4bc5276264a5dec990e8f21fda06effcf4bf4cd9
[platform/upstream/connman.git] / gsupplicant / supplicant.c
1 /*
2  *
3  *  WPA supplicant library with GLib integration
4  *
5  *  Copyright (C) 2012-2013  Intel Corporation. All rights reserved.
6  *
7  *  This program is free software; you can redistribute it and/or modify
8  *  it under the terms of the GNU General Public License version 2 as
9  *  published by the Free Software Foundation.
10  *
11  *  This program is distributed in the hope that it will be useful,
12  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
13  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14  *  GNU General Public License for more details.
15  *
16  *  You should have received a copy of the GNU General Public License
17  *  along with this program; if not, write to the Free Software
18  *  Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA
19  *
20  */
21
22 #ifdef HAVE_CONFIG_H
23 #include <config.h>
24 #endif
25
26 #include <errno.h>
27 #include <stdio.h>
28 #include <stdlib.h>
29 #include <string.h>
30 #include <stdint.h>
31 #include <syslog.h>
32 #include <ctype.h>
33 #include <stdbool.h>
34 #include <netinet/if_ether.h>
35 #include <netinet/in.h>
36
37 #include <glib.h>
38 #include <gdbus.h>
39
40 #include "dbus.h"
41 #include "gsupplicant.h"
42
43 #if defined TIZEN_EXT
44 #include "setting.h"
45 #endif
46
47 #define IEEE80211_CAP_ESS       0x0001
48 #define IEEE80211_CAP_IBSS      0x0002
49 #define IEEE80211_CAP_PRIVACY   0x0010
50
51 #if defined TIZEN_EXT
52 #define WLAN_EID_HT_CAP 45
53 #define WLAN_EID_VHT_CAP 191
54 #define WLAN_EID_SUPP_RATES 1
55 #define WLAN_EID_EXT_SUPP_RATES 50
56 #define COUNTRY_CODE_LENGTH     2
57 #endif
58
59 #if defined TIZEN_EXT
60 #define LAST_CONNECTED_TIMEOUT       (5 * 60)
61 #define ASSOC_REJECT_TIMEOUT         10
62 #define FREQ_RANGE_24GHZ_CHANNEL_1   2412
63 #define FREQ_RANGE_24GHZ_CHANNEL_14  2484
64 #define FREQ_RANGE_5GHZ_CHANNEL_32   5160
65 #define FREQ_RANGE_5GHZ_CHANNEL_165  5825
66
67 #define MAC2STR(a) (a)[0], (a)[1], (a)[2], (a)[3], (a)[4], (a)[5]
68 #define MACSTR "%02x:%02x:%02x:%02x:%02x:%02x"
69 #endif
70
71 #define BSS_UNKNOWN_STRENGTH    -90
72
73 static DBusConnection *connection;
74
75 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
76 static GSupplicantCallbacks *callbacks_pointer;
77 #else /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
78 static const GSupplicantCallbacks *callbacks_pointer;
79 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
80
81 static dbus_bool_t system_available = FALSE;
82 static dbus_bool_t system_ready = FALSE;
83
84 static dbus_int32_t debug_level;
85 static dbus_bool_t debug_timestamp = FALSE;
86 static dbus_bool_t debug_showkeys = FALSE;
87
88 static const char *debug_strings[] = {
89         "msgdump", "debug", "info", "warning", "error", NULL
90 };
91
92 static unsigned int eap_methods;
93
94 struct strvalmap {
95         const char *str;
96         unsigned int val;
97 };
98
99 static struct strvalmap eap_method_map[] = {
100         { "MD5",        G_SUPPLICANT_EAP_METHOD_MD5     },
101         { "TLS",        G_SUPPLICANT_EAP_METHOD_TLS     },
102         { "MSCHAPV2",   G_SUPPLICANT_EAP_METHOD_MSCHAPV2        },
103         { "PEAP",       G_SUPPLICANT_EAP_METHOD_PEAP    },
104         { "TTLS",       G_SUPPLICANT_EAP_METHOD_TTLS    },
105         { "GTC",        G_SUPPLICANT_EAP_METHOD_GTC     },
106         { "OTP",        G_SUPPLICANT_EAP_METHOD_OTP     },
107         { "LEAP",       G_SUPPLICANT_EAP_METHOD_LEAP    },
108         { "WSC",        G_SUPPLICANT_EAP_METHOD_WSC     },
109         { }
110 };
111
112 static struct strvalmap keymgmt_map[] = {
113         { "none",               G_SUPPLICANT_KEYMGMT_NONE               },
114         { "ieee8021x",          G_SUPPLICANT_KEYMGMT_IEEE8021X  },
115         { "wpa-none",           G_SUPPLICANT_KEYMGMT_WPA_NONE   },
116         { "wpa-psk",            G_SUPPLICANT_KEYMGMT_WPA_PSK    },
117         { "wpa-psk-sha256",     G_SUPPLICANT_KEYMGMT_WPA_PSK_256        },
118         { "wpa-ft-psk",         G_SUPPLICANT_KEYMGMT_WPA_FT_PSK },
119         { "wpa-ft-eap",         G_SUPPLICANT_KEYMGMT_WPA_FT_EAP },
120         { "wpa-eap",            G_SUPPLICANT_KEYMGMT_WPA_EAP    },
121         { "wpa-eap-sha256",     G_SUPPLICANT_KEYMGMT_WPA_EAP_256        },
122         { "wps",                G_SUPPLICANT_KEYMGMT_WPS                },
123 #if defined TIZEN_EXT
124         { "sae",                G_SUPPLICANT_KEYMGMT_SAE                },
125         { "owe",                G_SUPPLICANT_KEYMGMT_OWE                },
126         { "dpp",                G_SUPPLICANT_KEYMGMT_DPP                },
127 #endif
128         { }
129 };
130
131 static struct strvalmap authalg_capa_map[] = {
132         { "open",       G_SUPPLICANT_CAPABILITY_AUTHALG_OPEN    },
133         { "shared",     G_SUPPLICANT_CAPABILITY_AUTHALG_SHARED  },
134         { "leap",       G_SUPPLICANT_CAPABILITY_AUTHALG_LEAP    },
135         { }
136 };
137
138 static struct strvalmap proto_capa_map[] = {
139         { "wpa",        G_SUPPLICANT_CAPABILITY_PROTO_WPA               },
140         { "rsn",        G_SUPPLICANT_CAPABILITY_PROTO_RSN               },
141         { }
142 };
143
144 static struct strvalmap group_map[] = {
145         { "wep40",      G_SUPPLICANT_GROUP_WEP40        },
146         { "wep104",     G_SUPPLICANT_GROUP_WEP104       },
147         { "tkip",       G_SUPPLICANT_GROUP_TKIP },
148         { "ccmp",       G_SUPPLICANT_GROUP_CCMP },
149         { }
150 };
151
152 static struct strvalmap pairwise_map[] = {
153         { "none",       G_SUPPLICANT_PAIRWISE_NONE      },
154         { "tkip",       G_SUPPLICANT_PAIRWISE_TKIP      },
155         { "ccmp",       G_SUPPLICANT_PAIRWISE_CCMP      },
156         { }
157 };
158
159 static struct strvalmap scan_capa_map[] = {
160         { "active",     G_SUPPLICANT_CAPABILITY_SCAN_ACTIVE     },
161         { "passive",    G_SUPPLICANT_CAPABILITY_SCAN_PASSIVE    },
162         { "ssid",       G_SUPPLICANT_CAPABILITY_SCAN_SSID               },
163         { }
164 };
165
166 static struct strvalmap mode_capa_map[] = {
167         { "infrastructure",     G_SUPPLICANT_CAPABILITY_MODE_INFRA      },
168         { "ad-hoc",             G_SUPPLICANT_CAPABILITY_MODE_IBSS       },
169         { "ap",                 G_SUPPLICANT_CAPABILITY_MODE_AP         },
170         { "p2p",                G_SUPPLICANT_CAPABILITY_MODE_P2P        },
171 #if defined TIZEN_EXT_WIFI_MESH
172         { "mesh",               G_SUPPLICANT_CAPABILITY_MODE_MESH       },
173 #endif
174         { }
175 };
176
177 #if defined TIZEN_EXT && defined TIZEN_EXT_INS
178 struct _GSupplicantINSSettings {
179         GSupplicantINSPreferredFreq preferred_freq_bssid;
180         unsigned int preferred_freq_bssid_score;
181         bool last_connected_bssid;
182         unsigned int last_connected_bssid_score;
183         bool assoc_reject;
184         unsigned int assoc_reject_score;
185         bool signal_bssid;
186         int signal_level3_5ghz;
187         int signal_level3_24ghz;
188 };
189
190 static struct _GSupplicantINSSettings ins_settings;
191 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_INS */
192
193 #if defined TIZEN_EXT
194 static unsigned char invalid_bssid[WIFI_BSSID_LEN_MAX] = {
195         0x00, 0x00, 0x00, 0x00, 0x00, 0x00
196 };
197 #endif
198
199 static GHashTable *interface_table;
200 static GHashTable *bss_mapping;
201 static GHashTable *peer_mapping;
202 static GHashTable *group_mapping;
203 static GHashTable *pending_peer_connection;
204 static GHashTable *config_file_table;
205
206 struct _GSupplicantWpsCredentials {
207         unsigned char ssid[32];
208         unsigned int ssid_len;
209         char *key;
210 };
211
212 struct added_network_information {
213         char * ssid;
214         GSupplicantSecurity security;
215         char * passphrase;
216         char * private_passphrase;
217 #if defined TIZEN_EXT
218         char *connector;
219         char *c_sign_key;
220         char *net_access_key;
221 #endif
222 };
223
224 #if defined TIZEN_EXT_WIFI_MESH
225 struct _GSupplicantMeshGroupInfo {
226         unsigned char ssid[32];
227         unsigned int ssid_len;
228         int disconnect_reason;
229 };
230 #endif
231
232 struct _GSupplicantInterface {
233         char *path;
234         char *network_path;
235         unsigned int keymgmt_capa;
236         unsigned int authalg_capa;
237         unsigned int proto_capa;
238         unsigned int group_capa;
239         unsigned int pairwise_capa;
240         unsigned int scan_capa;
241         unsigned int mode_capa;
242         unsigned int max_scan_ssids;
243         bool p2p_support;
244         bool p2p_finding;
245         bool ap_create_in_progress;
246         dbus_bool_t ready;
247         GSupplicantState state;
248         dbus_bool_t scanning;
249         GSupplicantInterfaceCallback scan_callback;
250         void *scan_data;
251         int apscan;
252         char *ifname;
253         char *driver;
254         char *bridge;
255         struct _GSupplicantWpsCredentials wps_cred;
256         GSupplicantWpsState wps_state;
257         GHashTable *network_table;
258         GHashTable *peer_table;
259         GHashTable *group_table;
260         GHashTable *bss_mapping;
261         void *data;
262         const char *pending_peer_path;
263         GSupplicantNetwork *current_network;
264         struct added_network_information network_info;
265 #if defined TIZEN_EXT
266         dbus_bool_t is_5_0_Ghz_supported;
267         int disconnect_reason;
268 #endif
269 #if defined TIZEN_EXT
270         unsigned char add_network_bssid[WIFI_BSSID_LEN_MAX];
271         unsigned char connected_bssid[WIFI_BSSID_LEN_MAX];
272 #endif
273 #if defined TIZEN_EXT_WIFI_MESH
274         bool mesh_support;
275         struct _GSupplicantMeshGroupInfo group_info;
276 #endif
277 };
278
279 struct g_supplicant_bss {
280         GSupplicantInterface *interface;
281         char *path;
282         unsigned char bssid[6];
283         unsigned char ssid[32];
284         unsigned int ssid_len;
285         dbus_uint16_t frequency;
286         dbus_uint32_t maxrate;
287         dbus_int16_t signal;
288         GSupplicantMode mode;
289         GSupplicantSecurity security;
290         dbus_bool_t rsn_selected;
291         unsigned int wpa_keymgmt;
292         unsigned int wpa_pairwise;
293         unsigned int wpa_group;
294         unsigned int rsn_keymgmt;
295         unsigned int rsn_pairwise;
296         unsigned int rsn_group;
297         unsigned int keymgmt;
298         dbus_bool_t privacy;
299         dbus_bool_t psk;
300         dbus_bool_t ieee8021x;
301 #if defined TIZEN_EXT
302         dbus_bool_t ft_psk;
303         dbus_bool_t ft_ieee8021x;
304         GSList *vsie_list;
305         dbus_bool_t hs20;
306         unsigned char country_code[COUNTRY_CODE_LENGTH];
307         GSupplicantPhy_mode phy_mode;
308         dbus_int16_t snr;
309         dbus_uint32_t est_throughput;
310 #endif
311         unsigned int wps_capabilities;
312 #if defined TIZEN_EXT
313         dbus_bool_t sae;
314         dbus_bool_t owe;
315         dbus_bool_t dpp;
316         dbus_bool_t owe_transition_mode;
317         unsigned int transition_mode_ssid_len;
318         unsigned char transition_mode_bssid[6];
319         unsigned char transition_mode_ssid[32];
320         dbus_bool_t pmf_required;
321 #endif
322 };
323
324 struct _GSupplicantNetwork {
325         GSupplicantInterface *interface;
326         char *path;
327         char *group;
328         char *name;
329         unsigned char ssid[32];
330         unsigned int ssid_len;
331         dbus_int16_t signal;
332         dbus_uint16_t frequency;
333         struct g_supplicant_bss *best_bss;
334         GSupplicantMode mode;
335         GSupplicantSecurity security;
336         dbus_bool_t wps;
337         unsigned int wps_capabilities;
338         GHashTable *bss_table;
339         GHashTable *config_table;
340 #if defined TIZEN_EXT
341         bool isHS20AP;
342         char *eap;
343         char *identity;
344         char *phase2;
345         unsigned int keymgmt;
346         GSList *vsie_list;
347         unsigned char country_code[COUNTRY_CODE_LENGTH];
348         GSupplicantPhy_mode phy_mode;
349         dbus_bool_t owe_transition_mode;
350         dbus_bool_t privacy;
351         unsigned int transition_mode_ssid_len;
352         unsigned char transition_mode_bssid[6];
353         unsigned char transition_mode_ssid[32];
354         unsigned char last_connected_bssid[WIFI_BSSID_LEN_MAX];
355         GHashTable *assoc_reject_table;
356 #endif
357 };
358
359 struct _GSupplicantPeer {
360         GSupplicantInterface *interface;
361         char *path;
362         unsigned char device_address[ETH_ALEN];
363         unsigned char iface_address[ETH_ALEN];
364         char *name;
365         unsigned char *widi_ies;
366         int widi_ies_length;
367         char *identifier;
368         unsigned int wps_capabilities;
369         GSList *groups;
370         const GSupplicantInterface *current_group_iface;
371         bool connection_requested;
372 };
373
374 struct _GSupplicantGroup {
375         GSupplicantInterface *interface;
376         GSupplicantInterface *orig_interface;
377         char *path;
378         int role;
379         GSList *members;
380 };
381
382 struct interface_data {
383         GSupplicantInterface *interface;
384         char *path; /* Interface path cannot be taken from interface (above) as
385                      * it might have been freed already.
386                      */
387         GSupplicantInterfaceCallback callback;
388         void *user_data;
389         bool network_remove_in_progress;
390         GSupplicantSSID *ssid;
391 };
392
393 #if defined TIZEN_EXT
394 struct interface_signalpoll_data {
395         GSupplicantInterface *interface;
396         char *path;
397         GSupplicantMaxSpeedCallback callback;
398         void *user_data;
399 };
400 #endif
401
402 struct interface_create_data {
403         char *ifname;
404         char *driver;
405         char *bridge;
406 #if defined TIZEN_EXT
407         unsigned int mac_addr;
408         unsigned int preassoc_mac_addr;
409         unsigned int random_mac_lifetime;
410 #endif /* TIZEN_EXT */
411 #if defined TIZEN_EXT_WIFI_MESH
412         char *parent_ifname;
413         bool is_mesh_interface;
414 #endif
415         GSupplicantInterface *interface;
416         GSupplicantInterfaceCallback callback;
417         void *user_data;
418 };
419
420 struct interface_connect_data {
421         GSupplicantInterface *interface;
422         char *path;
423         GSupplicantInterfaceCallback callback;
424         void *user_data;
425         union {
426                 GSupplicantSSID *ssid;
427                 GSupplicantPeerParams *peer;
428         };
429 };
430
431 struct interface_scan_data {
432         GSupplicantInterface *interface;
433         char *path;
434         GSupplicantInterfaceCallback callback;
435         GSupplicantScanParams *scan_params;
436         void *user_data;
437 };
438
439 #if defined TIZEN_EXT
440 struct update_bssid_data {
441         GSupplicantNetwork *network;
442         unsigned char last_connected_bssid[WIFI_BSSID_LEN_MAX];
443         GHashTable *assoc_reject_table;
444         GSList *bssid_list;
445 };
446
447 struct assoc_reject_data {
448         char *bssid;
449         GSList *reject_time_list;
450 };
451
452 struct assoc_count_data {
453         time_t ref_time;
454         int assoc_count;
455 };
456
457 static unsigned int last_connected_bss_timeout = 0;
458 static bool simplified_log = true;
459 #endif
460
461 static int network_remove(struct interface_data *data);
462
463 #if defined TIZEN_EXT_WIFI_MESH
464 struct _GSupplicantMeshPeer {
465         GSupplicantInterface *interface;
466         char *peer_address;
467         int disconnect_reason;
468 };
469 #endif
470
471 static inline void debug(const char *format, ...)
472 {
473         char str[256];
474         va_list ap;
475
476         if (!callbacks_pointer || !callbacks_pointer->debug)
477                 return;
478
479         va_start(ap, format);
480
481         if (vsnprintf(str, sizeof(str), format, ap) > 0)
482                 callbacks_pointer->debug(str);
483
484         va_end(ap);
485 }
486
487 #define SUPPLICANT_DBG(fmt, arg...) \
488         debug("%s:%s() " fmt, __FILE__, __FUNCTION__ , ## arg);
489
490 static GSupplicantMode string2mode(const char *mode)
491 {
492         if (!mode)
493                 return G_SUPPLICANT_MODE_UNKNOWN;
494
495         if (g_str_equal(mode, "infrastructure"))
496                 return G_SUPPLICANT_MODE_INFRA;
497         else if (g_str_equal(mode, "ad-hoc"))
498                 return G_SUPPLICANT_MODE_IBSS;
499 #if defined TIZEN_EXT_WIFI_MESH
500         else if (g_str_equal(mode, "mesh"))
501                 return G_SUPPLICANT_MODE_MESH;
502 #endif
503
504         return G_SUPPLICANT_MODE_UNKNOWN;
505 }
506
507 static const char *mode2string(GSupplicantMode mode)
508 {
509         switch (mode) {
510         case G_SUPPLICANT_MODE_UNKNOWN:
511                 break;
512         case G_SUPPLICANT_MODE_INFRA:
513                 return "managed";
514         case G_SUPPLICANT_MODE_IBSS:
515                 return "adhoc";
516         case G_SUPPLICANT_MODE_MASTER:
517                 return "ap";
518 #if defined TIZEN_EXT_WIFI_MESH
519         case G_SUPPLICANT_MODE_MESH:
520                 return "mesh";
521 #endif
522         }
523
524         return NULL;
525 }
526
527 static const char *security2string(GSupplicantSecurity security)
528 {
529         switch (security) {
530         case G_SUPPLICANT_SECURITY_UNKNOWN:
531                 break;
532         case G_SUPPLICANT_SECURITY_NONE:
533                 return "none";
534         case G_SUPPLICANT_SECURITY_WEP:
535                 return "wep";
536         case G_SUPPLICANT_SECURITY_PSK:
537                 return "psk";
538         case G_SUPPLICANT_SECURITY_IEEE8021X:
539                 return "ieee8021x";
540 #if defined TIZEN_EXT
541         case G_SUPPLICANT_SECURITY_FT_PSK:
542                 return "ft_psk";
543         case G_SUPPLICANT_SECURITY_FT_IEEE8021X:
544                 return "ft_ieee8021x";
545         case G_SUPPLICANT_SECURITY_SAE:
546                 return "sae";
547         case G_SUPPLICANT_SECURITY_OWE:
548                 return "owe";
549         case G_SUPPLICANT_SECURITY_DPP:
550                 return "dpp";
551 #endif
552         }
553
554         return NULL;
555 }
556
557 static GSupplicantState string2state(const char *state)
558 {
559         if (!state)
560                 return G_SUPPLICANT_STATE_UNKNOWN;
561
562         if (g_str_equal(state, "unknown"))
563                 return G_SUPPLICANT_STATE_UNKNOWN;
564         else if (g_str_equal(state, "interface_disabled"))
565                 return G_SUPPLICANT_STATE_DISABLED;
566         else if (g_str_equal(state, "disconnected"))
567                 return G_SUPPLICANT_STATE_DISCONNECTED;
568         else if (g_str_equal(state, "inactive"))
569                 return G_SUPPLICANT_STATE_INACTIVE;
570         else if (g_str_equal(state, "scanning"))
571                 return G_SUPPLICANT_STATE_SCANNING;
572         else if (g_str_equal(state, "authenticating"))
573                 return G_SUPPLICANT_STATE_AUTHENTICATING;
574         else if (g_str_equal(state, "associating"))
575                 return G_SUPPLICANT_STATE_ASSOCIATING;
576         else if (g_str_equal(state, "associated"))
577                 return G_SUPPLICANT_STATE_ASSOCIATED;
578         else if (g_str_equal(state, "group_handshake"))
579                 return G_SUPPLICANT_STATE_GROUP_HANDSHAKE;
580         else if (g_str_equal(state, "4way_handshake"))
581                 return G_SUPPLICANT_STATE_4WAY_HANDSHAKE;
582         else if (g_str_equal(state, "completed"))
583                 return G_SUPPLICANT_STATE_COMPLETED;
584
585         return G_SUPPLICANT_STATE_UNKNOWN;
586 }
587
588 static bool compare_network_parameters(GSupplicantInterface *interface,
589                                 GSupplicantSSID *ssid)
590 {
591 #if defined TIZEN_EXT
592         if (!interface->network_info.ssid)
593                 return FALSE;
594 #endif
595
596         if (memcmp(interface->network_info.ssid, ssid->ssid, ssid->ssid_len))
597                 return FALSE;
598
599         if (interface->network_info.security != ssid->security)
600                 return FALSE;
601
602         if (interface->network_info.passphrase &&
603                         g_strcmp0(interface->network_info.passphrase,
604                                 ssid->passphrase) != 0) {
605                 return FALSE;
606         }
607
608         if (interface->network_info.private_passphrase &&
609                         g_strcmp0(interface->network_info.private_passphrase,
610                                 ssid->private_key_passphrase) != 0) {
611                 return FALSE;
612         }
613
614 #if defined TIZEN_EXT
615         if (interface->network_info.connector &&
616                         g_strcmp0(interface->network_info.connector,
617                                 ssid->connector) != 0) {
618                 return FALSE;
619         }
620         if (interface->network_info.c_sign_key &&
621                         g_strcmp0(interface->network_info.c_sign_key,
622                                 ssid->c_sign_key) != 0) {
623                 return FALSE;
624         }
625         if (interface->network_info.net_access_key &&
626                         g_strcmp0(interface->network_info.net_access_key,
627                                 ssid->net_access_key) != 0) {
628                 return FALSE;
629         }
630 #endif
631         return TRUE;
632 }
633
634 static void remove_network_information(GSupplicantInterface * interface)
635 {
636         g_free(interface->network_info.ssid);
637         g_free(interface->network_info.passphrase);
638         g_free(interface->network_info.private_passphrase);
639 #if defined TIZEN_EXT
640         g_free(interface->network_info.connector);
641         g_free(interface->network_info.c_sign_key);
642         g_free(interface->network_info.net_access_key);
643 #endif
644         interface->network_info.ssid = NULL;
645         interface->network_info.passphrase = NULL;
646         interface->network_info.private_passphrase = NULL;
647 #if defined TIZEN_EXT
648         interface->network_info.connector = NULL;
649         interface->network_info.c_sign_key = NULL;
650         interface->network_info.net_access_key = NULL;
651 #endif
652 }
653
654 static int store_network_information(GSupplicantInterface * interface,
655                                 GSupplicantSSID *ssid)
656 {
657         interface->network_info.ssid = g_malloc(ssid->ssid_len + 1);
658         if (interface->network_info.ssid != NULL) {
659                 memcpy(interface->network_info.ssid, ssid->ssid,
660                         ssid->ssid_len);
661                 interface->network_info.ssid[ssid->ssid_len] = '\0';
662         } else {
663                 return -ENOMEM;
664         }
665
666         interface->network_info.security = ssid->security;
667
668         if ((ssid->security == G_SUPPLICANT_SECURITY_WEP ||
669                 ssid->security == G_SUPPLICANT_SECURITY_PSK ||
670 #if defined TIZEN_EXT
671                 ssid->security == G_SUPPLICANT_SECURITY_SAE ||
672 #endif
673                 ssid->security == G_SUPPLICANT_SECURITY_NONE) &&
674                 ssid->passphrase) {
675                 interface->network_info.passphrase = g_strdup(ssid->passphrase);
676         }
677
678         if (ssid->security == G_SUPPLICANT_SECURITY_IEEE8021X &&
679                         ssid->private_key_passphrase) {
680                 interface->network_info.private_passphrase =
681                         g_strdup(ssid->private_key_passphrase);
682         }
683
684         return 0;
685 }
686
687 static void callback_system_ready(void)
688 {
689         if (system_ready)
690                 return;
691
692         system_ready = TRUE;
693
694         if (!callbacks_pointer)
695                 return;
696
697         if (!callbacks_pointer->system_ready)
698                 return;
699
700         callbacks_pointer->system_ready();
701 }
702
703 static void callback_system_killed(void)
704 {
705         system_ready = FALSE;
706
707         if (!callbacks_pointer)
708                 return;
709
710         if (!callbacks_pointer->system_killed)
711                 return;
712
713         callbacks_pointer->system_killed();
714 }
715
716 static void callback_interface_added(GSupplicantInterface *interface)
717 {
718         SUPPLICANT_DBG("");
719
720         if (!callbacks_pointer)
721                 return;
722
723         if (!callbacks_pointer->interface_added)
724                 return;
725
726         callbacks_pointer->interface_added(interface);
727 }
728
729 static void callback_interface_state(GSupplicantInterface *interface)
730 {
731         if (!callbacks_pointer)
732                 return;
733
734         if (!callbacks_pointer->interface_state)
735                 return;
736
737         callbacks_pointer->interface_state(interface);
738 }
739
740 static void callback_interface_removed(GSupplicantInterface *interface)
741 {
742         if (!callbacks_pointer)
743                 return;
744
745         if (!callbacks_pointer->interface_removed)
746                 return;
747
748         callbacks_pointer->interface_removed(interface);
749 }
750
751 #if !defined TIZEN_EXT
752 static void callback_p2p_support(GSupplicantInterface *interface)
753 {
754         SUPPLICANT_DBG("");
755
756         if (!interface->p2p_support)
757                 return;
758
759         if (callbacks_pointer && callbacks_pointer->p2p_support)
760                 callbacks_pointer->p2p_support(interface);
761 }
762 #endif
763
764 #if defined TIZEN_EXT_WIFI_MESH
765 static void callback_mesh_support(GSupplicantInterface *interface)
766 {
767         SUPPLICANT_DBG("");
768
769         if (!interface->mesh_support)
770                 return;
771
772         if (callbacks_pointer && callbacks_pointer->mesh_support)
773                 callbacks_pointer->mesh_support(interface);
774 }
775
776 bool g_supplicant_interface_has_mesh(GSupplicantInterface *interface)
777 {
778         if (!interface)
779                 return false;
780
781         return interface->mesh_support;
782 }
783 #endif
784
785 static void callback_scan_started(GSupplicantInterface *interface)
786 {
787         if (!callbacks_pointer)
788                 return;
789
790         if (!callbacks_pointer->scan_started)
791                 return;
792
793         callbacks_pointer->scan_started(interface);
794 }
795
796 static void callback_ap_create_fail(GSupplicantInterface *interface)
797 {
798         if (!callbacks_pointer)
799                 return;
800
801         if (!callbacks_pointer->ap_create_fail)
802                 return;
803
804         callbacks_pointer->ap_create_fail(interface);
805 }
806
807 static void callback_scan_finished(GSupplicantInterface *interface)
808 {
809         if (!callbacks_pointer)
810                 return;
811
812         if (!callbacks_pointer->scan_finished)
813                 return;
814
815         callbacks_pointer->scan_finished(interface);
816 }
817
818 static void callback_network_added(GSupplicantNetwork *network)
819 {
820         if (!callbacks_pointer)
821                 return;
822
823         if (!callbacks_pointer->network_added)
824                 return;
825
826         callbacks_pointer->network_added(network);
827 }
828
829 static void callback_network_removed(GSupplicantNetwork *network)
830 {
831         if (!callbacks_pointer)
832                 return;
833
834         if (!callbacks_pointer->network_removed)
835                 return;
836
837         callbacks_pointer->network_removed(network);
838 }
839
840 #if defined TIZEN_EXT
841 static void callback_network_merged(GSupplicantNetwork *network)
842 {
843         if (!callbacks_pointer)
844                 return;
845
846         if (!callbacks_pointer->network_merged)
847                 return;
848
849         callbacks_pointer->network_merged(network);
850 }
851
852 static void callback_assoc_failed(void *user_data)
853 {
854         if (!callbacks_pointer)
855                 return;
856
857         if (!callbacks_pointer->assoc_failed)
858                 return;
859
860         callbacks_pointer->assoc_failed(user_data);
861 }
862
863 static void callback_scan_done(GSupplicantInterface *interface)
864 {
865         if (!callbacks_pointer)
866                 return;
867
868         if (!callbacks_pointer->scan_done)
869                 return;
870
871         callbacks_pointer->scan_done(interface);
872 }
873 #endif
874
875 static void callback_network_changed(GSupplicantNetwork *network,
876                                         const char *property)
877 {
878         if (!callbacks_pointer)
879                 return;
880
881         if (!callbacks_pointer->network_changed)
882                 return;
883
884         callbacks_pointer->network_changed(network, property);
885 }
886
887 static void callback_network_associated(GSupplicantNetwork *network)
888 {
889         if (!callbacks_pointer)
890                 return;
891
892         if (!callbacks_pointer->network_associated)
893                 return;
894
895         callbacks_pointer->network_associated(network);
896 }
897
898 static void callback_sta_authorized(GSupplicantInterface *interface,
899                                         const char *addr)
900 {
901         if (!callbacks_pointer)
902                 return;
903
904         if (!callbacks_pointer->sta_authorized)
905                 return;
906
907         callbacks_pointer->sta_authorized(interface, addr);
908 }
909
910 static void callback_sta_deauthorized(GSupplicantInterface *interface,
911                                         const char *addr)
912 {
913         if (!callbacks_pointer)
914                 return;
915
916         if (!callbacks_pointer->sta_deauthorized)
917                 return;
918
919         callbacks_pointer->sta_deauthorized(interface, addr);
920 }
921
922 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
923 static void callback_eap(GSupplicantInterface *interface, bool status)
924 {
925         if (!callbacks_pointer)
926                 return;
927
928         if (!callbacks_pointer->eap)
929                 return;
930
931         callbacks_pointer->eap(interface, status);
932 }
933 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
934
935 static void callback_peer_found(GSupplicantPeer *peer)
936 {
937         if (!callbacks_pointer)
938                 return;
939
940         if (!callbacks_pointer->peer_found)
941                 return;
942
943         callbacks_pointer->peer_found(peer);
944 }
945
946 static void callback_peer_lost(GSupplicantPeer *peer)
947 {
948         if (!callbacks_pointer)
949                 return;
950
951         if (!callbacks_pointer->peer_lost)
952                 return;
953
954         callbacks_pointer->peer_lost(peer);
955 }
956
957 static void callback_peer_changed(GSupplicantPeer *peer,
958                                                 GSupplicantPeerState state)
959 {
960         if (!callbacks_pointer)
961                 return;
962
963         if (!callbacks_pointer->peer_changed)
964                 return;
965
966         callbacks_pointer->peer_changed(peer, state);
967 }
968
969 static void callback_peer_request(GSupplicantPeer *peer)
970 {
971         if (!callbacks_pointer)
972                 return;
973
974         if (!callbacks_pointer->peer_request)
975                 return;
976
977         peer->connection_requested = true;
978
979         callbacks_pointer->peer_request(peer);
980 }
981
982 static void callback_disconnect_reason_code(GSupplicantInterface *interface,
983                                         int reason_code)
984 {
985         if (!callbacks_pointer)
986                 return;
987
988         if (!callbacks_pointer->disconnect_reasoncode)
989                 return;
990
991         if (reason_code != 0)
992                 callbacks_pointer->disconnect_reasoncode(interface,
993                                                         reason_code);
994 }
995
996 static void callback_assoc_status_code(GSupplicantInterface *interface,
997                                 int status_code)
998 {
999         if (!callbacks_pointer)
1000                 return;
1001
1002         if (!callbacks_pointer->assoc_status_code)
1003                 return;
1004
1005         callbacks_pointer->assoc_status_code(interface, status_code);
1006
1007 }
1008
1009 static void remove_group(gpointer data)
1010 {
1011         GSupplicantGroup *group = data;
1012
1013         if (group->members)
1014                 g_slist_free_full(group->members, g_free);
1015
1016         g_free(group->path);
1017         g_free(group);
1018 }
1019
1020 static void remove_interface(gpointer data)
1021 {
1022         GSupplicantInterface *interface = data;
1023
1024         g_hash_table_destroy(interface->bss_mapping);
1025         g_hash_table_destroy(interface->network_table);
1026         g_hash_table_destroy(interface->peer_table);
1027         g_hash_table_destroy(interface->group_table);
1028
1029         if (interface->scan_callback) {
1030                 SUPPLICANT_DBG("call interface %p callback %p scanning %d",
1031                                 interface, interface->scan_callback,
1032                                 interface->scanning);
1033
1034                 interface->scan_callback(-EIO, interface, interface->scan_data);
1035                 interface->scan_callback = NULL;
1036                 interface->scan_data = NULL;
1037
1038                 if (interface->scanning) {
1039                         interface->scanning = FALSE;
1040                         callback_scan_finished(interface);
1041                 }
1042         }
1043
1044         callback_interface_removed(interface);
1045
1046         g_free(interface->wps_cred.key);
1047         g_free(interface->path);
1048         g_free(interface->network_path);
1049 #if defined TIZEN_EXT
1050         interface->network_path = NULL;
1051 #endif
1052         g_free(interface->ifname);
1053         g_free(interface->driver);
1054         g_free(interface->bridge);
1055         remove_network_information(interface);
1056         g_free(interface);
1057 }
1058
1059 static void remove_network(gpointer data)
1060 {
1061         GSupplicantNetwork *network = data;
1062
1063         g_hash_table_destroy(network->bss_table);
1064
1065         callback_network_removed(network);
1066
1067         g_hash_table_destroy(network->config_table);
1068 #if defined TIZEN_EXT
1069         g_hash_table_destroy(network->assoc_reject_table);
1070 #endif
1071
1072         g_free(network->path);
1073         g_free(network->group);
1074         g_free(network->name);
1075 #if defined TIZEN_EXT
1076         g_free(network->eap);
1077         g_free(network->identity);
1078         g_free(network->phase2);
1079 #endif
1080 #if defined TIZEN_EXT
1081         g_slist_free_full(network->vsie_list, g_free);
1082 #endif
1083
1084         g_free(network);
1085 }
1086
1087 static void remove_bss(gpointer data)
1088 {
1089         struct g_supplicant_bss *bss = data;
1090
1091         supplicant_dbus_property_call_cancel_all(bss);
1092
1093         g_free(bss->path);
1094 #if defined TIZEN_EXT
1095         g_slist_free_full(bss->vsie_list, g_free);
1096 #endif
1097         g_free(bss);
1098 }
1099
1100 static void remove_peer(gpointer data)
1101 {
1102         GSupplicantPeer *peer = data;
1103
1104         callback_peer_lost(peer);
1105
1106         if (peer->groups)
1107                 g_slist_free_full(peer->groups, g_free);
1108
1109         if (peer_mapping)
1110                 g_hash_table_remove(peer_mapping, peer->path);
1111
1112         if (pending_peer_connection)
1113                 g_hash_table_remove(pending_peer_connection, peer->path);
1114
1115         g_free(peer->path);
1116         g_free(peer->name);
1117         g_free(peer->identifier);
1118         g_free(peer->widi_ies);
1119
1120         g_free(peer);
1121 }
1122
1123 #if defined TIZEN_EXT
1124 static void remove_assoc_data(gpointer data)
1125 {
1126         struct assoc_reject_data *assoc_data = data;
1127
1128         g_free(assoc_data->bssid);
1129         g_slist_free(assoc_data->reject_time_list);
1130
1131         g_free(assoc_data);
1132 }
1133 #endif
1134
1135 static void debug_strvalmap(const char *label, struct strvalmap *map,
1136                                                         unsigned int val)
1137 {
1138         int i;
1139 #if defined TIZEN_EXT
1140         if (!simplified_log)
1141 #endif
1142         for (i = 0; map[i].str; i++) {
1143                 if (val & map[i].val)
1144                         SUPPLICANT_DBG("%s: %s", label, map[i].str);
1145         }
1146 }
1147
1148 static void interface_capability_keymgmt(DBusMessageIter *iter, void *user_data)
1149 {
1150         GSupplicantInterface *interface = user_data;
1151         const char *str = NULL;
1152         int i;
1153
1154         dbus_message_iter_get_basic(iter, &str);
1155         if (!str)
1156                 return;
1157
1158         for (i = 0; keymgmt_map[i].str; i++)
1159                 if (strcmp(str, keymgmt_map[i].str) == 0) {
1160                         interface->keymgmt_capa |= keymgmt_map[i].val;
1161                         break;
1162                 }
1163 }
1164
1165 static void interface_capability_authalg(DBusMessageIter *iter, void *user_data)
1166 {
1167         GSupplicantInterface *interface = user_data;
1168         const char *str = NULL;
1169         int i;
1170
1171         dbus_message_iter_get_basic(iter, &str);
1172         if (!str)
1173                 return;
1174
1175         for (i = 0; authalg_capa_map[i].str; i++)
1176                 if (strcmp(str, authalg_capa_map[i].str) == 0) {
1177                         interface->authalg_capa |= authalg_capa_map[i].val;
1178                         break;
1179                 }
1180 }
1181
1182 static void interface_capability_proto(DBusMessageIter *iter, void *user_data)
1183 {
1184         GSupplicantInterface *interface = user_data;
1185         const char *str = NULL;
1186         int i;
1187
1188         dbus_message_iter_get_basic(iter, &str);
1189         if (!str)
1190                 return;
1191
1192         for (i = 0; proto_capa_map[i].str; i++)
1193                 if (strcmp(str, proto_capa_map[i].str) == 0) {
1194                         interface->proto_capa |= proto_capa_map[i].val;
1195                         break;
1196                 }
1197 }
1198
1199 static void interface_capability_pairwise(DBusMessageIter *iter,
1200                                                         void *user_data)
1201 {
1202         GSupplicantInterface *interface = user_data;
1203         const char *str = NULL;
1204         int i;
1205
1206         dbus_message_iter_get_basic(iter, &str);
1207         if (!str)
1208                 return;
1209
1210         for (i = 0; pairwise_map[i].str; i++)
1211                 if (strcmp(str, pairwise_map[i].str) == 0) {
1212                         interface->pairwise_capa |= pairwise_map[i].val;
1213                         break;
1214                 }
1215 }
1216
1217 static void interface_capability_group(DBusMessageIter *iter, void *user_data)
1218 {
1219         GSupplicantInterface *interface = user_data;
1220         const char *str = NULL;
1221         int i;
1222
1223         dbus_message_iter_get_basic(iter, &str);
1224         if (!str)
1225                 return;
1226
1227         for (i = 0; group_map[i].str; i++)
1228                 if (strcmp(str, group_map[i].str) == 0) {
1229                         interface->group_capa |= group_map[i].val;
1230                         break;
1231                 }
1232 }
1233
1234 static void interface_capability_scan(DBusMessageIter *iter, void *user_data)
1235 {
1236         GSupplicantInterface *interface = user_data;
1237         const char *str = NULL;
1238         int i;
1239
1240         dbus_message_iter_get_basic(iter, &str);
1241         if (!str)
1242                 return;
1243
1244         for (i = 0; scan_capa_map[i].str; i++)
1245                 if (strcmp(str, scan_capa_map[i].str) == 0) {
1246                         interface->scan_capa |= scan_capa_map[i].val;
1247                         break;
1248                 }
1249 }
1250
1251 static void interface_capability_mode(DBusMessageIter *iter, void *user_data)
1252 {
1253         GSupplicantInterface *interface = user_data;
1254         const char *str = NULL;
1255         int i;
1256
1257         dbus_message_iter_get_basic(iter, &str);
1258         if (!str)
1259                 return;
1260
1261         for (i = 0; mode_capa_map[i].str; i++)
1262                 if (strcmp(str, mode_capa_map[i].str) == 0) {
1263                         interface->mode_capa |= mode_capa_map[i].val;
1264                         break;
1265                 }
1266 }
1267
1268 static void interface_capability(const char *key, DBusMessageIter *iter,
1269                                                         void *user_data)
1270 {
1271         GSupplicantInterface *interface = user_data;
1272
1273         if (!key)
1274                 return;
1275
1276         if (g_strcmp0(key, "KeyMgmt") == 0)
1277                 supplicant_dbus_array_foreach(iter,
1278                                 interface_capability_keymgmt, interface);
1279         else if (g_strcmp0(key, "AuthAlg") == 0)
1280                 supplicant_dbus_array_foreach(iter,
1281                                 interface_capability_authalg, interface);
1282         else if (g_strcmp0(key, "Protocol") == 0)
1283                 supplicant_dbus_array_foreach(iter,
1284                                 interface_capability_proto, interface);
1285         else if (g_strcmp0(key, "Pairwise") == 0)
1286                 supplicant_dbus_array_foreach(iter,
1287                                 interface_capability_pairwise, interface);
1288         else if (g_strcmp0(key, "Group") == 0)
1289                 supplicant_dbus_array_foreach(iter,
1290                                 interface_capability_group, interface);
1291         else if (g_strcmp0(key, "Scan") == 0)
1292                 supplicant_dbus_array_foreach(iter,
1293                                 interface_capability_scan, interface);
1294         else if (g_strcmp0(key, "Modes") == 0)
1295                 supplicant_dbus_array_foreach(iter,
1296                                 interface_capability_mode, interface);
1297         else if (g_strcmp0(key, "MaxScanSSID") == 0) {
1298                 dbus_int32_t max_scan_ssid;
1299
1300                 dbus_message_iter_get_basic(iter, &max_scan_ssid);
1301                 if (max_scan_ssid < 2)
1302                         max_scan_ssid = 0;
1303                 interface->max_scan_ssids = max_scan_ssid;
1304 #if defined TIZEN_EXT
1305         } else if (g_strcmp0(key, "Is5GhzSupported") == 0) {
1306                 dbus_bool_t is_5_0_Ghz_supported;
1307
1308                 dbus_message_iter_get_basic(iter, &is_5_0_Ghz_supported);
1309                 interface->is_5_0_Ghz_supported = is_5_0_Ghz_supported;
1310 #endif
1311         } else
