Use "RSN" instead of "WPA2" for the security details
[platform/upstream/connman.git] / plugins / supplicant.c
1 /*
2  *
3  *  Connection Manager
4  *
5  *  Copyright (C) 2007-2009  Intel Corporation. All rights reserved.
6  *
7  *  This program is free software; you can redistribute it and/or modify
8  *  it under the terms of the GNU General Public License version 2 as
9  *  published by the Free Software Foundation.
10  *
11  *  This program is distributed in the hope that it will be useful,
12  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
13  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14  *  GNU General Public License for more details.
15  *
16  *  You should have received a copy of the GNU General Public License
17  *  along with this program; if not, write to the Free Software
18  *  Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA
19  *
20  */
21
22 #ifdef HAVE_CONFIG_H
23 #include <config.h>
24 #endif
25
26 #include <stdio.h>
27 #include <errno.h>
28 #include <stdlib.h>
29 #include <string.h>
30 #include <net/ethernet.h>
31
32 #include <gdbus.h>
33
34 #define CONNMAN_API_SUBJECT_TO_CHANGE
35 #include <connman/device.h>
36 #include <connman/dbus.h>
37 #include <connman/log.h>
38
39 #include "inet.h"
40 #include "supplicant.h"
41
42 #define TIMEOUT 5000
43
44 #define IEEE80211_CAP_ESS       0x0001
45 #define IEEE80211_CAP_IBSS      0x0002
46 #define IEEE80211_CAP_PRIVACY   0x0010
47
48 #define SUPPLICANT_NAME  "fi.epitest.hostap.WPASupplicant"
49 #define SUPPLICANT_INTF  "fi.epitest.hostap.WPASupplicant"
50 #define SUPPLICANT_PATH  "/fi/epitest/hostap/WPASupplicant"
51
52 /* Taken from "WPA Supplicant - Common definitions" */
53 enum supplicant_state {
54         /**
55          * WPA_DISCONNECTED - Disconnected state
56          *
57          * This state indicates that client is not associated, but is likely to
58          * start looking for an access point. This state is entered when a
59          * connection is lost.
60          */
61         WPA_DISCONNECTED,
62
63         /**
64          * WPA_INACTIVE - Inactive state (wpa_supplicant disabled)
65          *
66          * This state is entered if there are no enabled networks in the
67          * configuration. wpa_supplicant is not trying to associate with a new
68          * network and external interaction (e.g., ctrl_iface call to add or
69          * enable a network) is needed to start association.
70          */
71         WPA_INACTIVE,
72
73         /**
74          * WPA_SCANNING - Scanning for a network
75          *
76          * This state is entered when wpa_supplicant starts scanning for a
77          * network.
78          */
79         WPA_SCANNING,
80
81         /**
82          * WPA_ASSOCIATING - Trying to associate with a BSS/SSID
83          *
84          * This state is entered when wpa_supplicant has found a suitable BSS
85          * to associate with and the driver is configured to try to associate
86          * with this BSS in ap_scan=1 mode. When using ap_scan=2 mode, this
87          * state is entered when the driver is configured to try to associate
88          * with a network using the configured SSID and security policy.
89          */
90         WPA_ASSOCIATING,
91
92         /**
93          * WPA_ASSOCIATED - Association completed
94          *
95          * This state is entered when the driver reports that association has
96          * been successfully completed with an AP. If IEEE 802.1X is used
97          * (with or without WPA/WPA2), wpa_supplicant remains in this state
98          * until the IEEE 802.1X/EAPOL authentication has been completed.
99          */
100         WPA_ASSOCIATED,
101
102         /**
103          * WPA_4WAY_HANDSHAKE - WPA 4-Way Key Handshake in progress
104          *
105          * This state is entered when WPA/WPA2 4-Way Handshake is started. In
106          * case of WPA-PSK, this happens when receiving the first EAPOL-Key
107          * frame after association. In case of WPA-EAP, this state is entered
108          * when the IEEE 802.1X/EAPOL authentication has been completed.
109          */
110         WPA_4WAY_HANDSHAKE,
111
112         /**
113          * WPA_GROUP_HANDSHAKE - WPA Group Key Handshake in progress
114          *
115          * This state is entered when 4-Way Key Handshake has been completed
116          * (i.e., when the supplicant sends out message 4/4) and when Group
117          * Key rekeying is started by the AP (i.e., when supplicant receives
118          * message 1/2).
119          */
120         WPA_GROUP_HANDSHAKE,
121
122         /**
123          * WPA_COMPLETED - All authentication completed
124          *
125          * This state is entered when the full authentication process is
126          * completed. In case of WPA2, this happens when the 4-Way Handshake is
127          * successfully completed. With WPA, this state is entered after the
128          * Group Key Handshake; with IEEE 802.1X (non-WPA) connection is
129          * completed after dynamic keys are received (or if not used, after
130          * the EAP authentication has been completed). With static WEP keys and
131          * plaintext connections, this state is entered when an association
132          * has been completed.
133          *
134          * This state indicates that the supplicant has completed its
135          * processing for the association phase and that data connection is
136          * fully configured.
137          */
138         WPA_COMPLETED,
139
140         /**
141          * WPA_INVALID - Invalid state (parsing error)
142          *
143          * This state is returned if the string input is invalid. It is not
144          * an official wpa_supplicant state.
