DA: Reduce debug log
[platform/upstream/connman.git] / gsupplicant / supplicant.c
1 /*
2  *
3  *  WPA supplicant library with GLib integration
4  *
5  *  Copyright (C) 2012-2013  Intel Corporation. All rights reserved.
6  *
7  *  This program is free software; you can redistribute it and/or modify
8  *  it under the terms of the GNU General Public License version 2 as
9  *  published by the Free Software Foundation.
10  *
11  *  This program is distributed in the hope that it will be useful,
12  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
13  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14  *  GNU General Public License for more details.
15  *
16  *  You should have received a copy of the GNU General Public License
17  *  along with this program; if not, write to the Free Software
18  *  Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA
19  *
20  */
21
22 #ifdef HAVE_CONFIG_H
23 #include <config.h>
24 #endif
25
26 #include <errno.h>
27 #include <stdio.h>
28 #include <stdlib.h>
29 #include <string.h>
30 #include <stdint.h>
31 #include <syslog.h>
32 #include <ctype.h>
33 #include <stdbool.h>
34 #include <netinet/if_ether.h>
35 #include <netinet/in.h>
36
37 #include <glib.h>
38 #include <gdbus.h>
39
40 #include "dbus.h"
41 #include "gsupplicant.h"
42
43 #if defined TIZEN_EXT
44 #include "setting.h"
45 #endif
46
47 #define IEEE80211_CAP_ESS       0x0001
48 #define IEEE80211_CAP_IBSS      0x0002
49 #define IEEE80211_CAP_PRIVACY   0x0010
50
51 #if defined TIZEN_EXT
52 #define WLAN_EID_HT_CAP 45
53 #define WLAN_EID_VHT_CAP 191
54 #define WLAN_EID_SUPP_RATES 1
55 #define WLAN_EID_EXT_SUPP_RATES 50
56 #define COUNTRY_CODE_LENGTH     2
57 #endif
58
59 #if defined TIZEN_EXT
60 #define LAST_CONNECTED_TIMEOUT       (5 * 60)
61 #define ASSOC_REJECT_TIMEOUT         10
62 #define FREQ_RANGE_24GHZ_CHANNEL_1   2412
63 #define FREQ_RANGE_24GHZ_CHANNEL_14  2484
64 #define FREQ_RANGE_5GHZ_CHANNEL_32   5160
65 #define FREQ_RANGE_5GHZ_CHANNEL_165  5825
66
67 #define MAC2STR(a) (a)[0], (a)[1], (a)[2], (a)[3], (a)[4], (a)[5]
68 #define MACSTR "%02x:%02x:%02x:%02x:%02x:%02x"
69 #endif
70
71 #define BSS_UNKNOWN_STRENGTH    -90
72
73 static DBusConnection *connection;
74
75 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
76 static GSupplicantCallbacks *callbacks_pointer;
77 #else /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
78 static const GSupplicantCallbacks *callbacks_pointer;
79 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
80
81 static dbus_bool_t system_available = FALSE;
82 static dbus_bool_t system_ready = FALSE;
83
84 static dbus_int32_t debug_level;
85 static dbus_bool_t debug_timestamp = FALSE;
86 static dbus_bool_t debug_showkeys = FALSE;
87
88 static const char *debug_strings[] = {
89         "msgdump", "debug", "info", "warning", "error", NULL
90 };
91
92 static unsigned int eap_methods;
93
94 struct strvalmap {
95         const char *str;
96         unsigned int val;
97 };
98
99 static struct strvalmap eap_method_map[] = {
100         { "MD5",        G_SUPPLICANT_EAP_METHOD_MD5     },
101         { "TLS",        G_SUPPLICANT_EAP_METHOD_TLS     },
102         { "MSCHAPV2",   G_SUPPLICANT_EAP_METHOD_MSCHAPV2        },
103         { "PEAP",       G_SUPPLICANT_EAP_METHOD_PEAP    },
104         { "TTLS",       G_SUPPLICANT_EAP_METHOD_TTLS    },
105         { "GTC",        G_SUPPLICANT_EAP_METHOD_GTC     },
106         { "OTP",        G_SUPPLICANT_EAP_METHOD_OTP     },
107         { "LEAP",       G_SUPPLICANT_EAP_METHOD_LEAP    },
108         { "WSC",        G_SUPPLICANT_EAP_METHOD_WSC     },
109         { }
110 };
111
112 static struct strvalmap keymgmt_map[] = {
113         { "none",               G_SUPPLICANT_KEYMGMT_NONE               },
114         { "ieee8021x",          G_SUPPLICANT_KEYMGMT_IEEE8021X  },
115         { "wpa-none",           G_SUPPLICANT_KEYMGMT_WPA_NONE   },
116         { "wpa-psk",            G_SUPPLICANT_KEYMGMT_WPA_PSK    },
117         { "wpa-psk-sha256",     G_SUPPLICANT_KEYMGMT_WPA_PSK_256        },
118         { "wpa-ft-psk",         G_SUPPLICANT_KEYMGMT_WPA_FT_PSK },
119         { "wpa-ft-eap",         G_SUPPLICANT_KEYMGMT_WPA_FT_EAP },
120         { "wpa-eap",            G_SUPPLICANT_KEYMGMT_WPA_EAP    },
121         { "wpa-eap-sha256",     G_SUPPLICANT_KEYMGMT_WPA_EAP_256        },
122         { "wps",                G_SUPPLICANT_KEYMGMT_WPS                },
123 #if defined TIZEN_EXT
124         { "sae",                G_SUPPLICANT_KEYMGMT_SAE                },
125         { "ft-sae",             G_SUPPLICANT_KEYMGMT_FT_SAE             },
126         { "owe",                G_SUPPLICANT_KEYMGMT_OWE                },
127         { "dpp",                G_SUPPLICANT_KEYMGMT_DPP                },
128 #endif
129         { }
130 };
131
132 static struct strvalmap authalg_capa_map[] = {
133         { "open",       G_SUPPLICANT_CAPABILITY_AUTHALG_OPEN    },
134         { "shared",     G_SUPPLICANT_CAPABILITY_AUTHALG_SHARED  },
135         { "leap",       G_SUPPLICANT_CAPABILITY_AUTHALG_LEAP    },
136         { }
137 };
138
139 static struct strvalmap proto_capa_map[] = {
140         { "wpa",        G_SUPPLICANT_CAPABILITY_PROTO_WPA               },
141         { "rsn",        G_SUPPLICANT_CAPABILITY_PROTO_RSN               },
142         { }
143 };
144
145 static struct strvalmap group_map[] = {
146         { "wep40",      G_SUPPLICANT_GROUP_WEP40        },
147         { "wep104",     G_SUPPLICANT_GROUP_WEP104       },
148         { "tkip",       G_SUPPLICANT_GROUP_TKIP },
149         { "ccmp",       G_SUPPLICANT_GROUP_CCMP },
150         { }
151 };
152
153 static struct strvalmap pairwise_map[] = {
154         { "none",       G_SUPPLICANT_PAIRWISE_NONE      },
155         { "tkip",       G_SUPPLICANT_PAIRWISE_TKIP      },
156         { "ccmp",       G_SUPPLICANT_PAIRWISE_CCMP      },
157         { }
158 };
159
160 static struct strvalmap scan_capa_map[] = {
161         { "active",     G_SUPPLICANT_CAPABILITY_SCAN_ACTIVE     },
162         { "passive",    G_SUPPLICANT_CAPABILITY_SCAN_PASSIVE    },
163         { "ssid",       G_SUPPLICANT_CAPABILITY_SCAN_SSID               },
164         { }
165 };
166
167 static struct strvalmap mode_capa_map[] = {
168         { "infrastructure",     G_SUPPLICANT_CAPABILITY_MODE_INFRA      },
169         { "ad-hoc",             G_SUPPLICANT_CAPABILITY_MODE_IBSS       },
170         { "ap",                 G_SUPPLICANT_CAPABILITY_MODE_AP         },
171         { "p2p",                G_SUPPLICANT_CAPABILITY_MODE_P2P        },
172 #if defined TIZEN_EXT_WIFI_MESH
173         { "mesh",               G_SUPPLICANT_CAPABILITY_MODE_MESH       },
174 #endif
175         { }
176 };
177
178 #if defined TIZEN_EXT && defined TIZEN_EXT_INS
179 struct _GSupplicantINSSettings {
180         GSupplicantINSPreferredFreq preferred_freq_bssid;
181         unsigned int preferred_freq_bssid_score;
182         bool last_connected_bssid;
183         unsigned int last_connected_bssid_score;
184         bool assoc_reject;
185         unsigned int assoc_reject_score;
186         bool signal_bssid;
187         int signal_level3_5ghz;
188         int signal_level3_24ghz;
189 };
190
191 static struct _GSupplicantINSSettings ins_settings;
192 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_INS */
193
194 #if defined TIZEN_EXT
195 static unsigned char invalid_bssid[WIFI_BSSID_LEN_MAX] = {
196         0x00, 0x00, 0x00, 0x00, 0x00, 0x00
197 };
198 #endif
199
200 static GHashTable *interface_table;
201 static GHashTable *bss_mapping;
202 static GHashTable *peer_mapping;
203 static GHashTable *group_mapping;
204 static GHashTable *pending_peer_connection;
205 static GHashTable *config_file_table;
206
207 struct _GSupplicantWpsCredentials {
208         unsigned char ssid[32];
209         unsigned int ssid_len;
210         char *key;
211 };
212
213 struct added_network_information {
214         char * ssid;
215         GSupplicantSecurity security;
216         char * passphrase;
217         char * private_passphrase;
218 #if defined TIZEN_EXT
219         char *connector;
220         char *c_sign_key;
221         char *net_access_key;
222 #endif
223 };
224
225 #if defined TIZEN_EXT_WIFI_MESH
226 struct _GSupplicantMeshGroupInfo {
227         unsigned char ssid[32];
228         unsigned int ssid_len;
229         int disconnect_reason;
230 };
231 #endif
232
233 struct _GSupplicantInterface {
234         char *path;
235         char *network_path;
236         unsigned int keymgmt_capa;
237         unsigned int authalg_capa;
238         unsigned int proto_capa;
239         unsigned int group_capa;
240         unsigned int pairwise_capa;
241         unsigned int scan_capa;
242         unsigned int mode_capa;
243         unsigned int max_scan_ssids;
244         bool p2p_support;
245         bool p2p_finding;
246         bool ap_create_in_progress;
247         dbus_bool_t ready;
248         GSupplicantState state;
249         dbus_bool_t scanning;
250         GSupplicantInterfaceCallback scan_callback;
251         void *scan_data;
252         int apscan;
253         char *ifname;
254         char *driver;
255         char *bridge;
256         struct _GSupplicantWpsCredentials wps_cred;
257         GSupplicantWpsState wps_state;
258         GHashTable *network_table;
259         GHashTable *peer_table;
260         GHashTable *group_table;
261         GHashTable *bss_mapping;
262         void *data;
263         const char *pending_peer_path;
264         GSupplicantNetwork *current_network;
265         struct added_network_information network_info;
266 #if defined TIZEN_EXT
267         dbus_bool_t is_5_0_Ghz_supported;
268         int disconnect_reason;
269 #endif
270 #if defined TIZEN_EXT
271         unsigned char add_network_bssid[WIFI_BSSID_LEN_MAX];
272         unsigned char connected_bssid[WIFI_BSSID_LEN_MAX];
273 #endif
274 #if defined TIZEN_EXT_WIFI_MESH
275         bool mesh_support;
276         struct _GSupplicantMeshGroupInfo group_info;
277 #endif
278 };
279
280 struct g_supplicant_bss {
281         GSupplicantInterface *interface;
282         char *path;
283         unsigned char bssid[6];
284         unsigned char ssid[32];
285         unsigned int ssid_len;
286         dbus_uint16_t frequency;
287         dbus_uint32_t maxrate;
288         dbus_int16_t signal;
289         GSupplicantMode mode;
290         GSupplicantSecurity security;
291         dbus_bool_t rsn_selected;
292         unsigned int wpa_keymgmt;
293         unsigned int wpa_pairwise;
294         unsigned int wpa_group;
295         unsigned int rsn_keymgmt;
296         unsigned int rsn_pairwise;
297         unsigned int rsn_group;
298         unsigned int keymgmt;
299         dbus_bool_t privacy;
300         dbus_bool_t psk;
301         dbus_bool_t ieee8021x;
302 #if defined TIZEN_EXT
303         dbus_bool_t ft_psk;
304         dbus_bool_t ft_ieee8021x;
305         GSList *vsie_list;
306         dbus_bool_t hs20;
307         unsigned char country_code[COUNTRY_CODE_LENGTH];
308         GSupplicantPhy_mode phy_mode;
309         dbus_int16_t snr;
310         dbus_uint32_t est_throughput;
311 #endif
312         unsigned int wps_capabilities;
313 #if defined TIZEN_EXT
314         dbus_bool_t sae;
315         dbus_bool_t owe;
316         dbus_bool_t dpp;
317         dbus_bool_t owe_transition_mode;
318         unsigned int transition_mode_ssid_len;
319         unsigned char transition_mode_bssid[6];
320         unsigned char transition_mode_ssid[32];
321         dbus_bool_t pmf_required;
322 #endif
323 };
324
325 struct _GSupplicantNetwork {
326         GSupplicantInterface *interface;
327         char *path;
328         char *group;
329         char *name;
330         unsigned char ssid[32];
331         unsigned int ssid_len;
332         dbus_int16_t signal;
333         dbus_uint16_t frequency;
334         struct g_supplicant_bss *best_bss;
335         GSupplicantMode mode;
336         GSupplicantSecurity security;
337         dbus_bool_t wps;
338         unsigned int wps_capabilities;
339         GHashTable *bss_table;
340         GHashTable *config_table;
341 #if defined TIZEN_EXT
342         bool isHS20AP;
343         char *eap;
344         char *identity;
345         char *phase2;
346         unsigned int keymgmt;
347         GSList *vsie_list;
348         unsigned char country_code[COUNTRY_CODE_LENGTH];
349         GSupplicantPhy_mode phy_mode;
350         dbus_bool_t owe_transition_mode;
351         dbus_bool_t privacy;
352         unsigned int transition_mode_ssid_len;
353         unsigned char transition_mode_bssid[6];
354         unsigned char transition_mode_ssid[32];
355         unsigned char last_connected_bssid[WIFI_BSSID_LEN_MAX];
356         GHashTable *assoc_reject_table;
357 #endif
358 };
359
360 struct _GSupplicantPeer {
361         GSupplicantInterface *interface;
362         char *path;
363         unsigned char device_address[ETH_ALEN];
364         unsigned char iface_address[ETH_ALEN];
365         char *name;
366         unsigned char *widi_ies;
367         int widi_ies_length;
368         char *identifier;
369         unsigned int wps_capabilities;
370         GSList *groups;
371         const GSupplicantInterface *current_group_iface;
372         bool connection_requested;
373 };
374
375 struct _GSupplicantGroup {
376         GSupplicantInterface *interface;
377         GSupplicantInterface *orig_interface;
378         char *path;
379         int role;
380         GSList *members;
381 };
382
383 struct interface_data {
384         GSupplicantInterface *interface;
385         char *path; /* Interface path cannot be taken from interface (above) as
386                      * it might have been freed already.
387                      */
388         GSupplicantInterfaceCallback callback;
389         void *user_data;
390         bool network_remove_in_progress;
391         GSupplicantSSID *ssid;
392 };
393
394 #if defined TIZEN_EXT
395 struct interface_signalpoll_data {
396         GSupplicantInterface *interface;
397         char *path;
398         GSupplicantMaxSpeedCallback callback;
399         void *user_data;
400 };
401 #endif
402
403 struct interface_create_data {
404         char *ifname;
405         char *driver;
406         char *bridge;
407 #if defined TIZEN_EXT
408         unsigned int mac_addr;
409         unsigned int preassoc_mac_addr;
410         unsigned int random_mac_lifetime;
411 #endif /* TIZEN_EXT */
412 #if defined TIZEN_EXT_WIFI_MESH
413         char *parent_ifname;
414         bool is_mesh_interface;
415 #endif
416         GSupplicantInterface *interface;
417         GSupplicantInterfaceCallback callback;
418         void *user_data;
419 };
420
421 struct interface_connect_data {
422         GSupplicantInterface *interface;
423         char *path;
424         GSupplicantInterfaceCallback callback;
425         void *user_data;
426         union {
427                 GSupplicantSSID *ssid;
428                 GSupplicantPeerParams *peer;
429         };
430 };
431
432 struct interface_scan_data {
433         GSupplicantInterface *interface;
434         char *path;
435         GSupplicantInterfaceCallback callback;
436         GSupplicantScanParams *scan_params;
437         void *user_data;
438 };
439
440 #if defined TIZEN_EXT
441 struct update_bssid_data {
442         GSupplicantNetwork *network;
443         unsigned char last_connected_bssid[WIFI_BSSID_LEN_MAX];
444         GHashTable *assoc_reject_table;
445         GSList *bssid_list;
446 };
447
448 struct assoc_reject_data {
449         char *bssid;
450         GSList *reject_time_list;
451 };
452
453 struct assoc_count_data {
454         time_t ref_time;
455         int assoc_count;
456 };
457
458 static unsigned int last_connected_bss_timeout = 0;
459 static bool simplified_log = true;
460 #endif
461
462 static int network_remove(struct interface_data *data);
463
464 #if defined TIZEN_EXT_WIFI_MESH
465 struct _GSupplicantMeshPeer {
466         GSupplicantInterface *interface;
467         char *peer_address;
468         int disconnect_reason;
469 };
470 #endif
471
472 static inline void debug(const char *format, ...)
473 {
474         char str[256];
475         va_list ap;
476
477         if (!callbacks_pointer || !callbacks_pointer->debug)
478                 return;
479
480         va_start(ap, format);
481
482         if (vsnprintf(str, sizeof(str), format, ap) > 0)
483                 callbacks_pointer->debug(str);
484
485         va_end(ap);
486 }
487
488 #define SUPPLICANT_DBG(fmt, arg...) \
489         debug("%s:%s() " fmt, __FILE__, __FUNCTION__ , ## arg);
490
491 static GSupplicantMode string2mode(const char *mode)
492 {
493         if (!mode)
494                 return G_SUPPLICANT_MODE_UNKNOWN;
495
496         if (g_str_equal(mode, "infrastructure"))
497                 return G_SUPPLICANT_MODE_INFRA;
498         else if (g_str_equal(mode, "ad-hoc"))
499                 return G_SUPPLICANT_MODE_IBSS;
500 #if defined TIZEN_EXT_WIFI_MESH
501         else if (g_str_equal(mode, "mesh"))
502                 return G_SUPPLICANT_MODE_MESH;
503 #endif
504
505         return G_SUPPLICANT_MODE_UNKNOWN;
506 }
507
508 static const char *mode2string(GSupplicantMode mode)
509 {
510         switch (mode) {
511         case G_SUPPLICANT_MODE_UNKNOWN:
512                 break;
513         case G_SUPPLICANT_MODE_INFRA:
514                 return "managed";
515         case G_SUPPLICANT_MODE_IBSS:
516                 return "adhoc";
517         case G_SUPPLICANT_MODE_MASTER:
518                 return "ap";
519 #if defined TIZEN_EXT_WIFI_MESH
520         case G_SUPPLICANT_MODE_MESH:
521                 return "mesh";
522 #endif
523         }
524
525         return NULL;
526 }
527
528 static const char *security2string(GSupplicantSecurity security)
529 {
530         switch (security) {
531         case G_SUPPLICANT_SECURITY_UNKNOWN:
532                 break;
533         case G_SUPPLICANT_SECURITY_NONE:
534                 return "none";
535         case G_SUPPLICANT_SECURITY_WEP:
536                 return "wep";
537         case G_SUPPLICANT_SECURITY_PSK:
538                 return "psk";
539         case G_SUPPLICANT_SECURITY_IEEE8021X:
540                 return "ieee8021x";
541 #if defined TIZEN_EXT
542         case G_SUPPLICANT_SECURITY_FT_PSK:
543                 return "ft_psk";
544         case G_SUPPLICANT_SECURITY_FT_IEEE8021X:
545                 return "ft_ieee8021x";
546         case G_SUPPLICANT_SECURITY_SAE:
547                 return "sae";
548         case G_SUPPLICANT_SECURITY_OWE:
549                 return "owe";
550         case G_SUPPLICANT_SECURITY_DPP:
551                 return "dpp";
552 #endif
553         }
554
555         return NULL;
556 }
557
558 static GSupplicantState string2state(const char *state)
559 {
560         if (!state)
561                 return G_SUPPLICANT_STATE_UNKNOWN;
562
563         if (g_str_equal(state, "unknown"))
564                 return G_SUPPLICANT_STATE_UNKNOWN;
565         else if (g_str_equal(state, "interface_disabled"))
566                 return G_SUPPLICANT_STATE_DISABLED;
567         else if (g_str_equal(state, "disconnected"))
568                 return G_SUPPLICANT_STATE_DISCONNECTED;
569         else if (g_str_equal(state, "inactive"))
570                 return G_SUPPLICANT_STATE_INACTIVE;
571         else if (g_str_equal(state, "scanning"))
572                 return G_SUPPLICANT_STATE_SCANNING;
573         else if (g_str_equal(state, "authenticating"))
574                 return G_SUPPLICANT_STATE_AUTHENTICATING;
575         else if (g_str_equal(state, "associating"))
576                 return G_SUPPLICANT_STATE_ASSOCIATING;
577         else if (g_str_equal(state, "associated"))
578                 return G_SUPPLICANT_STATE_ASSOCIATED;
579         else if (g_str_equal(state, "group_handshake"))
580                 return G_SUPPLICANT_STATE_GROUP_HANDSHAKE;
581         else if (g_str_equal(state, "4way_handshake"))
582                 return G_SUPPLICANT_STATE_4WAY_HANDSHAKE;
583         else if (g_str_equal(state, "completed"))
584                 return G_SUPPLICANT_STATE_COMPLETED;
585
586         return G_SUPPLICANT_STATE_UNKNOWN;
587 }
588
589 static bool compare_network_parameters(GSupplicantInterface *interface,
590                                 GSupplicantSSID *ssid)
591 {
592 #if defined TIZEN_EXT
593         if (!interface->network_info.ssid)
594                 return FALSE;
595 #endif
596
597         if (memcmp(interface->network_info.ssid, ssid->ssid, ssid->ssid_len))
598                 return FALSE;
599
600         if (interface->network_info.security != ssid->security)
601                 return FALSE;
602
603         if (interface->network_info.passphrase &&
604                         g_strcmp0(interface->network_info.passphrase,
605                                 ssid->passphrase) != 0) {
606                 return FALSE;
607         }
608
609         if (interface->network_info.private_passphrase &&
610                         g_strcmp0(interface->network_info.private_passphrase,
611                                 ssid->private_key_passphrase) != 0) {
612                 return FALSE;
613         }
614
615 #if defined TIZEN_EXT
616         if (interface->network_info.connector &&
617                         g_strcmp0(interface->network_info.connector,
618                                 ssid->connector) != 0) {
619                 return FALSE;
620         }
621         if (interface->network_info.c_sign_key &&
622                         g_strcmp0(interface->network_info.c_sign_key,
623                                 ssid->c_sign_key) != 0) {
624                 return FALSE;
625         }
626         if (interface->network_info.net_access_key &&
627                         g_strcmp0(interface->network_info.net_access_key,
628                                 ssid->net_access_key) != 0) {
629                 return FALSE;
630         }
631 #endif
632         return TRUE;
633 }
634
635 static void remove_network_information(GSupplicantInterface * interface)
636 {
637         g_free(interface->network_info.ssid);
638         g_free(interface->network_info.passphrase);
639         g_free(interface->network_info.private_passphrase);
640 #if defined TIZEN_EXT
641         g_free(interface->network_info.connector);
642         g_free(interface->network_info.c_sign_key);
643         g_free(interface->network_info.net_access_key);
644 #endif
645         interface->network_info.ssid = NULL;
646         interface->network_info.passphrase = NULL;
647         interface->network_info.private_passphrase = NULL;
648 #if defined TIZEN_EXT
649         interface->network_info.connector = NULL;
650         interface->network_info.c_sign_key = NULL;
651         interface->network_info.net_access_key = NULL;
652 #endif
653 }
654
655 static int store_network_information(GSupplicantInterface * interface,
656                                 GSupplicantSSID *ssid)
657 {
658         interface->network_info.ssid = g_malloc(ssid->ssid_len + 1);
659         if (interface->network_info.ssid != NULL) {
660                 memcpy(interface->network_info.ssid, ssid->ssid,
661                         ssid->ssid_len);
662                 interface->network_info.ssid[ssid->ssid_len] = '\0';
663         } else {
664                 return -ENOMEM;
665         }
666
667         interface->network_info.security = ssid->security;
668
669         if ((ssid->security == G_SUPPLICANT_SECURITY_WEP ||
670                 ssid->security == G_SUPPLICANT_SECURITY_PSK ||
671 #if defined TIZEN_EXT
672                 ssid->security == G_SUPPLICANT_SECURITY_SAE ||
673 #endif
674                 ssid->security == G_SUPPLICANT_SECURITY_NONE) &&
675                 ssid->passphrase) {
676                 interface->network_info.passphrase = g_strdup(ssid->passphrase);
677         }
678
679         if (ssid->security == G_SUPPLICANT_SECURITY_IEEE8021X &&
680                         ssid->private_key_passphrase) {
681                 interface->network_info.private_passphrase =
682                         g_strdup(ssid->private_key_passphrase);
683         }
684
685         return 0;
686 }
687
688 static void callback_system_ready(void)
689 {
690         if (system_ready)
691                 return;
692
693         system_ready = TRUE;
694
695         if (!callbacks_pointer)
696                 return;
697
698         if (!callbacks_pointer->system_ready)
699                 return;
700
701         callbacks_pointer->system_ready();
702 }
703
704 static void callback_system_killed(void)
705 {
706         system_ready = FALSE;
707
708         if (!callbacks_pointer)
709                 return;
710
711         if (!callbacks_pointer->system_killed)
712                 return;
713
714         callbacks_pointer->system_killed();
715 }
716
717 static void callback_interface_added(GSupplicantInterface *interface)
718 {
719         SUPPLICANT_DBG("");
720
721         if (!callbacks_pointer)
722                 return;
723
724         if (!callbacks_pointer->interface_added)
725                 return;
726
727         callbacks_pointer->interface_added(interface);
728 }
729
730 static void callback_interface_state(GSupplicantInterface *interface)
731 {
732         if (!callbacks_pointer)
733                 return;
734
735         if (!callbacks_pointer->interface_state)
736                 return;
737
738         callbacks_pointer->interface_state(interface);
739 }
740
741 static void callback_interface_removed(GSupplicantInterface *interface)
742 {
743         if (!callbacks_pointer)
744                 return;
745
746         if (!callbacks_pointer->interface_removed)
747                 return;
748
749         callbacks_pointer->interface_removed(interface);
750 }
751
752 #if !defined TIZEN_EXT
753 static void callback_p2p_support(GSupplicantInterface *interface)
754 {
755         SUPPLICANT_DBG("");
756
757         if (!interface->p2p_support)
758                 return;
759
760         if (callbacks_pointer && callbacks_pointer->p2p_support)
761                 callbacks_pointer->p2p_support(interface);
762 }
763 #endif
764
765 #if defined TIZEN_EXT_WIFI_MESH
766 static void callback_mesh_support(GSupplicantInterface *interface)
767 {
768         SUPPLICANT_DBG("");
769
770         if (!interface->mesh_support)
771                 return;
772
773         if (callbacks_pointer && callbacks_pointer->mesh_support)
774                 callbacks_pointer->mesh_support(interface);
775 }
776
777 bool g_supplicant_interface_has_mesh(GSupplicantInterface *interface)
778 {
779         if (!interface)
780                 return false;
781
782         return interface->mesh_support;
783 }
784 #endif
785
786 static void callback_scan_started(GSupplicantInterface *interface)
787 {
788         if (!callbacks_pointer)
789                 return;
790
791         if (!callbacks_pointer->scan_started)
792                 return;
793
794         callbacks_pointer->scan_started(interface);
795 }
796
797 static void callback_ap_create_fail(GSupplicantInterface *interface)
798 {
799         if (!callbacks_pointer)
800                 return;
801
802         if (!callbacks_pointer->ap_create_fail)
803                 return;
804
805         callbacks_pointer->ap_create_fail(interface);
806 }
807
808 static void callback_scan_finished(GSupplicantInterface *interface)
809 {
810         if (!callbacks_pointer)
811                 return;
812
813         if (!callbacks_pointer->scan_finished)
814                 return;
815
816         callbacks_pointer->scan_finished(interface);
817 }
818
819 static void callback_network_added(GSupplicantNetwork *network)
820 {
821         if (!callbacks_pointer)
822                 return;
823
824         if (!callbacks_pointer->network_added)
825                 return;
826
827         callbacks_pointer->network_added(network);
828 }
829
830 static void callback_network_removed(GSupplicantNetwork *network)
831 {
832         if (!callbacks_pointer)
833                 return;
834
835         if (!callbacks_pointer->network_removed)
836                 return;
837
838         callbacks_pointer->network_removed(network);
839 }
840
841 #if defined TIZEN_EXT
842 static void callback_network_merged(GSupplicantNetwork *network)
843 {
844         if (!callbacks_pointer)
845                 return;
846
847         if (!callbacks_pointer->network_merged)
848                 return;
849
850         callbacks_pointer->network_merged(network);
851 }
852
853 static void callback_assoc_failed(void *user_data)
854 {
855         if (!callbacks_pointer)
856                 return;
857
858         if (!callbacks_pointer->assoc_failed)
859                 return;
860
861         callbacks_pointer->assoc_failed(user_data);
862 }
863
864 static void callback_scan_done(GSupplicantInterface *interface)
865 {
866         if (!callbacks_pointer)
867                 return;
868
869         if (!callbacks_pointer->scan_done)
870                 return;
871
872         callbacks_pointer->scan_done(interface);
873 }
874 #endif
875
876 static void callback_network_changed(GSupplicantNetwork *network,
877                                         const char *property)
878 {
879         if (!callbacks_pointer)
880                 return;
881
882         if (!callbacks_pointer->network_changed)
883                 return;
884
885         callbacks_pointer->network_changed(network, property);
886 }
887
888 static void callback_network_associated(GSupplicantNetwork *network)
889 {
890         if (!callbacks_pointer)
891                 return;
892
893         if (!callbacks_pointer->network_associated)
894                 return;
895
896         callbacks_pointer->network_associated(network);
897 }
898
899 static void callback_sta_authorized(GSupplicantInterface *interface,
900                                         const char *addr)
901 {
902         if (!callbacks_pointer)
903                 return;
904
905         if (!callbacks_pointer->sta_authorized)
906                 return;
907
908         callbacks_pointer->sta_authorized(interface, addr);
909 }
910
911 static void callback_sta_deauthorized(GSupplicantInterface *interface,
912                                         const char *addr)
913 {
914         if (!callbacks_pointer)
915                 return;
916
917         if (!callbacks_pointer->sta_deauthorized)
918                 return;
919
920         callbacks_pointer->sta_deauthorized(interface, addr);
921 }
922
923 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
924 static void callback_eap(GSupplicantInterface *interface, bool status)
925 {
926         if (!callbacks_pointer)
927                 return;
928
929         if (!callbacks_pointer->eap)
930                 return;
931
932         callbacks_pointer->eap(interface, status);
933 }
934 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
935
936 static void callback_peer_found(GSupplicantPeer *peer)
937 {
938         if (!callbacks_pointer)
939                 return;
940
941         if (!callbacks_pointer->peer_found)
942                 return;
943
944         callbacks_pointer->peer_found(peer);
945 }
946
947 static void callback_peer_lost(GSupplicantPeer *peer)
948 {
949         if (!callbacks_pointer)
950                 return;
951
952         if (!callbacks_pointer->peer_lost)
953                 return;
954
955         callbacks_pointer->peer_lost(peer);
956 }
957
958 static void callback_peer_changed(GSupplicantPeer *peer,
959                                                 GSupplicantPeerState state)
960 {
961         if (!callbacks_pointer)
962                 return;
963
964         if (!callbacks_pointer->peer_changed)
965                 return;
966
967         callbacks_pointer->peer_changed(peer, state);
968 }
969
970 static void callback_peer_request(GSupplicantPeer *peer)
971 {
972         if (!callbacks_pointer)
973                 return;
974
975         if (!callbacks_pointer->peer_request)
976                 return;
977
978         peer->connection_requested = true;
979
980         callbacks_pointer->peer_request(peer);
981 }
982
983 static void callback_disconnect_reason_code(GSupplicantInterface *interface,
984                                         int reason_code)
985 {
986         if (!callbacks_pointer)
987                 return;
988
989         if (!callbacks_pointer->disconnect_reasoncode)
990                 return;
991
992         if (reason_code != 0)
993                 callbacks_pointer->disconnect_reasoncode(interface,
994                                                         reason_code);
995 }
996
997 static void callback_assoc_status_code(GSupplicantInterface *interface,
998                                 int status_code)
999 {
1000         if (!callbacks_pointer)
1001                 return;
1002
1003         if (!callbacks_pointer->assoc_status_code)
1004                 return;
1005
1006         callbacks_pointer->assoc_status_code(interface, status_code);
1007
1008 }
1009
1010 static void remove_group(gpointer data)
1011 {
1012         GSupplicantGroup *group = data;
1013
1014         if (group->members)
1015                 g_slist_free_full(group->members, g_free);
1016
1017         g_free(group->path);
1018         g_free(group);
1019 }
1020
1021 static void remove_interface(gpointer data)
1022 {
1023         GSupplicantInterface *interface = data;
1024
1025         g_hash_table_destroy(interface->bss_mapping);
1026         g_hash_table_destroy(interface->network_table);
1027         g_hash_table_destroy(interface->peer_table);
1028         g_hash_table_destroy(interface->group_table);
1029
1030         if (interface->scan_callback) {
1031                 SUPPLICANT_DBG("call interface %p callback %p scanning %d",
1032                                 interface, interface->scan_callback,
1033                                 interface->scanning);
1034
1035                 interface->scan_callback(-EIO, interface, interface->scan_data);
1036                 interface->scan_callback = NULL;
1037                 interface->scan_data = NULL;
1038
1039                 if (interface->scanning) {
1040                         interface->scanning = FALSE;
1041                         callback_scan_finished(interface);
1042                 }
1043         }
1044
1045         callback_interface_removed(interface);
1046
1047         g_free(interface->wps_cred.key);
1048         g_free(interface->path);
1049         g_free(interface->network_path);
1050 #if defined TIZEN_EXT
1051         interface->network_path = NULL;
1052 #endif
1053         g_free(interface->ifname);
1054         g_free(interface->driver);
1055         g_free(interface->bridge);
1056         remove_network_information(interface);
1057         g_free(interface);
1058 }
1059
1060 static void remove_network(gpointer data)
1061 {
1062         GSupplicantNetwork *network = data;
1063
1064         g_hash_table_destroy(network->bss_table);
1065
1066         callback_network_removed(network);
1067
1068         g_hash_table_destroy(network->config_table);
1069 #if defined TIZEN_EXT
1070         g_hash_table_destroy(network->assoc_reject_table);
1071 #endif
1072
1073         g_free(network->path);
1074         g_free(network->group);
1075         g_free(network->name);
1076 #if defined TIZEN_EXT
1077         g_free(network->eap);
1078         g_free(network->identity);
1079         g_free(network->phase2);
1080 #endif
1081 #if defined TIZEN_EXT
1082         g_slist_free_full(network->vsie_list, g_free);
1083 #endif
1084
1085         g_free(network);
1086 }
1087
1088 static void remove_bss(gpointer data)
1089 {
1090         struct g_supplicant_bss *bss = data;
1091
1092         supplicant_dbus_property_call_cancel_all(bss);
1093
1094         g_free(bss->path);
1095 #if defined TIZEN_EXT
1096         g_slist_free_full(bss->vsie_list, g_free);
1097 #endif
1098         g_free(bss);
1099 }
1100
1101 static void remove_peer(gpointer data)
1102 {
1103         GSupplicantPeer *peer = data;
1104
1105         callback_peer_lost(peer);
1106
1107         if (peer->groups)
1108                 g_slist_free_full(peer->groups, g_free);
1109
1110         if (peer_mapping)
1111                 g_hash_table_remove(peer_mapping, peer->path);
1112
1113         if (pending_peer_connection)
1114                 g_hash_table_remove(pending_peer_connection, peer->path);
1115
1116         g_free(peer->path);
1117         g_free(peer->name);
1118         g_free(peer->identifier);
1119         g_free(peer->widi_ies);
1120
1121         g_free(peer);
1122 }
1123
1124 #if defined TIZEN_EXT
1125 static void remove_assoc_data(gpointer data)
1126 {
1127         struct assoc_reject_data *assoc_data = data;
1128
1129         g_free(assoc_data->bssid);
1130         g_slist_free(assoc_data->reject_time_list);
1131
1132         g_free(assoc_data);
1133 }
1134 #endif
1135
1136 static void debug_strvalmap(const char *label, struct strvalmap *map,
1137                                                         unsigned int val)
1138 {
1139         int i;
1140 #if defined TIZEN_EXT
1141         if (!simplified_log)
1142 #endif
1143         for (i = 0; map[i].str; i++) {
1144                 if (val & map[i].val)
1145                         SUPPLICANT_DBG("%s: %s", label, map[i].str);
1146         }
1147 }
1148
1149 static void interface_capability_keymgmt(DBusMessageIter *iter, void *user_data)
1150 {
1151         GSupplicantInterface *interface = user_data;
1152         const char *str = NULL;
1153         int i;
1154
1155         dbus_message_iter_get_basic(iter, &str);
1156         if (!str)
1157                 return;
1158
1159         for (i = 0; keymgmt_map[i].str; i++)
1160                 if (strcmp(str, keymgmt_map[i].str) == 0) {
1161                         interface->keymgmt_capa |= keymgmt_map[i].val;
1162                         break;
1163                 }
1164 }
1165
1166 static void interface_capability_authalg(DBusMessageIter *iter, void *user_data)
1167 {
1168         GSupplicantInterface *interface = user_data;
1169         const char *str = NULL;
1170         int i;
1171
1172         dbus_message_iter_get_basic(iter, &str);
1173         if (!str)
1174                 return;
1175
1176         for (i = 0; authalg_capa_map[i].str; i++)
1177                 if (strcmp(str, authalg_capa_map[i].str) == 0) {
1178                         interface->authalg_capa |= authalg_capa_map[i].val;
1179                         break;
1180                 }
1181 }
1182
1183 static void interface_capability_proto(DBusMessageIter *iter, void *user_data)
1184 {
1185         GSupplicantInterface *interface = user_data;
1186         const char *str = NULL;
1187         int i;
1188
1189         dbus_message_iter_get_basic(iter, &str);
1190         if (!str)
1191                 return;
1192
1193         for (i = 0; proto_capa_map[i].str; i++)
1194                 if (strcmp(str, proto_capa_map[i].str) == 0) {
1195                         interface->proto_capa |= proto_capa_map[i].val;
1196                         break;
1197                 }
1198 }
1199
1200 static void interface_capability_pairwise(DBusMessageIter *iter,
1201                                                         void *user_data)
1202 {
1203         GSupplicantInterface *interface = user_data;
1204         const char *str = NULL;
1205         int i;
1206
1207         dbus_message_iter_get_basic(iter, &str);
1208         if (!str)
1209                 return;
1210
1211         for (i = 0; pairwise_map[i].str; i++)
1212                 if (strcmp(str, pairwise_map[i].str) == 0) {
1213                         interface->pairwise_capa |= pairwise_map[i].val;
1214                         break;
1215                 }
1216 }
1217
1218 static void interface_capability_group(DBusMessageIter *iter, void *user_data)
1219 {
1220         GSupplicantInterface *interface = user_data;
1221         const char *str = NULL;
1222         int i;
1223
1224         dbus_message_iter_get_basic(iter, &str);
1225         if (!str)
1226                 return;
1227
1228         for (i = 0; group_map[i].str; i++)
1229                 if (strcmp(str, group_map[i].str) == 0) {
1230                         interface->group_capa |= group_map[i].val;
1231                         break;
1232                 }
1233 }
1234
1235 static void interface_capability_scan(DBusMessageIter *iter, void *user_data)
1236 {
1237         GSupplicantInterface *interface = user_data;
1238         const char *str = NULL;
1239         int i;
1240
1241         dbus_message_iter_get_basic(iter, &str);
1242         if (!str)
1243                 return;
1244
1245         for (i = 0; scan_capa_map[i].str; i++)
1246                 if (strcmp(str, scan_capa_map[i].str) == 0) {
1247                         interface->scan_capa |= scan_capa_map[i].val;
1248                         break;
1249                 }
1250 }
1251
1252 static void interface_capability_mode(DBusMessageIter *iter, void *user_data)
1253 {
1254         GSupplicantInterface *interface = user_data;
1255         const char *str = NULL;
1256         int i;
1257
1258         dbus_message_iter_get_basic(iter, &str);
1259         if (!str)
1260                 return;
1261
1262         for (i = 0; mode_capa_map[i].str; i++)
1263                 if (strcmp(str, mode_capa_map[i].str) == 0) {
1264                         interface->mode_capa |= mode_capa_map[i].val;
1265                         break;
1266                 }
1267 }
1268
1269 static void interface_capability(const char *key, DBusMessageIter *iter,
1270                                                         void *user_data)
1271 {
1272         GSupplicantInterface *interface = user_data;
1273
1274         if (!key)
1275                 return;
1276
1277         if (g_strcmp0(key, "KeyMgmt") == 0)
1278                 supplicant_dbus_array_foreach(iter,
1279                                 interface_capability_keymgmt, interface);
1280         else if (g_strcmp0(key, "AuthAlg") == 0)
1281                 supplicant_dbus_array_foreach(iter,
1282                                 interface_capability_authalg, interface);
1283         else if (g_strcmp0(key, "Protocol") == 0)
1284                 supplicant_dbus_array_foreach(iter,
1285                                 interface_capability_proto, interface);
1286         else if (g_strcmp0(key, "Pairwise") == 0)
1287                 supplicant_dbus_array_foreach(iter,
1288                                 interface_capability_pairwise, interface);
1289         else if (g_strcmp0(key, "Group") == 0)
1290                 supplicant_dbus_array_foreach(iter,
1291                                 interface_capability_group, interface);
1292         else if (g_strcmp0(key, "Scan") == 0)
1293                 supplicant_dbus_array_foreach(iter,
1294                                 interface_capability_scan, interface);
1295         else if (g_strcmp0(key, "Modes") == 0)
1296                 supplicant_dbus_array_foreach(iter,
1297                                 interface_capability_mode, interface);
1298         else if (g_strcmp0(key, "MaxScanSSID") == 0) {
1299                 dbus_int32_t max_scan_ssid;
1300
1301                 dbus_message_iter_get_basic(iter, &max_scan_ssid);
1302                 if (max_scan_ssid < 2)
1303                         max_scan_ssid = 0;
1304                 interface->max_scan_ssids = max_scan_ssid;
1305 #if defined TIZEN_EXT
1306         } else if (g_strcmp0(key, "Is5GhzSupported") == 0) {
1307                 dbus_bool_t is_5_0_Ghz_supported;
1308
1309                 dbus_message_iter_get_basic(iter, &is_5_0_Ghz_supported);
1310                 interface->is_5_0_Ghz_supported = is_5_0_Ghz_supported;
1311 #endif
1312         } else
1313                 SUPPLICANT_DBG("key %s type %c",
1314                                 key, dbus_message_iter_get_arg_type(iter));
1315 }
1316
1317 static void set_bss_expiration_age(DBusMessageIter *iter, void *user_data)
1318 {
1319         unsigned int bss_expiration_age = GPOINTER_TO_UINT(user_data);
1320
1321         dbus_message_iter_append_basic(iter, DBUS_TYPE_UINT32,
1322                                 &bss_expiration_age);
1323 }
1324
1325 int g_supplicant_interface_set_bss_expiration_age(GSupplicantInterface *interface,
