gsupplicant: Fixed invalid read issue
[platform/upstream/connman.git] / gsupplicant / supplicant.c
1 /*
2  *
3  *  WPA supplicant library with GLib integration
4  *
5  *  Copyright (C) 2012-2013  Intel Corporation. All rights reserved.
6  *
7  *  This program is free software; you can redistribute it and/or modify
8  *  it under the terms of the GNU General Public License version 2 as
9  *  published by the Free Software Foundation.
10  *
11  *  This program is distributed in the hope that it will be useful,
12  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
13  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14  *  GNU General Public License for more details.
15  *
16  *  You should have received a copy of the GNU General Public License
17  *  along with this program; if not, write to the Free Software
18  *  Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA
19  *
20  */
21
22 #ifdef HAVE_CONFIG_H
23 #include <config.h>
24 #endif
25
26 #include <errno.h>
27 #include <stdio.h>
28 #include <stdlib.h>
29 #include <string.h>
30 #include <stdint.h>
31 #include <syslog.h>
32 #include <ctype.h>
33 #include <stdbool.h>
34 #include <netinet/if_ether.h>
35 #include <netinet/in.h>
36
37 #include <glib.h>
38 #include <gdbus.h>
39
40 #include "dbus.h"
41 #include "gsupplicant.h"
42
43 #define IEEE80211_CAP_ESS       0x0001
44 #define IEEE80211_CAP_IBSS      0x0002
45 #define IEEE80211_CAP_PRIVACY   0x0010
46
47 #if defined TIZEN_EXT
48 #define COUNTRY_CODE_LENGTH     2
49 #endif
50
51 #define BSS_UNKNOWN_STRENGTH    -90
52
53 static DBusConnection *connection;
54
55 static const GSupplicantCallbacks *callbacks_pointer;
56
57 static dbus_bool_t system_available = FALSE;
58 static dbus_bool_t system_ready = FALSE;
59
60 static dbus_int32_t debug_level;
61 static dbus_bool_t debug_timestamp = FALSE;
62 static dbus_bool_t debug_showkeys = FALSE;
63
64 static const char *debug_strings[] = {
65         "msgdump", "debug", "info", "warning", "error", NULL
66 };
67
68 static unsigned int eap_methods;
69
70 struct strvalmap {
71         const char *str;
72         unsigned int val;
73 };
74
75 static struct strvalmap eap_method_map[] = {
76         { "MD5",        G_SUPPLICANT_EAP_METHOD_MD5     },
77         { "TLS",        G_SUPPLICANT_EAP_METHOD_TLS     },
78         { "MSCHAPV2",   G_SUPPLICANT_EAP_METHOD_MSCHAPV2        },
79         { "PEAP",       G_SUPPLICANT_EAP_METHOD_PEAP    },
80         { "TTLS",       G_SUPPLICANT_EAP_METHOD_TTLS    },
81         { "GTC",        G_SUPPLICANT_EAP_METHOD_GTC     },
82         { "OTP",        G_SUPPLICANT_EAP_METHOD_OTP     },
83         { "LEAP",       G_SUPPLICANT_EAP_METHOD_LEAP    },
84         { "WSC",        G_SUPPLICANT_EAP_METHOD_WSC     },
85         { }
86 };
87
88 static struct strvalmap keymgmt_map[] = {
89         { "none",               G_SUPPLICANT_KEYMGMT_NONE               },
90         { "ieee8021x",          G_SUPPLICANT_KEYMGMT_IEEE8021X  },
91         { "wpa-none",           G_SUPPLICANT_KEYMGMT_WPA_NONE   },
92         { "wpa-psk",            G_SUPPLICANT_KEYMGMT_WPA_PSK    },
93         { "wpa-psk-sha256",     G_SUPPLICANT_KEYMGMT_WPA_PSK_256        },
94         { "wpa-ft-psk",         G_SUPPLICANT_KEYMGMT_WPA_FT_PSK },
95         { "wpa-ft-eap",         G_SUPPLICANT_KEYMGMT_WPA_FT_EAP },
96         { "wpa-eap",            G_SUPPLICANT_KEYMGMT_WPA_EAP    },
97         { "wpa-eap-sha256",     G_SUPPLICANT_KEYMGMT_WPA_EAP_256        },
98         { "wps",                G_SUPPLICANT_KEYMGMT_WPS                },
99         { }
100 };
101
102 static struct strvalmap authalg_capa_map[] = {
103         { "open",       G_SUPPLICANT_CAPABILITY_AUTHALG_OPEN    },
104         { "shared",     G_SUPPLICANT_CAPABILITY_AUTHALG_SHARED  },
105         { "leap",       G_SUPPLICANT_CAPABILITY_AUTHALG_LEAP    },
106         { }
107 };
108
109 static struct strvalmap proto_capa_map[] = {
110         { "wpa",        G_SUPPLICANT_CAPABILITY_PROTO_WPA               },
111         { "rsn",        G_SUPPLICANT_CAPABILITY_PROTO_RSN               },
112         { }
113 };
114
115 static struct strvalmap group_map[] = {
116         { "wep40",      G_SUPPLICANT_GROUP_WEP40        },
117         { "wep104",     G_SUPPLICANT_GROUP_WEP104       },
118         { "tkip",       G_SUPPLICANT_GROUP_TKIP },
119         { "ccmp",       G_SUPPLICANT_GROUP_CCMP },
120         { }
121 };
122
123 static struct strvalmap pairwise_map[] = {
124         { "none",       G_SUPPLICANT_PAIRWISE_NONE      },
125         { "tkip",       G_SUPPLICANT_PAIRWISE_TKIP      },
126         { "ccmp",       G_SUPPLICANT_PAIRWISE_CCMP      },
127         { }
128 };
129
130 static struct strvalmap scan_capa_map[] = {
131         { "active",     G_SUPPLICANT_CAPABILITY_SCAN_ACTIVE     },
132         { "passive",    G_SUPPLICANT_CAPABILITY_SCAN_PASSIVE    },
133         { "ssid",       G_SUPPLICANT_CAPABILITY_SCAN_SSID               },
134         { }
135 };
136
137 static struct strvalmap mode_capa_map[] = {
138         { "infrastructure",     G_SUPPLICANT_CAPABILITY_MODE_INFRA      },
139         { "ad-hoc",             G_SUPPLICANT_CAPABILITY_MODE_IBSS       },
140         { "ap",                 G_SUPPLICANT_CAPABILITY_MODE_AP         },
141         { "p2p",                G_SUPPLICANT_CAPABILITY_MODE_P2P        },
142         { }
143 };
144
145 static GHashTable *interface_table;
146 static GHashTable *bss_mapping;
147 static GHashTable *peer_mapping;
148 static GHashTable *group_mapping;
149 static GHashTable *pending_peer_connection;
150 static GHashTable *config_file_table;
151
152 struct _GSupplicantWpsCredentials {
153         unsigned char ssid[32];
154         unsigned int ssid_len;
155         char *key;
156 };
157
158 struct added_network_information {
159         char * ssid;
160         GSupplicantSecurity security;
161         char * passphrase;
162         char * private_passphrase;
163 };
164
165 struct _GSupplicantInterface {
166         char *path;
167         char *network_path;
168         unsigned int keymgmt_capa;
169         unsigned int authalg_capa;
170         unsigned int proto_capa;
171         unsigned int group_capa;
172         unsigned int pairwise_capa;
173         unsigned int scan_capa;
174         unsigned int mode_capa;
175         unsigned int max_scan_ssids;
176         bool p2p_support;
177         bool p2p_finding;
178         bool ap_create_in_progress;
179         dbus_bool_t ready;
180         GSupplicantState state;
181         dbus_bool_t scanning;
182         GSupplicantInterfaceCallback scan_callback;
183         void *scan_data;
184         int apscan;
185         char *ifname;
186         char *driver;
187         char *bridge;
188         struct _GSupplicantWpsCredentials wps_cred;
189         GSupplicantWpsState wps_state;
190         GHashTable *network_table;
191         GHashTable *peer_table;
192         GHashTable *group_table;
193         GHashTable *bss_mapping;
194         void *data;
195         const char *pending_peer_path;
196         GSupplicantNetwork *current_network;
197         struct added_network_information network_info;
198 #if defined TIZEN_EXT
199         int disconnect_reason;
200 #endif
201 };
202
203 struct g_supplicant_bss {
204         GSupplicantInterface *interface;
205         char *path;
206         unsigned char bssid[6];
207         unsigned char ssid[32];
208         unsigned int ssid_len;
209         dbus_uint16_t frequency;
210         dbus_uint32_t maxrate;
211         dbus_int16_t signal;
212         GSupplicantMode mode;
213         GSupplicantSecurity security;
214         dbus_bool_t rsn_selected;
215         unsigned int wpa_keymgmt;
216         unsigned int wpa_pairwise;
217         unsigned int wpa_group;
218         unsigned int rsn_keymgmt;
219         unsigned int rsn_pairwise;
220         unsigned int rsn_group;
221         unsigned int keymgmt;
222         dbus_bool_t privacy;
223         dbus_bool_t psk;
224         dbus_bool_t ieee8021x;
225 #if defined TIZEN_EXT
226         dbus_bool_t ft_psk;
227         dbus_bool_t ft_ieee8021x;
228         GSList *vsie_list;
229         dbus_bool_t hs20;
230         unsigned char country_code[COUNTRY_CODE_LENGTH];
231 #endif
232         unsigned int wps_capabilities;
233 };
234
235 struct _GSupplicantNetwork {
236         GSupplicantInterface *interface;
237         char *path;
238         char *group;
239         char *name;
240         unsigned char ssid[32];
241         unsigned int ssid_len;
242         dbus_int16_t signal;
243         dbus_uint16_t frequency;
244         struct g_supplicant_bss *best_bss;
245         GSupplicantMode mode;
246         GSupplicantSecurity security;
247         dbus_bool_t wps;
248         unsigned int wps_capabilities;
249         GHashTable *bss_table;
250         GHashTable *config_table;
251 #if defined TIZEN_EXT
252         bool isHS20AP;
253         char *eap;
254         char *identity;
255         char *phase2;
256         unsigned int keymgmt;
257         GSList *vsie_list;
258         unsigned char country_code[COUNTRY_CODE_LENGTH];
259 #endif
260 };
261
262 struct _GSupplicantPeer {
263         GSupplicantInterface *interface;
264         char *path;
265         unsigned char device_address[ETH_ALEN];
266         unsigned char iface_address[ETH_ALEN];
267         char *name;
268         unsigned char *widi_ies;
269         int widi_ies_length;
270         char *identifier;
271         unsigned int wps_capabilities;
272         GSList *groups;
273         const GSupplicantInterface *current_group_iface;
274         bool connection_requested;
275 };
276
277 struct _GSupplicantGroup {
278         GSupplicantInterface *interface;
279         GSupplicantInterface *orig_interface;
280         char *path;
281         int role;
282         GSList *members;
283 };
284
285 struct interface_data {
286         GSupplicantInterface *interface;
287         char *path; /* Interface path cannot be taken from interface (above) as
288                      * it might have been freed already.
289                      */
290         GSupplicantInterfaceCallback callback;
291         void *user_data;
292         bool network_remove_in_progress;
293         GSupplicantSSID *ssid;
294 };
295
296 struct interface_create_data {
297         char *ifname;
298         char *driver;
299         char *bridge;
300         GSupplicantInterface *interface;
301         GSupplicantInterfaceCallback callback;
302         void *user_data;
303 };
304
305 struct interface_connect_data {
306         GSupplicantInterface *interface;
307         char *path;
308         GSupplicantInterfaceCallback callback;
309         void *user_data;
310         union {
311                 GSupplicantSSID *ssid;
312                 GSupplicantPeerParams *peer;
313         };
314 };
315
316 struct interface_scan_data {
317         GSupplicantInterface *interface;
318         char *path;
319         GSupplicantInterfaceCallback callback;
320         GSupplicantScanParams *scan_params;
321         void *user_data;
322 };
323
324 #if defined TIZEN_EXT
325 struct g_connman_bssids {
326         char bssid[18];
327         uint16_t strength;
328         uint16_t frequency;
329 };
330 #endif
331
332 static int network_remove(struct interface_data *data);
333
334 static inline void debug(const char *format, ...)
335 {
336         char str[256];
337         va_list ap;
338
339         if (!callbacks_pointer || !callbacks_pointer->debug)
340                 return;
341
342         va_start(ap, format);
343
344         if (vsnprintf(str, sizeof(str), format, ap) > 0)
345                 callbacks_pointer->debug(str);
346
347         va_end(ap);
348 }
349
350 #define SUPPLICANT_DBG(fmt, arg...) \
351         debug("%s:%s() " fmt, __FILE__, __FUNCTION__ , ## arg);
352
353 static GSupplicantMode string2mode(const char *mode)
354 {
355         if (!mode)
356                 return G_SUPPLICANT_MODE_UNKNOWN;
357
358         if (g_str_equal(mode, "infrastructure"))
359                 return G_SUPPLICANT_MODE_INFRA;
360         else if (g_str_equal(mode, "ad-hoc"))
361                 return G_SUPPLICANT_MODE_IBSS;
362
363         return G_SUPPLICANT_MODE_UNKNOWN;
364 }
365
366 static const char *mode2string(GSupplicantMode mode)
367 {
368         switch (mode) {
369         case G_SUPPLICANT_MODE_UNKNOWN:
370                 break;
371         case G_SUPPLICANT_MODE_INFRA:
372                 return "managed";
373         case G_SUPPLICANT_MODE_IBSS:
374                 return "adhoc";
375         case G_SUPPLICANT_MODE_MASTER:
376                 return "ap";
377         }
378
379         return NULL;
380 }
381
382 static const char *security2string(GSupplicantSecurity security)
383 {
384         switch (security) {
385         case G_SUPPLICANT_SECURITY_UNKNOWN:
386                 break;
387         case G_SUPPLICANT_SECURITY_NONE:
388                 return "none";
389         case G_SUPPLICANT_SECURITY_WEP:
390                 return "wep";
391         case G_SUPPLICANT_SECURITY_PSK:
392                 return "psk";
393         case G_SUPPLICANT_SECURITY_IEEE8021X:
394                 return "ieee8021x";
395 #if defined TIZEN_EXT
396         case G_SUPPLICANT_SECURITY_FT_PSK:
397                 return "ft_psk";
398         case G_SUPPLICANT_SECURITY_FT_IEEE8021X:
399                 return "ft_ieee8021x";
400 #endif
401         }
402
403         return NULL;
404 }
405
406 static GSupplicantState string2state(const char *state)
407 {
408         if (!state)
409                 return G_SUPPLICANT_STATE_UNKNOWN;
410
411         if (g_str_equal(state, "unknown"))
412                 return G_SUPPLICANT_STATE_UNKNOWN;
413         else if (g_str_equal(state, "interface_disabled"))
414                 return G_SUPPLICANT_STATE_DISABLED;
415         else if (g_str_equal(state, "disconnected"))
416                 return G_SUPPLICANT_STATE_DISCONNECTED;
417         else if (g_str_equal(state, "inactive"))
418                 return G_SUPPLICANT_STATE_INACTIVE;
419         else if (g_str_equal(state, "scanning"))
420                 return G_SUPPLICANT_STATE_SCANNING;
421         else if (g_str_equal(state, "authenticating"))
422                 return G_SUPPLICANT_STATE_AUTHENTICATING;
423         else if (g_str_equal(state, "associating"))
424                 return G_SUPPLICANT_STATE_ASSOCIATING;
425         else if (g_str_equal(state, "associated"))
426                 return G_SUPPLICANT_STATE_ASSOCIATED;
427         else if (g_str_equal(state, "group_handshake"))
428                 return G_SUPPLICANT_STATE_GROUP_HANDSHAKE;
429         else if (g_str_equal(state, "4way_handshake"))
430                 return G_SUPPLICANT_STATE_4WAY_HANDSHAKE;
431         else if (g_str_equal(state, "completed"))
432                 return G_SUPPLICANT_STATE_COMPLETED;
433
434         return G_SUPPLICANT_STATE_UNKNOWN;
435 }
436
437 static bool compare_network_parameters(GSupplicantInterface *interface,
438                                 GSupplicantSSID *ssid)
439 {
440 #if defined TIZEN_EXT
441         if (!interface->network_info.ssid)
442                 return FALSE;
443 #endif
444
445         if (memcmp(interface->network_info.ssid, ssid->ssid, ssid->ssid_len))
446                 return FALSE;
447
448         if (interface->network_info.security != ssid->security)
449                 return FALSE;
450
451         if (interface->network_info.passphrase &&
452                         g_strcmp0(interface->network_info.passphrase,
453                                 ssid->passphrase) != 0) {
454                 return FALSE;
455         }
456
457         if (interface->network_info.private_passphrase &&
458                         g_strcmp0(interface->network_info.private_passphrase,
459                                 ssid->private_key_passphrase) != 0) {
460                 return FALSE;
461         }
462
463         return TRUE;
464 }
465
466 static void remove_network_information(GSupplicantInterface * interface)
467 {
468         g_free(interface->network_info.ssid);
469         g_free(interface->network_info.passphrase);
470         g_free(interface->network_info.private_passphrase);
471         interface->network_info.ssid = NULL;
472         interface->network_info.passphrase = NULL;
473         interface->network_info.private_passphrase = NULL;
474 }
475
476 static int store_network_information(GSupplicantInterface * interface,
477                                 GSupplicantSSID *ssid)
478 {
479         interface->network_info.ssid = g_malloc(ssid->ssid_len + 1);
480         if (interface->network_info.ssid != NULL) {
481                 memcpy(interface->network_info.ssid, ssid->ssid,
482                         ssid->ssid_len);
483                 interface->network_info.ssid[ssid->ssid_len] = '\0';
484         } else {
485                 return -ENOMEM;
486         }
487
488         interface->network_info.security = ssid->security;
489
490         if ((ssid->security == G_SUPPLICANT_SECURITY_WEP ||
491                 ssid->security == G_SUPPLICANT_SECURITY_PSK ||
492                 ssid->security == G_SUPPLICANT_SECURITY_NONE) &&
493                 ssid->passphrase) {
494                 interface->network_info.passphrase = g_strdup(ssid->passphrase);
495         }
496
497         if (ssid->security == G_SUPPLICANT_SECURITY_IEEE8021X &&
498                         ssid->private_key_passphrase) {
499                 interface->network_info.private_passphrase =
500                         g_strdup(ssid->private_key_passphrase);
501         }
502
503         return 0;
504 }
505
506 static void callback_system_ready(void)
507 {
508         if (system_ready)
509                 return;
510
511         system_ready = TRUE;
512
513         if (!callbacks_pointer)
514                 return;
515
516         if (!callbacks_pointer->system_ready)
517                 return;
518
519         callbacks_pointer->system_ready();
520 }
521
522 static void callback_system_killed(void)
523 {
524         system_ready = FALSE;
525
526         if (!callbacks_pointer)
527                 return;
528
529         if (!callbacks_pointer->system_killed)
530                 return;
531
532         callbacks_pointer->system_killed();
533 }
534
535 static void callback_interface_added(GSupplicantInterface *interface)
536 {
537         SUPPLICANT_DBG("");
538
539         if (!callbacks_pointer)
540                 return;
541
542         if (!callbacks_pointer->interface_added)
543                 return;
544
545         callbacks_pointer->interface_added(interface);
546 }
547
548 static void callback_interface_state(GSupplicantInterface *interface)
549 {
550         if (!callbacks_pointer)
551                 return;
552
553         if (!callbacks_pointer->interface_state)
554                 return;
555
556         callbacks_pointer->interface_state(interface);
557 }
558
559 static void callback_interface_removed(GSupplicantInterface *interface)
560 {
561         if (!callbacks_pointer)
562                 return;
563
564         if (!callbacks_pointer->interface_removed)
565                 return;
566
567         callbacks_pointer->interface_removed(interface);
568 }
569
570 #if !defined TIZEN_EXT
571 static void callback_p2p_support(GSupplicantInterface *interface)
572 {
573         SUPPLICANT_DBG("");
574
575         if (!interface->p2p_support)
576                 return;
577
578         if (callbacks_pointer && callbacks_pointer->p2p_support)
579                 callbacks_pointer->p2p_support(interface);
580 }
581 #endif
582
583 static void callback_scan_started(GSupplicantInterface *interface)
584 {
585         if (!callbacks_pointer)
586                 return;
587
588         if (!callbacks_pointer->scan_started)
589                 return;
590
591         callbacks_pointer->scan_started(interface);
592 }
593
594 static void callback_ap_create_fail(GSupplicantInterface *interface)
595 {
596         if (!callbacks_pointer)
597                 return;
598
599         if (!callbacks_pointer->ap_create_fail)
600                 return;
601
602         callbacks_pointer->ap_create_fail(interface);
603 }
604
605 static void callback_scan_finished(GSupplicantInterface *interface)
606 {
607         if (!callbacks_pointer)
608                 return;
609
610         if (!callbacks_pointer->scan_finished)
611                 return;
612
613         callbacks_pointer->scan_finished(interface);
614 }
615
616 static void callback_network_added(GSupplicantNetwork *network)
617 {
618         if (!callbacks_pointer)
619                 return;
620
621         if (!callbacks_pointer->network_added)
622                 return;
623
624         callbacks_pointer->network_added(network);
625 }
626
627 static void callback_network_removed(GSupplicantNetwork *network)
628 {
629         if (!callbacks_pointer)
630                 return;
631
632         if (!callbacks_pointer->network_removed)
633                 return;
634
635         callbacks_pointer->network_removed(network);
636 }
637
638 #if defined TIZEN_EXT
639 static void callback_network_merged(GSupplicantNetwork *network)
640 {
641         if (!callbacks_pointer)
642                 return;
643
644         if (!callbacks_pointer->network_merged)
645                 return;
646
647         callbacks_pointer->network_merged(network);
648 }
649
650 static void callback_assoc_failed(void *user_data)
651 {
652         if (!callbacks_pointer)
653                 return;
654
655         if (!callbacks_pointer->assoc_failed)
656                 return;
657
658         callbacks_pointer->assoc_failed(user_data);
659 }
660 #endif
661
662 static void callback_network_changed(GSupplicantNetwork *network,
663                                         const char *property)
664 {
665         if (!callbacks_pointer)
666                 return;
667
668         if (!callbacks_pointer->network_changed)
669                 return;
670
671         callbacks_pointer->network_changed(network, property);
672 }
673
674 static void callback_network_associated(GSupplicantNetwork *network)
675 {
676         if (!callbacks_pointer)
677                 return;
678
679         if (!callbacks_pointer->network_associated)
680                 return;
681
682         callbacks_pointer->network_associated(network);
683 }
684
685 static void callback_peer_found(GSupplicantPeer *peer)
686 {
687         if (!callbacks_pointer)
688                 return;
689
690         if (!callbacks_pointer->peer_found)
691                 return;
692
693         callbacks_pointer->peer_found(peer);
694 }
695
696 static void callback_peer_lost(GSupplicantPeer *peer)
697 {
698         if (!callbacks_pointer)
699                 return;
700
701         if (!callbacks_pointer->peer_lost)
702                 return;
703
704         callbacks_pointer->peer_lost(peer);
705 }
706
707 static void callback_peer_changed(GSupplicantPeer *peer,
708                                                 GSupplicantPeerState state)
709 {
710         if (!callbacks_pointer)
711                 return;
712
713         if (!callbacks_pointer->peer_changed)
714                 return;
715
716         callbacks_pointer->peer_changed(peer, state);
717 }
718
719 static void callback_peer_request(GSupplicantPeer *peer)
720 {
721         if (!callbacks_pointer)
722                 return;
723
724         if (!callbacks_pointer->peer_request)
725                 return;
726
727         peer->connection_requested = true;
728
729         callbacks_pointer->peer_request(peer);
730 }
731
732 static void callback_disconnect_reason_code(GSupplicantInterface *interface,
733                                         int reason_code)
734 {
735         if (!callbacks_pointer)
736                 return;
737
738         if (!callbacks_pointer->disconnect_reasoncode)
739                 return;
740
741         if (reason_code != 0)
742                 callbacks_pointer->disconnect_reasoncode(interface,
743                                                         reason_code);
744 }
745
746 static void callback_assoc_status_code(GSupplicantInterface *interface,
747                                 int status_code)
748 {
749         if (!callbacks_pointer)
750                 return;
751
752         if (!callbacks_pointer->assoc_status_code)
753                 return;
754
755         callbacks_pointer->assoc_status_code(interface, status_code);
756
757 }
758
759 static void remove_group(gpointer data)
760 {
761         GSupplicantGroup *group = data;
762
763         if (group->members)
764                 g_slist_free_full(group->members, g_free);
765
766         g_free(group->path);
767         g_free(group);
768 }
769
770 static void remove_interface(gpointer data)
771 {
772         GSupplicantInterface *interface = data;
773
774         g_hash_table_destroy(interface->bss_mapping);
775         g_hash_table_destroy(interface->network_table);
776         g_hash_table_destroy(interface->peer_table);
777         g_hash_table_destroy(interface->group_table);
778
779         if (interface->scan_callback) {
780                 SUPPLICANT_DBG("call interface %p callback %p scanning %d",
781                                 interface, interface->scan_callback,
782                                 interface->scanning);
783
784                 interface->scan_callback(-EIO, interface, interface->scan_data);
785                 interface->scan_callback = NULL;
786                 interface->scan_data = NULL;
787
788                 if (interface->scanning) {
789                         interface->scanning = FALSE;
790                         callback_scan_finished(interface);
791                 }
792         }
793
794         callback_interface_removed(interface);
795
796         g_free(interface->wps_cred.key);
797         g_free(interface->path);
798         g_free(interface->network_path);
799 #if defined TIZEN_EXT
800         interface->network_path = NULL;
801 #endif
802         g_free(interface->ifname);
803         g_free(interface->driver);
804         g_free(interface->bridge);
805         remove_network_information(interface);
806         g_free(interface);
807 }
808
809 static void remove_network(gpointer data)
810 {
811         GSupplicantNetwork *network = data;
812
813         g_hash_table_destroy(network->bss_table);
814
815         callback_network_removed(network);
816
817         g_hash_table_destroy(network->config_table);
818
819         g_free(network->path);
820         g_free(network->group);
821         g_free(network->name);
822 #if defined TIZEN_EXT
823         g_free(network->eap);
824         g_free(network->identity);
825         g_free(network->phase2);
826 #endif
827 #if defined TIZEN_EXT
828         g_slist_free_full(network->vsie_list, g_free);
829 #endif
830
831         g_free(network);
832 }
833
834 static void remove_bss(gpointer data)
835 {
836         struct g_supplicant_bss *bss = data;
837
838         g_free(bss->path);
839 #if defined TIZEN_EXT
840         g_slist_free_full(bss->vsie_list, g_free);
841 #endif
842         g_free(bss);
843 }
844
845 static void remove_peer(gpointer data)
846 {
847         GSupplicantPeer *peer = data;
848
849         callback_peer_lost(peer);
850
851         if (peer->groups)
852                 g_slist_free_full(peer->groups, g_free);
853
854         if (peer_mapping)
855                 g_hash_table_remove(peer_mapping, peer->path);
856
857         if (pending_peer_connection)
858                 g_hash_table_remove(pending_peer_connection, peer->path);
859
860         g_free(peer->path);
861         g_free(peer->name);
862         g_free(peer->identifier);
863         g_free(peer->widi_ies);
864
865         g_free(peer);
866 }
867
868 static void debug_strvalmap(const char *label, struct strvalmap *map,
869                                                         unsigned int val)
870 {
871         int i;
872
873         for (i = 0; map[i].str; i++) {
874                 if (val & map[i].val)
875                         SUPPLICANT_DBG("%s: %s", label, map[i].str);
876         }
877 }
878
879 static void interface_capability_keymgmt(DBusMessageIter *iter, void *user_data)
880 {
881         GSupplicantInterface *interface = user_data;
882         const char *str = NULL;
883         int i;
884
885         dbus_message_iter_get_basic(iter, &str);
886         if (!str)
887                 return;
888
889         for (i = 0; keymgmt_map[i].str; i++)
890                 if (strcmp(str, keymgmt_map[i].str) == 0) {
891                         interface->keymgmt_capa |= keymgmt_map[i].val;
892                         break;
893                 }
894 }
895
896 static void interface_capability_authalg(DBusMessageIter *iter, void *user_data)
897 {
898         GSupplicantInterface *interface = user_data;
899         const char *str = NULL;
900         int i;
901
902         dbus_message_iter_get_basic(iter, &str);
903         if (!str)
904                 return;
905
906         for (i = 0; authalg_capa_map[i].str; i++)
907                 if (strcmp(str, authalg_capa_map[i].str) == 0) {
908                         interface->authalg_capa |= authalg_capa_map[i].val;
909                         break;
910                 }
911 }
912
913 static void interface_capability_proto(DBusMessageIter *iter, void *user_data)
914 {
915         GSupplicantInterface *interface = user_data;
916         const char *str = NULL;
917         int i;
918
919         dbus_message_iter_get_basic(iter, &str);
920         if (!str)
921                 return;
922
923         for (i = 0; proto_capa_map[i].str; i++)
924                 if (strcmp(str, proto_capa_map[i].str) == 0) {
925                         interface->proto_capa |= proto_capa_map[i].val;
926                         break;
927                 }
928 }
929
930 static void interface_capability_pairwise(DBusMessageIter *iter,
931                                                         void *user_data)
932 {
933         GSupplicantInterface *interface = user_data;
934         const char *str = NULL;
935         int i;
936
937         dbus_message_iter_get_basic(iter, &str);
938         if (!str)
939                 return;
940
941         for (i = 0; pairwise_map[i].str; i++)
942                 if (strcmp(str, pairwise_map[i].str) == 0) {
943                         interface->pairwise_capa |= pairwise_map[i].val;
944                         break;
945                 }
946 }
947
948 static void interface_capability_group(DBusMessageIter *iter, void *user_data)
949 {
950         GSupplicantInterface *interface = user_data;
951         const char *str = NULL;
952         int i;
953
954         dbus_message_iter_get_basic(iter, &str);
955         if (!str)
956                 return;
957
958         for (i = 0; group_map[i].str; i++)
959                 if (strcmp(str, group_map[i].str) == 0) {
960                         interface->group_capa |= group_map[i].val;
961                         break;
962                 }
963 }
964
965 static void interface_capability_scan(DBusMessageIter *iter, void *user_data)
966 {
967         GSupplicantInterface *interface = user_data;
968         const char *str = NULL;
969         int i;
970
971         dbus_message_iter_get_basic(iter, &str);
972         if (!str)
973                 return;
974
975         for (i = 0; scan_capa_map[i].str; i++)
976                 if (strcmp(str, scan_capa_map[i].str) == 0) {
977                         interface->scan_capa |= scan_capa_map[i].val;
978                         break;
979                 }
980 }
981
982 static void interface_capability_mode(DBusMessageIter *iter, void *user_data)
983 {
984         GSupplicantInterface *interface = user_data;
985         const char *str = NULL;
986         int i;
987
988         dbus_message_iter_get_basic(iter, &str);
989         if (!str)
990                 return;
991
992         for (i = 0; mode_capa_map[i].str; i++)
993                 if (strcmp(str, mode_capa_map[i].str) == 0) {
994                         interface->mode_capa |= mode_capa_map[i].val;
995                         break;
996                 }
997 }
998
999 static void interface_capability(const char *key, DBusMessageIter *iter,
1000                                                         void *user_data)
1001 {
1002         GSupplicantInterface *interface = user_data;
1003
1004         if (!key)
1005                 return;
1006
1007         if (g_strcmp0(key, "KeyMgmt") == 0)
1008                 supplicant_dbus_array_foreach(iter,