1312                 SUPPLICANT_DBG("key %s type %c",
1313                                 key, dbus_message_iter_get_arg_type(iter));
1314 }
1315
1316 static void set_bss_expiration_age(DBusMessageIter *iter, void *user_data)
1317 {
1318         unsigned int bss_expiration_age = GPOINTER_TO_UINT(user_data);
1319
1320         dbus_message_iter_append_basic(iter, DBUS_TYPE_UINT32,
1321                                 &bss_expiration_age);
1322 }
1323
1324 int g_supplicant_interface_set_bss_expiration_age(GSupplicantInterface *interface,
1325                                         unsigned int bss_expiration_age)
1326 {
1327        return supplicant_dbus_property_set(interface->path,
1328                                        SUPPLICANT_INTERFACE ".Interface",
1329                                        "BSSExpireAge", DBUS_TYPE_UINT32_AS_STRING,
1330                                        set_bss_expiration_age, NULL,
1331                                        GUINT_TO_POINTER(bss_expiration_age), NULL);
1332 }
1333
1334 struct set_apscan_data
1335 {
1336         unsigned int ap_scan;
1337         GSupplicantInterface *interface;
1338 };
1339
1340 static void set_apscan(DBusMessageIter *iter, void *user_data)
1341 {
1342         struct set_apscan_data *data = user_data;
1343         unsigned int ap_scan = data->ap_scan;
1344
1345         dbus_message_iter_append_basic(iter, DBUS_TYPE_UINT32, &ap_scan);
1346 }
1347
1348 static void set_apscan_complete(const char *error,
1349                 DBusMessageIter *iter, void *user_data)
1350 {
1351         struct set_apscan_data *data = user_data;
1352         GSupplicantInterface *interface = data->interface;
1353
1354         if (error) {
1355                 interface->ap_create_in_progress = false;
1356                 SUPPLICANT_DBG("Set AP scan error %s", error);
1357                 goto error;
1358         }
1359
1360         interface->ap_create_in_progress = true;
1361 error:
1362         dbus_free(data);
1363 }
1364
1365 int g_supplicant_interface_set_apscan(GSupplicantInterface *interface,
1366                                                         unsigned int ap_scan)
1367 {
1368         struct set_apscan_data *data;
1369         int ret;
1370
1371         data = dbus_malloc0(sizeof(*data));
1372
1373         if (!data)
1374                 return -ENOMEM;
1375
1376         data->ap_scan = ap_scan;
1377         data->interface = interface;
1378
1379         ret = supplicant_dbus_property_set(interface->path,
1380                         SUPPLICANT_INTERFACE ".Interface",
1381                         "ApScan", DBUS_TYPE_UINT32_AS_STRING,
1382                         set_apscan, set_apscan_complete, data, NULL);
1383         if (ret < 0)
1384                 dbus_free(data);
1385
1386         return ret;
1387 }
1388
1389 void g_supplicant_interface_set_data(GSupplicantInterface *interface,
1390                                                                 void *data)
1391 {
1392         if (!interface)
1393                 return;
1394
1395         interface->data = data;
1396
1397         if (!data)
1398                 interface->scan_callback = NULL;
1399 }
1400
1401 void *g_supplicant_interface_get_data(GSupplicantInterface *interface)
1402 {
1403         if (!interface)
1404                 return NULL;
1405
1406         return interface->data;
1407 }
1408
1409 const char *g_supplicant_interface_get_ifname(GSupplicantInterface *interface)
1410 {
1411         if (!interface)
1412                 return NULL;
1413
1414         return interface->ifname;
1415 }
1416
1417 #if defined TIZEN_EXT
1418 bool g_supplicant_interface_get_is_5_0_ghz_supported(GSupplicantInterface *interface)
1419 {
1420         if (!interface)
1421                 return NULL;
1422
1423         return interface->is_5_0_Ghz_supported;
1424 }
1425
1426 unsigned char *g_supplicant_interface_get_add_network_bssid(GSupplicantInterface *interface)
1427 {
1428         if (!interface)
1429                 return NULL;
1430
1431         return (unsigned char *)interface->add_network_bssid;
1432 }
1433 #endif
1434
1435 const char *g_supplicant_interface_get_driver(GSupplicantInterface *interface)
1436 {
1437         if (!interface)
1438                 return NULL;
1439
1440         return interface->driver;
1441 }
1442
1443 GSupplicantState g_supplicant_interface_get_state(
1444                                         GSupplicantInterface *interface)
1445 {
1446         if (!interface)
1447                 return G_SUPPLICANT_STATE_UNKNOWN;
1448
1449         return interface->state;
1450 }
1451
1452 const char *g_supplicant_interface_get_wps_key(GSupplicantInterface *interface)
1453 {
1454         if (!interface)
1455                 return NULL;
1456
1457         return (const char *)interface->wps_cred.key;
1458 }
1459
1460 const void *g_supplicant_interface_get_wps_ssid(GSupplicantInterface *interface,
1461                                                         unsigned int *ssid_len)
1462 {
1463         if (!ssid_len)
1464                 return NULL;
1465
1466         if (!interface || interface->wps_cred.ssid_len == 0) {
1467                 *ssid_len = 0;
1468                 return NULL;
1469         }
1470
1471         *ssid_len = interface->wps_cred.ssid_len;
1472         return interface->wps_cred.ssid;
1473 }
1474
1475 GSupplicantWpsState g_supplicant_interface_get_wps_state(
1476                                         GSupplicantInterface *interface)
1477 {
1478         if (!interface)
1479                 return G_SUPPLICANT_WPS_STATE_UNKNOWN;
1480
1481         return interface->wps_state;
1482 }
1483
1484 unsigned int g_supplicant_interface_get_mode(GSupplicantInterface *interface)
1485 {
1486         if (!interface)
1487                 return 0;
1488
1489         return interface->mode_capa;
1490 }
1491
1492 unsigned int g_supplicant_interface_get_max_scan_ssids(
1493                                 GSupplicantInterface *interface)
1494 {
1495         if (!interface)
1496                 return 0;
1497
1498         if (interface->max_scan_ssids == 0)
1499                 return WPAS_MAX_SCAN_SSIDS;
1500
1501         return interface->max_scan_ssids;
1502 }
1503
1504 static void set_network_enabled(DBusMessageIter *iter, void *user_data)
1505 {
1506         dbus_bool_t enable = *(dbus_bool_t *)user_data;
1507
1508         dbus_message_iter_append_basic(iter, DBUS_TYPE_BOOLEAN, &enable);
1509 }
1510
1511 int g_supplicant_interface_enable_selected_network(GSupplicantInterface *interface,
1512                                                         dbus_bool_t enable)
1513 {
1514         if (!interface)
1515                 return -1;
1516
1517         if (!interface->network_path)
1518                 return -1;
1519
1520         SUPPLICANT_DBG(" ");
1521         return supplicant_dbus_property_set(interface->network_path,
1522                                 SUPPLICANT_INTERFACE ".Network",
1523                                 "Enabled", DBUS_TYPE_BOOLEAN_AS_STRING,
1524                                 set_network_enabled, NULL, &enable, NULL);
1525 }
1526
1527 dbus_bool_t g_supplicant_interface_get_ready(GSupplicantInterface *interface)
1528 {
1529         if (!interface)
1530                 return FALSE;
1531
1532         return interface->ready;
1533 }
1534
1535 GSupplicantInterface *g_supplicant_network_get_interface(
1536                                         GSupplicantNetwork *network)
1537 {
1538         if (!network)
1539                 return NULL;
1540
1541         return network->interface;
1542 }
1543
1544 const char *g_supplicant_network_get_name(GSupplicantNetwork *network)
1545 {
1546         if (!network || !network->name)
1547                 return "";
1548
1549         return network->name;
1550 }
1551
1552 const char *g_supplicant_network_get_identifier(GSupplicantNetwork *network)
1553 {
1554         if (!network || !network->group)
1555                 return "";
1556
1557         return network->group;
1558 }
1559
1560 const char *g_supplicant_network_get_path(GSupplicantNetwork *network)
1561 {
1562         if (!network || !network->path)
1563                 return NULL;
1564
1565         return network->path;
1566 }
1567
1568 const char *g_supplicant_network_get_mode(GSupplicantNetwork *network)
1569 {
1570         if (!network)
1571                 return G_SUPPLICANT_MODE_UNKNOWN;
1572
1573         return mode2string(network->mode);
1574 }
1575
1576 const char *g_supplicant_network_get_security(GSupplicantNetwork *network)
1577 {
1578         if (!network)
1579                 return G_SUPPLICANT_SECURITY_UNKNOWN;
1580
1581         return security2string(network->security);
1582 }
1583
1584 const void *g_supplicant_network_get_ssid(GSupplicantNetwork *network,
1585                                                 unsigned int *ssid_len)
1586 {
1587         if (!network) {
1588                 *ssid_len = 0;
1589                 return NULL;
1590         }
1591
1592         *ssid_len = network->ssid_len;
1593         return network->ssid;
1594 }
1595
1596 dbus_int16_t g_supplicant_network_get_signal(GSupplicantNetwork *network)
1597 {
1598         if (!network)
1599                 return 0;
1600
1601         return network->signal;
1602 }
1603
1604 dbus_uint16_t g_supplicant_network_get_frequency(GSupplicantNetwork *network)
1605 {
1606         if (!network)
1607                 return 0;
1608
1609         return network->frequency;
1610 }
1611
1612 dbus_bool_t g_supplicant_network_get_wps(GSupplicantNetwork *network)
1613 {
1614         if (!network)
1615                 return FALSE;
1616
1617         return network->wps;
1618 }
1619
1620 dbus_bool_t g_supplicant_network_is_wps_active(GSupplicantNetwork *network)
1621 {
1622         if (!network)
1623                 return FALSE;
1624
1625         if (network->wps_capabilities & G_SUPPLICANT_WPS_CONFIGURED)
1626                 return TRUE;
1627
1628         return FALSE;
1629 }
1630
1631 dbus_bool_t g_supplicant_network_is_wps_pbc(GSupplicantNetwork *network)
1632 {
1633         if (!network)
1634                 return FALSE;
1635
1636         if (network->wps_capabilities & G_SUPPLICANT_WPS_PBC)
1637                 return TRUE;
1638
1639         return FALSE;
1640 }
1641
1642 dbus_bool_t g_supplicant_network_is_wps_advertizing(GSupplicantNetwork *network)
1643 {
1644         if (!network)
1645                 return FALSE;
1646
1647         if (network->wps_capabilities & G_SUPPLICANT_WPS_REGISTRAR)
1648                 return TRUE;
1649
1650         return FALSE;
1651 }
1652
1653 #ifdef TIZEN_EXT
1654 GSupplicantPhy_mode g_supplicant_network_get_phy_mode(GSupplicantNetwork *network)
1655 {
1656         if (!network)
1657                 return G_SUPPLICANT_MODE_IEEE80211_UNKNOWN;
1658
1659         return network->phy_mode;
1660 }
1661 #endif
1662
1663 GSupplicantInterface *g_supplicant_peer_get_interface(GSupplicantPeer *peer)
1664 {
1665         if (!peer)
1666                 return NULL;
1667
1668         return peer->interface;
1669 }
1670
1671 const char *g_supplicant_peer_get_path(GSupplicantPeer *peer)
1672 {
1673         if (!peer)
1674                 return NULL;
1675
1676         return peer->path;
1677 }
1678
1679 const char *g_supplicant_peer_get_identifier(GSupplicantPeer *peer)
1680 {
1681         if (!peer)
1682                 return NULL;
1683
1684         return peer->identifier;
1685 }
1686
1687 const void *g_supplicant_peer_get_device_address(GSupplicantPeer *peer)
1688 {
1689         if (!peer)
1690                 return NULL;
1691
1692         return peer->device_address;
1693 }
1694
1695 const void *g_supplicant_peer_get_iface_address(GSupplicantPeer *peer)
1696 {
1697         if (!peer)
1698                 return NULL;
1699
1700         return peer->iface_address;
1701 }
1702
1703 const char *g_supplicant_peer_get_name(GSupplicantPeer *peer)
1704 {
1705         if (!peer)
1706                 return NULL;
1707
1708         return peer->name;
1709 }
1710
1711 #if defined TIZEN_EXT
1712 bool g_supplicant_network_is_hs20AP(GSupplicantNetwork *network)
1713 {
1714         if (!network)
1715                 return 0;
1716
1717         return network->isHS20AP;
1718 }
1719
1720 const char *g_supplicant_network_get_eap(GSupplicantNetwork *network)
1721 {
1722         if (!network || !network->eap)
1723                 return NULL;
1724
1725         return network->eap;
1726 }
1727
1728 const char *g_supplicant_network_get_identity(GSupplicantNetwork *network)
1729 {
1730         if (!network || !network->identity)
1731                 return NULL;
1732
1733         return network->identity;
1734 }
1735
1736 const char *g_supplicant_network_get_phase2(GSupplicantNetwork *network)
1737 {
1738         if (!network || !network->phase2)
1739                 return NULL;
1740
1741         return network->phase2;
1742 }
1743
1744 unsigned int g_supplicant_network_get_keymgmt(GSupplicantNetwork *network)
1745 {
1746         if (!network)
1747                 return 0;
1748
1749         return network->keymgmt;
1750 }
1751
1752 dbus_bool_t g_supplicant_network_get_privacy(GSupplicantNetwork *network)
1753 {
1754         if (!network)
1755                 return FALSE;
1756
1757         return network->privacy;
1758 }
1759
1760 const unsigned char *g_supplicant_network_get_countrycode(GSupplicantNetwork
1761                                                           *network)
1762 {
1763         if (!network)
1764                 return NULL;
1765
1766         return network->country_code;
1767 }
1768
1769 dbus_bool_t g_supplicant_network_is_pmf_required(GSupplicantNetwork *network)
1770 {
1771         if (!network)
1772                 return 0;
1773
1774         return network->best_bss->pmf_required;
1775 }
1776 #endif
1777
1778 const unsigned char *g_supplicant_peer_get_widi_ies(GSupplicantPeer *peer,
1779                                                                 int *length)
1780 {
1781         if (!peer || !length)
1782                 return NULL;
1783
1784         *length = peer->widi_ies_length;
1785         return peer->widi_ies;
1786 }
1787
1788 bool g_supplicant_peer_is_wps_pbc(GSupplicantPeer *peer)
1789 {
1790         if (!peer)
1791                 return false;
1792
1793         if (peer->wps_capabilities & G_SUPPLICANT_WPS_PBC)
1794                 return true;
1795
1796         return false;
1797 }
1798
1799 bool g_supplicant_peer_is_wps_pin(GSupplicantPeer *peer)
1800 {
1801         if (!peer)
1802                 return false;
1803
1804         if (peer->wps_capabilities & G_SUPPLICANT_WPS_PIN)
1805                 return true;
1806
1807         return false;
1808 }
1809
1810 bool g_supplicant_peer_is_in_a_group(GSupplicantPeer *peer)
1811 {
1812         if (!peer || !peer->groups)
1813                 return false;
1814
1815         return true;
1816 }
1817
1818 GSupplicantInterface *g_supplicant_peer_get_group_interface(GSupplicantPeer *peer)
1819 {
1820         if (!peer)
1821                 return NULL;
1822
1823         return (GSupplicantInterface *) peer->current_group_iface;
1824 }
1825
1826 bool g_supplicant_peer_is_client(GSupplicantPeer *peer)
1827 {
1828         GSupplicantGroup *group;
1829         GSList *list;
1830
1831         if (!peer)
1832                 return false;
1833
1834         for (list = peer->groups; list; list = list->next) {
1835                 const char *path = list->data;
1836
1837                 group = g_hash_table_lookup(group_mapping, path);
1838                 if (!group)
1839                         continue;
1840
1841                 if (group->role != G_SUPPLICANT_GROUP_ROLE_CLIENT ||
1842                                 group->orig_interface != peer->interface)
1843                         continue;
1844
1845                 if (group->interface == peer->current_group_iface)
1846                         return true;
1847         }
1848
1849         return false;
1850 }
1851
1852 bool g_supplicant_peer_has_requested_connection(GSupplicantPeer *peer)
1853 {
1854         if (!peer)
1855                 return false;
1856
1857         return peer->connection_requested;
1858 }
1859
1860 #if defined TIZEN_EXT
1861 /*
1862  * Description: Network client requires additional wifi specific info
1863  */
1864 const unsigned char *g_supplicant_network_get_bssid(GSupplicantNetwork *network)
1865 {
1866         if (network == NULL || network->best_bss == NULL)
1867                 return NULL;
1868
1869         return (const unsigned char *)network->best_bss->bssid;
1870 }
1871
1872 dbus_bool_t g_supplicant_network_get_transition_mode(GSupplicantNetwork *network)
1873 {
1874         if (network == NULL)
1875                 return FALSE;
1876
1877         return network->owe_transition_mode;
1878 }
1879
1880 const unsigned char *g_supplicant_network_get_transition_mode_bssid(GSupplicantNetwork *network)
1881 {
1882         if (network == NULL)
1883                 return NULL;
1884
1885         return (const unsigned char *)network->transition_mode_bssid;
1886 }
1887
1888 const void *g_supplicant_network_get_transition_mode_ssid(GSupplicantNetwork *network,
1889                                                 unsigned int *transition_mode_ssid_len)
1890 {
1891         if (!network) {
1892                 *transition_mode_ssid_len = 0;
1893                 return NULL;
1894         }
1895
1896         *transition_mode_ssid_len = network->transition_mode_ssid_len;
1897         return network->transition_mode_ssid;
1898 }
1899
1900 unsigned int g_supplicant_network_get_maxrate(GSupplicantNetwork *network)
1901 {
1902         if (network == NULL || network->best_bss == NULL)
1903                 return 0;
1904
1905         return network->best_bss->maxrate;
1906 }
1907
1908 const char *g_supplicant_network_get_enc_mode(GSupplicantNetwork *network)
1909 {
1910         if (network == NULL || network->best_bss == NULL)
1911                 return NULL;
1912
1913         if (network->best_bss->security == G_SUPPLICANT_SECURITY_PSK ||
1914                         network->best_bss->security == G_SUPPLICANT_SECURITY_SAE ||
1915                         network->best_bss->security == G_SUPPLICANT_SECURITY_OWE ||
1916                         network->best_bss->security == G_SUPPLICANT_SECURITY_DPP ||
1917                         network->best_bss->security == G_SUPPLICANT_SECURITY_IEEE8021X) {
1918                 unsigned int pairwise;
1919
1920                 pairwise = network->best_bss->rsn_pairwise |
1921                                 network->best_bss->wpa_pairwise;
1922
1923                 if ((pairwise & G_SUPPLICANT_PAIRWISE_CCMP) &&
1924                     (pairwise & G_SUPPLICANT_PAIRWISE_TKIP))
1925                         return "mixed";
1926                 else if (pairwise & G_SUPPLICANT_PAIRWISE_CCMP)
1927                         return "aes";
1928                 else if (pairwise & G_SUPPLICANT_PAIRWISE_TKIP)
1929                         return "tkip";
1930
1931         } else if (network->best_bss->security == G_SUPPLICANT_SECURITY_WEP)
1932                 return "wep";
1933         else if (network->best_bss->security == G_SUPPLICANT_SECURITY_NONE)
1934                 return "none";
1935
1936         return NULL;
1937 }
1938
1939 bool g_supplicant_network_get_rsn_mode(GSupplicantNetwork *network)
1940 {
1941         if (network == NULL || network->best_bss == NULL)
1942                 return 0;
1943
1944         if (network->best_bss->security == G_SUPPLICANT_SECURITY_OWE ||
1945                         network->best_bss->security == G_SUPPLICANT_SECURITY_DPP)
1946                 return false;
1947
1948         if (network->best_bss->rsn_selected) {
1949                 const char *mode = g_supplicant_network_get_enc_mode(network);
1950                 if (g_strcmp0(mode, "aes") == 0 ||
1951                                 g_strcmp0(mode, "mixed") == 0)
1952                         return true;
1953                 else
1954                         return false;
1955         } else
1956                 return false;
1957 }
1958
1959 void *g_supplicant_network_get_wifi_vsie(GSupplicantNetwork *network)
1960 {
1961         GSList *vsie_list = NULL;
1962
1963         if (!network)
1964                 return NULL;
1965
1966         if (g_slist_length(network->vsie_list) > 0) {
1967                 GSList *list = NULL;
1968                 unsigned char *vsie = NULL;
1969                 for (list = network->vsie_list; list; list = list->next) {
1970                         unsigned char *ie = (unsigned char *)list->data;
1971                         if (ie == NULL)
1972                                 continue;
1973                         vsie = (unsigned char *)g_try_malloc0(ie[1]+2); // tag number size(1), tag length size(1)
1974
1975                         if (vsie) {
1976                                 memcpy(vsie, ie, ie[1]+2);
1977                                 vsie_list = g_slist_append(vsie_list, vsie);
1978                         } else
1979                                 SUPPLICANT_DBG("Failed to allocate memory");
1980                 }
1981         }
1982
1983         return vsie_list;
1984 }
1985
1986 static bool compare_bssid(unsigned char *bssid_a, unsigned char *bssid_b)
1987 {
1988         if (!memcmp(bssid_a, bssid_b, WIFI_BSSID_LEN_MAX))
1989                 return true;
1990
1991         return false;
1992 }
1993
1994 static gchar *convert_bssid_to_str(unsigned char *bssid)
1995 {
1996         GString *bssid_str;
1997         unsigned int i;
1998
1999         bssid_str = g_string_sized_new(18);
2000         if (!bssid_str)
2001                 return NULL;
2002
2003         for (i = 0; i < WIFI_BSSID_LEN_MAX; i++) {
2004                 g_string_append_printf(bssid_str, "%02x", bssid[i]);
2005                 if (i < WIFI_BSSID_LEN_MAX - 1)
2006                         g_string_append(bssid_str, ":");
2007         }
2008
2009         return g_string_free(bssid_str, FALSE);
2010 }
2011
2012 #if defined TIZEN_EXT_INS
2013 static void count_assoc_reject(gpointer data, gpointer user_data)
2014 {
2015         time_t assoc_reject_time = GPOINTER_TO_INT(data);
2016         struct assoc_count_data *assoc_count = user_data;
2017
2018         if (assoc_reject_time > assoc_count->ref_time)
2019                 assoc_count->assoc_count++;
2020 }
2021
2022 static uint16_t get_assoc_reject_cnt(GHashTable *assoc_reject_table, unsigned char *bssid)
2023 {
2024         gchar *bssid_str;
2025         struct assoc_reject_data *assoc_data;
2026         struct assoc_count_data assoc_count;
2027         time_t curr_time;
2028         struct tm* timeinfo;
2029
2030         if (g_hash_table_size(assoc_reject_table) < 1)
2031                 return 0;
2032
2033         if (!bssid)
2034                 return 0;
2035
2036         if (!memcmp(bssid, invalid_bssid, WIFI_BSSID_LEN_MAX))
2037                 return 0;
2038
2039         bssid_str = convert_bssid_to_str(bssid);
2040         if (!bssid_str)
2041                 return 0;
2042
2043         assoc_data = g_hash_table_lookup(assoc_reject_table, bssid_str);
2044         if (!assoc_data) {
2045                 g_free(bssid_str);
2046                 return 0;
2047         }
2048
2049         if (g_slist_length(assoc_data->reject_time_list) < 1) {
2050                 g_free(bssid_str);
2051                 return 0;
2052         }
2053
2054         /* Only events that occur within one hour are appened. */
2055         curr_time = time(NULL);
2056         timeinfo = localtime(&curr_time);
2057         timeinfo->tm_hour -= 1;
2058
2059         assoc_count.ref_time = mktime(timeinfo);
2060         assoc_count.assoc_count = 0;
2061
2062         g_slist_foreach(assoc_data->reject_time_list, count_assoc_reject, &assoc_count);
2063
2064         g_free(bssid_str);
2065         return assoc_count.assoc_count;
2066 }
2067
2068 static int calculate_score_last_connected_bssid(bool is_last_connected)
2069 {
2070         int score = 0;
2071
2072         if (ins_settings.last_connected_bssid) {
2073                 if (is_last_connected)
2074                         score += ins_settings.last_connected_bssid_score;
2075         }
2076
2077         return score;
2078 }
2079
2080 static int calculate_score_assoc_reject(uint16_t assoc_reject_cnt)
2081 {
2082         int score = 0;
2083
2084         if (ins_settings.assoc_reject)
2085                 score -= (assoc_reject_cnt * ins_settings.assoc_reject_score);
2086
2087         return score;
2088 }
2089
2090 static int calculate_score_frequency(dbus_int16_t strength, dbus_uint16_t frequency)
2091 {
2092         int score = 0;
2093
2094         switch (ins_settings.preferred_freq_bssid) {
2095         case G_SUPPLICANT_INS_PREFERRED_FREQ_24GHZ:
2096                 if ((frequency >= FREQ_RANGE_24GHZ_CHANNEL_1 &&
2097                         frequency <= FREQ_RANGE_24GHZ_CHANNEL_14) &&
2098                         (strength > ins_settings.signal_level3_24ghz))
2099                         score += ins_settings.preferred_freq_bssid_score;
2100
2101                 break;
2102         case G_SUPPLICANT_INS_PREFERRED_FREQ_5GHZ:
2103                 if ((frequency >= FREQ_RANGE_5GHZ_CHANNEL_32 &&
2104                         frequency <= FREQ_RANGE_5GHZ_CHANNEL_165) &&
2105                         (strength > ins_settings.signal_level3_5ghz))
2106                         score += ins_settings.preferred_freq_bssid_score;
2107
2108                 break;
2109         default:
2110                 break;
2111         }
2112
2113         return score;
2114 }
2115
2116 static int calculate_score_strength(dbus_int16_t strength)
2117 {
2118         int score = 0;
2119
2120         if (ins_settings.signal_bssid)
2121                 score += (((strength > -60) ? -60 : strength) + 85);
2122
2123         return score;
2124 }
2125
2126 static int calculate_score_est_throughput(dbus_uint32_t est_throughput)
2127 {
2128         int score = 0;
2129
2130         if (est_throughput >= 10000)
2131                 score = est_throughput / 10000;
2132
2133         if (score > 40)
2134                 score = 40;
2135
2136         return score;
2137 }
2138
2139 static int calculate_score(bool is_last_connected, uint16_t assoc_reject_cnt,
2140                 dbus_uint16_t frequency, dbus_int16_t strength,
2141                 dbus_int16_t snr, dbus_uint32_t est_throughput)
2142 {
2143         int score = 0;
2144
2145         score += calculate_score_last_connected_bssid(is_last_connected);
2146         score += calculate_score_assoc_reject(assoc_reject_cnt);
2147         score += calculate_score_frequency(strength, frequency);
2148         score += calculate_score_strength(strength);
2149         score += (int)snr;
2150         score += calculate_score_est_throughput(est_throughput);
2151
2152         return score;
2153 }
2154 #endif
2155
2156 static void update_bssid_list(gpointer key, gpointer value, gpointer user_data)
2157 {
2158         struct g_supplicant_bss *bss = value;
2159         struct g_connman_bssids *bssids = NULL;
2160         struct update_bssid_data *bssid_data = (struct update_bssid_data *)user_data;
2161
2162         bssids = (struct g_connman_bssids *)g_try_malloc0(sizeof(struct g_connman_bssids));
2163
2164         if (bssids) {
2165                 memcpy(bssids->bssid, bss->bssid, WIFI_BSSID_LEN_MAX);
2166
2167                 bssids->strength = bss->signal;
2168                 bssids->strength += 120;
2169
2170                 if (bssids->strength > 100)
2171                         bssids->strength = 100;
2172
2173                 bssids->frequency = bss->frequency;
2174                 bssids->score_snr = (int)bss->snr;
2175
2176 #if defined TIZEN_EXT_INS
2177                 bssids->assoc_reject_cnt = get_assoc_reject_cnt(bssid_data->assoc_reject_table, bssids->bssid);
2178                 bssids->is_last_connected = compare_bssid(bssids->bssid, bssid_data->last_connected_bssid);
2179
2180                 bssids->score_last_connected_bssid = calculate_score_last_connected_bssid(bssids->is_last_connected);
2181                 bssids->score_assoc_reject = calculate_score_assoc_reject(bssids->assoc_reject_cnt);
2182                 bssids->score_frequency = calculate_score_frequency(bss->signal, bssids->frequency);
2183                 bssids->score_strength = calculate_score_strength(bss->signal);
2184                 bssids->score_est_throughput = calculate_score_est_throughput(bss->est_throughput);
2185
2186                 bssids->ins_score = calculate_score(bssids->is_last_connected,
2187                         bssids->assoc_reject_cnt, bssids->frequency, bss->signal,
2188                         bss->snr, bss->est_throughput);
2189 #else
2190                 bssids->ins_score = bss->signal;
2191 #endif
2192                 bssid_data->bssid_list = g_slist_append(bssid_data->bssid_list, bssids);
2193         } else
2194                 SUPPLICANT_DBG("Failed to allocate memory");
2195 }
2196
2197 static gint cmp_bss(gconstpointer a, gconstpointer b)
2198 {
2199         struct g_connman_bssids *entry_a = (struct g_connman_bssids *)a;
2200         struct g_connman_bssids *entry_b = (struct g_connman_bssids *)b;
2201
2202         if (entry_a->ins_score > entry_b->ins_score)
2203                 return -1;
2204
2205         if (entry_a->ins_score < entry_b->ins_score)
2206                 return 1;
2207
2208         return 0;
2209 }
2210
2211 #if defined TIZEN_EXT_INS
2212 static void print_bssid_sort(gpointer data, gpointer user_data)
2213 {
2214         struct g_connman_bssids *bssids = data;
2215
2216         SUPPLICANT_DBG("bssid[" MACSTR "] total[%2d] freq[%2d] "
2217                         "last_conn[%2d] assoc_reject[%2d] strength[%2d]",
2218                         MAC2STR(bssids->bssid), bssids->ins_score,
2219                         bssids->score_frequency, bssids->score_last_connected_bssid,
2220                         bssids->score_assoc_reject, bssids->score_strength);
2221 }
2222 #endif
2223
2224 void *g_supplicant_network_get_bssid_list(GSupplicantNetwork *network)
2225 {
2226         struct update_bssid_data bssid_data;
2227
2228         if (g_hash_table_size(network->bss_table) < 1)
2229                 return NULL;
2230
2231         bssid_data.network = network;
2232         memset(&bssid_data, 0, sizeof(bssid_data));
2233         memcpy(bssid_data.last_connected_bssid, network->last_connected_bssid, WIFI_BSSID_LEN_MAX);
2234         bssid_data.assoc_reject_table = network->assoc_reject_table;
2235
2236         g_hash_table_foreach(network->bss_table, update_bssid_list, &bssid_data);
2237         bssid_data.bssid_list = g_slist_sort(bssid_data.bssid_list, cmp_bss);
2238 #if defined TIZEN_EXT_INS
2239         g_slist_foreach(bssid_data.bssid_list, print_bssid_sort, NULL);
2240 #endif
2241
2242         return bssid_data.bssid_list;
2243 }
2244
2245 void g_supplicant_network_set_last_connected_bssid(GSupplicantNetwork *network, const unsigned char *bssid)
2246 {
2247         if (!bssid)
2248                 return;
2249
2250         if (!memcmp(bssid, invalid_bssid, WIFI_BSSID_LEN_MAX))
2251                 return;
2252
2253         memcpy(network->last_connected_bssid, bssid, WIFI_BSSID_LEN_MAX);
2254
2255         SUPPLICANT_DBG("last connected bssid [" MACSTR "]", MAC2STR(bssid));
2256 }
2257
2258 const unsigned char *g_supplicant_network_get_last_connected_bssid(GSupplicantNetwork *network)
2259 {
2260         if (network == NULL)
2261                 return NULL;
2262
2263         return (const unsigned char *)network->last_connected_bssid;
2264 }
2265
2266 void g_supplicant_network_update_assoc_reject(GSupplicantInterface *interface,
2267                 GSupplicantNetwork *network)
2268 {
2269         struct assoc_reject_data *assoc_data;
2270         gchar *bssid_str;
2271         time_t curr_time;
2272
2273         if (!network)
2274                 return;
2275
2276         bssid_str = convert_bssid_to_str(interface->add_network_bssid);
2277         if (!bssid_str)
2278                 return;
2279
2280         assoc_data = g_hash_table_lookup(network->assoc_reject_table, bssid_str);
2281         if (!assoc_data) {
2282                 assoc_data = g_try_new0(struct assoc_reject_data, 1);
2283                 if (!assoc_data) {
2284                         g_free(bssid_str);
2285                         return;
2286                 }
2287
2288                 assoc_data->bssid = g_strdup(bssid_str);
2289                 g_hash_table_insert(network->assoc_reject_table, assoc_data->bssid, assoc_data);
2290         }
2291
2292         curr_time = time(NULL);
2293         assoc_data->reject_time_list = g_slist_append(assoc_data->reject_time_list, GINT_TO_POINTER(curr_time));
2294
2295         SUPPLICANT_DBG("bssid [%s] time [%u]", bssid_str, curr_time);
2296
2297         g_free(bssid_str);
2298
2299         callback_network_changed(network, "UpdateAssocReject");
2300 }
2301
2302 GHashTable *g_supplicant_network_get_assoc_reject_table(GSupplicantNetwork *network)
2303 {
2304         if (!network)
2305                 return NULL;
2306
2307         return network->assoc_reject_table;
2308 }
2309
2310 GSupplicantNetwork *g_supplicant_interface_get_network(GSupplicantInterface *interface,
2311                 const char *group)
2312 {
2313         if (!interface)
2314                 return NULL;
2315
2316         return g_hash_table_lookup(interface->network_table, group);
2317 }
2318
2319 static void copy_assoc_reject(gpointer key, gpointer value, gpointer user_data)
2320 {
2321         struct assoc_reject_data *cloned_assoc_data;
2322         struct assoc_reject_data *assoc_data = value;
2323         GHashTable *cloned_assoc_reject_table = user_data;
2324
2325         if (assoc_data && cloned_assoc_reject_table) {
2326                 cloned_assoc_data = g_try_new0(struct assoc_reject_data, 1);
2327                 if (!cloned_assoc_data)
2328                         return;
2329
2330                 cloned_assoc_data->bssid = g_strdup(assoc_data->bssid);
2331                 cloned_assoc_data->reject_time_list = g_slist_copy(assoc_data->reject_time_list);
2332                 g_hash_table_insert(cloned_assoc_reject_table,
2333                                         cloned_assoc_data->bssid, cloned_assoc_data);
2334         }
2335 }
2336
2337 GHashTable *g_supplicant_network_clone_assoc_reject_table(GSupplicantNetwork *network)
2338 {
2339         GHashTable *cloned_assoc_reject_table;
2340
2341         if (!network)
2342                 return NULL;
2343
2344         GHashTable *assoc_reject_table = g_supplicant_network_get_assoc_reject_table(network);
2345         if (!assoc_reject_table)
2346                 return NULL;
2347
2348         cloned_assoc_reject_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2349                                                                 NULL, remove_assoc_data);
2350         g_hash_table_foreach(assoc_reject_table, copy_assoc_reject, cloned_assoc_reject_table);
2351
2352         return cloned_assoc_reject_table;
2353 }
2354
2355 #endif
2356
2357 static void merge_network(GSupplicantNetwork *network)
2358 {
2359         GString *str;
2360         const char *ssid, *mode, *key_mgmt;
2361 #if defined TIZEN_EXT
2362         const char *isHS20AP;
2363         const char *eap, *identity, *phase2;
2364 #endif
2365         unsigned int i, ssid_len;
2366         char *group;
2367
2368         ssid = g_hash_table_lookup(network->config_table, "ssid");
2369         mode = g_hash_table_lookup(network->config_table, "mode");
2370         key_mgmt = g_hash_table_lookup(network->config_table, "key_mgmt");
2371 #if defined TIZEN_EXT
2372         isHS20AP = g_hash_table_lookup(network->config_table, "isHS20AP");
2373         eap = g_hash_table_lookup(network->config_table, "eap");
2374         identity = g_hash_table_lookup(network->config_table, "identity");
2375         phase2 = g_hash_table_lookup(network->config_table, "phase2");
2376 #endif
2377
2378         SUPPLICANT_DBG("ssid %s mode %s", ssid, mode);
2379
2380         if (ssid)
2381                 ssid_len = strlen(ssid);
2382         else
2383                 ssid_len = 0;
2384
2385         str = g_string_sized_new((ssid_len * 2) + 24);
2386         if (!str)
2387                 return;
2388
2389         for (i = 0; i < ssid_len; i++)
2390 #if defined TIZEN_EXT
2391         {
2392                 if (ssid[i] != '"')
2393 #endif
2394                 g_string_append_printf(str, "%02x", ssid[i]);
2395 #if defined TIZEN_EXT
2396         }
2397 #endif
2398
2399         if (g_strcmp0(mode, "0") == 0)
2400                 g_string_append_printf(str, "_managed");
2401         else if (g_strcmp0(mode, "1") == 0)
2402                 g_string_append_printf(str, "_adhoc");
2403 #if defined TIZEN_EXT_WIFI_MESH
2404         else if (g_strcmp0(mode, "5") == 0)
2405                 g_string_append_printf(str, "_mesh");
2406 #endif
2407
2408         if (g_strcmp0(key_mgmt, "WPA-PSK") == 0)
2409                 g_string_append_printf(str, "_psk");
2410 #if defined TIZEN_EXT
2411         else if (g_strcmp0(key_mgmt, "WPA-EAP") == 0)
2412                 g_string_append_printf(str, "_ieee8021x");
2413         else
2414                 g_string_append_printf(str, "_none");
2415 #endif
2416
2417         group = g_string_free(str, FALSE);
2418
2419         SUPPLICANT_DBG("%s", group);
2420
2421 #if defined TIZEN_EXT
2422         if (g_strcmp0(isHS20AP, "1") == 0) {
2423                 network->isHS20AP = 1;
2424                 if (network->eap)
2425                         g_free(network->eap);
2426                 network->eap = g_strdup(eap);
2427
2428                 if (network->identity)
2429                         g_free(network->identity);
2430                 network->identity = g_strdup(identity);
2431
2432                 if (network->phase2)
2433                         g_free(network->phase2);
2434                 network->phase2 = g_strdup(phase2);
2435         } else
2436                 network->isHS20AP = 0;
2437
2438         network->group = g_strdup(group);
2439         callback_network_merged(network);
2440         g_free(network->group);
2441 #endif
2442
2443         g_free(group);
2444
2445         g_hash_table_destroy(network->config_table);
2446
2447         g_free(network->path);
2448         g_free(network);
2449 }
2450
2451 static void network_property(const char *key, DBusMessageIter *iter,
2452                                                         void *user_data)
2453 {
2454         GSupplicantNetwork *network = user_data;
2455
2456         if (!network->interface)
2457                 return;
2458
2459         if (!key) {
2460                 merge_network(network);
2461                 return;
2462         }
2463
2464         if (g_strcmp0(key, "Enabled") == 0) {
2465                 dbus_bool_t enabled = FALSE;
2466
2467                 dbus_message_iter_get_basic(iter, &enabled);
2468         } else if (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_STRING) {
2469                 const char *str = NULL;
2470
2471                 dbus_message_iter_get_basic(iter, &str);
2472                 if (str) {
2473                         g_hash_table_replace(network->config_table,
2474                                                 g_strdup(key), g_strdup(str));
2475                 }
2476         } else
2477                 SUPPLICANT_DBG("key %s type %c",
2478                                 key, dbus_message_iter_get_arg_type(iter));
2479 }
2480
2481 static void interface_network_added(DBusMessageIter *iter, void *user_data)
2482 {
2483         GSupplicantInterface *interface = user_data;
2484         GSupplicantNetwork *network;
2485         const char *path = NULL;
2486
2487         SUPPLICANT_DBG("");
2488
2489         dbus_message_iter_get_basic(iter, &path);
2490         if (!path)
2491                 return;
2492
2493         if (g_strcmp0(path, "/") == 0)
2494                 return;
2495
2496         network = g_try_new0(GSupplicantNetwork, 1);
2497         if (!network)
2498                 return;
2499
2500         network->interface = interface;
2501         network->path = g_strdup(path);
2502
2503         network->config_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2504                                                         g_free, g_free);
2505
2506         dbus_message_iter_next(iter);
2507         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
2508                 supplicant_dbus_property_foreach(iter, network_property,
2509                                                                 network);
2510                 network_property(NULL, NULL, network);
2511                 return;
2512         }
2513
2514         supplicant_dbus_property_get_all(path,
2515                                 SUPPLICANT_INTERFACE ".Network",
2516                                         network_property, network, NULL);
2517 }
2518
2519 static void interface_network_removed(DBusMessageIter *iter, void *user_data)
2520 {
2521         SUPPLICANT_DBG("");
2522 }
2523
2524 static char *create_name(unsigned char *ssid, int ssid_len)
2525 {
2526         GString *string;
2527         const gchar *remainder, *invalid;
2528         int valid_bytes, remaining_bytes;
2529
2530         if (ssid_len < 1 || ssid[0] == '\0')
2531                 return g_strdup("");
2532
2533         string = NULL;
2534         remainder = (const gchar *)ssid;
2535         remaining_bytes = ssid_len;
2536
2537         while (remaining_bytes != 0) {
2538                 if (g_utf8_validate(remainder, remaining_bytes,
2539                                         &invalid)) {
2540                         break;
2541                 }
2542
2543                 valid_bytes = invalid - remainder;
2544
2545                 if (!string)
2546                         string = g_string_sized_new(remaining_bytes);
2547
2548                 g_string_append_len(string, remainder, valid_bytes);
2549
2550                 /* append U+FFFD REPLACEMENT CHARACTER */
2551                 g_string_append(string, "\357\277\275");
2552
2553                 remaining_bytes -= valid_bytes + 1;
2554                 remainder = invalid + 1;
2555         }
2556
2557         if (!string)
2558                 return g_strndup((const gchar *)ssid, ssid_len + 1);
2559
2560         g_string_append(string, remainder);
2561
2562         return g_string_free(string, FALSE);
2563 }
2564
2565 static char *create_group(struct g_supplicant_bss *bss)
2566 {
2567         GString *str;
2568         unsigned int i;
2569         const char *mode, *security;
2570
2571         str = g_string_sized_new((bss->ssid_len * 2) + 24);
2572         if (!str)
2573                 return NULL;
2574
2575         if (bss->ssid_len > 0 && bss->ssid[0] != '\0') {
2576                 for (i = 0; i < bss->ssid_len; i++)
2577                         g_string_append_printf(str, "%02x", bss->ssid[i]);
2578         } else
2579                 g_string_append_printf(str, "hidden");
2580
2581         mode = mode2string(bss->mode);
2582         if (mode)
2583                 g_string_append_printf(str, "_%s", mode);
2584
2585         security = security2string(bss->security);
2586         if (security)
2587                 g_string_append_printf(str, "_%s", security);
2588
2589         return g_string_free(str, FALSE);
2590 }
2591 #if defined TIZEN_EXT
2592 static void update_network_with_best_bss(GSupplicantNetwork *network,
2593                 struct g_supplicant_bss *best_bss)
2594 {
2595         /*
2596          * Do not change best BSS if we are connected.
