3 * WPA supplicant library with GLib integration
5 * Copyright (C) 2012-2013 Intel Corporation. All rights reserved.
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
34 #include <netinet/if_ether.h>
35 #include <netinet/in.h>
41 #include "gsupplicant.h"
43 #define IEEE80211_CAP_ESS 0x0001
44 #define IEEE80211_CAP_IBSS 0x0002
45 #define IEEE80211_CAP_PRIVACY 0x0010
47 #define BSS_UNKNOWN_STRENGTH -90
49 static DBusConnection *connection;
51 static const GSupplicantCallbacks *callbacks_pointer;
53 static dbus_bool_t system_available = FALSE;
54 static dbus_bool_t system_ready = FALSE;
56 static dbus_int32_t debug_level;
57 static dbus_bool_t debug_timestamp = FALSE;
58 static dbus_bool_t debug_showkeys = FALSE;
60 static const char *debug_strings[] = {
61 "msgdump", "debug", "info", "warning", "error", NULL
64 static unsigned int eap_methods;
71 static struct strvalmap eap_method_map[] = {
72 { "MD5", G_SUPPLICANT_EAP_METHOD_MD5 },
73 { "TLS", G_SUPPLICANT_EAP_METHOD_TLS },
74 { "MSCHAPV2", G_SUPPLICANT_EAP_METHOD_MSCHAPV2 },
75 { "PEAP", G_SUPPLICANT_EAP_METHOD_PEAP },
76 { "TTLS", G_SUPPLICANT_EAP_METHOD_TTLS },
77 { "GTC", G_SUPPLICANT_EAP_METHOD_GTC },
78 { "OTP", G_SUPPLICANT_EAP_METHOD_OTP },
79 { "LEAP", G_SUPPLICANT_EAP_METHOD_LEAP },
80 { "WSC", G_SUPPLICANT_EAP_METHOD_WSC },
84 static struct strvalmap keymgmt_map[] = {
85 { "none", G_SUPPLICANT_KEYMGMT_NONE },
86 { "ieee8021x", G_SUPPLICANT_KEYMGMT_IEEE8021X },
87 { "wpa-none", G_SUPPLICANT_KEYMGMT_WPA_NONE },
88 { "wpa-psk", G_SUPPLICANT_KEYMGMT_WPA_PSK },
89 { "wpa-psk-sha256", G_SUPPLICANT_KEYMGMT_WPA_PSK_256 },
90 { "wpa-ft-psk", G_SUPPLICANT_KEYMGMT_WPA_FT_PSK },
91 { "wpa-ft-eap", G_SUPPLICANT_KEYMGMT_WPA_FT_EAP },
92 { "wpa-eap", G_SUPPLICANT_KEYMGMT_WPA_EAP },
93 { "wpa-eap-sha256", G_SUPPLICANT_KEYMGMT_WPA_EAP_256 },
94 { "wps", G_SUPPLICANT_KEYMGMT_WPS },
98 static struct strvalmap authalg_capa_map[] = {
99 { "open", G_SUPPLICANT_CAPABILITY_AUTHALG_OPEN },
100 { "shared", G_SUPPLICANT_CAPABILITY_AUTHALG_SHARED },
101 { "leap", G_SUPPLICANT_CAPABILITY_AUTHALG_LEAP },
105 static struct strvalmap proto_capa_map[] = {
106 { "wpa", G_SUPPLICANT_CAPABILITY_PROTO_WPA },
107 { "rsn", G_SUPPLICANT_CAPABILITY_PROTO_RSN },
111 static struct strvalmap group_map[] = {
112 { "wep40", G_SUPPLICANT_GROUP_WEP40 },
113 { "wep104", G_SUPPLICANT_GROUP_WEP104 },
114 { "tkip", G_SUPPLICANT_GROUP_TKIP },
115 { "ccmp", G_SUPPLICANT_GROUP_CCMP },
119 static struct strvalmap pairwise_map[] = {
120 { "none", G_SUPPLICANT_PAIRWISE_NONE },
121 { "tkip", G_SUPPLICANT_PAIRWISE_TKIP },
122 { "ccmp", G_SUPPLICANT_PAIRWISE_CCMP },
126 static struct strvalmap scan_capa_map[] = {
127 { "active", G_SUPPLICANT_CAPABILITY_SCAN_ACTIVE },
128 { "passive", G_SUPPLICANT_CAPABILITY_SCAN_PASSIVE },
129 { "ssid", G_SUPPLICANT_CAPABILITY_SCAN_SSID },
133 static struct strvalmap mode_capa_map[] = {
134 { "infrastructure", G_SUPPLICANT_CAPABILITY_MODE_INFRA },
135 { "ad-hoc", G_SUPPLICANT_CAPABILITY_MODE_IBSS },
136 { "ap", G_SUPPLICANT_CAPABILITY_MODE_AP },
137 { "p2p", G_SUPPLICANT_CAPABILITY_MODE_P2P },
141 static GHashTable *interface_table;
142 static GHashTable *bss_mapping;
143 static GHashTable *peer_mapping;
144 static GHashTable *group_mapping;
145 static GHashTable *pending_peer_connection;
146 static GHashTable *config_file_table;
148 struct _GSupplicantWpsCredentials {
149 unsigned char ssid[32];
150 unsigned int ssid_len;
154 struct added_network_information {
156 GSupplicantSecurity security;
158 char * private_passphrase;
161 struct _GSupplicantInterface {
164 unsigned int keymgmt_capa;
165 unsigned int authalg_capa;
166 unsigned int proto_capa;
167 unsigned int group_capa;
168 unsigned int pairwise_capa;
169 unsigned int scan_capa;
170 unsigned int mode_capa;
171 unsigned int max_scan_ssids;
174 bool ap_create_in_progress;
176 GSupplicantState state;
177 dbus_bool_t scanning;
178 GSupplicantInterfaceCallback scan_callback;
184 struct _GSupplicantWpsCredentials wps_cred;
185 GSupplicantWpsState wps_state;
186 GHashTable *network_table;
187 GHashTable *peer_table;
188 GHashTable *group_table;
189 GHashTable *bss_mapping;
191 const char *pending_peer_path;
192 GSupplicantNetwork *current_network;
193 struct added_network_information network_info;
194 #if defined TIZEN_EXT
195 int disconnect_reason;
199 struct g_supplicant_bss {
200 GSupplicantInterface *interface;
202 unsigned char bssid[6];
203 unsigned char ssid[32];
204 unsigned int ssid_len;
205 dbus_uint16_t frequency;
206 dbus_uint32_t maxrate;
208 GSupplicantMode mode;
209 GSupplicantSecurity security;
210 dbus_bool_t rsn_selected;
211 unsigned int wpa_keymgmt;
212 unsigned int wpa_pairwise;
213 unsigned int wpa_group;
214 unsigned int rsn_keymgmt;
215 unsigned int rsn_pairwise;
216 unsigned int rsn_group;
217 unsigned int keymgmt;
220 dbus_bool_t ieee8021x;
221 #if defined TIZEN_EXT
223 dbus_bool_t ft_ieee8021x;
227 unsigned int wps_capabilities;
230 struct _GSupplicantNetwork {
231 GSupplicantInterface *interface;
235 unsigned char ssid[32];
236 unsigned int ssid_len;
238 dbus_uint16_t frequency;
239 struct g_supplicant_bss *best_bss;
240 GSupplicantMode mode;
241 GSupplicantSecurity security;
243 unsigned int wps_capabilities;
244 GHashTable *bss_table;
245 GHashTable *config_table;
246 #if defined TIZEN_EXT
251 unsigned int keymgmt;
256 struct _GSupplicantPeer {
257 GSupplicantInterface *interface;
259 unsigned char device_address[ETH_ALEN];
260 unsigned char iface_address[ETH_ALEN];
262 unsigned char *widi_ies;
265 unsigned int wps_capabilities;
267 const GSupplicantInterface *current_group_iface;
268 bool connection_requested;
271 struct _GSupplicantGroup {
272 GSupplicantInterface *interface;
273 GSupplicantInterface *orig_interface;
279 struct interface_data {
280 GSupplicantInterface *interface;
281 char *path; /* Interface path cannot be taken from interface (above) as
282 * it might have been freed already.
284 GSupplicantInterfaceCallback callback;
286 bool network_remove_in_progress;
287 GSupplicantSSID *ssid;
290 struct interface_create_data {
294 GSupplicantInterface *interface;
295 GSupplicantInterfaceCallback callback;
299 struct interface_connect_data {
300 GSupplicantInterface *interface;
302 GSupplicantInterfaceCallback callback;
305 GSupplicantSSID *ssid;
306 GSupplicantPeerParams *peer;
310 struct interface_scan_data {
311 GSupplicantInterface *interface;
313 GSupplicantInterfaceCallback callback;
314 GSupplicantScanParams *scan_params;
318 static int network_remove(struct interface_data *data);
320 static inline void debug(const char *format, ...)
325 if (!callbacks_pointer || !callbacks_pointer->debug)
328 va_start(ap, format);
330 if (vsnprintf(str, sizeof(str), format, ap) > 0)
331 callbacks_pointer->debug(str);
336 #define SUPPLICANT_DBG(fmt, arg...) \
337 debug("%s:%s() " fmt, __FILE__, __FUNCTION__ , ## arg);
339 static GSupplicantMode string2mode(const char *mode)
342 return G_SUPPLICANT_MODE_UNKNOWN;
344 if (g_str_equal(mode, "infrastructure"))
345 return G_SUPPLICANT_MODE_INFRA;
346 else if (g_str_equal(mode, "ad-hoc"))
347 return G_SUPPLICANT_MODE_IBSS;
349 return G_SUPPLICANT_MODE_UNKNOWN;
352 static const char *mode2string(GSupplicantMode mode)
355 case G_SUPPLICANT_MODE_UNKNOWN:
357 case G_SUPPLICANT_MODE_INFRA:
359 case G_SUPPLICANT_MODE_IBSS:
361 case G_SUPPLICANT_MODE_MASTER:
368 static const char *security2string(GSupplicantSecurity security)
371 case G_SUPPLICANT_SECURITY_UNKNOWN:
373 case G_SUPPLICANT_SECURITY_NONE:
375 case G_SUPPLICANT_SECURITY_WEP:
377 case G_SUPPLICANT_SECURITY_PSK:
379 case G_SUPPLICANT_SECURITY_IEEE8021X:
381 #if defined TIZEN_EXT
382 case G_SUPPLICANT_SECURITY_FT_PSK:
384 case G_SUPPLICANT_SECURITY_FT_IEEE8021X:
385 return "ft_ieee8021x";
392 static GSupplicantState string2state(const char *state)
395 return G_SUPPLICANT_STATE_UNKNOWN;
397 if (g_str_equal(state, "unknown"))
398 return G_SUPPLICANT_STATE_UNKNOWN;
399 else if (g_str_equal(state, "interface_disabled"))
400 return G_SUPPLICANT_STATE_DISABLED;
401 else if (g_str_equal(state, "disconnected"))
402 return G_SUPPLICANT_STATE_DISCONNECTED;
403 else if (g_str_equal(state, "inactive"))
404 return G_SUPPLICANT_STATE_INACTIVE;
405 else if (g_str_equal(state, "scanning"))
406 return G_SUPPLICANT_STATE_SCANNING;
407 else if (g_str_equal(state, "authenticating"))
408 return G_SUPPLICANT_STATE_AUTHENTICATING;
409 else if (g_str_equal(state, "associating"))
410 return G_SUPPLICANT_STATE_ASSOCIATING;
411 else if (g_str_equal(state, "associated"))
412 return G_SUPPLICANT_STATE_ASSOCIATED;
413 else if (g_str_equal(state, "group_handshake"))
414 return G_SUPPLICANT_STATE_GROUP_HANDSHAKE;
415 else if (g_str_equal(state, "4way_handshake"))
416 return G_SUPPLICANT_STATE_4WAY_HANDSHAKE;
417 else if (g_str_equal(state, "completed"))
418 return G_SUPPLICANT_STATE_COMPLETED;
420 return G_SUPPLICANT_STATE_UNKNOWN;
423 static bool compare_network_parameters(GSupplicantInterface *interface,
424 GSupplicantSSID *ssid)
426 if (memcmp(interface->network_info.ssid, ssid->ssid, ssid->ssid_len))
429 if (interface->network_info.security != ssid->security)
432 if (interface->network_info.passphrase &&
433 g_strcmp0(interface->network_info.passphrase,
434 ssid->passphrase) != 0) {
438 if (interface->network_info.private_passphrase &&
439 g_strcmp0(interface->network_info.private_passphrase,
440 ssid->private_key_passphrase) != 0) {
447 static void remove_network_information(GSupplicantInterface * interface)
449 g_free(interface->network_info.ssid);
450 g_free(interface->network_info.passphrase);
451 g_free(interface->network_info.private_passphrase);
452 interface->network_info.ssid = NULL;
453 interface->network_info.passphrase = NULL;
454 interface->network_info.private_passphrase = NULL;
457 static int store_network_information(GSupplicantInterface * interface,
458 GSupplicantSSID *ssid)
460 interface->network_info.ssid = g_malloc(ssid->ssid_len + 1);
461 if (interface->network_info.ssid != NULL) {
462 memcpy(interface->network_info.ssid, ssid->ssid,
464 interface->network_info.ssid[ssid->ssid_len] = '\0';
469 interface->network_info.security = ssid->security;
471 if ((ssid->security == G_SUPPLICANT_SECURITY_WEP ||
472 ssid->security == G_SUPPLICANT_SECURITY_PSK ||
473 ssid->security == G_SUPPLICANT_SECURITY_NONE) &&
475 interface->network_info.passphrase = g_strdup(ssid->passphrase);
478 if (ssid->security == G_SUPPLICANT_SECURITY_IEEE8021X &&
479 ssid->private_key_passphrase) {
480 interface->network_info.private_passphrase =
481 g_strdup(ssid->private_key_passphrase);
487 static void callback_system_ready(void)
494 if (!callbacks_pointer)
497 if (!callbacks_pointer->system_ready)
500 callbacks_pointer->system_ready();
503 static void callback_system_killed(void)
505 system_ready = FALSE;
507 if (!callbacks_pointer)
510 if (!callbacks_pointer->system_killed)
513 callbacks_pointer->system_killed();
516 static void callback_interface_added(GSupplicantInterface *interface)
520 if (!callbacks_pointer)
523 if (!callbacks_pointer->interface_added)
526 callbacks_pointer->interface_added(interface);
529 static void callback_interface_state(GSupplicantInterface *interface)
531 if (!callbacks_pointer)
534 if (!callbacks_pointer->interface_state)
537 callbacks_pointer->interface_state(interface);
540 static void callback_interface_removed(GSupplicantInterface *interface)
542 if (!callbacks_pointer)
545 if (!callbacks_pointer->interface_removed)
548 callbacks_pointer->interface_removed(interface);
551 #if !defined TIZEN_EXT
552 static void callback_p2p_support(GSupplicantInterface *interface)
556 if (!interface->p2p_support)
559 if (callbacks_pointer && callbacks_pointer->p2p_support)
560 callbacks_pointer->p2p_support(interface);
564 static void callback_scan_started(GSupplicantInterface *interface)
566 if (!callbacks_pointer)
569 if (!callbacks_pointer->scan_started)
572 callbacks_pointer->scan_started(interface);
575 static void callback_ap_create_fail(GSupplicantInterface *interface)
577 if (!callbacks_pointer)
580 if (!callbacks_pointer->ap_create_fail)
583 callbacks_pointer->ap_create_fail(interface);
586 static void callback_scan_finished(GSupplicantInterface *interface)
588 if (!callbacks_pointer)
591 if (!callbacks_pointer->scan_finished)
594 callbacks_pointer->scan_finished(interface);
597 static void callback_network_added(GSupplicantNetwork *network)
599 if (!callbacks_pointer)
602 if (!callbacks_pointer->network_added)
605 callbacks_pointer->network_added(network);
608 static void callback_network_removed(GSupplicantNetwork *network)
610 if (!callbacks_pointer)
613 if (!callbacks_pointer->network_removed)
616 callbacks_pointer->network_removed(network);
619 #if defined TIZEN_EXT
620 static void callback_network_merged(GSupplicantNetwork *network)
622 if (!callbacks_pointer)
625 if (!callbacks_pointer->network_merged)
628 callbacks_pointer->network_merged(network);
631 static void callback_assoc_failed(void *user_data)
633 if (!callbacks_pointer)
636 if (!callbacks_pointer->assoc_failed)
639 callbacks_pointer->assoc_failed(user_data);
643 static void callback_network_changed(GSupplicantNetwork *network,
644 const char *property)
646 if (!callbacks_pointer)
649 if (!callbacks_pointer->network_changed)
652 callbacks_pointer->network_changed(network, property);
655 static void callback_network_associated(GSupplicantNetwork *network)
657 if (!callbacks_pointer)
660 if (!callbacks_pointer->network_associated)
663 callbacks_pointer->network_associated(network);
666 static void callback_peer_found(GSupplicantPeer *peer)
668 if (!callbacks_pointer)
671 if (!callbacks_pointer->peer_found)
674 callbacks_pointer->peer_found(peer);
677 static void callback_peer_lost(GSupplicantPeer *peer)
679 if (!callbacks_pointer)
682 if (!callbacks_pointer->peer_lost)
685 callbacks_pointer->peer_lost(peer);
688 static void callback_peer_changed(GSupplicantPeer *peer,
689 GSupplicantPeerState state)
691 if (!callbacks_pointer)
694 if (!callbacks_pointer->peer_changed)
697 callbacks_pointer->peer_changed(peer, state);
700 static void callback_peer_request(GSupplicantPeer *peer)
702 if (!callbacks_pointer)
705 if (!callbacks_pointer->peer_request)
708 peer->connection_requested = true;
710 callbacks_pointer->peer_request(peer);
713 static void callback_disconnect_reason_code(GSupplicantInterface *interface,
716 if (!callbacks_pointer)
719 if (!callbacks_pointer->disconnect_reasoncode)
722 if (reason_code != 0)
723 callbacks_pointer->disconnect_reasoncode(interface,
727 static void callback_assoc_status_code(GSupplicantInterface *interface,
730 if (!callbacks_pointer)
733 if (!callbacks_pointer->assoc_status_code)
736 callbacks_pointer->assoc_status_code(interface, status_code);
740 static void remove_group(gpointer data)
742 GSupplicantGroup *group = data;
745 g_slist_free_full(group->members, g_free);
751 static void remove_interface(gpointer data)
753 GSupplicantInterface *interface = data;
755 g_hash_table_destroy(interface->bss_mapping);
756 g_hash_table_destroy(interface->network_table);
757 g_hash_table_destroy(interface->peer_table);
758 g_hash_table_destroy(interface->group_table);
760 if (interface->scan_callback) {
761 SUPPLICANT_DBG("call interface %p callback %p scanning %d",
762 interface, interface->scan_callback,
763 interface->scanning);
765 interface->scan_callback(-EIO, interface, interface->scan_data);
766 interface->scan_callback = NULL;
767 interface->scan_data = NULL;
769 if (interface->scanning) {
770 interface->scanning = FALSE;
771 callback_scan_finished(interface);
775 callback_interface_removed(interface);
777 g_free(interface->wps_cred.key);
778 g_free(interface->path);
779 g_free(interface->network_path);
780 #if defined TIZEN_EXT
781 interface->network_path = NULL;
783 g_free(interface->ifname);
784 g_free(interface->driver);
785 g_free(interface->bridge);
786 remove_network_information(interface);
790 static void remove_network(gpointer data)
792 GSupplicantNetwork *network = data;
794 g_hash_table_destroy(network->bss_table);
796 callback_network_removed(network);
798 g_hash_table_destroy(network->config_table);
800 g_free(network->path);
801 g_free(network->group);
802 g_free(network->name);
803 #if defined TIZEN_EXT
804 g_free(network->eap);
805 g_free(network->identity);
806 g_free(network->phase2);
808 #if defined TIZEN_EXT
809 g_slist_free_full(network->vsie_list, g_free);
815 static void remove_bss(gpointer data)
817 struct g_supplicant_bss *bss = data;
820 #if defined TIZEN_EXT
821 g_slist_free_full(bss->vsie_list, g_free);
826 static void remove_peer(gpointer data)
828 GSupplicantPeer *peer = data;
830 callback_peer_lost(peer);
833 g_slist_free_full(peer->groups, g_free);
836 g_hash_table_remove(peer_mapping, peer->path);
838 if (pending_peer_connection)
839 g_hash_table_remove(pending_peer_connection, peer->path);
843 g_free(peer->identifier);
844 g_free(peer->widi_ies);
849 static void debug_strvalmap(const char *label, struct strvalmap *map,
854 for (i = 0; map[i].str; i++) {
855 if (val & map[i].val)
856 SUPPLICANT_DBG("%s: %s", label, map[i].str);
860 static void interface_capability_keymgmt(DBusMessageIter *iter, void *user_data)
862 GSupplicantInterface *interface = user_data;
863 const char *str = NULL;
866 dbus_message_iter_get_basic(iter, &str);
870 for (i = 0; keymgmt_map[i].str; i++)
871 if (strcmp(str, keymgmt_map[i].str) == 0) {
872 interface->keymgmt_capa |= keymgmt_map[i].val;
877 static void interface_capability_authalg(DBusMessageIter *iter, void *user_data)
879 GSupplicantInterface *interface = user_data;
880 const char *str = NULL;
883 dbus_message_iter_get_basic(iter, &str);
887 for (i = 0; authalg_capa_map[i].str; i++)
888 if (strcmp(str, authalg_capa_map[i].str) == 0) {
889 interface->authalg_capa |= authalg_capa_map[i].val;
894 static void interface_capability_proto(DBusMessageIter *iter, void *user_data)
896 GSupplicantInterface *interface = user_data;
897 const char *str = NULL;
900 dbus_message_iter_get_basic(iter, &str);
904 for (i = 0; proto_capa_map[i].str; i++)
905 if (strcmp(str, proto_capa_map[i].str) == 0) {
906 interface->proto_capa |= proto_capa_map[i].val;
911 static void interface_capability_pairwise(DBusMessageIter *iter,
914 GSupplicantInterface *interface = user_data;
915 const char *str = NULL;
918 dbus_message_iter_get_basic(iter, &str);
922 for (i = 0; pairwise_map[i].str; i++)
923 if (strcmp(str, pairwise_map[i].str) == 0) {
924 interface->pairwise_capa |= pairwise_map[i].val;
929 static void interface_capability_group(DBusMessageIter *iter, void *user_data)
931 GSupplicantInterface *interface = user_data;
932 const char *str = NULL;
935 dbus_message_iter_get_basic(iter, &str);
939 for (i = 0; group_map[i].str; i++)
940 if (strcmp(str, group_map[i].str) == 0) {
941 interface->group_capa |= group_map[i].val;
946 static void interface_capability_scan(DBusMessageIter *iter, void *user_data)