1009                                 interface_capability_keymgmt, interface);
1010         else if (g_strcmp0(key, "AuthAlg") == 0)
1011                 supplicant_dbus_array_foreach(iter,
1012                                 interface_capability_authalg, interface);
1013         else if (g_strcmp0(key, "Protocol") == 0)
1014                 supplicant_dbus_array_foreach(iter,
1015                                 interface_capability_proto, interface);
1016         else if (g_strcmp0(key, "Pairwise") == 0)
1017                 supplicant_dbus_array_foreach(iter,
1018                                 interface_capability_pairwise, interface);
1019         else if (g_strcmp0(key, "Group") == 0)
1020                 supplicant_dbus_array_foreach(iter,
1021                                 interface_capability_group, interface);
1022         else if (g_strcmp0(key, "Scan") == 0)
1023                 supplicant_dbus_array_foreach(iter,
1024                                 interface_capability_scan, interface);
1025         else if (g_strcmp0(key, "Modes") == 0)
1026                 supplicant_dbus_array_foreach(iter,
1027                                 interface_capability_mode, interface);
1028         else if (g_strcmp0(key, "MaxScanSSID") == 0) {
1029                 dbus_int32_t max_scan_ssid;
1030
1031                 dbus_message_iter_get_basic(iter, &max_scan_ssid);
1032                 if (max_scan_ssid < 2)
1033                         max_scan_ssid = 0;
1034                 interface->max_scan_ssids = max_scan_ssid;
1035
1036         } else
1037                 SUPPLICANT_DBG("key %s type %c",
1038                                 key, dbus_message_iter_get_arg_type(iter));
1039 }
1040
1041 struct set_apscan_data
1042 {
1043         unsigned int ap_scan;
1044         GSupplicantInterface *interface;
1045 };
1046
1047 static void set_apscan(DBusMessageIter *iter, void *user_data)
1048 {
1049         struct set_apscan_data *data = user_data;
1050         unsigned int ap_scan = data->ap_scan;
1051
1052         dbus_message_iter_append_basic(iter, DBUS_TYPE_UINT32, &ap_scan);
1053 }
1054
1055 static void set_apscan_complete(const char *error,
1056                 DBusMessageIter *iter, void *user_data)
1057 {
1058         struct set_apscan_data *data = user_data;
1059         GSupplicantInterface *interface = data->interface;
1060
1061         if (error) {
1062                 interface->ap_create_in_progress = false;
1063                 SUPPLICANT_DBG("Set AP scan error %s", error);
1064                 goto error;
1065         }
1066
1067         interface->ap_create_in_progress = true;
1068 error:
1069         dbus_free(data);
1070 }
1071
1072 int g_supplicant_interface_set_apscan(GSupplicantInterface *interface,
1073                                                         unsigned int ap_scan)
1074 {
1075         struct set_apscan_data *data;
1076         int ret;
1077
1078         data = dbus_malloc0(sizeof(*data));
1079
1080         if (!data)
1081                 return -ENOMEM;
1082
1083         data->ap_scan = ap_scan;
1084         data->interface = interface;
1085
1086         ret = supplicant_dbus_property_set(interface->path,
1087                         SUPPLICANT_INTERFACE ".Interface",
1088                         "ApScan", DBUS_TYPE_UINT32_AS_STRING,
1089                         set_apscan, set_apscan_complete, data, NULL);
1090         if (ret < 0)
1091                 dbus_free(data);
1092
1093         return ret;
1094 }
1095
1096 void g_supplicant_interface_set_data(GSupplicantInterface *interface,
1097                                                                 void *data)
1098 {
1099         if (!interface)
1100                 return;
1101
1102         interface->data = data;
1103
1104         if (!data)
1105                 interface->scan_callback = NULL;
1106 }
1107
1108 void *g_supplicant_interface_get_data(GSupplicantInterface *interface)
1109 {
1110         if (!interface)
1111                 return NULL;
1112
1113         return interface->data;
1114 }
1115
1116 const char *g_supplicant_interface_get_ifname(GSupplicantInterface *interface)
1117 {
1118         if (!interface)
1119                 return NULL;
1120
1121         return interface->ifname;
1122 }
1123
1124 const char *g_supplicant_interface_get_driver(GSupplicantInterface *interface)
1125 {
1126         if (!interface)
1127                 return NULL;
1128
1129         return interface->driver;
1130 }
1131
1132 GSupplicantState g_supplicant_interface_get_state(
1133                                         GSupplicantInterface *interface)
1134 {
1135         if (!interface)
1136                 return G_SUPPLICANT_STATE_UNKNOWN;
1137
1138         return interface->state;
1139 }
1140
1141 const char *g_supplicant_interface_get_wps_key(GSupplicantInterface *interface)
1142 {
1143         if (!interface)
1144                 return NULL;
1145
1146         return (const char *)interface->wps_cred.key;
1147 }
1148
1149 const void *g_supplicant_interface_get_wps_ssid(GSupplicantInterface *interface,
1150                                                         unsigned int *ssid_len)
1151 {
1152         if (!ssid_len)
1153                 return NULL;
1154
1155         if (!interface || interface->wps_cred.ssid_len == 0) {
1156                 *ssid_len = 0;
1157                 return NULL;
1158         }
1159
1160         *ssid_len = interface->wps_cred.ssid_len;
1161         return interface->wps_cred.ssid;
1162 }
1163
1164 GSupplicantWpsState g_supplicant_interface_get_wps_state(
1165                                         GSupplicantInterface *interface)
1166 {
1167         if (!interface)
1168                 return G_SUPPLICANT_WPS_STATE_UNKNOWN;
1169
1170         return interface->wps_state;
1171 }
1172
1173 unsigned int g_supplicant_interface_get_mode(GSupplicantInterface *interface)
1174 {
1175         if (!interface)
1176                 return 0;
1177
1178         return interface->mode_capa;
1179 }
1180
1181 unsigned int g_supplicant_interface_get_max_scan_ssids(
1182                                 GSupplicantInterface *interface)
1183 {
1184         if (!interface)
1185                 return 0;
1186
1187         if (interface->max_scan_ssids == 0)
1188                 return WPAS_MAX_SCAN_SSIDS;
1189
1190         return interface->max_scan_ssids;
1191 }
1192
1193 static void set_network_enabled(DBusMessageIter *iter, void *user_data)
1194 {
1195         dbus_bool_t enable = *(dbus_bool_t *)user_data;
1196
1197         dbus_message_iter_append_basic(iter, DBUS_TYPE_BOOLEAN, &enable);
1198 }
1199
1200 int g_supplicant_interface_enable_selected_network(GSupplicantInterface *interface,
1201                                                         dbus_bool_t enable)
1202 {
1203         if (!interface)
1204                 return -1;
1205
1206         if (!interface->network_path)
1207                 return -1;
1208
1209         SUPPLICANT_DBG(" ");
1210         return supplicant_dbus_property_set(interface->network_path,
1211                                 SUPPLICANT_INTERFACE ".Network",
1212                                 "Enabled", DBUS_TYPE_BOOLEAN_AS_STRING,
1213                                 set_network_enabled, NULL, &enable, NULL);
1214 }
1215
1216 dbus_bool_t g_supplicant_interface_get_ready(GSupplicantInterface *interface)
1217 {
1218         if (!interface)
1219                 return FALSE;
1220
1221         return interface->ready;
1222 }
1223
1224 GSupplicantInterface *g_supplicant_network_get_interface(
1225                                         GSupplicantNetwork *network)
1226 {
1227         if (!network)
1228                 return NULL;
1229
1230         return network->interface;
1231 }
1232
1233 const char *g_supplicant_network_get_name(GSupplicantNetwork *network)
1234 {
1235         if (!network || !network->name)
1236                 return "";
1237
1238         return network->name;
1239 }
1240
1241 const char *g_supplicant_network_get_identifier(GSupplicantNetwork *network)
1242 {
1243         if (!network || !network->group)
1244                 return "";
1245
1246         return network->group;
1247 }
1248
1249 const char *g_supplicant_network_get_path(GSupplicantNetwork *network)
1250 {
1251         if (!network || !network->path)
1252                 return NULL;
1253
1254         return network->path;
1255 }
1256
1257 const char *g_supplicant_network_get_mode(GSupplicantNetwork *network)
1258 {
1259         if (!network)
1260                 return G_SUPPLICANT_MODE_UNKNOWN;
1261
1262         return mode2string(network->mode);
1263 }
1264
1265 const char *g_supplicant_network_get_security(GSupplicantNetwork *network)
1266 {
1267         if (!network)
1268                 return G_SUPPLICANT_SECURITY_UNKNOWN;
1269
1270         return security2string(network->security);
1271 }
1272
1273 const void *g_supplicant_network_get_ssid(GSupplicantNetwork *network,
1274                                                 unsigned int *ssid_len)
1275 {
1276         if (!network) {
1277                 *ssid_len = 0;
1278                 return NULL;
1279         }
1280
1281         *ssid_len = network->ssid_len;
1282         return network->ssid;
1283 }
1284
1285 dbus_int16_t g_supplicant_network_get_signal(GSupplicantNetwork *network)
1286 {
1287         if (!network)
1288                 return 0;
1289
1290         return network->signal;
1291 }
1292
1293 dbus_uint16_t g_supplicant_network_get_frequency(GSupplicantNetwork *network)
1294 {
1295         if (!network)
1296                 return 0;
1297
1298         return network->frequency;
1299 }
1300
1301 dbus_bool_t g_supplicant_network_get_wps(GSupplicantNetwork *network)
1302 {
1303         if (!network)
1304                 return FALSE;
1305
1306         return network->wps;
1307 }
1308
1309 dbus_bool_t g_supplicant_network_is_wps_active(GSupplicantNetwork *network)
1310 {
1311         if (!network)
1312                 return FALSE;
1313
1314         if (network->wps_capabilities & G_SUPPLICANT_WPS_CONFIGURED)
1315                 return TRUE;
1316
1317         return FALSE;
1318 }
1319
1320 dbus_bool_t g_supplicant_network_is_wps_pbc(GSupplicantNetwork *network)
1321 {
1322         if (!network)
1323                 return FALSE;
1324
1325         if (network->wps_capabilities & G_SUPPLICANT_WPS_PBC)
1326                 return TRUE;
1327
1328         return FALSE;
1329 }
1330
1331 dbus_bool_t g_supplicant_network_is_wps_advertizing(GSupplicantNetwork *network)
1332 {
1333         if (!network)
1334                 return FALSE;
1335
1336         if (network->wps_capabilities & G_SUPPLICANT_WPS_REGISTRAR)
1337                 return TRUE;
1338
1339         return FALSE;
1340 }
1341
1342 GSupplicantInterface *g_supplicant_peer_get_interface(GSupplicantPeer *peer)
1343 {
1344         if (!peer)
1345                 return NULL;
1346
1347         return peer->interface;
1348 }
1349
1350 const char *g_supplicant_peer_get_path(GSupplicantPeer *peer)
1351 {
1352         if (!peer)
1353                 return NULL;
1354
1355         return peer->path;
1356 }
1357
1358 const char *g_supplicant_peer_get_identifier(GSupplicantPeer *peer)
1359 {
1360         if (!peer)
1361                 return NULL;
1362
1363         return peer->identifier;
1364 }
1365
1366 const void *g_supplicant_peer_get_device_address(GSupplicantPeer *peer)
1367 {
1368         if (!peer)
1369                 return NULL;
1370
1371         return peer->device_address;
1372 }
1373
1374 const void *g_supplicant_peer_get_iface_address(GSupplicantPeer *peer)
1375 {
1376         if (!peer)
1377                 return NULL;
1378
1379         return peer->iface_address;
1380 }
1381
1382 const char *g_supplicant_peer_get_name(GSupplicantPeer *peer)
1383 {
1384         if (!peer)
1385                 return NULL;
1386
1387         return peer->name;
1388 }
1389
1390 #if defined TIZEN_EXT
1391 bool g_supplicant_network_is_hs20AP(GSupplicantNetwork *network)
1392 {
1393         if (!network)
1394                 return 0;
1395
1396         return network->isHS20AP;
1397 }
1398
1399 const char *g_supplicant_network_get_eap(GSupplicantNetwork *network)
1400 {
1401         if (!network || !network->eap)
1402                 return NULL;
1403
1404         return network->eap;
1405 }
1406
1407 const char *g_supplicant_network_get_identity(GSupplicantNetwork *network)
1408 {
1409         if (!network || !network->identity)
1410                 return NULL;
1411
1412         return network->identity;
1413 }
1414
1415 const char *g_supplicant_network_get_phase2(GSupplicantNetwork *network)
1416 {
1417         if (!network || !network->phase2)
1418                 return NULL;
1419
1420         return network->phase2;
1421 }
1422
1423 unsigned int g_supplicant_network_get_keymgmt(GSupplicantNetwork *network)
1424 {
1425         if (network == NULL)
1426                 return 0;
1427
1428         return network->keymgmt;
1429 }
1430
1431 const unsigned char *g_supplicant_network_get_countrycode(GSupplicantNetwork
1432                                                           *network)
1433 {
1434         if (!network)
1435                 return NULL;
1436
1437         return network->country_code;
1438 }
1439 #endif
1440
1441 const unsigned char *g_supplicant_peer_get_widi_ies(GSupplicantPeer *peer,
1442                                                                 int *length)
1443 {
1444         if (!peer || !length)
1445                 return NULL;
1446
1447         *length = peer->widi_ies_length;
1448         return peer->widi_ies;
1449 }
1450
1451 bool g_supplicant_peer_is_wps_pbc(GSupplicantPeer *peer)
1452 {
1453         if (!peer)
1454                 return false;
1455
1456         if (peer->wps_capabilities & G_SUPPLICANT_WPS_PBC)
1457                 return true;
1458
1459         return false;
1460 }
1461
1462 bool g_supplicant_peer_is_wps_pin(GSupplicantPeer *peer)
1463 {
1464         if (!peer)
1465                 return false;
1466
1467         if (peer->wps_capabilities & G_SUPPLICANT_WPS_PIN)
1468                 return true;
1469
1470         return false;
1471 }
1472
1473 bool g_supplicant_peer_is_in_a_group(GSupplicantPeer *peer)
1474 {
1475         if (!peer || !peer->groups)
1476                 return false;
1477
1478         return true;
1479 }
1480
1481 GSupplicantInterface *g_supplicant_peer_get_group_interface(GSupplicantPeer *peer)
1482 {
1483         if (!peer)
1484                 return NULL;
1485
1486         return (GSupplicantInterface *) peer->current_group_iface;
1487 }
1488
1489 bool g_supplicant_peer_is_client(GSupplicantPeer *peer)
1490 {
1491         GSupplicantGroup *group;
1492         GSList *list;
1493
1494         if (!peer)
1495                 return false;
1496
1497         for (list = peer->groups; list; list = list->next) {
1498                 const char *path = list->data;
1499
1500                 group = g_hash_table_lookup(group_mapping, path);
1501                 if (!group)
1502                         continue;
1503
1504                 if (group->role != G_SUPPLICANT_GROUP_ROLE_CLIENT ||
1505                                 group->orig_interface != peer->interface)
1506                         continue;
1507
1508                 if (group->interface == peer->current_group_iface)
1509                         return true;
1510         }
1511
1512         return false;
1513 }
1514
1515 bool g_supplicant_peer_has_requested_connection(GSupplicantPeer *peer)
1516 {
1517         if (!peer)
1518                 return false;
1519
1520         return peer->connection_requested;
1521 }
1522
1523 #if defined TIZEN_EXT
1524 /*
1525  * Description: Network client requires additional wifi specific info
1526  */
1527 const unsigned char *g_supplicant_network_get_bssid(GSupplicantNetwork *network)
1528 {
1529         if (network == NULL || network->best_bss == NULL)
1530                 return NULL;
1531
1532         return (const unsigned char *)network->best_bss->bssid;
1533 }
1534
1535 unsigned int g_supplicant_network_get_maxrate(GSupplicantNetwork *network)
1536 {
1537         if (network == NULL || network->best_bss == NULL)
1538                 return 0;
1539
1540         return network->best_bss->maxrate;
1541 }
1542
1543 const char *g_supplicant_network_get_enc_mode(GSupplicantNetwork *network)
1544 {
1545         if (network == NULL || network->best_bss == NULL)
1546                 return NULL;
1547
1548         if (network->best_bss->security == G_SUPPLICANT_SECURITY_PSK ||
1549             network->best_bss->security == G_SUPPLICANT_SECURITY_IEEE8021X) {
1550                 unsigned int pairwise;
1551
1552                 pairwise = network->best_bss->rsn_pairwise |
1553                                 network->best_bss->wpa_pairwise;
1554
1555                 if ((pairwise & G_SUPPLICANT_PAIRWISE_CCMP) &&
1556                     (pairwise & G_SUPPLICANT_PAIRWISE_TKIP))
1557                         return "mixed";
1558                 else if (pairwise & G_SUPPLICANT_PAIRWISE_CCMP)
1559                         return "aes";
1560                 else if (pairwise & G_SUPPLICANT_PAIRWISE_TKIP)
1561                         return "tkip";
1562
1563         } else if (network->best_bss->security == G_SUPPLICANT_SECURITY_WEP)
1564                 return "wep";
1565         else if (network->best_bss->security == G_SUPPLICANT_SECURITY_NONE)
1566                 return "none";
1567
1568         return NULL;
1569 }
1570
1571 bool g_supplicant_network_get_rsn_mode(GSupplicantNetwork *network)
1572 {
1573         if (network == NULL || network->best_bss == NULL)
1574                 return 0;
1575
1576         if (network->best_bss->rsn_selected) {
1577                 const char *mode = g_supplicant_network_get_enc_mode(network);
1578                 if (g_strcmp0(mode, "aes") == 0 ||
1579                                 g_strcmp0(mode, "mixed") == 0)
1580                         return true;
1581                 else
1582                         return false;
1583         } else
1584                 return false;
1585 }
1586
1587 void *g_supplicant_network_get_wifi_vsie(GSupplicantNetwork *network)
1588 {
1589         GSList *vsie_list = NULL;
1590
1591         if (!network)
1592                 return NULL;
1593
1594         if (g_slist_length(network->vsie_list) > 0) {
1595                 GSList *list = NULL;
1596                 unsigned char *vsie = NULL;
1597                 for (list = network->vsie_list; list; list = list->next) {
1598                         unsigned char *ie = (unsigned char *)list->data;
1599                         if (ie == NULL)
1600                                 continue;
1601                         vsie = (unsigned char *)g_try_malloc0(ie[1]+2); // tag number size(1), tag length size(1)
1602
1603                         if (vsie) {
1604                                 memcpy(vsie, ie, ie[1]+2);
1605                                 vsie_list = g_slist_append(vsie_list, vsie);
1606                         } else
1607                                 SUPPLICANT_DBG("Failed to allocate memory");
1608                 }
1609         }
1610
1611         return vsie_list;
1612 }
1613
1614 static void update_bssid_list(gpointer key, gpointer value, gpointer user_data)
1615 {
1616         struct g_supplicant_bss *bss = value;
1617         struct g_connman_bssids *bssids = NULL;
1618         char buff[18];
1619         GSList **list = (GSList **)user_data;
1620
1621         bssids = (struct g_connman_bssids *)g_try_malloc0(sizeof(struct g_connman_bssids));
1622
1623         if (bssids) {
1624                 g_snprintf(buff, 18, "%02x:%02x:%02x:%02x:%02x:%02x",
1625                                 bss->bssid[0], bss->bssid[1], bss->bssid[2], bss->bssid[3],
1626                                 bss->bssid[4], bss->bssid[5]);
1627
1628                 memcpy(bssids->bssid, buff, 18);
1629                 bssids->bssid[17] = '\0';
1630                 bssids->strength = bss->signal;
1631                 bssids->strength += 120;
1632
1633                 if (bssids->strength > 100)
1634                         bssids->strength = 100;
1635
1636                 bssids->frequency = bss->frequency;
1637                 *list = g_slist_append(*list, bssids);
1638         } else
1639                 SUPPLICANT_DBG("Failed to allocate memory");
1640 }
1641
1642 void *g_supplicant_network_get_bssid_list(GSupplicantNetwork *network)
1643 {
1644         GSList *bssid_list = NULL;
1645
1646         if (g_hash_table_size(network->bss_table) < 1)
1647                 return NULL;
1648
1649         g_hash_table_foreach(network->bss_table, update_bssid_list, &bssid_list);
1650
1651         return bssid_list;
1652 }
1653 #endif
1654
1655 static void merge_network(GSupplicantNetwork *network)
1656 {
1657         GString *str;
1658         const char *ssid, *mode, *key_mgmt;
1659 #if defined TIZEN_EXT
1660         const char *isHS20AP;
1661         const char *eap, *identity, *phase2;
1662 #endif
1663         unsigned int i, ssid_len;
1664         char *group;
1665
1666         ssid = g_hash_table_lookup(network->config_table, "ssid");
1667         mode = g_hash_table_lookup(network->config_table, "mode");
1668         key_mgmt = g_hash_table_lookup(network->config_table, "key_mgmt");
1669 #if defined TIZEN_EXT
1670         isHS20AP = g_hash_table_lookup(network->config_table, "isHS20AP");
1671         eap = g_hash_table_lookup(network->config_table, "eap");
1672         identity = g_hash_table_lookup(network->config_table, "identity");
1673         phase2 = g_hash_table_lookup(network->config_table, "phase2");
1674 #endif
1675
1676         SUPPLICANT_DBG("ssid %s mode %s", ssid, mode);
1677
1678         if (ssid)
1679                 ssid_len = strlen(ssid);
1680         else
1681                 ssid_len = 0;
1682
1683         str = g_string_sized_new((ssid_len * 2) + 24);
1684         if (!str)
1685                 return;
1686
1687         for (i = 0; i < ssid_len; i++)
1688 #if defined TIZEN_EXT
1689         {
1690                 if (ssid[i] != '"')
1691 #endif
1692                 g_string_append_printf(str, "%02x", ssid[i]);
1693 #if defined TIZEN_EXT
1694         }
1695 #endif
1696
1697         if (g_strcmp0(mode, "0") == 0)
1698                 g_string_append_printf(str, "_managed");
1699         else if (g_strcmp0(mode, "1") == 0)
1700                 g_string_append_printf(str, "_adhoc");
1701
1702         if (g_strcmp0(key_mgmt, "WPA-PSK") == 0)
1703                 g_string_append_printf(str, "_psk");
1704 #if defined TIZEN_EXT
1705         else if (g_strcmp0(key_mgmt, "WPA-EAP") == 0)
1706                 g_string_append_printf(str, "_ieee8021x");
1707         else
1708                 g_string_append_printf(str, "_none");
1709 #endif
1710
1711         group = g_string_free(str, FALSE);
1712
1713         SUPPLICANT_DBG("%s", group);
1714
1715 #if defined TIZEN_EXT
1716         if (g_strcmp0(isHS20AP, "1") == 0) {
1717                 network->isHS20AP = 1;
1718                 if (network->eap)
1719                         g_free(network->eap);
1720                 network->eap = g_strdup(eap);
1721
1722                 if (network->identity)
1723                         g_free(network->identity);
1724                 network->identity = g_strdup(identity);
1725
1726                 if (network->phase2)
1727                         g_free(network->phase2);
1728                 network->phase2 = g_strdup(phase2);
1729         } else
1730                 network->isHS20AP = 0;
1731
1732         network->group = g_strdup(group);
1733         callback_network_merged(network);
1734         g_free(network->group);
1735 #endif
1736
1737         g_free(group);
1738
1739         g_hash_table_destroy(network->config_table);
1740
1741         g_free(network->path);
1742         g_free(network);
1743 }
1744
1745 static void network_property(const char *key, DBusMessageIter *iter,
1746                                                         void *user_data)
1747 {
1748         GSupplicantNetwork *network = user_data;
1749
1750         if (!network->interface)
1751                 return;
1752
1753         if (!key) {
1754                 merge_network(network);
1755                 return;
1756         }
1757
1758         if (g_strcmp0(key, "Enabled") == 0) {
1759                 dbus_bool_t enabled = FALSE;
1760
1761                 dbus_message_iter_get_basic(iter, &enabled);
1762         } else if (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_STRING) {
1763                 const char *str = NULL;
1764
1765                 dbus_message_iter_get_basic(iter, &str);
1766                 if (str) {
1767                         g_hash_table_replace(network->config_table,
1768                                                 g_strdup(key), g_strdup(str));
1769                 }
1770         } else
1771                 SUPPLICANT_DBG("key %s type %c",
1772                                 key, dbus_message_iter_get_arg_type(iter));
1773 }
1774
1775 static void interface_network_added(DBusMessageIter *iter, void *user_data)
1776 {
1777         GSupplicantInterface *interface = user_data;
1778         GSupplicantNetwork *network;
1779         const char *path = NULL;
1780
1781         SUPPLICANT_DBG("");
1782
1783         dbus_message_iter_get_basic(iter, &path);
1784         if (!path)
1785                 return;
1786
1787         if (g_strcmp0(path, "/") == 0)
1788                 return;
1789
1790         network = g_try_new0(GSupplicantNetwork, 1);
1791         if (!network)
1792                 return;
1793
1794         network->interface = interface;
1795         network->path = g_strdup(path);
1796
1797         network->config_table = g_hash_table_new_full(g_str_hash, g_str_equal,
1798                                                         g_free, g_free);
1799
1800         dbus_message_iter_next(iter);
1801         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
1802                 supplicant_dbus_property_foreach(iter, network_property,
1803                                                                 network);
1804                 network_property(NULL, NULL, network);
1805                 return;
1806         }
1807
1808         supplicant_dbus_property_get_all(path,
1809                                 SUPPLICANT_INTERFACE ".Network",
1810                                         network_property, network, NULL);
1811 }
1812
1813 static void interface_network_removed(DBusMessageIter *iter, void *user_data)
1814 {
1815         SUPPLICANT_DBG("");
1816         return;
1817 }
1818
1819 static char *create_name(unsigned char *ssid, int ssid_len)
1820 {
1821         GString *string;
1822         const gchar *remainder, *invalid;
1823         int valid_bytes, remaining_bytes;
1824
1825         if (ssid_len < 1 || ssid[0] == '\0')
1826                 return g_strdup("");
1827
1828         string = NULL;
1829         remainder = (const gchar *)ssid;
1830         remaining_bytes = ssid_len;
1831
1832         while (remaining_bytes != 0) {
1833                 if (g_utf8_validate(remainder, remaining_bytes,
1834                                         &invalid)) {
1835                         break;
1836                 }
1837
1838                 valid_bytes = invalid - remainder;
1839
1840                 if (!string)
1841                         string = g_string_sized_new(remaining_bytes);
1842
1843                 g_string_append_len(string, remainder, valid_bytes);
1844
1845                 /* append U+FFFD REPLACEMENT CHARACTER */
1846                 g_string_append(string, "\357\277\275");
1847
1848                 remaining_bytes -= valid_bytes + 1;
1849                 remainder = invalid + 1;
1850         }
1851
1852         if (!string)
1853                 return g_strndup((const gchar *)ssid, ssid_len + 1);
1854
1855         g_string_append(string, remainder);
1856
1857         return g_string_free(string, FALSE);
1858 }
1859
1860 static char *create_group(struct g_supplicant_bss *bss)
1861 {
1862         GString *str;
1863         unsigned int i;
1864         const char *mode, *security;
1865
1866         str = g_string_sized_new((bss->ssid_len * 2) + 24);
1867         if (!str)
1868                 return NULL;
1869
1870         if (bss->ssid_len > 0 && bss->ssid[0] != '\0') {
1871                 for (i = 0; i < bss->ssid_len; i++)
1872                         g_string_append_printf(str, "%02x", bss->ssid[i]);
1873         } else
1874                 g_string_append_printf(str, "hidden");
1875
1876         mode = mode2string(bss->mode);
1877         if (mode)
1878                 g_string_append_printf(str, "_%s", mode);
1879
1880         security = security2string(bss->security);
1881         if (security)
1882                 g_string_append_printf(str, "_%s", security);
1883
1884         return g_string_free(str, FALSE);
1885 }
1886
1887 static int add_or_replace_bss_to_network(struct g_supplicant_bss *bss)
1888 {
1889         GSupplicantInterface *interface = bss->interface;
1890         GSupplicantNetwork *network;
1891         char *group;
1892
1893         group = create_group(bss);
1894         SUPPLICANT_DBG("New group created: %s", group);
1895
1896         if (!group)
1897                 return -ENOMEM;
1898
1899         network = g_hash_table_lookup(interface->network_table, group);
1900         if (network) {
1901                 g_free(group);
1902                 SUPPLICANT_DBG("Network %s already exist", network->name);
1903
1904                 goto done;
1905         }
1906
1907         network = g_try_new0(GSupplicantNetwork, 1);
1908         if (!network) {
1909                 g_free(group);
1910                 return -ENOMEM;
1911         }
1912
1913         network->interface = interface;
1914         if (!network->path)
1915                 network->path = g_strdup(bss->path);
1916         network->group = group;
1917         network->name = create_name(bss->ssid, bss->ssid_len);
1918         network->mode = bss->mode;
1919         network->security = bss->security;
1920         network->ssid_len = bss->ssid_len;
1921         memcpy(network->ssid, bss->ssid, bss->ssid_len);
1922         network->signal = bss->signal;
1923         network->frequency = bss->frequency;
1924         network->best_bss = bss;
1925
1926 #if defined TIZEN_EXT
1927         network->keymgmt = bss->keymgmt;
1928
1929         if (g_slist_length(bss->vsie_list) > 0) {
1930                 GSList *list = NULL;
1931                 unsigned char *vsie = NULL;
1932                 for (list = bss->vsie_list; list; list = list->next) {
1933                         unsigned char *ie = (unsigned char *)list->data;
1934                         vsie = (unsigned char *)g_try_malloc0(ie[1]+2); // tag number size(1), tag length size(1)
1935
1936                         if (vsie) {
1937                                 memcpy(vsie, ie, ie[1]+2);
1938                                 network->vsie_list = g_slist_append(network->vsie_list, vsie);
1939                         } else
1940                                 SUPPLICANT_DBG("Failed to allocate memory.");
1941                 }
1942         }
1943
1944         network->isHS20AP = bss->hs20;
1945         memcpy(network->country_code, bss->country_code, COUNTRY_CODE_LENGTH);
1946 #endif
1947
1948         SUPPLICANT_DBG("New network %s created", network->name);
1949
1950         network->bss_table = g_hash_table_new_full(g_str_hash, g_str_equal,
1951                                                         NULL, remove_bss);
1952
1953         network->config_table = g_hash_table_new_full(g_str_hash, g_str_equal,
1954                                                         g_free, g_free);
1955
1956         g_hash_table_replace(interface->network_table,
1957                                                 network->group, network);
1958
1959         callback_network_added(network);
1960
1961 done:
1962         /* We update network's WPS properties if only bss provides WPS. */
1963         if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
1964                 network->wps = TRUE;
1965                 network->wps_capabilities |= bss->wps_capabilities;
1966         }
1967
1968         /*
1969          * Do not change best BSS if we are connected. It will be done through
1970          * CurrentBSS property in case of misalignment with wpa_s or roaming.
