2 * Network Configuration Module
4 * Copyright (c) 2000 - 2012 Samsung Electronics Co., Ltd. All rights reserved.
6 * Licensed under the Apache License, Version 2.0 (the "License");
7 * you may not use this file except in compliance with the License.
8 * You may obtain a copy of the License at
10 * http://www.apache.org/licenses/LICENSE-2.0
12 * Unless required by applicable law or agreed to in writing, software
13 * distributed under the License is distributed on an "AS IS" BASIS,
14 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15 * See the License for the specific language governing permissions and
16 * limitations under the License.
28 #include <net/route.h>
29 #include <arpa/inet.h>
32 #include <sys/ioctl.h>
33 #include <vconf-keys.h>
34 #include <syspopup_caller.h>
36 #include <bundle_internal.h>
37 #include <eventsystem.h>
38 #include <tzplatform_config.h>
43 #include "wifi-state.h"
45 #define MAC_INFO_FILEPATH tzplatform_mkpath(TZ_SYS_ETC, "/.mac.info")
46 #define MAC_ADDRESS_MAX_LEN 18
48 static gboolean netconfig_device_picker_test = FALSE;
49 static int mdnsd_ref_count = 0;
51 GKeyFile *netconfig_keyfile_load(const char *pathname)
53 GKeyFile *keyfile = NULL;
56 keyfile = g_key_file_new();
57 if (g_key_file_load_from_file(keyfile, pathname, 0, &error) != TRUE) {
58 DBG("Unable to open %s, error %s", pathname, error->message);
61 g_key_file_free(keyfile);
68 void netconfig_keyfile_save(GKeyFile *keyfile, const char *pathname)
72 gchar *keydata = NULL;
73 gchar *needle = NULL, *directory = NULL;
75 directory = g_strdup(pathname);
76 needle = g_strrstr(directory, "/");
81 if (directory == NULL || (*directory) == '\0') {
86 if (g_file_test(directory, G_FILE_TEST_IS_DIR) != TRUE) {
87 if (g_mkdir_with_parents(directory,
88 S_IRUSR | S_IWUSR | S_IXUSR) != 0) {
95 keydata = g_key_file_to_data(keyfile, &size, &error);
96 if (g_file_set_contents(pathname, keydata, size, &error) != TRUE) {
97 DBG("Unable to save %s, error %s", pathname, error->message);
101 chmod(pathname, S_IRUSR | S_IWUSR);
106 void netconfig_start_timer_seconds(guint secs,
107 gboolean(*callback) (gpointer), void *user_data, guint *timer_id)
111 if (callback == NULL) {
112 ERR("callback function is NULL");
116 if ((timer_id != NULL && *timer_id != 0)) {
117 ERR("timer already is registered");
121 t_id = g_timeout_add_seconds(secs, callback, user_data);
124 ERR("Can't add timer");
128 if (timer_id != NULL)
132 void netconfig_start_timer(guint msecs,
133 gboolean(*callback) (gpointer), void *user_data, guint *timer_id)
137 INFO("Register timer with callback pointer (%p)", callback);
139 if (callback == NULL) {
140 ERR("callback function is NULL");
144 if ((timer_id != NULL && *timer_id != 0)) {
145 ERR("timer already is registered");
149 t_id = g_timeout_add(msecs, callback, user_data);
152 ERR("Can't add timer");
156 if (timer_id != NULL)
