49d391fedc3542d18b1d201c695831e77b33a65f
[platform/upstream/connman.git] / gsupplicant / supplicant.c
1 /*
2  *
3  *  WPA supplicant library with GLib integration
4  *
5  *  Copyright (C) 2012-2013  Intel Corporation. All rights reserved.
6  *
7  *  This program is free software; you can redistribute it and/or modify
8  *  it under the terms of the GNU General Public License version 2 as
9  *  published by the Free Software Foundation.
10  *
11  *  This program is distributed in the hope that it will be useful,
12  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
13  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14  *  GNU General Public License for more details.
15  *
16  *  You should have received a copy of the GNU General Public License
17  *  along with this program; if not, write to the Free Software
18  *  Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA
19  *
20  */
21
22 #ifdef HAVE_CONFIG_H
23 #include <config.h>
24 #endif
25
26 #include <errno.h>
27 #include <stdio.h>
28 #include <stdlib.h>
29 #include <string.h>
30 #include <stdint.h>
31 #include <syslog.h>
32 #include <ctype.h>
33 #include <stdbool.h>
34 #include <netinet/if_ether.h>
35 #include <netinet/in.h>
36
37 #include <glib.h>
38 #include <gdbus.h>
39
40 #include "dbus.h"
41 #include "gsupplicant.h"
42
43 #define IEEE80211_CAP_ESS       0x0001
44 #define IEEE80211_CAP_IBSS      0x0002
45 #define IEEE80211_CAP_PRIVACY   0x0010
46
47 #if defined TIZEN_EXT
48 #define COUNTRY_CODE_LENGTH     2
49 #endif
50
51 #define BSS_UNKNOWN_STRENGTH    -90
52
53 static DBusConnection *connection;
54
55 static const GSupplicantCallbacks *callbacks_pointer;
56
57 static dbus_bool_t system_available = FALSE;
58 static dbus_bool_t system_ready = FALSE;
59
60 static dbus_int32_t debug_level;
61 static dbus_bool_t debug_timestamp = FALSE;
62 static dbus_bool_t debug_showkeys = FALSE;
63
64 static const char *debug_strings[] = {
65         "msgdump", "debug", "info", "warning", "error", NULL
66 };
67
68 static unsigned int eap_methods;
69
70 struct strvalmap {
71         const char *str;
72         unsigned int val;
73 };
74
75 static struct strvalmap eap_method_map[] = {
76         { "MD5",        G_SUPPLICANT_EAP_METHOD_MD5     },
77         { "TLS",        G_SUPPLICANT_EAP_METHOD_TLS     },
78         { "MSCHAPV2",   G_SUPPLICANT_EAP_METHOD_MSCHAPV2        },
79         { "PEAP",       G_SUPPLICANT_EAP_METHOD_PEAP    },
80         { "TTLS",       G_SUPPLICANT_EAP_METHOD_TTLS    },
81         { "GTC",        G_SUPPLICANT_EAP_METHOD_GTC     },
82         { "OTP",        G_SUPPLICANT_EAP_METHOD_OTP     },
83         { "LEAP",       G_SUPPLICANT_EAP_METHOD_LEAP    },
84         { "WSC",        G_SUPPLICANT_EAP_METHOD_WSC     },
85         { }
86 };
87
88 static struct strvalmap keymgmt_map[] = {
89         { "none",               G_SUPPLICANT_KEYMGMT_NONE               },
90         { "ieee8021x",          G_SUPPLICANT_KEYMGMT_IEEE8021X  },
91         { "wpa-none",           G_SUPPLICANT_KEYMGMT_WPA_NONE   },
92         { "wpa-psk",            G_SUPPLICANT_KEYMGMT_WPA_PSK    },
93         { "wpa-psk-sha256",     G_SUPPLICANT_KEYMGMT_WPA_PSK_256        },
94         { "wpa-ft-psk",         G_SUPPLICANT_KEYMGMT_WPA_FT_PSK },
95         { "wpa-ft-eap",         G_SUPPLICANT_KEYMGMT_WPA_FT_EAP },
96         { "wpa-eap",            G_SUPPLICANT_KEYMGMT_WPA_EAP    },
97         { "wpa-eap-sha256",     G_SUPPLICANT_KEYMGMT_WPA_EAP_256        },
98         { "wps",                G_SUPPLICANT_KEYMGMT_WPS                },
99         { }
100 };
101
102 static struct strvalmap authalg_capa_map[] = {
103         { "open",       G_SUPPLICANT_CAPABILITY_AUTHALG_OPEN    },
104         { "shared",     G_SUPPLICANT_CAPABILITY_AUTHALG_SHARED  },
105         { "leap",       G_SUPPLICANT_CAPABILITY_AUTHALG_LEAP    },
106         { }
107 };
108
109 static struct strvalmap proto_capa_map[] = {
110         { "wpa",        G_SUPPLICANT_CAPABILITY_PROTO_WPA               },
111         { "rsn",        G_SUPPLICANT_CAPABILITY_PROTO_RSN               },
112         { }
113 };
114
115 static struct strvalmap group_map[] = {
116         { "wep40",      G_SUPPLICANT_GROUP_WEP40        },
117         { "wep104",     G_SUPPLICANT_GROUP_WEP104       },
118         { "tkip",       G_SUPPLICANT_GROUP_TKIP },
119         { "ccmp",       G_SUPPLICANT_GROUP_CCMP },
120         { }
121 };
122
123 static struct strvalmap pairwise_map[] = {
124         { "none",       G_SUPPLICANT_PAIRWISE_NONE      },
125         { "tkip",       G_SUPPLICANT_PAIRWISE_TKIP      },
126         { "ccmp",       G_SUPPLICANT_PAIRWISE_CCMP      },
127         { }
128 };
129
130 static struct strvalmap scan_capa_map[] = {
131         { "active",     G_SUPPLICANT_CAPABILITY_SCAN_ACTIVE     },
132         { "passive",    G_SUPPLICANT_CAPABILITY_SCAN_PASSIVE    },
133         { "ssid",       G_SUPPLICANT_CAPABILITY_SCAN_SSID               },
134         { }
135 };
136
137 static struct strvalmap mode_capa_map[] = {
138         { "infrastructure",     G_SUPPLICANT_CAPABILITY_MODE_INFRA      },
139         { "ad-hoc",             G_SUPPLICANT_CAPABILITY_MODE_IBSS       },
140         { "ap",                 G_SUPPLICANT_CAPABILITY_MODE_AP         },
141         { "p2p",                G_SUPPLICANT_CAPABILITY_MODE_P2P        },
142         { }
143 };
144
145 static GHashTable *interface_table;
146 static GHashTable *bss_mapping;
147 static GHashTable *peer_mapping;
148 static GHashTable *group_mapping;
149 static GHashTable *pending_peer_connection;
150 static GHashTable *config_file_table;
151
152 struct _GSupplicantWpsCredentials {
153         unsigned char ssid[32];
154         unsigned int ssid_len;
155         char *key;
156 };
157
158 struct added_network_information {
159         char * ssid;
160         GSupplicantSecurity security;
161         char * passphrase;
162         char * private_passphrase;
163 };
164
165 struct _GSupplicantInterface {
166         char *path;
167         char *network_path;
168         unsigned int keymgmt_capa;
169         unsigned int authalg_capa;
170         unsigned int proto_capa;
171         unsigned int group_capa;
172         unsigned int pairwise_capa;
173         unsigned int scan_capa;
174         unsigned int mode_capa;
175         unsigned int max_scan_ssids;
176         bool p2p_support;
177         bool p2p_finding;
178         bool ap_create_in_progress;
179         dbus_bool_t ready;
180         GSupplicantState state;
181         dbus_bool_t scanning;
182         GSupplicantInterfaceCallback scan_callback;
183         void *scan_data;
184         int apscan;
185         char *ifname;
186         char *driver;
187         char *bridge;
188         struct _GSupplicantWpsCredentials wps_cred;
189         GSupplicantWpsState wps_state;
190         GHashTable *network_table;
191         GHashTable *peer_table;
192         GHashTable *group_table;
193         GHashTable *bss_mapping;
194         void *data;
195         const char *pending_peer_path;
196         GSupplicantNetwork *current_network;
197         struct added_network_information network_info;
198 #if defined TIZEN_EXT
199         int disconnect_reason;
200 #endif
201 };
202
203 struct g_supplicant_bss {
204         GSupplicantInterface *interface;
205         char *path;
206         unsigned char bssid[6];
207         unsigned char ssid[32];
208         unsigned int ssid_len;
209         dbus_uint16_t frequency;
210         dbus_uint32_t maxrate;
211         dbus_int16_t signal;
212         GSupplicantMode mode;
213         GSupplicantSecurity security;
214         dbus_bool_t rsn_selected;
215         unsigned int wpa_keymgmt;
216         unsigned int wpa_pairwise;
217         unsigned int wpa_group;
218         unsigned int rsn_keymgmt;
219         unsigned int rsn_pairwise;
220         unsigned int rsn_group;
221         unsigned int keymgmt;
222         dbus_bool_t privacy;
223         dbus_bool_t psk;
224         dbus_bool_t ieee8021x;
225 #if defined TIZEN_EXT
226         dbus_bool_t ft_psk;
227         dbus_bool_t ft_ieee8021x;
228         GSList *vsie_list;
229         dbus_bool_t hs20;
230         unsigned char country_code[COUNTRY_CODE_LENGTH];
231 #endif
232         unsigned int wps_capabilities;
233 };
234
235 struct _GSupplicantNetwork {
236         GSupplicantInterface *interface;
237         char *path;
238         char *group;
239         char *name;
240         unsigned char ssid[32];
241         unsigned int ssid_len;
242         dbus_int16_t signal;
243         dbus_uint16_t frequency;
244         struct g_supplicant_bss *best_bss;
245         GSupplicantMode mode;
246         GSupplicantSecurity security;
247         dbus_bool_t wps;
248         unsigned int wps_capabilities;
249         GHashTable *bss_table;
250         GHashTable *config_table;
251 #if defined TIZEN_EXT
252         bool isHS20AP;
253         char *eap;
254         char *identity;
255         char *phase2;
256         unsigned int keymgmt;
257         GSList *vsie_list;
258         unsigned char country_code[COUNTRY_CODE_LENGTH];
259 #endif
260 };
261
262 struct _GSupplicantPeer {
263         GSupplicantInterface *interface;
264         char *path;
265         unsigned char device_address[ETH_ALEN];
266         unsigned char iface_address[ETH_ALEN];
267         char *name;
268         unsigned char *widi_ies;
269         int widi_ies_length;
270         char *identifier;
271         unsigned int wps_capabilities;
272         GSList *groups;
273         const GSupplicantInterface *current_group_iface;
274         bool connection_requested;
275 };
276
277 struct _GSupplicantGroup {
278         GSupplicantInterface *interface;
279         GSupplicantInterface *orig_interface;
280         char *path;
281         int role;
282         GSList *members;
283 };
284
285 struct interface_data {
286         GSupplicantInterface *interface;
287         char *path; /* Interface path cannot be taken from interface (above) as
288                      * it might have been freed already.
289                      */
290         GSupplicantInterfaceCallback callback;
291         void *user_data;
292         bool network_remove_in_progress;
293         GSupplicantSSID *ssid;
294 };
295
296 struct interface_create_data {
297         char *ifname;
298         char *driver;
299         char *bridge;
300         GSupplicantInterface *interface;
301         GSupplicantInterfaceCallback callback;
302         void *user_data;
303 };
304
305 struct interface_connect_data {
306         GSupplicantInterface *interface;
307         char *path;
308         GSupplicantInterfaceCallback callback;
309         void *user_data;
310         union {
311                 GSupplicantSSID *ssid;
312                 GSupplicantPeerParams *peer;
313         };
314 };
315
316 struct interface_scan_data {
317         GSupplicantInterface *interface;
318         char *path;
319         GSupplicantInterfaceCallback callback;
320         GSupplicantScanParams *scan_params;
321         void *user_data;
322 };
323
324 #if defined TIZEN_EXT
325 struct g_connman_bssids {
326         char bssid[18];
327         uint16_t strength;
328         uint16_t frequency;
329 };
330 #endif
331
332 static int network_remove(struct interface_data *data);
333
334 static inline void debug(const char *format, ...)
335 {
336         char str[256];
337         va_list ap;
338
339         if (!callbacks_pointer || !callbacks_pointer->debug)
340                 return;
341
342         va_start(ap, format);
343
344         if (vsnprintf(str, sizeof(str), format, ap) > 0)
345                 callbacks_pointer->debug(str);
346
347         va_end(ap);
348 }
349
350 #define SUPPLICANT_DBG(fmt, arg...) \
351         debug("%s:%s() " fmt, __FILE__, __FUNCTION__ , ## arg);
352
353 static GSupplicantMode string2mode(const char *mode)
354 {
355         if (!mode)
356                 return G_SUPPLICANT_MODE_UNKNOWN;
357
358         if (g_str_equal(mode, "infrastructure"))
359                 return G_SUPPLICANT_MODE_INFRA;
360         else if (g_str_equal(mode, "ad-hoc"))
361                 return G_SUPPLICANT_MODE_IBSS;
362
363         return G_SUPPLICANT_MODE_UNKNOWN;
364 }
365
366 static const char *mode2string(GSupplicantMode mode)
367 {
368         switch (mode) {
369         case G_SUPPLICANT_MODE_UNKNOWN:
370                 break;
371         case G_SUPPLICANT_MODE_INFRA:
372                 return "managed";
373         case G_SUPPLICANT_MODE_IBSS:
374                 return "adhoc";
375         case G_SUPPLICANT_MODE_MASTER:
376                 return "ap";
377         }
378
379         return NULL;
380 }
381
382 static const char *security2string(GSupplicantSecurity security)
383 {
384         switch (security) {
385         case G_SUPPLICANT_SECURITY_UNKNOWN:
386                 break;
387         case G_SUPPLICANT_SECURITY_NONE:
388                 return "none";
389         case G_SUPPLICANT_SECURITY_WEP:
390                 return "wep";
391         case G_SUPPLICANT_SECURITY_PSK:
392                 return "psk";
393         case G_SUPPLICANT_SECURITY_IEEE8021X:
394                 return "ieee8021x";
395 #if defined TIZEN_EXT
396         case G_SUPPLICANT_SECURITY_FT_PSK:
397                 return "ft_psk";
398         case G_SUPPLICANT_SECURITY_FT_IEEE8021X:
399                 return "ft_ieee8021x";
400 #endif
401         }
402
403         return NULL;
404 }
405
406 static GSupplicantState string2state(const char *state)
407 {
408         if (!state)
409                 return G_SUPPLICANT_STATE_UNKNOWN;
410
411         if (g_str_equal(state, "unknown"))
412                 return G_SUPPLICANT_STATE_UNKNOWN;
413         else if (g_str_equal(state, "interface_disabled"))
414                 return G_SUPPLICANT_STATE_DISABLED;
415         else if (g_str_equal(state, "disconnected"))
416                 return G_SUPPLICANT_STATE_DISCONNECTED;
417         else if (g_str_equal(state, "inactive"))
418                 return G_SUPPLICANT_STATE_INACTIVE;
419         else if (g_str_equal(state, "scanning"))
420                 return G_SUPPLICANT_STATE_SCANNING;
421         else if (g_str_equal(state, "authenticating"))
422                 return G_SUPPLICANT_STATE_AUTHENTICATING;
423         else if (g_str_equal(state, "associating"))
424                 return G_SUPPLICANT_STATE_ASSOCIATING;
425         else if (g_str_equal(state, "associated"))
426                 return G_SUPPLICANT_STATE_ASSOCIATED;
427         else if (g_str_equal(state, "group_handshake"))
428                 return G_SUPPLICANT_STATE_GROUP_HANDSHAKE;
429         else if (g_str_equal(state, "4way_handshake"))
430                 return G_SUPPLICANT_STATE_4WAY_HANDSHAKE;
431         else if (g_str_equal(state, "completed"))
432                 return G_SUPPLICANT_STATE_COMPLETED;
433
434         return G_SUPPLICANT_STATE_UNKNOWN;
435 }
436
437 static bool compare_network_parameters(GSupplicantInterface *interface,
438                                 GSupplicantSSID *ssid)
439 {
440 #if defined TIZEN_EXT
441         if (!interface->network_info.ssid)
442                 return FALSE;
443 #endif
444
445         if (memcmp(interface->network_info.ssid, ssid->ssid, ssid->ssid_len))
446                 return FALSE;
447
448         if (interface->network_info.security != ssid->security)
449                 return FALSE;
450
451         if (interface->network_info.passphrase &&
452                         g_strcmp0(interface->network_info.passphrase,
453                                 ssid->passphrase) != 0) {
454                 return FALSE;
455         }
456
457         if (interface->network_info.private_passphrase &&
458                         g_strcmp0(interface->network_info.private_passphrase,
459                                 ssid->private_key_passphrase) != 0) {
460                 return FALSE;
461         }
462
463         return TRUE;
464 }
465
466 static void remove_network_information(GSupplicantInterface * interface)
467 {
468         g_free(interface->network_info.ssid);
469         g_free(interface->network_info.passphrase);
470         g_free(interface->network_info.private_passphrase);
471         interface->network_info.ssid = NULL;
472         interface->network_info.passphrase = NULL;
473         interface->network_info.private_passphrase = NULL;
474 }
475
476 static int store_network_information(GSupplicantInterface * interface,
477                                 GSupplicantSSID *ssid)
478 {
479         interface->network_info.ssid = g_malloc(ssid->ssid_len + 1);
480         if (interface->network_info.ssid != NULL) {
481                 memcpy(interface->network_info.ssid, ssid->ssid,
482                         ssid->ssid_len);
483                 interface->network_info.ssid[ssid->ssid_len] = '\0';
484         } else {
485                 return -ENOMEM;
486         }
487
488         interface->network_info.security = ssid->security;
489
490         if ((ssid->security == G_SUPPLICANT_SECURITY_WEP ||
491                 ssid->security == G_SUPPLICANT_SECURITY_PSK ||
492                 ssid->security == G_SUPPLICANT_SECURITY_NONE) &&
493                 ssid->passphrase) {
494                 interface->network_info.passphrase = g_strdup(ssid->passphrase);
495         }
496
497         if (ssid->security == G_SUPPLICANT_SECURITY_IEEE8021X &&
498                         ssid->private_key_passphrase) {
499                 interface->network_info.private_passphrase =
500                         g_strdup(ssid->private_key_passphrase);
501         }
502
503         return 0;
504 }
505
506 static void callback_system_ready(void)
507 {
508         if (system_ready)
509                 return;
510
511         system_ready = TRUE;
512
513         if (!callbacks_pointer)
514                 return;
515
516         if (!callbacks_pointer->system_ready)
517                 return;
518
519         callbacks_pointer->system_ready();
520 }
521
522 static void callback_system_killed(void)
523 {
524         system_ready = FALSE;
525
526         if (!callbacks_pointer)
527                 return;
528
529         if (!callbacks_pointer->system_killed)
530                 return;
531
532         callbacks_pointer->system_killed();
533 }
534
535 static void callback_interface_added(GSupplicantInterface *interface)
536 {
537         SUPPLICANT_DBG("");
538
539         if (!callbacks_pointer)
540                 return;
541
542         if (!callbacks_pointer->interface_added)
543                 return;
544
545         callbacks_pointer->interface_added(interface);
546 }
547
548 static void callback_interface_state(GSupplicantInterface *interface)
549 {
550         if (!callbacks_pointer)
551                 return;
552
553         if (!callbacks_pointer->interface_state)
554                 return;
555
556         callbacks_pointer->interface_state(interface);
557 }
558
559 static void callback_interface_removed(GSupplicantInterface *interface)
560 {
561         if (!callbacks_pointer)
562                 return;
563
564         if (!callbacks_pointer->interface_removed)
565                 return;
566
567         callbacks_pointer->interface_removed(interface);
568 }
569
570 #if !defined TIZEN_EXT
571 static void callback_p2p_support(GSupplicantInterface *interface)
572 {
573         SUPPLICANT_DBG("");
574
575         if (!interface->p2p_support)
576                 return;
577
578         if (callbacks_pointer && callbacks_pointer->p2p_support)
579                 callbacks_pointer->p2p_support(interface);
580 }
581 #endif
582
583 static void callback_scan_started(GSupplicantInterface *interface)
584 {
585         if (!callbacks_pointer)
586                 return;
587
588         if (!callbacks_pointer->scan_started)
589                 return;
590
591         callbacks_pointer->scan_started(interface);
592 }
593
594 static void callback_ap_create_fail(GSupplicantInterface *interface)
595 {
596         if (!callbacks_pointer)
597                 return;
598
599         if (!callbacks_pointer->ap_create_fail)
600                 return;
601
602         callbacks_pointer->ap_create_fail(interface);
603 }
604
605 static void callback_scan_finished(GSupplicantInterface *interface)
606 {
607         if (!callbacks_pointer)
608                 return;
609
610         if (!callbacks_pointer->scan_finished)
611                 return;
612
613         callbacks_pointer->scan_finished(interface);
614 }
615
616 static void callback_network_added(GSupplicantNetwork *network)
617 {
618         if (!callbacks_pointer)
619                 return;
620
621         if (!callbacks_pointer->network_added)
622                 return;
623
624         callbacks_pointer->network_added(network);
625 }
626
627 static void callback_network_removed(GSupplicantNetwork *network)
628 {
629         if (!callbacks_pointer)
630                 return;
631
632         if (!callbacks_pointer->network_removed)
633                 return;
634
635         callbacks_pointer->network_removed(network);
636 }
637
638 #if defined TIZEN_EXT
639 static void callback_network_merged(GSupplicantNetwork *network)
640 {
641         if (!callbacks_pointer)
642                 return;
643
644         if (!callbacks_pointer->network_merged)
645                 return;
646
647         callbacks_pointer->network_merged(network);
648 }
649
650 static void callback_assoc_failed(void *user_data)
651 {
652         if (!callbacks_pointer)
653                 return;
654
655         if (!callbacks_pointer->assoc_failed)
656                 return;
657
658         callbacks_pointer->assoc_failed(user_data);
659 }
660 #endif
661
662 static void callback_network_changed(GSupplicantNetwork *network,
663                                         const char *property)
664 {
665         if (!callbacks_pointer)
666                 return;
667
668         if (!callbacks_pointer->network_changed)
669                 return;
670
671         callbacks_pointer->network_changed(network, property);
672 }
673
674 static void callback_network_associated(GSupplicantNetwork *network)
675 {
676         if (!callbacks_pointer)
677                 return;
678
679         if (!callbacks_pointer->network_associated)
680                 return;
681
682         callbacks_pointer->network_associated(network);
683 }
684
685 static void callback_peer_found(GSupplicantPeer *peer)
686 {
687         if (!callbacks_pointer)
688                 return;
689
690         if (!callbacks_pointer->peer_found)
691                 return;
692
693         callbacks_pointer->peer_found(peer);
694 }
695
696 static void callback_peer_lost(GSupplicantPeer *peer)
697 {
698         if (!callbacks_pointer)
699                 return;
700
701         if (!callbacks_pointer->peer_lost)
702                 return;
703
704         callbacks_pointer->peer_lost(peer);
705 }
706
707 static void callback_peer_changed(GSupplicantPeer *peer,
708                                                 GSupplicantPeerState state)
709 {
710         if (!callbacks_pointer)
711                 return;
712
713         if (!callbacks_pointer->peer_changed)
714                 return;
715
716         callbacks_pointer->peer_changed(peer, state);
717 }
718
719 static void callback_peer_request(GSupplicantPeer *peer)
720 {
721         if (!callbacks_pointer)
722                 return;
723
724         if (!callbacks_pointer->peer_request)
725                 return;
726
727         peer->connection_requested = true;
728
729         callbacks_pointer->peer_request(peer);
730 }
731
732 static void callback_disconnect_reason_code(GSupplicantInterface *interface,
733                                         int reason_code)
734 {
735         if (!callbacks_pointer)
736                 return;
737
738         if (!callbacks_pointer->disconnect_reasoncode)
739                 return;
740
741         if (reason_code != 0)
742                 callbacks_pointer->disconnect_reasoncode(interface,
743                                                         reason_code);
744 }
745
746 static void callback_assoc_status_code(GSupplicantInterface *interface,
747                                 int status_code)
748 {
749         if (!callbacks_pointer)
750                 return;
751
752         if (!callbacks_pointer->assoc_status_code)
753                 return;
754
755         callbacks_pointer->assoc_status_code(interface, status_code);
756
757 }
758
759 static void remove_group(gpointer data)
760 {
761         GSupplicantGroup *group = data;
762
763         if (group->members)
764                 g_slist_free_full(group->members, g_free);
765
766         g_free(group->path);
767         g_free(group);
768 }
769
770 static void remove_interface(gpointer data)
771 {
772         GSupplicantInterface *interface = data;
773
774         g_hash_table_destroy(interface->bss_mapping);
775         g_hash_table_destroy(interface->network_table);
776         g_hash_table_destroy(interface->peer_table);
777         g_hash_table_destroy(interface->group_table);
778
779         if (interface->scan_callback) {
780                 SUPPLICANT_DBG("call interface %p callback %p scanning %d",
781                                 interface, interface->scan_callback,
782                                 interface->scanning);
783
784                 interface->scan_callback(-EIO, interface, interface->scan_data);
785                 interface->scan_callback = NULL;
786                 interface->scan_data = NULL;
787
788                 if (interface->scanning) {
789                         interface->scanning = FALSE;
790                         callback_scan_finished(interface);
791                 }
792         }
793
794         callback_interface_removed(interface);
795
796         g_free(interface->wps_cred.key);
797         g_free(interface->path);
798         g_free(interface->network_path);
799 #if defined TIZEN_EXT
800         interface->network_path = NULL;
801 #endif
802         g_free(interface->ifname);
803         g_free(interface->driver);
804         g_free(interface->bridge);
805         remove_network_information(interface);
806         g_free(interface);
807 }
808
809 static void remove_network(gpointer data)
810 {
811         GSupplicantNetwork *network = data;
812
813         g_hash_table_destroy(network->bss_table);
814
815         callback_network_removed(network);
816
817         g_hash_table_destroy(network->config_table);
818
819         g_free(network->path);
820         g_free(network->group);
821         g_free(network->name);
822 #if defined TIZEN_EXT
823         g_free(network->eap);
824         g_free(network->identity);
825         g_free(network->phase2);
826 #endif
827 #if defined TIZEN_EXT
828         g_slist_free_full(network->vsie_list, g_free);
829 #endif
830
831         g_free(network);
832 }
833
834 static void remove_bss(gpointer data)
835 {
836         struct g_supplicant_bss *bss = data;
837
838         g_free(bss->path);
839 #if defined TIZEN_EXT
840         g_slist_free_full(bss->vsie_list, g_free);
841 #endif
842         g_free(bss);
843 }
844
845 static void remove_peer(gpointer data)
846 {
847         GSupplicantPeer *peer = data;
848
849         callback_peer_lost(peer);
850
851         if (peer->groups)
852                 g_slist_free_full(peer->groups, g_free);
853
854         if (peer_mapping)
855                 g_hash_table_remove(peer_mapping, peer->path);
856
857         if (pending_peer_connection)
858                 g_hash_table_remove(pending_peer_connection, peer->path);
859
860         g_free(peer->path);
861         g_free(peer->name);
862         g_free(peer->identifier);
863         g_free(peer->widi_ies);
864
865         g_free(peer);
866 }
867
868 static void debug_strvalmap(const char *label, struct strvalmap *map,
869                                                         unsigned int val)
870 {
871         int i;
872
873         for (i = 0; map[i].str; i++) {
874                 if (val & map[i].val)
875                         SUPPLICANT_DBG("%s: %s", label, map[i].str);
876         }
877 }
878
879 static void interface_capability_keymgmt(DBusMessageIter *iter, void *user_data)
880 {
881         GSupplicantInterface *interface = user_data;
882         const char *str = NULL;
883         int i;
884
885         dbus_message_iter_get_basic(iter, &str);
886         if (!str)
887                 return;
888
889         for (i = 0; keymgmt_map[i].str; i++)
890                 if (strcmp(str, keymgmt_map[i].str) == 0) {
891                         interface->keymgmt_capa |= keymgmt_map[i].val;
892                         break;
893                 }
894 }
895
896 static void interface_capability_authalg(DBusMessageIter *iter, void *user_data)
897 {
898         GSupplicantInterface *interface = user_data;
899         const char *str = NULL;
900         int i;
901
902         dbus_message_iter_get_basic(iter, &str);
903         if (!str)
904                 return;
905
906         for (i = 0; authalg_capa_map[i].str; i++)
907                 if (strcmp(str, authalg_capa_map[i].str) == 0) {
908                         interface->authalg_capa |= authalg_capa_map[i].val;
909                         break;
910                 }
911 }
912
913 static void interface_capability_proto(DBusMessageIter *iter, void *user_data)
914 {
915         GSupplicantInterface *interface = user_data;
916         const char *str = NULL;
917         int i;
918
919         dbus_message_iter_get_basic(iter, &str);
920         if (!str)
921                 return;
922
923         for (i = 0; proto_capa_map[i].str; i++)
924                 if (strcmp(str, proto_capa_map[i].str) == 0) {
925                         interface->proto_capa |= proto_capa_map[i].val;
926                         break;
927                 }
928 }
929
930 static void interface_capability_pairwise(DBusMessageIter *iter,
931                                                         void *user_data)
932 {
933         GSupplicantInterface *interface = user_data;
934         const char *str = NULL;
935         int i;
936
937         dbus_message_iter_get_basic(iter, &str);
938         if (!str)
939                 return;
940
941         for (i = 0; pairwise_map[i].str; i++)
942                 if (strcmp(str, pairwise_map[i].str) == 0) {
943                         interface->pairwise_capa |= pairwise_map[i].val;
944                         break;
945                 }
946 }
947
948 static void interface_capability_group(DBusMessageIter *iter, void *user_data)
949 {
950         GSupplicantInterface *interface = user_data;
951         const char *str = NULL;
952         int i;
953
954         dbus_message_iter_get_basic(iter, &str);
955         if (!str)
956                 return;
957
958         for (i = 0; group_map[i].str; i++)
959                 if (strcmp(str, group_map[i].str) == 0) {
960                         interface->group_capa |= group_map[i].val;
961                         break;
962                 }
963 }
964
965 static void interface_capability_scan(DBusMessageIter *iter, void *user_data)
966 {
967         GSupplicantInterface *interface = user_data;
968         const char *str = NULL;
969         int i;
970
971         dbus_message_iter_get_basic(iter, &str);
972         if (!str)
973                 return;
974
975         for (i = 0; scan_capa_map[i].str; i++)
976                 if (strcmp(str, scan_capa_map[i].str) == 0) {
977                         interface->scan_capa |= scan_capa_map[i].val;
978                         break;
979                 }
980 }
981
982 static void interface_capability_mode(DBusMessageIter *iter, void *user_data)
983 {
984         GSupplicantInterface *interface = user_data;
985         const char *str = NULL;
986         int i;
987
988         dbus_message_iter_get_basic(iter, &str);
989         if (!str)
990                 return;
991
992         for (i = 0; mode_capa_map[i].str; i++)
993                 if (strcmp(str, mode_capa_map[i].str) == 0) {
994                         interface->mode_capa |= mode_capa_map[i].val;
995                         break;
996                 }
997 }
998
999 static void interface_capability(const char *key, DBusMessageIter *iter,
1000                                                         void *user_data)
1001 {
1002         GSupplicantInterface *interface = user_data;
1003
1004         if (!key)
1005                 return;
1006
1007         if (g_strcmp0(key, "KeyMgmt") == 0)
1008                 supplicant_dbus_array_foreach(iter,
1009                                 interface_capability_keymgmt, interface);