1971          */
1972         if (network != interface->current_network &&
1973                                 bss->signal > network->signal) {
1974                 network->signal = bss->signal;
1975                 network->best_bss = bss;
1976                 callback_network_changed(network, "Signal");
1977         }
1978
1979         g_hash_table_replace(interface->bss_mapping, bss->path, network);
1980         g_hash_table_replace(network->bss_table, bss->path, bss);
1981
1982         g_hash_table_replace(bss_mapping, bss->path, interface);
1983
1984         return 0;
1985 }
1986
1987 static void bss_rates(DBusMessageIter *iter, void *user_data)
1988 {
1989         struct g_supplicant_bss *bss = user_data;
1990         dbus_uint32_t rate = 0;
1991
1992         dbus_message_iter_get_basic(iter, &rate);
1993         if (rate == 0)
1994                 return;
1995
1996         if (rate > bss->maxrate)
1997                 bss->maxrate = rate;
1998 }
1999
2000 static void bss_keymgmt(DBusMessageIter *iter, void *user_data)
2001 {
2002         unsigned int *keymgmt = user_data;
2003         const char *str = NULL;
2004         int i;
2005
2006         dbus_message_iter_get_basic(iter, &str);
2007         if (!str)
2008                 return;
2009
2010         for (i = 0; keymgmt_map[i].str; i++)
2011                 if (strcmp(str, keymgmt_map[i].str) == 0) {
2012                         SUPPLICANT_DBG("Keymgmt: %s", str);
2013                         *keymgmt |= keymgmt_map[i].val;
2014                         break;
2015                 }
2016 }
2017
2018 static void bss_group(DBusMessageIter *iter, void *user_data)
2019 {
2020         unsigned int *group = user_data;
2021         const char *str = NULL;
2022         int i;
2023
2024         dbus_message_iter_get_basic(iter, &str);
2025         if (!str)
2026                 return;
2027
2028         for (i = 0; group_map[i].str; i++)
2029                 if (strcmp(str, group_map[i].str) == 0) {
2030                         SUPPLICANT_DBG("Group: %s", str);
2031                         *group |= group_map[i].val;
2032                         break;
2033                 }
2034 }
2035
2036 static void bss_pairwise(DBusMessageIter *iter, void *user_data)
2037 {
2038         unsigned int *pairwise = user_data;
2039         const char *str = NULL;
2040         int i;
2041
2042         dbus_message_iter_get_basic(iter, &str);
2043         if (!str)
2044                 return;
2045
2046         for (i = 0; pairwise_map[i].str; i++)
2047                 if (strcmp(str, pairwise_map[i].str) == 0) {
2048                         SUPPLICANT_DBG("Pairwise: %s", str);
2049                         *pairwise |= pairwise_map[i].val;
2050                         break;
2051                 }
2052 }
2053
2054 static void bss_wpa(const char *key, DBusMessageIter *iter,
2055                         void *user_data)
2056 {
2057         struct g_supplicant_bss *bss = user_data;
2058         unsigned int value = 0;
2059
2060         SUPPLICANT_DBG("Key: %s", key);
2061
2062         if (g_strcmp0(key, "KeyMgmt") == 0) {
2063                 supplicant_dbus_array_foreach(iter, bss_keymgmt, &value);
2064
2065                 if (bss->rsn_selected)
2066                         bss->rsn_keymgmt = value;
2067                 else
2068                         bss->wpa_keymgmt = value;
2069         } else if (g_strcmp0(key, "Group") == 0) {
2070                 supplicant_dbus_array_foreach(iter, bss_group, &value);
2071
2072                 if (bss->rsn_selected)
2073                         bss->rsn_group = value;
2074                 else
2075                         bss->wpa_group = value;
2076         } else if (g_strcmp0(key, "Pairwise") == 0) {
2077                 supplicant_dbus_array_foreach(iter, bss_pairwise, &value);
2078
2079                 if (bss->rsn_selected)
2080                         bss->rsn_pairwise = value;
2081                 else
2082                         bss->wpa_pairwise = value;
2083         }
2084 }
2085
2086 static unsigned int get_tlv(unsigned char *ie, unsigned int ie_size,
2087                                                         unsigned int type)
2088 {
2089         unsigned int len = 0;
2090
2091         while (len + 4 < ie_size) {
2092                 unsigned int hi = ie[len];
2093                 unsigned int lo = ie[len + 1];
2094                 unsigned int tmp_type = (hi << 8) + lo;
2095                 unsigned int v_len = 0;
2096
2097                 /* hi and lo are used to recreate an unsigned int
2098                  * based on 2 8bits length unsigned int. */
2099
2100                 hi = ie[len + 2];
2101                 lo = ie[len + 3];
2102                 v_len = (hi << 8) + lo;
2103
2104                 if (tmp_type == type) {
2105                         unsigned int ret_value = 0;
2106                         unsigned char *value = (unsigned char *)&ret_value;
2107
2108                         SUPPLICANT_DBG("IE: match type 0x%x", type);
2109
2110                         /* Verifying length relevance */
2111                         if (v_len > sizeof(unsigned int) ||
2112                                 len + 4 + v_len > ie_size)
2113                                 break;
2114
2115                         memcpy(value, ie + len + 4, v_len);
2116
2117                         SUPPLICANT_DBG("returning 0x%x", ret_value);
2118                         return ret_value;
2119                 }
2120
2121                 len += v_len + 4;
2122         }
2123
2124         SUPPLICANT_DBG("returning 0");
2125         return 0;
2126 }
2127
2128 static void bss_process_ies(DBusMessageIter *iter, void *user_data)
2129 {
2130         struct g_supplicant_bss *bss = user_data;
2131         const unsigned char WPS_OUI[] = { 0x00, 0x50, 0xf2, 0x04 };
2132         unsigned char *ie, *ie_end;
2133         DBusMessageIter array;
2134         unsigned int value;
2135         int ie_len;
2136
2137 #define WMM_WPA1_WPS_INFO 221
2138 #define WPS_INFO_MIN_LEN  6
2139 #define WPS_VERSION_TLV   0x104A
2140 #define WPS_STATE_TLV     0x1044
2141 #define WPS_METHODS_TLV   0x1012
2142 #define WPS_REGISTRAR_TLV 0x1041
2143 #define WPS_VERSION       0x10
2144 #define WPS_PBC           0x04
2145 #define WPS_PIN           0x00
2146 #define WPS_CONFIGURED    0x02
2147 #if defined TIZEN_EXT
2148 #define VENDOR_SPECIFIC_INFO 0xDD
2149 #define WLAN_EID_COUNTRY 7
2150 #endif
2151
2152         dbus_message_iter_recurse(iter, &array);
2153         dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
2154
2155         if (!ie || ie_len < 2)
2156                 return;
2157
2158         bss->wps_capabilities = 0;
2159         bss->keymgmt = 0;
2160         memset(bss->country_code, 0, COUNTRY_CODE_LENGTH);
2161
2162         for (ie_end = ie + ie_len; ie < ie_end && ie + ie[1] + 1 <= ie_end;
2163                                                         ie += ie[1] + 2) {
2164 #if defined TIZEN_EXT
2165                 unsigned char *vsie;
2166                 int vsie_len = 0;
2167                 if(ie[0] == VENDOR_SPECIFIC_INFO && memcmp(ie+2, WPS_OUI, sizeof(WPS_OUI)) != 0) {
2168                         SUPPLICANT_DBG("IE: match vendor specific data");
2169
2170                         vsie_len = ie[1]+2;     // tag number size(1), tag length size(1)
2171                         vsie = (unsigned char *)g_try_malloc0(vsie_len);
2172
2173                         if (vsie) {
2174                                 memcpy(vsie, ie, vsie_len);
2175                                 bss->vsie_list = g_slist_append(bss->vsie_list, vsie);
2176                         } else
2177                                 SUPPLICANT_DBG("Failed to allocate memory");
2178                         continue;
2179                 }
2180
2181                 if(ie[0] == WLAN_EID_COUNTRY && ie[1] >= 2) {
2182                         /* Add country code only if it is a valid alphabet */
2183                         if (ie[2] >= 65 && ie[2] <= 90 && ie[3] >= 65 && ie[3] <= 90) {
2184                                 memcpy(bss->country_code, ie+2, COUNTRY_CODE_LENGTH);
2185                                 continue;
2186                         }
2187                 }
2188 #endif
2189                 if (ie[0] != WMM_WPA1_WPS_INFO || ie[1] < WPS_INFO_MIN_LEN ||
2190                         memcmp(ie+2, WPS_OUI, sizeof(WPS_OUI)) != 0)
2191                         continue;
2192
2193                 SUPPLICANT_DBG("IE: match WPS_OUI");
2194
2195                 value = get_tlv(&ie[6], ie[1], WPS_STATE_TLV);
2196                 if (get_tlv(&ie[6], ie[1], WPS_VERSION_TLV) == WPS_VERSION &&
2197                                                                 value != 0) {
2198                         bss->keymgmt |= G_SUPPLICANT_KEYMGMT_WPS;
2199
2200                         if (value == WPS_CONFIGURED)
2201                                 bss->wps_capabilities |=
2202                                         G_SUPPLICANT_WPS_CONFIGURED;
2203                 }
2204
2205                 value = get_tlv(&ie[6], ie[1], WPS_METHODS_TLV);
2206                 if (value != 0) {
2207                         if (GUINT16_FROM_BE(value) == WPS_PBC)
2208                                 bss->wps_capabilities |= G_SUPPLICANT_WPS_PBC;
2209                         if (GUINT16_FROM_BE(value) == WPS_PIN)
2210                                 bss->wps_capabilities |= G_SUPPLICANT_WPS_PIN;
2211                 } else
2212                         bss->wps_capabilities |=
2213                                 G_SUPPLICANT_WPS_PBC | G_SUPPLICANT_WPS_PIN;
2214
2215                 /* If the AP sends this it means it's advertizing
2216                  * as a registrar and the WPS process is launched
2217                  * on its side */
2218                 if (get_tlv(&ie[6], ie[1], WPS_REGISTRAR_TLV) != 0)
2219                         bss->wps_capabilities |= G_SUPPLICANT_WPS_REGISTRAR;
2220
2221                 SUPPLICANT_DBG("WPS Methods 0x%x", bss->wps_capabilities);
2222         }
2223 }
2224
2225 static void bss_compute_security(struct g_supplicant_bss *bss)
2226 {
2227         /*
2228          * Combining RSN and WPA keymgmt
2229          * We combine it since parsing IEs might have set something for WPS. */
2230         bss->keymgmt |= bss->rsn_keymgmt | bss->wpa_keymgmt;
2231
2232         bss->ieee8021x = FALSE;
2233         bss->psk = FALSE;
2234 #if defined TIZEN_EXT
2235         bss->ft_ieee8021x = FALSE;
2236         bss->ft_psk = FALSE;
2237 #endif
2238
2239 #if defined TIZEN_EXT
2240         if (bss->keymgmt &
2241                         (G_SUPPLICANT_KEYMGMT_WPA_EAP |
2242                                         G_SUPPLICANT_KEYMGMT_WPA_EAP_256))
2243                 bss->ieee8021x = TRUE;
2244         else if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_EAP)
2245                 bss->ft_ieee8021x = TRUE;
2246 #else
2247         if (bss->keymgmt &
2248                         (G_SUPPLICANT_KEYMGMT_WPA_EAP |
2249                                 G_SUPPLICANT_KEYMGMT_WPA_FT_EAP |
2250                                 G_SUPPLICANT_KEYMGMT_WPA_EAP_256))
2251                 bss->ieee8021x = TRUE;
2252 #endif
2253
2254 #if defined TIZEN_EXT
2255         if (bss->keymgmt &
2256                         (G_SUPPLICANT_KEYMGMT_WPA_PSK |
2257                                         G_SUPPLICANT_KEYMGMT_WPA_PSK_256))
2258                 bss->psk = TRUE;
2259         else if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_PSK)
2260                 bss->ft_psk = TRUE;
2261 #else
2262         if (bss->keymgmt &
2263                         (G_SUPPLICANT_KEYMGMT_WPA_PSK |
2264                                 G_SUPPLICANT_KEYMGMT_WPA_FT_PSK |
2265                                 G_SUPPLICANT_KEYMGMT_WPA_PSK_256))
2266                 bss->psk = TRUE;
2267 #endif
2268
2269         if (bss->ieee8021x)
2270                 bss->security = G_SUPPLICANT_SECURITY_IEEE8021X;
2271         else if (bss->psk)
2272                 bss->security = G_SUPPLICANT_SECURITY_PSK;
2273 #if defined TIZEN_EXT
2274         else if (bss->ft_psk)
2275                 bss->security = G_SUPPLICANT_SECURITY_FT_PSK;
2276         else if (bss->ft_ieee8021x == TRUE)
2277                 bss->security = G_SUPPLICANT_SECURITY_IEEE8021X;
2278 #endif
2279         else if (bss->privacy)
2280                 bss->security = G_SUPPLICANT_SECURITY_WEP;
2281         else
2282                 bss->security = G_SUPPLICANT_SECURITY_NONE;
2283 }
2284
2285
2286 static void bss_property(const char *key, DBusMessageIter *iter,
2287                                                         void *user_data)
2288 {
2289         struct g_supplicant_bss *bss = user_data;
2290
2291         if (!bss->interface)
2292                 return;
2293
2294         SUPPLICANT_DBG("key %s", key);
2295
2296         if (!key)
2297                 return;
2298
2299         if (g_strcmp0(key, "BSSID") == 0) {
2300                 DBusMessageIter array;
2301                 unsigned char *addr;
2302                 int addr_len;
2303
2304                 dbus_message_iter_recurse(iter, &array);
2305                 dbus_message_iter_get_fixed_array(&array, &addr, &addr_len);
2306
2307                 if (addr_len == 6)
2308                         memcpy(bss->bssid, addr, addr_len);
2309         } else if (g_strcmp0(key, "SSID") == 0) {
2310                 DBusMessageIter array;
2311                 unsigned char *ssid;
2312                 int ssid_len;
2313
2314                 dbus_message_iter_recurse(iter, &array);
2315                 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
2316
2317                 if (ssid_len > 0 && ssid_len < 33) {
2318                         memcpy(bss->ssid, ssid, ssid_len);
2319                         bss->ssid_len = ssid_len;
2320                 } else {
2321                         memset(bss->ssid, 0, sizeof(bss->ssid));
2322                         bss->ssid_len = 0;
2323                 }
2324         } else if (g_strcmp0(key, "Capabilities") == 0) {
2325                 dbus_uint16_t capabilities = 0x0000;
2326
2327                 dbus_message_iter_get_basic(iter, &capabilities);
2328
2329                 if (capabilities & IEEE80211_CAP_ESS)
2330                         bss->mode = G_SUPPLICANT_MODE_INFRA;
2331                 else if (capabilities & IEEE80211_CAP_IBSS)
2332                         bss->mode = G_SUPPLICANT_MODE_IBSS;
2333
2334                 if (capabilities & IEEE80211_CAP_PRIVACY)
2335                         bss->privacy = TRUE;
2336         } else if (g_strcmp0(key, "Mode") == 0) {
2337                 const char *mode = NULL;
2338
2339                 dbus_message_iter_get_basic(iter, &mode);
2340                 bss->mode = string2mode(mode);
2341         } else if (g_strcmp0(key, "Frequency") == 0) {
2342                 dbus_uint16_t frequency = 0;
2343
2344                 dbus_message_iter_get_basic(iter, &frequency);
2345                 bss->frequency = frequency;
2346         } else if (g_strcmp0(key, "Signal") == 0) {
2347                 dbus_int16_t signal = 0;
2348
2349                 dbus_message_iter_get_basic(iter, &signal);
2350
2351                 bss->signal = signal;
2352                 if (!bss->signal)
2353                         bss->signal = BSS_UNKNOWN_STRENGTH;
2354
2355         } else if (g_strcmp0(key, "Level") == 0) {
2356                 dbus_int32_t level = 0;
2357
2358                 dbus_message_iter_get_basic(iter, &level);
2359         } else if (g_strcmp0(key, "Rates") == 0) {
2360                 supplicant_dbus_array_foreach(iter, bss_rates, bss);
2361         } else if (g_strcmp0(key, "MaxRate") == 0) {
2362                 dbus_uint32_t maxrate = 0;
2363
2364                 dbus_message_iter_get_basic(iter, &maxrate);
2365                 if (maxrate != 0)
2366                         bss->maxrate = maxrate;
2367         } else if (g_strcmp0(key, "Privacy") == 0) {
2368                 dbus_bool_t privacy = FALSE;
2369
2370                 dbus_message_iter_get_basic(iter, &privacy);
2371                 bss->privacy = privacy;
2372         } else if (g_strcmp0(key, "RSN") == 0) {
2373                 bss->rsn_selected = TRUE;
2374
2375                 supplicant_dbus_property_foreach(iter, bss_wpa, bss);
2376         } else if (g_strcmp0(key, "WPA") == 0) {
2377                 bss->rsn_selected = FALSE;
2378
2379                 supplicant_dbus_property_foreach(iter, bss_wpa, bss);
2380 #if defined TIZEN_EXT
2381         } else if (g_strcmp0(key, "HS20") == 0) {
2382                 dbus_bool_t hs20 = FALSE;
2383                 dbus_message_iter_get_basic(iter, &hs20);
2384                 bss->hs20 = hs20;
2385 #endif
2386         } else if (g_strcmp0(key, "IEs") == 0)
2387                 bss_process_ies(iter, bss);
2388         else
2389                 SUPPLICANT_DBG("key %s type %c",
2390                                 key, dbus_message_iter_get_arg_type(iter));
2391 }
2392
2393 static struct g_supplicant_bss *interface_bss_added(DBusMessageIter *iter,
2394                                                         void *user_data)
2395 {
2396         GSupplicantInterface *interface = user_data;
2397         GSupplicantNetwork *network;
2398         struct g_supplicant_bss *bss;
2399         const char *path = NULL;
2400
2401         SUPPLICANT_DBG("");
2402
2403         dbus_message_iter_get_basic(iter, &path);
2404         if (!path)
2405                 return NULL;
2406
2407         if (g_strcmp0(path, "/") == 0)
2408                 return NULL;
2409
2410         SUPPLICANT_DBG("%s", path);
2411
2412         network = g_hash_table_lookup(interface->bss_mapping, path);
2413         if (network) {
2414                 bss = g_hash_table_lookup(network->bss_table, path);
2415                 if (bss)
2416                         return NULL;
2417         }
2418
2419         bss = g_try_new0(struct g_supplicant_bss, 1);
2420         if (!bss)
2421                 return NULL;
2422
2423         bss->interface = interface;
2424         bss->path = g_strdup(path);
2425         bss->signal = BSS_UNKNOWN_STRENGTH;
2426
2427         return bss;
2428 }
2429
2430 static void interface_bss_added_with_keys(DBusMessageIter *iter,
2431                                                 void *user_data)
2432 {
2433         struct g_supplicant_bss *bss;
2434
2435         SUPPLICANT_DBG("");
2436
2437         bss = interface_bss_added(iter, user_data);
2438         if (!bss)
2439                 return;
2440
2441         dbus_message_iter_next(iter);
2442
2443         if (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_INVALID)
2444                 return;
2445
2446         supplicant_dbus_property_foreach(iter, bss_property, bss);
2447
2448         bss_compute_security(bss);
2449         if (add_or_replace_bss_to_network(bss) < 0)
2450                 SUPPLICANT_DBG("add_or_replace_bss_to_network failed");
2451 }
2452
2453 static void interface_bss_added_without_keys(DBusMessageIter *iter,
2454                                                 void *user_data)
2455 {
2456         struct g_supplicant_bss *bss;
2457
2458         SUPPLICANT_DBG("");
2459
2460         bss = interface_bss_added(iter, user_data);
2461         if (!bss)
2462                 return;
2463
2464         supplicant_dbus_property_get_all(bss->path,
2465                                         SUPPLICANT_INTERFACE ".BSS",
2466                                         bss_property, bss, NULL);
2467
2468         bss_compute_security(bss);
2469         if (add_or_replace_bss_to_network(bss) < 0)
2470                         SUPPLICANT_DBG("add_or_replace_bss_to_network failed");
2471 }
2472
2473 static void update_signal(gpointer key, gpointer value,
2474                                                 gpointer user_data)
2475 {
2476         struct g_supplicant_bss *bss = value;
2477         GSupplicantNetwork *network = user_data;
2478
2479         if (bss->signal > network->signal) {
2480                 network->signal = bss->signal;
2481                 network->best_bss = bss;
2482         }
2483 }
2484
2485 static void update_network_signal(GSupplicantNetwork *network)
2486 {
2487         if (g_hash_table_size(network->bss_table) <= 1 && network->best_bss)
2488                 return;
2489
2490         g_hash_table_foreach(network->bss_table,
2491                                 update_signal, network);
2492
2493         SUPPLICANT_DBG("New network signal %d", network->signal);
2494 }
2495
2496 static void interface_current_bss(GSupplicantInterface *interface,
2497                                                 DBusMessageIter *iter)
2498 {
2499         GSupplicantNetwork *network;
2500         struct g_supplicant_bss *bss;
2501         const char *path;
2502
2503         dbus_message_iter_get_basic(iter, &path);
2504         if (g_strcmp0(path, "/") == 0) {
2505                 interface->current_network = NULL;
2506                 return;
2507         }
2508
2509         interface_bss_added_without_keys(iter, interface);
2510
2511         network = g_hash_table_lookup(interface->bss_mapping, path);
2512         if (!network)
2513                 return;
2514
2515         bss = g_hash_table_lookup(network->bss_table, path);
2516         if (!bss)
2517                 return;
2518
2519         interface->current_network = network;
2520
2521         if (bss != network->best_bss) {
2522                 /*
2523                  * This is the case where either wpa_s got associated
2524                  * to a BSS different than the one ConnMan considers
2525                  * the best, or we are roaming.
2526                  */
2527                 SUPPLICANT_DBG("Update best BSS for %s", network->name);
2528
2529                 network->best_bss = bss;
2530
2531                 if (network->signal != bss->signal) {
2532                         SUPPLICANT_DBG("New network signal %d dBm",
2533                                                 bss->signal);
2534
2535                         network->signal = bss->signal;
2536                         callback_network_changed(network, "Signal");
2537                 }
2538         }
2539
2540         /*
2541          * wpa_s could notify about CurrentBSS in any state once
2542          * it got associated. It is not sure such notification will
2543          * arrive together with transition to ASSOCIATED state.
2544          * In fact, for networks with security WEP or OPEN, it
2545          * always arrives together with transition to COMPLETED.
