#define NL80211_ATTR_SCAN_SSIDS 45
#define NL80211_ATTR_MAX 221
-struct bss_scan_info_t{
+struct bss_scan_info_t {
char bssid[NETCONFIG_BSSID_LEN+1];
char ssid[NETCONFIG_SSID_LEN+1];
char vsie[NETCONFIG_MAX_VSIE_LEN+1];
gboolean handle_ip_conflict_set_enable(Wifi *wifi, GDBusMethodInvocation *context,
bool detect)
{
- g_return_val_if_fail(wifi != NULL, FALSE);
+ g_return_val_if_fail(wifi != NULL, TRUE);
if (detect == false) {
else {
netconfig_error_dbus_method_return(context, NETCONFIG_ERROR_INTERNAL, "AlreadyExists");
wifi_complete_ip_conflict_set_enable(wifi, context);
- return FALSE;
+ return TRUE;
}
} else {
is_ip_conflict_detect_enabled = true;
netconfig_error_dbus_method_return(context,
NETCONFIG_ERROR_INTERNAL, "Failed");
wifi_complete_ip_conflict_set_enable(wifi, context);
- return FALSE;
+ return TRUE;
}
} else {
netconfig_error_dbus_method_return(context, NETCONFIG_ERROR_INTERNAL, "AlreadyExists");
wifi_complete_ip_conflict_set_enable(wifi, context);
- return FALSE;
+ return TRUE;
}
}
gboolean handle_is_ip_conflict_detect_enabled(Wifi *wifi, GDBusMethodInvocation *context)
{
- g_return_val_if_fail(wifi != NULL, FALSE);
+ g_return_val_if_fail(wifi != NULL, TRUE);
GVariant *param = NULL;
param = g_variant_new("(b)", is_ip_conflict_detect_enabled);
g_dbus_method_invocation_return_value(context, param);
gboolean handle_set_ip_conflict_period(Wifi *wifi, GDBusMethodInvocation *context, guint initial_time)
{
- g_return_val_if_fail(wifi != NULL, FALSE);
- if (initial_time < MAX_ARP_SEND_TIME && initial_time > MIN_ARP_SEND_TIME)
- return FALSE;
+ g_return_val_if_fail(wifi != NULL, TRUE);
+ if (initial_time < MAX_ARP_SEND_TIME && initial_time > MIN_ARP_SEND_TIME) {
+ netconfig_error_dbus_method_return(context,
+ NETCONFIG_ERROR_INTERNAL, "Failed");
+ return TRUE;
+ }
td.initial_time = 1000 * initial_time;
// remove timer
gboolean handle_get_ip_conflict_state(Wifi *wifi, GDBusMethodInvocation *context)
{
- g_return_val_if_fail(wifi != NULL, FALSE);
+ g_return_val_if_fail(wifi != NULL, TRUE);
GVariant *param = NULL;
param = g_variant_new("(u)", conflict_state);
g_dbus_method_invocation_return_value(context, param);
gboolean handle_get_ip_conflict_period(Wifi *wifi, GDBusMethodInvocation *context)
{
- g_return_val_if_fail(wifi != NULL, FALSE);
+ g_return_val_if_fail(wifi != NULL, TRUE);
GVariant *param = NULL;
param = g_variant_new("(u)", td.initial_time/1000);
g_dbus_method_invocation_return_value(context, param);
if (mptcp_set_enable(enable) == FALSE) {
ERR("Fail to set mptcp_enabled[%d]", enable);
- return FALSE;
+ return TRUE;
}
mptcp_complete_mptcp_set_enable(object, invocation);
value = mptcp_get_enabled();
if (value != 0 && value != 1 && value != 2) {
ERR("Invalid value of mptcp_enabled[%d]", value);
- return FALSE;
+ return TRUE;
}
mptcp_complete_mptcp_get_enabled(object, invocation, value);
if (mptcp_set_path_manager(pm) == FALSE) {
ERR("Fail to set mptcp_path_manager[%d]", pm);
- return FALSE;
+ return TRUE;
}
mptcp_complete_mptcp_set_path_manager(object, invocation);
pm = mptcp_get_path_manager();
if (pm == NULL) {
ERR("Fail to get mptcp_path_manager");