948 GSupplicantInterface *interface = user_data;
949 const char *str = NULL;
952 dbus_message_iter_get_basic(iter, &str);
956 for (i = 0; scan_capa_map[i].str; i++)
957 if (strcmp(str, scan_capa_map[i].str) == 0) {
958 interface->scan_capa |= scan_capa_map[i].val;
963 static void interface_capability_mode(DBusMessageIter *iter, void *user_data)
965 GSupplicantInterface *interface = user_data;
966 const char *str = NULL;
969 dbus_message_iter_get_basic(iter, &str);
973 for (i = 0; mode_capa_map[i].str; i++)
974 if (strcmp(str, mode_capa_map[i].str) == 0) {
975 interface->mode_capa |= mode_capa_map[i].val;
980 static void interface_capability(const char *key, DBusMessageIter *iter,
983 GSupplicantInterface *interface = user_data;
988 if (g_strcmp0(key, "KeyMgmt") == 0)
989 supplicant_dbus_array_foreach(iter,
990 interface_capability_keymgmt, interface);
991 else if (g_strcmp0(key, "AuthAlg") == 0)
992 supplicant_dbus_array_foreach(iter,
993 interface_capability_authalg, interface);
994 else if (g_strcmp0(key, "Protocol") == 0)
995 supplicant_dbus_array_foreach(iter,
996 interface_capability_proto, interface);
997 else if (g_strcmp0(key, "Pairwise") == 0)
998 supplicant_dbus_array_foreach(iter,
999 interface_capability_pairwise, interface);
1000 else if (g_strcmp0(key, "Group") == 0)
1001 supplicant_dbus_array_foreach(iter,
1002 interface_capability_group, interface);
1003 else if (g_strcmp0(key, "Scan") == 0)
1004 supplicant_dbus_array_foreach(iter,
1005 interface_capability_scan, interface);
1006 else if (g_strcmp0(key, "Modes") == 0)
1007 supplicant_dbus_array_foreach(iter,
1008 interface_capability_mode, interface);
1009 else if (g_strcmp0(key, "MaxScanSSID") == 0) {
1010 dbus_int32_t max_scan_ssid;
1012 dbus_message_iter_get_basic(iter, &max_scan_ssid);
1013 if (max_scan_ssid < 2)
1015 interface->max_scan_ssids = max_scan_ssid;
1018 SUPPLICANT_DBG("key %s type %c",
1019 key, dbus_message_iter_get_arg_type(iter));
1022 struct set_apscan_data
1024 unsigned int ap_scan;
1025 GSupplicantInterface *interface;
1028 static void set_apscan(DBusMessageIter *iter, void *user_data)
1030 struct set_apscan_data *data = user_data;
1031 unsigned int ap_scan = data->ap_scan;
1033 dbus_message_iter_append_basic(iter, DBUS_TYPE_UINT32, &ap_scan);
1036 static void set_apscan_complete(const char *error,
1037 DBusMessageIter *iter, void *user_data)
1039 struct set_apscan_data *data = user_data;
1040 GSupplicantInterface *interface = data->interface;
1043 interface->ap_create_in_progress = false;
1044 SUPPLICANT_DBG("Set AP scan error %s", error);
1048 interface->ap_create_in_progress = true;
1053 int g_supplicant_interface_set_apscan(GSupplicantInterface *interface,
1054 unsigned int ap_scan)
1056 struct set_apscan_data *data;
1059 data = dbus_malloc0(sizeof(*data));
1064 data->ap_scan = ap_scan;
1065 data->interface = interface;
1067 ret = supplicant_dbus_property_set(interface->path,
1068 SUPPLICANT_INTERFACE ".Interface",
1069 "ApScan", DBUS_TYPE_UINT32_AS_STRING,
1070 set_apscan, set_apscan_complete, data, NULL);
1077 void g_supplicant_interface_set_data(GSupplicantInterface *interface,
1083 interface->data = data;
1086 interface->scan_callback = NULL;
1089 void *g_supplicant_interface_get_data(GSupplicantInterface *interface)
1094 return interface->data;
1097 const char *g_supplicant_interface_get_ifname(GSupplicantInterface *interface)
1102 return interface->ifname;
1105 const char *g_supplicant_interface_get_driver(GSupplicantInterface *interface)
1110 return interface->driver;
1113 GSupplicantState g_supplicant_interface_get_state(
1114 GSupplicantInterface *interface)
1117 return G_SUPPLICANT_STATE_UNKNOWN;
1119 return interface->state;
1122 const char *g_supplicant_interface_get_wps_key(GSupplicantInterface *interface)
1127 return (const char *)interface->wps_cred.key;
1130 const void *g_supplicant_interface_get_wps_ssid(GSupplicantInterface *interface,
1131 unsigned int *ssid_len)
1136 if (!interface || interface->wps_cred.ssid_len == 0) {
1141 *ssid_len = interface->wps_cred.ssid_len;
1142 return interface->wps_cred.ssid;
1145 GSupplicantWpsState g_supplicant_interface_get_wps_state(
1146 GSupplicantInterface *interface)
1149 return G_SUPPLICANT_WPS_STATE_UNKNOWN;
1151 return interface->wps_state;
1154 unsigned int g_supplicant_interface_get_mode(GSupplicantInterface *interface)
1159 return interface->mode_capa;
1162 unsigned int g_supplicant_interface_get_max_scan_ssids(
1163 GSupplicantInterface *interface)
1168 if (interface->max_scan_ssids == 0)
1169 return WPAS_MAX_SCAN_SSIDS;
1171 return interface->max_scan_ssids;
1174 static void set_network_enabled(DBusMessageIter *iter, void *user_data)
1176 dbus_bool_t enable = *(dbus_bool_t *)user_data;
1178 dbus_message_iter_append_basic(iter, DBUS_TYPE_BOOLEAN, &enable);
1181 int g_supplicant_interface_enable_selected_network(GSupplicantInterface *interface,
1187 if (!interface->network_path)
1190 SUPPLICANT_DBG(" ");
1191 return supplicant_dbus_property_set(interface->network_path,
1192 SUPPLICANT_INTERFACE ".Network",
1193 "Enabled", DBUS_TYPE_BOOLEAN_AS_STRING,
1194 set_network_enabled, NULL, &enable, NULL);
1197 dbus_bool_t g_supplicant_interface_get_ready(GSupplicantInterface *interface)
1202 return interface->ready;
1205 GSupplicantInterface *g_supplicant_network_get_interface(
1206 GSupplicantNetwork *network)
1211 return network->interface;
1214 const char *g_supplicant_network_get_name(GSupplicantNetwork *network)
1216 if (!network || !network->name)
1219 return network->name;
1222 const char *g_supplicant_network_get_identifier(GSupplicantNetwork *network)
1224 if (!network || !network->group)
1227 return network->group;
1230 const char *g_supplicant_network_get_path(GSupplicantNetwork *network)
1232 if (!network || !network->path)
1235 return network->path;
1238 const char *g_supplicant_network_get_mode(GSupplicantNetwork *network)
1241 return G_SUPPLICANT_MODE_UNKNOWN;
1243 return mode2string(network->mode);
1246 const char *g_supplicant_network_get_security(GSupplicantNetwork *network)
1249 return G_SUPPLICANT_SECURITY_UNKNOWN;
1251 return security2string(network->security);
1254 const void *g_supplicant_network_get_ssid(GSupplicantNetwork *network,
1255 unsigned int *ssid_len)
1262 *ssid_len = network->ssid_len;
1263 return network->ssid;
1266 dbus_int16_t g_supplicant_network_get_signal(GSupplicantNetwork *network)
1271 return network->signal;
1274 dbus_uint16_t g_supplicant_network_get_frequency(GSupplicantNetwork *network)
1279 return network->frequency;
1282 dbus_bool_t g_supplicant_network_get_wps(GSupplicantNetwork *network)
1287 return network->wps;
1290 dbus_bool_t g_supplicant_network_is_wps_active(GSupplicantNetwork *network)
1295 if (network->wps_capabilities & G_SUPPLICANT_WPS_CONFIGURED)
1301 dbus_bool_t g_supplicant_network_is_wps_pbc(GSupplicantNetwork *network)
1306 if (network->wps_capabilities & G_SUPPLICANT_WPS_PBC)
1312 dbus_bool_t g_supplicant_network_is_wps_advertizing(GSupplicantNetwork *network)
1317 if (network->wps_capabilities & G_SUPPLICANT_WPS_REGISTRAR)
1323 GSupplicantInterface *g_supplicant_peer_get_interface(GSupplicantPeer *peer)
1328 return peer->interface;
1331 const char *g_supplicant_peer_get_path(GSupplicantPeer *peer)
1339 const char *g_supplicant_peer_get_identifier(GSupplicantPeer *peer)
1344 return peer->identifier;
1347 const void *g_supplicant_peer_get_device_address(GSupplicantPeer *peer)
1352 return peer->device_address;
1355 const void *g_supplicant_peer_get_iface_address(GSupplicantPeer *peer)
1360 return peer->iface_address;
1363 const char *g_supplicant_peer_get_name(GSupplicantPeer *peer)
1371 #if defined TIZEN_EXT
1372 bool g_supplicant_network_is_hs20AP(GSupplicantNetwork *network)
1377 return network->isHS20AP;
1380 const char *g_supplicant_network_get_eap(GSupplicantNetwork *network)
1382 if (!network || !network->eap)
1385 return network->eap;
1388 const char *g_supplicant_network_get_identity(GSupplicantNetwork *network)
1390 if (!network || !network->identity)
1393 return network->identity;
1396 const char *g_supplicant_network_get_phase2(GSupplicantNetwork *network)
1398 if (!network || !network->phase2)
1401 return network->phase2;
1404 unsigned int g_supplicant_network_get_keymgmt(GSupplicantNetwork *network)
1406 if (network == NULL)
1409 return network->keymgmt;
1413 const unsigned char *g_supplicant_peer_get_widi_ies(GSupplicantPeer *peer,
1416 if (!peer || !length)
1419 *length = peer->widi_ies_length;
1420 return peer->widi_ies;
1423 bool g_supplicant_peer_is_wps_pbc(GSupplicantPeer *peer)
1428 if (peer->wps_capabilities & G_SUPPLICANT_WPS_PBC)
1434 bool g_supplicant_peer_is_wps_pin(GSupplicantPeer *peer)
1439 if (peer->wps_capabilities & G_SUPPLICANT_WPS_PIN)
1445 bool g_supplicant_peer_is_in_a_group(GSupplicantPeer *peer)
1447 if (!peer || !peer->groups)
1453 GSupplicantInterface *g_supplicant_peer_get_group_interface(GSupplicantPeer *peer)
1458 return (GSupplicantInterface *) peer->current_group_iface;
1461 bool g_supplicant_peer_is_client(GSupplicantPeer *peer)
1463 GSupplicantGroup *group;
1469 for (list = peer->groups; list; list = list->next) {
1470 const char *path = list->data;
1472 group = g_hash_table_lookup(group_mapping, path);
1476 if (group->role != G_SUPPLICANT_GROUP_ROLE_CLIENT ||
1477 group->orig_interface != peer->interface)
1480 if (group->interface == peer->current_group_iface)
1487 bool g_supplicant_peer_has_requested_connection(GSupplicantPeer *peer)
1492 return peer->connection_requested;
1495 #if defined TIZEN_EXT
1497 * Description: Network client requires additional wifi specific info
1499 const unsigned char *g_supplicant_network_get_bssid(GSupplicantNetwork *network)
1501 if (network == NULL || network->best_bss == NULL)
1504 return (const unsigned char *)network->best_bss->bssid;
1507 unsigned int g_supplicant_network_get_maxrate(GSupplicantNetwork *network)
1509 if (network == NULL || network->best_bss == NULL)
1512 return network->best_bss->maxrate;
1515 const char *g_supplicant_network_get_enc_mode(GSupplicantNetwork *network)
1517 if (network == NULL || network->best_bss == NULL)
1520 if (network->best_bss->security == G_SUPPLICANT_SECURITY_PSK ||
1521 network->best_bss->security == G_SUPPLICANT_SECURITY_IEEE8021X) {
1522 unsigned int pairwise;
1524 pairwise = network->best_bss->rsn_pairwise |
1525 network->best_bss->wpa_pairwise;
1527 if ((pairwise & G_SUPPLICANT_PAIRWISE_CCMP) &&
1528 (pairwise & G_SUPPLICANT_PAIRWISE_TKIP))
1530 else if (pairwise & G_SUPPLICANT_PAIRWISE_CCMP)
1532 else if (pairwise & G_SUPPLICANT_PAIRWISE_TKIP)
1535 } else if (network->best_bss->security == G_SUPPLICANT_SECURITY_WEP)
1537 else if (network->best_bss->security == G_SUPPLICANT_SECURITY_NONE)
1543 bool g_supplicant_network_get_rsn_mode(GSupplicantNetwork *network)
1545 if (network == NULL || network->best_bss == NULL)
1548 if (network->best_bss->rsn_selected) {
1549 const char *mode = g_supplicant_network_get_enc_mode(network);
1550 if (g_strcmp0(mode, "aes") == 0 ||
1551 g_strcmp0(mode, "mixed") == 0)
1559 void *g_supplicant_network_get_wifi_vsie(GSupplicantNetwork *network)
1561 GSList *vsie_list = NULL;
1566 if (g_slist_length(network->vsie_list) > 0) {
1567 GSList *list = NULL;
1568 unsigned char *vsie = NULL;
1569 for (list = network->vsie_list; list; list = list->next) {
1570 unsigned char *ie = (unsigned char *)list->data;
1571 vsie = (unsigned char *)g_try_malloc0(ie[1]+2); // tag number size(1), tag length size(1)
1574 memcpy(vsie, ie, ie[1]+2);
1575 vsie_list = g_slist_append(vsie_list, vsie);
1577 SUPPLICANT_DBG("Failed to allocate memory");
1585 static void merge_network(GSupplicantNetwork *network)
1588 const char *ssid, *mode, *key_mgmt;
1589 #if defined TIZEN_EXT
1590 GSupplicantInterface *interface;
1591 const char *isHS20AP;
1592 const char *eap, *identity, *phase2;
1594 unsigned int i, ssid_len;
1597 ssid = g_hash_table_lookup(network->config_table, "ssid");
1598 mode = g_hash_table_lookup(network->config_table, "mode");
1599 key_mgmt = g_hash_table_lookup(network->config_table, "key_mgmt");
1600 #if defined TIZEN_EXT
1601 isHS20AP = g_hash_table_lookup(network->config_table, "isHS20AP");
1602 eap = g_hash_table_lookup(network->config_table, "eap");
1603 identity = g_hash_table_lookup(network->config_table, "identity");
1604 phase2 = g_hash_table_lookup(network->config_table, "phase2");
1605 interface = network->interface;
1608 SUPPLICANT_DBG("ssid %s mode %s", ssid, mode);
1611 ssid_len = strlen(ssid);
1615 str = g_string_sized_new((ssid_len * 2) + 24);
1619 for (i = 0; i < ssid_len; i++)
1620 #if defined TIZEN_EXT
1624 g_string_append_printf(str, "%02x", ssid[i]);
1625 #if defined TIZEN_EXT
1629 if (g_strcmp0(mode, "0") == 0)
1630 g_string_append_printf(str, "_managed");
1631 else if (g_strcmp0(mode, "1") == 0)
1632 g_string_append_printf(str, "_adhoc");
1634 if (g_strcmp0(key_mgmt, "WPA-PSK") == 0)
1635 g_string_append_printf(str, "_psk");
1636 #if defined TIZEN_EXT
1637 else if (g_strcmp0(key_mgmt, "WPA-EAP") == 0)
1638 g_string_append_printf(str, "_ieee8021x");
1640 g_string_append_printf(str, "_none");
1643 group = g_string_free(str, FALSE);
1645 SUPPLICANT_DBG("%s", group);
1647 #if defined TIZEN_EXT
1648 if (g_strcmp0(isHS20AP, "1") == 0) {
1649 network->isHS20AP = 1;
1651 g_free(network->eap);
1652 network->eap = g_strdup(eap);
1654 if (network->identity)
1655 g_free(network->identity);
1656 network->identity = g_strdup(identity);
1658 if (network->phase2)
1659 g_free(network->phase2);
1660 network->phase2 = g_strdup(phase2);
1662 network->isHS20AP = 0;
1665 interface->network_path = g_strdup(network->path);
1667 network->group = g_strdup(group);
1668 callback_network_merged(network);
1673 g_hash_table_destroy(network->config_table);
1675 g_free(network->path);
1679 static void network_property(const char *key, DBusMessageIter *iter,
1682 GSupplicantNetwork *network = user_data;
1684 if (!network->interface)
1688 merge_network(network);
1692 if (g_strcmp0(key, "Enabled") == 0) {
1693 dbus_bool_t enabled = FALSE;
1695 dbus_message_iter_get_basic(iter, &enabled);
1696 } else if (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_STRING) {
1697 const char *str = NULL;
1699 dbus_message_iter_get_basic(iter, &str);
1701 g_hash_table_replace(network->config_table,
1702 g_strdup(key), g_strdup(str));
1705 SUPPLICANT_DBG("key %s type %c",
1706 key, dbus_message_iter_get_arg_type(iter));
1709 static void interface_network_added(DBusMessageIter *iter, void *user_data)
1711 GSupplicantInterface *interface = user_data;
1712 GSupplicantNetwork *network;
1713 const char *path = NULL;
1717 dbus_message_iter_get_basic(iter, &path);
1721 if (g_strcmp0(path, "/") == 0)
1724 network = g_try_new0(GSupplicantNetwork, 1);
1728 network->interface = interface;
1729 network->path = g_strdup(path);
1731 network->config_table = g_hash_table_new_full(g_str_hash, g_str_equal,
1734 dbus_message_iter_next(iter);
1735 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
1736 supplicant_dbus_property_foreach(iter, network_property,
1738 network_property(NULL, NULL, network);
1742 supplicant_dbus_property_get_all(path,
1743 SUPPLICANT_INTERFACE ".Network",
1744 network_property, network, NULL);
1747 static void interface_network_removed(DBusMessageIter *iter, void *user_data)
1753 static char *create_name(unsigned char *ssid, int ssid_len)
1756 const gchar *remainder, *invalid;
1757 int valid_bytes, remaining_bytes;
1759 if (ssid_len < 1 || ssid[0] == '\0')
1760 return g_strdup("");
1763 remainder = (const gchar *)ssid;
1764 remaining_bytes = ssid_len;
1766 while (remaining_bytes != 0) {
1767 if (g_utf8_validate(remainder, remaining_bytes,
1772 valid_bytes = invalid - remainder;
1775 string = g_string_sized_new(remaining_bytes);
1777 g_string_append_len(string, remainder, valid_bytes);
1779 /* append U+FFFD REPLACEMENT CHARACTER */
1780 g_string_append(string, "\357\277\275");
1782 remaining_bytes -= valid_bytes + 1;
1783 remainder = invalid + 1;
1787 return g_strndup((const gchar *)ssid, ssid_len + 1);
1789 g_string_append(string, remainder);
1791 return g_string_free(string, FALSE);
1794 static char *create_group(struct g_supplicant_bss *bss)
1798 const char *mode, *security;
1800 str = g_string_sized_new((bss->ssid_len * 2) + 24);
1804 if (bss->ssid_len > 0 && bss->ssid[0] != '\0') {
1805 for (i = 0; i < bss->ssid_len; i++)
1806 g_string_append_printf(str, "%02x", bss->ssid[i]);
1808 g_string_append_printf(str, "hidden");
1810 mode = mode2string(bss->mode);
1812 g_string_append_printf(str, "_%s", mode);
1814 security = security2string(bss->security);
1816 g_string_append_printf(str, "_%s", security);
1818 return g_string_free(str, FALSE);
1821 static int add_or_replace_bss_to_network(struct g_supplicant_bss *bss)
1823 GSupplicantInterface *interface = bss->interface;
1824 GSupplicantNetwork *network;
1827 group = create_group(bss);
1828 SUPPLICANT_DBG("New group created: %s", group);
1833 network = g_hash_table_lookup(interface->network_table, group);
1836 SUPPLICANT_DBG("Network %s already exist", network->name);
1841 network = g_try_new0(GSupplicantNetwork, 1);
1847 network->interface = interface;
1849 network->path = g_strdup(bss->path);
1850 network->group = group;
1851 network->name = create_name(bss->ssid, bss->ssid_len);
1852 network->mode = bss->mode;
1853 network->security = bss->security;
1854 network->ssid_len = bss->ssid_len;
1855 memcpy(network->ssid, bss->ssid, bss->ssid_len);
1856 network->signal = bss->signal;
1857 network->frequency = bss->frequency;
1858 network->best_bss = bss;
1860 #if defined TIZEN_EXT
1861 network->keymgmt = bss->keymgmt;
1863 if (g_slist_length(bss->vsie_list) > 0) {
1864 GSList *list = NULL;
1865 unsigned char *vsie = NULL;
1866 for (list = bss->vsie_list; list; list = list->next) {
1867 unsigned char *ie = (unsigned char *)list->data;
1868 vsie = (unsigned char *)g_try_malloc0(ie[1]+2); // tag number size(1), tag length size(1)
1871 memcpy(vsie, ie, ie[1]+2);
1872 network->vsie_list = g_slist_append(network->vsie_list, vsie);
1874 SUPPLICANT_DBG("Failed to allocate memory.");
1878 network->isHS20AP = bss->hs20;
1881 SUPPLICANT_DBG("New network %s created", network->name);
1883 network->bss_table = g_hash_table_new_full(g_str_hash, g_str_equal,
1886 network->config_table = g_hash_table_new_full(g_str_hash, g_str_equal,
1889 g_hash_table_replace(interface->network_table,
1890 network->group, network);
1892 callback_network_added(network);
1895 /* We update network's WPS properties if only bss provides WPS. */
1896 if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
1897 network->wps = TRUE;
1898 network->wps_capabilities |= bss->wps_capabilities;
1902 * Do not change best BSS if we are connected. It will be done through
1903 * CurrentBSS property in case of misalignment with wpa_s or roaming.
