3 * WPA supplicant library with GLib integration
5 * Copyright (C) 2012-2013 Intel Corporation. All rights reserved.
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
34 #include <netinet/if_ether.h>
35 #include <netinet/in.h>
41 #include "gsupplicant.h"
43 #define IEEE80211_CAP_ESS 0x0001
44 #define IEEE80211_CAP_IBSS 0x0002
45 #define IEEE80211_CAP_PRIVACY 0x0010
48 #define COUNTRY_CODE_LENGTH 2
51 #define BSS_UNKNOWN_STRENGTH -90
53 static DBusConnection *connection;
55 static const GSupplicantCallbacks *callbacks_pointer;
57 static dbus_bool_t system_available = FALSE;
58 static dbus_bool_t system_ready = FALSE;
60 static dbus_int32_t debug_level;
61 static dbus_bool_t debug_timestamp = FALSE;
62 static dbus_bool_t debug_showkeys = FALSE;
64 static const char *debug_strings[] = {
65 "msgdump", "debug", "info", "warning", "error", NULL
68 static unsigned int eap_methods;
75 static struct strvalmap eap_method_map[] = {
76 { "MD5", G_SUPPLICANT_EAP_METHOD_MD5 },
77 { "TLS", G_SUPPLICANT_EAP_METHOD_TLS },
78 { "MSCHAPV2", G_SUPPLICANT_EAP_METHOD_MSCHAPV2 },
79 { "PEAP", G_SUPPLICANT_EAP_METHOD_PEAP },
80 { "TTLS", G_SUPPLICANT_EAP_METHOD_TTLS },
81 { "GTC", G_SUPPLICANT_EAP_METHOD_GTC },
82 { "OTP", G_SUPPLICANT_EAP_METHOD_OTP },
83 { "LEAP", G_SUPPLICANT_EAP_METHOD_LEAP },
84 { "WSC", G_SUPPLICANT_EAP_METHOD_WSC },
88 static struct strvalmap keymgmt_map[] = {
89 { "none", G_SUPPLICANT_KEYMGMT_NONE },
90 { "ieee8021x", G_SUPPLICANT_KEYMGMT_IEEE8021X },
91 { "wpa-none", G_SUPPLICANT_KEYMGMT_WPA_NONE },
92 { "wpa-psk", G_SUPPLICANT_KEYMGMT_WPA_PSK },
93 { "wpa-psk-sha256", G_SUPPLICANT_KEYMGMT_WPA_PSK_256 },
94 { "wpa-ft-psk", G_SUPPLICANT_KEYMGMT_WPA_FT_PSK },
95 { "wpa-ft-eap", G_SUPPLICANT_KEYMGMT_WPA_FT_EAP },
96 { "wpa-eap", G_SUPPLICANT_KEYMGMT_WPA_EAP },
97 { "wpa-eap-sha256", G_SUPPLICANT_KEYMGMT_WPA_EAP_256 },
98 { "wps", G_SUPPLICANT_KEYMGMT_WPS },
102 static struct strvalmap authalg_capa_map[] = {
103 { "open", G_SUPPLICANT_CAPABILITY_AUTHALG_OPEN },
104 { "shared", G_SUPPLICANT_CAPABILITY_AUTHALG_SHARED },
105 { "leap", G_SUPPLICANT_CAPABILITY_AUTHALG_LEAP },
109 static struct strvalmap proto_capa_map[] = {
110 { "wpa", G_SUPPLICANT_CAPABILITY_PROTO_WPA },
111 { "rsn", G_SUPPLICANT_CAPABILITY_PROTO_RSN },
115 static struct strvalmap group_map[] = {
116 { "wep40", G_SUPPLICANT_GROUP_WEP40 },
117 { "wep104", G_SUPPLICANT_GROUP_WEP104 },
118 { "tkip", G_SUPPLICANT_GROUP_TKIP },
119 { "ccmp", G_SUPPLICANT_GROUP_CCMP },
123 static struct strvalmap pairwise_map[] = {
124 { "none", G_SUPPLICANT_PAIRWISE_NONE },
125 { "tkip", G_SUPPLICANT_PAIRWISE_TKIP },
126 { "ccmp", G_SUPPLICANT_PAIRWISE_CCMP },
130 static struct strvalmap scan_capa_map[] = {
131 { "active", G_SUPPLICANT_CAPABILITY_SCAN_ACTIVE },
132 { "passive", G_SUPPLICANT_CAPABILITY_SCAN_PASSIVE },
133 { "ssid", G_SUPPLICANT_CAPABILITY_SCAN_SSID },
137 static struct strvalmap mode_capa_map[] = {
138 { "infrastructure", G_SUPPLICANT_CAPABILITY_MODE_INFRA },
139 { "ad-hoc", G_SUPPLICANT_CAPABILITY_MODE_IBSS },
140 { "ap", G_SUPPLICANT_CAPABILITY_MODE_AP },
141 { "p2p", G_SUPPLICANT_CAPABILITY_MODE_P2P },
145 static GHashTable *interface_table;
146 static GHashTable *bss_mapping;
147 static GHashTable *peer_mapping;
148 static GHashTable *group_mapping;
149 static GHashTable *pending_peer_connection;
150 static GHashTable *config_file_table;
152 struct _GSupplicantWpsCredentials {
153 unsigned char ssid[32];
154 unsigned int ssid_len;
158 struct added_network_information {
160 GSupplicantSecurity security;
162 char * private_passphrase;
165 struct _GSupplicantInterface {
168 unsigned int keymgmt_capa;
169 unsigned int authalg_capa;
170 unsigned int proto_capa;
171 unsigned int group_capa;
172 unsigned int pairwise_capa;
173 unsigned int scan_capa;
174 unsigned int mode_capa;
175 unsigned int max_scan_ssids;
178 bool ap_create_in_progress;
180 GSupplicantState state;
181 dbus_bool_t scanning;
182 GSupplicantInterfaceCallback scan_callback;
188 struct _GSupplicantWpsCredentials wps_cred;
189 GSupplicantWpsState wps_state;
190 GHashTable *network_table;
191 GHashTable *peer_table;
192 GHashTable *group_table;
193 GHashTable *bss_mapping;
195 const char *pending_peer_path;
196 GSupplicantNetwork *current_network;
197 struct added_network_information network_info;
198 #if defined TIZEN_EXT
199 int disconnect_reason;
203 struct g_supplicant_bss {
204 GSupplicantInterface *interface;
206 unsigned char bssid[6];
207 unsigned char ssid[32];
208 unsigned int ssid_len;
209 dbus_uint16_t frequency;
210 dbus_uint32_t maxrate;
212 GSupplicantMode mode;
213 GSupplicantSecurity security;
214 dbus_bool_t rsn_selected;
215 unsigned int wpa_keymgmt;
216 unsigned int wpa_pairwise;
217 unsigned int wpa_group;
218 unsigned int rsn_keymgmt;
219 unsigned int rsn_pairwise;
220 unsigned int rsn_group;
221 unsigned int keymgmt;
224 dbus_bool_t ieee8021x;
225 #if defined TIZEN_EXT
227 dbus_bool_t ft_ieee8021x;
230 unsigned char country_code[COUNTRY_CODE_LENGTH];
232 unsigned int wps_capabilities;
235 struct _GSupplicantNetwork {
236 GSupplicantInterface *interface;
240 unsigned char ssid[32];
241 unsigned int ssid_len;
243 dbus_uint16_t frequency;
244 struct g_supplicant_bss *best_bss;
245 GSupplicantMode mode;
246 GSupplicantSecurity security;
248 unsigned int wps_capabilities;
249 GHashTable *bss_table;
250 GHashTable *config_table;
251 #if defined TIZEN_EXT
256 unsigned int keymgmt;
258 unsigned char country_code[COUNTRY_CODE_LENGTH];
262 struct _GSupplicantPeer {
263 GSupplicantInterface *interface;
265 unsigned char device_address[ETH_ALEN];
266 unsigned char iface_address[ETH_ALEN];
268 unsigned char *widi_ies;
271 unsigned int wps_capabilities;
273 const GSupplicantInterface *current_group_iface;
274 bool connection_requested;
277 struct _GSupplicantGroup {
278 GSupplicantInterface *interface;
279 GSupplicantInterface *orig_interface;
285 struct interface_data {
286 GSupplicantInterface *interface;
287 char *path; /* Interface path cannot be taken from interface (above) as
288 * it might have been freed already.
290 GSupplicantInterfaceCallback callback;
292 bool network_remove_in_progress;
293 GSupplicantSSID *ssid;
296 struct interface_create_data {
300 GSupplicantInterface *interface;
301 GSupplicantInterfaceCallback callback;
305 struct interface_connect_data {
306 GSupplicantInterface *interface;
308 GSupplicantInterfaceCallback callback;
311 GSupplicantSSID *ssid;
312 GSupplicantPeerParams *peer;
316 struct interface_scan_data {
317 GSupplicantInterface *interface;
319 GSupplicantInterfaceCallback callback;
320 GSupplicantScanParams *scan_params;
324 #if defined TIZEN_EXT
325 struct g_connman_bssids {
332 static int network_remove(struct interface_data *data);
334 static inline void debug(const char *format, ...)
339 if (!callbacks_pointer || !callbacks_pointer->debug)
342 va_start(ap, format);
344 if (vsnprintf(str, sizeof(str), format, ap) > 0)
345 callbacks_pointer->debug(str);
350 #define SUPPLICANT_DBG(fmt, arg...) \
351 debug("%s:%s() " fmt, __FILE__, __FUNCTION__ , ## arg);
353 static GSupplicantMode string2mode(const char *mode)
356 return G_SUPPLICANT_MODE_UNKNOWN;
358 if (g_str_equal(mode, "infrastructure"))
359 return G_SUPPLICANT_MODE_INFRA;
360 else if (g_str_equal(mode, "ad-hoc"))
361 return G_SUPPLICANT_MODE_IBSS;
363 return G_SUPPLICANT_MODE_UNKNOWN;
366 static const char *mode2string(GSupplicantMode mode)
369 case G_SUPPLICANT_MODE_UNKNOWN:
371 case G_SUPPLICANT_MODE_INFRA:
373 case G_SUPPLICANT_MODE_IBSS:
375 case G_SUPPLICANT_MODE_MASTER:
382 static const char *security2string(GSupplicantSecurity security)
385 case G_SUPPLICANT_SECURITY_UNKNOWN:
387 case G_SUPPLICANT_SECURITY_NONE:
389 case G_SUPPLICANT_SECURITY_WEP:
391 case G_SUPPLICANT_SECURITY_PSK:
393 case G_SUPPLICANT_SECURITY_IEEE8021X:
395 #if defined TIZEN_EXT
396 case G_SUPPLICANT_SECURITY_FT_PSK:
398 case G_SUPPLICANT_SECURITY_FT_IEEE8021X:
399 return "ft_ieee8021x";
406 static GSupplicantState string2state(const char *state)
409 return G_SUPPLICANT_STATE_UNKNOWN;
411 if (g_str_equal(state, "unknown"))
412 return G_SUPPLICANT_STATE_UNKNOWN;
413 else if (g_str_equal(state, "interface_disabled"))
414 return G_SUPPLICANT_STATE_DISABLED;
415 else if (g_str_equal(state, "disconnected"))
416 return G_SUPPLICANT_STATE_DISCONNECTED;
417 else if (g_str_equal(state, "inactive"))
418 return G_SUPPLICANT_STATE_INACTIVE;
419 else if (g_str_equal(state, "scanning"))
420 return G_SUPPLICANT_STATE_SCANNING;
421 else if (g_str_equal(state, "authenticating"))
422 return G_SUPPLICANT_STATE_AUTHENTICATING;
423 else if (g_str_equal(state, "associating"))
424 return G_SUPPLICANT_STATE_ASSOCIATING;
425 else if (g_str_equal(state, "associated"))
426 return G_SUPPLICANT_STATE_ASSOCIATED;
427 else if (g_str_equal(state, "group_handshake"))
428 return G_SUPPLICANT_STATE_GROUP_HANDSHAKE;
429 else if (g_str_equal(state, "4way_handshake"))
430 return G_SUPPLICANT_STATE_4WAY_HANDSHAKE;
431 else if (g_str_equal(state, "completed"))
432 return G_SUPPLICANT_STATE_COMPLETED;
434 return G_SUPPLICANT_STATE_UNKNOWN;
437 static bool compare_network_parameters(GSupplicantInterface *interface,
438 GSupplicantSSID *ssid)
440 if (memcmp(interface->network_info.ssid, ssid->ssid, ssid->ssid_len))
443 if (interface->network_info.security != ssid->security)
446 if (interface->network_info.passphrase &&
447 g_strcmp0(interface->network_info.passphrase,
448 ssid->passphrase) != 0) {
452 if (interface->network_info.private_passphrase &&
453 g_strcmp0(interface->network_info.private_passphrase,
454 ssid->private_key_passphrase) != 0) {
461 static void remove_network_information(GSupplicantInterface * interface)
463 g_free(interface->network_info.ssid);
464 g_free(interface->network_info.passphrase);
465 g_free(interface->network_info.private_passphrase);
466 interface->network_info.ssid = NULL;
467 interface->network_info.passphrase = NULL;
468 interface->network_info.private_passphrase = NULL;
471 static int store_network_information(GSupplicantInterface * interface,
472 GSupplicantSSID *ssid)
474 interface->network_info.ssid = g_malloc(ssid->ssid_len + 1);
475 if (interface->network_info.ssid != NULL) {
476 memcpy(interface->network_info.ssid, ssid->ssid,
478 interface->network_info.ssid[ssid->ssid_len] = '\0';
483 interface->network_info.security = ssid->security;
485 if ((ssid->security == G_SUPPLICANT_SECURITY_WEP ||
486 ssid->security == G_SUPPLICANT_SECURITY_PSK ||
487 ssid->security == G_SUPPLICANT_SECURITY_NONE) &&
489 interface->network_info.passphrase = g_strdup(ssid->passphrase);
492 if (ssid->security == G_SUPPLICANT_SECURITY_IEEE8021X &&
493 ssid->private_key_passphrase) {
494 interface->network_info.private_passphrase =
495 g_strdup(ssid->private_key_passphrase);
501 static void callback_system_ready(void)
508 if (!callbacks_pointer)
511 if (!callbacks_pointer->system_ready)
514 callbacks_pointer->system_ready();
517 static void callback_system_killed(void)
519 system_ready = FALSE;
521 if (!callbacks_pointer)
524 if (!callbacks_pointer->system_killed)
527 callbacks_pointer->system_killed();
530 static void callback_interface_added(GSupplicantInterface *interface)
534 if (!callbacks_pointer)
537 if (!callbacks_pointer->interface_added)
540 callbacks_pointer->interface_added(interface);
543 static void callback_interface_state(GSupplicantInterface *interface)
545 if (!callbacks_pointer)
548 if (!callbacks_pointer->interface_state)
551 callbacks_pointer->interface_state(interface);
554 static void callback_interface_removed(GSupplicantInterface *interface)
556 if (!callbacks_pointer)
559 if (!callbacks_pointer->interface_removed)
562 callbacks_pointer->interface_removed(interface);
565 #if !defined TIZEN_EXT
566 static void callback_p2p_support(GSupplicantInterface *interface)
570 if (!interface->p2p_support)
573 if (callbacks_pointer && callbacks_pointer->p2p_support)
574 callbacks_pointer->p2p_support(interface);
578 static void callback_scan_started(GSupplicantInterface *interface)
580 if (!callbacks_pointer)
583 if (!callbacks_pointer->scan_started)
586 callbacks_pointer->scan_started(interface);
589 static void callback_ap_create_fail(GSupplicantInterface *interface)
591 if (!callbacks_pointer)
594 if (!callbacks_pointer->ap_create_fail)
597 callbacks_pointer->ap_create_fail(interface);
600 static void callback_scan_finished(GSupplicantInterface *interface)
602 if (!callbacks_pointer)
605 if (!callbacks_pointer->scan_finished)
608 callbacks_pointer->scan_finished(interface);
611 static void callback_network_added(GSupplicantNetwork *network)
613 if (!callbacks_pointer)
616 if (!callbacks_pointer->network_added)
619 callbacks_pointer->network_added(network);
622 static void callback_network_removed(GSupplicantNetwork *network)
624 if (!callbacks_pointer)
627 if (!callbacks_pointer->network_removed)
630 callbacks_pointer->network_removed(network);
633 #if defined TIZEN_EXT
634 static void callback_network_merged(GSupplicantNetwork *network)
636 if (!callbacks_pointer)
639 if (!callbacks_pointer->network_merged)
642 callbacks_pointer->network_merged(network);
645 static void callback_assoc_failed(void *user_data)
647 if (!callbacks_pointer)
650 if (!callbacks_pointer->assoc_failed)
653 callbacks_pointer->assoc_failed(user_data);
657 static void callback_network_changed(GSupplicantNetwork *network,
658 const char *property)
660 if (!callbacks_pointer)
663 if (!callbacks_pointer->network_changed)
666 callbacks_pointer->network_changed(network, property);
669 static void callback_network_associated(GSupplicantNetwork *network)
671 if (!callbacks_pointer)
674 if (!callbacks_pointer->network_associated)
677 callbacks_pointer->network_associated(network);
680 static void callback_peer_found(GSupplicantPeer *peer)
682 if (!callbacks_pointer)
685 if (!callbacks_pointer->peer_found)
688 callbacks_pointer->peer_found(peer);
691 static void callback_peer_lost(GSupplicantPeer *peer)
693 if (!callbacks_pointer)
696 if (!callbacks_pointer->peer_lost)
699 callbacks_pointer->peer_lost(peer);
702 static void callback_peer_changed(GSupplicantPeer *peer,
703 GSupplicantPeerState state)
705 if (!callbacks_pointer)
708 if (!callbacks_pointer->peer_changed)
711 callbacks_pointer->peer_changed(peer, state);
714 static void callback_peer_request(GSupplicantPeer *peer)
716 if (!callbacks_pointer)
719 if (!callbacks_pointer->peer_request)
722 peer->connection_requested = true;
724 callbacks_pointer->peer_request(peer);
727 static void callback_disconnect_reason_code(GSupplicantInterface *interface,
730 if (!callbacks_pointer)
733 if (!callbacks_pointer->disconnect_reasoncode)
736 if (reason_code != 0)
737 callbacks_pointer->disconnect_reasoncode(interface,
741 static void callback_assoc_status_code(GSupplicantInterface *interface,
744 if (!callbacks_pointer)
747 if (!callbacks_pointer->assoc_status_code)
750 callbacks_pointer->assoc_status_code(interface, status_code);
754 static void remove_group(gpointer data)
756 GSupplicantGroup *group = data;
759 g_slist_free_full(group->members, g_free);
765 static void remove_interface(gpointer data)
767 GSupplicantInterface *interface = data;
769 g_hash_table_destroy(interface->bss_mapping);
770 g_hash_table_destroy(interface->network_table);
771 g_hash_table_destroy(interface->peer_table);
772 g_hash_table_destroy(interface->group_table);
774 if (interface->scan_callback) {
775 SUPPLICANT_DBG("call interface %p callback %p scanning %d",
776 interface, interface->scan_callback,
777 interface->scanning);
779 interface->scan_callback(-EIO, interface, interface->scan_data);
780 interface->scan_callback = NULL;
781 interface->scan_data = NULL;
783 if (interface->scanning) {
784 interface->scanning = FALSE;
785 callback_scan_finished(interface);
789 callback_interface_removed(interface);
791 g_free(interface->wps_cred.key);
792 g_free(interface->path);
793 g_free(interface->network_path);
794 #if defined TIZEN_EXT
795 interface->network_path = NULL;
797 g_free(interface->ifname);
798 g_free(interface->driver);
799 g_free(interface->bridge);
800 remove_network_information(interface);
804 static void remove_network(gpointer data)
806 GSupplicantNetwork *network = data;
808 g_hash_table_destroy(network->bss_table);
810 callback_network_removed(network);
812 g_hash_table_destroy(network->config_table);
814 g_free(network->path);
815 g_free(network->group);
816 g_free(network->name);
817 #if defined TIZEN_EXT
818 g_free(network->eap);
819 g_free(network->identity);
820 g_free(network->phase2);
822 #if defined TIZEN_EXT
823 g_slist_free_full(network->vsie_list, g_free);
829 static void remove_bss(gpointer data)
831 struct g_supplicant_bss *bss = data;
834 #if defined TIZEN_EXT
835 g_slist_free_full(bss->vsie_list, g_free);
840 static void remove_peer(gpointer data)
842 GSupplicantPeer *peer = data;
844 callback_peer_lost(peer);
847 g_slist_free_full(peer->groups, g_free);
850 g_hash_table_remove(peer_mapping, peer->path);
852 if (pending_peer_connection)
853 g_hash_table_remove(pending_peer_connection, peer->path);
857 g_free(peer->identifier);
858 g_free(peer->widi_ies);
863 static void debug_strvalmap(const char *label, struct strvalmap *map,
868 for (i = 0; map[i].str; i++) {
869 if (val & map[i].val)
870 SUPPLICANT_DBG("%s: %s", label, map[i].str);
874 static void interface_capability_keymgmt(DBusMessageIter *iter, void *user_data)
876 GSupplicantInterface *interface = user_data;
877 const char *str = NULL;
880 dbus_message_iter_get_basic(iter, &str);
884 for (i = 0; keymgmt_map[i].str; i++)
885 if (strcmp(str, keymgmt_map[i].str) == 0) {
886 interface->keymgmt_capa |= keymgmt_map[i].val;
891 static void interface_capability_authalg(DBusMessageIter *iter, void *user_data)
893 GSupplicantInterface *interface = user_data;
894 const char *str = NULL;
897 dbus_message_iter_get_basic(iter, &str);
901 for (i = 0; authalg_capa_map[i].str; i++)
902 if (strcmp(str, authalg_capa_map[i].str) == 0) {
903 interface->authalg_capa |= authalg_capa_map[i].val;
908 static void interface_capability_proto(DBusMessageIter *iter, void *user_data)
910 GSupplicantInterface *interface = user_data;
911 const char *str = NULL;
914 dbus_message_iter_get_basic(iter, &str);
918 for (i = 0; proto_capa_map[i].str; i++)
919 if (strcmp(str, proto_capa_map[i].str) == 0) {
920 interface->proto_capa |= proto_capa_map[i].val;
925 static void interface_capability_pairwise(DBusMessageIter *iter,
928 GSupplicantInterface *interface = user_data;
929 const char *str = NULL;
932 dbus_message_iter_get_basic(iter, &str);
936 for (i = 0; pairwise_map[i].str; i++)
937 if (strcmp(str, pairwise_map[i].str) == 0) {
938 interface->pairwise_capa |= pairwise_map[i].val;
943 static void interface_capability_group(DBusMessageIter *iter, void *user_data)
945 GSupplicantInterface *interface = user_data;
946 const char *str = NULL;
949 dbus_message_iter_get_basic(iter, &str);
953 for (i = 0; group_map[i].str; i++)
954 if (strcmp(str, group_map[i].str) == 0) {
955 interface->group_capa |= group_map[i].val;
960 static void interface_capability_scan(DBusMessageIter *iter, void *user_data)
962 GSupplicantInterface *interface = user_data;
963 const char *str = NULL;
966 dbus_message_iter_get_basic(iter, &str);
970 for (i = 0; scan_capa_map[i].str; i++)
971 if (strcmp(str, scan_capa_map[i].str) == 0) {
972 interface->scan_capa |= scan_capa_map[i].val;
977 static void interface_capability_mode(DBusMessageIter *iter, void *user_data)
979 GSupplicantInterface *interface = user_data;
980 const char *str = NULL;
983 dbus_message_iter_get_basic(iter, &str);
