicant"
56 #define SUPPLICANT_INTF "fi.epitest.hostap.WPASupplicant"
57 #define SUPPLICANT_PATH "/fi/epitest/hostap/WPASupplicant"
59 /* Taken from "WPA Supplicant - Common definitions" */
60 enum supplicant_state {
62 * WPA_DISCONNECTED - Disconnected state
64 * This state indicates that client is not associated, but is likely to
65 * start looking for an access point. This state is entered when a
71 * WPA_INACTIVE - Inactive state (wpa_supplicant disabled)
73 * This state is entered if there are no enabled networks in the
74 * configuration. wpa_supplicant is not trying to associate with a new
75 * network and external interaction (e.g., ctrl_iface call to add or
76 * enable a network) is needed to start association.
81 * WPA_SCANNING - Scanning for a network
83 * This state is entered when wpa_supplicant starts scanning for a
89 * WPA_ASSOCIATING - Trying to associate with a BSS/SSID
91 * This state is entered when wpa_supplicant has found a suitable BSS
92 * to associate with and the driver is configured to try to associate
93 * with this BSS in ap_scan=1 mode. When using ap_scan=2 mode, this
94 * state is entered when the driver is configured to try to associate
95 * with a network using the configured SSID and security policy.
100 * WPA_ASSOCIATED - Association completed
102 * This state is entered when the driver reports that association has
103 * been successfully completed with an AP. If IEEE 802.1X is used
104 * (with or without WPA/WPA2), wpa_supplicant remains in this state
105 * until the IEEE 802.1X/EAPOL authentication has been completed.
110 * WPA_4WAY_HANDSHAKE - WPA 4-Way Key Handshake in progress
112 * This state is entered when WPA/WPA2 4-Way Handshake is started. In
113 * case of WPA-PSK, this happens when receiving the first EAPOL-Key
114 * frame after association. In case of WPA-EAP, this state is entered
115 * when the IEEE 802.1X/EAPOL authentication has been completed.
120 * WPA_GROUP_HANDSHAKE - WPA Group Key Handshake in progress
122 * This state is entered when 4-Way Key Handshake has been completed
123 * (i.e., when the supplicant sends out message 4/4) and when Group
124 * Key rekeying is started by the AP (i.e., when supplicant receives
130 * WPA_COMPLETED - All authentication completed
132 * This state is entered when the full authentication process is
133 * completed. In case of WPA2, this happens when the 4-Way Handshake is
134 * successfully completed. With WPA, this state is entered after the
135 * Group Key Handshake; with IEEE 802.1X (non-WPA) connection is
136 * completed after dynamic keys are received (or if not used, after
137 * the EAP authentication has been completed). With static WEP keys and
138 * plaintext connections, this state is entered when an association
139 * has been completed.
141 * This state indicates that the supplicant has completed its
142 * processing for the association phase and that data connection is
148 * WPA_INVALID - Invalid state (parsing error)
150 * This state is returned if the string input is invalid. It is not
151 * an official wpa_supplicant state.
156 struct supplicant_result {
160 unsigned int addr_len;
162 unsigned int ssid_len;
163 dbus_uint16_t capabilities;
171 dbus_int32_t frequency;
172 dbus_int32_t quality;
175 dbus_int32_t maxrate;
178 struct supplicant_block {
185 struct supplicant_task {
189 struct connman_device *device;
190 struct connman_network *network;
191 struct connman_network *pending_network;
194 gboolean hidden_found;
195 GHashTable *hidden_blocks;
197 enum supplicant_state state;
199 GSList *scan_results;
200 DBusPendingCall *scan_call;
201 DBusPendingCall *result_call;
202 struct iw_range *range;
203 gboolean disconnecting;
206 static GSList *task_list = NULL;
208 static DBusConnection *connection;
210 static void free_task(struct supplicant_task *task)
212 DBG("task %p", task);
214 g_free(task->ifname);
219 static void remove_block(gpointer user_data)
221 struct supplicant_block *block = user_data;
226 g_free(block->netpath);
229 static struct supplicant_task *find_task_by_index(int index)
233 for (list = task_list; list; list = list->next) {
234 struct supplicant_task *task = list->data;
236 if (task->ifindex == index)
243 static struct supplicant_task *find_task_by_path(const char *path)
247 for (list = task_list; list; list = list->next) {
248 struct supplicant_task *task = list->data;
250 if (g_strcmp0(task->path, path) == 0)
257 static int get_range(struct supplicant_task *task)
262 fd = socket(PF_INET, SOCK_DGRAM, 0);
266 memset(&wrq, 0, sizeof(struct iwreq));
267 strncpy(wrq.ifr_name, task->ifname, IFNAMSIZ);
268 wrq.u.data.pointer = task->range;
269 wrq.u.data.length = sizeof(struct iw_range);
271 err = ioctl(fd, SIOCGIWRANGE, &wrq);
276 task->range->max_qual.updated |= IW_QUAL_ALL_INVALID;
278 connman_info("%s {scan} capabilities 0x%02x", task->ifname,
279 task->range->scan_capa);
281 connman_info("%s {quality} flags 0x%02x", task->ifname,
282 task->range->max_qual.updated);
287 static int get_bssid(struct connman_device *device,
288 unsigned char *bssid, unsigned int *bssid_len)
295 ifindex = connman_device_get_index(device);
299 ifname = connman_inet_ifname(ifindex);
303 fd = socket(PF_INET, SOCK_DGRAM, 0);
309 memset(&wrq, 0, sizeof(wrq));
310 strncpy(wrq.ifr_name, ifname, IFNAMSIZ);
312 err = ioctl(fd, SIOCGIWAP, &wrq);
320 memcpy(bssid, wrq.u.ap_addr.sa_data, ETH_ALEN);
321 *bssid_len = ETH_ALEN;
326 static int enable_network(struct supplicant_task *task, const char *netpath,
327 connman_bool_t enable)
329 DBusMessage *message, *reply;
333 DBG("enable %d", enable);
335 enable_string = enable ? "enable" : "disable";
337 message = dbus_message_new_method_call(SUPPLICANT_NAME, netpath,
338 SUPPLICANT_INTF ".Network", enable_string);
342 dbus_message_set_auto_start(message, FALSE);
344 dbus_error_init(&error);
346 reply = dbus_connection_send_with_reply_and_block(connection,
347 message, -1, &error);
349 if (dbus_error_is_set(&error) == TRUE) {
350 connman_error("%s", error.message);
351 dbus_error_free(&error);
353 connman_error("Failed to select network");
354 dbus_message_unref(message);
358 dbus_message_unref(reply);
360 dbus_message_unref(message);
365 static int set_hidden_network(struct supplicant_task *task, const char *netpath,
366 const unsigned char *ssid, int ssid_len)
368 DBusMessage *message, *reply;
369 DBusMessageIter array, dict;
371 dbus_uint32_t scan_ssid = 1;
372 const char *invalid_address = "ff:ff:ff:ff:ff:ff";
374 message = dbus_message_new_method_call(SUPPLICANT_NAME, netpath,
375 SUPPLICANT_INTF ".Network", "set");
379 dbus_message_set_auto_start(message, FALSE);
381 dbus_message_iter_init_append(message, &array);
383 connman_dbus_dict_open(&array, &dict);
385 connman_dbus_dict_append_basic(&dict, "scan_ssid",
386 DBUS_TYPE_UINT32, &scan_ssid);
388 connman_dbus_dict_append_fixed_array(&dict, "ssid",
389 DBUS_TYPE_BYTE, &ssid, ssid_len);
392 * We're setting an invalid BSSID to prevent wpa_s from associating
393 * automatically to this block once it's found.
