Do not include related code if INS is not enabled
[platform/upstream/connman.git] / gsupplicant / supplicant.c
1 /*
2  *
3  *  WPA supplicant library with GLib integration
4  *
5  *  Copyright (C) 2012-2013  Intel Corporation. All rights reserved.
6  *
7  *  This program is free software; you can redistribute it and/or modify
8  *  it under the terms of the GNU General Public License version 2 as
9  *  published by the Free Software Foundation.
10  *
11  *  This program is distributed in the hope that it will be useful,
12  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
13  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14  *  GNU General Public License for more details.
15  *
16  *  You should have received a copy of the GNU General Public License
17  *  along with this program; if not, write to the Free Software
18  *  Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA
19  *
20  */
21
22 #ifdef HAVE_CONFIG_H
23 #include <config.h>
24 #endif
25
26 #include <errno.h>
27 #include <stdio.h>
28 #include <stdlib.h>
29 #include <string.h>
30 #include <stdint.h>
31 #include <syslog.h>
32 #include <ctype.h>
33 #include <stdbool.h>
34 #include <netinet/if_ether.h>
35 #include <netinet/in.h>
36
37 #include <glib.h>
38 #include <gdbus.h>
39
40 #include "dbus.h"
41 #include "gsupplicant.h"
42
43 #if defined TIZEN_EXT
44 #include "setting.h"
45 #endif
46
47 #define IEEE80211_CAP_ESS       0x0001
48 #define IEEE80211_CAP_IBSS      0x0002
49 #define IEEE80211_CAP_PRIVACY   0x0010
50
51 #if defined TIZEN_EXT
52 #define WLAN_EID_HT_CAP 45
53 #define WLAN_EID_VHT_CAP 191
54 #define WLAN_EID_SUPP_RATES 1
55 #define WLAN_EID_EXT_SUPP_RATES 50
56 #define COUNTRY_CODE_LENGTH     2
57 #endif
58
59 #if defined TIZEN_EXT
60 #define LAST_CONNECTED_TIMEOUT       (5 * 60)
61 #define ASSOC_REJECT_TIMEOUT         10
62 #define FREQ_RANGE_24GHZ_CHANNEL_1   2412
63 #define FREQ_RANGE_24GHZ_CHANNEL_14  2484
64 #define FREQ_RANGE_5GHZ_CHANNEL_32   5160
65 #define FREQ_RANGE_5GHZ_CHANNEL_165  5825
66
67 #define MAC2STR(a) (a)[0], (a)[1], (a)[2], (a)[3], (a)[4], (a)[5]
68 #define MACSTR "%02x:%02x:%02x:%02x:%02x:%02x"
69 #endif
70
71 #define BSS_UNKNOWN_STRENGTH    -90
72
73 static DBusConnection *connection;
74
75 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
76 static GSupplicantCallbacks *callbacks_pointer;
77 #else /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
78 static const GSupplicantCallbacks *callbacks_pointer;
79 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
80
81 static dbus_bool_t system_available = FALSE;
82 static dbus_bool_t system_ready = FALSE;
83
84 static dbus_int32_t debug_level;
85 static dbus_bool_t debug_timestamp = FALSE;
86 static dbus_bool_t debug_showkeys = FALSE;
87
88 static const char *debug_strings[] = {
89         "msgdump", "debug", "info", "warning", "error", NULL
90 };
91
92 static unsigned int eap_methods;
93
94 struct strvalmap {
95         const char *str;
96         unsigned int val;
97 };
98
99 static struct strvalmap eap_method_map[] = {
100         { "MD5",        G_SUPPLICANT_EAP_METHOD_MD5     },
101         { "TLS",        G_SUPPLICANT_EAP_METHOD_TLS     },
102         { "MSCHAPV2",   G_SUPPLICANT_EAP_METHOD_MSCHAPV2        },
103         { "PEAP",       G_SUPPLICANT_EAP_METHOD_PEAP    },
104         { "TTLS",       G_SUPPLICANT_EAP_METHOD_TTLS    },
105         { "GTC",        G_SUPPLICANT_EAP_METHOD_GTC     },
106         { "OTP",        G_SUPPLICANT_EAP_METHOD_OTP     },
107         { "LEAP",       G_SUPPLICANT_EAP_METHOD_LEAP    },
108         { "WSC",        G_SUPPLICANT_EAP_METHOD_WSC     },
109         { }
110 };
111
112 static struct strvalmap keymgmt_map[] = {
113         { "none",               G_SUPPLICANT_KEYMGMT_NONE               },
114         { "ieee8021x",          G_SUPPLICANT_KEYMGMT_IEEE8021X  },
115         { "wpa-none",           G_SUPPLICANT_KEYMGMT_WPA_NONE   },
116         { "wpa-psk",            G_SUPPLICANT_KEYMGMT_WPA_PSK    },
117         { "wpa-psk-sha256",     G_SUPPLICANT_KEYMGMT_WPA_PSK_256        },
118         { "wpa-ft-psk",         G_SUPPLICANT_KEYMGMT_WPA_FT_PSK },
119         { "wpa-ft-eap",         G_SUPPLICANT_KEYMGMT_WPA_FT_EAP },
120         { "wpa-eap",            G_SUPPLICANT_KEYMGMT_WPA_EAP    },
121         { "wpa-eap-sha256",     G_SUPPLICANT_KEYMGMT_WPA_EAP_256        },
122         { "wps",                G_SUPPLICANT_KEYMGMT_WPS                },
123 #if defined TIZEN_EXT
124         { "sae",                G_SUPPLICANT_KEYMGMT_SAE                },
125         { "ft-sae",             G_SUPPLICANT_KEYMGMT_FT_SAE             },
126         { "owe",                G_SUPPLICANT_KEYMGMT_OWE                },
127         { "dpp",                G_SUPPLICANT_KEYMGMT_DPP                },
128 #endif
129         { }
130 };
131
132 static struct strvalmap authalg_capa_map[] = {
133         { "open",       G_SUPPLICANT_CAPABILITY_AUTHALG_OPEN    },
134         { "shared",     G_SUPPLICANT_CAPABILITY_AUTHALG_SHARED  },
135         { "leap",       G_SUPPLICANT_CAPABILITY_AUTHALG_LEAP    },
136         { }
137 };
138
139 static struct strvalmap proto_capa_map[] = {
140         { "wpa",        G_SUPPLICANT_CAPABILITY_PROTO_WPA               },
141         { "rsn",        G_SUPPLICANT_CAPABILITY_PROTO_RSN               },
142         { }
143 };
144
145 static struct strvalmap group_map[] = {
146         { "wep40",      G_SUPPLICANT_GROUP_WEP40        },
147         { "wep104",     G_SUPPLICANT_GROUP_WEP104       },
148         { "tkip",       G_SUPPLICANT_GROUP_TKIP },
149         { "ccmp",       G_SUPPLICANT_GROUP_CCMP },
150         { }
151 };
152
153 static struct strvalmap pairwise_map[] = {
154         { "none",       G_SUPPLICANT_PAIRWISE_NONE      },
155         { "tkip",       G_SUPPLICANT_PAIRWISE_TKIP      },
156         { "ccmp",       G_SUPPLICANT_PAIRWISE_CCMP      },
157         { }
158 };
159
160 static struct strvalmap scan_capa_map[] = {
161         { "active",     G_SUPPLICANT_CAPABILITY_SCAN_ACTIVE     },
162         { "passive",    G_SUPPLICANT_CAPABILITY_SCAN_PASSIVE    },
163         { "ssid",       G_SUPPLICANT_CAPABILITY_SCAN_SSID               },
164         { }
165 };
166
167 static struct strvalmap mode_capa_map[] = {
168         { "infrastructure",     G_SUPPLICANT_CAPABILITY_MODE_INFRA      },
169         { "ad-hoc",             G_SUPPLICANT_CAPABILITY_MODE_IBSS       },
170         { "ap",                 G_SUPPLICANT_CAPABILITY_MODE_AP         },
171         { "p2p",                G_SUPPLICANT_CAPABILITY_MODE_P2P        },
172 #if defined TIZEN_EXT_WIFI_MESH
173         { "mesh",               G_SUPPLICANT_CAPABILITY_MODE_MESH       },
174 #endif
175         { }
176 };
177
178 #if defined TIZEN_EXT && defined TIZEN_EXT_INS
179 struct _GSupplicantINSSettings {
180         GSupplicantINSPreferredFreq preferred_freq_bssid;
181         unsigned int preferred_freq_bssid_score;
182         bool last_connected_bssid;
183         unsigned int last_connected_bssid_score;
184         bool assoc_reject;
185         unsigned int assoc_reject_score;
186         bool signal_bssid;
187         int signal_level3_5ghz;
188         int signal_level3_24ghz;
189 };
190
191 static struct _GSupplicantINSSettings ins_settings;
192 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_INS */
193
194 #if defined TIZEN_EXT_INS
195 static unsigned char invalid_bssid[WIFI_BSSID_LEN_MAX] = {
196         0x00, 0x00, 0x00, 0x00, 0x00, 0x00
197 };
198 #endif
199
200 static GHashTable *interface_table;
201 static GHashTable *bss_mapping;
202 static GHashTable *peer_mapping;
203 static GHashTable *group_mapping;
204 static GHashTable *pending_peer_connection;
205 static GHashTable *config_file_table;
206
207 struct _GSupplicantWpsCredentials {
208         unsigned char ssid[32];
209         unsigned int ssid_len;
210         char *key;
211 };
212
213 struct added_network_information {
214         char * ssid;
215         GSupplicantSecurity security;
216         char * passphrase;
217         char * private_passphrase;
218 #if defined TIZEN_EXT
219         char *connector;
220         char *c_sign_key;
221         char *net_access_key;
222 #endif
223 };
224
225 #if defined TIZEN_EXT_WIFI_MESH
226 struct _GSupplicantMeshGroupInfo {
227         unsigned char ssid[32];
228         unsigned int ssid_len;
229         int disconnect_reason;
230 };
231 #endif
232
233 struct _GSupplicantInterface {
234         char *path;
235         char *network_path;
236         unsigned int keymgmt_capa;
237         unsigned int authalg_capa;
238         unsigned int proto_capa;
239         unsigned int group_capa;
240         unsigned int pairwise_capa;
241         unsigned int scan_capa;
242         unsigned int mode_capa;
243         unsigned int max_scan_ssids;
244         bool p2p_support;
245         bool p2p_finding;
246         bool ap_create_in_progress;
247         dbus_bool_t ready;
248         GSupplicantState state;
249         dbus_bool_t scanning;
250         GSupplicantInterfaceCallback scan_callback;
251         void *scan_data;
252         int apscan;
253         char *ifname;
254         char *driver;
255         char *bridge;
256         struct _GSupplicantWpsCredentials wps_cred;
257         GSupplicantWpsState wps_state;
258         GHashTable *network_table;
259         GHashTable *peer_table;
260         GHashTable *group_table;
261         GHashTable *bss_mapping;
262         void *data;
263         const char *pending_peer_path;
264         GSupplicantNetwork *current_network;
265         struct added_network_information network_info;
266 #if defined TIZEN_EXT
267         dbus_bool_t is_5_0_Ghz_supported;
268         int disconnect_reason;
269 #endif
270 #if defined TIZEN_EXT
271         unsigned char add_network_bssid[WIFI_BSSID_LEN_MAX];
272         unsigned char connected_bssid[WIFI_BSSID_LEN_MAX];
273 #endif
274 #if defined TIZEN_EXT_WIFI_MESH
275         bool mesh_support;
276         struct _GSupplicantMeshGroupInfo group_info;
277 #endif
278 };
279
280 struct g_supplicant_bss {
281         GSupplicantInterface *interface;
282         char *path;
283         unsigned char bssid[6];
284         unsigned char ssid[32];
285         unsigned int ssid_len;
286         dbus_uint16_t frequency;
287         dbus_uint32_t maxrate;
288         dbus_int16_t signal;
289         GSupplicantMode mode;
290         GSupplicantSecurity security;
291         dbus_bool_t rsn_selected;
292         unsigned int wpa_keymgmt;
293         unsigned int wpa_pairwise;
294         unsigned int wpa_group;
295         unsigned int rsn_keymgmt;
296         unsigned int rsn_pairwise;
297         unsigned int rsn_group;
298         unsigned int keymgmt;
299         dbus_bool_t privacy;
300         dbus_bool_t psk;
301         dbus_bool_t ieee8021x;
302 #if defined TIZEN_EXT
303         dbus_bool_t ft_psk;
304         dbus_bool_t ft_ieee8021x;
305         GSList *vsie_list;
306         dbus_bool_t hs20;
307         unsigned char country_code[COUNTRY_CODE_LENGTH];
308         GSupplicantPhy_mode phy_mode;
309         dbus_int16_t snr;
310         dbus_uint32_t est_throughput;
311         dbus_bool_t psk_sha256;
312 #endif
313         unsigned int wps_capabilities;
314 #if defined TIZEN_EXT
315         dbus_bool_t sae;
316         dbus_bool_t owe;
317         dbus_bool_t dpp;
318         dbus_bool_t owe_transition_mode;
319         unsigned int transition_mode_ssid_len;
320         unsigned char transition_mode_bssid[6];
321         unsigned char transition_mode_ssid[32];
322         dbus_bool_t pmf_required;
323 #endif
324 };
325
326 struct _GSupplicantNetwork {
327         GSupplicantInterface *interface;
328         char *path;
329         char *group;
330         char *name;
331         unsigned char ssid[32];
332         unsigned int ssid_len;
333         dbus_int16_t signal;
334         dbus_uint16_t frequency;
335         struct g_supplicant_bss *best_bss;
336         GSupplicantMode mode;
337         GSupplicantSecurity security;
338         dbus_bool_t wps;
339         unsigned int wps_capabilities;
340         GHashTable *bss_table;
341         GHashTable *config_table;
342 #if defined TIZEN_EXT
343         bool isHS20AP;
344         char *eap;
345         char *identity;
346         char *phase2;
347         unsigned int keymgmt;
348         GSList *vsie_list;
349         unsigned char country_code[COUNTRY_CODE_LENGTH];
350         GSupplicantPhy_mode phy_mode;
351         dbus_bool_t owe_transition_mode;
352         dbus_bool_t privacy;
353         unsigned int transition_mode_ssid_len;
354         unsigned char transition_mode_bssid[6];
355         unsigned char transition_mode_ssid[32];
356         unsigned char last_connected_bssid[WIFI_BSSID_LEN_MAX];
357         GHashTable *assoc_reject_table;
358 #endif
359 };
360
361 struct _GSupplicantPeer {
362         GSupplicantInterface *interface;
363         char *path;
364         unsigned char device_address[ETH_ALEN];
365         unsigned char iface_address[ETH_ALEN];
366         char *name;
367         unsigned char *widi_ies;
368         int widi_ies_length;
369         char *identifier;
370         unsigned int wps_capabilities;
371         GSList *groups;
372         const GSupplicantInterface *current_group_iface;
373         bool connection_requested;
374 };
375
376 struct _GSupplicantGroup {
377         GSupplicantInterface *interface;
378         GSupplicantInterface *orig_interface;
379         char *path;
380         int role;
381         GSList *members;
382 };
383
384 struct interface_data {
385         GSupplicantInterface *interface;
386         char *path; /* Interface path cannot be taken from interface (above) as
387                      * it might have been freed already.
388                      */
389         GSupplicantInterfaceCallback callback;
390         void *user_data;
391         bool network_remove_in_progress;
392         GSupplicantSSID *ssid;
393 };
394
395 #if defined TIZEN_EXT
396 struct interface_signalpoll_data {
397         GSupplicantInterface *interface;
398         char *path;
399         GSupplicantMaxSpeedCallback callback;
400         void *user_data;
401 };
402 #endif
403
404 struct interface_create_data {
405         char *ifname;
406         char *driver;
407         char *bridge;
408 #if defined TIZEN_EXT
409         unsigned int mac_addr;
410         unsigned int preassoc_mac_addr;
411         unsigned int random_mac_lifetime;
412 #endif /* TIZEN_EXT */
413 #if defined TIZEN_EXT_WIFI_MESH
414         char *parent_ifname;
415         bool is_mesh_interface;
416 #endif
417         GSupplicantInterface *interface;
418         GSupplicantInterfaceCallback callback;
419         void *user_data;
420 };
421
422 struct interface_connect_data {
423         GSupplicantInterface *interface;
424         char *path;
425         GSupplicantInterfaceCallback callback;
426         void *user_data;
427         union {
428                 GSupplicantSSID *ssid;
429                 GSupplicantPeerParams *peer;
430         };
431 };
432
433 struct interface_scan_data {
434         GSupplicantInterface *interface;
435         char *path;
436         GSupplicantInterfaceCallback callback;
437         GSupplicantScanParams *scan_params;
438         void *user_data;
439 };
440
441 #if defined TIZEN_EXT
442 struct update_bssid_data {
443         GSupplicantNetwork *network;
444         unsigned char last_connected_bssid[WIFI_BSSID_LEN_MAX];
445         GHashTable *assoc_reject_table;
446         GSList *bssid_list;
447 };
448
449 struct assoc_reject_data {
450         char *bssid;
451         GSList *reject_time_list;
452 };
453
454 struct assoc_count_data {
455         time_t ref_time;
456         int assoc_count;
457 };
458
459 static unsigned int last_connected_bss_timeout = 0;
460 static bool simplified_log = true;
461 #endif
462
463 static int network_remove(struct interface_data *data);
464
465 #if defined TIZEN_EXT_WIFI_MESH
466 struct _GSupplicantMeshPeer {
467         GSupplicantInterface *interface;
468         char *peer_address;
469         int disconnect_reason;
470 };
471 #endif
472
473 static inline void debug(const char *format, ...)
474 {
475         char str[256];
476         va_list ap;
477
478         if (!callbacks_pointer || !callbacks_pointer->debug)
479                 return;
480
481         va_start(ap, format);
482
483         if (vsnprintf(str, sizeof(str), format, ap) > 0)
484                 callbacks_pointer->debug(str);
485
486         va_end(ap);
487 }
488
489 #define SUPPLICANT_DBG(fmt, arg...) \
490         debug("%s:%s() " fmt, __FILE__, __FUNCTION__ , ## arg);
491
492 static GSupplicantMode string2mode(const char *mode)
493 {
494         if (!mode)
495                 return G_SUPPLICANT_MODE_UNKNOWN;
496
497         if (g_str_equal(mode, "infrastructure"))
498                 return G_SUPPLICANT_MODE_INFRA;
499         else if (g_str_equal(mode, "ad-hoc"))
500                 return G_SUPPLICANT_MODE_IBSS;
501 #if defined TIZEN_EXT_WIFI_MESH
502         else if (g_str_equal(mode, "mesh"))
503                 return G_SUPPLICANT_MODE_MESH;
504 #endif
505
506         return G_SUPPLICANT_MODE_UNKNOWN;
507 }
508
509 static const char *mode2string(GSupplicantMode mode)
510 {
511         switch (mode) {
512         case G_SUPPLICANT_MODE_UNKNOWN:
513                 break;
514         case G_SUPPLICANT_MODE_INFRA:
515                 return "managed";
516         case G_SUPPLICANT_MODE_IBSS:
517                 return "adhoc";
518         case G_SUPPLICANT_MODE_MASTER:
519                 return "ap";
520 #if defined TIZEN_EXT_WIFI_MESH
521         case G_SUPPLICANT_MODE_MESH:
522                 return "mesh";
523 #endif
524         }
525
526         return NULL;
527 }
528
529 static const char *security2string(GSupplicantSecurity security)
530 {
531         switch (security) {
532         case G_SUPPLICANT_SECURITY_UNKNOWN:
533                 break;
534         case G_SUPPLICANT_SECURITY_NONE:
535                 return "none";
536         case G_SUPPLICANT_SECURITY_WEP:
537                 return "wep";
538         case G_SUPPLICANT_SECURITY_PSK:
539                 return "psk";
540         case G_SUPPLICANT_SECURITY_IEEE8021X:
541                 return "ieee8021x";
542 #if defined TIZEN_EXT
543         case G_SUPPLICANT_SECURITY_PSK_SHA256:
544                 return "psk_sha256";
545         case G_SUPPLICANT_SECURITY_FT_PSK:
546                 return "ft_psk";
547         case G_SUPPLICANT_SECURITY_FT_IEEE8021X:
548                 return "ft_ieee8021x";
549         case G_SUPPLICANT_SECURITY_SAE:
550                 return "sae";
551         case G_SUPPLICANT_SECURITY_OWE:
552                 return "owe";
553         case G_SUPPLICANT_SECURITY_DPP:
554                 return "dpp";
555 #endif
556         }
557
558         return NULL;
559 }
560
561 static GSupplicantState string2state(const char *state)
562 {
563         if (!state)
564                 return G_SUPPLICANT_STATE_UNKNOWN;
565
566         if (g_str_equal(state, "unknown"))
567                 return G_SUPPLICANT_STATE_UNKNOWN;
568         else if (g_str_equal(state, "interface_disabled"))
569                 return G_SUPPLICANT_STATE_DISABLED;
570         else if (g_str_equal(state, "disconnected"))
571                 return G_SUPPLICANT_STATE_DISCONNECTED;
572         else if (g_str_equal(state, "inactive"))
573                 return G_SUPPLICANT_STATE_INACTIVE;
574         else if (g_str_equal(state, "scanning"))
575                 return G_SUPPLICANT_STATE_SCANNING;
576         else if (g_str_equal(state, "authenticating"))
577                 return G_SUPPLICANT_STATE_AUTHENTICATING;
578         else if (g_str_equal(state, "associating"))
579                 return G_SUPPLICANT_STATE_ASSOCIATING;
580         else if (g_str_equal(state, "associated"))
581                 return G_SUPPLICANT_STATE_ASSOCIATED;
582         else if (g_str_equal(state, "group_handshake"))
583                 return G_SUPPLICANT_STATE_GROUP_HANDSHAKE;
584         else if (g_str_equal(state, "4way_handshake"))
585                 return G_SUPPLICANT_STATE_4WAY_HANDSHAKE;
586         else if (g_str_equal(state, "completed"))
587                 return G_SUPPLICANT_STATE_COMPLETED;
588
589         return G_SUPPLICANT_STATE_UNKNOWN;
590 }
591
592 static bool compare_network_parameters(GSupplicantInterface *interface,
593                                 GSupplicantSSID *ssid)
594 {
595 #if defined TIZEN_EXT
596         if (!interface->network_info.ssid)
597                 return FALSE;
598 #endif
599
600         if (memcmp(interface->network_info.ssid, ssid->ssid, ssid->ssid_len))
601                 return FALSE;
602
603         if (interface->network_info.security != ssid->security)
604                 return FALSE;
605
606         if (interface->network_info.passphrase &&
607                         g_strcmp0(interface->network_info.passphrase,
608                                 ssid->passphrase) != 0) {
609                 return FALSE;
610         }
611
612         if (interface->network_info.private_passphrase &&
613                         g_strcmp0(interface->network_info.private_passphrase,
614                                 ssid->private_key_passphrase) != 0) {
615                 return FALSE;
616         }
617
618 #if defined TIZEN_EXT
619         if (interface->network_info.connector &&
620                         g_strcmp0(interface->network_info.connector,
621                                 ssid->connector) != 0) {
622                 return FALSE;
623         }
624         if (interface->network_info.c_sign_key &&
625                         g_strcmp0(interface->network_info.c_sign_key,
626                                 ssid->c_sign_key) != 0) {
627                 return FALSE;
628         }
629         if (interface->network_info.net_access_key &&
630                         g_strcmp0(interface->network_info.net_access_key,
631                                 ssid->net_access_key) != 0) {
632                 return FALSE;
633         }
634 #endif
635         return TRUE;
636 }
637
638 static void remove_network_information(GSupplicantInterface * interface)
639 {
640         g_free(interface->network_info.ssid);
641         g_free(interface->network_info.passphrase);
642         g_free(interface->network_info.private_passphrase);
643 #if defined TIZEN_EXT
644         g_free(interface->network_info.connector);
645         g_free(interface->network_info.c_sign_key);
646         g_free(interface->network_info.net_access_key);
647 #endif
648         interface->network_info.ssid = NULL;
649         interface->network_info.passphrase = NULL;
650         interface->network_info.private_passphrase = NULL;
651 #if defined TIZEN_EXT
652         interface->network_info.connector = NULL;
653         interface->network_info.c_sign_key = NULL;
654         interface->network_info.net_access_key = NULL;
655 #endif
656 }
657
658 static int store_network_information(GSupplicantInterface * interface,
659                                 GSupplicantSSID *ssid)
660 {
661         interface->network_info.ssid = g_malloc(ssid->ssid_len + 1);
662         if (interface->network_info.ssid != NULL) {
663                 memcpy(interface->network_info.ssid, ssid->ssid,
664                         ssid->ssid_len);
665                 interface->network_info.ssid[ssid->ssid_len] = '\0';
666         } else {
667                 return -ENOMEM;
668         }
669
670         interface->network_info.security = ssid->security;
671
672         if ((ssid->security == G_SUPPLICANT_SECURITY_WEP ||
673                 ssid->security == G_SUPPLICANT_SECURITY_PSK ||
674 #if defined TIZEN_EXT
675                 ssid->security == G_SUPPLICANT_SECURITY_SAE ||
676                 ssid->security == G_SUPPLICANT_SECURITY_PSK_SHA256 ||
677 #endif
678                 ssid->security == G_SUPPLICANT_SECURITY_NONE) &&
679                 ssid->passphrase) {
680                 interface->network_info.passphrase = g_strdup(ssid->passphrase);
681         }
682
683         if (ssid->security == G_SUPPLICANT_SECURITY_IEEE8021X &&
684                         ssid->private_key_passphrase) {
685                 interface->network_info.private_passphrase =
686                         g_strdup(ssid->private_key_passphrase);
687         }
688
689         return 0;
690 }
691
692 static void callback_system_ready(void)
693 {
694         if (system_ready)
695                 return;
696
697         system_ready = TRUE;
698
699         if (!callbacks_pointer)
700                 return;
701
702         if (!callbacks_pointer->system_ready)
703                 return;
704
705         callbacks_pointer->system_ready();
706 }
707
708 static void callback_system_killed(void)
709 {
710         system_ready = FALSE;
711
712         if (!callbacks_pointer)
713                 return;
714
715         if (!callbacks_pointer->system_killed)
716                 return;
717
718         callbacks_pointer->system_killed();
719 }
720
721 static void callback_interface_added(GSupplicantInterface *interface)
722 {
723         SUPPLICANT_DBG("");
724
725         if (!callbacks_pointer)
726                 return;
727
728         if (!callbacks_pointer->interface_added)
729                 return;
730
731         callbacks_pointer->interface_added(interface);
732 }
733
734 static void callback_interface_state(GSupplicantInterface *interface)
735 {
736         if (!callbacks_pointer)
737                 return;
738
739         if (!callbacks_pointer->interface_state)
740                 return;
741
742         callbacks_pointer->interface_state(interface);
743 }
744
745 static void callback_interface_removed(GSupplicantInterface *interface)
746 {
747         if (!callbacks_pointer)
748                 return;
749
750         if (!callbacks_pointer->interface_removed)
751                 return;
752
753         callbacks_pointer->interface_removed(interface);
754 }
755
756 #if !defined TIZEN_EXT
757 static void callback_p2p_support(GSupplicantInterface *interface)
758 {
759         SUPPLICANT_DBG("");
760
761         if (!interface->p2p_support)
762                 return;
763
764         if (callbacks_pointer && callbacks_pointer->p2p_support)
765                 callbacks_pointer->p2p_support(interface);
766 }
767 #endif
768
769 #if defined TIZEN_EXT_WIFI_MESH
770 static void callback_mesh_support(GSupplicantInterface *interface)
771 {
772         SUPPLICANT_DBG("");
773
774         if (!interface->mesh_support)
775                 return;
776
777         if (callbacks_pointer && callbacks_pointer->mesh_support)
778                 callbacks_pointer->mesh_support(interface);
779 }
780
781 bool g_supplicant_interface_has_mesh(GSupplicantInterface *interface)
782 {
783         if (!interface)
784                 return false;
785
786         return interface->mesh_support;
787 }
788 #endif
789
790 static void callback_scan_started(GSupplicantInterface *interface)
791 {
792         if (!callbacks_pointer)
793                 return;
794
795         if (!callbacks_pointer->scan_started)
796                 return;
797
798         callbacks_pointer->scan_started(interface);
799 }
800
801 static void callback_ap_create_fail(GSupplicantInterface *interface)
802 {
803         if (!callbacks_pointer)
804                 return;
805
806         if (!callbacks_pointer->ap_create_fail)
807                 return;
808
809         callbacks_pointer->ap_create_fail(interface);
810 }
811
812 static void callback_scan_finished(GSupplicantInterface *interface)
813 {
814         if (!callbacks_pointer)
815                 return;
816
817         if (!callbacks_pointer->scan_finished)
818                 return;
819
820         callbacks_pointer->scan_finished(interface);
821 }
822
823 static void callback_network_added(GSupplicantNetwork *network)
824 {
825         if (!callbacks_pointer)
826                 return;
827
828         if (!callbacks_pointer->network_added)
829                 return;
830
831         callbacks_pointer->network_added(network);
832 }
833
834 static void callback_network_removed(GSupplicantNetwork *network)
835 {
836         if (!callbacks_pointer)
837                 return;
838
839         if (!callbacks_pointer->network_removed)
840                 return;
841
842         callbacks_pointer->network_removed(network);
843 }
844
845 #if defined TIZEN_EXT
846 static void callback_network_merged(GSupplicantNetwork *network)
847 {
848         if (!callbacks_pointer)
849                 return;
850
851         if (!callbacks_pointer->network_merged)
852                 return;
853
854         callbacks_pointer->network_merged(network);
855 }
856
857 static void callback_assoc_failed(void *user_data)
858 {
859         if (!callbacks_pointer)
860                 return;
861
862         if (!callbacks_pointer->assoc_failed)
863                 return;
864
865         callbacks_pointer->assoc_failed(user_data);
866 }
867
868 static void callback_scan_done(GSupplicantInterface *interface)
869 {
870         if (!callbacks_pointer)
871                 return;
872
873         if (!callbacks_pointer->scan_done)
874                 return;
875
876         callbacks_pointer->scan_done(interface);
877 }
878 #endif
879
880 static void callback_network_changed(GSupplicantNetwork *network,
881                                         const char *property)
882 {
883         if (!callbacks_pointer)
884                 return;
885
886         if (!callbacks_pointer->network_changed)
887                 return;
888
889         callbacks_pointer->network_changed(network, property);
890 }
891
892 static void callback_network_associated(GSupplicantNetwork *network)
893 {
894         if (!callbacks_pointer)
895                 return;
896
897         if (!callbacks_pointer->network_associated)
898                 return;
899
900         callbacks_pointer->network_associated(network);
901 }
902
903 static void callback_sta_authorized(GSupplicantInterface *interface,
904                                         const char *addr)
905 {
906         if (!callbacks_pointer)
907                 return;
908
909         if (!callbacks_pointer->sta_authorized)
910                 return;
911
912         callbacks_pointer->sta_authorized(interface, addr);
913 }
914
915 static void callback_sta_deauthorized(GSupplicantInterface *interface,
916                                         const char *addr)
917 {
918         if (!callbacks_pointer)
919                 return;
920
921         if (!callbacks_pointer->sta_deauthorized)
922                 return;
923
924         callbacks_pointer->sta_deauthorized(interface, addr);
925 }
926
927 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
928 static void callback_eap(GSupplicantInterface *interface, bool status)
929 {
930         if (!callbacks_pointer)
931                 return;
932
933         if (!callbacks_pointer->eap)
934                 return;
935
936         callbacks_pointer->eap(interface, status);
937 }
938 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
939
940 static void callback_peer_found(GSupplicantPeer *peer)
941 {
942         if (!callbacks_pointer)
943                 return;
944
945         if (!callbacks_pointer->peer_found)
946                 return;
947
948         callbacks_pointer->peer_found(peer);
949 }
950
951 static void callback_peer_lost(GSupplicantPeer *peer)
952 {
953         if (!callbacks_pointer)
954                 return;
955
956         if (!callbacks_pointer->peer_lost)
957                 return;
958
959         callbacks_pointer->peer_lost(peer);
960 }
961
962 static void callback_peer_changed(GSupplicantPeer *peer,
963                                                 GSupplicantPeerState state)
964 {
965         if (!callbacks_pointer)
966                 return;
967
968         if (!callbacks_pointer->peer_changed)
969                 return;
970
971         callbacks_pointer->peer_changed(peer, state);
972 }
973
974 static void callback_peer_request(GSupplicantPeer *peer)
975 {
976         if (!callbacks_pointer)
977                 return;
978
979         if (!callbacks_pointer->peer_request)
980                 return;
981
982         peer->connection_requested = true;
983
984         callbacks_pointer->peer_request(peer);
985 }
986
987 static void callback_disconnect_reason_code(GSupplicantInterface *interface,
988                                         int reason_code)
989 {
990         if (!callbacks_pointer)
991                 return;
992
993         if (!callbacks_pointer->disconnect_reasoncode)
994                 return;
995
996         if (reason_code != 0)
997                 callbacks_pointer->disconnect_reasoncode(interface,
998                                                         reason_code);
999 }
1000
1001 static void callback_assoc_status_code(GSupplicantInterface *interface,
1002                                 int status_code)
1003 {
1004         if (!callbacks_pointer)
1005                 return;
1006
1007         if (!callbacks_pointer->assoc_status_code)
1008                 return;
1009
1010         callbacks_pointer->assoc_status_code(interface, status_code);
1011
1012 }
1013
1014 static void remove_group(gpointer data)
1015 {
1016         GSupplicantGroup *group = data;
1017
1018         if (group->members)
1019                 g_slist_free_full(group->members, g_free);
1020
1021         g_free(group->path);
1022         g_free(group);
1023 }
1024
1025 static void remove_interface(gpointer data)
1026 {
1027         GSupplicantInterface *interface = data;
1028
1029         g_hash_table_destroy(interface->bss_mapping);
1030         g_hash_table_destroy(interface->network_table);
1031         g_hash_table_destroy(interface->peer_table);
1032         g_hash_table_destroy(interface->group_table);
1033
1034         if (interface->scan_callback) {
1035                 SUPPLICANT_DBG("call interface %p callback %p scanning %d",
1036                                 interface, interface->scan_callback,
1037                                 interface->scanning);
1038
1039                 interface->scan_callback(-EIO, interface, interface->scan_data);
1040                 interface->scan_callback = NULL;
1041                 interface->scan_data = NULL;
1042
1043                 if (interface->scanning) {
1044                         interface->scanning = FALSE;
1045                         callback_scan_finished(interface);
1046                 }
1047         }
1048
1049         callback_interface_removed(interface);
1050
1051         g_free(interface->wps_cred.key);
1052         g_free(interface->path);
1053         g_free(interface->network_path);
1054 #if defined TIZEN_EXT
1055         interface->network_path = NULL;
1056 #endif
1057         g_free(interface->ifname);
1058         g_free(interface->driver);
1059         g_free(interface->bridge);
1060         remove_network_information(interface);
1061         g_free(interface);
1062 }
1063
1064 static void remove_network(gpointer data)
1065 {
1066         GSupplicantNetwork *network = data;
1067
1068         g_hash_table_destroy(network->bss_table);
1069
1070         callback_network_removed(network);
1071
1072         g_hash_table_destroy(network->config_table);
1073 #if defined TIZEN_EXT
1074         g_hash_table_destroy(network->assoc_reject_table);
1075 #endif
1076
1077         g_free(network->path);
1078         g_free(network->group);
1079         g_free(network->name);
1080 #if defined TIZEN_EXT
1081         g_free(network->eap);
1082         g_free(network->identity);
1083         g_free(network->phase2);
1084 #endif
1085 #if defined TIZEN_EXT
1086         g_slist_free_full(network->vsie_list, g_free);
1087 #endif
1088
1089         g_free(network);
1090 }
1091
1092 static void remove_bss(gpointer data)
1093 {
1094         struct g_supplicant_bss *bss = data;
1095
1096         supplicant_dbus_property_call_cancel_all(bss);
1097
1098         g_free(bss->path);
1099 #if defined TIZEN_EXT
1100         g_slist_free_full(bss->vsie_list, g_free);
1101 #endif
1102         g_free(bss);
1103 }
1104
1105 static void remove_peer(gpointer data)
1106 {
1107         GSupplicantPeer *peer = data;
1108
1109         callback_peer_lost(peer);
1110
1111         if (peer->groups)
1112                 g_slist_free_full(peer->groups, g_free);
1113
1114         if (peer_mapping)
1115                 g_hash_table_remove(peer_mapping, peer->path);
1116
1117         if (pending_peer_connection)
1118                 g_hash_table_remove(pending_peer_connection, peer->path);
1119
1120         g_free(peer->path);
1121         g_free(peer->name);
1122         g_free(peer->identifier);
1123         g_free(peer->widi_ies);
1124
1125         g_free(peer);
1126 }
1127
1128 #if defined TIZEN_EXT
1129 static void remove_assoc_data(gpointer data)
1130 {
1131         struct assoc_reject_data *assoc_data = data;
1132
1133         g_free(assoc_data->bssid);
1134         g_slist_free(assoc_data->reject_time_list);
1135
1136         g_free(assoc_data);
1137 }
1138 #endif
1139
1140 static void debug_strvalmap(const char *label, struct strvalmap *map,
1141                                                         unsigned int val)
1142 {
1143         int i;
1144 #if defined TIZEN_EXT
1145         if (!simplified_log)
1146 #endif
1147         for (i = 0; map[i].str; i++) {
1148                 if (val & map[i].val)
1149                         SUPPLICANT_DBG("%s: %s", label, map[i].str);
1150         }
1151 }
1152
1153 static void interface_capability_keymgmt(DBusMessageIter *iter, void *user_data)
1154 {
1155         GSupplicantInterface *interface = user_data;
1156         const char *str = NULL;
1157         int i;
1158
1159         dbus_message_iter_get_basic(iter, &str);
1160         if (!str)
1161                 return;
1162
1163         for (i = 0; keymgmt_map[i].str; i++)
1164                 if (strcmp(str, keymgmt_map[i].str) == 0) {
1165                         interface->keymgmt_capa |= keymgmt_map[i].val;
1166                         break;
1167                 }
1168 }
1169
1170 static void interface_capability_authalg(DBusMessageIter *iter, void *user_data)
1171 {
1172         GSupplicantInterface *interface = user_data;
1173         const char *str = NULL;
1174         int i;
1175
1176         dbus_message_iter_get_basic(iter, &str);
1177         if (!str)
1178                 return;
1179
1180         for (i = 0; authalg_capa_map[i].str; i++)
1181                 if (strcmp(str, authalg_capa_map[i].str) == 0) {
1182                         interface->authalg_capa |= authalg_capa_map[i].val;
1183                         break;
1184                 }
1185 }
1186
1187 static void interface_capability_proto(DBusMessageIter *iter, void *user_data)
1188 {
1189         GSupplicantInterface *interface = user_data;
1190         const char *str = NULL;
1191         int i;
1192
1193         dbus_message_iter_get_basic(iter, &str);
1194         if (!str)
1195                 return;
1196
1197         for (i = 0; proto_capa_map[i].str; i++)
1198                 if (strcmp(str, proto_capa_map[i].str) == 0) {
1199                         interface->proto_capa |= proto_capa_map[i].val;
1200                         break;
1201                 }
1202 }
1203
1204 static void interface_capability_pairwise(DBusMessageIter *iter,
1205                                                         void *user_data)
1206 {
1207         GSupplicantInterface *interface = user_data;
1208         const char *str = NULL;
1209         int i;
1210
1211         dbus_message_iter_get_basic(iter, &str);
1212         if (!str)
1213                 return;
1214
1215         for (i = 0; pairwise_map[i].str; i++)
1216                 if (strcmp(str, pairwise_map[i].str) == 0) {
1217                         interface->pairwise_capa |= pairwise_map[i].val;
1218                         break;
1219                 }
1220 }
1221
1222 static void interface_capability_group(DBusMessageIter *iter, void *user_data)
1223 {
1224         GSupplicantInterface *interface = user_data;
1225         const char *str = NULL;
1226         int i;
1227
1228         dbus_message_iter_get_basic(iter, &str);
1229         if (!str)
1230                 return;
1231
1232         for (i = 0; group_map[i].str; i++)
1233                 if (strcmp(str, group_map[i].str) == 0) {
1234                         interface->group_capa |= group_map[i].val;
1235                         break;
1236                 }
1237 }
1238
1239 static void interface_capability_scan(DBusMessageIter *iter, void *user_data)
1240 {
1241         GSupplicantInterface *interface = user_data;
1242         const char *str = NULL;
1243         int i;
1244
1245         dbus_message_iter_get_basic(iter, &str);
1246         if (!str)
1247                 return;
1248
1249         for (i = 0; scan_capa_map[i].str; i++)
1250                 if (strcmp(str, scan_capa_map[i].str) == 0) {
1251                         interface->scan_capa |= scan_capa_map[i].val;
1252                         break;
1253                 }
1254 }
1255
1256 static void interface_capability_mode(DBusMessageIter *iter, void *user_data)
1257 {
1258         GSupplicantInterface *interface = user_data;
1259         const char *str = NULL;
1260         int i;
1261
1262         dbus_message_iter_get_basic(iter, &str);
1263         if (!str)
1264                 return;
1265
1266         for (i = 0; mode_capa_map[i].str; i++)
1267                 if (strcmp(str, mode_capa_map[i].str) == 0) {
1268                         interface->mode_capa |= mode_capa_map[i].val;
1269                         break;
1270                 }
1271 }
1272
1273 static void interface_capability(const char *key, DBusMessageIter *iter,
1274                                                         void *user_data)
1275 {
1276         GSupplicantInterface *interface = user_data;
1277
1278         if (!key)
1279                 return;
1280
1281         if (g_strcmp0(key, "KeyMgmt") == 0)
1282                 supplicant_dbus_array_foreach(iter,
1283                                 interface_capability_keymgmt, interface);
1284         else if (g_strcmp0(key, "AuthAlg") == 0)
1285                 supplicant_dbus_array_foreach(iter,
1286                                 interface_capability_authalg, interface);
1287         else if (g_strcmp0(key, "Protocol") == 0)
1288                 supplicant_dbus_array_foreach(iter,
1289                                 interface_capability_proto, interface);
1290         else if (g_strcmp0(key, "Pairwise") == 0)
1291                 supplicant_dbus_array_foreach(iter,
1292                                 interface_capability_pairwise, interface);
1293         else if (g_strcmp0(key, "Group") == 0)
1294                 supplicant_dbus_array_foreach(iter,
1295                                 interface_capability_group, interface);
1296         else if (g_strcmp0(key, "Scan") == 0)
1297                 supplicant_dbus_array_foreach(iter,
1298                                 interface_capability_scan, interface);
1299         else if (g_strcmp0(key, "Modes") == 0)
1300                 supplicant_dbus_array_foreach(iter,
1301                                 interface_capability_mode, interface);
1302         else if (g_strcmp0(key, "MaxScanSSID") == 0) {
1303                 dbus_int32_t max_scan_ssid;
1304
1305                 dbus_message_iter_get_basic(iter, &max_scan_ssid);
1306                 if (max_scan_ssid < 2)
1307                         max_scan_ssid = 0;
1308                 interface->max_scan_ssids = max_scan_ssid;
1309 #if defined TIZEN_EXT
1310         } else if (g_strcmp0(key, "Is5GhzSupported") == 0) {
1311                 dbus_bool_t is_5_0_Ghz_supported;
1312
1313                 dbus_message_iter_get_basic(iter, &is_5_0_Ghz_supported);
1314                 interface->is_5_0_Ghz_supported = is_5_0_Ghz_supported;
1315 #endif
1316         } else
1317                 SUPPLICANT_DBG("key %s type %c",
1318                                 key, dbus_message_iter_get_arg_type(iter));
1319 }
1320
1321 static void set_bss_expiration_age(DBusMessageIter *iter, void *user_data)
1322 {
1323         unsigned int bss_expiration_age = GPOINTER_TO_UINT(user_data);
1324
1325         dbus_message_iter_append_basic(iter, DBUS_TYPE_UINT32,
1326                                 &bss_expiration_age);
1327 }
1328
1329 int g_supplicant_interface_set_bss_expiration_age(GSupplicantInterface *interface,
1330                                         unsigned int bss_expiration_age)
1331 {
1332        return supplicant_dbus_property_set(interface->path,