- return FALSE;
+ return TRUE;
}
DBG("get path manager %s", pm);
if (mptcp_mptcp_set_scheduler(scheduler) == FALSE) {
ERR("Fail to set mptcp_scheduler[%s]", scheduler);
- return FALSE;
+ return TRUE;
}
mptcp_complete_mptcp_set_scheduler(object, invocation);
scheduler = mptcp_get_scheduler();
if (scheduler == NULL) {
ERR("Fail to get mptcp_scheduler");
- return FALSE;
+ return TRUE;
}
DBG("get scheduler %s", scheduler);
if (ip_addr == NULL || netmask == NULL || interface == NULL) {
ERR("Invalid parameter");
netconfig_error_invalid_parameter(context);
- return FALSE;
+ return TRUE;
}
if (netconfig_execute_file(path, args, envs) < 0) {
DBG("Failed to add a new route");
netconfig_error_permission_denied(context);
- return FALSE;
+ return TRUE;
}
break;
if (ip_addr == NULL || interface == NULL || gateway == NULL) {
ERR("Invalid parameter");
netconfig_error_invalid_parameter(context);
- return FALSE;
+ return TRUE;
}
buf = ip_addr;
if (netconfig_add_route_ipv6(ip_addr, interface, gateway, prefix_len) < 0) {
DBG("Failed to add a new route");
netconfig_error_permission_denied(context);
- return FALSE;
+ return TRUE;
}
break;
default:
DBG("Unknown Address Family");
netconfig_error_invalid_parameter(context);
- return FALSE;
+ return TRUE;
}
DBG("Successfully added a new route");
if (ip_addr == NULL || netmask == NULL || interface == NULL) {
DBG("Invalid parameter!");
netconfig_error_invalid_parameter(context);
- return FALSE;
+ return TRUE;
}
if (netconfig_execute_file(path, args, envs) < 0) {
DBG("Failed to remove the route");
netconfig_error_permission_denied(context);
- return FALSE;
+ return TRUE;
}
break;
case AF_INET6:
if (ip_addr == NULL || interface == NULL || gateway == NULL) {
DBG("Invalid parameter!");
netconfig_error_invalid_parameter(context);
- return FALSE;
+ return TRUE;
}
buf = ip_addr;
if (netconfig_del_route_ipv6(ip_addr, interface, gateway, prefix_len) < 0) {
DBG("Failed to remove the route");
netconfig_error_permission_denied(context);
- return FALSE;
+ return TRUE;
}
break;
default:
DBG("Unknown Address Family");
netconfig_error_invalid_parameter(context);
- return FALSE;
+ return TRUE;
}
DBG("Successfully removed the route");
if (ret != 0) {
DBG("Failed to get ethernet cable state");
netconfig_error_fail_ethernet_cable_state(context);
- return FALSE;
+ return TRUE;
}
DBG("Successfully get ethernet cable state[%d]", state);
if (address == NULL) {
DBG("Failed to get preferred IPv6 address");
netconfig_error_fail_preferred_ipv6_address(context);
- return FALSE;
+ return TRUE;
}
DBG("Successfully get preferred IPv6 address[%s]", address);
{
if (!netconfig_check_feature_supported(NETCONFIG_SUPPORTED_FEATURE_WIFI_DIRECT)) {
wifi_complete_launch_direct(wifi, context);
- return FALSE;
+ return TRUE;
}
int ret = 0;
if (ret < 0) {
ERR("Failed to launch Wi-Fi direct daemon");
netconfig_error_wifi_direct_failed(context);
- return FALSE;
+ return TRUE;
}
wifi_complete_launch_direct(wifi, context);
gboolean updated = FALSE;
gboolean reply = FALSE;
- g_return_val_if_fail(connman_agent != NULL, FALSE);
+ g_return_val_if_fail(connman_agent != NULL, TRUE);
