Maintain connection status when wifi roaming
[platform/upstream/connman.git] / gsupplicant / supplicant.c
1 /*
2  *
3  *  WPA supplicant library with GLib integration
4  *
5  *  Copyright (C) 2012-2013  Intel Corporation. All rights reserved.
6  *
7  *  This program is free software; you can redistribute it and/or modify
8  *  it under the terms of the GNU General Public License version 2 as
9  *  published by the Free Software Foundation.
10  *
11  *  This program is distributed in the hope that it will be useful,
12  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
13  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14  *  GNU General Public License for more details.
15  *
16  *  You should have received a copy of the GNU General Public License
17  *  along with this program; if not, write to the Free Software
18  *  Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA
19  *
20  */
21
22 #ifdef HAVE_CONFIG_H
23 #include <config.h>
24 #endif
25
26 #include <errno.h>
27 #include <stdio.h>
28 #include <stdlib.h>
29 #include <string.h>
30 #include <stdint.h>
31 #include <syslog.h>
32 #include <ctype.h>
33 #include <stdbool.h>
34 #include <netinet/if_ether.h>
35 #include <netinet/in.h>
36
37 #include <glib.h>
38 #include <gdbus.h>
39
40 #include "dbus.h"
41 #include "gsupplicant.h"
42
43 #if defined TIZEN_EXT
44 #include "setting.h"
45 #endif
46
47 #define IEEE80211_CAP_ESS       0x0001
48 #define IEEE80211_CAP_IBSS      0x0002
49 #define IEEE80211_CAP_PRIVACY   0x0010
50
51 #if defined TIZEN_EXT
52 #define WLAN_EID_HT_CAP 45
53 #define WLAN_EID_VHT_CAP 191
54 #define WLAN_EID_SUPP_RATES 1
55 #define WLAN_EID_EXT_SUPP_RATES 50
56 #define COUNTRY_CODE_LENGTH     2
57 #endif
58
59 #if defined TIZEN_EXT
60 #define LAST_CONNECTED_TIMEOUT       (5 * 60)
61 #define ASSOC_REJECT_TIMEOUT         10
62 #define FREQ_RANGE_24GHZ_CHANNEL_1   2412
63 #define FREQ_RANGE_24GHZ_CHANNEL_14  2484
64 #define FREQ_RANGE_5GHZ_CHANNEL_32   5160
65 #define FREQ_RANGE_5GHZ_CHANNEL_165  5825
66
67 #define MAC2STR(a) (a)[0], (a)[1], (a)[2], (a)[3], (a)[4], (a)[5]
68 #define MACSTR "%02x:%02x:%02x:%02x:%02x:%02x"
69 #endif
70
71 #define BSS_UNKNOWN_STRENGTH    -90
72
73 static DBusConnection *connection;
74
75 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
76 static GSupplicantCallbacks *callbacks_pointer;
77 #else /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
78 static const GSupplicantCallbacks *callbacks_pointer;
79 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
80
81 static dbus_bool_t system_available = FALSE;
82 static dbus_bool_t system_ready = FALSE;
83
84 static dbus_int32_t debug_level;
85 static dbus_bool_t debug_timestamp = FALSE;
86 static dbus_bool_t debug_showkeys = FALSE;
87
88 static const char *debug_strings[] = {
89         "msgdump", "debug", "info", "warning", "error", NULL
90 };
91
92 static unsigned int eap_methods;
93
94 struct strvalmap {
95         const char *str;
96         unsigned int val;
97 };
98
99 static struct strvalmap eap_method_map[] = {
100         { "MD5",        G_SUPPLICANT_EAP_METHOD_MD5     },
101         { "TLS",        G_SUPPLICANT_EAP_METHOD_TLS     },
102         { "MSCHAPV2",   G_SUPPLICANT_EAP_METHOD_MSCHAPV2        },
103         { "PEAP",       G_SUPPLICANT_EAP_METHOD_PEAP    },
104         { "TTLS",       G_SUPPLICANT_EAP_METHOD_TTLS    },
105         { "GTC",        G_SUPPLICANT_EAP_METHOD_GTC     },
106         { "OTP",        G_SUPPLICANT_EAP_METHOD_OTP     },
107         { "LEAP",       G_SUPPLICANT_EAP_METHOD_LEAP    },
108         { "WSC",        G_SUPPLICANT_EAP_METHOD_WSC     },
109         { }
110 };
111
112 static struct strvalmap keymgmt_map[] = {
113         { "none",               G_SUPPLICANT_KEYMGMT_NONE               },
114         { "ieee8021x",          G_SUPPLICANT_KEYMGMT_IEEE8021X  },
115         { "wpa-none",           G_SUPPLICANT_KEYMGMT_WPA_NONE   },
116         { "wpa-psk",            G_SUPPLICANT_KEYMGMT_WPA_PSK    },
117         { "wpa-psk-sha256",     G_SUPPLICANT_KEYMGMT_WPA_PSK_256        },
118         { "wpa-ft-psk",         G_SUPPLICANT_KEYMGMT_WPA_FT_PSK },
119         { "wpa-ft-eap",         G_SUPPLICANT_KEYMGMT_WPA_FT_EAP },
120         { "wpa-eap",            G_SUPPLICANT_KEYMGMT_WPA_EAP    },
121         { "wpa-eap-sha256",     G_SUPPLICANT_KEYMGMT_WPA_EAP_256        },
122         { "wps",                G_SUPPLICANT_KEYMGMT_WPS                },
123 #if defined TIZEN_EXT
124         { "sae",                G_SUPPLICANT_KEYMGMT_SAE                },
125         { "owe",                G_SUPPLICANT_KEYMGMT_OWE                },
126         { "dpp",                G_SUPPLICANT_KEYMGMT_DPP                },
127 #endif
128         { }
129 };
130
131 static struct strvalmap authalg_capa_map[] = {
132         { "open",       G_SUPPLICANT_CAPABILITY_AUTHALG_OPEN    },
133         { "shared",     G_SUPPLICANT_CAPABILITY_AUTHALG_SHARED  },
134         { "leap",       G_SUPPLICANT_CAPABILITY_AUTHALG_LEAP    },
135         { }
136 };
137
138 static struct strvalmap proto_capa_map[] = {
139         { "wpa",        G_SUPPLICANT_CAPABILITY_PROTO_WPA               },
140         { "rsn",        G_SUPPLICANT_CAPABILITY_PROTO_RSN               },
141         { }
142 };
143
144 static struct strvalmap group_map[] = {
145         { "wep40",      G_SUPPLICANT_GROUP_WEP40        },
146         { "wep104",     G_SUPPLICANT_GROUP_WEP104       },
147         { "tkip",       G_SUPPLICANT_GROUP_TKIP },
148         { "ccmp",       G_SUPPLICANT_GROUP_CCMP },
149         { }
150 };
151
152 static struct strvalmap pairwise_map[] = {
153         { "none",       G_SUPPLICANT_PAIRWISE_NONE      },
154         { "tkip",       G_SUPPLICANT_PAIRWISE_TKIP      },
155         { "ccmp",       G_SUPPLICANT_PAIRWISE_CCMP      },
156         { }
157 };
158
159 static struct strvalmap scan_capa_map[] = {
160         { "active",     G_SUPPLICANT_CAPABILITY_SCAN_ACTIVE     },
161         { "passive",    G_SUPPLICANT_CAPABILITY_SCAN_PASSIVE    },
162         { "ssid",       G_SUPPLICANT_CAPABILITY_SCAN_SSID               },
163         { }
164 };
165
166 static struct strvalmap mode_capa_map[] = {
167         { "infrastructure",     G_SUPPLICANT_CAPABILITY_MODE_INFRA      },
168         { "ad-hoc",             G_SUPPLICANT_CAPABILITY_MODE_IBSS       },
169         { "ap",                 G_SUPPLICANT_CAPABILITY_MODE_AP         },
170         { "p2p",                G_SUPPLICANT_CAPABILITY_MODE_P2P        },
171 #if defined TIZEN_EXT_WIFI_MESH
172         { "mesh",               G_SUPPLICANT_CAPABILITY_MODE_MESH       },
173 #endif
174         { }
175 };
176
177 #if defined TIZEN_EXT && defined TIZEN_EXT_INS
178 struct _GSupplicantINSSettings {
179         GSupplicantINSPreferredFreq preferred_freq_bssid;
180         unsigned int preferred_freq_bssid_score;
181         bool last_connected_bssid;
182         unsigned int last_connected_bssid_score;
183         bool assoc_reject;
184         unsigned int assoc_reject_score;
185         bool signal_bssid;
186         int signal_level3_5ghz;
187         int signal_level3_24ghz;
188 };
189
190 static struct _GSupplicantINSSettings ins_settings;
191 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_INS */
192
193 #if defined TIZEN_EXT
194 static unsigned char invalid_bssid[WIFI_BSSID_LEN_MAX] = {
195         0x00, 0x00, 0x00, 0x00, 0x00, 0x00
196 };
197 #endif
198
199 static GHashTable *interface_table;
200 static GHashTable *bss_mapping;
201 static GHashTable *peer_mapping;
202 static GHashTable *group_mapping;
203 static GHashTable *pending_peer_connection;
204 static GHashTable *config_file_table;
205
206 struct _GSupplicantWpsCredentials {
207         unsigned char ssid[32];
208         unsigned int ssid_len;
209         char *key;
210 };
211
212 struct added_network_information {
213         char * ssid;
214         GSupplicantSecurity security;
215         char * passphrase;
216         char * private_passphrase;
217 #if defined TIZEN_EXT
218         char *connector;
219         char *c_sign_key;
220         char *net_access_key;
221 #endif
222 };
223
224 #if defined TIZEN_EXT_WIFI_MESH
225 struct _GSupplicantMeshGroupInfo {
226         unsigned char ssid[32];
227         unsigned int ssid_len;
228         int disconnect_reason;
229 };
230 #endif
231
232 struct _GSupplicantInterface {
233         char *path;
234         char *network_path;
235         unsigned int keymgmt_capa;
236         unsigned int authalg_capa;
237         unsigned int proto_capa;
238         unsigned int group_capa;
239         unsigned int pairwise_capa;
240         unsigned int scan_capa;
241         unsigned int mode_capa;
242         unsigned int max_scan_ssids;
243         bool p2p_support;
244         bool p2p_finding;
245         bool ap_create_in_progress;
246         dbus_bool_t ready;
247         GSupplicantState state;
248         dbus_bool_t scanning;
249         GSupplicantInterfaceCallback scan_callback;
250         void *scan_data;
251         int apscan;
252         char *ifname;
253         char *driver;
254         char *bridge;
255         struct _GSupplicantWpsCredentials wps_cred;
256         GSupplicantWpsState wps_state;
257         GHashTable *network_table;
258         GHashTable *peer_table;
259         GHashTable *group_table;
260         GHashTable *bss_mapping;
261         void *data;
262         const char *pending_peer_path;
263         GSupplicantNetwork *current_network;
264         struct added_network_information network_info;
265 #if defined TIZEN_EXT
266         dbus_bool_t is_5_0_Ghz_supported;
267         int disconnect_reason;
268 #endif
269 #if defined TIZEN_EXT
270         unsigned char add_network_bssid[WIFI_BSSID_LEN_MAX];
271         unsigned char connected_bssid[WIFI_BSSID_LEN_MAX];
272 #endif
273 #if defined TIZEN_EXT_WIFI_MESH
274         bool mesh_support;
275         struct _GSupplicantMeshGroupInfo group_info;
276 #endif
277 };
278
279 struct g_supplicant_bss {
280         GSupplicantInterface *interface;
281         char *path;
282         unsigned char bssid[6];
283         unsigned char ssid[32];
284         unsigned int ssid_len;
285         dbus_uint16_t frequency;
286         dbus_uint32_t maxrate;
287         dbus_int16_t signal;
288         GSupplicantMode mode;
289         GSupplicantSecurity security;
290         dbus_bool_t rsn_selected;
291         unsigned int wpa_keymgmt;
292         unsigned int wpa_pairwise;
293         unsigned int wpa_group;
294         unsigned int rsn_keymgmt;
295         unsigned int rsn_pairwise;
296         unsigned int rsn_group;
297         unsigned int keymgmt;
298         dbus_bool_t privacy;
299         dbus_bool_t psk;
300         dbus_bool_t ieee8021x;
301 #if defined TIZEN_EXT
302         dbus_bool_t ft_psk;
303         dbus_bool_t ft_ieee8021x;
304         GSList *vsie_list;
305         dbus_bool_t hs20;
306         unsigned char country_code[COUNTRY_CODE_LENGTH];
307         GSupplicantPhy_mode phy_mode;
308         dbus_int16_t snr;
309         dbus_uint32_t est_throughput;
310 #endif
311         unsigned int wps_capabilities;
312 #if defined TIZEN_EXT
313         dbus_bool_t sae;
314         dbus_bool_t owe;
315         dbus_bool_t dpp;
316         dbus_bool_t owe_transition_mode;
317         unsigned int transition_mode_ssid_len;
318         unsigned char transition_mode_bssid[6];
319         unsigned char transition_mode_ssid[32];
320         dbus_bool_t pmf_required;
321 #endif
322 };
323
324 struct _GSupplicantNetwork {
325         GSupplicantInterface *interface;
326         char *path;
327         char *group;
328         char *name;
329         unsigned char ssid[32];
330         unsigned int ssid_len;
331         dbus_int16_t signal;
332         dbus_uint16_t frequency;
333         struct g_supplicant_bss *best_bss;
334         GSupplicantMode mode;
335         GSupplicantSecurity security;
336         dbus_bool_t wps;
337         unsigned int wps_capabilities;
338         GHashTable *bss_table;
339         GHashTable *config_table;
340 #if defined TIZEN_EXT
341         bool isHS20AP;
342         char *eap;
343         char *identity;
344         char *phase2;
345         unsigned int keymgmt;
346         GSList *vsie_list;
347         unsigned char country_code[COUNTRY_CODE_LENGTH];
348         GSupplicantPhy_mode phy_mode;
349         dbus_bool_t owe_transition_mode;
350         dbus_bool_t privacy;
351         unsigned int transition_mode_ssid_len;
352         unsigned char transition_mode_bssid[6];
353         unsigned char transition_mode_ssid[32];
354         unsigned char last_connected_bssid[WIFI_BSSID_LEN_MAX];
355         GHashTable *assoc_reject_table;
356 #endif
357 };
358
359 struct _GSupplicantPeer {
360         GSupplicantInterface *interface;
361         char *path;
362         unsigned char device_address[ETH_ALEN];
363         unsigned char iface_address[ETH_ALEN];
364         char *name;
365         unsigned char *widi_ies;
366         int widi_ies_length;
367         char *identifier;
368         unsigned int wps_capabilities;
369         GSList *groups;
370         const GSupplicantInterface *current_group_iface;
371         bool connection_requested;
372 };
373
374 struct _GSupplicantGroup {
375         GSupplicantInterface *interface;
376         GSupplicantInterface *orig_interface;
377         char *path;
378         int role;
379         GSList *members;
380 };
381
382 struct interface_data {
383         GSupplicantInterface *interface;
384         char *path; /* Interface path cannot be taken from interface (above) as
385                      * it might have been freed already.
386                      */
387         GSupplicantInterfaceCallback callback;
388         void *user_data;
389         bool network_remove_in_progress;
390         GSupplicantSSID *ssid;
391 };
392
393 #if defined TIZEN_EXT
394 struct interface_signalpoll_data {
395         GSupplicantInterface *interface;
396         char *path;
397         GSupplicantMaxSpeedCallback callback;
398         void *user_data;
399 };
400 #endif
401
402 struct interface_create_data {
403         char *ifname;
404         char *driver;
405         char *bridge;
406 #if defined TIZEN_EXT
407         unsigned int mac_addr;
408         unsigned int preassoc_mac_addr;
409         unsigned int random_mac_lifetime;
410 #endif /* TIZEN_EXT */
411 #if defined TIZEN_EXT_WIFI_MESH
412         char *parent_ifname;
413         bool is_mesh_interface;
414 #endif
415         GSupplicantInterface *interface;
416         GSupplicantInterfaceCallback callback;
417         void *user_data;
418 };
419
420 struct interface_connect_data {
421         GSupplicantInterface *interface;
422         char *path;
423         GSupplicantInterfaceCallback callback;
424         void *user_data;
425         union {
426                 GSupplicantSSID *ssid;
427                 GSupplicantPeerParams *peer;
428         };
429 };
430
431 struct interface_scan_data {
432         GSupplicantInterface *interface;
433         char *path;
434         GSupplicantInterfaceCallback callback;
435         GSupplicantScanParams *scan_params;
436         void *user_data;
437 };
438
439 #if defined TIZEN_EXT
440 struct update_bssid_data {
441         GSupplicantNetwork *network;
442         unsigned char last_connected_bssid[WIFI_BSSID_LEN_MAX];
443         GHashTable *assoc_reject_table;
444         GSList *bssid_list;
445 };
446
447 struct assoc_reject_data {
448         char *bssid;
449         GSList *reject_time_list;
450 };
451
452 struct assoc_count_data {
453         time_t ref_time;
454         int assoc_count;
455 };
456
457 static unsigned int last_connected_bss_timeout = 0;
458 static bool simplified_log = true;
459 #endif
460
461 static int network_remove(struct interface_data *data);
462
463 #if defined TIZEN_EXT_WIFI_MESH
464 struct _GSupplicantMeshPeer {
465         GSupplicantInterface *interface;
466         char *peer_address;
467         int disconnect_reason;
468 };
469 #endif
470
471 static inline void debug(const char *format, ...)
472 {
473         char str[256];
474         va_list ap;
475
476         if (!callbacks_pointer || !callbacks_pointer->debug)
477                 return;
478
479         va_start(ap, format);
480
481         if (vsnprintf(str, sizeof(str), format, ap) > 0)
482                 callbacks_pointer->debug(str);
483
484         va_end(ap);
485 }
486
487 #define SUPPLICANT_DBG(fmt, arg...) \
488         debug("%s:%s() " fmt, __FILE__, __FUNCTION__ , ## arg);
489
490 static GSupplicantMode string2mode(const char *mode)
491 {
492         if (!mode)
493                 return G_SUPPLICANT_MODE_UNKNOWN;
494
495         if (g_str_equal(mode, "infrastructure"))
496                 return G_SUPPLICANT_MODE_INFRA;
497         else if (g_str_equal(mode, "ad-hoc"))
498                 return G_SUPPLICANT_MODE_IBSS;
499 #if defined TIZEN_EXT_WIFI_MESH
500         else if (g_str_equal(mode, "mesh"))
501                 return G_SUPPLICANT_MODE_MESH;
502 #endif
503
504         return G_SUPPLICANT_MODE_UNKNOWN;
505 }
506
507 static const char *mode2string(GSupplicantMode mode)
508 {
509         switch (mode) {
510         case G_SUPPLICANT_MODE_UNKNOWN:
511                 break;
512         case G_SUPPLICANT_MODE_INFRA:
513                 return "managed";
514         case G_SUPPLICANT_MODE_IBSS:
515                 return "adhoc";
516         case G_SUPPLICANT_MODE_MASTER:
517                 return "ap";
518 #if defined TIZEN_EXT_WIFI_MESH
519         case G_SUPPLICANT_MODE_MESH:
520                 return "mesh";
521 #endif
522         }
523
524         return NULL;
525 }
526
527 static const char *security2string(GSupplicantSecurity security)
528 {
529         switch (security) {
530         case G_SUPPLICANT_SECURITY_UNKNOWN:
531                 break;
532         case G_SUPPLICANT_SECURITY_NONE:
533                 return "none";
534         case G_SUPPLICANT_SECURITY_WEP:
535                 return "wep";
536         case G_SUPPLICANT_SECURITY_PSK:
537                 return "psk";
538         case G_SUPPLICANT_SECURITY_IEEE8021X:
539                 return "ieee8021x";
540 #if defined TIZEN_EXT
541         case G_SUPPLICANT_SECURITY_FT_PSK:
542                 return "ft_psk";
543         case G_SUPPLICANT_SECURITY_FT_IEEE8021X:
544                 return "ft_ieee8021x";
545         case G_SUPPLICANT_SECURITY_SAE:
546                 return "sae";
547         case G_SUPPLICANT_SECURITY_OWE:
548                 return "owe";
549         case G_SUPPLICANT_SECURITY_DPP:
550                 return "dpp";
551 #endif
552         }
553
554         return NULL;
555 }
556
557 static GSupplicantState string2state(const char *state)
558 {
559         if (!state)
560                 return G_SUPPLICANT_STATE_UNKNOWN;
561
562         if (g_str_equal(state, "unknown"))
563                 return G_SUPPLICANT_STATE_UNKNOWN;
564         else if (g_str_equal(state, "interface_disabled"))
565                 return G_SUPPLICANT_STATE_DISABLED;
566         else if (g_str_equal(state, "disconnected"))
567                 return G_SUPPLICANT_STATE_DISCONNECTED;
568         else if (g_str_equal(state, "inactive"))
569                 return G_SUPPLICANT_STATE_INACTIVE;
570         else if (g_str_equal(state, "scanning"))
571                 return G_SUPPLICANT_STATE_SCANNING;
572         else if (g_str_equal(state, "authenticating"))
573                 return G_SUPPLICANT_STATE_AUTHENTICATING;
574         else if (g_str_equal(state, "associating"))
575                 return G_SUPPLICANT_STATE_ASSOCIATING;
576         else if (g_str_equal(state, "associated"))
577                 return G_SUPPLICANT_STATE_ASSOCIATED;
578         else if (g_str_equal(state, "group_handshake"))
579                 return G_SUPPLICANT_STATE_GROUP_HANDSHAKE;
580         else if (g_str_equal(state, "4way_handshake"))
581                 return G_SUPPLICANT_STATE_4WAY_HANDSHAKE;
582         else if (g_str_equal(state, "completed"))
583                 return G_SUPPLICANT_STATE_COMPLETED;
584
585         return G_SUPPLICANT_STATE_UNKNOWN;
586 }
587
588 static bool compare_network_parameters(GSupplicantInterface *interface,
589                                 GSupplicantSSID *ssid)
590 {
591 #if defined TIZEN_EXT
592         if (!interface->network_info.ssid)
593                 return FALSE;
594 #endif
595
596         if (memcmp(interface->network_info.ssid, ssid->ssid, ssid->ssid_len))
597                 return FALSE;
598
599         if (interface->network_info.security != ssid->security)
600                 return FALSE;
601
602         if (interface->network_info.passphrase &&
603                         g_strcmp0(interface->network_info.passphrase,
604                                 ssid->passphrase) != 0) {
605                 return FALSE;
606         }
607
608         if (interface->network_info.private_passphrase &&
609                         g_strcmp0(interface->network_info.private_passphrase,
610                                 ssid->private_key_passphrase) != 0) {
611                 return FALSE;
612         }
613
614 #if defined TIZEN_EXT
615         if (interface->network_info.connector &&
616                         g_strcmp0(interface->network_info.connector,
617                                 ssid->connector) != 0) {
618                 return FALSE;
619         }
620         if (interface->network_info.c_sign_key &&
621                         g_strcmp0(interface->network_info.c_sign_key,
622                                 ssid->c_sign_key) != 0) {
623                 return FALSE;
624         }
625         if (interface->network_info.net_access_key &&
626                         g_strcmp0(interface->network_info.net_access_key,
627                                 ssid->net_access_key) != 0) {
628                 return FALSE;
629         }
630 #endif
631         return TRUE;
632 }
633
634 static void remove_network_information(GSupplicantInterface * interface)
635 {
636         g_free(interface->network_info.ssid);
637         g_free(interface->network_info.passphrase);
638         g_free(interface->network_info.private_passphrase);
639 #if defined TIZEN_EXT
640         g_free(interface->network_info.connector);
641         g_free(interface->network_info.c_sign_key);
642         g_free(interface->network_info.net_access_key);
643 #endif
644         interface->network_info.ssid = NULL;
645         interface->network_info.passphrase = NULL;
646         interface->network_info.private_passphrase = NULL;
647 #if defined TIZEN_EXT
648         interface->network_info.connector = NULL;
649         interface->network_info.c_sign_key = NULL;
650         interface->network_info.net_access_key = NULL;
651 #endif
652 }
653
654 static int store_network_information(GSupplicantInterface * interface,
655                                 GSupplicantSSID *ssid)
656 {
657         interface->network_info.ssid = g_malloc(ssid->ssid_len + 1);
658         if (interface->network_info.ssid != NULL) {
659                 memcpy(interface->network_info.ssid, ssid->ssid,
660                         ssid->ssid_len);
661                 interface->network_info.ssid[ssid->ssid_len] = '\0';
662         } else {
663                 return -ENOMEM;
664         }
665
666         interface->network_info.security = ssid->security;
667
668         if ((ssid->security == G_SUPPLICANT_SECURITY_WEP ||
669                 ssid->security == G_SUPPLICANT_SECURITY_PSK ||
670 #if defined TIZEN_EXT
671                 ssid->security == G_SUPPLICANT_SECURITY_SAE ||
672 #endif
673                 ssid->security == G_SUPPLICANT_SECURITY_NONE) &&
674                 ssid->passphrase) {
675                 interface->network_info.passphrase = g_strdup(ssid->passphrase);
676         }
677
678         if (ssid->security == G_SUPPLICANT_SECURITY_IEEE8021X &&
679                         ssid->private_key_passphrase) {
680                 interface->network_info.private_passphrase =
681                         g_strdup(ssid->private_key_passphrase);
682         }
683
684         return 0;
685 }
686
687 static void callback_system_ready(void)
688 {
689         if (system_ready)
690                 return;
691
692         system_ready = TRUE;
693
694         if (!callbacks_pointer)
695                 return;
696
697         if (!callbacks_pointer->system_ready)
698                 return;
699
700         callbacks_pointer->system_ready();
701 }
702
703 static void callback_system_killed(void)
704 {
705         system_ready = FALSE;
706
707         if (!callbacks_pointer)
708                 return;
709
710         if (!callbacks_pointer->system_killed)
711                 return;
712
713         callbacks_pointer->system_killed();
714 }
715
716 static void callback_interface_added(GSupplicantInterface *interface)
717 {
718         SUPPLICANT_DBG("");
719
720         if (!callbacks_pointer)
721                 return;
722
723         if (!callbacks_pointer->interface_added)
724                 return;
725
726         callbacks_pointer->interface_added(interface);
727 }
728
729 static void callback_interface_state(GSupplicantInterface *interface)
730 {
731         if (!callbacks_pointer)
732                 return;
733
734         if (!callbacks_pointer->interface_state)
735                 return;
736
737         callbacks_pointer->interface_state(interface);
738 }
739
740 static void callback_interface_removed(GSupplicantInterface *interface)
741 {
742         if (!callbacks_pointer)
743                 return;
744
745         if (!callbacks_pointer->interface_removed)
746                 return;
747
748         callbacks_pointer->interface_removed(interface);
749 }
750
751 #if !defined TIZEN_EXT
752 static void callback_p2p_support(GSupplicantInterface *interface)
753 {
754         SUPPLICANT_DBG("");
755
756         if (!interface->p2p_support)
757                 return;
758
759         if (callbacks_pointer && callbacks_pointer->p2p_support)
760                 callbacks_pointer->p2p_support(interface);
761 }
762 #endif
763
764 #if defined TIZEN_EXT_WIFI_MESH
765 static void callback_mesh_support(GSupplicantInterface *interface)
766 {
767         SUPPLICANT_DBG("");
768
769         if (!interface->mesh_support)
770                 return;
771
772         if (callbacks_pointer && callbacks_pointer->mesh_support)
773                 callbacks_pointer->mesh_support(interface);
774 }
775
776 bool g_supplicant_interface_has_mesh(GSupplicantInterface *interface)
777 {
778         if (!interface)
779                 return false;
780
781         return interface->mesh_support;
782 }
783 #endif
784
785 static void callback_scan_started(GSupplicantInterface *interface)
786 {
787         if (!callbacks_pointer)
788                 return;
789
790         if (!callbacks_pointer->scan_started)
791                 return;
792
793         callbacks_pointer->scan_started(interface);
794 }
795
796 static void callback_ap_create_fail(GSupplicantInterface *interface)
797 {
798         if (!callbacks_pointer)
799                 return;
800
801         if (!callbacks_pointer->ap_create_fail)
802                 return;
803
804         callbacks_pointer->ap_create_fail(interface);
805 }
806
807 static void callback_scan_finished(GSupplicantInterface *interface)
808 {
809         if (!callbacks_pointer)
810                 return;
811
812         if (!callbacks_pointer->scan_finished)
813                 return;
814
815         callbacks_pointer->scan_finished(interface);
816 }
817
818 static void callback_network_added(GSupplicantNetwork *network)
819 {
820         if (!callbacks_pointer)
821                 return;
822
823         if (!callbacks_pointer->network_added)
824                 return;
825
826         callbacks_pointer->network_added(network);
827 }
828
829 static void callback_network_removed(GSupplicantNetwork *network)
830 {
831         if (!callbacks_pointer)
832                 return;
833
834         if (!callbacks_pointer->network_removed)
835                 return;
836
837         callbacks_pointer->network_removed(network);
838 }
839
840 #if defined TIZEN_EXT
841 static void callback_network_merged(GSupplicantNetwork *network)
842 {
843         if (!callbacks_pointer)
844                 return;
845
846         if (!callbacks_pointer->network_merged)
847                 return;
848
849         callbacks_pointer->network_merged(network);
850 }
851
852 static void callback_assoc_failed(void *user_data)
853 {
854         if (!callbacks_pointer)
855                 return;
856
857         if (!callbacks_pointer->assoc_failed)
858                 return;
859
860         callbacks_pointer->assoc_failed(user_data);
861 }
862
863 static void callback_scan_done(GSupplicantInterface *interface)
864 {
865         if (!callbacks_pointer)
866                 return;
867
868         if (!callbacks_pointer->scan_done)
869                 return;
870
871         callbacks_pointer->scan_done(interface);
872 }
873 #endif
874
875 static void callback_network_changed(GSupplicantNetwork *network,
876                                         const char *property)
877 {
878         if (!callbacks_pointer)
879                 return;
880
881         if (!callbacks_pointer->network_changed)
882                 return;
883
884         callbacks_pointer->network_changed(network, property);
885 }
886
887 static void callback_network_associated(GSupplicantNetwork *network)
888 {
889         if (!callbacks_pointer)
890                 return;
891
892         if (!callbacks_pointer->network_associated)
893                 return;
894
895         callbacks_pointer->network_associated(network);
896 }
897
898 static void callback_sta_authorized(GSupplicantInterface *interface,
899                                         const char *addr)
900 {
901         if (!callbacks_pointer)
902                 return;
903
904         if (!callbacks_pointer->sta_authorized)
905                 return;
906
907         callbacks_pointer->sta_authorized(interface, addr);
908 }
909
910 static void callback_sta_deauthorized(GSupplicantInterface *interface,
911                                         const char *addr)
912 {
913         if (!callbacks_pointer)
914                 return;
915
916         if (!callbacks_pointer->sta_deauthorized)
917                 return;
918
919         callbacks_pointer->sta_deauthorized(interface, addr);
920 }
921
922 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
923 static void callback_eap(GSupplicantInterface *interface, bool status)
924 {
925         if (!callbacks_pointer)
926                 return;
927
928         if (!callbacks_pointer->eap)
929                 return;
930
931         callbacks_pointer->eap(interface, status);
932 }
933 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
934
935 static void callback_peer_found(GSupplicantPeer *peer)
936 {
937         if (!callbacks_pointer)
938                 return;
939
940         if (!callbacks_pointer->peer_found)
941                 return;
942
943         callbacks_pointer->peer_found(peer);
944 }
945
946 static void callback_peer_lost(GSupplicantPeer *peer)
947 {
948         if (!callbacks_pointer)
949                 return;
950
951         if (!callbacks_pointer->peer_lost)
952                 return;
953
954         callbacks_pointer->peer_lost(peer);
955 }
956
957 static void callback_peer_changed(GSupplicantPeer *peer,
958                                                 GSupplicantPeerState state)
959 {
960         if (!callbacks_pointer)
961                 return;
962
963         if (!callbacks_pointer->peer_changed)
964                 return;
965
966         callbacks_pointer->peer_changed(peer, state);
967 }
968
969 static void callback_peer_request(GSupplicantPeer *peer)
970 {
971         if (!callbacks_pointer)
972                 return;
973
974         if (!callbacks_pointer->peer_request)
975                 return;
976
977         peer->connection_requested = true;
978
979         callbacks_pointer->peer_request(peer);
980 }
981
982 static void callback_disconnect_reason_code(GSupplicantInterface *interface,
983                                         int reason_code)
984 {
985         if (!callbacks_pointer)
986                 return;
987
988         if (!callbacks_pointer->disconnect_reasoncode)
989                 return;
990
991         if (reason_code != 0)
992                 callbacks_pointer->disconnect_reasoncode(interface,
993                                                         reason_code);
994 }
995
996 static void callback_assoc_status_code(GSupplicantInterface *interface,
997                                 int status_code)
998 {
999         if (!callbacks_pointer)
1000                 return;
1001
1002         if (!callbacks_pointer->assoc_status_code)
1003                 return;
1004
1005         callbacks_pointer->assoc_status_code(interface, status_code);
1006
1007 }
1008
1009 static void remove_group(gpointer data)
1010 {
1011         GSupplicantGroup *group = data;
1012
1013         if (group->members)
1014                 g_slist_free_full(group->members, g_free);
1015
1016         g_free(group->path);
1017         g_free(group);
1018 }
1019
1020 static void remove_interface(gpointer data)
1021 {
1022         GSupplicantInterface *interface = data;
1023
1024         g_hash_table_destroy(interface->bss_mapping);
1025         g_hash_table_destroy(interface->network_table);
1026         g_hash_table_destroy(interface->peer_table);
1027         g_hash_table_destroy(interface->group_table);
1028
1029         if (interface->scan_callback) {
1030                 SUPPLICANT_DBG("call interface %p callback %p scanning %d",
1031                                 interface, interface->scan_callback,
1032                                 interface->scanning);
1033