1010         else if (g_strcmp0(key, "AuthAlg") == 0)
1011                 supplicant_dbus_array_foreach(iter,
1012                                 interface_capability_authalg, interface);
1013         else if (g_strcmp0(key, "Protocol") == 0)
1014                 supplicant_dbus_array_foreach(iter,
1015                                 interface_capability_proto, interface);
1016         else if (g_strcmp0(key, "Pairwise") == 0)
1017                 supplicant_dbus_array_foreach(iter,
1018                                 interface_capability_pairwise, interface);
1019         else if (g_strcmp0(key, "Group") == 0)
1020                 supplicant_dbus_array_foreach(iter,
1021                                 interface_capability_group, interface);
1022         else if (g_strcmp0(key, "Scan") == 0)
1023                 supplicant_dbus_array_foreach(iter,
1024                                 interface_capability_scan, interface);
1025         else if (g_strcmp0(key, "Modes") == 0)
1026                 supplicant_dbus_array_foreach(iter,
1027                                 interface_capability_mode, interface);
1028         else if (g_strcmp0(key, "MaxScanSSID") == 0) {
1029                 dbus_int32_t max_scan_ssid;
1030
1031                 dbus_message_iter_get_basic(iter, &max_scan_ssid);
1032                 if (max_scan_ssid < 2)
1033                         max_scan_ssid = 0;
1034                 interface->max_scan_ssids = max_scan_ssid;
1035
1036         } else
1037                 SUPPLICANT_DBG("key %s type %c",
1038                                 key, dbus_message_iter_get_arg_type(iter));
1039 }
1040
1041 struct set_apscan_data
1042 {
1043         unsigned int ap_scan;
1044         GSupplicantInterface *interface;
1045 };
1046
1047 static void set_apscan(DBusMessageIter *iter, void *user_data)
1048 {
1049         struct set_apscan_data *data = user_data;
1050         unsigned int ap_scan = data->ap_scan;
1051
1052         dbus_message_iter_append_basic(iter, DBUS_TYPE_UINT32, &ap_scan);
1053 }
1054
1055 static void set_apscan_complete(const char *error,
1056                 DBusMessageIter *iter, void *user_data)
1057 {
1058         struct set_apscan_data *data = user_data;
1059         GSupplicantInterface *interface = data->interface;
1060
1061         if (error) {
1062                 interface->ap_create_in_progress = false;
1063                 SUPPLICANT_DBG("Set AP scan error %s", error);
1064                 goto error;
1065         }
1066
1067         interface->ap_create_in_progress = true;
1068 error:
1069         dbus_free(data);
1070 }
1071
1072 int g_supplicant_interface_set_apscan(GSupplicantInterface *interface,
1073                                                         unsigned int ap_scan)
1074 {
1075         struct set_apscan_data *data;
1076         int ret;
1077
1078         data = dbus_malloc0(sizeof(*data));
1079
1080         if (!data)
1081                 return -ENOMEM;
1082
1083         data->ap_scan = ap_scan;
1084         data->interface = interface;
1085
1086         ret = supplicant_dbus_property_set(interface->path,
1087                         SUPPLICANT_INTERFACE ".Interface",
1088                         "ApScan", DBUS_TYPE_UINT32_AS_STRING,
1089                         set_apscan, set_apscan_complete, data, NULL);
1090         if (ret < 0)
1091                 dbus_free(data);
1092
1093         return ret;
1094 }
1095
1096 void g_supplicant_interface_set_data(GSupplicantInterface *interface,
1097                                                                 void *data)
1098 {
1099         if (!interface)
1100                 return;
1101
1102         interface->data = data;
1103
1104         if (!data)
1105                 interface->scan_callback = NULL;
1106 }
1107
1108 void *g_supplicant_interface_get_data(GSupplicantInterface *interface)
1109 {
1110         if (!interface)
1111                 return NULL;
1112
1113         return interface->data;
1114 }
1115
1116 const char *g_supplicant_interface_get_ifname(GSupplicantInterface *interface)
1117 {
1118         if (!interface)
1119                 return NULL;
1120
1121         return interface->ifname;
1122 }
1123
1124 const char *g_supplicant_interface_get_driver(GSupplicantInterface *interface)
1125 {
1126         if (!interface)
1127                 return NULL;
1128
1129         return interface->driver;
1130 }
1131
1132 GSupplicantState g_supplicant_interface_get_state(
1133                                         GSupplicantInterface *interface)
1134 {
1135         if (!interface)
1136                 return G_SUPPLICANT_STATE_UNKNOWN;
1137
1138         return interface->state;
1139 }
1140
1141 const char *g_supplicant_interface_get_wps_key(GSupplicantInterface *interface)
1142 {
1143         if (!interface)
1144                 return NULL;
1145
1146         return (const char *)interface->wps_cred.key;
1147 }
1148
1149 const void *g_supplicant_interface_get_wps_ssid(GSupplicantInterface *interface,
1150                                                         unsigned int *ssid_len)
1151 {
1152         if (!ssid_len)
1153                 return NULL;
1154
1155         if (!interface || interface->wps_cred.ssid_len == 0) {
1156                 *ssid_len = 0;
1157                 return NULL;
1158         }
1159
1160         *ssid_len = interface->wps_cred.ssid_len;
1161         return interface->wps_cred.ssid;
1162 }
1163
1164 GSupplicantWpsState g_supplicant_interface_get_wps_state(
1165                                         GSupplicantInterface *interface)
1166 {
1167         if (!interface)
1168                 return G_SUPPLICANT_WPS_STATE_UNKNOWN;
1169
1170         return interface->wps_state;
1171 }
1172
1173 unsigned int g_supplicant_interface_get_mode(GSupplicantInterface *interface)
1174 {
1175         if (!interface)
1176                 return 0;
1177
1178         return interface->mode_capa;
1179 }
1180
1181 unsigned int g_supplicant_interface_get_max_scan_ssids(
1182                                 GSupplicantInterface *interface)
1183 {
1184         if (!interface)
1185                 return 0;
1186
1187         if (interface->max_scan_ssids == 0)
1188                 return WPAS_MAX_SCAN_SSIDS;
1189
1190         return interface->max_scan_ssids;
1191 }
1192
1193 static void set_network_enabled(DBusMessageIter *iter, void *user_data)
1194 {
1195         dbus_bool_t enable = *(dbus_bool_t *)user_data;
1196
1197         dbus_message_iter_append_basic(iter, DBUS_TYPE_BOOLEAN, &enable);
1198 }
1199
1200 int g_supplicant_interface_enable_selected_network(GSupplicantInterface *interface,
1201                                                         dbus_bool_t enable)
1202 {
1203         if (!interface)
1204                 return -1;
1205
1206         if (!interface->network_path)
1207                 return -1;
1208
1209         SUPPLICANT_DBG(" ");
1210         return supplicant_dbus_property_set(interface->network_path,
1211                                 SUPPLICANT_INTERFACE ".Network",
1212                                 "Enabled", DBUS_TYPE_BOOLEAN_AS_STRING,
1213                                 set_network_enabled, NULL, &enable, NULL);
1214 }
1215
1216 dbus_bool_t g_supplicant_interface_get_ready(GSupplicantInterface *interface)
1217 {
1218         if (!interface)
1219                 return FALSE;
1220
1221         return interface->ready;
1222 }
1223
1224 GSupplicantInterface *g_supplicant_network_get_interface(
1225                                         GSupplicantNetwork *network)
1226 {
1227         if (!network)
1228                 return NULL;
1229
1230         return network->interface;
1231 }
1232
1233 const char *g_supplicant_network_get_name(GSupplicantNetwork *network)
1234 {
1235         if (!network || !network->name)
1236                 return "";
1237
1238         return network->name;
1239 }
1240
1241 const char *g_supplicant_network_get_identifier(GSupplicantNetwork *network)
1242 {
1243         if (!network || !network->group)
1244                 return "";
1245
1246         return network->group;
1247 }
1248
1249 const char *g_supplicant_network_get_path(GSupplicantNetwork *network)
1250 {
1251         if (!network || !network->path)
1252                 return NULL;
1253
1254         return network->path;
1255 }
1256
1257 const char *g_supplicant_network_get_mode(GSupplicantNetwork *network)
1258 {
1259         if (!network)
1260                 return G_SUPPLICANT_MODE_UNKNOWN;
1261
1262         return mode2string(network->mode);
1263 }
1264
1265 const char *g_supplicant_network_get_security(GSupplicantNetwork *network)
1266 {
1267         if (!network)
1268                 return G_SUPPLICANT_SECURITY_UNKNOWN;
1269
1270         return security2string(network->security);
1271 }
1272
1273 const void *g_supplicant_network_get_ssid(GSupplicantNetwork *network,
1274                                                 unsigned int *ssid_len)
1275 {
1276         if (!network) {
1277                 *ssid_len = 0;
1278                 return NULL;
1279         }
1280
1281         *ssid_len = network->ssid_len;
1282         return network->ssid;
1283 }
1284
1285 dbus_int16_t g_supplicant_network_get_signal(GSupplicantNetwork *network)
1286 {
1287         if (!network)
1288                 return 0;
1289
1290         return network->signal;
1291 }
1292
1293 dbus_uint16_t g_supplicant_network_get_frequency(GSupplicantNetwork *network)
1294 {
1295         if (!network)
1296                 return 0;
1297
1298         return network->frequency;
1299 }
1300
1301 dbus_bool_t g_supplicant_network_get_wps(GSupplicantNetwork *network)
1302 {
1303         if (!network)
1304                 return FALSE;
1305
1306         return network->wps;
1307 }
1308
1309 dbus_bool_t g_supplicant_network_is_wps_active(GSupplicantNetwork *network)
1310 {
1311         if (!network)
1312                 return FALSE;
1313
1314         if (network->wps_capabilities & G_SUPPLICANT_WPS_CONFIGURED)
1315                 return TRUE;
1316
1317         return FALSE;
1318 }
1319
1320 dbus_bool_t g_supplicant_network_is_wps_pbc(GSupplicantNetwork *network)
1321 {
1322         if (!network)
1323                 return FALSE;
1324
1325         if (network->wps_capabilities & G_SUPPLICANT_WPS_PBC)
1326                 return TRUE;
1327
1328         return FALSE;
1329 }
1330
1331 dbus_bool_t g_supplicant_network_is_wps_advertizing(GSupplicantNetwork *network)
1332 {
1333         if (!network)
1334                 return FALSE;
1335
1336         if (network->wps_capabilities & G_SUPPLICANT_WPS_REGISTRAR)
1337                 return TRUE;
1338
1339         return FALSE;
1340 }
1341
1342 GSupplicantInterface *g_supplicant_peer_get_interface(GSupplicantPeer *peer)
1343 {
1344         if (!peer)
1345                 return NULL;
1346
1347         return peer->interface;
1348 }
1349
1350 const char *g_supplicant_peer_get_path(GSupplicantPeer *peer)
1351 {
1352         if (!peer)
1353                 return NULL;
1354
1355         return peer->path;
1356 }
1357
1358 const char *g_supplicant_peer_get_identifier(GSupplicantPeer *peer)
1359 {
1360         if (!peer)
1361                 return NULL;
1362
1363         return peer->identifier;
1364 }
1365
1366 const void *g_supplicant_peer_get_device_address(GSupplicantPeer *peer)
1367 {
1368         if (!peer)
1369                 return NULL;
1370
1371         return peer->device_address;
1372 }
1373
1374 const void *g_supplicant_peer_get_iface_address(GSupplicantPeer *peer)
1375 {
1376         if (!peer)
1377                 return NULL;
1378
1379         return peer->iface_address;
1380 }
1381
1382 const char *g_supplicant_peer_get_name(GSupplicantPeer *peer)
1383 {
1384         if (!peer)
1385                 return NULL;
1386
1387         return peer->name;
1388 }
1389
1390 #if defined TIZEN_EXT
1391 bool g_supplicant_network_is_hs20AP(GSupplicantNetwork *network)
1392 {
1393         if (!network)
1394                 return 0;
1395
1396         return network->isHS20AP;
1397 }
1398
1399 const char *g_supplicant_network_get_eap(GSupplicantNetwork *network)
1400 {
1401         if (!network || !network->eap)
1402                 return NULL;
1403
1404         return network->eap;
1405 }
1406
1407 const char *g_supplicant_network_get_identity(GSupplicantNetwork *network)
1408 {
1409         if (!network || !network->identity)
1410                 return NULL;
1411
1412         return network->identity;
1413 }
1414
1415 const char *g_supplicant_network_get_phase2(GSupplicantNetwork *network)
1416 {
1417         if (!network || !network->phase2)
1418                 return NULL;
1419
1420         return network->phase2;
1421 }
1422
1423 unsigned int g_supplicant_network_get_keymgmt(GSupplicantNetwork *network)
1424 {
1425         if (network == NULL)
1426                 return 0;
1427
1428         return network->keymgmt;
1429 }
1430
1431 const unsigned char *g_supplicant_network_get_countrycode(GSupplicantNetwork
1432                                                           *network)
1433 {
1434         if (!network)
1435                 return NULL;
1436
1437         return network->country_code;
1438 }
1439 #endif
1440
1441 const unsigned char *g_supplicant_peer_get_widi_ies(GSupplicantPeer *peer,
1442                                                                 int *length)
1443 {
1444         if (!peer || !length)
1445                 return NULL;
1446
1447         *length = peer->widi_ies_length;
1448         return peer->widi_ies;
1449 }
1450
1451 bool g_supplicant_peer_is_wps_pbc(GSupplicantPeer *peer)
1452 {
1453         if (!peer)
1454                 return false;
1455
1456         if (peer->wps_capabilities & G_SUPPLICANT_WPS_PBC)
1457                 return true;
1458
1459         return false;
1460 }
1461
1462 bool g_supplicant_peer_is_wps_pin(GSupplicantPeer *peer)
1463 {
1464         if (!peer)
1465                 return false;
1466
1467         if (peer->wps_capabilities & G_SUPPLICANT_WPS_PIN)
1468                 return true;
1469
1470         return false;
1471 }
1472
1473 bool g_supplicant_peer_is_in_a_group(GSupplicantPeer *peer)
1474 {
1475         if (!peer || !peer->groups)
1476                 return false;
1477
1478         return true;
1479 }
1480
1481 GSupplicantInterface *g_supplicant_peer_get_group_interface(GSupplicantPeer *peer)
1482 {
1483         if (!peer)
1484                 return NULL;
1485
1486         return (GSupplicantInterface *) peer->current_group_iface;
1487 }
1488
1489 bool g_supplicant_peer_is_client(GSupplicantPeer *peer)
1490 {
1491         GSupplicantGroup *group;
1492         GSList *list;
1493
1494         if (!peer)
1495                 return false;
1496
1497         for (list = peer->groups; list; list = list->next) {
1498                 const char *path = list->data;
1499
1500                 group = g_hash_table_lookup(group_mapping, path);
1501                 if (!group)
1502                         continue;
1503
1504                 if (group->role != G_SUPPLICANT_GROUP_ROLE_CLIENT ||
1505                                 group->orig_interface != peer->interface)
1506                         continue;
1507
1508                 if (group->interface == peer->current_group_iface)
1509                         return true;
1510         }
1511
1512         return false;
1513 }
1514
1515 bool g_supplicant_peer_has_requested_connection(GSupplicantPeer *peer)
1516 {
1517         if (!peer)
1518                 return false;
1519
1520         return peer->connection_requested;
1521 }
1522
1523 #if defined TIZEN_EXT
1524 /*
1525  * Description: Network client requires additional wifi specific info
1526  */
1527 const unsigned char *g_supplicant_network_get_bssid(GSupplicantNetwork *network)
1528 {
1529         if (network == NULL || network->best_bss == NULL)
1530                 return NULL;
1531
1532         return (const unsigned char *)network->best_bss->bssid;
1533 }
1534
1535 unsigned int g_supplicant_network_get_maxrate(GSupplicantNetwork *network)
1536 {
1537         if (network == NULL || network->best_bss == NULL)
1538                 return 0;
1539
1540         return network->best_bss->maxrate;
1541 }
1542
1543 const char *g_supplicant_network_get_enc_mode(GSupplicantNetwork *network)
1544 {
1545         if (network == NULL || network->best_bss == NULL)
1546                 return NULL;
1547
1548         if (network->best_bss->security == G_SUPPLICANT_SECURITY_PSK ||
1549             network->best_bss->security == G_SUPPLICANT_SECURITY_IEEE8021X) {
1550                 unsigned int pairwise;
1551
1552                 pairwise = network->best_bss->rsn_pairwise |
1553                                 network->best_bss->wpa_pairwise;
1554
1555                 if ((pairwise & G_SUPPLICANT_PAIRWISE_CCMP) &&
1556                     (pairwise & G_SUPPLICANT_PAIRWISE_TKIP))
1557                         return "mixed";
1558                 else if (pairwise & G_SUPPLICANT_PAIRWISE_CCMP)
1559                         return "aes";
1560                 else if (pairwise & G_SUPPLICANT_PAIRWISE_TKIP)
1561                         return "tkip";
1562
1563         } else if (network->best_bss->security == G_SUPPLICANT_SECURITY_WEP)
1564                 return "wep";
1565         else if (network->best_bss->security == G_SUPPLICANT_SECURITY_NONE)
1566                 return "none";
1567
1568         return NULL;
1569 }
1570
1571 bool g_supplicant_network_get_rsn_mode(GSupplicantNetwork *network)
1572 {
1573         if (network == NULL || network->best_bss == NULL)
1574                 return 0;
1575
1576         if (network->best_bss->rsn_selected) {
1577                 const char *mode = g_supplicant_network_get_enc_mode(network);
1578                 if (g_strcmp0(mode, "aes") == 0 ||
1579                                 g_strcmp0(mode, "mixed") == 0)
1580                         return true;
1581                 else
1582                         return false;
1583         } else
1584                 return false;
1585 }
1586
1587 void *g_supplicant_network_get_wifi_vsie(GSupplicantNetwork *network)
1588 {
1589         GSList *vsie_list = NULL;
1590
1591         if (!network)
1592                 return NULL;
1593
1594         if (g_slist_length(network->vsie_list) > 0) {
1595                 GSList *list = NULL;
1596                 unsigned char *vsie = NULL;
1597                 for (list = network->vsie_list; list; list = list->next) {
1598                         unsigned char *ie = (unsigned char *)list->data;
1599                         if (ie == NULL)
1600                                 continue;
1601                         vsie = (unsigned char *)g_try_malloc0(ie[1]+2); // tag number size(1), tag length size(1)
1602
1603                         if (vsie) {
1604                                 memcpy(vsie, ie, ie[1]+2);
1605                                 vsie_list = g_slist_append(vsie_list, vsie);
1606                         } else
1607                                 SUPPLICANT_DBG("Failed to allocate memory");
1608                 }
1609         }
1610
1611         return vsie_list;
1612 }
1613
1614 static void update_bssid_list(gpointer key, gpointer value, gpointer user_data)
1615 {
1616         struct g_supplicant_bss *bss = value;
1617         struct g_connman_bssids *bssids = NULL;
1618         char buff[18];
1619         GSList **list = (GSList **)user_data;
1620
1621         bssids = (struct g_connman_bssids *)g_try_malloc0(sizeof(struct g_connman_bssids));
1622
1623         if (bssids) {
1624                 g_snprintf(buff, 18, "%02x:%02x:%02x:%02x:%02x:%02x",
1625                                 bss->bssid[0], bss->bssid[1], bss->bssid[2], bss->bssid[3],
1626                                 bss->bssid[4], bss->bssid[5]);
1627
1628                 memcpy(bssids->bssid, buff, 18);
1629                 bssids->bssid[17] = '\0';
1630                 bssids->strength = bss->signal;
1631                 bssids->strength += 120;
1632
1633                 if (bssids->strength > 100)
1634                         bssids->strength = 100;
1635
1636                 bssids->frequency = bss->frequency;
1637                 *list = g_slist_append(*list, bssids);
1638         } else
1639                 SUPPLICANT_DBG("Failed to allocate memory");
1640 }
1641
1642 void *g_supplicant_network_get_bssid_list(GSupplicantNetwork *network)
1643 {
1644         GSList *bssid_list = NULL;
1645
1646         if (g_hash_table_size(network->bss_table) < 1)
1647                 return NULL;
1648
1649         g_hash_table_foreach(network->bss_table, update_bssid_list, &bssid_list);
1650
1651         return bssid_list;
1652 }
1653 #endif
1654
1655 static void merge_network(GSupplicantNetwork *network)
1656 {
1657         GString *str;
1658         const char *ssid, *mode, *key_mgmt;
1659 #if defined TIZEN_EXT
1660         GSupplicantInterface *interface;
1661         const char *isHS20AP;
1662         const char *eap, *identity, *phase2;
1663 #endif
1664         unsigned int i, ssid_len;
1665         char *group;
1666
1667         ssid = g_hash_table_lookup(network->config_table, "ssid");
1668         mode = g_hash_table_lookup(network->config_table, "mode");
1669         key_mgmt = g_hash_table_lookup(network->config_table, "key_mgmt");
1670 #if defined TIZEN_EXT
1671         isHS20AP = g_hash_table_lookup(network->config_table, "isHS20AP");
1672         eap = g_hash_table_lookup(network->config_table, "eap");
1673         identity = g_hash_table_lookup(network->config_table, "identity");
1674         phase2 = g_hash_table_lookup(network->config_table, "phase2");
1675         interface = network->interface;
1676 #endif
1677
1678         SUPPLICANT_DBG("ssid %s mode %s", ssid, mode);
1679
1680         if (ssid)
1681                 ssid_len = strlen(ssid);
1682         else
1683                 ssid_len = 0;
1684
1685         str = g_string_sized_new((ssid_len * 2) + 24);
1686         if (!str)
1687                 return;
1688
1689         for (i = 0; i < ssid_len; i++)
1690 #if defined TIZEN_EXT
1691         {
1692                 if (ssid[i] != '"')
1693 #endif
1694                 g_string_append_printf(str, "%02x", ssid[i]);
1695 #if defined TIZEN_EXT
1696         }
1697 #endif
1698
1699         if (g_strcmp0(mode, "0") == 0)
1700                 g_string_append_printf(str, "_managed");
1701         else if (g_strcmp0(mode, "1") == 0)
1702                 g_string_append_printf(str, "_adhoc");
1703
1704         if (g_strcmp0(key_mgmt, "WPA-PSK") == 0)
1705                 g_string_append_printf(str, "_psk");
1706 #if defined TIZEN_EXT
1707         else if (g_strcmp0(key_mgmt, "WPA-EAP") == 0)
1708                 g_string_append_printf(str, "_ieee8021x");
1709         else
1710                 g_string_append_printf(str, "_none");
1711 #endif
1712
1713         group = g_string_free(str, FALSE);
1714
1715         SUPPLICANT_DBG("%s", group);
1716
1717 #if defined TIZEN_EXT
1718         if (g_strcmp0(isHS20AP, "1") == 0) {
1719                 network->isHS20AP = 1;
1720                 if (network->eap)
1721                         g_free(network->eap);
1722                 network->eap = g_strdup(eap);
1723
1724                 if (network->identity)
1725                         g_free(network->identity);
1726                 network->identity = g_strdup(identity);
1727
1728                 if (network->phase2)
1729                         g_free(network->phase2);
1730                 network->phase2 = g_strdup(phase2);
1731         } else
1732                 network->isHS20AP = 0;
1733
1734         if (interface)
1735                 interface->network_path = g_strdup(network->path);
1736
1737         network->group = g_strdup(group);
1738         callback_network_merged(network);
1739 #endif
1740
1741         g_free(group);
1742
1743         g_hash_table_destroy(network->config_table);
1744
1745         g_free(network->path);
1746         g_free(network);
1747 }
1748
1749 static void network_property(const char *key, DBusMessageIter *iter,
1750                                                         void *user_data)
1751 {
1752         GSupplicantNetwork *network = user_data;
1753
1754         if (!network->interface)
1755                 return;
1756
1757         if (!key) {
1758                 merge_network(network);
1759                 return;
1760         }
1761
1762         if (g_strcmp0(key, "Enabled") == 0) {
1763                 dbus_bool_t enabled = FALSE;
1764
1765                 dbus_message_iter_get_basic(iter, &enabled);
1766         } else if (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_STRING) {
1767                 const char *str = NULL;
1768
1769                 dbus_message_iter_get_basic(iter, &str);
1770                 if (str) {
1771                         g_hash_table_replace(network->config_table,
1772                                                 g_strdup(key), g_strdup(str));
1773                 }
1774         } else
1775                 SUPPLICANT_DBG("key %s type %c",
1776                                 key, dbus_message_iter_get_arg_type(iter));
1777 }
1778
1779 static void interface_network_added(DBusMessageIter *iter, void *user_data)
1780 {
1781         GSupplicantInterface *interface = user_data;
1782         GSupplicantNetwork *network;
1783         const char *path = NULL;
1784
1785         SUPPLICANT_DBG("");
1786
1787         dbus_message_iter_get_basic(iter, &path);
1788         if (!path)
1789                 return;
1790
1791         if (g_strcmp0(path, "/") == 0)
1792                 return;
1793
1794         network = g_try_new0(GSupplicantNetwork, 1);
1795         if (!network)
1796                 return;
1797
1798         network->interface = interface;
1799         network->path = g_strdup(path);
1800
1801         network->config_table = g_hash_table_new_full(g_str_hash, g_str_equal,
1802                                                         g_free, g_free);
1803
1804         dbus_message_iter_next(iter);
1805         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
1806                 supplicant_dbus_property_foreach(iter, network_property,
1807                                                                 network);
1808                 network_property(NULL, NULL, network);
1809                 return;
1810         }
1811
1812         supplicant_dbus_property_get_all(path,
1813                                 SUPPLICANT_INTERFACE ".Network",
1814                                         network_property, network, NULL);
1815 }
1816
1817 static void interface_network_removed(DBusMessageIter *iter, void *user_data)
1818 {
1819         SUPPLICANT_DBG("");
1820         return;
1821 }
1822
1823 static char *create_name(unsigned char *ssid, int ssid_len)
1824 {
1825         GString *string;
1826         const gchar *remainder, *invalid;
1827         int valid_bytes, remaining_bytes;
1828
1829         if (ssid_len < 1 || ssid[0] == '\0')
1830                 return g_strdup("");
1831
1832         string = NULL;
1833         remainder = (const gchar *)ssid;
1834         remaining_bytes = ssid_len;
1835
1836         while (remaining_bytes != 0) {
1837                 if (g_utf8_validate(remainder, remaining_bytes,
1838                                         &invalid)) {
1839                         break;
1840                 }
1841
1842                 valid_bytes = invalid - remainder;
1843
1844                 if (!string)
1845                         string = g_string_sized_new(remaining_bytes);
1846
1847                 g_string_append_len(string, remainder, valid_bytes);
1848
1849                 /* append U+FFFD REPLACEMENT CHARACTER */
1850                 g_string_append(string, "\357\277\275");
1851
1852                 remaining_bytes -= valid_bytes + 1;
1853                 remainder = invalid + 1;
1854         }
1855
1856         if (!string)
1857                 return g_strndup((const gchar *)ssid, ssid_len + 1);
1858
1859         g_string_append(string, remainder);
1860
1861         return g_string_free(string, FALSE);
1862 }
1863
1864 static char *create_group(struct g_supplicant_bss *bss)
1865 {
1866         GString *str;
1867         unsigned int i;
1868         const char *mode, *security;
1869
1870         str = g_string_sized_new((bss->ssid_len * 2) + 24);
1871         if (!str)
1872                 return NULL;
1873
1874         if (bss->ssid_len > 0 && bss->ssid[0] != '\0') {
1875                 for (i = 0; i < bss->ssid_len; i++)
1876                         g_string_append_printf(str, "%02x", bss->ssid[i]);
1877         } else
1878                 g_string_append_printf(str, "hidden");
1879
1880         mode = mode2string(bss->mode);
1881         if (mode)
1882                 g_string_append_printf(str, "_%s", mode);
1883
1884         security = security2string(bss->security);
1885         if (security)
1886                 g_string_append_printf(str, "_%s", security);
1887
1888         return g_string_free(str, FALSE);
1889 }
1890
1891 static int add_or_replace_bss_to_network(struct g_supplicant_bss *bss)
1892 {
1893         GSupplicantInterface *interface = bss->interface;
1894         GSupplicantNetwork *network;
1895         char *group;
1896
1897         group = create_group(bss);
1898         SUPPLICANT_DBG("New group created: %s", group);
1899
1900         if (!group)
1901                 return -ENOMEM;
1902
1903         network = g_hash_table_lookup(interface->network_table, group);
1904         if (network) {
1905                 g_free(group);
1906                 SUPPLICANT_DBG("Network %s already exist", network->name);
1907
1908                 goto done;
1909         }
1910
1911         network = g_try_new0(GSupplicantNetwork, 1);
1912         if (!network) {
1913                 g_free(group);
1914                 return -ENOMEM;
1915         }
1916
1917         network->interface = interface;
1918         if (!network->path)
1919                 network->path = g_strdup(bss->path);
1920         network->group = group;
1921         network->name = create_name(bss->ssid, bss->ssid_len);
1922         network->mode = bss->mode;
1923         network->security = bss->security;
1924         network->ssid_len = bss->ssid_len;
1925         memcpy(network->ssid, bss->ssid, bss->ssid_len);
1926         network->signal = bss->signal;
1927         network->frequency = bss->frequency;
1928         network->best_bss = bss;
1929
1930 #if defined TIZEN_EXT
1931         network->keymgmt = bss->keymgmt;
1932
1933         if (g_slist_length(bss->vsie_list) > 0) {
1934                 GSList *list = NULL;
1935                 unsigned char *vsie = NULL;
1936                 for (list = bss->vsie_list; list; list = list->next) {
1937                         unsigned char *ie = (unsigned char *)list->data;
1938                         vsie = (unsigned char *)g_try_malloc0(ie[1]+2); // tag number size(1), tag length size(1)
1939
1940                         if (vsie) {
1941                                 memcpy(vsie, ie, ie[1]+2);
1942                                 network->vsie_list = g_slist_append(network->vsie_list, vsie);
1943                         } else
1944                                 SUPPLICANT_DBG("Failed to allocate memory.");
1945                 }
1946         }
1947
1948         network->isHS20AP = bss->hs20;
1949         memcpy(network->country_code, bss->country_code, COUNTRY_CODE_LENGTH);
1950 #endif
1951
1952         SUPPLICANT_DBG("New network %s created", network->name);
1953
1954         network->bss_table = g_hash_table_new_full(g_str_hash, g_str_equal,
1955                                                         NULL, remove_bss);
1956
1957         network->config_table = g_hash_table_new_full(g_str_hash, g_str_equal,
1958                                                         g_free, g_free);
1959
1960         g_hash_table_replace(interface->network_table,
1961                                                 network->group, network);
1962
1963         callback_network_added(network);
1964
1965 done:
1966         /* We update network's WPS properties if only bss provides WPS. */
1967         if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
1968                 network->wps = TRUE;
1969                 network->wps_capabilities |= bss->wps_capabilities;
1970         }
1971
1972         /*
1973          * Do not change best BSS if we are connected. It will be done through
1974          * CurrentBSS property in case of misalignment with wpa_s or roaming.