DBG("Set agent fields for %s", service);
g_dbus_method_invocation_return_gerror(context, error);
g_clear_error(&error);
- return reply;
+ return TRUE;
}
__netconfig_agent_clear_fields();
reply = netconfig_invoke_dbus_method_nonblock(CONNMAN_SERVICE,
service, CONNMAN_SERVICE_INTERFACE, "Connect",
NULL, __netconfig_wifi_connect_reply);
- if (reply != TRUE) {
+ if (reply == TRUE) {
+ g_dbus_method_invocation_return_value(context, NULL);
+ } else {
ERR("Fail to connect Wi-Fi");
__netconfig_agent_clear_fields();
error = g_error_new(G_DBUS_ERROR,
g_dbus_method_invocation_return_gerror(context, error);
g_clear_error(&error);
- g_variant_iter_free(iter);
- return reply;
}
} else {
error = g_error_new(G_DBUS_ERROR,
g_dbus_method_invocation_return_gerror(context, error);
g_clear_error(&error);
- g_variant_iter_free(iter);
- return reply;
}
+ if (reply != TRUE) {
+ ERR("Fail to connect Wi-Fi");
+ __netconfig_agent_clear_fields();
+ }
g_variant_iter_free(iter);
net_connman_agent_complete_set_field(connman_agent, context);
- return reply;
+ return TRUE;
}
gboolean handle_request_input(NetConnmanAgent *connman_agent,
gboolean updated = FALSE;
GVariantBuilder *builder = NULL;
- g_return_val_if_fail(connman_agent != NULL, FALSE);
+ g_return_val_if_fail(connman_agent != NULL, TRUE);
if (NULL == service)
return FALSE;
if (NULL == out_table) {
net_connman_agent_complete_request_input(connman_agent, context, out_table);
- return FALSE;
+ return TRUE;
}
if (updated == TRUE)
__netconfig_agent_clear_fields();
- return updated;
+ return TRUE;
}
gboolean handle_report_error(NetConnmanAgent *connman_agent,
GDBusMethodInvocation *context, const gchar *service, const gchar *error)
{
- gboolean ret = TRUE;
-
- g_return_val_if_fail(connman_agent != NULL, FALSE);
+ g_return_val_if_fail(connman_agent != NULL, TRUE);
net_connman_agent_complete_report_error(connman_agent, context);
DBG("Agent error for service[%s] - [%s]", service, error);
/* Do something when it failed to make a connection */
- return ret;
+ return TRUE;
}
#if defined TIZEN_CAPTIVE_PORTAL
GDBusMethodInvocation *context, const gchar *service, const gchar *url)
{
#if defined TIZEN_CAPTIVE_PORTAL
- gboolean ret = FALSE;
gboolean ignore_portal = FALSE;
const char * ssid = NULL;
- g_return_val_if_fail(connman_agent != NULL, FALSE);
+ g_return_val_if_fail(connman_agent != NULL, TRUE);
DBG("service[%s] - url[%s]", service, url);
if (ssid == NULL) {
ERR("Connected AP name is NULL!!");
net_connman_agent_complete_request_browser(connman_agent, context);
- return FALSE;
+ return TRUE;
}
ignore_portal = __check_ignore_portal_list(ssid);
is_monitor_notifier_registered = TRUE;
}
- ret = netconfig_send_notification_to_net_popup(NETCONFIG_ADD_PORTAL_NOTI, ssid);
+ netconfig_send_notification_to_net_popup(NETCONFIG_ADD_PORTAL_NOTI, ssid);
timer_data.time_elapsed = 0;
__netconfig_wifi_portal_login_timer_start(&timer_data);
net_connman_agent_complete_request_browser(connman_agent, context);
- return ret;
+ return TRUE;
#else
GError *error = NULL;
error = g_error_new(G_DBUS_ERROR,
g_dbus_method_invocation_return_gerror(context, error);
g_clear_error(&error);
