Fix handling of WEP shared key
[platform/upstream/connman.git] / plugins / supplicant.c
1 /*
2  *
3  *  Connection Manager
4  *
5  *  Copyright (C) 2007-2009  Intel Corporation. All rights reserved.
6  *
7  *  This program is free software; you can redistribute it and/or modify
8  *  it under the terms of the GNU General Public License version 2 as
9  *  published by the Free Software Foundation.
10  *
11  *  This program is distributed in the hope that it will be useful,
12  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
13  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14  *  GNU General Public License for more details.
15  *
16  *  You should have received a copy of the GNU General Public License
17  *  along with this program; if not, write to the Free Software
18  *  Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA
19  *
20  */
21
22 #ifdef HAVE_CONFIG_H
23 #include <config.h>
24 #endif
25
26 #include <stdio.h>
27 #include <errno.h>
28 #include <stdlib.h>
29 #include <string.h>
30 #include <net/ethernet.h>
31
32 #include <gdbus.h>
33
34 #define CONNMAN_API_SUBJECT_TO_CHANGE
35 #include <connman/device.h>
36 #include <connman/option.h>
37 #include <connman/inet.h>
38 #include <connman/dbus.h>
39 #include <connman/log.h>
40
41 #include "supplicant.h"
42
43 #define TIMEOUT 5000
44
45 #define IEEE80211_CAP_ESS       0x0001
46 #define IEEE80211_CAP_IBSS      0x0002
47 #define IEEE80211_CAP_PRIVACY   0x0010
48
49 #define SUPPLICANT_NAME  "fi.epitest.hostap.WPASupplicant"
50 #define SUPPLICANT_INTF  "fi.epitest.hostap.WPASupplicant"
51 #define SUPPLICANT_PATH  "/fi/epitest/hostap/WPASupplicant"
52
53 /* Taken from "WPA Supplicant - Common definitions" */
54 enum supplicant_state {
55         /**
56          * WPA_DISCONNECTED - Disconnected state
57          *
58          * This state indicates that client is not associated, but is likely to
59          * start looking for an access point. This state is entered when a
60          * connection is lost.
61          */
62         WPA_DISCONNECTED,
63
64         /**
65          * WPA_INACTIVE - Inactive state (wpa_supplicant disabled)
66          *
67          * This state is entered if there are no enabled networks in the
68          * configuration. wpa_supplicant is not trying to associate with a new
69          * network and external interaction (e.g., ctrl_iface call to add or
70          * enable a network) is needed to start association.
71          */
72         WPA_INACTIVE,
73
74         /**
75          * WPA_SCANNING - Scanning for a network
76          *
77          * This state is entered when wpa_supplicant starts scanning for a
78          * network.
79          */
80         WPA_SCANNING,
81
82         /**
83          * WPA_ASSOCIATING - Trying to associate with a BSS/SSID
84          *
85          * This state is entered when wpa_supplicant has found a suitable BSS
86          * to associate with and the driver is configured to try to associate
87          * with this BSS in ap_scan=1 mode. When using ap_scan=2 mode, this
88          * state is entered when the driver is configured to try to associate
89          * with a network using the configured SSID and security policy.
90          */
91         WPA_ASSOCIATING,
92
93         /**
94          * WPA_ASSOCIATED - Association completed
95          *
96          * This state is entered when the driver reports that association has
97          * been successfully completed with an AP. If IEEE 802.1X is used
98          * (with or without WPA/WPA2), wpa_supplicant remains in this state
99          * until the IEEE 802.1X/EAPOL authentication has been completed.
100          */
101         WPA_ASSOCIATED,
102
103         /**
104          * WPA_4WAY_HANDSHAKE - WPA 4-Way Key Handshake in progress
105          *
106          * This state is entered when WPA/WPA2 4-Way Handshake is started. In
107          * case of WPA-PSK, this happens when receiving the first EAPOL-Key
108          * frame after association. In case of WPA-EAP, this state is entered
109          * when the IEEE 802.1X/EAPOL authentication has been completed.
110          */
111         WPA_4WAY_HANDSHAKE,
112
113         /**
114          * WPA_GROUP_HANDSHAKE - WPA Group Key Handshake in progress
115          *
116          * This state is entered when 4-Way Key Handshake has been completed
117          * (i.e., when the supplicant sends out message 4/4) and when Group
118          * Key rekeying is started by the AP (i.e., when supplicant receives
119          * message 1/2).
120          */
121         WPA_GROUP_HANDSHAKE,
122
123         /**
124          * WPA_COMPLETED - All authentication completed
125          *
126          * This state is entered when the full authentication process is
127          * completed. In case of WPA2, this happens when the 4-Way Handshake is
128          * successfully completed. With WPA, this state is entered after the
129          * Group Key Handshake; with IEEE 802.1X (non-WPA) connection is
130          * completed after dynamic keys are received (or if not used, after
131          * the EAP authentication has been completed). With static WEP keys and
132          * plaintext connections, this state is entered when an association
133          * has been completed.
134          *
135          * This state indicates that the supplicant has completed its
136          * processing for the association phase and that data connection is
137          * fully configured.
138          */
139         WPA_COMPLETED,
140
141         /**
142          * WPA_INVALID - Invalid state (parsing error)
143          *
144          * This state is returned if the string input is invalid. It is not
145          * an official wpa_supplicant state.