1034                 interface->scan_callback(-EIO, interface, interface->scan_data);
1035                 interface->scan_callback = NULL;
1036                 interface->scan_data = NULL;
1037
1038                 if (interface->scanning) {
1039                         interface->scanning = FALSE;
1040                         callback_scan_finished(interface);
1041                 }
1042         }
1043
1044         callback_interface_removed(interface);
1045
1046         g_free(interface->wps_cred.key);
1047         g_free(interface->path);
1048         g_free(interface->network_path);
1049 #if defined TIZEN_EXT
1050         interface->network_path = NULL;
1051 #endif
1052         g_free(interface->ifname);
1053         g_free(interface->driver);
1054         g_free(interface->bridge);
1055         remove_network_information(interface);
1056         g_free(interface);
1057 }
1058
1059 static void remove_network(gpointer data)
1060 {
1061         GSupplicantNetwork *network = data;
1062
1063         g_hash_table_destroy(network->bss_table);
1064
1065         callback_network_removed(network);
1066
1067         g_hash_table_destroy(network->config_table);
1068 #if defined TIZEN_EXT
1069         g_hash_table_destroy(network->assoc_reject_table);
1070 #endif
1071
1072         g_free(network->path);
1073         g_free(network->group);
1074         g_free(network->name);
1075 #if defined TIZEN_EXT
1076         g_free(network->eap);
1077         g_free(network->identity);
1078         g_free(network->phase2);
1079 #endif
1080 #if defined TIZEN_EXT
1081         g_slist_free_full(network->vsie_list, g_free);
1082 #endif
1083
1084         g_free(network);
1085 }
1086
1087 static void remove_bss(gpointer data)
1088 {
1089         struct g_supplicant_bss *bss = data;
1090
1091         supplicant_dbus_property_call_cancel_all(bss);
1092
1093         g_free(bss->path);
1094 #if defined TIZEN_EXT
1095         g_slist_free_full(bss->vsie_list, g_free);
1096 #endif
1097         g_free(bss);
1098 }
1099
1100 static void remove_peer(gpointer data)
1101 {
1102         GSupplicantPeer *peer = data;
1103
1104         callback_peer_lost(peer);
1105
1106         if (peer->groups)
1107                 g_slist_free_full(peer->groups, g_free);
1108
1109         if (peer_mapping)
1110                 g_hash_table_remove(peer_mapping, peer->path);
1111
1112         if (pending_peer_connection)
1113                 g_hash_table_remove(pending_peer_connection, peer->path);
1114
1115         g_free(peer->path);
1116         g_free(peer->name);
1117         g_free(peer->identifier);
1118         g_free(peer->widi_ies);
1119
1120         g_free(peer);
1121 }
1122
1123 #if defined TIZEN_EXT
1124 static void remove_assoc_data(gpointer data)
1125 {
1126         struct assoc_reject_data *assoc_data = data;
1127
1128         g_free(assoc_data->bssid);
1129         g_slist_free(assoc_data->reject_time_list);
1130
1131         g_free(assoc_data);
1132 }
1133 #endif
1134
1135 static void debug_strvalmap(const char *label, struct strvalmap *map,
1136                                                         unsigned int val)
1137 {
1138         int i;
1139 #if defined TIZEN_EXT
1140         if (!simplified_log)
1141 #endif
1142         for (i = 0; map[i].str; i++) {
1143                 if (val & map[i].val)
1144                         SUPPLICANT_DBG("%s: %s", label, map[i].str);
1145         }
1146 }
1147
1148 static void interface_capability_keymgmt(DBusMessageIter *iter, void *user_data)
1149 {
1150         GSupplicantInterface *interface = user_data;
1151         const char *str = NULL;
1152         int i;
1153
1154         dbus_message_iter_get_basic(iter, &str);
1155         if (!str)
1156                 return;
1157
1158         for (i = 0; keymgmt_map[i].str; i++)
1159                 if (strcmp(str, keymgmt_map[i].str) == 0) {
1160                         interface->keymgmt_capa |= keymgmt_map[i].val;
1161                         break;
1162                 }
1163 }
1164
1165 static void interface_capability_authalg(DBusMessageIter *iter, void *user_data)
1166 {
1167         GSupplicantInterface *interface = user_data;
1168         const char *str = NULL;
1169         int i;
1170
1171         dbus_message_iter_get_basic(iter, &str);
1172         if (!str)
1173                 return;
1174
1175         for (i = 0; authalg_capa_map[i].str; i++)
1176                 if (strcmp(str, authalg_capa_map[i].str) == 0) {
1177                         interface->authalg_capa |= authalg_capa_map[i].val;
1178                         break;
1179                 }
1180 }
1181
1182 static void interface_capability_proto(DBusMessageIter *iter, void *user_data)
1183 {
1184         GSupplicantInterface *interface = user_data;
1185         const char *str = NULL;
1186         int i;
1187
1188         dbus_message_iter_get_basic(iter, &str);
1189         if (!str)
1190                 return;
1191
1192         for (i = 0; proto_capa_map[i].str; i++)
1193                 if (strcmp(str, proto_capa_map[i].str) == 0) {
1194                         interface->proto_capa |= proto_capa_map[i].val;
1195                         break;
1196                 }
1197 }
1198
1199 static void interface_capability_pairwise(DBusMessageIter *iter,
1200                                                         void *user_data)
1201 {
1202         GSupplicantInterface *interface = user_data;
1203         const char *str = NULL;
1204         int i;
1205
1206         dbus_message_iter_get_basic(iter, &str);
1207         if (!str)
1208                 return;
1209
1210         for (i = 0; pairwise_map[i].str; i++)
1211                 if (strcmp(str, pairwise_map[i].str) == 0) {
1212                         interface->pairwise_capa |= pairwise_map[i].val;
1213                         break;
1214                 }
1215 }
1216
1217 static void interface_capability_group(DBusMessageIter *iter, void *user_data)
1218 {
1219         GSupplicantInterface *interface = user_data;
1220         const char *str = NULL;
1221         int i;
1222
1223         dbus_message_iter_get_basic(iter, &str);
1224         if (!str)
1225                 return;
1226
1227         for (i = 0; group_map[i].str; i++)
1228                 if (strcmp(str, group_map[i].str) == 0) {
1229                         interface->group_capa |= group_map[i].val;
1230                         break;
1231                 }
1232 }
1233
1234 static void interface_capability_scan(DBusMessageIter *iter, void *user_data)
1235 {
1236         GSupplicantInterface *interface = user_data;
1237         const char *str = NULL;
1238         int i;
1239
1240         dbus_message_iter_get_basic(iter, &str);
1241         if (!str)
1242                 return;
1243
1244         for (i = 0; scan_capa_map[i].str; i++)
1245                 if (strcmp(str, scan_capa_map[i].str) == 0) {
1246                         interface->scan_capa |= scan_capa_map[i].val;
1247                         break;
1248                 }
1249 }
1250
1251 static void interface_capability_mode(DBusMessageIter *iter, void *user_data)
1252 {
1253         GSupplicantInterface *interface = user_data;
1254         const char *str = NULL;
1255         int i;
1256
1257         dbus_message_iter_get_basic(iter, &str);
1258         if (!str)
1259                 return;
1260
1261         for (i = 0; mode_capa_map[i].str; i++)
1262                 if (strcmp(str, mode_capa_map[i].str) == 0) {
1263                         interface->mode_capa |= mode_capa_map[i].val;
1264                         break;
1265                 }
1266 }
1267
1268 static void interface_capability(const char *key, DBusMessageIter *iter,
1269                                                         void *user_data)
1270 {
1271         GSupplicantInterface *interface = user_data;
1272
1273         if (!key)
1274                 return;
1275
1276         if (g_strcmp0(key, "KeyMgmt") == 0)
1277                 supplicant_dbus_array_foreach(iter,
1278                                 interface_capability_keymgmt, interface);
1279         else if (g_strcmp0(key, "AuthAlg") == 0)
1280                 supplicant_dbus_array_foreach(iter,
1281                                 interface_capability_authalg, interface);
1282         else if (g_strcmp0(key, "Protocol") == 0)
1283                 supplicant_dbus_array_foreach(iter,
1284                                 interface_capability_proto, interface);
1285         else if (g_strcmp0(key, "Pairwise") == 0)
1286                 supplicant_dbus_array_foreach(iter,
1287                                 interface_capability_pairwise, interface);
1288         else if (g_strcmp0(key, "Group") == 0)
1289                 supplicant_dbus_array_foreach(iter,
1290                                 interface_capability_group, interface);
1291         else if (g_strcmp0(key, "Scan") == 0)
1292                 supplicant_dbus_array_foreach(iter,
1293                                 interface_capability_scan, interface);
1294         else if (g_strcmp0(key, "Modes") == 0)
1295                 supplicant_dbus_array_foreach(iter,
1296                                 interface_capability_mode, interface);
1297         else if (g_strcmp0(key, "MaxScanSSID") == 0) {
1298                 dbus_int32_t max_scan_ssid;
1299
1300                 dbus_message_iter_get_basic(iter, &max_scan_ssid);
1301                 if (max_scan_ssid < 2)
1302                         max_scan_ssid = 0;
1303                 interface->max_scan_ssids = max_scan_ssid;
1304 #if defined TIZEN_EXT
1305         } else if (g_strcmp0(key, "Is5GhzSupported") == 0) {
1306                 dbus_bool_t is_5_0_Ghz_supported;
1307
1308                 dbus_message_iter_get_basic(iter, &is_5_0_Ghz_supported);
1309                 interface->is_5_0_Ghz_supported = is_5_0_Ghz_supported;
1310 #endif
1311         } else
1312                 SUPPLICANT_DBG("key %s type %c",
1313                                 key, dbus_message_iter_get_arg_type(iter));
1314 }
1315
1316 static void set_bss_expiration_age(DBusMessageIter *iter, void *user_data)
1317 {
1318         unsigned int bss_expiration_age = GPOINTER_TO_UINT(user_data);
1319
1320         dbus_message_iter_append_basic(iter, DBUS_TYPE_UINT32,
1321                                 &bss_expiration_age);
1322 }
1323
1324 int g_supplicant_interface_set_bss_expiration_age(GSupplicantInterface *interface,
1325                                         unsigned int bss_expiration_age)
1326 {
1327        return supplicant_dbus_property_set(interface->path,
1328                                        SUPPLICANT_INTERFACE ".Interface",
1329                                        "BSSExpireAge", DBUS_TYPE_UINT32_AS_STRING,
1330                                        set_bss_expiration_age, NULL,
1331                                        GUINT_TO_POINTER(bss_expiration_age), NULL);
1332 }
1333
1334 struct set_apscan_data
1335 {
1336         unsigned int ap_scan;
1337         GSupplicantInterface *interface;
1338 };
1339
1340 static void set_apscan(DBusMessageIter *iter, void *user_data)
1341 {
1342         struct set_apscan_data *data = user_data;
1343         unsigned int ap_scan = data->ap_scan;
1344
1345         dbus_message_iter_append_basic(iter, DBUS_TYPE_UINT32, &ap_scan);
1346 }
1347
1348 static void set_apscan_complete(const char *error,
1349                 DBusMessageIter *iter, void *user_data)
1350 {
1351         struct set_apscan_data *data = user_data;
1352         GSupplicantInterface *interface = data->interface;
1353
1354         if (error) {
1355                 interface->ap_create_in_progress = false;
1356                 SUPPLICANT_DBG("Set AP scan error %s", error);
1357                 goto error;
1358         }
1359
1360         interface->ap_create_in_progress = true;
1361 error:
1362         dbus_free(data);
1363 }
1364
1365 int g_supplicant_interface_set_apscan(GSupplicantInterface *interface,
1366                                                         unsigned int ap_scan)
1367 {
1368         struct set_apscan_data *data;
1369         int ret;
1370
1371         data = dbus_malloc0(sizeof(*data));
1372
1373         if (!data)
1374                 return -ENOMEM;
1375
1376         data->ap_scan = ap_scan;
1377         data->interface = interface;
1378
1379         ret = supplicant_dbus_property_set(interface->path,
1380                         SUPPLICANT_INTERFACE ".Interface",
1381                         "ApScan", DBUS_TYPE_UINT32_AS_STRING,
1382                         set_apscan, set_apscan_complete, data, NULL);
1383         if (ret < 0)
1384                 dbus_free(data);
1385
1386         return ret;
1387 }
1388
1389 void g_supplicant_interface_set_data(GSupplicantInterface *interface,
1390                                                                 void *data)
1391 {
1392         if (!interface)
1393                 return;
1394
1395         interface->data = data;
1396
1397         if (!data)
1398                 interface->scan_callback = NULL;
1399 }
1400
1401 void *g_supplicant_interface_get_data(GSupplicantInterface *interface)
1402 {
1403         if (!interface)
1404                 return NULL;
1405
1406         return interface->data;
1407 }
1408
1409 const char *g_supplicant_interface_get_ifname(GSupplicantInterface *interface)
1410 {
1411         if (!interface)
1412                 return NULL;
1413
1414         return interface->ifname;
1415 }
1416
1417 #if defined TIZEN_EXT
1418 bool g_supplicant_interface_get_is_5_0_ghz_supported(GSupplicantInterface *interface)
1419 {
1420         if (!interface)
1421                 return NULL;
1422
1423         return interface->is_5_0_Ghz_supported;
1424 }
1425
1426 unsigned char *g_supplicant_interface_get_add_network_bssid(GSupplicantInterface *interface)
1427 {
1428         if (!interface)
1429                 return NULL;
1430
1431         return (unsigned char *)interface->add_network_bssid;
1432 }
1433 #endif
1434
1435 const char *g_supplicant_interface_get_driver(GSupplicantInterface *interface)
1436 {
1437         if (!interface)
1438                 return NULL;
1439
1440         return interface->driver;
1441 }
1442
1443 GSupplicantState g_supplicant_interface_get_state(
1444                                         GSupplicantInterface *interface)
1445 {
1446         if (!interface)
1447                 return G_SUPPLICANT_STATE_UNKNOWN;
1448
1449         return interface->state;
1450 }
1451
1452 const char *g_supplicant_interface_get_wps_key(GSupplicantInterface *interface)
1453 {
1454         if (!interface)
1455                 return NULL;
1456
1457         return (const char *)interface->wps_cred.key;
1458 }
1459
1460 const void *g_supplicant_interface_get_wps_ssid(GSupplicantInterface *interface,
1461                                                         unsigned int *ssid_len)
1462 {
1463         if (!ssid_len)
1464                 return NULL;
1465
1466         if (!interface || interface->wps_cred.ssid_len == 0) {
1467                 *ssid_len = 0;
1468                 return NULL;
1469         }
1470
1471         *ssid_len = interface->wps_cred.ssid_len;
1472         return interface->wps_cred.ssid;
1473 }
1474
1475 GSupplicantWpsState g_supplicant_interface_get_wps_state(
1476                                         GSupplicantInterface *interface)
1477 {
1478         if (!interface)
1479                 return G_SUPPLICANT_WPS_STATE_UNKNOWN;
1480
1481         return interface->wps_state;
1482 }
1483
1484 unsigned int g_supplicant_interface_get_mode(GSupplicantInterface *interface)
1485 {
1486         if (!interface)
1487                 return 0;
1488
1489         return interface->mode_capa;
1490 }
1491
1492 unsigned int g_supplicant_interface_get_max_scan_ssids(
1493                                 GSupplicantInterface *interface)
1494 {
1495         if (!interface)
1496                 return 0;
1497
1498         if (interface->max_scan_ssids == 0)
1499                 return WPAS_MAX_SCAN_SSIDS;
1500
1501         return interface->max_scan_ssids;
1502 }
1503
1504 static void set_network_enabled(DBusMessageIter *iter, void *user_data)
1505 {
1506         dbus_bool_t enable = *(dbus_bool_t *)user_data;
1507
1508         dbus_message_iter_append_basic(iter, DBUS_TYPE_BOOLEAN, &enable);
1509 }
1510
1511 int g_supplicant_interface_enable_selected_network(GSupplicantInterface *interface,
1512                                                         dbus_bool_t enable)
1513 {
1514         if (!interface)
1515                 return -1;
1516
1517         if (!interface->network_path)
1518                 return -1;
1519
1520         SUPPLICANT_DBG(" ");
1521         return supplicant_dbus_property_set(interface->network_path,
1522                                 SUPPLICANT_INTERFACE ".Network",
1523                                 "Enabled", DBUS_TYPE_BOOLEAN_AS_STRING,
1524                                 set_network_enabled, NULL, &enable, NULL);
1525 }
1526
1527 dbus_bool_t g_supplicant_interface_get_ready(GSupplicantInterface *interface)
1528 {
1529         if (!interface)
1530                 return FALSE;
1531
1532         return interface->ready;
1533 }
1534
1535 GSupplicantInterface *g_supplicant_network_get_interface(
1536                                         GSupplicantNetwork *network)
1537 {
1538         if (!network)
1539                 return NULL;
1540
1541         return network->interface;
1542 }
1543
1544 const char *g_supplicant_network_get_name(GSupplicantNetwork *network)
1545 {
1546         if (!network || !network->name)
1547                 return "";
1548
1549         return network->name;
1550 }
1551
1552 const char *g_supplicant_network_get_identifier(GSupplicantNetwork *network)
1553 {
1554         if (!network || !network->group)
1555                 return "";
1556
1557         return network->group;
1558 }
1559
1560 const char *g_supplicant_network_get_path(GSupplicantNetwork *network)
1561 {
1562         if (!network || !network->path)
1563                 return NULL;
1564
1565         return network->path;
1566 }
1567
1568 const char *g_supplicant_network_get_mode(GSupplicantNetwork *network)
1569 {
1570         if (!network)
1571                 return G_SUPPLICANT_MODE_UNKNOWN;
1572
1573         return mode2string(network->mode);
1574 }
1575
1576 const char *g_supplicant_network_get_security(GSupplicantNetwork *network)
1577 {
1578         if (!network)
1579                 return G_SUPPLICANT_SECURITY_UNKNOWN;
1580
1581         return security2string(network->security);
1582 }
1583
1584 const void *g_supplicant_network_get_ssid(GSupplicantNetwork *network,
1585                                                 unsigned int *ssid_len)
1586 {
1587         if (!network) {
1588                 *ssid_len = 0;
1589                 return NULL;
1590         }
1591
1592         *ssid_len = network->ssid_len;
1593         return network->ssid;
1594 }
1595
1596 dbus_int16_t g_supplicant_network_get_signal(GSupplicantNetwork *network)
1597 {
1598         if (!network)
1599                 return 0;
1600
1601         return network->signal;
1602 }
1603
1604 #if defined TIZEN_EXT
1605 void g_supplicant_network_set_signal(GSupplicantNetwork *network, int signal)
1606 {
1607         if (!network)
1608                 return;
1609
1610         network->signal = (dbus_int16_t)signal;
1611 }
1612
1613 void g_supplicant_network_set_bss_signal(GSupplicantNetwork *network,
1614                 int signal, int snr)
1615 {
1616         struct g_supplicant_bss *best_bss;
1617
1618         if (!network)
1619                 return;
1620
1621         best_bss = network->best_bss;
1622         if (!best_bss)
1623                 return;
1624
1625         best_bss->signal = (dbus_int16_t)signal;
1626         best_bss->snr = (dbus_int16_t)snr;
1627 }
1628 #endif
1629
1630 dbus_uint16_t g_supplicant_network_get_frequency(GSupplicantNetwork *network)
1631 {
1632         if (!network)
1633                 return 0;
1634
1635         return network->frequency;
1636 }
1637
1638 dbus_bool_t g_supplicant_network_get_wps(GSupplicantNetwork *network)
1639 {
1640         if (!network)
1641                 return FALSE;
1642
1643         return network->wps;
1644 }
1645
1646 dbus_bool_t g_supplicant_network_is_wps_active(GSupplicantNetwork *network)
1647 {
1648         if (!network)
1649                 return FALSE;
1650
1651         if (network->wps_capabilities & G_SUPPLICANT_WPS_CONFIGURED)
1652                 return TRUE;
1653
1654         return FALSE;
1655 }
1656
1657 dbus_bool_t g_supplicant_network_is_wps_pbc(GSupplicantNetwork *network)
1658 {
1659         if (!network)
1660                 return FALSE;
1661
1662         if (network->wps_capabilities & G_SUPPLICANT_WPS_PBC)
1663                 return TRUE;
1664
1665         return FALSE;
1666 }
1667
1668 dbus_bool_t g_supplicant_network_is_wps_advertizing(GSupplicantNetwork *network)
1669 {
1670         if (!network)
1671                 return FALSE;
1672
1673         if (network->wps_capabilities & G_SUPPLICANT_WPS_REGISTRAR)
1674                 return TRUE;
1675
1676         return FALSE;
1677 }
1678
1679 #ifdef TIZEN_EXT
1680 GSupplicantPhy_mode g_supplicant_network_get_phy_mode(GSupplicantNetwork *network)
1681 {
1682         if (!network)
1683                 return G_SUPPLICANT_MODE_IEEE80211_UNKNOWN;
1684
1685         return network->phy_mode;
1686 }
1687 #endif
1688
1689 GSupplicantInterface *g_supplicant_peer_get_interface(GSupplicantPeer *peer)
1690 {
1691         if (!peer)
1692                 return NULL;
1693
1694         return peer->interface;
1695 }
1696
1697 const char *g_supplicant_peer_get_path(GSupplicantPeer *peer)
1698 {
1699         if (!peer)
1700                 return NULL;
1701
1702         return peer->path;
1703 }
1704
1705 const char *g_supplicant_peer_get_identifier(GSupplicantPeer *peer)
1706 {
1707         if (!peer)
1708                 return NULL;
1709
1710         return peer->identifier;
1711 }
1712
1713 const void *g_supplicant_peer_get_device_address(GSupplicantPeer *peer)
1714 {
1715         if (!peer)
1716                 return NULL;
1717
1718         return peer->device_address;
1719 }
1720
1721 const void *g_supplicant_peer_get_iface_address(GSupplicantPeer *peer)
1722 {
1723         if (!peer)
1724                 return NULL;
1725
1726         return peer->iface_address;
1727 }
1728
1729 const char *g_supplicant_peer_get_name(GSupplicantPeer *peer)
1730 {
1731         if (!peer)
1732                 return NULL;
1733
1734         return peer->name;
1735 }
1736
1737 #if defined TIZEN_EXT
1738 bool g_supplicant_network_is_hs20AP(GSupplicantNetwork *network)
1739 {
1740         if (!network)
1741                 return 0;
1742
1743         return network->isHS20AP;
1744 }
1745
1746 const char *g_supplicant_network_get_eap(GSupplicantNetwork *network)
1747 {
1748         if (!network || !network->eap)
1749                 return NULL;
1750
1751         return network->eap;
1752 }
1753
1754 const char *g_supplicant_network_get_identity(GSupplicantNetwork *network)
1755 {
1756         if (!network || !network->identity)
1757                 return NULL;
1758
1759         return network->identity;
1760 }
1761
1762 const char *g_supplicant_network_get_phase2(GSupplicantNetwork *network)
1763 {
1764         if (!network || !network->phase2)
1765                 return NULL;
1766
1767         return network->phase2;
1768 }
1769
1770 unsigned int g_supplicant_network_get_keymgmt(GSupplicantNetwork *network)
1771 {
1772         if (!network)
1773                 return 0;
1774
1775         return network->keymgmt;
1776 }
1777
1778 dbus_bool_t g_supplicant_network_get_privacy(GSupplicantNetwork *network)
1779 {
1780         if (!network)
1781                 return FALSE;
1782
1783         return network->privacy;
1784 }
1785
1786 const unsigned char *g_supplicant_network_get_countrycode(GSupplicantNetwork
1787                                                           *network)
1788 {
1789         if (!network)
1790                 return NULL;
1791
1792         return network->country_code;
1793 }
1794
1795 dbus_bool_t g_supplicant_network_is_pmf_required(GSupplicantNetwork *network)
1796 {
1797         if (!network)
1798                 return 0;
1799
1800         return network->best_bss->pmf_required;
1801 }
1802 #endif
1803
1804 const unsigned char *g_supplicant_peer_get_widi_ies(GSupplicantPeer *peer,
1805                                                                 int *length)
1806 {
1807         if (!peer || !length)
1808                 return NULL;
1809
1810         *length = peer->widi_ies_length;
1811         return peer->widi_ies;
1812 }
1813
1814 bool g_supplicant_peer_is_wps_pbc(GSupplicantPeer *peer)
1815 {
1816         if (!peer)
1817                 return false;
1818
1819         if (peer->wps_capabilities & G_SUPPLICANT_WPS_PBC)
1820                 return true;
1821
1822         return false;
1823 }
1824
1825 bool g_supplicant_peer_is_wps_pin(GSupplicantPeer *peer)
1826 {
1827         if (!peer)
1828                 return false;
1829
1830         if (peer->wps_capabilities & G_SUPPLICANT_WPS_PIN)
1831                 return true;
1832
1833         return false;
1834 }
1835
1836 bool g_supplicant_peer_is_in_a_group(GSupplicantPeer *peer)
1837 {
1838         if (!peer || !peer->groups)
1839                 return false;
1840
1841         return true;
1842 }
1843
1844 GSupplicantInterface *g_supplicant_peer_get_group_interface(GSupplicantPeer *peer)
1845 {
1846         if (!peer)
1847                 return NULL;
1848
1849         return (GSupplicantInterface *) peer->current_group_iface;
1850 }
1851
1852 bool g_supplicant_peer_is_client(GSupplicantPeer *peer)
1853 {
1854         GSupplicantGroup *group;
1855         GSList *list;
1856
1857         if (!peer)
1858                 return false;
1859
1860         for (list = peer->groups; list; list = list->next) {
1861                 const char *path = list->data;
1862
1863                 group = g_hash_table_lookup(group_mapping, path);
1864                 if (!group)
1865                         continue;
1866
1867                 if (group->role != G_SUPPLICANT_GROUP_ROLE_CLIENT ||
1868                                 group->orig_interface != peer->interface)
1869                         continue;
1870
1871                 if (group->interface == peer->current_group_iface)
1872                         return true;
1873         }
1874
1875         return false;
1876 }
1877
1878 bool g_supplicant_peer_has_requested_connection(GSupplicantPeer *peer)
1879 {
1880         if (!peer)
1881                 return false;
1882
1883         return peer->connection_requested;
1884 }
1885
1886 #if defined TIZEN_EXT
1887 /*
1888  * Description: Network client requires additional wifi specific info
1889  */
1890 const unsigned char *g_supplicant_network_get_bssid(GSupplicantNetwork *network)
1891 {
1892         if (network == NULL || network->best_bss == NULL)
1893                 return NULL;
1894
1895         return (const unsigned char *)network->best_bss->bssid;
1896 }
1897
1898 dbus_bool_t g_supplicant_network_get_transition_mode(GSupplicantNetwork *network)
1899 {
1900         if (network == NULL)
1901                 return FALSE;
1902
1903         return network->owe_transition_mode;
1904 }
1905
1906 const unsigned char *g_supplicant_network_get_transition_mode_bssid(GSupplicantNetwork *network)
1907 {
1908         if (network == NULL)
1909                 return NULL;
1910
1911         return (const unsigned char *)network->transition_mode_bssid;
1912 }
1913
1914 const void *g_supplicant_network_get_transition_mode_ssid(GSupplicantNetwork *network,
1915                                                 unsigned int *transition_mode_ssid_len)
1916 {
1917         if (!network) {
1918                 *transition_mode_ssid_len = 0;
1919                 return NULL;
1920         }
1921
1922         *transition_mode_ssid_len = network->transition_mode_ssid_len;
1923         return network->transition_mode_ssid;
1924 }
1925
1926 unsigned int g_supplicant_network_get_maxrate(GSupplicantNetwork *network)
1927 {
1928         if (network == NULL || network->best_bss == NULL)
1929                 return 0;
1930
1931         return network->best_bss->maxrate;
1932 }
1933
1934 const char *g_supplicant_network_get_enc_mode(GSupplicantNetwork *network)
1935 {
1936         if (network == NULL || network->best_bss == NULL)
1937                 return NULL;
1938
1939         if (network->best_bss->security == G_SUPPLICANT_SECURITY_PSK ||
1940                         network->best_bss->security == G_SUPPLICANT_SECURITY_SAE ||
1941                         network->best_bss->security == G_SUPPLICANT_SECURITY_OWE ||
1942                         network->best_bss->security == G_SUPPLICANT_SECURITY_DPP ||
1943                         network->best_bss->security == G_SUPPLICANT_SECURITY_IEEE8021X) {
1944                 unsigned int pairwise;
1945
1946                 pairwise = network->best_bss->rsn_pairwise |
1947                                 network->best_bss->wpa_pairwise;
1948
1949                 if ((pairwise & G_SUPPLICANT_PAIRWISE_CCMP) &&
1950                     (pairwise & G_SUPPLICANT_PAIRWISE_TKIP))
1951                         return "mixed";
1952                 else if (pairwise & G_SUPPLICANT_PAIRWISE_CCMP)
1953                         return "aes";
1954                 else if (pairwise & G_SUPPLICANT_PAIRWISE_TKIP)
1955                         return "tkip";
1956
1957         } else if (network->best_bss->security == G_SUPPLICANT_SECURITY_WEP)
1958                 return "wep";
1959         else if (network->best_bss->security == G_SUPPLICANT_SECURITY_NONE)
1960                 return "none";
1961
1962         return NULL;
1963 }
1964
1965 bool g_supplicant_network_get_rsn_mode(GSupplicantNetwork *network)
1966 {
1967         if (network == NULL || network->best_bss == NULL)
1968                 return 0;
1969
1970         if (network->best_bss->security == G_SUPPLICANT_SECURITY_OWE ||
1971                         network->best_bss->security == G_SUPPLICANT_SECURITY_DPP)
1972                 return false;
1973
1974         if (network->best_bss->rsn_selected) {
1975                 const char *mode = g_supplicant_network_get_enc_mode(network);
1976                 if (g_strcmp0(mode, "aes") == 0 ||
1977                                 g_strcmp0(mode, "mixed") == 0)
1978                         return true;
1979                 else
1980                         return false;
1981         } else
1982                 return false;
1983 }
1984
1985 void *g_supplicant_network_get_wifi_vsie(GSupplicantNetwork *network)
1986 {
1987         GSList *vsie_list = NULL;
1988
1989         if (!network)
1990                 return NULL;
1991
1992         if (g_slist_length(network->vsie_list) > 0) {
1993                 GSList *list = NULL;
1994                 unsigned char *vsie = NULL;
1995                 for (list = network->vsie_list; list; list = list->next) {
1996                         unsigned char *ie = (unsigned char *)list->data;
1997                         if (ie == NULL)
1998                                 continue;
1999                         vsie = (unsigned char *)g_try_malloc0(ie[1]+2); // tag number size(1), tag length size(1)
2000
2001                         if (vsie) {
2002                                 memcpy(vsie, ie, ie[1]+2);
2003                                 vsie_list = g_slist_append(vsie_list, vsie);
2004                         } else
2005                                 SUPPLICANT_DBG("Failed to allocate memory");
2006                 }
2007         }
2008
2009         return vsie_list;
2010 }
2011
2012 static bool compare_bssid(unsigned char *bssid_a, unsigned char *bssid_b)
2013 {
2014         if (!memcmp(bssid_a, bssid_b, WIFI_BSSID_LEN_MAX))
2015                 return true;
2016
2017         return false;
2018 }
2019
2020 static gchar *convert_bssid_to_str(unsigned char *bssid)
2021 {
2022         GString *bssid_str;
2023         unsigned int i;
2024
2025         bssid_str = g_string_sized_new(18);
2026         if (!bssid_str)
2027                 return NULL;
2028
2029         for (i = 0; i < WIFI_BSSID_LEN_MAX; i++) {
2030                 g_string_append_printf(bssid_str, "%02x", bssid[i]);
2031                 if (i < WIFI_BSSID_LEN_MAX - 1)
2032                         g_string_append(bssid_str, ":");
2033         }
2034
2035         return g_string_free(bssid_str, FALSE);
2036 }
2037
2038 #if defined TIZEN_EXT_INS
2039 static void count_assoc_reject(gpointer data, gpointer user_data)
2040 {
2041         time_t assoc_reject_time = GPOINTER_TO_INT(data);
2042         struct assoc_count_data *assoc_count = user_data;
2043
2044         if (assoc_reject_time > assoc_count->ref_time)
2045                 assoc_count->assoc_count++;
2046 }
2047
2048 static uint16_t get_assoc_reject_cnt(GHashTable *assoc_reject_table, unsigned char *bssid)
2049 {
2050         gchar *bssid_str;
2051         struct assoc_reject_data *assoc_data;
2052         struct assoc_count_data assoc_count;
2053         time_t curr_time;
2054         struct tm* timeinfo;
2055
2056         if (g_hash_table_size(assoc_reject_table) < 1)
2057                 return 0;
2058
2059         if (!bssid)
2060                 return 0;
2061
2062         if (!memcmp(bssid, invalid_bssid, WIFI_BSSID_LEN_MAX))
2063                 return 0;
2064
2065         bssid_str = convert_bssid_to_str(bssid);
2066         if (!bssid_str)
2067                 return 0;
2068
2069         assoc_data = g_hash_table_lookup(assoc_reject_table, bssid_str);
2070         if (!assoc_data) {
2071                 g_free(bssid_str);
2072                 return 0;
2073         }
2074
2075         if (g_slist_length(assoc_data->reject_time_list) < 1) {