160 void netconfig_stop_timer(guint *timer_id)
162 if (timer_id == NULL) {
163 ERR("timer is NULL");
167 if (*timer_id != 0) {
168 g_source_remove(*timer_id);
173 static gboolean __netconfig_test_device_picker()
175 char *favorite_wifi_service = NULL;
177 favorite_wifi_service = wifi_get_favorite_service();
178 if (favorite_wifi_service != NULL) {
179 ERR("favorite_wifi_service is existed[%s] : Donot launch device picker", favorite_wifi_service);
180 g_free(favorite_wifi_service);
187 static void __netconfig_pop_device_picker(void)
189 #if defined TIZEN_WEARABLE
191 app_control_h control = NULL;
193 ret = app_control_create(&control);
194 if (APP_CONTROL_ERROR_NONE != ret) {
195 DBG("failed to create app control");
199 app_control_add_extra_data(control, "viewtype", "scanlist");
201 app_control_set_app_id(control, "org.tizen.wifi");
202 ret = app_control_send_launch_request(control, NULL, NULL);
203 if (APP_CONTROL_ERROR_NONE == ret)
204 DBG("Launch request sent successfully");
206 app_control_destroy(control);
209 int wifi_ug_state = 0;
211 netconfig_vconf_get_int(VCONFKEY_WIFI_UG_RUN_STATE, &wifi_ug_state);
212 if (wifi_ug_state == VCONFKEY_WIFI_UG_RUN_STATE_ON_FOREGROUND)
217 DBG("Launch Wi-Fi device picker");
218 syspopup_launch("wifi-qs", b);
224 static gboolean __netconfig_wifi_try_device_picker(gpointer data)
226 if (__netconfig_test_device_picker() == TRUE)
227 __netconfig_pop_device_picker();
232 static guint __netconfig_wifi_device_picker_timer_id(gboolean is_set_method, guint timer_id)
234 static guint netconfig_wifi_device_picker_service_timer = 0;
236 if (is_set_method != TRUE)
237 return netconfig_wifi_device_picker_service_timer;
239 if (netconfig_wifi_device_picker_service_timer != timer_id)
240 netconfig_wifi_device_picker_service_timer = timer_id;
242 return netconfig_wifi_device_picker_service_timer;
245 static void __netconfig_wifi_device_picker_set_timer_id(guint timer_id)
247 __netconfig_wifi_device_picker_timer_id(TRUE, timer_id);
250 static guint __netconfig_wifi_device_picker_get_timer_id(void)
252 return __netconfig_wifi_device_picker_timer_id(FALSE, -1);
255 void netconfig_wifi_enable_device_picker_test(void)
257 netconfig_device_picker_test = TRUE;
260 void netconfig_wifi_device_picker_service_start(void)
262 const int NETCONFIG_WIFI_DEVICE_PICKER_INTERVAL = 700;
265 if (netconfig_device_picker_test == TRUE)
266 netconfig_device_picker_test = FALSE;
272 netconfig_vconf_get_int(VCONFKEY_WIFI_UG_RUN_STATE, &wifi_ug_state);
273 if (wifi_ug_state == VCONFKEY_WIFI_UG_RUN_STATE_ON_FOREGROUND)
276 DBG("Register device picker timer with %d milliseconds", NETCONFIG_WIFI_DEVICE_PICKER_INTERVAL);
277 netconfig_start_timer(NETCONFIG_WIFI_DEVICE_PICKER_INTERVAL, __netconfig_wifi_try_device_picker, NULL, &timer_id);
279 __netconfig_wifi_device_picker_set_timer_id(timer_id);
282 void netconfig_wifi_device_picker_service_stop(void)