1905 if (network != interface->current_network &&
1906 bss->signal > network->signal) {
1907 network->signal = bss->signal;
1908 network->best_bss = bss;
1909 callback_network_changed(network, "Signal");
1912 g_hash_table_replace(interface->bss_mapping, bss->path, network);
1913 g_hash_table_replace(network->bss_table, bss->path, bss);
1915 g_hash_table_replace(bss_mapping, bss->path, interface);
1920 static void bss_rates(DBusMessageIter *iter, void *user_data)
1922 struct g_supplicant_bss *bss = user_data;
1923 dbus_uint32_t rate = 0;
1925 dbus_message_iter_get_basic(iter, &rate);
1929 if (rate > bss->maxrate)
1930 bss->maxrate = rate;
1933 static void bss_keymgmt(DBusMessageIter *iter, void *user_data)
1935 unsigned int *keymgmt = user_data;
1936 const char *str = NULL;
1939 dbus_message_iter_get_basic(iter, &str);
1943 for (i = 0; keymgmt_map[i].str; i++)
1944 if (strcmp(str, keymgmt_map[i].str) == 0) {
1945 SUPPLICANT_DBG("Keymgmt: %s", str);
1946 *keymgmt |= keymgmt_map[i].val;
1951 static void bss_group(DBusMessageIter *iter, void *user_data)
1953 unsigned int *group = user_data;
1954 const char *str = NULL;
1957 dbus_message_iter_get_basic(iter, &str);
1961 for (i = 0; group_map[i].str; i++)
1962 if (strcmp(str, group_map[i].str) == 0) {
1963 SUPPLICANT_DBG("Group: %s", str);
1964 *group |= group_map[i].val;
1969 static void bss_pairwise(DBusMessageIter *iter, void *user_data)
1971 unsigned int *pairwise = user_data;
1972 const char *str = NULL;
1975 dbus_message_iter_get_basic(iter, &str);
1979 for (i = 0; pairwise_map[i].str; i++)
1980 if (strcmp(str, pairwise_map[i].str) == 0) {
1981 SUPPLICANT_DBG("Pairwise: %s", str);
1982 *pairwise |= pairwise_map[i].val;
1987 static void bss_wpa(const char *key, DBusMessageIter *iter,
1990 struct g_supplicant_bss *bss = user_data;
1991 unsigned int value = 0;
1993 SUPPLICANT_DBG("Key: %s", key);
1995 if (g_strcmp0(key, "KeyMgmt") == 0) {
1996 supplicant_dbus_array_foreach(iter, bss_keymgmt, &value);
1998 if (bss->rsn_selected)
1999 bss->rsn_keymgmt = value;
2001 bss->wpa_keymgmt = value;
2002 } else if (g_strcmp0(key, "Group") == 0) {
2003 supplicant_dbus_array_foreach(iter, bss_group, &value);
2005 if (bss->rsn_selected)
2006 bss->rsn_group = value;
2008 bss->wpa_group = value;
2009 } else if (g_strcmp0(key, "Pairwise") == 0) {
2010 supplicant_dbus_array_foreach(iter, bss_pairwise, &value);
2012 if (bss->rsn_selected)
2013 bss->rsn_pairwise = value;
2015 bss->wpa_pairwise = value;
2019 static unsigned int get_tlv(unsigned char *ie, unsigned int ie_size,
2022 unsigned int len = 0;
2024 while (len + 4 < ie_size) {
2025 unsigned int hi = ie[len];
2026 unsigned int lo = ie[len + 1];
2027 unsigned int tmp_type = (hi << 8) + lo;
2028 unsigned int v_len = 0;
2030 /* hi and lo are used to recreate an unsigned int
2031 * based on 2 8bits length unsigned int. */
2035 v_len = (hi << 8) + lo;
2037 if (tmp_type == type) {
2038 unsigned int ret_value = 0;
2039 unsigned char *value = (unsigned char *)&ret_value;
2041 SUPPLICANT_DBG("IE: match type 0x%x", type);
2043 /* Verifying length relevance */
2044 if (v_len > sizeof(unsigned int) ||
2045 len + 4 + v_len > ie_size)
2048 memcpy(value, ie + len + 4, v_len);
2050 SUPPLICANT_DBG("returning 0x%x", ret_value);
2057 SUPPLICANT_DBG("returning 0");
2061 static void bss_process_ies(DBusMessageIter *iter, void *user_data)
2063 struct g_supplicant_bss *bss = user_data;
2064 const unsigned char WPS_OUI[] = { 0x00, 0x50, 0xf2, 0x04 };
2065 unsigned char *ie, *ie_end;
2066 DBusMessageIter array;
2070 #define WMM_WPA1_WPS_INFO 221
2071 #define WPS_INFO_MIN_LEN 6
2072 #define WPS_VERSION_TLV 0x104A
2073 #define WPS_STATE_TLV 0x1044
2074 #define WPS_METHODS_TLV 0x1012
2075 #define WPS_REGISTRAR_TLV 0x1041
2076 #define WPS_VERSION 0x10
2077 #define WPS_PBC 0x04
2078 #define WPS_PIN 0x00
2079 #define WPS_CONFIGURED 0x02
2080 #if defined TIZEN_EXT
2081 #define VENDOR_SPECIFIC_INFO 0xDD
2084 dbus_message_iter_recurse(iter, &array);
2085 dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
2087 if (!ie || ie_len < 2)
2090 bss->wps_capabilities = 0;
2093 for (ie_end = ie + ie_len; ie < ie_end && ie + ie[1] + 1 <= ie_end;
2095 #if defined TIZEN_EXT
2096 unsigned char *vsie;
2098 if(ie[0] == VENDOR_SPECIFIC_INFO && memcmp(ie+2, WPS_OUI, sizeof(WPS_OUI)) != 0) {
2099 SUPPLICANT_DBG("IE: match vendor specific data");
2101 vsie_len = ie[1]+2; // tag number size(1), tag length size(1)
2102 vsie = (unsigned char *)g_try_malloc0(vsie_len);
2105 memcpy(vsie, ie, vsie_len);
2106 bss->vsie_list = g_slist_append(bss->vsie_list, vsie);
2108 SUPPLICANT_DBG("Failed to allocate memory");
2112 if (ie[0] != WMM_WPA1_WPS_INFO || ie[1] < WPS_INFO_MIN_LEN ||
2113 memcmp(ie+2, WPS_OUI, sizeof(WPS_OUI)) != 0)
2116 SUPPLICANT_DBG("IE: match WPS_OUI");
2118 value = get_tlv(&ie[6], ie[1], WPS_STATE_TLV);
2119 if (get_tlv(&ie[6], ie[1], WPS_VERSION_TLV) == WPS_VERSION &&
2121 bss->keymgmt |= G_SUPPLICANT_KEYMGMT_WPS;
2123 if (value == WPS_CONFIGURED)
2124 bss->wps_capabilities |=
2125 G_SUPPLICANT_WPS_CONFIGURED;
2128 value = get_tlv(&ie[6], ie[1], WPS_METHODS_TLV);
2130 if (GUINT16_FROM_BE(value) == WPS_PBC)
2131 bss->wps_capabilities |= G_SUPPLICANT_WPS_PBC;
2132 if (GUINT16_FROM_BE(value) == WPS_PIN)
2133 bss->wps_capabilities |= G_SUPPLICANT_WPS_PIN;
2135 bss->wps_capabilities |=
2136 G_SUPPLICANT_WPS_PBC | G_SUPPLICANT_WPS_PIN;
2138 /* If the AP sends this it means it's advertizing
2139 * as a registrar and the WPS process is launched
2141 if (get_tlv(&ie[6], ie[1], WPS_REGISTRAR_TLV) != 0)
2142 bss->wps_capabilities |= G_SUPPLICANT_WPS_REGISTRAR;
2144 SUPPLICANT_DBG("WPS Methods 0x%x", bss->wps_capabilities);
2148 static void bss_compute_security(struct g_supplicant_bss *bss)
2151 * Combining RSN and WPA keymgmt
2152 * We combine it since parsing IEs might have set something for WPS. */
2153 bss->keymgmt |= bss->rsn_keymgmt | bss->wpa_keymgmt;
2155 bss->ieee8021x = FALSE;
2157 #if defined TIZEN_EXT
2158 bss->ft_ieee8021x = FALSE;
2159 bss->ft_psk = FALSE;
2162 #if defined TIZEN_EXT
2164 (G_SUPPLICANT_KEYMGMT_WPA_EAP |
2165 G_SUPPLICANT_KEYMGMT_WPA_EAP_256))
2166 bss->ieee8021x = TRUE;
2167 else if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_EAP)
2168 bss->ft_ieee8021x = TRUE;
2171 (G_SUPPLICANT_KEYMGMT_WPA_EAP |
2172 G_SUPPLICANT_KEYMGMT_WPA_FT_EAP |
2173 G_SUPPLICANT_KEYMGMT_WPA_EAP_256))
2174 bss->ieee8021x = TRUE;
2177 #if defined TIZEN_EXT
2179 (G_SUPPLICANT_KEYMGMT_WPA_PSK |
2180 G_SUPPLICANT_KEYMGMT_WPA_PSK_256))
2182 else if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_PSK)
2186 (G_SUPPLICANT_KEYMGMT_WPA_PSK |
2187 G_SUPPLICANT_KEYMGMT_WPA_FT_PSK |
2188 G_SUPPLICANT_KEYMGMT_WPA_PSK_256))
2193 bss->security = G_SUPPLICANT_SECURITY_IEEE8021X;
2195 bss->security = G_SUPPLICANT_SECURITY_PSK;
2196 #if defined TIZEN_EXT
2197 else if (bss->ft_psk)
2198 bss->security = G_SUPPLICANT_SECURITY_FT_PSK;
2199 else if (bss->ft_ieee8021x == TRUE)
2200 bss->security = G_SUPPLICANT_SECURITY_IEEE8021X;
2202 else if (bss->privacy)
2203 bss->security = G_SUPPLICANT_SECURITY_WEP;
2205 bss->security = G_SUPPLICANT_SECURITY_NONE;
2209 static void bss_property(const char *key, DBusMessageIter *iter,
2212 struct g_supplicant_bss *bss = user_data;
2214 if (!bss->interface)
2217 SUPPLICANT_DBG("key %s", key);
2222 if (g_strcmp0(key, "BSSID") == 0) {
2223 DBusMessageIter array;
2224 unsigned char *addr;
2227 dbus_message_iter_recurse(iter, &array);
2228 dbus_message_iter_get_fixed_array(&array, &addr, &addr_len);
2231 memcpy(bss->bssid, addr, addr_len);
2232 } else if (g_strcmp0(key, "SSID") == 0) {
2233 DBusMessageIter array;
2234 unsigned char *ssid;
2237 dbus_message_iter_recurse(iter, &array);
2238 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
2240 if (ssid_len > 0 && ssid_len < 33) {
2241 memcpy(bss->ssid, ssid, ssid_len);
2242 bss->ssid_len = ssid_len;
2244 memset(bss->ssid, 0, sizeof(bss->ssid));
2247 } else if (g_strcmp0(key, "Capabilities") == 0) {
2248 dbus_uint16_t capabilities = 0x0000;
2250 dbus_message_iter_get_basic(iter, &capabilities);
2252 if (capabilities & IEEE80211_CAP_ESS)
2253 bss->mode = G_SUPPLICANT_MODE_INFRA;
2254 else if (capabilities & IEEE80211_CAP_IBSS)
2255 bss->mode = G_SUPPLICANT_MODE_IBSS;
2257 if (capabilities & IEEE80211_CAP_PRIVACY)
2258 bss->privacy = TRUE;
2259 } else if (g_strcmp0(key, "Mode") == 0) {
2260 const char *mode = NULL;
2262 dbus_message_iter_get_basic(iter, &mode);
2263 bss->mode = string2mode(mode);
2264 } else if (g_strcmp0(key, "Frequency") == 0) {
2265 dbus_uint16_t frequency = 0;
2267 dbus_message_iter_get_basic(iter, &frequency);
2268 bss->frequency = frequency;
2269 } else if (g_strcmp0(key, "Signal") == 0) {
2270 dbus_int16_t signal = 0;
2272 dbus_message_iter_get_basic(iter, &signal);
2274 bss->signal = signal;
2276 bss->signal = BSS_UNKNOWN_STRENGTH;
2278 } else if (g_strcmp0(key, "Level") == 0) {
2279 dbus_int32_t level = 0;
2281 dbus_message_iter_get_basic(iter, &level);
2282 } else if (g_strcmp0(key, "Rates") == 0) {
2283 supplicant_dbus_array_foreach(iter, bss_rates, bss);
2284 } else if (g_strcmp0(key, "MaxRate") == 0) {
2285 dbus_uint32_t maxrate = 0;
2287 dbus_message_iter_get_basic(iter, &maxrate);
2289 bss->maxrate = maxrate;
2290 } else if (g_strcmp0(key, "Privacy") == 0) {
2291 dbus_bool_t privacy = FALSE;
2293 dbus_message_iter_get_basic(iter, &privacy);
2294 bss->privacy = privacy;
2295 } else if (g_strcmp0(key, "RSN") == 0) {
2296 bss->rsn_selected = TRUE;
2298 supplicant_dbus_property_foreach(iter, bss_wpa, bss);
2299 } else if (g_strcmp0(key, "WPA") == 0) {
2300 bss->rsn_selected = FALSE;
2302 supplicant_dbus_property_foreach(iter, bss_wpa, bss);
2303 #if defined TIZEN_EXT
2304 } else if (g_strcmp0(key, "HS20") == 0) {
2305 dbus_bool_t hs20 = FALSE;
2306 dbus_message_iter_get_basic(iter, &hs20);
2309 } else if (g_strcmp0(key, "IEs") == 0)
2310 bss_process_ies(iter, bss);
2312 SUPPLICANT_DBG("key %s type %c",
2313 key, dbus_message_iter_get_arg_type(iter));
2316 static struct g_supplicant_bss *interface_bss_added(DBusMessageIter *iter,
2319 GSupplicantInterface *interface = user_data;
2320 GSupplicantNetwork *network;
2321 struct g_supplicant_bss *bss;
2322 const char *path = NULL;
2326 dbus_message_iter_get_basic(iter, &path);
2330 if (g_strcmp0(path, "/") == 0)
2333 SUPPLICANT_DBG("%s", path);
2335 network = g_hash_table_lookup(interface->bss_mapping, path);
2337 bss = g_hash_table_lookup(network->bss_table, path);
2342 bss = g_try_new0(struct g_supplicant_bss, 1);
2346 bss->interface = interface;
2347 bss->path = g_strdup(path);
2348 bss->signal = BSS_UNKNOWN_STRENGTH;
2353 static void interface_bss_added_with_keys(DBusMessageIter *iter,
2356 struct g_supplicant_bss *bss;
2360 bss = interface_bss_added(iter, user_data);
2364 dbus_message_iter_next(iter);
2366 if (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_INVALID)
2369 supplicant_dbus_property_foreach(iter, bss_property, bss);
2371 bss_compute_security(bss);
2372 if (add_or_replace_bss_to_network(bss) < 0)
2373 SUPPLICANT_DBG("add_or_replace_bss_to_network failed");
2376 static void interface_bss_added_without_keys(DBusMessageIter *iter,
2379 struct g_supplicant_bss *bss;
2383 bss = interface_bss_added(iter, user_data);
2387 supplicant_dbus_property_get_all(bss->path,
2388 SUPPLICANT_INTERFACE ".BSS",
2389 bss_property, bss, NULL);
2391 bss_compute_security(bss);
2392 if (add_or_replace_bss_to_network(bss) < 0)
2393 SUPPLICANT_DBG("add_or_replace_bss_to_network failed");
2396 static void update_signal(gpointer key, gpointer value,
2399 struct g_supplicant_bss *bss = value;
2400 GSupplicantNetwork *network = user_data;
2402 if (bss->signal > network->signal) {
2403 network->signal = bss->signal;
2404 network->best_bss = bss;
2408 static void update_network_signal(GSupplicantNetwork *network)
2410 if (g_hash_table_size(network->bss_table) <= 1 && network->best_bss)
2413 g_hash_table_foreach(network->bss_table,
2414 update_signal, network);
2416 SUPPLICANT_DBG("New network signal %d", network->signal);
2419 static void interface_current_bss(GSupplicantInterface *interface,
2420 DBusMessageIter *iter)
2422 GSupplicantNetwork *network;
2423 struct g_supplicant_bss *bss;
2426 dbus_message_iter_get_basic(iter, &path);
2427 if (g_strcmp0(path, "/") == 0) {
2428 interface->current_network = NULL;
2432 interface_bss_added_without_keys(iter, interface);
2434 network = g_hash_table_lookup(interface->bss_mapping, path);
2438 bss = g_hash_table_lookup(network->bss_table, path);
2442 interface->current_network = network;
2444 if (bss != network->best_bss) {
2446 * This is the case where either wpa_s got associated
2447 * to a BSS different than the one ConnMan considers
2448 * the best, or we are roaming.
2450 SUPPLICANT_DBG("Update best BSS for %s", network->name);
2452 network->best_bss = bss;
2454 if (network->signal != bss->signal) {
2455 SUPPLICANT_DBG("New network signal %d dBm",
2458 network->signal = bss->signal;
2459 callback_network_changed(network, "Signal");
2464 * wpa_s could notify about CurrentBSS in any state once
2465 * it got associated. It is not sure such notification will
2466 * arrive together with transition to ASSOCIATED state.
2467 * In fact, for networks with security WEP or OPEN, it
2468 * always arrives together with transition to COMPLETED.
