* limitations under the License.
*/
+#define _GNU_SOURCE
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <dbus/dbus.h>
#include <gio/gio.h>
#include <vconf.h>
-#include <openssl/evp.h>
-#include <openssl/sha.h>
#include <ckmc/ckmc-manager.h>
+#include <tzplatform_config.h>
#include "tethering_private.h"
+#define ALLOWED_LIST tzplatform_mkpath(TZ_SYS_VAR, "/lib/hostapd/hostapd.accept")
+#define BLOCKED_LIST tzplatform_mkpath(TZ_SYS_VAR, "/lib/hostapd/hostapd.deny")
+#define TEMP_LIST tzplatform_mkpath(TZ_SYS_VAR, "/lib/hostapd/.hostapd_tmp")
+#define MAC_ADDR_LEN 18
+#define MAX_BUF_SIZE 80
+
+#ifdef TIZEN_TV_EXT
+#define VCONFKEY_WIFI_TXPOWER "db/dnet/txpower" /**< VCONFKEY for TX Power */
+#define VCONFKEY_WIFI_CHANNEL "db/dnet/channel" /**< VCONFKEY for Channel */
+#define VCONFKEY_WIFI_SSID "db/dnet/ssid" /**< VCONFKEY for ssid */
+
+#define DBUS_DEFAULT_REPLY_TIMEOUT 15000
+#endif /* TIZEN_TV_EXT */
+
+#define IPTABLES "/usr/sbin/iptables"
+#define TABLE_NAT "nat"
+#define TETH_NAT_PRE "teth_nat_pre"
+#define TABLE_FILTER "filter"
+#define TETH_FILTER_FW "teth_filter_fw"
+#define ACTION_DROP "DROP"
+#define ACTION_ACCEPT "ACCEPT"
+#define PORT_FORWARD_RULE_STR "-t %s -A %s -i %s -p %s -d %s --dport %d -j DNAT --to %s:%d"
+#define FILTERING_MULTIPORT_RULE_STR "-t %s -A %s -p %s -m multiport --dport %d,%d -j %s"
+#define FILTERING_RULE_STR "-t %s -A %s -p %s --dport %d -j %s"
+
+typedef enum {
+ DUAL_BAND_NONE = 0, //0
+ DUAL_BAND_2G = 1 << 0, //1
+ DUAL_BAND_5G = 1 << 1, //2
+ DUAL_BAND_MIN_INTERFACE = 1 << 2, //4
+ DUAL_BAND_ALL = 7, //7
+} supported_band_e;
+
+static GSList *allowed_list = NULL;
+static GSList *blocked_list = NULL;
+static GSList *port_forwarding = NULL;
+static GSList *port_filtering = NULL;
+static GSList *custom_port_filtering = NULL;
+
static void __handle_wifi_tether_on(GDBusConnection *connection, const gchar *sender_name,
const gchar *object_path, const gchar *interface_name, const gchar *signal_name,
GVariant *parameters, gpointer user_data);
const gchar *object_path, const gchar *interface_name, const gchar *signal_name,
GVariant *parameters, gpointer user_data);
-static void __handle_wifi_ap_on(GDBusConnection *connection, const gchar *sender_name,
- const gchar *object_path, const gchar *interface_name, const gchar *signal_name,
- GVariant *parameters, gpointer user_data);
-
-static void __handle_wifi_ap_off(GDBusConnection *connection, const gchar *sender_name,
- const gchar *object_path, const gchar *interface_name, const gchar *signal_name,
- GVariant *parameters, gpointer user_data);
-
static void __handle_net_closed(GDBusConnection *connection, const gchar *sender_name,
const gchar *object_path, const gchar *interface_name, const gchar *signal_name,
GVariant *parameters, gpointer user_data);
const gchar *object_path, const gchar *interface_name, const gchar *signal_name,
GVariant *parameters, gpointer user_data);
-static char *__get_key_manager_alias(const char* alias);
-
static __tethering_sig_t sigs[] = {
{0, SIGNAL_NAME_NET_CLOSED, __handle_net_closed},
{0, SIGNAL_NAME_WIFI_TETHER_ON, __handle_wifi_tether_on},
{0, SIGNAL_NAME_USB_TETHER_OFF, __handle_usb_tether_off},
{0, SIGNAL_NAME_BT_TETHER_ON, __handle_bt_tether_on},
{0, SIGNAL_NAME_BT_TETHER_OFF, __handle_bt_tether_off},
- {0, SIGNAL_NAME_WIFI_AP_ON, __handle_wifi_ap_on},
- {0, SIGNAL_NAME_WIFI_AP_OFF, __handle_wifi_ap_off},
{0, SIGNAL_NAME_NO_DATA_TIMEOUT, __handle_no_data_timeout},
{0, SIGNAL_NAME_LOW_BATTERY_MODE, __handle_low_battery_mode},
{0, SIGNAL_NAME_FLIGHT_MODE, __handle_flight_mode},
{0, SIGNAL_NAME_SECURITY_TYPE_CHANGED, __handle_security_type_changed},
{0, SIGNAL_NAME_SSID_VISIBILITY_CHANGED, __handle_ssid_visibility_changed},
{0, SIGNAL_NAME_PASSPHRASE_CHANGED, __handle_passphrase_changed},
- {0, SIGNAL_NAME_DHCP_STATUS, __handle_dhcp},
- {0, "", NULL} };
+ {0, SIGNAL_NAME_DHCP_STATUS, __handle_dhcp} };
static int retry = 0;
+static int is_dualband_support = DUAL_BAND_NONE;
+static void __reset_dualband_support(void)
+{
+ is_dualband_support = DUAL_BAND_NONE;
+}
+
+static void __set_dualband_support(int band)
+{
+ is_dualband_support |= band;
+ return;
+}
+
+static gboolean __is_dualband_support(void)
+{
+ return (is_dualband_support == DUAL_BAND_ALL) ? TRUE : FALSE;
+}
static void __send_dbus_signal(GDBusConnection *conn, const char *signal_name, const char *arg)
{
if (conn == NULL || signal_name == NULL)
ERR("g_dbus_connection_emit_signal is failed because %s\n", error->message);
g_error_free(error);
}
- g_variant_unref(message);
}
static bool __any_tethering_is_enabled(tethering_h tethering)
if (tethering_is_enabled(tethering, TETHERING_TYPE_USB) ||
tethering_is_enabled(tethering, TETHERING_TYPE_WIFI) ||
tethering_is_enabled(tethering, TETHERING_TYPE_BT) ||
- tethering_is_enabled(tethering, TETHERING_TYPE_RESERVED))
+ tethering_is_enabled(tethering, TETHERING_TYPE_P2P))
return true;
return false;
static tethering_error_e __set_security_type(const tethering_wifi_security_type_e security_type)
{
if (security_type != TETHERING_WIFI_SECURITY_TYPE_NONE &&
- security_type != TETHERING_WIFI_SECURITY_TYPE_WPA2_PSK) {
+ security_type != TETHERING_WIFI_SECURITY_TYPE_WPA2_PSK &&
+ security_type != TETHERING_WIFI_SECURITY_TYPE_WPS &&
+ security_type != TETHERING_WIFI_SECURITY_TYPE_SAE) {
ERR("Invalid param\n");
return TETHERING_ERROR_INVALID_PARAMETER;
}
if (ptr == NULL)
return false;
+ if (!g_strcmp0(ptr, ""))
+ return false;
+
if (!g_utf8_validate(ptr, -1, (const char **)&ptr_tmp))
*ptr_tmp = '\0';
return index;
}
-static tethering_error_e __set_passphrase(const char *passphrase, const unsigned int size)
-{
- if (passphrase == NULL || size == 0)
- return TETHERING_ERROR_INVALID_PARAMETER;
-
- int ret = -1;
- char *alias;
- ckmc_raw_buffer_s ckmc_buf;
- ckmc_policy_s ckmc_policy;
-
- ckmc_policy.password = NULL;
- ckmc_policy.extractable = true;
-
- ckmc_buf.data = (unsigned char *) passphrase;
- ckmc_buf.size = strlen(passphrase) + 1;
-
- alias = __get_key_manager_alias(TETHERING_WIFI_PASSPHRASE_STORE_KEY);
-
- ret = ckmc_remove_data(alias);
- if (ret != CKMC_ERROR_NONE) {
- ERR("Fail to remove old data : %d", ret);
- return TETHERING_ERROR_OPERATION_FAILED;
- }
-
- ret = ckmc_save_data(alias, ckmc_buf, ckmc_policy);
- if (ret != CKMC_ERROR_NONE) {
- ERR("Fail to save the passphrase : %d", ret);
- return TETHERING_ERROR_OPERATION_FAILED;
- }
-
- if (alias)
- free(alias);
-
- return TETHERING_ERROR_NONE;
-}
-
-static char *__get_key_manager_alias(const char* name)
-{
- size_t alias_len = strlen(name) + strlen(ckmc_owner_id_system) + strlen(ckmc_owner_id_separator);
- char *ckm_alias = (char *)malloc(alias_len + 1);
- if (!ckm_alias) {
- ERR("Fail to allocate memory\n");
- return NULL;
- }
- memset(ckm_alias, 0, alias_len);
- strncat(ckm_alias, ckmc_owner_id_system, strlen(ckmc_owner_id_system));
- strncat(ckm_alias, ckmc_owner_id_separator, strlen(ckmc_owner_id_separator));
- strncat(ckm_alias, name, strlen(name));
-
- return ckm_alias;
-}
-
-static tethering_error_e __get_passphrase(char *passphrase,
- unsigned int passphrase_size, unsigned int *passphrase_len)
-{
- if (passphrase == NULL || passphrase_size == 0) {
- ERR("Invalid parameter\n");
- return TETHERING_ERROR_INVALID_PARAMETER;
- }
-
- int ret = 0;
- char *alias = NULL;
- char *passwd = NULL;
- char tmp[TETHERING_WIFI_KEY_MAX_LEN + 1] = {0, };
- ckmc_raw_buffer_s *ckmc_buf;
-
- alias = __get_key_manager_alias(TETHERING_WIFI_PASSPHRASE_STORE_KEY);
- ret = ckmc_get_data(alias, passwd, &ckmc_buf);
- if (ret < 0) {
- DBG("Create new password\n");
- ret = __generate_initial_passphrase(tmp, sizeof(tmp));
-
- if (ret == 0) {
- ERR("generate_initial_passphrase failed : %d\n", *passphrase_len);
- return TETHERING_ERROR_OPERATION_FAILED;
- } else {
- *passphrase_len = ret;
- g_strlcpy(passphrase, tmp, (*passphrase_len)+1);
-
- if (__set_passphrase(passphrase, *passphrase_len) != TETHERING_ERROR_NONE) {
- DBG("set_passphrase is failed : %s, %d", passphrase, *passphrase_len);
- return TETHERING_ERROR_OPERATION_FAILED;
- }
- }
- } else {
- *passphrase_len = ckmc_buf->size;
- g_strlcpy(passphrase, (char *)ckmc_buf->data, (*passphrase_len) + 1);
- }
-
- if (alias)
- free(alias);
-
- return TETHERING_ERROR_NONE;
-}
-
static tethering_error_e __get_error(int agent_error)
{
tethering_error_e err = TETHERING_ERROR_NONE;
case MOBILE_AP_ERROR_PERMISSION_DENIED:
err = TETHERING_ERROR_PERMISSION_DENIED;
break;
-
default:
ERR("Not defined error : %d\n", agent_error);
err = TETHERING_ERROR_OPERATION_FAILED;
GVariant *parameters, gpointer user_data)
{
DBG("+\n");
+ TETHERING_LOCK;
_retm_if(user_data == NULL, "parameter(user_data) is NULL\n");
type = TETHERING_TYPE_WIFI;
else if (ap_type == MOBILE_AP_TYPE_BT)
type = TETHERING_TYPE_BT;
- else if (ap_type == MOBILE_AP_TYPE_WIFI_AP) {
- type = TETHERING_TYPE_RESERVED;
- } else {
+ else if (ap_type == MOBILE_AP_TYPE_P2P)
+ type = TETHERING_TYPE_P2P;
+ else {
ERR("Not supported tethering type [%d]\n", ap_type);
goto DONE;
}
+ SINFO("[%s] type %d, ip %s, mac %s, name %s, timestamp %d",
+ buf, ap_type, ip, mac, name, timestamp);
+
ccb = th->changed_cb[type];
if (ccb == NULL)
goto DONE;
g_free(ip);
g_free(mac);
g_free(name);
+
+ TETHERING_UNLOCK;
DBG("-\n");
}
GVariant *parameters, gpointer user_data)
{
DBG("+\n");
+ TETHERING_LOCK;
_retm_if(user_data == NULL, "parameter(user_data) is NULL\n");
void *data = NULL;
tethering_disabled_cause_e code = TETHERING_DISABLED_BY_NETWORK_CLOSE;
+ SINFO("Tethering Disabled by network close !");
+
for (type = TETHERING_TYPE_USB; type <= TETHERING_TYPE_BT; type++) {
dcb = th->disabled_cb[type];
if (dcb == NULL)
dcb(TETHERING_ERROR_NONE, type, code, data);
}
+ TETHERING_UNLOCK;
DBG("-\n");
}
GVariant *parameters, gpointer user_data)
{
DBG("+\n");
+ TETHERING_LOCK;
_retm_if(user_data == NULL, "parameter(user_data) is NULL\n");
tethering_enabled_cb ecb = NULL;
void *data = NULL;
+ if (!_tethering_check_handle(th)) {
+ DBG("Tethering handle is not valid now, ignore it.");
+ TETHERING_UNLOCK;
+ return;
+ }
+
ecb = th->enabled_cb[type];
- if (ecb == NULL)
+ if (ecb == NULL) {
+ TETHERING_UNLOCK;
return;
+ }
+
data = th->enabled_user_data[type];
ecb(TETHERING_ERROR_NONE, type, is_requested, data);
+
+ TETHERING_UNLOCK;
DBG("-\n");
}
GVariant *parameters, gpointer user_data)
{
DBG("+\n");
+ TETHERING_LOCK;
_retm_if(user_data == NULL, "parameter(user_data) is NULL\n");
void *data = NULL;
char *buf = NULL;
+ if (!_tethering_check_handle(th)) {
+ DBG("Tethering handle is not valid now, ignore it.");
+ TETHERING_UNLOCK;
+ return;
+ }
+
dcb = th->disabled_cb[type];
- if (dcb == NULL)
+ if (dcb == NULL) {
+ TETHERING_UNLOCK;
return;
+ }
+
data = th->disabled_user_data[type];
g_variant_get(parameters, "(s)", &buf);
if (!g_strcmp0(buf, SIGNAL_MSG_NOT_AVAIL_INTERFACE))
g_free(buf);
dcb(TETHERING_ERROR_NONE, type, code, data);
+ TETHERING_UNLOCK;
DBG("-\n");
}
GVariant *parameters, gpointer user_data)
{
DBG("+\n");
+ TETHERING_LOCK;
_retm_if(user_data == NULL, "parameter(user_data) is NULL\n");
tethering_enabled_cb ecb = NULL;
void *data = NULL;
+ if (!_tethering_check_handle(th)) {
+ DBG("Tethering handle is not valid now, ignore it.");
+ TETHERING_UNLOCK;
+ return;
+ }
+
ecb = th->enabled_cb[type];
- if (ecb == NULL)
+ if (ecb == NULL) {
+ TETHERING_UNLOCK;
return;
+ }
+
data = th->enabled_user_data[type];
ecb(TETHERING_ERROR_NONE, type, is_requested, data);
+
+ TETHERING_UNLOCK;
DBG("-\n");
}
GVariant *parameters, gpointer user_data)
{
DBG("+\n");
+ TETHERING_LOCK;
_retm_if(user_data == NULL, "parameter(user_data) is NULL\n");
void *data = NULL;
char *buf = NULL;
+ if (!_tethering_check_handle(th)) {
+ DBG("Tethering handle is not valid now, ignore it.");
+ TETHERING_UNLOCK;
+ return;
+ }
+
dcb = th->disabled_cb[type];
- if (dcb == NULL)
+ if (dcb == NULL) {
+ TETHERING_UNLOCK;
return;
+ }
+
data = th->disabled_user_data[type];
g_variant_get(parameters, "(s)", &buf);
dcb(TETHERING_ERROR_NONE, type, code, data);
g_free(buf);
+
+ TETHERING_UNLOCK;
DBG("-\n");
}
GVariant *parameters, gpointer user_data)
{
DBG("+\n");
+ TETHERING_LOCK;
_retm_if(user_data == NULL, "parameter(user_data) is NULL\n");
tethering_enabled_cb ecb = NULL;
void *data = NULL;
+ if (!_tethering_check_handle(th)) {
+ DBG("Tethering handle is not valid now, ignore it.");
+ TETHERING_UNLOCK;
+ return;
+ }
+
ecb = th->enabled_cb[type];
- if (ecb == NULL)
+ if (ecb == NULL) {
+ TETHERING_UNLOCK;
return;
+ }
+
data = th->enabled_user_data[type];
ecb(TETHERING_ERROR_NONE, type, is_requested, data);
+
+ TETHERING_UNLOCK;
DBG("-\n");
}
GVariant *parameters, gpointer user_data)
{
DBG("+\n");
+ TETHERING_LOCK;
_retm_if(user_data == NULL, "parameter(user_data) is NULL\n");
void *data = NULL;
char *buf = NULL;
+ if (!_tethering_check_handle(th)) {
+ DBG("Tethering handle is not valid now, ignore it.");
+ TETHERING_UNLOCK;
+ return;
+ }
+
dcb = th->disabled_cb[type];
- if (dcb == NULL)
+ if (dcb == NULL) {
+ TETHERING_UNLOCK;
return;
+ }
+
data = th->disabled_user_data[type];
g_variant_get(parameters, "(s)", &buf);
if (!g_strcmp0(buf, SIGNAL_MSG_NOT_AVAIL_INTERFACE))
dcb(TETHERING_ERROR_NONE, type, code, data);
g_free(buf);
- DBG("-\n");
-}
-
-static void __handle_wifi_ap_on(GDBusConnection *connection, const gchar *sender_name,
- const gchar *object_path, const gchar *interface_name, const gchar *signal_name,
- GVariant *parameters, gpointer user_data)
-{
- DBG("+\n");
-
- _retm_if(user_data == NULL, "parameter(user_data) is NULL\n");
-
- __tethering_h *th = (__tethering_h *)user_data;
- tethering_type_e type = TETHERING_TYPE_RESERVED;
- bool is_requested = false;
- tethering_enabled_cb ecb = NULL;
- void *data = NULL;
-
- ecb = th->enabled_cb[type];
- if (ecb == NULL)
- return;
- data = th->enabled_user_data[type];
-
- ecb(TETHERING_ERROR_NONE, type, is_requested, data);
- DBG("-\n");
-}
-
-static void __handle_wifi_ap_off(GDBusConnection *connection, const gchar *sender_name,
- const gchar *object_path, const gchar *interface_name, const gchar *signal_name,
- GVariant *parameters, gpointer user_data)
-{
- DBG("+\n");
-
- _retm_if(user_data == NULL, "parameter(user_data) is NULL\n");
-
- __tethering_h *th = (__tethering_h *)user_data;
- tethering_type_e type = TETHERING_TYPE_RESERVED;
- tethering_disabled_cause_e code = TETHERING_DISABLED_BY_OTHERS;
- tethering_disabled_cb dcb = NULL;
- void *data = NULL;
- char *buf = NULL;
-
- dcb = th->disabled_cb[type];
- if (dcb == NULL)
- return;
- data = th->disabled_user_data[type];