987 for (i = 0; mode_capa_map[i].str; i++)
988 if (strcmp(str, mode_capa_map[i].str) == 0) {
989 interface->mode_capa |= mode_capa_map[i].val;
994 static void interface_capability(const char *key, DBusMessageIter *iter,
997 GSupplicantInterface *interface = user_data;
1002 if (g_strcmp0(key, "KeyMgmt") == 0)
1003 supplicant_dbus_array_foreach(iter,
1004 interface_capability_keymgmt, interface);
1005 else if (g_strcmp0(key, "AuthAlg") == 0)
1006 supplicant_dbus_array_foreach(iter,
1007 interface_capability_authalg, interface);
1008 else if (g_strcmp0(key, "Protocol") == 0)
1009 supplicant_dbus_array_foreach(iter,
1010 interface_capability_proto, interface);
1011 else if (g_strcmp0(key, "Pairwise") == 0)
1012 supplicant_dbus_array_foreach(iter,
1013 interface_capability_pairwise, interface);
1014 else if (g_strcmp0(key, "Group") == 0)
1015 supplicant_dbus_array_foreach(iter,
1016 interface_capability_group, interface);
1017 else if (g_strcmp0(key, "Scan") == 0)
1018 supplicant_dbus_array_foreach(iter,
1019 interface_capability_scan, interface);
1020 else if (g_strcmp0(key, "Modes") == 0)
1021 supplicant_dbus_array_foreach(iter,
1022 interface_capability_mode, interface);
1023 else if (g_strcmp0(key, "MaxScanSSID") == 0) {
1024 dbus_int32_t max_scan_ssid;
1026 dbus_message_iter_get_basic(iter, &max_scan_ssid);
1027 if (max_scan_ssid < 2)
1029 interface->max_scan_ssids = max_scan_ssid;
1032 SUPPLICANT_DBG("key %s type %c",
1033 key, dbus_message_iter_get_arg_type(iter));
1036 struct set_apscan_data
1038 unsigned int ap_scan;
1039 GSupplicantInterface *interface;
1042 static void set_apscan(DBusMessageIter *iter, void *user_data)
1044 struct set_apscan_data *data = user_data;
1045 unsigned int ap_scan = data->ap_scan;
1047 dbus_message_iter_append_basic(iter, DBUS_TYPE_UINT32, &ap_scan);
1050 static void set_apscan_complete(const char *error,
1051 DBusMessageIter *iter, void *user_data)
1053 struct set_apscan_data *data = user_data;
1054 GSupplicantInterface *interface = data->interface;
1057 interface->ap_create_in_progress = false;
1058 SUPPLICANT_DBG("Set AP scan error %s", error);
1062 interface->ap_create_in_progress = true;
1067 int g_supplicant_interface_set_apscan(GSupplicantInterface *interface,
1068 unsigned int ap_scan)
1070 struct set_apscan_data *data;
1073 data = dbus_malloc0(sizeof(*data));
1078 data->ap_scan = ap_scan;
1079 data->interface = interface;
1081 ret = supplicant_dbus_property_set(interface->path,
1082 SUPPLICANT_INTERFACE ".Interface",
1083 "ApScan", DBUS_TYPE_UINT32_AS_STRING,
1084 set_apscan, set_apscan_complete, data, NULL);
1091 void g_supplicant_interface_set_data(GSupplicantInterface *interface,
1097 interface->data = data;
1100 interface->scan_callback = NULL;
1103 void *g_supplicant_interface_get_data(GSupplicantInterface *interface)
1108 return interface->data;
1111 const char *g_supplicant_interface_get_ifname(GSupplicantInterface *interface)
1116 return interface->ifname;
1119 const char *g_supplicant_interface_get_driver(GSupplicantInterface *interface)
1124 return interface->driver;
1127 GSupplicantState g_supplicant_interface_get_state(
1128 GSupplicantInterface *interface)
1131 return G_SUPPLICANT_STATE_UNKNOWN;
1133 return interface->state;
1136 const char *g_supplicant_interface_get_wps_key(GSupplicantInterface *interface)
1141 return (const char *)interface->wps_cred.key;
1144 const void *g_supplicant_interface_get_wps_ssid(GSupplicantInterface *interface,
1145 unsigned int *ssid_len)
1150 if (!interface || interface->wps_cred.ssid_len == 0) {
1155 *ssid_len = interface->wps_cred.ssid_len;
1156 return interface->wps_cred.ssid;
1159 GSupplicantWpsState g_supplicant_interface_get_wps_state(
1160 GSupplicantInterface *interface)
1163 return G_SUPPLICANT_WPS_STATE_UNKNOWN;
1165 return interface->wps_state;
1168 unsigned int g_supplicant_interface_get_mode(GSupplicantInterface *interface)
1173 return interface->mode_capa;
1176 unsigned int g_supplicant_interface_get_max_scan_ssids(
1177 GSupplicantInterface *interface)
1182 if (interface->max_scan_ssids == 0)
1183 return WPAS_MAX_SCAN_SSIDS;
1185 return interface->max_scan_ssids;
1188 static void set_network_enabled(DBusMessageIter *iter, void *user_data)
1190 dbus_bool_t enable = *(dbus_bool_t *)user_data;
1192 dbus_message_iter_append_basic(iter, DBUS_TYPE_BOOLEAN, &enable);
1195 int g_supplicant_interface_enable_selected_network(GSupplicantInterface *interface,
1201 if (!interface->network_path)
1204 SUPPLICANT_DBG(" ");
1205 return supplicant_dbus_property_set(interface->network_path,
1206 SUPPLICANT_INTERFACE ".Network",
1207 "Enabled", DBUS_TYPE_BOOLEAN_AS_STRING,
1208 set_network_enabled, NULL, &enable, NULL);
1211 dbus_bool_t g_supplicant_interface_get_ready(GSupplicantInterface *interface)
1216 return interface->ready;
1219 GSupplicantInterface *g_supplicant_network_get_interface(
1220 GSupplicantNetwork *network)
1225 return network->interface;
1228 const char *g_supplicant_network_get_name(GSupplicantNetwork *network)
1230 if (!network || !network->name)
1233 return network->name;
1236 const char *g_supplicant_network_get_identifier(GSupplicantNetwork *network)
1238 if (!network || !network->group)
1241 return network->group;
1244 const char *g_supplicant_network_get_path(GSupplicantNetwork *network)
1246 if (!network || !network->path)
1249 return network->path;
1252 const char *g_supplicant_network_get_mode(GSupplicantNetwork *network)
1255 return G_SUPPLICANT_MODE_UNKNOWN;
1257 return mode2string(network->mode);
1260 const char *g_supplicant_network_get_security(GSupplicantNetwork *network)
1263 return G_SUPPLICANT_SECURITY_UNKNOWN;
1265 return security2string(network->security);
1268 const void *g_supplicant_network_get_ssid(GSupplicantNetwork *network,
1269 unsigned int *ssid_len)
1276 *ssid_len = network->ssid_len;
1277 return network->ssid;
1280 dbus_int16_t g_supplicant_network_get_signal(GSupplicantNetwork *network)
1285 return network->signal;
1288 dbus_uint16_t g_supplicant_network_get_frequency(GSupplicantNetwork *network)
1293 return network->frequency;
1296 dbus_bool_t g_supplicant_network_get_wps(GSupplicantNetwork *network)
1301 return network->wps;
1304 dbus_bool_t g_supplicant_network_is_wps_active(GSupplicantNetwork *network)
1309 if (network->wps_capabilities & G_SUPPLICANT_WPS_CONFIGURED)
1315 dbus_bool_t g_supplicant_network_is_wps_pbc(GSupplicantNetwork *network)
1320 if (network->wps_capabilities & G_SUPPLICANT_WPS_PBC)
1326 dbus_bool_t g_supplicant_network_is_wps_advertizing(GSupplicantNetwork *network)
1331 if (network->wps_capabilities & G_SUPPLICANT_WPS_REGISTRAR)
1337 GSupplicantInterface *g_supplicant_peer_get_interface(GSupplicantPeer *peer)
1342 return peer->interface;
1345 const char *g_supplicant_peer_get_path(GSupplicantPeer *peer)
1353 const char *g_supplicant_peer_get_identifier(GSupplicantPeer *peer)
1358 return peer->identifier;
1361 const void *g_supplicant_peer_get_device_address(GSupplicantPeer *peer)
1366 return peer->device_address;
1369 const void *g_supplicant_peer_get_iface_address(GSupplicantPeer *peer)
1374 return peer->iface_address;
1377 const char *g_supplicant_peer_get_name(GSupplicantPeer *peer)
1385 #if defined TIZEN_EXT
1386 bool g_supplicant_network_is_hs20AP(GSupplicantNetwork *network)
1391 return network->isHS20AP;
1394 const char *g_supplicant_network_get_eap(GSupplicantNetwork *network)
1396 if (!network || !network->eap)
1399 return network->eap;
1402 const char *g_supplicant_network_get_identity(GSupplicantNetwork *network)
1404 if (!network || !network->identity)
1407 return network->identity;
1410 const char *g_supplicant_network_get_phase2(GSupplicantNetwork *network)
1412 if (!network || !network->phase2)
1415 return network->phase2;
1418 unsigned int g_supplicant_network_get_keymgmt(GSupplicantNetwork *network)
1420 if (network == NULL)
1423 return network->keymgmt;
1426 const unsigned char *g_supplicant_network_get_countrycode(GSupplicantNetwork
1432 return network->country_code;
1436 const unsigned char *g_supplicant_peer_get_widi_ies(GSupplicantPeer *peer,
1439 if (!peer || !length)
1442 *length = peer->widi_ies_length;
1443 return peer->widi_ies;
1446 bool g_supplicant_peer_is_wps_pbc(GSupplicantPeer *peer)
1451 if (peer->wps_capabilities & G_SUPPLICANT_WPS_PBC)
1457 bool g_supplicant_peer_is_wps_pin(GSupplicantPeer *peer)
1462 if (peer->wps_capabilities & G_SUPPLICANT_WPS_PIN)
1468 bool g_supplicant_peer_is_in_a_group(GSupplicantPeer *peer)
1470 if (!peer || !peer->groups)
1476 GSupplicantInterface *g_supplicant_peer_get_group_interface(GSupplicantPeer *peer)
1481 return (GSupplicantInterface *) peer->current_group_iface;
1484 bool g_supplicant_peer_is_client(GSupplicantPeer *peer)
1486 GSupplicantGroup *group;
1492 for (list = peer->groups; list; list = list->next) {
1493 const char *path = list->data;
1495 group = g_hash_table_lookup(group_mapping, path);
1499 if (group->role != G_SUPPLICANT_GROUP_ROLE_CLIENT ||
1500 group->orig_interface != peer->interface)
1503 if (group->interface == peer->current_group_iface)
1510 bool g_supplicant_peer_has_requested_connection(GSupplicantPeer *peer)
1515 return peer->connection_requested;
1518 #if defined TIZEN_EXT
1520 * Description: Network client requires additional wifi specific info
1522 const unsigned char *g_supplicant_network_get_bssid(GSupplicantNetwork *network)
1524 if (network == NULL || network->best_bss == NULL)
1527 return (const unsigned char *)network->best_bss->bssid;
1530 unsigned int g_supplicant_network_get_maxrate(GSupplicantNetwork *network)
1532 if (network == NULL || network->best_bss == NULL)
1535 return network->best_bss->maxrate;
1538 const char *g_supplicant_network_get_enc_mode(GSupplicantNetwork *network)
1540 if (network == NULL || network->best_bss == NULL)
1543 if (network->best_bss->security == G_SUPPLICANT_SECURITY_PSK ||
1544 network->best_bss->security == G_SUPPLICANT_SECURITY_IEEE8021X) {
1545 unsigned int pairwise;
1547 pairwise = network->best_bss->rsn_pairwise |
1548 network->best_bss->wpa_pairwise;
1550 if ((pairwise & G_SUPPLICANT_PAIRWISE_CCMP) &&
1551 (pairwise & G_SUPPLICANT_PAIRWISE_TKIP))
1553 else if (pairwise & G_SUPPLICANT_PAIRWISE_CCMP)
1555 else if (pairwise & G_SUPPLICANT_PAIRWISE_TKIP)
1558 } else if (network->best_bss->security == G_SUPPLICANT_SECURITY_WEP)
1560 else if (network->best_bss->security == G_SUPPLICANT_SECURITY_NONE)
1566 bool g_supplicant_network_get_rsn_mode(GSupplicantNetwork *network)
1568 if (network == NULL || network->best_bss == NULL)
1571 if (network->best_bss->rsn_selected) {
1572 const char *mode = g_supplicant_network_get_enc_mode(network);
1573 if (g_strcmp0(mode, "aes") == 0 ||
1574 g_strcmp0(mode, "mixed") == 0)
1582 void *g_supplicant_network_get_wifi_vsie(GSupplicantNetwork *network)
1584 GSList *vsie_list = NULL;
1589 if (g_slist_length(network->vsie_list) > 0) {
1590 GSList *list = NULL;
1591 unsigned char *vsie = NULL;
1592 for (list = network->vsie_list; list; list = list->next) {
1593 unsigned char *ie = (unsigned char *)list->data;
1594 vsie = (unsigned char *)g_try_malloc0(ie[1]+2); // tag number size(1), tag length size(1)
1597 memcpy(vsie, ie, ie[1]+2);
1598 vsie_list = g_slist_append(vsie_list, vsie);
1600 SUPPLICANT_DBG("Failed to allocate memory");
1607 static void update_bssid_list(gpointer key, gpointer value, gpointer user_data)
1609 struct g_supplicant_bss *bss = value;
1610 struct g_connman_bssids *bssids = NULL;
1612 GSList **list = (GSList **)user_data;
1614 bssids = (struct g_connman_bssids *)g_try_malloc0(sizeof(struct g_connman_bssids));
1617 g_snprintf(buff, 18, "%02x:%02x:%02x:%02x:%02x:%02x",
1618 bss->bssid[0], bss->bssid[1], bss->bssid[2], bss->bssid[3],
1619 bss->bssid[4], bss->bssid[5]);
1621 memcpy(bssids->bssid, buff, 18);
1622 bssids->bssid[17] = '\0';
1623 bssids->strength = bss->signal;
1624 bssids->strength += 120;
1626 if (bssids->strength > 100)
1627 bssids->strength = 100;
1629 bssids->frequency = bss->frequency;
1630 *list = g_slist_append(*list, bssids);
1632 SUPPLICANT_DBG("Failed to allocate memory");
1635 void *g_supplicant_network_get_bssid_list(GSupplicantNetwork *network)
1637 GSList *bssid_list = NULL;
1639 if (g_hash_table_size(network->bss_table) < 1)
1642 g_hash_table_foreach(network->bss_table, update_bssid_list, &bssid_list);
1648 static void merge_network(GSupplicantNetwork *network)
1651 const char *ssid, *mode, *key_mgmt;
1652 #if defined TIZEN_EXT
1653 GSupplicantInterface *interface;
1654 const char *isHS20AP;
1655 const char *eap, *identity, *phase2;
1657 unsigned int i, ssid_len;
1660 ssid = g_hash_table_lookup(network->config_table, "ssid");
1661 mode = g_hash_table_lookup(network->config_table, "mode");
1662 key_mgmt = g_hash_table_lookup(network->config_table, "key_mgmt");
1663 #if defined TIZEN_EXT
1664 isHS20AP = g_hash_table_lookup(network->config_table, "isHS20AP");
1665 eap = g_hash_table_lookup(network->config_table, "eap");
1666 identity = g_hash_table_lookup(network->config_table, "identity");
1667 phase2 = g_hash_table_lookup(network->config_table, "phase2");
1668 interface = network->interface;
1671 SUPPLICANT_DBG("ssid %s mode %s", ssid, mode);
1674 ssid_len = strlen(ssid);
1678 str = g_string_sized_new((ssid_len * 2) + 24);
1682 for (i = 0; i < ssid_len; i++)
1683 #if defined TIZEN_EXT
1687 g_string_append_printf(str, "%02x", ssid[i]);
1688 #if defined TIZEN_EXT
1692 if (g_strcmp0(mode, "0") == 0)
1693 g_string_append_printf(str, "_managed");
1694 else if (g_strcmp0(mode, "1") == 0)
1695 g_string_append_printf(str, "_adhoc");
1697 if (g_strcmp0(key_mgmt, "WPA-PSK") == 0)
1698 g_string_append_printf(str, "_psk");
1699 #if defined TIZEN_EXT
1700 else if (g_strcmp0(key_mgmt, "WPA-EAP") == 0)
1701 g_string_append_printf(str, "_ieee8021x");
1703 g_string_append_printf(str, "_none");
1706 group = g_string_free(str, FALSE);
1708 SUPPLICANT_DBG("%s", group);
1710 #if defined TIZEN_EXT
1711 if (g_strcmp0(isHS20AP, "1") == 0) {
1712 network->isHS20AP = 1;
1714 g_free(network->eap);
1715 network->eap = g_strdup(eap);
1717 if (network->identity)
1718 g_free(network->identity);
1719 network->identity = g_strdup(identity);
1721 if (network->phase2)
1722 g_free(network->phase2);
1723 network->phase2 = g_strdup(phase2);
1725 network->isHS20AP = 0;
1728 interface->network_path = g_strdup(network->path);
1730 network->group = g_strdup(group);
1731 callback_network_merged(network);
1736 g_hash_table_destroy(network->config_table);
1738 g_free(network->path);
1742 static void network_property(const char *key, DBusMessageIter *iter,
1745 GSupplicantNetwork *network = user_data;
1747 if (!network->interface)
1751 merge_network(network);
1755 if (g_strcmp0(key, "Enabled") == 0) {
1756 dbus_bool_t enabled = FALSE;
1758 dbus_message_iter_get_basic(iter, &enabled);
1759 } else if (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_STRING) {
1760 const char *str = NULL;
1762 dbus_message_iter_get_basic(iter, &str);
1764 g_hash_table_replace(network->config_table,
1765 g_strdup(key), g_strdup(str));
1768 SUPPLICANT_DBG("key %s type %c",
1769 key, dbus_message_iter_get_arg_type(iter));
1772 static void interface_network_added(DBusMessageIter *iter, void *user_data)
1774 GSupplicantInterface *interface = user_data;
1775 GSupplicantNetwork *network;
1776 const char *path = NULL;
1780 dbus_message_iter_get_basic(iter, &path);
1784 if (g_strcmp0(path, "/") == 0)
1787 network = g_try_new0(GSupplicantNetwork, 1);
1791 network->interface = interface;
1792 network->path = g_strdup(path);
1794 network->config_table = g_hash_table_new_full(g_str_hash, g_str_equal,
1797 dbus_message_iter_next(iter);
1798 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
1799 supplicant_dbus_property_foreach(iter, network_property,
1801 network_property(NULL, NULL, network);
1805 supplicant_dbus_property_get_all(path,
1806 SUPPLICANT_INTERFACE ".Network",
1807 network_property, network, NULL);
1810 static void interface_network_removed(DBusMessageIter *iter, void *user_data)
1816 static char *create_name(unsigned char *ssid, int ssid_len)
1819 const gchar *remainder, *invalid;
1820 int valid_bytes, remaining_bytes;
1822 if (ssid_len < 1 || ssid[0] == '\0')
1823 return g_strdup("");
1826 remainder = (const gchar *)ssid;
1827 remaining_bytes = ssid_len;
1829 while (remaining_bytes != 0) {
1830 if (g_utf8_validate(remainder, remaining_bytes,
1835 valid_bytes = invalid - remainder;
1838 string = g_string_sized_new(remaining_bytes);
1840 g_string_append_len(string, remainder, valid_bytes);
1842 /* append U+FFFD REPLACEMENT CHARACTER */
1843 g_string_append(string, "\357\277\275");
1845 remaining_bytes -= valid_bytes + 1;
1846 remainder = invalid + 1;
1850 return g_strndup((const gchar *)ssid, ssid_len + 1);
1852 g_string_append(string, remainder);
1854 return g_string_free(string, FALSE);
1857 static char *create_group(struct g_supplicant_bss *bss)
1861 const char *mode, *security;
1863 str = g_string_sized_new((bss->ssid_len * 2) + 24);
1867 if (bss->ssid_len > 0 && bss->ssid[0] != '\0') {
1868 for (i = 0; i < bss->ssid_len; i++)
1869 g_string_append_printf(str, "%02x", bss->ssid[i]);
1871 g_string_append_printf(str, "hidden");
1873 mode = mode2string(bss->mode);
1875 g_string_append_printf(str, "_%s", mode);
1877 security = security2string(bss->security);
1879 g_string_append_printf(str, "_%s", security);
1881 return g_string_free(str, FALSE);
1884 static int add_or_replace_bss_to_network(struct g_supplicant_bss *bss)
1886 GSupplicantInterface *interface = bss->interface;
1887 GSupplicantNetwork *network;
1890 group = create_group(bss);
1891 SUPPLICANT_DBG("New group created: %s", group);
1896 network = g_hash_table_lookup(interface->network_table, group);
1899 SUPPLICANT_DBG("Network %s already exist", network->name);
1904 network = g_try_new0(GSupplicantNetwork, 1);
1910 network->interface = interface;
1912 network->path = g_strdup(bss->path);
1913 network->group = group;
1914 network->name = create_name(bss->ssid, bss->ssid_len);
1915 network->mode = bss->mode;
1916 network->security = bss->security;
1917 network->ssid_len = bss->ssid_len;
1918 memcpy(network->ssid, bss->ssid, bss->ssid_len);
1919 network->signal = bss->signal;
1920 network->frequency = bss->frequency;
1921 network->best_bss = bss;
1923 #if defined TIZEN_EXT
1924 network->keymgmt = bss->keymgmt;
1926 if (g_slist_length(bss->vsie_list) > 0) {
1927 GSList *list = NULL;
1928 unsigned char *vsie = NULL;
1929 for (list = bss->vsie_list; list; list = list->next) {
1930 unsigned char *ie = (unsigned char *)list->data;
1931 vsie = (unsigned char *)g_try_malloc0(ie[1]+2); // tag number size(1), tag length size(1)
1934 memcpy(vsie, ie, ie[1]+2);
1935 network->vsie_list = g_slist_append(network->vsie_list, vsie);
1937 SUPPLICANT_DBG("Failed to allocate memory.");
1941 network->isHS20AP = bss->hs20;
1942 memcpy(network->country_code, bss->country_code, COUNTRY_CODE_LENGTH);
1945 SUPPLICANT_DBG("New network %s created", network->name);
1947 network->bss_table = g_hash_table_new_full(g_str_hash, g_str_equal,
1950 network->config_table = g_hash_table_new_full(g_str_hash, g_str_equal,
1953 g_hash_table_replace(interface->network_table,
1954 network->group, network);
1956 callback_network_added(network);
1959 /* We update network's WPS properties if only bss provides WPS. */
1960 if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
1961 network->wps = TRUE;
1962 network->wps_capabilities |= bss->wps_capabilities;
1966 * Do not change best BSS if we are connected. It will be done through
1967 * CurrentBSS property in case of misalignment with wpa_s or roaming.
