technology: return already enabled when tethering is enabled
[framework/connectivity/connman.git] / src / agent.c
1 /*
2  *
3  *  Connection Manager
4  *
5  *  Copyright (C) 2007-2012  Intel Corporation. All rights reserved.
6  *
7  *  This program is free software; you can redistribute it and/or modify
8  *  it under the terms of the GNU General Public License version 2 as
9  *  published by the Free Software Foundation.
10  *
11  *  This program is distributed in the hope that it will be useful,
12  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
13  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14  *  GNU General Public License for more details.
15  *
16  *  You should have received a copy of the GNU General Public License
17  *  along with this program; if not, write to the Free Software
18  *  Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA
19  *
20  */
21
22 #ifdef HAVE_CONFIG_H
23 #include <config.h>
24 #endif
25
26 #include <errno.h>
27 #include <stdlib.h>
28 #include <string.h>
29
30 #include <gdbus.h>
31
32 #include "connman.h"
33
34 static DBusConnection *connection = NULL;
35 static guint agent_watch = 0;
36 static gchar *agent_path = NULL;
37 static gchar *agent_sender = NULL;
38
39 static void agent_free(void)
40 {
41         agent_watch = 0;
42
43         g_free(agent_sender);
44         agent_sender = NULL;
45
46         g_free(agent_path);
47         agent_path = NULL;
48 }
49
50 static void agent_disconnect(DBusConnection *connection, void *data)
51 {
52         DBG("data %p", data);
53
54         agent_free();
55 }
56
57 int __connman_agent_register(const char *sender, const char *path)
58 {
59         DBG("sender %s path %s", sender, path);
60
61         if (agent_path != NULL)
62                 return -EEXIST;
63
64         agent_sender = g_strdup(sender);
65         agent_path = g_strdup(path);
66
67         agent_watch = g_dbus_add_disconnect_watch(connection, sender,
68                                                 agent_disconnect, NULL, NULL);
69
70         return 0;
71 }
72
73 int __connman_agent_unregister(const char *sender, const char *path)
74 {
75         DBG("sender %s path %s", sender, path);
76
77         if (agent_path == NULL)
78                 return -ESRCH;
79
80         if (agent_watch > 0)
81                 g_dbus_remove_watch(connection, agent_watch);
82
83         agent_free();
84
85         return 0;
86 }
87
88 static connman_bool_t check_reply_has_dict(DBusMessage *reply)
89 {
90         const char *signature = DBUS_TYPE_ARRAY_AS_STRING
91                 DBUS_DICT_ENTRY_BEGIN_CHAR_AS_STRING
92                 DBUS_TYPE_STRING_AS_STRING
93                 DBUS_TYPE_VARIANT_AS_STRING
94                 DBUS_DICT_ENTRY_END_CHAR_AS_STRING;
95
96         if (dbus_message_has_signature(reply, signature) == TRUE)
97                 return TRUE;
98
99         connman_warn("Reply %s to %s from %s has wrong signature %s",
100                         signature,
101                         dbus_message_get_interface(reply),
102                         dbus_message_get_sender(reply),
103                         dbus_message_get_signature(reply));
104
105         return FALSE;
106 }
107
108 struct request_input_reply {
109         struct connman_service *service;
110         authentication_cb_t callback;
111         void *user_data;
112 };
113
114 static void request_input_passphrase_reply(DBusPendingCall *call, void *user_data)
115 {
116         struct request_input_reply *passphrase_reply = user_data;
117         connman_bool_t values_received = FALSE;
118         connman_bool_t wps = FALSE;
119         const char *error = NULL;
120         char *identity = NULL;
121         char *passphrase = NULL;
122         char *wpspin = NULL;
123         char *key;
124         char *name = NULL;
125         int name_len = 0;
126         DBusMessageIter iter, dict;
127         DBusMessage *reply = dbus_pending_call_steal_reply(call);
128
129         if (dbus_message_get_type(reply) == DBUS_MESSAGE_TYPE_ERROR) {
130                 error = dbus_message_get_error_name(reply);
131                 goto done;
132         }
133
134         if (check_reply_has_dict(reply) == FALSE)
135                 goto done;
136
137         values_received = TRUE;
138
139         dbus_message_iter_init(reply, &iter);
140         dbus_message_iter_recurse(&iter, &dict);
141         while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_DICT_ENTRY) {
142                 DBusMessageIter entry, value;
