gsupplicant: Fixed crash issue when network exists in supplicant
[platform/upstream/connman.git] / gsupplicant / supplicant.c
1 /*
2  *
3  *  WPA supplicant library with GLib integration
4  *
5  *  Copyright (C) 2012-2013  Intel Corporation. All rights reserved.
6  *
7  *  This program is free software; you can redistribute it and/or modify
8  *  it under the terms of the GNU General Public License version 2 as
9  *  published by the Free Software Foundation.
10  *
11  *  This program is distributed in the hope that it will be useful,
12  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
13  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14  *  GNU General Public License for more details.
15  *
16  *  You should have received a copy of the GNU General Public License
17  *  along with this program; if not, write to the Free Software
18  *  Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA
19  *
20  */
21
22 #ifdef HAVE_CONFIG_H
23 #include <config.h>
24 #endif
25
26 #include <errno.h>
27 #include <stdio.h>
28 #include <stdlib.h>
29 #include <string.h>
30 #include <stdint.h>
31 #include <syslog.h>
32 #include <ctype.h>
33 #include <stdbool.h>
34 #include <netinet/if_ether.h>
35 #include <netinet/in.h>
36
37 #include <glib.h>
38 #include <gdbus.h>
39
40 #include "dbus.h"
41 #include "gsupplicant.h"
42
43 #define IEEE80211_CAP_ESS       0x0001
44 #define IEEE80211_CAP_IBSS      0x0002
45 #define IEEE80211_CAP_PRIVACY   0x0010
46
47 #if defined TIZEN_EXT
48 #define COUNTRY_CODE_LENGTH     2
49 #endif
50
51 #define BSS_UNKNOWN_STRENGTH    -90
52
53 static DBusConnection *connection;
54
55 static const GSupplicantCallbacks *callbacks_pointer;
56
57 static dbus_bool_t system_available = FALSE;
58 static dbus_bool_t system_ready = FALSE;
59
60 static dbus_int32_t debug_level;
61 static dbus_bool_t debug_timestamp = FALSE;
62 static dbus_bool_t debug_showkeys = FALSE;
63
64 static const char *debug_strings[] = {
65         "msgdump", "debug", "info", "warning", "error", NULL
66 };
67
68 static unsigned int eap_methods;
69
70 struct strvalmap {
71         const char *str;
72         unsigned int val;
73 };
74
75 static struct strvalmap eap_method_map[] = {
76         { "MD5",        G_SUPPLICANT_EAP_METHOD_MD5     },
77         { "TLS",        G_SUPPLICANT_EAP_METHOD_TLS     },
78         { "MSCHAPV2",   G_SUPPLICANT_EAP_METHOD_MSCHAPV2        },
79         { "PEAP",       G_SUPPLICANT_EAP_METHOD_PEAP    },
80         { "TTLS",       G_SUPPLICANT_EAP_METHOD_TTLS    },
81         { "GTC",        G_SUPPLICANT_EAP_METHOD_GTC     },
82         { "OTP",        G_SUPPLICANT_EAP_METHOD_OTP     },
83         { "LEAP",       G_SUPPLICANT_EAP_METHOD_LEAP    },
84         { "WSC",        G_SUPPLICANT_EAP_METHOD_WSC     },
85         { }
86 };
87
88 static struct strvalmap keymgmt_map[] = {
89         { "none",               G_SUPPLICANT_KEYMGMT_NONE               },
90         { "ieee8021x",          G_SUPPLICANT_KEYMGMT_IEEE8021X  },
91         { "wpa-none",           G_SUPPLICANT_KEYMGMT_WPA_NONE   },
92         { "wpa-psk",            G_SUPPLICANT_KEYMGMT_WPA_PSK    },
93         { "wpa-psk-sha256",     G_SUPPLICANT_KEYMGMT_WPA_PSK_256        },
94         { "wpa-ft-psk",         G_SUPPLICANT_KEYMGMT_WPA_FT_PSK },
95         { "wpa-ft-eap",         G_SUPPLICANT_KEYMGMT_WPA_FT_EAP },
96         { "wpa-eap",            G_SUPPLICANT_KEYMGMT_WPA_EAP    },
97         { "wpa-eap-sha256",     G_SUPPLICANT_KEYMGMT_WPA_EAP_256        },
98         { "wps",                G_SUPPLICANT_KEYMGMT_WPS                },
99         { }
100 };
101
102 static struct strvalmap authalg_capa_map[] = {
103         { "open",       G_SUPPLICANT_CAPABILITY_AUTHALG_OPEN    },
104         { "shared",     G_SUPPLICANT_CAPABILITY_AUTHALG_SHARED  },
105         { "leap",       G_SUPPLICANT_CAPABILITY_AUTHALG_LEAP    },
106         { }
107 };
108
109 static struct strvalmap proto_capa_map[] = {
110         { "wpa",        G_SUPPLICANT_CAPABILITY_PROTO_WPA               },
111         { "rsn",        G_SUPPLICANT_CAPABILITY_PROTO_RSN               },
112         { }
113 };
114
115 static struct strvalmap group_map[] = {
116         { "wep40",      G_SUPPLICANT_GROUP_WEP40        },
117         { "wep104",     G_SUPPLICANT_GROUP_WEP104       },
118         { "tkip",       G_SUPPLICANT_GROUP_TKIP },
119         { "ccmp",       G_SUPPLICANT_GROUP_CCMP },
120         { }
121 };
122
123 static struct strvalmap pairwise_map[] = {
124         { "none",       G_SUPPLICANT_PAIRWISE_NONE      },
125         { "tkip",       G_SUPPLICANT_PAIRWISE_TKIP      },
126         { "ccmp",       G_SUPPLICANT_PAIRWISE_CCMP      },
127         { }
128 };
129
130 static struct strvalmap scan_capa_map[] = {
131         { "active",     G_SUPPLICANT_CAPABILITY_SCAN_ACTIVE     },
132         { "passive",    G_SUPPLICANT_CAPABILITY_SCAN_PASSIVE    },
133         { "ssid",       G_SUPPLICANT_CAPABILITY_SCAN_SSID               },
134         { }
135 };
136
137 static struct strvalmap mode_capa_map[] = {
138         { "infrastructure",     G_SUPPLICANT_CAPABILITY_MODE_INFRA      },
139         { "ad-hoc",             G_SUPPLICANT_CAPABILITY_MODE_IBSS       },
140         { "ap",                 G_SUPPLICANT_CAPABILITY_MODE_AP         },
141         { "p2p",                G_SUPPLICANT_CAPABILITY_MODE_P2P        },
142         { }
143 };
144
145 static GHashTable *interface_table;
146 static GHashTable *bss_mapping;
147 static GHashTable *peer_mapping;
148 static GHashTable *group_mapping;
149 static GHashTable *pending_peer_connection;
150 static GHashTable *config_file_table;
151
152 struct _GSupplicantWpsCredentials {
153         unsigned char ssid[32];
154         unsigned int ssid_len;
155         char *key;
156 };
157
158 struct added_network_information {
159         char * ssid;
160         GSupplicantSecurity security;
161         char * passphrase;
162         char * private_passphrase;
163 };
164
165 struct _GSupplicantInterface {
166         char *path;
167         char *network_path;
168         unsigned int keymgmt_capa;
169         unsigned int authalg_capa;
170         unsigned int proto_capa;
171         unsigned int group_capa;
172         unsigned int pairwise_capa;
173         unsigned int scan_capa;
174         unsigned int mode_capa;
175         unsigned int max_scan_ssids;
176         bool p2p_support;
177         bool p2p_finding;
178         bool ap_create_in_progress;
179         dbus_bool_t ready;
180         GSupplicantState state;
181         dbus_bool_t scanning;
182         GSupplicantInterfaceCallback scan_callback;
183         void *scan_data;
184         int apscan;
185         char *ifname;
186         char *driver;
187         char *bridge;
188         struct _GSupplicantWpsCredentials wps_cred;
189         GSupplicantWpsState wps_state;
190         GHashTable *network_table;
191         GHashTable *peer_table;
192         GHashTable *group_table;
193         GHashTable *bss_mapping;
194         void *data;
195         const char *pending_peer_path;
196         GSupplicantNetwork *current_network;
197         struct added_network_information network_info;
198 #if defined TIZEN_EXT
199         int disconnect_reason;
200 #endif
201 };
202
203 struct g_supplicant_bss {
204         GSupplicantInterface *interface;
205         char *path;
206         unsigned char bssid[6];
207         unsigned char ssid[32];
208         unsigned int ssid_len;
209         dbus_uint16_t frequency;
210         dbus_uint32_t maxrate;
211         dbus_int16_t signal;
212         GSupplicantMode mode;
213         GSupplicantSecurity security;
214         dbus_bool_t rsn_selected;
215         unsigned int wpa_keymgmt;
216         unsigned int wpa_pairwise;
217         unsigned int wpa_group;
218         unsigned int rsn_keymgmt;
219         unsigned int rsn_pairwise;
220         unsigned int rsn_group;
221         unsigned int keymgmt;
222         dbus_bool_t privacy;
223         dbus_bool_t psk;
224         dbus_bool_t ieee8021x;
225 #if defined TIZEN_EXT
226         dbus_bool_t ft_psk;
227         dbus_bool_t ft_ieee8021x;
228         GSList *vsie_list;
229         dbus_bool_t hs20;
230         unsigned char country_code[COUNTRY_CODE_LENGTH];
231 #endif
232         unsigned int wps_capabilities;
233 };
234
235 struct _GSupplicantNetwork {
236         GSupplicantInterface *interface;
237         char *path;
238         char *group;
239         char *name;
240         unsigned char ssid[32];
241         unsigned int ssid_len;
242         dbus_int16_t signal;
243         dbus_uint16_t frequency;
244         struct g_supplicant_bss *best_bss;
245         GSupplicantMode mode;
246         GSupplicantSecurity security;
247         dbus_bool_t wps;
248         unsigned int wps_capabilities;
249         GHashTable *bss_table;
250         GHashTable *config_table;
251 #if defined TIZEN_EXT
252         bool isHS20AP;
253         char *eap;
254         char *identity;
255         char *phase2;
256         unsigned int keymgmt;
257         GSList *vsie_list;
258         unsigned char country_code[COUNTRY_CODE_LENGTH];
259 #endif
260 };
261
262 struct _GSupplicantPeer {
263         GSupplicantInterface *interface;
264         char *path;
265         unsigned char device_address[ETH_ALEN];
266         unsigned char iface_address[ETH_ALEN];
267         char *name;
268         unsigned char *widi_ies;
269         int widi_ies_length;
270         char *identifier;
271         unsigned int wps_capabilities;
272         GSList *groups;
273         const GSupplicantInterface *current_group_iface;
274         bool connection_requested;
275 };
276
277 struct _GSupplicantGroup {
278         GSupplicantInterface *interface;
279         GSupplicantInterface *orig_interface;
280         char *path;
281         int role;
282         GSList *members;
283 };
284
285 struct interface_data {
286         GSupplicantInterface *interface;
287         char *path; /* Interface path cannot be taken from interface (above) as
288                      * it might have been freed already.
289                      */
290         GSupplicantInterfaceCallback callback;
291         void *user_data;
292         bool network_remove_in_progress;
293         GSupplicantSSID *ssid;
294 };
295
296 struct interface_create_data {
297         char *ifname;
298         char *driver;
299         char *bridge;
300         GSupplicantInterface *interface;
301         GSupplicantInterfaceCallback callback;
302         void *user_data;
303 };
304
305 struct interface_connect_data {
306         GSupplicantInterface *interface;
307         char *path;
308         GSupplicantInterfaceCallback callback;
309         void *user_data;
310         union {
311                 GSupplicantSSID *ssid;
312                 GSupplicantPeerParams *peer;
313         };
314 };
315
316 struct interface_scan_data {
317         GSupplicantInterface *interface;
318         char *path;
319         GSupplicantInterfaceCallback callback;
320         GSupplicantScanParams *scan_params;
321         void *user_data;
322 };
323
324 #if defined TIZEN_EXT
325 struct g_connman_bssids {
326         char bssid[18];
327         uint16_t strength;
328         uint16_t frequency;
329 };
330 #endif
331
332 static int network_remove(struct interface_data *data);
333
334 static inline void debug(const char *format, ...)
335 {
336         char str[256];
337         va_list ap;
338
339         if (!callbacks_pointer || !callbacks_pointer->debug)
340                 return;
341
342         va_start(ap, format);
343
344         if (vsnprintf(str, sizeof(str), format, ap) > 0)
345                 callbacks_pointer->debug(str);
346
347         va_end(ap);
348 }
349
350 #define SUPPLICANT_DBG(fmt, arg...) \
351         debug("%s:%s() " fmt, __FILE__, __FUNCTION__ , ## arg);
352
353 static GSupplicantMode string2mode(const char *mode)
354 {
355         if (!mode)
356                 return G_SUPPLICANT_MODE_UNKNOWN;
357
358         if (g_str_equal(mode, "infrastructure"))
359                 return G_SUPPLICANT_MODE_INFRA;
360         else if (g_str_equal(mode, "ad-hoc"))
361                 return G_SUPPLICANT_MODE_IBSS;
362
363         return G_SUPPLICANT_MODE_UNKNOWN;
364 }
365
366 static const char *mode2string(GSupplicantMode mode)
367 {
368         switch (mode) {
369         case G_SUPPLICANT_MODE_UNKNOWN:
370                 break;
371         case G_SUPPLICANT_MODE_INFRA:
372                 return "managed";
373         case G_SUPPLICANT_MODE_IBSS:
374                 return "adhoc";
375         case G_SUPPLICANT_MODE_MASTER:
376                 return "ap";
377         }
378
379         return NULL;
380 }
381
382 static const char *security2string(GSupplicantSecurity security)
383 {
384         switch (security) {
385         case G_SUPPLICANT_SECURITY_UNKNOWN:
386                 break;
387         case G_SUPPLICANT_SECURITY_NONE:
388                 return "none";
389         case G_SUPPLICANT_SECURITY_WEP:
390                 return "wep";
391         case G_SUPPLICANT_SECURITY_PSK:
392                 return "psk";
393         case G_SUPPLICANT_SECURITY_IEEE8021X:
394                 return "ieee8021x";
395 #if defined TIZEN_EXT
396         case G_SUPPLICANT_SECURITY_FT_PSK:
397                 return "ft_psk";
398         case G_SUPPLICANT_SECURITY_FT_IEEE8021X:
399                 return "ft_ieee8021x";
400 #endif
401         }
402
403         return NULL;
404 }
405
406 static GSupplicantState string2state(const char *state)
407 {
408         if (!state)
409                 return G_SUPPLICANT_STATE_UNKNOWN;
410
411         if (g_str_equal(state, "unknown"))
412                 return G_SUPPLICANT_STATE_UNKNOWN;
413         else if (g_str_equal(state, "interface_disabled"))
414                 return G_SUPPLICANT_STATE_DISABLED;
415         else if (g_str_equal(state, "disconnected"))
416                 return G_SUPPLICANT_STATE_DISCONNECTED;
417         else if (g_str_equal(state, "inactive"))
418                 return G_SUPPLICANT_STATE_INACTIVE;
419         else if (g_str_equal(state, "scanning"))
420                 return G_SUPPLICANT_STATE_SCANNING;
421         else if (g_str_equal(state, "authenticating"))
422                 return G_SUPPLICANT_STATE_AUTHENTICATING;
423         else if (g_str_equal(state, "associating"))
424                 return G_SUPPLICANT_STATE_ASSOCIATING;
425         else if (g_str_equal(state, "associated"))
426                 return G_SUPPLICANT_STATE_ASSOCIATED;
427         else if (g_str_equal(state, "group_handshake"))
428                 return G_SUPPLICANT_STATE_GROUP_HANDSHAKE;
429         else if (g_str_equal(state, "4way_handshake"))
430                 return G_SUPPLICANT_STATE_4WAY_HANDSHAKE;
431         else if (g_str_equal(state, "completed"))
432                 return G_SUPPLICANT_STATE_COMPLETED;
433
434         return G_SUPPLICANT_STATE_UNKNOWN;
435 }
436
437 static bool compare_network_parameters(GSupplicantInterface *interface,
438                                 GSupplicantSSID *ssid)
439 {
440 #if defined TIZEN_EXT
441         if (!interface->network_info.ssid)
442                 return FALSE;
443 #endif
444
445         if (memcmp(interface->network_info.ssid, ssid->ssid, ssid->ssid_len))
446                 return FALSE;
447
448         if (interface->network_info.security != ssid->security)
449                 return FALSE;
450
451         if (interface->network_info.passphrase &&
452                         g_strcmp0(interface->network_info.passphrase,
453                                 ssid->passphrase) != 0) {
454                 return FALSE;
455         }
456
457         if (interface->network_info.private_passphrase &&
458                         g_strcmp0(interface->network_info.private_passphrase,
459                                 ssid->private_key_passphrase) != 0) {
460                 return FALSE;
461         }
462
463         return TRUE;
464 }
465
466 static void remove_network_information(GSupplicantInterface * interface)
467 {
468         g_free(interface->network_info.ssid);
469         g_free(interface->network_info.passphrase);
470         g_free(interface->network_info.private_passphrase);
471         interface->network_info.ssid = NULL;
472         interface->network_info.passphrase = NULL;
473         interface->network_info.private_passphrase = NULL;
474 }
475
476 static int store_network_information(GSupplicantInterface * interface,
477                                 GSupplicantSSID *ssid)
478 {
479         interface->network_info.ssid = g_malloc(ssid->ssid_len + 1);
480         if (interface->network_info.ssid != NULL) {
481                 memcpy(interface->network_info.ssid, ssid->ssid,
482                         ssid->ssid_len);
483                 interface->network_info.ssid[ssid->ssid_len] = '\0';
484         } else {
485                 return -ENOMEM;
486         }
487
488         interface->network_info.security = ssid->security;
489
490         if ((ssid->security == G_SUPPLICANT_SECURITY_WEP ||
491                 ssid->security == G_SUPPLICANT_SECURITY_PSK ||
492                 ssid->security == G_SUPPLICANT_SECURITY_NONE) &&
493                 ssid->passphrase) {
494                 interface->network_info.passphrase = g_strdup(ssid->passphrase);
495         }
496
497         if (ssid->security == G_SUPPLICANT_SECURITY_IEEE8021X &&
498                         ssid->private_key_passphrase) {
499                 interface->network_info.private_passphrase =
500                         g_strdup(ssid->private_key_passphrase);
501         }
502
503         return 0;
504 }
505
506 static void callback_system_ready(void)
507 {
508         if (system_ready)
509                 return;
510
511         system_ready = TRUE;
512
513         if (!callbacks_pointer)
514                 return;
515
516         if (!callbacks_pointer->system_ready)
517                 return;
518
519         callbacks_pointer->system_ready();
520 }
521
522 static void callback_system_killed(void)
523 {
524         system_ready = FALSE;
525
526         if (!callbacks_pointer)
527                 return;
528
529         if (!callbacks_pointer->system_killed)
530                 return;
531
532         callbacks_pointer->system_killed();
533 }
534
535 static void callback_interface_added(GSupplicantInterface *interface)
536 {
537         SUPPLICANT_DBG("");
538
539         if (!callbacks_pointer)
540                 return;
541
542         if (!callbacks_pointer->interface_added)
543                 return;
544
545         callbacks_pointer->interface_added(interface);
546 }
547
548 static void callback_interface_state(GSupplicantInterface *interface)
549 {
550         if (!callbacks_pointer)
551                 return;
552
553         if (!callbacks_pointer->interface_state)
554                 return;
555
556         callbacks_pointer->interface_state(interface);
557 }
558
559 static void callback_interface_removed(GSupplicantInterface *interface)
560 {
561         if (!callbacks_pointer)
562                 return;
563
564         if (!callbacks_pointer->interface_removed)
565                 return;
566
567         callbacks_pointer->interface_removed(interface);
568 }
569
570 #if !defined TIZEN_EXT
571 static void callback_p2p_support(GSupplicantInterface *interface)
572 {
573         SUPPLICANT_DBG("");
574
575         if (!interface->p2p_support)
576                 return;
577
578         if (callbacks_pointer && callbacks_pointer->p2p_support)
579                 callbacks_pointer->p2p_support(interface);
580 }
581 #endif
582
583 static void callback_scan_started(GSupplicantInterface *interface)
584 {
585         if (!callbacks_pointer)
586                 return;
587
588         if (!callbacks_pointer->scan_started)
589                 return;
590
591         callbacks_pointer->scan_started(interface);
592 }
593
594 static void callback_ap_create_fail(GSupplicantInterface *interface)
595 {
596         if (!callbacks_pointer)
597                 return;
598
599         if (!callbacks_pointer->ap_create_fail)
600                 return;
601
602         callbacks_pointer->ap_create_fail(interface);
603 }
604
605 static void callback_scan_finished(GSupplicantInterface *interface)
606 {
607         if (!callbacks_pointer)
608                 return;
609
610         if (!callbacks_pointer->scan_finished)
611                 return;
612
613         callbacks_pointer->scan_finished(interface);
614 }
615
616 static void callback_network_added(GSupplicantNetwork *network)
617 {
618         if (!callbacks_pointer)
619                 return;
620
621         if (!callbacks_pointer->network_added)
622                 return;
623
624         callbacks_pointer->network_added(network);
625 }
626
627 static void callback_network_removed(GSupplicantNetwork *network)
628 {
629         if (!callbacks_pointer)
630                 return;
631
632         if (!callbacks_pointer->network_removed)
633                 return;
634
635         callbacks_pointer->network_removed(network);
636 }
637
638 #if defined TIZEN_EXT
639 static void callback_network_merged(GSupplicantNetwork *network)
640 {
641         if (!callbacks_pointer)
642                 return;
643
644         if (!callbacks_pointer->network_merged)
645                 return;
646
647         callbacks_pointer->network_merged(network);
648 }
649
650 static void callback_assoc_failed(void *user_data)
651 {
652         if (!callbacks_pointer)
653                 return;
654
655         if (!callbacks_pointer->assoc_failed)
656                 return;
657
658         callbacks_pointer->assoc_failed(user_data);
659 }
660 #endif
661
662 static void callback_network_changed(GSupplicantNetwork *network,
663                                         const char *property)
664 {
665         if (!callbacks_pointer)
666                 return;
667
668         if (!callbacks_pointer->network_changed)
669                 return;
670
671         callbacks_pointer->network_changed(network, property);
672 }
673
674 static void callback_network_associated(GSupplicantNetwork *network)
675 {
676         if (!callbacks_pointer)
677                 return;
678
679         if (!callbacks_pointer->network_associated)
680                 return;
681
682         callbacks_pointer->network_associated(network);
683 }
684
685 static void callback_peer_found(GSupplicantPeer *peer)
686 {
687         if (!callbacks_pointer)
688                 return;
689
690         if (!callbacks_pointer->peer_found)
691                 return;
692
693         callbacks_pointer->peer_found(peer);
694 }
695
696 static void callback_peer_lost(GSupplicantPeer *peer)
697 {
698         if (!callbacks_pointer)
699                 return;
700
701         if (!callbacks_pointer->peer_lost)
702                 return;
703
704         callbacks_pointer->peer_lost(peer);
705 }
706
707 static void callback_peer_changed(GSupplicantPeer *peer,
708                                                 GSupplicantPeerState state)
709 {
710         if (!callbacks_pointer)
711                 return;
712
713         if (!callbacks_pointer->peer_changed)
714                 return;
715
716         callbacks_pointer->peer_changed(peer, state);
717 }
718
719 static void callback_peer_request(GSupplicantPeer *peer)
720 {
721         if (!callbacks_pointer)
722                 return;
723
724         if (!callbacks_pointer->peer_request)
725                 return;
726
727         peer->connection_requested = true;
728
729         callbacks_pointer->peer_request(peer);
730 }
731
732 static void callback_disconnect_reason_code(GSupplicantInterface *interface,
733                                         int reason_code)
734 {
735         if (!callbacks_pointer)
736                 return;
737
738         if (!callbacks_pointer->disconnect_reasoncode)
739                 return;
740
741         if (reason_code != 0)
742                 callbacks_pointer->disconnect_reasoncode(interface,
743                                                         reason_code);
744 }
745
746 static void callback_assoc_status_code(GSupplicantInterface *interface,
747                                 int status_code)
748 {
749         if (!callbacks_pointer)
750                 return;
751
752         if (!callbacks_pointer->assoc_status_code)
753                 return;
754
755         callbacks_pointer->assoc_status_code(interface, status_code);
756
757 }
758
759 static void remove_group(gpointer data)
760 {
761         GSupplicantGroup *group = data;
762
763         if (group->members)
764                 g_slist_free_full(group->members, g_free);
765
766         g_free(group->path);
767         g_free(group);
768 }
769
770 static void remove_interface(gpointer data)
771 {
772         GSupplicantInterface *interface = data;
773
774         g_hash_table_destroy(interface->bss_mapping);
775         g_hash_table_destroy(interface->network_table);
776         g_hash_table_destroy(interface->peer_table);
777         g_hash_table_destroy(interface->group_table);
778
779         if (interface->scan_callback) {
780                 SUPPLICANT_DBG("call interface %p callback %p scanning %d",
781                                 interface, interface->scan_callback,
782                                 interface->scanning);
783
784                 interface->scan_callback(-EIO, interface, interface->scan_data);
785                 interface->scan_callback = NULL;
786                 interface->scan_data = NULL;
787
788                 if (interface->scanning) {
789                         interface->scanning = FALSE;
790                         callback_scan_finished(interface);
791                 }
792         }
793
794         callback_interface_removed(interface);
795
796         g_free(interface->wps_cred.key);
797         g_free(interface->path);
798         g_free(interface->network_path);
799 #if defined TIZEN_EXT
800         interface->network_path = NULL;
801 #endif
802         g_free(interface->ifname);
803         g_free(interface->driver);
804         g_free(interface->bridge);
805         remove_network_information(interface);
806         g_free(interface);
807 }
808
809 static void remove_network(gpointer data)
810 {
811         GSupplicantNetwork *network = data;
812
813         g_hash_table_destroy(network->bss_table);
814
815         callback_network_removed(network);
816
817         g_hash_table_destroy(network->config_table);
818
819         g_free(network->path);
820         g_free(network->group);
821         g_free(network->name);
822 #if defined TIZEN_EXT
823         g_free(network->eap);
824         g_free(network->identity);
825         g_free(network->phase2);
826 #endif
827 #if defined TIZEN_EXT
828         g_slist_free_full(network->vsie_list, g_free);
829 #endif
830
831         g_free(network);
832 }
833
834 static void remove_bss(gpointer data)
835 {
836         struct g_supplicant_bss *bss = data;
837
838         g_free(bss->path);
839 #if defined TIZEN_EXT
840         g_slist_free_full(bss->vsie_list, g_free);
841 #endif
842         g_free(bss);
843 }
844
845 static void remove_peer(gpointer data)
846 {
847         GSupplicantPeer *peer = data;
848
849         callback_peer_lost(peer);
850
851         if (peer->groups)
852                 g_slist_free_full(peer->groups, g_free);
853
854         if (peer_mapping)
855                 g_hash_table_remove(peer_mapping, peer->path);
856
857         if (pending_peer_connection)
858                 g_hash_table_remove(pending_peer_connection, peer->path);
859
860         g_free(peer->path);
861         g_free(peer->name);
862         g_free(peer->identifier);
863         g_free(peer->widi_ies);
864
865         g_free(peer);
866 }
867
868 static void debug_strvalmap(const char *label, struct strvalmap *map,
869                                                         unsigned int val)
870 {
871         int i;
872
873         for (i = 0; map[i].str; i++) {
874                 if (val & map[i].val)
875                         SUPPLICANT_DBG("%s: %s", label, map[i].str);
876         }
877 }
878
879 static void interface_capability_keymgmt(DBusMessageIter *iter, void *user_data)
880 {
881         GSupplicantInterface *interface = user_data;
882         const char *str = NULL;
883         int i;
884
885         dbus_message_iter_get_basic(iter, &str);
886         if (!str)
887                 return;
888
889         for (i = 0; keymgmt_map[i].str; i++)
890                 if (strcmp(str, keymgmt_map[i].str) == 0) {
891                         interface->keymgmt_capa |= keymgmt_map[i].val;
892                         break;
893                 }
894 }
895
896 static void interface_capability_authalg(DBusMessageIter *iter, void *user_data)
897 {
898         GSupplicantInterface *interface = user_data;
899         const char *str = NULL;
900         int i;
901
902         dbus_message_iter_get_basic(iter, &str);
903         if (!str)
904                 return;
905
906         for (i = 0; authalg_capa_map[i].str; i++)
907                 if (strcmp(str, authalg_capa_map[i].str) == 0) {
908                         interface->authalg_capa |= authalg_capa_map[i].val;
909                         break;
910                 }
911 }
912
913 static void interface_capability_proto(DBusMessageIter *iter, void *user_data)
914 {
915         GSupplicantInterface *interface = user_data;
916         const char *str = NULL;
917         int i;
918
919         dbus_message_iter_get_basic(iter, &str);
920         if (!str)
921                 return;
922
923         for (i = 0; proto_capa_map[i].str; i++)
924                 if (strcmp(str, proto_capa_map[i].str) == 0) {
925                         interface->proto_capa |= proto_capa_map[i].val;
926                         break;
927                 }
928 }
929
930 static void interface_capability_pairwise(DBusMessageIter *iter,
931                                                         void *user_data)
932 {
933         GSupplicantInterface *interface = user_data;
934         const char *str = NULL;
935         int i;
936
937         dbus_message_iter_get_basic(iter, &str);
938         if (!str)
939                 return;
940
941         for (i = 0; pairwise_map[i].str; i++)
942                 if (strcmp(str, pairwise_map[i].str) == 0) {
943                         interface->pairwise_capa |= pairwise_map[i].val;
944                         break;
945                 }
946 }
947
948 static void interface_capability_group(DBusMessageIter *iter, void *user_data)
949 {
950         GSupplicantInterface *interface = user_data;
951         const char *str = NULL;
952         int i;
953
954         dbus_message_iter_get_basic(iter, &str);
955         if (!str)
956                 return;
957
958         for (i = 0; group_map[i].str; i++)
959                 if (strcmp(str, group_map[i].str) == 0) {
960                         interface->group_capa |= group_map[i].val;
961                         break;
962                 }
963 }
964
965 static void interface_capability_scan(DBusMessageIter *iter, void *user_data)
966 {
967         GSupplicantInterface *interface = user_data;
968         const char *str = NULL;
969         int i;
970
971         dbus_message_iter_get_basic(iter, &str);
972         if (!str)
973                 return;
974
975         for (i = 0; scan_capa_map[i].str; i++)
976                 if (strcmp(str, scan_capa_map[i].str) == 0) {
977                         interface->scan_capa |= scan_capa_map[i].val;
978                         break;
979                 }
980 }
981
982 static void interface_capability_mode(DBusMessageIter *iter, void *user_data)
983 {
984         GSupplicantInterface *interface = user_data;
985         const char *str = NULL;
986         int i;
987
988         dbus_message_iter_get_basic(iter, &str);
989         if (!str)
990                 return;
991
992         for (i = 0; mode_capa_map[i].str; i++)
993                 if (strcmp(str, mode_capa_map[i].str) == 0) {
994                         interface->mode_capa |= mode_capa_map[i].val;
995                         break;
996                 }
997 }
998
999 static void interface_capability(const char *key, DBusMessageIter *iter,
1000                                                         void *user_data)
1001 {
1002         GSupplicantInterface *interface = user_data;
1003
1004         if (!key)
1005                 return;
1006
1007         if (g_strcmp0(key, "KeyMgmt") == 0)
1008                 supplicant_dbus_array_foreach(iter,