1326                                         unsigned int bss_expiration_age)
1327 {
1328        return supplicant_dbus_property_set(interface->path,
1329                                        SUPPLICANT_INTERFACE ".Interface",
1330                                        "BSSExpireAge", DBUS_TYPE_UINT32_AS_STRING,
1331                                        set_bss_expiration_age, NULL,
1332                                        GUINT_TO_POINTER(bss_expiration_age), NULL);
1333 }
1334
1335 struct set_apscan_data
1336 {
1337         unsigned int ap_scan;
1338         GSupplicantInterface *interface;
1339 };
1340
1341 static void set_apscan(DBusMessageIter *iter, void *user_data)
1342 {
1343         struct set_apscan_data *data = user_data;
1344         unsigned int ap_scan = data->ap_scan;
1345
1346         dbus_message_iter_append_basic(iter, DBUS_TYPE_UINT32, &ap_scan);
1347 }
1348
1349 static void set_apscan_complete(const char *error,
1350                 DBusMessageIter *iter, void *user_data)
1351 {
1352         struct set_apscan_data *data = user_data;
1353         GSupplicantInterface *interface = data->interface;
1354
1355         if (error) {
1356                 interface->ap_create_in_progress = false;
1357                 SUPPLICANT_DBG("Set AP scan error %s", error);
1358                 goto error;
1359         }
1360
1361         interface->ap_create_in_progress = true;
1362 error:
1363         dbus_free(data);
1364 }
1365
1366 int g_supplicant_interface_set_apscan(GSupplicantInterface *interface,
1367                                                         unsigned int ap_scan)
1368 {
1369         struct set_apscan_data *data;
1370         int ret;
1371
1372         data = dbus_malloc0(sizeof(*data));
1373
1374         if (!data)
1375                 return -ENOMEM;
1376
1377         data->ap_scan = ap_scan;
1378         data->interface = interface;
1379
1380         ret = supplicant_dbus_property_set(interface->path,
1381                         SUPPLICANT_INTERFACE ".Interface",
1382                         "ApScan", DBUS_TYPE_UINT32_AS_STRING,
1383                         set_apscan, set_apscan_complete, data, NULL);
1384         if (ret < 0)
1385                 dbus_free(data);
1386
1387         return ret;
1388 }
1389
1390 void g_supplicant_interface_set_data(GSupplicantInterface *interface,
1391                                                                 void *data)
1392 {
1393         if (!interface)
1394                 return;
1395
1396         interface->data = data;
1397
1398         if (!data)
1399                 interface->scan_callback = NULL;
1400 }
1401
1402 void *g_supplicant_interface_get_data(GSupplicantInterface *interface)
1403 {
1404         if (!interface)
1405                 return NULL;
1406
1407         return interface->data;
1408 }
1409
1410 const char *g_supplicant_interface_get_ifname(GSupplicantInterface *interface)
1411 {
1412         if (!interface)
1413                 return NULL;
1414
1415         return interface->ifname;
1416 }
1417
1418 #if defined TIZEN_EXT
1419 bool g_supplicant_interface_get_is_5_0_ghz_supported(GSupplicantInterface *interface)
1420 {
1421         if (!interface)
1422                 return NULL;
1423
1424         return interface->is_5_0_Ghz_supported;
1425 }
1426
1427 unsigned char *g_supplicant_interface_get_add_network_bssid(GSupplicantInterface *interface)
1428 {
1429         if (!interface)
1430                 return NULL;
1431
1432         return (unsigned char *)interface->add_network_bssid;
1433 }
1434 #endif
1435
1436 const char *g_supplicant_interface_get_driver(GSupplicantInterface *interface)
1437 {
1438         if (!interface)
1439                 return NULL;
1440
1441         return interface->driver;
1442 }
1443
1444 GSupplicantState g_supplicant_interface_get_state(
1445                                         GSupplicantInterface *interface)
1446 {
1447         if (!interface)
1448                 return G_SUPPLICANT_STATE_UNKNOWN;
1449
1450         return interface->state;
1451 }
1452
1453 const char *g_supplicant_interface_get_wps_key(GSupplicantInterface *interface)
1454 {
1455         if (!interface)
1456                 return NULL;
1457
1458         return (const char *)interface->wps_cred.key;
1459 }
1460
1461 const void *g_supplicant_interface_get_wps_ssid(GSupplicantInterface *interface,
1462                                                         unsigned int *ssid_len)
1463 {
1464         if (!ssid_len)
1465                 return NULL;
1466
1467         if (!interface || interface->wps_cred.ssid_len == 0) {
1468                 *ssid_len = 0;
1469                 return NULL;
1470         }
1471
1472         *ssid_len = interface->wps_cred.ssid_len;
1473         return interface->wps_cred.ssid;
1474 }
1475
1476 GSupplicantWpsState g_supplicant_interface_get_wps_state(
1477                                         GSupplicantInterface *interface)
1478 {
1479         if (!interface)
1480                 return G_SUPPLICANT_WPS_STATE_UNKNOWN;
1481
1482         return interface->wps_state;
1483 }
1484
1485 unsigned int g_supplicant_interface_get_mode(GSupplicantInterface *interface)
1486 {
1487         if (!interface)
1488                 return 0;
1489
1490         return interface->mode_capa;
1491 }
1492
1493 unsigned int g_supplicant_interface_get_max_scan_ssids(
1494                                 GSupplicantInterface *interface)
1495 {
1496         if (!interface)
1497                 return 0;
1498
1499         if (interface->max_scan_ssids == 0)
1500                 return WPAS_MAX_SCAN_SSIDS;
1501
1502         return interface->max_scan_ssids;
1503 }
1504
1505 static void set_network_enabled(DBusMessageIter *iter, void *user_data)
1506 {
1507         dbus_bool_t enable = *(dbus_bool_t *)user_data;
1508
1509         dbus_message_iter_append_basic(iter, DBUS_TYPE_BOOLEAN, &enable);
1510 }
1511
1512 int g_supplicant_interface_enable_selected_network(GSupplicantInterface *interface,
1513                                                         dbus_bool_t enable)
1514 {
1515         if (!interface)
1516                 return -1;
1517
1518         if (!interface->network_path)
1519                 return -1;
1520
1521         SUPPLICANT_DBG(" ");
1522         return supplicant_dbus_property_set(interface->network_path,
1523                                 SUPPLICANT_INTERFACE ".Network",
1524                                 "Enabled", DBUS_TYPE_BOOLEAN_AS_STRING,
1525                                 set_network_enabled, NULL, &enable, NULL);
1526 }
1527
1528 dbus_bool_t g_supplicant_interface_get_ready(GSupplicantInterface *interface)
1529 {
1530         if (!interface)
1531                 return FALSE;
1532
1533         return interface->ready;
1534 }
1535
1536 GSupplicantInterface *g_supplicant_network_get_interface(
1537                                         GSupplicantNetwork *network)
1538 {
1539         if (!network)
1540                 return NULL;
1541
1542         return network->interface;
1543 }
1544
1545 const char *g_supplicant_network_get_name(GSupplicantNetwork *network)
1546 {
1547         if (!network || !network->name)
1548                 return "";
1549
1550         return network->name;
1551 }
1552
1553 const char *g_supplicant_network_get_identifier(GSupplicantNetwork *network)
1554 {
1555         if (!network || !network->group)
1556                 return "";
1557
1558         return network->group;
1559 }
1560
1561 const char *g_supplicant_network_get_path(GSupplicantNetwork *network)
1562 {
1563         if (!network || !network->path)
1564                 return NULL;
1565
1566         return network->path;
1567 }
1568
1569 const char *g_supplicant_network_get_mode(GSupplicantNetwork *network)
1570 {
1571         if (!network)
1572                 return G_SUPPLICANT_MODE_UNKNOWN;
1573
1574         return mode2string(network->mode);
1575 }
1576
1577 const char *g_supplicant_network_get_security(GSupplicantNetwork *network)
1578 {
1579         if (!network)
1580                 return G_SUPPLICANT_SECURITY_UNKNOWN;
1581
1582         return security2string(network->security);
1583 }
1584
1585 const void *g_supplicant_network_get_ssid(GSupplicantNetwork *network,
1586                                                 unsigned int *ssid_len)
1587 {
1588         if (!network) {
1589                 *ssid_len = 0;
1590                 return NULL;
1591         }
1592
1593         *ssid_len = network->ssid_len;
1594         return network->ssid;
1595 }
1596
1597 dbus_int16_t g_supplicant_network_get_signal(GSupplicantNetwork *network)
1598 {
1599         if (!network)
1600                 return 0;
1601
1602         return network->signal;
1603 }
1604
1605 #if defined TIZEN_EXT
1606 void g_supplicant_network_set_signal(GSupplicantNetwork *network, int signal)
1607 {
1608         if (!network)
1609                 return;
1610
1611         network->signal = (dbus_int16_t)signal;
1612 }
1613
1614 void g_supplicant_network_set_bss_signal(GSupplicantNetwork *network,
1615                 int signal, int snr)
1616 {
1617         struct g_supplicant_bss *best_bss;
1618
1619         if (!network)
1620                 return;
1621
1622         best_bss = network->best_bss;
1623         if (!best_bss)
1624                 return;
1625
1626         best_bss->signal = (dbus_int16_t)signal;
1627         best_bss->snr = (dbus_int16_t)snr;
1628 }
1629 #endif
1630
1631 dbus_uint16_t g_supplicant_network_get_frequency(GSupplicantNetwork *network)
1632 {
1633         if (!network)
1634                 return 0;
1635
1636         return network->frequency;
1637 }
1638
1639 dbus_bool_t g_supplicant_network_get_wps(GSupplicantNetwork *network)
1640 {
1641         if (!network)
1642                 return FALSE;
1643
1644         return network->wps;
1645 }
1646
1647 dbus_bool_t g_supplicant_network_is_wps_active(GSupplicantNetwork *network)
1648 {
1649         if (!network)
1650                 return FALSE;
1651
1652         if (network->wps_capabilities & G_SUPPLICANT_WPS_CONFIGURED)
1653                 return TRUE;
1654
1655         return FALSE;
1656 }
1657
1658 dbus_bool_t g_supplicant_network_is_wps_pbc(GSupplicantNetwork *network)
1659 {
1660         if (!network)
1661                 return FALSE;
1662
1663         if (network->wps_capabilities & G_SUPPLICANT_WPS_PBC)
1664                 return TRUE;
1665
1666         return FALSE;
1667 }
1668
1669 dbus_bool_t g_supplicant_network_is_wps_advertizing(GSupplicantNetwork *network)
1670 {
1671         if (!network)
1672                 return FALSE;
1673
1674         if (network->wps_capabilities & G_SUPPLICANT_WPS_REGISTRAR)
1675                 return TRUE;
1676
1677         return FALSE;
1678 }
1679
1680 #ifdef TIZEN_EXT
1681 GSupplicantPhy_mode g_supplicant_network_get_phy_mode(GSupplicantNetwork *network)
1682 {
1683         if (!network)
1684                 return G_SUPPLICANT_MODE_IEEE80211_UNKNOWN;
1685
1686         return network->phy_mode;
1687 }
1688 #endif
1689
1690 GSupplicantInterface *g_supplicant_peer_get_interface(GSupplicantPeer *peer)
1691 {
1692         if (!peer)
1693                 return NULL;
1694
1695         return peer->interface;
1696 }
1697
1698 const char *g_supplicant_peer_get_path(GSupplicantPeer *peer)
1699 {
1700         if (!peer)
1701                 return NULL;
1702
1703         return peer->path;
1704 }
1705
1706 const char *g_supplicant_peer_get_identifier(GSupplicantPeer *peer)
1707 {
1708         if (!peer)
1709                 return NULL;
1710
1711         return peer->identifier;
1712 }
1713
1714 const void *g_supplicant_peer_get_device_address(GSupplicantPeer *peer)
1715 {
1716         if (!peer)
1717                 return NULL;
1718
1719         return peer->device_address;
1720 }
1721
1722 const void *g_supplicant_peer_get_iface_address(GSupplicantPeer *peer)
1723 {
1724         if (!peer)
1725                 return NULL;
1726
1727         return peer->iface_address;
1728 }
1729
1730 const char *g_supplicant_peer_get_name(GSupplicantPeer *peer)
1731 {
1732         if (!peer)
1733                 return NULL;
1734
1735         return peer->name;
1736 }
1737
1738 #if defined TIZEN_EXT
1739 bool g_supplicant_network_is_hs20AP(GSupplicantNetwork *network)
1740 {
1741         if (!network)
1742                 return 0;
1743
1744         return network->isHS20AP;
1745 }
1746
1747 const char *g_supplicant_network_get_eap(GSupplicantNetwork *network)
1748 {
1749         if (!network || !network->eap)
1750                 return NULL;
1751
1752         return network->eap;
1753 }
1754
1755 const char *g_supplicant_network_get_identity(GSupplicantNetwork *network)
1756 {
1757         if (!network || !network->identity)
1758                 return NULL;
1759
1760         return network->identity;
1761 }
1762
1763 const char *g_supplicant_network_get_phase2(GSupplicantNetwork *network)
1764 {
1765         if (!network || !network->phase2)
1766                 return NULL;
1767
1768         return network->phase2;
1769 }
1770
1771 unsigned int g_supplicant_network_get_keymgmt(GSupplicantNetwork *network)
1772 {
1773         if (!network)
1774                 return 0;
1775
1776         return network->keymgmt;
1777 }
1778
1779 dbus_bool_t g_supplicant_network_get_privacy(GSupplicantNetwork *network)
1780 {
1781         if (!network)
1782                 return FALSE;
1783
1784         return network->privacy;
1785 }
1786
1787 const unsigned char *g_supplicant_network_get_countrycode(GSupplicantNetwork
1788                                                           *network)
1789 {
1790         if (!network)
1791                 return NULL;
1792
1793         return network->country_code;
1794 }
1795
1796 dbus_bool_t g_supplicant_network_is_pmf_required(GSupplicantNetwork *network)
1797 {
1798         if (!network)
1799                 return 0;
1800
1801         return network->best_bss->pmf_required;
1802 }
1803 #endif
1804
1805 const unsigned char *g_supplicant_peer_get_widi_ies(GSupplicantPeer *peer,
1806                                                                 int *length)
1807 {
1808         if (!peer || !length)
1809                 return NULL;
1810
1811         *length = peer->widi_ies_length;
1812         return peer->widi_ies;
1813 }
1814
1815 bool g_supplicant_peer_is_wps_pbc(GSupplicantPeer *peer)
1816 {
1817         if (!peer)
1818                 return false;
1819
1820         if (peer->wps_capabilities & G_SUPPLICANT_WPS_PBC)
1821                 return true;
1822
1823         return false;
1824 }
1825
1826 bool g_supplicant_peer_is_wps_pin(GSupplicantPeer *peer)
1827 {
1828         if (!peer)
1829                 return false;
1830
1831         if (peer->wps_capabilities & G_SUPPLICANT_WPS_PIN)
1832                 return true;
1833
1834         return false;
1835 }
1836
1837 bool g_supplicant_peer_is_in_a_group(GSupplicantPeer *peer)
1838 {
1839         if (!peer || !peer->groups)
1840                 return false;
1841
1842         return true;
1843 }
1844
1845 GSupplicantInterface *g_supplicant_peer_get_group_interface(GSupplicantPeer *peer)
1846 {
1847         if (!peer)
1848                 return NULL;
1849
1850         return (GSupplicantInterface *) peer->current_group_iface;
1851 }
1852
1853 bool g_supplicant_peer_is_client(GSupplicantPeer *peer)
1854 {
1855         GSupplicantGroup *group;
1856         GSList *list;
1857
1858         if (!peer)
1859                 return false;
1860
1861         for (list = peer->groups; list; list = list->next) {
1862                 const char *path = list->data;
1863
1864                 group = g_hash_table_lookup(group_mapping, path);
1865                 if (!group)
1866                         continue;
1867
1868                 if (group->role != G_SUPPLICANT_GROUP_ROLE_CLIENT ||
1869                                 group->orig_interface != peer->interface)
1870                         continue;
1871
1872                 if (group->interface == peer->current_group_iface)
1873                         return true;
1874         }
1875
1876         return false;
1877 }
1878
1879 bool g_supplicant_peer_has_requested_connection(GSupplicantPeer *peer)
1880 {
1881         if (!peer)
1882                 return false;
1883
1884         return peer->connection_requested;
1885 }
1886
1887 #if defined TIZEN_EXT
1888 /*
1889  * Description: Network client requires additional wifi specific info
1890  */
1891 const unsigned char *g_supplicant_network_get_bssid(GSupplicantNetwork *network)
1892 {
1893         if (network == NULL || network->best_bss == NULL)
1894                 return NULL;
1895
1896         return (const unsigned char *)network->best_bss->bssid;
1897 }
1898
1899 dbus_bool_t g_supplicant_network_get_transition_mode(GSupplicantNetwork *network)
1900 {
1901         if (network == NULL)
1902                 return FALSE;
1903
1904         return network->owe_transition_mode;
1905 }
1906
1907 const unsigned char *g_supplicant_network_get_transition_mode_bssid(GSupplicantNetwork *network)
1908 {
1909         if (network == NULL)
1910                 return NULL;
1911
1912         return (const unsigned char *)network->transition_mode_bssid;
1913 }
1914
1915 const void *g_supplicant_network_get_transition_mode_ssid(GSupplicantNetwork *network,
1916                                                 unsigned int *transition_mode_ssid_len)
1917 {
1918         if (!network) {
1919                 *transition_mode_ssid_len = 0;
1920                 return NULL;
1921         }
1922
1923         *transition_mode_ssid_len = network->transition_mode_ssid_len;
1924         return network->transition_mode_ssid;
1925 }
1926
1927 unsigned int g_supplicant_network_get_maxrate(GSupplicantNetwork *network)
1928 {
1929         if (network == NULL || network->best_bss == NULL)
1930                 return 0;
1931
1932         return network->best_bss->maxrate;
1933 }
1934
1935 const char *g_supplicant_network_get_enc_mode(GSupplicantNetwork *network)
1936 {
1937         if (network == NULL || network->best_bss == NULL)
1938                 return NULL;
1939
1940         if (network->best_bss->security == G_SUPPLICANT_SECURITY_PSK ||
1941                         network->best_bss->security == G_SUPPLICANT_SECURITY_SAE ||
1942                         network->best_bss->security == G_SUPPLICANT_SECURITY_OWE ||
1943                         network->best_bss->security == G_SUPPLICANT_SECURITY_DPP ||
1944                         network->best_bss->security == G_SUPPLICANT_SECURITY_IEEE8021X) {
1945                 unsigned int pairwise;
1946
1947                 pairwise = network->best_bss->rsn_pairwise |
1948                                 network->best_bss->wpa_pairwise;
1949
1950                 if ((pairwise & G_SUPPLICANT_PAIRWISE_CCMP) &&
1951                     (pairwise & G_SUPPLICANT_PAIRWISE_TKIP))
1952                         return "mixed";
1953                 else if (pairwise & G_SUPPLICANT_PAIRWISE_CCMP)
1954                         return "aes";
1955                 else if (pairwise & G_SUPPLICANT_PAIRWISE_TKIP)
1956                         return "tkip";
1957
1958         } else if (network->best_bss->security == G_SUPPLICANT_SECURITY_WEP)
1959                 return "wep";
1960         else if (network->best_bss->security == G_SUPPLICANT_SECURITY_NONE)
1961                 return "none";
1962
1963         return NULL;
1964 }
1965
1966 bool g_supplicant_network_get_rsn_mode(GSupplicantNetwork *network)
1967 {
1968         if (network == NULL || network->best_bss == NULL)
1969                 return 0;
1970
1971         if (network->best_bss->security == G_SUPPLICANT_SECURITY_OWE ||
1972                         network->best_bss->security == G_SUPPLICANT_SECURITY_DPP)
1973                 return false;
1974
1975         if (network->best_bss->rsn_selected) {
1976                 const char *mode = g_supplicant_network_get_enc_mode(network);
1977                 if (g_strcmp0(mode, "aes") == 0 ||
1978                                 g_strcmp0(mode, "mixed") == 0)
1979                         return true;
1980                 else
1981                         return false;
1982         } else
1983                 return false;
1984 }
1985
1986 void *g_supplicant_network_get_wifi_vsie(GSupplicantNetwork *network)
1987 {
1988         GSList *vsie_list = NULL;
1989
1990         if (!network)
1991                 return NULL;
1992
1993         if (g_slist_length(network->vsie_list) > 0) {
1994                 GSList *list = NULL;
1995                 unsigned char *vsie = NULL;
1996                 for (list = network->vsie_list; list; list = list->next) {
1997                         unsigned char *ie = (unsigned char *)list->data;
1998                         if (ie == NULL)
1999                                 continue;
2000                         vsie = (unsigned char *)g_try_malloc0(ie[1]+2); // tag number size(1), tag length size(1)
2001
2002                         if (vsie) {
2003                                 memcpy(vsie, ie, ie[1]+2);
2004                                 vsie_list = g_slist_append(vsie_list, vsie);
2005                         } else
2006                                 SUPPLICANT_DBG("Failed to allocate memory");
2007                 }
2008         }
2009
2010         return vsie_list;
2011 }
2012
2013 static bool compare_bssid(unsigned char *bssid_a, unsigned char *bssid_b)
2014 {
2015         if (!memcmp(bssid_a, bssid_b, WIFI_BSSID_LEN_MAX))
2016                 return true;
2017
2018         return false;
2019 }
2020
2021 static gchar *convert_bssid_to_str(unsigned char *bssid)
2022 {
2023         GString *bssid_str;
2024         unsigned int i;
2025
2026         bssid_str = g_string_sized_new(18);
2027         if (!bssid_str)
2028                 return NULL;
2029
2030         for (i = 0; i < WIFI_BSSID_LEN_MAX; i++) {
2031                 g_string_append_printf(bssid_str, "%02x", bssid[i]);
2032                 if (i < WIFI_BSSID_LEN_MAX - 1)
2033                         g_string_append(bssid_str, ":");
2034         }
2035
2036         return g_string_free(bssid_str, FALSE);
2037 }
2038
2039 #if defined TIZEN_EXT_INS
2040 static void count_assoc_reject(gpointer data, gpointer user_data)
2041 {
2042         time_t assoc_reject_time = GPOINTER_TO_INT(data);
2043         struct assoc_count_data *assoc_count = user_data;
2044
2045         if (assoc_reject_time > assoc_count->ref_time)
2046                 assoc_count->assoc_count++;
2047 }
2048
2049 static uint16_t get_assoc_reject_cnt(GHashTable *assoc_reject_table, unsigned char *bssid)
2050 {
2051         gchar *bssid_str;
2052         struct assoc_reject_data *assoc_data;
2053         struct assoc_count_data assoc_count;
2054         time_t curr_time;
2055         struct tm* timeinfo;
2056
2057         if (g_hash_table_size(assoc_reject_table) < 1)
2058                 return 0;
2059
2060         if (!bssid)
2061                 return 0;
2062
2063         if (!memcmp(bssid, invalid_bssid, WIFI_BSSID_LEN_MAX))
2064                 return 0;
2065
2066         bssid_str = convert_bssid_to_str(bssid);
2067         if (!bssid_str)
2068                 return 0;
2069
2070         assoc_data = g_hash_table_lookup(assoc_reject_table, bssid_str);
2071         if (!assoc_data) {
2072                 g_free(bssid_str);
2073                 return 0;
2074         }
2075
2076         if (g_slist_length(assoc_data->reject_time_list) < 1) {
2077                 g_free(bssid_str);
2078                 return 0;
2079         }
2080
2081         /* Only events that occur within one hour are appened. */
2082         curr_time = time(NULL);
2083         timeinfo = localtime(&curr_time);
2084         timeinfo->tm_hour -= 1;
2085
2086         assoc_count.ref_time = mktime(timeinfo);
2087         assoc_count.assoc_count = 0;
2088
2089         g_slist_foreach(assoc_data->reject_time_list, count_assoc_reject, &assoc_count);
2090
2091         g_free(bssid_str);
2092         return assoc_count.assoc_count;
2093 }
2094
2095 static int calculate_score_last_connected_bssid(bool is_last_connected)
2096 {
2097         int score = 0;
2098
2099         if (ins_settings.last_connected_bssid) {
2100                 if (is_last_connected)
2101                         score += ins_settings.last_connected_bssid_score;
2102         }
2103
2104         return score;
2105 }
2106
2107 static int calculate_score_assoc_reject(uint16_t assoc_reject_cnt)
2108 {
2109         int score = 0;
2110
2111         if (ins_settings.assoc_reject)
2112                 score -= (assoc_reject_cnt * ins_settings.assoc_reject_score);
2113
2114         return score;
2115 }
2116
2117 static int calculate_score_frequency(dbus_int16_t strength, dbus_uint16_t frequency)
2118 {
2119         int score = 0;
2120
2121         switch (ins_settings.preferred_freq_bssid) {
2122         case G_SUPPLICANT_INS_PREFERRED_FREQ_24GHZ:
2123                 if ((frequency >= FREQ_RANGE_24GHZ_CHANNEL_1 &&
2124                         frequency <= FREQ_RANGE_24GHZ_CHANNEL_14) &&
2125                         (strength > ins_settings.signal_level3_24ghz))
2126                         score += ins_settings.preferred_freq_bssid_score;
2127
2128                 break;
2129         case G_SUPPLICANT_INS_PREFERRED_FREQ_5GHZ:
2130                 if ((frequency >= FREQ_RANGE_5GHZ_CHANNEL_32 &&
2131                         frequency <= FREQ_RANGE_5GHZ_CHANNEL_165) &&
2132                         (strength > ins_settings.signal_level3_5ghz))
2133                         score += ins_settings.preferred_freq_bssid_score;
2134
2135                 break;
2136         default:
2137                 break;
2138         }
2139
2140         return score;
2141 }
2142
2143 static int calculate_score_strength(dbus_int16_t strength)
2144 {
2145         int score = 0;
2146
2147         if (ins_settings.signal_bssid)
2148                 score += (((strength > -60) ? -60 : strength) + 85);
2149
2150         return score;
2151 }
2152
2153 static int calculate_score_est_throughput(dbus_uint32_t est_throughput)
2154 {
2155         int score = 0;
2156
2157         if (est_throughput >= 10000)
2158                 score = est_throughput / 10000;
2159
2160         if (score > 40)
2161                 score = 40;
2162
2163         return score;
2164 }
2165
2166 static int calculate_score(bool is_last_connected, uint16_t assoc_reject_cnt,
2167                 dbus_uint16_t frequency, dbus_int16_t strength,
2168                 dbus_int16_t snr, dbus_uint32_t est_throughput)
2169 {
2170         int score = 0;
2171
2172         score += calculate_score_last_connected_bssid(is_last_connected);
2173         score += calculate_score_assoc_reject(assoc_reject_cnt);
2174         score += calculate_score_frequency(strength, frequency);
2175         score += calculate_score_strength(strength);
2176         score += (int)snr;
2177         score += calculate_score_est_throughput(est_throughput);
2178
2179         return score;
2180 }
2181 #endif
2182
2183 static void update_bssid_list(gpointer key, gpointer value, gpointer user_data)
2184 {
2185         struct g_supplicant_bss *bss = value;
2186         struct g_connman_bssids *bssids = NULL;
2187         struct update_bssid_data *bssid_data = (struct update_bssid_data *)user_data;
2188
2189         bssids = (struct g_connman_bssids *)g_try_malloc0(sizeof(struct g_connman_bssids));
2190
2191         if (bssids) {
2192                 memcpy(bssids->bssid, bss->bssid, WIFI_BSSID_LEN_MAX);
2193
2194                 bssids->strength = bss->signal;
2195                 bssids->strength += 120;
2196
2197                 if (bssids->strength > 100)
2198                         bssids->strength = 100;
2199
2200                 bssids->frequency = bss->frequency;
2201                 bssids->score_snr = (int)bss->snr;
2202
2203 #if defined TIZEN_EXT_INS
2204                 bssids->assoc_reject_cnt = get_assoc_reject_cnt(bssid_data->assoc_reject_table, bssids->bssid);
2205                 bssids->is_last_connected = compare_bssid(bssids->bssid, bssid_data->last_connected_bssid);
2206
2207                 bssids->score_last_connected_bssid = calculate_score_last_connected_bssid(bssids->is_last_connected);
2208                 bssids->score_assoc_reject = calculate_score_assoc_reject(bssids->assoc_reject_cnt);
2209                 bssids->score_frequency = calculate_score_frequency(bss->signal, bssids->frequency);
2210                 bssids->score_strength = calculate_score_strength(bss->signal);
2211                 bssids->score_est_throughput = calculate_score_est_throughput(bss->est_throughput);
2212
2213                 bssids->ins_score = calculate_score(bssids->is_last_connected,
2214                         bssids->assoc_reject_cnt, bssids->frequency, bss->signal,
2215                         bss->snr, bss->est_throughput);
2216 #else
2217                 bssids->ins_score = bss->signal;
2218 #endif
2219                 bssid_data->bssid_list = g_slist_append(bssid_data->bssid_list, bssids);
2220         } else
2221                 SUPPLICANT_DBG("Failed to allocate memory");
2222 }
2223
2224 static gint cmp_bss(gconstpointer a, gconstpointer b)
2225 {
2226         struct g_connman_bssids *entry_a = (struct g_connman_bssids *)a;
2227         struct g_connman_bssids *entry_b = (struct g_connman_bssids *)b;
2228
2229         if (entry_a->ins_score > entry_b->ins_score)
2230                 return -1;
2231
2232         if (entry_a->ins_score < entry_b->ins_score)
2233                 return 1;
2234
2235         if (entry_a->ins_score == entry_b->ins_score) {
2236                 if (entry_a->strength >= entry_b->strength)
2237                         return -1;
2238                 else
2239                         return 1;
2240         }
2241
2242         return 0;
2243 }
2244
2245 #if defined TIZEN_EXT_INS
2246 static void print_bssid_sort(gpointer data, gpointer user_data)
2247 {
2248         struct g_connman_bssids *bssids = data;
2249
2250         GSupplicantNetwork *network = (GSupplicantNetwork *) user_data;
2251
2252         if (!bssids || !network)
2253                 return;
2254
2255         SUPPLICANT_DBG("ssid [%-20s] bssid[" MACSTR "] total[%2d] freq[%2d] "
2256                         "last_conn[%2d] assoc_reject[%2d] strength[%2d] rssi[%2d]",
2257                         network->ssid, MAC2STR(bssids->bssid), bssids->ins_score,
2258                         bssids->score_frequency, bssids->score_last_connected_bssid,
2259                         bssids->score_assoc_reject, bssids->score_strength, bssids->strength - 120);
2260 }
2261 #endif
2262
2263 void *g_supplicant_network_get_bssid_list(GSupplicantNetwork *network)
2264 {
2265         struct update_bssid_data bssid_data;
2266
2267         if (g_hash_table_size(network->bss_table) < 1)
2268                 return NULL;
2269
2270         bssid_data.network = network;
2271         memset(&bssid_data, 0, sizeof(bssid_data));
2272         memcpy(bssid_data.last_connected_bssid, network->last_connected_bssid, WIFI_BSSID_LEN_MAX);
2273         bssid_data.assoc_reject_table = network->assoc_reject_table;
2274
2275         g_hash_table_foreach(network->bss_table, update_bssid_list, &bssid_data);
2276         bssid_data.bssid_list = g_slist_sort(bssid_data.bssid_list, cmp_bss);
2277 #if defined TIZEN_EXT_INS
2278         g_slist_foreach(bssid_data.bssid_list, print_bssid_sort, (gpointer)network);
2279 #endif
2280
2281         return bssid_data.bssid_list;
2282 }
2283
2284 void g_supplicant_network_set_last_connected_bssid(GSupplicantNetwork *network, const unsigned char *bssid)
2285 {
2286         if (!bssid)
2287                 return;
2288
2289         if (!memcmp(bssid, invalid_bssid, WIFI_BSSID_LEN_MAX))
2290                 return;
2291
2292         memcpy(network->last_connected_bssid, bssid, WIFI_BSSID_LEN_MAX);
2293
2294         SUPPLICANT_DBG("last connected bssid [" MACSTR "]", MAC2STR(bssid));
2295 }
2296
2297 const unsigned char *g_supplicant_network_get_last_connected_bssid(GSupplicantNetwork *network)
2298 {
2299         if (network == NULL)
2300                 return NULL;
2301
2302         return (const unsigned char *)network->last_connected_bssid;
2303 }
2304
2305 void g_supplicant_network_update_assoc_reject(GSupplicantInterface *interface,
2306                 GSupplicantNetwork *network)
2307 {
2308         struct assoc_reject_data *assoc_data;
2309         gchar *bssid_str;
2310         time_t curr_time;
2311
2312         if (!network)
2313                 return;
2314
2315         bssid_str = convert_bssid_to_str(interface->add_network_bssid);
2316         if (!bssid_str)
2317                 return;
2318
2319         assoc_data = g_hash_table_lookup(network->assoc_reject_table, bssid_str);
2320         if (!assoc_data) {
2321                 assoc_data = g_try_new0(struct assoc_reject_data, 1);
2322                 if (!assoc_data) {
2323                         g_free(bssid_str);
2324                         return;
2325                 }
2326
2327                 assoc_data->bssid = g_strdup(bssid_str);
2328                 g_hash_table_insert(network->assoc_reject_table, assoc_data->bssid, assoc_data);
2329         }
2330
2331         curr_time = time(NULL);
2332         assoc_data->reject_time_list = g_slist_append(assoc_data->reject_time_list, GINT_TO_POINTER(curr_time));
2333
2334         SUPPLICANT_DBG("bssid [%s] time [%u]", bssid_str, curr_time);
2335
2336         g_free(bssid_str);
2337
2338         callback_network_changed(network, "UpdateAssocReject");
2339 }
2340
2341 GHashTable *g_supplicant_network_get_assoc_reject_table(GSupplicantNetwork *network)
2342 {
2343         if (!network)
2344                 return NULL;
2345
2346         return network->assoc_reject_table;
2347 }
2348
2349 GSupplicantNetwork *g_supplicant_interface_get_network(GSupplicantInterface *interface,
2350                 const char *group)
2351 {
2352         if (!interface)
2353                 return NULL;
2354
2355         return g_hash_table_lookup(interface->network_table, group);
2356 }
2357
2358 static void copy_assoc_reject(gpointer key, gpointer value, gpointer user_data)
2359 {
2360         struct assoc_reject_data *cloned_assoc_data;
2361         struct assoc_reject_data *assoc_data = value;
2362         GHashTable *cloned_assoc_reject_table = user_data;
2363
2364         if (assoc_data && cloned_assoc_reject_table) {
2365                 cloned_assoc_data = g_try_new0(struct assoc_reject_data, 1);
2366                 if (!cloned_assoc_data)
2367                         return;
2368
2369                 cloned_assoc_data->bssid = g_strdup(assoc_data->bssid);
2370                 cloned_assoc_data->reject_time_list = g_slist_copy(assoc_data->reject_time_list);
2371                 g_hash_table_insert(cloned_assoc_reject_table,
2372                                         cloned_assoc_data->bssid, cloned_assoc_data);
2373         }
2374 }
2375
2376 GHashTable *g_supplicant_network_clone_assoc_reject_table(GSupplicantNetwork *network)
2377 {
2378         GHashTable *cloned_assoc_reject_table;
2379
2380         if (!network)
2381                 return NULL;
2382
2383         GHashTable *assoc_reject_table = g_supplicant_network_get_assoc_reject_table(network);
2384         if (!assoc_reject_table)
2385                 return NULL;
2386
2387         cloned_assoc_reject_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2388                                                                 NULL, remove_assoc_data);
2389         g_hash_table_foreach(assoc_reject_table, copy_assoc_reject, cloned_assoc_reject_table);
2390
2391         return cloned_assoc_reject_table;
2392 }
2393
2394 #endif
2395
2396 static void merge_network(GSupplicantNetwork *network)
2397 {
2398         GString *str;
2399         const char *ssid, *mode, *key_mgmt;
2400 #if defined TIZEN_EXT
2401         const char *isHS20AP;
2402         const char *eap, *identity, *phase2;
2403 #endif
2404         unsigned int i, ssid_len;
2405         char *group;
2406
2407         ssid = g_hash_table_lookup(network->config_table, "ssid");
2408         mode = g_hash_table_lookup(network->config_table, "mode");
2409         key_mgmt = g_hash_table_lookup(network->config_table, "key_mgmt");
2410 #if defined TIZEN_EXT
2411         isHS20AP = g_hash_table_lookup(network->config_table, "isHS20AP");
2412         eap = g_hash_table_lookup(network->config_table, "eap");
2413         identity = g_hash_table_lookup(network->config_table, "identity");
2414         phase2 = g_hash_table_lookup(network->config_table, "phase2");
2415 #endif
2416
2417         SUPPLICANT_DBG("ssid %s mode %s", ssid, mode);
2418
2419         if (ssid)
2420                 ssid_len = strlen(ssid);
2421         else
2422                 ssid_len = 0;
2423
2424         str = g_string_sized_new((ssid_len * 2) + 24);
2425         if (!str)
2426                 return;
2427
2428         for (i = 0; i < ssid_len; i++)
2429 #if defined TIZEN_EXT
2430         {
2431                 if (ssid[i] != '"')
2432 #endif
2433                 g_string_append_printf(str, "%02x", ssid[i]);
2434 #if defined TIZEN_EXT
2435         }
2436 #endif
2437
2438         if (g_strcmp0(mode, "0") == 0)
2439                 g_string_append_printf(str, "_managed");
2440         else if (g_strcmp0(mode, "1") == 0)
2441                 g_string_append_printf(str, "_adhoc");
2442 #if defined TIZEN_EXT_WIFI_MESH
2443         else if (g_strcmp0(mode, "5") == 0)
2444                 g_string_append_printf(str, "_mesh");
2445 #endif
2446
2447         if (g_strcmp0(key_mgmt, "WPA-PSK") == 0)
2448                 g_string_append_printf(str, "_psk");
2449 #if defined TIZEN_EXT
2450         else if (g_strcmp0(key_mgmt, "WPA-EAP") == 0)
2451                 g_string_append_printf(str, "_ieee8021x");
2452         else
2453                 g_string_append_printf(str, "_none");
2454 #endif
2455
2456         group = g_string_free(str, FALSE);
2457
2458         SUPPLICANT_DBG("%s", group);
2459
2460 #if defined TIZEN_EXT
2461         if (g_strcmp0(isHS20AP, "1") == 0) {
2462                 network->isHS20AP = 1;
2463                 if (network->eap)
2464                         g_free(network->eap);
2465                 network->eap = g_strdup(eap);
2466
2467                 if (network->identity)
2468                         g_free(network->identity);
2469                 network->identity = g_strdup(identity);
2470
2471                 if (network->phase2)
2472                         g_free(network->phase2);
2473                 network->phase2 = g_strdup(phase2);
2474         } else
2475                 network->isHS20AP = 0;
2476
2477         network->group = g_strdup(group);
2478         callback_network_merged(network);
2479         g_free(network->group);
2480 #endif
2481
2482         g_free(group);
2483
2484         g_hash_table_destroy(network->config_table);
2485
2486         g_free(network->path);
2487         g_free(network);
2488 }
2489
2490 static void network_property(const char *key, DBusMessageIter *iter,
2491                                                         void *user_data)
2492 {
2493         GSupplicantNetwork *network = user_data;
2494
2495         if (!network->interface)
2496                 return;
2497
2498         if (!key) {
2499                 merge_network(network);
2500                 return;
2501         }
2502
2503         if (g_strcmp0(key, "Enabled") == 0) {
2504                 dbus_bool_t enabled = FALSE;
2505
2506                 dbus_message_iter_get_basic(iter, &enabled);
2507         } else if (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_STRING) {
2508                 const char *str = NULL;
2509
2510                 dbus_message_iter_get_basic(iter, &str);
2511                 if (str) {
2512                         g_hash_table_replace(network->config_table,
2513                                                 g_strdup(key), g_strdup(str));
2514                 }
2515         } else
2516                 SUPPLICANT_DBG("key %s type %c",
2517                                 key, dbus_message_iter_get_arg_type(iter));
2518 }
2519
2520 static void interface_network_added(DBusMessageIter *iter, void *user_data)
2521 {
2522         GSupplicantInterface *interface = user_data;
2523         GSupplicantNetwork *network;
2524         const char *path = NULL;
2525
2526         SUPPLICANT_DBG("");
2527
2528         dbus_message_iter_get_basic(iter, &path);
2529         if (!path)
2530                 return;
2531
2532         if (g_strcmp0(path, "/") == 0)
2533                 return;
2534
2535         network = g_try_new0(GSupplicantNetwork, 1);
2536         if (!network)
2537                 return;
2538
2539         network->interface = interface;
2540         network->path = g_strdup(path);
2541
2542         network->config_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2543                                                         g_free, g_free);
2544
2545         dbus_message_iter_next(iter);
2546         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
2547                 supplicant_dbus_property_foreach(iter, network_property,
2548                                                                 network);
2549                 network_property(NULL, NULL, network);
2550                 return;
2551         }
2552
2553         supplicant_dbus_property_get_all(path,
2554                                 SUPPLICANT_INTERFACE ".Network",
2555                                         network_property, network, NULL);
2556 }
2557
2558 static void interface_network_removed(DBusMessageIter *iter, void *user_data)
2559 {
2560         SUPPLICANT_DBG("");
2561 }
2562
2563 static char *create_name(unsigned char *ssid, int ssid_len)
2564 {
2565         GString *string;
2566         const gchar *remainder, *invalid;
2567         int valid_bytes, remaining_bytes;
2568
2569         if (ssid_len < 1 || ssid[0] == '\0')
2570                 return g_strdup("");
2571
2572         string = NULL;
2573         remainder = (const gchar *)ssid;
2574         remaining_bytes = ssid_len;
2575
2576         while (remaining_bytes != 0) {
2577                 if (g_utf8_validate(remainder, remaining_bytes,
2578                                         &invalid)) {
2579                         break;
2580                 }
2581
2582                 valid_bytes = invalid - remainder;
2583
2584                 if (!string)
2585                         string = g_string_sized_new(remaining_bytes);
2586
2587                 g_string_append_len(string, remainder, valid_bytes);
2588
2589                 /* append U+FFFD REPLACEMENT CHARACTER */
2590                 g_string_append(string, "\357\277\275");
2591
2592                 remaining_bytes -= valid_bytes + 1;
2593                 remainder = invalid + 1;
2594         }
2595
2596         if (!string)
2597                 return g_strndup((const gchar *)ssid, ssid_len + 1);
2598
2599         g_string_append(string, remainder);
2600
2601         return g_string_free(string, FALSE);
2602 }
2603
2604 static char *create_group(struct g_supplicant_bss *bss)
2605 {
2606         GString *str;
2607         unsigned int i;
2608         const char *mode, *security;
2609
2610         str = g_string_sized_new((bss->ssid_len * 2) + 24);
2611         if (!str)
2612                 return NULL;
2613
2614         if (bss->ssid_len > 0 && bss->ssid[0] != '\0') {
2615                 for (i = 0; i < bss->ssid_len; i++)
2616                         g_string_append_printf(str, "%02x", bss->ssid[i]);
2617         } else
2618                 g_string_append_printf(str, "hidden");
2619
2620         mode = mode2string(bss->mode);
2621         if (mode)
2622                 g_string_append_printf(str, "_%s", mode);
2623
2624         security = security2string(bss->security);
2625         if (security)
2626                 g_string_append_printf(str, "_%s", security);
2627
2628         return g_string_free(str, FALSE);
2629 }
2630 #if defined TIZEN_EXT
2631 static void update_network_with_best_bss(GSupplicantNetwork *network,
2632                 struct g_supplicant_bss *best_bss)
2633 {
2634         /*
2635          * Do not change best BSS if we are connected.