1333                                        SUPPLICANT_INTERFACE ".Interface",
1334                                        "BSSExpireAge", DBUS_TYPE_UINT32_AS_STRING,
1335                                        set_bss_expiration_age, NULL,
1336                                        GUINT_TO_POINTER(bss_expiration_age), NULL);
1337 }
1338
1339 struct set_apscan_data
1340 {
1341         unsigned int ap_scan;
1342         GSupplicantInterface *interface;
1343 };
1344
1345 static void set_apscan(DBusMessageIter *iter, void *user_data)
1346 {
1347         struct set_apscan_data *data = user_data;
1348         unsigned int ap_scan = data->ap_scan;
1349
1350         dbus_message_iter_append_basic(iter, DBUS_TYPE_UINT32, &ap_scan);
1351 }
1352
1353 static void set_apscan_complete(const char *error,
1354                 DBusMessageIter *iter, void *user_data)
1355 {
1356         struct set_apscan_data *data = user_data;
1357         GSupplicantInterface *interface = data->interface;
1358
1359         if (error) {
1360                 interface->ap_create_in_progress = false;
1361                 SUPPLICANT_DBG("Set AP scan error %s", error);
1362                 goto error;
1363         }
1364
1365         interface->ap_create_in_progress = true;
1366 error:
1367         dbus_free(data);
1368 }
1369
1370 int g_supplicant_interface_set_apscan(GSupplicantInterface *interface,
1371                                                         unsigned int ap_scan)
1372 {
1373         struct set_apscan_data *data;
1374         int ret;
1375
1376         data = dbus_malloc0(sizeof(*data));
1377
1378         if (!data)
1379                 return -ENOMEM;
1380
1381         data->ap_scan = ap_scan;
1382         data->interface = interface;
1383
1384         ret = supplicant_dbus_property_set(interface->path,
1385                         SUPPLICANT_INTERFACE ".Interface",
1386                         "ApScan", DBUS_TYPE_UINT32_AS_STRING,
1387                         set_apscan, set_apscan_complete, data, NULL);
1388         if (ret < 0)
1389                 dbus_free(data);
1390
1391         return ret;
1392 }
1393
1394 void g_supplicant_interface_set_data(GSupplicantInterface *interface,
1395                                                                 void *data)
1396 {
1397         if (!interface)
1398                 return;
1399
1400         interface->data = data;
1401
1402         if (!data)
1403                 interface->scan_callback = NULL;
1404 }
1405
1406 void *g_supplicant_interface_get_data(GSupplicantInterface *interface)
1407 {
1408         if (!interface)
1409                 return NULL;
1410
1411         return interface->data;
1412 }
1413
1414 const char *g_supplicant_interface_get_ifname(GSupplicantInterface *interface)
1415 {
1416         if (!interface)
1417                 return NULL;
1418
1419         return interface->ifname;
1420 }
1421
1422 #if defined TIZEN_EXT
1423 bool g_supplicant_interface_get_is_5_0_ghz_supported(GSupplicantInterface *interface)
1424 {
1425         if (!interface)
1426                 return NULL;
1427
1428         return interface->is_5_0_Ghz_supported;
1429 }
1430
1431 unsigned char *g_supplicant_interface_get_add_network_bssid(GSupplicantInterface *interface)
1432 {
1433         if (!interface)
1434                 return NULL;
1435
1436         return (unsigned char *)interface->add_network_bssid;
1437 }
1438 #endif
1439
1440 const char *g_supplicant_interface_get_driver(GSupplicantInterface *interface)
1441 {
1442         if (!interface)
1443                 return NULL;
1444
1445         return interface->driver;
1446 }
1447
1448 GSupplicantState g_supplicant_interface_get_state(
1449                                         GSupplicantInterface *interface)
1450 {
1451         if (!interface)
1452                 return G_SUPPLICANT_STATE_UNKNOWN;
1453
1454         return interface->state;
1455 }
1456
1457 const char *g_supplicant_interface_get_wps_key(GSupplicantInterface *interface)
1458 {
1459         if (!interface)
1460                 return NULL;
1461
1462         return (const char *)interface->wps_cred.key;
1463 }
1464
1465 const void *g_supplicant_interface_get_wps_ssid(GSupplicantInterface *interface,
1466                                                         unsigned int *ssid_len)
1467 {
1468         if (!ssid_len)
1469                 return NULL;
1470
1471         if (!interface || interface->wps_cred.ssid_len == 0) {
1472                 *ssid_len = 0;
1473                 return NULL;
1474         }
1475
1476         *ssid_len = interface->wps_cred.ssid_len;
1477         return interface->wps_cred.ssid;
1478 }
1479
1480 GSupplicantWpsState g_supplicant_interface_get_wps_state(
1481                                         GSupplicantInterface *interface)
1482 {
1483         if (!interface)
1484                 return G_SUPPLICANT_WPS_STATE_UNKNOWN;
1485
1486         return interface->wps_state;
1487 }
1488
1489 unsigned int g_supplicant_interface_get_mode(GSupplicantInterface *interface)
1490 {
1491         if (!interface)
1492                 return 0;
1493
1494         return interface->mode_capa;
1495 }
1496
1497 unsigned int g_supplicant_interface_get_max_scan_ssids(
1498                                 GSupplicantInterface *interface)
1499 {
1500         if (!interface)
1501                 return 0;
1502
1503         if (interface->max_scan_ssids == 0)
1504                 return WPAS_MAX_SCAN_SSIDS;
1505
1506         return interface->max_scan_ssids;
1507 }
1508
1509 static void set_network_enabled(DBusMessageIter *iter, void *user_data)
1510 {
1511         dbus_bool_t enable = *(dbus_bool_t *)user_data;
1512
1513         dbus_message_iter_append_basic(iter, DBUS_TYPE_BOOLEAN, &enable);
1514 }
1515
1516 int g_supplicant_interface_enable_selected_network(GSupplicantInterface *interface,
1517                                                         dbus_bool_t enable)
1518 {
1519         if (!interface)
1520                 return -1;
1521
1522         if (!interface->network_path)
1523                 return -1;
1524
1525         SUPPLICANT_DBG(" ");
1526         return supplicant_dbus_property_set(interface->network_path,
1527                                 SUPPLICANT_INTERFACE ".Network",
1528                                 "Enabled", DBUS_TYPE_BOOLEAN_AS_STRING,
1529                                 set_network_enabled, NULL, &enable, NULL);
1530 }
1531
1532 dbus_bool_t g_supplicant_interface_get_ready(GSupplicantInterface *interface)
1533 {
1534         if (!interface)
1535                 return FALSE;
1536
1537         return interface->ready;
1538 }
1539
1540 GSupplicantInterface *g_supplicant_network_get_interface(
1541                                         GSupplicantNetwork *network)
1542 {
1543         if (!network)
1544                 return NULL;
1545
1546         return network->interface;
1547 }
1548
1549 const char *g_supplicant_network_get_name(GSupplicantNetwork *network)
1550 {
1551         if (!network || !network->name)
1552                 return "";
1553
1554         return network->name;
1555 }
1556
1557 const char *g_supplicant_network_get_identifier(GSupplicantNetwork *network)
1558 {
1559         if (!network || !network->group)
1560                 return "";
1561
1562         return network->group;
1563 }
1564
1565 const char *g_supplicant_network_get_path(GSupplicantNetwork *network)
1566 {
1567         if (!network || !network->path)
1568                 return NULL;
1569
1570         return network->path;
1571 }
1572
1573 const char *g_supplicant_network_get_mode(GSupplicantNetwork *network)
1574 {
1575         if (!network)
1576                 return G_SUPPLICANT_MODE_UNKNOWN;
1577
1578         return mode2string(network->mode);
1579 }
1580
1581 const char *g_supplicant_network_get_security(GSupplicantNetwork *network)
1582 {
1583         if (!network)
1584                 return G_SUPPLICANT_SECURITY_UNKNOWN;
1585
1586         return security2string(network->security);
1587 }
1588
1589 const void *g_supplicant_network_get_ssid(GSupplicantNetwork *network,
1590                                                 unsigned int *ssid_len)
1591 {
1592         if (!network) {
1593                 *ssid_len = 0;
1594                 return NULL;
1595         }
1596
1597         *ssid_len = network->ssid_len;
1598         return network->ssid;
1599 }
1600
1601 dbus_int16_t g_supplicant_network_get_signal(GSupplicantNetwork *network)
1602 {
1603         if (!network)
1604                 return 0;
1605
1606         return network->signal;
1607 }
1608
1609 #if defined TIZEN_EXT
1610 void g_supplicant_network_set_signal(GSupplicantNetwork *network, int signal)
1611 {
1612         if (!network)
1613                 return;
1614
1615         network->signal = (dbus_int16_t)signal;
1616 }
1617
1618 void g_supplicant_network_set_bss_signal(GSupplicantNetwork *network,
1619                 int signal, int snr)
1620 {
1621         struct g_supplicant_bss *best_bss;
1622
1623         if (!network)
1624                 return;
1625
1626         best_bss = network->best_bss;
1627         if (!best_bss)
1628                 return;
1629
1630         best_bss->signal = (dbus_int16_t)signal;
1631         best_bss->snr = (dbus_int16_t)snr;
1632 }
1633 #endif
1634
1635 dbus_uint16_t g_supplicant_network_get_frequency(GSupplicantNetwork *network)
1636 {
1637         if (!network)
1638                 return 0;
1639
1640         return network->frequency;
1641 }
1642
1643 dbus_bool_t g_supplicant_network_get_wps(GSupplicantNetwork *network)
1644 {
1645         if (!network)
1646                 return FALSE;
1647
1648         return network->wps;
1649 }
1650
1651 dbus_bool_t g_supplicant_network_is_wps_active(GSupplicantNetwork *network)
1652 {
1653         if (!network)
1654                 return FALSE;
1655
1656         if (network->wps_capabilities & G_SUPPLICANT_WPS_CONFIGURED)
1657                 return TRUE;
1658
1659         return FALSE;
1660 }
1661
1662 dbus_bool_t g_supplicant_network_is_wps_pbc(GSupplicantNetwork *network)
1663 {
1664         if (!network)
1665                 return FALSE;
1666
1667         if (network->wps_capabilities & G_SUPPLICANT_WPS_PBC)
1668                 return TRUE;
1669
1670         return FALSE;
1671 }
1672
1673 dbus_bool_t g_supplicant_network_is_wps_advertizing(GSupplicantNetwork *network)
1674 {
1675         if (!network)
1676                 return FALSE;
1677
1678         if (network->wps_capabilities & G_SUPPLICANT_WPS_REGISTRAR)
1679                 return TRUE;
1680
1681         return FALSE;
1682 }
1683
1684 #ifdef TIZEN_EXT
1685 GSupplicantPhy_mode g_supplicant_network_get_phy_mode(GSupplicantNetwork *network)
1686 {
1687         if (!network)
1688                 return G_SUPPLICANT_MODE_IEEE80211_UNKNOWN;
1689
1690         return network->phy_mode;
1691 }
1692 #endif
1693
1694 GSupplicantInterface *g_supplicant_peer_get_interface(GSupplicantPeer *peer)
1695 {
1696         if (!peer)
1697                 return NULL;
1698
1699         return peer->interface;
1700 }
1701
1702 const char *g_supplicant_peer_get_path(GSupplicantPeer *peer)
1703 {
1704         if (!peer)
1705                 return NULL;
1706
1707         return peer->path;
1708 }
1709
1710 const char *g_supplicant_peer_get_identifier(GSupplicantPeer *peer)
1711 {
1712         if (!peer)
1713                 return NULL;
1714
1715         return peer->identifier;
1716 }
1717
1718 const void *g_supplicant_peer_get_device_address(GSupplicantPeer *peer)
1719 {
1720         if (!peer)
1721                 return NULL;
1722
1723         return peer->device_address;
1724 }
1725
1726 const void *g_supplicant_peer_get_iface_address(GSupplicantPeer *peer)
1727 {
1728         if (!peer)
1729                 return NULL;
1730
1731         return peer->iface_address;
1732 }
1733
1734 const char *g_supplicant_peer_get_name(GSupplicantPeer *peer)
1735 {
1736         if (!peer)
1737                 return NULL;
1738
1739         return peer->name;
1740 }
1741
1742 #if defined TIZEN_EXT
1743 bool g_supplicant_network_is_hs20AP(GSupplicantNetwork *network)
1744 {
1745         if (!network)
1746                 return 0;
1747
1748         return network->isHS20AP;
1749 }
1750
1751 const char *g_supplicant_network_get_eap(GSupplicantNetwork *network)
1752 {
1753         if (!network || !network->eap)
1754                 return NULL;
1755
1756         return network->eap;
1757 }
1758
1759 const char *g_supplicant_network_get_identity(GSupplicantNetwork *network)
1760 {
1761         if (!network || !network->identity)
1762                 return NULL;
1763
1764         return network->identity;
1765 }
1766
1767 const char *g_supplicant_network_get_phase2(GSupplicantNetwork *network)
1768 {
1769         if (!network || !network->phase2)
1770                 return NULL;
1771
1772         return network->phase2;
1773 }
1774
1775 unsigned int g_supplicant_network_get_keymgmt(GSupplicantNetwork *network)
1776 {
1777         if (!network)
1778                 return 0;
1779
1780         return network->keymgmt;
1781 }
1782
1783 dbus_bool_t g_supplicant_network_get_privacy(GSupplicantNetwork *network)
1784 {
1785         if (!network)
1786                 return FALSE;
1787
1788         return network->privacy;
1789 }
1790
1791 const unsigned char *g_supplicant_network_get_countrycode(GSupplicantNetwork
1792                                                           *network)
1793 {
1794         if (!network)
1795                 return NULL;
1796
1797         return network->country_code;
1798 }
1799
1800 dbus_bool_t g_supplicant_network_is_pmf_required(GSupplicantNetwork *network)
1801 {
1802         if (!network || !network->best_bss)
1803                 return FALSE;
1804
1805         return network->best_bss->pmf_required;
1806 }
1807 #endif
1808
1809 const unsigned char *g_supplicant_peer_get_widi_ies(GSupplicantPeer *peer,
1810                                                                 int *length)
1811 {
1812         if (!peer || !length)
1813                 return NULL;
1814
1815         *length = peer->widi_ies_length;
1816         return peer->widi_ies;
1817 }
1818
1819 bool g_supplicant_peer_is_wps_pbc(GSupplicantPeer *peer)
1820 {
1821         if (!peer)
1822                 return false;
1823
1824         if (peer->wps_capabilities & G_SUPPLICANT_WPS_PBC)
1825                 return true;
1826
1827         return false;
1828 }
1829
1830 bool g_supplicant_peer_is_wps_pin(GSupplicantPeer *peer)
1831 {
1832         if (!peer)
1833                 return false;
1834
1835         if (peer->wps_capabilities & G_SUPPLICANT_WPS_PIN)
1836                 return true;
1837
1838         return false;
1839 }
1840
1841 bool g_supplicant_peer_is_in_a_group(GSupplicantPeer *peer)
1842 {
1843         if (!peer || !peer->groups)
1844                 return false;
1845
1846         return true;
1847 }
1848
1849 GSupplicantInterface *g_supplicant_peer_get_group_interface(GSupplicantPeer *peer)
1850 {
1851         if (!peer)
1852                 return NULL;
1853
1854         return (GSupplicantInterface *) peer->current_group_iface;
1855 }
1856
1857 bool g_supplicant_peer_is_client(GSupplicantPeer *peer)
1858 {
1859         GSupplicantGroup *group;
1860         GSList *list;
1861
1862         if (!peer)
1863                 return false;
1864
1865         for (list = peer->groups; list; list = list->next) {
1866                 const char *path = list->data;
1867
1868                 group = g_hash_table_lookup(group_mapping, path);
1869                 if (!group)
1870                         continue;
1871
1872                 if (group->role != G_SUPPLICANT_GROUP_ROLE_CLIENT ||
1873                                 group->orig_interface != peer->interface)
1874                         continue;
1875
1876                 if (group->interface == peer->current_group_iface)
1877                         return true;
1878         }
1879
1880         return false;
1881 }
1882
1883 bool g_supplicant_peer_has_requested_connection(GSupplicantPeer *peer)
1884 {
1885         if (!peer)
1886                 return false;
1887
1888         return peer->connection_requested;
1889 }
1890
1891 #if defined TIZEN_EXT
1892 /*
1893  * Description: Network client requires additional wifi specific info
1894  */
1895 const unsigned char *g_supplicant_network_get_bssid(GSupplicantNetwork *network)
1896 {
1897         if (network == NULL || network->best_bss == NULL)
1898                 return NULL;
1899
1900         return (const unsigned char *)network->best_bss->bssid;
1901 }
1902
1903 dbus_bool_t g_supplicant_network_get_transition_mode(GSupplicantNetwork *network)
1904 {
1905         if (network == NULL)
1906                 return FALSE;
1907
1908         return network->owe_transition_mode;
1909 }
1910
1911 const unsigned char *g_supplicant_network_get_transition_mode_bssid(GSupplicantNetwork *network)
1912 {
1913         if (network == NULL)
1914                 return NULL;
1915
1916         return (const unsigned char *)network->transition_mode_bssid;
1917 }
1918
1919 const void *g_supplicant_network_get_transition_mode_ssid(GSupplicantNetwork *network,
1920                                                 unsigned int *transition_mode_ssid_len)
1921 {
1922         if (!network) {
1923                 *transition_mode_ssid_len = 0;
1924                 return NULL;
1925         }
1926
1927         *transition_mode_ssid_len = network->transition_mode_ssid_len;
1928         return network->transition_mode_ssid;
1929 }
1930
1931 unsigned int g_supplicant_network_get_maxrate(GSupplicantNetwork *network)
1932 {
1933         if (network == NULL || network->best_bss == NULL)
1934                 return 0;
1935
1936         return network->best_bss->maxrate;
1937 }
1938
1939 const char *g_supplicant_network_get_enc_mode(GSupplicantNetwork *network)
1940 {
1941         if (network == NULL || network->best_bss == NULL)
1942                 return NULL;
1943
1944         if (network->best_bss->security == G_SUPPLICANT_SECURITY_PSK ||
1945                         network->best_bss->security == G_SUPPLICANT_SECURITY_SAE ||
1946                         network->best_bss->security == G_SUPPLICANT_SECURITY_OWE ||
1947                         network->best_bss->security == G_SUPPLICANT_SECURITY_DPP ||
1948                         network->best_bss->security == G_SUPPLICANT_SECURITY_PSK_SHA256 ||
1949                         network->best_bss->security == G_SUPPLICANT_SECURITY_IEEE8021X) {
1950                 unsigned int pairwise;
1951
1952                 pairwise = network->best_bss->rsn_pairwise |
1953                                 network->best_bss->wpa_pairwise;
1954
1955                 if ((pairwise & G_SUPPLICANT_PAIRWISE_CCMP) &&
1956                     (pairwise & G_SUPPLICANT_PAIRWISE_TKIP))
1957                         return "mixed";
1958                 else if (pairwise & G_SUPPLICANT_PAIRWISE_CCMP)
1959                         return "aes";
1960                 else if (pairwise & G_SUPPLICANT_PAIRWISE_TKIP)
1961                         return "tkip";
1962
1963         } else if (network->best_bss->security == G_SUPPLICANT_SECURITY_WEP)
1964                 return "wep";
1965         else if (network->best_bss->security == G_SUPPLICANT_SECURITY_NONE)
1966                 return "none";
1967
1968         return NULL;
1969 }
1970
1971 bool g_supplicant_network_get_rsn_mode(GSupplicantNetwork *network)
1972 {
1973         if (network == NULL || network->best_bss == NULL)
1974                 return 0;
1975
1976         if (network->best_bss->security == G_SUPPLICANT_SECURITY_OWE ||
1977                         network->best_bss->security == G_SUPPLICANT_SECURITY_DPP)
1978                 return false;
1979
1980         if (network->best_bss->rsn_selected) {
1981                 const char *mode = g_supplicant_network_get_enc_mode(network);
1982                 if (g_strcmp0(mode, "aes") == 0 ||
1983                                 g_strcmp0(mode, "mixed") == 0)
1984                         return true;
1985                 else
1986                         return false;
1987         } else
1988                 return false;
1989 }
1990
1991 void *g_supplicant_network_get_wifi_vsie(GSupplicantNetwork *network)
1992 {
1993         GSList *vsie_list = NULL;
1994
1995         if (!network)
1996                 return NULL;
1997
1998         if (g_slist_length(network->vsie_list) > 0) {
1999                 GSList *list = NULL;
2000                 unsigned char *vsie = NULL;
2001                 for (list = network->vsie_list; list; list = list->next) {
2002                         unsigned char *ie = (unsigned char *)list->data;
2003                         if (ie == NULL)
2004                                 continue;
2005                         vsie = (unsigned char *)g_try_malloc0(ie[1]+2); // tag number size(1), tag length size(1)
2006
2007                         if (vsie) {
2008                                 memcpy(vsie, ie, ie[1]+2);
2009                                 vsie_list = g_slist_append(vsie_list, vsie);
2010                         } else
2011                                 SUPPLICANT_DBG("Failed to allocate memory");
2012                 }
2013         }
2014
2015         return vsie_list;
2016 }
2017
2018 static bool compare_bssid(unsigned char *bssid_a, unsigned char *bssid_b)
2019 {
2020         if (!memcmp(bssid_a, bssid_b, WIFI_BSSID_LEN_MAX))
2021                 return true;
2022
2023         return false;
2024 }
2025
2026 #if defined TIZEN_EXT_INS
2027 static gchar *convert_bssid_to_str(unsigned char *bssid)
2028 {
2029         GString *bssid_str;
2030         unsigned int i;
2031
2032         bssid_str = g_string_sized_new(18);
2033         if (!bssid_str)
2034                 return NULL;
2035
2036         for (i = 0; i < WIFI_BSSID_LEN_MAX; i++) {
2037                 g_string_append_printf(bssid_str, "%02x", bssid[i]);
2038                 if (i < WIFI_BSSID_LEN_MAX - 1)
2039                         g_string_append(bssid_str, ":");
2040         }
2041
2042         return g_string_free(bssid_str, FALSE);
2043 }
2044
2045 static void count_assoc_reject(gpointer data, gpointer user_data)
2046 {
2047         time_t assoc_reject_time = GPOINTER_TO_INT(data);
2048         struct assoc_count_data *assoc_count = user_data;
2049
2050         if (assoc_reject_time > assoc_count->ref_time)
2051                 assoc_count->assoc_count++;
2052 }
2053
2054 static uint16_t get_assoc_reject_cnt(GHashTable *assoc_reject_table, unsigned char *bssid)
2055 {
2056         gchar *bssid_str;
2057         struct assoc_reject_data *assoc_data;
2058         struct assoc_count_data assoc_count;
2059         time_t curr_time;
2060         struct tm* timeinfo;
2061
2062         if (g_hash_table_size(assoc_reject_table) < 1)
2063                 return 0;
2064
2065         if (!bssid)
2066                 return 0;
2067
2068         if (!memcmp(bssid, invalid_bssid, WIFI_BSSID_LEN_MAX))
2069                 return 0;
2070
2071         bssid_str = convert_bssid_to_str(bssid);
2072         if (!bssid_str)
2073                 return 0;
2074
2075         assoc_data = g_hash_table_lookup(assoc_reject_table, bssid_str);
2076         if (!assoc_data) {
2077                 g_free(bssid_str);
2078                 return 0;
2079         }
2080
2081         if (g_slist_length(assoc_data->reject_time_list) < 1) {
2082                 g_free(bssid_str);
2083                 return 0;
2084         }
2085
2086         /* Only events that occur within one hour are appened. */
2087         curr_time = time(NULL);
2088         timeinfo = localtime(&curr_time);
2089         timeinfo->tm_hour -= 1;
2090
2091         assoc_count.ref_time = mktime(timeinfo);
2092         assoc_count.assoc_count = 0;
2093
2094         g_slist_foreach(assoc_data->reject_time_list, count_assoc_reject, &assoc_count);
2095
2096         g_free(bssid_str);
2097         return assoc_count.assoc_count;
2098 }
2099
2100 static int calculate_score_last_connected_bssid(bool is_last_connected)
2101 {
2102         int score = 0;
2103
2104         if (ins_settings.last_connected_bssid) {
2105                 if (is_last_connected)
2106                         score += ins_settings.last_connected_bssid_score;
2107         }
2108
2109         return score;
2110 }
2111
2112 static int calculate_score_assoc_reject(uint16_t assoc_reject_cnt)
2113 {
2114         int score = 0;
2115
2116         if (ins_settings.assoc_reject)
2117                 score -= (assoc_reject_cnt * ins_settings.assoc_reject_score);
2118
2119         return score;
2120 }
2121
2122 static int calculate_score_frequency(dbus_int16_t strength, dbus_uint16_t frequency)
2123 {
2124         int score = 0;
2125
2126         switch (ins_settings.preferred_freq_bssid) {
2127         case G_SUPPLICANT_INS_PREFERRED_FREQ_24GHZ:
2128                 if ((frequency >= FREQ_RANGE_24GHZ_CHANNEL_1 &&
2129                         frequency <= FREQ_RANGE_24GHZ_CHANNEL_14) &&
2130                         (strength > ins_settings.signal_level3_24ghz))
2131                         score += ins_settings.preferred_freq_bssid_score;
2132
2133                 break;
2134         case G_SUPPLICANT_INS_PREFERRED_FREQ_5GHZ:
2135                 if ((frequency >= FREQ_RANGE_5GHZ_CHANNEL_32 &&
2136                         frequency <= FREQ_RANGE_5GHZ_CHANNEL_165) &&
2137                         (strength > ins_settings.signal_level3_5ghz))
2138                         score += ins_settings.preferred_freq_bssid_score;
2139
2140                 break;
2141         default:
2142                 break;
2143         }
2144
2145         return score;
2146 }
2147
2148 static int calculate_score_strength(dbus_int16_t strength)
2149 {
2150         int score = 0;
2151
2152         if (ins_settings.signal_bssid)
2153                 score += (((strength > -60) ? -60 : strength) + 85);
2154
2155         return score;
2156 }
2157
2158 static int calculate_score_est_throughput(dbus_uint32_t est_throughput)
2159 {
2160         int score = 0;
2161
2162         if (est_throughput >= 10000)
2163                 score = est_throughput / 10000;
2164
2165         if (score > 40)
2166                 score = 40;
2167
2168         return score;
2169 }
2170
2171 static int calculate_score(bool is_last_connected, uint16_t assoc_reject_cnt,
2172                 dbus_uint16_t frequency, dbus_int16_t strength,
2173                 dbus_int16_t snr, dbus_uint32_t est_throughput)
2174 {
2175         int score = 0;
2176
2177         score += calculate_score_last_connected_bssid(is_last_connected);
2178         score += calculate_score_assoc_reject(assoc_reject_cnt);
2179         score += calculate_score_frequency(strength, frequency);
2180         score += calculate_score_strength(strength);
2181         score += (int)snr;
2182         score += calculate_score_est_throughput(est_throughput);
2183
2184         return score;
2185 }
2186 #endif /* defined TIZEN_EXT_INS */
2187
2188 static void update_bssid_list(gpointer key, gpointer value, gpointer user_data)
2189 {
2190         struct g_supplicant_bss *bss = value;
2191         struct g_connman_bssids *bssids = NULL;
2192         struct update_bssid_data *bssid_data = (struct update_bssid_data *)user_data;
2193
2194         bssids = (struct g_connman_bssids *)g_try_malloc0(sizeof(struct g_connman_bssids));
2195
2196         if (bssids) {
2197                 memcpy(bssids->bssid, bss->bssid, WIFI_BSSID_LEN_MAX);
2198
2199                 bssids->strength = bss->signal;
2200                 bssids->strength += 120;
2201
2202                 if (bssids->strength > 100)
2203                         bssids->strength = 100;
2204
2205                 bssids->frequency = bss->frequency;
2206                 bssids->score_snr = (int)bss->snr;
2207
2208 #if defined TIZEN_EXT_INS
2209                 bssids->assoc_reject_cnt = get_assoc_reject_cnt(bssid_data->assoc_reject_table, bssids->bssid);
2210                 bssids->is_last_connected = compare_bssid(bssids->bssid, bssid_data->last_connected_bssid);
2211
2212                 bssids->score_last_connected_bssid = calculate_score_last_connected_bssid(bssids->is_last_connected);
2213                 bssids->score_assoc_reject = calculate_score_assoc_reject(bssids->assoc_reject_cnt);
2214                 bssids->score_frequency = calculate_score_frequency(bss->signal, bssids->frequency);
2215                 bssids->score_strength = calculate_score_strength(bss->signal);
2216                 bssids->score_est_throughput = calculate_score_est_throughput(bss->est_throughput);
2217
2218                 bssids->ins_score = calculate_score(bssids->is_last_connected,
2219                         bssids->assoc_reject_cnt, bssids->frequency, bss->signal,
2220                         bss->snr, bss->est_throughput);
2221 #else
2222                 bssids->ins_score = bss->signal;
2223 #endif
2224                 bssid_data->bssid_list = g_slist_append(bssid_data->bssid_list, bssids);
2225         } else
2226                 SUPPLICANT_DBG("Failed to allocate memory");
2227 }
2228
2229 static gint cmp_bss(gconstpointer a, gconstpointer b)
2230 {
2231         struct g_connman_bssids *entry_a = (struct g_connman_bssids *)a;
2232         struct g_connman_bssids *entry_b = (struct g_connman_bssids *)b;
2233
2234         if (entry_a->ins_score > entry_b->ins_score)
2235                 return -1;
2236
2237         if (entry_a->ins_score < entry_b->ins_score)
2238                 return 1;
2239
2240         if (entry_a->ins_score == entry_b->ins_score) {
2241                 if (entry_a->strength >= entry_b->strength)
2242                         return -1;
2243                 else
2244                         return 1;
2245         }
2246
2247         return 0;
2248 }
2249
2250 #if defined TIZEN_EXT_INS
2251 static void print_bssid_sort(gpointer data, gpointer user_data)
2252 {
2253         struct g_connman_bssids *bssids = data;
2254
2255         GSupplicantNetwork *network = (GSupplicantNetwork *) user_data;
2256
2257         if (!bssids || !network)
2258                 return;
2259
2260         if (!simplified_log)
2261                 SUPPLICANT_DBG("ssid [%-20s] bssid[" MACSTR "] total[%2d] freq[%2d] "
2262                                 "last_conn[%2d] assoc_reject[%2d] strength[%2d] rssi[%2d]",
2263                                 network->ssid, MAC2STR(bssids->bssid), bssids->ins_score,
2264                                 bssids->score_frequency, bssids->score_last_connected_bssid,
2265                                 bssids->score_assoc_reject, bssids->score_strength, bssids->strength - 120);
2266 }
2267 #endif
2268
2269 void *g_supplicant_network_get_bssid_list(GSupplicantNetwork *network)
2270 {
2271         struct update_bssid_data bssid_data;
2272
2273         if (g_hash_table_size(network->bss_table) < 1)
2274                 return NULL;
2275
2276         bssid_data.network = network;
2277         memset(&bssid_data, 0, sizeof(bssid_data));
2278         memcpy(bssid_data.last_connected_bssid, network->last_connected_bssid, WIFI_BSSID_LEN_MAX);
2279         bssid_data.assoc_reject_table = network->assoc_reject_table;
2280
2281         g_hash_table_foreach(network->bss_table, update_bssid_list, &bssid_data);
2282         bssid_data.bssid_list = g_slist_sort(bssid_data.bssid_list, cmp_bss);
2283 #if defined TIZEN_EXT_INS
2284         g_slist_foreach(bssid_data.bssid_list, print_bssid_sort, (gpointer)network);
2285 #endif
2286
2287         return bssid_data.bssid_list;
2288 }
2289
2290 #if defined TIZEN_EXT_INS
2291 void g_supplicant_network_set_last_connected_bssid(GSupplicantNetwork *network, const unsigned char *bssid)
2292 {
2293         if (!bssid)
2294                 return;
2295
2296         if (!memcmp(bssid, invalid_bssid, WIFI_BSSID_LEN_MAX))
2297                 return;
2298
2299         memcpy(network->last_connected_bssid, bssid, WIFI_BSSID_LEN_MAX);
2300
2301         SUPPLICANT_DBG("last connected bssid [" MACSTR "]", MAC2STR(bssid));
2302 }
2303
2304 const unsigned char *g_supplicant_network_get_last_connected_bssid(GSupplicantNetwork *network)
2305 {
2306         if (network == NULL)
2307                 return NULL;
2308
2309         return (const unsigned char *)network->last_connected_bssid;
2310 }
2311
2312 void g_supplicant_network_update_assoc_reject(GSupplicantInterface *interface,
2313                 GSupplicantNetwork *network)
2314 {
2315         struct assoc_reject_data *assoc_data;
2316         gchar *bssid_str;
2317         time_t curr_time;
2318
2319         if (!network)
2320                 return;
2321
2322         bssid_str = convert_bssid_to_str(interface->add_network_bssid);
2323         if (!bssid_str)
2324                 return;
2325
2326         assoc_data = g_hash_table_lookup(network->assoc_reject_table, bssid_str);
2327         if (!assoc_data) {
2328                 assoc_data = g_try_new0(struct assoc_reject_data, 1);
2329                 if (!assoc_data) {
2330                         g_free(bssid_str);
2331                         return;
2332                 }
2333
2334                 assoc_data->bssid = g_strdup(bssid_str);
2335                 g_hash_table_insert(network->assoc_reject_table, assoc_data->bssid, assoc_data);
2336         }
2337
2338         curr_time = time(NULL);
2339         assoc_data->reject_time_list = g_slist_append(assoc_data->reject_time_list, GINT_TO_POINTER(curr_time));
2340
2341         SUPPLICANT_DBG("bssid [%s] time [%u]", bssid_str, curr_time);
2342
2343         g_free(bssid_str);
2344
2345         callback_network_changed(network, "UpdateAssocReject");
2346 }
2347
2348 GHashTable *g_supplicant_network_get_assoc_reject_table(GSupplicantNetwork *network)
2349 {
2350         if (!network)
2351                 return NULL;
2352
2353         return network->assoc_reject_table;
2354 }
2355
2356 static void copy_assoc_reject(gpointer key, gpointer value, gpointer user_data)
2357 {
2358         struct assoc_reject_data *cloned_assoc_data;
2359         struct assoc_reject_data *assoc_data = value;
2360         GHashTable *cloned_assoc_reject_table = user_data;
2361
2362         if (assoc_data && cloned_assoc_reject_table) {
2363                 cloned_assoc_data = g_try_new0(struct assoc_reject_data, 1);
2364                 if (!cloned_assoc_data)
2365                         return;
2366
2367                 cloned_assoc_data->bssid = g_strdup(assoc_data->bssid);
2368                 cloned_assoc_data->reject_time_list = g_slist_copy(assoc_data->reject_time_list);
2369                 g_hash_table_insert(cloned_assoc_reject_table,
2370                                         cloned_assoc_data->bssid, cloned_assoc_data);
2371         }
2372 }
2373
2374 GHashTable *g_supplicant_network_clone_assoc_reject_table(GSupplicantNetwork *network)
2375 {
2376         GHashTable *cloned_assoc_reject_table;
2377
2378         if (!network)
2379                 return NULL;
2380
2381         GHashTable *assoc_reject_table = g_supplicant_network_get_assoc_reject_table(network);
2382         if (!assoc_reject_table)
2383                 return NULL;
2384
2385         cloned_assoc_reject_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2386                                                                 NULL, remove_assoc_data);
2387         g_hash_table_foreach(assoc_reject_table, copy_assoc_reject, cloned_assoc_reject_table);
2388
2389         return cloned_assoc_reject_table;
2390 }
2391 #endif /* defined TIZEN_EXT_INS */
2392
2393 GSupplicantNetwork *g_supplicant_interface_get_network(GSupplicantInterface *interface,
2394                 const char *group)
2395 {
2396         if (!interface)
2397                 return NULL;
2398
2399         return g_hash_table_lookup(interface->network_table, group);
2400 }
2401 #endif /* defined TIZEN_EXT */
2402
2403 static void merge_network(GSupplicantNetwork *network)
2404 {
2405         GString *str;
2406         const char *ssid, *mode, *key_mgmt;
2407 #if defined TIZEN_EXT
2408         const char *isHS20AP;
2409         const char *eap, *identity, *phase2;
2410 #endif
2411         unsigned int i, ssid_len;
2412         char *group;
2413
2414         ssid = g_hash_table_lookup(network->config_table, "ssid");
2415         mode = g_hash_table_lookup(network->config_table, "mode");
2416         key_mgmt = g_hash_table_lookup(network->config_table, "key_mgmt");
2417 #if defined TIZEN_EXT
2418         isHS20AP = g_hash_table_lookup(network->config_table, "isHS20AP");
2419         eap = g_hash_table_lookup(network->config_table, "eap");
2420         identity = g_hash_table_lookup(network->config_table, "identity");
2421         phase2 = g_hash_table_lookup(network->config_table, "phase2");
2422 #endif
2423
2424         SUPPLICANT_DBG("ssid %s mode %s", ssid, mode);
2425
2426         if (ssid)
2427                 ssid_len = strlen(ssid);
2428         else
2429                 ssid_len = 0;
2430
2431         str = g_string_sized_new((ssid_len * 2) + 24);
2432         if (!str)
2433                 return;
2434
2435         for (i = 0; i < ssid_len; i++)
2436 #if defined TIZEN_EXT
2437         {
2438                 if (ssid[i] != '"')
2439 #endif
2440                 g_string_append_printf(str, "%02x", ssid[i]);
2441 #if defined TIZEN_EXT
2442         }
2443 #endif
2444
2445         if (g_strcmp0(mode, "0") == 0)
2446                 g_string_append_printf(str, "_managed");
2447         else if (g_strcmp0(mode, "1") == 0)
2448                 g_string_append_printf(str, "_adhoc");
2449 #if defined TIZEN_EXT_WIFI_MESH
2450         else if (g_strcmp0(mode, "5") == 0)
2451                 g_string_append_printf(str, "_mesh");
2452 #endif
2453
2454         if (g_strcmp0(key_mgmt, "WPA-PSK") == 0)
2455                 g_string_append_printf(str, "_psk");
2456 #if defined TIZEN_EXT
2457         else if (g_strcmp0(key_mgmt, "WPA-EAP") == 0)
2458                 g_string_append_printf(str, "_ieee8021x");
2459         else
2460                 g_string_append_printf(str, "_none");
2461 #endif
2462
2463         group = g_string_free(str, FALSE);
2464
2465         SUPPLICANT_DBG("%s", group);
2466
2467 #if defined TIZEN_EXT
2468         if (g_strcmp0(isHS20AP, "1") == 0) {
2469                 network->isHS20AP = 1;
2470                 if (network->eap)
2471                         g_free(network->eap);
2472                 network->eap = g_strdup(eap);
2473
2474                 if (network->identity)
2475                         g_free(network->identity);
2476                 network->identity = g_strdup(identity);
2477
2478                 if (network->phase2)
2479                         g_free(network->phase2);
2480                 network->phase2 = g_strdup(phase2);
2481         } else
2482                 network->isHS20AP = 0;
2483
2484         network->group = g_strdup(group);
2485         callback_network_merged(network);
2486         g_free(network->group);
2487 #endif
2488
2489         g_free(group);
2490
2491         g_hash_table_destroy(network->config_table);
2492
2493         g_free(network->path);
2494         g_free(network);
2495 }
2496
2497 static void network_property(const char *key, DBusMessageIter *iter,
2498                                                         void *user_data)
2499 {
2500         GSupplicantNetwork *network = user_data;
2501
2502         if (!network->interface)
2503                 return;
2504
2505         if (!key) {
2506                 merge_network(network);
2507                 return;
2508         }
2509
2510         if (g_strcmp0(key, "Enabled") == 0) {
2511                 dbus_bool_t enabled = FALSE;
2512
2513                 dbus_message_iter_get_basic(iter, &enabled);
2514         } else if (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_STRING) {
2515                 const char *str = NULL;
2516
2517                 dbus_message_iter_get_basic(iter, &str);
2518                 if (str) {
2519                         g_hash_table_replace(network->config_table,
2520                                                 g_strdup(key), g_strdup(str));
2521                 }
2522         } else
2523                 SUPPLICANT_DBG("key %s type %c",
2524                                 key, dbus_message_iter_get_arg_type(iter));
2525 }
2526
2527 static void interface_network_added(DBusMessageIter *iter, void *user_data)
2528 {
2529         GSupplicantInterface *interface = user_data;
2530         GSupplicantNetwork *network;
2531         const char *path = NULL;
2532
2533         SUPPLICANT_DBG("");
2534
2535         dbus_message_iter_get_basic(iter, &path);
2536         if (!path)
2537                 return;
2538
2539         if (g_strcmp0(path, "/") == 0)
2540                 return;
2541
2542         network = g_try_new0(GSupplicantNetwork, 1);
2543         if (!network)
2544                 return;
2545
2546         network->interface = interface;
2547         network->path = g_strdup(path);
2548
2549         network->config_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2550                                                         g_free, g_free);
2551
2552         dbus_message_iter_next(iter);
2553         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
2554                 supplicant_dbus_property_foreach(iter, network_property,
2555                                                                 network);
2556                 network_property(NULL, NULL, network);
2557                 return;
2558         }
2559
2560         supplicant_dbus_property_get_all(path,
2561                                 SUPPLICANT_INTERFACE ".Network",
2562                                         network_property, network, NULL);
2563 }
2564
2565 static void interface_network_removed(DBusMessageIter *iter, void *user_data)
2566 {
2567         SUPPLICANT_DBG("");
2568 }
2569
2570 static char *create_name(unsigned char *ssid, int ssid_len)
2571 {
2572         GString *string;
2573         const gchar *remainder, *invalid;
2574         int valid_bytes, remaining_bytes;
2575
2576         if (ssid_len < 1 || ssid[0] == '\0')
2577                 return g_strdup("");
2578
2579         string = NULL;
2580         remainder = (const gchar *)ssid;
2581         remaining_bytes = ssid_len;
2582
2583         while (remaining_bytes != 0) {
2584                 if (g_utf8_validate(remainder, remaining_bytes,
2585                                         &invalid)) {
2586                         break;
2587                 }
2588
2589                 valid_bytes = invalid - remainder;
2590
2591                 if (!string)
2592                         string = g_string_sized_new(remaining_bytes);
2593
2594                 g_string_append_len(string, remainder, valid_bytes);
2595
2596                 /* append U+FFFD REPLACEMENT CHARACTER */
2597                 g_string_append(string, "\357\277\275");
2598
2599                 remaining_bytes -= valid_bytes + 1;
2600                 remainder = invalid + 1;
2601         }
2602
2603         if (!string)
2604                 return g_strndup((const gchar *)ssid, ssid_len + 1);
2605
2606         g_string_append(string, remainder);
2607
2608         return g_string_free(string, FALSE);
2609 }
2610
2611 static char *create_group(struct g_supplicant_bss *bss)
2612 {
2613         GString *str;
2614         unsigned int i;
2615         const char *mode, *security;
2616
2617         str = g_string_sized_new((bss->ssid_len * 2) + 24);
2618         if (!str)
2619                 return NULL;
2620
2621         if (bss->ssid_len > 0 && bss->ssid[0] != '\0') {
2622                 for (i = 0; i < bss->ssid_len; i++)
2623                         g_string_append_printf(str, "%02x", bss->ssid[i]);
2624         } else
2625                 g_string_append_printf(str, "hidden");
2626
2627         mode = mode2string(bss->mode);
2628         if (mode)
2629                 g_string_append_printf(str, "_%s", mode);
2630
2631 #if defined TIZEN_EXT
2632         if (bss->security == G_SUPPLICANT_SECURITY_PSK_SHA256)
2633                 security = "psk";
2634         else
2635                 security = security2string(bss->security);
2636 #else
2637         security = security2string(bss->security);
2638 #endif
2639         if (security)
2640                 g_string_append_printf(str, "_%s", security);
2641
2642         return g_string_free(str, FALSE);
2643 }
2644 #if defined TIZEN_EXT
2645 static void update_network_with_best_bss(GSupplicantNetwork *network,
2646                 struct g_supplicant_bss *best_bss)
2647 {
2648         /*
2649          * Do not change best BSS if we are connected.