146          */
147         WPA_INVALID,
148 };
149
150 struct supplicant_result {
151         char *path;
152         char *name;
153         unsigned char *addr;
154         unsigned int addr_len;
155         unsigned char *ssid;
156         unsigned int ssid_len;
157         dbus_uint16_t capabilities;
158         gboolean adhoc;
159         gboolean has_wep;
160         gboolean has_wpa;
161         gboolean has_rsn;
162         gboolean has_wps;
163         dbus_int32_t frequency;
164         dbus_int32_t quality;
165         dbus_int32_t noise;
166         dbus_int32_t level;
167         dbus_int32_t maxrate;
168 };
169
170 struct supplicant_task {
171         int ifindex;
172         char *ifname;
173         struct connman_device *device;
174         struct connman_network *network;
175         char *path;
176         char *netpath;
177         gboolean created;
178         enum supplicant_state state;
179         gboolean noscan;
180         GSList *scan_results;
181 };
182
183 static GSList *task_list = NULL;
184
185 static DBusConnection *connection;
186
187 static void free_task(struct supplicant_task *task)
188 {
189         DBG("task %p", task);
190
191         g_free(task->ifname);
192         g_free(task->path);
193         g_free(task);
194 }
195
196 static struct supplicant_task *find_task_by_index(int index)
197 {
198         GSList *list;
199
200         for (list = task_list; list; list = list->next) {
201                 struct supplicant_task *task = list->data;
202
203                 if (task->ifindex == index)
204                         return task;
205         }
206
207         return NULL;
208 }
209
210 static struct supplicant_task *find_task_by_path(const char *path)
211 {
212         GSList *list;
213
214         for (list = task_list; list; list = list->next) {
215                 struct supplicant_task *task = list->data;
216
217                 if (g_strcmp0(task->path, path) == 0)
218                         return task;
219         }
220
221         return NULL;
222 }
223
224 static void add_interface_reply(DBusPendingCall *call, void *user_data)
225 {
226         struct supplicant_task *task = user_data;
227         DBusMessage *reply;
228         DBusError error;
229         const char *path;
230
231         DBG("task %p", task);
232
233         reply = dbus_pending_call_steal_reply(call);
234         if (reply == NULL)
235                 return;
236
237         if (dbus_message_get_type(reply) == DBUS_MESSAGE_TYPE_ERROR)
238                 goto failed;
239
240         dbus_error_init(&error);
241
242         if (dbus_message_get_args(reply, &error, DBUS_TYPE_OBJECT_PATH, &path,
243                                                 DBUS_TYPE_INVALID) == FALSE) {
244                 if (dbus_error_is_set(&error) == TRUE) {
245                         connman_error("%s", error.message);
246                         dbus_error_free(&error);
247                 } else
248                         connman_error("Wrong arguments for add interface");
249                 goto failed;
250         }
251
252         DBG("path %s", path);
253
254         task->path = g_strdup(path);
255         task->created = TRUE;
256
257         connman_device_set_powered(task->device, TRUE);
258
259         dbus_message_unref(reply);
260
261         return;
262
263 failed:
264         task_list = g_slist_remove(task_list, task);
265
266         connman_device_unref(task->device);
267
268         free_task(task);
269 }
270
271 static int add_interface(struct supplicant_task *task)
272 {
273         const char *driver = connman_option_get_string("wifi");
274         DBusMessage *message;
275         DBusMessageIter array, dict;
276         DBusPendingCall *call;
277
278         DBG("task %p", task);
279
280         message = dbus_message_new_method_call(SUPPLICANT_NAME, SUPPLICANT_PATH,
281                                         SUPPLICANT_INTF, "addInterface");
282         if (message == NULL)
283                 return -ENOMEM;
284
285         dbus_message_iter_init_append(message, &array);
286
287         dbus_message_iter_append_basic(&array,
288                                         DBUS_TYPE_STRING, &task->ifname);
289
290         dbus_message_iter_open_container(&array, DBUS_TYPE_ARRAY,
291                         DBUS_DICT_ENTRY_BEGIN_CHAR_AS_STRING
292                         DBUS_TYPE_STRING_AS_STRING DBUS_TYPE_VARIANT_AS_STRING
293                         DBUS_DICT_ENTRY_END_CHAR_AS_STRING, &dict);
294
295         connman_dbus_dict_append_variant(&dict, "driver",
296                                                 DBUS_TYPE_STRING, &driver);
297
298         dbus_message_iter_close_container(&array, &dict);
299
300         if (dbus_connection_send_with_reply(connection, message,
301                                                 &call, TIMEOUT) == FALSE) {
302                 connman_error("Failed to add interface");
303                 dbus_message_unref(message);
304                 return -EIO;
305         }
306
307         if (call == NULL) {
308                 connman_error("D-Bus connection not available");
309                 dbus_message_unref(message);
310                 return -EIO;
311         }
312
313         dbus_pending_call_set_notify(call, add_interface_reply, task, NULL);
314
315         dbus_message_unref(message);
316
317         return -EINPROGRESS;
318 }
319
320 static void get_interface_reply(DBusPendingCall *call, void *user_data)
321 {
322         struct supplicant_task *task = user_data;
323         DBusMessage *reply;
324         DBusError error;
325         const char *path;
326
327         DBG("task %p", task);
328
329         reply = dbus_pending_call_steal_reply(call);
330         if (reply == NULL)
331                 return;
332
333         if (dbus_message_get_type(reply) == DBUS_MESSAGE_TYPE_ERROR) {
334                 add_interface(task);
335                 goto done;
336         }
337
338         dbus_error_init(&error);
339
340         if (dbus_message_get_args(reply, &error, DBUS_TYPE_OBJECT_PATH, &path,
341                                                 DBUS_TYPE_INVALID) == FALSE) {
342                 if (dbus_error_is_set(&error) == TRUE) {
343                         connman_error("%s", error.message);
344                         dbus_error_free(&error);
345                 } else
346                         connman_error("Wrong arguments for get interface");
347                 goto done;
348         }
349
350         DBG("path %s", path);
351
352         task->path = g_strdup(path);
353         task->created = FALSE;
354
355         connman_device_set_powered(task->device, TRUE);
356
357 done:
358         dbus_message_unref(reply);
359 }
360
361 static int create_interface(struct supplicant_task *task)
362 {
363         DBusMessage *message;
364         DBusPendingCall *call;
365
366         DBG("task %p", task);
367
368         message = dbus_message_new_method_call(SUPPLICANT_NAME, SUPPLICANT_PATH,
369                                         SUPPLICANT_INTF, "getInterface");
370         if (message == NULL)
371                 return -ENOMEM;
372
373         dbus_message_append_args(message, DBUS_TYPE_STRING, &task->ifname,
374                                                         DBUS_TYPE_INVALID);
375
376         if (dbus_connection_send_with_reply(connection, message,
377                                                 &call, TIMEOUT) == FALSE) {
378                 connman_error("Failed to get interface");
379                 dbus_message_unref(message);
380                 return -EIO;
381         }
382
383         if (call == NULL) {
384                 connman_error("D-Bus connection not available");
385                 dbus_message_unref(message);
386                 return -EIO;
387         }
388
389         dbus_pending_call_set_notify(call, get_interface_reply, task, NULL);
390
391         dbus_message_unref(message);
392
393         return -EINPROGRESS;
394 }
395
396 static void remove_interface_reply(DBusPendingCall *call, void *user_data)
397 {
398         struct supplicant_task *task = user_data;
399         DBusMessage *reply;
400
401         DBG("task %p", task);
402