2076                 g_free(bssid_str);
2077                 return 0;
2078         }
2079
2080         /* Only events that occur within one hour are appened. */
2081         curr_time = time(NULL);
2082         timeinfo = localtime(&curr_time);
2083         timeinfo->tm_hour -= 1;
2084
2085         assoc_count.ref_time = mktime(timeinfo);
2086         assoc_count.assoc_count = 0;
2087
2088         g_slist_foreach(assoc_data->reject_time_list, count_assoc_reject, &assoc_count);
2089
2090         g_free(bssid_str);
2091         return assoc_count.assoc_count;
2092 }
2093
2094 static int calculate_score_last_connected_bssid(bool is_last_connected)
2095 {
2096         int score = 0;
2097
2098         if (ins_settings.last_connected_bssid) {
2099                 if (is_last_connected)
2100                         score += ins_settings.last_connected_bssid_score;
2101         }
2102
2103         return score;
2104 }
2105
2106 static int calculate_score_assoc_reject(uint16_t assoc_reject_cnt)
2107 {
2108         int score = 0;
2109
2110         if (ins_settings.assoc_reject)
2111                 score -= (assoc_reject_cnt * ins_settings.assoc_reject_score);
2112
2113         return score;
2114 }
2115
2116 static int calculate_score_frequency(dbus_int16_t strength, dbus_uint16_t frequency)
2117 {
2118         int score = 0;
2119
2120         switch (ins_settings.preferred_freq_bssid) {
2121         case G_SUPPLICANT_INS_PREFERRED_FREQ_24GHZ:
2122                 if ((frequency >= FREQ_RANGE_24GHZ_CHANNEL_1 &&
2123                         frequency <= FREQ_RANGE_24GHZ_CHANNEL_14) &&
2124                         (strength > ins_settings.signal_level3_24ghz))
2125                         score += ins_settings.preferred_freq_bssid_score;
2126
2127                 break;
2128         case G_SUPPLICANT_INS_PREFERRED_FREQ_5GHZ:
2129                 if ((frequency >= FREQ_RANGE_5GHZ_CHANNEL_32 &&
2130                         frequency <= FREQ_RANGE_5GHZ_CHANNEL_165) &&
2131                         (strength > ins_settings.signal_level3_5ghz))
2132                         score += ins_settings.preferred_freq_bssid_score;
2133
2134                 break;
2135         default:
2136                 break;
2137         }
2138
2139         return score;
2140 }
2141
2142 static int calculate_score_strength(dbus_int16_t strength)
2143 {
2144         int score = 0;
2145
2146         if (ins_settings.signal_bssid)
2147                 score += (((strength > -60) ? -60 : strength) + 85);
2148
2149         return score;
2150 }
2151
2152 static int calculate_score_est_throughput(dbus_uint32_t est_throughput)
2153 {
2154         int score = 0;
2155
2156         if (est_throughput >= 10000)
2157                 score = est_throughput / 10000;
2158
2159         if (score > 40)
2160                 score = 40;
2161
2162         return score;
2163 }
2164
2165 static int calculate_score(bool is_last_connected, uint16_t assoc_reject_cnt,
2166                 dbus_uint16_t frequency, dbus_int16_t strength,
2167                 dbus_int16_t snr, dbus_uint32_t est_throughput)
2168 {
2169         int score = 0;
2170
2171         score += calculate_score_last_connected_bssid(is_last_connected);
2172         score += calculate_score_assoc_reject(assoc_reject_cnt);
2173         score += calculate_score_frequency(strength, frequency);
2174         score += calculate_score_strength(strength);
2175         score += (int)snr;
2176         score += calculate_score_est_throughput(est_throughput);
2177
2178         return score;
2179 }
2180 #endif
2181
2182 static void update_bssid_list(gpointer key, gpointer value, gpointer user_data)
2183 {
2184         struct g_supplicant_bss *bss = value;
2185         struct g_connman_bssids *bssids = NULL;
2186         struct update_bssid_data *bssid_data = (struct update_bssid_data *)user_data;
2187
2188         bssids = (struct g_connman_bssids *)g_try_malloc0(sizeof(struct g_connman_bssids));
2189
2190         if (bssids) {
2191                 memcpy(bssids->bssid, bss->bssid, WIFI_BSSID_LEN_MAX);
2192
2193                 bssids->strength = bss->signal;
2194                 bssids->strength += 120;
2195
2196                 if (bssids->strength > 100)
2197                         bssids->strength = 100;
2198
2199                 bssids->frequency = bss->frequency;
2200                 bssids->score_snr = (int)bss->snr;
2201
2202 #if defined TIZEN_EXT_INS
2203                 bssids->assoc_reject_cnt = get_assoc_reject_cnt(bssid_data->assoc_reject_table, bssids->bssid);
2204                 bssids->is_last_connected = compare_bssid(bssids->bssid, bssid_data->last_connected_bssid);
2205
2206                 bssids->score_last_connected_bssid = calculate_score_last_connected_bssid(bssids->is_last_connected);
2207                 bssids->score_assoc_reject = calculate_score_assoc_reject(bssids->assoc_reject_cnt);
2208                 bssids->score_frequency = calculate_score_frequency(bss->signal, bssids->frequency);
2209                 bssids->score_strength = calculate_score_strength(bss->signal);
2210                 bssids->score_est_throughput = calculate_score_est_throughput(bss->est_throughput);
2211
2212                 bssids->ins_score = calculate_score(bssids->is_last_connected,
2213                         bssids->assoc_reject_cnt, bssids->frequency, bss->signal,
2214                         bss->snr, bss->est_throughput);
2215 #else
2216                 bssids->ins_score = bss->signal;
2217 #endif
2218                 bssid_data->bssid_list = g_slist_append(bssid_data->bssid_list, bssids);
2219         } else
2220                 SUPPLICANT_DBG("Failed to allocate memory");
2221 }
2222
2223 static gint cmp_bss(gconstpointer a, gconstpointer b)
2224 {
2225         struct g_connman_bssids *entry_a = (struct g_connman_bssids *)a;
2226         struct g_connman_bssids *entry_b = (struct g_connman_bssids *)b;
2227
2228         if (entry_a->ins_score > entry_b->ins_score)
2229                 return -1;
2230
2231         if (entry_a->ins_score < entry_b->ins_score)
2232                 return 1;
2233
2234         return 0;
2235 }
2236
2237 #if defined TIZEN_EXT_INS
2238 static void print_bssid_sort(gpointer data, gpointer user_data)
2239 {
2240         struct g_connman_bssids *bssids = data;
2241
2242         SUPPLICANT_DBG("bssid[" MACSTR "] total[%2d] freq[%2d] "
2243                         "last_conn[%2d] assoc_reject[%2d] strength[%2d]",
2244                         MAC2STR(bssids->bssid), bssids->ins_score,
2245                         bssids->score_frequency, bssids->score_last_connected_bssid,
2246                         bssids->score_assoc_reject, bssids->score_strength);
2247 }
2248 #endif
2249
2250 void *g_supplicant_network_get_bssid_list(GSupplicantNetwork *network)
2251 {
2252         struct update_bssid_data bssid_data;
2253
2254         if (g_hash_table_size(network->bss_table) < 1)
2255                 return NULL;
2256
2257         bssid_data.network = network;
2258         memset(&bssid_data, 0, sizeof(bssid_data));
2259         memcpy(bssid_data.last_connected_bssid, network->last_connected_bssid, WIFI_BSSID_LEN_MAX);
2260         bssid_data.assoc_reject_table = network->assoc_reject_table;
2261
2262         g_hash_table_foreach(network->bss_table, update_bssid_list, &bssid_data);
2263         bssid_data.bssid_list = g_slist_sort(bssid_data.bssid_list, cmp_bss);
2264 #if defined TIZEN_EXT_INS
2265         g_slist_foreach(bssid_data.bssid_list, print_bssid_sort, NULL);
2266 #endif
2267
2268         return bssid_data.bssid_list;
2269 }
2270
2271 void g_supplicant_network_set_last_connected_bssid(GSupplicantNetwork *network, const unsigned char *bssid)
2272 {
2273         if (!bssid)
2274                 return;
2275
2276         if (!memcmp(bssid, invalid_bssid, WIFI_BSSID_LEN_MAX))
2277                 return;
2278
2279         memcpy(network->last_connected_bssid, bssid, WIFI_BSSID_LEN_MAX);
2280
2281         SUPPLICANT_DBG("last connected bssid [" MACSTR "]", MAC2STR(bssid));
2282 }
2283
2284 const unsigned char *g_supplicant_network_get_last_connected_bssid(GSupplicantNetwork *network)
2285 {
2286         if (network == NULL)
2287                 return NULL;
2288
2289         return (const unsigned char *)network->last_connected_bssid;
2290 }
2291
2292 void g_supplicant_network_update_assoc_reject(GSupplicantInterface *interface,
2293                 GSupplicantNetwork *network)
2294 {
2295         struct assoc_reject_data *assoc_data;
2296         gchar *bssid_str;
2297         time_t curr_time;
2298
2299         if (!network)
2300                 return;
2301
2302         bssid_str = convert_bssid_to_str(interface->add_network_bssid);
2303         if (!bssid_str)
2304                 return;
2305
2306         assoc_data = g_hash_table_lookup(network->assoc_reject_table, bssid_str);
2307         if (!assoc_data) {
2308                 assoc_data = g_try_new0(struct assoc_reject_data, 1);
2309                 if (!assoc_data) {
2310                         g_free(bssid_str);
2311                         return;
2312                 }
2313
2314                 assoc_data->bssid = g_strdup(bssid_str);
2315                 g_hash_table_insert(network->assoc_reject_table, assoc_data->bssid, assoc_data);
2316         }
2317
2318         curr_time = time(NULL);
2319         assoc_data->reject_time_list = g_slist_append(assoc_data->reject_time_list, GINT_TO_POINTER(curr_time));
2320
2321         SUPPLICANT_DBG("bssid [%s] time [%u]", bssid_str, curr_time);
2322
2323         g_free(bssid_str);
2324
2325         callback_network_changed(network, "UpdateAssocReject");
2326 }
2327
2328 GHashTable *g_supplicant_network_get_assoc_reject_table(GSupplicantNetwork *network)
2329 {
2330         if (!network)
2331                 return NULL;
2332
2333         return network->assoc_reject_table;
2334 }
2335
2336 GSupplicantNetwork *g_supplicant_interface_get_network(GSupplicantInterface *interface,
2337                 const char *group)
2338 {
2339         if (!interface)
2340                 return NULL;
2341
2342         return g_hash_table_lookup(interface->network_table, group);
2343 }
2344
2345 static void copy_assoc_reject(gpointer key, gpointer value, gpointer user_data)
2346 {
2347         struct assoc_reject_data *cloned_assoc_data;
2348         struct assoc_reject_data *assoc_data = value;
2349         GHashTable *cloned_assoc_reject_table = user_data;
2350
2351         if (assoc_data && cloned_assoc_reject_table) {
2352                 cloned_assoc_data = g_try_new0(struct assoc_reject_data, 1);
2353                 if (!cloned_assoc_data)
2354                         return;
2355
2356                 cloned_assoc_data->bssid = g_strdup(assoc_data->bssid);
2357                 cloned_assoc_data->reject_time_list = g_slist_copy(assoc_data->reject_time_list);
2358                 g_hash_table_insert(cloned_assoc_reject_table,
2359                                         cloned_assoc_data->bssid, cloned_assoc_data);
2360         }
2361 }
2362
2363 GHashTable *g_supplicant_network_clone_assoc_reject_table(GSupplicantNetwork *network)
2364 {
2365         GHashTable *cloned_assoc_reject_table;
2366
2367         if (!network)
2368                 return NULL;
2369
2370         GHashTable *assoc_reject_table = g_supplicant_network_get_assoc_reject_table(network);
2371         if (!assoc_reject_table)
2372                 return NULL;
2373
2374         cloned_assoc_reject_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2375                                                                 NULL, remove_assoc_data);
2376         g_hash_table_foreach(assoc_reject_table, copy_assoc_reject, cloned_assoc_reject_table);
2377
2378         return cloned_assoc_reject_table;
2379 }
2380
2381 #endif
2382
2383 static void merge_network(GSupplicantNetwork *network)
2384 {
2385         GString *str;
2386         const char *ssid, *mode, *key_mgmt;
2387 #if defined TIZEN_EXT
2388         const char *isHS20AP;
2389         const char *eap, *identity, *phase2;
2390 #endif
2391         unsigned int i, ssid_len;
2392         char *group;
2393
2394         ssid = g_hash_table_lookup(network->config_table, "ssid");
2395         mode = g_hash_table_lookup(network->config_table, "mode");
2396         key_mgmt = g_hash_table_lookup(network->config_table, "key_mgmt");
2397 #if defined TIZEN_EXT
2398         isHS20AP = g_hash_table_lookup(network->config_table, "isHS20AP");
2399         eap = g_hash_table_lookup(network->config_table, "eap");
2400         identity = g_hash_table_lookup(network->config_table, "identity");
2401         phase2 = g_hash_table_lookup(network->config_table, "phase2");
2402 #endif
2403
2404         SUPPLICANT_DBG("ssid %s mode %s", ssid, mode);
2405
2406         if (ssid)
2407                 ssid_len = strlen(ssid);
2408         else
2409                 ssid_len = 0;
2410
2411         str = g_string_sized_new((ssid_len * 2) + 24);
2412         if (!str)
2413                 return;
2414
2415         for (i = 0; i < ssid_len; i++)
2416 #if defined TIZEN_EXT
2417         {
2418                 if (ssid[i] != '"')
2419 #endif
2420                 g_string_append_printf(str, "%02x", ssid[i]);
2421 #if defined TIZEN_EXT
2422         }
2423 #endif
2424
2425         if (g_strcmp0(mode, "0") == 0)
2426                 g_string_append_printf(str, "_managed");
2427         else if (g_strcmp0(mode, "1") == 0)
2428                 g_string_append_printf(str, "_adhoc");
2429 #if defined TIZEN_EXT_WIFI_MESH
2430         else if (g_strcmp0(mode, "5") == 0)
2431                 g_string_append_printf(str, "_mesh");
2432 #endif
2433
2434         if (g_strcmp0(key_mgmt, "WPA-PSK") == 0)
2435                 g_string_append_printf(str, "_psk");
2436 #if defined TIZEN_EXT
2437         else if (g_strcmp0(key_mgmt, "WPA-EAP") == 0)
2438                 g_string_append_printf(str, "_ieee8021x");
2439         else
2440                 g_string_append_printf(str, "_none");
2441 #endif
2442
2443         group = g_string_free(str, FALSE);
2444
2445         SUPPLICANT_DBG("%s", group);
2446
2447 #if defined TIZEN_EXT
2448         if (g_strcmp0(isHS20AP, "1") == 0) {
2449                 network->isHS20AP = 1;
2450                 if (network->eap)
2451                         g_free(network->eap);
2452                 network->eap = g_strdup(eap);
2453
2454                 if (network->identity)
2455                         g_free(network->identity);
2456                 network->identity = g_strdup(identity);
2457
2458                 if (network->phase2)
2459                         g_free(network->phase2);
2460                 network->phase2 = g_strdup(phase2);
2461         } else
2462                 network->isHS20AP = 0;
2463
2464         network->group = g_strdup(group);
2465         callback_network_merged(network);
2466         g_free(network->group);
2467 #endif
2468
2469         g_free(group);
2470
2471         g_hash_table_destroy(network->config_table);
2472
2473         g_free(network->path);
2474         g_free(network);
2475 }
2476
2477 static void network_property(const char *key, DBusMessageIter *iter,
2478                                                         void *user_data)
2479 {
2480         GSupplicantNetwork *network = user_data;
2481
2482         if (!network->interface)
2483                 return;
2484
2485         if (!key) {
2486                 merge_network(network);
2487                 return;
2488         }
2489
2490         if (g_strcmp0(key, "Enabled") == 0) {
2491                 dbus_bool_t enabled = FALSE;
2492
2493                 dbus_message_iter_get_basic(iter, &enabled);
2494         } else if (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_STRING) {
2495                 const char *str = NULL;
2496
2497                 dbus_message_iter_get_basic(iter, &str);
2498                 if (str) {
2499                         g_hash_table_replace(network->config_table,
2500                                                 g_strdup(key), g_strdup(str));
2501                 }
2502         } else
2503                 SUPPLICANT_DBG("key %s type %c",
2504                                 key, dbus_message_iter_get_arg_type(iter));
2505 }
2506
2507 static void interface_network_added(DBusMessageIter *iter, void *user_data)
2508 {
2509         GSupplicantInterface *interface = user_data;
2510         GSupplicantNetwork *network;
2511         const char *path = NULL;
2512
2513         SUPPLICANT_DBG("");
2514
2515         dbus_message_iter_get_basic(iter, &path);
2516         if (!path)
2517                 return;
2518
2519         if (g_strcmp0(path, "/") == 0)
2520                 return;
2521
2522         network = g_try_new0(GSupplicantNetwork, 1);
2523         if (!network)
2524                 return;
2525
2526         network->interface = interface;
2527         network->path = g_strdup(path);
2528
2529         network->config_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2530                                                         g_free, g_free);
2531
2532         dbus_message_iter_next(iter);
2533         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
2534                 supplicant_dbus_property_foreach(iter, network_property,
2535                                                                 network);
2536                 network_property(NULL, NULL, network);
2537                 return;
2538         }
2539
2540         supplicant_dbus_property_get_all(path,
2541                                 SUPPLICANT_INTERFACE ".Network",
2542                                         network_property, network, NULL);
2543 }
2544
2545 static void interface_network_removed(DBusMessageIter *iter, void *user_data)
2546 {
2547         SUPPLICANT_DBG("");
2548 }
2549
2550 static char *create_name(unsigned char *ssid, int ssid_len)
2551 {
2552         GString *string;
2553         const gchar *remainder, *invalid;
2554         int valid_bytes, remaining_bytes;
2555
2556         if (ssid_len < 1 || ssid[0] == '\0')
2557                 return g_strdup("");
2558
2559         string = NULL;
2560         remainder = (const gchar *)ssid;
2561         remaining_bytes = ssid_len;
2562
2563         while (remaining_bytes != 0) {
2564                 if (g_utf8_validate(remainder, remaining_bytes,
2565                                         &invalid)) {
2566                         break;
2567                 }
2568
2569                 valid_bytes = invalid - remainder;
2570
2571                 if (!string)
2572                         string = g_string_sized_new(remaining_bytes);
2573
2574                 g_string_append_len(string, remainder, valid_bytes);
2575
2576                 /* append U+FFFD REPLACEMENT CHARACTER */
2577                 g_string_append(string, "\357\277\275");
2578
2579                 remaining_bytes -= valid_bytes + 1;
2580                 remainder = invalid + 1;
2581         }
2582
2583         if (!string)
2584                 return g_strndup((const gchar *)ssid, ssid_len + 1);
2585
2586         g_string_append(string, remainder);
2587
2588         return g_string_free(string, FALSE);
2589 }
2590
2591 static char *create_group(struct g_supplicant_bss *bss)
2592 {
2593         GString *str;
2594         unsigned int i;
2595         const char *mode, *security;
2596
2597         str = g_string_sized_new((bss->ssid_len * 2) + 24);
2598         if (!str)
2599                 return NULL;
2600
2601         if (bss->ssid_len > 0 && bss->ssid[0] != '\0') {
2602                 for (i = 0; i < bss->ssid_len; i++)
2603                         g_string_append_printf(str, "%02x", bss->ssid[i]);
2604         } else
2605                 g_string_append_printf(str, "hidden");
2606
2607         mode = mode2string(bss->mode);
2608         if (mode)
2609                 g_string_append_printf(str, "_%s", mode);
2610
2611         security = security2string(bss->security);
2612         if (security)
2613                 g_string_append_printf(str, "_%s", security);
2614
2615         return g_string_free(str, FALSE);
2616 }
2617 #if defined TIZEN_EXT
2618 static void update_network_with_best_bss(GSupplicantNetwork *network,
2619                 struct g_supplicant_bss *best_bss)
2620 {
2621         /*
2622          * Do not change best BSS if we are connected.
2623          */
2624         if (network->interface->state == G_SUPPLICANT_STATE_COMPLETED)
2625                 return;
2626
2627         network->signal = best_bss->signal;
2628         network->frequency = best_bss->frequency;
2629         network->best_bss = best_bss;
2630 }
2631
2632 static bool update_best_bss(GSupplicantNetwork *network,
2633                 struct g_supplicant_bss *bss, struct g_supplicant_bss *best_bss)
2634 {
2635         int score_new;
2636         int score_best;
2637
2638         if (network->best_bss == NULL) {
2639                 update_network_with_best_bss(network, bss);
2640                 return true;
2641         }
2642
2643 #if defined TIZEN_EXT_INS
2644         score_new = calculate_score(
2645                 compare_bssid(bss->bssid, network->last_connected_bssid),
2646                 get_assoc_reject_cnt(network->assoc_reject_table, bss->bssid),
2647                 bss->frequency, bss->signal, bss->snr, bss->est_throughput);
2648
2649         score_best = calculate_score(
2650                 compare_bssid(network->best_bss->bssid, network->last_connected_bssid),
2651                 get_assoc_reject_cnt(network->assoc_reject_table, network->best_bss->bssid),
2652                 network->best_bss->frequency, network->best_bss->signal,
2653                 network->best_bss->snr, network->best_bss->est_throughput);
2654 #else
2655         score_new = bss->signal;
2656         score_best = network->best_bss->signal;
2657 #endif
2658
2659         if (score_new > score_best) {
2660                 SUPPLICANT_DBG("new[" MACSTR "][%d] : best[" MACSTR "][%d]",
2661                         MAC2STR(bss->bssid), score_new,
2662                         MAC2STR(network->best_bss->bssid), score_best);
2663
2664                 update_network_with_best_bss(network, bss);
2665
2666                 SUPPLICANT_DBG("Update best BSS for %s", network->name);
2667
2668                 return true;
2669         }
2670
2671         return false;
2672 }
2673 #endif
2674 static int add_or_replace_bss_to_network(struct g_supplicant_bss *bss)
2675 {
2676         GSupplicantInterface *interface = bss->interface;
2677         GSupplicantNetwork *network;
2678         char *group;
2679         bool is_new_network;
2680
2681         group = create_group(bss);
2682         SUPPLICANT_DBG("New group created: %s", group);
2683
2684         if (!group)
2685                 return -ENOMEM;
2686
2687         network = g_hash_table_lookup(interface->network_table, group);
2688         if (network) {
2689                 g_free(group);
2690                 SUPPLICANT_DBG("Network %s already exist", network->name);
2691                 is_new_network = false;
2692
2693                 goto done;
2694         }
2695
2696         is_new_network = true;
2697
2698         network = g_try_new0(GSupplicantNetwork, 1);
2699         if (!network) {
2700                 g_free(group);
2701                 return -ENOMEM;
2702         }
2703
2704         network->interface = interface;
2705         if (!network->path)
2706                 network->path = g_strdup(bss->path);
2707         network->group = group;
2708         network->name = create_name(bss->ssid, bss->ssid_len);
2709         network->mode = bss->mode;
2710         network->security = bss->security;
2711         network->ssid_len = bss->ssid_len;
2712         memcpy(network->ssid, bss->ssid, bss->ssid_len);
2713         network->signal = bss->signal;
2714         network->frequency = bss->frequency;
2715         network->best_bss = bss;
2716
2717         if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
2718                 network->wps = TRUE;
2719                 network->wps_capabilities = bss->wps_capabilities;
2720         }
2721
2722 #if defined TIZEN_EXT
2723         network->owe_transition_mode = bss->owe_transition_mode;
2724         network->privacy = bss->privacy;
2725         memcpy(network->transition_mode_ssid, bss->transition_mode_ssid, bss->transition_mode_ssid_len);
2726         memcpy(network->transition_mode_bssid, bss->transition_mode_bssid, WIFI_BSSID_LEN_MAX);
2727
2728         network->keymgmt = bss->keymgmt;
2729
2730         if (g_slist_length(bss->vsie_list) > 0) {
2731                 GSList *list = NULL;
2732                 unsigned char *vsie = NULL;
2733                 for (list = bss->vsie_list; list; list = list->next) {
2734                         unsigned char *ie = (unsigned char *)list->data;
2735                         vsie = (unsigned char *)g_try_malloc0(ie[1]+2); // tag number size(1), tag length size(1)
2736
2737                         if (vsie) {
2738                                 memcpy(vsie, ie, ie[1]+2);
2739                                 network->vsie_list = g_slist_append(network->vsie_list, vsie);
2740                         } else
2741                                 SUPPLICANT_DBG("Failed to allocate memory.");
2742                 }
2743         }
2744
2745         network->isHS20AP = bss->hs20;
2746         memcpy(network->country_code, bss->country_code, COUNTRY_CODE_LENGTH);
2747         network->phy_mode = bss->phy_mode;
2748 #endif
2749
2750         SUPPLICANT_DBG("New network %s created", network->name);
2751
2752         network->bss_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2753                                                         NULL, remove_bss);
2754
2755         network->config_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2756                                                         g_free, g_free);
2757
2758 #if defined TIZEN_EXT
2759         network->assoc_reject_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2760                                                         NULL, remove_assoc_data);
2761 #endif
2762
2763         g_hash_table_replace(interface->network_table,
2764                                                 network->group, network);
2765
2766         callback_network_added(network);
2767
2768 done:
2769         /* We update network's WPS properties if only bss provides WPS. */
2770         if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
2771                 network->wps = TRUE;
2772                 network->wps_capabilities = bss->wps_capabilities;
2773
2774                 if (!is_new_network)
2775                         callback_network_changed(network, "WPSCapabilities");
2776         }
2777
2778         /*
2779          * Do not change best BSS if we are connected. It will be done through
2780          * CurrentBSS property in case of misalignment with wpa_s or roaming.
2781          */
2782 #if defined TIZEN_EXT
2783         if (network != interface->current_network) {
2784                 if (update_best_bss(network, bss, network->best_bss))
2785                         callback_network_changed(network, "Signal");
2786         }
2787 #else
2788         if (network != interface->current_network &&
2789                                 bss->signal > network->signal) {
2790                 network->signal = bss->signal;
2791                 network->best_bss = bss;
2792                 callback_network_changed(network, "Signal");
2793         }
2794 #endif
2795
2796         g_hash_table_replace(interface->bss_mapping, bss->path, network);
2797         g_hash_table_replace(network->bss_table, bss->path, bss);
2798
2799         g_hash_table_replace(bss_mapping, bss->path, interface);
2800
2801         return 0;
2802 }
2803
2804 static void bss_rates(DBusMessageIter *iter, void *user_data)
2805 {
2806         struct g_supplicant_bss *bss = user_data;
2807         dbus_uint32_t rate = 0;
2808
2809         dbus_message_iter_get_basic(iter, &rate);
2810         if (rate == 0)
2811                 return;
2812
2813         if (rate > bss->maxrate)
2814                 bss->maxrate = rate;
2815 }
2816
2817 static void bss_keymgmt(DBusMessageIter *iter, void *user_data)
2818 {
2819         unsigned int *keymgmt = user_data;
2820         const char *str = NULL;
2821         int i;
2822
2823         dbus_message_iter_get_basic(iter, &str);
2824         if (!str)
2825                 return;
2826
2827         for (i = 0; keymgmt_map[i].str; i++)
2828                 if (strcmp(str, keymgmt_map[i].str) == 0) {
2829                         SUPPLICANT_DBG("Keymgmt: %s", str);
2830                         *keymgmt |= keymgmt_map[i].val;
2831                         break;
2832                 }
2833 }
2834
2835 static void bss_group(DBusMessageIter *iter, void *user_data)
2836 {
2837         unsigned int *group = user_data;
2838         const char *str = NULL;
2839         int i;
2840
2841         dbus_message_iter_get_basic(iter, &str);
2842         if (!str)
2843                 return;
2844
2845         for (i = 0; group_map[i].str; i++)
2846                 if (strcmp(str, group_map[i].str) == 0) {
2847                         SUPPLICANT_DBG("Group: %s", str);
2848                         *group |= group_map[i].val;
2849                         break;
2850                 }
2851 }
2852
2853 static void bss_pairwise(DBusMessageIter *iter, void *user_data)
2854 {
2855         unsigned int *pairwise = user_data;
2856         const char *str = NULL;
2857         int i;
2858
2859         dbus_message_iter_get_basic(iter, &str);
2860         if (!str)
2861                 return;
2862
2863         for (i = 0; pairwise_map[i].str; i++)
2864                 if (strcmp(str, pairwise_map[i].str) == 0) {
2865                         SUPPLICANT_DBG("Pairwise: %s", str);
2866                         *pairwise |= pairwise_map[i].val;
2867                         break;
2868                 }
2869 }
2870
2871 static void bss_wpa(const char *key, DBusMessageIter *iter,
2872                         void *user_data)
2873 {
2874         struct g_supplicant_bss *bss = user_data;
2875         unsigned int value = 0;
2876
2877         SUPPLICANT_DBG("Key: %s", key);
2878
2879         if (g_strcmp0(key, "KeyMgmt") == 0) {
2880                 supplicant_dbus_array_foreach(iter, bss_keymgmt, &value);
2881
2882                 if (bss->rsn_selected)
2883                         bss->rsn_keymgmt = value;
2884                 else
2885                         bss->wpa_keymgmt = value;
2886         } else if (g_strcmp0(key, "Group") == 0) {
2887                 supplicant_dbus_array_foreach(iter, bss_group, &value);
2888
2889                 if (bss->rsn_selected)
2890                         bss->rsn_group = value;
2891                 else
2892                         bss->wpa_group = value;
2893         } else if (g_strcmp0(key, "Pairwise") == 0) {
2894                 supplicant_dbus_array_foreach(iter, bss_pairwise, &value);
2895
2896                 if (bss->rsn_selected)
2897                         bss->rsn_pairwise = value;
2898                 else
2899                         bss->wpa_pairwise = value;
2900         }
2901 }
2902
2903 static unsigned int get_tlv(unsigned char *ie, unsigned int ie_size,
2904                                                         unsigned int type)
2905 {
2906         unsigned int len = 0;
2907
2908         while (len + 4 < ie_size) {
2909                 unsigned int hi = ie[len];
2910                 unsigned int lo = ie[len + 1];
2911                 unsigned int tmp_type = (hi << 8) + lo;
2912                 unsigned int v_len = 0;
2913
2914                 /* hi and lo are used to recreate an unsigned int
2915                  * based on 2 8bits length unsigned int. */
2916
2917                 hi = ie[len + 2];
2918                 lo = ie[len + 3];
2919                 v_len = (hi << 8) + lo;
2920
2921                 if (tmp_type == type) {
2922                         unsigned int ret_value = 0;
2923                         unsigned char *value = (unsigned char *)&ret_value;
2924
2925                         SUPPLICANT_DBG("IE: match type 0x%x", type);
2926
2927                         /* Verifying length relevance */
2928                         if (v_len > sizeof(unsigned int) ||
2929                                 len + 4 + v_len > ie_size)
2930                                 break;
2931
2932                         memcpy(value, ie + len + 4, v_len);
2933
2934                         SUPPLICANT_DBG("returning 0x%x", ret_value);
2935                         return ret_value;
2936                 }
2937
2938                 len += v_len + 4;
2939         }
2940
2941         SUPPLICANT_DBG("returning 0");
2942         return 0;
2943 }
2944
2945 #if defined TIZEN_EXT
2946 static void get_bss_phy_mode(unsigned int max_rate,
2947                 unsigned int max_ext_rate, bool ht, bool vht, void *data)
2948 {
2949         struct g_supplicant_bss *bss = data;
2950         unsigned int freq = bss->frequency;
2951
2952         /* Following conditions are used to determine
2953          * IEEE 802.11 Protocol Modes:-
2954          *
2955          * 1. If “Supported rates” is only till 11 Mbps,
2956          *    and frequency is in 2.4GHz band, then protocol is 11B.
2957          * 2. If “Supported rates” is till 54Mbps or
2958          *    “Extended supported rates” are present,
2959          *    and frequency is in 2.4GHz band, then protocol is 11G.
2960          * 3. If “Supported rates” is only till 54 Mbps,
2961          *    frequency is in 5GHz band , then protocol is 11A.
2962          * 4. If “HT capabilities” is supported , then protocol is 11N.
2963          * 5. If “HT capabilities” & “VHT” is supported and
2964          *    frequency is in 5 GHz band, then protocol is 11AC.
