2 * Network Configuration Module
4 * Copyright (c) 2000 - 2012 Samsung Electronics Co., Ltd. All rights reserved.
6 * Licensed under the Apache License, Version 2.0 (the "License");
7 * you may not use this file except in compliance with the License.
8 * You may obtain a copy of the License at
10 * http://www.apache.org/licenses/LICENSE-2.0
12 * Unless required by applicable law or agreed to in writing, software
13 * distributed under the License is distributed on an "AS IS" BASIS,
14 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15 * See the License for the specific language governing permissions and
16 * limitations under the License.
28 #include <net/route.h>
29 #include <arpa/inet.h>
32 #include <sys/ioctl.h>
33 #include <vconf-keys.h>
34 #include <syspopup_caller.h>
36 #include <bundle_internal.h>
37 #include <eventsystem.h>
38 #include <tzplatform_config.h>
39 #include <system_info.h>
44 #include "wifi-state.h"
47 #define DBUS_SERVICE_DBUS "org.freedesktop.DBus"
48 #define DBUS_INTERFACE_DBUS "org.freedesktop.DBus"
49 #define MAC_INFO_FILEPATH tzplatform_mkpath(TZ_SYS_ETC, "/.mac.info")
50 #define MAC_ADDRESS_FILEPATH "/sys/class/net/wlan0/address"
51 #define MAC_ADDRESS_MAX_LEN 18
53 static gboolean netconfig_device_picker_test = FALSE;
54 static int mdnsd_ref_count = 0;
58 } dnssd_conn_destroy_data;
60 GKeyFile *netconfig_keyfile_load(const char *pathname)
62 GKeyFile *keyfile = NULL;
65 keyfile = g_key_file_new();
66 if (g_key_file_load_from_file(keyfile, pathname, 0, &error) != TRUE) {
67 DBG("Unable to open %s, error %s", pathname, error->message);
70 g_key_file_free(keyfile);
74 DBG("loaded keyfile %s", pathname);
78 void netconfig_keyfile_save(GKeyFile *keyfile, const char *pathname)
82 gchar *keydata = NULL;
83 gchar *needle = NULL, *directory = NULL;
85 directory = g_strdup(pathname);
86 needle = g_strrstr(directory, "/");
91 if (directory == NULL || (*directory) == '\0') {
93 ERR("directory is NULL");
97 if (g_file_test(directory, G_FILE_TEST_IS_DIR) != TRUE) {
98 if (g_mkdir_with_parents(directory,
99 S_IRUSR | S_IWUSR | S_IXUSR) != 0) {
101 ERR("failed to make directory");
107 keydata = g_key_file_to_data(keyfile, &size, &error);
108 if (g_file_set_contents(pathname, keydata, size, &error) != TRUE) {
109 ERR("Unable to save %s, error %s", pathname, error->message);
113 chmod(pathname, S_IRUSR | S_IWUSR);
114 DBG("Successfully saved keyfile %s", pathname);
119 void netconfig_start_timer_seconds(guint secs,
120 gboolean(*callback) (gpointer), void *user_data, guint *timer_id)
124 if (callback == NULL) {
125 ERR("callback function is NULL");
129 if ((timer_id != NULL && *timer_id != 0)) {
130 ERR("timer already is registered");
134 t_id = g_timeout_add_seconds(secs, callback, user_data);
137 ERR("Can't add timer");
141 if (timer_id != NULL)
145 void netconfig_start_timer(guint msecs,
146 gboolean(*callback) (gpointer), void *user_data, guint *timer_id)
150 INFO("Register timer with callback pointer (%p)", callback);
152 if (callback == NULL) {
153 ERR("callback function is NULL");
157 if ((timer_id != NULL && *timer_id != 0)) {
158 ERR("timer already is registered");