2597          */
2598         if (network->interface->state == G_SUPPLICANT_STATE_COMPLETED)
2599                 return;
2600
2601         network->signal = best_bss->signal;
2602         network->frequency = best_bss->frequency;
2603         network->best_bss = best_bss;
2604 }
2605
2606 static bool update_best_bss(GSupplicantNetwork *network,
2607                 struct g_supplicant_bss *bss, struct g_supplicant_bss *best_bss)
2608 {
2609         int score_new;
2610         int score_best;
2611
2612         if (network->best_bss == NULL) {
2613                 update_network_with_best_bss(network, bss);
2614                 return true;
2615         }
2616
2617 #if defined TIZEN_EXT_INS
2618         score_new = calculate_score(
2619                 compare_bssid(bss->bssid, network->last_connected_bssid),
2620                 get_assoc_reject_cnt(network->assoc_reject_table, bss->bssid),
2621                 bss->frequency, bss->signal, bss->snr, bss->est_throughput);
2622
2623         score_best = calculate_score(
2624                 compare_bssid(network->best_bss->bssid, network->last_connected_bssid),
2625                 get_assoc_reject_cnt(network->assoc_reject_table, network->best_bss->bssid),
2626                 network->best_bss->frequency, network->best_bss->signal,
2627                 network->best_bss->snr, network->best_bss->est_throughput);
2628 #else
2629         score_new = bss->signal;
2630         score_best = network->best_bss->signal;
2631 #endif
2632
2633         if (score_new > score_best) {
2634                 SUPPLICANT_DBG("new[" MACSTR "][%u] : best[" MACSTR "][%u]",
2635                         MAC2STR(bss->bssid), score_new,
2636                         MAC2STR(network->best_bss->bssid), score_best);
2637
2638                 update_network_with_best_bss(network, bss);
2639
2640                 SUPPLICANT_DBG("Update best BSS for %s", network->name);
2641
2642                 return true;
2643         }
2644
2645         return false;
2646 }
2647 #endif
2648 static int add_or_replace_bss_to_network(struct g_supplicant_bss *bss)
2649 {
2650         GSupplicantInterface *interface = bss->interface;
2651         GSupplicantNetwork *network;
2652         char *group;
2653         bool is_new_network;
2654
2655         group = create_group(bss);
2656         SUPPLICANT_DBG("New group created: %s", group);
2657
2658         if (!group)
2659                 return -ENOMEM;
2660
2661         network = g_hash_table_lookup(interface->network_table, group);
2662         if (network) {
2663                 g_free(group);
2664                 SUPPLICANT_DBG("Network %s already exist", network->name);
2665                 is_new_network = false;
2666
2667                 goto done;
2668         }
2669
2670         is_new_network = true;
2671
2672         network = g_try_new0(GSupplicantNetwork, 1);
2673         if (!network) {
2674                 g_free(group);
2675                 return -ENOMEM;
2676         }
2677
2678         network->interface = interface;
2679         if (!network->path)
2680                 network->path = g_strdup(bss->path);
2681         network->group = group;
2682         network->name = create_name(bss->ssid, bss->ssid_len);
2683         network->mode = bss->mode;
2684         network->security = bss->security;
2685         network->ssid_len = bss->ssid_len;
2686         memcpy(network->ssid, bss->ssid, bss->ssid_len);
2687         network->signal = bss->signal;
2688         network->frequency = bss->frequency;
2689         network->best_bss = bss;
2690
2691         if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
2692                 network->wps = TRUE;
2693                 network->wps_capabilities = bss->wps_capabilities;
2694         }
2695
2696 #if defined TIZEN_EXT
2697         network->owe_transition_mode = bss->owe_transition_mode;
2698         network->privacy = bss->privacy;
2699         memcpy(network->transition_mode_ssid, bss->transition_mode_ssid, bss->transition_mode_ssid_len);
2700         memcpy(network->transition_mode_bssid, bss->transition_mode_bssid, WIFI_BSSID_LEN_MAX);
2701
2702         network->keymgmt = bss->keymgmt;
2703
2704         if (g_slist_length(bss->vsie_list) > 0) {
2705                 GSList *list = NULL;
2706                 unsigned char *vsie = NULL;
2707                 for (list = bss->vsie_list; list; list = list->next) {
2708                         unsigned char *ie = (unsigned char *)list->data;
2709                         vsie = (unsigned char *)g_try_malloc0(ie[1]+2); // tag number size(1), tag length size(1)
2710
2711                         if (vsie) {
2712                                 memcpy(vsie, ie, ie[1]+2);
2713                                 network->vsie_list = g_slist_append(network->vsie_list, vsie);
2714                         } else
2715                                 SUPPLICANT_DBG("Failed to allocate memory.");
2716                 }
2717         }
2718
2719         network->isHS20AP = bss->hs20;
2720         memcpy(network->country_code, bss->country_code, COUNTRY_CODE_LENGTH);
2721         network->phy_mode = bss->phy_mode;
2722 #endif
2723
2724         SUPPLICANT_DBG("New network %s created", network->name);
2725
2726         network->bss_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2727                                                         NULL, remove_bss);
2728
2729         network->config_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2730                                                         g_free, g_free);
2731
2732 #if defined TIZEN_EXT
2733         network->assoc_reject_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2734                                                         NULL, remove_assoc_data);
2735 #endif
2736
2737         g_hash_table_replace(interface->network_table,
2738                                                 network->group, network);
2739
2740         callback_network_added(network);
2741
2742 done:
2743         /* We update network's WPS properties if only bss provides WPS. */
2744         if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
2745                 network->wps = TRUE;
2746                 network->wps_capabilities = bss->wps_capabilities;
2747
2748                 if (!is_new_network)
2749                         callback_network_changed(network, "WPSCapabilities");
2750         }
2751
2752         /*
2753          * Do not change best BSS if we are connected. It will be done through
2754          * CurrentBSS property in case of misalignment with wpa_s or roaming.
2755          */
2756 #if defined TIZEN_EXT
2757         if (network != interface->current_network) {
2758                 if (update_best_bss(network, bss, network->best_bss))
2759                         callback_network_changed(network, "Signal");
2760         }
2761 #else
2762         if (network != interface->current_network &&
2763                                 bss->signal > network->signal) {
2764                 network->signal = bss->signal;
2765                 network->best_bss = bss;
2766                 callback_network_changed(network, "Signal");
2767         }
2768 #endif
2769
2770         g_hash_table_replace(interface->bss_mapping, bss->path, network);
2771         g_hash_table_replace(network->bss_table, bss->path, bss);
2772
2773         g_hash_table_replace(bss_mapping, bss->path, interface);
2774
2775         return 0;
2776 }
2777
2778 static void bss_rates(DBusMessageIter *iter, void *user_data)
2779 {
2780         struct g_supplicant_bss *bss = user_data;
2781         dbus_uint32_t rate = 0;
2782
2783         dbus_message_iter_get_basic(iter, &rate);
2784         if (rate == 0)
2785                 return;
2786
2787         if (rate > bss->maxrate)
2788                 bss->maxrate = rate;
2789 }
2790
2791 static void bss_keymgmt(DBusMessageIter *iter, void *user_data)
2792 {
2793         unsigned int *keymgmt = user_data;
2794         const char *str = NULL;
2795         int i;
2796
2797         dbus_message_iter_get_basic(iter, &str);
2798         if (!str)
2799                 return;
2800
2801         for (i = 0; keymgmt_map[i].str; i++)
2802                 if (strcmp(str, keymgmt_map[i].str) == 0) {
2803                         SUPPLICANT_DBG("Keymgmt: %s", str);
2804                         *keymgmt |= keymgmt_map[i].val;
2805                         break;
2806                 }
2807 }
2808
2809 static void bss_group(DBusMessageIter *iter, void *user_data)
2810 {
2811         unsigned int *group = user_data;
2812         const char *str = NULL;
2813         int i;
2814
2815         dbus_message_iter_get_basic(iter, &str);
2816         if (!str)
2817                 return;
2818
2819         for (i = 0; group_map[i].str; i++)
2820                 if (strcmp(str, group_map[i].str) == 0) {
2821                         SUPPLICANT_DBG("Group: %s", str);
2822                         *group |= group_map[i].val;
2823                         break;
2824                 }
2825 }
2826
2827 static void bss_pairwise(DBusMessageIter *iter, void *user_data)
2828 {
2829         unsigned int *pairwise = user_data;
2830         const char *str = NULL;
2831         int i;
2832
2833         dbus_message_iter_get_basic(iter, &str);
2834         if (!str)
2835                 return;
2836
2837         for (i = 0; pairwise_map[i].str; i++)
2838                 if (strcmp(str, pairwise_map[i].str) == 0) {
2839                         SUPPLICANT_DBG("Pairwise: %s", str);
2840                         *pairwise |= pairwise_map[i].val;
2841                         break;
2842                 }
2843 }
2844
2845 static void bss_wpa(const char *key, DBusMessageIter *iter,
2846                         void *user_data)
2847 {
2848         struct g_supplicant_bss *bss = user_data;
2849         unsigned int value = 0;
2850
2851         SUPPLICANT_DBG("Key: %s", key);
2852
2853         if (g_strcmp0(key, "KeyMgmt") == 0) {
2854                 supplicant_dbus_array_foreach(iter, bss_keymgmt, &value);
2855
2856                 if (bss->rsn_selected)
2857                         bss->rsn_keymgmt = value;
2858                 else
2859                         bss->wpa_keymgmt = value;
2860         } else if (g_strcmp0(key, "Group") == 0) {
2861                 supplicant_dbus_array_foreach(iter, bss_group, &value);
2862
2863                 if (bss->rsn_selected)
2864                         bss->rsn_group = value;
2865                 else
2866                         bss->wpa_group = value;
2867         } else if (g_strcmp0(key, "Pairwise") == 0) {
2868                 supplicant_dbus_array_foreach(iter, bss_pairwise, &value);
2869
2870                 if (bss->rsn_selected)
2871                         bss->rsn_pairwise = value;
2872                 else
2873                         bss->wpa_pairwise = value;
2874         }
2875 }
2876
2877 static unsigned int get_tlv(unsigned char *ie, unsigned int ie_size,
2878                                                         unsigned int type)
2879 {
2880         unsigned int len = 0;
2881
2882         while (len + 4 < ie_size) {
2883                 unsigned int hi = ie[len];
2884                 unsigned int lo = ie[len + 1];
2885                 unsigned int tmp_type = (hi << 8) + lo;
2886                 unsigned int v_len = 0;
2887
2888                 /* hi and lo are used to recreate an unsigned int
2889                  * based on 2 8bits length unsigned int. */
2890
2891                 hi = ie[len + 2];
2892                 lo = ie[len + 3];
2893                 v_len = (hi << 8) + lo;
2894
2895                 if (tmp_type == type) {
2896                         unsigned int ret_value = 0;
2897                         unsigned char *value = (unsigned char *)&ret_value;
2898
2899                         SUPPLICANT_DBG("IE: match type 0x%x", type);
2900
2901                         /* Verifying length relevance */
2902                         if (v_len > sizeof(unsigned int) ||
2903                                 len + 4 + v_len > ie_size)
2904                                 break;
2905
2906                         memcpy(value, ie + len + 4, v_len);
2907
2908                         SUPPLICANT_DBG("returning 0x%x", ret_value);
2909                         return ret_value;
2910                 }
2911
2912                 len += v_len + 4;
2913         }
2914
2915         SUPPLICANT_DBG("returning 0");
2916         return 0;
2917 }
2918
2919 #if defined TIZEN_EXT
2920 static void get_bss_phy_mode(unsigned int max_rate,
2921                 unsigned int max_ext_rate, bool ht, bool vht, void *data)
2922 {
2923         struct g_supplicant_bss *bss = data;
2924         unsigned int freq = bss->frequency;
2925
2926         /* Following conditions are used to determine
2927          * IEEE 802.11 Protocol Modes:-
2928          *
2929          * 1. If “Supported rates” is only till 11 Mbps,
2930          *    and frequency is in 2.4GHz band, then protocol is 11B.
2931          * 2. If “Supported rates” is till 54Mbps or
2932          *    “Extended supported rates” are present,
2933          *    and frequency is in 2.4GHz band, then protocol is 11G.
2934          * 3. If “Supported rates” is only till 54 Mbps,
2935          *    frequency is in 5GHz band , then protocol is 11A.
2936          * 4. If “HT capabilities” is supported , then protocol is 11N.
2937          * 5. If “HT capabilities” & “VHT” is supported and
2938          *    frequency is in 5 GHz band, then protocol is 11AC.
2939          * */
2940
2941         if (freq >= 2412 && freq <= 2484) { /* 2.4 Ghz Band */
2942                 if (max_rate <= 11 && max_ext_rate <= 0 && !ht)
2943                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211B;
2944                 else if ((max_rate <= 54 || max_ext_rate > 0) && !ht)
2945                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211BG;
2946                 else if ((max_rate >= 54 || max_ext_rate > 0) && ht)
2947                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211BGN;
2948                 else
2949                         bss->phy_mode = G_SUPPLICANT_MODE_UNKNOWN;
2950         } else if (freq >= 5180 && freq <= 5825) { /* 5 Ghz Band */
2951                 if (max_rate <= 54 && !ht)
2952                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211A;
2953                 else if ((max_rate >= 54 || max_ext_rate > 0) && ht && !vht)
2954                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211AN;
2955                 else if ((max_rate >= 54 || max_ext_rate > 0) && ht && vht)
2956                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211ANAC;
2957                 else
2958                         bss->phy_mode = G_SUPPLICANT_MODE_UNKNOWN;
2959         }
2960 }
2961 #endif
2962
2963 static void bss_process_ies(DBusMessageIter *iter, void *user_data)
2964 {
2965         struct g_supplicant_bss *bss = user_data;
2966         const unsigned char WPS_OUI[] = { 0x00, 0x50, 0xf2, 0x04 };
2967         unsigned char *ie, *ie_end;
2968         DBusMessageIter array;
2969         unsigned int value;
2970         int ie_len;
2971 #if defined TIZEN_EXT
2972         const unsigned char OWE_WFA_OUI[] = { 0x50, 0x6f, 0x9a, 0x1c };
2973         int r_len, j;
2974         unsigned char *rates = NULL;
2975         unsigned char *ext_rates = NULL;
2976         unsigned int max_rate = 0;
2977         unsigned int max_ext_rate = 0;
2978         unsigned int offset = 0;
2979         bool ht = false;
2980         bool vht = false;
2981 #endif
2982
2983 #define WMM_WPA1_WPS_INFO 221
2984 #define WPS_INFO_MIN_LEN  6
2985 #define WPS_VERSION_TLV   0x104A
2986 #define WPS_STATE_TLV     0x1044
2987 #define WPS_METHODS_TLV   0x1012
2988 #define WPS_REGISTRAR_TLV 0x1041
2989 #define WPS_VERSION       0x10
2990 #define WPS_PBC           0x04
2991 #define WPS_PIN           0x00
2992 #define WPS_CONFIGURED    0x02
2993 #if defined TIZEN_EXT
2994 #define VENDOR_SPECIFIC_INFO 0xDD
2995 #define WLAN_EID_COUNTRY 7
2996 #define WLAN_EID_RSN_INFO 48
2997 #define RSN_CAPABILITY_MFP_REQ (1 << 6)
2998 #endif
2999
3000         dbus_message_iter_recurse(iter, &array);
3001         dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
3002
3003         if (!ie || ie_len < 2)
3004                 return;
3005
3006         bss->wps_capabilities = 0;
3007         bss->keymgmt = 0;
3008
3009         for (ie_end = ie + ie_len; ie < ie_end && ie + ie[1] + 1 <= ie_end;
3010                                                         ie += ie[1] + 2) {
3011 #if defined TIZEN_EXT
3012                 unsigned char *vsie;
3013                 int vsie_len = 0;
3014
3015                 if (ie[0] == VENDOR_SPECIFIC_INFO && memcmp(ie+2, OWE_WFA_OUI, sizeof(OWE_WFA_OUI)) == 0) {
3016                         SUPPLICANT_DBG("IE: match vendor specific data : OWE Transition Mode");
3017
3018 /*
3019                 Tag: Vendor Specific: Wi-Fi Alliance: OWE Transition Mode
3020                         Tag Number: Vendor Specific (221)    -> ie[0]
3021                         Tag length: 26                       -> ie[1]
3022                         OUI: 50:6f:9a (Wi-Fi Alliance)       -> ie[2]
3023                         Vendor Specific OUI Type: 28         -> ie[5]
3024                         BSSID: 92:fd:f0:20:2b:09             -> ie[6]
3025                         SSID length: 15                      -> ie[12]
3026                         SSID: Wi-Fi-5.2.3-owe                -> ie[13]
3027
3028 0000   dd 1a 50 6f 9a 1c 92 fd f0 20 2b 09 0f 57 69 2d   ..Po..... +..Wi-
3029 0010   46 69 2d 35 2e 32 2e 33 2d 6f 77 65               Fi-5.2.3-owe
3030
3031 */
3032                         bss->owe_transition_mode = TRUE;
3033                         if (ie[1] >= 11) { // Tag length is at least up to ssid length position.
3034                                 memcpy(bss->transition_mode_bssid, ie+6, WIFI_BSSID_LEN_MAX);
3035                                 if (ie[12] > 0 && ie[12] < 32) {
3036                                         memcpy(bss->transition_mode_ssid, ie+13, ie[12]);
3037                                         bss->transition_mode_ssid_len = ie[12];
3038                                 } else
3039                                         bss->transition_mode_ssid_len = 0;
3040                         } else
3041                                 bss->owe_transition_mode = FALSE;
3042                         continue;
3043                 }
3044
3045                 if (ie[0] == VENDOR_SPECIFIC_INFO && memcmp(ie+2, WPS_OUI, sizeof(WPS_OUI)) != 0) {
3046
3047                         if (!simplified_log)
3048                                 SUPPLICANT_DBG("IE: match vendor specific data");
3049
3050                         vsie_len = ie[1]+2;     // tag number size(1), tag length size(1)
3051                         vsie = (unsigned char *)g_try_malloc0(vsie_len);
3052
3053                         if (vsie) {
3054                                 memcpy(vsie, ie, vsie_len);
3055                                 bss->vsie_list = g_slist_append(bss->vsie_list, vsie);
3056                         } else
3057                                 SUPPLICANT_DBG("Failed to allocate memory");
3058                         continue;
3059                 }
3060
3061                 if (ie[0] == WLAN_EID_COUNTRY && ie[1] >= 2) {
3062                         /* Add country code only if it is a valid alphabet */
3063                         if (ie[2] >= 65 && ie[2] <= 90 && ie[3] >= 65 && ie[3] <= 90) {
3064                                 memcpy(bss->country_code, ie+2, COUNTRY_CODE_LENGTH);
3065                                 continue;
3066                         }
3067                 }
3068
3069                 if (ie[0] == WLAN_EID_HT_CAP && ie[1]) {
3070                         ht = true;
3071                         continue;
3072                 }
3073
3074                 if (ie[0] == WLAN_EID_VHT_CAP && ie[1]) {
3075                         vht = true;
3076                         continue;
3077                 }
3078
3079                 if (ie[0] == WLAN_EID_SUPP_RATES && ie[1]) {
3080                         r_len = ie[1];
3081                         rates = g_malloc0(r_len);
3082                         if (!rates)
3083                                 continue;
3084
3085                         for (j = 0; ie && j < r_len; j++) {
3086                                 rates[j] = ((ie[j + 2] & 0x7f) * 500000)/1000000;
3087                                 if (max_rate < rates[j])
3088                                         max_rate = rates[j];
3089                         }
3090                         continue;
3091                 }
3092
3093                 if (ie[0] == WLAN_EID_EXT_SUPP_RATES && ie[1] > 0) {
3094                         r_len = ie[1];
3095                         ext_rates = g_malloc0(r_len);
3096                         if (!ext_rates)
3097                                 continue;
3098
3099                         for (j = 0; ie && j < r_len; j++) {
3100                                 ext_rates[j] = ((ie[j + 2] & 0x7f) * 500000)/1000000;
3101                                 if (max_ext_rate < ext_rates[j])
3102                                         max_ext_rate = ext_rates[j];
3103                         }
3104                         continue;
3105                 }
3106
3107                 if (ie[0] == WLAN_EID_RSN_INFO && ie[1] >= 20) {
3108                         r_len = ie[1];
3109                         offset = 10 + ie[8] * 4;
3110                         offset += ie[offset] * 4 + 2;
3111
3112                         if (offset <= r_len + 1 &&
3113                                         (ie[offset] & RSN_CAPABILITY_MFP_REQ) != 0)
3114                                 bss->pmf_required = TRUE;
3115
3116                         continue;
3117                 }
3118 #endif
3119                 if (ie[0] != WMM_WPA1_WPS_INFO || ie[1] < WPS_INFO_MIN_LEN ||
3120                         memcmp(ie+2, WPS_OUI, sizeof(WPS_OUI)) != 0)
3121                         continue;
3122
3123                 SUPPLICANT_DBG("IE: match WPS_OUI");
3124
3125                 value = get_tlv(&ie[6], ie[1], WPS_STATE_TLV);
3126                 if (get_tlv(&ie[6], ie[1], WPS_VERSION_TLV) == WPS_VERSION &&
3127                                                                 value != 0) {
3128                         bss->keymgmt |= G_SUPPLICANT_KEYMGMT_WPS;
3129
3130                         if (value == WPS_CONFIGURED)
3131                                 bss->wps_capabilities |=
3132                                         G_SUPPLICANT_WPS_CONFIGURED;
3133                 }
3134
3135                 value = get_tlv(&ie[6], ie[1], WPS_METHODS_TLV);
3136                 if (value != 0) {
3137                         if (GUINT16_FROM_BE(value) == WPS_PBC)
3138                                 bss->wps_capabilities |= G_SUPPLICANT_WPS_PBC;
3139                         if (GUINT16_FROM_BE(value) == WPS_PIN)
3140                                 bss->wps_capabilities |= G_SUPPLICANT_WPS_PIN;
3141                 } else
3142                         bss->wps_capabilities |=
3143                                 G_SUPPLICANT_WPS_PBC | G_SUPPLICANT_WPS_PIN;
3144
3145                 /* If the AP sends this it means it's advertizing
3146                  * as a registrar and the WPS process is launched
3147                  * on its side */
3148                 if (get_tlv(&ie[6], ie[1], WPS_REGISTRAR_TLV) != 0)
3149                         bss->wps_capabilities |= G_SUPPLICANT_WPS_REGISTRAR;
3150
3151                 SUPPLICANT_DBG("WPS Methods 0x%x", bss->wps_capabilities);
3152         }
3153 #ifdef TIZEN_EXT
3154         get_bss_phy_mode(max_rate, max_ext_rate, ht, vht, user_data);
3155         if (rates)
3156                 g_free(rates);
3157         if (ext_rates)
3158                 g_free(ext_rates);
3159 #endif
3160 }
3161
3162 static void bss_compute_security(struct g_supplicant_bss *bss)
3163 {
3164         /*
3165          * Combining RSN and WPA keymgmt
3166          * We combine it since parsing IEs might have set something for WPS. */
3167         bss->keymgmt |= bss->rsn_keymgmt | bss->wpa_keymgmt;
3168
3169         bss->ieee8021x = FALSE;
3170         bss->psk = FALSE;
3171 #if defined TIZEN_EXT
3172         bss->ft_ieee8021x = FALSE;
3173         bss->ft_psk = FALSE;
3174 #endif
3175
3176 #if defined TIZEN_EXT
3177         if (bss->keymgmt &
3178                         (G_SUPPLICANT_KEYMGMT_WPA_EAP |
3179                                         G_SUPPLICANT_KEYMGMT_WPA_EAP_256))
3180                 bss->ieee8021x = TRUE;
3181         else if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_EAP)
3182                 bss->ft_ieee8021x = TRUE;
3183 #else
3184         if (bss->keymgmt &
3185                         (G_SUPPLICANT_KEYMGMT_WPA_EAP |
3186                                 G_SUPPLICANT_KEYMGMT_WPA_FT_EAP |
3187                                 G_SUPPLICANT_KEYMGMT_WPA_EAP_256))
3188                 bss->ieee8021x = TRUE;
3189 #endif
3190
3191 #if defined TIZEN_EXT
3192         if (bss->keymgmt &
3193                         (G_SUPPLICANT_KEYMGMT_WPA_PSK |
3194                                         G_SUPPLICANT_KEYMGMT_WPA_PSK_256))
3195                 bss->psk = TRUE;
3196         else if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_PSK)
3197                 bss->ft_psk = TRUE;
3198 #else
3199         if (bss->keymgmt &
3200                         (G_SUPPLICANT_KEYMGMT_WPA_PSK |
3201                                 G_SUPPLICANT_KEYMGMT_WPA_FT_PSK |
3202                                 G_SUPPLICANT_KEYMGMT_WPA_PSK_256))
3203                 bss->psk = TRUE;
3204 #endif
3205
3206 #if defined TIZEN_EXT
3207         if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_SAE)
3208                 bss->sae = TRUE;
3209         if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_OWE)
3210                 bss->owe = TRUE;
3211         if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_DPP)
3212                 bss->dpp = TRUE;
3213 #endif
3214
3215         if (bss->ieee8021x)
3216                 bss->security = G_SUPPLICANT_SECURITY_IEEE8021X;
3217 #if defined TIZEN_EXT
3218         else if (bss->ft_ieee8021x)
3219                 bss->security = G_SUPPLICANT_SECURITY_IEEE8021X;
3220         else if (bss->sae)
3221                 bss->security = G_SUPPLICANT_SECURITY_SAE;
3222 #endif
3223         else if (bss->psk)
3224                 bss->security = G_SUPPLICANT_SECURITY_PSK;
3225 #if defined TIZEN_EXT
3226         else if (bss->ft_psk)
3227                 bss->security = G_SUPPLICANT_SECURITY_FT_PSK;
3228         else if (bss->owe || bss->owe_transition_mode)
3229                 bss->security = G_SUPPLICANT_SECURITY_OWE;
3230         else if (bss->dpp)
3231                 bss->security = G_SUPPLICANT_SECURITY_DPP;
3232 #endif
3233         else if (bss->privacy)
3234                 bss->security = G_SUPPLICANT_SECURITY_WEP;
3235         else
3236                 bss->security = G_SUPPLICANT_SECURITY_NONE;
3237 }
3238
3239
3240 static void bss_property(const char *key, DBusMessageIter *iter,
3241                                                         void *user_data)
3242 {
3243         struct g_supplicant_bss *bss = user_data;
3244
3245         if (!bss->interface)
3246                 return;
3247 #if defined TIZEN_EXT
3248         if (!simplified_log)
3249 #endif
3250         SUPPLICANT_DBG("key %s", key);
3251
3252         if (!key)
3253                 return;
3254
3255         if (g_strcmp0(key, "BSSID") == 0) {
3256                 DBusMessageIter array;
3257                 unsigned char *addr;
3258                 int addr_len;
3259
3260                 dbus_message_iter_recurse(iter, &array);
3261                 dbus_message_iter_get_fixed_array(&array, &addr, &addr_len);
3262
3263                 if (addr_len == 6)
3264                         memcpy(bss->bssid, addr, addr_len);
3265         } else if (g_strcmp0(key, "SSID") == 0) {
3266                 DBusMessageIter array;
3267                 unsigned char *ssid;
3268                 int ssid_len;
3269
3270                 dbus_message_iter_recurse(iter, &array);
3271                 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
3272
3273                 if (ssid_len > 0 && ssid_len < 33) {
3274                         memcpy(bss->ssid, ssid, ssid_len);
3275                         bss->ssid_len = ssid_len;
3276                 } else {
3277                         memset(bss->ssid, 0, sizeof(bss->ssid));
3278                         bss->ssid_len = 0;
3279                 }
3280         } else if (g_strcmp0(key, "Capabilities") == 0) {
3281                 dbus_uint16_t capabilities = 0x0000;
3282
3283                 dbus_message_iter_get_basic(iter, &capabilities);
3284
3285                 if (capabilities & IEEE80211_CAP_ESS)
3286                         bss->mode = G_SUPPLICANT_MODE_INFRA;
3287                 else if (capabilities & IEEE80211_CAP_IBSS)
3288                         bss->mode = G_SUPPLICANT_MODE_IBSS;
3289
3290                 if (capabilities & IEEE80211_CAP_PRIVACY)
3291                         bss->privacy = TRUE;
3292         } else if (g_strcmp0(key, "Mode") == 0) {
3293                 const char *mode = NULL;
3294
3295                 dbus_message_iter_get_basic(iter, &mode);
3296                 bss->mode = string2mode(mode);
3297         } else if (g_strcmp0(key, "Frequency") == 0) {
3298                 dbus_uint16_t frequency = 0;
3299
3300                 dbus_message_iter_get_basic(iter, &frequency);
3301                 bss->frequency = frequency;
3302         } else if (g_strcmp0(key, "Signal") == 0) {
3303                 dbus_int16_t signal = 0;
3304
3305                 dbus_message_iter_get_basic(iter, &signal);
3306
3307                 bss->signal = signal;
3308                 if (!bss->signal)
3309                         bss->signal = BSS_UNKNOWN_STRENGTH;
3310
3311         } else if (g_strcmp0(key, "Level") == 0) {
3312                 dbus_int32_t level = 0;
3313
3314                 dbus_message_iter_get_basic(iter, &level);
3315         } else if (g_strcmp0(key, "Rates") == 0) {
3316                 supplicant_dbus_array_foreach(iter, bss_rates, bss);
3317         } else if (g_strcmp0(key, "MaxRate") == 0) {
3318                 dbus_uint32_t maxrate = 0;
3319
3320                 dbus_message_iter_get_basic(iter, &maxrate);
3321                 if (maxrate != 0)
3322                         bss->maxrate = maxrate;
3323         } else if (g_strcmp0(key, "Privacy") == 0) {
3324                 dbus_bool_t privacy = FALSE;
3325
3326                 dbus_message_iter_get_basic(iter, &privacy);
3327                 bss->privacy = privacy;
3328         } else if (g_strcmp0(key, "RSN") == 0) {
3329                 bss->rsn_selected = TRUE;
3330
3331                 supplicant_dbus_property_foreach(iter, bss_wpa, bss);
3332         } else if (g_strcmp0(key, "WPA") == 0) {
3333                 bss->rsn_selected = FALSE;
3334
3335                 supplicant_dbus_property_foreach(iter, bss_wpa, bss);
3336 #if defined TIZEN_EXT
3337         } else if (g_strcmp0(key, "HS20") == 0) {
3338                 dbus_bool_t hs20 = FALSE;
3339                 dbus_message_iter_get_basic(iter, &hs20);
3340                 bss->hs20 = hs20;
3341         } else if (g_strcmp0(key, "SNR") == 0) {
3342                 dbus_int16_t snr = 0;
3343
3344                 dbus_message_iter_get_basic(iter, &snr);
3345                 bss->snr = snr;
3346         } else if (g_strcmp0(key, "EstThroughput") == 0) {
3347                 dbus_uint32_t est_throughput = 0;
3348
3349                 dbus_message_iter_get_basic(iter, &est_throughput);
3350                 if (est_throughput != 0)
3351                         bss->est_throughput = est_throughput;
3352 #endif
3353         } else if (g_strcmp0(key, "IEs") == 0)
3354                 bss_process_ies(iter, bss);
3355         else
3356                 SUPPLICANT_DBG("key %s type %c",
3357                                 key, dbus_message_iter_get_arg_type(iter));
3358 }
3359
3360 static struct g_supplicant_bss *interface_bss_added(DBusMessageIter *iter,
3361                                                         void *user_data)
3362 {
3363         GSupplicantInterface *interface = user_data;
3364         GSupplicantNetwork *network;
3365         struct g_supplicant_bss *bss;
3366         const char *path = NULL;
3367 #if defined TIZEN_EXT
3368         if (!simplified_log)
3369 #endif
3370         SUPPLICANT_DBG("");
3371
3372         dbus_message_iter_get_basic(iter, &path);
3373         if (!path)
3374                 return NULL;
3375
3376         if (g_strcmp0(path, "/") == 0)
3377                 return NULL;
3378 #if defined TIZEN_EXT
3379         if (!simplified_log)
3380 #endif
3381         SUPPLICANT_DBG("%s", path);
3382
3383         network = g_hash_table_lookup(interface->bss_mapping, path);
3384         if (network) {
3385                 bss = g_hash_table_lookup(network->bss_table, path);
3386                 if (bss)
3387                         return NULL;
3388         }
3389
3390         bss = g_try_new0(struct g_supplicant_bss, 1);
3391         if (!bss)
3392                 return NULL;
3393
3394         bss->interface = interface;
3395         bss->path = g_strdup(path);
3396         bss->signal = BSS_UNKNOWN_STRENGTH;
3397
3398         return bss;
3399 }
3400
3401 static void interface_bss_added_with_keys(DBusMessageIter *iter,
3402                                                 void *user_data)
3403 {
3404         struct g_supplicant_bss *bss;
3405 #if defined TIZEN_EXT
3406         if (!simplified_log)
3407 #endif
3408         SUPPLICANT_DBG("");
3409
3410         bss = interface_bss_added(iter, user_data);
3411         if (!bss)
3412                 return;
3413
3414         dbus_message_iter_next(iter);
3415
3416         if (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_INVALID)
3417 #if defined TIZEN_EXT
3418         {
3419                 g_free(bss->path);
3420                 g_free(bss);
3421                 return;
3422         }
3423 #else
3424                 return;
3425 #endif
3426
3427         supplicant_dbus_property_foreach(iter, bss_property, bss);
3428
3429         bss_compute_security(bss);
3430         if (add_or_replace_bss_to_network(bss) < 0)
3431                 SUPPLICANT_DBG("add_or_replace_bss_to_network failed");
3432 }
3433
3434 static void interface_bss_added_without_keys(DBusMessageIter *iter,
3435                                                 void *user_data)
3436 {
3437         struct g_supplicant_bss *bss;
3438 #if defined TIZEN_EXT
3439         if (!simplified_log)
3440 #endif
3441         SUPPLICANT_DBG("");
3442
3443         bss = interface_bss_added(iter, user_data);
3444         if (!bss)
3445                 return;
3446
3447         supplicant_dbus_property_get_all(bss->path,
3448                                         SUPPLICANT_INTERFACE ".BSS",
3449                                         bss_property, bss, bss);
3450
3451         bss_compute_security(bss);
3452         if (add_or_replace_bss_to_network(bss) < 0)
3453                         SUPPLICANT_DBG("add_or_replace_bss_to_network failed");
3454 }
3455
3456 static void update_signal(gpointer key, gpointer value,
3457                                                 gpointer user_data)
3458 {
3459         struct g_supplicant_bss *bss = value;
3460         GSupplicantNetwork *network = user_data;
3461
3462 #if defined TIZEN_EXT
3463         if (!network->best_bss || (network->best_bss == bss)) {
3464                 if (bss->signal > network->signal) {
3465                         network->signal = bss->signal;
3466                         network->best_bss = bss;
3467                 }
3468                 return;
3469         }
3470
3471         update_best_bss(network, bss, network->best_bss);
3472 #else
3473         if (bss->signal > network->signal) {
3474                 network->signal = bss->signal;
3475                 network->best_bss = bss;
3476         }
3477 #endif
3478 }
3479
3480 static void update_network_signal(GSupplicantNetwork *network)
3481 {
3482         if (g_hash_table_size(network->bss_table) <= 1 && network->best_bss)
3483                 return;
3484
3485         g_hash_table_foreach(network->bss_table,
3486                                 update_signal, network);
3487
3488         SUPPLICANT_DBG("New network signal %d", network->signal);
3489 }
3490
3491 #if defined TIZEN_EXT
3492 static gboolean last_connected_timeout(gpointer data)
3493 {
3494         GSupplicantInterface *interface = data;
3495         GSupplicantNetwork *current_network = interface->current_network;
3496
3497         SUPPLICANT_DBG("Timeout last connected bss");
3498
3499         if (current_network && current_network->best_bss) {
3500                 if (compare_bssid(current_network->best_bss->bssid, interface->connected_bssid)) {
3501                         g_supplicant_network_set_last_connected_bssid(current_network, interface->connected_bssid);
3502                         callback_network_changed(current_network, "LastConnectedBSSID");
3503                 }
3504         }
3505
3506         last_connected_bss_timeout = 0;
3507         return FALSE;
3508 }
3509
3510 static void add_timer_for_last_connected(GSupplicantInterface *interface)
3511 {
3512         GSupplicantNetwork *current_network = interface->current_network;
3513
3514         if (interface->state == G_SUPPLICANT_STATE_COMPLETED) {
3515                 if (current_network) {
3516                         struct g_supplicant_bss *best_bss = current_network->best_bss;
3517
3518                         memcpy(interface->connected_bssid, best_bss->bssid, WIFI_BSSID_LEN_MAX);
3519
3520                         if (last_connected_bss_timeout)
3521                                 g_source_remove(last_connected_bss_timeout);
3522
3523                         last_connected_bss_timeout = g_timeout_add_seconds(LAST_CONNECTED_TIMEOUT,
3524                                 last_connected_timeout, interface);
3525
3526                         SUPPLICANT_DBG("Add timer for last connected bssid [" MACSTR "]",
3527                                         MAC2STR(best_bss->bssid));
3528                 }
3529         }
3530 }
3531
3532 static void remove_timer_for_last_connected(GSupplicantInterface *interface)
3533 {
3534         if (interface->state == G_SUPPLICANT_STATE_DISCONNECTED) {
3535                 if (last_connected_bss_timeout != 0) {
3536                         g_source_remove(last_connected_bss_timeout);
3537                         last_connected_bss_timeout = 0;
3538                         SUPPLICANT_DBG("Remove timer for last connected bss");
3539                 }
3540         }
3541 }
3542 #endif
3543
3544 static void interface_current_bss(GSupplicantInterface *interface,
3545                                                 DBusMessageIter *iter)
3546 {
3547         GSupplicantNetwork *network;
3548         struct g_supplicant_bss *bss;
3549         const char *path;
3550
3551         dbus_message_iter_get_basic(iter, &path);
3552         if (g_strcmp0(path, "/") == 0) {
3553                 interface->current_network = NULL;
3554                 return;
3555         }
3556
3557         interface_bss_added_without_keys(iter, interface);
3558
3559         network = g_hash_table_lookup(interface->bss_mapping, path);
3560         if (!network)
3561                 return;
3562
3563         bss = g_hash_table_lookup(network->bss_table, path);
3564         if (!bss)
3565                 return;
3566
3567         interface->current_network = network;
3568 #if defined TIZEN_EXT
3569         SUPPLICANT_DBG("current network [%p]", interface->current_network);
3570 #endif
3571
3572         if (bss != network->best_bss) {
3573                 /*
3574                  * This is the case where either wpa_s got associated
3575                  * to a BSS different than the one ConnMan considers
3576                  * the best, or we are roaming.