145          */
146         WPA_INVALID,
147 };
148
149 struct supplicant_result {
150         char *path;
151         char *name;
152         char *addr;
153         unsigned char *ssid;
154         unsigned int ssid_len;
155         dbus_uint16_t capabilities;
156         gboolean adhoc;
157         gboolean has_wep;
158         gboolean has_wpa;
159         gboolean has_rsn;
160         gboolean has_wps;
161         dbus_int32_t quality;
162         dbus_int32_t noise;
163         dbus_int32_t level;
164         dbus_int32_t maxrate;
165 };
166
167 struct supplicant_task {
168         int ifindex;
169         char *ifname;
170         struct connman_device *device;
171         struct connman_network *network;
172         char *path;
173         char *netpath;
174         gboolean created;
175         enum supplicant_state state;
176         gboolean noscan;
177         GSList *scan_results;
178 };
179
180 static GSList *task_list = NULL;
181
182 static DBusConnection *connection;
183
184 static void free_task(struct supplicant_task *task)
185 {
186         DBG("task %p", task);
187
188         g_free(task->ifname);
189         g_free(task->path);
190         g_free(task);
191 }
192
193 static struct supplicant_task *find_task_by_index(int index)
194 {
195         GSList *list;
196
197         for (list = task_list; list; list = list->next) {
198                 struct supplicant_task *task = list->data;
199
200                 if (task->ifindex == index)
201                         return task;
202         }
203
204         return NULL;
205 }
206
207 static struct supplicant_task *find_task_by_path(const char *path)
208 {
209         GSList *list;
210
211         for (list = task_list; list; list = list->next) {
212                 struct supplicant_task *task = list->data;
213
214                 if (g_str_equal(task->path, path) == TRUE)
215                         return task;
216         }
217
218         return NULL;
219 }
220
221 static void add_interface_reply(DBusPendingCall *call, void *user_data)
222 {
223         struct supplicant_task *task = user_data;
224         DBusMessage *reply;
225         DBusError error;
226         const char *path;
227
228         DBG("task %p", task);
229
230         reply = dbus_pending_call_steal_reply(call);
231         if (reply == NULL)
232                 return;
233
234         if (dbus_message_get_type(reply) == DBUS_MESSAGE_TYPE_ERROR)
235                 goto done;
236
237         dbus_error_init(&error);
238
239         if (dbus_message_get_args(reply, &error, DBUS_TYPE_OBJECT_PATH, &path,
240                                                 DBUS_TYPE_INVALID) == FALSE) {
241                 if (dbus_error_is_set(&error) == TRUE) {
242                         connman_error("%s", error.message);
243                         dbus_error_free(&error);
244                 } else
245                         connman_error("Wrong arguments for add interface");
246                 goto done;
247         }
248
249         DBG("path %s", path);
250
251         task->path = g_strdup(path);
252         task->created = TRUE;
253
254         connman_device_set_powered(task->device, TRUE);
255
256 done:
257         dbus_message_unref(reply);
258 }
259
260 static int add_interface(struct supplicant_task *task)
261 {
262         DBusMessage *message;
263         DBusPendingCall *call;
264
265         DBG("task %p", task);
266
267         message = dbus_message_new_method_call(SUPPLICANT_NAME, SUPPLICANT_PATH,
268                                         SUPPLICANT_INTF, "addInterface");
269         if (message == NULL)
270                 return -ENOMEM;
271
272         dbus_message_append_args(message, DBUS_TYPE_STRING, &task->ifname,
273                                                         DBUS_TYPE_INVALID);
274
275         if (dbus_connection_send_with_reply(connection, message,
276                                                 &call, TIMEOUT) == FALSE) {
277                 connman_error("Failed to add interface");
278                 dbus_message_unref(message);
279                 return -EIO;
280         }
281
282         if (call == NULL) {
283                 connman_error("D-Bus connection not available");
284                 dbus_message_unref(message);
285                 return -EIO;
286         }
287
288         dbus_pending_call_set_notify(call, add_interface_reply, task, NULL);
289
290         dbus_message_unref(message);
291
292         return -EINPROGRESS;
293 }
294
295 static void get_interface_reply(DBusPendingCall *call, void *user_data)
296 {
297         struct supplicant_task *task = user_data;
298         DBusMessage *reply;
299         DBusError error;
300         const char *path;
301
302         DBG("task %p", task);
303
304         reply = dbus_pending_call_steal_reply(call);
305         if (reply == NULL)
306                 return;
307
308         if (dbus_message_get_type(reply) == DBUS_MESSAGE_TYPE_ERROR) {
309                 add_interface(task);
310                 goto done;
311         }
312
313         dbus_error_init(&error);
314
315         if (dbus_message_get_args(reply, &error, DBUS_TYPE_OBJECT_PATH, &path,
316                                                 DBUS_TYPE_INVALID) == FALSE) {
317                 if (dbus_error_is_set(&error) == TRUE) {
318                         connman_error("%s", error.message);
319                         dbus_error_free(&error);
320                 } else
321                         connman_error("Wrong arguments for get interface");
322                 goto done;
323         }
324
325         DBG("path %s", path);
326
327         task->path = g_strdup(path);
328         task->created = FALSE;
329
330         connman_device_set_powered(task->device, TRUE);
331
332 done:
333         dbus_message_unref(reply);
334 }
335
336 static int create_interface(struct supplicant_task *task)
337 {
338         DBusMessage *message;
339         DBusPendingCall *call;
340
341         DBG("task %p", task);
342
343         message = dbus_message_new_method_call(SUPPLICANT_NAME, SUPPLICANT_PATH,
344                                         SUPPLICANT_INTF, "getInterface");
345         if (message == NULL)
346                 return -ENOMEM;
347
348         dbus_message_append_args(message, DBUS_TYPE_STRING, &task->ifname,
349                                                         DBUS_TYPE_INVALID);
350
351         if (dbus_connection_send_with_reply(connection, message,
352                                                 &call, TIMEOUT) == FALSE) {
353                 connman_error("Failed to get interface");
354                 dbus_message_unref(message);
355                 return -EIO;
356         }
357
358         if (call == NULL) {
359                 connman_error("D-Bus connection not available");
360                 dbus_message_unref(message);
361                 return -EIO;
362         }
363
364         dbus_pending_call_set_notify(call, get_interface_reply, task, NULL);
365
366         dbus_message_unref(message);
367
368         return -EINPROGRESS;
369 }
370
371 static void remove_interface_reply(DBusPendingCall *call, void *user_data)
372 {
373         struct supplicant_task *task = user_data;
374         DBusMessage *reply;
375
376         DBG("task %p", task);
377
378         reply = dbus_pending_call_steal_reply(call);
379
380         connman_device_set_powered(task->device, FALSE);
381
382         connman_device_unref(task->device);
383
384         inet_ifdown(task->ifindex);
385
386         free_task(task);
387
388         dbus_message_unref(reply);
389 }
390
391 static int remove_interface(struct supplicant_task *task)
392 {
393         DBusMessage *message;
394         DBusPendingCall *call;
395
396         DBG("task %p", task);
397
