5 * Copyright (C) 2007-2009 Intel Corporation. All rights reserved.
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
31 #include <sys/ioctl.h>
32 #include <sys/socket.h>
33 #include <linux/if_arp.h>
34 #include <linux/wireless.h>
35 #include <net/ethernet.h>
39 #define CONNMAN_API_SUBJECT_TO_CHANGE
40 #include <connman/device.h>
41 #include <connman/option.h>
42 #include <connman/inet.h>
43 #include <connman/dbus.h>
44 #include <connman/log.h>
46 #include "supplicant.h"
50 #define IEEE80211_CAP_ESS 0x0001
51 #define IEEE80211_CAP_IBSS 0x0002
52 #define IEEE80211_CAP_PRIVACY 0x0010
54 #define SUPPLICANT_NAME "fi.epitest.hostap.WPASupplicant"
55 #define SUPPLICANT_INTF "fi.epitest.hostap.WPASupplicant"
56 #define SUPPLICANT_PATH "/fi/epitest/hostap/WPASupplicant"
58 /* Taken from "WPA Supplicant - Common definitions" */
59 enum supplicant_state {
61 * WPA_DISCONNECTED - Disconnected state
63 * This state indicates that client is not associated, but is likely to
64 * start looking for an access point. This state is entered when a
70 * WPA_INACTIVE - Inactive state (wpa_supplicant disabled)
72 * This state is entered if there are no enabled networks in the
73 * configuration. wpa_supplicant is not trying to associate with a new
74 * network and external interaction (e.g., ctrl_iface call to add or
75 * enable a network) is needed to start association.
80 * WPA_SCANNING - Scanning for a network
82 * This state is entered when wpa_supplicant starts scanning for a
88 * WPA_ASSOCIATING - Trying to associate with a BSS/SSID
90 * This state is entered when wpa_supplicant has found a suitable BSS
91 * to associate with and the driver is configured to try to associate
92 * with this BSS in ap_scan=1 mode. When using ap_scan=2 mode, this
93 * state is entered when the driver is configured to try to associate
94 * with a network using the configured SSID and security policy.
99 * WPA_ASSOCIATED - Association completed
101 * This state is entered when the driver reports that association has
102 * been successfully completed with an AP. If IEEE 802.1X is used
103 * (with or without WPA/WPA2), wpa_supplicant remains in this state
104 * until the IEEE 802.1X/EAPOL authentication has been completed.
109 * WPA_4WAY_HANDSHAKE - WPA 4-Way Key Handshake in progress
111 * This state is entered when WPA/WPA2 4-Way Handshake is started. In
112 * case of WPA-PSK, this happens when receiving the first EAPOL-Key
113 * frame after association. In case of WPA-EAP, this state is entered
114 * when the IEEE 802.1X/EAPOL authentication has been completed.
119 * WPA_GROUP_HANDSHAKE - WPA Group Key Handshake in progress
121 * This state is entered when 4-Way Key Handshake has been completed
122 * (i.e., when the supplicant sends out message 4/4) and when Group
123 * Key rekeying is started by the AP (i.e., when supplicant receives
129 * WPA_COMPLETED - All authentication completed
131 * This state is entered when the full authentication process is
132 * completed. In case of WPA2, this happens when the 4-Way Handshake is
133 * successfully completed. With WPA, this state is entered after the
134 * Group Key Handshake; with IEEE 802.1X (non-WPA) connection is
135 * completed after dynamic keys are received (or if not used, after
136 * the EAP authentication has been completed). With static WEP keys and
137 * plaintext connections, this state is entered when an association
138 * has been completed.
140 * This state indicates that the supplicant has completed its
141 * processing for the association phase and that data connection is
147 * WPA_INVALID - Invalid state (parsing error)
149 * This state is returned if the string input is invalid. It is not
150 * an official wpa_supplicant state.
155 struct supplicant_result {
159 unsigned int addr_len;
161 unsigned int ssid_len;
162 dbus_uint16_t capabilities;
170 dbus_int32_t frequency;
171 dbus_int32_t quality;
174 dbus_int32_t maxrate;
177 struct supplicant_task {
181 struct connman_device *device;
182 struct connman_network *network;
183 struct connman_network *pending_network;
187 enum supplicant_state state;
189 GSList *scan_results;
190 DBusPendingCall *scan_call;
191 DBusPendingCall *result_call;
192 struct iw_range *range;
193 gboolean disconnecting;
196 static GSList *task_list = NULL;
198 static DBusConnection *connection;
200 static void free_task(struct supplicant_task *task)
202 DBG("task %p", task);
204 g_free(task->ifname);
209 static struct supplicant_task *find_task_by_index(int index)
213 for (list = task_list; list; list = list->next) {
214 struct supplicant_task *task = list->data;
216 if (task->ifindex == index)
223 static struct supplicant_task *find_task_by_path(const char *path)
227 for (list = task_list; list; list = list->next) {
228 struct supplicant_task *task = list->data;
230 if (g_strcmp0(task->path, path) == 0)
237 static int get_range(struct supplicant_task *task)
242 fd = socket(PF_INET, SOCK_DGRAM, 0);
246 memset(&wrq, 0, sizeof(struct iwreq));
247 strncpy(wrq.ifr_name, task->ifname, IFNAMSIZ);
248 wrq.u.data.pointer = task->range;
249 wrq.u.data.length = sizeof(struct iw_range);
251 err = ioctl(fd, SIOCGIWRANGE, &wrq);
258 static int get_bssid(struct connman_device *device,