2636          */
2637         if (network->interface->state == G_SUPPLICANT_STATE_COMPLETED)
2638                 return;
2639
2640         network->signal = best_bss->signal;
2641         network->frequency = best_bss->frequency;
2642         network->best_bss = best_bss;
2643 }
2644
2645 static bool update_best_bss(GSupplicantNetwork *network,
2646                 struct g_supplicant_bss *bss, struct g_supplicant_bss *best_bss)
2647 {
2648         int score_new;
2649         int score_best;
2650
2651         if (network->best_bss == NULL) {
2652                 update_network_with_best_bss(network, bss);
2653                 return true;
2654         }
2655
2656 #if defined TIZEN_EXT_INS
2657         score_new = calculate_score(
2658                 compare_bssid(bss->bssid, network->last_connected_bssid),
2659                 get_assoc_reject_cnt(network->assoc_reject_table, bss->bssid),
2660                 bss->frequency, bss->signal, bss->snr, bss->est_throughput);
2661
2662         score_best = calculate_score(
2663                 compare_bssid(network->best_bss->bssid, network->last_connected_bssid),
2664                 get_assoc_reject_cnt(network->assoc_reject_table, network->best_bss->bssid),
2665                 network->best_bss->frequency, network->best_bss->signal,
2666                 network->best_bss->snr, network->best_bss->est_throughput);
2667 #else
2668         score_new = bss->signal;
2669         score_best = network->best_bss->signal;
2670 #endif
2671
2672         if (score_new > score_best) {
2673                 SUPPLICANT_DBG("new[" MACSTR "][%d] : best[" MACSTR "][%d]",
2674                         MAC2STR(bss->bssid), score_new,
2675                         MAC2STR(network->best_bss->bssid), score_best);
2676
2677                 update_network_with_best_bss(network, bss);
2678
2679                 SUPPLICANT_DBG("Update best BSS for %s", network->name);
2680
2681                 return true;
2682         }
2683
2684         return false;
2685 }
2686 #endif
2687 static int add_or_replace_bss_to_network(struct g_supplicant_bss *bss)
2688 {
2689         GSupplicantInterface *interface = bss->interface;
2690         GSupplicantNetwork *network;
2691         char *group;
2692         bool is_new_network;
2693
2694         group = create_group(bss);
2695         SUPPLICANT_DBG("New group created: %s", group);
2696
2697         if (!group)
2698                 return -ENOMEM;
2699
2700         network = g_hash_table_lookup(interface->network_table, group);
2701         if (network) {
2702                 g_free(group);
2703                 SUPPLICANT_DBG("Network %s already exist", network->name);
2704                 is_new_network = false;
2705
2706                 goto done;
2707         }
2708
2709         is_new_network = true;
2710
2711         network = g_try_new0(GSupplicantNetwork, 1);
2712         if (!network) {
2713                 g_free(group);
2714                 return -ENOMEM;
2715         }
2716
2717         network->interface = interface;
2718         if (!network->path)
2719                 network->path = g_strdup(bss->path);
2720         network->group = group;
2721         network->name = create_name(bss->ssid, bss->ssid_len);
2722         network->mode = bss->mode;
2723         network->security = bss->security;
2724         network->ssid_len = bss->ssid_len;
2725         memcpy(network->ssid, bss->ssid, bss->ssid_len);
2726         network->signal = bss->signal;
2727         network->frequency = bss->frequency;
2728         network->best_bss = bss;
2729
2730         if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
2731                 network->wps = TRUE;
2732                 network->wps_capabilities = bss->wps_capabilities;
2733         }
2734
2735 #if defined TIZEN_EXT
2736         network->owe_transition_mode = bss->owe_transition_mode;
2737         network->privacy = bss->privacy;
2738         memcpy(network->transition_mode_ssid, bss->transition_mode_ssid, bss->transition_mode_ssid_len);
2739         memcpy(network->transition_mode_bssid, bss->transition_mode_bssid, WIFI_BSSID_LEN_MAX);
2740
2741         network->keymgmt = bss->keymgmt;
2742
2743         if (g_slist_length(bss->vsie_list) > 0) {
2744                 GSList *list = NULL;
2745                 unsigned char *vsie = NULL;
2746                 for (list = bss->vsie_list; list; list = list->next) {
2747                         unsigned char *ie = (unsigned char *)list->data;
2748                         vsie = (unsigned char *)g_try_malloc0(ie[1]+2); // tag number size(1), tag length size(1)
2749
2750                         if (vsie) {
2751                                 memcpy(vsie, ie, ie[1]+2);
2752                                 network->vsie_list = g_slist_append(network->vsie_list, vsie);
2753                         } else
2754                                 SUPPLICANT_DBG("Failed to allocate memory.");
2755                 }
2756         }
2757
2758         network->isHS20AP = bss->hs20;
2759         memcpy(network->country_code, bss->country_code, COUNTRY_CODE_LENGTH);
2760         network->phy_mode = bss->phy_mode;
2761 #endif
2762
2763         SUPPLICANT_DBG("New network %s created", network->name);
2764
2765         network->bss_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2766                                                         NULL, remove_bss);
2767
2768         network->config_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2769                                                         g_free, g_free);
2770
2771 #if defined TIZEN_EXT
2772         network->assoc_reject_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2773                                                         NULL, remove_assoc_data);
2774 #endif
2775
2776         g_hash_table_replace(interface->network_table,
2777                                                 network->group, network);
2778
2779         callback_network_added(network);
2780
2781 done:
2782         /* We update network's WPS properties if only bss provides WPS. */
2783         if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
2784                 network->wps = TRUE;
2785                 network->wps_capabilities = bss->wps_capabilities;
2786
2787                 if (!is_new_network)
2788                         callback_network_changed(network, "WPSCapabilities");
2789         }
2790
2791         /*
2792          * Do not change best BSS if we are connected. It will be done through
2793          * CurrentBSS property in case of misalignment with wpa_s or roaming.
2794          */
2795 #if defined TIZEN_EXT
2796         if (network != interface->current_network) {
2797                 if (update_best_bss(network, bss, network->best_bss))
2798                         callback_network_changed(network, "Signal");
2799         }
2800 #else
2801         if (network != interface->current_network &&
2802                                 bss->signal > network->signal) {
2803                 network->signal = bss->signal;
2804                 network->best_bss = bss;
2805                 callback_network_changed(network, "Signal");
2806         }
2807 #endif
2808
2809         g_hash_table_replace(interface->bss_mapping, bss->path, network);
2810         g_hash_table_replace(network->bss_table, bss->path, bss);
2811
2812         g_hash_table_replace(bss_mapping, bss->path, interface);
2813
2814         return 0;
2815 }
2816
2817 static void bss_rates(DBusMessageIter *iter, void *user_data)
2818 {
2819         struct g_supplicant_bss *bss = user_data;
2820         dbus_uint32_t rate = 0;
2821
2822         dbus_message_iter_get_basic(iter, &rate);
2823         if (rate == 0)
2824                 return;
2825
2826         if (rate > bss->maxrate)
2827                 bss->maxrate = rate;
2828 }
2829
2830 static void bss_keymgmt(DBusMessageIter *iter, void *user_data)
2831 {
2832         unsigned int *keymgmt = user_data;
2833         const char *str = NULL;
2834         int i;
2835
2836         dbus_message_iter_get_basic(iter, &str);
2837         if (!str)
2838                 return;
2839
2840         for (i = 0; keymgmt_map[i].str; i++)
2841                 if (strcmp(str, keymgmt_map[i].str) == 0) {
2842                         SUPPLICANT_DBG("Keymgmt: %s", str);
2843                         *keymgmt |= keymgmt_map[i].val;
2844                         break;
2845                 }
2846 }
2847
2848 static void bss_group(DBusMessageIter *iter, void *user_data)
2849 {
2850         unsigned int *group = user_data;
2851         const char *str = NULL;
2852         int i;
2853
2854         dbus_message_iter_get_basic(iter, &str);
2855         if (!str)
2856                 return;
2857
2858         for (i = 0; group_map[i].str; i++)
2859                 if (strcmp(str, group_map[i].str) == 0) {
2860                         SUPPLICANT_DBG("Group: %s", str);
2861                         *group |= group_map[i].val;
2862                         break;
2863                 }
2864 }
2865
2866 static void bss_pairwise(DBusMessageIter *iter, void *user_data)
2867 {
2868         unsigned int *pairwise = user_data;
2869         const char *str = NULL;
2870         int i;
2871
2872         dbus_message_iter_get_basic(iter, &str);
2873         if (!str)
2874                 return;
2875
2876         for (i = 0; pairwise_map[i].str; i++)
2877                 if (strcmp(str, pairwise_map[i].str) == 0) {
2878                         SUPPLICANT_DBG("Pairwise: %s", str);
2879                         *pairwise |= pairwise_map[i].val;
2880                         break;
2881                 }
2882 }
2883
2884 static void bss_wpa(const char *key, DBusMessageIter *iter,
2885                         void *user_data)
2886 {
2887         struct g_supplicant_bss *bss = user_data;
2888         unsigned int value = 0;
2889
2890         SUPPLICANT_DBG("Key: %s", key);
2891
2892         if (g_strcmp0(key, "KeyMgmt") == 0) {
2893                 supplicant_dbus_array_foreach(iter, bss_keymgmt, &value);
2894
2895                 if (bss->rsn_selected)
2896                         bss->rsn_keymgmt = value;
2897                 else
2898                         bss->wpa_keymgmt = value;
2899         } else if (g_strcmp0(key, "Group") == 0) {
2900                 supplicant_dbus_array_foreach(iter, bss_group, &value);
2901
2902                 if (bss->rsn_selected)
2903                         bss->rsn_group = value;
2904                 else
2905                         bss->wpa_group = value;
2906         } else if (g_strcmp0(key, "Pairwise") == 0) {
2907                 supplicant_dbus_array_foreach(iter, bss_pairwise, &value);
2908
2909                 if (bss->rsn_selected)
2910                         bss->rsn_pairwise = value;
2911                 else
2912                         bss->wpa_pairwise = value;
2913         }
2914 }
2915
2916 static unsigned int get_tlv(unsigned char *ie, unsigned int ie_size,
2917                                                         unsigned int type)
2918 {
2919         unsigned int len = 0;
2920
2921         while (len + 4 < ie_size) {
2922                 unsigned int hi = ie[len];
2923                 unsigned int lo = ie[len + 1];
2924                 unsigned int tmp_type = (hi << 8) + lo;
2925                 unsigned int v_len = 0;
2926
2927                 /* hi and lo are used to recreate an unsigned int
2928                  * based on 2 8bits length unsigned int. */
2929
2930                 hi = ie[len + 2];
2931                 lo = ie[len + 3];
2932                 v_len = (hi << 8) + lo;
2933
2934                 if (tmp_type == type) {
2935                         unsigned int ret_value = 0;
2936                         unsigned char *value = (unsigned char *)&ret_value;
2937
2938                         SUPPLICANT_DBG("IE: match type 0x%x", type);
2939
2940                         /* Verifying length relevance */
2941                         if (v_len > sizeof(unsigned int) ||
2942                                 len + 4 + v_len > ie_size)
2943                                 break;
2944
2945                         memcpy(value, ie + len + 4, v_len);
2946
2947                         SUPPLICANT_DBG("returning 0x%x", ret_value);
2948                         return ret_value;
2949                 }
2950
2951                 len += v_len + 4;
2952         }
2953
2954         SUPPLICANT_DBG("returning 0");
2955         return 0;
2956 }
2957
2958 #if defined TIZEN_EXT
2959 static void get_bss_phy_mode(unsigned int max_rate,
2960                 unsigned int max_ext_rate, bool ht, bool vht, void *data)
2961 {
2962         struct g_supplicant_bss *bss = data;
2963         unsigned int freq = bss->frequency;
2964
2965         /* Following conditions are used to determine
2966          * IEEE 802.11 Protocol Modes:-
2967          *
2968          * 1. If “Supported rates” is only till 11 Mbps,
2969          *    and frequency is in 2.4GHz band, then protocol is 11B.
2970          * 2. If “Supported rates” is till 54Mbps or
2971          *    “Extended supported rates” are present,
2972          *    and frequency is in 2.4GHz band, then protocol is 11G.
2973          * 3. If “Supported rates” is only till 54 Mbps,
2974          *    frequency is in 5GHz band , then protocol is 11A.
2975          * 4. If “HT capabilities” is supported , then protocol is 11N.
2976          * 5. If “HT capabilities” & “VHT” is supported and
2977          *    frequency is in 5 GHz band, then protocol is 11AC.
2978          * */
2979
2980         if (freq >= 2412 && freq <= 2484) { /* 2.4 Ghz Band */
2981                 if (max_rate <= 11 && max_ext_rate <= 0 && !ht)
2982                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211B;
2983                 else if ((max_rate <= 54 || max_ext_rate > 0) && !ht)
2984                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211BG;
2985                 else if ((max_rate >= 54 || max_ext_rate > 0) && ht)
2986                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211BGN;
2987                 else
2988                         bss->phy_mode = G_SUPPLICANT_MODE_UNKNOWN;
2989         } else if (freq >= 5180 && freq <= 5825) { /* 5 Ghz Band */
2990                 if (max_rate <= 54 && !ht)
2991                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211A;
2992                 else if ((max_rate >= 54 || max_ext_rate > 0) && ht && !vht)
2993                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211AN;
2994                 else if ((max_rate >= 54 || max_ext_rate > 0) && ht && vht)
2995                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211ANAC;
2996                 else
2997                         bss->phy_mode = G_SUPPLICANT_MODE_UNKNOWN;
2998         }
2999 }
3000 #endif
3001
3002 static void bss_process_ies(DBusMessageIter *iter, void *user_data)
3003 {
3004         struct g_supplicant_bss *bss = user_data;
3005         const unsigned char WPS_OUI[] = { 0x00, 0x50, 0xf2, 0x04 };
3006         unsigned char *ie, *ie_end;
3007         DBusMessageIter array;
3008         unsigned int value;
3009         int ie_len;
3010 #if defined TIZEN_EXT
3011         const unsigned char OWE_WFA_OUI[] = { 0x50, 0x6f, 0x9a, 0x1c };
3012         int r_len, j;
3013         unsigned char *rates = NULL;
3014         unsigned char *ext_rates = NULL;
3015         unsigned int max_rate = 0;
3016         unsigned int max_ext_rate = 0;
3017         unsigned int offset = 0;
3018         bool ht = false;
3019         bool vht = false;
3020 #endif
3021
3022 #define WMM_WPA1_WPS_INFO 221
3023 #define WPS_INFO_MIN_LEN  6
3024 #define WPS_VERSION_TLV   0x104A
3025 #define WPS_STATE_TLV     0x1044
3026 #define WPS_METHODS_TLV   0x1012
3027 #define WPS_REGISTRAR_TLV 0x1041
3028 #define WPS_VERSION       0x10
3029 #define WPS_PBC           0x04
3030 #define WPS_PIN           0x00
3031 #define WPS_CONFIGURED    0x02
3032 #if defined TIZEN_EXT
3033 #define VENDOR_SPECIFIC_INFO 0xDD
3034 #define WLAN_EID_COUNTRY 7
3035 #define WLAN_EID_RSN_INFO 48
3036 #define RSN_CAPABILITY_MFP_REQ (1 << 6)
3037 #endif
3038
3039         dbus_message_iter_recurse(iter, &array);
3040         dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
3041
3042         if (!ie || ie_len < 2)
3043                 return;
3044
3045         bss->wps_capabilities = 0;
3046         bss->keymgmt = 0;
3047
3048         for (ie_end = ie + ie_len; ie < ie_end && ie + ie[1] + 1 <= ie_end;
3049                                                         ie += ie[1] + 2) {
3050 #if defined TIZEN_EXT
3051                 unsigned char *vsie;
3052                 int vsie_len = 0;
3053
3054                 if (ie[0] == VENDOR_SPECIFIC_INFO && memcmp(ie+2, OWE_WFA_OUI, sizeof(OWE_WFA_OUI)) == 0) {
3055                         SUPPLICANT_DBG("IE: match vendor specific data : OWE Transition Mode");
3056
3057 /*
3058                 Tag: Vendor Specific: Wi-Fi Alliance: OWE Transition Mode
3059                         Tag Number: Vendor Specific (221)    -> ie[0]
3060                         Tag length: 26                       -> ie[1]
3061                         OUI: 50:6f:9a (Wi-Fi Alliance)       -> ie[2]
3062                         Vendor Specific OUI Type: 28         -> ie[5]
3063                         BSSID: 92:fd:f0:20:2b:09             -> ie[6]
3064                         SSID length: 15                      -> ie[12]
3065                         SSID: Wi-Fi-5.2.3-owe                -> ie[13]
3066
3067 0000   dd 1a 50 6f 9a 1c 92 fd f0 20 2b 09 0f 57 69 2d   ..Po..... +..Wi-
3068 0010   46 69 2d 35 2e 32 2e 33 2d 6f 77 65               Fi-5.2.3-owe
3069
3070 */
3071                         bss->owe_transition_mode = TRUE;
3072                         if (ie[1] >= 11) { // Tag length is at least up to ssid length position.
3073                                 memcpy(bss->transition_mode_bssid, ie+6, WIFI_BSSID_LEN_MAX);
3074                                 if (ie[12] > 0 && ie[12] < 32) {
3075                                         memcpy(bss->transition_mode_ssid, ie+13, ie[12]);
3076                                         bss->transition_mode_ssid_len = ie[12];
3077                                 } else
3078                                         bss->transition_mode_ssid_len = 0;
3079                         } else
3080                                 bss->owe_transition_mode = FALSE;
3081                         continue;
3082                 }
3083
3084                 if (ie[0] == VENDOR_SPECIFIC_INFO && memcmp(ie+2, WPS_OUI, sizeof(WPS_OUI)) != 0) {
3085
3086                         if (!simplified_log)
3087                                 SUPPLICANT_DBG("IE: match vendor specific data");
3088
3089                         vsie_len = ie[1]+2;     // tag number size(1), tag length size(1)
3090                         vsie = (unsigned char *)g_try_malloc0(vsie_len);
3091
3092                         if (vsie) {
3093                                 memcpy(vsie, ie, vsie_len);
3094                                 bss->vsie_list = g_slist_append(bss->vsie_list, vsie);
3095                         } else
3096                                 SUPPLICANT_DBG("Failed to allocate memory");
3097                         continue;
3098                 }
3099
3100                 if (ie[0] == WLAN_EID_COUNTRY && ie[1] >= 2) {
3101                         /* Add country code only if it is a valid alphabet */
3102                         if (ie[2] >= 65 && ie[2] <= 90 && ie[3] >= 65 && ie[3] <= 90) {
3103                                 memcpy(bss->country_code, ie+2, COUNTRY_CODE_LENGTH);
3104                                 continue;
3105                         }
3106                 }
3107
3108                 if (ie[0] == WLAN_EID_HT_CAP && ie[1]) {
3109                         ht = true;
3110                         continue;
3111                 }
3112
3113                 if (ie[0] == WLAN_EID_VHT_CAP && ie[1]) {
3114                         vht = true;
3115                         continue;
3116                 }
3117
3118                 if (ie[0] == WLAN_EID_SUPP_RATES && ie[1]) {
3119                         r_len = ie[1];
3120                         rates = g_malloc0(r_len);
3121                         if (!rates)
3122                                 continue;
3123
3124                         for (j = 0; ie && j < r_len; j++) {
3125                                 rates[j] = ((ie[j + 2] & 0x7f) * 500000)/1000000;
3126                                 if (max_rate < rates[j])
3127                                         max_rate = rates[j];
3128                         }
3129                         continue;
3130                 }
3131
3132                 if (ie[0] == WLAN_EID_EXT_SUPP_RATES && ie[1] > 0) {
3133                         r_len = ie[1];
3134                         ext_rates = g_malloc0(r_len);
3135                         if (!ext_rates)
3136                                 continue;
3137
3138                         for (j = 0; ie && j < r_len; j++) {
3139                                 ext_rates[j] = ((ie[j + 2] & 0x7f) * 500000)/1000000;
3140                                 if (max_ext_rate < ext_rates[j])
3141                                         max_ext_rate = ext_rates[j];
3142                         }
3143                         continue;
3144                 }
3145
3146                 if (ie[0] == WLAN_EID_RSN_INFO && ie[1] >= 20) {
3147                         r_len = ie[1];
3148                         offset = 10 + ie[8] * 4;
3149                         offset += ie[offset] * 4 + 2;
3150
3151                         if (offset <= r_len + 1 &&
3152                                         (ie[offset] & RSN_CAPABILITY_MFP_REQ) != 0)
3153                                 bss->pmf_required = TRUE;
3154
3155                         continue;
3156                 }
3157 #endif
3158                 if (ie[0] != WMM_WPA1_WPS_INFO || ie[1] < WPS_INFO_MIN_LEN ||
3159                         memcmp(ie+2, WPS_OUI, sizeof(WPS_OUI)) != 0)
3160                         continue;
3161
3162                 SUPPLICANT_DBG("IE: match WPS_OUI");
3163
3164                 value = get_tlv(&ie[6], ie[1], WPS_STATE_TLV);
3165                 if (get_tlv(&ie[6], ie[1], WPS_VERSION_TLV) == WPS_VERSION &&
3166                                                                 value != 0) {
3167                         bss->keymgmt |= G_SUPPLICANT_KEYMGMT_WPS;
3168
3169                         if (value == WPS_CONFIGURED)
3170                                 bss->wps_capabilities |=
3171                                         G_SUPPLICANT_WPS_CONFIGURED;
3172                 }
3173
3174                 value = get_tlv(&ie[6], ie[1], WPS_METHODS_TLV);
3175                 if (value != 0) {
3176                         if (GUINT16_FROM_BE(value) == WPS_PBC)
3177                                 bss->wps_capabilities |= G_SUPPLICANT_WPS_PBC;
3178                         if (GUINT16_FROM_BE(value) == WPS_PIN)
3179                                 bss->wps_capabilities |= G_SUPPLICANT_WPS_PIN;
3180                 } else
3181                         bss->wps_capabilities |=
3182                                 G_SUPPLICANT_WPS_PBC | G_SUPPLICANT_WPS_PIN;
3183
3184                 /* If the AP sends this it means it's advertizing
3185                  * as a registrar and the WPS process is launched
3186                  * on its side */
3187                 if (get_tlv(&ie[6], ie[1], WPS_REGISTRAR_TLV) != 0)
3188                         bss->wps_capabilities |= G_SUPPLICANT_WPS_REGISTRAR;
3189
3190                 SUPPLICANT_DBG("WPS Methods 0x%x", bss->wps_capabilities);
3191         }
3192 #ifdef TIZEN_EXT
3193         get_bss_phy_mode(max_rate, max_ext_rate, ht, vht, user_data);
3194         if (rates)
3195                 g_free(rates);
3196         if (ext_rates)
3197                 g_free(ext_rates);
3198 #endif
3199 }
3200
3201 static void bss_compute_security(struct g_supplicant_bss *bss)
3202 {
3203         /*
3204          * Combining RSN and WPA keymgmt
3205          * We combine it since parsing IEs might have set something for WPS. */
3206         bss->keymgmt |= bss->rsn_keymgmt | bss->wpa_keymgmt;
3207
3208         bss->ieee8021x = FALSE;
3209         bss->psk = FALSE;
3210 #if defined TIZEN_EXT
3211         bss->ft_ieee8021x = FALSE;
3212         bss->ft_psk = FALSE;
3213 #endif
3214
3215 #if defined TIZEN_EXT
3216         if (bss->keymgmt &
3217                         (G_SUPPLICANT_KEYMGMT_WPA_EAP |
3218                                         G_SUPPLICANT_KEYMGMT_WPA_EAP_256))
3219                 bss->ieee8021x = TRUE;
3220         else if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_EAP)
3221                 bss->ft_ieee8021x = TRUE;
3222 #else
3223         if (bss->keymgmt &
3224                         (G_SUPPLICANT_KEYMGMT_WPA_EAP |
3225                                 G_SUPPLICANT_KEYMGMT_WPA_FT_EAP |
3226                                 G_SUPPLICANT_KEYMGMT_WPA_EAP_256))
3227                 bss->ieee8021x = TRUE;
3228 #endif
3229
3230 #if defined TIZEN_EXT
3231         if (bss->keymgmt &
3232                         (G_SUPPLICANT_KEYMGMT_WPA_PSK |
3233                                         G_SUPPLICANT_KEYMGMT_WPA_PSK_256))
3234                 bss->psk = TRUE;
3235         else if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_PSK)
3236                 bss->ft_psk = TRUE;
3237 #else
3238         if (bss->keymgmt &
3239                         (G_SUPPLICANT_KEYMGMT_WPA_PSK |
3240                                 G_SUPPLICANT_KEYMGMT_WPA_FT_PSK |
3241                                 G_SUPPLICANT_KEYMGMT_WPA_PSK_256))
3242                 bss->psk = TRUE;
3243 #endif
3244
3245 #if defined TIZEN_EXT
3246         if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_SAE |
3247                         bss->keymgmt & G_SUPPLICANT_KEYMGMT_FT_SAE)
3248                 bss->sae = TRUE;
3249         if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_OWE)
3250                 bss->owe = TRUE;
3251         if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_DPP)
3252                 bss->dpp = TRUE;
3253 #endif
3254
3255         if (bss->ieee8021x)
3256                 bss->security = G_SUPPLICANT_SECURITY_IEEE8021X;
3257 #if defined TIZEN_EXT
3258         else if (bss->ft_ieee8021x)
3259                 bss->security = G_SUPPLICANT_SECURITY_IEEE8021X;
3260         else if (bss->sae)
3261                 bss->security = G_SUPPLICANT_SECURITY_SAE;
3262 #endif
3263         else if (bss->psk)
3264                 bss->security = G_SUPPLICANT_SECURITY_PSK;
3265 #if defined TIZEN_EXT
3266         else if (bss->ft_psk)
3267                 bss->security = G_SUPPLICANT_SECURITY_FT_PSK;
3268         else if (bss->owe || bss->owe_transition_mode)
3269                 bss->security = G_SUPPLICANT_SECURITY_OWE;
3270         else if (bss->dpp)
3271                 bss->security = G_SUPPLICANT_SECURITY_DPP;
3272 #endif
3273         else if (bss->privacy)
3274                 bss->security = G_SUPPLICANT_SECURITY_WEP;
3275         else
3276                 bss->security = G_SUPPLICANT_SECURITY_NONE;
3277 }
3278
3279
3280 static void bss_property(const char *key, DBusMessageIter *iter,
3281                                                         void *user_data)
3282 {
3283         struct g_supplicant_bss *bss = user_data;
3284
3285         if (!bss->interface)
3286                 return;
3287 #if defined TIZEN_EXT
3288         if (!simplified_log)
3289 #endif
3290         SUPPLICANT_DBG("key %s", key);
3291
3292         if (!key)
3293                 return;
3294
3295         if (g_strcmp0(key, "BSSID") == 0) {
3296                 DBusMessageIter array;
3297                 unsigned char *addr;
3298                 int addr_len;
3299
3300                 dbus_message_iter_recurse(iter, &array);
3301                 dbus_message_iter_get_fixed_array(&array, &addr, &addr_len);
3302
3303                 if (addr_len == 6)
3304                         memcpy(bss->bssid, addr, addr_len);
3305         } else if (g_strcmp0(key, "SSID") == 0) {
3306                 DBusMessageIter array;
3307                 unsigned char *ssid;
3308                 int ssid_len;
3309
3310                 dbus_message_iter_recurse(iter, &array);
3311                 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
3312
3313                 if (ssid_len > 0 && ssid_len < 33) {
3314                         memcpy(bss->ssid, ssid, ssid_len);
3315                         bss->ssid_len = ssid_len;
3316                 } else {
3317                         memset(bss->ssid, 0, sizeof(bss->ssid));
3318                         bss->ssid_len = 0;
3319                 }
3320         } else if (g_strcmp0(key, "Capabilities") == 0) {
3321                 dbus_uint16_t capabilities = 0x0000;
3322
3323                 dbus_message_iter_get_basic(iter, &capabilities);
3324
3325                 if (capabilities & IEEE80211_CAP_ESS)
3326                         bss->mode = G_SUPPLICANT_MODE_INFRA;
3327                 else if (capabilities & IEEE80211_CAP_IBSS)
3328                         bss->mode = G_SUPPLICANT_MODE_IBSS;
3329
3330                 if (capabilities & IEEE80211_CAP_PRIVACY)
3331                         bss->privacy = TRUE;
3332         } else if (g_strcmp0(key, "Mode") == 0) {
3333                 const char *mode = NULL;
3334
3335                 dbus_message_iter_get_basic(iter, &mode);
3336                 bss->mode = string2mode(mode);
3337         } else if (g_strcmp0(key, "Frequency") == 0) {
3338                 dbus_uint16_t frequency = 0;
3339
3340                 dbus_message_iter_get_basic(iter, &frequency);
3341                 bss->frequency = frequency;
3342         } else if (g_strcmp0(key, "Signal") == 0) {
3343                 dbus_int16_t signal = 0;
3344
3345                 dbus_message_iter_get_basic(iter, &signal);
3346
3347                 bss->signal = signal;
3348                 if (!bss->signal)
3349                         bss->signal = BSS_UNKNOWN_STRENGTH;
3350
3351         } else if (g_strcmp0(key, "Level") == 0) {
3352                 dbus_int32_t level = 0;
3353
3354                 dbus_message_iter_get_basic(iter, &level);
3355         } else if (g_strcmp0(key, "Rates") == 0) {
3356                 supplicant_dbus_array_foreach(iter, bss_rates, bss);
3357         } else if (g_strcmp0(key, "MaxRate") == 0) {
3358                 dbus_uint32_t maxrate = 0;
3359
3360                 dbus_message_iter_get_basic(iter, &maxrate);
3361                 if (maxrate != 0)
3362                         bss->maxrate = maxrate;
3363         } else if (g_strcmp0(key, "Privacy") == 0) {
3364                 dbus_bool_t privacy = FALSE;
3365
3366                 dbus_message_iter_get_basic(iter, &privacy);
3367                 bss->privacy = privacy;
3368         } else if (g_strcmp0(key, "RSN") == 0) {
3369                 bss->rsn_selected = TRUE;
3370
3371                 supplicant_dbus_property_foreach(iter, bss_wpa, bss);
3372         } else if (g_strcmp0(key, "WPA") == 0) {
3373                 bss->rsn_selected = FALSE;
3374
3375                 supplicant_dbus_property_foreach(iter, bss_wpa, bss);
3376 #if defined TIZEN_EXT
3377         } else if (g_strcmp0(key, "HS20") == 0) {
3378                 dbus_bool_t hs20 = FALSE;
3379                 dbus_message_iter_get_basic(iter, &hs20);
3380                 bss->hs20 = hs20;
3381         } else if (g_strcmp0(key, "SNR") == 0) {
3382                 dbus_int16_t snr = 0;
3383
3384                 dbus_message_iter_get_basic(iter, &snr);
3385                 bss->snr = snr;
3386         } else if (g_strcmp0(key, "EstThroughput") == 0) {
3387                 dbus_uint32_t est_throughput = 0;
3388
3389                 dbus_message_iter_get_basic(iter, &est_throughput);
3390                 if (est_throughput != 0)
3391                         bss->est_throughput = est_throughput;
3392 #endif
3393         } else if (g_strcmp0(key, "IEs") == 0)
3394                 bss_process_ies(iter, bss);
3395         else
3396                 SUPPLICANT_DBG("key %s type %c",
3397                                 key, dbus_message_iter_get_arg_type(iter));
3398 }
3399
3400 static struct g_supplicant_bss *interface_bss_added(DBusMessageIter *iter,
3401                                                         void *user_data)
3402 {
3403         GSupplicantInterface *interface = user_data;
3404         GSupplicantNetwork *network;
3405         struct g_supplicant_bss *bss;
3406         const char *path = NULL;
3407 #if defined TIZEN_EXT
3408         if (!simplified_log)
3409 #endif
3410         SUPPLICANT_DBG("");
3411
3412         dbus_message_iter_get_basic(iter, &path);
3413         if (!path)
3414                 return NULL;
3415
3416         if (g_strcmp0(path, "/") == 0)
3417                 return NULL;
3418 #if defined TIZEN_EXT
3419         if (!simplified_log)
3420 #endif
3421         SUPPLICANT_DBG("%s", path);
3422
3423         network = g_hash_table_lookup(interface->bss_mapping, path);
3424         if (network) {
3425                 bss = g_hash_table_lookup(network->bss_table, path);
3426                 if (bss)
3427                         return NULL;
3428         }
3429
3430         bss = g_try_new0(struct g_supplicant_bss, 1);
3431         if (!bss)
3432                 return NULL;
3433
3434         bss->interface = interface;
3435         bss->path = g_strdup(path);
3436         bss->signal = BSS_UNKNOWN_STRENGTH;
3437
3438         return bss;
3439 }
3440
3441 static void interface_bss_added_with_keys(DBusMessageIter *iter,
3442                                                 void *user_data)
3443 {
3444         struct g_supplicant_bss *bss;
3445 #if defined TIZEN_EXT
3446         if (!simplified_log)
3447 #endif
3448         SUPPLICANT_DBG("");
3449
3450         bss = interface_bss_added(iter, user_data);
3451         if (!bss)
3452                 return;
3453
3454         dbus_message_iter_next(iter);
3455
3456         if (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_INVALID)
3457 #if defined TIZEN_EXT
3458         {
3459                 g_free(bss->path);
3460                 g_free(bss);
3461                 return;
3462         }
3463 #else
3464                 return;
3465 #endif
3466
3467         supplicant_dbus_property_foreach(iter, bss_property, bss);
3468
3469         bss_compute_security(bss);
3470         if (add_or_replace_bss_to_network(bss) < 0)
3471                 SUPPLICANT_DBG("add_or_replace_bss_to_network failed");
3472 }
3473
3474 static void interface_bss_added_without_keys(DBusMessageIter *iter,
3475                                                 void *user_data)
3476 {
3477         struct g_supplicant_bss *bss;
3478 #if defined TIZEN_EXT
3479         if (!simplified_log)
3480 #endif
3481         SUPPLICANT_DBG("");
3482
3483         bss = interface_bss_added(iter, user_data);
3484         if (!bss)
3485                 return;
3486
3487         supplicant_dbus_property_get_all(bss->path,
3488                                         SUPPLICANT_INTERFACE ".BSS",
3489                                         bss_property, bss, bss);
3490
3491         bss_compute_security(bss);
3492         if (add_or_replace_bss_to_network(bss) < 0)
3493                         SUPPLICANT_DBG("add_or_replace_bss_to_network failed");
3494 }
3495
3496 static void update_signal(gpointer key, gpointer value,
3497                                                 gpointer user_data)
3498 {
3499         struct g_supplicant_bss *bss = value;
3500         GSupplicantNetwork *network = user_data;
3501
3502 #if defined TIZEN_EXT
3503         if (!network->best_bss || (network->best_bss == bss)) {
3504                 if (bss->signal > network->signal) {
3505                         network->signal = bss->signal;
3506                         network->best_bss = bss;
3507                 }
3508                 return;
3509         }
3510
3511         update_best_bss(network, bss, network->best_bss);
3512 #else
3513         if (bss->signal > network->signal) {
3514                 network->signal = bss->signal;
3515                 network->best_bss = bss;
3516         }
3517 #endif
3518 }
3519
3520 static void update_network_signal(GSupplicantNetwork *network)
3521 {
3522         if (g_hash_table_size(network->bss_table) <= 1 && network->best_bss)
3523                 return;
3524
3525         g_hash_table_foreach(network->bss_table,
3526                                 update_signal, network);
3527
3528         SUPPLICANT_DBG("New network signal %d", network->signal);
3529 }
3530
3531 #if defined TIZEN_EXT
3532 static gboolean last_connected_timeout(gpointer data)
3533 {
3534         GSupplicantInterface *interface = data;
3535         GSupplicantNetwork *current_network = interface->current_network;
3536
3537         SUPPLICANT_DBG("Timeout last connected bss");
3538
3539         if (current_network && current_network->best_bss) {
3540                 if (compare_bssid(current_network->best_bss->bssid, interface->connected_bssid)) {
3541                         g_supplicant_network_set_last_connected_bssid(current_network, interface->connected_bssid);
3542                         callback_network_changed(current_network, "LastConnectedBSSID");
3543                 }
3544         }
3545
3546         last_connected_bss_timeout = 0;
3547         return FALSE;
3548 }
3549
3550 static void add_timer_for_last_connected(GSupplicantInterface *interface)
3551 {
3552         GSupplicantNetwork *current_network = interface->current_network;
3553
3554         if (interface->state == G_SUPPLICANT_STATE_COMPLETED) {
3555                 if (current_network) {
3556                         struct g_supplicant_bss *best_bss = current_network->best_bss;
3557
3558                         memcpy(interface->connected_bssid, best_bss->bssid, WIFI_BSSID_LEN_MAX);
3559
3560                         if (last_connected_bss_timeout)
3561                                 g_source_remove(last_connected_bss_timeout);
3562
3563                         last_connected_bss_timeout = g_timeout_add_seconds(LAST_CONNECTED_TIMEOUT,
3564                                 last_connected_timeout, interface);
3565
3566                         SUPPLICANT_DBG("Add timer for last connected bssid [" MACSTR "]",
3567                                         MAC2STR(best_bss->bssid));
3568                 }
3569         }
3570 }
3571
3572 static void remove_timer_for_last_connected(GSupplicantInterface *interface)
3573 {
3574         if (interface->state == G_SUPPLICANT_STATE_DISCONNECTED) {
3575                 if (last_connected_bss_timeout != 0) {
3576                         g_source_remove(last_connected_bss_timeout);
3577                         last_connected_bss_timeout = 0;
3578                         SUPPLICANT_DBG("Remove timer for last connected bss");
3579                 }
3580         }
3581 }
3582 #endif
3583
3584 static void interface_current_bss(GSupplicantInterface *interface,
3585                                                 DBusMessageIter *iter)
3586 {
3587         GSupplicantNetwork *network;
3588         struct g_supplicant_bss *bss;
3589         const char *path;
3590 #if defined TIZEN_EXT
3591         char bssid_buff1[WIFI_BSSID_STR_LEN] = {0,};
3592         char bssid_buff2[WIFI_BSSID_STR_LEN] = {0,};
3593         char *bssid_str1 = bssid_buff1;
3594         char *bssid_str2 = bssid_buff2;
3595         gboolean update = FALSE;
3596 #endif
3597
3598         dbus_message_iter_get_basic(iter, &path);
3599         if (g_strcmp0(path, "/") == 0) {
3600                 interface->current_network = NULL;
3601                 return;
3602         }
3603
3604         interface_bss_added_without_keys(iter, interface);
3605
3606         network = g_hash_table_lookup(interface->bss_mapping, path);
3607         if (!network)
3608                 return;
3609
3610         bss = g_hash_table_lookup(network->bss_table, path);
3611         if (!bss)
3612                 return;
3613
3614         interface->current_network = network;
3615 #if defined TIZEN_EXT
3616         snprintf(bssid_str1, WIFI_BSSID_STR_LEN, MACSTR, MAC2STR(bss->bssid));
3617         snprintf(bssid_str2, WIFI_BSSID_STR_LEN, MACSTR, MAC2STR(network->best_bss->bssid));
3618
3619         SUPPLICANT_DBG("current network [%p], Passed bss %s, best bss %s",
3620                         interface->current_network, bssid_str1, bssid_str2);
3621
3622         if (network->frequency != bss->frequency) {
3623                 network->frequency = bss->frequency;
3624                 update = TRUE;
3625         }
3626 #endif
3627
3628         if (bss != network->best_bss) {
3629                 /*
3630                  * This is the case where either wpa_s got associated
3631                  * to a BSS different than the one ConnMan considers
3632                  * the best, or we are roaming.