2470 switch (interface->state) {
2471 case G_SUPPLICANT_STATE_UNKNOWN:
2472 case G_SUPPLICANT_STATE_DISABLED:
2473 case G_SUPPLICANT_STATE_DISCONNECTED:
2474 case G_SUPPLICANT_STATE_INACTIVE:
2475 case G_SUPPLICANT_STATE_SCANNING:
2476 case G_SUPPLICANT_STATE_AUTHENTICATING:
2477 case G_SUPPLICANT_STATE_ASSOCIATING:
2479 case G_SUPPLICANT_STATE_ASSOCIATED:
2480 case G_SUPPLICANT_STATE_4WAY_HANDSHAKE:
2481 case G_SUPPLICANT_STATE_GROUP_HANDSHAKE:
2482 case G_SUPPLICANT_STATE_COMPLETED:
2483 callback_network_associated(network);
2488 static void interface_bss_removed(DBusMessageIter *iter, void *user_data)
2490 GSupplicantInterface *interface = user_data;
2491 GSupplicantNetwork *network;
2492 struct g_supplicant_bss *bss = NULL;
2493 const char *path = NULL;
2495 dbus_message_iter_get_basic(iter, &path);
2499 network = g_hash_table_lookup(interface->bss_mapping, path);
2503 bss = g_hash_table_lookup(network->bss_table, path);
2504 if (network->best_bss == bss) {
2505 network->best_bss = NULL;
2506 network->signal = BSS_UNKNOWN_STRENGTH;
2509 g_hash_table_remove(bss_mapping, path);
2511 g_hash_table_remove(interface->bss_mapping, path);
2512 g_hash_table_remove(network->bss_table, path);
2514 update_network_signal(network);
2516 if (g_hash_table_size(network->bss_table) == 0)
2517 g_hash_table_remove(interface->network_table, network->group);
2520 static void set_config_methods(DBusMessageIter *iter, void *user_data)
2522 dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, user_data);
2525 static void wps_property(const char *key, DBusMessageIter *iter,
2528 GSupplicantInterface *interface = user_data;
2533 SUPPLICANT_DBG("key: %s", key);
2535 if (g_strcmp0(key, "ConfigMethods") == 0) {
2536 const char *config_methods = "push_button", *str = NULL;
2538 dbus_message_iter_get_basic(iter, &str);
2539 if (str && strlen(str) > 0) {
2540 /* It was already set at wpa_s level, don't modify it. */
2541 SUPPLICANT_DBG("%s", str);
2545 supplicant_dbus_property_set(interface->path,
2546 SUPPLICANT_INTERFACE ".Interface.WPS",
2547 "ConfigMethods", DBUS_TYPE_STRING_AS_STRING,
2548 set_config_methods, NULL, &config_methods, NULL);
2550 SUPPLICANT_DBG("No value. Set %s", config_methods);
2555 static void interface_property(const char *key, DBusMessageIter *iter,
2558 GSupplicantInterface *interface = user_data;
2563 SUPPLICANT_DBG("%s", key);
2566 debug_strvalmap("KeyMgmt capability", keymgmt_map,
2567 interface->keymgmt_capa);
2568 debug_strvalmap("AuthAlg capability", authalg_capa_map,
2569 interface->authalg_capa);
2570 debug_strvalmap("Protocol capability", proto_capa_map,
2571 interface->proto_capa);
2572 debug_strvalmap("Pairwise capability", pairwise_map,
2573 interface->pairwise_capa);
2574 debug_strvalmap("Group capability", group_map,
2575 interface->group_capa);
2576 debug_strvalmap("Scan capability", scan_capa_map,
2577 interface->scan_capa);
2578 debug_strvalmap("Mode capability", mode_capa_map,
2579 interface->mode_capa);
2581 supplicant_dbus_property_get_all(interface->path,
2582 SUPPLICANT_INTERFACE ".Interface.WPS",
2583 wps_property, interface, interface);
2585 if (interface->ready)
2586 callback_interface_added(interface);
2591 if (g_strcmp0(key, "Capabilities") == 0) {
2592 supplicant_dbus_property_foreach(iter, interface_capability,
2594 #if !defined TIZEN_EXT
2595 if (interface->mode_capa & G_SUPPLICANT_CAPABILITY_MODE_P2P)
2596 interface->p2p_support = true;
2598 } else if (g_strcmp0(key, "State") == 0) {
2599 const char *str = NULL;
2601 dbus_message_iter_get_basic(iter, &str);
2603 if (string2state(str) != interface->state) {
2604 interface->state = string2state(str);
2605 callback_interface_state(interface);
2608 if (interface->ap_create_in_progress) {
2609 if (interface->state == G_SUPPLICANT_STATE_DISCONNECTED)
2610 callback_ap_create_fail(interface);
2612 interface->ap_create_in_progress = false;
2615 if (interface->state == G_SUPPLICANT_STATE_DISABLED)
2616 interface->ready = FALSE;
2618 interface->ready = TRUE;
2620 SUPPLICANT_DBG("state %s (%d)", str, interface->state);
2621 } else if (g_strcmp0(key, "Scanning") == 0) {
2622 dbus_bool_t scanning = FALSE;
2624 dbus_message_iter_get_basic(iter, &scanning);
2625 interface->scanning = scanning;
2627 if (interface->ready) {
2628 if (interface->scanning)
2629 callback_scan_started(interface);
2631 callback_scan_finished(interface);
2633 } else if (g_strcmp0(key, "ApScan") == 0) {
2636 dbus_message_iter_get_basic(iter, &apscan);
2637 interface->apscan = apscan;
2638 } else if (g_strcmp0(key, "Ifname") == 0) {
2639 const char *str = NULL;
2641 dbus_message_iter_get_basic(iter, &str);
2643 g_free(interface->ifname);
2644 interface->ifname = g_strdup(str);
2646 } else if (g_strcmp0(key, "Driver") == 0) {
2647 const char *str = NULL;
2649 dbus_message_iter_get_basic(iter, &str);
2651 g_free(interface->driver);
2652 interface->driver = g_strdup(str);
2654 } else if (g_strcmp0(key, "BridgeIfname") == 0) {
2655 const char *str = NULL;
2657 dbus_message_iter_get_basic(iter, &str);
2659 g_free(interface->bridge);
2660 interface->bridge = g_strdup(str);
2662 } else if (g_strcmp0(key, "ConfigFile") == 0) {
2663 const char *str = NULL;
2665 dbus_message_iter_get_basic(iter, &str);
2666 if (str && strlen(str) > 0 && interface->ifname) {
2667 SUPPLICANT_DBG("New {%s, %s}", interface->ifname, str);
2668 g_hash_table_replace(config_file_table,
2669 g_strdup(interface->ifname), g_strdup(str));
2671 } else if (g_strcmp0(key, "CurrentBSS") == 0) {
2672 interface_current_bss(interface, iter);
2673 } else if (g_strcmp0(key, "CurrentNetwork") == 0) {
2674 #if defined TIZEN_EXT
2675 if (interface->state != G_SUPPLICANT_STATE_COMPLETED)
2677 interface_network_added(iter, interface);
2678 } else if (g_strcmp0(key, "BSSs") == 0) {
2679 supplicant_dbus_array_foreach(iter,
2680 interface_bss_added_without_keys,
2682 } else if (g_strcmp0(key, "Blobs") == 0) {
2684 } else if (g_strcmp0(key, "Networks") == 0) {
2685 supplicant_dbus_array_foreach(iter, interface_network_added,
2687 } else if (g_strcmp0(key, "DisconnectReason") == 0) {
2689 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
2690 dbus_message_iter_get_basic(iter, &reason_code);
2691 callback_disconnect_reason_code(interface, reason_code);
2693 } else if (g_strcmp0(key, "AssocStatusCode") == 0) {
2695 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
2696 dbus_message_iter_get_basic(iter, &status_code);
2697 callback_assoc_status_code(interface, status_code);
2700 SUPPLICANT_DBG("key %s type %c",
2701 key, dbus_message_iter_get_arg_type(iter));
2705 static void scan_network_update(DBusMessageIter *iter, void *user_data)
2707 GSupplicantInterface *interface = user_data;
2708 GSupplicantNetwork *network;
2714 dbus_message_iter_get_basic(iter, &path);
2719 if (g_strcmp0(path, "/") == 0)
2722 /* Update the network details based on scan BSS data */
2723 network = g_hash_table_lookup(interface->bss_mapping, path);
2725 callback_network_added(network);
2728 static void scan_bss_data(const char *key, DBusMessageIter *iter,
2731 GSupplicantInterface *interface = user_data;
2733 /*Fixed : stucking in scanning state when scan failed*/
2734 #if defined TIZEN_EXT
2735 GSupplicantInterfaceCallback scan_callback;
2739 supplicant_dbus_array_foreach(iter, scan_network_update,
2742 #if defined TIZEN_EXT
2743 scan_callback = interface->scan_callback;
2746 if (interface->scan_callback)
2747 interface->scan_callback(0, interface, interface->scan_data);
2749 #if defined TIZEN_EXT
2750 if (interface->scan_callback == scan_callback) {
2752 interface->scan_callback = NULL;
2753 interface->scan_data = NULL;
2754 #if defined TIZEN_EXT
2759 static GSupplicantInterface *interface_alloc(const char *path)
2761 GSupplicantInterface *interface;
2763 interface = g_try_new0(GSupplicantInterface, 1);
2767 interface->path = g_strdup(path);
2769 interface->network_table = g_hash_table_new_full(g_str_hash,
2770 g_str_equal, NULL, remove_network);
2771 interface->peer_table = g_hash_table_new_full(g_str_hash,
2772 g_str_equal, NULL, remove_peer);
2773 interface->group_table = g_hash_table_new_full(g_str_hash,
2774 g_str_equal, NULL, remove_group);
2775 interface->bss_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
2778 g_hash_table_replace(interface_table, interface->path, interface);
2783 static void interface_added(DBusMessageIter *iter, void *user_data)
2785 GSupplicantInterface *interface;
2786 const char *path = NULL;
2787 bool properties_appended = GPOINTER_TO_UINT(user_data);
2791 dbus_message_iter_get_basic(iter, &path);
2795 if (g_strcmp0(path, "/") == 0)
2798 interface = g_hash_table_lookup(interface_table, path);
2802 interface = interface_alloc(path);
2806 if (!properties_appended) {
2807 supplicant_dbus_property_get_all(path,
2808 SUPPLICANT_INTERFACE ".Interface",
2809 interface_property, interface,
2814 dbus_message_iter_next(iter);
2815 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
2816 supplicant_dbus_property_foreach(iter, interface_property,
2818 interface_property(NULL, NULL, interface);
2822 static void interface_removed(DBusMessageIter *iter, void *user_data)
2824 const char *path = NULL;
2825 GSupplicantInterface *interface = user_data;
2827 dbus_message_iter_get_basic(iter, &path);
2831 interface = g_hash_table_lookup(interface_table, path);
2832 g_supplicant_interface_cancel(interface);
2834 g_hash_table_remove(interface_table, path);
2837 static void eap_method(DBusMessageIter *iter, void *user_data)
2839 const char *str = NULL;
2842 dbus_message_iter_get_basic(iter, &str);
2846 for (i = 0; eap_method_map[i].str; i++)
2847 if (strcmp(str, eap_method_map[i].str) == 0) {
2848 eap_methods |= eap_method_map[i].val;
2853 static void service_property(const char *key, DBusMessageIter *iter,
2857 callback_system_ready();
2861 if (g_strcmp0(key, "DebugLevel") == 0) {
2862 const char *str = NULL;
2865 dbus_message_iter_get_basic(iter, &str);
2866 for (i = 0; debug_strings[i]; i++)
2867 if (g_strcmp0(debug_strings[i], str) == 0) {
2871 SUPPLICANT_DBG("Debug level %d", debug_level);
2872 } else if (g_strcmp0(key, "DebugTimestamp") == 0) {
2873 dbus_message_iter_get_basic(iter, &debug_timestamp);
2874 SUPPLICANT_DBG("Debug timestamp %u", debug_timestamp);
2875 } else if (g_strcmp0(key, "DebugShowKeys") == 0) {
2876 dbus_message_iter_get_basic(iter, &debug_showkeys);
2877 SUPPLICANT_DBG("Debug show keys %u", debug_showkeys);
2878 } else if (g_strcmp0(key, "Interfaces") == 0) {
2879 supplicant_dbus_array_foreach(iter, interface_added, NULL);
2880 } else if (g_strcmp0(key, "EapMethods") == 0) {
2881 supplicant_dbus_array_foreach(iter, eap_method, NULL);
2882 debug_strvalmap("EAP method", eap_method_map, eap_methods);
2883 } else if (g_strcmp0(key, "Country") == 0) {
2884 const char *country = NULL;
2886 dbus_message_iter_get_basic(iter, &country);
2887 SUPPLICANT_DBG("Country %s", country);
2889 SUPPLICANT_DBG("key %s type %c",
2890 key, dbus_message_iter_get_arg_type(iter));
2893 static void signal_name_owner_changed(const char *path, DBusMessageIter *iter)
2895 const char *name = NULL, *old = NULL, *new = NULL;
2899 if (g_strcmp0(path, DBUS_PATH_DBUS) != 0)
2902 dbus_message_iter_get_basic(iter, &name);
2906 if (g_strcmp0(name, SUPPLICANT_SERVICE) != 0)
2909 dbus_message_iter_next(iter);
2910 dbus_message_iter_get_basic(iter, &old);
2911 dbus_message_iter_next(iter);
2912 dbus_message_iter_get_basic(iter, &new);
2917 if (strlen(old) > 0 && strlen(new) == 0) {
2918 system_available = FALSE;
2919 g_hash_table_remove_all(bss_mapping);
2920 g_hash_table_remove_all(peer_mapping);
2921 g_hash_table_remove_all(group_mapping);
2922 g_hash_table_remove_all(config_file_table);
2923 g_hash_table_remove_all(interface_table);
2924 callback_system_killed();
2927 if (strlen(new) > 0 && strlen(old) == 0) {
2928 system_available = TRUE;
2929 supplicant_dbus_property_get_all(SUPPLICANT_PATH,
2930 SUPPLICANT_INTERFACE,
2931 service_property, NULL, NULL);
2935 static void signal_properties_changed(const char *path, DBusMessageIter *iter)
2939 if (g_strcmp0(path, SUPPLICANT_PATH) != 0)
2942 supplicant_dbus_property_foreach(iter, service_property, NULL);
2945 static void signal_interface_added(const char *path, DBusMessageIter *iter)
2947 SUPPLICANT_DBG("path %s %s", path, SUPPLICANT_PATH);
2949 if (g_strcmp0(path, SUPPLICANT_PATH) == 0)
2950 interface_added(iter, GUINT_TO_POINTER(true));
2953 static void signal_interface_removed(const char *path, DBusMessageIter *iter)
2957 if (g_strcmp0(path, SUPPLICANT_PATH) == 0)
2958 interface_removed(iter, NULL);
2961 static void signal_interface_changed(const char *path, DBusMessageIter *iter)
2963 GSupplicantInterface *interface;
2967 interface = g_hash_table_lookup(interface_table, path);
2971 supplicant_dbus_property_foreach(iter, interface_property, interface);
2974 static void signal_scan_done(const char *path, DBusMessageIter *iter)
2976 GSupplicantInterface *interface;
2977 dbus_bool_t success = FALSE;
2981 interface = g_hash_table_lookup(interface_table, path);
2985 dbus_message_iter_get_basic(iter, &success);
2987 if (interface->scanning) {
2988 callback_scan_finished(interface);
2989 interface->scanning = FALSE;
2993 * If scan is unsuccessful return -EIO else get the scanned BSSs
2994 * and update the network details accordingly
2997 if (interface->scan_callback)
2998 interface->scan_callback(-EIO, interface,
2999 interface->scan_data);
3001 interface->scan_callback = NULL;
3002 interface->scan_data = NULL;
3007 supplicant_dbus_property_get(path, SUPPLICANT_INTERFACE ".Interface",
3008 "BSSs", scan_bss_data, interface, interface);
3011 static void signal_bss_added(const char *path, DBusMessageIter *iter)
3013 GSupplicantInterface *interface;
3017 interface = g_hash_table_lookup(interface_table, path);
3021 interface_bss_added_with_keys(iter, interface);
3024 static void signal_bss_removed(const char *path, DBusMessageIter *iter)
3026 GSupplicantInterface *interface;
3030 interface = g_hash_table_lookup(interface_table, path);
3034 interface_bss_removed(iter, interface);
3037 static void signal_network_added(const char *path, DBusMessageIter *iter)
3039 GSupplicantInterface *interface;
3043 interface = g_hash_table_lookup(interface_table, path);
3047 interface_network_added(iter, interface);
3050 static void signal_network_removed(const char *path, DBusMessageIter *iter)
3052 GSupplicantInterface *interface;
3056 interface = g_hash_table_lookup(interface_table, path);
3060 interface_network_removed(iter, interface);
3063 static void signal_bss_changed(const char *path, DBusMessageIter *iter)
3065 GSupplicantInterface *interface;
3066 GSupplicantNetwork *network;
3067 GSupplicantSecurity old_security;
3068 struct g_supplicant_bss *bss;
3072 interface = g_hash_table_lookup(bss_mapping, path);
3076 network = g_hash_table_lookup(interface->bss_mapping, path);
3080 bss = g_hash_table_lookup(network->bss_table, path);
3084 supplicant_dbus_property_foreach(iter, bss_property, bss);
3085 #if defined TIZEN_EXT
3086 network->frequency = bss->frequency;
3088 old_security = network->security;
3089 bss_compute_security(bss);
3091 if (old_security != bss->security) {
3092 struct g_supplicant_bss *new_bss;
3094 SUPPLICANT_DBG("New network security for %s", bss->ssid);
3096 /* Security change policy:
3097 * - we first copy the current bss into a new one with
3098 * its own pointer (path)
3099 * - we remove the current bss related network which will
3100 * tell the plugin about such removal. This is done due
3101 * to the fact that a security change means a group change
3102 * so a complete network change.
3103 * (current bss becomes invalid as well)
3104 * - we add the new bss: it adds new network and tell the
3105 * plugin about it. */
3107 new_bss = g_try_new0(struct g_supplicant_bss, 1);
3111 memcpy(new_bss, bss, sizeof(struct g_supplicant_bss));
3112 new_bss->path = g_strdup(bss->path);
3114 g_hash_table_remove(interface->network_table, network->group);
3116 if (add_or_replace_bss_to_network(new_bss) < 0) {
3117 /* Remove entries in hash tables to handle the
3118 * failure in add_or_replace_bss_to_network
3120 g_hash_table_remove(bss_mapping, path);
3121 g_hash_table_remove(interface->bss_mapping, path);
3122 g_hash_table_remove(network->bss_table, path);
3128 #if defined TIZEN_EXT
3129 if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
3130 network->wps = TRUE;
3131 network->wps_capabilities |= bss->wps_capabilities;
3133 network->wps = FALSE;
3136 /* Consider only property changes of the connected BSS */
3137 if (network == interface->current_network && bss != network->best_bss)
3140 if (bss->signal == network->signal)
3145 callback_network_changed(network, "");
3151 * If the new signal is lower than the SSID signal, we need
3152 * to check for the new maximum.