143
144                 dbus_message_iter_recurse(&dict, &entry);
145                 if (dbus_message_iter_get_arg_type(&entry) != DBUS_TYPE_STRING)
146                         break;
147
148                 dbus_message_iter_get_basic(&entry, &key);
149
150                 if (g_str_equal(key, "Identity")) {
151                         dbus_message_iter_next(&entry);
152                         if (dbus_message_iter_get_arg_type(&entry)
153                                                         != DBUS_TYPE_VARIANT)
154                                 break;
155                         dbus_message_iter_recurse(&entry, &value);
156                         dbus_message_iter_get_basic(&value, &identity);
157
158                 } else if (g_str_equal(key, "Passphrase")) {
159                         dbus_message_iter_next(&entry);
160                         if (dbus_message_iter_get_arg_type(&entry) != DBUS_TYPE_VARIANT)
161                                 break;
162                         dbus_message_iter_recurse(&entry, &value);
163                         dbus_message_iter_get_basic(&value, &passphrase);
164
165                 } else if (g_str_equal(key, "WPS")) {
166                         wps = TRUE;
167
168                         dbus_message_iter_next(&entry);
169                         if (dbus_message_iter_get_arg_type(&entry)
170                                                         != DBUS_TYPE_VARIANT)
171                                 break;
172                         dbus_message_iter_recurse(&entry, &value);
173                         dbus_message_iter_get_basic(&value, &wpspin);
174                         break;
175                 } else if (g_str_equal(key, "Name")) {
176                         dbus_message_iter_next(&entry);
177                         if (dbus_message_iter_get_arg_type(&entry)
178                                                         != DBUS_TYPE_VARIANT)
179                                 break;
180                         dbus_message_iter_recurse(&entry, &value);
181                         dbus_message_iter_get_basic(&value, &name);
182                         name_len = strlen(name);
183                 } else if (g_str_equal(key, "SSID")) {
184                         dbus_message_iter_next(&entry);
185                         if (dbus_message_iter_get_arg_type(&entry)
186                                                         != DBUS_TYPE_VARIANT)
187                                 break;
188                         dbus_message_iter_recurse(&entry, &value);
189                         if (dbus_message_iter_get_arg_type(&value)
190                                                         != DBUS_TYPE_VARIANT)
191                                 break;
192                         if (dbus_message_iter_get_element_type(&value)
193                                                         != DBUS_TYPE_VARIANT)
194                                 break;
195                         dbus_message_iter_get_fixed_array(&value, &name,
196                                                         &name_len);
197                 }
198                 dbus_message_iter_next(&dict);
199         }
200
201 done:
202         passphrase_reply->callback(passphrase_reply->service, values_received,
203                                 name, name_len,
204                                 identity, passphrase,
205                                 wps, wpspin, error,
206                                 passphrase_reply->user_data);
207         connman_service_unref(passphrase_reply->service);
208         dbus_message_unref(reply);
209         dbus_pending_call_unref(call);
210         g_free(passphrase_reply);
211 }
212
213 static void request_input_append_alternates(DBusMessageIter *iter,
214                                                         void *user_data)
215 {
216         const char *str = user_data;
217         char **alternates, **alternative;
218
219         if (str == NULL)
220                 return;
221
222         alternates = g_strsplit(str, ",", 0);
223         if (alternates == NULL)
224                 return;
225
226         for (alternative = alternates; *alternative != NULL; alternative++)
227                 dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING,
228                                                                 alternative);
229
230         g_strfreev(alternates);
231 }
232
233 static void request_input_append_identity(DBusMessageIter *iter,