3633                  */
3634                 SUPPLICANT_DBG("Update best BSS for %s", network->name);
3635
3636                 network->best_bss = bss;
3637
3638                 if (network->signal != bss->signal) {
3639                         SUPPLICANT_DBG("New network signal %d dBm",
3640                                                 bss->signal);
3641
3642                         network->signal = bss->signal;
3643                         callback_network_changed(network, "Signal");
3644 #if defined TIZEN_EXT
3645                         update = FALSE;
3646                 } else {
3647                         update = TRUE;
3648 #endif
3649                 }
3650         }
3651
3652 #if defined TIZEN_EXT
3653         if (update)
3654                 callback_network_changed(network, "");
3655 #endif
3656
3657         /*
3658          * wpa_s could notify about CurrentBSS in any state once
3659          * it got associated. It is not sure such notification will
3660          * arrive together with transition to ASSOCIATED state.
3661          * In fact, for networks with security WEP or OPEN, it
3662          * always arrives together with transition to COMPLETED.
3663          */
3664         switch (interface->state) {
3665         case G_SUPPLICANT_STATE_UNKNOWN:
3666         case G_SUPPLICANT_STATE_DISABLED:
3667         case G_SUPPLICANT_STATE_DISCONNECTED:
3668         case G_SUPPLICANT_STATE_INACTIVE:
3669         case G_SUPPLICANT_STATE_SCANNING:
3670         case G_SUPPLICANT_STATE_AUTHENTICATING:
3671         case G_SUPPLICANT_STATE_ASSOCIATING:
3672                 return;
3673         case G_SUPPLICANT_STATE_ASSOCIATED:
3674         case G_SUPPLICANT_STATE_4WAY_HANDSHAKE:
3675         case G_SUPPLICANT_STATE_GROUP_HANDSHAKE:
3676         case G_SUPPLICANT_STATE_COMPLETED:
3677                 callback_network_associated(network);
3678 #if defined TIZEN_EXT
3679                 add_timer_for_last_connected(interface);
3680 #endif
3681                 break;
3682         }
3683 }
3684
3685 static void interface_bss_removed(DBusMessageIter *iter, void *user_data)
3686 {
3687         GSupplicantInterface *interface = user_data;
3688         GSupplicantNetwork *network;
3689         struct g_supplicant_bss *bss = NULL;
3690         const char *path = NULL;
3691         bool is_current_network_bss = false;
3692
3693         dbus_message_iter_get_basic(iter, &path);
3694         if (!path)
3695                 return;
3696
3697         network = g_hash_table_lookup(interface->bss_mapping, path);
3698         if (!network)
3699                 return;
3700
3701         bss = g_hash_table_lookup(network->bss_table, path);
3702         if (network->best_bss == bss) {
3703                 network->best_bss = NULL;
3704                 network->signal = BSS_UNKNOWN_STRENGTH;
3705                 is_current_network_bss = true;
3706         }
3707
3708         g_hash_table_remove(bss_mapping, path);
3709
3710         g_hash_table_remove(interface->bss_mapping, path);
3711         g_hash_table_remove(network->bss_table, path);
3712
3713         update_network_signal(network);
3714
3715         if (g_hash_table_size(network->bss_table) == 0) {
3716                 g_hash_table_remove(interface->network_table, network->group);
3717         } else {
3718                 if (is_current_network_bss && network->best_bss)
3719 #if defined TIZEN_EXT
3720                         callback_network_changed(network, "CheckMultiBssidConnect");
3721 #else
3722                         callback_network_changed(network, "");
3723 #endif
3724         }
3725 }
3726
3727 static void set_config_methods(DBusMessageIter *iter, void *user_data)
3728 {
3729         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, user_data);
3730 }
3731
3732 static void wps_property(const char *key, DBusMessageIter *iter,
3733                                                         void *user_data)
3734 {
3735         GSupplicantInterface *interface = user_data;
3736
3737         if (!interface)
3738                 return;
3739 #if defined TIZEN_EXT
3740         if (!simplified_log)
3741 #endif
3742         SUPPLICANT_DBG("key: %s", key);
3743
3744         if (g_strcmp0(key, "ConfigMethods") == 0) {
3745                 const char *config_methods = "push_button", *str = NULL;
3746
3747                 dbus_message_iter_get_basic(iter, &str);
3748                 if (str && strlen(str) > 0) {
3749                         /* It was already set at wpa_s level, don't modify it. */
3750                         SUPPLICANT_DBG("%s", str);
3751                         return;
3752                 }
3753
3754                 supplicant_dbus_property_set(interface->path,
3755                         SUPPLICANT_INTERFACE ".Interface.WPS",
3756                         "ConfigMethods", DBUS_TYPE_STRING_AS_STRING,
3757                         set_config_methods, NULL, &config_methods, NULL);
3758
3759                 SUPPLICANT_DBG("No value. Set %s", config_methods);
3760         }
3761
3762 }
3763
3764 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
3765 void g_supplicant_replace_config_file(const char *ifname, const char *config_file)
3766 {
3767         if (!ifname)
3768                return;
3769
3770         if (!config_file)
3771                 return;
3772
3773         SUPPLICANT_DBG("New {%s, %s}", ifname, config_file);
3774         g_hash_table_replace(config_file_table,
3775                         g_strdup(ifname), g_strdup(config_file));
3776 }
3777 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
3778
3779 static void interface_property(const char *key, DBusMessageIter *iter,
3780                                                         void *user_data)
3781 {
3782         GSupplicantInterface *interface = user_data;
3783
3784         if (!interface)
3785                 return;
3786 #if defined TIZEN_EXT
3787         if (!simplified_log)
3788 #endif
3789         SUPPLICANT_DBG("%s", key);
3790
3791         if (!key) {
3792                 debug_strvalmap("KeyMgmt capability", keymgmt_map,
3793                                                 interface->keymgmt_capa);
3794                 debug_strvalmap("AuthAlg capability", authalg_capa_map,
3795                                                 interface->authalg_capa);
3796                 debug_strvalmap("Protocol capability", proto_capa_map,
3797                                                 interface->proto_capa);
3798                 debug_strvalmap("Pairwise capability", pairwise_map,
3799                                                 interface->pairwise_capa);
3800                 debug_strvalmap("Group capability", group_map,
3801                                                 interface->group_capa);
3802                 debug_strvalmap("Scan capability", scan_capa_map,
3803                                                 interface->scan_capa);
3804                 debug_strvalmap("Mode capability", mode_capa_map,
3805                                                 interface->mode_capa);
3806
3807                 supplicant_dbus_property_get_all(interface->path,
3808                                 SUPPLICANT_INTERFACE ".Interface.WPS",
3809                                 wps_property, interface, interface);
3810
3811                 if (interface->ready)
3812                         callback_interface_added(interface);
3813
3814                 return;
3815         }
3816
3817         if (g_strcmp0(key, "Capabilities") == 0) {
3818                 supplicant_dbus_property_foreach(iter, interface_capability,
3819                                                                 interface);
3820 #if !defined TIZEN_EXT
3821                 if (interface->mode_capa & G_SUPPLICANT_CAPABILITY_MODE_P2P)
3822                         interface->p2p_support = true;
3823 #endif
3824 #if defined TIZEN_EXT_WIFI_MESH
3825                 if (interface->mode_capa & G_SUPPLICANT_CAPABILITY_MODE_MESH)
3826                         interface->mesh_support = true;
3827 #endif
3828         } else if (g_strcmp0(key, "State") == 0) {
3829                 const char *str = NULL;
3830
3831                 dbus_message_iter_get_basic(iter, &str);
3832                 if (str)
3833                         if (string2state(str) != interface->state) {
3834                                 interface->state = string2state(str);
3835                                 callback_interface_state(interface);
3836                         }
3837 #if defined TIZEN_EXT
3838                 switch (interface->state) {
3839                 case G_SUPPLICANT_STATE_COMPLETED:
3840                         add_timer_for_last_connected(interface);
3841                         break;
3842                 case G_SUPPLICANT_STATE_DISCONNECTED:
3843                         remove_timer_for_last_connected(interface);
3844                         break;
3845                 default:
3846                         break;
3847                 }
3848 #endif
3849                 if (interface->ap_create_in_progress) {
3850                         if (interface->state == G_SUPPLICANT_STATE_DISCONNECTED)
3851                                 callback_ap_create_fail(interface);
3852
3853                         interface->ap_create_in_progress = false;
3854                 }
3855
3856                 if (interface->state == G_SUPPLICANT_STATE_DISABLED)
3857                         interface->ready = FALSE;
3858                 else
3859                         interface->ready = TRUE;
3860
3861                 SUPPLICANT_DBG("state %s (%d)", str, interface->state);
3862         } else if (g_strcmp0(key, "Scanning") == 0) {
3863                 dbus_bool_t scanning = FALSE;
3864
3865                 dbus_message_iter_get_basic(iter, &scanning);
3866                 interface->scanning = scanning;
3867
3868                 if (interface->ready) {
3869                         if (interface->scanning)
3870                                 callback_scan_started(interface);
3871                         else
3872                                 callback_scan_finished(interface);
3873                 }
3874         } else if (g_strcmp0(key, "ApScan") == 0) {
3875                 int apscan = 1;
3876
3877                 dbus_message_iter_get_basic(iter, &apscan);
3878                 interface->apscan = apscan;
3879         } else if (g_strcmp0(key, "Ifname") == 0) {
3880                 const char *str = NULL;
3881
3882                 dbus_message_iter_get_basic(iter, &str);
3883                 if (str) {
3884                         g_free(interface->ifname);
3885                         interface->ifname = g_strdup(str);
3886                 }
3887         } else if (g_strcmp0(key, "Driver") == 0) {
3888                 const char *str = NULL;
3889
3890                 dbus_message_iter_get_basic(iter, &str);
3891                 if (str) {
3892                         g_free(interface->driver);
3893                         interface->driver = g_strdup(str);
3894                 }
3895         } else if (g_strcmp0(key, "BridgeIfname") == 0) {
3896                 const char *str = NULL;
3897
3898                 dbus_message_iter_get_basic(iter, &str);
3899                 if (str) {
3900                         g_free(interface->bridge);
3901                         interface->bridge = g_strdup(str);
3902                 }
3903         } else if (g_strcmp0(key, "ConfigFile") == 0) {
3904                 const char *str = NULL;
3905
3906                 dbus_message_iter_get_basic(iter, &str);
3907                 if (str && strlen(str) > 0 && interface->ifname) {
3908                         SUPPLICANT_DBG("New {%s, %s}", interface->ifname, str);
3909                         g_hash_table_replace(config_file_table,
3910                                 g_strdup(interface->ifname), g_strdup(str));
3911                 }
3912         } else if (g_strcmp0(key, "CurrentBSS") == 0) {
3913                 interface_current_bss(interface, iter);
3914         } else if (g_strcmp0(key, "CurrentNetwork") == 0) {
3915 #if defined TIZEN_EXT
3916                 if (interface->state != G_SUPPLICANT_STATE_COMPLETED)
3917 #endif
3918                 interface_network_added(iter, interface);
3919         } else if (g_strcmp0(key, "BSSs") == 0) {
3920                 supplicant_dbus_array_foreach(iter,
3921                                         interface_bss_added_without_keys,
3922                                         interface);
3923         } else if (g_strcmp0(key, "Blobs") == 0) {
3924                 /* Nothing */
3925         } else if (g_strcmp0(key, "Networks") == 0) {
3926                 supplicant_dbus_array_foreach(iter, interface_network_added,
3927                                                                 interface);
3928         } else if (g_strcmp0(key, "DisconnectReason") == 0) {
3929                 int reason_code;
3930                 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
3931                         dbus_message_iter_get_basic(iter, &reason_code);
3932                         callback_disconnect_reason_code(interface, reason_code);
3933 #if defined TIZEN_EXT
3934                         SUPPLICANT_DBG("reason code (%d)", reason_code);
3935 #endif
3936                 }
3937         } else if (g_strcmp0(key, "AssocStatusCode") == 0) {
3938                 int status_code;
3939                 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
3940                         dbus_message_iter_get_basic(iter, &status_code);
3941                         callback_assoc_status_code(interface, status_code);
3942 #if defined TIZEN_EXT
3943                         SUPPLICANT_DBG("status code (%d)", status_code);
3944 #endif
3945                 }
3946         } else {
3947                 SUPPLICANT_DBG("key %s type %c",
3948                                 key, dbus_message_iter_get_arg_type(iter));
3949         }
3950 }
3951
3952 static void scan_network_update(DBusMessageIter *iter, void *user_data)
3953 {
3954         GSupplicantInterface *interface = user_data;
3955         GSupplicantNetwork *network;
3956         char *path;
3957
3958         if (!iter)
3959                 return;
3960
3961         dbus_message_iter_get_basic(iter, &path);
3962
3963         if (!path)
3964                 return;
3965
3966         if (g_strcmp0(path, "/") == 0)
3967                 return;
3968
3969         /* Update the network details based on scan BSS data */
3970         network = g_hash_table_lookup(interface->bss_mapping, path);
3971         if (network)
3972                 callback_network_added(network);
3973 }
3974
3975 static void scan_bss_data(const char *key, DBusMessageIter *iter,
3976                                 void *user_data)
3977 {
3978         GSupplicantInterface *interface = user_data;
3979
3980 /*Fixed : stucking in scanning state when scan failed*/
3981 #if defined TIZEN_EXT
3982         GSupplicantInterfaceCallback scan_callback;
3983         SUPPLICANT_DBG("");
3984 #endif
3985
3986         if (iter)
3987                 supplicant_dbus_array_foreach(iter, scan_network_update,
3988                                                 interface);
3989
3990 #if defined TIZEN_EXT
3991         scan_callback = interface->scan_callback;
3992         callback_scan_done(interface);
3993 #endif
3994
3995         if (interface->scan_callback)
3996                 interface->scan_callback(0, interface, interface->scan_data);
3997
3998 #if defined TIZEN_EXT
3999         if (interface->scan_callback == scan_callback) {
4000 #endif
4001         interface->scan_callback = NULL;
4002         interface->scan_data = NULL;
4003 #if defined TIZEN_EXT
4004         }
4005 #endif
4006 }
4007
4008 static GSupplicantInterface *interface_alloc(const char *path)
4009 {
4010         GSupplicantInterface *interface;
4011
4012         interface = g_try_new0(GSupplicantInterface, 1);
4013         if (!interface)
4014                 return NULL;
4015
4016         interface->path = g_strdup(path);
4017
4018         interface->network_table = g_hash_table_new_full(g_str_hash,
4019                                         g_str_equal, NULL, remove_network);
4020         interface->peer_table = g_hash_table_new_full(g_str_hash,
4021                                         g_str_equal, NULL, remove_peer);
4022         interface->group_table = g_hash_table_new_full(g_str_hash,
4023                                         g_str_equal, NULL, remove_group);
4024         interface->bss_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
4025                                                                 NULL, NULL);
4026
4027         g_hash_table_replace(interface_table, interface->path, interface);
4028
4029         return interface;
4030 }
4031
4032 static void interface_added(DBusMessageIter *iter, void *user_data)
4033 {
4034         GSupplicantInterface *interface;
4035         const char *path = NULL;
4036         bool properties_appended = GPOINTER_TO_UINT(user_data);
4037
4038         SUPPLICANT_DBG("");
4039
4040         dbus_message_iter_get_basic(iter, &path);
4041         if (!path)
4042                 return;
4043
4044         if (g_strcmp0(path, "/") == 0)
4045                 return;
4046
4047         interface = g_hash_table_lookup(interface_table, path);
4048         if (interface)
4049                 return;
4050
4051         interface = interface_alloc(path);
4052         if (!interface)
4053                 return;
4054
4055         if (!properties_appended) {
4056                 supplicant_dbus_property_get_all(path,
4057                                                 SUPPLICANT_INTERFACE ".Interface",
4058                                                 interface_property, interface,
4059                                                 interface);
4060                 return;
4061         }
4062
4063         dbus_message_iter_next(iter);
4064         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
4065                 supplicant_dbus_property_foreach(iter, interface_property,
4066                                                                 interface);
4067                 interface_property(NULL, NULL, interface);
4068         }
4069 }
4070
4071 static void interface_removed(DBusMessageIter *iter, void *user_data)
4072 {
4073         const char *path = NULL;
4074         GSupplicantInterface *interface = user_data;
4075
4076         dbus_message_iter_get_basic(iter, &path);
4077         if (!path)
4078                 return;
4079
4080         interface = g_hash_table_lookup(interface_table, path);
4081         g_supplicant_interface_cancel(interface);
4082
4083         g_hash_table_remove(interface_table, path);
4084 }
4085
4086 static void eap_method(DBusMessageIter *iter, void *user_data)
4087 {
4088         const char *str = NULL;
4089         int i;
4090
4091         dbus_message_iter_get_basic(iter, &str);
4092         if (!str)
4093                 return;
4094
4095         for (i = 0; eap_method_map[i].str; i++)
4096                 if (strcmp(str, eap_method_map[i].str) == 0) {
4097                         eap_methods |= eap_method_map[i].val;
4098                         break;
4099                 }
4100 }
4101
4102 static void service_property(const char *key, DBusMessageIter *iter,
4103                                                         void *user_data)
4104 {
4105         if (!key) {
4106                 callback_system_ready();
4107                 return;
4108         }
4109
4110         if (g_strcmp0(key, "DebugLevel") == 0) {
4111                 const char *str = NULL;
4112                 int i;
4113
4114                 dbus_message_iter_get_basic(iter, &str);
4115                 for (i = 0; debug_strings[i]; i++)
4116                         if (g_strcmp0(debug_strings[i], str) == 0) {
4117                                 debug_level = i;
4118                                 break;
4119                         }
4120                 SUPPLICANT_DBG("Debug level %d", debug_level);
4121         } else if (g_strcmp0(key, "DebugTimestamp") == 0) {
4122                 dbus_message_iter_get_basic(iter, &debug_timestamp);
4123                 SUPPLICANT_DBG("Debug timestamp %u", debug_timestamp);
4124         } else if (g_strcmp0(key, "DebugShowKeys") == 0) {
4125                 dbus_message_iter_get_basic(iter, &debug_showkeys);
4126                 SUPPLICANT_DBG("Debug show keys %u", debug_showkeys);
4127         } else if (g_strcmp0(key, "Interfaces") == 0) {
4128                 supplicant_dbus_array_foreach(iter, interface_added, NULL);
4129         } else if (g_strcmp0(key, "EapMethods") == 0) {
4130                 supplicant_dbus_array_foreach(iter, eap_method, NULL);
4131                 debug_strvalmap("EAP method", eap_method_map, eap_methods);
4132         } else if (g_strcmp0(key, "Country") == 0) {
4133                 const char *country = NULL;
4134
4135                 dbus_message_iter_get_basic(iter, &country);
4136                 SUPPLICANT_DBG("Country %s", country);
4137         } else
4138                 SUPPLICANT_DBG("key %s type %c",
4139                                 key, dbus_message_iter_get_arg_type(iter));
4140 }
4141
4142 static void signal_name_owner_changed(const char *path, DBusMessageIter *iter)
4143 {
4144         const char *name = NULL, *old = NULL, *new = NULL;
4145
4146         SUPPLICANT_DBG("");
4147
4148         if (g_strcmp0(path, DBUS_PATH_DBUS) != 0)
4149                 return;
4150
4151         dbus_message_iter_get_basic(iter, &name);
4152         if (!name)
4153                 return;
4154
4155         if (g_strcmp0(name, SUPPLICANT_SERVICE) != 0)
4156                 return;
4157
4158         dbus_message_iter_next(iter);
4159         dbus_message_iter_get_basic(iter, &old);
4160         dbus_message_iter_next(iter);
4161         dbus_message_iter_get_basic(iter, &new);
4162
4163         if (!old || !new)
4164                 return;
4165
4166         if (strlen(old) > 0 && strlen(new) == 0) {
4167                 system_available = FALSE;
4168                 g_hash_table_remove_all(bss_mapping);
4169                 g_hash_table_remove_all(peer_mapping);
4170                 g_hash_table_remove_all(group_mapping);
4171                 g_hash_table_remove_all(config_file_table);
4172                 g_hash_table_remove_all(interface_table);
4173                 callback_system_killed();
4174         }
4175
4176         if (strlen(new) > 0 && strlen(old) == 0) {
4177                 system_available = TRUE;
4178                 supplicant_dbus_property_get_all(SUPPLICANT_PATH,
4179                                                 SUPPLICANT_INTERFACE,
4180                                                 service_property, NULL, NULL);
4181         }
4182 }
4183
4184 static void signal_properties_changed(const char *path, DBusMessageIter *iter)
4185 {
4186         SUPPLICANT_DBG("");
4187
4188         if (g_strcmp0(path, SUPPLICANT_PATH) != 0)
4189                 return;
4190
4191         supplicant_dbus_property_foreach(iter, service_property, NULL);
4192 }
4193
4194 static void signal_interface_added(const char *path, DBusMessageIter *iter)
4195 {
4196         SUPPLICANT_DBG("path %s %s", path, SUPPLICANT_PATH);
4197
4198         if (g_strcmp0(path, SUPPLICANT_PATH) == 0)
4199                 interface_added(iter, GUINT_TO_POINTER(true));
4200 }
4201
4202 static void signal_interface_removed(const char *path, DBusMessageIter *iter)
4203 {
4204         SUPPLICANT_DBG("");
4205
4206         if (g_strcmp0(path, SUPPLICANT_PATH) == 0)
4207                 interface_removed(iter, NULL);
4208 }
4209
4210 static void signal_interface_changed(const char *path, DBusMessageIter *iter)
4211 {
4212         GSupplicantInterface *interface;
4213 #if defined TIZEN_EXT
4214         if (!simplified_log)
4215 #endif
4216         SUPPLICANT_DBG("");
4217
4218         interface = g_hash_table_lookup(interface_table, path);
4219         if (!interface)
4220                 return;
4221
4222         supplicant_dbus_property_foreach(iter, interface_property, interface);
4223 }
4224
4225 static void signal_scan_done(const char *path, DBusMessageIter *iter)
4226 {
4227         GSupplicantInterface *interface;
4228         dbus_bool_t success = FALSE;
4229
4230         SUPPLICANT_DBG("");
4231
4232         interface = g_hash_table_lookup(interface_table, path);
4233         if (!interface)
4234                 return;
4235
4236         dbus_message_iter_get_basic(iter, &success);
4237
4238         if (interface->scanning) {
4239                 callback_scan_finished(interface);
4240                 interface->scanning = FALSE;
4241         }
4242
4243         /*
4244          * If scan is unsuccessful return -EIO else get the scanned BSSs
4245          * and update the network details accordingly
4246          */
4247         if (!success) {
4248                 if (interface->scan_callback)
4249                         interface->scan_callback(-EIO, interface,
4250                                                 interface->scan_data);
4251
4252                 interface->scan_callback = NULL;
4253                 interface->scan_data = NULL;
4254
4255                 return;
4256         }
4257
4258         supplicant_dbus_property_get(path, SUPPLICANT_INTERFACE ".Interface",
4259                                 "BSSs", scan_bss_data, interface, interface);
4260 }
4261
4262 static void signal_bss_added(const char *path, DBusMessageIter *iter)
4263 {
4264         GSupplicantInterface *interface;
4265 #if defined TIZEN_EXT
4266         if (!simplified_log)
4267 #endif
4268         SUPPLICANT_DBG("");
4269
4270         interface = g_hash_table_lookup(interface_table, path);
4271         if (!interface)
4272                 return;
4273
4274         interface_bss_added_with_keys(iter, interface);
4275 }
4276
4277 static void signal_bss_removed(const char *path, DBusMessageIter *iter)
4278 {
4279         GSupplicantInterface *interface;
4280
4281         SUPPLICANT_DBG("");
4282
4283         interface = g_hash_table_lookup(interface_table, path);
4284         if (!interface)
4285                 return;
4286
4287         interface_bss_removed(iter, interface);
4288 }
4289
4290 static void signal_network_added(const char *path, DBusMessageIter *iter)
4291 {
4292         GSupplicantInterface *interface;
4293
4294         SUPPLICANT_DBG("");
4295
4296         interface = g_hash_table_lookup(interface_table, path);
4297         if (!interface)
4298                 return;
4299
4300         interface_network_added(iter, interface);
4301 }
4302
4303 static void signal_network_removed(const char *path, DBusMessageIter *iter)
4304 {
4305         GSupplicantInterface *interface;
4306
4307         SUPPLICANT_DBG("");
4308
4309         interface = g_hash_table_lookup(interface_table, path);
4310         if (!interface)
4311                 return;
4312
4313         interface_network_removed(iter, interface);
4314 }
4315 #if defined TIZEN_EXT
4316 void *copy_vsie_list(gconstpointer src, gpointer data)
4317 {
4318         return g_strdup(src);
4319 }
4320 #endif
4321
4322
4323 static void signal_sta_authorized(const char *path, DBusMessageIter *iter)
4324 {
4325         GSupplicantInterface *interface;
4326         const char *addr = NULL;
4327
4328         SUPPLICANT_DBG("");
4329
4330         interface = g_hash_table_lookup(interface_table, path);
4331         if (!interface)
4332                 return;
4333
4334         dbus_message_iter_get_basic(iter, &addr);
4335         if (!addr)
4336                 return;
4337
4338         callback_sta_authorized(interface, addr);
4339 }
4340
4341 static void signal_sta_deauthorized(const char *path, DBusMessageIter *iter)
4342 {
4343         GSupplicantInterface *interface;
4344         const char *addr = NULL;
4345
4346         SUPPLICANT_DBG("");
4347
4348         interface = g_hash_table_lookup(interface_table, path);
4349         if (!interface)
4350                 return;
4351
4352         dbus_message_iter_get_basic(iter, &addr);
4353         if (!addr)
4354                 return;
4355
4356         callback_sta_deauthorized(interface, addr);
4357 }
4358
4359 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
4360 static void signal_eap(const char *path, DBusMessageIter *iter)
4361 {
4362         GSupplicantInterface *interface;
4363         const char *str = NULL;
4364
4365         SUPPLICANT_DBG("EAPOL_DEBUG callback eap signal");
4366
4367         interface = g_hash_table_lookup(interface_table, path);
4368         if (!interface)
4369                 return;
4370
4371         // TODO: Identify EAP fail condition, currently timeout is used for failure.
4372
4373         dbus_message_iter_get_basic(iter, &str);
4374         if (!str)
4375                 return;
4376
4377         if (g_strcmp0("completion", str))
4378                 return;
4379
4380         dbus_message_iter_next(iter);
4381
4382         dbus_message_iter_get_basic(iter, &str);
4383         if (!str)
4384                 return;
4385
4386         if (!g_strcmp0("success", str))
4387                 callback_eap(interface, true);
4388         else
4389                 callback_eap(interface, false);
4390 }
4391 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
4392
4393 static void signal_bss_changed(const char *path, DBusMessageIter *iter)
4394 {
4395         GSupplicantInterface *interface;
4396         GSupplicantNetwork *network;
4397         GSupplicantSecurity old_security;
4398         unsigned int old_wps_capabilities;
4399         struct g_supplicant_bss *bss;
4400
4401 #if defined TIZEN_EXT
4402         if (!simplified_log)
4403 #endif
4404         SUPPLICANT_DBG("");
4405
4406         interface = g_hash_table_lookup(bss_mapping, path);
4407         if (!interface)
4408                 return;
4409
4410         network = g_hash_table_lookup(interface->bss_mapping, path);
4411         if (!network)
4412                 return;
4413
4414         bss = g_hash_table_lookup(network->bss_table, path);
4415         if (!bss)
4416                 return;
4417
4418         supplicant_dbus_property_foreach(iter, bss_property, bss);
4419
4420 #if defined TIZEN_EXT
4421         if (network->interface->state != G_SUPPLICANT_STATE_COMPLETED) {
4422                 network->frequency = bss->frequency;
4423                 network->phy_mode = bss->phy_mode;
4424         }
4425 #endif
4426         old_security = network->security;
4427         bss_compute_security(bss);
4428
4429         if (old_security != bss->security) {
4430                 struct g_supplicant_bss *new_bss;
4431
4432                 SUPPLICANT_DBG("New network security for %s with path %s",
4433                                bss->ssid, bss->path);
4434
4435                 /*
4436                  * Security change policy:
4437                  * - We first copy the current bss into a new one with
4438                  *   its own pointer (path)
4439                  * - Clear the old bss pointer and remove the network completely
4440                  *   if there are no more BSSs in the bss table.
4441                  * - The new bss will be added either to an existing network
4442                  *   or an additional network will be created
4443                  */
4444
4445                 new_bss = g_try_new0(struct g_supplicant_bss, 1);
4446                 if (!new_bss)
4447                         return;
4448
4449                 memcpy(new_bss, bss, sizeof(struct g_supplicant_bss));
4450                 new_bss->path = g_strdup(bss->path);
4451 #if defined TIZEN_EXT
4452                 new_bss->vsie_list = g_slist_copy_deep(bss->vsie_list, copy_vsie_list, NULL);
4453 #endif
4454
4455                 if (network->best_bss == bss) {
4456                         network->best_bss = NULL;
4457                         network->signal = BSS_UNKNOWN_STRENGTH;
4458                 }
4459
4460                 g_hash_table_remove(bss_mapping, path);
4461
4462                 g_hash_table_remove(interface->bss_mapping, path);
4463                 g_hash_table_remove(network->bss_table, path);
4464
4465                 update_network_signal(network);
4466
4467                 if (g_hash_table_size(network->bss_table) == 0)
4468                         g_hash_table_remove(interface->network_table,
4469                                             network->group);
4470
4471                 if (add_or_replace_bss_to_network(new_bss) < 0) {
4472                         /*
4473                          * Prevent a memory leak on failure in
4474                          * add_or_replace_bss_to_network
4475                          */
4476                         SUPPLICANT_DBG("Failed to add bss %s to network table",
4477                                        new_bss->path);
4478                         g_free(new_bss->path);
4479                         g_free(new_bss);
4480                 }
4481
4482                 return;
4483         }
4484
4485         old_wps_capabilities = network->wps_capabilities;
4486
4487         if (old_wps_capabilities != bss->wps_capabilities) {
4488                 network->wps_capabilities = bss->wps_capabilities;
4489                 callback_network_changed(network, "WPSCapabilities");
4490         }
4491
4492 #if defined TIZEN_EXT
4493         if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
4494                 network->wps = TRUE;
4495                 network->wps_capabilities |= bss->wps_capabilities;
4496         } else
4497                 network->wps = FALSE;
4498 #endif
4499
4500         /* Consider only property changes of the connected BSS */
4501         if (network == interface->current_network && bss != network->best_bss)
4502                 return;
4503
4504         if (bss->signal == network->signal)
4505 #ifndef TIZEN_EXT
4506                 return;
4507 #else
4508         {
4509                 callback_network_changed(network, "");
4510                 return;
4511         }
4512 #endif
4513
4514         /*
4515          * If the new signal is lower than the SSID signal, we need
4516          * to check for the new maximum.
