Support PSK_SHA256 for ieee80211w
[platform/upstream/connman.git] / gsupplicant / supplicant.c
1 /*
2  *
3  *  WPA supplicant library with GLib integration
4  *
5  *  Copyright (C) 2012-2013  Intel Corporation. All rights reserved.
6  *
7  *  This program is free software; you can redistribute it and/or modify
8  *  it under the terms of the GNU General Public License version 2 as
9  *  published by the Free Software Foundation.
10  *
11  *  This program is distributed in the hope that it will be useful,
12  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
13  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14  *  GNU General Public License for more details.
15  *
16  *  You should have received a copy of the GNU General Public License
17  *  along with this program; if not, write to the Free Software
18  *  Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA
19  *
20  */
21
22 #ifdef HAVE_CONFIG_H
23 #include <config.h>
24 #endif
25
26 #include <errno.h>
27 #include <stdio.h>
28 #include <stdlib.h>
29 #include <string.h>
30 #include <stdint.h>
31 #include <syslog.h>
32 #include <ctype.h>
33 #include <stdbool.h>
34 #include <netinet/if_ether.h>
35 #include <netinet/in.h>
36
37 #include <glib.h>
38 #include <gdbus.h>
39
40 #include "dbus.h"
41 #include "gsupplicant.h"
42
43 #if defined TIZEN_EXT
44 #include "setting.h"
45 #endif
46
47 #define IEEE80211_CAP_ESS       0x0001
48 #define IEEE80211_CAP_IBSS      0x0002
49 #define IEEE80211_CAP_PRIVACY   0x0010
50
51 #if defined TIZEN_EXT
52 #define WLAN_EID_HT_CAP 45
53 #define WLAN_EID_VHT_CAP 191
54 #define WLAN_EID_SUPP_RATES 1
55 #define WLAN_EID_EXT_SUPP_RATES 50
56 #define COUNTRY_CODE_LENGTH     2
57 #endif
58
59 #if defined TIZEN_EXT
60 #define LAST_CONNECTED_TIMEOUT       (5 * 60)
61 #define ASSOC_REJECT_TIMEOUT         10
62 #define FREQ_RANGE_24GHZ_CHANNEL_1   2412
63 #define FREQ_RANGE_24GHZ_CHANNEL_14  2484
64 #define FREQ_RANGE_5GHZ_CHANNEL_32   5160
65 #define FREQ_RANGE_5GHZ_CHANNEL_165  5825
66
67 #define MAC2STR(a) (a)[0], (a)[1], (a)[2], (a)[3], (a)[4], (a)[5]
68 #define MACSTR "%02x:%02x:%02x:%02x:%02x:%02x"
69 #endif
70
71 #define BSS_UNKNOWN_STRENGTH    -90
72
73 static DBusConnection *connection;
74
75 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
76 static GSupplicantCallbacks *callbacks_pointer;
77 #else /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
78 static const GSupplicantCallbacks *callbacks_pointer;
79 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
80
81 static dbus_bool_t system_available = FALSE;
82 static dbus_bool_t system_ready = FALSE;
83
84 static dbus_int32_t debug_level;
85 static dbus_bool_t debug_timestamp = FALSE;
86 static dbus_bool_t debug_showkeys = FALSE;
87
88 static const char *debug_strings[] = {
89         "msgdump", "debug", "info", "warning", "error", NULL
90 };
91
92 static unsigned int eap_methods;
93
94 struct strvalmap {
95         const char *str;
96         unsigned int val;
97 };
98
99 static struct strvalmap eap_method_map[] = {
100         { "MD5",        G_SUPPLICANT_EAP_METHOD_MD5     },
101         { "TLS",        G_SUPPLICANT_EAP_METHOD_TLS     },
102         { "MSCHAPV2",   G_SUPPLICANT_EAP_METHOD_MSCHAPV2        },
103         { "PEAP",       G_SUPPLICANT_EAP_METHOD_PEAP    },
104         { "TTLS",       G_SUPPLICANT_EAP_METHOD_TTLS    },
105         { "GTC",        G_SUPPLICANT_EAP_METHOD_GTC     },
106         { "OTP",        G_SUPPLICANT_EAP_METHOD_OTP     },
107         { "LEAP",       G_SUPPLICANT_EAP_METHOD_LEAP    },
108         { "WSC",        G_SUPPLICANT_EAP_METHOD_WSC     },
109         { }
110 };
111
112 static struct strvalmap keymgmt_map[] = {
113         { "none",               G_SUPPLICANT_KEYMGMT_NONE               },
114         { "ieee8021x",          G_SUPPLICANT_KEYMGMT_IEEE8021X  },
115         { "wpa-none",           G_SUPPLICANT_KEYMGMT_WPA_NONE   },
116         { "wpa-psk",            G_SUPPLICANT_KEYMGMT_WPA_PSK    },
117         { "wpa-psk-sha256",     G_SUPPLICANT_KEYMGMT_WPA_PSK_256        },
118         { "wpa-ft-psk",         G_SUPPLICANT_KEYMGMT_WPA_FT_PSK },
119         { "wpa-ft-eap",         G_SUPPLICANT_KEYMGMT_WPA_FT_EAP },
120         { "wpa-eap",            G_SUPPLICANT_KEYMGMT_WPA_EAP    },
121         { "wpa-eap-sha256",     G_SUPPLICANT_KEYMGMT_WPA_EAP_256        },
122         { "wps",                G_SUPPLICANT_KEYMGMT_WPS                },
123 #if defined TIZEN_EXT
124         { "sae",                G_SUPPLICANT_KEYMGMT_SAE                },
125         { "ft-sae",             G_SUPPLICANT_KEYMGMT_FT_SAE             },
126         { "owe",                G_SUPPLICANT_KEYMGMT_OWE                },
127         { "dpp",                G_SUPPLICANT_KEYMGMT_DPP                },
128 #endif
129         { }
130 };
131
132 static struct strvalmap authalg_capa_map[] = {
133         { "open",       G_SUPPLICANT_CAPABILITY_AUTHALG_OPEN    },
134         { "shared",     G_SUPPLICANT_CAPABILITY_AUTHALG_SHARED  },
135         { "leap",       G_SUPPLICANT_CAPABILITY_AUTHALG_LEAP    },
136         { }
137 };
138
139 static struct strvalmap proto_capa_map[] = {
140         { "wpa",        G_SUPPLICANT_CAPABILITY_PROTO_WPA               },
141         { "rsn",        G_SUPPLICANT_CAPABILITY_PROTO_RSN               },
142         { }
143 };
144
145 static struct strvalmap group_map[] = {
146         { "wep40",      G_SUPPLICANT_GROUP_WEP40        },
147         { "wep104",     G_SUPPLICANT_GROUP_WEP104       },
148         { "tkip",       G_SUPPLICANT_GROUP_TKIP },
149         { "ccmp",       G_SUPPLICANT_GROUP_CCMP },
150         { }
151 };
152
153 static struct strvalmap pairwise_map[] = {
154         { "none",       G_SUPPLICANT_PAIRWISE_NONE      },
155         { "tkip",       G_SUPPLICANT_PAIRWISE_TKIP      },
156         { "ccmp",       G_SUPPLICANT_PAIRWISE_CCMP      },
157         { }
158 };
159
160 static struct strvalmap scan_capa_map[] = {
161         { "active",     G_SUPPLICANT_CAPABILITY_SCAN_ACTIVE     },
162         { "passive",    G_SUPPLICANT_CAPABILITY_SCAN_PASSIVE    },
163         { "ssid",       G_SUPPLICANT_CAPABILITY_SCAN_SSID               },
164         { }
165 };
166
167 static struct strvalmap mode_capa_map[] = {
168         { "infrastructure",     G_SUPPLICANT_CAPABILITY_MODE_INFRA      },
169         { "ad-hoc",             G_SUPPLICANT_CAPABILITY_MODE_IBSS       },
170         { "ap",                 G_SUPPLICANT_CAPABILITY_MODE_AP         },
171         { "p2p",                G_SUPPLICANT_CAPABILITY_MODE_P2P        },
172 #if defined TIZEN_EXT_WIFI_MESH
173         { "mesh",               G_SUPPLICANT_CAPABILITY_MODE_MESH       },
174 #endif
175         { }
176 };
177
178 #if defined TIZEN_EXT && defined TIZEN_EXT_INS
179 struct _GSupplicantINSSettings {
180         GSupplicantINSPreferredFreq preferred_freq_bssid;
181         unsigned int preferred_freq_bssid_score;
182         bool last_connected_bssid;
183         unsigned int last_connected_bssid_score;
184         bool assoc_reject;
185         unsigned int assoc_reject_score;
186         bool signal_bssid;
187         int signal_level3_5ghz;
188         int signal_level3_24ghz;
189 };
190
191 static struct _GSupplicantINSSettings ins_settings;
192 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_INS */
193
194 #if defined TIZEN_EXT
195 static unsigned char invalid_bssid[WIFI_BSSID_LEN_MAX] = {
196         0x00, 0x00, 0x00, 0x00, 0x00, 0x00
197 };
198 #endif
199
200 static GHashTable *interface_table;
201 static GHashTable *bss_mapping;
202 static GHashTable *peer_mapping;
203 static GHashTable *group_mapping;
204 static GHashTable *pending_peer_connection;
205 static GHashTable *config_file_table;
206
207 struct _GSupplicantWpsCredentials {
208         unsigned char ssid[32];
209         unsigned int ssid_len;
210         char *key;
211 };
212
213 struct added_network_information {
214         char * ssid;
215         GSupplicantSecurity security;
216         char * passphrase;
217         char * private_passphrase;
218 #if defined TIZEN_EXT
219         char *connector;
220         char *c_sign_key;
221         char *net_access_key;
222 #endif
223 };
224
225 #if defined TIZEN_EXT_WIFI_MESH
226 struct _GSupplicantMeshGroupInfo {
227         unsigned char ssid[32];
228         unsigned int ssid_len;
229         int disconnect_reason;
230 };
231 #endif
232
233 struct _GSupplicantInterface {
234         char *path;
235         char *network_path;
236         unsigned int keymgmt_capa;
237         unsigned int authalg_capa;
238         unsigned int proto_capa;
239         unsigned int group_capa;
240         unsigned int pairwise_capa;
241         unsigned int scan_capa;
242         unsigned int mode_capa;
243         unsigned int max_scan_ssids;
244         bool p2p_support;
245         bool p2p_finding;
246         bool ap_create_in_progress;
247         dbus_bool_t ready;
248         GSupplicantState state;
249         dbus_bool_t scanning;
250         GSupplicantInterfaceCallback scan_callback;
251         void *scan_data;
252         int apscan;
253         char *ifname;
254         char *driver;
255         char *bridge;
256         struct _GSupplicantWpsCredentials wps_cred;
257         GSupplicantWpsState wps_state;
258         GHashTable *network_table;
259         GHashTable *peer_table;
260         GHashTable *group_table;
261         GHashTable *bss_mapping;
262         void *data;
263         const char *pending_peer_path;
264         GSupplicantNetwork *current_network;
265         struct added_network_information network_info;
266 #if defined TIZEN_EXT
267         dbus_bool_t is_5_0_Ghz_supported;
268         int disconnect_reason;
269 #endif
270 #if defined TIZEN_EXT
271         unsigned char add_network_bssid[WIFI_BSSID_LEN_MAX];
272         unsigned char connected_bssid[WIFI_BSSID_LEN_MAX];
273 #endif
274 #if defined TIZEN_EXT_WIFI_MESH
275         bool mesh_support;
276         struct _GSupplicantMeshGroupInfo group_info;
277 #endif
278 };
279
280 struct g_supplicant_bss {
281         GSupplicantInterface *interface;
282         char *path;
283         unsigned char bssid[6];
284         unsigned char ssid[32];
285         unsigned int ssid_len;
286         dbus_uint16_t frequency;
287         dbus_uint32_t maxrate;
288         dbus_int16_t signal;
289         GSupplicantMode mode;
290         GSupplicantSecurity security;
291         dbus_bool_t rsn_selected;
292         unsigned int wpa_keymgmt;
293         unsigned int wpa_pairwise;
294         unsigned int wpa_group;
295         unsigned int rsn_keymgmt;
296         unsigned int rsn_pairwise;
297         unsigned int rsn_group;
298         unsigned int keymgmt;
299         dbus_bool_t privacy;
300         dbus_bool_t psk;
301         dbus_bool_t ieee8021x;
302 #if defined TIZEN_EXT
303         dbus_bool_t ft_psk;
304         dbus_bool_t ft_ieee8021x;
305         GSList *vsie_list;
306         dbus_bool_t hs20;
307         unsigned char country_code[COUNTRY_CODE_LENGTH];
308         GSupplicantPhy_mode phy_mode;
309         dbus_int16_t snr;
310         dbus_uint32_t est_throughput;
311         dbus_bool_t psk_sha256;
312 #endif
313         unsigned int wps_capabilities;
314 #if defined TIZEN_EXT
315         dbus_bool_t sae;
316         dbus_bool_t owe;
317         dbus_bool_t dpp;
318         dbus_bool_t owe_transition_mode;
319         unsigned int transition_mode_ssid_len;
320         unsigned char transition_mode_bssid[6];
321         unsigned char transition_mode_ssid[32];
322         dbus_bool_t pmf_required;
323 #endif
324 };
325
326 struct _GSupplicantNetwork {
327         GSupplicantInterface *interface;
328         char *path;
329         char *group;
330         char *name;
331         unsigned char ssid[32];
332         unsigned int ssid_len;
333         dbus_int16_t signal;
334         dbus_uint16_t frequency;
335         struct g_supplicant_bss *best_bss;
336         GSupplicantMode mode;
337         GSupplicantSecurity security;
338         dbus_bool_t wps;
339         unsigned int wps_capabilities;
340         GHashTable *bss_table;
341         GHashTable *config_table;
342 #if defined TIZEN_EXT
343         bool isHS20AP;
344         char *eap;
345         char *identity;
346         char *phase2;
347         unsigned int keymgmt;
348         GSList *vsie_list;
349         unsigned char country_code[COUNTRY_CODE_LENGTH];
350         GSupplicantPhy_mode phy_mode;
351         dbus_bool_t owe_transition_mode;
352         dbus_bool_t privacy;
353         unsigned int transition_mode_ssid_len;
354         unsigned char transition_mode_bssid[6];
355         unsigned char transition_mode_ssid[32];
356         unsigned char last_connected_bssid[WIFI_BSSID_LEN_MAX];
357         GHashTable *assoc_reject_table;
358 #endif
359 };
360
361 struct _GSupplicantPeer {
362         GSupplicantInterface *interface;
363         char *path;
364         unsigned char device_address[ETH_ALEN];
365         unsigned char iface_address[ETH_ALEN];
366         char *name;
367         unsigned char *widi_ies;
368         int widi_ies_length;
369         char *identifier;
370         unsigned int wps_capabilities;
371         GSList *groups;
372         const GSupplicantInterface *current_group_iface;
373         bool connection_requested;
374 };
375
376 struct _GSupplicantGroup {
377         GSupplicantInterface *interface;
378         GSupplicantInterface *orig_interface;
379         char *path;
380         int role;
381         GSList *members;
382 };
383
384 struct interface_data {
385         GSupplicantInterface *interface;
386         char *path; /* Interface path cannot be taken from interface (above) as
387                      * it might have been freed already.
388                      */
389         GSupplicantInterfaceCallback callback;
390         void *user_data;
391         bool network_remove_in_progress;
392         GSupplicantSSID *ssid;
393 };
394
395 #if defined TIZEN_EXT
396 struct interface_signalpoll_data {
397         GSupplicantInterface *interface;
398         char *path;
399         GSupplicantMaxSpeedCallback callback;
400         void *user_data;
401 };
402 #endif
403
404 struct interface_create_data {
405         char *ifname;
406         char *driver;
407         char *bridge;
408 #if defined TIZEN_EXT
409         unsigned int mac_addr;
410         unsigned int preassoc_mac_addr;
411         unsigned int random_mac_lifetime;
412 #endif /* TIZEN_EXT */
413 #if defined TIZEN_EXT_WIFI_MESH
414         char *parent_ifname;
415         bool is_mesh_interface;
416 #endif
417         GSupplicantInterface *interface;
418         GSupplicantInterfaceCallback callback;
419         void *user_data;
420 };
421
422 struct interface_connect_data {
423         GSupplicantInterface *interface;
424         char *path;
425         GSupplicantInterfaceCallback callback;
426         void *user_data;
427         union {
428                 GSupplicantSSID *ssid;
429                 GSupplicantPeerParams *peer;
430         };
431 };
432
433 struct interface_scan_data {
434         GSupplicantInterface *interface;
435         char *path;
436         GSupplicantInterfaceCallback callback;
437         GSupplicantScanParams *scan_params;
438         void *user_data;
439 };
440
441 #if defined TIZEN_EXT
442 struct update_bssid_data {
443         GSupplicantNetwork *network;
444         unsigned char last_connected_bssid[WIFI_BSSID_LEN_MAX];
445         GHashTable *assoc_reject_table;
446         GSList *bssid_list;
447 };
448
449 struct assoc_reject_data {
450         char *bssid;
451         GSList *reject_time_list;
452 };
453
454 struct assoc_count_data {
455         time_t ref_time;
456         int assoc_count;
457 };
458
459 static unsigned int last_connected_bss_timeout = 0;
460 static bool simplified_log = true;
461 #endif
462
463 static int network_remove(struct interface_data *data);
464
465 #if defined TIZEN_EXT_WIFI_MESH
466 struct _GSupplicantMeshPeer {
467         GSupplicantInterface *interface;
468         char *peer_address;
469         int disconnect_reason;
470 };
471 #endif
472
473 static inline void debug(const char *format, ...)
474 {
475         char str[256];
476         va_list ap;
477
478         if (!callbacks_pointer || !callbacks_pointer->debug)
479                 return;
480
481         va_start(ap, format);
482
483         if (vsnprintf(str, sizeof(str), format, ap) > 0)
484                 callbacks_pointer->debug(str);
485
486         va_end(ap);
487 }
488
489 #define SUPPLICANT_DBG(fmt, arg...) \
490         debug("%s:%s() " fmt, __FILE__, __FUNCTION__ , ## arg);
491
492 static GSupplicantMode string2mode(const char *mode)
493 {
494         if (!mode)
495                 return G_SUPPLICANT_MODE_UNKNOWN;
496
497         if (g_str_equal(mode, "infrastructure"))
498                 return G_SUPPLICANT_MODE_INFRA;
499         else if (g_str_equal(mode, "ad-hoc"))
500                 return G_SUPPLICANT_MODE_IBSS;
501 #if defined TIZEN_EXT_WIFI_MESH
502         else if (g_str_equal(mode, "mesh"))
503                 return G_SUPPLICANT_MODE_MESH;
504 #endif
505
506         return G_SUPPLICANT_MODE_UNKNOWN;
507 }
508
509 static const char *mode2string(GSupplicantMode mode)
510 {
511         switch (mode) {
512         case G_SUPPLICANT_MODE_UNKNOWN:
513                 break;
514         case G_SUPPLICANT_MODE_INFRA:
515                 return "managed";
516         case G_SUPPLICANT_MODE_IBSS:
517                 return "adhoc";
518         case G_SUPPLICANT_MODE_MASTER:
519                 return "ap";
520 #if defined TIZEN_EXT_WIFI_MESH
521         case G_SUPPLICANT_MODE_MESH:
522                 return "mesh";
523 #endif
524         }
525
526         return NULL;
527 }
528
529 static const char *security2string(GSupplicantSecurity security)
530 {
531         switch (security) {
532         case G_SUPPLICANT_SECURITY_UNKNOWN:
533                 break;
534         case G_SUPPLICANT_SECURITY_NONE:
535                 return "none";
536         case G_SUPPLICANT_SECURITY_WEP:
537                 return "wep";
538         case G_SUPPLICANT_SECURITY_PSK:
539                 return "psk";
540         case G_SUPPLICANT_SECURITY_IEEE8021X:
541                 return "ieee8021x";
542 #if defined TIZEN_EXT
543         case G_SUPPLICANT_SECURITY_PSK_SHA256:
544                 return "psk_sha256";
545         case G_SUPPLICANT_SECURITY_FT_PSK:
546                 return "ft_psk";
547         case G_SUPPLICANT_SECURITY_FT_IEEE8021X:
548                 return "ft_ieee8021x";
549         case G_SUPPLICANT_SECURITY_SAE:
550                 return "sae";
551         case G_SUPPLICANT_SECURITY_OWE:
552                 return "owe";
553         case G_SUPPLICANT_SECURITY_DPP:
554                 return "dpp";
555 #endif
556         }
557
558         return NULL;
559 }
560
561 static GSupplicantState string2state(const char *state)
562 {
563         if (!state)
564                 return G_SUPPLICANT_STATE_UNKNOWN;
565
566         if (g_str_equal(state, "unknown"))
567                 return G_SUPPLICANT_STATE_UNKNOWN;
568         else if (g_str_equal(state, "interface_disabled"))
569                 return G_SUPPLICANT_STATE_DISABLED;
570         else if (g_str_equal(state, "disconnected"))
571                 return G_SUPPLICANT_STATE_DISCONNECTED;
572         else if (g_str_equal(state, "inactive"))
573                 return G_SUPPLICANT_STATE_INACTIVE;
574         else if (g_str_equal(state, "scanning"))
575                 return G_SUPPLICANT_STATE_SCANNING;
576         else if (g_str_equal(state, "authenticating"))
577                 return G_SUPPLICANT_STATE_AUTHENTICATING;
578         else if (g_str_equal(state, "associating"))
579                 return G_SUPPLICANT_STATE_ASSOCIATING;
580         else if (g_str_equal(state, "associated"))
581                 return G_SUPPLICANT_STATE_ASSOCIATED;
582         else if (g_str_equal(state, "group_handshake"))
583                 return G_SUPPLICANT_STATE_GROUP_HANDSHAKE;
584         else if (g_str_equal(state, "4way_handshake"))
585                 return G_SUPPLICANT_STATE_4WAY_HANDSHAKE;
586         else if (g_str_equal(state, "completed"))
587                 return G_SUPPLICANT_STATE_COMPLETED;
588
589         return G_SUPPLICANT_STATE_UNKNOWN;
590 }
591
592 static bool compare_network_parameters(GSupplicantInterface *interface,
593                                 GSupplicantSSID *ssid)
594 {
595 #if defined TIZEN_EXT
596         if (!interface->network_info.ssid)
597                 return FALSE;
598 #endif
599
600         if (memcmp(interface->network_info.ssid, ssid->ssid, ssid->ssid_len))
601                 return FALSE;
602
603         if (interface->network_info.security != ssid->security)
604                 return FALSE;
605
606         if (interface->network_info.passphrase &&
607                         g_strcmp0(interface->network_info.passphrase,
608                                 ssid->passphrase) != 0) {
609                 return FALSE;
610         }
611
612         if (interface->network_info.private_passphrase &&
613                         g_strcmp0(interface->network_info.private_passphrase,
614                                 ssid->private_key_passphrase) != 0) {
615                 return FALSE;
616         }
617
618 #if defined TIZEN_EXT
619         if (interface->network_info.connector &&
620                         g_strcmp0(interface->network_info.connector,
621                                 ssid->connector) != 0) {
622                 return FALSE;
623         }
624         if (interface->network_info.c_sign_key &&
625                         g_strcmp0(interface->network_info.c_sign_key,
626                                 ssid->c_sign_key) != 0) {
627                 return FALSE;
628         }
629         if (interface->network_info.net_access_key &&
630                         g_strcmp0(interface->network_info.net_access_key,
631                                 ssid->net_access_key) != 0) {
632                 return FALSE;
633         }
634 #endif
635         return TRUE;
636 }
637
638 static void remove_network_information(GSupplicantInterface * interface)
639 {
640         g_free(interface->network_info.ssid);
641         g_free(interface->network_info.passphrase);
642         g_free(interface->network_info.private_passphrase);
643 #if defined TIZEN_EXT
644         g_free(interface->network_info.connector);
645         g_free(interface->network_info.c_sign_key);
646         g_free(interface->network_info.net_access_key);
647 #endif
648         interface->network_info.ssid = NULL;
649         interface->network_info.passphrase = NULL;
650         interface->network_info.private_passphrase = NULL;
651 #if defined TIZEN_EXT
652         interface->network_info.connector = NULL;
653         interface->network_info.c_sign_key = NULL;
654         interface->network_info.net_access_key = NULL;
655 #endif
656 }
657
658 static int store_network_information(GSupplicantInterface * interface,
659                                 GSupplicantSSID *ssid)
660 {
661         interface->network_info.ssid = g_malloc(ssid->ssid_len + 1);
662         if (interface->network_info.ssid != NULL) {
663                 memcpy(interface->network_info.ssid, ssid->ssid,
664                         ssid->ssid_len);
665                 interface->network_info.ssid[ssid->ssid_len] = '\0';
666         } else {
667                 return -ENOMEM;
668         }
669
670         interface->network_info.security = ssid->security;
671
672         if ((ssid->security == G_SUPPLICANT_SECURITY_WEP ||
673                 ssid->security == G_SUPPLICANT_SECURITY_PSK ||
674 #if defined TIZEN_EXT
675                 ssid->security == G_SUPPLICANT_SECURITY_SAE ||
676                 ssid->security == G_SUPPLICANT_SECURITY_PSK_SHA256 ||
677 #endif
678                 ssid->security == G_SUPPLICANT_SECURITY_NONE) &&
679                 ssid->passphrase) {
680                 interface->network_info.passphrase = g_strdup(ssid->passphrase);
681         }
682
683         if (ssid->security == G_SUPPLICANT_SECURITY_IEEE8021X &&
684                         ssid->private_key_passphrase) {
685                 interface->network_info.private_passphrase =
686                         g_strdup(ssid->private_key_passphrase);
687         }
688
689         return 0;
690 }
691
692 static void callback_system_ready(void)
693 {
694         if (system_ready)
695                 return;
696
697         system_ready = TRUE;
698
699         if (!callbacks_pointer)
700                 return;
701
702         if (!callbacks_pointer->system_ready)
703                 return;
704
705         callbacks_pointer->system_ready();
706 }
707
708 static void callback_system_killed(void)
709 {
710         system_ready = FALSE;
711
712         if (!callbacks_pointer)
713                 return;
714
715         if (!callbacks_pointer->system_killed)
716                 return;
717
718         callbacks_pointer->system_killed();
719 }
720
721 static void callback_interface_added(GSupplicantInterface *interface)
722 {
723         SUPPLICANT_DBG("");
724
725         if (!callbacks_pointer)
726                 return;
727
728         if (!callbacks_pointer->interface_added)
729                 return;
730
731         callbacks_pointer->interface_added(interface);
732 }
733
734 static void callback_interface_state(GSupplicantInterface *interface)
735 {
736         if (!callbacks_pointer)
737                 return;
738
739         if (!callbacks_pointer->interface_state)
740                 return;
741
742         callbacks_pointer->interface_state(interface);
743 }
744
745 static void callback_interface_removed(GSupplicantInterface *interface)
746 {
747         if (!callbacks_pointer)
748                 return;
749
750         if (!callbacks_pointer->interface_removed)
751                 return;
752
753         callbacks_pointer->interface_removed(interface);
754 }
755
756 #if !defined TIZEN_EXT
757 static void callback_p2p_support(GSupplicantInterface *interface)
758 {
759         SUPPLICANT_DBG("");
760
761         if (!interface->p2p_support)
762                 return;
763
764         if (callbacks_pointer && callbacks_pointer->p2p_support)
765                 callbacks_pointer->p2p_support(interface);
766 }
767 #endif
768
769 #if defined TIZEN_EXT_WIFI_MESH
770 static void callback_mesh_support(GSupplicantInterface *interface)
771 {
772         SUPPLICANT_DBG("");
773
774         if (!interface->mesh_support)
775                 return;
776
777         if (callbacks_pointer && callbacks_pointer->mesh_support)
778                 callbacks_pointer->mesh_support(interface);
779 }
780
781 bool g_supplicant_interface_has_mesh(GSupplicantInterface *interface)
782 {
783         if (!interface)
784                 return false;
785
786         return interface->mesh_support;
787 }
788 #endif
789
790 static void callback_scan_started(GSupplicantInterface *interface)
791 {
792         if (!callbacks_pointer)
793                 return;
794
795         if (!callbacks_pointer->scan_started)
796                 return;
797
798         callbacks_pointer->scan_started(interface);
799 }
800
801 static void callback_ap_create_fail(GSupplicantInterface *interface)
802 {
803         if (!callbacks_pointer)
804                 return;
805
806         if (!callbacks_pointer->ap_create_fail)
807                 return;
808
809         callbacks_pointer->ap_create_fail(interface);
810 }
811
812 static void callback_scan_finished(GSupplicantInterface *interface)
813 {
814         if (!callbacks_pointer)
815                 return;
816
817         if (!callbacks_pointer->scan_finished)
818                 return;
819
820         callbacks_pointer->scan_finished(interface);
821 }
822
823 static void callback_network_added(GSupplicantNetwork *network)
824 {
825         if (!callbacks_pointer)
826                 return;
827
828         if (!callbacks_pointer->network_added)
829                 return;
830
831         callbacks_pointer->network_added(network);
832 }
833
834 static void callback_network_removed(GSupplicantNetwork *network)
835 {
836         if (!callbacks_pointer)
837                 return;
838
839         if (!callbacks_pointer->network_removed)
840                 return;
841
842         callbacks_pointer->network_removed(network);
843 }
844
845 #if defined TIZEN_EXT
846 static void callback_network_merged(GSupplicantNetwork *network)
847 {
848         if (!callbacks_pointer)
849                 return;
850
851         if (!callbacks_pointer->network_merged)
852                 return;
853
854         callbacks_pointer->network_merged(network);
855 }
856
857 static void callback_assoc_failed(void *user_data)
858 {
859         if (!callbacks_pointer)
860                 return;
861
862         if (!callbacks_pointer->assoc_failed)
863                 return;
864
865         callbacks_pointer->assoc_failed(user_data);
866 }
867
868 static void callback_scan_done(GSupplicantInterface *interface)
869 {
870         if (!callbacks_pointer)
871                 return;
872
873         if (!callbacks_pointer->scan_done)
874                 return;
875
876         callbacks_pointer->scan_done(interface);
877 }
878 #endif
879
880 static void callback_network_changed(GSupplicantNetwork *network,
881                                         const char *property)
882 {
883         if (!callbacks_pointer)
884                 return;
885
886         if (!callbacks_pointer->network_changed)
887                 return;
888
889         callbacks_pointer->network_changed(network, property);
890 }
891
892 static void callback_network_associated(GSupplicantNetwork *network)
893 {
894         if (!callbacks_pointer)
895                 return;
896
897         if (!callbacks_pointer->network_associated)
898                 return;
899
900         callbacks_pointer->network_associated(network);
901 }
902
903 static void callback_sta_authorized(GSupplicantInterface *interface,
904                                         const char *addr)
905 {
906         if (!callbacks_pointer)
907                 return;
908
909         if (!callbacks_pointer->sta_authorized)
910                 return;
911
912         callbacks_pointer->sta_authorized(interface, addr);
913 }
914
915 static void callback_sta_deauthorized(GSupplicantInterface *interface,
916                                         const char *addr)
917 {
918         if (!callbacks_pointer)
919                 return;
920
921         if (!callbacks_pointer->sta_deauthorized)
922                 return;
923
924         callbacks_pointer->sta_deauthorized(interface, addr);
925 }
926
927 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
928 static void callback_eap(GSupplicantInterface *interface, bool status)
929 {
930         if (!callbacks_pointer)
931                 return;
932
933         if (!callbacks_pointer->eap)
934                 return;
935
936         callbacks_pointer->eap(interface, status);
937 }
938 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
939
940 static void callback_peer_found(GSupplicantPeer *peer)
941 {
942         if (!callbacks_pointer)
943                 return;
944
945         if (!callbacks_pointer->peer_found)
946                 return;
947
948         callbacks_pointer->peer_found(peer);
949 }
950
951 static void callback_peer_lost(GSupplicantPeer *peer)
952 {
953         if (!callbacks_pointer)
954                 return;
955
956         if (!callbacks_pointer->peer_lost)
957                 return;
958
959         callbacks_pointer->peer_lost(peer);
960 }
961
962 static void callback_peer_changed(GSupplicantPeer *peer,
963                                                 GSupplicantPeerState state)
964 {
965         if (!callbacks_pointer)
966                 return;
967
968         if (!callbacks_pointer->peer_changed)
969                 return;
970
971         callbacks_pointer->peer_changed(peer, state);
972 }
973
974 static void callback_peer_request(GSupplicantPeer *peer)
975 {
976         if (!callbacks_pointer)
977                 return;
978
979         if (!callbacks_pointer->peer_request)
980                 return;
981
982         peer->connection_requested = true;
983
984         callbacks_pointer->peer_request(peer);
985 }
986
987 static void callback_disconnect_reason_code(GSupplicantInterface *interface,
988                                         int reason_code)
989 {
990         if (!callbacks_pointer)
991                 return;
992
993         if (!callbacks_pointer->disconnect_reasoncode)
994                 return;
995
996         if (reason_code != 0)
997                 callbacks_pointer->disconnect_reasoncode(interface,
998                                                         reason_code);
999 }
1000
1001 static void callback_assoc_status_code(GSupplicantInterface *interface,
1002                                 int status_code)
1003 {
1004         if (!callbacks_pointer)
1005                 return;
1006
1007         if (!callbacks_pointer->assoc_status_code)
1008                 return;
1009
1010         callbacks_pointer->assoc_status_code(interface, status_code);
1011
1012 }
1013
1014 static void remove_group(gpointer data)
1015 {
1016         GSupplicantGroup *group = data;
1017
1018         if (group->members)
1019                 g_slist_free_full(group->members, g_free);
1020
1021         g_free(group->path);
1022         g_free(group);
1023 }
1024
1025 static void remove_interface(gpointer data)
1026 {
1027         GSupplicantInterface *interface = data;
1028
1029         g_hash_table_destroy(interface->bss_mapping);
1030         g_hash_table_destroy(interface->network_table);
1031         g_hash_table_destroy(interface->peer_table);
1032         g_hash_table_destroy(interface->group_table);
1033
1034         if (interface->scan_callback) {
1035                 SUPPLICANT_DBG("call interface %p callback %p scanning %d",
1036                                 interface, interface->scan_callback,
1037                                 interface->scanning);
1038
1039                 interface->scan_callback(-EIO, interface, interface->scan_data);
1040                 interface->scan_callback = NULL;
1041                 interface->scan_data = NULL;
1042
1043                 if (interface->scanning) {
1044                         interface->scanning = FALSE;
1045                         callback_scan_finished(interface);
1046                 }
1047         }
1048
1049         callback_interface_removed(interface);
1050
1051         g_free(interface->wps_cred.key);
1052         g_free(interface->path);
1053         g_free(interface->network_path);
1054 #if defined TIZEN_EXT
1055         interface->network_path = NULL;
1056 #endif
1057         g_free(interface->ifname);
1058         g_free(interface->driver);
1059         g_free(interface->bridge);
1060         remove_network_information(interface);
1061         g_free(interface);
1062 }
1063
1064 static void remove_network(gpointer data)
1065 {
1066         GSupplicantNetwork *network = data;
1067
1068         g_hash_table_destroy(network->bss_table);
1069
1070         callback_network_removed(network);
1071
1072         g_hash_table_destroy(network->config_table);
1073 #if defined TIZEN_EXT
1074         g_hash_table_destroy(network->assoc_reject_table);
1075 #endif
1076
1077         g_free(network->path);
1078         g_free(network->group);
1079         g_free(network->name);
1080 #if defined TIZEN_EXT
1081         g_free(network->eap);
1082         g_free(network->identity);
1083         g_free(network->phase2);
1084 #endif
1085 #if defined TIZEN_EXT
1086         g_slist_free_full(network->vsie_list, g_free);
1087 #endif
1088
1089         g_free(network);
1090 }
1091
1092 static void remove_bss(gpointer data)
1093 {
1094         struct g_supplicant_bss *bss = data;
1095
1096         supplicant_dbus_property_call_cancel_all(bss);
1097
1098         g_free(bss->path);
1099 #if defined TIZEN_EXT
1100         g_slist_free_full(bss->vsie_list, g_free);
1101 #endif
1102         g_free(bss);
1103 }
1104
1105 static void remove_peer(gpointer data)
1106 {
1107         GSupplicantPeer *peer = data;
1108
1109         callback_peer_lost(peer);
1110
1111         if (peer->groups)
1112                 g_slist_free_full(peer->groups, g_free);
1113
1114         if (peer_mapping)
1115                 g_hash_table_remove(peer_mapping, peer->path);
1116
1117         if (pending_peer_connection)
1118                 g_hash_table_remove(pending_peer_connection, peer->path);
1119
1120         g_free(peer->path);
1121         g_free(peer->name);
1122         g_free(peer->identifier);
1123         g_free(peer->widi_ies);
1124
1125         g_free(peer);
1126 }
1127
1128 #if defined TIZEN_EXT
1129 static void remove_assoc_data(gpointer data)
1130 {
1131         struct assoc_reject_data *assoc_data = data;
1132
1133         g_free(assoc_data->bssid);
1134         g_slist_free(assoc_data->reject_time_list);
1135
1136         g_free(assoc_data);
1137 }
1138 #endif
1139
1140 static void debug_strvalmap(const char *label, struct strvalmap *map,
1141                                                         unsigned int val)
1142 {
1143         int i;
1144 #if defined TIZEN_EXT
1145         if (!simplified_log)
1146 #endif
1147         for (i = 0; map[i].str; i++) {
1148                 if (val & map[i].val)
1149                         SUPPLICANT_DBG("%s: %s", label, map[i].str);
1150         }
1151 }
1152
1153 static void interface_capability_keymgmt(DBusMessageIter *iter, void *user_data)
1154 {
1155         GSupplicantInterface *interface = user_data;
1156         const char *str = NULL;
1157         int i;
1158
1159         dbus_message_iter_get_basic(iter, &str);
1160         if (!str)
1161                 return;
1162
1163         for (i = 0; keymgmt_map[i].str; i++)
1164                 if (strcmp(str, keymgmt_map[i].str) == 0) {
1165                         interface->keymgmt_capa |= keymgmt_map[i].val;
1166                         break;
1167                 }
1168 }
1169
1170 static void interface_capability_authalg(DBusMessageIter *iter, void *user_data)
1171 {
1172         GSupplicantInterface *interface = user_data;
1173         const char *str = NULL;
1174         int i;
1175
1176         dbus_message_iter_get_basic(iter, &str);
1177         if (!str)
1178                 return;
1179
1180         for (i = 0; authalg_capa_map[i].str; i++)
1181                 if (strcmp(str, authalg_capa_map[i].str) == 0) {
1182                         interface->authalg_capa |= authalg_capa_map[i].val;
1183                         break;
1184                 }
1185 }
1186
1187 static void interface_capability_proto(DBusMessageIter *iter, void *user_data)
1188 {
1189         GSupplicantInterface *interface = user_data;
1190         const char *str = NULL;
1191         int i;
1192
1193         dbus_message_iter_get_basic(iter, &str);
1194         if (!str)
1195                 return;
1196
1197         for (i = 0; proto_capa_map[i].str; i++)
1198                 if (strcmp(str, proto_capa_map[i].str) == 0) {
1199                         interface->proto_capa |= proto_capa_map[i].val;
1200                         break;
1201                 }
1202 }
1203
1204 static void interface_capability_pairwise(DBusMessageIter *iter,
1205                                                         void *user_data)
1206 {
1207         GSupplicantInterface *interface = user_data;
1208         const char *str = NULL;
1209         int i;
1210
1211         dbus_message_iter_get_basic(iter, &str);
1212         if (!str)
1213                 return;
1214
1215         for (i = 0; pairwise_map[i].str; i++)
1216                 if (strcmp(str, pairwise_map[i].str) == 0) {
1217                         interface->pairwise_capa |= pairwise_map[i].val;
1218                         break;
1219                 }
1220 }
1221
1222 static void interface_capability_group(DBusMessageIter *iter, void *user_data)
1223 {
1224         GSupplicantInterface *interface = user_data;
1225         const char *str = NULL;
1226         int i;
1227
1228         dbus_message_iter_get_basic(iter, &str);
1229         if (!str)
1230                 return;
1231
1232         for (i = 0; group_map[i].str; i++)
1233                 if (strcmp(str, group_map[i].str) == 0) {
1234                         interface->group_capa |= group_map[i].val;
1235                         break;
1236                 }
1237 }
1238
1239 static void interface_capability_scan(DBusMessageIter *iter, void *user_data)
1240 {
1241         GSupplicantInterface *interface = user_data;
1242         const char *str = NULL;
1243         int i;
1244
1245         dbus_message_iter_get_basic(iter, &str);
1246         if (!str)
1247                 return;
1248
1249         for (i = 0; scan_capa_map[i].str; i++)
1250                 if (strcmp(str, scan_capa_map[i].str) == 0) {
1251                         interface->scan_capa |= scan_capa_map[i].val;
1252                         break;
1253                 }
1254 }
1255
1256 static void interface_capability_mode(DBusMessageIter *iter, void *user_data)
1257 {
1258         GSupplicantInterface *interface = user_data;
1259         const char *str = NULL;
1260         int i;
1261
1262         dbus_message_iter_get_basic(iter, &str);
1263         if (!str)
1264                 return;
1265
1266         for (i = 0; mode_capa_map[i].str; i++)
1267                 if (strcmp(str, mode_capa_map[i].str) == 0) {
1268                         interface->mode_capa |= mode_capa_map[i].val;
1269                         break;
1270                 }
1271 }
1272
1273 static void interface_capability(const char *key, DBusMessageIter *iter,
1274                                                         void *user_data)
1275 {
1276         GSupplicantInterface *interface = user_data;
1277
1278         if (!key)
1279                 return;
1280
1281         if (g_strcmp0(key, "KeyMgmt") == 0)
1282                 supplicant_dbus_array_foreach(iter,
1283                                 interface_capability_keymgmt, interface);
1284         else if (g_strcmp0(key, "AuthAlg") == 0)
1285                 supplicant_dbus_array_foreach(iter,
1286                                 interface_capability_authalg, interface);
1287         else if (g_strcmp0(key, "Protocol") == 0)
1288                 supplicant_dbus_array_foreach(iter,
1289                                 interface_capability_proto, interface);
1290         else if (g_strcmp0(key, "Pairwise") == 0)
1291                 supplicant_dbus_array_foreach(iter,
1292                                 interface_capability_pairwise, interface);
1293         else if (g_strcmp0(key, "Group") == 0)
1294                 supplicant_dbus_array_foreach(iter,
1295                                 interface_capability_group, interface);
1296         else if (g_strcmp0(key, "Scan") == 0)
1297                 supplicant_dbus_array_foreach(iter,
1298                                 interface_capability_scan, interface);
1299         else if (g_strcmp0(key, "Modes") == 0)
1300                 supplicant_dbus_array_foreach(iter,
1301                                 interface_capability_mode, interface);
1302         else if (g_strcmp0(key, "MaxScanSSID") == 0) {
1303                 dbus_int32_t max_scan_ssid;
1304
1305                 dbus_message_iter_get_basic(iter, &max_scan_ssid);
1306                 if (max_scan_ssid < 2)
1307                         max_scan_ssid = 0;
1308                 interface->max_scan_ssids = max_scan_ssid;
1309 #if defined TIZEN_EXT
1310         } else if (g_strcmp0(key, "Is5GhzSupported") == 0) {
1311                 dbus_bool_t is_5_0_Ghz_supported;
1312
1313                 dbus_message_iter_get_basic(iter, &is_5_0_Ghz_supported);
1314                 interface->is_5_0_Ghz_supported = is_5_0_Ghz_supported;
1315 #endif
1316         } else
1317                 SUPPLICANT_DBG("key %s type %c",
1318                                 key, dbus_message_iter_get_arg_type(iter));
1319 }
1320
1321 static void set_bss_expiration_age(DBusMessageIter *iter, void *user_data)
1322 {
1323         unsigned int bss_expiration_age = GPOINTER_TO_UINT(user_data);
1324
1325         dbus_message_iter_append_basic(iter, DBUS_TYPE_UINT32,
1326                                 &bss_expiration_age);
1327 }
1328
1329 int g_supplicant_interface_set_bss_expiration_age(GSupplicantInterface *interface,
1330                                         unsigned int bss_expiration_age)