- g_variant_get(parameters, "(s)", &buf);
- if (!g_strcmp0(buf, SIGNAL_MSG_NOT_AVAIL_INTERFACE))
- code = TETHERING_DISABLED_BY_WIFI_ON;
- else if (!g_strcmp0(buf, SIGNAL_MSG_TIMEOUT))
- code = TETHERING_DISABLED_BY_TIMEOUT;
- g_free(buf);
-
- dcb(TETHERING_ERROR_NONE, type, code, data);
+ TETHERING_UNLOCK;
DBG("-\n");
}
GVariant *parameters, gpointer user_data)
{
DBG("+\n");
+ TETHERING_LOCK;
_retm_if(user_data == NULL, "parameter(user_data) is NULL\n");
void *data = NULL;
tethering_disabled_cause_e code = TETHERING_DISABLED_BY_TIMEOUT;
+ if (!_tethering_check_handle(th)) {
+ DBG("Tethering handle is not valid now, ignore it.");
+ TETHERING_UNLOCK;
+ return;
+ }
+
for (type = TETHERING_TYPE_USB; type <= TETHERING_TYPE_BT; type++) {
dcb = th->disabled_cb[type];
if (dcb == NULL)
dcb(TETHERING_ERROR_NONE, type, code, data);
}
+
+ TETHERING_UNLOCK;
DBG("-\n");
}
GVariant *parameters, gpointer user_data)
{
DBG("+\n");
+ TETHERING_LOCK;
_retm_if(user_data == NULL, "parameter(user_data) is NULL\n");
void *data = NULL;
tethering_disabled_cause_e code = TETHERING_DISABLED_BY_LOW_BATTERY;
- for (type = TETHERING_TYPE_USB; type <= TETHERING_TYPE_RESERVED; type++) {
+ if (!_tethering_check_handle(th)) {
+ DBG("Tethering handle is not valid now, ignore it.");
+ TETHERING_UNLOCK;
+ return;
+ }
+
+ for (type = TETHERING_TYPE_USB; type <= TETHERING_TYPE_BT; type++) {
dcb = th->disabled_cb[type];
if (dcb == NULL)
continue;
dcb(TETHERING_ERROR_NONE, type, code, data);
}
+
+ TETHERING_UNLOCK;
DBG("-\n");
}
GVariant *parameters, gpointer user_data)
{
DBG("+\n");
+ TETHERING_LOCK;
_retm_if(user_data == NULL, "parameter(user_data) is NULL\n");
void *data = NULL;
tethering_disabled_cause_e code = TETHERING_DISABLED_BY_FLIGHT_MODE;
- for (type = TETHERING_TYPE_USB; type <= TETHERING_TYPE_RESERVED; type++) {
+ if (!_tethering_check_handle(th)) {
+ DBG("Tethering handle is not valid now, ignore it.");
+ TETHERING_UNLOCK;
+ return;
+ }
+
+ for (type = TETHERING_TYPE_USB; type <= TETHERING_TYPE_BT; type++) {
dcb = th->disabled_cb[type];
if (dcb == NULL)
continue;
dcb(TETHERING_ERROR_NONE, type, code, data);
}
+
+ TETHERING_UNLOCK;
DBG("-\n");
}
{
DBG("+\n");
+ TETHERING_LOCK;
_retm_if(user_data == NULL, "parameter(user_data) is NULL\n");
__tethering_h *th = (__tethering_h *)user_data;
tethering_wifi_security_type_e security_type;
char *buf = NULL;
+ if (!_tethering_check_handle(th)) {
+ DBG("Tethering handle is not valid now, ignore it.");
+ TETHERING_UNLOCK;
+ return;
+ }
+
scb = th->security_type_changed_cb;
- if (scb == NULL)
+ if (scb == NULL) {
+ TETHERING_UNLOCK;
return;
+ }
g_variant_get(parameters, "(s)", &buf);
data = th->security_type_user_data;
security_type = TETHERING_WIFI_SECURITY_TYPE_NONE;
else if (g_strcmp0(buf, TETHERING_WIFI_SECURITY_TYPE_WPA2_PSK_STR) == 0)
security_type = TETHERING_WIFI_SECURITY_TYPE_WPA2_PSK;
+ else if (g_strcmp0(buf, TETHERING_WIFI_SECURITY_TYPE_WPS_STR) == 0)
+ security_type = TETHERING_WIFI_SECURITY_TYPE_WPS;
+ else if (g_strcmp0(buf, TETHERING_WIFI_SECURITY_TYPE_SAE_STR) == 0)
+ security_type = TETHERING_WIFI_SECURITY_TYPE_SAE;
else {
SERR("Unknown type : %s\n", buf);
g_free(buf);
+ TETHERING_UNLOCK;
return;
}
g_free(buf);
scb(security_type, data);
+ TETHERING_UNLOCK;
return;
}
GVariant *parameters, gpointer user_data)
{
DBG("+\n");
+ TETHERING_LOCK;
_retm_if(user_data == NULL, "parameter(user_data) is NULL\n");
__tethering_h *th = (__tethering_h *)user_data;
bool visible = false;
char *buf = NULL;
+ if (!_tethering_check_handle(th)) {
+ DBG("Tethering handle is not valid now, ignore it.");
+ TETHERING_UNLOCK;
+ return;
+ }
+
scb = th->ssid_visibility_changed_cb;
if (scb == NULL) {
+ TETHERING_UNLOCK;
DBG("-\n");
return;
}
scb(visible, data);
g_free(buf);
+
+ TETHERING_UNLOCK;
DBG("-\n");
}
GVariant *parameters, gpointer user_data)
{
DBG("+\n");
+ TETHERING_LOCK;
_retm_if(user_data == NULL, "parameter(user_data) is NULL\n");
__tethering_h *th = (__tethering_h *)user_data;
tethering_wifi_passphrase_changed_cb pcb = NULL;
void *data = NULL;
+ if (!_tethering_check_handle(th)) {
+ DBG("Tethering handle is not valid now, ignore it.");
+ TETHERING_UNLOCK;
+ return;
+ }
+
pcb = th->passphrase_changed_cb;
- if (pcb == NULL)
+ if (pcb == NULL) {
+ TETHERING_UNLOCK;
return;
+ }
data = th->passphrase_user_data;
pcb(data);
+
+ TETHERING_UNLOCK;
DBG("-\n");
}
static void __wifi_enabled_cfm_cb(GObject *source_object, GAsyncResult *res,
gpointer user_data)
{
- DBG("+\n");
+ INFO("+\n");
+ TETHERING_LOCK;
_retm_if(user_data == NULL, "parameter(user_data) is NULL\n");
GError *g_error = NULL;
GVariant *g_var;
guint info;
+ tethering_type_e type = TETHERING_TYPE_WIFI;
tethering_error_e error;
__tethering_h *th = (__tethering_h *)user_data;
- tethering_enabled_cb ecb = th->enabled_cb[TETHERING_TYPE_WIFI];
- void *data = th->enabled_user_data[TETHERING_TYPE_WIFI];
+
+ tethering_enabled_cb ecb = th->enabled_cb[type];
+ void *data = th->enabled_user_data[type];
+
+ if (!_tethering_check_handle((tethering_h)user_data)) {
+ DBG("Tethering handle is not valid now, ignore it.");
+ TETHERING_UNLOCK;
+ return;
+ }
g_var = g_dbus_proxy_call_finish(th->client_bus_proxy, res, &g_error);
if (g_error) {
if (g_error->code == G_DBUS_ERROR_NO_REPLY &&
++retry < TETHERING_ERROR_RECOVERY_MAX) {
g_error_free(g_error);
- tethering_enable((tethering_h)th, TETHERING_TYPE_WIFI);
+ tethering_enable((tethering_h)th, type);
+ TETHERING_UNLOCK;
return;
} else if (g_error->code == G_DBUS_ERROR_ACCESS_DENIED)
error = TETHERING_ERROR_PERMISSION_DENIED;
}
retry = 0;
+ INFO("cfm event : wifi tethering enable info : %d\n", error);
+
sigs[E_SIGNAL_WIFI_TETHER_ON].sig_id = g_dbus_connection_signal_subscribe(th->client_bus,
NULL, TETHERING_SERVICE_INTERFACE, sigs[E_SIGNAL_WIFI_TETHER_ON].name,
TETHERING_SERVICE_OBJECT_PATH, NULL, G_DBUS_SIGNAL_FLAGS_NONE,
sigs[E_SIGNAL_WIFI_TETHER_ON].cb, (gpointer)th, NULL);
+ SINFO("Tethering enabled event ! error(%d)", error);
+
if (!ecb) {
- DBG("-\n");
+ TETHERING_UNLOCK;
+ INFO("-\n");
return;
}
- ecb(error, TETHERING_TYPE_WIFI, true, data);
+ ecb(error, type, true, data);
g_variant_unref(g_var);
- DBG("-\n");
+
+ TETHERING_UNLOCK;
+ INFO("-\n");
}
static void __bt_enabled_cfm_cb(GObject *source_object, GAsyncResult *res,
gpointer user_data)
{
DBG("+\n");
+ TETHERING_LOCK;
+
_retm_if(user_data == NULL, "parameter(user_data) is NULL\n");
GError *g_error = NULL;
GVariant *g_var;
tethering_enabled_cb ecb = th->enabled_cb[TETHERING_TYPE_BT];
void *data = th->enabled_user_data[TETHERING_TYPE_BT];
+ if (!_tethering_check_handle((tethering_h)user_data)) {
+ DBG("Tethering handle is not valid now, ignore it.");
+ TETHERING_UNLOCK;
+ return;
+ }
+
g_var = g_dbus_proxy_call_finish(th->client_bus_proxy, res, &g_error);
if (g_error) {
ERR("DBus error [%s]\n", g_error->message);
++retry < TETHERING_ERROR_RECOVERY_MAX) {
g_error_free(g_error);
tethering_enable((tethering_h)th, TETHERING_TYPE_BT);
+ TETHERING_UNLOCK;
DBG("-\n");
return;
}
sigs[E_SIGNAL_BT_TETHER_ON].cb, (gpointer)th, NULL);
if (!ecb) {
+ TETHERING_UNLOCK;
DBG("-\n");
return;
}
ecb(error, TETHERING_TYPE_BT, true, data);
+
+ TETHERING_UNLOCK;
DBG("-\n");
}
gpointer user_data)
{
DBG("+\n");
+ TETHERING_LOCK;
_retm_if(user_data == NULL, "parameter(user_data) is NULL\n");
__tethering_h *th = (__tethering_h *)user_data;
tethering_enabled_cb ecb = th->enabled_cb[TETHERING_TYPE_USB];
void *data = th->enabled_user_data[TETHERING_TYPE_USB];
+ if (!_tethering_check_handle((tethering_h)user_data)) {
+ DBG("Tethering handle is not valid now, ignore it.");
+ TETHERING_UNLOCK;
+ return;
+ }
+
g_var = g_dbus_proxy_call_finish(th->client_bus_proxy, res, &g_error);
if (g_error) {
ERR("DBus error [%s]\n", g_error->message);
++retry < TETHERING_ERROR_RECOVERY_MAX) {
g_error_free(g_error);
tethering_enable((tethering_h)th, TETHERING_TYPE_USB);
+ TETHERING_UNLOCK;
DBG("-\n");
return;
}
sigs[E_SIGNAL_USB_TETHER_ON].cb, (gpointer)th, NULL);
if (!ecb) {
+ TETHERING_UNLOCK;
DBG("-\n");
return;
}
ecb(error, TETHERING_TYPE_USB, true, data);
+
+ TETHERING_UNLOCK;
DBG("-\n");
}
-static void __wifi_ap_enabled_cfm_cb(GObject *source_object, GAsyncResult *res,
- gpointer user_data)
+static void __p2p_enabled_cfm_cb(GObject *source_object, GAsyncResult *res,
+ gpointer user_data)
{
DBG("+\n");
+ TETHERING_LOCK;
_retm_if(user_data == NULL, "parameter(user_data) is NULL\n");
__tethering_h *th = (__tethering_h *)user_data;
GVariant *g_var;
guint info;
tethering_error_e error;
- tethering_enabled_cb ecb = th->enabled_cb[TETHERING_TYPE_RESERVED];
- void *data = th->enabled_user_data[TETHERING_TYPE_RESERVED];
+ tethering_enabled_cb ecb = th->enabled_cb[TETHERING_TYPE_P2P];
+ void *data = th->enabled_user_data[TETHERING_TYPE_P2P];
+
+ if (!_tethering_check_handle((tethering_h)user_data)) {
+ DBG("Tethering handle is not valid now, ignore it.");
+ TETHERING_UNLOCK;
+ return;
+ }
g_var = g_dbus_proxy_call_finish(th->client_bus_proxy, res, &g_error);
if (g_error) {
if (g_error->code == G_DBUS_ERROR_NO_REPLY &&
++retry < TETHERING_ERROR_RECOVERY_MAX) {
g_error_free(g_error);
- tethering_enable((tethering_h)th, TETHERING_TYPE_RESERVED);
+ tethering_enable((tethering_h)th, TETHERING_TYPE_P2P);
+ TETHERING_UNLOCK;
DBG("-\n");
return;
}
}
retry = 0;
- sigs[E_SIGNAL_WIFI_AP_ON].sig_id = g_dbus_connection_signal_subscribe(th->client_bus,
- NULL, TETHERING_SERVICE_INTERFACE, sigs[E_SIGNAL_WIFI_AP_ON].name,
- TETHERING_SERVICE_OBJECT_PATH, NULL, G_DBUS_SIGNAL_FLAGS_NONE,
- sigs[E_SIGNAL_WIFI_AP_ON].cb, (gpointer)th, NULL);
-
if (!ecb) {
+ TETHERING_UNLOCK;
DBG("-\n");
return;
}
- ecb(error, TETHERING_TYPE_RESERVED, true, data);
+ ecb(error, TETHERING_TYPE_P2P, true, data);
+
+ TETHERING_UNLOCK;
DBG("-\n");
}
static void __disabled_cfm_cb(GObject *source_object, GAsyncResult *res,
gpointer user_data)
{
- DBG("+\n");
+ INFO("+\n");
+ TETHERING_LOCK;
_retm_if(user_data == NULL, "parameter(user_data) is NULL\n");
GError *g_error = NULL;
tethering_disabled_cb dcb = NULL;
void *data = NULL;
+ if (!_tethering_check_handle((tethering_h)user_data)) {
+ DBG("Tethering handle is not valid now, ignore it.");
+ TETHERING_UNLOCK;
+ return;
+ }
+
g_var = g_dbus_proxy_call_finish(th->client_bus_proxy, res, &g_error);
if (g_error) {
ERR("DBus error [%s]\n", g_error->message);
g_error_free(g_error);
+ TETHERING_UNLOCK;
return;
}
g_variant_get(g_var, "(uu)", &event_type, &info);
- DBG("cfm event : %d info : %d\n", event_type, info);
+ INFO("cfm event : %d info : %d\n", event_type, info);
g_variant_unref(g_var);
error = __get_error(info);
- DBG("cfm event : %d info : %d\n", event_type, error);
+ INFO("cfm event : %d info : %d\n", event_type, error);
switch (event_type) {
case MOBILE_AP_DISABLE_WIFI_TETHERING_CFM:
sigs[E_SIGNAL_WIFI_TETHER_OFF].sig_id = g_dbus_connection_signal_subscribe(th->client_bus,
dcb(error, type, code, data);
break;
- case MOBILE_AP_DISABLE_WIFI_AP_CFM:
- sigs[E_SIGNAL_WIFI_AP_OFF].sig_id = g_dbus_connection_signal_subscribe(th->client_bus,
- NULL, TETHERING_SERVICE_INTERFACE, sigs[E_SIGNAL_WIFI_AP_OFF].name,
- TETHERING_SERVICE_OBJECT_PATH, NULL, G_DBUS_SIGNAL_FLAGS_NONE,
- sigs[E_SIGNAL_WIFI_AP_OFF].cb, (gpointer)th, NULL);
-
- type = TETHERING_TYPE_RESERVED;
+ case MOBILE_AP_DISABLE_P2P_TETHERING_CFM:
+ type = TETHERING_TYPE_P2P;
dcb = th->disabled_cb[type];
data = th->disabled_user_data[type];
if (dcb)
ERR("Invalid event\n");
break;
}
- DBG("-\n");
+
+ TETHERING_UNLOCK;
+ INFO("-\n");
}
static void __get_data_usage_cb(GObject *source_object, GAsyncResult *res,
gpointer user_data)
{
DBG("+\n");
+ TETHERING_LOCK;
_retm_if(user_data == NULL, "parameter(user_data) is NULL\n");
tethering_error_e tethering_error = TETHERING_ERROR_NONE;
bool flag = false;
+ if (!_tethering_check_handle((tethering_h)user_data)) {
+ DBG("Tethering handle is not valid now, ignore it.");
+ TETHERING_UNLOCK;
+ return;
+ }
+
g_var = g_dbus_proxy_call_finish(th->client_bus_proxy, res, &g_error);
if (g_error) {
ERR("DBus fail [%s]\n", g_error->message);
}
if (th->data_usage_cb == NULL) {
ERR("There is no data_usage_cb\n");
+ TETHERING_UNLOCK;
return;
}
if (flag) {
th->data_usage_cb = NULL;
th->data_usage_user_data = NULL;
+ TETHERING_UNLOCK;
DBG("-\n");
}
gpointer user_data)
{
DBG("+\n");
+ TETHERING_LOCK;
_retm_if(user_data == NULL, "parameter(user_data) is NULL\n");
GError *g_error = NULL;
GVariant *g_var;
guint info;
__tethering_h *th = (__tethering_h *)user_data;
- tethering_error_e tethering_error;
+ tethering_error_e tethering_error = TETHERING_ERROR_NONE;
+
+ if (!_tethering_check_handle((tethering_h)user_data)) {
+ DBG("Tethering handle is not valid now, ignore it.");
+ TETHERING_UNLOCK;
+ return;
+ }
g_var = g_dbus_proxy_call_finish(th->client_bus_proxy, res, &g_error);
if (g_error) {
else
tethering_error = TETHERING_ERROR_OPERATION_FAILED;
g_error_free(g_error);
+ } else {
+ g_variant_get(g_var, "(u)", &info);
+ if (tethering_error == TETHERING_ERROR_NONE)
+ tethering_error = __get_error(info);
+ g_variant_unref(g_var);
}
+
if (th->settings_reloaded_cb == NULL) {
DBG("There is no settings_reloaded_cb\n-\n");
+ TETHERING_UNLOCK;
return;
}
- g_variant_get(g_var, "(u)", &info);
- tethering_error = __get_error(info);
- g_variant_unref(g_var);
th->settings_reloaded_cb(tethering_error,
th->settings_reloaded_user_data);
th->settings_reloaded_cb = NULL;
th->settings_reloaded_user_data = NULL;
- DBG("-\n");
-}
-static void __ap_settings_reloaded_cb(GObject *source_object, GAsyncResult *res,
- gpointer user_data)
-{
- DBG("+\n");
-
- _retm_if(user_data == NULL, "parameter(user_data) is NULL\n");
- GError *g_error = NULL;
- GVariant *g_var;
- guint info;
- __tethering_h *th = (__tethering_h *)user_data;
- tethering_error_e tethering_error;
-
- g_var = g_dbus_proxy_call_finish(th->client_bus_proxy, res, &g_error);
- if (g_error) {
- ERR("DBus fail [%s]\n", g_error->message);
- if (g_error->code == G_DBUS_ERROR_ACCESS_DENIED)
- tethering_error = TETHERING_ERROR_PERMISSION_DENIED;
- else
- tethering_error = TETHERING_ERROR_OPERATION_FAILED;
- g_error_free(g_error);
- }
- if (th->ap_settings_reloaded_cb == NULL) {
- DBG("There is no settings_reloaded_cb\n-\n");
- return;
- }
- g_variant_get(g_var, "(u)", &info);
- tethering_error = __get_error(info);
- g_variant_unref(g_var);
-
- th->ap_settings_reloaded_cb(tethering_error,
- th->ap_settings_reloaded_user_data);
-
- th->ap_settings_reloaded_cb = NULL;
- th->ap_settings_reloaded_user_data = NULL;
+ TETHERING_UNLOCK;
DBG("-\n");
}