2546          */
2547         switch (interface->state) {
2548         case G_SUPPLICANT_STATE_UNKNOWN:
2549         case G_SUPPLICANT_STATE_DISABLED:
2550         case G_SUPPLICANT_STATE_DISCONNECTED:
2551         case G_SUPPLICANT_STATE_INACTIVE:
2552         case G_SUPPLICANT_STATE_SCANNING:
2553         case G_SUPPLICANT_STATE_AUTHENTICATING:
2554         case G_SUPPLICANT_STATE_ASSOCIATING:
2555                 return;
2556         case G_SUPPLICANT_STATE_ASSOCIATED:
2557         case G_SUPPLICANT_STATE_4WAY_HANDSHAKE:
2558         case G_SUPPLICANT_STATE_GROUP_HANDSHAKE:
2559         case G_SUPPLICANT_STATE_COMPLETED:
2560                 callback_network_associated(network);
2561                 break;
2562         }
2563 }
2564
2565 static void interface_bss_removed(DBusMessageIter *iter, void *user_data)
2566 {
2567         GSupplicantInterface *interface = user_data;
2568         GSupplicantNetwork *network;
2569         struct g_supplicant_bss *bss = NULL;
2570         const char *path = NULL;
2571
2572         dbus_message_iter_get_basic(iter, &path);
2573         if (!path)
2574                 return;
2575
2576         network = g_hash_table_lookup(interface->bss_mapping, path);
2577         if (!network)
2578                 return;
2579
2580         bss = g_hash_table_lookup(network->bss_table, path);
2581         if (network->best_bss == bss) {
2582                 network->best_bss = NULL;
2583                 network->signal = BSS_UNKNOWN_STRENGTH;
2584         }
2585
2586         g_hash_table_remove(bss_mapping, path);
2587
2588         g_hash_table_remove(interface->bss_mapping, path);
2589         g_hash_table_remove(network->bss_table, path);
2590
2591         update_network_signal(network);
2592
2593         if (g_hash_table_size(network->bss_table) == 0)
2594                 g_hash_table_remove(interface->network_table, network->group);
2595 }
2596
2597 static void set_config_methods(DBusMessageIter *iter, void *user_data)
2598 {
2599         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, user_data);
2600 }
2601
2602 static void wps_property(const char *key, DBusMessageIter *iter,
2603                                                         void *user_data)
2604 {
2605         GSupplicantInterface *interface = user_data;
2606
2607         if (!interface)
2608                 return;
2609
2610         SUPPLICANT_DBG("key: %s", key);
2611
2612         if (g_strcmp0(key, "ConfigMethods") == 0) {
2613                 const char *config_methods = "push_button", *str = NULL;
2614
2615                 dbus_message_iter_get_basic(iter, &str);
2616                 if (str && strlen(str) > 0) {
2617                         /* It was already set at wpa_s level, don't modify it. */
2618                         SUPPLICANT_DBG("%s", str);
2619                         return;
2620                 }
2621
2622                 supplicant_dbus_property_set(interface->path,
2623                         SUPPLICANT_INTERFACE ".Interface.WPS",
2624                         "ConfigMethods", DBUS_TYPE_STRING_AS_STRING,
2625                         set_config_methods, NULL, &config_methods, NULL);
2626
2627                 SUPPLICANT_DBG("No value. Set %s", config_methods);
2628         }
2629
2630 }
2631
2632 static void interface_property(const char *key, DBusMessageIter *iter,
2633                                                         void *user_data)
2634 {
2635         GSupplicantInterface *interface = user_data;
2636
2637         if (!interface)
2638                 return;
2639
2640         SUPPLICANT_DBG("%s", key);
2641
2642         if (!key) {
2643                 debug_strvalmap("KeyMgmt capability", keymgmt_map,
2644                                                 interface->keymgmt_capa);
2645                 debug_strvalmap("AuthAlg capability", authalg_capa_map,
2646                                                 interface->authalg_capa);
2647                 debug_strvalmap("Protocol capability", proto_capa_map,
2648                                                 interface->proto_capa);
2649                 debug_strvalmap("Pairwise capability", pairwise_map,
2650                                                 interface->pairwise_capa);
2651                 debug_strvalmap("Group capability", group_map,
2652                                                 interface->group_capa);
2653                 debug_strvalmap("Scan capability", scan_capa_map,
2654                                                 interface->scan_capa);
2655                 debug_strvalmap("Mode capability", mode_capa_map,
2656                                                 interface->mode_capa);
2657
2658                 supplicant_dbus_property_get_all(interface->path,
2659                                 SUPPLICANT_INTERFACE ".Interface.WPS",
2660                                 wps_property, interface, interface);
2661
2662                 if (interface->ready)
2663                         callback_interface_added(interface);
2664
2665                 return;
2666         }
2667
2668         if (g_strcmp0(key, "Capabilities") == 0) {
2669                 supplicant_dbus_property_foreach(iter, interface_capability,
2670                                                                 interface);
2671 #if !defined TIZEN_EXT
2672                 if (interface->mode_capa & G_SUPPLICANT_CAPABILITY_MODE_P2P)
2673                         interface->p2p_support = true;
2674 #endif
2675         } else if (g_strcmp0(key, "State") == 0) {
2676                 const char *str = NULL;
2677
2678                 dbus_message_iter_get_basic(iter, &str);
2679                 if (str)
2680                         if (string2state(str) != interface->state) {
2681                                 interface->state = string2state(str);
2682                                 callback_interface_state(interface);
2683                         }
2684
2685                 if (interface->ap_create_in_progress) {
2686                         if (interface->state == G_SUPPLICANT_STATE_DISCONNECTED)
2687                                 callback_ap_create_fail(interface);
2688
2689                         interface->ap_create_in_progress = false;
2690                 }
2691
2692                 if (interface->state == G_SUPPLICANT_STATE_DISABLED)
2693                         interface->ready = FALSE;
2694                 else
2695                         interface->ready = TRUE;
2696
2697                 SUPPLICANT_DBG("state %s (%d)", str, interface->state);
2698         } else if (g_strcmp0(key, "Scanning") == 0) {
2699                 dbus_bool_t scanning = FALSE;
2700
2701                 dbus_message_iter_get_basic(iter, &scanning);
2702                 interface->scanning = scanning;
2703
2704                 if (interface->ready) {
2705                         if (interface->scanning)
2706                                 callback_scan_started(interface);
2707                         else
2708                                 callback_scan_finished(interface);
2709                 }
2710         } else if (g_strcmp0(key, "ApScan") == 0) {
2711                 int apscan = 1;
2712
2713                 dbus_message_iter_get_basic(iter, &apscan);
2714                 interface->apscan = apscan;
2715         } else if (g_strcmp0(key, "Ifname") == 0) {
2716                 const char *str = NULL;
2717
2718                 dbus_message_iter_get_basic(iter, &str);
2719                 if (str) {
2720                         g_free(interface->ifname);
2721                         interface->ifname = g_strdup(str);
2722                 }
2723         } else if (g_strcmp0(key, "Driver") == 0) {
2724                 const char *str = NULL;
2725
2726                 dbus_message_iter_get_basic(iter, &str);
2727                 if (str) {
2728                         g_free(interface->driver);
2729                         interface->driver = g_strdup(str);
2730                 }
2731         } else if (g_strcmp0(key, "BridgeIfname") == 0) {
2732                 const char *str = NULL;
2733
2734                 dbus_message_iter_get_basic(iter, &str);
2735                 if (str) {
2736                         g_free(interface->bridge);
2737                         interface->bridge = g_strdup(str);
2738                 }
2739         } else if (g_strcmp0(key, "ConfigFile") == 0) {
2740                 const char *str = NULL;
2741
2742                 dbus_message_iter_get_basic(iter, &str);
2743                 if (str && strlen(str) > 0 && interface->ifname) {
2744                         SUPPLICANT_DBG("New {%s, %s}", interface->ifname, str);
2745                         g_hash_table_replace(config_file_table,
2746                                 g_strdup(interface->ifname), g_strdup(str));
2747                 }
2748         } else if (g_strcmp0(key, "CurrentBSS") == 0) {
2749                 interface_current_bss(interface, iter);
2750         } else if (g_strcmp0(key, "CurrentNetwork") == 0) {
2751 #if defined TIZEN_EXT
2752                 if (interface->state != G_SUPPLICANT_STATE_COMPLETED)
2753 #endif
2754                 interface_network_added(iter, interface);
2755         } else if (g_strcmp0(key, "BSSs") == 0) {
2756                 supplicant_dbus_array_foreach(iter,
2757                                         interface_bss_added_without_keys,
2758                                         interface);
2759         } else if (g_strcmp0(key, "Blobs") == 0) {
2760                 /* Nothing */
2761         } else if (g_strcmp0(key, "Networks") == 0) {
2762                 supplicant_dbus_array_foreach(iter, interface_network_added,
2763                                                                 interface);
2764         } else if (g_strcmp0(key, "DisconnectReason") == 0) {
2765                 int reason_code;
2766                 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
2767                         dbus_message_iter_get_basic(iter, &reason_code);
2768                         callback_disconnect_reason_code(interface, reason_code);
2769                 }
2770         } else if (g_strcmp0(key, "AssocStatusCode") == 0) {
2771                 int status_code;
2772                 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
2773                         dbus_message_iter_get_basic(iter, &status_code);
2774                         callback_assoc_status_code(interface, status_code);
2775                 }
2776         } else {
2777                 SUPPLICANT_DBG("key %s type %c",
2778                                 key, dbus_message_iter_get_arg_type(iter));
2779         }
2780 }
2781
2782 static void scan_network_update(DBusMessageIter *iter, void *user_data)
2783 {
2784         GSupplicantInterface *interface = user_data;
2785         GSupplicantNetwork *network;
2786         char *path;
2787
2788         if (!iter)
2789                 return;
2790
2791         dbus_message_iter_get_basic(iter, &path);
2792
2793         if (!path)
2794                 return;
2795
2796         if (g_strcmp0(path, "/") == 0)
2797                 return;
2798
2799         /* Update the network details based on scan BSS data */
2800         network = g_hash_table_lookup(interface->bss_mapping, path);
2801         if (network)
2802                 callback_network_added(network);
2803 }
2804
2805 static void scan_bss_data(const char *key, DBusMessageIter *iter,
2806                                 void *user_data)
2807 {
2808         GSupplicantInterface *interface = user_data;
2809
2810 /*Fixed : stucking in scanning state when scan failed*/
2811 #if defined TIZEN_EXT
2812                 GSupplicantInterfaceCallback scan_callback;
2813 #endif
2814
2815         if (iter)
2816                 supplicant_dbus_array_foreach(iter, scan_network_update,
2817                                                 interface);
2818
2819 #if defined TIZEN_EXT
2820                 scan_callback = interface->scan_callback;
2821 #endif
2822
2823         if (interface->scan_callback)
2824                 interface->scan_callback(0, interface, interface->scan_data);
2825
2826 #if defined TIZEN_EXT
2827                 if (interface->scan_callback == scan_callback) {
2828 #endif
2829         interface->scan_callback = NULL;
2830         interface->scan_data = NULL;
2831 #if defined TIZEN_EXT
2832         }
2833 #endif
2834 }
2835
2836 static GSupplicantInterface *interface_alloc(const char *path)
2837 {
2838         GSupplicantInterface *interface;
2839
2840         interface = g_try_new0(GSupplicantInterface, 1);
2841         if (!interface)
2842                 return NULL;
2843
2844         interface->path = g_strdup(path);
2845
2846         interface->network_table = g_hash_table_new_full(g_str_hash,
2847                                         g_str_equal, NULL, remove_network);
2848         interface->peer_table = g_hash_table_new_full(g_str_hash,
2849                                         g_str_equal, NULL, remove_peer);
2850         interface->group_table = g_hash_table_new_full(g_str_hash,
2851                                         g_str_equal, NULL, remove_group);
2852         interface->bss_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
2853                                                                 NULL, NULL);
2854
2855         g_hash_table_replace(interface_table, interface->path, interface);
2856
2857         return interface;
2858 }
2859
2860 static void interface_added(DBusMessageIter *iter, void *user_data)
2861 {
2862         GSupplicantInterface *interface;
2863         const char *path = NULL;
2864         bool properties_appended = GPOINTER_TO_UINT(user_data);
2865
2866         SUPPLICANT_DBG("");
2867
2868         dbus_message_iter_get_basic(iter, &path);
2869         if (!path)
2870                 return;
2871
2872         if (g_strcmp0(path, "/") == 0)
2873                 return;
2874
2875         interface = g_hash_table_lookup(interface_table, path);
2876         if (interface)
2877                 return;
2878
2879         interface = interface_alloc(path);
2880         if (!interface)
2881                 return;
2882
2883         if (!properties_appended) {
2884                 supplicant_dbus_property_get_all(path,
2885                                                 SUPPLICANT_INTERFACE ".Interface",
2886                                                 interface_property, interface,
2887                                                 interface);
2888                 return;
2889         }
2890
2891         dbus_message_iter_next(iter);
2892         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
2893                 supplicant_dbus_property_foreach(iter, interface_property,
2894                                                                 interface);
2895                 interface_property(NULL, NULL, interface);
2896         }
2897 }
2898
2899 static void interface_removed(DBusMessageIter *iter, void *user_data)
2900 {
2901         const char *path = NULL;
2902         GSupplicantInterface *interface = user_data;
2903
2904         dbus_message_iter_get_basic(iter, &path);
2905         if (!path)
2906                 return;
2907
2908         interface = g_hash_table_lookup(interface_table, path);
2909         g_supplicant_interface_cancel(interface);
2910
2911         g_hash_table_remove(interface_table, path);
2912 }
2913
2914 static void eap_method(DBusMessageIter *iter, void *user_data)
2915 {
2916         const char *str = NULL;
2917         int i;
2918
2919         dbus_message_iter_get_basic(iter, &str);
2920         if (!str)
2921                 return;
2922
2923         for (i = 0; eap_method_map[i].str; i++)
2924                 if (strcmp(str, eap_method_map[i].str) == 0) {
2925                         eap_methods |= eap_method_map[i].val;
2926                         break;
2927                 }
2928 }
2929
2930 static void service_property(const char *key, DBusMessageIter *iter,
2931                                                         void *user_data)
2932 {
2933         if (!key) {
2934                 callback_system_ready();
2935                 return;
2936         }
2937
2938         if (g_strcmp0(key, "DebugLevel") == 0) {
2939                 const char *str = NULL;
2940                 int i;
2941
2942                 dbus_message_iter_get_basic(iter, &str);
2943                 for (i = 0; debug_strings[i]; i++)
2944                         if (g_strcmp0(debug_strings[i], str) == 0) {
2945                                 debug_level = i;
2946                                 break;
2947                         }
2948                 SUPPLICANT_DBG("Debug level %d", debug_level);
2949         } else if (g_strcmp0(key, "DebugTimestamp") == 0) {
2950                 dbus_message_iter_get_basic(iter, &debug_timestamp);
2951                 SUPPLICANT_DBG("Debug timestamp %u", debug_timestamp);
2952         } else if (g_strcmp0(key, "DebugShowKeys") == 0) {
2953                 dbus_message_iter_get_basic(iter, &debug_showkeys);
2954                 SUPPLICANT_DBG("Debug show keys %u", debug_showkeys);
2955         } else if (g_strcmp0(key, "Interfaces") == 0) {
2956                 supplicant_dbus_array_foreach(iter, interface_added, NULL);
2957         } else if (g_strcmp0(key, "EapMethods") == 0) {
2958                 supplicant_dbus_array_foreach(iter, eap_method, NULL);
2959                 debug_strvalmap("EAP method", eap_method_map, eap_methods);
2960         } else if (g_strcmp0(key, "Country") == 0) {
2961                 const char *country = NULL;
2962
2963                 dbus_message_iter_get_basic(iter, &country);
2964                 SUPPLICANT_DBG("Country %s", country);
2965         } else
2966                 SUPPLICANT_DBG("key %s type %c",
2967                                 key, dbus_message_iter_get_arg_type(iter));
2968 }
2969
2970 static void signal_name_owner_changed(const char *path, DBusMessageIter *iter)
2971 {
2972         const char *name = NULL, *old = NULL, *new = NULL;
2973
2974         SUPPLICANT_DBG("");
2975
2976         if (g_strcmp0(path, DBUS_PATH_DBUS) != 0)
2977                 return;
2978
2979         dbus_message_iter_get_basic(iter, &name);
2980         if (!name)
2981                 return;
2982
2983         if (g_strcmp0(name, SUPPLICANT_SERVICE) != 0)
2984                 return;
2985
2986         dbus_message_iter_next(iter);
2987         dbus_message_iter_get_basic(iter, &old);
2988         dbus_message_iter_next(iter);
2989         dbus_message_iter_get_basic(iter, &new);
2990
2991         if (!old || !new)
2992                 return;
2993
2994         if (strlen(old) > 0 && strlen(new) == 0) {
2995                 system_available = FALSE;
2996                 g_hash_table_remove_all(bss_mapping);
2997                 g_hash_table_remove_all(peer_mapping);
2998                 g_hash_table_remove_all(group_mapping);
2999                 g_hash_table_remove_all(config_file_table);
3000                 g_hash_table_remove_all(interface_table);
3001                 callback_system_killed();
3002         }
3003
3004         if (strlen(new) > 0 && strlen(old) == 0) {
3005                 system_available = TRUE;
3006                 supplicant_dbus_property_get_all(SUPPLICANT_PATH,
3007                                                 SUPPLICANT_INTERFACE,
3008                                                 service_property, NULL, NULL);
3009         }
3010 }
3011
3012 static void signal_properties_changed(const char *path, DBusMessageIter *iter)
3013 {
3014         SUPPLICANT_DBG("");
3015
3016         if (g_strcmp0(path, SUPPLICANT_PATH) != 0)
3017                 return;
3018
3019         supplicant_dbus_property_foreach(iter, service_property, NULL);
3020 }
3021
3022 static void signal_interface_added(const char *path, DBusMessageIter *iter)
3023 {
3024         SUPPLICANT_DBG("path %s %s", path, SUPPLICANT_PATH);
3025
3026         if (g_strcmp0(path, SUPPLICANT_PATH) == 0)
3027                 interface_added(iter, GUINT_TO_POINTER(true));
3028 }
3029
3030 static void signal_interface_removed(const char *path, DBusMessageIter *iter)
3031 {
3032         SUPPLICANT_DBG("");
3033
3034         if (g_strcmp0(path, SUPPLICANT_PATH) == 0)
3035                 interface_removed(iter, NULL);
3036 }
3037
3038 static void signal_interface_changed(const char *path, DBusMessageIter *iter)
3039 {
3040         GSupplicantInterface *interface;
3041
3042         SUPPLICANT_DBG("");
3043
3044         interface = g_hash_table_lookup(interface_table, path);
3045         if (!interface)
3046                 return;
3047
3048         supplicant_dbus_property_foreach(iter, interface_property, interface);
3049 }
3050
3051 static void signal_scan_done(const char *path, DBusMessageIter *iter)
3052 {
3053         GSupplicantInterface *interface;
3054         dbus_bool_t success = FALSE;
3055
3056         SUPPLICANT_DBG("");
3057
3058         interface = g_hash_table_lookup(interface_table, path);
3059         if (!interface)
3060                 return;
3061
3062         dbus_message_iter_get_basic(iter, &success);
3063
3064         if (interface->scanning) {
3065                 callback_scan_finished(interface);
3066                 interface->scanning = FALSE;
3067         }
3068
3069         /*
3070          * If scan is unsuccessful return -EIO else get the scanned BSSs
3071          * and update the network details accordingly
3072          */
3073         if (!success) {
3074                 if (interface->scan_callback)
3075                         interface->scan_callback(-EIO, interface,
3076                                                 interface->scan_data);
3077
3078                 interface->scan_callback = NULL;
3079                 interface->scan_data = NULL;
3080
3081                 return;
3082         }
3083
3084         supplicant_dbus_property_get(path, SUPPLICANT_INTERFACE ".Interface",
3085                                 "BSSs", scan_bss_data, interface, interface);
3086 }
3087
3088 static void signal_bss_added(const char *path, DBusMessageIter *iter)
3089 {
3090         GSupplicantInterface *interface;
3091
3092         SUPPLICANT_DBG("");
3093
3094         interface = g_hash_table_lookup(interface_table, path);
3095         if (!interface)
3096                 return;
3097
3098         interface_bss_added_with_keys(iter, interface);
3099 }
3100
3101 static void signal_bss_removed(const char *path, DBusMessageIter *iter)
3102 {
3103         GSupplicantInterface *interface;
3104
3105         SUPPLICANT_DBG("");
3106
3107         interface = g_hash_table_lookup(interface_table, path);
3108         if (!interface)
3109                 return;
3110
3111         interface_bss_removed(iter, interface);
3112 }
3113
3114 static void signal_network_added(const char *path, DBusMessageIter *iter)
3115 {
3116         GSupplicantInterface *interface;
3117
3118         SUPPLICANT_DBG("");
3119
3120         interface = g_hash_table_lookup(interface_table, path);
3121         if (!interface)
3122                 return;
3123
3124         interface_network_added(iter, interface);
3125 }
3126
3127 static void signal_network_removed(const char *path, DBusMessageIter *iter)
3128 {
3129         GSupplicantInterface *interface;
3130
3131         SUPPLICANT_DBG("");
3132
3133         interface = g_hash_table_lookup(interface_table, path);
3134         if (!interface)
3135                 return;
3136
3137         interface_network_removed(iter, interface);
3138 }
3139
3140 static void signal_bss_changed(const char *path, DBusMessageIter *iter)
3141 {
3142         GSupplicantInterface *interface;
3143         GSupplicantNetwork *network;
3144         GSupplicantSecurity old_security;
3145         struct g_supplicant_bss *bss;
3146
3147         SUPPLICANT_DBG("");
3148
3149         interface = g_hash_table_lookup(bss_mapping, path);
3150         if (!interface)
3151                 return;
3152
3153         network = g_hash_table_lookup(interface->bss_mapping, path);
3154         if (!network)
3155                 return;
3156
3157         bss = g_hash_table_lookup(network->bss_table, path);
3158         if (!bss)
3159                 return;
3160
3161         supplicant_dbus_property_foreach(iter, bss_property, bss);
3162 #if defined TIZEN_EXT
3163         network->frequency = bss->frequency;
3164 #endif
3165         old_security = network->security;
3166         bss_compute_security(bss);
3167
3168         if (old_security != bss->security) {
3169                 struct g_supplicant_bss *new_bss;
3170
3171                 SUPPLICANT_DBG("New network security for %s", bss->ssid);
3172
3173                 /* Security change policy:
3174                  * - we first copy the current bss into a new one with
3175                  * its own pointer (path)
3176                  * - we remove the current bss related network which will
3177                  * tell the plugin about such removal. This is done due
3178                  * to the fact that a security change means a group change
3179                  * so a complete network change.
3180                  * (current bss becomes invalid as well)
3181                  * - we add the new bss: it adds new network and tell the
3182                  * plugin about it. */
3183
3184                 new_bss = g_try_new0(struct g_supplicant_bss, 1);
3185                 if (!new_bss)
3186                         return;
3187
3188                 memcpy(new_bss, bss, sizeof(struct g_supplicant_bss));
3189                 new_bss->path = g_strdup(bss->path);
3190 #if defined TIZEN_EXT
3191                 new_bss->vsie_list = NULL;
3192 #endif
3193
3194                 g_hash_table_remove(interface->network_table, network->group);
3195
3196                 if (add_or_replace_bss_to_network(new_bss) < 0) {
3197                         /* Remove entries in hash tables to handle the
3198                          * failure in add_or_replace_bss_to_network
3199                          */
3200                         g_hash_table_remove(bss_mapping, path);
3201                         g_hash_table_remove(interface->bss_mapping, path);
3202                         g_hash_table_remove(network->bss_table, path);
3203                 }
3204
3205                 return;
3206         }
3207
3208 #if defined TIZEN_EXT
3209         if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
3210                 network->wps = TRUE;
3211                 network->wps_capabilities |= bss->wps_capabilities;
3212         } else
3213                 network->wps = FALSE;
3214 #endif
3215
3216         /* Consider only property changes of the connected BSS */
3217         if (network == interface->current_network && bss != network->best_bss)
3218                 return;
3219
3220         if (bss->signal == network->signal)
3221 #ifndef TIZEN_EXT
3222                 return;
3223 #else
3224         {
3225                 callback_network_changed(network, "");
3226                 return;
3227         }
3228 #endif
3229
3230         /*
3231          * If the new signal is lower than the SSID signal, we need
3232          * to check for the new maximum.