286 timer_id = __netconfig_wifi_device_picker_get_timer_id();
290 DBG("Clear device picker timer with timer_id %d", timer_id);
292 netconfig_stop_timer(&timer_id);
294 __netconfig_wifi_device_picker_set_timer_id(timer_id);
297 gboolean netconfig_is_wifi_direct_on(void)
299 #if defined TIZEN_P2P_ENABLE
300 int wifi_direct_state = 0;
302 netconfig_vconf_get_int(VCONFKEY_WIFI_DIRECT_STATE, &wifi_direct_state);
304 DBG("Wi-Fi direct mode %d", wifi_direct_state);
305 return (wifi_direct_state != 0) ? TRUE : FALSE;
311 gboolean netconfig_is_wifi_tethering_on(void)
313 #if defined TIZEN_TETHERING_ENABLE
314 int wifi_tethering_state = 0;
316 netconfig_vconf_get_int(VCONFKEY_MOBILE_HOTSPOT_MODE, &wifi_tethering_state);
317 DBG("Wi-Ti tethering mode %d", wifi_tethering_state);
318 if (wifi_tethering_state & VCONFKEY_MOBILE_HOTSPOT_MODE_WIFI)
324 gboolean netconfig_interface_up(const char *ifname)
329 fd = socket(PF_INET, SOCK_DGRAM | SOCK_CLOEXEC, 0);
333 memset(&ifr, 0, sizeof(ifr));
334 g_strlcpy((char *)ifr.ifr_name, ifname, sizeof(ifr.ifr_name));
336 if (ioctl(fd, SIOCGIFFLAGS, &ifr) < 0) {
341 ifr.ifr_flags |= (IFF_UP | IFF_DYNAMIC);
342 if (ioctl(fd, SIOCSIFFLAGS, &ifr) < 0) {
349 DBG("Successfully activated wireless interface");
353 gboolean netconfig_interface_down(const char *ifname)
358 fd = socket(PF_INET, SOCK_DGRAM | SOCK_CLOEXEC, 0);
362 memset(&ifr, 0, sizeof(ifr));
363 g_strlcpy((char *)ifr.ifr_name, ifname, sizeof(ifr.ifr_name));
365 if (ioctl(fd, SIOCGIFFLAGS, &ifr) < 0) {
370 ifr.ifr_flags = (ifr.ifr_flags & ~IFF_UP) | IFF_DYNAMIC;
371 if (ioctl(fd, SIOCSIFFLAGS, &ifr) < 0) {
378 DBG("Successfully de-activated wireless interface");
382 int netconfig_execute_file(const char *file_path,
383 char *const args[], char *const envs[])
389 register unsigned int index = 0;
390 char error_buf[MAX_SIZE_ERROR_BUFFER] = {0, };
392 while (args[index] != NULL) {
393 DBG("%s", args[index]);
397 if (!(pid = fork())) {
398 DBG("pid(%d), ppid (%d)", getpid(), getppid());
399 DBG("Inside child, exec (%s) command", file_path);
402 if (execve(file_path, args, envs) == -1) {
403 strerror_r(errno, error_buf, MAX_SIZE_ERROR_BUFFER);
404 DBG("Fail to execute command (%s)", error_buf);
407 } else if (pid > 0) {
408 if (waitpid(pid, &status, 0) == -1)
409 DBG("wait pid (%u) status (%d)", pid, status);
411 if (WIFEXITED(status)) {
412 rv = WEXITSTATUS(status);
413 DBG("exited, status=%d", rv);
414 } else if (WIFSIGNALED(status)) {
415 DBG("killed by signal %d", WTERMSIG(status));
416 } else if (WIFSTOPPED(status)) {
417 DBG("stopped by signal %d", WSTOPSIG(status));
418 } else if (WIFCONTINUED(status)) {
425 strerror_r(errno, error_buf, MAX_SIZE_ERROR_BUFFER);
426 DBG("failed to fork(%s)", error_buf);
430 static void on_clat_handler()
435 clat_pid = waitpid(-1, &state, WNOHANG);
437 DBG("clat(%d) state(%d)", clat_pid, WEXITSTATUS(state));