case TETHERING_TYPE_USB:
g_strlcpy(buf, TETHERING_USB_IF, len);
break;
-
case TETHERING_TYPE_WIFI:
g_strlcpy(buf, TETHERING_WIFI_IF, len);
break;
-
case TETHERING_TYPE_BT:
g_strlcpy(buf, TETHERING_BT_IF, len);
break;
-
- case TETHERING_TYPE_RESERVED:
- g_strlcpy(buf, TETHERING_WIFI_IF, len);
+ case TETHERING_TYPE_P2P:
+ g_strlcpy(buf, TETHERING_P2P_IF, len);
break;
-
default:
ERR("Not supported type : %d\n", type);
return false;
case TETHERING_TYPE_USB:
g_strlcpy(buf, TETHERING_USB_GATEWAY, len);
break;
-
case TETHERING_TYPE_WIFI:
g_strlcpy(buf, TETHERING_WIFI_GATEWAY, len);
break;
-
case TETHERING_TYPE_BT:
g_strlcpy(buf, TETHERING_BT_GATEWAY, len);
break;
-
- case TETHERING_TYPE_RESERVED:
- g_strlcpy(buf, TETHERING_WIFI_GATEWAY, len);
+ case TETHERING_TYPE_P2P:
+ g_strlcpy(buf, TETHERING_P2P_GATEWAY, len);
break;
-
default:
ERR("Not supported type : %d\n", type);
return false;
return TETHERING_ERROR_INVALID_PARAMETER;
}
- char *ptr = NULL;
- char *ptr_tmp = NULL;
+#ifdef TIZEN_TV_EXT
+ if (__get_ssid_from_vconf(VCONFKEY_WIFI_SSID, ssid, size))
+ return TETHERING_ERROR_NONE;
+ else
+ ERR("vconf key get failed for ssid or invalid ssid is found");
+#endif /* TIZEN_TV_EXT */
- ptr = vconf_get_str(VCONFKEY_SETAPPL_DEVICE_NAME_STR);
- if (ptr == NULL) {
- ERR("vconf_get_str is failed\n");
- DBG("-\n");
- return TETHERING_ERROR_OPERATION_FAILED;
+ if (__get_ssid_from_vconf(VCONFKEY_SETAPPL_DEVICE_NAME_STR,
+ ssid, size) == false) {
+ ERR("vconf_get_str is failed and set default ssid");
+ g_strlcpy(ssid, TETHERING_DEFAULT_SSID, size);
}
- g_strlcpy(ssid, ptr, size);
- free(ptr);
+ return TETHERING_ERROR_NONE;
+}
- if (!g_utf8_validate(ssid, -1, (const char **)&ptr_tmp))
- *ptr_tmp = '\0';
+static bool __get_wifi_mode_type(tethering_wifi_mode_type_e type, char **buf)
+{
+ _retvm_if(buf == NULL, false, "parameter(buf) is NULL\n");
- return TETHERING_ERROR_NONE;
+ switch (type) {
+ case TETHERING_WIFI_MODE_TYPE_B:
+ *buf = g_strdup("b");
+ break;
+ case TETHERING_WIFI_MODE_TYPE_G:
+ *buf = g_strdup("g");
+ break;
+ case TETHERING_WIFI_MODE_TYPE_A:
+ *buf = g_strdup("a");
+ break;
+ case TETHERING_WIFI_MODE_TYPE_AD:
+ *buf = g_strdup("ad");
+ break;
+ default:
+ ERR("Not supported type : %d\n", type);
+ return false;
+ }
+ return true;
}
static int __prepare_wifi_settings(tethering_h tethering, _softap_settings_t *set)
{
- DBG("+\n");
+ INFO("+\n");
__tethering_h *th = (__tethering_h *)tethering;
tethering_error_e ret = TETHERING_ERROR_NONE;
+ char *ptr = NULL;
if (th == NULL || set == NULL) {
ERR("null parameter\n-\n");
if (ret != TETHERING_ERROR_NONE)
set->visibility = th->visibility;
+ set->mac_filter = th->mac_filter;
+ set->max_connected = th->wifi_max_connected;
+ set->channel = th->channel;
+ set->txpower = th->txpower;
+
+ __get_wifi_mode_type(th->mode_type, &ptr);
+ if (ptr == NULL) {
+ g_strlcpy(set->mode, "", sizeof(set->mode));
+ } else {
+ g_strlcpy(set->mode, ptr, sizeof(set->mode));
+ free(ptr);
+ }
+
if (set->sec_type == TETHERING_WIFI_SECURITY_TYPE_NONE) {
g_strlcpy(set->key, "", sizeof(set->key));
} else {
- char pass[TETHERING_WIFI_KEY_MAX_LEN + 1] = {0, };
+ GDBusProxy *proxy = th->client_bus_proxy;
+ GVariant *parameters;
+ GError *error = NULL;
+ char *passphrase = NULL;
unsigned int len = 0;
- ret = __get_passphrase(pass, sizeof(pass), &len);
- if (ret != TETHERING_ERROR_NONE) {
- ERR("getting passphrase failed\n");
- return TETHERING_ERROR_OPERATION_FAILED;
- }
- g_strlcpy(set->key, pass, sizeof(set->key));
- }
- DBG("-\n");
- return TETHERING_ERROR_NONE;
-}
-
-static int __prepare_wifi_ap_settings(tethering_h tethering, _softap_settings_t *set)
-{
- DBG("+\n");
+ parameters = g_dbus_proxy_call_sync(proxy, "get_wifi_tethering_passphrase",
+ NULL, G_DBUS_CALL_FLAGS_NONE, -1, NULL, &error);
- __tethering_h *th = (__tethering_h *)tethering;
+ if (error) {
+ ERR("g_dbus_proxy_call_sync failed because %s\n", error->message);
- if (th == NULL || set == NULL) {
- ERR("null parameter\n");
- return TETHERING_ERROR_INVALID_PARAMETER;
- }
+ if (error->code == G_DBUS_ERROR_ACCESS_DENIED)
+ ret = TETHERING_ERROR_PERMISSION_DENIED;
+ else
+ ret = TETHERING_ERROR_OPERATION_FAILED;
- g_strlcpy(set->ssid, th->ap_ssid, sizeof(set->ssid));
- set->sec_type = th->sec_type;
- set->visibility = th->visibility;
+ g_error_free(error);
+ return ret;
+ }
- if (set->sec_type == TETHERING_WIFI_SECURITY_TYPE_NONE)
- g_strlcpy(set->key, "", sizeof(set->key));
- else
- g_strlcpy(set->key, th->passphrase, sizeof(set->key));
+ if (parameters != NULL) {
+ g_variant_get(parameters, "(siu)", &passphrase, &len, &ret);
+ g_strlcpy(set->key, passphrase, sizeof(set->key) - 1);
+ g_free(passphrase);
+ g_variant_unref(parameters);
+ }
+ }
- DBG("-\n");
+ INFO("ssid: %s security: %d mode: %s channel: %d visibility: %s\n",
+ set->ssid, set->sec_type, set->mode, set->channel,
+ (set->visibility) ? "true" : "false");
+ INFO("-\n");
return TETHERING_ERROR_NONE;
}
-static bool __check_precondition(tethering_type_e type)
+static bool __check_precondition(__tethering_h *th, tethering_type_e type)
{
- int dnet_state = 0;
+ int dnet_status = 0;
int cellular_state = 0;
- int wifi_state = 0;
/* data network through cellular */
vconf_get_int(VCONFKEY_NETWORK_CELLULAR_STATE, &cellular_state);
if (cellular_state == VCONFKEY_NETWORK_CELLULAR_ON) {
- ERR("Data Network can be connected later");
+ INFO("Data Network can be connected later");
return TRUE;
}
- vconf_get_int(VCONFKEY_DNET_STATE, &dnet_state);
- if (dnet_state > VCONFKEY_DNET_OFF) {
- ERR("Data Network is connected");
+ /* data network status */
+ vconf_get_int(VCONFKEY_NETWORK_STATUS, &dnet_status);
+ if ((dnet_status == VCONFKEY_NETWORK_WIFI
+ && type != TETHERING_TYPE_WIFI)
+ || (th->wifi_sharing && dnet_status == VCONFKEY_NETWORK_WIFI
+ && type == TETHERING_TYPE_WIFI)
+ || dnet_status == VCONFKEY_NETWORK_ETHERNET)
return TRUE;
+
+ ERR("Network is not available!");
+ return FALSE;
+}
+
+#ifdef TIZEN_TV_EXT
+static void __set_vconf_values_for_tv(__tethering_h *tethering)
+{
+ int ret, channel, txpower;
+ __tethering_h *th = tethering;
+
+ if (th == NULL)
+ return;
+
+ ret = vconf_get_int(VCONFKEY_WIFI_CHANNEL, &channel);
+ if (ret < 0) {
+ ERR("vconf key get failed for channel !!");
+ channel = TETHERING_WIFI_CHANNEL;
}
- /* data network through wifi */
- if (type != TETHERING_TYPE_WIFI) {
- vconf_get_int(VCONFKEY_WIFI_STATE, &wifi_state);
- if (wifi_state > VCONFKEY_WIFI_UNCONNECTED) {
- ERR("Wi-Fi is connected!");
- return TRUE;
- }
+ ret = vconf_get_int(VCONFKEY_WIFI_TXPOWER, &txpower);
+ if (ret < 0) {
+ ERR("vconf key get failed for txpower !!");
+ txpower = TETHERING_WIFI_MAX_TXPOWER;
}
- ERR("Network is not available!");
- return FALSE;
+ th->channel = channel;
+ th->txpower = txpower;
}
+#endif /* TIZEN_TV_EXT */
/**
* @internal
CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
_retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
"parameter(tethering) is NULL\n");
- DBG("+\n");
+ INFO("+\n");
__tethering_h *th = NULL;
GError *error = NULL;
memset(th, 0x00, sizeof(__tethering_h));
th->sec_type = TETHERING_WIFI_SECURITY_TYPE_WPA2_PSK;
th->visibility = true;
+ th->mac_filter = false;
+ th->wifi_sharing = false;
+ th->channel = TETHERING_WIFI_CHANNEL;
+ th->mode_type = TETHERING_WIFI_MODE_TYPE_G;
+ th->wifi_max_connected = TETHERING_WIFI_MAX_STA;
+ th->txpower = TETHERING_WIFI_MAX_TXPOWER;
if (__generate_initial_passphrase(th->passphrase,
sizeof(th->passphrase)) == 0) {
return TETHERING_ERROR_OPERATION_FAILED;
}
- th->ap_ssid = g_strdup(ssid);
- if (th->ap_ssid == NULL) {
- ERR("g_strdup failed\n");
- free(th);
- return TETHERING_ERROR_OPERATION_FAILED;
- }
+#ifdef TIZEN_TV_EXT
+ __set_vconf_values_for_tv(th);
+#endif /* TIZEN_TV_EXT */
+ SINFO("ssid: %s, key: %s, channel: %d, mode: %d, txpower: %d, security: %d max_device: %d\n",
+ ssid, th->passphrase, th->channel, th->mode_type, th->txpower, th->sec_type,
+ th->wifi_max_connected);
#if !GLIB_CHECK_VERSION(2, 36, 0)
g_type_init();
g_error_free(error);
g_cancellable_cancel(cancellable);
g_object_unref(cancellable);
- g_free(th->ap_ssid);
free(th);
return TETHERING_ERROR_OPERATION_FAILED;
}
th->cancellable = cancellable;
- th->client_bus_proxy = g_dbus_proxy_new_sync(th->client_bus, G_DBUS_PROXY_FLAGS_NONE,
+ th->client_bus_proxy = g_dbus_proxy_new_sync(th->client_bus, G_DBUS_PROXY_FLAGS_DO_NOT_AUTO_START_AT_CONSTRUCTION,
NULL, TETHERING_SERVICE_NAME, TETHERING_SERVICE_OBJECT_PATH,
TETHERING_SERVICE_INTERFACE, th->cancellable, &error);
if (!th->client_bus_proxy) {
- ERR("Couldn't create the proxy object because of %s\n", error->message);
+ if (error)
+ ERR("Couldn't create the proxy object because of %s\n", error->message);
g_cancellable_cancel(th->cancellable);
g_object_unref(th->cancellable);
g_object_unref(th->client_bus);
- g_free(th->ap_ssid);
free(th);
return TETHERING_ERROR_OPERATION_FAILED;
}
__connect_signals((tethering_h)th);
*tethering = (tethering_h)th;
- DBG("Tethering Handle : 0x%X\n", th);
- DBG("-\n");
+ _tethering_add_handle(th);
+ INFO("Tethering Handle : %p\n", th);
+ INFO("-\n");
return TETHERING_ERROR_NONE;
}
*/
API int tethering_destroy(tethering_h tethering)
{
- DBG("+\n");
+ INFO("+\n");
CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
_retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
"parameter(tethering) is NULL\n");
__tethering_h *th = (__tethering_h *)tethering;
- DBG("Tethering Handle : 0x%X\n", th);
+ INFO("Tethering Handle : %p\n", th);
+
__disconnect_signals(tethering);
+ _tethering_remove_handle(th);
if (th->ssid)
free(th->ssid);
- if (th->ap_ssid)
- free(th->ap_ssid);
g_object_unref(th->cancellable);
g_object_unref(th->client_bus_proxy);
g_object_unref(th->client_bus);
memset(th, 0x00, sizeof(__tethering_h));
+
free(th);
- DBG("-\n");
+ INFO("-\n");
return TETHERING_ERROR_NONE;
}
*/
API int tethering_enable(tethering_h tethering, tethering_type_e type)
{
- DBG("+ type : %d\n", type);
+ INFO("+ type : %d\n", type);
CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
if (type == TETHERING_TYPE_USB) CHECK_FEATURE_SUPPORTED(TETHERING_USB_FEATURE);
else if (type == TETHERING_TYPE_WIFI) CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
GDBusProxy *proxy = th->client_bus_proxy;
GDBusConnection *connection = th->client_bus;
+#ifdef TIZEN_TV_EXT
+ g_dbus_proxy_set_default_timeout(proxy, DBUS_DEFAULT_REPLY_TIMEOUT);
+#else /* TIZEN_TV_EXT */
g_dbus_proxy_set_default_timeout(proxy, DBUS_TIMEOUT_INFINITE);
+#endif /* TIZEN_TV_EXT */
- if (type != TETHERING_TYPE_RESERVED
- && __check_precondition(type) == FALSE) {
- DBG("-\n");
+ if (__check_precondition(th, type) == FALSE) {
+ INFO("-\n");
+ g_dbus_proxy_set_default_timeout(proxy, DBUS_TIMEOUT_USE_DEFAULT);
return TETHERING_ERROR_OPERATION_FAILED;
}
g_dbus_connection_signal_unsubscribe(connection,
sigs[E_SIGNAL_USB_TETHER_ON].sig_id);
- g_dbus_proxy_call(proxy, "enable_usb_tethering", NULL,
+ g_dbus_proxy_call(proxy, "enable_usb_tethering",
+ g_variant_new("(i)", TETHERING_ADDRESS_FAMILY_IPV4),
G_DBUS_CALL_FLAGS_NONE, -1, th->cancellable,
(GAsyncReadyCallback) __usb_enabled_cfm_cb, (gpointer)tethering);
break;
case TETHERING_TYPE_WIFI: {
- _softap_settings_t set = {"", "", 0, false};
+ _softap_settings_t set = {"", "", "", 0, false};
ret = __prepare_wifi_settings(tethering, &set);
if (ret != TETHERING_ERROR_NONE) {
g_dbus_connection_signal_unsubscribe(connection,
sigs[E_SIGNAL_WIFI_TETHER_ON].sig_id);
+ SINFO("ssid %s, key %s, channel %d, mode %s, txpower %d, security %d max_device %d\n",
+ set.ssid, set.key, set.channel, set.mode, set.txpower, set.sec_type,
+ set.max_connected);
+
+ char key[TETHERING_WIFI_KEY_MAX_LEN + 1] = "wifi_tether";
+ if (th->wifi_sharing)
+ g_strlcpy(key, "wifi_sharing", TETHERING_WIFI_KEY_MAX_LEN + 1);
+
+ SINFO("enable_wifi_tethering key: %s", key);
g_dbus_proxy_call(proxy, "enable_wifi_tethering",
- g_variant_new("(ssii)", set.ssid, set.key, set.visibility, set.sec_type),
+ g_variant_new("(ssssiiiiiii)", key, set.ssid, set.key, set.mode,
+ set.channel, set.visibility, set.mac_filter, set.max_connected,
+ set.sec_type, set.txpower, TETHERING_ADDRESS_FAMILY_IPV4),
G_DBUS_CALL_FLAGS_NONE, -1, th->cancellable,
(GAsyncReadyCallback) __wifi_enabled_cfm_cb, (gpointer)tethering);
break;
g_dbus_connection_signal_unsubscribe(connection,
sigs[E_SIGNAL_BT_TETHER_ON].sig_id);
- g_dbus_proxy_call(proxy, "enable_bt_tethering", NULL,
+ g_dbus_proxy_call(proxy, "enable_bt_tethering",
+ g_variant_new("(i)", TETHERING_ADDRESS_FAMILY_IPV4),
G_DBUS_CALL_FLAGS_NONE, -1, th->cancellable,
(GAsyncReadyCallback) __bt_enabled_cfm_cb, (gpointer)tethering);
break;
- case TETHERING_TYPE_RESERVED: {
- _softap_settings_t set = {"", "", 0, false};
-
- ret = __prepare_wifi_ap_settings(tethering, &set);
+ case TETHERING_TYPE_P2P: {
+ _softap_settings_t p2p_set = {"", "", "", 0, false};
+ ret = __prepare_wifi_settings(tethering, &p2p_set);
if (ret != TETHERING_ERROR_NONE) {
- ERR("softap settings initialization failed\n");
+ ERR("p2p settings initialization failed\n");
+ g_dbus_proxy_set_default_timeout(proxy, DBUS_TIMEOUT_USE_DEFAULT);
+ DBG("-\n");
return TETHERING_ERROR_OPERATION_FAILED;
}
- g_dbus_connection_signal_unsubscribe(connection,
- sigs[E_SIGNAL_WIFI_AP_ON].sig_id);
-
- g_dbus_proxy_call(proxy, "enable_wifi_ap",
- g_variant_new("(ssii)", set.ssid, set.key, set.visibility, set.sec_type),
- G_DBUS_CALL_FLAGS_NONE, -1, th->cancellable, (GAsyncReadyCallback) __wifi_ap_enabled_cfm_cb, (gpointer)tethering);
+ g_dbus_proxy_call(proxy, "enable_p2p_tethering",
+ g_variant_new("(ssi)", p2p_set.ssid, p2p_set.key, p2p_set.channel),
+ G_DBUS_CALL_FLAGS_NONE, -1, th->cancellable,
+ (GAsyncReadyCallback) __p2p_enabled_cfm_cb, (gpointer)tethering);
break;
}
+
case TETHERING_TYPE_ALL: {
- _softap_settings_t set = {"", "", 0, false};
+ _softap_settings_t set = {"", "", "", 0, false};
ret = __prepare_wifi_settings(tethering, &set);
if (ret != TETHERING_ERROR_NONE) {
ERR("softap settings initialization failed\n");
+ g_dbus_proxy_set_default_timeout(proxy, DBUS_TIMEOUT_USE_DEFAULT);
return TETHERING_ERROR_OPERATION_FAILED;
}
g_dbus_connection_signal_unsubscribe(connection,
sigs[E_SIGNAL_USB_TETHER_ON].sig_id);
- g_dbus_proxy_call(proxy, "enable_usb_tethering", NULL,
+ g_dbus_proxy_call(proxy, "enable_usb_tethering",
+ g_variant_new("(i)", TETHERING_ADDRESS_FAMILY_IPV4),
G_DBUS_CALL_FLAGS_NONE, -1, th->cancellable,
(GAsyncReadyCallback) __usb_enabled_cfm_cb, (gpointer)tethering);
sigs[E_SIGNAL_WIFI_TETHER_ON].sig_id);