395 connman_dbus_dict_append_basic(&dict, "bssid",
396 DBUS_TYPE_STRING, &invalid_address);
398 connman_dbus_dict_close(&array, &dict);
400 dbus_error_init(&error);
402 reply = dbus_connection_send_with_reply_and_block(connection,
403 message, -1, &error);
405 if (dbus_error_is_set(&error) == TRUE) {
406 connman_error("%s", error.message);
407 dbus_error_free(&error);
409 connman_error("Failed to set network options");
410 dbus_message_unref(message);
414 dbus_message_unref(reply);
416 dbus_message_unref(message);
421 static void block_reset(gpointer key, gpointer value, gpointer user_data)
423 struct supplicant_block *block = value;
424 struct supplicant_task *task = user_data;
426 block->num_scans = 0;
428 enable_network(task, block->netpath, FALSE);
430 block->enabled = FALSE;
433 #define MAX_BLOCK_SCANS 2
434 static void hidden_block_enable(struct supplicant_task *task)
438 struct supplicant_block *block;
440 DBG("network %p", task->network);
442 if (g_hash_table_size(task->hidden_blocks) == 0)
446 * If we're associated or associating, we no longer need to
447 * look for hidden networks.
453 * We go through the block list and:
454 * - If we scanned it more than twice, we disable it and move
455 * on to the next block.
456 * - If the next block is not enabled, we enable it, start
457 * the scan counter, and return. This routine will be called
458 * again when the next scan results are available.
459 * - If we're done with all the blocks there, we just reset them.
461 g_hash_table_iter_init(&iter, task->hidden_blocks);
462 while (g_hash_table_iter_next(&iter, &key, &value)) {
465 DBG("%s num of scans %d enabled %d",
466 block->ssid, block->num_scans, block->enabled);
468 if (block->num_scans > MAX_BLOCK_SCANS) {
469 if (block->enabled == FALSE)
472 enable_network(task, block->netpath, FALSE);
473 block->enabled = FALSE;
477 if (block->enabled == FALSE) {
478 enable_network(task, block->netpath, TRUE);
479 block->enabled = TRUE;
487 g_hash_table_foreach(task->hidden_blocks, block_reset, task);
490 static int add_hidden_network(struct supplicant_task *task,
491 const unsigned char *ssid, int ssid_len)
493 DBusMessage *message, *reply;
496 struct supplicant_block *block;
497 char *netpath = NULL;
500 DBG("task %p", task);
502 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
503 SUPPLICANT_INTF ".Interface", "addNetwork");
507 dbus_message_set_auto_start(message, FALSE);
509 dbus_error_init(&error);
511 reply = dbus_connection_send_with_reply_and_block(connection,
512 message, -1, &error);
514 if (dbus_error_is_set(&error) == TRUE) {
515 connman_error("%s", error.message);
516 dbus_error_free(&error);
518 connman_error("Failed to add network");
519 dbus_message_unref(message);
523 dbus_error_init(&error);
525 if (dbus_message_get_args(reply, &error, DBUS_TYPE_OBJECT_PATH, &path,
526 DBUS_TYPE_INVALID) == FALSE) {
527 if (dbus_error_is_set(&error) == TRUE) {
528 connman_error("%s", error.message);
529 dbus_error_free(&error);
531 connman_error("Wrong arguments for network");
532 dbus_message_unref(reply);
536 netpath = g_strdup(path);
538 ret = set_hidden_network(task, netpath, ssid, ssid_len);
542 block = g_try_new0(struct supplicant_block, 1);
546 block->ssid = g_try_malloc0(ssid_len + 1);
547 if (block->ssid == NULL) {
552 for (i = 0; i < ssid_len; i++) {
553 if (g_ascii_isprint(ssid[i]))
554 block->ssid[i] = ssid[i];
556 block->ssid[i] = ' ';
559 block->netpath = netpath;
560 block->enabled = FALSE;
561 block->num_scans = 0;
563 DBG("path %s ssid %s", block->netpath, block->ssid);
565 g_hash_table_replace(task->hidden_blocks, block->ssid, block);
571 dbus_message_unref(reply);
573 dbus_message_unref(message);
578 static void add_interface_reply(DBusPendingCall *call, void *user_data)
580 struct supplicant_task *task = user_data;
584 char **hex_ssids, *hex_ssid;
587 DBG("task %p", task);
589 reply = dbus_pending_call_steal_reply(call);
591 if (dbus_message_get_type(reply) == DBUS_MESSAGE_TYPE_ERROR)
594 dbus_error_init(&error);
596 if (dbus_message_get_args(reply, &error, DBUS_TYPE_OBJECT_PATH, &path,
597 DBUS_TYPE_INVALID) == FALSE) {
598 if (dbus_error_is_set(&error) == TRUE) {
599 connman_error("%s", error.message);
600 dbus_error_free(&error);
602 connman_error("Wrong arguments for add interface");
606 DBG("path %s", path);
608 task->path = g_strdup(path);
609 task->created = TRUE;
611 connman_device_set_powered(task->device, TRUE);
613 dbus_message_unref(reply);
615 dbus_pending_call_unref(call);
617 hex_ssids = connman_wifi_load_ssid();
618 if (hex_ssids == NULL)
621 for (i = 0; hex_ssids[i]; i++) {
623 unsigned int j, k = 0, hex;
626 hex_ssid = hex_ssids[i];
627 hex_ssid_len = strlen(hex_ssid);
629 ssid = g_try_malloc0(hex_ssid_len / 2 + 1);
633 for (j = 0, k = 0; j < hex_ssid_len; j += 2) {
634 sscanf(hex_ssid + j, "%02x", &hex);
638 if (add_hidden_network(task, ssid, hex_ssid_len / 2) < 0)
642 g_strfreev(hex_ssids);
647 dbus_message_unref(reply);
649 dbus_pending_call_unref(call);
651 task_list = g_slist_remove(task_list, task);
653 connman_device_unref(task->device);
658 static int add_interface(struct supplicant_task *task)
660 const char *driver = connman_option_get_string("wifi");
661 DBusMessage *message;
662 DBusMessageIter array, dict;
663 DBusPendingCall *call;
665 DBG("task %p", task);
667 message = dbus_message_new_method_call(SUPPLICANT_NAME, SUPPLICANT_PATH,
668 SUPPLICANT_INTF, "addInterface");
672 dbus_message_set_auto_start(message, FALSE);
674 dbus_message_iter_init_append(message, &array);
676 dbus_message_iter_append_basic(&array,
677 DBUS_TYPE_STRING, &task->ifname);
679 connman_dbus_dict_open(&array, &dict);
681 connman_dbus_dict_append_basic(&dict, "driver",
682 DBUS_TYPE_STRING, &driver);
684 connman_dbus_dict_close(&array, &dict);
686 if (dbus_connection_send_with_reply(connection, message,
687 &call, TIMEOUT) == FALSE) {
688 connman_error("Failed to add interface");
689 dbus_message_unref(message);
694 connman_error("D-Bus connection not available");
695 dbus_message_unref(message);
699 dbus_pending_call_set_notify(call, add_interface_reply, task, NULL);
701 dbus_message_unref(message);
706 static void get_interface_reply(DBusPendingCall *call, void *user_data)
708 struct supplicant_task *task = user_data;
713 DBG("task %p", task);
715 reply = dbus_pending_call_steal_reply(call);
717 if (dbus_message_get_type(reply) == DBUS_MESSAGE_TYPE_ERROR) {
722 dbus_error_init(&error);
724 if (dbus_message_get_args(reply, &error, DBUS_TYPE_OBJECT_PATH, &path,
725 DBUS_TYPE_INVALID) == FALSE) {
726 if (dbus_error_is_set(&error) == TRUE) {
727 connman_error("%s", error.message);
728 dbus_error_free(&error);
730 connman_error("Wrong arguments for get interface");
734 DBG("path %s", path);
736 task->path = g_strdup(path);