1969 if (network != interface->current_network &&
1970 bss->signal > network->signal) {
1971 network->signal = bss->signal;
1972 network->best_bss = bss;
1973 callback_network_changed(network, "Signal");
1976 g_hash_table_replace(interface->bss_mapping, bss->path, network);
1977 g_hash_table_replace(network->bss_table, bss->path, bss);
1979 g_hash_table_replace(bss_mapping, bss->path, interface);
1984 static void bss_rates(DBusMessageIter *iter, void *user_data)
1986 struct g_supplicant_bss *bss = user_data;
1987 dbus_uint32_t rate = 0;
1989 dbus_message_iter_get_basic(iter, &rate);
1993 if (rate > bss->maxrate)
1994 bss->maxrate = rate;
1997 static void bss_keymgmt(DBusMessageIter *iter, void *user_data)
1999 unsigned int *keymgmt = user_data;
2000 const char *str = NULL;
2003 dbus_message_iter_get_basic(iter, &str);
2007 for (i = 0; keymgmt_map[i].str; i++)
2008 if (strcmp(str, keymgmt_map[i].str) == 0) {
2009 SUPPLICANT_DBG("Keymgmt: %s", str);
2010 *keymgmt |= keymgmt_map[i].val;
2015 static void bss_group(DBusMessageIter *iter, void *user_data)
2017 unsigned int *group = user_data;
2018 const char *str = NULL;
2021 dbus_message_iter_get_basic(iter, &str);
2025 for (i = 0; group_map[i].str; i++)
2026 if (strcmp(str, group_map[i].str) == 0) {
2027 SUPPLICANT_DBG("Group: %s", str);
2028 *group |= group_map[i].val;
2033 static void bss_pairwise(DBusMessageIter *iter, void *user_data)
2035 unsigned int *pairwise = user_data;
2036 const char *str = NULL;
2039 dbus_message_iter_get_basic(iter, &str);
2043 for (i = 0; pairwise_map[i].str; i++)
2044 if (strcmp(str, pairwise_map[i].str) == 0) {
2045 SUPPLICANT_DBG("Pairwise: %s", str);
2046 *pairwise |= pairwise_map[i].val;
2051 static void bss_wpa(const char *key, DBusMessageIter *iter,
2054 struct g_supplicant_bss *bss = user_data;
2055 unsigned int value = 0;
2057 SUPPLICANT_DBG("Key: %s", key);
2059 if (g_strcmp0(key, "KeyMgmt") == 0) {
2060 supplicant_dbus_array_foreach(iter, bss_keymgmt, &value);
2062 if (bss->rsn_selected)
2063 bss->rsn_keymgmt = value;
2065 bss->wpa_keymgmt = value;
2066 } else if (g_strcmp0(key, "Group") == 0) {
2067 supplicant_dbus_array_foreach(iter, bss_group, &value);
2069 if (bss->rsn_selected)
2070 bss->rsn_group = value;
2072 bss->wpa_group = value;
2073 } else if (g_strcmp0(key, "Pairwise") == 0) {
2074 supplicant_dbus_array_foreach(iter, bss_pairwise, &value);
2076 if (bss->rsn_selected)
2077 bss->rsn_pairwise = value;
2079 bss->wpa_pairwise = value;
2083 static unsigned int get_tlv(unsigned char *ie, unsigned int ie_size,
2086 unsigned int len = 0;
2088 while (len + 4 < ie_size) {
2089 unsigned int hi = ie[len];
2090 unsigned int lo = ie[len + 1];
2091 unsigned int tmp_type = (hi << 8) + lo;
2092 unsigned int v_len = 0;
2094 /* hi and lo are used to recreate an unsigned int
2095 * based on 2 8bits length unsigned int. */
2099 v_len = (hi << 8) + lo;
2101 if (tmp_type == type) {
2102 unsigned int ret_value = 0;
2103 unsigned char *value = (unsigned char *)&ret_value;
2105 SUPPLICANT_DBG("IE: match type 0x%x", type);
2107 /* Verifying length relevance */
2108 if (v_len > sizeof(unsigned int) ||
2109 len + 4 + v_len > ie_size)
2112 memcpy(value, ie + len + 4, v_len);
2114 SUPPLICANT_DBG("returning 0x%x", ret_value);
2121 SUPPLICANT_DBG("returning 0");
2125 static void bss_process_ies(DBusMessageIter *iter, void *user_data)
2127 struct g_supplicant_bss *bss = user_data;
2128 const unsigned char WPS_OUI[] = { 0x00, 0x50, 0xf2, 0x04 };
2129 unsigned char *ie, *ie_end;
2130 DBusMessageIter array;
2134 #define WMM_WPA1_WPS_INFO 221
2135 #define WPS_INFO_MIN_LEN 6
2136 #define WPS_VERSION_TLV 0x104A
2137 #define WPS_STATE_TLV 0x1044
2138 #define WPS_METHODS_TLV 0x1012
2139 #define WPS_REGISTRAR_TLV 0x1041
2140 #define WPS_VERSION 0x10
2141 #define WPS_PBC 0x04
2142 #define WPS_PIN 0x00
2143 #define WPS_CONFIGURED 0x02
2144 #if defined TIZEN_EXT
2145 #define VENDOR_SPECIFIC_INFO 0xDD
2146 #define WLAN_EID_COUNTRY 7
2149 dbus_message_iter_recurse(iter, &array);
2150 dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
2152 if (!ie || ie_len < 2)
2155 bss->wps_capabilities = 0;
2157 memset(bss->country_code, 0, COUNTRY_CODE_LENGTH);
2159 for (ie_end = ie + ie_len; ie < ie_end && ie + ie[1] + 1 <= ie_end;
2161 #if defined TIZEN_EXT
2162 unsigned char *vsie;
2164 if(ie[0] == VENDOR_SPECIFIC_INFO && memcmp(ie+2, WPS_OUI, sizeof(WPS_OUI)) != 0) {
2165 SUPPLICANT_DBG("IE: match vendor specific data");
2167 vsie_len = ie[1]+2; // tag number size(1), tag length size(1)
2168 vsie = (unsigned char *)g_try_malloc0(vsie_len);
2171 memcpy(vsie, ie, vsie_len);
2172 bss->vsie_list = g_slist_append(bss->vsie_list, vsie);
2174 SUPPLICANT_DBG("Failed to allocate memory");
2178 if(ie[0] == WLAN_EID_COUNTRY && ie[1] >= 2) {
2179 memcpy(bss->country_code, ie+2, COUNTRY_CODE_LENGTH);
2183 if (ie[0] != WMM_WPA1_WPS_INFO || ie[1] < WPS_INFO_MIN_LEN ||
2184 memcmp(ie+2, WPS_OUI, sizeof(WPS_OUI)) != 0)
2187 SUPPLICANT_DBG("IE: match WPS_OUI");
2189 value = get_tlv(&ie[6], ie[1], WPS_STATE_TLV);
2190 if (get_tlv(&ie[6], ie[1], WPS_VERSION_TLV) == WPS_VERSION &&
2192 bss->keymgmt |= G_SUPPLICANT_KEYMGMT_WPS;
2194 if (value == WPS_CONFIGURED)
2195 bss->wps_capabilities |=
2196 G_SUPPLICANT_WPS_CONFIGURED;
2199 value = get_tlv(&ie[6], ie[1], WPS_METHODS_TLV);
2201 if (GUINT16_FROM_BE(value) == WPS_PBC)
2202 bss->wps_capabilities |= G_SUPPLICANT_WPS_PBC;
2203 if (GUINT16_FROM_BE(value) == WPS_PIN)
2204 bss->wps_capabilities |= G_SUPPLICANT_WPS_PIN;
2206 bss->wps_capabilities |=
2207 G_SUPPLICANT_WPS_PBC | G_SUPPLICANT_WPS_PIN;
2209 /* If the AP sends this it means it's advertizing
2210 * as a registrar and the WPS process is launched
2212 if (get_tlv(&ie[6], ie[1], WPS_REGISTRAR_TLV) != 0)
2213 bss->wps_capabilities |= G_SUPPLICANT_WPS_REGISTRAR;
2215 SUPPLICANT_DBG("WPS Methods 0x%x", bss->wps_capabilities);
2219 static void bss_compute_security(struct g_supplicant_bss *bss)
2222 * Combining RSN and WPA keymgmt
2223 * We combine it since parsing IEs might have set something for WPS. */
2224 bss->keymgmt |= bss->rsn_keymgmt | bss->wpa_keymgmt;
2226 bss->ieee8021x = FALSE;
2228 #if defined TIZEN_EXT
2229 bss->ft_ieee8021x = FALSE;
2230 bss->ft_psk = FALSE;
2233 #if defined TIZEN_EXT
2235 (G_SUPPLICANT_KEYMGMT_WPA_EAP |
2236 G_SUPPLICANT_KEYMGMT_WPA_EAP_256))
2237 bss->ieee8021x = TRUE;
2238 else if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_EAP)
2239 bss->ft_ieee8021x = TRUE;
2242 (G_SUPPLICANT_KEYMGMT_WPA_EAP |
2243 G_SUPPLICANT_KEYMGMT_WPA_FT_EAP |
2244 G_SUPPLICANT_KEYMGMT_WPA_EAP_256))
2245 bss->ieee8021x = TRUE;
2248 #if defined TIZEN_EXT
2250 (G_SUPPLICANT_KEYMGMT_WPA_PSK |
2251 G_SUPPLICANT_KEYMGMT_WPA_PSK_256))
2253 else if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_PSK)
2257 (G_SUPPLICANT_KEYMGMT_WPA_PSK |
2258 G_SUPPLICANT_KEYMGMT_WPA_FT_PSK |
2259 G_SUPPLICANT_KEYMGMT_WPA_PSK_256))
2264 bss->security = G_SUPPLICANT_SECURITY_IEEE8021X;
2266 bss->security = G_SUPPLICANT_SECURITY_PSK;
2267 #if defined TIZEN_EXT
2268 else if (bss->ft_psk)
2269 bss->security = G_SUPPLICANT_SECURITY_FT_PSK;
2270 else if (bss->ft_ieee8021x == TRUE)
2271 bss->security = G_SUPPLICANT_SECURITY_IEEE8021X;
2273 else if (bss->privacy)
2274 bss->security = G_SUPPLICANT_SECURITY_WEP;
2276 bss->security = G_SUPPLICANT_SECURITY_NONE;
2280 static void bss_property(const char *key, DBusMessageIter *iter,
2283 struct g_supplicant_bss *bss = user_data;
2285 if (!bss->interface)
2288 SUPPLICANT_DBG("key %s", key);
2293 if (g_strcmp0(key, "BSSID") == 0) {
2294 DBusMessageIter array;
2295 unsigned char *addr;
2298 dbus_message_iter_recurse(iter, &array);
2299 dbus_message_iter_get_fixed_array(&array, &addr, &addr_len);
2302 memcpy(bss->bssid, addr, addr_len);
2303 } else if (g_strcmp0(key, "SSID") == 0) {
2304 DBusMessageIter array;
2305 unsigned char *ssid;
2308 dbus_message_iter_recurse(iter, &array);
2309 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
2311 if (ssid_len > 0 && ssid_len < 33) {
2312 memcpy(bss->ssid, ssid, ssid_len);
2313 bss->ssid_len = ssid_len;
2315 memset(bss->ssid, 0, sizeof(bss->ssid));
2318 } else if (g_strcmp0(key, "Capabilities") == 0) {
2319 dbus_uint16_t capabilities = 0x0000;
2321 dbus_message_iter_get_basic(iter, &capabilities);
2323 if (capabilities & IEEE80211_CAP_ESS)
2324 bss->mode = G_SUPPLICANT_MODE_INFRA;
2325 else if (capabilities & IEEE80211_CAP_IBSS)
2326 bss->mode = G_SUPPLICANT_MODE_IBSS;
2328 if (capabilities & IEEE80211_CAP_PRIVACY)
2329 bss->privacy = TRUE;
2330 } else if (g_strcmp0(key, "Mode") == 0) {
2331 const char *mode = NULL;
2333 dbus_message_iter_get_basic(iter, &mode);
2334 bss->mode = string2mode(mode);
2335 } else if (g_strcmp0(key, "Frequency") == 0) {
2336 dbus_uint16_t frequency = 0;
2338 dbus_message_iter_get_basic(iter, &frequency);
2339 bss->frequency = frequency;
2340 } else if (g_strcmp0(key, "Signal") == 0) {
2341 dbus_int16_t signal = 0;
2343 dbus_message_iter_get_basic(iter, &signal);
2345 bss->signal = signal;
2347 bss->signal = BSS_UNKNOWN_STRENGTH;
2349 } else if (g_strcmp0(key, "Level") == 0) {
2350 dbus_int32_t level = 0;
2352 dbus_message_iter_get_basic(iter, &level);
2353 } else if (g_strcmp0(key, "Rates") == 0) {
2354 supplicant_dbus_array_foreach(iter, bss_rates, bss);
2355 } else if (g_strcmp0(key, "MaxRate") == 0) {
2356 dbus_uint32_t maxrate = 0;
2358 dbus_message_iter_get_basic(iter, &maxrate);
2360 bss->maxrate = maxrate;
2361 } else if (g_strcmp0(key, "Privacy") == 0) {
2362 dbus_bool_t privacy = FALSE;
2364 dbus_message_iter_get_basic(iter, &privacy);
2365 bss->privacy = privacy;
2366 } else if (g_strcmp0(key, "RSN") == 0) {
2367 bss->rsn_selected = TRUE;
2369 supplicant_dbus_property_foreach(iter, bss_wpa, bss);
2370 } else if (g_strcmp0(key, "WPA") == 0) {
2371 bss->rsn_selected = FALSE;
2373 supplicant_dbus_property_foreach(iter, bss_wpa, bss);
2374 #if defined TIZEN_EXT
2375 } else if (g_strcmp0(key, "HS20") == 0) {
2376 dbus_bool_t hs20 = FALSE;
2377 dbus_message_iter_get_basic(iter, &hs20);
2380 } else if (g_strcmp0(key, "IEs") == 0)
2381 bss_process_ies(iter, bss);
2383 SUPPLICANT_DBG("key %s type %c",
2384 key, dbus_message_iter_get_arg_type(iter));
2387 static struct g_supplicant_bss *interface_bss_added(DBusMessageIter *iter,
2390 GSupplicantInterface *interface = user_data;
2391 GSupplicantNetwork *network;
2392 struct g_supplicant_bss *bss;
2393 const char *path = NULL;
2397 dbus_message_iter_get_basic(iter, &path);
2401 if (g_strcmp0(path, "/") == 0)
2404 SUPPLICANT_DBG("%s", path);
2406 network = g_hash_table_lookup(interface->bss_mapping, path);
2408 bss = g_hash_table_lookup(network->bss_table, path);
2413 bss = g_try_new0(struct g_supplicant_bss, 1);
2417 bss->interface = interface;
2418 bss->path = g_strdup(path);
2419 bss->signal = BSS_UNKNOWN_STRENGTH;
2424 static void interface_bss_added_with_keys(DBusMessageIter *iter,
2427 struct g_supplicant_bss *bss;
2431 bss = interface_bss_added(iter, user_data);
2435 dbus_message_iter_next(iter);
2437 if (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_INVALID)
2440 supplicant_dbus_property_foreach(iter, bss_property, bss);
2442 bss_compute_security(bss);
2443 if (add_or_replace_bss_to_network(bss) < 0)
2444 SUPPLICANT_DBG("add_or_replace_bss_to_network failed");
2447 static void interface_bss_added_without_keys(DBusMessageIter *iter,
2450 struct g_supplicant_bss *bss;
2454 bss = interface_bss_added(iter, user_data);
2458 supplicant_dbus_property_get_all(bss->path,
2459 SUPPLICANT_INTERFACE ".BSS",
2460 bss_property, bss, NULL);
2462 bss_compute_security(bss);
2463 if (add_or_replace_bss_to_network(bss) < 0)
2464 SUPPLICANT_DBG("add_or_replace_bss_to_network failed");
2467 static void update_signal(gpointer key, gpointer value,
2470 struct g_supplicant_bss *bss = value;
2471 GSupplicantNetwork *network = user_data;
2473 if (bss->signal > network->signal) {
2474 network->signal = bss->signal;
2475 network->best_bss = bss;
2479 static void update_network_signal(GSupplicantNetwork *network)
2481 if (g_hash_table_size(network->bss_table) <= 1 && network->best_bss)
2484 g_hash_table_foreach(network->bss_table,
2485 update_signal, network);
2487 SUPPLICANT_DBG("New network signal %d", network->signal);
2490 static void interface_current_bss(GSupplicantInterface *interface,
2491 DBusMessageIter *iter)
2493 GSupplicantNetwork *network;
2494 struct g_supplicant_bss *bss;
2497 dbus_message_iter_get_basic(iter, &path);
2498 if (g_strcmp0(path, "/") == 0) {
2499 interface->current_network = NULL;
2503 interface_bss_added_without_keys(iter, interface);
2505 network = g_hash_table_lookup(interface->bss_mapping, path);
2509 bss = g_hash_table_lookup(network->bss_table, path);
2513 interface->current_network = network;
2515 if (bss != network->best_bss) {
2517 * This is the case where either wpa_s got associated
2518 * to a BSS different than the one ConnMan considers
2519 * the best, or we are roaming.
2521 SUPPLICANT_DBG("Update best BSS for %s", network->name);
2523 network->best_bss = bss;
2525 if (network->signal != bss->signal) {
2526 SUPPLICANT_DBG("New network signal %d dBm",
2529 network->signal = bss->signal;
2530 callback_network_changed(network, "Signal");
2535 * wpa_s could notify about CurrentBSS in any state once
2536 * it got associated. It is not sure such notification will
2537 * arrive together with transition to ASSOCIATED state.
2538 * In fact, for networks with security WEP or OPEN, it
2539 * always arrives together with transition to COMPLETED.