g_dbus_proxy_call(proxy, "enable_wifi_tethering",
- g_variant_new("(ssii)", set.ssid, set.key, set.visibility, set.sec_type),
+ g_variant_new("(ssssiiiiiii)", "wifi_tether", set.ssid, set.key, set.mode,
+ set.channel, set.visibility, set.mac_filter, set.max_connected,
+ set.sec_type, set.txpower, TETHERING_ADDRESS_FAMILY_IPV4),
G_DBUS_CALL_FLAGS_NONE, -1, th->cancellable,
(GAsyncReadyCallback) __wifi_enabled_cfm_cb, (gpointer)tethering);
g_dbus_connection_signal_unsubscribe(connection,
sigs[E_SIGNAL_BT_TETHER_ON].sig_id);
- g_dbus_proxy_call(proxy, "enable_usb_tethering", NULL,
+ g_dbus_proxy_call(proxy, "enable_bt_tethering",
+ g_variant_new("(i)", TETHERING_ADDRESS_FAMILY_IPV4),
G_DBUS_CALL_FLAGS_NONE, -1, th->cancellable,
(GAsyncReadyCallback) __bt_enabled_cfm_cb, (gpointer)tethering);
break;
}
g_dbus_proxy_set_default_timeout(proxy, DBUS_TIMEOUT_USE_DEFAULT);
+ INFO("-\n");
+ return TETHERING_ERROR_NONE;
+}
+
+API int tethering_ipv6_enable(tethering_h tethering, tethering_type_e type)
+{
+ DBG("+ type : %d\n", type);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ if (type == TETHERING_TYPE_USB) CHECK_FEATURE_SUPPORTED(TETHERING_USB_FEATURE);
+ else if (type == TETHERING_TYPE_WIFI) CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+ else if (type == TETHERING_TYPE_BT) CHECK_FEATURE_SUPPORTED(TETHERING_BT_FEATURE);
+
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
+
+ __tethering_h *th = (__tethering_h *)tethering;
+ GDBusProxy *proxy = th->client_bus_proxy;
+ GDBusConnection *connection = th->client_bus;
+ int ret = 0;
+
+ g_dbus_proxy_set_default_timeout(proxy, DBUS_TIMEOUT_INFINITE);
+
+ if (__check_precondition(th, type) == FALSE) {
+ DBG("-\n");
+ g_dbus_proxy_set_default_timeout(proxy, DBUS_TIMEOUT_USE_DEFAULT);
+ return TETHERING_ERROR_OPERATION_FAILED;
+ }
+
+ switch (type) {
+ case TETHERING_TYPE_USB: {
+ g_dbus_connection_signal_unsubscribe(connection,
+ sigs[E_SIGNAL_USB_TETHER_ON].sig_id);
+
+ g_dbus_proxy_call(proxy, "enable_usb_tethering",
+ g_variant_new("(i)", TETHERING_ADDRESS_FAMILY_IPV6),
+ G_DBUS_CALL_FLAGS_NONE, -1, th->cancellable,
+ (GAsyncReadyCallback) __usb_enabled_cfm_cb, (gpointer)tethering);
+ break;
+ }
+
+ case TETHERING_TYPE_WIFI: {
+ _softap_settings_t set = {"", "", "", 0, false, false, 0, 0};
+
+ ret = __prepare_wifi_settings(tethering, &set);
+ if (ret != TETHERING_ERROR_NONE) {
+ ERR("softap settings initialization failed\n");
+ DBG("-\n");
+ g_dbus_proxy_set_default_timeout(proxy, DBUS_TIMEOUT_USE_DEFAULT);
+ return TETHERING_ERROR_OPERATION_FAILED;
+ }
+ g_dbus_connection_signal_unsubscribe(connection,
+ sigs[E_SIGNAL_WIFI_TETHER_ON].sig_id);
+
+ SINFO("ssid %s, key %s, channel %d, mode %s, txpower %d, security %d max_device %d\n",
+ set.ssid, set.key, set.channel, set.mode, set.txpower, set.sec_type,
+ set.max_connected);
+
+ char key[TETHERING_WIFI_KEY_MAX_LEN + 1] = "wifi_tether";
+ if (th->wifi_sharing)
+ g_strlcpy(key, "wifi_sharing", TETHERING_WIFI_KEY_MAX_LEN + 1);
+
+ SINFO("enable_wifi_tethering key: %s", key);
+ g_dbus_proxy_call(proxy, "enable_wifi_tethering",
+ g_variant_new("(ssssiiiiiii)", key, set.ssid, set.key, set.mode,
+ set.channel, set.visibility, set.mac_filter, set.max_connected,
+ set.sec_type, set.txpower, TETHERING_ADDRESS_FAMILY_IPV6),
+ G_DBUS_CALL_FLAGS_NONE, -1, th->cancellable,
+ (GAsyncReadyCallback) __wifi_enabled_cfm_cb, (gpointer)tethering);
+ break;
+ }
+
+ case TETHERING_TYPE_BT: {
+ g_dbus_connection_signal_unsubscribe(connection,
+ sigs[E_SIGNAL_BT_TETHER_ON].sig_id);
+
+ g_dbus_proxy_call(proxy, "enable_bt_tethering",
+ g_variant_new("(i)", TETHERING_ADDRESS_FAMILY_IPV6),
+ G_DBUS_CALL_FLAGS_NONE, -1, th->cancellable,
+ (GAsyncReadyCallback) __bt_enabled_cfm_cb, (gpointer)tethering);
+
+ break;
+ }
+
+ default: {
+ ERR("Unknown type : %d\n", type);
+
+ g_dbus_proxy_set_default_timeout(proxy, DBUS_TIMEOUT_USE_DEFAULT);
+
+ DBG("-\n");
+ return TETHERING_ERROR_INVALID_PARAMETER;
+ }
+ }
+
+ g_dbus_proxy_set_default_timeout(proxy, DBUS_TIMEOUT_USE_DEFAULT);
DBG("-\n");
return TETHERING_ERROR_NONE;
}
+API int tethering_ipv6_disable(tethering_h tethering, tethering_type_e type)
+{
+ DBG("+ type : %d\n", type);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ if (type == TETHERING_TYPE_USB) CHECK_FEATURE_SUPPORTED(TETHERING_USB_FEATURE);
+ else if (type == TETHERING_TYPE_WIFI) CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+ else if (type == TETHERING_TYPE_BT) CHECK_FEATURE_SUPPORTED(TETHERING_BT_FEATURE);
+
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
+
+ __tethering_h *th = (__tethering_h *)tethering;
+ GDBusProxy *proxy = th->client_bus_proxy;
+ GDBusConnection *connection = th->client_bus;
+
+ switch (type) {
+ case TETHERING_TYPE_USB:
+ g_dbus_connection_signal_unsubscribe(connection,
+ sigs[E_SIGNAL_USB_TETHER_OFF].sig_id);
+
+ g_dbus_proxy_call(proxy, "disable_usb_tethering",
+ g_variant_new("(i)", TETHERING_ADDRESS_FAMILY_IPV6),
+ G_DBUS_CALL_FLAGS_NONE, -1, th->cancellable,
+ (GAsyncReadyCallback) __disabled_cfm_cb, (gpointer)tethering);
+ break;
+
+ case TETHERING_TYPE_WIFI:
+ DBG("Disable wifi tethering..");
+ g_dbus_connection_signal_unsubscribe(connection,
+ sigs[E_SIGNAL_WIFI_TETHER_OFF].sig_id);
+
+ g_dbus_proxy_call(proxy, "disable_wifi_tethering",
+ g_variant_new("(i)", TETHERING_ADDRESS_FAMILY_IPV6),
+ G_DBUS_CALL_FLAGS_NONE, -1, th->cancellable,
+ (GAsyncReadyCallback) __disabled_cfm_cb, (gpointer)tethering);
+ break;
+
+ case TETHERING_TYPE_BT:
+ g_dbus_connection_signal_unsubscribe(connection,
+ sigs[E_SIGNAL_BT_TETHER_OFF].sig_id);
+
+ g_dbus_proxy_call(proxy, "disable_bt_tethering",
+ g_variant_new("(i)", TETHERING_ADDRESS_FAMILY_IPV6),
+ G_DBUS_CALL_FLAGS_NONE, -1, th->cancellable,
+ (GAsyncReadyCallback) __disabled_cfm_cb, (gpointer)tethering);
+ break;
+
+ default:
+ ERR("Not supported tethering type [%d]\n", type);
+ DBG("-\n");
+ return TETHERING_ERROR_INVALID_PARAMETER;
+ }
+ DBG("-\n");
+ return TETHERING_ERROR_NONE;
+}
/**
* @internal
* @brief Disables the tethering, asynchronously.
*/
API int tethering_disable(tethering_h tethering, tethering_type_e type)
{
- DBG("+ type : %d\n", type);
- if (type == TETHERING_TYPE_USB) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_USB_FEATURE);
- else if (type == TETHERING_TYPE_WIFI) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
- else if (type == TETHERING_TYPE_BT) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_BT_FEATURE);
+ INFO("+ type : %d\n", type);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ if (type == TETHERING_TYPE_USB) CHECK_FEATURE_SUPPORTED(TETHERING_USB_FEATURE);
+ else if (type == TETHERING_TYPE_WIFI) CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+ else if (type == TETHERING_TYPE_BT) CHECK_FEATURE_SUPPORTED(TETHERING_BT_FEATURE);
_retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
"parameter(tethering) is NULL\n");
sigs[E_SIGNAL_USB_TETHER_OFF].sig_id);
g_dbus_proxy_call(proxy, "disable_usb_tethering",
- NULL, G_DBUS_CALL_FLAGS_NONE, -1, th->cancellable,
+ g_variant_new("(i)", TETHERING_ADDRESS_FAMILY_IPV4),
+ G_DBUS_CALL_FLAGS_NONE, -1, th->cancellable,
(GAsyncReadyCallback) __disabled_cfm_cb, (gpointer)tethering);
break;
case TETHERING_TYPE_WIFI:
-
g_dbus_connection_signal_unsubscribe(connection,
sigs[E_SIGNAL_WIFI_TETHER_OFF].sig_id);
+ SINFO("Disable Wi-Fi Tethering !");
+
g_dbus_proxy_call(proxy, "disable_wifi_tethering",
- NULL, G_DBUS_CALL_FLAGS_NONE, -1, th->cancellable,
+ g_variant_new("(ii)", TETHERING_ADDRESS_FAMILY_IPV4, th->mode_type),
+ G_DBUS_CALL_FLAGS_NONE, -1, th->cancellable,
(GAsyncReadyCallback) __disabled_cfm_cb, (gpointer)tethering);
break;
sigs[E_SIGNAL_BT_TETHER_OFF].sig_id);
g_dbus_proxy_call(proxy, "disable_bt_tethering",
- NULL, G_DBUS_CALL_FLAGS_NONE, -1, th->cancellable,
+ g_variant_new("(i)", TETHERING_ADDRESS_FAMILY_IPV4),
+ G_DBUS_CALL_FLAGS_NONE, -1, th->cancellable,
(GAsyncReadyCallback) __disabled_cfm_cb, (gpointer)tethering);
break;
- case TETHERING_TYPE_RESERVED:
- g_dbus_connection_signal_unsubscribe(connection,
- sigs[E_SIGNAL_WIFI_AP_OFF].sig_id);
-
- g_dbus_proxy_call(proxy, "disable_wifi_ap",
+ case TETHERING_TYPE_P2P:
+ g_dbus_proxy_call(proxy, "disable_p2p_tethering",
NULL, G_DBUS_CALL_FLAGS_NONE, -1, th->cancellable,
(GAsyncReadyCallback) __disabled_cfm_cb, (gpointer)tethering);
break;
sigs[E_SIGNAL_USB_TETHER_OFF].sig_id);
g_dbus_proxy_call(proxy, "disable_usb_tethering",
- NULL, G_DBUS_CALL_FLAGS_NONE, -1, th->cancellable,
+ g_variant_new("(i)", TETHERING_ADDRESS_FAMILY_IPV4),
+ G_DBUS_CALL_FLAGS_NONE, -1, th->cancellable,
(GAsyncReadyCallback) __disabled_cfm_cb, (gpointer)tethering);
g_dbus_connection_signal_unsubscribe(connection,
sigs[E_SIGNAL_WIFI_TETHER_OFF].sig_id);
g_dbus_proxy_call(proxy, "disable_wifi_tethering",
- NULL, G_DBUS_CALL_FLAGS_NONE, -1, th->cancellable,
+ g_variant_new("(i)", TETHERING_ADDRESS_FAMILY_IPV4),
+ G_DBUS_CALL_FLAGS_NONE, -1, th->cancellable,
(GAsyncReadyCallback) __disabled_cfm_cb, (gpointer)tethering);
g_dbus_connection_signal_unsubscribe(connection,
sigs[E_SIGNAL_BT_TETHER_OFF].sig_id);
g_dbus_proxy_call(proxy, "disable_bt_tethering",
- NULL, G_DBUS_CALL_FLAGS_NONE, -1, th->cancellable,
+ g_variant_new("(i)", TETHERING_ADDRESS_FAMILY_IPV4),
+ G_DBUS_CALL_FLAGS_NONE, -1, th->cancellable,
(GAsyncReadyCallback) __disabled_cfm_cb, (gpointer)tethering);
break;
DBG("-\n");
return TETHERING_ERROR_INVALID_PARAMETER;
}
- DBG("-\n");
+ INFO("-\n");
return TETHERING_ERROR_NONE;
}
*/
API bool tethering_is_enabled(tethering_h tethering, tethering_type_e type)
{
+ INFO("+ type : %d\n", type);
int is_on = 0;
int vconf_type = VCONFKEY_MOBILE_HOTSPOT_MODE_NONE;
vconf_type = VCONFKEY_MOBILE_HOTSPOT_MODE_BT;
break;
- case TETHERING_TYPE_RESERVED:
- vconf_type = VCONFKEY_MOBILE_HOTSPOT_MODE_WIFI_AP;
+ case TETHERING_TYPE_P2P:
+ vconf_type = VCONFKEY_MOBILE_HOTSPOT_MODE_P2P;
break;
default:
ERR("Not supported type : %d\n", type);
break;
}
+ INFO("- enabled: %s\n", (is_on & vconf_type) ? "true" : "false");
return is_on & vconf_type ? true : false;
}
*/
API int tethering_get_mac_address(tethering_h tethering, tethering_type_e type, char **mac_address)
{
- if (type == TETHERING_TYPE_USB) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_USB_FEATURE);
- else if (type == TETHERING_TYPE_WIFI) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
- else if (type == TETHERING_TYPE_BT) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_BT_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ if (type == TETHERING_TYPE_USB) CHECK_FEATURE_SUPPORTED(TETHERING_USB_FEATURE);
+ else if (type == TETHERING_TYPE_WIFI) CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+ else if (type == TETHERING_TYPE_BT) CHECK_FEATURE_SUPPORTED(TETHERING_BT_FEATURE);
_retvm_if(tethering_is_enabled(tethering, type) == false,
TETHERING_ERROR_NOT_ENABLED,
*/
API int tethering_get_network_interface_name(tethering_h tethering, tethering_type_e type, char **interface_name)
{
- if (type == TETHERING_TYPE_USB) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_USB_FEATURE);
- else if (type == TETHERING_TYPE_WIFI) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
- else if (type == TETHERING_TYPE_BT) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_BT_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ if (type == TETHERING_TYPE_USB) CHECK_FEATURE_SUPPORTED(TETHERING_USB_FEATURE);
+ else if (type == TETHERING_TYPE_WIFI) CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+ else if (type == TETHERING_TYPE_BT) CHECK_FEATURE_SUPPORTED(TETHERING_BT_FEATURE);
_retvm_if(tethering_is_enabled(tethering, type) == false,
TETHERING_ERROR_NOT_ENABLED,
*/
API int tethering_get_ip_address(tethering_h tethering, tethering_type_e type, tethering_address_family_e address_family, char **ip_address)
{
-
- if (type == TETHERING_TYPE_USB) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_USB_FEATURE);
- else if (type == TETHERING_TYPE_WIFI) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
- else if (type == TETHERING_TYPE_BT) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_BT_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ if (type == TETHERING_TYPE_USB) CHECK_FEATURE_SUPPORTED(TETHERING_USB_FEATURE);
+ else if (type == TETHERING_TYPE_WIFI) CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+ else if (type == TETHERING_TYPE_BT) CHECK_FEATURE_SUPPORTED(TETHERING_BT_FEATURE);
_retvm_if(tethering_is_enabled(tethering, type) == false,
TETHERING_ERROR_NOT_ENABLED,
*/
API int tethering_get_gateway_address(tethering_h tethering, tethering_type_e type, tethering_address_family_e address_family, char **gateway_address)
{
-
- if (type == TETHERING_TYPE_USB) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_USB_FEATURE);
- else if (type == TETHERING_TYPE_WIFI) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
- else if (type == TETHERING_TYPE_BT) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_BT_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ if (type == TETHERING_TYPE_USB) CHECK_FEATURE_SUPPORTED(TETHERING_USB_FEATURE);
+ else if (type == TETHERING_TYPE_WIFI) CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+ else if (type == TETHERING_TYPE_BT) CHECK_FEATURE_SUPPORTED(TETHERING_BT_FEATURE);
_retvm_if(tethering_is_enabled(tethering, type) == false,
TETHERING_ERROR_NOT_ENABLED,
*/
API int tethering_get_subnet_mask(tethering_h tethering, tethering_type_e type, tethering_address_family_e address_family, char **subnet_mask)
{
- if (type == TETHERING_TYPE_USB) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_USB_FEATURE);
- else if (type == TETHERING_TYPE_WIFI) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
- else if (type == TETHERING_TYPE_BT) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_BT_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ if (type == TETHERING_TYPE_USB) CHECK_FEATURE_SUPPORTED(TETHERING_USB_FEATURE);
+ else if (type == TETHERING_TYPE_WIFI) CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+ else if (type == TETHERING_TYPE_BT) CHECK_FEATURE_SUPPORTED(TETHERING_BT_FEATURE);
_retvm_if(tethering_is_enabled(tethering, type) == false,
TETHERING_ERROR_NOT_ENABLED,
* @see tethering_is_enabled()
* @see tethering_enable()
*/
-API int tethering_foreach_connected_clients(tethering_h tethering, tethering_type_e type, tethering_connected_client_cb callback, void *user_data)
+
+API int tethering_is_dualband_supported(tethering_h tethering, tethering_type_e type, bool *supported)