398         if (task->created == FALSE) {
399                 connman_device_set_powered(task->device, FALSE);
400                 return 0;
401         }
402
403         message = dbus_message_new_method_call(SUPPLICANT_NAME, SUPPLICANT_PATH,
404                                         SUPPLICANT_INTF, "removeInterface");
405         if (message == NULL)
406                 return -ENOMEM;
407
408         dbus_message_append_args(message, DBUS_TYPE_OBJECT_PATH, &task->path,
409                                                         DBUS_TYPE_INVALID);
410
411         if (dbus_connection_send_with_reply(connection, message,
412                                                 &call, TIMEOUT) == FALSE) {
413                 connman_error("Failed to remove interface");
414                 dbus_message_unref(message);
415                 return -EIO;
416         }
417
418         if (call == NULL) {
419                 connman_error("D-Bus connection not available");
420                 dbus_message_unref(message);
421                 return -EIO;
422         }
423
424         dbus_pending_call_set_notify(call, remove_interface_reply, task, NULL);
425
426         dbus_message_unref(message);
427
428         return -EINPROGRESS;
429 }
430
431 #if 0
432 static int set_ap_scan(struct supplicant_task *task)
433 {
434         DBusMessage *message, *reply;
435         DBusError error;
436         guint32 ap_scan = 1;
437
438         DBG("task %p", task);
439
440         message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
441                                 SUPPLICANT_INTF ".Interface", "setAPScan");
442         if (message == NULL)
443                 return -ENOMEM;
444
445         dbus_message_append_args(message, DBUS_TYPE_UINT32, &ap_scan,
446                                                         DBUS_TYPE_INVALID);
447
448         dbus_error_init(&error);
449
450         reply = dbus_connection_send_with_reply_and_block(connection,
451                                                         message, -1, &error);
452         if (reply == NULL) {
453                 if (dbus_error_is_set(&error) == TRUE) {
454                         connman_error("%s", error.message);
455                         dbus_error_free(&error);
456                 } else
457                         connman_error("Failed to set AP scan");
458                 dbus_message_unref(message);
459                 return -EIO;
460         }
461
462         dbus_message_unref(message);
463
464         dbus_message_unref(reply);
465
466         return 0;
467 }
468 #endif
469
470 static int add_network(struct supplicant_task *task)
471 {
472         DBusMessage *message, *reply;
473         DBusError error;
474         const char *path;
475
476         DBG("task %p", task);
477
478         if (task->netpath != NULL)
479                 return -EALREADY;
480
481         message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
482                                 SUPPLICANT_INTF ".Interface", "addNetwork");
483         if (message == NULL)
484                 return -ENOMEM;
485
486         dbus_error_init(&error);
487
488         reply = dbus_connection_send_with_reply_and_block(connection,
489                                                         message, -1, &error);
490         if (reply == NULL) {
491                 if (dbus_error_is_set(&error) == TRUE) {
492                         connman_error("%s", error.message);
493                         dbus_error_free(&error);
494                 } else
495                         connman_error("Failed to add network");
496                 dbus_message_unref(message);
497                 return -EIO;
498         }
499
500         dbus_message_unref(message);
501
502         dbus_error_init(&error);
503
504         if (dbus_message_get_args(reply, &error, DBUS_TYPE_OBJECT_PATH, &path,
505                                                 DBUS_TYPE_INVALID) == FALSE) {
506                 if (dbus_error_is_set(&error) == TRUE) {
507                         connman_error("%s", error.message);
508                         dbus_error_free(&error);
509                 } else
510                         connman_error("Wrong arguments for network");
511                 dbus_message_unref(reply);
512                 return -EIO;
513         }
514
515         DBG("path %s", path);
516
517         task->netpath = g_strdup(path);
518
519         dbus_message_unref(reply);
520
521         return 0;
522 }
523
524 static int remove_network(struct supplicant_task *task)
525 {
526         DBusMessage *message, *reply;
527         DBusError error;
528
529         DBG("task %p", task);
530
531         if (task->netpath == NULL)
532                 return -EINVAL;
533
534         message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
535                                 SUPPLICANT_INTF ".Interface", "removeNetwork");
536         if (message == NULL)
537                 return -ENOMEM;
538
539         dbus_message_append_args(message, DBUS_TYPE_OBJECT_PATH, &task->netpath,
540                                                         DBUS_TYPE_INVALID);
541
542         dbus_error_init(&error);
543
544         reply = dbus_connection_send_with_reply_and_block(connection,
545                                                         message, -1, &error);
546         if (reply == NULL) {
547                 if (dbus_error_is_set(&error) == TRUE) {
548                         connman_error("%s", error.message);
549                         dbus_error_free(&error);
550                 } else
551                         connman_error("Failed to remove network");
552                 dbus_message_unref(message);
553                 return -EIO;
554         }
555
556         dbus_message_unref(message);
557
558         dbus_message_unref(reply);
559
560         g_free(task->netpath);
561         task->netpath = NULL;
562
563         return 0;
564 }
565
566 static int select_network(struct supplicant_task *task)
567 {
568         DBusMessage *message, *reply;
569         DBusError error;
570
571         DBG("task %p", task);
572
573         if (task->netpath == NULL)
574                 return -EINVAL;
575
576         message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
577                                 SUPPLICANT_INTF ".Interface", "selectNetwork");
578         if (message == NULL)
579                 return -ENOMEM;
580
581         dbus_message_append_args(message, DBUS_TYPE_OBJECT_PATH, &task->netpath,
582                                                         DBUS_TYPE_INVALID);
583
584         dbus_error_init(&error);
585
586         reply = dbus_connection_send_with_reply_and_block(connection,
587                                                         message, -1, &error);
588         if (reply == NULL) {
589                 if (dbus_error_is_set(&error) == TRUE) {
590                         connman_error("%s", error.message);
591                         dbus_error_free(&error);
592                 } else
593                         connman_error("Failed to select network");
594                 dbus_message_unref(message);
595                 return -EIO;
596         }
597
598         dbus_message_unref(message);
599
600         dbus_message_unref(reply);
601
602         return 0;
603 }
604
605 static int enable_network(struct supplicant_task *task)
606 {
607         DBusMessage *message, *reply;
608         DBusError error;
609
610         DBG("task %p", task);
611
612         if (task->netpath == NULL)
613                 return -EINVAL;
614
615         message = dbus_message_new_method_call(SUPPLICANT_NAME, task->netpath,
616                                         SUPPLICANT_INTF ".Network", "enable");
617         if (message == NULL)