2541 switch (interface->state) {
2542 case G_SUPPLICANT_STATE_UNKNOWN:
2543 case G_SUPPLICANT_STATE_DISABLED:
2544 case G_SUPPLICANT_STATE_DISCONNECTED:
2545 case G_SUPPLICANT_STATE_INACTIVE:
2546 case G_SUPPLICANT_STATE_SCANNING:
2547 case G_SUPPLICANT_STATE_AUTHENTICATING:
2548 case G_SUPPLICANT_STATE_ASSOCIATING:
2550 case G_SUPPLICANT_STATE_ASSOCIATED:
2551 case G_SUPPLICANT_STATE_4WAY_HANDSHAKE:
2552 case G_SUPPLICANT_STATE_GROUP_HANDSHAKE:
2553 case G_SUPPLICANT_STATE_COMPLETED:
2554 callback_network_associated(network);
2559 static void interface_bss_removed(DBusMessageIter *iter, void *user_data)
2561 GSupplicantInterface *interface = user_data;
2562 GSupplicantNetwork *network;
2563 struct g_supplicant_bss *bss = NULL;
2564 const char *path = NULL;
2566 dbus_message_iter_get_basic(iter, &path);
2570 network = g_hash_table_lookup(interface->bss_mapping, path);
2574 bss = g_hash_table_lookup(network->bss_table, path);
2575 if (network->best_bss == bss) {
2576 network->best_bss = NULL;
2577 network->signal = BSS_UNKNOWN_STRENGTH;
2580 g_hash_table_remove(bss_mapping, path);
2582 g_hash_table_remove(interface->bss_mapping, path);
2583 g_hash_table_remove(network->bss_table, path);
2585 update_network_signal(network);
2587 if (g_hash_table_size(network->bss_table) == 0)
2588 g_hash_table_remove(interface->network_table, network->group);
2591 static void set_config_methods(DBusMessageIter *iter, void *user_data)
2593 dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, user_data);
2596 static void wps_property(const char *key, DBusMessageIter *iter,
2599 GSupplicantInterface *interface = user_data;
2604 SUPPLICANT_DBG("key: %s", key);
2606 if (g_strcmp0(key, "ConfigMethods") == 0) {
2607 const char *config_methods = "push_button", *str = NULL;
2609 dbus_message_iter_get_basic(iter, &str);
2610 if (str && strlen(str) > 0) {
2611 /* It was already set at wpa_s level, don't modify it. */
2612 SUPPLICANT_DBG("%s", str);
2616 supplicant_dbus_property_set(interface->path,
2617 SUPPLICANT_INTERFACE ".Interface.WPS",
2618 "ConfigMethods", DBUS_TYPE_STRING_AS_STRING,
2619 set_config_methods, NULL, &config_methods, NULL);
2621 SUPPLICANT_DBG("No value. Set %s", config_methods);
2626 static void interface_property(const char *key, DBusMessageIter *iter,
2629 GSupplicantInterface *interface = user_data;
2634 SUPPLICANT_DBG("%s", key);
2637 debug_strvalmap("KeyMgmt capability", keymgmt_map,
2638 interface->keymgmt_capa);
2639 debug_strvalmap("AuthAlg capability", authalg_capa_map,
2640 interface->authalg_capa);
2641 debug_strvalmap("Protocol capability", proto_capa_map,
2642 interface->proto_capa);
2643 debug_strvalmap("Pairwise capability", pairwise_map,
2644 interface->pairwise_capa);
2645 debug_strvalmap("Group capability", group_map,
2646 interface->group_capa);
2647 debug_strvalmap("Scan capability", scan_capa_map,
2648 interface->scan_capa);
2649 debug_strvalmap("Mode capability", mode_capa_map,
2650 interface->mode_capa);
2652 supplicant_dbus_property_get_all(interface->path,
2653 SUPPLICANT_INTERFACE ".Interface.WPS",
2654 wps_property, interface, interface);
2656 if (interface->ready)
2657 callback_interface_added(interface);
2662 if (g_strcmp0(key, "Capabilities") == 0) {
2663 supplicant_dbus_property_foreach(iter, interface_capability,
2665 #if !defined TIZEN_EXT
2666 if (interface->mode_capa & G_SUPPLICANT_CAPABILITY_MODE_P2P)
2667 interface->p2p_support = true;
2669 } else if (g_strcmp0(key, "State") == 0) {
2670 const char *str = NULL;
2672 dbus_message_iter_get_basic(iter, &str);
2674 if (string2state(str) != interface->state) {
2675 interface->state = string2state(str);
2676 callback_interface_state(interface);
2679 if (interface->ap_create_in_progress) {
2680 if (interface->state == G_SUPPLICANT_STATE_DISCONNECTED)
2681 callback_ap_create_fail(interface);
2683 interface->ap_create_in_progress = false;
2686 if (interface->state == G_SUPPLICANT_STATE_DISABLED)
2687 interface->ready = FALSE;
2689 interface->ready = TRUE;
2691 SUPPLICANT_DBG("state %s (%d)", str, interface->state);
2692 } else if (g_strcmp0(key, "Scanning") == 0) {
2693 dbus_bool_t scanning = FALSE;
2695 dbus_message_iter_get_basic(iter, &scanning);
2696 interface->scanning = scanning;
2698 if (interface->ready) {
2699 if (interface->scanning)
2700 callback_scan_started(interface);
2702 callback_scan_finished(interface);
2704 } else if (g_strcmp0(key, "ApScan") == 0) {
2707 dbus_message_iter_get_basic(iter, &apscan);
2708 interface->apscan = apscan;
2709 } else if (g_strcmp0(key, "Ifname") == 0) {
2710 const char *str = NULL;
2712 dbus_message_iter_get_basic(iter, &str);
2714 g_free(interface->ifname);
2715 interface->ifname = g_strdup(str);
2717 } else if (g_strcmp0(key, "Driver") == 0) {
2718 const char *str = NULL;
2720 dbus_message_iter_get_basic(iter, &str);
2722 g_free(interface->driver);
2723 interface->driver = g_strdup(str);
2725 } else if (g_strcmp0(key, "BridgeIfname") == 0) {
2726 const char *str = NULL;
2728 dbus_message_iter_get_basic(iter, &str);
2730 g_free(interface->bridge);
2731 interface->bridge = g_strdup(str);
2733 } else if (g_strcmp0(key, "ConfigFile") == 0) {
2734 const char *str = NULL;
2736 dbus_message_iter_get_basic(iter, &str);
2737 if (str && strlen(str) > 0 && interface->ifname) {
2738 SUPPLICANT_DBG("New {%s, %s}", interface->ifname, str);
2739 g_hash_table_replace(config_file_table,
2740 g_strdup(interface->ifname), g_strdup(str));
2742 } else if (g_strcmp0(key, "CurrentBSS") == 0) {
2743 interface_current_bss(interface, iter);
2744 } else if (g_strcmp0(key, "CurrentNetwork") == 0) {
2745 #if defined TIZEN_EXT
2746 if (interface->state != G_SUPPLICANT_STATE_COMPLETED)
2748 interface_network_added(iter, interface);
2749 } else if (g_strcmp0(key, "BSSs") == 0) {
2750 supplicant_dbus_array_foreach(iter,
2751 interface_bss_added_without_keys,
2753 } else if (g_strcmp0(key, "Blobs") == 0) {
2755 } else if (g_strcmp0(key, "Networks") == 0) {
2756 supplicant_dbus_array_foreach(iter, interface_network_added,
2758 } else if (g_strcmp0(key, "DisconnectReason") == 0) {
2760 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
2761 dbus_message_iter_get_basic(iter, &reason_code);
2762 callback_disconnect_reason_code(interface, reason_code);
2764 } else if (g_strcmp0(key, "AssocStatusCode") == 0) {
2766 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
2767 dbus_message_iter_get_basic(iter, &status_code);
2768 callback_assoc_status_code(interface, status_code);
2771 SUPPLICANT_DBG("key %s type %c",
2772 key, dbus_message_iter_get_arg_type(iter));
2776 static void scan_network_update(DBusMessageIter *iter, void *user_data)
2778 GSupplicantInterface *interface = user_data;
2779 GSupplicantNetwork *network;
2785 dbus_message_iter_get_basic(iter, &path);
2790 if (g_strcmp0(path, "/") == 0)
2793 /* Update the network details based on scan BSS data */
2794 network = g_hash_table_lookup(interface->bss_mapping, path);
2796 callback_network_added(network);
2799 static void scan_bss_data(const char *key, DBusMessageIter *iter,
2802 GSupplicantInterface *interface = user_data;
2804 /*Fixed : stucking in scanning state when scan failed*/
2805 #if defined TIZEN_EXT
2806 GSupplicantInterfaceCallback scan_callback;
2810 supplicant_dbus_array_foreach(iter, scan_network_update,
2813 #if defined TIZEN_EXT
2814 scan_callback = interface->scan_callback;
2817 if (interface->scan_callback)
2818 interface->scan_callback(0, interface, interface->scan_data);
2820 #if defined TIZEN_EXT
2821 if (interface->scan_callback == scan_callback) {
2823 interface->scan_callback = NULL;
2824 interface->scan_data = NULL;
2825 #if defined TIZEN_EXT
2830 static GSupplicantInterface *interface_alloc(const char *path)
2832 GSupplicantInterface *interface;
2834 interface = g_try_new0(GSupplicantInterface, 1);
2838 interface->path = g_strdup(path);
2840 interface->network_table = g_hash_table_new_full(g_str_hash,
2841 g_str_equal, NULL, remove_network);
2842 interface->peer_table = g_hash_table_new_full(g_str_hash,
2843 g_str_equal, NULL, remove_peer);
2844 interface->group_table = g_hash_table_new_full(g_str_hash,
2845 g_str_equal, NULL, remove_group);
2846 interface->bss_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
2849 g_hash_table_replace(interface_table, interface->path, interface);
2854 static void interface_added(DBusMessageIter *iter, void *user_data)
2856 GSupplicantInterface *interface;
2857 const char *path = NULL;
2858 bool properties_appended = GPOINTER_TO_UINT(user_data);
2862 dbus_message_iter_get_basic(iter, &path);
2866 if (g_strcmp0(path, "/") == 0)
2869 interface = g_hash_table_lookup(interface_table, path);
2873 interface = interface_alloc(path);
2877 if (!properties_appended) {
2878 supplicant_dbus_property_get_all(path,
2879 SUPPLICANT_INTERFACE ".Interface",
2880 interface_property, interface,
2885 dbus_message_iter_next(iter);
2886 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
2887 supplicant_dbus_property_foreach(iter, interface_property,
2889 interface_property(NULL, NULL, interface);
2893 static void interface_removed(DBusMessageIter *iter, void *user_data)
2895 const char *path = NULL;
2896 GSupplicantInterface *interface = user_data;
2898 dbus_message_iter_get_basic(iter, &path);
2902 interface = g_hash_table_lookup(interface_table, path);
2903 g_supplicant_interface_cancel(interface);
2905 g_hash_table_remove(interface_table, path);
2908 static void eap_method(DBusMessageIter *iter, void *user_data)
2910 const char *str = NULL;
2913 dbus_message_iter_get_basic(iter, &str);
2917 for (i = 0; eap_method_map[i].str; i++)
2918 if (strcmp(str, eap_method_map[i].str) == 0) {
2919 eap_methods |= eap_method_map[i].val;
2924 static void service_property(const char *key, DBusMessageIter *iter,
2928 callback_system_ready();
2932 if (g_strcmp0(key, "DebugLevel") == 0) {
2933 const char *str = NULL;
2936 dbus_message_iter_get_basic(iter, &str);
2937 for (i = 0; debug_strings[i]; i++)
2938 if (g_strcmp0(debug_strings[i], str) == 0) {
2942 SUPPLICANT_DBG("Debug level %d", debug_level);
2943 } else if (g_strcmp0(key, "DebugTimestamp") == 0) {
2944 dbus_message_iter_get_basic(iter, &debug_timestamp);
2945 SUPPLICANT_DBG("Debug timestamp %u", debug_timestamp);
2946 } else if (g_strcmp0(key, "DebugShowKeys") == 0) {
2947 dbus_message_iter_get_basic(iter, &debug_showkeys);
2948 SUPPLICANT_DBG("Debug show keys %u", debug_showkeys);
2949 } else if (g_strcmp0(key, "Interfaces") == 0) {
2950 supplicant_dbus_array_foreach(iter, interface_added, NULL);
2951 } else if (g_strcmp0(key, "EapMethods") == 0) {
2952 supplicant_dbus_array_foreach(iter, eap_method, NULL);
2953 debug_strvalmap("EAP method", eap_method_map, eap_methods);
2954 } else if (g_strcmp0(key, "Country") == 0) {
2955 const char *country = NULL;
2957 dbus_message_iter_get_basic(iter, &country);
2958 SUPPLICANT_DBG("Country %s", country);
2960 SUPPLICANT_DBG("key %s type %c",
2961 key, dbus_message_iter_get_arg_type(iter));
2964 static void signal_name_owner_changed(const char *path, DBusMessageIter *iter)
2966 const char *name = NULL, *old = NULL, *new = NULL;
2970 if (g_strcmp0(path, DBUS_PATH_DBUS) != 0)
2973 dbus_message_iter_get_basic(iter, &name);
2977 if (g_strcmp0(name, SUPPLICANT_SERVICE) != 0)
2980 dbus_message_iter_next(iter);
2981 dbus_message_iter_get_basic(iter, &old);
2982 dbus_message_iter_next(iter);
2983 dbus_message_iter_get_basic(iter, &new);
2988 if (strlen(old) > 0 && strlen(new) == 0) {
2989 system_available = FALSE;
2990 g_hash_table_remove_all(bss_mapping);
2991 g_hash_table_remove_all(peer_mapping);
2992 g_hash_table_remove_all(group_mapping);
2993 g_hash_table_remove_all(config_file_table);
2994 g_hash_table_remove_all(interface_table);
2995 callback_system_killed();
2998 if (strlen(new) > 0 && strlen(old) == 0) {
2999 system_available = TRUE;
3000 supplicant_dbus_property_get_all(SUPPLICANT_PATH,
3001 SUPPLICANT_INTERFACE,
3002 service_property, NULL, NULL);
3006 static void signal_properties_changed(const char *path, DBusMessageIter *iter)
3010 if (g_strcmp0(path, SUPPLICANT_PATH) != 0)
3013 supplicant_dbus_property_foreach(iter, service_property, NULL);
3016 static void signal_interface_added(const char *path, DBusMessageIter *iter)
3018 SUPPLICANT_DBG("path %s %s", path, SUPPLICANT_PATH);
3020 if (g_strcmp0(path, SUPPLICANT_PATH) == 0)
3021 interface_added(iter, GUINT_TO_POINTER(true));
3024 static void signal_interface_removed(const char *path, DBusMessageIter *iter)
3028 if (g_strcmp0(path, SUPPLICANT_PATH) == 0)
3029 interface_removed(iter, NULL);
3032 static void signal_interface_changed(const char *path, DBusMessageIter *iter)
3034 GSupplicantInterface *interface;
3038 interface = g_hash_table_lookup(interface_table, path);
3042 supplicant_dbus_property_foreach(iter, interface_property, interface);
3045 static void signal_scan_done(const char *path, DBusMessageIter *iter)
3047 GSupplicantInterface *interface;
3048 dbus_bool_t success = FALSE;
3052 interface = g_hash_table_lookup(interface_table, path);
3056 dbus_message_iter_get_basic(iter, &success);
3058 if (interface->scanning) {
3059 callback_scan_finished(interface);
3060 interface->scanning = FALSE;
3064 * If scan is unsuccessful return -EIO else get the scanned BSSs
3065 * and update the network details accordingly
3068 if (interface->scan_callback)
3069 interface->scan_callback(-EIO, interface,
3070 interface->scan_data);
3072 interface->scan_callback = NULL;
3073 interface->scan_data = NULL;
3078 supplicant_dbus_property_get(path, SUPPLICANT_INTERFACE ".Interface",
3079 "BSSs", scan_bss_data, interface, interface);
3082 static void signal_bss_added(const char *path, DBusMessageIter *iter)
3084 GSupplicantInterface *interface;
3088 interface = g_hash_table_lookup(interface_table, path);
3092 interface_bss_added_with_keys(iter, interface);
3095 static void signal_bss_removed(const char *path, DBusMessageIter *iter)
3097 GSupplicantInterface *interface;
3101 interface = g_hash_table_lookup(interface_table, path);
3105 interface_bss_removed(iter, interface);
3108 static void signal_network_added(const char *path, DBusMessageIter *iter)
3110 GSupplicantInterface *interface;
3114 interface = g_hash_table_lookup(interface_table, path);
3118 interface_network_added(iter, interface);
3121 static void signal_network_removed(const char *path, DBusMessageIter *iter)
3123 GSupplicantInterface *interface;
3127 interface = g_hash_table_lookup(interface_table, path);
3131 interface_network_removed(iter, interface);
3134 static void signal_bss_changed(const char *path, DBusMessageIter *iter)
3136 GSupplicantInterface *interface;
3137 GSupplicantNetwork *network;
3138 GSupplicantSecurity old_security;
3139 struct g_supplicant_bss *bss;
3143 interface = g_hash_table_lookup(bss_mapping, path);
3147 network = g_hash_table_lookup(interface->bss_mapping, path);
3151 bss = g_hash_table_lookup(network->bss_table, path);
3155 supplicant_dbus_property_foreach(iter, bss_property, bss);
3156 #if defined TIZEN_EXT
3157 network->frequency = bss->frequency;
3159 old_security = network->security;
3160 bss_compute_security(bss);
3162 if (old_security != bss->security) {
3163 struct g_supplicant_bss *new_bss;
3165 SUPPLICANT_DBG("New network security for %s", bss->ssid);
3167 /* Security change policy:
3168 * - we first copy the current bss into a new one with
3169 * its own pointer (path)
3170 * - we remove the current bss related network which will
3171 * tell the plugin about such removal. This is done due
3172 * to the fact that a security change means a group change
3173 * so a complete network change.
3174 * (current bss becomes invalid as well)
3175 * - we add the new bss: it adds new network and tell the
3176 * plugin about it. */
3178 new_bss = g_try_new0(struct g_supplicant_bss, 1);
3182 memcpy(new_bss, bss, sizeof(struct g_supplicant_bss));
3183 new_bss->path = g_strdup(bss->path);
3185 g_hash_table_remove(interface->network_table, network->group);
3187 if (add_or_replace_bss_to_network(new_bss) < 0) {
3188 /* Remove entries in hash tables to handle the
3189 * failure in add_or_replace_bss_to_network
3191 g_hash_table_remove(bss_mapping, path);
3192 g_hash_table_remove(interface->bss_mapping, path);
3193 g_hash_table_remove(network->bss_table, path);
3199 #if defined TIZEN_EXT
3200 if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
3201 network->wps = TRUE;
3202 network->wps_capabilities |= bss->wps_capabilities;
3204 network->wps = FALSE;
3207 /* Consider only property changes of the connected BSS */
3208 if (network == interface->current_network && bss != network->best_bss)
3211 if (bss->signal == network->signal)
3216 callback_network_changed(network, "");
3222 * If the new signal is lower than the SSID signal, we need
3223 * to check for the new maximum.