1009                                 interface_capability_keymgmt, interface);
1010         else if (g_strcmp0(key, "AuthAlg") == 0)
1011                 supplicant_dbus_array_foreach(iter,
1012                                 interface_capability_authalg, interface);
1013         else if (g_strcmp0(key, "Protocol") == 0)
1014                 supplicant_dbus_array_foreach(iter,
1015                                 interface_capability_proto, interface);
1016         else if (g_strcmp0(key, "Pairwise") == 0)
1017                 supplicant_dbus_array_foreach(iter,
1018                                 interface_capability_pairwise, interface);
1019         else if (g_strcmp0(key, "Group") == 0)
1020                 supplicant_dbus_array_foreach(iter,
1021                                 interface_capability_group, interface);
1022         else if (g_strcmp0(key, "Scan") == 0)
1023                 supplicant_dbus_array_foreach(iter,
1024                                 interface_capability_scan, interface);
1025         else if (g_strcmp0(key, "Modes") == 0)
1026                 supplicant_dbus_array_foreach(iter,
1027                                 interface_capability_mode, interface);
1028         else if (g_strcmp0(key, "MaxScanSSID") == 0) {
1029                 dbus_int32_t max_scan_ssid;
1030
1031                 dbus_message_iter_get_basic(iter, &max_scan_ssid);
1032                 if (max_scan_ssid < 2)
1033                         max_scan_ssid = 0;
1034                 interface->max_scan_ssids = max_scan_ssid;
1035
1036         } else
1037                 SUPPLICANT_DBG("key %s type %c",
1038                                 key, dbus_message_iter_get_arg_type(iter));
1039 }
1040
1041 struct set_apscan_data
1042 {
1043         unsigned int ap_scan;
1044         GSupplicantInterface *interface;
1045 };
1046
1047 static void set_apscan(DBusMessageIter *iter, void *user_data)
1048 {
1049         struct set_apscan_data *data = user_data;
1050         unsigned int ap_scan = data->ap_scan;
1051
1052         dbus_message_iter_append_basic(iter, DBUS_TYPE_UINT32, &ap_scan);
1053 }
1054
1055 static void set_apscan_complete(const char *error,
1056                 DBusMessageIter *iter, void *user_data)
1057 {
1058         struct set_apscan_data *data = user_data;
1059         GSupplicantInterface *interface = data->interface;
1060
1061         if (error) {
1062                 interface->ap_create_in_progress = false;
1063                 SUPPLICANT_DBG("Set AP scan error %s", error);
1064                 goto error;
1065         }
1066
1067         interface->ap_create_in_progress = true;
1068 error:
1069         dbus_free(data);
1070 }
1071
1072 int g_supplicant_interface_set_apscan(GSupplicantInterface *interface,
1073                                                         unsigned int ap_scan)
1074 {
1075         struct set_apscan_data *data;
1076         int ret;
1077
1078         data = dbus_malloc0(sizeof(*data));
1079
1080         if (!data)
1081                 return -ENOMEM;
1082
1083         data->ap_scan = ap_scan;
1084         data->interface = interface;
1085
1086         ret = supplicant_dbus_property_set(interface->path,
1087                         SUPPLICANT_INTERFACE ".Interface",
1088                         "ApScan", DBUS_TYPE_UINT32_AS_STRING,
1089                         set_apscan, set_apscan_complete, data, NULL);
1090         if (ret < 0)
1091                 dbus_free(data);
1092
1093         return ret;
1094 }
1095
1096 void g_supplicant_interface_set_data(GSupplicantInterface *interface,
1097                                                                 void *data)
1098 {
1099         if (!interface)
1100                 return;
1101
1102         interface->data = data;
1103
1104         if (!data)
1105                 interface->scan_callback = NULL;
1106 }
1107
1108 void *g_supplicant_interface_get_data(GSupplicantInterface *interface)
1109 {
1110         if (!interface)
1111                 return NULL;
1112
1113         return interface->data;
1114 }
1115
1116 const char *g_supplicant_interface_get_ifname(GSupplicantInterface *interface)
1117 {
1118         if (!interface)
1119                 return NULL;
1120
1121         return interface->ifname;
1122 }
1123
1124 const char *g_supplicant_interface_get_driver(GSupplicantInterface *interface)
1125 {
1126         if (!interface)
1127                 return NULL;
1128
1129         return interface->driver;
1130 }
1131
1132 GSupplicantState g_supplicant_interface_get_state(
1133                                         GSupplicantInterface *interface)
1134 {
1135         if (!interface)
1136                 return G_SUPPLICANT_STATE_UNKNOWN;
1137
1138         return interface->state;
1139 }
1140
1141 const char *g_supplicant_interface_get_wps_key(GSupplicantInterface *interface)
1142 {
1143         if (!interface)
1144                 return NULL;
1145
1146         return (const char *)interface->wps_cred.key;
1147 }
1148
1149 const void *g_supplicant_interface_get_wps_ssid(GSupplicantInterface *interface,
1150                                                         unsigned int *ssid_len)
1151 {
1152         if (!ssid_len)
1153                 return NULL;
1154
1155         if (!interface || interface->wps_cred.ssid_len == 0) {
1156                 *ssid_len = 0;
1157                 return NULL;
1158         }
1159
1160         *ssid_len = interface->wps_cred.ssid_len;
1161         return interface->wps_cred.ssid;
1162 }
1163
1164 GSupplicantWpsState g_supplicant_interface_get_wps_state(
1165                                         GSupplicantInterface *interface)
1166 {
1167         if (!interface)
1168                 return G_SUPPLICANT_WPS_STATE_UNKNOWN;
1169
1170         return interface->wps_state;
1171 }
1172
1173 unsigned int g_supplicant_interface_get_mode(GSupplicantInterface *interface)
1174 {
1175         if (!interface)
1176                 return 0;
1177
1178         return interface->mode_capa;
1179 }
1180
1181 unsigned int g_supplicant_interface_get_max_scan_ssids(
1182                                 GSupplicantInterface *interface)
1183 {
1184         if (!interface)
1185                 return 0;
1186
1187         if (interface->max_scan_ssids == 0)
1188                 return WPAS_MAX_SCAN_SSIDS;
1189
1190         return interface->max_scan_ssids;
1191 }
1192
1193 static void set_network_enabled(DBusMessageIter *iter, void *user_data)
1194 {
1195         dbus_bool_t enable = *(dbus_bool_t *)user_data;
1196
1197         dbus_message_iter_append_basic(iter, DBUS_TYPE_BOOLEAN, &enable);
1198 }
1199
1200 int g_supplicant_interface_enable_selected_network(GSupplicantInterface *interface,
1201                                                         dbus_bool_t enable)
1202 {
1203         if (!interface)
1204                 return -1;
1205
1206         if (!interface->network_path)
1207                 return -1;
1208
1209         SUPPLICANT_DBG(" ");
1210         return supplicant_dbus_property_set(interface->network_path,
1211                                 SUPPLICANT_INTERFACE ".Network",
1212                                 "Enabled", DBUS_TYPE_BOOLEAN_AS_STRING,
1213                                 set_network_enabled, NULL, &enable, NULL);
1214 }
1215
1216 dbus_bool_t g_supplicant_interface_get_ready(GSupplicantInterface *interface)
1217 {
1218         if (!interface)
1219                 return FALSE;
1220
1221         return interface->ready;
1222 }
1223
1224 GSupplicantInterface *g_supplicant_network_get_interface(
1225                                         GSupplicantNetwork *network)
1226 {
1227         if (!network)
1228                 return NULL;
1229
1230         return network->interface;
1231 }
1232
1233 const char *g_supplicant_network_get_name(GSupplicantNetwork *network)
1234 {
1235         if (!network || !network->name)
1236                 return "";
1237
1238         return network->name;
1239 }
1240
1241 const char *g_supplicant_network_get_identifier(GSupplicantNetwork *network)
1242 {
1243         if (!network || !network->group)
1244                 return "";
1245
1246         return network->group;
1247 }
1248
1249 const char *g_supplicant_network_get_path(GSupplicantNetwork *network)
1250 {
1251         if (!network || !network->path)
1252                 return NULL;
1253
1254         return network->path;
1255 }
1256
1257 const char *g_supplicant_network_get_mode(GSupplicantNetwork *network)
1258 {
1259         if (!network)
1260                 return G_SUPPLICANT_MODE_UNKNOWN;
1261
1262         return mode2string(network->mode);
1263 }
1264
1265 const char *g_supplicant_network_get_security(GSupplicantNetwork *network)
1266 {
1267         if (!network)
1268                 return G_SUPPLICANT_SECURITY_UNKNOWN;
1269
1270         return security2string(network->security);
1271 }
1272
1273 const void *g_supplicant_network_get_ssid(GSupplicantNetwork *network,
1274                                                 unsigned int *ssid_len)
1275 {
1276         if (!network) {
1277                 *ssid_len = 0;
1278                 return NULL;
1279         }
1280
1281         *ssid_len = network->ssid_len;
1282         return network->ssid;
1283 }
1284
1285 dbus_int16_t g_supplicant_network_get_signal(GSupplicantNetwork *network)
1286 {
1287         if (!network)
1288                 return 0;
1289
1290         return network->signal;
1291 }
1292
1293 dbus_uint16_t g_supplicant_network_get_frequency(GSupplicantNetwork *network)
1294 {
1295         if (!network)
1296                 return 0;
1297
1298         return network->frequency;
1299 }
1300
1301 dbus_bool_t g_supplicant_network_get_wps(GSupplicantNetwork *network)
1302 {
1303         if (!network)
1304                 return FALSE;
1305
1306         return network->wps;
1307 }
1308
1309 dbus_bool_t g_supplicant_network_is_wps_active(GSupplicantNetwork *network)
1310 {
1311         if (!network)
1312                 return FALSE;
1313
1314         if (network->wps_capabilities & G_SUPPLICANT_WPS_CONFIGURED)
1315                 return TRUE;
1316
1317         return FALSE;
1318 }
1319
1320 dbus_bool_t g_supplicant_network_is_wps_pbc(GSupplicantNetwork *network)
1321 {
1322         if (!network)
1323                 return FALSE;
1324
1325         if (network->wps_capabilities & G_SUPPLICANT_WPS_PBC)
1326                 return TRUE;
1327
1328         return FALSE;
1329 }
1330
1331 dbus_bool_t g_supplicant_network_is_wps_advertizing(GSupplicantNetwork *network)
1332 {
1333         if (!network)
1334                 return FALSE;
1335
1336         if (network->wps_capabilities & G_SUPPLICANT_WPS_REGISTRAR)
1337                 return TRUE;
1338
1339         return FALSE;
1340 }
1341
1342 GSupplicantInterface *g_supplicant_peer_get_interface(GSupplicantPeer *peer)
1343 {
1344         if (!peer)
1345                 return NULL;
1346
1347         return peer->interface;
1348 }
1349
1350 const char *g_supplicant_peer_get_path(GSupplicantPeer *peer)
1351 {
1352         if (!peer)
1353                 return NULL;
1354
1355         return peer->path;
1356 }
1357
1358 const char *g_supplicant_peer_get_identifier(GSupplicantPeer *peer)
1359 {
1360         if (!peer)
1361                 return NULL;
1362
1363         return peer->identifier;
1364 }
1365
1366 const void *g_supplicant_peer_get_device_address(GSupplicantPeer *peer)
1367 {
1368         if (!peer)
1369                 return NULL;
1370
1371         return peer->device_address;
1372 }
1373
1374 const void *g_supplicant_peer_get_iface_address(GSupplicantPeer *peer)
1375 {
1376         if (!peer)
1377                 return NULL;
1378
1379         return peer->iface_address;
1380 }
1381
1382 const char *g_supplicant_peer_get_name(GSupplicantPeer *peer)
1383 {
1384         if (!peer)
1385                 return NULL;
1386
1387         return peer->name;
1388 }
1389
1390 #if defined TIZEN_EXT
1391 bool g_supplicant_network_is_hs20AP(GSupplicantNetwork *network)
1392 {
1393         if (!network)
1394                 return 0;
1395
1396         return network->isHS20AP;
1397 }
1398
1399 const char *g_supplicant_network_get_eap(GSupplicantNetwork *network)
1400 {
1401         if (!network || !network->eap)
1402                 return NULL;
1403
1404         return network->eap;
1405 }
1406
1407 const char *g_supplicant_network_get_identity(GSupplicantNetwork *network)
1408 {
1409         if (!network || !network->identity)
1410                 return NULL;
1411
1412         return network->identity;
1413 }
1414
1415 const char *g_supplicant_network_get_phase2(GSupplicantNetwork *network)
1416 {
1417         if (!network || !network->phase2)
1418                 return NULL;
1419
1420         return network->phase2;
1421 }
1422
1423 unsigned int g_supplicant_network_get_keymgmt(GSupplicantNetwork *network)
1424 {
1425         if (network == NULL)
1426                 return 0;
1427
1428         return network->keymgmt;
1429 }
1430
1431 const unsigned char *g_supplicant_network_get_countrycode(GSupplicantNetwork
1432                                                           *network)
1433 {
1434         if (!network)
1435                 return NULL;
1436
1437         return network->country_code;
1438 }
1439 #endif
1440
1441 const unsigned char *g_supplicant_peer_get_widi_ies(GSupplicantPeer *peer,
1442                                                                 int *length)
1443 {
1444         if (!peer || !length)
1445                 return NULL;
1446
1447         *length = peer->widi_ies_length;
1448         return peer->widi_ies;
1449 }
1450
1451 bool g_supplicant_peer_is_wps_pbc(GSupplicantPeer *peer)
1452 {
1453         if (!peer)
1454                 return false;
1455
1456         if (peer->wps_capabilities & G_SUPPLICANT_WPS_PBC)
1457                 return true;
1458
1459         return false;
1460 }
1461
1462 bool g_supplicant_peer_is_wps_pin(GSupplicantPeer *peer)
1463 {
1464         if (!peer)
1465                 return false;
1466
1467         if (peer->wps_capabilities & G_SUPPLICANT_WPS_PIN)
1468                 return true;
1469
1470         return false;
1471 }
1472
1473 bool g_supplicant_peer_is_in_a_group(GSupplicantPeer *peer)
1474 {
1475         if (!peer || !peer->groups)
1476                 return false;
1477
1478         return true;
1479 }
1480
1481 GSupplicantInterface *g_supplicant_peer_get_group_interface(GSupplicantPeer *peer)
1482 {
1483         if (!peer)
1484                 return NULL;
1485
1486         return (GSupplicantInterface *) peer->current_group_iface;
1487 }
1488
1489 bool g_supplicant_peer_is_client(GSupplicantPeer *peer)
1490 {
1491         GSupplicantGroup *group;
1492         GSList *list;
1493
1494         if (!peer)
1495                 return false;
1496
1497         for (list = peer->groups; list; list = list->next) {
1498                 const char *path = list->data;
1499
1500                 group = g_hash_table_lookup(group_mapping, path);
1501                 if (!group)
1502                         continue;
1503
1504                 if (group->role != G_SUPPLICANT_GROUP_ROLE_CLIENT ||
1505                                 group->orig_interface != peer->interface)
1506                         continue;
1507
1508                 if (group->interface == peer->current_group_iface)
1509                         return true;
1510         }
1511
1512         return false;
1513 }
1514
1515 bool g_supplicant_peer_has_requested_connection(GSupplicantPeer *peer)
1516 {
1517         if (!peer)
1518                 return false;
1519
1520         return peer->connection_requested;
1521 }
1522
1523 #if defined TIZEN_EXT
1524 /*
1525  * Description: Network client requires additional wifi specific info
1526  */
1527 const unsigned char *g_supplicant_network_get_bssid(GSupplicantNetwork *network)
1528 {
1529         if (network == NULL || network->best_bss == NULL)
1530                 return NULL;
1531
1532         return (const unsigned char *)network->best_bss->bssid;
1533 }
1534
1535 unsigned int g_supplicant_network_get_maxrate(GSupplicantNetwork *network)
1536 {
1537         if (network == NULL || network->best_bss == NULL)
1538                 return 0;
1539
1540         return network->best_bss->maxrate;
1541 }
1542
1543 const char *g_supplicant_network_get_enc_mode(GSupplicantNetwork *network)
1544 {
1545         if (network == NULL || network->best_bss == NULL)
1546                 return NULL;
1547
1548         if (network->best_bss->security == G_SUPPLICANT_SECURITY_PSK ||
1549             network->best_bss->security == G_SUPPLICANT_SECURITY_IEEE8021X) {
1550                 unsigned int pairwise;
1551
1552                 pairwise = network->best_bss->rsn_pairwise |
1553                                 network->best_bss->wpa_pairwise;
1554
1555                 if ((pairwise & G_SUPPLICANT_PAIRWISE_CCMP) &&
1556                     (pairwise & G_SUPPLICANT_PAIRWISE_TKIP))
1557                         return "mixed";
1558                 else if (pairwise & G_SUPPLICANT_PAIRWISE_CCMP)
1559                         return "aes";
1560                 else if (pairwise & G_SUPPLICANT_PAIRWISE_TKIP)
1561                         return "tkip";
1562
1563         } else if (network->best_bss->security == G_SUPPLICANT_SECURITY_WEP)
1564                 return "wep";
1565         else if (network->best_bss->security == G_SUPPLICANT_SECURITY_NONE)
1566                 return "none";
1567
1568         return NULL;
1569 }
1570
1571 bool g_supplicant_network_get_rsn_mode(GSupplicantNetwork *network)
1572 {
1573         if (network == NULL || network->best_bss == NULL)
1574                 return 0;
1575
1576         if (network->best_bss->rsn_selected) {
1577                 const char *mode = g_supplicant_network_get_enc_mode(network);
1578                 if (g_strcmp0(mode, "aes") == 0 ||
1579                                 g_strcmp0(mode, "mixed") == 0)
1580                         return true;
1581                 else
1582                         return false;
1583         } else
1584                 return false;
1585 }
1586
1587 void *g_supplicant_network_get_wifi_vsie(GSupplicantNetwork *network)
1588 {
1589         GSList *vsie_list = NULL;
1590
1591         if (!network)
1592                 return NULL;
1593
1594         if (g_slist_length(network->vsie_list) > 0) {
1595                 GSList *list = NULL;
1596                 unsigned char *vsie = NULL;
1597                 for (list = network->vsie_list; list; list = list->next) {
1598                         unsigned char *ie = (unsigned char *)list->data;
1599                         vsie = (unsigned char *)g_try_malloc0(ie[1]+2); // tag number size(1), tag length size(1)
1600
1601                         if (vsie) {
1602                                 memcpy(vsie, ie, ie[1]+2);
1603                                 vsie_list = g_slist_append(vsie_list, vsie);
1604                         } else
1605                                 SUPPLICANT_DBG("Failed to allocate memory");
1606                 }
1607         }
1608
1609         return vsie_list;
1610 }
1611
1612 static void update_bssid_list(gpointer key, gpointer value, gpointer user_data)
1613 {
1614         struct g_supplicant_bss *bss = value;
1615         struct g_connman_bssids *bssids = NULL;
1616         char buff[18];
1617         GSList **list = (GSList **)user_data;
1618
1619         bssids = (struct g_connman_bssids *)g_try_malloc0(sizeof(struct g_connman_bssids));
1620
1621         if (bssids) {
1622                 g_snprintf(buff, 18, "%02x:%02x:%02x:%02x:%02x:%02x",
1623                                 bss->bssid[0], bss->bssid[1], bss->bssid[2], bss->bssid[3],
1624                                 bss->bssid[4], bss->bssid[5]);
1625
1626                 memcpy(bssids->bssid, buff, 18);
1627                 bssids->bssid[17] = '\0';
1628                 bssids->strength = bss->signal;
1629                 bssids->strength += 120;
1630
1631                 if (bssids->strength > 100)
1632                         bssids->strength = 100;
1633
1634                 bssids->frequency = bss->frequency;
1635                 *list = g_slist_append(*list, bssids);
1636         } else
1637                 SUPPLICANT_DBG("Failed to allocate memory");
1638 }
1639
1640 void *g_supplicant_network_get_bssid_list(GSupplicantNetwork *network)
1641 {
1642         GSList *bssid_list = NULL;
1643
1644         if (g_hash_table_size(network->bss_table) < 1)
1645                 return NULL;
1646
1647         g_hash_table_foreach(network->bss_table, update_bssid_list, &bssid_list);
1648
1649         return bssid_list;
1650 }
1651 #endif
1652
1653 static void merge_network(GSupplicantNetwork *network)
1654 {
1655         GString *str;
1656         const char *ssid, *mode, *key_mgmt;
1657 #if defined TIZEN_EXT
1658         GSupplicantInterface *interface;
1659         const char *isHS20AP;
1660         const char *eap, *identity, *phase2;
1661 #endif
1662         unsigned int i, ssid_len;
1663         char *group;
1664
1665         ssid = g_hash_table_lookup(network->config_table, "ssid");
1666         mode = g_hash_table_lookup(network->config_table, "mode");
1667         key_mgmt = g_hash_table_lookup(network->config_table, "key_mgmt");
1668 #if defined TIZEN_EXT
1669         isHS20AP = g_hash_table_lookup(network->config_table, "isHS20AP");
1670         eap = g_hash_table_lookup(network->config_table, "eap");
1671         identity = g_hash_table_lookup(network->config_table, "identity");
1672         phase2 = g_hash_table_lookup(network->config_table, "phase2");
1673         interface = network->interface;
1674 #endif
1675
1676         SUPPLICANT_DBG("ssid %s mode %s", ssid, mode);
1677
1678         if (ssid)
1679                 ssid_len = strlen(ssid);
1680         else
1681                 ssid_len = 0;
1682
1683         str = g_string_sized_new((ssid_len * 2) + 24);
1684         if (!str)
1685                 return;
1686
1687         for (i = 0; i < ssid_len; i++)
1688 #if defined TIZEN_EXT
1689         {
1690                 if (ssid[i] != '"')
1691 #endif
1692                 g_string_append_printf(str, "%02x", ssid[i]);
1693 #if defined TIZEN_EXT
1694         }
1695 #endif
1696
1697         if (g_strcmp0(mode, "0") == 0)
1698                 g_string_append_printf(str, "_managed");
1699         else if (g_strcmp0(mode, "1") == 0)
1700                 g_string_append_printf(str, "_adhoc");
1701
1702         if (g_strcmp0(key_mgmt, "WPA-PSK") == 0)
1703                 g_string_append_printf(str, "_psk");
1704 #if defined TIZEN_EXT
1705         else if (g_strcmp0(key_mgmt, "WPA-EAP") == 0)
1706                 g_string_append_printf(str, "_ieee8021x");
1707         else
1708                 g_string_append_printf(str, "_none");
1709 #endif
1710
1711         group = g_string_free(str, FALSE);
1712
1713         SUPPLICANT_DBG("%s", group);
1714
1715 #if defined TIZEN_EXT
1716         if (g_strcmp0(isHS20AP, "1") == 0) {
1717                 network->isHS20AP = 1;
1718                 if (network->eap)
1719                         g_free(network->eap);
1720                 network->eap = g_strdup(eap);
1721
1722                 if (network->identity)
1723                         g_free(network->identity);
1724                 network->identity = g_strdup(identity);
1725
1726                 if (network->phase2)
1727                         g_free(network->phase2);
1728                 network->phase2 = g_strdup(phase2);
1729         } else
1730                 network->isHS20AP = 0;
1731
1732         if (interface)
1733                 interface->network_path = g_strdup(network->path);
1734
1735         network->group = g_strdup(group);
1736         callback_network_merged(network);
1737 #endif
1738
1739         g_free(group);
1740
1741         g_hash_table_destroy(network->config_table);
1742
1743         g_free(network->path);
1744         g_free(network);
1745 }
1746
1747 static void network_property(const char *key, DBusMessageIter *iter,
1748                                                         void *user_data)
1749 {
1750         GSupplicantNetwork *network = user_data;
1751
1752         if (!network->interface)
1753                 return;
1754
1755         if (!key) {
1756                 merge_network(network);
1757                 return;
1758         }
1759
1760         if (g_strcmp0(key, "Enabled") == 0) {
1761                 dbus_bool_t enabled = FALSE;
1762
1763                 dbus_message_iter_get_basic(iter, &enabled);
1764         } else if (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_STRING) {
1765                 const char *str = NULL;
1766
1767                 dbus_message_iter_get_basic(iter, &str);
1768                 if (str) {
1769                         g_hash_table_replace(network->config_table,
1770                                                 g_strdup(key), g_strdup(str));
1771                 }
1772         } else
1773                 SUPPLICANT_DBG("key %s type %c",
1774                                 key, dbus_message_iter_get_arg_type(iter));
1775 }
1776
1777 static void interface_network_added(DBusMessageIter *iter, void *user_data)
1778 {
1779         GSupplicantInterface *interface = user_data;
1780         GSupplicantNetwork *network;
1781         const char *path = NULL;
1782
1783         SUPPLICANT_DBG("");
1784
1785         dbus_message_iter_get_basic(iter, &path);
1786         if (!path)
1787                 return;
1788
1789         if (g_strcmp0(path, "/") == 0)
1790                 return;
1791
1792         network = g_try_new0(GSupplicantNetwork, 1);
1793         if (!network)
1794                 return;
1795
1796         network->interface = interface;
1797         network->path = g_strdup(path);
1798
1799         network->config_table = g_hash_table_new_full(g_str_hash, g_str_equal,
1800                                                         g_free, g_free);
1801
1802         dbus_message_iter_next(iter);
1803         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
1804                 supplicant_dbus_property_foreach(iter, network_property,
1805                                                                 network);
1806                 network_property(NULL, NULL, network);
1807                 return;
1808         }
1809
1810         supplicant_dbus_property_get_all(path,
1811                                 SUPPLICANT_INTERFACE ".Network",
1812                                         network_property, network, NULL);
1813 }
1814
1815 static void interface_network_removed(DBusMessageIter *iter, void *user_data)
1816 {
1817         SUPPLICANT_DBG("");
1818         return;
1819 }
1820
1821 static char *create_name(unsigned char *ssid, int ssid_len)
1822 {
1823         GString *string;
1824         const gchar *remainder, *invalid;
1825         int valid_bytes, remaining_bytes;
1826
1827         if (ssid_len < 1 || ssid[0] == '\0')
1828                 return g_strdup("");
1829
1830         string = NULL;
1831         remainder = (const gchar *)ssid;
1832         remaining_bytes = ssid_len;
1833
1834         while (remaining_bytes != 0) {
1835                 if (g_utf8_validate(remainder, remaining_bytes,
1836                                         &invalid)) {
1837                         break;
1838                 }
1839
1840                 valid_bytes = invalid - remainder;
1841
1842                 if (!string)
1843                         string = g_string_sized_new(remaining_bytes);
1844
1845                 g_string_append_len(string, remainder, valid_bytes);
1846
1847                 /* append U+FFFD REPLACEMENT CHARACTER */
1848                 g_string_append(string, "\357\277\275");
1849
1850                 remaining_bytes -= valid_bytes + 1;
1851                 remainder = invalid + 1;
1852         }
1853
1854         if (!string)
1855                 return g_strndup((const gchar *)ssid, ssid_len + 1);
1856
1857         g_string_append(string, remainder);
1858
1859         return g_string_free(string, FALSE);
1860 }
1861
1862 static char *create_group(struct g_supplicant_bss *bss)
1863 {
1864         GString *str;
1865         unsigned int i;
1866         const char *mode, *security;
1867
1868         str = g_string_sized_new((bss->ssid_len * 2) + 24);
1869         if (!str)
1870                 return NULL;
1871
1872         if (bss->ssid_len > 0 && bss->ssid[0] != '\0') {
1873                 for (i = 0; i < bss->ssid_len; i++)
1874                         g_string_append_printf(str, "%02x", bss->ssid[i]);
1875         } else
1876                 g_string_append_printf(str, "hidden");
1877
1878         mode = mode2string(bss->mode);
1879         if (mode)
1880                 g_string_append_printf(str, "_%s", mode);
1881
1882         security = security2string(bss->security);
1883         if (security)
1884                 g_string_append_printf(str, "_%s", security);
1885
1886         return g_string_free(str, FALSE);
1887 }
1888
1889 static int add_or_replace_bss_to_network(struct g_supplicant_bss *bss)
1890 {
1891         GSupplicantInterface *interface = bss->interface;
1892         GSupplicantNetwork *network;
1893         char *group;
1894
1895         group = create_group(bss);
1896         SUPPLICANT_DBG("New group created: %s", group);
1897
1898         if (!group)
1899                 return -ENOMEM;
1900
1901         network = g_hash_table_lookup(interface->network_table, group);
1902         if (network) {
1903                 g_free(group);
1904                 SUPPLICANT_DBG("Network %s already exist", network->name);
1905
1906                 goto done;
1907         }
1908
1909         network = g_try_new0(GSupplicantNetwork, 1);
1910         if (!network) {
1911                 g_free(group);
1912                 return -ENOMEM;
1913         }
1914
1915         network->interface = interface;
1916         if (!network->path)
1917                 network->path = g_strdup(bss->path);
1918         network->group = group;
1919         network->name = create_name(bss->ssid, bss->ssid_len);
1920         network->mode = bss->mode;
1921         network->security = bss->security;
1922         network->ssid_len = bss->ssid_len;
1923         memcpy(network->ssid, bss->ssid, bss->ssid_len);
1924         network->signal = bss->signal;
1925         network->frequency = bss->frequency;
1926         network->best_bss = bss;
1927
1928 #if defined TIZEN_EXT
1929         network->keymgmt = bss->keymgmt;
1930
1931         if (g_slist_length(bss->vsie_list) > 0) {
1932                 GSList *list = NULL;
1933                 unsigned char *vsie = NULL;
1934                 for (list = bss->vsie_list; list; list = list->next) {
1935                         unsigned char *ie = (unsigned char *)list->data;
1936                         vsie = (unsigned char *)g_try_malloc0(ie[1]+2); // tag number size(1), tag length size(1)
1937
1938                         if (vsie) {
1939                                 memcpy(vsie, ie, ie[1]+2);
1940                                 network->vsie_list = g_slist_append(network->vsie_list, vsie);
1941                         } else
1942                                 SUPPLICANT_DBG("Failed to allocate memory.");
1943                 }
1944         }
1945
1946         network->isHS20AP = bss->hs20;
1947         memcpy(network->country_code, bss->country_code, COUNTRY_CODE_LENGTH);
1948 #endif
1949
1950         SUPPLICANT_DBG("New network %s created", network->name);
1951
1952         network->bss_table = g_hash_table_new_full(g_str_hash, g_str_equal,
1953                                                         NULL, remove_bss);
1954
1955         network->config_table = g_hash_table_new_full(g_str_hash, g_str_equal,
1956                                                         g_free, g_free);
1957
1958         g_hash_table_replace(interface->network_table,
1959                                                 network->group, network);
1960
1961         callback_network_added(network);
1962
1963 done:
1964         /* We update network's WPS properties if only bss provides WPS. */
1965         if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
1966                 network->wps = TRUE;
1967                 network->wps_capabilities |= bss->wps_capabilities;
1968         }
1969
1970         /*
1971          * Do not change best BSS if we are connected. It will be done through
1972          * CurrentBSS property in case of misalignment with wpa_s or roaming.