1331 {
1332        return supplicant_dbus_property_set(interface->path,
1333                                        SUPPLICANT_INTERFACE ".Interface",
1334                                        "BSSExpireAge", DBUS_TYPE_UINT32_AS_STRING,
1335                                        set_bss_expiration_age, NULL,
1336                                        GUINT_TO_POINTER(bss_expiration_age), NULL);
1337 }
1338
1339 struct set_apscan_data
1340 {
1341         unsigned int ap_scan;
1342         GSupplicantInterface *interface;
1343 };
1344
1345 static void set_apscan(DBusMessageIter *iter, void *user_data)
1346 {
1347         struct set_apscan_data *data = user_data;
1348         unsigned int ap_scan = data->ap_scan;
1349
1350         dbus_message_iter_append_basic(iter, DBUS_TYPE_UINT32, &ap_scan);
1351 }
1352
1353 static void set_apscan_complete(const char *error,
1354                 DBusMessageIter *iter, void *user_data)
1355 {
1356         struct set_apscan_data *data = user_data;
1357         GSupplicantInterface *interface = data->interface;
1358
1359         if (error) {
1360                 interface->ap_create_in_progress = false;
1361                 SUPPLICANT_DBG("Set AP scan error %s", error);
1362                 goto error;
1363         }
1364
1365         interface->ap_create_in_progress = true;
1366 error:
1367         dbus_free(data);
1368 }
1369
1370 int g_supplicant_interface_set_apscan(GSupplicantInterface *interface,
1371                                                         unsigned int ap_scan)
1372 {
1373         struct set_apscan_data *data;
1374         int ret;
1375
1376         data = dbus_malloc0(sizeof(*data));
1377
1378         if (!data)
1379                 return -ENOMEM;
1380
1381         data->ap_scan = ap_scan;
1382         data->interface = interface;
1383
1384         ret = supplicant_dbus_property_set(interface->path,
1385                         SUPPLICANT_INTERFACE ".Interface",
1386                         "ApScan", DBUS_TYPE_UINT32_AS_STRING,
1387                         set_apscan, set_apscan_complete, data, NULL);
1388         if (ret < 0)
1389                 dbus_free(data);
1390
1391         return ret;
1392 }
1393
1394 void g_supplicant_interface_set_data(GSupplicantInterface *interface,
1395                                                                 void *data)
1396 {
1397         if (!interface)
1398                 return;
1399
1400         interface->data = data;
1401
1402         if (!data)
1403                 interface->scan_callback = NULL;
1404 }
1405
1406 void *g_supplicant_interface_get_data(GSupplicantInterface *interface)
1407 {
1408         if (!interface)
1409                 return NULL;
1410
1411         return interface->data;
1412 }
1413
1414 const char *g_supplicant_interface_get_ifname(GSupplicantInterface *interface)
1415 {
1416         if (!interface)
1417                 return NULL;
1418
1419         return interface->ifname;
1420 }
1421
1422 #if defined TIZEN_EXT
1423 bool g_supplicant_interface_get_is_5_0_ghz_supported(GSupplicantInterface *interface)
1424 {
1425         if (!interface)
1426                 return NULL;
1427
1428         return interface->is_5_0_Ghz_supported;
1429 }
1430
1431 unsigned char *g_supplicant_interface_get_add_network_bssid(GSupplicantInterface *interface)
1432 {
1433         if (!interface)
1434                 return NULL;
1435
1436         return (unsigned char *)interface->add_network_bssid;
1437 }
1438 #endif
1439
1440 const char *g_supplicant_interface_get_driver(GSupplicantInterface *interface)
1441 {
1442         if (!interface)
1443                 return NULL;
1444
1445         return interface->driver;
1446 }
1447
1448 GSupplicantState g_supplicant_interface_get_state(
1449                                         GSupplicantInterface *interface)
1450 {
1451         if (!interface)
1452                 return G_SUPPLICANT_STATE_UNKNOWN;
1453
1454         return interface->state;
1455 }
1456
1457 const char *g_supplicant_interface_get_wps_key(GSupplicantInterface *interface)
1458 {
1459         if (!interface)
1460                 return NULL;
1461
1462         return (const char *)interface->wps_cred.key;
1463 }
1464
1465 const void *g_supplicant_interface_get_wps_ssid(GSupplicantInterface *interface,
1466                                                         unsigned int *ssid_len)
1467 {
1468         if (!ssid_len)
1469                 return NULL;
1470
1471         if (!interface || interface->wps_cred.ssid_len == 0) {
1472                 *ssid_len = 0;
1473                 return NULL;
1474         }
1475
1476         *ssid_len = interface->wps_cred.ssid_len;
1477         return interface->wps_cred.ssid;
1478 }
1479
1480 GSupplicantWpsState g_supplicant_interface_get_wps_state(
1481                                         GSupplicantInterface *interface)
1482 {
1483         if (!interface)
1484                 return G_SUPPLICANT_WPS_STATE_UNKNOWN;
1485
1486         return interface->wps_state;
1487 }
1488
1489 unsigned int g_supplicant_interface_get_mode(GSupplicantInterface *interface)
1490 {
1491         if (!interface)
1492                 return 0;
1493
1494         return interface->mode_capa;
1495 }
1496
1497 unsigned int g_supplicant_interface_get_max_scan_ssids(
1498                                 GSupplicantInterface *interface)
1499 {
1500         if (!interface)
1501                 return 0;
1502
1503         if (interface->max_scan_ssids == 0)
1504                 return WPAS_MAX_SCAN_SSIDS;
1505
1506         return interface->max_scan_ssids;
1507 }
1508
1509 static void set_network_enabled(DBusMessageIter *iter, void *user_data)
1510 {
1511         dbus_bool_t enable = *(dbus_bool_t *)user_data;
1512
1513         dbus_message_iter_append_basic(iter, DBUS_TYPE_BOOLEAN, &enable);
1514 }
1515
1516 int g_supplicant_interface_enable_selected_network(GSupplicantInterface *interface,
1517                                                         dbus_bool_t enable)
1518 {
1519         if (!interface)
1520                 return -1;
1521
1522         if (!interface->network_path)
1523                 return -1;
1524
1525         SUPPLICANT_DBG(" ");
1526         return supplicant_dbus_property_set(interface->network_path,
1527                                 SUPPLICANT_INTERFACE ".Network",
1528                                 "Enabled", DBUS_TYPE_BOOLEAN_AS_STRING,
1529                                 set_network_enabled, NULL, &enable, NULL);
1530 }
1531
1532 dbus_bool_t g_supplicant_interface_get_ready(GSupplicantInterface *interface)
1533 {
1534         if (!interface)
1535                 return FALSE;
1536
1537         return interface->ready;
1538 }
1539
1540 GSupplicantInterface *g_supplicant_network_get_interface(
1541                                         GSupplicantNetwork *network)
1542 {
1543         if (!network)
1544                 return NULL;
1545
1546         return network->interface;
1547 }
1548
1549 const char *g_supplicant_network_get_name(GSupplicantNetwork *network)
1550 {
1551         if (!network || !network->name)
1552                 return "";
1553
1554         return network->name;
1555 }
1556
1557 const char *g_supplicant_network_get_identifier(GSupplicantNetwork *network)
1558 {
1559         if (!network || !network->group)
1560                 return "";
1561
1562         return network->group;
1563 }
1564
1565 const char *g_supplicant_network_get_path(GSupplicantNetwork *network)
1566 {
1567         if (!network || !network->path)
1568                 return NULL;
1569
1570         return network->path;
1571 }
1572
1573 const char *g_supplicant_network_get_mode(GSupplicantNetwork *network)
1574 {
1575         if (!network)
1576                 return G_SUPPLICANT_MODE_UNKNOWN;
1577
1578         return mode2string(network->mode);
1579 }
1580
1581 const char *g_supplicant_network_get_security(GSupplicantNetwork *network)
1582 {
1583         if (!network)
1584                 return G_SUPPLICANT_SECURITY_UNKNOWN;
1585
1586         return security2string(network->security);
1587 }
1588
1589 const void *g_supplicant_network_get_ssid(GSupplicantNetwork *network,
1590                                                 unsigned int *ssid_len)
1591 {
1592         if (!network) {
1593                 *ssid_len = 0;
1594                 return NULL;
1595         }
1596
1597         *ssid_len = network->ssid_len;
1598         return network->ssid;
1599 }
1600
1601 dbus_int16_t g_supplicant_network_get_signal(GSupplicantNetwork *network)
1602 {
1603         if (!network)
1604                 return 0;
1605
1606         return network->signal;
1607 }
1608
1609 #if defined TIZEN_EXT
1610 void g_supplicant_network_set_signal(GSupplicantNetwork *network, int signal)
1611 {
1612         if (!network)
1613                 return;
1614
1615         network->signal = (dbus_int16_t)signal;
1616 }
1617
1618 void g_supplicant_network_set_bss_signal(GSupplicantNetwork *network,
1619                 int signal, int snr)
1620 {
1621         struct g_supplicant_bss *best_bss;
1622
1623         if (!network)
1624                 return;
1625
1626         best_bss = network->best_bss;
1627         if (!best_bss)
1628                 return;
1629
1630         best_bss->signal = (dbus_int16_t)signal;
1631         best_bss->snr = (dbus_int16_t)snr;
1632 }
1633 #endif
1634
1635 dbus_uint16_t g_supplicant_network_get_frequency(GSupplicantNetwork *network)
1636 {
1637         if (!network)
1638                 return 0;
1639
1640         return network->frequency;
1641 }
1642
1643 dbus_bool_t g_supplicant_network_get_wps(GSupplicantNetwork *network)
1644 {
1645         if (!network)
1646                 return FALSE;
1647
1648         return network->wps;
1649 }
1650
1651 dbus_bool_t g_supplicant_network_is_wps_active(GSupplicantNetwork *network)
1652 {
1653         if (!network)
1654                 return FALSE;
1655
1656         if (network->wps_capabilities & G_SUPPLICANT_WPS_CONFIGURED)
1657                 return TRUE;
1658
1659         return FALSE;
1660 }
1661
1662 dbus_bool_t g_supplicant_network_is_wps_pbc(GSupplicantNetwork *network)
1663 {
1664         if (!network)
1665                 return FALSE;
1666
1667         if (network->wps_capabilities & G_SUPPLICANT_WPS_PBC)
1668                 return TRUE;
1669
1670         return FALSE;
1671 }
1672
1673 dbus_bool_t g_supplicant_network_is_wps_advertizing(GSupplicantNetwork *network)
1674 {
1675         if (!network)
1676                 return FALSE;
1677
1678         if (network->wps_capabilities & G_SUPPLICANT_WPS_REGISTRAR)
1679                 return TRUE;
1680
1681         return FALSE;
1682 }
1683
1684 #ifdef TIZEN_EXT
1685 GSupplicantPhy_mode g_supplicant_network_get_phy_mode(GSupplicantNetwork *network)
1686 {
1687         if (!network)
1688                 return G_SUPPLICANT_MODE_IEEE80211_UNKNOWN;
1689
1690         return network->phy_mode;
1691 }
1692 #endif
1693
1694 GSupplicantInterface *g_supplicant_peer_get_interface(GSupplicantPeer *peer)
1695 {
1696         if (!peer)
1697                 return NULL;
1698
1699         return peer->interface;
1700 }
1701
1702 const char *g_supplicant_peer_get_path(GSupplicantPeer *peer)
1703 {
1704         if (!peer)
1705                 return NULL;
1706
1707         return peer->path;
1708 }
1709
1710 const char *g_supplicant_peer_get_identifier(GSupplicantPeer *peer)
1711 {
1712         if (!peer)
1713                 return NULL;
1714
1715         return peer->identifier;
1716 }
1717
1718 const void *g_supplicant_peer_get_device_address(GSupplicantPeer *peer)
1719 {
1720         if (!peer)
1721                 return NULL;
1722
1723         return peer->device_address;
1724 }
1725
1726 const void *g_supplicant_peer_get_iface_address(GSupplicantPeer *peer)
1727 {
1728         if (!peer)
1729                 return NULL;
1730
1731         return peer->iface_address;
1732 }
1733
1734 const char *g_supplicant_peer_get_name(GSupplicantPeer *peer)
1735 {
1736         if (!peer)
1737                 return NULL;
1738
1739         return peer->name;
1740 }
1741
1742 #if defined TIZEN_EXT
1743 bool g_supplicant_network_is_hs20AP(GSupplicantNetwork *network)
1744 {
1745         if (!network)
1746                 return 0;
1747
1748         return network->isHS20AP;
1749 }
1750
1751 const char *g_supplicant_network_get_eap(GSupplicantNetwork *network)
1752 {
1753         if (!network || !network->eap)
1754                 return NULL;
1755
1756         return network->eap;
1757 }
1758
1759 const char *g_supplicant_network_get_identity(GSupplicantNetwork *network)
1760 {
1761         if (!network || !network->identity)
1762                 return NULL;
1763
1764         return network->identity;
1765 }
1766
1767 const char *g_supplicant_network_get_phase2(GSupplicantNetwork *network)
1768 {
1769         if (!network || !network->phase2)
1770                 return NULL;
1771
1772         return network->phase2;
1773 }
1774
1775 unsigned int g_supplicant_network_get_keymgmt(GSupplicantNetwork *network)
1776 {
1777         if (!network)
1778                 return 0;
1779
1780         return network->keymgmt;
1781 }
1782
1783 dbus_bool_t g_supplicant_network_get_privacy(GSupplicantNetwork *network)
1784 {
1785         if (!network)
1786                 return FALSE;
1787
1788         return network->privacy;
1789 }
1790
1791 const unsigned char *g_supplicant_network_get_countrycode(GSupplicantNetwork
1792                                                           *network)
1793 {
1794         if (!network)
1795                 return NULL;
1796
1797         return network->country_code;
1798 }
1799
1800 dbus_bool_t g_supplicant_network_is_pmf_required(GSupplicantNetwork *network)
1801 {
1802         if (!network)
1803                 return 0;
1804
1805         return network->best_bss->pmf_required;
1806 }
1807 #endif
1808
1809 const unsigned char *g_supplicant_peer_get_widi_ies(GSupplicantPeer *peer,
1810                                                                 int *length)
1811 {
1812         if (!peer || !length)
1813                 return NULL;
1814
1815         *length = peer->widi_ies_length;
1816         return peer->widi_ies;
1817 }
1818
1819 bool g_supplicant_peer_is_wps_pbc(GSupplicantPeer *peer)
1820 {
1821         if (!peer)
1822                 return false;
1823
1824         if (peer->wps_capabilities & G_SUPPLICANT_WPS_PBC)
1825                 return true;
1826
1827         return false;
1828 }
1829
1830 bool g_supplicant_peer_is_wps_pin(GSupplicantPeer *peer)
1831 {
1832         if (!peer)
1833                 return false;
1834
1835         if (peer->wps_capabilities & G_SUPPLICANT_WPS_PIN)
1836                 return true;
1837
1838         return false;
1839 }
1840
1841 bool g_supplicant_peer_is_in_a_group(GSupplicantPeer *peer)
1842 {
1843         if (!peer || !peer->groups)
1844                 return false;
1845
1846         return true;
1847 }
1848
1849 GSupplicantInterface *g_supplicant_peer_get_group_interface(GSupplicantPeer *peer)
1850 {
1851         if (!peer)
1852                 return NULL;
1853
1854         return (GSupplicantInterface *) peer->current_group_iface;
1855 }
1856
1857 bool g_supplicant_peer_is_client(GSupplicantPeer *peer)
1858 {
1859         GSupplicantGroup *group;
1860         GSList *list;
1861
1862         if (!peer)
1863                 return false;
1864
1865         for (list = peer->groups; list; list = list->next) {
1866                 const char *path = list->data;
1867
1868                 group = g_hash_table_lookup(group_mapping, path);
1869                 if (!group)
1870                         continue;
1871
1872                 if (group->role != G_SUPPLICANT_GROUP_ROLE_CLIENT ||
1873                                 group->orig_interface != peer->interface)
1874                         continue;
1875
1876                 if (group->interface == peer->current_group_iface)
1877                         return true;
1878         }
1879
1880         return false;
1881 }
1882
1883 bool g_supplicant_peer_has_requested_connection(GSupplicantPeer *peer)
1884 {
1885         if (!peer)
1886                 return false;
1887
1888         return peer->connection_requested;
1889 }
1890
1891 #if defined TIZEN_EXT
1892 /*
1893  * Description: Network client requires additional wifi specific info
1894  */
1895 const unsigned char *g_supplicant_network_get_bssid(GSupplicantNetwork *network)
1896 {
1897         if (network == NULL || network->best_bss == NULL)
1898                 return NULL;
1899
1900         return (const unsigned char *)network->best_bss->bssid;
1901 }
1902
1903 dbus_bool_t g_supplicant_network_get_transition_mode(GSupplicantNetwork *network)
1904 {
1905         if (network == NULL)
1906                 return FALSE;
1907
1908         return network->owe_transition_mode;
1909 }
1910
1911 const unsigned char *g_supplicant_network_get_transition_mode_bssid(GSupplicantNetwork *network)
1912 {
1913         if (network == NULL)
1914                 return NULL;
1915
1916         return (const unsigned char *)network->transition_mode_bssid;
1917 }
1918
1919 const void *g_supplicant_network_get_transition_mode_ssid(GSupplicantNetwork *network,
1920                                                 unsigned int *transition_mode_ssid_len)
1921 {
1922         if (!network) {
1923                 *transition_mode_ssid_len = 0;
1924                 return NULL;
1925         }
1926
1927         *transition_mode_ssid_len = network->transition_mode_ssid_len;
1928         return network->transition_mode_ssid;
1929 }
1930
1931 unsigned int g_supplicant_network_get_maxrate(GSupplicantNetwork *network)
1932 {
1933         if (network == NULL || network->best_bss == NULL)
1934                 return 0;
1935
1936         return network->best_bss->maxrate;
1937 }
1938
1939 const char *g_supplicant_network_get_enc_mode(GSupplicantNetwork *network)
1940 {
1941         if (network == NULL || network->best_bss == NULL)
1942                 return NULL;
1943
1944         if (network->best_bss->security == G_SUPPLICANT_SECURITY_PSK ||
1945                         network->best_bss->security == G_SUPPLICANT_SECURITY_SAE ||
1946                         network->best_bss->security == G_SUPPLICANT_SECURITY_OWE ||
1947                         network->best_bss->security == G_SUPPLICANT_SECURITY_DPP ||
1948                         network->best_bss->security == G_SUPPLICANT_SECURITY_PSK_SHA256 ||
1949                         network->best_bss->security == G_SUPPLICANT_SECURITY_IEEE8021X) {
1950                 unsigned int pairwise;
1951
1952                 pairwise = network->best_bss->rsn_pairwise |
1953                                 network->best_bss->wpa_pairwise;
1954
1955                 if ((pairwise & G_SUPPLICANT_PAIRWISE_CCMP) &&
1956                     (pairwise & G_SUPPLICANT_PAIRWISE_TKIP))
1957                         return "mixed";
1958                 else if (pairwise & G_SUPPLICANT_PAIRWISE_CCMP)
1959                         return "aes";
1960                 else if (pairwise & G_SUPPLICANT_PAIRWISE_TKIP)
1961                         return "tkip";
1962
1963         } else if (network->best_bss->security == G_SUPPLICANT_SECURITY_WEP)
1964                 return "wep";
1965         else if (network->best_bss->security == G_SUPPLICANT_SECURITY_NONE)
1966                 return "none";
1967
1968         return NULL;
1969 }
1970
1971 bool g_supplicant_network_get_rsn_mode(GSupplicantNetwork *network)
1972 {
1973         if (network == NULL || network->best_bss == NULL)
1974                 return 0;
1975
1976         if (network->best_bss->security == G_SUPPLICANT_SECURITY_OWE ||
1977                         network->best_bss->security == G_SUPPLICANT_SECURITY_DPP)
1978                 return false;
1979
1980         if (network->best_bss->rsn_selected) {
1981                 const char *mode = g_supplicant_network_get_enc_mode(network);
1982                 if (g_strcmp0(mode, "aes") == 0 ||
1983                                 g_strcmp0(mode, "mixed") == 0)
1984                         return true;
1985                 else
1986                         return false;
1987         } else
1988                 return false;
1989 }
1990
1991 void *g_supplicant_network_get_wifi_vsie(GSupplicantNetwork *network)
1992 {
1993         GSList *vsie_list = NULL;
1994
1995         if (!network)
1996                 return NULL;
1997
1998         if (g_slist_length(network->vsie_list) > 0) {
1999                 GSList *list = NULL;
2000                 unsigned char *vsie = NULL;
2001                 for (list = network->vsie_list; list; list = list->next) {
2002                         unsigned char *ie = (unsigned char *)list->data;
2003                         if (ie == NULL)
2004                                 continue;
2005                         vsie = (unsigned char *)g_try_malloc0(ie[1]+2); // tag number size(1), tag length size(1)
2006
2007                         if (vsie) {
2008                                 memcpy(vsie, ie, ie[1]+2);
2009                                 vsie_list = g_slist_append(vsie_list, vsie);
2010                         } else
2011                                 SUPPLICANT_DBG("Failed to allocate memory");
2012                 }
2013         }
2014
2015         return vsie_list;
2016 }
2017
2018 static bool compare_bssid(unsigned char *bssid_a, unsigned char *bssid_b)
2019 {
2020         if (!memcmp(bssid_a, bssid_b, WIFI_BSSID_LEN_MAX))
2021                 return true;
2022
2023         return false;
2024 }
2025
2026 static gchar *convert_bssid_to_str(unsigned char *bssid)
2027 {
2028         GString *bssid_str;
2029         unsigned int i;
2030
2031         bssid_str = g_string_sized_new(18);
2032         if (!bssid_str)
2033                 return NULL;
2034
2035         for (i = 0; i < WIFI_BSSID_LEN_MAX; i++) {
2036                 g_string_append_printf(bssid_str, "%02x", bssid[i]);
2037                 if (i < WIFI_BSSID_LEN_MAX - 1)
2038                         g_string_append(bssid_str, ":");
2039         }
2040
2041         return g_string_free(bssid_str, FALSE);
2042 }
2043
2044 #if defined TIZEN_EXT_INS
2045 static void count_assoc_reject(gpointer data, gpointer user_data)
2046 {
2047         time_t assoc_reject_time = GPOINTER_TO_INT(data);
2048         struct assoc_count_data *assoc_count = user_data;
2049
2050         if (assoc_reject_time > assoc_count->ref_time)
2051                 assoc_count->assoc_count++;
2052 }
2053
2054 static uint16_t get_assoc_reject_cnt(GHashTable *assoc_reject_table, unsigned char *bssid)
2055 {
2056         gchar *bssid_str;
2057         struct assoc_reject_data *assoc_data;
2058         struct assoc_count_data assoc_count;
2059         time_t curr_time;
2060         struct tm* timeinfo;
2061
2062         if (g_hash_table_size(assoc_reject_table) < 1)
2063                 return 0;
2064
2065         if (!bssid)
2066                 return 0;
2067
2068         if (!memcmp(bssid, invalid_bssid, WIFI_BSSID_LEN_MAX))
2069                 return 0;
2070
2071         bssid_str = convert_bssid_to_str(bssid);
2072         if (!bssid_str)
2073                 return 0;
2074
2075         assoc_data = g_hash_table_lookup(assoc_reject_table, bssid_str);
2076         if (!assoc_data) {
2077                 g_free(bssid_str);
2078                 return 0;
2079         }
2080
2081         if (g_slist_length(assoc_data->reject_time_list) < 1) {
2082                 g_free(bssid_str);
2083                 return 0;
2084         }
2085
2086         /* Only events that occur within one hour are appened. */
2087         curr_time = time(NULL);
2088         timeinfo = localtime(&curr_time);
2089         timeinfo->tm_hour -= 1;
2090
2091         assoc_count.ref_time = mktime(timeinfo);
2092         assoc_count.assoc_count = 0;
2093
2094         g_slist_foreach(assoc_data->reject_time_list, count_assoc_reject, &assoc_count);
2095
2096         g_free(bssid_str);
2097         return assoc_count.assoc_count;
2098 }
2099
2100 static int calculate_score_last_connected_bssid(bool is_last_connected)
2101 {
2102         int score = 0;
2103
2104         if (ins_settings.last_connected_bssid) {
2105                 if (is_last_connected)
2106                         score += ins_settings.last_connected_bssid_score;
2107         }
2108
2109         return score;
2110 }
2111
2112 static int calculate_score_assoc_reject(uint16_t assoc_reject_cnt)
2113 {
2114         int score = 0;
2115
2116         if (ins_settings.assoc_reject)
2117                 score -= (assoc_reject_cnt * ins_settings.assoc_reject_score);
2118
2119         return score;
2120 }
2121
2122 static int calculate_score_frequency(dbus_int16_t strength, dbus_uint16_t frequency)
2123 {
2124         int score = 0;
2125
2126         switch (ins_settings.preferred_freq_bssid) {
2127         case G_SUPPLICANT_INS_PREFERRED_FREQ_24GHZ:
2128                 if ((frequency >= FREQ_RANGE_24GHZ_CHANNEL_1 &&
2129                         frequency <= FREQ_RANGE_24GHZ_CHANNEL_14) &&
2130                         (strength > ins_settings.signal_level3_24ghz))
2131                         score += ins_settings.preferred_freq_bssid_score;
2132
2133                 break;
2134         case G_SUPPLICANT_INS_PREFERRED_FREQ_5GHZ:
2135                 if ((frequency >= FREQ_RANGE_5GHZ_CHANNEL_32 &&
2136                         frequency <= FREQ_RANGE_5GHZ_CHANNEL_165) &&
2137                         (strength > ins_settings.signal_level3_5ghz))
2138                         score += ins_settings.preferred_freq_bssid_score;
2139
2140                 break;
2141         default:
2142                 break;
2143         }
2144
2145         return score;
2146 }
2147
2148 static int calculate_score_strength(dbus_int16_t strength)
2149 {
2150         int score = 0;
2151
2152         if (ins_settings.signal_bssid)
2153                 score += (((strength > -60) ? -60 : strength) + 85);
2154
2155         return score;
2156 }
2157
2158 static int calculate_score_est_throughput(dbus_uint32_t est_throughput)
2159 {
2160         int score = 0;
2161
2162         if (est_throughput >= 10000)
2163                 score = est_throughput / 10000;
2164
2165         if (score > 40)
2166                 score = 40;
2167
2168         return score;
2169 }
2170
2171 static int calculate_score(bool is_last_connected, uint16_t assoc_reject_cnt,
2172                 dbus_uint16_t frequency, dbus_int16_t strength,
2173                 dbus_int16_t snr, dbus_uint32_t est_throughput)
2174 {
2175         int score = 0;
2176
2177         score += calculate_score_last_connected_bssid(is_last_connected);
2178         score += calculate_score_assoc_reject(assoc_reject_cnt);
2179         score += calculate_score_frequency(strength, frequency);
2180         score += calculate_score_strength(strength);
2181         score += (int)snr;
2182         score += calculate_score_est_throughput(est_throughput);
2183
2184         return score;
2185 }
2186 #endif
2187
2188 static void update_bssid_list(gpointer key, gpointer value, gpointer user_data)
2189 {
2190         struct g_supplicant_bss *bss = value;
2191         struct g_connman_bssids *bssids = NULL;
2192         struct update_bssid_data *bssid_data = (struct update_bssid_data *)user_data;
2193
2194         bssids = (struct g_connman_bssids *)g_try_malloc0(sizeof(struct g_connman_bssids));
2195
2196         if (bssids) {
2197                 memcpy(bssids->bssid, bss->bssid, WIFI_BSSID_LEN_MAX);
2198
2199                 bssids->strength = bss->signal;
2200                 bssids->strength += 120;
2201
2202                 if (bssids->strength > 100)
2203                         bssids->strength = 100;
2204
2205                 bssids->frequency = bss->frequency;
2206                 bssids->score_snr = (int)bss->snr;
2207
2208 #if defined TIZEN_EXT_INS
2209                 bssids->assoc_reject_cnt = get_assoc_reject_cnt(bssid_data->assoc_reject_table, bssids->bssid);
2210                 bssids->is_last_connected = compare_bssid(bssids->bssid, bssid_data->last_connected_bssid);
2211
2212                 bssids->score_last_connected_bssid = calculate_score_last_connected_bssid(bssids->is_last_connected);
2213                 bssids->score_assoc_reject = calculate_score_assoc_reject(bssids->assoc_reject_cnt);
2214                 bssids->score_frequency = calculate_score_frequency(bss->signal, bssids->frequency);
2215                 bssids->score_strength = calculate_score_strength(bss->signal);
2216                 bssids->score_est_throughput = calculate_score_est_throughput(bss->est_throughput);
2217
2218                 bssids->ins_score = calculate_score(bssids->is_last_connected,
2219                         bssids->assoc_reject_cnt, bssids->frequency, bss->signal,
2220                         bss->snr, bss->est_throughput);
2221 #else
2222                 bssids->ins_score = bss->signal;
2223 #endif
2224                 bssid_data->bssid_list = g_slist_append(bssid_data->bssid_list, bssids);
2225         } else
2226                 SUPPLICANT_DBG("Failed to allocate memory");
2227 }
2228
2229 static gint cmp_bss(gconstpointer a, gconstpointer b)
2230 {
2231         struct g_connman_bssids *entry_a = (struct g_connman_bssids *)a;
2232         struct g_connman_bssids *entry_b = (struct g_connman_bssids *)b;
2233
2234         if (entry_a->ins_score > entry_b->ins_score)
2235                 return -1;
2236
2237         if (entry_a->ins_score < entry_b->ins_score)
2238                 return 1;
2239
2240         if (entry_a->ins_score == entry_b->ins_score) {
2241                 if (entry_a->strength >= entry_b->strength)
2242                         return -1;
2243                 else
2244                         return 1;
2245         }
2246
2247         return 0;
2248 }
2249
2250 #if defined TIZEN_EXT_INS
2251 static void print_bssid_sort(gpointer data, gpointer user_data)
2252 {
2253         struct g_connman_bssids *bssids = data;
2254
2255         GSupplicantNetwork *network = (GSupplicantNetwork *) user_data;
2256
2257         if (!bssids || !network)
2258                 return;
2259
2260         SUPPLICANT_DBG("ssid [%-20s] bssid[" MACSTR "] total[%2d] freq[%2d] "
2261                         "last_conn[%2d] assoc_reject[%2d] strength[%2d] rssi[%2d]",
2262                         network->ssid, MAC2STR(bssids->bssid), bssids->ins_score,
2263                         bssids->score_frequency, bssids->score_last_connected_bssid,
2264                         bssids->score_assoc_reject, bssids->score_strength, bssids->strength - 120);
2265 }
2266 #endif
2267
2268 void *g_supplicant_network_get_bssid_list(GSupplicantNetwork *network)
2269 {
2270         struct update_bssid_data bssid_data;
2271
2272         if (g_hash_table_size(network->bss_table) < 1)
2273                 return NULL;
2274
2275         bssid_data.network = network;
2276         memset(&bssid_data, 0, sizeof(bssid_data));
2277         memcpy(bssid_data.last_connected_bssid, network->last_connected_bssid, WIFI_BSSID_LEN_MAX);
2278         bssid_data.assoc_reject_table = network->assoc_reject_table;
2279
2280         g_hash_table_foreach(network->bss_table, update_bssid_list, &bssid_data);
2281         bssid_data.bssid_list = g_slist_sort(bssid_data.bssid_list, cmp_bss);
2282 #if defined TIZEN_EXT_INS
2283         g_slist_foreach(bssid_data.bssid_list, print_bssid_sort, (gpointer)network);
2284 #endif
2285
2286         return bssid_data.bssid_list;
2287 }
2288
2289 void g_supplicant_network_set_last_connected_bssid(GSupplicantNetwork *network, const unsigned char *bssid)
2290 {
2291         if (!bssid)
2292                 return;
2293
2294         if (!memcmp(bssid, invalid_bssid, WIFI_BSSID_LEN_MAX))
2295                 return;
2296
2297         memcpy(network->last_connected_bssid, bssid, WIFI_BSSID_LEN_MAX);
2298
2299         SUPPLICANT_DBG("last connected bssid [" MACSTR "]", MAC2STR(bssid));
2300 }
2301
2302 const unsigned char *g_supplicant_network_get_last_connected_bssid(GSupplicantNetwork *network)
2303 {
2304         if (network == NULL)
2305                 return NULL;
2306
2307         return (const unsigned char *)network->last_connected_bssid;
2308 }
2309
2310 void g_supplicant_network_update_assoc_reject(GSupplicantInterface *interface,
2311                 GSupplicantNetwork *network)
2312 {
2313         struct assoc_reject_data *assoc_data;
2314         gchar *bssid_str;
2315         time_t curr_time;
2316
2317         if (!network)
2318                 return;
2319
2320         bssid_str = convert_bssid_to_str(interface->add_network_bssid);
2321         if (!bssid_str)
2322                 return;
2323
2324         assoc_data = g_hash_table_lookup(network->assoc_reject_table, bssid_str);
2325         if (!assoc_data) {
2326                 assoc_data = g_try_new0(struct assoc_reject_data, 1);
2327                 if (!assoc_data) {
2328                         g_free(bssid_str);
2329                         return;
2330                 }
2331
2332                 assoc_data->bssid = g_strdup(bssid_str);
2333                 g_hash_table_insert(network->assoc_reject_table, assoc_data->bssid, assoc_data);
2334         }
2335
2336         curr_time = time(NULL);
2337         assoc_data->reject_time_list = g_slist_append(assoc_data->reject_time_list, GINT_TO_POINTER(curr_time));
2338
2339         SUPPLICANT_DBG("bssid [%s] time [%u]", bssid_str, curr_time);
2340
2341         g_free(bssid_str);
2342
2343         callback_network_changed(network, "UpdateAssocReject");
2344 }
2345
2346 GHashTable *g_supplicant_network_get_assoc_reject_table(GSupplicantNetwork *network)
2347 {
2348         if (!network)
2349                 return NULL;
2350
2351         return network->assoc_reject_table;
2352 }
2353
2354 GSupplicantNetwork *g_supplicant_interface_get_network(GSupplicantInterface *interface,
2355                 const char *group)
2356 {
2357         if (!interface)
2358                 return NULL;
2359
2360         return g_hash_table_lookup(interface->network_table, group);
2361 }
2362
2363 static void copy_assoc_reject(gpointer key, gpointer value, gpointer user_data)
2364 {
2365         struct assoc_reject_data *cloned_assoc_data;
2366         struct assoc_reject_data *assoc_data = value;
2367         GHashTable *cloned_assoc_reject_table = user_data;
2368
2369         if (assoc_data && cloned_assoc_reject_table) {
2370                 cloned_assoc_data = g_try_new0(struct assoc_reject_data, 1);
2371                 if (!cloned_assoc_data)
2372                         return;
2373
2374                 cloned_assoc_data->bssid = g_strdup(assoc_data->bssid);
2375                 cloned_assoc_data->reject_time_list = g_slist_copy(assoc_data->reject_time_list);
2376                 g_hash_table_insert(cloned_assoc_reject_table,
2377                                         cloned_assoc_data->bssid, cloned_assoc_data);
2378         }
2379 }
2380
2381 GHashTable *g_supplicant_network_clone_assoc_reject_table(GSupplicantNetwork *network)
2382 {
2383         GHashTable *cloned_assoc_reject_table;
2384
2385         if (!network)
2386                 return NULL;
2387
2388         GHashTable *assoc_reject_table = g_supplicant_network_get_assoc_reject_table(network);
2389         if (!assoc_reject_table)
2390                 return NULL;
2391
2392         cloned_assoc_reject_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2393                                                                 NULL, remove_assoc_data);
2394         g_hash_table_foreach(assoc_reject_table, copy_assoc_reject, cloned_assoc_reject_table);
2395
2396         return cloned_assoc_reject_table;
2397 }
2398
2399 #endif
2400
2401 static void merge_network(GSupplicantNetwork *network)
2402 {
2403         GString *str;
2404         const char *ssid, *mode, *key_mgmt;
2405 #if defined TIZEN_EXT
2406         const char *isHS20AP;
2407         const char *eap, *identity, *phase2;
2408 #endif
2409         unsigned int i, ssid_len;
2410         char *group;
2411
2412         ssid = g_hash_table_lookup(network->config_table, "ssid");
2413         mode = g_hash_table_lookup(network->config_table, "mode");
2414         key_mgmt = g_hash_table_lookup(network->config_table, "key_mgmt");
2415 #if defined TIZEN_EXT
2416         isHS20AP = g_hash_table_lookup(network->config_table, "isHS20AP");
2417         eap = g_hash_table_lookup(network->config_table, "eap");
2418         identity = g_hash_table_lookup(network->config_table, "identity");
2419         phase2 = g_hash_table_lookup(network->config_table, "phase2");
2420 #endif
2421
2422         SUPPLICANT_DBG("ssid %s mode %s", ssid, mode);
2423
2424         if (ssid)
2425                 ssid_len = strlen(ssid);
2426         else
2427                 ssid_len = 0;
2428
2429         str = g_string_sized_new((ssid_len * 2) + 24);
2430         if (!str)
2431                 return;
2432
2433         for (i = 0; i < ssid_len; i++)
2434 #if defined TIZEN_EXT
2435         {
2436                 if (ssid[i] != '"')
2437 #endif
2438                 g_string_append_printf(str, "%02x", ssid[i]);
2439 #if defined TIZEN_EXT
2440         }
2441 #endif
2442
2443         if (g_strcmp0(mode, "0") == 0)
2444                 g_string_append_printf(str, "_managed");
2445         else if (g_strcmp0(mode, "1") == 0)
2446                 g_string_append_printf(str, "_adhoc");
2447 #if defined TIZEN_EXT_WIFI_MESH
2448         else if (g_strcmp0(mode, "5") == 0)
2449                 g_string_append_printf(str, "_mesh");
2450 #endif
2451
2452         if (g_strcmp0(key_mgmt, "WPA-PSK") == 0)
2453                 g_string_append_printf(str, "_psk");
2454 #if defined TIZEN_EXT
2455         else if (g_strcmp0(key_mgmt, "WPA-EAP") == 0)
2456                 g_string_append_printf(str, "_ieee8021x");
2457         else
2458                 g_string_append_printf(str, "_none");
2459 #endif
2460
2461         group = g_string_free(str, FALSE);
2462
2463         SUPPLICANT_DBG("%s", group);
2464
2465 #if defined TIZEN_EXT
2466         if (g_strcmp0(isHS20AP, "1") == 0) {
2467                 network->isHS20AP = 1;
2468                 if (network->eap)
2469                         g_free(network->eap);
2470                 network->eap = g_strdup(eap);
2471
2472                 if (network->identity)
2473                         g_free(network->identity);
2474                 network->identity = g_strdup(identity);
2475
2476                 if (network->phase2)
2477                         g_free(network->phase2);
2478                 network->phase2 = g_strdup(phase2);
2479         } else
2480                 network->isHS20AP = 0;
2481
2482         network->group = g_strdup(group);
2483         callback_network_merged(network);
2484         g_free(network->group);
2485 #endif
2486
2487         g_free(group);
2488
2489         g_hash_table_destroy(network->config_table);
2490
2491         g_free(network->path);
2492         g_free(network);
2493 }
2494
2495 static void network_property(const char *key, DBusMessageIter *iter,
2496                                                         void *user_data)
2497 {
2498         GSupplicantNetwork *network = user_data;
2499
2500         if (!network->interface)
2501                 return;
2502
2503         if (!key) {
2504                 merge_network(network);
2505                 return;
2506         }
2507
2508         if (g_strcmp0(key, "Enabled") == 0) {
2509                 dbus_bool_t enabled = FALSE;
2510
2511                 dbus_message_iter_get_basic(iter, &enabled);
2512         } else if (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_STRING) {
2513                 const char *str = NULL;
2514
2515                 dbus_message_iter_get_basic(iter, &str);
2516                 if (str) {
2517                         g_hash_table_replace(network->config_table,
2518                                                 g_strdup(key), g_strdup(str));
2519                 }
2520         } else
2521                 SUPPLICANT_DBG("key %s type %c",
2522                                 key, dbus_message_iter_get_arg_type(iter));
2523 }
2524
2525 static void interface_network_added(DBusMessageIter *iter, void *user_data)
2526 {
2527         GSupplicantInterface *interface = user_data;
2528         GSupplicantNetwork *network;
2529         const char *path = NULL;
2530
2531         SUPPLICANT_DBG("");
2532
2533         dbus_message_iter_get_basic(iter, &path);
2534         if (!path)
2535                 return;
2536
2537         if (g_strcmp0(path, "/") == 0)
2538                 return;
2539
2540         network = g_try_new0(GSupplicantNetwork, 1);
2541         if (!network)
2542                 return;
2543
2544         network->interface = interface;
2545         network->path = g_strdup(path);
2546
2547         network->config_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2548                                                         g_free, g_free);
2549
2550         dbus_message_iter_next(iter);
2551         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
2552                 supplicant_dbus_property_foreach(iter, network_property,
2553                                                                 network);
2554                 network_property(NULL, NULL, network);
2555                 return;
2556         }
2557
2558         supplicant_dbus_property_get_all(path,
2559                                 SUPPLICANT_INTERFACE ".Network",
2560                                         network_property, network, NULL);
2561 }
2562
2563 static void interface_network_removed(DBusMessageIter *iter, void *user_data)
2564 {
2565         SUPPLICANT_DBG("");
2566 }
2567
2568 static char *create_name(unsigned char *ssid, int ssid_len)
2569 {
2570         GString *string;
2571         const gchar *remainder, *invalid;
2572         int valid_bytes, remaining_bytes;
2573
2574         if (ssid_len < 1 || ssid[0] == '\0')
2575                 return g_strdup("");
2576
2577         string = NULL;
2578         remainder = (const gchar *)ssid;
2579         remaining_bytes = ssid_len;
2580
2581         while (remaining_bytes != 0) {
2582                 if (g_utf8_validate(remainder, remaining_bytes,
2583                                         &invalid)) {
2584                         break;
2585                 }
2586
2587                 valid_bytes = invalid - remainder;
2588
2589                 if (!string)
2590                         string = g_string_sized_new(remaining_bytes);
2591
2592                 g_string_append_len(string, remainder, valid_bytes);
2593
2594                 /* append U+FFFD REPLACEMENT CHARACTER */
2595                 g_string_append(string, "\357\277\275");
2596
2597                 remaining_bytes -= valid_bytes + 1;
2598                 remainder = invalid + 1;
2599         }
2600
2601         if (!string)
2602                 return g_strndup((const gchar *)ssid, ssid_len + 1);
2603
2604         g_string_append(string, remainder);
2605
2606         return g_string_free(string, FALSE);
2607 }
2608
2609 static char *create_group(struct g_supplicant_bss *bss)
2610 {
2611         GString *str;
2612         unsigned int i;
2613         const char *mode, *security;
2614
2615         str = g_string_sized_new((bss->ssid_len * 2) + 24);
2616         if (!str)
2617                 return NULL;
2618
2619         if (bss->ssid_len > 0 && bss->ssid[0] != '\0') {
2620                 for (i = 0; i < bss->ssid_len; i++)
2621                         g_string_append_printf(str, "%02x", bss->ssid[i]);
2622         } else
2623                 g_string_append_printf(str, "hidden");
2624
2625         mode = mode2string(bss->mode);
2626         if (mode)
2627                 g_string_append_printf(str, "_%s", mode);
2628
2629 #if defined TIZEN_EXT
2630         if (bss->security == G_SUPPLICANT_SECURITY_PSK_SHA256)
2631                 security = "psk";
2632         else
2633                 security = security2string(bss->security);
2634 #else
2635         security = security2string(bss->security);
2636 #endif
2637         if (security)
2638                 g_string_append_printf(str, "_%s", security);
2639
2640         return g_string_free(str, FALSE);
2641 }
2642 #if defined TIZEN_EXT
2643 static void update_network_with_best_bss(GSupplicantNetwork *network,
2644                 struct g_supplicant_bss *best_bss)
2645 {
2646         /*
2647          * Do not change best BSS if we are connected.