3225 if (bss->signal < network->signal) {
3226 if (bss != network->best_bss)
3231 callback_network_changed(network, "");
3235 network->signal = bss->signal;
3236 update_network_signal(network);
3238 network->signal = bss->signal;
3239 network->best_bss = bss;
3242 SUPPLICANT_DBG("New network signal for %s %d dBm", network->ssid,
3245 callback_network_changed(network, "Signal");
3248 static void wps_credentials(const char *key, DBusMessageIter *iter,
3251 GSupplicantInterface *interface = user_data;
3256 SUPPLICANT_DBG("key %s", key);
3258 if (g_strcmp0(key, "Key") == 0) {
3259 DBusMessageIter array;
3260 unsigned char *key_val;
3263 dbus_message_iter_recurse(iter, &array);
3264 dbus_message_iter_get_fixed_array(&array, &key_val, &key_len);
3266 g_free(interface->wps_cred.key);
3267 interface->wps_cred.key = g_try_malloc0(
3268 sizeof(char) * key_len + 1);
3270 if (!interface->wps_cred.key)
3273 memcpy(interface->wps_cred.key, key_val,
3274 sizeof(char) * key_len);
3276 SUPPLICANT_DBG("WPS key present");
3277 } else if (g_strcmp0(key, "SSID") == 0) {
3278 DBusMessageIter array;
3279 unsigned char *ssid;
3282 dbus_message_iter_recurse(iter, &array);
3283 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
3285 if (ssid_len > 0 && ssid_len < 33) {
3286 memcpy(interface->wps_cred.ssid, ssid, ssid_len);
3287 interface->wps_cred.ssid_len = ssid_len;
3289 memset(interface->wps_cred.ssid, 0, 32);
3290 interface->wps_cred.ssid_len = 0;
3295 static void signal_wps_credentials(const char *path, DBusMessageIter *iter)
3297 GSupplicantInterface *interface;
3301 interface = g_hash_table_lookup(interface_table, path);
3305 supplicant_dbus_property_foreach(iter, wps_credentials, interface);
3308 static void wps_event_args(const char *key, DBusMessageIter *iter,
3311 GSupplicantInterface *interface = user_data;
3313 if (!key || !interface)
3316 SUPPLICANT_DBG("Arg Key %s", key);
3319 static void signal_wps_event(const char *path, DBusMessageIter *iter)
3321 GSupplicantInterface *interface;
3322 const char *name = NULL;
3326 interface = g_hash_table_lookup(interface_table, path);
3330 dbus_message_iter_get_basic(iter, &name);
3332 SUPPLICANT_DBG("Name: %s", name);
3334 if (g_strcmp0(name, "success") == 0)
3335 interface->wps_state = G_SUPPLICANT_WPS_STATE_SUCCESS;
3336 else if (g_strcmp0(name, "failed") == 0)
3337 interface->wps_state = G_SUPPLICANT_WPS_STATE_FAIL;
3339 interface->wps_state = G_SUPPLICANT_WPS_STATE_UNKNOWN;
3341 if (!dbus_message_iter_has_next(iter))
3344 dbus_message_iter_next(iter);
3346 supplicant_dbus_property_foreach(iter, wps_event_args, interface);
3349 #if defined TIZEN_EXT
3350 static void signal_power_off(const char *path, DBusMessageIter *iter)
3352 int poweroff_state = 0;
3354 dbus_message_iter_get_basic(iter, &poweroff_state);
3356 SUPPLICANT_DBG("poweroff_state(%d)", poweroff_state);
3358 /* POWER_OFF_DIRECT 2 && POWER_OFF_RESTART 3 */
3359 if (poweroff_state != 2 && poweroff_state != 3)
3362 if (callbacks_pointer == NULL)
3365 if (callbacks_pointer->system_power_off == NULL)
3368 callbacks_pointer->system_power_off();
3372 static void signal_station_connected(const char *path, DBusMessageIter *iter)
3374 GSupplicantInterface *interface;
3375 const char *sta_mac = NULL;
3377 SUPPLICANT_DBG("path %s %s", path, SUPPLICANT_PATH);
3379 if (callbacks_pointer->add_station == NULL)
3382 if (g_strcmp0(path, "/") == 0)
3385 interface = g_hash_table_lookup(interface_table, path);
3386 if (interface == NULL)
3389 dbus_message_iter_get_basic(iter, &sta_mac);
3390 if (sta_mac == NULL)
3393 SUPPLICANT_DBG("New station %s connected", sta_mac);
3394 callbacks_pointer->add_station(sta_mac);
3397 static void signal_station_disconnected(const char *path, DBusMessageIter *iter)
3399 GSupplicantInterface *interface;
3400 const char *sta_mac = NULL;
3402 SUPPLICANT_DBG("path %s %s", path, SUPPLICANT_PATH);
3404 if (callbacks_pointer->remove_station == NULL)
3407 if (g_strcmp0(path, "/") == 0)
3410 interface = g_hash_table_lookup(interface_table, path);
3411 if (interface == NULL)
3414 dbus_message_iter_get_basic(iter, &sta_mac);
3415 if (sta_mac == NULL)
3418 SUPPLICANT_DBG("Station %s disconnected", sta_mac);
3419 callbacks_pointer->remove_station(sta_mac);
3422 static void create_peer_identifier(GSupplicantPeer *peer)
3424 const unsigned char test[ETH_ALEN] = {};
3429 if (!memcmp(peer->device_address, test, ETH_ALEN)) {
3430 peer->identifier = g_strdup(peer->name);
3434 peer->identifier = g_malloc0(19);
3435 snprintf(peer->identifier, 19, "%02x%02x%02x%02x%02x%02x",
3436 peer->device_address[0],
3437 peer->device_address[1],
3438 peer->device_address[2],
3439 peer->device_address[3],
3440 peer->device_address[4],
3441 peer->device_address[5]);
3444 struct peer_property_data {
3445 GSupplicantPeer *peer;
3447 bool groups_changed;
3448 bool services_changed;
3451 static void peer_groups_relation(DBusMessageIter *iter, void *user_data)
3453 struct peer_property_data *data = user_data;
3454 GSupplicantPeer *peer = data->peer;
3455 GSupplicantGroup *group;
3456 const char *str = NULL;
3459 dbus_message_iter_get_basic(iter, &str);
3463 group = g_hash_table_lookup(group_mapping, str);
3467 elem = g_slist_find_custom(data->old_groups, str, (GCompareFunc)g_strcmp0);
3469 data->old_groups = g_slist_remove_link(data->old_groups, elem);
3470 peer->groups = g_slist_concat(elem, peer->groups);
3472 peer->groups = g_slist_prepend(peer->groups, g_strdup(str));
3473 data->groups_changed = true;
3477 static void peer_property(const char *key, DBusMessageIter *iter,
3480 GSupplicantPeer *pending_peer;
3481 struct peer_property_data *data = user_data;
3482 GSupplicantPeer *peer = data->peer;
3484 SUPPLICANT_DBG("key: %s", key);
3486 if (!peer->interface)
3491 create_peer_identifier(peer);
3492 callback_peer_found(peer);
3493 pending_peer = g_hash_table_lookup(
3494 pending_peer_connection, peer->path);
3496 if (pending_peer && pending_peer == peer) {
3497 callback_peer_request(peer);
3498 g_hash_table_remove(pending_peer_connection,
3508 if (g_strcmp0(key, "DeviceAddress") == 0) {
3509 unsigned char *dev_addr;
3510 DBusMessageIter array;
3513 dbus_message_iter_recurse(iter, &array);
3514 dbus_message_iter_get_fixed_array(&array, &dev_addr, &len);
3516 if (len == ETH_ALEN)
3517 memcpy(peer->device_address, dev_addr, len);
3518 } else if (g_strcmp0(key, "DeviceName") == 0) {
3519 const char *str = NULL;
3521 dbus_message_iter_get_basic(iter, &str);
3523 peer->name = g_strdup(str);
3524 } else if (g_strcmp0(key, "config_method") == 0) {
3525 uint16_t wps_config;
3527 dbus_message_iter_get_basic(iter, &wps_config);
3529 if (wps_config & G_SUPPLICANT_WPS_CONFIG_PBC)
3530 peer->wps_capabilities |= G_SUPPLICANT_WPS_PBC;
3531 if (wps_config & ~G_SUPPLICANT_WPS_CONFIG_PBC)
3532 peer->wps_capabilities |= G_SUPPLICANT_WPS_PIN;
3533 } else if (g_strcmp0(key, "Groups") == 0) {
3534 data->old_groups = peer->groups;
3535 peer->groups = NULL;
3537 supplicant_dbus_array_foreach(iter,
3538 peer_groups_relation, data);
3539 if (g_slist_length(data->old_groups) > 0) {
3540 g_slist_free_full(data->old_groups, g_free);
3541 data->groups_changed = true;
3543 } else if (g_strcmp0(key, "IEs") == 0) {
3544 DBusMessageIter array;
3548 dbus_message_iter_recurse(iter, &array);
3549 dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
3551 if (!ie || ie_len < 2)
3554 if (peer->widi_ies) {
3555 if (memcmp(peer->widi_ies, ie, ie_len) == 0)
3558 g_free(peer->widi_ies);
3559 peer->widi_ies_length = 0;
3562 peer->widi_ies = g_malloc0(ie_len * sizeof(unsigned char));
3564 memcpy(peer->widi_ies, ie, ie_len);
3565 peer->widi_ies_length = ie_len;
3566 data->services_changed = true;
3570 static void signal_peer_found(const char *path, DBusMessageIter *iter)
3572 struct peer_property_data *property_data;
3573 GSupplicantInterface *interface;
3574 const char *obj_path = NULL;
3575 GSupplicantPeer *peer;
3579 interface = g_hash_table_lookup(interface_table, path);
3583 dbus_message_iter_get_basic(iter, &obj_path);
3584 if (!obj_path || g_strcmp0(obj_path, "/") == 0)
3587 peer = g_hash_table_lookup(interface->peer_table, obj_path);
3591 peer = g_try_new0(GSupplicantPeer, 1);
3595 peer->interface = interface;
3596 peer->path = g_strdup(obj_path);
3597 g_hash_table_insert(interface->peer_table, peer->path, peer);
3598 g_hash_table_replace(peer_mapping, peer->path, interface);
3600 property_data = dbus_malloc0(sizeof(struct peer_property_data));
3601 property_data->peer = peer;
3603 dbus_message_iter_next(iter);
3604 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
3605 supplicant_dbus_property_foreach(iter, peer_property,
3607 peer_property(NULL, NULL, property_data);
3611 supplicant_dbus_property_get_all(obj_path,
3612 SUPPLICANT_INTERFACE ".Peer",
3613 peer_property, property_data, NULL);
3616 static void signal_peer_lost(const char *path, DBusMessageIter *iter)
3618 GSupplicantInterface *interface;
3619 const char *obj_path = NULL;
3620 GSupplicantPeer *peer;
3624 interface = g_hash_table_lookup(interface_table, path);
3628 dbus_message_iter_get_basic(iter, &obj_path);
3629 if (!obj_path || g_strcmp0(obj_path, "/") == 0)
3632 peer = g_hash_table_lookup(interface->peer_table, obj_path);
3636 g_hash_table_remove(interface->peer_table, obj_path);
3639 static void signal_peer_changed(const char *path, DBusMessageIter *iter)
3641 struct peer_property_data *property_data;
3642 GSupplicantInterface *interface;
3643 GSupplicantPeer *peer;
3647 interface = g_hash_table_lookup(peer_mapping, path);
3651 peer = g_hash_table_lookup(interface->peer_table, path);
3653 g_hash_table_remove(peer_mapping, path);
3657 property_data = dbus_malloc0(sizeof(struct peer_property_data));
3658 property_data->peer = peer;
3660 supplicant_dbus_property_foreach(iter, peer_property, property_data);
3661 if (property_data->services_changed)
3662 callback_peer_changed(peer,
3663 G_SUPPLICANT_PEER_SERVICES_CHANGED);
3665 if (property_data->groups_changed)
3666 callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_CHANGED);
3668 dbus_free(property_data);
3670 if (!g_supplicant_peer_is_in_a_group(peer))
3671 peer->connection_requested = false;
3674 struct group_sig_data {
3675 const char *peer_obj_path;
3676 unsigned char iface_address[ETH_ALEN];
3677 const char *interface_obj_path;
3678 const char *group_obj_path;
3682 static void group_sig_property(const char *key, DBusMessageIter *iter,
3685 struct group_sig_data *data = user_data;
3690 if (g_strcmp0(key, "peer_interface_addr") == 0) {
3691 unsigned char *dev_addr;
3692 DBusMessageIter array;
3695 dbus_message_iter_recurse(iter, &array);
3696 dbus_message_iter_get_fixed_array(&array, &dev_addr, &len);
3698 if (len == ETH_ALEN)
3699 memcpy(data->iface_address, dev_addr, len);
3700 } else if (g_strcmp0(key, "role") == 0) {
3701 const char *str = NULL;
3703 dbus_message_iter_get_basic(iter, &str);
3704 if (g_strcmp0(str, "GO") == 0)
3705 data->role = G_SUPPLICANT_GROUP_ROLE_GO;
3707 data->role = G_SUPPLICANT_GROUP_ROLE_CLIENT;
3708 } else if (g_strcmp0(key, "peer_object") == 0)
3709 dbus_message_iter_get_basic(iter, &data->peer_obj_path);
3710 else if (g_strcmp0(key, "interface_object") == 0)
3711 dbus_message_iter_get_basic(iter, &data->interface_obj_path);
3712 else if (g_strcmp0(key, "group_object") == 0)
3713 dbus_message_iter_get_basic(iter, &data->group_obj_path);
3717 static void signal_group_success(const char *path, DBusMessageIter *iter)
3719 GSupplicantInterface *interface;
3720 struct group_sig_data data = {};
3721 GSupplicantPeer *peer;
3725 interface = g_hash_table_lookup(interface_table, path);
3729 supplicant_dbus_property_foreach(iter, group_sig_property, &data);
3730 if (!data.peer_obj_path)
3733 peer = g_hash_table_lookup(interface->peer_table, data.peer_obj_path);
3737 memcpy(peer->iface_address, data.iface_address, ETH_ALEN);
3738 interface->pending_peer_path = peer->path;
3741 static void signal_group_failure(const char *path, DBusMessageIter *iter)
3743 GSupplicantInterface *interface;
3744 struct group_sig_data data = {};
3745 GSupplicantPeer *peer;
3749 interface = g_hash_table_lookup(interface_table, path);
3753 supplicant_dbus_property_foreach(iter, group_sig_property, &data);
3754 if (!data.peer_obj_path)
3757 peer = g_hash_table_lookup(interface->peer_table, data.peer_obj_path);
3761 callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_FAILED);
3762 peer->connection_requested = false;
3765 static void signal_group_started(const char *path, DBusMessageIter *iter)
3767 GSupplicantInterface *interface, *g_interface;
3768 struct group_sig_data data = {};
3769 GSupplicantGroup *group;
3770 GSupplicantPeer *peer;
3774 interface = g_hash_table_lookup(interface_table, path);
3778 supplicant_dbus_property_foreach(iter, group_sig_property, &data);
3779 if (!data.interface_obj_path || !data.group_obj_path)
3782 peer = g_hash_table_lookup(interface->peer_table,
3783 interface->pending_peer_path);
3784 interface->pending_peer_path = NULL;
3788 g_interface = g_hash_table_lookup(interface_table,
3789 data.interface_obj_path);
3793 group = g_hash_table_lookup(interface->group_table,
3794 data.group_obj_path);
3798 group = g_try_new0(GSupplicantGroup, 1);
3802 group->interface = g_interface;
3803 group->orig_interface = interface;
3804 group->path = g_strdup(data.group_obj_path);
3805 group->role = data.role;
3807 g_hash_table_insert(interface->group_table, group->path, group);
3808 g_hash_table_replace(group_mapping, group->path, group);
3810 peer->current_group_iface = g_interface;
3811 callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_STARTED);
3814 static void remove_peer_group_interface(GHashTable *group_table,
3817 GSupplicantGroup *group;
3818 GHashTableIter iter;
3819 gpointer value, key;
3824 group = g_hash_table_lookup(group_table, path);
3826 if (!group || !group->orig_interface)
3829 g_hash_table_iter_init(&iter, group->orig_interface->peer_table);
3831 while (g_hash_table_iter_next(&iter, &key, &value)) {
3832 GSupplicantPeer *peer = value;
3834 if (peer->current_group_iface == group->interface)
3835 peer->current_group_iface = NULL;
3839 static void signal_group_finished(const char *path, DBusMessageIter *iter)
3841 GSupplicantInterface *interface;
3842 struct group_sig_data data = {};
3846 interface = g_hash_table_lookup(interface_table, path);
3850 supplicant_dbus_property_foreach(iter, group_sig_property, &data);
3851 if (!data.interface_obj_path || !data.group_obj_path)
3854 remove_peer_group_interface(interface->group_table, data.group_obj_path);
3856 g_hash_table_remove(group_mapping, data.group_obj_path);
3858 g_hash_table_remove(interface->group_table, data.group_obj_path);
3861 static void signal_group_request(const char *path, DBusMessageIter *iter)
3863 GSupplicantInterface *interface;
3864 GSupplicantPeer *peer;
3865 const char *obj_path;
3869 interface = g_hash_table_lookup(interface_table, path);
3873 dbus_message_iter_get_basic(iter, &obj_path);
3874 if (!obj_path || !g_strcmp0(obj_path, "/"))
3877 peer = g_hash_table_lookup(interface->peer_table, obj_path);
3882 * Peer has been previously found and property set,
3883 * otherwise, defer connection to when peer property
3886 if (peer->identifier)
3887 callback_peer_request(peer);
3889 g_hash_table_replace(pending_peer_connection, peer->path, peer);
3892 static void signal_group_peer_joined(const char *path, DBusMessageIter *iter)
3894 const char *peer_path = NULL;
3895 GSupplicantInterface *interface;
3896 GSupplicantGroup *group;
3897 GSupplicantPeer *peer;
3901 group = g_hash_table_lookup(group_mapping, path);
3905 dbus_message_iter_get_basic(iter, &peer_path);
3909 interface = g_hash_table_lookup(peer_mapping, peer_path);
3913 peer = g_hash_table_lookup(interface->peer_table, peer_path);
3917 group->members = g_slist_prepend(group->members, g_strdup(peer_path));
3919 callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_JOINED);
3922 static void signal_group_peer_disconnected(const char *path, DBusMessageIter *iter)
3924 const char *peer_path = NULL;
3925 GSupplicantInterface *interface;
3926 GSupplicantGroup *group;
3927 GSupplicantPeer *peer;
3932 group = g_hash_table_lookup(group_mapping, path);
3936 dbus_message_iter_get_basic(iter, &peer_path);
3940 for (elem = group->members; elem; elem = elem->next) {
3941 if (!g_strcmp0(elem->data, peer_path))
3949 group->members = g_slist_delete_link(group->members, elem);
3951 interface = g_hash_table_lookup(peer_mapping, peer_path);
3955 peer = g_hash_table_lookup(interface->peer_table, peer_path);
3959 callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_DISCONNECTED);
3960 peer->connection_requested = false;
3964 const char *interface;
3966 void (*function) (const char *path, DBusMessageIter *iter);
3968 { DBUS_INTERFACE_DBUS, "NameOwnerChanged", signal_name_owner_changed },
3970 { SUPPLICANT_INTERFACE, "PropertiesChanged", signal_properties_changed },
3971 { SUPPLICANT_INTERFACE, "InterfaceAdded", signal_interface_added },
3972 { SUPPLICANT_INTERFACE, "InterfaceCreated", signal_interface_added },
3973 { SUPPLICANT_INTERFACE, "InterfaceRemoved", signal_interface_removed },
3975 { SUPPLICANT_INTERFACE ".Interface", "PropertiesChanged", signal_interface_changed },
3976 { SUPPLICANT_INTERFACE ".Interface", "ScanDone", signal_scan_done },
3977 { SUPPLICANT_INTERFACE ".Interface", "BSSAdded", signal_bss_added },
3978 { SUPPLICANT_INTERFACE ".Interface", "BSSRemoved", signal_bss_removed },
3979 { SUPPLICANT_INTERFACE ".Interface", "NetworkAdded", signal_network_added },
3980 { SUPPLICANT_INTERFACE ".Interface", "NetworkRemoved", signal_network_removed },
3982 { SUPPLICANT_INTERFACE ".BSS", "PropertiesChanged", signal_bss_changed },
3984 { SUPPLICANT_INTERFACE ".Interface.WPS", "Credentials", signal_wps_credentials },
3985 { SUPPLICANT_INTERFACE ".Interface.WPS", "Event", signal_wps_event },
3986 #if defined TIZEN_EXT
3987 { "org.tizen.system.deviced.PowerOff", "ChangeState", signal_power_off },
3990 { SUPPLICANT_INTERFACE".Interface", "StaAuthorized", signal_station_connected },
3991 { SUPPLICANT_INTERFACE".Interface", "StaDeauthorized", signal_station_disconnected },
3993 { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeviceFound", signal_peer_found },
3994 { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeviceLost", signal_peer_lost },
3996 { SUPPLICANT_INTERFACE ".Peer", "PropertiesChanged", signal_peer_changed },
3998 { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationSuccess", signal_group_success },
3999 { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationFailure", signal_group_failure },
4000 { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GroupStarted", signal_group_started },
4001 { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GroupFinished", signal_group_finished },
4002 { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationRequest", signal_group_request },
4004 { SUPPLICANT_INTERFACE ".Group", "PeerJoined", signal_group_peer_joined },
4005 { SUPPLICANT_INTERFACE ".Group", "PeerDisconnected", signal_group_peer_disconnected },
4010 static DBusHandlerResult g_supplicant_filter(DBusConnection *conn,
4011 DBusMessage *message, void *data)
4013 DBusMessageIter iter;
4017 path = dbus_message_get_path(message);
4019 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
4021 if (!dbus_message_iter_init(message, &iter))
4022 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
4024 for (i = 0; signal_map[i].interface; i++) {
4025 if (!dbus_message_has_interface(message, signal_map[i].interface))
4028 if (!dbus_message_has_member(message, signal_map[i].member))
4031 signal_map[i].function(path, &iter);
4035 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
4038 void g_supplicant_interface_cancel(GSupplicantInterface *interface)
4040 SUPPLICANT_DBG("Cancelling any pending DBus calls");
4041 supplicant_dbus_method_call_cancel_all(interface);
4042 supplicant_dbus_property_call_cancel_all(interface);
4045 struct supplicant_regdom {
4046 GSupplicantCountryCallback callback;
4048 const void *user_data;
4051 static void country_result(const char *error,
4052 DBusMessageIter *iter, void *user_data)
4054 struct supplicant_regdom *regdom = user_data;
4057 SUPPLICANT_DBG("Country setting result");
4063 SUPPLICANT_DBG("Country setting failure %s", error);
4067 if (regdom->callback)