234                                                         void *user_data)
235 {
236         char *str = "string";
237
238         connman_dbus_dict_append_basic(iter, "Type",
239                                 DBUS_TYPE_STRING, &str);
240         str = "mandatory";
241         connman_dbus_dict_append_basic(iter, "Requirement",
242                                 DBUS_TYPE_STRING, &str);
243 }
244
245 static void request_input_append_passphrase(DBusMessageIter *iter,
246                                                         void *user_data)
247 {
248         struct connman_service *service = user_data;
249         char *value;
250         const char *phase2;
251
252         switch (__connman_service_get_security(service)) {
253         case CONNMAN_SERVICE_SECURITY_WEP:
254                 value = "wep";
255                 break;
256         case CONNMAN_SERVICE_SECURITY_PSK:
257                 value = "psk";
258                 break;
259         case CONNMAN_SERVICE_SECURITY_8021X:
260                 phase2 = __connman_service_get_phase2(service);
261
262                 if (phase2 != NULL && (
263                                 g_str_has_suffix(phase2, "GTC") == TRUE ||
264                                 g_str_has_suffix(phase2, "OTP") == TRUE))
265                         value = "response";
266                 else
267                         value = "passphrase";
268
269                 break;
270         default:
271                 value = "string";
272                 break;
273         }
274         connman_dbus_dict_append_basic(iter, "Type",
275                                 DBUS_TYPE_STRING, &value);
276         value = "mandatory";
277         connman_dbus_dict_append_basic(iter, "Requirement",
278                                 DBUS_TYPE_STRING, &value);
279
280         if (__connman_service_wps_enabled(service) == TRUE) {
281                 connman_dbus_dict_append_array(iter, "Alternates",
282                                         DBUS_TYPE_STRING,
283                                         request_input_append_alternates,
284                                         "WPS");
285         }
286 }
287
288 static void request_input_append_wps(DBusMessageIter *iter, void *user_data)
289 {
290         const char *str = "wpspin";
291
292         connman_dbus_dict_append_basic(iter, "Type",
293                                 DBUS_TYPE_STRING, &str);
294         str = "alternate";
295         connman_dbus_dict_append_basic(iter, "Requirement",
296                                 DBUS_TYPE_STRING, &str);
297 }
298
299 static void request_input_append_name(DBusMessageIter *iter, void *user_data)
300 {
301         const char *str = "string";
302
303         connman_dbus_dict_append_basic(iter, "Type",
304                                 DBUS_TYPE_STRING, &str);
305         str = "mandatory";
306         connman_dbus_dict_append_basic(iter, "Requirement",
307                                 DBUS_TYPE_STRING, &str);
308         connman_dbus_dict_append_array(iter, "Alternates",
309                                 DBUS_TYPE_STRING,
310                                 request_input_append_alternates,
311                                 "SSID");
312 }
313
314 static void request_input_append_ssid(DBusMessageIter *iter, void *user_data)
315 {
316         const char *str = "ssid";
317
318         connman_dbus_dict_append_basic(iter, "Type",
319                                 DBUS_TYPE_STRING, &str);
320         str = "alternate";
321         connman_dbus_dict_append_basic(iter, "Requirement",
322                                 DBUS_TYPE_STRING, &str);
323 }
324
325 static void request_input_append_password(DBusMessageIter *iter,
326                                                         void *user_data)
327 {
328         char *str = "passphrase";
329
330         connman_dbus_dict_append_basic(iter, "Type",
331                                 DBUS_TYPE_STRING, &str);
332         str = "mandatory";
333         connman_dbus_dict_append_basic(iter, "Requirement",
334                                 DBUS_TYPE_STRING, &str);
335 }
336
337 static void request_input_append_previouspassphrase(DBusMessageIter *iter,
338                                                         void *user_data)
339 {
340         struct connman_service *service = user_data;
341         enum connman_service_security security;
342         const char *passphrase, *str = NULL;
343