259 unsigned char *bssid, unsigned int *bssid_len)
266 ifindex = connman_device_get_index(device);
270 ifname = connman_inet_ifname(ifindex);
274 fd = socket(PF_INET, SOCK_DGRAM, 0);
280 memset(&wrq, 0, sizeof(wrq));
281 strncpy(wrq.ifr_name, ifname, IFNAMSIZ);
283 err = ioctl(fd, SIOCGIWAP, &wrq);
291 memcpy(bssid, wrq.u.ap_addr.sa_data, ETH_ALEN);
292 *bssid_len = ETH_ALEN;
297 static void add_interface_reply(DBusPendingCall *call, void *user_data)
299 struct supplicant_task *task = user_data;
304 DBG("task %p", task);
306 reply = dbus_pending_call_steal_reply(call);
310 if (dbus_message_get_type(reply) == DBUS_MESSAGE_TYPE_ERROR)
313 dbus_error_init(&error);
315 if (dbus_message_get_args(reply, &error, DBUS_TYPE_OBJECT_PATH, &path,
316 DBUS_TYPE_INVALID) == FALSE) {
317 if (dbus_error_is_set(&error) == TRUE) {
318 connman_error("%s", error.message);
319 dbus_error_free(&error);
321 connman_error("Wrong arguments for add interface");
325 DBG("path %s", path);
327 task->path = g_strdup(path);
328 task->created = TRUE;
330 connman_device_set_powered(task->device, TRUE);
332 dbus_message_unref(reply);
337 dbus_message_unref(reply);
339 task_list = g_slist_remove(task_list, task);
341 connman_device_unref(task->device);
346 static int add_interface(struct supplicant_task *task)
348 const char *driver = connman_option_get_string("wifi");
349 DBusMessage *message;
350 DBusMessageIter array, dict;
351 DBusPendingCall *call;
353 DBG("task %p", task);
355 message = dbus_message_new_method_call(SUPPLICANT_NAME, SUPPLICANT_PATH,
356 SUPPLICANT_INTF, "addInterface");
360 dbus_message_set_auto_start(message, FALSE);
362 dbus_message_iter_init_append(message, &array);
364 dbus_message_iter_append_basic(&array,
365 DBUS_TYPE_STRING, &task->ifname);
367 dbus_message_iter_open_container(&array, DBUS_TYPE_ARRAY,
368 DBUS_DICT_ENTRY_BEGIN_CHAR_AS_STRING
369 DBUS_TYPE_STRING_AS_STRING DBUS_TYPE_VARIANT_AS_STRING
370 DBUS_DICT_ENTRY_END_CHAR_AS_STRING, &dict);
372 connman_dbus_dict_append_variant(&dict, "driver",
373 DBUS_TYPE_STRING, &driver);
375 dbus_message_iter_close_container(&array, &dict);
377 if (dbus_connection_send_with_reply(connection, message,
378 &call, TIMEOUT) == FALSE) {
379 connman_error("Failed to add interface");
380 dbus_message_unref(message);
385 connman_error("D-Bus connection not available");
386 dbus_message_unref(message);
390 dbus_pending_call_set_notify(call, add_interface_reply, task, NULL);
392 dbus_message_unref(message);
397 static void get_interface_reply(DBusPendingCall *call, void *user_data)
399 struct supplicant_task *task = user_data;
404 DBG("task %p", task);
406 reply = dbus_pending_call_steal_reply(call);
410 if (dbus_message_get_type(reply) == DBUS_MESSAGE_TYPE_ERROR) {
415 dbus_error_init(&error);
417 if (dbus_message_get_args(reply, &error, DBUS_TYPE_OBJECT_PATH, &path,
418 DBUS_TYPE_INVALID) == FALSE) {
419 if (dbus_error_is_set(&error) == TRUE) {
420 connman_error("%s", error.message);
421 dbus_error_free(&error);
423 connman_error("Wrong arguments for get interface");
427 DBG("path %s", path);
429 task->path = g_strdup(path);
430 task->created = FALSE;
432 connman_device_set_powered(task->device, TRUE);
435 dbus_message_unref(reply);
438 static int create_interface(struct supplicant_task *task)
440 DBusMessage *message;
441 DBusPendingCall *call;
443 DBG("task %p", task);
445 message = dbus_message_new_method_call(SUPPLICANT_NAME, SUPPLICANT_PATH,
446 SUPPLICANT_INTF, "getInterface");
450 dbus_message_set_auto_start(message, FALSE);
452 dbus_message_append_args(message, DBUS_TYPE_STRING, &task->ifname,
455 if (dbus_connection_send_with_reply(connection, message,
456 &call, TIMEOUT) == FALSE) {
457 connman_error("Failed to get interface");
458 dbus_message_unref(message);
463 connman_error("D-Bus connection not available");
464 dbus_message_unref(message);
468 dbus_pending_call_set_notify(call, get_interface_reply, task, NULL);
470 dbus_message_unref(message);
475 static void remove_interface_reply(DBusPendingCall *call, void *user_data)
477 struct supplicant_task *task = user_data;
480 DBG("task %p", task);
482 reply = dbus_pending_call_steal_reply(call);
484 connman_device_set_powered(task->device, FALSE);
486 connman_device_unref(task->device);
488 connman_inet_ifdown(task->ifindex);
492 dbus_message_unref(reply);
495 static int remove_interface(struct supplicant_task *task)
497 DBusMessage *message;
498 DBusPendingCall *call;
500 DBG("task %p", task);
503 if (task->created == FALSE) {
504 connman_device_set_powered(task->device, FALSE);
509 message = dbus_message_new_method_call(SUPPLICANT_NAME, SUPPLICANT_PATH,
510 SUPPLICANT_INTF, "removeInterface");
514 dbus_message_set_auto_start(message, FALSE);
516 dbus_message_append_args(message, DBUS_TYPE_OBJECT_PATH, &task->path,
519 if (dbus_connection_send_with_reply(connection, message,
520 &call, TIMEOUT) == FALSE) {
521 connman_error("Failed to remove interface");
522 dbus_message_unref(message);
527 connman_error("D-Bus connection not available");
528 dbus_message_unref(message);
532 dbus_pending_call_set_notify(call, remove_interface_reply, task, NULL);
534 dbus_message_unref(message);