3233          */
3234         if (bss->signal < network->signal) {
3235                 if (bss != network->best_bss)
3236 #ifndef TIZEN_EXT
3237                         return;
3238 #else
3239                 {
3240                         callback_network_changed(network, "");
3241                         return;
3242                 }
3243 #endif
3244                 network->signal = bss->signal;
3245                 update_network_signal(network);
3246         } else {
3247                 network->signal = bss->signal;
3248                 network->best_bss = bss;
3249         }
3250
3251         SUPPLICANT_DBG("New network signal for %s %d dBm", network->ssid,
3252                         network->signal);
3253
3254         callback_network_changed(network, "Signal");
3255 }
3256
3257 static void wps_credentials(const char *key, DBusMessageIter *iter,
3258                         void *user_data)
3259 {
3260         GSupplicantInterface *interface = user_data;
3261
3262         if (!key)
3263                 return;
3264
3265         SUPPLICANT_DBG("key %s", key);
3266
3267         if (g_strcmp0(key, "Key") == 0) {
3268                 DBusMessageIter array;
3269                 unsigned char *key_val;
3270                 int key_len;
3271
3272                 dbus_message_iter_recurse(iter, &array);
3273                 dbus_message_iter_get_fixed_array(&array, &key_val, &key_len);
3274
3275                 g_free(interface->wps_cred.key);
3276                 interface->wps_cred.key = g_try_malloc0(
3277                                                 sizeof(char) * key_len + 1);
3278
3279                 if (!interface->wps_cred.key)
3280                         return;
3281
3282                 memcpy(interface->wps_cred.key, key_val,
3283                                                 sizeof(char) * key_len);
3284
3285                 SUPPLICANT_DBG("WPS key present");
3286         } else if (g_strcmp0(key, "SSID") == 0) {
3287                 DBusMessageIter array;
3288                 unsigned char *ssid;
3289                 int ssid_len;
3290
3291                 dbus_message_iter_recurse(iter, &array);
3292                 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
3293
3294                 if (ssid_len > 0 && ssid_len < 33) {
3295                         memcpy(interface->wps_cred.ssid, ssid, ssid_len);
3296                         interface->wps_cred.ssid_len = ssid_len;
3297                 } else {
3298                         memset(interface->wps_cred.ssid, 0, 32);
3299                         interface->wps_cred.ssid_len = 0;
3300                 }
3301         }
3302 }
3303
3304 static void signal_wps_credentials(const char *path, DBusMessageIter *iter)
3305 {
3306         GSupplicantInterface *interface;
3307
3308         SUPPLICANT_DBG("");
3309
3310         interface = g_hash_table_lookup(interface_table, path);
3311         if (!interface)
3312                 return;
3313
3314         supplicant_dbus_property_foreach(iter, wps_credentials, interface);
3315 }
3316
3317 static void wps_event_args(const char *key, DBusMessageIter *iter,
3318                         void *user_data)
3319 {
3320         GSupplicantInterface *interface = user_data;
3321
3322         if (!key || !interface)
3323                 return;
3324
3325         SUPPLICANT_DBG("Arg Key %s", key);
3326 }
3327
3328 static void signal_wps_event(const char *path, DBusMessageIter *iter)
3329 {
3330         GSupplicantInterface *interface;
3331         const char *name = NULL;
3332
3333         SUPPLICANT_DBG("");
3334
3335         interface = g_hash_table_lookup(interface_table, path);
3336         if (!interface)
3337                 return;
3338
3339         dbus_message_iter_get_basic(iter, &name);
3340
3341         SUPPLICANT_DBG("Name: %s", name);
3342
3343         if (g_strcmp0(name, "success") == 0)
3344                 interface->wps_state = G_SUPPLICANT_WPS_STATE_SUCCESS;
3345         else if (g_strcmp0(name, "failed") == 0)
3346                 interface->wps_state = G_SUPPLICANT_WPS_STATE_FAIL;
3347         else
3348                 interface->wps_state = G_SUPPLICANT_WPS_STATE_UNKNOWN;
3349
3350         if (!dbus_message_iter_has_next(iter))
3351                 return;
3352
3353         dbus_message_iter_next(iter);
3354
3355         supplicant_dbus_property_foreach(iter, wps_event_args, interface);
3356 }
3357
3358 #if defined TIZEN_EXT
3359 static void signal_power_off(const char *path, DBusMessageIter *iter)
3360 {
3361         int poweroff_state = 0;
3362
3363         dbus_message_iter_get_basic(iter, &poweroff_state);
3364
3365         SUPPLICANT_DBG("poweroff_state(%d)", poweroff_state);
3366
3367         /* POWER_OFF_DIRECT 2 && POWER_OFF_RESTART 3 */
3368         if (poweroff_state != 2 && poweroff_state != 3)
3369                 return;
3370
3371         if (callbacks_pointer == NULL)
3372                 return;
3373
3374         if (callbacks_pointer->system_power_off == NULL)
3375                 return;
3376
3377         callbacks_pointer->system_power_off();
3378 }
3379 #endif
3380
3381 static void signal_station_connected(const char *path, DBusMessageIter *iter)
3382 {
3383         GSupplicantInterface *interface;
3384         const char *sta_mac = NULL;
3385
3386         SUPPLICANT_DBG("path %s %s", path, SUPPLICANT_PATH);
3387
3388         if (callbacks_pointer->add_station == NULL)
3389                 return;
3390
3391         if (g_strcmp0(path, "/") == 0)
3392                 return;
3393
3394         interface = g_hash_table_lookup(interface_table, path);
3395         if (interface == NULL)
3396                 return;
3397
3398         dbus_message_iter_get_basic(iter, &sta_mac);
3399         if (sta_mac == NULL)
3400                 return;
3401
3402         SUPPLICANT_DBG("New station %s connected", sta_mac);
3403         callbacks_pointer->add_station(sta_mac);
3404 }
3405
3406 static void signal_station_disconnected(const char *path, DBusMessageIter *iter)
3407 {
3408         GSupplicantInterface *interface;
3409         const char *sta_mac = NULL;
3410
3411         SUPPLICANT_DBG("path %s %s", path, SUPPLICANT_PATH);
3412
3413         if (callbacks_pointer->remove_station == NULL)
3414                 return;
3415
3416         if (g_strcmp0(path, "/") == 0)
3417                 return;
3418
3419         interface = g_hash_table_lookup(interface_table, path);
3420         if (interface == NULL)
3421                 return;
3422
3423         dbus_message_iter_get_basic(iter, &sta_mac);
3424         if (sta_mac == NULL)
3425                 return;
3426
3427         SUPPLICANT_DBG("Station %s disconnected", sta_mac);
3428         callbacks_pointer->remove_station(sta_mac);
3429 }
3430
3431 static void create_peer_identifier(GSupplicantPeer *peer)
3432 {
3433         const unsigned char test[ETH_ALEN] = {};
3434
3435         if (!peer)
3436                 return;
3437
3438         if (!memcmp(peer->device_address, test, ETH_ALEN)) {
3439                 peer->identifier = g_strdup(peer->name);
3440                 return;
3441         }
3442
3443         peer->identifier = g_malloc0(19);
3444         snprintf(peer->identifier, 19, "%02x%02x%02x%02x%02x%02x",
3445                                                 peer->device_address[0],
3446                                                 peer->device_address[1],
3447                                                 peer->device_address[2],
3448                                                 peer->device_address[3],
3449                                                 peer->device_address[4],
3450                                                 peer->device_address[5]);
3451 }
3452
3453 struct peer_property_data {
3454         GSupplicantPeer *peer;
3455         GSList *old_groups;
3456         bool groups_changed;
3457         bool services_changed;
3458 };
3459
3460 static void peer_groups_relation(DBusMessageIter *iter, void *user_data)
3461 {
3462         struct peer_property_data *data = user_data;
3463         GSupplicantPeer *peer = data->peer;
3464         GSupplicantGroup *group;
3465         const char *str = NULL;
3466         GSList *elem;
3467
3468         dbus_message_iter_get_basic(iter, &str);
3469         if (!str)
3470                 return;
3471
3472         group = g_hash_table_lookup(group_mapping, str);
3473         if (!group)
3474                 return;
3475
3476         elem = g_slist_find_custom(data->old_groups, str, (GCompareFunc)g_strcmp0);
3477         if (elem) {
3478                 data->old_groups = g_slist_remove_link(data->old_groups, elem);
3479                 peer->groups = g_slist_concat(elem, peer->groups);
3480         } else {
3481                 peer->groups = g_slist_prepend(peer->groups, g_strdup(str));
3482                 data->groups_changed = true;
3483         }
3484 }
3485
3486 static void peer_property(const char *key, DBusMessageIter *iter,
3487                                                         void *user_data)
3488 {
3489         GSupplicantPeer *pending_peer;
3490         struct peer_property_data *data = user_data;
3491         GSupplicantPeer *peer = data->peer;
3492
3493         SUPPLICANT_DBG("key: %s", key);
3494
3495         if (!peer->interface)
3496                 return;
3497
3498         if (!key) {
3499                 if (peer->name) {
3500                         create_peer_identifier(peer);
3501                         callback_peer_found(peer);
3502                         pending_peer = g_hash_table_lookup(
3503                                         pending_peer_connection, peer->path);
3504
3505                         if (pending_peer && pending_peer == peer) {
3506                                 callback_peer_request(peer);
3507                                 g_hash_table_remove(pending_peer_connection,
3508                                                 peer->path);
3509                         }
3510
3511                         dbus_free(data);
3512                 }
3513
3514                 return;
3515         }
3516
3517         if (g_strcmp0(key, "DeviceAddress") == 0) {
3518                 unsigned char *dev_addr;
3519                 DBusMessageIter array;
3520                 int len;
3521
3522                 dbus_message_iter_recurse(iter, &array);
3523                 dbus_message_iter_get_fixed_array(&array, &dev_addr, &len);
3524
3525                 if (len == ETH_ALEN)
3526                         memcpy(peer->device_address, dev_addr, len);
3527         } else if (g_strcmp0(key, "DeviceName") == 0) {
3528                 const char *str = NULL;
3529
3530                 dbus_message_iter_get_basic(iter, &str);
3531                 if (str)
3532                         peer->name = g_strdup(str);
3533         } else if (g_strcmp0(key, "config_method") == 0) {
3534                 uint16_t wps_config;
3535
3536                 dbus_message_iter_get_basic(iter, &wps_config);
3537
3538                 if (wps_config & G_SUPPLICANT_WPS_CONFIG_PBC)
3539                         peer->wps_capabilities |= G_SUPPLICANT_WPS_PBC;
3540                 if (wps_config & ~G_SUPPLICANT_WPS_CONFIG_PBC)
3541                         peer->wps_capabilities |= G_SUPPLICANT_WPS_PIN;
3542         } else if (g_strcmp0(key, "Groups") == 0) {
3543                 data->old_groups = peer->groups;
3544                 peer->groups = NULL;
3545
3546                 supplicant_dbus_array_foreach(iter,
3547                                                 peer_groups_relation, data);
3548                 if (g_slist_length(data->old_groups) > 0) {
3549                         g_slist_free_full(data->old_groups, g_free);
3550                         data->groups_changed = true;
3551                 }
3552         } else if (g_strcmp0(key, "IEs") == 0) {
3553                 DBusMessageIter array;
3554                 unsigned char *ie;
3555                 int ie_len;
3556
3557                 dbus_message_iter_recurse(iter, &array);
3558                 dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
3559
3560                 if (!ie || ie_len < 2)
3561                         return;
3562
3563                 if (peer->widi_ies) {
3564                         if (memcmp(peer->widi_ies, ie, ie_len) == 0)
3565                                 return;
3566
3567                         g_free(peer->widi_ies);
3568                         peer->widi_ies_length = 0;
3569                 }
3570
3571                 peer->widi_ies = g_malloc0(ie_len * sizeof(unsigned char));
3572
3573                 memcpy(peer->widi_ies, ie, ie_len);
3574                 peer->widi_ies_length = ie_len;
3575                 data->services_changed = true;
3576         }
3577 }
3578
3579 static void signal_peer_found(const char *path, DBusMessageIter *iter)
3580 {
3581         struct peer_property_data *property_data;
3582         GSupplicantInterface *interface;
3583         const char *obj_path = NULL;
3584         GSupplicantPeer *peer;
3585
3586         SUPPLICANT_DBG("");
3587
3588         interface = g_hash_table_lookup(interface_table, path);
3589         if (!interface)
3590                 return;
3591
3592         dbus_message_iter_get_basic(iter, &obj_path);
3593         if (!obj_path || g_strcmp0(obj_path, "/") == 0)
3594                 return;
3595
3596         peer = g_hash_table_lookup(interface->peer_table, obj_path);
3597         if (peer)
3598                 return;
3599
3600         peer = g_try_new0(GSupplicantPeer, 1);
3601         if (!peer)
3602                 return;
3603
3604         peer->interface = interface;
3605         peer->path = g_strdup(obj_path);
3606         g_hash_table_insert(interface->peer_table, peer->path, peer);
3607         g_hash_table_replace(peer_mapping, peer->path, interface);
3608
3609         property_data = dbus_malloc0(sizeof(struct peer_property_data));
3610         property_data->peer = peer;
3611
3612         dbus_message_iter_next(iter);
3613         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
3614                 supplicant_dbus_property_foreach(iter, peer_property,
3615                                                         property_data);
3616                 peer_property(NULL, NULL, property_data);
3617                 return;
3618         }
3619
3620         supplicant_dbus_property_get_all(obj_path,
3621                                         SUPPLICANT_INTERFACE ".Peer",
3622                                         peer_property, property_data, NULL);
3623 }
3624
3625 static void signal_peer_lost(const char *path, DBusMessageIter *iter)
3626 {
3627         GSupplicantInterface *interface;
3628         const char *obj_path = NULL;
3629         GSupplicantPeer *peer;
3630
3631         SUPPLICANT_DBG("");
3632
3633         interface = g_hash_table_lookup(interface_table, path);
3634         if (!interface)
3635                 return;
3636
3637         dbus_message_iter_get_basic(iter, &obj_path);
3638         if (!obj_path || g_strcmp0(obj_path, "/") == 0)
3639                 return;
3640
3641         peer = g_hash_table_lookup(interface->peer_table, obj_path);
3642         if (!peer)
3643                 return;
3644
3645         g_hash_table_remove(interface->peer_table, obj_path);
3646 }
3647
3648 static void signal_peer_changed(const char *path, DBusMessageIter *iter)
3649 {
3650         struct peer_property_data *property_data;
3651         GSupplicantInterface *interface;
3652         GSupplicantPeer *peer;
3653
3654         SUPPLICANT_DBG("");
3655
3656         interface = g_hash_table_lookup(peer_mapping, path);
3657         if (!interface)
3658                 return;
3659
3660         peer = g_hash_table_lookup(interface->peer_table, path);
3661         if (!peer) {
3662                 g_hash_table_remove(peer_mapping, path);
3663                 return;
3664         }
3665
3666         property_data = dbus_malloc0(sizeof(struct peer_property_data));
3667         property_data->peer = peer;
3668
3669         supplicant_dbus_property_foreach(iter, peer_property, property_data);
3670         if (property_data->services_changed)
3671                 callback_peer_changed(peer,
3672                                         G_SUPPLICANT_PEER_SERVICES_CHANGED);
3673
3674         if (property_data->groups_changed)
3675                 callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_CHANGED);
3676
3677         dbus_free(property_data);
3678
3679         if (!g_supplicant_peer_is_in_a_group(peer))
3680                 peer->connection_requested = false;
3681 }
3682
3683 struct group_sig_data {
3684         const char *peer_obj_path;
3685         unsigned char iface_address[ETH_ALEN];
3686         const char *interface_obj_path;
3687         const char *group_obj_path;
3688         int role;
3689 };
3690
3691 static void group_sig_property(const char *key, DBusMessageIter *iter,
3692                                                         void *user_data)
3693 {
3694         struct group_sig_data *data = user_data;
3695
3696         if (!key)
3697                 return;
3698
3699         if (g_strcmp0(key, "peer_interface_addr") == 0) {
3700                 unsigned char *dev_addr;
3701                 DBusMessageIter array;
3702                 int len;
3703
3704                 dbus_message_iter_recurse(iter, &array);
3705                 dbus_message_iter_get_fixed_array(&array, &dev_addr, &len);
3706
3707                 if (len == ETH_ALEN)
3708                         memcpy(data->iface_address, dev_addr, len);
3709         } else if (g_strcmp0(key, "role") == 0) {
3710                 const char *str = NULL;
3711
3712                 dbus_message_iter_get_basic(iter, &str);
3713                 if (g_strcmp0(str, "GO") == 0)
3714                         data->role = G_SUPPLICANT_GROUP_ROLE_GO;
3715                 else
3716                         data->role = G_SUPPLICANT_GROUP_ROLE_CLIENT;
3717         } else if (g_strcmp0(key, "peer_object") == 0)
3718                 dbus_message_iter_get_basic(iter, &data->peer_obj_path);
3719         else if (g_strcmp0(key, "interface_object") == 0)
3720                 dbus_message_iter_get_basic(iter, &data->interface_obj_path);
3721         else if (g_strcmp0(key, "group_object") == 0)
3722                 dbus_message_iter_get_basic(iter, &data->group_obj_path);
3723
3724 }
3725
3726 static void signal_group_success(const char *path, DBusMessageIter *iter)
3727 {
3728         GSupplicantInterface *interface;
3729         struct group_sig_data data = {};
3730         GSupplicantPeer *peer;
3731
3732         SUPPLICANT_DBG("");
3733
3734         interface = g_hash_table_lookup(interface_table, path);
3735         if (!interface)
3736                 return;
3737
3738         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
3739         if (!data.peer_obj_path)
3740                 return;
3741
3742         peer = g_hash_table_lookup(interface->peer_table, data.peer_obj_path);
3743         if (!peer)
3744                 return;
3745
3746         memcpy(peer->iface_address, data.iface_address, ETH_ALEN);
3747         interface->pending_peer_path = peer->path;
3748 }
3749
3750 static void signal_group_failure(const char *path, DBusMessageIter *iter)
3751 {
3752         GSupplicantInterface *interface;
3753         struct group_sig_data data = {};
3754         GSupplicantPeer *peer;
3755
3756         SUPPLICANT_DBG("");
3757
3758         interface = g_hash_table_lookup(interface_table, path);
3759         if (!interface)
3760                 return;
3761
3762         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
3763         if (!data.peer_obj_path)
3764                 return;
3765
3766         peer = g_hash_table_lookup(interface->peer_table, data.peer_obj_path);
3767         if (!peer)
3768                 return;
3769
3770         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_FAILED);
3771         peer->connection_requested = false;
3772 }
3773
3774 static void signal_group_started(const char *path, DBusMessageIter *iter)
3775 {
3776         GSupplicantInterface *interface, *g_interface;
3777         struct group_sig_data data = {};
3778         GSupplicantGroup *group;
3779         GSupplicantPeer *peer;
3780
3781         SUPPLICANT_DBG("");
3782
3783         interface = g_hash_table_lookup(interface_table, path);
3784         if (!interface)
3785                 return;
3786
3787         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
3788         if (!data.interface_obj_path || !data.group_obj_path)
3789                 return;
3790
3791         peer = g_hash_table_lookup(interface->peer_table,
3792                                                 interface->pending_peer_path);
3793         interface->pending_peer_path = NULL;
3794         if (!peer)
3795                 return;
3796
3797         g_interface = g_hash_table_lookup(interface_table,
3798                                                 data.interface_obj_path);
3799         if (!g_interface)
3800                 return;
3801
3802         group = g_hash_table_lookup(interface->group_table,
3803                                                 data.group_obj_path);
3804         if (group)
3805                 return;
3806
3807         group = g_try_new0(GSupplicantGroup, 1);
3808         if (!group)
3809                 return;
3810
3811         group->interface = g_interface;
3812         group->orig_interface = interface;
3813         group->path = g_strdup(data.group_obj_path);
3814         group->role = data.role;
3815
3816         g_hash_table_insert(interface->group_table, group->path, group);
3817         g_hash_table_replace(group_mapping, group->path, group);
3818
3819         peer->current_group_iface = g_interface;
3820         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_STARTED);
3821 }
3822
3823 static void remove_peer_group_interface(GHashTable *group_table,
3824                                 const char* path)
3825 {
3826         GSupplicantGroup *group;
3827         GHashTableIter iter;
3828         gpointer value, key;
3829
3830         if (!group_table)
3831                 return;
3832
3833         group = g_hash_table_lookup(group_table, path);
3834
3835         if (!group || !group->orig_interface)
3836                 return;
3837
3838         g_hash_table_iter_init(&iter, group->orig_interface->peer_table);
3839
3840         while (g_hash_table_iter_next(&iter, &key, &value)) {
3841                 GSupplicantPeer *peer = value;
3842
3843                 if (peer->current_group_iface == group->interface)
3844                         peer->current_group_iface = NULL;
3845         }
3846 }
3847
3848 static void signal_group_finished(const char *path, DBusMessageIter *iter)
3849 {
3850         GSupplicantInterface *interface;
3851         struct group_sig_data data = {};
3852
3853         SUPPLICANT_DBG("");
3854
3855         interface = g_hash_table_lookup(interface_table, path);
3856         if (!interface)
3857                 return;
3858
3859         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
3860         if (!data.interface_obj_path || !data.group_obj_path)
3861                 return;
3862
3863         remove_peer_group_interface(interface->group_table, data.group_obj_path);
3864
3865         g_hash_table_remove(group_mapping, data.group_obj_path);
3866
3867         g_hash_table_remove(interface->group_table, data.group_obj_path);
3868 }
3869
3870 static void signal_group_request(const char *path, DBusMessageIter *iter)
3871 {
3872         GSupplicantInterface *interface;
3873         GSupplicantPeer *peer;
3874         const char *obj_path;
3875
3876         SUPPLICANT_DBG("");
3877
3878         interface = g_hash_table_lookup(interface_table, path);
3879         if (!interface)
3880                 return;
3881
3882         dbus_message_iter_get_basic(iter, &obj_path);
3883         if (!obj_path || !g_strcmp0(obj_path, "/"))
3884                 return;
3885
3886         peer = g_hash_table_lookup(interface->peer_table, obj_path);
3887         if (!peer)
3888                 return;
3889
3890         /*
3891          * Peer has been previously found and property set,
3892          * otherwise, defer connection to when peer property
3893          * is set.
3894          */
3895         if (peer->identifier)
3896                 callback_peer_request(peer);
3897         else
3898                 g_hash_table_replace(pending_peer_connection, peer->path, peer);
3899 }
3900
3901 static void signal_group_peer_joined(const char *path, DBusMessageIter *iter)
3902 {
3903         const char *peer_path = NULL;
3904         GSupplicantInterface *interface;
3905         GSupplicantGroup *group;
3906         GSupplicantPeer *peer;
3907
3908         SUPPLICANT_DBG("");
3909
3910         group = g_hash_table_lookup(group_mapping, path);
3911         if (!group)
3912                 return;
3913
3914         dbus_message_iter_get_basic(iter, &peer_path);
3915         if (!peer_path)
3916                 return;
3917
3918         interface = g_hash_table_lookup(peer_mapping, peer_path);
3919         if (!interface)
3920                 return;
3921
3922         peer = g_hash_table_lookup(interface->peer_table, peer_path);
3923         if (!peer)
3924                 return;
3925
3926         group->members = g_slist_prepend(group->members, g_strdup(peer_path));
3927
3928         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_JOINED);
3929 }
3930
3931 static void signal_group_peer_disconnected(const char *path, DBusMessageIter *iter)
3932 {
3933         const char *peer_path = NULL;
3934         GSupplicantInterface *interface;
3935         GSupplicantGroup *group;
3936         GSupplicantPeer *peer;
3937         GSList *elem;
3938
3939         SUPPLICANT_DBG("");
3940
3941         group = g_hash_table_lookup(group_mapping, path);
3942         if (!group)
3943                 return;
3944
3945         dbus_message_iter_get_basic(iter, &peer_path);
3946         if (!peer_path)
3947                 return;
3948
3949         for (elem = group->members; elem; elem = elem->next) {
3950                 if (!g_strcmp0(elem->data, peer_path))
3951                         break;
3952         }
3953
3954         if (!elem)
3955                 return;
3956
3957         g_free(elem->data);
3958         group->members = g_slist_delete_link(group->members, elem);
3959
3960         interface = g_hash_table_lookup(peer_mapping, peer_path);
3961         if (!interface)
3962                 return;
3963
3964         peer = g_hash_table_lookup(interface->peer_table, peer_path);
3965         if (!peer)
3966                 return;
3967
3968         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_DISCONNECTED);
3969         peer->connection_requested = false;
3970 }
3971
3972 static struct {
3973         const char *interface;
3974         const char *member;
3975         void (*function) (const char *path, DBusMessageIter *iter);
3976 } signal_map[] = {
3977         { DBUS_INTERFACE_DBUS,  "NameOwnerChanged",  signal_name_owner_changed },
3978
3979         { SUPPLICANT_INTERFACE, "PropertiesChanged", signal_properties_changed },
3980         { SUPPLICANT_INTERFACE, "InterfaceAdded",    signal_interface_added    },
3981         { SUPPLICANT_INTERFACE, "InterfaceCreated",  signal_interface_added    },
3982         { SUPPLICANT_INTERFACE, "InterfaceRemoved",  signal_interface_removed  },
3983
3984         { SUPPLICANT_INTERFACE ".Interface", "PropertiesChanged", signal_interface_changed },
3985         { SUPPLICANT_INTERFACE ".Interface", "ScanDone",          signal_scan_done         },
3986         { SUPPLICANT_INTERFACE ".Interface", "BSSAdded",          signal_bss_added         },
3987         { SUPPLICANT_INTERFACE ".Interface", "BSSRemoved",        signal_bss_removed       },
3988         { SUPPLICANT_INTERFACE ".Interface", "NetworkAdded",      signal_network_added     },
3989         { SUPPLICANT_INTERFACE ".Interface", "NetworkRemoved",    signal_network_removed   },
3990
3991         { SUPPLICANT_INTERFACE ".BSS", "PropertiesChanged", signal_bss_changed   },
3992
3993         { SUPPLICANT_INTERFACE ".Interface.WPS", "Credentials", signal_wps_credentials },
3994         { SUPPLICANT_INTERFACE ".Interface.WPS", "Event",       signal_wps_event       },
3995 #if defined TIZEN_EXT
3996         { "org.tizen.system.deviced.PowerOff", "ChangeState", signal_power_off },
3997 #endif
3998
3999         { SUPPLICANT_INTERFACE".Interface", "StaAuthorized", signal_station_connected      },
4000         { SUPPLICANT_INTERFACE".Interface", "StaDeauthorized", signal_station_disconnected },
4001
4002         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeviceFound", signal_peer_found },
4003         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeviceLost",  signal_peer_lost  },
4004
4005         { SUPPLICANT_INTERFACE ".Peer", "PropertiesChanged", signal_peer_changed },
4006
4007         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationSuccess", signal_group_success },
4008         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationFailure", signal_group_failure },
4009         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GroupStarted", signal_group_started },
4010         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GroupFinished", signal_group_finished },
4011         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationRequest", signal_group_request },
4012
4013         { SUPPLICANT_INTERFACE ".Group", "PeerJoined", signal_group_peer_joined },
4014         { SUPPLICANT_INTERFACE ".Group", "PeerDisconnected", signal_group_peer_disconnected },
4015
4016         { }
4017 };
4018
4019 static DBusHandlerResult g_supplicant_filter(DBusConnection *conn,
4020                                         DBusMessage *message, void *data)
4021 {
4022         DBusMessageIter iter;
4023         const char *path;
4024         int i;
4025
4026         path = dbus_message_get_path(message);
4027         if (!path)
4028                 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
4029
4030         if (!dbus_message_iter_init(message, &iter))
4031                 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
4032
4033         for (i = 0; signal_map[i].interface; i++) {
4034                 if (!dbus_message_has_interface(message, signal_map[i].interface))
4035                         continue;
4036
4037                 if (!dbus_message_has_member(message, signal_map[i].member))
4038                         continue;
4039
4040                 signal_map[i].function(path, &iter);
4041                 break;
4042         }
4043
4044         return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
4045 }
4046
4047 void g_supplicant_interface_cancel(GSupplicantInterface *interface)
4048 {
4049         SUPPLICANT_DBG("Cancelling any pending DBus calls");
4050         supplicant_dbus_method_call_cancel_all(interface);
4051         supplicant_dbus_property_call_cancel_all(interface);
4052 }
4053
4054 struct supplicant_regdom {
4055         GSupplicantCountryCallback callback;
4056         const char *alpha2;
4057         const void *user_data;
4058 };
4059
4060 static void country_result(const char *error,
4061                                 DBusMessageIter *iter, void *user_data)
4062 {
4063         struct supplicant_regdom *regdom = user_data;
4064         int result = 0;
4065
4066         SUPPLICANT_DBG("Country setting result");
4067
4068         if (!user_data)
4069                 return;
4070
4071         if (error) {
4072                 SUPPLICANT_DBG("Country setting failure %s", error);
4073                 result = -EINVAL;
4074         }
4075
4076         if (regdom->callback)
4077                 regdom->callback(result, regdom->alpha2,
4078                                         (void *) regdom->user_data);
4079
4080         g_free(regdom);
4081 }
4082
4083 static void country_params(DBusMessageIter *iter, void *user_data)
4084 {
4085         struct supplicant_regdom *regdom = user_data;
4086
4087         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING,
4088                                                         &regdom->alpha2);
4089 }
4090
4091 int g_supplicant_set_country(const char *alpha2,
4092                                 GSupplicantCountryCallback callback,
4093                                         const void *user_data)
4094 {
4095         struct supplicant_regdom *regdom;
4096         int ret;
4097
4098         SUPPLICANT_DBG("Country setting %s", alpha2);
4099
4100         if (!system_available)
4101                 return -EFAULT;
4102
4103         regdom = dbus_malloc0(sizeof(*regdom));
4104         if (!regdom)
4105                 return -ENOMEM;
4106
4107         regdom->callback = callback;
4108         regdom->alpha2 = alpha2;
4109         regdom->user_data = user_data;
4110
4111         ret =  supplicant_dbus_property_set(SUPPLICANT_PATH, SUPPLICANT_INTERFACE,
4112                                         "Country", DBUS_TYPE_STRING_AS_STRING,
4113                                         country_params, country_result,
4114                                         regdom, NULL);
4115         if (ret < 0) {
4116                 dbus_free(regdom);
4117                 SUPPLICANT_DBG("Unable to set Country configuration");
4118         }
4119         return ret;
4120 }
4121
4122 int g_supplicant_interface_set_country(GSupplicantInterface *interface,
4123                                         GSupplicantCountryCallback callback,
4124                                                         const char *alpha2,
4125                                                         void *user_data)
4126 {
4127         struct supplicant_regdom *regdom;
4128         int ret;
4129
4130         regdom = dbus_malloc0(sizeof(*regdom));
4131         if (!regdom)
4132                 return -ENOMEM;
4133
4134         regdom->callback = callback;
4135         regdom->alpha2 = alpha2;
4136         regdom->user_data = user_data;
4137
4138         ret =  supplicant_dbus_property_set(interface->path,
4139                                 SUPPLICANT_INTERFACE ".Interface",
4140                                 "Country", DBUS_TYPE_STRING_AS_STRING,
4141                                 country_params, country_result,
4142                                         regdom, NULL);
4143         if (ret < 0) {
4144                 dbus_free(regdom);
4145                 SUPPLICANT_DBG("Unable to set Country configuration");
4146         }
4147
4148         return ret;
4149 }
4150
4151 bool g_supplicant_interface_has_p2p(GSupplicantInterface *interface)
4152 {
4153         if (!interface)
4154                 return false;
4155
4156         return interface->p2p_support;
4157 }
4158
4159 struct supplicant_p2p_dev_config {
4160         char *device_name;
4161         char *dev_type;
4162 };
4163
4164 static void p2p_device_config_result(const char *error,
4165                                         DBusMessageIter *iter, void *user_data)
4166 {
4167         struct supplicant_p2p_dev_config *config = user_data;
4168
4169         if (error)
4170                 SUPPLICANT_DBG("Unable to set P2P Device configuration: %s",
4171                                                                         error);
4172
4173         g_free(config->device_name);
4174         g_free(config->dev_type);
4175         dbus_free(config);
4176 }
4177
4178 static int dev_type_str2bin(const char *type, unsigned char dev_type[8])
4179 {
4180         int length, pos, end;
4181         char b[3] = {};
4182         char *e = NULL;
4183
4184         end = strlen(type);
4185         for (length = pos = 0; type[pos] != '\0' && length < 8; length++) {
4186                 if (pos+2 > end)
4187                         return 0;
4188
4189                 b[0] = type[pos];
4190                 b[1] = type[pos+1];
4191
4192                 dev_type[length] = strtol(b, &e, 16);
4193                 if (e && *e != '\0')
4194                         return 0;
4195
4196                 pos += 2;
4197         }
4198
4199         return 8;
4200 }
4201
4202 static void p2p_device_config_params(DBusMessageIter *iter, void *user_data)
4203 {
4204         struct supplicant_p2p_dev_config *config = user_data;
4205         DBusMessageIter dict;
4206
4207         supplicant_dbus_dict_open(iter, &dict);
4208
4209         supplicant_dbus_dict_append_basic(&dict, "DeviceName",
4210                                 DBUS_TYPE_STRING, &config->device_name);
4211
4212         if (config->dev_type) {
4213                 unsigned char dev_type[8] = {}, *type;
4214                 int len;
4215
4216                 len = dev_type_str2bin(config->dev_type, dev_type);
4217                 if (len) {
4218                         type = dev_type;
4219                         supplicant_dbus_dict_append_fixed_array(&dict,
4220                                         "PrimaryDeviceType",
4221                                         DBUS_TYPE_BYTE, &type, len);
4222                 }
4223         }
4224
4225         supplicant_dbus_dict_close(iter, &dict);
4226 }
4227
4228 int g_supplicant_interface_set_p2p_device_config(GSupplicantInterface *interface,
4229                                         const char *device_name,
4230                                         const char *primary_dev_type)
4231 {
4232         struct supplicant_p2p_dev_config *config;
4233         int ret;
4234
4235         SUPPLICANT_DBG("P2P Device settings %s/%s",
4236                                         device_name, primary_dev_type);
4237
4238         config = dbus_malloc0(sizeof(*config));
4239         if (!config)
4240                 return -ENOMEM;
4241
4242         config->device_name = g_strdup(device_name);
4243         config->dev_type = g_strdup(primary_dev_type);
4244
4245         ret = supplicant_dbus_property_set(interface->path,
4246                                 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
4247                                 "P2PDeviceConfig",
4248                                 DBUS_TYPE_ARRAY_AS_STRING
4249                                 DBUS_DICT_ENTRY_BEGIN_CHAR_AS_STRING
4250                                 DBUS_TYPE_STRING_AS_STRING
4251                                 DBUS_TYPE_VARIANT_AS_STRING
4252                                 DBUS_DICT_ENTRY_END_CHAR_AS_STRING,
4253                                 p2p_device_config_params,
4254                                 p2p_device_config_result, config, NULL);
4255         if (ret < 0) {
4256                 g_free(config->device_name);
4257                 g_free(config->dev_type);
4258                 dbus_free(config);
4259                 SUPPLICANT_DBG("Unable to set P2P Device configuration");
4260         }
4261
4262         return ret;
4263 }
4264
4265 static gboolean peer_lookup_by_identifier(gpointer key, gpointer value,
4266                                                         gpointer user_data)
4267 {
4268         const GSupplicantPeer *peer = value;
4269         const char *identifier = user_data;
4270
4271         if (!g_strcmp0(identifier, peer->identifier))
4272                 return TRUE;
4273
4274         return FALSE;
4275 }
4276
4277 GSupplicantPeer *g_supplicant_interface_peer_lookup(GSupplicantInterface *interface,
4278                                                         const char *identifier)
4279 {
4280         GSupplicantPeer *peer;
4281
4282         peer = g_hash_table_find(interface->peer_table,
4283                                         peer_lookup_by_identifier,
4284                                         (void *) identifier);
4285         return peer;
4286 }
4287
4288 static void interface_create_data_free(struct interface_create_data *data)
4289 {
4290         g_free(data->ifname);
4291         g_free(data->driver);
4292         g_free(data->bridge);
4293         dbus_free(data);
4294 }
4295
4296 static bool interface_exists(GSupplicantInterface *interface,
4297                                 const char *path)
4298 {
4299         GSupplicantInterface *tmp;
4300
4301         tmp = g_hash_table_lookup(interface_table, path);
4302         if (tmp && tmp == interface)
4303                 return true;
4304
4305         return false;
4306 }
4307
4308 static void interface_create_property(const char *key, DBusMessageIter *iter,
4309                                                         void *user_data)
4310 {
4311         struct interface_create_data *data = user_data;
4312         GSupplicantInterface *interface = data->interface;
4313
4314         if (!key) {
4315                 if (data->callback) {
4316                         data->callback(0, data->interface, data->user_data);
4317 #if !defined TIZEN_EXT
4318                         callback_p2p_support(interface);
4319 #endif
4320                 }
4321
4322                 interface_create_data_free(data);
4323         }
4324
4325         interface_property(key, iter, interface);
4326 }
4327
4328 static void interface_create_result(const char *error,
4329                                 DBusMessageIter *iter, void *user_data)
4330 {
4331         struct interface_create_data *data = user_data;
4332         const char *path = NULL;
4333         int err;
4334
4335         SUPPLICANT_DBG("");
4336
4337         if (error) {
4338                 g_warning("error %s", error);
4339                 err = -EIO;
4340                 goto done;
4341         }
4342
4343         dbus_message_iter_get_basic(iter, &path);
4344         if (!path) {
4345                 err = -EINVAL;
4346                 goto done;
4347         }
4348
4349         if (!system_available) {
4350                 err = -EFAULT;
4351                 goto done;
4352         }
4353
4354         data->interface = g_hash_table_lookup(interface_table, path);
4355         if (!data->interface) {
4356                 data->interface = interface_alloc(path);
4357                 if (!data->interface) {
4358                         err = -ENOMEM;
4359                         goto done;
4360                 }
4361         }
4362
4363         err = supplicant_dbus_property_get_all(path,
4364                                         SUPPLICANT_INTERFACE ".Interface",
4365                                         interface_create_property, data,
4366                                         NULL);
4367         if (err == 0)
4368                 return;
4369
4370 done:
4371         if (data->callback)
4372                 data->callback(err, NULL, data->user_data);
4373
4374         interface_create_data_free(data);
4375 }
4376
4377 static void interface_create_params(DBusMessageIter *iter, void *user_data)
4378 {
4379         struct interface_create_data *data = user_data;
4380         DBusMessageIter dict;
4381         char *config_file = NULL;
4382
4383         SUPPLICANT_DBG("");
4384
4385         supplicant_dbus_dict_open(iter, &dict);
4386
4387         supplicant_dbus_dict_append_basic(&dict, "Ifname",
4388                                         DBUS_TYPE_STRING, &data->ifname);
4389
4390         if (data->driver)
4391                 supplicant_dbus_dict_append_basic(&dict, "Driver",
4392                                         DBUS_TYPE_STRING, &data->driver);
4393
4394         if (data->bridge)
4395                 supplicant_dbus_dict_append_basic(&dict, "BridgeIfname",
4396                                         DBUS_TYPE_STRING, &data->bridge);
4397
4398         config_file = g_hash_table_lookup(config_file_table, data->ifname);
4399         if (config_file) {
4400                 SUPPLICANT_DBG("[%s] ConfigFile %s", data->ifname, config_file);
4401
4402                 supplicant_dbus_dict_append_basic(&dict, "ConfigFile",
4403                                         DBUS_TYPE_STRING, &config_file);
4404         }
4405
4406         supplicant_dbus_dict_close(iter, &dict);
4407 }
4408
4409 static void interface_get_result(const char *error,
4410                                 DBusMessageIter *iter, void *user_data)
4411 {
4412         struct interface_create_data *data = user_data;
4413         GSupplicantInterface *interface;
4414         const char *path = NULL;
4415         int err;
4416
4417         SUPPLICANT_DBG("");
4418
4419         if (error) {
4420                 SUPPLICANT_DBG("Interface not created yet");
4421                 goto create;
4422         }
4423
4424         dbus_message_iter_get_basic(iter, &path);
4425         if (!path) {
4426                 err = -EINVAL;
4427                 goto done;
4428         }
4429
4430         interface = g_hash_table_lookup(interface_table, path);
4431         if (!interface) {
4432                 err = -ENOENT;
4433                 goto done;
4434         }
4435
4436         if (data->callback) {
4437                 data->callback(0, interface, data->user_data);
4438 #if !defined TIZEN_EXT
4439                 callback_p2p_support(interface);
4440 #endif
4441         }
4442
4443         interface_create_data_free(data);
4444
4445         return;
4446
4447 create:
4448         if (!system_available) {
4449                 err = -EFAULT;
4450                 goto done;
4451         }
4452
4453         SUPPLICANT_DBG("Creating interface");
4454
4455         err = supplicant_dbus_method_call(SUPPLICANT_PATH,
4456                                                 SUPPLICANT_INTERFACE,
4457                                                 "CreateInterface",
4458                                                 interface_create_params,
4459                                                 interface_create_result, data,
4460                                                 NULL);
4461         if (err == 0)
4462                 return;
4463
4464 done:
4465         if (data->callback)
4466                 data->callback(err, NULL, data->user_data);
4467
4468         interface_create_data_free(data);
4469 }
4470
4471 static void interface_get_params(DBusMessageIter *iter, void *user_data)
4472 {
4473         struct interface_create_data *data = user_data;
4474
4475         SUPPLICANT_DBG("");
4476
4477         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, &data->ifname);
4478 }
4479
4480 int g_supplicant_interface_create(const char *ifname, const char *driver,
4481                                         const char *bridge,
4482                                         GSupplicantInterfaceCallback callback,
4483                                                         void *user_data)
4484 {
4485         struct interface_create_data *data;
4486         int ret;
4487
4488         SUPPLICANT_DBG("ifname %s", ifname);
4489
4490         if (!ifname)
4491                 return -EINVAL;
4492
4493         if (!system_available)
4494                 return -EFAULT;
4495
4496         data = dbus_malloc0(sizeof(*data));
4497         if (!data)
4498                 return -ENOMEM;
4499
4500         data->ifname = g_strdup(ifname);
4501         data->driver = g_strdup(driver);
4502         data->bridge = g_strdup(bridge);
4503         data->callback = callback;
4504         data->user_data = user_data;
4505
4506         ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
4507                                                 SUPPLICANT_INTERFACE,
4508                                                 "GetInterface",
4509                                                 interface_get_params,
4510                                                 interface_get_result, data,
4511                                                 NULL);
4512         if (ret < 0)
4513                 interface_create_data_free(data);
4514
4515         return ret;
4516 }
4517
4518 static void interface_remove_result(const char *error,
4519                                 DBusMessageIter *iter, void *user_data)
4520 {
4521         struct interface_data *data = user_data;
4522         int err;
4523
4524         if (error) {
4525                 err = -EIO;
4526                 SUPPLICANT_DBG("error: %s", error);
4527                 goto done;
4528         }
4529
4530         if (!system_available) {
4531                 err = -EFAULT;
4532                 goto done;
4533         }
4534
4535         /*
4536          * The gsupplicant interface is already freed by the InterfaceRemoved
4537          * signal callback. Simply invoke the interface_data callback.