344         passphrase = __connman_service_get_passphrase(service);
345
346         security = __connman_service_get_security(service);
347         switch (security) {
348         case CONNMAN_SERVICE_SECURITY_WEP:
349                 str = "wep";
350                 break;
351         case CONNMAN_SERVICE_SECURITY_PSK:
352                 str  = "psk";
353                 break;
354         /*
355          * This should never happen: no passphrase is set if security is not
356          * one of the above.*/
357         default:
358                 break;
359         }
360
361         connman_dbus_dict_append_basic(iter, "Type",
362                                 DBUS_TYPE_STRING, &str);
363
364         str = "informational";
365         connman_dbus_dict_append_basic(iter, "Requirement",
366                                 DBUS_TYPE_STRING, &str);
367
368         connman_dbus_dict_append_basic(iter, "Value",
369                                 DBUS_TYPE_STRING, &passphrase);
370 }
371
372 static void request_input_login_reply(DBusPendingCall *call, void *user_data)
373 {
374         struct request_input_reply *username_password_reply = user_data;
375         const char *error = NULL;
376         connman_bool_t values_received = FALSE;
377         char *username = NULL;
378         char *password = NULL;
379         char *key;
380         DBusMessageIter iter, dict;
381         DBusMessage *reply = dbus_pending_call_steal_reply(call);
382
383         if (dbus_message_get_type(reply) == DBUS_MESSAGE_TYPE_ERROR) {
384                 error = dbus_message_get_error_name(reply);
385                 goto done;
386         }
387
388         if (check_reply_has_dict(reply) == FALSE)
389                 goto done;
390
391         values_received = TRUE;
392
393         dbus_message_iter_init(reply, &iter);
394         dbus_message_iter_recurse(&iter, &dict);
395         while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_DICT_ENTRY) {
396                 DBusMessageIter entry, value;
397
398                 dbus_message_iter_recurse(&dict, &entry);
399                 if (dbus_message_iter_get_arg_type(&entry) != DBUS_TYPE_STRING)
400                         break;
401
402                 dbus_message_iter_get_basic(&entry, &key);
403
404                 if (g_str_equal(key, "Username")) {
405                         dbus_message_iter_next(&entry);
406                         if (dbus_message_iter_get_arg_type(&entry)
407                                                         != DBUS_TYPE_VARIANT)
408                                 break;
409                         dbus_message_iter_recurse(&entry, &value);
410                         dbus_message_iter_get_basic(&value, &username);
411
412                 } else if (g_str_equal(key, "Password")) {
413                         dbus_message_iter_next(&entry);
414                         if (dbus_message_iter_get_arg_type(&entry) !=
415                                                         DBUS_TYPE_VARIANT)
416                                 break;
417                         dbus_message_iter_recurse(&entry, &value);
418                         dbus_message_iter_get_basic(&value, &password);
419                 }
420
421                 dbus_message_iter_next(&dict);
422         }
423
424 done:
425         username_password_reply->callback(username_password_reply->service,
426                                         values_received, NULL, 0,
427                                         username, password,
428                                         FALSE, NULL, error,
429                                         username_password_reply->user_data);
430         connman_service_unref(username_password_reply->service);
431         dbus_message_unref(reply);
432         g_free(username_password_reply);
433 }
434
435 int __connman_agent_request_passphrase_input(struct connman_service *service,
436                                 authentication_cb_t callback, void *user_data)
437 {
438         DBusMessage *message;
439         const char *path;
440         DBusMessageIter iter;
441         DBusMessageIter dict;
442         DBusPendingCall *call;
443         struct request_input_reply *passphrase_reply;
444
445         if (service == NULL || agent_path == NULL || callback == NULL)
446                 return -ESRCH;
447
448         message = dbus_message_new_method_call(agent_sender, agent_path,
449                                         CONNMAN_AGENT_INTERFACE,
450                                         "RequestInput");