737 task->created = FALSE;
739 connman_device_set_powered(task->device, TRUE);
742 dbus_message_unref(reply);
744 dbus_pending_call_unref(call);
747 static int create_interface(struct supplicant_task *task)
749 DBusMessage *message;
750 DBusPendingCall *call;
752 DBG("task %p", task);
754 message = dbus_message_new_method_call(SUPPLICANT_NAME, SUPPLICANT_PATH,
755 SUPPLICANT_INTF, "getInterface");
759 dbus_message_set_auto_start(message, FALSE);
761 dbus_message_append_args(message, DBUS_TYPE_STRING, &task->ifname,
764 if (dbus_connection_send_with_reply(connection, message,
765 &call, TIMEOUT) == FALSE) {
766 connman_error("Failed to get interface");
767 dbus_message_unref(message);
772 connman_error("D-Bus connection not available");
773 dbus_message_unref(message);
777 dbus_pending_call_set_notify(call, get_interface_reply, task, NULL);
779 dbus_message_unref(message);
784 static void remove_interface_reply(DBusPendingCall *call, void *user_data)
786 struct supplicant_task *task = user_data;
789 DBG("task %p", task);
791 reply = dbus_pending_call_steal_reply(call);
793 connman_device_set_powered(task->device, FALSE);
795 connman_device_unref(task->device);
797 connman_inet_ifdown(task->ifindex);
801 dbus_message_unref(reply);
803 dbus_pending_call_unref(call);
806 static int remove_interface(struct supplicant_task *task)
808 DBusMessage *message;
809 DBusPendingCall *call;
811 DBG("task %p", task);
813 if (task->path == NULL)
817 if (task->created == FALSE) {
818 connman_device_set_powered(task->device, FALSE);
823 message = dbus_message_new_method_call(SUPPLICANT_NAME, SUPPLICANT_PATH,
824 SUPPLICANT_INTF, "removeInterface");
828 dbus_message_set_auto_start(message, FALSE);
830 dbus_message_append_args(message, DBUS_TYPE_OBJECT_PATH, &task->path,
833 if (dbus_connection_send_with_reply(connection, message,
834 &call, TIMEOUT) == FALSE) {
835 connman_error("Failed to remove interface");
836 dbus_message_unref(message);
841 connman_error("D-Bus connection not available");
842 dbus_message_unref(message);
846 dbus_pending_call_set_notify(call, remove_interface_reply, task, NULL);
848 dbus_message_unref(message);
853 static int set_ap_scan(struct supplicant_task *task)
855 DBusMessage *message, *reply;
859 DBG("task %p", task);
861 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
862 SUPPLICANT_INTF ".Interface", "setAPScan");
866 dbus_message_set_auto_start(message, FALSE);
868 dbus_message_append_args(message, DBUS_TYPE_UINT32, &ap_scan,
871 dbus_error_init(&error);
873 reply = dbus_connection_send_with_reply_and_block(connection,
874 message, -1, &error);
876 if (dbus_error_is_set(&error) == TRUE) {
877 connman_error("%s", error.message);
878 dbus_error_free(&error);
880 connman_error("Failed to set AP scan");
881 dbus_message_unref(message);
885 dbus_message_unref(message);
887 dbus_message_unref(reply);
892 static int add_network(struct supplicant_task *task)
894 DBusMessage *message, *reply;
898 DBG("task %p", task);
900 if (task->netpath != NULL)
903 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
904 SUPPLICANT_INTF ".Interface", "addNetwork");
908 dbus_message_set_auto_start(message, FALSE);
910 dbus_error_init(&error);
912 reply = dbus_connection_send_with_reply_and_block(connection,
913 message, -1, &error);
915 if (dbus_error_is_set(&error) == TRUE) {
916 connman_error("%s", error.message);
917 dbus_error_free(&error);
919 connman_error("Failed to add network");
920 dbus_message_unref(message);
924 dbus_message_unref(message);
926 dbus_error_init(&error);
928 if (dbus_message_get_args(reply, &error, DBUS_TYPE_OBJECT_PATH, &path,
929 DBUS_TYPE_INVALID) == FALSE) {
930 if (dbus_error_is_set(&error) == TRUE) {
931 connman_error("%s", error.message);
932 dbus_error_free(&error);
934 connman_error("Wrong arguments for network");
935 dbus_message_unref(reply);
939 DBG("path %s", path);
941 task->netpath = g_strdup(path);
943 dbus_message_unref(reply);
948 static int remove_network(struct supplicant_task *task)
950 DBusMessage *message, *reply;
953 DBG("task %p", task);
955 if (task->netpath == NULL || task->path == NULL)
958 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
959 SUPPLICANT_INTF ".Interface", "removeNetwork");
963 dbus_message_set_auto_start(message, FALSE);
965 dbus_message_append_args(message, DBUS_TYPE_OBJECT_PATH, &task->netpath,
968 dbus_error_init(&error);
970 reply = dbus_connection_send_with_reply_and_block(connection,
971 message, -1, &error);
973 if (dbus_error_is_set(&error) == TRUE) {
974 connman_error("%s", error.message);
975 dbus_error_free(&error);
977 connman_error("Failed to remove network");
978 dbus_message_unref(message);
982 dbus_message_unref(message);
984 dbus_message_unref(reply);
986 g_free(task->netpath);
987 task->netpath = NULL;
992 static int select_network(struct supplicant_task *task)
994 DBusMessage *message, *reply;
997 DBG("task %p", task);
999 if (task->netpath == NULL)
1002 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
1003 SUPPLICANT_INTF ".Interface", "selectNetwork");
1004 if (message == NULL)
1007 dbus_message_set_auto_start(message, FALSE);
1009 dbus_message_append_args(message, DBUS_TYPE_OBJECT_PATH, &task->netpath,
1012 dbus_error_init(&error);
1014 reply = dbus_connection_send_with_reply_and_block(connection,
1015 message, -1, &error);
1016 if (reply == NULL) {
1017 if (dbus_error_is_set(&error) == TRUE) {
1018 connman_error("%s", error.message);
1019 dbus_error_free(&error);
1021 connman_error("Failed to select network");
1022 dbus_message_unref(message);
1026 dbus_message_unref(message);
1028 dbus_message_unref(reply);
1033 static int disconnect_network(struct supplicant_task *task)
1035 DBusMessage *message, *reply;
1038 DBG("task %p", task);
1040 if (task->path == NULL)
1043 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
1044 SUPPLICANT_INTF ".Interface", "disconnect");
1045 if (message == NULL)
1048 dbus_message_set_auto_start(message, FALSE);
1050 dbus_error_init(&error);
1052 reply = dbus_connection_send_with_reply_and_block(connection,
1053 message, -1, &error);
1054 if (reply == NULL) {
1055 if (dbus_error_is_set(&error) == TRUE) {
1056 connman_error("%s", error.message);
1057 dbus_error_free(&error);
1059 connman_error("Failed to disconnect network");
1060 dbus_message_unref(message);
1064 dbus_message_unref(message);
1066 dbus_message_unref(reply);
1071 static int set_network_tls(struct connman_network *network,
1072 DBusMessageIter *dict)
1074 const char *private_key, *client_cert, *ca_cert;
1075 const char *private_key_password;
1078 * For TLS, we at least need:
1079 * The client certificate
1080 * The client private key file
1081 * The client private key file password
1083 * The Authority certificate is optional.