{
- DBG("+\n");
- if (type == TETHERING_TYPE_USB) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_USB_FEATURE);
- else if (type == TETHERING_TYPE_WIFI) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
- else if (type == TETHERING_TYPE_BT) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_BT_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
+
+ __tethering_h *th = (__tethering_h *)tethering;
+ gchar *if_name = NULL;
+ gboolean Is2GBandSupported = FALSE;
+ gboolean Is5GBandSupported = FALSE;
+ GError *error = NULL;
+ GVariant *result = NULL;
+ GVariantIter *outer_iter = NULL;
+ GVariantIter *inner_iter = NULL;
+ GVariant *station = NULL;
+ GVariant *value = NULL;
+ gchar *key = NULL;
+ int count = 0;
+
+ DBG("+");
+ __reset_dualband_support();
+ result = g_dbus_proxy_call_sync(th->client_bus_proxy, "get_wifi_interfaces",
+ NULL, G_DBUS_CALL_FLAGS_NONE, -1, NULL, &error);
+
+ if (error) {
+ ERR("g_dbus_proxy_call_sync is failed and error is %s\n", error->message);
+ g_error_free(error);
+ return TETHERING_ERROR_OPERATION_FAILED;
+ }
+ g_variant_get(result, "(a(a{sv}))", &outer_iter);
+ while (g_variant_iter_loop(outer_iter, "(@a{sv})", &station)) {
+ g_variant_get(station, "a{sv}", &inner_iter);
+ while (g_variant_iter_loop(inner_iter, "{sv}", &key, &value)) {
+ if (g_strcmp0(key, "IfName") == 0) {
+ g_variant_get(value, "s", &if_name);
+ SDBG("Interface Name is %s\n", if_name);
+ } else if (g_strcmp0(key, "Is2GBandSupported") == 0) {
+ Is2GBandSupported = g_variant_get_boolean(value);
+ SDBG("Is2GBandSupported is %d\n", Is2GBandSupported);
+ if (Is2GBandSupported)
+ __set_dualband_support(DUAL_BAND_2G);
+ } else if (g_strcmp0(key, "Is5GBandSupported") == 0) {
+ Is5GBandSupported = g_variant_get_boolean(value);
+ SDBG("Is5GBandSupported is %d\n", Is5GBandSupported);
+ if (Is5GBandSupported)
+ __set_dualband_support(DUAL_BAND_5G);
+ } else {
+ ERR("Key %s not required\n", key);
+ }
+ }
+ count++;
+
+ g_variant_iter_free(inner_iter);
+ }
+ if (count >= 2)
+ __set_dualband_support(DUAL_BAND_MIN_INTERFACE);
+ *supported = __is_dualband_support();
+ DBG("count:%d is dualband suppport: %d", count, *supported);
+ g_variant_iter_free(outer_iter);
+ g_variant_unref(result);
+ DBG("-\n");
+ return TETHERING_ERROR_NONE;
+}
+API int tethering_foreach_connected_clients(tethering_h tethering, tethering_type_e type, tethering_connected_client_cb callback, void *user_data)
+{
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ if (type == TETHERING_TYPE_USB) CHECK_FEATURE_SUPPORTED(TETHERING_USB_FEATURE);
+ else if (type == TETHERING_TYPE_WIFI) CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+ else if (type == TETHERING_TYPE_BT) CHECK_FEATURE_SUPPORTED(TETHERING_BT_FEATURE);
_retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
"parameter(tethering) is NULL\n");
"tethering is not enabled\n");
mobile_ap_type_e interface;
+ tethering_band_e band;
__tethering_h *th = (__tethering_h *)tethering;
__tethering_client_h client = {0, };
gchar *ip = NULL;
result = g_dbus_proxy_call_sync(th->client_bus_proxy, "get_station_info",
NULL, G_DBUS_CALL_FLAGS_NONE,
-1, th->cancellable, &error);
- if (error)
+
+ if (error) {
ERR("g_dbus_proxy_call_sync is failed and error is %s\n", error->message);
+ g_error_free(error);
+ return TETHERING_ERROR_OPERATION_FAILED;
+ }
+
g_variant_get(result, "(a(a{sv}))", &outer_iter);
while (g_variant_iter_loop(outer_iter, "(@a{sv})", &station)) {
g_variant_get(station, "a{sv}", &inner_iter);
client.interface = TETHERING_TYPE_WIFI;
else if (interface == MOBILE_AP_TYPE_BT)
client.interface = TETHERING_TYPE_BT;
- else if (interface == MOBILE_AP_TYPE_WIFI_AP)
- client.interface = TETHERING_TYPE_RESERVED;
+ else if (interface == MOBILE_AP_TYPE_P2P)
+ client.interface = TETHERING_TYPE_P2P;
else {
ERR("Invalid interface\n");
g_free(key);
break;
}
DBG("interface is %d\n", client.interface);
- if (client.interface != type && (TETHERING_TYPE_ALL != type &&
- client.interface != TETHERING_TYPE_RESERVED)) {
+ if (client.interface != type && (TETHERING_TYPE_ALL != type)) {
g_free(key);
g_variant_unref(value);
break;
timestamp = g_variant_get_int32(value);
DBG("timestamp is %d\n", timestamp);
client.tm = (time_t)timestamp;
+ } else if (g_strcmp0(key, "Band") == 0) {
+ band = g_variant_get_int32(value);
+ client.band = (!band) ? TETHERING_WIFI_BAND_2G : TETHERING_WIFI_BAND_5G;
+ SDBG("band type %d\n", band);
} else {
ERR("Key %s not required\n", key);
}
g_free(hostname);
g_free(ip);
g_free(mac);
+
+ hostname = NULL;
+ ip = NULL;
+ mac = NULL;
+
g_variant_iter_free(inner_iter);
+ if ((th->mode_type == 0 || th->mode_type == 1) && client.band != TETHERING_WIFI_BAND_2G) //if band is not for 2g continue
+ continue;
+ if ((th->mode_type == 2 || th->mode_type == 3) && client.band != TETHERING_WIFI_BAND_5G) //if band is not for 5g continue
+ continue;
+ SDBG("mode_type: %d and client.band: %d ", th->mode_type, client.band);
if (callback((tethering_client_h)&client, user_data) == false) {
DBG("iteration is stopped\n");
g_free(client.hostname);
+ client.hostname = NULL;
g_variant_iter_free(outer_iter);
- g_variant_unref(station);
g_variant_unref(result);
DBG("-\n");
return TETHERING_ERROR_OPERATION_FAILED;
}
g_free(client.hostname);
+ client.hostname = NULL;
}
g_variant_iter_free(outer_iter);
- g_variant_unref(station);
g_variant_unref(result);
DBG("-\n");
return TETHERING_ERROR_NONE;
*/
API int tethering_set_enabled_cb(tethering_h tethering, tethering_type_e type, tethering_enabled_cb callback, void *user_data)
{
- if (type == TETHERING_TYPE_USB) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_USB_FEATURE);
- else if (type == TETHERING_TYPE_WIFI) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
- else if (type == TETHERING_TYPE_BT) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_BT_FEATURE);
+ INFO("+ type: %d\n", type);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ if (type == TETHERING_TYPE_USB) CHECK_FEATURE_SUPPORTED(TETHERING_USB_FEATURE);
+ else if (type == TETHERING_TYPE_WIFI) CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+ else if (type == TETHERING_TYPE_BT) CHECK_FEATURE_SUPPORTED(TETHERING_BT_FEATURE);
_retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
"parameter(tethering) is NULL\n");
}
/* TETHERING_TYPE_ALL */
- for (ti = TETHERING_TYPE_USB; ti <= TETHERING_TYPE_BT; ti++) {
+ for (ti = TETHERING_TYPE_USB; ti < TETHERING_TYPE_MAX; ti++) {
th->enabled_cb[ti] = callback;
th->enabled_user_data[ti] = user_data;
}
+ INFO("-\n");
return TETHERING_ERROR_NONE;
}
*/
API int tethering_unset_enabled_cb(tethering_h tethering, tethering_type_e type)
{
- if (type == TETHERING_TYPE_USB) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_USB_FEATURE);
- else if (type == TETHERING_TYPE_WIFI) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
- else if (type == TETHERING_TYPE_BT) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_BT_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ if (type == TETHERING_TYPE_USB) CHECK_FEATURE_SUPPORTED(TETHERING_USB_FEATURE);
+ else if (type == TETHERING_TYPE_WIFI) CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+ else if (type == TETHERING_TYPE_BT) CHECK_FEATURE_SUPPORTED(TETHERING_BT_FEATURE);
_retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
"parameter(tethering) is NULL\n");
}
/* TETHERING_TYPE_ALL */
- for (ti = TETHERING_TYPE_USB; ti <= TETHERING_TYPE_BT; ti++) {
+ for (ti = TETHERING_TYPE_USB; ti < TETHERING_TYPE_MAX; ti++) {
th->enabled_cb[ti] = NULL;
th->enabled_user_data[ti] = NULL;
}
*/
API int tethering_set_disabled_cb(tethering_h tethering, tethering_type_e type, tethering_disabled_cb callback, void *user_data)
{
- if (type == TETHERING_TYPE_USB) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_USB_FEATURE);
- else if (type == TETHERING_TYPE_WIFI) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
- else if (type == TETHERING_TYPE_BT) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_BT_FEATURE);
+ INFO("+ type: %d\n", type);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ if (type == TETHERING_TYPE_USB) CHECK_FEATURE_SUPPORTED(TETHERING_USB_FEATURE);
+ else if (type == TETHERING_TYPE_WIFI) CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+ else if (type == TETHERING_TYPE_BT) CHECK_FEATURE_SUPPORTED(TETHERING_BT_FEATURE);
_retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
"parameter(tethering) is NULL\n");
}
/* TETHERING_TYPE_ALL */
- for (ti = TETHERING_TYPE_USB; ti <= TETHERING_TYPE_BT; ti++) {
+ for (ti = TETHERING_TYPE_USB; ti < TETHERING_TYPE_MAX; ti++) {
th->disabled_cb[ti] = callback;
th->disabled_user_data[ti] = user_data;
}
-
+ INFO("-\n");
return TETHERING_ERROR_NONE;
}
*/
API int tethering_unset_disabled_cb(tethering_h tethering, tethering_type_e type)
{
- if (type == TETHERING_TYPE_USB) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_USB_FEATURE);
- else if (type == TETHERING_TYPE_WIFI) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
- else if (type == TETHERING_TYPE_BT) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_BT_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ if (type == TETHERING_TYPE_USB) CHECK_FEATURE_SUPPORTED(TETHERING_USB_FEATURE);
+ else if (type == TETHERING_TYPE_WIFI) CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+ else if (type == TETHERING_TYPE_BT) CHECK_FEATURE_SUPPORTED(TETHERING_BT_FEATURE);
_retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
"parameter(tethering) is NULL\n");
}
/* TETHERING_TYPE_ALL */
- for (ti = TETHERING_TYPE_USB; ti <= TETHERING_TYPE_BT; ti++) {
+ for (ti = TETHERING_TYPE_USB; ti < TETHERING_TYPE_MAX; ti++) {
th->disabled_cb[ti] = NULL;
th->disabled_user_data[ti] = NULL;
}
*/
API int tethering_set_connection_state_changed_cb(tethering_h tethering, tethering_type_e type, tethering_connection_state_changed_cb callback, void *user_data)
{
- if (type == TETHERING_TYPE_USB) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_USB_FEATURE);
- else if (type == TETHERING_TYPE_WIFI) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
- else if (type == TETHERING_TYPE_BT) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_BT_FEATURE);
+ INFO("+ type: %d\n", type);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ if (type == TETHERING_TYPE_USB) CHECK_FEATURE_SUPPORTED(TETHERING_USB_FEATURE);
+ else if (type == TETHERING_TYPE_WIFI) CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+ else if (type == TETHERING_TYPE_BT) CHECK_FEATURE_SUPPORTED(TETHERING_BT_FEATURE);
_retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
"parameter(tethering) is NULL\n");
}
/* TETHERING_TYPE_ALL */
- for (ti = TETHERING_TYPE_USB; ti <= TETHERING_TYPE_BT; ti++) {
+ for (ti = TETHERING_TYPE_USB; ti < TETHERING_TYPE_MAX; ti++) {
th->changed_cb[ti] = callback;
th->changed_user_data[ti] = user_data;
}
-
+ INFO("-\n");
return TETHERING_ERROR_NONE;
}
*/
API int tethering_unset_connection_state_changed_cb(tethering_h tethering, tethering_type_e type)
{
- if (type == TETHERING_TYPE_USB) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_USB_FEATURE);
- else if (type == TETHERING_TYPE_WIFI) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
- else if (type == TETHERING_TYPE_BT) CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_BT_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ if (type == TETHERING_TYPE_USB) CHECK_FEATURE_SUPPORTED(TETHERING_USB_FEATURE);
+ else if (type == TETHERING_TYPE_WIFI) CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+ else if (type == TETHERING_TYPE_BT) CHECK_FEATURE_SUPPORTED(TETHERING_BT_FEATURE);
_retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
"parameter(tethering) is NULL\n");
}
/* TETHERING_TYPE_ALL */
- for (ti = TETHERING_TYPE_USB; ti <= TETHERING_TYPE_BT; ti++) {
+ for (ti = TETHERING_TYPE_USB; ti < TETHERING_TYPE_MAX; ti++) {
th->changed_cb[ti] = NULL;
th->changed_user_data[ti] = NULL;
}
*/
API int tethering_wifi_set_security_type_changed_cb(tethering_h tethering, tethering_wifi_security_type_changed_cb callback, void *user_data)
{
- CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
_retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
"parameter(tethering) is NULL\n");
*/
API int tethering_wifi_unset_security_type_changed_cb(tethering_h tethering)
{
- CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
_retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
"parameter(tethering) is NULL\n");
*/
API int tethering_wifi_set_ssid_visibility_changed_cb(tethering_h tethering, tethering_wifi_ssid_visibility_changed_cb callback, void *user_data)
{
- CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
_retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
"parameter(tethering) is NULL\n");
*/
API int tethering_wifi_unset_ssid_visibility_changed_cb(tethering_h tethering)
{
- CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
_retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
"parameter(tethering) is NULL\n");
*/
API int tethering_wifi_set_passphrase_changed_cb(tethering_h tethering, tethering_wifi_passphrase_changed_cb callback, void *user_data)
{
- CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
_retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
"parameter(tethering) is NULL\n");
*/
API int tethering_wifi_unset_passphrase_changed_cb(tethering_h tethering)
{
- CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
_retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
"parameter(tethering) is NULL\n");
*/
API int tethering_wifi_set_security_type(tethering_h tethering, tethering_wifi_security_type_e type)
{
- CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
_retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
"parameter(tethering) is NULL\n");
__tethering_h *th = (__tethering_h *)tethering;
tethering_error_e ret = TETHERING_ERROR_NONE;
+ char *sec_str = NULL;
ret = __set_security_type(type);
if (ret == TETHERING_ERROR_NONE) {
+ switch (type) {
+ case TETHERING_WIFI_SECURITY_TYPE_NONE:
+ sec_str = TETHERING_WIFI_SECURITY_TYPE_OPEN_STR;
+ break;
+ case TETHERING_WIFI_SECURITY_TYPE_WPA2_PSK:
+ sec_str = TETHERING_WIFI_SECURITY_TYPE_WPA2_PSK_STR;
+ break;
+ case TETHERING_WIFI_SECURITY_TYPE_WPS:
+ sec_str = TETHERING_WIFI_SECURITY_TYPE_WPS_STR;
+ break;
+ case TETHERING_WIFI_SECURITY_TYPE_SAE:
+ sec_str = TETHERING_WIFI_SECURITY_TYPE_SAE_STR;
+ break;
+ }
__send_dbus_signal(th->client_bus,
- SIGNAL_NAME_SECURITY_TYPE_CHANGED,
- type == TETHERING_WIFI_SECURITY_TYPE_NONE ?