2965          * */
2966
2967         if (freq >= 2412 && freq <= 2484) { /* 2.4 Ghz Band */
2968                 if (max_rate <= 11 && max_ext_rate <= 0 && !ht)
2969                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211B;
2970                 else if ((max_rate <= 54 || max_ext_rate > 0) && !ht)
2971                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211BG;
2972                 else if ((max_rate >= 54 || max_ext_rate > 0) && ht)
2973                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211BGN;
2974                 else
2975                         bss->phy_mode = G_SUPPLICANT_MODE_UNKNOWN;
2976         } else if (freq >= 5180 && freq <= 5825) { /* 5 Ghz Band */
2977                 if (max_rate <= 54 && !ht)
2978                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211A;
2979                 else if ((max_rate >= 54 || max_ext_rate > 0) && ht && !vht)
2980                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211AN;
2981                 else if ((max_rate >= 54 || max_ext_rate > 0) && ht && vht)
2982                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211ANAC;
2983                 else
2984                         bss->phy_mode = G_SUPPLICANT_MODE_UNKNOWN;
2985         }
2986 }
2987 #endif
2988
2989 static void bss_process_ies(DBusMessageIter *iter, void *user_data)
2990 {
2991         struct g_supplicant_bss *bss = user_data;
2992         const unsigned char WPS_OUI[] = { 0x00, 0x50, 0xf2, 0x04 };
2993         unsigned char *ie, *ie_end;
2994         DBusMessageIter array;
2995         unsigned int value;
2996         int ie_len;
2997 #if defined TIZEN_EXT
2998         const unsigned char OWE_WFA_OUI[] = { 0x50, 0x6f, 0x9a, 0x1c };
2999         int r_len, j;
3000         unsigned char *rates = NULL;
3001         unsigned char *ext_rates = NULL;
3002         unsigned int max_rate = 0;
3003         unsigned int max_ext_rate = 0;
3004         unsigned int offset = 0;
3005         bool ht = false;
3006         bool vht = false;
3007 #endif
3008
3009 #define WMM_WPA1_WPS_INFO 221
3010 #define WPS_INFO_MIN_LEN  6
3011 #define WPS_VERSION_TLV   0x104A
3012 #define WPS_STATE_TLV     0x1044
3013 #define WPS_METHODS_TLV   0x1012
3014 #define WPS_REGISTRAR_TLV 0x1041
3015 #define WPS_VERSION       0x10
3016 #define WPS_PBC           0x04
3017 #define WPS_PIN           0x00
3018 #define WPS_CONFIGURED    0x02
3019 #if defined TIZEN_EXT
3020 #define VENDOR_SPECIFIC_INFO 0xDD
3021 #define WLAN_EID_COUNTRY 7
3022 #define WLAN_EID_RSN_INFO 48
3023 #define RSN_CAPABILITY_MFP_REQ (1 << 6)
3024 #endif
3025
3026         dbus_message_iter_recurse(iter, &array);
3027         dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
3028
3029         if (!ie || ie_len < 2)
3030                 return;
3031
3032         bss->wps_capabilities = 0;
3033         bss->keymgmt = 0;
3034
3035         for (ie_end = ie + ie_len; ie < ie_end && ie + ie[1] + 1 <= ie_end;
3036                                                         ie += ie[1] + 2) {
3037 #if defined TIZEN_EXT
3038                 unsigned char *vsie;
3039                 int vsie_len = 0;
3040
3041                 if (ie[0] == VENDOR_SPECIFIC_INFO && memcmp(ie+2, OWE_WFA_OUI, sizeof(OWE_WFA_OUI)) == 0) {
3042                         SUPPLICANT_DBG("IE: match vendor specific data : OWE Transition Mode");
3043
3044 /*
3045                 Tag: Vendor Specific: Wi-Fi Alliance: OWE Transition Mode
3046                         Tag Number: Vendor Specific (221)    -> ie[0]
3047                         Tag length: 26                       -> ie[1]
3048                         OUI: 50:6f:9a (Wi-Fi Alliance)       -> ie[2]
3049                         Vendor Specific OUI Type: 28         -> ie[5]
3050                         BSSID: 92:fd:f0:20:2b:09             -> ie[6]
3051                         SSID length: 15                      -> ie[12]
3052                         SSID: Wi-Fi-5.2.3-owe                -> ie[13]
3053
3054 0000   dd 1a 50 6f 9a 1c 92 fd f0 20 2b 09 0f 57 69 2d   ..Po..... +..Wi-
3055 0010   46 69 2d 35 2e 32 2e 33 2d 6f 77 65               Fi-5.2.3-owe
3056
3057 */
3058                         bss->owe_transition_mode = TRUE;
3059                         if (ie[1] >= 11) { // Tag length is at least up to ssid length position.
3060                                 memcpy(bss->transition_mode_bssid, ie+6, WIFI_BSSID_LEN_MAX);
3061                                 if (ie[12] > 0 && ie[12] < 32) {
3062                                         memcpy(bss->transition_mode_ssid, ie+13, ie[12]);
3063                                         bss->transition_mode_ssid_len = ie[12];
3064                                 } else
3065                                         bss->transition_mode_ssid_len = 0;
3066                         } else
3067                                 bss->owe_transition_mode = FALSE;
3068                         continue;
3069                 }
3070
3071                 if (ie[0] == VENDOR_SPECIFIC_INFO && memcmp(ie+2, WPS_OUI, sizeof(WPS_OUI)) != 0) {
3072
3073                         if (!simplified_log)
3074                                 SUPPLICANT_DBG("IE: match vendor specific data");
3075
3076                         vsie_len = ie[1]+2;     // tag number size(1), tag length size(1)
3077                         vsie = (unsigned char *)g_try_malloc0(vsie_len);
3078
3079                         if (vsie) {
3080                                 memcpy(vsie, ie, vsie_len);
3081                                 bss->vsie_list = g_slist_append(bss->vsie_list, vsie);
3082                         } else
3083                                 SUPPLICANT_DBG("Failed to allocate memory");
3084                         continue;
3085                 }
3086
3087                 if (ie[0] == WLAN_EID_COUNTRY && ie[1] >= 2) {
3088                         /* Add country code only if it is a valid alphabet */
3089                         if (ie[2] >= 65 && ie[2] <= 90 && ie[3] >= 65 && ie[3] <= 90) {
3090                                 memcpy(bss->country_code, ie+2, COUNTRY_CODE_LENGTH);
3091                                 continue;
3092                         }
3093                 }
3094
3095                 if (ie[0] == WLAN_EID_HT_CAP && ie[1]) {
3096                         ht = true;
3097                         continue;
3098                 }
3099
3100                 if (ie[0] == WLAN_EID_VHT_CAP && ie[1]) {
3101                         vht = true;
3102                         continue;
3103                 }
3104
3105                 if (ie[0] == WLAN_EID_SUPP_RATES && ie[1]) {
3106                         r_len = ie[1];
3107                         rates = g_malloc0(r_len);
3108                         if (!rates)
3109                                 continue;
3110
3111                         for (j = 0; ie && j < r_len; j++) {
3112                                 rates[j] = ((ie[j + 2] & 0x7f) * 500000)/1000000;
3113                                 if (max_rate < rates[j])
3114                                         max_rate = rates[j];
3115                         }
3116                         continue;
3117                 }
3118
3119                 if (ie[0] == WLAN_EID_EXT_SUPP_RATES && ie[1] > 0) {
3120                         r_len = ie[1];
3121                         ext_rates = g_malloc0(r_len);
3122                         if (!ext_rates)
3123                                 continue;
3124
3125                         for (j = 0; ie && j < r_len; j++) {
3126                                 ext_rates[j] = ((ie[j + 2] & 0x7f) * 500000)/1000000;
3127                                 if (max_ext_rate < ext_rates[j])
3128                                         max_ext_rate = ext_rates[j];
3129                         }
3130                         continue;
3131                 }
3132
3133                 if (ie[0] == WLAN_EID_RSN_INFO && ie[1] >= 20) {
3134                         r_len = ie[1];
3135                         offset = 10 + ie[8] * 4;
3136                         offset += ie[offset] * 4 + 2;
3137
3138                         if (offset <= r_len + 1 &&
3139                                         (ie[offset] & RSN_CAPABILITY_MFP_REQ) != 0)
3140                                 bss->pmf_required = TRUE;
3141
3142                         continue;
3143                 }
3144 #endif
3145                 if (ie[0] != WMM_WPA1_WPS_INFO || ie[1] < WPS_INFO_MIN_LEN ||
3146                         memcmp(ie+2, WPS_OUI, sizeof(WPS_OUI)) != 0)
3147                         continue;
3148
3149                 SUPPLICANT_DBG("IE: match WPS_OUI");
3150
3151                 value = get_tlv(&ie[6], ie[1], WPS_STATE_TLV);
3152                 if (get_tlv(&ie[6], ie[1], WPS_VERSION_TLV) == WPS_VERSION &&
3153                                                                 value != 0) {
3154                         bss->keymgmt |= G_SUPPLICANT_KEYMGMT_WPS;
3155
3156                         if (value == WPS_CONFIGURED)
3157                                 bss->wps_capabilities |=
3158                                         G_SUPPLICANT_WPS_CONFIGURED;
3159                 }
3160
3161                 value = get_tlv(&ie[6], ie[1], WPS_METHODS_TLV);
3162                 if (value != 0) {
3163                         if (GUINT16_FROM_BE(value) == WPS_PBC)
3164                                 bss->wps_capabilities |= G_SUPPLICANT_WPS_PBC;
3165                         if (GUINT16_FROM_BE(value) == WPS_PIN)
3166                                 bss->wps_capabilities |= G_SUPPLICANT_WPS_PIN;
3167                 } else
3168                         bss->wps_capabilities |=
3169                                 G_SUPPLICANT_WPS_PBC | G_SUPPLICANT_WPS_PIN;
3170
3171                 /* If the AP sends this it means it's advertizing
3172                  * as a registrar and the WPS process is launched
3173                  * on its side */
3174                 if (get_tlv(&ie[6], ie[1], WPS_REGISTRAR_TLV) != 0)
3175                         bss->wps_capabilities |= G_SUPPLICANT_WPS_REGISTRAR;
3176
3177                 SUPPLICANT_DBG("WPS Methods 0x%x", bss->wps_capabilities);
3178         }
3179 #ifdef TIZEN_EXT
3180         get_bss_phy_mode(max_rate, max_ext_rate, ht, vht, user_data);
3181         if (rates)
3182                 g_free(rates);
3183         if (ext_rates)
3184                 g_free(ext_rates);
3185 #endif
3186 }
3187
3188 static void bss_compute_security(struct g_supplicant_bss *bss)
3189 {
3190         /*
3191          * Combining RSN and WPA keymgmt
3192          * We combine it since parsing IEs might have set something for WPS. */
3193         bss->keymgmt |= bss->rsn_keymgmt | bss->wpa_keymgmt;
3194
3195         bss->ieee8021x = FALSE;
3196         bss->psk = FALSE;
3197 #if defined TIZEN_EXT
3198         bss->ft_ieee8021x = FALSE;
3199         bss->ft_psk = FALSE;
3200 #endif
3201
3202 #if defined TIZEN_EXT
3203         if (bss->keymgmt &
3204                         (G_SUPPLICANT_KEYMGMT_WPA_EAP |
3205                                         G_SUPPLICANT_KEYMGMT_WPA_EAP_256))
3206                 bss->ieee8021x = TRUE;
3207         else if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_EAP)
3208                 bss->ft_ieee8021x = TRUE;
3209 #else
3210         if (bss->keymgmt &
3211                         (G_SUPPLICANT_KEYMGMT_WPA_EAP |
3212                                 G_SUPPLICANT_KEYMGMT_WPA_FT_EAP |
3213                                 G_SUPPLICANT_KEYMGMT_WPA_EAP_256))
3214                 bss->ieee8021x = TRUE;
3215 #endif
3216
3217 #if defined TIZEN_EXT
3218         if (bss->keymgmt &
3219                         (G_SUPPLICANT_KEYMGMT_WPA_PSK |
3220                                         G_SUPPLICANT_KEYMGMT_WPA_PSK_256))
3221                 bss->psk = TRUE;
3222         else if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_PSK)
3223                 bss->ft_psk = TRUE;
3224 #else
3225         if (bss->keymgmt &
3226                         (G_SUPPLICANT_KEYMGMT_WPA_PSK |
3227                                 G_SUPPLICANT_KEYMGMT_WPA_FT_PSK |
3228                                 G_SUPPLICANT_KEYMGMT_WPA_PSK_256))
3229                 bss->psk = TRUE;
3230 #endif
3231
3232 #if defined TIZEN_EXT
3233         if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_SAE)
3234                 bss->sae = TRUE;
3235         if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_OWE)
3236                 bss->owe = TRUE;
3237         if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_DPP)
3238                 bss->dpp = TRUE;
3239 #endif
3240
3241         if (bss->ieee8021x)
3242                 bss->security = G_SUPPLICANT_SECURITY_IEEE8021X;
3243 #if defined TIZEN_EXT
3244         else if (bss->ft_ieee8021x)
3245                 bss->security = G_SUPPLICANT_SECURITY_IEEE8021X;
3246         else if (bss->sae)
3247                 bss->security = G_SUPPLICANT_SECURITY_SAE;
3248 #endif
3249         else if (bss->psk)
3250                 bss->security = G_SUPPLICANT_SECURITY_PSK;
3251 #if defined TIZEN_EXT
3252         else if (bss->ft_psk)
3253                 bss->security = G_SUPPLICANT_SECURITY_FT_PSK;
3254         else if (bss->owe || bss->owe_transition_mode)
3255                 bss->security = G_SUPPLICANT_SECURITY_OWE;
3256         else if (bss->dpp)
3257                 bss->security = G_SUPPLICANT_SECURITY_DPP;
3258 #endif
3259         else if (bss->privacy)
3260                 bss->security = G_SUPPLICANT_SECURITY_WEP;
3261         else
3262                 bss->security = G_SUPPLICANT_SECURITY_NONE;
3263 }
3264
3265
3266 static void bss_property(const char *key, DBusMessageIter *iter,
3267                                                         void *user_data)
3268 {
3269         struct g_supplicant_bss *bss = user_data;
3270
3271         if (!bss->interface)
3272                 return;
3273 #if defined TIZEN_EXT
3274         if (!simplified_log)
3275 #endif
3276         SUPPLICANT_DBG("key %s", key);
3277
3278         if (!key)
3279                 return;
3280
3281         if (g_strcmp0(key, "BSSID") == 0) {
3282                 DBusMessageIter array;
3283                 unsigned char *addr;
3284                 int addr_len;
3285
3286                 dbus_message_iter_recurse(iter, &array);
3287                 dbus_message_iter_get_fixed_array(&array, &addr, &addr_len);
3288
3289                 if (addr_len == 6)
3290                         memcpy(bss->bssid, addr, addr_len);
3291         } else if (g_strcmp0(key, "SSID") == 0) {
3292                 DBusMessageIter array;
3293                 unsigned char *ssid;
3294                 int ssid_len;
3295
3296                 dbus_message_iter_recurse(iter, &array);
3297                 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
3298
3299                 if (ssid_len > 0 && ssid_len < 33) {
3300                         memcpy(bss->ssid, ssid, ssid_len);
3301                         bss->ssid_len = ssid_len;
3302                 } else {
3303                         memset(bss->ssid, 0, sizeof(bss->ssid));
3304                         bss->ssid_len = 0;
3305                 }
3306         } else if (g_strcmp0(key, "Capabilities") == 0) {
3307                 dbus_uint16_t capabilities = 0x0000;
3308
3309                 dbus_message_iter_get_basic(iter, &capabilities);
3310
3311                 if (capabilities & IEEE80211_CAP_ESS)
3312                         bss->mode = G_SUPPLICANT_MODE_INFRA;
3313                 else if (capabilities & IEEE80211_CAP_IBSS)
3314                         bss->mode = G_SUPPLICANT_MODE_IBSS;
3315
3316                 if (capabilities & IEEE80211_CAP_PRIVACY)
3317                         bss->privacy = TRUE;
3318         } else if (g_strcmp0(key, "Mode") == 0) {
3319                 const char *mode = NULL;
3320
3321                 dbus_message_iter_get_basic(iter, &mode);
3322                 bss->mode = string2mode(mode);
3323         } else if (g_strcmp0(key, "Frequency") == 0) {
3324                 dbus_uint16_t frequency = 0;
3325
3326                 dbus_message_iter_get_basic(iter, &frequency);
3327                 bss->frequency = frequency;
3328         } else if (g_strcmp0(key, "Signal") == 0) {
3329                 dbus_int16_t signal = 0;
3330
3331                 dbus_message_iter_get_basic(iter, &signal);
3332
3333                 bss->signal = signal;
3334                 if (!bss->signal)
3335                         bss->signal = BSS_UNKNOWN_STRENGTH;
3336
3337         } else if (g_strcmp0(key, "Level") == 0) {
3338                 dbus_int32_t level = 0;
3339
3340                 dbus_message_iter_get_basic(iter, &level);
3341         } else if (g_strcmp0(key, "Rates") == 0) {
3342                 supplicant_dbus_array_foreach(iter, bss_rates, bss);
3343         } else if (g_strcmp0(key, "MaxRate") == 0) {
3344                 dbus_uint32_t maxrate = 0;
3345
3346                 dbus_message_iter_get_basic(iter, &maxrate);
3347                 if (maxrate != 0)
3348                         bss->maxrate = maxrate;
3349         } else if (g_strcmp0(key, "Privacy") == 0) {
3350                 dbus_bool_t privacy = FALSE;
3351
3352                 dbus_message_iter_get_basic(iter, &privacy);
3353                 bss->privacy = privacy;
3354         } else if (g_strcmp0(key, "RSN") == 0) {
3355                 bss->rsn_selected = TRUE;
3356
3357                 supplicant_dbus_property_foreach(iter, bss_wpa, bss);
3358         } else if (g_strcmp0(key, "WPA") == 0) {
3359                 bss->rsn_selected = FALSE;
3360
3361                 supplicant_dbus_property_foreach(iter, bss_wpa, bss);
3362 #if defined TIZEN_EXT
3363         } else if (g_strcmp0(key, "HS20") == 0) {
3364                 dbus_bool_t hs20 = FALSE;
3365                 dbus_message_iter_get_basic(iter, &hs20);
3366                 bss->hs20 = hs20;
3367         } else if (g_strcmp0(key, "SNR") == 0) {
3368                 dbus_int16_t snr = 0;
3369
3370                 dbus_message_iter_get_basic(iter, &snr);
3371                 bss->snr = snr;
3372         } else if (g_strcmp0(key, "EstThroughput") == 0) {
3373                 dbus_uint32_t est_throughput = 0;
3374
3375                 dbus_message_iter_get_basic(iter, &est_throughput);
3376                 if (est_throughput != 0)
3377                         bss->est_throughput = est_throughput;
3378 #endif
3379         } else if (g_strcmp0(key, "IEs") == 0)
3380                 bss_process_ies(iter, bss);
3381         else
3382                 SUPPLICANT_DBG("key %s type %c",
3383                                 key, dbus_message_iter_get_arg_type(iter));
3384 }
3385
3386 static struct g_supplicant_bss *interface_bss_added(DBusMessageIter *iter,
3387                                                         void *user_data)
3388 {
3389         GSupplicantInterface *interface = user_data;
3390         GSupplicantNetwork *network;
3391         struct g_supplicant_bss *bss;
3392         const char *path = NULL;
3393 #if defined TIZEN_EXT
3394         if (!simplified_log)
3395 #endif
3396         SUPPLICANT_DBG("");
3397
3398         dbus_message_iter_get_basic(iter, &path);
3399         if (!path)
3400                 return NULL;
3401
3402         if (g_strcmp0(path, "/") == 0)
3403                 return NULL;
3404 #if defined TIZEN_EXT
3405         if (!simplified_log)
3406 #endif
3407         SUPPLICANT_DBG("%s", path);
3408
3409         network = g_hash_table_lookup(interface->bss_mapping, path);
3410         if (network) {
3411                 bss = g_hash_table_lookup(network->bss_table, path);
3412                 if (bss)
3413                         return NULL;
3414         }
3415
3416         bss = g_try_new0(struct g_supplicant_bss, 1);
3417         if (!bss)
3418                 return NULL;
3419
3420         bss->interface = interface;
3421         bss->path = g_strdup(path);
3422         bss->signal = BSS_UNKNOWN_STRENGTH;
3423
3424         return bss;
3425 }
3426
3427 static void interface_bss_added_with_keys(DBusMessageIter *iter,
3428                                                 void *user_data)
3429 {
3430         struct g_supplicant_bss *bss;
3431 #if defined TIZEN_EXT
3432         if (!simplified_log)
3433 #endif
3434         SUPPLICANT_DBG("");
3435
3436         bss = interface_bss_added(iter, user_data);
3437         if (!bss)
3438                 return;
3439
3440         dbus_message_iter_next(iter);
3441
3442         if (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_INVALID)
3443 #if defined TIZEN_EXT
3444         {
3445                 g_free(bss->path);
3446                 g_free(bss);
3447                 return;
3448         }
3449 #else
3450                 return;
3451 #endif
3452
3453         supplicant_dbus_property_foreach(iter, bss_property, bss);
3454
3455         bss_compute_security(bss);
3456         if (add_or_replace_bss_to_network(bss) < 0)
3457                 SUPPLICANT_DBG("add_or_replace_bss_to_network failed");
3458 }
3459
3460 static void interface_bss_added_without_keys(DBusMessageIter *iter,
3461                                                 void *user_data)
3462 {
3463         struct g_supplicant_bss *bss;
3464 #if defined TIZEN_EXT
3465         if (!simplified_log)
3466 #endif
3467         SUPPLICANT_DBG("");
3468
3469         bss = interface_bss_added(iter, user_data);
3470         if (!bss)
3471                 return;
3472
3473         supplicant_dbus_property_get_all(bss->path,
3474                                         SUPPLICANT_INTERFACE ".BSS",
3475                                         bss_property, bss, bss);
3476
3477         bss_compute_security(bss);
3478         if (add_or_replace_bss_to_network(bss) < 0)
3479                         SUPPLICANT_DBG("add_or_replace_bss_to_network failed");
3480 }
3481
3482 static void update_signal(gpointer key, gpointer value,
3483                                                 gpointer user_data)
3484 {
3485         struct g_supplicant_bss *bss = value;
3486         GSupplicantNetwork *network = user_data;
3487
3488 #if defined TIZEN_EXT
3489         if (!network->best_bss || (network->best_bss == bss)) {
3490                 if (bss->signal > network->signal) {
3491                         network->signal = bss->signal;
3492                         network->best_bss = bss;
3493                 }
3494                 return;
3495         }
3496
3497         update_best_bss(network, bss, network->best_bss);
3498 #else
3499         if (bss->signal > network->signal) {
3500                 network->signal = bss->signal;
3501                 network->best_bss = bss;
3502         }
3503 #endif
3504 }
3505
3506 static void update_network_signal(GSupplicantNetwork *network)
3507 {
3508         if (g_hash_table_size(network->bss_table) <= 1 && network->best_bss)
3509                 return;
3510
3511         g_hash_table_foreach(network->bss_table,
3512                                 update_signal, network);
3513
3514         SUPPLICANT_DBG("New network signal %d", network->signal);
3515 }
3516
3517 #if defined TIZEN_EXT
3518 static gboolean last_connected_timeout(gpointer data)
3519 {
3520         GSupplicantInterface *interface = data;
3521         GSupplicantNetwork *current_network = interface->current_network;
3522
3523         SUPPLICANT_DBG("Timeout last connected bss");
3524
3525         if (current_network && current_network->best_bss) {
3526                 if (compare_bssid(current_network->best_bss->bssid, interface->connected_bssid)) {
3527                         g_supplicant_network_set_last_connected_bssid(current_network, interface->connected_bssid);
3528                         callback_network_changed(current_network, "LastConnectedBSSID");
3529                 }
3530         }
3531
3532         last_connected_bss_timeout = 0;
3533         return FALSE;
3534 }
3535
3536 static void add_timer_for_last_connected(GSupplicantInterface *interface)
3537 {
3538         GSupplicantNetwork *current_network = interface->current_network;
3539
3540         if (interface->state == G_SUPPLICANT_STATE_COMPLETED) {
3541                 if (current_network) {
3542                         struct g_supplicant_bss *best_bss = current_network->best_bss;
3543
3544                         memcpy(interface->connected_bssid, best_bss->bssid, WIFI_BSSID_LEN_MAX);
3545
3546                         if (last_connected_bss_timeout)
3547                                 g_source_remove(last_connected_bss_timeout);
3548
3549                         last_connected_bss_timeout = g_timeout_add_seconds(LAST_CONNECTED_TIMEOUT,
3550                                 last_connected_timeout, interface);
3551
3552                         SUPPLICANT_DBG("Add timer for last connected bssid [" MACSTR "]",
3553                                         MAC2STR(best_bss->bssid));
3554                 }
3555         }
3556 }
3557
3558 static void remove_timer_for_last_connected(GSupplicantInterface *interface)
3559 {
3560         if (interface->state == G_SUPPLICANT_STATE_DISCONNECTED) {
3561                 if (last_connected_bss_timeout != 0) {
3562                         g_source_remove(last_connected_bss_timeout);
3563                         last_connected_bss_timeout = 0;
3564                         SUPPLICANT_DBG("Remove timer for last connected bss");
3565                 }
3566         }
3567 }
3568 #endif
3569
3570 static void interface_current_bss(GSupplicantInterface *interface,
3571                                                 DBusMessageIter *iter)
3572 {
3573         GSupplicantNetwork *network;
3574         struct g_supplicant_bss *bss;
3575         const char *path;
3576 #if defined TIZEN_EXT
3577         char bssid_buff1[WIFI_BSSID_STR_LEN] = {0,};
3578         char bssid_buff2[WIFI_BSSID_STR_LEN] = {0,};
3579         char *bssid_str1 = bssid_buff1;
3580         char *bssid_str2 = bssid_buff2;
3581         gboolean update = FALSE;
3582 #endif
3583
3584         dbus_message_iter_get_basic(iter, &path);
3585         if (g_strcmp0(path, "/") == 0) {
3586                 interface->current_network = NULL;
3587                 return;
3588         }
3589
3590         interface_bss_added_without_keys(iter, interface);
3591
3592         network = g_hash_table_lookup(interface->bss_mapping, path);
3593         if (!network)
3594                 return;
3595
3596         bss = g_hash_table_lookup(network->bss_table, path);
3597         if (!bss)
3598                 return;
3599
3600         interface->current_network = network;
3601 #if defined TIZEN_EXT
3602         snprintf(bssid_str1, WIFI_BSSID_STR_LEN, MACSTR, MAC2STR(bss->bssid));
3603         snprintf(bssid_str2, WIFI_BSSID_STR_LEN, MACSTR, MAC2STR(network->best_bss->bssid));
3604
3605         SUPPLICANT_DBG("current network [%p], Passed bss %s, best bss %s",
3606                         interface->current_network, bssid_str1, bssid_str2);
3607
3608         if (network->frequency != bss->frequency) {
3609                 network->frequency = bss->frequency;
3610                 update = TRUE;
3611         }
3612 #endif
3613
3614         if (bss != network->best_bss) {
3615                 /*
3616                  * This is the case where either wpa_s got associated
3617                  * to a BSS different than the one ConnMan considers
3618                  * the best, or we are roaming.
3619                  */
3620                 SUPPLICANT_DBG("Update best BSS for %s", network->name);
3621
3622                 network->best_bss = bss;
3623
3624                 if (network->signal != bss->signal) {
3625                         SUPPLICANT_DBG("New network signal %d dBm",
3626                                                 bss->signal);
3627
3628                         network->signal = bss->signal;
3629                         callback_network_changed(network, "Signal");
3630 #if defined TIZEN_EXT
3631                         update = FALSE;
3632                 } else {
3633                         update = TRUE;
3634 #endif
3635                 }
3636         }
3637
3638 #if defined TIZEN_EXT
3639         if (update)
3640                 callback_network_changed(network, "");
3641 #endif
3642
3643         /*
3644          * wpa_s could notify about CurrentBSS in any state once
3645          * it got associated. It is not sure such notification will
3646          * arrive together with transition to ASSOCIATED state.
3647          * In fact, for networks with security WEP or OPEN, it
3648          * always arrives together with transition to COMPLETED.