618                 return -ENOMEM;
619
620         dbus_error_init(&error);
621
622         reply = dbus_connection_send_with_reply_and_block(connection,
623                                                         message, -1, &error);
624         if (reply == NULL) {
625                 if (dbus_error_is_set(&error) == TRUE) {
626                         connman_error("%s", error.message);
627                         dbus_error_free(&error);
628                 } else
629                         connman_error("Failed to enable network");
630                 dbus_message_unref(message);
631                 return -EIO;
632         }
633
634         dbus_message_unref(message);
635
636         dbus_message_unref(reply);
637
638         return 0;
639 }
640
641 static int disable_network(struct supplicant_task *task)
642 {
643         DBusMessage *message, *reply;
644         DBusError error;
645
646         DBG("task %p", task);
647
648         if (task->netpath == NULL)
649                 return -EINVAL;
650
651         message = dbus_message_new_method_call(SUPPLICANT_NAME, task->netpath,
652                                         SUPPLICANT_INTF ".Network", "disable");
653         if (message == NULL)
654                 return -ENOMEM;
655
656         dbus_error_init(&error);
657
658         reply = dbus_connection_send_with_reply_and_block(connection,
659                                                         message, -1, &error);
660         if (reply == NULL) {
661                 if (dbus_error_is_set(&error) == TRUE) {
662                         connman_error("%s", error.message);
663                         dbus_error_free(&error);
664                 } else
665                         connman_error("Failed to disable network");
666                 dbus_message_unref(message);
667                 return -EIO;
668         }
669
670         dbus_message_unref(message);
671
672         dbus_message_unref(reply);
673
674         return 0;
675 }
676
677 static int set_network(struct supplicant_task *task,
678                                 const unsigned char *network, int len,
679                                 const char *address, const char *security,
680                                                         const char *passphrase)
681 {
682         DBusMessage *message, *reply;
683         DBusMessageIter array, dict;
684         DBusError error;
685
686         DBG("task %p", task);
687
688         if (task->netpath == NULL)
689                 return -EINVAL;
690
691         message = dbus_message_new_method_call(SUPPLICANT_NAME, task->netpath,
692                                         SUPPLICANT_INTF ".Network", "set");
693         if (message == NULL)
694                 return -ENOMEM;
695
696         dbus_message_iter_init_append(message, &array);
697
698         dbus_message_iter_open_container(&array, DBUS_TYPE_ARRAY,
699                         DBUS_DICT_ENTRY_BEGIN_CHAR_AS_STRING
700                         DBUS_TYPE_STRING_AS_STRING DBUS_TYPE_VARIANT_AS_STRING
701                         DBUS_DICT_ENTRY_END_CHAR_AS_STRING, &dict);
702
703         if (address == NULL) {
704                 dbus_uint32_t scan_ssid = 1;
705                 connman_dbus_dict_append_variant(&dict, "scan_ssid",
706                                                 DBUS_TYPE_UINT32, &scan_ssid);
707         } else
708                 connman_dbus_dict_append_variant(&dict, "bssid",
709                                                 DBUS_TYPE_STRING, &address);
710
711         connman_dbus_dict_append_array(&dict, "ssid",
712                                         DBUS_TYPE_BYTE, &network, len);
713
714         if (g_ascii_strcasecmp(security, "wpa") == 0 ||
715                                 g_ascii_strcasecmp(security, "rsn") == 0) {
716                 const char *key_mgmt = "WPA-PSK";
717                 connman_dbus_dict_append_variant(&dict, "key_mgmt",
718                                                 DBUS_TYPE_STRING, &key_mgmt);
719
720                 if (passphrase && strlen(passphrase) > 0)
721                         connman_dbus_dict_append_variant(&dict, "psk",
722                                                 DBUS_TYPE_STRING, &passphrase);
723         } else if (g_ascii_strcasecmp(security, "wep") == 0) {
724                 const char *key_mgmt = "NONE", *index = "0";
725                 connman_dbus_dict_append_variant(&dict, "key_mgmt",
726                                                 DBUS_TYPE_STRING, &key_mgmt);
727
728                 if (passphrase) {
729                         int size = strlen(passphrase);
730                         if (size == 10 || size == 26) {
731                                 unsigned char *key = malloc(13);
732                                 char tmp[3];
733                                 int i;
734                                 memset(tmp, 0, sizeof(tmp));
735                                 if (key == NULL)
736                                         size = 0;
737                                 for (i = 0; i < size / 2; i++) {
738                                         memcpy(tmp, passphrase + (i * 2), 2);
739                                         key[i] = (unsigned char) strtol(tmp,
740                                                                 NULL, 16);
741                                 }
742                                 connman_dbus_dict_append_array(&dict,
743                                                 "wep_key0", DBUS_TYPE_BYTE,
744                                                         &key, size / 2);
745                                 free(key);
746                         } else
747                                 connman_dbus_dict_append_variant(&dict,
748                                                 "wep_key0", DBUS_TYPE_STRING,
749                                                                 &passphrase);
750                         connman_dbus_dict_append_variant(&dict, "wep_tx_keyidx",
751                                                 DBUS_TYPE_STRING, &index);
752                 }
753         } else {
754                 const char *key_mgmt = "NONE";
755                 connman_dbus_dict_append_variant(&dict, "key_mgmt",
756                                                 DBUS_TYPE_STRING, &key_mgmt);
757         }
758
759         dbus_message_iter_close_container(&array, &dict);
760
761         dbus_error_init(&error);
762
763         reply = dbus_connection_send_with_reply_and_block(connection,
764                                                         message, -1, &error);
765         if (reply == NULL) {
766                 if (dbus_error_is_set(&error) == TRUE) {
767                         connman_error("%s", error.message);
768                         dbus_error_free(&error);
769                 } else
770                         connman_error("Failed to set network options");
771                 dbus_message_unref(message);
772                 return -EIO;
773         }
774
775         dbus_message_unref(message);
776
777         dbus_message_unref(reply);
778
779         return 0;
780 }
781
782 static int initiate_scan(struct supplicant_task *task)
783 {
784         DBusMessage *message;
785         DBusPendingCall *call;
786
787         DBG("task %p", task);
788
789         message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
790                                         SUPPLICANT_INTF ".Interface", "scan");
791         if (message == NULL)
792                 return -ENOMEM;
793
794         if (dbus_connection_send_with_reply(connection, message,
795                                                 &call, TIMEOUT) == FALSE) {
796                 connman_error("Failed to initiate scan");
797                 dbus_message_unref(message);