539 static int set_ap_scan(struct supplicant_task *task)
541 DBusMessage *message, *reply;
545 DBG("task %p", task);
547 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
548 SUPPLICANT_INTF ".Interface", "setAPScan");
552 dbus_message_set_auto_start(message, FALSE);
554 dbus_message_append_args(message, DBUS_TYPE_UINT32, &ap_scan,
557 dbus_error_init(&error);
559 reply = dbus_connection_send_with_reply_and_block(connection,
560 message, -1, &error);
562 if (dbus_error_is_set(&error) == TRUE) {
563 connman_error("%s", error.message);
564 dbus_error_free(&error);
566 connman_error("Failed to set AP scan");
567 dbus_message_unref(message);
571 dbus_message_unref(message);
573 dbus_message_unref(reply);
578 static int add_network(struct supplicant_task *task)
580 DBusMessage *message, *reply;
584 DBG("task %p", task);
586 if (task->netpath != NULL)
589 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
590 SUPPLICANT_INTF ".Interface", "addNetwork");
594 dbus_message_set_auto_start(message, FALSE);
596 dbus_error_init(&error);
598 reply = dbus_connection_send_with_reply_and_block(connection,
599 message, -1, &error);
601 if (dbus_error_is_set(&error) == TRUE) {
602 connman_error("%s", error.message);
603 dbus_error_free(&error);
605 connman_error("Failed to add network");
606 dbus_message_unref(message);
610 dbus_message_unref(message);
612 dbus_error_init(&error);
614 if (dbus_message_get_args(reply, &error, DBUS_TYPE_OBJECT_PATH, &path,
615 DBUS_TYPE_INVALID) == FALSE) {
616 if (dbus_error_is_set(&error) == TRUE) {
617 connman_error("%s", error.message);
618 dbus_error_free(&error);
620 connman_error("Wrong arguments for network");
621 dbus_message_unref(reply);
625 DBG("path %s", path);
627 task->netpath = g_strdup(path);
629 dbus_message_unref(reply);
634 static int remove_network(struct supplicant_task *task)
636 DBusMessage *message, *reply;
639 DBG("task %p", task);
641 if (task->netpath == NULL)
644 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
645 SUPPLICANT_INTF ".Interface", "removeNetwork");
649 dbus_message_set_auto_start(message, FALSE);
651 dbus_message_append_args(message, DBUS_TYPE_OBJECT_PATH, &task->netpath,
654 dbus_error_init(&error);
656 reply = dbus_connection_send_with_reply_and_block(connection,
657 message, -1, &error);
659 if (dbus_error_is_set(&error) == TRUE) {
660 connman_error("%s", error.message);
661 dbus_error_free(&error);
663 connman_error("Failed to remove network");
664 dbus_message_unref(message);
668 dbus_message_unref(message);
670 dbus_message_unref(reply);
672 g_free(task->netpath);
673 task->netpath = NULL;
678 static int select_network(struct supplicant_task *task)
680 DBusMessage *message, *reply;
683 DBG("task %p", task);
685 if (task->netpath == NULL)
688 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
689 SUPPLICANT_INTF ".Interface", "selectNetwork");
693 dbus_message_set_auto_start(message, FALSE);
695 dbus_message_append_args(message, DBUS_TYPE_OBJECT_PATH, &task->netpath,
698 dbus_error_init(&error);
700 reply = dbus_connection_send_with_reply_and_block(connection,
701 message, -1, &error);
703 if (dbus_error_is_set(&error) == TRUE) {
704 connman_error("%s", error.message);
705 dbus_error_free(&error);
707 connman_error("Failed to select network");
708 dbus_message_unref(message);
712 dbus_message_unref(message);
714 dbus_message_unref(reply);
719 static int disconnect_network(struct supplicant_task *task)
721 DBusMessage *message, *reply;
724 DBG("task %p", task);
726 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
727 SUPPLICANT_INTF ".Interface", "disconnect");
731 dbus_message_set_auto_start(message, FALSE);
733 dbus_error_init(&error);
735 reply = dbus_connection_send_with_reply_and_block(connection,
736 message, -1, &error);
738 if (dbus_error_is_set(&error) == TRUE) {
739 connman_error("%s", error.message);
740 dbus_error_free(&error);
742 connman_error("Failed to disconnect network");
743 dbus_message_unref(message);
747 dbus_message_unref(message);
749 dbus_message_unref(reply);
754 static int set_network(struct supplicant_task *task,
755 const unsigned char *network, int len,
756 const char *address, const char *security,
757 const char *passphrase)
759 DBusMessage *message, *reply;
760 DBusMessageIter array, dict;
762 dbus_uint32_t scan_ssid = 1;
764 DBG("task %p", task);
766 if (task->netpath == NULL)
769 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->netpath,
770 SUPPLICANT_INTF ".Network", "set");
774 dbus_message_set_auto_start(message, FALSE);
776 dbus_message_iter_init_append(message, &array);
778 dbus_message_iter_open_container(&array, DBUS_TYPE_ARRAY,
779 DBUS_DICT_ENTRY_BEGIN_CHAR_AS_STRING
780 DBUS_TYPE_STRING_AS_STRING DBUS_TYPE_VARIANT_AS_STRING
781 DBUS_DICT_ENTRY_END_CHAR_AS_STRING, &dict);
783 connman_dbus_dict_append_variant(&dict, "scan_ssid",
784 DBUS_TYPE_UINT32, &scan_ssid);
787 connman_dbus_dict_append_array(&dict, "ssid",
788 DBUS_TYPE_BYTE, &network, len);
790 connman_dbus_dict_append_variant(&dict, "bssid",
791 DBUS_TYPE_STRING, &address);
793 if (g_ascii_strcasecmp(security, "psk") == 0 ||
794 g_ascii_strcasecmp(security, "wpa") == 0 ||
795 g_ascii_strcasecmp(security, "rsn") == 0) {
796 const char *key_mgmt = "WPA-PSK";