162 t_id = g_timeout_add(msecs, callback, user_data);
165 ERR("Can't add timer");
169 if (timer_id != NULL)
173 void netconfig_stop_timer(guint *timer_id)
175 if (timer_id == NULL) {
176 ERR("timer is NULL");
180 if (*timer_id != 0) {
181 g_source_remove(*timer_id);
186 static gboolean __netconfig_test_device_picker()
188 char *favorite_wifi_service = NULL;
190 favorite_wifi_service = wifi_get_favorite_service();
191 if (favorite_wifi_service != NULL) {
192 ERR("favorite_wifi_service is existed[%s] : Donot launch device picker", favorite_wifi_service);
193 g_free(favorite_wifi_service);
200 static void __netconfig_pop_device_picker(void)
202 #if defined TIZEN_WEARABLE
204 app_control_h control = NULL;
206 ret = app_control_create(&control);
207 if (APP_CONTROL_ERROR_NONE != ret) {
208 DBG("failed to create app control");
212 app_control_add_extra_data(control, "viewtype", "scanlist");
214 app_control_set_app_id(control, "org.tizen.wifi");
215 ret = app_control_send_launch_request(control, NULL, NULL);
216 if (APP_CONTROL_ERROR_NONE == ret)
217 DBG("Launch request sent successfully");
219 app_control_destroy(control);
222 int wifi_ug_state = 0;
224 netconfig_vconf_get_int(VCONFKEY_WIFI_UG_RUN_STATE, &wifi_ug_state);
225 if (wifi_ug_state == VCONFKEY_WIFI_UG_RUN_STATE_ON_FOREGROUND)
230 DBG("Launch Wi-Fi device picker");
231 syspopup_launch("wifi-qs", b);
237 static gboolean __netconfig_wifi_try_device_picker(gpointer data)
239 if (__netconfig_test_device_picker() == TRUE)
240 __netconfig_pop_device_picker();
245 static guint __netconfig_wifi_device_picker_timer_id(gboolean is_set_method, guint timer_id)
247 static guint netconfig_wifi_device_picker_service_timer = 0;
249 if (is_set_method != TRUE)
250 return netconfig_wifi_device_picker_service_timer;
252 if (netconfig_wifi_device_picker_service_timer != timer_id)
253 netconfig_wifi_device_picker_service_timer = timer_id;
255 return netconfig_wifi_device_picker_service_timer;
258 static void __netconfig_wifi_device_picker_set_timer_id(guint timer_id)
260 __netconfig_wifi_device_picker_timer_id(TRUE, timer_id);
263 static guint __netconfig_wifi_device_picker_get_timer_id(void)
265 return __netconfig_wifi_device_picker_timer_id(FALSE, -1);
268 void netconfig_wifi_enable_device_picker_test(void)
270 netconfig_device_picker_test = TRUE;
273 void netconfig_wifi_device_picker_service_start(void)
275 const int NETCONFIG_WIFI_DEVICE_PICKER_INTERVAL = 700;
278 if (netconfig_device_picker_test == TRUE)
279 netconfig_device_picker_test = FALSE;
285 netconfig_vconf_get_int(VCONFKEY_WIFI_UG_RUN_STATE, &wifi_ug_state);
286 if (wifi_ug_state == VCONFKEY_WIFI_UG_RUN_STATE_ON_FOREGROUND)
289 DBG("Register device picker timer with %d milliseconds", NETCONFIG_WIFI_DEVICE_PICKER_INTERVAL);
290 netconfig_start_timer(NETCONFIG_WIFI_DEVICE_PICKER_INTERVAL, __netconfig_wifi_try_device_picker, NULL, &timer_id);
292 __netconfig_wifi_device_picker_set_timer_id(timer_id);
295 void netconfig_wifi_device_picker_service_stop(void)
299 timer_id = __netconfig_wifi_device_picker_get_timer_id();
303 DBG("Clear device picker timer with timer_id %d", timer_id);