- TETHERING_WIFI_SECURITY_TYPE_OPEN_STR :
- TETHERING_WIFI_SECURITY_TYPE_WPA2_PSK_STR);
+ SIGNAL_NAME_SECURITY_TYPE_CHANGED, sec_str);
}
return ret;
}
*/
API int tethering_wifi_get_security_type(tethering_h tethering, tethering_wifi_security_type_e *type)
{
- CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
_retvm_if(type == NULL, TETHERING_ERROR_INVALID_PARAMETER,
"parameter(type) is NULL\n");
*/
API int tethering_wifi_set_ssid(tethering_h tethering, const char *ssid)
{
- CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
_retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
"parameter(tethering) is NULL\n");
_retvm_if(p_ssid == NULL, TETHERING_ERROR_OUT_OF_MEMORY,
"strdup is failed\n");
+#ifdef TIZEN_TV_EXT
+ GDBusProxy *proxy = th->client_bus_proxy;
+ GVariant *parameters;
+ GError *error = NULL;
+ tethering_error_e ret = TETHERING_ERROR_NONE;
+
+ parameters = g_dbus_proxy_call_sync(proxy, "set_wifi_tethering_ssid",
+ g_variant_new("(s)", ssid), G_DBUS_CALL_FLAGS_NONE, -1, NULL, &error);
+
+ if (error) {
+ ERR("g_dbus_proxy_call_sync failed because %s\n", error->message);
+
+ if (error->code == G_DBUS_ERROR_ACCESS_DENIED)
+ ret = TETHERING_ERROR_PERMISSION_DENIED;
+ else
+ ret = TETHERING_ERROR_OPERATION_FAILED;
+
+ g_error_free(error);
+ free(p_ssid);
+ return ret;
+ }
+
+ if (parameters != NULL) {
+ g_variant_get(parameters, "(u)", &ret);
+ g_variant_unref(parameters);
+ }
+
+ SINFO("set tethering ssid : %s", ssid);
+#endif /* TIZEN_TV_EXT */
+
if (th->ssid)
free(th->ssid);
th->ssid = p_ssid;
*/
API int tethering_wifi_get_ssid(tethering_h tethering, char **ssid)
{
- CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
_retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
"parameter(tethering) is NULL\n");
__tethering_h *th = (__tethering_h *)tethering;
char val[TETHERING_WIFI_SSID_MAX_LEN + 1] = {0, };
+#ifdef TIZEN_TV_EXT
+ if (__get_ssid_from_vconf(VCONFKEY_WIFI_SSID,
+ val, sizeof(val)) == true) {
+ *ssid = strdup(val);
+ SINFO("get tethering ssid : %s", *ssid);
+ return TETHERING_ERROR_NONE;
+ }
+#endif /* TIZEN_TV_EXT */
+
if (!tethering_is_enabled(NULL, TETHERING_TYPE_WIFI)) {
if (th->ssid != NULL) {
DBG("Private SSID is set\n");
*/
API int tethering_wifi_set_ssid_visibility(tethering_h tethering, bool visible)
{
- CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
_retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
"parameter(tethering) is NULL\n");
ret = __set_visible(visible);
if (ret == TETHERING_ERROR_NONE) {
-
__send_dbus_signal(th->client_bus,
SIGNAL_NAME_SSID_VISIBILITY_CHANGED,
visible ? SIGNAL_MSG_SSID_VISIBLE :
*/
API int tethering_wifi_get_ssid_visibility(tethering_h tethering, bool *visible)
{
- CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
_retvm_if(visible == NULL, TETHERING_ERROR_INVALID_PARAMETER,
"parameter(visible) is NULL\n");
*/
API int tethering_wifi_set_passphrase(tethering_h tethering, const char *passphrase)
{
- CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
_retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
"parameter(tethering) is NULL\n");
"parameter(passphrase) is NULL\n");
__tethering_h *th = (__tethering_h *)tethering;
+ GDBusProxy *proxy = th->client_bus_proxy;
+ GVariant *parameters;
+ GError *error = NULL;
int passphrase_len = 0;
+ int ret = 0;
- char old_passphrase[TETHERING_WIFI_KEY_MAX_LEN + 1] = {0, };
- unsigned int old_len = 0;
- tethering_error_e ret = TETHERING_ERROR_NONE;
-
+ DBG("+");
passphrase_len = strlen(passphrase);
if (passphrase_len < TETHERING_WIFI_KEY_MIN_LEN ||
passphrase_len > TETHERING_WIFI_KEY_MAX_LEN) {
return TETHERING_ERROR_INVALID_PARAMETER;
}
- ret = __get_passphrase(old_passphrase, sizeof(old_passphrase), &old_len);
- if (ret == TETHERING_ERROR_NONE && old_len == passphrase_len &&
- !g_strcmp0(old_passphrase, passphrase)) {
- return TETHERING_ERROR_NONE;
+ parameters = g_dbus_proxy_call_sync(proxy, "set_wifi_tethering_passphrase",
+ g_variant_new("(s)", passphrase), G_DBUS_CALL_FLAGS_NONE, -1, NULL, &error);
+
+ if (error) {
+ ERR("g_dbus_proxy_call_sync failed because %s\n", error->message);
+
+ if (error->code == G_DBUS_ERROR_ACCESS_DENIED)
+ ret = TETHERING_ERROR_PERMISSION_DENIED;
+ else
+ ret = TETHERING_ERROR_OPERATION_FAILED;
+
+ g_error_free(error);
+ return ret;
}
- ret = __set_passphrase(passphrase, passphrase_len);
+ g_variant_get(parameters, "(u)", &ret);
+ g_variant_unref(parameters);
+
if (ret == TETHERING_ERROR_NONE) {
__send_dbus_signal(th->client_bus,
SIGNAL_NAME_PASSPHRASE_CHANGED, NULL);
}
+
+ DBG("-");
return ret;
}
*/
API int tethering_wifi_get_passphrase(tethering_h tethering, char **passphrase)
{
- CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
_retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
"parameter(tethering) is NULL\n");
_retvm_if(passphrase == NULL, TETHERING_ERROR_INVALID_PARAMETER,
"parameter(passphrase) is NULL\n");
- char passphrase_buf[TETHERING_WIFI_KEY_MAX_LEN + 1] = {0, };
+ __tethering_h *th = (__tethering_h *)tethering;
+ GDBusProxy *proxy = th->client_bus_proxy;
+ GVariant *parameters;
+ GError *error = NULL;
unsigned int len = 0;
tethering_error_e ret = TETHERING_ERROR_NONE;
- ret = __get_passphrase(passphrase_buf, sizeof(passphrase_buf), &len);
- if (ret != TETHERING_ERROR_NONE)
+ parameters = g_dbus_proxy_call_sync(proxy, "get_wifi_tethering_passphrase",
+ NULL, G_DBUS_CALL_FLAGS_NONE, -1, NULL, &error);
+
+ if (error) {
+ ERR("g_dbus_proxy_call_sync failed because %s\n", error->message);
+
+ if (error->code == G_DBUS_ERROR_ACCESS_DENIED)
+ ret = TETHERING_ERROR_PERMISSION_DENIED;
+ else
+ ret = TETHERING_ERROR_OPERATION_FAILED;
+
+ g_error_free(error);
return ret;
+ }
- *passphrase = strdup(passphrase_buf);
- if (*passphrase == NULL) {
- ERR("strdup is failed\n");
- return TETHERING_ERROR_OUT_OF_MEMORY;
+ if (parameters != NULL) {
+ g_variant_get(parameters, "(siu)", passphrase, &len, &ret);
+ g_variant_unref(parameters);
+ }
+
+ return TETHERING_ERROR_NONE;
+}
+
+API int tethering_wifi_set_channel(tethering_h tethering, int channel)
+{
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
+
+ __tethering_h *th = (__tethering_h *)tethering;
+
+#ifdef TIZEN_TV_EXT
+ GDBusProxy *proxy = th->client_bus_proxy;
+ GVariant *parameters;
+ GError *error = NULL;
+ tethering_error_e ret = TETHERING_ERROR_NONE;
+
+ parameters = g_dbus_proxy_call_sync(proxy, "set_wifi_tethering_channel",
+ g_variant_new("(i)", channel), G_DBUS_CALL_FLAGS_NONE, -1, NULL, &error);
+
+ if (error) {
+ ERR("g_dbus_proxy_call_sync failed because %s\n", error->message);
+
+ if (error->code == G_DBUS_ERROR_ACCESS_DENIED)
+ ret = TETHERING_ERROR_PERMISSION_DENIED;
+ else
+ ret = TETHERING_ERROR_OPERATION_FAILED;
+
+ g_error_free(error);
+ return ret;
+ }
+
+ if (parameters != NULL) {
+ g_variant_get(parameters, "(u)", &ret);
+ g_variant_unref(parameters);
+ }
+
+ SINFO("set channel : %d", channel);
+#endif /* TIZEN_TV_EXT */
+
+ th->channel = channel;
+
+ return TETHERING_ERROR_NONE;
+}
+
+API int tethering_wifi_get_channel(tethering_h tethering, int *channel)
+{
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
+
+ _retvm_if(channel == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(channel) is NULL\n");
+
+ __tethering_h *th = (__tethering_h *)tethering;
+#ifdef TIZEN_TV_EXT
+ GDBusProxy *proxy = th->client_bus_proxy;
+ GVariant *parameters = NULL;
+ GError *error = NULL;
+ int ch = -1;
+ int vconf_channel = -1;
+ tethering_error_e ret = TETHERING_ERROR_NONE;
+
+ parameters = g_dbus_proxy_call_sync(proxy, "get_wifi_tethering_channel",
+ NULL, G_DBUS_CALL_FLAGS_NONE, -1, NULL, &error);
+
+ if (error) {
+ ERR("g_dbus_proxy_call_sync failed because %s\n", error->message);
+
+ if (error->code == G_DBUS_ERROR_ACCESS_DENIED)
+ ret = TETHERING_ERROR_PERMISSION_DENIED;
+ else
+ ret = TETHERING_ERROR_OPERATION_FAILED;
+
+ g_error_free(error);
+ return ret;
}
+ if (parameters != NULL) {
+ g_variant_get(parameters, "(iu)", &ch, &ret);
+ g_variant_unref(parameters);
+ }
+
+ if (ch < 0) {
+ ERR("failed to get Hostapd channel, set th->channel");
+ *channel = th->channel;
+ } else
+ *channel = ch;
+
+ if (vconf_get_int(VCONFKEY_WIFI_CHANNEL, &vconf_channel) < 0)
+ ERR("Failed to get vconf key for channel");
+ else
+ *channel = vconf_channel;
+
+ SINFO("get tethering channel : %d", *channel);
+#else /* TIZEN_TV_EXT */
+ *channel = th->channel;
+#endif /* TIZEN_TV_EXT */
+
+ return TETHERING_ERROR_NONE;
+}
+
+API int tethering_wifi_set_mode(tethering_h tethering, tethering_wifi_mode_type_e type)
+{
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
+
+ __tethering_h *th = (__tethering_h *)tethering;
+
+ th->mode_type = type;
+
+ return TETHERING_ERROR_NONE;
+}
+
+API int tethering_wifi_get_mode(tethering_h tethering, tethering_wifi_mode_type_e *type)
+{
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
+ _retvm_if(type == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(type) is NULL\n");
+
+ __tethering_h *th = (__tethering_h *)tethering;
+ *type = th->mode_type;
+
return TETHERING_ERROR_NONE;
}
+
/**
* @internal
* @brief Reload the settings (SSID / Passphrase / Security type / SSID visibility).
API int tethering_wifi_reload_settings(tethering_h tethering, tethering_wifi_settings_reloaded_cb callback, void *user_data)
{
- CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
_retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
"parameter(tethering) is NULL\n");
"parameter(callback) is NULL\n");
__tethering_h *th = (__tethering_h *)tethering;
- _softap_settings_t set = {"", "", 0, false};
+ _softap_settings_t set = {"", "", "", 0, false};
GDBusProxy *proxy = th->client_bus_proxy;
int ret = 0;
th->settings_reloaded_cb = callback;
th->settings_reloaded_user_data = user_data;
+ SINFO("ssid %s, key %s, channel %d, mode %s, txpower %d, security %d max_device %d\n",
+ set.ssid, set.key, set.channel, set.mode, set.txpower, set.sec_type,
+ set.max_connected);
+
g_dbus_proxy_call(proxy, "reload_wifi_settings",
- g_variant_new("(ssii)", set.ssid, set.key, set.visibility, set.sec_type),
+ g_variant_new("(sssiiiiii)", set.ssid, set.key, set.mode, set.channel, set.visibility, set.mac_filter, set.max_connected, set.sec_type, set.txpower),
G_DBUS_CALL_FLAGS_NONE, -1, th->cancellable,
(GAsyncReadyCallback) __settings_reloaded_cb, (gpointer)tethering);
return TETHERING_ERROR_NONE;
}
-/**
- * @internal
- * @brief Sets the security type of Wi-Fi AP.
- * @since_tizen 2.3
- * @privlevel platform
- * @privilege http://tizen.org/privilege/tethering.admin
- * @details If security type is not set, WPA2_PSK is used
- * @param[in] tethering The handle of tethering
- * @param[in] type The security type
- * @return 0 on success, otherwise negative error value.
- * @retval #TETHERING_ERROR_NONE Successful
- * @retval #TETHERING_ERROR_INVALID_PARAMETER Invalid parameter
- * @retval #TETHERING_ERROR_OPERATION_FAILED Operation failed
- * @see tethering_wifi_ap_get_security_type()
- */
-API int tethering_wifi_ap_set_security_type(tethering_h tethering, tethering_wifi_security_type_e type)
+API int tethering_wifi_set_mac_filter(tethering_h tethering, bool mac_filter)
{
- CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
_retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
- "parameter(tethering) is NULL\n");
+ "parameter(tethering) is NULL\n");
__tethering_h *th = (__tethering_h *)tethering;
- th->sec_type = type;
+ th->mac_filter = mac_filter;
+
return TETHERING_ERROR_NONE;
}
-/**
- * @internal
- * @brief Gets the security type of Wi-Fi AP.
- * @since_tizen 2.3
- * @privlevel platform
- * @privilege http://tizen.org/privilege/tethering.admin
- * @details If security type is not set, WPA2_PSK is used
- * @param[in] tethering The handle of tethering
- * @param[out] type The security type
- * @return 0 on success, otherwise negative error value.