4517          */
4518 #if defined TIZEN_EXT
4519         if (!update_best_bss(network, bss, network->best_bss)) {
4520                 if (bss != network->best_bss) {
4521                         callback_network_changed(network, "");
4522                         return;
4523                 }
4524
4525                 network->signal = bss->signal;
4526                 update_network_signal(network);
4527         }
4528 #else
4529         if (bss->signal < network->signal) {
4530                 if (bss != network->best_bss)
4531                         return;
4532
4533                 network->signal = bss->signal;
4534                 update_network_signal(network);
4535         } else {
4536                 network->signal = bss->signal;
4537                 network->best_bss = bss;
4538         }
4539 #endif
4540
4541         SUPPLICANT_DBG("New network signal for %s %d dBm", network->ssid,
4542                         network->signal);
4543
4544         callback_network_changed(network, "Signal");
4545 }
4546
4547 static void wps_credentials(const char *key, DBusMessageIter *iter,
4548                         void *user_data)
4549 {
4550         GSupplicantInterface *interface = user_data;
4551
4552         if (!key)
4553                 return;
4554
4555         SUPPLICANT_DBG("key %s", key);
4556
4557         if (g_strcmp0(key, "Key") == 0) {
4558                 DBusMessageIter array;
4559                 unsigned char *key_val;
4560                 int key_len;
4561
4562                 dbus_message_iter_recurse(iter, &array);
4563                 dbus_message_iter_get_fixed_array(&array, &key_val, &key_len);
4564
4565                 g_free(interface->wps_cred.key);
4566                 interface->wps_cred.key = g_try_malloc0(
4567                                                 sizeof(char) * key_len + 1);
4568
4569                 if (!interface->wps_cred.key)
4570                         return;
4571
4572                 memcpy(interface->wps_cred.key, key_val,
4573                                                 sizeof(char) * key_len);
4574
4575                 SUPPLICANT_DBG("WPS key present");
4576         } else if (g_strcmp0(key, "SSID") == 0) {
4577                 DBusMessageIter array;
4578                 unsigned char *ssid;
4579                 int ssid_len;
4580
4581                 dbus_message_iter_recurse(iter, &array);
4582                 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
4583
4584                 if (ssid_len > 0 && ssid_len < 33) {
4585                         memcpy(interface->wps_cred.ssid, ssid, ssid_len);
4586                         interface->wps_cred.ssid_len = ssid_len;
4587                 } else {
4588                         memset(interface->wps_cred.ssid, 0, 32);
4589                         interface->wps_cred.ssid_len = 0;
4590                 }
4591         }
4592 }
4593
4594 static void signal_wps_credentials(const char *path, DBusMessageIter *iter)
4595 {
4596         GSupplicantInterface *interface;
4597
4598         SUPPLICANT_DBG("");
4599
4600         interface = g_hash_table_lookup(interface_table, path);
4601         if (!interface)
4602                 return;
4603
4604         supplicant_dbus_property_foreach(iter, wps_credentials, interface);
4605 }
4606
4607 static void wps_event_args(const char *key, DBusMessageIter *iter,
4608                         void *user_data)
4609 {
4610         GSupplicantInterface *interface = user_data;
4611
4612         if (!key || !interface)
4613                 return;
4614
4615         SUPPLICANT_DBG("Arg Key %s", key);
4616 }
4617
4618 static void signal_wps_event(const char *path, DBusMessageIter *iter)
4619 {
4620         GSupplicantInterface *interface;
4621         const char *name = NULL;
4622
4623         SUPPLICANT_DBG("");
4624
4625         interface = g_hash_table_lookup(interface_table, path);
4626         if (!interface)
4627                 return;
4628
4629         dbus_message_iter_get_basic(iter, &name);
4630
4631         SUPPLICANT_DBG("Name: %s", name);
4632
4633         if (g_strcmp0(name, "success") == 0)
4634                 interface->wps_state = G_SUPPLICANT_WPS_STATE_SUCCESS;
4635         else if (g_strcmp0(name, "fail") == 0)
4636                 interface->wps_state = G_SUPPLICANT_WPS_STATE_FAIL;
4637         else
4638                 interface->wps_state = G_SUPPLICANT_WPS_STATE_UNKNOWN;
4639
4640         if (!dbus_message_iter_has_next(iter))
4641                 return;
4642
4643         dbus_message_iter_next(iter);
4644
4645         supplicant_dbus_property_foreach(iter, wps_event_args, interface);
4646 }
4647
4648 #if defined TIZEN_EXT
4649 static void signal_power_off(const char *path, DBusMessageIter *iter)
4650 {
4651         int poweroff_state = 0;
4652
4653         dbus_message_iter_get_basic(iter, &poweroff_state);
4654
4655         SUPPLICANT_DBG("poweroff_state(%d)", poweroff_state);
4656
4657         /* POWER_OFF_DIRECT 2 && POWER_OFF_RESTART 3 */
4658         if (poweroff_state != 2 && poweroff_state != 3)
4659                 return;
4660
4661         if (callbacks_pointer == NULL)
4662                 return;
4663
4664         if (callbacks_pointer->system_power_off == NULL)
4665                 return;
4666
4667         callbacks_pointer->system_power_off();
4668 }
4669 #endif
4670
4671 static void create_peer_identifier(GSupplicantPeer *peer)
4672 {
4673         const unsigned char test[ETH_ALEN] = {};
4674
4675         if (!peer)
4676                 return;
4677
4678         if (!memcmp(peer->device_address, test, ETH_ALEN)) {
4679                 peer->identifier = g_strdup(peer->name);
4680                 return;
4681         }
4682
4683         peer->identifier = g_malloc0(19);
4684         snprintf(peer->identifier, 19, "%02x%02x%02x%02x%02x%02x",
4685                                                 peer->device_address[0],
4686                                                 peer->device_address[1],
4687                                                 peer->device_address[2],
4688                                                 peer->device_address[3],
4689                                                 peer->device_address[4],
4690                                                 peer->device_address[5]);
4691 }
4692
4693 struct peer_property_data {
4694         GSupplicantPeer *peer;
4695         GSList *old_groups;
4696         bool groups_changed;
4697         bool services_changed;
4698 };
4699
4700 static void peer_groups_relation(DBusMessageIter *iter, void *user_data)
4701 {
4702         struct peer_property_data *data = user_data;
4703         GSupplicantPeer *peer = data->peer;
4704         GSupplicantGroup *group;
4705         const char *str = NULL;
4706         GSList *elem;
4707
4708         dbus_message_iter_get_basic(iter, &str);
4709         if (!str)
4710                 return;
4711
4712         group = g_hash_table_lookup(group_mapping, str);
4713         if (!group)
4714                 return;
4715
4716         elem = g_slist_find_custom(data->old_groups, str, (GCompareFunc)g_strcmp0);
4717         if (elem) {
4718                 data->old_groups = g_slist_remove_link(data->old_groups, elem);
4719                 peer->groups = g_slist_concat(elem, peer->groups);
4720         } else {
4721                 peer->groups = g_slist_prepend(peer->groups, g_strdup(str));
4722                 data->groups_changed = true;
4723         }
4724 }
4725
4726 static void peer_property(const char *key, DBusMessageIter *iter,
4727                                                         void *user_data)
4728 {
4729         GSupplicantPeer *pending_peer;
4730         struct peer_property_data *data = user_data;
4731         GSupplicantPeer *peer = data->peer;
4732
4733         SUPPLICANT_DBG("key: %s", key);
4734
4735         if (!peer->interface)
4736                 return;
4737
4738         if (!key) {
4739                 if (peer->name) {
4740                         create_peer_identifier(peer);
4741                         callback_peer_found(peer);
4742                         pending_peer = g_hash_table_lookup(
4743                                         pending_peer_connection, peer->path);
4744
4745                         if (pending_peer && pending_peer == peer) {
4746                                 callback_peer_request(peer);
4747                                 g_hash_table_remove(pending_peer_connection,
4748                                                 peer->path);
4749                         }
4750
4751                         dbus_free(data);
4752                 }
4753
4754                 return;
4755         }
4756
4757         if (g_strcmp0(key, "DeviceAddress") == 0) {
4758                 unsigned char *dev_addr;
4759                 DBusMessageIter array;
4760                 int len;
4761
4762                 dbus_message_iter_recurse(iter, &array);
4763                 dbus_message_iter_get_fixed_array(&array, &dev_addr, &len);
4764
4765                 if (len == ETH_ALEN)
4766                         memcpy(peer->device_address, dev_addr, len);
4767         } else if (g_strcmp0(key, "DeviceName") == 0) {
4768                 const char *str = NULL;
4769
4770                 dbus_message_iter_get_basic(iter, &str);
4771                 if (str)
4772                         peer->name = g_strdup(str);
4773         } else if (g_strcmp0(key, "config_method") == 0) {
4774                 uint16_t wps_config;
4775
4776                 dbus_message_iter_get_basic(iter, &wps_config);
4777
4778                 if (wps_config & G_SUPPLICANT_WPS_CONFIG_PBC)
4779                         peer->wps_capabilities |= G_SUPPLICANT_WPS_PBC;
4780                 if (wps_config & ~G_SUPPLICANT_WPS_CONFIG_PBC)
4781                         peer->wps_capabilities |= G_SUPPLICANT_WPS_PIN;
4782         } else if (g_strcmp0(key, "Groups") == 0) {
4783                 data->old_groups = peer->groups;
4784                 peer->groups = NULL;
4785
4786                 supplicant_dbus_array_foreach(iter,
4787                                                 peer_groups_relation, data);
4788                 if (g_slist_length(data->old_groups) > 0) {
4789                         g_slist_free_full(data->old_groups, g_free);
4790                         data->groups_changed = true;
4791                 }
4792         } else if (g_strcmp0(key, "IEs") == 0) {
4793                 DBusMessageIter array;
4794                 unsigned char *ie;
4795                 int ie_len;
4796
4797                 dbus_message_iter_recurse(iter, &array);
4798                 dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
4799
4800                 if (!ie || ie_len < 2)
4801                         return;
4802
4803                 if (peer->widi_ies) {
4804                         if (memcmp(peer->widi_ies, ie, ie_len) == 0)
4805                                 return;
4806
4807                         g_free(peer->widi_ies);
4808                         peer->widi_ies_length = 0;
4809                 }
4810
4811                 peer->widi_ies = g_malloc0(ie_len * sizeof(unsigned char));
4812
4813                 memcpy(peer->widi_ies, ie, ie_len);
4814                 peer->widi_ies_length = ie_len;
4815                 data->services_changed = true;
4816         }
4817 }
4818
4819 static void signal_peer_found(const char *path, DBusMessageIter *iter)
4820 {
4821         struct peer_property_data *property_data;
4822         GSupplicantInterface *interface;
4823         const char *obj_path = NULL;
4824         GSupplicantPeer *peer;
4825
4826         SUPPLICANT_DBG("");
4827
4828         interface = g_hash_table_lookup(interface_table, path);
4829         if (!interface)
4830                 return;
4831
4832         dbus_message_iter_get_basic(iter, &obj_path);
4833         if (!obj_path || g_strcmp0(obj_path, "/") == 0)
4834                 return;
4835
4836         peer = g_hash_table_lookup(interface->peer_table, obj_path);
4837         if (peer)
4838                 return;
4839
4840         peer = g_try_new0(GSupplicantPeer, 1);
4841         if (!peer)
4842                 return;
4843
4844         peer->interface = interface;
4845         peer->path = g_strdup(obj_path);
4846         g_hash_table_insert(interface->peer_table, peer->path, peer);
4847         g_hash_table_replace(peer_mapping, peer->path, interface);
4848
4849         property_data = dbus_malloc0(sizeof(struct peer_property_data));
4850         property_data->peer = peer;
4851
4852         dbus_message_iter_next(iter);
4853         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
4854                 supplicant_dbus_property_foreach(iter, peer_property,
4855                                                         property_data);
4856                 peer_property(NULL, NULL, property_data);
4857                 return;
4858         }
4859
4860         supplicant_dbus_property_get_all(obj_path,
4861                                         SUPPLICANT_INTERFACE ".Peer",
4862                                         peer_property, property_data, NULL);
4863 }
4864
4865 static void signal_peer_lost(const char *path, DBusMessageIter *iter)
4866 {
4867         GSupplicantInterface *interface;
4868         const char *obj_path = NULL;
4869         GSupplicantPeer *peer;
4870
4871         SUPPLICANT_DBG("");
4872
4873         interface = g_hash_table_lookup(interface_table, path);
4874         if (!interface)
4875                 return;
4876
4877         dbus_message_iter_get_basic(iter, &obj_path);
4878         if (!obj_path || g_strcmp0(obj_path, "/") == 0)
4879                 return;
4880
4881         peer = g_hash_table_lookup(interface->peer_table, obj_path);
4882         if (!peer)
4883                 return;
4884
4885         g_hash_table_remove(interface->peer_table, obj_path);
4886 }
4887
4888 static void signal_peer_changed(const char *path, DBusMessageIter *iter)
4889 {
4890         struct peer_property_data *property_data;
4891         GSupplicantInterface *interface;
4892         GSupplicantPeer *peer;
4893
4894         SUPPLICANT_DBG("");
4895
4896         interface = g_hash_table_lookup(peer_mapping, path);
4897         if (!interface)
4898                 return;
4899
4900         peer = g_hash_table_lookup(interface->peer_table, path);
4901         if (!peer) {
4902                 g_hash_table_remove(peer_mapping, path);
4903                 return;
4904         }
4905
4906         property_data = dbus_malloc0(sizeof(struct peer_property_data));
4907         property_data->peer = peer;
4908
4909         supplicant_dbus_property_foreach(iter, peer_property, property_data);
4910         if (property_data->services_changed)
4911                 callback_peer_changed(peer,
4912                                         G_SUPPLICANT_PEER_SERVICES_CHANGED);
4913
4914         if (property_data->groups_changed)
4915                 callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_CHANGED);
4916
4917         dbus_free(property_data);
4918
4919         if (!g_supplicant_peer_is_in_a_group(peer))
4920                 peer->connection_requested = false;
4921 }
4922
4923 struct group_sig_data {
4924         const char *peer_obj_path;
4925         unsigned char iface_address[ETH_ALEN];
4926         const char *interface_obj_path;
4927         const char *group_obj_path;
4928         int role;
4929 };
4930
4931 static void group_sig_property(const char *key, DBusMessageIter *iter,
4932                                                         void *user_data)
4933 {
4934         struct group_sig_data *data = user_data;
4935
4936         if (!key)
4937                 return;
4938
4939         if (g_strcmp0(key, "peer_interface_addr") == 0) {
4940                 unsigned char *dev_addr;
4941                 DBusMessageIter array;
4942                 int len;
4943
4944                 dbus_message_iter_recurse(iter, &array);
4945                 dbus_message_iter_get_fixed_array(&array, &dev_addr, &len);
4946
4947                 if (len == ETH_ALEN)
4948                         memcpy(data->iface_address, dev_addr, len);
4949         } else if (g_strcmp0(key, "role") == 0) {
4950                 const char *str = NULL;
4951
4952                 dbus_message_iter_get_basic(iter, &str);
4953                 if (g_strcmp0(str, "GO") == 0)
4954                         data->role = G_SUPPLICANT_GROUP_ROLE_GO;
4955                 else
4956                         data->role = G_SUPPLICANT_GROUP_ROLE_CLIENT;
4957         } else if (g_strcmp0(key, "peer_object") == 0)
4958                 dbus_message_iter_get_basic(iter, &data->peer_obj_path);
4959         else if (g_strcmp0(key, "interface_object") == 0)
4960                 dbus_message_iter_get_basic(iter, &data->interface_obj_path);
4961         else if (g_strcmp0(key, "group_object") == 0)
4962                 dbus_message_iter_get_basic(iter, &data->group_obj_path);
4963
4964 }
4965
4966 static void signal_group_success(const char *path, DBusMessageIter *iter)
4967 {
4968         GSupplicantInterface *interface;
4969         struct group_sig_data data = {};
4970         GSupplicantPeer *peer;
4971
4972         SUPPLICANT_DBG("");
4973
4974         interface = g_hash_table_lookup(interface_table, path);
4975         if (!interface)
4976                 return;
4977
4978         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
4979         if (!data.peer_obj_path)
4980                 return;
4981
4982         peer = g_hash_table_lookup(interface->peer_table, data.peer_obj_path);
4983         if (!peer)
4984                 return;
4985
4986         memcpy(peer->iface_address, data.iface_address, ETH_ALEN);
4987         interface->pending_peer_path = peer->path;
4988 }
4989
4990 static void signal_group_failure(const char *path, DBusMessageIter *iter)
4991 {
4992         GSupplicantInterface *interface;
4993         struct group_sig_data data = {};
4994         GSupplicantPeer *peer;
4995
4996         SUPPLICANT_DBG("");
4997
4998         interface = g_hash_table_lookup(interface_table, path);
4999         if (!interface)
5000                 return;
5001
5002         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
5003         if (!data.peer_obj_path)
5004                 return;
5005
5006         peer = g_hash_table_lookup(interface->peer_table, data.peer_obj_path);
5007         if (!peer)
5008                 return;
5009
5010         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_FAILED);
5011         peer->connection_requested = false;
5012 }
5013
5014 static void signal_group_started(const char *path, DBusMessageIter *iter)
5015 {
5016         GSupplicantInterface *interface, *g_interface;
5017         struct group_sig_data data = {};
5018         GSupplicantGroup *group;
5019         GSupplicantPeer *peer;
5020
5021         SUPPLICANT_DBG("");
5022
5023         interface = g_hash_table_lookup(interface_table, path);
5024         if (!interface)
5025                 return;
5026
5027         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
5028         if (!data.interface_obj_path || !data.group_obj_path)
5029                 return;
5030
5031         peer = g_hash_table_lookup(interface->peer_table,
5032                                                 interface->pending_peer_path);
5033         interface->pending_peer_path = NULL;
5034         if (!peer)
5035                 return;
5036
5037         g_interface = g_hash_table_lookup(interface_table,
5038                                                 data.interface_obj_path);
5039         if (!g_interface)
5040                 return;
5041
5042         group = g_hash_table_lookup(interface->group_table,
5043                                                 data.group_obj_path);
5044         if (group)
5045                 return;
5046
5047         group = g_try_new0(GSupplicantGroup, 1);
5048         if (!group)
5049                 return;
5050
5051         group->interface = g_interface;
5052         group->orig_interface = interface;
5053         group->path = g_strdup(data.group_obj_path);
5054         group->role = data.role;
5055
5056         g_hash_table_insert(interface->group_table, group->path, group);
5057         g_hash_table_replace(group_mapping, group->path, group);
5058
5059         peer->current_group_iface = g_interface;
5060         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_STARTED);
5061 }
5062
5063 static void remove_peer_group_interface(GHashTable *group_table,
5064                                 const char* path)
5065 {
5066         GSupplicantGroup *group;
5067         GHashTableIter iter;
5068         gpointer value, key;
5069
5070         if (!group_table)
5071                 return;
5072
5073         group = g_hash_table_lookup(group_table, path);
5074
5075         if (!group || !group->orig_interface)
5076                 return;
5077
5078         g_hash_table_iter_init(&iter, group->orig_interface->peer_table);
5079
5080         while (g_hash_table_iter_next(&iter, &key, &value)) {
5081                 GSupplicantPeer *peer = value;
5082
5083                 if (peer->current_group_iface == group->interface)
5084                         peer->current_group_iface = NULL;
5085         }
5086 }
5087
5088 static void signal_group_finished(const char *path, DBusMessageIter *iter)
5089 {
5090         GSupplicantInterface *interface;
5091         struct group_sig_data data = {};
5092
5093         SUPPLICANT_DBG("");
5094
5095         interface = g_hash_table_lookup(interface_table, path);
5096         if (!interface)
5097                 return;
5098
5099         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
5100         if (!data.interface_obj_path || !data.group_obj_path)
5101                 return;
5102
5103         remove_peer_group_interface(interface->group_table, data.group_obj_path);
5104
5105         g_hash_table_remove(group_mapping, data.group_obj_path);
5106
5107         g_hash_table_remove(interface->group_table, data.group_obj_path);
5108 }
5109
5110 static void signal_group_request(const char *path, DBusMessageIter *iter)
5111 {
5112         GSupplicantInterface *interface;
5113         GSupplicantPeer *peer;
5114         const char *obj_path;
5115
5116         SUPPLICANT_DBG("");
5117
5118         interface = g_hash_table_lookup(interface_table, path);
5119         if (!interface)
5120                 return;
5121
5122         dbus_message_iter_get_basic(iter, &obj_path);
5123         if (!obj_path || !g_strcmp0(obj_path, "/"))
5124                 return;
5125
5126         peer = g_hash_table_lookup(interface->peer_table, obj_path);
5127         if (!peer)
5128                 return;
5129
5130         /*
5131          * Peer has been previously found and property set,
5132          * otherwise, defer connection to when peer property
5133          * is set.
5134          */
5135         if (peer->identifier)
5136                 callback_peer_request(peer);
5137         else
5138                 g_hash_table_replace(pending_peer_connection, peer->path, peer);
5139 }
5140
5141 static void signal_group_peer_joined(const char *path, DBusMessageIter *iter)
5142 {
5143         const char *peer_path = NULL;
5144         GSupplicantInterface *interface;
5145         GSupplicantGroup *group;
5146         GSupplicantPeer *peer;
5147
5148         SUPPLICANT_DBG("");
5149
5150         group = g_hash_table_lookup(group_mapping, path);
5151         if (!group)
5152                 return;
5153
5154         dbus_message_iter_get_basic(iter, &peer_path);
5155         if (!peer_path)
5156                 return;
5157
5158         interface = g_hash_table_lookup(peer_mapping, peer_path);
5159         if (!interface)
5160                 return;
5161
5162         peer = g_hash_table_lookup(interface->peer_table, peer_path);
5163         if (!peer)
5164                 return;
5165
5166         group->members = g_slist_prepend(group->members, g_strdup(peer_path));
5167
5168         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_JOINED);
5169 }
5170
5171 static void signal_group_peer_disconnected(const char *path, DBusMessageIter *iter)
5172 {
5173         const char *peer_path = NULL;
5174         GSupplicantInterface *interface;
5175         GSupplicantGroup *group;
5176         GSupplicantPeer *peer;
5177         GSList *elem;
5178
5179         SUPPLICANT_DBG("");
5180
5181         group = g_hash_table_lookup(group_mapping, path);
5182         if (!group)
5183                 return;
5184
5185         dbus_message_iter_get_basic(iter, &peer_path);
5186         if (!peer_path)
5187                 return;
5188
5189         for (elem = group->members; elem; elem = elem->next) {
5190                 if (!g_strcmp0(elem->data, peer_path))
5191                         break;
5192         }
5193
5194         if (!elem)
5195                 return;
5196
5197         g_free(elem->data);
5198         group->members = g_slist_delete_link(group->members, elem);
5199
5200         interface = g_hash_table_lookup(peer_mapping, peer_path);
5201         if (!interface)
5202                 return;
5203
5204         peer = g_hash_table_lookup(interface->peer_table, peer_path);
5205         if (!peer)
5206                 return;
5207
5208         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_DISCONNECTED);
5209         peer->connection_requested = false;
5210 }
5211
5212 #if defined TIZEN_EXT_WIFI_MESH
5213 const void *g_supplicant_interface_get_mesh_group_ssid(
5214                                                         GSupplicantInterface *interface,
5215                                                         unsigned int *ssid_len)
5216 {
5217         if (!ssid_len)
5218                 return NULL;
5219
5220         if (!interface || interface->group_info.ssid_len == 0) {
5221                 *ssid_len = 0;
5222                 return NULL;
5223         }
5224
5225         *ssid_len = interface->group_info.ssid_len;
5226         return interface->group_info.ssid;
5227 }
5228
5229 int g_supplicant_mesh_get_disconnect_reason(GSupplicantInterface *interface)
5230 {
5231         if (!interface)
5232                 return -EINVAL;
5233
5234         return interface->group_info.disconnect_reason;
5235 }
5236
5237 const char *g_supplicant_mesh_peer_get_address(GSupplicantMeshPeer *mesh_peer)
5238 {
5239         if (!mesh_peer || !mesh_peer->peer_address)
5240                 return NULL;
5241
5242         return mesh_peer->peer_address;
5243 }
5244
5245 int g_supplicant_mesh_peer_get_disconnect_reason(GSupplicantMeshPeer *mesh_peer)
5246 {
5247         if (!mesh_peer)
5248                 return -EINVAL;
5249
5250         return mesh_peer->disconnect_reason;
5251 }
5252
5253 static void callback_mesh_group_started(GSupplicantInterface *interface)
5254 {
5255         if (!callbacks_pointer)
5256                 return;
5257
5258         if (!callbacks_pointer->mesh_group_started)
5259                 return;
5260
5261         callbacks_pointer->mesh_group_started(interface);
5262 }
5263
5264 static void callback_mesh_group_removed(GSupplicantInterface *interface)
5265 {
5266         if (!callbacks_pointer)
5267                 return;
5268
5269         if (!callbacks_pointer->mesh_group_removed)
5270                 return;
5271
5272         callbacks_pointer->mesh_group_removed(interface);
5273 }
5274
5275 static void mesh_group_info(const char *key, DBusMessageIter *iter,
5276                                                         void *user_data)
5277 {
5278         GSupplicantInterface *interface = user_data;
5279         if (!key)
5280                 return;
5281
5282         if (g_strcmp0(key, "SSID") == 0) {
5283                 DBusMessageIter array;
5284                 unsigned char *ssid;
5285                 int ssid_len;
5286
5287                 dbus_message_iter_recurse(iter, &array);
5288                 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
5289
5290                 if (ssid_len > 0 && ssid_len < 33) {
5291                         memcpy(interface->group_info.ssid, ssid, ssid_len);
5292                         interface->group_info.ssid_len = ssid_len;
5293                 } else {
5294                         memset(interface->group_info.ssid, 0, 32);
5295                         interface->group_info.ssid_len = 0;
5296                 }
5297         } else if (g_strcmp0(key, "DisconnectReason") == 0) {
5298                 int disconnect_reason = 0;
5299                 dbus_message_iter_get_basic(iter, &disconnect_reason);
5300                 interface->group_info.disconnect_reason = disconnect_reason;
5301         }
5302 }
5303
5304 static void signal_mesh_group_started(const char *path, DBusMessageIter *iter)
5305 {
5306         GSupplicantInterface *interface;
5307
5308         interface = g_hash_table_lookup(interface_table, path);
5309         if (!interface)
5310                 return;
5311
5312         supplicant_dbus_property_foreach(iter, mesh_group_info, interface);
5313
5314         callback_mesh_group_started(interface);
5315 }
5316
5317 static void signal_mesh_group_removed(const char *path, DBusMessageIter *iter)
5318 {
5319         GSupplicantInterface *interface;
5320
5321         interface = g_hash_table_lookup(interface_table, path);
5322         if (!interface)
5323                 return;
5324
5325         supplicant_dbus_property_foreach(iter, mesh_group_info, interface);
5326
5327         callback_mesh_group_removed(interface);
5328 }
5329
5330 static void callback_mesh_peer_connected(GSupplicantMeshPeer *mesh_peer)
5331 {
5332         if (!callbacks_pointer)
5333                 return;
5334
5335         if (!callbacks_pointer->mesh_peer_connected)
5336                 return;
5337
5338         callbacks_pointer->mesh_peer_connected(mesh_peer);
5339 }
5340
5341 static void callback_mesh_peer_disconnected(GSupplicantMeshPeer *mesh_peer)
5342 {
5343         if (!callbacks_pointer)
5344                 return;
5345
5346         if (!callbacks_pointer->mesh_peer_disconnected)
5347                 return;
5348
5349         callbacks_pointer->mesh_peer_disconnected(mesh_peer);
5350 }
5351
5352 static void mesh_peer_info(const char *key, DBusMessageIter *iter,
5353                                                         void *user_data)
5354 {
5355         GSupplicantMeshPeer *mesh_peer = user_data;
5356         if (!key)
5357                 return;
5358
5359         if (g_strcmp0(key, "PeerAddress") == 0) {
5360                 DBusMessageIter array;
5361                 unsigned char *addr;
5362                 int addr_len;
5363
5364                 dbus_message_iter_recurse(iter, &array);
5365                 dbus_message_iter_get_fixed_array(&array, &addr, &addr_len);
5366
5367                 if (addr_len == 6) {
5368                         mesh_peer->peer_address = g_malloc0(19);
5369                         snprintf(mesh_peer->peer_address, 19,
5370                                          "%02x:%02x:%02x:%02x:%02x:%02x", addr[0], addr[1],
5371                                          addr[2], addr[3], addr[4], addr[5]);
5372                 }
5373         } else if (g_strcmp0(key, "DisconnectReason") == 0) {
5374                 int disconnect_reason = 0;
5375                 dbus_message_iter_get_basic(iter, &disconnect_reason);
5376                 mesh_peer->disconnect_reason = disconnect_reason;
5377         }
5378 }
5379
5380 static void signal_mesh_peer_connected(const char *path, DBusMessageIter *iter)
5381 {
5382         GSupplicantInterface *interface;
5383         GSupplicantMeshPeer *mesh_peer;
5384
5385         interface = g_hash_table_lookup(interface_table, path);
5386         if (!interface)
5387                 return;
5388
5389         mesh_peer = dbus_malloc0(sizeof(GSupplicantMeshPeer));
5390         mesh_peer->interface = interface;
5391
5392         supplicant_dbus_property_foreach(iter, mesh_peer_info, mesh_peer);
5393
5394         callback_mesh_peer_connected(mesh_peer);
5395         g_free(mesh_peer->peer_address);
5396         g_free(mesh_peer);
5397 }
5398
5399 static void signal_mesh_peer_disconnected(const char *path,
5400                                                                 DBusMessageIter *iter)
5401 {
5402         GSupplicantInterface *interface;
5403         GSupplicantMeshPeer *mesh_peer;
5404
5405         interface = g_hash_table_lookup(interface_table, path);
5406         if (!interface)
5407                 return;
5408
5409         mesh_peer = dbus_malloc0(sizeof(GSupplicantMeshPeer));
5410         mesh_peer->interface = interface;
5411
5412         supplicant_dbus_property_foreach(iter, mesh_peer_info, mesh_peer);
5413
5414         callback_mesh_peer_disconnected(mesh_peer);
5415         g_free(mesh_peer->peer_address);
5416         g_free(mesh_peer);
5417 }
5418 #endif
5419
5420 static struct {
5421         const char *interface;
5422         const char *member;
5423         void (*function) (const char *path, DBusMessageIter *iter);
5424 } signal_map[] = {
5425         { DBUS_INTERFACE_DBUS,  "NameOwnerChanged",  signal_name_owner_changed },
5426
5427         { SUPPLICANT_INTERFACE, "PropertiesChanged", signal_properties_changed },
5428         { SUPPLICANT_INTERFACE, "InterfaceAdded",    signal_interface_added    },
5429         { SUPPLICANT_INTERFACE, "InterfaceCreated",  signal_interface_added    },
5430         { SUPPLICANT_INTERFACE, "InterfaceRemoved",  signal_interface_removed  },
5431
5432         { SUPPLICANT_INTERFACE ".Interface", "PropertiesChanged", signal_interface_changed },
5433         { SUPPLICANT_INTERFACE ".Interface", "ScanDone",          signal_scan_done         },
5434         { SUPPLICANT_INTERFACE ".Interface", "BSSAdded",          signal_bss_added         },
5435         { SUPPLICANT_INTERFACE ".Interface", "BSSRemoved",        signal_bss_removed       },
5436         { SUPPLICANT_INTERFACE ".Interface", "NetworkAdded",      signal_network_added     },
5437         { SUPPLICANT_INTERFACE ".Interface", "NetworkRemoved",    signal_network_removed   },
5438         { SUPPLICANT_INTERFACE ".Interface", "StaAuthorized",     signal_sta_authorized    },
5439         { SUPPLICANT_INTERFACE ".Interface", "StaDeauthorized",   signal_sta_deauthorized  },
5440
5441         { SUPPLICANT_INTERFACE ".BSS", "PropertiesChanged", signal_bss_changed   },
5442
5443         { SUPPLICANT_INTERFACE ".Interface.WPS", "Credentials", signal_wps_credentials },
5444         { SUPPLICANT_INTERFACE ".Interface.WPS", "Event",       signal_wps_event       },
5445 #if defined TIZEN_EXT
5446         { "org.tizen.system.deviced.PowerOff", "ChangeState", signal_power_off },
5447 #endif
5448
5449         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeviceFound", signal_peer_found },
5450         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeviceLost",  signal_peer_lost  },
5451
5452         { SUPPLICANT_INTERFACE ".Peer", "PropertiesChanged", signal_peer_changed },
5453
5454         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationSuccess", signal_group_success },
5455         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationFailure", signal_group_failure },
5456         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GroupStarted", signal_group_started },
5457         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GroupFinished", signal_group_finished },
5458         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationRequest", signal_group_request },
5459
5460         { SUPPLICANT_INTERFACE ".Group", "PeerJoined", signal_group_peer_joined },
5461         { SUPPLICANT_INTERFACE ".Group", "PeerDisconnected", signal_group_peer_disconnected },
5462 #if defined TIZEN_EXT_WIFI_MESH
5463         { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshGroupStarted",
5464                 signal_mesh_group_started },
5465         { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshGroupRemoved",
5466                 signal_mesh_group_removed },
5467         { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshPeerConnected",
5468                 signal_mesh_peer_connected },
5469         { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshPeerDisconnected",
5470                 signal_mesh_peer_disconnected },
5471 #endif
5472
5473 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
5474         { SUPPLICANT_INTERFACE ".Interface", "EAP", signal_eap },
5475 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
5476
5477         { }
5478 };
5479
5480 static DBusHandlerResult g_supplicant_filter(DBusConnection *conn,
5481                                         DBusMessage *message, void *data)
5482 {
5483         DBusMessageIter iter;
5484         const char *path;
5485         int i;
5486
5487         path = dbus_message_get_path(message);
5488         if (!path)
5489                 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
5490
5491         if (!dbus_message_iter_init(message, &iter))
5492                 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
5493
5494         for (i = 0; signal_map[i].interface; i++) {
5495                 if (!dbus_message_has_interface(message, signal_map[i].interface))
5496                         continue;
5497
5498                 if (!dbus_message_has_member(message, signal_map[i].member))
5499                         continue;
5500
5501                 signal_map[i].function(path, &iter);
5502                 break;
5503         }
5504
5505         return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
5506 }
5507
5508 void g_supplicant_interface_cancel(GSupplicantInterface *interface)
5509 {
5510         SUPPLICANT_DBG("Cancelling any pending DBus calls");
5511         supplicant_dbus_method_call_cancel_all(interface);
5512         supplicant_dbus_property_call_cancel_all(interface);
5513 }
5514
5515 struct supplicant_regdom {
5516         GSupplicantCountryCallback callback;
5517         const char *alpha2;
5518         const void *user_data;
5519 };
5520
5521 static void country_result(const char *error,
5522                                 DBusMessageIter *iter, void *user_data)
5523 {
5524         struct supplicant_regdom *regdom = user_data;
5525         int result = 0;
5526
5527         SUPPLICANT_DBG("Country setting result");
5528
5529         if (!user_data)
5530                 return;
5531
5532         if (error) {
5533                 SUPPLICANT_DBG("Country setting failure %s", error);
5534                 result = -EINVAL;
5535         }
5536
5537         if (regdom->callback)
5538                 regdom->callback(result, regdom->alpha2,
5539                                         (void *) regdom->user_data);
5540
5541         g_free(regdom);
5542 }
5543
5544 static void country_params(DBusMessageIter *iter, void *user_data)
5545 {
5546         struct supplicant_regdom *regdom = user_data;
5547
5548         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING,
5549                                                         &regdom->alpha2);
5550 }
5551
5552 int g_supplicant_set_country(const char *alpha2,
5553                                 GSupplicantCountryCallback callback,
5554                                         const void *user_data)
5555 {
5556         struct supplicant_regdom *regdom;
5557         int ret;
5558
5559         SUPPLICANT_DBG("Country setting %s", alpha2);
5560
5561         if (!system_available)
5562                 return -EFAULT;
5563
5564         regdom = dbus_malloc0(sizeof(*regdom));
5565         if (!regdom)
5566                 return -ENOMEM;
5567
5568         regdom->callback = callback;
5569         regdom->alpha2 = alpha2;
5570         regdom->user_data = user_data;
5571
5572         ret =  supplicant_dbus_property_set(SUPPLICANT_PATH, SUPPLICANT_INTERFACE,
5573                                         "Country", DBUS_TYPE_STRING_AS_STRING,
5574                                         country_params, country_result,
5575                                         regdom, NULL);
5576         if (ret < 0) {
5577                 dbus_free(regdom);
5578                 SUPPLICANT_DBG("Unable to set Country configuration");
5579         }
5580         return ret;
5581 }
5582
5583 int g_supplicant_interface_set_country(GSupplicantInterface *interface,
5584                                         GSupplicantCountryCallback callback,
5585                                                         const char *alpha2,
5586                                                         void *user_data)
5587 {
5588         struct supplicant_regdom *regdom;
5589         int ret;
5590
5591         regdom = dbus_malloc0(sizeof(*regdom));
5592         if (!regdom)
5593                 return -ENOMEM;
5594
5595         regdom->callback = callback;
5596         regdom->alpha2 = alpha2;
5597         regdom->user_data = user_data;
5598
5599         ret =  supplicant_dbus_property_set(interface->path,
5600                                 SUPPLICANT_INTERFACE ".Interface",
5601                                 "Country", DBUS_TYPE_STRING_AS_STRING,
5602                                 country_params, country_result,
5603                                         regdom, NULL);
5604         if (ret < 0) {
5605                 dbus_free(regdom);
5606                 SUPPLICANT_DBG("Unable to set Country configuration");
5607         }
5608
5609         return ret;
5610 }
5611
5612 bool g_supplicant_interface_has_p2p(GSupplicantInterface *interface)
5613 {
5614         if (!interface)
5615                 return false;
5616
5617         return interface->p2p_support;
5618 }
5619
5620 struct supplicant_p2p_dev_config {
5621         char *device_name;
5622         char *dev_type;
5623 };
5624
5625 static void p2p_device_config_result(const char *error,
5626                                         DBusMessageIter *iter, void *user_data)
5627 {
5628         struct supplicant_p2p_dev_config *config = user_data;
5629
5630         if (error)
5631                 SUPPLICANT_DBG("Unable to set P2P Device configuration: %s",
5632                                                                         error);
5633
5634         g_free(config->device_name);
5635         g_free(config->dev_type);
5636         dbus_free(config);
5637 }
5638
5639 static int dev_type_str2bin(const char *type, unsigned char dev_type[8])
5640 {
5641         int length, pos, end;
5642         char b[3] = {};
5643         char *e = NULL;
5644
5645         end = strlen(type);
5646         for (length = pos = 0; type[pos] != '\0' && length < 8; length++) {
5647                 if (pos+2 > end)
5648                         return 0;
5649
5650                 b[0] = type[pos];
5651                 b[1] = type[pos+1];
5652
5653                 dev_type[length] = strtol(b, &e, 16);
5654                 if (e && *e != '\0')
5655                         return 0;
5656
5657                 pos += 2;
5658         }
5659
5660         return 8;
5661 }
5662
5663 static void p2p_device_config_params(DBusMessageIter *iter, void *user_data)
5664 {
5665         struct supplicant_p2p_dev_config *config = user_data;
5666         DBusMessageIter dict;
5667
5668         supplicant_dbus_dict_open(iter, &dict);
5669
5670         supplicant_dbus_dict_append_basic(&dict, "DeviceName",
5671                                 DBUS_TYPE_STRING, &config->device_name);
5672
5673         if (config->dev_type) {
5674                 unsigned char dev_type[8] = {}, *type;
5675                 int len;
5676
5677                 len = dev_type_str2bin(config->dev_type, dev_type);
5678                 if (len) {
5679                         type = dev_type;
5680                         supplicant_dbus_dict_append_fixed_array(&dict,
5681                                         "PrimaryDeviceType",
5682                                         DBUS_TYPE_BYTE, &type, len);
5683                 }
5684         }
5685
5686         supplicant_dbus_dict_close(iter, &dict);
5687 }
5688
5689 int g_supplicant_interface_set_p2p_device_config(GSupplicantInterface *interface,
5690                                         const char *device_name,
5691                                         const char *primary_dev_type)
5692 {
5693         struct supplicant_p2p_dev_config *config;
5694         int ret;
5695
5696         SUPPLICANT_DBG("P2P Device settings %s/%s",
5697                                         device_name, primary_dev_type);
5698
5699         config = dbus_malloc0(sizeof(*config));
5700         if (!config)
5701                 return -ENOMEM;
5702
5703         config->device_name = g_strdup(device_name);
5704         config->dev_type = g_strdup(primary_dev_type);
5705
5706         ret = supplicant_dbus_property_set(interface->path,
5707                                 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
5708                                 "P2PDeviceConfig",
5709                                 DBUS_TYPE_ARRAY_AS_STRING
5710                                 DBUS_DICT_ENTRY_BEGIN_CHAR_AS_STRING
5711                                 DBUS_TYPE_STRING_AS_STRING
5712                                 DBUS_TYPE_VARIANT_AS_STRING
5713                                 DBUS_DICT_ENTRY_END_CHAR_AS_STRING,
5714                                 p2p_device_config_params,
5715                                 p2p_device_config_result, config, NULL);
5716         if (ret < 0) {
5717                 g_free(config->device_name);
5718                 g_free(config->dev_type);
5719                 dbus_free(config);
5720                 SUPPLICANT_DBG("Unable to set P2P Device configuration");
5721         }
5722
5723         return ret;
5724 }
5725
5726 static gboolean peer_lookup_by_identifier(gpointer key, gpointer value,
5727                                                         gpointer user_data)