798                 return -EIO;
799         }
800
801         dbus_message_unref(message);
802
803         return 0;
804 }
805
806 static struct {
807         char *name;
808         char *value;
809 } special_ssid[] = {
810         { "linksys" },
811         { }
812 };
813
814 static char *build_group(const char *addr, const char *name,
815                         const unsigned char *ssid, unsigned int ssid_len,
816                                         const char *mode, const char *security)
817 {
818         GString *str;
819         unsigned int i;
820
821         if (addr == NULL)
822                 return NULL;
823
824         str = g_string_sized_new((ssid_len * 2) + 24);
825         if (str == NULL)
826                 return NULL;
827
828         for (i = 0; special_ssid[i].name; i++) {
829                 if (g_strcmp0(special_ssid[i].name, name) == 0) {
830                         g_string_append_printf(str, "%s_%s", name, addr);
831                         goto done;
832                 }
833         }
834
835         if (ssid_len > 0 && ssid[0] != '\0') {
836                 for (i = 0; i < ssid_len; i++)
837                         g_string_append_printf(str, "%02x", ssid[i]);
838         } else
839                 g_string_append_printf(str, "hidden_%s", addr);
840
841 done:
842         g_string_append_printf(str, "_%s_%s", mode, security);
843
844         return g_string_free(str, FALSE);
845 }
846
847 static void extract_addr(DBusMessageIter *value,
848                                         struct supplicant_result *result)
849 {
850         DBusMessageIter array;
851         struct ether_addr *eth;
852         unsigned char *addr;
853         int addr_len;
854
855         dbus_message_iter_recurse(value, &array);
856         dbus_message_iter_get_fixed_array(&array, &addr, &addr_len);
857
858         if (addr_len != 6)
859                 return;
860
861         eth = (void *) addr;
862
863         result->addr = g_try_malloc0(18);
864         if (result->addr == NULL)
865                 return;
866
867         snprintf(result->addr, 18, "%02X:%02X:%02X:%02X:%02X:%02X",
868                                                 eth->ether_addr_octet[0],
869                                                 eth->ether_addr_octet[1],
870                                                 eth->ether_addr_octet[2],
871                                                 eth->ether_addr_octet[3],
872                                                 eth->ether_addr_octet[4],
873                                                 eth->ether_addr_octet[5]);
874
875         result->path = g_try_malloc0(18);
876         if (result->path == NULL)
877                 return;
878
879         snprintf(result->path, 18, "%02x%02x%02x%02x%02x%02x",
880                                                 eth->ether_addr_octet[0],
881                                                 eth->ether_addr_octet[1],
882                                                 eth->ether_addr_octet[2],
883                                                 eth->ether_addr_octet[3],
884                                                 eth->ether_addr_octet[4],
885                                                 eth->ether_addr_octet[5]);
886 }
887
888 static void extract_ssid(DBusMessageIter *value,
889                                         struct supplicant_result *result)
890 {
891         DBusMessageIter array;
892         unsigned char *ssid;
893         int ssid_len;
894
895         dbus_message_iter_recurse(value, &array);
896         dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
897
898         if (ssid_len < 1)
899                 return;
900
901         result->ssid = g_try_malloc(ssid_len);
902         if (result->ssid == NULL)
903                 return;
904
905         memcpy(result->ssid, ssid, ssid_len);
906         result->ssid_len = ssid_len;
907
908         result->name = g_try_malloc0(ssid_len + 1);
909         if (result->name == NULL)
910                 return;
911
912         memcpy(result->name, ssid, ssid_len);
913 }
914
915 static void extract_wpaie(DBusMessageIter *value,
916                                         struct supplicant_result *result)
917 {
918         DBusMessageIter array;
919         unsigned char *ie;
920         int ie_len;
921
922         dbus_message_iter_recurse(value, &array);
923         dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
924
925         if (ie_len > 0)
926                 result->has_wpa = TRUE;
927 }
928
929 static void extract_rsnie(DBusMessageIter *value,
930                                         struct supplicant_result *result)
931 {
932         DBusMessageIter array;
933         unsigned char *ie;
934         int ie_len;
935
936         dbus_message_iter_recurse(value, &array);
937         dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
938
939         if (ie_len > 0)
940                 result->has_rsn = TRUE;
941 }
942
943 static void extract_wpsie(DBusMessageIter *value,
944                                         struct supplicant_result *result)
945 {
946         DBusMessageIter array;
947         unsigned char *ie;
948         int ie_len;
949
950         dbus_message_iter_recurse(value, &array);
951         dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
952
953         if (ie_len > 0)
954                 result->has_wps = TRUE;
955 }
956
957 static void extract_capabilites(DBusMessageIter *value,
958                                         struct supplicant_result *result)
959 {
960         dbus_message_iter_get_basic(value, &result->capabilities);
961
962         if (result->capabilities & IEEE80211_CAP_ESS)
963                 result->adhoc = FALSE;
964         else if (result->capabilities & IEEE80211_CAP_IBSS)
965                 result->adhoc = TRUE;
966
967         if (result->capabilities & IEEE80211_CAP_PRIVACY)
968                 result->has_wep = TRUE;
969 }
970
971 static void get_properties(struct supplicant_task *task);
972
973 static void properties_reply(DBusPendingCall *call, void *user_data)
974 {
975         struct supplicant_task *task = user_data;
976         struct supplicant_result result;
977         struct connman_network *network;
978         DBusMessage *reply;
979         DBusMessageIter array, dict;
980         unsigned char strength;
981         const char *mode, *security;
982         char *group;
983
984         DBG("task %p", task);
985
986         reply = dbus_pending_call_steal_reply(call);
987         if (reply == NULL) {
988                 get_properties(task);
989                 return;
990         }
991
992         if (dbus_message_get_type(reply) == DBUS_MESSAGE_TYPE_ERROR) {
993                 dbus_message_unref(reply);
994                 get_properties(task);
995                 return;
996         }
997
998         memset(&result, 0, sizeof(result));
999
1000         dbus_message_iter_init(reply, &array);
1001
1002         dbus_message_iter_recurse(&array, &dict);
1003
1004         while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_DICT_ENTRY) {
1005                 DBusMessageIter entry, value;
1006                 const char *key;
1007
1008                 dbus_message_iter_recurse(&dict, &entry);
1009                 dbus_message_iter_get_basic(&entry, &key);
1010
1011                 dbus_message_iter_next(&entry);
1012
1013                 dbus_message_iter_recurse(&entry, &value);
1014
1015                 //type = dbus_message_iter_get_arg_type(&value);
1016                 //dbus_message_iter_get_basic(&value, &val);
1017
1018                 /* 
1019                  * bssid        : a (97)
1020                  * ssid         : a (97)
1021                  * wpaie        : a (97)
1022                  * rsnie        : a (97)