- * @retval #TETHERING_ERROR_NONE Successful
- * @retval #TETHERING_ERROR_INVALID_PARAMETER Invalid parameter
- * @see tethering_wifi_ap_set_security_type()
- */
-API int tethering_wifi_ap_get_security_type(tethering_h tethering, tethering_wifi_security_type_e *type)
+API int tethering_wifi_get_mac_filter(tethering_h tethering, bool *mac_filter)
+{
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(mac_filter) is NULL\n");
+ _retvm_if(mac_filter == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(mac_filter) is NULL\n");
+
+ __tethering_h *th = (__tethering_h *)tethering;
+ *mac_filter = th->mac_filter;
+
+ return TETHERING_ERROR_NONE;
+}
+
+static int __add_mac_to_file(const char *filepath, const char *mac)
+{
+ FILE *fp = NULL;
+ char line[MAX_BUF_SIZE] = "\0";
+ bool mac_exist = false;
+ char *p_mac = NULL;
+
+ fp = fopen(filepath, "a+");
+ if (!fp) {
+ ERR("fopen is failed\n");
+ return TETHERING_ERROR_OPERATION_FAILED;
+ }
+
+ while (fgets(line, MAX_BUF_SIZE, fp) != NULL) {
+ if (strncmp(mac, line, 17) == 0) {
+ DBG("MAC %s already exist in the list\n", mac);
+ mac_exist = true;
+ break;
+ }
+ }
+
+ if (!mac_exist) {
+ p_mac = strdup(mac);
+ if (p_mac == NULL) {
+ ERR("strdup failed\n");
+ fclose(fp);
+ return TETHERING_ERROR_OUT_OF_MEMORY;
+ }
+
+ fprintf(fp, "%s\n", mac);
+
+ if ((strcmp(filepath, ALLOWED_LIST) == 0))
+ allowed_list = g_slist_append(allowed_list, p_mac);
+ else if ((strcmp(filepath, BLOCKED_LIST) == 0))
+ blocked_list = g_slist_append(blocked_list, p_mac);
+ else
+ free(p_mac);
+ }
+
+ fclose(fp);
+
+ return TETHERING_ERROR_NONE;
+}
+
+static int __remove_mac_from_file(const char *filepath, const char *mac)
+{
+ FILE *fp = NULL;
+ FILE *fp1 = NULL;
+ char line[MAX_BUF_SIZE] = "\0";
+
+ fp = fopen(filepath, "r");
+ if (!fp) {
+ ERR("fopen is failed\n");
+ return TETHERING_ERROR_OPERATION_FAILED;
+ }
+
+ fp1 = fopen(TEMP_LIST, "w+");
+ if (!fp1) {
+ fclose(fp);
+ ERR("fopen is failed\n");
+ return TETHERING_ERROR_OPERATION_FAILED;
+ }
+
+ while (fgets(line, MAX_BUF_SIZE, fp) != NULL) {
+ if (strncmp(mac, line, 17) == 0) {
+ DBG("MAC %s found in the list\n", mac);
+
+ if ((strcmp(filepath, ALLOWED_LIST) == 0)) {
+ GSList *list = NULL;
+ for (list = allowed_list; list != NULL; list = list->next) {
+ char *p_mac = (char *)list->data;
+ if (strncmp(mac, p_mac, strlen(mac)) == 0)
+ allowed_list = g_slist_remove(allowed_list, p_mac);
+ }
+ } else if ((strcmp(filepath, BLOCKED_LIST) == 0)) {
+ GSList *list = NULL;
+ for (list = blocked_list; list != NULL; list = list->next) {
+ char *p_mac = (char *)list->data;
+ if (strncmp(mac, p_mac, strlen(mac)) == 0)
+ blocked_list = g_slist_remove(blocked_list, p_mac);
+ }
+ }
+ } else {
+ fprintf(fp1, "%s", line);
+ }
+ }
+
+ fclose(fp);
+ fclose(fp1);
+
+ if ((strcmp(filepath, ALLOWED_LIST) == 0)) {
+ if (rename(TEMP_LIST, ALLOWED_LIST) != 0) {
+ ERR("rename is failed (%s -> %s)", TEMP_LIST, ALLOWED_LIST);
+ return TETHERING_ERROR_OPERATION_FAILED;
+ }
+ } else if ((strcmp(filepath, BLOCKED_LIST) == 0)) {
+ if (rename(TEMP_LIST, BLOCKED_LIST) != 0) {
+ ERR("rename is failed (%s -> %s)", TEMP_LIST, BLOCKED_LIST);
+ return TETHERING_ERROR_OPERATION_FAILED;
+ }
+ }
+
+ return TETHERING_ERROR_NONE;
+}
+
+API int tethering_wifi_add_allowed_mac_list(tethering_h tethering, const char *mac)
+{
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
+ _retvm_if(mac == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(mac) is NULL\n");
+
+ return __add_mac_to_file(ALLOWED_LIST, mac);
+}
+
+API int tethering_wifi_remove_allowed_mac_list(tethering_h tethering, const char *mac)
+{
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
+ _retvm_if(mac == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(mac) is NULL\n");
+
+ return __remove_mac_from_file(ALLOWED_LIST, mac);
+}
+
+API int tethering_wifi_get_allowed_mac_list(tethering_h tethering, void **allowed_mac_list)
+{
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
+ _retvm_if(allowed_mac_list == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(allowed_mac_list) is NULL\n");
+
+ *allowed_mac_list = g_slist_copy(allowed_list);
+ return TETHERING_ERROR_NONE;
+}
+
+API int tethering_wifi_add_blocked_mac_list(tethering_h tethering, const char *mac)
+{
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
+ _retvm_if(mac == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(mac) is NULL\n");
+
+ return __add_mac_to_file(BLOCKED_LIST, mac);
+}
+
+API int tethering_wifi_remove_blocked_mac_list(tethering_h tethering, const char *mac)
+{
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
+ _retvm_if(mac == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(mac) is NULL\n");
+
+ return __remove_mac_from_file(BLOCKED_LIST, mac);
+}
+
+API int tethering_wifi_get_blocked_mac_list(tethering_h tethering, void **blocked_mac_list)
+{
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
+ _retvm_if(blocked_mac_list == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(blocked_mac_list) is NULL\n");
+
+ *blocked_mac_list = g_slist_copy(blocked_list);
+ return TETHERING_ERROR_NONE;
+}
+
+API int tethering_wifi_enable_dhcp(tethering_h tethering, bool enable)
+{
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
+
+ GVariant *parameters;
+ GError *error = NULL;
+ guint result;
+
+ __tethering_h *th = (__tethering_h *)tethering;
+
+ GDBusProxy *proxy = th->client_bus_proxy;
+
+ parameters = g_dbus_proxy_call_sync(proxy, "enable_dhcp",
+ g_variant_new("(b)", enable),
+ G_DBUS_CALL_FLAGS_NONE, -1, NULL, &error);
+
+ if (error) {
+ ERR("g_dbus_proxy_call_sync failed because %s\n", error->message);
+ if (error->code == G_DBUS_ERROR_ACCESS_DENIED)
+ result = TETHERING_ERROR_PERMISSION_DENIED;
+ else
+ result = TETHERING_ERROR_OPERATION_FAILED;
+
+ g_error_free(error);
+ th->dhcp_enabled = false;
+
+ return result;
+ }
+
+ g_variant_get(parameters, "(u)", &result);
+ g_variant_unref(parameters);
+
+ if (enable)
+ th->dhcp_enabled = true;
+ else
+ th->dhcp_enabled = false;
+
+ return TETHERING_ERROR_NONE;
+}
+
+API int tethering_wifi_set_dhcp_range(tethering_h tethering, char *rangestart, char *rangestop)
+{
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
+ _retvm_if(rangestart == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(rangestart) is NULL\n");
+ _retvm_if(rangestop == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(rangestop) is NULL\n");
+
+ GVariant *parameters;
+ GError *error = NULL;
+ guint result;
+
+ __tethering_h *th = (__tethering_h *)tethering;
+
+ GDBusProxy *proxy = th->client_bus_proxy;
+
+ parameters = g_dbus_proxy_call_sync(proxy, "dhcp_range",
+ g_variant_new("(ss)", rangestart, rangestop),
+ G_DBUS_CALL_FLAGS_NONE, -1, NULL, &error);
+ if (error) {
+ ERR("g_dbus_proxy_call_sync failed because %s\n", error->message);
+
+ if (error->code == G_DBUS_ERROR_ACCESS_DENIED)
+ result = TETHERING_ERROR_PERMISSION_DENIED;
+ else
+ result = TETHERING_ERROR_OPERATION_FAILED;
+
+ g_error_free(error);
+ th->dhcp_enabled = false;
+
+ return result;
+ }
+
+ g_variant_get(parameters, "(u)", &result);
+ g_variant_unref(parameters);
+
+ th->dhcp_enabled = true;
+
+ return TETHERING_ERROR_NONE;
+}
+
+API int tethering_wifi_is_dhcp_enabled(tethering_h tethering, bool *dhcp_enabled)
+{
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
+ _retvm_if(dhcp_enabled == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(dhcp_enabled) is NULL\n");
+
+ __tethering_h *th = (__tethering_h *)tethering;
+ *dhcp_enabled = th->dhcp_enabled;
+
+ return TETHERING_ERROR_NONE;
+}
+
+API int tethering_wifi_set_txpower(tethering_h tethering, unsigned int txpower)
+{
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+
+ GError *error = NULL;
+
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
+ _retvm_if(tethering_is_enabled(tethering, TETHERING_TYPE_WIFI) == false,
+ TETHERING_ERROR_NOT_ENABLED,
+ "tethering type[%d] is not enabled\n", TETHERING_TYPE_WIFI);
+ __tethering_h *th = (__tethering_h *)tethering;
+ th->txpower = txpower;
+
+ g_dbus_proxy_call_sync(th->client_bus_proxy, "hostapd_set_txpower",
+ g_variant_new("(u)", txpower),
+ G_DBUS_CALL_FLAGS_NONE,
+ -1, th->cancellable, &error);
+ if (error) {
+ ERR("g_dbus_proxy_call_sync is failed and error is %s\n", error->message);
+ g_clear_error(&error);
+ return TETHERING_ERROR_OPERATION_FAILED;
+ }
+ return TETHERING_ERROR_NONE;
+}
+
+API int tethering_wifi_get_txpower(tethering_h tethering, unsigned int *txpower)
+{
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+
+ GError *error = NULL;
+ GVariant *result = NULL;
+
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
+ _retvm_if(txpower == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(txpower) is NULL\n");
+ _retvm_if(tethering_is_enabled(tethering, TETHERING_TYPE_WIFI) == false,
+ TETHERING_ERROR_NOT_ENABLED,
+ "tethering type[%d] is not enabled\n", TETHERING_TYPE_WIFI);
+
+ __tethering_h *th = (__tethering_h *)tethering;
+
+ result = g_dbus_proxy_call_sync(th->client_bus_proxy, "hostapd_get_txpower",
+ NULL,
+ G_DBUS_CALL_FLAGS_NONE,
+ -1, th->cancellable, &error);
+
+ if (result != NULL) {
+ g_variant_get(result, "(u)", txpower);
+ g_variant_unref(result);
+ } else {
+ if (error)
+ ERR("g_dbus_proxy_call_sync is failed and error is %s\n", error->message);
+ g_clear_error(&error);
+ return TETHERING_ERROR_OPERATION_FAILED;
+ }
+ g_clear_error(&error);
+ return TETHERING_ERROR_NONE;
+}
+
+API int tethering_wifi_set_mtu(tethering_h tethering, unsigned int mtu)
+{
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
+
+ GVariant *parameters;
+ GError *error = NULL;
+ guint result;
+
+ __tethering_h *th = (__tethering_h *)tethering;
+
+ GDBusProxy *proxy = th->client_bus_proxy;
+
+ parameters = g_dbus_proxy_call_sync(proxy, "set_mtu",
+ g_variant_new("(u)", mtu),
+ G_DBUS_CALL_FLAGS_NONE, -1, NULL, &error);
+ if (error) {
+ ERR("g_dbus_proxy_call_sync failed because %s\n", error->message);
+
+ if (error->code == G_DBUS_ERROR_ACCESS_DENIED)
+ result = TETHERING_ERROR_PERMISSION_DENIED;
+ else
+ result = TETHERING_ERROR_OPERATION_FAILED;
+
+ g_error_free(error);
+ return result;
+ }
+
+ g_variant_get(parameters, "(u)", &result);
+
+ g_variant_unref(parameters);
+
+ return TETHERING_ERROR_NONE;
+}
+
+API int tethering_wifi_change_mac(tethering_h tethering, char *mac)
+{
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
+ _retvm_if(mac == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(mac) is NULL\n");
+
+ GVariant *parameters;
+ GError *error = NULL;
+ guint result;
+
+ __tethering_h *th = (__tethering_h *)tethering;
+
+ GDBusProxy *proxy = th->client_bus_proxy;
+
+ parameters = g_dbus_proxy_call_sync(proxy, "change_mac",
+ g_variant_new("(s)", mac),
+ G_DBUS_CALL_FLAGS_NONE, -1, NULL, &error);
+ if (error) {
+ ERR("g_dbus_proxy_call_sync failed because %s\n", error->message);
+
+ if (error->code == G_DBUS_ERROR_ACCESS_DENIED)
+ result = TETHERING_ERROR_PERMISSION_DENIED;
+ else
+ result = TETHERING_ERROR_OPERATION_FAILED;
+
+ g_error_free(error);
+ return result;
+ }
+
+ g_variant_get(parameters, "(u)", &result);
+ g_variant_unref(parameters);
+
+ if (result == MOBILE_AP_ERROR_NOT_PERMITTED)
+ return TETHERING_ERROR_NOT_SUPPORT_API;
+
+ return TETHERING_ERROR_NONE;
+}
+
+API int tethering_wifi_set_max_connected_device(tethering_h tethering, int max_device)
+{
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
+
+ __tethering_h *th = (__tethering_h *)tethering;
+
+ th->wifi_max_connected = max_device;
+
+ return TETHERING_ERROR_NONE;
+}
+
+API int tethering_wifi_get_max_connected_device(tethering_h tethering, int *max_device)
+{
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
+ _retvm_if(max_device == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(max_device) is NULL\n");
+
+ __tethering_h *th = (__tethering_h *)tethering;
+
+ *max_device = th->wifi_max_connected;
+ return TETHERING_ERROR_NONE;
+}
+
+API int tethering_wifi_enable_port_forwarding(tethering_h tethering, bool enable)
+{
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
+
+ GVariant *parameters;
+ GError *error = NULL;
+ guint result;
+
+ __tethering_h *th = (__tethering_h *)tethering;
+
+ GDBusProxy *proxy = th->client_bus_proxy;
+
+ parameters = g_dbus_proxy_call_sync(proxy, "enable_port_forwarding",
+ g_variant_new("(b)", enable),
+ G_DBUS_CALL_FLAGS_NONE, -1, NULL, &error);
+ if (error) {
+ ERR("g_dbus_proxy_call_sync failed because %s\n", error->message);
+
+ if (error->code == G_DBUS_ERROR_ACCESS_DENIED)
+ result = TETHERING_ERROR_PERMISSION_DENIED;
+ else
+ result = TETHERING_ERROR_OPERATION_FAILED;
+
+ g_error_free(error);
+ return result;
+ }
+
+ g_variant_get(parameters, "(u)", &result);
+ g_variant_unref(parameters);
+
+ th->port_forwarding = true;
+
+ return TETHERING_ERROR_NONE;
+}
+
+API int tethering_wifi_add_port_forwarding_rule(tethering_h tethering, char *ifname, char *protocol, char *org_ip, int org_port, char *final_ip, int final_port)
+{
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
+ _retvm_if(ifname == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(ifname) is NULL\n");
+ _retvm_if(protocol == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(protocol) is NULL\n");
+ _retvm_if(org_ip == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(org_ip) is NULL\n");
+ _retvm_if(final_ip == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(final_ip) is NULL\n");
+
+ GVariant *parameters;
+ GError *error = NULL;
+ guint result;
+ char cmd[MAX_BUF_SIZE] = { 0, };
+ char *list = NULL;
+
+ __tethering_h *th = (__tethering_h *)tethering;
+
+ GDBusProxy *proxy = th->client_bus_proxy;
+
+ parameters = g_dbus_proxy_call_sync(proxy, "add_port_forwarding_rule",
+ g_variant_new("(sssisi)", ifname, protocol, org_ip, org_port, final_ip, final_port),
+ G_DBUS_CALL_FLAGS_NONE, -1, NULL, &error);
+ if (error) {
+ ERR("g_dbus_proxy_call_sync failed because %s\n", error->message);
+
+ if (error->code == G_DBUS_ERROR_ACCESS_DENIED)
+ result = TETHERING_ERROR_PERMISSION_DENIED;
+ else
+ result = TETHERING_ERROR_OPERATION_FAILED;
+
+ g_error_free(error);
+ return result;
+ }
+
+ g_variant_get(parameters, "(u)", &result);
+ g_variant_unref(parameters);
+
+ snprintf(cmd, sizeof(cmd), "%s "PORT_FORWARD_RULE_STR, IPTABLES, TABLE_NAT, TETH_NAT_PRE, ifname, protocol, org_ip, org_port, final_ip, final_port);
+
+ list = strdup(cmd);
+ if (list == NULL) {
+ ERR("strdup failed\n");
+ return TETHERING_ERROR_OUT_OF_MEMORY;
+ }
+
+ port_forwarding = g_slist_append(port_forwarding, list);
+
+ return TETHERING_ERROR_NONE;
+}
+
+API int tethering_wifi_reset_port_forwarding_rule(tethering_h tethering)
+{
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
+
+ GVariant *parameters;
+ GError *error = NULL;
+ guint result;
+
+ __tethering_h *th = (__tethering_h *)tethering;
+
+ GDBusProxy *proxy = th->client_bus_proxy;
+
+ parameters = g_dbus_proxy_call_sync(proxy, "reset_port_forwarding_rule",
+ NULL, G_DBUS_CALL_FLAGS_NONE, -1, NULL, &error);
+ if (error) {
+ ERR("g_dbus_proxy_call_sync failed because %s\n", error->message);
+
+ if (error->code == G_DBUS_ERROR_ACCESS_DENIED)
+ result = TETHERING_ERROR_PERMISSION_DENIED;
+ else
+ result = TETHERING_ERROR_OPERATION_FAILED;
+
+ g_error_free(error);
+ return result;
+ }
+
+ g_variant_get(parameters, "(u)", &result);
+
+ g_variant_unref(parameters);
+
+ return TETHERING_ERROR_NONE;
+}
+
+API int tethering_wifi_is_port_forwarding_enabled(tethering_h tethering, bool *forwarding_enabled)
+{
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
+ _retvm_if(forwarding_enabled == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(forwarding_enabled) is NULL\n");
+
+ __tethering_h *th = (__tethering_h *)tethering;
+
+ *forwarding_enabled = th->port_forwarding;
+
+ return TETHERING_ERROR_NONE;
+}
+
+API int tethering_wifi_get_port_forwarding_rule(tethering_h tethering, void **port_forwarding_list)
+{
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
+ _retvm_if(port_forwarding_list == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(port_forwarding_list) is NULL\n");
+
+ *port_forwarding_list = g_slist_copy(port_forwarding);
+ return TETHERING_ERROR_NONE;
+}
+
+API int tethering_wifi_enable_port_filtering(tethering_h tethering, bool enable)
{
- CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
+
+ GVariant *parameters;
+ GError *error = NULL;
+ guint result;
+
+ __tethering_h *th = (__tethering_h *)tethering;
+
+ GDBusProxy *proxy = th->client_bus_proxy;
+
+ parameters = g_dbus_proxy_call_sync(proxy, "enable_port_filtering",
+ g_variant_new("(b)", enable),
+ G_DBUS_CALL_FLAGS_NONE, -1, NULL, &error);
+ if (error) {
+ ERR("g_dbus_proxy_call_sync failed because %s\n", error->message);
+
+ if (error->code == G_DBUS_ERROR_ACCESS_DENIED)
+ result = TETHERING_ERROR_PERMISSION_DENIED;
+ else
+ result = TETHERING_ERROR_OPERATION_FAILED;
+
+ g_error_free(error);
+ return result;
+ }
+
+ g_variant_get(parameters, "(u)", &result);
+ g_variant_unref(parameters);
+
+ th->port_filtering = true;
+
+ return TETHERING_ERROR_NONE;
+}
+
+API int tethering_wifi_add_port_filtering_rule(tethering_h tethering, int port, char *protocol, bool allow)
+{
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
- _retvm_if(type == NULL, TETHERING_ERROR_INVALID_PARAMETER,
- "parameter(type) is NULL\n");
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
+ _retvm_if(protocol == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(protocol) is NULL\n");
+
+ GVariant *parameters;
+ GError *error = NULL;
+ guint result;
+ char *list = NULL;
+ int ret;
__tethering_h *th = (__tethering_h *)tethering;
- *type = th->sec_type;
+ GDBusProxy *proxy = th->client_bus_proxy;
+
+ parameters = g_dbus_proxy_call_sync(proxy, "add_port_filtering_rule",
+ g_variant_new("(isb)", port, protocol, allow),
+ G_DBUS_CALL_FLAGS_NONE, -1, NULL, &error);
+ if (error) {
+ ERR("g_dbus_proxy_call_sync failed because %s\n", error->message);
+
+ if (error->code == G_DBUS_ERROR_ACCESS_DENIED)
+ result = TETHERING_ERROR_PERMISSION_DENIED;
+ else
+ result = TETHERING_ERROR_OPERATION_FAILED;
+
+ g_error_free(error);
+ return result;
+ }
+
+ g_variant_get(parameters, "(u)", &result);
+ g_variant_unref(parameters);
+
+ if (allow)
+ ret = asprintf(&list, "%s "FILTERING_RULE_STR, IPTABLES, TABLE_FILTER, TETH_FILTER_FW, protocol, port, ACTION_ACCEPT);
+ else
+ ret = asprintf(&list, "%s "FILTERING_RULE_STR, IPTABLES, TABLE_FILTER, TETH_FILTER_FW, protocol, port, ACTION_DROP);
+
+ if (ret == -1 || list == NULL) {
+ ERR("asprintf failed\n");
+ return TETHERING_ERROR_OUT_OF_MEMORY;
+ }
+
+ DBG("cmd:%s", list);
+
+ port_filtering = g_slist_append(port_filtering, list);
+
return TETHERING_ERROR_NONE;
}
-/**
- * @internal
- * @brief Sets the SSID (service set identifier) for Wi-Fi AP. The SSID cannot exceed 32 bytes.
- * @since_tizen 2.3
- * @privlevel platform
- * @privilege http://tizen.org/privilege/tethering.admin
- * @details If SSID is not set, Device name is used as SSID
- * @param[in] tethering The handle of tethering
- * @param[in] ssid The SSID
- * @return 0 on success, otherwise negative error value.