3154 if (bss->signal < network->signal) {
3155 if (bss != network->best_bss)
3160 callback_network_changed(network, "");
3164 network->signal = bss->signal;
3165 update_network_signal(network);
3167 network->signal = bss->signal;
3168 network->best_bss = bss;
3171 SUPPLICANT_DBG("New network signal for %s %d dBm", network->ssid,
3174 callback_network_changed(network, "Signal");
3177 static void wps_credentials(const char *key, DBusMessageIter *iter,
3180 GSupplicantInterface *interface = user_data;
3185 SUPPLICANT_DBG("key %s", key);
3187 if (g_strcmp0(key, "Key") == 0) {
3188 DBusMessageIter array;
3189 unsigned char *key_val;
3192 dbus_message_iter_recurse(iter, &array);
3193 dbus_message_iter_get_fixed_array(&array, &key_val, &key_len);
3195 g_free(interface->wps_cred.key);
3196 interface->wps_cred.key = g_try_malloc0(
3197 sizeof(char) * key_len + 1);
3199 if (!interface->wps_cred.key)
3202 memcpy(interface->wps_cred.key, key_val,
3203 sizeof(char) * key_len);
3205 SUPPLICANT_DBG("WPS key present");
3206 } else if (g_strcmp0(key, "SSID") == 0) {
3207 DBusMessageIter array;
3208 unsigned char *ssid;
3211 dbus_message_iter_recurse(iter, &array);
3212 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
3214 if (ssid_len > 0 && ssid_len < 33) {
3215 memcpy(interface->wps_cred.ssid, ssid, ssid_len);
3216 interface->wps_cred.ssid_len = ssid_len;
3218 memset(interface->wps_cred.ssid, 0, 32);
3219 interface->wps_cred.ssid_len = 0;
3224 static void signal_wps_credentials(const char *path, DBusMessageIter *iter)
3226 GSupplicantInterface *interface;
3230 interface = g_hash_table_lookup(interface_table, path);
3234 supplicant_dbus_property_foreach(iter, wps_credentials, interface);
3237 static void wps_event_args(const char *key, DBusMessageIter *iter,
3240 GSupplicantInterface *interface = user_data;
3242 if (!key || !interface)
3245 SUPPLICANT_DBG("Arg Key %s", key);
3248 static void signal_wps_event(const char *path, DBusMessageIter *iter)
3250 GSupplicantInterface *interface;
3251 const char *name = NULL;
3255 interface = g_hash_table_lookup(interface_table, path);
3259 dbus_message_iter_get_basic(iter, &name);
3261 SUPPLICANT_DBG("Name: %s", name);
3263 if (g_strcmp0(name, "success") == 0)
3264 interface->wps_state = G_SUPPLICANT_WPS_STATE_SUCCESS;
3265 else if (g_strcmp0(name, "failed") == 0)
3266 interface->wps_state = G_SUPPLICANT_WPS_STATE_FAIL;
3268 interface->wps_state = G_SUPPLICANT_WPS_STATE_UNKNOWN;
3270 if (!dbus_message_iter_has_next(iter))
3273 dbus_message_iter_next(iter);
3275 supplicant_dbus_property_foreach(iter, wps_event_args, interface);
3278 #if defined TIZEN_EXT
3279 static void signal_power_off(const char *path, DBusMessageIter *iter)
3281 int poweroff_state = 0;
3283 dbus_message_iter_get_basic(iter, &poweroff_state);
3285 SUPPLICANT_DBG("poweroff_state(%d)", poweroff_state);
3287 /* POWER_OFF_DIRECT 2 && POWER_OFF_RESTART 3 */
3288 if (poweroff_state != 2 && poweroff_state != 3)
3291 if (callbacks_pointer == NULL)
3294 if (callbacks_pointer->system_power_off == NULL)
3297 callbacks_pointer->system_power_off();
3301 static void signal_station_connected(const char *path, DBusMessageIter *iter)
3303 GSupplicantInterface *interface;
3304 const char *sta_mac = NULL;
3306 SUPPLICANT_DBG("path %s %s", path, SUPPLICANT_PATH);
3308 if (callbacks_pointer->add_station == NULL)
3311 if (g_strcmp0(path, "/") == 0)
3314 interface = g_hash_table_lookup(interface_table, path);
3315 if (interface == NULL)
3318 dbus_message_iter_get_basic(iter, &sta_mac);
3319 if (sta_mac == NULL)
3322 SUPPLICANT_DBG("New station %s connected", sta_mac);
3323 callbacks_pointer->add_station(sta_mac);
3326 static void signal_station_disconnected(const char *path, DBusMessageIter *iter)
3328 GSupplicantInterface *interface;
3329 const char *sta_mac = NULL;
3331 SUPPLICANT_DBG("path %s %s", path, SUPPLICANT_PATH);
3333 if (callbacks_pointer->remove_station == NULL)
3336 if (g_strcmp0(path, "/") == 0)
3339 interface = g_hash_table_lookup(interface_table, path);
3340 if (interface == NULL)
3343 dbus_message_iter_get_basic(iter, &sta_mac);
3344 if (sta_mac == NULL)
3347 SUPPLICANT_DBG("Station %s disconnected", sta_mac);
3348 callbacks_pointer->remove_station(sta_mac);
3351 static void create_peer_identifier(GSupplicantPeer *peer)
3353 const unsigned char test[ETH_ALEN] = {};
3358 if (!memcmp(peer->device_address, test, ETH_ALEN)) {
3359 peer->identifier = g_strdup(peer->name);
3363 peer->identifier = g_malloc0(19);
3364 snprintf(peer->identifier, 19, "%02x%02x%02x%02x%02x%02x",
3365 peer->device_address[0],
3366 peer->device_address[1],
3367 peer->device_address[2],
3368 peer->device_address[3],
3369 peer->device_address[4],
3370 peer->device_address[5]);
3373 struct peer_property_data {
3374 GSupplicantPeer *peer;
3376 bool groups_changed;
3377 bool services_changed;
3380 static void peer_groups_relation(DBusMessageIter *iter, void *user_data)
3382 struct peer_property_data *data = user_data;
3383 GSupplicantPeer *peer = data->peer;
3384 GSupplicantGroup *group;
3385 const char *str = NULL;
3388 dbus_message_iter_get_basic(iter, &str);
3392 group = g_hash_table_lookup(group_mapping, str);
3396 elem = g_slist_find_custom(data->old_groups, str, (GCompareFunc)g_strcmp0);
3398 data->old_groups = g_slist_remove_link(data->old_groups, elem);
3399 peer->groups = g_slist_concat(elem, peer->groups);
3401 peer->groups = g_slist_prepend(peer->groups, g_strdup(str));
3402 data->groups_changed = true;
3406 static void peer_property(const char *key, DBusMessageIter *iter,
3409 GSupplicantPeer *pending_peer;
3410 struct peer_property_data *data = user_data;
3411 GSupplicantPeer *peer = data->peer;
3413 SUPPLICANT_DBG("key: %s", key);
3415 if (!peer->interface)
3420 create_peer_identifier(peer);
3421 callback_peer_found(peer);
3422 pending_peer = g_hash_table_lookup(
3423 pending_peer_connection, peer->path);
3425 if (pending_peer && pending_peer == peer) {
3426 callback_peer_request(peer);
3427 g_hash_table_remove(pending_peer_connection,
3437 if (g_strcmp0(key, "DeviceAddress") == 0) {
3438 unsigned char *dev_addr;
3439 DBusMessageIter array;
3442 dbus_message_iter_recurse(iter, &array);
3443 dbus_message_iter_get_fixed_array(&array, &dev_addr, &len);
3445 if (len == ETH_ALEN)
3446 memcpy(peer->device_address, dev_addr, len);
3447 } else if (g_strcmp0(key, "DeviceName") == 0) {
3448 const char *str = NULL;
3450 dbus_message_iter_get_basic(iter, &str);
3452 peer->name = g_strdup(str);
3453 } else if (g_strcmp0(key, "config_method") == 0) {
3454 uint16_t wps_config;
3456 dbus_message_iter_get_basic(iter, &wps_config);
3458 if (wps_config & G_SUPPLICANT_WPS_CONFIG_PBC)
3459 peer->wps_capabilities |= G_SUPPLICANT_WPS_PBC;
3460 if (wps_config & ~G_SUPPLICANT_WPS_CONFIG_PBC)
3461 peer->wps_capabilities |= G_SUPPLICANT_WPS_PIN;
3462 } else if (g_strcmp0(key, "Groups") == 0) {
3463 data->old_groups = peer->groups;
3464 peer->groups = NULL;
3466 supplicant_dbus_array_foreach(iter,
3467 peer_groups_relation, data);
3468 if (g_slist_length(data->old_groups) > 0) {
3469 g_slist_free_full(data->old_groups, g_free);
3470 data->groups_changed = true;
3472 } else if (g_strcmp0(key, "IEs") == 0) {
3473 DBusMessageIter array;
3477 dbus_message_iter_recurse(iter, &array);
3478 dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
3480 if (!ie || ie_len < 2)
3483 if (peer->widi_ies) {
3484 if (memcmp(peer->widi_ies, ie, ie_len) == 0)
3487 g_free(peer->widi_ies);
3488 peer->widi_ies_length = 0;
3491 peer->widi_ies = g_malloc0(ie_len * sizeof(unsigned char));
3493 memcpy(peer->widi_ies, ie, ie_len);
3494 peer->widi_ies_length = ie_len;
3495 data->services_changed = true;
3499 static void signal_peer_found(const char *path, DBusMessageIter *iter)
3501 struct peer_property_data *property_data;
3502 GSupplicantInterface *interface;
3503 const char *obj_path = NULL;
3504 GSupplicantPeer *peer;
3508 interface = g_hash_table_lookup(interface_table, path);
3512 dbus_message_iter_get_basic(iter, &obj_path);
3513 if (!obj_path || g_strcmp0(obj_path, "/") == 0)
3516 peer = g_hash_table_lookup(interface->peer_table, obj_path);
3520 peer = g_try_new0(GSupplicantPeer, 1);
3524 peer->interface = interface;
3525 peer->path = g_strdup(obj_path);
3526 g_hash_table_insert(interface->peer_table, peer->path, peer);
3527 g_hash_table_replace(peer_mapping, peer->path, interface);
3529 property_data = dbus_malloc0(sizeof(struct peer_property_data));
3530 property_data->peer = peer;
3532 dbus_message_iter_next(iter);
3533 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
3534 supplicant_dbus_property_foreach(iter, peer_property,
3536 peer_property(NULL, NULL, property_data);
3540 supplicant_dbus_property_get_all(obj_path,
3541 SUPPLICANT_INTERFACE ".Peer",
3542 peer_property, property_data, NULL);
3545 static void signal_peer_lost(const char *path, DBusMessageIter *iter)
3547 GSupplicantInterface *interface;
3548 const char *obj_path = NULL;
3549 GSupplicantPeer *peer;
3553 interface = g_hash_table_lookup(interface_table, path);
3557 dbus_message_iter_get_basic(iter, &obj_path);
3558 if (!obj_path || g_strcmp0(obj_path, "/") == 0)
3561 peer = g_hash_table_lookup(interface->peer_table, obj_path);
3565 g_hash_table_remove(interface->peer_table, obj_path);
3568 static void signal_peer_changed(const char *path, DBusMessageIter *iter)
3570 struct peer_property_data *property_data;
3571 GSupplicantInterface *interface;
3572 GSupplicantPeer *peer;
3576 interface = g_hash_table_lookup(peer_mapping, path);
3580 peer = g_hash_table_lookup(interface->peer_table, path);
3582 g_hash_table_remove(peer_mapping, path);
3586 property_data = dbus_malloc0(sizeof(struct peer_property_data));
3587 property_data->peer = peer;
3589 supplicant_dbus_property_foreach(iter, peer_property, property_data);
3590 if (property_data->services_changed)
3591 callback_peer_changed(peer,
3592 G_SUPPLICANT_PEER_SERVICES_CHANGED);
3594 if (property_data->groups_changed)
3595 callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_CHANGED);
3597 dbus_free(property_data);
3599 if (!g_supplicant_peer_is_in_a_group(peer))
3600 peer->connection_requested = false;
3603 struct group_sig_data {
3604 const char *peer_obj_path;
3605 unsigned char iface_address[ETH_ALEN];
3606 const char *interface_obj_path;
3607 const char *group_obj_path;
3611 static void group_sig_property(const char *key, DBusMessageIter *iter,
3614 struct group_sig_data *data = user_data;
3619 if (g_strcmp0(key, "peer_interface_addr") == 0) {
3620 unsigned char *dev_addr;
3621 DBusMessageIter array;
3624 dbus_message_iter_recurse(iter, &array);
3625 dbus_message_iter_get_fixed_array(&array, &dev_addr, &len);
3627 if (len == ETH_ALEN)
3628 memcpy(data->iface_address, dev_addr, len);
3629 } else if (g_strcmp0(key, "role") == 0) {
3630 const char *str = NULL;
3632 dbus_message_iter_get_basic(iter, &str);
3633 if (g_strcmp0(str, "GO") == 0)
3634 data->role = G_SUPPLICANT_GROUP_ROLE_GO;
3636 data->role = G_SUPPLICANT_GROUP_ROLE_CLIENT;
3637 } else if (g_strcmp0(key, "peer_object") == 0)
3638 dbus_message_iter_get_basic(iter, &data->peer_obj_path);
3639 else if (g_strcmp0(key, "interface_object") == 0)
3640 dbus_message_iter_get_basic(iter, &data->interface_obj_path);
3641 else if (g_strcmp0(key, "group_object") == 0)
3642 dbus_message_iter_get_basic(iter, &data->group_obj_path);
3646 static void signal_group_success(const char *path, DBusMessageIter *iter)
3648 GSupplicantInterface *interface;
3649 struct group_sig_data data = {};
3650 GSupplicantPeer *peer;
3654 interface = g_hash_table_lookup(interface_table, path);
3658 supplicant_dbus_property_foreach(iter, group_sig_property, &data);
3659 if (!data.peer_obj_path)
3662 peer = g_hash_table_lookup(interface->peer_table, data.peer_obj_path);
3666 memcpy(peer->iface_address, data.iface_address, ETH_ALEN);
3667 interface->pending_peer_path = peer->path;
3670 static void signal_group_failure(const char *path, DBusMessageIter *iter)
3672 GSupplicantInterface *interface;
3673 struct group_sig_data data = {};
3674 GSupplicantPeer *peer;
3678 interface = g_hash_table_lookup(interface_table, path);
3682 supplicant_dbus_property_foreach(iter, group_sig_property, &data);
3683 if (!data.peer_obj_path)
3686 peer = g_hash_table_lookup(interface->peer_table, data.peer_obj_path);
3690 callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_FAILED);
3691 peer->connection_requested = false;
3694 static void signal_group_started(const char *path, DBusMessageIter *iter)
3696 GSupplicantInterface *interface, *g_interface;
3697 struct group_sig_data data = {};
3698 GSupplicantGroup *group;
3699 GSupplicantPeer *peer;
3703 interface = g_hash_table_lookup(interface_table, path);
3707 supplicant_dbus_property_foreach(iter, group_sig_property, &data);
3708 if (!data.interface_obj_path || !data.group_obj_path)
3711 peer = g_hash_table_lookup(interface->peer_table,
3712 interface->pending_peer_path);
3713 interface->pending_peer_path = NULL;
3717 g_interface = g_hash_table_lookup(interface_table,
3718 data.interface_obj_path);
3722 group = g_hash_table_lookup(interface->group_table,
3723 data.group_obj_path);
3727 group = g_try_new0(GSupplicantGroup, 1);
3731 group->interface = g_interface;
3732 group->orig_interface = interface;
3733 group->path = g_strdup(data.group_obj_path);
3734 group->role = data.role;
3736 g_hash_table_insert(interface->group_table, group->path, group);
3737 g_hash_table_replace(group_mapping, group->path, group);
3739 peer->current_group_iface = g_interface;
3740 callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_STARTED);
3743 static void remove_peer_group_interface(GHashTable *group_table,
3746 GSupplicantGroup *group;
3747 GHashTableIter iter;
3748 gpointer value, key;
3753 group = g_hash_table_lookup(group_table, path);
3755 if (!group || !group->orig_interface)
3758 g_hash_table_iter_init(&iter, group->orig_interface->peer_table);
3760 while (g_hash_table_iter_next(&iter, &key, &value)) {
3761 GSupplicantPeer *peer = value;
3763 if (peer->current_group_iface == group->interface)
3764 peer->current_group_iface = NULL;
3768 static void signal_group_finished(const char *path, DBusMessageIter *iter)
3770 GSupplicantInterface *interface;
3771 struct group_sig_data data = {};
3775 interface = g_hash_table_lookup(interface_table, path);
3779 supplicant_dbus_property_foreach(iter, group_sig_property, &data);
3780 if (!data.interface_obj_path || !data.group_obj_path)
3783 remove_peer_group_interface(interface->group_table, data.group_obj_path);
3785 g_hash_table_remove(group_mapping, data.group_obj_path);
3787 g_hash_table_remove(interface->group_table, data.group_obj_path);
3790 static void signal_group_request(const char *path, DBusMessageIter *iter)
3792 GSupplicantInterface *interface;
3793 GSupplicantPeer *peer;
3794 const char *obj_path;
3798 interface = g_hash_table_lookup(interface_table, path);
3802 dbus_message_iter_get_basic(iter, &obj_path);
3803 if (!obj_path || !g_strcmp0(obj_path, "/"))
3806 peer = g_hash_table_lookup(interface->peer_table, obj_path);
3811 * Peer has been previously found and property set,
3812 * otherwise, defer connection to when peer property
3815 if (peer->identifier)
3816 callback_peer_request(peer);
3818 g_hash_table_replace(pending_peer_connection, peer->path, peer);
3821 static void signal_group_peer_joined(const char *path, DBusMessageIter *iter)
3823 const char *peer_path = NULL;
3824 GSupplicantInterface *interface;
3825 GSupplicantGroup *group;
3826 GSupplicantPeer *peer;
3830 group = g_hash_table_lookup(group_mapping, path);
3834 dbus_message_iter_get_basic(iter, &peer_path);
3838 interface = g_hash_table_lookup(peer_mapping, peer_path);
3842 peer = g_hash_table_lookup(interface->peer_table, peer_path);
3846 group->members = g_slist_prepend(group->members, g_strdup(peer_path));
3848 callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_JOINED);
3851 static void signal_group_peer_disconnected(const char *path, DBusMessageIter *iter)
3853 const char *peer_path = NULL;
3854 GSupplicantInterface *interface;
3855 GSupplicantGroup *group;
3856 GSupplicantPeer *peer;
3861 group = g_hash_table_lookup(group_mapping, path);
3865 dbus_message_iter_get_basic(iter, &peer_path);
3869 for (elem = group->members; elem; elem = elem->next) {
3870 if (!g_strcmp0(elem->data, peer_path))
3878 group->members = g_slist_delete_link(group->members, elem);
3880 interface = g_hash_table_lookup(peer_mapping, peer_path);
3884 peer = g_hash_table_lookup(interface->peer_table, peer_path);
3888 callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_DISCONNECTED);
3889 peer->connection_requested = false;
3893 const char *interface;
3895 void (*function) (const char *path, DBusMessageIter *iter);
3897 { DBUS_INTERFACE_DBUS, "NameOwnerChanged", signal_name_owner_changed },
3899 { SUPPLICANT_INTERFACE, "PropertiesChanged", signal_properties_changed },
3900 { SUPPLICANT_INTERFACE, "InterfaceAdded", signal_interface_added },
3901 { SUPPLICANT_INTERFACE, "InterfaceCreated", signal_interface_added },
3902 { SUPPLICANT_INTERFACE, "InterfaceRemoved", signal_interface_removed },
3904 { SUPPLICANT_INTERFACE ".Interface", "PropertiesChanged", signal_interface_changed },
3905 { SUPPLICANT_INTERFACE ".Interface", "ScanDone", signal_scan_done },
3906 { SUPPLICANT_INTERFACE ".Interface", "BSSAdded", signal_bss_added },
3907 { SUPPLICANT_INTERFACE ".Interface", "BSSRemoved", signal_bss_removed },
3908 { SUPPLICANT_INTERFACE ".Interface", "NetworkAdded", signal_network_added },
3909 { SUPPLICANT_INTERFACE ".Interface", "NetworkRemoved", signal_network_removed },
3911 { SUPPLICANT_INTERFACE ".BSS", "PropertiesChanged", signal_bss_changed },
3913 { SUPPLICANT_INTERFACE ".Interface.WPS", "Credentials", signal_wps_credentials },
3914 { SUPPLICANT_INTERFACE ".Interface.WPS", "Event", signal_wps_event },
3915 #if defined TIZEN_EXT
3916 { "org.tizen.system.deviced.PowerOff", "ChangeState", signal_power_off },
3919 { SUPPLICANT_INTERFACE".Interface", "StaAuthorized", signal_station_connected },
3920 { SUPPLICANT_INTERFACE".Interface", "StaDeauthorized", signal_station_disconnected },
3922 { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeviceFound", signal_peer_found },
3923 { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeviceLost", signal_peer_lost },
3925 { SUPPLICANT_INTERFACE ".Peer", "PropertiesChanged", signal_peer_changed },
3927 { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationSuccess", signal_group_success },
3928 { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationFailure", signal_group_failure },
3929 { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GroupStarted", signal_group_started },
3930 { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GroupFinished", signal_group_finished },
3931 { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationRequest", signal_group_request },
3933 { SUPPLICANT_INTERFACE ".Group", "PeerJoined", signal_group_peer_joined },
3934 { SUPPLICANT_INTERFACE ".Group", "PeerDisconnected", signal_group_peer_disconnected },
3939 static DBusHandlerResult g_supplicant_filter(DBusConnection *conn,
3940 DBusMessage *message, void *data)
3942 DBusMessageIter iter;
3946 path = dbus_message_get_path(message);
3948 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
3950 if (!dbus_message_iter_init(message, &iter))
3951 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
3953 for (i = 0; signal_map[i].interface; i++) {
3954 if (!dbus_message_has_interface(message, signal_map[i].interface))
3957 if (!dbus_message_has_member(message, signal_map[i].member))
3960 signal_map[i].function(path, &iter);
3964 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
3967 void g_supplicant_interface_cancel(GSupplicantInterface *interface)
3969 SUPPLICANT_DBG("Cancelling any pending DBus calls");
3970 supplicant_dbus_method_call_cancel_all(interface);
3971 supplicant_dbus_property_call_cancel_all(interface);
3974 struct supplicant_regdom {
3975 GSupplicantCountryCallback callback;
3977 const void *user_data;
3980 static void country_result(const char *error,
3981 DBusMessageIter *iter, void *user_data)
3983 struct supplicant_regdom *regdom = user_data;
3986 SUPPLICANT_DBG("Country setting result");
3992 SUPPLICANT_DBG("Country setting failure %s", error);
3996 if (regdom->callback)