2648          */
2649         if (network->interface->state == G_SUPPLICANT_STATE_COMPLETED)
2650                 return;
2651
2652         network->signal = best_bss->signal;
2653         network->frequency = best_bss->frequency;
2654         network->best_bss = best_bss;
2655 }
2656
2657 static bool update_best_bss(GSupplicantNetwork *network,
2658                 struct g_supplicant_bss *bss, struct g_supplicant_bss *best_bss)
2659 {
2660         int score_new;
2661         int score_best;
2662
2663         if (network->best_bss == NULL) {
2664                 update_network_with_best_bss(network, bss);
2665                 return true;
2666         }
2667
2668 #if defined TIZEN_EXT_INS
2669         score_new = calculate_score(
2670                 compare_bssid(bss->bssid, network->last_connected_bssid),
2671                 get_assoc_reject_cnt(network->assoc_reject_table, bss->bssid),
2672                 bss->frequency, bss->signal, bss->snr, bss->est_throughput);
2673
2674         score_best = calculate_score(
2675                 compare_bssid(network->best_bss->bssid, network->last_connected_bssid),
2676                 get_assoc_reject_cnt(network->assoc_reject_table, network->best_bss->bssid),
2677                 network->best_bss->frequency, network->best_bss->signal,
2678                 network->best_bss->snr, network->best_bss->est_throughput);
2679 #else
2680         score_new = bss->signal;
2681         score_best = network->best_bss->signal;
2682 #endif
2683
2684         if (score_new > score_best) {
2685                 SUPPLICANT_DBG("new[" MACSTR "][%d] : best[" MACSTR "][%d]",
2686                         MAC2STR(bss->bssid), score_new,
2687                         MAC2STR(network->best_bss->bssid), score_best);
2688
2689                 update_network_with_best_bss(network, bss);
2690
2691                 SUPPLICANT_DBG("Update best BSS for %s", network->name);
2692
2693                 return true;
2694         }
2695
2696         return false;
2697 }
2698 #endif
2699 static int add_or_replace_bss_to_network(struct g_supplicant_bss *bss)
2700 {
2701         GSupplicantInterface *interface = bss->interface;
2702         GSupplicantNetwork *network;
2703         char *group;
2704         bool is_new_network;
2705
2706         group = create_group(bss);
2707         SUPPLICANT_DBG("New group created: %s", group);
2708
2709         if (!group)
2710                 return -ENOMEM;
2711
2712         network = g_hash_table_lookup(interface->network_table, group);
2713         if (network) {
2714                 g_free(group);
2715                 SUPPLICANT_DBG("Network %s already exist", network->name);
2716                 is_new_network = false;
2717
2718                 goto done;
2719         }
2720
2721         is_new_network = true;
2722
2723         network = g_try_new0(GSupplicantNetwork, 1);
2724         if (!network) {
2725                 g_free(group);
2726                 return -ENOMEM;
2727         }
2728
2729         network->interface = interface;
2730         if (!network->path)
2731                 network->path = g_strdup(bss->path);
2732         network->group = group;
2733         network->name = create_name(bss->ssid, bss->ssid_len);
2734         network->mode = bss->mode;
2735         network->security = bss->security;
2736         network->ssid_len = bss->ssid_len;
2737         memcpy(network->ssid, bss->ssid, bss->ssid_len);
2738         network->signal = bss->signal;
2739         network->frequency = bss->frequency;
2740         network->best_bss = bss;
2741
2742         if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
2743                 network->wps = TRUE;
2744                 network->wps_capabilities = bss->wps_capabilities;
2745         }
2746
2747 #if defined TIZEN_EXT
2748         network->owe_transition_mode = bss->owe_transition_mode;
2749         network->privacy = bss->privacy;
2750         memcpy(network->transition_mode_ssid, bss->transition_mode_ssid, bss->transition_mode_ssid_len);
2751         memcpy(network->transition_mode_bssid, bss->transition_mode_bssid, WIFI_BSSID_LEN_MAX);
2752
2753         network->keymgmt = bss->keymgmt;
2754
2755         if (g_slist_length(bss->vsie_list) > 0) {
2756                 GSList *list = NULL;
2757                 unsigned char *vsie = NULL;
2758                 for (list = bss->vsie_list; list; list = list->next) {
2759                         unsigned char *ie = (unsigned char *)list->data;
2760                         vsie = (unsigned char *)g_try_malloc0(ie[1]+2); // tag number size(1), tag length size(1)
2761
2762                         if (vsie) {
2763                                 memcpy(vsie, ie, ie[1]+2);
2764                                 network->vsie_list = g_slist_append(network->vsie_list, vsie);
2765                         } else
2766                                 SUPPLICANT_DBG("Failed to allocate memory.");
2767                 }
2768         }
2769
2770         network->isHS20AP = bss->hs20;
2771         memcpy(network->country_code, bss->country_code, COUNTRY_CODE_LENGTH);
2772         network->phy_mode = bss->phy_mode;
2773 #endif
2774
2775         SUPPLICANT_DBG("New network %s created", network->name);
2776
2777         network->bss_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2778                                                         NULL, remove_bss);
2779
2780         network->config_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2781                                                         g_free, g_free);
2782
2783 #if defined TIZEN_EXT
2784         network->assoc_reject_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2785                                                         NULL, remove_assoc_data);
2786 #endif
2787
2788         g_hash_table_replace(interface->network_table,
2789                                                 network->group, network);
2790
2791         callback_network_added(network);
2792
2793 done:
2794         /* We update network's WPS properties if only bss provides WPS. */
2795         if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
2796                 network->wps = TRUE;
2797                 network->wps_capabilities = bss->wps_capabilities;
2798
2799                 if (!is_new_network)
2800                         callback_network_changed(network, "WPSCapabilities");
2801         }
2802
2803         /*
2804          * Do not change best BSS if we are connected. It will be done through
2805          * CurrentBSS property in case of misalignment with wpa_s or roaming.
2806          */
2807 #if defined TIZEN_EXT
2808         if (network != interface->current_network) {
2809                 if (update_best_bss(network, bss, network->best_bss))
2810                         callback_network_changed(network, "Signal");
2811         }
2812 #else
2813         if (network != interface->current_network &&
2814                                 bss->signal > network->signal) {
2815                 network->signal = bss->signal;
2816                 network->best_bss = bss;
2817                 callback_network_changed(network, "Signal");
2818         }
2819 #endif
2820
2821         g_hash_table_replace(interface->bss_mapping, bss->path, network);
2822         g_hash_table_replace(network->bss_table, bss->path, bss);
2823
2824         g_hash_table_replace(bss_mapping, bss->path, interface);
2825
2826         return 0;
2827 }
2828
2829 static void bss_rates(DBusMessageIter *iter, void *user_data)
2830 {
2831         struct g_supplicant_bss *bss = user_data;
2832         dbus_uint32_t rate = 0;
2833
2834         dbus_message_iter_get_basic(iter, &rate);
2835         if (rate == 0)
2836                 return;
2837
2838         if (rate > bss->maxrate)
2839                 bss->maxrate = rate;
2840 }
2841
2842 static void bss_keymgmt(DBusMessageIter *iter, void *user_data)
2843 {
2844         unsigned int *keymgmt = user_data;
2845         const char *str = NULL;
2846         int i;
2847
2848         dbus_message_iter_get_basic(iter, &str);
2849         if (!str)
2850                 return;
2851
2852         for (i = 0; keymgmt_map[i].str; i++)
2853                 if (strcmp(str, keymgmt_map[i].str) == 0) {
2854                         SUPPLICANT_DBG("Keymgmt: %s", str);
2855                         *keymgmt |= keymgmt_map[i].val;
2856                         break;
2857                 }
2858 }
2859
2860 static void bss_group(DBusMessageIter *iter, void *user_data)
2861 {
2862         unsigned int *group = user_data;
2863         const char *str = NULL;
2864         int i;
2865
2866         dbus_message_iter_get_basic(iter, &str);
2867         if (!str)
2868                 return;
2869
2870         for (i = 0; group_map[i].str; i++)
2871                 if (strcmp(str, group_map[i].str) == 0) {
2872                         SUPPLICANT_DBG("Group: %s", str);
2873                         *group |= group_map[i].val;
2874                         break;
2875                 }
2876 }
2877
2878 static void bss_pairwise(DBusMessageIter *iter, void *user_data)
2879 {
2880         unsigned int *pairwise = user_data;
2881         const char *str = NULL;
2882         int i;
2883
2884         dbus_message_iter_get_basic(iter, &str);
2885         if (!str)
2886                 return;
2887
2888         for (i = 0; pairwise_map[i].str; i++)
2889                 if (strcmp(str, pairwise_map[i].str) == 0) {
2890                         SUPPLICANT_DBG("Pairwise: %s", str);
2891                         *pairwise |= pairwise_map[i].val;
2892                         break;
2893                 }
2894 }
2895
2896 static void bss_wpa(const char *key, DBusMessageIter *iter,
2897                         void *user_data)
2898 {
2899         struct g_supplicant_bss *bss = user_data;
2900         unsigned int value = 0;
2901
2902         SUPPLICANT_DBG("Key: %s", key);
2903
2904         if (g_strcmp0(key, "KeyMgmt") == 0) {
2905                 supplicant_dbus_array_foreach(iter, bss_keymgmt, &value);
2906
2907                 if (bss->rsn_selected)
2908                         bss->rsn_keymgmt = value;
2909                 else
2910                         bss->wpa_keymgmt = value;
2911         } else if (g_strcmp0(key, "Group") == 0) {
2912                 supplicant_dbus_array_foreach(iter, bss_group, &value);
2913
2914                 if (bss->rsn_selected)
2915                         bss->rsn_group = value;
2916                 else
2917                         bss->wpa_group = value;
2918         } else if (g_strcmp0(key, "Pairwise") == 0) {
2919                 supplicant_dbus_array_foreach(iter, bss_pairwise, &value);
2920
2921                 if (bss->rsn_selected)
2922                         bss->rsn_pairwise = value;
2923                 else
2924                         bss->wpa_pairwise = value;
2925         }
2926 }
2927
2928 static unsigned int get_tlv(unsigned char *ie, unsigned int ie_size,
2929                                                         unsigned int type)
2930 {
2931         unsigned int len = 0;
2932
2933         while (len + 4 < ie_size) {
2934                 unsigned int hi = ie[len];
2935                 unsigned int lo = ie[len + 1];
2936                 unsigned int tmp_type = (hi << 8) + lo;
2937                 unsigned int v_len = 0;
2938
2939                 /* hi and lo are used to recreate an unsigned int
2940                  * based on 2 8bits length unsigned int. */
2941
2942                 hi = ie[len + 2];
2943                 lo = ie[len + 3];
2944                 v_len = (hi << 8) + lo;
2945
2946                 if (tmp_type == type) {
2947                         unsigned int ret_value = 0;
2948                         unsigned char *value = (unsigned char *)&ret_value;
2949
2950                         SUPPLICANT_DBG("IE: match type 0x%x", type);
2951
2952                         /* Verifying length relevance */
2953                         if (v_len > sizeof(unsigned int) ||
2954                                 len + 4 + v_len > ie_size)
2955                                 break;
2956
2957                         memcpy(value, ie + len + 4, v_len);
2958
2959                         SUPPLICANT_DBG("returning 0x%x", ret_value);
2960                         return ret_value;
2961                 }
2962
2963                 len += v_len + 4;
2964         }
2965
2966         SUPPLICANT_DBG("returning 0");
2967         return 0;
2968 }
2969
2970 #if defined TIZEN_EXT
2971 static void get_bss_phy_mode(unsigned int max_rate,
2972                 unsigned int max_ext_rate, bool ht, bool vht, void *data)
2973 {
2974         struct g_supplicant_bss *bss = data;
2975         unsigned int freq = bss->frequency;
2976
2977         /* Following conditions are used to determine
2978          * IEEE 802.11 Protocol Modes:-
2979          *
2980          * 1. If “Supported rates” is only till 11 Mbps,
2981          *    and frequency is in 2.4GHz band, then protocol is 11B.
2982          * 2. If “Supported rates” is till 54Mbps or
2983          *    “Extended supported rates” are present,
2984          *    and frequency is in 2.4GHz band, then protocol is 11G.
2985          * 3. If “Supported rates” is only till 54 Mbps,
2986          *    frequency is in 5GHz band , then protocol is 11A.
2987          * 4. If “HT capabilities” is supported , then protocol is 11N.
2988          * 5. If “HT capabilities” & “VHT” is supported and
2989          *    frequency is in 5 GHz band, then protocol is 11AC.
2990          * */
2991
2992         if (freq >= 2412 && freq <= 2484) { /* 2.4 Ghz Band */
2993                 if (max_rate <= 11 && max_ext_rate <= 0 && !ht)
2994                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211B;
2995                 else if ((max_rate <= 54 || max_ext_rate > 0) && !ht)
2996                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211BG;
2997                 else if ((max_rate >= 54 || max_ext_rate > 0) && ht)
2998                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211BGN;
2999                 else
3000                         bss->phy_mode = G_SUPPLICANT_MODE_UNKNOWN;
3001         } else if (freq >= 5180 && freq <= 5825) { /* 5 Ghz Band */
3002                 if (max_rate <= 54 && !ht)
3003                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211A;
3004                 else if ((max_rate >= 54 || max_ext_rate > 0) && ht && !vht)
3005                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211AN;
3006                 else if ((max_rate >= 54 || max_ext_rate > 0) && ht && vht)
3007                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211ANAC;
3008                 else
3009                         bss->phy_mode = G_SUPPLICANT_MODE_UNKNOWN;
3010         }
3011 }
3012 #endif
3013
3014 static void bss_process_ies(DBusMessageIter *iter, void *user_data)
3015 {
3016         struct g_supplicant_bss *bss = user_data;
3017         const unsigned char WPS_OUI[] = { 0x00, 0x50, 0xf2, 0x04 };
3018         unsigned char *ie, *ie_end;
3019         DBusMessageIter array;
3020         unsigned int value;
3021         int ie_len;
3022 #if defined TIZEN_EXT
3023         const unsigned char OWE_WFA_OUI[] = { 0x50, 0x6f, 0x9a, 0x1c };
3024         int r_len, j;
3025         unsigned char *rates = NULL;
3026         unsigned char *ext_rates = NULL;
3027         unsigned int max_rate = 0;
3028         unsigned int max_ext_rate = 0;
3029         unsigned int offset = 0;
3030         bool ht = false;
3031         bool vht = false;
3032 #endif
3033
3034 #define WMM_WPA1_WPS_INFO 221
3035 #define WPS_INFO_MIN_LEN  6
3036 #define WPS_VERSION_TLV   0x104A
3037 #define WPS_STATE_TLV     0x1044
3038 #define WPS_METHODS_TLV   0x1012
3039 #define WPS_REGISTRAR_TLV 0x1041
3040 #define WPS_VERSION       0x10
3041 #define WPS_PBC           0x04
3042 #define WPS_PIN           0x00
3043 #define WPS_CONFIGURED    0x02
3044 #if defined TIZEN_EXT
3045 #define VENDOR_SPECIFIC_INFO 0xDD
3046 #define WLAN_EID_COUNTRY 7
3047 #define WLAN_EID_RSN_INFO 48
3048 #define RSN_CAPABILITY_MFP_REQ (1 << 6)
3049 #endif
3050
3051         dbus_message_iter_recurse(iter, &array);
3052         dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
3053
3054         if (!ie || ie_len < 2)
3055                 return;
3056
3057         bss->wps_capabilities = 0;
3058         bss->keymgmt = 0;
3059
3060         for (ie_end = ie + ie_len; ie < ie_end && ie + ie[1] + 1 <= ie_end;
3061                                                         ie += ie[1] + 2) {
3062 #if defined TIZEN_EXT
3063                 unsigned char *vsie;
3064                 int vsie_len = 0;
3065
3066                 if (ie[0] == VENDOR_SPECIFIC_INFO && memcmp(ie+2, OWE_WFA_OUI, sizeof(OWE_WFA_OUI)) == 0) {
3067                         SUPPLICANT_DBG("IE: match vendor specific data : OWE Transition Mode");
3068
3069 /*
3070                 Tag: Vendor Specific: Wi-Fi Alliance: OWE Transition Mode
3071                         Tag Number: Vendor Specific (221)    -> ie[0]
3072                         Tag length: 26                       -> ie[1]
3073                         OUI: 50:6f:9a (Wi-Fi Alliance)       -> ie[2]
3074                         Vendor Specific OUI Type: 28         -> ie[5]
3075                         BSSID: 92:fd:f0:20:2b:09             -> ie[6]
3076                         SSID length: 15                      -> ie[12]
3077                         SSID: Wi-Fi-5.2.3-owe                -> ie[13]
3078
3079 0000   dd 1a 50 6f 9a 1c 92 fd f0 20 2b 09 0f 57 69 2d   ..Po..... +..Wi-
3080 0010   46 69 2d 35 2e 32 2e 33 2d 6f 77 65               Fi-5.2.3-owe
3081
3082 */
3083                         bss->owe_transition_mode = TRUE;
3084                         if (ie[1] >= 11) { // Tag length is at least up to ssid length position.
3085                                 memcpy(bss->transition_mode_bssid, ie+6, WIFI_BSSID_LEN_MAX);
3086                                 if (ie[12] > 0 && ie[12] < 32) {
3087                                         memcpy(bss->transition_mode_ssid, ie+13, ie[12]);
3088                                         bss->transition_mode_ssid_len = ie[12];
3089                                 } else
3090                                         bss->transition_mode_ssid_len = 0;
3091                         } else
3092                                 bss->owe_transition_mode = FALSE;
3093                         continue;
3094                 }
3095
3096                 if (ie[0] == VENDOR_SPECIFIC_INFO && memcmp(ie+2, WPS_OUI, sizeof(WPS_OUI)) != 0) {
3097
3098                         if (!simplified_log)
3099                                 SUPPLICANT_DBG("IE: match vendor specific data");
3100
3101                         vsie_len = ie[1]+2;     // tag number size(1), tag length size(1)
3102                         vsie = (unsigned char *)g_try_malloc0(vsie_len);
3103
3104                         if (vsie) {
3105                                 memcpy(vsie, ie, vsie_len);
3106                                 bss->vsie_list = g_slist_append(bss->vsie_list, vsie);
3107                         } else
3108                                 SUPPLICANT_DBG("Failed to allocate memory");
3109                         continue;
3110                 }
3111
3112                 if (ie[0] == WLAN_EID_COUNTRY && ie[1] >= 2) {
3113                         /* Add country code only if it is a valid alphabet */
3114                         if (ie[2] >= 65 && ie[2] <= 90 && ie[3] >= 65 && ie[3] <= 90) {
3115                                 memcpy(bss->country_code, ie+2, COUNTRY_CODE_LENGTH);
3116                                 continue;
3117                         }
3118                 }
3119
3120                 if (ie[0] == WLAN_EID_HT_CAP && ie[1]) {
3121                         ht = true;
3122                         continue;
3123                 }
3124
3125                 if (ie[0] == WLAN_EID_VHT_CAP && ie[1]) {
3126                         vht = true;
3127                         continue;
3128                 }
3129
3130                 if (ie[0] == WLAN_EID_SUPP_RATES && ie[1]) {
3131                         r_len = ie[1];
3132                         rates = g_malloc0(r_len);
3133                         if (!rates)
3134                                 continue;
3135
3136                         for (j = 0; ie && j < r_len; j++) {
3137                                 rates[j] = ((ie[j + 2] & 0x7f) * 500000)/1000000;
3138                                 if (max_rate < rates[j])
3139                                         max_rate = rates[j];
3140                         }
3141                         continue;
3142                 }
3143
3144                 if (ie[0] == WLAN_EID_EXT_SUPP_RATES && ie[1] > 0) {
3145                         r_len = ie[1];
3146                         ext_rates = g_malloc0(r_len);
3147                         if (!ext_rates)
3148                                 continue;
3149
3150                         for (j = 0; ie && j < r_len; j++) {
3151                                 ext_rates[j] = ((ie[j + 2] & 0x7f) * 500000)/1000000;
3152                                 if (max_ext_rate < ext_rates[j])
3153                                         max_ext_rate = ext_rates[j];
3154                         }
3155                         continue;
3156                 }
3157
3158                 if (ie[0] == WLAN_EID_RSN_INFO && ie[1] >= 20) {
3159                         r_len = ie[1];
3160                         offset = 10 + ie[8] * 4;
3161                         offset += ie[offset] * 4 + 2;
3162
3163                         if (offset <= r_len + 1 &&
3164                                         (ie[offset] & RSN_CAPABILITY_MFP_REQ) != 0)
3165                                 bss->pmf_required = TRUE;
3166
3167                         continue;
3168                 }
3169 #endif
3170                 if (ie[0] != WMM_WPA1_WPS_INFO || ie[1] < WPS_INFO_MIN_LEN ||
3171                         memcmp(ie+2, WPS_OUI, sizeof(WPS_OUI)) != 0)
3172                         continue;
3173
3174                 SUPPLICANT_DBG("IE: match WPS_OUI");
3175
3176                 value = get_tlv(&ie[6], ie[1], WPS_STATE_TLV);
3177                 if (get_tlv(&ie[6], ie[1], WPS_VERSION_TLV) == WPS_VERSION &&
3178                                                                 value != 0) {
3179                         bss->keymgmt |= G_SUPPLICANT_KEYMGMT_WPS;
3180
3181                         if (value == WPS_CONFIGURED)
3182                                 bss->wps_capabilities |=
3183                                         G_SUPPLICANT_WPS_CONFIGURED;
3184                 }
3185
3186                 value = get_tlv(&ie[6], ie[1], WPS_METHODS_TLV);
3187                 if (value != 0) {
3188                         if (GUINT16_FROM_BE(value) == WPS_PBC)
3189                                 bss->wps_capabilities |= G_SUPPLICANT_WPS_PBC;
3190                         if (GUINT16_FROM_BE(value) == WPS_PIN)
3191                                 bss->wps_capabilities |= G_SUPPLICANT_WPS_PIN;
3192                 } else
3193                         bss->wps_capabilities |=
3194                                 G_SUPPLICANT_WPS_PBC | G_SUPPLICANT_WPS_PIN;
3195
3196                 /* If the AP sends this it means it's advertizing
3197                  * as a registrar and the WPS process is launched
3198                  * on its side */
3199                 if (get_tlv(&ie[6], ie[1], WPS_REGISTRAR_TLV) != 0)
3200                         bss->wps_capabilities |= G_SUPPLICANT_WPS_REGISTRAR;
3201
3202                 SUPPLICANT_DBG("WPS Methods 0x%x", bss->wps_capabilities);
3203         }
3204 #ifdef TIZEN_EXT
3205         get_bss_phy_mode(max_rate, max_ext_rate, ht, vht, user_data);
3206         if (rates)
3207                 g_free(rates);
3208         if (ext_rates)
3209                 g_free(ext_rates);
3210 #endif
3211 }
3212
3213 static void bss_compute_security(struct g_supplicant_bss *bss)
3214 {
3215         /*
3216          * Combining RSN and WPA keymgmt
3217          * We combine it since parsing IEs might have set something for WPS. */
3218         bss->keymgmt |= bss->rsn_keymgmt | bss->wpa_keymgmt;
3219
3220         bss->ieee8021x = FALSE;
3221         bss->psk = FALSE;
3222 #if defined TIZEN_EXT
3223         bss->ft_ieee8021x = FALSE;
3224         bss->ft_psk = FALSE;
3225 #endif
3226
3227 #if defined TIZEN_EXT
3228         if (bss->keymgmt &
3229                         (G_SUPPLICANT_KEYMGMT_WPA_EAP |
3230                                 G_SUPPLICANT_KEYMGMT_WPA_EAP_256))
3231                 bss->ieee8021x = TRUE;
3232         else if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_EAP)
3233                 bss->ft_ieee8021x = TRUE;
3234 #else
3235         if (bss->keymgmt &
3236                         (G_SUPPLICANT_KEYMGMT_WPA_EAP |
3237                                 G_SUPPLICANT_KEYMGMT_WPA_FT_EAP |
3238                                 G_SUPPLICANT_KEYMGMT_WPA_EAP_256))
3239                 bss->ieee8021x = TRUE;
3240 #endif
3241
3242 #if defined TIZEN_EXT
3243         if (bss->keymgmt &
3244                         G_SUPPLICANT_KEYMGMT_WPA_PSK_256) {
3245                 bss->psk_sha256 = TRUE;
3246         }
3247
3248         if (bss->keymgmt &
3249                         (G_SUPPLICANT_KEYMGMT_WPA_PSK |
3250                                 G_SUPPLICANT_KEYMGMT_WPA_PSK_256))
3251                 bss->psk = TRUE;
3252         else if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_PSK)
3253                 bss->ft_psk = TRUE;
3254 #else
3255         if (bss->keymgmt &
3256                         (G_SUPPLICANT_KEYMGMT_WPA_PSK |
3257                                 G_SUPPLICANT_KEYMGMT_WPA_FT_PSK |
3258                                 G_SUPPLICANT_KEYMGMT_WPA_PSK_256))
3259                 bss->psk = TRUE;
3260 #endif
3261
3262 #if defined TIZEN_EXT
3263         if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_SAE |
3264                         bss->keymgmt & G_SUPPLICANT_KEYMGMT_FT_SAE)
3265                 bss->sae = TRUE;
3266         if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_OWE)
3267                 bss->owe = TRUE;
3268         if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_DPP)
3269                 bss->dpp = TRUE;
3270 #endif
3271
3272         if (bss->ieee8021x)
3273                 bss->security = G_SUPPLICANT_SECURITY_IEEE8021X;
3274 #if defined TIZEN_EXT
3275         else if (bss->ft_ieee8021x)
3276                 bss->security = G_SUPPLICANT_SECURITY_IEEE8021X;
3277         else if (bss->sae)
3278                 bss->security = G_SUPPLICANT_SECURITY_SAE;
3279         else if (bss->psk_sha256)
3280                 bss->security = G_SUPPLICANT_SECURITY_PSK_SHA256;
3281 #endif
3282         else if (bss->psk)
3283                 bss->security = G_SUPPLICANT_SECURITY_PSK;
3284 #if defined TIZEN_EXT
3285         else if (bss->ft_psk)
3286                 bss->security = G_SUPPLICANT_SECURITY_FT_PSK;
3287         else if (bss->owe || bss->owe_transition_mode)
3288                 bss->security = G_SUPPLICANT_SECURITY_OWE;
3289         else if (bss->dpp)
3290                 bss->security = G_SUPPLICANT_SECURITY_DPP;
3291 #endif
3292         else if (bss->privacy)
3293                 bss->security = G_SUPPLICANT_SECURITY_WEP;
3294         else
3295                 bss->security = G_SUPPLICANT_SECURITY_NONE;
3296 }
3297
3298
3299 static void bss_property(const char *key, DBusMessageIter *iter,
3300                                                         void *user_data)
3301 {
3302         struct g_supplicant_bss *bss = user_data;
3303
3304         if (!bss->interface)
3305                 return;
3306 #if defined TIZEN_EXT
3307         if (!simplified_log)
3308 #endif
3309         SUPPLICANT_DBG("key %s", key);
3310
3311         if (!key)
3312                 return;
3313
3314         if (g_strcmp0(key, "BSSID") == 0) {
3315                 DBusMessageIter array;
3316                 unsigned char *addr;
3317                 int addr_len;
3318
3319                 dbus_message_iter_recurse(iter, &array);
3320                 dbus_message_iter_get_fixed_array(&array, &addr, &addr_len);
3321
3322                 if (addr_len == 6)
3323                         memcpy(bss->bssid, addr, addr_len);
3324         } else if (g_strcmp0(key, "SSID") == 0) {
3325                 DBusMessageIter array;
3326                 unsigned char *ssid;
3327                 int ssid_len;
3328
3329                 dbus_message_iter_recurse(iter, &array);
3330                 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
3331
3332                 if (ssid_len > 0 && ssid_len < 33) {
3333                         memcpy(bss->ssid, ssid, ssid_len);
3334                         bss->ssid_len = ssid_len;
3335                 } else {
3336                         memset(bss->ssid, 0, sizeof(bss->ssid));
3337                         bss->ssid_len = 0;
3338                 }
3339         } else if (g_strcmp0(key, "Capabilities") == 0) {
3340                 dbus_uint16_t capabilities = 0x0000;
3341
3342                 dbus_message_iter_get_basic(iter, &capabilities);
3343
3344                 if (capabilities & IEEE80211_CAP_ESS)
3345                         bss->mode = G_SUPPLICANT_MODE_INFRA;
3346                 else if (capabilities & IEEE80211_CAP_IBSS)
3347                         bss->mode = G_SUPPLICANT_MODE_IBSS;
3348
3349                 if (capabilities & IEEE80211_CAP_PRIVACY)
3350                         bss->privacy = TRUE;
3351         } else if (g_strcmp0(key, "Mode") == 0) {
3352                 const char *mode = NULL;
3353
3354                 dbus_message_iter_get_basic(iter, &mode);
3355                 bss->mode = string2mode(mode);
3356         } else if (g_strcmp0(key, "Frequency") == 0) {
3357                 dbus_uint16_t frequency = 0;
3358
3359                 dbus_message_iter_get_basic(iter, &frequency);
3360                 bss->frequency = frequency;
3361         } else if (g_strcmp0(key, "Signal") == 0) {
3362                 dbus_int16_t signal = 0;
3363
3364                 dbus_message_iter_get_basic(iter, &signal);
3365
3366                 bss->signal = signal;
3367                 if (!bss->signal)
3368                         bss->signal = BSS_UNKNOWN_STRENGTH;
3369
3370         } else if (g_strcmp0(key, "Level") == 0) {
3371                 dbus_int32_t level = 0;
3372
3373                 dbus_message_iter_get_basic(iter, &level);
3374         } else if (g_strcmp0(key, "Rates") == 0) {
3375                 supplicant_dbus_array_foreach(iter, bss_rates, bss);
3376         } else if (g_strcmp0(key, "MaxRate") == 0) {
3377                 dbus_uint32_t maxrate = 0;
3378
3379                 dbus_message_iter_get_basic(iter, &maxrate);
3380                 if (maxrate != 0)
3381                         bss->maxrate = maxrate;
3382         } else if (g_strcmp0(key, "Privacy") == 0) {
3383                 dbus_bool_t privacy = FALSE;
3384
3385                 dbus_message_iter_get_basic(iter, &privacy);
3386                 bss->privacy = privacy;
3387         } else if (g_strcmp0(key, "RSN") == 0) {
3388                 bss->rsn_selected = TRUE;
3389
3390                 supplicant_dbus_property_foreach(iter, bss_wpa, bss);
3391         } else if (g_strcmp0(key, "WPA") == 0) {
3392                 bss->rsn_selected = FALSE;
3393
3394                 supplicant_dbus_property_foreach(iter, bss_wpa, bss);
3395 #if defined TIZEN_EXT
3396         } else if (g_strcmp0(key, "HS20") == 0) {
3397                 dbus_bool_t hs20 = FALSE;
3398                 dbus_message_iter_get_basic(iter, &hs20);
3399                 bss->hs20 = hs20;
3400         } else if (g_strcmp0(key, "SNR") == 0) {
3401                 dbus_int16_t snr = 0;
3402
3403                 dbus_message_iter_get_basic(iter, &snr);
3404                 bss->snr = snr;
3405         } else if (g_strcmp0(key, "EstThroughput") == 0) {
3406                 dbus_uint32_t est_throughput = 0;
3407
3408                 dbus_message_iter_get_basic(iter, &est_throughput);
3409                 if (est_throughput != 0)
3410                         bss->est_throughput = est_throughput;
3411 #endif
3412         } else if (g_strcmp0(key, "IEs") == 0)
3413                 bss_process_ies(iter, bss);
3414         else
3415                 SUPPLICANT_DBG("key %s type %c",
3416                                 key, dbus_message_iter_get_arg_type(iter));
3417 }
3418
3419 static struct g_supplicant_bss *interface_bss_added(DBusMessageIter *iter,
3420                                                         void *user_data)
3421 {
3422         GSupplicantInterface *interface = user_data;
3423         GSupplicantNetwork *network;
3424         struct g_supplicant_bss *bss;
3425         const char *path = NULL;
3426 #if defined TIZEN_EXT
3427         if (!simplified_log)
3428 #endif
3429         SUPPLICANT_DBG("");
3430
3431         dbus_message_iter_get_basic(iter, &path);
3432         if (!path)
3433                 return NULL;
3434
3435         if (g_strcmp0(path, "/") == 0)
3436                 return NULL;
3437 #if defined TIZEN_EXT
3438         if (!simplified_log)
3439 #endif
3440         SUPPLICANT_DBG("%s", path);
3441
3442         network = g_hash_table_lookup(interface->bss_mapping, path);
3443         if (network) {
3444                 bss = g_hash_table_lookup(network->bss_table, path);
3445                 if (bss)
3446                         return NULL;
3447         }
3448
3449         bss = g_try_new0(struct g_supplicant_bss, 1);
3450         if (!bss)
3451                 return NULL;
3452
3453         bss->interface = interface;
3454         bss->path = g_strdup(path);
3455         bss->signal = BSS_UNKNOWN_STRENGTH;
3456
3457         return bss;
3458 }
3459
3460 static void interface_bss_added_with_keys(DBusMessageIter *iter,
3461                                                 void *user_data)
3462 {
3463         struct g_supplicant_bss *bss;
3464 #if defined TIZEN_EXT
3465         if (!simplified_log)
3466 #endif
3467         SUPPLICANT_DBG("");
3468
3469         bss = interface_bss_added(iter, user_data);
3470         if (!bss)
3471                 return;
3472
3473         dbus_message_iter_next(iter);
3474
3475         if (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_INVALID)
3476 #if defined TIZEN_EXT
3477         {
3478                 g_free(bss->path);
3479                 g_free(bss);
3480                 return;
3481         }
3482 #else
3483                 return;
3484 #endif
3485
3486         supplicant_dbus_property_foreach(iter, bss_property, bss);
3487
3488         bss_compute_security(bss);
3489         if (add_or_replace_bss_to_network(bss) < 0)
3490                 SUPPLICANT_DBG("add_or_replace_bss_to_network failed");
3491 }
3492
3493 static void interface_bss_added_without_keys(DBusMessageIter *iter,
3494                                                 void *user_data)
3495 {
3496         struct g_supplicant_bss *bss;
3497 #if defined TIZEN_EXT
3498         if (!simplified_log)
3499 #endif
3500         SUPPLICANT_DBG("");
3501
3502         bss = interface_bss_added(iter, user_data);
3503         if (!bss)
3504                 return;
3505
3506         supplicant_dbus_property_get_all(bss->path,
3507                                         SUPPLICANT_INTERFACE ".BSS",
3508                                         bss_property, bss, bss);
3509
3510         bss_compute_security(bss);
3511         if (add_or_replace_bss_to_network(bss) < 0)
3512                         SUPPLICANT_DBG("add_or_replace_bss_to_network failed");
3513 }
3514
3515 static void update_signal(gpointer key, gpointer value,
3516                                                 gpointer user_data)
3517 {
3518         struct g_supplicant_bss *bss = value;
3519         GSupplicantNetwork *network = user_data;
3520
3521 #if defined TIZEN_EXT
3522         if (!network->best_bss || (network->best_bss == bss)) {
3523                 if (bss->signal > network->signal) {
3524                         network->signal = bss->signal;
3525                         network->best_bss = bss;
3526                 }
3527                 return;
3528         }
3529
3530         update_best_bss(network, bss, network->best_bss);
3531 #else
3532         if (bss->signal > network->signal) {
3533                 network->signal = bss->signal;
3534                 network->best_bss = bss;
3535         }
3536 #endif
3537 }
3538
3539 static void update_network_signal(GSupplicantNetwork *network)
3540 {
3541         if (g_hash_table_size(network->bss_table) <= 1 && network->best_bss)
3542                 return;
3543
3544         g_hash_table_foreach(network->bss_table,
3545                                 update_signal, network);
3546
3547         SUPPLICANT_DBG("New network signal %d", network->signal);
3548 }
3549
3550 #if defined TIZEN_EXT
3551 static gboolean last_connected_timeout(gpointer data)
3552 {
3553         GSupplicantInterface *interface = data;
3554         GSupplicantNetwork *current_network = interface->current_network;
3555
3556         SUPPLICANT_DBG("Timeout last connected bss");
3557
3558         if (current_network && current_network->best_bss) {
3559                 if (compare_bssid(current_network->best_bss->bssid, interface->connected_bssid)) {
3560                         g_supplicant_network_set_last_connected_bssid(current_network, interface->connected_bssid);
3561                         callback_network_changed(current_network, "LastConnectedBSSID");
3562                 }
3563         }
3564
3565         last_connected_bss_timeout = 0;
3566         return FALSE;
3567 }
3568
3569 static void add_timer_for_last_connected(GSupplicantInterface *interface)
3570 {
3571         GSupplicantNetwork *current_network = interface->current_network;
3572
3573         if (interface->state == G_SUPPLICANT_STATE_COMPLETED) {
3574                 if (current_network) {
3575                         struct g_supplicant_bss *best_bss = current_network->best_bss;
3576
3577                         memcpy(interface->connected_bssid, best_bss->bssid, WIFI_BSSID_LEN_MAX);
3578
3579                         if (last_connected_bss_timeout)
3580                                 g_source_remove(last_connected_bss_timeout);
3581
3582                         last_connected_bss_timeout = g_timeout_add_seconds(LAST_CONNECTED_TIMEOUT,
3583                                 last_connected_timeout, interface);
3584
3585                         SUPPLICANT_DBG("Add timer for last connected bssid [" MACSTR "]",
3586                                         MAC2STR(best_bss->bssid));
3587                 }
3588         }
3589 }
3590
3591 static void remove_timer_for_last_connected(GSupplicantInterface *interface)
3592 {
3593         if (interface->state == G_SUPPLICANT_STATE_DISCONNECTED) {
3594                 if (last_connected_bss_timeout != 0) {
3595                         g_source_remove(last_connected_bss_timeout);
3596                         last_connected_bss_timeout = 0;
3597                         SUPPLICANT_DBG("Remove timer for last connected bss");
3598                 }
3599         }
3600 }
3601 #endif
3602
3603 static void interface_current_bss(GSupplicantInterface *interface,
3604                                                 DBusMessageIter *iter)
3605 {
3606         GSupplicantNetwork *network;
3607         struct g_supplicant_bss *bss;
3608         const char *path;
3609 #if defined TIZEN_EXT
3610         char bssid_buff1[WIFI_BSSID_STR_LEN] = {0,};
3611         char bssid_buff2[WIFI_BSSID_STR_LEN] = {0,};
3612         char *bssid_str1 = bssid_buff1;
3613         char *bssid_str2 = bssid_buff2;
3614         gboolean update = FALSE;
3615 #endif
3616
3617         dbus_message_iter_get_basic(iter, &path);
3618         if (g_strcmp0(path, "/") == 0) {
3619                 interface->current_network = NULL;
3620                 return;
3621         }
3622
3623         interface_bss_added_without_keys(iter, interface);
3624
3625         network = g_hash_table_lookup(interface->bss_mapping, path);
3626         if (!network)
3627                 return;
3628
3629         bss = g_hash_table_lookup(network->bss_table, path);
3630         if (!bss)
3631                 return;
3632
3633         interface->current_network = network;
3634 #if defined TIZEN_EXT
3635         snprintf(bssid_str1, WIFI_BSSID_STR_LEN, MACSTR, MAC2STR(bss->bssid));
3636         snprintf(bssid_str2, WIFI_BSSID_STR_LEN, MACSTR, MAC2STR(network->best_bss->bssid));
3637
3638         SUPPLICANT_DBG("current network [%p], Passed bss %s, best bss %s",
3639                         interface->current_network, bssid_str1, bssid_str2);
3640
3641         if (network->frequency != bss->frequency) {
3642                 network->frequency = bss->frequency;
3643                 update = TRUE;
3644         }
3645 #endif
3646
3647         if (bss != network->best_bss) {
3648                 /*
3649                  * This is the case where either wpa_s got associated
3650                  * to a BSS different than the one ConnMan considers
3651                  * the best, or we are roaming.