451         if (message == NULL)
452                 return -ENOMEM;
453
454         dbus_message_iter_init_append(message, &iter);
455
456         path = __connman_service_get_path(service);
457         dbus_message_iter_append_basic(&iter,
458                                 DBUS_TYPE_OBJECT_PATH, &path);
459
460         connman_dbus_dict_open(&iter, &dict);
461
462         if (__connman_service_is_hidden(service)) {
463                 connman_dbus_dict_append_dict(&dict, "Name",
464                                         request_input_append_name, NULL);
465                 connman_dbus_dict_append_dict(&dict, "SSID",
466                                         request_input_append_ssid, NULL);
467         }
468
469         if (__connman_service_get_security(service) ==
470                         CONNMAN_SERVICE_SECURITY_8021X) {
471                 connman_dbus_dict_append_dict(&dict, "Identity",
472                                         request_input_append_identity, service);
473         }
474
475         if (__connman_service_get_security(service) !=
476                         CONNMAN_SERVICE_SECURITY_NONE) {
477                 connman_dbus_dict_append_dict(&dict, "Passphrase",
478                                         request_input_append_passphrase, service);
479
480                 if (__connman_service_get_passphrase(service) != NULL)
481                         connman_dbus_dict_append_dict(&dict, "PreviousPassphrase",
482                                         request_input_append_previouspassphrase,
483                                         service);
484         }
485
486         if (__connman_service_wps_enabled(service) == TRUE) {
487             connman_dbus_dict_append_dict(&dict, "WPS",
488                                 request_input_append_wps, NULL);
489         }
490
491         connman_dbus_dict_close(&iter, &dict);
492
493         passphrase_reply = g_try_new0(struct request_input_reply, 1);
494         if (passphrase_reply == NULL) {
495                 dbus_message_unref(message);
496                 return -ENOMEM;
497         }
498
499         if (dbus_connection_send_with_reply(connection, message, &call,
500                                         connman_timeout_input_request())
501                         == FALSE) {
502                 dbus_message_unref(message);
503                 g_free(passphrase_reply);
504                 return -ESRCH;
505         }
506
507         if (call == NULL) {
508                 dbus_message_unref(message);
509                 g_free(passphrase_reply);
510                 return -ESRCH;
511         }
512
513         passphrase_reply->service = connman_service_ref(service);
514         passphrase_reply->callback = callback;
515         passphrase_reply->user_data = user_data;
516
517         dbus_pending_call_set_notify(call, request_input_passphrase_reply,
518                                 passphrase_reply, NULL);
519
520         dbus_message_unref(message);
521
522         return -EINPROGRESS;
523 }
524
525 int __connman_agent_request_login_input(struct connman_service *service,
526                                 authentication_cb_t callback, void *user_data)
527 {
528         DBusMessage *message;
529         const char *path;
530         DBusMessageIter iter;
531         DBusMessageIter dict;
532         DBusPendingCall *call;
533         struct request_input_reply *username_password_reply;
534
535         if (service == NULL || agent_path == NULL || callback == NULL)
536                 return -ESRCH;
537
538         message = dbus_message_new_method_call(agent_sender, agent_path,
539                                         CONNMAN_AGENT_INTERFACE,
540                                         "RequestInput");
541         if (message == NULL)
542                 return -ENOMEM;
543
544         dbus_message_iter_init_append(message, &iter);
545
546         path = __connman_service_get_path(service);
547         dbus_message_iter_append_basic(&iter,
548                                 DBUS_TYPE_OBJECT_PATH, &path);
549
550         connman_dbus_dict_open(&iter, &dict);
551
552         connman_dbus_dict_append_dict(&dict, "Username",
553                                 request_input_append_identity, service);
554
555         connman_dbus_dict_append_dict(&dict, "Password",
556                                 request_input_append_password, service);
557
558         connman_dbus_dict_close(&iter, &dict);
559