- return FALSE;
+ return TRUE;
#endif
}
int err, enabled = 0;
wifi_tech_state_e tech_state;
- g_return_val_if_fail(wifi != NULL, FALSE);
+ g_return_val_if_fail(wifi != NULL, TRUE);
if (netconfig_is_wifi_tethering_on() == TRUE) {
ERR("Wi-Fi Tethering is enabled");
netconfig_error_dbus_method_return(context, NETCONFIG_ERROR_NO_SERVICE, "TetheringEnabled");
- return -EBUSY;
+ return TRUE;
}
#if !defined TIZEN_WEARABLE
if (netconfig_wifi_is_bgscan_paused()) {
ERR("Scan is paused");
netconfig_error_dbus_method_return(context, NETCONFIG_ERROR_NO_SERVICE, "ScanPaused");
- return FALSE;
+ return TRUE;
}
#endif
if (enabled == 0) {
netconfig_error_permission_denied(context);
- return FALSE;
+ return TRUE;
}
}
else
netconfig_error_wifi_driver_failed(context);
- return FALSE;
+ return TRUE;
}
wifi_complete_request_bssid_scan(wifi, context);
guint length;
gchar **result = NULL;
- g_return_val_if_fail(wifi != NULL, FALSE);
+ g_return_val_if_fail(wifi != NULL, TRUE);
config_ids = _get_list();
if (config_ids == NULL) {
ERR("Fail to get config list");
netconfig_error_no_profile(context);
- return FALSE;
+ return TRUE;
}
length = g_slist_length(config_ids);
GVariantBuilder *b = NULL;
struct wifi_config *conf = NULL;
- g_return_val_if_fail(wifi != NULL, FALSE);
+ g_return_val_if_fail(wifi != NULL, TRUE);
conf = g_new0(struct wifi_config, 1);
g_free(conf);
ERR("Fail to _load_configuration");
netconfig_error_no_profile(context);
- return FALSE;
+ return TRUE;
}
b = g_variant_builder_new(G_VARIANT_TYPE("a{sv}"));
if ((wifi == NULL) || (config_id == NULL) || (configuration == NULL)) {
ERR("Invalid parameter");
netconfig_error_invalid_parameter(context);
- return FALSE;
+ return TRUE;
}
conf = g_new0(struct wifi_config, 1);
g_free(conf->proxy_address);
g_free(conf);
ERR("Fail to get_wifi_config_group_name");
- return FALSE;
+ netconfig_error_fail_save_congifuration(context);
+ return TRUE;
}
keyfile = g_key_file_new();
g_variant_iter_free(iter);
- return ret;
+ return TRUE;
}
gboolean handle_load_eap_configuration(Wifi *wifi, GDBusMethodInvocation *context,
GVariantBuilder *b = NULL;
struct wifi_config *conf = NULL;
- g_return_val_if_fail(wifi != NULL, FALSE);
+ g_return_val_if_fail(wifi != NULL, TRUE);
conf = g_new0(struct wifi_config, 1);
conf->eap_config = g_new0(struct wifi_eap_config, 1);
g_free(conf);
ERR("Fail to _load_configuration");
netconfig_error_no_profile(context);
- return FALSE;
+ return TRUE;
}
b = g_variant_builder_new(G_VARIANT_TYPE("a{sv}"));
if ((wifi == NULL) || (config_id == NULL) || (configuration == NULL)) {
ERR("Invalid parameter");
netconfig_error_invalid_parameter(context);
- return FALSE;
+ return TRUE;
}
conf = g_new0(struct wifi_config, 1);
if (ret != TRUE) {
__free_wifi_configuration(conf);
ERR("Fail to get_wifi_config_group_name");
- return FALSE;
+ return TRUE;
}
keyfile = g_key_file_new();
g_variant_iter_free(iter);
- return ret;
+ return TRUE;
}
gboolean handle_remove_configuration(Wifi *wifi, GDBusMethodInvocation *context, const gchar *config_id)
if ((wifi == NULL) || (config_id == NULL)) {
ERR("Invalid parameter");
netconfig_error_invalid_parameter(context);