4538          */
4539         err = 0;
4540
4541 done:
4542         g_free(data->path);
4543
4544         if (data->callback)
4545                 data->callback(err, NULL, data->user_data);
4546
4547         dbus_free(data);
4548 }
4549
4550
4551 static void interface_remove_params(DBusMessageIter *iter, void *user_data)
4552 {
4553         struct interface_data *data = user_data;
4554
4555         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
4556                                                         &data->interface->path);
4557 }
4558
4559
4560 int g_supplicant_interface_remove(GSupplicantInterface *interface,
4561                         GSupplicantInterfaceCallback callback,
4562                                                         void *user_data)
4563 {
4564         struct interface_data *data;
4565         int ret;
4566
4567         if (!interface)
4568                 return -EINVAL;
4569
4570         if (!system_available)
4571                 return -EFAULT;
4572
4573         g_supplicant_interface_cancel(interface);
4574
4575         data = dbus_malloc0(sizeof(*data));
4576         if (!data)
4577                 return -ENOMEM;
4578
4579         data->interface = interface;
4580         data->path = g_strdup(interface->path);
4581         data->callback = callback;
4582         data->user_data = user_data;
4583
4584         ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
4585                                                 SUPPLICANT_INTERFACE,
4586                                                 "RemoveInterface",
4587                                                 interface_remove_params,
4588                                                 interface_remove_result, data,
4589                                                 NULL);
4590         if (ret < 0) {
4591                 g_free(data->path);
4592                 dbus_free(data);
4593         }
4594         return ret;
4595 }
4596
4597 static void interface_scan_result(const char *error,
4598                                 DBusMessageIter *iter, void *user_data)
4599 {
4600         struct interface_scan_data *data = user_data;
4601         int err = 0;
4602
4603         if (error) {
4604                 SUPPLICANT_DBG("error %s", error);
4605                 err = -EIO;
4606         }
4607
4608         /* A non ready interface cannot send/receive anything */
4609         if (interface_exists(data->interface, data->path)) {
4610                 if (!data->interface->ready)
4611                         err = -ENOLINK;
4612         }
4613
4614         g_free(data->path);
4615
4616         if (err != 0) {
4617                 if (data->callback)
4618                         data->callback(err, data->interface, data->user_data);
4619         } else {
4620                 data->interface->scan_callback = data->callback;
4621                 data->interface->scan_data = data->user_data;
4622         }
4623
4624         if (data->scan_params)
4625                 g_supplicant_free_scan_params(data->scan_params);
4626
4627         dbus_free(data);
4628 }
4629
4630 static void add_scan_frequency(DBusMessageIter *iter, unsigned int freq)
4631 {
4632         DBusMessageIter data;
4633         unsigned int width = 0; /* Not used by wpa_supplicant atm */
4634
4635         dbus_message_iter_open_container(iter, DBUS_TYPE_STRUCT, NULL, &data);
4636
4637         dbus_message_iter_append_basic(&data, DBUS_TYPE_UINT32, &freq);
4638         dbus_message_iter_append_basic(&data, DBUS_TYPE_UINT32, &width);
4639
4640         dbus_message_iter_close_container(iter, &data);
4641 }
4642
4643 static void add_scan_frequencies(DBusMessageIter *iter,
4644                                                 void *user_data)
4645 {
4646         GSupplicantScanParams *scan_data = user_data;
4647         unsigned int freq;
4648         int i;
4649
4650         for (i = 0; i < scan_data->num_freqs; i++) {
4651                 freq = scan_data->freqs[i];
4652                 if (!freq)
4653                         break;
4654
4655                 add_scan_frequency(iter, freq);
4656         }
4657 }
4658
4659 static void append_ssid(DBusMessageIter *iter,
4660                         const void *ssid, unsigned int len)
4661 {
4662         DBusMessageIter array;
4663
4664         dbus_message_iter_open_container(iter, DBUS_TYPE_ARRAY,
4665         DBUS_TYPE_BYTE_AS_STRING, &array);
4666
4667         dbus_message_iter_append_fixed_array(&array, DBUS_TYPE_BYTE,
4668                                                                 &ssid, len);
4669         dbus_message_iter_close_container(iter, &array);
4670 }
4671
4672 static void append_ssids(DBusMessageIter *iter, void *user_data)
4673 {
4674         GSupplicantScanParams *scan_data = user_data;
4675         GSList *list;
4676
4677         for (list = scan_data->ssids; list; list = list->next) {
4678                 struct scan_ssid *scan_ssid = list->data;
4679
4680                 append_ssid(iter, scan_ssid->ssid, scan_ssid->ssid_len);
4681         }
4682 }
4683
4684 static void supplicant_add_scan_frequency(DBusMessageIter *dict,
4685                 supplicant_dbus_array_function function,
4686                                         void *user_data)
4687 {
4688         GSupplicantScanParams *scan_params = user_data;
4689         DBusMessageIter entry, value, array;
4690         const char *key = "Channels";
4691
4692         if (scan_params->freqs && scan_params->freqs[0] != 0) {
4693                 dbus_message_iter_open_container(dict, DBUS_TYPE_DICT_ENTRY,
4694                                                 NULL, &entry);
4695
4696                 dbus_message_iter_append_basic(&entry, DBUS_TYPE_STRING, &key);
4697
4698                 dbus_message_iter_open_container(&entry, DBUS_TYPE_VARIANT,
4699                                         DBUS_TYPE_ARRAY_AS_STRING
4700                                         DBUS_STRUCT_BEGIN_CHAR_AS_STRING
4701                                         DBUS_TYPE_UINT32_AS_STRING
4702                                         DBUS_TYPE_UINT32_AS_STRING
4703                                         DBUS_STRUCT_END_CHAR_AS_STRING,
4704                                         &value);
4705
4706                 dbus_message_iter_open_container(&value, DBUS_TYPE_ARRAY,
4707                                         DBUS_STRUCT_BEGIN_CHAR_AS_STRING
4708                                         DBUS_TYPE_UINT32_AS_STRING
4709                                         DBUS_TYPE_UINT32_AS_STRING
4710                                         DBUS_STRUCT_END_CHAR_AS_STRING,
4711                                         &array);
4712
4713                 if (function)
4714                         function(&array, user_data);
4715
4716                 dbus_message_iter_close_container(&value, &array);
4717                 dbus_message_iter_close_container(&entry, &value);
4718                 dbus_message_iter_close_container(dict, &entry);
4719         }
4720 }
4721
4722 static void interface_scan_params(DBusMessageIter *iter, void *user_data)
4723 {
4724         DBusMessageIter dict;
4725         const char *type = "passive";
4726         struct interface_scan_data *data = user_data;
4727
4728         supplicant_dbus_dict_open(iter, &dict);
4729
4730         if (data && data->scan_params) {
4731                 type = "active";
4732
4733                 supplicant_dbus_dict_append_basic(&dict, "Type",
4734                                         DBUS_TYPE_STRING, &type);
4735
4736 #if defined TIZEN_EXT
4737                 SUPPLICANT_DBG("[specific_scan] num_ssids %d", data->scan_params->num_ssids);
4738                 if (data->scan_params->num_ssids != 0)
4739 #endif
4740                         supplicant_dbus_dict_append_array(&dict, "SSIDs",
4741                                                 DBUS_TYPE_STRING,
4742                                                 append_ssids,
4743                                                 data->scan_params);
4744
4745                 supplicant_add_scan_frequency(&dict, add_scan_frequencies,
4746                                                 data->scan_params);
4747         } else
4748                 supplicant_dbus_dict_append_basic(&dict, "Type",
4749                                         DBUS_TYPE_STRING, &type);
4750
4751         supplicant_dbus_dict_close(iter, &dict);
4752 }
4753
4754 static int interface_ready_to_scan(GSupplicantInterface *interface)
4755 {
4756         if (!interface)
4757                 return -EINVAL;
4758
4759         if (!system_available)
4760                 return -EFAULT;
4761
4762         if (interface->scanning)
4763                 return -EALREADY;
4764
4765         switch (interface->state) {
4766         case G_SUPPLICANT_STATE_AUTHENTICATING:
4767         case G_SUPPLICANT_STATE_ASSOCIATING:
4768         case G_SUPPLICANT_STATE_ASSOCIATED:
4769         case G_SUPPLICANT_STATE_4WAY_HANDSHAKE:
4770         case G_SUPPLICANT_STATE_GROUP_HANDSHAKE:
4771                 return -EBUSY;
4772 #if defined TIZEN_EXT
4773         case G_SUPPLICANT_STATE_DISABLED:
4774                 return -ENOLINK;
4775         case G_SUPPLICANT_STATE_UNKNOWN:
4776 #else
4777         case G_SUPPLICANT_STATE_UNKNOWN:
4778         case G_SUPPLICANT_STATE_DISABLED:
4779 #endif
4780         case G_SUPPLICANT_STATE_DISCONNECTED:
4781         case G_SUPPLICANT_STATE_INACTIVE:
4782         case G_SUPPLICANT_STATE_SCANNING:
4783         case G_SUPPLICANT_STATE_COMPLETED:
4784                 break;
4785         }
4786
4787         return 0;
4788 }
4789
4790 int g_supplicant_interface_scan(GSupplicantInterface *interface,
4791                                 GSupplicantScanParams *scan_data,
4792                                 GSupplicantInterfaceCallback callback,
4793                                                         void *user_data)
4794 {
4795         struct interface_scan_data *data;
4796         int ret;
4797
4798         ret = interface_ready_to_scan(interface);
4799         if (ret)
4800                 return ret;
4801
4802         data = dbus_malloc0(sizeof(*data));
4803         if (!data)
4804                 return -ENOMEM;
4805
4806         data->interface = interface;
4807         data->path = g_strdup(interface->path);
4808 #if defined TIZEN_EXT
4809         data->interface->scan_callback = data->callback = callback;
4810         data->interface->scan_data = data->user_data = user_data;
4811 #else
4812         data->callback = callback;
4813         data->user_data = user_data;
4814 #endif
4815         data->scan_params = scan_data;
4816
4817         interface->scan_callback = callback;
4818         interface->scan_data = user_data;
4819
4820         ret = supplicant_dbus_method_call(interface->path,
4821                         SUPPLICANT_INTERFACE ".Interface", "Scan",
4822                         interface_scan_params, interface_scan_result, data,
4823                         interface);
4824
4825         if (ret < 0) {
4826                 g_free(data->path);
4827                 dbus_free(data);
4828         }
4829
4830         return ret;
4831 }
4832
4833 static int parse_supplicant_error(DBusMessageIter *iter)
4834 {
4835         int err = -ECONNABORTED;
4836         char *key;
4837
4838         if (!iter)
4839                 return err;
4840
4841         /* If the given passphrase is malformed wpa_s returns
4842          * "invalid message format" but this error should be interpreted as
4843          * invalid-key.
4844          */
4845         while (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_STRING) {
4846                 dbus_message_iter_get_basic(iter, &key);
4847                 if (strncmp(key, "psk", 3) == 0 ||
4848                                 strncmp(key, "wep_key", 7) == 0 ||
4849                                 strcmp(key, "invalid message format") == 0) {
4850                         err = -ENOKEY;
4851                         break;
4852                 }
4853                 dbus_message_iter_next(iter);
4854         }
4855
4856         return err;
4857 }
4858
4859 static void interface_select_network_result(const char *error,
4860                                 DBusMessageIter *iter, void *user_data)
4861 {
4862         struct interface_connect_data *data = user_data;
4863         int err;
4864
4865         SUPPLICANT_DBG("");
4866
4867         err = 0;
4868         if (error) {
4869 #if defined TIZEN_EXT
4870                 SUPPLICANT_DBG("SelectNetwork errorFreq %s", error);
4871 #else
4872                 SUPPLICANT_DBG("SelectNetwork error %s", error);
4873 #endif
4874                 err = parse_supplicant_error(iter);
4875         }
4876
4877         g_free(data->path);
4878
4879         if (data->callback)
4880                 data->callback(err, data->interface, data->user_data);
4881
4882 #if defined TIZEN_EXT
4883         g_free(data->ssid->ssid);
4884 #endif
4885         g_free(data->ssid);
4886         dbus_free(data);
4887 }
4888
4889 static void interface_select_network_params(DBusMessageIter *iter,
4890                                                         void *user_data)
4891 {
4892         struct interface_connect_data *data = user_data;
4893         GSupplicantInterface *interface = data->interface;
4894 #if defined TIZEN_EXT
4895         GSupplicantSSID *ssid = data->ssid;
4896 #endif
4897
4898         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
4899                                         &interface->network_path);
4900 #if defined TIZEN_EXT
4901         if (!ssid->bssid_for_connect_len)
4902                 dbus_message_iter_append_basic(iter, DBUS_TYPE_INT32, &ssid->freq);
4903 #endif
4904 }
4905
4906 static void interface_add_network_result(const char *error,
4907                                 DBusMessageIter *iter, void *user_data)
4908 {
4909         struct interface_connect_data *data = user_data;
4910         GSupplicantInterface *interface = data->interface;
4911         const char *path;
4912         int err;
4913
4914         if (error)
4915                 goto error;
4916
4917         dbus_message_iter_get_basic(iter, &path);
4918         if (!path)
4919                 goto error;
4920
4921         SUPPLICANT_DBG("PATH: %s", path);
4922
4923 #if defined TIZEN_EXT
4924         if (interface->network_path)
4925                 g_free(interface->network_path);
4926 #endif
4927         interface->network_path = g_strdup(path);
4928
4929         store_network_information(interface, data->ssid);
4930
4931 #if defined TIZEN_EXT
4932         SUPPLICANT_DBG(".Interface.SelectNetworkFreq");
4933         GSupplicantSSID *ssid = data->ssid;
4934
4935         if (!ssid->bssid_for_connect_len)
4936                 supplicant_dbus_method_call(data->interface->path,
4937                                 SUPPLICANT_INTERFACE ".Interface", "SelectNetworkFreq",
4938                                 interface_select_network_params,
4939                                 interface_select_network_result, data,
4940                                 interface);
4941         else
4942                 supplicant_dbus_method_call(data->interface->path,
4943                                 SUPPLICANT_INTERFACE ".Interface", "SelectNetwork",
4944                                 interface_select_network_params,
4945                                 interface_select_network_result, data,
4946                                 interface);
4947 #else
4948         supplicant_dbus_method_call(data->interface->path,
4949                         SUPPLICANT_INTERFACE ".Interface", "SelectNetwork",
4950                         interface_select_network_params,
4951                         interface_select_network_result, data,
4952                         interface);
4953 #endif
4954
4955         return;
4956
4957 error:
4958         SUPPLICANT_DBG("AddNetwork error %s", error);
4959
4960         if (interface_exists(data->interface, data->interface->path)) {
4961                 err = parse_supplicant_error(iter);
4962                 if (data->callback)
4963                         data->callback(err, data->interface, data->user_data);
4964
4965                 g_free(interface->network_path);
4966                 interface->network_path = NULL;
4967         }
4968
4969         g_free(data->path);
4970 #if defined TIZEN_EXT
4971         g_free(data->ssid->ssid);
4972 #endif
4973         g_free(data->ssid);
4974         g_free(data);
4975 }
4976
4977 static void add_network_security_none(DBusMessageIter *dict)
4978 {
4979         const char *auth_alg = "OPEN";
4980
4981         supplicant_dbus_dict_append_basic(dict, "auth_alg",
4982                                         DBUS_TYPE_STRING, &auth_alg);
4983 }
4984
4985 static void add_network_security_wep(DBusMessageIter *dict,
4986                                         GSupplicantSSID *ssid)
4987 {
4988         const char *auth_alg = "OPEN SHARED";
4989         dbus_uint32_t key_index = 0;
4990
4991         supplicant_dbus_dict_append_basic(dict, "auth_alg",
4992                                         DBUS_TYPE_STRING, &auth_alg);
4993
4994         if (ssid->passphrase) {
4995                 int size = strlen(ssid->passphrase);
4996                 if (size == 10 || size == 26) {
4997                         unsigned char *key = g_try_malloc(13);
4998                         char tmp[3];
4999                         int i;
5000
5001                         memset(tmp, 0, sizeof(tmp));
5002                         if (!key)
5003                                 size = 0;
5004
5005                         for (i = 0; i < size / 2; i++) {
5006                                 memcpy(tmp, ssid->passphrase + (i * 2), 2);
5007                                 key[i] = (unsigned char) strtol(tmp, NULL, 16);
5008                         }
5009
5010                         supplicant_dbus_dict_append_fixed_array(dict,
5011                                                         "wep_key0",
5012                                                         DBUS_TYPE_BYTE,
5013                                                         &key, size / 2);
5014                         g_free(key);
5015                 } else if (size == 5 || size == 13) {
5016                         unsigned char *key = g_try_malloc(13);
5017                         int i;
5018
5019                         if (!key)
5020                                 size = 0;
5021
5022                         for (i = 0; i < size; i++)
5023                                 key[i] = (unsigned char) ssid->passphrase[i];
5024
5025                         supplicant_dbus_dict_append_fixed_array(dict,
5026                                                                 "wep_key0",
5027                                                                 DBUS_TYPE_BYTE,
5028                                                                 &key, size);
5029                         g_free(key);
5030                 } else
5031                         supplicant_dbus_dict_append_basic(dict,
5032                                                         "wep_key0",
5033                                                         DBUS_TYPE_STRING,
5034                                                         &ssid->passphrase);
5035
5036                 supplicant_dbus_dict_append_basic(dict, "wep_tx_keyidx",
5037                                         DBUS_TYPE_UINT32, &key_index);
5038         }
5039 }
5040
5041 static dbus_bool_t is_psk_raw_key(const char *psk)
5042 {
5043         int i;
5044
5045         /* A raw key is always 64 bytes length... */
5046         if (strlen(psk) != 64)
5047                 return FALSE;
5048
5049         /* ... and its content is in hex representation */
5050         for (i = 0; i < 64; i++)
5051                 if (!isxdigit((unsigned char) psk[i]))
5052                         return FALSE;
5053
5054         return TRUE;
5055 }
5056
5057 static unsigned char hexchar2bin(char c)
5058 {
5059         if ((c >= '0') && (c <= '9'))
5060                 return c - '0';
5061         else if ((c >= 'A') && (c <= 'F'))
5062                 return c - 'A' + 10;
5063         else if ((c >= 'a') && (c <= 'f'))
5064                 return c - 'a' + 10;
5065         else
5066                 return c;
5067 }
5068
5069 static void hexstring2bin(const char *string, unsigned char *data,
5070                                 size_t data_len)
5071 {
5072         size_t i;
5073
5074         for (i = 0; i < data_len; i++)
5075                 data[i] = (hexchar2bin(string[i * 2 + 0]) << 4 |
5076                            hexchar2bin(string[i * 2 + 1]) << 0);
5077 }
5078
5079 static void add_network_security_psk(DBusMessageIter *dict,
5080                                         GSupplicantSSID *ssid)
5081 {
5082         if (ssid->passphrase && strlen(ssid->passphrase) > 0) {
5083                 const char *key = "psk";
5084
5085                 if (is_psk_raw_key(ssid->passphrase)) {
5086                         unsigned char data[32];
5087                         unsigned char *datap = data;
5088
5089                         /* The above pointer alias is required by D-Bus because
5090                          * with D-Bus and GCC, non-heap-allocated arrays cannot
5091                          * be passed directly by their base pointer. */
5092
5093                         hexstring2bin(ssid->passphrase, datap, sizeof(data));
5094
5095                         supplicant_dbus_dict_append_fixed_array(dict,
5096                                                         key, DBUS_TYPE_BYTE,
5097                                                         &datap, sizeof(data));
5098                 } else
5099                         supplicant_dbus_dict_append_basic(dict,
5100                                                         key, DBUS_TYPE_STRING,
5101                                                         &ssid->passphrase);
5102         }
5103 }
5104
5105 static void add_network_security_tls(DBusMessageIter *dict,
5106                                         GSupplicantSSID *ssid)
5107 {
5108         /*
5109          * For TLS, we at least need:
5110          *              The client certificate
5111          *              The client private key file
5112          *              The client private key file password
5113          *
5114          * The Authority certificate is optional.