1973          */
1974         if (network != interface->current_network &&
1975                                 bss->signal > network->signal) {
1976                 network->signal = bss->signal;
1977                 network->best_bss = bss;
1978                 callback_network_changed(network, "Signal");
1979         }
1980
1981         g_hash_table_replace(interface->bss_mapping, bss->path, network);
1982         g_hash_table_replace(network->bss_table, bss->path, bss);
1983
1984         g_hash_table_replace(bss_mapping, bss->path, interface);
1985
1986         return 0;
1987 }
1988
1989 static void bss_rates(DBusMessageIter *iter, void *user_data)
1990 {
1991         struct g_supplicant_bss *bss = user_data;
1992         dbus_uint32_t rate = 0;
1993
1994         dbus_message_iter_get_basic(iter, &rate);
1995         if (rate == 0)
1996                 return;
1997
1998         if (rate > bss->maxrate)
1999                 bss->maxrate = rate;
2000 }
2001
2002 static void bss_keymgmt(DBusMessageIter *iter, void *user_data)
2003 {
2004         unsigned int *keymgmt = user_data;
2005         const char *str = NULL;
2006         int i;
2007
2008         dbus_message_iter_get_basic(iter, &str);
2009         if (!str)
2010                 return;
2011
2012         for (i = 0; keymgmt_map[i].str; i++)
2013                 if (strcmp(str, keymgmt_map[i].str) == 0) {
2014                         SUPPLICANT_DBG("Keymgmt: %s", str);
2015                         *keymgmt |= keymgmt_map[i].val;
2016                         break;
2017                 }
2018 }
2019
2020 static void bss_group(DBusMessageIter *iter, void *user_data)
2021 {
2022         unsigned int *group = user_data;
2023         const char *str = NULL;
2024         int i;
2025
2026         dbus_message_iter_get_basic(iter, &str);
2027         if (!str)
2028                 return;
2029
2030         for (i = 0; group_map[i].str; i++)
2031                 if (strcmp(str, group_map[i].str) == 0) {
2032                         SUPPLICANT_DBG("Group: %s", str);
2033                         *group |= group_map[i].val;
2034                         break;
2035                 }
2036 }
2037
2038 static void bss_pairwise(DBusMessageIter *iter, void *user_data)
2039 {
2040         unsigned int *pairwise = user_data;
2041         const char *str = NULL;
2042         int i;
2043
2044         dbus_message_iter_get_basic(iter, &str);
2045         if (!str)
2046                 return;
2047
2048         for (i = 0; pairwise_map[i].str; i++)
2049                 if (strcmp(str, pairwise_map[i].str) == 0) {
2050                         SUPPLICANT_DBG("Pairwise: %s", str);
2051                         *pairwise |= pairwise_map[i].val;
2052                         break;
2053                 }
2054 }
2055
2056 static void bss_wpa(const char *key, DBusMessageIter *iter,
2057                         void *user_data)
2058 {
2059         struct g_supplicant_bss *bss = user_data;
2060         unsigned int value = 0;
2061
2062         SUPPLICANT_DBG("Key: %s", key);
2063
2064         if (g_strcmp0(key, "KeyMgmt") == 0) {
2065                 supplicant_dbus_array_foreach(iter, bss_keymgmt, &value);
2066
2067                 if (bss->rsn_selected)
2068                         bss->rsn_keymgmt = value;
2069                 else
2070                         bss->wpa_keymgmt = value;
2071         } else if (g_strcmp0(key, "Group") == 0) {
2072                 supplicant_dbus_array_foreach(iter, bss_group, &value);
2073
2074                 if (bss->rsn_selected)
2075                         bss->rsn_group = value;
2076                 else
2077                         bss->wpa_group = value;
2078         } else if (g_strcmp0(key, "Pairwise") == 0) {
2079                 supplicant_dbus_array_foreach(iter, bss_pairwise, &value);
2080
2081                 if (bss->rsn_selected)
2082                         bss->rsn_pairwise = value;
2083                 else
2084                         bss->wpa_pairwise = value;
2085         }
2086 }
2087
2088 static unsigned int get_tlv(unsigned char *ie, unsigned int ie_size,
2089                                                         unsigned int type)
2090 {
2091         unsigned int len = 0;
2092
2093         while (len + 4 < ie_size) {
2094                 unsigned int hi = ie[len];
2095                 unsigned int lo = ie[len + 1];
2096                 unsigned int tmp_type = (hi << 8) + lo;
2097                 unsigned int v_len = 0;
2098
2099                 /* hi and lo are used to recreate an unsigned int
2100                  * based on 2 8bits length unsigned int. */
2101
2102                 hi = ie[len + 2];
2103                 lo = ie[len + 3];
2104                 v_len = (hi << 8) + lo;
2105
2106                 if (tmp_type == type) {
2107                         unsigned int ret_value = 0;
2108                         unsigned char *value = (unsigned char *)&ret_value;
2109
2110                         SUPPLICANT_DBG("IE: match type 0x%x", type);
2111
2112                         /* Verifying length relevance */
2113                         if (v_len > sizeof(unsigned int) ||
2114                                 len + 4 + v_len > ie_size)
2115                                 break;
2116
2117                         memcpy(value, ie + len + 4, v_len);
2118
2119                         SUPPLICANT_DBG("returning 0x%x", ret_value);
2120                         return ret_value;
2121                 }
2122
2123                 len += v_len + 4;
2124         }
2125
2126         SUPPLICANT_DBG("returning 0");
2127         return 0;
2128 }
2129
2130 static void bss_process_ies(DBusMessageIter *iter, void *user_data)
2131 {
2132         struct g_supplicant_bss *bss = user_data;
2133         const unsigned char WPS_OUI[] = { 0x00, 0x50, 0xf2, 0x04 };
2134         unsigned char *ie, *ie_end;
2135         DBusMessageIter array;
2136         unsigned int value;
2137         int ie_len;
2138
2139 #define WMM_WPA1_WPS_INFO 221
2140 #define WPS_INFO_MIN_LEN  6
2141 #define WPS_VERSION_TLV   0x104A
2142 #define WPS_STATE_TLV     0x1044
2143 #define WPS_METHODS_TLV   0x1012
2144 #define WPS_REGISTRAR_TLV 0x1041
2145 #define WPS_VERSION       0x10
2146 #define WPS_PBC           0x04
2147 #define WPS_PIN           0x00
2148 #define WPS_CONFIGURED    0x02
2149 #if defined TIZEN_EXT
2150 #define VENDOR_SPECIFIC_INFO 0xDD
2151 #define WLAN_EID_COUNTRY 7
2152 #endif
2153
2154         dbus_message_iter_recurse(iter, &array);
2155         dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
2156
2157         if (!ie || ie_len < 2)
2158                 return;
2159
2160         bss->wps_capabilities = 0;
2161         bss->keymgmt = 0;
2162         memset(bss->country_code, 0, COUNTRY_CODE_LENGTH);
2163
2164         for (ie_end = ie + ie_len; ie < ie_end && ie + ie[1] + 1 <= ie_end;
2165                                                         ie += ie[1] + 2) {
2166 #if defined TIZEN_EXT
2167                 unsigned char *vsie;
2168                 int vsie_len = 0;
2169                 if(ie[0] == VENDOR_SPECIFIC_INFO && memcmp(ie+2, WPS_OUI, sizeof(WPS_OUI)) != 0) {
2170                         SUPPLICANT_DBG("IE: match vendor specific data");
2171
2172                         vsie_len = ie[1]+2;     // tag number size(1), tag length size(1)
2173                         vsie = (unsigned char *)g_try_malloc0(vsie_len);
2174
2175                         if (vsie) {
2176                                 memcpy(vsie, ie, vsie_len);
2177                                 bss->vsie_list = g_slist_append(bss->vsie_list, vsie);
2178                         } else
2179                                 SUPPLICANT_DBG("Failed to allocate memory");
2180                         continue;
2181                 }
2182
2183                 if(ie[0] == WLAN_EID_COUNTRY && ie[1] >= 2) {
2184                         memcpy(bss->country_code, ie+2, COUNTRY_CODE_LENGTH);
2185                         continue;
2186                 }
2187 #endif
2188                 if (ie[0] != WMM_WPA1_WPS_INFO || ie[1] < WPS_INFO_MIN_LEN ||
2189                         memcmp(ie+2, WPS_OUI, sizeof(WPS_OUI)) != 0)
2190                         continue;
2191
2192                 SUPPLICANT_DBG("IE: match WPS_OUI");
2193
2194                 value = get_tlv(&ie[6], ie[1], WPS_STATE_TLV);
2195                 if (get_tlv(&ie[6], ie[1], WPS_VERSION_TLV) == WPS_VERSION &&
2196                                                                 value != 0) {
2197                         bss->keymgmt |= G_SUPPLICANT_KEYMGMT_WPS;
2198
2199                         if (value == WPS_CONFIGURED)
2200                                 bss->wps_capabilities |=
2201                                         G_SUPPLICANT_WPS_CONFIGURED;
2202                 }
2203
2204                 value = get_tlv(&ie[6], ie[1], WPS_METHODS_TLV);
2205                 if (value != 0) {
2206                         if (GUINT16_FROM_BE(value) == WPS_PBC)
2207                                 bss->wps_capabilities |= G_SUPPLICANT_WPS_PBC;
2208                         if (GUINT16_FROM_BE(value) == WPS_PIN)
2209                                 bss->wps_capabilities |= G_SUPPLICANT_WPS_PIN;
2210                 } else
2211                         bss->wps_capabilities |=
2212                                 G_SUPPLICANT_WPS_PBC | G_SUPPLICANT_WPS_PIN;
2213
2214                 /* If the AP sends this it means it's advertizing
2215                  * as a registrar and the WPS process is launched
2216                  * on its side */
2217                 if (get_tlv(&ie[6], ie[1], WPS_REGISTRAR_TLV) != 0)
2218                         bss->wps_capabilities |= G_SUPPLICANT_WPS_REGISTRAR;
2219
2220                 SUPPLICANT_DBG("WPS Methods 0x%x", bss->wps_capabilities);
2221         }
2222 }
2223
2224 static void bss_compute_security(struct g_supplicant_bss *bss)
2225 {
2226         /*
2227          * Combining RSN and WPA keymgmt
2228          * We combine it since parsing IEs might have set something for WPS. */
2229         bss->keymgmt |= bss->rsn_keymgmt | bss->wpa_keymgmt;
2230
2231         bss->ieee8021x = FALSE;
2232         bss->psk = FALSE;
2233 #if defined TIZEN_EXT
2234         bss->ft_ieee8021x = FALSE;
2235         bss->ft_psk = FALSE;
2236 #endif
2237
2238 #if defined TIZEN_EXT
2239         if (bss->keymgmt &
2240                         (G_SUPPLICANT_KEYMGMT_WPA_EAP |
2241                                         G_SUPPLICANT_KEYMGMT_WPA_EAP_256))
2242                 bss->ieee8021x = TRUE;
2243         else if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_EAP)
2244                 bss->ft_ieee8021x = TRUE;
2245 #else
2246         if (bss->keymgmt &
2247                         (G_SUPPLICANT_KEYMGMT_WPA_EAP |
2248                                 G_SUPPLICANT_KEYMGMT_WPA_FT_EAP |
2249                                 G_SUPPLICANT_KEYMGMT_WPA_EAP_256))
2250                 bss->ieee8021x = TRUE;
2251 #endif
2252
2253 #if defined TIZEN_EXT
2254         if (bss->keymgmt &
2255                         (G_SUPPLICANT_KEYMGMT_WPA_PSK |
2256                                         G_SUPPLICANT_KEYMGMT_WPA_PSK_256))
2257                 bss->psk = TRUE;
2258         else if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_PSK)
2259                 bss->ft_psk = TRUE;
2260 #else
2261         if (bss->keymgmt &
2262                         (G_SUPPLICANT_KEYMGMT_WPA_PSK |
2263                                 G_SUPPLICANT_KEYMGMT_WPA_FT_PSK |
2264                                 G_SUPPLICANT_KEYMGMT_WPA_PSK_256))
2265                 bss->psk = TRUE;
2266 #endif
2267
2268         if (bss->ieee8021x)
2269                 bss->security = G_SUPPLICANT_SECURITY_IEEE8021X;
2270         else if (bss->psk)
2271                 bss->security = G_SUPPLICANT_SECURITY_PSK;
2272 #if defined TIZEN_EXT
2273         else if (bss->ft_psk)
2274                 bss->security = G_SUPPLICANT_SECURITY_FT_PSK;
2275         else if (bss->ft_ieee8021x == TRUE)
2276                 bss->security = G_SUPPLICANT_SECURITY_IEEE8021X;
2277 #endif
2278         else if (bss->privacy)
2279                 bss->security = G_SUPPLICANT_SECURITY_WEP;
2280         else
2281                 bss->security = G_SUPPLICANT_SECURITY_NONE;
2282 }
2283
2284
2285 static void bss_property(const char *key, DBusMessageIter *iter,
2286                                                         void *user_data)
2287 {
2288         struct g_supplicant_bss *bss = user_data;
2289
2290         if (!bss->interface)
2291                 return;
2292
2293         SUPPLICANT_DBG("key %s", key);
2294
2295         if (!key)
2296                 return;
2297
2298         if (g_strcmp0(key, "BSSID") == 0) {
2299                 DBusMessageIter array;
2300                 unsigned char *addr;
2301                 int addr_len;
2302
2303                 dbus_message_iter_recurse(iter, &array);
2304                 dbus_message_iter_get_fixed_array(&array, &addr, &addr_len);
2305
2306                 if (addr_len == 6)
2307                         memcpy(bss->bssid, addr, addr_len);
2308         } else if (g_strcmp0(key, "SSID") == 0) {
2309                 DBusMessageIter array;
2310                 unsigned char *ssid;
2311                 int ssid_len;
2312
2313                 dbus_message_iter_recurse(iter, &array);
2314                 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
2315
2316                 if (ssid_len > 0 && ssid_len < 33) {
2317                         memcpy(bss->ssid, ssid, ssid_len);
2318                         bss->ssid_len = ssid_len;
2319                 } else {
2320                         memset(bss->ssid, 0, sizeof(bss->ssid));
2321                         bss->ssid_len = 0;
2322                 }
2323         } else if (g_strcmp0(key, "Capabilities") == 0) {
2324                 dbus_uint16_t capabilities = 0x0000;
2325
2326                 dbus_message_iter_get_basic(iter, &capabilities);
2327
2328                 if (capabilities & IEEE80211_CAP_ESS)
2329                         bss->mode = G_SUPPLICANT_MODE_INFRA;
2330                 else if (capabilities & IEEE80211_CAP_IBSS)
2331                         bss->mode = G_SUPPLICANT_MODE_IBSS;
2332
2333                 if (capabilities & IEEE80211_CAP_PRIVACY)
2334                         bss->privacy = TRUE;
2335         } else if (g_strcmp0(key, "Mode") == 0) {
2336                 const char *mode = NULL;
2337
2338                 dbus_message_iter_get_basic(iter, &mode);
2339                 bss->mode = string2mode(mode);
2340         } else if (g_strcmp0(key, "Frequency") == 0) {
2341                 dbus_uint16_t frequency = 0;
2342
2343                 dbus_message_iter_get_basic(iter, &frequency);
2344                 bss->frequency = frequency;
2345         } else if (g_strcmp0(key, "Signal") == 0) {
2346                 dbus_int16_t signal = 0;
2347
2348                 dbus_message_iter_get_basic(iter, &signal);
2349
2350                 bss->signal = signal;
2351                 if (!bss->signal)
2352                         bss->signal = BSS_UNKNOWN_STRENGTH;
2353
2354         } else if (g_strcmp0(key, "Level") == 0) {
2355                 dbus_int32_t level = 0;
2356
2357                 dbus_message_iter_get_basic(iter, &level);
2358         } else if (g_strcmp0(key, "Rates") == 0) {
2359                 supplicant_dbus_array_foreach(iter, bss_rates, bss);
2360         } else if (g_strcmp0(key, "MaxRate") == 0) {
2361                 dbus_uint32_t maxrate = 0;
2362
2363                 dbus_message_iter_get_basic(iter, &maxrate);
2364                 if (maxrate != 0)
2365                         bss->maxrate = maxrate;
2366         } else if (g_strcmp0(key, "Privacy") == 0) {
2367                 dbus_bool_t privacy = FALSE;
2368
2369                 dbus_message_iter_get_basic(iter, &privacy);
2370                 bss->privacy = privacy;
2371         } else if (g_strcmp0(key, "RSN") == 0) {
2372                 bss->rsn_selected = TRUE;
2373
2374                 supplicant_dbus_property_foreach(iter, bss_wpa, bss);
2375         } else if (g_strcmp0(key, "WPA") == 0) {
2376                 bss->rsn_selected = FALSE;
2377
2378                 supplicant_dbus_property_foreach(iter, bss_wpa, bss);
2379 #if defined TIZEN_EXT
2380         } else if (g_strcmp0(key, "HS20") == 0) {
2381                 dbus_bool_t hs20 = FALSE;
2382                 dbus_message_iter_get_basic(iter, &hs20);
2383                 bss->hs20 = hs20;
2384 #endif
2385         } else if (g_strcmp0(key, "IEs") == 0)
2386                 bss_process_ies(iter, bss);
2387         else
2388                 SUPPLICANT_DBG("key %s type %c",
2389                                 key, dbus_message_iter_get_arg_type(iter));
2390 }
2391
2392 static struct g_supplicant_bss *interface_bss_added(DBusMessageIter *iter,
2393                                                         void *user_data)
2394 {
2395         GSupplicantInterface *interface = user_data;
2396         GSupplicantNetwork *network;
2397         struct g_supplicant_bss *bss;
2398         const char *path = NULL;
2399
2400         SUPPLICANT_DBG("");
2401
2402         dbus_message_iter_get_basic(iter, &path);
2403         if (!path)
2404                 return NULL;
2405
2406         if (g_strcmp0(path, "/") == 0)
2407                 return NULL;
2408
2409         SUPPLICANT_DBG("%s", path);
2410
2411         network = g_hash_table_lookup(interface->bss_mapping, path);
2412         if (network) {
2413                 bss = g_hash_table_lookup(network->bss_table, path);
2414                 if (bss)
2415                         return NULL;
2416         }
2417
2418         bss = g_try_new0(struct g_supplicant_bss, 1);
2419         if (!bss)
2420                 return NULL;
2421
2422         bss->interface = interface;
2423         bss->path = g_strdup(path);
2424         bss->signal = BSS_UNKNOWN_STRENGTH;
2425
2426         return bss;
2427 }
2428
2429 static void interface_bss_added_with_keys(DBusMessageIter *iter,
2430                                                 void *user_data)
2431 {
2432         struct g_supplicant_bss *bss;
2433
2434         SUPPLICANT_DBG("");
2435
2436         bss = interface_bss_added(iter, user_data);
2437         if (!bss)
2438                 return;
2439
2440         dbus_message_iter_next(iter);
2441
2442         if (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_INVALID)
2443                 return;
2444
2445         supplicant_dbus_property_foreach(iter, bss_property, bss);
2446
2447         bss_compute_security(bss);
2448         if (add_or_replace_bss_to_network(bss) < 0)
2449                 SUPPLICANT_DBG("add_or_replace_bss_to_network failed");
2450 }
2451
2452 static void interface_bss_added_without_keys(DBusMessageIter *iter,
2453                                                 void *user_data)
2454 {
2455         struct g_supplicant_bss *bss;
2456
2457         SUPPLICANT_DBG("");
2458
2459         bss = interface_bss_added(iter, user_data);
2460         if (!bss)
2461                 return;
2462
2463         supplicant_dbus_property_get_all(bss->path,
2464                                         SUPPLICANT_INTERFACE ".BSS",
2465                                         bss_property, bss, NULL);
2466
2467         bss_compute_security(bss);
2468         if (add_or_replace_bss_to_network(bss) < 0)
2469                         SUPPLICANT_DBG("add_or_replace_bss_to_network failed");
2470 }
2471
2472 static void update_signal(gpointer key, gpointer value,
2473                                                 gpointer user_data)
2474 {
2475         struct g_supplicant_bss *bss = value;
2476         GSupplicantNetwork *network = user_data;
2477
2478         if (bss->signal > network->signal) {
2479                 network->signal = bss->signal;
2480                 network->best_bss = bss;
2481         }
2482 }
2483
2484 static void update_network_signal(GSupplicantNetwork *network)
2485 {
2486         if (g_hash_table_size(network->bss_table) <= 1 && network->best_bss)
2487                 return;
2488
2489         g_hash_table_foreach(network->bss_table,
2490                                 update_signal, network);
2491
2492         SUPPLICANT_DBG("New network signal %d", network->signal);
2493 }
2494
2495 static void interface_current_bss(GSupplicantInterface *interface,
2496                                                 DBusMessageIter *iter)
2497 {
2498         GSupplicantNetwork *network;
2499         struct g_supplicant_bss *bss;
2500         const char *path;
2501
2502         dbus_message_iter_get_basic(iter, &path);
2503         if (g_strcmp0(path, "/") == 0) {
2504                 interface->current_network = NULL;
2505                 return;
2506         }
2507
2508         interface_bss_added_without_keys(iter, interface);
2509
2510         network = g_hash_table_lookup(interface->bss_mapping, path);
2511         if (!network)
2512                 return;
2513
2514         bss = g_hash_table_lookup(network->bss_table, path);
2515         if (!bss)
2516                 return;
2517
2518         interface->current_network = network;
2519
2520         if (bss != network->best_bss) {
2521                 /*
2522                  * This is the case where either wpa_s got associated
2523                  * to a BSS different than the one ConnMan considers
2524                  * the best, or we are roaming.
2525                  */
2526                 SUPPLICANT_DBG("Update best BSS for %s", network->name);
2527
2528                 network->best_bss = bss;
2529
2530                 if (network->signal != bss->signal) {
2531                         SUPPLICANT_DBG("New network signal %d dBm",
2532                                                 bss->signal);
2533
2534                         network->signal = bss->signal;
2535                         callback_network_changed(network, "Signal");
2536                 }
2537         }
2538
2539         /*
2540          * wpa_s could notify about CurrentBSS in any state once
2541          * it got associated. It is not sure such notification will
2542          * arrive together with transition to ASSOCIATED state.
2543          * In fact, for networks with security WEP or OPEN, it
2544          * always arrives together with transition to COMPLETED.