- return FALSE;
+ return TRUE;
}
ret = _remove_configuration(config_id);
/* no configuration or error */
ERR("No [%s] configuration", config_id);
netconfig_error_no_profile(context);
- return FALSE;
+ return TRUE;
}
wifi_complete_remove_configuration(wifi, context);
- return ret;
+ return TRUE;
}
/* config field key / value */
gboolean ret = FALSE;
gchar *keyfile_key = NULL;
- g_return_val_if_fail(wifi != NULL, FALSE);
- g_return_val_if_fail(config_id != NULL, FALSE);
- g_return_val_if_fail(key != NULL, FALSE);
+ g_return_val_if_fail(wifi != NULL, TRUE);
+ g_return_val_if_fail(config_id != NULL, TRUE);
+ g_return_val_if_fail(key != NULL, TRUE);
DBG("Key[%s] Value[%d]", key, value);
if (!ret) {
ERR("Fail to [%s]set_wifi_config_field(%s/manual)", config_id, WIFI_CONFIG_PROXY_METHOD);
netconfig_error_invalid_parameter(context);
- return FALSE;
+ return TRUE;
}
keyfile_key = g_strdup_printf("%s", WIFI_CONFIG_PROXY_SERVER);
} else if (g_strcmp0(key, WIFI_CONFIG_HIDDEN) == 0) {
} else {
ERR("Not supported key[%s]", key);
netconfig_error_invalid_parameter(context);
- return FALSE;
+ return TRUE;
}
ret = _set_field(config_id, keyfile_key, (const gchar *)value);
if (!ret) {
ERR("Fail to [%s]set_wifi_config_field(%s/%s)", config_id, key, value);
- ret = FALSE;
}
if (keyfile_key != NULL)
g_free(keyfile_key);
wifi_complete_set_config_field(wifi, context);
- return ret;
+ return TRUE;
}
gboolean handle_get_config_passphrase(Wifi *wifi, GDBusMethodInvocation *context, const gchar *config_id)
if ((wifi == NULL) || (config_id == NULL)) {
ERR("Invalid parameter");
netconfig_error_invalid_parameter(context);
- return FALSE;
+ return TRUE;
}
ret = _get_field(config_id, WIFI_CONFIG_PASSPHRASE, &passphrase);
if (!ret) {
ERR("Fail to [%s] _get_field(%s)", config_id, WIFI_CONFIG_PASSPHRASE);
netconfig_error_dbus_method_return(context, NETCONFIG_ERROR_INTERNAL, "OperationFailed");
- return FALSE;
+ return TRUE;
}
wifi_complete_get_config_passphrase(wifi, context, passphrase);
g_free(passphrase);
- return ret;
+ return TRUE;
}
gboolean handle_add_vsie(Wifi *wifi, GDBusMethodInvocation *context,
{
DBG("Frame ID: [%d] VSIE: [%s]", frame_id, vsie);
- g_return_val_if_fail(wifi != NULL, FALSE);
- g_return_val_if_fail(vsie != NULL, FALSE);
+ g_return_val_if_fail(wifi != NULL, TRUE);
+ g_return_val_if_fail(vsie != NULL, TRUE);
gboolean ret = FALSE;
if (!ret) {
DBG("Failed to add vsie: %s", vsie);
netconfig_error_dbus_method_return(context, NETCONFIG_ERROR_INTERNAL, "OperationFailed");
- return ret;
+ return TRUE;
}
wifi_complete_add_vsie(wifi, context);
- return ret;
+ return TRUE;
}
gboolean handle_get_vsie(Wifi *wifi, GDBusMethodInvocation *context,
{
DBG("Frame ID: [%d]", frame_id);
- g_return_val_if_fail(wifi != NULL, FALSE);
+ g_return_val_if_fail(wifi != NULL, TRUE);
gboolean ret = FALSE;
gchar *vsie = NULL;
if (!ret) {
DBG("Failed to get vsie for frame:[%d]", frame_id);
netconfig_error_dbus_method_return(context, NETCONFIG_ERROR_INTERNAL, "OperationFailed");
- return ret;
+ return TRUE;
}
DBG("Received vsie: %s", vsie);
wifi_complete_get_vsie(wifi, context, vsie);
- return ret;