440 int netconfig_execute_clatd(const char *file_path, char *const args[])
445 register unsigned int index = 0;
446 char error_buf[MAX_SIZE_ERROR_BUFFER] = {0, };
448 struct sigaction act;
451 act.sa_handler = on_clat_handler;
452 sigemptyset(&act.sa_mask);
455 state = sigaction(SIGCHLD, &act, 0);
457 DBG("sigaction() : %d");
461 while (args[index] != NULL) {
462 DBG("%s", args[index]);
466 if (!(pid = fork())) {
467 DBG("pid(%d), ppid (%d)", getpid(), getppid());
468 DBG("Inside child, exec (%s) command", file_path);
471 if (execvp(file_path, args) == -1) {
472 strerror_r(errno, error_buf, MAX_SIZE_ERROR_BUFFER);
473 ERR("Fail to execute command (%s)", error_buf);
476 } else if (pid > 0) {
477 ERR("Success to launch clatd");
481 strerror_r(errno, error_buf, MAX_SIZE_ERROR_BUFFER);
482 DBG("failed to fork(%s)", error_buf);
486 int __netconfig_get_interface_index(const char *interface_name)
491 char error_buf[MAX_SIZE_ERROR_BUFFER] = {0, };
493 if (interface_name == NULL) {
494 DBG("Inteface name is NULL");
499 sock = socket(PF_INET, SOCK_DGRAM | SOCK_CLOEXEC, 0);
501 strerror_r(errno, error_buf, MAX_SIZE_ERROR_BUFFER);
502 DBG("Failed to create socket : %s", error_buf);
506 memset(&ifr, 0, sizeof(ifr));
507 strncpy(ifr.ifr_name, interface_name, sizeof(ifr.ifr_name) - 1);
508 result = ioctl(sock, SIOCGIFINDEX, &ifr);
512 DBG("Failed to get ifr index: %s", error_buf);
516 return ifr.ifr_ifindex;
519 int netconfig_add_route_ipv4(gchar *ip_addr, gchar *subnet, gchar *interface, gint address_family)
523 struct sockaddr_in addr_in;
525 char error_buf[MAX_SIZE_ERROR_BUFFER] = {0, };
527 memset(&ifr, 0, sizeof(ifr));
529 ifr.ifr_ifindex = __netconfig_get_interface_index(interface);
531 if (ifr.ifr_ifindex < 0)
534 strncpy(ifr.ifr_name, interface, IFNAMSIZ-1);
536 memset(&rt, 0, sizeof(rt));
538 rt.rt_flags = RTF_UP | RTF_HOST;
539 memset(&addr_in, 0, sizeof(struct sockaddr_in));
540 addr_in.sin_family = address_family;
541 addr_in.sin_addr.s_addr = inet_addr(ip_addr);
542 memcpy(&rt.rt_dst, &addr_in, sizeof(rt.rt_dst));
544 memset(&addr_in, 0, sizeof(struct sockaddr_in));
545 addr_in.sin_family = address_family;
546 addr_in.sin_addr.s_addr = INADDR_ANY;
547 memcpy(&rt.rt_gateway, &addr_in, sizeof(rt.rt_gateway));
549 memset(&addr_in, 0, sizeof(struct sockaddr_in));
550 addr_in.sin_family = AF_INET;
551 addr_in.sin_addr.s_addr = inet_addr(subnet);
552 memcpy(&rt.rt_genmask, &addr_in, sizeof(rt.rt_genmask));
554 rt.rt_dev = ifr.ifr_name;
557 sock = socket(PF_INET, SOCK_DGRAM, 0);
560 strerror_r(errno, error_buf, MAX_SIZE_ERROR_BUFFER);
561 DBG("Failed to create socket : %s", error_buf);
565 if (ioctl(sock, SIOCADDRT, &rt) < 0) {
566 strerror_r(errno, error_buf, MAX_SIZE_ERROR_BUFFER);
567 DBG("Failed to set route address : %s", error_buf);
577 int netconfig_del_route_ipv4(gchar *ip_addr, gchar *subnet, gchar *interface, gint address_family)