3652                  */
3653                 SUPPLICANT_DBG("Update best BSS for %s", network->name);
3654
3655                 network->best_bss = bss;
3656
3657                 if (network->signal != bss->signal) {
3658                         SUPPLICANT_DBG("New network signal %d dBm",
3659                                                 bss->signal);
3660
3661                         network->signal = bss->signal;
3662                         callback_network_changed(network, "Signal");
3663 #if defined TIZEN_EXT
3664                         update = FALSE;
3665                 } else {
3666                         update = TRUE;
3667 #endif
3668                 }
3669         }
3670
3671 #if defined TIZEN_EXT
3672         if (update)
3673                 callback_network_changed(network, "");
3674 #endif
3675
3676         /*
3677          * wpa_s could notify about CurrentBSS in any state once
3678          * it got associated. It is not sure such notification will
3679          * arrive together with transition to ASSOCIATED state.
3680          * In fact, for networks with security WEP or OPEN, it
3681          * always arrives together with transition to COMPLETED.
3682          */
3683         switch (interface->state) {
3684         case G_SUPPLICANT_STATE_UNKNOWN:
3685         case G_SUPPLICANT_STATE_DISABLED:
3686         case G_SUPPLICANT_STATE_DISCONNECTED:
3687         case G_SUPPLICANT_STATE_INACTIVE:
3688         case G_SUPPLICANT_STATE_SCANNING:
3689         case G_SUPPLICANT_STATE_AUTHENTICATING:
3690         case G_SUPPLICANT_STATE_ASSOCIATING:
3691                 return;
3692         case G_SUPPLICANT_STATE_ASSOCIATED:
3693         case G_SUPPLICANT_STATE_4WAY_HANDSHAKE:
3694         case G_SUPPLICANT_STATE_GROUP_HANDSHAKE:
3695         case G_SUPPLICANT_STATE_COMPLETED:
3696                 callback_network_associated(network);
3697 #if defined TIZEN_EXT
3698                 add_timer_for_last_connected(interface);
3699 #endif
3700                 break;
3701         }
3702 }
3703
3704 static void interface_bss_removed(DBusMessageIter *iter, void *user_data)
3705 {
3706         GSupplicantInterface *interface = user_data;
3707         GSupplicantNetwork *network;
3708         struct g_supplicant_bss *bss = NULL;
3709         const char *path = NULL;
3710         bool is_current_network_bss = false;
3711
3712         dbus_message_iter_get_basic(iter, &path);
3713         if (!path)
3714                 return;
3715
3716         network = g_hash_table_lookup(interface->bss_mapping, path);
3717         if (!network)
3718                 return;
3719
3720         bss = g_hash_table_lookup(network->bss_table, path);
3721         if (network->best_bss == bss) {
3722                 network->best_bss = NULL;
3723                 network->signal = BSS_UNKNOWN_STRENGTH;
3724                 is_current_network_bss = true;
3725         }
3726
3727         g_hash_table_remove(bss_mapping, path);
3728
3729         g_hash_table_remove(interface->bss_mapping, path);
3730         g_hash_table_remove(network->bss_table, path);
3731
3732         update_network_signal(network);
3733
3734         if (g_hash_table_size(network->bss_table) == 0) {
3735                 g_hash_table_remove(interface->network_table, network->group);
3736         } else {
3737                 if (is_current_network_bss && network->best_bss)
3738 #if defined TIZEN_EXT
3739                         callback_network_changed(network, "CheckMultiBssidConnect");
3740 #else
3741                         callback_network_changed(network, "");
3742 #endif
3743         }
3744 }
3745
3746 static void set_config_methods(DBusMessageIter *iter, void *user_data)
3747 {
3748         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, user_data);
3749 }
3750
3751 static void wps_property(const char *key, DBusMessageIter *iter,
3752                                                         void *user_data)
3753 {
3754         GSupplicantInterface *interface = user_data;
3755
3756         if (!interface)
3757                 return;
3758 #if defined TIZEN_EXT
3759         if (!simplified_log)
3760 #endif
3761         SUPPLICANT_DBG("key: %s", key);
3762
3763         if (g_strcmp0(key, "ConfigMethods") == 0) {
3764                 const char *config_methods = "push_button", *str = NULL;
3765
3766                 dbus_message_iter_get_basic(iter, &str);
3767                 if (str && strlen(str) > 0) {
3768                         /* It was already set at wpa_s level, don't modify it. */
3769                         SUPPLICANT_DBG("%s", str);
3770                         return;
3771                 }
3772
3773                 supplicant_dbus_property_set(interface->path,
3774                         SUPPLICANT_INTERFACE ".Interface.WPS",
3775                         "ConfigMethods", DBUS_TYPE_STRING_AS_STRING,
3776                         set_config_methods, NULL, &config_methods, NULL);
3777
3778                 SUPPLICANT_DBG("No value. Set %s", config_methods);
3779         }
3780
3781 }
3782
3783 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
3784 void g_supplicant_replace_config_file(const char *ifname, const char *config_file)
3785 {
3786         if (!ifname)
3787                return;
3788
3789         if (!config_file)
3790                 return;
3791
3792         SUPPLICANT_DBG("New {%s, %s}", ifname, config_file);
3793         g_hash_table_replace(config_file_table,
3794                         g_strdup(ifname), g_strdup(config_file));
3795 }
3796 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
3797
3798 static void interface_property(const char *key, DBusMessageIter *iter,
3799                                                         void *user_data)
3800 {
3801         GSupplicantInterface *interface = user_data;
3802
3803         if (!interface)
3804                 return;
3805 #if defined TIZEN_EXT
3806         if (!simplified_log)
3807 #endif
3808         SUPPLICANT_DBG("%s", key);
3809
3810         if (!key) {
3811                 debug_strvalmap("KeyMgmt capability", keymgmt_map,
3812                                                 interface->keymgmt_capa);
3813                 debug_strvalmap("AuthAlg capability", authalg_capa_map,
3814                                                 interface->authalg_capa);
3815                 debug_strvalmap("Protocol capability", proto_capa_map,
3816                                                 interface->proto_capa);
3817                 debug_strvalmap("Pairwise capability", pairwise_map,
3818                                                 interface->pairwise_capa);
3819                 debug_strvalmap("Group capability", group_map,
3820                                                 interface->group_capa);
3821                 debug_strvalmap("Scan capability", scan_capa_map,
3822                                                 interface->scan_capa);
3823                 debug_strvalmap("Mode capability", mode_capa_map,
3824                                                 interface->mode_capa);
3825
3826                 supplicant_dbus_property_get_all(interface->path,
3827                                 SUPPLICANT_INTERFACE ".Interface.WPS",
3828                                 wps_property, interface, interface);
3829
3830                 if (interface->ready)
3831                         callback_interface_added(interface);
3832
3833                 return;
3834         }
3835
3836         if (g_strcmp0(key, "Capabilities") == 0) {
3837                 supplicant_dbus_property_foreach(iter, interface_capability,
3838                                                                 interface);
3839 #if !defined TIZEN_EXT
3840                 if (interface->mode_capa & G_SUPPLICANT_CAPABILITY_MODE_P2P)
3841                         interface->p2p_support = true;
3842 #endif
3843 #if defined TIZEN_EXT_WIFI_MESH
3844                 if (interface->mode_capa & G_SUPPLICANT_CAPABILITY_MODE_MESH)
3845                         interface->mesh_support = true;
3846 #endif
3847         } else if (g_strcmp0(key, "State") == 0) {
3848                 const char *str = NULL;
3849
3850                 dbus_message_iter_get_basic(iter, &str);
3851                 if (str)
3852                         if (string2state(str) != interface->state) {
3853                                 interface->state = string2state(str);
3854                                 callback_interface_state(interface);
3855                         }
3856 #if defined TIZEN_EXT
3857                 switch (interface->state) {
3858                 case G_SUPPLICANT_STATE_COMPLETED:
3859                         add_timer_for_last_connected(interface);
3860                         break;
3861                 case G_SUPPLICANT_STATE_DISCONNECTED:
3862                         remove_timer_for_last_connected(interface);
3863                         break;
3864                 default:
3865                         break;
3866                 }
3867 #endif
3868                 if (interface->ap_create_in_progress) {
3869                         if (interface->state == G_SUPPLICANT_STATE_DISCONNECTED)
3870                                 callback_ap_create_fail(interface);
3871
3872                         interface->ap_create_in_progress = false;
3873                 }
3874
3875                 if (interface->state == G_SUPPLICANT_STATE_DISABLED)
3876                         interface->ready = FALSE;
3877                 else
3878                         interface->ready = TRUE;
3879
3880                 SUPPLICANT_DBG("state %s (%d)", str, interface->state);
3881         } else if (g_strcmp0(key, "Scanning") == 0) {
3882                 dbus_bool_t scanning = FALSE;
3883
3884                 dbus_message_iter_get_basic(iter, &scanning);
3885                 interface->scanning = scanning;
3886
3887                 if (interface->ready) {
3888                         if (interface->scanning)
3889                                 callback_scan_started(interface);
3890                         else
3891                                 callback_scan_finished(interface);
3892                 }
3893         } else if (g_strcmp0(key, "ApScan") == 0) {
3894                 int apscan = 1;
3895
3896                 dbus_message_iter_get_basic(iter, &apscan);
3897                 interface->apscan = apscan;
3898         } else if (g_strcmp0(key, "Ifname") == 0) {
3899                 const char *str = NULL;
3900
3901                 dbus_message_iter_get_basic(iter, &str);
3902                 if (str) {
3903                         g_free(interface->ifname);
3904                         interface->ifname = g_strdup(str);
3905                 }
3906         } else if (g_strcmp0(key, "Driver") == 0) {
3907                 const char *str = NULL;
3908
3909                 dbus_message_iter_get_basic(iter, &str);
3910                 if (str) {
3911                         g_free(interface->driver);
3912                         interface->driver = g_strdup(str);
3913                 }
3914         } else if (g_strcmp0(key, "BridgeIfname") == 0) {
3915                 const char *str = NULL;
3916
3917                 dbus_message_iter_get_basic(iter, &str);
3918                 if (str) {
3919                         g_free(interface->bridge);
3920                         interface->bridge = g_strdup(str);
3921                 }
3922         } else if (g_strcmp0(key, "ConfigFile") == 0) {
3923                 const char *str = NULL;
3924
3925                 dbus_message_iter_get_basic(iter, &str);
3926                 if (str && strlen(str) > 0 && interface->ifname) {
3927                         SUPPLICANT_DBG("New {%s, %s}", interface->ifname, str);
3928                         g_hash_table_replace(config_file_table,
3929                                 g_strdup(interface->ifname), g_strdup(str));
3930                 }
3931         } else if (g_strcmp0(key, "CurrentBSS") == 0) {
3932                 interface_current_bss(interface, iter);
3933         } else if (g_strcmp0(key, "CurrentNetwork") == 0) {
3934 #if defined TIZEN_EXT
3935                 if (interface->state != G_SUPPLICANT_STATE_COMPLETED)
3936 #endif
3937                 interface_network_added(iter, interface);
3938         } else if (g_strcmp0(key, "BSSs") == 0) {
3939                 supplicant_dbus_array_foreach(iter,
3940                                         interface_bss_added_without_keys,
3941                                         interface);
3942         } else if (g_strcmp0(key, "Blobs") == 0) {
3943                 /* Nothing */
3944         } else if (g_strcmp0(key, "Networks") == 0) {
3945                 supplicant_dbus_array_foreach(iter, interface_network_added,
3946                                                                 interface);
3947         } else if (g_strcmp0(key, "DisconnectReason") == 0) {
3948                 int reason_code;
3949                 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
3950                         dbus_message_iter_get_basic(iter, &reason_code);
3951                         callback_disconnect_reason_code(interface, reason_code);
3952 #if defined TIZEN_EXT
3953                         SUPPLICANT_DBG("reason code (%d)", reason_code);
3954 #endif
3955                 }
3956         } else if (g_strcmp0(key, "AssocStatusCode") == 0) {
3957                 int status_code;
3958                 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
3959                         dbus_message_iter_get_basic(iter, &status_code);
3960                         callback_assoc_status_code(interface, status_code);
3961 #if defined TIZEN_EXT
3962                         SUPPLICANT_DBG("status code (%d)", status_code);
3963 #endif
3964                 }
3965         } else {
3966                 SUPPLICANT_DBG("key %s type %c",
3967                                 key, dbus_message_iter_get_arg_type(iter));
3968         }
3969 }
3970
3971 static void scan_network_update(DBusMessageIter *iter, void *user_data)
3972 {
3973         GSupplicantInterface *interface = user_data;
3974         GSupplicantNetwork *network;
3975         char *path;
3976
3977         if (!iter)
3978                 return;
3979
3980         dbus_message_iter_get_basic(iter, &path);
3981
3982         if (!path)
3983                 return;
3984
3985         if (g_strcmp0(path, "/") == 0)
3986                 return;
3987
3988         /* Update the network details based on scan BSS data */
3989         network = g_hash_table_lookup(interface->bss_mapping, path);
3990         if (network)
3991                 callback_network_added(network);
3992 }
3993
3994 static void scan_bss_data(const char *key, DBusMessageIter *iter,
3995                                 void *user_data)
3996 {
3997         GSupplicantInterface *interface = user_data;
3998
3999 /*Fixed : stucking in scanning state when scan failed*/
4000 #if defined TIZEN_EXT
4001         GSupplicantInterfaceCallback scan_callback;
4002         SUPPLICANT_DBG("");
4003 #endif
4004
4005         if (iter)
4006                 supplicant_dbus_array_foreach(iter, scan_network_update,
4007                                                 interface);
4008
4009 #if defined TIZEN_EXT
4010         scan_callback = interface->scan_callback;
4011         callback_scan_done(interface);
4012 #endif
4013
4014         if (interface->scan_callback)
4015                 interface->scan_callback(0, interface, interface->scan_data);
4016
4017 #if defined TIZEN_EXT
4018         if (interface->scan_callback == scan_callback) {
4019 #endif
4020         interface->scan_callback = NULL;
4021         interface->scan_data = NULL;
4022 #if defined TIZEN_EXT
4023         }
4024 #endif
4025 }
4026
4027 static GSupplicantInterface *interface_alloc(const char *path)
4028 {
4029         GSupplicantInterface *interface;
4030
4031         interface = g_try_new0(GSupplicantInterface, 1);
4032         if (!interface)
4033                 return NULL;
4034
4035         interface->path = g_strdup(path);
4036
4037         interface->network_table = g_hash_table_new_full(g_str_hash,
4038                                         g_str_equal, NULL, remove_network);
4039         interface->peer_table = g_hash_table_new_full(g_str_hash,
4040                                         g_str_equal, NULL, remove_peer);
4041         interface->group_table = g_hash_table_new_full(g_str_hash,
4042                                         g_str_equal, NULL, remove_group);
4043         interface->bss_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
4044                                                                 NULL, NULL);
4045
4046         g_hash_table_replace(interface_table, interface->path, interface);
4047
4048         return interface;
4049 }
4050
4051 static void interface_added(DBusMessageIter *iter, void *user_data)
4052 {
4053         GSupplicantInterface *interface;
4054         const char *path = NULL;
4055         bool properties_appended = GPOINTER_TO_UINT(user_data);
4056
4057         SUPPLICANT_DBG("");
4058
4059         dbus_message_iter_get_basic(iter, &path);
4060         if (!path)
4061                 return;
4062
4063         if (g_strcmp0(path, "/") == 0)
4064                 return;
4065
4066         interface = g_hash_table_lookup(interface_table, path);
4067         if (interface)
4068                 return;
4069
4070         interface = interface_alloc(path);
4071         if (!interface)
4072                 return;
4073
4074         if (!properties_appended) {
4075                 supplicant_dbus_property_get_all(path,
4076                                                 SUPPLICANT_INTERFACE ".Interface",
4077                                                 interface_property, interface,
4078                                                 interface);
4079                 return;
4080         }
4081
4082         dbus_message_iter_next(iter);
4083         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
4084                 supplicant_dbus_property_foreach(iter, interface_property,
4085                                                                 interface);
4086                 interface_property(NULL, NULL, interface);
4087         }
4088 }
4089
4090 static void interface_removed(DBusMessageIter *iter, void *user_data)
4091 {
4092         const char *path = NULL;
4093         GSupplicantInterface *interface = user_data;
4094
4095         dbus_message_iter_get_basic(iter, &path);
4096         if (!path)
4097                 return;
4098
4099         interface = g_hash_table_lookup(interface_table, path);
4100         g_supplicant_interface_cancel(interface);
4101
4102         g_hash_table_remove(interface_table, path);
4103 }
4104
4105 static void eap_method(DBusMessageIter *iter, void *user_data)
4106 {
4107         const char *str = NULL;
4108         int i;
4109
4110         dbus_message_iter_get_basic(iter, &str);
4111         if (!str)
4112                 return;
4113
4114         for (i = 0; eap_method_map[i].str; i++)
4115                 if (strcmp(str, eap_method_map[i].str) == 0) {
4116                         eap_methods |= eap_method_map[i].val;
4117                         break;
4118                 }
4119 }
4120
4121 static void service_property(const char *key, DBusMessageIter *iter,
4122                                                         void *user_data)
4123 {
4124         if (!key) {
4125                 callback_system_ready();
4126                 return;
4127         }
4128
4129         if (g_strcmp0(key, "DebugLevel") == 0) {
4130                 const char *str = NULL;
4131                 int i;
4132
4133                 dbus_message_iter_get_basic(iter, &str);
4134                 for (i = 0; debug_strings[i]; i++)
4135                         if (g_strcmp0(debug_strings[i], str) == 0) {
4136                                 debug_level = i;
4137                                 break;
4138                         }
4139                 SUPPLICANT_DBG("Debug level %d", debug_level);
4140         } else if (g_strcmp0(key, "DebugTimestamp") == 0) {
4141                 dbus_message_iter_get_basic(iter, &debug_timestamp);
4142                 SUPPLICANT_DBG("Debug timestamp %u", debug_timestamp);
4143         } else if (g_strcmp0(key, "DebugShowKeys") == 0) {
4144                 dbus_message_iter_get_basic(iter, &debug_showkeys);
4145                 SUPPLICANT_DBG("Debug show keys %u", debug_showkeys);
4146         } else if (g_strcmp0(key, "Interfaces") == 0) {
4147                 supplicant_dbus_array_foreach(iter, interface_added, NULL);
4148         } else if (g_strcmp0(key, "EapMethods") == 0) {
4149                 supplicant_dbus_array_foreach(iter, eap_method, NULL);
4150                 debug_strvalmap("EAP method", eap_method_map, eap_methods);
4151         } else if (g_strcmp0(key, "Country") == 0) {
4152                 const char *country = NULL;
4153
4154                 dbus_message_iter_get_basic(iter, &country);
4155                 SUPPLICANT_DBG("Country %s", country);
4156         } else
4157                 SUPPLICANT_DBG("key %s type %c",
4158                                 key, dbus_message_iter_get_arg_type(iter));
4159 }
4160
4161 static void signal_name_owner_changed(const char *path, DBusMessageIter *iter)
4162 {
4163         const char *name = NULL, *old = NULL, *new = NULL;
4164
4165         SUPPLICANT_DBG("");
4166
4167         if (g_strcmp0(path, DBUS_PATH_DBUS) != 0)
4168                 return;
4169
4170         dbus_message_iter_get_basic(iter, &name);
4171         if (!name)
4172                 return;
4173
4174         if (g_strcmp0(name, SUPPLICANT_SERVICE) != 0)
4175                 return;
4176
4177         dbus_message_iter_next(iter);
4178         dbus_message_iter_get_basic(iter, &old);
4179         dbus_message_iter_next(iter);
4180         dbus_message_iter_get_basic(iter, &new);
4181
4182         if (!old || !new)
4183                 return;
4184
4185         if (strlen(old) > 0 && strlen(new) == 0) {
4186                 system_available = FALSE;
4187                 g_hash_table_remove_all(bss_mapping);
4188                 g_hash_table_remove_all(peer_mapping);
4189                 g_hash_table_remove_all(group_mapping);
4190                 g_hash_table_remove_all(config_file_table);
4191                 g_hash_table_remove_all(interface_table);
4192                 callback_system_killed();
4193         }
4194
4195         if (strlen(new) > 0 && strlen(old) == 0) {
4196                 system_available = TRUE;
4197                 supplicant_dbus_property_get_all(SUPPLICANT_PATH,
4198                                                 SUPPLICANT_INTERFACE,
4199                                                 service_property, NULL, NULL);
4200         }
4201 }
4202
4203 static void signal_properties_changed(const char *path, DBusMessageIter *iter)
4204 {
4205         SUPPLICANT_DBG("");
4206
4207         if (g_strcmp0(path, SUPPLICANT_PATH) != 0)
4208                 return;
4209
4210         supplicant_dbus_property_foreach(iter, service_property, NULL);
4211 }
4212
4213 static void signal_interface_added(const char *path, DBusMessageIter *iter)
4214 {
4215         SUPPLICANT_DBG("path %s %s", path, SUPPLICANT_PATH);
4216
4217         if (g_strcmp0(path, SUPPLICANT_PATH) == 0)
4218                 interface_added(iter, GUINT_TO_POINTER(true));
4219 }
4220
4221 static void signal_interface_removed(const char *path, DBusMessageIter *iter)
4222 {
4223         SUPPLICANT_DBG("");
4224
4225         if (g_strcmp0(path, SUPPLICANT_PATH) == 0)
4226                 interface_removed(iter, NULL);
4227 }
4228
4229 static void signal_interface_changed(const char *path, DBusMessageIter *iter)
4230 {
4231         GSupplicantInterface *interface;
4232 #if defined TIZEN_EXT
4233         if (!simplified_log)
4234 #endif
4235         SUPPLICANT_DBG("");
4236
4237         interface = g_hash_table_lookup(interface_table, path);
4238         if (!interface)
4239                 return;
4240
4241         supplicant_dbus_property_foreach(iter, interface_property, interface);
4242 }
4243
4244 static void signal_scan_done(const char *path, DBusMessageIter *iter)
4245 {
4246         GSupplicantInterface *interface;
4247         dbus_bool_t success = FALSE;
4248
4249         SUPPLICANT_DBG("");
4250
4251         interface = g_hash_table_lookup(interface_table, path);
4252         if (!interface)
4253                 return;
4254
4255         dbus_message_iter_get_basic(iter, &success);
4256
4257         if (interface->scanning) {
4258                 callback_scan_finished(interface);
4259                 interface->scanning = FALSE;
4260         }
4261
4262         /*
4263          * If scan is unsuccessful return -EIO else get the scanned BSSs
4264          * and update the network details accordingly
4265          */
4266         if (!success) {
4267                 if (interface->scan_callback)
4268                         interface->scan_callback(-EIO, interface,
4269                                                 interface->scan_data);
4270
4271                 interface->scan_callback = NULL;
4272                 interface->scan_data = NULL;
4273
4274                 return;
4275         }
4276
4277         supplicant_dbus_property_get(path, SUPPLICANT_INTERFACE ".Interface",
4278                                 "BSSs", scan_bss_data, interface, interface);
4279 }
4280
4281 static void signal_bss_added(const char *path, DBusMessageIter *iter)
4282 {
4283         GSupplicantInterface *interface;
4284 #if defined TIZEN_EXT
4285         if (!simplified_log)
4286 #endif
4287         SUPPLICANT_DBG("");
4288
4289         interface = g_hash_table_lookup(interface_table, path);
4290         if (!interface)
4291                 return;
4292
4293         interface_bss_added_with_keys(iter, interface);
4294 }
4295
4296 static void signal_bss_removed(const char *path, DBusMessageIter *iter)
4297 {
4298         GSupplicantInterface *interface;
4299
4300         SUPPLICANT_DBG("");
4301
4302         interface = g_hash_table_lookup(interface_table, path);
4303         if (!interface)
4304                 return;
4305
4306         interface_bss_removed(iter, interface);
4307 }
4308
4309 static void signal_network_added(const char *path, DBusMessageIter *iter)
4310 {
4311         GSupplicantInterface *interface;
4312
4313         SUPPLICANT_DBG("");
4314
4315         interface = g_hash_table_lookup(interface_table, path);
4316         if (!interface)
4317                 return;
4318
4319         interface_network_added(iter, interface);
4320 }
4321
4322 static void signal_network_removed(const char *path, DBusMessageIter *iter)
4323 {
4324         GSupplicantInterface *interface;
4325
4326         SUPPLICANT_DBG("");
4327
4328         interface = g_hash_table_lookup(interface_table, path);
4329         if (!interface)
4330                 return;
4331
4332         interface_network_removed(iter, interface);
4333 }
4334 #if defined TIZEN_EXT
4335 void *copy_vsie_list(gconstpointer src, gpointer data)
4336 {
4337         return g_strdup(src);
4338 }
4339 #endif
4340
4341
4342 static void signal_sta_authorized(const char *path, DBusMessageIter *iter)
4343 {
4344         GSupplicantInterface *interface;
4345         const char *addr = NULL;
4346
4347         SUPPLICANT_DBG("");
4348
4349         interface = g_hash_table_lookup(interface_table, path);
4350         if (!interface)
4351                 return;
4352
4353         dbus_message_iter_get_basic(iter, &addr);
4354         if (!addr)
4355                 return;
4356
4357         callback_sta_authorized(interface, addr);
4358 }
4359
4360 static void signal_sta_deauthorized(const char *path, DBusMessageIter *iter)
4361 {
4362         GSupplicantInterface *interface;
4363         const char *addr = NULL;
4364
4365         SUPPLICANT_DBG("");
4366
4367         interface = g_hash_table_lookup(interface_table, path);
4368         if (!interface)
4369                 return;
4370
4371         dbus_message_iter_get_basic(iter, &addr);
4372         if (!addr)
4373                 return;
4374
4375         callback_sta_deauthorized(interface, addr);
4376 }
4377
4378 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
4379 static void signal_eap(const char *path, DBusMessageIter *iter)
4380 {
4381         GSupplicantInterface *interface;
4382         const char *str = NULL;
4383
4384         SUPPLICANT_DBG("EAPOL_DEBUG callback eap signal");
4385
4386         interface = g_hash_table_lookup(interface_table, path);
4387         if (!interface)
4388                 return;
4389
4390         // TODO: Identify EAP fail condition, currently timeout is used for failure.
4391
4392         dbus_message_iter_get_basic(iter, &str);
4393         if (!str)
4394                 return;
4395
4396         if (g_strcmp0("completion", str))
4397                 return;
4398
4399         dbus_message_iter_next(iter);
4400
4401         dbus_message_iter_get_basic(iter, &str);
4402         if (!str)
4403                 return;
4404
4405         if (!g_strcmp0("success", str))
4406                 callback_eap(interface, true);
4407         else
4408                 callback_eap(interface, false);
4409 }
4410 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
4411
4412 static void signal_bss_changed(const char *path, DBusMessageIter *iter)
4413 {
4414         GSupplicantInterface *interface;
4415         GSupplicantNetwork *network;
4416         GSupplicantSecurity old_security;
4417         unsigned int old_wps_capabilities;
4418         struct g_supplicant_bss *bss;
4419
4420 #if defined TIZEN_EXT
4421         if (!simplified_log)
4422 #endif
4423         SUPPLICANT_DBG("");
4424
4425         interface = g_hash_table_lookup(bss_mapping, path);
4426         if (!interface)
4427                 return;
4428
4429         network = g_hash_table_lookup(interface->bss_mapping, path);
4430         if (!network)
4431                 return;
4432
4433         bss = g_hash_table_lookup(network->bss_table, path);
4434         if (!bss)
4435                 return;
4436
4437         supplicant_dbus_property_foreach(iter, bss_property, bss);
4438
4439 #if defined TIZEN_EXT
4440         if (network->interface->state != G_SUPPLICANT_STATE_COMPLETED) {
4441                 network->frequency = bss->frequency;
4442                 network->phy_mode = bss->phy_mode;
4443         }
4444 #endif
4445         old_security = network->security;
4446         bss_compute_security(bss);
4447
4448         if (old_security != bss->security) {
4449                 struct g_supplicant_bss *new_bss;
4450
4451                 SUPPLICANT_DBG("New network security for %s with path %s",
4452                                bss->ssid, bss->path);
4453
4454                 /*
4455                  * Security change policy:
4456                  * - We first copy the current bss into a new one with
4457                  *   its own pointer (path)
4458                  * - Clear the old bss pointer and remove the network completely
4459                  *   if there are no more BSSs in the bss table.
4460                  * - The new bss will be added either to an existing network
4461                  *   or an additional network will be created
4462                  */
4463
4464                 new_bss = g_try_new0(struct g_supplicant_bss, 1);
4465                 if (!new_bss)
4466                         return;
4467
4468                 memcpy(new_bss, bss, sizeof(struct g_supplicant_bss));
4469                 new_bss->path = g_strdup(bss->path);
4470 #if defined TIZEN_EXT
4471                 new_bss->vsie_list = g_slist_copy_deep(bss->vsie_list, copy_vsie_list, NULL);
4472 #endif
4473
4474                 if (network->best_bss == bss) {
4475                         network->best_bss = NULL;
4476                         network->signal = BSS_UNKNOWN_STRENGTH;
4477                 }
4478
4479                 g_hash_table_remove(bss_mapping, path);
4480
4481                 g_hash_table_remove(interface->bss_mapping, path);
4482                 g_hash_table_remove(network->bss_table, path);
4483
4484                 update_network_signal(network);
4485
4486                 if (g_hash_table_size(network->bss_table) == 0)
4487                         g_hash_table_remove(interface->network_table,
4488                                             network->group);
4489
4490                 if (add_or_replace_bss_to_network(new_bss) < 0) {
4491                         /*
4492                          * Prevent a memory leak on failure in
4493                          * add_or_replace_bss_to_network
4494                          */
4495                         SUPPLICANT_DBG("Failed to add bss %s to network table",
4496                                        new_bss->path);
4497                         g_free(new_bss->path);
4498                         g_free(new_bss);
4499                 }
4500
4501                 return;
4502         }
4503
4504         old_wps_capabilities = network->wps_capabilities;
4505
4506         if (old_wps_capabilities != bss->wps_capabilities) {
4507                 network->wps_capabilities = bss->wps_capabilities;
4508                 callback_network_changed(network, "WPSCapabilities");
4509         }
4510
4511 #if defined TIZEN_EXT
4512         if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
4513                 network->wps = TRUE;
4514                 network->wps_capabilities |= bss->wps_capabilities;
4515         } else
4516                 network->wps = FALSE;
4517 #endif
4518
4519         /* Consider only property changes of the connected BSS */
4520         if (network == interface->current_network && bss != network->best_bss)
4521                 return;
4522
4523         if (bss->signal == network->signal)
4524 #ifndef TIZEN_EXT
4525                 return;
4526 #else
4527         {
4528                 callback_network_changed(network, "");
4529                 return;
4530         }
4531 #endif
4532
4533         /*
4534          * If the new signal is lower than the SSID signal, we need
4535          * to check for the new maximum.