3649          */
3650         switch (interface->state) {
3651         case G_SUPPLICANT_STATE_UNKNOWN:
3652         case G_SUPPLICANT_STATE_DISABLED:
3653         case G_SUPPLICANT_STATE_DISCONNECTED:
3654         case G_SUPPLICANT_STATE_INACTIVE:
3655         case G_SUPPLICANT_STATE_SCANNING:
3656         case G_SUPPLICANT_STATE_AUTHENTICATING:
3657         case G_SUPPLICANT_STATE_ASSOCIATING:
3658                 return;
3659         case G_SUPPLICANT_STATE_ASSOCIATED:
3660         case G_SUPPLICANT_STATE_4WAY_HANDSHAKE:
3661         case G_SUPPLICANT_STATE_GROUP_HANDSHAKE:
3662         case G_SUPPLICANT_STATE_COMPLETED:
3663                 callback_network_associated(network);
3664 #if defined TIZEN_EXT
3665                 add_timer_for_last_connected(interface);
3666 #endif
3667                 break;
3668         }
3669 }
3670
3671 static void interface_bss_removed(DBusMessageIter *iter, void *user_data)
3672 {
3673         GSupplicantInterface *interface = user_data;
3674         GSupplicantNetwork *network;
3675         struct g_supplicant_bss *bss = NULL;
3676         const char *path = NULL;
3677         bool is_current_network_bss = false;
3678
3679         dbus_message_iter_get_basic(iter, &path);
3680         if (!path)
3681                 return;
3682
3683         network = g_hash_table_lookup(interface->bss_mapping, path);
3684         if (!network)
3685                 return;
3686
3687         bss = g_hash_table_lookup(network->bss_table, path);
3688         if (network->best_bss == bss) {
3689                 network->best_bss = NULL;
3690                 network->signal = BSS_UNKNOWN_STRENGTH;
3691                 is_current_network_bss = true;
3692         }
3693
3694         g_hash_table_remove(bss_mapping, path);
3695
3696         g_hash_table_remove(interface->bss_mapping, path);
3697         g_hash_table_remove(network->bss_table, path);
3698
3699         update_network_signal(network);
3700
3701         if (g_hash_table_size(network->bss_table) == 0) {
3702                 g_hash_table_remove(interface->network_table, network->group);
3703         } else {
3704                 if (is_current_network_bss && network->best_bss)
3705 #if defined TIZEN_EXT
3706                         callback_network_changed(network, "CheckMultiBssidConnect");
3707 #else
3708                         callback_network_changed(network, "");
3709 #endif
3710         }
3711 }
3712
3713 static void set_config_methods(DBusMessageIter *iter, void *user_data)
3714 {
3715         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, user_data);
3716 }
3717
3718 static void wps_property(const char *key, DBusMessageIter *iter,
3719                                                         void *user_data)
3720 {
3721         GSupplicantInterface *interface = user_data;
3722
3723         if (!interface)
3724                 return;
3725 #if defined TIZEN_EXT
3726         if (!simplified_log)
3727 #endif
3728         SUPPLICANT_DBG("key: %s", key);
3729
3730         if (g_strcmp0(key, "ConfigMethods") == 0) {
3731                 const char *config_methods = "push_button", *str = NULL;
3732
3733                 dbus_message_iter_get_basic(iter, &str);
3734                 if (str && strlen(str) > 0) {
3735                         /* It was already set at wpa_s level, don't modify it. */
3736                         SUPPLICANT_DBG("%s", str);
3737                         return;
3738                 }
3739
3740                 supplicant_dbus_property_set(interface->path,
3741                         SUPPLICANT_INTERFACE ".Interface.WPS",
3742                         "ConfigMethods", DBUS_TYPE_STRING_AS_STRING,
3743                         set_config_methods, NULL, &config_methods, NULL);
3744
3745                 SUPPLICANT_DBG("No value. Set %s", config_methods);
3746         }
3747
3748 }
3749
3750 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
3751 void g_supplicant_replace_config_file(const char *ifname, const char *config_file)
3752 {
3753         if (!ifname)
3754                return;
3755
3756         if (!config_file)
3757                 return;
3758
3759         SUPPLICANT_DBG("New {%s, %s}", ifname, config_file);
3760         g_hash_table_replace(config_file_table,
3761                         g_strdup(ifname), g_strdup(config_file));
3762 }
3763 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
3764
3765 static void interface_property(const char *key, DBusMessageIter *iter,
3766                                                         void *user_data)
3767 {
3768         GSupplicantInterface *interface = user_data;
3769
3770         if (!interface)
3771                 return;
3772 #if defined TIZEN_EXT
3773         if (!simplified_log)
3774 #endif
3775         SUPPLICANT_DBG("%s", key);
3776
3777         if (!key) {
3778                 debug_strvalmap("KeyMgmt capability", keymgmt_map,
3779                                                 interface->keymgmt_capa);
3780                 debug_strvalmap("AuthAlg capability", authalg_capa_map,
3781                                                 interface->authalg_capa);
3782                 debug_strvalmap("Protocol capability", proto_capa_map,
3783                                                 interface->proto_capa);
3784                 debug_strvalmap("Pairwise capability", pairwise_map,
3785                                                 interface->pairwise_capa);
3786                 debug_strvalmap("Group capability", group_map,
3787                                                 interface->group_capa);
3788                 debug_strvalmap("Scan capability", scan_capa_map,
3789                                                 interface->scan_capa);
3790                 debug_strvalmap("Mode capability", mode_capa_map,
3791                                                 interface->mode_capa);
3792
3793                 supplicant_dbus_property_get_all(interface->path,
3794                                 SUPPLICANT_INTERFACE ".Interface.WPS",
3795                                 wps_property, interface, interface);
3796
3797                 if (interface->ready)
3798                         callback_interface_added(interface);
3799
3800                 return;
3801         }
3802
3803         if (g_strcmp0(key, "Capabilities") == 0) {
3804                 supplicant_dbus_property_foreach(iter, interface_capability,
3805                                                                 interface);
3806 #if !defined TIZEN_EXT
3807                 if (interface->mode_capa & G_SUPPLICANT_CAPABILITY_MODE_P2P)
3808                         interface->p2p_support = true;
3809 #endif
3810 #if defined TIZEN_EXT_WIFI_MESH
3811                 if (interface->mode_capa & G_SUPPLICANT_CAPABILITY_MODE_MESH)
3812                         interface->mesh_support = true;
3813 #endif
3814         } else if (g_strcmp0(key, "State") == 0) {
3815                 const char *str = NULL;
3816
3817                 dbus_message_iter_get_basic(iter, &str);
3818                 if (str)
3819                         if (string2state(str) != interface->state) {
3820                                 interface->state = string2state(str);
3821                                 callback_interface_state(interface);
3822                         }
3823 #if defined TIZEN_EXT
3824                 switch (interface->state) {
3825                 case G_SUPPLICANT_STATE_COMPLETED:
3826                         add_timer_for_last_connected(interface);
3827                         break;
3828                 case G_SUPPLICANT_STATE_DISCONNECTED:
3829                         remove_timer_for_last_connected(interface);
3830                         break;
3831                 default:
3832                         break;
3833                 }
3834 #endif
3835                 if (interface->ap_create_in_progress) {
3836                         if (interface->state == G_SUPPLICANT_STATE_DISCONNECTED)
3837                                 callback_ap_create_fail(interface);
3838
3839                         interface->ap_create_in_progress = false;
3840                 }
3841
3842                 if (interface->state == G_SUPPLICANT_STATE_DISABLED)
3843                         interface->ready = FALSE;
3844                 else
3845                         interface->ready = TRUE;
3846
3847                 SUPPLICANT_DBG("state %s (%d)", str, interface->state);
3848         } else if (g_strcmp0(key, "Scanning") == 0) {
3849                 dbus_bool_t scanning = FALSE;
3850
3851                 dbus_message_iter_get_basic(iter, &scanning);
3852                 interface->scanning = scanning;
3853
3854                 if (interface->ready) {
3855                         if (interface->scanning)
3856                                 callback_scan_started(interface);
3857                         else
3858                                 callback_scan_finished(interface);
3859                 }
3860         } else if (g_strcmp0(key, "ApScan") == 0) {
3861                 int apscan = 1;
3862
3863                 dbus_message_iter_get_basic(iter, &apscan);
3864                 interface->apscan = apscan;
3865         } else if (g_strcmp0(key, "Ifname") == 0) {
3866                 const char *str = NULL;
3867
3868                 dbus_message_iter_get_basic(iter, &str);
3869                 if (str) {
3870                         g_free(interface->ifname);
3871                         interface->ifname = g_strdup(str);
3872                 }
3873         } else if (g_strcmp0(key, "Driver") == 0) {
3874                 const char *str = NULL;
3875
3876                 dbus_message_iter_get_basic(iter, &str);
3877                 if (str) {
3878                         g_free(interface->driver);
3879                         interface->driver = g_strdup(str);
3880                 }
3881         } else if (g_strcmp0(key, "BridgeIfname") == 0) {
3882                 const char *str = NULL;
3883
3884                 dbus_message_iter_get_basic(iter, &str);
3885                 if (str) {
3886                         g_free(interface->bridge);
3887                         interface->bridge = g_strdup(str);
3888                 }
3889         } else if (g_strcmp0(key, "ConfigFile") == 0) {
3890                 const char *str = NULL;
3891
3892                 dbus_message_iter_get_basic(iter, &str);
3893                 if (str && strlen(str) > 0 && interface->ifname) {
3894                         SUPPLICANT_DBG("New {%s, %s}", interface->ifname, str);
3895                         g_hash_table_replace(config_file_table,
3896                                 g_strdup(interface->ifname), g_strdup(str));
3897                 }
3898         } else if (g_strcmp0(key, "CurrentBSS") == 0) {
3899                 interface_current_bss(interface, iter);
3900         } else if (g_strcmp0(key, "CurrentNetwork") == 0) {
3901 #if defined TIZEN_EXT
3902                 if (interface->state != G_SUPPLICANT_STATE_COMPLETED)
3903 #endif
3904                 interface_network_added(iter, interface);
3905         } else if (g_strcmp0(key, "BSSs") == 0) {
3906                 supplicant_dbus_array_foreach(iter,
3907                                         interface_bss_added_without_keys,
3908                                         interface);
3909         } else if (g_strcmp0(key, "Blobs") == 0) {
3910                 /* Nothing */
3911         } else if (g_strcmp0(key, "Networks") == 0) {
3912                 supplicant_dbus_array_foreach(iter, interface_network_added,
3913                                                                 interface);
3914         } else if (g_strcmp0(key, "DisconnectReason") == 0) {
3915                 int reason_code;
3916                 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
3917                         dbus_message_iter_get_basic(iter, &reason_code);
3918                         callback_disconnect_reason_code(interface, reason_code);
3919 #if defined TIZEN_EXT
3920                         SUPPLICANT_DBG("reason code (%d)", reason_code);
3921 #endif
3922                 }
3923         } else if (g_strcmp0(key, "AssocStatusCode") == 0) {
3924                 int status_code;
3925                 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
3926                         dbus_message_iter_get_basic(iter, &status_code);
3927                         callback_assoc_status_code(interface, status_code);
3928 #if defined TIZEN_EXT
3929                         SUPPLICANT_DBG("status code (%d)", status_code);
3930 #endif
3931                 }
3932         } else {
3933                 SUPPLICANT_DBG("key %s type %c",
3934                                 key, dbus_message_iter_get_arg_type(iter));
3935         }
3936 }
3937
3938 static void scan_network_update(DBusMessageIter *iter, void *user_data)
3939 {
3940         GSupplicantInterface *interface = user_data;
3941         GSupplicantNetwork *network;
3942         char *path;
3943
3944         if (!iter)
3945                 return;
3946
3947         dbus_message_iter_get_basic(iter, &path);
3948
3949         if (!path)
3950                 return;
3951
3952         if (g_strcmp0(path, "/") == 0)
3953                 return;
3954
3955         /* Update the network details based on scan BSS data */
3956         network = g_hash_table_lookup(interface->bss_mapping, path);
3957         if (network)
3958                 callback_network_added(network);
3959 }
3960
3961 static void scan_bss_data(const char *key, DBusMessageIter *iter,
3962                                 void *user_data)
3963 {
3964         GSupplicantInterface *interface = user_data;
3965
3966 /*Fixed : stucking in scanning state when scan failed*/
3967 #if defined TIZEN_EXT
3968         GSupplicantInterfaceCallback scan_callback;
3969         SUPPLICANT_DBG("");
3970 #endif
3971
3972         if (iter)
3973                 supplicant_dbus_array_foreach(iter, scan_network_update,
3974                                                 interface);
3975
3976 #if defined TIZEN_EXT
3977         scan_callback = interface->scan_callback;
3978         callback_scan_done(interface);
3979 #endif
3980
3981         if (interface->scan_callback)
3982                 interface->scan_callback(0, interface, interface->scan_data);
3983
3984 #if defined TIZEN_EXT
3985         if (interface->scan_callback == scan_callback) {
3986 #endif
3987         interface->scan_callback = NULL;
3988         interface->scan_data = NULL;
3989 #if defined TIZEN_EXT
3990         }
3991 #endif
3992 }
3993
3994 static GSupplicantInterface *interface_alloc(const char *path)
3995 {
3996         GSupplicantInterface *interface;
3997
3998         interface = g_try_new0(GSupplicantInterface, 1);
3999         if (!interface)
4000                 return NULL;
4001
4002         interface->path = g_strdup(path);
4003
4004         interface->network_table = g_hash_table_new_full(g_str_hash,
4005                                         g_str_equal, NULL, remove_network);
4006         interface->peer_table = g_hash_table_new_full(g_str_hash,
4007                                         g_str_equal, NULL, remove_peer);
4008         interface->group_table = g_hash_table_new_full(g_str_hash,
4009                                         g_str_equal, NULL, remove_group);
4010         interface->bss_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
4011                                                                 NULL, NULL);
4012
4013         g_hash_table_replace(interface_table, interface->path, interface);
4014
4015         return interface;
4016 }
4017
4018 static void interface_added(DBusMessageIter *iter, void *user_data)
4019 {
4020         GSupplicantInterface *interface;
4021         const char *path = NULL;
4022         bool properties_appended = GPOINTER_TO_UINT(user_data);
4023
4024         SUPPLICANT_DBG("");
4025
4026         dbus_message_iter_get_basic(iter, &path);
4027         if (!path)
4028                 return;
4029
4030         if (g_strcmp0(path, "/") == 0)
4031                 return;
4032
4033         interface = g_hash_table_lookup(interface_table, path);
4034         if (interface)
4035                 return;
4036
4037         interface = interface_alloc(path);
4038         if (!interface)
4039                 return;
4040
4041         if (!properties_appended) {
4042                 supplicant_dbus_property_get_all(path,
4043                                                 SUPPLICANT_INTERFACE ".Interface",
4044                                                 interface_property, interface,
4045                                                 interface);
4046                 return;
4047         }
4048
4049         dbus_message_iter_next(iter);
4050         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
4051                 supplicant_dbus_property_foreach(iter, interface_property,
4052                                                                 interface);
4053                 interface_property(NULL, NULL, interface);
4054         }
4055 }
4056
4057 static void interface_removed(DBusMessageIter *iter, void *user_data)
4058 {
4059         const char *path = NULL;
4060         GSupplicantInterface *interface = user_data;
4061
4062         dbus_message_iter_get_basic(iter, &path);
4063         if (!path)
4064                 return;
4065
4066         interface = g_hash_table_lookup(interface_table, path);
4067         g_supplicant_interface_cancel(interface);
4068
4069         g_hash_table_remove(interface_table, path);
4070 }
4071
4072 static void eap_method(DBusMessageIter *iter, void *user_data)
4073 {
4074         const char *str = NULL;
4075         int i;
4076
4077         dbus_message_iter_get_basic(iter, &str);
4078         if (!str)
4079                 return;
4080
4081         for (i = 0; eap_method_map[i].str; i++)
4082                 if (strcmp(str, eap_method_map[i].str) == 0) {
4083                         eap_methods |= eap_method_map[i].val;
4084                         break;
4085                 }
4086 }
4087
4088 static void service_property(const char *key, DBusMessageIter *iter,
4089                                                         void *user_data)
4090 {
4091         if (!key) {
4092                 callback_system_ready();
4093                 return;
4094         }
4095
4096         if (g_strcmp0(key, "DebugLevel") == 0) {
4097                 const char *str = NULL;
4098                 int i;
4099
4100                 dbus_message_iter_get_basic(iter, &str);
4101                 for (i = 0; debug_strings[i]; i++)
4102                         if (g_strcmp0(debug_strings[i], str) == 0) {
4103                                 debug_level = i;
4104                                 break;
4105                         }
4106                 SUPPLICANT_DBG("Debug level %d", debug_level);
4107         } else if (g_strcmp0(key, "DebugTimestamp") == 0) {
4108                 dbus_message_iter_get_basic(iter, &debug_timestamp);
4109                 SUPPLICANT_DBG("Debug timestamp %u", debug_timestamp);
4110         } else if (g_strcmp0(key, "DebugShowKeys") == 0) {
4111                 dbus_message_iter_get_basic(iter, &debug_showkeys);
4112                 SUPPLICANT_DBG("Debug show keys %u", debug_showkeys);
4113         } else if (g_strcmp0(key, "Interfaces") == 0) {
4114                 supplicant_dbus_array_foreach(iter, interface_added, NULL);
4115         } else if (g_strcmp0(key, "EapMethods") == 0) {
4116                 supplicant_dbus_array_foreach(iter, eap_method, NULL);
4117                 debug_strvalmap("EAP method", eap_method_map, eap_methods);
4118         } else if (g_strcmp0(key, "Country") == 0) {
4119                 const char *country = NULL;
4120
4121                 dbus_message_iter_get_basic(iter, &country);
4122                 SUPPLICANT_DBG("Country %s", country);
4123         } else
4124                 SUPPLICANT_DBG("key %s type %c",
4125                                 key, dbus_message_iter_get_arg_type(iter));
4126 }
4127
4128 static void signal_name_owner_changed(const char *path, DBusMessageIter *iter)
4129 {
4130         const char *name = NULL, *old = NULL, *new = NULL;
4131
4132         SUPPLICANT_DBG("");
4133
4134         if (g_strcmp0(path, DBUS_PATH_DBUS) != 0)
4135                 return;
4136
4137         dbus_message_iter_get_basic(iter, &name);
4138         if (!name)
4139                 return;
4140
4141         if (g_strcmp0(name, SUPPLICANT_SERVICE) != 0)
4142                 return;
4143
4144         dbus_message_iter_next(iter);
4145         dbus_message_iter_get_basic(iter, &old);
4146         dbus_message_iter_next(iter);
4147         dbus_message_iter_get_basic(iter, &new);
4148
4149         if (!old || !new)
4150                 return;
4151
4152         if (strlen(old) > 0 && strlen(new) == 0) {
4153                 system_available = FALSE;
4154                 g_hash_table_remove_all(bss_mapping);
4155                 g_hash_table_remove_all(peer_mapping);
4156                 g_hash_table_remove_all(group_mapping);
4157                 g_hash_table_remove_all(config_file_table);
4158                 g_hash_table_remove_all(interface_table);
4159                 callback_system_killed();
4160         }
4161
4162         if (strlen(new) > 0 && strlen(old) == 0) {
4163                 system_available = TRUE;
4164                 supplicant_dbus_property_get_all(SUPPLICANT_PATH,
4165                                                 SUPPLICANT_INTERFACE,
4166                                                 service_property, NULL, NULL);
4167         }
4168 }
4169
4170 static void signal_properties_changed(const char *path, DBusMessageIter *iter)
4171 {
4172         SUPPLICANT_DBG("");
4173
4174         if (g_strcmp0(path, SUPPLICANT_PATH) != 0)
4175                 return;
4176
4177         supplicant_dbus_property_foreach(iter, service_property, NULL);
4178 }
4179
4180 static void signal_interface_added(const char *path, DBusMessageIter *iter)
4181 {
4182         SUPPLICANT_DBG("path %s %s", path, SUPPLICANT_PATH);
4183
4184         if (g_strcmp0(path, SUPPLICANT_PATH) == 0)
4185                 interface_added(iter, GUINT_TO_POINTER(true));
4186 }
4187
4188 static void signal_interface_removed(const char *path, DBusMessageIter *iter)
4189 {
4190         SUPPLICANT_DBG("");
4191
4192         if (g_strcmp0(path, SUPPLICANT_PATH) == 0)
4193                 interface_removed(iter, NULL);
4194 }
4195
4196 static void signal_interface_changed(const char *path, DBusMessageIter *iter)
4197 {
4198         GSupplicantInterface *interface;
4199 #if defined TIZEN_EXT
4200         if (!simplified_log)
4201 #endif
4202         SUPPLICANT_DBG("");
4203
4204         interface = g_hash_table_lookup(interface_table, path);
4205         if (!interface)
4206                 return;
4207
4208         supplicant_dbus_property_foreach(iter, interface_property, interface);
4209 }
4210
4211 static void signal_scan_done(const char *path, DBusMessageIter *iter)
4212 {
4213         GSupplicantInterface *interface;
4214         dbus_bool_t success = FALSE;
4215
4216         SUPPLICANT_DBG("");
4217
4218         interface = g_hash_table_lookup(interface_table, path);
4219         if (!interface)
4220                 return;
4221
4222         dbus_message_iter_get_basic(iter, &success);
4223
4224         if (interface->scanning) {
4225                 callback_scan_finished(interface);
4226                 interface->scanning = FALSE;
4227         }
4228
4229         /*
4230          * If scan is unsuccessful return -EIO else get the scanned BSSs
4231          * and update the network details accordingly
4232          */
4233         if (!success) {
4234                 if (interface->scan_callback)
4235                         interface->scan_callback(-EIO, interface,
4236                                                 interface->scan_data);
4237
4238                 interface->scan_callback = NULL;
4239                 interface->scan_data = NULL;
4240
4241                 return;
4242         }
4243
4244         supplicant_dbus_property_get(path, SUPPLICANT_INTERFACE ".Interface",
4245                                 "BSSs", scan_bss_data, interface, interface);
4246 }
4247
4248 static void signal_bss_added(const char *path, DBusMessageIter *iter)
4249 {
4250         GSupplicantInterface *interface;
4251 #if defined TIZEN_EXT
4252         if (!simplified_log)
4253 #endif
4254         SUPPLICANT_DBG("");
4255
4256         interface = g_hash_table_lookup(interface_table, path);
4257         if (!interface)
4258                 return;
4259
4260         interface_bss_added_with_keys(iter, interface);
4261 }
4262
4263 static void signal_bss_removed(const char *path, DBusMessageIter *iter)
4264 {
4265         GSupplicantInterface *interface;
4266
4267         SUPPLICANT_DBG("");
4268
4269         interface = g_hash_table_lookup(interface_table, path);
4270         if (!interface)
4271                 return;
4272
4273         interface_bss_removed(iter, interface);
4274 }
4275
4276 static void signal_network_added(const char *path, DBusMessageIter *iter)
4277 {
4278         GSupplicantInterface *interface;
4279
4280         SUPPLICANT_DBG("");
4281
4282         interface = g_hash_table_lookup(interface_table, path);
4283         if (!interface)
4284                 return;
4285
4286         interface_network_added(iter, interface);
4287 }
4288
4289 static void signal_network_removed(const char *path, DBusMessageIter *iter)
4290 {
4291         GSupplicantInterface *interface;
4292
4293         SUPPLICANT_DBG("");
4294
4295         interface = g_hash_table_lookup(interface_table, path);
4296         if (!interface)
4297                 return;
4298
4299         interface_network_removed(iter, interface);
4300 }
4301 #if defined TIZEN_EXT
4302 void *copy_vsie_list(gconstpointer src, gpointer data)
4303 {
4304         return g_strdup(src);
4305 }
4306 #endif
4307
4308
4309 static void signal_sta_authorized(const char *path, DBusMessageIter *iter)
4310 {
4311         GSupplicantInterface *interface;
4312         const char *addr = NULL;
4313
4314         SUPPLICANT_DBG("");
4315
4316         interface = g_hash_table_lookup(interface_table, path);
4317         if (!interface)
4318                 return;
4319
4320         dbus_message_iter_get_basic(iter, &addr);
4321         if (!addr)
4322                 return;
4323
4324         callback_sta_authorized(interface, addr);
4325 }
4326
4327 static void signal_sta_deauthorized(const char *path, DBusMessageIter *iter)
4328 {
4329         GSupplicantInterface *interface;
4330         const char *addr = NULL;
4331
4332         SUPPLICANT_DBG("");
4333
4334         interface = g_hash_table_lookup(interface_table, path);
4335         if (!interface)
4336                 return;
4337
4338         dbus_message_iter_get_basic(iter, &addr);
4339         if (!addr)
4340                 return;
4341
4342         callback_sta_deauthorized(interface, addr);
4343 }
4344
4345 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
4346 static void signal_eap(const char *path, DBusMessageIter *iter)
4347 {
4348         GSupplicantInterface *interface;
4349         const char *str = NULL;
4350
4351         SUPPLICANT_DBG("EAPOL_DEBUG callback eap signal");
4352
4353         interface = g_hash_table_lookup(interface_table, path);
4354         if (!interface)
4355                 return;
4356
4357         // TODO: Identify EAP fail condition, currently timeout is used for failure.
4358
4359         dbus_message_iter_get_basic(iter, &str);
4360         if (!str)
4361                 return;
4362
4363         if (g_strcmp0("completion", str))
4364                 return;
4365
4366         dbus_message_iter_next(iter);
4367
4368         dbus_message_iter_get_basic(iter, &str);
4369         if (!str)
4370                 return;
4371
4372         if (!g_strcmp0("success", str))
4373                 callback_eap(interface, true);
4374         else
4375                 callback_eap(interface, false);
4376 }
4377 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
4378
4379 static void signal_bss_changed(const char *path, DBusMessageIter *iter)
4380 {
4381         GSupplicantInterface *interface;
4382         GSupplicantNetwork *network;
4383         GSupplicantSecurity old_security;
4384         unsigned int old_wps_capabilities;
4385         struct g_supplicant_bss *bss;
4386
4387 #if defined TIZEN_EXT
4388         if (!simplified_log)
4389 #endif
4390         SUPPLICANT_DBG("");
4391
4392         interface = g_hash_table_lookup(bss_mapping, path);
4393         if (!interface)
4394                 return;
4395
4396         network = g_hash_table_lookup(interface->bss_mapping, path);
4397         if (!network)
4398                 return;
4399
4400         bss = g_hash_table_lookup(network->bss_table, path);
4401         if (!bss)
4402                 return;
4403
4404         supplicant_dbus_property_foreach(iter, bss_property, bss);
4405
4406 #if defined TIZEN_EXT
4407         if (network->interface->state != G_SUPPLICANT_STATE_COMPLETED) {
4408                 network->frequency = bss->frequency;
4409                 network->phy_mode = bss->phy_mode;
4410         }
4411 #endif
4412         old_security = network->security;
4413         bss_compute_security(bss);
4414
4415         if (old_security != bss->security) {
4416                 struct g_supplicant_bss *new_bss;
4417
4418                 SUPPLICANT_DBG("New network security for %s with path %s",
4419                                bss->ssid, bss->path);
4420
4421                 /*
4422                  * Security change policy:
4423                  * - We first copy the current bss into a new one with
4424                  *   its own pointer (path)
4425                  * - Clear the old bss pointer and remove the network completely
4426                  *   if there are no more BSSs in the bss table.
4427                  * - The new bss will be added either to an existing network
4428                  *   or an additional network will be created
4429                  */
4430
4431                 new_bss = g_try_new0(struct g_supplicant_bss, 1);
4432                 if (!new_bss)
4433                         return;
4434
4435                 memcpy(new_bss, bss, sizeof(struct g_supplicant_bss));
4436                 new_bss->path = g_strdup(bss->path);
4437 #if defined TIZEN_EXT
4438                 new_bss->vsie_list = g_slist_copy_deep(bss->vsie_list, copy_vsie_list, NULL);
4439 #endif
4440
4441                 if (network->best_bss == bss) {
4442                         network->best_bss = NULL;
4443                         network->signal = BSS_UNKNOWN_STRENGTH;
4444                 }
4445
4446                 g_hash_table_remove(bss_mapping, path);
4447
4448                 g_hash_table_remove(interface->bss_mapping, path);
4449                 g_hash_table_remove(network->bss_table, path);
4450
4451                 update_network_signal(network);
4452
4453                 if (g_hash_table_size(network->bss_table) == 0)
4454                         g_hash_table_remove(interface->network_table,
4455                                             network->group);
4456
4457                 if (add_or_replace_bss_to_network(new_bss) < 0) {
4458                         /*
4459                          * Prevent a memory leak on failure in
4460                          * add_or_replace_bss_to_network
4461                          */
4462                         SUPPLICANT_DBG("Failed to add bss %s to network table",
4463                                        new_bss->path);
4464                         g_free(new_bss->path);
4465                         g_free(new_bss);
4466                 }
4467
4468                 return;
4469         }
4470
4471         old_wps_capabilities = network->wps_capabilities;
4472
4473         if (old_wps_capabilities != bss->wps_capabilities) {
4474                 network->wps_capabilities = bss->wps_capabilities;
4475                 callback_network_changed(network, "WPSCapabilities");
4476         }
4477
4478 #if defined TIZEN_EXT
4479         if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
4480                 network->wps = TRUE;
4481                 network->wps_capabilities |= bss->wps_capabilities;
4482         } else
4483                 network->wps = FALSE;
4484 #endif
4485
4486         /* Consider only property changes of the connected BSS */
4487         if (network == interface->current_network && bss != network->best_bss)
4488                 return;
4489
4490         if (bss->signal == network->signal)
4491 #ifndef TIZEN_EXT
4492                 return;
4493 #else
4494         {
4495                 callback_network_changed(network, "");
4496                 return;
4497         }
4498 #endif
4499
4500         /*
4501          * If the new signal is lower than the SSID signal, we need
4502          * to check for the new maximum.
4503          */
4504 #if defined TIZEN_EXT
4505         if (!update_best_bss(network, bss, network->best_bss)) {
4506                 if (bss != network->best_bss) {
4507                         callback_network_changed(network, "");
4508                         return;
4509                 }
4510
4511                 network->signal = bss->signal;
4512                 update_network_signal(network);
4513         }
4514 #else
4515         if (bss->signal < network->signal) {
4516                 if (bss != network->best_bss)
4517                         return;
4518
4519                 network->signal = bss->signal;
4520                 update_network_signal(network);
4521         } else {
4522                 network->signal = bss->signal;
4523                 network->best_bss = bss;
4524         }
4525 #endif
4526
4527         SUPPLICANT_DBG("New network signal for %s %d dBm", network->ssid,
4528                         network->signal);
4529
4530         callback_network_changed(network, "Signal");
4531 }
4532
4533 static void wps_credentials(const char *key, DBusMessageIter *iter,
4534                         void *user_data)
4535 {
4536         GSupplicantInterface *interface = user_data;
4537
4538         if (!key)
4539                 return;
4540
4541         SUPPLICANT_DBG("key %s", key);
4542
4543         if (g_strcmp0(key, "Key") == 0) {
4544                 DBusMessageIter array;
4545                 unsigned char *key_val;
4546                 int key_len;
4547
4548                 dbus_message_iter_recurse(iter, &array);
4549                 dbus_message_iter_get_fixed_array(&array, &key_val, &key_len);
4550
4551                 g_free(interface->wps_cred.key);
4552                 interface->wps_cred.key = g_try_malloc0(
4553                                                 sizeof(char) * key_len + 1);
4554
4555                 if (!interface->wps_cred.key)
4556                         return;
4557
4558                 memcpy(interface->wps_cred.key, key_val,
4559                                                 sizeof(char) * key_len);
4560
4561                 SUPPLICANT_DBG("WPS key present");
4562         } else if (g_strcmp0(key, "SSID") == 0) {
4563                 DBusMessageIter array;
4564                 unsigned char *ssid;
4565                 int ssid_len;
4566
4567                 dbus_message_iter_recurse(iter, &array);
4568                 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
4569
4570                 if (ssid_len > 0 && ssid_len < 33) {
4571                         memcpy(interface->wps_cred.ssid, ssid, ssid_len);
4572                         interface->wps_cred.ssid_len = ssid_len;
4573                 } else {
4574                         memset(interface->wps_cred.ssid, 0, 32);
4575                         interface->wps_cred.ssid_len = 0;
4576                 }
4577         }
4578 }
4579
4580 static void signal_wps_credentials(const char *path, DBusMessageIter *iter)
4581 {
4582         GSupplicantInterface *interface;
4583
4584         SUPPLICANT_DBG("");
4585
4586         interface = g_hash_table_lookup(interface_table, path);
4587         if (!interface)
4588                 return;
4589
4590         supplicant_dbus_property_foreach(iter, wps_credentials, interface);
4591 }
4592
4593 static void wps_event_args(const char *key, DBusMessageIter *iter,
4594                         void *user_data)
4595 {
4596         GSupplicantInterface *interface = user_data;
4597
4598         if (!key || !interface)
4599                 return;
4600
4601         SUPPLICANT_DBG("Arg Key %s", key);
4602 }
4603
4604 static void signal_wps_event(const char *path, DBusMessageIter *iter)
4605 {
4606         GSupplicantInterface *interface;
4607         const char *name = NULL;
4608
4609         SUPPLICANT_DBG("");
4610
4611         interface = g_hash_table_lookup(interface_table, path);
4612         if (!interface)
4613                 return;
4614
4615         dbus_message_iter_get_basic(iter, &name);
4616
4617         SUPPLICANT_DBG("Name: %s", name);
4618
4619         if (g_strcmp0(name, "success") == 0)
4620                 interface->wps_state = G_SUPPLICANT_WPS_STATE_SUCCESS;
4621         else if (g_strcmp0(name, "fail") == 0)
4622                 interface->wps_state = G_SUPPLICANT_WPS_STATE_FAIL;
4623         else
4624                 interface->wps_state = G_SUPPLICANT_WPS_STATE_UNKNOWN;
4625
4626         if (!dbus_message_iter_has_next(iter))
4627                 return;
4628
4629         dbus_message_iter_next(iter);
4630
4631         supplicant_dbus_property_foreach(iter, wps_event_args, interface);
4632 }
4633
4634 #if defined TIZEN_EXT
4635 static void signal_power_off(const char *path, DBusMessageIter *iter)
4636 {
4637         int poweroff_state = 0;
4638
4639         dbus_message_iter_get_basic(iter, &poweroff_state);
4640
4641         SUPPLICANT_DBG("poweroff_state(%d)", poweroff_state);
4642
4643         /* POWER_OFF_DIRECT 2 && POWER_OFF_RESTART 3 */
4644         if (poweroff_state != 2 && poweroff_state != 3)
4645                 return;
4646
4647         if (callbacks_pointer == NULL)
4648                 return;
4649
4650         if (callbacks_pointer->system_power_off == NULL)
4651                 return;
4652
4653         callbacks_pointer->system_power_off();
4654 }
4655 #endif
4656
4657 static void create_peer_identifier(GSupplicantPeer *peer)
4658 {
4659         const unsigned char test[ETH_ALEN] = {};
4660
4661         if (!peer)
4662                 return;
4663
4664         if (!memcmp(peer->device_address, test, ETH_ALEN)) {
4665                 peer->identifier = g_strdup(peer->name);
4666                 return;
4667         }
4668
4669         peer->identifier = g_malloc0(19);
4670         snprintf(peer->identifier, 19, "%02x%02x%02x%02x%02x%02x",
4671                                                 peer->device_address[0],
4672                                                 peer->device_address[1],
4673                                                 peer->device_address[2],
4674                                                 peer->device_address[3],
4675                                                 peer->device_address[4],
4676                                                 peer->device_address[5]);
4677 }
4678
4679 struct peer_property_data {
4680         GSupplicantPeer *peer;
4681         GSList *old_groups;
4682         bool groups_changed;
4683         bool services_changed;
4684 };
4685
4686 static void peer_groups_relation(DBusMessageIter *iter, void *user_data)
4687 {
4688         struct peer_property_data *data = user_data;
4689         GSupplicantPeer *peer = data->peer;
4690         GSupplicantGroup *group;
4691         const char *str = NULL;
4692         GSList *elem;
4693
4694         dbus_message_iter_get_basic(iter, &str);
4695         if (!str)
4696                 return;
4697
4698         group = g_hash_table_lookup(group_mapping, str);
4699         if (!group)
4700                 return;
4701
4702         elem = g_slist_find_custom(data->old_groups, str, (GCompareFunc)g_strcmp0);
4703         if (elem) {
4704                 data->old_groups = g_slist_remove_link(data->old_groups, elem);
4705                 peer->groups = g_slist_concat(elem, peer->groups);
4706         } else {
4707                 peer->groups = g_slist_prepend(peer->groups, g_strdup(str));
4708                 data->groups_changed = true;
4709         }
4710 }
4711
4712 static void peer_property(const char *key, DBusMessageIter *iter,
4713                                                         void *user_data)
4714 {
4715         GSupplicantPeer *pending_peer;
4716         struct peer_property_data *data = user_data;
4717         GSupplicantPeer *peer = data->peer;
4718
4719         SUPPLICANT_DBG("key: %s", key);
4720
4721         if (!peer->interface)
4722                 return;
4723
4724         if (!key) {
4725                 if (peer->name) {
4726                         create_peer_identifier(peer);
4727                         callback_peer_found(peer);
4728                         pending_peer = g_hash_table_lookup(
4729                                         pending_peer_connection, peer->path);
4730
4731                         if (pending_peer && pending_peer == peer) {
4732                                 callback_peer_request(peer);
4733                                 g_hash_table_remove(pending_peer_connection,
4734                                                 peer->path);
4735                         }
4736