581 struct sockaddr_in addr_in;
583 char error_buf[MAX_SIZE_ERROR_BUFFER] = {0, };
585 memset(&ifr, 0, sizeof(ifr));
586 ifr.ifr_ifindex = __netconfig_get_interface_index(interface);
588 if (ifr.ifr_ifindex < 0)
591 strncpy(ifr.ifr_name, interface, IFNAMSIZ-1);
593 memset(&rt, 0, sizeof(rt));
595 rt.rt_flags = RTF_UP;
596 memset(&addr_in, 0, sizeof(struct sockaddr_in));
597 addr_in.sin_family = address_family;
598 addr_in.sin_addr.s_addr = inet_addr(ip_addr);
599 memcpy(&rt.rt_dst, &addr_in, sizeof(rt.rt_dst));
601 memset(&addr_in, 0, sizeof(struct sockaddr_in));
602 addr_in.sin_family = address_family;
603 addr_in.sin_addr.s_addr = inet_addr(subnet);
604 memcpy(&rt.rt_genmask, &addr_in, sizeof(rt.rt_genmask));
605 rt.rt_dev = ifr.ifr_name;
608 sock = socket(PF_INET, SOCK_DGRAM, 0);
611 strerror_r(errno, error_buf, MAX_SIZE_ERROR_BUFFER);
612 DBG("Failed to create socket : %s", error_buf);
616 if (ioctl(sock, SIOCDELRT, &rt) < 0) {
617 strerror_r(errno, error_buf, MAX_SIZE_ERROR_BUFFER);
618 DBG("Failed to set route address : %s", error_buf);
628 int netconfig_add_route_ipv6(gchar *ip_addr, gchar *interface, gchar *gateway, unsigned char prefix_len)
633 char error_buf[MAX_SIZE_ERROR_BUFFER] = {0, };
635 memset(&rt, 0, sizeof(rt));
637 rt.rtmsg_dst_len = prefix_len;
639 rt.rtmsg_flags = RTF_UP | RTF_HOST;
642 if (inet_pton(AF_INET6, ip_addr, &rt.rtmsg_dst) < 0) {
643 strerror_r(errno, error_buf, MAX_SIZE_ERROR_BUFFER);
644 DBG("inet_pton failed : %s", error_buf);
648 if (gateway != NULL) {
649 rt.rtmsg_flags |= RTF_GATEWAY;
650 if (inet_pton(AF_INET6, gateway, &rt.rtmsg_gateway) < 0) {
651 strerror_r(errno, error_buf, MAX_SIZE_ERROR_BUFFER);
652 DBG("inet_pton failed : %s", error_buf);
659 fd = socket(AF_INET6, SOCK_DGRAM, 0);
661 strerror_r(errno, error_buf, MAX_SIZE_ERROR_BUFFER);
662 DBG("Failed to create socket : %s", error_buf);
666 rt.rtmsg_ifindex = 0;
670 memset(&ifr, 0, sizeof(ifr));
671 strncpy(ifr.ifr_name, interface, sizeof(ifr.ifr_name)-1);
672 ioctl(fd, SIOCGIFINDEX, &ifr);
673 rt.rtmsg_ifindex = ifr.ifr_ifindex;
676 if ((err = ioctl(fd, SIOCADDRT, &rt)) < 0) {
677 strerror_r(errno, error_buf, MAX_SIZE_ERROR_BUFFER);
678 DBG("Failed to add route: %s", error_buf);
688 int netconfig_del_route_ipv6(gchar *ip_addr, gchar *interface, gchar *gateway, unsigned char prefix_len)
694 memset(&rt, 0, sizeof(rt));
696 rt.rtmsg_dst_len = prefix_len;
698 rt.rtmsg_flags = RTF_UP | RTF_HOST;
700 if (inet_pton(AF_INET6, ip_addr, &rt.rtmsg_dst) < 0) {
705 if (gateway != NULL) {
706 rt.rtmsg_flags |= RTF_GATEWAY;
707 if (inet_pton(AF_INET6, gateway, &rt.rtmsg_gateway) < 0) {
715 fd = socket(AF_INET6, SOCK_DGRAM, 0);
719 rt.rtmsg_ifindex = 0;
723 memset(&ifr, 0, sizeof(ifr));
724 strncpy(ifr.ifr_name, interface, sizeof(ifr.ifr_name)-1);
725 ioctl(fd, SIOCGIFINDEX, &ifr);
726 rt.rtmsg_ifindex = ifr.ifr_ifindex;
729 if ((err = ioctl(fd, SIOCDELRT, &rt)) < 0) {