2545          */
2546         switch (interface->state) {
2547         case G_SUPPLICANT_STATE_UNKNOWN:
2548         case G_SUPPLICANT_STATE_DISABLED:
2549         case G_SUPPLICANT_STATE_DISCONNECTED:
2550         case G_SUPPLICANT_STATE_INACTIVE:
2551         case G_SUPPLICANT_STATE_SCANNING:
2552         case G_SUPPLICANT_STATE_AUTHENTICATING:
2553         case G_SUPPLICANT_STATE_ASSOCIATING:
2554                 return;
2555         case G_SUPPLICANT_STATE_ASSOCIATED:
2556         case G_SUPPLICANT_STATE_4WAY_HANDSHAKE:
2557         case G_SUPPLICANT_STATE_GROUP_HANDSHAKE:
2558         case G_SUPPLICANT_STATE_COMPLETED:
2559                 callback_network_associated(network);
2560                 break;
2561         }
2562 }
2563
2564 static void interface_bss_removed(DBusMessageIter *iter, void *user_data)
2565 {
2566         GSupplicantInterface *interface = user_data;
2567         GSupplicantNetwork *network;
2568         struct g_supplicant_bss *bss = NULL;
2569         const char *path = NULL;
2570
2571         dbus_message_iter_get_basic(iter, &path);
2572         if (!path)
2573                 return;
2574
2575         network = g_hash_table_lookup(interface->bss_mapping, path);
2576         if (!network)
2577                 return;
2578
2579         bss = g_hash_table_lookup(network->bss_table, path);
2580         if (network->best_bss == bss) {
2581                 network->best_bss = NULL;
2582                 network->signal = BSS_UNKNOWN_STRENGTH;
2583         }
2584
2585         g_hash_table_remove(bss_mapping, path);
2586
2587         g_hash_table_remove(interface->bss_mapping, path);
2588         g_hash_table_remove(network->bss_table, path);
2589
2590         update_network_signal(network);
2591
2592         if (g_hash_table_size(network->bss_table) == 0)
2593                 g_hash_table_remove(interface->network_table, network->group);
2594 }
2595
2596 static void set_config_methods(DBusMessageIter *iter, void *user_data)
2597 {
2598         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, user_data);
2599 }
2600
2601 static void wps_property(const char *key, DBusMessageIter *iter,
2602                                                         void *user_data)
2603 {
2604         GSupplicantInterface *interface = user_data;
2605
2606         if (!interface)
2607                 return;
2608
2609         SUPPLICANT_DBG("key: %s", key);
2610
2611         if (g_strcmp0(key, "ConfigMethods") == 0) {
2612                 const char *config_methods = "push_button", *str = NULL;
2613
2614                 dbus_message_iter_get_basic(iter, &str);
2615                 if (str && strlen(str) > 0) {
2616                         /* It was already set at wpa_s level, don't modify it. */
2617                         SUPPLICANT_DBG("%s", str);
2618                         return;
2619                 }
2620
2621                 supplicant_dbus_property_set(interface->path,
2622                         SUPPLICANT_INTERFACE ".Interface.WPS",
2623                         "ConfigMethods", DBUS_TYPE_STRING_AS_STRING,
2624                         set_config_methods, NULL, &config_methods, NULL);
2625
2626                 SUPPLICANT_DBG("No value. Set %s", config_methods);
2627         }
2628
2629 }
2630
2631 static void interface_property(const char *key, DBusMessageIter *iter,
2632                                                         void *user_data)
2633 {
2634         GSupplicantInterface *interface = user_data;
2635
2636         if (!interface)
2637                 return;
2638
2639         SUPPLICANT_DBG("%s", key);
2640
2641         if (!key) {
2642                 debug_strvalmap("KeyMgmt capability", keymgmt_map,
2643                                                 interface->keymgmt_capa);
2644                 debug_strvalmap("AuthAlg capability", authalg_capa_map,
2645                                                 interface->authalg_capa);
2646                 debug_strvalmap("Protocol capability", proto_capa_map,
2647                                                 interface->proto_capa);
2648                 debug_strvalmap("Pairwise capability", pairwise_map,
2649                                                 interface->pairwise_capa);
2650                 debug_strvalmap("Group capability", group_map,
2651                                                 interface->group_capa);
2652                 debug_strvalmap("Scan capability", scan_capa_map,
2653                                                 interface->scan_capa);
2654                 debug_strvalmap("Mode capability", mode_capa_map,
2655                                                 interface->mode_capa);
2656
2657                 supplicant_dbus_property_get_all(interface->path,
2658                                 SUPPLICANT_INTERFACE ".Interface.WPS",
2659                                 wps_property, interface, interface);
2660
2661                 if (interface->ready)
2662                         callback_interface_added(interface);
2663
2664                 return;
2665         }
2666
2667         if (g_strcmp0(key, "Capabilities") == 0) {
2668                 supplicant_dbus_property_foreach(iter, interface_capability,
2669                                                                 interface);
2670 #if !defined TIZEN_EXT
2671                 if (interface->mode_capa & G_SUPPLICANT_CAPABILITY_MODE_P2P)
2672                         interface->p2p_support = true;
2673 #endif
2674         } else if (g_strcmp0(key, "State") == 0) {
2675                 const char *str = NULL;
2676
2677                 dbus_message_iter_get_basic(iter, &str);
2678                 if (str)
2679                         if (string2state(str) != interface->state) {
2680                                 interface->state = string2state(str);
2681                                 callback_interface_state(interface);
2682                         }
2683
2684                 if (interface->ap_create_in_progress) {
2685                         if (interface->state == G_SUPPLICANT_STATE_DISCONNECTED)
2686                                 callback_ap_create_fail(interface);
2687
2688                         interface->ap_create_in_progress = false;
2689                 }
2690
2691                 if (interface->state == G_SUPPLICANT_STATE_DISABLED)
2692                         interface->ready = FALSE;
2693                 else
2694                         interface->ready = TRUE;
2695
2696                 SUPPLICANT_DBG("state %s (%d)", str, interface->state);
2697         } else if (g_strcmp0(key, "Scanning") == 0) {
2698                 dbus_bool_t scanning = FALSE;
2699
2700                 dbus_message_iter_get_basic(iter, &scanning);
2701                 interface->scanning = scanning;
2702
2703                 if (interface->ready) {
2704                         if (interface->scanning)
2705                                 callback_scan_started(interface);
2706                         else
2707                                 callback_scan_finished(interface);
2708                 }
2709         } else if (g_strcmp0(key, "ApScan") == 0) {
2710                 int apscan = 1;
2711
2712                 dbus_message_iter_get_basic(iter, &apscan);
2713                 interface->apscan = apscan;
2714         } else if (g_strcmp0(key, "Ifname") == 0) {
2715                 const char *str = NULL;
2716
2717                 dbus_message_iter_get_basic(iter, &str);
2718                 if (str) {
2719                         g_free(interface->ifname);
2720                         interface->ifname = g_strdup(str);
2721                 }
2722         } else if (g_strcmp0(key, "Driver") == 0) {
2723                 const char *str = NULL;
2724
2725                 dbus_message_iter_get_basic(iter, &str);
2726                 if (str) {
2727                         g_free(interface->driver);
2728                         interface->driver = g_strdup(str);
2729                 }
2730         } else if (g_strcmp0(key, "BridgeIfname") == 0) {
2731                 const char *str = NULL;
2732
2733                 dbus_message_iter_get_basic(iter, &str);
2734                 if (str) {
2735                         g_free(interface->bridge);
2736                         interface->bridge = g_strdup(str);
2737                 }
2738         } else if (g_strcmp0(key, "ConfigFile") == 0) {
2739                 const char *str = NULL;
2740
2741                 dbus_message_iter_get_basic(iter, &str);
2742                 if (str && strlen(str) > 0 && interface->ifname) {
2743                         SUPPLICANT_DBG("New {%s, %s}", interface->ifname, str);
2744                         g_hash_table_replace(config_file_table,
2745                                 g_strdup(interface->ifname), g_strdup(str));
2746                 }
2747         } else if (g_strcmp0(key, "CurrentBSS") == 0) {
2748                 interface_current_bss(interface, iter);
2749         } else if (g_strcmp0(key, "CurrentNetwork") == 0) {
2750 #if defined TIZEN_EXT
2751                 if (interface->state != G_SUPPLICANT_STATE_COMPLETED)
2752 #endif
2753                 interface_network_added(iter, interface);
2754         } else if (g_strcmp0(key, "BSSs") == 0) {
2755                 supplicant_dbus_array_foreach(iter,
2756                                         interface_bss_added_without_keys,
2757                                         interface);
2758         } else if (g_strcmp0(key, "Blobs") == 0) {
2759                 /* Nothing */
2760         } else if (g_strcmp0(key, "Networks") == 0) {
2761                 supplicant_dbus_array_foreach(iter, interface_network_added,
2762                                                                 interface);
2763         } else if (g_strcmp0(key, "DisconnectReason") == 0) {
2764                 int reason_code;
2765                 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
2766                         dbus_message_iter_get_basic(iter, &reason_code);
2767                         callback_disconnect_reason_code(interface, reason_code);
2768                 }
2769         } else if (g_strcmp0(key, "AssocStatusCode") == 0) {
2770                 int status_code;
2771                 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
2772                         dbus_message_iter_get_basic(iter, &status_code);
2773                         callback_assoc_status_code(interface, status_code);
2774                 }
2775         } else {
2776                 SUPPLICANT_DBG("key %s type %c",
2777                                 key, dbus_message_iter_get_arg_type(iter));
2778         }
2779 }
2780
2781 static void scan_network_update(DBusMessageIter *iter, void *user_data)
2782 {
2783         GSupplicantInterface *interface = user_data;
2784         GSupplicantNetwork *network;
2785         char *path;
2786
2787         if (!iter)
2788                 return;
2789
2790         dbus_message_iter_get_basic(iter, &path);
2791
2792         if (!path)
2793                 return;
2794
2795         if (g_strcmp0(path, "/") == 0)
2796                 return;
2797
2798         /* Update the network details based on scan BSS data */
2799         network = g_hash_table_lookup(interface->bss_mapping, path);
2800         if (network)
2801                 callback_network_added(network);
2802 }
2803
2804 static void scan_bss_data(const char *key, DBusMessageIter *iter,
2805                                 void *user_data)
2806 {
2807         GSupplicantInterface *interface = user_data;
2808
2809 /*Fixed : stucking in scanning state when scan failed*/
2810 #if defined TIZEN_EXT
2811                 GSupplicantInterfaceCallback scan_callback;
2812 #endif
2813
2814         if (iter)
2815                 supplicant_dbus_array_foreach(iter, scan_network_update,
2816                                                 interface);
2817
2818 #if defined TIZEN_EXT
2819                 scan_callback = interface->scan_callback;
2820 #endif
2821
2822         if (interface->scan_callback)
2823                 interface->scan_callback(0, interface, interface->scan_data);
2824
2825 #if defined TIZEN_EXT
2826                 if (interface->scan_callback == scan_callback) {
2827 #endif
2828         interface->scan_callback = NULL;
2829         interface->scan_data = NULL;
2830 #if defined TIZEN_EXT
2831         }
2832 #endif
2833 }
2834
2835 static GSupplicantInterface *interface_alloc(const char *path)
2836 {
2837         GSupplicantInterface *interface;
2838
2839         interface = g_try_new0(GSupplicantInterface, 1);
2840         if (!interface)
2841                 return NULL;
2842
2843         interface->path = g_strdup(path);
2844
2845         interface->network_table = g_hash_table_new_full(g_str_hash,
2846                                         g_str_equal, NULL, remove_network);
2847         interface->peer_table = g_hash_table_new_full(g_str_hash,
2848                                         g_str_equal, NULL, remove_peer);
2849         interface->group_table = g_hash_table_new_full(g_str_hash,
2850                                         g_str_equal, NULL, remove_group);
2851         interface->bss_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
2852                                                                 NULL, NULL);
2853
2854         g_hash_table_replace(interface_table, interface->path, interface);
2855
2856         return interface;
2857 }
2858
2859 static void interface_added(DBusMessageIter *iter, void *user_data)
2860 {
2861         GSupplicantInterface *interface;
2862         const char *path = NULL;
2863         bool properties_appended = GPOINTER_TO_UINT(user_data);
2864
2865         SUPPLICANT_DBG("");
2866
2867         dbus_message_iter_get_basic(iter, &path);
2868         if (!path)
2869                 return;
2870
2871         if (g_strcmp0(path, "/") == 0)
2872                 return;
2873
2874         interface = g_hash_table_lookup(interface_table, path);
2875         if (interface)
2876                 return;
2877
2878         interface = interface_alloc(path);
2879         if (!interface)
2880                 return;
2881
2882         if (!properties_appended) {
2883                 supplicant_dbus_property_get_all(path,
2884                                                 SUPPLICANT_INTERFACE ".Interface",
2885                                                 interface_property, interface,
2886                                                 interface);
2887                 return;
2888         }
2889
2890         dbus_message_iter_next(iter);
2891         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
2892                 supplicant_dbus_property_foreach(iter, interface_property,
2893                                                                 interface);
2894                 interface_property(NULL, NULL, interface);
2895         }
2896 }
2897
2898 static void interface_removed(DBusMessageIter *iter, void *user_data)
2899 {
2900         const char *path = NULL;
2901         GSupplicantInterface *interface = user_data;
2902
2903         dbus_message_iter_get_basic(iter, &path);
2904         if (!path)
2905                 return;
2906
2907         interface = g_hash_table_lookup(interface_table, path);
2908         g_supplicant_interface_cancel(interface);
2909
2910         g_hash_table_remove(interface_table, path);
2911 }
2912
2913 static void eap_method(DBusMessageIter *iter, void *user_data)
2914 {
2915         const char *str = NULL;
2916         int i;
2917
2918         dbus_message_iter_get_basic(iter, &str);
2919         if (!str)
2920                 return;
2921
2922         for (i = 0; eap_method_map[i].str; i++)
2923                 if (strcmp(str, eap_method_map[i].str) == 0) {
2924                         eap_methods |= eap_method_map[i].val;
2925                         break;
2926                 }
2927 }
2928
2929 static void service_property(const char *key, DBusMessageIter *iter,
2930                                                         void *user_data)
2931 {
2932         if (!key) {
2933                 callback_system_ready();
2934                 return;
2935         }
2936
2937         if (g_strcmp0(key, "DebugLevel") == 0) {
2938                 const char *str = NULL;
2939                 int i;
2940
2941                 dbus_message_iter_get_basic(iter, &str);
2942                 for (i = 0; debug_strings[i]; i++)
2943                         if (g_strcmp0(debug_strings[i], str) == 0) {
2944                                 debug_level = i;
2945                                 break;
2946                         }
2947                 SUPPLICANT_DBG("Debug level %d", debug_level);
2948         } else if (g_strcmp0(key, "DebugTimestamp") == 0) {
2949                 dbus_message_iter_get_basic(iter, &debug_timestamp);
2950                 SUPPLICANT_DBG("Debug timestamp %u", debug_timestamp);
2951         } else if (g_strcmp0(key, "DebugShowKeys") == 0) {
2952                 dbus_message_iter_get_basic(iter, &debug_showkeys);
2953                 SUPPLICANT_DBG("Debug show keys %u", debug_showkeys);
2954         } else if (g_strcmp0(key, "Interfaces") == 0) {
2955                 supplicant_dbus_array_foreach(iter, interface_added, NULL);
2956         } else if (g_strcmp0(key, "EapMethods") == 0) {
2957                 supplicant_dbus_array_foreach(iter, eap_method, NULL);
2958                 debug_strvalmap("EAP method", eap_method_map, eap_methods);
2959         } else if (g_strcmp0(key, "Country") == 0) {
2960                 const char *country = NULL;
2961
2962                 dbus_message_iter_get_basic(iter, &country);
2963                 SUPPLICANT_DBG("Country %s", country);
2964         } else
2965                 SUPPLICANT_DBG("key %s type %c",
2966                                 key, dbus_message_iter_get_arg_type(iter));
2967 }
2968
2969 static void signal_name_owner_changed(const char *path, DBusMessageIter *iter)
2970 {
2971         const char *name = NULL, *old = NULL, *new = NULL;
2972
2973         SUPPLICANT_DBG("");
2974
2975         if (g_strcmp0(path, DBUS_PATH_DBUS) != 0)
2976                 return;
2977
2978         dbus_message_iter_get_basic(iter, &name);
2979         if (!name)
2980                 return;
2981
2982         if (g_strcmp0(name, SUPPLICANT_SERVICE) != 0)
2983                 return;
2984
2985         dbus_message_iter_next(iter);
2986         dbus_message_iter_get_basic(iter, &old);
2987         dbus_message_iter_next(iter);
2988         dbus_message_iter_get_basic(iter, &new);
2989
2990         if (!old || !new)
2991                 return;
2992
2993         if (strlen(old) > 0 && strlen(new) == 0) {
2994                 system_available = FALSE;
2995                 g_hash_table_remove_all(bss_mapping);
2996                 g_hash_table_remove_all(peer_mapping);
2997                 g_hash_table_remove_all(group_mapping);
2998                 g_hash_table_remove_all(config_file_table);
2999                 g_hash_table_remove_all(interface_table);
3000                 callback_system_killed();
3001         }
3002
3003         if (strlen(new) > 0 && strlen(old) == 0) {
3004                 system_available = TRUE;
3005                 supplicant_dbus_property_get_all(SUPPLICANT_PATH,
3006                                                 SUPPLICANT_INTERFACE,
3007                                                 service_property, NULL, NULL);
3008         }
3009 }
3010
3011 static void signal_properties_changed(const char *path, DBusMessageIter *iter)
3012 {
3013         SUPPLICANT_DBG("");
3014
3015         if (g_strcmp0(path, SUPPLICANT_PATH) != 0)
3016                 return;
3017
3018         supplicant_dbus_property_foreach(iter, service_property, NULL);
3019 }
3020
3021 static void signal_interface_added(const char *path, DBusMessageIter *iter)
3022 {
3023         SUPPLICANT_DBG("path %s %s", path, SUPPLICANT_PATH);
3024
3025         if (g_strcmp0(path, SUPPLICANT_PATH) == 0)
3026                 interface_added(iter, GUINT_TO_POINTER(true));
3027 }
3028
3029 static void signal_interface_removed(const char *path, DBusMessageIter *iter)
3030 {
3031         SUPPLICANT_DBG("");
3032
3033         if (g_strcmp0(path, SUPPLICANT_PATH) == 0)
3034                 interface_removed(iter, NULL);
3035 }
3036
3037 static void signal_interface_changed(const char *path, DBusMessageIter *iter)
3038 {
3039         GSupplicantInterface *interface;
3040
3041         SUPPLICANT_DBG("");
3042
3043         interface = g_hash_table_lookup(interface_table, path);
3044         if (!interface)
3045                 return;
3046
3047         supplicant_dbus_property_foreach(iter, interface_property, interface);
3048 }
3049
3050 static void signal_scan_done(const char *path, DBusMessageIter *iter)
3051 {
3052         GSupplicantInterface *interface;
3053         dbus_bool_t success = FALSE;
3054
3055         SUPPLICANT_DBG("");
3056
3057         interface = g_hash_table_lookup(interface_table, path);
3058         if (!interface)
3059                 return;
3060
3061         dbus_message_iter_get_basic(iter, &success);
3062
3063         if (interface->scanning) {
3064                 callback_scan_finished(interface);
3065                 interface->scanning = FALSE;
3066         }
3067
3068         /*
3069          * If scan is unsuccessful return -EIO else get the scanned BSSs
3070          * and update the network details accordingly
3071          */
3072         if (!success) {
3073                 if (interface->scan_callback)
3074                         interface->scan_callback(-EIO, interface,
3075                                                 interface->scan_data);
3076
3077                 interface->scan_callback = NULL;
3078                 interface->scan_data = NULL;
3079
3080                 return;
3081         }
3082
3083         supplicant_dbus_property_get(path, SUPPLICANT_INTERFACE ".Interface",
3084                                 "BSSs", scan_bss_data, interface, interface);
3085 }
3086
3087 static void signal_bss_added(const char *path, DBusMessageIter *iter)
3088 {
3089         GSupplicantInterface *interface;
3090
3091         SUPPLICANT_DBG("");
3092
3093         interface = g_hash_table_lookup(interface_table, path);
3094         if (!interface)
3095                 return;
3096
3097         interface_bss_added_with_keys(iter, interface);
3098 }
3099
3100 static void signal_bss_removed(const char *path, DBusMessageIter *iter)
3101 {
3102         GSupplicantInterface *interface;
3103
3104         SUPPLICANT_DBG("");
3105
3106         interface = g_hash_table_lookup(interface_table, path);
3107         if (!interface)
3108                 return;
3109
3110         interface_bss_removed(iter, interface);
3111 }
3112
3113 static void signal_network_added(const char *path, DBusMessageIter *iter)
3114 {
3115         GSupplicantInterface *interface;
3116
3117         SUPPLICANT_DBG("");
3118
3119         interface = g_hash_table_lookup(interface_table, path);
3120         if (!interface)
3121                 return;
3122
3123         interface_network_added(iter, interface);
3124 }
3125
3126 static void signal_network_removed(const char *path, DBusMessageIter *iter)
3127 {
3128         GSupplicantInterface *interface;
3129
3130         SUPPLICANT_DBG("");
3131
3132         interface = g_hash_table_lookup(interface_table, path);
3133         if (!interface)
3134                 return;
3135
3136         interface_network_removed(iter, interface);
3137 }
3138
3139 static void signal_bss_changed(const char *path, DBusMessageIter *iter)
3140 {
3141         GSupplicantInterface *interface;
3142         GSupplicantNetwork *network;
3143         GSupplicantSecurity old_security;
3144         struct g_supplicant_bss *bss;
3145
3146         SUPPLICANT_DBG("");
3147
3148         interface = g_hash_table_lookup(bss_mapping, path);
3149         if (!interface)
3150                 return;
3151
3152         network = g_hash_table_lookup(interface->bss_mapping, path);
3153         if (!network)
3154                 return;
3155
3156         bss = g_hash_table_lookup(network->bss_table, path);
3157         if (!bss)
3158                 return;
3159
3160         supplicant_dbus_property_foreach(iter, bss_property, bss);
3161 #if defined TIZEN_EXT
3162         network->frequency = bss->frequency;
3163 #endif
3164         old_security = network->security;
3165         bss_compute_security(bss);
3166
3167         if (old_security != bss->security) {
3168                 struct g_supplicant_bss *new_bss;
3169
3170                 SUPPLICANT_DBG("New network security for %s", bss->ssid);
3171
3172                 /* Security change policy:
3173                  * - we first copy the current bss into a new one with
3174                  * its own pointer (path)
3175                  * - we remove the current bss related network which will
3176                  * tell the plugin about such removal. This is done due
3177                  * to the fact that a security change means a group change
3178                  * so a complete network change.
3179                  * (current bss becomes invalid as well)
3180                  * - we add the new bss: it adds new network and tell the
3181                  * plugin about it. */
3182
3183                 new_bss = g_try_new0(struct g_supplicant_bss, 1);
3184                 if (!new_bss)
3185                         return;
3186
3187                 memcpy(new_bss, bss, sizeof(struct g_supplicant_bss));
3188                 new_bss->path = g_strdup(bss->path);
3189
3190                 g_hash_table_remove(interface->network_table, network->group);
3191
3192                 if (add_or_replace_bss_to_network(new_bss) < 0) {
3193                         /* Remove entries in hash tables to handle the
3194                          * failure in add_or_replace_bss_to_network
3195                          */
3196                         g_hash_table_remove(bss_mapping, path);
3197                         g_hash_table_remove(interface->bss_mapping, path);
3198                         g_hash_table_remove(network->bss_table, path);
3199                 }
3200
3201                 return;
3202         }
3203
3204 #if defined TIZEN_EXT
3205         if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
3206                 network->wps = TRUE;
3207                 network->wps_capabilities |= bss->wps_capabilities;
3208         } else
3209                 network->wps = FALSE;
3210 #endif
3211
3212         /* Consider only property changes of the connected BSS */
3213         if (network == interface->current_network && bss != network->best_bss)
3214                 return;
3215
3216         if (bss->signal == network->signal)
3217 #ifndef TIZEN_EXT
3218                 return;
3219 #else
3220         {
3221                 callback_network_changed(network, "");
3222                 return;
3223         }
3224 #endif
3225
3226         /*
3227          * If the new signal is lower than the SSID signal, we need
3228          * to check for the new maximum.