1023                  * wpsie        : a (97)
1024                  * frequency    : i (105)
1025                  * capabilities : q (113)
1026                  * quality      : i (105)
1027                  * noise        : i (105)
1028                  * level        : i (105)
1029                  * maxrate      : i (105)
1030                  */
1031
1032                 if (g_str_equal(key, "bssid") == TRUE)
1033                         extract_addr(&value, &result);
1034                 else if (g_str_equal(key, "ssid") == TRUE)
1035                         extract_ssid(&value, &result);
1036                 else if (g_str_equal(key, "wpaie") == TRUE)
1037                         extract_wpaie(&value, &result);
1038                 else if (g_str_equal(key, "rsnie") == TRUE)
1039                         extract_rsnie(&value, &result);
1040                 else if (g_str_equal(key, "wpsie") == TRUE)
1041                         extract_wpsie(&value, &result);
1042                 else if (g_str_equal(key, "capabilities") == TRUE)
1043                         extract_capabilites(&value, &result);
1044                 else if (g_str_equal(key, "quality") == TRUE)
1045                         dbus_message_iter_get_basic(&value, &result.quality);
1046                 else if (g_str_equal(key, "noise") == TRUE)
1047                         dbus_message_iter_get_basic(&value, &result.noise);
1048                 else if (g_str_equal(key, "level") == TRUE)
1049                         dbus_message_iter_get_basic(&value, &result.level);
1050                 else if (g_str_equal(key, "maxrate") == TRUE)
1051                         dbus_message_iter_get_basic(&value, &result.maxrate);
1052
1053                 dbus_message_iter_next(&dict);
1054         }
1055
1056         if (result.path == NULL)
1057                 goto done;
1058
1059         if (result.path[0] == '\0')
1060                 goto done;
1061
1062         strength = result.quality;
1063
1064         if (result.has_rsn == TRUE)
1065                 security = "rsn";
1066         else if (result.has_wpa == TRUE)
1067                 security = "wpa";
1068         else if (result.has_wep == TRUE)
1069                 security = "wep";
1070         else
1071                 security = "none";
1072
1073         mode = (result.adhoc == TRUE) ? "adhoc" : "managed";
1074
1075         group = build_group(result.path, result.name,
1076                                         result.ssid, result.ssid_len,
1077                                                         mode, security);
1078
1079         network = connman_device_get_network(task->device, result.path);
1080         if (network == NULL) {
1081                 int index;
1082
1083                 network = connman_network_create(result.path,
1084                                                 CONNMAN_NETWORK_TYPE_WIFI);
1085                 if (network == NULL)
1086                         goto done;
1087
1088                 index = connman_device_get_index(task->device);
1089                 connman_network_set_index(network, index);
1090
1091                 connman_network_set_protocol(network,
1092                                                 CONNMAN_NETWORK_PROTOCOL_IP);
1093
1094                 connman_network_set_string(network, "Address", result.addr);
1095
1096                 connman_network_set_group(network, group);
1097
1098                 if (result.name != NULL && result.name[0] != '\0')
1099                         connman_network_set_string(network, "Name", result.name);
1100
1101                 connman_network_set_uint8(network, "Strength", strength);
1102
1103                 connman_network_set_string(network, "WiFi.Mode", mode);
1104                 connman_network_set_string(network, "WiFi.Security", security);
1105
1106                 if (connman_device_add_network(task->device, network) < 0) {
1107                         connman_network_unref(network);
1108                         goto done;
1109                 }
1110         }
1111
1112         connman_network_set_group(network, group);
1113
1114         g_free(group);
1115
1116         if (result.name != NULL && result.name[0] != '\0')
1117                 connman_network_set_string(network, "Name", result.name);
1118
1119         connman_network_set_blob(network, "WiFi.SSID",
1120                                                 result.ssid, result.ssid_len);
1121
1122         connman_network_set_string(network, "WiFi.Mode", mode);
1123
1124         DBG("%s (%s %s) strength %d (%s)",
1125                                 result.name, mode, security, strength,
1126                                 (result.has_wps == TRUE) ? "WPS" : "no WPS");
1127
1128         connman_network_set_available(network, TRUE);
1129         connman_network_set_uint8(network, "Strength", strength);
1130
1131         connman_network_set_string(network, "WiFi.Security", security);
1132
1133 done:
1134         g_free(result.path);
1135         g_free(result.addr);
1136         g_free(result.name);
1137         g_free(result.ssid);
1138
1139         dbus_message_unref(reply);
1140
1141         get_properties(task);
1142 }
1143
1144 static void get_properties(struct supplicant_task *task)
1145 {
1146         DBusMessage *message;
1147         DBusPendingCall *call;
1148         char *path;
1149
1150         path = g_slist_nth_data(task->scan_results, 0);
1151         if (path == NULL)
1152                 goto noscan;
1153
1154         message = dbus_message_new_method_call(SUPPLICANT_NAME, path,
1155                                                 SUPPLICANT_INTF ".BSSID",
1156                                                                 "properties");
1157
1158         task->scan_results = g_slist_remove(task->scan_results, path);
1159         g_free(path);
1160
1161         if (message == NULL)
1162                 goto noscan;
1163
1164         if (dbus_connection_send_with_reply(connection, message,
1165                                                 &call, TIMEOUT) == FALSE) {
1166                 connman_error("Failed to get network properties");
1167                 dbus_message_unref(message);
1168                 goto noscan;
1169         }
1170
1171         if (call == NULL) {
1172                 connman_error("D-Bus connection not available");
1173                 dbus_message_unref(message);
1174                 goto noscan;
1175         }
1176
1177         dbus_pending_call_set_notify(call, properties_reply, task, NULL);
1178
1179         dbus_message_unref(message);
1180
1181         return;
1182
1183 noscan:
1184         if (task->noscan == FALSE)
1185                 connman_device_set_scanning(task->device, FALSE);
1186 }
1187
1188 static void scan_results_reply(DBusPendingCall *call, void *user_data)
1189 {
1190         struct supplicant_task *task = user_data;
1191         DBusMessage *reply;
1192         DBusError error;
1193         char **results;
1194         int i, num_results;
1195
1196         DBG("task %p", task);
1197
1198         reply = dbus_pending_call_steal_reply(call);
1199         if (reply == NULL)
1200                 goto noscan;
1201
1202         if (dbus_message_get_type(reply) == DBUS_MESSAGE_TYPE_ERROR)
1203                 goto done;
1204
1205         dbus_error_init(&error);
1206
1207         if (dbus_message_get_args(reply, &error,
1208                                 DBUS_TYPE_ARRAY, DBUS_TYPE_OBJECT_PATH,
1209                                                 &results, &num_results,
1210                                                 DBUS_TYPE_INVALID) == FALSE) {
1211                 if (dbus_error_is_set(&error) == TRUE) {
1212                         connman_error("%s", error.message);
1213                         dbus_error_free(&error);