1975          */
1976         if (network != interface->current_network &&
1977                                 bss->signal > network->signal) {
1978                 network->signal = bss->signal;
1979                 network->best_bss = bss;
1980                 callback_network_changed(network, "Signal");
1981         }
1982
1983         g_hash_table_replace(interface->bss_mapping, bss->path, network);
1984         g_hash_table_replace(network->bss_table, bss->path, bss);
1985
1986         g_hash_table_replace(bss_mapping, bss->path, interface);
1987
1988         return 0;
1989 }
1990
1991 static void bss_rates(DBusMessageIter *iter, void *user_data)
1992 {
1993         struct g_supplicant_bss *bss = user_data;
1994         dbus_uint32_t rate = 0;
1995
1996         dbus_message_iter_get_basic(iter, &rate);
1997         if (rate == 0)
1998                 return;
1999
2000         if (rate > bss->maxrate)
2001                 bss->maxrate = rate;
2002 }
2003
2004 static void bss_keymgmt(DBusMessageIter *iter, void *user_data)
2005 {
2006         unsigned int *keymgmt = user_data;
2007         const char *str = NULL;
2008         int i;
2009
2010         dbus_message_iter_get_basic(iter, &str);
2011         if (!str)
2012                 return;
2013
2014         for (i = 0; keymgmt_map[i].str; i++)
2015                 if (strcmp(str, keymgmt_map[i].str) == 0) {
2016                         SUPPLICANT_DBG("Keymgmt: %s", str);
2017                         *keymgmt |= keymgmt_map[i].val;
2018                         break;
2019                 }
2020 }
2021
2022 static void bss_group(DBusMessageIter *iter, void *user_data)
2023 {
2024         unsigned int *group = user_data;
2025         const char *str = NULL;
2026         int i;
2027
2028         dbus_message_iter_get_basic(iter, &str);
2029         if (!str)
2030                 return;
2031
2032         for (i = 0; group_map[i].str; i++)
2033                 if (strcmp(str, group_map[i].str) == 0) {
2034                         SUPPLICANT_DBG("Group: %s", str);
2035                         *group |= group_map[i].val;
2036                         break;
2037                 }
2038 }
2039
2040 static void bss_pairwise(DBusMessageIter *iter, void *user_data)
2041 {
2042         unsigned int *pairwise = user_data;
2043         const char *str = NULL;
2044         int i;
2045
2046         dbus_message_iter_get_basic(iter, &str);
2047         if (!str)
2048                 return;
2049
2050         for (i = 0; pairwise_map[i].str; i++)
2051                 if (strcmp(str, pairwise_map[i].str) == 0) {
2052                         SUPPLICANT_DBG("Pairwise: %s", str);
2053                         *pairwise |= pairwise_map[i].val;
2054                         break;
2055                 }
2056 }
2057
2058 static void bss_wpa(const char *key, DBusMessageIter *iter,
2059                         void *user_data)
2060 {
2061         struct g_supplicant_bss *bss = user_data;
2062         unsigned int value = 0;
2063
2064         SUPPLICANT_DBG("Key: %s", key);
2065
2066         if (g_strcmp0(key, "KeyMgmt") == 0) {
2067                 supplicant_dbus_array_foreach(iter, bss_keymgmt, &value);
2068
2069                 if (bss->rsn_selected)
2070                         bss->rsn_keymgmt = value;
2071                 else
2072                         bss->wpa_keymgmt = value;
2073         } else if (g_strcmp0(key, "Group") == 0) {
2074                 supplicant_dbus_array_foreach(iter, bss_group, &value);
2075
2076                 if (bss->rsn_selected)
2077                         bss->rsn_group = value;
2078                 else
2079                         bss->wpa_group = value;
2080         } else if (g_strcmp0(key, "Pairwise") == 0) {
2081                 supplicant_dbus_array_foreach(iter, bss_pairwise, &value);
2082
2083                 if (bss->rsn_selected)
2084                         bss->rsn_pairwise = value;
2085                 else
2086                         bss->wpa_pairwise = value;
2087         }
2088 }
2089
2090 static unsigned int get_tlv(unsigned char *ie, unsigned int ie_size,
2091                                                         unsigned int type)
2092 {
2093         unsigned int len = 0;
2094
2095         while (len + 4 < ie_size) {
2096                 unsigned int hi = ie[len];
2097                 unsigned int lo = ie[len + 1];
2098                 unsigned int tmp_type = (hi << 8) + lo;
2099                 unsigned int v_len = 0;
2100
2101                 /* hi and lo are used to recreate an unsigned int
2102                  * based on 2 8bits length unsigned int. */
2103
2104                 hi = ie[len + 2];
2105                 lo = ie[len + 3];
2106                 v_len = (hi << 8) + lo;
2107
2108                 if (tmp_type == type) {
2109                         unsigned int ret_value = 0;
2110                         unsigned char *value = (unsigned char *)&ret_value;
2111
2112                         SUPPLICANT_DBG("IE: match type 0x%x", type);
2113
2114                         /* Verifying length relevance */
2115                         if (v_len > sizeof(unsigned int) ||
2116                                 len + 4 + v_len > ie_size)
2117                                 break;
2118
2119                         memcpy(value, ie + len + 4, v_len);
2120
2121                         SUPPLICANT_DBG("returning 0x%x", ret_value);
2122                         return ret_value;
2123                 }
2124
2125                 len += v_len + 4;
2126         }
2127
2128         SUPPLICANT_DBG("returning 0");
2129         return 0;
2130 }
2131
2132 static void bss_process_ies(DBusMessageIter *iter, void *user_data)
2133 {
2134         struct g_supplicant_bss *bss = user_data;
2135         const unsigned char WPS_OUI[] = { 0x00, 0x50, 0xf2, 0x04 };
2136         unsigned char *ie, *ie_end;
2137         DBusMessageIter array;
2138         unsigned int value;
2139         int ie_len;
2140
2141 #define WMM_WPA1_WPS_INFO 221
2142 #define WPS_INFO_MIN_LEN  6
2143 #define WPS_VERSION_TLV   0x104A
2144 #define WPS_STATE_TLV     0x1044
2145 #define WPS_METHODS_TLV   0x1012
2146 #define WPS_REGISTRAR_TLV 0x1041
2147 #define WPS_VERSION       0x10
2148 #define WPS_PBC           0x04
2149 #define WPS_PIN           0x00
2150 #define WPS_CONFIGURED    0x02
2151 #if defined TIZEN_EXT
2152 #define VENDOR_SPECIFIC_INFO 0xDD
2153 #define WLAN_EID_COUNTRY 7
2154 #endif
2155
2156         dbus_message_iter_recurse(iter, &array);
2157         dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
2158
2159         if (!ie || ie_len < 2)
2160                 return;
2161
2162         bss->wps_capabilities = 0;
2163         bss->keymgmt = 0;
2164         memset(bss->country_code, 0, COUNTRY_CODE_LENGTH);
2165
2166         for (ie_end = ie + ie_len; ie < ie_end && ie + ie[1] + 1 <= ie_end;
2167                                                         ie += ie[1] + 2) {
2168 #if defined TIZEN_EXT
2169                 unsigned char *vsie;
2170                 int vsie_len = 0;
2171                 if(ie[0] == VENDOR_SPECIFIC_INFO && memcmp(ie+2, WPS_OUI, sizeof(WPS_OUI)) != 0) {
2172                         SUPPLICANT_DBG("IE: match vendor specific data");
2173
2174                         vsie_len = ie[1]+2;     // tag number size(1), tag length size(1)
2175                         vsie = (unsigned char *)g_try_malloc0(vsie_len);
2176
2177                         if (vsie) {
2178                                 memcpy(vsie, ie, vsie_len);
2179                                 bss->vsie_list = g_slist_append(bss->vsie_list, vsie);
2180                         } else
2181                                 SUPPLICANT_DBG("Failed to allocate memory");
2182                         continue;
2183                 }
2184
2185                 if(ie[0] == WLAN_EID_COUNTRY && ie[1] >= 2) {
2186                         /* Add country code only if it is a valid alphabet */
2187                         if (ie[2] >= 65 && ie[2] <= 90 && ie[3] >= 65 && ie[3] <= 90) {
2188                                 memcpy(bss->country_code, ie+2, COUNTRY_CODE_LENGTH);
2189                                 continue;
2190                         }
2191                 }
2192 #endif
2193                 if (ie[0] != WMM_WPA1_WPS_INFO || ie[1] < WPS_INFO_MIN_LEN ||
2194                         memcmp(ie+2, WPS_OUI, sizeof(WPS_OUI)) != 0)
2195                         continue;
2196
2197                 SUPPLICANT_DBG("IE: match WPS_OUI");
2198
2199                 value = get_tlv(&ie[6], ie[1], WPS_STATE_TLV);
2200                 if (get_tlv(&ie[6], ie[1], WPS_VERSION_TLV) == WPS_VERSION &&
2201                                                                 value != 0) {
2202                         bss->keymgmt |= G_SUPPLICANT_KEYMGMT_WPS;
2203
2204                         if (value == WPS_CONFIGURED)
2205                                 bss->wps_capabilities |=
2206                                         G_SUPPLICANT_WPS_CONFIGURED;
2207                 }
2208
2209                 value = get_tlv(&ie[6], ie[1], WPS_METHODS_TLV);
2210                 if (value != 0) {
2211                         if (GUINT16_FROM_BE(value) == WPS_PBC)
2212                                 bss->wps_capabilities |= G_SUPPLICANT_WPS_PBC;
2213                         if (GUINT16_FROM_BE(value) == WPS_PIN)
2214                                 bss->wps_capabilities |= G_SUPPLICANT_WPS_PIN;
2215                 } else
2216                         bss->wps_capabilities |=
2217                                 G_SUPPLICANT_WPS_PBC | G_SUPPLICANT_WPS_PIN;
2218
2219                 /* If the AP sends this it means it's advertizing
2220                  * as a registrar and the WPS process is launched
2221                  * on its side */
2222                 if (get_tlv(&ie[6], ie[1], WPS_REGISTRAR_TLV) != 0)
2223                         bss->wps_capabilities |= G_SUPPLICANT_WPS_REGISTRAR;
2224
2225                 SUPPLICANT_DBG("WPS Methods 0x%x", bss->wps_capabilities);
2226         }
2227 }
2228
2229 static void bss_compute_security(struct g_supplicant_bss *bss)
2230 {
2231         /*
2232          * Combining RSN and WPA keymgmt
2233          * We combine it since parsing IEs might have set something for WPS. */
2234         bss->keymgmt |= bss->rsn_keymgmt | bss->wpa_keymgmt;
2235
2236         bss->ieee8021x = FALSE;
2237         bss->psk = FALSE;
2238 #if defined TIZEN_EXT
2239         bss->ft_ieee8021x = FALSE;
2240         bss->ft_psk = FALSE;
2241 #endif
2242
2243 #if defined TIZEN_EXT
2244         if (bss->keymgmt &
2245                         (G_SUPPLICANT_KEYMGMT_WPA_EAP |
2246                                         G_SUPPLICANT_KEYMGMT_WPA_EAP_256))
2247                 bss->ieee8021x = TRUE;
2248         else if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_EAP)
2249                 bss->ft_ieee8021x = TRUE;
2250 #else
2251         if (bss->keymgmt &
2252                         (G_SUPPLICANT_KEYMGMT_WPA_EAP |
2253                                 G_SUPPLICANT_KEYMGMT_WPA_FT_EAP |
2254                                 G_SUPPLICANT_KEYMGMT_WPA_EAP_256))
2255                 bss->ieee8021x = TRUE;
2256 #endif
2257
2258 #if defined TIZEN_EXT
2259         if (bss->keymgmt &
2260                         (G_SUPPLICANT_KEYMGMT_WPA_PSK |
2261                                         G_SUPPLICANT_KEYMGMT_WPA_PSK_256))
2262                 bss->psk = TRUE;
2263         else if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_PSK)
2264                 bss->ft_psk = TRUE;
2265 #else
2266         if (bss->keymgmt &
2267                         (G_SUPPLICANT_KEYMGMT_WPA_PSK |
2268                                 G_SUPPLICANT_KEYMGMT_WPA_FT_PSK |
2269                                 G_SUPPLICANT_KEYMGMT_WPA_PSK_256))
2270                 bss->psk = TRUE;
2271 #endif
2272
2273         if (bss->ieee8021x)
2274                 bss->security = G_SUPPLICANT_SECURITY_IEEE8021X;
2275         else if (bss->psk)
2276                 bss->security = G_SUPPLICANT_SECURITY_PSK;
2277 #if defined TIZEN_EXT
2278         else if (bss->ft_psk)
2279                 bss->security = G_SUPPLICANT_SECURITY_FT_PSK;
2280         else if (bss->ft_ieee8021x == TRUE)
2281                 bss->security = G_SUPPLICANT_SECURITY_IEEE8021X;
2282 #endif
2283         else if (bss->privacy)
2284                 bss->security = G_SUPPLICANT_SECURITY_WEP;
2285         else
2286                 bss->security = G_SUPPLICANT_SECURITY_NONE;
2287 }
2288
2289
2290 static void bss_property(const char *key, DBusMessageIter *iter,
2291                                                         void *user_data)
2292 {
2293         struct g_supplicant_bss *bss = user_data;
2294
2295         if (!bss->interface)
2296                 return;
2297
2298         SUPPLICANT_DBG("key %s", key);
2299
2300         if (!key)
2301                 return;
2302
2303         if (g_strcmp0(key, "BSSID") == 0) {
2304                 DBusMessageIter array;
2305                 unsigned char *addr;
2306                 int addr_len;
2307
2308                 dbus_message_iter_recurse(iter, &array);
2309                 dbus_message_iter_get_fixed_array(&array, &addr, &addr_len);
2310
2311                 if (addr_len == 6)
2312                         memcpy(bss->bssid, addr, addr_len);
2313         } else if (g_strcmp0(key, "SSID") == 0) {
2314                 DBusMessageIter array;
2315                 unsigned char *ssid;
2316                 int ssid_len;
2317
2318                 dbus_message_iter_recurse(iter, &array);
2319                 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
2320
2321                 if (ssid_len > 0 && ssid_len < 33) {
2322                         memcpy(bss->ssid, ssid, ssid_len);
2323                         bss->ssid_len = ssid_len;
2324                 } else {
2325                         memset(bss->ssid, 0, sizeof(bss->ssid));
2326                         bss->ssid_len = 0;
2327                 }
2328         } else if (g_strcmp0(key, "Capabilities") == 0) {
2329                 dbus_uint16_t capabilities = 0x0000;
2330
2331                 dbus_message_iter_get_basic(iter, &capabilities);
2332
2333                 if (capabilities & IEEE80211_CAP_ESS)
2334                         bss->mode = G_SUPPLICANT_MODE_INFRA;
2335                 else if (capabilities & IEEE80211_CAP_IBSS)
2336                         bss->mode = G_SUPPLICANT_MODE_IBSS;
2337
2338                 if (capabilities & IEEE80211_CAP_PRIVACY)
2339                         bss->privacy = TRUE;
2340         } else if (g_strcmp0(key, "Mode") == 0) {
2341                 const char *mode = NULL;
2342
2343                 dbus_message_iter_get_basic(iter, &mode);
2344                 bss->mode = string2mode(mode);
2345         } else if (g_strcmp0(key, "Frequency") == 0) {
2346                 dbus_uint16_t frequency = 0;
2347
2348                 dbus_message_iter_get_basic(iter, &frequency);
2349                 bss->frequency = frequency;
2350         } else if (g_strcmp0(key, "Signal") == 0) {
2351                 dbus_int16_t signal = 0;
2352
2353                 dbus_message_iter_get_basic(iter, &signal);
2354
2355                 bss->signal = signal;
2356                 if (!bss->signal)
2357                         bss->signal = BSS_UNKNOWN_STRENGTH;
2358
2359         } else if (g_strcmp0(key, "Level") == 0) {
2360                 dbus_int32_t level = 0;
2361
2362                 dbus_message_iter_get_basic(iter, &level);
2363         } else if (g_strcmp0(key, "Rates") == 0) {
2364                 supplicant_dbus_array_foreach(iter, bss_rates, bss);
2365         } else if (g_strcmp0(key, "MaxRate") == 0) {
2366                 dbus_uint32_t maxrate = 0;
2367
2368                 dbus_message_iter_get_basic(iter, &maxrate);
2369                 if (maxrate != 0)
2370                         bss->maxrate = maxrate;
2371         } else if (g_strcmp0(key, "Privacy") == 0) {
2372                 dbus_bool_t privacy = FALSE;
2373
2374                 dbus_message_iter_get_basic(iter, &privacy);
2375                 bss->privacy = privacy;
2376         } else if (g_strcmp0(key, "RSN") == 0) {
2377                 bss->rsn_selected = TRUE;
2378
2379                 supplicant_dbus_property_foreach(iter, bss_wpa, bss);
2380         } else if (g_strcmp0(key, "WPA") == 0) {
2381                 bss->rsn_selected = FALSE;
2382
2383                 supplicant_dbus_property_foreach(iter, bss_wpa, bss);
2384 #if defined TIZEN_EXT
2385         } else if (g_strcmp0(key, "HS20") == 0) {
2386                 dbus_bool_t hs20 = FALSE;
2387                 dbus_message_iter_get_basic(iter, &hs20);
2388                 bss->hs20 = hs20;
2389 #endif
2390         } else if (g_strcmp0(key, "IEs") == 0)
2391                 bss_process_ies(iter, bss);
2392         else
2393                 SUPPLICANT_DBG("key %s type %c",
2394                                 key, dbus_message_iter_get_arg_type(iter));
2395 }
2396
2397 static struct g_supplicant_bss *interface_bss_added(DBusMessageIter *iter,
2398                                                         void *user_data)
2399 {
2400         GSupplicantInterface *interface = user_data;
2401         GSupplicantNetwork *network;
2402         struct g_supplicant_bss *bss;
2403         const char *path = NULL;
2404
2405         SUPPLICANT_DBG("");
2406
2407         dbus_message_iter_get_basic(iter, &path);
2408         if (!path)
2409                 return NULL;
2410
2411         if (g_strcmp0(path, "/") == 0)
2412                 return NULL;
2413
2414         SUPPLICANT_DBG("%s", path);
2415
2416         network = g_hash_table_lookup(interface->bss_mapping, path);
2417         if (network) {
2418                 bss = g_hash_table_lookup(network->bss_table, path);
2419                 if (bss)
2420                         return NULL;
2421         }
2422
2423         bss = g_try_new0(struct g_supplicant_bss, 1);
2424         if (!bss)
2425                 return NULL;
2426
2427         bss->interface = interface;
2428         bss->path = g_strdup(path);
2429         bss->signal = BSS_UNKNOWN_STRENGTH;
2430
2431         return bss;
2432 }
2433
2434 static void interface_bss_added_with_keys(DBusMessageIter *iter,
2435                                                 void *user_data)
2436 {
2437         struct g_supplicant_bss *bss;
2438
2439         SUPPLICANT_DBG("");
2440
2441         bss = interface_bss_added(iter, user_data);
2442         if (!bss)
2443                 return;
2444
2445         dbus_message_iter_next(iter);
2446
2447         if (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_INVALID)
2448                 return;
2449
2450         supplicant_dbus_property_foreach(iter, bss_property, bss);
2451
2452         bss_compute_security(bss);
2453         if (add_or_replace_bss_to_network(bss) < 0)
2454                 SUPPLICANT_DBG("add_or_replace_bss_to_network failed");
2455 }
2456
2457 static void interface_bss_added_without_keys(DBusMessageIter *iter,
2458                                                 void *user_data)
2459 {
2460         struct g_supplicant_bss *bss;
2461
2462         SUPPLICANT_DBG("");
2463
2464         bss = interface_bss_added(iter, user_data);
2465         if (!bss)
2466                 return;
2467
2468         supplicant_dbus_property_get_all(bss->path,
2469                                         SUPPLICANT_INTERFACE ".BSS",
2470                                         bss_property, bss, NULL);
2471
2472         bss_compute_security(bss);
2473         if (add_or_replace_bss_to_network(bss) < 0)
2474                         SUPPLICANT_DBG("add_or_replace_bss_to_network failed");
2475 }
2476
2477 static void update_signal(gpointer key, gpointer value,
2478                                                 gpointer user_data)
2479 {
2480         struct g_supplicant_bss *bss = value;
2481         GSupplicantNetwork *network = user_data;
2482
2483         if (bss->signal > network->signal) {
2484                 network->signal = bss->signal;
2485                 network->best_bss = bss;
2486         }
2487 }
2488
2489 static void update_network_signal(GSupplicantNetwork *network)
2490 {
2491         if (g_hash_table_size(network->bss_table) <= 1 && network->best_bss)
2492                 return;
2493
2494         g_hash_table_foreach(network->bss_table,
2495                                 update_signal, network);
2496
2497         SUPPLICANT_DBG("New network signal %d", network->signal);
2498 }
2499
2500 static void interface_current_bss(GSupplicantInterface *interface,
2501                                                 DBusMessageIter *iter)
2502 {
2503         GSupplicantNetwork *network;
2504         struct g_supplicant_bss *bss;
2505         const char *path;
2506
2507         dbus_message_iter_get_basic(iter, &path);
2508         if (g_strcmp0(path, "/") == 0) {
2509                 interface->current_network = NULL;
2510                 return;
2511         }
2512
2513         interface_bss_added_without_keys(iter, interface);
2514
2515         network = g_hash_table_lookup(interface->bss_mapping, path);
2516         if (!network)
2517                 return;
2518
2519         bss = g_hash_table_lookup(network->bss_table, path);
2520         if (!bss)
2521                 return;
2522
2523         interface->current_network = network;
2524
2525         if (bss != network->best_bss) {
2526                 /*
2527                  * This is the case where either wpa_s got associated
2528                  * to a BSS different than the one ConnMan considers
2529                  * the best, or we are roaming.
2530                  */
2531                 SUPPLICANT_DBG("Update best BSS for %s", network->name);
2532
2533                 network->best_bss = bss;
2534
2535                 if (network->signal != bss->signal) {
2536                         SUPPLICANT_DBG("New network signal %d dBm",
2537                                                 bss->signal);
2538
2539                         network->signal = bss->signal;
2540                         callback_network_changed(network, "Signal");
2541                 }
2542         }
2543
2544         /*
2545          * wpa_s could notify about CurrentBSS in any state once
2546          * it got associated. It is not sure such notification will
2547          * arrive together with transition to ASSOCIATED state.
2548          * In fact, for networks with security WEP or OPEN, it
2549          * always arrives together with transition to COMPLETED.