4068 regdom->callback(result, regdom->alpha2,
4069 (void *) regdom->user_data);
4074 static void country_params(DBusMessageIter *iter, void *user_data)
4076 struct supplicant_regdom *regdom = user_data;
4078 dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING,
4082 int g_supplicant_set_country(const char *alpha2,
4083 GSupplicantCountryCallback callback,
4084 const void *user_data)
4086 struct supplicant_regdom *regdom;
4089 SUPPLICANT_DBG("Country setting %s", alpha2);
4091 if (!system_available)
4094 regdom = dbus_malloc0(sizeof(*regdom));
4098 regdom->callback = callback;
4099 regdom->alpha2 = alpha2;
4100 regdom->user_data = user_data;
4102 ret = supplicant_dbus_property_set(SUPPLICANT_PATH, SUPPLICANT_INTERFACE,
4103 "Country", DBUS_TYPE_STRING_AS_STRING,
4104 country_params, country_result,
4108 SUPPLICANT_DBG("Unable to set Country configuration");
4113 int g_supplicant_interface_set_country(GSupplicantInterface *interface,
4114 GSupplicantCountryCallback callback,
4118 struct supplicant_regdom *regdom;
4121 regdom = dbus_malloc0(sizeof(*regdom));
4125 regdom->callback = callback;
4126 regdom->alpha2 = alpha2;
4127 regdom->user_data = user_data;
4129 ret = supplicant_dbus_property_set(interface->path,
4130 SUPPLICANT_INTERFACE ".Interface",
4131 "Country", DBUS_TYPE_STRING_AS_STRING,
4132 country_params, country_result,
4136 SUPPLICANT_DBG("Unable to set Country configuration");
4142 bool g_supplicant_interface_has_p2p(GSupplicantInterface *interface)
4147 return interface->p2p_support;
4150 struct supplicant_p2p_dev_config {
4155 static void p2p_device_config_result(const char *error,
4156 DBusMessageIter *iter, void *user_data)
4158 struct supplicant_p2p_dev_config *config = user_data;
4161 SUPPLICANT_DBG("Unable to set P2P Device configuration: %s",
4164 g_free(config->device_name);
4165 g_free(config->dev_type);
4169 static int dev_type_str2bin(const char *type, unsigned char dev_type[8])
4171 int length, pos, end;
4176 for (length = pos = 0; type[pos] != '\0' && length < 8; length++) {
4183 dev_type[length] = strtol(b, &e, 16);
4184 if (e && *e != '\0')
4193 static void p2p_device_config_params(DBusMessageIter *iter, void *user_data)
4195 struct supplicant_p2p_dev_config *config = user_data;
4196 DBusMessageIter dict;
4198 supplicant_dbus_dict_open(iter, &dict);
4200 supplicant_dbus_dict_append_basic(&dict, "DeviceName",
4201 DBUS_TYPE_STRING, &config->device_name);
4203 if (config->dev_type) {
4204 unsigned char dev_type[8] = {}, *type;
4207 len = dev_type_str2bin(config->dev_type, dev_type);
4210 supplicant_dbus_dict_append_fixed_array(&dict,
4211 "PrimaryDeviceType",
4212 DBUS_TYPE_BYTE, &type, len);
4216 supplicant_dbus_dict_close(iter, &dict);
4219 int g_supplicant_interface_set_p2p_device_config(GSupplicantInterface *interface,
4220 const char *device_name,
4221 const char *primary_dev_type)
4223 struct supplicant_p2p_dev_config *config;
4226 SUPPLICANT_DBG("P2P Device settings %s/%s",
4227 device_name, primary_dev_type);
4229 config = dbus_malloc0(sizeof(*config));
4233 config->device_name = g_strdup(device_name);
4234 config->dev_type = g_strdup(primary_dev_type);
4236 ret = supplicant_dbus_property_set(interface->path,
4237 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
4239 DBUS_TYPE_ARRAY_AS_STRING
4240 DBUS_DICT_ENTRY_BEGIN_CHAR_AS_STRING
4241 DBUS_TYPE_STRING_AS_STRING
4242 DBUS_TYPE_VARIANT_AS_STRING
4243 DBUS_DICT_ENTRY_END_CHAR_AS_STRING,
4244 p2p_device_config_params,
4245 p2p_device_config_result, config, NULL);
4247 g_free(config->device_name);
4248 g_free(config->dev_type);
4250 SUPPLICANT_DBG("Unable to set P2P Device configuration");
4256 static gboolean peer_lookup_by_identifier(gpointer key, gpointer value,
4259 const GSupplicantPeer *peer = value;
4260 const char *identifier = user_data;
4262 if (!g_strcmp0(identifier, peer->identifier))
4268 GSupplicantPeer *g_supplicant_interface_peer_lookup(GSupplicantInterface *interface,
4269 const char *identifier)
4271 GSupplicantPeer *peer;
4273 peer = g_hash_table_find(interface->peer_table,
4274 peer_lookup_by_identifier,
4275 (void *) identifier);
4279 static void interface_create_data_free(struct interface_create_data *data)
4281 g_free(data->ifname);
4282 g_free(data->driver);
4283 g_free(data->bridge);
4287 static bool interface_exists(GSupplicantInterface *interface,
4290 GSupplicantInterface *tmp;
4292 tmp = g_hash_table_lookup(interface_table, path);
4293 if (tmp && tmp == interface)
4299 static void interface_create_property(const char *key, DBusMessageIter *iter,
4302 struct interface_create_data *data = user_data;
4303 GSupplicantInterface *interface = data->interface;
4306 if (data->callback) {
4307 data->callback(0, data->interface, data->user_data);
4308 #if !defined TIZEN_EXT
4309 callback_p2p_support(interface);
4313 interface_create_data_free(data);
4316 interface_property(key, iter, interface);
4319 static void interface_create_result(const char *error,
4320 DBusMessageIter *iter, void *user_data)
4322 struct interface_create_data *data = user_data;
4323 const char *path = NULL;
4329 g_warning("error %s", error);
4334 dbus_message_iter_get_basic(iter, &path);
4340 if (!system_available) {
4345 data->interface = g_hash_table_lookup(interface_table, path);
4346 if (!data->interface) {
4347 data->interface = interface_alloc(path);
4348 if (!data->interface) {
4354 err = supplicant_dbus_property_get_all(path,
4355 SUPPLICANT_INTERFACE ".Interface",
4356 interface_create_property, data,
4363 data->callback(err, NULL, data->user_data);
4365 interface_create_data_free(data);
4368 static void interface_create_params(DBusMessageIter *iter, void *user_data)
4370 struct interface_create_data *data = user_data;
4371 DBusMessageIter dict;
4372 char *config_file = NULL;
4376 supplicant_dbus_dict_open(iter, &dict);
4378 supplicant_dbus_dict_append_basic(&dict, "Ifname",
4379 DBUS_TYPE_STRING, &data->ifname);
4382 supplicant_dbus_dict_append_basic(&dict, "Driver",
4383 DBUS_TYPE_STRING, &data->driver);
4386 supplicant_dbus_dict_append_basic(&dict, "BridgeIfname",
4387 DBUS_TYPE_STRING, &data->bridge);
4389 config_file = g_hash_table_lookup(config_file_table, data->ifname);
4391 SUPPLICANT_DBG("[%s] ConfigFile %s", data->ifname, config_file);
4393 supplicant_dbus_dict_append_basic(&dict, "ConfigFile",
4394 DBUS_TYPE_STRING, &config_file);
4397 supplicant_dbus_dict_close(iter, &dict);
4400 static void interface_get_result(const char *error,
4401 DBusMessageIter *iter, void *user_data)
4403 struct interface_create_data *data = user_data;
4404 GSupplicantInterface *interface;
4405 const char *path = NULL;
4411 SUPPLICANT_DBG("Interface not created yet");
4415 dbus_message_iter_get_basic(iter, &path);
4421 interface = g_hash_table_lookup(interface_table, path);
4427 if (data->callback) {
4428 data->callback(0, interface, data->user_data);
4429 #if !defined TIZEN_EXT
4430 callback_p2p_support(interface);
4434 interface_create_data_free(data);
4439 if (!system_available) {
4444 SUPPLICANT_DBG("Creating interface");
4446 err = supplicant_dbus_method_call(SUPPLICANT_PATH,
4447 SUPPLICANT_INTERFACE,
4449 interface_create_params,
4450 interface_create_result, data,
4457 data->callback(err, NULL, data->user_data);
4459 interface_create_data_free(data);
4462 static void interface_get_params(DBusMessageIter *iter, void *user_data)
4464 struct interface_create_data *data = user_data;
4468 dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, &data->ifname);
4471 int g_supplicant_interface_create(const char *ifname, const char *driver,
4473 GSupplicantInterfaceCallback callback,
4476 struct interface_create_data *data;
4479 SUPPLICANT_DBG("ifname %s", ifname);
4484 if (!system_available)
4487 data = dbus_malloc0(sizeof(*data));
4491 data->ifname = g_strdup(ifname);
4492 data->driver = g_strdup(driver);
4493 data->bridge = g_strdup(bridge);
4494 data->callback = callback;
4495 data->user_data = user_data;
4497 ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
4498 SUPPLICANT_INTERFACE,
4500 interface_get_params,
4501 interface_get_result, data,
4504 interface_create_data_free(data);
4509 static void interface_remove_result(const char *error,
4510 DBusMessageIter *iter, void *user_data)
4512 struct interface_data *data = user_data;
4517 SUPPLICANT_DBG("error: %s", error);
4521 if (!system_available) {
4527 * The gsupplicant interface is already freed by the InterfaceRemoved
4528 * signal callback. Simply invoke the interface_data callback.
4536 data->callback(err, NULL, data->user_data);
4542 static void interface_remove_params(DBusMessageIter *iter, void *user_data)
4544 struct interface_data *data = user_data;
4546 dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
4547 &data->interface->path);
4551 int g_supplicant_interface_remove(GSupplicantInterface *interface,
4552 GSupplicantInterfaceCallback callback,
4555 struct interface_data *data;
4561 if (!system_available)
4564 g_supplicant_interface_cancel(interface);
4566 data = dbus_malloc0(sizeof(*data));
4570 data->interface = interface;
4571 data->path = g_strdup(interface->path);
4572 data->callback = callback;
4573 data->user_data = user_data;
4575 ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
4576 SUPPLICANT_INTERFACE,
4578 interface_remove_params,
4579 interface_remove_result, data,
4588 static void interface_scan_result(const char *error,
4589 DBusMessageIter *iter, void *user_data)
4591 struct interface_scan_data *data = user_data;
4595 SUPPLICANT_DBG("error %s", error);
4599 /* A non ready interface cannot send/receive anything */
4600 if (interface_exists(data->interface, data->path)) {
4601 if (!data->interface->ready)
4609 data->callback(err, data->interface, data->user_data);
4611 data->interface->scan_callback = data->callback;
4612 data->interface->scan_data = data->user_data;
4615 if (data->scan_params)
4616 g_supplicant_free_scan_params(data->scan_params);
4621 static void add_scan_frequency(DBusMessageIter *iter, unsigned int freq)
4623 DBusMessageIter data;
4624 unsigned int width = 0; /* Not used by wpa_supplicant atm */
4626 dbus_message_iter_open_container(iter, DBUS_TYPE_STRUCT, NULL, &data);
4628 dbus_message_iter_append_basic(&data, DBUS_TYPE_UINT32, &freq);
4629 dbus_message_iter_append_basic(&data, DBUS_TYPE_UINT32, &width);
4631 dbus_message_iter_close_container(iter, &data);
4634 static void add_scan_frequencies(DBusMessageIter *iter,
4637 GSupplicantScanParams *scan_data = user_data;
4641 for (i = 0; i < scan_data->num_freqs; i++) {
4642 freq = scan_data->freqs[i];
4646 add_scan_frequency(iter, freq);
4650 static void append_ssid(DBusMessageIter *iter,
4651 const void *ssid, unsigned int len)
4653 DBusMessageIter array;
4655 dbus_message_iter_open_container(iter, DBUS_TYPE_ARRAY,
4656 DBUS_TYPE_BYTE_AS_STRING, &array);
4658 dbus_message_iter_append_fixed_array(&array, DBUS_TYPE_BYTE,
4660 dbus_message_iter_close_container(iter, &array);
4663 static void append_ssids(DBusMessageIter *iter, void *user_data)
4665 GSupplicantScanParams *scan_data = user_data;
4668 for (list = scan_data->ssids; list; list = list->next) {
4669 struct scan_ssid *scan_ssid = list->data;
4671 append_ssid(iter, scan_ssid->ssid, scan_ssid->ssid_len);
4675 static void supplicant_add_scan_frequency(DBusMessageIter *dict,
4676 supplicant_dbus_array_function function,
4679 GSupplicantScanParams *scan_params = user_data;
4680 DBusMessageIter entry, value, array;
4681 const char *key = "Channels";
4683 if (scan_params->freqs && scan_params->freqs[0] != 0) {
4684 dbus_message_iter_open_container(dict, DBUS_TYPE_DICT_ENTRY,
4687 dbus_message_iter_append_basic(&entry, DBUS_TYPE_STRING, &key);
4689 dbus_message_iter_open_container(&entry, DBUS_TYPE_VARIANT,
4690 DBUS_TYPE_ARRAY_AS_STRING
4691 DBUS_STRUCT_BEGIN_CHAR_AS_STRING
4692 DBUS_TYPE_UINT32_AS_STRING
4693 DBUS_TYPE_UINT32_AS_STRING
4694 DBUS_STRUCT_END_CHAR_AS_STRING,
4697 dbus_message_iter_open_container(&value, DBUS_TYPE_ARRAY,
4698 DBUS_STRUCT_BEGIN_CHAR_AS_STRING
4699 DBUS_TYPE_UINT32_AS_STRING
4700 DBUS_TYPE_UINT32_AS_STRING
4701 DBUS_STRUCT_END_CHAR_AS_STRING,
4705 function(&array, user_data);
4707 dbus_message_iter_close_container(&value, &array);
4708 dbus_message_iter_close_container(&entry, &value);
4709 dbus_message_iter_close_container(dict, &entry);
4713 static void interface_scan_params(DBusMessageIter *iter, void *user_data)
4715 DBusMessageIter dict;
4716 const char *type = "passive";
4717 struct interface_scan_data *data = user_data;
4719 supplicant_dbus_dict_open(iter, &dict);
4721 if (data && data->scan_params) {
4724 supplicant_dbus_dict_append_basic(&dict, "Type",
4725 DBUS_TYPE_STRING, &type);
4727 #if defined TIZEN_EXT
4728 SUPPLICANT_DBG("[specific_scan] num_ssids %d", data->scan_params->num_ssids);
4729 if (data->scan_params->num_ssids != 0)
4731 supplicant_dbus_dict_append_array(&dict, "SSIDs",
4736 supplicant_add_scan_frequency(&dict, add_scan_frequencies,
4739 supplicant_dbus_dict_append_basic(&dict, "Type",
4740 DBUS_TYPE_STRING, &type);
4742 supplicant_dbus_dict_close(iter, &dict);
4745 static int interface_ready_to_scan(GSupplicantInterface *interface)
4750 if (!system_available)
4753 if (interface->scanning)
4756 switch (interface->state) {
4757 case G_SUPPLICANT_STATE_AUTHENTICATING:
4758 case G_SUPPLICANT_STATE_ASSOCIATING:
4759 case G_SUPPLICANT_STATE_ASSOCIATED:
4760 case G_SUPPLICANT_STATE_4WAY_HANDSHAKE:
4761 case G_SUPPLICANT_STATE_GROUP_HANDSHAKE:
4763 #if defined TIZEN_EXT
4764 case G_SUPPLICANT_STATE_DISABLED:
4766 case G_SUPPLICANT_STATE_UNKNOWN:
4768 case G_SUPPLICANT_STATE_UNKNOWN:
4769 case G_SUPPLICANT_STATE_DISABLED:
4771 case G_SUPPLICANT_STATE_DISCONNECTED:
4772 case G_SUPPLICANT_STATE_INACTIVE:
4773 case G_SUPPLICANT_STATE_SCANNING:
4774 case G_SUPPLICANT_STATE_COMPLETED:
4781 int g_supplicant_interface_scan(GSupplicantInterface *interface,
4782 GSupplicantScanParams *scan_data,
4783 GSupplicantInterfaceCallback callback,
4786 struct interface_scan_data *data;
4789 ret = interface_ready_to_scan(interface);
4793 data = dbus_malloc0(sizeof(*data));
4797 data->interface = interface;
4798 data->path = g_strdup(interface->path);
4799 #if defined TIZEN_EXT
4800 data->interface->scan_callback = data->callback = callback;
4801 data->interface->scan_data = data->user_data = user_data;
4803 data->callback = callback;
4804 data->user_data = user_data;
4806 data->scan_params = scan_data;
4808 interface->scan_callback = callback;
4809 interface->scan_data = user_data;
4811 ret = supplicant_dbus_method_call(interface->path,
4812 SUPPLICANT_INTERFACE ".Interface", "Scan",
4813 interface_scan_params, interface_scan_result, data,
4824 static int parse_supplicant_error(DBusMessageIter *iter)
4826 int err = -ECONNABORTED;
4832 /* If the given passphrase is malformed wpa_s returns
4833 * "invalid message format" but this error should be interpreted as
4836 while (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_STRING) {
4837 dbus_message_iter_get_basic(iter, &key);
4838 if (strncmp(key, "psk", 3) == 0 ||
4839 strncmp(key, "wep_key", 7) == 0 ||
4840 strcmp(key, "invalid message format") == 0) {
4844 dbus_message_iter_next(iter);
4850 static void interface_select_network_result(const char *error,
4851 DBusMessageIter *iter, void *user_data)
4853 struct interface_connect_data *data = user_data;
4860 #if defined TIZEN_EXT
4861 SUPPLICANT_DBG("SelectNetwork errorFreq %s", error);
4863 SUPPLICANT_DBG("SelectNetwork error %s", error);
4865 err = parse_supplicant_error(iter);
4871 data->callback(err, data->interface, data->user_data);
4877 static void interface_select_network_params(DBusMessageIter *iter,
4880 struct interface_connect_data *data = user_data;
4881 GSupplicantInterface *interface = data->interface;
4882 #if defined TIZEN_EXT
4883 GSupplicantSSID *ssid = data->ssid;
4886 dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
4887 &interface->network_path);
4888 #if defined TIZEN_EXT
4889 if (!ssid->bssid_for_connect_len)
4890 dbus_message_iter_append_basic(iter, DBUS_TYPE_INT32, &ssid->freq);
4894 static void interface_add_network_result(const char *error,
4895 DBusMessageIter *iter, void *user_data)
4897 struct interface_connect_data *data = user_data;
4898 GSupplicantInterface *interface = data->interface;
4905 dbus_message_iter_get_basic(iter, &path);
4909 SUPPLICANT_DBG("PATH: %s", path);
4911 interface->network_path = g_strdup(path);
4913 store_network_information(interface, data->ssid);
4915 #if defined TIZEN_EXT
4916 SUPPLICANT_DBG(".Interface.SelectNetworkFreq");
4917 GSupplicantSSID *ssid = data->ssid;
4919 if (!ssid->bssid_for_connect_len)
4920 supplicant_dbus_method_call(data->interface->path,
4921 SUPPLICANT_INTERFACE ".Interface", "SelectNetworkFreq",
4922 interface_select_network_params,
4923 interface_select_network_result, data,
4926 supplicant_dbus_method_call(data->interface->path,
4927 SUPPLICANT_INTERFACE ".Interface", "SelectNetwork",
4928 interface_select_network_params,
4929 interface_select_network_result, data,
4932 supplicant_dbus_method_call(data->interface->path,
4933 SUPPLICANT_INTERFACE ".Interface", "SelectNetwork",
4934 interface_select_network_params,
4935 interface_select_network_result, data,
4942 SUPPLICANT_DBG("AddNetwork error %s", error);
4944 if (interface_exists(data->interface, data->interface->path)) {
4945 err = parse_supplicant_error(iter);
4947 data->callback(err, data->interface, data->user_data);
4949 g_free(interface->network_path);
4950 interface->network_path = NULL;
4958 static void add_network_security_none(DBusMessageIter *dict)
4960 const char *auth_alg = "OPEN";
4962 supplicant_dbus_dict_append_basic(dict, "auth_alg",
4963 DBUS_TYPE_STRING, &auth_alg);
4966 static void add_network_security_wep(DBusMessageIter *dict,
4967 GSupplicantSSID *ssid)
4969 const char *auth_alg = "OPEN SHARED";
4970 dbus_uint32_t key_index = 0;
4972 supplicant_dbus_dict_append_basic(dict, "auth_alg",
4973 DBUS_TYPE_STRING, &auth_alg);
4975 if (ssid->passphrase) {
4976 int size = strlen(ssid->passphrase);
4977 if (size == 10 || size == 26) {
4978 unsigned char *key = g_try_malloc(13);
4982 memset(tmp, 0, sizeof(tmp));
4986 for (i = 0; i < size / 2; i++) {
4987 memcpy(tmp, ssid->passphrase + (i * 2), 2);
4988 key[i] = (unsigned char) strtol(tmp, NULL, 16);
4991 supplicant_dbus_dict_append_fixed_array(dict,
4996 } else if (size == 5 || size == 13) {
4997 unsigned char *key = g_try_malloc(13);
5003 for (i = 0; i < size; i++)
5004 key[i] = (unsigned char) ssid->passphrase[i];
5006 supplicant_dbus_dict_append_fixed_array(dict,
5012 supplicant_dbus_dict_append_basic(dict,
5017 supplicant_dbus_dict_append_basic(dict, "wep_tx_keyidx",
5018 DBUS_TYPE_UINT32, &key_index);
5022 static dbus_bool_t is_psk_raw_key(const char *psk)
5026 /* A raw key is always 64 bytes length... */
5027 if (strlen(psk) != 64)
5030 /* ... and its content is in hex representation */
5031 for (i = 0; i < 64; i++)
5032 if (!isxdigit((unsigned char) psk[i]))
5038 static unsigned char hexchar2bin(char c)
5040 if ((c >= '0') && (c <= '9'))
5042 else if ((c >= 'A') && (c <= 'F'))
5043 return c - 'A' + 10;
5044 else if ((c >= 'a') && (c <= 'f'))
5045 return c - 'a' + 10;
5050 static void hexstring2bin(const char *string, unsigned char *data,
5055 for (i = 0; i < data_len; i++)
5056 data[i] = (hexchar2bin(string[i * 2 + 0]) << 4 |
5057 hexchar2bin(string[i * 2 + 1]) << 0);
5060 static void add_network_security_psk(DBusMessageIter *dict,
5061 GSupplicantSSID *ssid)
5063 if (ssid->passphrase && strlen(ssid->passphrase) > 0) {
5064 const char *key = "psk";
5066 if (is_psk_raw_key(ssid->passphrase)) {
5067 unsigned char data[32];
5068 unsigned char *datap = data;
5070 /* The above pointer alias is required by D-Bus because
5071 * with D-Bus and GCC, non-heap-allocated arrays cannot
5072 * be passed directly by their base pointer. */
5074 hexstring2bin(ssid->passphrase, datap, sizeof(data));
5076 supplicant_dbus_dict_append_fixed_array(dict,
5077 key, DBUS_TYPE_BYTE,
5078 &datap, sizeof(data));
5080 supplicant_dbus_dict_append_basic(dict,
5081 key, DBUS_TYPE_STRING,
5086 static void add_network_security_tls(DBusMessageIter *dict,
5087 GSupplicantSSID *ssid)
5090 * For TLS, we at least need:
5091 * The client certificate
5092 * The client private key file
5093 * The client private key file password
5095 * The Authority certificate is optional.