3577                  */
3578                 SUPPLICANT_DBG("Update best BSS for %s", network->name);
3579
3580                 network->best_bss = bss;
3581
3582 #if defined TIZEN_EXT
3583                 if (network->frequency != bss->frequency)
3584                         network->frequency = bss->frequency;
3585 #endif
3586
3587                 if (network->signal != bss->signal) {
3588                         SUPPLICANT_DBG("New network signal %d dBm",
3589                                                 bss->signal);
3590
3591                         network->signal = bss->signal;
3592                         callback_network_changed(network, "Signal");
3593                 }
3594 #if defined TIZEN_EXT
3595                 else
3596                         callback_network_changed(network, "");
3597 #endif
3598         }
3599
3600         /*
3601          * wpa_s could notify about CurrentBSS in any state once
3602          * it got associated. It is not sure such notification will
3603          * arrive together with transition to ASSOCIATED state.
3604          * In fact, for networks with security WEP or OPEN, it
3605          * always arrives together with transition to COMPLETED.
3606          */
3607         switch (interface->state) {
3608         case G_SUPPLICANT_STATE_UNKNOWN:
3609         case G_SUPPLICANT_STATE_DISABLED:
3610         case G_SUPPLICANT_STATE_DISCONNECTED:
3611         case G_SUPPLICANT_STATE_INACTIVE:
3612         case G_SUPPLICANT_STATE_SCANNING:
3613         case G_SUPPLICANT_STATE_AUTHENTICATING:
3614         case G_SUPPLICANT_STATE_ASSOCIATING:
3615                 return;
3616         case G_SUPPLICANT_STATE_ASSOCIATED:
3617         case G_SUPPLICANT_STATE_4WAY_HANDSHAKE:
3618         case G_SUPPLICANT_STATE_GROUP_HANDSHAKE:
3619         case G_SUPPLICANT_STATE_COMPLETED:
3620                 callback_network_associated(network);
3621 #if defined TIZEN_EXT
3622                 add_timer_for_last_connected(interface);
3623 #endif
3624                 break;
3625         }
3626 }
3627
3628 static void interface_bss_removed(DBusMessageIter *iter, void *user_data)
3629 {
3630         GSupplicantInterface *interface = user_data;
3631         GSupplicantNetwork *network;
3632         struct g_supplicant_bss *bss = NULL;
3633         const char *path = NULL;
3634         bool is_current_network_bss = false;
3635
3636         dbus_message_iter_get_basic(iter, &path);
3637         if (!path)
3638                 return;
3639
3640         network = g_hash_table_lookup(interface->bss_mapping, path);
3641         if (!network)
3642                 return;
3643
3644         bss = g_hash_table_lookup(network->bss_table, path);
3645         if (network->best_bss == bss) {
3646                 network->best_bss = NULL;
3647                 network->signal = BSS_UNKNOWN_STRENGTH;
3648                 is_current_network_bss = true;
3649         }
3650
3651         g_hash_table_remove(bss_mapping, path);
3652
3653         g_hash_table_remove(interface->bss_mapping, path);
3654         g_hash_table_remove(network->bss_table, path);
3655
3656         update_network_signal(network);
3657
3658         if (g_hash_table_size(network->bss_table) == 0) {
3659                 g_hash_table_remove(interface->network_table, network->group);
3660         } else {
3661                 if (is_current_network_bss && network->best_bss)
3662 #if defined TIZEN_EXT
3663                         callback_network_changed(network, "CheckMultiBssidConnect");
3664 #else
3665                         callback_network_changed(network, "");
3666 #endif
3667         }
3668 }
3669
3670 static void set_config_methods(DBusMessageIter *iter, void *user_data)
3671 {
3672         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, user_data);
3673 }
3674
3675 static void wps_property(const char *key, DBusMessageIter *iter,
3676                                                         void *user_data)
3677 {
3678         GSupplicantInterface *interface = user_data;
3679
3680         if (!interface)
3681                 return;
3682 #if defined TIZEN_EXT
3683         if (!simplified_log)
3684 #endif
3685         SUPPLICANT_DBG("key: %s", key);
3686
3687         if (g_strcmp0(key, "ConfigMethods") == 0) {
3688                 const char *config_methods = "push_button", *str = NULL;
3689
3690                 dbus_message_iter_get_basic(iter, &str);
3691                 if (str && strlen(str) > 0) {
3692                         /* It was already set at wpa_s level, don't modify it. */
3693                         SUPPLICANT_DBG("%s", str);
3694                         return;
3695                 }
3696
3697                 supplicant_dbus_property_set(interface->path,
3698                         SUPPLICANT_INTERFACE ".Interface.WPS",
3699                         "ConfigMethods", DBUS_TYPE_STRING_AS_STRING,
3700                         set_config_methods, NULL, &config_methods, NULL);
3701
3702                 SUPPLICANT_DBG("No value. Set %s", config_methods);
3703         }
3704
3705 }
3706
3707 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
3708 void g_supplicant_replace_config_file(const char *ifname, const char *config_file)
3709 {
3710         if (!ifname)
3711                return;
3712
3713         if (!config_file)
3714                 return;
3715
3716         SUPPLICANT_DBG("New {%s, %s}", ifname, config_file);
3717         g_hash_table_replace(config_file_table,
3718                         g_strdup(ifname), g_strdup(config_file));
3719 }
3720 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
3721
3722 static void interface_property(const char *key, DBusMessageIter *iter,
3723                                                         void *user_data)
3724 {
3725         GSupplicantInterface *interface = user_data;
3726
3727         if (!interface)
3728                 return;
3729 #if defined TIZEN_EXT
3730         if (!simplified_log)
3731 #endif
3732         SUPPLICANT_DBG("%s", key);
3733
3734         if (!key) {
3735                 debug_strvalmap("KeyMgmt capability", keymgmt_map,
3736                                                 interface->keymgmt_capa);
3737                 debug_strvalmap("AuthAlg capability", authalg_capa_map,
3738                                                 interface->authalg_capa);
3739                 debug_strvalmap("Protocol capability", proto_capa_map,
3740                                                 interface->proto_capa);
3741                 debug_strvalmap("Pairwise capability", pairwise_map,
3742                                                 interface->pairwise_capa);
3743                 debug_strvalmap("Group capability", group_map,
3744                                                 interface->group_capa);
3745                 debug_strvalmap("Scan capability", scan_capa_map,
3746                                                 interface->scan_capa);
3747                 debug_strvalmap("Mode capability", mode_capa_map,
3748                                                 interface->mode_capa);
3749
3750                 supplicant_dbus_property_get_all(interface->path,
3751                                 SUPPLICANT_INTERFACE ".Interface.WPS",
3752                                 wps_property, interface, interface);
3753
3754                 if (interface->ready)
3755                         callback_interface_added(interface);
3756
3757                 return;
3758         }
3759
3760         if (g_strcmp0(key, "Capabilities") == 0) {
3761                 supplicant_dbus_property_foreach(iter, interface_capability,
3762                                                                 interface);
3763 #if !defined TIZEN_EXT
3764                 if (interface->mode_capa & G_SUPPLICANT_CAPABILITY_MODE_P2P)
3765                         interface->p2p_support = true;
3766 #endif
3767 #if defined TIZEN_EXT_WIFI_MESH
3768                 if (interface->mode_capa & G_SUPPLICANT_CAPABILITY_MODE_MESH)
3769                         interface->mesh_support = true;
3770 #endif
3771         } else if (g_strcmp0(key, "State") == 0) {
3772                 const char *str = NULL;
3773
3774                 dbus_message_iter_get_basic(iter, &str);
3775                 if (str)
3776                         if (string2state(str) != interface->state) {
3777                                 interface->state = string2state(str);
3778                                 callback_interface_state(interface);
3779                         }
3780 #if defined TIZEN_EXT
3781                 switch (interface->state) {
3782                 case G_SUPPLICANT_STATE_COMPLETED:
3783                         add_timer_for_last_connected(interface);
3784                         break;
3785                 case G_SUPPLICANT_STATE_DISCONNECTED:
3786                         remove_timer_for_last_connected(interface);
3787                         break;
3788                 default:
3789                         break;
3790                 }
3791 #endif
3792                 if (interface->ap_create_in_progress) {
3793                         if (interface->state == G_SUPPLICANT_STATE_DISCONNECTED)
3794                                 callback_ap_create_fail(interface);
3795
3796                         interface->ap_create_in_progress = false;
3797                 }
3798
3799                 if (interface->state == G_SUPPLICANT_STATE_DISABLED)
3800                         interface->ready = FALSE;
3801                 else
3802                         interface->ready = TRUE;
3803
3804                 SUPPLICANT_DBG("state %s (%d)", str, interface->state);
3805         } else if (g_strcmp0(key, "Scanning") == 0) {
3806                 dbus_bool_t scanning = FALSE;
3807
3808                 dbus_message_iter_get_basic(iter, &scanning);
3809                 interface->scanning = scanning;
3810
3811                 if (interface->ready) {
3812                         if (interface->scanning)
3813                                 callback_scan_started(interface);
3814                         else
3815                                 callback_scan_finished(interface);
3816                 }
3817         } else if (g_strcmp0(key, "ApScan") == 0) {
3818                 int apscan = 1;
3819
3820                 dbus_message_iter_get_basic(iter, &apscan);
3821                 interface->apscan = apscan;
3822         } else if (g_strcmp0(key, "Ifname") == 0) {
3823                 const char *str = NULL;
3824
3825                 dbus_message_iter_get_basic(iter, &str);
3826                 if (str) {
3827                         g_free(interface->ifname);
3828                         interface->ifname = g_strdup(str);
3829                 }
3830         } else if (g_strcmp0(key, "Driver") == 0) {
3831                 const char *str = NULL;
3832
3833                 dbus_message_iter_get_basic(iter, &str);
3834                 if (str) {
3835                         g_free(interface->driver);
3836                         interface->driver = g_strdup(str);
3837                 }
3838         } else if (g_strcmp0(key, "BridgeIfname") == 0) {
3839                 const char *str = NULL;
3840
3841                 dbus_message_iter_get_basic(iter, &str);
3842                 if (str) {
3843                         g_free(interface->bridge);
3844                         interface->bridge = g_strdup(str);
3845                 }
3846         } else if (g_strcmp0(key, "ConfigFile") == 0) {
3847                 const char *str = NULL;
3848
3849                 dbus_message_iter_get_basic(iter, &str);
3850                 if (str && strlen(str) > 0 && interface->ifname) {
3851                         SUPPLICANT_DBG("New {%s, %s}", interface->ifname, str);
3852                         g_hash_table_replace(config_file_table,
3853                                 g_strdup(interface->ifname), g_strdup(str));
3854                 }
3855         } else if (g_strcmp0(key, "CurrentBSS") == 0) {
3856                 interface_current_bss(interface, iter);
3857         } else if (g_strcmp0(key, "CurrentNetwork") == 0) {
3858 #if defined TIZEN_EXT
3859                 if (interface->state != G_SUPPLICANT_STATE_COMPLETED)
3860 #endif
3861                 interface_network_added(iter, interface);
3862         } else if (g_strcmp0(key, "BSSs") == 0) {
3863                 supplicant_dbus_array_foreach(iter,
3864                                         interface_bss_added_without_keys,
3865                                         interface);
3866         } else if (g_strcmp0(key, "Blobs") == 0) {
3867                 /* Nothing */
3868         } else if (g_strcmp0(key, "Networks") == 0) {
3869                 supplicant_dbus_array_foreach(iter, interface_network_added,
3870                                                                 interface);
3871         } else if (g_strcmp0(key, "DisconnectReason") == 0) {
3872                 int reason_code;
3873                 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
3874                         dbus_message_iter_get_basic(iter, &reason_code);
3875                         callback_disconnect_reason_code(interface, reason_code);
3876 #if defined TIZEN_EXT
3877                         SUPPLICANT_DBG("reason code (%d)", reason_code);
3878 #endif
3879                 }
3880         } else if (g_strcmp0(key, "AssocStatusCode") == 0) {
3881                 int status_code;
3882                 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
3883                         dbus_message_iter_get_basic(iter, &status_code);
3884                         callback_assoc_status_code(interface, status_code);
3885 #if defined TIZEN_EXT
3886                         SUPPLICANT_DBG("status code (%d)", status_code);
3887 #endif
3888                 }
3889         } else {
3890                 SUPPLICANT_DBG("key %s type %c",
3891                                 key, dbus_message_iter_get_arg_type(iter));
3892         }
3893 }
3894
3895 static void scan_network_update(DBusMessageIter *iter, void *user_data)
3896 {
3897         GSupplicantInterface *interface = user_data;
3898         GSupplicantNetwork *network;
3899         char *path;
3900
3901         if (!iter)
3902                 return;
3903
3904         dbus_message_iter_get_basic(iter, &path);
3905
3906         if (!path)
3907                 return;
3908
3909         if (g_strcmp0(path, "/") == 0)
3910                 return;
3911
3912         /* Update the network details based on scan BSS data */
3913         network = g_hash_table_lookup(interface->bss_mapping, path);
3914         if (network)
3915                 callback_network_added(network);
3916 }
3917
3918 static void scan_bss_data(const char *key, DBusMessageIter *iter,
3919                                 void *user_data)
3920 {
3921         GSupplicantInterface *interface = user_data;
3922
3923 /*Fixed : stucking in scanning state when scan failed*/
3924 #if defined TIZEN_EXT
3925         GSupplicantInterfaceCallback scan_callback;
3926         SUPPLICANT_DBG("");
3927 #endif
3928
3929         if (iter)
3930                 supplicant_dbus_array_foreach(iter, scan_network_update,
3931                                                 interface);
3932
3933 #if defined TIZEN_EXT
3934         scan_callback = interface->scan_callback;
3935         callback_scan_done(interface);
3936 #endif
3937
3938         if (interface->scan_callback)
3939                 interface->scan_callback(0, interface, interface->scan_data);
3940
3941 #if defined TIZEN_EXT
3942         if (interface->scan_callback == scan_callback) {
3943 #endif
3944         interface->scan_callback = NULL;
3945         interface->scan_data = NULL;
3946 #if defined TIZEN_EXT
3947         }
3948 #endif
3949 }
3950
3951 static GSupplicantInterface *interface_alloc(const char *path)
3952 {
3953         GSupplicantInterface *interface;
3954
3955         interface = g_try_new0(GSupplicantInterface, 1);
3956         if (!interface)
3957                 return NULL;
3958
3959         interface->path = g_strdup(path);
3960
3961         interface->network_table = g_hash_table_new_full(g_str_hash,
3962                                         g_str_equal, NULL, remove_network);
3963         interface->peer_table = g_hash_table_new_full(g_str_hash,
3964                                         g_str_equal, NULL, remove_peer);
3965         interface->group_table = g_hash_table_new_full(g_str_hash,
3966                                         g_str_equal, NULL, remove_group);
3967         interface->bss_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
3968                                                                 NULL, NULL);
3969
3970         g_hash_table_replace(interface_table, interface->path, interface);
3971
3972         return interface;
3973 }
3974
3975 static void interface_added(DBusMessageIter *iter, void *user_data)
3976 {
3977         GSupplicantInterface *interface;
3978         const char *path = NULL;
3979         bool properties_appended = GPOINTER_TO_UINT(user_data);
3980
3981         SUPPLICANT_DBG("");
3982
3983         dbus_message_iter_get_basic(iter, &path);
3984         if (!path)
3985                 return;
3986
3987         if (g_strcmp0(path, "/") == 0)
3988                 return;
3989
3990         interface = g_hash_table_lookup(interface_table, path);
3991         if (interface)
3992                 return;
3993
3994         interface = interface_alloc(path);
3995         if (!interface)
3996                 return;
3997
3998         if (!properties_appended) {
3999                 supplicant_dbus_property_get_all(path,
4000                                                 SUPPLICANT_INTERFACE ".Interface",
4001                                                 interface_property, interface,
4002                                                 interface);
4003                 return;
4004         }
4005
4006         dbus_message_iter_next(iter);
4007         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
4008                 supplicant_dbus_property_foreach(iter, interface_property,
4009                                                                 interface);
4010                 interface_property(NULL, NULL, interface);
4011         }
4012 }
4013
4014 static void interface_removed(DBusMessageIter *iter, void *user_data)
4015 {
4016         const char *path = NULL;
4017         GSupplicantInterface *interface = user_data;
4018
4019         dbus_message_iter_get_basic(iter, &path);
4020         if (!path)
4021                 return;
4022
4023         interface = g_hash_table_lookup(interface_table, path);
4024         g_supplicant_interface_cancel(interface);
4025
4026         g_hash_table_remove(interface_table, path);
4027 }
4028
4029 static void eap_method(DBusMessageIter *iter, void *user_data)
4030 {
4031         const char *str = NULL;
4032         int i;
4033
4034         dbus_message_iter_get_basic(iter, &str);
4035         if (!str)
4036                 return;
4037
4038         for (i = 0; eap_method_map[i].str; i++)
4039                 if (strcmp(str, eap_method_map[i].str) == 0) {
4040                         eap_methods |= eap_method_map[i].val;
4041                         break;
4042                 }
4043 }
4044
4045 static void service_property(const char *key, DBusMessageIter *iter,
4046                                                         void *user_data)
4047 {
4048         if (!key) {
4049                 callback_system_ready();
4050                 return;
4051         }
4052
4053         if (g_strcmp0(key, "DebugLevel") == 0) {
4054                 const char *str = NULL;
4055                 int i;
4056
4057                 dbus_message_iter_get_basic(iter, &str);
4058                 for (i = 0; debug_strings[i]; i++)
4059                         if (g_strcmp0(debug_strings[i], str) == 0) {
4060                                 debug_level = i;
4061                                 break;
4062                         }
4063                 SUPPLICANT_DBG("Debug level %d", debug_level);
4064         } else if (g_strcmp0(key, "DebugTimestamp") == 0) {
4065                 dbus_message_iter_get_basic(iter, &debug_timestamp);
4066                 SUPPLICANT_DBG("Debug timestamp %u", debug_timestamp);
4067         } else if (g_strcmp0(key, "DebugShowKeys") == 0) {
4068                 dbus_message_iter_get_basic(iter, &debug_showkeys);
4069                 SUPPLICANT_DBG("Debug show keys %u", debug_showkeys);
4070         } else if (g_strcmp0(key, "Interfaces") == 0) {
4071                 supplicant_dbus_array_foreach(iter, interface_added, NULL);
4072         } else if (g_strcmp0(key, "EapMethods") == 0) {
4073                 supplicant_dbus_array_foreach(iter, eap_method, NULL);
4074                 debug_strvalmap("EAP method", eap_method_map, eap_methods);
4075         } else if (g_strcmp0(key, "Country") == 0) {
4076                 const char *country = NULL;
4077
4078                 dbus_message_iter_get_basic(iter, &country);
4079                 SUPPLICANT_DBG("Country %s", country);
4080         } else
4081                 SUPPLICANT_DBG("key %s type %c",
4082                                 key, dbus_message_iter_get_arg_type(iter));
4083 }
4084
4085 static void signal_name_owner_changed(const char *path, DBusMessageIter *iter)
4086 {
4087         const char *name = NULL, *old = NULL, *new = NULL;
4088
4089         SUPPLICANT_DBG("");
4090
4091         if (g_strcmp0(path, DBUS_PATH_DBUS) != 0)
4092                 return;
4093
4094         dbus_message_iter_get_basic(iter, &name);
4095         if (!name)
4096                 return;
4097
4098         if (g_strcmp0(name, SUPPLICANT_SERVICE) != 0)
4099                 return;
4100
4101         dbus_message_iter_next(iter);
4102         dbus_message_iter_get_basic(iter, &old);
4103         dbus_message_iter_next(iter);
4104         dbus_message_iter_get_basic(iter, &new);
4105
4106         if (!old || !new)
4107                 return;
4108
4109         if (strlen(old) > 0 && strlen(new) == 0) {
4110                 system_available = FALSE;
4111                 g_hash_table_remove_all(bss_mapping);
4112                 g_hash_table_remove_all(peer_mapping);
4113                 g_hash_table_remove_all(group_mapping);
4114                 g_hash_table_remove_all(config_file_table);
4115                 g_hash_table_remove_all(interface_table);
4116                 callback_system_killed();
4117         }
4118
4119         if (strlen(new) > 0 && strlen(old) == 0) {
4120                 system_available = TRUE;
4121                 supplicant_dbus_property_get_all(SUPPLICANT_PATH,
4122                                                 SUPPLICANT_INTERFACE,
4123                                                 service_property, NULL, NULL);
4124         }
4125 }
4126
4127 static void signal_properties_changed(const char *path, DBusMessageIter *iter)
4128 {
4129         SUPPLICANT_DBG("");
4130
4131         if (g_strcmp0(path, SUPPLICANT_PATH) != 0)
4132                 return;
4133
4134         supplicant_dbus_property_foreach(iter, service_property, NULL);
4135 }
4136
4137 static void signal_interface_added(const char *path, DBusMessageIter *iter)
4138 {
4139         SUPPLICANT_DBG("path %s %s", path, SUPPLICANT_PATH);
4140
4141         if (g_strcmp0(path, SUPPLICANT_PATH) == 0)
4142                 interface_added(iter, GUINT_TO_POINTER(true));
4143 }
4144
4145 static void signal_interface_removed(const char *path, DBusMessageIter *iter)
4146 {
4147         SUPPLICANT_DBG("");
4148
4149         if (g_strcmp0(path, SUPPLICANT_PATH) == 0)
4150                 interface_removed(iter, NULL);
4151 }
4152
4153 static void signal_interface_changed(const char *path, DBusMessageIter *iter)
4154 {
4155         GSupplicantInterface *interface;
4156 #if defined TIZEN_EXT
4157         if (!simplified_log)
4158 #endif
4159         SUPPLICANT_DBG("");
4160
4161         interface = g_hash_table_lookup(interface_table, path);
4162         if (!interface)
4163                 return;
4164
4165         supplicant_dbus_property_foreach(iter, interface_property, interface);
4166 }
4167
4168 static void signal_scan_done(const char *path, DBusMessageIter *iter)
4169 {
4170         GSupplicantInterface *interface;
4171         dbus_bool_t success = FALSE;
4172
4173         SUPPLICANT_DBG("");
4174
4175         interface = g_hash_table_lookup(interface_table, path);
4176         if (!interface)
4177                 return;
4178
4179         dbus_message_iter_get_basic(iter, &success);
4180
4181         if (interface->scanning) {
4182                 callback_scan_finished(interface);
4183                 interface->scanning = FALSE;
4184         }
4185
4186         /*
4187          * If scan is unsuccessful return -EIO else get the scanned BSSs
4188          * and update the network details accordingly
4189          */
4190         if (!success) {
4191                 if (interface->scan_callback)
4192                         interface->scan_callback(-EIO, interface,
4193                                                 interface->scan_data);
4194
4195                 interface->scan_callback = NULL;
4196                 interface->scan_data = NULL;
4197
4198                 return;
4199         }
4200
4201         supplicant_dbus_property_get(path, SUPPLICANT_INTERFACE ".Interface",
4202                                 "BSSs", scan_bss_data, interface, interface);
4203 }
4204
4205 static void signal_bss_added(const char *path, DBusMessageIter *iter)
4206 {
4207         GSupplicantInterface *interface;
4208 #if defined TIZEN_EXT
4209         if (!simplified_log)
4210 #endif
4211         SUPPLICANT_DBG("");
4212
4213         interface = g_hash_table_lookup(interface_table, path);
4214         if (!interface)
4215                 return;
4216
4217         interface_bss_added_with_keys(iter, interface);
4218 }
4219
4220 static void signal_bss_removed(const char *path, DBusMessageIter *iter)
4221 {
4222         GSupplicantInterface *interface;
4223
4224         SUPPLICANT_DBG("");
4225
4226         interface = g_hash_table_lookup(interface_table, path);
4227         if (!interface)
4228                 return;
4229
4230         interface_bss_removed(iter, interface);
4231 }
4232
4233 static void signal_network_added(const char *path, DBusMessageIter *iter)
4234 {
4235         GSupplicantInterface *interface;
4236
4237         SUPPLICANT_DBG("");
4238
4239         interface = g_hash_table_lookup(interface_table, path);
4240         if (!interface)
4241                 return;
4242
4243         interface_network_added(iter, interface);
4244 }
4245
4246 static void signal_network_removed(const char *path, DBusMessageIter *iter)
4247 {
4248         GSupplicantInterface *interface;
4249
4250         SUPPLICANT_DBG("");
4251
4252         interface = g_hash_table_lookup(interface_table, path);
4253         if (!interface)
4254                 return;
4255
4256         interface_network_removed(iter, interface);
4257 }
4258 #if defined TIZEN_EXT
4259 void *copy_vsie_list(gconstpointer src, gpointer data)
4260 {
4261         return g_strdup(src);
4262 }
4263 #endif
4264
4265
4266 static void signal_sta_authorized(const char *path, DBusMessageIter *iter)
4267 {
4268         GSupplicantInterface *interface;
4269         const char *addr = NULL;
4270
4271         SUPPLICANT_DBG("");
4272
4273         interface = g_hash_table_lookup(interface_table, path);
4274         if (!interface)
4275                 return;
4276
4277         dbus_message_iter_get_basic(iter, &addr);
4278         if (!addr)
4279                 return;
4280
4281         callback_sta_authorized(interface, addr);
4282 }
4283
4284 static void signal_sta_deauthorized(const char *path, DBusMessageIter *iter)
4285 {
4286         GSupplicantInterface *interface;
4287         const char *addr = NULL;
4288
4289         SUPPLICANT_DBG("");
4290
4291         interface = g_hash_table_lookup(interface_table, path);
4292         if (!interface)
4293                 return;
4294
4295         dbus_message_iter_get_basic(iter, &addr);
4296         if (!addr)
4297                 return;
4298
4299         callback_sta_deauthorized(interface, addr);
4300 }
4301
4302 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
4303 static void signal_eap(const char *path, DBusMessageIter *iter)
4304 {
4305         GSupplicantInterface *interface;
4306         const char *str = NULL;
4307
4308         SUPPLICANT_DBG("EAPOL_DEBUG callback eap signal");
4309
4310         interface = g_hash_table_lookup(interface_table, path);
4311         if (!interface)
4312                 return;
4313
4314         // TODO: Identify EAP fail condition, currently timeout is used for failure.
4315
4316         dbus_message_iter_get_basic(iter, &str);
4317         if (!str)
4318                 return;
4319
4320         if (g_strcmp0("completion", str))
4321                 return;
4322
4323         dbus_message_iter_next(iter);
4324
4325         dbus_message_iter_get_basic(iter, &str);
4326         if (!str)
4327                 return;
4328
4329         if (!g_strcmp0("success", str))
4330                 callback_eap(interface, true);
4331         else
4332                 callback_eap(interface, false);
4333 }
4334 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
4335
4336 static void signal_bss_changed(const char *path, DBusMessageIter *iter)
4337 {
4338         GSupplicantInterface *interface;
4339         GSupplicantNetwork *network;
4340         GSupplicantSecurity old_security;
4341         unsigned int old_wps_capabilities;
4342         struct g_supplicant_bss *bss;
4343
4344 #if defined TIZEN_EXT
4345         if (!simplified_log)
4346 #endif
4347         SUPPLICANT_DBG("");
4348
4349         interface = g_hash_table_lookup(bss_mapping, path);
4350         if (!interface)
4351                 return;
4352
4353         network = g_hash_table_lookup(interface->bss_mapping, path);
4354         if (!network)
4355                 return;
4356
4357         bss = g_hash_table_lookup(network->bss_table, path);
4358         if (!bss)
4359                 return;
4360
4361         supplicant_dbus_property_foreach(iter, bss_property, bss);
4362
4363 #if defined TIZEN_EXT
4364         if (network->interface->state != G_SUPPLICANT_STATE_COMPLETED) {
4365                 network->frequency = bss->frequency;
4366                 network->phy_mode = bss->phy_mode;
4367         }
4368 #endif
4369         old_security = network->security;
4370         bss_compute_security(bss);
4371
4372         if (old_security != bss->security) {
4373                 struct g_supplicant_bss *new_bss;
4374
4375                 SUPPLICANT_DBG("New network security for %s with path %s",
4376                                bss->ssid, bss->path);
4377
4378                 /*
4379                  * Security change policy:
4380                  * - We first copy the current bss into a new one with
4381                  *   its own pointer (path)
4382                  * - Clear the old bss pointer and remove the network completely
4383                  *   if there are no more BSSs in the bss table.
4384                  * - The new bss will be added either to an existing network
4385                  *   or an additional network will be created
4386                  */
4387
4388                 new_bss = g_try_new0(struct g_supplicant_bss, 1);
4389                 if (!new_bss)
4390                         return;
4391
4392                 memcpy(new_bss, bss, sizeof(struct g_supplicant_bss));
4393                 new_bss->path = g_strdup(bss->path);
4394 #if defined TIZEN_EXT
4395                 new_bss->vsie_list = g_slist_copy_deep(bss->vsie_list, copy_vsie_list, NULL);
4396 #endif
4397
4398                 if (network->best_bss == bss) {
4399                         network->best_bss = NULL;
4400                         network->signal = BSS_UNKNOWN_STRENGTH;
4401                 }
4402
4403                 g_hash_table_remove(bss_mapping, path);
4404
4405                 g_hash_table_remove(interface->bss_mapping, path);
4406                 g_hash_table_remove(network->bss_table, path);
4407
4408                 update_network_signal(network);
4409
4410                 if (g_hash_table_size(network->bss_table) == 0)
4411                         g_hash_table_remove(interface->network_table,
4412                                             network->group);
4413
4414                 if (add_or_replace_bss_to_network(new_bss) < 0) {
4415                         /*
4416                          * Prevent a memory leak on failure in
4417                          * add_or_replace_bss_to_network
4418                          */
4419                         SUPPLICANT_DBG("Failed to add bss %s to network table",
4420                                        new_bss->path);
4421                         g_free(new_bss->path);
4422                         g_free(new_bss);
4423                 }
4424
4425                 return;
4426         }
4427
4428         old_wps_capabilities = network->wps_capabilities;
4429
4430         if (old_wps_capabilities != bss->wps_capabilities) {
4431                 network->wps_capabilities = bss->wps_capabilities;
4432                 callback_network_changed(network, "WPSCapabilities");
4433         }
4434
4435 #if defined TIZEN_EXT
4436         if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
4437                 network->wps = TRUE;
4438                 network->wps_capabilities |= bss->wps_capabilities;
4439         } else
4440                 network->wps = FALSE;
4441 #endif
4442
4443         /* Consider only property changes of the connected BSS */
4444         if (network == interface->current_network && bss != network->best_bss)
4445                 return;
4446
4447         if (bss->signal == network->signal)
4448 #ifndef TIZEN_EXT
4449                 return;
4450 #else
4451         {
4452                 callback_network_changed(network, "");
4453                 return;
4454         }
4455 #endif
4456
4457         /*
4458          * If the new signal is lower than the SSID signal, we need
4459          * to check for the new maximum.