560         username_password_reply = g_try_new0(struct request_input_reply, 1);
561         if (username_password_reply == NULL) {
562                 dbus_message_unref(message);
563                 return -ENOMEM;
564         }
565
566         if (dbus_connection_send_with_reply(connection, message, &call,
567                                         connman_timeout_input_request())
568                         == FALSE) {
569                 dbus_message_unref(message);
570                 g_free(username_password_reply);
571                 return -ESRCH;
572         }
573
574         if (call == NULL) {
575                 dbus_message_unref(message);
576                 g_free(username_password_reply);
577                 return -ESRCH;
578         }
579
580         username_password_reply->service = connman_service_ref(service);
581         username_password_reply->callback = callback;
582         username_password_reply->user_data = user_data;
583
584         dbus_pending_call_set_notify(call, request_input_login_reply,
585                                                 username_password_reply, NULL);
586
587         dbus_message_unref(message);
588
589         return -EINPROGRESS;
590 }
591
592 struct request_browser_reply_data {
593         struct connman_service *service;
594         browser_authentication_cb_t callback;
595         void *user_data;
596 };
597
598 static void request_browser_reply(DBusPendingCall *call, void *user_data)
599 {
600         struct request_browser_reply_data *browser_reply_data = user_data;
601         DBusMessage *reply = dbus_pending_call_steal_reply(call);
602         connman_bool_t result = FALSE;
603         const char *error = NULL;
604
605         if (dbus_message_get_type(reply) == DBUS_MESSAGE_TYPE_ERROR) {
606                 error = dbus_message_get_error_name(reply);
607                 goto done;
608         }
609
610         result = TRUE;
611
612 done:
613         browser_reply_data->callback(browser_reply_data->service, result,
614                                         error, browser_reply_data->user_data);
615         connman_service_unref(browser_reply_data->service);
616         dbus_message_unref(reply);
617         g_free(browser_reply_data);
618 }
619
620 int __connman_agent_request_browser(struct connman_service *service,
621                                 browser_authentication_cb_t callback,
622                                 const char *url, void *user_data)
623 {
624         struct request_browser_reply_data *browser_reply_data;
625         DBusPendingCall *call;
626         DBusMessage *message;
627         DBusMessageIter iter;
628         const char *path;
629
630         if (service == NULL || agent_path == NULL || callback == NULL)
631                 return -ESRCH;
632
633         if (url == NULL)
634                 url = "";
635
636         message = dbus_message_new_method_call(agent_sender, agent_path,
637                                         CONNMAN_AGENT_INTERFACE,
638                                         "RequestBrowser");
639         if (message == NULL)
640                 return -ENOMEM;
641
642         dbus_message_iter_init_append(message, &iter);
643
644         path = __connman_service_get_path(service);
645         dbus_message_iter_append_basic(&iter, DBUS_TYPE_OBJECT_PATH, &path);
646
647         dbus_message_iter_append_basic(&iter, DBUS_TYPE_STRING, &url);
648
649         browser_reply_data = g_try_new0(struct request_browser_reply_data, 1);
650         if (browser_reply_data == NULL) {
651                 dbus_message_unref(message);
652                 return -ENOMEM;
653         }
654
655         if (dbus_connection_send_with_reply(connection, message, &call,
656                                         connman_timeout_browser_launch())
657                         == FALSE) {
658                 dbus_message_unref(message);
659                 g_free(browser_reply_data);
660                 return -ESRCH;
661         }
662
663         if (call == NULL) {
664                 dbus_message_unref(message);
665                 g_free(browser_reply_data);
666                 return -ESRCH;
667         }
668
669         browser_reply_data->service = connman_service_ref(service);
670         browser_reply_data->callback = callback;
671         browser_reply_data->user_data = user_data;
672
673         dbus_pending_call_set_notify(call, request_browser_reply,
674                                                 browser_reply_data, NULL);