730 DBG("Failed to del route: %d\n", err);
740 gboolean handle_launch_direct(Wifi *wifi, GDBusMethodInvocation *context)
742 #if defined TIZEN_P2P_ENABLE
744 DBG("Launch Wi-Fi direct daemon");
746 const char *path = "/usr/bin/wifi-direct-server.sh";
747 char *const args[] = { "wifi-direct-server.sh", "start", NULL };
748 char *const envs[] = { NULL };
750 ret = netconfig_execute_file(path, args, envs);
752 ERR("Failed to launch Wi-Fi direct daemon");
753 netconfig_error_wifi_direct_failed(context);
757 wifi_complete_launch_direct(wifi, context);
760 wifi_complete_launch_direct(wifi, context);
765 int execute_mdnsd_script(char* op) {
766 const char *path = "/usr/bin/mdnsresponder-server.sh";
767 char *const args[] = { "mdnsresponder-server.sh", op, NULL };
768 char *const envs[] = { NULL };
770 return netconfig_execute_file(path, args, envs);
773 gboolean handle_launch_mdns(Network *object, GDBusMethodInvocation *context)
775 DBG("Launch mdnsresponder daemon");
777 if (mdnsd_ref_count != 0) {
778 ERR("Invalid access");
779 netconfig_error_invalid_parameter(context);
783 if (execute_mdnsd_script("start") < 0) {
784 ERR("Failed to launch mdnsresponder daemon");
785 netconfig_error_invalid_parameter(context);
789 network_complete_launch_mdns(object, context);
793 gboolean handle_ref_mdns(Network *object, GDBusMethodInvocation *context)
797 DBG("Ref mdnsresponder daemon. ref count: %d", mdnsd_ref_count);
798 network_complete_ref_mdns(object, context);
802 gboolean handle_unref_mdns(Network *object, GDBusMethodInvocation *context)
804 DBG("Unef mdnsresponder daemon");
806 if (mdnsd_ref_count <= 0) {
807 ERR("Invalid access");
808 netconfig_error_invalid_parameter(context);
814 DBG("Unref mdnsresponder daemon. ref count: %d", mdnsd_ref_count);
815 if (mdnsd_ref_count == 0) {
816 if (execute_mdnsd_script("stop") < 0) {
817 ERR("Failed to stop mdnsresponder daemon");
818 netconfig_error_invalid_parameter(context);
823 network_complete_unref_mdns(object, context);
827 gboolean netconfig_send_notification_to_net_popup(const char * noti, const char * ssid)
831 static gboolean is_found_noti_exists = FALSE;
832 static gboolean is_portal_noti_exists = FALSE;
835 ERR("Invalid notification");
839 if (g_strcmp0(noti, NETCONFIG_DEL_FOUND_AP_NOTI) == 0) {
840 if (is_found_noti_exists == FALSE)
843 is_found_noti_exists = FALSE;
844 } else if (g_strcmp0(noti, NETCONFIG_ADD_FOUND_AP_NOTI) == 0) {
845 if (is_found_noti_exists == TRUE)
848 is_found_noti_exists = TRUE;
849 } else if (g_strcmp0(noti, NETCONFIG_ADD_PORTAL_NOTI) == 0) {
850 if (is_portal_noti_exists == TRUE)
853 is_portal_noti_exists = TRUE;
854 } else if (g_strcmp0(noti, NETCONFIG_DEL_PORTAL_NOTI) == 0) {
855 if (is_portal_noti_exists == FALSE)
858 is_portal_noti_exists = FALSE;
862 bundle_add(b, "_SYSPOPUP_TYPE_", noti);
865 DBG("ssid (%s)", ssid);
866 bundle_add(b, "_AP_NAME_", ssid);