797 connman_dbus_dict_append_variant(&dict, "key_mgmt",
798 DBUS_TYPE_STRING, &key_mgmt);
800 if (passphrase && strlen(passphrase) > 0)
801 connman_dbus_dict_append_variant(&dict, "psk",
802 DBUS_TYPE_STRING, &passphrase);
803 } else if (g_ascii_strcasecmp(security, "wep") == 0) {
804 const char *key_mgmt = "NONE";
805 const char *auth_alg = "OPEN";
806 const char *key_index = "0";
808 if (task->mac80211 == TRUE)
809 auth_alg = "OPEN SHARED";
811 connman_dbus_dict_append_variant(&dict, "auth_alg",
812 DBUS_TYPE_STRING, &auth_alg);
814 connman_dbus_dict_append_variant(&dict, "key_mgmt",
815 DBUS_TYPE_STRING, &key_mgmt);
818 int size = strlen(passphrase);
819 if (size == 10 || size == 26) {
820 unsigned char *key = malloc(13);
823 memset(tmp, 0, sizeof(tmp));
826 for (i = 0; i < size / 2; i++) {
827 memcpy(tmp, passphrase + (i * 2), 2);
828 key[i] = (unsigned char) strtol(tmp,
831 connman_dbus_dict_append_array(&dict,
832 "wep_key0", DBUS_TYPE_BYTE,
836 connman_dbus_dict_append_variant(&dict,
837 "wep_key0", DBUS_TYPE_STRING,
840 connman_dbus_dict_append_variant(&dict, "wep_tx_keyidx",
841 DBUS_TYPE_STRING, &key_index);
844 const char *key_mgmt = "NONE";
845 connman_dbus_dict_append_variant(&dict, "key_mgmt",
846 DBUS_TYPE_STRING, &key_mgmt);
849 dbus_message_iter_close_container(&array, &dict);
851 dbus_error_init(&error);
853 reply = dbus_connection_send_with_reply_and_block(connection,
854 message, -1, &error);
856 if (dbus_error_is_set(&error) == TRUE) {
857 connman_error("%s", error.message);
858 dbus_error_free(&error);
860 connman_error("Failed to set network options");
861 dbus_message_unref(message);
865 dbus_message_unref(message);
867 dbus_message_unref(reply);
872 static void scan_reply(DBusPendingCall *call, void *user_data)
874 struct supplicant_task *task = user_data;
877 DBG("task %p", task);
879 task->scan_call = NULL;
881 reply = dbus_pending_call_steal_reply(call);
885 if (dbus_message_get_type(reply) == DBUS_MESSAGE_TYPE_ERROR) {
886 connman_device_set_scanning(task->device, FALSE);
890 if (task->scanning == TRUE)
891 connman_device_set_scanning(task->device, TRUE);
894 dbus_message_unref(reply);
898 static int initiate_scan(struct supplicant_task *task)
900 DBusMessage *message;
902 DBG("task %p", task);
904 if (task->path == NULL)
907 if (task->scan_call != NULL)
910 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
911 SUPPLICANT_INTF ".Interface", "scan");
915 dbus_message_set_auto_start(message, FALSE);
917 if (dbus_connection_send_with_reply(connection, message,
918 &task->scan_call, TIMEOUT) == FALSE) {
919 connman_error("Failed to initiate scan");
920 dbus_message_unref(message);
924 if (task->scan_call == NULL) {
925 connman_error("D-Bus connection not available");
926 dbus_message_unref(message);
930 dbus_pending_call_set_notify(task->scan_call, scan_reply, task, NULL);
932 dbus_message_unref(message);
941 { "<hidden>", "hidden" },
942 { "default", "linksys" },
950 { "comcomcom", "3com" },
952 { "Symbol", "symbol" },
953 { "Motorola", "motorola" },
954 { "Wireless" , "wireless" },
959 static char *build_group(const char *addr, const char *name,
960 const unsigned char *ssid, unsigned int ssid_len,
961 const char *mode, const char *security)
969 str = g_string_sized_new((ssid_len * 2) + 24);
974 g_string_append_printf(str, "hidden_%s", addr);
978 for (i = 0; special_ssid[i].name; i++) {
979 if (g_strcmp0(special_ssid[i].name, name) == 0) {
980 if (special_ssid[i].value == NULL)
981 g_string_append_printf(str, "%s_%s",
984 g_string_append_printf(str, "%s_%s",
985 special_ssid[i].value, addr);
990 if (ssid_len > 0 && ssid[0] != '\0') {
991 for (i = 0; i < ssid_len; i++)
992 g_string_append_printf(str, "%02x", ssid[i]);
994 g_string_append_printf(str, "hidden_%s", addr);
997 g_string_append_printf(str, "_%s_%s", mode, security);
999 return g_string_free(str, FALSE);
1002 static void extract_addr(DBusMessageIter *value,
1003 struct supplicant_result *result)
1005 DBusMessageIter array;
1006 struct ether_addr eth;
1007 unsigned char *addr;
1010 dbus_message_iter_recurse(value, &array);
1011 dbus_message_iter_get_fixed_array(&array, &addr, &addr_len);
1016 result->addr = g_try_malloc(addr_len);
1017 if (result->addr == NULL)
1020 memcpy(result->addr, addr, addr_len);
1021 result->addr_len = addr_len;
1023 result->path = g_try_malloc0(13);
1024 if (result->path == NULL)
1027 memcpy(ð, addr, sizeof(eth));
1028 snprintf(result->path, 13, "%02x%02x%02x%02x%02x%02x",
1029 eth.ether_addr_octet[0],
1030 eth.ether_addr_octet[1],
1031 eth.ether_addr_octet[2],
1032 eth.ether_addr_octet[3],
1033 eth.ether_addr_octet[4],
1034 eth.ether_addr_octet[5]);
1037 static void extract_ssid(DBusMessageIter *value,
1038 struct supplicant_result *result)
1040 DBusMessageIter array;
1041 unsigned char *ssid;
1044 dbus_message_iter_recurse(value, &array);
1045 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
1050 if (ssid[0] == '\0')
1053 result->ssid = g_try_malloc(ssid_len);
1054 if (result->ssid == NULL)
1057 memcpy(result->ssid, ssid, ssid_len);
1058 result->ssid_len = ssid_len;
1060 result->name = g_try_malloc0(ssid_len + 1);
1061 if (result->name == NULL)
1064 for (i = 0; i < ssid_len; i++) {