4460          */
4461 #if defined TIZEN_EXT
4462         if (!update_best_bss(network, bss, network->best_bss)) {
4463                 if (bss != network->best_bss) {
4464                         callback_network_changed(network, "");
4465                         return;
4466                 }
4467
4468                 network->signal = bss->signal;
4469                 update_network_signal(network);
4470         }
4471 #else
4472         if (bss->signal < network->signal) {
4473                 if (bss != network->best_bss)
4474                         return;
4475
4476                 network->signal = bss->signal;
4477                 update_network_signal(network);
4478         } else {
4479                 network->signal = bss->signal;
4480                 network->best_bss = bss;
4481         }
4482 #endif
4483
4484         SUPPLICANT_DBG("New network signal for %s %d dBm", network->ssid,
4485                         network->signal);
4486
4487         callback_network_changed(network, "Signal");
4488 }
4489
4490 static void wps_credentials(const char *key, DBusMessageIter *iter,
4491                         void *user_data)
4492 {
4493         GSupplicantInterface *interface = user_data;
4494
4495         if (!key)
4496                 return;
4497
4498         SUPPLICANT_DBG("key %s", key);
4499
4500         if (g_strcmp0(key, "Key") == 0) {
4501                 DBusMessageIter array;
4502                 unsigned char *key_val;
4503                 int key_len;
4504
4505                 dbus_message_iter_recurse(iter, &array);
4506                 dbus_message_iter_get_fixed_array(&array, &key_val, &key_len);
4507
4508                 g_free(interface->wps_cred.key);
4509                 interface->wps_cred.key = g_try_malloc0(
4510                                                 sizeof(char) * key_len + 1);
4511
4512                 if (!interface->wps_cred.key)
4513                         return;
4514
4515                 memcpy(interface->wps_cred.key, key_val,
4516                                                 sizeof(char) * key_len);
4517
4518                 SUPPLICANT_DBG("WPS key present");
4519         } else if (g_strcmp0(key, "SSID") == 0) {
4520                 DBusMessageIter array;
4521                 unsigned char *ssid;
4522                 int ssid_len;
4523
4524                 dbus_message_iter_recurse(iter, &array);
4525                 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
4526
4527                 if (ssid_len > 0 && ssid_len < 33) {
4528                         memcpy(interface->wps_cred.ssid, ssid, ssid_len);
4529                         interface->wps_cred.ssid_len = ssid_len;
4530                 } else {
4531                         memset(interface->wps_cred.ssid, 0, 32);
4532                         interface->wps_cred.ssid_len = 0;
4533                 }
4534         }
4535 }
4536
4537 static void signal_wps_credentials(const char *path, DBusMessageIter *iter)
4538 {
4539         GSupplicantInterface *interface;
4540
4541         SUPPLICANT_DBG("");
4542
4543         interface = g_hash_table_lookup(interface_table, path);
4544         if (!interface)
4545                 return;
4546
4547         supplicant_dbus_property_foreach(iter, wps_credentials, interface);
4548 }
4549
4550 static void wps_event_args(const char *key, DBusMessageIter *iter,
4551                         void *user_data)
4552 {
4553         GSupplicantInterface *interface = user_data;
4554
4555         if (!key || !interface)
4556                 return;
4557
4558         SUPPLICANT_DBG("Arg Key %s", key);
4559 }
4560
4561 static void signal_wps_event(const char *path, DBusMessageIter *iter)
4562 {
4563         GSupplicantInterface *interface;
4564         const char *name = NULL;
4565
4566         SUPPLICANT_DBG("");
4567
4568         interface = g_hash_table_lookup(interface_table, path);
4569         if (!interface)
4570                 return;
4571
4572         dbus_message_iter_get_basic(iter, &name);
4573
4574         SUPPLICANT_DBG("Name: %s", name);
4575
4576         if (g_strcmp0(name, "success") == 0)
4577                 interface->wps_state = G_SUPPLICANT_WPS_STATE_SUCCESS;
4578         else if (g_strcmp0(name, "fail") == 0)
4579                 interface->wps_state = G_SUPPLICANT_WPS_STATE_FAIL;
4580         else
4581                 interface->wps_state = G_SUPPLICANT_WPS_STATE_UNKNOWN;
4582
4583         if (!dbus_message_iter_has_next(iter))
4584                 return;
4585
4586         dbus_message_iter_next(iter);
4587
4588         supplicant_dbus_property_foreach(iter, wps_event_args, interface);
4589 }
4590
4591 #if defined TIZEN_EXT
4592 static void signal_power_off(const char *path, DBusMessageIter *iter)
4593 {
4594         int poweroff_state = 0;
4595
4596         dbus_message_iter_get_basic(iter, &poweroff_state);
4597
4598         SUPPLICANT_DBG("poweroff_state(%d)", poweroff_state);
4599
4600         /* POWER_OFF_DIRECT 2 && POWER_OFF_RESTART 3 */
4601         if (poweroff_state != 2 && poweroff_state != 3)
4602                 return;
4603
4604         if (callbacks_pointer == NULL)
4605                 return;
4606
4607         if (callbacks_pointer->system_power_off == NULL)
4608                 return;
4609
4610         callbacks_pointer->system_power_off();
4611 }
4612 #endif
4613
4614 static void create_peer_identifier(GSupplicantPeer *peer)
4615 {
4616         const unsigned char test[ETH_ALEN] = {};
4617
4618         if (!peer)
4619                 return;
4620
4621         if (!memcmp(peer->device_address, test, ETH_ALEN)) {
4622                 peer->identifier = g_strdup(peer->name);
4623                 return;
4624         }
4625
4626         peer->identifier = g_malloc0(19);
4627         snprintf(peer->identifier, 19, "%02x%02x%02x%02x%02x%02x",
4628                                                 peer->device_address[0],
4629                                                 peer->device_address[1],
4630                                                 peer->device_address[2],
4631                                                 peer->device_address[3],
4632                                                 peer->device_address[4],
4633                                                 peer->device_address[5]);
4634 }
4635
4636 struct peer_property_data {
4637         GSupplicantPeer *peer;
4638         GSList *old_groups;
4639         bool groups_changed;
4640         bool services_changed;
4641 };
4642
4643 static void peer_groups_relation(DBusMessageIter *iter, void *user_data)
4644 {
4645         struct peer_property_data *data = user_data;
4646         GSupplicantPeer *peer = data->peer;
4647         GSupplicantGroup *group;
4648         const char *str = NULL;
4649         GSList *elem;
4650
4651         dbus_message_iter_get_basic(iter, &str);
4652         if (!str)
4653                 return;
4654
4655         group = g_hash_table_lookup(group_mapping, str);
4656         if (!group)
4657                 return;
4658
4659         elem = g_slist_find_custom(data->old_groups, str, (GCompareFunc)g_strcmp0);
4660         if (elem) {
4661                 data->old_groups = g_slist_remove_link(data->old_groups, elem);
4662                 peer->groups = g_slist_concat(elem, peer->groups);
4663         } else {
4664                 peer->groups = g_slist_prepend(peer->groups, g_strdup(str));
4665                 data->groups_changed = true;
4666         }
4667 }
4668
4669 static void peer_property(const char *key, DBusMessageIter *iter,
4670                                                         void *user_data)
4671 {
4672         GSupplicantPeer *pending_peer;
4673         struct peer_property_data *data = user_data;
4674         GSupplicantPeer *peer = data->peer;
4675
4676         SUPPLICANT_DBG("key: %s", key);
4677
4678         if (!peer->interface)
4679                 return;
4680
4681         if (!key) {
4682                 if (peer->name) {
4683                         create_peer_identifier(peer);
4684                         callback_peer_found(peer);
4685                         pending_peer = g_hash_table_lookup(
4686                                         pending_peer_connection, peer->path);
4687
4688                         if (pending_peer && pending_peer == peer) {
4689                                 callback_peer_request(peer);
4690                                 g_hash_table_remove(pending_peer_connection,
4691                                                 peer->path);
4692                         }
4693
4694                         dbus_free(data);
4695                 }
4696
4697                 return;
4698         }
4699
4700         if (g_strcmp0(key, "DeviceAddress") == 0) {
4701                 unsigned char *dev_addr;
4702                 DBusMessageIter array;
4703                 int len;
4704
4705                 dbus_message_iter_recurse(iter, &array);
4706                 dbus_message_iter_get_fixed_array(&array, &dev_addr, &len);
4707
4708                 if (len == ETH_ALEN)
4709                         memcpy(peer->device_address, dev_addr, len);
4710         } else if (g_strcmp0(key, "DeviceName") == 0) {
4711                 const char *str = NULL;
4712
4713                 dbus_message_iter_get_basic(iter, &str);
4714                 if (str)
4715                         peer->name = g_strdup(str);
4716         } else if (g_strcmp0(key, "config_method") == 0) {
4717                 uint16_t wps_config;
4718
4719                 dbus_message_iter_get_basic(iter, &wps_config);
4720
4721                 if (wps_config & G_SUPPLICANT_WPS_CONFIG_PBC)
4722                         peer->wps_capabilities |= G_SUPPLICANT_WPS_PBC;
4723                 if (wps_config & ~G_SUPPLICANT_WPS_CONFIG_PBC)
4724                         peer->wps_capabilities |= G_SUPPLICANT_WPS_PIN;
4725         } else if (g_strcmp0(key, "Groups") == 0) {
4726                 data->old_groups = peer->groups;
4727                 peer->groups = NULL;
4728
4729                 supplicant_dbus_array_foreach(iter,
4730                                                 peer_groups_relation, data);
4731                 if (g_slist_length(data->old_groups) > 0) {
4732                         g_slist_free_full(data->old_groups, g_free);
4733                         data->groups_changed = true;
4734                 }
4735         } else if (g_strcmp0(key, "IEs") == 0) {
4736                 DBusMessageIter array;
4737                 unsigned char *ie;
4738                 int ie_len;
4739
4740                 dbus_message_iter_recurse(iter, &array);
4741                 dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
4742
4743                 if (!ie || ie_len < 2)
4744                         return;
4745
4746                 if (peer->widi_ies) {
4747                         if (memcmp(peer->widi_ies, ie, ie_len) == 0)
4748                                 return;
4749
4750                         g_free(peer->widi_ies);
4751                         peer->widi_ies_length = 0;
4752                 }
4753
4754                 peer->widi_ies = g_malloc0(ie_len * sizeof(unsigned char));
4755
4756                 memcpy(peer->widi_ies, ie, ie_len);
4757                 peer->widi_ies_length = ie_len;
4758                 data->services_changed = true;
4759         }
4760 }
4761
4762 static void signal_peer_found(const char *path, DBusMessageIter *iter)
4763 {
4764         struct peer_property_data *property_data;
4765         GSupplicantInterface *interface;
4766         const char *obj_path = NULL;
4767         GSupplicantPeer *peer;
4768
4769         SUPPLICANT_DBG("");
4770
4771         interface = g_hash_table_lookup(interface_table, path);
4772         if (!interface)
4773                 return;
4774
4775         dbus_message_iter_get_basic(iter, &obj_path);
4776         if (!obj_path || g_strcmp0(obj_path, "/") == 0)
4777                 return;
4778
4779         peer = g_hash_table_lookup(interface->peer_table, obj_path);
4780         if (peer)
4781                 return;
4782
4783         peer = g_try_new0(GSupplicantPeer, 1);
4784         if (!peer)
4785                 return;
4786
4787         peer->interface = interface;
4788         peer->path = g_strdup(obj_path);
4789         g_hash_table_insert(interface->peer_table, peer->path, peer);
4790         g_hash_table_replace(peer_mapping, peer->path, interface);
4791
4792         property_data = dbus_malloc0(sizeof(struct peer_property_data));
4793         property_data->peer = peer;
4794
4795         dbus_message_iter_next(iter);
4796         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
4797                 supplicant_dbus_property_foreach(iter, peer_property,
4798                                                         property_data);
4799                 peer_property(NULL, NULL, property_data);
4800                 return;
4801         }
4802
4803         supplicant_dbus_property_get_all(obj_path,
4804                                         SUPPLICANT_INTERFACE ".Peer",
4805                                         peer_property, property_data, NULL);
4806 }
4807
4808 static void signal_peer_lost(const char *path, DBusMessageIter *iter)
4809 {
4810         GSupplicantInterface *interface;
4811         const char *obj_path = NULL;
4812         GSupplicantPeer *peer;
4813
4814         SUPPLICANT_DBG("");
4815
4816         interface = g_hash_table_lookup(interface_table, path);
4817         if (!interface)
4818                 return;
4819
4820         dbus_message_iter_get_basic(iter, &obj_path);
4821         if (!obj_path || g_strcmp0(obj_path, "/") == 0)
4822                 return;
4823
4824         peer = g_hash_table_lookup(interface->peer_table, obj_path);
4825         if (!peer)
4826                 return;
4827
4828         g_hash_table_remove(interface->peer_table, obj_path);
4829 }
4830
4831 static void signal_peer_changed(const char *path, DBusMessageIter *iter)
4832 {
4833         struct peer_property_data *property_data;
4834         GSupplicantInterface *interface;
4835         GSupplicantPeer *peer;
4836
4837         SUPPLICANT_DBG("");
4838
4839         interface = g_hash_table_lookup(peer_mapping, path);
4840         if (!interface)
4841                 return;
4842
4843         peer = g_hash_table_lookup(interface->peer_table, path);
4844         if (!peer) {
4845                 g_hash_table_remove(peer_mapping, path);
4846                 return;
4847         }
4848
4849         property_data = dbus_malloc0(sizeof(struct peer_property_data));
4850         property_data->peer = peer;
4851
4852         supplicant_dbus_property_foreach(iter, peer_property, property_data);
4853         if (property_data->services_changed)
4854                 callback_peer_changed(peer,
4855                                         G_SUPPLICANT_PEER_SERVICES_CHANGED);
4856
4857         if (property_data->groups_changed)
4858                 callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_CHANGED);
4859
4860         dbus_free(property_data);
4861
4862         if (!g_supplicant_peer_is_in_a_group(peer))
4863                 peer->connection_requested = false;
4864 }
4865
4866 struct group_sig_data {
4867         const char *peer_obj_path;
4868         unsigned char iface_address[ETH_ALEN];
4869         const char *interface_obj_path;
4870         const char *group_obj_path;
4871         int role;
4872 };
4873
4874 static void group_sig_property(const char *key, DBusMessageIter *iter,
4875                                                         void *user_data)
4876 {
4877         struct group_sig_data *data = user_data;
4878
4879         if (!key)
4880                 return;
4881
4882         if (g_strcmp0(key, "peer_interface_addr") == 0) {
4883                 unsigned char *dev_addr;
4884                 DBusMessageIter array;
4885                 int len;
4886
4887                 dbus_message_iter_recurse(iter, &array);
4888                 dbus_message_iter_get_fixed_array(&array, &dev_addr, &len);
4889
4890                 if (len == ETH_ALEN)
4891                         memcpy(data->iface_address, dev_addr, len);
4892         } else if (g_strcmp0(key, "role") == 0) {
4893                 const char *str = NULL;
4894
4895                 dbus_message_iter_get_basic(iter, &str);
4896                 if (g_strcmp0(str, "GO") == 0)
4897                         data->role = G_SUPPLICANT_GROUP_ROLE_GO;
4898                 else
4899                         data->role = G_SUPPLICANT_GROUP_ROLE_CLIENT;
4900         } else if (g_strcmp0(key, "peer_object") == 0)
4901                 dbus_message_iter_get_basic(iter, &data->peer_obj_path);
4902         else if (g_strcmp0(key, "interface_object") == 0)
4903                 dbus_message_iter_get_basic(iter, &data->interface_obj_path);
4904         else if (g_strcmp0(key, "group_object") == 0)
4905                 dbus_message_iter_get_basic(iter, &data->group_obj_path);
4906
4907 }
4908
4909 static void signal_group_success(const char *path, DBusMessageIter *iter)
4910 {
4911         GSupplicantInterface *interface;
4912         struct group_sig_data data = {};
4913         GSupplicantPeer *peer;
4914
4915         SUPPLICANT_DBG("");
4916
4917         interface = g_hash_table_lookup(interface_table, path);
4918         if (!interface)
4919                 return;
4920
4921         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
4922         if (!data.peer_obj_path)
4923                 return;
4924
4925         peer = g_hash_table_lookup(interface->peer_table, data.peer_obj_path);
4926         if (!peer)
4927                 return;
4928
4929         memcpy(peer->iface_address, data.iface_address, ETH_ALEN);
4930         interface->pending_peer_path = peer->path;
4931 }
4932
4933 static void signal_group_failure(const char *path, DBusMessageIter *iter)
4934 {
4935         GSupplicantInterface *interface;
4936         struct group_sig_data data = {};
4937         GSupplicantPeer *peer;
4938
4939         SUPPLICANT_DBG("");
4940
4941         interface = g_hash_table_lookup(interface_table, path);
4942         if (!interface)
4943                 return;
4944
4945         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
4946         if (!data.peer_obj_path)
4947                 return;
4948
4949         peer = g_hash_table_lookup(interface->peer_table, data.peer_obj_path);
4950         if (!peer)
4951                 return;
4952
4953         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_FAILED);
4954         peer->connection_requested = false;
4955 }
4956
4957 static void signal_group_started(const char *path, DBusMessageIter *iter)
4958 {
4959         GSupplicantInterface *interface, *g_interface;
4960         struct group_sig_data data = {};
4961         GSupplicantGroup *group;
4962         GSupplicantPeer *peer;
4963
4964         SUPPLICANT_DBG("");
4965
4966         interface = g_hash_table_lookup(interface_table, path);
4967         if (!interface)
4968                 return;
4969
4970         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
4971         if (!data.interface_obj_path || !data.group_obj_path)
4972                 return;
4973
4974         peer = g_hash_table_lookup(interface->peer_table,
4975                                                 interface->pending_peer_path);
4976         interface->pending_peer_path = NULL;
4977         if (!peer)
4978                 return;
4979
4980         g_interface = g_hash_table_lookup(interface_table,
4981                                                 data.interface_obj_path);
4982         if (!g_interface)
4983                 return;
4984
4985         group = g_hash_table_lookup(interface->group_table,
4986                                                 data.group_obj_path);
4987         if (group)
4988                 return;
4989
4990         group = g_try_new0(GSupplicantGroup, 1);
4991         if (!group)
4992                 return;
4993
4994         group->interface = g_interface;
4995         group->orig_interface = interface;
4996         group->path = g_strdup(data.group_obj_path);
4997         group->role = data.role;
4998
4999         g_hash_table_insert(interface->group_table, group->path, group);
5000         g_hash_table_replace(group_mapping, group->path, group);
5001
5002         peer->current_group_iface = g_interface;
5003         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_STARTED);
5004 }
5005
5006 static void remove_peer_group_interface(GHashTable *group_table,
5007                                 const char* path)
5008 {
5009         GSupplicantGroup *group;
5010         GHashTableIter iter;
5011         gpointer value, key;
5012
5013         if (!group_table)
5014                 return;
5015
5016         group = g_hash_table_lookup(group_table, path);
5017
5018         if (!group || !group->orig_interface)
5019                 return;
5020
5021         g_hash_table_iter_init(&iter, group->orig_interface->peer_table);
5022
5023         while (g_hash_table_iter_next(&iter, &key, &value)) {
5024                 GSupplicantPeer *peer = value;
5025
5026                 if (peer->current_group_iface == group->interface)
5027                         peer->current_group_iface = NULL;
5028         }
5029 }
5030
5031 static void signal_group_finished(const char *path, DBusMessageIter *iter)
5032 {
5033         GSupplicantInterface *interface;
5034         struct group_sig_data data = {};
5035
5036         SUPPLICANT_DBG("");
5037
5038         interface = g_hash_table_lookup(interface_table, path);
5039         if (!interface)
5040                 return;
5041
5042         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
5043         if (!data.interface_obj_path || !data.group_obj_path)
5044                 return;
5045
5046         remove_peer_group_interface(interface->group_table, data.group_obj_path);
5047
5048         g_hash_table_remove(group_mapping, data.group_obj_path);
5049
5050         g_hash_table_remove(interface->group_table, data.group_obj_path);
5051 }
5052
5053 static void signal_group_request(const char *path, DBusMessageIter *iter)
5054 {
5055         GSupplicantInterface *interface;
5056         GSupplicantPeer *peer;
5057         const char *obj_path;
5058
5059         SUPPLICANT_DBG("");
5060
5061         interface = g_hash_table_lookup(interface_table, path);
5062         if (!interface)
5063                 return;
5064
5065         dbus_message_iter_get_basic(iter, &obj_path);
5066         if (!obj_path || !g_strcmp0(obj_path, "/"))
5067                 return;
5068
5069         peer = g_hash_table_lookup(interface->peer_table, obj_path);
5070         if (!peer)
5071                 return;
5072
5073         /*
5074          * Peer has been previously found and property set,
5075          * otherwise, defer connection to when peer property
5076          * is set.
5077          */
5078         if (peer->identifier)
5079                 callback_peer_request(peer);
5080         else
5081                 g_hash_table_replace(pending_peer_connection, peer->path, peer);
5082 }
5083
5084 static void signal_group_peer_joined(const char *path, DBusMessageIter *iter)
5085 {
5086         const char *peer_path = NULL;
5087         GSupplicantInterface *interface;
5088         GSupplicantGroup *group;
5089         GSupplicantPeer *peer;
5090
5091         SUPPLICANT_DBG("");
5092
5093         group = g_hash_table_lookup(group_mapping, path);
5094         if (!group)
5095                 return;
5096
5097         dbus_message_iter_get_basic(iter, &peer_path);
5098         if (!peer_path)
5099                 return;
5100
5101         interface = g_hash_table_lookup(peer_mapping, peer_path);
5102         if (!interface)
5103                 return;
5104
5105         peer = g_hash_table_lookup(interface->peer_table, peer_path);
5106         if (!peer)
5107                 return;
5108
5109         group->members = g_slist_prepend(group->members, g_strdup(peer_path));
5110
5111         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_JOINED);
5112 }
5113
5114 static void signal_group_peer_disconnected(const char *path, DBusMessageIter *iter)
5115 {
5116         const char *peer_path = NULL;
5117         GSupplicantInterface *interface;
5118         GSupplicantGroup *group;
5119         GSupplicantPeer *peer;
5120         GSList *elem;
5121
5122         SUPPLICANT_DBG("");
5123
5124         group = g_hash_table_lookup(group_mapping, path);
5125         if (!group)
5126                 return;
5127
5128         dbus_message_iter_get_basic(iter, &peer_path);
5129         if (!peer_path)
5130                 return;
5131
5132         for (elem = group->members; elem; elem = elem->next) {
5133                 if (!g_strcmp0(elem->data, peer_path))
5134                         break;
5135         }
5136
5137         if (!elem)
5138                 return;
5139
5140         g_free(elem->data);
5141         group->members = g_slist_delete_link(group->members, elem);
5142
5143         interface = g_hash_table_lookup(peer_mapping, peer_path);
5144         if (!interface)
5145                 return;
5146
5147         peer = g_hash_table_lookup(interface->peer_table, peer_path);
5148         if (!peer)
5149                 return;
5150
5151         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_DISCONNECTED);
5152         peer->connection_requested = false;
5153 }
5154
5155 #if defined TIZEN_EXT_WIFI_MESH
5156 const void *g_supplicant_interface_get_mesh_group_ssid(
5157                                                         GSupplicantInterface *interface,
5158                                                         unsigned int *ssid_len)
5159 {
5160         if (!ssid_len)
5161                 return NULL;
5162
5163         if (!interface || interface->group_info.ssid_len == 0) {
5164                 *ssid_len = 0;
5165                 return NULL;
5166         }
5167
5168         *ssid_len = interface->group_info.ssid_len;
5169         return interface->group_info.ssid;
5170 }
5171
5172 int g_supplicant_mesh_get_disconnect_reason(GSupplicantInterface *interface)
5173 {
5174         if (!interface)
5175                 return -EINVAL;
5176
5177         return interface->group_info.disconnect_reason;
5178 }
5179
5180 const char *g_supplicant_mesh_peer_get_address(GSupplicantMeshPeer *mesh_peer)
5181 {
5182         if (!mesh_peer || !mesh_peer->peer_address)
5183                 return NULL;
5184
5185         return mesh_peer->peer_address;
5186 }
5187
5188 int g_supplicant_mesh_peer_get_disconnect_reason(GSupplicantMeshPeer *mesh_peer)
5189 {
5190         if (!mesh_peer)
5191                 return -EINVAL;
5192
5193         return mesh_peer->disconnect_reason;
5194 }
5195
5196 static void callback_mesh_group_started(GSupplicantInterface *interface)
5197 {
5198         if (!callbacks_pointer)
5199                 return;
5200
5201         if (!callbacks_pointer->mesh_group_started)
5202                 return;
5203
5204         callbacks_pointer->mesh_group_started(interface);
5205 }
5206
5207 static void callback_mesh_group_removed(GSupplicantInterface *interface)
5208 {
5209         if (!callbacks_pointer)
5210                 return;
5211
5212         if (!callbacks_pointer->mesh_group_removed)
5213                 return;
5214
5215         callbacks_pointer->mesh_group_removed(interface);
5216 }
5217
5218 static void mesh_group_info(const char *key, DBusMessageIter *iter,
5219                                                         void *user_data)
5220 {
5221         GSupplicantInterface *interface = user_data;
5222         if (!key)
5223                 return;
5224
5225         if (g_strcmp0(key, "SSID") == 0) {
5226                 DBusMessageIter array;
5227                 unsigned char *ssid;
5228                 int ssid_len;
5229
5230                 dbus_message_iter_recurse(iter, &array);
5231                 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
5232
5233                 if (ssid_len > 0 && ssid_len < 33) {
5234                         memcpy(interface->group_info.ssid, ssid, ssid_len);
5235                         interface->group_info.ssid_len = ssid_len;
5236                 } else {
5237                         memset(interface->group_info.ssid, 0, 32);
5238                         interface->group_info.ssid_len = 0;
5239                 }
5240         } else if (g_strcmp0(key, "DisconnectReason") == 0) {
5241                 int disconnect_reason = 0;
5242                 dbus_message_iter_get_basic(iter, &disconnect_reason);
5243                 interface->group_info.disconnect_reason = disconnect_reason;
5244         }
5245 }
5246
5247 static void signal_mesh_group_started(const char *path, DBusMessageIter *iter)
5248 {
5249         GSupplicantInterface *interface;
5250
5251         interface = g_hash_table_lookup(interface_table, path);
5252         if (!interface)
5253                 return;
5254
5255         supplicant_dbus_property_foreach(iter, mesh_group_info, interface);
5256
5257         callback_mesh_group_started(interface);
5258 }
5259
5260 static void signal_mesh_group_removed(const char *path, DBusMessageIter *iter)
5261 {
5262         GSupplicantInterface *interface;
5263
5264         interface = g_hash_table_lookup(interface_table, path);
5265         if (!interface)
5266                 return;
5267
5268         supplicant_dbus_property_foreach(iter, mesh_group_info, interface);
5269
5270         callback_mesh_group_removed(interface);
5271 }
5272
5273 static void callback_mesh_peer_connected(GSupplicantMeshPeer *mesh_peer)
5274 {
5275         if (!callbacks_pointer)
5276                 return;
5277
5278         if (!callbacks_pointer->mesh_peer_connected)
5279                 return;
5280
5281         callbacks_pointer->mesh_peer_connected(mesh_peer);
5282 }
5283
5284 static void callback_mesh_peer_disconnected(GSupplicantMeshPeer *mesh_peer)
5285 {
5286         if (!callbacks_pointer)
5287                 return;
5288
5289         if (!callbacks_pointer->mesh_peer_disconnected)
5290                 return;
5291
5292         callbacks_pointer->mesh_peer_disconnected(mesh_peer);
5293 }
5294
5295 static void mesh_peer_info(const char *key, DBusMessageIter *iter,
5296                                                         void *user_data)
5297 {
5298         GSupplicantMeshPeer *mesh_peer = user_data;
5299         if (!key)
5300                 return;
5301
5302         if (g_strcmp0(key, "PeerAddress") == 0) {
5303                 DBusMessageIter array;
5304                 unsigned char *addr;
5305                 int addr_len;
5306
5307                 dbus_message_iter_recurse(iter, &array);
5308                 dbus_message_iter_get_fixed_array(&array, &addr, &addr_len);
5309
5310                 if (addr_len == 6) {
5311                         mesh_peer->peer_address = g_malloc0(19);
5312                         snprintf(mesh_peer->peer_address, 19,
5313                                          "%02x:%02x:%02x:%02x:%02x:%02x", addr[0], addr[1],
5314                                          addr[2], addr[3], addr[4], addr[5]);
5315                 }
5316         } else if (g_strcmp0(key, "DisconnectReason") == 0) {
5317                 int disconnect_reason = 0;
5318                 dbus_message_iter_get_basic(iter, &disconnect_reason);
5319                 mesh_peer->disconnect_reason = disconnect_reason;
5320         }
5321 }
5322
5323 static void signal_mesh_peer_connected(const char *path, DBusMessageIter *iter)
5324 {
5325         GSupplicantInterface *interface;
5326         GSupplicantMeshPeer *mesh_peer;
5327
5328         interface = g_hash_table_lookup(interface_table, path);
5329         if (!interface)
5330                 return;
5331
5332         mesh_peer = dbus_malloc0(sizeof(GSupplicantMeshPeer));
5333         mesh_peer->interface = interface;
5334
5335         supplicant_dbus_property_foreach(iter, mesh_peer_info, mesh_peer);
5336
5337         callback_mesh_peer_connected(mesh_peer);
5338         g_free(mesh_peer->peer_address);
5339         g_free(mesh_peer);
5340 }
5341
5342 static void signal_mesh_peer_disconnected(const char *path,
5343                                                                 DBusMessageIter *iter)
5344 {
5345         GSupplicantInterface *interface;
5346         GSupplicantMeshPeer *mesh_peer;
5347
5348         interface = g_hash_table_lookup(interface_table, path);
5349         if (!interface)
5350                 return;
5351
5352         mesh_peer = dbus_malloc0(sizeof(GSupplicantMeshPeer));
5353         mesh_peer->interface = interface;
5354
5355         supplicant_dbus_property_foreach(iter, mesh_peer_info, mesh_peer);
5356
5357         callback_mesh_peer_disconnected(mesh_peer);
5358         g_free(mesh_peer->peer_address);
5359         g_free(mesh_peer);
5360 }
5361 #endif
5362
5363 static struct {
5364         const char *interface;
5365         const char *member;
5366         void (*function) (const char *path, DBusMessageIter *iter);
5367 } signal_map[] = {
5368         { DBUS_INTERFACE_DBUS,  "NameOwnerChanged",  signal_name_owner_changed },
5369
5370         { SUPPLICANT_INTERFACE, "PropertiesChanged", signal_properties_changed },
5371         { SUPPLICANT_INTERFACE, "InterfaceAdded",    signal_interface_added    },
5372         { SUPPLICANT_INTERFACE, "InterfaceCreated",  signal_interface_added    },
5373         { SUPPLICANT_INTERFACE, "InterfaceRemoved",  signal_interface_removed  },
5374
5375         { SUPPLICANT_INTERFACE ".Interface", "PropertiesChanged", signal_interface_changed },
5376         { SUPPLICANT_INTERFACE ".Interface", "ScanDone",          signal_scan_done         },
5377         { SUPPLICANT_INTERFACE ".Interface", "BSSAdded",          signal_bss_added         },
5378         { SUPPLICANT_INTERFACE ".Interface", "BSSRemoved",        signal_bss_removed       },
5379         { SUPPLICANT_INTERFACE ".Interface", "NetworkAdded",      signal_network_added     },
5380         { SUPPLICANT_INTERFACE ".Interface", "NetworkRemoved",    signal_network_removed   },
5381         { SUPPLICANT_INTERFACE ".Interface", "StaAuthorized",     signal_sta_authorized    },
5382         { SUPPLICANT_INTERFACE ".Interface", "StaDeauthorized",   signal_sta_deauthorized  },
5383
5384         { SUPPLICANT_INTERFACE ".BSS", "PropertiesChanged", signal_bss_changed   },
5385
5386         { SUPPLICANT_INTERFACE ".Interface.WPS", "Credentials", signal_wps_credentials },
5387         { SUPPLICANT_INTERFACE ".Interface.WPS", "Event",       signal_wps_event       },
5388 #if defined TIZEN_EXT
5389         { "org.tizen.system.deviced.PowerOff", "ChangeState", signal_power_off },
5390 #endif
5391
5392         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeviceFound", signal_peer_found },
5393         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeviceLost",  signal_peer_lost  },
5394
5395         { SUPPLICANT_INTERFACE ".Peer", "PropertiesChanged", signal_peer_changed },
5396
5397         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationSuccess", signal_group_success },
5398         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationFailure", signal_group_failure },
5399         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GroupStarted", signal_group_started },
5400         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GroupFinished", signal_group_finished },
5401         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationRequest", signal_group_request },
5402
5403         { SUPPLICANT_INTERFACE ".Group", "PeerJoined", signal_group_peer_joined },
5404         { SUPPLICANT_INTERFACE ".Group", "PeerDisconnected", signal_group_peer_disconnected },
5405 #if defined TIZEN_EXT_WIFI_MESH
5406         { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshGroupStarted",
5407                 signal_mesh_group_started },
5408         { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshGroupRemoved",
5409                 signal_mesh_group_removed },
5410         { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshPeerConnected",
5411                 signal_mesh_peer_connected },
5412         { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshPeerDisconnected",
5413                 signal_mesh_peer_disconnected },
5414 #endif
5415
5416 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
5417         { SUPPLICANT_INTERFACE ".Interface", "EAP", signal_eap },
5418 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
5419
5420         { }
5421 };
5422
5423 static DBusHandlerResult g_supplicant_filter(DBusConnection *conn,
5424                                         DBusMessage *message, void *data)
5425 {
5426         DBusMessageIter iter;
5427         const char *path;
5428         int i;
5429
5430         path = dbus_message_get_path(message);
5431         if (!path)
5432                 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
5433
5434         if (!dbus_message_iter_init(message, &iter))
5435                 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
5436
5437         for (i = 0; signal_map[i].interface; i++) {
5438                 if (!dbus_message_has_interface(message, signal_map[i].interface))
5439                         continue;
5440
5441                 if (!dbus_message_has_member(message, signal_map[i].member))
5442                         continue;
5443
5444                 signal_map[i].function(path, &iter);
5445                 break;
5446         }
5447
5448         return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
5449 }
5450
5451 void g_supplicant_interface_cancel(GSupplicantInterface *interface)
5452 {
5453         SUPPLICANT_DBG("Cancelling any pending DBus calls");
5454         supplicant_dbus_method_call_cancel_all(interface);
5455         supplicant_dbus_property_call_cancel_all(interface);
5456 }
5457
5458 struct supplicant_regdom {
5459         GSupplicantCountryCallback callback;
5460         const char *alpha2;
5461         const void *user_data;
5462 };
5463
5464 static void country_result(const char *error,
5465                                 DBusMessageIter *iter, void *user_data)
5466 {
5467         struct supplicant_regdom *regdom = user_data;
5468         int result = 0;
5469
5470         SUPPLICANT_DBG("Country setting result");
5471
5472         if (!user_data)
5473                 return;
5474
5475         if (error) {
5476                 SUPPLICANT_DBG("Country setting failure %s", error);
5477                 result = -EINVAL;
5478         }
5479
5480         if (regdom->callback)
5481                 regdom->callback(result, regdom->alpha2,
5482                                         (void *) regdom->user_data);
5483
5484         g_free(regdom);
5485 }
5486
5487 static void country_params(DBusMessageIter *iter, void *user_data)
5488 {
5489         struct supplicant_regdom *regdom = user_data;
5490
5491         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING,
5492                                                         &regdom->alpha2);
5493 }
5494
5495 int g_supplicant_set_country(const char *alpha2,
5496                                 GSupplicantCountryCallback callback,
5497                                         const void *user_data)
5498 {
5499         struct supplicant_regdom *regdom;
5500         int ret;
5501
5502         SUPPLICANT_DBG("Country setting %s", alpha2);
5503
5504         if (!system_available)
5505                 return -EFAULT;
5506
5507         regdom = dbus_malloc0(sizeof(*regdom));
5508         if (!regdom)
5509                 return -ENOMEM;
5510
5511         regdom->callback = callback;
5512         regdom->alpha2 = alpha2;
5513         regdom->user_data = user_data;
5514
5515         ret =  supplicant_dbus_property_set(SUPPLICANT_PATH, SUPPLICANT_INTERFACE,
5516                                         "Country", DBUS_TYPE_STRING_AS_STRING,
5517                                         country_params, country_result,
5518                                         regdom, NULL);
5519         if (ret < 0) {
5520                 dbus_free(regdom);
5521                 SUPPLICANT_DBG("Unable to set Country configuration");
5522         }
5523         return ret;
5524 }
5525
5526 int g_supplicant_interface_set_country(GSupplicantInterface *interface,
5527                                         GSupplicantCountryCallback callback,
5528                                                         const char *alpha2,
5529                                                         void *user_data)
5530 {
5531         struct supplicant_regdom *regdom;
5532         int ret;
5533
5534         regdom = dbus_malloc0(sizeof(*regdom));
5535         if (!regdom)
5536                 return -ENOMEM;
5537
5538         regdom->callback = callback;
5539         regdom->alpha2 = alpha2;
5540         regdom->user_data = user_data;
5541
5542         ret =  supplicant_dbus_property_set(interface->path,
5543                                 SUPPLICANT_INTERFACE ".Interface",
5544                                 "Country", DBUS_TYPE_STRING_AS_STRING,
5545                                 country_params, country_result,
5546                                         regdom, NULL);
5547         if (ret < 0) {
5548                 dbus_free(regdom);
5549                 SUPPLICANT_DBG("Unable to set Country configuration");
5550         }
5551
5552         return ret;
5553 }
5554
5555 bool g_supplicant_interface_has_p2p(GSupplicantInterface *interface)
5556 {
5557         if (!interface)
5558                 return false;
5559
5560         return interface->p2p_support;
5561 }
5562
5563 struct supplicant_p2p_dev_config {
5564         char *device_name;
5565         char *dev_type;
5566 };
5567
5568 static void p2p_device_config_result(const char *error,
5569                                         DBusMessageIter *iter, void *user_data)
5570 {
5571         struct supplicant_p2p_dev_config *config = user_data;
5572
5573         if (error)
5574                 SUPPLICANT_DBG("Unable to set P2P Device configuration: %s",
5575                                                                         error);
5576
5577         g_free(config->device_name);
5578         g_free(config->dev_type);
5579         dbus_free(config);
5580 }
5581
5582 static int dev_type_str2bin(const char *type, unsigned char dev_type[8])
5583 {
5584         int length, pos, end;
5585         char b[3] = {};
5586         char *e = NULL;
5587
5588         end = strlen(type);
5589         for (length = pos = 0; type[pos] != '\0' && length < 8; length++) {
5590                 if (pos+2 > end)
5591                         return 0;
5592
5593                 b[0] = type[pos];
5594                 b[1] = type[pos+1];
5595
5596                 dev_type[length] = strtol(b, &e, 16);
5597                 if (e && *e != '\0')
5598                         return 0;
5599
5600                 pos += 2;
5601         }
5602
5603         return 8;
5604 }
5605
5606 static void p2p_device_config_params(DBusMessageIter *iter, void *user_data)
5607 {
5608         struct supplicant_p2p_dev_config *config = user_data;
5609         DBusMessageIter dict;
5610
5611         supplicant_dbus_dict_open(iter, &dict);
5612
5613         supplicant_dbus_dict_append_basic(&dict, "DeviceName",
5614                                 DBUS_TYPE_STRING, &config->device_name);
5615
5616         if (config->dev_type) {
5617                 unsigned char dev_type[8] = {}, *type;
5618                 int len;
5619
5620                 len = dev_type_str2bin(config->dev_type, dev_type);
5621                 if (len) {
5622                         type = dev_type;
5623                         supplicant_dbus_dict_append_fixed_array(&dict,
5624                                         "PrimaryDeviceType",
5625                                         DBUS_TYPE_BYTE, &type, len);
5626                 }
5627         }
5628
5629         supplicant_dbus_dict_close(iter, &dict);
5630 }
5631
5632 int g_supplicant_interface_set_p2p_device_config(GSupplicantInterface *interface,
5633                                         const char *device_name,
5634                                         const char *primary_dev_type)
5635 {
5636         struct supplicant_p2p_dev_config *config;
5637         int ret;
5638
5639         SUPPLICANT_DBG("P2P Device settings %s/%s",
5640                                         device_name, primary_dev_type);
5641
5642         config = dbus_malloc0(sizeof(*config));
5643         if (!config)
5644                 return -ENOMEM;
5645
5646         config->device_name = g_strdup(device_name);
5647         config->dev_type = g_strdup(primary_dev_type);
5648
5649         ret = supplicant_dbus_property_set(interface->path,
5650                                 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
5651                                 "P2PDeviceConfig",
5652                                 DBUS_TYPE_ARRAY_AS_STRING
5653                                 DBUS_DICT_ENTRY_BEGIN_CHAR_AS_STRING
5654                                 DBUS_TYPE_STRING_AS_STRING
5655                                 DBUS_TYPE_VARIANT_AS_STRING
5656                                 DBUS_DICT_ENTRY_END_CHAR_AS_STRING,
5657                                 p2p_device_config_params,
5658                                 p2p_device_config_result, config, NULL);
5659         if (ret < 0) {
5660                 g_free(config->device_name);
5661                 g_free(config->dev_type);
5662                 dbus_free(config);
5663                 SUPPLICANT_DBG("Unable to set P2P Device configuration");
5664         }
5665
5666         return ret;
5667 }
5668
5669 static gboolean peer_lookup_by_identifier(gpointer key, gpointer value,
5670                                                         gpointer user_data)