1085 client_cert = connman_network_get_string(network,
1086 "WiFi.ClientCertFile");
1087 if (client_cert == NULL) {
1088 connman_error("Error in TLS authentication: "
1089 "a ClientCertFile must be defined\n");
1093 private_key = connman_network_get_string(network,
1094 "WiFi.PrivateKeyFile");
1095 if (private_key == NULL) {
1096 connman_error("Error in TLS authentication: "
1097 "a PrivateKeyFile must be defined\n");
1101 private_key_password = connman_network_get_string(network,
1102 "WiFi.PrivateKeyPassphrase");
1103 if (private_key_password == NULL) {
1104 connman_error("Error in TLS authentication: "
1105 "a PrivateKeyPassphrase must be defined\n");
1109 ca_cert = connman_network_get_string(network, "WiFi.CACertFile");
1111 connman_dbus_dict_append_basic(dict, "ca_cert",
1112 DBUS_TYPE_STRING, &ca_cert);
1114 connman_info("No CACertFile has been provided "
1115 "to do the TLS authentication\n");
1117 DBG("client cert %s private key %s", client_cert, private_key);
1119 connman_dbus_dict_append_basic(dict, "private_key",
1120 DBUS_TYPE_STRING, &private_key);
1121 connman_dbus_dict_append_basic(dict, "private_key_passwd",
1123 &private_key_password);
1124 connman_dbus_dict_append_basic(dict, "client_cert",
1125 DBUS_TYPE_STRING, &client_cert);
1130 static int set_network_peap(struct connman_network *network,
1131 DBusMessageIter *dict, const char *passphrase)
1133 const char *client_cert, *ca_cert, *phase2;
1137 * For PEAP/TTLS, we at least need
1138 * The authority certificate
1139 * The 2nd phase authentication method
1140 * The 2nd phase passphrase
1142 * The Client certificate is optional although strongly required
1143 * When setting it, we need in addition
1144 * The Client private key file
1145 * The Client private key file password
1147 if (passphrase == NULL) {
1148 connman_error("Error in PEAP/TTLS authentication: "
1149 "a phase2 passphrase must be defined\n");
1153 ca_cert = connman_network_get_string(network, "WiFi.CACertFile");
1154 if (ca_cert == NULL) {
1155 connman_error("Error in PEAP/TTLS authentication: "
1156 "CACertFile must be defined\n");
1160 phase2 = connman_network_get_string(network, "WiFi.Phase2");
1161 if (phase2 == NULL) {
1162 connman_error("Error in PEAP/TTLS authentication: "
1163 "Phase2 must be defined\n");
1167 DBG("CA cert %s phase2 auth %s", ca_cert, phase2);
1169 client_cert = connman_network_get_string(network,
1170 "WiFi.ClientCertFile");
1172 const char *private_key, *private_key_password;
1174 private_key = connman_network_get_string(network,
1175 "WiFi.PrivateKeyFile");
1176 if (private_key == NULL) {
1177 connman_error("Error in PEAP/TTLS authentication: "
1178 "with ClientCertFile, "
1179 "PrivateKeyFile must be defined\n");
1183 private_key_password =
1184 connman_network_get_string(network,
1185 "WiFi.PrivateKeyPassphrase");
1186 if (private_key_password == NULL) {
1187 connman_error("Error in PEAP/TTLS authentication: "
1188 "with ClientCertFile, "
1189 "PrivateKeyPassphrase must be defined\n");
1193 connman_dbus_dict_append_basic(dict, "client_cert",
1194 DBUS_TYPE_STRING, &client_cert);
1196 connman_dbus_dict_append_basic(dict, "private_key",
1197 DBUS_TYPE_STRING, &private_key);
1199 connman_dbus_dict_append_basic(dict, "private_key_passwd",
1201 &private_key_password);
1203 DBG("client cert %s private key %s", client_cert, private_key);
1205 connman_info("No client certificate has been provided "
1206 "to do the PEAP/TTLS authentication\n");
1208 phase2_auth = g_strdup_printf("\"auth=%s\"", phase2);
1210 connman_dbus_dict_append_basic(dict, "password",
1211 DBUS_TYPE_STRING, &passphrase);
1213 connman_dbus_dict_append_basic(dict, "ca_cert",
1214 DBUS_TYPE_STRING, &ca_cert);
1216 connman_dbus_dict_append_basic(dict, "phase2",
1217 DBUS_TYPE_STRING, &phase2_auth);
1219 g_free(phase2_auth);
1224 static int set_network(struct supplicant_task *task,
1225 const unsigned char *network, int len,
1226 const char *address, const char *security,
1227 const char *passphrase)
1229 DBusMessage *message, *reply;
1230 DBusMessageIter array, dict;
1232 dbus_uint32_t scan_ssid = 1;
1234 DBG("task %p", task);
1236 if (task->netpath == NULL)
1239 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->netpath,
1240 SUPPLICANT_INTF ".Network", "set");
1241 if (message == NULL)
1244 dbus_message_set_auto_start(message, FALSE);
1246 dbus_message_iter_init_append(message, &array);
1248 connman_dbus_dict_open(&array, &dict);
1250 connman_dbus_dict_append_basic(&dict, "scan_ssid",
1251 DBUS_TYPE_UINT32, &scan_ssid);
1254 connman_dbus_dict_append_fixed_array(&dict, "ssid",
1255 DBUS_TYPE_BYTE, &network, len);
1257 connman_dbus_dict_append_basic(&dict, "bssid",
1258 DBUS_TYPE_STRING, &address);
1260 if (g_ascii_strcasecmp(security, "psk") == 0 ||
1261 g_ascii_strcasecmp(security, "wpa") == 0 ||
1262 g_ascii_strcasecmp(security, "rsn") == 0) {
1263 const char *key_mgmt = "WPA-PSK";
1264 connman_dbus_dict_append_basic(&dict, "key_mgmt",
1265 DBUS_TYPE_STRING, &key_mgmt);
1267 if (passphrase && strlen(passphrase) > 0)
1268 connman_dbus_dict_append_basic(&dict, "psk",
1269 DBUS_TYPE_STRING, &passphrase);
1270 } else if (g_ascii_strcasecmp(security, "ieee8021x") == 0) {
1271 struct connman_network *network = task->network;
1272 const char *key_mgmt = "WPA-EAP", *eap, *identity;
1276 * If our private key password is unset,
1277 * we use the supplied passphrase. That is needed
1278 * for PEAP where 2 passphrases (identity and client
1279 * cert may have to be provided.