3997 regdom->callback(result, regdom->alpha2,
3998 (void *) regdom->user_data);
4003 static void country_params(DBusMessageIter *iter, void *user_data)
4005 struct supplicant_regdom *regdom = user_data;
4007 dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING,
4011 int g_supplicant_set_country(const char *alpha2,
4012 GSupplicantCountryCallback callback,
4013 const void *user_data)
4015 struct supplicant_regdom *regdom;
4018 SUPPLICANT_DBG("Country setting %s", alpha2);
4020 if (!system_available)
4023 regdom = dbus_malloc0(sizeof(*regdom));
4027 regdom->callback = callback;
4028 regdom->alpha2 = alpha2;
4029 regdom->user_data = user_data;
4031 ret = supplicant_dbus_property_set(SUPPLICANT_PATH, SUPPLICANT_INTERFACE,
4032 "Country", DBUS_TYPE_STRING_AS_STRING,
4033 country_params, country_result,
4037 SUPPLICANT_DBG("Unable to set Country configuration");
4042 int g_supplicant_interface_set_country(GSupplicantInterface *interface,
4043 GSupplicantCountryCallback callback,
4047 struct supplicant_regdom *regdom;
4050 regdom = dbus_malloc0(sizeof(*regdom));
4054 regdom->callback = callback;
4055 regdom->alpha2 = alpha2;
4056 regdom->user_data = user_data;
4058 ret = supplicant_dbus_property_set(interface->path,
4059 SUPPLICANT_INTERFACE ".Interface",
4060 "Country", DBUS_TYPE_STRING_AS_STRING,
4061 country_params, country_result,
4065 SUPPLICANT_DBG("Unable to set Country configuration");
4071 bool g_supplicant_interface_has_p2p(GSupplicantInterface *interface)
4076 return interface->p2p_support;
4079 struct supplicant_p2p_dev_config {
4084 static void p2p_device_config_result(const char *error,
4085 DBusMessageIter *iter, void *user_data)
4087 struct supplicant_p2p_dev_config *config = user_data;
4090 SUPPLICANT_DBG("Unable to set P2P Device configuration: %s",
4093 g_free(config->device_name);
4094 g_free(config->dev_type);
4098 static int dev_type_str2bin(const char *type, unsigned char dev_type[8])
4100 int length, pos, end;
4105 for (length = pos = 0; type[pos] != '\0' && length < 8; length++) {
4112 dev_type[length] = strtol(b, &e, 16);
4113 if (e && *e != '\0')
4122 static void p2p_device_config_params(DBusMessageIter *iter, void *user_data)
4124 struct supplicant_p2p_dev_config *config = user_data;
4125 DBusMessageIter dict;
4127 supplicant_dbus_dict_open(iter, &dict);
4129 supplicant_dbus_dict_append_basic(&dict, "DeviceName",
4130 DBUS_TYPE_STRING, &config->device_name);
4132 if (config->dev_type) {
4133 unsigned char dev_type[8] = {}, *type;
4136 len = dev_type_str2bin(config->dev_type, dev_type);
4139 supplicant_dbus_dict_append_fixed_array(&dict,
4140 "PrimaryDeviceType",
4141 DBUS_TYPE_BYTE, &type, len);
4145 supplicant_dbus_dict_close(iter, &dict);
4148 int g_supplicant_interface_set_p2p_device_config(GSupplicantInterface *interface,
4149 const char *device_name,
4150 const char *primary_dev_type)
4152 struct supplicant_p2p_dev_config *config;
4155 SUPPLICANT_DBG("P2P Device settings %s/%s",
4156 device_name, primary_dev_type);
4158 config = dbus_malloc0(sizeof(*config));
4162 config->device_name = g_strdup(device_name);
4163 config->dev_type = g_strdup(primary_dev_type);
4165 ret = supplicant_dbus_property_set(interface->path,
4166 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
4168 DBUS_TYPE_ARRAY_AS_STRING
4169 DBUS_DICT_ENTRY_BEGIN_CHAR_AS_STRING
4170 DBUS_TYPE_STRING_AS_STRING
4171 DBUS_TYPE_VARIANT_AS_STRING
4172 DBUS_DICT_ENTRY_END_CHAR_AS_STRING,
4173 p2p_device_config_params,
4174 p2p_device_config_result, config, NULL);
4176 g_free(config->device_name);
4177 g_free(config->dev_type);
4179 SUPPLICANT_DBG("Unable to set P2P Device configuration");
4185 static gboolean peer_lookup_by_identifier(gpointer key, gpointer value,
4188 const GSupplicantPeer *peer = value;
4189 const char *identifier = user_data;
4191 if (!g_strcmp0(identifier, peer->identifier))
4197 GSupplicantPeer *g_supplicant_interface_peer_lookup(GSupplicantInterface *interface,
4198 const char *identifier)
4200 GSupplicantPeer *peer;
4202 peer = g_hash_table_find(interface->peer_table,
4203 peer_lookup_by_identifier,
4204 (void *) identifier);
4208 static void interface_create_data_free(struct interface_create_data *data)
4210 g_free(data->ifname);
4211 g_free(data->driver);
4212 g_free(data->bridge);
4216 static bool interface_exists(GSupplicantInterface *interface,
4219 GSupplicantInterface *tmp;
4221 tmp = g_hash_table_lookup(interface_table, path);
4222 if (tmp && tmp == interface)
4228 static void interface_create_property(const char *key, DBusMessageIter *iter,
4231 struct interface_create_data *data = user_data;
4232 GSupplicantInterface *interface = data->interface;
4235 if (data->callback) {
4236 data->callback(0, data->interface, data->user_data);
4237 #if !defined TIZEN_EXT
4238 callback_p2p_support(interface);
4242 interface_create_data_free(data);
4245 interface_property(key, iter, interface);
4248 static void interface_create_result(const char *error,
4249 DBusMessageIter *iter, void *user_data)
4251 struct interface_create_data *data = user_data;
4252 const char *path = NULL;
4258 g_warning("error %s", error);
4263 dbus_message_iter_get_basic(iter, &path);
4269 if (!system_available) {
4274 data->interface = g_hash_table_lookup(interface_table, path);
4275 if (!data->interface) {
4276 data->interface = interface_alloc(path);
4277 if (!data->interface) {
4283 err = supplicant_dbus_property_get_all(path,
4284 SUPPLICANT_INTERFACE ".Interface",
4285 interface_create_property, data,
4292 data->callback(err, NULL, data->user_data);
4294 interface_create_data_free(data);
4297 static void interface_create_params(DBusMessageIter *iter, void *user_data)
4299 struct interface_create_data *data = user_data;
4300 DBusMessageIter dict;
4301 char *config_file = NULL;
4305 supplicant_dbus_dict_open(iter, &dict);
4307 supplicant_dbus_dict_append_basic(&dict, "Ifname",
4308 DBUS_TYPE_STRING, &data->ifname);
4311 supplicant_dbus_dict_append_basic(&dict, "Driver",
4312 DBUS_TYPE_STRING, &data->driver);
4315 supplicant_dbus_dict_append_basic(&dict, "BridgeIfname",
4316 DBUS_TYPE_STRING, &data->bridge);
4318 config_file = g_hash_table_lookup(config_file_table, data->ifname);
4320 SUPPLICANT_DBG("[%s] ConfigFile %s", data->ifname, config_file);
4322 supplicant_dbus_dict_append_basic(&dict, "ConfigFile",
4323 DBUS_TYPE_STRING, &config_file);
4326 supplicant_dbus_dict_close(iter, &dict);
4329 static void interface_get_result(const char *error,
4330 DBusMessageIter *iter, void *user_data)
4332 struct interface_create_data *data = user_data;
4333 GSupplicantInterface *interface;
4334 const char *path = NULL;
4340 SUPPLICANT_DBG("Interface not created yet");
4344 dbus_message_iter_get_basic(iter, &path);
4350 interface = g_hash_table_lookup(interface_table, path);
4356 if (data->callback) {
4357 data->callback(0, interface, data->user_data);
4358 #if !defined TIZEN_EXT
4359 callback_p2p_support(interface);
4363 interface_create_data_free(data);
4368 if (!system_available) {
4373 SUPPLICANT_DBG("Creating interface");
4375 err = supplicant_dbus_method_call(SUPPLICANT_PATH,
4376 SUPPLICANT_INTERFACE,
4378 interface_create_params,
4379 interface_create_result, data,
4386 data->callback(err, NULL, data->user_data);
4388 interface_create_data_free(data);
4391 static void interface_get_params(DBusMessageIter *iter, void *user_data)
4393 struct interface_create_data *data = user_data;
4397 dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, &data->ifname);
4400 int g_supplicant_interface_create(const char *ifname, const char *driver,
4402 GSupplicantInterfaceCallback callback,
4405 struct interface_create_data *data;
4408 SUPPLICANT_DBG("ifname %s", ifname);
4413 if (!system_available)
4416 data = dbus_malloc0(sizeof(*data));
4420 data->ifname = g_strdup(ifname);
4421 data->driver = g_strdup(driver);
4422 data->bridge = g_strdup(bridge);
4423 data->callback = callback;
4424 data->user_data = user_data;
4426 ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
4427 SUPPLICANT_INTERFACE,
4429 interface_get_params,
4430 interface_get_result, data,
4433 interface_create_data_free(data);
4438 static void interface_remove_result(const char *error,
4439 DBusMessageIter *iter, void *user_data)
4441 struct interface_data *data = user_data;
4446 SUPPLICANT_DBG("error: %s", error);
4450 if (!system_available) {
4456 * The gsupplicant interface is already freed by the InterfaceRemoved
4457 * signal callback. Simply invoke the interface_data callback.
4465 data->callback(err, NULL, data->user_data);
4471 static void interface_remove_params(DBusMessageIter *iter, void *user_data)
4473 struct interface_data *data = user_data;
4475 dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
4476 &data->interface->path);
4480 int g_supplicant_interface_remove(GSupplicantInterface *interface,
4481 GSupplicantInterfaceCallback callback,
4484 struct interface_data *data;
4490 if (!system_available)
4493 g_supplicant_interface_cancel(interface);
4495 data = dbus_malloc0(sizeof(*data));
4499 data->interface = interface;
4500 data->path = g_strdup(interface->path);
4501 data->callback = callback;
4502 data->user_data = user_data;
4504 ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
4505 SUPPLICANT_INTERFACE,
4507 interface_remove_params,
4508 interface_remove_result, data,
4517 static void interface_scan_result(const char *error,
4518 DBusMessageIter *iter, void *user_data)
4520 struct interface_scan_data *data = user_data;
4524 SUPPLICANT_DBG("error %s", error);
4528 /* A non ready interface cannot send/receive anything */
4529 if (interface_exists(data->interface, data->path)) {
4530 if (!data->interface->ready)
4538 data->callback(err, data->interface, data->user_data);
4540 data->interface->scan_callback = data->callback;
4541 data->interface->scan_data = data->user_data;
4544 if (data->scan_params)
4545 g_supplicant_free_scan_params(data->scan_params);
4550 static void add_scan_frequency(DBusMessageIter *iter, unsigned int freq)
4552 DBusMessageIter data;
4553 unsigned int width = 0; /* Not used by wpa_supplicant atm */
4555 dbus_message_iter_open_container(iter, DBUS_TYPE_STRUCT, NULL, &data);
4557 dbus_message_iter_append_basic(&data, DBUS_TYPE_UINT32, &freq);
4558 dbus_message_iter_append_basic(&data, DBUS_TYPE_UINT32, &width);
4560 dbus_message_iter_close_container(iter, &data);
4563 static void add_scan_frequencies(DBusMessageIter *iter,
4566 GSupplicantScanParams *scan_data = user_data;
4570 for (i = 0; i < scan_data->num_freqs; i++) {
4571 freq = scan_data->freqs[i];
4575 add_scan_frequency(iter, freq);
4579 static void append_ssid(DBusMessageIter *iter,
4580 const void *ssid, unsigned int len)
4582 DBusMessageIter array;
4584 dbus_message_iter_open_container(iter, DBUS_TYPE_ARRAY,
4585 DBUS_TYPE_BYTE_AS_STRING, &array);
4587 dbus_message_iter_append_fixed_array(&array, DBUS_TYPE_BYTE,
4589 dbus_message_iter_close_container(iter, &array);
4592 static void append_ssids(DBusMessageIter *iter, void *user_data)
4594 GSupplicantScanParams *scan_data = user_data;
4597 for (list = scan_data->ssids; list; list = list->next) {
4598 struct scan_ssid *scan_ssid = list->data;
4600 append_ssid(iter, scan_ssid->ssid, scan_ssid->ssid_len);
4604 static void supplicant_add_scan_frequency(DBusMessageIter *dict,
4605 supplicant_dbus_array_function function,
4608 GSupplicantScanParams *scan_params = user_data;
4609 DBusMessageIter entry, value, array;
4610 const char *key = "Channels";
4612 if (scan_params->freqs && scan_params->freqs[0] != 0) {
4613 dbus_message_iter_open_container(dict, DBUS_TYPE_DICT_ENTRY,
4616 dbus_message_iter_append_basic(&entry, DBUS_TYPE_STRING, &key);
4618 dbus_message_iter_open_container(&entry, DBUS_TYPE_VARIANT,
4619 DBUS_TYPE_ARRAY_AS_STRING
4620 DBUS_STRUCT_BEGIN_CHAR_AS_STRING
4621 DBUS_TYPE_UINT32_AS_STRING
4622 DBUS_TYPE_UINT32_AS_STRING
4623 DBUS_STRUCT_END_CHAR_AS_STRING,
4626 dbus_message_iter_open_container(&value, DBUS_TYPE_ARRAY,
4627 DBUS_STRUCT_BEGIN_CHAR_AS_STRING
4628 DBUS_TYPE_UINT32_AS_STRING
4629 DBUS_TYPE_UINT32_AS_STRING
4630 DBUS_STRUCT_END_CHAR_AS_STRING,
4634 function(&array, user_data);
4636 dbus_message_iter_close_container(&value, &array);
4637 dbus_message_iter_close_container(&entry, &value);
4638 dbus_message_iter_close_container(dict, &entry);
4642 static void interface_scan_params(DBusMessageIter *iter, void *user_data)
4644 DBusMessageIter dict;
4645 const char *type = "passive";
4646 struct interface_scan_data *data = user_data;
4648 supplicant_dbus_dict_open(iter, &dict);
4650 if (data && data->scan_params) {
4653 supplicant_dbus_dict_append_basic(&dict, "Type",
4654 DBUS_TYPE_STRING, &type);
4656 #if defined TIZEN_EXT
4657 SUPPLICANT_DBG("[specific_scan] num_ssids %d", data->scan_params->num_ssids);
4658 if (data->scan_params->num_ssids != 0)
4660 supplicant_dbus_dict_append_array(&dict, "SSIDs",
4665 supplicant_add_scan_frequency(&dict, add_scan_frequencies,
4668 supplicant_dbus_dict_append_basic(&dict, "Type",
4669 DBUS_TYPE_STRING, &type);
4671 supplicant_dbus_dict_close(iter, &dict);
4674 static int interface_ready_to_scan(GSupplicantInterface *interface)
4679 if (!system_available)
4682 if (interface->scanning)
4685 switch (interface->state) {
4686 case G_SUPPLICANT_STATE_AUTHENTICATING:
4687 case G_SUPPLICANT_STATE_ASSOCIATING:
4688 case G_SUPPLICANT_STATE_ASSOCIATED:
4689 case G_SUPPLICANT_STATE_4WAY_HANDSHAKE:
4690 case G_SUPPLICANT_STATE_GROUP_HANDSHAKE:
4692 #if defined TIZEN_EXT
4693 case G_SUPPLICANT_STATE_DISABLED:
4695 case G_SUPPLICANT_STATE_UNKNOWN:
4697 case G_SUPPLICANT_STATE_UNKNOWN:
4698 case G_SUPPLICANT_STATE_DISABLED:
4700 case G_SUPPLICANT_STATE_DISCONNECTED:
4701 case G_SUPPLICANT_STATE_INACTIVE:
4702 case G_SUPPLICANT_STATE_SCANNING:
4703 case G_SUPPLICANT_STATE_COMPLETED:
4710 int g_supplicant_interface_scan(GSupplicantInterface *interface,
4711 GSupplicantScanParams *scan_data,
4712 GSupplicantInterfaceCallback callback,
4715 struct interface_scan_data *data;
4718 ret = interface_ready_to_scan(interface);
4722 data = dbus_malloc0(sizeof(*data));
4726 data->interface = interface;
4727 data->path = g_strdup(interface->path);
4728 #if defined TIZEN_EXT
4729 data->interface->scan_callback = data->callback = callback;
4730 data->interface->scan_data = data->user_data = user_data;
4732 data->callback = callback;
4733 data->user_data = user_data;
4735 data->scan_params = scan_data;
4737 interface->scan_callback = callback;
4738 interface->scan_data = user_data;
4740 ret = supplicant_dbus_method_call(interface->path,
4741 SUPPLICANT_INTERFACE ".Interface", "Scan",
4742 interface_scan_params, interface_scan_result, data,
4753 static int parse_supplicant_error(DBusMessageIter *iter)
4755 int err = -ECONNABORTED;
4761 /* If the given passphrase is malformed wpa_s returns
4762 * "invalid message format" but this error should be interpreted as
4765 while (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_STRING) {
4766 dbus_message_iter_get_basic(iter, &key);
4767 if (strncmp(key, "psk", 3) == 0 ||
4768 strncmp(key, "wep_key", 7) == 0 ||
4769 strcmp(key, "invalid message format") == 0) {
4773 dbus_message_iter_next(iter);
4779 static void interface_select_network_result(const char *error,
4780 DBusMessageIter *iter, void *user_data)
4782 struct interface_connect_data *data = user_data;
4789 #if defined TIZEN_EXT
4790 SUPPLICANT_DBG("SelectNetwork errorFreq %s", error);
4792 SUPPLICANT_DBG("SelectNetwork error %s", error);
4794 err = parse_supplicant_error(iter);
4800 data->callback(err, data->interface, data->user_data);
4806 static void interface_select_network_params(DBusMessageIter *iter,
4809 struct interface_connect_data *data = user_data;
4810 GSupplicantInterface *interface = data->interface;
4811 #if defined TIZEN_EXT
4812 GSupplicantSSID *ssid = data->ssid;
4815 dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
4816 &interface->network_path);
4817 #if defined TIZEN_EXT
4818 if (!ssid->bssid_for_connect_len)
4819 dbus_message_iter_append_basic(iter, DBUS_TYPE_INT32, &ssid->freq);
4823 static void interface_add_network_result(const char *error,
4824 DBusMessageIter *iter, void *user_data)
4826 struct interface_connect_data *data = user_data;
4827 GSupplicantInterface *interface = data->interface;
4834 dbus_message_iter_get_basic(iter, &path);
4838 SUPPLICANT_DBG("PATH: %s", path);
4840 interface->network_path = g_strdup(path);
4842 store_network_information(interface, data->ssid);
4844 #if defined TIZEN_EXT
4845 SUPPLICANT_DBG(".Interface.SelectNetworkFreq");
4846 GSupplicantSSID *ssid = data->ssid;
4848 if (!ssid->bssid_for_connect_len)
4849 supplicant_dbus_method_call(data->interface->path,
4850 SUPPLICANT_INTERFACE ".Interface", "SelectNetworkFreq",
4851 interface_select_network_params,
4852 interface_select_network_result, data,
4855 supplicant_dbus_method_call(data->interface->path,
4856 SUPPLICANT_INTERFACE ".Interface", "SelectNetwork",
4857 interface_select_network_params,
4858 interface_select_network_result, data,
4861 supplicant_dbus_method_call(data->interface->path,
4862 SUPPLICANT_INTERFACE ".Interface", "SelectNetwork",
4863 interface_select_network_params,
4864 interface_select_network_result, data,
4871 SUPPLICANT_DBG("AddNetwork error %s", error);
4873 if (interface_exists(data->interface, data->interface->path)) {
4874 err = parse_supplicant_error(iter);
4876 data->callback(err, data->interface, data->user_data);
4878 g_free(interface->network_path);
4879 interface->network_path = NULL;
4887 static void add_network_security_none(DBusMessageIter *dict)
4889 const char *auth_alg = "OPEN";
4891 supplicant_dbus_dict_append_basic(dict, "auth_alg",
4892 DBUS_TYPE_STRING, &auth_alg);
4895 static void add_network_security_wep(DBusMessageIter *dict,
4896 GSupplicantSSID *ssid)
4898 const char *auth_alg = "OPEN SHARED";
4899 dbus_uint32_t key_index = 0;
4901 supplicant_dbus_dict_append_basic(dict, "auth_alg",
4902 DBUS_TYPE_STRING, &auth_alg);
4904 if (ssid->passphrase) {
4905 int size = strlen(ssid->passphrase);
4906 if (size == 10 || size == 26) {
4907 unsigned char *key = g_try_malloc(13);
4911 memset(tmp, 0, sizeof(tmp));
4915 for (i = 0; i < size / 2; i++) {
4916 memcpy(tmp, ssid->passphrase + (i * 2), 2);
4917 key[i] = (unsigned char) strtol(tmp, NULL, 16);
4920 supplicant_dbus_dict_append_fixed_array(dict,
4925 } else if (size == 5 || size == 13) {
4926 unsigned char *key = g_try_malloc(13);
4932 for (i = 0; i < size; i++)
4933 key[i] = (unsigned char) ssid->passphrase[i];
4935 supplicant_dbus_dict_append_fixed_array(dict,
4941 supplicant_dbus_dict_append_basic(dict,
4946 supplicant_dbus_dict_append_basic(dict, "wep_tx_keyidx",
4947 DBUS_TYPE_UINT32, &key_index);
4951 static dbus_bool_t is_psk_raw_key(const char *psk)
4955 /* A raw key is always 64 bytes length... */
4956 if (strlen(psk) != 64)
4959 /* ... and its content is in hex representation */
4960 for (i = 0; i < 64; i++)
4961 if (!isxdigit((unsigned char) psk[i]))
4967 static unsigned char hexchar2bin(char c)
4969 if ((c >= '0') && (c <= '9'))
4971 else if ((c >= 'A') && (c <= 'F'))
4972 return c - 'A' + 10;
4973 else if ((c >= 'a') && (c <= 'f'))
4974 return c - 'a' + 10;
4979 static void hexstring2bin(const char *string, unsigned char *data,
4984 for (i = 0; i < data_len; i++)
4985 data[i] = (hexchar2bin(string[i * 2 + 0]) << 4 |
4986 hexchar2bin(string[i * 2 + 1]) << 0);
4989 static void add_network_security_psk(DBusMessageIter *dict,
4990 GSupplicantSSID *ssid)
4992 if (ssid->passphrase && strlen(ssid->passphrase) > 0) {
4993 const char *key = "psk";
4995 if (is_psk_raw_key(ssid->passphrase)) {
4996 unsigned char data[32];
4997 unsigned char *datap = data;
4999 /* The above pointer alias is required by D-Bus because
5000 * with D-Bus and GCC, non-heap-allocated arrays cannot
5001 * be passed directly by their base pointer. */
5003 hexstring2bin(ssid->passphrase, datap, sizeof(data));
5005 supplicant_dbus_dict_append_fixed_array(dict,
5006 key, DBUS_TYPE_BYTE,
5007 &datap, sizeof(data));
5009 supplicant_dbus_dict_append_basic(dict,
5010 key, DBUS_TYPE_STRING,
5015 static void add_network_security_tls(DBusMessageIter *dict,
5016 GSupplicantSSID *ssid)
5019 * For TLS, we at least need:
5020 * The client certificate
5021 * The client private key file
5022 * The client private key file password
5024 * The Authority certificate is optional.