5671 {
5672         const GSupplicantPeer *peer = value;
5673         const char *identifier = user_data;
5674
5675         if (!g_strcmp0(identifier, peer->identifier))
5676                 return TRUE;
5677
5678         return FALSE;
5679 }
5680
5681 GSupplicantPeer *g_supplicant_interface_peer_lookup(GSupplicantInterface *interface,
5682                                                         const char *identifier)
5683 {
5684         GSupplicantPeer *peer;
5685
5686         peer = g_hash_table_find(interface->peer_table,
5687                                         peer_lookup_by_identifier,
5688                                         (void *) identifier);
5689         return peer;
5690 }
5691
5692 static void interface_create_data_free(struct interface_create_data *data)
5693 {
5694         g_free(data->ifname);
5695         g_free(data->driver);
5696         g_free(data->bridge);
5697 #if defined TIZEN_EXT_WIFI_MESH
5698         g_free(data->parent_ifname);
5699 #endif
5700         dbus_free(data);
5701 }
5702
5703 static bool interface_exists(GSupplicantInterface *interface,
5704                                 const char *path)
5705 {
5706         GSupplicantInterface *tmp;
5707
5708         tmp = g_hash_table_lookup(interface_table, path);
5709         if (tmp && tmp == interface)
5710                 return true;
5711
5712         return false;
5713 }
5714
5715 static void interface_create_property(const char *key, DBusMessageIter *iter,
5716                                                         void *user_data)
5717 {
5718         struct interface_create_data *data = user_data;
5719         GSupplicantInterface *interface = data->interface;
5720
5721         if (!key) {
5722                 if (data->callback) {
5723                         data->callback(0, data->interface, data->user_data);
5724 #if !defined TIZEN_EXT
5725                         callback_p2p_support(interface);
5726 #endif
5727 #if defined TIZEN_EXT_WIFI_MESH
5728                         callback_mesh_support(interface);
5729 #endif
5730                 }
5731
5732                 interface_create_data_free(data);
5733         }
5734
5735         interface_property(key, iter, interface);
5736 }
5737
5738 static void interface_create_result(const char *error,
5739                                 DBusMessageIter *iter, void *user_data)
5740 {
5741         struct interface_create_data *data = user_data;
5742         const char *path = NULL;
5743         int err;
5744
5745         SUPPLICANT_DBG("");
5746
5747         if (error) {
5748                 g_warning("error %s", error);
5749                 err = -EIO;
5750                 goto done;
5751         }
5752
5753         dbus_message_iter_get_basic(iter, &path);
5754         if (!path) {
5755                 err = -EINVAL;
5756                 goto done;
5757         }
5758
5759         if (!system_available) {
5760                 err = -EFAULT;
5761                 goto done;
5762         }
5763
5764         data->interface = g_hash_table_lookup(interface_table, path);
5765         if (!data->interface) {
5766                 data->interface = interface_alloc(path);
5767                 if (!data->interface) {
5768                         err = -ENOMEM;
5769                         goto done;
5770                 }
5771         }
5772
5773         err = supplicant_dbus_property_get_all(path,
5774                                         SUPPLICANT_INTERFACE ".Interface",
5775                                         interface_create_property, data,
5776                                         NULL);
5777         if (err == 0)
5778                 return;
5779
5780 done:
5781         if (data->callback)
5782                 data->callback(err, NULL, data->user_data);
5783
5784         interface_create_data_free(data);
5785 }
5786
5787 static void interface_create_params(DBusMessageIter *iter, void *user_data)
5788 {
5789         struct interface_create_data *data = user_data;
5790         DBusMessageIter dict;
5791         char *config_file = NULL;
5792
5793         SUPPLICANT_DBG("");
5794
5795         supplicant_dbus_dict_open(iter, &dict);
5796
5797         supplicant_dbus_dict_append_basic(&dict, "Ifname",
5798                                         DBUS_TYPE_STRING, &data->ifname);
5799
5800         if (data->driver)
5801                 supplicant_dbus_dict_append_basic(&dict, "Driver",
5802                                         DBUS_TYPE_STRING, &data->driver);
5803
5804         if (data->bridge)
5805                 supplicant_dbus_dict_append_basic(&dict, "BridgeIfname",
5806                                         DBUS_TYPE_STRING, &data->bridge);
5807
5808         config_file = g_hash_table_lookup(config_file_table, data->ifname);
5809         if (config_file) {
5810                 SUPPLICANT_DBG("[%s] ConfigFile %s", data->ifname, config_file);
5811
5812                 supplicant_dbus_dict_append_basic(&dict, "ConfigFile",
5813                                         DBUS_TYPE_STRING, &config_file);
5814         }
5815
5816 #ifdef TIZEN_EXT
5817         if (data->driver && g_strstr_len(data->driver, strlen(data->driver), "nl80211")) {
5818                 supplicant_dbus_dict_append_basic(&dict, "MacAddr",
5819                                 DBUS_TYPE_UINT32, &data->mac_addr);
5820
5821                 supplicant_dbus_dict_append_basic(&dict, "PreassocMacAddr",
5822                                 DBUS_TYPE_UINT32, &data->preassoc_mac_addr);
5823
5824                 supplicant_dbus_dict_append_basic(&dict, "RandAddrLifetime",
5825                                 DBUS_TYPE_UINT32, &data->random_mac_lifetime);
5826         }
5827 #endif /* TIZEN_EXT */
5828
5829 #if defined TIZEN_EXT_WIFI_MESH
5830         if (data->is_mesh_interface) {
5831                 if (data->parent_ifname)
5832                         supplicant_dbus_dict_append_basic(&dict, "ParentIfname",
5833                                         DBUS_TYPE_STRING, &data->parent_ifname);
5834
5835                 supplicant_dbus_dict_append_basic(&dict, "IsMeshInterface",
5836                                         DBUS_TYPE_BOOLEAN, &data->is_mesh_interface);
5837         }
5838 #endif
5839
5840         supplicant_dbus_dict_close(iter, &dict);
5841 }
5842
5843 #if defined TIZEN_EXT
5844 static void interface_get_state(const char *key, DBusMessageIter *iter,
5845                 void *user_data)
5846 {
5847         struct interface_create_data *data = user_data;
5848         GSupplicantInterface *interface = NULL;
5849         const char *str = NULL;
5850
5851         SUPPLICANT_DBG("key[%s]", key);
5852
5853         if (!data) {
5854                 SUPPLICANT_DBG("data is NULL");
5855                 return;
5856         }
5857
5858         interface = data->interface;
5859         if (!interface) {
5860                 SUPPLICANT_DBG("interface is NULL");
5861                 return;
5862         }
5863
5864         if (iter)
5865                 dbus_message_iter_get_basic(iter, &str);
5866
5867         if (str) {
5868                 if (string2state(str) != interface->state)
5869                         interface->state = string2state(str);
5870         }
5871
5872         if (interface->state == G_SUPPLICANT_STATE_DISABLED)
5873                 interface->ready = FALSE;
5874         else
5875                 interface->ready = TRUE;
5876
5877         SUPPLICANT_DBG("state %s (%d)", str, interface->state);
5878
5879         if (data->callback) {
5880                 data->callback(0, interface, data->user_data);
5881 #if defined TIZEN_EXT_WIFI_MESH
5882                 callback_mesh_support(interface);
5883 #endif
5884         }
5885
5886         interface_create_data_free(data);
5887 }
5888 #endif
5889
5890 static void interface_get_result(const char *error,
5891                                 DBusMessageIter *iter, void *user_data)
5892 {
5893         struct interface_create_data *data = user_data;
5894         GSupplicantInterface *interface;
5895         const char *path = NULL;
5896         int err;
5897
5898 #if defined TIZEN_EXT
5899         if (!simplified_log)
5900 #endif
5901         SUPPLICANT_DBG("");
5902
5903         if (error) {
5904                 SUPPLICANT_DBG("Interface not created yet");
5905                 goto create;
5906         }
5907
5908         dbus_message_iter_get_basic(iter, &path);
5909         if (!path) {
5910                 err = -EINVAL;
5911                 goto done;
5912         }
5913
5914         interface = g_hash_table_lookup(interface_table, path);
5915         if (!interface) {
5916                 err = -ENOENT;
5917                 goto done;
5918         }
5919
5920 #if defined TIZEN_EXT
5921         data->interface = interface;
5922         err = supplicant_dbus_property_get(path,
5923                         SUPPLICANT_INTERFACE ".Interface",
5924                         "State", interface_get_state, data, NULL);
5925
5926         if (err == 0)
5927                 return;
5928 #endif
5929
5930         if (data->callback) {
5931                 data->callback(0, interface, data->user_data);
5932 #if !defined TIZEN_EXT
5933                 callback_p2p_support(interface);
5934 #endif
5935 #if defined TIZEN_EXT_WIFI_MESH
5936                 callback_mesh_support(interface);
5937 #endif
5938         }
5939
5940         interface_create_data_free(data);
5941
5942         return;
5943
5944 create:
5945         if (!system_available) {
5946                 err = -EFAULT;
5947                 goto done;
5948         }
5949
5950         SUPPLICANT_DBG("Creating interface");
5951
5952         err = supplicant_dbus_method_call(SUPPLICANT_PATH,
5953                                                 SUPPLICANT_INTERFACE,
5954                                                 "CreateInterface",
5955                                                 interface_create_params,
5956                                                 interface_create_result, data,
5957                                                 NULL);
5958         if (err == 0)
5959                 return;
5960
5961 done:
5962         if (data->callback)
5963                 data->callback(err, NULL, data->user_data);
5964
5965         interface_create_data_free(data);
5966 }
5967
5968 static void interface_get_params(DBusMessageIter *iter, void *user_data)
5969 {
5970         struct interface_create_data *data = user_data;
5971 #if defined TIZEN_EXT
5972         if (!simplified_log)
5973 #endif
5974         SUPPLICANT_DBG("");
5975
5976         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, &data->ifname);
5977 }
5978
5979 #if defined TIZEN_EXT_WIFI_MESH
5980 int g_supplicant_mesh_interface_create(const char *ifname, const char *driver,
5981                                                 const char *bridge, const char *parent_ifname,
5982                                                 GSupplicantInterfaceCallback callback, void *user_data)
5983 {
5984         struct interface_create_data *data;
5985         int ret;
5986
5987         SUPPLICANT_DBG("ifname %s", ifname);
5988
5989         if (!ifname || !parent_ifname)
5990                 return -EINVAL;
5991
5992         if (!system_available)
5993                 return -EFAULT;
5994
5995         data = dbus_malloc0(sizeof(*data));
5996         if (!data)
5997                 return -ENOMEM;
5998
5999         data->ifname = g_strdup(ifname);
6000         data->driver = g_strdup(driver);
6001         data->bridge = g_strdup(bridge);
6002         data->is_mesh_interface = true;
6003         data->parent_ifname = g_strdup(parent_ifname);
6004         data->callback = callback;
6005         data->user_data = user_data;
6006
6007         ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
6008                                                 SUPPLICANT_INTERFACE,
6009                                                 "CreateInterface",
6010                                                 interface_create_params,
6011                                                 interface_create_result, data,
6012                                                 NULL);
6013         return ret;
6014 }
6015
6016 struct interface_mesh_peer_data {
6017         char *peer_address;
6018         char *method;
6019         GSupplicantInterface *interface;
6020         GSupplicantInterfaceCallback callback;
6021         void *user_data;
6022 };
6023
6024 static void interface_mesh_change_peer_params(DBusMessageIter *iter,
6025                                                 void *user_data)
6026 {
6027         struct interface_mesh_peer_data *data = user_data;
6028
6029         SUPPLICANT_DBG("");
6030
6031         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, &data->peer_address);
6032 }
6033
6034 static void interface_mesh_change_peer_result(const char *error,
6035                                 DBusMessageIter *iter, void *user_data)
6036 {
6037         struct interface_mesh_peer_data *data = user_data;
6038         int err = 0;
6039
6040         SUPPLICANT_DBG("%s", data->method);
6041
6042         if (error) {
6043                 err = -EIO;
6044                 SUPPLICANT_DBG("error %s", error);
6045         }
6046
6047         if (data->callback)
6048                 data->callback(err, data->interface, data->user_data);
6049
6050         g_free(data->peer_address);
6051         g_free(data->method);
6052         dbus_free(data);
6053 }
6054
6055 int g_supplicant_interface_mesh_peer_change_status(
6056                                 GSupplicantInterface *interface,
6057                                 GSupplicantInterfaceCallback callback, const char *peer_address,
6058                                 const char *method, void *user_data)
6059 {
6060         struct interface_mesh_peer_data *data;
6061         int ret;
6062
6063         if (!peer_address)
6064                 return -EINVAL;
6065
6066         data = dbus_malloc0(sizeof(*data));
6067         if (!data)
6068                 return -ENOMEM;
6069
6070         data->peer_address = g_strdup(peer_address);
6071         data->method = g_strdup(method);
6072         data->interface = interface;
6073         data->callback = callback;
6074         data->user_data = user_data;
6075
6076         ret = supplicant_dbus_method_call(interface->path,
6077                                                 SUPPLICANT_INTERFACE ".Interface.Mesh",
6078                                                 method, interface_mesh_change_peer_params,
6079                                                 interface_mesh_change_peer_result, data, NULL);
6080         if (ret < 0) {
6081                 g_free(data->peer_address);
6082                 g_free(data->method);
6083                 dbus_free(data);
6084         }
6085
6086         return ret;
6087 }
6088 #endif
6089
6090 int g_supplicant_interface_create(const char *ifname, const char *driver,
6091                                         const char *bridge,
6092 #ifdef TIZEN_EXT
6093                                         unsigned int mac_policy,
6094                                         unsigned int preassoc_mac_policy,
6095                                         unsigned int random_mac_lifetime,
6096 #endif /* TIZEN_EXT */
6097                                         GSupplicantInterfaceCallback callback,
6098                                                         void *user_data)
6099 {
6100         struct interface_create_data *data;
6101         int ret;
6102
6103         SUPPLICANT_DBG("ifname %s", ifname);
6104
6105         if (!ifname)
6106                 return -EINVAL;
6107
6108         if (!system_available)
6109                 return -EFAULT;
6110
6111         data = dbus_malloc0(sizeof(*data));
6112         if (!data)
6113                 return -ENOMEM;
6114
6115         data->ifname = g_strdup(ifname);
6116         data->driver = g_strdup(driver);
6117         data->bridge = g_strdup(bridge);
6118         data->callback = callback;
6119 #ifdef TIZEN_EXT
6120         data->mac_addr = mac_policy;
6121         data->preassoc_mac_addr = preassoc_mac_policy;
6122         data->random_mac_lifetime = random_mac_lifetime;
6123 #endif /* TIZEN_EXT */
6124         data->user_data = user_data;
6125
6126         ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
6127                                                 SUPPLICANT_INTERFACE,
6128                                                 "GetInterface",
6129                                                 interface_get_params,
6130                                                 interface_get_result, data,
6131                                                 NULL);
6132         if (ret < 0)
6133                 interface_create_data_free(data);
6134
6135         return ret;
6136 }
6137
6138 static void interface_remove_result(const char *error,
6139                                 DBusMessageIter *iter, void *user_data)
6140 {
6141         struct interface_data *data = user_data;
6142         int err;
6143
6144         if (error) {
6145                 err = -EIO;
6146                 SUPPLICANT_DBG("error: %s", error);
6147                 goto done;
6148         }
6149
6150         if (!system_available) {
6151                 err = -EFAULT;
6152                 goto done;
6153         }
6154
6155         /*
6156          * The gsupplicant interface is already freed by the InterfaceRemoved
6157          * signal callback. Simply invoke the interface_data callback.
6158          */
6159         err = 0;
6160
6161 done:
6162         g_free(data->path);
6163
6164         if (data->callback)
6165                 data->callback(err, NULL, data->user_data);
6166
6167         dbus_free(data);
6168 }
6169
6170
6171 static void interface_remove_params(DBusMessageIter *iter, void *user_data)
6172 {
6173         struct interface_data *data = user_data;
6174
6175         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
6176                                                         &data->interface->path);
6177 }
6178
6179 int g_supplicant_interface_remove(GSupplicantInterface *interface,
6180                         GSupplicantInterfaceCallback callback,
6181                                                         void *user_data)
6182 {
6183         struct interface_data *data;
6184         int ret;
6185
6186         if (!interface)
6187                 return -EINVAL;
6188
6189         if (!system_available)
6190                 return -EFAULT;
6191
6192         g_supplicant_interface_cancel(interface);
6193
6194         data = dbus_malloc0(sizeof(*data));
6195         if (!data)
6196                 return -ENOMEM;
6197
6198         data->interface = interface;
6199         data->path = g_strdup(interface->path);
6200         data->callback = callback;
6201         data->user_data = user_data;
6202
6203         ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
6204                                                 SUPPLICANT_INTERFACE,
6205                                                 "RemoveInterface",
6206                                                 interface_remove_params,
6207                                                 interface_remove_result, data,
6208                                                 NULL);
6209         if (ret < 0) {
6210                 g_free(data->path);
6211                 dbus_free(data);
6212         }
6213         return ret;
6214 }
6215
6216 static void interface_scan_result(const char *error,
6217                                 DBusMessageIter *iter, void *user_data)
6218 {
6219         struct interface_scan_data *data = user_data;
6220         int err = 0;
6221
6222         if (error) {
6223                 SUPPLICANT_DBG("error %s", error);
6224                 err = -EIO;
6225         }
6226
6227         /* A non ready interface cannot send/receive anything */
6228         if (interface_exists(data->interface, data->path)) {
6229                 if (!data->interface->ready)
6230                         err = -ENOLINK;
6231         }
6232
6233         g_free(data->path);
6234
6235         if (err != 0) {
6236                 if (data->callback)
6237                         data->callback(err, data->interface, data->user_data);
6238         } else {
6239                 data->interface->scan_callback = data->callback;
6240                 data->interface->scan_data = data->user_data;
6241         }
6242
6243         if (data->scan_params)
6244                 g_supplicant_free_scan_params(data->scan_params);
6245
6246         dbus_free(data);
6247 }
6248
6249 static void add_scan_frequency(DBusMessageIter *iter, unsigned int freq)
6250 {
6251         DBusMessageIter data;
6252         unsigned int width = 0; /* Not used by wpa_supplicant atm */
6253
6254         dbus_message_iter_open_container(iter, DBUS_TYPE_STRUCT, NULL, &data);
6255
6256         dbus_message_iter_append_basic(&data, DBUS_TYPE_UINT32, &freq);
6257         dbus_message_iter_append_basic(&data, DBUS_TYPE_UINT32, &width);
6258
6259         dbus_message_iter_close_container(iter, &data);
6260 }
6261
6262 static void add_scan_frequencies(DBusMessageIter *iter,
6263                                                 void *user_data)
6264 {
6265         GSupplicantScanParams *scan_data = user_data;
6266         unsigned int freq;
6267         int i;
6268
6269         for (i = 0; i < scan_data->num_freqs; i++) {
6270                 freq = scan_data->freqs[i];
6271                 if (!freq)
6272                         break;
6273
6274                 add_scan_frequency(iter, freq);
6275         }
6276 }
6277
6278 static void append_ssid(DBusMessageIter *iter,
6279                         const void *ssid, unsigned int len)
6280 {
6281         DBusMessageIter array;
6282
6283         dbus_message_iter_open_container(iter, DBUS_TYPE_ARRAY,
6284         DBUS_TYPE_BYTE_AS_STRING, &array);
6285
6286         dbus_message_iter_append_fixed_array(&array, DBUS_TYPE_BYTE,
6287                                                                 &ssid, len);
6288         dbus_message_iter_close_container(iter, &array);
6289 }
6290
6291 static void append_ssids(DBusMessageIter *iter, void *user_data)
6292 {
6293         GSupplicantScanParams *scan_data = user_data;
6294         GSList *list;
6295
6296         for (list = scan_data->ssids; list; list = list->next) {
6297                 struct scan_ssid *scan_ssid = list->data;
6298
6299                 append_ssid(iter, scan_ssid->ssid, scan_ssid->ssid_len);
6300         }
6301 }
6302
6303 static void supplicant_add_scan_frequency(DBusMessageIter *dict,
6304                 supplicant_dbus_array_function function,
6305                                         void *user_data)
6306 {
6307         GSupplicantScanParams *scan_params = user_data;
6308         DBusMessageIter entry, value, array;
6309         const char *key = "Channels";
6310
6311         if (scan_params->freqs && scan_params->freqs[0] != 0) {
6312                 dbus_message_iter_open_container(dict, DBUS_TYPE_DICT_ENTRY,
6313                                                 NULL, &entry);
6314
6315                 dbus_message_iter_append_basic(&entry, DBUS_TYPE_STRING, &key);
6316
6317                 dbus_message_iter_open_container(&entry, DBUS_TYPE_VARIANT,
6318                                         DBUS_TYPE_ARRAY_AS_STRING
6319                                         DBUS_STRUCT_BEGIN_CHAR_AS_STRING
6320                                         DBUS_TYPE_UINT32_AS_STRING
6321                                         DBUS_TYPE_UINT32_AS_STRING
6322                                         DBUS_STRUCT_END_CHAR_AS_STRING,
6323                                         &value);
6324
6325                 dbus_message_iter_open_container(&value, DBUS_TYPE_ARRAY,
6326                                         DBUS_STRUCT_BEGIN_CHAR_AS_STRING
6327                                         DBUS_TYPE_UINT32_AS_STRING
6328                                         DBUS_TYPE_UINT32_AS_STRING
6329                                         DBUS_STRUCT_END_CHAR_AS_STRING,
6330                                         &array);
6331
6332                 if (function)
6333                         function(&array, user_data);
6334
6335                 dbus_message_iter_close_container(&value, &array);
6336                 dbus_message_iter_close_container(&entry, &value);
6337                 dbus_message_iter_close_container(dict, &entry);
6338         }
6339 }
6340
6341 static void interface_scan_params(DBusMessageIter *iter, void *user_data)
6342 {
6343         DBusMessageIter dict;
6344         const char *type = "passive";
6345         struct interface_scan_data *data = user_data;
6346
6347         supplicant_dbus_dict_open(iter, &dict);
6348
6349         if (data && data->scan_params) {
6350                 type = "active";
6351
6352                 supplicant_dbus_dict_append_basic(&dict, "Type",
6353                                         DBUS_TYPE_STRING, &type);
6354
6355 #if defined TIZEN_EXT
6356                 SUPPLICANT_DBG("[specific_scan] num_ssids %d",
6357                                data->scan_params->num_ssids);
6358 #endif
6359
6360                 if (data->scan_params->ssids) {
6361                         supplicant_dbus_dict_append_array(&dict, "SSIDs",
6362                                                         DBUS_TYPE_STRING,
6363                                                         append_ssids,
6364                                                         data->scan_params);
6365                 }
6366                 supplicant_add_scan_frequency(&dict, add_scan_frequencies,
6367                                                 data->scan_params);
6368         } else
6369                 supplicant_dbus_dict_append_basic(&dict, "Type",
6370                                         DBUS_TYPE_STRING, &type);
6371
6372         supplicant_dbus_dict_close(iter, &dict);
6373 }
6374
6375 static int interface_ready_to_scan(GSupplicantInterface *interface)
6376 {
6377         if (!interface)
6378                 return -EINVAL;
6379
6380         if (!system_available)
6381                 return -EFAULT;
6382
6383         if (interface->scanning)
6384                 return -EALREADY;
6385
6386         switch (interface->state) {
6387         case G_SUPPLICANT_STATE_AUTHENTICATING:
6388         case G_SUPPLICANT_STATE_ASSOCIATING:
6389         case G_SUPPLICANT_STATE_ASSOCIATED:
6390         case G_SUPPLICANT_STATE_4WAY_HANDSHAKE:
6391         case G_SUPPLICANT_STATE_GROUP_HANDSHAKE:
6392                 return -EBUSY;
6393 #if defined TIZEN_EXT
6394         case G_SUPPLICANT_STATE_DISABLED:
6395                 return -ENOLINK;
6396         case G_SUPPLICANT_STATE_UNKNOWN:
6397 #else
6398         case G_SUPPLICANT_STATE_UNKNOWN:
6399         case G_SUPPLICANT_STATE_DISABLED:
6400 #endif
6401         case G_SUPPLICANT_STATE_DISCONNECTED:
6402         case G_SUPPLICANT_STATE_INACTIVE:
6403         case G_SUPPLICANT_STATE_SCANNING:
6404         case G_SUPPLICANT_STATE_COMPLETED:
6405                 break;
6406         }
6407
6408         return 0;
6409 }
6410
6411 #if defined TIZEN_EXT_WIFI_MESH
6412 static void interface_abort_scan_result(const char *error,
6413                                 DBusMessageIter *iter, void *user_data)
6414 {
6415         struct interface_scan_data *data = user_data;
6416         int err = 0;
6417
6418         if (error) {
6419                 SUPPLICANT_DBG("error %s", error);
6420                 err = -EIO;
6421         }
6422
6423         g_free(data->path);
6424
6425                 if (data->callback)
6426                         data->callback(err, data->interface, data->user_data);
6427
6428         dbus_free(data);
6429 }
6430
6431 int g_supplicant_interface_abort_scan(GSupplicantInterface *interface,
6432                                 GSupplicantInterfaceCallback callback, void *user_data)
6433 {
6434         struct interface_scan_data *data;
6435         int ret;
6436
6437         if (!interface->scanning)
6438                 return -EEXIST;
6439
6440         data = dbus_malloc0(sizeof(*data));
6441         if (!data)
6442                 return -ENOMEM;
6443
6444         data->interface = interface;
6445         data->path = g_strdup(interface->path);
6446         data->callback = callback;
6447         data->user_data = user_data;
6448
6449         ret = supplicant_dbus_method_call(interface->path,
6450                         SUPPLICANT_INTERFACE ".Interface", "AbortScan", NULL,
6451                         interface_abort_scan_result, data, interface);
6452
6453         if (ret < 0) {
6454                 g_free(data->path);
6455                 dbus_free(data);
6456         }
6457
6458         return ret;
6459 }
6460 #endif
6461
6462 int g_supplicant_interface_scan(GSupplicantInterface *interface,
6463                                 GSupplicantScanParams *scan_data,
6464                                 GSupplicantInterfaceCallback callback,
6465                                                         void *user_data)
6466 {
6467         struct interface_scan_data *data;
6468         int ret;
6469
6470         ret = interface_ready_to_scan(interface);
6471         if (ret)
6472                 return ret;
6473
6474         data = dbus_malloc0(sizeof(*data));
6475         if (!data)
6476                 return -ENOMEM;
6477
6478         data->interface = interface;
6479         data->path = g_strdup(interface->path);
6480 #if defined TIZEN_EXT
6481         data->interface->scan_callback = data->callback = callback;
6482         data->interface->scan_data = data->user_data = user_data;
6483 #else
6484         data->callback = callback;
6485         data->user_data = user_data;
6486 #endif
6487         data->scan_params = scan_data;
6488
6489         interface->scan_callback = callback;
6490         interface->scan_data = user_data;
6491
6492         ret = supplicant_dbus_method_call(interface->path,
6493                         SUPPLICANT_INTERFACE ".Interface", "Scan",
6494                         interface_scan_params, interface_scan_result, data,
6495                         interface);
6496
6497         if (ret < 0) {
6498                 g_free(data->path);
6499                 dbus_free(data);
6500         }
6501
6502         return ret;
6503 }
6504
6505 #if defined TIZEN_EXT
6506 static void interface_signalpoll_result(const char *error,
6507                                 DBusMessageIter *iter, void *user_data)
6508 {
6509         struct interface_signalpoll_data *data = user_data;
6510         int err = 0;
6511         dbus_int32_t maxspeed = 0;
6512         dbus_int32_t strength = 0;
6513         dbus_int32_t snr = 0;
6514         DBusMessageIter sub_iter, dict;
6515
6516         if (error) {
6517                 err = -EIO;
6518                 SUPPLICANT_DBG("error: %s", error);
6519                 goto out;
6520         }
6521
6522         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_VARIANT) {
6523                 err = -EINVAL;
6524                 SUPPLICANT_DBG("invalid reply");
6525                 goto out;
6526         }
6527
6528         dbus_message_iter_recurse(iter, &sub_iter);
6529         dbus_message_iter_recurse(&sub_iter, &dict);
6530
6531         while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_DICT_ENTRY) {
6532                 DBusMessageIter entry, value;
6533                 const char *key;
6534
6535                 dbus_message_iter_recurse(&dict, &entry);
6536                 dbus_message_iter_get_basic(&entry, &key);
6537                 dbus_message_iter_next(&entry);
6538                 dbus_message_iter_recurse(&entry, &value);
6539
6540                 switch (dbus_message_iter_get_arg_type(&value)) {
6541                 case DBUS_TYPE_INT32:
6542                         if (g_strcmp0(key, "linkspeed") == 0) {
6543                                 dbus_message_iter_get_basic(&value, &maxspeed);
6544                                 SUPPLICANT_DBG("linkspeed = %d", maxspeed);
6545                                 break;
6546                         } else if (g_strcmp0(key, "rssi") == 0) {
6547                                 dbus_message_iter_get_basic(&value, &strength);
6548                                 SUPPLICANT_DBG("Strength = %d", strength);
6549                                 break;
6550                         } else if (g_strcmp0(key, "SNR") == 0) {
6551                                 dbus_message_iter_get_basic(&value, &snr);
6552                                 SUPPLICANT_DBG("SNR = %d", snr);
6553                                 break;
6554                         }
6555                 }
6556                 dbus_message_iter_next(&dict);
6557         }
6558
6559 out:
6560         if(data->callback)
6561                 data->callback(err, maxspeed, strength, snr, data->user_data);
6562
6563         g_free(data->path);
6564         dbus_free(data);
6565 }
6566
6567 int g_supplicant_interface_signalpoll(GSupplicantInterface *interface,
6568                                 GSupplicantMaxSpeedCallback callback,
6569                                 void *user_data)
6570 {
6571         struct interface_signalpoll_data *data;
6572         int ret;
6573
6574         if (!interface)
6575                 return -EINVAL;
6576
6577         if (!system_available)
6578                 return -EFAULT;
6579
6580         data = dbus_malloc0(sizeof(*data));
6581         if (!data)
6582                 return -ENOMEM;
6583
6584         data->interface = interface;
6585         data->path = g_strdup(interface->path);
6586         data->callback = callback;
6587         data->user_data = user_data;
6588
6589         ret = supplicant_dbus_method_call(interface->path,
6590                         SUPPLICANT_INTERFACE ".Interface", "SignalPoll",
6591                         NULL, interface_signalpoll_result, data,
6592                         interface);
6593
6594         if (ret < 0) {
6595                 g_free(data->path);
6596                 dbus_free(data);
6597         }
6598
6599         return ret;
6600 }
6601 #endif
6602
6603 static int parse_supplicant_error(DBusMessageIter *iter)
6604 {
6605         int err = -ECONNABORTED;
6606         char *key;
6607
6608         if (!iter)
6609                 return err;
6610
6611         /* If the given passphrase is malformed wpa_s returns
6612          * "invalid message format" but this error should be interpreted as
6613          * invalid-key.
6614          */
6615         while (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_STRING) {
6616                 dbus_message_iter_get_basic(iter, &key);
6617                 if (strncmp(key, "psk", 3) == 0 ||
6618                                 strncmp(key, "wep_key", 7) == 0 ||
6619                                 strcmp(key, "invalid message format") == 0) {
6620                         err = -ENOKEY;
6621                         break;
6622                 }
6623                 dbus_message_iter_next(iter);
6624         }
6625
6626         return err;
6627 }
6628
6629 static void interface_select_network_result(const char *error,
6630                                 DBusMessageIter *iter, void *user_data)
6631 {
6632         struct interface_connect_data *data = user_data;
6633         int err;
6634
6635         SUPPLICANT_DBG("");
6636
6637         err = 0;
6638         if (error) {
6639 #if defined TIZEN_EXT
6640                 SUPPLICANT_DBG("SelectNetwork errorFreq %s", error);
6641 #else
6642                 SUPPLICANT_DBG("SelectNetwork error %s", error);
6643 #endif
6644                 err = parse_supplicant_error(iter);
6645         }
6646
6647         g_free(data->path);
6648
6649         if (data->callback)
6650                 data->callback(err, data->interface, data->user_data);
6651
6652 #if defined TIZEN_EXT
6653         g_free(data->ssid->ssid);
6654         g_free((char *)data->ssid->passphrase);
6655         g_free((char *)data->ssid->connector);
6656         g_free((char *)data->ssid->c_sign_key);
6657         g_free((char *)data->ssid->net_access_key);
6658 #endif
6659         g_free(data->ssid);
6660         dbus_free(data);
6661 }
6662
6663 static void interface_select_network_params(DBusMessageIter *iter,
6664                                                         void *user_data)
6665 {
6666         struct interface_connect_data *data = user_data;
6667         GSupplicantInterface *interface = data->interface;
6668 #if defined TIZEN_EXT
6669         GSupplicantSSID *ssid = data->ssid;
6670 #endif
6671
6672         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
6673                                         &interface->network_path);
6674 #if defined TIZEN_EXT
6675         if (!ssid->bssid_for_connect_len)
6676                 dbus_message_iter_append_basic(iter, DBUS_TYPE_INT32, &ssid->freq);
6677 #endif
6678 }
6679
6680 static void interface_add_network_result(const char *error,
6681                                 DBusMessageIter *iter, void *user_data)
6682 {
6683         struct interface_connect_data *data = user_data;
6684         GSupplicantInterface *interface = data->interface;
6685         const char *path;
6686         int err;
6687
6688         if (error)
6689                 goto error;
6690
6691         dbus_message_iter_get_basic(iter, &path);
6692         if (!path)
6693                 goto error;
6694
6695         SUPPLICANT_DBG("PATH: %s", path);
6696
6697 #if defined TIZEN_EXT
6698         if (interface->network_path)
6699                 g_free(interface->network_path);
6700 #endif
6701         interface->network_path = g_strdup(path);
6702
6703         store_network_information(interface, data->ssid);
6704
6705 #if defined TIZEN_EXT
6706         SUPPLICANT_DBG(".Interface.SelectNetworkFreq");
6707         GSupplicantSSID *ssid = data->ssid;
6708
6709         if (!ssid->bssid_for_connect_len)
6710                 supplicant_dbus_method_call(data->interface->path,
6711                                 SUPPLICANT_INTERFACE ".Interface", "SelectNetworkFreq",
6712                                 interface_select_network_params,
6713                                 interface_select_network_result, data,
6714                                 interface);
6715         else
6716                 supplicant_dbus_method_call(data->interface->path,
6717                                 SUPPLICANT_INTERFACE ".Interface", "SelectNetwork",
6718                                 interface_select_network_params,
6719                                 interface_select_network_result, data,
6720                                 interface);
6721 #else
6722         supplicant_dbus_method_call(data->interface->path,
6723                         SUPPLICANT_INTERFACE ".Interface", "SelectNetwork",
6724                         interface_select_network_params,
6725                         interface_select_network_result, data,
6726                         interface);
6727 #endif
6728
6729         return;
6730
6731 error:
6732         SUPPLICANT_DBG("AddNetwork error %s", error);
6733
6734         if (interface_exists(data->interface, data->interface->path)) {
6735                 err = parse_supplicant_error(iter);
6736                 if (data->callback)
6737                         data->callback(err, data->interface, data->user_data);
6738
6739                 g_free(interface->network_path);
6740                 interface->network_path = NULL;
6741         }
6742
6743         g_free(data->path);
6744 #if defined TIZEN_EXT
6745         g_free(data->ssid->ssid);
6746         g_free((char *)data->ssid->passphrase);
6747         g_free((char *)data->ssid->connector);
6748         g_free((char *)data->ssid->c_sign_key);
6749         g_free((char *)data->ssid->net_access_key);
6750 #endif
6751         g_free(data->ssid);
6752         g_free(data);
6753 }
6754
6755 static void add_network_security_none(DBusMessageIter *dict)
6756 {
6757         const char *auth_alg = "OPEN";
6758
6759         supplicant_dbus_dict_append_basic(dict, "auth_alg",
6760                                         DBUS_TYPE_STRING, &auth_alg);
6761 }
6762
6763 static void add_network_security_wep(DBusMessageIter *dict,
6764                                         GSupplicantSSID *ssid)
6765 {
6766         const char *auth_alg = "OPEN SHARED";
6767         dbus_uint32_t key_index = 0;
6768
6769         supplicant_dbus_dict_append_basic(dict, "auth_alg",
6770                                         DBUS_TYPE_STRING, &auth_alg);
6771
6772         if (ssid->passphrase) {
6773                 int size = strlen(ssid->passphrase);
6774                 if (size == 10 || size == 26) {
6775                         unsigned char *key = g_try_malloc(13);
6776                         char tmp[3];
6777                         int i;
6778
6779                         memset(tmp, 0, sizeof(tmp));
6780                         if (!key)
6781                                 size = 0;
6782
6783                         for (i = 0; i < size / 2; i++) {
6784                                 memcpy(tmp, ssid->passphrase + (i * 2), 2);
6785                                 key[i] = (unsigned char) strtol(tmp, NULL, 16);
6786                         }
6787
6788                         supplicant_dbus_dict_append_fixed_array(dict,
6789                                                         "wep_key0",
6790                                                         DBUS_TYPE_BYTE,
6791                                                         &key, size / 2);
6792                         g_free(key);
6793                 } else if (size == 5 || size == 13) {
6794                         unsigned char *key = g_try_malloc(13);
6795                         int i;
6796
6797                         if (!key)
6798                                 size = 0;
6799
6800                         for (i = 0; i < size; i++)
6801                                 key[i] = (unsigned char) ssid->passphrase[i];
6802
6803                         supplicant_dbus_dict_append_fixed_array(dict,
6804                                                                 "wep_key0",
6805                                                                 DBUS_TYPE_BYTE,
6806                                                                 &key, size);
6807                         g_free(key);
6808                 } else
6809                         supplicant_dbus_dict_append_basic(dict,
6810                                                         "wep_key0",
6811                                                         DBUS_TYPE_STRING,
6812                                                         &ssid->passphrase);
6813
6814                 supplicant_dbus_dict_append_basic(dict, "wep_tx_keyidx",
6815                                         DBUS_TYPE_UINT32, &key_index);
6816         }
6817 }
6818
6819 static dbus_bool_t is_psk_raw_key(const char *psk)
6820 {
6821         int i;
6822
6823         /* A raw key is always 64 bytes length... */
6824         if (strlen(psk) != 64)
6825                 return FALSE;
6826
6827         /* ... and its content is in hex representation */
6828         for (i = 0; i < 64; i++)
6829                 if (!isxdigit((unsigned char) psk[i]))
6830                         return FALSE;
6831
6832         return TRUE;
6833 }
6834
6835 static unsigned char hexchar2bin(char c)
6836 {
6837         if ((c >= '0') && (c <= '9'))
6838                 return c - '0';
6839         else if ((c >= 'A') && (c <= 'F'))
6840                 return c - 'A' + 10;
6841         else if ((c >= 'a') && (c <= 'f'))
6842                 return c - 'a' + 10;
6843         else
6844                 return c;
6845 }
6846
6847 static void hexstring2bin(const char *string, unsigned char *data,
6848                                 size_t data_len)
6849 {
6850         size_t i;
6851
6852         for (i = 0; i < data_len; i++)
6853                 data[i] = (hexchar2bin(string[i * 2 + 0]) << 4 |
6854                            hexchar2bin(string[i * 2 + 1]) << 0);
6855 }
6856
6857 static void add_network_security_psk(DBusMessageIter *dict,
6858                                         GSupplicantSSID *ssid)
6859 {
6860         if (ssid->passphrase && strlen(ssid->passphrase) > 0) {
6861                 const char *key = "psk";
6862
6863                 if (is_psk_raw_key(ssid->passphrase)) {
6864                         unsigned char data[32];
6865                         unsigned char *datap = data;
6866
6867                         /* The above pointer alias is required by D-Bus because
6868                          * with D-Bus and GCC, non-heap-allocated arrays cannot
6869                          * be passed directly by their base pointer. */
6870
6871                         hexstring2bin(ssid->passphrase, datap, sizeof(data));
6872
6873                         supplicant_dbus_dict_append_fixed_array(dict,
6874                                                         key, DBUS_TYPE_BYTE,
6875                                                         &datap, sizeof(data));
6876                 } else
6877                         supplicant_dbus_dict_append_basic(dict,
6878                                                         key, DBUS_TYPE_STRING,
6879                                                         &ssid->passphrase);
6880         }
6881 }
6882
6883 static void add_network_security_tls(DBusMessageIter *dict,
6884                                         GSupplicantSSID *ssid)
6885 {
6886         /*
6887          * For TLS, we at least need:
6888          *              The client certificate
6889          *              The client private key file
6890          *              The client private key file password
6891          *
6892          * The Authority certificate is optional.