1281 if (connman_network_get_string(network,
1282 "WiFi.PrivateKeyPassphrase") == NULL)
1283 connman_network_set_string(network,
1284 "WiFi.PrivateKeyPassphrase",
1287 eap = connman_network_get_string(network, "WiFi.EAP");
1291 /* We must have an identity for both PEAP and TLS */
1292 identity = connman_network_get_string(network, "WiFi.Identity");
1293 if (identity == NULL)
1296 DBG("key_mgmt %s eap %s identity %s", key_mgmt, eap, identity);
1298 if (g_strcmp0(eap, "tls") == 0) {
1301 err = set_network_tls(network, &dict);
1303 dbus_message_unref(message);
1306 } else if (g_strcmp0(eap, "peap") == 0 ||
1307 g_strcmp0(eap, "ttls") == 0) {
1310 err = set_network_peap(network, &dict, passphrase);
1312 dbus_message_unref(message);
1316 connman_error("Unknown EAP %s", eap);
1320 /* wpa_supplicant only accepts upper case EAPs */
1321 eap_value = g_ascii_strup(eap, -1);
1323 connman_dbus_dict_append_basic(&dict, "key_mgmt",
1326 connman_dbus_dict_append_basic(&dict, "eap",
1329 connman_dbus_dict_append_basic(&dict, "identity",
1335 } else if (g_ascii_strcasecmp(security, "wep") == 0) {
1336 const char *key_mgmt = "NONE";
1337 const char *auth_alg = "OPEN";
1338 const char *key_index = "0";
1340 if (task->cfg80211 == TRUE)
1341 auth_alg = "OPEN SHARED";
1343 connman_dbus_dict_append_basic(&dict, "auth_alg",
1344 DBUS_TYPE_STRING, &auth_alg);
1346 connman_dbus_dict_append_basic(&dict, "key_mgmt",
1347 DBUS_TYPE_STRING, &key_mgmt);
1350 int size = strlen(passphrase);
1351 if (size == 10 || size == 26) {
1352 unsigned char *key = malloc(13);
1355 memset(tmp, 0, sizeof(tmp));
1358 for (i = 0; i < size / 2; i++) {
1359 memcpy(tmp, passphrase + (i * 2), 2);
1360 key[i] = (unsigned char) strtol(tmp,
1363 connman_dbus_dict_append_fixed_array(&dict,
1364 "wep_key0", DBUS_TYPE_BYTE,
1367 } else if (size == 5 || size == 13) {
1368 unsigned char *key = malloc(13);
1372 for (i = 0; i < size; i++)
1373 key[i] = (unsigned char) passphrase[i];
1374 connman_dbus_dict_append_fixed_array(&dict,
1375 "wep_key0", DBUS_TYPE_BYTE,
1379 connman_dbus_dict_append_basic(&dict,
1380 "wep_key0", DBUS_TYPE_STRING,
1383 connman_dbus_dict_append_basic(&dict, "wep_tx_keyidx",
1384 DBUS_TYPE_STRING, &key_index);
1387 const char *key_mgmt = "NONE";
1388 connman_dbus_dict_append_basic(&dict, "key_mgmt",
1389 DBUS_TYPE_STRING, &key_mgmt);
1392 connman_dbus_dict_close(&array, &dict);
1394 dbus_error_init(&error);
1396 reply = dbus_connection_send_with_reply_and_block(connection,
1397 message, -1, &error);
1398 if (reply == NULL) {
1399 if (dbus_error_is_set(&error) == TRUE) {
1400 connman_error("%s", error.message);
1401 dbus_error_free(&error);
1403 connman_error("Failed to set network options");
1404 dbus_message_unref(message);
1408 dbus_message_unref(message);
1410 dbus_message_unref(reply);
1415 dbus_message_unref(message);
1419 static void scan_reply(DBusPendingCall *call, void *user_data)
1421 struct supplicant_task *task = user_data;
1424 DBG("task %p", task);
1426 task->scan_call = NULL;
1428 reply = dbus_pending_call_steal_reply(call);
1430 if (dbus_message_get_type(reply) == DBUS_MESSAGE_TYPE_ERROR) {
1431 connman_device_set_scanning(task->device, FALSE);
1435 if (task->scanning == TRUE)
1436 connman_device_set_scanning(task->device, TRUE);
1439 dbus_message_unref(reply);
1441 dbus_pending_call_unref(call);
1445 static int initiate_scan(struct supplicant_task *task)
1447 DBusMessage *message;
1449 DBG("task %p", task);
1451 if (task->path == NULL)
1454 if (task->scan_call != NULL)
1457 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
1458 SUPPLICANT_INTF ".Interface", "scan");
1459 if (message == NULL)
1462 dbus_message_set_auto_start(message, FALSE);
1464 if (dbus_connection_send_with_reply(connection, message,
1465 &task->scan_call, TIMEOUT) == FALSE) {
1466 connman_error("Failed to initiate scan");
1467 dbus_message_unref(message);
1471 if (task->scan_call == NULL) {
1472 connman_error("D-Bus connection not available");
1473 dbus_message_unref(message);
1477 dbus_pending_call_set_notify(task->scan_call, scan_reply, task, NULL);
1479 dbus_message_unref(message);
1481 return -EINPROGRESS;
1487 } special_ssid[] = {
1488 { "<hidden>", "hidden" },
1489 { "default", "linksys" },
1497 { "comcomcom", "3com" },
1499 { "Symbol", "symbol" },
1500 { "Motorola", "motorola" },
1501 { "Wireless" , "wireless" },
1506 static char *build_group(const char *addr, const char *name,
1507 const unsigned char *ssid, unsigned int ssid_len,
1508 const char *mode, const char *security)
1516 str = g_string_sized_new((ssid_len * 2) + 24);
1521 g_string_append_printf(str, "hidden_%s", addr);
1525 for (i = 0; special_ssid[i].name; i++) {
1526 if (g_strcmp0(special_ssid[i].name, name) == 0) {
1527 if (special_ssid[i].value == NULL)
1528 g_string_append_printf(str, "%s_%s",
1531 g_string_append_printf(str, "%s_%s",
1532 special_ssid[i].value, addr);
1537 if (ssid_len > 0 && ssid[0] != '\0') {
1538 for (i = 0; i < ssid_len; i++)
1539 g_string_append_printf(str, "%02x", ssid[i]);
1541 g_string_append_printf(str, "hidden_%s", addr);
1544 g_string_append_printf(str, "_%s_%s", mode, security);
1546 return g_string_free(str, FALSE);
1549 static void extract_addr(DBusMessageIter *value,
1550 struct supplicant_result *result)
1552 DBusMessageIter array;
1553 struct ether_addr eth;
1554 unsigned char *addr;
1557 dbus_message_iter_recurse(value, &array);
1558 dbus_message_iter_get_fixed_array(&array, &addr, &addr_len);
1563 result->addr = g_try_malloc(addr_len);
1564 if (result->addr == NULL)
1567 memcpy(result->addr, addr, addr_len);
1568 result->addr_len = addr_len;
1570 result->path = g_try_malloc0(13);
1571 if (result->path == NULL)
1574 memcpy(ð, addr, sizeof(eth));
1575 snprintf(result->path, 13, "%02x%02x%02x%02x%02x%02x",
1576 eth.ether_addr_octet[0],
1577 eth.ether_addr_octet[1],
1578 eth.ether_addr_octet[2],
1579 eth.ether_addr_octet[3],
1580 eth.ether_addr_octet[4],
1581 eth.ether_addr_octet[5]);
1584 static void extract_ssid(DBusMessageIter *value,
1585 struct supplicant_result *result)
1587 DBusMessageIter array;
1588 unsigned char *ssid;
1591 dbus_message_iter_recurse(value, &array);
1592 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
1597 if (ssid[0] == '\0')
1600 result->ssid = g_try_malloc(ssid_len);
1601 if (result->ssid == NULL)
1604 memcpy(result->ssid, ssid, ssid_len);
1605 result->ssid_len = ssid_len;
1607 result->name = g_try_malloc0(ssid_len + 1);
1608 if (result->name == NULL)
1611 for (i = 0; i < ssid_len; i++) {
1612 if (g_ascii_isprint(ssid[i]))
1613 result->name[i] = ssid[i];
1615 result->name[i] = ' ';
1619 static unsigned char wifi_oui[3] = { 0x00, 0x50, 0xf2 };
1620 static unsigned char ieee80211_oui[3] = { 0x00, 0x0f, 0xac };
1622 static void extract_rsn(struct supplicant_result *result,
1623 const unsigned char *buf, int len)
1642 /* Pairwise cipher */
1646 count = buf[0] | (buf[1] << 8);
1647 if (2 + (count * 4) > len)
1650 buf += 2 + (count * 4);
1651 len -= 2 + (count * 4);
1653 /* Authentication */
1657 count = buf[0] | (buf[1] << 8);
1658 if (2 + (count * 4) > len)
1661 for (i = 0; i < count; i++) {