4737                         dbus_free(data);
4738                 }
4739
4740                 return;
4741         }
4742
4743         if (g_strcmp0(key, "DeviceAddress") == 0) {
4744                 unsigned char *dev_addr;
4745                 DBusMessageIter array;
4746                 int len;
4747
4748                 dbus_message_iter_recurse(iter, &array);
4749                 dbus_message_iter_get_fixed_array(&array, &dev_addr, &len);
4750
4751                 if (len == ETH_ALEN)
4752                         memcpy(peer->device_address, dev_addr, len);
4753         } else if (g_strcmp0(key, "DeviceName") == 0) {
4754                 const char *str = NULL;
4755
4756                 dbus_message_iter_get_basic(iter, &str);
4757                 if (str)
4758                         peer->name = g_strdup(str);
4759         } else if (g_strcmp0(key, "config_method") == 0) {
4760                 uint16_t wps_config;
4761
4762                 dbus_message_iter_get_basic(iter, &wps_config);
4763
4764                 if (wps_config & G_SUPPLICANT_WPS_CONFIG_PBC)
4765                         peer->wps_capabilities |= G_SUPPLICANT_WPS_PBC;
4766                 if (wps_config & ~G_SUPPLICANT_WPS_CONFIG_PBC)
4767                         peer->wps_capabilities |= G_SUPPLICANT_WPS_PIN;
4768         } else if (g_strcmp0(key, "Groups") == 0) {
4769                 data->old_groups = peer->groups;
4770                 peer->groups = NULL;
4771
4772                 supplicant_dbus_array_foreach(iter,
4773                                                 peer_groups_relation, data);
4774                 if (g_slist_length(data->old_groups) > 0) {
4775                         g_slist_free_full(data->old_groups, g_free);
4776                         data->groups_changed = true;
4777                 }
4778         } else if (g_strcmp0(key, "IEs") == 0) {
4779                 DBusMessageIter array;
4780                 unsigned char *ie;
4781                 int ie_len;
4782
4783                 dbus_message_iter_recurse(iter, &array);
4784                 dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
4785
4786                 if (!ie || ie_len < 2)
4787                         return;
4788
4789                 if (peer->widi_ies) {
4790                         if (memcmp(peer->widi_ies, ie, ie_len) == 0)
4791                                 return;
4792
4793                         g_free(peer->widi_ies);
4794                         peer->widi_ies_length = 0;
4795                 }
4796
4797                 peer->widi_ies = g_malloc0(ie_len * sizeof(unsigned char));
4798
4799                 memcpy(peer->widi_ies, ie, ie_len);
4800                 peer->widi_ies_length = ie_len;
4801                 data->services_changed = true;
4802         }
4803 }
4804
4805 static void signal_peer_found(const char *path, DBusMessageIter *iter)
4806 {
4807         struct peer_property_data *property_data;
4808         GSupplicantInterface *interface;
4809         const char *obj_path = NULL;
4810         GSupplicantPeer *peer;
4811
4812         SUPPLICANT_DBG("");
4813
4814         interface = g_hash_table_lookup(interface_table, path);
4815         if (!interface)
4816                 return;
4817
4818         dbus_message_iter_get_basic(iter, &obj_path);
4819         if (!obj_path || g_strcmp0(obj_path, "/") == 0)
4820                 return;
4821
4822         peer = g_hash_table_lookup(interface->peer_table, obj_path);
4823         if (peer)
4824                 return;
4825
4826         peer = g_try_new0(GSupplicantPeer, 1);
4827         if (!peer)
4828                 return;
4829
4830         peer->interface = interface;
4831         peer->path = g_strdup(obj_path);
4832         g_hash_table_insert(interface->peer_table, peer->path, peer);
4833         g_hash_table_replace(peer_mapping, peer->path, interface);
4834
4835         property_data = dbus_malloc0(sizeof(struct peer_property_data));
4836         property_data->peer = peer;
4837
4838         dbus_message_iter_next(iter);
4839         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
4840                 supplicant_dbus_property_foreach(iter, peer_property,
4841                                                         property_data);
4842                 peer_property(NULL, NULL, property_data);
4843                 return;
4844         }
4845
4846         supplicant_dbus_property_get_all(obj_path,
4847                                         SUPPLICANT_INTERFACE ".Peer",
4848                                         peer_property, property_data, NULL);
4849 }
4850
4851 static void signal_peer_lost(const char *path, DBusMessageIter *iter)
4852 {
4853         GSupplicantInterface *interface;
4854         const char *obj_path = NULL;
4855         GSupplicantPeer *peer;
4856
4857         SUPPLICANT_DBG("");
4858
4859         interface = g_hash_table_lookup(interface_table, path);
4860         if (!interface)
4861                 return;
4862
4863         dbus_message_iter_get_basic(iter, &obj_path);
4864         if (!obj_path || g_strcmp0(obj_path, "/") == 0)
4865                 return;
4866
4867         peer = g_hash_table_lookup(interface->peer_table, obj_path);
4868         if (!peer)
4869                 return;
4870
4871         g_hash_table_remove(interface->peer_table, obj_path);
4872 }
4873
4874 static void signal_peer_changed(const char *path, DBusMessageIter *iter)
4875 {
4876         struct peer_property_data *property_data;
4877         GSupplicantInterface *interface;
4878         GSupplicantPeer *peer;
4879
4880         SUPPLICANT_DBG("");
4881
4882         interface = g_hash_table_lookup(peer_mapping, path);
4883         if (!interface)
4884                 return;
4885
4886         peer = g_hash_table_lookup(interface->peer_table, path);
4887         if (!peer) {
4888                 g_hash_table_remove(peer_mapping, path);
4889                 return;
4890         }
4891
4892         property_data = dbus_malloc0(sizeof(struct peer_property_data));
4893         property_data->peer = peer;
4894
4895         supplicant_dbus_property_foreach(iter, peer_property, property_data);
4896         if (property_data->services_changed)
4897                 callback_peer_changed(peer,
4898                                         G_SUPPLICANT_PEER_SERVICES_CHANGED);
4899
4900         if (property_data->groups_changed)
4901                 callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_CHANGED);
4902
4903         dbus_free(property_data);
4904
4905         if (!g_supplicant_peer_is_in_a_group(peer))
4906                 peer->connection_requested = false;
4907 }
4908
4909 struct group_sig_data {
4910         const char *peer_obj_path;
4911         unsigned char iface_address[ETH_ALEN];
4912         const char *interface_obj_path;
4913         const char *group_obj_path;
4914         int role;
4915 };
4916
4917 static void group_sig_property(const char *key, DBusMessageIter *iter,
4918                                                         void *user_data)
4919 {
4920         struct group_sig_data *data = user_data;
4921
4922         if (!key)
4923                 return;
4924
4925         if (g_strcmp0(key, "peer_interface_addr") == 0) {
4926                 unsigned char *dev_addr;
4927                 DBusMessageIter array;
4928                 int len;
4929
4930                 dbus_message_iter_recurse(iter, &array);
4931                 dbus_message_iter_get_fixed_array(&array, &dev_addr, &len);
4932
4933                 if (len == ETH_ALEN)
4934                         memcpy(data->iface_address, dev_addr, len);
4935         } else if (g_strcmp0(key, "role") == 0) {
4936                 const char *str = NULL;
4937
4938                 dbus_message_iter_get_basic(iter, &str);
4939                 if (g_strcmp0(str, "GO") == 0)
4940                         data->role = G_SUPPLICANT_GROUP_ROLE_GO;
4941                 else
4942                         data->role = G_SUPPLICANT_GROUP_ROLE_CLIENT;
4943         } else if (g_strcmp0(key, "peer_object") == 0)
4944                 dbus_message_iter_get_basic(iter, &data->peer_obj_path);
4945         else if (g_strcmp0(key, "interface_object") == 0)
4946                 dbus_message_iter_get_basic(iter, &data->interface_obj_path);
4947         else if (g_strcmp0(key, "group_object") == 0)
4948                 dbus_message_iter_get_basic(iter, &data->group_obj_path);
4949
4950 }
4951
4952 static void signal_group_success(const char *path, DBusMessageIter *iter)
4953 {
4954         GSupplicantInterface *interface;
4955         struct group_sig_data data = {};
4956         GSupplicantPeer *peer;
4957
4958         SUPPLICANT_DBG("");
4959
4960         interface = g_hash_table_lookup(interface_table, path);
4961         if (!interface)
4962                 return;
4963
4964         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
4965         if (!data.peer_obj_path)
4966                 return;
4967
4968         peer = g_hash_table_lookup(interface->peer_table, data.peer_obj_path);
4969         if (!peer)
4970                 return;
4971
4972         memcpy(peer->iface_address, data.iface_address, ETH_ALEN);
4973         interface->pending_peer_path = peer->path;
4974 }
4975
4976 static void signal_group_failure(const char *path, DBusMessageIter *iter)
4977 {
4978         GSupplicantInterface *interface;
4979         struct group_sig_data data = {};
4980         GSupplicantPeer *peer;
4981
4982         SUPPLICANT_DBG("");
4983
4984         interface = g_hash_table_lookup(interface_table, path);
4985         if (!interface)
4986                 return;
4987
4988         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
4989         if (!data.peer_obj_path)
4990                 return;
4991
4992         peer = g_hash_table_lookup(interface->peer_table, data.peer_obj_path);
4993         if (!peer)
4994                 return;
4995
4996         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_FAILED);
4997         peer->connection_requested = false;
4998 }
4999
5000 static void signal_group_started(const char *path, DBusMessageIter *iter)
5001 {
5002         GSupplicantInterface *interface, *g_interface;
5003         struct group_sig_data data = {};
5004         GSupplicantGroup *group;
5005         GSupplicantPeer *peer;
5006
5007         SUPPLICANT_DBG("");
5008
5009         interface = g_hash_table_lookup(interface_table, path);
5010         if (!interface)
5011                 return;
5012
5013         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
5014         if (!data.interface_obj_path || !data.group_obj_path)
5015                 return;
5016
5017         peer = g_hash_table_lookup(interface->peer_table,
5018                                                 interface->pending_peer_path);
5019         interface->pending_peer_path = NULL;
5020         if (!peer)
5021                 return;
5022
5023         g_interface = g_hash_table_lookup(interface_table,
5024                                                 data.interface_obj_path);
5025         if (!g_interface)
5026                 return;
5027
5028         group = g_hash_table_lookup(interface->group_table,
5029                                                 data.group_obj_path);
5030         if (group)
5031                 return;
5032
5033         group = g_try_new0(GSupplicantGroup, 1);
5034         if (!group)
5035                 return;
5036
5037         group->interface = g_interface;
5038         group->orig_interface = interface;
5039         group->path = g_strdup(data.group_obj_path);
5040         group->role = data.role;
5041
5042         g_hash_table_insert(interface->group_table, group->path, group);
5043         g_hash_table_replace(group_mapping, group->path, group);
5044
5045         peer->current_group_iface = g_interface;
5046         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_STARTED);
5047 }
5048
5049 static void remove_peer_group_interface(GHashTable *group_table,
5050                                 const char* path)
5051 {
5052         GSupplicantGroup *group;
5053         GHashTableIter iter;
5054         gpointer value, key;
5055
5056         if (!group_table)
5057                 return;
5058
5059         group = g_hash_table_lookup(group_table, path);
5060
5061         if (!group || !group->orig_interface)
5062                 return;
5063
5064         g_hash_table_iter_init(&iter, group->orig_interface->peer_table);
5065
5066         while (g_hash_table_iter_next(&iter, &key, &value)) {
5067                 GSupplicantPeer *peer = value;
5068
5069                 if (peer->current_group_iface == group->interface)
5070                         peer->current_group_iface = NULL;
5071         }
5072 }
5073
5074 static void signal_group_finished(const char *path, DBusMessageIter *iter)
5075 {
5076         GSupplicantInterface *interface;
5077         struct group_sig_data data = {};
5078
5079         SUPPLICANT_DBG("");
5080
5081         interface = g_hash_table_lookup(interface_table, path);
5082         if (!interface)
5083                 return;
5084
5085         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
5086         if (!data.interface_obj_path || !data.group_obj_path)
5087                 return;
5088
5089         remove_peer_group_interface(interface->group_table, data.group_obj_path);
5090
5091         g_hash_table_remove(group_mapping, data.group_obj_path);
5092
5093         g_hash_table_remove(interface->group_table, data.group_obj_path);
5094 }
5095
5096 static void signal_group_request(const char *path, DBusMessageIter *iter)
5097 {
5098         GSupplicantInterface *interface;
5099         GSupplicantPeer *peer;
5100         const char *obj_path;
5101
5102         SUPPLICANT_DBG("");
5103
5104         interface = g_hash_table_lookup(interface_table, path);
5105         if (!interface)
5106                 return;
5107
5108         dbus_message_iter_get_basic(iter, &obj_path);
5109         if (!obj_path || !g_strcmp0(obj_path, "/"))
5110                 return;
5111
5112         peer = g_hash_table_lookup(interface->peer_table, obj_path);
5113         if (!peer)
5114                 return;
5115
5116         /*
5117          * Peer has been previously found and property set,
5118          * otherwise, defer connection to when peer property
5119          * is set.
5120          */
5121         if (peer->identifier)
5122                 callback_peer_request(peer);
5123         else
5124                 g_hash_table_replace(pending_peer_connection, peer->path, peer);
5125 }
5126
5127 static void signal_group_peer_joined(const char *path, DBusMessageIter *iter)
5128 {
5129         const char *peer_path = NULL;
5130         GSupplicantInterface *interface;
5131         GSupplicantGroup *group;
5132         GSupplicantPeer *peer;
5133
5134         SUPPLICANT_DBG("");
5135
5136         group = g_hash_table_lookup(group_mapping, path);
5137         if (!group)
5138                 return;
5139
5140         dbus_message_iter_get_basic(iter, &peer_path);
5141         if (!peer_path)
5142                 return;
5143
5144         interface = g_hash_table_lookup(peer_mapping, peer_path);
5145         if (!interface)
5146                 return;
5147
5148         peer = g_hash_table_lookup(interface->peer_table, peer_path);
5149         if (!peer)
5150                 return;
5151
5152         group->members = g_slist_prepend(group->members, g_strdup(peer_path));
5153
5154         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_JOINED);
5155 }
5156
5157 static void signal_group_peer_disconnected(const char *path, DBusMessageIter *iter)
5158 {
5159         const char *peer_path = NULL;
5160         GSupplicantInterface *interface;
5161         GSupplicantGroup *group;
5162         GSupplicantPeer *peer;
5163         GSList *elem;
5164
5165         SUPPLICANT_DBG("");
5166
5167         group = g_hash_table_lookup(group_mapping, path);
5168         if (!group)
5169                 return;
5170
5171         dbus_message_iter_get_basic(iter, &peer_path);
5172         if (!peer_path)
5173                 return;
5174
5175         for (elem = group->members; elem; elem = elem->next) {
5176                 if (!g_strcmp0(elem->data, peer_path))
5177                         break;
5178         }
5179
5180         if (!elem)
5181                 return;
5182
5183         g_free(elem->data);
5184         group->members = g_slist_delete_link(group->members, elem);
5185
5186         interface = g_hash_table_lookup(peer_mapping, peer_path);
5187         if (!interface)
5188                 return;
5189
5190         peer = g_hash_table_lookup(interface->peer_table, peer_path);
5191         if (!peer)
5192                 return;
5193
5194         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_DISCONNECTED);
5195         peer->connection_requested = false;
5196 }
5197
5198 #if defined TIZEN_EXT_WIFI_MESH
5199 const void *g_supplicant_interface_get_mesh_group_ssid(
5200                                                         GSupplicantInterface *interface,
5201                                                         unsigned int *ssid_len)
5202 {
5203         if (!ssid_len)
5204                 return NULL;
5205
5206         if (!interface || interface->group_info.ssid_len == 0) {
5207                 *ssid_len = 0;
5208                 return NULL;
5209         }
5210
5211         *ssid_len = interface->group_info.ssid_len;
5212         return interface->group_info.ssid;
5213 }
5214
5215 int g_supplicant_mesh_get_disconnect_reason(GSupplicantInterface *interface)
5216 {
5217         if (!interface)
5218                 return -EINVAL;
5219
5220         return interface->group_info.disconnect_reason;
5221 }
5222
5223 const char *g_supplicant_mesh_peer_get_address(GSupplicantMeshPeer *mesh_peer)
5224 {
5225         if (!mesh_peer || !mesh_peer->peer_address)
5226                 return NULL;
5227
5228         return mesh_peer->peer_address;
5229 }
5230
5231 int g_supplicant_mesh_peer_get_disconnect_reason(GSupplicantMeshPeer *mesh_peer)
5232 {
5233         if (!mesh_peer)
5234                 return -EINVAL;
5235
5236         return mesh_peer->disconnect_reason;
5237 }
5238
5239 static void callback_mesh_group_started(GSupplicantInterface *interface)
5240 {
5241         if (!callbacks_pointer)
5242                 return;
5243
5244         if (!callbacks_pointer->mesh_group_started)
5245                 return;
5246
5247         callbacks_pointer->mesh_group_started(interface);
5248 }
5249
5250 static void callback_mesh_group_removed(GSupplicantInterface *interface)
5251 {
5252         if (!callbacks_pointer)
5253                 return;
5254
5255         if (!callbacks_pointer->mesh_group_removed)
5256                 return;
5257
5258         callbacks_pointer->mesh_group_removed(interface);
5259 }
5260
5261 static void mesh_group_info(const char *key, DBusMessageIter *iter,
5262                                                         void *user_data)
5263 {
5264         GSupplicantInterface *interface = user_data;
5265         if (!key)
5266                 return;
5267
5268         if (g_strcmp0(key, "SSID") == 0) {
5269                 DBusMessageIter array;
5270                 unsigned char *ssid;
5271                 int ssid_len;
5272
5273                 dbus_message_iter_recurse(iter, &array);
5274                 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
5275
5276                 if (ssid_len > 0 && ssid_len < 33) {
5277                         memcpy(interface->group_info.ssid, ssid, ssid_len);
5278                         interface->group_info.ssid_len = ssid_len;
5279                 } else {
5280                         memset(interface->group_info.ssid, 0, 32);
5281                         interface->group_info.ssid_len = 0;
5282                 }
5283         } else if (g_strcmp0(key, "DisconnectReason") == 0) {
5284                 int disconnect_reason = 0;
5285                 dbus_message_iter_get_basic(iter, &disconnect_reason);
5286                 interface->group_info.disconnect_reason = disconnect_reason;
5287         }
5288 }
5289
5290 static void signal_mesh_group_started(const char *path, DBusMessageIter *iter)
5291 {
5292         GSupplicantInterface *interface;
5293
5294         interface = g_hash_table_lookup(interface_table, path);
5295         if (!interface)
5296                 return;
5297
5298         supplicant_dbus_property_foreach(iter, mesh_group_info, interface);
5299
5300         callback_mesh_group_started(interface);
5301 }
5302
5303 static void signal_mesh_group_removed(const char *path, DBusMessageIter *iter)
5304 {
5305         GSupplicantInterface *interface;
5306
5307         interface = g_hash_table_lookup(interface_table, path);
5308         if (!interface)
5309                 return;
5310
5311         supplicant_dbus_property_foreach(iter, mesh_group_info, interface);
5312
5313         callback_mesh_group_removed(interface);
5314 }
5315
5316 static void callback_mesh_peer_connected(GSupplicantMeshPeer *mesh_peer)
5317 {
5318         if (!callbacks_pointer)
5319                 return;
5320
5321         if (!callbacks_pointer->mesh_peer_connected)
5322                 return;
5323
5324         callbacks_pointer->mesh_peer_connected(mesh_peer);
5325 }
5326
5327 static void callback_mesh_peer_disconnected(GSupplicantMeshPeer *mesh_peer)
5328 {
5329         if (!callbacks_pointer)
5330                 return;
5331
5332         if (!callbacks_pointer->mesh_peer_disconnected)
5333                 return;
5334
5335         callbacks_pointer->mesh_peer_disconnected(mesh_peer);
5336 }
5337
5338 static void mesh_peer_info(const char *key, DBusMessageIter *iter,
5339                                                         void *user_data)
5340 {
5341         GSupplicantMeshPeer *mesh_peer = user_data;
5342         if (!key)
5343                 return;
5344
5345         if (g_strcmp0(key, "PeerAddress") == 0) {
5346                 DBusMessageIter array;
5347                 unsigned char *addr;
5348                 int addr_len;
5349
5350                 dbus_message_iter_recurse(iter, &array);
5351                 dbus_message_iter_get_fixed_array(&array, &addr, &addr_len);
5352
5353                 if (addr_len == 6) {
5354                         mesh_peer->peer_address = g_malloc0(19);
5355                         snprintf(mesh_peer->peer_address, 19,
5356                                          "%02x:%02x:%02x:%02x:%02x:%02x", addr[0], addr[1],
5357                                          addr[2], addr[3], addr[4], addr[5]);
5358                 }
5359         } else if (g_strcmp0(key, "DisconnectReason") == 0) {
5360                 int disconnect_reason = 0;
5361                 dbus_message_iter_get_basic(iter, &disconnect_reason);
5362                 mesh_peer->disconnect_reason = disconnect_reason;
5363         }
5364 }
5365
5366 static void signal_mesh_peer_connected(const char *path, DBusMessageIter *iter)
5367 {
5368         GSupplicantInterface *interface;
5369         GSupplicantMeshPeer *mesh_peer;
5370
5371         interface = g_hash_table_lookup(interface_table, path);
5372         if (!interface)
5373                 return;
5374
5375         mesh_peer = dbus_malloc0(sizeof(GSupplicantMeshPeer));
5376         mesh_peer->interface = interface;
5377
5378         supplicant_dbus_property_foreach(iter, mesh_peer_info, mesh_peer);
5379
5380         callback_mesh_peer_connected(mesh_peer);
5381         g_free(mesh_peer->peer_address);
5382         g_free(mesh_peer);
5383 }
5384
5385 static void signal_mesh_peer_disconnected(const char *path,
5386                                                                 DBusMessageIter *iter)
5387 {
5388         GSupplicantInterface *interface;
5389         GSupplicantMeshPeer *mesh_peer;
5390
5391         interface = g_hash_table_lookup(interface_table, path);
5392         if (!interface)
5393                 return;
5394
5395         mesh_peer = dbus_malloc0(sizeof(GSupplicantMeshPeer));
5396         mesh_peer->interface = interface;
5397
5398         supplicant_dbus_property_foreach(iter, mesh_peer_info, mesh_peer);
5399
5400         callback_mesh_peer_disconnected(mesh_peer);
5401         g_free(mesh_peer->peer_address);
5402         g_free(mesh_peer);
5403 }
5404 #endif
5405
5406 static struct {
5407         const char *interface;
5408         const char *member;
5409         void (*function) (const char *path, DBusMessageIter *iter);
5410 } signal_map[] = {
5411         { DBUS_INTERFACE_DBUS,  "NameOwnerChanged",  signal_name_owner_changed },
5412
5413         { SUPPLICANT_INTERFACE, "PropertiesChanged", signal_properties_changed },
5414         { SUPPLICANT_INTERFACE, "InterfaceAdded",    signal_interface_added    },
5415         { SUPPLICANT_INTERFACE, "InterfaceCreated",  signal_interface_added    },
5416         { SUPPLICANT_INTERFACE, "InterfaceRemoved",  signal_interface_removed  },
5417
5418         { SUPPLICANT_INTERFACE ".Interface", "PropertiesChanged", signal_interface_changed },
5419         { SUPPLICANT_INTERFACE ".Interface", "ScanDone",          signal_scan_done         },
5420         { SUPPLICANT_INTERFACE ".Interface", "BSSAdded",          signal_bss_added         },
5421         { SUPPLICANT_INTERFACE ".Interface", "BSSRemoved",        signal_bss_removed       },
5422         { SUPPLICANT_INTERFACE ".Interface", "NetworkAdded",      signal_network_added     },
5423         { SUPPLICANT_INTERFACE ".Interface", "NetworkRemoved",    signal_network_removed   },
5424         { SUPPLICANT_INTERFACE ".Interface", "StaAuthorized",     signal_sta_authorized    },
5425         { SUPPLICANT_INTERFACE ".Interface", "StaDeauthorized",   signal_sta_deauthorized  },
5426
5427         { SUPPLICANT_INTERFACE ".BSS", "PropertiesChanged", signal_bss_changed   },
5428
5429         { SUPPLICANT_INTERFACE ".Interface.WPS", "Credentials", signal_wps_credentials },
5430         { SUPPLICANT_INTERFACE ".Interface.WPS", "Event",       signal_wps_event       },
5431 #if defined TIZEN_EXT
5432         { "org.tizen.system.deviced.PowerOff", "ChangeState", signal_power_off },
5433 #endif
5434
5435         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeviceFound", signal_peer_found },
5436         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeviceLost",  signal_peer_lost  },
5437
5438         { SUPPLICANT_INTERFACE ".Peer", "PropertiesChanged", signal_peer_changed },
5439
5440         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationSuccess", signal_group_success },
5441         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationFailure", signal_group_failure },
5442         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GroupStarted", signal_group_started },
5443         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GroupFinished", signal_group_finished },
5444         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationRequest", signal_group_request },
5445
5446         { SUPPLICANT_INTERFACE ".Group", "PeerJoined", signal_group_peer_joined },
5447         { SUPPLICANT_INTERFACE ".Group", "PeerDisconnected", signal_group_peer_disconnected },
5448 #if defined TIZEN_EXT_WIFI_MESH
5449         { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshGroupStarted",
5450                 signal_mesh_group_started },
5451         { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshGroupRemoved",
5452                 signal_mesh_group_removed },
5453         { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshPeerConnected",
5454                 signal_mesh_peer_connected },
5455         { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshPeerDisconnected",
5456                 signal_mesh_peer_disconnected },
5457 #endif
5458
5459 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
5460         { SUPPLICANT_INTERFACE ".Interface", "EAP", signal_eap },
5461 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
5462
5463         { }
5464 };
5465
5466 static DBusHandlerResult g_supplicant_filter(DBusConnection *conn,
5467                                         DBusMessage *message, void *data)
5468 {
5469         DBusMessageIter iter;
5470         const char *path;
5471         int i;
5472
5473         path = dbus_message_get_path(message);
5474         if (!path)
5475                 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
5476
5477         if (!dbus_message_iter_init(message, &iter))
5478                 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
5479
5480         for (i = 0; signal_map[i].interface; i++) {
5481                 if (!dbus_message_has_interface(message, signal_map[i].interface))
5482                         continue;
5483
5484                 if (!dbus_message_has_member(message, signal_map[i].member))
5485                         continue;
5486
5487                 signal_map[i].function(path, &iter);
5488                 break;
5489         }
5490
5491         return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
5492 }
5493
5494 void g_supplicant_interface_cancel(GSupplicantInterface *interface)
5495 {
5496         SUPPLICANT_DBG("Cancelling any pending DBus calls");
5497         supplicant_dbus_method_call_cancel_all(interface);
5498         supplicant_dbus_property_call_cancel_all(interface);
5499 }
5500
5501 struct supplicant_regdom {
5502         GSupplicantCountryCallback callback;
5503         const char *alpha2;
5504         const void *user_data;
5505 };
5506
5507 static void country_result(const char *error,
5508                                 DBusMessageIter *iter, void *user_data)
5509 {
5510         struct supplicant_regdom *regdom = user_data;
5511         int result = 0;
5512
5513         SUPPLICANT_DBG("Country setting result");
5514
5515         if (!user_data)
5516                 return;
5517
5518         if (error) {
5519                 SUPPLICANT_DBG("Country setting failure %s", error);
5520                 result = -EINVAL;
5521         }
5522
5523         if (regdom->callback)
5524                 regdom->callback(result, regdom->alpha2,
5525                                         (void *) regdom->user_data);
5526
5527         g_free(regdom);
5528 }
5529
5530 static void country_params(DBusMessageIter *iter, void *user_data)
5531 {
5532         struct supplicant_regdom *regdom = user_data;
5533
5534         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING,
5535                                                         &regdom->alpha2);
5536 }
5537
5538 int g_supplicant_set_country(const char *alpha2,
5539                                 GSupplicantCountryCallback callback,
5540                                         const void *user_data)
5541 {
5542         struct supplicant_regdom *regdom;
5543         int ret;
5544
5545         SUPPLICANT_DBG("Country setting %s", alpha2);
5546
5547         if (!system_available)
5548                 return -EFAULT;
5549
5550         regdom = dbus_malloc0(sizeof(*regdom));
5551         if (!regdom)
5552                 return -ENOMEM;
5553
5554         regdom->callback = callback;
5555         regdom->alpha2 = alpha2;
5556         regdom->user_data = user_data;
5557
5558         ret =  supplicant_dbus_property_set(SUPPLICANT_PATH, SUPPLICANT_INTERFACE,
5559                                         "Country", DBUS_TYPE_STRING_AS_STRING,
5560                                         country_params, country_result,
5561                                         regdom, NULL);
5562         if (ret < 0) {
5563                 dbus_free(regdom);
5564                 SUPPLICANT_DBG("Unable to set Country configuration");
5565         }
5566         return ret;
5567 }
5568
5569 int g_supplicant_interface_set_country(GSupplicantInterface *interface,
5570                                         GSupplicantCountryCallback callback,
5571                                                         const char *alpha2,
5572                                                         void *user_data)
5573 {
5574         struct supplicant_regdom *regdom;
5575         int ret;
5576
5577         regdom = dbus_malloc0(sizeof(*regdom));
5578         if (!regdom)
5579                 return -ENOMEM;
5580
5581         regdom->callback = callback;
5582         regdom->alpha2 = alpha2;
5583         regdom->user_data = user_data;
5584
5585         ret =  supplicant_dbus_property_set(interface->path,
5586                                 SUPPLICANT_INTERFACE ".Interface",
5587                                 "Country", DBUS_TYPE_STRING_AS_STRING,
5588                                 country_params, country_result,
5589                                         regdom, NULL);
5590         if (ret < 0) {
5591                 dbus_free(regdom);
5592                 SUPPLICANT_DBG("Unable to set Country configuration");
5593         }
5594
5595         return ret;
5596 }
5597
5598 bool g_supplicant_interface_has_p2p(GSupplicantInterface *interface)
5599 {
5600         if (!interface)
5601                 return false;
5602
5603         return interface->p2p_support;
5604 }
5605
5606 struct supplicant_p2p_dev_config {
5607         char *device_name;
5608         char *dev_type;
5609 };
5610
5611 static void p2p_device_config_result(const char *error,
5612                                         DBusMessageIter *iter, void *user_data)
5613 {
5614         struct supplicant_p2p_dev_config *config = user_data;
5615
5616         if (error)
5617                 SUPPLICANT_DBG("Unable to set P2P Device configuration: %s",
5618                                                                         error);
5619
5620         g_free(config->device_name);
5621         g_free(config->dev_type);
5622         dbus_free(config);
5623 }
5624
5625 static int dev_type_str2bin(const char *type, unsigned char dev_type[8])
5626 {
5627         int length, pos, end;
5628         char b[3] = {};
5629         char *e = NULL;
5630
5631         end = strlen(type);
5632         for (length = pos = 0; type[pos] != '\0' && length < 8; length++) {
5633                 if (pos+2 > end)
5634                         return 0;
5635
5636                 b[0] = type[pos];
5637                 b[1] = type[pos+1];
5638
5639                 dev_type[length] = strtol(b, &e, 16);
5640                 if (e && *e != '\0')
5641                         return 0;
5642
5643                 pos += 2;
5644         }
5645
5646         return 8;
5647 }
5648
5649 static void p2p_device_config_params(DBusMessageIter *iter, void *user_data)
5650 {
5651         struct supplicant_p2p_dev_config *config = user_data;
5652         DBusMessageIter dict;
5653
5654         supplicant_dbus_dict_open(iter, &dict);
5655
5656         supplicant_dbus_dict_append_basic(&dict, "DeviceName",
5657                                 DBUS_TYPE_STRING, &config->device_name);
5658
5659         if (config->dev_type) {
5660                 unsigned char dev_type[8] = {}, *type;
5661                 int len;
5662
5663                 len = dev_type_str2bin(config->dev_type, dev_type);
5664                 if (len) {
5665                         type = dev_type;
5666                         supplicant_dbus_dict_append_fixed_array(&dict,
5667                                         "PrimaryDeviceType",
5668                                         DBUS_TYPE_BYTE, &type, len);
5669                 }
5670         }
5671
5672         supplicant_dbus_dict_close(iter, &dict);
5673 }
5674
5675 int g_supplicant_interface_set_p2p_device_config(GSupplicantInterface *interface,
5676                                         const char *device_name,
5677                                         const char *primary_dev_type)
5678 {
5679         struct supplicant_p2p_dev_config *config;
5680         int ret;
5681
5682         SUPPLICANT_DBG("P2P Device settings %s/%s",
5683                                         device_name, primary_dev_type);
5684
5685         config = dbus_malloc0(sizeof(*config));
5686         if (!config)
5687                 return -ENOMEM;
5688
5689         config->device_name = g_strdup(device_name);
5690         config->dev_type = g_strdup(primary_dev_type);
5691
5692         ret = supplicant_dbus_property_set(interface->path,
5693                                 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
5694                                 "P2PDeviceConfig",
5695                                 DBUS_TYPE_ARRAY_AS_STRING
5696                                 DBUS_DICT_ENTRY_BEGIN_CHAR_AS_STRING
5697                                 DBUS_TYPE_STRING_AS_STRING
5698                                 DBUS_TYPE_VARIANT_AS_STRING
5699                                 DBUS_DICT_ENTRY_END_CHAR_AS_STRING,
5700                                 p2p_device_config_params,
5701                                 p2p_device_config_result, config, NULL);
5702         if (ret < 0) {
5703                 g_free(config->device_name);
5704                 g_free(config->dev_type);
5705                 dbus_free(config);
5706                 SUPPLICANT_DBG("Unable to set P2P Device configuration");
5707         }
5708
5709         return ret;
5710 }
5711
5712 static gboolean peer_lookup_by_identifier(gpointer key, gpointer value,
5713                                                         gpointer user_data)
5714 {
5715         const GSupplicantPeer *peer = value;
5716         const char *identifier = user_data;
5717
5718         if (!g_strcmp0(identifier, peer->identifier))
5719                 return TRUE;
5720
5721         return FALSE;
5722 }
5723
5724 GSupplicantPeer *g_supplicant_interface_peer_lookup(GSupplicantInterface *interface,
5725                                                         const char *identifier)
5726 {
5727         GSupplicantPeer *peer;
5728
5729         peer = g_hash_table_find(interface->peer_table,
5730                                         peer_lookup_by_identifier,
5731                                         (void *) identifier);
5732         return peer;
5733 }
5734
5735 static void interface_create_data_free(struct interface_create_data *data)
5736 {
5737         g_free(data->ifname);
5738         g_free(data->driver);
5739         g_free(data->bridge);
5740 #if defined TIZEN_EXT_WIFI_MESH
5741         g_free(data->parent_ifname);
5742 #endif
5743         dbus_free(data);
5744 }
5745
5746 static bool interface_exists(GSupplicantInterface *interface,
5747                                 const char *path)
5748 {
5749         GSupplicantInterface *tmp;
5750
5751         tmp = g_hash_table_lookup(interface_table, path);
5752         if (tmp && tmp == interface)
5753                 return true;
5754
5755         return false;
5756 }
5757
5758 static void interface_create_property(const char *key, DBusMessageIter *iter,
5759                                                         void *user_data)
5760 {
5761         struct interface_create_data *data = user_data;
5762         GSupplicantInterface *interface = data->interface;
5763
5764         if (!key) {
5765                 if (data->callback) {
5766                         data->callback(0, data->interface, data->user_data);
5767 #if !defined TIZEN_EXT
5768                         callback_p2p_support(interface);
5769 #endif
5770 #if defined TIZEN_EXT_WIFI_MESH
5771                         callback_mesh_support(interface);
5772 #endif
5773                 }
5774
5775                 interface_create_data_free(data);
5776         }
5777
5778         interface_property(key, iter, interface);
5779 }
5780
5781 static void interface_create_result(const char *error,
5782                                 DBusMessageIter *iter, void *user_data)
5783 {
5784         struct interface_create_data *data = user_data;
5785         const char *path = NULL;
5786         int err;
5787
5788         SUPPLICANT_DBG("");
5789
5790         if (error) {
5791                 g_warning("error %s", error);
5792                 err = -EIO;
5793                 goto done;
5794         }
5795
5796         dbus_message_iter_get_basic(iter, &path);
5797         if (!path) {
5798                 err = -EINVAL;
5799                 goto done;
5800         }
5801
5802         if (!system_available) {
5803                 err = -EFAULT;
5804                 goto done;
5805         }
5806
5807         data->interface = g_hash_table_lookup(interface_table, path);
5808         if (!data->interface) {
5809                 data->interface = interface_alloc(path);
5810                 if (!data->interface) {
5811                         err = -ENOMEM;
5812                         goto done;
5813                 }
5814         }
5815
5816         err = supplicant_dbus_property_get_all(path,
5817                                         SUPPLICANT_INTERFACE ".Interface",
5818                                         interface_create_property, data,
5819                                         NULL);
5820         if (err == 0)
5821                 return;
5822
5823 done:
5824         if (data->callback)
5825                 data->callback(err, NULL, data->user_data);
5826
5827         interface_create_data_free(data);
5828 }
5829
5830 static void interface_create_params(DBusMessageIter *iter, void *user_data)
5831 {
5832         struct interface_create_data *data = user_data;
5833         DBusMessageIter dict;
5834         char *config_file = NULL;
5835
5836         SUPPLICANT_DBG("");
5837
5838         supplicant_dbus_dict_open(iter, &dict);
5839
5840         supplicant_dbus_dict_append_basic(&dict, "Ifname",
5841                                         DBUS_TYPE_STRING, &data->ifname);