5097 if (!ssid->client_cert_path)
5100 if (!ssid->private_key_path)
5103 #if !defined TIZEN_EXT
5104 if (!ssid->private_key_passphrase)
5108 if (ssid->ca_cert_path)
5109 supplicant_dbus_dict_append_basic(dict, "ca_cert",
5110 DBUS_TYPE_STRING, &ssid->ca_cert_path);
5112 supplicant_dbus_dict_append_basic(dict, "private_key",
5114 &ssid->private_key_path);
5115 #if !defined TIZEN_EXT
5116 supplicant_dbus_dict_append_basic(dict, "private_key_passwd",
5118 &ssid->private_key_passphrase);
5120 supplicant_dbus_dict_append_basic(dict, "client_cert",
5122 &ssid->client_cert_path);
5125 static void add_network_security_peap(DBusMessageIter *dict,
5126 GSupplicantSSID *ssid)
5131 * For PEAP/TTLS, we at least need
5132 * The authority certificate
5133 * The 2nd phase authentication method
5134 * The 2nd phase passphrase
5136 * The Client certificate is optional although strongly recommended
5137 * When setting it, we need in addition
5138 * The Client private key file
5139 * The Client private key file password
5141 if (!ssid->passphrase)
5144 if (!ssid->phase2_auth)
5147 if (ssid->client_cert_path) {
5148 if (!ssid->private_key_path)
5151 #if !defined TIZEN_EXT
5152 if (!ssid->private_key_passphrase)
5156 supplicant_dbus_dict_append_basic(dict, "client_cert",
5158 &ssid->client_cert_path);
5160 supplicant_dbus_dict_append_basic(dict, "private_key",
5162 &ssid->private_key_path);
5164 #if !defined TIZEN_EXT
5165 supplicant_dbus_dict_append_basic(dict, "private_key_passwd",
5167 &ssid->private_key_passphrase);
5172 if (g_str_has_prefix(ssid->phase2_auth, "EAP-")) {
5173 phase2_auth = g_strdup_printf("autheap=%s",
5174 ssid->phase2_auth + strlen("EAP-"));
5176 phase2_auth = g_strdup_printf("auth=%s", ssid->phase2_auth);
5178 supplicant_dbus_dict_append_basic(dict, "password",
5182 if (ssid->ca_cert_path)
5183 supplicant_dbus_dict_append_basic(dict, "ca_cert",
5185 &ssid->ca_cert_path);
5187 supplicant_dbus_dict_append_basic(dict, "phase2",
5191 g_free(phase2_auth);
5194 #if defined TIZEN_EXT
5195 static void add_network_security_aka_sim(DBusMessageIter *dict,
5196 GSupplicantSSID *ssid)
5198 if (!ssid->passphrase)
5201 supplicant_dbus_dict_append_basic(dict, "password",
5206 static void add_network_security_fast(DBusMessageIter *dict,
5207 GSupplicantSSID *ssid)
5210 * For FAST, we at least need:
5212 * phase1 (provisiong information)
5216 /* Allow provisioing both authenticated and unauthenticated */
5217 const char *phase1 = "fast_provisioning=2";
5218 supplicant_dbus_dict_append_basic(dict, "phase1",
5222 SUPPLICANT_DBG("pac_file [%s]", ssid->pac_file);
5224 supplicant_dbus_dict_append_basic(dict, "pac_file",
5228 supplicant_dbus_dict_append_basic(dict, "password",
5234 static void add_network_security_eap(DBusMessageIter *dict,
5235 GSupplicantSSID *ssid)
5239 #if defined TIZEN_EXT
5242 if (!ssid->eap || !ssid->identity)
5246 if (g_strcmp0(ssid->eap, "tls") == 0) {
5247 add_network_security_tls(dict, ssid);
5248 } else if (g_strcmp0(ssid->eap, "peap") == 0 ||
5249 g_strcmp0(ssid->eap, "ttls") == 0) {
5250 #if defined TIZEN_EXT
5251 if (!ssid->identity)
5254 add_network_security_peap(dict, ssid);
5256 #if defined TIZEN_EXT
5257 } else if (g_strcmp0(ssid->eap, "sim") == 0 ||
5258 g_strcmp0(ssid->eap, "aka") == 0 ||
5259 g_strcmp0(ssid->eap, "aka'") == 0) {
5260 add_network_security_aka_sim(dict, ssid);
5261 } else if (g_strcmp0(ssid->eap, "pwd") == 0) {
5262 if(!ssid->passphrase)
5264 supplicant_dbus_dict_append_basic(dict, "password",
5267 } else if (g_strcmp0(ssid->eap, "fast") == 0){
5268 if (!ssid->identity || !ssid->passphrase)
5271 add_network_security_fast(dict, ssid);
5276 eap_value = g_ascii_strup(ssid->eap, -1);
5278 supplicant_dbus_dict_append_basic(dict, "eap",
5281 #if defined TIZEN_EXT
5282 if (ssid->identity != NULL)
5283 supplicant_dbus_dict_append_basic(dict, "identity",
5287 supplicant_dbus_dict_append_basic(dict, "identity",
5291 if(ssid->anonymous_identity)
5292 supplicant_dbus_dict_append_basic(dict, "anonymous_identity",
5294 &ssid->anonymous_identity);
5296 if(ssid->subject_match)
5297 supplicant_dbus_dict_append_basic(dict, "subject_match",
5299 &ssid->subject_match);
5301 if(ssid->altsubject_match)
5302 supplicant_dbus_dict_append_basic(dict, "altsubject_match",
5304 &ssid->altsubject_match);
5306 if(ssid->domain_suffix_match)
5307 supplicant_dbus_dict_append_basic(dict, "domain_suffix_match",
5309 &ssid->domain_suffix_match);
5311 if(ssid->domain_match)
5312 supplicant_dbus_dict_append_basic(dict, "domain_match",
5314 &ssid->domain_match);
5319 static void add_network_security_ciphers(DBusMessageIter *dict,
5320 GSupplicantSSID *ssid)
5322 unsigned int p_cipher, g_cipher, i;
5323 char *pairwise, *group;
5324 char *pair_ciphers[4];
5325 char *group_ciphers[5];
5327 p_cipher = ssid->pairwise_cipher;
5328 g_cipher = ssid->group_cipher;
5330 if (p_cipher == 0 && g_cipher == 0)
5335 if (p_cipher & G_SUPPLICANT_PAIRWISE_CCMP)
5336 pair_ciphers[i++] = "CCMP";
5338 if (p_cipher & G_SUPPLICANT_PAIRWISE_TKIP)
5339 pair_ciphers[i++] = "TKIP";
5341 if (p_cipher & G_SUPPLICANT_PAIRWISE_NONE)
5342 pair_ciphers[i++] = "NONE";
5344 pair_ciphers[i] = NULL;
5348 if (g_cipher & G_SUPPLICANT_GROUP_CCMP)
5349 group_ciphers[i++] = "CCMP";
5351 if (g_cipher & G_SUPPLICANT_GROUP_TKIP)
5352 group_ciphers[i++] = "TKIP";
5354 if (g_cipher & G_SUPPLICANT_GROUP_WEP104)
5355 group_ciphers[i++] = "WEP104";
5357 if (g_cipher & G_SUPPLICANT_GROUP_WEP40)
5358 group_ciphers[i++] = "WEP40";
5360 group_ciphers[i] = NULL;
5362 pairwise = g_strjoinv(" ", pair_ciphers);
5363 group = g_strjoinv(" ", group_ciphers);
5365 SUPPLICANT_DBG("cipher %s %s", pairwise, group);
5367 supplicant_dbus_dict_append_basic(dict, "pairwise",
5370 supplicant_dbus_dict_append_basic(dict, "group",
5378 static void add_network_security_proto(DBusMessageIter *dict,
5379 GSupplicantSSID *ssid)
5381 unsigned int protocol, i;
5385 protocol = ssid->protocol;
5392 if (protocol & G_SUPPLICANT_PROTO_RSN)
5393 protos[i++] = "RSN";
5395 if (protocol & G_SUPPLICANT_PROTO_WPA)
5396 protos[i++] = "WPA";
5400 proto = g_strjoinv(" ", protos);
5402 SUPPLICANT_DBG("proto %s", proto);
5404 supplicant_dbus_dict_append_basic(dict, "proto",
5411 static void add_network_security(DBusMessageIter *dict, GSupplicantSSID *ssid)
5415 switch (ssid->security) {
5416 case G_SUPPLICANT_SECURITY_NONE:
5418 add_network_security_none(dict);
5419 add_network_security_ciphers(dict, ssid);
5421 case G_SUPPLICANT_SECURITY_UNKNOWN:
5422 case G_SUPPLICANT_SECURITY_WEP:
5424 add_network_security_wep(dict, ssid);
5425 add_network_security_ciphers(dict, ssid);
5427 case G_SUPPLICANT_SECURITY_PSK:
5428 key_mgmt = "WPA-PSK";
5429 add_network_security_psk(dict, ssid);
5430 add_network_security_ciphers(dict, ssid);
5431 add_network_security_proto(dict, ssid);
5433 case G_SUPPLICANT_SECURITY_IEEE8021X:
5434 key_mgmt = "WPA-EAP";
5435 add_network_security_eap(dict, ssid);
5436 add_network_security_ciphers(dict, ssid);
5437 add_network_security_proto(dict, ssid);
5439 #if defined TIZEN_EXT
5440 case G_SUPPLICANT_SECURITY_FT_PSK:
5441 key_mgmt = "FT-PSK";
5442 add_network_security_psk(dict, ssid);
5443 add_network_security_ciphers(dict, ssid);
5444 add_network_security_proto(dict, ssid);
5446 case G_SUPPLICANT_SECURITY_FT_IEEE8021X:
5447 key_mgmt = "FT-EAP";
5448 add_network_security_eap(dict, ssid);
5449 add_network_security_ciphers(dict, ssid);
5450 add_network_security_proto(dict, ssid);
5455 supplicant_dbus_dict_append_basic(dict, "key_mgmt",
5456 DBUS_TYPE_STRING, &key_mgmt);
5459 static void add_network_mode(DBusMessageIter *dict, GSupplicantSSID *ssid)
5463 switch (ssid->mode) {
5464 case G_SUPPLICANT_MODE_UNKNOWN:
5465 case G_SUPPLICANT_MODE_INFRA:
5468 case G_SUPPLICANT_MODE_IBSS:
5471 case G_SUPPLICANT_MODE_MASTER:
5476 supplicant_dbus_dict_append_basic(dict, "mode",
5477 DBUS_TYPE_UINT32, &mode);
5480 static void interface_add_network_params(DBusMessageIter *iter, void *user_data)
5482 DBusMessageIter dict;
5483 struct interface_connect_data *data = user_data;
5484 GSupplicantSSID *ssid = data->ssid;
5486 supplicant_dbus_dict_open(iter, &dict);
5488 if (ssid->scan_ssid)
5489 supplicant_dbus_dict_append_basic(&dict, "scan_ssid",
5490 DBUS_TYPE_UINT32, &ssid->scan_ssid);
5493 supplicant_dbus_dict_append_basic(&dict, "frequency",
5494 DBUS_TYPE_UINT32, &ssid->freq);
5497 supplicant_dbus_dict_append_basic(&dict, "bgscan",
5498 DBUS_TYPE_STRING, &ssid->bgscan);
5500 add_network_mode(&dict, ssid);
5502 add_network_security(&dict, ssid);
5504 supplicant_dbus_dict_append_fixed_array(&dict, "ssid",
5505 DBUS_TYPE_BYTE, &ssid->ssid,
5508 supplicant_dbus_dict_append_basic(&dict, "ignore_broadcast_ssid",
5510 &ssid->ignore_broadcast_ssid);
5512 #if defined TIZEN_EXT
5515 bssid = g_try_malloc0(18);
5516 if (bssid == NULL) {
5517 SUPPLICANT_DBG("memory allocation error");
5518 supplicant_dbus_dict_close(iter, &dict);
5522 if (ssid->bssid_for_connect_len)
5523 snprintf(bssid, 18, "%02x:%02x:%02x:%02x:%02x:%02x",
5524 ssid->bssid_for_connect[0], ssid->bssid_for_connect[1], ssid->bssid_for_connect[2],
5525 ssid->bssid_for_connect[3], ssid->bssid_for_connect[4], ssid->bssid_for_connect[5]);
5527 snprintf(bssid, 18, "%02x:%02x:%02x:%02x:%02x:%02x",
5528 ssid->bssid[0], ssid->bssid[1], ssid->bssid[2],
5529 ssid->bssid[3], ssid->bssid[4], ssid->bssid[5]);
5531 supplicant_dbus_dict_append_basic(&dict, "bssid",
5532 DBUS_TYPE_STRING, &bssid);
5537 supplicant_dbus_dict_close(iter, &dict);
5540 static void interface_wps_start_result(const char *error,
5541 DBusMessageIter *iter, void *user_data)
5543 struct interface_connect_data *data = user_data;
5550 SUPPLICANT_DBG("error: %s", error);
5551 err = parse_supplicant_error(iter);
5555 data->callback(err, data->interface, data->user_data);
5562 static void interface_add_wps_params(DBusMessageIter *iter, void *user_data)
5564 struct interface_connect_data *data = user_data;
5565 GSupplicantSSID *ssid = data->ssid;
5566 const char *role = "enrollee", *type;
5567 DBusMessageIter dict;
5571 supplicant_dbus_dict_open(iter, &dict);
5573 supplicant_dbus_dict_append_basic(&dict, "Role",
5574 DBUS_TYPE_STRING, &role);
5577 if (ssid->pin_wps) {
5579 supplicant_dbus_dict_append_basic(&dict, "Pin",
5580 DBUS_TYPE_STRING, &ssid->pin_wps);
5583 supplicant_dbus_dict_append_basic(&dict, "Type",
5584 DBUS_TYPE_STRING, &type);
5586 #if defined TIZEN_EXT
5588 supplicant_dbus_dict_append_fixed_array(&dict, "Bssid",
5589 DBUS_TYPE_BYTE, &ssid->bssid, 6);
5592 supplicant_dbus_dict_close(iter, &dict);
5595 static void wps_start(const char *error, DBusMessageIter *iter, void *user_data)
5597 struct interface_connect_data *data = user_data;
5602 SUPPLICANT_DBG("error: %s", error);
5608 #if defined TIZEN_EXT
5609 GSupplicantSSID *ssid = data->ssid;
5610 if (ssid->pin_wps != NULL) {
5611 if (!g_utf8_validate(ssid->pin_wps, 8, NULL)) {
5612 SUPPLICANT_DBG("Invalid characters in WPS_PIN");
5619 supplicant_dbus_method_call(data->interface->path,
5620 SUPPLICANT_INTERFACE ".Interface.WPS", "Start",
5621 interface_add_wps_params,
5622 interface_wps_start_result, data, NULL);
5625 static void wps_process_credentials(DBusMessageIter *iter, void *user_data)
5627 dbus_bool_t credentials = TRUE;
5631 dbus_message_iter_append_basic(iter, DBUS_TYPE_BOOLEAN, &credentials);
5635 #if defined TIZEN_EXT
5636 #define NETCONFIG_SERVICE "net.netconfig"
5637 #define NETCONFIG_WIFI_PATH "/net/netconfig/wifi"
5638 #define NETCONFIG_WIFI_INTERFACE NETCONFIG_SERVICE ".wifi"
5640 struct dec_method_call_data {
5641 struct interface_connect_data *data;
5642 DBusPendingCall *pending_call;
5645 static struct dec_method_call_data decrypt_request_data;
5647 static void crypt_method_call_cancel(void)
5649 if (decrypt_request_data.pending_call) {
5650 dbus_pending_call_cancel(decrypt_request_data.pending_call);
5651 dbus_pending_call_unref(decrypt_request_data.pending_call);
5652 decrypt_request_data.pending_call = NULL;
5655 g_free(decrypt_request_data.data->path);
5656 g_free(decrypt_request_data.data->ssid);
5657 dbus_free(decrypt_request_data.data);
5658 decrypt_request_data.data = NULL;
5661 static void decryption_request_reply(DBusPendingCall *call,
5666 DBusMessageIter args;
5669 static gchar* origin_value = NULL;
5670 struct interface_connect_data *data = user_data;
5672 g_free(origin_value);
5673 origin_value = NULL;
5677 reply = dbus_pending_call_steal_reply(call);
5679 dbus_error_init(&error);
5680 if (dbus_set_error_from_message(&error, reply)) {
5681 SUPPLICANT_DBG("decryption_request_reply() %s %s", error.name, error.message);
5682 dbus_error_free(&error);
5687 if (dbus_message_iter_init(reply, &args) == FALSE) {
5688 SUPPLICANT_DBG("dbus_message_iter_init() failed");
5693 dbus_message_iter_get_basic(&args, &out_data);
5695 origin_value = g_strdup((const gchar *)out_data);
5696 data->ssid->passphrase = origin_value;
5698 ret = supplicant_dbus_method_call(data->interface->path,
5699 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
5700 interface_add_network_params,
5701 interface_add_network_result, data,
5706 SUPPLICANT_DBG("AddNetwork failed %d", ret);
5707 callback_assoc_failed(decrypt_request_data.data->user_data);
5713 dbus_message_unref(reply);
5714 dbus_pending_call_unref(call);
5716 decrypt_request_data.pending_call = NULL;
5717 decrypt_request_data.data = NULL;
5720 static int send_decryption_request(const char *passphrase,
5721 struct interface_connect_data *data)
5723 DBusMessage *msg = NULL;
5724 DBusPendingCall *call;
5726 SUPPLICANT_DBG("Decryption request");
5729 SUPPLICANT_DBG("Invalid parameter");
5736 msg = dbus_message_new_method_call(NETCONFIG_SERVICE, NETCONFIG_WIFI_PATH,
5737 NETCONFIG_WIFI_INTERFACE, "DecryptPassphrase");
5741 dbus_message_append_args(msg, DBUS_TYPE_STRING, &passphrase,
5744 if (!dbus_connection_send_with_reply(connection, msg,
5745 &call, DBUS_TIMEOUT_USE_DEFAULT)) {
5746 dbus_message_unref(msg);
5751 dbus_message_unref(msg);
5755 decrypt_request_data.pending_call = call;
5756 decrypt_request_data.data = data;
5758 dbus_pending_call_set_notify(call, decryption_request_reply, data, NULL);
5759 dbus_message_unref(msg);
5761 SUPPLICANT_DBG("Decryption request succeeded");
5767 int g_supplicant_interface_connect(GSupplicantInterface *interface,
5768 GSupplicantSSID *ssid,
5769 GSupplicantInterfaceCallback callback,
5772 struct interface_connect_data *data;
5773 struct interface_data *intf_data;
5781 if (!system_available)
5784 /* TODO: Check if we're already connected and switch */
5786 data = dbus_malloc0(sizeof(*data));
5790 data->interface = interface;
5791 data->path = g_strdup(interface->path);
5792 data->callback = callback;
5794 data->user_data = user_data;
5796 if (ssid->use_wps) {
5797 g_free(interface->wps_cred.key);
5798 memset(&interface->wps_cred, 0,
5799 sizeof(struct _GSupplicantWpsCredentials));
5801 ret = supplicant_dbus_property_set(interface->path,
5802 SUPPLICANT_INTERFACE ".Interface.WPS",
5803 "ProcessCredentials", DBUS_TYPE_BOOLEAN_AS_STRING,
5804 wps_process_credentials, wps_start, data, interface);
5806 /* By the time there is a request for connect and the network
5807 * path is not NULL it means that connman has not removed the
5808 * previous network pointer. This can happen in the case AP
5809 * deauthenticated client and connman does not remove the
5810 * previously connected network pointer. This causes supplicant
5811 * to reallocate the memory for struct wpa_ssid again even if it
5812 * is the same SSID. This causes memory usage of wpa_supplicnat
5813 * to go high. The idea here is that if the previously connected
5814 * network is not removed at the time of next connection attempt
5815 * check if the network path is not NULL. In case it is non-NULL
5816 * first remove the network and then once removal is successful, add
5820 if (interface->network_path != NULL) {
5825 * If this add network is for the same network for
5826 * which wpa_supplicant already has a profile then do
5827 * not need to add another profile. Only if the
5828 * profile that needs to get added is different from
5829 * what is there in wpa_s delete the current one. A
5830 * network is identified by its SSID, security_type
5831 * and passphrase (private passphrase in case security
5834 if (compare_network_parameters(interface, ssid)) {
5838 intf_data = dbus_malloc0(sizeof(*intf_data));
5842 intf_data->interface = interface;
5843 intf_data->path = g_strdup(interface->path);
5844 intf_data->callback = callback;
5845 intf_data->ssid = ssid;
5846 intf_data->user_data = user_data;
5847 intf_data->network_remove_in_progress = TRUE;
5848 network_remove(intf_data);
5850 #if defined TIZEN_EXT
5851 if (ssid->passphrase && g_strcmp0(ssid->passphrase, "") != 0 && !ssid->eap) {
5852 ret = send_decryption_request(ssid->passphrase, data);
5854 SUPPLICANT_DBG("Decryption request failed %d", ret);
5857 ret = supplicant_dbus_method_call(interface->path,
5858 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
5859 interface_add_network_params,
5860 interface_add_network_result, data,
5870 return -EINPROGRESS;
5873 static void network_remove_result(const char *error,
5874 DBusMessageIter *iter, void *user_data)
5876 struct interface_data *data = user_data;
5877 struct interface_connect_data *connect_data;
5884 SUPPLICANT_DBG("error: %s", error);
5886 if (g_strcmp0("org.freedesktop.DBus.Error.UnknownMethod",
5888 result = -ECONNABORTED;
5891 g_free(data->interface->network_path);
5892 data->interface->network_path = NULL;
5894 remove_network_information(data->interface);
5896 if (data->network_remove_in_progress == TRUE) {
5897 data->network_remove_in_progress = FALSE;
5898 connect_data = dbus_malloc0(sizeof(*connect_data));
5902 connect_data->interface = data->interface;
5903 connect_data->path = g_strdup(data->path);
5904 connect_data->callback = data->callback;