4536          */
4537 #if defined TIZEN_EXT
4538         if (!update_best_bss(network, bss, network->best_bss)) {
4539                 if (bss != network->best_bss) {
4540                         callback_network_changed(network, "");
4541                         return;
4542                 }
4543
4544                 network->signal = bss->signal;
4545                 update_network_signal(network);
4546         }
4547 #else
4548         if (bss->signal < network->signal) {
4549                 if (bss != network->best_bss)
4550                         return;
4551
4552                 network->signal = bss->signal;
4553                 update_network_signal(network);
4554         } else {
4555                 network->signal = bss->signal;
4556                 network->best_bss = bss;
4557         }
4558 #endif
4559
4560         SUPPLICANT_DBG("New network signal for %s %d dBm", network->ssid,
4561                         network->signal);
4562
4563         callback_network_changed(network, "Signal");
4564 }
4565
4566 static void wps_credentials(const char *key, DBusMessageIter *iter,
4567                         void *user_data)
4568 {
4569         GSupplicantInterface *interface = user_data;
4570
4571         if (!key)
4572                 return;
4573
4574         SUPPLICANT_DBG("key %s", key);
4575
4576         if (g_strcmp0(key, "Key") == 0) {
4577                 DBusMessageIter array;
4578                 unsigned char *key_val;
4579                 int key_len;
4580
4581                 dbus_message_iter_recurse(iter, &array);
4582                 dbus_message_iter_get_fixed_array(&array, &key_val, &key_len);
4583
4584                 g_free(interface->wps_cred.key);
4585                 interface->wps_cred.key = g_try_malloc0(
4586                                                 sizeof(char) * key_len + 1);
4587
4588                 if (!interface->wps_cred.key)
4589                         return;
4590
4591                 memcpy(interface->wps_cred.key, key_val,
4592                                                 sizeof(char) * key_len);
4593
4594                 SUPPLICANT_DBG("WPS key present");
4595         } else if (g_strcmp0(key, "SSID") == 0) {
4596                 DBusMessageIter array;
4597                 unsigned char *ssid;
4598                 int ssid_len;
4599
4600                 dbus_message_iter_recurse(iter, &array);
4601                 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
4602
4603                 if (ssid_len > 0 && ssid_len < 33) {
4604                         memcpy(interface->wps_cred.ssid, ssid, ssid_len);
4605                         interface->wps_cred.ssid_len = ssid_len;
4606                 } else {
4607                         memset(interface->wps_cred.ssid, 0, 32);
4608                         interface->wps_cred.ssid_len = 0;
4609                 }
4610         }
4611 }
4612
4613 static void signal_wps_credentials(const char *path, DBusMessageIter *iter)
4614 {
4615         GSupplicantInterface *interface;
4616
4617         SUPPLICANT_DBG("");
4618
4619         interface = g_hash_table_lookup(interface_table, path);
4620         if (!interface)
4621                 return;
4622
4623         supplicant_dbus_property_foreach(iter, wps_credentials, interface);
4624 }
4625
4626 static void wps_event_args(const char *key, DBusMessageIter *iter,
4627                         void *user_data)
4628 {
4629         GSupplicantInterface *interface = user_data;
4630
4631         if (!key || !interface)
4632                 return;
4633
4634         SUPPLICANT_DBG("Arg Key %s", key);
4635 }
4636
4637 static void signal_wps_event(const char *path, DBusMessageIter *iter)
4638 {
4639         GSupplicantInterface *interface;
4640         const char *name = NULL;
4641
4642         SUPPLICANT_DBG("");
4643
4644         interface = g_hash_table_lookup(interface_table, path);
4645         if (!interface)
4646                 return;
4647
4648         dbus_message_iter_get_basic(iter, &name);
4649
4650         SUPPLICANT_DBG("Name: %s", name);
4651
4652         if (g_strcmp0(name, "success") == 0)
4653                 interface->wps_state = G_SUPPLICANT_WPS_STATE_SUCCESS;
4654         else if (g_strcmp0(name, "fail") == 0)
4655                 interface->wps_state = G_SUPPLICANT_WPS_STATE_FAIL;
4656         else
4657                 interface->wps_state = G_SUPPLICANT_WPS_STATE_UNKNOWN;
4658
4659         if (!dbus_message_iter_has_next(iter))
4660                 return;
4661
4662         dbus_message_iter_next(iter);
4663
4664         supplicant_dbus_property_foreach(iter, wps_event_args, interface);
4665 }
4666
4667 #if defined TIZEN_EXT
4668 static void signal_power_off(const char *path, DBusMessageIter *iter)
4669 {
4670         int poweroff_state = 0;
4671
4672         dbus_message_iter_get_basic(iter, &poweroff_state);
4673
4674         SUPPLICANT_DBG("poweroff_state(%d)", poweroff_state);
4675
4676         /* POWER_OFF_DIRECT 2 && POWER_OFF_RESTART 3 */
4677         if (poweroff_state != 2 && poweroff_state != 3)
4678                 return;
4679
4680         if (callbacks_pointer == NULL)
4681                 return;
4682
4683         if (callbacks_pointer->system_power_off == NULL)
4684                 return;
4685
4686         callbacks_pointer->system_power_off();
4687 }
4688 #endif
4689
4690 static void create_peer_identifier(GSupplicantPeer *peer)
4691 {
4692         const unsigned char test[ETH_ALEN] = {};
4693
4694         if (!peer)
4695                 return;
4696
4697         if (!memcmp(peer->device_address, test, ETH_ALEN)) {
4698                 peer->identifier = g_strdup(peer->name);
4699                 return;
4700         }
4701
4702         peer->identifier = g_malloc0(19);
4703         snprintf(peer->identifier, 19, "%02x%02x%02x%02x%02x%02x",
4704                                                 peer->device_address[0],
4705                                                 peer->device_address[1],
4706                                                 peer->device_address[2],
4707                                                 peer->device_address[3],
4708                                                 peer->device_address[4],
4709                                                 peer->device_address[5]);
4710 }
4711
4712 struct peer_property_data {
4713         GSupplicantPeer *peer;
4714         GSList *old_groups;
4715         bool groups_changed;
4716         bool services_changed;
4717 };
4718
4719 static void peer_groups_relation(DBusMessageIter *iter, void *user_data)
4720 {
4721         struct peer_property_data *data = user_data;
4722         GSupplicantPeer *peer = data->peer;
4723         GSupplicantGroup *group;
4724         const char *str = NULL;
4725         GSList *elem;
4726
4727         dbus_message_iter_get_basic(iter, &str);
4728         if (!str)
4729                 return;
4730
4731         group = g_hash_table_lookup(group_mapping, str);
4732         if (!group)
4733                 return;
4734
4735         elem = g_slist_find_custom(data->old_groups, str, (GCompareFunc)g_strcmp0);
4736         if (elem) {
4737                 data->old_groups = g_slist_remove_link(data->old_groups, elem);
4738                 peer->groups = g_slist_concat(elem, peer->groups);
4739         } else {
4740                 peer->groups = g_slist_prepend(peer->groups, g_strdup(str));
4741                 data->groups_changed = true;
4742         }
4743 }
4744
4745 static void peer_property(const char *key, DBusMessageIter *iter,
4746                                                         void *user_data)
4747 {
4748         GSupplicantPeer *pending_peer;
4749         struct peer_property_data *data = user_data;
4750         GSupplicantPeer *peer = data->peer;
4751
4752         SUPPLICANT_DBG("key: %s", key);
4753
4754         if (!peer->interface)
4755                 return;
4756
4757         if (!key) {
4758                 if (peer->name) {
4759                         create_peer_identifier(peer);
4760                         callback_peer_found(peer);
4761                         pending_peer = g_hash_table_lookup(
4762                                         pending_peer_connection, peer->path);
4763
4764                         if (pending_peer && pending_peer == peer) {
4765                                 callback_peer_request(peer);
4766                                 g_hash_table_remove(pending_peer_connection,
4767                                                 peer->path);
4768                         }
4769
4770                         dbus_free(data);
4771                 }
4772
4773                 return;
4774         }
4775
4776         if (g_strcmp0(key, "DeviceAddress") == 0) {
4777                 unsigned char *dev_addr;
4778                 DBusMessageIter array;
4779                 int len;
4780
4781                 dbus_message_iter_recurse(iter, &array);
4782                 dbus_message_iter_get_fixed_array(&array, &dev_addr, &len);
4783
4784                 if (len == ETH_ALEN)
4785                         memcpy(peer->device_address, dev_addr, len);
4786         } else if (g_strcmp0(key, "DeviceName") == 0) {
4787                 const char *str = NULL;
4788
4789                 dbus_message_iter_get_basic(iter, &str);
4790                 if (str)
4791                         peer->name = g_strdup(str);
4792         } else if (g_strcmp0(key, "config_method") == 0) {
4793                 uint16_t wps_config;
4794
4795                 dbus_message_iter_get_basic(iter, &wps_config);
4796
4797                 if (wps_config & G_SUPPLICANT_WPS_CONFIG_PBC)
4798                         peer->wps_capabilities |= G_SUPPLICANT_WPS_PBC;
4799                 if (wps_config & ~G_SUPPLICANT_WPS_CONFIG_PBC)
4800                         peer->wps_capabilities |= G_SUPPLICANT_WPS_PIN;
4801         } else if (g_strcmp0(key, "Groups") == 0) {
4802                 data->old_groups = peer->groups;
4803                 peer->groups = NULL;
4804
4805                 supplicant_dbus_array_foreach(iter,
4806                                                 peer_groups_relation, data);
4807                 if (g_slist_length(data->old_groups) > 0) {
4808                         g_slist_free_full(data->old_groups, g_free);
4809                         data->groups_changed = true;
4810                 }
4811         } else if (g_strcmp0(key, "IEs") == 0) {
4812                 DBusMessageIter array;
4813                 unsigned char *ie;
4814                 int ie_len;
4815
4816                 dbus_message_iter_recurse(iter, &array);
4817                 dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
4818
4819                 if (!ie || ie_len < 2)
4820                         return;
4821
4822                 if (peer->widi_ies) {
4823                         if (memcmp(peer->widi_ies, ie, ie_len) == 0)
4824                                 return;
4825
4826                         g_free(peer->widi_ies);
4827                         peer->widi_ies_length = 0;
4828                 }
4829
4830                 peer->widi_ies = g_malloc0(ie_len * sizeof(unsigned char));
4831
4832                 memcpy(peer->widi_ies, ie, ie_len);
4833                 peer->widi_ies_length = ie_len;
4834                 data->services_changed = true;
4835         }
4836 }
4837
4838 static void signal_peer_found(const char *path, DBusMessageIter *iter)
4839 {
4840         struct peer_property_data *property_data;
4841         GSupplicantInterface *interface;
4842         const char *obj_path = NULL;
4843         GSupplicantPeer *peer;
4844
4845         SUPPLICANT_DBG("");
4846
4847         interface = g_hash_table_lookup(interface_table, path);
4848         if (!interface)
4849                 return;
4850
4851         dbus_message_iter_get_basic(iter, &obj_path);
4852         if (!obj_path || g_strcmp0(obj_path, "/") == 0)
4853                 return;
4854
4855         peer = g_hash_table_lookup(interface->peer_table, obj_path);
4856         if (peer)
4857                 return;
4858
4859         peer = g_try_new0(GSupplicantPeer, 1);
4860         if (!peer)
4861                 return;
4862
4863         peer->interface = interface;
4864         peer->path = g_strdup(obj_path);
4865         g_hash_table_insert(interface->peer_table, peer->path, peer);
4866         g_hash_table_replace(peer_mapping, peer->path, interface);
4867
4868         property_data = dbus_malloc0(sizeof(struct peer_property_data));
4869         property_data->peer = peer;
4870
4871         dbus_message_iter_next(iter);
4872         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
4873                 supplicant_dbus_property_foreach(iter, peer_property,
4874                                                         property_data);
4875                 peer_property(NULL, NULL, property_data);
4876                 return;
4877         }
4878
4879         supplicant_dbus_property_get_all(obj_path,
4880                                         SUPPLICANT_INTERFACE ".Peer",
4881                                         peer_property, property_data, NULL);
4882 }
4883
4884 static void signal_peer_lost(const char *path, DBusMessageIter *iter)
4885 {
4886         GSupplicantInterface *interface;
4887         const char *obj_path = NULL;
4888         GSupplicantPeer *peer;
4889
4890         SUPPLICANT_DBG("");
4891
4892         interface = g_hash_table_lookup(interface_table, path);
4893         if (!interface)
4894                 return;
4895
4896         dbus_message_iter_get_basic(iter, &obj_path);
4897         if (!obj_path || g_strcmp0(obj_path, "/") == 0)
4898                 return;
4899
4900         peer = g_hash_table_lookup(interface->peer_table, obj_path);
4901         if (!peer)
4902                 return;
4903
4904         g_hash_table_remove(interface->peer_table, obj_path);
4905 }
4906
4907 static void signal_peer_changed(const char *path, DBusMessageIter *iter)
4908 {
4909         struct peer_property_data *property_data;
4910         GSupplicantInterface *interface;
4911         GSupplicantPeer *peer;
4912
4913         SUPPLICANT_DBG("");
4914
4915         interface = g_hash_table_lookup(peer_mapping, path);
4916         if (!interface)
4917                 return;
4918
4919         peer = g_hash_table_lookup(interface->peer_table, path);
4920         if (!peer) {
4921                 g_hash_table_remove(peer_mapping, path);
4922                 return;
4923         }
4924
4925         property_data = dbus_malloc0(sizeof(struct peer_property_data));
4926         property_data->peer = peer;
4927
4928         supplicant_dbus_property_foreach(iter, peer_property, property_data);
4929         if (property_data->services_changed)
4930                 callback_peer_changed(peer,
4931                                         G_SUPPLICANT_PEER_SERVICES_CHANGED);
4932
4933         if (property_data->groups_changed)
4934                 callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_CHANGED);
4935
4936         dbus_free(property_data);
4937
4938         if (!g_supplicant_peer_is_in_a_group(peer))
4939                 peer->connection_requested = false;
4940 }
4941
4942 struct group_sig_data {
4943         const char *peer_obj_path;
4944         unsigned char iface_address[ETH_ALEN];
4945         const char *interface_obj_path;
4946         const char *group_obj_path;
4947         int role;
4948 };
4949
4950 static void group_sig_property(const char *key, DBusMessageIter *iter,
4951                                                         void *user_data)
4952 {
4953         struct group_sig_data *data = user_data;
4954
4955         if (!key)
4956                 return;
4957
4958         if (g_strcmp0(key, "peer_interface_addr") == 0) {
4959                 unsigned char *dev_addr;
4960                 DBusMessageIter array;
4961                 int len;
4962
4963                 dbus_message_iter_recurse(iter, &array);
4964                 dbus_message_iter_get_fixed_array(&array, &dev_addr, &len);
4965
4966                 if (len == ETH_ALEN)
4967                         memcpy(data->iface_address, dev_addr, len);
4968         } else if (g_strcmp0(key, "role") == 0) {
4969                 const char *str = NULL;
4970
4971                 dbus_message_iter_get_basic(iter, &str);
4972                 if (g_strcmp0(str, "GO") == 0)
4973                         data->role = G_SUPPLICANT_GROUP_ROLE_GO;
4974                 else
4975                         data->role = G_SUPPLICANT_GROUP_ROLE_CLIENT;
4976         } else if (g_strcmp0(key, "peer_object") == 0)
4977                 dbus_message_iter_get_basic(iter, &data->peer_obj_path);
4978         else if (g_strcmp0(key, "interface_object") == 0)
4979                 dbus_message_iter_get_basic(iter, &data->interface_obj_path);
4980         else if (g_strcmp0(key, "group_object") == 0)
4981                 dbus_message_iter_get_basic(iter, &data->group_obj_path);
4982
4983 }
4984
4985 static void signal_group_success(const char *path, DBusMessageIter *iter)
4986 {
4987         GSupplicantInterface *interface;
4988         struct group_sig_data data = {};
4989         GSupplicantPeer *peer;
4990
4991         SUPPLICANT_DBG("");
4992
4993         interface = g_hash_table_lookup(interface_table, path);
4994         if (!interface)
4995                 return;
4996
4997         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
4998         if (!data.peer_obj_path)
4999                 return;
5000
5001         peer = g_hash_table_lookup(interface->peer_table, data.peer_obj_path);
5002         if (!peer)
5003                 return;
5004
5005         memcpy(peer->iface_address, data.iface_address, ETH_ALEN);
5006         interface->pending_peer_path = peer->path;
5007 }
5008
5009 static void signal_group_failure(const char *path, DBusMessageIter *iter)
5010 {
5011         GSupplicantInterface *interface;
5012         struct group_sig_data data = {};
5013         GSupplicantPeer *peer;
5014
5015         SUPPLICANT_DBG("");
5016
5017         interface = g_hash_table_lookup(interface_table, path);
5018         if (!interface)
5019                 return;
5020
5021         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
5022         if (!data.peer_obj_path)
5023                 return;
5024
5025         peer = g_hash_table_lookup(interface->peer_table, data.peer_obj_path);
5026         if (!peer)
5027                 return;
5028
5029         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_FAILED);
5030         peer->connection_requested = false;
5031 }
5032
5033 static void signal_group_started(const char *path, DBusMessageIter *iter)
5034 {
5035         GSupplicantInterface *interface, *g_interface;
5036         struct group_sig_data data = {};
5037         GSupplicantGroup *group;
5038         GSupplicantPeer *peer;
5039
5040         SUPPLICANT_DBG("");
5041
5042         interface = g_hash_table_lookup(interface_table, path);
5043         if (!interface)
5044                 return;
5045
5046         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
5047         if (!data.interface_obj_path || !data.group_obj_path)
5048                 return;
5049
5050         peer = g_hash_table_lookup(interface->peer_table,
5051                                                 interface->pending_peer_path);
5052         interface->pending_peer_path = NULL;
5053         if (!peer)
5054                 return;
5055
5056         g_interface = g_hash_table_lookup(interface_table,
5057                                                 data.interface_obj_path);
5058         if (!g_interface)
5059                 return;
5060
5061         group = g_hash_table_lookup(interface->group_table,
5062                                                 data.group_obj_path);
5063         if (group)
5064                 return;
5065
5066         group = g_try_new0(GSupplicantGroup, 1);
5067         if (!group)
5068                 return;
5069
5070         group->interface = g_interface;
5071         group->orig_interface = interface;
5072         group->path = g_strdup(data.group_obj_path);
5073         group->role = data.role;
5074
5075         g_hash_table_insert(interface->group_table, group->path, group);
5076         g_hash_table_replace(group_mapping, group->path, group);
5077
5078         peer->current_group_iface = g_interface;
5079         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_STARTED);
5080 }
5081
5082 static void remove_peer_group_interface(GHashTable *group_table,
5083                                 const char* path)
5084 {
5085         GSupplicantGroup *group;
5086         GHashTableIter iter;
5087         gpointer value, key;
5088
5089         if (!group_table)
5090                 return;
5091
5092         group = g_hash_table_lookup(group_table, path);
5093
5094         if (!group || !group->orig_interface)
5095                 return;
5096
5097         g_hash_table_iter_init(&iter, group->orig_interface->peer_table);
5098
5099         while (g_hash_table_iter_next(&iter, &key, &value)) {
5100                 GSupplicantPeer *peer = value;
5101
5102                 if (peer->current_group_iface == group->interface)
5103                         peer->current_group_iface = NULL;
5104         }
5105 }
5106
5107 static void signal_group_finished(const char *path, DBusMessageIter *iter)
5108 {
5109         GSupplicantInterface *interface;
5110         struct group_sig_data data = {};
5111
5112         SUPPLICANT_DBG("");
5113
5114         interface = g_hash_table_lookup(interface_table, path);
5115         if (!interface)
5116                 return;
5117
5118         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
5119         if (!data.interface_obj_path || !data.group_obj_path)
5120                 return;
5121
5122         remove_peer_group_interface(interface->group_table, data.group_obj_path);
5123
5124         g_hash_table_remove(group_mapping, data.group_obj_path);
5125
5126         g_hash_table_remove(interface->group_table, data.group_obj_path);
5127 }
5128
5129 static void signal_group_request(const char *path, DBusMessageIter *iter)
5130 {
5131         GSupplicantInterface *interface;
5132         GSupplicantPeer *peer;
5133         const char *obj_path;
5134
5135         SUPPLICANT_DBG("");
5136
5137         interface = g_hash_table_lookup(interface_table, path);
5138         if (!interface)
5139                 return;
5140
5141         dbus_message_iter_get_basic(iter, &obj_path);
5142         if (!obj_path || !g_strcmp0(obj_path, "/"))
5143                 return;
5144
5145         peer = g_hash_table_lookup(interface->peer_table, obj_path);
5146         if (!peer)
5147                 return;
5148
5149         /*
5150          * Peer has been previously found and property set,
5151          * otherwise, defer connection to when peer property
5152          * is set.
5153          */
5154         if (peer->identifier)
5155                 callback_peer_request(peer);
5156         else
5157                 g_hash_table_replace(pending_peer_connection, peer->path, peer);
5158 }
5159
5160 static void signal_group_peer_joined(const char *path, DBusMessageIter *iter)
5161 {
5162         const char *peer_path = NULL;
5163         GSupplicantInterface *interface;
5164         GSupplicantGroup *group;
5165         GSupplicantPeer *peer;
5166
5167         SUPPLICANT_DBG("");
5168
5169         group = g_hash_table_lookup(group_mapping, path);
5170         if (!group)
5171                 return;
5172
5173         dbus_message_iter_get_basic(iter, &peer_path);
5174         if (!peer_path)
5175                 return;
5176
5177         interface = g_hash_table_lookup(peer_mapping, peer_path);
5178         if (!interface)
5179                 return;
5180
5181         peer = g_hash_table_lookup(interface->peer_table, peer_path);
5182         if (!peer)
5183                 return;
5184
5185         group->members = g_slist_prepend(group->members, g_strdup(peer_path));
5186
5187         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_JOINED);
5188 }
5189
5190 static void signal_group_peer_disconnected(const char *path, DBusMessageIter *iter)
5191 {
5192         const char *peer_path = NULL;
5193         GSupplicantInterface *interface;
5194         GSupplicantGroup *group;
5195         GSupplicantPeer *peer;
5196         GSList *elem;
5197
5198         SUPPLICANT_DBG("");
5199
5200         group = g_hash_table_lookup(group_mapping, path);
5201         if (!group)
5202                 return;
5203
5204         dbus_message_iter_get_basic(iter, &peer_path);
5205         if (!peer_path)
5206                 return;
5207
5208         for (elem = group->members; elem; elem = elem->next) {
5209                 if (!g_strcmp0(elem->data, peer_path))
5210                         break;
5211         }
5212
5213         if (!elem)
5214                 return;
5215
5216         g_free(elem->data);
5217         group->members = g_slist_delete_link(group->members, elem);
5218
5219         interface = g_hash_table_lookup(peer_mapping, peer_path);
5220         if (!interface)
5221                 return;
5222
5223         peer = g_hash_table_lookup(interface->peer_table, peer_path);
5224         if (!peer)
5225                 return;
5226
5227         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_DISCONNECTED);
5228         peer->connection_requested = false;
5229 }
5230
5231 #if defined TIZEN_EXT_WIFI_MESH
5232 const void *g_supplicant_interface_get_mesh_group_ssid(
5233                                                         GSupplicantInterface *interface,
5234                                                         unsigned int *ssid_len)
5235 {
5236         if (!ssid_len)
5237                 return NULL;
5238
5239         if (!interface || interface->group_info.ssid_len == 0) {
5240                 *ssid_len = 0;
5241                 return NULL;
5242         }
5243
5244         *ssid_len = interface->group_info.ssid_len;
5245         return interface->group_info.ssid;
5246 }
5247
5248 int g_supplicant_mesh_get_disconnect_reason(GSupplicantInterface *interface)
5249 {
5250         if (!interface)
5251                 return -EINVAL;
5252
5253         return interface->group_info.disconnect_reason;
5254 }
5255
5256 const char *g_supplicant_mesh_peer_get_address(GSupplicantMeshPeer *mesh_peer)
5257 {
5258         if (!mesh_peer || !mesh_peer->peer_address)
5259                 return NULL;
5260
5261         return mesh_peer->peer_address;
5262 }
5263
5264 int g_supplicant_mesh_peer_get_disconnect_reason(GSupplicantMeshPeer *mesh_peer)
5265 {
5266         if (!mesh_peer)
5267                 return -EINVAL;
5268
5269         return mesh_peer->disconnect_reason;
5270 }
5271
5272 static void callback_mesh_group_started(GSupplicantInterface *interface)
5273 {
5274         if (!callbacks_pointer)
5275                 return;
5276
5277         if (!callbacks_pointer->mesh_group_started)
5278                 return;
5279
5280         callbacks_pointer->mesh_group_started(interface);
5281 }
5282
5283 static void callback_mesh_group_removed(GSupplicantInterface *interface)
5284 {
5285         if (!callbacks_pointer)
5286                 return;
5287
5288         if (!callbacks_pointer->mesh_group_removed)
5289                 return;
5290
5291         callbacks_pointer->mesh_group_removed(interface);
5292 }
5293
5294 static void mesh_group_info(const char *key, DBusMessageIter *iter,
5295                                                         void *user_data)
5296 {
5297         GSupplicantInterface *interface = user_data;
5298         if (!key)
5299                 return;
5300
5301         if (g_strcmp0(key, "SSID") == 0) {
5302                 DBusMessageIter array;
5303                 unsigned char *ssid;
5304                 int ssid_len;
5305
5306                 dbus_message_iter_recurse(iter, &array);
5307                 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
5308
5309                 if (ssid_len > 0 && ssid_len < 33) {
5310                         memcpy(interface->group_info.ssid, ssid, ssid_len);
5311                         interface->group_info.ssid_len = ssid_len;
5312                 } else {
5313                         memset(interface->group_info.ssid, 0, 32);
5314                         interface->group_info.ssid_len = 0;
5315                 }
5316         } else if (g_strcmp0(key, "DisconnectReason") == 0) {
5317                 int disconnect_reason = 0;
5318                 dbus_message_iter_get_basic(iter, &disconnect_reason);
5319                 interface->group_info.disconnect_reason = disconnect_reason;
5320         }
5321 }
5322
5323 static void signal_mesh_group_started(const char *path, DBusMessageIter *iter)
5324 {
5325         GSupplicantInterface *interface;
5326
5327         interface = g_hash_table_lookup(interface_table, path);
5328         if (!interface)
5329                 return;
5330
5331         supplicant_dbus_property_foreach(iter, mesh_group_info, interface);
5332
5333         callback_mesh_group_started(interface);
5334 }
5335
5336 static void signal_mesh_group_removed(const char *path, DBusMessageIter *iter)
5337 {
5338         GSupplicantInterface *interface;
5339
5340         interface = g_hash_table_lookup(interface_table, path);
5341         if (!interface)
5342                 return;
5343
5344         supplicant_dbus_property_foreach(iter, mesh_group_info, interface);
5345
5346         callback_mesh_group_removed(interface);
5347 }
5348
5349 static void callback_mesh_peer_connected(GSupplicantMeshPeer *mesh_peer)
5350 {
5351         if (!callbacks_pointer)
5352                 return;
5353
5354         if (!callbacks_pointer->mesh_peer_connected)
5355                 return;
5356
5357         callbacks_pointer->mesh_peer_connected(mesh_peer);
5358 }
5359
5360 static void callback_mesh_peer_disconnected(GSupplicantMeshPeer *mesh_peer)
5361 {
5362         if (!callbacks_pointer)
5363                 return;
5364
5365         if (!callbacks_pointer->mesh_peer_disconnected)
5366                 return;
5367
5368         callbacks_pointer->mesh_peer_disconnected(mesh_peer);
5369 }
5370
5371 static void mesh_peer_info(const char *key, DBusMessageIter *iter,
5372                                                         void *user_data)
5373 {
5374         GSupplicantMeshPeer *mesh_peer = user_data;
5375         if (!key)
5376                 return;
5377
5378         if (g_strcmp0(key, "PeerAddress") == 0) {
5379                 DBusMessageIter array;
5380                 unsigned char *addr;
5381                 int addr_len;
5382
5383                 dbus_message_iter_recurse(iter, &array);
5384                 dbus_message_iter_get_fixed_array(&array, &addr, &addr_len);
5385
5386                 if (addr_len == 6) {
5387                         mesh_peer->peer_address = g_malloc0(19);
5388                         snprintf(mesh_peer->peer_address, 19,
5389                                          "%02x:%02x:%02x:%02x:%02x:%02x", addr[0], addr[1],
5390                                          addr[2], addr[3], addr[4], addr[5]);
5391                 }
5392         } else if (g_strcmp0(key, "DisconnectReason") == 0) {
5393                 int disconnect_reason = 0;
5394                 dbus_message_iter_get_basic(iter, &disconnect_reason);
5395                 mesh_peer->disconnect_reason = disconnect_reason;
5396         }
5397 }
5398
5399 static void signal_mesh_peer_connected(const char *path, DBusMessageIter *iter)
5400 {
5401         GSupplicantInterface *interface;
5402         GSupplicantMeshPeer *mesh_peer;
5403
5404         interface = g_hash_table_lookup(interface_table, path);
5405         if (!interface)
5406                 return;
5407
5408         mesh_peer = dbus_malloc0(sizeof(GSupplicantMeshPeer));
5409         mesh_peer->interface = interface;
5410
5411         supplicant_dbus_property_foreach(iter, mesh_peer_info, mesh_peer);
5412
5413         callback_mesh_peer_connected(mesh_peer);
5414         g_free(mesh_peer->peer_address);
5415         g_free(mesh_peer);
5416 }
5417
5418 static void signal_mesh_peer_disconnected(const char *path,
5419                                                                 DBusMessageIter *iter)
5420 {
5421         GSupplicantInterface *interface;
5422         GSupplicantMeshPeer *mesh_peer;
5423
5424         interface = g_hash_table_lookup(interface_table, path);
5425         if (!interface)
5426                 return;
5427
5428         mesh_peer = dbus_malloc0(sizeof(GSupplicantMeshPeer));
5429         mesh_peer->interface = interface;
5430
5431         supplicant_dbus_property_foreach(iter, mesh_peer_info, mesh_peer);
5432
5433         callback_mesh_peer_disconnected(mesh_peer);
5434         g_free(mesh_peer->peer_address);
5435         g_free(mesh_peer);
5436 }
5437 #endif
5438
5439 static struct {
5440         const char *interface;
5441         const char *member;
5442         void (*function) (const char *path, DBusMessageIter *iter);
5443 } signal_map[] = {
5444         { DBUS_INTERFACE_DBUS,  "NameOwnerChanged",  signal_name_owner_changed },
5445
5446         { SUPPLICANT_INTERFACE, "PropertiesChanged", signal_properties_changed },
5447         { SUPPLICANT_INTERFACE, "InterfaceAdded",    signal_interface_added    },
5448         { SUPPLICANT_INTERFACE, "InterfaceCreated",  signal_interface_added    },
5449         { SUPPLICANT_INTERFACE, "InterfaceRemoved",  signal_interface_removed  },
5450
5451         { SUPPLICANT_INTERFACE ".Interface", "PropertiesChanged", signal_interface_changed },
5452         { SUPPLICANT_INTERFACE ".Interface", "ScanDone",          signal_scan_done         },
5453         { SUPPLICANT_INTERFACE ".Interface", "BSSAdded",          signal_bss_added         },
5454         { SUPPLICANT_INTERFACE ".Interface", "BSSRemoved",        signal_bss_removed       },
5455         { SUPPLICANT_INTERFACE ".Interface", "NetworkAdded",      signal_network_added     },
5456         { SUPPLICANT_INTERFACE ".Interface", "NetworkRemoved",    signal_network_removed   },
5457         { SUPPLICANT_INTERFACE ".Interface", "StaAuthorized",     signal_sta_authorized    },
5458         { SUPPLICANT_INTERFACE ".Interface", "StaDeauthorized",   signal_sta_deauthorized  },
5459
5460         { SUPPLICANT_INTERFACE ".BSS", "PropertiesChanged", signal_bss_changed   },
5461
5462         { SUPPLICANT_INTERFACE ".Interface.WPS", "Credentials", signal_wps_credentials },
5463         { SUPPLICANT_INTERFACE ".Interface.WPS", "Event",       signal_wps_event       },
5464 #if defined TIZEN_EXT
5465         { "org.tizen.system.deviced.PowerOff", "ChangeState", signal_power_off },
5466 #endif
5467
5468         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeviceFound", signal_peer_found },
5469         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeviceLost",  signal_peer_lost  },
5470
5471         { SUPPLICANT_INTERFACE ".Peer", "PropertiesChanged", signal_peer_changed },
5472
5473         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationSuccess", signal_group_success },
5474         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationFailure", signal_group_failure },
5475         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GroupStarted", signal_group_started },
5476         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GroupFinished", signal_group_finished },
5477         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationRequest", signal_group_request },
5478
5479         { SUPPLICANT_INTERFACE ".Group", "PeerJoined", signal_group_peer_joined },
5480         { SUPPLICANT_INTERFACE ".Group", "PeerDisconnected", signal_group_peer_disconnected },
5481 #if defined TIZEN_EXT_WIFI_MESH
5482         { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshGroupStarted",
5483                 signal_mesh_group_started },
5484         { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshGroupRemoved",
5485                 signal_mesh_group_removed },
5486         { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshPeerConnected",
5487                 signal_mesh_peer_connected },
5488         { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshPeerDisconnected",
5489                 signal_mesh_peer_disconnected },
5490 #endif
5491
5492 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
5493         { SUPPLICANT_INTERFACE ".Interface", "EAP", signal_eap },
5494 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
5495
5496         { }
5497 };
5498
5499 static DBusHandlerResult g_supplicant_filter(DBusConnection *conn,
5500                                         DBusMessage *message, void *data)
5501 {
5502         DBusMessageIter iter;
5503         const char *path;
5504         int i;
5505
5506         path = dbus_message_get_path(message);
5507         if (!path)
5508                 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
5509
5510         if (!dbus_message_iter_init(message, &iter))
5511                 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
5512
5513         for (i = 0; signal_map[i].interface; i++) {
5514                 if (!dbus_message_has_interface(message, signal_map[i].interface))
5515                         continue;
5516
5517                 if (!dbus_message_has_member(message, signal_map[i].member))
5518                         continue;
5519
5520                 signal_map[i].function(path, &iter);
5521                 break;
5522         }
5523
5524         return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
5525 }
5526
5527 void g_supplicant_interface_cancel(GSupplicantInterface *interface)
5528 {
5529         SUPPLICANT_DBG("Cancelling any pending DBus calls");
5530         supplicant_dbus_method_call_cancel_all(interface);
5531         supplicant_dbus_property_call_cancel_all(interface);
5532 }
5533
5534 struct supplicant_regdom {
5535         GSupplicantCountryCallback callback;
5536         const char *alpha2;
5537         const void *user_data;
5538 };
5539
5540 static void country_result(const char *error,
5541                                 DBusMessageIter *iter, void *user_data)
5542 {
5543         struct supplicant_regdom *regdom = user_data;
5544         int result = 0;
5545
5546         SUPPLICANT_DBG("Country setting result");
5547
5548         if (!user_data)
5549                 return;
5550
5551         if (error) {
5552                 SUPPLICANT_DBG("Country setting failure %s", error);
5553                 result = -EINVAL;
5554         }
5555
5556         if (regdom->callback)
5557                 regdom->callback(result, regdom->alpha2,
5558                                         (void *) regdom->user_data);
5559
5560         g_free(regdom);
5561 }
5562
5563 static void country_params(DBusMessageIter *iter, void *user_data)
5564 {
5565         struct supplicant_regdom *regdom = user_data;
5566
5567         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING,
5568                                                         &regdom->alpha2);
5569 }
5570
5571 int g_supplicant_set_country(const char *alpha2,
5572                                 GSupplicantCountryCallback callback,
5573                                         const void *user_data)
5574 {
5575         struct supplicant_regdom *regdom;
5576         int ret;
5577
5578         SUPPLICANT_DBG("Country setting %s", alpha2);
5579
5580         if (!system_available)
5581                 return -EFAULT;
5582
5583         regdom = dbus_malloc0(sizeof(*regdom));
5584         if (!regdom)
5585                 return -ENOMEM;
5586
5587         regdom->callback = callback;
5588         regdom->alpha2 = alpha2;
5589         regdom->user_data = user_data;
5590
5591         ret =  supplicant_dbus_property_set(SUPPLICANT_PATH, SUPPLICANT_INTERFACE,
5592                                         "Country", DBUS_TYPE_STRING_AS_STRING,
5593                                         country_params, country_result,
5594                                         regdom, NULL);
5595         if (ret < 0) {
5596                 dbus_free(regdom);
5597                 SUPPLICANT_DBG("Unable to set Country configuration");
5598         }
5599         return ret;
5600 }
5601
5602 int g_supplicant_interface_set_country(GSupplicantInterface *interface,
5603                                         GSupplicantCountryCallback callback,
5604                                                         const char *alpha2,
5605                                                         void *user_data)
5606 {
5607         struct supplicant_regdom *regdom;
5608         int ret;
5609
5610         regdom = dbus_malloc0(sizeof(*regdom));
5611         if (!regdom)
5612                 return -ENOMEM;
5613
5614         regdom->callback = callback;
5615         regdom->alpha2 = alpha2;
5616         regdom->user_data = user_data;
5617
5618         ret =  supplicant_dbus_property_set(interface->path,
5619                                 SUPPLICANT_INTERFACE ".Interface",
5620                                 "Country", DBUS_TYPE_STRING_AS_STRING,
5621                                 country_params, country_result,
5622                                         regdom, NULL);
5623         if (ret < 0) {
5624                 dbus_free(regdom);
5625                 SUPPLICANT_DBG("Unable to set Country configuration");
5626         }
5627
5628         return ret;
5629 }
5630
5631 bool g_supplicant_interface_has_p2p(GSupplicantInterface *interface)
5632 {
5633         if (!interface)
5634                 return false;
5635
5636         return interface->p2p_support;
5637 }
5638
5639 struct supplicant_p2p_dev_config {
5640         char *device_name;
5641         char *dev_type;
5642 };
5643
5644 static void p2p_device_config_result(const char *error,
5645                                         DBusMessageIter *iter, void *user_data)
5646 {
5647         struct supplicant_p2p_dev_config *config = user_data;
5648
5649         if (error)
5650                 SUPPLICANT_DBG("Unable to set P2P Device configuration: %s",
5651                                                                         error);
5652
5653         g_free(config->device_name);
5654         g_free(config->dev_type);
5655         dbus_free(config);
5656 }
5657
5658 static int dev_type_str2bin(const char *type, unsigned char dev_type[8])
5659 {
5660         int length, pos, end;
5661         char b[3] = {};
5662         char *e = NULL;
5663
5664         end = strlen(type);
5665         for (length = pos = 0; type[pos] != '\0' && length < 8; length++) {
5666                 if (pos+2 > end)
5667                         return 0;
5668
5669                 b[0] = type[pos];
5670                 b[1] = type[pos+1];
5671
5672                 dev_type[length] = strtol(b, &e, 16);
5673                 if (e && *e != '\0')
5674                         return 0;
5675
5676                 pos += 2;
5677         }
5678
5679         return 8;
5680 }
5681
5682 static void p2p_device_config_params(DBusMessageIter *iter, void *user_data)
5683 {
5684         struct supplicant_p2p_dev_config *config = user_data;
5685         DBusMessageIter dict;
5686
5687         supplicant_dbus_dict_open(iter, &dict);
5688
5689         supplicant_dbus_dict_append_basic(&dict, "DeviceName",
5690                                 DBUS_TYPE_STRING, &config->device_name);
5691
5692         if (config->dev_type) {
5693                 unsigned char dev_type[8] = {}, *type;
5694                 int len;
5695
5696                 len = dev_type_str2bin(config->dev_type, dev_type);
5697                 if (len) {
5698                         type = dev_type;
5699                         supplicant_dbus_dict_append_fixed_array(&dict,
5700                                         "PrimaryDeviceType",
5701                                         DBUS_TYPE_BYTE, &type, len);
5702                 }
5703         }
5704
5705         supplicant_dbus_dict_close(iter, &dict);
5706 }
5707
5708 int g_supplicant_interface_set_p2p_device_config(GSupplicantInterface *interface,
5709                                         const char *device_name,
5710                                         const char *primary_dev_type)
5711 {
5712         struct supplicant_p2p_dev_config *config;
5713         int ret;
5714
5715         SUPPLICANT_DBG("P2P Device settings %s/%s",
5716                                         device_name, primary_dev_type);
5717
5718         config = dbus_malloc0(sizeof(*config));
5719         if (!config)
5720                 return -ENOMEM;
5721
5722         config->device_name = g_strdup(device_name);
5723         config->dev_type = g_strdup(primary_dev_type);
5724
5725         ret = supplicant_dbus_property_set(interface->path,
5726                                 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
5727                                 "P2PDeviceConfig",
5728                                 DBUS_TYPE_ARRAY_AS_STRING
5729                                 DBUS_DICT_ENTRY_BEGIN_CHAR_AS_STRING
5730                                 DBUS_TYPE_STRING_AS_STRING
5731                                 DBUS_TYPE_VARIANT_AS_STRING
5732                                 DBUS_DICT_ENTRY_END_CHAR_AS_STRING,
5733                                 p2p_device_config_params,
5734                                 p2p_device_config_result, config, NULL);
5735         if (ret < 0) {
5736                 g_free(config->device_name);
5737                 g_free(config->dev_type);
5738                 dbus_free(config);
5739                 SUPPLICANT_DBG("Unable to set P2P Device configuration");
5740         }
5741
5742         return ret;
5743 }
5744
5745 static gboolean peer_lookup_by_identifier(gpointer key, gpointer value,
5746                                                         gpointer user_data)