3229          */
3230         if (bss->signal < network->signal) {
3231                 if (bss != network->best_bss)
3232 #ifndef TIZEN_EXT
3233                         return;
3234 #else
3235                 {
3236                         callback_network_changed(network, "");
3237                         return;
3238                 }
3239 #endif
3240                 network->signal = bss->signal;
3241                 update_network_signal(network);
3242         } else {
3243                 network->signal = bss->signal;
3244                 network->best_bss = bss;
3245         }
3246
3247         SUPPLICANT_DBG("New network signal for %s %d dBm", network->ssid,
3248                         network->signal);
3249
3250         callback_network_changed(network, "Signal");
3251 }
3252
3253 static void wps_credentials(const char *key, DBusMessageIter *iter,
3254                         void *user_data)
3255 {
3256         GSupplicantInterface *interface = user_data;
3257
3258         if (!key)
3259                 return;
3260
3261         SUPPLICANT_DBG("key %s", key);
3262
3263         if (g_strcmp0(key, "Key") == 0) {
3264                 DBusMessageIter array;
3265                 unsigned char *key_val;
3266                 int key_len;
3267
3268                 dbus_message_iter_recurse(iter, &array);
3269                 dbus_message_iter_get_fixed_array(&array, &key_val, &key_len);
3270
3271                 g_free(interface->wps_cred.key);
3272                 interface->wps_cred.key = g_try_malloc0(
3273                                                 sizeof(char) * key_len + 1);
3274
3275                 if (!interface->wps_cred.key)
3276                         return;
3277
3278                 memcpy(interface->wps_cred.key, key_val,
3279                                                 sizeof(char) * key_len);
3280
3281                 SUPPLICANT_DBG("WPS key present");
3282         } else if (g_strcmp0(key, "SSID") == 0) {
3283                 DBusMessageIter array;
3284                 unsigned char *ssid;
3285                 int ssid_len;
3286
3287                 dbus_message_iter_recurse(iter, &array);
3288                 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
3289
3290                 if (ssid_len > 0 && ssid_len < 33) {
3291                         memcpy(interface->wps_cred.ssid, ssid, ssid_len);
3292                         interface->wps_cred.ssid_len = ssid_len;
3293                 } else {
3294                         memset(interface->wps_cred.ssid, 0, 32);
3295                         interface->wps_cred.ssid_len = 0;
3296                 }
3297         }
3298 }
3299
3300 static void signal_wps_credentials(const char *path, DBusMessageIter *iter)
3301 {
3302         GSupplicantInterface *interface;
3303
3304         SUPPLICANT_DBG("");
3305
3306         interface = g_hash_table_lookup(interface_table, path);
3307         if (!interface)
3308                 return;
3309
3310         supplicant_dbus_property_foreach(iter, wps_credentials, interface);
3311 }
3312
3313 static void wps_event_args(const char *key, DBusMessageIter *iter,
3314                         void *user_data)
3315 {
3316         GSupplicantInterface *interface = user_data;
3317
3318         if (!key || !interface)
3319                 return;
3320
3321         SUPPLICANT_DBG("Arg Key %s", key);
3322 }
3323
3324 static void signal_wps_event(const char *path, DBusMessageIter *iter)
3325 {
3326         GSupplicantInterface *interface;
3327         const char *name = NULL;
3328
3329         SUPPLICANT_DBG("");
3330
3331         interface = g_hash_table_lookup(interface_table, path);
3332         if (!interface)
3333                 return;
3334
3335         dbus_message_iter_get_basic(iter, &name);
3336
3337         SUPPLICANT_DBG("Name: %s", name);
3338
3339         if (g_strcmp0(name, "success") == 0)
3340                 interface->wps_state = G_SUPPLICANT_WPS_STATE_SUCCESS;
3341         else if (g_strcmp0(name, "failed") == 0)
3342                 interface->wps_state = G_SUPPLICANT_WPS_STATE_FAIL;
3343         else
3344                 interface->wps_state = G_SUPPLICANT_WPS_STATE_UNKNOWN;
3345
3346         if (!dbus_message_iter_has_next(iter))
3347                 return;
3348
3349         dbus_message_iter_next(iter);
3350
3351         supplicant_dbus_property_foreach(iter, wps_event_args, interface);
3352 }
3353
3354 #if defined TIZEN_EXT
3355 static void signal_power_off(const char *path, DBusMessageIter *iter)
3356 {
3357         int poweroff_state = 0;
3358
3359         dbus_message_iter_get_basic(iter, &poweroff_state);
3360
3361         SUPPLICANT_DBG("poweroff_state(%d)", poweroff_state);
3362
3363         /* POWER_OFF_DIRECT 2 && POWER_OFF_RESTART 3 */
3364         if (poweroff_state != 2 && poweroff_state != 3)
3365                 return;
3366
3367         if (callbacks_pointer == NULL)
3368                 return;
3369
3370         if (callbacks_pointer->system_power_off == NULL)
3371                 return;
3372
3373         callbacks_pointer->system_power_off();
3374 }
3375 #endif
3376
3377 static void signal_station_connected(const char *path, DBusMessageIter *iter)
3378 {
3379         GSupplicantInterface *interface;
3380         const char *sta_mac = NULL;
3381
3382         SUPPLICANT_DBG("path %s %s", path, SUPPLICANT_PATH);
3383
3384         if (callbacks_pointer->add_station == NULL)
3385                 return;
3386
3387         if (g_strcmp0(path, "/") == 0)
3388                 return;
3389
3390         interface = g_hash_table_lookup(interface_table, path);
3391         if (interface == NULL)
3392                 return;
3393
3394         dbus_message_iter_get_basic(iter, &sta_mac);
3395         if (sta_mac == NULL)
3396                 return;
3397
3398         SUPPLICANT_DBG("New station %s connected", sta_mac);
3399         callbacks_pointer->add_station(sta_mac);
3400 }
3401
3402 static void signal_station_disconnected(const char *path, DBusMessageIter *iter)
3403 {
3404         GSupplicantInterface *interface;
3405         const char *sta_mac = NULL;
3406
3407         SUPPLICANT_DBG("path %s %s", path, SUPPLICANT_PATH);
3408
3409         if (callbacks_pointer->remove_station == NULL)
3410                 return;
3411
3412         if (g_strcmp0(path, "/") == 0)
3413                 return;
3414
3415         interface = g_hash_table_lookup(interface_table, path);
3416         if (interface == NULL)
3417                 return;
3418
3419         dbus_message_iter_get_basic(iter, &sta_mac);
3420         if (sta_mac == NULL)
3421                 return;
3422
3423         SUPPLICANT_DBG("Station %s disconnected", sta_mac);
3424         callbacks_pointer->remove_station(sta_mac);
3425 }
3426
3427 static void create_peer_identifier(GSupplicantPeer *peer)
3428 {
3429         const unsigned char test[ETH_ALEN] = {};
3430
3431         if (!peer)
3432                 return;
3433
3434         if (!memcmp(peer->device_address, test, ETH_ALEN)) {
3435                 peer->identifier = g_strdup(peer->name);
3436                 return;
3437         }
3438
3439         peer->identifier = g_malloc0(19);
3440         snprintf(peer->identifier, 19, "%02x%02x%02x%02x%02x%02x",
3441                                                 peer->device_address[0],
3442                                                 peer->device_address[1],
3443                                                 peer->device_address[2],
3444                                                 peer->device_address[3],
3445                                                 peer->device_address[4],
3446                                                 peer->device_address[5]);
3447 }
3448
3449 struct peer_property_data {
3450         GSupplicantPeer *peer;
3451         GSList *old_groups;
3452         bool groups_changed;
3453         bool services_changed;
3454 };
3455
3456 static void peer_groups_relation(DBusMessageIter *iter, void *user_data)
3457 {
3458         struct peer_property_data *data = user_data;
3459         GSupplicantPeer *peer = data->peer;
3460         GSupplicantGroup *group;
3461         const char *str = NULL;
3462         GSList *elem;
3463
3464         dbus_message_iter_get_basic(iter, &str);
3465         if (!str)
3466                 return;
3467
3468         group = g_hash_table_lookup(group_mapping, str);
3469         if (!group)
3470                 return;
3471
3472         elem = g_slist_find_custom(data->old_groups, str, (GCompareFunc)g_strcmp0);
3473         if (elem) {
3474                 data->old_groups = g_slist_remove_link(data->old_groups, elem);
3475                 peer->groups = g_slist_concat(elem, peer->groups);
3476         } else {
3477                 peer->groups = g_slist_prepend(peer->groups, g_strdup(str));
3478                 data->groups_changed = true;
3479         }
3480 }
3481
3482 static void peer_property(const char *key, DBusMessageIter *iter,
3483                                                         void *user_data)
3484 {
3485         GSupplicantPeer *pending_peer;
3486         struct peer_property_data *data = user_data;
3487         GSupplicantPeer *peer = data->peer;
3488
3489         SUPPLICANT_DBG("key: %s", key);
3490
3491         if (!peer->interface)
3492                 return;
3493
3494         if (!key) {
3495                 if (peer->name) {
3496                         create_peer_identifier(peer);
3497                         callback_peer_found(peer);
3498                         pending_peer = g_hash_table_lookup(
3499                                         pending_peer_connection, peer->path);
3500
3501                         if (pending_peer && pending_peer == peer) {
3502                                 callback_peer_request(peer);
3503                                 g_hash_table_remove(pending_peer_connection,
3504                                                 peer->path);
3505                         }
3506
3507                         dbus_free(data);
3508                 }
3509
3510                 return;
3511         }
3512
3513         if (g_strcmp0(key, "DeviceAddress") == 0) {
3514                 unsigned char *dev_addr;
3515                 DBusMessageIter array;
3516                 int len;
3517
3518                 dbus_message_iter_recurse(iter, &array);
3519                 dbus_message_iter_get_fixed_array(&array, &dev_addr, &len);
3520
3521                 if (len == ETH_ALEN)
3522                         memcpy(peer->device_address, dev_addr, len);
3523         } else if (g_strcmp0(key, "DeviceName") == 0) {
3524                 const char *str = NULL;
3525
3526                 dbus_message_iter_get_basic(iter, &str);
3527                 if (str)
3528                         peer->name = g_strdup(str);
3529         } else if (g_strcmp0(key, "config_method") == 0) {
3530                 uint16_t wps_config;
3531
3532                 dbus_message_iter_get_basic(iter, &wps_config);
3533
3534                 if (wps_config & G_SUPPLICANT_WPS_CONFIG_PBC)
3535                         peer->wps_capabilities |= G_SUPPLICANT_WPS_PBC;
3536                 if (wps_config & ~G_SUPPLICANT_WPS_CONFIG_PBC)
3537                         peer->wps_capabilities |= G_SUPPLICANT_WPS_PIN;
3538         } else if (g_strcmp0(key, "Groups") == 0) {
3539                 data->old_groups = peer->groups;
3540                 peer->groups = NULL;
3541
3542                 supplicant_dbus_array_foreach(iter,
3543                                                 peer_groups_relation, data);
3544                 if (g_slist_length(data->old_groups) > 0) {
3545                         g_slist_free_full(data->old_groups, g_free);
3546                         data->groups_changed = true;
3547                 }
3548         } else if (g_strcmp0(key, "IEs") == 0) {
3549                 DBusMessageIter array;
3550                 unsigned char *ie;
3551                 int ie_len;
3552
3553                 dbus_message_iter_recurse(iter, &array);
3554                 dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
3555
3556                 if (!ie || ie_len < 2)
3557                         return;
3558
3559                 if (peer->widi_ies) {
3560                         if (memcmp(peer->widi_ies, ie, ie_len) == 0)
3561                                 return;
3562
3563                         g_free(peer->widi_ies);
3564                         peer->widi_ies_length = 0;
3565                 }
3566
3567                 peer->widi_ies = g_malloc0(ie_len * sizeof(unsigned char));
3568
3569                 memcpy(peer->widi_ies, ie, ie_len);
3570                 peer->widi_ies_length = ie_len;
3571                 data->services_changed = true;
3572         }
3573 }
3574
3575 static void signal_peer_found(const char *path, DBusMessageIter *iter)
3576 {
3577         struct peer_property_data *property_data;
3578         GSupplicantInterface *interface;
3579         const char *obj_path = NULL;
3580         GSupplicantPeer *peer;
3581
3582         SUPPLICANT_DBG("");
3583
3584         interface = g_hash_table_lookup(interface_table, path);
3585         if (!interface)
3586                 return;
3587
3588         dbus_message_iter_get_basic(iter, &obj_path);
3589         if (!obj_path || g_strcmp0(obj_path, "/") == 0)
3590                 return;
3591
3592         peer = g_hash_table_lookup(interface->peer_table, obj_path);
3593         if (peer)
3594                 return;
3595
3596         peer = g_try_new0(GSupplicantPeer, 1);
3597         if (!peer)
3598                 return;
3599
3600         peer->interface = interface;
3601         peer->path = g_strdup(obj_path);
3602         g_hash_table_insert(interface->peer_table, peer->path, peer);
3603         g_hash_table_replace(peer_mapping, peer->path, interface);
3604
3605         property_data = dbus_malloc0(sizeof(struct peer_property_data));
3606         property_data->peer = peer;
3607
3608         dbus_message_iter_next(iter);
3609         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
3610                 supplicant_dbus_property_foreach(iter, peer_property,
3611                                                         property_data);
3612                 peer_property(NULL, NULL, property_data);
3613                 return;
3614         }
3615
3616         supplicant_dbus_property_get_all(obj_path,
3617                                         SUPPLICANT_INTERFACE ".Peer",
3618                                         peer_property, property_data, NULL);
3619 }
3620
3621 static void signal_peer_lost(const char *path, DBusMessageIter *iter)
3622 {
3623         GSupplicantInterface *interface;
3624         const char *obj_path = NULL;
3625         GSupplicantPeer *peer;
3626
3627         SUPPLICANT_DBG("");
3628
3629         interface = g_hash_table_lookup(interface_table, path);
3630         if (!interface)
3631                 return;
3632
3633         dbus_message_iter_get_basic(iter, &obj_path);
3634         if (!obj_path || g_strcmp0(obj_path, "/") == 0)
3635                 return;
3636
3637         peer = g_hash_table_lookup(interface->peer_table, obj_path);
3638         if (!peer)
3639                 return;
3640
3641         g_hash_table_remove(interface->peer_table, obj_path);
3642 }
3643
3644 static void signal_peer_changed(const char *path, DBusMessageIter *iter)
3645 {
3646         struct peer_property_data *property_data;
3647         GSupplicantInterface *interface;
3648         GSupplicantPeer *peer;
3649
3650         SUPPLICANT_DBG("");
3651
3652         interface = g_hash_table_lookup(peer_mapping, path);
3653         if (!interface)
3654                 return;
3655
3656         peer = g_hash_table_lookup(interface->peer_table, path);
3657         if (!peer) {
3658                 g_hash_table_remove(peer_mapping, path);
3659                 return;
3660         }
3661
3662         property_data = dbus_malloc0(sizeof(struct peer_property_data));
3663         property_data->peer = peer;
3664
3665         supplicant_dbus_property_foreach(iter, peer_property, property_data);
3666         if (property_data->services_changed)
3667                 callback_peer_changed(peer,
3668                                         G_SUPPLICANT_PEER_SERVICES_CHANGED);
3669
3670         if (property_data->groups_changed)
3671                 callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_CHANGED);
3672
3673         dbus_free(property_data);
3674
3675         if (!g_supplicant_peer_is_in_a_group(peer))
3676                 peer->connection_requested = false;
3677 }
3678
3679 struct group_sig_data {
3680         const char *peer_obj_path;
3681         unsigned char iface_address[ETH_ALEN];
3682         const char *interface_obj_path;
3683         const char *group_obj_path;
3684         int role;
3685 };
3686
3687 static void group_sig_property(const char *key, DBusMessageIter *iter,
3688                                                         void *user_data)
3689 {
3690         struct group_sig_data *data = user_data;
3691
3692         if (!key)
3693                 return;
3694
3695         if (g_strcmp0(key, "peer_interface_addr") == 0) {
3696                 unsigned char *dev_addr;
3697                 DBusMessageIter array;
3698                 int len;
3699
3700                 dbus_message_iter_recurse(iter, &array);
3701                 dbus_message_iter_get_fixed_array(&array, &dev_addr, &len);
3702
3703                 if (len == ETH_ALEN)
3704                         memcpy(data->iface_address, dev_addr, len);
3705         } else if (g_strcmp0(key, "role") == 0) {
3706                 const char *str = NULL;
3707
3708                 dbus_message_iter_get_basic(iter, &str);
3709                 if (g_strcmp0(str, "GO") == 0)
3710                         data->role = G_SUPPLICANT_GROUP_ROLE_GO;
3711                 else
3712                         data->role = G_SUPPLICANT_GROUP_ROLE_CLIENT;
3713         } else if (g_strcmp0(key, "peer_object") == 0)
3714                 dbus_message_iter_get_basic(iter, &data->peer_obj_path);
3715         else if (g_strcmp0(key, "interface_object") == 0)
3716                 dbus_message_iter_get_basic(iter, &data->interface_obj_path);
3717         else if (g_strcmp0(key, "group_object") == 0)
3718                 dbus_message_iter_get_basic(iter, &data->group_obj_path);
3719
3720 }
3721
3722 static void signal_group_success(const char *path, DBusMessageIter *iter)
3723 {
3724         GSupplicantInterface *interface;
3725         struct group_sig_data data = {};
3726         GSupplicantPeer *peer;
3727
3728         SUPPLICANT_DBG("");
3729
3730         interface = g_hash_table_lookup(interface_table, path);
3731         if (!interface)
3732                 return;
3733
3734         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
3735         if (!data.peer_obj_path)
3736                 return;
3737
3738         peer = g_hash_table_lookup(interface->peer_table, data.peer_obj_path);
3739         if (!peer)
3740                 return;
3741
3742         memcpy(peer->iface_address, data.iface_address, ETH_ALEN);
3743         interface->pending_peer_path = peer->path;
3744 }
3745
3746 static void signal_group_failure(const char *path, DBusMessageIter *iter)
3747 {
3748         GSupplicantInterface *interface;
3749         struct group_sig_data data = {};
3750         GSupplicantPeer *peer;
3751
3752         SUPPLICANT_DBG("");
3753
3754         interface = g_hash_table_lookup(interface_table, path);
3755         if (!interface)
3756                 return;
3757
3758         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
3759         if (!data.peer_obj_path)
3760                 return;
3761
3762         peer = g_hash_table_lookup(interface->peer_table, data.peer_obj_path);
3763         if (!peer)
3764                 return;
3765
3766         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_FAILED);
3767         peer->connection_requested = false;
3768 }
3769
3770 static void signal_group_started(const char *path, DBusMessageIter *iter)
3771 {
3772         GSupplicantInterface *interface, *g_interface;
3773         struct group_sig_data data = {};
3774         GSupplicantGroup *group;
3775         GSupplicantPeer *peer;
3776
3777         SUPPLICANT_DBG("");
3778
3779         interface = g_hash_table_lookup(interface_table, path);
3780         if (!interface)
3781                 return;
3782
3783         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
3784         if (!data.interface_obj_path || !data.group_obj_path)
3785                 return;
3786
3787         peer = g_hash_table_lookup(interface->peer_table,
3788                                                 interface->pending_peer_path);
3789         interface->pending_peer_path = NULL;
3790         if (!peer)
3791                 return;
3792
3793         g_interface = g_hash_table_lookup(interface_table,
3794                                                 data.interface_obj_path);
3795         if (!g_interface)
3796                 return;
3797
3798         group = g_hash_table_lookup(interface->group_table,
3799                                                 data.group_obj_path);
3800         if (group)
3801                 return;
3802
3803         group = g_try_new0(GSupplicantGroup, 1);
3804         if (!group)
3805                 return;
3806
3807         group->interface = g_interface;
3808         group->orig_interface = interface;
3809         group->path = g_strdup(data.group_obj_path);
3810         group->role = data.role;
3811
3812         g_hash_table_insert(interface->group_table, group->path, group);
3813         g_hash_table_replace(group_mapping, group->path, group);
3814
3815         peer->current_group_iface = g_interface;
3816         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_STARTED);
3817 }
3818
3819 static void remove_peer_group_interface(GHashTable *group_table,
3820                                 const char* path)
3821 {
3822         GSupplicantGroup *group;
3823         GHashTableIter iter;
3824         gpointer value, key;
3825
3826         if (!group_table)
3827                 return;
3828
3829         group = g_hash_table_lookup(group_table, path);
3830
3831         if (!group || !group->orig_interface)
3832                 return;
3833
3834         g_hash_table_iter_init(&iter, group->orig_interface->peer_table);
3835
3836         while (g_hash_table_iter_next(&iter, &key, &value)) {
3837                 GSupplicantPeer *peer = value;
3838
3839                 if (peer->current_group_iface == group->interface)
3840                         peer->current_group_iface = NULL;
3841         }
3842 }
3843
3844 static void signal_group_finished(const char *path, DBusMessageIter *iter)
3845 {
3846         GSupplicantInterface *interface;
3847         struct group_sig_data data = {};
3848
3849         SUPPLICANT_DBG("");
3850
3851         interface = g_hash_table_lookup(interface_table, path);
3852         if (!interface)
3853                 return;
3854
3855         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
3856         if (!data.interface_obj_path || !data.group_obj_path)
3857                 return;
3858
3859         remove_peer_group_interface(interface->group_table, data.group_obj_path);
3860
3861         g_hash_table_remove(group_mapping, data.group_obj_path);
3862
3863         g_hash_table_remove(interface->group_table, data.group_obj_path);
3864 }
3865
3866 static void signal_group_request(const char *path, DBusMessageIter *iter)
3867 {
3868         GSupplicantInterface *interface;
3869         GSupplicantPeer *peer;
3870         const char *obj_path;
3871
3872         SUPPLICANT_DBG("");
3873
3874         interface = g_hash_table_lookup(interface_table, path);
3875         if (!interface)
3876                 return;
3877
3878         dbus_message_iter_get_basic(iter, &obj_path);
3879         if (!obj_path || !g_strcmp0(obj_path, "/"))
3880                 return;
3881
3882         peer = g_hash_table_lookup(interface->peer_table, obj_path);
3883         if (!peer)
3884                 return;
3885
3886         /*
3887          * Peer has been previously found and property set,
3888          * otherwise, defer connection to when peer property
3889          * is set.
3890          */
3891         if (peer->identifier)
3892                 callback_peer_request(peer);
3893         else
3894                 g_hash_table_replace(pending_peer_connection, peer->path, peer);
3895 }
3896
3897 static void signal_group_peer_joined(const char *path, DBusMessageIter *iter)
3898 {
3899         const char *peer_path = NULL;
3900         GSupplicantInterface *interface;
3901         GSupplicantGroup *group;
3902         GSupplicantPeer *peer;
3903
3904         SUPPLICANT_DBG("");
3905
3906         group = g_hash_table_lookup(group_mapping, path);
3907         if (!group)
3908                 return;
3909
3910         dbus_message_iter_get_basic(iter, &peer_path);
3911         if (!peer_path)
3912                 return;
3913
3914         interface = g_hash_table_lookup(peer_mapping, peer_path);
3915         if (!interface)
3916                 return;
3917
3918         peer = g_hash_table_lookup(interface->peer_table, peer_path);
3919         if (!peer)
3920                 return;
3921
3922         group->members = g_slist_prepend(group->members, g_strdup(peer_path));
3923
3924         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_JOINED);
3925 }
3926
3927 static void signal_group_peer_disconnected(const char *path, DBusMessageIter *iter)
3928 {
3929         const char *peer_path = NULL;
3930         GSupplicantInterface *interface;
3931         GSupplicantGroup *group;
3932         GSupplicantPeer *peer;
3933         GSList *elem;
3934
3935         SUPPLICANT_DBG("");
3936
3937         group = g_hash_table_lookup(group_mapping, path);
3938         if (!group)
3939                 return;
3940
3941         dbus_message_iter_get_basic(iter, &peer_path);
3942         if (!peer_path)
3943                 return;
3944
3945         for (elem = group->members; elem; elem = elem->next) {
3946                 if (!g_strcmp0(elem->data, peer_path))
3947                         break;
3948         }
3949
3950         if (!elem)
3951                 return;
3952
3953         g_free(elem->data);
3954         group->members = g_slist_delete_link(group->members, elem);
3955
3956         interface = g_hash_table_lookup(peer_mapping, peer_path);
3957         if (!interface)
3958                 return;
3959
3960         peer = g_hash_table_lookup(interface->peer_table, peer_path);
3961         if (!peer)
3962                 return;
3963
3964         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_DISCONNECTED);
3965         peer->connection_requested = false;
3966 }
3967
3968 static struct {
3969         const char *interface;
3970         const char *member;
3971         void (*function) (const char *path, DBusMessageIter *iter);
3972 } signal_map[] = {
3973         { DBUS_INTERFACE_DBUS,  "NameOwnerChanged",  signal_name_owner_changed },
3974
3975         { SUPPLICANT_INTERFACE, "PropertiesChanged", signal_properties_changed },
3976         { SUPPLICANT_INTERFACE, "InterfaceAdded",    signal_interface_added    },
3977         { SUPPLICANT_INTERFACE, "InterfaceCreated",  signal_interface_added    },
3978         { SUPPLICANT_INTERFACE, "InterfaceRemoved",  signal_interface_removed  },
3979
3980         { SUPPLICANT_INTERFACE ".Interface", "PropertiesChanged", signal_interface_changed },
3981         { SUPPLICANT_INTERFACE ".Interface", "ScanDone",          signal_scan_done         },
3982         { SUPPLICANT_INTERFACE ".Interface", "BSSAdded",          signal_bss_added         },
3983         { SUPPLICANT_INTERFACE ".Interface", "BSSRemoved",        signal_bss_removed       },
3984         { SUPPLICANT_INTERFACE ".Interface", "NetworkAdded",      signal_network_added     },
3985         { SUPPLICANT_INTERFACE ".Interface", "NetworkRemoved",    signal_network_removed   },
3986
3987         { SUPPLICANT_INTERFACE ".BSS", "PropertiesChanged", signal_bss_changed   },
3988
3989         { SUPPLICANT_INTERFACE ".Interface.WPS", "Credentials", signal_wps_credentials },
3990         { SUPPLICANT_INTERFACE ".Interface.WPS", "Event",       signal_wps_event       },
3991 #if defined TIZEN_EXT
3992         { "org.tizen.system.deviced.PowerOff", "ChangeState", signal_power_off },
3993 #endif
3994
3995         { SUPPLICANT_INTERFACE".Interface", "StaAuthorized", signal_station_connected      },
3996         { SUPPLICANT_INTERFACE".Interface", "StaDeauthorized", signal_station_disconnected },
3997
3998         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeviceFound", signal_peer_found },
3999         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeviceLost",  signal_peer_lost  },
4000
4001         { SUPPLICANT_INTERFACE ".Peer", "PropertiesChanged", signal_peer_changed },
4002
4003         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationSuccess", signal_group_success },
4004         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationFailure", signal_group_failure },
4005         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GroupStarted", signal_group_started },
4006         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GroupFinished", signal_group_finished },
4007         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationRequest", signal_group_request },
4008
4009         { SUPPLICANT_INTERFACE ".Group", "PeerJoined", signal_group_peer_joined },
4010         { SUPPLICANT_INTERFACE ".Group", "PeerDisconnected", signal_group_peer_disconnected },
4011
4012         { }
4013 };
4014
4015 static DBusHandlerResult g_supplicant_filter(DBusConnection *conn,
4016                                         DBusMessage *message, void *data)
4017 {
4018         DBusMessageIter iter;
4019         const char *path;
4020         int i;
4021
4022         path = dbus_message_get_path(message);
4023         if (!path)
4024                 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
4025
4026         if (!dbus_message_iter_init(message, &iter))
4027                 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
4028
4029         for (i = 0; signal_map[i].interface; i++) {
4030                 if (!dbus_message_has_interface(message, signal_map[i].interface))
4031                         continue;
4032
4033                 if (!dbus_message_has_member(message, signal_map[i].member))
4034                         continue;
4035
4036                 signal_map[i].function(path, &iter);
4037                 break;
4038         }
4039
4040         return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
4041 }
4042
4043 void g_supplicant_interface_cancel(GSupplicantInterface *interface)
4044 {
4045         SUPPLICANT_DBG("Cancelling any pending DBus calls");
4046         supplicant_dbus_method_call_cancel_all(interface);
4047         supplicant_dbus_property_call_cancel_all(interface);
4048 }
4049
4050 struct supplicant_regdom {
4051         GSupplicantCountryCallback callback;
4052         const char *alpha2;
4053         const void *user_data;
4054 };
4055
4056 static void country_result(const char *error,
4057                                 DBusMessageIter *iter, void *user_data)
4058 {
4059         struct supplicant_regdom *regdom = user_data;
4060         int result = 0;
4061
4062         SUPPLICANT_DBG("Country setting result");
4063
4064         if (!user_data)
4065                 return;
4066
4067         if (error) {
4068                 SUPPLICANT_DBG("Country setting failure %s", error);
4069                 result = -EINVAL;
4070         }
4071
4072         if (regdom->callback)
4073                 regdom->callback(result, regdom->alpha2,
4074                                         (void *) regdom->user_data);
4075
4076         g_free(regdom);
4077 }
4078
4079 static void country_params(DBusMessageIter *iter, void *user_data)
4080 {
4081         struct supplicant_regdom *regdom = user_data;
4082
4083         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING,
4084                                                         &regdom->alpha2);
4085 }
4086
4087 int g_supplicant_set_country(const char *alpha2,
4088                                 GSupplicantCountryCallback callback,
4089                                         const void *user_data)
4090 {
4091         struct supplicant_regdom *regdom;
4092         int ret;
4093
4094         SUPPLICANT_DBG("Country setting %s", alpha2);
4095
4096         if (!system_available)
4097                 return -EFAULT;
4098
4099         regdom = dbus_malloc0(sizeof(*regdom));
4100         if (!regdom)
4101                 return -ENOMEM;
4102
4103         regdom->callback = callback;
4104         regdom->alpha2 = alpha2;
4105         regdom->user_data = user_data;
4106
4107         ret =  supplicant_dbus_property_set(SUPPLICANT_PATH, SUPPLICANT_INTERFACE,
4108                                         "Country", DBUS_TYPE_STRING_AS_STRING,
4109                                         country_params, country_result,
4110                                         regdom, NULL);
4111         if (ret < 0) {
4112                 dbus_free(regdom);
4113                 SUPPLICANT_DBG("Unable to set Country configuration");
4114         }
4115         return ret;
4116 }
4117
4118 int g_supplicant_interface_set_country(GSupplicantInterface *interface,
4119                                         GSupplicantCountryCallback callback,
4120                                                         const char *alpha2,
4121                                                         void *user_data)
4122 {
4123         struct supplicant_regdom *regdom;
4124         int ret;
4125
4126         regdom = dbus_malloc0(sizeof(*regdom));
4127         if (!regdom)
4128                 return -ENOMEM;
4129
4130         regdom->callback = callback;
4131         regdom->alpha2 = alpha2;
4132         regdom->user_data = user_data;
4133
4134         ret =  supplicant_dbus_property_set(interface->path,
4135                                 SUPPLICANT_INTERFACE ".Interface",
4136                                 "Country", DBUS_TYPE_STRING_AS_STRING,
4137                                 country_params, country_result,
4138                                         regdom, NULL);
4139         if (ret < 0) {
4140                 dbus_free(regdom);
4141                 SUPPLICANT_DBG("Unable to set Country configuration");
4142         }
4143
4144         return ret;
4145 }
4146
4147 bool g_supplicant_interface_has_p2p(GSupplicantInterface *interface)
4148 {
4149         if (!interface)
4150                 return false;
4151
4152         return interface->p2p_support;
4153 }
4154
4155 struct supplicant_p2p_dev_config {
4156         char *device_name;
4157         char *dev_type;
4158 };
4159
4160 static void p2p_device_config_result(const char *error,
4161                                         DBusMessageIter *iter, void *user_data)
4162 {
4163         struct supplicant_p2p_dev_config *config = user_data;
4164
4165         if (error)
4166                 SUPPLICANT_DBG("Unable to set P2P Device configuration: %s",
4167                                                                         error);
4168
4169         g_free(config->device_name);
4170         g_free(config->dev_type);
4171         dbus_free(config);
4172 }
4173
4174 static int dev_type_str2bin(const char *type, unsigned char dev_type[8])
4175 {
4176         int length, pos, end;
4177         char b[3] = {};
4178         char *e = NULL;
4179
4180         end = strlen(type);
4181         for (length = pos = 0; type[pos] != '\0' && length < 8; length++) {
4182                 if (pos+2 > end)
4183                         return 0;
4184
4185                 b[0] = type[pos];
4186                 b[1] = type[pos+1];
4187
4188                 dev_type[length] = strtol(b, &e, 16);
4189                 if (e && *e != '\0')
4190                         return 0;
4191
4192                 pos += 2;
4193         }
4194
4195         return 8;
4196 }
4197
4198 static void p2p_device_config_params(DBusMessageIter *iter, void *user_data)
4199 {
4200         struct supplicant_p2p_dev_config *config = user_data;
4201         DBusMessageIter dict;
4202
4203         supplicant_dbus_dict_open(iter, &dict);
4204
4205         supplicant_dbus_dict_append_basic(&dict, "DeviceName",
4206                                 DBUS_TYPE_STRING, &config->device_name);
4207
4208         if (config->dev_type) {
4209                 unsigned char dev_type[8] = {}, *type;
4210                 int len;
4211
4212                 len = dev_type_str2bin(config->dev_type, dev_type);
4213                 if (len) {
4214                         type = dev_type;
4215                         supplicant_dbus_dict_append_fixed_array(&dict,
4216                                         "PrimaryDeviceType",
4217                                         DBUS_TYPE_BYTE, &type, len);
4218                 }
4219         }
4220
4221         supplicant_dbus_dict_close(iter, &dict);
4222 }
4223
4224 int g_supplicant_interface_set_p2p_device_config(GSupplicantInterface *interface,
4225                                         const char *device_name,
4226                                         const char *primary_dev_type)
4227 {
4228         struct supplicant_p2p_dev_config *config;
4229         int ret;
4230
4231         SUPPLICANT_DBG("P2P Device settings %s/%s",
4232                                         device_name, primary_dev_type);
4233
4234         config = dbus_malloc0(sizeof(*config));
4235         if (!config)
4236                 return -ENOMEM;
4237
4238         config->device_name = g_strdup(device_name);
4239         config->dev_type = g_strdup(primary_dev_type);
4240
4241         ret = supplicant_dbus_property_set(interface->path,
4242                                 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
4243                                 "P2PDeviceConfig",
4244                                 DBUS_TYPE_ARRAY_AS_STRING
4245                                 DBUS_DICT_ENTRY_BEGIN_CHAR_AS_STRING
4246                                 DBUS_TYPE_STRING_AS_STRING
4247                                 DBUS_TYPE_VARIANT_AS_STRING
4248                                 DBUS_DICT_ENTRY_END_CHAR_AS_STRING,
4249                                 p2p_device_config_params,
4250                                 p2p_device_config_result, config, NULL);
4251         if (ret < 0) {
4252                 g_free(config->device_name);
4253                 g_free(config->dev_type);
4254                 dbus_free(config);
4255                 SUPPLICANT_DBG("Unable to set P2P Device configuration");
4256         }
4257
4258         return ret;
4259 }
4260
4261 static gboolean peer_lookup_by_identifier(gpointer key, gpointer value,
4262                                                         gpointer user_data)
4263 {
4264         const GSupplicantPeer *peer = value;
4265         const char *identifier = user_data;
4266
4267         if (!g_strcmp0(identifier, peer->identifier))
4268                 return TRUE;
4269
4270         return FALSE;
4271 }
4272
4273 GSupplicantPeer *g_supplicant_interface_peer_lookup(GSupplicantInterface *interface,
4274                                                         const char *identifier)
4275 {
4276         GSupplicantPeer *peer;
4277
4278         peer = g_hash_table_find(interface->peer_table,
4279                                         peer_lookup_by_identifier,
4280                                         (void *) identifier);
4281         return peer;
4282 }
4283
4284 static void interface_create_data_free(struct interface_create_data *data)
4285 {
4286         g_free(data->ifname);
4287         g_free(data->driver);
4288         g_free(data->bridge);
4289         dbus_free(data);
4290 }
4291
4292 static bool interface_exists(GSupplicantInterface *interface,
4293                                 const char *path)
4294 {
4295         GSupplicantInterface *tmp;
4296
4297         tmp = g_hash_table_lookup(interface_table, path);
4298         if (tmp && tmp == interface)
4299                 return true;
4300
4301         return false;
4302 }
4303
4304 static void interface_create_property(const char *key, DBusMessageIter *iter,
4305                                                         void *user_data)
4306 {
4307         struct interface_create_data *data = user_data;
4308         GSupplicantInterface *interface = data->interface;
4309
4310         if (!key) {
4311                 if (data->callback) {
4312                         data->callback(0, data->interface, data->user_data);
4313 #if !defined TIZEN_EXT
4314                         callback_p2p_support(interface);
4315 #endif
4316                 }
4317
4318                 interface_create_data_free(data);
4319         }
4320
4321         interface_property(key, iter, interface);
4322 }
4323
4324 static void interface_create_result(const char *error,
4325                                 DBusMessageIter *iter, void *user_data)
4326 {
4327         struct interface_create_data *data = user_data;
4328         const char *path = NULL;
4329         int err;
4330
4331         SUPPLICANT_DBG("");
4332
4333         if (error) {
4334                 g_warning("error %s", error);
4335                 err = -EIO;
4336                 goto done;
4337         }
4338
4339         dbus_message_iter_get_basic(iter, &path);
4340         if (!path) {
4341                 err = -EINVAL;
4342                 goto done;
4343         }
4344
4345         if (!system_available) {
4346                 err = -EFAULT;
4347                 goto done;
4348         }
4349
4350         data->interface = g_hash_table_lookup(interface_table, path);
4351         if (!data->interface) {
4352                 data->interface = interface_alloc(path);
4353                 if (!data->interface) {
4354                         err = -ENOMEM;
4355                         goto done;
4356                 }
4357         }
4358
4359         err = supplicant_dbus_property_get_all(path,
4360                                         SUPPLICANT_INTERFACE ".Interface",
4361                                         interface_create_property, data,
4362                                         NULL);
4363         if (err == 0)
4364                 return;
4365
4366 done:
4367         if (data->callback)
4368                 data->callback(err, NULL, data->user_data);
4369
4370         interface_create_data_free(data);
4371 }
4372
4373 static void interface_create_params(DBusMessageIter *iter, void *user_data)
4374 {
4375         struct interface_create_data *data = user_data;
4376         DBusMessageIter dict;
4377         char *config_file = NULL;
4378
4379         SUPPLICANT_DBG("");
4380
4381         supplicant_dbus_dict_open(iter, &dict);
4382
4383         supplicant_dbus_dict_append_basic(&dict, "Ifname",
4384                                         DBUS_TYPE_STRING, &data->ifname);
4385
4386         if (data->driver)
4387                 supplicant_dbus_dict_append_basic(&dict, "Driver",
4388                                         DBUS_TYPE_STRING, &data->driver);
4389
4390         if (data->bridge)
4391                 supplicant_dbus_dict_append_basic(&dict, "BridgeIfname",
4392                                         DBUS_TYPE_STRING, &data->bridge);
4393
4394         config_file = g_hash_table_lookup(config_file_table, data->ifname);
4395         if (config_file) {
4396                 SUPPLICANT_DBG("[%s] ConfigFile %s", data->ifname, config_file);
4397
4398                 supplicant_dbus_dict_append_basic(&dict, "ConfigFile",
4399                                         DBUS_TYPE_STRING, &config_file);
4400         }
4401
4402         supplicant_dbus_dict_close(iter, &dict);
4403 }
4404
4405 static void interface_get_result(const char *error,
4406                                 DBusMessageIter *iter, void *user_data)
4407 {
4408         struct interface_create_data *data = user_data;
4409         GSupplicantInterface *interface;
4410         const char *path = NULL;
4411         int err;
4412
4413         SUPPLICANT_DBG("");
4414
4415         if (error) {
4416                 SUPPLICANT_DBG("Interface not created yet");
4417                 goto create;
4418         }
4419
4420         dbus_message_iter_get_basic(iter, &path);
4421         if (!path) {
4422                 err = -EINVAL;
4423                 goto done;
4424         }
4425
4426         interface = g_hash_table_lookup(interface_table, path);
4427         if (!interface) {
4428                 err = -ENOENT;
4429                 goto done;
4430         }
4431
4432         if (data->callback) {
4433                 data->callback(0, interface, data->user_data);
4434 #if !defined TIZEN_EXT
4435                 callback_p2p_support(interface);
4436 #endif
4437         }
4438
4439         interface_create_data_free(data);
4440
4441         return;
4442
4443 create:
4444         if (!system_available) {
4445                 err = -EFAULT;
4446                 goto done;
4447         }
4448
4449         SUPPLICANT_DBG("Creating interface");
4450
4451         err = supplicant_dbus_method_call(SUPPLICANT_PATH,
4452                                                 SUPPLICANT_INTERFACE,
4453                                                 "CreateInterface",
4454                                                 interface_create_params,
4455                                                 interface_create_result, data,
4456                                                 NULL);
4457         if (err == 0)
4458                 return;
4459
4460 done:
4461         if (data->callback)
4462                 data->callback(err, NULL, data->user_data);
4463
4464         interface_create_data_free(data);
4465 }
4466
4467 static void interface_get_params(DBusMessageIter *iter, void *user_data)
4468 {
4469         struct interface_create_data *data = user_data;
4470
4471         SUPPLICANT_DBG("");
4472
4473         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, &data->ifname);
4474 }
4475
4476 int g_supplicant_interface_create(const char *ifname, const char *driver,
4477                                         const char *bridge,
4478                                         GSupplicantInterfaceCallback callback,
4479                                                         void *user_data)
4480 {
4481         struct interface_create_data *data;
4482         int ret;
4483
4484         SUPPLICANT_DBG("ifname %s", ifname);
4485
4486         if (!ifname)
4487                 return -EINVAL;
4488
4489         if (!system_available)
4490                 return -EFAULT;
4491
4492         data = dbus_malloc0(sizeof(*data));
4493         if (!data)
4494                 return -ENOMEM;
4495
4496         data->ifname = g_strdup(ifname);
4497         data->driver = g_strdup(driver);
4498         data->bridge = g_strdup(bridge);
4499         data->callback = callback;
4500         data->user_data = user_data;
4501
4502         ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
4503                                                 SUPPLICANT_INTERFACE,
4504                                                 "GetInterface",
4505                                                 interface_get_params,
4506                                                 interface_get_result, data,
4507                                                 NULL);
4508         if (ret < 0)
4509                 interface_create_data_free(data);
4510
4511         return ret;
4512 }
4513
4514 static void interface_remove_result(const char *error,
4515                                 DBusMessageIter *iter, void *user_data)
4516 {
4517         struct interface_data *data = user_data;
4518         int err;
4519
4520         if (error) {
4521                 err = -EIO;
4522                 SUPPLICANT_DBG("error: %s", error);
4523                 goto done;
4524         }
4525
4526         if (!system_available) {
4527                 err = -EFAULT;
4528                 goto done;
4529         }
4530
4531         /*
4532          * The gsupplicant interface is already freed by the InterfaceRemoved
4533          * signal callback. Simply invoke the interface_data callback.