2650          */
2651         if (network->interface->state == G_SUPPLICANT_STATE_COMPLETED && network->best_bss)
2652                 return;
2653
2654         network->signal = best_bss->signal;
2655         network->frequency = best_bss->frequency;
2656         network->best_bss = best_bss;
2657 }
2658
2659 static bool update_best_bss(GSupplicantNetwork *network,
2660                 struct g_supplicant_bss *bss, struct g_supplicant_bss *best_bss)
2661 {
2662         int score_new;
2663         int score_best;
2664
2665         if (network->best_bss == NULL) {
2666                 update_network_with_best_bss(network, bss);
2667                 return true;
2668         }
2669
2670 #if defined TIZEN_EXT_INS
2671         score_new = calculate_score(
2672                 compare_bssid(bss->bssid, network->last_connected_bssid),
2673                 get_assoc_reject_cnt(network->assoc_reject_table, bss->bssid),
2674                 bss->frequency, bss->signal, bss->snr, bss->est_throughput);
2675
2676         score_best = calculate_score(
2677                 compare_bssid(network->best_bss->bssid, network->last_connected_bssid),
2678                 get_assoc_reject_cnt(network->assoc_reject_table, network->best_bss->bssid),
2679                 network->best_bss->frequency, network->best_bss->signal,
2680                 network->best_bss->snr, network->best_bss->est_throughput);
2681 #else
2682         score_new = bss->signal;
2683         score_best = network->best_bss->signal;
2684 #endif
2685
2686         if (score_new > score_best) {
2687                 SUPPLICANT_DBG("new[" MACSTR "][%d] : best[" MACSTR "][%d]",
2688                         MAC2STR(bss->bssid), score_new,
2689                         MAC2STR(network->best_bss->bssid), score_best);
2690
2691                 update_network_with_best_bss(network, bss);
2692
2693                 SUPPLICANT_DBG("Update best BSS for %s", network->name);
2694
2695                 return true;
2696         }
2697
2698         return false;
2699 }
2700 #endif
2701 static int add_or_replace_bss_to_network(struct g_supplicant_bss *bss)
2702 {
2703         GSupplicantInterface *interface = bss->interface;
2704         GSupplicantNetwork *network;
2705         char *group;
2706         bool is_new_network;
2707
2708         group = create_group(bss);
2709         SUPPLICANT_DBG("New group created: %s", group);
2710
2711         if (!group)
2712                 return -ENOMEM;
2713
2714         network = g_hash_table_lookup(interface->network_table, group);
2715         if (network) {
2716                 g_free(group);
2717                 SUPPLICANT_DBG("Network %s already exist", network->name);
2718                 is_new_network = false;
2719
2720                 goto done;
2721         }
2722
2723         is_new_network = true;
2724
2725         network = g_try_new0(GSupplicantNetwork, 1);
2726         if (!network) {
2727                 g_free(group);
2728                 return -ENOMEM;
2729         }
2730
2731         network->interface = interface;
2732         if (!network->path)
2733                 network->path = g_strdup(bss->path);
2734         network->group = group;
2735         network->name = create_name(bss->ssid, bss->ssid_len);
2736         network->mode = bss->mode;
2737         network->security = bss->security;
2738         network->ssid_len = bss->ssid_len;
2739         memcpy(network->ssid, bss->ssid, bss->ssid_len);
2740         network->signal = bss->signal;
2741         network->frequency = bss->frequency;
2742         network->best_bss = bss;
2743
2744         if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
2745                 network->wps = TRUE;
2746                 network->wps_capabilities = bss->wps_capabilities;
2747         }
2748
2749 #if defined TIZEN_EXT
2750         network->owe_transition_mode = bss->owe_transition_mode;
2751         network->privacy = bss->privacy;
2752         memcpy(network->transition_mode_ssid, bss->transition_mode_ssid, bss->transition_mode_ssid_len);
2753         memcpy(network->transition_mode_bssid, bss->transition_mode_bssid, WIFI_BSSID_LEN_MAX);
2754
2755         network->keymgmt = bss->keymgmt;
2756
2757         if (g_slist_length(bss->vsie_list) > 0) {
2758                 GSList *list = NULL;
2759                 unsigned char *vsie = NULL;
2760                 for (list = bss->vsie_list; list; list = list->next) {
2761                         unsigned char *ie = (unsigned char *)list->data;
2762                         vsie = (unsigned char *)g_try_malloc0(ie[1]+2); // tag number size(1), tag length size(1)
2763
2764                         if (vsie) {
2765                                 memcpy(vsie, ie, ie[1]+2);
2766                                 network->vsie_list = g_slist_append(network->vsie_list, vsie);
2767                         } else
2768                                 SUPPLICANT_DBG("Failed to allocate memory.");
2769                 }
2770         }
2771
2772         network->isHS20AP = bss->hs20;
2773         memcpy(network->country_code, bss->country_code, COUNTRY_CODE_LENGTH);
2774         network->phy_mode = bss->phy_mode;
2775 #endif
2776
2777         SUPPLICANT_DBG("New network %s created", network->name);
2778
2779         network->bss_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2780                                                         NULL, remove_bss);
2781
2782         network->config_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2783                                                         g_free, g_free);
2784
2785 #if defined TIZEN_EXT
2786         network->assoc_reject_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2787                                                         NULL, remove_assoc_data);
2788 #endif
2789
2790         g_hash_table_replace(interface->network_table,
2791                                                 network->group, network);
2792
2793         callback_network_added(network);
2794
2795 done:
2796         /* We update network's WPS properties if only bss provides WPS. */
2797         if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
2798                 network->wps = TRUE;
2799                 network->wps_capabilities = bss->wps_capabilities;
2800
2801                 if (!is_new_network)
2802                         callback_network_changed(network, "WPSCapabilities");
2803         }
2804
2805         /*
2806          * Do not change best BSS if we are connected. It will be done through
2807          * CurrentBSS property in case of misalignment with wpa_s or roaming.
2808          */
2809 #if defined TIZEN_EXT
2810         if (network != interface->current_network) {
2811                 if (update_best_bss(network, bss, network->best_bss))
2812                         callback_network_changed(network, "Signal");
2813         }
2814 #else
2815         if (network != interface->current_network &&
2816                                 bss->signal > network->signal) {
2817                 network->signal = bss->signal;
2818                 network->best_bss = bss;
2819                 callback_network_changed(network, "Signal");
2820         }
2821 #endif
2822
2823         g_hash_table_replace(interface->bss_mapping, bss->path, network);
2824         g_hash_table_replace(network->bss_table, bss->path, bss);
2825
2826         g_hash_table_replace(bss_mapping, bss->path, interface);
2827
2828         return 0;
2829 }
2830
2831 static void bss_rates(DBusMessageIter *iter, void *user_data)
2832 {
2833         struct g_supplicant_bss *bss = user_data;
2834         dbus_uint32_t rate = 0;
2835
2836         dbus_message_iter_get_basic(iter, &rate);
2837         if (rate == 0)
2838                 return;
2839
2840         if (rate > bss->maxrate)
2841                 bss->maxrate = rate;
2842 }
2843
2844 static void bss_keymgmt(DBusMessageIter *iter, void *user_data)
2845 {
2846         unsigned int *keymgmt = user_data;
2847         const char *str = NULL;
2848         int i;
2849
2850         dbus_message_iter_get_basic(iter, &str);
2851         if (!str)
2852                 return;
2853
2854         for (i = 0; keymgmt_map[i].str; i++)
2855                 if (strcmp(str, keymgmt_map[i].str) == 0) {
2856                         SUPPLICANT_DBG("Keymgmt: %s", str);
2857                         *keymgmt |= keymgmt_map[i].val;
2858                         break;
2859                 }
2860 }
2861
2862 static void bss_group(DBusMessageIter *iter, void *user_data)
2863 {
2864         unsigned int *group = user_data;
2865         const char *str = NULL;
2866         int i;
2867
2868         dbus_message_iter_get_basic(iter, &str);
2869         if (!str)
2870                 return;
2871
2872         for (i = 0; group_map[i].str; i++)
2873                 if (strcmp(str, group_map[i].str) == 0) {
2874                         SUPPLICANT_DBG("Group: %s", str);
2875                         *group |= group_map[i].val;
2876                         break;
2877                 }
2878 }
2879
2880 static void bss_pairwise(DBusMessageIter *iter, void *user_data)
2881 {
2882         unsigned int *pairwise = user_data;
2883         const char *str = NULL;
2884         int i;
2885
2886         dbus_message_iter_get_basic(iter, &str);
2887         if (!str)
2888                 return;
2889
2890         for (i = 0; pairwise_map[i].str; i++)
2891                 if (strcmp(str, pairwise_map[i].str) == 0) {
2892                         SUPPLICANT_DBG("Pairwise: %s", str);
2893                         *pairwise |= pairwise_map[i].val;
2894                         break;
2895                 }
2896 }
2897
2898 static void bss_wpa(const char *key, DBusMessageIter *iter,
2899                         void *user_data)
2900 {
2901         struct g_supplicant_bss *bss = user_data;
2902         unsigned int value = 0;
2903
2904         SUPPLICANT_DBG("Key: %s", key);
2905
2906         if (g_strcmp0(key, "KeyMgmt") == 0) {
2907                 supplicant_dbus_array_foreach(iter, bss_keymgmt, &value);
2908
2909                 if (bss->rsn_selected)
2910                         bss->rsn_keymgmt = value;
2911                 else
2912                         bss->wpa_keymgmt = value;
2913         } else if (g_strcmp0(key, "Group") == 0) {
2914                 supplicant_dbus_array_foreach(iter, bss_group, &value);
2915
2916                 if (bss->rsn_selected)
2917                         bss->rsn_group = value;
2918                 else
2919                         bss->wpa_group = value;
2920         } else if (g_strcmp0(key, "Pairwise") == 0) {
2921                 supplicant_dbus_array_foreach(iter, bss_pairwise, &value);
2922
2923                 if (bss->rsn_selected)
2924                         bss->rsn_pairwise = value;
2925                 else
2926                         bss->wpa_pairwise = value;
2927         }
2928 }
2929
2930 static unsigned int get_tlv(unsigned char *ie, unsigned int ie_size,
2931                                                         unsigned int type)
2932 {
2933         unsigned int len = 0;
2934
2935         while (len + 4 < ie_size) {
2936                 unsigned int hi = ie[len];
2937                 unsigned int lo = ie[len + 1];
2938                 unsigned int tmp_type = (hi << 8) + lo;
2939                 unsigned int v_len = 0;
2940
2941                 /* hi and lo are used to recreate an unsigned int
2942                  * based on 2 8bits length unsigned int. */
2943
2944                 hi = ie[len + 2];
2945                 lo = ie[len + 3];
2946                 v_len = (hi << 8) + lo;
2947
2948                 if (tmp_type == type) {
2949                         unsigned int ret_value = 0;
2950                         unsigned char *value = (unsigned char *)&ret_value;
2951
2952                         SUPPLICANT_DBG("IE: match type 0x%x", type);
2953
2954                         /* Verifying length relevance */
2955                         if (v_len > sizeof(unsigned int) ||
2956                                 len + 4 + v_len > ie_size)
2957                                 break;
2958
2959                         memcpy(value, ie + len + 4, v_len);
2960
2961                         SUPPLICANT_DBG("returning 0x%x", ret_value);
2962                         return ret_value;
2963                 }
2964
2965                 len += v_len + 4;
2966         }
2967
2968         SUPPLICANT_DBG("returning 0");
2969         return 0;
2970 }
2971
2972 #if defined TIZEN_EXT
2973 static void get_bss_phy_mode(unsigned int max_rate,
2974                 unsigned int max_ext_rate, bool ht, bool vht, void *data)
2975 {
2976         struct g_supplicant_bss *bss = data;
2977         unsigned int freq = bss->frequency;
2978
2979         /* Following conditions are used to determine
2980          * IEEE 802.11 Protocol Modes:-
2981          *
2982          * 1. If “Supported rates” is only till 11 Mbps,
2983          *    and frequency is in 2.4GHz band, then protocol is 11B.
2984          * 2. If “Supported rates” is till 54Mbps or
2985          *    “Extended supported rates” are present,
2986          *    and frequency is in 2.4GHz band, then protocol is 11G.
2987          * 3. If “Supported rates” is only till 54 Mbps,
2988          *    frequency is in 5GHz band , then protocol is 11A.
2989          * 4. If “HT capabilities” is supported , then protocol is 11N.
2990          * 5. If “HT capabilities” & “VHT” is supported and
2991          *    frequency is in 5 GHz band, then protocol is 11AC.
2992          * */
2993
2994         if (freq >= 2412 && freq <= 2484) { /* 2.4 Ghz Band */
2995                 if (max_rate <= 11 && max_ext_rate <= 0 && !ht)
2996                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211B;
2997                 else if ((max_rate <= 54 || max_ext_rate > 0) && !ht)
2998                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211BG;
2999                 else if ((max_rate >= 54 || max_ext_rate > 0) && ht)
3000                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211BGN;
3001                 else
3002                         bss->phy_mode = G_SUPPLICANT_MODE_UNKNOWN;
3003         } else if (freq >= 5180 && freq <= 5825) { /* 5 Ghz Band */
3004                 if (max_rate <= 54 && !ht)
3005                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211A;
3006                 else if ((max_rate >= 54 || max_ext_rate > 0) && ht && !vht)
3007                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211AN;
3008                 else if ((max_rate >= 54 || max_ext_rate > 0) && ht && vht)
3009                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211ANAC;
3010                 else
3011                         bss->phy_mode = G_SUPPLICANT_MODE_UNKNOWN;
3012         }
3013 }
3014 #endif
3015
3016 static void bss_process_ies(DBusMessageIter *iter, void *user_data)
3017 {
3018         struct g_supplicant_bss *bss = user_data;
3019         const unsigned char WPS_OUI[] = { 0x00, 0x50, 0xf2, 0x04 };
3020         unsigned char *ie, *ie_end;
3021         DBusMessageIter array;
3022         unsigned int value;
3023         int ie_len;
3024 #if defined TIZEN_EXT
3025         const unsigned char OWE_WFA_OUI[] = { 0x50, 0x6f, 0x9a, 0x1c };
3026         int r_len, j;
3027         unsigned char *rates = NULL;
3028         unsigned char *ext_rates = NULL;
3029         unsigned int max_rate = 0;
3030         unsigned int max_ext_rate = 0;
3031         unsigned int offset = 0;
3032         bool ht = false;
3033         bool vht = false;
3034 #endif
3035
3036 #define WMM_WPA1_WPS_INFO 221
3037 #define WPS_INFO_MIN_LEN  6
3038 #define WPS_VERSION_TLV   0x104A
3039 #define WPS_STATE_TLV     0x1044
3040 #define WPS_METHODS_TLV   0x1012
3041 #define WPS_REGISTRAR_TLV 0x1041
3042 #define WPS_VERSION       0x10
3043 #define WPS_PBC           0x04
3044 #define WPS_PIN           0x00
3045 #define WPS_CONFIGURED    0x02
3046 #if defined TIZEN_EXT
3047 #define VENDOR_SPECIFIC_INFO 0xDD
3048 #define WLAN_EID_COUNTRY 7
3049 #define WLAN_EID_RSN_INFO 48
3050 #define RSN_CAPABILITY_MFP_REQ (1 << 6)
3051 #endif
3052
3053         dbus_message_iter_recurse(iter, &array);
3054         dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
3055
3056         if (!ie || ie_len < 2)
3057                 return;
3058
3059         bss->wps_capabilities = 0;
3060         bss->keymgmt = 0;
3061
3062         for (ie_end = ie + ie_len; ie < ie_end && ie + ie[1] + 1 <= ie_end;
3063                                                         ie += ie[1] + 2) {
3064 #if defined TIZEN_EXT
3065                 unsigned char *vsie;
3066                 int vsie_len = 0;
3067
3068                 if (ie[0] == VENDOR_SPECIFIC_INFO && memcmp(ie+2, OWE_WFA_OUI, sizeof(OWE_WFA_OUI)) == 0) {
3069                         SUPPLICANT_DBG("IE: match vendor specific data : OWE Transition Mode");
3070
3071 /*
3072                 Tag: Vendor Specific: Wi-Fi Alliance: OWE Transition Mode
3073                         Tag Number: Vendor Specific (221)    -> ie[0]
3074                         Tag length: 26                       -> ie[1]
3075                         OUI: 50:6f:9a (Wi-Fi Alliance)       -> ie[2]
3076                         Vendor Specific OUI Type: 28         -> ie[5]
3077                         BSSID: 92:fd:f0:20:2b:09             -> ie[6]
3078                         SSID length: 15                      -> ie[12]
3079                         SSID: Wi-Fi-5.2.3-owe                -> ie[13]
3080
3081 0000   dd 1a 50 6f 9a 1c 92 fd f0 20 2b 09 0f 57 69 2d   ..Po..... +..Wi-
3082 0010   46 69 2d 35 2e 32 2e 33 2d 6f 77 65               Fi-5.2.3-owe
3083
3084 */
3085                         bss->owe_transition_mode = TRUE;
3086                         if (ie[1] >= 11) { // Tag length is at least up to ssid length position.
3087                                 memcpy(bss->transition_mode_bssid, ie+6, WIFI_BSSID_LEN_MAX);
3088                                 if (ie[12] > 0 && ie[12] < 32) {
3089                                         memcpy(bss->transition_mode_ssid, ie+13, ie[12]);
3090                                         bss->transition_mode_ssid_len = ie[12];
3091                                 } else
3092                                         bss->transition_mode_ssid_len = 0;
3093                         } else
3094                                 bss->owe_transition_mode = FALSE;
3095                         continue;
3096                 }
3097
3098                 if (ie[0] == VENDOR_SPECIFIC_INFO && memcmp(ie+2, WPS_OUI, sizeof(WPS_OUI)) != 0) {
3099
3100                         if (!simplified_log)
3101                                 SUPPLICANT_DBG("IE: match vendor specific data");
3102
3103                         vsie_len = ie[1]+2;     // tag number size(1), tag length size(1)
3104                         vsie = (unsigned char *)g_try_malloc0(vsie_len);
3105
3106                         if (vsie) {
3107                                 memcpy(vsie, ie, vsie_len);
3108                                 bss->vsie_list = g_slist_append(bss->vsie_list, vsie);
3109                         } else
3110                                 SUPPLICANT_DBG("Failed to allocate memory");
3111                         continue;
3112                 }
3113
3114                 if (ie[0] == WLAN_EID_COUNTRY && ie[1] >= 2) {
3115                         /* Add country code only if it is a valid alphabet */
3116                         if (ie[2] >= 65 && ie[2] <= 90 && ie[3] >= 65 && ie[3] <= 90) {
3117                                 memcpy(bss->country_code, ie+2, COUNTRY_CODE_LENGTH);
3118                                 continue;
3119                         }
3120                 }
3121
3122                 if (ie[0] == WLAN_EID_HT_CAP && ie[1]) {
3123                         ht = true;
3124                         continue;
3125                 }
3126
3127                 if (ie[0] == WLAN_EID_VHT_CAP && ie[1]) {
3128                         vht = true;
3129                         continue;
3130                 }
3131
3132                 if (ie[0] == WLAN_EID_SUPP_RATES && ie[1]) {
3133                         r_len = ie[1];
3134                         rates = g_malloc0(r_len);
3135                         if (!rates)
3136                                 continue;
3137
3138                         for (j = 0; ie && j < r_len; j++) {
3139                                 rates[j] = ((ie[j + 2] & 0x7f) * 500000)/1000000;
3140                                 if (max_rate < rates[j])
3141                                         max_rate = rates[j];
3142                         }
3143                         continue;
3144                 }
3145
3146                 if (ie[0] == WLAN_EID_EXT_SUPP_RATES && ie[1] > 0) {
3147                         r_len = ie[1];
3148                         ext_rates = g_malloc0(r_len);
3149                         if (!ext_rates)
3150                                 continue;
3151
3152                         for (j = 0; ie && j < r_len; j++) {
3153                                 ext_rates[j] = ((ie[j + 2] & 0x7f) * 500000)/1000000;
3154                                 if (max_ext_rate < ext_rates[j])
3155                                         max_ext_rate = ext_rates[j];
3156                         }
3157                         continue;
3158                 }
3159
3160                 if (ie[0] == WLAN_EID_RSN_INFO && ie[1] >= 20) {
3161                         r_len = ie[1];
3162                         offset = 10 + ie[8] * 4;
3163                         offset += ie[offset] * 4 + 2;
3164
3165                         if (offset <= r_len + 1 &&
3166                                         (ie[offset] & RSN_CAPABILITY_MFP_REQ) != 0)
3167                                 bss->pmf_required = TRUE;
3168
3169                         continue;
3170                 }
3171 #endif
3172                 if (ie[0] != WMM_WPA1_WPS_INFO || ie[1] < WPS_INFO_MIN_LEN ||
3173                         memcmp(ie+2, WPS_OUI, sizeof(WPS_OUI)) != 0)
3174                         continue;
3175
3176                 SUPPLICANT_DBG("IE: match WPS_OUI");
3177
3178                 value = get_tlv(&ie[6], ie[1], WPS_STATE_TLV);
3179                 if (get_tlv(&ie[6], ie[1], WPS_VERSION_TLV) == WPS_VERSION &&
3180                                                                 value != 0) {
3181                         bss->keymgmt |= G_SUPPLICANT_KEYMGMT_WPS;
3182
3183                         if (value == WPS_CONFIGURED)
3184                                 bss->wps_capabilities |=
3185                                         G_SUPPLICANT_WPS_CONFIGURED;
3186                 }
3187
3188                 value = get_tlv(&ie[6], ie[1], WPS_METHODS_TLV);
3189                 if (value != 0) {
3190                         if (GUINT16_FROM_BE(value) == WPS_PBC)
3191                                 bss->wps_capabilities |= G_SUPPLICANT_WPS_PBC;
3192                         if (GUINT16_FROM_BE(value) == WPS_PIN)
3193                                 bss->wps_capabilities |= G_SUPPLICANT_WPS_PIN;
3194                 } else
3195                         bss->wps_capabilities |=
3196                                 G_SUPPLICANT_WPS_PBC | G_SUPPLICANT_WPS_PIN;
3197
3198                 /* If the AP sends this it means it's advertizing
3199                  * as a registrar and the WPS process is launched
3200                  * on its side */
3201                 if (get_tlv(&ie[6], ie[1], WPS_REGISTRAR_TLV) != 0)
3202                         bss->wps_capabilities |= G_SUPPLICANT_WPS_REGISTRAR;
3203
3204                 SUPPLICANT_DBG("WPS Methods 0x%x", bss->wps_capabilities);
3205         }
3206 #ifdef TIZEN_EXT
3207         get_bss_phy_mode(max_rate, max_ext_rate, ht, vht, user_data);
3208         if (rates)
3209                 g_free(rates);
3210         if (ext_rates)
3211                 g_free(ext_rates);
3212 #endif
3213 }
3214
3215 static void bss_compute_security(struct g_supplicant_bss *bss)
3216 {
3217         /*
3218          * Combining RSN and WPA keymgmt
3219          * We combine it since parsing IEs might have set something for WPS. */
3220         bss->keymgmt |= bss->rsn_keymgmt | bss->wpa_keymgmt;
3221
3222         bss->ieee8021x = FALSE;
3223         bss->psk = FALSE;
3224 #if defined TIZEN_EXT
3225         bss->ft_ieee8021x = FALSE;
3226         bss->ft_psk = FALSE;
3227 #endif
3228
3229 #if defined TIZEN_EXT
3230         if (bss->keymgmt &
3231                         (G_SUPPLICANT_KEYMGMT_WPA_EAP |
3232                                 G_SUPPLICANT_KEYMGMT_WPA_EAP_256))
3233                 bss->ieee8021x = TRUE;
3234         else if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_EAP)
3235                 bss->ft_ieee8021x = TRUE;
3236 #else
3237         if (bss->keymgmt &
3238                         (G_SUPPLICANT_KEYMGMT_WPA_EAP |
3239                                 G_SUPPLICANT_KEYMGMT_WPA_FT_EAP |
3240                                 G_SUPPLICANT_KEYMGMT_WPA_EAP_256))
3241                 bss->ieee8021x = TRUE;
3242 #endif
3243
3244 #if defined TIZEN_EXT
3245         if (bss->keymgmt &
3246                         G_SUPPLICANT_KEYMGMT_WPA_PSK_256) {
3247                 bss->psk_sha256 = TRUE;
3248         }
3249
3250         if (bss->keymgmt &
3251                         (G_SUPPLICANT_KEYMGMT_WPA_PSK |
3252                                 G_SUPPLICANT_KEYMGMT_WPA_PSK_256))
3253                 bss->psk = TRUE;
3254         else if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_PSK)
3255                 bss->ft_psk = TRUE;
3256 #else
3257         if (bss->keymgmt &
3258                         (G_SUPPLICANT_KEYMGMT_WPA_PSK |
3259                                 G_SUPPLICANT_KEYMGMT_WPA_FT_PSK |
3260                                 G_SUPPLICANT_KEYMGMT_WPA_PSK_256))
3261                 bss->psk = TRUE;
3262 #endif
3263
3264 #if defined TIZEN_EXT
3265         if (bss->keymgmt &
3266                         (G_SUPPLICANT_KEYMGMT_SAE |
3267                                 G_SUPPLICANT_KEYMGMT_FT_SAE))
3268                 bss->sae = TRUE;
3269         if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_OWE)
3270                 bss->owe = TRUE;
3271         if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_DPP)
3272                 bss->dpp = TRUE;
3273 #endif
3274
3275         if (bss->ieee8021x)
3276                 bss->security = G_SUPPLICANT_SECURITY_IEEE8021X;
3277 #if defined TIZEN_EXT
3278         else if (bss->ft_ieee8021x)
3279                 bss->security = G_SUPPLICANT_SECURITY_IEEE8021X;
3280         else if (bss->sae)
3281                 bss->security = G_SUPPLICANT_SECURITY_SAE;
3282         else if (bss->psk_sha256)
3283                 bss->security = G_SUPPLICANT_SECURITY_PSK_SHA256;
3284 #endif
3285         else if (bss->psk)
3286                 bss->security = G_SUPPLICANT_SECURITY_PSK;
3287 #if defined TIZEN_EXT
3288         else if (bss->ft_psk)
3289                 bss->security = G_SUPPLICANT_SECURITY_FT_PSK;
3290         else if (bss->owe || bss->owe_transition_mode)
3291                 bss->security = G_SUPPLICANT_SECURITY_OWE;
3292         else if (bss->dpp)
3293                 bss->security = G_SUPPLICANT_SECURITY_DPP;
3294 #endif
3295         else if (bss->privacy)
3296                 bss->security = G_SUPPLICANT_SECURITY_WEP;
3297         else
3298                 bss->security = G_SUPPLICANT_SECURITY_NONE;
3299 }
3300
3301
3302 static void bss_property(const char *key, DBusMessageIter *iter,
3303                                                         void *user_data)
3304 {
3305         struct g_supplicant_bss *bss = user_data;
3306
3307         if (!bss->interface)
3308                 return;
3309 #if defined TIZEN_EXT
3310         if (!simplified_log)
3311 #endif
3312         SUPPLICANT_DBG("key %s", key);
3313
3314         if (!key)
3315                 return;
3316
3317         if (g_strcmp0(key, "BSSID") == 0) {
3318                 DBusMessageIter array;
3319                 unsigned char *addr;
3320                 int addr_len;
3321
3322                 dbus_message_iter_recurse(iter, &array);
3323                 dbus_message_iter_get_fixed_array(&array, &addr, &addr_len);
3324
3325                 if (addr_len == 6)
3326                         memcpy(bss->bssid, addr, addr_len);
3327         } else if (g_strcmp0(key, "SSID") == 0) {
3328                 DBusMessageIter array;
3329                 unsigned char *ssid;
3330                 int ssid_len;
3331
3332                 dbus_message_iter_recurse(iter, &array);
3333                 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
3334
3335                 if (ssid_len > 0 && ssid_len < 33) {
3336                         memcpy(bss->ssid, ssid, ssid_len);
3337                         bss->ssid_len = ssid_len;
3338                 } else {
3339                         memset(bss->ssid, 0, sizeof(bss->ssid));
3340                         bss->ssid_len = 0;
3341                 }
3342         } else if (g_strcmp0(key, "Capabilities") == 0) {
3343                 dbus_uint16_t capabilities = 0x0000;
3344
3345                 dbus_message_iter_get_basic(iter, &capabilities);
3346
3347                 if (capabilities & IEEE80211_CAP_ESS)
3348                         bss->mode = G_SUPPLICANT_MODE_INFRA;
3349                 else if (capabilities & IEEE80211_CAP_IBSS)
3350                         bss->mode = G_SUPPLICANT_MODE_IBSS;
3351
3352                 if (capabilities & IEEE80211_CAP_PRIVACY)
3353                         bss->privacy = TRUE;
3354         } else if (g_strcmp0(key, "Mode") == 0) {
3355                 const char *mode = NULL;
3356
3357                 dbus_message_iter_get_basic(iter, &mode);
3358                 bss->mode = string2mode(mode);
3359         } else if (g_strcmp0(key, "Frequency") == 0) {
3360                 dbus_uint16_t frequency = 0;
3361
3362                 dbus_message_iter_get_basic(iter, &frequency);
3363                 bss->frequency = frequency;
3364         } else if (g_strcmp0(key, "Signal") == 0) {
3365                 dbus_int16_t signal = 0;
3366
3367                 dbus_message_iter_get_basic(iter, &signal);
3368
3369                 bss->signal = signal;
3370                 if (!bss->signal)
3371                         bss->signal = BSS_UNKNOWN_STRENGTH;
3372
3373         } else if (g_strcmp0(key, "Level") == 0) {
3374                 dbus_int32_t level = 0;
3375
3376                 dbus_message_iter_get_basic(iter, &level);
3377         } else if (g_strcmp0(key, "Rates") == 0) {
3378                 supplicant_dbus_array_foreach(iter, bss_rates, bss);
3379         } else if (g_strcmp0(key, "MaxRate") == 0) {
3380                 dbus_uint32_t maxrate = 0;
3381
3382                 dbus_message_iter_get_basic(iter, &maxrate);
3383                 if (maxrate != 0)
3384                         bss->maxrate = maxrate;
3385         } else if (g_strcmp0(key, "Privacy") == 0) {
3386                 dbus_bool_t privacy = FALSE;
3387
3388                 dbus_message_iter_get_basic(iter, &privacy);
3389                 bss->privacy = privacy;
3390         } else if (g_strcmp0(key, "RSN") == 0) {
3391                 bss->rsn_selected = TRUE;
3392
3393                 supplicant_dbus_property_foreach(iter, bss_wpa, bss);
3394         } else if (g_strcmp0(key, "WPA") == 0) {
3395                 bss->rsn_selected = FALSE;
3396
3397                 supplicant_dbus_property_foreach(iter, bss_wpa, bss);
3398 #if defined TIZEN_EXT
3399         } else if (g_strcmp0(key, "HS20") == 0) {
3400                 dbus_bool_t hs20 = FALSE;
3401                 dbus_message_iter_get_basic(iter, &hs20);
3402                 bss->hs20 = hs20;
3403         } else if (g_strcmp0(key, "SNR") == 0) {
3404                 dbus_int16_t snr = 0;
3405
3406                 dbus_message_iter_get_basic(iter, &snr);
3407                 bss->snr = snr;
3408         } else if (g_strcmp0(key, "EstThroughput") == 0) {
3409                 dbus_uint32_t est_throughput = 0;
3410
3411                 dbus_message_iter_get_basic(iter, &est_throughput);
3412                 if (est_throughput != 0)
3413                         bss->est_throughput = est_throughput;
3414 #endif
3415         } else if (g_strcmp0(key, "IEs") == 0)
3416                 bss_process_ies(iter, bss);
3417         else
3418                 SUPPLICANT_DBG("key %s type %c",
3419                                 key, dbus_message_iter_get_arg_type(iter));
3420 }
3421
3422 static struct g_supplicant_bss *interface_bss_added(DBusMessageIter *iter,
3423                                                         void *user_data)
3424 {
3425         GSupplicantInterface *interface = user_data;
3426         GSupplicantNetwork *network;
3427         struct g_supplicant_bss *bss;
3428         const char *path = NULL;
3429 #if defined TIZEN_EXT
3430         if (!simplified_log)
3431 #endif
3432         SUPPLICANT_DBG("");
3433
3434         dbus_message_iter_get_basic(iter, &path);
3435         if (!path)
3436                 return NULL;
3437
3438         if (g_strcmp0(path, "/") == 0)
3439                 return NULL;
3440 #if defined TIZEN_EXT
3441         if (!simplified_log)
3442 #endif
3443         SUPPLICANT_DBG("%s", path);
3444
3445         network = g_hash_table_lookup(interface->bss_mapping, path);
3446         if (network) {
3447                 bss = g_hash_table_lookup(network->bss_table, path);
3448                 if (bss)
3449                         return NULL;
3450         }
3451
3452         bss = g_try_new0(struct g_supplicant_bss, 1);
3453         if (!bss)
3454                 return NULL;
3455
3456         bss->interface = interface;
3457         bss->path = g_strdup(path);
3458         bss->signal = BSS_UNKNOWN_STRENGTH;
3459
3460         return bss;
3461 }
3462
3463 static void interface_bss_added_with_keys(DBusMessageIter *iter,
3464                                                 void *user_data)
3465 {
3466         struct g_supplicant_bss *bss;
3467 #if defined TIZEN_EXT
3468         if (!simplified_log)
3469 #endif
3470         SUPPLICANT_DBG("");
3471
3472         bss = interface_bss_added(iter, user_data);
3473         if (!bss)
3474                 return;
3475
3476         dbus_message_iter_next(iter);
3477
3478         if (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_INVALID)
3479 #if defined TIZEN_EXT
3480         {
3481                 g_free(bss->path);
3482                 g_free(bss);
3483                 return;
3484         }
3485 #else
3486                 return;
3487 #endif
3488
3489         supplicant_dbus_property_foreach(iter, bss_property, bss);
3490
3491         bss_compute_security(bss);
3492         if (add_or_replace_bss_to_network(bss) < 0)
3493                 SUPPLICANT_DBG("add_or_replace_bss_to_network failed");
3494 }
3495
3496 static void interface_bss_added_without_keys(DBusMessageIter *iter,
3497                                                 void *user_data)
3498 {
3499         struct g_supplicant_bss *bss;
3500 #if defined TIZEN_EXT
3501         if (!simplified_log)
3502 #endif
3503         SUPPLICANT_DBG("");
3504
3505         bss = interface_bss_added(iter, user_data);
3506         if (!bss)
3507                 return;
3508
3509         supplicant_dbus_property_get_all(bss->path,
3510                                         SUPPLICANT_INTERFACE ".BSS",
3511                                         bss_property, bss, bss);
3512
3513         bss_compute_security(bss);
3514         if (add_or_replace_bss_to_network(bss) < 0)
3515                         SUPPLICANT_DBG("add_or_replace_bss_to_network failed");
3516 }
3517
3518 static void update_signal(gpointer key, gpointer value,
3519                                                 gpointer user_data)
3520 {
3521         struct g_supplicant_bss *bss = value;
3522         GSupplicantNetwork *network = user_data;
3523
3524 #if defined TIZEN_EXT
3525         if (!network->best_bss || (network->best_bss == bss)) {
3526                 if (bss->signal > network->signal) {
3527                         network->signal = bss->signal;
3528                         network->best_bss = bss;
3529                 }
3530                 return;
3531         }
3532
3533         update_best_bss(network, bss, network->best_bss);
3534 #else
3535         if (bss->signal > network->signal) {
3536                 network->signal = bss->signal;
3537                 network->best_bss = bss;
3538         }
3539 #endif
3540 }
3541
3542 static void update_network_signal(GSupplicantNetwork *network)
3543 {
3544         if (g_hash_table_size(network->bss_table) <= 1 && network->best_bss)
3545                 return;
3546
3547         g_hash_table_foreach(network->bss_table,
3548                                 update_signal, network);
3549
3550         SUPPLICANT_DBG("New network signal %d", network->signal);
3551 }
3552
3553 #if defined TIZEN_EXT_INS
3554 static gboolean last_connected_timeout(gpointer data)
3555 {
3556         GSupplicantInterface *interface = data;
3557         GSupplicantNetwork *current_network = interface->current_network;
3558
3559         SUPPLICANT_DBG("Timeout last connected bss");
3560
3561         if (current_network && current_network->best_bss) {
3562                 if (compare_bssid(current_network->best_bss->bssid, interface->connected_bssid)) {
3563                         g_supplicant_network_set_last_connected_bssid(current_network, interface->connected_bssid);
3564                         callback_network_changed(current_network, "LastConnectedBSSID");
3565                 }
3566         }
3567
3568         last_connected_bss_timeout = 0;
3569         return FALSE;
3570 }
3571
3572 static void add_timer_for_last_connected(GSupplicantInterface *interface)
3573 {
3574         GSupplicantNetwork *current_network = interface->current_network;
3575
3576         if (interface->state == G_SUPPLICANT_STATE_COMPLETED) {
3577                 if (current_network) {
3578                         struct g_supplicant_bss *best_bss = current_network->best_bss;
3579
3580                         memcpy(interface->connected_bssid, best_bss->bssid, WIFI_BSSID_LEN_MAX);
3581
3582                         if (last_connected_bss_timeout)
3583                                 g_source_remove(last_connected_bss_timeout);
3584
3585                         last_connected_bss_timeout = g_timeout_add_seconds(LAST_CONNECTED_TIMEOUT,
3586                                 last_connected_timeout, interface);
3587
3588                         SUPPLICANT_DBG("Add timer for last connected bssid [" MACSTR "]",
3589                                         MAC2STR(best_bss->bssid));
3590                 }
3591         }
3592 }
3593
3594 static void remove_timer_for_last_connected(GSupplicantInterface *interface)
3595 {
3596         if (interface->state == G_SUPPLICANT_STATE_DISCONNECTED) {
3597                 if (last_connected_bss_timeout != 0) {
3598                         g_source_remove(last_connected_bss_timeout);
3599                         last_connected_bss_timeout = 0;
3600                         SUPPLICANT_DBG("Remove timer for last connected bss");
3601                 }
3602         }
3603 }
3604 #endif /* defined TIZEN_EXT_INS */
3605
3606 static void interface_current_bss(GSupplicantInterface *interface,
3607                                                 DBusMessageIter *iter)
3608 {
3609         GSupplicantNetwork *network;
3610         struct g_supplicant_bss *bss;
3611         const char *path;
3612 #if defined TIZEN_EXT
3613         char bssid_buff1[WIFI_BSSID_STR_LEN] = {0,};
3614         char bssid_buff2[WIFI_BSSID_STR_LEN] = {0,};
3615         char *bssid_str1 = bssid_buff1;
3616         char *bssid_str2 = bssid_buff2;
3617         gboolean update = FALSE;
3618 #endif
3619
3620         dbus_message_iter_get_basic(iter, &path);
3621         if (g_strcmp0(path, "/") == 0) {
3622                 interface->current_network = NULL;
3623                 return;
3624         }
3625
3626         interface_bss_added_without_keys(iter, interface);
3627
3628         network = g_hash_table_lookup(interface->bss_mapping, path);
3629         if (!network)
3630                 return;
3631
3632         bss = g_hash_table_lookup(network->bss_table, path);
3633         if (!bss)
3634                 return;
3635
3636         interface->current_network = network;
3637 #if defined TIZEN_EXT
3638         snprintf(bssid_str1, WIFI_BSSID_STR_LEN, MACSTR, MAC2STR(bss->bssid));
3639         snprintf(bssid_str2, WIFI_BSSID_STR_LEN, MACSTR, MAC2STR(network->best_bss->bssid));
3640
3641         SUPPLICANT_DBG("current network [%p], Passed bss %s, best bss %s",
3642                         interface->current_network, bssid_str1, bssid_str2);
3643
3644         if (network->frequency != bss->frequency) {
3645                 network->frequency = bss->frequency;
3646                 update = TRUE;
3647         }
3648 #endif
3649
3650         if (bss != network->best_bss) {
3651                 /*
3652                  * This is the case where either wpa_s got associated
3653                  * to a BSS different than the one ConnMan considers
3654                  * the best, or we are roaming.