2550          */
2551         switch (interface->state) {
2552         case G_SUPPLICANT_STATE_UNKNOWN:
2553         case G_SUPPLICANT_STATE_DISABLED:
2554         case G_SUPPLICANT_STATE_DISCONNECTED:
2555         case G_SUPPLICANT_STATE_INACTIVE:
2556         case G_SUPPLICANT_STATE_SCANNING:
2557         case G_SUPPLICANT_STATE_AUTHENTICATING:
2558         case G_SUPPLICANT_STATE_ASSOCIATING:
2559                 return;
2560         case G_SUPPLICANT_STATE_ASSOCIATED:
2561         case G_SUPPLICANT_STATE_4WAY_HANDSHAKE:
2562         case G_SUPPLICANT_STATE_GROUP_HANDSHAKE:
2563         case G_SUPPLICANT_STATE_COMPLETED:
2564                 callback_network_associated(network);
2565                 break;
2566         }
2567 }
2568
2569 static void interface_bss_removed(DBusMessageIter *iter, void *user_data)
2570 {
2571         GSupplicantInterface *interface = user_data;
2572         GSupplicantNetwork *network;
2573         struct g_supplicant_bss *bss = NULL;
2574         const char *path = NULL;
2575
2576         dbus_message_iter_get_basic(iter, &path);
2577         if (!path)
2578                 return;
2579
2580         network = g_hash_table_lookup(interface->bss_mapping, path);
2581         if (!network)
2582                 return;
2583
2584         bss = g_hash_table_lookup(network->bss_table, path);
2585         if (network->best_bss == bss) {
2586                 network->best_bss = NULL;
2587                 network->signal = BSS_UNKNOWN_STRENGTH;
2588         }
2589
2590         g_hash_table_remove(bss_mapping, path);
2591
2592         g_hash_table_remove(interface->bss_mapping, path);
2593         g_hash_table_remove(network->bss_table, path);
2594
2595         update_network_signal(network);
2596
2597         if (g_hash_table_size(network->bss_table) == 0)
2598                 g_hash_table_remove(interface->network_table, network->group);
2599 }
2600
2601 static void set_config_methods(DBusMessageIter *iter, void *user_data)
2602 {
2603         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, user_data);
2604 }
2605
2606 static void wps_property(const char *key, DBusMessageIter *iter,
2607                                                         void *user_data)
2608 {
2609         GSupplicantInterface *interface = user_data;
2610
2611         if (!interface)
2612                 return;
2613
2614         SUPPLICANT_DBG("key: %s", key);
2615
2616         if (g_strcmp0(key, "ConfigMethods") == 0) {
2617                 const char *config_methods = "push_button", *str = NULL;
2618
2619                 dbus_message_iter_get_basic(iter, &str);
2620                 if (str && strlen(str) > 0) {
2621                         /* It was already set at wpa_s level, don't modify it. */
2622                         SUPPLICANT_DBG("%s", str);
2623                         return;
2624                 }
2625
2626                 supplicant_dbus_property_set(interface->path,
2627                         SUPPLICANT_INTERFACE ".Interface.WPS",
2628                         "ConfigMethods", DBUS_TYPE_STRING_AS_STRING,
2629                         set_config_methods, NULL, &config_methods, NULL);
2630
2631                 SUPPLICANT_DBG("No value. Set %s", config_methods);
2632         }
2633
2634 }
2635
2636 static void interface_property(const char *key, DBusMessageIter *iter,
2637                                                         void *user_data)
2638 {
2639         GSupplicantInterface *interface = user_data;
2640
2641         if (!interface)
2642                 return;
2643
2644         SUPPLICANT_DBG("%s", key);
2645
2646         if (!key) {
2647                 debug_strvalmap("KeyMgmt capability", keymgmt_map,
2648                                                 interface->keymgmt_capa);
2649                 debug_strvalmap("AuthAlg capability", authalg_capa_map,
2650                                                 interface->authalg_capa);
2651                 debug_strvalmap("Protocol capability", proto_capa_map,
2652                                                 interface->proto_capa);
2653                 debug_strvalmap("Pairwise capability", pairwise_map,
2654                                                 interface->pairwise_capa);
2655                 debug_strvalmap("Group capability", group_map,
2656                                                 interface->group_capa);
2657                 debug_strvalmap("Scan capability", scan_capa_map,
2658                                                 interface->scan_capa);
2659                 debug_strvalmap("Mode capability", mode_capa_map,
2660                                                 interface->mode_capa);
2661
2662                 supplicant_dbus_property_get_all(interface->path,
2663                                 SUPPLICANT_INTERFACE ".Interface.WPS",
2664                                 wps_property, interface, interface);
2665
2666                 if (interface->ready)
2667                         callback_interface_added(interface);
2668
2669                 return;
2670         }
2671
2672         if (g_strcmp0(key, "Capabilities") == 0) {
2673                 supplicant_dbus_property_foreach(iter, interface_capability,
2674                                                                 interface);
2675 #if !defined TIZEN_EXT
2676                 if (interface->mode_capa & G_SUPPLICANT_CAPABILITY_MODE_P2P)
2677                         interface->p2p_support = true;
2678 #endif
2679         } else if (g_strcmp0(key, "State") == 0) {
2680                 const char *str = NULL;
2681
2682                 dbus_message_iter_get_basic(iter, &str);
2683                 if (str)
2684                         if (string2state(str) != interface->state) {
2685                                 interface->state = string2state(str);
2686                                 callback_interface_state(interface);
2687                         }
2688
2689                 if (interface->ap_create_in_progress) {
2690                         if (interface->state == G_SUPPLICANT_STATE_DISCONNECTED)
2691                                 callback_ap_create_fail(interface);
2692
2693                         interface->ap_create_in_progress = false;
2694                 }
2695
2696                 if (interface->state == G_SUPPLICANT_STATE_DISABLED)
2697                         interface->ready = FALSE;
2698                 else
2699                         interface->ready = TRUE;
2700
2701                 SUPPLICANT_DBG("state %s (%d)", str, interface->state);
2702         } else if (g_strcmp0(key, "Scanning") == 0) {
2703                 dbus_bool_t scanning = FALSE;
2704
2705                 dbus_message_iter_get_basic(iter, &scanning);
2706                 interface->scanning = scanning;
2707
2708                 if (interface->ready) {
2709                         if (interface->scanning)
2710                                 callback_scan_started(interface);
2711                         else
2712                                 callback_scan_finished(interface);
2713                 }
2714         } else if (g_strcmp0(key, "ApScan") == 0) {
2715                 int apscan = 1;
2716
2717                 dbus_message_iter_get_basic(iter, &apscan);
2718                 interface->apscan = apscan;
2719         } else if (g_strcmp0(key, "Ifname") == 0) {
2720                 const char *str = NULL;
2721
2722                 dbus_message_iter_get_basic(iter, &str);
2723                 if (str) {
2724                         g_free(interface->ifname);
2725                         interface->ifname = g_strdup(str);
2726                 }
2727         } else if (g_strcmp0(key, "Driver") == 0) {
2728                 const char *str = NULL;
2729
2730                 dbus_message_iter_get_basic(iter, &str);
2731                 if (str) {
2732                         g_free(interface->driver);
2733                         interface->driver = g_strdup(str);
2734                 }
2735         } else if (g_strcmp0(key, "BridgeIfname") == 0) {
2736                 const char *str = NULL;
2737
2738                 dbus_message_iter_get_basic(iter, &str);
2739                 if (str) {
2740                         g_free(interface->bridge);
2741                         interface->bridge = g_strdup(str);
2742                 }
2743         } else if (g_strcmp0(key, "ConfigFile") == 0) {
2744                 const char *str = NULL;
2745
2746                 dbus_message_iter_get_basic(iter, &str);
2747                 if (str && strlen(str) > 0 && interface->ifname) {
2748                         SUPPLICANT_DBG("New {%s, %s}", interface->ifname, str);
2749                         g_hash_table_replace(config_file_table,
2750                                 g_strdup(interface->ifname), g_strdup(str));
2751                 }
2752         } else if (g_strcmp0(key, "CurrentBSS") == 0) {
2753                 interface_current_bss(interface, iter);
2754         } else if (g_strcmp0(key, "CurrentNetwork") == 0) {
2755 #if defined TIZEN_EXT
2756                 if (interface->state != G_SUPPLICANT_STATE_COMPLETED)
2757 #endif
2758                 interface_network_added(iter, interface);
2759         } else if (g_strcmp0(key, "BSSs") == 0) {
2760                 supplicant_dbus_array_foreach(iter,
2761                                         interface_bss_added_without_keys,
2762                                         interface);
2763         } else if (g_strcmp0(key, "Blobs") == 0) {
2764                 /* Nothing */
2765         } else if (g_strcmp0(key, "Networks") == 0) {
2766                 supplicant_dbus_array_foreach(iter, interface_network_added,
2767                                                                 interface);
2768         } else if (g_strcmp0(key, "DisconnectReason") == 0) {
2769                 int reason_code;
2770                 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
2771                         dbus_message_iter_get_basic(iter, &reason_code);
2772                         callback_disconnect_reason_code(interface, reason_code);
2773                 }
2774         } else if (g_strcmp0(key, "AssocStatusCode") == 0) {
2775                 int status_code;
2776                 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
2777                         dbus_message_iter_get_basic(iter, &status_code);
2778                         callback_assoc_status_code(interface, status_code);
2779                 }
2780         } else {
2781                 SUPPLICANT_DBG("key %s type %c",
2782                                 key, dbus_message_iter_get_arg_type(iter));
2783         }
2784 }
2785
2786 static void scan_network_update(DBusMessageIter *iter, void *user_data)
2787 {
2788         GSupplicantInterface *interface = user_data;
2789         GSupplicantNetwork *network;
2790         char *path;
2791
2792         if (!iter)
2793                 return;
2794
2795         dbus_message_iter_get_basic(iter, &path);
2796
2797         if (!path)
2798                 return;
2799
2800         if (g_strcmp0(path, "/") == 0)
2801                 return;
2802
2803         /* Update the network details based on scan BSS data */
2804         network = g_hash_table_lookup(interface->bss_mapping, path);
2805         if (network)
2806                 callback_network_added(network);
2807 }
2808
2809 static void scan_bss_data(const char *key, DBusMessageIter *iter,
2810                                 void *user_data)
2811 {
2812         GSupplicantInterface *interface = user_data;
2813
2814 /*Fixed : stucking in scanning state when scan failed*/
2815 #if defined TIZEN_EXT
2816                 GSupplicantInterfaceCallback scan_callback;
2817 #endif
2818
2819         if (iter)
2820                 supplicant_dbus_array_foreach(iter, scan_network_update,
2821                                                 interface);
2822
2823 #if defined TIZEN_EXT
2824                 scan_callback = interface->scan_callback;
2825 #endif
2826
2827         if (interface->scan_callback)
2828                 interface->scan_callback(0, interface, interface->scan_data);
2829
2830 #if defined TIZEN_EXT
2831                 if (interface->scan_callback == scan_callback) {
2832 #endif
2833         interface->scan_callback = NULL;
2834         interface->scan_data = NULL;
2835 #if defined TIZEN_EXT
2836         }
2837 #endif
2838 }
2839
2840 static GSupplicantInterface *interface_alloc(const char *path)
2841 {
2842         GSupplicantInterface *interface;
2843
2844         interface = g_try_new0(GSupplicantInterface, 1);
2845         if (!interface)
2846                 return NULL;
2847
2848         interface->path = g_strdup(path);
2849
2850         interface->network_table = g_hash_table_new_full(g_str_hash,
2851                                         g_str_equal, NULL, remove_network);
2852         interface->peer_table = g_hash_table_new_full(g_str_hash,
2853                                         g_str_equal, NULL, remove_peer);
2854         interface->group_table = g_hash_table_new_full(g_str_hash,
2855                                         g_str_equal, NULL, remove_group);
2856         interface->bss_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
2857                                                                 NULL, NULL);
2858
2859         g_hash_table_replace(interface_table, interface->path, interface);
2860
2861         return interface;
2862 }
2863
2864 static void interface_added(DBusMessageIter *iter, void *user_data)
2865 {
2866         GSupplicantInterface *interface;
2867         const char *path = NULL;
2868         bool properties_appended = GPOINTER_TO_UINT(user_data);
2869
2870         SUPPLICANT_DBG("");
2871
2872         dbus_message_iter_get_basic(iter, &path);
2873         if (!path)
2874                 return;
2875
2876         if (g_strcmp0(path, "/") == 0)
2877                 return;
2878
2879         interface = g_hash_table_lookup(interface_table, path);
2880         if (interface)
2881                 return;
2882
2883         interface = interface_alloc(path);
2884         if (!interface)
2885                 return;
2886
2887         if (!properties_appended) {
2888                 supplicant_dbus_property_get_all(path,
2889                                                 SUPPLICANT_INTERFACE ".Interface",
2890                                                 interface_property, interface,
2891                                                 interface);
2892                 return;
2893         }
2894
2895         dbus_message_iter_next(iter);
2896         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
2897                 supplicant_dbus_property_foreach(iter, interface_property,
2898                                                                 interface);
2899                 interface_property(NULL, NULL, interface);
2900         }
2901 }
2902
2903 static void interface_removed(DBusMessageIter *iter, void *user_data)
2904 {
2905         const char *path = NULL;
2906         GSupplicantInterface *interface = user_data;
2907
2908         dbus_message_iter_get_basic(iter, &path);
2909         if (!path)
2910                 return;
2911
2912         interface = g_hash_table_lookup(interface_table, path);
2913         g_supplicant_interface_cancel(interface);
2914
2915         g_hash_table_remove(interface_table, path);
2916 }
2917
2918 static void eap_method(DBusMessageIter *iter, void *user_data)
2919 {
2920         const char *str = NULL;
2921         int i;
2922
2923         dbus_message_iter_get_basic(iter, &str);
2924         if (!str)
2925                 return;
2926
2927         for (i = 0; eap_method_map[i].str; i++)
2928                 if (strcmp(str, eap_method_map[i].str) == 0) {
2929                         eap_methods |= eap_method_map[i].val;
2930                         break;
2931                 }
2932 }
2933
2934 static void service_property(const char *key, DBusMessageIter *iter,
2935                                                         void *user_data)
2936 {
2937         if (!key) {
2938                 callback_system_ready();
2939                 return;
2940         }
2941
2942         if (g_strcmp0(key, "DebugLevel") == 0) {
2943                 const char *str = NULL;
2944                 int i;
2945
2946                 dbus_message_iter_get_basic(iter, &str);
2947                 for (i = 0; debug_strings[i]; i++)
2948                         if (g_strcmp0(debug_strings[i], str) == 0) {
2949                                 debug_level = i;
2950                                 break;
2951                         }
2952                 SUPPLICANT_DBG("Debug level %d", debug_level);
2953         } else if (g_strcmp0(key, "DebugTimestamp") == 0) {
2954                 dbus_message_iter_get_basic(iter, &debug_timestamp);
2955                 SUPPLICANT_DBG("Debug timestamp %u", debug_timestamp);
2956         } else if (g_strcmp0(key, "DebugShowKeys") == 0) {
2957                 dbus_message_iter_get_basic(iter, &debug_showkeys);
2958                 SUPPLICANT_DBG("Debug show keys %u", debug_showkeys);
2959         } else if (g_strcmp0(key, "Interfaces") == 0) {
2960                 supplicant_dbus_array_foreach(iter, interface_added, NULL);
2961         } else if (g_strcmp0(key, "EapMethods") == 0) {
2962                 supplicant_dbus_array_foreach(iter, eap_method, NULL);
2963                 debug_strvalmap("EAP method", eap_method_map, eap_methods);
2964         } else if (g_strcmp0(key, "Country") == 0) {
2965                 const char *country = NULL;
2966
2967                 dbus_message_iter_get_basic(iter, &country);
2968                 SUPPLICANT_DBG("Country %s", country);
2969         } else
2970                 SUPPLICANT_DBG("key %s type %c",
2971                                 key, dbus_message_iter_get_arg_type(iter));
2972 }
2973
2974 static void signal_name_owner_changed(const char *path, DBusMessageIter *iter)
2975 {
2976         const char *name = NULL, *old = NULL, *new = NULL;
2977
2978         SUPPLICANT_DBG("");
2979
2980         if (g_strcmp0(path, DBUS_PATH_DBUS) != 0)
2981                 return;
2982
2983         dbus_message_iter_get_basic(iter, &name);
2984         if (!name)
2985                 return;
2986
2987         if (g_strcmp0(name, SUPPLICANT_SERVICE) != 0)
2988                 return;
2989
2990         dbus_message_iter_next(iter);
2991         dbus_message_iter_get_basic(iter, &old);
2992         dbus_message_iter_next(iter);
2993         dbus_message_iter_get_basic(iter, &new);
2994
2995         if (!old || !new)
2996                 return;
2997
2998         if (strlen(old) > 0 && strlen(new) == 0) {
2999                 system_available = FALSE;
3000                 g_hash_table_remove_all(bss_mapping);
3001                 g_hash_table_remove_all(peer_mapping);
3002                 g_hash_table_remove_all(group_mapping);
3003                 g_hash_table_remove_all(config_file_table);
3004                 g_hash_table_remove_all(interface_table);
3005                 callback_system_killed();
3006         }
3007
3008         if (strlen(new) > 0 && strlen(old) == 0) {
3009                 system_available = TRUE;
3010                 supplicant_dbus_property_get_all(SUPPLICANT_PATH,
3011                                                 SUPPLICANT_INTERFACE,
3012                                                 service_property, NULL, NULL);
3013         }
3014 }
3015
3016 static void signal_properties_changed(const char *path, DBusMessageIter *iter)
3017 {
3018         SUPPLICANT_DBG("");
3019
3020         if (g_strcmp0(path, SUPPLICANT_PATH) != 0)
3021                 return;
3022
3023         supplicant_dbus_property_foreach(iter, service_property, NULL);
3024 }
3025
3026 static void signal_interface_added(const char *path, DBusMessageIter *iter)
3027 {
3028         SUPPLICANT_DBG("path %s %s", path, SUPPLICANT_PATH);
3029
3030         if (g_strcmp0(path, SUPPLICANT_PATH) == 0)
3031                 interface_added(iter, GUINT_TO_POINTER(true));
3032 }
3033
3034 static void signal_interface_removed(const char *path, DBusMessageIter *iter)
3035 {
3036         SUPPLICANT_DBG("");
3037
3038         if (g_strcmp0(path, SUPPLICANT_PATH) == 0)
3039                 interface_removed(iter, NULL);
3040 }
3041
3042 static void signal_interface_changed(const char *path, DBusMessageIter *iter)
3043 {
3044         GSupplicantInterface *interface;
3045
3046         SUPPLICANT_DBG("");
3047
3048         interface = g_hash_table_lookup(interface_table, path);
3049         if (!interface)
3050                 return;
3051
3052         supplicant_dbus_property_foreach(iter, interface_property, interface);
3053 }
3054
3055 static void signal_scan_done(const char *path, DBusMessageIter *iter)
3056 {
3057         GSupplicantInterface *interface;
3058         dbus_bool_t success = FALSE;
3059
3060         SUPPLICANT_DBG("");
3061
3062         interface = g_hash_table_lookup(interface_table, path);
3063         if (!interface)
3064                 return;
3065
3066         dbus_message_iter_get_basic(iter, &success);
3067
3068         if (interface->scanning) {
3069                 callback_scan_finished(interface);
3070                 interface->scanning = FALSE;
3071         }
3072
3073         /*
3074          * If scan is unsuccessful return -EIO else get the scanned BSSs
3075          * and update the network details accordingly
3076          */
3077         if (!success) {
3078                 if (interface->scan_callback)
3079                         interface->scan_callback(-EIO, interface,
3080                                                 interface->scan_data);
3081
3082                 interface->scan_callback = NULL;
3083                 interface->scan_data = NULL;
3084
3085                 return;
3086         }
3087
3088         supplicant_dbus_property_get(path, SUPPLICANT_INTERFACE ".Interface",
3089                                 "BSSs", scan_bss_data, interface, interface);
3090 }
3091
3092 static void signal_bss_added(const char *path, DBusMessageIter *iter)
3093 {
3094         GSupplicantInterface *interface;
3095
3096         SUPPLICANT_DBG("");
3097
3098         interface = g_hash_table_lookup(interface_table, path);
3099         if (!interface)
3100                 return;
3101
3102         interface_bss_added_with_keys(iter, interface);
3103 }
3104
3105 static void signal_bss_removed(const char *path, DBusMessageIter *iter)
3106 {
3107         GSupplicantInterface *interface;
3108
3109         SUPPLICANT_DBG("");
3110
3111         interface = g_hash_table_lookup(interface_table, path);
3112         if (!interface)
3113                 return;
3114
3115         interface_bss_removed(iter, interface);
3116 }
3117
3118 static void signal_network_added(const char *path, DBusMessageIter *iter)
3119 {
3120         GSupplicantInterface *interface;
3121
3122         SUPPLICANT_DBG("");
3123
3124         interface = g_hash_table_lookup(interface_table, path);
3125         if (!interface)
3126                 return;
3127
3128         interface_network_added(iter, interface);
3129 }
3130
3131 static void signal_network_removed(const char *path, DBusMessageIter *iter)
3132 {
3133         GSupplicantInterface *interface;
3134
3135         SUPPLICANT_DBG("");
3136
3137         interface = g_hash_table_lookup(interface_table, path);
3138         if (!interface)
3139                 return;
3140
3141         interface_network_removed(iter, interface);
3142 }
3143
3144 static void signal_bss_changed(const char *path, DBusMessageIter *iter)
3145 {
3146         GSupplicantInterface *interface;
3147         GSupplicantNetwork *network;
3148         GSupplicantSecurity old_security;
3149         struct g_supplicant_bss *bss;
3150
3151         SUPPLICANT_DBG("");
3152
3153         interface = g_hash_table_lookup(bss_mapping, path);
3154         if (!interface)
3155                 return;
3156
3157         network = g_hash_table_lookup(interface->bss_mapping, path);
3158         if (!network)
3159                 return;
3160
3161         bss = g_hash_table_lookup(network->bss_table, path);
3162         if (!bss)
3163                 return;
3164
3165         supplicant_dbus_property_foreach(iter, bss_property, bss);
3166 #if defined TIZEN_EXT
3167         network->frequency = bss->frequency;
3168 #endif
3169         old_security = network->security;
3170         bss_compute_security(bss);
3171
3172         if (old_security != bss->security) {
3173                 struct g_supplicant_bss *new_bss;
3174
3175                 SUPPLICANT_DBG("New network security for %s", bss->ssid);
3176
3177                 /* Security change policy:
3178                  * - we first copy the current bss into a new one with
3179                  * its own pointer (path)
3180                  * - we remove the current bss related network which will
3181                  * tell the plugin about such removal. This is done due
3182                  * to the fact that a security change means a group change
3183                  * so a complete network change.
3184                  * (current bss becomes invalid as well)
3185                  * - we add the new bss: it adds new network and tell the
3186                  * plugin about it. */
3187
3188                 new_bss = g_try_new0(struct g_supplicant_bss, 1);
3189                 if (!new_bss)
3190                         return;
3191
3192                 memcpy(new_bss, bss, sizeof(struct g_supplicant_bss));
3193                 new_bss->path = g_strdup(bss->path);
3194
3195                 g_hash_table_remove(interface->network_table, network->group);
3196
3197                 if (add_or_replace_bss_to_network(new_bss) < 0) {
3198                         /* Remove entries in hash tables to handle the
3199                          * failure in add_or_replace_bss_to_network
3200                          */
3201                         g_hash_table_remove(bss_mapping, path);
3202                         g_hash_table_remove(interface->bss_mapping, path);
3203                         g_hash_table_remove(network->bss_table, path);
3204                 }
3205
3206                 return;
3207         }
3208
3209 #if defined TIZEN_EXT
3210         if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
3211                 network->wps = TRUE;
3212                 network->wps_capabilities |= bss->wps_capabilities;
3213         } else
3214                 network->wps = FALSE;
3215 #endif
3216
3217         /* Consider only property changes of the connected BSS */
3218         if (network == interface->current_network && bss != network->best_bss)
3219                 return;
3220
3221         if (bss->signal == network->signal)
3222 #ifndef TIZEN_EXT
3223                 return;
3224 #else
3225         {
3226                 callback_network_changed(network, "");
3227                 return;
3228         }
3229 #endif
3230
3231         /*
3232          * If the new signal is lower than the SSID signal, we need
3233          * to check for the new maximum.