4534          */
4535         err = 0;
4536
4537 done:
4538         g_free(data->path);
4539
4540         if (data->callback)
4541                 data->callback(err, NULL, data->user_data);
4542
4543         dbus_free(data);
4544 }
4545
4546
4547 static void interface_remove_params(DBusMessageIter *iter, void *user_data)
4548 {
4549         struct interface_data *data = user_data;
4550
4551         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
4552                                                         &data->interface->path);
4553 }
4554
4555
4556 int g_supplicant_interface_remove(GSupplicantInterface *interface,
4557                         GSupplicantInterfaceCallback callback,
4558                                                         void *user_data)
4559 {
4560         struct interface_data *data;
4561         int ret;
4562
4563         if (!interface)
4564                 return -EINVAL;
4565
4566         if (!system_available)
4567                 return -EFAULT;
4568
4569         g_supplicant_interface_cancel(interface);
4570
4571         data = dbus_malloc0(sizeof(*data));
4572         if (!data)
4573                 return -ENOMEM;
4574
4575         data->interface = interface;
4576         data->path = g_strdup(interface->path);
4577         data->callback = callback;
4578         data->user_data = user_data;
4579
4580         ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
4581                                                 SUPPLICANT_INTERFACE,
4582                                                 "RemoveInterface",
4583                                                 interface_remove_params,
4584                                                 interface_remove_result, data,
4585                                                 NULL);
4586         if (ret < 0) {
4587                 g_free(data->path);
4588                 dbus_free(data);
4589         }
4590         return ret;
4591 }
4592
4593 static void interface_scan_result(const char *error,
4594                                 DBusMessageIter *iter, void *user_data)
4595 {
4596         struct interface_scan_data *data = user_data;
4597         int err = 0;
4598
4599         if (error) {
4600                 SUPPLICANT_DBG("error %s", error);
4601                 err = -EIO;
4602         }
4603
4604         /* A non ready interface cannot send/receive anything */
4605         if (interface_exists(data->interface, data->path)) {
4606                 if (!data->interface->ready)
4607                         err = -ENOLINK;
4608         }
4609
4610         g_free(data->path);
4611
4612         if (err != 0) {
4613                 if (data->callback)
4614                         data->callback(err, data->interface, data->user_data);
4615         } else {
4616                 data->interface->scan_callback = data->callback;
4617                 data->interface->scan_data = data->user_data;
4618         }
4619
4620         if (data->scan_params)
4621                 g_supplicant_free_scan_params(data->scan_params);
4622
4623         dbus_free(data);
4624 }
4625
4626 static void add_scan_frequency(DBusMessageIter *iter, unsigned int freq)
4627 {
4628         DBusMessageIter data;
4629         unsigned int width = 0; /* Not used by wpa_supplicant atm */
4630
4631         dbus_message_iter_open_container(iter, DBUS_TYPE_STRUCT, NULL, &data);
4632
4633         dbus_message_iter_append_basic(&data, DBUS_TYPE_UINT32, &freq);
4634         dbus_message_iter_append_basic(&data, DBUS_TYPE_UINT32, &width);
4635
4636         dbus_message_iter_close_container(iter, &data);
4637 }
4638
4639 static void add_scan_frequencies(DBusMessageIter *iter,
4640                                                 void *user_data)
4641 {
4642         GSupplicantScanParams *scan_data = user_data;
4643         unsigned int freq;
4644         int i;
4645
4646         for (i = 0; i < scan_data->num_freqs; i++) {
4647                 freq = scan_data->freqs[i];
4648                 if (!freq)
4649                         break;
4650
4651                 add_scan_frequency(iter, freq);
4652         }
4653 }
4654
4655 static void append_ssid(DBusMessageIter *iter,
4656                         const void *ssid, unsigned int len)
4657 {
4658         DBusMessageIter array;
4659
4660         dbus_message_iter_open_container(iter, DBUS_TYPE_ARRAY,
4661         DBUS_TYPE_BYTE_AS_STRING, &array);
4662
4663         dbus_message_iter_append_fixed_array(&array, DBUS_TYPE_BYTE,
4664                                                                 &ssid, len);
4665         dbus_message_iter_close_container(iter, &array);
4666 }
4667
4668 static void append_ssids(DBusMessageIter *iter, void *user_data)
4669 {
4670         GSupplicantScanParams *scan_data = user_data;
4671         GSList *list;
4672
4673         for (list = scan_data->ssids; list; list = list->next) {
4674                 struct scan_ssid *scan_ssid = list->data;
4675
4676                 append_ssid(iter, scan_ssid->ssid, scan_ssid->ssid_len);
4677         }
4678 }
4679
4680 static void supplicant_add_scan_frequency(DBusMessageIter *dict,
4681                 supplicant_dbus_array_function function,
4682                                         void *user_data)
4683 {
4684         GSupplicantScanParams *scan_params = user_data;
4685         DBusMessageIter entry, value, array;
4686         const char *key = "Channels";
4687
4688         if (scan_params->freqs && scan_params->freqs[0] != 0) {
4689                 dbus_message_iter_open_container(dict, DBUS_TYPE_DICT_ENTRY,
4690                                                 NULL, &entry);
4691
4692                 dbus_message_iter_append_basic(&entry, DBUS_TYPE_STRING, &key);
4693
4694                 dbus_message_iter_open_container(&entry, DBUS_TYPE_VARIANT,
4695                                         DBUS_TYPE_ARRAY_AS_STRING
4696                                         DBUS_STRUCT_BEGIN_CHAR_AS_STRING
4697                                         DBUS_TYPE_UINT32_AS_STRING
4698                                         DBUS_TYPE_UINT32_AS_STRING
4699                                         DBUS_STRUCT_END_CHAR_AS_STRING,
4700                                         &value);
4701
4702                 dbus_message_iter_open_container(&value, DBUS_TYPE_ARRAY,
4703                                         DBUS_STRUCT_BEGIN_CHAR_AS_STRING
4704                                         DBUS_TYPE_UINT32_AS_STRING
4705                                         DBUS_TYPE_UINT32_AS_STRING
4706                                         DBUS_STRUCT_END_CHAR_AS_STRING,
4707                                         &array);
4708
4709                 if (function)
4710                         function(&array, user_data);
4711
4712                 dbus_message_iter_close_container(&value, &array);
4713                 dbus_message_iter_close_container(&entry, &value);
4714                 dbus_message_iter_close_container(dict, &entry);
4715         }
4716 }
4717
4718 static void interface_scan_params(DBusMessageIter *iter, void *user_data)
4719 {
4720         DBusMessageIter dict;
4721         const char *type = "passive";
4722         struct interface_scan_data *data = user_data;
4723
4724         supplicant_dbus_dict_open(iter, &dict);
4725
4726         if (data && data->scan_params) {
4727                 type = "active";
4728
4729                 supplicant_dbus_dict_append_basic(&dict, "Type",
4730                                         DBUS_TYPE_STRING, &type);
4731
4732 #if defined TIZEN_EXT
4733                 SUPPLICANT_DBG("[specific_scan] num_ssids %d", data->scan_params->num_ssids);
4734                 if (data->scan_params->num_ssids != 0)
4735 #endif
4736                         supplicant_dbus_dict_append_array(&dict, "SSIDs",
4737                                                 DBUS_TYPE_STRING,
4738                                                 append_ssids,
4739                                                 data->scan_params);
4740
4741                 supplicant_add_scan_frequency(&dict, add_scan_frequencies,
4742                                                 data->scan_params);
4743         } else
4744                 supplicant_dbus_dict_append_basic(&dict, "Type",
4745                                         DBUS_TYPE_STRING, &type);
4746
4747         supplicant_dbus_dict_close(iter, &dict);
4748 }
4749
4750 static int interface_ready_to_scan(GSupplicantInterface *interface)
4751 {
4752         if (!interface)
4753                 return -EINVAL;
4754
4755         if (!system_available)
4756                 return -EFAULT;
4757
4758         if (interface->scanning)
4759                 return -EALREADY;
4760
4761         switch (interface->state) {
4762         case G_SUPPLICANT_STATE_AUTHENTICATING:
4763         case G_SUPPLICANT_STATE_ASSOCIATING:
4764         case G_SUPPLICANT_STATE_ASSOCIATED:
4765         case G_SUPPLICANT_STATE_4WAY_HANDSHAKE:
4766         case G_SUPPLICANT_STATE_GROUP_HANDSHAKE:
4767                 return -EBUSY;
4768 #if defined TIZEN_EXT
4769         case G_SUPPLICANT_STATE_DISABLED:
4770                 return -ENOLINK;
4771         case G_SUPPLICANT_STATE_UNKNOWN:
4772 #else
4773         case G_SUPPLICANT_STATE_UNKNOWN:
4774         case G_SUPPLICANT_STATE_DISABLED:
4775 #endif
4776         case G_SUPPLICANT_STATE_DISCONNECTED:
4777         case G_SUPPLICANT_STATE_INACTIVE:
4778         case G_SUPPLICANT_STATE_SCANNING:
4779         case G_SUPPLICANT_STATE_COMPLETED:
4780                 break;
4781         }
4782
4783         return 0;
4784 }
4785
4786 int g_supplicant_interface_scan(GSupplicantInterface *interface,
4787                                 GSupplicantScanParams *scan_data,
4788                                 GSupplicantInterfaceCallback callback,
4789                                                         void *user_data)
4790 {
4791         struct interface_scan_data *data;
4792         int ret;
4793
4794         ret = interface_ready_to_scan(interface);
4795         if (ret)
4796                 return ret;
4797
4798         data = dbus_malloc0(sizeof(*data));
4799         if (!data)
4800                 return -ENOMEM;
4801
4802         data->interface = interface;
4803         data->path = g_strdup(interface->path);
4804 #if defined TIZEN_EXT
4805         data->interface->scan_callback = data->callback = callback;
4806         data->interface->scan_data = data->user_data = user_data;
4807 #else
4808         data->callback = callback;
4809         data->user_data = user_data;
4810 #endif
4811         data->scan_params = scan_data;
4812
4813         interface->scan_callback = callback;
4814         interface->scan_data = user_data;
4815
4816         ret = supplicant_dbus_method_call(interface->path,
4817                         SUPPLICANT_INTERFACE ".Interface", "Scan",
4818                         interface_scan_params, interface_scan_result, data,
4819                         interface);
4820
4821         if (ret < 0) {
4822                 g_free(data->path);
4823                 dbus_free(data);
4824         }
4825
4826         return ret;
4827 }
4828
4829 static int parse_supplicant_error(DBusMessageIter *iter)
4830 {
4831         int err = -ECONNABORTED;
4832         char *key;
4833
4834         if (!iter)
4835                 return err;
4836
4837         /* If the given passphrase is malformed wpa_s returns
4838          * "invalid message format" but this error should be interpreted as
4839          * invalid-key.
4840          */
4841         while (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_STRING) {
4842                 dbus_message_iter_get_basic(iter, &key);
4843                 if (strncmp(key, "psk", 3) == 0 ||
4844                                 strncmp(key, "wep_key", 7) == 0 ||
4845                                 strcmp(key, "invalid message format") == 0) {
4846                         err = -ENOKEY;
4847                         break;
4848                 }
4849                 dbus_message_iter_next(iter);
4850         }
4851
4852         return err;
4853 }
4854
4855 static void interface_select_network_result(const char *error,
4856                                 DBusMessageIter *iter, void *user_data)
4857 {
4858         struct interface_connect_data *data = user_data;
4859         int err;
4860
4861         SUPPLICANT_DBG("");
4862
4863         err = 0;
4864         if (error) {
4865 #if defined TIZEN_EXT
4866                 SUPPLICANT_DBG("SelectNetwork errorFreq %s", error);
4867 #else
4868                 SUPPLICANT_DBG("SelectNetwork error %s", error);
4869 #endif
4870                 err = parse_supplicant_error(iter);
4871         }
4872
4873         g_free(data->path);
4874
4875         if (data->callback)
4876                 data->callback(err, data->interface, data->user_data);
4877
4878         g_free(data->ssid);
4879         dbus_free(data);
4880 }
4881
4882 static void interface_select_network_params(DBusMessageIter *iter,
4883                                                         void *user_data)
4884 {
4885         struct interface_connect_data *data = user_data;
4886         GSupplicantInterface *interface = data->interface;
4887 #if defined TIZEN_EXT
4888         GSupplicantSSID *ssid = data->ssid;
4889 #endif
4890
4891         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
4892                                         &interface->network_path);
4893 #if defined TIZEN_EXT
4894         if (!ssid->bssid_for_connect_len)
4895                 dbus_message_iter_append_basic(iter, DBUS_TYPE_INT32, &ssid->freq);
4896 #endif
4897 }
4898
4899 static void interface_add_network_result(const char *error,
4900                                 DBusMessageIter *iter, void *user_data)
4901 {
4902         struct interface_connect_data *data = user_data;
4903         GSupplicantInterface *interface = data->interface;
4904         const char *path;
4905         int err;
4906
4907         if (error)
4908                 goto error;
4909
4910         dbus_message_iter_get_basic(iter, &path);
4911         if (!path)
4912                 goto error;
4913
4914         SUPPLICANT_DBG("PATH: %s", path);
4915
4916         interface->network_path = g_strdup(path);
4917
4918         store_network_information(interface, data->ssid);
4919
4920 #if defined TIZEN_EXT
4921         SUPPLICANT_DBG(".Interface.SelectNetworkFreq");
4922         GSupplicantSSID *ssid = data->ssid;
4923
4924         if (!ssid->bssid_for_connect_len)
4925                 supplicant_dbus_method_call(data->interface->path,
4926                                 SUPPLICANT_INTERFACE ".Interface", "SelectNetworkFreq",
4927                                 interface_select_network_params,
4928                                 interface_select_network_result, data,
4929                                 interface);
4930         else
4931                 supplicant_dbus_method_call(data->interface->path,
4932                                 SUPPLICANT_INTERFACE ".Interface", "SelectNetwork",
4933                                 interface_select_network_params,
4934                                 interface_select_network_result, data,
4935                                 interface);
4936 #else
4937         supplicant_dbus_method_call(data->interface->path,
4938                         SUPPLICANT_INTERFACE ".Interface", "SelectNetwork",
4939                         interface_select_network_params,
4940                         interface_select_network_result, data,
4941                         interface);
4942 #endif
4943
4944         return;
4945
4946 error:
4947         SUPPLICANT_DBG("AddNetwork error %s", error);
4948
4949         if (interface_exists(data->interface, data->interface->path)) {
4950                 err = parse_supplicant_error(iter);
4951                 if (data->callback)
4952                         data->callback(err, data->interface, data->user_data);
4953
4954                 g_free(interface->network_path);
4955                 interface->network_path = NULL;
4956         }
4957
4958         g_free(data->path);
4959         g_free(data->ssid);
4960         g_free(data);
4961 }
4962
4963 static void add_network_security_none(DBusMessageIter *dict)
4964 {
4965         const char *auth_alg = "OPEN";
4966
4967         supplicant_dbus_dict_append_basic(dict, "auth_alg",
4968                                         DBUS_TYPE_STRING, &auth_alg);
4969 }
4970
4971 static void add_network_security_wep(DBusMessageIter *dict,
4972                                         GSupplicantSSID *ssid)
4973 {
4974         const char *auth_alg = "OPEN SHARED";
4975         dbus_uint32_t key_index = 0;
4976
4977         supplicant_dbus_dict_append_basic(dict, "auth_alg",
4978                                         DBUS_TYPE_STRING, &auth_alg);
4979
4980         if (ssid->passphrase) {
4981                 int size = strlen(ssid->passphrase);
4982                 if (size == 10 || size == 26) {
4983                         unsigned char *key = g_try_malloc(13);
4984                         char tmp[3];
4985                         int i;
4986
4987                         memset(tmp, 0, sizeof(tmp));
4988                         if (!key)
4989                                 size = 0;
4990
4991                         for (i = 0; i < size / 2; i++) {
4992                                 memcpy(tmp, ssid->passphrase + (i * 2), 2);
4993                                 key[i] = (unsigned char) strtol(tmp, NULL, 16);
4994                         }
4995
4996                         supplicant_dbus_dict_append_fixed_array(dict,
4997                                                         "wep_key0",
4998                                                         DBUS_TYPE_BYTE,
4999                                                         &key, size / 2);
5000                         g_free(key);
5001                 } else if (size == 5 || size == 13) {
5002                         unsigned char *key = g_try_malloc(13);
5003                         int i;
5004
5005                         if (!key)
5006                                 size = 0;
5007
5008                         for (i = 0; i < size; i++)
5009                                 key[i] = (unsigned char) ssid->passphrase[i];
5010
5011                         supplicant_dbus_dict_append_fixed_array(dict,
5012                                                                 "wep_key0",
5013                                                                 DBUS_TYPE_BYTE,
5014                                                                 &key, size);
5015                         g_free(key);
5016                 } else
5017                         supplicant_dbus_dict_append_basic(dict,
5018                                                         "wep_key0",
5019                                                         DBUS_TYPE_STRING,
5020                                                         &ssid->passphrase);
5021
5022                 supplicant_dbus_dict_append_basic(dict, "wep_tx_keyidx",
5023                                         DBUS_TYPE_UINT32, &key_index);
5024         }
5025 }
5026
5027 static dbus_bool_t is_psk_raw_key(const char *psk)
5028 {
5029         int i;
5030
5031         /* A raw key is always 64 bytes length... */
5032         if (strlen(psk) != 64)
5033                 return FALSE;
5034
5035         /* ... and its content is in hex representation */
5036         for (i = 0; i < 64; i++)
5037                 if (!isxdigit((unsigned char) psk[i]))
5038                         return FALSE;
5039
5040         return TRUE;
5041 }
5042
5043 static unsigned char hexchar2bin(char c)
5044 {
5045         if ((c >= '0') && (c <= '9'))
5046                 return c - '0';
5047         else if ((c >= 'A') && (c <= 'F'))
5048                 return c - 'A' + 10;
5049         else if ((c >= 'a') && (c <= 'f'))
5050                 return c - 'a' + 10;
5051         else
5052                 return c;
5053 }
5054
5055 static void hexstring2bin(const char *string, unsigned char *data,
5056                                 size_t data_len)
5057 {
5058         size_t i;
5059
5060         for (i = 0; i < data_len; i++)
5061                 data[i] = (hexchar2bin(string[i * 2 + 0]) << 4 |
5062                            hexchar2bin(string[i * 2 + 1]) << 0);
5063 }
5064
5065 static void add_network_security_psk(DBusMessageIter *dict,
5066                                         GSupplicantSSID *ssid)
5067 {
5068         if (ssid->passphrase && strlen(ssid->passphrase) > 0) {
5069                 const char *key = "psk";
5070
5071                 if (is_psk_raw_key(ssid->passphrase)) {
5072                         unsigned char data[32];
5073                         unsigned char *datap = data;
5074
5075                         /* The above pointer alias is required by D-Bus because
5076                          * with D-Bus and GCC, non-heap-allocated arrays cannot
5077                          * be passed directly by their base pointer. */
5078
5079                         hexstring2bin(ssid->passphrase, datap, sizeof(data));
5080
5081                         supplicant_dbus_dict_append_fixed_array(dict,
5082                                                         key, DBUS_TYPE_BYTE,
5083                                                         &datap, sizeof(data));
5084                 } else
5085                         supplicant_dbus_dict_append_basic(dict,
5086                                                         key, DBUS_TYPE_STRING,
5087                                                         &ssid->passphrase);
5088         }
5089 }
5090
5091 static void add_network_security_tls(DBusMessageIter *dict,
5092                                         GSupplicantSSID *ssid)
5093 {
5094         /*
5095          * For TLS, we at least need:
5096          *              The client certificate
5097          *              The client private key file
5098          *              The client private key file password
5099          *
5100          * The Authority certificate is optional.