1214                 } else
1215                         connman_error("Wrong arguments for scan result");
1216                 goto done;
1217         }
1218
1219         if (num_results == 0)
1220                 goto done;
1221
1222         for (i = 0; i < num_results; i++) {
1223                 char *path = g_strdup(results[i]);
1224                 if (path == NULL)
1225                         continue;
1226
1227                 task->scan_results = g_slist_append(task->scan_results, path);
1228         }
1229
1230         g_strfreev(results);
1231
1232         dbus_message_unref(reply);
1233
1234         get_properties(task);
1235
1236         return;
1237
1238 done:
1239         dbus_message_unref(reply);
1240
1241 noscan:
1242         if (task->noscan == FALSE)
1243                 connman_device_set_scanning(task->device, FALSE);
1244 }
1245
1246 static void scan_results_available(struct supplicant_task *task)
1247 {
1248         DBusMessage *message;
1249         DBusPendingCall *call;
1250
1251         DBG("task %p", task);
1252
1253         message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
1254                                                 SUPPLICANT_INTF ".Interface",
1255                                                         "scanResults");
1256         if (message == NULL)
1257                 return;
1258
1259         if (dbus_connection_send_with_reply(connection, message,
1260                                                 &call, TIMEOUT) == FALSE) {
1261                 connman_error("Failed to request scan result");
1262                 goto done;
1263         }
1264
1265         if (task->noscan == FALSE)
1266                 connman_device_set_scanning(task->device, TRUE);
1267
1268         if (call == NULL) {
1269                 connman_error("D-Bus connection not available");
1270                 goto done;
1271         }
1272
1273         dbus_pending_call_set_notify(call, scan_results_reply, task, NULL);
1274
1275 done:
1276         dbus_message_unref(message);
1277 }
1278
1279 static enum supplicant_state string2state(const char *state)
1280 {
1281         if (g_str_equal(state, "INACTIVE") == TRUE)
1282                 return WPA_INACTIVE;
1283         else if (g_str_equal(state, "SCANNING") == TRUE)
1284                 return WPA_SCANNING;
1285         else if (g_str_equal(state, "ASSOCIATING") == TRUE)
1286                 return WPA_ASSOCIATING;
1287         else if (g_str_equal(state, "ASSOCIATED") == TRUE)
1288                 return WPA_ASSOCIATED;
1289         else if (g_str_equal(state, "GROUP_HANDSHAKE") == TRUE)
1290                 return WPA_GROUP_HANDSHAKE;
1291         else if (g_str_equal(state, "4WAY_HANDSHAKE") == TRUE)
1292                 return WPA_4WAY_HANDSHAKE;
1293         else if (g_str_equal(state, "COMPLETED") == TRUE)
1294                 return WPA_COMPLETED;
1295         else if (g_str_equal(state, "DISCONNECTED") == TRUE)
1296                 return WPA_DISCONNECTED;
1297         else
1298                 return WPA_INVALID;
1299 }
1300
1301 static void state_change(struct supplicant_task *task, DBusMessage *msg)
1302 {
1303         DBusError error;
1304         const char *newstate, *oldstate;
1305         enum supplicant_state state;
1306
1307         dbus_error_init(&error);
1308
1309         if (dbus_message_get_args(msg, &error, DBUS_TYPE_STRING, &newstate,
1310                                                 DBUS_TYPE_STRING, &oldstate,
1311                                                 DBUS_TYPE_INVALID) == FALSE) {
1312                 if (dbus_error_is_set(&error) == TRUE) {
1313                         connman_error("%s", error.message);
1314                         dbus_error_free(&error);
1315                 } else
1316                         connman_error("Wrong arguments for state change");
1317                 return;
1318         }
1319
1320         DBG("state %s ==> %s", oldstate, newstate);
1321
1322         state = string2state(newstate);
1323         if (state == WPA_INVALID)
1324                 return;
1325
1326         task->state = state;
1327
1328         switch (task->state) {
1329         case WPA_SCANNING:
1330                 task->noscan = TRUE;
1331                 connman_device_set_scanning(task->device, TRUE);
1332                 break;
1333         case WPA_ASSOCIATING:
1334         case WPA_ASSOCIATED:
1335         case WPA_4WAY_HANDSHAKE:
1336         case WPA_GROUP_HANDSHAKE:
1337                 task->noscan = TRUE;
1338                 break;
1339         case WPA_COMPLETED:
1340         case WPA_DISCONNECTED:
1341                 task->noscan = FALSE;
1342                 break;
1343         case WPA_INACTIVE:
1344                 task->noscan = FALSE;
1345                 connman_device_set_scanning(task->device, FALSE);
1346                 break;
1347         case WPA_INVALID:
1348                 break;
1349         }
1350
1351         if (task->network == NULL)
1352                 return;
1353
1354         switch (task->state) {
1355         case WPA_COMPLETED:
1356                 /* carrier on */
1357                 connman_network_set_connected(task->network, TRUE);
1358                 connman_device_set_scanning(task->device, FALSE);
1359                 break;
1360         case WPA_DISCONNECTED:
1361                 /* carrier off */
1362                 connman_network_set_connected(task->network, FALSE);
1363                 connman_device_set_scanning(task->device, FALSE);
1364                 break;
1365         case WPA_ASSOCIATING:
1366                 connman_network_set_associating(task->network, TRUE);
1367                 break;
1368         default:
1369                 connman_network_set_associating(task->network, FALSE);
1370                 break;
1371         }
1372 }
1373
1374 static DBusHandlerResult supplicant_filter(DBusConnection *conn,
1375                                                 DBusMessage *msg, void *data)
1376 {
1377         struct supplicant_task *task;
1378         const char *member, *path;
1379
1380         if (dbus_message_has_interface(msg,
1381                                 SUPPLICANT_INTF ".Interface") == FALSE)
1382                 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1383
1384         member = dbus_message_get_member(msg);
1385         if (member == NULL)
1386                 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1387
1388         path = dbus_message_get_path(msg);
1389         if (path == NULL)
1390                 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1391
1392         task = find_task_by_path(path);
1393         if (task == NULL)
1394                 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1395
1396         DBG("task %p member %s", task, member);
1397
1398         if (g_str_equal(member, "ScanResultsAvailable") == TRUE)
1399                 scan_results_available(task);
1400         else if (g_str_equal(member, "StateChange") == TRUE)
1401                 state_change(task, msg);
1402
1403         return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1404 }
1405
1406 int supplicant_start(struct connman_device *device)
1407 {
1408         struct supplicant_task *task;
1409
1410         DBG("device %p", device);
1411
1412         task = g_try_new0(struct supplicant_task, 1);
1413         if (task == NULL)
1414                 return -ENOMEM;
1415
1416         task->ifindex = connman_device_get_index(device);
1417         task->ifname = inet_index2name(task->ifindex);
1418
1419         if (task->ifname == NULL) {
1420                 g_free(task);
1421                 return -ENOMEM;
1422         }
1423
1424         task->device = connman_device_ref(device);
1425
1426         task->created = FALSE;