3234          */
3235         if (bss->signal < network->signal) {
3236                 if (bss != network->best_bss)
3237 #ifndef TIZEN_EXT
3238                         return;
3239 #else
3240                 {
3241                         callback_network_changed(network, "");
3242                         return;
3243                 }
3244 #endif
3245                 network->signal = bss->signal;
3246                 update_network_signal(network);
3247         } else {
3248                 network->signal = bss->signal;
3249                 network->best_bss = bss;
3250         }
3251
3252         SUPPLICANT_DBG("New network signal for %s %d dBm", network->ssid,
3253                         network->signal);
3254
3255         callback_network_changed(network, "Signal");
3256 }
3257
3258 static void wps_credentials(const char *key, DBusMessageIter *iter,
3259                         void *user_data)
3260 {
3261         GSupplicantInterface *interface = user_data;
3262
3263         if (!key)
3264                 return;
3265
3266         SUPPLICANT_DBG("key %s", key);
3267
3268         if (g_strcmp0(key, "Key") == 0) {
3269                 DBusMessageIter array;
3270                 unsigned char *key_val;
3271                 int key_len;
3272
3273                 dbus_message_iter_recurse(iter, &array);
3274                 dbus_message_iter_get_fixed_array(&array, &key_val, &key_len);
3275
3276                 g_free(interface->wps_cred.key);
3277                 interface->wps_cred.key = g_try_malloc0(
3278                                                 sizeof(char) * key_len + 1);
3279
3280                 if (!interface->wps_cred.key)
3281                         return;
3282
3283                 memcpy(interface->wps_cred.key, key_val,
3284                                                 sizeof(char) * key_len);
3285
3286                 SUPPLICANT_DBG("WPS key present");
3287         } else if (g_strcmp0(key, "SSID") == 0) {
3288                 DBusMessageIter array;
3289                 unsigned char *ssid;
3290                 int ssid_len;
3291
3292                 dbus_message_iter_recurse(iter, &array);
3293                 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
3294
3295                 if (ssid_len > 0 && ssid_len < 33) {
3296                         memcpy(interface->wps_cred.ssid, ssid, ssid_len);
3297                         interface->wps_cred.ssid_len = ssid_len;
3298                 } else {
3299                         memset(interface->wps_cred.ssid, 0, 32);
3300                         interface->wps_cred.ssid_len = 0;
3301                 }
3302         }
3303 }
3304
3305 static void signal_wps_credentials(const char *path, DBusMessageIter *iter)
3306 {
3307         GSupplicantInterface *interface;
3308
3309         SUPPLICANT_DBG("");
3310
3311         interface = g_hash_table_lookup(interface_table, path);
3312         if (!interface)
3313                 return;
3314
3315         supplicant_dbus_property_foreach(iter, wps_credentials, interface);
3316 }
3317
3318 static void wps_event_args(const char *key, DBusMessageIter *iter,
3319                         void *user_data)
3320 {
3321         GSupplicantInterface *interface = user_data;
3322
3323         if (!key || !interface)
3324                 return;
3325
3326         SUPPLICANT_DBG("Arg Key %s", key);
3327 }
3328
3329 static void signal_wps_event(const char *path, DBusMessageIter *iter)
3330 {
3331         GSupplicantInterface *interface;
3332         const char *name = NULL;
3333
3334         SUPPLICANT_DBG("");
3335
3336         interface = g_hash_table_lookup(interface_table, path);
3337         if (!interface)
3338                 return;
3339
3340         dbus_message_iter_get_basic(iter, &name);
3341
3342         SUPPLICANT_DBG("Name: %s", name);
3343
3344         if (g_strcmp0(name, "success") == 0)
3345                 interface->wps_state = G_SUPPLICANT_WPS_STATE_SUCCESS;
3346         else if (g_strcmp0(name, "failed") == 0)
3347                 interface->wps_state = G_SUPPLICANT_WPS_STATE_FAIL;
3348         else
3349                 interface->wps_state = G_SUPPLICANT_WPS_STATE_UNKNOWN;
3350
3351         if (!dbus_message_iter_has_next(iter))
3352                 return;
3353
3354         dbus_message_iter_next(iter);
3355
3356         supplicant_dbus_property_foreach(iter, wps_event_args, interface);
3357 }
3358
3359 #if defined TIZEN_EXT
3360 static void signal_power_off(const char *path, DBusMessageIter *iter)
3361 {
3362         int poweroff_state = 0;
3363
3364         dbus_message_iter_get_basic(iter, &poweroff_state);
3365
3366         SUPPLICANT_DBG("poweroff_state(%d)", poweroff_state);
3367
3368         /* POWER_OFF_DIRECT 2 && POWER_OFF_RESTART 3 */
3369         if (poweroff_state != 2 && poweroff_state != 3)
3370                 return;
3371
3372         if (callbacks_pointer == NULL)
3373                 return;
3374
3375         if (callbacks_pointer->system_power_off == NULL)
3376                 return;
3377
3378         callbacks_pointer->system_power_off();
3379 }
3380 #endif
3381
3382 static void signal_station_connected(const char *path, DBusMessageIter *iter)
3383 {
3384         GSupplicantInterface *interface;
3385         const char *sta_mac = NULL;
3386
3387         SUPPLICANT_DBG("path %s %s", path, SUPPLICANT_PATH);
3388
3389         if (callbacks_pointer->add_station == NULL)
3390                 return;
3391
3392         if (g_strcmp0(path, "/") == 0)
3393                 return;
3394
3395         interface = g_hash_table_lookup(interface_table, path);
3396         if (interface == NULL)
3397                 return;
3398
3399         dbus_message_iter_get_basic(iter, &sta_mac);
3400         if (sta_mac == NULL)
3401                 return;
3402
3403         SUPPLICANT_DBG("New station %s connected", sta_mac);
3404         callbacks_pointer->add_station(sta_mac);
3405 }
3406
3407 static void signal_station_disconnected(const char *path, DBusMessageIter *iter)
3408 {
3409         GSupplicantInterface *interface;
3410         const char *sta_mac = NULL;
3411
3412         SUPPLICANT_DBG("path %s %s", path, SUPPLICANT_PATH);
3413
3414         if (callbacks_pointer->remove_station == NULL)
3415                 return;
3416
3417         if (g_strcmp0(path, "/") == 0)
3418                 return;
3419
3420         interface = g_hash_table_lookup(interface_table, path);
3421         if (interface == NULL)
3422                 return;
3423
3424         dbus_message_iter_get_basic(iter, &sta_mac);
3425         if (sta_mac == NULL)
3426                 return;
3427
3428         SUPPLICANT_DBG("Station %s disconnected", sta_mac);
3429         callbacks_pointer->remove_station(sta_mac);
3430 }
3431
3432 static void create_peer_identifier(GSupplicantPeer *peer)
3433 {
3434         const unsigned char test[ETH_ALEN] = {};
3435
3436         if (!peer)
3437                 return;
3438
3439         if (!memcmp(peer->device_address, test, ETH_ALEN)) {
3440                 peer->identifier = g_strdup(peer->name);
3441                 return;
3442         }
3443
3444         peer->identifier = g_malloc0(19);
3445         snprintf(peer->identifier, 19, "%02x%02x%02x%02x%02x%02x",
3446                                                 peer->device_address[0],
3447                                                 peer->device_address[1],
3448                                                 peer->device_address[2],
3449                                                 peer->device_address[3],
3450                                                 peer->device_address[4],
3451                                                 peer->device_address[5]);
3452 }
3453
3454 struct peer_property_data {
3455         GSupplicantPeer *peer;
3456         GSList *old_groups;
3457         bool groups_changed;
3458         bool services_changed;
3459 };
3460
3461 static void peer_groups_relation(DBusMessageIter *iter, void *user_data)
3462 {
3463         struct peer_property_data *data = user_data;
3464         GSupplicantPeer *peer = data->peer;
3465         GSupplicantGroup *group;
3466         const char *str = NULL;
3467         GSList *elem;
3468
3469         dbus_message_iter_get_basic(iter, &str);
3470         if (!str)
3471                 return;
3472
3473         group = g_hash_table_lookup(group_mapping, str);
3474         if (!group)
3475                 return;
3476
3477         elem = g_slist_find_custom(data->old_groups, str, (GCompareFunc)g_strcmp0);
3478         if (elem) {
3479                 data->old_groups = g_slist_remove_link(data->old_groups, elem);
3480                 peer->groups = g_slist_concat(elem, peer->groups);
3481         } else {
3482                 peer->groups = g_slist_prepend(peer->groups, g_strdup(str));
3483                 data->groups_changed = true;
3484         }
3485 }
3486
3487 static void peer_property(const char *key, DBusMessageIter *iter,
3488                                                         void *user_data)
3489 {
3490         GSupplicantPeer *pending_peer;
3491         struct peer_property_data *data = user_data;
3492         GSupplicantPeer *peer = data->peer;
3493
3494         SUPPLICANT_DBG("key: %s", key);
3495
3496         if (!peer->interface)
3497                 return;
3498
3499         if (!key) {
3500                 if (peer->name) {
3501                         create_peer_identifier(peer);
3502                         callback_peer_found(peer);
3503                         pending_peer = g_hash_table_lookup(
3504                                         pending_peer_connection, peer->path);
3505
3506                         if (pending_peer && pending_peer == peer) {
3507                                 callback_peer_request(peer);
3508                                 g_hash_table_remove(pending_peer_connection,
3509                                                 peer->path);
3510                         }
3511
3512                         dbus_free(data);
3513                 }
3514
3515                 return;
3516         }
3517
3518         if (g_strcmp0(key, "DeviceAddress") == 0) {
3519                 unsigned char *dev_addr;
3520                 DBusMessageIter array;
3521                 int len;
3522
3523                 dbus_message_iter_recurse(iter, &array);
3524                 dbus_message_iter_get_fixed_array(&array, &dev_addr, &len);
3525
3526                 if (len == ETH_ALEN)
3527                         memcpy(peer->device_address, dev_addr, len);
3528         } else if (g_strcmp0(key, "DeviceName") == 0) {
3529                 const char *str = NULL;
3530
3531                 dbus_message_iter_get_basic(iter, &str);
3532                 if (str)
3533                         peer->name = g_strdup(str);
3534         } else if (g_strcmp0(key, "config_method") == 0) {
3535                 uint16_t wps_config;
3536
3537                 dbus_message_iter_get_basic(iter, &wps_config);
3538
3539                 if (wps_config & G_SUPPLICANT_WPS_CONFIG_PBC)
3540                         peer->wps_capabilities |= G_SUPPLICANT_WPS_PBC;
3541                 if (wps_config & ~G_SUPPLICANT_WPS_CONFIG_PBC)
3542                         peer->wps_capabilities |= G_SUPPLICANT_WPS_PIN;
3543         } else if (g_strcmp0(key, "Groups") == 0) {
3544                 data->old_groups = peer->groups;
3545                 peer->groups = NULL;
3546
3547                 supplicant_dbus_array_foreach(iter,
3548                                                 peer_groups_relation, data);
3549                 if (g_slist_length(data->old_groups) > 0) {
3550                         g_slist_free_full(data->old_groups, g_free);
3551                         data->groups_changed = true;
3552                 }
3553         } else if (g_strcmp0(key, "IEs") == 0) {
3554                 DBusMessageIter array;
3555                 unsigned char *ie;
3556                 int ie_len;
3557
3558                 dbus_message_iter_recurse(iter, &array);
3559                 dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
3560
3561                 if (!ie || ie_len < 2)
3562                         return;
3563
3564                 if (peer->widi_ies) {
3565                         if (memcmp(peer->widi_ies, ie, ie_len) == 0)
3566                                 return;
3567
3568                         g_free(peer->widi_ies);
3569                         peer->widi_ies_length = 0;
3570                 }
3571
3572                 peer->widi_ies = g_malloc0(ie_len * sizeof(unsigned char));
3573
3574                 memcpy(peer->widi_ies, ie, ie_len);
3575                 peer->widi_ies_length = ie_len;
3576                 data->services_changed = true;
3577         }
3578 }
3579
3580 static void signal_peer_found(const char *path, DBusMessageIter *iter)
3581 {
3582         struct peer_property_data *property_data;
3583         GSupplicantInterface *interface;
3584         const char *obj_path = NULL;
3585         GSupplicantPeer *peer;
3586
3587         SUPPLICANT_DBG("");
3588
3589         interface = g_hash_table_lookup(interface_table, path);
3590         if (!interface)
3591                 return;
3592
3593         dbus_message_iter_get_basic(iter, &obj_path);
3594         if (!obj_path || g_strcmp0(obj_path, "/") == 0)
3595                 return;
3596
3597         peer = g_hash_table_lookup(interface->peer_table, obj_path);
3598         if (peer)
3599                 return;
3600
3601         peer = g_try_new0(GSupplicantPeer, 1);
3602         if (!peer)
3603                 return;
3604
3605         peer->interface = interface;
3606         peer->path = g_strdup(obj_path);
3607         g_hash_table_insert(interface->peer_table, peer->path, peer);
3608         g_hash_table_replace(peer_mapping, peer->path, interface);
3609
3610         property_data = dbus_malloc0(sizeof(struct peer_property_data));
3611         property_data->peer = peer;
3612
3613         dbus_message_iter_next(iter);
3614         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
3615                 supplicant_dbus_property_foreach(iter, peer_property,
3616                                                         property_data);
3617                 peer_property(NULL, NULL, property_data);
3618                 return;
3619         }
3620
3621         supplicant_dbus_property_get_all(obj_path,
3622                                         SUPPLICANT_INTERFACE ".Peer",
3623                                         peer_property, property_data, NULL);
3624 }
3625
3626 static void signal_peer_lost(const char *path, DBusMessageIter *iter)
3627 {
3628         GSupplicantInterface *interface;
3629         const char *obj_path = NULL;
3630         GSupplicantPeer *peer;
3631
3632         SUPPLICANT_DBG("");
3633
3634         interface = g_hash_table_lookup(interface_table, path);
3635         if (!interface)
3636                 return;
3637
3638         dbus_message_iter_get_basic(iter, &obj_path);
3639         if (!obj_path || g_strcmp0(obj_path, "/") == 0)
3640                 return;
3641
3642         peer = g_hash_table_lookup(interface->peer_table, obj_path);
3643         if (!peer)
3644                 return;
3645
3646         g_hash_table_remove(interface->peer_table, obj_path);
3647 }
3648
3649 static void signal_peer_changed(const char *path, DBusMessageIter *iter)
3650 {
3651         struct peer_property_data *property_data;
3652         GSupplicantInterface *interface;
3653         GSupplicantPeer *peer;
3654
3655         SUPPLICANT_DBG("");
3656
3657         interface = g_hash_table_lookup(peer_mapping, path);
3658         if (!interface)
3659                 return;
3660
3661         peer = g_hash_table_lookup(interface->peer_table, path);
3662         if (!peer) {
3663                 g_hash_table_remove(peer_mapping, path);
3664                 return;
3665         }
3666
3667         property_data = dbus_malloc0(sizeof(struct peer_property_data));
3668         property_data->peer = peer;
3669
3670         supplicant_dbus_property_foreach(iter, peer_property, property_data);
3671         if (property_data->services_changed)
3672                 callback_peer_changed(peer,
3673                                         G_SUPPLICANT_PEER_SERVICES_CHANGED);
3674
3675         if (property_data->groups_changed)
3676                 callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_CHANGED);
3677
3678         dbus_free(property_data);
3679
3680         if (!g_supplicant_peer_is_in_a_group(peer))
3681                 peer->connection_requested = false;
3682 }
3683
3684 struct group_sig_data {
3685         const char *peer_obj_path;
3686         unsigned char iface_address[ETH_ALEN];
3687         const char *interface_obj_path;
3688         const char *group_obj_path;
3689         int role;
3690 };
3691
3692 static void group_sig_property(const char *key, DBusMessageIter *iter,
3693                                                         void *user_data)
3694 {
3695         struct group_sig_data *data = user_data;
3696
3697         if (!key)
3698                 return;
3699
3700         if (g_strcmp0(key, "peer_interface_addr") == 0) {
3701                 unsigned char *dev_addr;
3702                 DBusMessageIter array;
3703                 int len;
3704
3705                 dbus_message_iter_recurse(iter, &array);
3706                 dbus_message_iter_get_fixed_array(&array, &dev_addr, &len);
3707
3708                 if (len == ETH_ALEN)
3709                         memcpy(data->iface_address, dev_addr, len);
3710         } else if (g_strcmp0(key, "role") == 0) {
3711                 const char *str = NULL;
3712
3713                 dbus_message_iter_get_basic(iter, &str);
3714                 if (g_strcmp0(str, "GO") == 0)
3715                         data->role = G_SUPPLICANT_GROUP_ROLE_GO;
3716                 else
3717                         data->role = G_SUPPLICANT_GROUP_ROLE_CLIENT;
3718         } else if (g_strcmp0(key, "peer_object") == 0)
3719                 dbus_message_iter_get_basic(iter, &data->peer_obj_path);
3720         else if (g_strcmp0(key, "interface_object") == 0)
3721                 dbus_message_iter_get_basic(iter, &data->interface_obj_path);
3722         else if (g_strcmp0(key, "group_object") == 0)
3723                 dbus_message_iter_get_basic(iter, &data->group_obj_path);
3724
3725 }
3726
3727 static void signal_group_success(const char *path, DBusMessageIter *iter)
3728 {
3729         GSupplicantInterface *interface;
3730         struct group_sig_data data = {};
3731         GSupplicantPeer *peer;
3732
3733         SUPPLICANT_DBG("");
3734
3735         interface = g_hash_table_lookup(interface_table, path);
3736         if (!interface)
3737                 return;
3738
3739         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
3740         if (!data.peer_obj_path)
3741                 return;
3742
3743         peer = g_hash_table_lookup(interface->peer_table, data.peer_obj_path);
3744         if (!peer)
3745                 return;
3746
3747         memcpy(peer->iface_address, data.iface_address, ETH_ALEN);
3748         interface->pending_peer_path = peer->path;
3749 }
3750
3751 static void signal_group_failure(const char *path, DBusMessageIter *iter)
3752 {
3753         GSupplicantInterface *interface;
3754         struct group_sig_data data = {};
3755         GSupplicantPeer *peer;
3756
3757         SUPPLICANT_DBG("");
3758
3759         interface = g_hash_table_lookup(interface_table, path);
3760         if (!interface)
3761                 return;
3762
3763         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
3764         if (!data.peer_obj_path)
3765                 return;
3766
3767         peer = g_hash_table_lookup(interface->peer_table, data.peer_obj_path);
3768         if (!peer)
3769                 return;
3770
3771         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_FAILED);
3772         peer->connection_requested = false;
3773 }
3774
3775 static void signal_group_started(const char *path, DBusMessageIter *iter)
3776 {
3777         GSupplicantInterface *interface, *g_interface;
3778         struct group_sig_data data = {};
3779         GSupplicantGroup *group;
3780         GSupplicantPeer *peer;
3781
3782         SUPPLICANT_DBG("");
3783
3784         interface = g_hash_table_lookup(interface_table, path);
3785         if (!interface)
3786                 return;
3787
3788         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
3789         if (!data.interface_obj_path || !data.group_obj_path)
3790                 return;
3791
3792         peer = g_hash_table_lookup(interface->peer_table,
3793                                                 interface->pending_peer_path);
3794         interface->pending_peer_path = NULL;
3795         if (!peer)
3796                 return;
3797
3798         g_interface = g_hash_table_lookup(interface_table,
3799                                                 data.interface_obj_path);
3800         if (!g_interface)
3801                 return;
3802
3803         group = g_hash_table_lookup(interface->group_table,
3804                                                 data.group_obj_path);
3805         if (group)
3806                 return;
3807
3808         group = g_try_new0(GSupplicantGroup, 1);
3809         if (!group)
3810                 return;
3811
3812         group->interface = g_interface;
3813         group->orig_interface = interface;
3814         group->path = g_strdup(data.group_obj_path);
3815         group->role = data.role;
3816
3817         g_hash_table_insert(interface->group_table, group->path, group);
3818         g_hash_table_replace(group_mapping, group->path, group);
3819
3820         peer->current_group_iface = g_interface;
3821         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_STARTED);
3822 }
3823
3824 static void remove_peer_group_interface(GHashTable *group_table,
3825                                 const char* path)
3826 {
3827         GSupplicantGroup *group;
3828         GHashTableIter iter;
3829         gpointer value, key;
3830
3831         if (!group_table)
3832                 return;
3833
3834         group = g_hash_table_lookup(group_table, path);
3835
3836         if (!group || !group->orig_interface)
3837                 return;
3838
3839         g_hash_table_iter_init(&iter, group->orig_interface->peer_table);
3840
3841         while (g_hash_table_iter_next(&iter, &key, &value)) {
3842                 GSupplicantPeer *peer = value;
3843
3844                 if (peer->current_group_iface == group->interface)
3845                         peer->current_group_iface = NULL;
3846         }
3847 }
3848
3849 static void signal_group_finished(const char *path, DBusMessageIter *iter)
3850 {
3851         GSupplicantInterface *interface;
3852         struct group_sig_data data = {};
3853
3854         SUPPLICANT_DBG("");
3855
3856         interface = g_hash_table_lookup(interface_table, path);
3857         if (!interface)
3858                 return;
3859
3860         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
3861         if (!data.interface_obj_path || !data.group_obj_path)
3862                 return;
3863
3864         remove_peer_group_interface(interface->group_table, data.group_obj_path);
3865
3866         g_hash_table_remove(group_mapping, data.group_obj_path);
3867
3868         g_hash_table_remove(interface->group_table, data.group_obj_path);
3869 }
3870
3871 static void signal_group_request(const char *path, DBusMessageIter *iter)
3872 {
3873         GSupplicantInterface *interface;
3874         GSupplicantPeer *peer;
3875         const char *obj_path;
3876
3877         SUPPLICANT_DBG("");
3878
3879         interface = g_hash_table_lookup(interface_table, path);
3880         if (!interface)
3881                 return;
3882
3883         dbus_message_iter_get_basic(iter, &obj_path);
3884         if (!obj_path || !g_strcmp0(obj_path, "/"))
3885                 return;
3886
3887         peer = g_hash_table_lookup(interface->peer_table, obj_path);
3888         if (!peer)
3889                 return;
3890
3891         /*
3892          * Peer has been previously found and property set,
3893          * otherwise, defer connection to when peer property
3894          * is set.
3895          */
3896         if (peer->identifier)
3897                 callback_peer_request(peer);
3898         else
3899                 g_hash_table_replace(pending_peer_connection, peer->path, peer);
3900 }
3901
3902 static void signal_group_peer_joined(const char *path, DBusMessageIter *iter)
3903 {
3904         const char *peer_path = NULL;
3905         GSupplicantInterface *interface;
3906         GSupplicantGroup *group;
3907         GSupplicantPeer *peer;
3908
3909         SUPPLICANT_DBG("");
3910
3911         group = g_hash_table_lookup(group_mapping, path);
3912         if (!group)
3913                 return;
3914
3915         dbus_message_iter_get_basic(iter, &peer_path);
3916         if (!peer_path)
3917                 return;
3918
3919         interface = g_hash_table_lookup(peer_mapping, peer_path);
3920         if (!interface)
3921                 return;
3922
3923         peer = g_hash_table_lookup(interface->peer_table, peer_path);
3924         if (!peer)
3925                 return;
3926
3927         group->members = g_slist_prepend(group->members, g_strdup(peer_path));
3928
3929         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_JOINED);
3930 }
3931
3932 static void signal_group_peer_disconnected(const char *path, DBusMessageIter *iter)
3933 {
3934         const char *peer_path = NULL;
3935         GSupplicantInterface *interface;
3936         GSupplicantGroup *group;
3937         GSupplicantPeer *peer;
3938         GSList *elem;
3939
3940         SUPPLICANT_DBG("");
3941
3942         group = g_hash_table_lookup(group_mapping, path);
3943         if (!group)
3944                 return;
3945
3946         dbus_message_iter_get_basic(iter, &peer_path);
3947         if (!peer_path)
3948                 return;
3949
3950         for (elem = group->members; elem; elem = elem->next) {
3951                 if (!g_strcmp0(elem->data, peer_path))
3952                         break;
3953         }
3954
3955         if (!elem)
3956                 return;
3957
3958         g_free(elem->data);
3959         group->members = g_slist_delete_link(group->members, elem);
3960
3961         interface = g_hash_table_lookup(peer_mapping, peer_path);
3962         if (!interface)
3963                 return;
3964
3965         peer = g_hash_table_lookup(interface->peer_table, peer_path);
3966         if (!peer)
3967                 return;
3968
3969         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_DISCONNECTED);
3970         peer->connection_requested = false;
3971 }
3972
3973 static struct {
3974         const char *interface;
3975         const char *member;
3976         void (*function) (const char *path, DBusMessageIter *iter);
3977 } signal_map[] = {
3978         { DBUS_INTERFACE_DBUS,  "NameOwnerChanged",  signal_name_owner_changed },
3979
3980         { SUPPLICANT_INTERFACE, "PropertiesChanged", signal_properties_changed },
3981         { SUPPLICANT_INTERFACE, "InterfaceAdded",    signal_interface_added    },
3982         { SUPPLICANT_INTERFACE, "InterfaceCreated",  signal_interface_added    },
3983         { SUPPLICANT_INTERFACE, "InterfaceRemoved",  signal_interface_removed  },
3984
3985         { SUPPLICANT_INTERFACE ".Interface", "PropertiesChanged", signal_interface_changed },
3986         { SUPPLICANT_INTERFACE ".Interface", "ScanDone",          signal_scan_done         },
3987         { SUPPLICANT_INTERFACE ".Interface", "BSSAdded",          signal_bss_added         },
3988         { SUPPLICANT_INTERFACE ".Interface", "BSSRemoved",        signal_bss_removed       },
3989         { SUPPLICANT_INTERFACE ".Interface", "NetworkAdded",      signal_network_added     },
3990         { SUPPLICANT_INTERFACE ".Interface", "NetworkRemoved",    signal_network_removed   },
3991
3992         { SUPPLICANT_INTERFACE ".BSS", "PropertiesChanged", signal_bss_changed   },
3993
3994         { SUPPLICANT_INTERFACE ".Interface.WPS", "Credentials", signal_wps_credentials },
3995         { SUPPLICANT_INTERFACE ".Interface.WPS", "Event",       signal_wps_event       },
3996 #if defined TIZEN_EXT
3997         { "org.tizen.system.deviced.PowerOff", "ChangeState", signal_power_off },
3998 #endif
3999
4000         { SUPPLICANT_INTERFACE".Interface", "StaAuthorized", signal_station_connected      },
4001         { SUPPLICANT_INTERFACE".Interface", "StaDeauthorized", signal_station_disconnected },
4002
4003         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeviceFound", signal_peer_found },
4004         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeviceLost",  signal_peer_lost  },
4005
4006         { SUPPLICANT_INTERFACE ".Peer", "PropertiesChanged", signal_peer_changed },
4007
4008         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationSuccess", signal_group_success },
4009         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationFailure", signal_group_failure },
4010         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GroupStarted", signal_group_started },
4011         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GroupFinished", signal_group_finished },
4012         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationRequest", signal_group_request },
4013
4014         { SUPPLICANT_INTERFACE ".Group", "PeerJoined", signal_group_peer_joined },
4015         { SUPPLICANT_INTERFACE ".Group", "PeerDisconnected", signal_group_peer_disconnected },
4016
4017         { }
4018 };
4019
4020 static DBusHandlerResult g_supplicant_filter(DBusConnection *conn,
4021                                         DBusMessage *message, void *data)
4022 {
4023         DBusMessageIter iter;
4024         const char *path;
4025         int i;
4026
4027         path = dbus_message_get_path(message);
4028         if (!path)
4029                 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
4030
4031         if (!dbus_message_iter_init(message, &iter))
4032                 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
4033
4034         for (i = 0; signal_map[i].interface; i++) {
4035                 if (!dbus_message_has_interface(message, signal_map[i].interface))
4036                         continue;
4037
4038                 if (!dbus_message_has_member(message, signal_map[i].member))
4039                         continue;
4040
4041                 signal_map[i].function(path, &iter);
4042                 break;
4043         }
4044
4045         return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
4046 }
4047
4048 void g_supplicant_interface_cancel(GSupplicantInterface *interface)
4049 {
4050         SUPPLICANT_DBG("Cancelling any pending DBus calls");
4051         supplicant_dbus_method_call_cancel_all(interface);
4052         supplicant_dbus_property_call_cancel_all(interface);
4053 }
4054
4055 struct supplicant_regdom {
4056         GSupplicantCountryCallback callback;
4057         const char *alpha2;
4058         const void *user_data;
4059 };
4060
4061 static void country_result(const char *error,
4062                                 DBusMessageIter *iter, void *user_data)
4063 {
4064         struct supplicant_regdom *regdom = user_data;
4065         int result = 0;
4066
4067         SUPPLICANT_DBG("Country setting result");
4068
4069         if (!user_data)
4070                 return;
4071
4072         if (error) {
4073                 SUPPLICANT_DBG("Country setting failure %s", error);
4074                 result = -EINVAL;
4075         }
4076
4077         if (regdom->callback)
4078                 regdom->callback(result, regdom->alpha2,
4079                                         (void *) regdom->user_data);
4080
4081         g_free(regdom);
4082 }
4083
4084 static void country_params(DBusMessageIter *iter, void *user_data)
4085 {
4086         struct supplicant_regdom *regdom = user_data;
4087
4088         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING,
4089                                                         &regdom->alpha2);
4090 }
4091
4092 int g_supplicant_set_country(const char *alpha2,
4093                                 GSupplicantCountryCallback callback,
4094                                         const void *user_data)
4095 {
4096         struct supplicant_regdom *regdom;
4097         int ret;
4098
4099         SUPPLICANT_DBG("Country setting %s", alpha2);
4100
4101         if (!system_available)
4102                 return -EFAULT;
4103
4104         regdom = dbus_malloc0(sizeof(*regdom));
4105         if (!regdom)
4106                 return -ENOMEM;
4107
4108         regdom->callback = callback;
4109         regdom->alpha2 = alpha2;
4110         regdom->user_data = user_data;
4111
4112         ret =  supplicant_dbus_property_set(SUPPLICANT_PATH, SUPPLICANT_INTERFACE,
4113                                         "Country", DBUS_TYPE_STRING_AS_STRING,
4114                                         country_params, country_result,
4115                                         regdom, NULL);
4116         if (ret < 0) {
4117                 dbus_free(regdom);
4118                 SUPPLICANT_DBG("Unable to set Country configuration");
4119         }
4120         return ret;
4121 }
4122
4123 int g_supplicant_interface_set_country(GSupplicantInterface *interface,
4124                                         GSupplicantCountryCallback callback,
4125                                                         const char *alpha2,
4126                                                         void *user_data)
4127 {
4128         struct supplicant_regdom *regdom;
4129         int ret;
4130
4131         regdom = dbus_malloc0(sizeof(*regdom));
4132         if (!regdom)
4133                 return -ENOMEM;
4134
4135         regdom->callback = callback;
4136         regdom->alpha2 = alpha2;
4137         regdom->user_data = user_data;
4138
4139         ret =  supplicant_dbus_property_set(interface->path,
4140                                 SUPPLICANT_INTERFACE ".Interface",
4141                                 "Country", DBUS_TYPE_STRING_AS_STRING,
4142                                 country_params, country_result,
4143                                         regdom, NULL);
4144         if (ret < 0) {
4145                 dbus_free(regdom);
4146                 SUPPLICANT_DBG("Unable to set Country configuration");
4147         }
4148
4149         return ret;
4150 }
4151
4152 bool g_supplicant_interface_has_p2p(GSupplicantInterface *interface)
4153 {
4154         if (!interface)
4155                 return false;
4156
4157         return interface->p2p_support;
4158 }
4159
4160 struct supplicant_p2p_dev_config {
4161         char *device_name;
4162         char *dev_type;
4163 };
4164
4165 static void p2p_device_config_result(const char *error,
4166                                         DBusMessageIter *iter, void *user_data)
4167 {
4168         struct supplicant_p2p_dev_config *config = user_data;
4169
4170         if (error)
4171                 SUPPLICANT_DBG("Unable to set P2P Device configuration: %s",