1662 const unsigned char *ptr = buf + 2 + (i * 4);
1664 if (memcmp(ptr, wifi_oui, 3) == 0) {
1667 result->has_8021x = TRUE;
1670 result->has_psk = TRUE;
1673 } else if (memcmp(ptr, ieee80211_oui, 3) == 0) {
1676 result->has_8021x = TRUE;
1679 result->has_psk = TRUE;
1685 buf += 2 + (count * 4);
1686 len -= 2 + (count * 4);
1689 static void extract_wpaie(DBusMessageIter *value,
1690 struct supplicant_result *result)
1692 DBusMessageIter array;
1696 dbus_message_iter_recurse(value, &array);
1697 dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
1700 result->has_wpa = TRUE;
1701 extract_rsn(result, ie + 6, ie_len - 6);
1705 static void extract_rsnie(DBusMessageIter *value,
1706 struct supplicant_result *result)
1708 DBusMessageIter array;
1712 dbus_message_iter_recurse(value, &array);
1713 dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
1716 result->has_rsn = TRUE;
1717 extract_rsn(result, ie + 2, ie_len - 2);
1721 static void extract_wpsie(DBusMessageIter *value,
1722 struct supplicant_result *result)
1724 DBusMessageIter array;
1728 dbus_message_iter_recurse(value, &array);
1729 dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
1732 result->has_wps = TRUE;
1735 static void extract_capabilites(DBusMessageIter *value,
1736 struct supplicant_result *result)
1738 dbus_message_iter_get_basic(value, &result->capabilities);
1740 if (result->capabilities & IEEE80211_CAP_ESS)
1741 result->adhoc = FALSE;
1742 else if (result->capabilities & IEEE80211_CAP_IBSS)
1743 result->adhoc = TRUE;
1745 if (result->capabilities & IEEE80211_CAP_PRIVACY)
1746 result->has_wep = TRUE;
1749 static unsigned char calculate_strength(struct supplicant_task *task,
1750 struct supplicant_result *result)
1752 if (result->quality == -1 || task->range->max_qual.qual == 0) {
1753 unsigned char strength;
1755 if (result->level > 0)
1756 strength = 100 - result->level;
1758 strength = 120 + result->level;
1766 return (result->quality * 100) / task->range->max_qual.qual;
1769 static unsigned short calculate_channel(struct supplicant_result *result)
1771 if (result->frequency < 0)
1774 return (result->frequency - 2407) / 5;
1777 static void get_properties(struct supplicant_task *task);
1779 static void properties_reply(DBusPendingCall *call, void *user_data)
1781 struct supplicant_task *task = user_data;
1782 struct supplicant_result result;
1783 struct supplicant_block *block;
1784 struct connman_network *network;
1786 DBusMessageIter array, dict;
1787 unsigned char strength;
1788 unsigned short channel, frequency;
1789 const char *mode, *security;
1792 DBG("task %p", task);
1794 reply = dbus_pending_call_steal_reply(call);
1796 if (dbus_message_get_type(reply) == DBUS_MESSAGE_TYPE_ERROR)
1799 memset(&result, 0, sizeof(result));
1800 result.frequency = -1;
1801 result.quality = -1;
1805 dbus_message_iter_init(reply, &array);
1807 dbus_message_iter_recurse(&array, &dict);
1809 while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_DICT_ENTRY) {
1810 DBusMessageIter entry, value;
1813 dbus_message_iter_recurse(&dict, &entry);
1814 dbus_message_iter_get_basic(&entry, &key);
1816 dbus_message_iter_next(&entry);
1818 dbus_message_iter_recurse(&entry, &value);
1820 //type = dbus_message_iter_get_arg_type(&value);
1821 //dbus_message_iter_get_basic(&value, &val);
1829 * frequency : i (105)
1830 * capabilities : q (113)
1837 if (g_str_equal(key, "bssid") == TRUE)
1838 extract_addr(&value, &result);
1839 else if (g_str_equal(key, "ssid") == TRUE)
1840 extract_ssid(&value, &result);
1841 else if (g_str_equal(key, "wpaie") == TRUE)
1842 extract_wpaie(&value, &result);
1843 else if (g_str_equal(key, "rsnie") == TRUE)
1844 extract_rsnie(&value, &result);
1845 else if (g_str_equal(key, "wpsie") == TRUE)
1846 extract_wpsie(&value, &result);
1847 else if (g_str_equal(key, "capabilities") == TRUE)
1848 extract_capabilites(&value, &result);
1849 else if (g_str_equal(key, "frequency") == TRUE)
1850 dbus_message_iter_get_basic(&value, &result.frequency);
1851 else if (g_str_equal(key, "quality") == TRUE)
1852 dbus_message_iter_get_basic(&value, &result.quality);
1853 else if (g_str_equal(key, "noise") == TRUE)
1854 dbus_message_iter_get_basic(&value, &result.noise);
1855 else if (g_str_equal(key, "level") == TRUE)
1856 dbus_message_iter_get_basic(&value, &result.level);
1857 else if (g_str_equal(key, "maxrate") == TRUE)
1858 dbus_message_iter_get_basic(&value, &result.maxrate);
1860 dbus_message_iter_next(&dict);
1863 DBG("capabilties %u frequency %d "
1864 "quality %d noise %d level %d maxrate %d",
1865 result.capabilities, result.frequency,
1866 result.quality, result.noise,
1867 result.level, result.maxrate);
1869 if (result.path == NULL)
1872 if (result.path[0] == '\0')
1876 block = g_hash_table_lookup(task->hidden_blocks, result.name);
1878 enable_network(task, block->netpath, FALSE);
1879 g_hash_table_remove(task->hidden_blocks, block->ssid);
1883 if (result.ssid == NULL)
1884 task->hidden_found = TRUE;
1886 if (result.frequency > 0 && result.frequency < 14)
1887 result.frequency = 2407 + (5 * result.frequency);
1888 else if (result.frequency == 14)
1889 result.frequency = 2484;
1891 strength = calculate_strength(task, &result);
1892 channel = calculate_channel(&result);
1894 frequency = (result.frequency < 0) ? 0 : result.frequency;
1896 if (result.has_8021x == TRUE)
1897 security = "ieee8021x";
1898 else if (result.has_psk == TRUE)
1900 else if (result.has_wep == TRUE)
1905 mode = (result.adhoc == TRUE) ? "adhoc" : "managed";
1907 group = build_group(result.path, result.name,
1908 result.ssid, result.ssid_len,
1911 if (result.has_psk == TRUE) {
1912 if (result.has_rsn == TRUE)
1914 else if (result.has_wpa == TRUE)
1918 network = connman_device_get_network(task->device, result.path);
1919 if (network == NULL) {
1922 network = connman_network_create(result.path,
1923 CONNMAN_NETWORK_TYPE_WIFI);
1924 if (network == NULL)
1927 index = connman_device_get_index(task->device);
1928 connman_network_set_index(network, index);
1930 connman_network_set_protocol(network,
1931 CONNMAN_NETWORK_PROTOCOL_IP);
1933 connman_network_set_address(network, result.addr,
1936 if (connman_device_add_network(task->device, network) < 0) {
1937 connman_network_unref(network);
1942 if (result.name != NULL && result.name[0] != '\0')
1943 connman_network_set_name(network, result.name);
1945 if (result.ssid_len != 0)
1946 connman_network_set_blob(network, "WiFi.SSID",
1947 result.ssid, result.ssid_len);
1949 connman_network_set_string(network, "WiFi.Mode", mode);
1951 DBG("%s (%s %s) strength %d (%s)",
1952 result.name, mode, security, strength,
1953 (result.has_wps == TRUE) ? "WPS" : "no WPS");
1955 connman_network_set_available(network, TRUE);
1956 connman_network_set_strength(network, strength);
1958 connman_network_set_uint16(network, "Frequency", frequency);
1959 connman_network_set_uint16(network, "WiFi.Channel", channel);
1960 connman_network_set_string(network, "WiFi.Security", security);
1962 if (result.ssid != NULL)
1963 connman_network_set_group(network, group);
1968 g_free(result.path);
1969 g_free(result.addr);
1970 g_free(result.name);
1971 g_free(result.ssid);