3655                  */
3656                 SUPPLICANT_DBG("Update best BSS for %s", network->name);
3657
3658                 network->best_bss = bss;
3659
3660                 if (network->signal != bss->signal) {
3661                         SUPPLICANT_DBG("New network signal %d dBm",
3662                                                 bss->signal);
3663
3664                         network->signal = bss->signal;
3665                         callback_network_changed(network, "Signal");
3666 #if defined TIZEN_EXT
3667                         update = FALSE;
3668                 } else {
3669                         update = TRUE;
3670 #endif
3671                 }
3672         }
3673
3674 #if defined TIZEN_EXT
3675         if (update)
3676                 callback_network_changed(network, "");
3677 #endif
3678
3679         /*
3680          * wpa_s could notify about CurrentBSS in any state once
3681          * it got associated. It is not sure such notification will
3682          * arrive together with transition to ASSOCIATED state.
3683          * In fact, for networks with security WEP or OPEN, it
3684          * always arrives together with transition to COMPLETED.
3685          */
3686         switch (interface->state) {
3687         case G_SUPPLICANT_STATE_UNKNOWN:
3688         case G_SUPPLICANT_STATE_DISABLED:
3689         case G_SUPPLICANT_STATE_DISCONNECTED:
3690         case G_SUPPLICANT_STATE_INACTIVE:
3691         case G_SUPPLICANT_STATE_SCANNING:
3692         case G_SUPPLICANT_STATE_AUTHENTICATING:
3693         case G_SUPPLICANT_STATE_ASSOCIATING:
3694                 return;
3695         case G_SUPPLICANT_STATE_ASSOCIATED:
3696         case G_SUPPLICANT_STATE_4WAY_HANDSHAKE:
3697         case G_SUPPLICANT_STATE_GROUP_HANDSHAKE:
3698         case G_SUPPLICANT_STATE_COMPLETED:
3699                 callback_network_associated(network);
3700 #if defined TIZEN_EXT_INS
3701                 add_timer_for_last_connected(interface);
3702 #endif
3703                 break;
3704         }
3705 }
3706
3707 static void interface_bss_removed(DBusMessageIter *iter, void *user_data)
3708 {
3709         GSupplicantInterface *interface = user_data;
3710         GSupplicantNetwork *network;
3711         struct g_supplicant_bss *bss = NULL;
3712         const char *path = NULL;
3713         bool is_current_network_bss = false;
3714
3715         dbus_message_iter_get_basic(iter, &path);
3716         if (!path)
3717                 return;
3718
3719         network = g_hash_table_lookup(interface->bss_mapping, path);
3720         if (!network)
3721                 return;
3722
3723         bss = g_hash_table_lookup(network->bss_table, path);
3724         if (network->best_bss == bss) {
3725                 network->best_bss = NULL;
3726                 network->signal = BSS_UNKNOWN_STRENGTH;
3727                 is_current_network_bss = true;
3728         }
3729
3730         g_hash_table_remove(bss_mapping, path);
3731
3732         g_hash_table_remove(interface->bss_mapping, path);
3733         g_hash_table_remove(network->bss_table, path);
3734
3735         update_network_signal(network);
3736
3737         if (g_hash_table_size(network->bss_table) == 0) {
3738                 g_hash_table_remove(interface->network_table, network->group);
3739         } else {
3740                 if (is_current_network_bss && network->best_bss)
3741 #if defined TIZEN_EXT
3742                         callback_network_changed(network, "CheckMultiBssidConnect");
3743 #else
3744                         callback_network_changed(network, "");
3745 #endif
3746         }
3747 }
3748
3749 static void set_config_methods(DBusMessageIter *iter, void *user_data)
3750 {
3751         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, user_data);
3752 }
3753
3754 static void wps_property(const char *key, DBusMessageIter *iter,
3755                                                         void *user_data)
3756 {
3757         GSupplicantInterface *interface = user_data;
3758
3759         if (!interface)
3760                 return;
3761 #if defined TIZEN_EXT
3762         if (!simplified_log)
3763 #endif
3764         SUPPLICANT_DBG("key: %s", key);
3765
3766         if (g_strcmp0(key, "ConfigMethods") == 0) {
3767                 const char *config_methods = "push_button", *str = NULL;
3768
3769                 dbus_message_iter_get_basic(iter, &str);
3770                 if (str && strlen(str) > 0) {
3771                         /* It was already set at wpa_s level, don't modify it. */
3772                         SUPPLICANT_DBG("%s", str);
3773                         return;
3774                 }
3775
3776                 supplicant_dbus_property_set(interface->path,
3777                         SUPPLICANT_INTERFACE ".Interface.WPS",
3778                         "ConfigMethods", DBUS_TYPE_STRING_AS_STRING,
3779                         set_config_methods, NULL, &config_methods, NULL);
3780
3781                 SUPPLICANT_DBG("No value. Set %s", config_methods);
3782         }
3783
3784 }
3785
3786 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
3787 void g_supplicant_replace_config_file(const char *ifname, const char *config_file)
3788 {
3789         if (!ifname)
3790                return;
3791
3792         if (!config_file)
3793                 return;
3794
3795         SUPPLICANT_DBG("New {%s, %s}", ifname, config_file);
3796         g_hash_table_replace(config_file_table,
3797                         g_strdup(ifname), g_strdup(config_file));
3798 }
3799 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
3800
3801 static void interface_property(const char *key, DBusMessageIter *iter,
3802                                                         void *user_data)
3803 {
3804         GSupplicantInterface *interface = user_data;
3805
3806         if (!interface)
3807                 return;
3808 #if defined TIZEN_EXT
3809         if (!simplified_log)
3810 #endif
3811         SUPPLICANT_DBG("%s", key);
3812
3813         if (!key) {
3814                 debug_strvalmap("KeyMgmt capability", keymgmt_map,
3815                                                 interface->keymgmt_capa);
3816                 debug_strvalmap("AuthAlg capability", authalg_capa_map,
3817                                                 interface->authalg_capa);
3818                 debug_strvalmap("Protocol capability", proto_capa_map,
3819                                                 interface->proto_capa);
3820                 debug_strvalmap("Pairwise capability", pairwise_map,
3821                                                 interface->pairwise_capa);
3822                 debug_strvalmap("Group capability", group_map,
3823                                                 interface->group_capa);
3824                 debug_strvalmap("Scan capability", scan_capa_map,
3825                                                 interface->scan_capa);
3826                 debug_strvalmap("Mode capability", mode_capa_map,
3827                                                 interface->mode_capa);
3828
3829                 supplicant_dbus_property_get_all(interface->path,
3830                                 SUPPLICANT_INTERFACE ".Interface.WPS",
3831                                 wps_property, interface, interface);
3832
3833                 if (interface->ready)
3834                         callback_interface_added(interface);
3835
3836                 return;
3837         }
3838
3839         if (g_strcmp0(key, "Capabilities") == 0) {
3840                 supplicant_dbus_property_foreach(iter, interface_capability,
3841                                                                 interface);
3842 #if !defined TIZEN_EXT
3843                 if (interface->mode_capa & G_SUPPLICANT_CAPABILITY_MODE_P2P)
3844                         interface->p2p_support = true;
3845 #endif
3846 #if defined TIZEN_EXT_WIFI_MESH
3847                 if (interface->mode_capa & G_SUPPLICANT_CAPABILITY_MODE_MESH)
3848                         interface->mesh_support = true;
3849 #endif
3850         } else if (g_strcmp0(key, "State") == 0) {
3851                 const char *str = NULL;
3852
3853                 dbus_message_iter_get_basic(iter, &str);
3854                 if (str)
3855                         if (string2state(str) != interface->state) {
3856                                 interface->state = string2state(str);
3857                                 callback_interface_state(interface);
3858                         }
3859 #if defined TIZEN_EXT_INS
3860                 switch (interface->state) {
3861                 case G_SUPPLICANT_STATE_COMPLETED:
3862                         add_timer_for_last_connected(interface);
3863                         break;
3864                 case G_SUPPLICANT_STATE_DISCONNECTED:
3865                         remove_timer_for_last_connected(interface);
3866                         break;
3867                 default:
3868                         break;
3869                 }
3870 #endif
3871                 if (interface->ap_create_in_progress) {
3872                         if (interface->state == G_SUPPLICANT_STATE_DISCONNECTED)
3873                                 callback_ap_create_fail(interface);
3874
3875                         interface->ap_create_in_progress = false;
3876                 }
3877
3878                 if (interface->state == G_SUPPLICANT_STATE_DISABLED)
3879                         interface->ready = FALSE;
3880                 else
3881                         interface->ready = TRUE;
3882
3883                 SUPPLICANT_DBG("state %s (%d)", str, interface->state);
3884         } else if (g_strcmp0(key, "Scanning") == 0) {
3885                 dbus_bool_t scanning = FALSE;
3886
3887                 dbus_message_iter_get_basic(iter, &scanning);
3888                 interface->scanning = scanning;
3889
3890                 if (interface->ready) {
3891                         if (interface->scanning)
3892                                 callback_scan_started(interface);
3893                         else
3894                                 callback_scan_finished(interface);
3895                 }
3896         } else if (g_strcmp0(key, "ApScan") == 0) {
3897                 int apscan = 1;
3898
3899                 dbus_message_iter_get_basic(iter, &apscan);
3900                 interface->apscan = apscan;
3901         } else if (g_strcmp0(key, "Ifname") == 0) {
3902                 const char *str = NULL;
3903
3904                 dbus_message_iter_get_basic(iter, &str);
3905                 if (str) {
3906                         g_free(interface->ifname);
3907                         interface->ifname = g_strdup(str);
3908                 }
3909         } else if (g_strcmp0(key, "Driver") == 0) {
3910                 const char *str = NULL;
3911
3912                 dbus_message_iter_get_basic(iter, &str);
3913                 if (str) {
3914                         g_free(interface->driver);
3915                         interface->driver = g_strdup(str);
3916                 }
3917         } else if (g_strcmp0(key, "BridgeIfname") == 0) {
3918                 const char *str = NULL;
3919
3920                 dbus_message_iter_get_basic(iter, &str);
3921                 if (str) {
3922                         g_free(interface->bridge);
3923                         interface->bridge = g_strdup(str);
3924                 }
3925         } else if (g_strcmp0(key, "ConfigFile") == 0) {
3926                 const char *str = NULL;
3927
3928                 dbus_message_iter_get_basic(iter, &str);
3929                 if (str && strlen(str) > 0 && interface->ifname) {
3930                         SUPPLICANT_DBG("New {%s, %s}", interface->ifname, str);
3931                         g_hash_table_replace(config_file_table,
3932                                 g_strdup(interface->ifname), g_strdup(str));
3933                 }
3934         } else if (g_strcmp0(key, "CurrentBSS") == 0) {
3935                 interface_current_bss(interface, iter);
3936         } else if (g_strcmp0(key, "CurrentNetwork") == 0) {
3937 #if defined TIZEN_EXT
3938                 if (interface->state != G_SUPPLICANT_STATE_COMPLETED)
3939 #endif
3940                 interface_network_added(iter, interface);
3941         } else if (g_strcmp0(key, "BSSs") == 0) {
3942                 supplicant_dbus_array_foreach(iter,
3943                                         interface_bss_added_without_keys,
3944                                         interface);
3945         } else if (g_strcmp0(key, "Blobs") == 0) {
3946                 /* Nothing */
3947         } else if (g_strcmp0(key, "Networks") == 0) {
3948                 supplicant_dbus_array_foreach(iter, interface_network_added,
3949                                                                 interface);
3950         } else if (g_strcmp0(key, "DisconnectReason") == 0) {
3951                 int reason_code;
3952                 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
3953                         dbus_message_iter_get_basic(iter, &reason_code);
3954                         callback_disconnect_reason_code(interface, reason_code);
3955 #if defined TIZEN_EXT
3956                         SUPPLICANT_DBG("reason code (%d)", reason_code);
3957 #endif
3958                 }
3959         } else if (g_strcmp0(key, "AssocStatusCode") == 0) {
3960                 int status_code;
3961                 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
3962                         dbus_message_iter_get_basic(iter, &status_code);
3963                         callback_assoc_status_code(interface, status_code);
3964 #if defined TIZEN_EXT
3965                         SUPPLICANT_DBG("status code (%d)", status_code);
3966 #endif
3967                 }
3968         } else {
3969                 SUPPLICANT_DBG("key %s type %c",
3970                                 key, dbus_message_iter_get_arg_type(iter));
3971         }
3972 }
3973
3974 static void scan_network_update(DBusMessageIter *iter, void *user_data)
3975 {
3976         GSupplicantInterface *interface = user_data;
3977         GSupplicantNetwork *network;
3978         char *path;
3979
3980         if (!iter)
3981                 return;
3982
3983         dbus_message_iter_get_basic(iter, &path);
3984
3985         if (!path)
3986                 return;
3987
3988         if (g_strcmp0(path, "/") == 0)
3989                 return;
3990
3991         /* Update the network details based on scan BSS data */
3992         network = g_hash_table_lookup(interface->bss_mapping, path);
3993         if (network)
3994                 callback_network_added(network);
3995 }
3996
3997 static void scan_bss_data(const char *key, DBusMessageIter *iter,
3998                                 void *user_data)
3999 {
4000         GSupplicantInterface *interface = user_data;
4001
4002 /*Fixed : stucking in scanning state when scan failed*/
4003 #if defined TIZEN_EXT
4004         GSupplicantInterfaceCallback scan_callback;
4005         SUPPLICANT_DBG("");
4006 #endif
4007
4008         if (iter)
4009                 supplicant_dbus_array_foreach(iter, scan_network_update,
4010                                                 interface);
4011
4012 #if defined TIZEN_EXT
4013         scan_callback = interface->scan_callback;
4014         callback_scan_done(interface);
4015 #endif
4016
4017         if (interface->scan_callback)
4018                 interface->scan_callback(0, interface, interface->scan_data);
4019
4020 #if defined TIZEN_EXT
4021         if (interface->scan_callback == scan_callback) {
4022 #endif
4023         interface->scan_callback = NULL;
4024         interface->scan_data = NULL;
4025 #if defined TIZEN_EXT
4026         }
4027 #endif
4028 }
4029
4030 static GSupplicantInterface *interface_alloc(const char *path)
4031 {
4032         GSupplicantInterface *interface;
4033
4034         interface = g_try_new0(GSupplicantInterface, 1);
4035         if (!interface)
4036                 return NULL;
4037
4038         interface->path = g_strdup(path);
4039
4040         interface->network_table = g_hash_table_new_full(g_str_hash,
4041                                         g_str_equal, NULL, remove_network);
4042         interface->peer_table = g_hash_table_new_full(g_str_hash,
4043                                         g_str_equal, NULL, remove_peer);
4044         interface->group_table = g_hash_table_new_full(g_str_hash,
4045                                         g_str_equal, NULL, remove_group);
4046         interface->bss_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
4047                                                                 NULL, NULL);
4048
4049         g_hash_table_replace(interface_table, interface->path, interface);
4050
4051         return interface;
4052 }
4053
4054 static void interface_added(DBusMessageIter *iter, void *user_data)
4055 {
4056         GSupplicantInterface *interface;
4057         const char *path = NULL;
4058         bool properties_appended = GPOINTER_TO_UINT(user_data);
4059
4060         SUPPLICANT_DBG("");
4061
4062         dbus_message_iter_get_basic(iter, &path);
4063         if (!path)
4064                 return;
4065
4066         if (g_strcmp0(path, "/") == 0)
4067                 return;
4068
4069         interface = g_hash_table_lookup(interface_table, path);
4070         if (interface)
4071                 return;
4072
4073         interface = interface_alloc(path);
4074         if (!interface)
4075                 return;
4076
4077         if (!properties_appended) {
4078                 supplicant_dbus_property_get_all(path,
4079                                                 SUPPLICANT_INTERFACE ".Interface",
4080                                                 interface_property, interface,
4081                                                 interface);
4082                 return;
4083         }
4084
4085         dbus_message_iter_next(iter);
4086         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
4087                 supplicant_dbus_property_foreach(iter, interface_property,
4088                                                                 interface);
4089                 interface_property(NULL, NULL, interface);
4090         }
4091 }
4092
4093 static void interface_removed(DBusMessageIter *iter, void *user_data)
4094 {
4095         const char *path = NULL;
4096         GSupplicantInterface *interface = user_data;
4097
4098         dbus_message_iter_get_basic(iter, &path);
4099         if (!path)
4100                 return;
4101
4102         interface = g_hash_table_lookup(interface_table, path);
4103         g_supplicant_interface_cancel(interface);
4104
4105         g_hash_table_remove(interface_table, path);
4106 }
4107
4108 static void eap_method(DBusMessageIter *iter, void *user_data)
4109 {
4110         const char *str = NULL;
4111         int i;
4112
4113         dbus_message_iter_get_basic(iter, &str);
4114         if (!str)
4115                 return;
4116
4117         for (i = 0; eap_method_map[i].str; i++)
4118                 if (strcmp(str, eap_method_map[i].str) == 0) {
4119                         eap_methods |= eap_method_map[i].val;
4120                         break;
4121                 }
4122 }
4123
4124 static void service_property(const char *key, DBusMessageIter *iter,
4125                                                         void *user_data)
4126 {
4127         if (!key) {
4128                 callback_system_ready();
4129                 return;
4130         }
4131
4132         if (g_strcmp0(key, "DebugLevel") == 0) {
4133                 const char *str = NULL;
4134                 int i;
4135
4136                 dbus_message_iter_get_basic(iter, &str);
4137                 for (i = 0; debug_strings[i]; i++)
4138                         if (g_strcmp0(debug_strings[i], str) == 0) {
4139                                 debug_level = i;
4140                                 break;
4141                         }
4142                 SUPPLICANT_DBG("Debug level %d", debug_level);
4143         } else if (g_strcmp0(key, "DebugTimestamp") == 0) {
4144                 dbus_message_iter_get_basic(iter, &debug_timestamp);
4145                 SUPPLICANT_DBG("Debug timestamp %u", debug_timestamp);
4146         } else if (g_strcmp0(key, "DebugShowKeys") == 0) {
4147                 dbus_message_iter_get_basic(iter, &debug_showkeys);
4148                 SUPPLICANT_DBG("Debug show keys %u", debug_showkeys);
4149         } else if (g_strcmp0(key, "Interfaces") == 0) {
4150                 supplicant_dbus_array_foreach(iter, interface_added, NULL);
4151         } else if (g_strcmp0(key, "EapMethods") == 0) {
4152                 supplicant_dbus_array_foreach(iter, eap_method, NULL);
4153                 debug_strvalmap("EAP method", eap_method_map, eap_methods);
4154         } else if (g_strcmp0(key, "Country") == 0) {
4155                 const char *country = NULL;
4156
4157                 dbus_message_iter_get_basic(iter, &country);
4158                 SUPPLICANT_DBG("Country %s", country);
4159         } else
4160                 SUPPLICANT_DBG("key %s type %c",
4161                                 key, dbus_message_iter_get_arg_type(iter));
4162 }
4163
4164 static void signal_name_owner_changed(const char *path, DBusMessageIter *iter)
4165 {
4166         const char *name = NULL, *old = NULL, *new = NULL;
4167
4168         SUPPLICANT_DBG("");
4169
4170         if (g_strcmp0(path, DBUS_PATH_DBUS) != 0)
4171                 return;
4172
4173         dbus_message_iter_get_basic(iter, &name);
4174         if (!name)
4175                 return;
4176
4177         if (g_strcmp0(name, SUPPLICANT_SERVICE) != 0)
4178                 return;
4179
4180         dbus_message_iter_next(iter);
4181         dbus_message_iter_get_basic(iter, &old);
4182         dbus_message_iter_next(iter);
4183         dbus_message_iter_get_basic(iter, &new);
4184
4185         if (!old || !new)
4186                 return;
4187
4188         if (strlen(old) > 0 && strlen(new) == 0) {
4189                 system_available = FALSE;
4190                 g_hash_table_remove_all(bss_mapping);
4191                 g_hash_table_remove_all(peer_mapping);
4192                 g_hash_table_remove_all(group_mapping);
4193                 g_hash_table_remove_all(config_file_table);
4194                 g_hash_table_remove_all(interface_table);
4195                 callback_system_killed();
4196         }
4197
4198         if (strlen(new) > 0 && strlen(old) == 0) {
4199                 system_available = TRUE;
4200                 supplicant_dbus_property_get_all(SUPPLICANT_PATH,
4201                                                 SUPPLICANT_INTERFACE,
4202                                                 service_property, NULL, NULL);
4203         }
4204 }
4205
4206 static void signal_properties_changed(const char *path, DBusMessageIter *iter)
4207 {
4208         SUPPLICANT_DBG("");
4209
4210         if (g_strcmp0(path, SUPPLICANT_PATH) != 0)
4211                 return;
4212
4213         supplicant_dbus_property_foreach(iter, service_property, NULL);
4214 }
4215
4216 static void signal_interface_added(const char *path, DBusMessageIter *iter)
4217 {
4218         SUPPLICANT_DBG("path %s %s", path, SUPPLICANT_PATH);
4219
4220         if (g_strcmp0(path, SUPPLICANT_PATH) == 0)
4221                 interface_added(iter, GUINT_TO_POINTER(true));
4222 }
4223
4224 static void signal_interface_removed(const char *path, DBusMessageIter *iter)
4225 {
4226         SUPPLICANT_DBG("");
4227
4228         if (g_strcmp0(path, SUPPLICANT_PATH) == 0)
4229                 interface_removed(iter, NULL);
4230 }
4231
4232 static void signal_interface_changed(const char *path, DBusMessageIter *iter)
4233 {
4234         GSupplicantInterface *interface;
4235 #if defined TIZEN_EXT
4236         if (!simplified_log)
4237 #endif
4238         SUPPLICANT_DBG("");
4239
4240         interface = g_hash_table_lookup(interface_table, path);
4241         if (!interface)
4242                 return;
4243
4244         supplicant_dbus_property_foreach(iter, interface_property, interface);
4245 }
4246
4247 static void signal_scan_done(const char *path, DBusMessageIter *iter)
4248 {
4249         GSupplicantInterface *interface;
4250         dbus_bool_t success = FALSE;
4251
4252         SUPPLICANT_DBG("");
4253
4254         interface = g_hash_table_lookup(interface_table, path);
4255         if (!interface)
4256                 return;
4257
4258         dbus_message_iter_get_basic(iter, &success);
4259
4260         if (interface->scanning) {
4261                 callback_scan_finished(interface);
4262                 interface->scanning = FALSE;
4263         }
4264
4265         /*
4266          * If scan is unsuccessful return -EIO else get the scanned BSSs
4267          * and update the network details accordingly
4268          */
4269         if (!success) {
4270                 if (interface->scan_callback)
4271                         interface->scan_callback(-EIO, interface,
4272                                                 interface->scan_data);
4273
4274                 interface->scan_callback = NULL;
4275                 interface->scan_data = NULL;
4276
4277                 return;
4278         }
4279
4280         supplicant_dbus_property_get(path, SUPPLICANT_INTERFACE ".Interface",
4281                                 "BSSs", scan_bss_data, interface, interface);
4282 }
4283
4284 static void signal_bss_added(const char *path, DBusMessageIter *iter)
4285 {
4286         GSupplicantInterface *interface;
4287 #if defined TIZEN_EXT
4288         if (!simplified_log)
4289 #endif
4290         SUPPLICANT_DBG("");
4291
4292         interface = g_hash_table_lookup(interface_table, path);
4293         if (!interface)
4294                 return;
4295
4296         interface_bss_added_with_keys(iter, interface);
4297 }
4298
4299 static void signal_bss_removed(const char *path, DBusMessageIter *iter)
4300 {
4301         GSupplicantInterface *interface;
4302
4303         SUPPLICANT_DBG("");
4304
4305         interface = g_hash_table_lookup(interface_table, path);
4306         if (!interface)
4307                 return;
4308
4309         interface_bss_removed(iter, interface);
4310 }
4311
4312 static void signal_network_added(const char *path, DBusMessageIter *iter)
4313 {
4314         GSupplicantInterface *interface;
4315
4316         SUPPLICANT_DBG("");
4317
4318         interface = g_hash_table_lookup(interface_table, path);
4319         if (!interface)
4320                 return;
4321
4322         interface_network_added(iter, interface);
4323 }
4324
4325 static void signal_network_removed(const char *path, DBusMessageIter *iter)
4326 {
4327         GSupplicantInterface *interface;
4328
4329         SUPPLICANT_DBG("");
4330
4331         interface = g_hash_table_lookup(interface_table, path);
4332         if (!interface)
4333                 return;
4334
4335         interface_network_removed(iter, interface);
4336 }
4337 #if defined TIZEN_EXT
4338 void *copy_vsie_list(gconstpointer src, gpointer data)
4339 {
4340         return g_strdup(src);
4341 }
4342 #endif
4343
4344
4345 static void signal_sta_authorized(const char *path, DBusMessageIter *iter)
4346 {
4347         GSupplicantInterface *interface;
4348         const char *addr = NULL;
4349
4350         SUPPLICANT_DBG("");
4351
4352         interface = g_hash_table_lookup(interface_table, path);
4353         if (!interface)
4354                 return;
4355
4356         dbus_message_iter_get_basic(iter, &addr);
4357         if (!addr)
4358                 return;
4359
4360         callback_sta_authorized(interface, addr);
4361 }
4362
4363 static void signal_sta_deauthorized(const char *path, DBusMessageIter *iter)
4364 {
4365         GSupplicantInterface *interface;
4366         const char *addr = NULL;
4367
4368         SUPPLICANT_DBG("");
4369
4370         interface = g_hash_table_lookup(interface_table, path);
4371         if (!interface)
4372                 return;
4373
4374         dbus_message_iter_get_basic(iter, &addr);
4375         if (!addr)
4376                 return;
4377
4378         callback_sta_deauthorized(interface, addr);
4379 }
4380
4381 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
4382 static void signal_eap(const char *path, DBusMessageIter *iter)
4383 {
4384         GSupplicantInterface *interface;
4385         const char *str = NULL;
4386
4387         SUPPLICANT_DBG("EAPOL_DEBUG callback eap signal");
4388
4389         interface = g_hash_table_lookup(interface_table, path);
4390         if (!interface)
4391                 return;
4392
4393         // TODO: Identify EAP fail condition, currently timeout is used for failure.
4394
4395         dbus_message_iter_get_basic(iter, &str);
4396         if (!str)
4397                 return;
4398
4399         if (g_strcmp0("completion", str))
4400                 return;
4401
4402         dbus_message_iter_next(iter);
4403
4404         dbus_message_iter_get_basic(iter, &str);
4405         if (!str)
4406                 return;
4407
4408         if (!g_strcmp0("success", str))
4409                 callback_eap(interface, true);
4410         else
4411                 callback_eap(interface, false);
4412 }
4413 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
4414
4415 static void signal_bss_changed(const char *path, DBusMessageIter *iter)
4416 {
4417         GSupplicantInterface *interface;
4418         GSupplicantNetwork *network;
4419         GSupplicantSecurity old_security;
4420         unsigned int old_wps_capabilities;
4421         struct g_supplicant_bss *bss;
4422
4423 #if defined TIZEN_EXT
4424         if (!simplified_log)
4425 #endif
4426         SUPPLICANT_DBG("");
4427
4428         interface = g_hash_table_lookup(bss_mapping, path);
4429         if (!interface)
4430                 return;
4431
4432         network = g_hash_table_lookup(interface->bss_mapping, path);
4433         if (!network)
4434                 return;
4435
4436         bss = g_hash_table_lookup(network->bss_table, path);
4437         if (!bss)
4438                 return;
4439
4440         supplicant_dbus_property_foreach(iter, bss_property, bss);
4441
4442 #if defined TIZEN_EXT
4443         if (network->interface->state != G_SUPPLICANT_STATE_COMPLETED) {
4444                 network->frequency = bss->frequency;
4445                 network->phy_mode = bss->phy_mode;
4446         }
4447 #endif
4448         old_security = network->security;
4449         bss_compute_security(bss);
4450
4451         if (old_security != bss->security) {
4452                 struct g_supplicant_bss *new_bss;
4453
4454                 SUPPLICANT_DBG("New network security for %s with path %s",
4455                                bss->ssid, bss->path);
4456
4457                 /*
4458                  * Security change policy:
4459                  * - We first copy the current bss into a new one with
4460                  *   its own pointer (path)
4461                  * - Clear the old bss pointer and remove the network completely
4462                  *   if there are no more BSSs in the bss table.
4463                  * - The new bss will be added either to an existing network
4464                  *   or an additional network will be created
4465                  */
4466
4467                 new_bss = g_try_new0(struct g_supplicant_bss, 1);
4468                 if (!new_bss)
4469                         return;
4470
4471                 memcpy(new_bss, bss, sizeof(struct g_supplicant_bss));
4472                 new_bss->path = g_strdup(bss->path);
4473 #if defined TIZEN_EXT
4474                 new_bss->vsie_list = g_slist_copy_deep(bss->vsie_list, copy_vsie_list, NULL);
4475 #endif
4476
4477                 if (network->best_bss == bss) {
4478                         network->best_bss = NULL;
4479                         network->signal = BSS_UNKNOWN_STRENGTH;
4480                 }
4481
4482                 g_hash_table_remove(bss_mapping, path);
4483
4484                 g_hash_table_remove(interface->bss_mapping, path);
4485                 g_hash_table_remove(network->bss_table, path);
4486
4487                 update_network_signal(network);
4488
4489                 if (g_hash_table_size(network->bss_table) == 0)
4490                         g_hash_table_remove(interface->network_table,
4491                                             network->group);
4492
4493                 if (add_or_replace_bss_to_network(new_bss) < 0) {
4494                         /*
4495                          * Prevent a memory leak on failure in
4496                          * add_or_replace_bss_to_network
4497                          */
4498                         SUPPLICANT_DBG("Failed to add bss %s to network table",
4499                                        new_bss->path);
4500                         g_free(new_bss->path);
4501                         g_free(new_bss);
4502                 }
4503
4504                 return;
4505         }
4506
4507         old_wps_capabilities = network->wps_capabilities;
4508
4509         if (old_wps_capabilities != bss->wps_capabilities) {
4510                 network->wps_capabilities = bss->wps_capabilities;
4511                 callback_network_changed(network, "WPSCapabilities");
4512         }
4513
4514 #if defined TIZEN_EXT
4515         if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
4516                 network->wps = TRUE;
4517                 network->wps_capabilities |= bss->wps_capabilities;
4518         } else
4519                 network->wps = FALSE;
4520 #endif
4521
4522         /* Consider only property changes of the connected BSS */
4523         if (network == interface->current_network && bss != network->best_bss)
4524                 return;
4525
4526         if (bss->signal == network->signal)
4527 #ifndef TIZEN_EXT
4528                 return;
4529 #else
4530         {
4531                 callback_network_changed(network, "");
4532                 return;
4533         }
4534 #endif
4535
4536         /*
4537          * If the new signal is lower than the SSID signal, we need
4538          * to check for the new maximum.