4172                                                                         error);
4173
4174         g_free(config->device_name);
4175         g_free(config->dev_type);
4176         dbus_free(config);
4177 }
4178
4179 static int dev_type_str2bin(const char *type, unsigned char dev_type[8])
4180 {
4181         int length, pos, end;
4182         char b[3] = {};
4183         char *e = NULL;
4184
4185         end = strlen(type);
4186         for (length = pos = 0; type[pos] != '\0' && length < 8; length++) {
4187                 if (pos+2 > end)
4188                         return 0;
4189
4190                 b[0] = type[pos];
4191                 b[1] = type[pos+1];
4192
4193                 dev_type[length] = strtol(b, &e, 16);
4194                 if (e && *e != '\0')
4195                         return 0;
4196
4197                 pos += 2;
4198         }
4199
4200         return 8;
4201 }
4202
4203 static void p2p_device_config_params(DBusMessageIter *iter, void *user_data)
4204 {
4205         struct supplicant_p2p_dev_config *config = user_data;
4206         DBusMessageIter dict;
4207
4208         supplicant_dbus_dict_open(iter, &dict);
4209
4210         supplicant_dbus_dict_append_basic(&dict, "DeviceName",
4211                                 DBUS_TYPE_STRING, &config->device_name);
4212
4213         if (config->dev_type) {
4214                 unsigned char dev_type[8] = {}, *type;
4215                 int len;
4216
4217                 len = dev_type_str2bin(config->dev_type, dev_type);
4218                 if (len) {
4219                         type = dev_type;
4220                         supplicant_dbus_dict_append_fixed_array(&dict,
4221                                         "PrimaryDeviceType",
4222                                         DBUS_TYPE_BYTE, &type, len);
4223                 }
4224         }
4225
4226         supplicant_dbus_dict_close(iter, &dict);
4227 }
4228
4229 int g_supplicant_interface_set_p2p_device_config(GSupplicantInterface *interface,
4230                                         const char *device_name,
4231                                         const char *primary_dev_type)
4232 {
4233         struct supplicant_p2p_dev_config *config;
4234         int ret;
4235
4236         SUPPLICANT_DBG("P2P Device settings %s/%s",
4237                                         device_name, primary_dev_type);
4238
4239         config = dbus_malloc0(sizeof(*config));
4240         if (!config)
4241                 return -ENOMEM;
4242
4243         config->device_name = g_strdup(device_name);
4244         config->dev_type = g_strdup(primary_dev_type);
4245
4246         ret = supplicant_dbus_property_set(interface->path,
4247                                 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
4248                                 "P2PDeviceConfig",
4249                                 DBUS_TYPE_ARRAY_AS_STRING
4250                                 DBUS_DICT_ENTRY_BEGIN_CHAR_AS_STRING
4251                                 DBUS_TYPE_STRING_AS_STRING
4252                                 DBUS_TYPE_VARIANT_AS_STRING
4253                                 DBUS_DICT_ENTRY_END_CHAR_AS_STRING,
4254                                 p2p_device_config_params,
4255                                 p2p_device_config_result, config, NULL);
4256         if (ret < 0) {
4257                 g_free(config->device_name);
4258                 g_free(config->dev_type);
4259                 dbus_free(config);
4260                 SUPPLICANT_DBG("Unable to set P2P Device configuration");
4261         }
4262
4263         return ret;
4264 }
4265
4266 static gboolean peer_lookup_by_identifier(gpointer key, gpointer value,
4267                                                         gpointer user_data)
4268 {
4269         const GSupplicantPeer *peer = value;
4270         const char *identifier = user_data;
4271
4272         if (!g_strcmp0(identifier, peer->identifier))
4273                 return TRUE;
4274
4275         return FALSE;
4276 }
4277
4278 GSupplicantPeer *g_supplicant_interface_peer_lookup(GSupplicantInterface *interface,
4279                                                         const char *identifier)
4280 {
4281         GSupplicantPeer *peer;
4282
4283         peer = g_hash_table_find(interface->peer_table,
4284                                         peer_lookup_by_identifier,
4285                                         (void *) identifier);
4286         return peer;
4287 }
4288
4289 static void interface_create_data_free(struct interface_create_data *data)
4290 {
4291         g_free(data->ifname);
4292         g_free(data->driver);
4293         g_free(data->bridge);
4294         dbus_free(data);
4295 }
4296
4297 static bool interface_exists(GSupplicantInterface *interface,
4298                                 const char *path)
4299 {
4300         GSupplicantInterface *tmp;
4301
4302         tmp = g_hash_table_lookup(interface_table, path);
4303         if (tmp && tmp == interface)
4304                 return true;
4305
4306         return false;
4307 }
4308
4309 static void interface_create_property(const char *key, DBusMessageIter *iter,
4310                                                         void *user_data)
4311 {
4312         struct interface_create_data *data = user_data;
4313         GSupplicantInterface *interface = data->interface;
4314
4315         if (!key) {
4316                 if (data->callback) {
4317                         data->callback(0, data->interface, data->user_data);
4318 #if !defined TIZEN_EXT
4319                         callback_p2p_support(interface);
4320 #endif
4321                 }
4322
4323                 interface_create_data_free(data);
4324         }
4325
4326         interface_property(key, iter, interface);
4327 }
4328
4329 static void interface_create_result(const char *error,
4330                                 DBusMessageIter *iter, void *user_data)
4331 {
4332         struct interface_create_data *data = user_data;
4333         const char *path = NULL;
4334         int err;
4335
4336         SUPPLICANT_DBG("");
4337
4338         if (error) {
4339                 g_warning("error %s", error);
4340                 err = -EIO;
4341                 goto done;
4342         }
4343
4344         dbus_message_iter_get_basic(iter, &path);
4345         if (!path) {
4346                 err = -EINVAL;
4347                 goto done;
4348         }
4349
4350         if (!system_available) {
4351                 err = -EFAULT;
4352                 goto done;
4353         }
4354
4355         data->interface = g_hash_table_lookup(interface_table, path);
4356         if (!data->interface) {
4357                 data->interface = interface_alloc(path);
4358                 if (!data->interface) {
4359                         err = -ENOMEM;
4360                         goto done;
4361                 }
4362         }
4363
4364         err = supplicant_dbus_property_get_all(path,
4365                                         SUPPLICANT_INTERFACE ".Interface",
4366                                         interface_create_property, data,
4367                                         NULL);
4368         if (err == 0)
4369                 return;
4370
4371 done:
4372         if (data->callback)
4373                 data->callback(err, NULL, data->user_data);
4374
4375         interface_create_data_free(data);
4376 }
4377
4378 static void interface_create_params(DBusMessageIter *iter, void *user_data)
4379 {
4380         struct interface_create_data *data = user_data;
4381         DBusMessageIter dict;
4382         char *config_file = NULL;
4383
4384         SUPPLICANT_DBG("");
4385
4386         supplicant_dbus_dict_open(iter, &dict);
4387
4388         supplicant_dbus_dict_append_basic(&dict, "Ifname",
4389                                         DBUS_TYPE_STRING, &data->ifname);
4390
4391         if (data->driver)
4392                 supplicant_dbus_dict_append_basic(&dict, "Driver",
4393                                         DBUS_TYPE_STRING, &data->driver);
4394
4395         if (data->bridge)
4396                 supplicant_dbus_dict_append_basic(&dict, "BridgeIfname",
4397                                         DBUS_TYPE_STRING, &data->bridge);
4398
4399         config_file = g_hash_table_lookup(config_file_table, data->ifname);
4400         if (config_file) {
4401                 SUPPLICANT_DBG("[%s] ConfigFile %s", data->ifname, config_file);
4402
4403                 supplicant_dbus_dict_append_basic(&dict, "ConfigFile",
4404                                         DBUS_TYPE_STRING, &config_file);
4405         }
4406
4407         supplicant_dbus_dict_close(iter, &dict);
4408 }
4409
4410 static void interface_get_result(const char *error,
4411                                 DBusMessageIter *iter, void *user_data)
4412 {
4413         struct interface_create_data *data = user_data;
4414         GSupplicantInterface *interface;
4415         const char *path = NULL;
4416         int err;
4417
4418         SUPPLICANT_DBG("");
4419
4420         if (error) {
4421                 SUPPLICANT_DBG("Interface not created yet");
4422                 goto create;
4423         }
4424
4425         dbus_message_iter_get_basic(iter, &path);
4426         if (!path) {
4427                 err = -EINVAL;
4428                 goto done;
4429         }
4430
4431         interface = g_hash_table_lookup(interface_table, path);
4432         if (!interface) {
4433                 err = -ENOENT;
4434                 goto done;
4435         }
4436
4437         if (data->callback) {
4438                 data->callback(0, interface, data->user_data);
4439 #if !defined TIZEN_EXT
4440                 callback_p2p_support(interface);
4441 #endif
4442         }
4443
4444         interface_create_data_free(data);
4445
4446         return;
4447
4448 create:
4449         if (!system_available) {
4450                 err = -EFAULT;
4451                 goto done;
4452         }
4453
4454         SUPPLICANT_DBG("Creating interface");
4455
4456         err = supplicant_dbus_method_call(SUPPLICANT_PATH,
4457                                                 SUPPLICANT_INTERFACE,
4458                                                 "CreateInterface",
4459                                                 interface_create_params,
4460                                                 interface_create_result, data,
4461                                                 NULL);
4462         if (err == 0)
4463                 return;
4464
4465 done:
4466         if (data->callback)
4467                 data->callback(err, NULL, data->user_data);
4468
4469         interface_create_data_free(data);
4470 }
4471
4472 static void interface_get_params(DBusMessageIter *iter, void *user_data)
4473 {
4474         struct interface_create_data *data = user_data;
4475
4476         SUPPLICANT_DBG("");
4477
4478         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, &data->ifname);
4479 }
4480
4481 int g_supplicant_interface_create(const char *ifname, const char *driver,
4482                                         const char *bridge,
4483                                         GSupplicantInterfaceCallback callback,
4484                                                         void *user_data)
4485 {
4486         struct interface_create_data *data;
4487         int ret;
4488
4489         SUPPLICANT_DBG("ifname %s", ifname);
4490
4491         if (!ifname)
4492                 return -EINVAL;
4493
4494         if (!system_available)
4495                 return -EFAULT;
4496
4497         data = dbus_malloc0(sizeof(*data));
4498         if (!data)
4499                 return -ENOMEM;
4500
4501         data->ifname = g_strdup(ifname);
4502         data->driver = g_strdup(driver);
4503         data->bridge = g_strdup(bridge);
4504         data->callback = callback;
4505         data->user_data = user_data;
4506
4507         ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
4508                                                 SUPPLICANT_INTERFACE,
4509                                                 "GetInterface",
4510                                                 interface_get_params,
4511                                                 interface_get_result, data,
4512                                                 NULL);
4513         if (ret < 0)
4514                 interface_create_data_free(data);
4515
4516         return ret;
4517 }
4518
4519 static void interface_remove_result(const char *error,
4520                                 DBusMessageIter *iter, void *user_data)
4521 {
4522         struct interface_data *data = user_data;
4523         int err;
4524
4525         if (error) {
4526                 err = -EIO;
4527                 SUPPLICANT_DBG("error: %s", error);
4528                 goto done;
4529         }
4530
4531         if (!system_available) {
4532                 err = -EFAULT;
4533                 goto done;
4534         }
4535
4536         /*
4537          * The gsupplicant interface is already freed by the InterfaceRemoved
4538          * signal callback. Simply invoke the interface_data callback.
4539          */
4540         err = 0;
4541
4542 done:
4543         g_free(data->path);
4544
4545         if (data->callback)
4546                 data->callback(err, NULL, data->user_data);
4547
4548         dbus_free(data);
4549 }
4550
4551
4552 static void interface_remove_params(DBusMessageIter *iter, void *user_data)
4553 {
4554         struct interface_data *data = user_data;
4555
4556         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
4557                                                         &data->interface->path);
4558 }
4559
4560
4561 int g_supplicant_interface_remove(GSupplicantInterface *interface,
4562                         GSupplicantInterfaceCallback callback,
4563                                                         void *user_data)
4564 {
4565         struct interface_data *data;
4566         int ret;
4567
4568         if (!interface)
4569                 return -EINVAL;
4570
4571         if (!system_available)
4572                 return -EFAULT;
4573
4574         g_supplicant_interface_cancel(interface);
4575
4576         data = dbus_malloc0(sizeof(*data));
4577         if (!data)
4578                 return -ENOMEM;
4579
4580         data->interface = interface;
4581         data->path = g_strdup(interface->path);
4582         data->callback = callback;
4583         data->user_data = user_data;
4584
4585         ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
4586                                                 SUPPLICANT_INTERFACE,
4587                                                 "RemoveInterface",
4588                                                 interface_remove_params,
4589                                                 interface_remove_result, data,
4590                                                 NULL);
4591         if (ret < 0) {
4592                 g_free(data->path);
4593                 dbus_free(data);
4594         }
4595         return ret;
4596 }
4597
4598 static void interface_scan_result(const char *error,
4599                                 DBusMessageIter *iter, void *user_data)
4600 {
4601         struct interface_scan_data *data = user_data;
4602         int err = 0;
4603
4604         if (error) {
4605                 SUPPLICANT_DBG("error %s", error);
4606                 err = -EIO;
4607         }
4608
4609         /* A non ready interface cannot send/receive anything */
4610         if (interface_exists(data->interface, data->path)) {
4611                 if (!data->interface->ready)
4612                         err = -ENOLINK;
4613         }
4614
4615         g_free(data->path);
4616
4617         if (err != 0) {
4618                 if (data->callback)
4619                         data->callback(err, data->interface, data->user_data);
4620         } else {
4621                 data->interface->scan_callback = data->callback;
4622                 data->interface->scan_data = data->user_data;
4623         }
4624
4625         if (data->scan_params)
4626                 g_supplicant_free_scan_params(data->scan_params);
4627
4628         dbus_free(data);
4629 }
4630
4631 static void add_scan_frequency(DBusMessageIter *iter, unsigned int freq)
4632 {
4633         DBusMessageIter data;
4634         unsigned int width = 0; /* Not used by wpa_supplicant atm */
4635
4636         dbus_message_iter_open_container(iter, DBUS_TYPE_STRUCT, NULL, &data);
4637
4638         dbus_message_iter_append_basic(&data, DBUS_TYPE_UINT32, &freq);
4639         dbus_message_iter_append_basic(&data, DBUS_TYPE_UINT32, &width);
4640
4641         dbus_message_iter_close_container(iter, &data);
4642 }
4643
4644 static void add_scan_frequencies(DBusMessageIter *iter,
4645                                                 void *user_data)
4646 {
4647         GSupplicantScanParams *scan_data = user_data;
4648         unsigned int freq;
4649         int i;
4650
4651         for (i = 0; i < scan_data->num_freqs; i++) {
4652                 freq = scan_data->freqs[i];
4653                 if (!freq)
4654                         break;
4655
4656                 add_scan_frequency(iter, freq);
4657         }
4658 }
4659
4660 static void append_ssid(DBusMessageIter *iter,
4661                         const void *ssid, unsigned int len)
4662 {
4663         DBusMessageIter array;
4664
4665         dbus_message_iter_open_container(iter, DBUS_TYPE_ARRAY,
4666         DBUS_TYPE_BYTE_AS_STRING, &array);
4667
4668         dbus_message_iter_append_fixed_array(&array, DBUS_TYPE_BYTE,
4669                                                                 &ssid, len);
4670         dbus_message_iter_close_container(iter, &array);
4671 }
4672
4673 static void append_ssids(DBusMessageIter *iter, void *user_data)
4674 {
4675         GSupplicantScanParams *scan_data = user_data;
4676         GSList *list;
4677
4678         for (list = scan_data->ssids; list; list = list->next) {
4679                 struct scan_ssid *scan_ssid = list->data;
4680
4681                 append_ssid(iter, scan_ssid->ssid, scan_ssid->ssid_len);
4682         }
4683 }
4684
4685 static void supplicant_add_scan_frequency(DBusMessageIter *dict,
4686                 supplicant_dbus_array_function function,
4687                                         void *user_data)
4688 {
4689         GSupplicantScanParams *scan_params = user_data;
4690         DBusMessageIter entry, value, array;
4691         const char *key = "Channels";
4692
4693         if (scan_params->freqs && scan_params->freqs[0] != 0) {
4694                 dbus_message_iter_open_container(dict, DBUS_TYPE_DICT_ENTRY,
4695                                                 NULL, &entry);
4696
4697                 dbus_message_iter_append_basic(&entry, DBUS_TYPE_STRING, &key);
4698
4699                 dbus_message_iter_open_container(&entry, DBUS_TYPE_VARIANT,
4700                                         DBUS_TYPE_ARRAY_AS_STRING
4701                                         DBUS_STRUCT_BEGIN_CHAR_AS_STRING
4702                                         DBUS_TYPE_UINT32_AS_STRING
4703                                         DBUS_TYPE_UINT32_AS_STRING
4704                                         DBUS_STRUCT_END_CHAR_AS_STRING,
4705                                         &value);
4706
4707                 dbus_message_iter_open_container(&value, DBUS_TYPE_ARRAY,
4708                                         DBUS_STRUCT_BEGIN_CHAR_AS_STRING
4709                                         DBUS_TYPE_UINT32_AS_STRING
4710                                         DBUS_TYPE_UINT32_AS_STRING
4711                                         DBUS_STRUCT_END_CHAR_AS_STRING,
4712                                         &array);
4713
4714                 if (function)
4715                         function(&array, user_data);
4716
4717                 dbus_message_iter_close_container(&value, &array);
4718                 dbus_message_iter_close_container(&entry, &value);
4719                 dbus_message_iter_close_container(dict, &entry);
4720         }
4721 }
4722
4723 static void interface_scan_params(DBusMessageIter *iter, void *user_data)
4724 {
4725         DBusMessageIter dict;
4726         const char *type = "passive";
4727         struct interface_scan_data *data = user_data;
4728
4729         supplicant_dbus_dict_open(iter, &dict);
4730
4731         if (data && data->scan_params) {
4732                 type = "active";
4733
4734                 supplicant_dbus_dict_append_basic(&dict, "Type",
4735                                         DBUS_TYPE_STRING, &type);
4736
4737 #if defined TIZEN_EXT
4738                 SUPPLICANT_DBG("[specific_scan] num_ssids %d", data->scan_params->num_ssids);
4739                 if (data->scan_params->num_ssids != 0)
4740 #endif
4741                         supplicant_dbus_dict_append_array(&dict, "SSIDs",
4742                                                 DBUS_TYPE_STRING,
4743                                                 append_ssids,
4744                                                 data->scan_params);
4745
4746                 supplicant_add_scan_frequency(&dict, add_scan_frequencies,
4747                                                 data->scan_params);
4748         } else
4749                 supplicant_dbus_dict_append_basic(&dict, "Type",
4750                                         DBUS_TYPE_STRING, &type);
4751
4752         supplicant_dbus_dict_close(iter, &dict);
4753 }
4754
4755 static int interface_ready_to_scan(GSupplicantInterface *interface)
4756 {
4757         if (!interface)
4758                 return -EINVAL;
4759
4760         if (!system_available)
4761                 return -EFAULT;
4762
4763         if (interface->scanning)
4764                 return -EALREADY;
4765
4766         switch (interface->state) {
4767         case G_SUPPLICANT_STATE_AUTHENTICATING:
4768         case G_SUPPLICANT_STATE_ASSOCIATING:
4769         case G_SUPPLICANT_STATE_ASSOCIATED:
4770         case G_SUPPLICANT_STATE_4WAY_HANDSHAKE:
4771         case G_SUPPLICANT_STATE_GROUP_HANDSHAKE:
4772                 return -EBUSY;
4773 #if defined TIZEN_EXT
4774         case G_SUPPLICANT_STATE_DISABLED:
4775                 return -ENOLINK;
4776         case G_SUPPLICANT_STATE_UNKNOWN:
4777 #else
4778         case G_SUPPLICANT_STATE_UNKNOWN:
4779         case G_SUPPLICANT_STATE_DISABLED:
4780 #endif
4781         case G_SUPPLICANT_STATE_DISCONNECTED:
4782         case G_SUPPLICANT_STATE_INACTIVE:
4783         case G_SUPPLICANT_STATE_SCANNING:
4784         case G_SUPPLICANT_STATE_COMPLETED:
4785                 break;
4786         }
4787
4788         return 0;
4789 }
4790
4791 int g_supplicant_interface_scan(GSupplicantInterface *interface,
4792                                 GSupplicantScanParams *scan_data,
4793                                 GSupplicantInterfaceCallback callback,
4794                                                         void *user_data)
4795 {
4796         struct interface_scan_data *data;
4797         int ret;
4798
4799         ret = interface_ready_to_scan(interface);
4800         if (ret)
4801                 return ret;
4802
4803         data = dbus_malloc0(sizeof(*data));
4804         if (!data)
4805                 return -ENOMEM;
4806
4807         data->interface = interface;
4808         data->path = g_strdup(interface->path);
4809 #if defined TIZEN_EXT
4810         data->interface->scan_callback = data->callback = callback;
4811         data->interface->scan_data = data->user_data = user_data;
4812 #else
4813         data->callback = callback;
4814         data->user_data = user_data;
4815 #endif
4816         data->scan_params = scan_data;
4817
4818         interface->scan_callback = callback;
4819         interface->scan_data = user_data;
4820
4821         ret = supplicant_dbus_method_call(interface->path,
4822                         SUPPLICANT_INTERFACE ".Interface", "Scan",
4823                         interface_scan_params, interface_scan_result, data,
4824                         interface);
4825
4826         if (ret < 0) {
4827                 g_free(data->path);
4828                 dbus_free(data);
4829         }
4830
4831         return ret;
4832 }
4833
4834 static int parse_supplicant_error(DBusMessageIter *iter)
4835 {
4836         int err = -ECONNABORTED;
4837         char *key;
4838
4839         if (!iter)
4840                 return err;
4841
4842         /* If the given passphrase is malformed wpa_s returns
4843          * "invalid message format" but this error should be interpreted as
4844          * invalid-key.
4845          */
4846         while (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_STRING) {
4847                 dbus_message_iter_get_basic(iter, &key);
4848                 if (strncmp(key, "psk", 3) == 0 ||
4849                                 strncmp(key, "wep_key", 7) == 0 ||
4850                                 strcmp(key, "invalid message format") == 0) {
4851                         err = -ENOKEY;
4852                         break;
4853                 }
4854                 dbus_message_iter_next(iter);
4855         }
4856
4857         return err;
4858 }
4859
4860 static void interface_select_network_result(const char *error,
4861                                 DBusMessageIter *iter, void *user_data)
4862 {
4863         struct interface_connect_data *data = user_data;
4864         int err;
4865
4866         SUPPLICANT_DBG("");
4867
4868         err = 0;
4869         if (error) {
4870 #if defined TIZEN_EXT
4871                 SUPPLICANT_DBG("SelectNetwork errorFreq %s", error);
4872 #else
4873                 SUPPLICANT_DBG("SelectNetwork error %s", error);
4874 #endif
4875                 err = parse_supplicant_error(iter);
4876         }
4877
4878         g_free(data->path);
4879
4880         if (data->callback)
4881                 data->callback(err, data->interface, data->user_data);
4882
4883         g_free(data->ssid);
4884         dbus_free(data);
4885 }
4886
4887 static void interface_select_network_params(DBusMessageIter *iter,
4888                                                         void *user_data)
4889 {
4890         struct interface_connect_data *data = user_data;
4891         GSupplicantInterface *interface = data->interface;
4892 #if defined TIZEN_EXT
4893         GSupplicantSSID *ssid = data->ssid;
4894 #endif
4895
4896         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
4897                                         &interface->network_path);
4898 #if defined TIZEN_EXT
4899         if (!ssid->bssid_for_connect_len)
4900                 dbus_message_iter_append_basic(iter, DBUS_TYPE_INT32, &ssid->freq);
4901 #endif
4902 }
4903
4904 static void interface_add_network_result(const char *error,
4905                                 DBusMessageIter *iter, void *user_data)
4906 {
4907         struct interface_connect_data *data = user_data;
4908         GSupplicantInterface *interface = data->interface;
4909         const char *path;
4910         int err;
4911
4912         if (error)
4913                 goto error;
4914
4915         dbus_message_iter_get_basic(iter, &path);
4916         if (!path)
4917                 goto error;
4918
4919         SUPPLICANT_DBG("PATH: %s", path);
4920
4921         interface->network_path = g_strdup(path);
4922
4923         store_network_information(interface, data->ssid);
4924
4925 #if defined TIZEN_EXT
4926         SUPPLICANT_DBG(".Interface.SelectNetworkFreq");
4927         GSupplicantSSID *ssid = data->ssid;
4928
4929         if (!ssid->bssid_for_connect_len)
4930                 supplicant_dbus_method_call(data->interface->path,
4931                                 SUPPLICANT_INTERFACE ".Interface", "SelectNetworkFreq",
4932                                 interface_select_network_params,
4933                                 interface_select_network_result, data,
4934                                 interface);
4935         else
4936                 supplicant_dbus_method_call(data->interface->path,
4937                                 SUPPLICANT_INTERFACE ".Interface", "SelectNetwork",
4938                                 interface_select_network_params,
4939                                 interface_select_network_result, data,
4940                                 interface);
4941 #else
4942         supplicant_dbus_method_call(data->interface->path,
4943                         SUPPLICANT_INTERFACE ".Interface", "SelectNetwork",
4944                         interface_select_network_params,
4945                         interface_select_network_result, data,
4946                         interface);
4947 #endif
4948
4949         return;
4950
4951 error:
4952         SUPPLICANT_DBG("AddNetwork error %s", error);
4953
4954         if (interface_exists(data->interface, data->interface->path)) {
4955                 err = parse_supplicant_error(iter);
4956                 if (data->callback)
4957                         data->callback(err, data->interface, data->user_data);
4958
4959                 g_free(interface->network_path);
4960                 interface->network_path = NULL;
4961         }
4962
4963         g_free(data->path);
4964         g_free(data->ssid);
4965         g_free(data);
4966 }
4967
4968 static void add_network_security_none(DBusMessageIter *dict)
4969 {
4970         const char *auth_alg = "OPEN";
4971
4972         supplicant_dbus_dict_append_basic(dict, "auth_alg",
4973                                         DBUS_TYPE_STRING, &auth_alg);
4974 }
4975
4976 static void add_network_security_wep(DBusMessageIter *dict,
4977                                         GSupplicantSSID *ssid)
4978 {
4979         const char *auth_alg = "OPEN SHARED";
4980         dbus_uint32_t key_index = 0;
4981
4982         supplicant_dbus_dict_append_basic(dict, "auth_alg",
4983                                         DBUS_TYPE_STRING, &auth_alg);
4984
4985         if (ssid->passphrase) {
4986                 int size = strlen(ssid->passphrase);
4987                 if (size == 10 || size == 26) {
4988                         unsigned char *key = g_try_malloc(13);
4989                         char tmp[3];
4990                         int i;
4991
4992                         memset(tmp, 0, sizeof(tmp));
4993                         if (!key)
4994                                 size = 0;
4995
4996                         for (i = 0; i < size / 2; i++) {
4997                                 memcpy(tmp, ssid->passphrase + (i * 2), 2);
4998                                 key[i] = (unsigned char) strtol(tmp, NULL, 16);
4999                         }
5000
5001                         supplicant_dbus_dict_append_fixed_array(dict,
5002                                                         "wep_key0",
5003                                                         DBUS_TYPE_BYTE,
5004                                                         &key, size / 2);
5005                         g_free(key);
5006                 } else if (size == 5 || size == 13) {
5007                         unsigned char *key = g_try_malloc(13);
5008                         int i;
5009
5010                         if (!key)
5011                                 size = 0;
5012
5013                         for (i = 0; i < size; i++)
5014                                 key[i] = (unsigned char) ssid->passphrase[i];
5015
5016                         supplicant_dbus_dict_append_fixed_array(dict,
5017                                                                 "wep_key0",
5018                                                                 DBUS_TYPE_BYTE,
5019                                                                 &key, size);
5020                         g_free(key);
5021                 } else
5022                         supplicant_dbus_dict_append_basic(dict,
5023                                                         "wep_key0",
5024                                                         DBUS_TYPE_STRING,
5025                                                         &ssid->passphrase);
5026
5027                 supplicant_dbus_dict_append_basic(dict, "wep_tx_keyidx",
5028                                         DBUS_TYPE_UINT32, &key_index);
5029         }
5030 }
5031
5032 static dbus_bool_t is_psk_raw_key(const char *psk)
5033 {
5034         int i;
5035
5036         /* A raw key is always 64 bytes length... */
5037         if (strlen(psk) != 64)
5038                 return FALSE;
5039
5040         /* ... and its content is in hex representation */
5041         for (i = 0; i < 64; i++)
5042                 if (!isxdigit((unsigned char) psk[i]))
5043                         return FALSE;
5044
5045         return TRUE;
5046 }
5047
5048 static unsigned char hexchar2bin(char c)
5049 {
5050         if ((c >= '0') && (c <= '9'))
5051                 return c - '0';
5052         else if ((c >= 'A') && (c <= 'F'))
5053                 return c - 'A' + 10;
5054         else if ((c >= 'a') && (c <= 'f'))
5055                 return c - 'a' + 10;
5056         else
5057                 return c;
5058 }
5059
5060 static void hexstring2bin(const char *string, unsigned char *data,
5061                                 size_t data_len)
5062 {
5063         size_t i;
5064
5065         for (i = 0; i < data_len; i++)
5066                 data[i] = (hexchar2bin(string[i * 2 + 0]) << 4 |
5067                            hexchar2bin(string[i * 2 + 1]) << 0);
5068 }
5069
5070 static void add_network_security_psk(DBusMessageIter *dict,
5071                                         GSupplicantSSID *ssid)
5072 {
5073         if (ssid->passphrase && strlen(ssid->passphrase) > 0) {
5074                 const char *key = "psk";
5075
5076                 if (is_psk_raw_key(ssid->passphrase)) {
5077                         unsigned char data[32];
5078                         unsigned char *datap = data;
5079
5080                         /* The above pointer alias is required by D-Bus because
5081                          * with D-Bus and GCC, non-heap-allocated arrays cannot
5082                          * be passed directly by their base pointer. */
5083
5084                         hexstring2bin(ssid->passphrase, datap, sizeof(data));
5085
5086                         supplicant_dbus_dict_append_fixed_array(dict,
5087                                                         key, DBUS_TYPE_BYTE,
5088                                                         &datap, sizeof(data));
5089                 } else
5090                         supplicant_dbus_dict_append_basic(dict,
5091                                                         key, DBUS_TYPE_STRING,
5092                                                         &ssid->passphrase);
5093         }
5094 }
5095
5096 static void add_network_security_tls(DBusMessageIter *dict,
5097                                         GSupplicantSSID *ssid)
5098 {
5099         /*
5100          * For TLS, we at least need:
5101          *              The client certificate
5102          *              The client private key file
5103          *              The client private key file password
5104          *
5105          * The Authority certificate is optional.