1974 dbus_message_unref(reply);
1976 dbus_pending_call_unref(call);
1978 get_properties(task);
1981 static void get_properties(struct supplicant_task *task)
1983 DBusMessage *message;
1986 path = g_slist_nth_data(task->scan_results, 0);
1988 if (task->hidden_found == TRUE) {
1990 * We're done with regular scanning, let's enable
1991 * the missing network blocks if there are hidden
1994 hidden_block_enable(task);
1999 message = dbus_message_new_method_call(SUPPLICANT_NAME, path,
2000 SUPPLICANT_INTF ".BSSID",
2003 task->scan_results = g_slist_remove(task->scan_results, path);
2006 if (message == NULL)
2009 dbus_message_set_auto_start(message, FALSE);
2011 if (dbus_connection_send_with_reply(connection, message,
2012 &task->result_call, TIMEOUT) == FALSE) {
2013 connman_error("Failed to get network properties");
2014 dbus_message_unref(message);
2018 if (task->result_call == NULL) {
2019 connman_error("D-Bus connection not available");
2020 dbus_message_unref(message);
2024 dbus_pending_call_set_notify(task->result_call,
2025 properties_reply, task, NULL);
2027 dbus_message_unref(message);
2032 task->result_call = NULL;
2034 if (task->scanning == TRUE) {
2035 connman_device_set_scanning(task->device, FALSE);
2036 task->scanning = FALSE;
2040 static void scan_results_reply(DBusPendingCall *call, void *user_data)
2042 struct supplicant_task *task = user_data;
2048 DBG("task %p", task);
2050 reply = dbus_pending_call_steal_reply(call);
2052 if (dbus_message_get_type(reply) == DBUS_MESSAGE_TYPE_ERROR)
2055 dbus_error_init(&error);
2057 if (dbus_message_get_args(reply, &error,
2058 DBUS_TYPE_ARRAY, DBUS_TYPE_OBJECT_PATH,
2059 &results, &num_results,
2060 DBUS_TYPE_INVALID) == FALSE) {
2061 if (dbus_error_is_set(&error) == TRUE) {
2062 connman_error("%s", error.message);
2063 dbus_error_free(&error);
2065 connman_error("Wrong arguments for scan result");
2069 if (num_results == 0)
2072 for (i = 0; i < num_results; i++) {
2073 char *path = g_strdup(results[i]);
2077 task->scan_results = g_slist_append(task->scan_results, path);
2080 task->hidden_found = FALSE;
2082 g_strfreev(results);
2084 dbus_message_unref(reply);
2086 dbus_pending_call_unref(call);
2088 get_properties(task);
2093 dbus_message_unref(reply);
2095 dbus_pending_call_unref(call);
2097 task->result_call = NULL;
2099 if (task->scanning == TRUE) {
2100 connman_device_set_scanning(task->device, FALSE);
2101 task->scanning = FALSE;
2105 static void scan_results_available(struct supplicant_task *task)
2107 DBusMessage *message;
2109 DBG("task %p", task);
2111 if (task->result_call != NULL)
2114 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
2115 SUPPLICANT_INTF ".Interface",
2117 if (message == NULL)
2120 dbus_message_set_auto_start(message, FALSE);
2122 if (dbus_connection_send_with_reply(connection, message,
2123 &task->result_call, TIMEOUT) == FALSE) {
2124 connman_error("Failed to request scan result");
2128 if (task->result_call == NULL) {
2129 connman_error("D-Bus connection not available");
2133 if (task->scanning == TRUE)
2134 connman_device_set_scanning(task->device, TRUE);
2136 dbus_pending_call_set_notify(task->result_call,
2137 scan_results_reply, task, NULL);
2140 dbus_message_unref(message);
2143 static enum supplicant_state string2state(const char *state)
2145 if (g_str_equal(state, "INACTIVE") == TRUE)
2146 return WPA_INACTIVE;
2147 else if (g_str_equal(state, "SCANNING") == TRUE)
2148 return WPA_SCANNING;
2149 else if (g_str_equal(state, "ASSOCIATING") == TRUE)
2150 return WPA_ASSOCIATING;
2151 else if (g_str_equal(state, "ASSOCIATED") == TRUE)
2152 return WPA_ASSOCIATED;
2153 else if (g_str_equal(state, "GROUP_HANDSHAKE") == TRUE)
2154 return WPA_GROUP_HANDSHAKE;
2155 else if (g_str_equal(state, "4WAY_HANDSHAKE") == TRUE)
2156 return WPA_4WAY_HANDSHAKE;
2157 else if (g_str_equal(state, "COMPLETED") == TRUE)
2158 return WPA_COMPLETED;
2159 else if (g_str_equal(state, "DISCONNECTED") == TRUE)
2160 return WPA_DISCONNECTED;
2165 static int task_connect(struct supplicant_task *task)
2167 const char *address, *security, *passphrase;
2169 unsigned int ssid_len;
2172 g_hash_table_foreach(task->hidden_blocks, block_reset, task);
2174 connman_inet_ifup(task->ifindex);
2176 address = connman_network_get_string(task->network, "Address");
2177 security = connman_network_get_string(task->network, "WiFi.Security");
2178 passphrase = connman_network_get_string(task->network, "WiFi.Passphrase");
2180 ssid = connman_network_get_blob(task->network, "WiFi.SSID", &ssid_len);
2182 DBG("address %s security %s", address, security);
2184 if (security == NULL)
2187 if (passphrase == NULL && g_str_equal(security, "none") == FALSE &&
2188 g_str_equal(security, "ieee8021x") == FALSE)
2191 remove_network(task);
2197 err = set_network(task, ssid, ssid_len, address, security, passphrase);
2201 err = select_network(task);
2205 return -EINPROGRESS;
2208 static void scanning(struct supplicant_task *task, DBusMessage *msg)
2211 dbus_bool_t scanning;
2213 dbus_error_init(&error);
2215 if (dbus_message_get_args(msg, &error, DBUS_TYPE_BOOLEAN, &scanning,
2216 DBUS_TYPE_INVALID) == FALSE) {
2217 if (dbus_error_is_set(&error) == TRUE) {
2218 connman_error("%s", error.message);
2219 dbus_error_free(&error);
2221 connman_error("Wrong arguments for scanning");
2225 connman_info("%s scanning %s", task->ifname,
2226 scanning == TRUE ? "started" : "finished");
2229 static gboolean delayed_scan(gpointer user_data)
2231 struct supplicant_task *task = user_data;
2233 supplicant_scan(task->device);
2238 static void state_change(struct supplicant_task *task, DBusMessage *msg)
2241 const char *newstate, *oldstate;
2242 unsigned char bssid[ETH_ALEN];
2243 unsigned int bssid_len;
2244 enum supplicant_state state, prevstate;
2246 dbus_error_init(&error);
2248 if (dbus_message_get_args(msg, &error, DBUS_TYPE_STRING, &newstate,
2249 DBUS_TYPE_STRING, &oldstate,
2250 DBUS_TYPE_INVALID) == FALSE) {
2251 if (dbus_error_is_set(&error) == TRUE) {
2252 connman_error("%s", error.message);
2253 dbus_error_free(&error);
2255 connman_error("Wrong arguments for state change");
2259 DBG("state %s ==> %s", oldstate, newstate);
2261 connman_info("%s %s%s", task->ifname, newstate,
2262 task->scanning == TRUE ? " (scanning)" : "");
2264 state = string2state(newstate);
2265 if (state == WPA_INVALID)
2268 prevstate = task->state;
2269 task->state = state;
2271 if (task->network == NULL)
2274 switch (task->state) {
2276 switch (prevstate) {
2277 case WPA_ASSOCIATED:
2278 case WPA_GROUP_HANDSHAKE:
2284 /* reset scan trigger and schedule background scan */
2285 connman_device_schedule_scan(task->device);
2287 if (get_bssid(task->device, bssid, &bssid_len) == 0)
2288 connman_network_set_address(task->network,
2292 connman_network_set_connected(task->network, TRUE);
2295 case WPA_ASSOCIATING:
2296 switch (prevstate) {
2300 connman_network_set_associating(task->network, TRUE);
2308 switch (prevstate) {
2310 case WPA_DISCONNECTED:
2317 case WPA_DISCONNECTED:
2319 connman_network_set_connected(task->network, FALSE);
2322 * Reset the passphrase if we're being disconnected before
2323 * association/handshake completes.