+ return TRUE;
}
gboolean handle_remove_vsie(Wifi *wifi, GDBusMethodInvocation *context,
{
DBG("Frame ID: [%d] VSIE: [%s]", frame_id, vsie);
- g_return_val_if_fail(wifi != NULL, FALSE);
- g_return_val_if_fail(vsie != NULL, FALSE);
+ g_return_val_if_fail(wifi != NULL, TRUE);
+ g_return_val_if_fail(vsie != NULL, TRUE);
gboolean ret = FALSE;
if (!ret) {
DBG("Failed to remove vsie: %s", vsie);
netconfig_error_dbus_method_return(context, NETCONFIG_ERROR_INTERNAL, "OperationFailed");
- return ret;
+ return TRUE;
}
wifi_complete_remove_vsie(wifi, context);
- return ret;
+ return TRUE;
}
const gchar *service, GVariant *fields)
{
gboolean updated = FALSE;
- gboolean reply = FALSE;
gboolean result = FALSE;
- g_return_val_if_fail(wifi != NULL, FALSE);
+ g_return_val_if_fail(wifi != NULL, TRUE);
DBG("Set agent fields for %s", service);
if (netconfig_is_wifi_profile(service) != TRUE) {
netconfig_error_dbus_method_return(context, NETCONFIG_ERROR_WRONG_PROFILE, "InvalidService");
- return reply;
+ return TRUE;
}
updated = __netconfig_create_config(fields);
if (result != TRUE)
ERR("Fail to connect %s", service);
- else
- reply = TRUE;
- return reply;
+ return TRUE;
}
gboolean handle_delete_eap_config(Wifi *wifi, GDBusMethodInvocation *context,
const gchar *profile)
{
- g_return_val_if_fail(wifi != NULL, FALSE);
+ g_return_val_if_fail(wifi != NULL, TRUE);
wifi_complete_delete_eap_config(wifi, context);
- gboolean ret = __netconfig_delete_config((const char *)profile);
+ __netconfig_delete_config((const char *)profile);
- return ret;
+ return TRUE;
}
gboolean handle_get_sim_imsi(Wifi *wifi, GDBusMethodInvocation *context)
{
- gboolean ret = TRUE;
-
DBG("Get IMSI");
- g_return_val_if_fail(wifi != NULL, FALSE);
+ g_return_val_if_fail(wifi != NULL, TRUE);
- ret = __netconfig_wifi_get_sim_imsi(wifi, context);
+ __netconfig_wifi_get_sim_imsi(wifi, context);
- return ret;
+ return TRUE;
}
gboolean handle_req_sim_auth(Wifi *wifi, GDBusMethodInvocation *context, GVariant *rand_data)
DBG("Request SIM Authentication");
- g_return_val_if_fail(wifi != NULL, FALSE);
+ g_return_val_if_fail(wifi != NULL, TRUE);
g_variant_get(rand_data, "ay", &iter);
length = g_variant_iter_n_children(iter);
if (result)
wifi_complete_req_sim_auth(wifi, context, result);
- return result;
+ return TRUE;
}
gboolean handle_req_aka_auth(Wifi *wifi, GDBusMethodInvocation *context, GVariant *rand_data, GVariant *autn_data)
DBG("Request AKA Authentication");
- g_return_val_if_fail(wifi != NULL, FALSE);
+ g_return_val_if_fail(wifi != NULL, TRUE);
g_variant_get(rand_data, "ay", &iter);
length = g_variant_iter_n_children(iter);
g_array_free(rand_data_garray, FALSE);
g_array_free(autn_data_garray, FALSE);
- return result;
+ return TRUE;
}
gboolean handle_get_sim_auth(Wifi *wifi, GDBusMethodInvocation *context)
{
- gboolean ret = TRUE;
-
DBG("Get SIM Authdata");
- g_return_val_if_fail(wifi != NULL, FALSE);
+ g_return_val_if_fail(wifi != NULL, TRUE);
- ret = __netconfig_wifi_get_sim_authdata(wifi, context, &wifi_authdata);
- return ret;
+ __netconfig_wifi_get_sim_authdata(wifi, context, &wifi_authdata);
+
+ return TRUE;
}