4539          */
4540 #if defined TIZEN_EXT
4541         if (!update_best_bss(network, bss, network->best_bss)) {
4542                 if (bss != network->best_bss) {
4543                         callback_network_changed(network, "");
4544                         return;
4545                 }
4546
4547                 network->signal = bss->signal;
4548                 update_network_signal(network);
4549         }
4550 #else
4551         if (bss->signal < network->signal) {
4552                 if (bss != network->best_bss)
4553                         return;
4554
4555                 network->signal = bss->signal;
4556                 update_network_signal(network);
4557         } else {
4558                 network->signal = bss->signal;
4559                 network->best_bss = bss;
4560         }
4561 #endif
4562
4563         SUPPLICANT_DBG("New network signal for %s %d dBm", network->ssid,
4564                         network->signal);
4565
4566         callback_network_changed(network, "Signal");
4567 }
4568
4569 static void wps_credentials(const char *key, DBusMessageIter *iter,
4570                         void *user_data)
4571 {
4572         GSupplicantInterface *interface = user_data;
4573
4574         if (!key)
4575                 return;
4576
4577         SUPPLICANT_DBG("key %s", key);
4578
4579         if (g_strcmp0(key, "Key") == 0) {
4580                 DBusMessageIter array;
4581                 unsigned char *key_val;
4582                 int key_len;
4583
4584                 dbus_message_iter_recurse(iter, &array);
4585                 dbus_message_iter_get_fixed_array(&array, &key_val, &key_len);
4586
4587                 g_free(interface->wps_cred.key);
4588                 interface->wps_cred.key = g_try_malloc0(
4589                                                 sizeof(char) * key_len + 1);
4590
4591                 if (!interface->wps_cred.key)
4592                         return;
4593
4594                 memcpy(interface->wps_cred.key, key_val,
4595                                                 sizeof(char) * key_len);
4596
4597                 SUPPLICANT_DBG("WPS key present");
4598         } else if (g_strcmp0(key, "SSID") == 0) {
4599                 DBusMessageIter array;
4600                 unsigned char *ssid;
4601                 int ssid_len;
4602
4603                 dbus_message_iter_recurse(iter, &array);
4604                 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
4605
4606                 if (ssid_len > 0 && ssid_len < 33) {
4607                         memcpy(interface->wps_cred.ssid, ssid, ssid_len);
4608                         interface->wps_cred.ssid_len = ssid_len;
4609                 } else {
4610                         memset(interface->wps_cred.ssid, 0, 32);
4611                         interface->wps_cred.ssid_len = 0;
4612                 }
4613         }
4614 }
4615
4616 static void signal_wps_credentials(const char *path, DBusMessageIter *iter)
4617 {
4618         GSupplicantInterface *interface;
4619
4620         SUPPLICANT_DBG("");
4621
4622         interface = g_hash_table_lookup(interface_table, path);
4623         if (!interface)
4624                 return;
4625
4626         supplicant_dbus_property_foreach(iter, wps_credentials, interface);
4627 }
4628
4629 static void wps_event_args(const char *key, DBusMessageIter *iter,
4630                         void *user_data)
4631 {
4632         GSupplicantInterface *interface = user_data;
4633
4634         if (!key || !interface)
4635                 return;
4636
4637         SUPPLICANT_DBG("Arg Key %s", key);
4638 }
4639
4640 static void signal_wps_event(const char *path, DBusMessageIter *iter)
4641 {
4642         GSupplicantInterface *interface;
4643         const char *name = NULL;
4644
4645         SUPPLICANT_DBG("");
4646
4647         interface = g_hash_table_lookup(interface_table, path);
4648         if (!interface)
4649                 return;
4650
4651         dbus_message_iter_get_basic(iter, &name);
4652
4653         SUPPLICANT_DBG("Name: %s", name);
4654
4655         if (g_strcmp0(name, "success") == 0)
4656                 interface->wps_state = G_SUPPLICANT_WPS_STATE_SUCCESS;
4657         else if (g_strcmp0(name, "fail") == 0)
4658                 interface->wps_state = G_SUPPLICANT_WPS_STATE_FAIL;
4659         else
4660                 interface->wps_state = G_SUPPLICANT_WPS_STATE_UNKNOWN;
4661
4662         if (!dbus_message_iter_has_next(iter))
4663                 return;
4664
4665         dbus_message_iter_next(iter);
4666
4667         supplicant_dbus_property_foreach(iter, wps_event_args, interface);
4668 }
4669
4670 #if defined TIZEN_EXT
4671 static void signal_power_off(const char *path, DBusMessageIter *iter)
4672 {
4673         int poweroff_state = 0;
4674
4675         dbus_message_iter_get_basic(iter, &poweroff_state);
4676
4677         SUPPLICANT_DBG("poweroff_state(%d)", poweroff_state);
4678
4679         /* POWER_OFF_DIRECT 2 && POWER_OFF_RESTART 3 */
4680         if (poweroff_state != 2 && poweroff_state != 3)
4681                 return;
4682
4683         if (callbacks_pointer == NULL)
4684                 return;
4685
4686         if (callbacks_pointer->system_power_off == NULL)
4687                 return;
4688
4689         callbacks_pointer->system_power_off();
4690 }
4691 #endif
4692
4693 static void create_peer_identifier(GSupplicantPeer *peer)
4694 {
4695         const unsigned char test[ETH_ALEN] = {};
4696
4697         if (!peer)
4698                 return;
4699
4700         if (!memcmp(peer->device_address, test, ETH_ALEN)) {
4701                 peer->identifier = g_strdup(peer->name);
4702                 return;
4703         }
4704
4705         peer->identifier = g_malloc0(19);
4706         snprintf(peer->identifier, 19, "%02x%02x%02x%02x%02x%02x",
4707                                                 peer->device_address[0],
4708                                                 peer->device_address[1],
4709                                                 peer->device_address[2],
4710                                                 peer->device_address[3],
4711                                                 peer->device_address[4],
4712                                                 peer->device_address[5]);
4713 }
4714
4715 struct peer_property_data {
4716         GSupplicantPeer *peer;
4717         GSList *old_groups;
4718         bool groups_changed;
4719         bool services_changed;
4720 };
4721
4722 static void peer_groups_relation(DBusMessageIter *iter, void *user_data)
4723 {
4724         struct peer_property_data *data = user_data;
4725         GSupplicantPeer *peer = data->peer;
4726         GSupplicantGroup *group;
4727         const char *str = NULL;
4728         GSList *elem;
4729
4730         dbus_message_iter_get_basic(iter, &str);
4731         if (!str)
4732                 return;
4733
4734         group = g_hash_table_lookup(group_mapping, str);
4735         if (!group)
4736                 return;
4737
4738         elem = g_slist_find_custom(data->old_groups, str, (GCompareFunc)g_strcmp0);
4739         if (elem) {
4740                 data->old_groups = g_slist_remove_link(data->old_groups, elem);
4741                 peer->groups = g_slist_concat(elem, peer->groups);
4742         } else {
4743                 peer->groups = g_slist_prepend(peer->groups, g_strdup(str));
4744                 data->groups_changed = true;
4745         }
4746 }
4747
4748 static void peer_property(const char *key, DBusMessageIter *iter,
4749                                                         void *user_data)
4750 {
4751         GSupplicantPeer *pending_peer;
4752         struct peer_property_data *data = user_data;
4753         GSupplicantPeer *peer = data->peer;
4754
4755         SUPPLICANT_DBG("key: %s", key);
4756
4757         if (!peer->interface)
4758                 return;
4759
4760         if (!key) {
4761                 if (peer->name) {
4762                         create_peer_identifier(peer);
4763                         callback_peer_found(peer);
4764                         pending_peer = g_hash_table_lookup(
4765                                         pending_peer_connection, peer->path);
4766
4767                         if (pending_peer && pending_peer == peer) {
4768                                 callback_peer_request(peer);
4769                                 g_hash_table_remove(pending_peer_connection,
4770                                                 peer->path);
4771                         }
4772
4773                         dbus_free(data);
4774                 }
4775
4776                 return;
4777         }
4778
4779         if (g_strcmp0(key, "DeviceAddress") == 0) {
4780                 unsigned char *dev_addr;
4781                 DBusMessageIter array;
4782                 int len;
4783
4784                 dbus_message_iter_recurse(iter, &array);
4785                 dbus_message_iter_get_fixed_array(&array, &dev_addr, &len);
4786
4787                 if (len == ETH_ALEN)
4788                         memcpy(peer->device_address, dev_addr, len);
4789         } else if (g_strcmp0(key, "DeviceName") == 0) {
4790                 const char *str = NULL;
4791
4792                 dbus_message_iter_get_basic(iter, &str);
4793                 if (str)
4794                         peer->name = g_strdup(str);
4795         } else if (g_strcmp0(key, "config_method") == 0) {
4796                 uint16_t wps_config;
4797
4798                 dbus_message_iter_get_basic(iter, &wps_config);
4799
4800                 if (wps_config & G_SUPPLICANT_WPS_CONFIG_PBC)
4801                         peer->wps_capabilities |= G_SUPPLICANT_WPS_PBC;
4802                 if (wps_config & ~G_SUPPLICANT_WPS_CONFIG_PBC)
4803                         peer->wps_capabilities |= G_SUPPLICANT_WPS_PIN;
4804         } else if (g_strcmp0(key, "Groups") == 0) {
4805                 data->old_groups = peer->groups;
4806                 peer->groups = NULL;
4807
4808                 supplicant_dbus_array_foreach(iter,
4809                                                 peer_groups_relation, data);
4810                 if (g_slist_length(data->old_groups) > 0) {
4811                         g_slist_free_full(data->old_groups, g_free);
4812                         data->groups_changed = true;
4813                 }
4814         } else if (g_strcmp0(key, "IEs") == 0) {
4815                 DBusMessageIter array;
4816                 unsigned char *ie;
4817                 int ie_len;
4818
4819                 dbus_message_iter_recurse(iter, &array);
4820                 dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
4821
4822                 if (!ie || ie_len < 2)
4823                         return;
4824
4825                 if (peer->widi_ies) {
4826                         if (memcmp(peer->widi_ies, ie, ie_len) == 0)
4827                                 return;
4828
4829                         g_free(peer->widi_ies);
4830                         peer->widi_ies_length = 0;
4831                 }
4832
4833                 peer->widi_ies = g_malloc0(ie_len * sizeof(unsigned char));
4834
4835                 memcpy(peer->widi_ies, ie, ie_len);
4836                 peer->widi_ies_length = ie_len;
4837                 data->services_changed = true;
4838         }
4839 }
4840
4841 static void signal_peer_found(const char *path, DBusMessageIter *iter)
4842 {
4843         struct peer_property_data *property_data;
4844         GSupplicantInterface *interface;
4845         const char *obj_path = NULL;
4846         GSupplicantPeer *peer;
4847
4848         SUPPLICANT_DBG("");
4849
4850         interface = g_hash_table_lookup(interface_table, path);
4851         if (!interface)
4852                 return;
4853
4854         dbus_message_iter_get_basic(iter, &obj_path);
4855         if (!obj_path || g_strcmp0(obj_path, "/") == 0)
4856                 return;
4857
4858         peer = g_hash_table_lookup(interface->peer_table, obj_path);
4859         if (peer)
4860                 return;
4861
4862         peer = g_try_new0(GSupplicantPeer, 1);
4863         if (!peer)
4864                 return;
4865
4866         peer->interface = interface;
4867         peer->path = g_strdup(obj_path);
4868         g_hash_table_insert(interface->peer_table, peer->path, peer);
4869         g_hash_table_replace(peer_mapping, peer->path, interface);
4870
4871         property_data = dbus_malloc0(sizeof(struct peer_property_data));
4872         property_data->peer = peer;
4873
4874         dbus_message_iter_next(iter);
4875         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
4876                 supplicant_dbus_property_foreach(iter, peer_property,
4877                                                         property_data);
4878                 peer_property(NULL, NULL, property_data);
4879                 return;
4880         }
4881
4882         supplicant_dbus_property_get_all(obj_path,
4883                                         SUPPLICANT_INTERFACE ".Peer",
4884                                         peer_property, property_data, NULL);
4885 }
4886
4887 static void signal_peer_lost(const char *path, DBusMessageIter *iter)
4888 {
4889         GSupplicantInterface *interface;
4890         const char *obj_path = NULL;
4891         GSupplicantPeer *peer;
4892
4893         SUPPLICANT_DBG("");
4894
4895         interface = g_hash_table_lookup(interface_table, path);
4896         if (!interface)
4897                 return;
4898
4899         dbus_message_iter_get_basic(iter, &obj_path);
4900         if (!obj_path || g_strcmp0(obj_path, "/") == 0)
4901                 return;
4902
4903         peer = g_hash_table_lookup(interface->peer_table, obj_path);
4904         if (!peer)
4905                 return;
4906
4907         g_hash_table_remove(interface->peer_table, obj_path);
4908 }
4909
4910 static void signal_peer_changed(const char *path, DBusMessageIter *iter)
4911 {
4912         struct peer_property_data *property_data;
4913         GSupplicantInterface *interface;
4914         GSupplicantPeer *peer;
4915
4916         SUPPLICANT_DBG("");
4917
4918         interface = g_hash_table_lookup(peer_mapping, path);
4919         if (!interface)
4920                 return;
4921
4922         peer = g_hash_table_lookup(interface->peer_table, path);
4923         if (!peer) {
4924                 g_hash_table_remove(peer_mapping, path);
4925                 return;
4926         }
4927
4928         property_data = dbus_malloc0(sizeof(struct peer_property_data));
4929         property_data->peer = peer;
4930
4931         supplicant_dbus_property_foreach(iter, peer_property, property_data);
4932         if (property_data->services_changed)
4933                 callback_peer_changed(peer,
4934                                         G_SUPPLICANT_PEER_SERVICES_CHANGED);
4935
4936         if (property_data->groups_changed)
4937                 callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_CHANGED);
4938
4939         dbus_free(property_data);
4940
4941         if (!g_supplicant_peer_is_in_a_group(peer))
4942                 peer->connection_requested = false;
4943 }
4944
4945 struct group_sig_data {
4946         const char *peer_obj_path;
4947         unsigned char iface_address[ETH_ALEN];
4948         const char *interface_obj_path;
4949         const char *group_obj_path;
4950         int role;
4951 };
4952
4953 static void group_sig_property(const char *key, DBusMessageIter *iter,
4954                                                         void *user_data)
4955 {
4956         struct group_sig_data *data = user_data;
4957
4958         if (!key)
4959                 return;
4960
4961         if (g_strcmp0(key, "peer_interface_addr") == 0) {
4962                 unsigned char *dev_addr;
4963                 DBusMessageIter array;
4964                 int len;
4965
4966                 dbus_message_iter_recurse(iter, &array);
4967                 dbus_message_iter_get_fixed_array(&array, &dev_addr, &len);
4968
4969                 if (len == ETH_ALEN)
4970                         memcpy(data->iface_address, dev_addr, len);
4971         } else if (g_strcmp0(key, "role") == 0) {
4972                 const char *str = NULL;
4973
4974                 dbus_message_iter_get_basic(iter, &str);
4975                 if (g_strcmp0(str, "GO") == 0)
4976                         data->role = G_SUPPLICANT_GROUP_ROLE_GO;
4977                 else
4978                         data->role = G_SUPPLICANT_GROUP_ROLE_CLIENT;
4979         } else if (g_strcmp0(key, "peer_object") == 0)
4980                 dbus_message_iter_get_basic(iter, &data->peer_obj_path);
4981         else if (g_strcmp0(key, "interface_object") == 0)
4982                 dbus_message_iter_get_basic(iter, &data->interface_obj_path);
4983         else if (g_strcmp0(key, "group_object") == 0)
4984                 dbus_message_iter_get_basic(iter, &data->group_obj_path);
4985
4986 }
4987
4988 static void signal_group_success(const char *path, DBusMessageIter *iter)
4989 {
4990         GSupplicantInterface *interface;
4991         struct group_sig_data data = {};
4992         GSupplicantPeer *peer;
4993
4994         SUPPLICANT_DBG("");
4995
4996         interface = g_hash_table_lookup(interface_table, path);
4997         if (!interface)
4998                 return;
4999
5000         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
5001         if (!data.peer_obj_path)
5002                 return;
5003
5004         peer = g_hash_table_lookup(interface->peer_table, data.peer_obj_path);
5005         if (!peer)
5006                 return;
5007
5008         memcpy(peer->iface_address, data.iface_address, ETH_ALEN);
5009         interface->pending_peer_path = peer->path;
5010 }
5011
5012 static void signal_group_failure(const char *path, DBusMessageIter *iter)
5013 {
5014         GSupplicantInterface *interface;
5015         struct group_sig_data data = {};
5016         GSupplicantPeer *peer;
5017
5018         SUPPLICANT_DBG("");
5019
5020         interface = g_hash_table_lookup(interface_table, path);
5021         if (!interface)
5022                 return;
5023
5024         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
5025         if (!data.peer_obj_path)
5026                 return;
5027
5028         peer = g_hash_table_lookup(interface->peer_table, data.peer_obj_path);
5029         if (!peer)
5030                 return;
5031
5032         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_FAILED);
5033         peer->connection_requested = false;
5034 }
5035
5036 static void signal_group_started(const char *path, DBusMessageIter *iter)
5037 {
5038         GSupplicantInterface *interface, *g_interface;
5039         struct group_sig_data data = {};
5040         GSupplicantGroup *group;
5041         GSupplicantPeer *peer;
5042
5043         SUPPLICANT_DBG("");
5044
5045         interface = g_hash_table_lookup(interface_table, path);
5046         if (!interface)
5047                 return;
5048
5049         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
5050         if (!data.interface_obj_path || !data.group_obj_path)
5051                 return;
5052
5053         peer = g_hash_table_lookup(interface->peer_table,
5054                                                 interface->pending_peer_path);
5055         interface->pending_peer_path = NULL;
5056         if (!peer)
5057                 return;
5058
5059         g_interface = g_hash_table_lookup(interface_table,
5060                                                 data.interface_obj_path);
5061         if (!g_interface)
5062                 return;
5063
5064         group = g_hash_table_lookup(interface->group_table,
5065                                                 data.group_obj_path);
5066         if (group)
5067                 return;
5068
5069         group = g_try_new0(GSupplicantGroup, 1);
5070         if (!group)
5071                 return;
5072
5073         group->interface = g_interface;
5074         group->orig_interface = interface;
5075         group->path = g_strdup(data.group_obj_path);
5076         group->role = data.role;
5077
5078         g_hash_table_insert(interface->group_table, group->path, group);
5079         g_hash_table_replace(group_mapping, group->path, group);
5080
5081         peer->current_group_iface = g_interface;
5082         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_STARTED);
5083 }
5084
5085 static void remove_peer_group_interface(GHashTable *group_table,
5086                                 const char* path)
5087 {
5088         GSupplicantGroup *group;
5089         GHashTableIter iter;
5090         gpointer value, key;
5091
5092         if (!group_table)
5093                 return;
5094
5095         group = g_hash_table_lookup(group_table, path);
5096
5097         if (!group || !group->orig_interface)
5098                 return;
5099
5100         g_hash_table_iter_init(&iter, group->orig_interface->peer_table);
5101
5102         while (g_hash_table_iter_next(&iter, &key, &value)) {
5103                 GSupplicantPeer *peer = value;
5104
5105                 if (peer->current_group_iface == group->interface)
5106                         peer->current_group_iface = NULL;
5107         }
5108 }
5109
5110 static void signal_group_finished(const char *path, DBusMessageIter *iter)
5111 {
5112         GSupplicantInterface *interface;
5113         struct group_sig_data data = {};
5114
5115         SUPPLICANT_DBG("");
5116
5117         interface = g_hash_table_lookup(interface_table, path);
5118         if (!interface)
5119                 return;
5120
5121         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
5122         if (!data.interface_obj_path || !data.group_obj_path)
5123                 return;
5124
5125         remove_peer_group_interface(interface->group_table, data.group_obj_path);
5126
5127         g_hash_table_remove(group_mapping, data.group_obj_path);
5128
5129         g_hash_table_remove(interface->group_table, data.group_obj_path);
5130 }
5131
5132 static void signal_group_request(const char *path, DBusMessageIter *iter)
5133 {
5134         GSupplicantInterface *interface;
5135         GSupplicantPeer *peer;
5136         const char *obj_path;
5137
5138         SUPPLICANT_DBG("");
5139
5140         interface = g_hash_table_lookup(interface_table, path);
5141         if (!interface)
5142                 return;
5143
5144         dbus_message_iter_get_basic(iter, &obj_path);
5145         if (!obj_path || !g_strcmp0(obj_path, "/"))
5146                 return;
5147
5148         peer = g_hash_table_lookup(interface->peer_table, obj_path);
5149         if (!peer)
5150                 return;
5151
5152         /*
5153          * Peer has been previously found and property set,
5154          * otherwise, defer connection to when peer property
5155          * is set.
5156          */
5157         if (peer->identifier)
5158                 callback_peer_request(peer);
5159         else
5160                 g_hash_table_replace(pending_peer_connection, peer->path, peer);
5161 }
5162
5163 static void signal_group_peer_joined(const char *path, DBusMessageIter *iter)
5164 {
5165         const char *peer_path = NULL;
5166         GSupplicantInterface *interface;
5167         GSupplicantGroup *group;
5168         GSupplicantPeer *peer;
5169
5170         SUPPLICANT_DBG("");
5171
5172         group = g_hash_table_lookup(group_mapping, path);
5173         if (!group)
5174                 return;
5175
5176         dbus_message_iter_get_basic(iter, &peer_path);
5177         if (!peer_path)
5178                 return;
5179
5180         interface = g_hash_table_lookup(peer_mapping, peer_path);
5181         if (!interface)
5182                 return;
5183
5184         peer = g_hash_table_lookup(interface->peer_table, peer_path);
5185         if (!peer)
5186                 return;
5187
5188         group->members = g_slist_prepend(group->members, g_strdup(peer_path));
5189
5190         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_JOINED);
5191 }
5192
5193 static void signal_group_peer_disconnected(const char *path, DBusMessageIter *iter)
5194 {
5195         const char *peer_path = NULL;
5196         GSupplicantInterface *interface;
5197         GSupplicantGroup *group;
5198         GSupplicantPeer *peer;
5199         GSList *elem;
5200
5201         SUPPLICANT_DBG("");
5202
5203         group = g_hash_table_lookup(group_mapping, path);
5204         if (!group)
5205                 return;
5206
5207         dbus_message_iter_get_basic(iter, &peer_path);
5208         if (!peer_path)
5209                 return;
5210
5211         for (elem = group->members; elem; elem = elem->next) {
5212                 if (!g_strcmp0(elem->data, peer_path))
5213                         break;
5214         }
5215
5216         if (!elem)
5217                 return;
5218
5219         g_free(elem->data);
5220         group->members = g_slist_delete_link(group->members, elem);
5221
5222         interface = g_hash_table_lookup(peer_mapping, peer_path);
5223         if (!interface)
5224                 return;
5225
5226         peer = g_hash_table_lookup(interface->peer_table, peer_path);
5227         if (!peer)
5228                 return;
5229
5230         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_DISCONNECTED);
5231         peer->connection_requested = false;
5232 }
5233
5234 #if defined TIZEN_EXT_WIFI_MESH
5235 const void *g_supplicant_interface_get_mesh_group_ssid(
5236                                                         GSupplicantInterface *interface,
5237                                                         unsigned int *ssid_len)
5238 {
5239         if (!ssid_len)
5240                 return NULL;
5241
5242         if (!interface || interface->group_info.ssid_len == 0) {
5243                 *ssid_len = 0;
5244                 return NULL;
5245         }
5246
5247         *ssid_len = interface->group_info.ssid_len;
5248         return interface->group_info.ssid;
5249 }
5250
5251 int g_supplicant_mesh_get_disconnect_reason(GSupplicantInterface *interface)
5252 {
5253         if (!interface)
5254                 return -EINVAL;
5255
5256         return interface->group_info.disconnect_reason;
5257 }
5258
5259 const char *g_supplicant_mesh_peer_get_address(GSupplicantMeshPeer *mesh_peer)
5260 {
5261         if (!mesh_peer || !mesh_peer->peer_address)
5262                 return NULL;
5263
5264         return mesh_peer->peer_address;
5265 }
5266
5267 int g_supplicant_mesh_peer_get_disconnect_reason(GSupplicantMeshPeer *mesh_peer)
5268 {
5269         if (!mesh_peer)
5270                 return -EINVAL;
5271
5272         return mesh_peer->disconnect_reason;
5273 }
5274
5275 static void callback_mesh_group_started(GSupplicantInterface *interface)
5276 {
5277         if (!callbacks_pointer)
5278                 return;
5279
5280         if (!callbacks_pointer->mesh_group_started)
5281                 return;
5282
5283         callbacks_pointer->mesh_group_started(interface);
5284 }
5285
5286 static void callback_mesh_group_removed(GSupplicantInterface *interface)
5287 {
5288         if (!callbacks_pointer)
5289                 return;
5290
5291         if (!callbacks_pointer->mesh_group_removed)
5292                 return;
5293
5294         callbacks_pointer->mesh_group_removed(interface);
5295 }
5296
5297 static void mesh_group_info(const char *key, DBusMessageIter *iter,
5298                                                         void *user_data)
5299 {
5300         GSupplicantInterface *interface = user_data;
5301         if (!key)
5302                 return;
5303
5304         if (g_strcmp0(key, "SSID") == 0) {
5305                 DBusMessageIter array;
5306                 unsigned char *ssid;
5307                 int ssid_len;
5308
5309                 dbus_message_iter_recurse(iter, &array);
5310                 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
5311
5312                 if (ssid_len > 0 && ssid_len < 33) {
5313                         memcpy(interface->group_info.ssid, ssid, ssid_len);
5314                         interface->group_info.ssid_len = ssid_len;
5315                 } else {
5316                         memset(interface->group_info.ssid, 0, 32);
5317                         interface->group_info.ssid_len = 0;
5318                 }
5319         } else if (g_strcmp0(key, "DisconnectReason") == 0) {
5320                 int disconnect_reason = 0;
5321                 dbus_message_iter_get_basic(iter, &disconnect_reason);
5322                 interface->group_info.disconnect_reason = disconnect_reason;
5323         }
5324 }
5325
5326 static void signal_mesh_group_started(const char *path, DBusMessageIter *iter)
5327 {
5328         GSupplicantInterface *interface;
5329
5330         interface = g_hash_table_lookup(interface_table, path);
5331         if (!interface)
5332                 return;
5333
5334         supplicant_dbus_property_foreach(iter, mesh_group_info, interface);
5335
5336         callback_mesh_group_started(interface);
5337 }
5338
5339 static void signal_mesh_group_removed(const char *path, DBusMessageIter *iter)
5340 {
5341         GSupplicantInterface *interface;
5342
5343         interface = g_hash_table_lookup(interface_table, path);
5344         if (!interface)
5345                 return;
5346
5347         supplicant_dbus_property_foreach(iter, mesh_group_info, interface);
5348
5349         callback_mesh_group_removed(interface);
5350 }
5351
5352 static void callback_mesh_peer_connected(GSupplicantMeshPeer *mesh_peer)
5353 {
5354         if (!callbacks_pointer)
5355                 return;
5356
5357         if (!callbacks_pointer->mesh_peer_connected)
5358                 return;
5359
5360         callbacks_pointer->mesh_peer_connected(mesh_peer);
5361 }
5362
5363 static void callback_mesh_peer_disconnected(GSupplicantMeshPeer *mesh_peer)
5364 {
5365         if (!callbacks_pointer)
5366                 return;
5367
5368         if (!callbacks_pointer->mesh_peer_disconnected)
5369                 return;
5370
5371         callbacks_pointer->mesh_peer_disconnected(mesh_peer);
5372 }
5373
5374 static void mesh_peer_info(const char *key, DBusMessageIter *iter,
5375                                                         void *user_data)
5376 {
5377         GSupplicantMeshPeer *mesh_peer = user_data;
5378         if (!key)
5379                 return;
5380
5381         if (g_strcmp0(key, "PeerAddress") == 0) {
5382                 DBusMessageIter array;
5383                 unsigned char *addr;
5384                 int addr_len;
5385
5386                 dbus_message_iter_recurse(iter, &array);
5387                 dbus_message_iter_get_fixed_array(&array, &addr, &addr_len);
5388
5389                 if (addr_len == 6) {
5390                         mesh_peer->peer_address = g_malloc0(19);
5391                         snprintf(mesh_peer->peer_address, 19,
5392                                          "%02x:%02x:%02x:%02x:%02x:%02x", addr[0], addr[1],
5393                                          addr[2], addr[3], addr[4], addr[5]);
5394                 }
5395         } else if (g_strcmp0(key, "DisconnectReason") == 0) {
5396                 int disconnect_reason = 0;
5397                 dbus_message_iter_get_basic(iter, &disconnect_reason);
5398                 mesh_peer->disconnect_reason = disconnect_reason;
5399         }
5400 }
5401
5402 static void signal_mesh_peer_connected(const char *path, DBusMessageIter *iter)
5403 {
5404         GSupplicantInterface *interface;
5405         GSupplicantMeshPeer *mesh_peer;
5406
5407         interface = g_hash_table_lookup(interface_table, path);
5408         if (!interface)
5409                 return;
5410
5411         mesh_peer = dbus_malloc0(sizeof(GSupplicantMeshPeer));
5412         mesh_peer->interface = interface;
5413
5414         supplicant_dbus_property_foreach(iter, mesh_peer_info, mesh_peer);
5415
5416         callback_mesh_peer_connected(mesh_peer);
5417         g_free(mesh_peer->peer_address);
5418         g_free(mesh_peer);
5419 }
5420
5421 static void signal_mesh_peer_disconnected(const char *path,
5422                                                                 DBusMessageIter *iter)
5423 {
5424         GSupplicantInterface *interface;
5425         GSupplicantMeshPeer *mesh_peer;
5426
5427         interface = g_hash_table_lookup(interface_table, path);
5428         if (!interface)
5429                 return;
5430
5431         mesh_peer = dbus_malloc0(sizeof(GSupplicantMeshPeer));
5432         mesh_peer->interface = interface;
5433
5434         supplicant_dbus_property_foreach(iter, mesh_peer_info, mesh_peer);
5435
5436         callback_mesh_peer_disconnected(mesh_peer);
5437         g_free(mesh_peer->peer_address);
5438         g_free(mesh_peer);
5439 }
5440 #endif
5441
5442 static struct {
5443         const char *interface;
5444         const char *member;
5445         void (*function) (const char *path, DBusMessageIter *iter);
5446 } signal_map[] = {
5447         { DBUS_INTERFACE_DBUS,  "NameOwnerChanged",  signal_name_owner_changed },
5448
5449         { SUPPLICANT_INTERFACE, "PropertiesChanged", signal_properties_changed },
5450         { SUPPLICANT_INTERFACE, "InterfaceAdded",    signal_interface_added    },
5451         { SUPPLICANT_INTERFACE, "InterfaceCreated",  signal_interface_added    },
5452         { SUPPLICANT_INTERFACE, "InterfaceRemoved",  signal_interface_removed  },
5453
5454         { SUPPLICANT_INTERFACE ".Interface", "PropertiesChanged", signal_interface_changed },
5455         { SUPPLICANT_INTERFACE ".Interface", "ScanDone",          signal_scan_done         },
5456         { SUPPLICANT_INTERFACE ".Interface", "BSSAdded",          signal_bss_added         },
5457         { SUPPLICANT_INTERFACE ".Interface", "BSSRemoved",        signal_bss_removed       },
5458         { SUPPLICANT_INTERFACE ".Interface", "NetworkAdded",      signal_network_added     },
5459         { SUPPLICANT_INTERFACE ".Interface", "NetworkRemoved",    signal_network_removed   },
5460         { SUPPLICANT_INTERFACE ".Interface", "StaAuthorized",     signal_sta_authorized    },
5461         { SUPPLICANT_INTERFACE ".Interface", "StaDeauthorized",   signal_sta_deauthorized  },
5462
5463         { SUPPLICANT_INTERFACE ".BSS", "PropertiesChanged", signal_bss_changed   },
5464
5465         { SUPPLICANT_INTERFACE ".Interface.WPS", "Credentials", signal_wps_credentials },
5466         { SUPPLICANT_INTERFACE ".Interface.WPS", "Event",       signal_wps_event       },
5467 #if defined TIZEN_EXT
5468         { "org.tizen.system.deviced.PowerOff", "ChangeState", signal_power_off },
5469 #endif
5470
5471         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeviceFound", signal_peer_found },
5472         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeviceLost",  signal_peer_lost  },
5473
5474         { SUPPLICANT_INTERFACE ".Peer", "PropertiesChanged", signal_peer_changed },
5475
5476         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationSuccess", signal_group_success },
5477         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationFailure", signal_group_failure },
5478         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GroupStarted", signal_group_started },
5479         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GroupFinished", signal_group_finished },
5480         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationRequest", signal_group_request },
5481
5482         { SUPPLICANT_INTERFACE ".Group", "PeerJoined", signal_group_peer_joined },
5483         { SUPPLICANT_INTERFACE ".Group", "PeerDisconnected", signal_group_peer_disconnected },
5484 #if defined TIZEN_EXT_WIFI_MESH
5485         { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshGroupStarted",
5486                 signal_mesh_group_started },
5487         { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshGroupRemoved",
5488                 signal_mesh_group_removed },
5489         { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshPeerConnected",
5490                 signal_mesh_peer_connected },
5491         { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshPeerDisconnected",
5492                 signal_mesh_peer_disconnected },
5493 #endif
5494
5495 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
5496         { SUPPLICANT_INTERFACE ".Interface", "EAP", signal_eap },
5497 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
5498
5499         { }
5500 };
5501
5502 static DBusHandlerResult g_supplicant_filter(DBusConnection *conn,
5503                                         DBusMessage *message, void *data)
5504 {
5505         DBusMessageIter iter;
5506         const char *path;
5507         int i;
5508
5509         path = dbus_message_get_path(message);
5510         if (!path)
5511                 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
5512
5513         if (!dbus_message_iter_init(message, &iter))
5514                 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
5515
5516         for (i = 0; signal_map[i].interface; i++) {
5517                 if (!dbus_message_has_interface(message, signal_map[i].interface))
5518                         continue;
5519
5520                 if (!dbus_message_has_member(message, signal_map[i].member))
5521                         continue;
5522
5523                 signal_map[i].function(path, &iter);
5524                 break;
5525         }
5526
5527         return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
5528 }
5529
5530 void g_supplicant_interface_cancel(GSupplicantInterface *interface)
5531 {
5532         SUPPLICANT_DBG("Cancelling any pending DBus calls");
5533         supplicant_dbus_method_call_cancel_all(interface);
5534         supplicant_dbus_property_call_cancel_all(interface);
5535 }
5536
5537 struct supplicant_regdom {
5538         GSupplicantCountryCallback callback;
5539         const char *alpha2;
5540         const void *user_data;
5541 };
5542
5543 static void country_result(const char *error,
5544                                 DBusMessageIter *iter, void *user_data)
5545 {
5546         struct supplicant_regdom *regdom = user_data;
5547         int result = 0;
5548
5549         SUPPLICANT_DBG("Country setting result");
5550
5551         if (!user_data)
5552                 return;
5553
5554         if (error) {
5555                 SUPPLICANT_DBG("Country setting failure %s", error);
5556                 result = -EINVAL;
5557         }
5558
5559         if (regdom->callback)
5560                 regdom->callback(result, regdom->alpha2,
5561                                         (void *) regdom->user_data);
5562
5563         g_free(regdom);
5564 }
5565
5566 static void country_params(DBusMessageIter *iter, void *user_data)
5567 {
5568         struct supplicant_regdom *regdom = user_data;
5569
5570         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING,
5571                                                         &regdom->alpha2);
5572 }
5573
5574 int g_supplicant_set_country(const char *alpha2,
5575                                 GSupplicantCountryCallback callback,
5576                                         const void *user_data)
5577 {
5578         struct supplicant_regdom *regdom;
5579         int ret;
5580
5581         SUPPLICANT_DBG("Country setting %s", alpha2);
5582
5583         if (!system_available)
5584                 return -EFAULT;
5585
5586         regdom = dbus_malloc0(sizeof(*regdom));
5587         if (!regdom)
5588                 return -ENOMEM;
5589
5590         regdom->callback = callback;
5591         regdom->alpha2 = alpha2;
5592         regdom->user_data = user_data;
5593
5594         ret =  supplicant_dbus_property_set(SUPPLICANT_PATH, SUPPLICANT_INTERFACE,
5595                                         "Country", DBUS_TYPE_STRING_AS_STRING,
5596                                         country_params, country_result,
5597                                         regdom, NULL);
5598         if (ret < 0) {
5599                 dbus_free(regdom);
5600                 SUPPLICANT_DBG("Unable to set Country configuration");
5601         }
5602         return ret;
5603 }
5604
5605 int g_supplicant_interface_set_country(GSupplicantInterface *interface,
5606                                         GSupplicantCountryCallback callback,
5607                                                         const char *alpha2,
5608                                                         void *user_data)
5609 {
5610         struct supplicant_regdom *regdom;
5611         int ret;
5612
5613         regdom = dbus_malloc0(sizeof(*regdom));
5614         if (!regdom)
5615                 return -ENOMEM;
5616
5617         regdom->callback = callback;
5618         regdom->alpha2 = alpha2;
5619         regdom->user_data = user_data;
5620
5621         ret =  supplicant_dbus_property_set(interface->path,
5622                                 SUPPLICANT_INTERFACE ".Interface",
5623                                 "Country", DBUS_TYPE_STRING_AS_STRING,
5624                                 country_params, country_result,
5625                                         regdom, NULL);
5626         if (ret < 0) {
5627                 dbus_free(regdom);
5628                 SUPPLICANT_DBG("Unable to set Country configuration");
5629         }
5630
5631         return ret;
5632 }
5633
5634 bool g_supplicant_interface_has_p2p(GSupplicantInterface *interface)
5635 {
5636         if (!interface)
5637                 return false;
5638
5639         return interface->p2p_support;
5640 }
5641
5642 struct supplicant_p2p_dev_config {
5643         char *device_name;
5644         char *dev_type;
5645 };
5646
5647 static void p2p_device_config_result(const char *error,
5648                                         DBusMessageIter *iter, void *user_data)
5649 {
5650         struct supplicant_p2p_dev_config *config = user_data;
5651
5652         if (error)
5653                 SUPPLICANT_DBG("Unable to set P2P Device configuration: %s",
5654                                                                         error);
5655
5656         g_free(config->device_name);
5657         g_free(config->dev_type);
5658         dbus_free(config);
5659 }
5660
5661 static int dev_type_str2bin(const char *type, unsigned char dev_type[8])
5662 {
5663         int length, pos, end;
5664         char b[3] = {};
5665         char *e = NULL;
5666
5667         end = strlen(type);
5668         for (length = pos = 0; type[pos] != '\0' && length < 8; length++) {
5669                 if (pos+2 > end)
5670                         return 0;
5671
5672                 b[0] = type[pos];
5673                 b[1] = type[pos+1];
5674
5675                 dev_type[length] = strtol(b, &e, 16);
5676                 if (e && *e != '\0')
5677                         return 0;
5678
5679                 pos += 2;
5680         }
5681
5682         return 8;
5683 }
5684
5685 static void p2p_device_config_params(DBusMessageIter *iter, void *user_data)
5686 {
5687         struct supplicant_p2p_dev_config *config = user_data;
5688         DBusMessageIter dict;
5689
5690         supplicant_dbus_dict_open(iter, &dict);
5691
5692         supplicant_dbus_dict_append_basic(&dict, "DeviceName",
5693                                 DBUS_TYPE_STRING, &config->device_name);
5694
5695         if (config->dev_type) {
5696                 unsigned char dev_type[8] = {}, *type;
5697                 int len;
5698
5699                 len = dev_type_str2bin(config->dev_type, dev_type);
5700                 if (len) {
5701                         type = dev_type;
5702                         supplicant_dbus_dict_append_fixed_array(&dict,
5703                                         "PrimaryDeviceType",
5704                                         DBUS_TYPE_BYTE, &type, len);
5705                 }
5706         }
5707
5708         supplicant_dbus_dict_close(iter, &dict);
5709 }
5710
5711 int g_supplicant_interface_set_p2p_device_config(GSupplicantInterface *interface,
5712                                         const char *device_name,
5713                                         const char *primary_dev_type)
5714 {
5715         struct supplicant_p2p_dev_config *config;
5716         int ret;
5717
5718         SUPPLICANT_DBG("P2P Device settings %s/%s",
5719                                         device_name, primary_dev_type);
5720
5721         config = dbus_malloc0(sizeof(*config));
5722         if (!config)
5723                 return -ENOMEM;
5724
5725         config->device_name = g_strdup(device_name);
5726         config->dev_type = g_strdup(primary_dev_type);
5727
5728         ret = supplicant_dbus_property_set(interface->path,
5729                                 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
5730                                 "P2PDeviceConfig",
5731                                 DBUS_TYPE_ARRAY_AS_STRING
5732                                 DBUS_DICT_ENTRY_BEGIN_CHAR_AS_STRING
5733                                 DBUS_TYPE_STRING_AS_STRING
5734                                 DBUS_TYPE_VARIANT_AS_STRING
5735                                 DBUS_DICT_ENTRY_END_CHAR_AS_STRING,
5736                                 p2p_device_config_params,
5737                                 p2p_device_config_result, config, NULL);
5738         if (ret < 0) {
5739                 g_free(config->device_name);
5740                 g_free(config->dev_type);
5741                 dbus_free(config);
5742                 SUPPLICANT_DBG("Unable to set P2P Device configuration");
5743         }
5744
5745         return ret;
5746 }
5747
5748 static gboolean peer_lookup_by_identifier(gpointer key, gpointer value,
5749                                                         gpointer user_data)
5750 {
5751         const GSupplicantPeer *peer = value;
5752         const char *identifier = user_data;
5753
5754         if (!g_strcmp0(identifier, peer->identifier))
5755                 return TRUE;
5756
5757         return FALSE;