2325 if (prevstate != WPA_COMPLETED && state == WPA_DISCONNECTED)
2326 connman_network_set_passphrase(task->network, NULL);
2328 if (task->disconnecting == TRUE) {
2329 connman_network_unref(task->network);
2330 task->disconnecting = FALSE;
2332 if (task->pending_network != NULL) {
2333 task->network = task->pending_network;
2334 task->pending_network = NULL;
2337 task->network = NULL;
2339 if (task->state == WPA_DISCONNECTED)
2340 g_timeout_add_seconds(10, delayed_scan, task);
2342 remove_network(task);
2348 connman_network_set_associating(task->network, FALSE);
2355 connman_error("%s invalid state change %s -> %s", task->ifname,
2356 oldstate, newstate);
2359 static gboolean supplicant_filter(DBusConnection *conn,
2360 DBusMessage *msg, void *data)
2362 struct supplicant_task *task;
2363 const char *member, *path;
2365 member = dbus_message_get_member(msg);
2369 path = dbus_message_get_path(msg);
2373 task = find_task_by_path(path);
2377 DBG("task %p member %s", task, member);
2379 if (g_str_equal(member, "ScanResultsAvailable") == TRUE)
2380 scan_results_available(task);
2381 else if (g_str_equal(member, "Scanning") == TRUE)
2382 scanning(task, msg);
2383 else if (g_str_equal(member, "StateChange") == TRUE)
2384 state_change(task, msg);
2389 int supplicant_start(struct connman_device *device)
2391 struct supplicant_task *task;
2394 DBG("device %p", device);
2396 task = g_try_new0(struct supplicant_task, 1);
2400 task->ifindex = connman_device_get_index(device);
2401 task->ifname = connman_inet_ifname(task->ifindex);
2403 if (task->ifname == NULL) {
2408 task->cfg80211 = connman_inet_is_cfg80211(task->ifindex);
2409 if (task->cfg80211 == FALSE)
2410 connman_warn("Enabling quirks for unsupported driver");
2412 task->range = g_try_malloc0(sizeof(struct iw_range));
2413 if (task->range == NULL) {
2418 err = get_range(task);
2422 task->device = connman_device_ref(device);
2424 task->created = FALSE;
2425 task->scanning = FALSE;
2426 task->state = WPA_INVALID;
2427 task->disconnecting = FALSE;
2428 task->pending_network = NULL;
2429 task->hidden_blocks = g_hash_table_new_full(g_str_hash, g_str_equal,
2430 NULL, remove_block);
2431 task_list = g_slist_append(task_list, task);
2433 return create_interface(task);
2436 g_free(task->range);
2437 g_free(task->ifname);
2443 int supplicant_stop(struct connman_device *device)
2445 int index = connman_device_get_index(device);
2446 struct supplicant_task *task;
2448 DBG("device %p", device);
2450 task = find_task_by_index(index);
2454 g_free(task->range);
2456 task_list = g_slist_remove(task_list, task);
2457 g_hash_table_destroy(task->hidden_blocks);
2459 if (task->scan_call != NULL) {
2460 dbus_pending_call_cancel(task->scan_call);
2461 task->scan_call = NULL;
2464 if (task->result_call != NULL) {
2465 dbus_pending_call_cancel(task->result_call);
2466 task->result_call = NULL;
2469 if (task->scanning == TRUE)
2470 connman_device_set_scanning(task->device, FALSE);
2472 remove_network(task);
2474 disconnect_network(task);
2476 return remove_interface(task);
2479 int supplicant_scan(struct connman_device *device)
2481 int index = connman_device_get_index(device);
2482 struct supplicant_task *task;
2485 DBG("device %p", device);
2487 task = find_task_by_index(index);
2491 switch (task->state) {
2494 case WPA_ASSOCIATING:
2495 case WPA_ASSOCIATED:
2496 case WPA_4WAY_HANDSHAKE:
2497 case WPA_GROUP_HANDSHAKE:
2503 task->scanning = TRUE;
2505 err = initiate_scan(task);
2507 if (err == -EINPROGRESS)
2510 task->scanning = FALSE;
2514 connman_device_set_scanning(task->device, TRUE);
2519 int supplicant_connect(struct connman_network *network)
2521 struct supplicant_task *task;
2524 DBG("network %p", network);
2526 index = connman_network_get_index(network);
2528 task = find_task_by_index(index);
2532 if (task->disconnecting == TRUE)
2533 task->pending_network = connman_network_ref(network);
2535 task->network = connman_network_ref(network);
2536 return task_connect(task);
2539 return -EINPROGRESS;
2542 int supplicant_disconnect(struct connman_network *network)
2544 struct supplicant_task *task;
2547 DBG("network %p", network);
2549 index = connman_network_get_index(network);
2551 task = find_task_by_index(index);
2555 if (task->disconnecting == TRUE)
2558 remove_network(task);
2560 disconnect_network(task);
2562 task->disconnecting = TRUE;
2567 static void supplicant_activate(DBusConnection *conn)
2569 DBusMessage *message;
2571 DBG("conn %p", conn);
2573 message = dbus_message_new_method_call(SUPPLICANT_NAME, "/",
2574 DBUS_INTERFACE_INTROSPECTABLE, "Introspect");
2575 if (message == NULL)
2578 dbus_message_set_no_reply(message, TRUE);
2580 dbus_connection_send(conn, message, NULL);
2582 dbus_message_unref(message);
2585 static GSList *driver_list = NULL;
2587 static void supplicant_probe(DBusConnection *conn, void *user_data)
2591 DBG("conn %p", conn);
2593 for (list = driver_list; list; list = list->next) {
2594 struct supplicant_driver *driver = list->data;
2596 DBG("driver %p name %s", driver, driver->name);
2603 static void supplicant_remove(DBusConnection *conn, void *user_data)
2607 DBG("conn %p", conn);
2609 for (list = driver_list; list; list = list->next) {
2610 struct supplicant_driver *driver = list->data;
2612 DBG("driver %p name %s", driver, driver->name);
2620 static guint iface_watch;
2622 static int supplicant_create(void)
2624 if (g_slist_length(driver_list) > 0)
2627 connection = connman_dbus_get_connection();
2628 if (connection == NULL)
2631 DBG("connection %p", connection);
2633 watch = g_dbus_add_service_watch(connection, SUPPLICANT_NAME,
2634 supplicant_probe, supplicant_remove, NULL, NULL);
2636 iface_watch = g_dbus_add_signal_watch(connection, NULL, NULL,
2637 SUPPLICANT_INTF ".Interface",
2638 NULL, supplicant_filter,
2641 if (watch == 0 || iface_watch == 0) {
2642 g_dbus_remove_watch(connection, watch);
2643 g_dbus_remove_watch(connection, iface_watch);
2650 static void supplicant_destroy(void)
2652 if (g_slist_length(driver_list) > 0)
2655 DBG("connection %p", connection);
2657 g_dbus_remove_watch(connection, watch);
2658 g_dbus_remove_watch(connection, iface_watch);
2660 dbus_connection_unref(connection);
2664 int supplicant_register(struct supplicant_driver *driver)
2668 DBG("driver %p name %s", driver, driver->name);
2670 err = supplicant_create();
2674 driver_list = g_slist_append(driver_list, driver);
2676 supplicant_activate(connection);
2681 void supplicant_unregister(struct supplicant_driver *driver)
2683 DBG("driver %p name %s", driver, driver->name);
2685 supplicant_remove(connection, NULL);
2687 driver_list = g_slist_remove(driver_list, driver);
2689 supplicant_destroy();