5728 {
5729         const GSupplicantPeer *peer = value;
5730         const char *identifier = user_data;
5731
5732         if (!g_strcmp0(identifier, peer->identifier))
5733                 return TRUE;
5734
5735         return FALSE;
5736 }
5737
5738 GSupplicantPeer *g_supplicant_interface_peer_lookup(GSupplicantInterface *interface,
5739                                                         const char *identifier)
5740 {
5741         GSupplicantPeer *peer;
5742
5743         peer = g_hash_table_find(interface->peer_table,
5744                                         peer_lookup_by_identifier,
5745                                         (void *) identifier);
5746         return peer;
5747 }
5748
5749 static void interface_create_data_free(struct interface_create_data *data)
5750 {
5751         g_free(data->ifname);
5752         g_free(data->driver);
5753         g_free(data->bridge);
5754 #if defined TIZEN_EXT_WIFI_MESH
5755         g_free(data->parent_ifname);
5756 #endif
5757         dbus_free(data);
5758 }
5759
5760 static bool interface_exists(GSupplicantInterface *interface,
5761                                 const char *path)
5762 {
5763         GSupplicantInterface *tmp;
5764
5765         tmp = g_hash_table_lookup(interface_table, path);
5766         if (tmp && tmp == interface)
5767                 return true;
5768
5769         return false;
5770 }
5771
5772 static void interface_create_property(const char *key, DBusMessageIter *iter,
5773                                                         void *user_data)
5774 {
5775         struct interface_create_data *data = user_data;
5776         GSupplicantInterface *interface = data->interface;
5777
5778         if (!key) {
5779                 if (data->callback) {
5780                         data->callback(0, data->interface, data->user_data);
5781 #if !defined TIZEN_EXT
5782                         callback_p2p_support(interface);
5783 #endif
5784 #if defined TIZEN_EXT_WIFI_MESH
5785                         callback_mesh_support(interface);
5786 #endif
5787                 }
5788
5789                 interface_create_data_free(data);
5790         }
5791
5792         interface_property(key, iter, interface);
5793 }
5794
5795 static void interface_create_result(const char *error,
5796                                 DBusMessageIter *iter, void *user_data)
5797 {
5798         struct interface_create_data *data = user_data;
5799         const char *path = NULL;
5800         int err;
5801
5802         SUPPLICANT_DBG("");
5803
5804         if (error) {
5805                 g_warning("error %s", error);
5806                 err = -EIO;
5807                 goto done;
5808         }
5809
5810         dbus_message_iter_get_basic(iter, &path);
5811         if (!path) {
5812                 err = -EINVAL;
5813                 goto done;
5814         }
5815
5816         if (!system_available) {
5817                 err = -EFAULT;
5818                 goto done;
5819         }
5820
5821         data->interface = g_hash_table_lookup(interface_table, path);
5822         if (!data->interface) {
5823                 data->interface = interface_alloc(path);
5824                 if (!data->interface) {
5825                         err = -ENOMEM;
5826                         goto done;
5827                 }
5828         }
5829
5830         err = supplicant_dbus_property_get_all(path,
5831                                         SUPPLICANT_INTERFACE ".Interface",
5832                                         interface_create_property, data,
5833                                         NULL);
5834         if (err == 0)
5835                 return;
5836
5837 done:
5838         if (data->callback)
5839                 data->callback(err, NULL, data->user_data);
5840
5841         interface_create_data_free(data);
5842 }
5843
5844 static void interface_create_params(DBusMessageIter *iter, void *user_data)
5845 {
5846         struct interface_create_data *data = user_data;
5847         DBusMessageIter dict;
5848         char *config_file = NULL;
5849
5850         SUPPLICANT_DBG("");
5851
5852         supplicant_dbus_dict_open(iter, &dict);
5853
5854         supplicant_dbus_dict_append_basic(&dict, "Ifname",
5855                                         DBUS_TYPE_STRING, &data->ifname);
5856
5857         if (data->driver)
5858                 supplicant_dbus_dict_append_basic(&dict, "Driver",
5859                                         DBUS_TYPE_STRING, &data->driver);
5860
5861         if (data->bridge)
5862                 supplicant_dbus_dict_append_basic(&dict, "BridgeIfname",
5863                                         DBUS_TYPE_STRING, &data->bridge);
5864
5865         config_file = g_hash_table_lookup(config_file_table, data->ifname);
5866         if (config_file) {
5867                 SUPPLICANT_DBG("[%s] ConfigFile %s", data->ifname, config_file);
5868
5869                 supplicant_dbus_dict_append_basic(&dict, "ConfigFile",
5870                                         DBUS_TYPE_STRING, &config_file);
5871         }
5872
5873 #ifdef TIZEN_EXT
5874         if (data->driver && g_strstr_len(data->driver, strlen(data->driver), "nl80211")) {
5875                 supplicant_dbus_dict_append_basic(&dict, "MacAddr",
5876                                 DBUS_TYPE_UINT32, &data->mac_addr);
5877
5878                 supplicant_dbus_dict_append_basic(&dict, "PreassocMacAddr",
5879                                 DBUS_TYPE_UINT32, &data->preassoc_mac_addr);
5880
5881                 supplicant_dbus_dict_append_basic(&dict, "RandAddrLifetime",
5882                                 DBUS_TYPE_UINT32, &data->random_mac_lifetime);
5883         }
5884 #endif /* TIZEN_EXT */
5885
5886 #if defined TIZEN_EXT_WIFI_MESH
5887         if (data->is_mesh_interface) {
5888                 if (data->parent_ifname)
5889                         supplicant_dbus_dict_append_basic(&dict, "ParentIfname",
5890                                         DBUS_TYPE_STRING, &data->parent_ifname);
5891
5892                 supplicant_dbus_dict_append_basic(&dict, "IsMeshInterface",
5893                                         DBUS_TYPE_BOOLEAN, &data->is_mesh_interface);
5894         }
5895 #endif
5896
5897         supplicant_dbus_dict_close(iter, &dict);
5898 }
5899
5900 #if defined TIZEN_EXT
5901 static void interface_get_state(const char *key, DBusMessageIter *iter,
5902                 void *user_data)
5903 {
5904         struct interface_create_data *data = user_data;
5905         GSupplicantInterface *interface = NULL;
5906         const char *str = NULL;
5907
5908         SUPPLICANT_DBG("key[%s]", key);
5909
5910         if (!data) {
5911                 SUPPLICANT_DBG("data is NULL");
5912                 return;
5913         }
5914
5915         interface = data->interface;
5916         if (!interface) {
5917                 SUPPLICANT_DBG("interface is NULL");
5918                 return;
5919         }
5920
5921         if (iter)
5922                 dbus_message_iter_get_basic(iter, &str);
5923
5924         if (str) {
5925                 if (string2state(str) != interface->state)
5926                         interface->state = string2state(str);
5927         }
5928
5929         if (interface->state == G_SUPPLICANT_STATE_DISABLED)
5930                 interface->ready = FALSE;
5931         else
5932                 interface->ready = TRUE;
5933
5934         SUPPLICANT_DBG("state %s (%d)", str, interface->state);
5935
5936         if (data->callback) {
5937                 data->callback(0, interface, data->user_data);
5938 #if defined TIZEN_EXT_WIFI_MESH
5939                 callback_mesh_support(interface);
5940 #endif
5941         }
5942
5943         interface_create_data_free(data);
5944 }
5945 #endif
5946
5947 static void interface_get_result(const char *error,
5948                                 DBusMessageIter *iter, void *user_data)
5949 {
5950         struct interface_create_data *data = user_data;
5951         GSupplicantInterface *interface;
5952         const char *path = NULL;
5953         int err;
5954
5955 #if defined TIZEN_EXT
5956         if (!simplified_log)
5957 #endif
5958         SUPPLICANT_DBG("");
5959
5960         if (error) {
5961                 SUPPLICANT_DBG("Interface not created yet");
5962                 goto create;
5963         }
5964
5965         dbus_message_iter_get_basic(iter, &path);
5966         if (!path) {
5967                 err = -EINVAL;
5968                 goto done;
5969         }
5970
5971         interface = g_hash_table_lookup(interface_table, path);
5972         if (!interface) {
5973                 err = -ENOENT;
5974                 goto done;
5975         }
5976
5977 #if defined TIZEN_EXT
5978         data->interface = interface;
5979         err = supplicant_dbus_property_get(path,
5980                         SUPPLICANT_INTERFACE ".Interface",
5981                         "State", interface_get_state, data, NULL);
5982
5983         if (err == 0)
5984                 return;
5985 #endif
5986
5987         if (data->callback) {
5988                 data->callback(0, interface, data->user_data);
5989 #if !defined TIZEN_EXT
5990                 callback_p2p_support(interface);
5991 #endif
5992 #if defined TIZEN_EXT_WIFI_MESH
5993                 callback_mesh_support(interface);
5994 #endif
5995         }
5996
5997         interface_create_data_free(data);
5998
5999         return;
6000
6001 create:
6002         if (!system_available) {
6003                 err = -EFAULT;
6004                 goto done;
6005         }
6006
6007         SUPPLICANT_DBG("Creating interface");
6008
6009         err = supplicant_dbus_method_call(SUPPLICANT_PATH,
6010                                                 SUPPLICANT_INTERFACE,
6011                                                 "CreateInterface",
6012                                                 interface_create_params,
6013                                                 interface_create_result, data,
6014                                                 NULL);
6015         if (err == 0)
6016                 return;
6017
6018 done:
6019         if (data->callback)
6020                 data->callback(err, NULL, data->user_data);
6021
6022         interface_create_data_free(data);
6023 }
6024
6025 static void interface_get_params(DBusMessageIter *iter, void *user_data)
6026 {
6027         struct interface_create_data *data = user_data;
6028 #if defined TIZEN_EXT
6029         if (!simplified_log)
6030 #endif
6031         SUPPLICANT_DBG("");
6032
6033         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, &data->ifname);
6034 }
6035
6036 #if defined TIZEN_EXT_WIFI_MESH
6037 int g_supplicant_mesh_interface_create(const char *ifname, const char *driver,
6038                                                 const char *bridge, const char *parent_ifname,
6039                                                 GSupplicantInterfaceCallback callback, void *user_data)
6040 {
6041         struct interface_create_data *data;
6042         int ret;
6043
6044         SUPPLICANT_DBG("ifname %s", ifname);
6045
6046         if (!ifname || !parent_ifname)
6047                 return -EINVAL;
6048
6049         if (!system_available)
6050                 return -EFAULT;
6051
6052         data = dbus_malloc0(sizeof(*data));
6053         if (!data)
6054                 return -ENOMEM;
6055
6056         data->ifname = g_strdup(ifname);
6057         data->driver = g_strdup(driver);
6058         data->bridge = g_strdup(bridge);
6059         data->is_mesh_interface = true;
6060         data->parent_ifname = g_strdup(parent_ifname);
6061         data->callback = callback;
6062         data->user_data = user_data;
6063
6064         ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
6065                                                 SUPPLICANT_INTERFACE,
6066                                                 "CreateInterface",
6067                                                 interface_create_params,
6068                                                 interface_create_result, data,
6069                                                 NULL);
6070         return ret;
6071 }
6072
6073 struct interface_mesh_peer_data {
6074         char *peer_address;
6075         char *method;
6076         GSupplicantInterface *interface;
6077         GSupplicantInterfaceCallback callback;
6078         void *user_data;
6079 };
6080
6081 static void interface_mesh_change_peer_params(DBusMessageIter *iter,
6082                                                 void *user_data)
6083 {
6084         struct interface_mesh_peer_data *data = user_data;
6085
6086         SUPPLICANT_DBG("");
6087
6088         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, &data->peer_address);
6089 }
6090
6091 static void interface_mesh_change_peer_result(const char *error,
6092                                 DBusMessageIter *iter, void *user_data)
6093 {
6094         struct interface_mesh_peer_data *data = user_data;
6095         int err = 0;
6096
6097         SUPPLICANT_DBG("%s", data->method);
6098
6099         if (error) {
6100                 err = -EIO;
6101                 SUPPLICANT_DBG("error %s", error);
6102         }
6103
6104         if (data->callback)
6105                 data->callback(err, data->interface, data->user_data);
6106
6107         g_free(data->peer_address);
6108         g_free(data->method);
6109         dbus_free(data);
6110 }
6111
6112 int g_supplicant_interface_mesh_peer_change_status(
6113                                 GSupplicantInterface *interface,
6114                                 GSupplicantInterfaceCallback callback, const char *peer_address,
6115                                 const char *method, void *user_data)
6116 {
6117         struct interface_mesh_peer_data *data;
6118         int ret;
6119
6120         if (!peer_address)
6121                 return -EINVAL;
6122
6123         data = dbus_malloc0(sizeof(*data));
6124         if (!data)
6125                 return -ENOMEM;
6126
6127         data->peer_address = g_strdup(peer_address);
6128         data->method = g_strdup(method);
6129         data->interface = interface;
6130         data->callback = callback;
6131         data->user_data = user_data;
6132
6133         ret = supplicant_dbus_method_call(interface->path,
6134                                                 SUPPLICANT_INTERFACE ".Interface.Mesh",
6135                                                 method, interface_mesh_change_peer_params,
6136                                                 interface_mesh_change_peer_result, data, NULL);
6137         if (ret < 0) {
6138                 g_free(data->peer_address);
6139                 g_free(data->method);
6140                 dbus_free(data);
6141         }
6142
6143         return ret;
6144 }
6145 #endif
6146
6147 int g_supplicant_interface_create(const char *ifname, const char *driver,
6148                                         const char *bridge,
6149 #ifdef TIZEN_EXT
6150                                         unsigned int mac_policy,
6151                                         unsigned int preassoc_mac_policy,
6152                                         unsigned int random_mac_lifetime,
6153 #endif /* TIZEN_EXT */
6154                                         GSupplicantInterfaceCallback callback,
6155                                                         void *user_data)
6156 {
6157         struct interface_create_data *data;
6158         int ret;
6159
6160         SUPPLICANT_DBG("ifname %s", ifname);
6161
6162         if (!ifname)
6163                 return -EINVAL;
6164
6165         if (!system_available)
6166                 return -EFAULT;
6167
6168         data = dbus_malloc0(sizeof(*data));
6169         if (!data)
6170                 return -ENOMEM;
6171
6172         data->ifname = g_strdup(ifname);
6173         data->driver = g_strdup(driver);
6174         data->bridge = g_strdup(bridge);
6175         data->callback = callback;
6176 #ifdef TIZEN_EXT
6177         data->mac_addr = mac_policy;
6178         data->preassoc_mac_addr = preassoc_mac_policy;
6179         data->random_mac_lifetime = random_mac_lifetime;
6180 #endif /* TIZEN_EXT */
6181         data->user_data = user_data;
6182
6183         ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
6184                                                 SUPPLICANT_INTERFACE,
6185                                                 "GetInterface",
6186                                                 interface_get_params,
6187                                                 interface_get_result, data,
6188                                                 NULL);
6189         if (ret < 0)
6190                 interface_create_data_free(data);
6191
6192         return ret;
6193 }
6194
6195 static void interface_remove_result(const char *error,
6196                                 DBusMessageIter *iter, void *user_data)
6197 {
6198         struct interface_data *data = user_data;
6199         int err;
6200
6201         if (error) {
6202                 err = -EIO;
6203                 SUPPLICANT_DBG("error: %s", error);
6204                 goto done;
6205         }
6206
6207         if (!system_available) {
6208                 err = -EFAULT;
6209                 goto done;
6210         }
6211
6212         /*
6213          * The gsupplicant interface is already freed by the InterfaceRemoved
6214          * signal callback. Simply invoke the interface_data callback.
6215          */
6216         err = 0;
6217
6218 done:
6219         g_free(data->path);
6220
6221         if (data->callback)
6222                 data->callback(err, NULL, data->user_data);
6223
6224         dbus_free(data);
6225 }
6226
6227
6228 static void interface_remove_params(DBusMessageIter *iter, void *user_data)
6229 {
6230         struct interface_data *data = user_data;
6231
6232         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
6233                                                         &data->interface->path);
6234 }
6235
6236 int g_supplicant_interface_remove(GSupplicantInterface *interface,
6237                         GSupplicantInterfaceCallback callback,
6238                                                         void *user_data)
6239 {
6240         struct interface_data *data;
6241         int ret;
6242
6243         if (!interface)
6244                 return -EINVAL;
6245
6246         if (!system_available)
6247                 return -EFAULT;
6248
6249         g_supplicant_interface_cancel(interface);
6250
6251         data = dbus_malloc0(sizeof(*data));
6252         if (!data)
6253                 return -ENOMEM;
6254
6255         data->interface = interface;
6256         data->path = g_strdup(interface->path);
6257         data->callback = callback;
6258         data->user_data = user_data;
6259
6260         ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
6261                                                 SUPPLICANT_INTERFACE,
6262                                                 "RemoveInterface",
6263                                                 interface_remove_params,
6264                                                 interface_remove_result, data,
6265                                                 NULL);
6266         if (ret < 0) {
6267                 g_free(data->path);
6268                 dbus_free(data);
6269         }
6270         return ret;
6271 }
6272
6273 static void interface_scan_result(const char *error,
6274                                 DBusMessageIter *iter, void *user_data)
6275 {
6276         struct interface_scan_data *data = user_data;
6277         int err = 0;
6278
6279         if (error) {
6280                 SUPPLICANT_DBG("error %s", error);
6281                 err = -EIO;
6282         }
6283
6284         /* A non ready interface cannot send/receive anything */
6285         if (interface_exists(data->interface, data->path)) {
6286                 if (!data->interface->ready)
6287                         err = -ENOLINK;
6288         }
6289
6290         g_free(data->path);
6291
6292         if (err != 0) {
6293                 if (data->callback)
6294                         data->callback(err, data->interface, data->user_data);
6295         } else {
6296                 data->interface->scan_callback = data->callback;
6297                 data->interface->scan_data = data->user_data;
6298         }
6299
6300         if (data->scan_params)
6301                 g_supplicant_free_scan_params(data->scan_params);
6302
6303         dbus_free(data);
6304 }
6305
6306 static void add_scan_frequency(DBusMessageIter *iter, unsigned int freq)
6307 {
6308         DBusMessageIter data;
6309         unsigned int width = 0; /* Not used by wpa_supplicant atm */
6310
6311         dbus_message_iter_open_container(iter, DBUS_TYPE_STRUCT, NULL, &data);
6312
6313         dbus_message_iter_append_basic(&data, DBUS_TYPE_UINT32, &freq);
6314         dbus_message_iter_append_basic(&data, DBUS_TYPE_UINT32, &width);
6315
6316         dbus_message_iter_close_container(iter, &data);
6317 }
6318
6319 static void add_scan_frequencies(DBusMessageIter *iter,
6320                                                 void *user_data)
6321 {
6322         GSupplicantScanParams *scan_data = user_data;
6323         unsigned int freq;
6324         int i;
6325
6326         for (i = 0; i < scan_data->num_freqs; i++) {
6327                 freq = scan_data->freqs[i];
6328                 if (!freq)
6329                         break;
6330
6331                 add_scan_frequency(iter, freq);
6332         }
6333 }
6334
6335 static void append_ssid(DBusMessageIter *iter,
6336                         const void *ssid, unsigned int len)
6337 {
6338         DBusMessageIter array;
6339
6340         dbus_message_iter_open_container(iter, DBUS_TYPE_ARRAY,
6341         DBUS_TYPE_BYTE_AS_STRING, &array);
6342
6343         dbus_message_iter_append_fixed_array(&array, DBUS_TYPE_BYTE,
6344                                                                 &ssid, len);
6345         dbus_message_iter_close_container(iter, &array);
6346 }
6347
6348 static void append_ssids(DBusMessageIter *iter, void *user_data)
6349 {
6350         GSupplicantScanParams *scan_data = user_data;
6351         GSList *list;
6352
6353         for (list = scan_data->ssids; list; list = list->next) {
6354                 struct scan_ssid *scan_ssid = list->data;
6355
6356                 append_ssid(iter, scan_ssid->ssid, scan_ssid->ssid_len);
6357         }
6358 }
6359
6360 static void supplicant_add_scan_frequency(DBusMessageIter *dict,
6361                 supplicant_dbus_array_function function,
6362                                         void *user_data)
6363 {
6364         GSupplicantScanParams *scan_params = user_data;
6365         DBusMessageIter entry, value, array;
6366         const char *key = "Channels";
6367
6368         if (scan_params->freqs && scan_params->freqs[0] != 0) {
6369                 dbus_message_iter_open_container(dict, DBUS_TYPE_DICT_ENTRY,
6370                                                 NULL, &entry);
6371
6372                 dbus_message_iter_append_basic(&entry, DBUS_TYPE_STRING, &key);
6373
6374                 dbus_message_iter_open_container(&entry, DBUS_TYPE_VARIANT,
6375                                         DBUS_TYPE_ARRAY_AS_STRING
6376                                         DBUS_STRUCT_BEGIN_CHAR_AS_STRING
6377                                         DBUS_TYPE_UINT32_AS_STRING
6378                                         DBUS_TYPE_UINT32_AS_STRING
6379                                         DBUS_STRUCT_END_CHAR_AS_STRING,
6380                                         &value);
6381
6382                 dbus_message_iter_open_container(&value, DBUS_TYPE_ARRAY,
6383                                         DBUS_STRUCT_BEGIN_CHAR_AS_STRING
6384                                         DBUS_TYPE_UINT32_AS_STRING
6385                                         DBUS_TYPE_UINT32_AS_STRING
6386                                         DBUS_STRUCT_END_CHAR_AS_STRING,
6387                                         &array);
6388
6389                 if (function)
6390                         function(&array, user_data);
6391
6392                 dbus_message_iter_close_container(&value, &array);
6393                 dbus_message_iter_close_container(&entry, &value);
6394                 dbus_message_iter_close_container(dict, &entry);
6395         }
6396 }
6397
6398 static void interface_scan_params(DBusMessageIter *iter, void *user_data)
6399 {
6400         DBusMessageIter dict;
6401         const char *type = "passive";
6402         struct interface_scan_data *data = user_data;
6403
6404         supplicant_dbus_dict_open(iter, &dict);
6405
6406         if (data && data->scan_params) {
6407                 type = "active";
6408
6409                 supplicant_dbus_dict_append_basic(&dict, "Type",
6410                                         DBUS_TYPE_STRING, &type);
6411
6412 #if defined TIZEN_EXT
6413                 SUPPLICANT_DBG("[specific_scan] num_ssids %d",
6414                                data->scan_params->num_ssids);
6415 #endif
6416
6417                 if (data->scan_params->ssids) {
6418                         supplicant_dbus_dict_append_array(&dict, "SSIDs",
6419                                                         DBUS_TYPE_STRING,
6420                                                         append_ssids,
6421                                                         data->scan_params);
6422                 }
6423                 supplicant_add_scan_frequency(&dict, add_scan_frequencies,
6424                                                 data->scan_params);
6425         } else
6426                 supplicant_dbus_dict_append_basic(&dict, "Type",
6427                                         DBUS_TYPE_STRING, &type);
6428
6429         supplicant_dbus_dict_close(iter, &dict);
6430 }
6431
6432 static int interface_ready_to_scan(GSupplicantInterface *interface)
6433 {
6434         if (!interface)
6435                 return -EINVAL;
6436
6437         if (!system_available)
6438                 return -EFAULT;
6439
6440         if (interface->scanning)
6441                 return -EALREADY;
6442
6443         switch (interface->state) {
6444         case G_SUPPLICANT_STATE_AUTHENTICATING:
6445         case G_SUPPLICANT_STATE_ASSOCIATING:
6446         case G_SUPPLICANT_STATE_ASSOCIATED:
6447         case G_SUPPLICANT_STATE_4WAY_HANDSHAKE:
6448         case G_SUPPLICANT_STATE_GROUP_HANDSHAKE:
6449                 return -EBUSY;
6450 #if defined TIZEN_EXT
6451         case G_SUPPLICANT_STATE_DISABLED:
6452                 return -ENOLINK;
6453         case G_SUPPLICANT_STATE_UNKNOWN:
6454 #else
6455         case G_SUPPLICANT_STATE_UNKNOWN:
6456         case G_SUPPLICANT_STATE_DISABLED:
6457 #endif
6458         case G_SUPPLICANT_STATE_DISCONNECTED:
6459         case G_SUPPLICANT_STATE_INACTIVE:
6460         case G_SUPPLICANT_STATE_SCANNING:
6461         case G_SUPPLICANT_STATE_COMPLETED:
6462                 break;
6463         }
6464
6465         return 0;
6466 }
6467
6468 #if defined TIZEN_EXT_WIFI_MESH
6469 static void interface_abort_scan_result(const char *error,
6470                                 DBusMessageIter *iter, void *user_data)
6471 {
6472         struct interface_scan_data *data = user_data;
6473         int err = 0;
6474
6475         if (error) {
6476                 SUPPLICANT_DBG("error %s", error);
6477                 err = -EIO;
6478         }
6479
6480         g_free(data->path);
6481
6482                 if (data->callback)
6483                         data->callback(err, data->interface, data->user_data);
6484
6485         dbus_free(data);
6486 }
6487
6488 int g_supplicant_interface_abort_scan(GSupplicantInterface *interface,
6489                                 GSupplicantInterfaceCallback callback, void *user_data)
6490 {
6491         struct interface_scan_data *data;
6492         int ret;
6493
6494         if (!interface->scanning)
6495                 return -EEXIST;
6496
6497         data = dbus_malloc0(sizeof(*data));
6498         if (!data)
6499                 return -ENOMEM;
6500
6501         data->interface = interface;
6502         data->path = g_strdup(interface->path);
6503         data->callback = callback;
6504         data->user_data = user_data;
6505
6506         ret = supplicant_dbus_method_call(interface->path,
6507                         SUPPLICANT_INTERFACE ".Interface", "AbortScan", NULL,
6508                         interface_abort_scan_result, data, interface);
6509
6510         if (ret < 0) {
6511                 g_free(data->path);
6512                 dbus_free(data);
6513         }
6514
6515         return ret;
6516 }
6517 #endif
6518
6519 int g_supplicant_interface_scan(GSupplicantInterface *interface,
6520                                 GSupplicantScanParams *scan_data,
6521                                 GSupplicantInterfaceCallback callback,
6522                                                         void *user_data)
6523 {
6524         struct interface_scan_data *data;
6525         int ret;
6526
6527         ret = interface_ready_to_scan(interface);
6528         if (ret)
6529                 return ret;
6530
6531         data = dbus_malloc0(sizeof(*data));
6532         if (!data)
6533                 return -ENOMEM;
6534
6535         data->interface = interface;
6536         data->path = g_strdup(interface->path);
6537 #if defined TIZEN_EXT
6538         data->interface->scan_callback = data->callback = callback;
6539         data->interface->scan_data = data->user_data = user_data;
6540 #else
6541         data->callback = callback;
6542         data->user_data = user_data;
6543 #endif
6544         data->scan_params = scan_data;
6545
6546         interface->scan_callback = callback;
6547         interface->scan_data = user_data;
6548
6549         ret = supplicant_dbus_method_call(interface->path,
6550                         SUPPLICANT_INTERFACE ".Interface", "Scan",
6551                         interface_scan_params, interface_scan_result, data,
6552                         interface);
6553
6554         if (ret < 0) {
6555                 g_free(data->path);
6556                 dbus_free(data);
6557         }
6558
6559         return ret;
6560 }
6561
6562 #if defined TIZEN_EXT
6563 static void interface_signalpoll_result(const char *error,
6564                                 DBusMessageIter *iter, void *user_data)
6565 {
6566         struct interface_signalpoll_data *data = user_data;
6567         int err = 0;
6568         dbus_int32_t maxspeed = 0;
6569         dbus_int32_t strength = 0;
6570         dbus_int32_t snr = 0;
6571         DBusMessageIter sub_iter, dict;
6572
6573         if (error) {
6574                 err = -EIO;
6575                 SUPPLICANT_DBG("error: %s", error);
6576                 goto out;
6577         }
6578
6579         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_VARIANT) {
6580                 err = -EINVAL;
6581                 SUPPLICANT_DBG("invalid reply");
6582                 goto out;
6583         }
6584
6585         dbus_message_iter_recurse(iter, &sub_iter);
6586         dbus_message_iter_recurse(&sub_iter, &dict);
6587
6588         while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_DICT_ENTRY) {
6589                 DBusMessageIter entry, value;
6590                 const char *key;
6591
6592                 dbus_message_iter_recurse(&dict, &entry);
6593                 dbus_message_iter_get_basic(&entry, &key);
6594                 dbus_message_iter_next(&entry);
6595                 dbus_message_iter_recurse(&entry, &value);
6596
6597                 switch (dbus_message_iter_get_arg_type(&value)) {
6598                 case DBUS_TYPE_INT32:
6599                         if (g_strcmp0(key, "linkspeed") == 0) {
6600                                 dbus_message_iter_get_basic(&value, &maxspeed);
6601                                 SUPPLICANT_DBG("linkspeed = %d", maxspeed);
6602                                 break;
6603                         } else if (g_strcmp0(key, "rssi") == 0) {
6604                                 dbus_message_iter_get_basic(&value, &strength);
6605                                 SUPPLICANT_DBG("Strength = %d", strength);
6606                                 break;
6607                         } else if (g_strcmp0(key, "SNR") == 0) {
6608                                 dbus_message_iter_get_basic(&value, &snr);
6609                                 SUPPLICANT_DBG("SNR = %d", snr);
6610                                 break;
6611                         }
6612                 }
6613                 dbus_message_iter_next(&dict);
6614         }
6615
6616 out:
6617         if(data->callback)
6618                 data->callback(err, maxspeed, strength, snr, data->user_data);
6619
6620         g_free(data->path);
6621         dbus_free(data);
6622 }
6623
6624 int g_supplicant_interface_signalpoll(GSupplicantInterface *interface,
6625                                 GSupplicantMaxSpeedCallback callback,
6626                                 void *user_data)
6627 {
6628         struct interface_signalpoll_data *data;
6629         int ret;
6630
6631         if (!interface)
6632                 return -EINVAL;
6633
6634         if (!system_available)
6635                 return -EFAULT;
6636
6637         data = dbus_malloc0(sizeof(*data));
6638         if (!data)
6639                 return -ENOMEM;
6640
6641         data->interface = interface;
6642         data->path = g_strdup(interface->path);
6643         data->callback = callback;
6644         data->user_data = user_data;
6645
6646         ret = supplicant_dbus_method_call(interface->path,
6647                         SUPPLICANT_INTERFACE ".Interface", "SignalPoll",
6648                         NULL, interface_signalpoll_result, data,
6649                         interface);
6650
6651         if (ret < 0) {
6652                 g_free(data->path);
6653                 dbus_free(data);
6654         }
6655
6656         return ret;
6657 }
6658 #endif
6659
6660 static int parse_supplicant_error(DBusMessageIter *iter)
6661 {
6662         int err = -ECONNABORTED;
6663         char *key;
6664
6665         if (!iter)
6666                 return err;
6667
6668         /* If the given passphrase is malformed wpa_s returns
6669          * "invalid message format" but this error should be interpreted as
6670          * invalid-key.
6671          */
6672         while (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_STRING) {
6673                 dbus_message_iter_get_basic(iter, &key);
6674                 if (strncmp(key, "psk", 3) == 0 ||
6675                                 strncmp(key, "wep_key", 7) == 0 ||
6676                                 strcmp(key, "invalid message format") == 0) {
6677                         err = -ENOKEY;
6678                         break;
6679                 }
6680                 dbus_message_iter_next(iter);
6681         }
6682
6683         return err;
6684 }
6685
6686 static void interface_select_network_result(const char *error,
6687                                 DBusMessageIter *iter, void *user_data)
6688 {
6689         struct interface_connect_data *data = user_data;
6690         int err;
6691
6692         SUPPLICANT_DBG("");
6693
6694         err = 0;
6695         if (error) {
6696 #if defined TIZEN_EXT
6697                 SUPPLICANT_DBG("SelectNetwork errorFreq %s", error);
6698 #else
6699                 SUPPLICANT_DBG("SelectNetwork error %s", error);
6700 #endif
6701                 err = parse_supplicant_error(iter);
6702         }
6703
6704         g_free(data->path);
6705
6706         if (data->callback)
6707                 data->callback(err, data->interface, data->user_data);
6708
6709 #if defined TIZEN_EXT
6710         g_free(data->ssid->ssid);
6711         g_free((char *)data->ssid->passphrase);
6712         g_free((char *)data->ssid->connector);
6713         g_free((char *)data->ssid->c_sign_key);
6714         g_free((char *)data->ssid->net_access_key);
6715 #endif
6716         g_free(data->ssid);
6717         dbus_free(data);
6718 }
6719
6720 static void interface_select_network_params(DBusMessageIter *iter,
6721                                                         void *user_data)
6722 {
6723         struct interface_connect_data *data = user_data;
6724         GSupplicantInterface *interface = data->interface;
6725 #if defined TIZEN_EXT
6726         GSupplicantSSID *ssid = data->ssid;
6727 #endif
6728
6729         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
6730                                         &interface->network_path);
6731 #if defined TIZEN_EXT
6732         if (!ssid->bssid_for_connect_len)
6733                 dbus_message_iter_append_basic(iter, DBUS_TYPE_INT32, &ssid->freq);
6734 #endif
6735 }
6736
6737 static void interface_add_network_result(const char *error,
6738                                 DBusMessageIter *iter, void *user_data)
6739 {
6740         struct interface_connect_data *data = user_data;
6741         GSupplicantInterface *interface = data->interface;
6742         const char *path;
6743         int err;
6744
6745         if (error)
6746                 goto error;
6747
6748         dbus_message_iter_get_basic(iter, &path);
6749         if (!path)
6750                 goto error;
6751
6752         SUPPLICANT_DBG("PATH: %s", path);
6753
6754 #if defined TIZEN_EXT
6755         if (interface->network_path)
6756                 g_free(interface->network_path);
6757 #endif
6758         interface->network_path = g_strdup(path);
6759
6760         store_network_information(interface, data->ssid);
6761
6762 #if defined TIZEN_EXT
6763         SUPPLICANT_DBG(".Interface.SelectNetworkFreq");
6764         GSupplicantSSID *ssid = data->ssid;
6765
6766         if (!ssid->bssid_for_connect_len)
6767                 supplicant_dbus_method_call(data->interface->path,
6768                                 SUPPLICANT_INTERFACE ".Interface", "SelectNetworkFreq",
6769                                 interface_select_network_params,
6770                                 interface_select_network_result, data,
6771                                 interface);
6772         else
6773                 supplicant_dbus_method_call(data->interface->path,
6774                                 SUPPLICANT_INTERFACE ".Interface", "SelectNetwork",
6775                                 interface_select_network_params,
6776                                 interface_select_network_result, data,
6777                                 interface);
6778 #else
6779         supplicant_dbus_method_call(data->interface->path,
6780                         SUPPLICANT_INTERFACE ".Interface", "SelectNetwork",
6781                         interface_select_network_params,
6782                         interface_select_network_result, data,
6783                         interface);
6784 #endif
6785
6786         return;
6787
6788 error:
6789         SUPPLICANT_DBG("AddNetwork error %s", error);
6790
6791         if (interface_exists(data->interface, data->interface->path)) {
6792                 err = parse_supplicant_error(iter);
6793                 if (data->callback)
6794                         data->callback(err, data->interface, data->user_data);
6795
6796                 g_free(interface->network_path);
6797                 interface->network_path = NULL;
6798         }
6799
6800         g_free(data->path);
6801 #if defined TIZEN_EXT
6802         g_free(data->ssid->ssid);
6803         g_free((char *)data->ssid->passphrase);
6804         g_free((char *)data->ssid->connector);
6805         g_free((char *)data->ssid->c_sign_key);
6806         g_free((char *)data->ssid->net_access_key);
6807 #endif
6808         g_free(data->ssid);
6809         g_free(data);
6810 }
6811
6812 static void add_network_security_none(DBusMessageIter *dict)
6813 {
6814         const char *auth_alg = "OPEN";
6815
6816         supplicant_dbus_dict_append_basic(dict, "auth_alg",
6817                                         DBUS_TYPE_STRING, &auth_alg);
6818 }
6819
6820 static void add_network_security_wep(DBusMessageIter *dict,
6821                                         GSupplicantSSID *ssid)
6822 {
6823         const char *auth_alg = "OPEN SHARED";
6824         dbus_uint32_t key_index = 0;
6825
6826         supplicant_dbus_dict_append_basic(dict, "auth_alg",
6827                                         DBUS_TYPE_STRING, &auth_alg);
6828
6829         if (ssid->passphrase) {
6830                 int size = strlen(ssid->passphrase);
6831                 if (size == 10 || size == 26) {
6832                         unsigned char *key = g_try_malloc(13);
6833                         char tmp[3];
6834                         int i;
6835
6836                         memset(tmp, 0, sizeof(tmp));
6837                         if (!key)
6838                                 size = 0;
6839
6840                         for (i = 0; i < size / 2; i++) {
6841                                 memcpy(tmp, ssid->passphrase + (i * 2), 2);
6842                                 key[i] = (unsigned char) strtol(tmp, NULL, 16);
6843                         }
6844
6845                         supplicant_dbus_dict_append_fixed_array(dict,
6846                                                         "wep_key0",
6847                                                         DBUS_TYPE_BYTE,
6848                                                         &key, size / 2);
6849                         g_free(key);
6850                 } else if (size == 5 || size == 13) {
6851                         unsigned char *key = g_try_malloc(13);
6852                         int i;
6853
6854                         if (!key)
6855                                 size = 0;
6856
6857                         for (i = 0; i < size; i++)
6858                                 key[i] = (unsigned char) ssid->passphrase[i];
6859
6860                         supplicant_dbus_dict_append_fixed_array(dict,
6861                                                                 "wep_key0",
6862                                                                 DBUS_TYPE_BYTE,
6863                                                                 &key, size);
6864                         g_free(key);
6865                 } else
6866                         supplicant_dbus_dict_append_basic(dict,
6867                                                         "wep_key0",
6868                                                         DBUS_TYPE_STRING,
6869                                                         &ssid->passphrase);
6870
6871                 supplicant_dbus_dict_append_basic(dict, "wep_tx_keyidx",
6872                                         DBUS_TYPE_UINT32, &key_index);
6873         }
6874 }
6875
6876 static dbus_bool_t is_psk_raw_key(const char *psk)
6877 {
6878         int i;
6879
6880         /* A raw key is always 64 bytes length... */
6881         if (strlen(psk) != 64)
6882                 return FALSE;
6883
6884         /* ... and its content is in hex representation */
6885         for (i = 0; i < 64; i++)
6886                 if (!isxdigit((unsigned char) psk[i]))
6887                         return FALSE;
6888
6889         return TRUE;
6890 }
6891
6892 static unsigned char hexchar2bin(char c)
6893 {
6894         if ((c >= '0') && (c <= '9'))
6895                 return c - '0';
6896         else if ((c >= 'A') && (c <= 'F'))
6897                 return c - 'A' + 10;
6898         else if ((c >= 'a') && (c <= 'f'))
6899                 return c - 'a' + 10;
6900         else
6901                 return c;
6902 }
6903
6904 static void hexstring2bin(const char *string, unsigned char *data,
6905                                 size_t data_len)
6906 {
6907         size_t i;
6908
6909         for (i = 0; i < data_len; i++)
6910                 data[i] = (hexchar2bin(string[i * 2 + 0]) << 4 |
6911                            hexchar2bin(string[i * 2 + 1]) << 0);
6912 }
6913
6914 static void add_network_security_psk(DBusMessageIter *dict,
6915                                         GSupplicantSSID *ssid)
6916 {
6917         if (ssid->passphrase && strlen(ssid->passphrase) > 0) {
6918                 const char *key = "psk";
6919
6920                 if (is_psk_raw_key(ssid->passphrase)) {
6921                         unsigned char data[32];
6922                         unsigned char *datap = data;
6923
6924                         /* The above pointer alias is required by D-Bus because
6925                          * with D-Bus and GCC, non-heap-allocated arrays cannot
6926                          * be passed directly by their base pointer. */
6927
6928                         hexstring2bin(ssid->passphrase, datap, sizeof(data));
6929
6930                         supplicant_dbus_dict_append_fixed_array(dict,
6931                                                         key, DBUS_TYPE_BYTE,
6932                                                         &datap, sizeof(data));
6933                 } else
6934                         supplicant_dbus_dict_append_basic(dict,
6935                                                         key, DBUS_TYPE_STRING,
6936                                                         &ssid->passphrase);
6937         }
6938 }
6939
6940 static void add_network_security_tls(DBusMessageIter *dict,
6941                                         GSupplicantSSID *ssid)
6942 {
6943         /*
6944          * For TLS, we at least need:
6945          *              The client certificate
6946          *              The client private key file
6947          *              The client private key file password
6948          *
6949          * The Authority certificate is optional.