403         reply = dbus_pending_call_steal_reply(call);
404
405         connman_device_set_powered(task->device, FALSE);
406
407         connman_device_unref(task->device);
408
409         connman_inet_ifdown(task->ifindex);
410
411         free_task(task);
412
413         dbus_message_unref(reply);
414 }
415
416 static int remove_interface(struct supplicant_task *task)
417 {
418         DBusMessage *message;
419         DBusPendingCall *call;
420
421         DBG("task %p", task);
422
423         if (task->created == FALSE) {
424                 connman_device_set_powered(task->device, FALSE);
425                 return 0;
426         }
427
428         message = dbus_message_new_method_call(SUPPLICANT_NAME, SUPPLICANT_PATH,
429                                         SUPPLICANT_INTF, "removeInterface");
430         if (message == NULL)
431                 return -ENOMEM;
432
433         dbus_message_append_args(message, DBUS_TYPE_OBJECT_PATH, &task->path,
434                                                         DBUS_TYPE_INVALID);
435
436         if (dbus_connection_send_with_reply(connection, message,
437                                                 &call, TIMEOUT) == FALSE) {
438                 connman_error("Failed to remove interface");
439                 dbus_message_unref(message);
440                 return -EIO;
441         }
442
443         if (call == NULL) {
444                 connman_error("D-Bus connection not available");
445                 dbus_message_unref(message);
446                 return -EIO;
447         }
448
449         dbus_pending_call_set_notify(call, remove_interface_reply, task, NULL);
450
451         dbus_message_unref(message);
452
453         return -EINPROGRESS;
454 }
455
456 #if 0
457 static int set_ap_scan(struct supplicant_task *task)
458 {
459         DBusMessage *message, *reply;
460         DBusError error;
461         guint32 ap_scan = 1;
462
463         DBG("task %p", task);
464
465         message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
466                                 SUPPLICANT_INTF ".Interface", "setAPScan");
467         if (message == NULL)
468                 return -ENOMEM;
469
470         dbus_message_append_args(message, DBUS_TYPE_UINT32, &ap_scan,
471                                                         DBUS_TYPE_INVALID);
472
473         dbus_error_init(&error);
474
475         reply = dbus_connection_send_with_reply_and_block(connection,
476                                                         message, -1, &error);
477         if (reply == NULL) {
478                 if (dbus_error_is_set(&error) == TRUE) {
479                         connman_error("%s", error.message);
480                         dbus_error_free(&error);
481                 } else
482                         connman_error("Failed to set AP scan");
483                 dbus_message_unref(message);
484                 return -EIO;
485         }
486
487         dbus_message_unref(message);
488
489         dbus_message_unref(reply);
490
491         return 0;
492 }
493 #endif
494
495 static int add_network(struct supplicant_task *task)
496 {
497         DBusMessage *message, *reply;
498         DBusError error;
499         const char *path;
500
501         DBG("task %p", task);
502
503         if (task->netpath != NULL)
504                 return -EALREADY;
505
506         message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
507                                 SUPPLICANT_INTF ".Interface", "addNetwork");
508         if (message == NULL)
509                 return -ENOMEM;
510
511         dbus_error_init(&error);
512
513         reply = dbus_connection_send_with_reply_and_block(connection,
514                                                         message, -1, &error);
515         if (reply == NULL) {
516                 if (dbus_error_is_set(&error) == TRUE) {
517                         connman_error("%s", error.message);
518                         dbus_error_free(&error);
519                 } else
520                         connman_error("Failed to add network");
521                 dbus_message_unref(message);
522                 return -EIO;
523         }
524
525         dbus_message_unref(message);
526
527         dbus_error_init(&error);
528
529         if (dbus_message_get_args(reply, &error, DBUS_TYPE_OBJECT_PATH, &path,
530                                                 DBUS_TYPE_INVALID) == FALSE) {
531                 if (dbus_error_is_set(&error) == TRUE) {
532                         connman_error("%s", error.message);
533                         dbus_error_free(&error);
534                 } else
535                         connman_error("Wrong arguments for network");
536                 dbus_message_unref(reply);
537                 return -EIO;
538         }
539
540         DBG("path %s", path);
541
542         task->netpath = g_strdup(path);
543
544         dbus_message_unref(reply);
545
546         return 0;
547 }
548
549 static int remove_network(struct supplicant_task *task)
550 {
551         DBusMessage *message, *reply;
552         DBusError error;
553
554         DBG("task %p", task);
555
556         if (task->netpath == NULL)
557                 return -EINVAL;
558
559         message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
560                                 SUPPLICANT_INTF ".Interface", "removeNetwork");
561         if (message == NULL)
562                 return -ENOMEM;
563
564         dbus_message_append_args(message, DBUS_TYPE_OBJECT_PATH, &task->netpath,
565                                                         DBUS_TYPE_INVALID);
566
567         dbus_error_init(&error);
568
569         reply = dbus_connection_send_with_reply_and_block(connection,
570                                                         message, -1, &error);
571         if (reply == NULL) {
572                 if (dbus_error_is_set(&error) == TRUE) {
573                         connman_error("%s", error.message);
574                         dbus_error_free(&error);
575                 } else
576                         connman_error("Failed to remove network");
577                 dbus_message_unref(message);
578                 return -EIO;
579         }
580
581         dbus_message_unref(message);
582
583         dbus_message_unref(reply);
584
585         g_free(task->netpath);
586         task->netpath = NULL;
587
588         return 0;
589 }
590
591 static int select_network(struct supplicant_task *task)
592 {
593         DBusMessage *message, *reply;
594         DBusError error;
595
596         DBG("task %p", task);
597
598         if (task->netpath == NULL)
599                 return -EINVAL;
600
601         message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
602                                 SUPPLICANT_INTF ".Interface", "selectNetwork");
603         if (message == NULL)
604                 return -ENOMEM;
605
606         dbus_message_append_args(message, DBUS_TYPE_OBJECT_PATH, &task->netpath,
607                                                         DBUS_TYPE_INVALID);
608
609         dbus_error_init(&error);
610
611         reply = dbus_connection_send_with_reply_and_block(connection,
612                                                         message, -1, &error);
613         if (reply == NULL) {
614                 if (dbus_error_is_set(&error) == TRUE) {
615                         connman_error("%s", error.message);
616                         dbus_error_free(&error);
617                 } else
618                         connman_error("Failed to select network");
619                 dbus_message_unref(message);
620                 return -EIO;
621         }
622
623         dbus_message_unref(message);
624
625         dbus_message_unref(reply);
626
627         return 0;
628 }
629
630 static int enable_network(struct supplicant_task *task)
631 {
632         DBusMessage *message, *reply;
633         DBusError error;
634
635         DBG("task %p", task);
636
637         if (task->netpath == NULL)
638                 return -EINVAL;
639
640         message = dbus_message_new_method_call(SUPPLICANT_NAME, task->netpath,
641                                         SUPPLICANT_INTF ".Network", "enable");