305 netconfig_stop_timer(&timer_id);
307 __netconfig_wifi_device_picker_set_timer_id(timer_id);
310 gboolean netconfig_is_wifi_direct_on(void)
312 #if defined TIZEN_P2P_ENABLE
313 int wifi_direct_state = 0;
315 netconfig_vconf_get_int(VCONFKEY_WIFI_DIRECT_STATE, &wifi_direct_state);
317 DBG("Wi-Fi direct mode %d", wifi_direct_state);
318 return (wifi_direct_state != 0) ? TRUE : FALSE;
324 gboolean netconfig_is_wifi_tethering_on(void)
326 #if defined TIZEN_TETHERING_ENABLE
327 int wifi_tethering_state = 0;
329 netconfig_vconf_get_int(VCONFKEY_MOBILE_HOTSPOT_MODE, &wifi_tethering_state);
330 DBG("Wi-Ti tethering mode %d", wifi_tethering_state);
331 if ((wifi_tethering_state & VCONFKEY_MOBILE_HOTSPOT_MODE_WIFI)
332 || (wifi_tethering_state & VCONFKEY_MOBILE_HOTSPOT_MODE_WIFI_AP)) {
333 DBG("Mobile AP is on");
337 DBG("Mobile AP is off");
341 gboolean netconfig_interface_up(const char *ifname)
346 fd = socket(PF_INET, SOCK_DGRAM | SOCK_CLOEXEC, 0);
350 memset(&ifr, 0, sizeof(ifr));
351 g_strlcpy((char *)ifr.ifr_name, ifname, sizeof(ifr.ifr_name));
353 if (ioctl(fd, SIOCGIFFLAGS, &ifr) < 0) {
358 ifr.ifr_flags |= (IFF_UP | IFF_DYNAMIC);
359 if (ioctl(fd, SIOCSIFFLAGS, &ifr) < 0) {
366 DBG("Successfully activated wireless interface %s", ifname);
370 gboolean netconfig_interface_down(const char *ifname)
375 fd = socket(PF_INET, SOCK_DGRAM | SOCK_CLOEXEC, 0);
379 memset(&ifr, 0, sizeof(ifr));
380 g_strlcpy((char *)ifr.ifr_name, ifname, sizeof(ifr.ifr_name));
382 if (ioctl(fd, SIOCGIFFLAGS, &ifr) < 0) {
387 ifr.ifr_flags = (ifr.ifr_flags & ~IFF_UP) | IFF_DYNAMIC;
388 if (ioctl(fd, SIOCSIFFLAGS, &ifr) < 0) {
395 DBG("Successfully de-activated wireless interface %s", ifname);
399 int netconfig_execute_file(const char *file_path,
400 char *const args[], char *const envs[])
406 register unsigned int index = 0;
407 char error_buf[MAX_SIZE_ERROR_BUFFER] = {0, };
409 while (args[index] != NULL) {
410 DBG("%s", args[index]);
414 if (!(pid = fork())) {
415 DBG("pid(%d), ppid (%d)", getpid(), getppid());
416 DBG("Inside child, exec (%s) command", file_path);
419 if (execve(file_path, args, envs) == -1) {
420 strerror_r(errno, error_buf, MAX_SIZE_ERROR_BUFFER);
421 DBG("Fail to execute command (%s)", error_buf);
424 } else if (pid > 0) {
425 if (waitpid(pid, &status, 0) == -1)
426 DBG("wait pid (%u) status (%d)", pid, status);
428 if (WIFEXITED(status)) {
429 rv = WEXITSTATUS(status);
430 DBG("exited, status=%d", rv);
431 } else if (WIFSIGNALED(status)) {
432 DBG("killed by signal %d", WTERMSIG(status));
433 } else if (WIFSTOPPED(status)) {
434 DBG("stopped by signal %d", WSTOPSIG(status));
435 } else if (WIFCONTINUED(status)) {
442 strerror_r(errno, error_buf, MAX_SIZE_ERROR_BUFFER);
443 DBG("failed to fork(%s)", error_buf);
447 static void on_clat_handler()
452 clat_pid = waitpid(-1, &state, WNOHANG);
454 DBG("clat(%d) state(%d)", clat_pid, WEXITSTATUS(state));
457 int netconfig_execute_clatd(const char *file_path, char *const args[])
462 register unsigned int index = 0;
463 char error_buf[MAX_SIZE_ERROR_BUFFER] = {0, };
465 struct sigaction act;
468 act.sa_handler = on_clat_handler;