5905 connect_data->ssid = data->ssid;
5906 connect_data->user_data = data->user_data;
5908 supplicant_dbus_method_call(data->interface->path,
5909 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
5910 interface_add_network_params,
5911 interface_add_network_result, connect_data,
5912 connect_data->interface);
5915 data->callback(result, data->interface, data->user_data);
5921 static void network_remove_params(DBusMessageIter *iter, void *user_data)
5923 struct interface_data *data = user_data;
5924 const char *path = data->interface->network_path;
5926 SUPPLICANT_DBG("path %s", path);
5928 dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH, &path);
5931 static int network_remove(struct interface_data *data)
5933 GSupplicantInterface *interface = data->interface;
5937 #if defined TIZEN_EXT
5938 GSupplicantInterface *intf = NULL;
5940 * Check if 'interface' is valid
5942 intf = g_hash_table_lookup(interface_table, interface->path);
5947 return supplicant_dbus_method_call(interface->path,
5948 SUPPLICANT_INTERFACE ".Interface", "RemoveNetwork",
5949 network_remove_params, network_remove_result, data,
5953 static void interface_disconnect_result(const char *error,
5954 DBusMessageIter *iter, void *user_data)
5956 struct interface_data *data = user_data;
5963 SUPPLICANT_DBG("error: %s", error);
5965 if (g_strcmp0("org.freedesktop.DBus.Error.UnknownMethod",
5967 result = -ECONNABORTED;
5970 /* If we are disconnecting from previous WPS successful
5971 * association. i.e.: it did not went through AddNetwork,
5972 * and interface->network_path was never set. */
5973 if (!data->interface->network_path) {
5975 data->callback(result, data->interface,
5983 if (result < 0 && data->callback) {
5984 data->callback(result, data->interface, data->user_data);
5985 data->callback = NULL;
5988 if (result != -ECONNABORTED) {
5989 if (network_remove(data) < 0) {
5999 int g_supplicant_interface_disconnect(GSupplicantInterface *interface,
6000 GSupplicantInterfaceCallback callback,
6003 struct interface_data *data;
6011 if (!system_available)
6013 #if defined TIZEN_EXT
6014 if (decrypt_request_data.pending_call &&
6015 decrypt_request_data.data &&
6016 decrypt_request_data.data->user_data == user_data) {
6018 callback_assoc_failed(decrypt_request_data.data->user_data);
6019 crypt_method_call_cancel();
6024 data = dbus_malloc0(sizeof(*data));
6028 data->interface = interface;
6029 data->path = g_strdup(interface->path);
6030 data->callback = callback;
6031 data->user_data = user_data;
6033 ret = supplicant_dbus_method_call(interface->path,
6034 SUPPLICANT_INTERFACE ".Interface", "Disconnect",
6035 NULL, interface_disconnect_result, data,
6046 static void interface_p2p_find_result(const char *error,
6047 DBusMessageIter *iter, void *user_data)
6049 struct interface_scan_data *data = user_data;
6052 SUPPLICANT_DBG("error %s", error);
6057 if (interface_exists(data->interface, data->path)) {
6058 if (!data->interface->ready)
6061 data->interface->p2p_finding = true;
6065 data->callback(err, data->interface, data->user_data);
6071 static void interface_p2p_find_params(DBusMessageIter *iter, void *user_data)
6073 DBusMessageIter dict;
6075 supplicant_dbus_dict_open(iter, &dict);
6076 supplicant_dbus_dict_close(iter, &dict);
6079 int g_supplicant_interface_p2p_find(GSupplicantInterface *interface,
6080 GSupplicantInterfaceCallback callback,
6083 struct interface_scan_data *data;
6086 if (!interface->p2p_support)
6089 ret = interface_ready_to_scan(interface);
6090 if (ret && ret != -EALREADY)
6093 data = dbus_malloc0(sizeof(*data));
6097 data->interface = interface;
6098 data->path = g_strdup(interface->path);
6099 data->callback = callback;
6100 data->user_data = user_data;
6102 ret = supplicant_dbus_method_call(interface->path,
6103 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "Find",
6104 interface_p2p_find_params, interface_p2p_find_result,
6114 bool g_supplicant_interface_is_p2p_finding(GSupplicantInterface *interface)
6119 return interface->p2p_finding;
6122 int g_supplicant_interface_p2p_stop_find(GSupplicantInterface *interface)
6124 if (!interface->p2p_finding)
6129 interface->p2p_finding = false;
6131 return supplicant_dbus_method_call(interface->path,
6132 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "StopFind",
6133 NULL, NULL, NULL, NULL);
6136 static void interface_p2p_connect_result(const char *error,
6137 DBusMessageIter *iter, void *user_data)
6139 struct interface_connect_data *data = user_data;
6145 SUPPLICANT_DBG("error: %s", error);
6146 err = parse_supplicant_error(iter);
6150 data->callback(err, data->interface, data->user_data);
6153 g_free(data->peer->wps_pin);
6154 g_free(data->peer->path);
6159 static void interface_p2p_connect_params(DBusMessageIter *iter, void *user_data)
6161 struct interface_connect_data *data = user_data;
6162 const char *wps = "pbc";
6163 DBusMessageIter dict;
6168 supplicant_dbus_dict_open(iter, &dict);
6170 if (data->peer->master)
6173 if (data->peer->wps_pin)
6176 supplicant_dbus_dict_append_basic(&dict, "peer",
6177 DBUS_TYPE_OBJECT_PATH, &data->peer->path);
6178 supplicant_dbus_dict_append_basic(&dict, "wps_method",
6179 DBUS_TYPE_STRING, &wps);
6180 if (data->peer->wps_pin) {
6181 supplicant_dbus_dict_append_basic(&dict, "pin",
6182 DBUS_TYPE_STRING, &data->peer->wps_pin);
6185 supplicant_dbus_dict_append_basic(&dict, "go_intent",
6186 DBUS_TYPE_INT32, &go_intent);
6188 supplicant_dbus_dict_close(iter, &dict);
6191 int g_supplicant_interface_p2p_connect(GSupplicantInterface *interface,
6192 GSupplicantPeerParams *peer_params,
6193 GSupplicantInterfaceCallback callback,
6196 struct interface_connect_data *data;
6201 if (!interface->p2p_support)
6204 data = dbus_malloc0(sizeof(*data));
6208 data->interface = interface;
6209 data->path = g_strdup(interface->path);
6210 data->peer = peer_params;
6211 data->callback = callback;
6212 data->user_data = user_data;
6214 ret = supplicant_dbus_method_call(interface->path,
6215 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "Connect",
6216 interface_p2p_connect_params, interface_p2p_connect_result,
6224 return -EINPROGRESS;
6227 int g_supplicant_interface_p2p_disconnect(GSupplicantInterface *interface,
6228 GSupplicantPeerParams *peer_params)
6230 GSupplicantPeer *peer;
6236 if (!interface->p2p_support)
6239 peer = g_hash_table_lookup(interface->peer_table, peer_params->path);
6243 for (list = peer->groups; list; list = list->next, count++) {
6244 const char *group_obj_path = list->data;
6245 GSupplicantInterface *g_interface;
6246 GSupplicantGroup *group;
6248 group = g_hash_table_lookup(group_mapping, group_obj_path);
6249 if (!group || !group->interface)
6252 g_interface = group->interface;
6253 supplicant_dbus_method_call(g_interface->path,
6254 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
6255 "Disconnect", NULL, NULL, NULL, g_interface);
6258 if (count == 0 && peer->current_group_iface) {
6259 supplicant_dbus_method_call(peer->current_group_iface->path,
6260 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
6261 "Disconnect", NULL, NULL, NULL,
6262 peer->current_group_iface->path);
6265 peer->current_group_iface = NULL;
6267 return -EINPROGRESS;
6270 struct p2p_service_data {
6272 GSupplicantInterface *interface;
6273 GSupplicantP2PServiceParams *service;
6274 GSupplicantInterfaceCallback callback;
6278 static void interface_p2p_service_result(const char *error,
6279 DBusMessageIter *iter, void *user_data)
6281 struct p2p_service_data *data = user_data;
6284 SUPPLICANT_DBG("%s result - %s", data->registration ?
6285 "Registration" : "Deletion",
6286 error ? error : "Success");
6291 data->callback(result, data->interface, data->user_data);
6293 g_free(data->service->query);
6294 g_free(data->service->response);
6295 g_free(data->service->service);
6296 g_free(data->service->wfd_ies);
6297 g_free(data->service);
6301 static void interface_p2p_service_params(DBusMessageIter *iter,
6304 struct p2p_service_data *data = user_data;
6305 GSupplicantP2PServiceParams *service;
6306 DBusMessageIter dict;
6311 service = data->service;
6313 supplicant_dbus_dict_open(iter, &dict);
6315 if (service->query && service->response) {
6317 supplicant_dbus_dict_append_basic(&dict, "service_type",
6318 DBUS_TYPE_STRING, &type);
6319 supplicant_dbus_dict_append_fixed_array(&dict, "query",
6320 DBUS_TYPE_BYTE, &service->query,
6321 service->query_length);
6322 supplicant_dbus_dict_append_fixed_array(&dict, "response",
6323 DBUS_TYPE_BYTE, &service->response,
6324 service->response_length);
6325 } else if (service->version && service->service) {
6327 supplicant_dbus_dict_append_basic(&dict, "service_type",
6328 DBUS_TYPE_STRING, &type);
6329 supplicant_dbus_dict_append_basic(&dict, "version",
6330 DBUS_TYPE_INT32, &service->version);
6331 supplicant_dbus_dict_append_basic(&dict, "service",
6332 DBUS_TYPE_STRING, &service->service);
6335 supplicant_dbus_dict_close(iter, &dict);
6338 int g_supplicant_interface_p2p_add_service(GSupplicantInterface *interface,
6339 GSupplicantInterfaceCallback callback,
6340 GSupplicantP2PServiceParams *p2p_service_params,
6343 struct p2p_service_data *data;
6348 if (!interface->p2p_support)
6351 data = dbus_malloc0(sizeof(*data));
6355 data->registration = true;
6356 data->interface = interface;
6357 data->service = p2p_service_params;
6358 data->callback = callback;
6359 data->user_data = user_data;
6361 ret = supplicant_dbus_method_call(interface->path,
6362 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "AddService",
6363 interface_p2p_service_params, interface_p2p_service_result,
6370 return -EINPROGRESS;
6373 int g_supplicant_interface_p2p_del_service(GSupplicantInterface *interface,
6374 GSupplicantP2PServiceParams *p2p_service_params)
6376 struct p2p_service_data *data;
6381 if (!interface->p2p_support)
6384 data = dbus_malloc0(sizeof(*data));
6388 data->interface = interface;
6389 data->service = p2p_service_params;
6391 ret = supplicant_dbus_method_call(interface->path,
6392 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeleteService",
6393 interface_p2p_service_params, interface_p2p_service_result,
6400 return -EINPROGRESS;
6403 struct p2p_listen_data {
6408 static void interface_p2p_listen_params(DBusMessageIter *iter, void *user_data)
6410 struct p2p_listen_data *params = user_data;
6411 DBusMessageIter dict;
6413 supplicant_dbus_dict_open(iter, &dict);
6415 supplicant_dbus_dict_append_basic(&dict, "period",
6416 DBUS_TYPE_INT32, ¶ms->period);
6417 supplicant_dbus_dict_append_basic(&dict, "interval",
6418 DBUS_TYPE_INT32, ¶ms->interval);
6419 supplicant_dbus_dict_close(iter, &dict);
6422 int g_supplicant_interface_p2p_listen(GSupplicantInterface *interface,
6423 int period, int interval)
6425 struct p2p_listen_data params;
6429 if (!interface->p2p_support)
6432 params.period = period;
6433 params.interval = interval;
6435 return supplicant_dbus_method_call(interface->path,
6436 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
6437 "ExtendedListen", interface_p2p_listen_params,
6438 NULL, ¶ms, NULL);
6441 static void widi_ies_params(DBusMessageIter *iter, void *user_data)
6443 struct p2p_service_data *data = user_data;
6444 GSupplicantP2PServiceParams *service = data->service;
6445 DBusMessageIter array;
6447 SUPPLICANT_DBG("%p - %d", service->wfd_ies, service->wfd_ies_length);
6449 dbus_message_iter_open_container(iter, DBUS_TYPE_ARRAY,
6450 DBUS_TYPE_BYTE_AS_STRING, &array);
6452 if (service->wfd_ies && service->wfd_ies_length > 0) {
6453 dbus_message_iter_append_fixed_array(&array, DBUS_TYPE_BYTE,
6454 &service->wfd_ies, service->wfd_ies_length);
6457 dbus_message_iter_close_container(iter, &array);
6460 int g_supplicant_set_widi_ies(GSupplicantP2PServiceParams *p2p_service_params,
6461 GSupplicantInterfaceCallback callback,
6464 struct p2p_service_data *data;
6469 if (!system_available)
6472 data = dbus_malloc0(sizeof(*data));
6476 data->service = p2p_service_params;
6477 data->callback = callback;
6478 data->user_data = user_data;
6480 if (p2p_service_params->wfd_ies)
6481 data->registration = true;
6483 ret = supplicant_dbus_property_set(SUPPLICANT_PATH,
6484 SUPPLICANT_INTERFACE, "WFDIEs",
6485 DBUS_TYPE_ARRAY_AS_STRING
6486 DBUS_TYPE_BYTE_AS_STRING,
6488 interface_p2p_service_result,
6490 if (ret < 0 && ret != -EINPROGRESS) {
6495 return -EINPROGRESS;
6498 #if defined TIZEN_EXT
6499 int g_supplicant_interface_remove_network(GSupplicantInterface *interface)
6501 struct interface_data *data;
6505 if (interface == NULL)
6508 if (system_available == FALSE)
6511 data = dbus_malloc0(sizeof(*data));
6515 data->interface = interface;
6517 return network_remove(data);
6521 static const char *g_supplicant_rule0 = "type=signal,"
6522 "path=" DBUS_PATH_DBUS ","
6523 "sender=" DBUS_SERVICE_DBUS ","
6524 "interface=" DBUS_INTERFACE_DBUS ","
6525 "member=NameOwnerChanged,"
6526 "arg0=" SUPPLICANT_SERVICE;
6527 static const char *g_supplicant_rule1 = "type=signal,"
6528 "interface=" SUPPLICANT_INTERFACE;
6529 static const char *g_supplicant_rule2 = "type=signal,"
6530 "interface=" SUPPLICANT_INTERFACE ".Interface";
6531 static const char *g_supplicant_rule3 = "type=signal,"
6532 "interface=" SUPPLICANT_INTERFACE ".Interface.WPS";
6533 static const char *g_supplicant_rule4 = "type=signal,"
6534 "interface=" SUPPLICANT_INTERFACE ".BSS";
6535 static const char *g_supplicant_rule5 = "type=signal,"
6536 "interface=" SUPPLICANT_INTERFACE ".Network";
6537 #if !defined TIZEN_EXT
6538 static const char *g_supplicant_rule6 = "type=signal,"
6539 "interface=" SUPPLICANT_INTERFACE ".Interface.P2PDevice";
6540 static const char *g_supplicant_rule7 = "type=signal,"
6541 "interface=" SUPPLICANT_INTERFACE ".Peer";
6542 static const char *g_supplicant_rule8 = "type=signal,"
6543 "interface=" SUPPLICANT_INTERFACE ".Group";
6546 static void invoke_introspect_method(void)
6548 DBusMessage *message;
6550 message = dbus_message_new_method_call(SUPPLICANT_SERVICE,
6552 DBUS_INTERFACE_INTROSPECTABLE,
6558 dbus_message_set_no_reply(message, TRUE);
6559 dbus_connection_send(connection, message, NULL);
6560 dbus_message_unref(message);
6563 int g_supplicant_register(const GSupplicantCallbacks *callbacks)
6565 connection = dbus_bus_get(DBUS_BUS_SYSTEM, NULL);
6569 if (!dbus_connection_add_filter(connection, g_supplicant_filter,
6571 dbus_connection_unref(connection);
6576 callbacks_pointer = callbacks;
6579 interface_table = g_hash_table_new_full(g_str_hash, g_str_equal,
6580 NULL, remove_interface);
6582 bss_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
6584 peer_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
6586 group_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
6588 pending_peer_connection = g_hash_table_new_full(g_str_hash, g_str_equal,
6590 config_file_table = g_hash_table_new_full(g_str_hash, g_str_equal,
6593 supplicant_dbus_setup(connection);
6595 dbus_bus_add_match(connection, g_supplicant_rule0, NULL);
6596 dbus_bus_add_match(connection, g_supplicant_rule1, NULL);
6597 dbus_bus_add_match(connection, g_supplicant_rule2, NULL);
6598 dbus_bus_add_match(connection, g_supplicant_rule3, NULL);
6599 dbus_bus_add_match(connection, g_supplicant_rule4, NULL);
6600 dbus_bus_add_match(connection, g_supplicant_rule5, NULL);
6601 #if defined TIZEN_EXT
6602 dbus_bus_add_match(connection,
6603 "type=signal,interface=org.tizen.system.deviced.PowerOff,"
6604 "member=ChangeState", NULL);
6606 #if !defined TIZEN_EXT
6607 dbus_bus_add_match(connection, g_supplicant_rule6, NULL);
6608 dbus_bus_add_match(connection, g_supplicant_rule7, NULL);
6609 dbus_bus_add_match(connection, g_supplicant_rule8, NULL);
6611 dbus_connection_flush(connection);
6613 if (dbus_bus_name_has_owner(connection,
6614 SUPPLICANT_SERVICE, NULL)) {
6615 system_available = TRUE;
6616 supplicant_dbus_property_get_all(SUPPLICANT_PATH,
6617 SUPPLICANT_INTERFACE,
6618 service_property, NULL, NULL);
6620 invoke_introspect_method();
6625 static void unregister_interface_remove_params(DBusMessageIter *iter,
6628 const char *path = user_data;
6630 dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
6635 static void unregister_remove_interface(gpointer key, gpointer value,
6638 GSupplicantInterface *interface = value;
6640 supplicant_dbus_method_call(SUPPLICANT_PATH,
6641 SUPPLICANT_INTERFACE,
6643 unregister_interface_remove_params,
6644 NULL, interface->path, NULL);
6647 void g_supplicant_unregister(const GSupplicantCallbacks *callbacks)
6652 #if !defined TIZEN_EXT
6653 dbus_bus_remove_match(connection, g_supplicant_rule8, NULL);
6654 dbus_bus_remove_match(connection, g_supplicant_rule7, NULL);
6655 dbus_bus_remove_match(connection, g_supplicant_rule6, NULL);
6657 dbus_bus_remove_match(connection, g_supplicant_rule5, NULL);
6658 dbus_bus_remove_match(connection, g_supplicant_rule4, NULL);
6659 dbus_bus_remove_match(connection, g_supplicant_rule3, NULL);
6660 dbus_bus_remove_match(connection, g_supplicant_rule2, NULL);
6661 dbus_bus_remove_match(connection, g_supplicant_rule1, NULL);
6662 dbus_bus_remove_match(connection, g_supplicant_rule0, NULL);
6663 dbus_connection_flush(connection);
6665 dbus_connection_remove_filter(connection,
6666 g_supplicant_filter, NULL);
6669 if (config_file_table) {
6670 g_hash_table_destroy(config_file_table);
6671 config_file_table = NULL;
6675 g_hash_table_destroy(bss_mapping);
6680 g_hash_table_destroy(peer_mapping);
6681 peer_mapping = NULL;
6684 if (group_mapping) {
6685 g_hash_table_destroy(group_mapping);
6686 group_mapping = NULL;
6689 if (interface_table) {
6690 g_hash_table_foreach(interface_table,
6691 unregister_remove_interface, NULL);
6692 g_hash_table_destroy(interface_table);
6693 interface_table = NULL;
6696 if (system_available)
6697 callback_system_killed();
6700 dbus_connection_unref(connection);
6704 callbacks_pointer = NULL;