5101          */
5102         if (!ssid->client_cert_path)
5103                 return;
5104
5105         if (!ssid->private_key_path)
5106                 return;
5107
5108 #if !defined TIZEN_EXT
5109         if (!ssid->private_key_passphrase)
5110                 return;
5111 #endif
5112
5113         if (ssid->ca_cert_path)
5114                 supplicant_dbus_dict_append_basic(dict, "ca_cert",
5115                                         DBUS_TYPE_STRING, &ssid->ca_cert_path);
5116
5117         supplicant_dbus_dict_append_basic(dict, "private_key",
5118                                                 DBUS_TYPE_STRING,
5119                                                 &ssid->private_key_path);
5120 #if !defined TIZEN_EXT
5121         supplicant_dbus_dict_append_basic(dict, "private_key_passwd",
5122                                                 DBUS_TYPE_STRING,
5123                                                 &ssid->private_key_passphrase);
5124 #endif
5125         supplicant_dbus_dict_append_basic(dict, "client_cert",
5126                                                 DBUS_TYPE_STRING,
5127                                                 &ssid->client_cert_path);
5128 }
5129
5130 static void add_network_security_peap(DBusMessageIter *dict,
5131                                         GSupplicantSSID *ssid)
5132 {
5133         char *phase2_auth;
5134
5135         /*
5136          * For PEAP/TTLS, we at least need
5137          *              The authority certificate
5138          *              The 2nd phase authentication method
5139          *              The 2nd phase passphrase
5140          *
5141          * The Client certificate is optional although strongly recommended
5142          * When setting it, we need in addition
5143          *              The Client private key file
5144          *              The Client private key file password
5145          */
5146         if (!ssid->passphrase)
5147                 return;
5148
5149         if (!ssid->phase2_auth)
5150                 return;
5151
5152         if (ssid->client_cert_path) {
5153                 if (!ssid->private_key_path)
5154                         return;
5155
5156 #if !defined TIZEN_EXT
5157                 if (!ssid->private_key_passphrase)
5158                         return;
5159 #endif
5160
5161                 supplicant_dbus_dict_append_basic(dict, "client_cert",
5162                                                 DBUS_TYPE_STRING,
5163                                                 &ssid->client_cert_path);
5164
5165                 supplicant_dbus_dict_append_basic(dict, "private_key",
5166                                                 DBUS_TYPE_STRING,
5167                                                 &ssid->private_key_path);
5168
5169 #if !defined TIZEN_EXT
5170                 supplicant_dbus_dict_append_basic(dict, "private_key_passwd",
5171                                                 DBUS_TYPE_STRING,
5172                                                 &ssid->private_key_passphrase);
5173 #endif
5174
5175         }
5176
5177         if (g_str_has_prefix(ssid->phase2_auth, "EAP-")) {
5178                 phase2_auth = g_strdup_printf("autheap=%s",
5179                                         ssid->phase2_auth + strlen("EAP-"));
5180         } else
5181                 phase2_auth = g_strdup_printf("auth=%s", ssid->phase2_auth);
5182
5183         supplicant_dbus_dict_append_basic(dict, "password",
5184                                                 DBUS_TYPE_STRING,
5185                                                 &ssid->passphrase);
5186
5187         if (ssid->ca_cert_path)
5188                 supplicant_dbus_dict_append_basic(dict, "ca_cert",
5189                                                 DBUS_TYPE_STRING,
5190                                                 &ssid->ca_cert_path);
5191
5192         supplicant_dbus_dict_append_basic(dict, "phase2",
5193                                                 DBUS_TYPE_STRING,
5194                                                 &phase2_auth);
5195
5196         g_free(phase2_auth);
5197 }
5198
5199 #if defined TIZEN_EXT
5200 static void add_network_security_aka_sim(DBusMessageIter *dict,
5201                                         GSupplicantSSID *ssid)
5202 {
5203         if (!ssid->passphrase)
5204                 return;
5205
5206         supplicant_dbus_dict_append_basic(dict, "password",
5207                         DBUS_TYPE_STRING,
5208                         &ssid->passphrase);
5209 }
5210
5211 static void add_network_security_fast(DBusMessageIter *dict,
5212                 GSupplicantSSID *ssid)
5213 {
5214         /*
5215          * For FAST, we at least need:
5216          *              id / password
5217          *              phase1 (provisiong information)
5218          *              pac_file
5219          */
5220
5221         /* Allow provisioing both authenticated and unauthenticated */
5222         const char *phase1 = "fast_provisioning=2";
5223         supplicant_dbus_dict_append_basic(dict, "phase1",
5224                         DBUS_TYPE_STRING,
5225                         &phase1);
5226
5227         SUPPLICANT_DBG("pac_file [%s]", ssid->pac_file);
5228         if(ssid->pac_file)
5229                 supplicant_dbus_dict_append_basic(dict, "pac_file",
5230                                 DBUS_TYPE_STRING,
5231                                 &ssid->pac_file);
5232
5233         supplicant_dbus_dict_append_basic(dict, "password",
5234                         DBUS_TYPE_STRING,
5235                         &ssid->passphrase);
5236 }
5237 #endif
5238
5239 static void add_network_security_eap(DBusMessageIter *dict,
5240                                         GSupplicantSSID *ssid)
5241 {
5242         char *eap_value;
5243
5244 #if defined TIZEN_EXT
5245         if (!ssid->eap)
5246 #else
5247         if (!ssid->eap || !ssid->identity)
5248 #endif
5249                 return;
5250
5251         if (g_strcmp0(ssid->eap, "tls") == 0) {
5252                 add_network_security_tls(dict, ssid);
5253         } else if (g_strcmp0(ssid->eap, "peap") == 0 ||
5254                                 g_strcmp0(ssid->eap, "ttls") == 0) {
5255 #if defined TIZEN_EXT
5256                 if (!ssid->identity)
5257                         return;
5258 #endif
5259                 add_network_security_peap(dict, ssid);
5260
5261 #if defined TIZEN_EXT
5262         } else if (g_strcmp0(ssid->eap, "sim") == 0 ||
5263                         g_strcmp0(ssid->eap, "aka") == 0 ||
5264                         g_strcmp0(ssid->eap, "aka'") == 0) {
5265                 add_network_security_aka_sim(dict, ssid);
5266         } else if (g_strcmp0(ssid->eap, "pwd") == 0) {
5267                 if(!ssid->passphrase)
5268                         return;
5269                 supplicant_dbus_dict_append_basic(dict, "password",
5270                                 DBUS_TYPE_STRING,
5271                                 &ssid->passphrase);
5272         } else if (g_strcmp0(ssid->eap, "fast") == 0){
5273                 if (!ssid->identity || !ssid->passphrase)
5274                         return;
5275
5276                 add_network_security_fast(dict, ssid);
5277 #endif
5278         } else
5279                 return;
5280
5281         eap_value = g_ascii_strup(ssid->eap, -1);
5282
5283         supplicant_dbus_dict_append_basic(dict, "eap",
5284                                                 DBUS_TYPE_STRING,
5285                                                 &eap_value);
5286 #if defined TIZEN_EXT
5287         if (ssid->identity != NULL)
5288                 supplicant_dbus_dict_append_basic(dict, "identity",
5289                                                         DBUS_TYPE_STRING,
5290                                                         &ssid->identity);
5291 #else
5292         supplicant_dbus_dict_append_basic(dict, "identity",
5293                                                 DBUS_TYPE_STRING,
5294                                                 &ssid->identity);
5295 #endif
5296         if(ssid->anonymous_identity)
5297                 supplicant_dbus_dict_append_basic(dict, "anonymous_identity",
5298                                                      DBUS_TYPE_STRING,
5299                                                      &ssid->anonymous_identity);
5300
5301         if(ssid->subject_match)
5302                 supplicant_dbus_dict_append_basic(dict, "subject_match",
5303                                                      DBUS_TYPE_STRING,
5304                                                      &ssid->subject_match);
5305
5306         if(ssid->altsubject_match)
5307                 supplicant_dbus_dict_append_basic(dict, "altsubject_match",
5308                                                      DBUS_TYPE_STRING,
5309                                                      &ssid->altsubject_match);
5310
5311         if(ssid->domain_suffix_match)
5312                 supplicant_dbus_dict_append_basic(dict, "domain_suffix_match",
5313                                                      DBUS_TYPE_STRING,
5314                                                      &ssid->domain_suffix_match);
5315
5316         if(ssid->domain_match)
5317                 supplicant_dbus_dict_append_basic(dict, "domain_match",
5318                                                      DBUS_TYPE_STRING,
5319                                                      &ssid->domain_match);
5320
5321         g_free(eap_value);
5322 }
5323
5324 static void add_network_security_ciphers(DBusMessageIter *dict,
5325                                                 GSupplicantSSID *ssid)
5326 {
5327         unsigned int p_cipher, g_cipher, i;
5328         char *pairwise, *group;
5329         char *pair_ciphers[4];
5330         char *group_ciphers[5];
5331
5332         p_cipher = ssid->pairwise_cipher;
5333         g_cipher = ssid->group_cipher;
5334
5335         if (p_cipher == 0 && g_cipher == 0)
5336                 return;
5337
5338         i = 0;
5339
5340         if (p_cipher & G_SUPPLICANT_PAIRWISE_CCMP)
5341                 pair_ciphers[i++] = "CCMP";
5342
5343         if (p_cipher & G_SUPPLICANT_PAIRWISE_TKIP)
5344                 pair_ciphers[i++] = "TKIP";
5345
5346         if (p_cipher & G_SUPPLICANT_PAIRWISE_NONE)
5347                 pair_ciphers[i++] = "NONE";
5348
5349         pair_ciphers[i] = NULL;
5350
5351         i = 0;
5352
5353         if (g_cipher & G_SUPPLICANT_GROUP_CCMP)
5354                 group_ciphers[i++] = "CCMP";
5355
5356         if (g_cipher & G_SUPPLICANT_GROUP_TKIP)
5357                 group_ciphers[i++] = "TKIP";
5358
5359         if (g_cipher & G_SUPPLICANT_GROUP_WEP104)
5360                 group_ciphers[i++] = "WEP104";
5361
5362         if (g_cipher & G_SUPPLICANT_GROUP_WEP40)
5363                 group_ciphers[i++] = "WEP40";
5364
5365         group_ciphers[i] = NULL;
5366
5367         pairwise = g_strjoinv(" ", pair_ciphers);
5368         group = g_strjoinv(" ", group_ciphers);
5369
5370         SUPPLICANT_DBG("cipher %s %s", pairwise, group);
5371
5372         supplicant_dbus_dict_append_basic(dict, "pairwise",
5373                                                 DBUS_TYPE_STRING,
5374                                                 &pairwise);
5375         supplicant_dbus_dict_append_basic(dict, "group",
5376                                                 DBUS_TYPE_STRING,
5377                                                 &group);
5378
5379         g_free(pairwise);
5380         g_free(group);
5381 }
5382
5383 static void add_network_security_proto(DBusMessageIter *dict,
5384                                                 GSupplicantSSID *ssid)
5385 {
5386         unsigned int protocol, i;
5387         char *proto;
5388         char *protos[3];
5389
5390         protocol = ssid->protocol;
5391
5392         if (protocol == 0)
5393                 return;
5394
5395         i = 0;
5396
5397         if (protocol & G_SUPPLICANT_PROTO_RSN)
5398                 protos[i++] = "RSN";
5399
5400         if (protocol & G_SUPPLICANT_PROTO_WPA)
5401                 protos[i++] = "WPA";
5402
5403         protos[i] = NULL;
5404
5405         proto = g_strjoinv(" ", protos);
5406
5407         SUPPLICANT_DBG("proto %s", proto);
5408
5409         supplicant_dbus_dict_append_basic(dict, "proto",
5410                                                 DBUS_TYPE_STRING,
5411                                                 &proto);
5412
5413         g_free(proto);
5414 }
5415
5416 static void add_network_security(DBusMessageIter *dict, GSupplicantSSID *ssid)
5417 {
5418         char *key_mgmt;
5419
5420         switch (ssid->security) {
5421         case G_SUPPLICANT_SECURITY_NONE:
5422                 key_mgmt = "NONE";
5423                 add_network_security_none(dict);
5424                 add_network_security_ciphers(dict, ssid);
5425                 break;
5426         case G_SUPPLICANT_SECURITY_UNKNOWN:
5427         case G_SUPPLICANT_SECURITY_WEP:
5428                 key_mgmt = "NONE";
5429                 add_network_security_wep(dict, ssid);
5430                 add_network_security_ciphers(dict, ssid);
5431                 break;
5432         case G_SUPPLICANT_SECURITY_PSK:
5433                 key_mgmt = "WPA-PSK";
5434                 add_network_security_psk(dict, ssid);
5435                 add_network_security_ciphers(dict, ssid);
5436                 add_network_security_proto(dict, ssid);
5437                 break;
5438         case G_SUPPLICANT_SECURITY_IEEE8021X:
5439                 key_mgmt = "WPA-EAP";
5440                 add_network_security_eap(dict, ssid);
5441                 add_network_security_ciphers(dict, ssid);
5442                 add_network_security_proto(dict, ssid);
5443                 break;
5444 #if defined TIZEN_EXT
5445         case G_SUPPLICANT_SECURITY_FT_PSK:
5446                 key_mgmt = "FT-PSK";
5447                 add_network_security_psk(dict, ssid);
5448                 add_network_security_ciphers(dict, ssid);
5449                 add_network_security_proto(dict, ssid);
5450                 break;
5451         case G_SUPPLICANT_SECURITY_FT_IEEE8021X:
5452                 key_mgmt = "FT-EAP";
5453                 add_network_security_eap(dict, ssid);
5454                 add_network_security_ciphers(dict, ssid);
5455                 add_network_security_proto(dict, ssid);
5456                 break;
5457 #endif
5458         }
5459
5460         supplicant_dbus_dict_append_basic(dict, "key_mgmt",
5461                                 DBUS_TYPE_STRING, &key_mgmt);
5462 }
5463
5464 static void add_network_mode(DBusMessageIter *dict, GSupplicantSSID *ssid)
5465 {
5466         dbus_uint32_t mode;
5467
5468         switch (ssid->mode) {
5469         case G_SUPPLICANT_MODE_UNKNOWN:
5470         case G_SUPPLICANT_MODE_INFRA:
5471                 mode = 0;
5472                 break;
5473         case G_SUPPLICANT_MODE_IBSS:
5474                 mode = 1;
5475                 break;
5476         case G_SUPPLICANT_MODE_MASTER:
5477                 mode = 2;
5478                 break;
5479         }
5480
5481         supplicant_dbus_dict_append_basic(dict, "mode",
5482                                 DBUS_TYPE_UINT32, &mode);
5483 }
5484
5485 static void interface_add_network_params(DBusMessageIter *iter, void *user_data)
5486 {
5487         DBusMessageIter dict;
5488         struct interface_connect_data *data = user_data;
5489         GSupplicantSSID *ssid = data->ssid;
5490
5491         supplicant_dbus_dict_open(iter, &dict);
5492
5493         if (ssid->scan_ssid)
5494                 supplicant_dbus_dict_append_basic(&dict, "scan_ssid",
5495                                          DBUS_TYPE_UINT32, &ssid->scan_ssid);
5496
5497         if (ssid->freq)
5498                 supplicant_dbus_dict_append_basic(&dict, "frequency",
5499                                          DBUS_TYPE_UINT32, &ssid->freq);
5500
5501         if (ssid->bgscan)
5502                 supplicant_dbus_dict_append_basic(&dict, "bgscan",
5503                                         DBUS_TYPE_STRING, &ssid->bgscan);
5504
5505         add_network_mode(&dict, ssid);
5506
5507         add_network_security(&dict, ssid);
5508
5509         supplicant_dbus_dict_append_fixed_array(&dict, "ssid",
5510                                         DBUS_TYPE_BYTE, &ssid->ssid,
5511                                                 ssid->ssid_len);
5512
5513         supplicant_dbus_dict_append_basic(&dict, "ignore_broadcast_ssid",
5514                                         DBUS_TYPE_INT32,
5515                                         &ssid->ignore_broadcast_ssid);
5516
5517 #if defined TIZEN_EXT
5518         if (ssid->bssid) {
5519                 char *bssid = NULL;
5520                 bssid = g_try_malloc0(18);
5521                 if (bssid == NULL) {
5522                         SUPPLICANT_DBG("memory allocation error");
5523                         supplicant_dbus_dict_close(iter, &dict);
5524                         return;
5525                 }
5526
5527                 if (ssid->bssid_for_connect_len)
5528                         snprintf(bssid, 18, "%02x:%02x:%02x:%02x:%02x:%02x",
5529                                         ssid->bssid_for_connect[0], ssid->bssid_for_connect[1], ssid->bssid_for_connect[2],
5530                                         ssid->bssid_for_connect[3], ssid->bssid_for_connect[4], ssid->bssid_for_connect[5]);
5531                 else
5532                         snprintf(bssid, 18, "%02x:%02x:%02x:%02x:%02x:%02x",
5533                                         ssid->bssid[0], ssid->bssid[1], ssid->bssid[2],
5534                                         ssid->bssid[3], ssid->bssid[4], ssid->bssid[5]);
5535
5536                 supplicant_dbus_dict_append_basic(&dict, "bssid",
5537                                         DBUS_TYPE_STRING, &bssid);
5538                 g_free(bssid);
5539         }
5540 #endif
5541
5542         supplicant_dbus_dict_close(iter, &dict);
5543 }
5544
5545 static void interface_wps_start_result(const char *error,
5546                                 DBusMessageIter *iter, void *user_data)
5547 {
5548         struct interface_connect_data *data = user_data;
5549         int err;
5550
5551         SUPPLICANT_DBG("");
5552
5553         err = 0;
5554         if (error) {
5555                 SUPPLICANT_DBG("error: %s", error);
5556                 err = parse_supplicant_error(iter);
5557         }
5558
5559         if(data->callback)
5560                 data->callback(err, data->interface, data->user_data);
5561
5562         g_free(data->path);
5563         g_free(data->ssid);
5564         dbus_free(data);
5565 }
5566
5567 static void interface_add_wps_params(DBusMessageIter *iter, void *user_data)
5568 {
5569         struct interface_connect_data *data = user_data;
5570         GSupplicantSSID *ssid = data->ssid;
5571         const char *role = "enrollee", *type;
5572         DBusMessageIter dict;
5573
5574         SUPPLICANT_DBG("");
5575
5576         supplicant_dbus_dict_open(iter, &dict);
5577
5578         supplicant_dbus_dict_append_basic(&dict, "Role",
5579                                                 DBUS_TYPE_STRING, &role);
5580
5581         type = "pbc";
5582         if (ssid->pin_wps) {
5583                 type = "pin";
5584                 supplicant_dbus_dict_append_basic(&dict, "Pin",
5585                                         DBUS_TYPE_STRING, &ssid->pin_wps);
5586         }
5587
5588         supplicant_dbus_dict_append_basic(&dict, "Type",
5589                                         DBUS_TYPE_STRING, &type);
5590
5591 #if defined TIZEN_EXT
5592         if (ssid->bssid)
5593                 supplicant_dbus_dict_append_fixed_array(&dict, "Bssid",
5594                                                 DBUS_TYPE_BYTE, &ssid->bssid, 6);
5595 #endif
5596
5597         supplicant_dbus_dict_close(iter, &dict);
5598 }
5599
5600 static void wps_start(const char *error, DBusMessageIter *iter, void *user_data)
5601 {
5602         struct interface_connect_data *data = user_data;
5603
5604         SUPPLICANT_DBG("");
5605
5606         if (error) {
5607                 SUPPLICANT_DBG("error: %s", error);
5608                 g_free(data->path);
5609                 g_free(data->ssid);
5610                 dbus_free(data);
5611                 return;
5612         }
5613 #if defined TIZEN_EXT
5614         GSupplicantSSID *ssid = data->ssid;
5615         if (ssid->pin_wps != NULL) {
5616                 if (!g_utf8_validate(ssid->pin_wps, 8, NULL)) {
5617                         SUPPLICANT_DBG("Invalid characters in WPS_PIN");
5618                         g_free(data->ssid);
5619                         dbus_free(data);
5620                         return;
5621                 }
5622         }
5623 #endif
5624         supplicant_dbus_method_call(data->interface->path,
5625                         SUPPLICANT_INTERFACE ".Interface.WPS", "Start",
5626                         interface_add_wps_params,
5627                         interface_wps_start_result, data, NULL);
5628 }
5629
5630 static void wps_process_credentials(DBusMessageIter *iter, void *user_data)
5631 {
5632         dbus_bool_t credentials = TRUE;
5633
5634         SUPPLICANT_DBG("");
5635
5636         dbus_message_iter_append_basic(iter, DBUS_TYPE_BOOLEAN, &credentials);
5637 }
5638
5639
5640 #if defined TIZEN_EXT
5641 #define NETCONFIG_SERVICE "net.netconfig"
5642 #define NETCONFIG_WIFI_PATH "/net/netconfig/wifi"
5643 #define NETCONFIG_WIFI_INTERFACE NETCONFIG_SERVICE ".wifi"
5644
5645 struct dec_method_call_data {
5646         struct interface_connect_data *data;
5647         DBusPendingCall *pending_call;
5648 };
5649
5650 static struct dec_method_call_data decrypt_request_data;
5651
5652 static void crypt_method_call_cancel(void)
5653 {
5654         if (decrypt_request_data.pending_call) {
5655                 dbus_pending_call_cancel(decrypt_request_data.pending_call);
5656                 dbus_pending_call_unref(decrypt_request_data.pending_call);
5657                 decrypt_request_data.pending_call = NULL;
5658         }
5659
5660         g_free(decrypt_request_data.data->path);
5661         g_free(decrypt_request_data.data->ssid);
5662         dbus_free(decrypt_request_data.data);
5663         decrypt_request_data.data = NULL;
5664 }
5665
5666 static void decryption_request_reply(DBusPendingCall *call,
5667                                                 void *user_data)
5668 {
5669         DBusMessage *reply;
5670         DBusError error;
5671         DBusMessageIter args;
5672         char *out_data;
5673         int ret;
5674         static gchar* origin_value = NULL;
5675         struct interface_connect_data *data = user_data;
5676
5677         g_free(origin_value);
5678         origin_value = NULL;
5679
5680         SUPPLICANT_DBG("");
5681
5682         reply = dbus_pending_call_steal_reply(call);
5683
5684         dbus_error_init(&error);
5685         if (dbus_set_error_from_message(&error, reply)) {
5686                 SUPPLICANT_DBG("decryption_request_reply() %s %s", error.name, error.message);
5687                 dbus_error_free(&error);
5688                 ret = -EINVAL;
5689                 goto done;
5690         }
5691
5692         if (dbus_message_iter_init(reply, &args) == FALSE) {
5693                 SUPPLICANT_DBG("dbus_message_iter_init() failed");
5694                 ret = -EINVAL;
5695                 goto done;
5696         }
5697
5698         dbus_message_iter_get_basic(&args, &out_data);
5699
5700         origin_value = g_strdup((const gchar *)out_data);
5701         data->ssid->passphrase = origin_value;
5702
5703         ret = supplicant_dbus_method_call(data->interface->path,
5704                 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
5705                 interface_add_network_params,
5706                 interface_add_network_result, data,
5707                 data->interface);
5708
5709 done:
5710         if (ret < 0) {
5711                 SUPPLICANT_DBG("AddNetwork failed %d", ret);
5712                 callback_assoc_failed(decrypt_request_data.data->user_data);
5713                 g_free(data->path);
5714                 g_free(data->ssid);
5715                 dbus_free(data);
5716         }
5717
5718         dbus_message_unref(reply);
5719         dbus_pending_call_unref(call);
5720
5721         decrypt_request_data.pending_call = NULL;
5722         decrypt_request_data.data = NULL;
5723 }
5724
5725 static int send_decryption_request(const char *passphrase,
5726                         struct interface_connect_data *data)
5727 {
5728         DBusMessage *msg = NULL;
5729         DBusPendingCall *call;
5730
5731         SUPPLICANT_DBG("Decryption request");
5732
5733         if (!passphrase) {
5734                 SUPPLICANT_DBG("Invalid parameter");
5735                 return -EINVAL;
5736         }
5737
5738         if (!connection)
5739                 return -EINVAL;
5740
5741         msg = dbus_message_new_method_call(NETCONFIG_SERVICE, NETCONFIG_WIFI_PATH,
5742                         NETCONFIG_WIFI_INTERFACE, "DecryptPassphrase");
5743         if (!msg)
5744                 return -EINVAL;
5745
5746         dbus_message_append_args(msg, DBUS_TYPE_STRING, &passphrase,
5747                                                         DBUS_TYPE_INVALID);
5748
5749         if (!dbus_connection_send_with_reply(connection, msg,
5750                                 &call, DBUS_TIMEOUT_USE_DEFAULT)) {
5751                 dbus_message_unref(msg);
5752                 return -EIO;
5753         }
5754
5755         if (!call) {
5756                 dbus_message_unref(msg);
5757                 return -EIO;
5758         }
5759
5760         decrypt_request_data.pending_call = call;
5761         decrypt_request_data.data = data;
5762
5763         dbus_pending_call_set_notify(call, decryption_request_reply, data, NULL);
5764         dbus_message_unref(msg);
5765
5766         SUPPLICANT_DBG("Decryption request succeeded");
5767
5768         return 0;
5769 }
5770 #endif
5771
5772 int g_supplicant_interface_connect(GSupplicantInterface *interface,
5773                                 GSupplicantSSID *ssid,
5774                                 GSupplicantInterfaceCallback callback,
5775                                                         void *user_data)
5776 {
5777         struct interface_connect_data *data;
5778         struct interface_data *intf_data;
5779         int ret = 0;
5780
5781         SUPPLICANT_DBG("");
5782
5783         if (!interface)
5784                 return -EINVAL;
5785
5786         if (!system_available)
5787                 return -EFAULT;
5788
5789         /* TODO: Check if we're already connected and switch */
5790
5791         data = dbus_malloc0(sizeof(*data));
5792         if (!data)
5793                 return -ENOMEM;
5794
5795         data->interface = interface;
5796         data->path = g_strdup(interface->path);
5797         data->callback = callback;
5798         data->ssid = ssid;
5799         data->user_data = user_data;
5800
5801         if (ssid->use_wps) {
5802                 g_free(interface->wps_cred.key);
5803                 memset(&interface->wps_cred, 0,
5804                                 sizeof(struct _GSupplicantWpsCredentials));
5805
5806                 ret = supplicant_dbus_property_set(interface->path,
5807                         SUPPLICANT_INTERFACE ".Interface.WPS",
5808                         "ProcessCredentials", DBUS_TYPE_BOOLEAN_AS_STRING,
5809                         wps_process_credentials, wps_start, data, interface);
5810         } else {
5811                 /* By the time there is a request for connect and the network
5812                  * path is not NULL it means that connman has not removed the
5813                  * previous network pointer. This can happen in the case AP
5814                  * deauthenticated client and connman does not remove the
5815                  * previously connected network pointer. This causes supplicant
5816                  * to reallocate the memory for struct wpa_ssid again even if it
5817                  * is the same SSID. This causes memory usage of wpa_supplicnat
5818                  * to go high. The idea here is that if the previously connected
5819                  * network is not removed at the time of next connection attempt
5820                  * check if the network path is not NULL. In case it is non-NULL
5821                  * first remove the network and then once removal is successful, add
5822                  * the network.
5823                  */
5824
5825                 if (interface->network_path != NULL) {
5826                         g_free(data->path);
5827                         dbus_free(data);
5828
5829                         /*
5830                          * If this add network is for the same network for
5831                          * which wpa_supplicant already has a profile then do
5832                          * not need to add another profile. Only if the
5833                          * profile that needs to get added is different from
5834                          * what is there in wpa_s delete the current one. A
5835                          * network is identified by its SSID, security_type
5836                          * and passphrase (private passphrase in case security
5837                          * type is 802.11x).