6893          */
6894         if (!ssid->client_cert_path)
6895                 return;
6896
6897         if (!ssid->private_key_path)
6898                 return;
6899
6900         if (!ssid->private_key_passphrase)
6901                 return;
6902
6903         if (ssid->ca_cert_path)
6904                 supplicant_dbus_dict_append_basic(dict, "ca_cert",
6905                                         DBUS_TYPE_STRING, &ssid->ca_cert_path);
6906
6907         supplicant_dbus_dict_append_basic(dict, "private_key",
6908                                                 DBUS_TYPE_STRING,
6909                                                 &ssid->private_key_path);
6910         supplicant_dbus_dict_append_basic(dict, "private_key_passwd",
6911                                                 DBUS_TYPE_STRING,
6912                                                 &ssid->private_key_passphrase);
6913         supplicant_dbus_dict_append_basic(dict, "client_cert",
6914                                                 DBUS_TYPE_STRING,
6915                                                 &ssid->client_cert_path);
6916 }
6917
6918 static void add_network_security_peap(DBusMessageIter *dict,
6919                                         GSupplicantSSID *ssid)
6920 {
6921         char *phase2_auth;
6922
6923         /*
6924          * For PEAP/TTLS, we at least need
6925          *              The authority certificate
6926          *              The 2nd phase authentication method
6927          *              The 2nd phase passphrase
6928          *
6929          * The Client certificate is optional although strongly recommended
6930          * When setting it, we need in addition
6931          *              The Client private key file
6932          *              The Client private key file password
6933          */
6934         if (!ssid->passphrase)
6935                 return;
6936
6937         if (!ssid->phase2_auth)
6938                 return;
6939
6940         if (ssid->client_cert_path) {
6941                 if (!ssid->private_key_path)
6942                         return;
6943
6944 #if !defined TIZEN_EXT
6945                 if (!ssid->private_key_passphrase)
6946                         return;
6947 #endif
6948
6949                 supplicant_dbus_dict_append_basic(dict, "client_cert",
6950                                                 DBUS_TYPE_STRING,
6951                                                 &ssid->client_cert_path);
6952
6953                 supplicant_dbus_dict_append_basic(dict, "private_key",
6954                                                 DBUS_TYPE_STRING,
6955                                                 &ssid->private_key_path);
6956
6957 #if !defined TIZEN_EXT
6958                 supplicant_dbus_dict_append_basic(dict, "private_key_passwd",
6959                                                 DBUS_TYPE_STRING,
6960                                                 &ssid->private_key_passphrase);
6961 #endif
6962
6963         }
6964
6965         if(g_strcmp0(ssid->phase2_auth, "GTC") == 0 && g_strcmp0(ssid->eap, "ttls") == 0)
6966                 phase2_auth = g_strdup_printf("autheap=%s", ssid->phase2_auth);
6967         else if (g_str_has_prefix(ssid->phase2_auth, "EAP-")) {
6968                 phase2_auth = g_strdup_printf("autheap=%s",
6969                                         ssid->phase2_auth + strlen("EAP-"));
6970         } else
6971                 phase2_auth = g_strdup_printf("auth=%s", ssid->phase2_auth);
6972
6973         supplicant_dbus_dict_append_basic(dict, "password",
6974                                                 DBUS_TYPE_STRING,
6975                                                 &ssid->passphrase);
6976
6977         if (ssid->ca_cert_path)
6978                 supplicant_dbus_dict_append_basic(dict, "ca_cert",
6979                                                 DBUS_TYPE_STRING,
6980                                                 &ssid->ca_cert_path);
6981
6982         supplicant_dbus_dict_append_basic(dict, "phase2",
6983                                                 DBUS_TYPE_STRING,
6984                                                 &phase2_auth);
6985
6986         g_free(phase2_auth);
6987 }
6988
6989 #if defined TIZEN_EXT
6990 static void add_network_security_aka_sim(DBusMessageIter *dict,
6991                                         GSupplicantSSID *ssid)
6992 {
6993         if (!ssid->passphrase)
6994                 return;
6995
6996         supplicant_dbus_dict_append_basic(dict, "password",
6997                         DBUS_TYPE_STRING,
6998                         &ssid->passphrase);
6999 }
7000
7001 static void add_network_security_fast(DBusMessageIter *dict,
7002                 GSupplicantSSID *ssid)
7003 {
7004         /*
7005          * For FAST, we at least need:
7006          *              id / password
7007          *              phase1 (provisiong information)
7008          *              pac_file
7009          */
7010
7011         /* Allow provisioing both authenticated and unauthenticated */
7012         const char *phase1 = "fast_provisioning=2";
7013         supplicant_dbus_dict_append_basic(dict, "phase1",
7014                         DBUS_TYPE_STRING,
7015                         &phase1);
7016
7017         SUPPLICANT_DBG("pac_file [%s]", ssid->pac_file);
7018         if(ssid->pac_file)
7019                 supplicant_dbus_dict_append_basic(dict, "pac_file",
7020                                 DBUS_TYPE_STRING,
7021                                 &ssid->pac_file);
7022
7023         supplicant_dbus_dict_append_basic(dict, "password",
7024                         DBUS_TYPE_STRING,
7025                         &ssid->passphrase);
7026 }
7027 #endif
7028
7029 static void add_network_security_eap(DBusMessageIter *dict,
7030                                         GSupplicantSSID *ssid)
7031 {
7032         char *eap_value;
7033
7034 #if defined TIZEN_EXT
7035         if (!ssid->eap)
7036 #else
7037         if (!ssid->eap || !ssid->identity)
7038 #endif
7039                 return;
7040
7041         if (g_strcmp0(ssid->eap, "tls") == 0) {
7042                 add_network_security_tls(dict, ssid);
7043         } else if (g_strcmp0(ssid->eap, "peap") == 0 ||
7044                                 g_strcmp0(ssid->eap, "ttls") == 0) {
7045 #if defined TIZEN_EXT
7046                 if (!ssid->identity)
7047                         return;
7048 #endif
7049                 add_network_security_peap(dict, ssid);
7050
7051 #if defined TIZEN_EXT
7052         } else if (g_strcmp0(ssid->eap, "sim") == 0 ||
7053                         g_strcmp0(ssid->eap, "aka") == 0 ||
7054                         g_strcmp0(ssid->eap, "aka'") == 0) {
7055                 add_network_security_aka_sim(dict, ssid);
7056         } else if (g_strcmp0(ssid->eap, "pwd") == 0) {
7057                 if(!ssid->passphrase)
7058                         return;
7059                 supplicant_dbus_dict_append_basic(dict, "password",
7060                                 DBUS_TYPE_STRING,
7061                                 &ssid->passphrase);
7062         } else if (g_strcmp0(ssid->eap, "fast") == 0){
7063                 if (!ssid->identity || !ssid->passphrase)
7064                         return;
7065
7066                 add_network_security_fast(dict, ssid);
7067 #endif
7068         } else
7069                 return;
7070
7071         eap_value = g_ascii_strup(ssid->eap, -1);
7072
7073         supplicant_dbus_dict_append_basic(dict, "eap",
7074                                                 DBUS_TYPE_STRING,
7075                                                 &eap_value);
7076 #if defined TIZEN_EXT
7077         if (ssid->identity != NULL)
7078                 supplicant_dbus_dict_append_basic(dict, "identity",
7079                                                         DBUS_TYPE_STRING,
7080                                                         &ssid->identity);
7081 #else
7082         supplicant_dbus_dict_append_basic(dict, "identity",
7083                                                 DBUS_TYPE_STRING,
7084                                                 &ssid->identity);
7085 #endif
7086         if(ssid->anonymous_identity)
7087                 supplicant_dbus_dict_append_basic(dict, "anonymous_identity",
7088                                                      DBUS_TYPE_STRING,
7089                                                      &ssid->anonymous_identity);
7090
7091         if(ssid->subject_match)
7092                 supplicant_dbus_dict_append_basic(dict, "subject_match",
7093                                                      DBUS_TYPE_STRING,
7094                                                      &ssid->subject_match);
7095
7096         if(ssid->altsubject_match)
7097                 supplicant_dbus_dict_append_basic(dict, "altsubject_match",
7098                                                      DBUS_TYPE_STRING,
7099                                                      &ssid->altsubject_match);
7100
7101         if(ssid->domain_suffix_match)
7102                 supplicant_dbus_dict_append_basic(dict, "domain_suffix_match",
7103                                                      DBUS_TYPE_STRING,
7104                                                      &ssid->domain_suffix_match);
7105
7106         if(ssid->domain_match)
7107                 supplicant_dbus_dict_append_basic(dict, "domain_match",
7108                                                      DBUS_TYPE_STRING,
7109                                                      &ssid->domain_match);
7110
7111         g_free(eap_value);
7112 }
7113
7114 static void add_network_security_ciphers(DBusMessageIter *dict,
7115                                                 GSupplicantSSID *ssid)
7116 {
7117         unsigned int p_cipher, g_cipher, i;
7118         char *pairwise, *group;
7119         char *pair_ciphers[4];
7120         char *group_ciphers[5];
7121
7122         p_cipher = ssid->pairwise_cipher;
7123         g_cipher = ssid->group_cipher;
7124
7125         if (p_cipher == 0 && g_cipher == 0)
7126                 return;
7127
7128         i = 0;
7129
7130         if (p_cipher & G_SUPPLICANT_PAIRWISE_CCMP)
7131                 pair_ciphers[i++] = "CCMP";
7132
7133         if (p_cipher & G_SUPPLICANT_PAIRWISE_TKIP)
7134                 pair_ciphers[i++] = "TKIP";
7135
7136         if (p_cipher & G_SUPPLICANT_PAIRWISE_NONE)
7137                 pair_ciphers[i++] = "NONE";
7138
7139         pair_ciphers[i] = NULL;
7140
7141         i = 0;
7142
7143         if (g_cipher & G_SUPPLICANT_GROUP_CCMP)
7144                 group_ciphers[i++] = "CCMP";
7145
7146         if (g_cipher & G_SUPPLICANT_GROUP_TKIP)
7147                 group_ciphers[i++] = "TKIP";
7148
7149         if (g_cipher & G_SUPPLICANT_GROUP_WEP104)
7150                 group_ciphers[i++] = "WEP104";
7151
7152         if (g_cipher & G_SUPPLICANT_GROUP_WEP40)
7153                 group_ciphers[i++] = "WEP40";
7154
7155         group_ciphers[i] = NULL;
7156
7157         pairwise = g_strjoinv(" ", pair_ciphers);
7158         group = g_strjoinv(" ", group_ciphers);
7159
7160         SUPPLICANT_DBG("cipher %s %s", pairwise, group);
7161
7162         supplicant_dbus_dict_append_basic(dict, "pairwise",
7163                                                 DBUS_TYPE_STRING,
7164                                                 &pairwise);
7165         supplicant_dbus_dict_append_basic(dict, "group",
7166                                                 DBUS_TYPE_STRING,
7167                                                 &group);
7168
7169         g_free(pairwise);
7170         g_free(group);
7171 }
7172
7173 static void add_network_security_proto(DBusMessageIter *dict,
7174                                                 GSupplicantSSID *ssid)
7175 {
7176         unsigned int protocol, i;
7177         char *proto;
7178         char *protos[3];
7179
7180         protocol = ssid->protocol;
7181
7182         if (protocol == 0)
7183                 return;
7184
7185         i = 0;
7186
7187         if (protocol & G_SUPPLICANT_PROTO_RSN)
7188                 protos[i++] = "RSN";
7189
7190         if (protocol & G_SUPPLICANT_PROTO_WPA)
7191                 protos[i++] = "WPA";
7192
7193         protos[i] = NULL;
7194
7195         proto = g_strjoinv(" ", protos);
7196
7197         SUPPLICANT_DBG("proto %s", proto);
7198
7199         supplicant_dbus_dict_append_basic(dict, "proto",
7200                                                 DBUS_TYPE_STRING,
7201                                                 &proto);
7202
7203         g_free(proto);
7204 }
7205
7206 #if defined TIZEN_EXT
7207 static void add_network_ieee80211w(DBusMessageIter *dict, GSupplicantSSID *ssid)
7208 {
7209         if (ssid->security != G_SUPPLICANT_SECURITY_SAE
7210                         && ssid->security != G_SUPPLICANT_SECURITY_OWE
7211                         && ssid->security != G_SUPPLICANT_SECURITY_DPP)
7212                 return;
7213
7214         supplicant_dbus_dict_append_basic(dict, "ieee80211w", DBUS_TYPE_UINT32,
7215                                           &ssid->ieee80211w);
7216 }
7217
7218 static void add_network_security_connector(DBusMessageIter *dict, GSupplicantSSID *ssid)
7219 {
7220         if (ssid->connector && strlen(ssid->connector) > 0) {
7221                 const char *key = "dpp_connector";
7222
7223                 supplicant_dbus_dict_append_basic(dict,
7224                                 key, DBUS_TYPE_STRING,
7225                                 &ssid->connector);
7226         }
7227 }
7228
7229 static size_t convert_hexstr_to_bin(const char *hex_str, unsigned char **bin)
7230 {
7231         unsigned char *bin_res = NULL;
7232         unsigned int i, j, hex;
7233         size_t hex_str_len;
7234
7235         if (!hex_str || strlen(hex_str) == 0)
7236                 return 0;
7237
7238         hex_str_len = strlen(hex_str);
7239         bin_res = g_try_malloc0(hex_str_len / 2);
7240         if (!bin_res)
7241                 return 0;
7242
7243         j = 0;
7244         for (i = 0; i < hex_str_len; i+=2) {
7245                 sscanf(hex_str + i, "%02x", &hex);
7246                 bin_res[j++] = hex;
7247         }
7248
7249         *bin = bin_res;
7250         return hex_str_len / 2;
7251 }
7252
7253 static void add_network_security_c_sign_key(DBusMessageIter *dict, GSupplicantSSID *ssid)
7254 {
7255         if (ssid->c_sign_key && strlen(ssid->c_sign_key) > 0) {
7256                 const char *key = "dpp_csign";
7257                 unsigned char *bin_csign = NULL;
7258                 size_t bin_csign_len = convert_hexstr_to_bin(ssid->c_sign_key, &bin_csign);
7259                 if  (bin_csign_len != 0)
7260                         supplicant_dbus_dict_append_fixed_array(dict,
7261                                         key, DBUS_TYPE_BYTE,
7262                                         &bin_csign, bin_csign_len);
7263                 g_free(bin_csign);
7264         }
7265 }
7266
7267 static void add_network_security_net_access_key(DBusMessageIter *dict, GSupplicantSSID *ssid)
7268 {
7269         if (ssid->net_access_key && strlen(ssid->net_access_key) > 0) {
7270                 const char *key = "dpp_netaccesskey";
7271                 unsigned char *bin_netaccesskey = NULL;
7272                 size_t bin_netaccesskey_len = convert_hexstr_to_bin(ssid->net_access_key, &bin_netaccesskey);
7273                 if  (bin_netaccesskey_len != 0)
7274                         supplicant_dbus_dict_append_fixed_array(dict,
7275                                         key, DBUS_TYPE_BYTE,
7276                                         &bin_netaccesskey, bin_netaccesskey_len);
7277                 g_free(bin_netaccesskey);
7278         }
7279 }
7280
7281 #endif
7282
7283 static void add_network_security(DBusMessageIter *dict, GSupplicantSSID *ssid)
7284 {
7285         char *key_mgmt;
7286
7287         switch (ssid->security) {
7288         case G_SUPPLICANT_SECURITY_NONE:
7289                 key_mgmt = "NONE";
7290                 add_network_security_none(dict);
7291                 add_network_security_ciphers(dict, ssid);
7292                 break;
7293         case G_SUPPLICANT_SECURITY_UNKNOWN:
7294         case G_SUPPLICANT_SECURITY_WEP:
7295                 key_mgmt = "NONE";
7296                 add_network_security_wep(dict, ssid);
7297                 add_network_security_ciphers(dict, ssid);
7298                 break;
7299         case G_SUPPLICANT_SECURITY_PSK:
7300                 key_mgmt = "WPA-PSK";
7301                 add_network_security_psk(dict, ssid);
7302                 add_network_security_ciphers(dict, ssid);
7303                 add_network_security_proto(dict, ssid);
7304                 break;
7305         case G_SUPPLICANT_SECURITY_IEEE8021X:
7306                 key_mgmt = "WPA-EAP";
7307                 add_network_security_eap(dict, ssid);
7308                 add_network_security_ciphers(dict, ssid);
7309                 add_network_security_proto(dict, ssid);
7310                 break;
7311 #if defined TIZEN_EXT
7312         case G_SUPPLICANT_SECURITY_FT_PSK:
7313                 key_mgmt = "FT-PSK";
7314                 add_network_security_psk(dict, ssid);
7315                 add_network_security_ciphers(dict, ssid);
7316                 add_network_security_proto(dict, ssid);
7317                 break;
7318         case G_SUPPLICANT_SECURITY_FT_IEEE8021X:
7319                 key_mgmt = "FT-EAP";
7320                 add_network_security_eap(dict, ssid);
7321                 add_network_security_ciphers(dict, ssid);
7322                 add_network_security_proto(dict, ssid);
7323                 break;
7324         case G_SUPPLICANT_SECURITY_SAE:
7325                 if (ssid->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_PSK)
7326                         key_mgmt = "SAE WPA-PSK"; // WFA (WPA3 & WPA2 Mixed -> WPA2 only)
7327                 else
7328                         key_mgmt = "SAE";
7329                 add_network_security_psk(dict, ssid);
7330                 break;
7331         case G_SUPPLICANT_SECURITY_OWE:
7332                 key_mgmt = "OWE";
7333                 add_network_security_ciphers(dict, ssid);
7334                 add_network_security_proto(dict, ssid);
7335                 break;
7336         case G_SUPPLICANT_SECURITY_DPP:
7337                 key_mgmt = "DPP";
7338                 add_network_security_connector(dict, ssid);
7339                 add_network_security_c_sign_key(dict, ssid);
7340                 add_network_security_net_access_key(dict, ssid);
7341                 break;
7342 #endif
7343         }
7344
7345         supplicant_dbus_dict_append_basic(dict, "key_mgmt",
7346                                 DBUS_TYPE_STRING, &key_mgmt);
7347 }
7348
7349 static void add_network_mode(DBusMessageIter *dict, GSupplicantSSID *ssid)
7350 {
7351         dbus_uint32_t mode;
7352
7353         switch (ssid->mode) {
7354         case G_SUPPLICANT_MODE_UNKNOWN:
7355         case G_SUPPLICANT_MODE_INFRA:
7356                 mode = 0;
7357                 break;
7358         case G_SUPPLICANT_MODE_IBSS:
7359                 mode = 1;
7360                 break;
7361         case G_SUPPLICANT_MODE_MASTER:
7362                 mode = 2;
7363                 break;
7364 #if defined TIZEN_EXT_WIFI_MESH
7365         case G_SUPPLICANT_MODE_MESH:
7366                 mode = 5;
7367                 break;
7368 #endif
7369         }
7370
7371         supplicant_dbus_dict_append_basic(dict, "mode",
7372                                 DBUS_TYPE_UINT32, &mode);
7373 }
7374
7375 static void interface_add_network_params(DBusMessageIter *iter, void *user_data)
7376 {
7377         DBusMessageIter dict;
7378         struct interface_connect_data *data = user_data;
7379         GSupplicantSSID *ssid = data->ssid;
7380 #if defined TIZEN_EXT
7381         GSupplicantInterface *interface = data->interface;
7382 #endif
7383
7384         supplicant_dbus_dict_open(iter, &dict);
7385
7386         if (ssid->scan_ssid)
7387                 supplicant_dbus_dict_append_basic(&dict, "scan_ssid",
7388                                          DBUS_TYPE_UINT32, &ssid->scan_ssid);
7389
7390         if (ssid->freq)
7391                 supplicant_dbus_dict_append_basic(&dict, "frequency",
7392                                          DBUS_TYPE_UINT32, &ssid->freq);
7393
7394         if (ssid->bgscan)
7395                 supplicant_dbus_dict_append_basic(&dict, "bgscan",
7396                                         DBUS_TYPE_STRING, &ssid->bgscan);
7397
7398         add_network_mode(&dict, ssid);
7399
7400         add_network_security(&dict, ssid);
7401
7402 #if defined TIZEN_EXT
7403         add_network_ieee80211w(&dict, ssid);
7404 #endif
7405
7406         supplicant_dbus_dict_append_fixed_array(&dict, "ssid",
7407                                         DBUS_TYPE_BYTE, &ssid->ssid,
7408                                                 ssid->ssid_len);
7409
7410 #if defined TIZEN_EXT
7411         bool owe_transition_mode = FALSE;
7412         if ((ssid->security == G_SUPPLICANT_SECURITY_OWE) && !(ssid->keymgmt & G_SUPPLICANT_KEYMGMT_OWE))
7413                 owe_transition_mode = TRUE;
7414
7415         if (ssid->bssid && !owe_transition_mode) {
7416                 char *bssid = NULL;
7417                 bssid = g_try_malloc0(18);
7418                 if (bssid == NULL) {
7419                         SUPPLICANT_DBG("memory allocation error");
7420                         supplicant_dbus_dict_close(iter, &dict);
7421                         return;
7422                 }
7423
7424                 if (ssid->bssid_for_connect_len) {
7425                         snprintf(bssid, 18, MACSTR, MAC2STR(ssid->bssid_for_connect));
7426                         memcpy(interface->add_network_bssid, ssid->bssid_for_connect, WIFI_BSSID_LEN_MAX);
7427                 } else {
7428                         snprintf(bssid, 18, MACSTR, MAC2STR(ssid->bssid));
7429                         memcpy(interface->add_network_bssid, ssid->bssid, WIFI_BSSID_LEN_MAX);
7430                 }
7431
7432                 SUPPLICANT_DBG("bssid [" MACSTR "]", MAC2STR(interface->add_network_bssid));
7433
7434                 supplicant_dbus_dict_append_basic(&dict, "bssid",
7435                                         DBUS_TYPE_STRING, &bssid);
7436                 g_free(bssid);
7437         }
7438 #endif
7439
7440         supplicant_dbus_dict_close(iter, &dict);
7441 }
7442
7443 static void interface_wps_start_result(const char *error,
7444                                 DBusMessageIter *iter, void *user_data)
7445 {
7446         struct interface_connect_data *data = user_data;
7447         int err;
7448
7449         SUPPLICANT_DBG("");
7450
7451         err = 0;
7452         if (error) {
7453                 SUPPLICANT_DBG("error: %s", error);
7454                 err = parse_supplicant_error(iter);
7455         }
7456
7457         if(data->callback)
7458                 data->callback(err, data->interface, data->user_data);
7459
7460         g_free(data->path);
7461         g_free(data->ssid);
7462         dbus_free(data);
7463 }
7464
7465 static void interface_add_wps_params(DBusMessageIter *iter, void *user_data)
7466 {
7467         struct interface_connect_data *data = user_data;
7468         GSupplicantSSID *ssid = data->ssid;
7469         const char *role = "enrollee", *type;
7470         DBusMessageIter dict;
7471
7472         SUPPLICANT_DBG("");
7473
7474         supplicant_dbus_dict_open(iter, &dict);
7475
7476         supplicant_dbus_dict_append_basic(&dict, "Role",
7477                                                 DBUS_TYPE_STRING, &role);
7478
7479         type = "pbc";
7480         if (ssid->pin_wps) {
7481                 type = "pin";
7482                 supplicant_dbus_dict_append_basic(&dict, "Pin",
7483                                         DBUS_TYPE_STRING, &ssid->pin_wps);
7484         }
7485
7486         supplicant_dbus_dict_append_basic(&dict, "Type",
7487                                         DBUS_TYPE_STRING, &type);
7488
7489 #if defined TIZEN_EXT
7490         if (ssid->bssid)
7491                 supplicant_dbus_dict_append_fixed_array(&dict, "Bssid",
7492                                                 DBUS_TYPE_BYTE, &ssid->bssid, 6);
7493 #endif
7494
7495         supplicant_dbus_dict_close(iter, &dict);
7496 }
7497
7498 static void wps_start(const char *error, DBusMessageIter *iter, void *user_data)
7499 {
7500         struct interface_connect_data *data = user_data;
7501
7502         SUPPLICANT_DBG("");
7503
7504         if (error) {
7505                 SUPPLICANT_DBG("error: %s", error);
7506                 g_free(data->path);
7507                 g_free(data->ssid);
7508                 dbus_free(data);
7509                 return;
7510         }
7511
7512 #if defined TIZEN_EXT
7513         GSupplicantSSID *ssid = data->ssid;
7514         if (ssid->pin_wps != NULL) {
7515                 if (!g_utf8_validate(ssid->pin_wps, 8, NULL)) {
7516                         SUPPLICANT_DBG("Invalid characters in WPS_PIN");
7517                         g_free(data->ssid);
7518                         dbus_free(data);
7519                         return;
7520                 }
7521         }
7522 #endif
7523         supplicant_dbus_method_call(data->interface->path,
7524                         SUPPLICANT_INTERFACE ".Interface.WPS", "Start",
7525                         interface_add_wps_params,
7526                         interface_wps_start_result, data, NULL);
7527 }
7528
7529 static void wps_process_credentials(DBusMessageIter *iter, void *user_data)
7530 {
7531         dbus_bool_t credentials = TRUE;
7532
7533         SUPPLICANT_DBG("");
7534
7535         dbus_message_iter_append_basic(iter, DBUS_TYPE_BOOLEAN, &credentials);
7536 }
7537
7538
7539 #if defined TIZEN_EXT
7540 #define NETCONFIG_SERVICE "net.netconfig"
7541 #define NETCONFIG_WIFI_PATH "/net/netconfig/wifi"
7542 #define NETCONFIG_WIFI_INTERFACE NETCONFIG_SERVICE ".wifi"
7543
7544 struct dec_method_call_data {
7545         struct interface_connect_data *data;
7546         DBusPendingCall *pending_call;
7547 };
7548
7549 static struct dec_method_call_data decrypt_request_data;
7550
7551 static void crypt_method_call_cancel(void)
7552 {
7553         if (decrypt_request_data.pending_call) {
7554                 dbus_pending_call_cancel(decrypt_request_data.pending_call);
7555                 dbus_pending_call_unref(decrypt_request_data.pending_call);
7556                 decrypt_request_data.pending_call = NULL;
7557         }
7558
7559         g_free(decrypt_request_data.data->path);
7560         g_free(decrypt_request_data.data->ssid);
7561         dbus_free(decrypt_request_data.data);
7562         decrypt_request_data.data = NULL;
7563 }
7564
7565 static void decryption_request_reply(DBusPendingCall *call,
7566                                                 void *user_data)
7567 {
7568         DBusMessage *reply;
7569         DBusError error;
7570         DBusMessageIter args;
7571         char *out_data;
7572         int ret;
7573         struct interface_connect_data *data = user_data;
7574
7575         SUPPLICANT_DBG("");
7576
7577         reply = dbus_pending_call_steal_reply(call);
7578
7579         dbus_error_init(&error);
7580         if (dbus_set_error_from_message(&error, reply)) {
7581                 SUPPLICANT_DBG("decryption_request_reply() %s %s", error.name, error.message);
7582                 dbus_error_free(&error);
7583                 ret = -EINVAL;
7584                 goto done;
7585         }
7586
7587         if (dbus_message_iter_init(reply, &args) == FALSE) {
7588                 SUPPLICANT_DBG("dbus_message_iter_init() failed");
7589                 ret = -EINVAL;
7590                 goto done;
7591         }
7592
7593         dbus_message_iter_get_basic(&args, &out_data);
7594         data->ssid->passphrase = g_strdup((const gchar *)out_data);
7595
7596         ret = supplicant_dbus_method_call(data->interface->path,
7597                 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
7598                 interface_add_network_params,
7599                 interface_add_network_result, data,
7600                 data->interface);
7601
7602 done:
7603         if (ret < 0) {
7604                 SUPPLICANT_DBG("AddNetwork failed %d", ret);
7605                 callback_assoc_failed(decrypt_request_data.data->user_data);
7606                 g_free(data->path);
7607                 g_free(data->ssid->ssid);
7608                 g_free((char *)data->ssid->passphrase);
7609                 g_free((char *)data->ssid->connector);
7610                 g_free((char *)data->ssid->c_sign_key);
7611                 g_free((char *)data->ssid->net_access_key);
7612                 g_free(data->ssid);
7613                 dbus_free(data);
7614         }
7615
7616         dbus_message_unref(reply);
7617         dbus_pending_call_unref(call);
7618
7619         decrypt_request_data.pending_call = NULL;
7620         decrypt_request_data.data = NULL;
7621 }
7622
7623 static int send_decryption_request(const char *passphrase,
7624                         struct interface_connect_data *data)
7625 {
7626         DBusMessage *msg = NULL;
7627         DBusPendingCall *call;
7628
7629         SUPPLICANT_DBG("Decryption request");
7630
7631         if (!passphrase) {
7632                 SUPPLICANT_DBG("Invalid parameter");
7633                 return -EINVAL;
7634         }
7635
7636         if (!connection)
7637                 return -EINVAL;
7638
7639         msg = dbus_message_new_method_call(NETCONFIG_SERVICE, NETCONFIG_WIFI_PATH,
7640                         NETCONFIG_WIFI_INTERFACE, "DecryptPassphrase");
7641         if (!msg)
7642                 return -EINVAL;
7643
7644 #if defined TIZEN_EXT
7645         if (!dbus_message_append_args(msg, DBUS_TYPE_STRING, &passphrase,
7646                                                         DBUS_TYPE_INVALID)) {
7647                 SUPPLICANT_DBG("Could not fulfill decryption request");
7648                 return -ENOMEM;
7649         }
7650 #else
7651         dbus_message_append_args(msg, DBUS_TYPE_STRING, &passphrase,
7652                                                         DBUS_TYPE_INVALID);
7653 #endif
7654
7655         if (!dbus_connection_send_with_reply(connection, msg,
7656                                 &call, DBUS_TIMEOUT_USE_DEFAULT)) {
7657                 dbus_message_unref(msg);
7658                 return -EIO;
7659         }
7660
7661         if (!call) {
7662                 dbus_message_unref(msg);
7663                 return -EIO;
7664         }
7665
7666         decrypt_request_data.pending_call = call;
7667         decrypt_request_data.data = data;
7668
7669         dbus_pending_call_set_notify(call, decryption_request_reply, data, NULL);
7670         dbus_message_unref(msg);
7671
7672         SUPPLICANT_DBG("Decryption request succeeded");
7673
7674         return 0;
7675 }
7676
7677 static void decrypt_conf_obj_reply(DBusPendingCall *call,
7678                                                 void *user_data)
7679 {
7680         DBusMessage *reply;
7681         DBusError error;
7682         DBusMessageIter iter, dict;
7683         char *out_data;
7684         int ret;
7685         struct interface_connect_data *data = user_data;
7686
7687         reply = dbus_pending_call_steal_reply(call);
7688
7689         dbus_error_init(&error);
7690         if (dbus_set_error_from_message(&error, reply)) {
7691                 SUPPLICANT_DBG("decryption_conf_obj_reply() %s %s", error.name, error.message);
7692                 dbus_error_free(&error);
7693                 ret = -EINVAL;
7694                 goto done;
7695         }
7696
7697         if (dbus_message_iter_init(reply, &iter) == FALSE) {
7698                 SUPPLICANT_DBG("dbus_message_iter_init() failed");
7699                 ret = -EINVAL;
7700                 goto done;
7701         }
7702
7703         dbus_message_iter_recurse(&iter, &dict);
7704
7705         while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_DICT_ENTRY) {
7706                 DBusMessageIter entry, value;
7707                 const char *key;
7708
7709                 dbus_message_iter_recurse(&dict, &entry);
7710                 dbus_message_iter_get_basic(&entry, &key);
7711                 dbus_message_iter_next(&entry);
7712                 dbus_message_iter_recurse(&entry, &value);
7713                 if (dbus_message_iter_get_arg_type(&value) == DBUS_TYPE_STRING) {
7714                         if (g_strcmp0(key, "connector") == 0) {
7715                                 dbus_message_iter_get_basic(&value, &out_data);
7716                                 data->ssid->connector = g_strdup((const gchar *)out_data);
7717                                 SUPPLICANT_DBG("connector %s", data->ssid->connector);
7718                         } else if (g_strcmp0(key, "c_sign_key") == 0) {
7719                                 dbus_message_iter_get_basic(&value, &out_data);
7720                                 data->ssid->c_sign_key = g_strdup((const gchar *)out_data);
7721                                 SUPPLICANT_DBG("c_sign_key %s", data->ssid->c_sign_key);
7722                         } else if (g_strcmp0(key, "net_access_key") == 0) {
7723                                 dbus_message_iter_get_basic(&value, &out_data);
7724                                 data->ssid->net_access_key = g_strdup((const gchar *)out_data);
7725                                 SUPPLICANT_DBG("net_access_key %s", data->ssid->net_access_key);
7726                         }
7727                 }
7728                 dbus_message_iter_next(&dict);
7729         }
7730
7731         ret = supplicant_dbus_method_call(data->interface->path,
7732                 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
7733                 interface_add_network_params,
7734                 interface_add_network_result, data,
7735                 data->interface);
7736
7737 done:
7738         if (ret < 0) {
7739                 SUPPLICANT_DBG("AddNetwork failed %d", ret);
7740                 callback_assoc_failed(decrypt_request_data.data->user_data);
7741                 g_free(data->path);
7742                 g_free(data->ssid->ssid);
7743                 g_free((char *)data->ssid->connector);
7744                 g_free((char *)data->ssid->c_sign_key);
7745                 g_free((char *)data->ssid->net_access_key);
7746                 g_free(data->ssid);
7747                 dbus_free(data);
7748         }
7749
7750         dbus_message_unref(reply);
7751         dbus_pending_call_unref(call);
7752
7753         decrypt_request_data.pending_call = NULL;
7754         decrypt_request_data.data = NULL;
7755 }
7756
7757 static int send_decryption_conf_obj_request(GSupplicantSSID *ssid,
7758                         struct interface_connect_data *data)
7759 {
7760         DBusMessage *msg = NULL;
7761         DBusPendingCall *call;
7762
7763         SUPPLICANT_DBG("Decryption configuration object request");
7764
7765         if (!ssid) {
7766                 SUPPLICANT_DBG("Invalid parameter");
7767                 return -EINVAL;
7768         }
7769
7770         if (!connection)
7771                 return -EINVAL;
7772
7773         msg = dbus_message_new_method_call(NETCONFIG_SERVICE, NETCONFIG_WIFI_PATH,
7774                         NETCONFIG_WIFI_INTERFACE, "DecryptConfObj");
7775         if (!msg)
7776                 return -EINVAL;
7777
7778         dbus_message_append_args(msg, DBUS_TYPE_STRING, &ssid->connector,
7779                                                         DBUS_TYPE_INVALID);
7780         dbus_message_append_args(msg, DBUS_TYPE_STRING, &ssid->c_sign_key,
7781                                                         DBUS_TYPE_INVALID);
7782         dbus_message_append_args(msg, DBUS_TYPE_STRING, &ssid->net_access_key,
7783                                                         DBUS_TYPE_INVALID);
7784
7785         if (!dbus_connection_send_with_reply(connection, msg,
7786                                 &call, DBUS_TIMEOUT_USE_DEFAULT)) {
7787                 dbus_message_unref(msg);
7788                 return -EIO;
7789         }
7790
7791         if (!call) {
7792                 dbus_message_unref(msg);
7793                 return -EIO;
7794         }
7795
7796         decrypt_request_data.pending_call = call;
7797         decrypt_request_data.data = data;
7798
7799         dbus_pending_call_set_notify(call, decrypt_conf_obj_reply, data, NULL);
7800         dbus_message_unref(msg);
7801
7802         SUPPLICANT_DBG("Decrypt Conf Obj request succeeded");
7803
7804         return 0;
7805 }
7806
7807 static bool is_valid_config_object(GSupplicantSSID *ssid)
7808 {
7809         return ((ssid->connector &&
7810                         g_strcmp0(ssid->connector, "") != 0) &&
7811                         (ssid->c_sign_key &&
7812                         g_strcmp0(ssid->c_sign_key, "") != 0) &&
7813                         (ssid->net_access_key &&
7814                         g_strcmp0(ssid->net_access_key, "") != 0));
7815 }
7816 #endif
7817
7818 int g_supplicant_interface_connect(GSupplicantInterface *interface,
7819                                 GSupplicantSSID *ssid,
7820                                 GSupplicantInterfaceCallback callback,
7821                                                         void *user_data)
7822 {
7823         struct interface_connect_data *data;
7824         struct interface_data *intf_data;
7825         int ret = 0;
7826
7827         SUPPLICANT_DBG("");
7828
7829         if (!interface)
7830                 return -EINVAL;
7831
7832         if (!system_available)
7833                 return -EFAULT;
7834
7835         /* TODO: Check if we're already connected and switch */
7836
7837         data = dbus_malloc0(sizeof(*data));
7838         if (!data)
7839                 return -ENOMEM;
7840
7841         data->interface = interface;
7842         data->path = g_strdup(interface->path);
7843         data->callback = callback;
7844         data->ssid = ssid;
7845         data->user_data = user_data;
7846
7847         if (ssid->use_wps) {
7848                 g_free(interface->wps_cred.key);
7849                 memset(&interface->wps_cred, 0,
7850                                 sizeof(struct _GSupplicantWpsCredentials));
7851
7852                 ret = supplicant_dbus_property_set(interface->path,
7853                         SUPPLICANT_INTERFACE ".Interface.WPS",
7854                         "ProcessCredentials", DBUS_TYPE_BOOLEAN_AS_STRING,
7855                         wps_process_credentials, wps_start, data, interface);
7856         } else {
7857                 /* By the time there is a request for connect and the network
7858                  * path is not NULL it means that connman has not removed the
7859                  * previous network pointer. This can happen in the case AP
7860                  * deauthenticated client and connman does not remove the
7861                  * previously connected network pointer. This causes supplicant
7862                  * to reallocate the memory for struct wpa_ssid again even if it
7863                  * is the same SSID. This causes memory usage of wpa_supplicnat
7864                  * to go high. The idea here is that if the previously connected
7865                  * network is not removed at the time of next connection attempt
7866                  * check if the network path is not NULL. In case it is non-NULL
7867                  * first remove the network and then once removal is successful, add
7868                  * the network.
7869                  */
7870
7871                 if (interface->network_path != NULL) {
7872                         g_free(data->path);
7873                         dbus_free(data);
7874
7875                         /*
7876                          * If this add network is for the same network for
7877                          * which wpa_supplicant already has a profile then do
7878                          * not need to add another profile. Only if the
7879                          * profile that needs to get added is different from
7880                          * what is there in wpa_s delete the current one. A
7881                          * network is identified by its SSID, security_type
7882                          * and passphrase (private passphrase in case security
7883                          * type is 802.11x).