5747 {
5748         const GSupplicantPeer *peer = value;
5749         const char *identifier = user_data;
5750
5751         if (!g_strcmp0(identifier, peer->identifier))
5752                 return TRUE;
5753
5754         return FALSE;
5755 }
5756
5757 GSupplicantPeer *g_supplicant_interface_peer_lookup(GSupplicantInterface *interface,
5758                                                         const char *identifier)
5759 {
5760         GSupplicantPeer *peer;
5761
5762         peer = g_hash_table_find(interface->peer_table,
5763                                         peer_lookup_by_identifier,
5764                                         (void *) identifier);
5765         return peer;
5766 }
5767
5768 static void interface_create_data_free(struct interface_create_data *data)
5769 {
5770         g_free(data->ifname);
5771         g_free(data->driver);
5772         g_free(data->bridge);
5773 #if defined TIZEN_EXT_WIFI_MESH
5774         g_free(data->parent_ifname);
5775 #endif
5776         dbus_free(data);
5777 }
5778
5779 static bool interface_exists(GSupplicantInterface *interface,
5780                                 const char *path)
5781 {
5782         GSupplicantInterface *tmp;
5783
5784         tmp = g_hash_table_lookup(interface_table, path);
5785         if (tmp && tmp == interface)
5786                 return true;
5787
5788         return false;
5789 }
5790
5791 static void interface_create_property(const char *key, DBusMessageIter *iter,
5792                                                         void *user_data)
5793 {
5794         struct interface_create_data *data = user_data;
5795         GSupplicantInterface *interface = data->interface;
5796
5797         if (!key) {
5798                 if (data->callback) {
5799                         data->callback(0, data->interface, data->user_data);
5800 #if !defined TIZEN_EXT
5801                         callback_p2p_support(interface);
5802 #endif
5803 #if defined TIZEN_EXT_WIFI_MESH
5804                         callback_mesh_support(interface);
5805 #endif
5806                 }
5807
5808                 interface_create_data_free(data);
5809         }
5810
5811         interface_property(key, iter, interface);
5812 }
5813
5814 static void interface_create_result(const char *error,
5815                                 DBusMessageIter *iter, void *user_data)
5816 {
5817         struct interface_create_data *data = user_data;
5818         const char *path = NULL;
5819         int err;
5820
5821         SUPPLICANT_DBG("");
5822
5823         if (error) {
5824                 g_warning("error %s", error);
5825                 err = -EIO;
5826                 goto done;
5827         }
5828
5829         dbus_message_iter_get_basic(iter, &path);
5830         if (!path) {
5831                 err = -EINVAL;
5832                 goto done;
5833         }
5834
5835         if (!system_available) {
5836                 err = -EFAULT;
5837                 goto done;
5838         }
5839
5840         data->interface = g_hash_table_lookup(interface_table, path);
5841         if (!data->interface) {
5842                 data->interface = interface_alloc(path);
5843                 if (!data->interface) {
5844                         err = -ENOMEM;
5845                         goto done;
5846                 }
5847         }
5848
5849         err = supplicant_dbus_property_get_all(path,
5850                                         SUPPLICANT_INTERFACE ".Interface",
5851                                         interface_create_property, data,
5852                                         NULL);
5853         if (err == 0)
5854                 return;
5855
5856 done:
5857         if (data->callback)
5858                 data->callback(err, NULL, data->user_data);
5859
5860         interface_create_data_free(data);
5861 }
5862
5863 static void interface_create_params(DBusMessageIter *iter, void *user_data)
5864 {
5865         struct interface_create_data *data = user_data;
5866         DBusMessageIter dict;
5867         char *config_file = NULL;
5868
5869         SUPPLICANT_DBG("");
5870
5871         supplicant_dbus_dict_open(iter, &dict);
5872
5873         supplicant_dbus_dict_append_basic(&dict, "Ifname",
5874                                         DBUS_TYPE_STRING, &data->ifname);
5875
5876         if (data->driver)
5877                 supplicant_dbus_dict_append_basic(&dict, "Driver",
5878                                         DBUS_TYPE_STRING, &data->driver);
5879
5880         if (data->bridge)
5881                 supplicant_dbus_dict_append_basic(&dict, "BridgeIfname",
5882                                         DBUS_TYPE_STRING, &data->bridge);
5883
5884         config_file = g_hash_table_lookup(config_file_table, data->ifname);
5885         if (config_file) {
5886                 SUPPLICANT_DBG("[%s] ConfigFile %s", data->ifname, config_file);
5887
5888                 supplicant_dbus_dict_append_basic(&dict, "ConfigFile",
5889                                         DBUS_TYPE_STRING, &config_file);
5890         }
5891
5892 #ifdef TIZEN_EXT
5893         if (data->driver && g_strstr_len(data->driver, strlen(data->driver), "nl80211")) {
5894                 supplicant_dbus_dict_append_basic(&dict, "MacAddr",
5895                                 DBUS_TYPE_UINT32, &data->mac_addr);
5896
5897                 supplicant_dbus_dict_append_basic(&dict, "PreassocMacAddr",
5898                                 DBUS_TYPE_UINT32, &data->preassoc_mac_addr);
5899
5900                 supplicant_dbus_dict_append_basic(&dict, "RandAddrLifetime",
5901                                 DBUS_TYPE_UINT32, &data->random_mac_lifetime);
5902         }
5903 #endif /* TIZEN_EXT */
5904
5905 #if defined TIZEN_EXT_WIFI_MESH
5906         if (data->is_mesh_interface) {
5907                 if (data->parent_ifname)
5908                         supplicant_dbus_dict_append_basic(&dict, "ParentIfname",
5909                                         DBUS_TYPE_STRING, &data->parent_ifname);
5910
5911                 supplicant_dbus_dict_append_basic(&dict, "IsMeshInterface",
5912                                         DBUS_TYPE_BOOLEAN, &data->is_mesh_interface);
5913         }
5914 #endif
5915
5916         supplicant_dbus_dict_close(iter, &dict);
5917 }
5918
5919 #if defined TIZEN_EXT
5920 static void interface_get_state(const char *key, DBusMessageIter *iter,
5921                 void *user_data)
5922 {
5923         struct interface_create_data *data = user_data;
5924         GSupplicantInterface *interface = NULL;
5925         const char *str = NULL;
5926
5927         SUPPLICANT_DBG("key[%s]", key);
5928
5929         if (!data) {
5930                 SUPPLICANT_DBG("data is NULL");
5931                 return;
5932         }
5933
5934         interface = data->interface;
5935         if (!interface) {
5936                 SUPPLICANT_DBG("interface is NULL");
5937                 return;
5938         }
5939
5940         if (iter)
5941                 dbus_message_iter_get_basic(iter, &str);
5942
5943         if (str) {
5944                 if (string2state(str) != interface->state)
5945                         interface->state = string2state(str);
5946         }
5947
5948         if (interface->state == G_SUPPLICANT_STATE_DISABLED)
5949                 interface->ready = FALSE;
5950         else
5951                 interface->ready = TRUE;
5952
5953         SUPPLICANT_DBG("state %s (%d)", str, interface->state);
5954
5955         if (data->callback) {
5956                 data->callback(0, interface, data->user_data);
5957 #if defined TIZEN_EXT_WIFI_MESH
5958                 callback_mesh_support(interface);
5959 #endif
5960         }
5961
5962         interface_create_data_free(data);
5963 }
5964 #endif
5965
5966 static void interface_get_result(const char *error,
5967                                 DBusMessageIter *iter, void *user_data)
5968 {
5969         struct interface_create_data *data = user_data;
5970         GSupplicantInterface *interface;
5971         const char *path = NULL;
5972         int err;
5973
5974 #if defined TIZEN_EXT
5975         if (!simplified_log)
5976 #endif
5977         SUPPLICANT_DBG("");
5978
5979         if (error) {
5980                 SUPPLICANT_DBG("Interface not created yet");
5981                 goto create;
5982         }
5983
5984         dbus_message_iter_get_basic(iter, &path);
5985         if (!path) {
5986                 err = -EINVAL;
5987                 goto done;
5988         }
5989
5990         interface = g_hash_table_lookup(interface_table, path);
5991         if (!interface) {
5992                 err = -ENOENT;
5993                 goto done;
5994         }
5995
5996 #if defined TIZEN_EXT
5997         data->interface = interface;
5998         err = supplicant_dbus_property_get(path,
5999                         SUPPLICANT_INTERFACE ".Interface",
6000                         "State", interface_get_state, data, NULL);
6001
6002         if (err == 0)
6003                 return;
6004 #endif
6005
6006         if (data->callback) {
6007                 data->callback(0, interface, data->user_data);
6008 #if !defined TIZEN_EXT
6009                 callback_p2p_support(interface);
6010 #endif
6011 #if defined TIZEN_EXT_WIFI_MESH
6012                 callback_mesh_support(interface);
6013 #endif
6014         }
6015
6016         interface_create_data_free(data);
6017
6018         return;
6019
6020 create:
6021         if (!system_available) {
6022                 err = -EFAULT;
6023                 goto done;
6024         }
6025
6026         SUPPLICANT_DBG("Creating interface");
6027
6028         err = supplicant_dbus_method_call(SUPPLICANT_PATH,
6029                                                 SUPPLICANT_INTERFACE,
6030                                                 "CreateInterface",
6031                                                 interface_create_params,
6032                                                 interface_create_result, data,
6033                                                 NULL);
6034         if (err == 0)
6035                 return;
6036
6037 done:
6038         if (data->callback)
6039                 data->callback(err, NULL, data->user_data);
6040
6041         interface_create_data_free(data);
6042 }
6043
6044 static void interface_get_params(DBusMessageIter *iter, void *user_data)
6045 {
6046         struct interface_create_data *data = user_data;
6047 #if defined TIZEN_EXT
6048         if (!simplified_log)
6049 #endif
6050         SUPPLICANT_DBG("");
6051
6052         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, &data->ifname);
6053 }
6054
6055 #if defined TIZEN_EXT_WIFI_MESH
6056 int g_supplicant_mesh_interface_create(const char *ifname, const char *driver,
6057                                                 const char *bridge, const char *parent_ifname,
6058                                                 GSupplicantInterfaceCallback callback, void *user_data)
6059 {
6060         struct interface_create_data *data;
6061         int ret;
6062
6063         SUPPLICANT_DBG("ifname %s", ifname);
6064
6065         if (!ifname || !parent_ifname)
6066                 return -EINVAL;
6067
6068         if (!system_available)
6069                 return -EFAULT;
6070
6071         data = dbus_malloc0(sizeof(*data));
6072         if (!data)
6073                 return -ENOMEM;
6074
6075         data->ifname = g_strdup(ifname);
6076         data->driver = g_strdup(driver);
6077         data->bridge = g_strdup(bridge);
6078         data->is_mesh_interface = true;
6079         data->parent_ifname = g_strdup(parent_ifname);
6080         data->callback = callback;
6081         data->user_data = user_data;
6082
6083         ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
6084                                                 SUPPLICANT_INTERFACE,
6085                                                 "CreateInterface",
6086                                                 interface_create_params,
6087                                                 interface_create_result, data,
6088                                                 NULL);
6089         return ret;
6090 }
6091
6092 struct interface_mesh_peer_data {
6093         char *peer_address;
6094         char *method;
6095         GSupplicantInterface *interface;
6096         GSupplicantInterfaceCallback callback;
6097         void *user_data;
6098 };
6099
6100 static void interface_mesh_change_peer_params(DBusMessageIter *iter,
6101                                                 void *user_data)
6102 {
6103         struct interface_mesh_peer_data *data = user_data;
6104
6105         SUPPLICANT_DBG("");
6106
6107         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, &data->peer_address);
6108 }
6109
6110 static void interface_mesh_change_peer_result(const char *error,
6111                                 DBusMessageIter *iter, void *user_data)
6112 {
6113         struct interface_mesh_peer_data *data = user_data;
6114         int err = 0;
6115
6116         SUPPLICANT_DBG("%s", data->method);
6117
6118         if (error) {
6119                 err = -EIO;
6120                 SUPPLICANT_DBG("error %s", error);
6121         }
6122
6123         if (data->callback)
6124                 data->callback(err, data->interface, data->user_data);
6125
6126         g_free(data->peer_address);
6127         g_free(data->method);
6128         dbus_free(data);
6129 }
6130
6131 int g_supplicant_interface_mesh_peer_change_status(
6132                                 GSupplicantInterface *interface,
6133                                 GSupplicantInterfaceCallback callback, const char *peer_address,
6134                                 const char *method, void *user_data)
6135 {
6136         struct interface_mesh_peer_data *data;
6137         int ret;
6138
6139         if (!peer_address)
6140                 return -EINVAL;
6141
6142         data = dbus_malloc0(sizeof(*data));
6143         if (!data)
6144                 return -ENOMEM;
6145
6146         data->peer_address = g_strdup(peer_address);
6147         data->method = g_strdup(method);
6148         data->interface = interface;
6149         data->callback = callback;
6150         data->user_data = user_data;
6151
6152         ret = supplicant_dbus_method_call(interface->path,
6153                                                 SUPPLICANT_INTERFACE ".Interface.Mesh",
6154                                                 method, interface_mesh_change_peer_params,
6155                                                 interface_mesh_change_peer_result, data, NULL);
6156         if (ret < 0) {
6157                 g_free(data->peer_address);
6158                 g_free(data->method);
6159                 dbus_free(data);
6160         }
6161
6162         return ret;
6163 }
6164 #endif
6165
6166 int g_supplicant_interface_create(const char *ifname, const char *driver,
6167                                         const char *bridge,
6168 #ifdef TIZEN_EXT
6169                                         unsigned int mac_policy,
6170                                         unsigned int preassoc_mac_policy,
6171                                         unsigned int random_mac_lifetime,
6172 #endif /* TIZEN_EXT */
6173                                         GSupplicantInterfaceCallback callback,
6174                                                         void *user_data)
6175 {
6176         struct interface_create_data *data;
6177         int ret;
6178
6179         SUPPLICANT_DBG("ifname %s", ifname);
6180
6181         if (!ifname)
6182                 return -EINVAL;
6183
6184         if (!system_available)
6185                 return -EFAULT;
6186
6187         data = dbus_malloc0(sizeof(*data));
6188         if (!data)
6189                 return -ENOMEM;
6190
6191         data->ifname = g_strdup(ifname);
6192         data->driver = g_strdup(driver);
6193         data->bridge = g_strdup(bridge);
6194         data->callback = callback;
6195 #ifdef TIZEN_EXT
6196         data->mac_addr = mac_policy;
6197         data->preassoc_mac_addr = preassoc_mac_policy;
6198         data->random_mac_lifetime = random_mac_lifetime;
6199 #endif /* TIZEN_EXT */
6200         data->user_data = user_data;
6201
6202         ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
6203                                                 SUPPLICANT_INTERFACE,
6204                                                 "GetInterface",
6205                                                 interface_get_params,
6206                                                 interface_get_result, data,
6207                                                 NULL);
6208         if (ret < 0)
6209                 interface_create_data_free(data);
6210
6211         return ret;
6212 }
6213
6214 static void interface_remove_result(const char *error,
6215                                 DBusMessageIter *iter, void *user_data)
6216 {
6217         struct interface_data *data = user_data;
6218         int err;
6219
6220         if (error) {
6221                 err = -EIO;
6222                 SUPPLICANT_DBG("error: %s", error);
6223                 goto done;
6224         }
6225
6226         if (!system_available) {
6227                 err = -EFAULT;
6228                 goto done;
6229         }
6230
6231         /*
6232          * The gsupplicant interface is already freed by the InterfaceRemoved
6233          * signal callback. Simply invoke the interface_data callback.
6234          */
6235         err = 0;
6236
6237 done:
6238         g_free(data->path);
6239
6240         if (data->callback)
6241                 data->callback(err, NULL, data->user_data);
6242
6243         dbus_free(data);
6244 }
6245
6246
6247 static void interface_remove_params(DBusMessageIter *iter, void *user_data)
6248 {
6249         struct interface_data *data = user_data;
6250
6251         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
6252                                                         &data->interface->path);
6253 }
6254
6255 int g_supplicant_interface_remove(GSupplicantInterface *interface,
6256                         GSupplicantInterfaceCallback callback,
6257                                                         void *user_data)
6258 {
6259         struct interface_data *data;
6260         int ret;
6261
6262         if (!interface)
6263                 return -EINVAL;
6264
6265         if (!system_available)
6266                 return -EFAULT;
6267
6268         g_supplicant_interface_cancel(interface);
6269
6270         data = dbus_malloc0(sizeof(*data));
6271         if (!data)
6272                 return -ENOMEM;
6273
6274         data->interface = interface;
6275         data->path = g_strdup(interface->path);
6276         data->callback = callback;
6277         data->user_data = user_data;
6278
6279         ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
6280                                                 SUPPLICANT_INTERFACE,
6281                                                 "RemoveInterface",
6282                                                 interface_remove_params,
6283                                                 interface_remove_result, data,
6284                                                 NULL);
6285         if (ret < 0) {
6286                 g_free(data->path);
6287                 dbus_free(data);
6288         }
6289         return ret;
6290 }
6291
6292 static void interface_scan_result(const char *error,
6293                                 DBusMessageIter *iter, void *user_data)
6294 {
6295         struct interface_scan_data *data = user_data;
6296         int err = 0;
6297
6298         if (error) {
6299                 SUPPLICANT_DBG("error %s", error);
6300                 err = -EIO;
6301         }
6302
6303         /* A non ready interface cannot send/receive anything */
6304         if (interface_exists(data->interface, data->path)) {
6305                 if (!data->interface->ready)
6306                         err = -ENOLINK;
6307         }
6308
6309         g_free(data->path);
6310
6311         if (err != 0) {
6312                 if (data->callback)
6313                         data->callback(err, data->interface, data->user_data);
6314         } else {
6315                 data->interface->scan_callback = data->callback;
6316                 data->interface->scan_data = data->user_data;
6317         }
6318
6319         if (data->scan_params)
6320                 g_supplicant_free_scan_params(data->scan_params);
6321
6322         dbus_free(data);
6323 }
6324
6325 static void add_scan_frequency(DBusMessageIter *iter, unsigned int freq)
6326 {
6327         DBusMessageIter data;
6328         unsigned int width = 0; /* Not used by wpa_supplicant atm */
6329
6330         dbus_message_iter_open_container(iter, DBUS_TYPE_STRUCT, NULL, &data);
6331
6332         dbus_message_iter_append_basic(&data, DBUS_TYPE_UINT32, &freq);
6333         dbus_message_iter_append_basic(&data, DBUS_TYPE_UINT32, &width);
6334
6335         dbus_message_iter_close_container(iter, &data);
6336 }
6337
6338 static void add_scan_frequencies(DBusMessageIter *iter,
6339                                                 void *user_data)
6340 {
6341         GSupplicantScanParams *scan_data = user_data;
6342         unsigned int freq;
6343         int i;
6344
6345         for (i = 0; i < scan_data->num_freqs; i++) {
6346                 freq = scan_data->freqs[i];
6347                 if (!freq)
6348                         break;
6349
6350                 add_scan_frequency(iter, freq);
6351         }
6352 }
6353
6354 static void append_ssid(DBusMessageIter *iter,
6355                         const void *ssid, unsigned int len)
6356 {
6357         DBusMessageIter array;
6358
6359         dbus_message_iter_open_container(iter, DBUS_TYPE_ARRAY,
6360         DBUS_TYPE_BYTE_AS_STRING, &array);
6361
6362         dbus_message_iter_append_fixed_array(&array, DBUS_TYPE_BYTE,
6363                                                                 &ssid, len);
6364         dbus_message_iter_close_container(iter, &array);
6365 }
6366
6367 static void append_ssids(DBusMessageIter *iter, void *user_data)
6368 {
6369         GSupplicantScanParams *scan_data = user_data;
6370         GSList *list;
6371
6372         for (list = scan_data->ssids; list; list = list->next) {
6373                 struct scan_ssid *scan_ssid = list->data;
6374
6375                 append_ssid(iter, scan_ssid->ssid, scan_ssid->ssid_len);
6376         }
6377 }
6378
6379 static void supplicant_add_scan_frequency(DBusMessageIter *dict,
6380                 supplicant_dbus_array_function function,
6381                                         void *user_data)
6382 {
6383         GSupplicantScanParams *scan_params = user_data;
6384         DBusMessageIter entry, value, array;
6385         const char *key = "Channels";
6386
6387         if (scan_params->freqs && scan_params->freqs[0] != 0) {
6388                 dbus_message_iter_open_container(dict, DBUS_TYPE_DICT_ENTRY,
6389                                                 NULL, &entry);
6390
6391                 dbus_message_iter_append_basic(&entry, DBUS_TYPE_STRING, &key);
6392
6393                 dbus_message_iter_open_container(&entry, DBUS_TYPE_VARIANT,
6394                                         DBUS_TYPE_ARRAY_AS_STRING
6395                                         DBUS_STRUCT_BEGIN_CHAR_AS_STRING
6396                                         DBUS_TYPE_UINT32_AS_STRING
6397                                         DBUS_TYPE_UINT32_AS_STRING
6398                                         DBUS_STRUCT_END_CHAR_AS_STRING,
6399                                         &value);
6400
6401                 dbus_message_iter_open_container(&value, DBUS_TYPE_ARRAY,
6402                                         DBUS_STRUCT_BEGIN_CHAR_AS_STRING
6403                                         DBUS_TYPE_UINT32_AS_STRING
6404                                         DBUS_TYPE_UINT32_AS_STRING
6405                                         DBUS_STRUCT_END_CHAR_AS_STRING,
6406                                         &array);
6407
6408                 if (function)
6409                         function(&array, user_data);
6410
6411                 dbus_message_iter_close_container(&value, &array);
6412                 dbus_message_iter_close_container(&entry, &value);
6413                 dbus_message_iter_close_container(dict, &entry);
6414         }
6415 }
6416
6417 static void interface_scan_params(DBusMessageIter *iter, void *user_data)
6418 {
6419         DBusMessageIter dict;
6420         const char *type = "passive";
6421         struct interface_scan_data *data = user_data;
6422
6423         supplicant_dbus_dict_open(iter, &dict);
6424
6425         if (data && data->scan_params) {
6426                 type = "active";
6427
6428                 supplicant_dbus_dict_append_basic(&dict, "Type",
6429                                         DBUS_TYPE_STRING, &type);
6430
6431 #if defined TIZEN_EXT
6432                 SUPPLICANT_DBG("[specific_scan] num_ssids %d",
6433                                data->scan_params->num_ssids);
6434 #endif
6435
6436                 if (data->scan_params->ssids) {
6437                         supplicant_dbus_dict_append_array(&dict, "SSIDs",
6438                                                         DBUS_TYPE_STRING,
6439                                                         append_ssids,
6440                                                         data->scan_params);
6441                 }
6442                 supplicant_add_scan_frequency(&dict, add_scan_frequencies,
6443                                                 data->scan_params);
6444         } else
6445                 supplicant_dbus_dict_append_basic(&dict, "Type",
6446                                         DBUS_TYPE_STRING, &type);
6447
6448         supplicant_dbus_dict_close(iter, &dict);
6449 }
6450
6451 static int interface_ready_to_scan(GSupplicantInterface *interface)
6452 {
6453         if (!interface)
6454                 return -EINVAL;
6455
6456         if (!system_available)
6457                 return -EFAULT;
6458
6459         if (interface->scanning)
6460                 return -EALREADY;
6461
6462         switch (interface->state) {
6463         case G_SUPPLICANT_STATE_AUTHENTICATING:
6464         case G_SUPPLICANT_STATE_ASSOCIATING:
6465         case G_SUPPLICANT_STATE_ASSOCIATED:
6466         case G_SUPPLICANT_STATE_4WAY_HANDSHAKE:
6467         case G_SUPPLICANT_STATE_GROUP_HANDSHAKE:
6468                 return -EBUSY;
6469 #if defined TIZEN_EXT
6470         case G_SUPPLICANT_STATE_DISABLED:
6471                 return -ENOLINK;
6472         case G_SUPPLICANT_STATE_UNKNOWN:
6473 #else
6474         case G_SUPPLICANT_STATE_UNKNOWN:
6475         case G_SUPPLICANT_STATE_DISABLED:
6476 #endif
6477         case G_SUPPLICANT_STATE_DISCONNECTED:
6478         case G_SUPPLICANT_STATE_INACTIVE:
6479         case G_SUPPLICANT_STATE_SCANNING:
6480         case G_SUPPLICANT_STATE_COMPLETED:
6481                 break;
6482         }
6483
6484         return 0;
6485 }
6486
6487 #if defined TIZEN_EXT_WIFI_MESH
6488 static void interface_abort_scan_result(const char *error,
6489                                 DBusMessageIter *iter, void *user_data)
6490 {
6491         struct interface_scan_data *data = user_data;
6492         int err = 0;
6493
6494         if (error) {
6495                 SUPPLICANT_DBG("error %s", error);
6496                 err = -EIO;
6497         }
6498
6499         g_free(data->path);
6500
6501                 if (data->callback)
6502                         data->callback(err, data->interface, data->user_data);
6503
6504         dbus_free(data);
6505 }
6506
6507 int g_supplicant_interface_abort_scan(GSupplicantInterface *interface,
6508                                 GSupplicantInterfaceCallback callback, void *user_data)
6509 {
6510         struct interface_scan_data *data;
6511         int ret;
6512
6513         if (!interface->scanning)
6514                 return -EEXIST;
6515
6516         data = dbus_malloc0(sizeof(*data));
6517         if (!data)
6518                 return -ENOMEM;
6519
6520         data->interface = interface;
6521         data->path = g_strdup(interface->path);
6522         data->callback = callback;
6523         data->user_data = user_data;
6524
6525         ret = supplicant_dbus_method_call(interface->path,
6526                         SUPPLICANT_INTERFACE ".Interface", "AbortScan", NULL,
6527                         interface_abort_scan_result, data, interface);
6528
6529         if (ret < 0) {
6530                 g_free(data->path);
6531                 dbus_free(data);
6532         }
6533
6534         return ret;
6535 }
6536 #endif
6537
6538 int g_supplicant_interface_scan(GSupplicantInterface *interface,
6539                                 GSupplicantScanParams *scan_data,
6540                                 GSupplicantInterfaceCallback callback,
6541                                                         void *user_data)
6542 {
6543         struct interface_scan_data *data;
6544         int ret;
6545
6546         ret = interface_ready_to_scan(interface);
6547         if (ret)
6548                 return ret;
6549
6550         data = dbus_malloc0(sizeof(*data));
6551         if (!data)
6552                 return -ENOMEM;
6553
6554         data->interface = interface;
6555         data->path = g_strdup(interface->path);
6556 #if defined TIZEN_EXT
6557         data->interface->scan_callback = data->callback = callback;
6558         data->interface->scan_data = data->user_data = user_data;
6559 #else
6560         data->callback = callback;
6561         data->user_data = user_data;
6562 #endif
6563         data->scan_params = scan_data;
6564
6565         interface->scan_callback = callback;
6566         interface->scan_data = user_data;
6567
6568         ret = supplicant_dbus_method_call(interface->path,
6569                         SUPPLICANT_INTERFACE ".Interface", "Scan",
6570                         interface_scan_params, interface_scan_result, data,
6571                         interface);
6572
6573         if (ret < 0) {
6574                 g_free(data->path);
6575                 dbus_free(data);
6576         }
6577
6578         return ret;
6579 }
6580
6581 #if defined TIZEN_EXT
6582 static void interface_signalpoll_result(const char *error,
6583                                 DBusMessageIter *iter, void *user_data)
6584 {
6585         struct interface_signalpoll_data *data = user_data;
6586         int err = 0;
6587         dbus_int32_t maxspeed = 0;
6588         dbus_int32_t strength = 0;
6589         dbus_int32_t snr = 0;
6590         DBusMessageIter sub_iter, dict;
6591
6592         if (error) {
6593                 err = -EIO;
6594                 SUPPLICANT_DBG("error: %s", error);
6595                 goto out;
6596         }
6597
6598         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_VARIANT) {
6599                 err = -EINVAL;
6600                 SUPPLICANT_DBG("invalid reply");
6601                 goto out;
6602         }
6603
6604         dbus_message_iter_recurse(iter, &sub_iter);
6605         dbus_message_iter_recurse(&sub_iter, &dict);
6606
6607         while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_DICT_ENTRY) {
6608                 DBusMessageIter entry, value;
6609                 const char *key;
6610
6611                 dbus_message_iter_recurse(&dict, &entry);
6612                 dbus_message_iter_get_basic(&entry, &key);
6613                 dbus_message_iter_next(&entry);
6614                 dbus_message_iter_recurse(&entry, &value);
6615
6616                 switch (dbus_message_iter_get_arg_type(&value)) {
6617                 case DBUS_TYPE_INT32:
6618                         if (g_strcmp0(key, "linkspeed") == 0) {
6619                                 dbus_message_iter_get_basic(&value, &maxspeed);
6620                                 SUPPLICANT_DBG("linkspeed = %d", maxspeed);
6621                                 break;
6622                         } else if (g_strcmp0(key, "rssi") == 0) {
6623                                 dbus_message_iter_get_basic(&value, &strength);
6624                                 SUPPLICANT_DBG("Strength = %d", strength);
6625                                 break;
6626                         } else if (g_strcmp0(key, "SNR") == 0) {
6627                                 dbus_message_iter_get_basic(&value, &snr);
6628                                 SUPPLICANT_DBG("SNR = %d", snr);
6629                                 break;
6630                         }
6631                 }
6632                 dbus_message_iter_next(&dict);
6633         }
6634
6635 out:
6636         if(data->callback)
6637                 data->callback(err, maxspeed, strength, snr, data->user_data);
6638
6639         g_free(data->path);
6640         dbus_free(data);
6641 }
6642
6643 int g_supplicant_interface_signalpoll(GSupplicantInterface *interface,
6644                                 GSupplicantMaxSpeedCallback callback,
6645                                 void *user_data)
6646 {
6647         struct interface_signalpoll_data *data;
6648         int ret;
6649
6650         if (!interface)
6651                 return -EINVAL;
6652
6653         if (!system_available)
6654                 return -EFAULT;
6655
6656         data = dbus_malloc0(sizeof(*data));
6657         if (!data)
6658                 return -ENOMEM;
6659
6660         data->interface = interface;
6661         data->path = g_strdup(interface->path);
6662         data->callback = callback;
6663         data->user_data = user_data;
6664
6665         ret = supplicant_dbus_method_call(interface->path,
6666                         SUPPLICANT_INTERFACE ".Interface", "SignalPoll",
6667                         NULL, interface_signalpoll_result, data,
6668                         interface);
6669
6670         if (ret < 0) {
6671                 g_free(data->path);
6672                 dbus_free(data);
6673         }
6674
6675         return ret;
6676 }
6677 #endif
6678
6679 static int parse_supplicant_error(DBusMessageIter *iter)
6680 {
6681         int err = -ECONNABORTED;
6682         char *key;
6683
6684         if (!iter)
6685                 return err;
6686
6687         /* If the given passphrase is malformed wpa_s returns
6688          * "invalid message format" but this error should be interpreted as
6689          * invalid-key.
6690          */
6691         while (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_STRING) {
6692                 dbus_message_iter_get_basic(iter, &key);
6693                 if (strncmp(key, "psk", 3) == 0 ||
6694                                 strncmp(key, "wep_key", 7) == 0 ||
6695                                 strcmp(key, "invalid message format") == 0) {
6696                         err = -ENOKEY;
6697                         break;
6698                 }
6699                 dbus_message_iter_next(iter);
6700         }
6701
6702         return err;
6703 }
6704
6705 static void interface_select_network_result(const char *error,
6706                                 DBusMessageIter *iter, void *user_data)
6707 {
6708         struct interface_connect_data *data = user_data;
6709         int err;
6710
6711         SUPPLICANT_DBG("");
6712
6713         err = 0;
6714         if (error) {
6715 #if defined TIZEN_EXT
6716                 SUPPLICANT_DBG("SelectNetwork errorFreq %s", error);
6717 #else
6718                 SUPPLICANT_DBG("SelectNetwork error %s", error);
6719 #endif
6720                 err = parse_supplicant_error(iter);
6721         }
6722
6723         g_free(data->path);
6724
6725         if (data->callback)
6726                 data->callback(err, data->interface, data->user_data);
6727
6728 #if defined TIZEN_EXT
6729         g_free(data->ssid->ssid);
6730         g_free((char *)data->ssid->passphrase);
6731         g_free((char *)data->ssid->connector);
6732         g_free((char *)data->ssid->c_sign_key);
6733         g_free((char *)data->ssid->net_access_key);
6734 #endif
6735         g_free(data->ssid);
6736         dbus_free(data);
6737 }
6738
6739 static void interface_select_network_params(DBusMessageIter *iter,
6740                                                         void *user_data)
6741 {
6742         struct interface_connect_data *data = user_data;
6743         GSupplicantInterface *interface = data->interface;
6744 #if defined TIZEN_EXT
6745         GSupplicantSSID *ssid = data->ssid;
6746 #endif
6747
6748         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
6749                                         &interface->network_path);
6750 #if defined TIZEN_EXT
6751         if (!ssid->bssid_for_connect_len)
6752                 dbus_message_iter_append_basic(iter, DBUS_TYPE_INT32, &ssid->freq);
6753 #endif
6754 }
6755
6756 static void interface_add_network_result(const char *error,
6757                                 DBusMessageIter *iter, void *user_data)
6758 {
6759         struct interface_connect_data *data = user_data;
6760         GSupplicantInterface *interface = data->interface;
6761         const char *path;
6762         int err;
6763
6764         if (error)
6765                 goto error;
6766
6767         dbus_message_iter_get_basic(iter, &path);
6768         if (!path)
6769                 goto error;
6770
6771         SUPPLICANT_DBG("PATH: %s", path);
6772
6773 #if defined TIZEN_EXT
6774         if (interface->network_path)
6775                 g_free(interface->network_path);
6776 #endif
6777         interface->network_path = g_strdup(path);
6778
6779         store_network_information(interface, data->ssid);
6780
6781 #if defined TIZEN_EXT
6782         SUPPLICANT_DBG(".Interface.SelectNetworkFreq");
6783         GSupplicantSSID *ssid = data->ssid;
6784
6785         if (!ssid->bssid_for_connect_len)
6786                 supplicant_dbus_method_call(data->interface->path,
6787                                 SUPPLICANT_INTERFACE ".Interface", "SelectNetworkFreq",
6788                                 interface_select_network_params,
6789                                 interface_select_network_result, data,
6790                                 interface);
6791         else
6792                 supplicant_dbus_method_call(data->interface->path,
6793                                 SUPPLICANT_INTERFACE ".Interface", "SelectNetwork",
6794                                 interface_select_network_params,
6795                                 interface_select_network_result, data,
6796                                 interface);
6797 #else
6798         supplicant_dbus_method_call(data->interface->path,
6799                         SUPPLICANT_INTERFACE ".Interface", "SelectNetwork",
6800                         interface_select_network_params,
6801                         interface_select_network_result, data,
6802                         interface);
6803 #endif
6804
6805         return;
6806
6807 error:
6808         SUPPLICANT_DBG("AddNetwork error %s", error);
6809
6810         if (interface_exists(data->interface, data->interface->path)) {
6811                 err = parse_supplicant_error(iter);
6812                 if (data->callback)
6813                         data->callback(err, data->interface, data->user_data);
6814
6815                 g_free(interface->network_path);
6816                 interface->network_path = NULL;
6817         }
6818
6819         g_free(data->path);
6820 #if defined TIZEN_EXT
6821         g_free(data->ssid->ssid);
6822         g_free((char *)data->ssid->passphrase);
6823         g_free((char *)data->ssid->connector);
6824         g_free((char *)data->ssid->c_sign_key);
6825         g_free((char *)data->ssid->net_access_key);
6826 #endif
6827         g_free(data->ssid);
6828         g_free(data);
6829 }
6830
6831 static void add_network_security_none(DBusMessageIter *dict)
6832 {
6833         const char *auth_alg = "OPEN";
6834
6835         supplicant_dbus_dict_append_basic(dict, "auth_alg",
6836                                         DBUS_TYPE_STRING, &auth_alg);
6837 }
6838
6839 static void add_network_security_wep(DBusMessageIter *dict,
6840                                         GSupplicantSSID *ssid)
6841 {
6842         const char *auth_alg = "OPEN SHARED";
6843         dbus_uint32_t key_index = 0;
6844
6845         supplicant_dbus_dict_append_basic(dict, "auth_alg",
6846                                         DBUS_TYPE_STRING, &auth_alg);
6847
6848         if (ssid->passphrase) {
6849                 int size = strlen(ssid->passphrase);
6850                 if (size == 10 || size == 26) {
6851                         unsigned char *key = g_try_malloc(13);
6852                         char tmp[3];
6853                         int i;
6854
6855                         memset(tmp, 0, sizeof(tmp));
6856                         if (!key)
6857                                 size = 0;
6858
6859                         for (i = 0; i < size / 2; i++) {
6860                                 memcpy(tmp, ssid->passphrase + (i * 2), 2);
6861                                 key[i] = (unsigned char) strtol(tmp, NULL, 16);
6862                         }
6863
6864                         supplicant_dbus_dict_append_fixed_array(dict,
6865                                                         "wep_key0",
6866                                                         DBUS_TYPE_BYTE,
6867                                                         &key, size / 2);
6868                         g_free(key);
6869                 } else if (size == 5 || size == 13) {
6870                         unsigned char *key = g_try_malloc(13);
6871                         int i;
6872
6873                         if (!key)
6874                                 size = 0;
6875
6876                         for (i = 0; i < size; i++)
6877                                 key[i] = (unsigned char) ssid->passphrase[i];
6878
6879                         supplicant_dbus_dict_append_fixed_array(dict,
6880                                                                 "wep_key0",
6881                                                                 DBUS_TYPE_BYTE,
6882                                                                 &key, size);
6883                         g_free(key);
6884                 } else
6885                         supplicant_dbus_dict_append_basic(dict,
6886                                                         "wep_key0",
6887                                                         DBUS_TYPE_STRING,
6888                                                         &ssid->passphrase);
6889
6890                 supplicant_dbus_dict_append_basic(dict, "wep_tx_keyidx",
6891                                         DBUS_TYPE_UINT32, &key_index);
6892         }
6893 }
6894
6895 static dbus_bool_t is_psk_raw_key(const char *psk)
6896 {
6897         int i;
6898
6899         /* A raw key is always 64 bytes length... */
6900         if (strlen(psk) != 64)
6901                 return FALSE;
6902
6903         /* ... and its content is in hex representation */
6904         for (i = 0; i < 64; i++)
6905                 if (!isxdigit((unsigned char) psk[i]))
6906                         return FALSE;
6907
6908         return TRUE;
6909 }
6910
6911 static unsigned char hexchar2bin(char c)
6912 {
6913         if ((c >= '0') && (c <= '9'))
6914                 return c - '0';
6915         else if ((c >= 'A') && (c <= 'F'))
6916                 return c - 'A' + 10;
6917         else if ((c >= 'a') && (c <= 'f'))
6918                 return c - 'a' + 10;
6919         else
6920                 return c;
6921 }
6922
6923 static void hexstring2bin(const char *string, unsigned char *data,
6924                                 size_t data_len)
6925 {
6926         size_t i;
6927
6928         for (i = 0; i < data_len; i++)
6929                 data[i] = (hexchar2bin(string[i * 2 + 0]) << 4 |
6930                            hexchar2bin(string[i * 2 + 1]) << 0);
6931 }
6932
6933 static void add_network_security_psk(DBusMessageIter *dict,
6934                                         GSupplicantSSID *ssid)
6935 {
6936         if (ssid->passphrase && strlen(ssid->passphrase) > 0) {
6937                 const char *key = "psk";
6938
6939                 if (is_psk_raw_key(ssid->passphrase)) {
6940                         unsigned char data[32];
6941                         unsigned char *datap = data;
6942
6943                         /* The above pointer alias is required by D-Bus because
6944                          * with D-Bus and GCC, non-heap-allocated arrays cannot
6945                          * be passed directly by their base pointer. */
6946
6947                         hexstring2bin(ssid->passphrase, datap, sizeof(data));
6948
6949                         supplicant_dbus_dict_append_fixed_array(dict,
6950                                                         key, DBUS_TYPE_BYTE,
6951                                                         &datap, sizeof(data));
6952                 } else
6953                         supplicant_dbus_dict_append_basic(dict,
6954                                                         key, DBUS_TYPE_STRING,
6955                                                         &ssid->passphrase);
6956         }
6957 }
6958
6959 static void add_network_security_tls(DBusMessageIter *dict,
6960                                         GSupplicantSSID *ssid)
6961 {
6962         /*
6963          * For TLS, we at least need:
6964          *              The client certificate
6965          *              The client private key file
6966          *              The client private key file password
6967          *
6968          * The Authority certificate is optional.