5026 if (!ssid->client_cert_path)
5029 if (!ssid->private_key_path)
5032 #if !defined TIZEN_EXT
5033 if (!ssid->private_key_passphrase)
5037 if (ssid->ca_cert_path)
5038 supplicant_dbus_dict_append_basic(dict, "ca_cert",
5039 DBUS_TYPE_STRING, &ssid->ca_cert_path);
5041 supplicant_dbus_dict_append_basic(dict, "private_key",
5043 &ssid->private_key_path);
5044 #if !defined TIZEN_EXT
5045 supplicant_dbus_dict_append_basic(dict, "private_key_passwd",
5047 &ssid->private_key_passphrase);
5049 supplicant_dbus_dict_append_basic(dict, "client_cert",
5051 &ssid->client_cert_path);
5054 static void add_network_security_peap(DBusMessageIter *dict,
5055 GSupplicantSSID *ssid)
5060 * For PEAP/TTLS, we at least need
5061 * The authority certificate
5062 * The 2nd phase authentication method
5063 * The 2nd phase passphrase
5065 * The Client certificate is optional although strongly recommended
5066 * When setting it, we need in addition
5067 * The Client private key file
5068 * The Client private key file password
5070 if (!ssid->passphrase)
5073 if (!ssid->phase2_auth)
5076 if (ssid->client_cert_path) {
5077 if (!ssid->private_key_path)
5080 #if !defined TIZEN_EXT
5081 if (!ssid->private_key_passphrase)
5085 supplicant_dbus_dict_append_basic(dict, "client_cert",
5087 &ssid->client_cert_path);
5089 supplicant_dbus_dict_append_basic(dict, "private_key",
5091 &ssid->private_key_path);
5093 #if !defined TIZEN_EXT
5094 supplicant_dbus_dict_append_basic(dict, "private_key_passwd",
5096 &ssid->private_key_passphrase);
5101 if (g_str_has_prefix(ssid->phase2_auth, "EAP-")) {
5102 phase2_auth = g_strdup_printf("autheap=%s",
5103 ssid->phase2_auth + strlen("EAP-"));
5105 phase2_auth = g_strdup_printf("auth=%s", ssid->phase2_auth);
5107 supplicant_dbus_dict_append_basic(dict, "password",
5111 if (ssid->ca_cert_path)
5112 supplicant_dbus_dict_append_basic(dict, "ca_cert",
5114 &ssid->ca_cert_path);
5116 supplicant_dbus_dict_append_basic(dict, "phase2",
5120 g_free(phase2_auth);
5123 #if defined TIZEN_EXT
5124 static void add_network_security_aka_sim(DBusMessageIter *dict,
5125 GSupplicantSSID *ssid)
5127 if (!ssid->passphrase)
5130 supplicant_dbus_dict_append_basic(dict, "password",
5136 static void add_network_security_eap(DBusMessageIter *dict,
5137 GSupplicantSSID *ssid)
5141 #if defined TIZEN_EXT
5144 if (!ssid->eap || !ssid->identity)
5148 if (g_strcmp0(ssid->eap, "tls") == 0) {
5149 add_network_security_tls(dict, ssid);
5150 } else if (g_strcmp0(ssid->eap, "peap") == 0 ||
5151 g_strcmp0(ssid->eap, "ttls") == 0) {
5152 #if defined TIZEN_EXT
5153 if (!ssid->identity)
5156 add_network_security_peap(dict, ssid);
5158 #if defined TIZEN_EXT
5159 } else if (g_strcmp0(ssid->eap, "sim") == 0 ||
5160 g_strcmp0(ssid->eap, "aka") == 0) {
5161 add_network_security_aka_sim(dict, ssid);
5166 eap_value = g_ascii_strup(ssid->eap, -1);
5168 supplicant_dbus_dict_append_basic(dict, "eap",
5171 #if defined TIZEN_EXT
5172 if (ssid->identity != NULL)
5173 supplicant_dbus_dict_append_basic(dict, "identity",
5177 supplicant_dbus_dict_append_basic(dict, "identity",
5181 if(ssid->anonymous_identity)
5182 supplicant_dbus_dict_append_basic(dict, "anonymous_identity",
5184 &ssid->anonymous_identity);
5186 if(ssid->subject_match)
5187 supplicant_dbus_dict_append_basic(dict, "subject_match",
5189 &ssid->subject_match);
5191 if(ssid->altsubject_match)
5192 supplicant_dbus_dict_append_basic(dict, "altsubject_match",
5194 &ssid->altsubject_match);
5196 if(ssid->domain_suffix_match)
5197 supplicant_dbus_dict_append_basic(dict, "domain_suffix_match",
5199 &ssid->domain_suffix_match);
5201 if(ssid->domain_match)
5202 supplicant_dbus_dict_append_basic(dict, "domain_match",
5204 &ssid->domain_match);
5209 static void add_network_security_ciphers(DBusMessageIter *dict,
5210 GSupplicantSSID *ssid)
5212 unsigned int p_cipher, g_cipher, i;
5213 char *pairwise, *group;
5214 char *pair_ciphers[4];
5215 char *group_ciphers[5];
5217 p_cipher = ssid->pairwise_cipher;
5218 g_cipher = ssid->group_cipher;
5220 if (p_cipher == 0 && g_cipher == 0)
5225 if (p_cipher & G_SUPPLICANT_PAIRWISE_CCMP)
5226 pair_ciphers[i++] = "CCMP";
5228 if (p_cipher & G_SUPPLICANT_PAIRWISE_TKIP)
5229 pair_ciphers[i++] = "TKIP";
5231 if (p_cipher & G_SUPPLICANT_PAIRWISE_NONE)
5232 pair_ciphers[i++] = "NONE";
5234 pair_ciphers[i] = NULL;
5238 if (g_cipher & G_SUPPLICANT_GROUP_CCMP)
5239 group_ciphers[i++] = "CCMP";
5241 if (g_cipher & G_SUPPLICANT_GROUP_TKIP)
5242 group_ciphers[i++] = "TKIP";
5244 if (g_cipher & G_SUPPLICANT_GROUP_WEP104)
5245 group_ciphers[i++] = "WEP104";
5247 if (g_cipher & G_SUPPLICANT_GROUP_WEP40)
5248 group_ciphers[i++] = "WEP40";
5250 group_ciphers[i] = NULL;
5252 pairwise = g_strjoinv(" ", pair_ciphers);
5253 group = g_strjoinv(" ", group_ciphers);
5255 SUPPLICANT_DBG("cipher %s %s", pairwise, group);
5257 supplicant_dbus_dict_append_basic(dict, "pairwise",
5260 supplicant_dbus_dict_append_basic(dict, "group",
5268 static void add_network_security_proto(DBusMessageIter *dict,
5269 GSupplicantSSID *ssid)
5271 unsigned int protocol, i;
5275 protocol = ssid->protocol;
5282 if (protocol & G_SUPPLICANT_PROTO_RSN)
5283 protos[i++] = "RSN";
5285 if (protocol & G_SUPPLICANT_PROTO_WPA)
5286 protos[i++] = "WPA";
5290 proto = g_strjoinv(" ", protos);
5292 SUPPLICANT_DBG("proto %s", proto);
5294 supplicant_dbus_dict_append_basic(dict, "proto",
5301 static void add_network_security(DBusMessageIter *dict, GSupplicantSSID *ssid)
5305 switch (ssid->security) {
5306 case G_SUPPLICANT_SECURITY_NONE:
5308 add_network_security_none(dict);
5309 add_network_security_ciphers(dict, ssid);
5311 case G_SUPPLICANT_SECURITY_UNKNOWN:
5312 case G_SUPPLICANT_SECURITY_WEP:
5314 add_network_security_wep(dict, ssid);
5315 add_network_security_ciphers(dict, ssid);
5317 case G_SUPPLICANT_SECURITY_PSK:
5318 key_mgmt = "WPA-PSK";
5319 add_network_security_psk(dict, ssid);
5320 add_network_security_ciphers(dict, ssid);
5321 add_network_security_proto(dict, ssid);
5323 case G_SUPPLICANT_SECURITY_IEEE8021X:
5324 key_mgmt = "WPA-EAP";
5325 add_network_security_eap(dict, ssid);
5326 add_network_security_ciphers(dict, ssid);
5327 add_network_security_proto(dict, ssid);
5329 #if defined TIZEN_EXT
5330 case G_SUPPLICANT_SECURITY_FT_PSK:
5331 key_mgmt = "FT-PSK";
5332 add_network_security_psk(dict, ssid);
5333 add_network_security_ciphers(dict, ssid);
5334 add_network_security_proto(dict, ssid);
5336 case G_SUPPLICANT_SECURITY_FT_IEEE8021X:
5337 key_mgmt = "FT-EAP";
5338 add_network_security_eap(dict, ssid);
5339 add_network_security_ciphers(dict, ssid);
5340 add_network_security_proto(dict, ssid);
5345 supplicant_dbus_dict_append_basic(dict, "key_mgmt",
5346 DBUS_TYPE_STRING, &key_mgmt);
5349 static void add_network_mode(DBusMessageIter *dict, GSupplicantSSID *ssid)
5353 switch (ssid->mode) {
5354 case G_SUPPLICANT_MODE_UNKNOWN:
5355 case G_SUPPLICANT_MODE_INFRA:
5358 case G_SUPPLICANT_MODE_IBSS:
5361 case G_SUPPLICANT_MODE_MASTER:
5366 supplicant_dbus_dict_append_basic(dict, "mode",
5367 DBUS_TYPE_UINT32, &mode);
5370 static void interface_add_network_params(DBusMessageIter *iter, void *user_data)
5372 DBusMessageIter dict;
5373 struct interface_connect_data *data = user_data;
5374 GSupplicantSSID *ssid = data->ssid;
5376 supplicant_dbus_dict_open(iter, &dict);
5378 if (ssid->scan_ssid)
5379 supplicant_dbus_dict_append_basic(&dict, "scan_ssid",
5380 DBUS_TYPE_UINT32, &ssid->scan_ssid);
5383 supplicant_dbus_dict_append_basic(&dict, "frequency",
5384 DBUS_TYPE_UINT32, &ssid->freq);
5387 supplicant_dbus_dict_append_basic(&dict, "bgscan",
5388 DBUS_TYPE_STRING, &ssid->bgscan);
5390 add_network_mode(&dict, ssid);
5392 add_network_security(&dict, ssid);
5394 supplicant_dbus_dict_append_fixed_array(&dict, "ssid",
5395 DBUS_TYPE_BYTE, &ssid->ssid,
5398 supplicant_dbus_dict_append_basic(&dict, "ignore_broadcast_ssid",
5400 &ssid->ignore_broadcast_ssid);
5402 #if defined TIZEN_EXT
5405 bssid = g_try_malloc0(18);
5406 if (bssid == NULL) {
5407 SUPPLICANT_DBG("memory allocation error");
5408 supplicant_dbus_dict_close(iter, &dict);
5412 if (ssid->bssid_for_connect_len)
5413 snprintf(bssid, 18, "%02x:%02x:%02x:%02x:%02x:%02x",
5414 ssid->bssid_for_connect[0], ssid->bssid_for_connect[1], ssid->bssid_for_connect[2],
5415 ssid->bssid_for_connect[3], ssid->bssid_for_connect[4], ssid->bssid_for_connect[5]);
5417 snprintf(bssid, 18, "%02x:%02x:%02x:%02x:%02x:%02x",
5418 ssid->bssid[0], ssid->bssid[1], ssid->bssid[2],
5419 ssid->bssid[3], ssid->bssid[4], ssid->bssid[5]);
5421 supplicant_dbus_dict_append_basic(&dict, "bssid",
5422 DBUS_TYPE_STRING, &bssid);
5427 supplicant_dbus_dict_close(iter, &dict);
5430 static void interface_wps_start_result(const char *error,
5431 DBusMessageIter *iter, void *user_data)
5433 struct interface_connect_data *data = user_data;
5440 SUPPLICANT_DBG("error: %s", error);
5441 err = parse_supplicant_error(iter);
5445 data->callback(err, data->interface, data->user_data);
5452 static void interface_add_wps_params(DBusMessageIter *iter, void *user_data)
5454 struct interface_connect_data *data = user_data;
5455 GSupplicantSSID *ssid = data->ssid;
5456 const char *role = "enrollee", *type;
5457 DBusMessageIter dict;
5461 supplicant_dbus_dict_open(iter, &dict);
5463 supplicant_dbus_dict_append_basic(&dict, "Role",
5464 DBUS_TYPE_STRING, &role);
5467 if (ssid->pin_wps) {
5469 supplicant_dbus_dict_append_basic(&dict, "Pin",
5470 DBUS_TYPE_STRING, &ssid->pin_wps);
5473 supplicant_dbus_dict_append_basic(&dict, "Type",
5474 DBUS_TYPE_STRING, &type);
5476 #if defined TIZEN_EXT
5478 supplicant_dbus_dict_append_fixed_array(&dict, "Bssid",
5479 DBUS_TYPE_BYTE, &ssid->bssid, 6);
5482 supplicant_dbus_dict_close(iter, &dict);
5485 static void wps_start(const char *error, DBusMessageIter *iter, void *user_data)
5487 struct interface_connect_data *data = user_data;
5492 SUPPLICANT_DBG("error: %s", error);
5498 #if defined TIZEN_EXT
5499 GSupplicantSSID *ssid = data->ssid;
5500 if (ssid->pin_wps != NULL) {
5501 if (!g_utf8_validate(ssid->pin_wps, 8, NULL)) {
5502 SUPPLICANT_DBG("Invalid characters in WPS_PIN");
5509 supplicant_dbus_method_call(data->interface->path,
5510 SUPPLICANT_INTERFACE ".Interface.WPS", "Start",
5511 interface_add_wps_params,
5512 interface_wps_start_result, data, NULL);
5515 static void wps_process_credentials(DBusMessageIter *iter, void *user_data)
5517 dbus_bool_t credentials = TRUE;
5521 dbus_message_iter_append_basic(iter, DBUS_TYPE_BOOLEAN, &credentials);
5525 #if defined TIZEN_EXT
5526 #define NETCONFIG_SERVICE "net.netconfig"
5527 #define NETCONFIG_WIFI_PATH "/net/netconfig/wifi"
5528 #define NETCONFIG_WIFI_INTERFACE NETCONFIG_SERVICE ".wifi"
5530 struct dec_method_call_data {
5531 struct interface_connect_data *data;
5532 DBusPendingCall *pending_call;
5535 static struct dec_method_call_data decrypt_request_data;
5537 static void crypt_method_call_cancel(void)
5539 if (decrypt_request_data.pending_call) {
5540 dbus_pending_call_cancel(decrypt_request_data.pending_call);
5541 dbus_pending_call_unref(decrypt_request_data.pending_call);
5542 decrypt_request_data.pending_call = NULL;
5545 g_free(decrypt_request_data.data->path);
5546 g_free(decrypt_request_data.data->ssid);
5547 dbus_free(decrypt_request_data.data);
5548 decrypt_request_data.data = NULL;
5551 static void decryption_request_reply(DBusPendingCall *call,
5556 DBusMessageIter args;
5559 static gchar* origin_value = NULL;
5560 struct interface_connect_data *data = user_data;
5562 g_free(origin_value);
5563 origin_value = NULL;
5567 reply = dbus_pending_call_steal_reply(call);
5569 dbus_error_init(&error);
5570 if (dbus_set_error_from_message(&error, reply)) {
5571 SUPPLICANT_DBG("decryption_request_reply() %s %s", error.name, error.message);
5572 dbus_error_free(&error);
5577 if (dbus_message_iter_init(reply, &args) == FALSE) {
5578 SUPPLICANT_DBG("dbus_message_iter_init() failed");
5583 dbus_message_iter_get_basic(&args, &out_data);
5585 origin_value = g_strdup((const gchar *)out_data);
5586 data->ssid->passphrase = origin_value;
5588 ret = supplicant_dbus_method_call(data->interface->path,
5589 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
5590 interface_add_network_params,
5591 interface_add_network_result, data,
5596 SUPPLICANT_DBG("AddNetwork failed %d", ret);
5597 callback_assoc_failed(decrypt_request_data.data->user_data);
5603 dbus_message_unref(reply);
5604 dbus_pending_call_unref(call);
5606 decrypt_request_data.pending_call = NULL;
5607 decrypt_request_data.data = NULL;
5610 static int send_decryption_request(const char *passphrase,
5611 struct interface_connect_data *data)
5613 DBusMessage *msg = NULL;
5614 DBusPendingCall *call;
5616 SUPPLICANT_DBG("Decryption request");
5619 SUPPLICANT_DBG("Invalid parameter");
5626 msg = dbus_message_new_method_call(NETCONFIG_SERVICE, NETCONFIG_WIFI_PATH,
5627 NETCONFIG_WIFI_INTERFACE, "DecryptPassphrase");
5631 dbus_message_append_args(msg, DBUS_TYPE_STRING, &passphrase,
5634 if (!dbus_connection_send_with_reply(connection, msg,
5635 &call, DBUS_TIMEOUT_USE_DEFAULT)) {
5636 dbus_message_unref(msg);
5641 dbus_message_unref(msg);
5645 decrypt_request_data.pending_call = call;
5646 decrypt_request_data.data = data;
5648 dbus_pending_call_set_notify(call, decryption_request_reply, data, NULL);
5649 dbus_message_unref(msg);
5651 SUPPLICANT_DBG("Decryption request succeeded");
5657 int g_supplicant_interface_connect(GSupplicantInterface *interface,
5658 GSupplicantSSID *ssid,
5659 GSupplicantInterfaceCallback callback,
5662 struct interface_connect_data *data;
5663 struct interface_data *intf_data;
5671 if (!system_available)
5674 /* TODO: Check if we're already connected and switch */
5676 data = dbus_malloc0(sizeof(*data));
5680 data->interface = interface;
5681 data->path = g_strdup(interface->path);
5682 data->callback = callback;
5684 data->user_data = user_data;
5686 if (ssid->use_wps) {
5687 g_free(interface->wps_cred.key);
5688 memset(&interface->wps_cred, 0,
5689 sizeof(struct _GSupplicantWpsCredentials));
5691 ret = supplicant_dbus_property_set(interface->path,
5692 SUPPLICANT_INTERFACE ".Interface.WPS",
5693 "ProcessCredentials", DBUS_TYPE_BOOLEAN_AS_STRING,
5694 wps_process_credentials, wps_start, data, interface);
5696 /* By the time there is a request for connect and the network
5697 * path is not NULL it means that connman has not removed the
5698 * previous network pointer. This can happen in the case AP
5699 * deauthenticated client and connman does not remove the
5700 * previously connected network pointer. This causes supplicant
5701 * to reallocate the memory for struct wpa_ssid again even if it
5702 * is the same SSID. This causes memory usage of wpa_supplicnat
5703 * to go high. The idea here is that if the previously connected
5704 * network is not removed at the time of next connection attempt
5705 * check if the network path is not NULL. In case it is non-NULL
5706 * first remove the network and then once removal is successful, add
5710 if (interface->network_path != NULL) {
5715 * If this add network is for the same network for
5716 * which wpa_supplicant already has a profile then do
5717 * not need to add another profile. Only if the
5718 * profile that needs to get added is different from
5719 * what is there in wpa_s delete the current one. A
5720 * network is identified by its SSID, security_type
5721 * and passphrase (private passphrase in case security
5724 if (compare_network_parameters(interface, ssid)) {
5728 intf_data = dbus_malloc0(sizeof(*intf_data));
5732 intf_data->interface = interface;
5733 intf_data->path = g_strdup(interface->path);
5734 intf_data->callback = callback;
5735 intf_data->ssid = ssid;
5736 intf_data->user_data = user_data;
5737 intf_data->network_remove_in_progress = TRUE;
5738 network_remove(intf_data);
5740 #if defined TIZEN_EXT
5741 if (ssid->passphrase && g_strcmp0(ssid->passphrase, "") != 0) {
5742 ret = send_decryption_request(ssid->passphrase, data);
5744 SUPPLICANT_DBG("Decryption request failed %d", ret);
5747 ret = supplicant_dbus_method_call(interface->path,
5748 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
5749 interface_add_network_params,
5750 interface_add_network_result, data,
5760 return -EINPROGRESS;
5763 static void network_remove_result(const char *error,
5764 DBusMessageIter *iter, void *user_data)
5766 struct interface_data *data = user_data;
5767 struct interface_connect_data *connect_data;
5774 SUPPLICANT_DBG("error: %s", error);
5776 if (g_strcmp0("org.freedesktop.DBus.Error.UnknownMethod",
5778 result = -ECONNABORTED;
5781 g_free(data->interface->network_path);
5782 data->interface->network_path = NULL;
5784 remove_network_information(data->interface);
5786 if (data->network_remove_in_progress == TRUE) {
5787 data->network_remove_in_progress = FALSE;
5788 connect_data = dbus_malloc0(sizeof(*connect_data));
5792 connect_data->interface = data->interface;
5793 connect_data->path = g_strdup(data->path);
5794 connect_data->callback = data->callback;
5795 connect_data->ssid = data->ssid;
5796 connect_data->user_data = data->user_data;
5798 supplicant_dbus_method_call(data->interface->path,
5799 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
5800 interface_add_network_params,
5801 interface_add_network_result, connect_data,
5802 connect_data->interface);
5805 data->callback(result, data->interface, data->user_data);