- * @retval #TETHERING_ERROR_NONE Successful
- * @retval #TETHERING_ERROR_INVALID_PARAMETER Invalid parameter
- * @retval #TETHERING_ERROR_OUT_OF_MEMORY Out of memory
- */
-API int tethering_wifi_ap_set_ssid(tethering_h tethering, const char *ssid)
+API int tethering_wifi_add_custom_port_filtering_rule(tethering_h tethering, int port1, int port2, char *protocol, bool allow)
{
- CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
_retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
"parameter(tethering) is NULL\n");
- _retvm_if(ssid == NULL, TETHERING_ERROR_INVALID_PARAMETER,
- "parameter(ssid) is NULL\n");
+ _retvm_if(protocol == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(protocol) is NULL\n");
+
+ GVariant *parameters;
+ GError *error = NULL;
+ guint result;
+ char *list = NULL;
+ int ret;
__tethering_h *th = (__tethering_h *)tethering;
- char *p_ssid = NULL;
- int ssid_len = 0;
- ssid_len = strlen(ssid);
- if (ssid_len > TETHERING_WIFI_SSID_MAX_LEN) {
- ERR("parameter(ssid) is too long");
- return TETHERING_ERROR_INVALID_PARAMETER;
+ GDBusProxy *proxy = th->client_bus_proxy;
+
+ parameters = g_dbus_proxy_call_sync(proxy, "add_custom_port_filtering_rule",
+ g_variant_new("(iisb)", port1, port2, protocol, allow),
+ G_DBUS_CALL_FLAGS_NONE, -1, NULL, &error);
+ if (error) {
+ ERR("g_dbus_proxy_call_sync failed because %s\n", error->message);
+
+ if (error->code == G_DBUS_ERROR_ACCESS_DENIED)
+ result = TETHERING_ERROR_PERMISSION_DENIED;
+ else
+ result = TETHERING_ERROR_OPERATION_FAILED;
+
+ g_error_free(error);
+ return result;
}
- p_ssid = strdup(ssid);
- if (p_ssid == NULL) {
- ERR("strdup failed\n");
+ g_variant_get(parameters, "(u)", &result);
+ g_variant_unref(parameters);
+
+ if (allow)
+ ret = asprintf(&list, "%s "FILTERING_MULTIPORT_RULE_STR, IPTABLES, TABLE_FILTER, TETH_FILTER_FW, protocol, port1, port2, ACTION_ACCEPT);
+ else
+ ret = asprintf(&list, "%s "FILTERING_MULTIPORT_RULE_STR, IPTABLES, TABLE_FILTER, TETH_FILTER_FW, protocol, port1, port2, ACTION_DROP);
+
+ if (ret == -1 || list == NULL) {
+ ERR("asprintf failed\n");
return TETHERING_ERROR_OUT_OF_MEMORY;
}
- if (th->ap_ssid)
- g_free(th->ap_ssid);
- th->ap_ssid = p_ssid;
+ DBG("cmd:%s", list);
+
+ custom_port_filtering = g_slist_append(custom_port_filtering, list);
return TETHERING_ERROR_NONE;
}
-/**
- * @internal
- * @brief Gets the SSID (service set identifier) for Wi-Fi AP.
- * @since_tizen 2.3
- * @privlevel platform
- * @privilege http://tizen.org/privilege/tethering.admin
- * @details If SSID is not set, Device name is used as SSID
- * @remarks @a ssid must be released with free() by you.
- * @param[in] tethering The handle of tethering
- * @param[out] ssid The SSID
- * @return 0 on success, otherwise negative error value.
- * @retval #TETHERING_ERROR_NONE Successful
- * @retval #TETHERING_ERROR_INVALID_PARAMETER Invalid parameter
- * @retval #TETHERING_ERROR_OUT_OF_MEMORY Out of memory
- */
-API int tethering_wifi_ap_get_ssid(tethering_h tethering, char **ssid)
+API int tethering_wifi_get_port_filtering_rule(tethering_h tethering, void **port_filtering_list)
{
- CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
_retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
"parameter(tethering) is NULL\n");
- _retvm_if(ssid == NULL, TETHERING_ERROR_INVALID_PARAMETER,
- "parameter(ssid) is NULL\n");
+ _retvm_if(port_filtering_list == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(port_filtering_list) is NULL\n");
- __tethering_h *th = (__tethering_h *)tethering;
+ *port_filtering_list = g_slist_copy(port_filtering);
+ return TETHERING_ERROR_NONE;
+}
- *ssid = g_strdup(th->ap_ssid);
- if (*ssid == NULL) {
- ERR("strdup failed\n");
- return TETHERING_ERROR_OUT_OF_MEMORY;
- }
+API int tethering_wifi_get_custom_port_filtering_rule(tethering_h tethering, void **custom_port_filtering_list)
+{
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
+ _retvm_if(custom_port_filtering_list == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(custom_port_filtering_list) is NULL\n");
+
+ *custom_port_filtering_list = g_slist_copy(custom_port_filtering);
return TETHERING_ERROR_NONE;
}
-/**
- * @internal
- * @brief Sets the visibility of SSID(service set identifier) for Wi-Fi AP.
- * @since_tizen 2.3
- * @privlevel platform
- * @privilege http://tizen.org/privilege/tethering.admin
- * @details If you set the visibility invisible, then the SSID of this device is hidden. So, Wi-Fi scan can't find your device.
- * @details by default visibility is set to true.
- * @remarks This change is applied next time Wi-Fi tethering is enabled
- * @param[in] tethering The handle of tethering
- * @param[in] visible The visibility of SSID: (@c true = visible, @c false = invisible)
- * @return 0 on success, otherwise negative error value.
- * @retval #TETHERING_ERROR_NONE Successful
- * @retval #TETHERING_ERROR_INVALID_PARAMETER Invalid parameter
- * @retval #TETHERING_ERROR_OPERATION_FAILED Operation failed
- * @see tethering_wifi_ap_get_ssid_visibility()
- */
-API int tethering_wifi_ap_set_ssid_visibility(tethering_h tethering, bool visible)
+API int tethering_wifi_is_port_filtering_enabled(tethering_h tethering, bool *filtering_enabled)
{
- CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
_retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
- "parameter(tethering) is NULL\n");
+ "parameter(tethering) is NULL\n");
+ _retvm_if(filtering_enabled == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(filtering_enabled) is NULL\n");
__tethering_h *th = (__tethering_h *)tethering;
- th->visibility = visible;
+
+ *filtering_enabled = th->port_filtering;
+
return TETHERING_ERROR_NONE;
}
-/**
- * @internal
- * @brief Gets the visibility of SSID(service set identifier) for Wi-Fi AP.
- * @since_tizen 2.3
- * @privlevel platform
- * @privilege http://tizen.org/privilege/tethering.admin
- * @details If the visibility is set invisible, then the SSID of this device is hidden. So, Wi-Fi scan can't find your device.
- * @details by default visibility is set to true.
- * @param[in] tethering The handle of tethering
- * @param[out] visible The visibility of SSID: (@c true = visible, @c false = invisible)
- * @return 0 on success, otherwise negative error value.
- * @retval #TETHERING_ERROR_NONE Successful
- * @retval #TETHERING_ERROR_INVALID_PARAMETER Invalid parameter
- * @see tethering_wifi_ap_set_ssid_visibility()
- */
-API int tethering_wifi_ap_get_ssid_visibility(tethering_h tethering, bool *visible)
+API int tethering_wifi_set_vpn_passthrough_rule(tethering_h tethering, tethering_vpn_passthrough_type_e type, bool enable)
{
- CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
- _retvm_if(visible == NULL, TETHERING_ERROR_INVALID_PARAMETER,
- "parameter(visible) is NULL\n");
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
+
+ GVariant *parameters;
+ GError *error = NULL;
+ guint result;
__tethering_h *th = (__tethering_h *)tethering;
- *visible = th->visibility;
+ GDBusProxy *proxy = th->client_bus_proxy;
+
+ parameters = g_dbus_proxy_call_sync(proxy, "set_vpn_passthrough_rule",
+ g_variant_new("(ib)", type, enable),
+ G_DBUS_CALL_FLAGS_NONE, -1, NULL, &error);
+ if (error) {
+ ERR("g_dbus_proxy_call_sync failed because %s\n", error->message);
+
+ if (error->code == G_DBUS_ERROR_ACCESS_DENIED)
+ result = TETHERING_ERROR_PERMISSION_DENIED;
+ else
+ result = TETHERING_ERROR_OPERATION_FAILED;
+
+ g_error_free(error);
+ return result;
+ }
+
+ g_variant_get(parameters, "(u)", &result);
+
+ g_variant_unref(parameters);
+
return TETHERING_ERROR_NONE;
}
-/**
- * @internal
- * @brief Sets the passphrase for Wi-Fi AP.
- * @since_tizen 2.3
- * @privlevel platform
- * @privilege http://tizen.org/privilege/tethering.admin
- * @details If the passphrase is not set, random string of 8 alphabets will be used.
- * @param[in] tethering The handle of tethering
- * @param[in] passphrase The passphrase
- * @return 0 on success, otherwise negative error value.
- * @retval #TETHERING_ERROR_NONE Successful
- * @retval #TETHERING_ERROR_INVALID_PARAMETER Invalid parameter
- * @see tethering_wifi_ap_get_passphrase()
- */
-API int tethering_wifi_ap_set_passphrase(tethering_h tethering, const char *passphrase)
+API int tethering_wifi_push_wps_button(tethering_h tethering)
{
- CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
_retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
- "parameter(tethering) is NULL\n");
- _retvm_if(passphrase == NULL, TETHERING_ERROR_INVALID_PARAMETER,
- "parameter(passphrase) is NULL\n");
-
+ "parameter(tethering) is NULL");
__tethering_h *th = (__tethering_h *)tethering;
- int passphrase_len = 0;
+ GDBusProxy *proxy = th->client_bus_proxy;
+ GVariant *parameters = NULL;
+ int ret = 0;
+ GError *error = NULL;
- passphrase_len = strlen(passphrase);
+ parameters = g_dbus_proxy_call_sync(proxy, "push_wps_button",
+ NULL, G_DBUS_CALL_FLAGS_NONE, -1, NULL, &error);
- if (passphrase_len < TETHERING_WIFI_KEY_MIN_LEN ||
- passphrase_len > TETHERING_WIFI_KEY_MAX_LEN) {
- ERR("parameter(passphrase) is too short or long\n");
- return TETHERING_ERROR_INVALID_PARAMETER;
+ if (error) {
+ ERR("g_dbus_proxy_call_sync failed because %s\n", error->message);
+
+ if (error->code == G_DBUS_ERROR_ACCESS_DENIED)
+ ret = TETHERING_ERROR_PERMISSION_DENIED;
+ else
+ ret = TETHERING_ERROR_OPERATION_FAILED;
+
+ g_error_free(error);
+ return ret;
}
- if (!g_strcmp0(passphrase, th->passphrase))
- return TETHERING_ERROR_NONE;
+ if (parameters != NULL) {
+ g_variant_get(parameters, "(u)", &ret);
+ g_variant_unref(parameters);
+ }
- g_strlcpy(th->passphrase, passphrase, sizeof(th->passphrase));
return TETHERING_ERROR_NONE;
}
-/**
- * @internal
- * @brief Gets the passphrase for Wi-Fi AP.
- * @since_tizen 2.3
- * @privlevel platform
- * @privilege http://tizen.org/privilege/tethering.admin
- * @details If the passphrase is not set, random string of 8 alphabets will be used.
- * @remarks @a passphrase must be released with free() by you.
- * @param[in] tethering The handle of tethering
- * @param[out] passphrase The passphrase
- * @return 0 on success, otherwise negative error value.
- * @retval #TETHERING_ERROR_NONE Successful
- * @retval #TETHERING_ERROR_INVALID_PARAMETER Invalid parameter
- * @retval #TETHERING_ERROR_OUT_OF_MEMORY Out of memory
- * @see tethering_wifi_ap_set_passphrase()
- */
-API int tethering_wifi_ap_get_passphrase(tethering_h tethering, char **passphrase)
+API int tethering_wifi_set_wps_pin(tethering_h tethering, const char *wps_pin)
{
- CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
_retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
- "parameter(tethering) is NULL\n");
- _retvm_if(passphrase == NULL, TETHERING_ERROR_INVALID_PARAMETER,
- "parameter(passphrase) is NULL\n");
+ "parameter(tethering) is NULL");
+ _retvm_if(wps_pin == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(wps_pin) is NULL");
__tethering_h *th = (__tethering_h *)tethering;
+ GDBusProxy *proxy = th->client_bus_proxy;
+ GVariant *parameters = NULL;
+ int ret = 0;
+ GError *error = NULL;
- *passphrase = g_strdup(th->passphrase);
- if (*passphrase == NULL) {
- ERR("strdup is failed\n");
- return TETHERING_ERROR_OUT_OF_MEMORY;
+ parameters = g_dbus_proxy_call_sync(proxy, "set_wps_pin",
+ g_variant_new("(s)", wps_pin), G_DBUS_CALL_FLAGS_NONE, -1, NULL, &error);
+
+ if (error) {
+ ERR("g_dbus_proxy_call_sync failed because %s\n", error->message);
+
+ if (error->code == G_DBUS_ERROR_ACCESS_DENIED)
+ ret = TETHERING_ERROR_PERMISSION_DENIED;
+ else
+ ret = TETHERING_ERROR_OPERATION_FAILED;
+
+ g_error_free(error);
+ return ret;
+ }
+
+ if (parameters != NULL) {
+ g_variant_get(parameters, "(u)", &ret);
+ g_variant_unref(parameters);
}
return TETHERING_ERROR_NONE;
}
-/**
- * @internal
- * @brief Reload the settings (SSID / Passphrase / Security type / SSID visibility) for Wi-Fi AP.
- * @since_tizen 2.3
- * @privlevel platform
- * @privilege http://tizen.org/privilege/tethering.admin
- * @remarks Connected devices via MobileAP will be disconnected when the settings are reloaded
- * @param[in] tethering The handle of tethering
- * @param[in] callback The callback function to invoke
- * @param[in] user_data The user data to be passed to the callback function
- * @return 0 on success, otherwise negative error value.
- * @retval #TETHERING_ERROR_NONE Successful
- * @retval #TETHERING_ERROR_INVALID_PARAMETER Invalid parameter
- * @retval #TETHERING_ERROR_OPERATION_FAILED Operation failed
- */
-API int tethering_wifi_ap_reload_settings(tethering_h tethering, tethering_wifi_ap_settings_reloaded_cb callback, void *user_data)
-
+API int tethering_wifi_is_sharing_supported(tethering_h tethering, bool *supported)
{
- CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE, TETHERING_WIFI_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
_retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
"parameter(tethering) is NULL\n");
- _retvm_if(callback == NULL, TETHERING_ERROR_INVALID_PARAMETER,
- "parameter(callback) is NULL\n");
+ _retvm_if(supported == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(supported) is NULL\n");
+ /** Check if wifi-sharing is supported */
__tethering_h *th = (__tethering_h *)tethering;
- _softap_settings_t set = {"", "", 0, false};
GDBusProxy *proxy = th->client_bus_proxy;
- int ret = 0;
- DBG("+\n");
+ int ret = TETHERING_ERROR_NONE;
+ int count = 0;
+ gchar *key = NULL;
+ GVariant *value = NULL;
+ GVariantIter *iter = NULL;
+ GVariantIter *sub_iter = NULL;
+ GVariant *parameters = NULL;
+ GError *error = NULL;
- if (th->ap_settings_reloaded_cb) {
- ERR("Operation in progress\n");
- return TETHERING_ERROR_OPERATION_FAILED;
+ parameters = g_dbus_proxy_call_sync(proxy, "get_wifi_interfaces",
+ NULL, G_DBUS_CALL_FLAGS_NONE, -1, NULL, &error);
+
+ if (!parameters && error) {
+ ERR("g_dbus_proxy_call_sync failed because %s\n", error->message);
+
+ if (error->code == G_DBUS_ERROR_ACCESS_DENIED)
+ ret = TETHERING_ERROR_PERMISSION_DENIED;
+ else
+ ret = TETHERING_ERROR_OPERATION_FAILED;
+
+ g_error_free(error);
+ goto error;
}
- ret = __prepare_wifi_ap_settings(tethering, &set);
- if (ret != TETHERING_ERROR_NONE) {
- ERR("softap settings initialization failed\n");
- return TETHERING_ERROR_OPERATION_FAILED;
+ g_variant_get(parameters, "(a(a{sv}))", &iter);
+ if (iter == NULL) {
+ g_variant_unref(parameters);
+ ret = TETHERING_ERROR_OPERATION_FAILED;
+ goto error;
+ }
+
+ while (g_variant_iter_loop(iter, "(a{sv})", &sub_iter)) {
+ while (g_variant_iter_loop(sub_iter, "{sv}", &key, &value)) {
+ if (g_strcmp0(key, "IfName") == 0) {
+ const gchar *interface = g_variant_get_string(value, NULL);
+ ERR("interface: %s\n", interface);
+ if (strncmp(interface, "wlan", 4) == 0)
+ count++;
+ }
+ }
}
+ g_variant_unref(parameters);
- th->ap_settings_reloaded_cb = callback;
- th->ap_settings_reloaded_user_data = user_data;
+ if (count > 1)
+ *supported = true;
+ else
+ *supported = false;
- g_dbus_proxy_call(proxy, "reload_wifi_ap_settings",
- g_variant_new("(ssii)", set.ssid, set.key, set.visibility, set.sec_type),
- G_DBUS_CALL_FLAGS_NONE, -1, th->cancellable,
- (GAsyncReadyCallback) __ap_settings_reloaded_cb, (gpointer)tethering);
+error:
+ return ret;
+}
+
+API int tethering_wifi_set_sharing(tethering_h tethering, bool sharing)
+{
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
+
+ __tethering_h *th = (__tethering_h *)tethering;
+ th->wifi_sharing = sharing;
+
+ return TETHERING_ERROR_NONE;
+}
+
+API int tethering_wifi_get_sharing(tethering_h tethering, bool *sharing)
+{
+ CHECK_FEATURE_SUPPORTED(TETHERING_FEATURE);
+ CHECK_FEATURE_SUPPORTED(TETHERING_WIFI_FEATURE);
+
+ _retvm_if(tethering == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(tethering) is NULL\n");
+ _retvm_if(sharing == NULL, TETHERING_ERROR_INVALID_PARAMETER,
+ "parameter(sharing) is NULL\n");
+
+ __tethering_h *th = (__tethering_h *)tethering;
+ *sharing = th->wifi_sharing;
return TETHERING_ERROR_NONE;
}