642         if (message == NULL)
643                 return -ENOMEM;
644
645         dbus_error_init(&error);
646
647         reply = dbus_connection_send_with_reply_and_block(connection,
648                                                         message, -1, &error);
649         if (reply == NULL) {
650                 if (dbus_error_is_set(&error) == TRUE) {
651                         connman_error("%s", error.message);
652                         dbus_error_free(&error);
653                 } else
654                         connman_error("Failed to enable network");
655                 dbus_message_unref(message);
656                 return -EIO;
657         }
658
659         dbus_message_unref(message);
660
661         dbus_message_unref(reply);
662
663         return 0;
664 }
665
666 static int disable_network(struct supplicant_task *task)
667 {
668         DBusMessage *message, *reply;
669         DBusError error;
670
671         DBG("task %p", task);
672
673         if (task->netpath == NULL)
674                 return -EINVAL;
675
676         message = dbus_message_new_method_call(SUPPLICANT_NAME, task->netpath,
677                                         SUPPLICANT_INTF ".Network", "disable");
678         if (message == NULL)
679                 return -ENOMEM;
680
681         dbus_error_init(&error);
682
683         reply = dbus_connection_send_with_reply_and_block(connection,
684                                                         message, -1, &error);
685         if (reply == NULL) {
686                 if (dbus_error_is_set(&error) == TRUE) {
687                         connman_error("%s", error.message);
688                         dbus_error_free(&error);
689                 } else
690                         connman_error("Failed to disable network");
691                 dbus_message_unref(message);
692                 return -EIO;
693         }
694
695         dbus_message_unref(message);
696
697         dbus_message_unref(reply);
698
699         return 0;
700 }
701
702 static int set_network(struct supplicant_task *task,
703                                 const unsigned char *network, int len,
704                                 const char *address, const char *security,
705                                                         const char *passphrase)
706 {
707         DBusMessage *message, *reply;
708         DBusMessageIter array, dict;
709         DBusError error;
710
711         DBG("task %p", task);
712
713         if (task->netpath == NULL)
714                 return -EINVAL;
715
716         message = dbus_message_new_method_call(SUPPLICANT_NAME, task->netpath,
717                                         SUPPLICANT_INTF ".Network", "set");
718         if (message == NULL)
719                 return -ENOMEM;
720
721         dbus_message_iter_init_append(message, &array);
722
723         dbus_message_iter_open_container(&array, DBUS_TYPE_ARRAY,
724                         DBUS_DICT_ENTRY_BEGIN_CHAR_AS_STRING
725                         DBUS_TYPE_STRING_AS_STRING DBUS_TYPE_VARIANT_AS_STRING
726                         DBUS_DICT_ENTRY_END_CHAR_AS_STRING, &dict);
727
728         if (address == NULL) {
729                 dbus_uint32_t scan_ssid = 1;
730                 connman_dbus_dict_append_variant(&dict, "scan_ssid",
731                                                 DBUS_TYPE_UINT32, &scan_ssid);
732         } else
733                 connman_dbus_dict_append_variant(&dict, "bssid",
734                                                 DBUS_TYPE_STRING, &address);
735
736         connman_dbus_dict_append_array(&dict, "ssid",
737                                         DBUS_TYPE_BYTE, &network, len);
738
739         if (g_ascii_strcasecmp(security, "wpa") == 0 ||
740                                 g_ascii_strcasecmp(security, "rsn") == 0) {
741                 const char *key_mgmt = "WPA-PSK";
742                 connman_dbus_dict_append_variant(&dict, "key_mgmt",
743                                                 DBUS_TYPE_STRING, &key_mgmt);
744
745                 if (passphrase && strlen(passphrase) > 0)
746                         connman_dbus_dict_append_variant(&dict, "psk",
747                                                 DBUS_TYPE_STRING, &passphrase);
748         } else if (g_ascii_strcasecmp(security, "wep") == 0) {
749                 const char *key_mgmt = "NONE", *index = "0";
750                 const char *auth_alg = "OPEN SHARED";
751                 connman_dbus_dict_append_variant(&dict, "key_mgmt",
752                                                 DBUS_TYPE_STRING, &key_mgmt);
753
754                 connman_dbus_dict_append_variant(&dict, "auth_alg",
755                                                 DBUS_TYPE_STRING, &auth_alg);
756
757                 if (passphrase) {
758                         int size = strlen(passphrase);
759                         if (size == 10 || size == 26) {
760                                 unsigned char *key = malloc(13);
761                                 char tmp[3];
762                                 int i;
763                                 memset(tmp, 0, sizeof(tmp));
764                                 if (key == NULL)
765                                         size = 0;
766                                 for (i = 0; i < size / 2; i++) {
767                                         memcpy(tmp, passphrase + (i * 2), 2);
768                                         key[i] = (unsigned char) strtol(tmp,
769                                                                 NULL, 16);
770                                 }
771                                 connman_dbus_dict_append_array(&dict,
772                                                 "wep_key0", DBUS_TYPE_BYTE,
773                                                         &key, size / 2);
774                                 free(key);
775                         } else
776                                 connman_dbus_dict_append_variant(&dict,
777                                                 "wep_key0", DBUS_TYPE_STRING,
778                                                                 &passphrase);
779                         connman_dbus_dict_append_variant(&dict, "wep_tx_keyidx",
780                                                 DBUS_TYPE_STRING, &index);
781                 }
782         } else {
783                 const char *key_mgmt = "NONE";
784                 connman_dbus_dict_append_variant(&dict, "key_mgmt",
785                                                 DBUS_TYPE_STRING, &key_mgmt);
786         }
787
788         dbus_message_iter_close_container(&array, &dict);
789
790         dbus_error_init(&error);
791
792         reply = dbus_connection_send_with_reply_and_block(connection,
793                                                         message, -1, &error);
794         if (reply == NULL) {
795                 if (dbus_error_is_set(&error) == TRUE) {
796                         connman_error("%s", error.message);
797                         dbus_error_free(&error);
798                 } else
799                         connman_error("Failed to set network options");
800                 dbus_message_unref(message);
801                 return -EIO;
802         }
803
804         dbus_message_unref(message);
805
806         dbus_message_unref(reply);
807
808         return 0;
809 }
810
811 static int initiate_scan(struct supplicant_task *task)
812 {
813         DBusMessage *message;
814         DBusPendingCall *call;
815
816         DBG("task %p", task);
817
818         message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
819                                         SUPPLICANT_INTF ".Interface", "scan");
820         if (message == NULL)
821                 return -ENOMEM;
822
823         if (dbus_connection_send_with_reply(connection, message,
824                                                 &call, TIMEOUT) == FALSE) {
825                 connman_error("Failed to initiate scan");
826                 dbus_message_unref(message);
827                 return -EIO;
828         }
829
830         dbus_message_unref(message);
831
832         return 0;
833 }
834