869 ret = syspopup_launch("net-popup", b);
874 ERR("Unable to launch noti-popup. Err = %d", ret);
878 DBG("Successfully sent notification (%s)", noti);
882 int netconfig_send_message_to_net_popup(const char *title,
883 const char *content, const char *type, const char *ssid)
886 bundle *b = bundle_create();
888 bundle_add(b, "_SYSPOPUP_TITLE_", title);
889 bundle_add(b, "_SYSPOPUP_CONTENT_", content);
890 bundle_add(b, "_SYSPOPUP_TYPE_", type);
891 bundle_add(b, "_AP_NAME_", ssid);
893 ret = syspopup_launch("net-popup", b);
900 int netconfig_send_restriction_to_net_popup(const char *title,
901 const char *type, const char *restriction)
904 bundle *b = bundle_create();
906 bundle_add(b, "_SYSPOPUP_TITLE_", title);
907 bundle_add(b, "_SYSPOPUP_CONTENT_", "security restriction");
908 bundle_add(b, "_SYSPOPUP_TYPE_", type);
909 bundle_add(b, "_RESTRICTED_TYPE_", restriction);
911 ret = syspopup_launch("net-popup", b);
918 void netconfig_set_system_event(const char * sys_evt, const char * evt_key, const char * evt_val)
922 DBG("System event set [%s : %s : %s]", sys_evt, evt_key, evt_val);
925 bundle_add_str(b, evt_key, evt_val);
926 eventsystem_send_system_event(sys_evt, b);
930 void netconfig_set_vconf_int(const char * key, int value)
934 DBG("[%s: %d]", key, value);
936 ret = vconf_set_int(key, value);
938 ERR("Failed to set");
941 void netconfig_set_vconf_str(const char * key, const char * value)
945 DBG("[%s: %s]", key, value);
947 ret = vconf_set_str(key, value);
949 ERR("Failed to set");
952 int netconfig_vconf_get_int(const char * key, int *value)
956 ret = vconf_get_int(key, value);
957 if (ret != VCONF_OK) {
958 ERR("Failed to get vconfkey [%s] value", key);
965 int netconfig_vconf_get_bool(const char * key, int *value)
969 ret = vconf_get_bool(key, value);
970 if (ret != VCONF_OK) {
971 ERR("Failed to get vconfkey [%s] value", key);
978 char* netconfig_get_env(const char *key)
981 char buf[256], *entry = NULL, *value = NULL, *last;
987 fp = fopen(NETCONFIG_TIZEN_SYSTEM_ENV, "r");
991 while (fgets(buf, sizeof(buf), fp)) {
993 entry = strtok_r(entry, "=", &last);
995 if (strstr(entry, key)) {
996 entry = strtok_r(NULL, "\n", &last);
999 value = (char*)malloc(len+1);
1000 g_strlcpy(value, entry, len+1);
1002 value = (char*)malloc(sizeof(char));
1003 g_strlcpy(value, "\n", sizeof(char));
1014 void netconfig_set_mac_address_from_file(void)
1017 char mac_str[MAC_ADDRESS_MAX_LEN];
1018 gchar *mac_lower_str = NULL;
1021 file = fopen(MAC_INFO_FILEPATH, "r");
1023 ERR("Fail to open %s", MAC_INFO_FILEPATH);
1026 if (fgets(mac_str, sizeof(mac_str), file) == NULL) {
1027 ERR("Fail to read mac address");
1032 mac_len = strlen(mac_str);
1034 ERR("mac.info is empty");
1039 mac_lower_str = g_ascii_strup(mac_str, (gssize)mac_len);
1040 netconfig_set_vconf_str(VCONFKEY_WIFI_BSSID_ADDRESS, mac_lower_str);
1042 g_free(mac_lower_str);