1065 if (g_ascii_isprint(ssid[i]))
1066 result->name[i] = ssid[i];
1068 result->name[i] = ' ';
1072 static unsigned char wifi_oui[3] = { 0x00, 0x50, 0xf2 };
1073 static unsigned char ieee80211_oui[3] = { 0x00, 0x0f, 0xac };
1075 static void extract_rsn(struct supplicant_result *result,
1076 const unsigned char *buf, int len)
1095 /* Pairwise cipher */
1099 count = buf[0] | (buf[1] << 8);
1100 if (2 + (count * 4) > len)
1103 buf += 2 + (count * 4);
1104 len -= 2 + (count * 4);
1106 /* Authentication */
1110 count = buf[0] | (buf[1] << 8);
1111 if (2 + (count * 4) > len)
1114 for (i = 0; i < count; i++) {
1115 const unsigned char *ptr = buf + 2 + (i * 4);
1117 if (memcmp(ptr, wifi_oui, 3) == 0) {
1120 result->has_8021x = TRUE;
1123 result->has_psk = TRUE;
1126 } else if (memcmp(ptr, ieee80211_oui, 3) == 0) {
1129 result->has_8021x = TRUE;
1132 result->has_psk = TRUE;
1138 buf += 2 + (count * 4);
1139 len -= 2 + (count * 4);
1142 static void extract_wpaie(DBusMessageIter *value,
1143 struct supplicant_result *result)
1145 DBusMessageIter array;
1149 dbus_message_iter_recurse(value, &array);
1150 dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
1153 result->has_wpa = TRUE;
1154 extract_rsn(result, ie + 6, ie_len - 6);
1158 static void extract_rsnie(DBusMessageIter *value,
1159 struct supplicant_result *result)
1161 DBusMessageIter array;
1165 dbus_message_iter_recurse(value, &array);
1166 dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
1169 result->has_rsn = TRUE;
1170 extract_rsn(result, ie + 2, ie_len - 2);
1174 static void extract_wpsie(DBusMessageIter *value,
1175 struct supplicant_result *result)
1177 DBusMessageIter array;
1181 dbus_message_iter_recurse(value, &array);
1182 dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
1185 result->has_wps = TRUE;
1188 static void extract_capabilites(DBusMessageIter *value,
1189 struct supplicant_result *result)
1191 dbus_message_iter_get_basic(value, &result->capabilities);
1193 if (result->capabilities & IEEE80211_CAP_ESS)
1194 result->adhoc = FALSE;
1195 else if (result->capabilities & IEEE80211_CAP_IBSS)
1196 result->adhoc = TRUE;
1198 if (result->capabilities & IEEE80211_CAP_PRIVACY)
1199 result->has_wep = TRUE;
1202 static unsigned char calculate_strength(struct supplicant_task *task,
1203 struct supplicant_result *result)
1205 if (task->range->max_qual.qual == 0) {
1206 unsigned char strength;
1208 if (result->level > 0)
1209 strength = 100 - result->level;
1211 strength = 120 + result->level;
1219 return (result->quality * 100) / task->range->max_qual.qual;
1222 static unsigned short calculate_channel(struct supplicant_result *result)
1224 if (result->frequency < 0)
1227 return (result->frequency - 2407) / 5;
1230 static void get_properties(struct supplicant_task *task);
1232 static void properties_reply(DBusPendingCall *call, void *user_data)
1234 struct supplicant_task *task = user_data;
1235 struct supplicant_result result;
1236 struct connman_network *network;
1238 DBusMessageIter array, dict;
1239 unsigned char strength;
1240 unsigned short channel, frequency;
1241 const char *mode, *security;
1244 DBG("task %p", task);
1246 reply = dbus_pending_call_steal_reply(call);
1247 if (reply == NULL) {
1248 get_properties(task);
1252 if (dbus_message_get_type(reply) == DBUS_MESSAGE_TYPE_ERROR) {
1253 dbus_message_unref(reply);
1254 get_properties(task);
1258 memset(&result, 0, sizeof(result));
1259 result.frequency = -1;
1260 result.quality = -1;
1264 dbus_message_iter_init(reply, &array);
1266 dbus_message_iter_recurse(&array, &dict);
1268 while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_DICT_ENTRY) {
1269 DBusMessageIter entry, value;
1272 dbus_message_iter_recurse(&dict, &entry);
1273 dbus_message_iter_get_basic(&entry, &key);
1275 dbus_message_iter_next(&entry);
1277 dbus_message_iter_recurse(&entry, &value);
1279 //type = dbus_message_iter_get_arg_type(&value);
1280 //dbus_message_iter_get_basic(&value, &val);
1288 * frequency : i (105)
1289 * capabilities : q (113)
1296 if (g_str_equal(key, "bssid") == TRUE)
1297 extract_addr(&value, &result);
1298 else if (g_str_equal(key, "ssid") == TRUE)
1299 extract_ssid(&value, &result);
1300 else if (g_str_equal(key, "wpaie") == TRUE)
1301 extract_wpaie(&value, &result);
1302 else if (g_str_equal(key, "rsnie") == TRUE)
1303 extract_rsnie(&value, &result);
1304 else if (g_str_equal(key, "wpsie") == TRUE)
1305 extract_wpsie(&value, &result);
1306 else if (g_str_equal(key, "capabilities") == TRUE)
1307 extract_capabilites(&value, &result);
1308 else if (g_str_equal(key, "frequency") == TRUE)
1309 dbus_message_iter_get_basic(&value, &result.frequency);
1310 else if (g_str_equal(key, "quality") == TRUE)
1311 dbus_message_iter_get_basic(&value, &result.quality);
1312 else if (g_str_equal(key, "noise") == TRUE)
1313 dbus_message_iter_get_basic(&value, &result.noise);
1314 else if (g_str_equal(key, "level") == TRUE)
1315 dbus_message_iter_get_basic(&value, &result.level);
1316 else if (g_str_equal(key, "maxrate") == TRUE)
1317 dbus_message_iter_get_basic(&value, &result.maxrate);
1319 dbus_message_iter_next(&dict);
1322 if (result.path == NULL)
1325 if (result.path[0] == '\0')