5758 }
5759
5760 GSupplicantPeer *g_supplicant_interface_peer_lookup(GSupplicantInterface *interface,
5761                                                         const char *identifier)
5762 {
5763         GSupplicantPeer *peer;
5764
5765         peer = g_hash_table_find(interface->peer_table,
5766                                         peer_lookup_by_identifier,
5767                                         (void *) identifier);
5768         return peer;
5769 }
5770
5771 static void interface_create_data_free(struct interface_create_data *data)
5772 {
5773         g_free(data->ifname);
5774         g_free(data->driver);
5775         g_free(data->bridge);
5776 #if defined TIZEN_EXT_WIFI_MESH
5777         g_free(data->parent_ifname);
5778 #endif
5779         dbus_free(data);
5780 }
5781
5782 static bool interface_exists(GSupplicantInterface *interface,
5783                                 const char *path)
5784 {
5785         GSupplicantInterface *tmp;
5786
5787         tmp = g_hash_table_lookup(interface_table, path);
5788         if (tmp && tmp == interface)
5789                 return true;
5790
5791         return false;
5792 }
5793
5794 static void interface_create_property(const char *key, DBusMessageIter *iter,
5795                                                         void *user_data)
5796 {
5797         struct interface_create_data *data = user_data;
5798         GSupplicantInterface *interface = data->interface;
5799
5800         if (!key) {
5801                 if (data->callback) {
5802                         data->callback(0, data->interface, data->user_data);
5803 #if !defined TIZEN_EXT
5804                         callback_p2p_support(interface);
5805 #endif
5806 #if defined TIZEN_EXT_WIFI_MESH
5807                         callback_mesh_support(interface);
5808 #endif
5809                 }
5810
5811                 interface_create_data_free(data);
5812         }
5813
5814         interface_property(key, iter, interface);
5815 }
5816
5817 static void interface_create_result(const char *error,
5818                                 DBusMessageIter *iter, void *user_data)
5819 {
5820         struct interface_create_data *data = user_data;
5821         const char *path = NULL;
5822         int err;
5823
5824         SUPPLICANT_DBG("");
5825
5826         if (error) {
5827                 g_warning("error %s", error);
5828                 err = -EIO;
5829                 goto done;
5830         }
5831
5832         dbus_message_iter_get_basic(iter, &path);
5833         if (!path) {
5834                 err = -EINVAL;
5835                 goto done;
5836         }
5837
5838         if (!system_available) {
5839                 err = -EFAULT;
5840                 goto done;
5841         }
5842
5843         data->interface = g_hash_table_lookup(interface_table, path);
5844         if (!data->interface) {
5845                 data->interface = interface_alloc(path);
5846                 if (!data->interface) {
5847                         err = -ENOMEM;
5848                         goto done;
5849                 }
5850         }
5851
5852         err = supplicant_dbus_property_get_all(path,
5853                                         SUPPLICANT_INTERFACE ".Interface",
5854                                         interface_create_property, data,
5855                                         NULL);
5856         if (err == 0)
5857                 return;
5858
5859 done:
5860         if (data->callback)
5861                 data->callback(err, NULL, data->user_data);
5862
5863         interface_create_data_free(data);
5864 }
5865
5866 static void interface_create_params(DBusMessageIter *iter, void *user_data)
5867 {
5868         struct interface_create_data *data = user_data;
5869         DBusMessageIter dict;
5870         char *config_file = NULL;
5871
5872         SUPPLICANT_DBG("");
5873
5874         supplicant_dbus_dict_open(iter, &dict);
5875
5876         supplicant_dbus_dict_append_basic(&dict, "Ifname",
5877                                         DBUS_TYPE_STRING, &data->ifname);
5878
5879         if (data->driver)
5880                 supplicant_dbus_dict_append_basic(&dict, "Driver",
5881                                         DBUS_TYPE_STRING, &data->driver);
5882
5883         if (data->bridge)
5884                 supplicant_dbus_dict_append_basic(&dict, "BridgeIfname",
5885                                         DBUS_TYPE_STRING, &data->bridge);
5886
5887         config_file = g_hash_table_lookup(config_file_table, data->ifname);
5888         if (config_file) {
5889                 SUPPLICANT_DBG("[%s] ConfigFile %s", data->ifname, config_file);
5890
5891                 supplicant_dbus_dict_append_basic(&dict, "ConfigFile",
5892                                         DBUS_TYPE_STRING, &config_file);
5893         }
5894
5895 #ifdef TIZEN_EXT
5896         if (data->driver && g_strstr_len(data->driver, strlen(data->driver), "nl80211")) {
5897                 supplicant_dbus_dict_append_basic(&dict, "MacAddr",
5898                                 DBUS_TYPE_UINT32, &data->mac_addr);
5899
5900                 supplicant_dbus_dict_append_basic(&dict, "PreassocMacAddr",
5901                                 DBUS_TYPE_UINT32, &data->preassoc_mac_addr);
5902
5903                 supplicant_dbus_dict_append_basic(&dict, "RandAddrLifetime",
5904                                 DBUS_TYPE_UINT32, &data->random_mac_lifetime);
5905         }
5906 #endif /* TIZEN_EXT */
5907
5908 #if defined TIZEN_EXT_WIFI_MESH
5909         if (data->is_mesh_interface) {
5910                 if (data->parent_ifname)
5911                         supplicant_dbus_dict_append_basic(&dict, "ParentIfname",
5912                                         DBUS_TYPE_STRING, &data->parent_ifname);
5913
5914                 supplicant_dbus_dict_append_basic(&dict, "IsMeshInterface",
5915                                         DBUS_TYPE_BOOLEAN, &data->is_mesh_interface);
5916         }
5917 #endif
5918
5919         supplicant_dbus_dict_close(iter, &dict);
5920 }
5921
5922 #if defined TIZEN_EXT
5923 static void interface_get_state(const char *key, DBusMessageIter *iter,
5924                 void *user_data)
5925 {
5926         struct interface_create_data *data = user_data;
5927         GSupplicantInterface *interface = NULL;
5928         const char *str = NULL;
5929
5930         SUPPLICANT_DBG("key[%s]", key);
5931
5932         if (!data) {
5933                 SUPPLICANT_DBG("data is NULL");
5934                 return;
5935         }
5936
5937         interface = data->interface;
5938         if (!interface) {
5939                 SUPPLICANT_DBG("interface is NULL");
5940                 return;
5941         }
5942
5943         if (iter)
5944                 dbus_message_iter_get_basic(iter, &str);
5945
5946         if (str) {
5947                 if (string2state(str) != interface->state)
5948                         interface->state = string2state(str);
5949         }
5950
5951         if (interface->state == G_SUPPLICANT_STATE_DISABLED)
5952                 interface->ready = FALSE;
5953         else
5954                 interface->ready = TRUE;
5955
5956         SUPPLICANT_DBG("state %s (%d)", str, interface->state);
5957
5958         if (data->callback) {
5959                 data->callback(0, interface, data->user_data);
5960 #if defined TIZEN_EXT_WIFI_MESH
5961                 callback_mesh_support(interface);
5962 #endif
5963         }
5964
5965         interface_create_data_free(data);
5966 }
5967 #endif
5968
5969 static void interface_get_result(const char *error,
5970                                 DBusMessageIter *iter, void *user_data)
5971 {
5972         struct interface_create_data *data = user_data;
5973         GSupplicantInterface *interface;
5974         const char *path = NULL;
5975         int err;
5976
5977 #if defined TIZEN_EXT
5978         if (!simplified_log)
5979 #endif
5980         SUPPLICANT_DBG("");
5981
5982         if (error) {
5983                 SUPPLICANT_DBG("Interface not created yet");
5984                 goto create;
5985         }
5986
5987         dbus_message_iter_get_basic(iter, &path);
5988         if (!path) {
5989                 err = -EINVAL;
5990                 goto done;
5991         }
5992
5993         interface = g_hash_table_lookup(interface_table, path);
5994         if (!interface) {
5995                 err = -ENOENT;
5996                 goto done;
5997         }
5998
5999 #if defined TIZEN_EXT
6000         data->interface = interface;
6001         err = supplicant_dbus_property_get(path,
6002                         SUPPLICANT_INTERFACE ".Interface",
6003                         "State", interface_get_state, data, NULL);
6004
6005         if (err == 0)
6006                 return;
6007 #endif
6008
6009         if (data->callback) {
6010                 data->callback(0, interface, data->user_data);
6011 #if !defined TIZEN_EXT
6012                 callback_p2p_support(interface);
6013 #endif
6014 #if defined TIZEN_EXT_WIFI_MESH
6015                 callback_mesh_support(interface);
6016 #endif
6017         }
6018
6019         interface_create_data_free(data);
6020
6021         return;
6022
6023 create:
6024         if (!system_available) {
6025                 err = -EFAULT;
6026                 goto done;
6027         }
6028
6029         SUPPLICANT_DBG("Creating interface");
6030
6031         err = supplicant_dbus_method_call(SUPPLICANT_PATH,
6032                                                 SUPPLICANT_INTERFACE,
6033                                                 "CreateInterface",
6034                                                 interface_create_params,
6035                                                 interface_create_result, data,
6036                                                 NULL);
6037         if (err == 0)
6038                 return;
6039
6040 done:
6041         if (data->callback)
6042                 data->callback(err, NULL, data->user_data);
6043
6044         interface_create_data_free(data);
6045 }
6046
6047 static void interface_get_params(DBusMessageIter *iter, void *user_data)
6048 {
6049         struct interface_create_data *data = user_data;
6050 #if defined TIZEN_EXT
6051         if (!simplified_log)
6052 #endif
6053         SUPPLICANT_DBG("");
6054
6055         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, &data->ifname);
6056 }
6057
6058 #if defined TIZEN_EXT_WIFI_MESH
6059 int g_supplicant_mesh_interface_create(const char *ifname, const char *driver,
6060                                                 const char *bridge, const char *parent_ifname,
6061                                                 GSupplicantInterfaceCallback callback, void *user_data)
6062 {
6063         struct interface_create_data *data;
6064         int ret;
6065
6066         SUPPLICANT_DBG("ifname %s", ifname);
6067
6068         if (!ifname || !parent_ifname)
6069                 return -EINVAL;
6070
6071         if (!system_available)
6072                 return -EFAULT;
6073
6074         data = dbus_malloc0(sizeof(*data));
6075         if (!data)
6076                 return -ENOMEM;
6077
6078         data->ifname = g_strdup(ifname);
6079         data->driver = g_strdup(driver);
6080         data->bridge = g_strdup(bridge);
6081         data->is_mesh_interface = true;
6082         data->parent_ifname = g_strdup(parent_ifname);
6083         data->callback = callback;
6084         data->user_data = user_data;
6085
6086         ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
6087                                                 SUPPLICANT_INTERFACE,
6088                                                 "CreateInterface",
6089                                                 interface_create_params,
6090                                                 interface_create_result, data,
6091                                                 NULL);
6092         return ret;
6093 }
6094
6095 struct interface_mesh_peer_data {
6096         char *peer_address;
6097         char *method;
6098         GSupplicantInterface *interface;
6099         GSupplicantInterfaceCallback callback;
6100         void *user_data;
6101 };
6102
6103 static void interface_mesh_change_peer_params(DBusMessageIter *iter,
6104                                                 void *user_data)
6105 {
6106         struct interface_mesh_peer_data *data = user_data;
6107
6108         SUPPLICANT_DBG("");
6109
6110         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, &data->peer_address);
6111 }
6112
6113 static void interface_mesh_change_peer_result(const char *error,
6114                                 DBusMessageIter *iter, void *user_data)
6115 {
6116         struct interface_mesh_peer_data *data = user_data;
6117         int err = 0;
6118
6119         SUPPLICANT_DBG("%s", data->method);
6120
6121         if (error) {
6122                 err = -EIO;
6123                 SUPPLICANT_DBG("error %s", error);
6124         }
6125
6126         if (data->callback)
6127                 data->callback(err, data->interface, data->user_data);
6128
6129         g_free(data->peer_address);
6130         g_free(data->method);
6131         dbus_free(data);
6132 }
6133
6134 int g_supplicant_interface_mesh_peer_change_status(
6135                                 GSupplicantInterface *interface,
6136                                 GSupplicantInterfaceCallback callback, const char *peer_address,
6137                                 const char *method, void *user_data)
6138 {
6139         struct interface_mesh_peer_data *data;
6140         int ret;
6141
6142         if (!peer_address)
6143                 return -EINVAL;
6144
6145         data = dbus_malloc0(sizeof(*data));
6146         if (!data)
6147                 return -ENOMEM;
6148
6149         data->peer_address = g_strdup(peer_address);
6150         data->method = g_strdup(method);
6151         data->interface = interface;
6152         data->callback = callback;
6153         data->user_data = user_data;
6154
6155         ret = supplicant_dbus_method_call(interface->path,
6156                                                 SUPPLICANT_INTERFACE ".Interface.Mesh",
6157                                                 method, interface_mesh_change_peer_params,
6158                                                 interface_mesh_change_peer_result, data, NULL);
6159         if (ret < 0) {
6160                 g_free(data->peer_address);
6161                 g_free(data->method);
6162                 dbus_free(data);
6163         }
6164
6165         return ret;
6166 }
6167 #endif
6168
6169 int g_supplicant_interface_create(const char *ifname, const char *driver,
6170                                         const char *bridge,
6171 #ifdef TIZEN_EXT
6172                                         unsigned int mac_policy,
6173                                         unsigned int preassoc_mac_policy,
6174                                         unsigned int random_mac_lifetime,
6175 #endif /* TIZEN_EXT */
6176                                         GSupplicantInterfaceCallback callback,
6177                                                         void *user_data)
6178 {
6179         struct interface_create_data *data;
6180         int ret;
6181
6182         SUPPLICANT_DBG("ifname %s", ifname);
6183
6184         if (!ifname)
6185                 return -EINVAL;
6186
6187         if (!system_available)
6188                 return -EFAULT;
6189
6190         data = dbus_malloc0(sizeof(*data));
6191         if (!data)
6192                 return -ENOMEM;
6193
6194         data->ifname = g_strdup(ifname);
6195         data->driver = g_strdup(driver);
6196         data->bridge = g_strdup(bridge);
6197         data->callback = callback;
6198 #ifdef TIZEN_EXT
6199         data->mac_addr = mac_policy;
6200         data->preassoc_mac_addr = preassoc_mac_policy;
6201         data->random_mac_lifetime = random_mac_lifetime;
6202 #endif /* TIZEN_EXT */
6203         data->user_data = user_data;
6204
6205         ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
6206                                                 SUPPLICANT_INTERFACE,
6207                                                 "GetInterface",
6208                                                 interface_get_params,
6209                                                 interface_get_result, data,
6210                                                 NULL);
6211         if (ret < 0)
6212                 interface_create_data_free(data);
6213
6214         return ret;
6215 }
6216
6217 static void interface_remove_result(const char *error,
6218                                 DBusMessageIter *iter, void *user_data)
6219 {
6220         struct interface_data *data = user_data;
6221         int err;
6222
6223         if (error) {
6224                 err = -EIO;
6225                 SUPPLICANT_DBG("error: %s", error);
6226                 goto done;
6227         }
6228
6229         if (!system_available) {
6230                 err = -EFAULT;
6231                 goto done;
6232         }
6233
6234         /*
6235          * The gsupplicant interface is already freed by the InterfaceRemoved
6236          * signal callback. Simply invoke the interface_data callback.
6237          */
6238         err = 0;
6239
6240 done:
6241         g_free(data->path);
6242
6243         if (data->callback)
6244                 data->callback(err, NULL, data->user_data);
6245
6246         dbus_free(data);
6247 }
6248
6249
6250 static void interface_remove_params(DBusMessageIter *iter, void *user_data)
6251 {
6252         struct interface_data *data = user_data;
6253
6254         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
6255                                                         &data->interface->path);
6256 }
6257
6258 int g_supplicant_interface_remove(GSupplicantInterface *interface,
6259                         GSupplicantInterfaceCallback callback,
6260                                                         void *user_data)
6261 {
6262         struct interface_data *data;
6263         int ret;
6264
6265         if (!interface)
6266                 return -EINVAL;
6267
6268         if (!system_available)
6269                 return -EFAULT;
6270
6271         g_supplicant_interface_cancel(interface);
6272
6273         data = dbus_malloc0(sizeof(*data));
6274         if (!data)
6275                 return -ENOMEM;
6276
6277         data->interface = interface;
6278         data->path = g_strdup(interface->path);
6279         data->callback = callback;
6280         data->user_data = user_data;
6281
6282         ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
6283                                                 SUPPLICANT_INTERFACE,
6284                                                 "RemoveInterface",
6285                                                 interface_remove_params,
6286                                                 interface_remove_result, data,
6287                                                 NULL);
6288         if (ret < 0) {
6289                 g_free(data->path);
6290                 dbus_free(data);
6291         }
6292         return ret;
6293 }
6294
6295 static void interface_scan_result(const char *error,
6296                                 DBusMessageIter *iter, void *user_data)
6297 {
6298         struct interface_scan_data *data = user_data;
6299         int err = 0;
6300
6301         if (error) {
6302                 SUPPLICANT_DBG("error %s", error);
6303                 err = -EIO;
6304         }
6305
6306         /* A non ready interface cannot send/receive anything */
6307         if (interface_exists(data->interface, data->path)) {
6308                 if (!data->interface->ready)
6309                         err = -ENOLINK;
6310         }
6311
6312         g_free(data->path);
6313
6314         if (err != 0) {
6315                 if (data->callback)
6316                         data->callback(err, data->interface, data->user_data);
6317         } else {
6318                 data->interface->scan_callback = data->callback;
6319                 data->interface->scan_data = data->user_data;
6320         }
6321
6322         if (data->scan_params)
6323                 g_supplicant_free_scan_params(data->scan_params);
6324
6325         dbus_free(data);
6326 }
6327
6328 static void add_scan_frequency(DBusMessageIter *iter, unsigned int freq)
6329 {
6330         DBusMessageIter data;
6331         unsigned int width = 0; /* Not used by wpa_supplicant atm */
6332
6333         dbus_message_iter_open_container(iter, DBUS_TYPE_STRUCT, NULL, &data);
6334
6335         dbus_message_iter_append_basic(&data, DBUS_TYPE_UINT32, &freq);
6336         dbus_message_iter_append_basic(&data, DBUS_TYPE_UINT32, &width);
6337
6338         dbus_message_iter_close_container(iter, &data);
6339 }
6340
6341 static void add_scan_frequencies(DBusMessageIter *iter,
6342                                                 void *user_data)
6343 {
6344         GSupplicantScanParams *scan_data = user_data;
6345         unsigned int freq;
6346         int i;
6347
6348         for (i = 0; i < scan_data->num_freqs; i++) {
6349                 freq = scan_data->freqs[i];
6350                 if (!freq)
6351                         break;
6352
6353                 add_scan_frequency(iter, freq);
6354         }
6355 }
6356
6357 static void append_ssid(DBusMessageIter *iter,
6358                         const void *ssid, unsigned int len)
6359 {
6360         DBusMessageIter array;
6361
6362         dbus_message_iter_open_container(iter, DBUS_TYPE_ARRAY,
6363         DBUS_TYPE_BYTE_AS_STRING, &array);
6364
6365         dbus_message_iter_append_fixed_array(&array, DBUS_TYPE_BYTE,
6366                                                                 &ssid, len);
6367         dbus_message_iter_close_container(iter, &array);
6368 }
6369
6370 static void append_ssids(DBusMessageIter *iter, void *user_data)
6371 {
6372         GSupplicantScanParams *scan_data = user_data;
6373         GSList *list;
6374
6375         for (list = scan_data->ssids; list; list = list->next) {
6376                 struct scan_ssid *scan_ssid = list->data;
6377
6378                 append_ssid(iter, scan_ssid->ssid, scan_ssid->ssid_len);
6379         }
6380 }
6381
6382 static void supplicant_add_scan_frequency(DBusMessageIter *dict,
6383                 supplicant_dbus_array_function function,
6384                                         void *user_data)
6385 {
6386         GSupplicantScanParams *scan_params = user_data;
6387         DBusMessageIter entry, value, array;
6388         const char *key = "Channels";
6389
6390         if (scan_params->freqs && scan_params->freqs[0] != 0) {
6391                 dbus_message_iter_open_container(dict, DBUS_TYPE_DICT_ENTRY,
6392                                                 NULL, &entry);
6393
6394                 dbus_message_iter_append_basic(&entry, DBUS_TYPE_STRING, &key);
6395
6396                 dbus_message_iter_open_container(&entry, DBUS_TYPE_VARIANT,
6397                                         DBUS_TYPE_ARRAY_AS_STRING
6398                                         DBUS_STRUCT_BEGIN_CHAR_AS_STRING
6399                                         DBUS_TYPE_UINT32_AS_STRING
6400                                         DBUS_TYPE_UINT32_AS_STRING
6401                                         DBUS_STRUCT_END_CHAR_AS_STRING,
6402                                         &value);
6403
6404                 dbus_message_iter_open_container(&value, DBUS_TYPE_ARRAY,
6405                                         DBUS_STRUCT_BEGIN_CHAR_AS_STRING
6406                                         DBUS_TYPE_UINT32_AS_STRING
6407                                         DBUS_TYPE_UINT32_AS_STRING
6408                                         DBUS_STRUCT_END_CHAR_AS_STRING,
6409                                         &array);
6410
6411                 if (function)
6412                         function(&array, user_data);
6413
6414                 dbus_message_iter_close_container(&value, &array);
6415                 dbus_message_iter_close_container(&entry, &value);
6416                 dbus_message_iter_close_container(dict, &entry);
6417         }
6418 }
6419
6420 static void interface_scan_params(DBusMessageIter *iter, void *user_data)
6421 {
6422         DBusMessageIter dict;
6423         const char *type = "passive";
6424         struct interface_scan_data *data = user_data;
6425
6426         supplicant_dbus_dict_open(iter, &dict);
6427
6428         if (data && data->scan_params) {
6429                 type = "active";
6430
6431                 supplicant_dbus_dict_append_basic(&dict, "Type",
6432                                         DBUS_TYPE_STRING, &type);
6433
6434 #if defined TIZEN_EXT
6435                 SUPPLICANT_DBG("[specific_scan] num_ssids %d",
6436                                data->scan_params->num_ssids);
6437 #endif
6438
6439                 if (data->scan_params->ssids) {
6440                         supplicant_dbus_dict_append_array(&dict, "SSIDs",
6441                                                         DBUS_TYPE_STRING,
6442                                                         append_ssids,
6443                                                         data->scan_params);
6444                 }
6445                 supplicant_add_scan_frequency(&dict, add_scan_frequencies,
6446                                                 data->scan_params);
6447         } else
6448                 supplicant_dbus_dict_append_basic(&dict, "Type",
6449                                         DBUS_TYPE_STRING, &type);
6450
6451         supplicant_dbus_dict_close(iter, &dict);
6452 }
6453
6454 static int interface_ready_to_scan(GSupplicantInterface *interface)
6455 {
6456         if (!interface)
6457                 return -EINVAL;
6458
6459         if (!system_available)
6460                 return -EFAULT;
6461
6462         if (interface->scanning)
6463                 return -EALREADY;
6464
6465         switch (interface->state) {
6466         case G_SUPPLICANT_STATE_AUTHENTICATING:
6467         case G_SUPPLICANT_STATE_ASSOCIATING:
6468         case G_SUPPLICANT_STATE_ASSOCIATED:
6469         case G_SUPPLICANT_STATE_4WAY_HANDSHAKE:
6470         case G_SUPPLICANT_STATE_GROUP_HANDSHAKE:
6471                 return -EBUSY;
6472 #if defined TIZEN_EXT
6473         case G_SUPPLICANT_STATE_DISABLED:
6474                 return -ENOLINK;
6475         case G_SUPPLICANT_STATE_UNKNOWN:
6476 #else
6477         case G_SUPPLICANT_STATE_UNKNOWN:
6478         case G_SUPPLICANT_STATE_DISABLED:
6479 #endif
6480         case G_SUPPLICANT_STATE_DISCONNECTED:
6481         case G_SUPPLICANT_STATE_INACTIVE:
6482         case G_SUPPLICANT_STATE_SCANNING:
6483         case G_SUPPLICANT_STATE_COMPLETED:
6484                 break;
6485         }
6486
6487         return 0;
6488 }
6489
6490 #if defined TIZEN_EXT_WIFI_MESH
6491 static void interface_abort_scan_result(const char *error,
6492                                 DBusMessageIter *iter, void *user_data)
6493 {
6494         struct interface_scan_data *data = user_data;
6495         int err = 0;
6496
6497         if (error) {
6498                 SUPPLICANT_DBG("error %s", error);
6499                 err = -EIO;
6500         }
6501
6502         g_free(data->path);
6503
6504                 if (data->callback)
6505                         data->callback(err, data->interface, data->user_data);
6506
6507         dbus_free(data);
6508 }
6509
6510 int g_supplicant_interface_abort_scan(GSupplicantInterface *interface,
6511                                 GSupplicantInterfaceCallback callback, void *user_data)
6512 {
6513         struct interface_scan_data *data;
6514         int ret;
6515
6516         if (!interface->scanning)
6517                 return -EEXIST;
6518
6519         data = dbus_malloc0(sizeof(*data));
6520         if (!data)
6521                 return -ENOMEM;
6522
6523         data->interface = interface;
6524         data->path = g_strdup(interface->path);
6525         data->callback = callback;
6526         data->user_data = user_data;
6527
6528         ret = supplicant_dbus_method_call(interface->path,
6529                         SUPPLICANT_INTERFACE ".Interface", "AbortScan", NULL,
6530                         interface_abort_scan_result, data, interface);
6531
6532         if (ret < 0) {
6533                 g_free(data->path);
6534                 dbus_free(data);
6535         }
6536
6537         return ret;
6538 }
6539 #endif
6540
6541 int g_supplicant_interface_scan(GSupplicantInterface *interface,
6542                                 GSupplicantScanParams *scan_data,
6543                                 GSupplicantInterfaceCallback callback,
6544                                                         void *user_data)
6545 {
6546         struct interface_scan_data *data;
6547         int ret;
6548
6549         ret = interface_ready_to_scan(interface);
6550         if (ret)
6551                 return ret;
6552
6553         data = dbus_malloc0(sizeof(*data));
6554         if (!data)
6555                 return -ENOMEM;
6556
6557         data->interface = interface;
6558         data->path = g_strdup(interface->path);
6559 #if defined TIZEN_EXT
6560         data->interface->scan_callback = data->callback = callback;
6561         data->interface->scan_data = data->user_data = user_data;
6562 #else
6563         data->callback = callback;
6564         data->user_data = user_data;
6565 #endif
6566         data->scan_params = scan_data;
6567
6568         interface->scan_callback = callback;
6569         interface->scan_data = user_data;
6570
6571         ret = supplicant_dbus_method_call(interface->path,
6572                         SUPPLICANT_INTERFACE ".Interface", "Scan",
6573                         interface_scan_params, interface_scan_result, data,
6574                         interface);
6575
6576         if (ret < 0) {
6577                 g_free(data->path);
6578                 dbus_free(data);
6579         }
6580
6581         return ret;
6582 }
6583
6584 #if defined TIZEN_EXT
6585 static void interface_signalpoll_result(const char *error,
6586                                 DBusMessageIter *iter, void *user_data)
6587 {
6588         struct interface_signalpoll_data *data = user_data;
6589         int err = 0;
6590         dbus_int32_t maxspeed = 0;
6591         dbus_int32_t strength = 0;
6592         dbus_int32_t snr = 0;
6593         DBusMessageIter sub_iter, dict;
6594
6595         if (error) {
6596                 err = -EIO;
6597                 SUPPLICANT_DBG("error: %s", error);
6598                 goto out;
6599         }
6600
6601         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_VARIANT) {
6602                 err = -EINVAL;
6603                 SUPPLICANT_DBG("invalid reply");
6604                 goto out;
6605         }
6606
6607         dbus_message_iter_recurse(iter, &sub_iter);
6608         dbus_message_iter_recurse(&sub_iter, &dict);
6609
6610         while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_DICT_ENTRY) {
6611                 DBusMessageIter entry, value;
6612                 const char *key;
6613
6614                 dbus_message_iter_recurse(&dict, &entry);
6615                 dbus_message_iter_get_basic(&entry, &key);
6616                 dbus_message_iter_next(&entry);
6617                 dbus_message_iter_recurse(&entry, &value);
6618
6619                 switch (dbus_message_iter_get_arg_type(&value)) {
6620                 case DBUS_TYPE_INT32:
6621                         if (g_strcmp0(key, "linkspeed") == 0) {
6622                                 dbus_message_iter_get_basic(&value, &maxspeed);
6623                                 SUPPLICANT_DBG("linkspeed = %d", maxspeed);
6624                                 break;
6625                         } else if (g_strcmp0(key, "rssi") == 0) {
6626                                 dbus_message_iter_get_basic(&value, &strength);
6627                                 SUPPLICANT_DBG("Strength = %d", strength);
6628                                 break;
6629                         } else if (g_strcmp0(key, "SNR") == 0) {
6630                                 dbus_message_iter_get_basic(&value, &snr);
6631                                 SUPPLICANT_DBG("SNR = %d", snr);
6632                                 break;
6633                         }
6634                 }
6635                 dbus_message_iter_next(&dict);
6636         }
6637
6638 out:
6639         if(data->callback)
6640                 data->callback(err, maxspeed, strength, snr, data->user_data);
6641
6642         g_free(data->path);
6643         dbus_free(data);
6644 }
6645
6646 int g_supplicant_interface_signalpoll(GSupplicantInterface *interface,
6647                                 GSupplicantMaxSpeedCallback callback,
6648                                 void *user_data)
6649 {
6650         struct interface_signalpoll_data *data;
6651         int ret;
6652
6653         if (!interface)
6654                 return -EINVAL;
6655
6656         if (!system_available)
6657                 return -EFAULT;
6658
6659         data = dbus_malloc0(sizeof(*data));
6660         if (!data)
6661                 return -ENOMEM;
6662
6663         data->interface = interface;
6664         data->path = g_strdup(interface->path);
6665         data->callback = callback;
6666         data->user_data = user_data;
6667
6668         ret = supplicant_dbus_method_call(interface->path,
6669                         SUPPLICANT_INTERFACE ".Interface", "SignalPoll",
6670                         NULL, interface_signalpoll_result, data,
6671                         interface);
6672
6673         if (ret < 0) {
6674                 g_free(data->path);
6675                 dbus_free(data);
6676         }
6677
6678         return ret;
6679 }
6680 #endif
6681
6682 static int parse_supplicant_error(DBusMessageIter *iter)
6683 {
6684         int err = -ECONNABORTED;
6685         char *key;
6686
6687         if (!iter)
6688                 return err;
6689
6690         /* If the given passphrase is malformed wpa_s returns
6691          * "invalid message format" but this error should be interpreted as
6692          * invalid-key.
6693          */
6694         while (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_STRING) {
6695                 dbus_message_iter_get_basic(iter, &key);
6696                 if (strncmp(key, "psk", 3) == 0 ||
6697                                 strncmp(key, "wep_key", 7) == 0 ||
6698                                 strcmp(key, "invalid message format") == 0) {
6699                         err = -ENOKEY;
6700                         break;
6701                 }
6702                 dbus_message_iter_next(iter);
6703         }
6704
6705         return err;
6706 }
6707
6708 static void interface_select_network_result(const char *error,
6709                                 DBusMessageIter *iter, void *user_data)
6710 {
6711         struct interface_connect_data *data = user_data;
6712         int err;
6713
6714         SUPPLICANT_DBG("");
6715
6716         err = 0;
6717         if (error) {
6718 #if defined TIZEN_EXT
6719                 SUPPLICANT_DBG("SelectNetwork errorFreq %s", error);
6720 #else
6721                 SUPPLICANT_DBG("SelectNetwork error %s", error);
6722 #endif
6723                 err = parse_supplicant_error(iter);
6724         }
6725
6726         g_free(data->path);
6727
6728         if (data->callback)
6729                 data->callback(err, data->interface, data->user_data);
6730
6731 #if defined TIZEN_EXT
6732         g_free(data->ssid->ssid);
6733         if (data->ssid->is_passphrase_alloc)
6734                 g_free((char *)data->ssid->passphrase);
6735         if (data->ssid->is_connector_alloc)
6736                 g_free((char *)data->ssid->connector);
6737         if (data->ssid->is_c_sign_key_alloc)
6738                 g_free((char *)data->ssid->c_sign_key);
6739         if (data->ssid->is_net_access_key_alloc)
6740                 g_free((char *)data->ssid->net_access_key);
6741 #endif
6742         g_free(data->ssid);
6743         dbus_free(data);
6744 }
6745
6746 static void interface_select_network_params(DBusMessageIter *iter,
6747                                                         void *user_data)
6748 {
6749         struct interface_connect_data *data = user_data;
6750         GSupplicantInterface *interface = data->interface;
6751 #if defined TIZEN_EXT
6752         GSupplicantSSID *ssid = data->ssid;
6753 #endif
6754
6755         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
6756                                         &interface->network_path);
6757 #if defined TIZEN_EXT
6758         if (!ssid->bssid_for_connect_len)
6759                 dbus_message_iter_append_basic(iter, DBUS_TYPE_INT32, &ssid->freq);
6760 #endif
6761 }
6762
6763 static void interface_add_network_result(const char *error,
6764                                 DBusMessageIter *iter, void *user_data)
6765 {
6766         struct interface_connect_data *data = user_data;
6767         GSupplicantInterface *interface = data->interface;
6768         const char *path;
6769         int err;
6770
6771         if (error)
6772                 goto error;
6773
6774         dbus_message_iter_get_basic(iter, &path);
6775         if (!path)
6776                 goto error;
6777
6778         SUPPLICANT_DBG("PATH: %s", path);
6779
6780 #if defined TIZEN_EXT
6781         if (interface->network_path)
6782                 g_free(interface->network_path);
6783 #endif
6784         interface->network_path = g_strdup(path);
6785
6786         store_network_information(interface, data->ssid);
6787
6788 #if defined TIZEN_EXT
6789         SUPPLICANT_DBG(".Interface.SelectNetworkFreq");
6790         GSupplicantSSID *ssid = data->ssid;
6791
6792         if (!ssid->bssid_for_connect_len)
6793                 supplicant_dbus_method_call(data->interface->path,
6794                                 SUPPLICANT_INTERFACE ".Interface", "SelectNetworkFreq",
6795                                 interface_select_network_params,
6796                                 interface_select_network_result, data,
6797                                 interface);
6798         else
6799                 supplicant_dbus_method_call(data->interface->path,
6800                                 SUPPLICANT_INTERFACE ".Interface", "SelectNetwork",
6801                                 interface_select_network_params,
6802                                 interface_select_network_result, data,
6803                                 interface);
6804 #else
6805         supplicant_dbus_method_call(data->interface->path,
6806                         SUPPLICANT_INTERFACE ".Interface", "SelectNetwork",
6807                         interface_select_network_params,
6808                         interface_select_network_result, data,
6809                         interface);
6810 #endif
6811
6812         return;
6813
6814 error:
6815         SUPPLICANT_DBG("AddNetwork error %s", error);
6816
6817         if (interface_exists(data->interface, data->interface->path)) {
6818                 err = parse_supplicant_error(iter);
6819                 if (data->callback)
6820                         data->callback(err, data->interface, data->user_data);
6821
6822                 g_free(interface->network_path);
6823                 interface->network_path = NULL;
6824         }
6825
6826         g_free(data->path);
6827 #if defined TIZEN_EXT
6828         g_free(data->ssid->ssid);
6829         if (data->ssid->is_passphrase_alloc)
6830                 g_free((char *)data->ssid->passphrase);
6831         if (data->ssid->is_connector_alloc)
6832                 g_free((char *)data->ssid->connector);
6833         if (data->ssid->is_c_sign_key_alloc)
6834                 g_free((char *)data->ssid->c_sign_key);
6835         if (data->ssid->is_net_access_key_alloc)
6836                 g_free((char *)data->ssid->net_access_key);
6837 #endif
6838         g_free(data->ssid);
6839         g_free(data);
6840 }
6841
6842 static void add_network_security_none(DBusMessageIter *dict)
6843 {
6844         const char *auth_alg = "OPEN";
6845
6846         supplicant_dbus_dict_append_basic(dict, "auth_alg",
6847                                         DBUS_TYPE_STRING, &auth_alg);
6848 }
6849
6850 static void add_network_security_wep(DBusMessageIter *dict,
6851                                         GSupplicantSSID *ssid)
6852 {
6853         const char *auth_alg = "OPEN SHARED";
6854         dbus_uint32_t key_index = 0;
6855
6856         supplicant_dbus_dict_append_basic(dict, "auth_alg",
6857                                         DBUS_TYPE_STRING, &auth_alg);
6858
6859         if (ssid->passphrase) {
6860                 int size = strlen(ssid->passphrase);
6861                 if (size == 10 || size == 26) {
6862                         unsigned char *key = g_try_malloc(13);
6863                         char tmp[3];
6864                         int i;
6865
6866                         memset(tmp, 0, sizeof(tmp));
6867                         if (!key)
6868                                 size = 0;
6869
6870                         for (i = 0; i < size / 2; i++) {
6871                                 memcpy(tmp, ssid->passphrase + (i * 2), 2);
6872                                 key[i] = (unsigned char) strtol(tmp, NULL, 16);
6873                         }
6874
6875                         supplicant_dbus_dict_append_fixed_array(dict,
6876                                                         "wep_key0",
6877                                                         DBUS_TYPE_BYTE,
6878                                                         &key, size / 2);
6879                         g_free(key);
6880                 } else if (size == 5 || size == 13) {
6881                         unsigned char *key = g_try_malloc(13);
6882                         int i;
6883
6884                         if (!key)
6885                                 size = 0;
6886
6887                         for (i = 0; i < size; i++)
6888                                 key[i] = (unsigned char) ssid->passphrase[i];
6889
6890                         supplicant_dbus_dict_append_fixed_array(dict,
6891                                                                 "wep_key0",
6892                                                                 DBUS_TYPE_BYTE,
6893                                                                 &key, size);
6894                         g_free(key);
6895                 } else
6896                         supplicant_dbus_dict_append_basic(dict,
6897                                                         "wep_key0",
6898                                                         DBUS_TYPE_STRING,
6899                                                         &ssid->passphrase);
6900
6901                 supplicant_dbus_dict_append_basic(dict, "wep_tx_keyidx",
6902                                         DBUS_TYPE_UINT32, &key_index);
6903         }
6904 }
6905
6906 static dbus_bool_t is_psk_raw_key(const char *psk)
6907 {
6908         int i;
6909
6910         /* A raw key is always 64 bytes length... */
6911         if (strlen(psk) != 64)
6912                 return FALSE;
6913
6914         /* ... and its content is in hex representation */
6915         for (i = 0; i < 64; i++)
6916                 if (!isxdigit((unsigned char) psk[i]))
6917                         return FALSE;
6918
6919         return TRUE;
6920 }
6921
6922 static unsigned char hexchar2bin(char c)
6923 {
6924         if ((c >= '0') && (c <= '9'))
6925                 return c - '0';
6926         else if ((c >= 'A') && (c <= 'F'))
6927                 return c - 'A' + 10;
6928         else if ((c >= 'a') && (c <= 'f'))
6929                 return c - 'a' + 10;
6930         else
6931                 return c;
6932 }
6933
6934 static void hexstring2bin(const char *string, unsigned char *data,
6935                                 size_t data_len)
6936 {
6937         size_t i;
6938
6939         for (i = 0; i < data_len; i++)
6940                 data[i] = (hexchar2bin(string[i * 2 + 0]) << 4 |
6941                            hexchar2bin(string[i * 2 + 1]) << 0);
6942 }
6943
6944 static void add_network_security_psk(DBusMessageIter *dict,
6945                                         GSupplicantSSID *ssid)
6946 {
6947         if (ssid->passphrase && strlen(ssid->passphrase) > 0) {
6948                 const char *key = "psk";
6949
6950                 if (is_psk_raw_key(ssid->passphrase)) {
6951                         unsigned char data[32];
6952                         unsigned char *datap = data;
6953
6954                         /* The above pointer alias is required by D-Bus because
6955                          * with D-Bus and GCC, non-heap-allocated arrays cannot
6956                          * be passed directly by their base pointer. */
6957
6958                         hexstring2bin(ssid->passphrase, datap, sizeof(data));
6959
6960                         supplicant_dbus_dict_append_fixed_array(dict,
6961                                                         key, DBUS_TYPE_BYTE,
6962                                                         &datap, sizeof(data));
6963                 } else
6964                         supplicant_dbus_dict_append_basic(dict,
6965                                                         key, DBUS_TYPE_STRING,
6966                                                         &ssid->passphrase);
6967         }
6968 }
6969
6970 static void add_network_security_tls(DBusMessageIter *dict,
6971                                         GSupplicantSSID *ssid)
6972 {
6973         /*
6974          * For TLS, we at least need:
6975          *              The client certificate
6976          *              The client private key file
6977          *              The client private key file password
6978          *
6979          * The Authority certificate is optional.