835 static struct {
836         char *name;
837         char *value;
838 } special_ssid[] = {
839         { "<hidden>", "hidden"  },
840         { "default",  "linksys" },
841         { "wireless"  },
842         { "linksys"   },
843         { "netgear"   },
844         { "dlink"     },
845         { "2wire"     },
846         { "compaq"    },
847         { "tsunami"   },
848         { "comcomcom", "3com"     },
849         { "3Com",      "3com"     },
850         { "Symbol",    "symbol"   },
851         { "Motorola",  "motorola" },
852         { "Wireless" , "wireless" },
853         { "WLAN",      "wlan"     },
854         { }
855 };
856
857 static char *build_group(const char *addr, const char *name,
858                         const unsigned char *ssid, unsigned int ssid_len,
859                                         const char *mode, const char *security)
860 {
861         GString *str;
862         unsigned int i;
863
864         if (addr == NULL)
865                 return NULL;
866
867         str = g_string_sized_new((ssid_len * 2) + 24);
868         if (str == NULL)
869                 return NULL;
870
871         for (i = 0; special_ssid[i].name; i++) {
872                 if (g_strcmp0(special_ssid[i].name, name) == 0) {
873                         if (special_ssid[i].value == NULL)
874                                 g_string_append_printf(str, "%s_%s",
875                                                                 name, addr);
876                         else
877                                 g_string_append_printf(str, "%s_%s",
878                                                 special_ssid[i].value, addr);
879                         goto done;
880                 }
881         }
882
883         if (ssid_len > 0 && ssid[0] != '\0') {
884                 for (i = 0; i < ssid_len; i++)
885                         g_string_append_printf(str, "%02x", ssid[i]);
886         } else
887                 g_string_append_printf(str, "hidden_%s", addr);
888
889 done:
890         g_string_append_printf(str, "_%s_%s", mode, security);
891
892         return g_string_free(str, FALSE);
893 }
894
895 static void extract_addr(DBusMessageIter *value,
896                                         struct supplicant_result *result)
897 {
898         DBusMessageIter array;
899         struct ether_addr *eth;
900         unsigned char *addr;
901         int addr_len;
902
903         dbus_message_iter_recurse(value, &array);
904         dbus_message_iter_get_fixed_array(&array, &addr, &addr_len);
905
906         if (addr_len != 6)
907                 return;
908
909         result->addr = g_try_malloc(addr_len);
910         if (result->addr == NULL)
911                 return;
912
913         memcpy(result->addr, addr, addr_len);
914         result->addr_len = addr_len;
915
916         result->path = g_try_malloc0(13);
917         if (result->path == NULL)
918                 return;
919
920         eth = (void *) addr;
921
922         snprintf(result->path, 13, "%02x%02x%02x%02x%02x%02x",
923                                                 eth->ether_addr_octet[0],
924                                                 eth->ether_addr_octet[1],
925                                                 eth->ether_addr_octet[2],
926                                                 eth->ether_addr_octet[3],
927                                                 eth->ether_addr_octet[4],
928                                                 eth->ether_addr_octet[5]);
929 }
930
931 static void extract_ssid(DBusMessageIter *value,
932                                         struct supplicant_result *result)
933 {
934         DBusMessageIter array;
935         unsigned char *ssid;
936         int ssid_len, i;
937         char *d;
938
939         dbus_message_iter_recurse(value, &array);
940         dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
941
942         if (ssid_len < 1)
943                 return;
944
945         result->ssid = g_try_malloc(ssid_len);
946         if (result->ssid == NULL)
947                 return;
948
949         memcpy(result->ssid, ssid, ssid_len);
950         result->ssid_len = ssid_len;
951
952         result->name = g_try_malloc0(ssid_len + 1);
953         if (result->name == NULL)
954                 return;
955
956         d =  result->name;
957         for (i = 0; i < ssid_len; i++)
958                 if (g_ascii_isprint(ssid[i]))
959                         *d++ = ssid[i];
960
961         *d = '\0';
962 }
963
964 static void extract_wpaie(DBusMessageIter *value,
965                                         struct supplicant_result *result)
966 {
967         DBusMessageIter array;
968         unsigned char *ie;
969         int ie_len;
970
971         dbus_message_iter_recurse(value, &array);
972         dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
973
974         if (ie_len > 0)
975                 result->has_wpa = TRUE;
976 }
977
978 static void extract_rsnie(DBusMessageIter *value,
979                                         struct supplicant_result *result)
980 {
981         DBusMessageIter array;
982         unsigned char *ie;
983         int ie_len;
984
985         dbus_message_iter_recurse(value, &array);
986         dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
987
988         if (ie_len > 0)
989                 result->has_rsn = TRUE;
990 }
991
992 static void extract_wpsie(DBusMessageIter *value,
993                                         struct supplicant_result *result)
994 {
995         DBusMessageIter array;
996         unsigned char *ie;
997         int ie_len;
998
999         dbus_message_iter_recurse(value, &array);
1000         dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
1001
1002         if (ie_len > 0)
1003                 result->has_wps = TRUE;
1004 }
1005
1006 static void extract_capabilites(DBusMessageIter *value,
1007                                         struct supplicant_result *result)
1008 {
1009         dbus_message_iter_get_basic(value, &result->capabilities);
1010
1011         if (result->capabilities & IEEE80211_CAP_ESS)
1012                 result->adhoc = FALSE;
1013         else if (result->capabilities & IEEE80211_CAP_IBSS)
1014                 result->adhoc = TRUE;
1015
1016         if (result->capabilities & IEEE80211_CAP_PRIVACY)
1017                 result->has_wep = TRUE;
1018 }
1019
1020 static unsigned char calculate_strength(struct supplicant_result *result)
1021 {
1022         if (result->quality < 0) {
1023                 unsigned char strength;
1024
1025                 if (result->level > 0)
1026                         strength = 100 - result->level;
1027                 else
1028                         strength = 120 + result->level;
1029
1030                 if (strength > 100)
1031                         strength = 100;
1032
1033                 return strength;
1034         }
1035
1036         return result->quality;
1037 }
1038
1039 static unsigned short calculate_channel(struct supplicant_result *result)
1040 {
1041         if (result->frequency < 0)
1042                 return 0;
1043
1044         return (result->frequency - 2407) / 5;
1045 }
1046
1047 static void get_properties(struct supplicant_task *task);
1048
1049 static void properties_reply(DBusPendingCall *call, void *user_data)
1050 {
1051         struct supplicant_task *task = user_data;
1052         struct supplicant_result result;
1053         struct connman_network *network;
1054         DBusMessage *reply;
1055         DBusMessageIter array, dict;
1056         unsigned char strength;
1057         unsigned short channel, frequency;
1058         const char *mode, *security;
1059         char *group;
1060
1061         DBG("task %p", task);
1062
1063         reply = dbus_pending_call_steal_reply(call);
1064         if (reply == NULL) {
1065                 get_properties(task);
1066                 return;
1067         }
1068
1069         if (dbus_message_get_type(reply) == DBUS_MESSAGE_TYPE_ERROR) {
1070                 dbus_message_unref(reply);
1071                 get_properties(task);
1072                 return;
1073         }
1074
1075         memset(&result, 0, sizeof(result));