gboolean handle_get_aka_auth(Wifi *wifi, GDBusMethodInvocation *context)
{
- gboolean ret = TRUE;
-
DBG("Get AKA Authdata");
- g_return_val_if_fail(wifi != NULL, FALSE);
+ g_return_val_if_fail(wifi != NULL, TRUE);
- ret = __netconfig_wifi_get_aka_authdata(wifi, context, &wifi_authdata);
+ __netconfig_wifi_get_aka_authdata(wifi, context, &wifi_authdata);
- return ret;
+ return TRUE;
}
EXPORT_SYM void netconfig_complete_get_sim_imsi(void *wifi, GDBusMethodInvocation *context, char *imsi)
{
DBG("Wi-Fi flush bss");
- g_return_val_if_fail(wifi != NULL, FALSE);
+ g_return_val_if_fail(wifi != NULL, TRUE);
GDBusConnection *connection = NULL;
char *if_path = NULL;
if (if_path == NULL) {
netconfig_error_dbus_method_return(context, NETCONFIG_ERROR_INTERNAL, "FailFlushBss");
DBG("Fail to get wpa_supplicant DBus path");
- return FALSE;
+ return TRUE;
}
connection = netdbus_get_connection();
netconfig_error_dbus_method_return(context, NETCONFIG_ERROR_INTERNAL, "FailFlushBss");
ERR("Failed to get netdbus connection");
g_free(if_path);
- return FALSE;
+ return TRUE;
}
{
int err;
- g_return_val_if_fail(firmware != NULL, FALSE);
+ g_return_val_if_fail(firmware != NULL, TRUE);
DBG("Wi-Fi firmware start %s", device != NULL ? device : "null");
} else
netconfig_error_wifi_driver_failed(context);
- return FALSE;
+ return TRUE;
}
wifi_firmware_complete_start(firmware, context);
{
int err;
- g_return_val_if_fail(firmware != NULL, FALSE);
+ g_return_val_if_fail(firmware != NULL, TRUE);
DBG("Wi-Fi firmware stop %s", device != NULL ? device : "null");
else
netconfig_error_wifi_driver_failed(context);
- return FALSE;
+ return TRUE;
}
wifi_firmware_complete_stop(firmware, context);
if (!enc_data) {
ERR("Failed to encrypt the passphrase");
netconfig_error_dbus_method_return(context, NETCONFIG_ERROR_INTERNAL, "OperationFailed");
- return FALSE;
+ return TRUE;
}
wifi_complete_encrypt_passphrase(wifi, context, enc_data);
if ((wifi == NULL) || (enc_data == NULL)) {
ERR("Invalid parameter");
netconfig_error_invalid_parameter(context);
- return FALSE;
+ return TRUE;
}
passphrase = _netconfig_decrypt_passphrase(enc_data);
if (!passphrase) {
ERR("Failed to decrypt the passphrase");
netconfig_error_dbus_method_return(context, NETCONFIG_ERROR_INTERNAL, "OperationFailed");
- return FALSE;
+ return TRUE;
}
wifi_complete_decrypt_passphrase(wifi, context, passphrase);
if (ret < 0) {
DBG("__netconfig_initialize_nl80211() failed, error %d", ret);
wifi_complete_netlink_scan(wifi, context);
- return ret;
+ return TRUE;
}
/** Request NL80211_CMD_TRIGGER_SCAN to the kernel. */
if (ret < 0) {
DBG("__netconfig_request_netlink_scan() failed, error %d", ret);
wifi_complete_netlink_scan(wifi, context);
- return ret;
+ return TRUE;
}
ret = __netconfig_initialize_nl_msg(&global);
if (ret < 0) {
DBG("__netconfig_initialize_nl_msg() failed, error %d", ret);
wifi_complete_netlink_scan(wifi, context);
- return ret;
+ return TRUE;
}
ret = nl_send_auto_complete(global.socket, global.msg);
if (ret < 0) {
DBG("nl_recvmsgs_default() failed. ret: %d (error: %s)", ret, nl_geterror(-ret));
wifi_complete_netlink_scan(wifi, context);