1427         task->noscan = FALSE;
1428         task->state = WPA_INVALID;
1429
1430         task_list = g_slist_append(task_list, task);
1431
1432         return create_interface(task);
1433 }
1434
1435 int supplicant_stop(struct connman_device *device)
1436 {
1437         int index = connman_device_get_index(device);
1438         struct supplicant_task *task;
1439
1440         DBG("device %p", device);
1441
1442         task = find_task_by_index(index);
1443         if (task == NULL)
1444                 return -ENODEV;
1445
1446         task_list = g_slist_remove(task_list, task);
1447
1448         disable_network(task);
1449
1450         remove_network(task);
1451
1452         return remove_interface(task);
1453 }
1454
1455 int supplicant_scan(struct connman_device *device)
1456 {
1457         int index = connman_device_get_index(device);
1458         struct supplicant_task *task;
1459         int err;
1460
1461         DBG("device %p", device);
1462
1463         task = find_task_by_index(index);
1464         if (task == NULL)
1465                 return -ENODEV;
1466
1467         switch (task->state) {
1468         case WPA_SCANNING:
1469                 return -EALREADY;
1470         case WPA_ASSOCIATING:
1471         case WPA_ASSOCIATED:
1472         case WPA_4WAY_HANDSHAKE:
1473         case WPA_GROUP_HANDSHAKE:
1474                 return -EBUSY;
1475         default:
1476                 break;
1477         }
1478
1479         err = initiate_scan(task);
1480
1481         return 0;
1482 }
1483
1484 int supplicant_connect(struct connman_network *network)
1485 {
1486         struct supplicant_task *task;
1487         const char *address, *security, *passphrase;
1488         const void *ssid;
1489         unsigned int ssid_len;
1490         int index;
1491
1492         DBG("network %p", network);
1493
1494         address = connman_network_get_string(network, "Address");
1495         security = connman_network_get_string(network, "WiFi.Security");
1496         passphrase = connman_network_get_string(network, "WiFi.Passphrase");
1497
1498         ssid = connman_network_get_blob(network, "WiFi.SSID", &ssid_len);
1499
1500         DBG("address %s security %s passphrase %s",
1501                                         address, security, passphrase);
1502
1503         if (security == NULL && passphrase == NULL)
1504                 return -EINVAL;
1505
1506         if (g_str_equal(security, "none") == FALSE && passphrase == NULL)
1507                 return -EINVAL;
1508
1509         index = connman_network_get_index(network);
1510
1511         task = find_task_by_index(index);
1512         if (task == NULL)
1513                 return -ENODEV;
1514
1515         task->network = connman_network_ref(network);
1516
1517         add_network(task);
1518
1519         select_network(task);
1520         disable_network(task);
1521
1522         set_network(task, ssid, ssid_len, address, security, passphrase);
1523
1524         enable_network(task);
1525
1526         connman_network_set_associating(task->network, TRUE);
1527
1528         return 0;
1529 }
1530
1531 int supplicant_disconnect(struct connman_network *network)
1532 {
1533         struct supplicant_task *task;
1534         int index;
1535
1536         DBG("network %p", network);
1537
1538         index = connman_network_get_index(network);
1539
1540         task = find_task_by_index(index);
1541         if (task == NULL)
1542                 return -ENODEV;
1543
1544         disable_network(task);
1545
1546         remove_network(task);
1547
1548         connman_network_set_connected(task->network, FALSE);
1549
1550         connman_network_unref(task->network);
1551
1552         return 0;
1553 }
1554
1555 static void supplicant_activate(DBusConnection *conn)
1556 {
1557         DBusMessage *message;
1558
1559         DBG("conn %p", conn);
1560
1561         message = dbus_message_new_method_call(SUPPLICANT_NAME, "/",
1562                                 DBUS_INTERFACE_INTROSPECTABLE, "Introspect");
1563         if (message == NULL)
1564                 return;
1565
1566         dbus_message_set_no_reply(message, TRUE);
1567
1568         dbus_connection_send(conn, message, NULL);
1569
1570         dbus_message_unref(message);
1571 }
1572
1573 static GSList *driver_list = NULL;
1574
1575 static void supplicant_probe(DBusConnection *conn, void *user_data)
1576 {
1577         GSList *list;
1578
1579         DBG("conn %p", conn);
1580
1581         for (list = driver_list; list; list = list->next) {
1582                 struct supplicant_driver *driver = list->data;
1583
1584                 DBG("driver %p name %s", driver, driver->name);
1585
1586                 if (driver->probe)
1587                         driver->probe();
1588         }
1589 }
1590
1591 static void supplicant_remove(DBusConnection *conn, void *user_data)
1592 {
1593         GSList *list;
1594
1595         DBG("conn %p", conn);
1596
1597         for (list = driver_list; list; list = list->next) {
1598                 struct supplicant_driver *driver = list->data;
1599
1600                 DBG("driver %p name %s", driver, driver->name);
1601
1602                 if (driver->remove)
1603                         driver->remove();
1604         }
1605 }
1606
1607 static const char *supplicant_rule = "type=signal,"
1608                                 "interface=" SUPPLICANT_INTF ".Interface";
1609 static guint watch;
1610
1611 static int supplicant_create(void)
1612 {
1613         if (g_slist_length(driver_list) > 0)
1614                 return 0;
1615
1616         connection = connman_dbus_get_connection();
1617         if (connection == NULL)
1618                 return -EIO;
1619
1620         DBG("connection %p", connection);
1621
1622         if (dbus_connection_add_filter(connection,
1623                                 supplicant_filter, NULL, NULL) == FALSE) {
1624                 connection = connman_dbus_get_connection();
1625                 return -EIO;
1626         }
1627
1628         dbus_bus_add_match(connection, supplicant_rule, NULL);
1629         dbus_connection_flush(connection);
1630
1631         watch = g_dbus_add_service_watch(connection, SUPPLICANT_NAME,
1632                         supplicant_probe, supplicant_remove, NULL, NULL);
1633
1634         return 0;
1635 }
1636
1637 static void supplicant_destroy(void)
1638 {
1639         if (g_slist_length(driver_list) > 0)
1640                 return;
1641
1642         DBG("connection %p", connection);
1643
1644         if (watch > 0)
1645                 g_dbus_remove_watch(connection, watch);
1646
1647         dbus_bus_remove_match(connection, supplicant_rule, NULL);
1648         dbus_connection_flush(connection);
1649
1650         dbus_connection_remove_filter(connection, supplicant_filter, NULL);
1651
1652         dbus_connection_unref(connection);
1653         connection = NULL;
1654 }
1655
1656 int supplicant_register(struct supplicant_driver *driver)
1657 {
1658         int err;
1659
1660         DBG("driver %p name %s", driver, driver->name);
1661
1662         err = supplicant_create();
1663         if (err < 0)
1664                 return err;
1665
1666         driver_list = g_slist_append(driver_list, driver);
1667
1668         if (g_dbus_check_service(connection, SUPPLICANT_NAME) == TRUE)
1669                 supplicant_probe(connection, NULL);
1670         else
1671                 supplicant_activate(connection);
1672
1673         return 0;
1674 }
1675
1676 void supplicant_unregister(struct supplicant_driver *driver)
1677 {
1678         DBG("driver %p name %s", driver, driver->name);
1679
1680         supplicant_remove(connection, NULL);
1681
1682         driver_list = g_slist_remove(driver_list, driver);
1683
1684         supplicant_destroy();
1685 }