5842
5843         if (data->driver)
5844                 supplicant_dbus_dict_append_basic(&dict, "Driver",
5845                                         DBUS_TYPE_STRING, &data->driver);
5846
5847         if (data->bridge)
5848                 supplicant_dbus_dict_append_basic(&dict, "BridgeIfname",
5849                                         DBUS_TYPE_STRING, &data->bridge);
5850
5851         config_file = g_hash_table_lookup(config_file_table, data->ifname);
5852         if (config_file) {
5853                 SUPPLICANT_DBG("[%s] ConfigFile %s", data->ifname, config_file);
5854
5855                 supplicant_dbus_dict_append_basic(&dict, "ConfigFile",
5856                                         DBUS_TYPE_STRING, &config_file);
5857         }
5858
5859 #ifdef TIZEN_EXT
5860         if (data->driver && g_strstr_len(data->driver, strlen(data->driver), "nl80211")) {
5861                 supplicant_dbus_dict_append_basic(&dict, "MacAddr",
5862                                 DBUS_TYPE_UINT32, &data->mac_addr);
5863
5864                 supplicant_dbus_dict_append_basic(&dict, "PreassocMacAddr",
5865                                 DBUS_TYPE_UINT32, &data->preassoc_mac_addr);
5866
5867                 supplicant_dbus_dict_append_basic(&dict, "RandAddrLifetime",
5868                                 DBUS_TYPE_UINT32, &data->random_mac_lifetime);
5869         }
5870 #endif /* TIZEN_EXT */
5871
5872 #if defined TIZEN_EXT_WIFI_MESH
5873         if (data->is_mesh_interface) {
5874                 if (data->parent_ifname)
5875                         supplicant_dbus_dict_append_basic(&dict, "ParentIfname",
5876                                         DBUS_TYPE_STRING, &data->parent_ifname);
5877
5878                 supplicant_dbus_dict_append_basic(&dict, "IsMeshInterface",
5879                                         DBUS_TYPE_BOOLEAN, &data->is_mesh_interface);
5880         }
5881 #endif
5882
5883         supplicant_dbus_dict_close(iter, &dict);
5884 }
5885
5886 #if defined TIZEN_EXT
5887 static void interface_get_state(const char *key, DBusMessageIter *iter,
5888                 void *user_data)
5889 {
5890         struct interface_create_data *data = user_data;
5891         GSupplicantInterface *interface = NULL;
5892         const char *str = NULL;
5893
5894         SUPPLICANT_DBG("key[%s]", key);
5895
5896         if (!data) {
5897                 SUPPLICANT_DBG("data is NULL");
5898                 return;
5899         }
5900
5901         interface = data->interface;
5902         if (!interface) {
5903                 SUPPLICANT_DBG("interface is NULL");
5904                 return;
5905         }
5906
5907         if (iter)
5908                 dbus_message_iter_get_basic(iter, &str);
5909
5910         if (str) {
5911                 if (string2state(str) != interface->state)
5912                         interface->state = string2state(str);
5913         }
5914
5915         if (interface->state == G_SUPPLICANT_STATE_DISABLED)
5916                 interface->ready = FALSE;
5917         else
5918                 interface->ready = TRUE;
5919
5920         SUPPLICANT_DBG("state %s (%d)", str, interface->state);
5921
5922         if (data->callback) {
5923                 data->callback(0, interface, data->user_data);
5924 #if defined TIZEN_EXT_WIFI_MESH
5925                 callback_mesh_support(interface);
5926 #endif
5927         }
5928
5929         interface_create_data_free(data);
5930 }
5931 #endif
5932
5933 static void interface_get_result(const char *error,
5934                                 DBusMessageIter *iter, void *user_data)
5935 {
5936         struct interface_create_data *data = user_data;
5937         GSupplicantInterface *interface;
5938         const char *path = NULL;
5939         int err;
5940
5941 #if defined TIZEN_EXT
5942         if (!simplified_log)
5943 #endif
5944         SUPPLICANT_DBG("");
5945
5946         if (error) {
5947                 SUPPLICANT_DBG("Interface not created yet");
5948                 goto create;
5949         }
5950
5951         dbus_message_iter_get_basic(iter, &path);
5952         if (!path) {
5953                 err = -EINVAL;
5954                 goto done;
5955         }
5956
5957         interface = g_hash_table_lookup(interface_table, path);
5958         if (!interface) {
5959                 err = -ENOENT;
5960                 goto done;
5961         }
5962
5963 #if defined TIZEN_EXT
5964         data->interface = interface;
5965         err = supplicant_dbus_property_get(path,
5966                         SUPPLICANT_INTERFACE ".Interface",
5967                         "State", interface_get_state, data, NULL);
5968
5969         if (err == 0)
5970                 return;
5971 #endif
5972
5973         if (data->callback) {
5974                 data->callback(0, interface, data->user_data);
5975 #if !defined TIZEN_EXT
5976                 callback_p2p_support(interface);
5977 #endif
5978 #if defined TIZEN_EXT_WIFI_MESH
5979                 callback_mesh_support(interface);
5980 #endif
5981         }
5982
5983         interface_create_data_free(data);
5984
5985         return;
5986
5987 create:
5988         if (!system_available) {
5989                 err = -EFAULT;
5990                 goto done;
5991         }
5992
5993         SUPPLICANT_DBG("Creating interface");
5994
5995         err = supplicant_dbus_method_call(SUPPLICANT_PATH,
5996                                                 SUPPLICANT_INTERFACE,
5997                                                 "CreateInterface",
5998                                                 interface_create_params,
5999                                                 interface_create_result, data,
6000                                                 NULL);
6001         if (err == 0)
6002                 return;
6003
6004 done:
6005         if (data->callback)
6006                 data->callback(err, NULL, data->user_data);
6007
6008         interface_create_data_free(data);
6009 }
6010
6011 static void interface_get_params(DBusMessageIter *iter, void *user_data)
6012 {
6013         struct interface_create_data *data = user_data;
6014 #if defined TIZEN_EXT
6015         if (!simplified_log)
6016 #endif
6017         SUPPLICANT_DBG("");
6018
6019         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, &data->ifname);
6020 }
6021
6022 #if defined TIZEN_EXT_WIFI_MESH
6023 int g_supplicant_mesh_interface_create(const char *ifname, const char *driver,
6024                                                 const char *bridge, const char *parent_ifname,
6025                                                 GSupplicantInterfaceCallback callback, void *user_data)
6026 {
6027         struct interface_create_data *data;
6028         int ret;
6029
6030         SUPPLICANT_DBG("ifname %s", ifname);
6031
6032         if (!ifname || !parent_ifname)
6033                 return -EINVAL;
6034
6035         if (!system_available)
6036                 return -EFAULT;
6037
6038         data = dbus_malloc0(sizeof(*data));
6039         if (!data)
6040                 return -ENOMEM;
6041
6042         data->ifname = g_strdup(ifname);
6043         data->driver = g_strdup(driver);
6044         data->bridge = g_strdup(bridge);
6045         data->is_mesh_interface = true;
6046         data->parent_ifname = g_strdup(parent_ifname);
6047         data->callback = callback;
6048         data->user_data = user_data;
6049
6050         ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
6051                                                 SUPPLICANT_INTERFACE,
6052                                                 "CreateInterface",
6053                                                 interface_create_params,
6054                                                 interface_create_result, data,
6055                                                 NULL);
6056         return ret;
6057 }
6058
6059 struct interface_mesh_peer_data {
6060         char *peer_address;
6061         char *method;
6062         GSupplicantInterface *interface;
6063         GSupplicantInterfaceCallback callback;
6064         void *user_data;
6065 };
6066
6067 static void interface_mesh_change_peer_params(DBusMessageIter *iter,
6068                                                 void *user_data)
6069 {
6070         struct interface_mesh_peer_data *data = user_data;
6071
6072         SUPPLICANT_DBG("");
6073
6074         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, &data->peer_address);
6075 }
6076
6077 static void interface_mesh_change_peer_result(const char *error,
6078                                 DBusMessageIter *iter, void *user_data)
6079 {
6080         struct interface_mesh_peer_data *data = user_data;
6081         int err = 0;
6082
6083         SUPPLICANT_DBG("%s", data->method);
6084
6085         if (error) {
6086                 err = -EIO;
6087                 SUPPLICANT_DBG("error %s", error);
6088         }
6089
6090         if (data->callback)
6091                 data->callback(err, data->interface, data->user_data);
6092
6093         g_free(data->peer_address);
6094         g_free(data->method);
6095         dbus_free(data);
6096 }
6097
6098 int g_supplicant_interface_mesh_peer_change_status(
6099                                 GSupplicantInterface *interface,
6100                                 GSupplicantInterfaceCallback callback, const char *peer_address,
6101                                 const char *method, void *user_data)
6102 {
6103         struct interface_mesh_peer_data *data;
6104         int ret;
6105
6106         if (!peer_address)
6107                 return -EINVAL;
6108
6109         data = dbus_malloc0(sizeof(*data));
6110         if (!data)
6111                 return -ENOMEM;
6112
6113         data->peer_address = g_strdup(peer_address);
6114         data->method = g_strdup(method);
6115         data->interface = interface;
6116         data->callback = callback;
6117         data->user_data = user_data;
6118
6119         ret = supplicant_dbus_method_call(interface->path,
6120                                                 SUPPLICANT_INTERFACE ".Interface.Mesh",
6121                                                 method, interface_mesh_change_peer_params,
6122                                                 interface_mesh_change_peer_result, data, NULL);
6123         if (ret < 0) {
6124                 g_free(data->peer_address);
6125                 g_free(data->method);
6126                 dbus_free(data);
6127         }
6128
6129         return ret;
6130 }
6131 #endif
6132
6133 int g_supplicant_interface_create(const char *ifname, const char *driver,
6134                                         const char *bridge,
6135 #ifdef TIZEN_EXT
6136                                         unsigned int mac_policy,
6137                                         unsigned int preassoc_mac_policy,
6138                                         unsigned int random_mac_lifetime,
6139 #endif /* TIZEN_EXT */
6140                                         GSupplicantInterfaceCallback callback,
6141                                                         void *user_data)
6142 {
6143         struct interface_create_data *data;
6144         int ret;
6145
6146         SUPPLICANT_DBG("ifname %s", ifname);
6147
6148         if (!ifname)
6149                 return -EINVAL;
6150
6151         if (!system_available)
6152                 return -EFAULT;
6153
6154         data = dbus_malloc0(sizeof(*data));
6155         if (!data)
6156                 return -ENOMEM;
6157
6158         data->ifname = g_strdup(ifname);
6159         data->driver = g_strdup(driver);
6160         data->bridge = g_strdup(bridge);
6161         data->callback = callback;
6162 #ifdef TIZEN_EXT
6163         data->mac_addr = mac_policy;
6164         data->preassoc_mac_addr = preassoc_mac_policy;
6165         data->random_mac_lifetime = random_mac_lifetime;
6166 #endif /* TIZEN_EXT */
6167         data->user_data = user_data;
6168
6169         ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
6170                                                 SUPPLICANT_INTERFACE,
6171                                                 "GetInterface",
6172                                                 interface_get_params,
6173                                                 interface_get_result, data,
6174                                                 NULL);
6175         if (ret < 0)
6176                 interface_create_data_free(data);
6177
6178         return ret;
6179 }
6180
6181 static void interface_remove_result(const char *error,
6182                                 DBusMessageIter *iter, void *user_data)
6183 {
6184         struct interface_data *data = user_data;
6185         int err;
6186
6187         if (error) {
6188                 err = -EIO;
6189                 SUPPLICANT_DBG("error: %s", error);
6190                 goto done;
6191         }
6192
6193         if (!system_available) {
6194                 err = -EFAULT;
6195                 goto done;
6196         }
6197
6198         /*
6199          * The gsupplicant interface is already freed by the InterfaceRemoved
6200          * signal callback. Simply invoke the interface_data callback.
6201          */
6202         err = 0;
6203
6204 done:
6205         g_free(data->path);
6206
6207         if (data->callback)
6208                 data->callback(err, NULL, data->user_data);
6209
6210         dbus_free(data);
6211 }
6212
6213
6214 static void interface_remove_params(DBusMessageIter *iter, void *user_data)
6215 {
6216         struct interface_data *data = user_data;
6217
6218         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
6219                                                         &data->interface->path);
6220 }
6221
6222 int g_supplicant_interface_remove(GSupplicantInterface *interface,
6223                         GSupplicantInterfaceCallback callback,
6224                                                         void *user_data)
6225 {
6226         struct interface_data *data;
6227         int ret;
6228
6229         if (!interface)
6230                 return -EINVAL;
6231
6232         if (!system_available)
6233                 return -EFAULT;
6234
6235         g_supplicant_interface_cancel(interface);
6236
6237         data = dbus_malloc0(sizeof(*data));
6238         if (!data)
6239                 return -ENOMEM;
6240
6241         data->interface = interface;
6242         data->path = g_strdup(interface->path);
6243         data->callback = callback;
6244         data->user_data = user_data;
6245
6246         ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
6247                                                 SUPPLICANT_INTERFACE,
6248                                                 "RemoveInterface",
6249                                                 interface_remove_params,
6250                                                 interface_remove_result, data,
6251                                                 NULL);
6252         if (ret < 0) {
6253                 g_free(data->path);
6254                 dbus_free(data);
6255         }
6256         return ret;
6257 }
6258
6259 static void interface_scan_result(const char *error,
6260                                 DBusMessageIter *iter, void *user_data)
6261 {
6262         struct interface_scan_data *data = user_data;
6263         int err = 0;
6264
6265         if (error) {
6266                 SUPPLICANT_DBG("error %s", error);
6267                 err = -EIO;
6268         }
6269
6270         /* A non ready interface cannot send/receive anything */
6271         if (interface_exists(data->interface, data->path)) {
6272                 if (!data->interface->ready)
6273                         err = -ENOLINK;
6274         }
6275
6276         g_free(data->path);
6277
6278         if (err != 0) {
6279                 if (data->callback)
6280                         data->callback(err, data->interface, data->user_data);
6281         } else {
6282                 data->interface->scan_callback = data->callback;
6283                 data->interface->scan_data = data->user_data;
6284         }
6285
6286         if (data->scan_params)
6287                 g_supplicant_free_scan_params(data->scan_params);
6288
6289         dbus_free(data);
6290 }
6291
6292 static void add_scan_frequency(DBusMessageIter *iter, unsigned int freq)
6293 {
6294         DBusMessageIter data;
6295         unsigned int width = 0; /* Not used by wpa_supplicant atm */
6296
6297         dbus_message_iter_open_container(iter, DBUS_TYPE_STRUCT, NULL, &data);
6298
6299         dbus_message_iter_append_basic(&data, DBUS_TYPE_UINT32, &freq);
6300         dbus_message_iter_append_basic(&data, DBUS_TYPE_UINT32, &width);
6301
6302         dbus_message_iter_close_container(iter, &data);
6303 }
6304
6305 static void add_scan_frequencies(DBusMessageIter *iter,
6306                                                 void *user_data)
6307 {
6308         GSupplicantScanParams *scan_data = user_data;
6309         unsigned int freq;
6310         int i;
6311
6312         for (i = 0; i < scan_data->num_freqs; i++) {
6313                 freq = scan_data->freqs[i];
6314                 if (!freq)
6315                         break;
6316
6317                 add_scan_frequency(iter, freq);
6318         }
6319 }
6320
6321 static void append_ssid(DBusMessageIter *iter,
6322                         const void *ssid, unsigned int len)
6323 {
6324         DBusMessageIter array;
6325
6326         dbus_message_iter_open_container(iter, DBUS_TYPE_ARRAY,
6327         DBUS_TYPE_BYTE_AS_STRING, &array);
6328
6329         dbus_message_iter_append_fixed_array(&array, DBUS_TYPE_BYTE,
6330                                                                 &ssid, len);
6331         dbus_message_iter_close_container(iter, &array);
6332 }
6333
6334 static void append_ssids(DBusMessageIter *iter, void *user_data)
6335 {
6336         GSupplicantScanParams *scan_data = user_data;
6337         GSList *list;
6338
6339         for (list = scan_data->ssids; list; list = list->next) {
6340                 struct scan_ssid *scan_ssid = list->data;
6341
6342                 append_ssid(iter, scan_ssid->ssid, scan_ssid->ssid_len);
6343         }
6344 }
6345
6346 static void supplicant_add_scan_frequency(DBusMessageIter *dict,
6347                 supplicant_dbus_array_function function,
6348                                         void *user_data)
6349 {
6350         GSupplicantScanParams *scan_params = user_data;
6351         DBusMessageIter entry, value, array;
6352         const char *key = "Channels";
6353
6354         if (scan_params->freqs && scan_params->freqs[0] != 0) {
6355                 dbus_message_iter_open_container(dict, DBUS_TYPE_DICT_ENTRY,
6356                                                 NULL, &entry);
6357
6358                 dbus_message_iter_append_basic(&entry, DBUS_TYPE_STRING, &key);
6359
6360                 dbus_message_iter_open_container(&entry, DBUS_TYPE_VARIANT,
6361                                         DBUS_TYPE_ARRAY_AS_STRING
6362                                         DBUS_STRUCT_BEGIN_CHAR_AS_STRING
6363                                         DBUS_TYPE_UINT32_AS_STRING
6364                                         DBUS_TYPE_UINT32_AS_STRING
6365                                         DBUS_STRUCT_END_CHAR_AS_STRING,
6366                                         &value);
6367
6368                 dbus_message_iter_open_container(&value, DBUS_TYPE_ARRAY,
6369                                         DBUS_STRUCT_BEGIN_CHAR_AS_STRING
6370                                         DBUS_TYPE_UINT32_AS_STRING
6371                                         DBUS_TYPE_UINT32_AS_STRING
6372                                         DBUS_STRUCT_END_CHAR_AS_STRING,
6373                                         &array);
6374
6375                 if (function)
6376                         function(&array, user_data);
6377
6378                 dbus_message_iter_close_container(&value, &array);
6379                 dbus_message_iter_close_container(&entry, &value);
6380                 dbus_message_iter_close_container(dict, &entry);
6381         }
6382 }
6383
6384 static void interface_scan_params(DBusMessageIter *iter, void *user_data)
6385 {
6386         DBusMessageIter dict;
6387         const char *type = "passive";
6388         struct interface_scan_data *data = user_data;
6389
6390         supplicant_dbus_dict_open(iter, &dict);
6391
6392         if (data && data->scan_params) {
6393                 type = "active";
6394
6395                 supplicant_dbus_dict_append_basic(&dict, "Type",
6396                                         DBUS_TYPE_STRING, &type);
6397
6398 #if defined TIZEN_EXT
6399                 SUPPLICANT_DBG("[specific_scan] num_ssids %d",
6400                                data->scan_params->num_ssids);
6401 #endif
6402
6403                 if (data->scan_params->ssids) {
6404                         supplicant_dbus_dict_append_array(&dict, "SSIDs",
6405                                                         DBUS_TYPE_STRING,
6406                                                         append_ssids,
6407                                                         data->scan_params);
6408                 }
6409                 supplicant_add_scan_frequency(&dict, add_scan_frequencies,
6410                                                 data->scan_params);
6411         } else
6412                 supplicant_dbus_dict_append_basic(&dict, "Type",
6413                                         DBUS_TYPE_STRING, &type);
6414
6415         supplicant_dbus_dict_close(iter, &dict);
6416 }
6417
6418 static int interface_ready_to_scan(GSupplicantInterface *interface)
6419 {
6420         if (!interface)
6421                 return -EINVAL;
6422
6423         if (!system_available)
6424                 return -EFAULT;
6425
6426         if (interface->scanning)
6427                 return -EALREADY;
6428
6429         switch (interface->state) {
6430         case G_SUPPLICANT_STATE_AUTHENTICATING:
6431         case G_SUPPLICANT_STATE_ASSOCIATING:
6432         case G_SUPPLICANT_STATE_ASSOCIATED:
6433         case G_SUPPLICANT_STATE_4WAY_HANDSHAKE:
6434         case G_SUPPLICANT_STATE_GROUP_HANDSHAKE:
6435                 return -EBUSY;
6436 #if defined TIZEN_EXT
6437         case G_SUPPLICANT_STATE_DISABLED:
6438                 return -ENOLINK;
6439         case G_SUPPLICANT_STATE_UNKNOWN:
6440 #else
6441         case G_SUPPLICANT_STATE_UNKNOWN:
6442         case G_SUPPLICANT_STATE_DISABLED:
6443 #endif
6444         case G_SUPPLICANT_STATE_DISCONNECTED:
6445         case G_SUPPLICANT_STATE_INACTIVE:
6446         case G_SUPPLICANT_STATE_SCANNING:
6447         case G_SUPPLICANT_STATE_COMPLETED:
6448                 break;
6449         }
6450
6451         return 0;
6452 }
6453
6454 #if defined TIZEN_EXT_WIFI_MESH
6455 static void interface_abort_scan_result(const char *error,
6456                                 DBusMessageIter *iter, void *user_data)
6457 {
6458         struct interface_scan_data *data = user_data;
6459         int err = 0;
6460
6461         if (error) {
6462                 SUPPLICANT_DBG("error %s", error);
6463                 err = -EIO;
6464         }
6465
6466         g_free(data->path);
6467
6468                 if (data->callback)
6469                         data->callback(err, data->interface, data->user_data);
6470
6471         dbus_free(data);
6472 }
6473
6474 int g_supplicant_interface_abort_scan(GSupplicantInterface *interface,
6475                                 GSupplicantInterfaceCallback callback, void *user_data)
6476 {
6477         struct interface_scan_data *data;
6478         int ret;
6479
6480         if (!interface->scanning)
6481                 return -EEXIST;
6482
6483         data = dbus_malloc0(sizeof(*data));
6484         if (!data)
6485                 return -ENOMEM;
6486
6487         data->interface = interface;
6488         data->path = g_strdup(interface->path);
6489         data->callback = callback;
6490         data->user_data = user_data;
6491
6492         ret = supplicant_dbus_method_call(interface->path,
6493                         SUPPLICANT_INTERFACE ".Interface", "AbortScan", NULL,
6494                         interface_abort_scan_result, data, interface);
6495
6496         if (ret < 0) {
6497                 g_free(data->path);
6498                 dbus_free(data);
6499         }
6500
6501         return ret;
6502 }
6503 #endif
6504
6505 int g_supplicant_interface_scan(GSupplicantInterface *interface,
6506                                 GSupplicantScanParams *scan_data,
6507                                 GSupplicantInterfaceCallback callback,
6508                                                         void *user_data)
6509 {
6510         struct interface_scan_data *data;
6511         int ret;
6512
6513         ret = interface_ready_to_scan(interface);
6514         if (ret)
6515                 return ret;
6516
6517         data = dbus_malloc0(sizeof(*data));
6518         if (!data)
6519                 return -ENOMEM;
6520
6521         data->interface = interface;
6522         data->path = g_strdup(interface->path);
6523 #if defined TIZEN_EXT
6524         data->interface->scan_callback = data->callback = callback;
6525         data->interface->scan_data = data->user_data = user_data;
6526 #else
6527         data->callback = callback;
6528         data->user_data = user_data;
6529 #endif
6530         data->scan_params = scan_data;
6531
6532         interface->scan_callback = callback;
6533         interface->scan_data = user_data;
6534
6535         ret = supplicant_dbus_method_call(interface->path,
6536                         SUPPLICANT_INTERFACE ".Interface", "Scan",
6537                         interface_scan_params, interface_scan_result, data,
6538                         interface);
6539
6540         if (ret < 0) {
6541                 g_free(data->path);
6542                 dbus_free(data);
6543         }
6544
6545         return ret;
6546 }
6547
6548 #if defined TIZEN_EXT
6549 static void interface_signalpoll_result(const char *error,
6550                                 DBusMessageIter *iter, void *user_data)
6551 {
6552         struct interface_signalpoll_data *data = user_data;
6553         int err = 0;
6554         dbus_int32_t maxspeed = 0;
6555         dbus_int32_t strength = 0;
6556         dbus_int32_t snr = 0;
6557         DBusMessageIter sub_iter, dict;
6558
6559         if (error) {
6560                 err = -EIO;
6561                 SUPPLICANT_DBG("error: %s", error);
6562                 goto out;
6563         }
6564
6565         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_VARIANT) {
6566                 err = -EINVAL;
6567                 SUPPLICANT_DBG("invalid reply");
6568                 goto out;
6569         }
6570
6571         dbus_message_iter_recurse(iter, &sub_iter);
6572         dbus_message_iter_recurse(&sub_iter, &dict);
6573
6574         while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_DICT_ENTRY) {
6575                 DBusMessageIter entry, value;
6576                 const char *key;
6577
6578                 dbus_message_iter_recurse(&dict, &entry);
6579                 dbus_message_iter_get_basic(&entry, &key);
6580                 dbus_message_iter_next(&entry);
6581                 dbus_message_iter_recurse(&entry, &value);
6582
6583                 switch (dbus_message_iter_get_arg_type(&value)) {
6584                 case DBUS_TYPE_INT32:
6585                         if (g_strcmp0(key, "linkspeed") == 0) {
6586                                 dbus_message_iter_get_basic(&value, &maxspeed);
6587                                 SUPPLICANT_DBG("linkspeed = %d", maxspeed);
6588                                 break;
6589                         } else if (g_strcmp0(key, "rssi") == 0) {
6590                                 dbus_message_iter_get_basic(&value, &strength);
6591                                 SUPPLICANT_DBG("Strength = %d", strength);
6592                                 break;
6593                         } else if (g_strcmp0(key, "SNR") == 0) {
6594                                 dbus_message_iter_get_basic(&value, &snr);
6595                                 SUPPLICANT_DBG("SNR = %d", snr);
6596                                 break;
6597                         }
6598                 }
6599                 dbus_message_iter_next(&dict);
6600         }
6601
6602 out:
6603         if(data->callback)
6604                 data->callback(err, maxspeed, strength, snr, data->user_data);
6605
6606         g_free(data->path);
6607         dbus_free(data);
6608 }
6609
6610 int g_supplicant_interface_signalpoll(GSupplicantInterface *interface,
6611                                 GSupplicantMaxSpeedCallback callback,
6612                                 void *user_data)
6613 {
6614         struct interface_signalpoll_data *data;
6615         int ret;
6616
6617         if (!interface)
6618                 return -EINVAL;
6619
6620         if (!system_available)
6621                 return -EFAULT;
6622
6623         data = dbus_malloc0(sizeof(*data));
6624         if (!data)
6625                 return -ENOMEM;
6626
6627         data->interface = interface;
6628         data->path = g_strdup(interface->path);
6629         data->callback = callback;
6630         data->user_data = user_data;
6631
6632         ret = supplicant_dbus_method_call(interface->path,
6633                         SUPPLICANT_INTERFACE ".Interface", "SignalPoll",
6634                         NULL, interface_signalpoll_result, data,
6635                         interface);
6636
6637         if (ret < 0) {
6638                 g_free(data->path);
6639                 dbus_free(data);
6640         }
6641
6642         return ret;
6643 }
6644 #endif
6645
6646 static int parse_supplicant_error(DBusMessageIter *iter)
6647 {
6648         int err = -ECONNABORTED;
6649         char *key;
6650
6651         if (!iter)
6652                 return err;
6653
6654         /* If the given passphrase is malformed wpa_s returns
6655          * "invalid message format" but this error should be interpreted as
6656          * invalid-key.
6657          */
6658         while (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_STRING) {
6659                 dbus_message_iter_get_basic(iter, &key);
6660                 if (strncmp(key, "psk", 3) == 0 ||
6661                                 strncmp(key, "wep_key", 7) == 0 ||
6662                                 strcmp(key, "invalid message format") == 0) {
6663                         err = -ENOKEY;
6664                         break;
6665                 }
6666                 dbus_message_iter_next(iter);
6667         }
6668
6669         return err;
6670 }
6671
6672 static void interface_select_network_result(const char *error,
6673                                 DBusMessageIter *iter, void *user_data)
6674 {
6675         struct interface_connect_data *data = user_data;
6676         int err;
6677
6678         SUPPLICANT_DBG("");
6679
6680         err = 0;
6681         if (error) {
6682 #if defined TIZEN_EXT
6683                 SUPPLICANT_DBG("SelectNetwork errorFreq %s", error);
6684 #else
6685                 SUPPLICANT_DBG("SelectNetwork error %s", error);
6686 #endif
6687                 err = parse_supplicant_error(iter);
6688         }
6689
6690         g_free(data->path);
6691
6692         if (data->callback)
6693                 data->callback(err, data->interface, data->user_data);
6694
6695 #if defined TIZEN_EXT
6696         g_free(data->ssid->ssid);
6697         g_free((char *)data->ssid->passphrase);
6698         g_free((char *)data->ssid->connector);
6699         g_free((char *)data->ssid->c_sign_key);
6700         g_free((char *)data->ssid->net_access_key);
6701 #endif
6702         g_free(data->ssid);
6703         dbus_free(data);
6704 }
6705
6706 static void interface_select_network_params(DBusMessageIter *iter,
6707                                                         void *user_data)
6708 {
6709         struct interface_connect_data *data = user_data;
6710         GSupplicantInterface *interface = data->interface;
6711 #if defined TIZEN_EXT
6712         GSupplicantSSID *ssid = data->ssid;
6713 #endif
6714
6715         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
6716                                         &interface->network_path);
6717 #if defined TIZEN_EXT
6718         if (!ssid->bssid_for_connect_len)
6719                 dbus_message_iter_append_basic(iter, DBUS_TYPE_INT32, &ssid->freq);
6720 #endif
6721 }
6722
6723 static void interface_add_network_result(const char *error,
6724                                 DBusMessageIter *iter, void *user_data)
6725 {
6726         struct interface_connect_data *data = user_data;
6727         GSupplicantInterface *interface = data->interface;
6728         const char *path;
6729         int err;
6730
6731         if (error)
6732                 goto error;
6733
6734         dbus_message_iter_get_basic(iter, &path);
6735         if (!path)
6736                 goto error;
6737
6738         SUPPLICANT_DBG("PATH: %s", path);
6739
6740 #if defined TIZEN_EXT
6741         if (interface->network_path)
6742                 g_free(interface->network_path);
6743 #endif
6744         interface->network_path = g_strdup(path);
6745
6746         store_network_information(interface, data->ssid);
6747
6748 #if defined TIZEN_EXT
6749         SUPPLICANT_DBG(".Interface.SelectNetworkFreq");
6750         GSupplicantSSID *ssid = data->ssid;
6751
6752         if (!ssid->bssid_for_connect_len)
6753                 supplicant_dbus_method_call(data->interface->path,
6754                                 SUPPLICANT_INTERFACE ".Interface", "SelectNetworkFreq",
6755                                 interface_select_network_params,
6756                                 interface_select_network_result, data,
6757                                 interface);
6758         else
6759                 supplicant_dbus_method_call(data->interface->path,
6760                                 SUPPLICANT_INTERFACE ".Interface", "SelectNetwork",
6761                                 interface_select_network_params,
6762                                 interface_select_network_result, data,
6763                                 interface);
6764 #else
6765         supplicant_dbus_method_call(data->interface->path,
6766                         SUPPLICANT_INTERFACE ".Interface", "SelectNetwork",
6767                         interface_select_network_params,
6768                         interface_select_network_result, data,
6769                         interface);
6770 #endif
6771
6772         return;
6773
6774 error:
6775         SUPPLICANT_DBG("AddNetwork error %s", error);
6776
6777         if (interface_exists(data->interface, data->interface->path)) {
6778                 err = parse_supplicant_error(iter);
6779                 if (data->callback)
6780                         data->callback(err, data->interface, data->user_data);
6781
6782                 g_free(interface->network_path);
6783                 interface->network_path = NULL;
6784         }
6785
6786         g_free(data->path);
6787 #if defined TIZEN_EXT
6788         g_free(data->ssid->ssid);
6789         g_free((char *)data->ssid->passphrase);
6790         g_free((char *)data->ssid->connector);
6791         g_free((char *)data->ssid->c_sign_key);
6792         g_free((char *)data->ssid->net_access_key);
6793 #endif
6794         g_free(data->ssid);
6795         g_free(data);
6796 }
6797
6798 static void add_network_security_none(DBusMessageIter *dict)
6799 {
6800         const char *auth_alg = "OPEN";
6801
6802         supplicant_dbus_dict_append_basic(dict, "auth_alg",
6803                                         DBUS_TYPE_STRING, &auth_alg);
6804 }
6805
6806 static void add_network_security_wep(DBusMessageIter *dict,
6807                                         GSupplicantSSID *ssid)
6808 {
6809         const char *auth_alg = "OPEN SHARED";
6810         dbus_uint32_t key_index = 0;
6811
6812         supplicant_dbus_dict_append_basic(dict, "auth_alg",
6813                                         DBUS_TYPE_STRING, &auth_alg);
6814
6815         if (ssid->passphrase) {
6816                 int size = strlen(ssid->passphrase);
6817                 if (size == 10 || size == 26) {
6818                         unsigned char *key = g_try_malloc(13);
6819                         char tmp[3];
6820                         int i;
6821
6822                         memset(tmp, 0, sizeof(tmp));
6823                         if (!key)
6824                                 size = 0;
6825
6826                         for (i = 0; i < size / 2; i++) {
6827                                 memcpy(tmp, ssid->passphrase + (i * 2), 2);
6828                                 key[i] = (unsigned char) strtol(tmp, NULL, 16);
6829                         }
6830
6831                         supplicant_dbus_dict_append_fixed_array(dict,
6832                                                         "wep_key0",
6833                                                         DBUS_TYPE_BYTE,
6834                                                         &key, size / 2);
6835                         g_free(key);
6836                 } else if (size == 5 || size == 13) {
6837                         unsigned char *key = g_try_malloc(13);
6838                         int i;
6839
6840                         if (!key)
6841                                 size = 0;
6842
6843                         for (i = 0; i < size; i++)
6844                                 key[i] = (unsigned char) ssid->passphrase[i];
6845
6846                         supplicant_dbus_dict_append_fixed_array(dict,
6847                                                                 "wep_key0",
6848                                                                 DBUS_TYPE_BYTE,
6849                                                                 &key, size);
6850                         g_free(key);
6851                 } else
6852                         supplicant_dbus_dict_append_basic(dict,
6853                                                         "wep_key0",
6854                                                         DBUS_TYPE_STRING,
6855                                                         &ssid->passphrase);
6856
6857                 supplicant_dbus_dict_append_basic(dict, "wep_tx_keyidx",
6858                                         DBUS_TYPE_UINT32, &key_index);
6859         }
6860 }
6861
6862 static dbus_bool_t is_psk_raw_key(const char *psk)
6863 {
6864         int i;
6865
6866         /* A raw key is always 64 bytes length... */
6867         if (strlen(psk) != 64)
6868                 return FALSE;
6869
6870         /* ... and its content is in hex representation */
6871         for (i = 0; i < 64; i++)
6872                 if (!isxdigit((unsigned char) psk[i]))
6873                         return FALSE;
6874
6875         return TRUE;
6876 }
6877
6878 static unsigned char hexchar2bin(char c)
6879 {
6880         if ((c >= '0') && (c <= '9'))
6881                 return c - '0';
6882         else if ((c >= 'A') && (c <= 'F'))
6883                 return c - 'A' + 10;
6884         else if ((c >= 'a') && (c <= 'f'))
6885                 return c - 'a' + 10;
6886         else
6887                 return c;
6888 }
6889
6890 static void hexstring2bin(const char *string, unsigned char *data,
6891                                 size_t data_len)
6892 {
6893         size_t i;
6894
6895         for (i = 0; i < data_len; i++)
6896                 data[i] = (hexchar2bin(string[i * 2 + 0]) << 4 |
6897                            hexchar2bin(string[i * 2 + 1]) << 0);
6898 }
6899
6900 static void add_network_security_psk(DBusMessageIter *dict,
6901                                         GSupplicantSSID *ssid)
6902 {
6903         if (ssid->passphrase && strlen(ssid->passphrase) > 0) {
6904                 const char *key = "psk";
6905
6906                 if (is_psk_raw_key(ssid->passphrase)) {
6907                         unsigned char data[32];
6908                         unsigned char *datap = data;
6909
6910                         /* The above pointer alias is required by D-Bus because
6911                          * with D-Bus and GCC, non-heap-allocated arrays cannot
6912                          * be passed directly by their base pointer. */
6913
6914                         hexstring2bin(ssid->passphrase, datap, sizeof(data));
6915
6916                         supplicant_dbus_dict_append_fixed_array(dict,
6917                                                         key, DBUS_TYPE_BYTE,
6918                                                         &datap, sizeof(data));
6919                 } else
6920                         supplicant_dbus_dict_append_basic(dict,
6921                                                         key, DBUS_TYPE_STRING,
6922                                                         &ssid->passphrase);
6923         }
6924 }
6925
6926 static void add_network_security_tls(DBusMessageIter *dict,
6927                                         GSupplicantSSID *ssid)
6928 {
6929         /*
6930          * For TLS, we at least need:
6931          *              The client certificate
6932          *              The client private key file
6933          *              The client private key file password
6934          *
6935          * The Authority certificate is optional.