1076         result.frequency = -1;
1077         result.quality = -1;
1078         result.level = 0;
1079         result.noise = 0;
1080
1081         dbus_message_iter_init(reply, &array);
1082
1083         dbus_message_iter_recurse(&array, &dict);
1084
1085         while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_DICT_ENTRY) {
1086                 DBusMessageIter entry, value;
1087                 const char *key;
1088
1089                 dbus_message_iter_recurse(&dict, &entry);
1090                 dbus_message_iter_get_basic(&entry, &key);
1091
1092                 dbus_message_iter_next(&entry);
1093
1094                 dbus_message_iter_recurse(&entry, &value);
1095
1096                 //type = dbus_message_iter_get_arg_type(&value);
1097                 //dbus_message_iter_get_basic(&value, &val);
1098
1099                 /* 
1100                  * bssid        : a (97)
1101                  * ssid         : a (97)
1102                  * wpaie        : a (97)
1103                  * rsnie        : a (97)
1104                  * wpsie        : a (97)
1105                  * frequency    : i (105)
1106                  * capabilities : q (113)
1107                  * quality      : i (105)
1108                  * noise        : i (105)
1109                  * level        : i (105)
1110                  * maxrate      : i (105)
1111                  */
1112
1113                 if (g_str_equal(key, "bssid") == TRUE)
1114                         extract_addr(&value, &result);
1115                 else if (g_str_equal(key, "ssid") == TRUE)
1116                         extract_ssid(&value, &result);
1117                 else if (g_str_equal(key, "wpaie") == TRUE)
1118                         extract_wpaie(&value, &result);
1119                 else if (g_str_equal(key, "rsnie") == TRUE)
1120                         extract_rsnie(&value, &result);
1121                 else if (g_str_equal(key, "wpsie") == TRUE)
1122                         extract_wpsie(&value, &result);
1123                 else if (g_str_equal(key, "capabilities") == TRUE)
1124                         extract_capabilites(&value, &result);
1125                 else if (g_str_equal(key, "frequency") == TRUE)
1126                         dbus_message_iter_get_basic(&value, &result.frequency);
1127                 else if (g_str_equal(key, "quality") == TRUE)
1128                         dbus_message_iter_get_basic(&value, &result.quality);
1129                 else if (g_str_equal(key, "noise") == TRUE)
1130                         dbus_message_iter_get_basic(&value, &result.noise);
1131                 else if (g_str_equal(key, "level") == TRUE)
1132                         dbus_message_iter_get_basic(&value, &result.level);
1133                 else if (g_str_equal(key, "maxrate") == TRUE)
1134                         dbus_message_iter_get_basic(&value, &result.maxrate);
1135
1136                 dbus_message_iter_next(&dict);
1137         }
1138
1139         if (result.path == NULL)
1140                 goto done;
1141
1142         if (result.path[0] == '\0')
1143                 goto done;
1144
1145         if (result.frequency > 0 && result.frequency < 14)
1146                 result.frequency = 2407 + (5 * result.frequency);
1147         else if (result.frequency == 14)
1148                 result.frequency = 2484;
1149
1150         strength = calculate_strength(&result);
1151         channel  = calculate_channel(&result);
1152
1153         frequency = (result.frequency < 0) ? 0 : result.frequency;
1154
1155         if (result.has_rsn == TRUE)
1156                 security = "rsn";
1157         else if (result.has_wpa == TRUE)
1158                 security = "wpa";
1159         else if (result.has_wep == TRUE)
1160                 security = "wep";
1161         else
1162                 security = "none";
1163
1164         mode = (result.adhoc == TRUE) ? "adhoc" : "managed";
1165
1166         group = build_group(result.path, result.name,
1167                                         result.ssid, result.ssid_len,
1168                                                         mode, security);
1169
1170         network = connman_device_get_network(task->device, result.path);
1171         if (network == NULL) {
1172                 int index;
1173
1174                 network = connman_network_create(result.path,
1175                                                 CONNMAN_NETWORK_TYPE_WIFI);
1176                 if (network == NULL)
1177                         goto done;
1178
1179                 index = connman_device_get_index(task->device);
1180                 connman_network_set_index(network, index);
1181
1182                 connman_network_set_protocol(network,
1183                                                 CONNMAN_NETWORK_PROTOCOL_IP);
1184
1185                 connman_network_set_address(network, result.addr,
1186                                                         result.addr_len);
1187
1188                 if (connman_device_add_network(task->device, network) < 0) {
1189                         connman_network_unref(network);
1190                         goto done;
1191                 }
1192         }
1193
1194         if (result.name != NULL && result.name[0] != '\0')
1195                 connman_network_set_name(network, result.name);
1196
1197         connman_network_set_blob(network, "WiFi.SSID",
1198                                                 result.ssid, result.ssid_len);
1199
1200         connman_network_set_string(network, "WiFi.Mode", mode);
1201
1202         DBG("%s (%s %s) strength %d (%s)",
1203                                 result.name, mode, security, strength,
1204                                 (result.has_wps == TRUE) ? "WPS" : "no WPS");
1205
1206         connman_network_set_available(network, TRUE);
1207         connman_network_set_strength(network, strength);
1208
1209         connman_network_set_uint16(network, "Frequency", frequency);
1210         connman_network_set_uint16(network, "WiFi.Channel", channel);
1211         connman_network_set_string(network, "WiFi.Security", security);
1212
1213         connman_network_set_group(network, group);
1214
1215         g_free(group);
1216
1217 done:
1218         g_free(result.path);
1219         g_free(result.addr);
1220         g_free(result.name);
1221         g_free(result.ssid);
1222
1223         dbus_message_unref(reply);
1224
1225         get_properties(task);
1226 }
1227
1228 static void get_properties(struct supplicant_task *task)
1229 {
1230         DBusMessage *message;
1231         DBusPendingCall *call;
1232         char *path;
1233
1234         path = g_slist_nth_data(task->scan_results, 0);
1235         if (path == NULL)
1236                 goto noscan;
1237
1238         message = dbus_message_new_method_call(SUPPLICANT_NAME, path,
1239                                                 SUPPLICANT_INTF ".BSSID",
1240                                                                 "properties");
1241
1242         task->scan_results = g_slist_remove(task->scan_results, path);
1243         g_free(path);
1244
1245         if (message == NULL)
1246                 goto noscan;
1247
1248         if (dbus_connection_send_with_reply(connection, message,
1249                                                 &call, TIMEOUT) == FALSE) {
1250                 connman_error("Failed to get network properties");
1251                 dbus_message_unref(message);
1252                 goto noscan;
1253         }
1254
1255         if (call == NULL) {
1256                 connman_error("D-Bus connection not available");
1257                 dbus_message_unref(message);
1258                 goto noscan;
1259         }
1260
1261         dbus_pending_call_set_notify(call, properties_reply, task, NULL);
1262
1263         dbus_message_unref(message);
1264
1265         return;
1266
1267 noscan:
1268         if (task->noscan == FALSE)
1269                 connman_device_set_scanning(task->device, FALSE);
1270 }
1271
1272 static void scan_results_reply(DBusPendingCall *call, void *user_data)
1273 {
1274         struct supplicant_task *task = user_data;
1275         DBusMessage *reply;
1276         DBusError error;