469 sigemptyset(&act.sa_mask);
472 state = sigaction(SIGCHLD, &act, 0);
474 DBG("sigaction() : %d");
478 while (args[index] != NULL) {
479 DBG("%s", args[index]);
483 if (!(pid = fork())) {
484 DBG("pid(%d), ppid (%d)", getpid(), getppid());
485 DBG("Inside child, exec (%s) command", file_path);
488 if (execvp(file_path, args) == -1) {
489 strerror_r(errno, error_buf, MAX_SIZE_ERROR_BUFFER);
490 ERR("Fail to execute command (%s)", error_buf);
493 } else if (pid > 0) {
494 ERR("Success to launch clatd");
498 strerror_r(errno, error_buf, MAX_SIZE_ERROR_BUFFER);
499 DBG("failed to fork(%s)", error_buf);
503 int __netconfig_get_interface_index(const char *interface_name)
508 char error_buf[MAX_SIZE_ERROR_BUFFER] = {0, };
510 if (interface_name == NULL) {
511 DBG("Inteface name is NULL");
516 sock = socket(PF_INET, SOCK_DGRAM | SOCK_CLOEXEC, 0);
518 strerror_r(errno, error_buf, MAX_SIZE_ERROR_BUFFER);
519 DBG("Failed to create socket : %s", error_buf);
523 memset(&ifr, 0, sizeof(ifr));
524 strncpy(ifr.ifr_name, interface_name, sizeof(ifr.ifr_name) - 1);
525 result = ioctl(sock, SIOCGIFINDEX, &ifr);
529 DBG("Failed to get ifr index: %s", error_buf);
533 return ifr.ifr_ifindex;
536 int netconfig_add_route_ipv4(gchar *ip_addr, gchar *subnet, gchar *interface, gint address_family)
540 struct sockaddr_in addr_in;
542 char error_buf[MAX_SIZE_ERROR_BUFFER] = {0, };
544 memset(&ifr, 0, sizeof(ifr));
546 ifr.ifr_ifindex = __netconfig_get_interface_index(interface);
548 if (ifr.ifr_ifindex < 0)
551 strncpy(ifr.ifr_name, interface, IFNAMSIZ-1);
553 memset(&rt, 0, sizeof(rt));
555 rt.rt_flags = RTF_UP | RTF_HOST;
556 memset(&addr_in, 0, sizeof(struct sockaddr_in));
557 addr_in.sin_family = address_family;
558 addr_in.sin_addr.s_addr = inet_addr(ip_addr);
559 memcpy(&rt.rt_dst, &addr_in, sizeof(rt.rt_dst));
561 memset(&addr_in, 0, sizeof(struct sockaddr_in));
562 addr_in.sin_family = address_family;
563 addr_in.sin_addr.s_addr = INADDR_ANY;
564 memcpy(&rt.rt_gateway, &addr_in, sizeof(rt.rt_gateway));
566 memset(&addr_in, 0, sizeof(struct sockaddr_in));
567 addr_in.sin_family = AF_INET;
568 addr_in.sin_addr.s_addr = inet_addr(subnet);
569 memcpy(&rt.rt_genmask, &addr_in, sizeof(rt.rt_genmask));
571 rt.rt_dev = ifr.ifr_name;
574 sock = socket(PF_INET, SOCK_DGRAM, 0);
577 strerror_r(errno, error_buf, MAX_SIZE_ERROR_BUFFER);
578 DBG("Failed to create socket : %s", error_buf);
582 if (ioctl(sock, SIOCADDRT, &rt) < 0) {
583 strerror_r(errno, error_buf, MAX_SIZE_ERROR_BUFFER);
584 DBG("Failed to set route address : %s", error_buf);
594 int netconfig_del_route_ipv4(gchar *ip_addr, gchar *subnet, gchar *interface, gint address_family)
598 struct sockaddr_in addr_in;
600 char error_buf[MAX_SIZE_ERROR_BUFFER] = {0, };
602 memset(&ifr, 0, sizeof(ifr));
603 ifr.ifr_ifindex = __netconfig_get_interface_index(interface);
605 if (ifr.ifr_ifindex < 0)
608 strncpy(ifr.ifr_name, interface, IFNAMSIZ-1);
610 memset(&rt, 0, sizeof(rt));
612 rt.rt_flags = RTF_UP;
613 memset(&addr_in, 0, sizeof(struct sockaddr_in));
614 addr_in.sin_family = address_family;
615 addr_in.sin_addr.s_addr = inet_addr(ip_addr);