7884                          */
7885                         if (compare_network_parameters(interface, ssid)) {
7886                                 return -EALREADY;
7887                         }
7888
7889                         intf_data = dbus_malloc0(sizeof(*intf_data));
7890                         if (!intf_data)
7891                                 return -ENOMEM;
7892
7893                         intf_data->interface = interface;
7894                         intf_data->path = g_strdup(interface->path);
7895                         intf_data->callback = callback;
7896                         intf_data->ssid = ssid;
7897                         intf_data->user_data = user_data;
7898                         intf_data->network_remove_in_progress = TRUE;
7899                         network_remove(intf_data);
7900                 } else {
7901 #if defined TIZEN_EXT
7902                         if (ssid->passphrase &&
7903                             g_strcmp0(ssid->passphrase, "") != 0 &&
7904 #if defined TIZEN_EXT_WIFI_MESH
7905                             ssid->mode != G_SUPPLICANT_MODE_MESH &&
7906 #endif
7907                             !ssid->eap) {
7908                                 ret = send_decryption_request(ssid->passphrase, data);
7909                                 if (ret < 0)
7910                                         SUPPLICANT_DBG("Decryption request failed %d", ret);
7911                         } else if (is_valid_config_object(ssid)) {
7912                                 ret = send_decryption_conf_obj_request(ssid, data);
7913                                 if (ret < 0)
7914                                         SUPPLICANT_DBG("Decryption Conf Obj request failed %d", ret);
7915
7916                         } else
7917 #endif
7918                         ret = supplicant_dbus_method_call(interface->path,
7919                                         SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
7920                                         interface_add_network_params,
7921                                         interface_add_network_result, data,
7922                                         interface);
7923                 }
7924         }
7925
7926         if (ret < 0) {
7927                 g_free(data->path);
7928                 dbus_free(data);
7929                 return ret;
7930         }
7931
7932         return -EINPROGRESS;
7933 }
7934
7935 static void network_remove_result(const char *error,
7936                                 DBusMessageIter *iter, void *user_data)
7937 {
7938         struct interface_data *data = user_data;
7939         struct interface_connect_data *connect_data;
7940         int result = 0;
7941
7942         SUPPLICANT_DBG("");
7943
7944         if (error) {
7945                 result = -EIO;
7946                 SUPPLICANT_DBG("error: %s", error);
7947
7948                 if (g_strcmp0("org.freedesktop.DBus.Error.UnknownMethod",
7949                                                 error) == 0)
7950                         result = -ECONNABORTED;
7951         }
7952
7953         g_free(data->interface->network_path);
7954         data->interface->network_path = NULL;
7955
7956         remove_network_information(data->interface);
7957
7958         if (data->network_remove_in_progress == TRUE) {
7959                 data->network_remove_in_progress = FALSE;
7960                 connect_data = dbus_malloc0(sizeof(*connect_data));
7961                 if (!connect_data)
7962                         return;
7963
7964                 connect_data->interface = data->interface;
7965                 connect_data->path = g_strdup(data->path);
7966                 connect_data->callback = data->callback;
7967                 connect_data->ssid = data->ssid;
7968                 connect_data->user_data = data->user_data;
7969
7970 #if defined TIZEN_EXT
7971                 int ret;
7972                 if (data->ssid->passphrase && g_strcmp0(data->ssid->passphrase, "") != 0
7973                         && !data->ssid->eap) {
7974                         ret = send_decryption_request(data->ssid->passphrase, connect_data);
7975                         if (ret < 0) {
7976                                 SUPPLICANT_DBG("Decryption request failed %d", ret);
7977                                 g_free(connect_data->ssid);
7978                                 g_free(connect_data->path);
7979                                 dbus_free(connect_data);
7980                         }
7981                 } else if (is_valid_config_object(data->ssid)) {
7982                         ret = send_decryption_conf_obj_request(data->ssid, connect_data);
7983                         if (ret < 0) {
7984                                 SUPPLICANT_DBG("Decryption Conf Obj request failed %d", ret);
7985                                 g_free(connect_data->ssid);
7986                                 g_free(connect_data->path);
7987                                 dbus_free(connect_data);
7988                         }
7989                 } else
7990 #endif
7991                 supplicant_dbus_method_call(data->interface->path,
7992                         SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
7993                         interface_add_network_params,
7994                         interface_add_network_result, connect_data,
7995                         connect_data->interface);
7996         } else {
7997                 if (data->callback)
7998                         data->callback(result, data->interface, data->user_data);
7999         }
8000         g_free(data->path);
8001         dbus_free(data);
8002 }
8003
8004 static void network_remove_params(DBusMessageIter *iter, void *user_data)
8005 {
8006         struct interface_data *data = user_data;
8007         const char *path = data->interface->network_path;
8008
8009         SUPPLICANT_DBG("path %s", path);
8010
8011         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH, &path);
8012 }
8013
8014 static int network_remove(struct interface_data *data)
8015 {
8016         GSupplicantInterface *interface = data->interface;
8017
8018         SUPPLICANT_DBG("");
8019
8020 #if defined TIZEN_EXT
8021         GSupplicantInterface *intf = NULL;
8022         /*
8023          * Check if 'interface' is valid
8024          */
8025         intf = g_hash_table_lookup(interface_table, interface->path);
8026         if (intf == NULL)
8027                 return -EINVAL;
8028 #endif
8029
8030         return supplicant_dbus_method_call(interface->path,
8031                         SUPPLICANT_INTERFACE ".Interface", "RemoveNetwork",
8032                         network_remove_params, network_remove_result, data,
8033                         interface);
8034 }
8035
8036 static void interface_disconnect_result(const char *error,
8037                                 DBusMessageIter *iter, void *user_data)
8038 {
8039         struct interface_data *data = user_data;
8040         int result = 0;
8041
8042         SUPPLICANT_DBG("");
8043
8044         if (error) {
8045                 result = -EIO;
8046                 SUPPLICANT_DBG("error: %s", error);
8047
8048                 if (g_strcmp0("org.freedesktop.DBus.Error.UnknownMethod",
8049                                                 error) == 0)
8050                         result = -ECONNABORTED;
8051         }
8052
8053         /* If we are disconnecting from previous WPS successful
8054          * association. i.e.: it did not went through AddNetwork,
8055          * and interface->network_path was never set. */
8056         if (!data->interface->network_path) {
8057                 if (data->callback)
8058                         data->callback(result, data->interface,
8059                                                         data->user_data);
8060
8061                 g_free(data->path);
8062                 dbus_free(data);
8063                 return;
8064         }
8065
8066         if (result < 0 && data->callback) {
8067                 data->callback(result, data->interface, data->user_data);
8068                 data->callback = NULL;
8069         }
8070
8071         if (result != -ECONNABORTED) {
8072                 if (network_remove(data) < 0) {
8073                         g_free(data->path);
8074                         dbus_free(data);
8075                 }
8076         } else {
8077                 g_free(data->path);
8078                 dbus_free(data);
8079         }
8080 }
8081
8082 int g_supplicant_interface_disconnect(GSupplicantInterface *interface,
8083                                         GSupplicantInterfaceCallback callback,
8084                                                         void *user_data)
8085 {
8086         struct interface_data *data;
8087         int ret;
8088
8089         SUPPLICANT_DBG("");
8090
8091         if (!interface)
8092                 return -EINVAL;
8093
8094         if (!system_available)
8095                 return -EFAULT;
8096 #if defined TIZEN_EXT
8097         if (decrypt_request_data.pending_call &&
8098                         decrypt_request_data.data &&
8099                         decrypt_request_data.data->user_data == user_data) {
8100
8101                 callback_assoc_failed(decrypt_request_data.data->user_data);
8102                 crypt_method_call_cancel();
8103
8104                 return 0;
8105         }
8106 #endif
8107         data = dbus_malloc0(sizeof(*data));
8108         if (!data)
8109                 return -ENOMEM;
8110
8111         data->interface = interface;
8112         data->path = g_strdup(interface->path);
8113         data->callback = callback;
8114         data->user_data = user_data;
8115
8116         ret = supplicant_dbus_method_call(interface->path,
8117                         SUPPLICANT_INTERFACE ".Interface", "Disconnect",
8118                         NULL, interface_disconnect_result, data,
8119                         interface);
8120
8121         if (ret < 0) {
8122                 g_free(data->path);
8123                 dbus_free(data);
8124         }
8125
8126         return ret;
8127 }
8128
8129 static void interface_p2p_find_result(const char *error,
8130                                         DBusMessageIter *iter, void *user_data)
8131 {
8132         struct interface_scan_data *data = user_data;
8133         int err = 0;
8134
8135         SUPPLICANT_DBG("error %s", error);
8136
8137         if (error)
8138                 err = -EIO;
8139
8140         if (interface_exists(data->interface, data->path)) {
8141                 if (!data->interface->ready)
8142                         err = -ENOLINK;
8143                 if (!err)
8144                         data->interface->p2p_finding = true;
8145         }
8146
8147         if (data->callback)
8148                 data->callback(err, data->interface, data->user_data);
8149
8150         g_free(data->path);
8151         dbus_free(data);
8152 }
8153
8154 static void interface_p2p_find_params(DBusMessageIter *iter, void *user_data)
8155 {
8156         DBusMessageIter dict;
8157
8158         supplicant_dbus_dict_open(iter, &dict);
8159         supplicant_dbus_dict_close(iter, &dict);
8160 }
8161
8162 int g_supplicant_interface_p2p_find(GSupplicantInterface *interface,
8163                                         GSupplicantInterfaceCallback callback,
8164                                                         void *user_data)
8165 {
8166         struct interface_scan_data *data;
8167         int ret;
8168
8169         if (!interface->p2p_support)
8170                 return -ENOTSUP;
8171
8172         ret = interface_ready_to_scan(interface);
8173         if (ret && ret != -EALREADY)
8174                 return ret;
8175
8176         data = dbus_malloc0(sizeof(*data));
8177         if (!data)
8178                 return -ENOMEM;
8179
8180         data->interface = interface;
8181         data->path = g_strdup(interface->path);
8182         data->callback = callback;
8183         data->user_data = user_data;
8184
8185         ret = supplicant_dbus_method_call(interface->path,
8186                         SUPPLICANT_INTERFACE ".Interface.P2PDevice", "Find",
8187                         interface_p2p_find_params, interface_p2p_find_result,
8188                         data, interface);
8189         if (ret < 0) {
8190                 g_free(data->path);
8191                 dbus_free(data);
8192         }
8193
8194         return ret;
8195 }
8196
8197 bool g_supplicant_interface_is_p2p_finding(GSupplicantInterface *interface)
8198 {
8199         if (!interface)
8200                 return false;
8201
8202         return interface->p2p_finding;
8203 }
8204
8205 int g_supplicant_interface_p2p_stop_find(GSupplicantInterface *interface)
8206 {
8207         if (!interface->p2p_finding)
8208                 return 0;
8209
8210         SUPPLICANT_DBG("");
8211
8212         interface->p2p_finding = false;
8213
8214         return supplicant_dbus_method_call(interface->path,
8215                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "StopFind",
8216                 NULL, NULL, NULL, NULL);
8217 }
8218
8219 static void interface_p2p_connect_result(const char *error,
8220                                         DBusMessageIter *iter, void *user_data)
8221 {
8222         struct interface_connect_data *data = user_data;
8223         int err = 0;
8224
8225         SUPPLICANT_DBG("");
8226
8227         if (error) {
8228                 SUPPLICANT_DBG("error: %s", error);
8229                 err = parse_supplicant_error(iter);
8230         }
8231
8232         if (data->callback)
8233                 data->callback(err, data->interface, data->user_data);
8234
8235         g_free(data->path);
8236         g_free(data->peer->wps_pin);
8237         g_free(data->peer->path);
8238         g_free(data->peer);
8239         g_free(data);
8240 }
8241
8242 static void interface_p2p_connect_params(DBusMessageIter *iter, void *user_data)
8243 {
8244         struct interface_connect_data *data = user_data;
8245         const char *wps = "pbc";
8246         DBusMessageIter dict;
8247         int go_intent = 7;
8248
8249         SUPPLICANT_DBG("");
8250
8251         supplicant_dbus_dict_open(iter, &dict);
8252
8253         if (data->peer->master)
8254                 go_intent = 15;
8255
8256         if (data->peer->wps_pin)
8257                 wps = "pin";
8258
8259         supplicant_dbus_dict_append_basic(&dict, "peer",
8260                                 DBUS_TYPE_OBJECT_PATH, &data->peer->path);
8261         supplicant_dbus_dict_append_basic(&dict, "wps_method",
8262                                 DBUS_TYPE_STRING, &wps);
8263         if (data->peer->wps_pin) {
8264                 supplicant_dbus_dict_append_basic(&dict, "pin",
8265                                 DBUS_TYPE_STRING, &data->peer->wps_pin);
8266         }
8267
8268         supplicant_dbus_dict_append_basic(&dict, "go_intent",
8269                                         DBUS_TYPE_INT32, &go_intent);
8270
8271         supplicant_dbus_dict_close(iter, &dict);
8272 }
8273
8274 int g_supplicant_interface_p2p_connect(GSupplicantInterface *interface,
8275                                         GSupplicantPeerParams *peer_params,
8276                                         GSupplicantInterfaceCallback callback,
8277                                         void *user_data)
8278 {
8279         struct interface_connect_data *data;
8280         int ret;
8281
8282         SUPPLICANT_DBG("");
8283
8284         if (!interface->p2p_support)
8285                 return -ENOTSUP;
8286
8287         data = dbus_malloc0(sizeof(*data));
8288         if (!data)
8289                 return -ENOMEM;
8290
8291         data->interface = interface;
8292         data->path = g_strdup(interface->path);
8293         data->peer = peer_params;
8294         data->callback = callback;
8295         data->user_data = user_data;
8296
8297         ret = supplicant_dbus_method_call(interface->path,
8298                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "Connect",
8299                 interface_p2p_connect_params, interface_p2p_connect_result,
8300                 data, interface);
8301         if (ret < 0) {
8302                 g_free(data->path);
8303                 dbus_free(data);
8304                 return ret;
8305         }
8306
8307         return -EINPROGRESS;
8308 }
8309
8310 int g_supplicant_interface_p2p_disconnect(GSupplicantInterface *interface,
8311                                         GSupplicantPeerParams *peer_params)
8312 {
8313         GSupplicantPeer *peer;
8314         int count = 0;
8315         GSList *list;
8316
8317         SUPPLICANT_DBG("");
8318
8319         if (!interface->p2p_support)
8320                 return -ENOTSUP;
8321
8322         peer = g_hash_table_lookup(interface->peer_table, peer_params->path);
8323         if (!peer)
8324                 return -ENODEV;
8325
8326         for (list = peer->groups; list; list = list->next, count++) {
8327                 const char *group_obj_path = list->data;
8328                 GSupplicantInterface *g_interface;
8329                 GSupplicantGroup *group;
8330
8331                 group = g_hash_table_lookup(group_mapping, group_obj_path);
8332                 if (!group || !group->interface)
8333                         continue;
8334
8335                 g_interface = group->interface;
8336                 supplicant_dbus_method_call(g_interface->path,
8337                                 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
8338                                 "Disconnect", NULL, NULL, NULL, g_interface);
8339         }
8340
8341         if (count == 0 && peer->current_group_iface) {
8342                 supplicant_dbus_method_call(peer->current_group_iface->path,
8343                                 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
8344                                 "Disconnect", NULL, NULL, NULL,
8345                                 peer->current_group_iface->path);
8346         }
8347
8348         peer->current_group_iface = NULL;
8349
8350         return -EINPROGRESS;
8351 }
8352
8353 struct p2p_service_data {
8354         bool registration;
8355         GSupplicantInterface *interface;
8356         GSupplicantP2PServiceParams *service;
8357         GSupplicantInterfaceCallback callback;
8358         void *user_data;
8359 };
8360
8361 static void interface_p2p_service_result(const char *error,
8362                                         DBusMessageIter *iter, void *user_data)
8363 {
8364         struct p2p_service_data *data = user_data;
8365         int result = 0;
8366
8367         SUPPLICANT_DBG("%s result - %s", data->registration ?
8368                                 "Registration" : "Deletion",
8369                                 error ? error : "Success");
8370         if (error)
8371                 result = -EINVAL;
8372
8373         if (data->callback)
8374                 data->callback(result, data->interface, data->user_data);
8375
8376         g_free(data->service->query);
8377         g_free(data->service->response);
8378         g_free(data->service->service);
8379         g_free(data->service->wfd_ies);
8380         g_free(data->service);
8381         dbus_free(data);
8382 }
8383
8384 static void interface_p2p_service_params(DBusMessageIter *iter,
8385                                                         void *user_data)
8386 {
8387         struct p2p_service_data *data = user_data;
8388         GSupplicantP2PServiceParams *service;
8389         DBusMessageIter dict;
8390         const char *type;
8391
8392         SUPPLICANT_DBG("");
8393
8394         service = data->service;
8395
8396         supplicant_dbus_dict_open(iter, &dict);
8397
8398         if (service->query && service->response) {
8399                 type = "bonjour";
8400                 supplicant_dbus_dict_append_basic(&dict, "service_type",
8401                                                 DBUS_TYPE_STRING, &type);
8402                 supplicant_dbus_dict_append_fixed_array(&dict, "query",
8403                                         DBUS_TYPE_BYTE, &service->query,
8404                                         service->query_length);
8405                 supplicant_dbus_dict_append_fixed_array(&dict, "response",
8406                                         DBUS_TYPE_BYTE, &service->response,
8407                                         service->response_length);
8408         } else if (service->version && service->service) {
8409                 type = "upnp";
8410                 supplicant_dbus_dict_append_basic(&dict, "service_type",
8411                                                 DBUS_TYPE_STRING, &type);
8412                 supplicant_dbus_dict_append_basic(&dict, "version",
8413                                         DBUS_TYPE_INT32, &service->version);
8414                 supplicant_dbus_dict_append_basic(&dict, "service",
8415                                         DBUS_TYPE_STRING, &service->service);
8416         }
8417
8418         supplicant_dbus_dict_close(iter, &dict);
8419 }
8420
8421 int g_supplicant_interface_p2p_add_service(GSupplicantInterface *interface,
8422                                 GSupplicantInterfaceCallback callback,
8423                                 GSupplicantP2PServiceParams *p2p_service_params,
8424                                 void *user_data)
8425 {
8426         struct p2p_service_data *data;
8427         int ret;
8428
8429         SUPPLICANT_DBG("");
8430
8431         if (!interface->p2p_support)
8432                 return -ENOTSUP;
8433
8434         data = dbus_malloc0(sizeof(*data));
8435         if (!data)
8436                 return -ENOMEM;
8437
8438         data->registration = true;
8439         data->interface = interface;
8440         data->service = p2p_service_params;
8441         data->callback = callback;
8442         data->user_data = user_data;
8443
8444         ret = supplicant_dbus_method_call(interface->path,
8445                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "AddService",
8446                 interface_p2p_service_params, interface_p2p_service_result,
8447                 data, interface);
8448         if (ret < 0) {
8449                 dbus_free(data);
8450                 return ret;
8451         }
8452
8453         return -EINPROGRESS;
8454 }
8455
8456 int g_supplicant_interface_p2p_del_service(GSupplicantInterface *interface,
8457                                 GSupplicantP2PServiceParams *p2p_service_params)
8458 {
8459         struct p2p_service_data *data;
8460         int ret;
8461
8462         SUPPLICANT_DBG("");
8463
8464         if (!interface->p2p_support)
8465                 return -ENOTSUP;
8466
8467         data = dbus_malloc0(sizeof(*data));
8468         if (!data)
8469                 return -ENOMEM;
8470
8471         data->interface = interface;
8472         data->service = p2p_service_params;
8473
8474         ret = supplicant_dbus_method_call(interface->path,
8475                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeleteService",
8476                 interface_p2p_service_params, interface_p2p_service_result,
8477                 data, interface);
8478         if (ret < 0) {
8479                 dbus_free(data);
8480                 return ret;
8481         }
8482
8483         return -EINPROGRESS;
8484 }
8485
8486 struct p2p_listen_data {
8487         int period;
8488         int interval;
8489 };
8490
8491 static void interface_p2p_listen_params(DBusMessageIter *iter, void *user_data)
8492 {
8493         struct p2p_listen_data *params = user_data;
8494         DBusMessageIter dict;
8495
8496         supplicant_dbus_dict_open(iter, &dict);
8497
8498         supplicant_dbus_dict_append_basic(&dict, "period",
8499                                         DBUS_TYPE_INT32, &params->period);
8500         supplicant_dbus_dict_append_basic(&dict, "interval",
8501                                         DBUS_TYPE_INT32, &params->interval);
8502         supplicant_dbus_dict_close(iter, &dict);
8503 }
8504
8505 int g_supplicant_interface_p2p_listen(GSupplicantInterface *interface,
8506                                                 int period, int interval)
8507 {
8508         struct p2p_listen_data params;
8509
8510         SUPPLICANT_DBG("");
8511
8512         if (!interface->p2p_support)
8513                 return -ENOTSUP;
8514
8515         params.period = period;
8516         params.interval = interval;
8517
8518         return supplicant_dbus_method_call(interface->path,
8519                         SUPPLICANT_INTERFACE ".Interface.P2PDevice",
8520                         "ExtendedListen", interface_p2p_listen_params,
8521                         NULL, &params, NULL);
8522 }
8523
8524 static void widi_ies_params(DBusMessageIter *iter, void *user_data)
8525 {
8526         struct p2p_service_data *data = user_data;
8527         GSupplicantP2PServiceParams *service = data->service;
8528         DBusMessageIter array;
8529
8530         SUPPLICANT_DBG("%p - %d", service->wfd_ies, service->wfd_ies_length);
8531
8532         dbus_message_iter_open_container(iter, DBUS_TYPE_ARRAY,
8533                                         DBUS_TYPE_BYTE_AS_STRING, &array);
8534
8535         if (service->wfd_ies && service->wfd_ies_length > 0) {
8536                 dbus_message_iter_append_fixed_array(&array, DBUS_TYPE_BYTE,
8537                                 &service->wfd_ies, service->wfd_ies_length);
8538         }
8539
8540         dbus_message_iter_close_container(iter, &array);
8541 }
8542
8543 int g_supplicant_set_widi_ies(GSupplicantP2PServiceParams *p2p_service_params,
8544                                         GSupplicantInterfaceCallback callback,
8545                                         void *user_data)
8546 {
8547         struct p2p_service_data *data;
8548         int ret;
8549
8550         SUPPLICANT_DBG("");
8551
8552         if (!system_available)
8553                 return -EFAULT;
8554
8555         data = dbus_malloc0(sizeof(*data));
8556         if (!data)
8557                 return -ENOMEM;
8558
8559         data->service = p2p_service_params;
8560         data->callback = callback;
8561         data->user_data = user_data;
8562
8563         if (p2p_service_params->wfd_ies)
8564                 data->registration = true;
8565
8566         ret = supplicant_dbus_property_set(SUPPLICANT_PATH,
8567                                         SUPPLICANT_INTERFACE, "WFDIEs",
8568                                         DBUS_TYPE_ARRAY_AS_STRING
8569                                         DBUS_TYPE_BYTE_AS_STRING,
8570                                         widi_ies_params,
8571                                         interface_p2p_service_result,
8572                                         data, NULL);
8573         if (ret < 0 && ret != -EINPROGRESS) {
8574                 dbus_free(data);
8575                 return ret;
8576         }
8577
8578         return -EINPROGRESS;
8579 }
8580
8581
8582 static const char *g_supplicant_rule0 = "type=signal,"
8583                                         "path=" DBUS_PATH_DBUS ","
8584                                         "sender=" DBUS_SERVICE_DBUS ","
8585                                         "interface=" DBUS_INTERFACE_DBUS ","
8586                                         "member=NameOwnerChanged,"
8587                                         "arg0=" SUPPLICANT_SERVICE;
8588 static const char *g_supplicant_rule1 = "type=signal,"
8589                         "interface=" SUPPLICANT_INTERFACE;
8590 static const char *g_supplicant_rule2 = "type=signal,"
8591                         "interface=" SUPPLICANT_INTERFACE ".Interface";
8592 static const char *g_supplicant_rule3 = "type=signal,"
8593                         "interface=" SUPPLICANT_INTERFACE ".Interface.WPS";
8594 static const char *g_supplicant_rule4 = "type=signal,"
8595                         "interface=" SUPPLICANT_INTERFACE ".BSS";
8596 static const char *g_supplicant_rule5 = "type=signal,"
8597                         "interface=" SUPPLICANT_INTERFACE ".Network";
8598 #if !defined TIZEN_EXT
8599 static const char *g_supplicant_rule6 = "type=signal,"
8600                 "interface=" SUPPLICANT_INTERFACE ".Interface.P2PDevice";
8601 static const char *g_supplicant_rule7 = "type=signal,"
8602                 "interface=" SUPPLICANT_INTERFACE ".Peer";
8603 static const char *g_supplicant_rule8 = "type=signal,"
8604                 "interface=" SUPPLICANT_INTERFACE ".Group";
8605 #endif
8606 #if defined TIZEN_EXT_WIFI_MESH
8607 static const char *g_supplicant_rule9 = "type=signal,"
8608                 "interface=" SUPPLICANT_INTERFACE ".Interface.Mesh";
8609 #endif
8610
8611 static void invoke_introspect_method(void)
8612 {
8613         DBusMessage *message;
8614
8615         message = dbus_message_new_method_call(SUPPLICANT_SERVICE,
8616                                         SUPPLICANT_PATH,
8617                                         DBUS_INTERFACE_INTROSPECTABLE,
8618                                         "Introspect");
8619
8620         if (!message)
8621                 return;
8622
8623         dbus_message_set_no_reply(message, TRUE);
8624         dbus_connection_send(connection, message, NULL);
8625         dbus_message_unref(message);
8626 }
8627
8628 #if defined TIZEN_EXT && defined TIZEN_EXT_INS
8629 void g_supplicant_set_ins_settings(GSupplicantINSPreferredFreq preferred_freq_bssid,
8630                 bool last_connected_bssid, bool assoc_reject, bool signal_bssid,
8631                 unsigned int preferred_freq_bssid_score, unsigned int last_connected_bssid_score,
8632                 unsigned int assoc_reject_score, int signal_level3_5ghz, int signal_level3_24ghz)
8633 {
8634         ins_settings.preferred_freq_bssid = preferred_freq_bssid;
8635         ins_settings.last_connected_bssid = last_connected_bssid;
8636         ins_settings.assoc_reject = assoc_reject;
8637         ins_settings.signal_bssid = signal_bssid;
8638         ins_settings.preferred_freq_bssid_score = preferred_freq_bssid_score;
8639         ins_settings.last_connected_bssid_score = last_connected_bssid_score;
8640         ins_settings.assoc_reject_score = assoc_reject_score;
8641         ins_settings.signal_level3_5ghz = signal_level3_5ghz;
8642         ins_settings.signal_level3_24ghz = signal_level3_24ghz;
8643
8644         SUPPLICANT_DBG("preferred_freq_bssid [%s]", preferred_freq_bssid ? "true" : "false");
8645         SUPPLICANT_DBG("preferred_freq_bssid_score [%d]", preferred_freq_bssid_score);
8646         SUPPLICANT_DBG("last_connected_bssid [%s]", last_connected_bssid ? "true" : "false");
8647         SUPPLICANT_DBG("last_connected_bssid_score [%d]", last_connected_bssid_score);
8648         SUPPLICANT_DBG("assoc_reject [%s]", assoc_reject ? "true" : "false");
8649         SUPPLICANT_DBG("assoc_reject_score [%d]", assoc_reject_score);
8650         SUPPLICANT_DBG("signal_bssid [%s]", signal_bssid ? "true" : "false");
8651         SUPPLICANT_DBG("signal_level3_5ghz [%d]", signal_level3_5ghz);
8652         SUPPLICANT_DBG("signal_level3_24ghz [%d]", signal_level3_24ghz);
8653 }
8654 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_INS */
8655
8656 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
8657 void g_supplicant_register_eap_callback(g_supplicant_eap_callback cb)
8658 {
8659         SUPPLICANT_DBG("g_supplicant_register_eap_callback %p", cb);
8660
8661         if (!callbacks_pointer) {
8662                 SUPPLICANT_DBG("callbacks_pointer is NULL");
8663                 return;
8664         }
8665
8666         callbacks_pointer->eap = cb;
8667 }
8668
8669 void g_supplicant_unregister_eap_callback(void)
8670 {
8671         SUPPLICANT_DBG("g_supplicant_unregister_eap_callback");
8672
8673         if (!callbacks_pointer) {
8674                 SUPPLICANT_DBG("callbacks_pointer is NULL");
8675                 return;
8676         }
8677
8678         callbacks_pointer->eap = NULL;
8679 }
8680 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
8681
8682 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
8683 int g_supplicant_register(GSupplicantCallbacks *callbacks)
8684 #else /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
8685 int g_supplicant_register(const GSupplicantCallbacks *callbacks)
8686 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
8687 {
8688         connection = dbus_bus_get(DBUS_BUS_SYSTEM, NULL);
8689         if (!connection)
8690                 return -EIO;
8691
8692         if (!dbus_connection_add_filter(connection, g_supplicant_filter,
8693                                                 NULL, NULL)) {
8694                 dbus_connection_unref(connection);
8695                 connection = NULL;
8696                 return -EIO;
8697         }
8698 #if defined TIZEN_EXT
8699         simplified_log = connman_setting_get_bool("SimplifiedLog");
8700 #endif
8701         callbacks_pointer = callbacks;
8702         eap_methods = 0;
8703
8704         interface_table = g_hash_table_new_full(g_str_hash, g_str_equal,
8705                                                 NULL, remove_interface);
8706
8707         bss_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
8708                                                                 NULL, NULL);
8709         peer_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
8710                                                                 NULL, NULL);
8711         group_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
8712                                                                 NULL, NULL);
8713         pending_peer_connection = g_hash_table_new_full(g_str_hash, g_str_equal,
8714                                                                 NULL, NULL);
8715         config_file_table = g_hash_table_new_full(g_str_hash, g_str_equal,
8716                                                                 g_free, g_free);
8717
8718         supplicant_dbus_setup(connection);
8719
8720         dbus_bus_add_match(connection, g_supplicant_rule0, NULL);
8721         dbus_bus_add_match(connection, g_supplicant_rule1, NULL);
8722         dbus_bus_add_match(connection, g_supplicant_rule2, NULL);
8723         dbus_bus_add_match(connection, g_supplicant_rule3, NULL);
8724         dbus_bus_add_match(connection, g_supplicant_rule4, NULL);
8725         dbus_bus_add_match(connection, g_supplicant_rule5, NULL);
8726 #if defined TIZEN_EXT
8727         dbus_bus_add_match(connection,
8728                         "type=signal,interface=org.tizen.system.deviced.PowerOff,"
8729                         "member=ChangeState", NULL);
8730 #endif
8731 #if !defined TIZEN_EXT
8732         dbus_bus_add_match(connection, g_supplicant_rule6, NULL);
8733         dbus_bus_add_match(connection, g_supplicant_rule7, NULL);
8734         dbus_bus_add_match(connection, g_supplicant_rule8, NULL);
8735 #endif
8736 #if defined TIZEN_EXT_WIFI_MESH
8737         dbus_bus_add_match(connection, g_supplicant_rule9, NULL);
8738 #endif
8739         dbus_connection_flush(connection);
8740
8741         if (dbus_bus_name_has_owner(connection,
8742                                         SUPPLICANT_SERVICE, NULL)) {
8743                 system_available = TRUE;
8744                 supplicant_dbus_property_get_all(SUPPLICANT_PATH,
8745                                                 SUPPLICANT_INTERFACE,
8746                                                 service_property, NULL, NULL);
8747         } else
8748                 invoke_introspect_method();
8749
8750         SUPPLICANT_DBG("supplicant dbus setup completed");
8751         return 0;
8752 }
8753
8754 static void unregister_interface_remove_params(DBusMessageIter *iter,
8755                                                 void *user_data)
8756 {
8757         const char *path = user_data;
8758
8759         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
8760                                                         &path);
8761 }
8762
8763
8764 static void unregister_remove_interface(gpointer key, gpointer value,
8765                                                 gpointer user_data)
8766 {
8767         GSupplicantInterface *interface = value;
8768
8769         supplicant_dbus_method_call(SUPPLICANT_PATH,
8770                                         SUPPLICANT_INTERFACE,
8771                                         "RemoveInterface",
8772                                         unregister_interface_remove_params,
8773                                         NULL, interface->path, NULL);
8774 }
8775
8776 void g_supplicant_unregister(const GSupplicantCallbacks *callbacks)
8777 {
8778         SUPPLICANT_DBG("");
8779
8780         if (connection) {
8781 #if defined TIZEN_EXT_WIFI_MESH
8782                 dbus_bus_remove_match(connection, g_supplicant_rule9, NULL);
8783 #endif
8784 #if !defined TIZEN_EXT
8785                 dbus_bus_remove_match(connection, g_supplicant_rule8, NULL);
8786                 dbus_bus_remove_match(connection, g_supplicant_rule7, NULL);
8787                 dbus_bus_remove_match(connection, g_supplicant_rule6, NULL);
8788 #endif
8789                 dbus_bus_remove_match(connection, g_supplicant_rule5, NULL);
8790                 dbus_bus_remove_match(connection, g_supplicant_rule4, NULL);
8791                 dbus_bus_remove_match(connection, g_supplicant_rule3, NULL);
8792                 dbus_bus_remove_match(connection, g_supplicant_rule2, NULL);
8793                 dbus_bus_remove_match(connection, g_supplicant_rule1, NULL);
8794                 dbus_bus_remove_match(connection, g_supplicant_rule0, NULL);
8795                 dbus_connection_flush(connection);
8796
8797                 dbus_connection_remove_filter(connection,
8798                                                 g_supplicant_filter, NULL);
8799         }
8800
8801         if (config_file_table) {
8802                 g_hash_table_destroy(config_file_table);
8803                 config_file_table = NULL;
8804         }
8805
8806         if (bss_mapping) {
8807                 g_hash_table_destroy(bss_mapping);
8808                 bss_mapping = NULL;
8809         }
8810
8811         if (peer_mapping) {
8812                 g_hash_table_destroy(peer_mapping);
8813                 peer_mapping = NULL;
8814         }
8815
8816         if (group_mapping) {
8817                 g_hash_table_destroy(group_mapping);
8818                 group_mapping = NULL;
8819         }
8820
8821         if (interface_table) {
8822                 g_hash_table_foreach(interface_table,
8823                                         unregister_remove_interface, NULL);
8824                 g_hash_table_destroy(interface_table);
8825                 interface_table = NULL;
8826         }
8827
8828         if (system_available)
8829                 callback_system_killed();
8830
8831         if (connection) {
8832                 dbus_connection_unref(connection);
8833                 connection = NULL;
8834         }
8835
8836         callbacks_pointer = NULL;
8837         eap_methods = 0;
8838 }
8839
8840 #ifdef TIZEN_EXT
8841 struct supplicant_mac_policy {
8842         GSupplicantMacPolicyCallback callback;
8843         dbus_uint32_t policy;
8844         const void *user_data;
8845 };
8846
8847 static void mac_policy_result(const char *error,
8848                                 DBusMessageIter *iter, void *user_data)
8849 {
8850         struct supplicant_mac_policy *data = user_data;
8851         int result = 0;
8852
8853         if (!user_data)
8854                 return;
8855
8856         if (error) {
8857                 SUPPLICANT_DBG("Mac policy setting failure %s", error);
8858                 result = -EINVAL;
8859         }
8860
8861         if (data->callback)
8862                 data->callback(result, data->policy,
8863                                         (void *) data->user_data);
8864
8865         dbus_free(data);
8866 }
8867
8868 static void mac_policy_params(DBusMessageIter *iter, void *user_data)
8869 {
8870         struct supplicant_mac_policy *data = user_data;
8871
8872         dbus_message_iter_append_basic(iter, DBUS_TYPE_INT32, &(data->policy));
8873 }
8874
8875 int g_supplicant_interface_set_mac_policy(GSupplicantInterface *interface,
8876                                         GSupplicantMacPolicyCallback callback,
8877                                                         unsigned int policy,
8878                                                         void *user_data)
8879 {
8880         struct supplicant_mac_policy *data = NULL;
8881         int ret;
8882
8883         if (!system_available)
8884                 return -EFAULT;
8885
8886         if (!interface)
8887                 return -EINVAL;
8888
8889         data = dbus_malloc0(sizeof(*data));
8890         if (!data)
8891                 return -ENOMEM;
8892
8893         data->callback = callback;
8894         data->policy = policy;
8895         data->user_data = user_data;
8896
8897         ret =  supplicant_dbus_property_set(interface->path,
8898                                 SUPPLICANT_INTERFACE ".Interface",
8899                                 "MacAddr", DBUS_TYPE_INT32_AS_STRING,
8900                                 mac_policy_params, mac_policy_result, data, NULL);
8901         if (ret < 0) {
8902                 SUPPLICANT_DBG("Unable to set MacAddr configuration");
8903                 dbus_free(data);
8904         }
8905
8906         return ret;
8907 }
8908
8909 int g_supplicant_interface_set_preassoc_mac_policy(GSupplicantInterface *interface,
8910                                         GSupplicantMacPolicyCallback callback,
8911                                                         unsigned int policy,
8912                                                         void *user_data)
8913 {
8914         struct supplicant_mac_policy *data;
8915         int ret;
8916
8917         if (!system_available)
8918                 return -EFAULT;
8919
8920         if (!interface)
8921                 return -EINVAL;
8922
8923         data = dbus_malloc0(sizeof(*data));
8924         if (!data)
8925                 return -ENOMEM;
8926
8927         data->callback = callback;
8928         data->policy = policy;
8929         data->user_data = user_data;
8930
8931         ret =  supplicant_dbus_property_set(interface->path,
8932                                 SUPPLICANT_INTERFACE ".Interface",
8933                                 "PreassocMacAddr", DBUS_TYPE_INT32_AS_STRING,
8934                                 mac_policy_params, mac_policy_result, data, NULL);
8935         if (ret < 0) {
8936                 SUPPLICANT_DBG("Unable to set PreassocMacAddr configuration");
8937                 dbus_free(data);
8938         }
8939
8940         return ret;
8941 }
8942
8943 struct supplicant_random_mac_lifetime {
8944         GSupplicantRandomMaclifetimeCallback callback;
8945         dbus_uint32_t lifetime;
8946         const void *user_data;
8947 };
8948
8949 static void random_mac_lifetime_result(const char *error,
8950                                 DBusMessageIter *iter, void *user_data)
8951 {
8952         struct supplicant_random_mac_lifetime *data = user_data;
8953         int result = 0;
8954
8955         if (!user_data)
8956                 return;
8957
8958         if (error) {
8959                 SUPPLICANT_DBG("Random Mac lifetime setting failure %s", error);
8960                 result = -EINVAL;
8961         }
8962
8963         if (data->callback)
8964                 data->callback(result, data->lifetime,
8965                                         (void *) data->user_data);
8966
8967         dbus_free(data);
8968 }
8969
8970 static void random_mac_lifetime_params(DBusMessageIter *iter, void *user_data)
8971 {
8972         struct supplicant_random_mac_lifetime *data = user_data;
8973
8974         dbus_message_iter_append_basic(iter, DBUS_TYPE_UINT32, &(data->lifetime));
8975 }
8976
8977 int g_supplicant_interface_set_random_mac_lifetime(GSupplicantInterface *interface,
8978                                         GSupplicantRandomMaclifetimeCallback callback,
8979                                                         unsigned int lifetime,
8980                                                         void *user_data)
8981 {
8982         struct supplicant_random_mac_lifetime *data;
8983         int ret;
8984
8985         if (!system_available)
8986                 return -EFAULT;
8987
8988         if (!interface)
8989                 return -EINVAL;
8990
8991         data = dbus_malloc0(sizeof(*data));
8992         if (!data)
8993                 return -ENOMEM;
8994
8995         data->callback = callback;
8996         data->lifetime = lifetime;
8997         data->user_data = user_data;
8998
8999         ret =  supplicant_dbus_property_set(interface->path,
9000                                 SUPPLICANT_INTERFACE ".Interface",
9001                                 "RandAddrLifetime", DBUS_TYPE_UINT32_AS_STRING,
9002                                 random_mac_lifetime_params, random_mac_lifetime_result,
9003                                 data, NULL);
9004         if (ret < 0) {
9005                 SUPPLICANT_DBG("Unable to set RandAddrLifetime configuration");
9006                 dbus_free(data);
9007         }
9008
9009         return ret;
9010 }
9011 #endif