1277         char **results;
1278         int i, num_results;
1279
1280         DBG("task %p", task);
1281
1282         reply = dbus_pending_call_steal_reply(call);
1283         if (reply == NULL)
1284                 goto noscan;
1285
1286         if (dbus_message_get_type(reply) == DBUS_MESSAGE_TYPE_ERROR)
1287                 goto done;
1288
1289         dbus_error_init(&error);
1290
1291         if (dbus_message_get_args(reply, &error,
1292                                 DBUS_TYPE_ARRAY, DBUS_TYPE_OBJECT_PATH,
1293                                                 &results, &num_results,
1294                                                 DBUS_TYPE_INVALID) == FALSE) {
1295                 if (dbus_error_is_set(&error) == TRUE) {
1296                         connman_error("%s", error.message);
1297                         dbus_error_free(&error);
1298                 } else
1299                         connman_error("Wrong arguments for scan result");
1300                 goto done;
1301         }
1302
1303         if (num_results == 0)
1304                 goto done;
1305
1306         for (i = 0; i < num_results; i++) {
1307                 char *path = g_strdup(results[i]);
1308                 if (path == NULL)
1309                         continue;
1310
1311                 task->scan_results = g_slist_append(task->scan_results, path);
1312         }
1313
1314         g_strfreev(results);
1315
1316         dbus_message_unref(reply);
1317
1318         get_properties(task);
1319
1320         return;
1321
1322 done:
1323         dbus_message_unref(reply);
1324
1325 noscan:
1326         if (task->noscan == FALSE)
1327                 connman_device_set_scanning(task->device, FALSE);
1328 }
1329
1330 static void scan_results_available(struct supplicant_task *task)
1331 {
1332         DBusMessage *message;
1333         DBusPendingCall *call;
1334
1335         DBG("task %p", task);
1336
1337         message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
1338                                                 SUPPLICANT_INTF ".Interface",
1339                                                         "scanResults");
1340         if (message == NULL)
1341                 return;
1342
1343         if (dbus_connection_send_with_reply(connection, message,
1344                                                 &call, TIMEOUT) == FALSE) {
1345                 connman_error("Failed to request scan result");
1346                 goto done;
1347         }
1348
1349         if (task->noscan == FALSE)
1350                 connman_device_set_scanning(task->device, TRUE);
1351
1352         if (call == NULL) {
1353                 connman_error("D-Bus connection not available");
1354                 goto done;
1355         }
1356
1357         dbus_pending_call_set_notify(call, scan_results_reply, task, NULL);
1358
1359 done:
1360         dbus_message_unref(message);
1361 }
1362
1363 static enum supplicant_state string2state(const char *state)
1364 {
1365         if (g_str_equal(state, "INACTIVE") == TRUE)
1366                 return WPA_INACTIVE;
1367         else if (g_str_equal(state, "SCANNING") == TRUE)
1368                 return WPA_SCANNING;
1369         else if (g_str_equal(state, "ASSOCIATING") == TRUE)
1370                 return WPA_ASSOCIATING;
1371         else if (g_str_equal(state, "ASSOCIATED") == TRUE)
1372                 return WPA_ASSOCIATED;
1373         else if (g_str_equal(state, "GROUP_HANDSHAKE") == TRUE)
1374                 return WPA_GROUP_HANDSHAKE;
1375         else if (g_str_equal(state, "4WAY_HANDSHAKE") == TRUE)
1376                 return WPA_4WAY_HANDSHAKE;
1377         else if (g_str_equal(state, "COMPLETED") == TRUE)
1378                 return WPA_COMPLETED;
1379         else if (g_str_equal(state, "DISCONNECTED") == TRUE)
1380                 return WPA_DISCONNECTED;
1381         else
1382                 return WPA_INVALID;
1383 }
1384
1385 static void state_change(struct supplicant_task *task, DBusMessage *msg)
1386 {
1387         DBusError error;
1388         const char *newstate, *oldstate;
1389         enum supplicant_state state;
1390
1391         dbus_error_init(&error);
1392
1393         if (dbus_message_get_args(msg, &error, DBUS_TYPE_STRING, &newstate,
1394                                                 DBUS_TYPE_STRING, &oldstate,
1395                                                 DBUS_TYPE_INVALID) == FALSE) {
1396                 if (dbus_error_is_set(&error) == TRUE) {
1397                         connman_error("%s", error.message);
1398                         dbus_error_free(&error);
1399                 } else
1400                         connman_error("Wrong arguments for state change");
1401                 return;
1402         }
1403
1404         DBG("state %s ==> %s", oldstate, newstate);
1405
1406         state = string2state(newstate);
1407         if (state == WPA_INVALID)
1408                 return;
1409
1410         task->state = state;
1411
1412         switch (task->state) {
1413         case WPA_SCANNING:
1414                 task->noscan = TRUE;
1415                 connman_device_set_scanning(task->device, TRUE);
1416                 break;
1417         case WPA_ASSOCIATING:
1418         case WPA_ASSOCIATED:
1419         case WPA_4WAY_HANDSHAKE:
1420         case WPA_GROUP_HANDSHAKE:
1421                 task->noscan = TRUE;
1422                 break;
1423         case WPA_COMPLETED:
1424         case WPA_DISCONNECTED:
1425                 task->noscan = FALSE;
1426                 break;
1427         case WPA_INACTIVE:
1428                 task->noscan = FALSE;
1429                 connman_device_set_scanning(task->device, FALSE);
1430                 break;
1431         case WPA_INVALID:
1432                 break;
1433         }
1434
1435         if (task->network == NULL)
1436                 return;
1437
1438         switch (task->state) {
1439         case WPA_COMPLETED:
1440                 /* carrier on */
1441                 connman_network_set_connected(task->network, TRUE);
1442                 connman_device_set_scanning(task->device, FALSE);
1443                 break;
1444         case WPA_DISCONNECTED:
1445                 /* carrier off */
1446                 connman_network_set_connected(task->network, FALSE);
1447                 connman_device_set_scanning(task->device, FALSE);
1448                 break;
1449         case WPA_ASSOCIATING:
1450                 connman_network_set_associating(task->network, TRUE);
1451                 break;
1452         default:
1453                 connman_network_set_associating(task->network, FALSE);
1454                 break;
1455         }
1456 }
1457
1458 static DBusHandlerResult supplicant_filter(DBusConnection *conn,
1459                                                 DBusMessage *msg, void *data)
1460 {
1461         struct supplicant_task *task;
1462         const char *member, *path;
1463
1464         if (dbus_message_has_interface(msg,
1465                                 SUPPLICANT_INTF ".Interface") == FALSE)
1466                 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1467
1468         member = dbus_message_get_member(msg);
1469         if (member == NULL)
1470                 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1471
1472         path = dbus_message_get_path(msg);
1473         if (path == NULL)
1474                 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1475
1476         task = find_task_by_path(path);
1477         if (task == NULL)
1478                 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1479
1480         DBG("task %p member %s", task, member);
1481
1482         if (g_str_equal(member, "ScanResultsAvailable") == TRUE)
1483                 scan_results_available(task);
1484         else if (g_str_equal(member, "StateChange") == TRUE)
1485                 state_change(task, msg);
1486
1487         return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1488 }
1489
1490 int supplicant_start(struct connman_device *device)
1491 {
1492         struct supplicant_task *task;
1493
1494         DBG("device %p", device);
1495
1496         task = g_try_new0(struct supplicant_task, 1);