616 memcpy(&rt.rt_dst, &addr_in, sizeof(rt.rt_dst));
618 memset(&addr_in, 0, sizeof(struct sockaddr_in));
619 addr_in.sin_family = address_family;
620 addr_in.sin_addr.s_addr = inet_addr(subnet);
621 memcpy(&rt.rt_genmask, &addr_in, sizeof(rt.rt_genmask));
622 rt.rt_dev = ifr.ifr_name;
625 sock = socket(PF_INET, SOCK_DGRAM, 0);
628 strerror_r(errno, error_buf, MAX_SIZE_ERROR_BUFFER);
629 DBG("Failed to create socket : %s", error_buf);
633 if (ioctl(sock, SIOCDELRT, &rt) < 0) {
634 strerror_r(errno, error_buf, MAX_SIZE_ERROR_BUFFER);
635 DBG("Failed to set route address : %s", error_buf);
645 int netconfig_add_route_ipv6(gchar *ip_addr, gchar *interface, gchar *gateway, unsigned char prefix_len)
650 char error_buf[MAX_SIZE_ERROR_BUFFER] = {0, };
652 memset(&rt, 0, sizeof(rt));
654 rt.rtmsg_dst_len = prefix_len;
656 rt.rtmsg_flags = RTF_UP | RTF_HOST;
659 if (inet_pton(AF_INET6, ip_addr, &rt.rtmsg_dst) < 0) {
660 strerror_r(errno, error_buf, MAX_SIZE_ERROR_BUFFER);
661 DBG("inet_pton failed : %s", error_buf);
665 if (gateway != NULL) {
666 rt.rtmsg_flags |= RTF_GATEWAY;
667 if (inet_pton(AF_INET6, gateway, &rt.rtmsg_gateway) < 0) {
668 strerror_r(errno, error_buf, MAX_SIZE_ERROR_BUFFER);
669 DBG("inet_pton failed : %s", error_buf);
676 fd = socket(AF_INET6, SOCK_DGRAM, 0);
678 strerror_r(errno, error_buf, MAX_SIZE_ERROR_BUFFER);
679 DBG("Failed to create socket : %s", error_buf);
683 rt.rtmsg_ifindex = 0;
687 memset(&ifr, 0, sizeof(ifr));
688 strncpy(ifr.ifr_name, interface, sizeof(ifr.ifr_name)-1);
689 ioctl(fd, SIOCGIFINDEX, &ifr);
690 rt.rtmsg_ifindex = ifr.ifr_ifindex;
693 if ((err = ioctl(fd, SIOCADDRT, &rt)) < 0) {
694 strerror_r(errno, error_buf, MAX_SIZE_ERROR_BUFFER);
695 DBG("Failed to add route: %s", error_buf);
705 int netconfig_del_route_ipv6(gchar *ip_addr, gchar *interface, gchar *gateway, unsigned char prefix_len)
711 memset(&rt, 0, sizeof(rt));
713 rt.rtmsg_dst_len = prefix_len;
715 rt.rtmsg_flags = RTF_UP | RTF_HOST;
717 if (inet_pton(AF_INET6, ip_addr, &rt.rtmsg_dst) < 0) {
722 if (gateway != NULL) {
723 rt.rtmsg_flags |= RTF_GATEWAY;
724 if (inet_pton(AF_INET6, gateway, &rt.rtmsg_gateway) < 0) {
732 fd = socket(AF_INET6, SOCK_DGRAM, 0);
736 rt.rtmsg_ifindex = 0;
740 memset(&ifr, 0, sizeof(ifr));
741 strncpy(ifr.ifr_name, interface, sizeof(ifr.ifr_name)-1);
742 ioctl(fd, SIOCGIFINDEX, &ifr);
743 rt.rtmsg_ifindex = ifr.ifr_ifindex;
746 if ((err = ioctl(fd, SIOCDELRT, &rt)) < 0) {
747 DBG("Failed to del route: %d\n", err);
757 gboolean handle_launch_direct(Wifi *wifi, GDBusMethodInvocation *context)
759 #if defined TIZEN_P2P_ENABLE
761 DBG("Launch Wi-Fi direct daemon");
763 const char *path = "/usr/bin/wifi-direct-server.sh";
764 char *const args[] = { "wifi-direct-server.sh", "start", NULL };
765 char *const envs[] = { NULL };
767 ret = netconfig_execute_file(path, args, envs);
769 ERR("Failed to launch Wi-Fi direct daemon");
770 netconfig_error_wifi_direct_failed(context);
774 wifi_complete_launch_direct(wifi, context);
777 wifi_complete_launch_direct(wifi, context);
782 int execute_mdnsd_script(char* op)
784 const char *path = "/usr/bin/mdnsresponder-server.sh";