1328 if (result.frequency > 0 && result.frequency < 14)
1329 result.frequency = 2407 + (5 * result.frequency);
1330 else if (result.frequency == 14)
1331 result.frequency = 2484;
1333 strength = calculate_strength(task, &result);
1334 channel = calculate_channel(&result);
1336 frequency = (result.frequency < 0) ? 0 : result.frequency;
1338 if (result.has_8021x == TRUE)
1339 security = "ieee8021x";
1340 else if (result.has_psk == TRUE)
1342 else if (result.has_wep == TRUE)
1347 mode = (result.adhoc == TRUE) ? "adhoc" : "managed";
1349 group = build_group(result.path, result.name,
1350 result.ssid, result.ssid_len,
1353 if (result.has_psk == TRUE) {
1354 if (result.has_rsn == TRUE)
1356 else if (result.has_wpa == TRUE)
1360 network = connman_device_get_network(task->device, result.path);
1361 if (network == NULL) {
1364 network = connman_network_create(result.path,
1365 CONNMAN_NETWORK_TYPE_WIFI);
1366 if (network == NULL)
1369 index = connman_device_get_index(task->device);
1370 connman_network_set_index(network, index);
1372 connman_network_set_protocol(network,
1373 CONNMAN_NETWORK_PROTOCOL_IP);
1375 connman_network_set_address(network, result.addr,
1378 if (connman_device_add_network(task->device, network) < 0) {
1379 connman_network_unref(network);
1384 if (result.name != NULL && result.name[0] != '\0')
1385 connman_network_set_name(network, result.name);
1387 connman_network_set_blob(network, "WiFi.SSID",
1388 result.ssid, result.ssid_len);
1390 connman_network_set_string(network, "WiFi.Mode", mode);
1392 DBG("%s (%s %s) strength %d (%s)",
1393 result.name, mode, security, strength,
1394 (result.has_wps == TRUE) ? "WPS" : "no WPS");
1396 connman_network_set_available(network, TRUE);
1397 connman_network_set_strength(network, strength);
1399 connman_network_set_uint16(network, "Frequency", frequency);
1400 connman_network_set_uint16(network, "WiFi.Channel", channel);
1401 connman_network_set_string(network, "WiFi.Security", security);
1403 if (result.ssid != NULL)
1404 connman_network_set_group(network, group);
1409 g_free(result.path);
1410 g_free(result.addr);
1411 g_free(result.name);
1412 g_free(result.ssid);
1414 dbus_message_unref(reply);
1416 get_properties(task);
1419 static void get_properties(struct supplicant_task *task)
1421 DBusMessage *message;
1424 path = g_slist_nth_data(task->scan_results, 0);
1428 message = dbus_message_new_method_call(SUPPLICANT_NAME, path,
1429 SUPPLICANT_INTF ".BSSID",
1432 task->scan_results = g_slist_remove(task->scan_results, path);
1435 if (message == NULL)
1438 dbus_message_set_auto_start(message, FALSE);
1440 if (dbus_connection_send_with_reply(connection, message,
1441 &task->result_call, TIMEOUT) == FALSE) {
1442 connman_error("Failed to get network properties");
1443 dbus_message_unref(message);
1447 if (task->result_call == NULL) {
1448 connman_error("D-Bus connection not available");
1449 dbus_message_unref(message);
1453 dbus_pending_call_set_notify(task->result_call,
1454 properties_reply, task, NULL);
1456 dbus_message_unref(message);
1461 task->result_call = NULL;
1463 if (task->scanning == TRUE) {
1464 connman_device_set_scanning(task->device, FALSE);
1465 task->scanning = FALSE;
1469 static void scan_results_reply(DBusPendingCall *call, void *user_data)
1471 struct supplicant_task *task = user_data;
1477 DBG("task %p", task);
1479 reply = dbus_pending_call_steal_reply(call);
1483 if (dbus_message_get_type(reply) == DBUS_MESSAGE_TYPE_ERROR)
1486 dbus_error_init(&error);
1488 if (dbus_message_get_args(reply, &error,
1489 DBUS_TYPE_ARRAY, DBUS_TYPE_OBJECT_PATH,
1490 &results, &num_results,
1491 DBUS_TYPE_INVALID) == FALSE) {
1492 if (dbus_error_is_set(&error) == TRUE) {
1493 connman_error("%s", error.message);
1494 dbus_error_free(&error);
1496 connman_error("Wrong arguments for scan result");
1500 if (num_results == 0)
1503 for (i = 0; i < num_results; i++) {
1504 char *path = g_strdup(results[i]);
1508 task->scan_results = g_slist_append(task->scan_results, path);
1511 g_strfreev(results);
1513 dbus_message_unref(reply);
1515 get_properties(task);
1520 dbus_message_unref(reply);
1523 task->result_call = NULL;
1525 if (task->scanning == TRUE) {
1526 connman_device_set_scanning(task->device, FALSE);
1527 task->scanning = FALSE;
1531 static void scan_results_available(struct supplicant_task *task)
1533 DBusMessage *message;
1535 DBG("task %p", task);
1537 if (task->result_call != NULL)
1540 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
1541 SUPPLICANT_INTF ".Interface",
1543 if (message == NULL)
1546 dbus_message_set_auto_start(message, FALSE);
1548 if (dbus_connection_send_with_reply(connection, message,
1549 &task->result_call, TIMEOUT) == FALSE) {
1550 connman_error("Failed to request scan result");
1554 if (task->result_call == NULL) {
1555 connman_error("D-Bus connection not available");
1559 if (task->scanning == TRUE)
1560 connman_device_set_scanning(task->device, TRUE);
1562 dbus_pending_call_set_notify(task->result_call,
1563 scan_results_reply, task, NULL);
1566 dbus_message_unref(message);
1569 static enum supplicant_state string2state(const char *state)
1571 if (g_str_equal(state, "INACTIVE") == TRUE)
1572 return WPA_INACTIVE;