6980          */
6981         if (!ssid->client_cert_path)
6982                 return;
6983
6984         if (!ssid->private_key_path)
6985                 return;
6986
6987         if (!ssid->private_key_passphrase)
6988                 return;
6989
6990         if (ssid->ca_cert_path)
6991                 supplicant_dbus_dict_append_basic(dict, "ca_cert",
6992                                         DBUS_TYPE_STRING, &ssid->ca_cert_path);
6993
6994         supplicant_dbus_dict_append_basic(dict, "private_key",
6995                                                 DBUS_TYPE_STRING,
6996                                                 &ssid->private_key_path);
6997         supplicant_dbus_dict_append_basic(dict, "private_key_passwd",
6998                                                 DBUS_TYPE_STRING,
6999                                                 &ssid->private_key_passphrase);
7000         supplicant_dbus_dict_append_basic(dict, "client_cert",
7001                                                 DBUS_TYPE_STRING,
7002                                                 &ssid->client_cert_path);
7003 }
7004
7005 static void add_network_security_peap(DBusMessageIter *dict,
7006                                         GSupplicantSSID *ssid)
7007 {
7008         char *phase2_auth;
7009
7010         /*
7011          * For PEAP/TTLS, we at least need
7012          *              The authority certificate
7013          *              The 2nd phase authentication method
7014          *              The 2nd phase passphrase
7015          *
7016          * The Client certificate is optional although strongly recommended
7017          * When setting it, we need in addition
7018          *              The Client private key file
7019          *              The Client private key file password
7020          */
7021         if (!ssid->passphrase)
7022                 return;
7023
7024         if (!ssid->phase2_auth)
7025                 return;
7026
7027         if (ssid->client_cert_path) {
7028                 if (!ssid->private_key_path)
7029                         return;
7030
7031 #if !defined TIZEN_EXT
7032                 if (!ssid->private_key_passphrase)
7033                         return;
7034 #endif
7035
7036                 supplicant_dbus_dict_append_basic(dict, "client_cert",
7037                                                 DBUS_TYPE_STRING,
7038                                                 &ssid->client_cert_path);
7039
7040                 supplicant_dbus_dict_append_basic(dict, "private_key",
7041                                                 DBUS_TYPE_STRING,
7042                                                 &ssid->private_key_path);
7043
7044 #if !defined TIZEN_EXT
7045                 supplicant_dbus_dict_append_basic(dict, "private_key_passwd",
7046                                                 DBUS_TYPE_STRING,
7047                                                 &ssid->private_key_passphrase);
7048 #endif
7049
7050         }
7051
7052         if(g_strcmp0(ssid->phase2_auth, "GTC") == 0 && g_strcmp0(ssid->eap, "ttls") == 0)
7053                 phase2_auth = g_strdup_printf("autheap=%s", ssid->phase2_auth);
7054         else if (g_str_has_prefix(ssid->phase2_auth, "EAP-")) {
7055                 phase2_auth = g_strdup_printf("autheap=%s",
7056                                         ssid->phase2_auth + strlen("EAP-"));
7057         } else
7058                 phase2_auth = g_strdup_printf("auth=%s", ssid->phase2_auth);
7059
7060         supplicant_dbus_dict_append_basic(dict, "password",
7061                                                 DBUS_TYPE_STRING,
7062                                                 &ssid->passphrase);
7063
7064         if (ssid->ca_cert_path)
7065                 supplicant_dbus_dict_append_basic(dict, "ca_cert",
7066                                                 DBUS_TYPE_STRING,
7067                                                 &ssid->ca_cert_path);
7068
7069         supplicant_dbus_dict_append_basic(dict, "phase2",
7070                                                 DBUS_TYPE_STRING,
7071                                                 &phase2_auth);
7072
7073         g_free(phase2_auth);
7074 }
7075
7076 #if defined TIZEN_EXT
7077 static void add_network_security_aka_sim(DBusMessageIter *dict,
7078                                         GSupplicantSSID *ssid)
7079 {
7080         if (!ssid->passphrase)
7081                 return;
7082
7083         supplicant_dbus_dict_append_basic(dict, "password",
7084                         DBUS_TYPE_STRING,
7085                         &ssid->passphrase);
7086 }
7087
7088 static void add_network_security_fast(DBusMessageIter *dict,
7089                 GSupplicantSSID *ssid)
7090 {
7091         /*
7092          * For FAST, we at least need:
7093          *              id / password
7094          *              phase1 (provisiong information)
7095          *              pac_file
7096          */
7097
7098         /* Allow provisioing both authenticated and unauthenticated */
7099         const char *phase1 = "fast_provisioning=2";
7100         supplicant_dbus_dict_append_basic(dict, "phase1",
7101                         DBUS_TYPE_STRING,
7102                         &phase1);
7103
7104         SUPPLICANT_DBG("pac_file [%s]", ssid->pac_file);
7105         if(ssid->pac_file)
7106                 supplicant_dbus_dict_append_basic(dict, "pac_file",
7107                                 DBUS_TYPE_STRING,
7108                                 &ssid->pac_file);
7109
7110         supplicant_dbus_dict_append_basic(dict, "password",
7111                         DBUS_TYPE_STRING,
7112                         &ssid->passphrase);
7113 }
7114 #endif
7115
7116 static void add_network_security_eap(DBusMessageIter *dict,
7117                                         GSupplicantSSID *ssid)
7118 {
7119         char *eap_value;
7120
7121 #if defined TIZEN_EXT
7122         if (!ssid->eap)
7123 #else
7124         if (!ssid->eap || !ssid->identity)
7125 #endif
7126                 return;
7127
7128         if (g_strcmp0(ssid->eap, "tls") == 0) {
7129                 add_network_security_tls(dict, ssid);
7130         } else if (g_strcmp0(ssid->eap, "peap") == 0 ||
7131                                 g_strcmp0(ssid->eap, "ttls") == 0) {
7132 #if defined TIZEN_EXT
7133                 if (!ssid->identity)
7134                         return;
7135 #endif
7136                 add_network_security_peap(dict, ssid);
7137
7138 #if defined TIZEN_EXT
7139         } else if (g_strcmp0(ssid->eap, "sim") == 0 ||
7140                         g_strcmp0(ssid->eap, "aka") == 0 ||
7141                         g_strcmp0(ssid->eap, "aka'") == 0) {
7142                 add_network_security_aka_sim(dict, ssid);
7143         } else if (g_strcmp0(ssid->eap, "pwd") == 0) {
7144                 if(!ssid->passphrase)
7145                         return;
7146                 supplicant_dbus_dict_append_basic(dict, "password",
7147                                 DBUS_TYPE_STRING,
7148                                 &ssid->passphrase);
7149         } else if (g_strcmp0(ssid->eap, "fast") == 0){
7150                 if (!ssid->identity || !ssid->passphrase)
7151                         return;
7152
7153                 add_network_security_fast(dict, ssid);
7154 #endif
7155         } else
7156                 return;
7157
7158         eap_value = g_ascii_strup(ssid->eap, -1);
7159
7160         supplicant_dbus_dict_append_basic(dict, "eap",
7161                                                 DBUS_TYPE_STRING,
7162                                                 &eap_value);
7163 #if defined TIZEN_EXT
7164         if (ssid->identity != NULL)
7165                 supplicant_dbus_dict_append_basic(dict, "identity",
7166                                                         DBUS_TYPE_STRING,
7167                                                         &ssid->identity);
7168 #else
7169         supplicant_dbus_dict_append_basic(dict, "identity",
7170                                                 DBUS_TYPE_STRING,
7171                                                 &ssid->identity);
7172 #endif
7173         if(ssid->anonymous_identity)
7174                 supplicant_dbus_dict_append_basic(dict, "anonymous_identity",
7175                                                      DBUS_TYPE_STRING,
7176                                                      &ssid->anonymous_identity);
7177
7178         if(ssid->subject_match)
7179                 supplicant_dbus_dict_append_basic(dict, "subject_match",
7180                                                      DBUS_TYPE_STRING,
7181                                                      &ssid->subject_match);
7182
7183         if(ssid->altsubject_match)
7184                 supplicant_dbus_dict_append_basic(dict, "altsubject_match",
7185                                                      DBUS_TYPE_STRING,
7186                                                      &ssid->altsubject_match);
7187
7188         if(ssid->domain_suffix_match)
7189                 supplicant_dbus_dict_append_basic(dict, "domain_suffix_match",
7190                                                      DBUS_TYPE_STRING,
7191                                                      &ssid->domain_suffix_match);
7192
7193         if(ssid->domain_match)
7194                 supplicant_dbus_dict_append_basic(dict, "domain_match",
7195                                                      DBUS_TYPE_STRING,
7196                                                      &ssid->domain_match);
7197
7198         g_free(eap_value);
7199 }
7200
7201 static void add_network_security_ciphers(DBusMessageIter *dict,
7202                                                 GSupplicantSSID *ssid)
7203 {
7204         unsigned int p_cipher, g_cipher, i;
7205         char *pairwise, *group;
7206         char *pair_ciphers[4];
7207         char *group_ciphers[5];
7208
7209         p_cipher = ssid->pairwise_cipher;
7210         g_cipher = ssid->group_cipher;
7211
7212         if (p_cipher == 0 && g_cipher == 0)
7213                 return;
7214
7215         i = 0;
7216
7217         if (p_cipher & G_SUPPLICANT_PAIRWISE_CCMP)
7218                 pair_ciphers[i++] = "CCMP";
7219
7220         if (p_cipher & G_SUPPLICANT_PAIRWISE_TKIP)
7221                 pair_ciphers[i++] = "TKIP";
7222
7223         if (p_cipher & G_SUPPLICANT_PAIRWISE_NONE)
7224                 pair_ciphers[i++] = "NONE";
7225
7226         pair_ciphers[i] = NULL;
7227
7228         i = 0;
7229
7230         if (g_cipher & G_SUPPLICANT_GROUP_CCMP)
7231                 group_ciphers[i++] = "CCMP";
7232
7233         if (g_cipher & G_SUPPLICANT_GROUP_TKIP)
7234                 group_ciphers[i++] = "TKIP";
7235
7236         if (g_cipher & G_SUPPLICANT_GROUP_WEP104)
7237                 group_ciphers[i++] = "WEP104";
7238
7239         if (g_cipher & G_SUPPLICANT_GROUP_WEP40)
7240                 group_ciphers[i++] = "WEP40";
7241
7242         group_ciphers[i] = NULL;
7243
7244         pairwise = g_strjoinv(" ", pair_ciphers);
7245         group = g_strjoinv(" ", group_ciphers);
7246
7247         SUPPLICANT_DBG("cipher %s %s", pairwise, group);
7248
7249         supplicant_dbus_dict_append_basic(dict, "pairwise",
7250                                                 DBUS_TYPE_STRING,
7251                                                 &pairwise);
7252         supplicant_dbus_dict_append_basic(dict, "group",
7253                                                 DBUS_TYPE_STRING,
7254                                                 &group);
7255
7256         g_free(pairwise);
7257         g_free(group);
7258 }
7259
7260 static void add_network_security_proto(DBusMessageIter *dict,
7261                                                 GSupplicantSSID *ssid)
7262 {
7263         unsigned int protocol, i;
7264         char *proto;
7265         char *protos[3];
7266
7267         protocol = ssid->protocol;
7268
7269         if (protocol == 0)
7270                 return;
7271
7272         i = 0;
7273
7274         if (protocol & G_SUPPLICANT_PROTO_RSN)
7275                 protos[i++] = "RSN";
7276
7277         if (protocol & G_SUPPLICANT_PROTO_WPA)
7278                 protos[i++] = "WPA";
7279
7280         protos[i] = NULL;
7281
7282         proto = g_strjoinv(" ", protos);
7283
7284         SUPPLICANT_DBG("proto %s", proto);
7285
7286         supplicant_dbus_dict_append_basic(dict, "proto",
7287                                                 DBUS_TYPE_STRING,
7288                                                 &proto);
7289
7290         g_free(proto);
7291 }
7292
7293 #if defined TIZEN_EXT
7294 static void add_network_ieee80211w(DBusMessageIter *dict, GSupplicantSSID *ssid)
7295 {
7296         if (ssid->security != G_SUPPLICANT_SECURITY_SAE
7297                         && ssid->security != G_SUPPLICANT_SECURITY_OWE
7298                         && ssid->security != G_SUPPLICANT_SECURITY_PSK_SHA256
7299                         && ssid->security != G_SUPPLICANT_SECURITY_DPP)
7300                 return;
7301
7302         supplicant_dbus_dict_append_basic(dict, "ieee80211w", DBUS_TYPE_UINT32,
7303                                           &ssid->ieee80211w);
7304 }
7305
7306 static void add_network_security_connector(DBusMessageIter *dict, GSupplicantSSID *ssid)
7307 {
7308         if (ssid->connector && strlen(ssid->connector) > 0) {
7309                 const char *key = "dpp_connector";
7310
7311                 supplicant_dbus_dict_append_basic(dict,
7312                                 key, DBUS_TYPE_STRING,
7313                                 &ssid->connector);
7314         }
7315 }
7316
7317 static size_t convert_hexstr_to_bin(const char *hex_str, unsigned char **bin)
7318 {
7319         unsigned char *bin_res = NULL;
7320         unsigned int i, j, hex;
7321         size_t hex_str_len;
7322
7323         if (!hex_str || strlen(hex_str) == 0)
7324                 return 0;
7325
7326         hex_str_len = strlen(hex_str);
7327         bin_res = g_try_malloc0(hex_str_len / 2);
7328         if (!bin_res)
7329                 return 0;
7330
7331         j = 0;
7332         for (i = 0; i < hex_str_len; i+=2) {
7333                 sscanf(hex_str + i, "%02x", &hex);
7334                 bin_res[j++] = hex;
7335         }
7336
7337         *bin = bin_res;
7338         return hex_str_len / 2;
7339 }
7340
7341 static void add_network_security_c_sign_key(DBusMessageIter *dict, GSupplicantSSID *ssid)
7342 {
7343         if (ssid->c_sign_key && strlen(ssid->c_sign_key) > 0) {
7344                 const char *key = "dpp_csign";
7345                 unsigned char *bin_csign = NULL;
7346                 size_t bin_csign_len = convert_hexstr_to_bin(ssid->c_sign_key, &bin_csign);
7347                 if  (bin_csign_len != 0)
7348                         supplicant_dbus_dict_append_fixed_array(dict,
7349                                         key, DBUS_TYPE_BYTE,
7350                                         &bin_csign, bin_csign_len);
7351                 g_free(bin_csign);
7352         }
7353 }
7354
7355 static void add_network_security_net_access_key(DBusMessageIter *dict, GSupplicantSSID *ssid)
7356 {
7357         if (ssid->net_access_key && strlen(ssid->net_access_key) > 0) {
7358                 const char *key = "dpp_netaccesskey";
7359                 unsigned char *bin_netaccesskey = NULL;
7360                 size_t bin_netaccesskey_len = convert_hexstr_to_bin(ssid->net_access_key, &bin_netaccesskey);
7361                 if  (bin_netaccesskey_len != 0)
7362                         supplicant_dbus_dict_append_fixed_array(dict,
7363                                         key, DBUS_TYPE_BYTE,
7364                                         &bin_netaccesskey, bin_netaccesskey_len);
7365                 g_free(bin_netaccesskey);
7366         }
7367 }
7368
7369 #endif
7370
7371 static void add_network_security(DBusMessageIter *dict, GSupplicantSSID *ssid)
7372 {
7373         char *key_mgmt;
7374
7375         switch (ssid->security) {
7376         case G_SUPPLICANT_SECURITY_NONE:
7377                 key_mgmt = "NONE";
7378                 add_network_security_none(dict);
7379                 add_network_security_ciphers(dict, ssid);
7380                 break;
7381         case G_SUPPLICANT_SECURITY_UNKNOWN:
7382         case G_SUPPLICANT_SECURITY_WEP:
7383                 key_mgmt = "NONE";
7384                 add_network_security_wep(dict, ssid);
7385                 add_network_security_ciphers(dict, ssid);
7386                 break;
7387         case G_SUPPLICANT_SECURITY_PSK:
7388 #if defined TIZEN_EXT
7389                 if (ssid->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_PSK)
7390                         key_mgmt = "FT-PSK WPA-PSK";
7391                 else
7392                         key_mgmt = "WPA-PSK";
7393 #else
7394                 key_mgmt = "WPA-PSK";
7395 #endif
7396                 add_network_security_psk(dict, ssid);
7397                 add_network_security_ciphers(dict, ssid);
7398                 add_network_security_proto(dict, ssid);
7399                 break;
7400         case G_SUPPLICANT_SECURITY_IEEE8021X:
7401                 key_mgmt = "WPA-EAP";
7402                 add_network_security_eap(dict, ssid);
7403                 add_network_security_ciphers(dict, ssid);
7404                 add_network_security_proto(dict, ssid);
7405                 break;
7406 #if defined TIZEN_EXT
7407         case G_SUPPLICANT_SECURITY_PSK_SHA256:
7408                 if (ssid->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_PSK)
7409                         key_mgmt = "WPA-PSK-SHA256 WPA-PSK";
7410                 else
7411                         key_mgmt = "WPA-PSK-SHA256";
7412                 add_network_security_psk(dict, ssid);
7413                 add_network_security_ciphers(dict, ssid);
7414                 add_network_security_proto(dict, ssid);
7415                 break;
7416         case G_SUPPLICANT_SECURITY_FT_PSK:
7417                 key_mgmt = "FT-PSK";
7418                 add_network_security_psk(dict, ssid);
7419                 add_network_security_ciphers(dict, ssid);
7420                 add_network_security_proto(dict, ssid);
7421                 break;
7422         case G_SUPPLICANT_SECURITY_FT_IEEE8021X:
7423                 key_mgmt = "FT-EAP";
7424                 add_network_security_eap(dict, ssid);
7425                 add_network_security_ciphers(dict, ssid);
7426                 add_network_security_proto(dict, ssid);
7427                 break;
7428         case G_SUPPLICANT_SECURITY_SAE:
7429                 if (ssid->keymgmt & G_SUPPLICANT_KEYMGMT_FT_SAE) {
7430                         if (ssid->keymgmt & G_SUPPLICANT_KEYMGMT_SAE)
7431                                 key_mgmt = "FT-SAE SAE";
7432                         else
7433                                 key_mgmt = "FT-SAE";
7434                 } else if (ssid->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_PSK)
7435                         key_mgmt = "SAE WPA-PSK";
7436                 else
7437                         key_mgmt = "SAE";
7438                 add_network_security_psk(dict, ssid);
7439                 break;
7440         case G_SUPPLICANT_SECURITY_OWE:
7441                 key_mgmt = "OWE";
7442                 add_network_security_ciphers(dict, ssid);
7443                 add_network_security_proto(dict, ssid);
7444                 break;
7445         case G_SUPPLICANT_SECURITY_DPP:
7446                 key_mgmt = "DPP";
7447                 add_network_security_connector(dict, ssid);
7448                 add_network_security_c_sign_key(dict, ssid);
7449                 add_network_security_net_access_key(dict, ssid);
7450                 break;
7451 #endif
7452         }
7453
7454         supplicant_dbus_dict_append_basic(dict, "key_mgmt",
7455                                 DBUS_TYPE_STRING, &key_mgmt);
7456 }
7457
7458 static void add_network_mode(DBusMessageIter *dict, GSupplicantSSID *ssid)
7459 {
7460         dbus_uint32_t mode;
7461
7462         switch (ssid->mode) {
7463         case G_SUPPLICANT_MODE_UNKNOWN:
7464         case G_SUPPLICANT_MODE_INFRA:
7465                 mode = 0;
7466                 break;
7467         case G_SUPPLICANT_MODE_IBSS:
7468                 mode = 1;
7469                 break;
7470         case G_SUPPLICANT_MODE_MASTER:
7471                 mode = 2;
7472                 break;
7473 #if defined TIZEN_EXT_WIFI_MESH
7474         case G_SUPPLICANT_MODE_MESH:
7475                 mode = 5;
7476                 break;
7477 #endif
7478         }
7479
7480         supplicant_dbus_dict_append_basic(dict, "mode",
7481                                 DBUS_TYPE_UINT32, &mode);
7482 }
7483
7484 static void interface_add_network_params(DBusMessageIter *iter, void *user_data)
7485 {
7486         DBusMessageIter dict;
7487         struct interface_connect_data *data = user_data;
7488         GSupplicantSSID *ssid = data->ssid;
7489 #if defined TIZEN_EXT
7490         GSupplicantInterface *interface = data->interface;
7491 #endif
7492
7493         supplicant_dbus_dict_open(iter, &dict);
7494
7495         if (ssid->scan_ssid)
7496                 supplicant_dbus_dict_append_basic(&dict, "scan_ssid",
7497                                          DBUS_TYPE_UINT32, &ssid->scan_ssid);
7498
7499         if (ssid->freq)
7500                 supplicant_dbus_dict_append_basic(&dict, "frequency",
7501                                          DBUS_TYPE_UINT32, &ssid->freq);
7502
7503         if (ssid->bgscan)
7504                 supplicant_dbus_dict_append_basic(&dict, "bgscan",
7505                                         DBUS_TYPE_STRING, &ssid->bgscan);
7506
7507         add_network_mode(&dict, ssid);
7508
7509         add_network_security(&dict, ssid);
7510
7511 #if defined TIZEN_EXT
7512         add_network_ieee80211w(&dict, ssid);
7513 #endif
7514
7515         supplicant_dbus_dict_append_fixed_array(&dict, "ssid",
7516                                         DBUS_TYPE_BYTE, &ssid->ssid,
7517                                                 ssid->ssid_len);
7518
7519 #if defined TIZEN_EXT
7520         bool owe_transition_mode = FALSE;
7521         if ((ssid->security == G_SUPPLICANT_SECURITY_OWE) && !(ssid->keymgmt & G_SUPPLICANT_KEYMGMT_OWE))
7522                 owe_transition_mode = TRUE;
7523
7524         if (ssid->bssid && !owe_transition_mode) {
7525                 char *bssid = NULL;
7526                 bssid = g_try_malloc0(18);
7527                 if (bssid == NULL) {
7528                         SUPPLICANT_DBG("memory allocation error");
7529                         supplicant_dbus_dict_close(iter, &dict);
7530                         return;
7531                 }
7532
7533                 if (ssid->bssid_for_connect_len) {
7534                         snprintf(bssid, 18, MACSTR, MAC2STR(ssid->bssid_for_connect));
7535                         memcpy(interface->add_network_bssid, ssid->bssid_for_connect, WIFI_BSSID_LEN_MAX);
7536                 } else {
7537                         snprintf(bssid, 18, MACSTR, MAC2STR(ssid->bssid));
7538                         memcpy(interface->add_network_bssid, ssid->bssid, WIFI_BSSID_LEN_MAX);
7539                 }
7540
7541                 SUPPLICANT_DBG("bssid [" MACSTR "]", MAC2STR(interface->add_network_bssid));
7542
7543                 supplicant_dbus_dict_append_basic(&dict, "bssid",
7544                                         DBUS_TYPE_STRING, &bssid);
7545                 g_free(bssid);
7546         }
7547 #endif
7548
7549         supplicant_dbus_dict_close(iter, &dict);
7550 }
7551
7552 static void interface_wps_start_result(const char *error,
7553                                 DBusMessageIter *iter, void *user_data)
7554 {
7555         struct interface_connect_data *data = user_data;
7556         int err;
7557
7558         SUPPLICANT_DBG("");
7559
7560         err = 0;
7561         if (error) {
7562                 SUPPLICANT_DBG("error: %s", error);
7563                 err = parse_supplicant_error(iter);
7564         }
7565
7566         if(data->callback)
7567                 data->callback(err, data->interface, data->user_data);
7568
7569         g_free(data->path);
7570         g_free(data->ssid);
7571         dbus_free(data);
7572 }
7573
7574 static void interface_add_wps_params(DBusMessageIter *iter, void *user_data)
7575 {
7576         struct interface_connect_data *data = user_data;
7577         GSupplicantSSID *ssid = data->ssid;
7578         const char *role = "enrollee", *type;
7579         DBusMessageIter dict;
7580
7581         SUPPLICANT_DBG("");
7582
7583         supplicant_dbus_dict_open(iter, &dict);
7584
7585         supplicant_dbus_dict_append_basic(&dict, "Role",
7586                                                 DBUS_TYPE_STRING, &role);
7587
7588         type = "pbc";
7589         if (ssid->pin_wps) {
7590                 type = "pin";
7591                 supplicant_dbus_dict_append_basic(&dict, "Pin",
7592                                         DBUS_TYPE_STRING, &ssid->pin_wps);
7593         }
7594
7595         supplicant_dbus_dict_append_basic(&dict, "Type",
7596                                         DBUS_TYPE_STRING, &type);
7597
7598 #if defined TIZEN_EXT
7599         if (ssid->bssid)
7600                 supplicant_dbus_dict_append_fixed_array(&dict, "Bssid",
7601                                                 DBUS_TYPE_BYTE, &ssid->bssid, 6);
7602 #endif
7603
7604         supplicant_dbus_dict_close(iter, &dict);
7605 }
7606
7607 static void wps_start(const char *error, DBusMessageIter *iter, void *user_data)
7608 {
7609         struct interface_connect_data *data = user_data;
7610
7611         SUPPLICANT_DBG("");
7612
7613         if (error) {
7614                 SUPPLICANT_DBG("error: %s", error);
7615                 g_free(data->path);
7616                 g_free(data->ssid);
7617                 dbus_free(data);
7618                 return;
7619         }
7620
7621 #if defined TIZEN_EXT
7622         GSupplicantSSID *ssid = data->ssid;
7623         if (ssid->pin_wps != NULL) {
7624                 if (!g_utf8_validate(ssid->pin_wps, 8, NULL)) {
7625                         SUPPLICANT_DBG("Invalid characters in WPS_PIN");
7626                         g_free(data->ssid);
7627                         dbus_free(data);
7628                         return;
7629                 }
7630         }
7631 #endif
7632         supplicant_dbus_method_call(data->interface->path,
7633                         SUPPLICANT_INTERFACE ".Interface.WPS", "Start",
7634                         interface_add_wps_params,
7635                         interface_wps_start_result, data, NULL);
7636 }
7637
7638 static void wps_process_credentials(DBusMessageIter *iter, void *user_data)
7639 {
7640         dbus_bool_t credentials = TRUE;
7641
7642         SUPPLICANT_DBG("");
7643
7644         dbus_message_iter_append_basic(iter, DBUS_TYPE_BOOLEAN, &credentials);
7645 }
7646
7647
7648 #if defined TIZEN_EXT
7649 #define NETCONFIG_SERVICE "net.netconfig"
7650 #define NETCONFIG_WIFI_PATH "/net/netconfig/wifi"
7651 #define NETCONFIG_WIFI_INTERFACE NETCONFIG_SERVICE ".wifi"
7652
7653 struct dec_method_call_data {
7654         struct interface_connect_data *data;
7655         DBusPendingCall *pending_call;
7656 };
7657
7658 static struct dec_method_call_data decrypt_request_data;
7659
7660 static void crypt_method_call_cancel(void)
7661 {
7662         if (decrypt_request_data.pending_call) {
7663                 dbus_pending_call_cancel(decrypt_request_data.pending_call);
7664                 dbus_pending_call_unref(decrypt_request_data.pending_call);
7665                 decrypt_request_data.pending_call = NULL;
7666         }
7667
7668         g_free(decrypt_request_data.data->path);
7669         g_free(decrypt_request_data.data->ssid);
7670         dbus_free(decrypt_request_data.data);
7671         decrypt_request_data.data = NULL;
7672 }
7673
7674 static void decryption_request_reply(DBusPendingCall *call,
7675                                                 void *user_data)
7676 {
7677         DBusMessage *reply;
7678         DBusError error;
7679         DBusMessageIter args;
7680         char *out_data;
7681         int ret;
7682         struct interface_connect_data *data = user_data;
7683
7684         SUPPLICANT_DBG("");
7685
7686         reply = dbus_pending_call_steal_reply(call);
7687
7688         dbus_error_init(&error);
7689         if (dbus_set_error_from_message(&error, reply)) {
7690                 SUPPLICANT_DBG("decryption_request_reply() %s %s", error.name, error.message);
7691                 dbus_error_free(&error);
7692                 ret = -EINVAL;
7693                 goto done;
7694         }
7695
7696         if (!g_str_has_prefix(data->interface->path, "/")) {
7697                 SUPPLICANT_DBG("Invalid path %s", data->interface->path);
7698                 ret = -EINVAL;
7699                 goto done;
7700         }
7701
7702         if (dbus_message_iter_init(reply, &args) == FALSE) {
7703                 SUPPLICANT_DBG("dbus_message_iter_init() failed");
7704                 ret = -EINVAL;
7705                 goto done;
7706         }
7707
7708         dbus_message_iter_get_basic(&args, &out_data);
7709         data->ssid->passphrase = g_strdup((const gchar *)out_data);
7710         data->ssid->is_passphrase_alloc = true;
7711
7712         ret = supplicant_dbus_method_call(data->interface->path,
7713                 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
7714                 interface_add_network_params,
7715                 interface_add_network_result, data,
7716                 data->interface);
7717
7718 done:
7719         if (ret < 0) {
7720                 SUPPLICANT_DBG("AddNetwork failed %d", ret);
7721                 callback_assoc_failed(decrypt_request_data.data->user_data);
7722                 g_free(data->path);
7723                 g_free(data->ssid->ssid);
7724                 if (data->ssid->is_passphrase_alloc)
7725                         g_free((char *)data->ssid->passphrase);
7726                 if (data->ssid->is_connector_alloc)
7727                         g_free((char *)data->ssid->connector);
7728                 if (data->ssid->is_c_sign_key_alloc)
7729                         g_free((char *)data->ssid->c_sign_key);
7730                 if (data->ssid->is_net_access_key_alloc)
7731                         g_free((char *)data->ssid->net_access_key);
7732                 g_free(data->ssid);
7733                 dbus_free(data);
7734         }
7735
7736         dbus_message_unref(reply);
7737         dbus_pending_call_unref(call);
7738
7739         decrypt_request_data.pending_call = NULL;
7740         decrypt_request_data.data = NULL;
7741 }
7742
7743 static int send_decryption_request(const char *passphrase,
7744                         struct interface_connect_data *data)
7745 {
7746         DBusMessage *msg = NULL;
7747         DBusPendingCall *call;
7748
7749         SUPPLICANT_DBG("Decryption request");
7750
7751         if (!passphrase) {
7752                 SUPPLICANT_DBG("Invalid parameter");
7753                 return -EINVAL;
7754         }
7755
7756         if (!connection)
7757                 return -EINVAL;
7758
7759         msg = dbus_message_new_method_call(NETCONFIG_SERVICE, NETCONFIG_WIFI_PATH,
7760                         NETCONFIG_WIFI_INTERFACE, "DecryptPassphrase");
7761         if (!msg)
7762                 return -EINVAL;
7763
7764 #if defined TIZEN_EXT
7765         if (!dbus_message_append_args(msg, DBUS_TYPE_STRING, &passphrase,
7766                                                         DBUS_TYPE_INVALID)) {
7767                 SUPPLICANT_DBG("Could not fulfill decryption request");
7768                 return -ENOMEM;
7769         }
7770 #else
7771         dbus_message_append_args(msg, DBUS_TYPE_STRING, &passphrase,
7772                                                         DBUS_TYPE_INVALID);
7773 #endif
7774
7775         if (!dbus_connection_send_with_reply(connection, msg,
7776                                 &call, DBUS_TIMEOUT_USE_DEFAULT)) {
7777                 dbus_message_unref(msg);
7778                 return -EIO;
7779         }
7780
7781         if (!call) {
7782                 dbus_message_unref(msg);
7783                 return -EIO;
7784         }
7785
7786         decrypt_request_data.pending_call = call;
7787         decrypt_request_data.data = data;
7788
7789         dbus_pending_call_set_notify(call, decryption_request_reply, data, NULL);
7790         dbus_message_unref(msg);
7791
7792         SUPPLICANT_DBG("Decryption request succeeded");
7793
7794         return 0;
7795 }
7796
7797 static void decrypt_conf_obj_reply(DBusPendingCall *call,
7798                                                 void *user_data)
7799 {
7800         DBusMessage *reply;
7801         DBusError error;
7802         DBusMessageIter iter, dict;
7803         char *out_data;
7804         int ret;
7805         struct interface_connect_data *data = user_data;
7806
7807         reply = dbus_pending_call_steal_reply(call);
7808
7809         dbus_error_init(&error);
7810         if (dbus_set_error_from_message(&error, reply)) {
7811                 SUPPLICANT_DBG("decryption_conf_obj_reply() %s %s", error.name, error.message);
7812                 dbus_error_free(&error);
7813                 ret = -EINVAL;
7814                 goto done;
7815         }
7816
7817         if (dbus_message_iter_init(reply, &iter) == FALSE) {
7818                 SUPPLICANT_DBG("dbus_message_iter_init() failed");
7819                 ret = -EINVAL;
7820                 goto done;
7821         }
7822
7823         dbus_message_iter_recurse(&iter, &dict);
7824
7825         while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_DICT_ENTRY) {
7826                 DBusMessageIter entry, value;
7827                 const char *key;
7828
7829                 dbus_message_iter_recurse(&dict, &entry);
7830                 dbus_message_iter_get_basic(&entry, &key);
7831                 dbus_message_iter_next(&entry);
7832                 dbus_message_iter_recurse(&entry, &value);
7833                 if (dbus_message_iter_get_arg_type(&value) == DBUS_TYPE_STRING) {
7834                         if (g_strcmp0(key, "connector") == 0) {
7835                                 dbus_message_iter_get_basic(&value, &out_data);
7836                                 data->ssid->connector = g_strdup((const gchar *)out_data);
7837                                 data->ssid->is_connector_alloc = true;
7838                                 SUPPLICANT_DBG("connector %s", data->ssid->connector);
7839                         } else if (g_strcmp0(key, "c_sign_key") == 0) {
7840                                 dbus_message_iter_get_basic(&value, &out_data);
7841                                 data->ssid->c_sign_key = g_strdup((const gchar *)out_data);
7842                                 data->ssid->is_c_sign_key_alloc = true;
7843                                 SUPPLICANT_DBG("c_sign_key %s", data->ssid->c_sign_key);
7844                         } else if (g_strcmp0(key, "net_access_key") == 0) {
7845                                 dbus_message_iter_get_basic(&value, &out_data);
7846                                 data->ssid->net_access_key = g_strdup((const gchar *)out_data);
7847                                 data->ssid->is_net_access_key_alloc = true;
7848                                 SUPPLICANT_DBG("net_access_key %s", data->ssid->net_access_key);
7849                         }
7850                 }
7851                 dbus_message_iter_next(&dict);
7852         }
7853
7854         ret = supplicant_dbus_method_call(data->interface->path,
7855                 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
7856                 interface_add_network_params,
7857                 interface_add_network_result, data,
7858                 data->interface);
7859
7860 done:
7861         if (ret < 0) {
7862                 SUPPLICANT_DBG("AddNetwork failed %d", ret);
7863                 callback_assoc_failed(decrypt_request_data.data->user_data);
7864                 g_free(data->path);
7865                 g_free(data->ssid->ssid);
7866                 if (data->ssid->is_connector_alloc)
7867                         g_free((char *)data->ssid->connector);
7868                 if (data->ssid->is_c_sign_key_alloc)
7869                         g_free((char *)data->ssid->c_sign_key);
7870                 if (data->ssid->is_net_access_key_alloc)
7871                         g_free((char *)data->ssid->net_access_key);
7872                 g_free(data->ssid);
7873                 dbus_free(data);
7874         }
7875
7876         dbus_message_unref(reply);
7877         dbus_pending_call_unref(call);
7878
7879         decrypt_request_data.pending_call = NULL;
7880         decrypt_request_data.data = NULL;
7881 }
7882
7883 static int send_decryption_conf_obj_request(GSupplicantSSID *ssid,
7884                         struct interface_connect_data *data)
7885 {
7886         DBusMessage *msg = NULL;
7887         DBusPendingCall *call;
7888
7889         SUPPLICANT_DBG("Decryption configuration object request");
7890
7891         if (!ssid) {
7892                 SUPPLICANT_DBG("Invalid parameter");
7893                 return -EINVAL;
7894         }
7895
7896         if (!connection)
7897                 return -EINVAL;
7898
7899         msg = dbus_message_new_method_call(NETCONFIG_SERVICE, NETCONFIG_WIFI_PATH,
7900                         NETCONFIG_WIFI_INTERFACE, "DecryptConfObj");
7901         if (!msg)
7902                 return -EINVAL;
7903
7904         dbus_message_append_args(msg, DBUS_TYPE_STRING, &ssid->connector,
7905                                                         DBUS_TYPE_INVALID);
7906         dbus_message_append_args(msg, DBUS_TYPE_STRING, &ssid->c_sign_key,
7907                                                         DBUS_TYPE_INVALID);
7908         dbus_message_append_args(msg, DBUS_TYPE_STRING, &ssid->net_access_key,
7909                                                         DBUS_TYPE_INVALID);
7910
7911         if (!dbus_connection_send_with_reply(connection, msg,
7912                                 &call, DBUS_TIMEOUT_USE_DEFAULT)) {
7913                 dbus_message_unref(msg);
7914                 return -EIO;
7915         }
7916
7917         if (!call) {
7918                 dbus_message_unref(msg);
7919                 return -EIO;
7920         }
7921
7922         decrypt_request_data.pending_call = call;
7923         decrypt_request_data.data = data;
7924
7925         dbus_pending_call_set_notify(call, decrypt_conf_obj_reply, data, NULL);
7926         dbus_message_unref(msg);
7927
7928         SUPPLICANT_DBG("Decrypt Conf Obj request succeeded");
7929
7930         return 0;
7931 }
7932
7933 static bool is_valid_config_object(GSupplicantSSID *ssid)
7934 {
7935         return ((ssid->connector &&
7936                         g_strcmp0(ssid->connector, "") != 0) &&
7937                         (ssid->c_sign_key &&
7938                         g_strcmp0(ssid->c_sign_key, "") != 0) &&
7939                         (ssid->net_access_key &&
7940                         g_strcmp0(ssid->net_access_key, "") != 0));
7941 }
7942 #endif
7943
7944 int g_supplicant_interface_connect(GSupplicantInterface *interface,
7945                                 GSupplicantSSID *ssid,
7946                                 GSupplicantInterfaceCallback callback,
7947                                                         void *user_data)
7948 {
7949         struct interface_connect_data *data;
7950         struct interface_data *intf_data;
7951         int ret = 0;
7952
7953         SUPPLICANT_DBG("");
7954
7955         if (!interface)
7956                 return -EINVAL;
7957
7958         if (!system_available)
7959                 return -EFAULT;
7960
7961         /* TODO: Check if we're already connected and switch */
7962
7963         data = dbus_malloc0(sizeof(*data));
7964         if (!data)
7965                 return -ENOMEM;
7966
7967         data->interface = interface;
7968         data->path = g_strdup(interface->path);
7969         data->callback = callback;
7970         data->ssid = ssid;
7971         data->user_data = user_data;
7972
7973         if (ssid->use_wps) {
7974                 g_free(interface->wps_cred.key);
7975                 memset(&interface->wps_cred, 0,
7976                                 sizeof(struct _GSupplicantWpsCredentials));
7977
7978                 ret = supplicant_dbus_property_set(interface->path,
7979                         SUPPLICANT_INTERFACE ".Interface.WPS",
7980                         "ProcessCredentials", DBUS_TYPE_BOOLEAN_AS_STRING,
7981                         wps_process_credentials, wps_start, data, interface);
7982         } else {
7983                 /* By the time there is a request for connect and the network
7984                  * path is not NULL it means that connman has not removed the
7985                  * previous network pointer. This can happen in the case AP
7986                  * deauthenticated client and connman does not remove the
7987                  * previously connected network pointer. This causes supplicant
7988                  * to reallocate the memory for struct wpa_ssid again even if it
7989                  * is the same SSID. This causes memory usage of wpa_supplicnat
7990                  * to go high. The idea here is that if the previously connected
7991                  * network is not removed at the time of next connection attempt
7992                  * check if the network path is not NULL. In case it is non-NULL
7993                  * first remove the network and then once removal is successful, add
7994                  * the network.
7995                  */
7996
7997                 if (interface->network_path != NULL) {
7998                         g_free(data->path);
7999                         dbus_free(data);
8000
8001                         /*
8002                          * If this add network is for the same network for
8003                          * which wpa_supplicant already has a profile then do
8004                          * not need to add another profile. Only if the
8005                          * profile that needs to get added is different from
8006                          * what is there in wpa_s delete the current one. A
8007                          * network is identified by its SSID, security_type
8008                          * and passphrase (private passphrase in case security
8009                          * type is 802.11x).