785 char *const args[] = { "mdnsresponder-server.sh", op, NULL };
786 char *const envs[] = { NULL };
788 return netconfig_execute_file(path, args, envs);
791 static void __dnssd_conn_destroyed_cb(GDBusConnection *conn,
792 const gchar *Name, const gchar *path, const gchar *interface,
793 const gchar *sig, GVariant *param, gpointer user_data)
798 dnssd_conn_destroy_data *data = user_data;
799 GDBusConnection *connection = NULL;
800 connection = netdbus_get_connection();
805 g_variant_get(param, "(sss)", &name, &old, &new);
807 if (g_strcmp0(name, data->conn_name) == 0 && *new == '\0') {
808 DBG("Connection %s Destroyed: name %s id %d", data->conn_name, name,
811 g_dbus_connection_signal_unsubscribe(connection, data->conn_id);
812 if (mdnsd_ref_count == 0) {
813 if (execute_mdnsd_script("stop") < 0)
814 ERR("Failed to stop mdnsresponder daemon");
820 g_free(data->conn_name);
825 static void register_dnssd_conn_destroy_signal(gchar *name)
827 dnssd_conn_destroy_data *data;
828 GDBusConnection *connection = NULL;
829 connection = netdbus_get_connection();
831 if (connection == NULL) {
832 ERR("Failed to get GDbus Connection");
836 data = g_try_malloc0(sizeof(dnssd_conn_destroy_data));
837 data->conn_name = g_strdup(name);
839 data->conn_id = g_dbus_connection_signal_subscribe(connection,
840 DBUS_SERVICE_DBUS, DBUS_INTERFACE_DBUS,
841 "NameOwnerChanged", NULL, name,
842 G_DBUS_SIGNAL_FLAGS_NONE, __dnssd_conn_destroyed_cb,
847 gboolean handle_launch_mdns(Network *object, GDBusMethodInvocation *context,
850 DBG("Launch mdnsresponder daemon");
852 if (execute_mdnsd_script("start") < 0) {
853 ERR("Failed to launch mdnsresponder daemon");
854 netconfig_error_invalid_parameter(context);
859 register_dnssd_conn_destroy_signal(name);
860 DBG("Ref mdnsresponder daemon. ref count: %d", mdnsd_ref_count);
862 network_complete_launch_mdns(object, context);
866 gboolean netconfig_send_notification_to_net_popup(const char * noti, const char * ssid)
870 static gboolean is_found_noti_exists = FALSE;
871 static gboolean is_portal_noti_exists = FALSE;
874 ERR("Invalid notification");
878 if (g_strcmp0(noti, NETCONFIG_DEL_FOUND_AP_NOTI) == 0) {
879 if (is_found_noti_exists == FALSE)
882 is_found_noti_exists = FALSE;
883 } else if (g_strcmp0(noti, NETCONFIG_ADD_FOUND_AP_NOTI) == 0) {
884 if (is_found_noti_exists == TRUE)
887 is_found_noti_exists = TRUE;
888 } else if (g_strcmp0(noti, NETCONFIG_ADD_PORTAL_NOTI) == 0) {
889 if (is_portal_noti_exists == TRUE)
892 is_portal_noti_exists = TRUE;
893 } else if (g_strcmp0(noti, NETCONFIG_DEL_PORTAL_NOTI) == 0) {
894 if (is_portal_noti_exists == FALSE)
897 is_portal_noti_exists = FALSE;
901 bundle_add(b, "_SYSPOPUP_TYPE_", noti);
904 DBG("ssid (%s)", ssid);
905 bundle_add(b, "_AP_NAME_", ssid);
908 ret = syspopup_launch("net-popup", b);
913 ERR("Unable to launch noti-popup. Err = %d", ret);
917 DBG("Successfully sent notification (%s)", noti);
921 int netconfig_send_message_to_net_popup(const char *title,
922 const char *content, const char *type, const char *ssid)
925 bundle *b = bundle_create();
927 bundle_add(b, "_SYSPOPUP_TITLE_", title);
928 bundle_add(b, "_SYSPOPUP_CONTENT_", content);