5115          */
5116         if (!ssid->client_cert_path)
5117                 return;
5118
5119         if (!ssid->private_key_path)
5120                 return;
5121
5122 #if !defined TIZEN_EXT
5123         if (!ssid->private_key_passphrase)
5124                 return;
5125 #endif
5126
5127         if (ssid->ca_cert_path)
5128                 supplicant_dbus_dict_append_basic(dict, "ca_cert",
5129                                         DBUS_TYPE_STRING, &ssid->ca_cert_path);
5130
5131         supplicant_dbus_dict_append_basic(dict, "private_key",
5132                                                 DBUS_TYPE_STRING,
5133                                                 &ssid->private_key_path);
5134 #if !defined TIZEN_EXT
5135         supplicant_dbus_dict_append_basic(dict, "private_key_passwd",
5136                                                 DBUS_TYPE_STRING,
5137                                                 &ssid->private_key_passphrase);
5138 #endif
5139         supplicant_dbus_dict_append_basic(dict, "client_cert",
5140                                                 DBUS_TYPE_STRING,
5141                                                 &ssid->client_cert_path);
5142 }
5143
5144 static void add_network_security_peap(DBusMessageIter *dict,
5145                                         GSupplicantSSID *ssid)
5146 {
5147         char *phase2_auth;
5148
5149         /*
5150          * For PEAP/TTLS, we at least need
5151          *              The authority certificate
5152          *              The 2nd phase authentication method
5153          *              The 2nd phase passphrase
5154          *
5155          * The Client certificate is optional although strongly recommended
5156          * When setting it, we need in addition
5157          *              The Client private key file
5158          *              The Client private key file password
5159          */
5160         if (!ssid->passphrase)
5161                 return;
5162
5163         if (!ssid->phase2_auth)
5164                 return;
5165
5166         if (ssid->client_cert_path) {
5167                 if (!ssid->private_key_path)
5168                         return;
5169
5170 #if !defined TIZEN_EXT
5171                 if (!ssid->private_key_passphrase)
5172                         return;
5173 #endif
5174
5175                 supplicant_dbus_dict_append_basic(dict, "client_cert",
5176                                                 DBUS_TYPE_STRING,
5177                                                 &ssid->client_cert_path);
5178
5179                 supplicant_dbus_dict_append_basic(dict, "private_key",
5180                                                 DBUS_TYPE_STRING,
5181                                                 &ssid->private_key_path);
5182
5183 #if !defined TIZEN_EXT
5184                 supplicant_dbus_dict_append_basic(dict, "private_key_passwd",
5185                                                 DBUS_TYPE_STRING,
5186                                                 &ssid->private_key_passphrase);
5187 #endif
5188
5189         }
5190
5191         if (g_str_has_prefix(ssid->phase2_auth, "EAP-")) {
5192                 phase2_auth = g_strdup_printf("autheap=%s",
5193                                         ssid->phase2_auth + strlen("EAP-"));
5194         } else
5195                 phase2_auth = g_strdup_printf("auth=%s", ssid->phase2_auth);
5196
5197         supplicant_dbus_dict_append_basic(dict, "password",
5198                                                 DBUS_TYPE_STRING,
5199                                                 &ssid->passphrase);
5200
5201         if (ssid->ca_cert_path)
5202                 supplicant_dbus_dict_append_basic(dict, "ca_cert",
5203                                                 DBUS_TYPE_STRING,
5204                                                 &ssid->ca_cert_path);
5205
5206         supplicant_dbus_dict_append_basic(dict, "phase2",
5207                                                 DBUS_TYPE_STRING,
5208                                                 &phase2_auth);
5209
5210         g_free(phase2_auth);
5211 }
5212
5213 #if defined TIZEN_EXT
5214 static void add_network_security_aka_sim(DBusMessageIter *dict,
5215                                         GSupplicantSSID *ssid)
5216 {
5217         if (!ssid->passphrase)
5218                 return;
5219
5220         supplicant_dbus_dict_append_basic(dict, "password",
5221                         DBUS_TYPE_STRING,
5222                         &ssid->passphrase);
5223 }
5224
5225 static void add_network_security_fast(DBusMessageIter *dict,
5226                 GSupplicantSSID *ssid)
5227 {
5228         /*
5229          * For FAST, we at least need:
5230          *              id / password
5231          *              phase1 (provisiong information)
5232          *              pac_file
5233          */
5234
5235         /* Allow provisioing both authenticated and unauthenticated */
5236         const char *phase1 = "fast_provisioning=2";
5237         supplicant_dbus_dict_append_basic(dict, "phase1",
5238                         DBUS_TYPE_STRING,
5239                         &phase1);
5240
5241         SUPPLICANT_DBG("pac_file [%s]", ssid->pac_file);
5242         if(ssid->pac_file)
5243                 supplicant_dbus_dict_append_basic(dict, "pac_file",
5244                                 DBUS_TYPE_STRING,
5245                                 &ssid->pac_file);
5246
5247         supplicant_dbus_dict_append_basic(dict, "password",
5248                         DBUS_TYPE_STRING,
5249                         &ssid->passphrase);
5250 }
5251 #endif
5252
5253 static void add_network_security_eap(DBusMessageIter *dict,
5254                                         GSupplicantSSID *ssid)
5255 {
5256         char *eap_value;
5257
5258 #if defined TIZEN_EXT
5259         if (!ssid->eap)
5260 #else
5261         if (!ssid->eap || !ssid->identity)
5262 #endif
5263                 return;
5264
5265         if (g_strcmp0(ssid->eap, "tls") == 0) {
5266                 add_network_security_tls(dict, ssid);
5267         } else if (g_strcmp0(ssid->eap, "peap") == 0 ||
5268                                 g_strcmp0(ssid->eap, "ttls") == 0) {
5269 #if defined TIZEN_EXT
5270                 if (!ssid->identity)
5271                         return;
5272 #endif
5273                 add_network_security_peap(dict, ssid);
5274
5275 #if defined TIZEN_EXT
5276         } else if (g_strcmp0(ssid->eap, "sim") == 0 ||
5277                         g_strcmp0(ssid->eap, "aka") == 0 ||
5278                         g_strcmp0(ssid->eap, "aka'") == 0) {
5279                 add_network_security_aka_sim(dict, ssid);
5280         } else if (g_strcmp0(ssid->eap, "pwd") == 0) {
5281                 if(!ssid->passphrase)
5282                         return;
5283                 supplicant_dbus_dict_append_basic(dict, "password",
5284                                 DBUS_TYPE_STRING,
5285                                 &ssid->passphrase);
5286         } else if (g_strcmp0(ssid->eap, "fast") == 0){
5287                 if (!ssid->identity || !ssid->passphrase)
5288                         return;
5289
5290                 add_network_security_fast(dict, ssid);
5291 #endif
5292         } else
5293                 return;
5294
5295         eap_value = g_ascii_strup(ssid->eap, -1);
5296
5297         supplicant_dbus_dict_append_basic(dict, "eap",
5298                                                 DBUS_TYPE_STRING,
5299                                                 &eap_value);
5300 #if defined TIZEN_EXT
5301         if (ssid->identity != NULL)
5302                 supplicant_dbus_dict_append_basic(dict, "identity",
5303                                                         DBUS_TYPE_STRING,
5304                                                         &ssid->identity);
5305 #else
5306         supplicant_dbus_dict_append_basic(dict, "identity",
5307                                                 DBUS_TYPE_STRING,
5308                                                 &ssid->identity);
5309 #endif
5310         if(ssid->anonymous_identity)
5311                 supplicant_dbus_dict_append_basic(dict, "anonymous_identity",
5312                                                      DBUS_TYPE_STRING,
5313                                                      &ssid->anonymous_identity);
5314
5315         if(ssid->subject_match)
5316                 supplicant_dbus_dict_append_basic(dict, "subject_match",
5317                                                      DBUS_TYPE_STRING,
5318                                                      &ssid->subject_match);
5319
5320         if(ssid->altsubject_match)
5321                 supplicant_dbus_dict_append_basic(dict, "altsubject_match",
5322                                                      DBUS_TYPE_STRING,
5323                                                      &ssid->altsubject_match);
5324
5325         if(ssid->domain_suffix_match)
5326                 supplicant_dbus_dict_append_basic(dict, "domain_suffix_match",
5327                                                      DBUS_TYPE_STRING,
5328                                                      &ssid->domain_suffix_match);
5329
5330         if(ssid->domain_match)
5331                 supplicant_dbus_dict_append_basic(dict, "domain_match",
5332                                                      DBUS_TYPE_STRING,
5333                                                      &ssid->domain_match);
5334
5335         g_free(eap_value);
5336 }
5337
5338 static void add_network_security_ciphers(DBusMessageIter *dict,
5339                                                 GSupplicantSSID *ssid)
5340 {
5341         unsigned int p_cipher, g_cipher, i;
5342         char *pairwise, *group;
5343         char *pair_ciphers[4];
5344         char *group_ciphers[5];
5345
5346         p_cipher = ssid->pairwise_cipher;
5347         g_cipher = ssid->group_cipher;
5348
5349         if (p_cipher == 0 && g_cipher == 0)
5350                 return;
5351
5352         i = 0;
5353
5354         if (p_cipher & G_SUPPLICANT_PAIRWISE_CCMP)
5355                 pair_ciphers[i++] = "CCMP";
5356
5357         if (p_cipher & G_SUPPLICANT_PAIRWISE_TKIP)
5358                 pair_ciphers[i++] = "TKIP";
5359
5360         if (p_cipher & G_SUPPLICANT_PAIRWISE_NONE)
5361                 pair_ciphers[i++] = "NONE";
5362
5363         pair_ciphers[i] = NULL;
5364
5365         i = 0;
5366
5367         if (g_cipher & G_SUPPLICANT_GROUP_CCMP)
5368                 group_ciphers[i++] = "CCMP";
5369
5370         if (g_cipher & G_SUPPLICANT_GROUP_TKIP)
5371                 group_ciphers[i++] = "TKIP";
5372
5373         if (g_cipher & G_SUPPLICANT_GROUP_WEP104)
5374                 group_ciphers[i++] = "WEP104";
5375
5376         if (g_cipher & G_SUPPLICANT_GROUP_WEP40)
5377                 group_ciphers[i++] = "WEP40";
5378
5379         group_ciphers[i] = NULL;
5380
5381         pairwise = g_strjoinv(" ", pair_ciphers);
5382         group = g_strjoinv(" ", group_ciphers);
5383
5384         SUPPLICANT_DBG("cipher %s %s", pairwise, group);
5385
5386         supplicant_dbus_dict_append_basic(dict, "pairwise",
5387                                                 DBUS_TYPE_STRING,
5388                                                 &pairwise);
5389         supplicant_dbus_dict_append_basic(dict, "group",
5390                                                 DBUS_TYPE_STRING,
5391                                                 &group);
5392
5393         g_free(pairwise);
5394         g_free(group);
5395 }
5396
5397 static void add_network_security_proto(DBusMessageIter *dict,
5398                                                 GSupplicantSSID *ssid)
5399 {
5400         unsigned int protocol, i;
5401         char *proto;
5402         char *protos[3];
5403
5404         protocol = ssid->protocol;
5405
5406         if (protocol == 0)
5407                 return;
5408
5409         i = 0;
5410
5411         if (protocol & G_SUPPLICANT_PROTO_RSN)
5412                 protos[i++] = "RSN";
5413
5414         if (protocol & G_SUPPLICANT_PROTO_WPA)
5415                 protos[i++] = "WPA";
5416
5417         protos[i] = NULL;
5418
5419         proto = g_strjoinv(" ", protos);
5420
5421         SUPPLICANT_DBG("proto %s", proto);
5422
5423         supplicant_dbus_dict_append_basic(dict, "proto",
5424                                                 DBUS_TYPE_STRING,
5425                                                 &proto);
5426
5427         g_free(proto);
5428 }
5429
5430 static void add_network_security(DBusMessageIter *dict, GSupplicantSSID *ssid)
5431 {
5432         char *key_mgmt;
5433
5434         switch (ssid->security) {
5435         case G_SUPPLICANT_SECURITY_NONE:
5436                 key_mgmt = "NONE";
5437                 add_network_security_none(dict);
5438                 add_network_security_ciphers(dict, ssid);
5439                 break;
5440         case G_SUPPLICANT_SECURITY_UNKNOWN:
5441         case G_SUPPLICANT_SECURITY_WEP:
5442                 key_mgmt = "NONE";
5443                 add_network_security_wep(dict, ssid);
5444                 add_network_security_ciphers(dict, ssid);
5445                 break;
5446         case G_SUPPLICANT_SECURITY_PSK:
5447                 key_mgmt = "WPA-PSK";
5448                 add_network_security_psk(dict, ssid);
5449                 add_network_security_ciphers(dict, ssid);
5450                 add_network_security_proto(dict, ssid);
5451                 break;
5452         case G_SUPPLICANT_SECURITY_IEEE8021X:
5453                 key_mgmt = "WPA-EAP";
5454                 add_network_security_eap(dict, ssid);
5455                 add_network_security_ciphers(dict, ssid);
5456                 add_network_security_proto(dict, ssid);
5457                 break;
5458 #if defined TIZEN_EXT
5459         case G_SUPPLICANT_SECURITY_FT_PSK:
5460                 key_mgmt = "FT-PSK";
5461                 add_network_security_psk(dict, ssid);
5462                 add_network_security_ciphers(dict, ssid);
5463                 add_network_security_proto(dict, ssid);
5464                 break;
5465         case G_SUPPLICANT_SECURITY_FT_IEEE8021X:
5466                 key_mgmt = "FT-EAP";
5467                 add_network_security_eap(dict, ssid);
5468                 add_network_security_ciphers(dict, ssid);
5469                 add_network_security_proto(dict, ssid);
5470                 break;
5471 #endif
5472         }
5473
5474         supplicant_dbus_dict_append_basic(dict, "key_mgmt",
5475                                 DBUS_TYPE_STRING, &key_mgmt);
5476 }
5477
5478 static void add_network_mode(DBusMessageIter *dict, GSupplicantSSID *ssid)
5479 {
5480         dbus_uint32_t mode;
5481
5482         switch (ssid->mode) {
5483         case G_SUPPLICANT_MODE_UNKNOWN:
5484         case G_SUPPLICANT_MODE_INFRA:
5485                 mode = 0;
5486                 break;
5487         case G_SUPPLICANT_MODE_IBSS:
5488                 mode = 1;
5489                 break;
5490         case G_SUPPLICANT_MODE_MASTER:
5491                 mode = 2;
5492                 break;
5493         }
5494
5495         supplicant_dbus_dict_append_basic(dict, "mode",
5496                                 DBUS_TYPE_UINT32, &mode);
5497 }
5498
5499 static void interface_add_network_params(DBusMessageIter *iter, void *user_data)
5500 {
5501         DBusMessageIter dict;
5502         struct interface_connect_data *data = user_data;
5503         GSupplicantSSID *ssid = data->ssid;
5504
5505         supplicant_dbus_dict_open(iter, &dict);
5506
5507         if (ssid->scan_ssid)
5508                 supplicant_dbus_dict_append_basic(&dict, "scan_ssid",
5509                                          DBUS_TYPE_UINT32, &ssid->scan_ssid);
5510
5511         if (ssid->freq)
5512                 supplicant_dbus_dict_append_basic(&dict, "frequency",
5513                                          DBUS_TYPE_UINT32, &ssid->freq);
5514
5515         if (ssid->bgscan)
5516                 supplicant_dbus_dict_append_basic(&dict, "bgscan",
5517                                         DBUS_TYPE_STRING, &ssid->bgscan);
5518
5519         add_network_mode(&dict, ssid);
5520
5521         add_network_security(&dict, ssid);
5522
5523         supplicant_dbus_dict_append_fixed_array(&dict, "ssid",
5524                                         DBUS_TYPE_BYTE, &ssid->ssid,
5525                                                 ssid->ssid_len);
5526
5527         supplicant_dbus_dict_append_basic(&dict, "ignore_broadcast_ssid",
5528                                         DBUS_TYPE_INT32,
5529                                         &ssid->ignore_broadcast_ssid);
5530
5531 #if defined TIZEN_EXT
5532         if (ssid->bssid) {
5533                 char *bssid = NULL;
5534                 bssid = g_try_malloc0(18);
5535                 if (bssid == NULL) {
5536                         SUPPLICANT_DBG("memory allocation error");
5537                         supplicant_dbus_dict_close(iter, &dict);
5538                         return;
5539                 }
5540
5541                 if (ssid->bssid_for_connect_len)
5542                         snprintf(bssid, 18, "%02x:%02x:%02x:%02x:%02x:%02x",
5543                                         ssid->bssid_for_connect[0], ssid->bssid_for_connect[1], ssid->bssid_for_connect[2],
5544                                         ssid->bssid_for_connect[3], ssid->bssid_for_connect[4], ssid->bssid_for_connect[5]);
5545                 else
5546                         snprintf(bssid, 18, "%02x:%02x:%02x:%02x:%02x:%02x",
5547                                         ssid->bssid[0], ssid->bssid[1], ssid->bssid[2],
5548                                         ssid->bssid[3], ssid->bssid[4], ssid->bssid[5]);
5549
5550                 supplicant_dbus_dict_append_basic(&dict, "bssid",
5551                                         DBUS_TYPE_STRING, &bssid);
5552                 g_free(bssid);
5553         }
5554 #endif
5555
5556         supplicant_dbus_dict_close(iter, &dict);
5557 }
5558
5559 static void interface_wps_start_result(const char *error,
5560                                 DBusMessageIter *iter, void *user_data)
5561 {
5562         struct interface_connect_data *data = user_data;
5563         int err;
5564
5565         SUPPLICANT_DBG("");
5566
5567         err = 0;
5568         if (error) {
5569                 SUPPLICANT_DBG("error: %s", error);
5570                 err = parse_supplicant_error(iter);
5571         }
5572
5573         if(data->callback)
5574                 data->callback(err, data->interface, data->user_data);
5575
5576         g_free(data->path);
5577         g_free(data->ssid);
5578         dbus_free(data);
5579 }
5580
5581 static void interface_add_wps_params(DBusMessageIter *iter, void *user_data)
5582 {
5583         struct interface_connect_data *data = user_data;
5584         GSupplicantSSID *ssid = data->ssid;
5585         const char *role = "enrollee", *type;
5586         DBusMessageIter dict;
5587
5588         SUPPLICANT_DBG("");
5589
5590         supplicant_dbus_dict_open(iter, &dict);
5591
5592         supplicant_dbus_dict_append_basic(&dict, "Role",
5593                                                 DBUS_TYPE_STRING, &role);
5594
5595         type = "pbc";
5596         if (ssid->pin_wps) {
5597                 type = "pin";
5598                 supplicant_dbus_dict_append_basic(&dict, "Pin",
5599                                         DBUS_TYPE_STRING, &ssid->pin_wps);
5600         }
5601
5602         supplicant_dbus_dict_append_basic(&dict, "Type",
5603                                         DBUS_TYPE_STRING, &type);
5604
5605 #if defined TIZEN_EXT
5606         if (ssid->bssid)
5607                 supplicant_dbus_dict_append_fixed_array(&dict, "Bssid",
5608                                                 DBUS_TYPE_BYTE, &ssid->bssid, 6);
5609 #endif
5610
5611         supplicant_dbus_dict_close(iter, &dict);
5612 }
5613
5614 static void wps_start(const char *error, DBusMessageIter *iter, void *user_data)
5615 {
5616         struct interface_connect_data *data = user_data;
5617
5618         SUPPLICANT_DBG("");
5619
5620         if (error) {
5621                 SUPPLICANT_DBG("error: %s", error);
5622                 g_free(data->path);
5623                 g_free(data->ssid);
5624                 dbus_free(data);
5625                 return;
5626         }
5627 #if defined TIZEN_EXT
5628         GSupplicantSSID *ssid = data->ssid;
5629         if (ssid->pin_wps != NULL) {
5630                 if (!g_utf8_validate(ssid->pin_wps, 8, NULL)) {
5631                         SUPPLICANT_DBG("Invalid characters in WPS_PIN");
5632                         g_free(data->ssid);
5633                         dbus_free(data);
5634                         return;
5635                 }
5636         }
5637 #endif
5638         supplicant_dbus_method_call(data->interface->path,
5639                         SUPPLICANT_INTERFACE ".Interface.WPS", "Start",
5640                         interface_add_wps_params,
5641                         interface_wps_start_result, data, NULL);
5642 }
5643
5644 static void wps_process_credentials(DBusMessageIter *iter, void *user_data)
5645 {
5646         dbus_bool_t credentials = TRUE;
5647
5648         SUPPLICANT_DBG("");
5649
5650         dbus_message_iter_append_basic(iter, DBUS_TYPE_BOOLEAN, &credentials);
5651 }
5652
5653
5654 #if defined TIZEN_EXT
5655 #define NETCONFIG_SERVICE "net.netconfig"
5656 #define NETCONFIG_WIFI_PATH "/net/netconfig/wifi"
5657 #define NETCONFIG_WIFI_INTERFACE NETCONFIG_SERVICE ".wifi"
5658
5659 struct dec_method_call_data {
5660         struct interface_connect_data *data;
5661         DBusPendingCall *pending_call;
5662 };
5663
5664 static struct dec_method_call_data decrypt_request_data;
5665
5666 static void crypt_method_call_cancel(void)
5667 {
5668         if (decrypt_request_data.pending_call) {
5669                 dbus_pending_call_cancel(decrypt_request_data.pending_call);
5670                 dbus_pending_call_unref(decrypt_request_data.pending_call);
5671                 decrypt_request_data.pending_call = NULL;
5672         }
5673
5674         g_free(decrypt_request_data.data->path);
5675         g_free(decrypt_request_data.data->ssid);
5676         dbus_free(decrypt_request_data.data);
5677         decrypt_request_data.data = NULL;
5678 }
5679
5680 static void decryption_request_reply(DBusPendingCall *call,
5681                                                 void *user_data)
5682 {
5683         DBusMessage *reply;
5684         DBusError error;
5685         DBusMessageIter args;
5686         char *out_data;
5687         int ret;
5688         static gchar* origin_value = NULL;
5689         struct interface_connect_data *data = user_data;
5690
5691         g_free(origin_value);
5692         origin_value = NULL;
5693
5694         SUPPLICANT_DBG("");
5695
5696         reply = dbus_pending_call_steal_reply(call);
5697
5698         dbus_error_init(&error);
5699         if (dbus_set_error_from_message(&error, reply)) {
5700                 SUPPLICANT_DBG("decryption_request_reply() %s %s", error.name, error.message);
5701                 dbus_error_free(&error);
5702                 ret = -EINVAL;
5703                 goto done;
5704         }
5705
5706         if (dbus_message_iter_init(reply, &args) == FALSE) {
5707                 SUPPLICANT_DBG("dbus_message_iter_init() failed");
5708                 ret = -EINVAL;
5709                 goto done;
5710         }
5711
5712         dbus_message_iter_get_basic(&args, &out_data);
5713
5714         origin_value = g_strdup((const gchar *)out_data);
5715         data->ssid->passphrase = origin_value;
5716
5717         ret = supplicant_dbus_method_call(data->interface->path,
5718                 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
5719                 interface_add_network_params,
5720                 interface_add_network_result, data,
5721                 data->interface);
5722
5723 done:
5724         if (ret < 0) {
5725                 SUPPLICANT_DBG("AddNetwork failed %d", ret);
5726                 callback_assoc_failed(decrypt_request_data.data->user_data);
5727                 g_free(data->path);
5728 #if defined TIZEN_EXT
5729                 g_free(data->ssid->ssid);
5730 #endif
5731                 g_free(data->ssid);
5732                 dbus_free(data);
5733         }
5734
5735         dbus_message_unref(reply);
5736         dbus_pending_call_unref(call);
5737
5738         decrypt_request_data.pending_call = NULL;
5739         decrypt_request_data.data = NULL;
5740 }
5741
5742 static int send_decryption_request(const char *passphrase,
5743                         struct interface_connect_data *data)
5744 {
5745         DBusMessage *msg = NULL;
5746         DBusPendingCall *call;
5747
5748         SUPPLICANT_DBG("Decryption request");
5749
5750         if (!passphrase) {
5751                 SUPPLICANT_DBG("Invalid parameter");
5752                 return -EINVAL;
5753         }
5754
5755         if (!connection)
5756                 return -EINVAL;
5757
5758         msg = dbus_message_new_method_call(NETCONFIG_SERVICE, NETCONFIG_WIFI_PATH,
5759                         NETCONFIG_WIFI_INTERFACE, "DecryptPassphrase");
5760         if (!msg)
5761                 return -EINVAL;
5762
5763         dbus_message_append_args(msg, DBUS_TYPE_STRING, &passphrase,
5764                                                         DBUS_TYPE_INVALID);
5765
5766         if (!dbus_connection_send_with_reply(connection, msg,
5767                                 &call, DBUS_TIMEOUT_USE_DEFAULT)) {
5768                 dbus_message_unref(msg);
5769                 return -EIO;
5770         }
5771
5772         if (!call) {
5773                 dbus_message_unref(msg);
5774                 return -EIO;
5775         }
5776
5777         decrypt_request_data.pending_call = call;
5778         decrypt_request_data.data = data;
5779
5780         dbus_pending_call_set_notify(call, decryption_request_reply, data, NULL);
5781         dbus_message_unref(msg);
5782
5783         SUPPLICANT_DBG("Decryption request succeeded");
5784
5785         return 0;
5786 }
5787 #endif
5788
5789 int g_supplicant_interface_connect(GSupplicantInterface *interface,
5790                                 GSupplicantSSID *ssid,
5791                                 GSupplicantInterfaceCallback callback,
5792                                                         void *user_data)
5793 {
5794         struct interface_connect_data *data;
5795         struct interface_data *intf_data;
5796         int ret = 0;
5797
5798         SUPPLICANT_DBG("");
5799
5800         if (!interface)
5801                 return -EINVAL;
5802
5803         if (!system_available)
5804                 return -EFAULT;
5805
5806         /* TODO: Check if we're already connected and switch */
5807
5808         data = dbus_malloc0(sizeof(*data));
5809         if (!data)
5810                 return -ENOMEM;
5811
5812         data->interface = interface;
5813         data->path = g_strdup(interface->path);
5814         data->callback = callback;
5815         data->ssid = ssid;
5816         data->user_data = user_data;
5817
5818         if (ssid->use_wps) {
5819                 g_free(interface->wps_cred.key);
5820                 memset(&interface->wps_cred, 0,
5821                                 sizeof(struct _GSupplicantWpsCredentials));
5822
5823                 ret = supplicant_dbus_property_set(interface->path,
5824                         SUPPLICANT_INTERFACE ".Interface.WPS",
5825                         "ProcessCredentials", DBUS_TYPE_BOOLEAN_AS_STRING,
5826                         wps_process_credentials, wps_start, data, interface);
5827         } else {
5828                 /* By the time there is a request for connect and the network
5829                  * path is not NULL it means that connman has not removed the
5830                  * previous network pointer. This can happen in the case AP
5831                  * deauthenticated client and connman does not remove the
5832                  * previously connected network pointer. This causes supplicant
5833                  * to reallocate the memory for struct wpa_ssid again even if it
5834                  * is the same SSID. This causes memory usage of wpa_supplicnat
5835                  * to go high. The idea here is that if the previously connected
5836                  * network is not removed at the time of next connection attempt
5837                  * check if the network path is not NULL. In case it is non-NULL
5838                  * first remove the network and then once removal is successful, add
5839                  * the network.
5840                  */
5841
5842                 if (interface->network_path != NULL) {
5843                         g_free(data->path);
5844                         dbus_free(data);
5845
5846                         /*
5847                          * If this add network is for the same network for
5848                          * which wpa_supplicant already has a profile then do
5849                          * not need to add another profile. Only if the
5850                          * profile that needs to get added is different from
5851                          * what is there in wpa_s delete the current one. A
5852                          * network is identified by its SSID, security_type
5853                          * and passphrase (private passphrase in case security
5854                          * type is 802.11x).