5106          */
5107         if (!ssid->client_cert_path)
5108                 return;
5109
5110         if (!ssid->private_key_path)
5111                 return;
5112
5113 #if !defined TIZEN_EXT
5114         if (!ssid->private_key_passphrase)
5115                 return;
5116 #endif
5117
5118         if (ssid->ca_cert_path)
5119                 supplicant_dbus_dict_append_basic(dict, "ca_cert",
5120                                         DBUS_TYPE_STRING, &ssid->ca_cert_path);
5121
5122         supplicant_dbus_dict_append_basic(dict, "private_key",
5123                                                 DBUS_TYPE_STRING,
5124                                                 &ssid->private_key_path);
5125 #if !defined TIZEN_EXT
5126         supplicant_dbus_dict_append_basic(dict, "private_key_passwd",
5127                                                 DBUS_TYPE_STRING,
5128                                                 &ssid->private_key_passphrase);
5129 #endif
5130         supplicant_dbus_dict_append_basic(dict, "client_cert",
5131                                                 DBUS_TYPE_STRING,
5132                                                 &ssid->client_cert_path);
5133 }
5134
5135 static void add_network_security_peap(DBusMessageIter *dict,
5136                                         GSupplicantSSID *ssid)
5137 {
5138         char *phase2_auth;
5139
5140         /*
5141          * For PEAP/TTLS, we at least need
5142          *              The authority certificate
5143          *              The 2nd phase authentication method
5144          *              The 2nd phase passphrase
5145          *
5146          * The Client certificate is optional although strongly recommended
5147          * When setting it, we need in addition
5148          *              The Client private key file
5149          *              The Client private key file password
5150          */
5151         if (!ssid->passphrase)
5152                 return;
5153
5154         if (!ssid->phase2_auth)
5155                 return;
5156
5157         if (ssid->client_cert_path) {
5158                 if (!ssid->private_key_path)
5159                         return;
5160
5161 #if !defined TIZEN_EXT
5162                 if (!ssid->private_key_passphrase)
5163                         return;
5164 #endif
5165
5166                 supplicant_dbus_dict_append_basic(dict, "client_cert",
5167                                                 DBUS_TYPE_STRING,
5168                                                 &ssid->client_cert_path);
5169
5170                 supplicant_dbus_dict_append_basic(dict, "private_key",
5171                                                 DBUS_TYPE_STRING,
5172                                                 &ssid->private_key_path);
5173
5174 #if !defined TIZEN_EXT
5175                 supplicant_dbus_dict_append_basic(dict, "private_key_passwd",
5176                                                 DBUS_TYPE_STRING,
5177                                                 &ssid->private_key_passphrase);
5178 #endif
5179
5180         }
5181
5182         if (g_str_has_prefix(ssid->phase2_auth, "EAP-")) {
5183                 phase2_auth = g_strdup_printf("autheap=%s",
5184                                         ssid->phase2_auth + strlen("EAP-"));
5185         } else
5186                 phase2_auth = g_strdup_printf("auth=%s", ssid->phase2_auth);
5187
5188         supplicant_dbus_dict_append_basic(dict, "password",
5189                                                 DBUS_TYPE_STRING,
5190                                                 &ssid->passphrase);
5191
5192         if (ssid->ca_cert_path)
5193                 supplicant_dbus_dict_append_basic(dict, "ca_cert",
5194                                                 DBUS_TYPE_STRING,
5195                                                 &ssid->ca_cert_path);
5196
5197         supplicant_dbus_dict_append_basic(dict, "phase2",
5198                                                 DBUS_TYPE_STRING,
5199                                                 &phase2_auth);
5200
5201         g_free(phase2_auth);
5202 }
5203
5204 #if defined TIZEN_EXT
5205 static void add_network_security_aka_sim(DBusMessageIter *dict,
5206                                         GSupplicantSSID *ssid)
5207 {
5208         if (!ssid->passphrase)
5209                 return;
5210
5211         supplicant_dbus_dict_append_basic(dict, "password",
5212                         DBUS_TYPE_STRING,
5213                         &ssid->passphrase);
5214 }
5215
5216 static void add_network_security_fast(DBusMessageIter *dict,
5217                 GSupplicantSSID *ssid)
5218 {
5219         /*
5220          * For FAST, we at least need:
5221          *              id / password
5222          *              phase1 (provisiong information)
5223          *              pac_file
5224          */
5225
5226         /* Allow provisioing both authenticated and unauthenticated */
5227         const char *phase1 = "fast_provisioning=2";
5228         supplicant_dbus_dict_append_basic(dict, "phase1",
5229                         DBUS_TYPE_STRING,
5230                         &phase1);
5231
5232         SUPPLICANT_DBG("pac_file [%s]", ssid->pac_file);
5233         if(ssid->pac_file)
5234                 supplicant_dbus_dict_append_basic(dict, "pac_file",
5235                                 DBUS_TYPE_STRING,
5236                                 &ssid->pac_file);
5237
5238         supplicant_dbus_dict_append_basic(dict, "password",
5239                         DBUS_TYPE_STRING,
5240                         &ssid->passphrase);
5241 }
5242 #endif
5243
5244 static void add_network_security_eap(DBusMessageIter *dict,
5245                                         GSupplicantSSID *ssid)
5246 {
5247         char *eap_value;
5248
5249 #if defined TIZEN_EXT
5250         if (!ssid->eap)
5251 #else
5252         if (!ssid->eap || !ssid->identity)
5253 #endif
5254                 return;
5255
5256         if (g_strcmp0(ssid->eap, "tls") == 0) {
5257                 add_network_security_tls(dict, ssid);
5258         } else if (g_strcmp0(ssid->eap, "peap") == 0 ||
5259                                 g_strcmp0(ssid->eap, "ttls") == 0) {
5260 #if defined TIZEN_EXT
5261                 if (!ssid->identity)
5262                         return;
5263 #endif
5264                 add_network_security_peap(dict, ssid);
5265
5266 #if defined TIZEN_EXT
5267         } else if (g_strcmp0(ssid->eap, "sim") == 0 ||
5268                         g_strcmp0(ssid->eap, "aka") == 0 ||
5269                         g_strcmp0(ssid->eap, "aka'") == 0) {
5270                 add_network_security_aka_sim(dict, ssid);
5271         } else if (g_strcmp0(ssid->eap, "pwd") == 0) {
5272                 if(!ssid->passphrase)
5273                         return;
5274                 supplicant_dbus_dict_append_basic(dict, "password",
5275                                 DBUS_TYPE_STRING,
5276                                 &ssid->passphrase);
5277         } else if (g_strcmp0(ssid->eap, "fast") == 0){
5278                 if (!ssid->identity || !ssid->passphrase)
5279                         return;
5280
5281                 add_network_security_fast(dict, ssid);
5282 #endif
5283         } else
5284                 return;
5285
5286         eap_value = g_ascii_strup(ssid->eap, -1);
5287
5288         supplicant_dbus_dict_append_basic(dict, "eap",
5289                                                 DBUS_TYPE_STRING,
5290                                                 &eap_value);
5291 #if defined TIZEN_EXT
5292         if (ssid->identity != NULL)
5293                 supplicant_dbus_dict_append_basic(dict, "identity",
5294                                                         DBUS_TYPE_STRING,
5295                                                         &ssid->identity);
5296 #else
5297         supplicant_dbus_dict_append_basic(dict, "identity",
5298                                                 DBUS_TYPE_STRING,
5299                                                 &ssid->identity);
5300 #endif
5301         if(ssid->anonymous_identity)
5302                 supplicant_dbus_dict_append_basic(dict, "anonymous_identity",
5303                                                      DBUS_TYPE_STRING,
5304                                                      &ssid->anonymous_identity);
5305
5306         if(ssid->subject_match)
5307                 supplicant_dbus_dict_append_basic(dict, "subject_match",
5308                                                      DBUS_TYPE_STRING,
5309                                                      &ssid->subject_match);
5310
5311         if(ssid->altsubject_match)
5312                 supplicant_dbus_dict_append_basic(dict, "altsubject_match",
5313                                                      DBUS_TYPE_STRING,
5314                                                      &ssid->altsubject_match);
5315
5316         if(ssid->domain_suffix_match)
5317                 supplicant_dbus_dict_append_basic(dict, "domain_suffix_match",
5318                                                      DBUS_TYPE_STRING,
5319                                                      &ssid->domain_suffix_match);
5320
5321         if(ssid->domain_match)
5322                 supplicant_dbus_dict_append_basic(dict, "domain_match",
5323                                                      DBUS_TYPE_STRING,
5324                                                      &ssid->domain_match);
5325
5326         g_free(eap_value);
5327 }
5328
5329 static void add_network_security_ciphers(DBusMessageIter *dict,
5330                                                 GSupplicantSSID *ssid)
5331 {
5332         unsigned int p_cipher, g_cipher, i;
5333         char *pairwise, *group;
5334         char *pair_ciphers[4];
5335         char *group_ciphers[5];
5336
5337         p_cipher = ssid->pairwise_cipher;
5338         g_cipher = ssid->group_cipher;
5339
5340         if (p_cipher == 0 && g_cipher == 0)
5341                 return;
5342
5343         i = 0;
5344
5345         if (p_cipher & G_SUPPLICANT_PAIRWISE_CCMP)
5346                 pair_ciphers[i++] = "CCMP";
5347
5348         if (p_cipher & G_SUPPLICANT_PAIRWISE_TKIP)
5349                 pair_ciphers[i++] = "TKIP";
5350
5351         if (p_cipher & G_SUPPLICANT_PAIRWISE_NONE)
5352                 pair_ciphers[i++] = "NONE";
5353
5354         pair_ciphers[i] = NULL;
5355
5356         i = 0;
5357
5358         if (g_cipher & G_SUPPLICANT_GROUP_CCMP)
5359                 group_ciphers[i++] = "CCMP";
5360
5361         if (g_cipher & G_SUPPLICANT_GROUP_TKIP)
5362                 group_ciphers[i++] = "TKIP";
5363
5364         if (g_cipher & G_SUPPLICANT_GROUP_WEP104)
5365                 group_ciphers[i++] = "WEP104";
5366
5367         if (g_cipher & G_SUPPLICANT_GROUP_WEP40)
5368                 group_ciphers[i++] = "WEP40";
5369
5370         group_ciphers[i] = NULL;
5371
5372         pairwise = g_strjoinv(" ", pair_ciphers);
5373         group = g_strjoinv(" ", group_ciphers);
5374
5375         SUPPLICANT_DBG("cipher %s %s", pairwise, group);
5376
5377         supplicant_dbus_dict_append_basic(dict, "pairwise",
5378                                                 DBUS_TYPE_STRING,
5379                                                 &pairwise);
5380         supplicant_dbus_dict_append_basic(dict, "group",
5381                                                 DBUS_TYPE_STRING,
5382                                                 &group);
5383
5384         g_free(pairwise);
5385         g_free(group);
5386 }
5387
5388 static void add_network_security_proto(DBusMessageIter *dict,
5389                                                 GSupplicantSSID *ssid)
5390 {
5391         unsigned int protocol, i;
5392         char *proto;
5393         char *protos[3];
5394
5395         protocol = ssid->protocol;
5396
5397         if (protocol == 0)
5398                 return;
5399
5400         i = 0;
5401
5402         if (protocol & G_SUPPLICANT_PROTO_RSN)
5403                 protos[i++] = "RSN";
5404
5405         if (protocol & G_SUPPLICANT_PROTO_WPA)
5406                 protos[i++] = "WPA";
5407
5408         protos[i] = NULL;
5409
5410         proto = g_strjoinv(" ", protos);
5411
5412         SUPPLICANT_DBG("proto %s", proto);
5413
5414         supplicant_dbus_dict_append_basic(dict, "proto",
5415                                                 DBUS_TYPE_STRING,
5416                                                 &proto);
5417
5418         g_free(proto);
5419 }
5420
5421 static void add_network_security(DBusMessageIter *dict, GSupplicantSSID *ssid)
5422 {
5423         char *key_mgmt;
5424
5425         switch (ssid->security) {
5426         case G_SUPPLICANT_SECURITY_NONE:
5427                 key_mgmt = "NONE";
5428                 add_network_security_none(dict);
5429                 add_network_security_ciphers(dict, ssid);
5430                 break;
5431         case G_SUPPLICANT_SECURITY_UNKNOWN:
5432         case G_SUPPLICANT_SECURITY_WEP:
5433                 key_mgmt = "NONE";
5434                 add_network_security_wep(dict, ssid);
5435                 add_network_security_ciphers(dict, ssid);
5436                 break;
5437         case G_SUPPLICANT_SECURITY_PSK:
5438                 key_mgmt = "WPA-PSK";
5439                 add_network_security_psk(dict, ssid);
5440                 add_network_security_ciphers(dict, ssid);
5441                 add_network_security_proto(dict, ssid);
5442                 break;
5443         case G_SUPPLICANT_SECURITY_IEEE8021X:
5444                 key_mgmt = "WPA-EAP";
5445                 add_network_security_eap(dict, ssid);
5446                 add_network_security_ciphers(dict, ssid);
5447                 add_network_security_proto(dict, ssid);
5448                 break;
5449 #if defined TIZEN_EXT
5450         case G_SUPPLICANT_SECURITY_FT_PSK:
5451                 key_mgmt = "FT-PSK";
5452                 add_network_security_psk(dict, ssid);
5453                 add_network_security_ciphers(dict, ssid);
5454                 add_network_security_proto(dict, ssid);
5455                 break;
5456         case G_SUPPLICANT_SECURITY_FT_IEEE8021X:
5457                 key_mgmt = "FT-EAP";
5458                 add_network_security_eap(dict, ssid);
5459                 add_network_security_ciphers(dict, ssid);
5460                 add_network_security_proto(dict, ssid);
5461                 break;
5462 #endif
5463         }
5464
5465         supplicant_dbus_dict_append_basic(dict, "key_mgmt",
5466                                 DBUS_TYPE_STRING, &key_mgmt);
5467 }
5468
5469 static void add_network_mode(DBusMessageIter *dict, GSupplicantSSID *ssid)
5470 {
5471         dbus_uint32_t mode;
5472
5473         switch (ssid->mode) {
5474         case G_SUPPLICANT_MODE_UNKNOWN:
5475         case G_SUPPLICANT_MODE_INFRA:
5476                 mode = 0;
5477                 break;
5478         case G_SUPPLICANT_MODE_IBSS:
5479                 mode = 1;
5480                 break;
5481         case G_SUPPLICANT_MODE_MASTER:
5482                 mode = 2;
5483                 break;
5484         }
5485
5486         supplicant_dbus_dict_append_basic(dict, "mode",
5487                                 DBUS_TYPE_UINT32, &mode);
5488 }
5489
5490 static void interface_add_network_params(DBusMessageIter *iter, void *user_data)
5491 {
5492         DBusMessageIter dict;
5493         struct interface_connect_data *data = user_data;
5494         GSupplicantSSID *ssid = data->ssid;
5495
5496         supplicant_dbus_dict_open(iter, &dict);
5497
5498         if (ssid->scan_ssid)
5499                 supplicant_dbus_dict_append_basic(&dict, "scan_ssid",
5500                                          DBUS_TYPE_UINT32, &ssid->scan_ssid);
5501
5502         if (ssid->freq)
5503                 supplicant_dbus_dict_append_basic(&dict, "frequency",
5504                                          DBUS_TYPE_UINT32, &ssid->freq);
5505
5506         if (ssid->bgscan)
5507                 supplicant_dbus_dict_append_basic(&dict, "bgscan",
5508                                         DBUS_TYPE_STRING, &ssid->bgscan);
5509
5510         add_network_mode(&dict, ssid);
5511
5512         add_network_security(&dict, ssid);
5513
5514         supplicant_dbus_dict_append_fixed_array(&dict, "ssid",
5515                                         DBUS_TYPE_BYTE, &ssid->ssid,
5516                                                 ssid->ssid_len);
5517
5518         supplicant_dbus_dict_append_basic(&dict, "ignore_broadcast_ssid",
5519                                         DBUS_TYPE_INT32,
5520                                         &ssid->ignore_broadcast_ssid);
5521
5522 #if defined TIZEN_EXT
5523         if (ssid->bssid) {
5524                 char *bssid = NULL;
5525                 bssid = g_try_malloc0(18);
5526                 if (bssid == NULL) {
5527                         SUPPLICANT_DBG("memory allocation error");
5528                         supplicant_dbus_dict_close(iter, &dict);
5529                         return;
5530                 }
5531
5532                 if (ssid->bssid_for_connect_len)
5533                         snprintf(bssid, 18, "%02x:%02x:%02x:%02x:%02x:%02x",
5534                                         ssid->bssid_for_connect[0], ssid->bssid_for_connect[1], ssid->bssid_for_connect[2],
5535                                         ssid->bssid_for_connect[3], ssid->bssid_for_connect[4], ssid->bssid_for_connect[5]);
5536                 else
5537                         snprintf(bssid, 18, "%02x:%02x:%02x:%02x:%02x:%02x",
5538                                         ssid->bssid[0], ssid->bssid[1], ssid->bssid[2],
5539                                         ssid->bssid[3], ssid->bssid[4], ssid->bssid[5]);
5540
5541                 supplicant_dbus_dict_append_basic(&dict, "bssid",
5542                                         DBUS_TYPE_STRING, &bssid);
5543                 g_free(bssid);
5544         }
5545 #endif
5546
5547         supplicant_dbus_dict_close(iter, &dict);
5548 }
5549
5550 static void interface_wps_start_result(const char *error,
5551                                 DBusMessageIter *iter, void *user_data)
5552 {
5553         struct interface_connect_data *data = user_data;
5554         int err;
5555
5556         SUPPLICANT_DBG("");
5557
5558         err = 0;
5559         if (error) {
5560                 SUPPLICANT_DBG("error: %s", error);
5561                 err = parse_supplicant_error(iter);
5562         }
5563
5564         if(data->callback)
5565                 data->callback(err, data->interface, data->user_data);
5566
5567         g_free(data->path);
5568         g_free(data->ssid);
5569         dbus_free(data);
5570 }
5571
5572 static void interface_add_wps_params(DBusMessageIter *iter, void *user_data)
5573 {
5574         struct interface_connect_data *data = user_data;
5575         GSupplicantSSID *ssid = data->ssid;
5576         const char *role = "enrollee", *type;
5577         DBusMessageIter dict;
5578
5579         SUPPLICANT_DBG("");
5580
5581         supplicant_dbus_dict_open(iter, &dict);
5582
5583         supplicant_dbus_dict_append_basic(&dict, "Role",
5584                                                 DBUS_TYPE_STRING, &role);
5585
5586         type = "pbc";
5587         if (ssid->pin_wps) {
5588                 type = "pin";
5589                 supplicant_dbus_dict_append_basic(&dict, "Pin",
5590                                         DBUS_TYPE_STRING, &ssid->pin_wps);
5591         }
5592
5593         supplicant_dbus_dict_append_basic(&dict, "Type",
5594                                         DBUS_TYPE_STRING, &type);
5595
5596 #if defined TIZEN_EXT
5597         if (ssid->bssid)
5598                 supplicant_dbus_dict_append_fixed_array(&dict, "Bssid",
5599                                                 DBUS_TYPE_BYTE, &ssid->bssid, 6);
5600 #endif
5601
5602         supplicant_dbus_dict_close(iter, &dict);
5603 }
5604
5605 static void wps_start(const char *error, DBusMessageIter *iter, void *user_data)
5606 {
5607         struct interface_connect_data *data = user_data;
5608
5609         SUPPLICANT_DBG("");
5610
5611         if (error) {
5612                 SUPPLICANT_DBG("error: %s", error);
5613                 g_free(data->path);
5614                 g_free(data->ssid);
5615                 dbus_free(data);
5616                 return;
5617         }
5618 #if defined TIZEN_EXT
5619         GSupplicantSSID *ssid = data->ssid;
5620         if (ssid->pin_wps != NULL) {
5621                 if (!g_utf8_validate(ssid->pin_wps, 8, NULL)) {
5622                         SUPPLICANT_DBG("Invalid characters in WPS_PIN");
5623                         g_free(data->ssid);
5624                         dbus_free(data);
5625                         return;
5626                 }
5627         }
5628 #endif
5629         supplicant_dbus_method_call(data->interface->path,
5630                         SUPPLICANT_INTERFACE ".Interface.WPS", "Start",
5631                         interface_add_wps_params,
5632                         interface_wps_start_result, data, NULL);
5633 }
5634
5635 static void wps_process_credentials(DBusMessageIter *iter, void *user_data)
5636 {
5637         dbus_bool_t credentials = TRUE;
5638
5639         SUPPLICANT_DBG("");
5640
5641         dbus_message_iter_append_basic(iter, DBUS_TYPE_BOOLEAN, &credentials);
5642 }
5643
5644
5645 #if defined TIZEN_EXT
5646 #define NETCONFIG_SERVICE "net.netconfig"
5647 #define NETCONFIG_WIFI_PATH "/net/netconfig/wifi"
5648 #define NETCONFIG_WIFI_INTERFACE NETCONFIG_SERVICE ".wifi"
5649
5650 struct dec_method_call_data {
5651         struct interface_connect_data *data;
5652         DBusPendingCall *pending_call;
5653 };
5654
5655 static struct dec_method_call_data decrypt_request_data;
5656
5657 static void crypt_method_call_cancel(void)
5658 {
5659         if (decrypt_request_data.pending_call) {
5660                 dbus_pending_call_cancel(decrypt_request_data.pending_call);
5661                 dbus_pending_call_unref(decrypt_request_data.pending_call);
5662                 decrypt_request_data.pending_call = NULL;
5663         }
5664
5665         g_free(decrypt_request_data.data->path);
5666         g_free(decrypt_request_data.data->ssid);
5667         dbus_free(decrypt_request_data.data);
5668         decrypt_request_data.data = NULL;
5669 }
5670
5671 static void decryption_request_reply(DBusPendingCall *call,
5672                                                 void *user_data)
5673 {
5674         DBusMessage *reply;
5675         DBusError error;
5676         DBusMessageIter args;
5677         char *out_data;
5678         int ret;
5679         static gchar* origin_value = NULL;
5680         struct interface_connect_data *data = user_data;
5681
5682         g_free(origin_value);
5683         origin_value = NULL;
5684
5685         SUPPLICANT_DBG("");
5686
5687         reply = dbus_pending_call_steal_reply(call);
5688
5689         dbus_error_init(&error);
5690         if (dbus_set_error_from_message(&error, reply)) {
5691                 SUPPLICANT_DBG("decryption_request_reply() %s %s", error.name, error.message);
5692                 dbus_error_free(&error);
5693                 ret = -EINVAL;
5694                 goto done;
5695         }
5696
5697         if (dbus_message_iter_init(reply, &args) == FALSE) {
5698                 SUPPLICANT_DBG("dbus_message_iter_init() failed");
5699                 ret = -EINVAL;
5700                 goto done;
5701         }
5702
5703         dbus_message_iter_get_basic(&args, &out_data);
5704
5705         origin_value = g_strdup((const gchar *)out_data);
5706         data->ssid->passphrase = origin_value;
5707
5708         ret = supplicant_dbus_method_call(data->interface->path,
5709                 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
5710                 interface_add_network_params,
5711                 interface_add_network_result, data,
5712                 data->interface);
5713
5714 done:
5715         if (ret < 0) {
5716                 SUPPLICANT_DBG("AddNetwork failed %d", ret);
5717                 callback_assoc_failed(decrypt_request_data.data->user_data);
5718                 g_free(data->path);
5719                 g_free(data->ssid);
5720                 dbus_free(data);
5721         }
5722
5723         dbus_message_unref(reply);
5724         dbus_pending_call_unref(call);
5725
5726         decrypt_request_data.pending_call = NULL;
5727         decrypt_request_data.data = NULL;
5728 }
5729
5730 static int send_decryption_request(const char *passphrase,
5731                         struct interface_connect_data *data)
5732 {
5733         DBusMessage *msg = NULL;
5734         DBusPendingCall *call;
5735
5736         SUPPLICANT_DBG("Decryption request");
5737
5738         if (!passphrase) {
5739                 SUPPLICANT_DBG("Invalid parameter");
5740                 return -EINVAL;
5741         }
5742
5743         if (!connection)
5744                 return -EINVAL;
5745
5746         msg = dbus_message_new_method_call(NETCONFIG_SERVICE, NETCONFIG_WIFI_PATH,
5747                         NETCONFIG_WIFI_INTERFACE, "DecryptPassphrase");
5748         if (!msg)
5749                 return -EINVAL;
5750
5751         dbus_message_append_args(msg, DBUS_TYPE_STRING, &passphrase,
5752                                                         DBUS_TYPE_INVALID);
5753
5754         if (!dbus_connection_send_with_reply(connection, msg,
5755                                 &call, DBUS_TIMEOUT_USE_DEFAULT)) {
5756                 dbus_message_unref(msg);
5757                 return -EIO;
5758         }
5759
5760         if (!call) {
5761                 dbus_message_unref(msg);
5762                 return -EIO;
5763         }
5764
5765         decrypt_request_data.pending_call = call;
5766         decrypt_request_data.data = data;
5767
5768         dbus_pending_call_set_notify(call, decryption_request_reply, data, NULL);
5769         dbus_message_unref(msg);
5770
5771         SUPPLICANT_DBG("Decryption request succeeded");
5772
5773         return 0;
5774 }
5775 #endif
5776
5777 int g_supplicant_interface_connect(GSupplicantInterface *interface,
5778                                 GSupplicantSSID *ssid,
5779                                 GSupplicantInterfaceCallback callback,
5780                                                         void *user_data)
5781 {
5782         struct interface_connect_data *data;
5783         struct interface_data *intf_data;
5784         int ret = 0;
5785
5786         SUPPLICANT_DBG("");
5787
5788         if (!interface)
5789                 return -EINVAL;
5790
5791         if (!system_available)
5792                 return -EFAULT;
5793
5794         /* TODO: Check if we're already connected and switch */
5795
5796         data = dbus_malloc0(sizeof(*data));
5797         if (!data)
5798                 return -ENOMEM;
5799
5800         data->interface = interface;
5801         data->path = g_strdup(interface->path);
5802         data->callback = callback;
5803         data->ssid = ssid;
5804         data->user_data = user_data;
5805
5806         if (ssid->use_wps) {
5807                 g_free(interface->wps_cred.key);
5808                 memset(&interface->wps_cred, 0,
5809                                 sizeof(struct _GSupplicantWpsCredentials));
5810
5811                 ret = supplicant_dbus_property_set(interface->path,
5812                         SUPPLICANT_INTERFACE ".Interface.WPS",
5813                         "ProcessCredentials", DBUS_TYPE_BOOLEAN_AS_STRING,
5814                         wps_process_credentials, wps_start, data, interface);
5815         } else {
5816                 /* By the time there is a request for connect and the network
5817                  * path is not NULL it means that connman has not removed the
5818                  * previous network pointer. This can happen in the case AP
5819                  * deauthenticated client and connman does not remove the
5820                  * previously connected network pointer. This causes supplicant
5821                  * to reallocate the memory for struct wpa_ssid again even if it
5822                  * is the same SSID. This causes memory usage of wpa_supplicnat
5823                  * to go high. The idea here is that if the previously connected
5824                  * network is not removed at the time of next connection attempt
5825                  * check if the network path is not NULL. In case it is non-NULL
5826                  * first remove the network and then once removal is successful, add
5827                  * the network.
5828                  */
5829
5830                 if (interface->network_path != NULL) {
5831                         g_free(data->path);
5832                         dbus_free(data);
5833
5834                         /*
5835                          * If this add network is for the same network for
5836                          * which wpa_supplicant already has a profile then do
5837                          * not need to add another profile. Only if the
5838                          * profile that needs to get added is different from
5839                          * what is there in wpa_s delete the current one. A
5840                          * network is identified by its SSID, security_type
5841                          * and passphrase (private passphrase in case security
5842                          * type is 802.11x).