6950          */
6951         if (!ssid->client_cert_path)
6952                 return;
6953
6954         if (!ssid->private_key_path)
6955                 return;
6956
6957         if (!ssid->private_key_passphrase)
6958                 return;
6959
6960         if (ssid->ca_cert_path)
6961                 supplicant_dbus_dict_append_basic(dict, "ca_cert",
6962                                         DBUS_TYPE_STRING, &ssid->ca_cert_path);
6963
6964         supplicant_dbus_dict_append_basic(dict, "private_key",
6965                                                 DBUS_TYPE_STRING,
6966                                                 &ssid->private_key_path);
6967         supplicant_dbus_dict_append_basic(dict, "private_key_passwd",
6968                                                 DBUS_TYPE_STRING,
6969                                                 &ssid->private_key_passphrase);
6970         supplicant_dbus_dict_append_basic(dict, "client_cert",
6971                                                 DBUS_TYPE_STRING,
6972                                                 &ssid->client_cert_path);
6973 }
6974
6975 static void add_network_security_peap(DBusMessageIter *dict,
6976                                         GSupplicantSSID *ssid)
6977 {
6978         char *phase2_auth;
6979
6980         /*
6981          * For PEAP/TTLS, we at least need
6982          *              The authority certificate
6983          *              The 2nd phase authentication method
6984          *              The 2nd phase passphrase
6985          *
6986          * The Client certificate is optional although strongly recommended
6987          * When setting it, we need in addition
6988          *              The Client private key file
6989          *              The Client private key file password
6990          */
6991         if (!ssid->passphrase)
6992                 return;
6993
6994         if (!ssid->phase2_auth)
6995                 return;
6996
6997         if (ssid->client_cert_path) {
6998                 if (!ssid->private_key_path)
6999                         return;
7000
7001 #if !defined TIZEN_EXT
7002                 if (!ssid->private_key_passphrase)
7003                         return;
7004 #endif
7005
7006                 supplicant_dbus_dict_append_basic(dict, "client_cert",
7007                                                 DBUS_TYPE_STRING,
7008                                                 &ssid->client_cert_path);
7009
7010                 supplicant_dbus_dict_append_basic(dict, "private_key",
7011                                                 DBUS_TYPE_STRING,
7012                                                 &ssid->private_key_path);
7013
7014 #if !defined TIZEN_EXT
7015                 supplicant_dbus_dict_append_basic(dict, "private_key_passwd",
7016                                                 DBUS_TYPE_STRING,
7017                                                 &ssid->private_key_passphrase);
7018 #endif
7019
7020         }
7021
7022         if(g_strcmp0(ssid->phase2_auth, "GTC") == 0 && g_strcmp0(ssid->eap, "ttls") == 0)
7023                 phase2_auth = g_strdup_printf("autheap=%s", ssid->phase2_auth);
7024         else if (g_str_has_prefix(ssid->phase2_auth, "EAP-")) {
7025                 phase2_auth = g_strdup_printf("autheap=%s",
7026                                         ssid->phase2_auth + strlen("EAP-"));
7027         } else
7028                 phase2_auth = g_strdup_printf("auth=%s", ssid->phase2_auth);
7029
7030         supplicant_dbus_dict_append_basic(dict, "password",
7031                                                 DBUS_TYPE_STRING,
7032                                                 &ssid->passphrase);
7033
7034         if (ssid->ca_cert_path)
7035                 supplicant_dbus_dict_append_basic(dict, "ca_cert",
7036                                                 DBUS_TYPE_STRING,
7037                                                 &ssid->ca_cert_path);
7038
7039         supplicant_dbus_dict_append_basic(dict, "phase2",
7040                                                 DBUS_TYPE_STRING,
7041                                                 &phase2_auth);
7042
7043         g_free(phase2_auth);
7044 }
7045
7046 #if defined TIZEN_EXT
7047 static void add_network_security_aka_sim(DBusMessageIter *dict,
7048                                         GSupplicantSSID *ssid)
7049 {
7050         if (!ssid->passphrase)
7051                 return;
7052
7053         supplicant_dbus_dict_append_basic(dict, "password",
7054                         DBUS_TYPE_STRING,
7055                         &ssid->passphrase);
7056 }
7057
7058 static void add_network_security_fast(DBusMessageIter *dict,
7059                 GSupplicantSSID *ssid)
7060 {
7061         /*
7062          * For FAST, we at least need:
7063          *              id / password
7064          *              phase1 (provisiong information)
7065          *              pac_file
7066          */
7067
7068         /* Allow provisioing both authenticated and unauthenticated */
7069         const char *phase1 = "fast_provisioning=2";
7070         supplicant_dbus_dict_append_basic(dict, "phase1",
7071                         DBUS_TYPE_STRING,
7072                         &phase1);
7073
7074         SUPPLICANT_DBG("pac_file [%s]", ssid->pac_file);
7075         if(ssid->pac_file)
7076                 supplicant_dbus_dict_append_basic(dict, "pac_file",
7077                                 DBUS_TYPE_STRING,
7078                                 &ssid->pac_file);
7079
7080         supplicant_dbus_dict_append_basic(dict, "password",
7081                         DBUS_TYPE_STRING,
7082                         &ssid->passphrase);
7083 }
7084 #endif
7085
7086 static void add_network_security_eap(DBusMessageIter *dict,
7087                                         GSupplicantSSID *ssid)
7088 {
7089         char *eap_value;
7090
7091 #if defined TIZEN_EXT
7092         if (!ssid->eap)
7093 #else
7094         if (!ssid->eap || !ssid->identity)
7095 #endif
7096                 return;
7097
7098         if (g_strcmp0(ssid->eap, "tls") == 0) {
7099                 add_network_security_tls(dict, ssid);
7100         } else if (g_strcmp0(ssid->eap, "peap") == 0 ||
7101                                 g_strcmp0(ssid->eap, "ttls") == 0) {
7102 #if defined TIZEN_EXT
7103                 if (!ssid->identity)
7104                         return;
7105 #endif
7106                 add_network_security_peap(dict, ssid);
7107
7108 #if defined TIZEN_EXT
7109         } else if (g_strcmp0(ssid->eap, "sim") == 0 ||
7110                         g_strcmp0(ssid->eap, "aka") == 0 ||
7111                         g_strcmp0(ssid->eap, "aka'") == 0) {
7112                 add_network_security_aka_sim(dict, ssid);
7113         } else if (g_strcmp0(ssid->eap, "pwd") == 0) {
7114                 if(!ssid->passphrase)
7115                         return;
7116                 supplicant_dbus_dict_append_basic(dict, "password",
7117                                 DBUS_TYPE_STRING,
7118                                 &ssid->passphrase);
7119         } else if (g_strcmp0(ssid->eap, "fast") == 0){
7120                 if (!ssid->identity || !ssid->passphrase)
7121                         return;
7122
7123                 add_network_security_fast(dict, ssid);
7124 #endif
7125         } else
7126                 return;
7127
7128         eap_value = g_ascii_strup(ssid->eap, -1);
7129
7130         supplicant_dbus_dict_append_basic(dict, "eap",
7131                                                 DBUS_TYPE_STRING,
7132                                                 &eap_value);
7133 #if defined TIZEN_EXT
7134         if (ssid->identity != NULL)
7135                 supplicant_dbus_dict_append_basic(dict, "identity",
7136                                                         DBUS_TYPE_STRING,
7137                                                         &ssid->identity);
7138 #else
7139         supplicant_dbus_dict_append_basic(dict, "identity",
7140                                                 DBUS_TYPE_STRING,
7141                                                 &ssid->identity);
7142 #endif
7143         if(ssid->anonymous_identity)
7144                 supplicant_dbus_dict_append_basic(dict, "anonymous_identity",
7145                                                      DBUS_TYPE_STRING,
7146                                                      &ssid->anonymous_identity);
7147
7148         if(ssid->subject_match)
7149                 supplicant_dbus_dict_append_basic(dict, "subject_match",
7150                                                      DBUS_TYPE_STRING,
7151                                                      &ssid->subject_match);
7152
7153         if(ssid->altsubject_match)
7154                 supplicant_dbus_dict_append_basic(dict, "altsubject_match",
7155                                                      DBUS_TYPE_STRING,
7156                                                      &ssid->altsubject_match);
7157
7158         if(ssid->domain_suffix_match)
7159                 supplicant_dbus_dict_append_basic(dict, "domain_suffix_match",
7160                                                      DBUS_TYPE_STRING,
7161                                                      &ssid->domain_suffix_match);
7162
7163         if(ssid->domain_match)
7164                 supplicant_dbus_dict_append_basic(dict, "domain_match",
7165                                                      DBUS_TYPE_STRING,
7166                                                      &ssid->domain_match);
7167
7168         g_free(eap_value);
7169 }
7170
7171 static void add_network_security_ciphers(DBusMessageIter *dict,
7172                                                 GSupplicantSSID *ssid)
7173 {
7174         unsigned int p_cipher, g_cipher, i;
7175         char *pairwise, *group;
7176         char *pair_ciphers[4];
7177         char *group_ciphers[5];
7178
7179         p_cipher = ssid->pairwise_cipher;
7180         g_cipher = ssid->group_cipher;
7181
7182         if (p_cipher == 0 && g_cipher == 0)
7183                 return;
7184
7185         i = 0;
7186
7187         if (p_cipher & G_SUPPLICANT_PAIRWISE_CCMP)
7188                 pair_ciphers[i++] = "CCMP";
7189
7190         if (p_cipher & G_SUPPLICANT_PAIRWISE_TKIP)
7191                 pair_ciphers[i++] = "TKIP";
7192
7193         if (p_cipher & G_SUPPLICANT_PAIRWISE_NONE)
7194                 pair_ciphers[i++] = "NONE";
7195
7196         pair_ciphers[i] = NULL;
7197
7198         i = 0;
7199
7200         if (g_cipher & G_SUPPLICANT_GROUP_CCMP)
7201                 group_ciphers[i++] = "CCMP";
7202
7203         if (g_cipher & G_SUPPLICANT_GROUP_TKIP)
7204                 group_ciphers[i++] = "TKIP";
7205
7206         if (g_cipher & G_SUPPLICANT_GROUP_WEP104)
7207                 group_ciphers[i++] = "WEP104";
7208
7209         if (g_cipher & G_SUPPLICANT_GROUP_WEP40)
7210                 group_ciphers[i++] = "WEP40";
7211
7212         group_ciphers[i] = NULL;
7213
7214         pairwise = g_strjoinv(" ", pair_ciphers);
7215         group = g_strjoinv(" ", group_ciphers);
7216
7217         SUPPLICANT_DBG("cipher %s %s", pairwise, group);
7218
7219         supplicant_dbus_dict_append_basic(dict, "pairwise",
7220                                                 DBUS_TYPE_STRING,
7221                                                 &pairwise);
7222         supplicant_dbus_dict_append_basic(dict, "group",
7223                                                 DBUS_TYPE_STRING,
7224                                                 &group);
7225
7226         g_free(pairwise);
7227         g_free(group);
7228 }
7229
7230 static void add_network_security_proto(DBusMessageIter *dict,
7231                                                 GSupplicantSSID *ssid)
7232 {
7233         unsigned int protocol, i;
7234         char *proto;
7235         char *protos[3];
7236
7237         protocol = ssid->protocol;
7238
7239         if (protocol == 0)
7240                 return;
7241
7242         i = 0;
7243
7244         if (protocol & G_SUPPLICANT_PROTO_RSN)
7245                 protos[i++] = "RSN";
7246
7247         if (protocol & G_SUPPLICANT_PROTO_WPA)
7248                 protos[i++] = "WPA";
7249
7250         protos[i] = NULL;
7251
7252         proto = g_strjoinv(" ", protos);
7253
7254         SUPPLICANT_DBG("proto %s", proto);
7255
7256         supplicant_dbus_dict_append_basic(dict, "proto",
7257                                                 DBUS_TYPE_STRING,
7258                                                 &proto);
7259
7260         g_free(proto);
7261 }
7262
7263 #if defined TIZEN_EXT
7264 static void add_network_ieee80211w(DBusMessageIter *dict, GSupplicantSSID *ssid)
7265 {
7266         if (ssid->security != G_SUPPLICANT_SECURITY_SAE
7267                         && ssid->security != G_SUPPLICANT_SECURITY_OWE
7268                         && ssid->security != G_SUPPLICANT_SECURITY_DPP)
7269                 return;
7270
7271         supplicant_dbus_dict_append_basic(dict, "ieee80211w", DBUS_TYPE_UINT32,
7272                                           &ssid->ieee80211w);
7273 }
7274
7275 static void add_network_security_connector(DBusMessageIter *dict, GSupplicantSSID *ssid)
7276 {
7277         if (ssid->connector && strlen(ssid->connector) > 0) {
7278                 const char *key = "dpp_connector";
7279
7280                 supplicant_dbus_dict_append_basic(dict,
7281                                 key, DBUS_TYPE_STRING,
7282                                 &ssid->connector);
7283         }
7284 }
7285
7286 static size_t convert_hexstr_to_bin(const char *hex_str, unsigned char **bin)
7287 {
7288         unsigned char *bin_res = NULL;
7289         unsigned int i, j, hex;
7290         size_t hex_str_len;
7291
7292         if (!hex_str || strlen(hex_str) == 0)
7293                 return 0;
7294
7295         hex_str_len = strlen(hex_str);
7296         bin_res = g_try_malloc0(hex_str_len / 2);
7297         if (!bin_res)
7298                 return 0;
7299
7300         j = 0;
7301         for (i = 0; i < hex_str_len; i+=2) {
7302                 sscanf(hex_str + i, "%02x", &hex);
7303                 bin_res[j++] = hex;
7304         }
7305
7306         *bin = bin_res;
7307         return hex_str_len / 2;
7308 }
7309
7310 static void add_network_security_c_sign_key(DBusMessageIter *dict, GSupplicantSSID *ssid)
7311 {
7312         if (ssid->c_sign_key && strlen(ssid->c_sign_key) > 0) {
7313                 const char *key = "dpp_csign";
7314                 unsigned char *bin_csign = NULL;
7315                 size_t bin_csign_len = convert_hexstr_to_bin(ssid->c_sign_key, &bin_csign);
7316                 if  (bin_csign_len != 0)
7317                         supplicant_dbus_dict_append_fixed_array(dict,
7318                                         key, DBUS_TYPE_BYTE,
7319                                         &bin_csign, bin_csign_len);
7320                 g_free(bin_csign);
7321         }
7322 }
7323
7324 static void add_network_security_net_access_key(DBusMessageIter *dict, GSupplicantSSID *ssid)
7325 {
7326         if (ssid->net_access_key && strlen(ssid->net_access_key) > 0) {
7327                 const char *key = "dpp_netaccesskey";
7328                 unsigned char *bin_netaccesskey = NULL;
7329                 size_t bin_netaccesskey_len = convert_hexstr_to_bin(ssid->net_access_key, &bin_netaccesskey);
7330                 if  (bin_netaccesskey_len != 0)
7331                         supplicant_dbus_dict_append_fixed_array(dict,
7332                                         key, DBUS_TYPE_BYTE,
7333                                         &bin_netaccesskey, bin_netaccesskey_len);
7334                 g_free(bin_netaccesskey);
7335         }
7336 }
7337
7338 #endif
7339
7340 static void add_network_security(DBusMessageIter *dict, GSupplicantSSID *ssid)
7341 {
7342         char *key_mgmt;
7343
7344         switch (ssid->security) {
7345         case G_SUPPLICANT_SECURITY_NONE:
7346                 key_mgmt = "NONE";
7347                 add_network_security_none(dict);
7348                 add_network_security_ciphers(dict, ssid);
7349                 break;
7350         case G_SUPPLICANT_SECURITY_UNKNOWN:
7351         case G_SUPPLICANT_SECURITY_WEP:
7352                 key_mgmt = "NONE";
7353                 add_network_security_wep(dict, ssid);
7354                 add_network_security_ciphers(dict, ssid);
7355                 break;
7356         case G_SUPPLICANT_SECURITY_PSK:
7357 #if defined TIZEN_EXT
7358                 if (ssid->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_PSK)
7359                         key_mgmt = "FT-PSK WPA-PSK";
7360                 else
7361                         key_mgmt = "WPA-PSK";
7362 #else
7363                 key_mgmt = "WPA-PSK";
7364 #endif
7365                 add_network_security_psk(dict, ssid);
7366                 add_network_security_ciphers(dict, ssid);
7367                 add_network_security_proto(dict, ssid);
7368                 break;
7369         case G_SUPPLICANT_SECURITY_IEEE8021X:
7370                 key_mgmt = "WPA-EAP";
7371                 add_network_security_eap(dict, ssid);
7372                 add_network_security_ciphers(dict, ssid);
7373                 add_network_security_proto(dict, ssid);
7374                 break;
7375 #if defined TIZEN_EXT
7376         case G_SUPPLICANT_SECURITY_FT_PSK:
7377                 key_mgmt = "FT-PSK";
7378                 add_network_security_psk(dict, ssid);
7379                 add_network_security_ciphers(dict, ssid);
7380                 add_network_security_proto(dict, ssid);
7381                 break;
7382         case G_SUPPLICANT_SECURITY_FT_IEEE8021X:
7383                 key_mgmt = "FT-EAP";
7384                 add_network_security_eap(dict, ssid);
7385                 add_network_security_ciphers(dict, ssid);
7386                 add_network_security_proto(dict, ssid);
7387                 break;
7388         case G_SUPPLICANT_SECURITY_SAE:
7389                 if (ssid->keymgmt & G_SUPPLICANT_KEYMGMT_FT_SAE) {
7390                         if (ssid->keymgmt & G_SUPPLICANT_KEYMGMT_SAE)
7391                                 key_mgmt = "FT-SAE SAE";
7392                         else
7393                                 key_mgmt = "FT-SAE";
7394                 } else if (ssid->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_PSK)
7395                         key_mgmt = "SAE WPA-PSK";
7396                 else
7397                         key_mgmt = "SAE";
7398                 add_network_security_psk(dict, ssid);
7399                 break;
7400         case G_SUPPLICANT_SECURITY_OWE:
7401                 key_mgmt = "OWE";
7402                 add_network_security_ciphers(dict, ssid);
7403                 add_network_security_proto(dict, ssid);
7404                 break;
7405         case G_SUPPLICANT_SECURITY_DPP:
7406                 key_mgmt = "DPP";
7407                 add_network_security_connector(dict, ssid);
7408                 add_network_security_c_sign_key(dict, ssid);
7409                 add_network_security_net_access_key(dict, ssid);
7410                 break;
7411 #endif
7412         }
7413
7414         supplicant_dbus_dict_append_basic(dict, "key_mgmt",
7415                                 DBUS_TYPE_STRING, &key_mgmt);
7416 }
7417
7418 static void add_network_mode(DBusMessageIter *dict, GSupplicantSSID *ssid)
7419 {
7420         dbus_uint32_t mode;
7421
7422         switch (ssid->mode) {
7423         case G_SUPPLICANT_MODE_UNKNOWN:
7424         case G_SUPPLICANT_MODE_INFRA:
7425                 mode = 0;
7426                 break;
7427         case G_SUPPLICANT_MODE_IBSS:
7428                 mode = 1;
7429                 break;
7430         case G_SUPPLICANT_MODE_MASTER:
7431                 mode = 2;
7432                 break;
7433 #if defined TIZEN_EXT_WIFI_MESH
7434         case G_SUPPLICANT_MODE_MESH:
7435                 mode = 5;
7436                 break;
7437 #endif
7438         }
7439
7440         supplicant_dbus_dict_append_basic(dict, "mode",
7441                                 DBUS_TYPE_UINT32, &mode);
7442 }
7443
7444 static void interface_add_network_params(DBusMessageIter *iter, void *user_data)
7445 {
7446         DBusMessageIter dict;
7447         struct interface_connect_data *data = user_data;
7448         GSupplicantSSID *ssid = data->ssid;
7449 #if defined TIZEN_EXT
7450         GSupplicantInterface *interface = data->interface;
7451 #endif
7452
7453         supplicant_dbus_dict_open(iter, &dict);
7454
7455         if (ssid->scan_ssid)
7456                 supplicant_dbus_dict_append_basic(&dict, "scan_ssid",
7457                                          DBUS_TYPE_UINT32, &ssid->scan_ssid);
7458
7459         if (ssid->freq)
7460                 supplicant_dbus_dict_append_basic(&dict, "frequency",
7461                                          DBUS_TYPE_UINT32, &ssid->freq);
7462
7463         if (ssid->bgscan)
7464                 supplicant_dbus_dict_append_basic(&dict, "bgscan",
7465                                         DBUS_TYPE_STRING, &ssid->bgscan);
7466
7467         add_network_mode(&dict, ssid);
7468
7469         add_network_security(&dict, ssid);
7470
7471 #if defined TIZEN_EXT
7472         add_network_ieee80211w(&dict, ssid);
7473 #endif
7474
7475         supplicant_dbus_dict_append_fixed_array(&dict, "ssid",
7476                                         DBUS_TYPE_BYTE, &ssid->ssid,
7477                                                 ssid->ssid_len);
7478
7479 #if defined TIZEN_EXT
7480         bool owe_transition_mode = FALSE;
7481         if ((ssid->security == G_SUPPLICANT_SECURITY_OWE) && !(ssid->keymgmt & G_SUPPLICANT_KEYMGMT_OWE))
7482                 owe_transition_mode = TRUE;
7483
7484         if (ssid->bssid && !owe_transition_mode) {
7485                 char *bssid = NULL;
7486                 bssid = g_try_malloc0(18);
7487                 if (bssid == NULL) {
7488                         SUPPLICANT_DBG("memory allocation error");
7489                         supplicant_dbus_dict_close(iter, &dict);
7490                         return;
7491                 }
7492
7493                 if (ssid->bssid_for_connect_len) {
7494                         snprintf(bssid, 18, MACSTR, MAC2STR(ssid->bssid_for_connect));
7495                         memcpy(interface->add_network_bssid, ssid->bssid_for_connect, WIFI_BSSID_LEN_MAX);
7496                 } else {
7497                         snprintf(bssid, 18, MACSTR, MAC2STR(ssid->bssid));
7498                         memcpy(interface->add_network_bssid, ssid->bssid, WIFI_BSSID_LEN_MAX);
7499                 }
7500
7501                 SUPPLICANT_DBG("bssid [" MACSTR "]", MAC2STR(interface->add_network_bssid));
7502
7503                 supplicant_dbus_dict_append_basic(&dict, "bssid",
7504                                         DBUS_TYPE_STRING, &bssid);
7505                 g_free(bssid);
7506         }
7507 #endif
7508
7509         supplicant_dbus_dict_close(iter, &dict);
7510 }
7511
7512 static void interface_wps_start_result(const char *error,
7513                                 DBusMessageIter *iter, void *user_data)
7514 {
7515         struct interface_connect_data *data = user_data;
7516         int err;
7517
7518         SUPPLICANT_DBG("");
7519
7520         err = 0;
7521         if (error) {
7522                 SUPPLICANT_DBG("error: %s", error);
7523                 err = parse_supplicant_error(iter);
7524         }
7525
7526         if(data->callback)
7527                 data->callback(err, data->interface, data->user_data);
7528
7529         g_free(data->path);
7530         g_free(data->ssid);
7531         dbus_free(data);
7532 }
7533
7534 static void interface_add_wps_params(DBusMessageIter *iter, void *user_data)
7535 {
7536         struct interface_connect_data *data = user_data;
7537         GSupplicantSSID *ssid = data->ssid;
7538         const char *role = "enrollee", *type;
7539         DBusMessageIter dict;
7540
7541         SUPPLICANT_DBG("");
7542
7543         supplicant_dbus_dict_open(iter, &dict);
7544
7545         supplicant_dbus_dict_append_basic(&dict, "Role",
7546                                                 DBUS_TYPE_STRING, &role);
7547
7548         type = "pbc";
7549         if (ssid->pin_wps) {
7550                 type = "pin";
7551                 supplicant_dbus_dict_append_basic(&dict, "Pin",
7552                                         DBUS_TYPE_STRING, &ssid->pin_wps);
7553         }
7554
7555         supplicant_dbus_dict_append_basic(&dict, "Type",
7556                                         DBUS_TYPE_STRING, &type);
7557
7558 #if defined TIZEN_EXT
7559         if (ssid->bssid)
7560                 supplicant_dbus_dict_append_fixed_array(&dict, "Bssid",
7561                                                 DBUS_TYPE_BYTE, &ssid->bssid, 6);
7562 #endif
7563
7564         supplicant_dbus_dict_close(iter, &dict);
7565 }
7566
7567 static void wps_start(const char *error, DBusMessageIter *iter, void *user_data)
7568 {
7569         struct interface_connect_data *data = user_data;
7570
7571         SUPPLICANT_DBG("");
7572
7573         if (error) {
7574                 SUPPLICANT_DBG("error: %s", error);
7575                 g_free(data->path);
7576                 g_free(data->ssid);
7577                 dbus_free(data);
7578                 return;
7579         }
7580
7581 #if defined TIZEN_EXT
7582         GSupplicantSSID *ssid = data->ssid;
7583         if (ssid->pin_wps != NULL) {
7584                 if (!g_utf8_validate(ssid->pin_wps, 8, NULL)) {
7585                         SUPPLICANT_DBG("Invalid characters in WPS_PIN");
7586                         g_free(data->ssid);
7587                         dbus_free(data);
7588                         return;
7589                 }
7590         }
7591 #endif
7592         supplicant_dbus_method_call(data->interface->path,
7593                         SUPPLICANT_INTERFACE ".Interface.WPS", "Start",
7594                         interface_add_wps_params,
7595                         interface_wps_start_result, data, NULL);
7596 }
7597
7598 static void wps_process_credentials(DBusMessageIter *iter, void *user_data)
7599 {
7600         dbus_bool_t credentials = TRUE;
7601
7602         SUPPLICANT_DBG("");
7603
7604         dbus_message_iter_append_basic(iter, DBUS_TYPE_BOOLEAN, &credentials);
7605 }
7606
7607
7608 #if defined TIZEN_EXT
7609 #define NETCONFIG_SERVICE "net.netconfig"
7610 #define NETCONFIG_WIFI_PATH "/net/netconfig/wifi"
7611 #define NETCONFIG_WIFI_INTERFACE NETCONFIG_SERVICE ".wifi"
7612
7613 struct dec_method_call_data {
7614         struct interface_connect_data *data;
7615         DBusPendingCall *pending_call;
7616 };
7617
7618 static struct dec_method_call_data decrypt_request_data;
7619
7620 static void crypt_method_call_cancel(void)
7621 {
7622         if (decrypt_request_data.pending_call) {
7623                 dbus_pending_call_cancel(decrypt_request_data.pending_call);
7624                 dbus_pending_call_unref(decrypt_request_data.pending_call);
7625                 decrypt_request_data.pending_call = NULL;
7626         }
7627
7628         g_free(decrypt_request_data.data->path);
7629         g_free(decrypt_request_data.data->ssid);
7630         dbus_free(decrypt_request_data.data);
7631         decrypt_request_data.data = NULL;
7632 }
7633
7634 static void decryption_request_reply(DBusPendingCall *call,
7635                                                 void *user_data)
7636 {
7637         DBusMessage *reply;
7638         DBusError error;
7639         DBusMessageIter args;
7640         char *out_data;
7641         int ret;
7642         struct interface_connect_data *data = user_data;
7643
7644         SUPPLICANT_DBG("");
7645
7646         reply = dbus_pending_call_steal_reply(call);
7647
7648         dbus_error_init(&error);
7649         if (dbus_set_error_from_message(&error, reply)) {
7650                 SUPPLICANT_DBG("decryption_request_reply() %s %s", error.name, error.message);
7651                 dbus_error_free(&error);
7652                 ret = -EINVAL;
7653                 goto done;
7654         }
7655
7656         if (!g_str_has_prefix(data->interface->path, "/")) {
7657                 SUPPLICANT_DBG("Invalid path %s", data->interface->path);
7658                 ret = -EINVAL;
7659                 goto done;
7660         }
7661
7662         if (dbus_message_iter_init(reply, &args) == FALSE) {
7663                 SUPPLICANT_DBG("dbus_message_iter_init() failed");
7664                 ret = -EINVAL;
7665                 goto done;
7666         }
7667
7668         dbus_message_iter_get_basic(&args, &out_data);
7669         data->ssid->passphrase = g_strdup((const gchar *)out_data);
7670
7671         ret = supplicant_dbus_method_call(data->interface->path,
7672                 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
7673                 interface_add_network_params,
7674                 interface_add_network_result, data,
7675                 data->interface);
7676
7677 done:
7678         if (ret < 0) {
7679                 SUPPLICANT_DBG("AddNetwork failed %d", ret);
7680                 callback_assoc_failed(decrypt_request_data.data->user_data);
7681                 g_free(data->path);
7682                 g_free(data->ssid->ssid);
7683                 g_free((char *)data->ssid->passphrase);
7684                 g_free((char *)data->ssid->connector);
7685                 g_free((char *)data->ssid->c_sign_key);
7686                 g_free((char *)data->ssid->net_access_key);
7687                 g_free(data->ssid);
7688                 dbus_free(data);
7689         }
7690
7691         dbus_message_unref(reply);
7692         dbus_pending_call_unref(call);
7693
7694         decrypt_request_data.pending_call = NULL;
7695         decrypt_request_data.data = NULL;
7696 }
7697
7698 static int send_decryption_request(const char *passphrase,
7699                         struct interface_connect_data *data)
7700 {
7701         DBusMessage *msg = NULL;
7702         DBusPendingCall *call;
7703
7704         SUPPLICANT_DBG("Decryption request");
7705
7706         if (!passphrase) {
7707                 SUPPLICANT_DBG("Invalid parameter");
7708                 return -EINVAL;
7709         }
7710
7711         if (!connection)
7712                 return -EINVAL;
7713
7714         msg = dbus_message_new_method_call(NETCONFIG_SERVICE, NETCONFIG_WIFI_PATH,
7715                         NETCONFIG_WIFI_INTERFACE, "DecryptPassphrase");
7716         if (!msg)
7717                 return -EINVAL;
7718
7719 #if defined TIZEN_EXT
7720         if (!dbus_message_append_args(msg, DBUS_TYPE_STRING, &passphrase,
7721                                                         DBUS_TYPE_INVALID)) {
7722                 SUPPLICANT_DBG("Could not fulfill decryption request");
7723                 return -ENOMEM;
7724         }
7725 #else
7726         dbus_message_append_args(msg, DBUS_TYPE_STRING, &passphrase,
7727                                                         DBUS_TYPE_INVALID);
7728 #endif
7729
7730         if (!dbus_connection_send_with_reply(connection, msg,
7731                                 &call, DBUS_TIMEOUT_USE_DEFAULT)) {
7732                 dbus_message_unref(msg);
7733                 return -EIO;
7734         }
7735
7736         if (!call) {
7737                 dbus_message_unref(msg);
7738                 return -EIO;
7739         }
7740
7741         decrypt_request_data.pending_call = call;
7742         decrypt_request_data.data = data;
7743
7744         dbus_pending_call_set_notify(call, decryption_request_reply, data, NULL);
7745         dbus_message_unref(msg);
7746
7747         SUPPLICANT_DBG("Decryption request succeeded");
7748
7749         return 0;
7750 }
7751
7752 static void decrypt_conf_obj_reply(DBusPendingCall *call,
7753                                                 void *user_data)
7754 {
7755         DBusMessage *reply;
7756         DBusError error;
7757         DBusMessageIter iter, dict;
7758         char *out_data;
7759         int ret;
7760         struct interface_connect_data *data = user_data;
7761
7762         reply = dbus_pending_call_steal_reply(call);
7763
7764         dbus_error_init(&error);
7765         if (dbus_set_error_from_message(&error, reply)) {
7766                 SUPPLICANT_DBG("decryption_conf_obj_reply() %s %s", error.name, error.message);
7767                 dbus_error_free(&error);
7768                 ret = -EINVAL;
7769                 goto done;
7770         }
7771
7772         if (dbus_message_iter_init(reply, &iter) == FALSE) {
7773                 SUPPLICANT_DBG("dbus_message_iter_init() failed");
7774                 ret = -EINVAL;
7775                 goto done;
7776         }
7777
7778         dbus_message_iter_recurse(&iter, &dict);
7779
7780         while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_DICT_ENTRY) {
7781                 DBusMessageIter entry, value;
7782                 const char *key;
7783
7784                 dbus_message_iter_recurse(&dict, &entry);
7785                 dbus_message_iter_get_basic(&entry, &key);
7786                 dbus_message_iter_next(&entry);
7787                 dbus_message_iter_recurse(&entry, &value);
7788                 if (dbus_message_iter_get_arg_type(&value) == DBUS_TYPE_STRING) {
7789                         if (g_strcmp0(key, "connector") == 0) {
7790                                 dbus_message_iter_get_basic(&value, &out_data);
7791                                 data->ssid->connector = g_strdup((const gchar *)out_data);
7792                                 SUPPLICANT_DBG("connector %s", data->ssid->connector);
7793                         } else if (g_strcmp0(key, "c_sign_key") == 0) {
7794                                 dbus_message_iter_get_basic(&value, &out_data);
7795                                 data->ssid->c_sign_key = g_strdup((const gchar *)out_data);
7796                                 SUPPLICANT_DBG("c_sign_key %s", data->ssid->c_sign_key);
7797                         } else if (g_strcmp0(key, "net_access_key") == 0) {
7798                                 dbus_message_iter_get_basic(&value, &out_data);
7799                                 data->ssid->net_access_key = g_strdup((const gchar *)out_data);
7800                                 SUPPLICANT_DBG("net_access_key %s", data->ssid->net_access_key);
7801                         }
7802                 }
7803                 dbus_message_iter_next(&dict);
7804         }
7805
7806         ret = supplicant_dbus_method_call(data->interface->path,
7807                 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
7808                 interface_add_network_params,
7809                 interface_add_network_result, data,
7810                 data->interface);
7811
7812 done:
7813         if (ret < 0) {
7814                 SUPPLICANT_DBG("AddNetwork failed %d", ret);
7815                 callback_assoc_failed(decrypt_request_data.data->user_data);
7816                 g_free(data->path);
7817                 g_free(data->ssid->ssid);
7818                 g_free((char *)data->ssid->connector);
7819                 g_free((char *)data->ssid->c_sign_key);
7820                 g_free((char *)data->ssid->net_access_key);
7821                 g_free(data->ssid);
7822                 dbus_free(data);
7823         }
7824
7825         dbus_message_unref(reply);
7826         dbus_pending_call_unref(call);
7827
7828         decrypt_request_data.pending_call = NULL;
7829         decrypt_request_data.data = NULL;
7830 }
7831
7832 static int send_decryption_conf_obj_request(GSupplicantSSID *ssid,
7833                         struct interface_connect_data *data)
7834 {
7835         DBusMessage *msg = NULL;
7836         DBusPendingCall *call;
7837
7838         SUPPLICANT_DBG("Decryption configuration object request");
7839
7840         if (!ssid) {
7841                 SUPPLICANT_DBG("Invalid parameter");
7842                 return -EINVAL;
7843         }
7844
7845         if (!connection)
7846                 return -EINVAL;
7847
7848         msg = dbus_message_new_method_call(NETCONFIG_SERVICE, NETCONFIG_WIFI_PATH,
7849                         NETCONFIG_WIFI_INTERFACE, "DecryptConfObj");
7850         if (!msg)
7851                 return -EINVAL;
7852
7853         dbus_message_append_args(msg, DBUS_TYPE_STRING, &ssid->connector,
7854                                                         DBUS_TYPE_INVALID);
7855         dbus_message_append_args(msg, DBUS_TYPE_STRING, &ssid->c_sign_key,
7856                                                         DBUS_TYPE_INVALID);
7857         dbus_message_append_args(msg, DBUS_TYPE_STRING, &ssid->net_access_key,
7858                                                         DBUS_TYPE_INVALID);
7859
7860         if (!dbus_connection_send_with_reply(connection, msg,
7861                                 &call, DBUS_TIMEOUT_USE_DEFAULT)) {
7862                 dbus_message_unref(msg);
7863                 return -EIO;
7864         }
7865
7866         if (!call) {
7867                 dbus_message_unref(msg);
7868                 return -EIO;
7869         }
7870
7871         decrypt_request_data.pending_call = call;
7872         decrypt_request_data.data = data;
7873
7874         dbus_pending_call_set_notify(call, decrypt_conf_obj_reply, data, NULL);
7875         dbus_message_unref(msg);
7876
7877         SUPPLICANT_DBG("Decrypt Conf Obj request succeeded");
7878
7879         return 0;
7880 }
7881
7882 static bool is_valid_config_object(GSupplicantSSID *ssid)
7883 {
7884         return ((ssid->connector &&
7885                         g_strcmp0(ssid->connector, "") != 0) &&
7886                         (ssid->c_sign_key &&
7887                         g_strcmp0(ssid->c_sign_key, "") != 0) &&
7888                         (ssid->net_access_key &&
7889                         g_strcmp0(ssid->net_access_key, "") != 0));
7890 }
7891 #endif
7892
7893 int g_supplicant_interface_connect(GSupplicantInterface *interface,
7894                                 GSupplicantSSID *ssid,
7895                                 GSupplicantInterfaceCallback callback,
7896                                                         void *user_data)
7897 {
7898         struct interface_connect_data *data;
7899         struct interface_data *intf_data;
7900         int ret = 0;
7901
7902         SUPPLICANT_DBG("");
7903
7904         if (!interface)
7905                 return -EINVAL;
7906
7907         if (!system_available)
7908                 return -EFAULT;
7909
7910         /* TODO: Check if we're already connected and switch */
7911
7912         data = dbus_malloc0(sizeof(*data));
7913         if (!data)
7914                 return -ENOMEM;
7915
7916         data->interface = interface;
7917         data->path = g_strdup(interface->path);
7918         data->callback = callback;
7919         data->ssid = ssid;
7920         data->user_data = user_data;
7921
7922         if (ssid->use_wps) {
7923                 g_free(interface->wps_cred.key);
7924                 memset(&interface->wps_cred, 0,
7925                                 sizeof(struct _GSupplicantWpsCredentials));
7926
7927                 ret = supplicant_dbus_property_set(interface->path,
7928                         SUPPLICANT_INTERFACE ".Interface.WPS",
7929                         "ProcessCredentials", DBUS_TYPE_BOOLEAN_AS_STRING,
7930                         wps_process_credentials, wps_start, data, interface);
7931         } else {
7932                 /* By the time there is a request for connect and the network
7933                  * path is not NULL it means that connman has not removed the
7934                  * previous network pointer. This can happen in the case AP
7935                  * deauthenticated client and connman does not remove the
7936                  * previously connected network pointer. This causes supplicant
7937                  * to reallocate the memory for struct wpa_ssid again even if it
7938                  * is the same SSID. This causes memory usage of wpa_supplicnat
7939                  * to go high. The idea here is that if the previously connected
7940                  * network is not removed at the time of next connection attempt
7941                  * check if the network path is not NULL. In case it is non-NULL
7942                  * first remove the network and then once removal is successful, add
7943                  * the network.
7944                  */
7945
7946                 if (interface->network_path != NULL) {
7947                         g_free(data->path);
7948                         dbus_free(data);
7949
7950                         /*
7951                          * If this add network is for the same network for
7952                          * which wpa_supplicant already has a profile then do
7953                          * not need to add another profile. Only if the
7954                          * profile that needs to get added is different from
7955                          * what is there in wpa_s delete the current one. A
7956                          * network is identified by its SSID, security_type
7957                          * and passphrase (private passphrase in case security
7958                          * type is 802.11x).