5855                          */
5856                         if (compare_network_parameters(interface, ssid)) {
5857                                 return -EALREADY;
5858                         }
5859
5860                         intf_data = dbus_malloc0(sizeof(*intf_data));
5861                         if (!intf_data)
5862                                 return -ENOMEM;
5863
5864                         intf_data->interface = interface;
5865                         intf_data->path = g_strdup(interface->path);
5866                         intf_data->callback = callback;
5867                         intf_data->ssid = ssid;
5868                         intf_data->user_data = user_data;
5869                         intf_data->network_remove_in_progress = TRUE;
5870                         network_remove(intf_data);
5871                 } else
5872 #if defined TIZEN_EXT
5873                         if (ssid->passphrase && g_strcmp0(ssid->passphrase, "") != 0 && !ssid->eap) {
5874                                 ret = send_decryption_request(ssid->passphrase, data);
5875                                 if (ret < 0)
5876                                         SUPPLICANT_DBG("Decryption request failed %d", ret);
5877                         } else
5878 #endif
5879                                 ret = supplicant_dbus_method_call(interface->path,
5880                                                 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
5881                                                 interface_add_network_params,
5882                                                 interface_add_network_result, data,
5883                                                 interface);
5884         }
5885
5886         if (ret < 0) {
5887                 g_free(data->path);
5888                 dbus_free(data);
5889                 return ret;
5890         }
5891
5892         return -EINPROGRESS;
5893 }
5894
5895 static void network_remove_result(const char *error,
5896                                 DBusMessageIter *iter, void *user_data)
5897 {
5898         struct interface_data *data = user_data;
5899         struct interface_connect_data *connect_data;
5900         int result = 0;
5901
5902         SUPPLICANT_DBG("");
5903
5904         if (error) {
5905                 result = -EIO;
5906                 SUPPLICANT_DBG("error: %s", error);
5907
5908                 if (g_strcmp0("org.freedesktop.DBus.Error.UnknownMethod",
5909                                                 error) == 0)
5910                         result = -ECONNABORTED;
5911         }
5912
5913         g_free(data->interface->network_path);
5914         data->interface->network_path = NULL;
5915
5916         remove_network_information(data->interface);
5917
5918         if (data->network_remove_in_progress == TRUE) {
5919                 data->network_remove_in_progress = FALSE;
5920                 connect_data = dbus_malloc0(sizeof(*connect_data));
5921                 if (!connect_data)
5922                         return;
5923
5924                 connect_data->interface = data->interface;
5925                 connect_data->path = g_strdup(data->path);
5926                 connect_data->callback = data->callback;
5927                 connect_data->ssid = data->ssid;
5928                 connect_data->user_data = data->user_data;
5929
5930 #if defined TIZEN_EXT
5931                 int ret;
5932                 if (data->ssid->passphrase && g_strcmp0(data->ssid->passphrase, "") != 0
5933                         && !data->ssid->eap) {
5934                         ret = send_decryption_request(data->ssid->passphrase, connect_data);
5935                         if (ret < 0) {
5936                                 SUPPLICANT_DBG("Decryption request failed %d", ret);
5937                                 g_free(connect_data->ssid);
5938                                 g_free(connect_data->path);
5939                                 dbus_free(connect_data);
5940                         }
5941                 } else
5942 #endif
5943                 supplicant_dbus_method_call(data->interface->path,
5944                         SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
5945                         interface_add_network_params,
5946                         interface_add_network_result, connect_data,
5947                         connect_data->interface);
5948         } else {
5949                 if (data->callback)
5950                         data->callback(result, data->interface, data->user_data);
5951         }
5952         g_free(data->path);
5953         dbus_free(data);
5954 }
5955
5956 static void network_remove_params(DBusMessageIter *iter, void *user_data)
5957 {
5958         struct interface_data *data = user_data;
5959         const char *path = data->interface->network_path;
5960
5961         SUPPLICANT_DBG("path %s", path);
5962
5963         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH, &path);
5964 }
5965
5966 static int network_remove(struct interface_data *data)
5967 {
5968         GSupplicantInterface *interface = data->interface;
5969
5970         SUPPLICANT_DBG("");
5971
5972 #if defined TIZEN_EXT
5973         GSupplicantInterface *intf = NULL;
5974         /*
5975          * Check if 'interface' is valid
5976          */
5977         intf = g_hash_table_lookup(interface_table, interface->path);
5978         if (intf == NULL)
5979                 return -EINVAL;
5980 #endif
5981
5982         return supplicant_dbus_method_call(interface->path,
5983                         SUPPLICANT_INTERFACE ".Interface", "RemoveNetwork",
5984                         network_remove_params, network_remove_result, data,
5985                         interface);
5986 }
5987
5988 static void interface_disconnect_result(const char *error,
5989                                 DBusMessageIter *iter, void *user_data)
5990 {
5991         struct interface_data *data = user_data;
5992         int result = 0;
5993
5994         SUPPLICANT_DBG("");
5995
5996         if (error) {
5997                 result = -EIO;
5998                 SUPPLICANT_DBG("error: %s", error);
5999
6000                 if (g_strcmp0("org.freedesktop.DBus.Error.UnknownMethod",
6001                                                 error) == 0)
6002                         result = -ECONNABORTED;
6003         }
6004
6005         /* If we are disconnecting from previous WPS successful
6006          * association. i.e.: it did not went through AddNetwork,
6007          * and interface->network_path was never set. */
6008         if (!data->interface->network_path) {
6009                 if (data->callback)
6010                         data->callback(result, data->interface,
6011                                                         data->user_data);
6012
6013                 g_free(data->path);
6014                 dbus_free(data);
6015                 return;
6016         }
6017
6018         if (result < 0 && data->callback) {
6019                 data->callback(result, data->interface, data->user_data);
6020                 data->callback = NULL;
6021         }
6022
6023         if (result != -ECONNABORTED) {
6024                 if (network_remove(data) < 0) {
6025                         g_free(data->path);
6026                         dbus_free(data);
6027                 }
6028         } else {
6029                 g_free(data->path);
6030                 dbus_free(data);
6031         }
6032 }
6033
6034 int g_supplicant_interface_disconnect(GSupplicantInterface *interface,
6035                                         GSupplicantInterfaceCallback callback,
6036                                                         void *user_data)
6037 {
6038         struct interface_data *data;
6039         int ret;
6040
6041         SUPPLICANT_DBG("");
6042
6043         if (!interface)
6044                 return -EINVAL;
6045
6046         if (!system_available)
6047                 return -EFAULT;
6048 #if defined TIZEN_EXT
6049         if (decrypt_request_data.pending_call &&
6050                         decrypt_request_data.data &&
6051                         decrypt_request_data.data->user_data == user_data) {
6052
6053                 callback_assoc_failed(decrypt_request_data.data->user_data);
6054                 crypt_method_call_cancel();
6055
6056                 return 0;
6057         }
6058 #endif
6059         data = dbus_malloc0(sizeof(*data));
6060         if (!data)
6061                 return -ENOMEM;
6062
6063         data->interface = interface;
6064         data->path = g_strdup(interface->path);
6065         data->callback = callback;
6066         data->user_data = user_data;
6067
6068         ret = supplicant_dbus_method_call(interface->path,
6069                         SUPPLICANT_INTERFACE ".Interface", "Disconnect",
6070                         NULL, interface_disconnect_result, data,
6071                         interface);
6072
6073         if (ret < 0) {
6074                 g_free(data->path);
6075                 dbus_free(data);
6076         }
6077
6078         return ret;
6079 }
6080
6081 static void interface_p2p_find_result(const char *error,
6082                                         DBusMessageIter *iter, void *user_data)
6083 {
6084         struct interface_scan_data *data = user_data;
6085         int err = 0;
6086
6087         SUPPLICANT_DBG("error %s", error);
6088
6089         if (error)
6090                 err = -EIO;
6091
6092         if (interface_exists(data->interface, data->path)) {
6093                 if (!data->interface->ready)
6094                         err = -ENOLINK;
6095                 if (!err)
6096                         data->interface->p2p_finding = true;
6097         }
6098
6099         if (data->callback)
6100                 data->callback(err, data->interface, data->user_data);
6101
6102         g_free(data->path);
6103         dbus_free(data);
6104 }
6105
6106 static void interface_p2p_find_params(DBusMessageIter *iter, void *user_data)
6107 {
6108         DBusMessageIter dict;
6109
6110         supplicant_dbus_dict_open(iter, &dict);
6111         supplicant_dbus_dict_close(iter, &dict);
6112 }
6113
6114 int g_supplicant_interface_p2p_find(GSupplicantInterface *interface,
6115                                         GSupplicantInterfaceCallback callback,
6116                                                         void *user_data)
6117 {
6118         struct interface_scan_data *data;
6119         int ret;
6120
6121         if (!interface->p2p_support)
6122                 return -ENOTSUP;
6123
6124         ret = interface_ready_to_scan(interface);
6125         if (ret && ret != -EALREADY)
6126                 return ret;
6127
6128         data = dbus_malloc0(sizeof(*data));
6129         if (!data)
6130                 return -ENOMEM;
6131
6132         data->interface = interface;
6133         data->path = g_strdup(interface->path);
6134         data->callback = callback;
6135         data->user_data = user_data;
6136
6137         ret = supplicant_dbus_method_call(interface->path,
6138                         SUPPLICANT_INTERFACE ".Interface.P2PDevice", "Find",
6139                         interface_p2p_find_params, interface_p2p_find_result,
6140                         data, interface);
6141         if (ret < 0) {
6142                 g_free(data->path);
6143                 dbus_free(data);
6144         }
6145
6146         return ret;
6147 }
6148
6149 bool g_supplicant_interface_is_p2p_finding(GSupplicantInterface *interface)
6150 {
6151         if (!interface)
6152                 return false;
6153
6154         return interface->p2p_finding;
6155 }
6156
6157 int g_supplicant_interface_p2p_stop_find(GSupplicantInterface *interface)
6158 {
6159         if (!interface->p2p_finding)
6160                 return 0;
6161
6162         SUPPLICANT_DBG("");
6163
6164         interface->p2p_finding = false;
6165
6166         return supplicant_dbus_method_call(interface->path,
6167                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "StopFind",
6168                 NULL, NULL, NULL, NULL);
6169 }
6170
6171 static void interface_p2p_connect_result(const char *error,
6172                                         DBusMessageIter *iter, void *user_data)
6173 {
6174         struct interface_connect_data *data = user_data;
6175         int err = 0;
6176
6177         SUPPLICANT_DBG("");
6178
6179         if (error) {
6180                 SUPPLICANT_DBG("error: %s", error);
6181                 err = parse_supplicant_error(iter);
6182         }
6183
6184         if (data->callback)
6185                 data->callback(err, data->interface, data->user_data);
6186
6187         g_free(data->path);
6188         g_free(data->peer->wps_pin);
6189         g_free(data->peer->path);
6190         g_free(data->peer);
6191         g_free(data);
6192 }
6193
6194 static void interface_p2p_connect_params(DBusMessageIter *iter, void *user_data)
6195 {
6196         struct interface_connect_data *data = user_data;
6197         const char *wps = "pbc";
6198         DBusMessageIter dict;
6199         int go_intent = 7;
6200
6201         SUPPLICANT_DBG("");
6202
6203         supplicant_dbus_dict_open(iter, &dict);
6204
6205         if (data->peer->master)
6206                 go_intent = 15;
6207
6208         if (data->peer->wps_pin)
6209                 wps = "pin";
6210
6211         supplicant_dbus_dict_append_basic(&dict, "peer",
6212                                 DBUS_TYPE_OBJECT_PATH, &data->peer->path);
6213         supplicant_dbus_dict_append_basic(&dict, "wps_method",
6214                                 DBUS_TYPE_STRING, &wps);
6215         if (data->peer->wps_pin) {
6216                 supplicant_dbus_dict_append_basic(&dict, "pin",
6217                                 DBUS_TYPE_STRING, &data->peer->wps_pin);
6218         }
6219
6220         supplicant_dbus_dict_append_basic(&dict, "go_intent",
6221                                         DBUS_TYPE_INT32, &go_intent);
6222
6223         supplicant_dbus_dict_close(iter, &dict);
6224 }
6225
6226 int g_supplicant_interface_p2p_connect(GSupplicantInterface *interface,
6227                                         GSupplicantPeerParams *peer_params,
6228                                         GSupplicantInterfaceCallback callback,
6229                                         void *user_data)
6230 {
6231         struct interface_connect_data *data;
6232         int ret;
6233
6234         SUPPLICANT_DBG("");
6235
6236         if (!interface->p2p_support)
6237                 return -ENOTSUP;
6238
6239         data = dbus_malloc0(sizeof(*data));
6240         if (!data)
6241                 return -ENOMEM;
6242
6243         data->interface = interface;
6244         data->path = g_strdup(interface->path);
6245         data->peer = peer_params;
6246         data->callback = callback;
6247         data->user_data = user_data;
6248
6249         ret = supplicant_dbus_method_call(interface->path,
6250                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "Connect",
6251                 interface_p2p_connect_params, interface_p2p_connect_result,
6252                 data, interface);
6253         if (ret < 0) {
6254                 g_free(data->path);
6255                 dbus_free(data);
6256                 return ret;
6257         }
6258
6259         return -EINPROGRESS;
6260 }
6261
6262 int g_supplicant_interface_p2p_disconnect(GSupplicantInterface *interface,
6263                                         GSupplicantPeerParams *peer_params)
6264 {
6265         GSupplicantPeer *peer;
6266         int count = 0;
6267         GSList *list;
6268
6269         SUPPLICANT_DBG("");
6270
6271         if (!interface->p2p_support)
6272                 return -ENOTSUP;
6273
6274         peer = g_hash_table_lookup(interface->peer_table, peer_params->path);
6275         if (!peer)
6276                 return -ENODEV;
6277
6278         for (list = peer->groups; list; list = list->next, count++) {
6279                 const char *group_obj_path = list->data;
6280                 GSupplicantInterface *g_interface;
6281                 GSupplicantGroup *group;
6282
6283                 group = g_hash_table_lookup(group_mapping, group_obj_path);
6284                 if (!group || !group->interface)
6285                         continue;
6286
6287                 g_interface = group->interface;
6288                 supplicant_dbus_method_call(g_interface->path,
6289                                 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
6290                                 "Disconnect", NULL, NULL, NULL, g_interface);
6291         }
6292
6293         if (count == 0 && peer->current_group_iface) {
6294                 supplicant_dbus_method_call(peer->current_group_iface->path,
6295                                 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
6296                                 "Disconnect", NULL, NULL, NULL,
6297                                 peer->current_group_iface->path);
6298         }
6299
6300         peer->current_group_iface = NULL;
6301
6302         return -EINPROGRESS;
6303 }
6304
6305 struct p2p_service_data {
6306         bool registration;
6307         GSupplicantInterface *interface;
6308         GSupplicantP2PServiceParams *service;
6309         GSupplicantInterfaceCallback callback;
6310         void *user_data;
6311 };
6312
6313 static void interface_p2p_service_result(const char *error,
6314                                         DBusMessageIter *iter, void *user_data)
6315 {
6316         struct p2p_service_data *data = user_data;
6317         int result = 0;
6318
6319         SUPPLICANT_DBG("%s result - %s", data->registration ?
6320                                 "Registration" : "Deletion",
6321                                 error ? error : "Success");
6322         if (error)
6323                 result = -EINVAL;
6324
6325         if (data->callback)
6326                 data->callback(result, data->interface, data->user_data);
6327
6328         g_free(data->service->query);
6329         g_free(data->service->response);
6330         g_free(data->service->service);
6331         g_free(data->service->wfd_ies);
6332         g_free(data->service);
6333         dbus_free(data);
6334 }
6335
6336 static void interface_p2p_service_params(DBusMessageIter *iter,
6337                                                         void *user_data)
6338 {
6339         struct p2p_service_data *data = user_data;
6340         GSupplicantP2PServiceParams *service;
6341         DBusMessageIter dict;
6342         const char *type;
6343
6344         SUPPLICANT_DBG("");
6345
6346         service = data->service;
6347
6348         supplicant_dbus_dict_open(iter, &dict);
6349
6350         if (service->query && service->response) {
6351                 type = "bonjour";
6352                 supplicant_dbus_dict_append_basic(&dict, "service_type",
6353                                                 DBUS_TYPE_STRING, &type);
6354                 supplicant_dbus_dict_append_fixed_array(&dict, "query",
6355                                         DBUS_TYPE_BYTE, &service->query,
6356                                         service->query_length);
6357                 supplicant_dbus_dict_append_fixed_array(&dict, "response",
6358                                         DBUS_TYPE_BYTE, &service->response,
6359                                         service->response_length);
6360         } else if (service->version && service->service) {
6361                 type = "upnp";
6362                 supplicant_dbus_dict_append_basic(&dict, "service_type",
6363                                                 DBUS_TYPE_STRING, &type);
6364                 supplicant_dbus_dict_append_basic(&dict, "version",
6365                                         DBUS_TYPE_INT32, &service->version);
6366                 supplicant_dbus_dict_append_basic(&dict, "service",
6367                                         DBUS_TYPE_STRING, &service->service);
6368         }
6369
6370         supplicant_dbus_dict_close(iter, &dict);
6371 }
6372
6373 int g_supplicant_interface_p2p_add_service(GSupplicantInterface *interface,
6374                                 GSupplicantInterfaceCallback callback,
6375                                 GSupplicantP2PServiceParams *p2p_service_params,
6376                                 void *user_data)
6377 {
6378         struct p2p_service_data *data;
6379         int ret;
6380
6381         SUPPLICANT_DBG("");
6382
6383         if (!interface->p2p_support)
6384                 return -ENOTSUP;
6385
6386         data = dbus_malloc0(sizeof(*data));
6387         if (!data)
6388                 return -ENOMEM;
6389
6390         data->registration = true;
6391         data->interface = interface;
6392         data->service = p2p_service_params;
6393         data->callback = callback;
6394         data->user_data = user_data;
6395
6396         ret = supplicant_dbus_method_call(interface->path,
6397                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "AddService",
6398                 interface_p2p_service_params, interface_p2p_service_result,
6399                 data, interface);
6400         if (ret < 0) {
6401                 dbus_free(data);
6402                 return ret;
6403         }
6404
6405         return -EINPROGRESS;
6406 }
6407
6408 int g_supplicant_interface_p2p_del_service(GSupplicantInterface *interface,
6409                                 GSupplicantP2PServiceParams *p2p_service_params)
6410 {
6411         struct p2p_service_data *data;
6412         int ret;
6413
6414         SUPPLICANT_DBG("");
6415
6416         if (!interface->p2p_support)
6417                 return -ENOTSUP;
6418
6419         data = dbus_malloc0(sizeof(*data));
6420         if (!data)
6421                 return -ENOMEM;
6422
6423         data->interface = interface;
6424         data->service = p2p_service_params;
6425
6426         ret = supplicant_dbus_method_call(interface->path,
6427                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeleteService",
6428                 interface_p2p_service_params, interface_p2p_service_result,
6429                 data, interface);
6430         if (ret < 0) {
6431                 dbus_free(data);
6432                 return ret;
6433         }
6434
6435         return -EINPROGRESS;
6436 }
6437
6438 struct p2p_listen_data {
6439         int period;
6440         int interval;
6441 };
6442
6443 static void interface_p2p_listen_params(DBusMessageIter *iter, void *user_data)
6444 {
6445         struct p2p_listen_data *params = user_data;
6446         DBusMessageIter dict;
6447
6448         supplicant_dbus_dict_open(iter, &dict);
6449
6450         supplicant_dbus_dict_append_basic(&dict, "period",
6451                                         DBUS_TYPE_INT32, &params->period);
6452         supplicant_dbus_dict_append_basic(&dict, "interval",
6453                                         DBUS_TYPE_INT32, &params->interval);
6454         supplicant_dbus_dict_close(iter, &dict);
6455 }
6456
6457 int g_supplicant_interface_p2p_listen(GSupplicantInterface *interface,
6458                                                 int period, int interval)
6459 {
6460         struct p2p_listen_data params;
6461
6462         SUPPLICANT_DBG("");
6463
6464         if (!interface->p2p_support)
6465                 return -ENOTSUP;
6466
6467         params.period = period;
6468         params.interval = interval;
6469
6470         return supplicant_dbus_method_call(interface->path,
6471                         SUPPLICANT_INTERFACE ".Interface.P2PDevice",
6472                         "ExtendedListen", interface_p2p_listen_params,
6473                         NULL, &params, NULL);
6474 }
6475
6476 static void widi_ies_params(DBusMessageIter *iter, void *user_data)
6477 {
6478         struct p2p_service_data *data = user_data;
6479         GSupplicantP2PServiceParams *service = data->service;
6480         DBusMessageIter array;
6481
6482         SUPPLICANT_DBG("%p - %d", service->wfd_ies, service->wfd_ies_length);
6483
6484         dbus_message_iter_open_container(iter, DBUS_TYPE_ARRAY,
6485                                         DBUS_TYPE_BYTE_AS_STRING, &array);
6486
6487         if (service->wfd_ies && service->wfd_ies_length > 0) {
6488                 dbus_message_iter_append_fixed_array(&array, DBUS_TYPE_BYTE,
6489                                 &service->wfd_ies, service->wfd_ies_length);
6490         }
6491
6492         dbus_message_iter_close_container(iter, &array);
6493 }
6494
6495 int g_supplicant_set_widi_ies(GSupplicantP2PServiceParams *p2p_service_params,
6496                                         GSupplicantInterfaceCallback callback,
6497                                         void *user_data)
6498 {
6499         struct p2p_service_data *data;
6500         int ret;
6501
6502         SUPPLICANT_DBG("");
6503
6504         if (!system_available)
6505                 return -EFAULT;
6506
6507         data = dbus_malloc0(sizeof(*data));
6508         if (!data)
6509                 return -ENOMEM;
6510
6511         data->service = p2p_service_params;
6512         data->callback = callback;
6513         data->user_data = user_data;
6514
6515         if (p2p_service_params->wfd_ies)
6516                 data->registration = true;
6517
6518         ret = supplicant_dbus_property_set(SUPPLICANT_PATH,
6519                                         SUPPLICANT_INTERFACE, "WFDIEs",
6520                                         DBUS_TYPE_ARRAY_AS_STRING
6521                                         DBUS_TYPE_BYTE_AS_STRING,
6522                                         widi_ies_params,
6523                                         interface_p2p_service_result,
6524                                         data, NULL);
6525         if (ret < 0 && ret != -EINPROGRESS) {
6526                 dbus_free(data);
6527                 return ret;
6528         }
6529
6530         return -EINPROGRESS;
6531 }
6532
6533 static const char *g_supplicant_rule0 = "type=signal,"
6534                                         "path=" DBUS_PATH_DBUS ","
6535                                         "sender=" DBUS_SERVICE_DBUS ","
6536                                         "interface=" DBUS_INTERFACE_DBUS ","
6537                                         "member=NameOwnerChanged,"
6538                                         "arg0=" SUPPLICANT_SERVICE;
6539 static const char *g_supplicant_rule1 = "type=signal,"
6540                         "interface=" SUPPLICANT_INTERFACE;
6541 static const char *g_supplicant_rule2 = "type=signal,"
6542                         "interface=" SUPPLICANT_INTERFACE ".Interface";
6543 static const char *g_supplicant_rule3 = "type=signal,"
6544                         "interface=" SUPPLICANT_INTERFACE ".Interface.WPS";
6545 static const char *g_supplicant_rule4 = "type=signal,"
6546                         "interface=" SUPPLICANT_INTERFACE ".BSS";
6547 static const char *g_supplicant_rule5 = "type=signal,"
6548                         "interface=" SUPPLICANT_INTERFACE ".Network";
6549 #if !defined TIZEN_EXT
6550 static const char *g_supplicant_rule6 = "type=signal,"
6551                 "interface=" SUPPLICANT_INTERFACE ".Interface.P2PDevice";
6552 static const char *g_supplicant_rule7 = "type=signal,"
6553                 "interface=" SUPPLICANT_INTERFACE ".Peer";
6554 static const char *g_supplicant_rule8 = "type=signal,"
6555                 "interface=" SUPPLICANT_INTERFACE ".Group";
6556 #endif
6557
6558 static void invoke_introspect_method(void)
6559 {
6560         DBusMessage *message;
6561
6562         message = dbus_message_new_method_call(SUPPLICANT_SERVICE,
6563                                         SUPPLICANT_PATH,
6564                                         DBUS_INTERFACE_INTROSPECTABLE,
6565                                         "Introspect");
6566
6567         if (!message)
6568                 return;
6569
6570         dbus_message_set_no_reply(message, TRUE);
6571         dbus_connection_send(connection, message, NULL);
6572         dbus_message_unref(message);
6573 }
6574
6575 int g_supplicant_register(const GSupplicantCallbacks *callbacks)
6576 {
6577         connection = dbus_bus_get(DBUS_BUS_SYSTEM, NULL);
6578         if (!connection)
6579                 return -EIO;
6580
6581         if (!dbus_connection_add_filter(connection, g_supplicant_filter,
6582                                                 NULL, NULL)) {
6583                 dbus_connection_unref(connection);
6584                 connection = NULL;
6585                 return -EIO;
6586         }
6587
6588         callbacks_pointer = callbacks;
6589         eap_methods = 0;
6590
6591         interface_table = g_hash_table_new_full(g_str_hash, g_str_equal,
6592                                                 NULL, remove_interface);
6593
6594         bss_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
6595                                                                 NULL, NULL);
6596         peer_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
6597                                                                 NULL, NULL);
6598         group_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
6599                                                                 NULL, NULL);
6600         pending_peer_connection = g_hash_table_new_full(g_str_hash, g_str_equal,
6601                                                                 NULL, NULL);
6602         config_file_table = g_hash_table_new_full(g_str_hash, g_str_equal,
6603                                                                 g_free, g_free);
6604
6605         supplicant_dbus_setup(connection);
6606
6607         dbus_bus_add_match(connection, g_supplicant_rule0, NULL);
6608         dbus_bus_add_match(connection, g_supplicant_rule1, NULL);
6609         dbus_bus_add_match(connection, g_supplicant_rule2, NULL);
6610         dbus_bus_add_match(connection, g_supplicant_rule3, NULL);
6611         dbus_bus_add_match(connection, g_supplicant_rule4, NULL);
6612         dbus_bus_add_match(connection, g_supplicant_rule5, NULL);
6613 #if defined TIZEN_EXT
6614         dbus_bus_add_match(connection,
6615                         "type=signal,interface=org.tizen.system.deviced.PowerOff,"
6616                         "member=ChangeState", NULL);
6617 #endif
6618 #if !defined TIZEN_EXT
6619         dbus_bus_add_match(connection, g_supplicant_rule6, NULL);
6620         dbus_bus_add_match(connection, g_supplicant_rule7, NULL);
6621         dbus_bus_add_match(connection, g_supplicant_rule8, NULL);
6622 #endif
6623         dbus_connection_flush(connection);
6624
6625         if (dbus_bus_name_has_owner(connection,
6626                                         SUPPLICANT_SERVICE, NULL)) {
6627                 system_available = TRUE;
6628                 supplicant_dbus_property_get_all(SUPPLICANT_PATH,
6629                                                 SUPPLICANT_INTERFACE,
6630                                                 service_property, NULL, NULL);
6631         } else
6632                 invoke_introspect_method();
6633
6634         return 0;
6635 }
6636
6637 static void unregister_interface_remove_params(DBusMessageIter *iter,
6638                                                 void *user_data)
6639 {
6640         const char *path = user_data;
6641
6642         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
6643                                                         &path);
6644 }
6645
6646
6647 static void unregister_remove_interface(gpointer key, gpointer value,
6648                                                 gpointer user_data)
6649 {
6650         GSupplicantInterface *interface = value;
6651
6652         supplicant_dbus_method_call(SUPPLICANT_PATH,
6653                                         SUPPLICANT_INTERFACE,
6654                                         "RemoveInterface",
6655                                         unregister_interface_remove_params,
6656                                         NULL, interface->path, NULL);
6657 }
6658
6659 void g_supplicant_unregister(const GSupplicantCallbacks *callbacks)
6660 {
6661         SUPPLICANT_DBG("");
6662
6663         if (connection) {
6664 #if !defined TIZEN_EXT
6665                 dbus_bus_remove_match(connection, g_supplicant_rule8, NULL);
6666                 dbus_bus_remove_match(connection, g_supplicant_rule7, NULL);
6667                 dbus_bus_remove_match(connection, g_supplicant_rule6, NULL);
6668 #endif
6669                 dbus_bus_remove_match(connection, g_supplicant_rule5, NULL);
6670                 dbus_bus_remove_match(connection, g_supplicant_rule4, NULL);
6671                 dbus_bus_remove_match(connection, g_supplicant_rule3, NULL);
6672                 dbus_bus_remove_match(connection, g_supplicant_rule2, NULL);
6673                 dbus_bus_remove_match(connection, g_supplicant_rule1, NULL);
6674                 dbus_bus_remove_match(connection, g_supplicant_rule0, NULL);
6675                 dbus_connection_flush(connection);
6676
6677                 dbus_connection_remove_filter(connection,
6678                                                 g_supplicant_filter, NULL);
6679         }
6680
6681         if (config_file_table) {
6682                 g_hash_table_destroy(config_file_table);
6683                 config_file_table = NULL;
6684         }
6685
6686         if (bss_mapping) {
6687                 g_hash_table_destroy(bss_mapping);
6688                 bss_mapping = NULL;
6689         }
6690
6691         if (peer_mapping) {
6692                 g_hash_table_destroy(peer_mapping);
6693                 peer_mapping = NULL;
6694         }
6695
6696         if (group_mapping) {
6697                 g_hash_table_destroy(group_mapping);
6698                 group_mapping = NULL;
6699         }
6700
6701         if (interface_table) {
6702                 g_hash_table_foreach(interface_table,
6703                                         unregister_remove_interface, NULL);
6704                 g_hash_table_destroy(interface_table);
6705                 interface_table = NULL;
6706         }
6707
6708         if (system_available)
6709                 callback_system_killed();
6710
6711         if (connection) {
6712                 dbus_connection_unref(connection);
6713                 connection = NULL;
6714         }
6715
6716         callbacks_pointer = NULL;
6717         eap_methods = 0;
6718 }