- return ret;
+ return TRUE;
}
wifi_complete_netlink_scan(wifi, context);
__netconfig_notify_netlink_scan_done();
- return 1;
+ return TRUE;
}
gboolean handle_get_passpoint(Wifi *wifi, GDBusMethodInvocation *context)
{
gint32 enable = 0;
- g_return_val_if_fail(wifi != NULL, FALSE);
+ g_return_val_if_fail(wifi != NULL, TRUE);
#if defined TIZEN_WLAN_PASSPOINT
if (netconfig_wifi_get_passpoint(&enable)) {
return TRUE;
}
wifi_complete_get_passpoint(wifi, context, enable);
- return FALSE;
+ return TRUE;
#else
enable = 0;
wifi_complete_get_passpoint(wifi, context, enable);
gboolean handle_set_passpoint(Wifi *wifi, GDBusMethodInvocation *context, gint enable)
{
- gboolean result = FALSE;
- g_return_val_if_fail(wifi != NULL, FALSE);
+ g_return_val_if_fail(wifi != NULL, TRUE);
#if defined TIZEN_WLAN_PASSPOINT
- result = netconfig_wifi_set_passpoint(enable);
- wifi_complete_set_passpoint(wifi, context);
- return result;
-#else
- wifi_complete_set_passpoint(wifi, context);
- return result;
+ netconfig_wifi_set_passpoint(enable);
#endif
+ wifi_complete_set_passpoint(wifi, context);
+ return TRUE;
}
DBG("Wi-Fi power on requested");
- g_return_val_if_fail(wifi != NULL, FALSE);
+ g_return_val_if_fail(wifi != NULL, TRUE);
if (!netconfig_dpm_update_from_wifi()) {
DBG("DPM policy restricts Wi-Fi");
DBG("Wi-Fi power off requested");
- g_return_val_if_fail(wifi != NULL, FALSE);
+ g_return_val_if_fail(wifi != NULL, TRUE);
err = wifi_power_off();
if (err < 0) {
*/
gboolean handle_get_wifi_state(Wifi *wifi, GDBusMethodInvocation *context)
{
- g_return_val_if_fail(wifi != NULL, FALSE);
+ g_return_val_if_fail(wifi != NULL, TRUE);
GVariant *param = NULL;
wifi_tech_state_e tech_state = NETCONFIG_WIFI_TECH_UNKNOWN;
wifi_service_state_e service_state = NETCONFIG_WIFI_UNKNOWN;
if (message == NULL) {
ERR(" TDLS : failed to connect !!!");
netconfig_error_dbus_method_return(context, NETCONFIG_ERROR_INTERNAL, "FailTdlsConnect");
- return FALSE;
+ return TRUE;
}
DBG("[TizenMW<--WPAS] TDLS DBUS Command sent successfully");
ERR(" TDLS : failed to discover !!!");
netconfig_error_dbus_method_return(context, NETCONFIG_ERROR_INTERNAL, "FailTdlsDiscover");
wifi_complete_tdls_discover(wifi, context, NETCONFIG_ERROR_TDLS_FAIL_DISCOVER);
- return FALSE;
+ return TRUE;
}
DBG(" TDLS DBUS Command sent successfully");
if (message == NULL) {
ERR(" TDLS : failed to disconnect !!!");
netconfig_error_dbus_method_return(context, NETCONFIG_ERROR_INTERNAL, "FailTdlsDisconnect");
- return FALSE;
+ return TRUE;
}
DBG("[TizenMW<--WPAS] TDLS DBUS Command sent successfully");
gboolean handle_request_wps_cancel(Wifi *wifi, GDBusMethodInvocation *context)
{
INFO("Received WPS PBC Cancel Request");
- g_return_val_if_fail(wifi != NULL, FALSE);
+ g_return_val_if_fail(wifi != NULL, TRUE);
__netconfig_wifi_invoke_wps_cancel();
wifi_complete_request_wps_cancel(wifi, context);
{
INFO("Received WPS PBC/PIN Connection Request");
- g_return_val_if_fail(wifi != NULL, FALSE);
+ g_return_val_if_fail(wifi != NULL, TRUE);
/* Checking the value of pin if param have a string "PBC"
* in that scenario PBC will trigger otherwise PIN Connection */