8010                          */
8011                         if (compare_network_parameters(interface, ssid)) {
8012                                 return -EALREADY;
8013                         }
8014
8015                         intf_data = dbus_malloc0(sizeof(*intf_data));
8016                         if (!intf_data)
8017                                 return -ENOMEM;
8018
8019                         intf_data->interface = interface;
8020                         intf_data->path = g_strdup(interface->path);
8021                         intf_data->callback = callback;
8022                         intf_data->ssid = ssid;
8023                         intf_data->user_data = user_data;
8024                         intf_data->network_remove_in_progress = TRUE;
8025                         network_remove(intf_data);
8026                 } else {
8027 #if defined TIZEN_EXT
8028                         if (ssid->passphrase &&
8029                             g_strcmp0(ssid->passphrase, "") != 0 &&
8030 #if defined TIZEN_EXT_WIFI_MESH
8031                             ssid->mode != G_SUPPLICANT_MODE_MESH &&
8032 #endif
8033                             !ssid->eap) {
8034                                 ret = send_decryption_request(ssid->passphrase, data);
8035                                 if (ret < 0)
8036                                         SUPPLICANT_DBG("Decryption request failed %d", ret);
8037                         } else if (is_valid_config_object(ssid)) {
8038                                 ret = send_decryption_conf_obj_request(ssid, data);
8039                                 if (ret < 0)
8040                                         SUPPLICANT_DBG("Decryption Conf Obj request failed %d", ret);
8041
8042                         } else
8043 #endif
8044                         ret = supplicant_dbus_method_call(interface->path,
8045                                         SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
8046                                         interface_add_network_params,
8047                                         interface_add_network_result, data,
8048                                         interface);
8049                 }
8050         }
8051
8052         if (ret < 0) {
8053                 g_free(data->path);
8054                 dbus_free(data);
8055                 return ret;
8056         }
8057
8058         return -EINPROGRESS;
8059 }
8060
8061 static void network_remove_result(const char *error,
8062                                 DBusMessageIter *iter, void *user_data)
8063 {
8064         struct interface_data *data = user_data;
8065         struct interface_connect_data *connect_data;
8066         int result = 0;
8067
8068         SUPPLICANT_DBG("");
8069
8070         if (error) {
8071                 result = -EIO;
8072                 SUPPLICANT_DBG("error: %s", error);
8073
8074                 if (g_strcmp0("org.freedesktop.DBus.Error.UnknownMethod",
8075                                                 error) == 0)
8076                         result = -ECONNABORTED;
8077         }
8078
8079         g_free(data->interface->network_path);
8080         data->interface->network_path = NULL;
8081
8082         remove_network_information(data->interface);
8083
8084         if (data->network_remove_in_progress == TRUE) {
8085                 data->network_remove_in_progress = FALSE;
8086                 connect_data = dbus_malloc0(sizeof(*connect_data));
8087                 if (!connect_data)
8088                         return;
8089
8090                 connect_data->interface = data->interface;
8091                 connect_data->path = g_strdup(data->path);
8092                 connect_data->callback = data->callback;
8093                 connect_data->ssid = data->ssid;
8094                 connect_data->user_data = data->user_data;
8095
8096 #if defined TIZEN_EXT
8097                 int ret;
8098                 if (data->ssid->passphrase && g_strcmp0(data->ssid->passphrase, "") != 0
8099                         && !data->ssid->eap) {
8100                         ret = send_decryption_request(data->ssid->passphrase, connect_data);
8101                         if (ret < 0) {
8102                                 SUPPLICANT_DBG("Decryption request failed %d", ret);
8103                                 g_free(connect_data->ssid);
8104                                 g_free(connect_data->path);
8105                                 dbus_free(connect_data);
8106                         }
8107                 } else if (is_valid_config_object(data->ssid)) {
8108                         ret = send_decryption_conf_obj_request(data->ssid, connect_data);
8109                         if (ret < 0) {
8110                                 SUPPLICANT_DBG("Decryption Conf Obj request failed %d", ret);
8111                                 g_free(connect_data->ssid);
8112                                 g_free(connect_data->path);
8113                                 dbus_free(connect_data);
8114                         }
8115                 } else
8116 #endif
8117                 supplicant_dbus_method_call(data->interface->path,
8118                         SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
8119                         interface_add_network_params,
8120                         interface_add_network_result, connect_data,
8121                         connect_data->interface);
8122         } else {
8123                 if (data->callback)
8124                         data->callback(result, data->interface, data->user_data);
8125         }
8126         g_free(data->path);
8127         dbus_free(data);
8128 }
8129
8130 static void network_remove_params(DBusMessageIter *iter, void *user_data)
8131 {
8132         struct interface_data *data = user_data;
8133         const char *path = data->interface->network_path;
8134
8135         SUPPLICANT_DBG("path %s", path);
8136
8137         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH, &path);
8138 }
8139
8140 static int network_remove(struct interface_data *data)
8141 {
8142         GSupplicantInterface *interface = data->interface;
8143
8144         SUPPLICANT_DBG("");
8145
8146 #if defined TIZEN_EXT
8147         GSupplicantInterface *intf = NULL;
8148         /*
8149          * Check if 'interface' is valid
8150          */
8151         intf = g_hash_table_lookup(interface_table, interface->path);
8152         if (intf == NULL)
8153                 return -EINVAL;
8154 #endif
8155
8156         return supplicant_dbus_method_call(interface->path,
8157                         SUPPLICANT_INTERFACE ".Interface", "RemoveNetwork",
8158                         network_remove_params, network_remove_result, data,
8159                         interface);
8160 }
8161
8162 static void interface_disconnect_result(const char *error,
8163                                 DBusMessageIter *iter, void *user_data)
8164 {
8165         struct interface_data *data = user_data;
8166         int result = 0;
8167
8168         SUPPLICANT_DBG("");
8169
8170         if (error) {
8171                 result = -EIO;
8172                 SUPPLICANT_DBG("error: %s", error);
8173
8174                 if (g_strcmp0("org.freedesktop.DBus.Error.UnknownMethod",
8175                                                 error) == 0)
8176                         result = -ECONNABORTED;
8177         }
8178
8179         /* If we are disconnecting from previous WPS successful
8180          * association. i.e.: it did not went through AddNetwork,
8181          * and interface->network_path was never set. */
8182         if (!data->interface->network_path) {
8183                 if (data->callback)
8184                         data->callback(result, data->interface,
8185                                                         data->user_data);
8186
8187                 g_free(data->path);
8188                 dbus_free(data);
8189                 return;
8190         }
8191
8192         if (result < 0 && data->callback) {
8193                 data->callback(result, data->interface, data->user_data);
8194                 data->callback = NULL;
8195         }
8196
8197         if (result != -ECONNABORTED) {
8198                 if (network_remove(data) < 0) {
8199                         g_free(data->path);
8200                         dbus_free(data);
8201                 }
8202         } else {
8203                 g_free(data->path);
8204                 dbus_free(data);
8205         }
8206 }
8207
8208 int g_supplicant_interface_disconnect(GSupplicantInterface *interface,
8209                                         GSupplicantInterfaceCallback callback,
8210                                                         void *user_data)
8211 {
8212         struct interface_data *data;
8213         int ret;
8214
8215         SUPPLICANT_DBG("");
8216
8217         if (!interface)
8218                 return -EINVAL;
8219
8220         if (!system_available)
8221                 return -EFAULT;
8222 #if defined TIZEN_EXT
8223         if (decrypt_request_data.pending_call &&
8224                         decrypt_request_data.data &&
8225                         decrypt_request_data.data->user_data == user_data) {
8226
8227                 callback_assoc_failed(decrypt_request_data.data->user_data);
8228                 crypt_method_call_cancel();
8229
8230                 return 0;
8231         }
8232 #endif
8233         data = dbus_malloc0(sizeof(*data));
8234         if (!data)
8235                 return -ENOMEM;
8236
8237         data->interface = interface;
8238         data->path = g_strdup(interface->path);
8239         data->callback = callback;
8240         data->user_data = user_data;
8241
8242         ret = supplicant_dbus_method_call(interface->path,
8243                         SUPPLICANT_INTERFACE ".Interface", "Disconnect",
8244                         NULL, interface_disconnect_result, data,
8245                         interface);
8246
8247         if (ret < 0) {
8248                 g_free(data->path);
8249                 dbus_free(data);
8250         }
8251
8252         return ret;
8253 }
8254
8255 #if defined TIZEN_EXT
8256 void g_supplicant_interface_remove_network(GSupplicantInterface *interface,
8257                                 GSupplicantSSID *ssid)
8258 {
8259         struct interface_data *data;
8260         int ret;
8261
8262         SUPPLICANT_DBG("");
8263
8264         if (!interface)
8265                 return;
8266
8267         if (interface->network_path == NULL)
8268                 return;
8269
8270         if (!interface->network_info.ssid)
8271                 return;
8272
8273         if (memcmp(interface->network_info.ssid, ssid->ssid, ssid->ssid_len))
8274                 return;
8275
8276         if (interface->network_info.security != ssid->security)
8277                 return;
8278
8279         data = dbus_malloc0(sizeof(*data));
8280         if (!data)
8281                 return;
8282
8283         data->interface = interface;
8284         data->path = g_strdup(interface->path);
8285
8286         ret = supplicant_dbus_method_call(interface->path,
8287                         SUPPLICANT_INTERFACE ".Interface", "RemoveNetwork",
8288                         network_remove_params, network_remove_result, data,
8289                         interface);
8290
8291         if (ret < 0) {
8292                 g_free(data->path);
8293                 dbus_free(data);
8294         }
8295 }
8296 #endif
8297
8298 static void interface_p2p_find_result(const char *error,
8299                                         DBusMessageIter *iter, void *user_data)
8300 {
8301         struct interface_scan_data *data = user_data;
8302         int err = 0;
8303
8304         SUPPLICANT_DBG("error %s", error);
8305
8306         if (error)
8307                 err = -EIO;
8308
8309         if (interface_exists(data->interface, data->path)) {
8310                 if (!data->interface->ready)
8311                         err = -ENOLINK;
8312                 if (!err)
8313                         data->interface->p2p_finding = true;
8314         }
8315
8316         if (data->callback)
8317                 data->callback(err, data->interface, data->user_data);
8318
8319         g_free(data->path);
8320         dbus_free(data);
8321 }
8322
8323 static void interface_p2p_find_params(DBusMessageIter *iter, void *user_data)
8324 {
8325         DBusMessageIter dict;
8326
8327         supplicant_dbus_dict_open(iter, &dict);
8328         supplicant_dbus_dict_close(iter, &dict);
8329 }
8330
8331 int g_supplicant_interface_p2p_find(GSupplicantInterface *interface,
8332                                         GSupplicantInterfaceCallback callback,
8333                                                         void *user_data)
8334 {
8335         struct interface_scan_data *data;
8336         int ret;
8337
8338         if (!interface->p2p_support)
8339                 return -ENOTSUP;
8340
8341         ret = interface_ready_to_scan(interface);
8342         if (ret && ret != -EALREADY)
8343                 return ret;
8344
8345         data = dbus_malloc0(sizeof(*data));
8346         if (!data)
8347                 return -ENOMEM;
8348
8349         data->interface = interface;
8350         data->path = g_strdup(interface->path);
8351         data->callback = callback;
8352         data->user_data = user_data;
8353
8354         ret = supplicant_dbus_method_call(interface->path,
8355                         SUPPLICANT_INTERFACE ".Interface.P2PDevice", "Find",
8356                         interface_p2p_find_params, interface_p2p_find_result,
8357                         data, interface);
8358         if (ret < 0) {
8359                 g_free(data->path);
8360                 dbus_free(data);
8361         }
8362
8363         return ret;
8364 }
8365
8366 bool g_supplicant_interface_is_p2p_finding(GSupplicantInterface *interface)
8367 {
8368         if (!interface)
8369                 return false;
8370
8371         return interface->p2p_finding;
8372 }
8373
8374 int g_supplicant_interface_p2p_stop_find(GSupplicantInterface *interface)
8375 {
8376         if (!interface->p2p_finding)
8377                 return 0;
8378
8379         SUPPLICANT_DBG("");
8380
8381         interface->p2p_finding = false;
8382
8383         return supplicant_dbus_method_call(interface->path,
8384                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "StopFind",
8385                 NULL, NULL, NULL, NULL);
8386 }
8387
8388 static void interface_p2p_connect_result(const char *error,
8389                                         DBusMessageIter *iter, void *user_data)
8390 {
8391         struct interface_connect_data *data = user_data;
8392         int err = 0;
8393
8394         SUPPLICANT_DBG("");
8395
8396         if (error) {
8397                 SUPPLICANT_DBG("error: %s", error);
8398                 err = parse_supplicant_error(iter);
8399         }
8400
8401         if (data->callback)
8402                 data->callback(err, data->interface, data->user_data);
8403
8404         g_free(data->path);
8405         g_free(data->peer->wps_pin);
8406         g_free(data->peer->path);
8407         g_free(data->peer);
8408         g_free(data);
8409 }
8410
8411 static void interface_p2p_connect_params(DBusMessageIter *iter, void *user_data)
8412 {
8413         struct interface_connect_data *data = user_data;
8414         const char *wps = "pbc";
8415         DBusMessageIter dict;
8416         int go_intent = 7;
8417
8418         SUPPLICANT_DBG("");
8419
8420         supplicant_dbus_dict_open(iter, &dict);
8421
8422         if (data->peer->master)
8423                 go_intent = 15;
8424
8425         if (data->peer->wps_pin)
8426                 wps = "pin";
8427
8428         supplicant_dbus_dict_append_basic(&dict, "peer",
8429                                 DBUS_TYPE_OBJECT_PATH, &data->peer->path);
8430         supplicant_dbus_dict_append_basic(&dict, "wps_method",
8431                                 DBUS_TYPE_STRING, &wps);
8432         if (data->peer->wps_pin) {
8433                 supplicant_dbus_dict_append_basic(&dict, "pin",
8434                                 DBUS_TYPE_STRING, &data->peer->wps_pin);
8435         }
8436
8437         supplicant_dbus_dict_append_basic(&dict, "go_intent",
8438                                         DBUS_TYPE_INT32, &go_intent);
8439
8440         supplicant_dbus_dict_close(iter, &dict);
8441 }
8442
8443 int g_supplicant_interface_p2p_connect(GSupplicantInterface *interface,
8444                                         GSupplicantPeerParams *peer_params,
8445                                         GSupplicantInterfaceCallback callback,
8446                                         void *user_data)
8447 {
8448         struct interface_connect_data *data;
8449         int ret;
8450
8451         SUPPLICANT_DBG("");
8452
8453         if (!interface->p2p_support)
8454                 return -ENOTSUP;
8455
8456         data = dbus_malloc0(sizeof(*data));
8457         if (!data)
8458                 return -ENOMEM;
8459
8460         data->interface = interface;
8461         data->path = g_strdup(interface->path);
8462         data->peer = peer_params;
8463         data->callback = callback;
8464         data->user_data = user_data;
8465
8466         ret = supplicant_dbus_method_call(interface->path,
8467                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "Connect",
8468                 interface_p2p_connect_params, interface_p2p_connect_result,
8469                 data, interface);
8470         if (ret < 0) {
8471                 g_free(data->path);
8472                 dbus_free(data);
8473                 return ret;
8474         }
8475
8476         return -EINPROGRESS;
8477 }
8478
8479 int g_supplicant_interface_p2p_disconnect(GSupplicantInterface *interface,
8480                                         GSupplicantPeerParams *peer_params)
8481 {
8482         GSupplicantPeer *peer;
8483         int count = 0;
8484         GSList *list;
8485
8486         SUPPLICANT_DBG("");
8487
8488         if (!interface->p2p_support)
8489                 return -ENOTSUP;
8490
8491         peer = g_hash_table_lookup(interface->peer_table, peer_params->path);
8492         if (!peer)
8493                 return -ENODEV;
8494
8495         for (list = peer->groups; list; list = list->next, count++) {
8496                 const char *group_obj_path = list->data;
8497                 GSupplicantInterface *g_interface;
8498                 GSupplicantGroup *group;
8499
8500                 group = g_hash_table_lookup(group_mapping, group_obj_path);
8501                 if (!group || !group->interface)
8502                         continue;
8503
8504                 g_interface = group->interface;
8505                 supplicant_dbus_method_call(g_interface->path,
8506                                 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
8507                                 "Disconnect", NULL, NULL, NULL, g_interface);
8508         }
8509
8510         if (count == 0 && peer->current_group_iface) {
8511                 supplicant_dbus_method_call(peer->current_group_iface->path,
8512                                 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
8513                                 "Disconnect", NULL, NULL, NULL,
8514                                 peer->current_group_iface->path);
8515         }
8516
8517         peer->current_group_iface = NULL;
8518
8519         return -EINPROGRESS;
8520 }
8521
8522 struct p2p_service_data {
8523         bool registration;
8524         GSupplicantInterface *interface;
8525         GSupplicantP2PServiceParams *service;
8526         GSupplicantInterfaceCallback callback;
8527         void *user_data;
8528 };
8529
8530 static void interface_p2p_service_result(const char *error,
8531                                         DBusMessageIter *iter, void *user_data)
8532 {
8533         struct p2p_service_data *data = user_data;
8534         int result = 0;
8535
8536         SUPPLICANT_DBG("%s result - %s", data->registration ?
8537                                 "Registration" : "Deletion",
8538                                 error ? error : "Success");
8539         if (error)
8540                 result = -EINVAL;
8541
8542         if (data->callback)
8543                 data->callback(result, data->interface, data->user_data);
8544
8545         g_free(data->service->query);
8546         g_free(data->service->response);
8547         g_free(data->service->service);
8548         g_free(data->service->wfd_ies);
8549         g_free(data->service);
8550         dbus_free(data);
8551 }
8552
8553 static void interface_p2p_service_params(DBusMessageIter *iter,
8554                                                         void *user_data)
8555 {
8556         struct p2p_service_data *data = user_data;
8557         GSupplicantP2PServiceParams *service;
8558         DBusMessageIter dict;
8559         const char *type;
8560
8561         SUPPLICANT_DBG("");
8562
8563         service = data->service;
8564
8565         supplicant_dbus_dict_open(iter, &dict);
8566
8567         if (service->query && service->response) {
8568                 type = "bonjour";
8569                 supplicant_dbus_dict_append_basic(&dict, "service_type",
8570                                                 DBUS_TYPE_STRING, &type);
8571                 supplicant_dbus_dict_append_fixed_array(&dict, "query",
8572                                         DBUS_TYPE_BYTE, &service->query,
8573                                         service->query_length);
8574                 supplicant_dbus_dict_append_fixed_array(&dict, "response",
8575                                         DBUS_TYPE_BYTE, &service->response,
8576                                         service->response_length);
8577         } else if (service->version && service->service) {
8578                 type = "upnp";
8579                 supplicant_dbus_dict_append_basic(&dict, "service_type",
8580                                                 DBUS_TYPE_STRING, &type);
8581                 supplicant_dbus_dict_append_basic(&dict, "version",
8582                                         DBUS_TYPE_INT32, &service->version);
8583                 supplicant_dbus_dict_append_basic(&dict, "service",
8584                                         DBUS_TYPE_STRING, &service->service);
8585         }
8586
8587         supplicant_dbus_dict_close(iter, &dict);
8588 }
8589
8590 int g_supplicant_interface_p2p_add_service(GSupplicantInterface *interface,
8591                                 GSupplicantInterfaceCallback callback,
8592                                 GSupplicantP2PServiceParams *p2p_service_params,
8593                                 void *user_data)
8594 {
8595         struct p2p_service_data *data;
8596         int ret;
8597
8598         SUPPLICANT_DBG("");
8599
8600         if (!interface->p2p_support)
8601                 return -ENOTSUP;
8602
8603         data = dbus_malloc0(sizeof(*data));
8604         if (!data)
8605                 return -ENOMEM;
8606
8607         data->registration = true;
8608         data->interface = interface;
8609         data->service = p2p_service_params;
8610         data->callback = callback;
8611         data->user_data = user_data;
8612
8613         ret = supplicant_dbus_method_call(interface->path,
8614                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "AddService",
8615                 interface_p2p_service_params, interface_p2p_service_result,
8616                 data, interface);
8617         if (ret < 0) {
8618                 dbus_free(data);
8619                 return ret;
8620         }
8621
8622         return -EINPROGRESS;
8623 }
8624
8625 int g_supplicant_interface_p2p_del_service(GSupplicantInterface *interface,
8626                                 GSupplicantP2PServiceParams *p2p_service_params)
8627 {
8628         struct p2p_service_data *data;
8629         int ret;
8630
8631         SUPPLICANT_DBG("");
8632
8633         if (!interface->p2p_support)
8634                 return -ENOTSUP;
8635
8636         data = dbus_malloc0(sizeof(*data));
8637         if (!data)
8638                 return -ENOMEM;
8639
8640         data->interface = interface;
8641         data->service = p2p_service_params;
8642
8643         ret = supplicant_dbus_method_call(interface->path,
8644                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeleteService",
8645                 interface_p2p_service_params, interface_p2p_service_result,
8646                 data, interface);
8647         if (ret < 0) {
8648                 dbus_free(data);
8649                 return ret;
8650         }
8651
8652         return -EINPROGRESS;
8653 }
8654
8655 struct p2p_listen_data {
8656         int period;
8657         int interval;
8658 };
8659
8660 static void interface_p2p_listen_params(DBusMessageIter *iter, void *user_data)
8661 {
8662         struct p2p_listen_data *params = user_data;
8663         DBusMessageIter dict;
8664
8665         supplicant_dbus_dict_open(iter, &dict);
8666
8667         supplicant_dbus_dict_append_basic(&dict, "period",
8668                                         DBUS_TYPE_INT32, &params->period);
8669         supplicant_dbus_dict_append_basic(&dict, "interval",
8670                                         DBUS_TYPE_INT32, &params->interval);
8671         supplicant_dbus_dict_close(iter, &dict);
8672 }
8673
8674 int g_supplicant_interface_p2p_listen(GSupplicantInterface *interface,
8675                                                 int period, int interval)
8676 {
8677         struct p2p_listen_data params;
8678
8679         SUPPLICANT_DBG("");
8680
8681         if (!interface->p2p_support)
8682                 return -ENOTSUP;
8683
8684         params.period = period;
8685         params.interval = interval;
8686
8687         return supplicant_dbus_method_call(interface->path,
8688                         SUPPLICANT_INTERFACE ".Interface.P2PDevice",
8689                         "ExtendedListen", interface_p2p_listen_params,
8690                         NULL, &params, NULL);
8691 }
8692
8693 static void widi_ies_params(DBusMessageIter *iter, void *user_data)
8694 {
8695         struct p2p_service_data *data = user_data;
8696         GSupplicantP2PServiceParams *service = data->service;
8697         DBusMessageIter array;
8698
8699         SUPPLICANT_DBG("%p - %d", service->wfd_ies, service->wfd_ies_length);
8700
8701         dbus_message_iter_open_container(iter, DBUS_TYPE_ARRAY,
8702                                         DBUS_TYPE_BYTE_AS_STRING, &array);
8703
8704         if (service->wfd_ies && service->wfd_ies_length > 0) {
8705                 dbus_message_iter_append_fixed_array(&array, DBUS_TYPE_BYTE,
8706                                 &service->wfd_ies, service->wfd_ies_length);
8707         }
8708
8709         dbus_message_iter_close_container(iter, &array);
8710 }
8711
8712 int g_supplicant_set_widi_ies(GSupplicantP2PServiceParams *p2p_service_params,
8713                                         GSupplicantInterfaceCallback callback,
8714                                         void *user_data)
8715 {
8716         struct p2p_service_data *data;
8717         int ret;
8718
8719         SUPPLICANT_DBG("");
8720
8721         if (!system_available)
8722                 return -EFAULT;
8723
8724         data = dbus_malloc0(sizeof(*data));
8725         if (!data)
8726                 return -ENOMEM;
8727
8728         data->service = p2p_service_params;
8729         data->callback = callback;
8730         data->user_data = user_data;
8731
8732         if (p2p_service_params->wfd_ies)
8733                 data->registration = true;
8734
8735         ret = supplicant_dbus_property_set(SUPPLICANT_PATH,
8736                                         SUPPLICANT_INTERFACE, "WFDIEs",
8737                                         DBUS_TYPE_ARRAY_AS_STRING
8738                                         DBUS_TYPE_BYTE_AS_STRING,
8739                                         widi_ies_params,
8740                                         interface_p2p_service_result,
8741                                         data, NULL);
8742         if (ret < 0 && ret != -EINPROGRESS) {
8743                 dbus_free(data);
8744                 return ret;
8745         }
8746
8747         return -EINPROGRESS;
8748 }
8749
8750
8751 static const char *g_supplicant_rule0 = "type=signal,"
8752                                         "path=" DBUS_PATH_DBUS ","
8753                                         "sender=" DBUS_SERVICE_DBUS ","
8754                                         "interface=" DBUS_INTERFACE_DBUS ","
8755                                         "member=NameOwnerChanged,"
8756                                         "arg0=" SUPPLICANT_SERVICE;
8757 static const char *g_supplicant_rule1 = "type=signal,"
8758                         "interface=" SUPPLICANT_INTERFACE;
8759 static const char *g_supplicant_rule2 = "type=signal,"
8760                         "interface=" SUPPLICANT_INTERFACE ".Interface";
8761 static const char *g_supplicant_rule3 = "type=signal,"
8762                         "interface=" SUPPLICANT_INTERFACE ".Interface.WPS";
8763 static const char *g_supplicant_rule4 = "type=signal,"
8764                         "interface=" SUPPLICANT_INTERFACE ".BSS";
8765 static const char *g_supplicant_rule5 = "type=signal,"
8766                         "interface=" SUPPLICANT_INTERFACE ".Network";
8767 #if !defined TIZEN_EXT
8768 static const char *g_supplicant_rule6 = "type=signal,"
8769                 "interface=" SUPPLICANT_INTERFACE ".Interface.P2PDevice";
8770 static const char *g_supplicant_rule7 = "type=signal,"
8771                 "interface=" SUPPLICANT_INTERFACE ".Peer";
8772 static const char *g_supplicant_rule8 = "type=signal,"
8773                 "interface=" SUPPLICANT_INTERFACE ".Group";
8774 #endif
8775 #if defined TIZEN_EXT_WIFI_MESH
8776 static const char *g_supplicant_rule9 = "type=signal,"
8777                 "interface=" SUPPLICANT_INTERFACE ".Interface.Mesh";
8778 #endif
8779
8780 static void invoke_introspect_method(void)
8781 {
8782         DBusMessage *message;
8783
8784         message = dbus_message_new_method_call(SUPPLICANT_SERVICE,
8785                                         SUPPLICANT_PATH,
8786                                         DBUS_INTERFACE_INTROSPECTABLE,
8787                                         "Introspect");
8788
8789         if (!message)
8790                 return;
8791
8792         dbus_message_set_no_reply(message, TRUE);
8793         dbus_connection_send(connection, message, NULL);
8794         dbus_message_unref(message);
8795 }
8796
8797 #if defined TIZEN_EXT && defined TIZEN_EXT_INS
8798 void g_supplicant_set_ins_settings(GSupplicantINSPreferredFreq preferred_freq_bssid,
8799                 bool last_connected_bssid, bool assoc_reject, bool signal_bssid,
8800                 unsigned int preferred_freq_bssid_score, unsigned int last_connected_bssid_score,
8801                 unsigned int assoc_reject_score, int signal_level3_5ghz, int signal_level3_24ghz)
8802 {
8803         ins_settings.preferred_freq_bssid = preferred_freq_bssid;
8804         ins_settings.last_connected_bssid = last_connected_bssid;
8805         ins_settings.assoc_reject = assoc_reject;
8806         ins_settings.signal_bssid = signal_bssid;
8807         ins_settings.preferred_freq_bssid_score = preferred_freq_bssid_score;
8808         ins_settings.last_connected_bssid_score = last_connected_bssid_score;
8809         ins_settings.assoc_reject_score = assoc_reject_score;
8810         ins_settings.signal_level3_5ghz = signal_level3_5ghz;
8811         ins_settings.signal_level3_24ghz = signal_level3_24ghz;
8812
8813         SUPPLICANT_DBG("preferred_freq_bssid [%s]", preferred_freq_bssid ? "true" : "false");
8814         SUPPLICANT_DBG("preferred_freq_bssid_score [%d]", preferred_freq_bssid_score);
8815         SUPPLICANT_DBG("last_connected_bssid [%s]", last_connected_bssid ? "true" : "false");
8816         SUPPLICANT_DBG("last_connected_bssid_score [%d]", last_connected_bssid_score);
8817         SUPPLICANT_DBG("assoc_reject [%s]", assoc_reject ? "true" : "false");
8818         SUPPLICANT_DBG("assoc_reject_score [%d]", assoc_reject_score);
8819         SUPPLICANT_DBG("signal_bssid [%s]", signal_bssid ? "true" : "false");
8820         SUPPLICANT_DBG("signal_level3_5ghz [%d]", signal_level3_5ghz);
8821         SUPPLICANT_DBG("signal_level3_24ghz [%d]", signal_level3_24ghz);
8822 }
8823 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_INS */
8824
8825 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
8826 void g_supplicant_register_eap_callback(g_supplicant_eap_callback cb)
8827 {
8828         SUPPLICANT_DBG("g_supplicant_register_eap_callback %p", cb);
8829
8830         if (!callbacks_pointer) {
8831                 SUPPLICANT_DBG("callbacks_pointer is NULL");
8832                 return;
8833         }
8834
8835         callbacks_pointer->eap = cb;
8836 }
8837
8838 void g_supplicant_unregister_eap_callback(void)
8839 {
8840         SUPPLICANT_DBG("g_supplicant_unregister_eap_callback");
8841
8842         if (!callbacks_pointer) {
8843                 SUPPLICANT_DBG("callbacks_pointer is NULL");
8844                 return;
8845         }
8846
8847         callbacks_pointer->eap = NULL;
8848 }
8849 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
8850
8851 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
8852 int g_supplicant_register(GSupplicantCallbacks *callbacks)
8853 #else /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
8854 int g_supplicant_register(const GSupplicantCallbacks *callbacks)
8855 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
8856 {
8857         connection = dbus_bus_get(DBUS_BUS_SYSTEM, NULL);
8858         if (!connection)
8859                 return -EIO;
8860
8861         if (!dbus_connection_add_filter(connection, g_supplicant_filter,
8862                                                 NULL, NULL)) {
8863                 dbus_connection_unref(connection);
8864                 connection = NULL;
8865                 return -EIO;
8866         }
8867 #if defined TIZEN_EXT
8868         simplified_log = connman_setting_get_bool("SimplifiedLog");
8869 #endif
8870         callbacks_pointer = callbacks;
8871         eap_methods = 0;
8872
8873         interface_table = g_hash_table_new_full(g_str_hash, g_str_equal,
8874                                                 NULL, remove_interface);
8875
8876         bss_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
8877                                                                 NULL, NULL);
8878         peer_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
8879                                                                 NULL, NULL);
8880         group_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
8881                                                                 NULL, NULL);
8882         pending_peer_connection = g_hash_table_new_full(g_str_hash, g_str_equal,
8883                                                                 NULL, NULL);
8884         config_file_table = g_hash_table_new_full(g_str_hash, g_str_equal,
8885                                                                 g_free, g_free);
8886
8887         supplicant_dbus_setup(connection);
8888
8889         dbus_bus_add_match(connection, g_supplicant_rule0, NULL);
8890         dbus_bus_add_match(connection, g_supplicant_rule1, NULL);
8891         dbus_bus_add_match(connection, g_supplicant_rule2, NULL);
8892         dbus_bus_add_match(connection, g_supplicant_rule3, NULL);
8893         dbus_bus_add_match(connection, g_supplicant_rule4, NULL);
8894         dbus_bus_add_match(connection, g_supplicant_rule5, NULL);
8895 #if defined TIZEN_EXT
8896         dbus_bus_add_match(connection,
8897                         "type=signal,interface=org.tizen.system.deviced.PowerOff,"
8898                         "member=ChangeState", NULL);
8899 #endif
8900 #if !defined TIZEN_EXT
8901         dbus_bus_add_match(connection, g_supplicant_rule6, NULL);
8902         dbus_bus_add_match(connection, g_supplicant_rule7, NULL);
8903         dbus_bus_add_match(connection, g_supplicant_rule8, NULL);
8904 #endif
8905 #if defined TIZEN_EXT_WIFI_MESH
8906         dbus_bus_add_match(connection, g_supplicant_rule9, NULL);
8907 #endif
8908         dbus_connection_flush(connection);
8909
8910         if (dbus_bus_name_has_owner(connection,
8911                                         SUPPLICANT_SERVICE, NULL)) {
8912                 system_available = TRUE;
8913                 supplicant_dbus_property_get_all(SUPPLICANT_PATH,
8914                                                 SUPPLICANT_INTERFACE,
8915                                                 service_property, NULL, NULL);
8916         } else
8917                 invoke_introspect_method();
8918
8919         SUPPLICANT_DBG("supplicant dbus setup completed");
8920         return 0;
8921 }
8922
8923 static void unregister_interface_remove_params(DBusMessageIter *iter,
8924                                                 void *user_data)
8925 {
8926         const char *path = user_data;
8927
8928         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
8929                                                         &path);
8930 }
8931
8932
8933 static void unregister_remove_interface(gpointer key, gpointer value,
8934                                                 gpointer user_data)
8935 {
8936         GSupplicantInterface *interface = value;
8937
8938         supplicant_dbus_method_call(SUPPLICANT_PATH,
8939                                         SUPPLICANT_INTERFACE,
8940                                         "RemoveInterface",
8941                                         unregister_interface_remove_params,
8942                                         NULL, interface->path, NULL);
8943 }
8944
8945 void g_supplicant_unregister(const GSupplicantCallbacks *callbacks)
8946 {
8947         SUPPLICANT_DBG("");
8948
8949         if (connection) {
8950 #if defined TIZEN_EXT_WIFI_MESH
8951                 dbus_bus_remove_match(connection, g_supplicant_rule9, NULL);
8952 #endif
8953 #if !defined TIZEN_EXT
8954                 dbus_bus_remove_match(connection, g_supplicant_rule8, NULL);
8955                 dbus_bus_remove_match(connection, g_supplicant_rule7, NULL);
8956                 dbus_bus_remove_match(connection, g_supplicant_rule6, NULL);
8957 #endif
8958                 dbus_bus_remove_match(connection, g_supplicant_rule5, NULL);
8959                 dbus_bus_remove_match(connection, g_supplicant_rule4, NULL);
8960                 dbus_bus_remove_match(connection, g_supplicant_rule3, NULL);
8961                 dbus_bus_remove_match(connection, g_supplicant_rule2, NULL);
8962                 dbus_bus_remove_match(connection, g_supplicant_rule1, NULL);
8963                 dbus_bus_remove_match(connection, g_supplicant_rule0, NULL);
8964                 dbus_connection_flush(connection);
8965
8966                 dbus_connection_remove_filter(connection,
8967                                                 g_supplicant_filter, NULL);
8968         }
8969
8970         if (config_file_table) {
8971                 g_hash_table_destroy(config_file_table);
8972                 config_file_table = NULL;
8973         }
8974
8975         if (bss_mapping) {
8976                 g_hash_table_destroy(bss_mapping);
8977                 bss_mapping = NULL;
8978         }
8979
8980         if (peer_mapping) {
8981                 g_hash_table_destroy(peer_mapping);
8982                 peer_mapping = NULL;
8983         }
8984
8985         if (group_mapping) {
8986                 g_hash_table_destroy(group_mapping);
8987                 group_mapping = NULL;
8988         }
8989
8990         if (interface_table) {
8991                 g_hash_table_foreach(interface_table,
8992                                         unregister_remove_interface, NULL);
8993                 g_hash_table_destroy(interface_table);
8994                 interface_table = NULL;
8995         }
8996
8997         if (system_available)
8998                 callback_system_killed();
8999
9000         if (connection) {
9001                 dbus_connection_unref(connection);
9002                 connection = NULL;
9003         }
9004
9005         callbacks_pointer = NULL;
9006         eap_methods = 0;
9007 }
9008
9009 #ifdef TIZEN_EXT
9010 struct supplicant_mac_policy {
9011         GSupplicantMacPolicyCallback callback;
9012         dbus_uint32_t policy;
9013         const void *user_data;
9014 };
9015
9016 static void mac_policy_result(const char *error,
9017                                 DBusMessageIter *iter, void *user_data)
9018 {
9019         struct supplicant_mac_policy *data = user_data;
9020         int result = 0;
9021
9022         if (!user_data)
9023                 return;
9024
9025         if (error) {
9026                 SUPPLICANT_DBG("Mac policy setting failure %s", error);
9027                 result = -EINVAL;
9028         }
9029
9030         if (data->callback)
9031                 data->callback(result, data->policy,
9032                                         (void *) data->user_data);
9033
9034         dbus_free(data);
9035 }
9036
9037 static void mac_policy_params(DBusMessageIter *iter, void *user_data)
9038 {
9039         struct supplicant_mac_policy *data = user_data;
9040
9041         dbus_message_iter_append_basic(iter, DBUS_TYPE_INT32, &(data->policy));
9042 }
9043
9044 int g_supplicant_interface_set_mac_policy(GSupplicantInterface *interface,
9045                                         GSupplicantMacPolicyCallback callback,
9046                                                         unsigned int policy,
9047                                                         void *user_data)
9048 {
9049         struct supplicant_mac_policy *data = NULL;
9050         int ret;
9051
9052         if (!system_available)
9053                 return -EFAULT;
9054
9055         if (!interface)
9056                 return -EINVAL;
9057
9058         data = dbus_malloc0(sizeof(*data));
9059         if (!data)
9060                 return -ENOMEM;
9061
9062         data->callback = callback;
9063         data->policy = policy;
9064         data->user_data = user_data;
9065
9066         ret =  supplicant_dbus_property_set(interface->path,
9067                                 SUPPLICANT_INTERFACE ".Interface",
9068                                 "MacAddr", DBUS_TYPE_INT32_AS_STRING,
9069                                 mac_policy_params, mac_policy_result, data, NULL);
9070         if (ret < 0) {
9071                 SUPPLICANT_DBG("Unable to set MacAddr configuration");
9072                 dbus_free(data);
9073         }
9074
9075         return ret;
9076 }
9077
9078 int g_supplicant_interface_set_preassoc_mac_policy(GSupplicantInterface *interface,
9079                                         GSupplicantMacPolicyCallback callback,
9080                                                         unsigned int policy,
9081                                                         void *user_data)
9082 {
9083         struct supplicant_mac_policy *data;
9084         int ret;
9085
9086         if (!system_available)
9087                 return -EFAULT;
9088
9089         if (!interface)
9090                 return -EINVAL;
9091
9092         data = dbus_malloc0(sizeof(*data));
9093         if (!data)
9094                 return -ENOMEM;
9095
9096         data->callback = callback;
9097         data->policy = policy;
9098         data->user_data = user_data;
9099
9100         ret =  supplicant_dbus_property_set(interface->path,
9101                                 SUPPLICANT_INTERFACE ".Interface",
9102                                 "PreassocMacAddr", DBUS_TYPE_INT32_AS_STRING,
9103                                 mac_policy_params, mac_policy_result, data, NULL);
9104         if (ret < 0) {
9105                 SUPPLICANT_DBG("Unable to set PreassocMacAddr configuration");
9106                 dbus_free(data);
9107         }
9108
9109         return ret;
9110 }
9111
9112 struct supplicant_random_mac_lifetime {
9113         GSupplicantRandomMaclifetimeCallback callback;
9114         dbus_uint32_t lifetime;
9115         const void *user_data;
9116 };
9117
9118 static void random_mac_lifetime_result(const char *error,
9119                                 DBusMessageIter *iter, void *user_data)
9120 {
9121         struct supplicant_random_mac_lifetime *data = user_data;
9122         int result = 0;
9123
9124         if (!user_data)
9125                 return;
9126
9127         if (error) {
9128                 SUPPLICANT_DBG("Random Mac lifetime setting failure %s", error);
9129                 result = -EINVAL;
9130         }
9131
9132         if (data->callback)
9133                 data->callback(result, data->lifetime,
9134                                         (void *) data->user_data);
9135
9136         dbus_free(data);
9137 }
9138
9139 static void random_mac_lifetime_params(DBusMessageIter *iter, void *user_data)
9140 {
9141         struct supplicant_random_mac_lifetime *data = user_data;
9142
9143         dbus_message_iter_append_basic(iter, DBUS_TYPE_UINT32, &(data->lifetime));
9144 }
9145
9146 int g_supplicant_interface_set_random_mac_lifetime(GSupplicantInterface *interface,
9147                                         GSupplicantRandomMaclifetimeCallback callback,
9148                                                         unsigned int lifetime,
9149                                                         void *user_data)
9150 {
9151         struct supplicant_random_mac_lifetime *data;
9152         int ret;
9153
9154         if (!system_available)
9155                 return -EFAULT;
9156
9157         if (!interface)
9158                 return -EINVAL;
9159
9160         data = dbus_malloc0(sizeof(*data));
9161         if (!data)
9162                 return -ENOMEM;
9163
9164         data->callback = callback;
9165         data->lifetime = lifetime;
9166         data->user_data = user_data;
9167
9168         ret =  supplicant_dbus_property_set(interface->path,
9169                                 SUPPLICANT_INTERFACE ".Interface",
9170                                 "RandAddrLifetime", DBUS_TYPE_UINT32_AS_STRING,
9171                                 random_mac_lifetime_params, random_mac_lifetime_result,
9172                                 data, NULL);
9173         if (ret < 0) {
9174                 SUPPLICANT_DBG("Unable to set RandAddrLifetime configuration");
9175                 dbus_free(data);
9176         }
9177
9178         return ret;
9179 }
9180 #endif