675
676         dbus_message_unref(message);
677
678         return -EINPROGRESS;
679 }
680
681 struct report_error_data {
682         struct connman_service *service;
683         report_error_cb_t callback;
684         void *user_data;
685 };
686
687 static void report_error_reply(DBusPendingCall *call, void *user_data)
688 {
689         struct report_error_data *report_error = user_data;
690         DBusMessage *reply = dbus_pending_call_steal_reply(call);
691         gboolean retry = FALSE;
692         const char *dbus_err;
693
694         if (dbus_message_get_type(reply) == DBUS_MESSAGE_TYPE_ERROR) {
695                 dbus_err = dbus_message_get_error_name(reply);
696                 if (dbus_err != NULL &&
697                         strcmp(dbus_err,
698                                 CONNMAN_AGENT_INTERFACE ".Error.Retry") == 0)
699                         retry = TRUE;
700         }
701
702         report_error->callback(report_error->service, retry,
703                         report_error->user_data);
704         connman_service_unref(report_error->service);
705         g_free(report_error);
706         dbus_message_unref(reply);
707         dbus_pending_call_unref(call);
708 }
709
710 int __connman_agent_report_error(struct connman_service *service,
711                                 const char *error,
712                                 report_error_cb_t callback, void *user_data)
713 {
714         DBusMessage *message;
715         DBusMessageIter iter;
716         const char *path;
717         struct report_error_data *report_error;
718         DBusPendingCall *call;
719
720         if (service == NULL || agent_path == NULL || error == NULL ||
721                 callback == NULL)
722                 return -ESRCH;
723
724         message = dbus_message_new_method_call(agent_sender, agent_path,
725                                         CONNMAN_AGENT_INTERFACE,
726                                         "ReportError");
727         if (message == NULL)
728                 return -ENOMEM;
729
730         dbus_message_iter_init_append(message, &iter);
731
732         path = __connman_service_get_path(service);
733         dbus_message_iter_append_basic(&iter,
734                                 DBUS_TYPE_OBJECT_PATH, &path);
735         dbus_message_iter_append_basic(&iter,
736                                 DBUS_TYPE_STRING, &error);
737
738         report_error = g_try_new0(struct report_error_data, 1);
739         if (report_error == NULL) {
740                 dbus_message_unref(message);
741                 return -ENOMEM;
742         }
743
744         if (dbus_connection_send_with_reply(connection, message, &call,
745                                         connman_timeout_input_request())
746                         == FALSE) {
747                 dbus_message_unref(message);
748                 g_free(report_error);
749                 return -ESRCH;
750         }
751
752         if (call == NULL) {
753                 dbus_message_unref(message);
754                 g_free(report_error);
755                 return -ESRCH;
756         }
757
758         report_error->service = connman_service_ref(service);
759         report_error->callback = callback;
760         report_error->user_data = user_data;
761         dbus_pending_call_set_notify(call, report_error_reply,
762                                 report_error, NULL);
763         dbus_message_unref(message);
764
765         return -EINPROGRESS;
766 }
767
768 int __connman_agent_init(void)
769 {
770         DBG("");
771
772         connection = connman_dbus_get_connection();
773         if (connection == NULL)
774                 return -1;
775
776         return 0;
777 }
778
779 void __connman_agent_cleanup(void)
780 {
781         DBusMessage *message;
782
783         DBG("");
784
785         if (connection == NULL)
786                 return;
787
788         if (agent_watch > 0)
789                 g_dbus_remove_watch(connection, agent_watch);
790
791         if (agent_path == NULL)
792                 return;
793
794         message = dbus_message_new_method_call(agent_sender, agent_path,
795                                         CONNMAN_AGENT_INTERFACE, "Release");
796         if (message == NULL)
797                 return;
798
799         dbus_message_set_no_reply(message, TRUE);
800
801         g_dbus_send_message(connection, message);
802
803         agent_free();
804
805         dbus_connection_unref(connection);
806 }