1573 else if (g_str_equal(state, "SCANNING") == TRUE)
1574 return WPA_SCANNING;
1575 else if (g_str_equal(state, "ASSOCIATING") == TRUE)
1576 return WPA_ASSOCIATING;
1577 else if (g_str_equal(state, "ASSOCIATED") == TRUE)
1578 return WPA_ASSOCIATED;
1579 else if (g_str_equal(state, "GROUP_HANDSHAKE") == TRUE)
1580 return WPA_GROUP_HANDSHAKE;
1581 else if (g_str_equal(state, "4WAY_HANDSHAKE") == TRUE)
1582 return WPA_4WAY_HANDSHAKE;
1583 else if (g_str_equal(state, "COMPLETED") == TRUE)
1584 return WPA_COMPLETED;
1585 else if (g_str_equal(state, "DISCONNECTED") == TRUE)
1586 return WPA_DISCONNECTED;
1591 static int task_connect(struct supplicant_task *task)
1593 const char *address, *security, *passphrase;
1595 unsigned int ssid_len;
1598 connman_inet_ifup(task->ifindex);
1600 address = connman_network_get_string(task->network, "Address");
1601 security = connman_network_get_string(task->network, "WiFi.Security");
1602 passphrase = connman_network_get_string(task->network, "WiFi.Passphrase");
1604 ssid = connman_network_get_blob(task->network, "WiFi.SSID", &ssid_len);
1606 DBG("address %s security %s", address, security);
1608 if (security == NULL && passphrase == NULL)
1611 if (g_str_equal(security, "none") == FALSE && passphrase == NULL)
1614 remove_network(task);
1620 set_network(task, ssid, ssid_len, address, security, passphrase);
1622 err = select_network(task);
1626 return -EINPROGRESS;
1629 static void scanning(struct supplicant_task *task, DBusMessage *msg)
1632 dbus_bool_t scanning;
1634 dbus_error_init(&error);
1636 if (dbus_message_get_args(msg, &error, DBUS_TYPE_BOOLEAN, &scanning,
1637 DBUS_TYPE_INVALID) == FALSE) {
1638 if (dbus_error_is_set(&error) == TRUE) {
1639 connman_error("%s", error.message);
1640 dbus_error_free(&error);
1642 connman_error("Wrong arguments for scanning");
1646 connman_info("%s scanning %s", task->ifname,
1647 scanning == TRUE ? "started" : "finished");
1650 static void state_change(struct supplicant_task *task, DBusMessage *msg)
1653 const char *newstate, *oldstate;
1654 unsigned char bssid[ETH_ALEN];
1655 unsigned int bssid_len;
1656 enum supplicant_state state, prevstate;
1658 dbus_error_init(&error);
1660 if (dbus_message_get_args(msg, &error, DBUS_TYPE_STRING, &newstate,
1661 DBUS_TYPE_STRING, &oldstate,
1662 DBUS_TYPE_INVALID) == FALSE) {
1663 if (dbus_error_is_set(&error) == TRUE) {
1664 connman_error("%s", error.message);
1665 dbus_error_free(&error);
1667 connman_error("Wrong arguments for state change");
1671 DBG("state %s ==> %s", oldstate, newstate);
1673 connman_info("%s %s%s", task->ifname, newstate,
1674 task->scanning == TRUE ? " (scanning)" : "");
1676 state = string2state(newstate);
1677 if (state == WPA_INVALID)
1680 if (task->scanning == TRUE && state != WPA_SCANNING) {
1681 connman_device_cleanup_scanning(task->device);
1682 task->scanning = FALSE;
1685 prevstate = task->state;
1686 task->state = state;
1688 if (task->network == NULL)
1691 switch (task->state) {
1693 switch (prevstate) {
1694 case WPA_ASSOCIATED:
1695 case WPA_GROUP_HANDSHAKE:
1701 /* reset scan trigger and schedule background scan */
1702 connman_device_schedule_scan(task->device);
1704 if (get_bssid(task->device, bssid, &bssid_len) == 0)
1705 connman_network_set_address(task->network,
1709 connman_network_set_connected(task->network, TRUE);
1712 case WPA_ASSOCIATING:
1713 switch (prevstate) {
1717 connman_network_set_associating(task->network, TRUE);
1725 switch (prevstate) {
1727 case WPA_DISCONNECTED:
1734 case WPA_DISCONNECTED:
1736 connman_network_set_connected(task->network, FALSE);
1738 if (task->disconnecting == TRUE) {
1739 connman_network_unref(task->network);
1740 task->disconnecting = FALSE;
1742 if (task->pending_network != NULL) {
1743 task->network = task->pending_network;
1744 task->pending_network = NULL;
1747 task->network = NULL;
1752 connman_network_set_associating(task->network, FALSE);
1759 connman_error("%s invalid state change %s -> %s", task->ifname,
1760 oldstate, newstate);
1763 static DBusHandlerResult supplicant_filter(DBusConnection *conn,
1764 DBusMessage *msg, void *data)
1766 struct supplicant_task *task;
1767 const char *member, *path;
1769 if (dbus_message_has_interface(msg,
1770 SUPPLICANT_INTF ".Interface") == FALSE)
1771 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1773 member = dbus_message_get_member(msg);
1775 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1777 path = dbus_message_get_path(msg);
1779 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1781 task = find_task_by_path(path);
1783 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1785 DBG("task %p member %s", task, member);
1787 if (g_str_equal(member, "ScanResultsAvailable") == TRUE)
1788 scan_results_available(task);
1789 else if (g_str_equal(member, "Scanning") == TRUE)
1790 scanning(task, msg);
1791 else if (g_str_equal(member, "StateChange") == TRUE)
1792 state_change(task, msg);
1794 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1797 int supplicant_start(struct connman_device *device)
1799 struct supplicant_task *task;
1802 DBG("device %p", device);
1804 task = g_try_new0(struct supplicant_task, 1);
1808 task->ifindex = connman_device_get_index(device);