7959                          */
7960                         if (compare_network_parameters(interface, ssid)) {
7961                                 return -EALREADY;
7962                         }
7963
7964                         intf_data = dbus_malloc0(sizeof(*intf_data));
7965                         if (!intf_data)
7966                                 return -ENOMEM;
7967
7968                         intf_data->interface = interface;
7969                         intf_data->path = g_strdup(interface->path);
7970                         intf_data->callback = callback;
7971                         intf_data->ssid = ssid;
7972                         intf_data->user_data = user_data;
7973                         intf_data->network_remove_in_progress = TRUE;
7974                         network_remove(intf_data);
7975                 } else {
7976 #if defined TIZEN_EXT
7977                         if (ssid->passphrase &&
7978                             g_strcmp0(ssid->passphrase, "") != 0 &&
7979 #if defined TIZEN_EXT_WIFI_MESH
7980                             ssid->mode != G_SUPPLICANT_MODE_MESH &&
7981 #endif
7982                             !ssid->eap) {
7983                                 ret = send_decryption_request(ssid->passphrase, data);
7984                                 if (ret < 0)
7985                                         SUPPLICANT_DBG("Decryption request failed %d", ret);
7986                         } else if (is_valid_config_object(ssid)) {
7987                                 ret = send_decryption_conf_obj_request(ssid, data);
7988                                 if (ret < 0)
7989                                         SUPPLICANT_DBG("Decryption Conf Obj request failed %d", ret);
7990
7991                         } else
7992 #endif
7993                         ret = supplicant_dbus_method_call(interface->path,
7994                                         SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
7995                                         interface_add_network_params,
7996                                         interface_add_network_result, data,
7997                                         interface);
7998                 }
7999         }
8000
8001         if (ret < 0) {
8002                 g_free(data->path);
8003                 dbus_free(data);
8004                 return ret;
8005         }
8006
8007         return -EINPROGRESS;
8008 }
8009
8010 static void network_remove_result(const char *error,
8011                                 DBusMessageIter *iter, void *user_data)
8012 {
8013         struct interface_data *data = user_data;
8014         struct interface_connect_data *connect_data;
8015         int result = 0;
8016
8017         SUPPLICANT_DBG("");
8018
8019         if (error) {
8020                 result = -EIO;
8021                 SUPPLICANT_DBG("error: %s", error);
8022
8023                 if (g_strcmp0("org.freedesktop.DBus.Error.UnknownMethod",
8024                                                 error) == 0)
8025                         result = -ECONNABORTED;
8026         }
8027
8028         g_free(data->interface->network_path);
8029         data->interface->network_path = NULL;
8030
8031         remove_network_information(data->interface);
8032
8033         if (data->network_remove_in_progress == TRUE) {
8034                 data->network_remove_in_progress = FALSE;
8035                 connect_data = dbus_malloc0(sizeof(*connect_data));
8036                 if (!connect_data)
8037                         return;
8038
8039                 connect_data->interface = data->interface;
8040                 connect_data->path = g_strdup(data->path);
8041                 connect_data->callback = data->callback;
8042                 connect_data->ssid = data->ssid;
8043                 connect_data->user_data = data->user_data;
8044
8045 #if defined TIZEN_EXT
8046                 int ret;
8047                 if (data->ssid->passphrase && g_strcmp0(data->ssid->passphrase, "") != 0
8048                         && !data->ssid->eap) {
8049                         ret = send_decryption_request(data->ssid->passphrase, connect_data);
8050                         if (ret < 0) {
8051                                 SUPPLICANT_DBG("Decryption request failed %d", ret);
8052                                 g_free(connect_data->ssid);
8053                                 g_free(connect_data->path);
8054                                 dbus_free(connect_data);
8055                         }
8056                 } else if (is_valid_config_object(data->ssid)) {
8057                         ret = send_decryption_conf_obj_request(data->ssid, connect_data);
8058                         if (ret < 0) {
8059                                 SUPPLICANT_DBG("Decryption Conf Obj request failed %d", ret);
8060                                 g_free(connect_data->ssid);
8061                                 g_free(connect_data->path);
8062                                 dbus_free(connect_data);
8063                         }
8064                 } else
8065 #endif
8066                 supplicant_dbus_method_call(data->interface->path,
8067                         SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
8068                         interface_add_network_params,
8069                         interface_add_network_result, connect_data,
8070                         connect_data->interface);
8071         } else {
8072                 if (data->callback)
8073                         data->callback(result, data->interface, data->user_data);
8074         }
8075         g_free(data->path);
8076         dbus_free(data);
8077 }
8078
8079 static void network_remove_params(DBusMessageIter *iter, void *user_data)
8080 {
8081         struct interface_data *data = user_data;
8082         const char *path = data->interface->network_path;
8083
8084         SUPPLICANT_DBG("path %s", path);
8085
8086         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH, &path);
8087 }
8088
8089 static int network_remove(struct interface_data *data)
8090 {
8091         GSupplicantInterface *interface = data->interface;
8092
8093         SUPPLICANT_DBG("");
8094
8095 #if defined TIZEN_EXT
8096         GSupplicantInterface *intf = NULL;
8097         /*
8098          * Check if 'interface' is valid
8099          */
8100         intf = g_hash_table_lookup(interface_table, interface->path);
8101         if (intf == NULL)
8102                 return -EINVAL;
8103 #endif
8104
8105         return supplicant_dbus_method_call(interface->path,
8106                         SUPPLICANT_INTERFACE ".Interface", "RemoveNetwork",
8107                         network_remove_params, network_remove_result, data,
8108                         interface);
8109 }
8110
8111 static void interface_disconnect_result(const char *error,
8112                                 DBusMessageIter *iter, void *user_data)
8113 {
8114         struct interface_data *data = user_data;
8115         int result = 0;
8116
8117         SUPPLICANT_DBG("");
8118
8119         if (error) {
8120                 result = -EIO;
8121                 SUPPLICANT_DBG("error: %s", error);
8122
8123                 if (g_strcmp0("org.freedesktop.DBus.Error.UnknownMethod",
8124                                                 error) == 0)
8125                         result = -ECONNABORTED;
8126         }
8127
8128         /* If we are disconnecting from previous WPS successful
8129          * association. i.e.: it did not went through AddNetwork,
8130          * and interface->network_path was never set. */
8131         if (!data->interface->network_path) {
8132                 if (data->callback)
8133                         data->callback(result, data->interface,
8134                                                         data->user_data);
8135
8136                 g_free(data->path);
8137                 dbus_free(data);
8138                 return;
8139         }
8140
8141         if (result < 0 && data->callback) {
8142                 data->callback(result, data->interface, data->user_data);
8143                 data->callback = NULL;
8144         }
8145
8146         if (result != -ECONNABORTED) {
8147                 if (network_remove(data) < 0) {
8148                         g_free(data->path);
8149                         dbus_free(data);
8150                 }
8151         } else {
8152                 g_free(data->path);
8153                 dbus_free(data);
8154         }
8155 }
8156
8157 int g_supplicant_interface_disconnect(GSupplicantInterface *interface,
8158                                         GSupplicantInterfaceCallback callback,
8159                                                         void *user_data)
8160 {
8161         struct interface_data *data;
8162         int ret;
8163
8164         SUPPLICANT_DBG("");
8165
8166         if (!interface)
8167                 return -EINVAL;
8168
8169         if (!system_available)
8170                 return -EFAULT;
8171 #if defined TIZEN_EXT
8172         if (decrypt_request_data.pending_call &&
8173                         decrypt_request_data.data &&
8174                         decrypt_request_data.data->user_data == user_data) {
8175
8176                 callback_assoc_failed(decrypt_request_data.data->user_data);
8177                 crypt_method_call_cancel();
8178
8179                 return 0;
8180         }
8181 #endif
8182         data = dbus_malloc0(sizeof(*data));
8183         if (!data)
8184                 return -ENOMEM;
8185
8186         data->interface = interface;
8187         data->path = g_strdup(interface->path);
8188         data->callback = callback;
8189         data->user_data = user_data;
8190
8191         ret = supplicant_dbus_method_call(interface->path,
8192                         SUPPLICANT_INTERFACE ".Interface", "Disconnect",
8193                         NULL, interface_disconnect_result, data,
8194                         interface);
8195
8196         if (ret < 0) {
8197                 g_free(data->path);
8198                 dbus_free(data);
8199         }
8200
8201         return ret;
8202 }
8203
8204 #if defined TIZEN_EXT
8205 void g_supplicant_interface_remove_network(GSupplicantInterface *interface,
8206                                 GSupplicantSSID *ssid)
8207 {
8208         struct interface_data *data;
8209         int ret;
8210
8211         SUPPLICANT_DBG("");
8212
8213         if (!interface)
8214                 return;
8215
8216         if (interface->network_path == NULL)
8217                 return;
8218
8219         if (!interface->network_info.ssid)
8220                 return;
8221
8222         if (memcmp(interface->network_info.ssid, ssid->ssid, ssid->ssid_len))
8223                 return;
8224
8225         if (interface->network_info.security != ssid->security)
8226                 return;
8227
8228         data = dbus_malloc0(sizeof(*data));
8229         if (!data)
8230                 return;
8231
8232         data->interface = interface;
8233         data->path = g_strdup(interface->path);
8234
8235         ret = supplicant_dbus_method_call(interface->path,
8236                         SUPPLICANT_INTERFACE ".Interface", "RemoveNetwork",
8237                         network_remove_params, network_remove_result, data,
8238                         interface);
8239
8240         if (ret < 0) {
8241                 g_free(data->path);
8242                 dbus_free(data);
8243         }
8244 }
8245 #endif
8246
8247 static void interface_p2p_find_result(const char *error,
8248                                         DBusMessageIter *iter, void *user_data)
8249 {
8250         struct interface_scan_data *data = user_data;
8251         int err = 0;
8252
8253         SUPPLICANT_DBG("error %s", error);
8254
8255         if (error)
8256                 err = -EIO;
8257
8258         if (interface_exists(data->interface, data->path)) {
8259                 if (!data->interface->ready)
8260                         err = -ENOLINK;
8261                 if (!err)
8262                         data->interface->p2p_finding = true;
8263         }
8264
8265         if (data->callback)
8266                 data->callback(err, data->interface, data->user_data);
8267
8268         g_free(data->path);
8269         dbus_free(data);
8270 }
8271
8272 static void interface_p2p_find_params(DBusMessageIter *iter, void *user_data)
8273 {
8274         DBusMessageIter dict;
8275
8276         supplicant_dbus_dict_open(iter, &dict);
8277         supplicant_dbus_dict_close(iter, &dict);
8278 }
8279
8280 int g_supplicant_interface_p2p_find(GSupplicantInterface *interface,
8281                                         GSupplicantInterfaceCallback callback,
8282                                                         void *user_data)
8283 {
8284         struct interface_scan_data *data;
8285         int ret;
8286
8287         if (!interface->p2p_support)
8288                 return -ENOTSUP;
8289
8290         ret = interface_ready_to_scan(interface);
8291         if (ret && ret != -EALREADY)
8292                 return ret;
8293
8294         data = dbus_malloc0(sizeof(*data));
8295         if (!data)
8296                 return -ENOMEM;
8297
8298         data->interface = interface;
8299         data->path = g_strdup(interface->path);
8300         data->callback = callback;
8301         data->user_data = user_data;
8302
8303         ret = supplicant_dbus_method_call(interface->path,
8304                         SUPPLICANT_INTERFACE ".Interface.P2PDevice", "Find",
8305                         interface_p2p_find_params, interface_p2p_find_result,
8306                         data, interface);
8307         if (ret < 0) {
8308                 g_free(data->path);
8309                 dbus_free(data);
8310         }
8311
8312         return ret;
8313 }
8314
8315 bool g_supplicant_interface_is_p2p_finding(GSupplicantInterface *interface)
8316 {
8317         if (!interface)
8318                 return false;
8319
8320         return interface->p2p_finding;
8321 }
8322
8323 int g_supplicant_interface_p2p_stop_find(GSupplicantInterface *interface)
8324 {
8325         if (!interface->p2p_finding)
8326                 return 0;
8327
8328         SUPPLICANT_DBG("");
8329
8330         interface->p2p_finding = false;
8331
8332         return supplicant_dbus_method_call(interface->path,
8333                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "StopFind",
8334                 NULL, NULL, NULL, NULL);
8335 }
8336
8337 static void interface_p2p_connect_result(const char *error,
8338                                         DBusMessageIter *iter, void *user_data)
8339 {
8340         struct interface_connect_data *data = user_data;
8341         int err = 0;
8342
8343         SUPPLICANT_DBG("");
8344
8345         if (error) {
8346                 SUPPLICANT_DBG("error: %s", error);
8347                 err = parse_supplicant_error(iter);
8348         }
8349
8350         if (data->callback)
8351                 data->callback(err, data->interface, data->user_data);
8352
8353         g_free(data->path);
8354         g_free(data->peer->wps_pin);
8355         g_free(data->peer->path);
8356         g_free(data->peer);
8357         g_free(data);
8358 }
8359
8360 static void interface_p2p_connect_params(DBusMessageIter *iter, void *user_data)
8361 {
8362         struct interface_connect_data *data = user_data;
8363         const char *wps = "pbc";
8364         DBusMessageIter dict;
8365         int go_intent = 7;
8366
8367         SUPPLICANT_DBG("");
8368
8369         supplicant_dbus_dict_open(iter, &dict);
8370
8371         if (data->peer->master)
8372                 go_intent = 15;
8373
8374         if (data->peer->wps_pin)
8375                 wps = "pin";
8376
8377         supplicant_dbus_dict_append_basic(&dict, "peer",
8378                                 DBUS_TYPE_OBJECT_PATH, &data->peer->path);
8379         supplicant_dbus_dict_append_basic(&dict, "wps_method",
8380                                 DBUS_TYPE_STRING, &wps);
8381         if (data->peer->wps_pin) {
8382                 supplicant_dbus_dict_append_basic(&dict, "pin",
8383                                 DBUS_TYPE_STRING, &data->peer->wps_pin);
8384         }
8385
8386         supplicant_dbus_dict_append_basic(&dict, "go_intent",
8387                                         DBUS_TYPE_INT32, &go_intent);
8388
8389         supplicant_dbus_dict_close(iter, &dict);
8390 }
8391
8392 int g_supplicant_interface_p2p_connect(GSupplicantInterface *interface,
8393                                         GSupplicantPeerParams *peer_params,
8394                                         GSupplicantInterfaceCallback callback,
8395                                         void *user_data)
8396 {
8397         struct interface_connect_data *data;
8398         int ret;
8399
8400         SUPPLICANT_DBG("");
8401
8402         if (!interface->p2p_support)
8403                 return -ENOTSUP;
8404
8405         data = dbus_malloc0(sizeof(*data));
8406         if (!data)
8407                 return -ENOMEM;
8408
8409         data->interface = interface;
8410         data->path = g_strdup(interface->path);
8411         data->peer = peer_params;
8412         data->callback = callback;
8413         data->user_data = user_data;
8414
8415         ret = supplicant_dbus_method_call(interface->path,
8416                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "Connect",
8417                 interface_p2p_connect_params, interface_p2p_connect_result,
8418                 data, interface);
8419         if (ret < 0) {
8420                 g_free(data->path);
8421                 dbus_free(data);
8422                 return ret;
8423         }
8424
8425         return -EINPROGRESS;
8426 }
8427
8428 int g_supplicant_interface_p2p_disconnect(GSupplicantInterface *interface,
8429                                         GSupplicantPeerParams *peer_params)
8430 {
8431         GSupplicantPeer *peer;
8432         int count = 0;
8433         GSList *list;
8434
8435         SUPPLICANT_DBG("");
8436
8437         if (!interface->p2p_support)
8438                 return -ENOTSUP;
8439
8440         peer = g_hash_table_lookup(interface->peer_table, peer_params->path);
8441         if (!peer)
8442                 return -ENODEV;
8443
8444         for (list = peer->groups; list; list = list->next, count++) {
8445                 const char *group_obj_path = list->data;
8446                 GSupplicantInterface *g_interface;
8447                 GSupplicantGroup *group;
8448
8449                 group = g_hash_table_lookup(group_mapping, group_obj_path);
8450                 if (!group || !group->interface)
8451                         continue;
8452
8453                 g_interface = group->interface;
8454                 supplicant_dbus_method_call(g_interface->path,
8455                                 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
8456                                 "Disconnect", NULL, NULL, NULL, g_interface);
8457         }
8458
8459         if (count == 0 && peer->current_group_iface) {
8460                 supplicant_dbus_method_call(peer->current_group_iface->path,
8461                                 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
8462                                 "Disconnect", NULL, NULL, NULL,
8463                                 peer->current_group_iface->path);
8464         }
8465
8466         peer->current_group_iface = NULL;
8467
8468         return -EINPROGRESS;
8469 }
8470
8471 struct p2p_service_data {
8472         bool registration;
8473         GSupplicantInterface *interface;
8474         GSupplicantP2PServiceParams *service;
8475         GSupplicantInterfaceCallback callback;
8476         void *user_data;
8477 };
8478
8479 static void interface_p2p_service_result(const char *error,
8480                                         DBusMessageIter *iter, void *user_data)
8481 {
8482         struct p2p_service_data *data = user_data;
8483         int result = 0;
8484
8485         SUPPLICANT_DBG("%s result - %s", data->registration ?
8486                                 "Registration" : "Deletion",
8487                                 error ? error : "Success");
8488         if (error)
8489                 result = -EINVAL;
8490
8491         if (data->callback)
8492                 data->callback(result, data->interface, data->user_data);
8493
8494         g_free(data->service->query);
8495         g_free(data->service->response);
8496         g_free(data->service->service);
8497         g_free(data->service->wfd_ies);
8498         g_free(data->service);
8499         dbus_free(data);
8500 }
8501
8502 static void interface_p2p_service_params(DBusMessageIter *iter,
8503                                                         void *user_data)
8504 {
8505         struct p2p_service_data *data = user_data;
8506         GSupplicantP2PServiceParams *service;
8507         DBusMessageIter dict;
8508         const char *type;
8509
8510         SUPPLICANT_DBG("");
8511
8512         service = data->service;
8513
8514         supplicant_dbus_dict_open(iter, &dict);
8515
8516         if (service->query && service->response) {
8517                 type = "bonjour";
8518                 supplicant_dbus_dict_append_basic(&dict, "service_type",
8519                                                 DBUS_TYPE_STRING, &type);
8520                 supplicant_dbus_dict_append_fixed_array(&dict, "query",
8521                                         DBUS_TYPE_BYTE, &service->query,
8522                                         service->query_length);
8523                 supplicant_dbus_dict_append_fixed_array(&dict, "response",
8524                                         DBUS_TYPE_BYTE, &service->response,
8525                                         service->response_length);
8526         } else if (service->version && service->service) {
8527                 type = "upnp";
8528                 supplicant_dbus_dict_append_basic(&dict, "service_type",
8529                                                 DBUS_TYPE_STRING, &type);
8530                 supplicant_dbus_dict_append_basic(&dict, "version",
8531                                         DBUS_TYPE_INT32, &service->version);
8532                 supplicant_dbus_dict_append_basic(&dict, "service",
8533                                         DBUS_TYPE_STRING, &service->service);
8534         }
8535
8536         supplicant_dbus_dict_close(iter, &dict);
8537 }
8538
8539 int g_supplicant_interface_p2p_add_service(GSupplicantInterface *interface,
8540                                 GSupplicantInterfaceCallback callback,
8541                                 GSupplicantP2PServiceParams *p2p_service_params,
8542                                 void *user_data)
8543 {
8544         struct p2p_service_data *data;
8545         int ret;
8546
8547         SUPPLICANT_DBG("");
8548
8549         if (!interface->p2p_support)
8550                 return -ENOTSUP;
8551
8552         data = dbus_malloc0(sizeof(*data));
8553         if (!data)
8554                 return -ENOMEM;
8555
8556         data->registration = true;
8557         data->interface = interface;
8558         data->service = p2p_service_params;
8559         data->callback = callback;
8560         data->user_data = user_data;
8561
8562         ret = supplicant_dbus_method_call(interface->path,
8563                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "AddService",
8564                 interface_p2p_service_params, interface_p2p_service_result,
8565                 data, interface);
8566         if (ret < 0) {
8567                 dbus_free(data);
8568                 return ret;
8569         }
8570
8571         return -EINPROGRESS;
8572 }
8573
8574 int g_supplicant_interface_p2p_del_service(GSupplicantInterface *interface,
8575                                 GSupplicantP2PServiceParams *p2p_service_params)
8576 {
8577         struct p2p_service_data *data;
8578         int ret;
8579
8580         SUPPLICANT_DBG("");
8581
8582         if (!interface->p2p_support)
8583                 return -ENOTSUP;
8584
8585         data = dbus_malloc0(sizeof(*data));
8586         if (!data)
8587                 return -ENOMEM;
8588
8589         data->interface = interface;
8590         data->service = p2p_service_params;
8591
8592         ret = supplicant_dbus_method_call(interface->path,
8593                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeleteService",
8594                 interface_p2p_service_params, interface_p2p_service_result,
8595                 data, interface);
8596         if (ret < 0) {
8597                 dbus_free(data);
8598                 return ret;
8599         }
8600
8601         return -EINPROGRESS;
8602 }
8603
8604 struct p2p_listen_data {
8605         int period;
8606         int interval;
8607 };
8608
8609 static void interface_p2p_listen_params(DBusMessageIter *iter, void *user_data)
8610 {
8611         struct p2p_listen_data *params = user_data;
8612         DBusMessageIter dict;
8613
8614         supplicant_dbus_dict_open(iter, &dict);
8615
8616         supplicant_dbus_dict_append_basic(&dict, "period",
8617                                         DBUS_TYPE_INT32, &params->period);
8618         supplicant_dbus_dict_append_basic(&dict, "interval",
8619                                         DBUS_TYPE_INT32, &params->interval);
8620         supplicant_dbus_dict_close(iter, &dict);
8621 }
8622
8623 int g_supplicant_interface_p2p_listen(GSupplicantInterface *interface,
8624                                                 int period, int interval)
8625 {
8626         struct p2p_listen_data params;
8627
8628         SUPPLICANT_DBG("");
8629
8630         if (!interface->p2p_support)
8631                 return -ENOTSUP;
8632
8633         params.period = period;
8634         params.interval = interval;
8635
8636         return supplicant_dbus_method_call(interface->path,
8637                         SUPPLICANT_INTERFACE ".Interface.P2PDevice",
8638                         "ExtendedListen", interface_p2p_listen_params,
8639                         NULL, &params, NULL);
8640 }
8641
8642 static void widi_ies_params(DBusMessageIter *iter, void *user_data)
8643 {
8644         struct p2p_service_data *data = user_data;
8645         GSupplicantP2PServiceParams *service = data->service;
8646         DBusMessageIter array;
8647
8648         SUPPLICANT_DBG("%p - %d", service->wfd_ies, service->wfd_ies_length);
8649
8650         dbus_message_iter_open_container(iter, DBUS_TYPE_ARRAY,
8651                                         DBUS_TYPE_BYTE_AS_STRING, &array);
8652
8653         if (service->wfd_ies && service->wfd_ies_length > 0) {
8654                 dbus_message_iter_append_fixed_array(&array, DBUS_TYPE_BYTE,
8655                                 &service->wfd_ies, service->wfd_ies_length);
8656         }
8657
8658         dbus_message_iter_close_container(iter, &array);
8659 }
8660
8661 int g_supplicant_set_widi_ies(GSupplicantP2PServiceParams *p2p_service_params,
8662                                         GSupplicantInterfaceCallback callback,
8663                                         void *user_data)
8664 {
8665         struct p2p_service_data *data;
8666         int ret;
8667
8668         SUPPLICANT_DBG("");
8669
8670         if (!system_available)
8671                 return -EFAULT;
8672
8673         data = dbus_malloc0(sizeof(*data));
8674         if (!data)
8675                 return -ENOMEM;
8676
8677         data->service = p2p_service_params;
8678         data->callback = callback;
8679         data->user_data = user_data;
8680
8681         if (p2p_service_params->wfd_ies)
8682                 data->registration = true;
8683
8684         ret = supplicant_dbus_property_set(SUPPLICANT_PATH,
8685                                         SUPPLICANT_INTERFACE, "WFDIEs",
8686                                         DBUS_TYPE_ARRAY_AS_STRING
8687                                         DBUS_TYPE_BYTE_AS_STRING,
8688                                         widi_ies_params,
8689                                         interface_p2p_service_result,
8690                                         data, NULL);
8691         if (ret < 0 && ret != -EINPROGRESS) {
8692                 dbus_free(data);
8693                 return ret;
8694         }
8695
8696         return -EINPROGRESS;
8697 }
8698
8699
8700 static const char *g_supplicant_rule0 = "type=signal,"
8701                                         "path=" DBUS_PATH_DBUS ","
8702                                         "sender=" DBUS_SERVICE_DBUS ","
8703                                         "interface=" DBUS_INTERFACE_DBUS ","
8704                                         "member=NameOwnerChanged,"
8705                                         "arg0=" SUPPLICANT_SERVICE;
8706 static const char *g_supplicant_rule1 = "type=signal,"
8707                         "interface=" SUPPLICANT_INTERFACE;
8708 static const char *g_supplicant_rule2 = "type=signal,"
8709                         "interface=" SUPPLICANT_INTERFACE ".Interface";
8710 static const char *g_supplicant_rule3 = "type=signal,"
8711                         "interface=" SUPPLICANT_INTERFACE ".Interface.WPS";
8712 static const char *g_supplicant_rule4 = "type=signal,"
8713                         "interface=" SUPPLICANT_INTERFACE ".BSS";
8714 static const char *g_supplicant_rule5 = "type=signal,"
8715                         "interface=" SUPPLICANT_INTERFACE ".Network";
8716 #if !defined TIZEN_EXT
8717 static const char *g_supplicant_rule6 = "type=signal,"
8718                 "interface=" SUPPLICANT_INTERFACE ".Interface.P2PDevice";
8719 static const char *g_supplicant_rule7 = "type=signal,"
8720                 "interface=" SUPPLICANT_INTERFACE ".Peer";
8721 static const char *g_supplicant_rule8 = "type=signal,"
8722                 "interface=" SUPPLICANT_INTERFACE ".Group";
8723 #endif
8724 #if defined TIZEN_EXT_WIFI_MESH
8725 static const char *g_supplicant_rule9 = "type=signal,"
8726                 "interface=" SUPPLICANT_INTERFACE ".Interface.Mesh";
8727 #endif
8728
8729 static void invoke_introspect_method(void)
8730 {
8731         DBusMessage *message;
8732
8733         message = dbus_message_new_method_call(SUPPLICANT_SERVICE,
8734                                         SUPPLICANT_PATH,
8735                                         DBUS_INTERFACE_INTROSPECTABLE,
8736                                         "Introspect");
8737
8738         if (!message)
8739                 return;
8740
8741         dbus_message_set_no_reply(message, TRUE);
8742         dbus_connection_send(connection, message, NULL);
8743         dbus_message_unref(message);
8744 }
8745
8746 #if defined TIZEN_EXT && defined TIZEN_EXT_INS
8747 void g_supplicant_set_ins_settings(GSupplicantINSPreferredFreq preferred_freq_bssid,
8748                 bool last_connected_bssid, bool assoc_reject, bool signal_bssid,
8749                 unsigned int preferred_freq_bssid_score, unsigned int last_connected_bssid_score,
8750                 unsigned int assoc_reject_score, int signal_level3_5ghz, int signal_level3_24ghz)
8751 {
8752         ins_settings.preferred_freq_bssid = preferred_freq_bssid;
8753         ins_settings.last_connected_bssid = last_connected_bssid;
8754         ins_settings.assoc_reject = assoc_reject;
8755         ins_settings.signal_bssid = signal_bssid;
8756         ins_settings.preferred_freq_bssid_score = preferred_freq_bssid_score;
8757         ins_settings.last_connected_bssid_score = last_connected_bssid_score;
8758         ins_settings.assoc_reject_score = assoc_reject_score;
8759         ins_settings.signal_level3_5ghz = signal_level3_5ghz;
8760         ins_settings.signal_level3_24ghz = signal_level3_24ghz;
8761
8762         SUPPLICANT_DBG("preferred_freq_bssid [%s]", preferred_freq_bssid ? "true" : "false");
8763         SUPPLICANT_DBG("preferred_freq_bssid_score [%d]", preferred_freq_bssid_score);
8764         SUPPLICANT_DBG("last_connected_bssid [%s]", last_connected_bssid ? "true" : "false");
8765         SUPPLICANT_DBG("last_connected_bssid_score [%d]", last_connected_bssid_score);
8766         SUPPLICANT_DBG("assoc_reject [%s]", assoc_reject ? "true" : "false");
8767         SUPPLICANT_DBG("assoc_reject_score [%d]", assoc_reject_score);
8768         SUPPLICANT_DBG("signal_bssid [%s]", signal_bssid ? "true" : "false");
8769         SUPPLICANT_DBG("signal_level3_5ghz [%d]", signal_level3_5ghz);
8770         SUPPLICANT_DBG("signal_level3_24ghz [%d]", signal_level3_24ghz);
8771 }
8772 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_INS */
8773
8774 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
8775 void g_supplicant_register_eap_callback(g_supplicant_eap_callback cb)
8776 {
8777         SUPPLICANT_DBG("g_supplicant_register_eap_callback %p", cb);
8778
8779         if (!callbacks_pointer) {
8780                 SUPPLICANT_DBG("callbacks_pointer is NULL");
8781                 return;
8782         }
8783
8784         callbacks_pointer->eap = cb;
8785 }
8786
8787 void g_supplicant_unregister_eap_callback(void)
8788 {
8789         SUPPLICANT_DBG("g_supplicant_unregister_eap_callback");
8790
8791         if (!callbacks_pointer) {
8792                 SUPPLICANT_DBG("callbacks_pointer is NULL");
8793                 return;
8794         }
8795
8796         callbacks_pointer->eap = NULL;
8797 }
8798 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
8799
8800 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
8801 int g_supplicant_register(GSupplicantCallbacks *callbacks)
8802 #else /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
8803 int g_supplicant_register(const GSupplicantCallbacks *callbacks)
8804 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
8805 {
8806         connection = dbus_bus_get(DBUS_BUS_SYSTEM, NULL);
8807         if (!connection)
8808                 return -EIO;
8809
8810         if (!dbus_connection_add_filter(connection, g_supplicant_filter,
8811                                                 NULL, NULL)) {
8812                 dbus_connection_unref(connection);
8813                 connection = NULL;
8814                 return -EIO;
8815         }
8816 #if defined TIZEN_EXT
8817         simplified_log = connman_setting_get_bool("SimplifiedLog");
8818 #endif
8819         callbacks_pointer = callbacks;
8820         eap_methods = 0;
8821
8822         interface_table = g_hash_table_new_full(g_str_hash, g_str_equal,
8823                                                 NULL, remove_interface);
8824
8825         bss_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
8826                                                                 NULL, NULL);
8827         peer_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
8828                                                                 NULL, NULL);
8829         group_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
8830                                                                 NULL, NULL);
8831         pending_peer_connection = g_hash_table_new_full(g_str_hash, g_str_equal,
8832                                                                 NULL, NULL);
8833         config_file_table = g_hash_table_new_full(g_str_hash, g_str_equal,
8834                                                                 g_free, g_free);
8835
8836         supplicant_dbus_setup(connection);
8837
8838         dbus_bus_add_match(connection, g_supplicant_rule0, NULL);
8839         dbus_bus_add_match(connection, g_supplicant_rule1, NULL);
8840         dbus_bus_add_match(connection, g_supplicant_rule2, NULL);
8841         dbus_bus_add_match(connection, g_supplicant_rule3, NULL);
8842         dbus_bus_add_match(connection, g_supplicant_rule4, NULL);
8843         dbus_bus_add_match(connection, g_supplicant_rule5, NULL);
8844 #if defined TIZEN_EXT
8845         dbus_bus_add_match(connection,
8846                         "type=signal,interface=org.tizen.system.deviced.PowerOff,"
8847                         "member=ChangeState", NULL);
8848 #endif
8849 #if !defined TIZEN_EXT
8850         dbus_bus_add_match(connection, g_supplicant_rule6, NULL);
8851         dbus_bus_add_match(connection, g_supplicant_rule7, NULL);
8852         dbus_bus_add_match(connection, g_supplicant_rule8, NULL);
8853 #endif
8854 #if defined TIZEN_EXT_WIFI_MESH
8855         dbus_bus_add_match(connection, g_supplicant_rule9, NULL);
8856 #endif
8857         dbus_connection_flush(connection);
8858
8859         if (dbus_bus_name_has_owner(connection,
8860                                         SUPPLICANT_SERVICE, NULL)) {
8861                 system_available = TRUE;
8862                 supplicant_dbus_property_get_all(SUPPLICANT_PATH,
8863                                                 SUPPLICANT_INTERFACE,
8864                                                 service_property, NULL, NULL);
8865         } else
8866                 invoke_introspect_method();
8867
8868         SUPPLICANT_DBG("supplicant dbus setup completed");
8869         return 0;
8870 }
8871
8872 static void unregister_interface_remove_params(DBusMessageIter *iter,
8873                                                 void *user_data)
8874 {
8875         const char *path = user_data;
8876
8877         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
8878                                                         &path);
8879 }
8880
8881
8882 static void unregister_remove_interface(gpointer key, gpointer value,
8883                                                 gpointer user_data)
8884 {
8885         GSupplicantInterface *interface = value;
8886
8887         supplicant_dbus_method_call(SUPPLICANT_PATH,
8888                                         SUPPLICANT_INTERFACE,
8889                                         "RemoveInterface",
8890                                         unregister_interface_remove_params,
8891                                         NULL, interface->path, NULL);
8892 }
8893
8894 void g_supplicant_unregister(const GSupplicantCallbacks *callbacks)
8895 {
8896         SUPPLICANT_DBG("");
8897
8898         if (connection) {
8899 #if defined TIZEN_EXT_WIFI_MESH
8900                 dbus_bus_remove_match(connection, g_supplicant_rule9, NULL);
8901 #endif
8902 #if !defined TIZEN_EXT
8903                 dbus_bus_remove_match(connection, g_supplicant_rule8, NULL);
8904                 dbus_bus_remove_match(connection, g_supplicant_rule7, NULL);
8905                 dbus_bus_remove_match(connection, g_supplicant_rule6, NULL);
8906 #endif
8907                 dbus_bus_remove_match(connection, g_supplicant_rule5, NULL);
8908                 dbus_bus_remove_match(connection, g_supplicant_rule4, NULL);
8909                 dbus_bus_remove_match(connection, g_supplicant_rule3, NULL);
8910                 dbus_bus_remove_match(connection, g_supplicant_rule2, NULL);
8911                 dbus_bus_remove_match(connection, g_supplicant_rule1, NULL);
8912                 dbus_bus_remove_match(connection, g_supplicant_rule0, NULL);
8913                 dbus_connection_flush(connection);
8914
8915                 dbus_connection_remove_filter(connection,
8916                                                 g_supplicant_filter, NULL);
8917         }
8918
8919         if (config_file_table) {
8920                 g_hash_table_destroy(config_file_table);
8921                 config_file_table = NULL;
8922         }
8923
8924         if (bss_mapping) {
8925                 g_hash_table_destroy(bss_mapping);
8926                 bss_mapping = NULL;
8927         }
8928
8929         if (peer_mapping) {
8930                 g_hash_table_destroy(peer_mapping);
8931                 peer_mapping = NULL;
8932         }
8933
8934         if (group_mapping) {
8935                 g_hash_table_destroy(group_mapping);
8936                 group_mapping = NULL;
8937         }
8938
8939         if (interface_table) {
8940                 g_hash_table_foreach(interface_table,
8941                                         unregister_remove_interface, NULL);
8942                 g_hash_table_destroy(interface_table);
8943                 interface_table = NULL;
8944         }
8945
8946         if (system_available)
8947                 callback_system_killed();
8948
8949         if (connection) {
8950                 dbus_connection_unref(connection);
8951                 connection = NULL;
8952         }
8953
8954         callbacks_pointer = NULL;
8955         eap_methods = 0;
8956 }
8957
8958 #ifdef TIZEN_EXT
8959 struct supplicant_mac_policy {
8960         GSupplicantMacPolicyCallback callback;
8961         dbus_uint32_t policy;
8962         const void *user_data;
8963 };
8964
8965 static void mac_policy_result(const char *error,
8966                                 DBusMessageIter *iter, void *user_data)
8967 {
8968         struct supplicant_mac_policy *data = user_data;
8969         int result = 0;
8970
8971         if (!user_data)
8972                 return;
8973
8974         if (error) {
8975                 SUPPLICANT_DBG("Mac policy setting failure %s", error);
8976                 result = -EINVAL;
8977         }
8978
8979         if (data->callback)
8980                 data->callback(result, data->policy,
8981                                         (void *) data->user_data);
8982
8983         dbus_free(data);
8984 }
8985
8986 static void mac_policy_params(DBusMessageIter *iter, void *user_data)
8987 {
8988         struct supplicant_mac_policy *data = user_data;
8989
8990         dbus_message_iter_append_basic(iter, DBUS_TYPE_INT32, &(data->policy));
8991 }
8992
8993 int g_supplicant_interface_set_mac_policy(GSupplicantInterface *interface,
8994                                         GSupplicantMacPolicyCallback callback,
8995                                                         unsigned int policy,
8996                                                         void *user_data)
8997 {
8998         struct supplicant_mac_policy *data = NULL;
8999         int ret;
9000
9001         if (!system_available)
9002                 return -EFAULT;
9003
9004         if (!interface)
9005                 return -EINVAL;
9006
9007         data = dbus_malloc0(sizeof(*data));
9008         if (!data)
9009                 return -ENOMEM;
9010
9011         data->callback = callback;
9012         data->policy = policy;
9013         data->user_data = user_data;
9014
9015         ret =  supplicant_dbus_property_set(interface->path,
9016                                 SUPPLICANT_INTERFACE ".Interface",
9017                                 "MacAddr", DBUS_TYPE_INT32_AS_STRING,
9018                                 mac_policy_params, mac_policy_result, data, NULL);
9019         if (ret < 0) {
9020                 SUPPLICANT_DBG("Unable to set MacAddr configuration");
9021                 dbus_free(data);
9022         }
9023
9024         return ret;
9025 }
9026
9027 int g_supplicant_interface_set_preassoc_mac_policy(GSupplicantInterface *interface,
9028                                         GSupplicantMacPolicyCallback callback,
9029                                                         unsigned int policy,
9030                                                         void *user_data)
9031 {
9032         struct supplicant_mac_policy *data;
9033         int ret;
9034
9035         if (!system_available)
9036                 return -EFAULT;
9037
9038         if (!interface)
9039                 return -EINVAL;
9040
9041         data = dbus_malloc0(sizeof(*data));
9042         if (!data)
9043                 return -ENOMEM;
9044
9045         data->callback = callback;
9046         data->policy = policy;
9047         data->user_data = user_data;
9048
9049         ret =  supplicant_dbus_property_set(interface->path,
9050                                 SUPPLICANT_INTERFACE ".Interface",
9051                                 "PreassocMacAddr", DBUS_TYPE_INT32_AS_STRING,
9052                                 mac_policy_params, mac_policy_result, data, NULL);
9053         if (ret < 0) {
9054                 SUPPLICANT_DBG("Unable to set PreassocMacAddr configuration");
9055                 dbus_free(data);
9056         }
9057
9058         return ret;
9059 }
9060
9061 struct supplicant_random_mac_lifetime {
9062         GSupplicantRandomMaclifetimeCallback callback;
9063         dbus_uint32_t lifetime;
9064         const void *user_data;
9065 };
9066
9067 static void random_mac_lifetime_result(const char *error,
9068                                 DBusMessageIter *iter, void *user_data)
9069 {
9070         struct supplicant_random_mac_lifetime *data = user_data;
9071         int result = 0;
9072
9073         if (!user_data)
9074                 return;
9075
9076         if (error) {
9077                 SUPPLICANT_DBG("Random Mac lifetime setting failure %s", error);
9078                 result = -EINVAL;
9079         }
9080
9081         if (data->callback)
9082                 data->callback(result, data->lifetime,
9083                                         (void *) data->user_data);
9084
9085         dbus_free(data);
9086 }
9087
9088 static void random_mac_lifetime_params(DBusMessageIter *iter, void *user_data)
9089 {
9090         struct supplicant_random_mac_lifetime *data = user_data;
9091
9092         dbus_message_iter_append_basic(iter, DBUS_TYPE_UINT32, &(data->lifetime));
9093 }
9094
9095 int g_supplicant_interface_set_random_mac_lifetime(GSupplicantInterface *interface,
9096                                         GSupplicantRandomMaclifetimeCallback callback,
9097                                                         unsigned int lifetime,
9098                                                         void *user_data)
9099 {
9100         struct supplicant_random_mac_lifetime *data;
9101         int ret;
9102
9103         if (!system_available)
9104                 return -EFAULT;
9105
9106         if (!interface)
9107                 return -EINVAL;
9108
9109         data = dbus_malloc0(sizeof(*data));
9110         if (!data)
9111                 return -ENOMEM;
9112
9113         data->callback = callback;
9114         data->lifetime = lifetime;
9115         data->user_data = user_data;
9116
9117         ret =  supplicant_dbus_property_set(interface->path,
9118                                 SUPPLICANT_INTERFACE ".Interface",
9119                                 "RandAddrLifetime", DBUS_TYPE_UINT32_AS_STRING,
9120                                 random_mac_lifetime_params, random_mac_lifetime_result,
9121                                 data, NULL);
9122         if (ret < 0) {
9123                 SUPPLICANT_DBG("Unable to set RandAddrLifetime configuration");
9124                 dbus_free(data);
9125         }
9126
9127         return ret;
9128 }
9129 #endif