5838                          */
5839                         if (compare_network_parameters(interface, ssid)) {
5840                                 return -EALREADY;
5841                         }
5842
5843                         intf_data = dbus_malloc0(sizeof(*intf_data));
5844                         if (!intf_data)
5845                                 return -ENOMEM;
5846
5847                         intf_data->interface = interface;
5848                         intf_data->path = g_strdup(interface->path);
5849                         intf_data->callback = callback;
5850                         intf_data->ssid = ssid;
5851                         intf_data->user_data = user_data;
5852                         intf_data->network_remove_in_progress = TRUE;
5853                         network_remove(intf_data);
5854                 } else
5855 #if defined TIZEN_EXT
5856                         if (ssid->passphrase && g_strcmp0(ssid->passphrase, "") != 0 && !ssid->eap) {
5857                                 ret = send_decryption_request(ssid->passphrase, data);
5858                                 if (ret < 0)
5859                                         SUPPLICANT_DBG("Decryption request failed %d", ret);
5860                         } else
5861 #endif
5862                                 ret = supplicant_dbus_method_call(interface->path,
5863                                                 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
5864                                                 interface_add_network_params,
5865                                                 interface_add_network_result, data,
5866                                                 interface);
5867         }
5868
5869         if (ret < 0) {
5870                 g_free(data->path);
5871                 dbus_free(data);
5872                 return ret;
5873         }
5874
5875         return -EINPROGRESS;
5876 }
5877
5878 static void network_remove_result(const char *error,
5879                                 DBusMessageIter *iter, void *user_data)
5880 {
5881         struct interface_data *data = user_data;
5882         struct interface_connect_data *connect_data;
5883         int result = 0;
5884
5885         SUPPLICANT_DBG("");
5886
5887         if (error) {
5888                 result = -EIO;
5889                 SUPPLICANT_DBG("error: %s", error);
5890
5891                 if (g_strcmp0("org.freedesktop.DBus.Error.UnknownMethod",
5892                                                 error) == 0)
5893                         result = -ECONNABORTED;
5894         }
5895
5896         g_free(data->interface->network_path);
5897         data->interface->network_path = NULL;
5898
5899         remove_network_information(data->interface);
5900
5901         if (data->network_remove_in_progress == TRUE) {
5902                 data->network_remove_in_progress = FALSE;
5903                 connect_data = dbus_malloc0(sizeof(*connect_data));
5904                 if (!connect_data)
5905                         return;
5906
5907                 connect_data->interface = data->interface;
5908                 connect_data->path = g_strdup(data->path);
5909                 connect_data->callback = data->callback;
5910                 connect_data->ssid = data->ssid;
5911                 connect_data->user_data = data->user_data;
5912
5913 #if defined TIZEN_EXT
5914                 int ret;
5915                 if (data->ssid->passphrase && g_strcmp0(data->ssid->passphrase, "") != 0
5916                         && !data->ssid->eap) {
5917                         ret = send_decryption_request(data->ssid->passphrase, connect_data);
5918                         if (ret < 0)
5919                                 SUPPLICANT_DBG("Decryption request failed %d", ret);
5920                 } else
5921 #endif
5922                 supplicant_dbus_method_call(data->interface->path,
5923                         SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
5924                         interface_add_network_params,
5925                         interface_add_network_result, connect_data,
5926                         connect_data->interface);
5927         } else {
5928                 if (data->callback)
5929                         data->callback(result, data->interface, data->user_data);
5930         }
5931         g_free(data->path);
5932         dbus_free(data);
5933 }
5934
5935 static void network_remove_params(DBusMessageIter *iter, void *user_data)
5936 {
5937         struct interface_data *data = user_data;
5938         const char *path = data->interface->network_path;
5939
5940         SUPPLICANT_DBG("path %s", path);
5941
5942         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH, &path);
5943 }
5944
5945 static int network_remove(struct interface_data *data)
5946 {
5947         GSupplicantInterface *interface = data->interface;
5948
5949         SUPPLICANT_DBG("");
5950
5951 #if defined TIZEN_EXT
5952         GSupplicantInterface *intf = NULL;
5953         /*
5954          * Check if 'interface' is valid
5955          */
5956         intf = g_hash_table_lookup(interface_table, interface->path);
5957         if (intf == NULL)
5958                 return -EINVAL;
5959 #endif
5960
5961         return supplicant_dbus_method_call(interface->path,
5962                         SUPPLICANT_INTERFACE ".Interface", "RemoveNetwork",
5963                         network_remove_params, network_remove_result, data,
5964                         interface);
5965 }
5966
5967 static void interface_disconnect_result(const char *error,
5968                                 DBusMessageIter *iter, void *user_data)
5969 {
5970         struct interface_data *data = user_data;
5971         int result = 0;
5972
5973         SUPPLICANT_DBG("");
5974
5975         if (error) {
5976                 result = -EIO;
5977                 SUPPLICANT_DBG("error: %s", error);
5978
5979                 if (g_strcmp0("org.freedesktop.DBus.Error.UnknownMethod",
5980                                                 error) == 0)
5981                         result = -ECONNABORTED;
5982         }
5983
5984         /* If we are disconnecting from previous WPS successful
5985          * association. i.e.: it did not went through AddNetwork,
5986          * and interface->network_path was never set. */
5987         if (!data->interface->network_path) {
5988                 if (data->callback)
5989                         data->callback(result, data->interface,
5990                                                         data->user_data);
5991
5992                 g_free(data->path);
5993                 dbus_free(data);
5994                 return;
5995         }
5996
5997         if (result < 0 && data->callback) {
5998                 data->callback(result, data->interface, data->user_data);
5999                 data->callback = NULL;
6000         }
6001
6002         if (result != -ECONNABORTED) {
6003                 if (network_remove(data) < 0) {
6004                         g_free(data->path);
6005                         dbus_free(data);
6006                 }
6007         } else {
6008                 g_free(data->path);
6009                 dbus_free(data);
6010         }
6011 }
6012
6013 int g_supplicant_interface_disconnect(GSupplicantInterface *interface,
6014                                         GSupplicantInterfaceCallback callback,
6015                                                         void *user_data)
6016 {
6017         struct interface_data *data;
6018         int ret;
6019
6020         SUPPLICANT_DBG("");
6021
6022         if (!interface)
6023                 return -EINVAL;
6024
6025         if (!system_available)
6026                 return -EFAULT;
6027 #if defined TIZEN_EXT
6028         if (decrypt_request_data.pending_call &&
6029                         decrypt_request_data.data &&
6030                         decrypt_request_data.data->user_data == user_data) {
6031
6032                 callback_assoc_failed(decrypt_request_data.data->user_data);
6033                 crypt_method_call_cancel();
6034
6035                 return 0;
6036         }
6037 #endif
6038         data = dbus_malloc0(sizeof(*data));
6039         if (!data)
6040                 return -ENOMEM;
6041
6042         data->interface = interface;
6043         data->path = g_strdup(interface->path);
6044         data->callback = callback;
6045         data->user_data = user_data;
6046
6047         ret = supplicant_dbus_method_call(interface->path,
6048                         SUPPLICANT_INTERFACE ".Interface", "Disconnect",
6049                         NULL, interface_disconnect_result, data,
6050                         interface);
6051
6052         if (ret < 0) {
6053                 g_free(data->path);
6054                 dbus_free(data);
6055         }
6056
6057         return ret;
6058 }
6059
6060 static void interface_p2p_find_result(const char *error,
6061                                         DBusMessageIter *iter, void *user_data)
6062 {
6063         struct interface_scan_data *data = user_data;
6064         int err = 0;
6065
6066         SUPPLICANT_DBG("error %s", error);
6067
6068         if (error)
6069                 err = -EIO;
6070
6071         if (interface_exists(data->interface, data->path)) {
6072                 if (!data->interface->ready)
6073                         err = -ENOLINK;
6074                 if (!err)
6075                         data->interface->p2p_finding = true;
6076         }
6077
6078         if (data->callback)
6079                 data->callback(err, data->interface, data->user_data);
6080
6081         g_free(data->path);
6082         dbus_free(data);
6083 }
6084
6085 static void interface_p2p_find_params(DBusMessageIter *iter, void *user_data)
6086 {
6087         DBusMessageIter dict;
6088
6089         supplicant_dbus_dict_open(iter, &dict);
6090         supplicant_dbus_dict_close(iter, &dict);
6091 }
6092
6093 int g_supplicant_interface_p2p_find(GSupplicantInterface *interface,
6094                                         GSupplicantInterfaceCallback callback,
6095                                                         void *user_data)
6096 {
6097         struct interface_scan_data *data;
6098         int ret;
6099
6100         if (!interface->p2p_support)
6101                 return -ENOTSUP;
6102
6103         ret = interface_ready_to_scan(interface);
6104         if (ret && ret != -EALREADY)
6105                 return ret;
6106
6107         data = dbus_malloc0(sizeof(*data));
6108         if (!data)
6109                 return -ENOMEM;
6110
6111         data->interface = interface;
6112         data->path = g_strdup(interface->path);
6113         data->callback = callback;
6114         data->user_data = user_data;
6115
6116         ret = supplicant_dbus_method_call(interface->path,
6117                         SUPPLICANT_INTERFACE ".Interface.P2PDevice", "Find",
6118                         interface_p2p_find_params, interface_p2p_find_result,
6119                         data, interface);
6120         if (ret < 0) {
6121                 g_free(data->path);
6122                 dbus_free(data);
6123         }
6124
6125         return ret;
6126 }
6127
6128 bool g_supplicant_interface_is_p2p_finding(GSupplicantInterface *interface)
6129 {
6130         if (!interface)
6131                 return false;
6132
6133         return interface->p2p_finding;
6134 }
6135
6136 int g_supplicant_interface_p2p_stop_find(GSupplicantInterface *interface)
6137 {
6138         if (!interface->p2p_finding)
6139                 return 0;
6140
6141         SUPPLICANT_DBG("");
6142
6143         interface->p2p_finding = false;
6144
6145         return supplicant_dbus_method_call(interface->path,
6146                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "StopFind",
6147                 NULL, NULL, NULL, NULL);
6148 }
6149
6150 static void interface_p2p_connect_result(const char *error,
6151                                         DBusMessageIter *iter, void *user_data)
6152 {
6153         struct interface_connect_data *data = user_data;
6154         int err = 0;
6155
6156         SUPPLICANT_DBG("");
6157
6158         if (error) {
6159                 SUPPLICANT_DBG("error: %s", error);
6160                 err = parse_supplicant_error(iter);
6161         }
6162
6163         if (data->callback)
6164                 data->callback(err, data->interface, data->user_data);
6165
6166         g_free(data->path);
6167         g_free(data->peer->wps_pin);
6168         g_free(data->peer->path);
6169         g_free(data->peer);
6170         g_free(data);
6171 }
6172
6173 static void interface_p2p_connect_params(DBusMessageIter *iter, void *user_data)
6174 {
6175         struct interface_connect_data *data = user_data;
6176         const char *wps = "pbc";
6177         DBusMessageIter dict;
6178         int go_intent = 7;
6179
6180         SUPPLICANT_DBG("");
6181
6182         supplicant_dbus_dict_open(iter, &dict);
6183
6184         if (data->peer->master)
6185                 go_intent = 15;
6186
6187         if (data->peer->wps_pin)
6188                 wps = "pin";
6189
6190         supplicant_dbus_dict_append_basic(&dict, "peer",
6191                                 DBUS_TYPE_OBJECT_PATH, &data->peer->path);
6192         supplicant_dbus_dict_append_basic(&dict, "wps_method",
6193                                 DBUS_TYPE_STRING, &wps);
6194         if (data->peer->wps_pin) {
6195                 supplicant_dbus_dict_append_basic(&dict, "pin",
6196                                 DBUS_TYPE_STRING, &data->peer->wps_pin);
6197         }
6198
6199         supplicant_dbus_dict_append_basic(&dict, "go_intent",
6200                                         DBUS_TYPE_INT32, &go_intent);
6201
6202         supplicant_dbus_dict_close(iter, &dict);
6203 }
6204
6205 int g_supplicant_interface_p2p_connect(GSupplicantInterface *interface,
6206                                         GSupplicantPeerParams *peer_params,
6207                                         GSupplicantInterfaceCallback callback,
6208                                         void *user_data)
6209 {
6210         struct interface_connect_data *data;
6211         int ret;
6212
6213         SUPPLICANT_DBG("");
6214
6215         if (!interface->p2p_support)
6216                 return -ENOTSUP;
6217
6218         data = dbus_malloc0(sizeof(*data));
6219         if (!data)
6220                 return -ENOMEM;
6221
6222         data->interface = interface;
6223         data->path = g_strdup(interface->path);
6224         data->peer = peer_params;
6225         data->callback = callback;
6226         data->user_data = user_data;
6227
6228         ret = supplicant_dbus_method_call(interface->path,
6229                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "Connect",
6230                 interface_p2p_connect_params, interface_p2p_connect_result,
6231                 data, interface);
6232         if (ret < 0) {
6233                 g_free(data->path);
6234                 dbus_free(data);
6235                 return ret;
6236         }
6237
6238         return -EINPROGRESS;
6239 }
6240
6241 int g_supplicant_interface_p2p_disconnect(GSupplicantInterface *interface,
6242                                         GSupplicantPeerParams *peer_params)
6243 {
6244         GSupplicantPeer *peer;
6245         int count = 0;
6246         GSList *list;
6247
6248         SUPPLICANT_DBG("");
6249
6250         if (!interface->p2p_support)
6251                 return -ENOTSUP;
6252
6253         peer = g_hash_table_lookup(interface->peer_table, peer_params->path);
6254         if (!peer)
6255                 return -ENODEV;
6256
6257         for (list = peer->groups; list; list = list->next, count++) {
6258                 const char *group_obj_path = list->data;
6259                 GSupplicantInterface *g_interface;
6260                 GSupplicantGroup *group;
6261
6262                 group = g_hash_table_lookup(group_mapping, group_obj_path);
6263                 if (!group || !group->interface)
6264                         continue;
6265
6266                 g_interface = group->interface;
6267                 supplicant_dbus_method_call(g_interface->path,
6268                                 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
6269                                 "Disconnect", NULL, NULL, NULL, g_interface);
6270         }
6271
6272         if (count == 0 && peer->current_group_iface) {
6273                 supplicant_dbus_method_call(peer->current_group_iface->path,
6274                                 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
6275                                 "Disconnect", NULL, NULL, NULL,
6276                                 peer->current_group_iface->path);
6277         }
6278
6279         peer->current_group_iface = NULL;
6280
6281         return -EINPROGRESS;
6282 }
6283
6284 struct p2p_service_data {
6285         bool registration;
6286         GSupplicantInterface *interface;
6287         GSupplicantP2PServiceParams *service;
6288         GSupplicantInterfaceCallback callback;
6289         void *user_data;
6290 };
6291
6292 static void interface_p2p_service_result(const char *error,
6293                                         DBusMessageIter *iter, void *user_data)
6294 {
6295         struct p2p_service_data *data = user_data;
6296         int result = 0;
6297
6298         SUPPLICANT_DBG("%s result - %s", data->registration ?
6299                                 "Registration" : "Deletion",
6300                                 error ? error : "Success");
6301         if (error)
6302                 result = -EINVAL;
6303
6304         if (data->callback)
6305                 data->callback(result, data->interface, data->user_data);
6306
6307         g_free(data->service->query);
6308         g_free(data->service->response);
6309         g_free(data->service->service);
6310         g_free(data->service->wfd_ies);
6311         g_free(data->service);
6312         dbus_free(data);
6313 }
6314
6315 static void interface_p2p_service_params(DBusMessageIter *iter,
6316                                                         void *user_data)
6317 {
6318         struct p2p_service_data *data = user_data;
6319         GSupplicantP2PServiceParams *service;
6320         DBusMessageIter dict;
6321         const char *type;
6322
6323         SUPPLICANT_DBG("");
6324
6325         service = data->service;
6326
6327         supplicant_dbus_dict_open(iter, &dict);
6328
6329         if (service->query && service->response) {
6330                 type = "bonjour";
6331                 supplicant_dbus_dict_append_basic(&dict, "service_type",
6332                                                 DBUS_TYPE_STRING, &type);
6333                 supplicant_dbus_dict_append_fixed_array(&dict, "query",
6334                                         DBUS_TYPE_BYTE, &service->query,
6335                                         service->query_length);
6336                 supplicant_dbus_dict_append_fixed_array(&dict, "response",
6337                                         DBUS_TYPE_BYTE, &service->response,
6338                                         service->response_length);
6339         } else if (service->version && service->service) {
6340                 type = "upnp";
6341                 supplicant_dbus_dict_append_basic(&dict, "service_type",
6342                                                 DBUS_TYPE_STRING, &type);
6343                 supplicant_dbus_dict_append_basic(&dict, "version",
6344                                         DBUS_TYPE_INT32, &service->version);
6345                 supplicant_dbus_dict_append_basic(&dict, "service",
6346                                         DBUS_TYPE_STRING, &service->service);
6347         }
6348
6349         supplicant_dbus_dict_close(iter, &dict);
6350 }
6351
6352 int g_supplicant_interface_p2p_add_service(GSupplicantInterface *interface,
6353                                 GSupplicantInterfaceCallback callback,
6354                                 GSupplicantP2PServiceParams *p2p_service_params,
6355                                 void *user_data)
6356 {
6357         struct p2p_service_data *data;
6358         int ret;
6359
6360         SUPPLICANT_DBG("");
6361
6362         if (!interface->p2p_support)
6363                 return -ENOTSUP;
6364
6365         data = dbus_malloc0(sizeof(*data));
6366         if (!data)
6367                 return -ENOMEM;
6368
6369         data->registration = true;
6370         data->interface = interface;
6371         data->service = p2p_service_params;
6372         data->callback = callback;
6373         data->user_data = user_data;
6374
6375         ret = supplicant_dbus_method_call(interface->path,
6376                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "AddService",
6377                 interface_p2p_service_params, interface_p2p_service_result,
6378                 data, interface);
6379         if (ret < 0) {
6380                 dbus_free(data);
6381                 return ret;
6382         }
6383
6384         return -EINPROGRESS;
6385 }
6386
6387 int g_supplicant_interface_p2p_del_service(GSupplicantInterface *interface,
6388                                 GSupplicantP2PServiceParams *p2p_service_params)
6389 {
6390         struct p2p_service_data *data;
6391         int ret;
6392
6393         SUPPLICANT_DBG("");
6394
6395         if (!interface->p2p_support)
6396                 return -ENOTSUP;
6397
6398         data = dbus_malloc0(sizeof(*data));
6399         if (!data)
6400                 return -ENOMEM;
6401
6402         data->interface = interface;
6403         data->service = p2p_service_params;
6404
6405         ret = supplicant_dbus_method_call(interface->path,
6406                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeleteService",
6407                 interface_p2p_service_params, interface_p2p_service_result,
6408                 data, interface);
6409         if (ret < 0) {
6410                 dbus_free(data);
6411                 return ret;
6412         }
6413
6414         return -EINPROGRESS;
6415 }
6416
6417 struct p2p_listen_data {
6418         int period;
6419         int interval;
6420 };
6421
6422 static void interface_p2p_listen_params(DBusMessageIter *iter, void *user_data)
6423 {
6424         struct p2p_listen_data *params = user_data;
6425         DBusMessageIter dict;
6426
6427         supplicant_dbus_dict_open(iter, &dict);
6428
6429         supplicant_dbus_dict_append_basic(&dict, "period",
6430                                         DBUS_TYPE_INT32, &params->period);
6431         supplicant_dbus_dict_append_basic(&dict, "interval",
6432                                         DBUS_TYPE_INT32, &params->interval);
6433         supplicant_dbus_dict_close(iter, &dict);
6434 }
6435
6436 int g_supplicant_interface_p2p_listen(GSupplicantInterface *interface,
6437                                                 int period, int interval)
6438 {
6439         struct p2p_listen_data params;
6440
6441         SUPPLICANT_DBG("");
6442
6443         if (!interface->p2p_support)
6444                 return -ENOTSUP;
6445
6446         params.period = period;
6447         params.interval = interval;
6448
6449         return supplicant_dbus_method_call(interface->path,
6450                         SUPPLICANT_INTERFACE ".Interface.P2PDevice",
6451                         "ExtendedListen", interface_p2p_listen_params,
6452                         NULL, &params, NULL);
6453 }
6454
6455 static void widi_ies_params(DBusMessageIter *iter, void *user_data)
6456 {
6457         struct p2p_service_data *data = user_data;
6458         GSupplicantP2PServiceParams *service = data->service;
6459         DBusMessageIter array;
6460
6461         SUPPLICANT_DBG("%p - %d", service->wfd_ies, service->wfd_ies_length);
6462
6463         dbus_message_iter_open_container(iter, DBUS_TYPE_ARRAY,
6464                                         DBUS_TYPE_BYTE_AS_STRING, &array);
6465
6466         if (service->wfd_ies && service->wfd_ies_length > 0) {
6467                 dbus_message_iter_append_fixed_array(&array, DBUS_TYPE_BYTE,
6468                                 &service->wfd_ies, service->wfd_ies_length);
6469         }
6470
6471         dbus_message_iter_close_container(iter, &array);
6472 }
6473
6474 int g_supplicant_set_widi_ies(GSupplicantP2PServiceParams *p2p_service_params,
6475                                         GSupplicantInterfaceCallback callback,
6476                                         void *user_data)
6477 {
6478         struct p2p_service_data *data;
6479         int ret;
6480
6481         SUPPLICANT_DBG("");
6482
6483         if (!system_available)
6484                 return -EFAULT;
6485
6486         data = dbus_malloc0(sizeof(*data));
6487         if (!data)
6488                 return -ENOMEM;
6489
6490         data->service = p2p_service_params;
6491         data->callback = callback;
6492         data->user_data = user_data;
6493
6494         if (p2p_service_params->wfd_ies)
6495                 data->registration = true;
6496
6497         ret = supplicant_dbus_property_set(SUPPLICANT_PATH,
6498                                         SUPPLICANT_INTERFACE, "WFDIEs",
6499                                         DBUS_TYPE_ARRAY_AS_STRING
6500                                         DBUS_TYPE_BYTE_AS_STRING,
6501                                         widi_ies_params,
6502                                         interface_p2p_service_result,
6503                                         data, NULL);
6504         if (ret < 0 && ret != -EINPROGRESS) {
6505                 dbus_free(data);
6506                 return ret;
6507         }
6508
6509         return -EINPROGRESS;
6510 }
6511
6512 #if defined TIZEN_EXT
6513 int g_supplicant_interface_remove_network(GSupplicantInterface *interface)
6514 {
6515         struct interface_data *data;
6516
6517         SUPPLICANT_DBG("");
6518
6519         if (interface == NULL)
6520                 return -EINVAL;
6521
6522         if (system_available == FALSE)
6523                 return -EFAULT;
6524
6525         data = dbus_malloc0(sizeof(*data));
6526         if (data == NULL)
6527                 return -ENOMEM;
6528
6529         data->interface = interface;
6530
6531         return network_remove(data);
6532 }
6533 #endif
6534
6535 static const char *g_supplicant_rule0 = "type=signal,"
6536                                         "path=" DBUS_PATH_DBUS ","
6537                                         "sender=" DBUS_SERVICE_DBUS ","
6538                                         "interface=" DBUS_INTERFACE_DBUS ","
6539                                         "member=NameOwnerChanged,"
6540                                         "arg0=" SUPPLICANT_SERVICE;
6541 static const char *g_supplicant_rule1 = "type=signal,"
6542                         "interface=" SUPPLICANT_INTERFACE;
6543 static const char *g_supplicant_rule2 = "type=signal,"
6544                         "interface=" SUPPLICANT_INTERFACE ".Interface";
6545 static const char *g_supplicant_rule3 = "type=signal,"
6546                         "interface=" SUPPLICANT_INTERFACE ".Interface.WPS";
6547 static const char *g_supplicant_rule4 = "type=signal,"
6548                         "interface=" SUPPLICANT_INTERFACE ".BSS";
6549 static const char *g_supplicant_rule5 = "type=signal,"
6550                         "interface=" SUPPLICANT_INTERFACE ".Network";
6551 #if !defined TIZEN_EXT
6552 static const char *g_supplicant_rule6 = "type=signal,"
6553                 "interface=" SUPPLICANT_INTERFACE ".Interface.P2PDevice";
6554 static const char *g_supplicant_rule7 = "type=signal,"
6555                 "interface=" SUPPLICANT_INTERFACE ".Peer";
6556 static const char *g_supplicant_rule8 = "type=signal,"
6557                 "interface=" SUPPLICANT_INTERFACE ".Group";
6558 #endif
6559
6560 static void invoke_introspect_method(void)
6561 {
6562         DBusMessage *message;
6563
6564         message = dbus_message_new_method_call(SUPPLICANT_SERVICE,
6565                                         SUPPLICANT_PATH,
6566                                         DBUS_INTERFACE_INTROSPECTABLE,
6567                                         "Introspect");
6568
6569         if (!message)
6570                 return;
6571
6572         dbus_message_set_no_reply(message, TRUE);
6573         dbus_connection_send(connection, message, NULL);
6574         dbus_message_unref(message);
6575 }
6576
6577 int g_supplicant_register(const GSupplicantCallbacks *callbacks)
6578 {
6579         connection = dbus_bus_get(DBUS_BUS_SYSTEM, NULL);
6580         if (!connection)
6581                 return -EIO;
6582
6583         if (!dbus_connection_add_filter(connection, g_supplicant_filter,
6584                                                 NULL, NULL)) {
6585                 dbus_connection_unref(connection);
6586                 connection = NULL;
6587                 return -EIO;
6588         }
6589
6590         callbacks_pointer = callbacks;
6591         eap_methods = 0;
6592
6593         interface_table = g_hash_table_new_full(g_str_hash, g_str_equal,
6594                                                 NULL, remove_interface);
6595
6596         bss_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
6597                                                                 NULL, NULL);
6598         peer_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
6599                                                                 NULL, NULL);
6600         group_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
6601                                                                 NULL, NULL);
6602         pending_peer_connection = g_hash_table_new_full(g_str_hash, g_str_equal,
6603                                                                 NULL, NULL);
6604         config_file_table = g_hash_table_new_full(g_str_hash, g_str_equal,
6605                                                                 g_free, g_free);
6606
6607         supplicant_dbus_setup(connection);
6608
6609         dbus_bus_add_match(connection, g_supplicant_rule0, NULL);
6610         dbus_bus_add_match(connection, g_supplicant_rule1, NULL);
6611         dbus_bus_add_match(connection, g_supplicant_rule2, NULL);
6612         dbus_bus_add_match(connection, g_supplicant_rule3, NULL);
6613         dbus_bus_add_match(connection, g_supplicant_rule4, NULL);
6614         dbus_bus_add_match(connection, g_supplicant_rule5, NULL);
6615 #if defined TIZEN_EXT
6616         dbus_bus_add_match(connection,
6617                         "type=signal,interface=org.tizen.system.deviced.PowerOff,"
6618                         "member=ChangeState", NULL);
6619 #endif
6620 #if !defined TIZEN_EXT
6621         dbus_bus_add_match(connection, g_supplicant_rule6, NULL);
6622         dbus_bus_add_match(connection, g_supplicant_rule7, NULL);
6623         dbus_bus_add_match(connection, g_supplicant_rule8, NULL);
6624 #endif
6625         dbus_connection_flush(connection);
6626
6627         if (dbus_bus_name_has_owner(connection,
6628                                         SUPPLICANT_SERVICE, NULL)) {
6629                 system_available = TRUE;
6630                 supplicant_dbus_property_get_all(SUPPLICANT_PATH,
6631                                                 SUPPLICANT_INTERFACE,
6632                                                 service_property, NULL, NULL);
6633         } else
6634                 invoke_introspect_method();
6635
6636         return 0;
6637 }
6638
6639 static void unregister_interface_remove_params(DBusMessageIter *iter,
6640                                                 void *user_data)
6641 {
6642         const char *path = user_data;
6643
6644         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
6645                                                         &path);
6646 }
6647
6648
6649 static void unregister_remove_interface(gpointer key, gpointer value,
6650                                                 gpointer user_data)
6651 {
6652         GSupplicantInterface *interface = value;
6653
6654         supplicant_dbus_method_call(SUPPLICANT_PATH,
6655                                         SUPPLICANT_INTERFACE,
6656                                         "RemoveInterface",
6657                                         unregister_interface_remove_params,
6658                                         NULL, interface->path, NULL);
6659 }
6660
6661 void g_supplicant_unregister(const GSupplicantCallbacks *callbacks)
6662 {
6663         SUPPLICANT_DBG("");
6664
6665         if (connection) {
6666 #if !defined TIZEN_EXT
6667                 dbus_bus_remove_match(connection, g_supplicant_rule8, NULL);
6668                 dbus_bus_remove_match(connection, g_supplicant_rule7, NULL);
6669                 dbus_bus_remove_match(connection, g_supplicant_rule6, NULL);
6670 #endif
6671                 dbus_bus_remove_match(connection, g_supplicant_rule5, NULL);
6672                 dbus_bus_remove_match(connection, g_supplicant_rule4, NULL);
6673                 dbus_bus_remove_match(connection, g_supplicant_rule3, NULL);
6674                 dbus_bus_remove_match(connection, g_supplicant_rule2, NULL);
6675                 dbus_bus_remove_match(connection, g_supplicant_rule1, NULL);
6676                 dbus_bus_remove_match(connection, g_supplicant_rule0, NULL);
6677                 dbus_connection_flush(connection);
6678
6679                 dbus_connection_remove_filter(connection,
6680                                                 g_supplicant_filter, NULL);
6681         }
6682
6683         if (config_file_table) {
6684                 g_hash_table_destroy(config_file_table);
6685                 config_file_table = NULL;
6686         }
6687
6688         if (bss_mapping) {
6689                 g_hash_table_destroy(bss_mapping);
6690                 bss_mapping = NULL;
6691         }
6692
6693         if (peer_mapping) {
6694                 g_hash_table_destroy(peer_mapping);
6695                 peer_mapping = NULL;
6696         }
6697
6698         if (group_mapping) {
6699                 g_hash_table_destroy(group_mapping);
6700                 group_mapping = NULL;
6701         }
6702
6703         if (interface_table) {
6704                 g_hash_table_foreach(interface_table,
6705                                         unregister_remove_interface, NULL);
6706                 g_hash_table_destroy(interface_table);
6707                 interface_table = NULL;
6708         }
6709
6710         if (system_available)
6711                 callback_system_killed();
6712
6713         if (connection) {
6714                 dbus_connection_unref(connection);
6715                 connection = NULL;
6716         }
6717
6718         callbacks_pointer = NULL;
6719         eap_methods = 0;
6720 }