6969          */
6970         if (!ssid->client_cert_path)
6971                 return;
6972
6973         if (!ssid->private_key_path)
6974                 return;
6975
6976         if (!ssid->private_key_passphrase)
6977                 return;
6978
6979         if (ssid->ca_cert_path)
6980                 supplicant_dbus_dict_append_basic(dict, "ca_cert",
6981                                         DBUS_TYPE_STRING, &ssid->ca_cert_path);
6982
6983         supplicant_dbus_dict_append_basic(dict, "private_key",
6984                                                 DBUS_TYPE_STRING,
6985                                                 &ssid->private_key_path);
6986         supplicant_dbus_dict_append_basic(dict, "private_key_passwd",
6987                                                 DBUS_TYPE_STRING,
6988                                                 &ssid->private_key_passphrase);
6989         supplicant_dbus_dict_append_basic(dict, "client_cert",
6990                                                 DBUS_TYPE_STRING,
6991                                                 &ssid->client_cert_path);
6992 }
6993
6994 static void add_network_security_peap(DBusMessageIter *dict,
6995                                         GSupplicantSSID *ssid)
6996 {
6997         char *phase2_auth;
6998
6999         /*
7000          * For PEAP/TTLS, we at least need
7001          *              The authority certificate
7002          *              The 2nd phase authentication method
7003          *              The 2nd phase passphrase
7004          *
7005          * The Client certificate is optional although strongly recommended
7006          * When setting it, we need in addition
7007          *              The Client private key file
7008          *              The Client private key file password
7009          */
7010         if (!ssid->passphrase)
7011                 return;
7012
7013         if (!ssid->phase2_auth)
7014                 return;
7015
7016         if (ssid->client_cert_path) {
7017                 if (!ssid->private_key_path)
7018                         return;
7019
7020 #if !defined TIZEN_EXT
7021                 if (!ssid->private_key_passphrase)
7022                         return;
7023 #endif
7024
7025                 supplicant_dbus_dict_append_basic(dict, "client_cert",
7026                                                 DBUS_TYPE_STRING,
7027                                                 &ssid->client_cert_path);
7028
7029                 supplicant_dbus_dict_append_basic(dict, "private_key",
7030                                                 DBUS_TYPE_STRING,
7031                                                 &ssid->private_key_path);
7032
7033 #if !defined TIZEN_EXT
7034                 supplicant_dbus_dict_append_basic(dict, "private_key_passwd",
7035                                                 DBUS_TYPE_STRING,
7036                                                 &ssid->private_key_passphrase);
7037 #endif
7038
7039         }
7040
7041         if(g_strcmp0(ssid->phase2_auth, "GTC") == 0 && g_strcmp0(ssid->eap, "ttls") == 0)
7042                 phase2_auth = g_strdup_printf("autheap=%s", ssid->phase2_auth);
7043         else if (g_str_has_prefix(ssid->phase2_auth, "EAP-")) {
7044                 phase2_auth = g_strdup_printf("autheap=%s",
7045                                         ssid->phase2_auth + strlen("EAP-"));
7046         } else
7047                 phase2_auth = g_strdup_printf("auth=%s", ssid->phase2_auth);
7048
7049         supplicant_dbus_dict_append_basic(dict, "password",
7050                                                 DBUS_TYPE_STRING,
7051                                                 &ssid->passphrase);
7052
7053         if (ssid->ca_cert_path)
7054                 supplicant_dbus_dict_append_basic(dict, "ca_cert",
7055                                                 DBUS_TYPE_STRING,
7056                                                 &ssid->ca_cert_path);
7057
7058         supplicant_dbus_dict_append_basic(dict, "phase2",
7059                                                 DBUS_TYPE_STRING,
7060                                                 &phase2_auth);
7061
7062         g_free(phase2_auth);
7063 }
7064
7065 #if defined TIZEN_EXT
7066 static void add_network_security_aka_sim(DBusMessageIter *dict,
7067                                         GSupplicantSSID *ssid)
7068 {
7069         if (!ssid->passphrase)
7070                 return;
7071
7072         supplicant_dbus_dict_append_basic(dict, "password",
7073                         DBUS_TYPE_STRING,
7074                         &ssid->passphrase);
7075 }
7076
7077 static void add_network_security_fast(DBusMessageIter *dict,
7078                 GSupplicantSSID *ssid)
7079 {
7080         /*
7081          * For FAST, we at least need:
7082          *              id / password
7083          *              phase1 (provisiong information)
7084          *              pac_file
7085          */
7086
7087         /* Allow provisioing both authenticated and unauthenticated */
7088         const char *phase1 = "fast_provisioning=2";
7089         supplicant_dbus_dict_append_basic(dict, "phase1",
7090                         DBUS_TYPE_STRING,
7091                         &phase1);
7092
7093         SUPPLICANT_DBG("pac_file [%s]", ssid->pac_file);
7094         if(ssid->pac_file)
7095                 supplicant_dbus_dict_append_basic(dict, "pac_file",
7096                                 DBUS_TYPE_STRING,
7097                                 &ssid->pac_file);
7098
7099         supplicant_dbus_dict_append_basic(dict, "password",
7100                         DBUS_TYPE_STRING,
7101                         &ssid->passphrase);
7102 }
7103 #endif
7104
7105 static void add_network_security_eap(DBusMessageIter *dict,
7106                                         GSupplicantSSID *ssid)
7107 {
7108         char *eap_value;
7109
7110 #if defined TIZEN_EXT
7111         if (!ssid->eap)
7112 #else
7113         if (!ssid->eap || !ssid->identity)
7114 #endif
7115                 return;
7116
7117         if (g_strcmp0(ssid->eap, "tls") == 0) {
7118                 add_network_security_tls(dict, ssid);
7119         } else if (g_strcmp0(ssid->eap, "peap") == 0 ||
7120                                 g_strcmp0(ssid->eap, "ttls") == 0) {
7121 #if defined TIZEN_EXT
7122                 if (!ssid->identity)
7123                         return;
7124 #endif
7125                 add_network_security_peap(dict, ssid);
7126
7127 #if defined TIZEN_EXT
7128         } else if (g_strcmp0(ssid->eap, "sim") == 0 ||
7129                         g_strcmp0(ssid->eap, "aka") == 0 ||
7130                         g_strcmp0(ssid->eap, "aka'") == 0) {
7131                 add_network_security_aka_sim(dict, ssid);
7132         } else if (g_strcmp0(ssid->eap, "pwd") == 0) {
7133                 if(!ssid->passphrase)
7134                         return;
7135                 supplicant_dbus_dict_append_basic(dict, "password",
7136                                 DBUS_TYPE_STRING,
7137                                 &ssid->passphrase);
7138         } else if (g_strcmp0(ssid->eap, "fast") == 0){
7139                 if (!ssid->identity || !ssid->passphrase)
7140                         return;
7141
7142                 add_network_security_fast(dict, ssid);
7143 #endif
7144         } else
7145                 return;
7146
7147         eap_value = g_ascii_strup(ssid->eap, -1);
7148
7149         supplicant_dbus_dict_append_basic(dict, "eap",
7150                                                 DBUS_TYPE_STRING,
7151                                                 &eap_value);
7152 #if defined TIZEN_EXT
7153         if (ssid->identity != NULL)
7154                 supplicant_dbus_dict_append_basic(dict, "identity",
7155                                                         DBUS_TYPE_STRING,
7156                                                         &ssid->identity);
7157 #else
7158         supplicant_dbus_dict_append_basic(dict, "identity",
7159                                                 DBUS_TYPE_STRING,
7160                                                 &ssid->identity);
7161 #endif
7162         if(ssid->anonymous_identity)
7163                 supplicant_dbus_dict_append_basic(dict, "anonymous_identity",
7164                                                      DBUS_TYPE_STRING,
7165                                                      &ssid->anonymous_identity);
7166
7167         if(ssid->subject_match)
7168                 supplicant_dbus_dict_append_basic(dict, "subject_match",
7169                                                      DBUS_TYPE_STRING,
7170                                                      &ssid->subject_match);
7171
7172         if(ssid->altsubject_match)
7173                 supplicant_dbus_dict_append_basic(dict, "altsubject_match",
7174                                                      DBUS_TYPE_STRING,
7175                                                      &ssid->altsubject_match);
7176
7177         if(ssid->domain_suffix_match)
7178                 supplicant_dbus_dict_append_basic(dict, "domain_suffix_match",
7179                                                      DBUS_TYPE_STRING,
7180                                                      &ssid->domain_suffix_match);
7181
7182         if(ssid->domain_match)
7183                 supplicant_dbus_dict_append_basic(dict, "domain_match",
7184                                                      DBUS_TYPE_STRING,
7185                                                      &ssid->domain_match);
7186
7187         g_free(eap_value);
7188 }
7189
7190 static void add_network_security_ciphers(DBusMessageIter *dict,
7191                                                 GSupplicantSSID *ssid)
7192 {
7193         unsigned int p_cipher, g_cipher, i;
7194         char *pairwise, *group;
7195         char *pair_ciphers[4];
7196         char *group_ciphers[5];
7197
7198         p_cipher = ssid->pairwise_cipher;
7199         g_cipher = ssid->group_cipher;
7200
7201         if (p_cipher == 0 && g_cipher == 0)
7202                 return;
7203
7204         i = 0;
7205
7206         if (p_cipher & G_SUPPLICANT_PAIRWISE_CCMP)
7207                 pair_ciphers[i++] = "CCMP";
7208
7209         if (p_cipher & G_SUPPLICANT_PAIRWISE_TKIP)
7210                 pair_ciphers[i++] = "TKIP";
7211
7212         if (p_cipher & G_SUPPLICANT_PAIRWISE_NONE)
7213                 pair_ciphers[i++] = "NONE";
7214
7215         pair_ciphers[i] = NULL;
7216
7217         i = 0;
7218
7219         if (g_cipher & G_SUPPLICANT_GROUP_CCMP)
7220                 group_ciphers[i++] = "CCMP";
7221
7222         if (g_cipher & G_SUPPLICANT_GROUP_TKIP)
7223                 group_ciphers[i++] = "TKIP";
7224
7225         if (g_cipher & G_SUPPLICANT_GROUP_WEP104)
7226                 group_ciphers[i++] = "WEP104";
7227
7228         if (g_cipher & G_SUPPLICANT_GROUP_WEP40)
7229                 group_ciphers[i++] = "WEP40";
7230
7231         group_ciphers[i] = NULL;
7232
7233         pairwise = g_strjoinv(" ", pair_ciphers);
7234         group = g_strjoinv(" ", group_ciphers);
7235
7236         SUPPLICANT_DBG("cipher %s %s", pairwise, group);
7237
7238         supplicant_dbus_dict_append_basic(dict, "pairwise",
7239                                                 DBUS_TYPE_STRING,
7240                                                 &pairwise);
7241         supplicant_dbus_dict_append_basic(dict, "group",
7242                                                 DBUS_TYPE_STRING,
7243                                                 &group);
7244
7245         g_free(pairwise);
7246         g_free(group);
7247 }
7248
7249 static void add_network_security_proto(DBusMessageIter *dict,
7250                                                 GSupplicantSSID *ssid)
7251 {
7252         unsigned int protocol, i;
7253         char *proto;
7254         char *protos[3];
7255
7256         protocol = ssid->protocol;
7257
7258         if (protocol == 0)
7259                 return;
7260
7261         i = 0;
7262
7263         if (protocol & G_SUPPLICANT_PROTO_RSN)
7264                 protos[i++] = "RSN";
7265
7266         if (protocol & G_SUPPLICANT_PROTO_WPA)
7267                 protos[i++] = "WPA";
7268
7269         protos[i] = NULL;
7270
7271         proto = g_strjoinv(" ", protos);
7272
7273         SUPPLICANT_DBG("proto %s", proto);
7274
7275         supplicant_dbus_dict_append_basic(dict, "proto",
7276                                                 DBUS_TYPE_STRING,
7277                                                 &proto);
7278
7279         g_free(proto);
7280 }
7281
7282 #if defined TIZEN_EXT
7283 static void add_network_ieee80211w(DBusMessageIter *dict, GSupplicantSSID *ssid)
7284 {
7285         if (ssid->security != G_SUPPLICANT_SECURITY_SAE
7286                         && ssid->security != G_SUPPLICANT_SECURITY_OWE
7287                         && ssid->security != G_SUPPLICANT_SECURITY_PSK_SHA256
7288                         && ssid->security != G_SUPPLICANT_SECURITY_DPP)
7289                 return;
7290
7291         supplicant_dbus_dict_append_basic(dict, "ieee80211w", DBUS_TYPE_UINT32,
7292                                           &ssid->ieee80211w);
7293 }
7294
7295 static void add_network_security_connector(DBusMessageIter *dict, GSupplicantSSID *ssid)
7296 {
7297         if (ssid->connector && strlen(ssid->connector) > 0) {
7298                 const char *key = "dpp_connector";
7299
7300                 supplicant_dbus_dict_append_basic(dict,
7301                                 key, DBUS_TYPE_STRING,
7302                                 &ssid->connector);
7303         }
7304 }
7305
7306 static size_t convert_hexstr_to_bin(const char *hex_str, unsigned char **bin)
7307 {
7308         unsigned char *bin_res = NULL;
7309         unsigned int i, j, hex;
7310         size_t hex_str_len;
7311
7312         if (!hex_str || strlen(hex_str) == 0)
7313                 return 0;
7314
7315         hex_str_len = strlen(hex_str);
7316         bin_res = g_try_malloc0(hex_str_len / 2);
7317         if (!bin_res)
7318                 return 0;
7319
7320         j = 0;
7321         for (i = 0; i < hex_str_len; i+=2) {
7322                 sscanf(hex_str + i, "%02x", &hex);
7323                 bin_res[j++] = hex;
7324         }
7325
7326         *bin = bin_res;
7327         return hex_str_len / 2;
7328 }
7329
7330 static void add_network_security_c_sign_key(DBusMessageIter *dict, GSupplicantSSID *ssid)
7331 {
7332         if (ssid->c_sign_key && strlen(ssid->c_sign_key) > 0) {
7333                 const char *key = "dpp_csign";
7334                 unsigned char *bin_csign = NULL;
7335                 size_t bin_csign_len = convert_hexstr_to_bin(ssid->c_sign_key, &bin_csign);
7336                 if  (bin_csign_len != 0)
7337                         supplicant_dbus_dict_append_fixed_array(dict,
7338                                         key, DBUS_TYPE_BYTE,
7339                                         &bin_csign, bin_csign_len);
7340                 g_free(bin_csign);
7341         }
7342 }
7343
7344 static void add_network_security_net_access_key(DBusMessageIter *dict, GSupplicantSSID *ssid)
7345 {
7346         if (ssid->net_access_key && strlen(ssid->net_access_key) > 0) {
7347                 const char *key = "dpp_netaccesskey";
7348                 unsigned char *bin_netaccesskey = NULL;
7349                 size_t bin_netaccesskey_len = convert_hexstr_to_bin(ssid->net_access_key, &bin_netaccesskey);
7350                 if  (bin_netaccesskey_len != 0)
7351                         supplicant_dbus_dict_append_fixed_array(dict,
7352                                         key, DBUS_TYPE_BYTE,
7353                                         &bin_netaccesskey, bin_netaccesskey_len);
7354                 g_free(bin_netaccesskey);
7355         }
7356 }
7357
7358 #endif
7359
7360 static void add_network_security(DBusMessageIter *dict, GSupplicantSSID *ssid)
7361 {
7362         char *key_mgmt;
7363
7364         switch (ssid->security) {
7365         case G_SUPPLICANT_SECURITY_NONE:
7366                 key_mgmt = "NONE";
7367                 add_network_security_none(dict);
7368                 add_network_security_ciphers(dict, ssid);
7369                 break;
7370         case G_SUPPLICANT_SECURITY_UNKNOWN:
7371         case G_SUPPLICANT_SECURITY_WEP:
7372                 key_mgmt = "NONE";
7373                 add_network_security_wep(dict, ssid);
7374                 add_network_security_ciphers(dict, ssid);
7375                 break;
7376         case G_SUPPLICANT_SECURITY_PSK:
7377 #if defined TIZEN_EXT
7378                 if (ssid->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_PSK)
7379                         key_mgmt = "FT-PSK WPA-PSK";
7380                 else
7381                         key_mgmt = "WPA-PSK";
7382 #else
7383                 key_mgmt = "WPA-PSK";
7384 #endif
7385                 add_network_security_psk(dict, ssid);
7386                 add_network_security_ciphers(dict, ssid);
7387                 add_network_security_proto(dict, ssid);
7388                 break;
7389         case G_SUPPLICANT_SECURITY_IEEE8021X:
7390                 key_mgmt = "WPA-EAP";
7391                 add_network_security_eap(dict, ssid);
7392                 add_network_security_ciphers(dict, ssid);
7393                 add_network_security_proto(dict, ssid);
7394                 break;
7395 #if defined TIZEN_EXT
7396         case G_SUPPLICANT_SECURITY_PSK_SHA256:
7397                 if (ssid->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_PSK)
7398                         key_mgmt = "WPA-PSK-SHA256 WPA-PSK";
7399                 else
7400                         key_mgmt = "WPA-PSK-SHA256";
7401                 add_network_security_psk(dict, ssid);
7402                 add_network_security_ciphers(dict, ssid);
7403                 add_network_security_proto(dict, ssid);
7404                 break;
7405         case G_SUPPLICANT_SECURITY_FT_PSK:
7406                 key_mgmt = "FT-PSK";
7407                 add_network_security_psk(dict, ssid);
7408                 add_network_security_ciphers(dict, ssid);
7409                 add_network_security_proto(dict, ssid);
7410                 break;
7411         case G_SUPPLICANT_SECURITY_FT_IEEE8021X:
7412                 key_mgmt = "FT-EAP";
7413                 add_network_security_eap(dict, ssid);
7414                 add_network_security_ciphers(dict, ssid);
7415                 add_network_security_proto(dict, ssid);
7416                 break;
7417         case G_SUPPLICANT_SECURITY_SAE:
7418                 if (ssid->keymgmt & G_SUPPLICANT_KEYMGMT_FT_SAE) {
7419                         if (ssid->keymgmt & G_SUPPLICANT_KEYMGMT_SAE)
7420                                 key_mgmt = "FT-SAE SAE";
7421                         else
7422                                 key_mgmt = "FT-SAE";
7423                 } else if (ssid->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_PSK)
7424                         key_mgmt = "SAE WPA-PSK";
7425                 else
7426                         key_mgmt = "SAE";
7427                 add_network_security_psk(dict, ssid);
7428                 break;
7429         case G_SUPPLICANT_SECURITY_OWE:
7430                 key_mgmt = "OWE";
7431                 add_network_security_ciphers(dict, ssid);
7432                 add_network_security_proto(dict, ssid);
7433                 break;
7434         case G_SUPPLICANT_SECURITY_DPP:
7435                 key_mgmt = "DPP";
7436                 add_network_security_connector(dict, ssid);
7437                 add_network_security_c_sign_key(dict, ssid);
7438                 add_network_security_net_access_key(dict, ssid);
7439                 break;
7440 #endif
7441         }
7442
7443         supplicant_dbus_dict_append_basic(dict, "key_mgmt",
7444                                 DBUS_TYPE_STRING, &key_mgmt);
7445 }
7446
7447 static void add_network_mode(DBusMessageIter *dict, GSupplicantSSID *ssid)
7448 {
7449         dbus_uint32_t mode;
7450
7451         switch (ssid->mode) {
7452         case G_SUPPLICANT_MODE_UNKNOWN:
7453         case G_SUPPLICANT_MODE_INFRA:
7454                 mode = 0;
7455                 break;
7456         case G_SUPPLICANT_MODE_IBSS:
7457                 mode = 1;
7458                 break;
7459         case G_SUPPLICANT_MODE_MASTER:
7460                 mode = 2;
7461                 break;
7462 #if defined TIZEN_EXT_WIFI_MESH
7463         case G_SUPPLICANT_MODE_MESH:
7464                 mode = 5;
7465                 break;
7466 #endif
7467         }
7468
7469         supplicant_dbus_dict_append_basic(dict, "mode",
7470                                 DBUS_TYPE_UINT32, &mode);
7471 }
7472
7473 static void interface_add_network_params(DBusMessageIter *iter, void *user_data)
7474 {
7475         DBusMessageIter dict;
7476         struct interface_connect_data *data = user_data;
7477         GSupplicantSSID *ssid = data->ssid;
7478 #if defined TIZEN_EXT
7479         GSupplicantInterface *interface = data->interface;
7480 #endif
7481
7482         supplicant_dbus_dict_open(iter, &dict);
7483
7484         if (ssid->scan_ssid)
7485                 supplicant_dbus_dict_append_basic(&dict, "scan_ssid",
7486                                          DBUS_TYPE_UINT32, &ssid->scan_ssid);
7487
7488         if (ssid->freq)
7489                 supplicant_dbus_dict_append_basic(&dict, "frequency",
7490                                          DBUS_TYPE_UINT32, &ssid->freq);
7491
7492         if (ssid->bgscan)
7493                 supplicant_dbus_dict_append_basic(&dict, "bgscan",
7494                                         DBUS_TYPE_STRING, &ssid->bgscan);
7495
7496         add_network_mode(&dict, ssid);
7497
7498         add_network_security(&dict, ssid);
7499
7500 #if defined TIZEN_EXT
7501         add_network_ieee80211w(&dict, ssid);
7502 #endif
7503
7504         supplicant_dbus_dict_append_fixed_array(&dict, "ssid",
7505                                         DBUS_TYPE_BYTE, &ssid->ssid,
7506                                                 ssid->ssid_len);
7507
7508 #if defined TIZEN_EXT
7509         bool owe_transition_mode = FALSE;
7510         if ((ssid->security == G_SUPPLICANT_SECURITY_OWE) && !(ssid->keymgmt & G_SUPPLICANT_KEYMGMT_OWE))
7511                 owe_transition_mode = TRUE;
7512
7513         if (ssid->bssid && !owe_transition_mode) {
7514                 char *bssid = NULL;
7515                 bssid = g_try_malloc0(18);
7516                 if (bssid == NULL) {
7517                         SUPPLICANT_DBG("memory allocation error");
7518                         supplicant_dbus_dict_close(iter, &dict);
7519                         return;
7520                 }
7521
7522                 if (ssid->bssid_for_connect_len) {
7523                         snprintf(bssid, 18, MACSTR, MAC2STR(ssid->bssid_for_connect));
7524                         memcpy(interface->add_network_bssid, ssid->bssid_for_connect, WIFI_BSSID_LEN_MAX);
7525                 } else {
7526                         snprintf(bssid, 18, MACSTR, MAC2STR(ssid->bssid));
7527                         memcpy(interface->add_network_bssid, ssid->bssid, WIFI_BSSID_LEN_MAX);
7528                 }
7529
7530                 SUPPLICANT_DBG("bssid [" MACSTR "]", MAC2STR(interface->add_network_bssid));
7531
7532                 supplicant_dbus_dict_append_basic(&dict, "bssid",
7533                                         DBUS_TYPE_STRING, &bssid);
7534                 g_free(bssid);
7535         }
7536 #endif
7537
7538         supplicant_dbus_dict_close(iter, &dict);
7539 }
7540
7541 static void interface_wps_start_result(const char *error,
7542                                 DBusMessageIter *iter, void *user_data)
7543 {
7544         struct interface_connect_data *data = user_data;
7545         int err;
7546
7547         SUPPLICANT_DBG("");
7548
7549         err = 0;
7550         if (error) {
7551                 SUPPLICANT_DBG("error: %s", error);
7552                 err = parse_supplicant_error(iter);
7553         }
7554
7555         if(data->callback)
7556                 data->callback(err, data->interface, data->user_data);
7557
7558         g_free(data->path);
7559         g_free(data->ssid);
7560         dbus_free(data);
7561 }
7562
7563 static void interface_add_wps_params(DBusMessageIter *iter, void *user_data)
7564 {
7565         struct interface_connect_data *data = user_data;
7566         GSupplicantSSID *ssid = data->ssid;
7567         const char *role = "enrollee", *type;
7568         DBusMessageIter dict;
7569
7570         SUPPLICANT_DBG("");
7571
7572         supplicant_dbus_dict_open(iter, &dict);
7573
7574         supplicant_dbus_dict_append_basic(&dict, "Role",
7575                                                 DBUS_TYPE_STRING, &role);
7576
7577         type = "pbc";
7578         if (ssid->pin_wps) {
7579                 type = "pin";
7580                 supplicant_dbus_dict_append_basic(&dict, "Pin",
7581                                         DBUS_TYPE_STRING, &ssid->pin_wps);
7582         }
7583
7584         supplicant_dbus_dict_append_basic(&dict, "Type",
7585                                         DBUS_TYPE_STRING, &type);
7586
7587 #if defined TIZEN_EXT
7588         if (ssid->bssid)
7589                 supplicant_dbus_dict_append_fixed_array(&dict, "Bssid",
7590                                                 DBUS_TYPE_BYTE, &ssid->bssid, 6);
7591 #endif
7592
7593         supplicant_dbus_dict_close(iter, &dict);
7594 }
7595
7596 static void wps_start(const char *error, DBusMessageIter *iter, void *user_data)
7597 {
7598         struct interface_connect_data *data = user_data;
7599
7600         SUPPLICANT_DBG("");
7601
7602         if (error) {
7603                 SUPPLICANT_DBG("error: %s", error);
7604                 g_free(data->path);
7605                 g_free(data->ssid);
7606                 dbus_free(data);
7607                 return;
7608         }
7609
7610 #if defined TIZEN_EXT
7611         GSupplicantSSID *ssid = data->ssid;
7612         if (ssid->pin_wps != NULL) {
7613                 if (!g_utf8_validate(ssid->pin_wps, 8, NULL)) {
7614                         SUPPLICANT_DBG("Invalid characters in WPS_PIN");
7615                         g_free(data->ssid);
7616                         dbus_free(data);
7617                         return;
7618                 }
7619         }
7620 #endif
7621         supplicant_dbus_method_call(data->interface->path,
7622                         SUPPLICANT_INTERFACE ".Interface.WPS", "Start",
7623                         interface_add_wps_params,
7624                         interface_wps_start_result, data, NULL);
7625 }
7626
7627 static void wps_process_credentials(DBusMessageIter *iter, void *user_data)
7628 {
7629         dbus_bool_t credentials = TRUE;
7630
7631         SUPPLICANT_DBG("");
7632
7633         dbus_message_iter_append_basic(iter, DBUS_TYPE_BOOLEAN, &credentials);
7634 }
7635
7636
7637 #if defined TIZEN_EXT
7638 #define NETCONFIG_SERVICE "net.netconfig"
7639 #define NETCONFIG_WIFI_PATH "/net/netconfig/wifi"
7640 #define NETCONFIG_WIFI_INTERFACE NETCONFIG_SERVICE ".wifi"
7641
7642 struct dec_method_call_data {
7643         struct interface_connect_data *data;
7644         DBusPendingCall *pending_call;
7645 };
7646
7647 static struct dec_method_call_data decrypt_request_data;
7648
7649 static void crypt_method_call_cancel(void)
7650 {
7651         if (decrypt_request_data.pending_call) {
7652                 dbus_pending_call_cancel(decrypt_request_data.pending_call);
7653                 dbus_pending_call_unref(decrypt_request_data.pending_call);
7654                 decrypt_request_data.pending_call = NULL;
7655         }
7656
7657         g_free(decrypt_request_data.data->path);
7658         g_free(decrypt_request_data.data->ssid);
7659         dbus_free(decrypt_request_data.data);
7660         decrypt_request_data.data = NULL;
7661 }
7662
7663 static void decryption_request_reply(DBusPendingCall *call,
7664                                                 void *user_data)
7665 {
7666         DBusMessage *reply;
7667         DBusError error;
7668         DBusMessageIter args;
7669         char *out_data;
7670         int ret;
7671         struct interface_connect_data *data = user_data;
7672
7673         SUPPLICANT_DBG("");
7674
7675         reply = dbus_pending_call_steal_reply(call);
7676
7677         dbus_error_init(&error);
7678         if (dbus_set_error_from_message(&error, reply)) {
7679                 SUPPLICANT_DBG("decryption_request_reply() %s %s", error.name, error.message);
7680                 dbus_error_free(&error);
7681                 ret = -EINVAL;
7682                 goto done;
7683         }
7684
7685         if (!g_str_has_prefix(data->interface->path, "/")) {
7686                 SUPPLICANT_DBG("Invalid path %s", data->interface->path);
7687                 ret = -EINVAL;
7688                 goto done;
7689         }
7690
7691         if (dbus_message_iter_init(reply, &args) == FALSE) {
7692                 SUPPLICANT_DBG("dbus_message_iter_init() failed");
7693                 ret = -EINVAL;
7694                 goto done;
7695         }
7696
7697         dbus_message_iter_get_basic(&args, &out_data);
7698         data->ssid->passphrase = g_strdup((const gchar *)out_data);
7699
7700         ret = supplicant_dbus_method_call(data->interface->path,
7701                 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
7702                 interface_add_network_params,
7703                 interface_add_network_result, data,
7704                 data->interface);
7705
7706 done:
7707         if (ret < 0) {
7708                 SUPPLICANT_DBG("AddNetwork failed %d", ret);
7709                 callback_assoc_failed(decrypt_request_data.data->user_data);
7710                 g_free(data->path);
7711                 g_free(data->ssid->ssid);
7712                 g_free((char *)data->ssid->passphrase);
7713                 g_free((char *)data->ssid->connector);
7714                 g_free((char *)data->ssid->c_sign_key);
7715                 g_free((char *)data->ssid->net_access_key);
7716                 g_free(data->ssid);
7717                 dbus_free(data);
7718         }
7719
7720         dbus_message_unref(reply);
7721         dbus_pending_call_unref(call);
7722
7723         decrypt_request_data.pending_call = NULL;
7724         decrypt_request_data.data = NULL;
7725 }
7726
7727 static int send_decryption_request(const char *passphrase,
7728                         struct interface_connect_data *data)
7729 {
7730         DBusMessage *msg = NULL;
7731         DBusPendingCall *call;
7732
7733         SUPPLICANT_DBG("Decryption request");
7734
7735         if (!passphrase) {
7736                 SUPPLICANT_DBG("Invalid parameter");
7737                 return -EINVAL;
7738         }
7739
7740         if (!connection)
7741                 return -EINVAL;
7742
7743         msg = dbus_message_new_method_call(NETCONFIG_SERVICE, NETCONFIG_WIFI_PATH,
7744                         NETCONFIG_WIFI_INTERFACE, "DecryptPassphrase");
7745         if (!msg)
7746                 return -EINVAL;
7747
7748 #if defined TIZEN_EXT
7749         if (!dbus_message_append_args(msg, DBUS_TYPE_STRING, &passphrase,
7750                                                         DBUS_TYPE_INVALID)) {
7751                 SUPPLICANT_DBG("Could not fulfill decryption request");
7752                 return -ENOMEM;
7753         }
7754 #else
7755         dbus_message_append_args(msg, DBUS_TYPE_STRING, &passphrase,
7756                                                         DBUS_TYPE_INVALID);
7757 #endif
7758
7759         if (!dbus_connection_send_with_reply(connection, msg,
7760                                 &call, DBUS_TIMEOUT_USE_DEFAULT)) {
7761                 dbus_message_unref(msg);
7762                 return -EIO;
7763         }
7764
7765         if (!call) {
7766                 dbus_message_unref(msg);
7767                 return -EIO;
7768         }
7769
7770         decrypt_request_data.pending_call = call;
7771         decrypt_request_data.data = data;
7772
7773         dbus_pending_call_set_notify(call, decryption_request_reply, data, NULL);
7774         dbus_message_unref(msg);
7775
7776         SUPPLICANT_DBG("Decryption request succeeded");
7777
7778         return 0;
7779 }
7780
7781 static void decrypt_conf_obj_reply(DBusPendingCall *call,
7782                                                 void *user_data)
7783 {
7784         DBusMessage *reply;
7785         DBusError error;
7786         DBusMessageIter iter, dict;
7787         char *out_data;
7788         int ret;
7789         struct interface_connect_data *data = user_data;
7790
7791         reply = dbus_pending_call_steal_reply(call);
7792
7793         dbus_error_init(&error);
7794         if (dbus_set_error_from_message(&error, reply)) {
7795                 SUPPLICANT_DBG("decryption_conf_obj_reply() %s %s", error.name, error.message);
7796                 dbus_error_free(&error);
7797                 ret = -EINVAL;
7798                 goto done;
7799         }
7800
7801         if (dbus_message_iter_init(reply, &iter) == FALSE) {
7802                 SUPPLICANT_DBG("dbus_message_iter_init() failed");
7803                 ret = -EINVAL;
7804                 goto done;
7805         }
7806
7807         dbus_message_iter_recurse(&iter, &dict);
7808
7809         while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_DICT_ENTRY) {
7810                 DBusMessageIter entry, value;
7811                 const char *key;
7812
7813                 dbus_message_iter_recurse(&dict, &entry);
7814                 dbus_message_iter_get_basic(&entry, &key);
7815                 dbus_message_iter_next(&entry);
7816                 dbus_message_iter_recurse(&entry, &value);
7817                 if (dbus_message_iter_get_arg_type(&value) == DBUS_TYPE_STRING) {
7818                         if (g_strcmp0(key, "connector") == 0) {
7819                                 dbus_message_iter_get_basic(&value, &out_data);
7820                                 data->ssid->connector = g_strdup((const gchar *)out_data);
7821                                 SUPPLICANT_DBG("connector %s", data->ssid->connector);
7822                         } else if (g_strcmp0(key, "c_sign_key") == 0) {
7823                                 dbus_message_iter_get_basic(&value, &out_data);
7824                                 data->ssid->c_sign_key = g_strdup((const gchar *)out_data);
7825                                 SUPPLICANT_DBG("c_sign_key %s", data->ssid->c_sign_key);
7826                         } else if (g_strcmp0(key, "net_access_key") == 0) {
7827                                 dbus_message_iter_get_basic(&value, &out_data);
7828                                 data->ssid->net_access_key = g_strdup((const gchar *)out_data);
7829                                 SUPPLICANT_DBG("net_access_key %s", data->ssid->net_access_key);
7830                         }
7831                 }
7832                 dbus_message_iter_next(&dict);
7833         }
7834
7835         ret = supplicant_dbus_method_call(data->interface->path,
7836                 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
7837                 interface_add_network_params,
7838                 interface_add_network_result, data,
7839                 data->interface);
7840
7841 done:
7842         if (ret < 0) {
7843                 SUPPLICANT_DBG("AddNetwork failed %d", ret);
7844                 callback_assoc_failed(decrypt_request_data.data->user_data);
7845                 g_free(data->path);
7846                 g_free(data->ssid->ssid);
7847                 g_free((char *)data->ssid->connector);
7848                 g_free((char *)data->ssid->c_sign_key);
7849                 g_free((char *)data->ssid->net_access_key);
7850                 g_free(data->ssid);
7851                 dbus_free(data);
7852         }
7853
7854         dbus_message_unref(reply);
7855         dbus_pending_call_unref(call);
7856
7857         decrypt_request_data.pending_call = NULL;
7858         decrypt_request_data.data = NULL;
7859 }
7860
7861 static int send_decryption_conf_obj_request(GSupplicantSSID *ssid,
7862                         struct interface_connect_data *data)
7863 {
7864         DBusMessage *msg = NULL;
7865         DBusPendingCall *call;
7866
7867         SUPPLICANT_DBG("Decryption configuration object request");
7868
7869         if (!ssid) {
7870                 SUPPLICANT_DBG("Invalid parameter");
7871                 return -EINVAL;
7872         }
7873
7874         if (!connection)
7875                 return -EINVAL;
7876
7877         msg = dbus_message_new_method_call(NETCONFIG_SERVICE, NETCONFIG_WIFI_PATH,
7878                         NETCONFIG_WIFI_INTERFACE, "DecryptConfObj");
7879         if (!msg)
7880                 return -EINVAL;
7881
7882         dbus_message_append_args(msg, DBUS_TYPE_STRING, &ssid->connector,
7883                                                         DBUS_TYPE_INVALID);
7884         dbus_message_append_args(msg, DBUS_TYPE_STRING, &ssid->c_sign_key,
7885                                                         DBUS_TYPE_INVALID);
7886         dbus_message_append_args(msg, DBUS_TYPE_STRING, &ssid->net_access_key,
7887                                                         DBUS_TYPE_INVALID);
7888
7889         if (!dbus_connection_send_with_reply(connection, msg,
7890                                 &call, DBUS_TIMEOUT_USE_DEFAULT)) {
7891                 dbus_message_unref(msg);
7892                 return -EIO;
7893         }
7894
7895         if (!call) {
7896                 dbus_message_unref(msg);
7897                 return -EIO;
7898         }
7899
7900         decrypt_request_data.pending_call = call;
7901         decrypt_request_data.data = data;
7902
7903         dbus_pending_call_set_notify(call, decrypt_conf_obj_reply, data, NULL);
7904         dbus_message_unref(msg);
7905
7906         SUPPLICANT_DBG("Decrypt Conf Obj request succeeded");
7907
7908         return 0;
7909 }
7910
7911 static bool is_valid_config_object(GSupplicantSSID *ssid)
7912 {
7913         return ((ssid->connector &&
7914                         g_strcmp0(ssid->connector, "") != 0) &&
7915                         (ssid->c_sign_key &&
7916                         g_strcmp0(ssid->c_sign_key, "") != 0) &&
7917                         (ssid->net_access_key &&
7918                         g_strcmp0(ssid->net_access_key, "") != 0));
7919 }
7920 #endif
7921
7922 int g_supplicant_interface_connect(GSupplicantInterface *interface,
7923                                 GSupplicantSSID *ssid,
7924                                 GSupplicantInterfaceCallback callback,
7925                                                         void *user_data)
7926 {
7927         struct interface_connect_data *data;
7928         struct interface_data *intf_data;
7929         int ret = 0;
7930
7931         SUPPLICANT_DBG("");
7932
7933         if (!interface)
7934                 return -EINVAL;
7935
7936         if (!system_available)
7937                 return -EFAULT;
7938
7939         /* TODO: Check if we're already connected and switch */
7940
7941         data = dbus_malloc0(sizeof(*data));
7942         if (!data)
7943                 return -ENOMEM;
7944
7945         data->interface = interface;
7946         data->path = g_strdup(interface->path);
7947         data->callback = callback;
7948         data->ssid = ssid;
7949         data->user_data = user_data;
7950
7951         if (ssid->use_wps) {
7952                 g_free(interface->wps_cred.key);
7953                 memset(&interface->wps_cred, 0,
7954                                 sizeof(struct _GSupplicantWpsCredentials));
7955
7956                 ret = supplicant_dbus_property_set(interface->path,
7957                         SUPPLICANT_INTERFACE ".Interface.WPS",
7958                         "ProcessCredentials", DBUS_TYPE_BOOLEAN_AS_STRING,
7959                         wps_process_credentials, wps_start, data, interface);
7960         } else {
7961                 /* By the time there is a request for connect and the network
7962                  * path is not NULL it means that connman has not removed the
7963                  * previous network pointer. This can happen in the case AP
7964                  * deauthenticated client and connman does not remove the
7965                  * previously connected network pointer. This causes supplicant
7966                  * to reallocate the memory for struct wpa_ssid again even if it
7967                  * is the same SSID. This causes memory usage of wpa_supplicnat
7968                  * to go high. The idea here is that if the previously connected
7969                  * network is not removed at the time of next connection attempt
7970                  * check if the network path is not NULL. In case it is non-NULL
7971                  * first remove the network and then once removal is successful, add
7972                  * the network.
7973                  */
7974
7975                 if (interface->network_path != NULL) {
7976                         g_free(data->path);
7977                         dbus_free(data);
7978
7979                         /*
7980                          * If this add network is for the same network for
7981                          * which wpa_supplicant already has a profile then do
7982                          * not need to add another profile. Only if the
7983                          * profile that needs to get added is different from
7984                          * what is there in wpa_s delete the current one. A
7985                          * network is identified by its SSID, security_type
7986                          * and passphrase (private passphrase in case security
7987                          * type is 802.11x).