929 bundle_add(b, "_SYSPOPUP_TYPE_", type);
930 bundle_add(b, "_AP_NAME_", ssid);
932 ret = syspopup_launch("net-popup", b);
939 int netconfig_send_restriction_to_net_popup(const char *title,
940 const char *type, const char *restriction)
943 bundle *b = bundle_create();
945 bundle_add(b, "_SYSPOPUP_TITLE_", title);
946 bundle_add(b, "_SYSPOPUP_CONTENT_", "security restriction");
947 bundle_add(b, "_SYSPOPUP_TYPE_", type);
948 bundle_add(b, "_RESTRICTED_TYPE_", restriction);
950 ret = syspopup_launch("net-popup", b);
957 void netconfig_set_system_event(const char * sys_evt, const char * evt_key, const char * evt_val)
961 DBG("System event set [%s : %s : %s]", sys_evt, evt_key, evt_val);
964 bundle_add_str(b, evt_key, evt_val);
965 eventsystem_send_system_event(sys_evt, b);
969 void netconfig_set_vconf_int(const char * key, int value)
973 DBG("[%s: %d]", key, value);
975 ret = vconf_set_int(key, value);
977 ERR("Failed to set");
980 void netconfig_set_vconf_str(const char * key, const char * value)
984 DBG("[%s: %s]", key, value);
986 ret = vconf_set_str(key, value);
988 ERR("Failed to set");
991 int netconfig_vconf_get_int(const char * key, int *value)
995 ret = vconf_get_int(key, value);
996 if (ret != VCONF_OK) {
997 ERR("Failed to get vconfkey [%s] value", key);
1004 int netconfig_vconf_get_bool(const char * key, int *value)
1008 ret = vconf_get_bool(key, value);
1009 if (ret != VCONF_OK) {
1010 ERR("Failed to get vconfkey [%s] value", key);
1017 char* netconfig_get_env(const char *key)
1020 char buf[256], *entry = NULL, *value = NULL, *last;
1026 fp = fopen(NETCONFIG_TIZEN_SYSTEM_ENV, "r");
1030 while (fgets(buf, sizeof(buf), fp)) {
1032 entry = strtok_r(entry, "=", &last);
1034 if (strstr(entry, key)) {
1035 entry = strtok_r(NULL, "\n", &last);
1037 len = strlen(entry);
1038 value = (char*)malloc(len+1);
1039 g_strlcpy(value, entry, len+1);
1041 value = (char*)malloc(sizeof(char));
1042 g_strlcpy(value, "\n", sizeof(char));
1053 void netconfig_set_mac_address_from_file(void)
1056 char mac_str[MAC_ADDRESS_MAX_LEN];
1057 gchar *mac_lower_str = NULL;
1060 file = fopen(MAC_INFO_FILEPATH, "r");
1062 ERR("Fail to open %s", MAC_INFO_FILEPATH);
1063 file = fopen(MAC_ADDRESS_FILEPATH, "r");
1065 ERR("Fail to open %s", MAC_ADDRESS_FILEPATH);
1069 if (fgets(mac_str, sizeof(mac_str), file) == NULL) {
1070 ERR("Fail to read mac address");
1075 mac_len = strlen(mac_str);
1077 ERR("mac.info is empty");
1082 mac_lower_str = g_ascii_strup(mac_str, (gssize)mac_len);
1083 netconfig_set_vconf_str(VCONFKEY_WIFI_BSSID_ADDRESS, mac_lower_str);
1085 g_free(mac_lower_str);
1089 tizen_profile_t _get_tizen_profile()
1091 static tizen_profile_t profile = TIZEN_PROFILE_UNKNOWN;
1092 if (__builtin_expect(profile != TIZEN_PROFILE_UNKNOWN, 1))
1096 system_info_get_platform_string("http://tizen.org/feature/profile", &profileName);
1097 switch (*profileName) {
1100 profile = TIZEN_PROFILE_MOBILE;
1104 profile = TIZEN_PROFILE_WEARABLE;
1108 profile = TIZEN_PROFILE_TV;
1112 profile = TIZEN_PROFILE_IVI;
1114 default: // common or unknown ==> ALL ARE COMMON.
1115 profile = TIZEN_PROFILE_COMMON;