1809 task->ifname = connman_inet_ifname(task->ifindex);
1811 if (task->ifname == NULL) {
1816 task->mac80211 = connman_inet_is_mac80211(task->ifindex);
1817 if (task->mac80211 == FALSE)
1818 connman_warn("Enabling quirks for unsupported driver");
1820 task->range = g_try_malloc0(sizeof(struct iw_range));
1821 if (task->range == NULL) {
1826 err = get_range(task);
1830 task->device = connman_device_ref(device);
1832 task->created = FALSE;
1833 task->scanning = FALSE;
1834 task->state = WPA_INVALID;
1835 task->disconnecting = FALSE;
1836 task->pending_network = NULL;
1838 task_list = g_slist_append(task_list, task);
1840 return create_interface(task);
1843 g_free(task->range);
1844 g_free(task->ifname);
1850 int supplicant_stop(struct connman_device *device)
1852 int index = connman_device_get_index(device);
1853 struct supplicant_task *task;
1855 DBG("device %p", device);
1857 task = find_task_by_index(index);
1861 g_free(task->range);
1863 task_list = g_slist_remove(task_list, task);
1865 if (task->scan_call != NULL) {
1866 dbus_pending_call_cancel(task->scan_call);
1867 task->scan_call = NULL;
1870 if (task->result_call != NULL) {
1871 dbus_pending_call_cancel(task->result_call);
1872 task->result_call = NULL;
1875 if (task->scanning == TRUE)
1876 connman_device_set_scanning(task->device, FALSE);
1878 remove_network(task);
1880 disconnect_network(task);
1882 return remove_interface(task);
1885 int supplicant_scan(struct connman_device *device)
1887 int index = connman_device_get_index(device);
1888 struct supplicant_task *task;
1891 DBG("device %p", device);
1893 task = find_task_by_index(index);
1897 switch (task->state) {
1900 case WPA_ASSOCIATING:
1901 case WPA_ASSOCIATED:
1902 case WPA_4WAY_HANDSHAKE:
1903 case WPA_GROUP_HANDSHAKE:
1909 task->scanning = TRUE;
1911 err = initiate_scan(task);
1913 if (err == -EINPROGRESS)
1916 task->scanning = FALSE;
1920 connman_device_set_scanning(task->device, TRUE);
1925 int supplicant_connect(struct connman_network *network)
1927 struct supplicant_task *task;
1930 DBG("network %p", network);
1932 index = connman_network_get_index(network);
1934 task = find_task_by_index(index);
1938 if (task->disconnecting == TRUE)
1939 task->pending_network = connman_network_ref(network);
1941 task->network = connman_network_ref(network);
1942 return task_connect(task);
1945 return -EINPROGRESS;
1948 int supplicant_disconnect(struct connman_network *network)
1950 struct supplicant_task *task;
1953 DBG("network %p", network);
1955 index = connman_network_get_index(network);
1957 task = find_task_by_index(index);
1961 if (task->disconnecting == TRUE)
1964 remove_network(task);
1966 disconnect_network(task);
1968 task->disconnecting = TRUE;
1973 static void supplicant_activate(DBusConnection *conn)
1975 DBusMessage *message;
1977 DBG("conn %p", conn);
1979 message = dbus_message_new_method_call(SUPPLICANT_NAME, "/",
1980 DBUS_INTERFACE_INTROSPECTABLE, "Introspect");
1981 if (message == NULL)
1984 dbus_message_set_no_reply(message, TRUE);
1986 dbus_connection_send(conn, message, NULL);
1988 dbus_message_unref(message);
1991 static GSList *driver_list = NULL;
1993 static void supplicant_probe(DBusConnection *conn, void *user_data)
1997 DBG("conn %p", conn);
1999 for (list = driver_list; list; list = list->next) {
2000 struct supplicant_driver *driver = list->data;
2002 DBG("driver %p name %s", driver, driver->name);
2009 static void supplicant_remove(DBusConnection *conn, void *user_data)
2013 DBG("conn %p", conn);
2015 for (list = driver_list; list; list = list->next) {
2016 struct supplicant_driver *driver = list->data;
2018 DBG("driver %p name %s", driver, driver->name);
2025 static const char *supplicant_rule = "type=signal,"
2026 "interface=" SUPPLICANT_INTF ".Interface";
2029 static int supplicant_create(void)
2031 if (g_slist_length(driver_list) > 0)
2034 connection = connman_dbus_get_connection();
2035 if (connection == NULL)
2038 DBG("connection %p", connection);
2040 if (dbus_connection_add_filter(connection,
2041 supplicant_filter, NULL, NULL) == FALSE) {
2042 connection = connman_dbus_get_connection();
2046 dbus_bus_add_match(connection, supplicant_rule, NULL);
2047 dbus_connection_flush(connection);
2049 watch = g_dbus_add_service_watch(connection, SUPPLICANT_NAME,
2050 supplicant_probe, supplicant_remove, NULL, NULL);
2055 static void supplicant_destroy(void)
2057 if (g_slist_length(driver_list) > 0)
2060 DBG("connection %p", connection);
2063 g_dbus_remove_watch(connection, watch);
2065 dbus_bus_remove_match(connection, supplicant_rule, NULL);
2066 dbus_connection_flush(connection);
2068 dbus_connection_remove_filter(connection, supplicant_filter, NULL);
2070 dbus_connection_unref(connection);
2074 int supplicant_register(struct supplicant_driver *driver)
2078 DBG("driver %p name %s", driver, driver->name);
2080 err = supplicant_create();
2084 driver_list = g_slist_append(driver_list, driver);
2086 supplicant_activate(connection);
2091 void supplicant_unregister(struct supplicant_driver *driver)
2093 DBG("driver %p name %s", driver, driver->name);
2095 supplicant_remove(connection, NULL);
2097 driver_list = g_slist_remove(driver_list, driver);
2099 supplicant_destroy();