5811 static void network_remove_params(DBusMessageIter *iter, void *user_data)
5813 struct interface_data *data = user_data;
5814 const char *path = data->interface->network_path;
5816 SUPPLICANT_DBG("path %s", path);
5818 dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH, &path);
5821 static int network_remove(struct interface_data *data)
5823 GSupplicantInterface *interface = data->interface;
5827 #if defined TIZEN_EXT
5828 GSupplicantInterface *intf = NULL;
5830 * Check if 'interface' is valid
5832 intf = g_hash_table_lookup(interface_table, interface->path);
5837 return supplicant_dbus_method_call(interface->path,
5838 SUPPLICANT_INTERFACE ".Interface", "RemoveNetwork",
5839 network_remove_params, network_remove_result, data,
5843 static void interface_disconnect_result(const char *error,
5844 DBusMessageIter *iter, void *user_data)
5846 struct interface_data *data = user_data;
5853 SUPPLICANT_DBG("error: %s", error);
5855 if (g_strcmp0("org.freedesktop.DBus.Error.UnknownMethod",
5857 result = -ECONNABORTED;
5860 /* If we are disconnecting from previous WPS successful
5861 * association. i.e.: it did not went through AddNetwork,
5862 * and interface->network_path was never set. */
5863 if (!data->interface->network_path) {
5865 data->callback(result, data->interface,
5873 if (result < 0 && data->callback) {
5874 data->callback(result, data->interface, data->user_data);
5875 data->callback = NULL;
5878 if (result != -ECONNABORTED) {
5879 if (network_remove(data) < 0) {
5889 int g_supplicant_interface_disconnect(GSupplicantInterface *interface,
5890 GSupplicantInterfaceCallback callback,
5893 struct interface_data *data;
5901 if (!system_available)
5903 #if defined TIZEN_EXT
5904 if (decrypt_request_data.pending_call &&
5905 decrypt_request_data.data &&
5906 decrypt_request_data.data->user_data == user_data) {
5908 callback_assoc_failed(decrypt_request_data.data->user_data);
5909 crypt_method_call_cancel();
5914 data = dbus_malloc0(sizeof(*data));
5918 data->interface = interface;
5919 data->path = g_strdup(interface->path);
5920 data->callback = callback;
5921 data->user_data = user_data;
5923 ret = supplicant_dbus_method_call(interface->path,
5924 SUPPLICANT_INTERFACE ".Interface", "Disconnect",
5925 NULL, interface_disconnect_result, data,
5936 static void interface_p2p_find_result(const char *error,
5937 DBusMessageIter *iter, void *user_data)
5939 struct interface_scan_data *data = user_data;
5942 SUPPLICANT_DBG("error %s", error);
5947 if (interface_exists(data->interface, data->path)) {
5948 if (!data->interface->ready)
5951 data->interface->p2p_finding = true;
5955 data->callback(err, data->interface, data->user_data);
5961 static void interface_p2p_find_params(DBusMessageIter *iter, void *user_data)
5963 DBusMessageIter dict;
5965 supplicant_dbus_dict_open(iter, &dict);
5966 supplicant_dbus_dict_close(iter, &dict);
5969 int g_supplicant_interface_p2p_find(GSupplicantInterface *interface,
5970 GSupplicantInterfaceCallback callback,
5973 struct interface_scan_data *data;
5976 if (!interface->p2p_support)
5979 ret = interface_ready_to_scan(interface);
5980 if (ret && ret != -EALREADY)
5983 data = dbus_malloc0(sizeof(*data));
5987 data->interface = interface;
5988 data->path = g_strdup(interface->path);
5989 data->callback = callback;
5990 data->user_data = user_data;
5992 ret = supplicant_dbus_method_call(interface->path,
5993 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "Find",
5994 interface_p2p_find_params, interface_p2p_find_result,
6004 bool g_supplicant_interface_is_p2p_finding(GSupplicantInterface *interface)
6009 return interface->p2p_finding;
6012 int g_supplicant_interface_p2p_stop_find(GSupplicantInterface *interface)
6014 if (!interface->p2p_finding)
6019 interface->p2p_finding = false;
6021 return supplicant_dbus_method_call(interface->path,
6022 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "StopFind",
6023 NULL, NULL, NULL, NULL);
6026 static void interface_p2p_connect_result(const char *error,
6027 DBusMessageIter *iter, void *user_data)
6029 struct interface_connect_data *data = user_data;
6035 SUPPLICANT_DBG("error: %s", error);
6036 err = parse_supplicant_error(iter);
6040 data->callback(err, data->interface, data->user_data);
6043 g_free(data->peer->wps_pin);
6044 g_free(data->peer->path);
6049 static void interface_p2p_connect_params(DBusMessageIter *iter, void *user_data)
6051 struct interface_connect_data *data = user_data;
6052 const char *wps = "pbc";
6053 DBusMessageIter dict;
6058 supplicant_dbus_dict_open(iter, &dict);
6060 if (data->peer->master)
6063 if (data->peer->wps_pin)
6066 supplicant_dbus_dict_append_basic(&dict, "peer",
6067 DBUS_TYPE_OBJECT_PATH, &data->peer->path);
6068 supplicant_dbus_dict_append_basic(&dict, "wps_method",
6069 DBUS_TYPE_STRING, &wps);
6070 if (data->peer->wps_pin) {
6071 supplicant_dbus_dict_append_basic(&dict, "pin",
6072 DBUS_TYPE_STRING, &data->peer->wps_pin);
6075 supplicant_dbus_dict_append_basic(&dict, "go_intent",
6076 DBUS_TYPE_INT32, &go_intent);
6078 supplicant_dbus_dict_close(iter, &dict);
6081 int g_supplicant_interface_p2p_connect(GSupplicantInterface *interface,
6082 GSupplicantPeerParams *peer_params,
6083 GSupplicantInterfaceCallback callback,
6086 struct interface_connect_data *data;
6091 if (!interface->p2p_support)
6094 data = dbus_malloc0(sizeof(*data));
6098 data->interface = interface;
6099 data->path = g_strdup(interface->path);
6100 data->peer = peer_params;
6101 data->callback = callback;
6102 data->user_data = user_data;
6104 ret = supplicant_dbus_method_call(interface->path,
6105 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "Connect",
6106 interface_p2p_connect_params, interface_p2p_connect_result,
6114 return -EINPROGRESS;
6117 int g_supplicant_interface_p2p_disconnect(GSupplicantInterface *interface,
6118 GSupplicantPeerParams *peer_params)
6120 GSupplicantPeer *peer;
6126 if (!interface->p2p_support)
6129 peer = g_hash_table_lookup(interface->peer_table, peer_params->path);
6133 for (list = peer->groups; list; list = list->next, count++) {
6134 const char *group_obj_path = list->data;
6135 GSupplicantInterface *g_interface;
6136 GSupplicantGroup *group;
6138 group = g_hash_table_lookup(group_mapping, group_obj_path);
6139 if (!group || !group->interface)
6142 g_interface = group->interface;
6143 supplicant_dbus_method_call(g_interface->path,
6144 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
6145 "Disconnect", NULL, NULL, NULL, g_interface);
6148 if (count == 0 && peer->current_group_iface) {
6149 supplicant_dbus_method_call(peer->current_group_iface->path,
6150 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
6151 "Disconnect", NULL, NULL, NULL,
6152 peer->current_group_iface->path);
6155 peer->current_group_iface = NULL;
6157 return -EINPROGRESS;
6160 struct p2p_service_data {
6162 GSupplicantInterface *interface;
6163 GSupplicantP2PServiceParams *service;
6164 GSupplicantInterfaceCallback callback;
6168 static void interface_p2p_service_result(const char *error,
6169 DBusMessageIter *iter, void *user_data)
6171 struct p2p_service_data *data = user_data;
6174 SUPPLICANT_DBG("%s result - %s", data->registration ?
6175 "Registration" : "Deletion",
6176 error ? error : "Success");
6181 data->callback(result, data->interface, data->user_data);
6183 g_free(data->service->query);
6184 g_free(data->service->response);
6185 g_free(data->service->service);
6186 g_free(data->service->wfd_ies);
6187 g_free(data->service);
6191 static void interface_p2p_service_params(DBusMessageIter *iter,
6194 struct p2p_service_data *data = user_data;
6195 GSupplicantP2PServiceParams *service;
6196 DBusMessageIter dict;
6201 service = data->service;
6203 supplicant_dbus_dict_open(iter, &dict);
6205 if (service->query && service->response) {
6207 supplicant_dbus_dict_append_basic(&dict, "service_type",
6208 DBUS_TYPE_STRING, &type);
6209 supplicant_dbus_dict_append_fixed_array(&dict, "query",
6210 DBUS_TYPE_BYTE, &service->query,
6211 service->query_length);
6212 supplicant_dbus_dict_append_fixed_array(&dict, "response",
6213 DBUS_TYPE_BYTE, &service->response,
6214 service->response_length);
6215 } else if (service->version && service->service) {
6217 supplicant_dbus_dict_append_basic(&dict, "service_type",
6218 DBUS_TYPE_STRING, &type);
6219 supplicant_dbus_dict_append_basic(&dict, "version",
6220 DBUS_TYPE_INT32, &service->version);
6221 supplicant_dbus_dict_append_basic(&dict, "service",
6222 DBUS_TYPE_STRING, &service->service);
6225 supplicant_dbus_dict_close(iter, &dict);
6228 int g_supplicant_interface_p2p_add_service(GSupplicantInterface *interface,
6229 GSupplicantInterfaceCallback callback,
6230 GSupplicantP2PServiceParams *p2p_service_params,
6233 struct p2p_service_data *data;
6238 if (!interface->p2p_support)
6241 data = dbus_malloc0(sizeof(*data));
6245 data->registration = true;
6246 data->interface = interface;
6247 data->service = p2p_service_params;
6248 data->callback = callback;
6249 data->user_data = user_data;
6251 ret = supplicant_dbus_method_call(interface->path,
6252 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "AddService",
6253 interface_p2p_service_params, interface_p2p_service_result,
6260 return -EINPROGRESS;
6263 int g_supplicant_interface_p2p_del_service(GSupplicantInterface *interface,
6264 GSupplicantP2PServiceParams *p2p_service_params)
6266 struct p2p_service_data *data;
6271 if (!interface->p2p_support)
6274 data = dbus_malloc0(sizeof(*data));
6278 data->interface = interface;
6279 data->service = p2p_service_params;
6281 ret = supplicant_dbus_method_call(interface->path,
6282 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeleteService",
6283 interface_p2p_service_params, interface_p2p_service_result,
6290 return -EINPROGRESS;
6293 struct p2p_listen_data {
6298 static void interface_p2p_listen_params(DBusMessageIter *iter, void *user_data)
6300 struct p2p_listen_data *params = user_data;
6301 DBusMessageIter dict;
6303 supplicant_dbus_dict_open(iter, &dict);
6305 supplicant_dbus_dict_append_basic(&dict, "period",
6306 DBUS_TYPE_INT32, ¶ms->period);
6307 supplicant_dbus_dict_append_basic(&dict, "interval",
6308 DBUS_TYPE_INT32, ¶ms->interval);
6309 supplicant_dbus_dict_close(iter, &dict);
6312 int g_supplicant_interface_p2p_listen(GSupplicantInterface *interface,
6313 int period, int interval)
6315 struct p2p_listen_data params;
6319 if (!interface->p2p_support)
6322 params.period = period;
6323 params.interval = interval;
6325 return supplicant_dbus_method_call(interface->path,
6326 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
6327 "ExtendedListen", interface_p2p_listen_params,
6328 NULL, ¶ms, NULL);
6331 static void widi_ies_params(DBusMessageIter *iter, void *user_data)
6333 struct p2p_service_data *data = user_data;
6334 GSupplicantP2PServiceParams *service = data->service;
6335 DBusMessageIter array;
6337 SUPPLICANT_DBG("%p - %d", service->wfd_ies, service->wfd_ies_length);
6339 dbus_message_iter_open_container(iter, DBUS_TYPE_ARRAY,
6340 DBUS_TYPE_BYTE_AS_STRING, &array);
6342 if (service->wfd_ies && service->wfd_ies_length > 0) {
6343 dbus_message_iter_append_fixed_array(&array, DBUS_TYPE_BYTE,
6344 &service->wfd_ies, service->wfd_ies_length);
6347 dbus_message_iter_close_container(iter, &array);
6350 int g_supplicant_set_widi_ies(GSupplicantP2PServiceParams *p2p_service_params,
6351 GSupplicantInterfaceCallback callback,
6354 struct p2p_service_data *data;
6359 if (!system_available)
6362 data = dbus_malloc0(sizeof(*data));
6366 data->service = p2p_service_params;
6367 data->callback = callback;
6368 data->user_data = user_data;
6370 if (p2p_service_params->wfd_ies)
6371 data->registration = true;
6373 ret = supplicant_dbus_property_set(SUPPLICANT_PATH,
6374 SUPPLICANT_INTERFACE, "WFDIEs",
6375 DBUS_TYPE_ARRAY_AS_STRING
6376 DBUS_TYPE_BYTE_AS_STRING,
6378 interface_p2p_service_result,
6380 if (ret < 0 && ret != -EINPROGRESS) {
6385 return -EINPROGRESS;
6388 #if defined TIZEN_EXT
6389 int g_supplicant_interface_remove_network(GSupplicantInterface *interface)
6391 struct interface_data *data;
6395 if (interface == NULL)
6398 if (system_available == FALSE)
6401 data = dbus_malloc0(sizeof(*data));
6405 data->interface = interface;
6407 return network_remove(data);
6411 static const char *g_supplicant_rule0 = "type=signal,"
6412 "path=" DBUS_PATH_DBUS ","
6413 "sender=" DBUS_SERVICE_DBUS ","
6414 "interface=" DBUS_INTERFACE_DBUS ","
6415 "member=NameOwnerChanged,"
6416 "arg0=" SUPPLICANT_SERVICE;
6417 static const char *g_supplicant_rule1 = "type=signal,"
6418 "interface=" SUPPLICANT_INTERFACE;
6419 static const char *g_supplicant_rule2 = "type=signal,"
6420 "interface=" SUPPLICANT_INTERFACE ".Interface";
6421 static const char *g_supplicant_rule3 = "type=signal,"
6422 "interface=" SUPPLICANT_INTERFACE ".Interface.WPS";
6423 static const char *g_supplicant_rule4 = "type=signal,"
6424 "interface=" SUPPLICANT_INTERFACE ".BSS";
6425 static const char *g_supplicant_rule5 = "type=signal,"
6426 "interface=" SUPPLICANT_INTERFACE ".Network";
6427 #if !defined TIZEN_EXT
6428 static const char *g_supplicant_rule6 = "type=signal,"
6429 "interface=" SUPPLICANT_INTERFACE ".Interface.P2PDevice";
6430 static const char *g_supplicant_rule7 = "type=signal,"
6431 "interface=" SUPPLICANT_INTERFACE ".Peer";
6432 static const char *g_supplicant_rule8 = "type=signal,"
6433 "interface=" SUPPLICANT_INTERFACE ".Group";
6436 static void invoke_introspect_method(void)
6438 DBusMessage *message;
6440 message = dbus_message_new_method_call(SUPPLICANT_SERVICE,
6442 DBUS_INTERFACE_INTROSPECTABLE,
6448 dbus_message_set_no_reply(message, TRUE);
6449 dbus_connection_send(connection, message, NULL);
6450 dbus_message_unref(message);
6453 int g_supplicant_register(const GSupplicantCallbacks *callbacks)
6455 connection = dbus_bus_get(DBUS_BUS_SYSTEM, NULL);
6459 if (!dbus_connection_add_filter(connection, g_supplicant_filter,
6461 dbus_connection_unref(connection);
6466 callbacks_pointer = callbacks;
6469 interface_table = g_hash_table_new_full(g_str_hash, g_str_equal,
6470 NULL, remove_interface);
6472 bss_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
6474 peer_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
6476 group_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
6478 pending_peer_connection = g_hash_table_new_full(g_str_hash, g_str_equal,
6480 config_file_table = g_hash_table_new_full(g_str_hash, g_str_equal,
6483 supplicant_dbus_setup(connection);
6485 dbus_bus_add_match(connection, g_supplicant_rule0, NULL);
6486 dbus_bus_add_match(connection, g_supplicant_rule1, NULL);
6487 dbus_bus_add_match(connection, g_supplicant_rule2, NULL);
6488 dbus_bus_add_match(connection, g_supplicant_rule3, NULL);
6489 dbus_bus_add_match(connection, g_supplicant_rule4, NULL);
6490 dbus_bus_add_match(connection, g_supplicant_rule5, NULL);
6491 #if defined TIZEN_EXT
6492 dbus_bus_add_match(connection,
6493 "type=signal,interface=org.tizen.system.deviced.PowerOff,"
6494 "member=ChangeState", NULL);
6496 #if !defined TIZEN_EXT
6497 dbus_bus_add_match(connection, g_supplicant_rule6, NULL);
6498 dbus_bus_add_match(connection, g_supplicant_rule7, NULL);
6499 dbus_bus_add_match(connection, g_supplicant_rule8, NULL);
6501 dbus_connection_flush(connection);
6503 if (dbus_bus_name_has_owner(connection,
6504 SUPPLICANT_SERVICE, NULL)) {
6505 system_available = TRUE;
6506 supplicant_dbus_property_get_all(SUPPLICANT_PATH,
6507 SUPPLICANT_INTERFACE,
6508 service_property, NULL, NULL);
6510 invoke_introspect_method();
6515 static void unregister_interface_remove_params(DBusMessageIter *iter,
6518 const char *path = user_data;
6520 dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
6525 static void unregister_remove_interface(gpointer key, gpointer value,
6528 GSupplicantInterface *interface = value;
6530 supplicant_dbus_method_call(SUPPLICANT_PATH,
6531 SUPPLICANT_INTERFACE,
6533 unregister_interface_remove_params,
6534 NULL, interface->path, NULL);
6537 void g_supplicant_unregister(const GSupplicantCallbacks *callbacks)
6542 #if !defined TIZEN_EXT
6543 dbus_bus_remove_match(connection, g_supplicant_rule8, NULL);
6544 dbus_bus_remove_match(connection, g_supplicant_rule7, NULL);
6545 dbus_bus_remove_match(connection, g_supplicant_rule6, NULL);
6547 dbus_bus_remove_match(connection, g_supplicant_rule5, NULL);
6548 dbus_bus_remove_match(connection, g_supplicant_rule4, NULL);
6549 dbus_bus_remove_match(connection, g_supplicant_rule3, NULL);
6550 dbus_bus_remove_match(connection, g_supplicant_rule2, NULL);
6551 dbus_bus_remove_match(connection, g_supplicant_rule1, NULL);
6552 dbus_bus_remove_match(connection, g_supplicant_rule0, NULL);
6553 dbus_connection_flush(connection);
6555 dbus_connection_remove_filter(connection,
6556 g_supplicant_filter, NULL);
6559 if (config_file_table) {
6560 g_hash_table_destroy(config_file_table);
6561 config_file_table = NULL;
6565 g_hash_table_destroy(bss_mapping);
6570 g_hash_table_destroy(peer_mapping);
6571 peer_mapping = NULL;
6574 if (group_mapping) {
6575 g_hash_table_destroy(group_mapping);
6576 group_mapping = NULL;
6579 if (interface_table) {
6580 g_hash_table_foreach(interface_table,
6581 unregister_remove_interface, NULL);
6582 g_hash_table_destroy(interface_table);
6583 interface_table = NULL;
6586 if (system_available)
6587 callback_system_killed();
6590 dbus_connection_unref(connection);
6594 callbacks_pointer = NULL;