5843                          */
5844                         if (compare_network_parameters(interface, ssid)) {
5845                                 return -EALREADY;
5846                         }
5847
5848                         intf_data = dbus_malloc0(sizeof(*intf_data));
5849                         if (!intf_data)
5850                                 return -ENOMEM;
5851
5852                         intf_data->interface = interface;
5853                         intf_data->path = g_strdup(interface->path);
5854                         intf_data->callback = callback;
5855                         intf_data->ssid = ssid;
5856                         intf_data->user_data = user_data;
5857                         intf_data->network_remove_in_progress = TRUE;
5858                         network_remove(intf_data);
5859                 } else
5860 #if defined TIZEN_EXT
5861                         if (ssid->passphrase && g_strcmp0(ssid->passphrase, "") != 0 && !ssid->eap) {
5862                                 ret = send_decryption_request(ssid->passphrase, data);
5863                                 if (ret < 0)
5864                                         SUPPLICANT_DBG("Decryption request failed %d", ret);
5865                         } else
5866 #endif
5867                                 ret = supplicant_dbus_method_call(interface->path,
5868                                                 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
5869                                                 interface_add_network_params,
5870                                                 interface_add_network_result, data,
5871                                                 interface);
5872         }
5873
5874         if (ret < 0) {
5875                 g_free(data->path);
5876                 dbus_free(data);
5877                 return ret;
5878         }
5879
5880         return -EINPROGRESS;
5881 }
5882
5883 static void network_remove_result(const char *error,
5884                                 DBusMessageIter *iter, void *user_data)
5885 {
5886         struct interface_data *data = user_data;
5887         struct interface_connect_data *connect_data;
5888         int result = 0;
5889
5890         SUPPLICANT_DBG("");
5891
5892         if (error) {
5893                 result = -EIO;
5894                 SUPPLICANT_DBG("error: %s", error);
5895
5896                 if (g_strcmp0("org.freedesktop.DBus.Error.UnknownMethod",
5897                                                 error) == 0)
5898                         result = -ECONNABORTED;
5899         }
5900
5901         g_free(data->interface->network_path);
5902         data->interface->network_path = NULL;
5903
5904         remove_network_information(data->interface);
5905
5906         if (data->network_remove_in_progress == TRUE) {
5907                 data->network_remove_in_progress = FALSE;
5908                 connect_data = dbus_malloc0(sizeof(*connect_data));
5909                 if (!connect_data)
5910                         return;
5911
5912                 connect_data->interface = data->interface;
5913                 connect_data->path = g_strdup(data->path);
5914                 connect_data->callback = data->callback;
5915                 connect_data->ssid = data->ssid;
5916                 connect_data->user_data = data->user_data;
5917
5918 #if defined TIZEN_EXT
5919                 int ret;
5920                 if (data->ssid->passphrase && g_strcmp0(data->ssid->passphrase, "") != 0
5921                         && !data->ssid->eap) {
5922                         ret = send_decryption_request(data->ssid->passphrase, connect_data);
5923                         if (ret < 0) {
5924                                 SUPPLICANT_DBG("Decryption request failed %d", ret);
5925                                 g_free(connect_data->ssid);
5926                                 g_free(connect_data->path);
5927                                 dbus_free(connect_data);
5928                         }
5929                 } else
5930 #endif
5931                 supplicant_dbus_method_call(data->interface->path,
5932                         SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
5933                         interface_add_network_params,
5934                         interface_add_network_result, connect_data,
5935                         connect_data->interface);
5936         } else {
5937                 if (data->callback)
5938                         data->callback(result, data->interface, data->user_data);
5939         }
5940         g_free(data->path);
5941         dbus_free(data);
5942 }
5943
5944 static void network_remove_params(DBusMessageIter *iter, void *user_data)
5945 {
5946         struct interface_data *data = user_data;
5947         const char *path = data->interface->network_path;
5948
5949         SUPPLICANT_DBG("path %s", path);
5950
5951         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH, &path);
5952 }
5953
5954 static int network_remove(struct interface_data *data)
5955 {
5956         GSupplicantInterface *interface = data->interface;
5957
5958         SUPPLICANT_DBG("");
5959
5960 #if defined TIZEN_EXT
5961         GSupplicantInterface *intf = NULL;
5962         /*
5963          * Check if 'interface' is valid
5964          */
5965         intf = g_hash_table_lookup(interface_table, interface->path);
5966         if (intf == NULL)
5967                 return -EINVAL;
5968 #endif
5969
5970         return supplicant_dbus_method_call(interface->path,
5971                         SUPPLICANT_INTERFACE ".Interface", "RemoveNetwork",
5972                         network_remove_params, network_remove_result, data,
5973                         interface);
5974 }
5975
5976 static void interface_disconnect_result(const char *error,
5977                                 DBusMessageIter *iter, void *user_data)
5978 {
5979         struct interface_data *data = user_data;
5980         int result = 0;
5981
5982         SUPPLICANT_DBG("");
5983
5984         if (error) {
5985                 result = -EIO;
5986                 SUPPLICANT_DBG("error: %s", error);
5987
5988                 if (g_strcmp0("org.freedesktop.DBus.Error.UnknownMethod",
5989                                                 error) == 0)
5990                         result = -ECONNABORTED;
5991         }
5992
5993         /* If we are disconnecting from previous WPS successful
5994          * association. i.e.: it did not went through AddNetwork,
5995          * and interface->network_path was never set. */
5996         if (!data->interface->network_path) {
5997                 if (data->callback)
5998                         data->callback(result, data->interface,
5999                                                         data->user_data);
6000
6001                 g_free(data->path);
6002                 dbus_free(data);
6003                 return;
6004         }
6005
6006         if (result < 0 && data->callback) {
6007                 data->callback(result, data->interface, data->user_data);
6008                 data->callback = NULL;
6009         }
6010
6011         if (result != -ECONNABORTED) {
6012                 if (network_remove(data) < 0) {
6013                         g_free(data->path);
6014                         dbus_free(data);
6015                 }
6016         } else {
6017                 g_free(data->path);
6018                 dbus_free(data);
6019         }
6020 }
6021
6022 int g_supplicant_interface_disconnect(GSupplicantInterface *interface,
6023                                         GSupplicantInterfaceCallback callback,
6024                                                         void *user_data)
6025 {
6026         struct interface_data *data;
6027         int ret;
6028
6029         SUPPLICANT_DBG("");
6030
6031         if (!interface)
6032                 return -EINVAL;
6033
6034         if (!system_available)
6035                 return -EFAULT;
6036 #if defined TIZEN_EXT
6037         if (decrypt_request_data.pending_call &&
6038                         decrypt_request_data.data &&
6039                         decrypt_request_data.data->user_data == user_data) {
6040
6041                 callback_assoc_failed(decrypt_request_data.data->user_data);
6042                 crypt_method_call_cancel();
6043
6044                 return 0;
6045         }
6046 #endif
6047         data = dbus_malloc0(sizeof(*data));
6048         if (!data)
6049                 return -ENOMEM;
6050
6051         data->interface = interface;
6052         data->path = g_strdup(interface->path);
6053         data->callback = callback;
6054         data->user_data = user_data;
6055
6056         ret = supplicant_dbus_method_call(interface->path,
6057                         SUPPLICANT_INTERFACE ".Interface", "Disconnect",
6058                         NULL, interface_disconnect_result, data,
6059                         interface);
6060
6061         if (ret < 0) {
6062                 g_free(data->path);
6063                 dbus_free(data);
6064         }
6065
6066         return ret;
6067 }
6068
6069 static void interface_p2p_find_result(const char *error,
6070                                         DBusMessageIter *iter, void *user_data)
6071 {
6072         struct interface_scan_data *data = user_data;
6073         int err = 0;
6074
6075         SUPPLICANT_DBG("error %s", error);
6076
6077         if (error)
6078                 err = -EIO;
6079
6080         if (interface_exists(data->interface, data->path)) {
6081                 if (!data->interface->ready)
6082                         err = -ENOLINK;
6083                 if (!err)
6084                         data->interface->p2p_finding = true;
6085         }
6086
6087         if (data->callback)
6088                 data->callback(err, data->interface, data->user_data);
6089
6090         g_free(data->path);
6091         dbus_free(data);
6092 }
6093
6094 static void interface_p2p_find_params(DBusMessageIter *iter, void *user_data)
6095 {
6096         DBusMessageIter dict;
6097
6098         supplicant_dbus_dict_open(iter, &dict);
6099         supplicant_dbus_dict_close(iter, &dict);
6100 }
6101
6102 int g_supplicant_interface_p2p_find(GSupplicantInterface *interface,
6103                                         GSupplicantInterfaceCallback callback,
6104                                                         void *user_data)
6105 {
6106         struct interface_scan_data *data;
6107         int ret;
6108
6109         if (!interface->p2p_support)
6110                 return -ENOTSUP;
6111
6112         ret = interface_ready_to_scan(interface);
6113         if (ret && ret != -EALREADY)
6114                 return ret;
6115
6116         data = dbus_malloc0(sizeof(*data));
6117         if (!data)
6118                 return -ENOMEM;
6119
6120         data->interface = interface;
6121         data->path = g_strdup(interface->path);
6122         data->callback = callback;
6123         data->user_data = user_data;
6124
6125         ret = supplicant_dbus_method_call(interface->path,
6126                         SUPPLICANT_INTERFACE ".Interface.P2PDevice", "Find",
6127                         interface_p2p_find_params, interface_p2p_find_result,
6128                         data, interface);
6129         if (ret < 0) {
6130                 g_free(data->path);
6131                 dbus_free(data);
6132         }
6133
6134         return ret;
6135 }
6136
6137 bool g_supplicant_interface_is_p2p_finding(GSupplicantInterface *interface)
6138 {
6139         if (!interface)
6140                 return false;
6141
6142         return interface->p2p_finding;
6143 }
6144
6145 int g_supplicant_interface_p2p_stop_find(GSupplicantInterface *interface)
6146 {
6147         if (!interface->p2p_finding)
6148                 return 0;
6149
6150         SUPPLICANT_DBG("");
6151
6152         interface->p2p_finding = false;
6153
6154         return supplicant_dbus_method_call(interface->path,
6155                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "StopFind",
6156                 NULL, NULL, NULL, NULL);
6157 }
6158
6159 static void interface_p2p_connect_result(const char *error,
6160                                         DBusMessageIter *iter, void *user_data)
6161 {
6162         struct interface_connect_data *data = user_data;
6163         int err = 0;
6164
6165         SUPPLICANT_DBG("");
6166
6167         if (error) {
6168                 SUPPLICANT_DBG("error: %s", error);
6169                 err = parse_supplicant_error(iter);
6170         }
6171
6172         if (data->callback)
6173                 data->callback(err, data->interface, data->user_data);
6174
6175         g_free(data->path);
6176         g_free(data->peer->wps_pin);
6177         g_free(data->peer->path);
6178         g_free(data->peer);
6179         g_free(data);
6180 }
6181
6182 static void interface_p2p_connect_params(DBusMessageIter *iter, void *user_data)
6183 {
6184         struct interface_connect_data *data = user_data;
6185         const char *wps = "pbc";
6186         DBusMessageIter dict;
6187         int go_intent = 7;
6188
6189         SUPPLICANT_DBG("");
6190
6191         supplicant_dbus_dict_open(iter, &dict);
6192
6193         if (data->peer->master)
6194                 go_intent = 15;
6195
6196         if (data->peer->wps_pin)
6197                 wps = "pin";
6198
6199         supplicant_dbus_dict_append_basic(&dict, "peer",
6200                                 DBUS_TYPE_OBJECT_PATH, &data->peer->path);
6201         supplicant_dbus_dict_append_basic(&dict, "wps_method",
6202                                 DBUS_TYPE_STRING, &wps);
6203         if (data->peer->wps_pin) {
6204                 supplicant_dbus_dict_append_basic(&dict, "pin",
6205                                 DBUS_TYPE_STRING, &data->peer->wps_pin);
6206         }
6207
6208         supplicant_dbus_dict_append_basic(&dict, "go_intent",
6209                                         DBUS_TYPE_INT32, &go_intent);
6210
6211         supplicant_dbus_dict_close(iter, &dict);
6212 }
6213
6214 int g_supplicant_interface_p2p_connect(GSupplicantInterface *interface,
6215                                         GSupplicantPeerParams *peer_params,
6216                                         GSupplicantInterfaceCallback callback,
6217                                         void *user_data)
6218 {
6219         struct interface_connect_data *data;
6220         int ret;
6221
6222         SUPPLICANT_DBG("");
6223
6224         if (!interface->p2p_support)
6225                 return -ENOTSUP;
6226
6227         data = dbus_malloc0(sizeof(*data));
6228         if (!data)
6229                 return -ENOMEM;
6230
6231         data->interface = interface;
6232         data->path = g_strdup(interface->path);
6233         data->peer = peer_params;
6234         data->callback = callback;
6235         data->user_data = user_data;
6236
6237         ret = supplicant_dbus_method_call(interface->path,
6238                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "Connect",
6239                 interface_p2p_connect_params, interface_p2p_connect_result,
6240                 data, interface);
6241         if (ret < 0) {
6242                 g_free(data->path);
6243                 dbus_free(data);
6244                 return ret;
6245         }
6246
6247         return -EINPROGRESS;
6248 }
6249
6250 int g_supplicant_interface_p2p_disconnect(GSupplicantInterface *interface,
6251                                         GSupplicantPeerParams *peer_params)
6252 {
6253         GSupplicantPeer *peer;
6254         int count = 0;
6255         GSList *list;
6256
6257         SUPPLICANT_DBG("");
6258
6259         if (!interface->p2p_support)
6260                 return -ENOTSUP;
6261
6262         peer = g_hash_table_lookup(interface->peer_table, peer_params->path);
6263         if (!peer)
6264                 return -ENODEV;
6265
6266         for (list = peer->groups; list; list = list->next, count++) {
6267                 const char *group_obj_path = list->data;
6268                 GSupplicantInterface *g_interface;
6269                 GSupplicantGroup *group;
6270
6271                 group = g_hash_table_lookup(group_mapping, group_obj_path);
6272                 if (!group || !group->interface)
6273                         continue;
6274
6275                 g_interface = group->interface;
6276                 supplicant_dbus_method_call(g_interface->path,
6277                                 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
6278                                 "Disconnect", NULL, NULL, NULL, g_interface);
6279         }
6280
6281         if (count == 0 && peer->current_group_iface) {
6282                 supplicant_dbus_method_call(peer->current_group_iface->path,
6283                                 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
6284                                 "Disconnect", NULL, NULL, NULL,
6285                                 peer->current_group_iface->path);
6286         }
6287
6288         peer->current_group_iface = NULL;
6289
6290         return -EINPROGRESS;
6291 }
6292
6293 struct p2p_service_data {
6294         bool registration;
6295         GSupplicantInterface *interface;
6296         GSupplicantP2PServiceParams *service;
6297         GSupplicantInterfaceCallback callback;
6298         void *user_data;
6299 };
6300
6301 static void interface_p2p_service_result(const char *error,
6302                                         DBusMessageIter *iter, void *user_data)
6303 {
6304         struct p2p_service_data *data = user_data;
6305         int result = 0;
6306
6307         SUPPLICANT_DBG("%s result - %s", data->registration ?
6308                                 "Registration" : "Deletion",
6309                                 error ? error : "Success");
6310         if (error)
6311                 result = -EINVAL;
6312
6313         if (data->callback)
6314                 data->callback(result, data->interface, data->user_data);
6315
6316         g_free(data->service->query);
6317         g_free(data->service->response);
6318         g_free(data->service->service);
6319         g_free(data->service->wfd_ies);
6320         g_free(data->service);
6321         dbus_free(data);
6322 }
6323
6324 static void interface_p2p_service_params(DBusMessageIter *iter,
6325                                                         void *user_data)
6326 {
6327         struct p2p_service_data *data = user_data;
6328         GSupplicantP2PServiceParams *service;
6329         DBusMessageIter dict;
6330         const char *type;
6331
6332         SUPPLICANT_DBG("");
6333
6334         service = data->service;
6335
6336         supplicant_dbus_dict_open(iter, &dict);
6337
6338         if (service->query && service->response) {
6339                 type = "bonjour";
6340                 supplicant_dbus_dict_append_basic(&dict, "service_type",
6341                                                 DBUS_TYPE_STRING, &type);
6342                 supplicant_dbus_dict_append_fixed_array(&dict, "query",
6343                                         DBUS_TYPE_BYTE, &service->query,
6344                                         service->query_length);
6345                 supplicant_dbus_dict_append_fixed_array(&dict, "response",
6346                                         DBUS_TYPE_BYTE, &service->response,
6347                                         service->response_length);
6348         } else if (service->version && service->service) {
6349                 type = "upnp";
6350                 supplicant_dbus_dict_append_basic(&dict, "service_type",
6351                                                 DBUS_TYPE_STRING, &type);
6352                 supplicant_dbus_dict_append_basic(&dict, "version",
6353                                         DBUS_TYPE_INT32, &service->version);
6354                 supplicant_dbus_dict_append_basic(&dict, "service",
6355                                         DBUS_TYPE_STRING, &service->service);
6356         }
6357
6358         supplicant_dbus_dict_close(iter, &dict);
6359 }
6360
6361 int g_supplicant_interface_p2p_add_service(GSupplicantInterface *interface,
6362                                 GSupplicantInterfaceCallback callback,
6363                                 GSupplicantP2PServiceParams *p2p_service_params,
6364                                 void *user_data)
6365 {
6366         struct p2p_service_data *data;
6367         int ret;
6368
6369         SUPPLICANT_DBG("");
6370
6371         if (!interface->p2p_support)
6372                 return -ENOTSUP;
6373
6374         data = dbus_malloc0(sizeof(*data));
6375         if (!data)
6376                 return -ENOMEM;
6377
6378         data->registration = true;
6379         data->interface = interface;
6380         data->service = p2p_service_params;
6381         data->callback = callback;
6382         data->user_data = user_data;
6383
6384         ret = supplicant_dbus_method_call(interface->path,
6385                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "AddService",
6386                 interface_p2p_service_params, interface_p2p_service_result,
6387                 data, interface);
6388         if (ret < 0) {
6389                 dbus_free(data);
6390                 return ret;
6391         }
6392
6393         return -EINPROGRESS;
6394 }
6395
6396 int g_supplicant_interface_p2p_del_service(GSupplicantInterface *interface,
6397                                 GSupplicantP2PServiceParams *p2p_service_params)
6398 {
6399         struct p2p_service_data *data;
6400         int ret;
6401
6402         SUPPLICANT_DBG("");
6403
6404         if (!interface->p2p_support)
6405                 return -ENOTSUP;
6406
6407         data = dbus_malloc0(sizeof(*data));
6408         if (!data)
6409                 return -ENOMEM;
6410
6411         data->interface = interface;
6412         data->service = p2p_service_params;
6413
6414         ret = supplicant_dbus_method_call(interface->path,
6415                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeleteService",
6416                 interface_p2p_service_params, interface_p2p_service_result,
6417                 data, interface);
6418         if (ret < 0) {
6419                 dbus_free(data);
6420                 return ret;
6421         }
6422
6423         return -EINPROGRESS;
6424 }
6425
6426 struct p2p_listen_data {
6427         int period;
6428         int interval;
6429 };
6430
6431 static void interface_p2p_listen_params(DBusMessageIter *iter, void *user_data)
6432 {
6433         struct p2p_listen_data *params = user_data;
6434         DBusMessageIter dict;
6435
6436         supplicant_dbus_dict_open(iter, &dict);
6437
6438         supplicant_dbus_dict_append_basic(&dict, "period",
6439                                         DBUS_TYPE_INT32, &params->period);
6440         supplicant_dbus_dict_append_basic(&dict, "interval",
6441                                         DBUS_TYPE_INT32, &params->interval);
6442         supplicant_dbus_dict_close(iter, &dict);
6443 }
6444
6445 int g_supplicant_interface_p2p_listen(GSupplicantInterface *interface,
6446                                                 int period, int interval)
6447 {
6448         struct p2p_listen_data params;
6449
6450         SUPPLICANT_DBG("");
6451
6452         if (!interface->p2p_support)
6453                 return -ENOTSUP;
6454
6455         params.period = period;
6456         params.interval = interval;
6457
6458         return supplicant_dbus_method_call(interface->path,
6459                         SUPPLICANT_INTERFACE ".Interface.P2PDevice",
6460                         "ExtendedListen", interface_p2p_listen_params,
6461                         NULL, &params, NULL);
6462 }
6463
6464 static void widi_ies_params(DBusMessageIter *iter, void *user_data)
6465 {
6466         struct p2p_service_data *data = user_data;
6467         GSupplicantP2PServiceParams *service = data->service;
6468         DBusMessageIter array;
6469
6470         SUPPLICANT_DBG("%p - %d", service->wfd_ies, service->wfd_ies_length);
6471
6472         dbus_message_iter_open_container(iter, DBUS_TYPE_ARRAY,
6473                                         DBUS_TYPE_BYTE_AS_STRING, &array);
6474
6475         if (service->wfd_ies && service->wfd_ies_length > 0) {
6476                 dbus_message_iter_append_fixed_array(&array, DBUS_TYPE_BYTE,
6477                                 &service->wfd_ies, service->wfd_ies_length);
6478         }
6479
6480         dbus_message_iter_close_container(iter, &array);
6481 }
6482
6483 int g_supplicant_set_widi_ies(GSupplicantP2PServiceParams *p2p_service_params,
6484                                         GSupplicantInterfaceCallback callback,
6485                                         void *user_data)
6486 {
6487         struct p2p_service_data *data;
6488         int ret;
6489
6490         SUPPLICANT_DBG("");
6491
6492         if (!system_available)
6493                 return -EFAULT;
6494
6495         data = dbus_malloc0(sizeof(*data));
6496         if (!data)
6497                 return -ENOMEM;
6498
6499         data->service = p2p_service_params;
6500         data->callback = callback;
6501         data->user_data = user_data;
6502
6503         if (p2p_service_params->wfd_ies)
6504                 data->registration = true;
6505
6506         ret = supplicant_dbus_property_set(SUPPLICANT_PATH,
6507                                         SUPPLICANT_INTERFACE, "WFDIEs",
6508                                         DBUS_TYPE_ARRAY_AS_STRING
6509                                         DBUS_TYPE_BYTE_AS_STRING,
6510                                         widi_ies_params,
6511                                         interface_p2p_service_result,
6512                                         data, NULL);
6513         if (ret < 0 && ret != -EINPROGRESS) {
6514                 dbus_free(data);
6515                 return ret;
6516         }
6517
6518         return -EINPROGRESS;
6519 }
6520
6521 static const char *g_supplicant_rule0 = "type=signal,"
6522                                         "path=" DBUS_PATH_DBUS ","
6523                                         "sender=" DBUS_SERVICE_DBUS ","
6524                                         "interface=" DBUS_INTERFACE_DBUS ","
6525                                         "member=NameOwnerChanged,"
6526                                         "arg0=" SUPPLICANT_SERVICE;
6527 static const char *g_supplicant_rule1 = "type=signal,"
6528                         "interface=" SUPPLICANT_INTERFACE;
6529 static const char *g_supplicant_rule2 = "type=signal,"
6530                         "interface=" SUPPLICANT_INTERFACE ".Interface";
6531 static const char *g_supplicant_rule3 = "type=signal,"
6532                         "interface=" SUPPLICANT_INTERFACE ".Interface.WPS";
6533 static const char *g_supplicant_rule4 = "type=signal,"
6534                         "interface=" SUPPLICANT_INTERFACE ".BSS";
6535 static const char *g_supplicant_rule5 = "type=signal,"
6536                         "interface=" SUPPLICANT_INTERFACE ".Network";
6537 #if !defined TIZEN_EXT
6538 static const char *g_supplicant_rule6 = "type=signal,"
6539                 "interface=" SUPPLICANT_INTERFACE ".Interface.P2PDevice";
6540 static const char *g_supplicant_rule7 = "type=signal,"
6541                 "interface=" SUPPLICANT_INTERFACE ".Peer";
6542 static const char *g_supplicant_rule8 = "type=signal,"
6543                 "interface=" SUPPLICANT_INTERFACE ".Group";
6544 #endif
6545
6546 static void invoke_introspect_method(void)
6547 {
6548         DBusMessage *message;
6549
6550         message = dbus_message_new_method_call(SUPPLICANT_SERVICE,
6551                                         SUPPLICANT_PATH,
6552                                         DBUS_INTERFACE_INTROSPECTABLE,
6553                                         "Introspect");
6554
6555         if (!message)
6556                 return;
6557
6558         dbus_message_set_no_reply(message, TRUE);
6559         dbus_connection_send(connection, message, NULL);
6560         dbus_message_unref(message);
6561 }
6562
6563 int g_supplicant_register(const GSupplicantCallbacks *callbacks)
6564 {
6565         connection = dbus_bus_get(DBUS_BUS_SYSTEM, NULL);
6566         if (!connection)
6567                 return -EIO;
6568
6569         if (!dbus_connection_add_filter(connection, g_supplicant_filter,
6570                                                 NULL, NULL)) {
6571                 dbus_connection_unref(connection);
6572                 connection = NULL;
6573                 return -EIO;
6574         }
6575
6576         callbacks_pointer = callbacks;
6577         eap_methods = 0;
6578
6579         interface_table = g_hash_table_new_full(g_str_hash, g_str_equal,
6580                                                 NULL, remove_interface);
6581
6582         bss_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
6583                                                                 NULL, NULL);
6584         peer_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
6585                                                                 NULL, NULL);
6586         group_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
6587                                                                 NULL, NULL);
6588         pending_peer_connection = g_hash_table_new_full(g_str_hash, g_str_equal,
6589                                                                 NULL, NULL);
6590         config_file_table = g_hash_table_new_full(g_str_hash, g_str_equal,
6591                                                                 g_free, g_free);
6592
6593         supplicant_dbus_setup(connection);
6594
6595         dbus_bus_add_match(connection, g_supplicant_rule0, NULL);
6596         dbus_bus_add_match(connection, g_supplicant_rule1, NULL);
6597         dbus_bus_add_match(connection, g_supplicant_rule2, NULL);
6598         dbus_bus_add_match(connection, g_supplicant_rule3, NULL);
6599         dbus_bus_add_match(connection, g_supplicant_rule4, NULL);
6600         dbus_bus_add_match(connection, g_supplicant_rule5, NULL);
6601 #if defined TIZEN_EXT
6602         dbus_bus_add_match(connection,
6603                         "type=signal,interface=org.tizen.system.deviced.PowerOff,"
6604                         "member=ChangeState", NULL);
6605 #endif
6606 #if !defined TIZEN_EXT
6607         dbus_bus_add_match(connection, g_supplicant_rule6, NULL);
6608         dbus_bus_add_match(connection, g_supplicant_rule7, NULL);
6609         dbus_bus_add_match(connection, g_supplicant_rule8, NULL);
6610 #endif
6611         dbus_connection_flush(connection);
6612
6613         if (dbus_bus_name_has_owner(connection,
6614                                         SUPPLICANT_SERVICE, NULL)) {
6615                 system_available = TRUE;
6616                 supplicant_dbus_property_get_all(SUPPLICANT_PATH,
6617                                                 SUPPLICANT_INTERFACE,
6618                                                 service_property, NULL, NULL);
6619         } else
6620                 invoke_introspect_method();
6621
6622         return 0;
6623 }
6624
6625 static void unregister_interface_remove_params(DBusMessageIter *iter,
6626                                                 void *user_data)
6627 {
6628         const char *path = user_data;
6629
6630         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
6631                                                         &path);
6632 }
6633
6634
6635 static void unregister_remove_interface(gpointer key, gpointer value,
6636                                                 gpointer user_data)
6637 {
6638         GSupplicantInterface *interface = value;
6639
6640         supplicant_dbus_method_call(SUPPLICANT_PATH,
6641                                         SUPPLICANT_INTERFACE,
6642                                         "RemoveInterface",
6643                                         unregister_interface_remove_params,
6644                                         NULL, interface->path, NULL);
6645 }
6646
6647 void g_supplicant_unregister(const GSupplicantCallbacks *callbacks)
6648 {
6649         SUPPLICANT_DBG("");
6650
6651         if (connection) {
6652 #if !defined TIZEN_EXT
6653                 dbus_bus_remove_match(connection, g_supplicant_rule8, NULL);
6654                 dbus_bus_remove_match(connection, g_supplicant_rule7, NULL);
6655                 dbus_bus_remove_match(connection, g_supplicant_rule6, NULL);
6656 #endif
6657                 dbus_bus_remove_match(connection, g_supplicant_rule5, NULL);
6658                 dbus_bus_remove_match(connection, g_supplicant_rule4, NULL);
6659                 dbus_bus_remove_match(connection, g_supplicant_rule3, NULL);
6660                 dbus_bus_remove_match(connection, g_supplicant_rule2, NULL);
6661                 dbus_bus_remove_match(connection, g_supplicant_rule1, NULL);
6662                 dbus_bus_remove_match(connection, g_supplicant_rule0, NULL);
6663                 dbus_connection_flush(connection);
6664
6665                 dbus_connection_remove_filter(connection,
6666                                                 g_supplicant_filter, NULL);
6667         }
6668
6669         if (config_file_table) {
6670                 g_hash_table_destroy(config_file_table);
6671                 config_file_table = NULL;
6672         }
6673
6674         if (bss_mapping) {
6675                 g_hash_table_destroy(bss_mapping);
6676                 bss_mapping = NULL;
6677         }
6678
6679         if (peer_mapping) {
6680                 g_hash_table_destroy(peer_mapping);
6681                 peer_mapping = NULL;
6682         }
6683
6684         if (group_mapping) {
6685                 g_hash_table_destroy(group_mapping);
6686                 group_mapping = NULL;
6687         }
6688
6689         if (interface_table) {
6690                 g_hash_table_foreach(interface_table,
6691                                         unregister_remove_interface, NULL);
6692                 g_hash_table_destroy(interface_table);
6693                 interface_table = NULL;
6694         }
6695
6696         if (system_available)
6697                 callback_system_killed();
6698
6699         if (connection) {
6700                 dbus_connection_unref(connection);
6701                 connection = NULL;
6702         }
6703
6704         callbacks_pointer = NULL;
6705         eap_methods = 0;
6706 }