7988                          */
7989                         if (compare_network_parameters(interface, ssid)) {
7990                                 return -EALREADY;
7991                         }
7992
7993                         intf_data = dbus_malloc0(sizeof(*intf_data));
7994                         if (!intf_data)
7995                                 return -ENOMEM;
7996
7997                         intf_data->interface = interface;
7998                         intf_data->path = g_strdup(interface->path);
7999                         intf_data->callback = callback;
8000                         intf_data->ssid = ssid;
8001                         intf_data->user_data = user_data;
8002                         intf_data->network_remove_in_progress = TRUE;
8003                         network_remove(intf_data);
8004                 } else {
8005 #if defined TIZEN_EXT
8006                         if (ssid->passphrase &&
8007                             g_strcmp0(ssid->passphrase, "") != 0 &&
8008 #if defined TIZEN_EXT_WIFI_MESH
8009                             ssid->mode != G_SUPPLICANT_MODE_MESH &&
8010 #endif
8011                             !ssid->eap) {
8012                                 ret = send_decryption_request(ssid->passphrase, data);
8013                                 if (ret < 0)
8014                                         SUPPLICANT_DBG("Decryption request failed %d", ret);
8015                         } else if (is_valid_config_object(ssid)) {
8016                                 ret = send_decryption_conf_obj_request(ssid, data);
8017                                 if (ret < 0)
8018                                         SUPPLICANT_DBG("Decryption Conf Obj request failed %d", ret);
8019
8020                         } else
8021 #endif
8022                         ret = supplicant_dbus_method_call(interface->path,
8023                                         SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
8024                                         interface_add_network_params,
8025                                         interface_add_network_result, data,
8026                                         interface);
8027                 }
8028         }
8029
8030         if (ret < 0) {
8031                 g_free(data->path);
8032                 dbus_free(data);
8033                 return ret;
8034         }
8035
8036         return -EINPROGRESS;
8037 }
8038
8039 static void network_remove_result(const char *error,
8040                                 DBusMessageIter *iter, void *user_data)
8041 {
8042         struct interface_data *data = user_data;
8043         struct interface_connect_data *connect_data;
8044         int result = 0;
8045
8046         SUPPLICANT_DBG("");
8047
8048         if (error) {
8049                 result = -EIO;
8050                 SUPPLICANT_DBG("error: %s", error);
8051
8052                 if (g_strcmp0("org.freedesktop.DBus.Error.UnknownMethod",
8053                                                 error) == 0)
8054                         result = -ECONNABORTED;
8055         }
8056
8057         g_free(data->interface->network_path);
8058         data->interface->network_path = NULL;
8059
8060         remove_network_information(data->interface);
8061
8062         if (data->network_remove_in_progress == TRUE) {
8063                 data->network_remove_in_progress = FALSE;
8064                 connect_data = dbus_malloc0(sizeof(*connect_data));
8065                 if (!connect_data)
8066                         return;
8067
8068                 connect_data->interface = data->interface;
8069                 connect_data->path = g_strdup(data->path);
8070                 connect_data->callback = data->callback;
8071                 connect_data->ssid = data->ssid;
8072                 connect_data->user_data = data->user_data;
8073
8074 #if defined TIZEN_EXT
8075                 int ret;
8076                 if (data->ssid->passphrase && g_strcmp0(data->ssid->passphrase, "") != 0
8077                         && !data->ssid->eap) {
8078                         ret = send_decryption_request(data->ssid->passphrase, connect_data);
8079                         if (ret < 0) {
8080                                 SUPPLICANT_DBG("Decryption request failed %d", ret);
8081                                 g_free(connect_data->ssid);
8082                                 g_free(connect_data->path);
8083                                 dbus_free(connect_data);
8084                         }
8085                 } else if (is_valid_config_object(data->ssid)) {
8086                         ret = send_decryption_conf_obj_request(data->ssid, connect_data);
8087                         if (ret < 0) {
8088                                 SUPPLICANT_DBG("Decryption Conf Obj request failed %d", ret);
8089                                 g_free(connect_data->ssid);
8090                                 g_free(connect_data->path);
8091                                 dbus_free(connect_data);
8092                         }
8093                 } else
8094 #endif
8095                 supplicant_dbus_method_call(data->interface->path,
8096                         SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
8097                         interface_add_network_params,
8098                         interface_add_network_result, connect_data,
8099                         connect_data->interface);
8100         } else {
8101                 if (data->callback)
8102                         data->callback(result, data->interface, data->user_data);
8103         }
8104         g_free(data->path);
8105         dbus_free(data);
8106 }
8107
8108 static void network_remove_params(DBusMessageIter *iter, void *user_data)
8109 {
8110         struct interface_data *data = user_data;
8111         const char *path = data->interface->network_path;
8112
8113         SUPPLICANT_DBG("path %s", path);
8114
8115         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH, &path);
8116 }
8117
8118 static int network_remove(struct interface_data *data)
8119 {
8120         GSupplicantInterface *interface = data->interface;
8121
8122         SUPPLICANT_DBG("");
8123
8124 #if defined TIZEN_EXT
8125         GSupplicantInterface *intf = NULL;
8126         /*
8127          * Check if 'interface' is valid
8128          */
8129         intf = g_hash_table_lookup(interface_table, interface->path);
8130         if (intf == NULL)
8131                 return -EINVAL;
8132 #endif
8133
8134         return supplicant_dbus_method_call(interface->path,
8135                         SUPPLICANT_INTERFACE ".Interface", "RemoveNetwork",
8136                         network_remove_params, network_remove_result, data,
8137                         interface);
8138 }
8139
8140 static void interface_disconnect_result(const char *error,
8141                                 DBusMessageIter *iter, void *user_data)
8142 {
8143         struct interface_data *data = user_data;
8144         int result = 0;
8145
8146         SUPPLICANT_DBG("");
8147
8148         if (error) {
8149                 result = -EIO;
8150                 SUPPLICANT_DBG("error: %s", error);
8151
8152                 if (g_strcmp0("org.freedesktop.DBus.Error.UnknownMethod",
8153                                                 error) == 0)
8154                         result = -ECONNABORTED;
8155         }
8156
8157         /* If we are disconnecting from previous WPS successful
8158          * association. i.e.: it did not went through AddNetwork,
8159          * and interface->network_path was never set. */
8160         if (!data->interface->network_path) {
8161                 if (data->callback)
8162                         data->callback(result, data->interface,
8163                                                         data->user_data);
8164
8165                 g_free(data->path);
8166                 dbus_free(data);
8167                 return;
8168         }
8169
8170         if (result < 0 && data->callback) {
8171                 data->callback(result, data->interface, data->user_data);
8172                 data->callback = NULL;
8173         }
8174
8175         if (result != -ECONNABORTED) {
8176                 if (network_remove(data) < 0) {
8177                         g_free(data->path);
8178                         dbus_free(data);
8179                 }
8180         } else {
8181                 g_free(data->path);
8182                 dbus_free(data);
8183         }
8184 }
8185
8186 int g_supplicant_interface_disconnect(GSupplicantInterface *interface,
8187                                         GSupplicantInterfaceCallback callback,
8188                                                         void *user_data)
8189 {
8190         struct interface_data *data;
8191         int ret;
8192
8193         SUPPLICANT_DBG("");
8194
8195         if (!interface)
8196                 return -EINVAL;
8197
8198         if (!system_available)
8199                 return -EFAULT;
8200 #if defined TIZEN_EXT
8201         if (decrypt_request_data.pending_call &&
8202                         decrypt_request_data.data &&
8203                         decrypt_request_data.data->user_data == user_data) {
8204
8205                 callback_assoc_failed(decrypt_request_data.data->user_data);
8206                 crypt_method_call_cancel();
8207
8208                 return 0;
8209         }
8210 #endif
8211         data = dbus_malloc0(sizeof(*data));
8212         if (!data)
8213                 return -ENOMEM;
8214
8215         data->interface = interface;
8216         data->path = g_strdup(interface->path);
8217         data->callback = callback;
8218         data->user_data = user_data;
8219
8220         ret = supplicant_dbus_method_call(interface->path,
8221                         SUPPLICANT_INTERFACE ".Interface", "Disconnect",
8222                         NULL, interface_disconnect_result, data,
8223                         interface);
8224
8225         if (ret < 0) {
8226                 g_free(data->path);
8227                 dbus_free(data);
8228         }
8229
8230         return ret;
8231 }
8232
8233 #if defined TIZEN_EXT
8234 void g_supplicant_interface_remove_network(GSupplicantInterface *interface,
8235                                 GSupplicantSSID *ssid)
8236 {
8237         struct interface_data *data;
8238         int ret;
8239
8240         SUPPLICANT_DBG("");
8241
8242         if (!interface)
8243                 return;
8244
8245         if (interface->network_path == NULL)
8246                 return;
8247
8248         if (!interface->network_info.ssid)
8249                 return;
8250
8251         if (memcmp(interface->network_info.ssid, ssid->ssid, ssid->ssid_len))
8252                 return;
8253
8254         if (interface->network_info.security != ssid->security)
8255                 return;
8256
8257         data = dbus_malloc0(sizeof(*data));
8258         if (!data)
8259                 return;
8260
8261         data->interface = interface;
8262         data->path = g_strdup(interface->path);
8263
8264         ret = supplicant_dbus_method_call(interface->path,
8265                         SUPPLICANT_INTERFACE ".Interface", "RemoveNetwork",
8266                         network_remove_params, network_remove_result, data,
8267                         interface);
8268
8269         if (ret < 0) {
8270                 g_free(data->path);
8271                 dbus_free(data);
8272         }
8273 }
8274 #endif
8275
8276 static void interface_p2p_find_result(const char *error,
8277                                         DBusMessageIter *iter, void *user_data)
8278 {
8279         struct interface_scan_data *data = user_data;
8280         int err = 0;
8281
8282         SUPPLICANT_DBG("error %s", error);
8283
8284         if (error)
8285                 err = -EIO;
8286
8287         if (interface_exists(data->interface, data->path)) {
8288                 if (!data->interface->ready)
8289                         err = -ENOLINK;
8290                 if (!err)
8291                         data->interface->p2p_finding = true;
8292         }
8293
8294         if (data->callback)
8295                 data->callback(err, data->interface, data->user_data);
8296
8297         g_free(data->path);
8298         dbus_free(data);
8299 }
8300
8301 static void interface_p2p_find_params(DBusMessageIter *iter, void *user_data)
8302 {
8303         DBusMessageIter dict;
8304
8305         supplicant_dbus_dict_open(iter, &dict);
8306         supplicant_dbus_dict_close(iter, &dict);
8307 }
8308
8309 int g_supplicant_interface_p2p_find(GSupplicantInterface *interface,
8310                                         GSupplicantInterfaceCallback callback,
8311                                                         void *user_data)
8312 {
8313         struct interface_scan_data *data;
8314         int ret;
8315
8316         if (!interface->p2p_support)
8317                 return -ENOTSUP;
8318
8319         ret = interface_ready_to_scan(interface);
8320         if (ret && ret != -EALREADY)
8321                 return ret;
8322
8323         data = dbus_malloc0(sizeof(*data));
8324         if (!data)
8325                 return -ENOMEM;
8326
8327         data->interface = interface;
8328         data->path = g_strdup(interface->path);
8329         data->callback = callback;
8330         data->user_data = user_data;
8331
8332         ret = supplicant_dbus_method_call(interface->path,
8333                         SUPPLICANT_INTERFACE ".Interface.P2PDevice", "Find",
8334                         interface_p2p_find_params, interface_p2p_find_result,
8335                         data, interface);
8336         if (ret < 0) {
8337                 g_free(data->path);
8338                 dbus_free(data);
8339         }
8340
8341         return ret;
8342 }
8343
8344 bool g_supplicant_interface_is_p2p_finding(GSupplicantInterface *interface)
8345 {
8346         if (!interface)
8347                 return false;
8348
8349         return interface->p2p_finding;
8350 }
8351
8352 int g_supplicant_interface_p2p_stop_find(GSupplicantInterface *interface)
8353 {
8354         if (!interface->p2p_finding)
8355                 return 0;
8356
8357         SUPPLICANT_DBG("");
8358
8359         interface->p2p_finding = false;
8360
8361         return supplicant_dbus_method_call(interface->path,
8362                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "StopFind",
8363                 NULL, NULL, NULL, NULL);
8364 }
8365
8366 static void interface_p2p_connect_result(const char *error,
8367                                         DBusMessageIter *iter, void *user_data)
8368 {
8369         struct interface_connect_data *data = user_data;
8370         int err = 0;
8371
8372         SUPPLICANT_DBG("");
8373
8374         if (error) {
8375                 SUPPLICANT_DBG("error: %s", error);
8376                 err = parse_supplicant_error(iter);
8377         }
8378
8379         if (data->callback)
8380                 data->callback(err, data->interface, data->user_data);
8381
8382         g_free(data->path);
8383         g_free(data->peer->wps_pin);
8384         g_free(data->peer->path);
8385         g_free(data->peer);
8386         g_free(data);
8387 }
8388
8389 static void interface_p2p_connect_params(DBusMessageIter *iter, void *user_data)
8390 {
8391         struct interface_connect_data *data = user_data;
8392         const char *wps = "pbc";
8393         DBusMessageIter dict;
8394         int go_intent = 7;
8395
8396         SUPPLICANT_DBG("");
8397
8398         supplicant_dbus_dict_open(iter, &dict);
8399
8400         if (data->peer->master)
8401                 go_intent = 15;
8402
8403         if (data->peer->wps_pin)
8404                 wps = "pin";
8405
8406         supplicant_dbus_dict_append_basic(&dict, "peer",
8407                                 DBUS_TYPE_OBJECT_PATH, &data->peer->path);
8408         supplicant_dbus_dict_append_basic(&dict, "wps_method",
8409                                 DBUS_TYPE_STRING, &wps);
8410         if (data->peer->wps_pin) {
8411                 supplicant_dbus_dict_append_basic(&dict, "pin",
8412                                 DBUS_TYPE_STRING, &data->peer->wps_pin);
8413         }
8414
8415         supplicant_dbus_dict_append_basic(&dict, "go_intent",
8416                                         DBUS_TYPE_INT32, &go_intent);
8417
8418         supplicant_dbus_dict_close(iter, &dict);
8419 }
8420
8421 int g_supplicant_interface_p2p_connect(GSupplicantInterface *interface,
8422                                         GSupplicantPeerParams *peer_params,
8423                                         GSupplicantInterfaceCallback callback,
8424                                         void *user_data)
8425 {
8426         struct interface_connect_data *data;
8427         int ret;
8428
8429         SUPPLICANT_DBG("");
8430
8431         if (!interface->p2p_support)
8432                 return -ENOTSUP;
8433
8434         data = dbus_malloc0(sizeof(*data));
8435         if (!data)
8436                 return -ENOMEM;
8437
8438         data->interface = interface;
8439         data->path = g_strdup(interface->path);
8440         data->peer = peer_params;
8441         data->callback = callback;
8442         data->user_data = user_data;
8443
8444         ret = supplicant_dbus_method_call(interface->path,
8445                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "Connect",
8446                 interface_p2p_connect_params, interface_p2p_connect_result,
8447                 data, interface);
8448         if (ret < 0) {
8449                 g_free(data->path);
8450                 dbus_free(data);
8451                 return ret;
8452         }
8453
8454         return -EINPROGRESS;
8455 }
8456
8457 int g_supplicant_interface_p2p_disconnect(GSupplicantInterface *interface,
8458                                         GSupplicantPeerParams *peer_params)
8459 {
8460         GSupplicantPeer *peer;
8461         int count = 0;
8462         GSList *list;
8463
8464         SUPPLICANT_DBG("");
8465
8466         if (!interface->p2p_support)
8467                 return -ENOTSUP;
8468
8469         peer = g_hash_table_lookup(interface->peer_table, peer_params->path);
8470         if (!peer)
8471                 return -ENODEV;
8472
8473         for (list = peer->groups; list; list = list->next, count++) {
8474                 const char *group_obj_path = list->data;
8475                 GSupplicantInterface *g_interface;
8476                 GSupplicantGroup *group;
8477
8478                 group = g_hash_table_lookup(group_mapping, group_obj_path);
8479                 if (!group || !group->interface)
8480                         continue;
8481
8482                 g_interface = group->interface;
8483                 supplicant_dbus_method_call(g_interface->path,
8484                                 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
8485                                 "Disconnect", NULL, NULL, NULL, g_interface);
8486         }
8487
8488         if (count == 0 && peer->current_group_iface) {
8489                 supplicant_dbus_method_call(peer->current_group_iface->path,
8490                                 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
8491                                 "Disconnect", NULL, NULL, NULL,
8492                                 peer->current_group_iface->path);
8493         }
8494
8495         peer->current_group_iface = NULL;
8496
8497         return -EINPROGRESS;
8498 }
8499
8500 struct p2p_service_data {
8501         bool registration;
8502         GSupplicantInterface *interface;
8503         GSupplicantP2PServiceParams *service;
8504         GSupplicantInterfaceCallback callback;
8505         void *user_data;
8506 };
8507
8508 static void interface_p2p_service_result(const char *error,
8509                                         DBusMessageIter *iter, void *user_data)
8510 {
8511         struct p2p_service_data *data = user_data;
8512         int result = 0;
8513
8514         SUPPLICANT_DBG("%s result - %s", data->registration ?
8515                                 "Registration" : "Deletion",
8516                                 error ? error : "Success");
8517         if (error)
8518                 result = -EINVAL;
8519
8520         if (data->callback)
8521                 data->callback(result, data->interface, data->user_data);
8522
8523         g_free(data->service->query);
8524         g_free(data->service->response);
8525         g_free(data->service->service);
8526         g_free(data->service->wfd_ies);
8527         g_free(data->service);
8528         dbus_free(data);
8529 }
8530
8531 static void interface_p2p_service_params(DBusMessageIter *iter,
8532                                                         void *user_data)
8533 {
8534         struct p2p_service_data *data = user_data;
8535         GSupplicantP2PServiceParams *service;
8536         DBusMessageIter dict;
8537         const char *type;
8538
8539         SUPPLICANT_DBG("");
8540
8541         service = data->service;
8542
8543         supplicant_dbus_dict_open(iter, &dict);
8544
8545         if (service->query && service->response) {
8546                 type = "bonjour";
8547                 supplicant_dbus_dict_append_basic(&dict, "service_type",
8548                                                 DBUS_TYPE_STRING, &type);
8549                 supplicant_dbus_dict_append_fixed_array(&dict, "query",
8550                                         DBUS_TYPE_BYTE, &service->query,
8551                                         service->query_length);
8552                 supplicant_dbus_dict_append_fixed_array(&dict, "response",
8553                                         DBUS_TYPE_BYTE, &service->response,
8554                                         service->response_length);
8555         } else if (service->version && service->service) {
8556                 type = "upnp";
8557                 supplicant_dbus_dict_append_basic(&dict, "service_type",
8558                                                 DBUS_TYPE_STRING, &type);
8559                 supplicant_dbus_dict_append_basic(&dict, "version",
8560                                         DBUS_TYPE_INT32, &service->version);
8561                 supplicant_dbus_dict_append_basic(&dict, "service",
8562                                         DBUS_TYPE_STRING, &service->service);
8563         }
8564
8565         supplicant_dbus_dict_close(iter, &dict);
8566 }
8567
8568 int g_supplicant_interface_p2p_add_service(GSupplicantInterface *interface,
8569                                 GSupplicantInterfaceCallback callback,
8570                                 GSupplicantP2PServiceParams *p2p_service_params,
8571                                 void *user_data)
8572 {
8573         struct p2p_service_data *data;
8574         int ret;
8575
8576         SUPPLICANT_DBG("");
8577
8578         if (!interface->p2p_support)
8579                 return -ENOTSUP;
8580
8581         data = dbus_malloc0(sizeof(*data));
8582         if (!data)
8583                 return -ENOMEM;
8584
8585         data->registration = true;
8586         data->interface = interface;
8587         data->service = p2p_service_params;
8588         data->callback = callback;
8589         data->user_data = user_data;
8590
8591         ret = supplicant_dbus_method_call(interface->path,
8592                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "AddService",
8593                 interface_p2p_service_params, interface_p2p_service_result,
8594                 data, interface);
8595         if (ret < 0) {
8596                 dbus_free(data);
8597                 return ret;
8598         }
8599
8600         return -EINPROGRESS;
8601 }
8602
8603 int g_supplicant_interface_p2p_del_service(GSupplicantInterface *interface,
8604                                 GSupplicantP2PServiceParams *p2p_service_params)
8605 {
8606         struct p2p_service_data *data;
8607         int ret;
8608
8609         SUPPLICANT_DBG("");
8610
8611         if (!interface->p2p_support)
8612                 return -ENOTSUP;
8613
8614         data = dbus_malloc0(sizeof(*data));
8615         if (!data)
8616                 return -ENOMEM;
8617
8618         data->interface = interface;
8619         data->service = p2p_service_params;
8620
8621         ret = supplicant_dbus_method_call(interface->path,
8622                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeleteService",
8623                 interface_p2p_service_params, interface_p2p_service_result,
8624                 data, interface);
8625         if (ret < 0) {
8626                 dbus_free(data);
8627                 return ret;
8628         }
8629
8630         return -EINPROGRESS;
8631 }
8632
8633 struct p2p_listen_data {
8634         int period;
8635         int interval;
8636 };
8637
8638 static void interface_p2p_listen_params(DBusMessageIter *iter, void *user_data)
8639 {
8640         struct p2p_listen_data *params = user_data;
8641         DBusMessageIter dict;
8642
8643         supplicant_dbus_dict_open(iter, &dict);
8644
8645         supplicant_dbus_dict_append_basic(&dict, "period",
8646                                         DBUS_TYPE_INT32, &params->period);
8647         supplicant_dbus_dict_append_basic(&dict, "interval",
8648                                         DBUS_TYPE_INT32, &params->interval);
8649         supplicant_dbus_dict_close(iter, &dict);
8650 }
8651
8652 int g_supplicant_interface_p2p_listen(GSupplicantInterface *interface,
8653                                                 int period, int interval)
8654 {
8655         struct p2p_listen_data params;
8656
8657         SUPPLICANT_DBG("");
8658
8659         if (!interface->p2p_support)
8660                 return -ENOTSUP;
8661
8662         params.period = period;
8663         params.interval = interval;
8664
8665         return supplicant_dbus_method_call(interface->path,
8666                         SUPPLICANT_INTERFACE ".Interface.P2PDevice",
8667                         "ExtendedListen", interface_p2p_listen_params,
8668                         NULL, &params, NULL);
8669 }
8670
8671 static void widi_ies_params(DBusMessageIter *iter, void *user_data)
8672 {
8673         struct p2p_service_data *data = user_data;
8674         GSupplicantP2PServiceParams *service = data->service;
8675         DBusMessageIter array;
8676
8677         SUPPLICANT_DBG("%p - %d", service->wfd_ies, service->wfd_ies_length);
8678
8679         dbus_message_iter_open_container(iter, DBUS_TYPE_ARRAY,
8680                                         DBUS_TYPE_BYTE_AS_STRING, &array);
8681
8682         if (service->wfd_ies && service->wfd_ies_length > 0) {
8683                 dbus_message_iter_append_fixed_array(&array, DBUS_TYPE_BYTE,
8684                                 &service->wfd_ies, service->wfd_ies_length);
8685         }
8686
8687         dbus_message_iter_close_container(iter, &array);
8688 }
8689
8690 int g_supplicant_set_widi_ies(GSupplicantP2PServiceParams *p2p_service_params,
8691                                         GSupplicantInterfaceCallback callback,
8692                                         void *user_data)
8693 {
8694         struct p2p_service_data *data;
8695         int ret;
8696
8697         SUPPLICANT_DBG("");
8698
8699         if (!system_available)
8700                 return -EFAULT;
8701
8702         data = dbus_malloc0(sizeof(*data));
8703         if (!data)
8704                 return -ENOMEM;
8705
8706         data->service = p2p_service_params;
8707         data->callback = callback;
8708         data->user_data = user_data;
8709
8710         if (p2p_service_params->wfd_ies)
8711                 data->registration = true;
8712
8713         ret = supplicant_dbus_property_set(SUPPLICANT_PATH,
8714                                         SUPPLICANT_INTERFACE, "WFDIEs",
8715                                         DBUS_TYPE_ARRAY_AS_STRING
8716                                         DBUS_TYPE_BYTE_AS_STRING,
8717                                         widi_ies_params,
8718                                         interface_p2p_service_result,
8719                                         data, NULL);
8720         if (ret < 0 && ret != -EINPROGRESS) {
8721                 dbus_free(data);
8722                 return ret;
8723         }
8724
8725         return -EINPROGRESS;
8726 }
8727
8728
8729 static const char *g_supplicant_rule0 = "type=signal,"
8730                                         "path=" DBUS_PATH_DBUS ","
8731                                         "sender=" DBUS_SERVICE_DBUS ","
8732                                         "interface=" DBUS_INTERFACE_DBUS ","
8733                                         "member=NameOwnerChanged,"
8734                                         "arg0=" SUPPLICANT_SERVICE;
8735 static const char *g_supplicant_rule1 = "type=signal,"
8736                         "interface=" SUPPLICANT_INTERFACE;
8737 static const char *g_supplicant_rule2 = "type=signal,"
8738                         "interface=" SUPPLICANT_INTERFACE ".Interface";
8739 static const char *g_supplicant_rule3 = "type=signal,"
8740                         "interface=" SUPPLICANT_INTERFACE ".Interface.WPS";
8741 static const char *g_supplicant_rule4 = "type=signal,"
8742                         "interface=" SUPPLICANT_INTERFACE ".BSS";
8743 static const char *g_supplicant_rule5 = "type=signal,"
8744                         "interface=" SUPPLICANT_INTERFACE ".Network";
8745 #if !defined TIZEN_EXT
8746 static const char *g_supplicant_rule6 = "type=signal,"
8747                 "interface=" SUPPLICANT_INTERFACE ".Interface.P2PDevice";
8748 static const char *g_supplicant_rule7 = "type=signal,"
8749                 "interface=" SUPPLICANT_INTERFACE ".Peer";
8750 static const char *g_supplicant_rule8 = "type=signal,"
8751                 "interface=" SUPPLICANT_INTERFACE ".Group";
8752 #endif
8753 #if defined TIZEN_EXT_WIFI_MESH
8754 static const char *g_supplicant_rule9 = "type=signal,"
8755                 "interface=" SUPPLICANT_INTERFACE ".Interface.Mesh";
8756 #endif
8757
8758 static void invoke_introspect_method(void)
8759 {
8760         DBusMessage *message;
8761
8762         message = dbus_message_new_method_call(SUPPLICANT_SERVICE,
8763                                         SUPPLICANT_PATH,
8764                                         DBUS_INTERFACE_INTROSPECTABLE,
8765                                         "Introspect");
8766
8767         if (!message)
8768                 return;
8769
8770         dbus_message_set_no_reply(message, TRUE);
8771         dbus_connection_send(connection, message, NULL);
8772         dbus_message_unref(message);
8773 }
8774
8775 #if defined TIZEN_EXT && defined TIZEN_EXT_INS
8776 void g_supplicant_set_ins_settings(GSupplicantINSPreferredFreq preferred_freq_bssid,
8777                 bool last_connected_bssid, bool assoc_reject, bool signal_bssid,
8778                 unsigned int preferred_freq_bssid_score, unsigned int last_connected_bssid_score,
8779                 unsigned int assoc_reject_score, int signal_level3_5ghz, int signal_level3_24ghz)
8780 {
8781         ins_settings.preferred_freq_bssid = preferred_freq_bssid;
8782         ins_settings.last_connected_bssid = last_connected_bssid;
8783         ins_settings.assoc_reject = assoc_reject;
8784         ins_settings.signal_bssid = signal_bssid;
8785         ins_settings.preferred_freq_bssid_score = preferred_freq_bssid_score;
8786         ins_settings.last_connected_bssid_score = last_connected_bssid_score;
8787         ins_settings.assoc_reject_score = assoc_reject_score;
8788         ins_settings.signal_level3_5ghz = signal_level3_5ghz;
8789         ins_settings.signal_level3_24ghz = signal_level3_24ghz;
8790
8791         SUPPLICANT_DBG("preferred_freq_bssid [%s]", preferred_freq_bssid ? "true" : "false");
8792         SUPPLICANT_DBG("preferred_freq_bssid_score [%d]", preferred_freq_bssid_score);
8793         SUPPLICANT_DBG("last_connected_bssid [%s]", last_connected_bssid ? "true" : "false");
8794         SUPPLICANT_DBG("last_connected_bssid_score [%d]", last_connected_bssid_score);
8795         SUPPLICANT_DBG("assoc_reject [%s]", assoc_reject ? "true" : "false");
8796         SUPPLICANT_DBG("assoc_reject_score [%d]", assoc_reject_score);
8797         SUPPLICANT_DBG("signal_bssid [%s]", signal_bssid ? "true" : "false");
8798         SUPPLICANT_DBG("signal_level3_5ghz [%d]", signal_level3_5ghz);
8799         SUPPLICANT_DBG("signal_level3_24ghz [%d]", signal_level3_24ghz);
8800 }
8801 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_INS */
8802
8803 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
8804 void g_supplicant_register_eap_callback(g_supplicant_eap_callback cb)
8805 {
8806         SUPPLICANT_DBG("g_supplicant_register_eap_callback %p", cb);
8807
8808         if (!callbacks_pointer) {
8809                 SUPPLICANT_DBG("callbacks_pointer is NULL");
8810                 return;
8811         }
8812
8813         callbacks_pointer->eap = cb;
8814 }
8815
8816 void g_supplicant_unregister_eap_callback(void)
8817 {
8818         SUPPLICANT_DBG("g_supplicant_unregister_eap_callback");
8819
8820         if (!callbacks_pointer) {
8821                 SUPPLICANT_DBG("callbacks_pointer is NULL");
8822                 return;
8823         }
8824
8825         callbacks_pointer->eap = NULL;
8826 }
8827 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
8828
8829 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
8830 int g_supplicant_register(GSupplicantCallbacks *callbacks)
8831 #else /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
8832 int g_supplicant_register(const GSupplicantCallbacks *callbacks)
8833 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
8834 {
8835         connection = dbus_bus_get(DBUS_BUS_SYSTEM, NULL);
8836         if (!connection)
8837                 return -EIO;
8838
8839         if (!dbus_connection_add_filter(connection, g_supplicant_filter,
8840                                                 NULL, NULL)) {
8841                 dbus_connection_unref(connection);
8842                 connection = NULL;
8843                 return -EIO;
8844         }
8845 #if defined TIZEN_EXT
8846         simplified_log = connman_setting_get_bool("SimplifiedLog");
8847 #endif
8848         callbacks_pointer = callbacks;
8849         eap_methods = 0;
8850
8851         interface_table = g_hash_table_new_full(g_str_hash, g_str_equal,
8852                                                 NULL, remove_interface);
8853
8854         bss_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
8855                                                                 NULL, NULL);
8856         peer_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
8857                                                                 NULL, NULL);
8858         group_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
8859                                                                 NULL, NULL);
8860         pending_peer_connection = g_hash_table_new_full(g_str_hash, g_str_equal,
8861                                                                 NULL, NULL);
8862         config_file_table = g_hash_table_new_full(g_str_hash, g_str_equal,
8863                                                                 g_free, g_free);
8864
8865         supplicant_dbus_setup(connection);
8866
8867         dbus_bus_add_match(connection, g_supplicant_rule0, NULL);
8868         dbus_bus_add_match(connection, g_supplicant_rule1, NULL);
8869         dbus_bus_add_match(connection, g_supplicant_rule2, NULL);
8870         dbus_bus_add_match(connection, g_supplicant_rule3, NULL);
8871         dbus_bus_add_match(connection, g_supplicant_rule4, NULL);
8872         dbus_bus_add_match(connection, g_supplicant_rule5, NULL);
8873 #if defined TIZEN_EXT
8874         dbus_bus_add_match(connection,
8875                         "type=signal,interface=org.tizen.system.deviced.PowerOff,"
8876                         "member=ChangeState", NULL);
8877 #endif
8878 #if !defined TIZEN_EXT
8879         dbus_bus_add_match(connection, g_supplicant_rule6, NULL);
8880         dbus_bus_add_match(connection, g_supplicant_rule7, NULL);
8881         dbus_bus_add_match(connection, g_supplicant_rule8, NULL);
8882 #endif
8883 #if defined TIZEN_EXT_WIFI_MESH
8884         dbus_bus_add_match(connection, g_supplicant_rule9, NULL);
8885 #endif
8886         dbus_connection_flush(connection);
8887
8888         if (dbus_bus_name_has_owner(connection,
8889                                         SUPPLICANT_SERVICE, NULL)) {
8890                 system_available = TRUE;
8891                 supplicant_dbus_property_get_all(SUPPLICANT_PATH,
8892                                                 SUPPLICANT_INTERFACE,
8893                                                 service_property, NULL, NULL);
8894         } else
8895                 invoke_introspect_method();
8896
8897         SUPPLICANT_DBG("supplicant dbus setup completed");
8898         return 0;
8899 }
8900
8901 static void unregister_interface_remove_params(DBusMessageIter *iter,
8902                                                 void *user_data)
8903 {
8904         const char *path = user_data;
8905
8906         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
8907                                                         &path);
8908 }
8909
8910
8911 static void unregister_remove_interface(gpointer key, gpointer value,
8912                                                 gpointer user_data)
8913 {
8914         GSupplicantInterface *interface = value;
8915
8916         supplicant_dbus_method_call(SUPPLICANT_PATH,
8917                                         SUPPLICANT_INTERFACE,
8918                                         "RemoveInterface",
8919                                         unregister_interface_remove_params,
8920                                         NULL, interface->path, NULL);
8921 }
8922
8923 void g_supplicant_unregister(const GSupplicantCallbacks *callbacks)
8924 {
8925         SUPPLICANT_DBG("");
8926
8927         if (connection) {
8928 #if defined TIZEN_EXT_WIFI_MESH
8929                 dbus_bus_remove_match(connection, g_supplicant_rule9, NULL);
8930 #endif
8931 #if !defined TIZEN_EXT
8932                 dbus_bus_remove_match(connection, g_supplicant_rule8, NULL);
8933                 dbus_bus_remove_match(connection, g_supplicant_rule7, NULL);
8934                 dbus_bus_remove_match(connection, g_supplicant_rule6, NULL);
8935 #endif
8936                 dbus_bus_remove_match(connection, g_supplicant_rule5, NULL);
8937                 dbus_bus_remove_match(connection, g_supplicant_rule4, NULL);
8938                 dbus_bus_remove_match(connection, g_supplicant_rule3, NULL);
8939                 dbus_bus_remove_match(connection, g_supplicant_rule2, NULL);
8940                 dbus_bus_remove_match(connection, g_supplicant_rule1, NULL);
8941                 dbus_bus_remove_match(connection, g_supplicant_rule0, NULL);
8942                 dbus_connection_flush(connection);
8943
8944                 dbus_connection_remove_filter(connection,
8945                                                 g_supplicant_filter, NULL);
8946         }
8947
8948         if (config_file_table) {
8949                 g_hash_table_destroy(config_file_table);
8950                 config_file_table = NULL;
8951         }
8952
8953         if (bss_mapping) {
8954                 g_hash_table_destroy(bss_mapping);
8955                 bss_mapping = NULL;
8956         }
8957
8958         if (peer_mapping) {
8959                 g_hash_table_destroy(peer_mapping);
8960                 peer_mapping = NULL;
8961         }
8962
8963         if (group_mapping) {
8964                 g_hash_table_destroy(group_mapping);
8965                 group_mapping = NULL;
8966         }
8967
8968         if (interface_table) {
8969                 g_hash_table_foreach(interface_table,
8970                                         unregister_remove_interface, NULL);
8971                 g_hash_table_destroy(interface_table);
8972                 interface_table = NULL;
8973         }
8974
8975         if (system_available)
8976                 callback_system_killed();
8977
8978         if (connection) {
8979                 dbus_connection_unref(connection);
8980                 connection = NULL;
8981         }
8982
8983         callbacks_pointer = NULL;
8984         eap_methods = 0;
8985 }
8986
8987 #ifdef TIZEN_EXT
8988 struct supplicant_mac_policy {
8989         GSupplicantMacPolicyCallback callback;
8990         dbus_uint32_t policy;
8991         const void *user_data;
8992 };
8993
8994 static void mac_policy_result(const char *error,
8995                                 DBusMessageIter *iter, void *user_data)
8996 {
8997         struct supplicant_mac_policy *data = user_data;
8998         int result = 0;
8999
9000         if (!user_data)
9001                 return;
9002
9003         if (error) {
9004                 SUPPLICANT_DBG("Mac policy setting failure %s", error);
9005                 result = -EINVAL;
9006         }
9007
9008         if (data->callback)
9009                 data->callback(result, data->policy,
9010                                         (void *) data->user_data);
9011
9012         dbus_free(data);
9013 }
9014
9015 static void mac_policy_params(DBusMessageIter *iter, void *user_data)
9016 {
9017         struct supplicant_mac_policy *data = user_data;
9018
9019         dbus_message_iter_append_basic(iter, DBUS_TYPE_INT32, &(data->policy));
9020 }
9021
9022 int g_supplicant_interface_set_mac_policy(GSupplicantInterface *interface,
9023                                         GSupplicantMacPolicyCallback callback,
9024                                                         unsigned int policy,
9025                                                         void *user_data)
9026 {
9027         struct supplicant_mac_policy *data = NULL;
9028         int ret;
9029
9030         if (!system_available)
9031                 return -EFAULT;
9032
9033         if (!interface)
9034                 return -EINVAL;
9035
9036         data = dbus_malloc0(sizeof(*data));
9037         if (!data)
9038                 return -ENOMEM;
9039
9040         data->callback = callback;
9041         data->policy = policy;
9042         data->user_data = user_data;
9043
9044         ret =  supplicant_dbus_property_set(interface->path,
9045                                 SUPPLICANT_INTERFACE ".Interface",
9046                                 "MacAddr", DBUS_TYPE_INT32_AS_STRING,
9047                                 mac_policy_params, mac_policy_result, data, NULL);
9048         if (ret < 0) {
9049                 SUPPLICANT_DBG("Unable to set MacAddr configuration");
9050                 dbus_free(data);
9051         }
9052
9053         return ret;
9054 }
9055
9056 int g_supplicant_interface_set_preassoc_mac_policy(GSupplicantInterface *interface,
9057                                         GSupplicantMacPolicyCallback callback,
9058                                                         unsigned int policy,
9059                                                         void *user_data)
9060 {
9061         struct supplicant_mac_policy *data;
9062         int ret;
9063
9064         if (!system_available)
9065                 return -EFAULT;
9066
9067         if (!interface)
9068                 return -EINVAL;
9069
9070         data = dbus_malloc0(sizeof(*data));
9071         if (!data)
9072                 return -ENOMEM;
9073
9074         data->callback = callback;
9075         data->policy = policy;
9076         data->user_data = user_data;
9077
9078         ret =  supplicant_dbus_property_set(interface->path,
9079                                 SUPPLICANT_INTERFACE ".Interface",
9080                                 "PreassocMacAddr", DBUS_TYPE_INT32_AS_STRING,
9081                                 mac_policy_params, mac_policy_result, data, NULL);
9082         if (ret < 0) {
9083                 SUPPLICANT_DBG("Unable to set PreassocMacAddr configuration");
9084                 dbus_free(data);
9085         }
9086
9087         return ret;
9088 }
9089
9090 struct supplicant_random_mac_lifetime {
9091         GSupplicantRandomMaclifetimeCallback callback;
9092         dbus_uint32_t lifetime;
9093         const void *user_data;
9094 };
9095
9096 static void random_mac_lifetime_result(const char *error,
9097                                 DBusMessageIter *iter, void *user_data)
9098 {
9099         struct supplicant_random_mac_lifetime *data = user_data;
9100         int result = 0;
9101
9102         if (!user_data)
9103                 return;
9104
9105         if (error) {
9106                 SUPPLICANT_DBG("Random Mac lifetime setting failure %s", error);
9107                 result = -EINVAL;
9108         }
9109
9110         if (data->callback)
9111                 data->callback(result, data->lifetime,
9112                                         (void *) data->user_data);
9113
9114         dbus_free(data);
9115 }
9116
9117 static void random_mac_lifetime_params(DBusMessageIter *iter, void *user_data)
9118 {
9119         struct supplicant_random_mac_lifetime *data = user_data;
9120
9121         dbus_message_iter_append_basic(iter, DBUS_TYPE_UINT32, &(data->lifetime));
9122 }
9123
9124 int g_supplicant_interface_set_random_mac_lifetime(GSupplicantInterface *interface,
9125                                         GSupplicantRandomMaclifetimeCallback callback,
9126                                                         unsigned int lifetime,
9127                                                         void *user_data)
9128 {
9129         struct supplicant_random_mac_lifetime *data;
9130         int ret;
9131
9132         if (!system_available)
9133                 return -EFAULT;
9134
9135         if (!interface)
9136                 return -EINVAL;
9137
9138         data = dbus_malloc0(sizeof(*data));
9139         if (!data)
9140                 return -ENOMEM;
9141
9142         data->callback = callback;
9143         data->lifetime = lifetime;
9144         data->user_data = user_data;
9145
9146         ret =  supplicant_dbus_property_set(interface->path,
9147                                 SUPPLICANT_INTERFACE ".Interface",
9148                                 "RandAddrLifetime", DBUS_TYPE_UINT32_AS_STRING,
9149                                 random_mac_lifetime_params, random_mac_lifetime_result,
9150                                 data, NULL);
9151         if (ret < 0) {
9152                 SUPPLICANT_DBG("Unable to set RandAddrLifetime configuration");
9153                 dbus_free(data);
9154         }
9155
9156         return ret;
9157 }
9158 #endif