1497         if (task == NULL)
1498                 return -ENOMEM;
1499
1500         task->ifindex = connman_device_get_index(device);
1501         task->ifname = connman_inet_ifname(task->ifindex);
1502
1503         if (task->ifname == NULL) {
1504                 g_free(task);
1505                 return -ENOMEM;
1506         }
1507
1508         task->device = connman_device_ref(device);
1509
1510         task->created = FALSE;
1511         task->noscan = FALSE;
1512         task->state = WPA_INVALID;
1513
1514         task_list = g_slist_append(task_list, task);
1515
1516         return create_interface(task);
1517 }
1518
1519 int supplicant_stop(struct connman_device *device)
1520 {
1521         int index = connman_device_get_index(device);
1522         struct supplicant_task *task;
1523
1524         DBG("device %p", device);
1525
1526         task = find_task_by_index(index);
1527         if (task == NULL)
1528                 return -ENODEV;
1529
1530         task_list = g_slist_remove(task_list, task);
1531
1532         disable_network(task);
1533
1534         remove_network(task);
1535
1536         return remove_interface(task);
1537 }
1538
1539 int supplicant_scan(struct connman_device *device)
1540 {
1541         int index = connman_device_get_index(device);
1542         struct supplicant_task *task;
1543         int err;
1544
1545         DBG("device %p", device);
1546
1547         task = find_task_by_index(index);
1548         if (task == NULL)
1549                 return -ENODEV;
1550
1551         switch (task->state) {
1552         case WPA_SCANNING:
1553                 return -EALREADY;
1554         case WPA_ASSOCIATING:
1555         case WPA_ASSOCIATED:
1556         case WPA_4WAY_HANDSHAKE:
1557         case WPA_GROUP_HANDSHAKE:
1558                 return -EBUSY;
1559         default:
1560                 break;
1561         }
1562
1563         err = initiate_scan(task);
1564
1565         return 0;
1566 }
1567
1568 int supplicant_connect(struct connman_network *network)
1569 {
1570         struct supplicant_task *task;
1571         const char *address, *security, *passphrase;
1572         const void *ssid;
1573         unsigned int ssid_len;
1574         int index;
1575
1576         DBG("network %p", network);
1577
1578         address = connman_network_get_string(network, "Address");
1579         security = connman_network_get_string(network, "WiFi.Security");
1580         passphrase = connman_network_get_string(network, "WiFi.Passphrase");
1581
1582         ssid = connman_network_get_blob(network, "WiFi.SSID", &ssid_len);
1583
1584         DBG("address %s security %s passphrase %s",
1585                                         address, security, passphrase);
1586
1587         if (security == NULL && passphrase == NULL)
1588                 return -EINVAL;
1589
1590         if (g_str_equal(security, "none") == FALSE && passphrase == NULL)
1591                 return -EINVAL;
1592
1593         index = connman_network_get_index(network);
1594
1595         task = find_task_by_index(index);
1596         if (task == NULL)
1597                 return -ENODEV;
1598
1599         task->network = connman_network_ref(network);
1600
1601         add_network(task);
1602
1603         select_network(task);
1604         disable_network(task);
1605
1606         set_network(task, ssid, ssid_len, address, security, passphrase);
1607
1608         enable_network(task);
1609
1610         connman_network_set_associating(task->network, TRUE);
1611
1612         return 0;
1613 }
1614
1615 int supplicant_disconnect(struct connman_network *network)
1616 {
1617         struct supplicant_task *task;
1618         int index;
1619
1620         DBG("network %p", network);
1621
1622         index = connman_network_get_index(network);
1623
1624         task = find_task_by_index(index);
1625         if (task == NULL)
1626                 return -ENODEV;
1627
1628         disable_network(task);
1629
1630         remove_network(task);
1631
1632         connman_network_set_connected(task->network, FALSE);
1633
1634         connman_network_unref(task->network);
1635
1636         return 0;
1637 }
1638
1639 static void supplicant_activate(DBusConnection *conn)
1640 {
1641         DBusMessage *message;
1642
1643         DBG("conn %p", conn);
1644
1645         message = dbus_message_new_method_call(SUPPLICANT_NAME, "/",
1646                                 DBUS_INTERFACE_INTROSPECTABLE, "Introspect");
1647         if (message == NULL)
1648                 return;
1649
1650         dbus_message_set_no_reply(message, TRUE);
1651
1652         dbus_connection_send(conn, message, NULL);
1653
1654         dbus_message_unref(message);
1655 }
1656
1657 static GSList *driver_list = NULL;
1658
1659 static void supplicant_probe(DBusConnection *conn, void *user_data)
1660 {
1661         GSList *list;
1662
1663         DBG("conn %p", conn);
1664
1665         for (list = driver_list; list; list = list->next) {
1666                 struct supplicant_driver *driver = list->data;
1667
1668                 DBG("driver %p name %s", driver, driver->name);
1669
1670                 if (driver->probe)
1671                         driver->probe();
1672         }
1673 }
1674
1675 static void supplicant_remove(DBusConnection *conn, void *user_data)
1676 {
1677         GSList *list;
1678
1679         DBG("conn %p", conn);
1680
1681         for (list = driver_list; list; list = list->next) {
1682                 struct supplicant_driver *driver = list->data;
1683
1684                 DBG("driver %p name %s", driver, driver->name);
1685
1686                 if (driver->remove)
1687                         driver->remove();
1688         }
1689 }
1690
1691 static const char *supplicant_rule = "type=signal,"
1692                                 "interface=" SUPPLICANT_INTF ".Interface";
1693 static guint watch;
1694
1695 static int supplicant_create(void)
1696 {
1697         if (g_slist_length(driver_list) > 0)
1698                 return 0;
1699
1700         connection = connman_dbus_get_connection();
1701         if (connection == NULL)
1702                 return -EIO;
1703
1704         DBG("connection %p", connection);
1705
1706         if (dbus_connection_add_filter(connection,
1707                                 supplicant_filter, NULL, NULL) == FALSE) {
1708                 connection = connman_dbus_get_connection();
1709                 return -EIO;
1710         }
1711
1712         dbus_bus_add_match(connection, supplicant_rule, NULL);
1713         dbus_connection_flush(connection);
1714
1715         watch = g_dbus_add_service_watch(connection, SUPPLICANT_NAME,
1716                         supplicant_probe, supplicant_remove, NULL, NULL);
1717
1718         return 0;
1719 }
1720
1721 static void supplicant_destroy(void)
1722 {
1723         if (g_slist_length(driver_list) > 0)
1724                 return;
1725
1726         DBG("connection %p", connection);
1727
1728         if (watch > 0)
1729                 g_dbus_remove_watch(connection, watch);
1730
1731         dbus_bus_remove_match(connection, supplicant_rule, NULL);
1732         dbus_connection_flush(connection);
1733
1734         dbus_connection_remove_filter(connection, supplicant_filter, NULL);
1735
1736         dbus_connection_unref(connection);
1737         connection = NULL;
1738 }
1739
1740 int supplicant_register(struct supplicant_driver *driver)
1741 {
1742         int err;
1743
1744         DBG("driver %p name %s", driver, driver->name);
1745
1746         err = supplicant_create();
1747         if (err < 0)
1748                 return err;
1749
1750         driver_list = g_slist_append(driver_list, driver);
1751
1752         if (g_dbus_check_service(connection, SUPPLICANT_NAME) == TRUE)
1753                 supplicant_probe(connection, NULL);
1754         else
1755                 supplicant_activate(connection);
1756
1757         return 0;
1758 }
1759
1760 void supplicant_unregister(struct supplicant_driver *driver)
1761 {
1762         DBG("driver %p name %s", driver, driver->name);
1763
1764         supplicant_remove(connection, NULL);
1765
1766         driver_list = g_slist_remove(driver_list, driver);
1767
1768         supplicant_destroy();
1769 }