6936          */
6937         if (!ssid->client_cert_path)
6938                 return;
6939
6940         if (!ssid->private_key_path)
6941                 return;
6942
6943         if (!ssid->private_key_passphrase)
6944                 return;
6945
6946         if (ssid->ca_cert_path)
6947                 supplicant_dbus_dict_append_basic(dict, "ca_cert",
6948                                         DBUS_TYPE_STRING, &ssid->ca_cert_path);
6949
6950         supplicant_dbus_dict_append_basic(dict, "private_key",
6951                                                 DBUS_TYPE_STRING,
6952                                                 &ssid->private_key_path);
6953         supplicant_dbus_dict_append_basic(dict, "private_key_passwd",
6954                                                 DBUS_TYPE_STRING,
6955                                                 &ssid->private_key_passphrase);
6956         supplicant_dbus_dict_append_basic(dict, "client_cert",
6957                                                 DBUS_TYPE_STRING,
6958                                                 &ssid->client_cert_path);
6959 }
6960
6961 static void add_network_security_peap(DBusMessageIter *dict,
6962                                         GSupplicantSSID *ssid)
6963 {
6964         char *phase2_auth;
6965
6966         /*
6967          * For PEAP/TTLS, we at least need
6968          *              The authority certificate
6969          *              The 2nd phase authentication method
6970          *              The 2nd phase passphrase
6971          *
6972          * The Client certificate is optional although strongly recommended
6973          * When setting it, we need in addition
6974          *              The Client private key file
6975          *              The Client private key file password
6976          */
6977         if (!ssid->passphrase)
6978                 return;
6979
6980         if (!ssid->phase2_auth)
6981                 return;
6982
6983         if (ssid->client_cert_path) {
6984                 if (!ssid->private_key_path)
6985                         return;
6986
6987 #if !defined TIZEN_EXT
6988                 if (!ssid->private_key_passphrase)
6989                         return;
6990 #endif
6991
6992                 supplicant_dbus_dict_append_basic(dict, "client_cert",
6993                                                 DBUS_TYPE_STRING,
6994                                                 &ssid->client_cert_path);
6995
6996                 supplicant_dbus_dict_append_basic(dict, "private_key",
6997                                                 DBUS_TYPE_STRING,
6998                                                 &ssid->private_key_path);
6999
7000 #if !defined TIZEN_EXT
7001                 supplicant_dbus_dict_append_basic(dict, "private_key_passwd",
7002                                                 DBUS_TYPE_STRING,
7003                                                 &ssid->private_key_passphrase);
7004 #endif
7005
7006         }
7007
7008         if(g_strcmp0(ssid->phase2_auth, "GTC") == 0 && g_strcmp0(ssid->eap, "ttls") == 0)
7009                 phase2_auth = g_strdup_printf("autheap=%s", ssid->phase2_auth);
7010         else if (g_str_has_prefix(ssid->phase2_auth, "EAP-")) {
7011                 phase2_auth = g_strdup_printf("autheap=%s",
7012                                         ssid->phase2_auth + strlen("EAP-"));
7013         } else
7014                 phase2_auth = g_strdup_printf("auth=%s", ssid->phase2_auth);
7015
7016         supplicant_dbus_dict_append_basic(dict, "password",
7017                                                 DBUS_TYPE_STRING,
7018                                                 &ssid->passphrase);
7019
7020         if (ssid->ca_cert_path)
7021                 supplicant_dbus_dict_append_basic(dict, "ca_cert",
7022                                                 DBUS_TYPE_STRING,
7023                                                 &ssid->ca_cert_path);
7024
7025         supplicant_dbus_dict_append_basic(dict, "phase2",
7026                                                 DBUS_TYPE_STRING,
7027                                                 &phase2_auth);
7028
7029         g_free(phase2_auth);
7030 }
7031
7032 #if defined TIZEN_EXT
7033 static void add_network_security_aka_sim(DBusMessageIter *dict,
7034                                         GSupplicantSSID *ssid)
7035 {
7036         if (!ssid->passphrase)
7037                 return;
7038
7039         supplicant_dbus_dict_append_basic(dict, "password",
7040                         DBUS_TYPE_STRING,
7041                         &ssid->passphrase);
7042 }
7043
7044 static void add_network_security_fast(DBusMessageIter *dict,
7045                 GSupplicantSSID *ssid)
7046 {
7047         /*
7048          * For FAST, we at least need:
7049          *              id / password
7050          *              phase1 (provisiong information)
7051          *              pac_file
7052          */
7053
7054         /* Allow provisioing both authenticated and unauthenticated */
7055         const char *phase1 = "fast_provisioning=2";
7056         supplicant_dbus_dict_append_basic(dict, "phase1",
7057                         DBUS_TYPE_STRING,
7058                         &phase1);
7059
7060         SUPPLICANT_DBG("pac_file [%s]", ssid->pac_file);
7061         if(ssid->pac_file)
7062                 supplicant_dbus_dict_append_basic(dict, "pac_file",
7063                                 DBUS_TYPE_STRING,
7064                                 &ssid->pac_file);
7065
7066         supplicant_dbus_dict_append_basic(dict, "password",
7067                         DBUS_TYPE_STRING,
7068                         &ssid->passphrase);
7069 }
7070 #endif
7071
7072 static void add_network_security_eap(DBusMessageIter *dict,
7073                                         GSupplicantSSID *ssid)
7074 {
7075         char *eap_value;
7076
7077 #if defined TIZEN_EXT
7078         if (!ssid->eap)
7079 #else
7080         if (!ssid->eap || !ssid->identity)
7081 #endif
7082                 return;
7083
7084         if (g_strcmp0(ssid->eap, "tls") == 0) {
7085                 add_network_security_tls(dict, ssid);
7086         } else if (g_strcmp0(ssid->eap, "peap") == 0 ||
7087                                 g_strcmp0(ssid->eap, "ttls") == 0) {
7088 #if defined TIZEN_EXT
7089                 if (!ssid->identity)
7090                         return;
7091 #endif
7092                 add_network_security_peap(dict, ssid);
7093
7094 #if defined TIZEN_EXT
7095         } else if (g_strcmp0(ssid->eap, "sim") == 0 ||
7096                         g_strcmp0(ssid->eap, "aka") == 0 ||
7097                         g_strcmp0(ssid->eap, "aka'") == 0) {
7098                 add_network_security_aka_sim(dict, ssid);
7099         } else if (g_strcmp0(ssid->eap, "pwd") == 0) {
7100                 if(!ssid->passphrase)
7101                         return;
7102                 supplicant_dbus_dict_append_basic(dict, "password",
7103                                 DBUS_TYPE_STRING,
7104                                 &ssid->passphrase);
7105         } else if (g_strcmp0(ssid->eap, "fast") == 0){
7106                 if (!ssid->identity || !ssid->passphrase)
7107                         return;
7108
7109                 add_network_security_fast(dict, ssid);
7110 #endif
7111         } else
7112                 return;
7113
7114         eap_value = g_ascii_strup(ssid->eap, -1);
7115
7116         supplicant_dbus_dict_append_basic(dict, "eap",
7117                                                 DBUS_TYPE_STRING,
7118                                                 &eap_value);
7119 #if defined TIZEN_EXT
7120         if (ssid->identity != NULL)
7121                 supplicant_dbus_dict_append_basic(dict, "identity",
7122                                                         DBUS_TYPE_STRING,
7123                                                         &ssid->identity);
7124 #else
7125         supplicant_dbus_dict_append_basic(dict, "identity",
7126                                                 DBUS_TYPE_STRING,
7127                                                 &ssid->identity);
7128 #endif
7129         if(ssid->anonymous_identity)
7130                 supplicant_dbus_dict_append_basic(dict, "anonymous_identity",
7131                                                      DBUS_TYPE_STRING,
7132                                                      &ssid->anonymous_identity);
7133
7134         if(ssid->subject_match)
7135                 supplicant_dbus_dict_append_basic(dict, "subject_match",
7136                                                      DBUS_TYPE_STRING,
7137                                                      &ssid->subject_match);
7138
7139         if(ssid->altsubject_match)
7140                 supplicant_dbus_dict_append_basic(dict, "altsubject_match",
7141                                                      DBUS_TYPE_STRING,
7142                                                      &ssid->altsubject_match);
7143
7144         if(ssid->domain_suffix_match)
7145                 supplicant_dbus_dict_append_basic(dict, "domain_suffix_match",
7146                                                      DBUS_TYPE_STRING,
7147                                                      &ssid->domain_suffix_match);
7148
7149         if(ssid->domain_match)
7150                 supplicant_dbus_dict_append_basic(dict, "domain_match",
7151                                                      DBUS_TYPE_STRING,
7152                                                      &ssid->domain_match);
7153
7154         g_free(eap_value);
7155 }
7156
7157 static void add_network_security_ciphers(DBusMessageIter *dict,
7158                                                 GSupplicantSSID *ssid)
7159 {
7160         unsigned int p_cipher, g_cipher, i;
7161         char *pairwise, *group;
7162         char *pair_ciphers[4];
7163         char *group_ciphers[5];
7164
7165         p_cipher = ssid->pairwise_cipher;
7166         g_cipher = ssid->group_cipher;
7167
7168         if (p_cipher == 0 && g_cipher == 0)
7169                 return;
7170
7171         i = 0;
7172
7173         if (p_cipher & G_SUPPLICANT_PAIRWISE_CCMP)
7174                 pair_ciphers[i++] = "CCMP";
7175
7176         if (p_cipher & G_SUPPLICANT_PAIRWISE_TKIP)
7177                 pair_ciphers[i++] = "TKIP";
7178
7179         if (p_cipher & G_SUPPLICANT_PAIRWISE_NONE)
7180                 pair_ciphers[i++] = "NONE";
7181
7182         pair_ciphers[i] = NULL;
7183
7184         i = 0;
7185
7186         if (g_cipher & G_SUPPLICANT_GROUP_CCMP)
7187                 group_ciphers[i++] = "CCMP";
7188
7189         if (g_cipher & G_SUPPLICANT_GROUP_TKIP)
7190                 group_ciphers[i++] = "TKIP";
7191
7192         if (g_cipher & G_SUPPLICANT_GROUP_WEP104)
7193                 group_ciphers[i++] = "WEP104";
7194
7195         if (g_cipher & G_SUPPLICANT_GROUP_WEP40)
7196                 group_ciphers[i++] = "WEP40";
7197
7198         group_ciphers[i] = NULL;
7199
7200         pairwise = g_strjoinv(" ", pair_ciphers);
7201         group = g_strjoinv(" ", group_ciphers);
7202
7203         SUPPLICANT_DBG("cipher %s %s", pairwise, group);
7204
7205         supplicant_dbus_dict_append_basic(dict, "pairwise",
7206                                                 DBUS_TYPE_STRING,
7207                                                 &pairwise);
7208         supplicant_dbus_dict_append_basic(dict, "group",
7209                                                 DBUS_TYPE_STRING,
7210                                                 &group);
7211
7212         g_free(pairwise);
7213         g_free(group);
7214 }
7215
7216 static void add_network_security_proto(DBusMessageIter *dict,
7217                                                 GSupplicantSSID *ssid)
7218 {
7219         unsigned int protocol, i;
7220         char *proto;
7221         char *protos[3];
7222
7223         protocol = ssid->protocol;
7224
7225         if (protocol == 0)
7226                 return;
7227
7228         i = 0;
7229
7230         if (protocol & G_SUPPLICANT_PROTO_RSN)
7231                 protos[i++] = "RSN";
7232
7233         if (protocol & G_SUPPLICANT_PROTO_WPA)
7234                 protos[i++] = "WPA";
7235
7236         protos[i] = NULL;
7237
7238         proto = g_strjoinv(" ", protos);
7239
7240         SUPPLICANT_DBG("proto %s", proto);
7241
7242         supplicant_dbus_dict_append_basic(dict, "proto",
7243                                                 DBUS_TYPE_STRING,
7244                                                 &proto);
7245
7246         g_free(proto);
7247 }
7248
7249 #if defined TIZEN_EXT
7250 static void add_network_ieee80211w(DBusMessageIter *dict, GSupplicantSSID *ssid)
7251 {
7252         if (ssid->security != G_SUPPLICANT_SECURITY_SAE
7253                         && ssid->security != G_SUPPLICANT_SECURITY_OWE
7254                         && ssid->security != G_SUPPLICANT_SECURITY_DPP)
7255                 return;
7256
7257         supplicant_dbus_dict_append_basic(dict, "ieee80211w", DBUS_TYPE_UINT32,
7258                                           &ssid->ieee80211w);
7259 }
7260
7261 static void add_network_security_connector(DBusMessageIter *dict, GSupplicantSSID *ssid)
7262 {
7263         if (ssid->connector && strlen(ssid->connector) > 0) {
7264                 const char *key = "dpp_connector";
7265
7266                 supplicant_dbus_dict_append_basic(dict,
7267                                 key, DBUS_TYPE_STRING,
7268                                 &ssid->connector);
7269         }
7270 }
7271
7272 static size_t convert_hexstr_to_bin(const char *hex_str, unsigned char **bin)
7273 {
7274         unsigned char *bin_res = NULL;
7275         unsigned int i, j, hex;
7276         size_t hex_str_len;
7277
7278         if (!hex_str || strlen(hex_str) == 0)
7279                 return 0;
7280
7281         hex_str_len = strlen(hex_str);
7282         bin_res = g_try_malloc0(hex_str_len / 2);
7283         if (!bin_res)
7284                 return 0;
7285
7286         j = 0;
7287         for (i = 0; i < hex_str_len; i+=2) {
7288                 sscanf(hex_str + i, "%02x", &hex);
7289                 bin_res[j++] = hex;
7290         }
7291
7292         *bin = bin_res;
7293         return hex_str_len / 2;
7294 }
7295
7296 static void add_network_security_c_sign_key(DBusMessageIter *dict, GSupplicantSSID *ssid)
7297 {
7298         if (ssid->c_sign_key && strlen(ssid->c_sign_key) > 0) {
7299                 const char *key = "dpp_csign";
7300                 unsigned char *bin_csign = NULL;
7301                 size_t bin_csign_len = convert_hexstr_to_bin(ssid->c_sign_key, &bin_csign);
7302                 if  (bin_csign_len != 0)
7303                         supplicant_dbus_dict_append_fixed_array(dict,
7304                                         key, DBUS_TYPE_BYTE,
7305                                         &bin_csign, bin_csign_len);
7306                 g_free(bin_csign);
7307         }
7308 }
7309
7310 static void add_network_security_net_access_key(DBusMessageIter *dict, GSupplicantSSID *ssid)
7311 {
7312         if (ssid->net_access_key && strlen(ssid->net_access_key) > 0) {
7313                 const char *key = "dpp_netaccesskey";
7314                 unsigned char *bin_netaccesskey = NULL;
7315                 size_t bin_netaccesskey_len = convert_hexstr_to_bin(ssid->net_access_key, &bin_netaccesskey);
7316                 if  (bin_netaccesskey_len != 0)
7317                         supplicant_dbus_dict_append_fixed_array(dict,
7318                                         key, DBUS_TYPE_BYTE,
7319                                         &bin_netaccesskey, bin_netaccesskey_len);
7320                 g_free(bin_netaccesskey);
7321         }
7322 }
7323
7324 #endif
7325
7326 static void add_network_security(DBusMessageIter *dict, GSupplicantSSID *ssid)
7327 {
7328         char *key_mgmt;
7329
7330         switch (ssid->security) {
7331         case G_SUPPLICANT_SECURITY_NONE:
7332                 key_mgmt = "NONE";
7333                 add_network_security_none(dict);
7334                 add_network_security_ciphers(dict, ssid);
7335                 break;
7336         case G_SUPPLICANT_SECURITY_UNKNOWN:
7337         case G_SUPPLICANT_SECURITY_WEP:
7338                 key_mgmt = "NONE";
7339                 add_network_security_wep(dict, ssid);
7340                 add_network_security_ciphers(dict, ssid);
7341                 break;
7342         case G_SUPPLICANT_SECURITY_PSK:
7343                 key_mgmt = "WPA-PSK";
7344                 add_network_security_psk(dict, ssid);
7345                 add_network_security_ciphers(dict, ssid);
7346                 add_network_security_proto(dict, ssid);
7347                 break;
7348         case G_SUPPLICANT_SECURITY_IEEE8021X:
7349                 key_mgmt = "WPA-EAP";
7350                 add_network_security_eap(dict, ssid);
7351                 add_network_security_ciphers(dict, ssid);
7352                 add_network_security_proto(dict, ssid);
7353                 break;
7354 #if defined TIZEN_EXT
7355         case G_SUPPLICANT_SECURITY_FT_PSK:
7356                 key_mgmt = "FT-PSK";
7357                 add_network_security_psk(dict, ssid);
7358                 add_network_security_ciphers(dict, ssid);
7359                 add_network_security_proto(dict, ssid);
7360                 break;
7361         case G_SUPPLICANT_SECURITY_FT_IEEE8021X:
7362                 key_mgmt = "FT-EAP";
7363                 add_network_security_eap(dict, ssid);
7364                 add_network_security_ciphers(dict, ssid);
7365                 add_network_security_proto(dict, ssid);
7366                 break;
7367         case G_SUPPLICANT_SECURITY_SAE:
7368                 if (ssid->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_PSK)
7369                         key_mgmt = "SAE WPA-PSK"; // WFA (WPA3 & WPA2 Mixed -> WPA2 only)
7370                 else
7371                         key_mgmt = "SAE";
7372                 add_network_security_psk(dict, ssid);
7373                 break;
7374         case G_SUPPLICANT_SECURITY_OWE:
7375                 key_mgmt = "OWE";
7376                 add_network_security_ciphers(dict, ssid);
7377                 add_network_security_proto(dict, ssid);
7378                 break;
7379         case G_SUPPLICANT_SECURITY_DPP:
7380                 key_mgmt = "DPP";
7381                 add_network_security_connector(dict, ssid);
7382                 add_network_security_c_sign_key(dict, ssid);
7383                 add_network_security_net_access_key(dict, ssid);
7384                 break;
7385 #endif
7386         }
7387
7388         supplicant_dbus_dict_append_basic(dict, "key_mgmt",
7389                                 DBUS_TYPE_STRING, &key_mgmt);
7390 }
7391
7392 static void add_network_mode(DBusMessageIter *dict, GSupplicantSSID *ssid)
7393 {
7394         dbus_uint32_t mode;
7395
7396         switch (ssid->mode) {
7397         case G_SUPPLICANT_MODE_UNKNOWN:
7398         case G_SUPPLICANT_MODE_INFRA:
7399                 mode = 0;
7400                 break;
7401         case G_SUPPLICANT_MODE_IBSS:
7402                 mode = 1;
7403                 break;
7404         case G_SUPPLICANT_MODE_MASTER:
7405                 mode = 2;
7406                 break;
7407 #if defined TIZEN_EXT_WIFI_MESH
7408         case G_SUPPLICANT_MODE_MESH:
7409                 mode = 5;
7410                 break;
7411 #endif
7412         }
7413
7414         supplicant_dbus_dict_append_basic(dict, "mode",
7415                                 DBUS_TYPE_UINT32, &mode);
7416 }
7417
7418 static void interface_add_network_params(DBusMessageIter *iter, void *user_data)
7419 {
7420         DBusMessageIter dict;
7421         struct interface_connect_data *data = user_data;
7422         GSupplicantSSID *ssid = data->ssid;
7423 #if defined TIZEN_EXT
7424         GSupplicantInterface *interface = data->interface;
7425 #endif
7426
7427         supplicant_dbus_dict_open(iter, &dict);
7428
7429         if (ssid->scan_ssid)
7430                 supplicant_dbus_dict_append_basic(&dict, "scan_ssid",
7431                                          DBUS_TYPE_UINT32, &ssid->scan_ssid);
7432
7433         if (ssid->freq)
7434                 supplicant_dbus_dict_append_basic(&dict, "frequency",
7435                                          DBUS_TYPE_UINT32, &ssid->freq);
7436
7437         if (ssid->bgscan)
7438                 supplicant_dbus_dict_append_basic(&dict, "bgscan",
7439                                         DBUS_TYPE_STRING, &ssid->bgscan);
7440
7441         add_network_mode(&dict, ssid);
7442
7443         add_network_security(&dict, ssid);
7444
7445 #if defined TIZEN_EXT
7446         add_network_ieee80211w(&dict, ssid);
7447 #endif
7448
7449         supplicant_dbus_dict_append_fixed_array(&dict, "ssid",
7450                                         DBUS_TYPE_BYTE, &ssid->ssid,
7451                                                 ssid->ssid_len);
7452
7453 #if defined TIZEN_EXT
7454         bool owe_transition_mode = FALSE;
7455         if ((ssid->security == G_SUPPLICANT_SECURITY_OWE) && !(ssid->keymgmt & G_SUPPLICANT_KEYMGMT_OWE))
7456                 owe_transition_mode = TRUE;
7457
7458         if (ssid->bssid && !owe_transition_mode) {
7459                 char *bssid = NULL;
7460                 bssid = g_try_malloc0(18);
7461                 if (bssid == NULL) {
7462                         SUPPLICANT_DBG("memory allocation error");
7463                         supplicant_dbus_dict_close(iter, &dict);
7464                         return;
7465                 }
7466
7467                 if (ssid->bssid_for_connect_len) {
7468                         snprintf(bssid, 18, MACSTR, MAC2STR(ssid->bssid_for_connect));
7469                         memcpy(interface->add_network_bssid, ssid->bssid_for_connect, WIFI_BSSID_LEN_MAX);
7470                 } else {
7471                         snprintf(bssid, 18, MACSTR, MAC2STR(ssid->bssid));
7472                         memcpy(interface->add_network_bssid, ssid->bssid, WIFI_BSSID_LEN_MAX);
7473                 }
7474
7475                 SUPPLICANT_DBG("bssid [" MACSTR "]", MAC2STR(interface->add_network_bssid));
7476
7477                 supplicant_dbus_dict_append_basic(&dict, "bssid",
7478                                         DBUS_TYPE_STRING, &bssid);
7479                 g_free(bssid);
7480         }
7481 #endif
7482
7483         supplicant_dbus_dict_close(iter, &dict);
7484 }
7485
7486 static void interface_wps_start_result(const char *error,
7487                                 DBusMessageIter *iter, void *user_data)
7488 {
7489         struct interface_connect_data *data = user_data;
7490         int err;
7491
7492         SUPPLICANT_DBG("");
7493
7494         err = 0;
7495         if (error) {
7496                 SUPPLICANT_DBG("error: %s", error);
7497                 err = parse_supplicant_error(iter);
7498         }
7499
7500         if(data->callback)
7501                 data->callback(err, data->interface, data->user_data);
7502
7503         g_free(data->path);
7504         g_free(data->ssid);
7505         dbus_free(data);
7506 }
7507
7508 static void interface_add_wps_params(DBusMessageIter *iter, void *user_data)
7509 {
7510         struct interface_connect_data *data = user_data;
7511         GSupplicantSSID *ssid = data->ssid;
7512         const char *role = "enrollee", *type;
7513         DBusMessageIter dict;
7514
7515         SUPPLICANT_DBG("");
7516
7517         supplicant_dbus_dict_open(iter, &dict);
7518
7519         supplicant_dbus_dict_append_basic(&dict, "Role",
7520                                                 DBUS_TYPE_STRING, &role);
7521
7522         type = "pbc";
7523         if (ssid->pin_wps) {
7524                 type = "pin";
7525                 supplicant_dbus_dict_append_basic(&dict, "Pin",
7526                                         DBUS_TYPE_STRING, &ssid->pin_wps);
7527         }
7528
7529         supplicant_dbus_dict_append_basic(&dict, "Type",
7530                                         DBUS_TYPE_STRING, &type);
7531
7532 #if defined TIZEN_EXT
7533         if (ssid->bssid)
7534                 supplicant_dbus_dict_append_fixed_array(&dict, "Bssid",
7535                                                 DBUS_TYPE_BYTE, &ssid->bssid, 6);
7536 #endif
7537
7538         supplicant_dbus_dict_close(iter, &dict);
7539 }
7540
7541 static void wps_start(const char *error, DBusMessageIter *iter, void *user_data)
7542 {
7543         struct interface_connect_data *data = user_data;
7544
7545         SUPPLICANT_DBG("");
7546
7547         if (error) {
7548                 SUPPLICANT_DBG("error: %s", error);
7549                 g_free(data->path);
7550                 g_free(data->ssid);
7551                 dbus_free(data);
7552                 return;
7553         }
7554
7555 #if defined TIZEN_EXT
7556         GSupplicantSSID *ssid = data->ssid;
7557         if (ssid->pin_wps != NULL) {
7558                 if (!g_utf8_validate(ssid->pin_wps, 8, NULL)) {
7559                         SUPPLICANT_DBG("Invalid characters in WPS_PIN");
7560                         g_free(data->ssid);
7561                         dbus_free(data);
7562                         return;
7563                 }
7564         }
7565 #endif
7566         supplicant_dbus_method_call(data->interface->path,
7567                         SUPPLICANT_INTERFACE ".Interface.WPS", "Start",
7568                         interface_add_wps_params,
7569                         interface_wps_start_result, data, NULL);
7570 }
7571
7572 static void wps_process_credentials(DBusMessageIter *iter, void *user_data)
7573 {
7574         dbus_bool_t credentials = TRUE;
7575
7576         SUPPLICANT_DBG("");
7577
7578         dbus_message_iter_append_basic(iter, DBUS_TYPE_BOOLEAN, &credentials);
7579 }
7580
7581
7582 #if defined TIZEN_EXT
7583 #define NETCONFIG_SERVICE "net.netconfig"
7584 #define NETCONFIG_WIFI_PATH "/net/netconfig/wifi"
7585 #define NETCONFIG_WIFI_INTERFACE NETCONFIG_SERVICE ".wifi"
7586
7587 struct dec_method_call_data {
7588         struct interface_connect_data *data;
7589         DBusPendingCall *pending_call;
7590 };
7591
7592 static struct dec_method_call_data decrypt_request_data;
7593
7594 static void crypt_method_call_cancel(void)
7595 {
7596         if (decrypt_request_data.pending_call) {
7597                 dbus_pending_call_cancel(decrypt_request_data.pending_call);
7598                 dbus_pending_call_unref(decrypt_request_data.pending_call);
7599                 decrypt_request_data.pending_call = NULL;
7600         }
7601
7602         g_free(decrypt_request_data.data->path);
7603         g_free(decrypt_request_data.data->ssid);
7604         dbus_free(decrypt_request_data.data);
7605         decrypt_request_data.data = NULL;
7606 }
7607
7608 static void decryption_request_reply(DBusPendingCall *call,
7609                                                 void *user_data)
7610 {
7611         DBusMessage *reply;
7612         DBusError error;
7613         DBusMessageIter args;
7614         char *out_data;
7615         int ret;
7616         struct interface_connect_data *data = user_data;
7617
7618         SUPPLICANT_DBG("");
7619
7620         reply = dbus_pending_call_steal_reply(call);
7621
7622         dbus_error_init(&error);
7623         if (dbus_set_error_from_message(&error, reply)) {
7624                 SUPPLICANT_DBG("decryption_request_reply() %s %s", error.name, error.message);
7625                 dbus_error_free(&error);
7626                 ret = -EINVAL;
7627                 goto done;
7628         }
7629
7630         if (dbus_message_iter_init(reply, &args) == FALSE) {
7631                 SUPPLICANT_DBG("dbus_message_iter_init() failed");
7632                 ret = -EINVAL;
7633                 goto done;
7634         }
7635
7636         dbus_message_iter_get_basic(&args, &out_data);
7637         data->ssid->passphrase = g_strdup((const gchar *)out_data);
7638
7639         ret = supplicant_dbus_method_call(data->interface->path,
7640                 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
7641                 interface_add_network_params,
7642                 interface_add_network_result, data,
7643                 data->interface);
7644
7645 done:
7646         if (ret < 0) {
7647                 SUPPLICANT_DBG("AddNetwork failed %d", ret);
7648                 callback_assoc_failed(decrypt_request_data.data->user_data);
7649                 g_free(data->path);
7650                 g_free(data->ssid->ssid);
7651                 g_free((char *)data->ssid->passphrase);
7652                 g_free((char *)data->ssid->connector);
7653                 g_free((char *)data->ssid->c_sign_key);
7654                 g_free((char *)data->ssid->net_access_key);
7655                 g_free(data->ssid);
7656                 dbus_free(data);
7657         }
7658
7659         dbus_message_unref(reply);
7660         dbus_pending_call_unref(call);
7661
7662         decrypt_request_data.pending_call = NULL;
7663         decrypt_request_data.data = NULL;
7664 }
7665
7666 static int send_decryption_request(const char *passphrase,
7667                         struct interface_connect_data *data)
7668 {
7669         DBusMessage *msg = NULL;
7670         DBusPendingCall *call;
7671
7672         SUPPLICANT_DBG("Decryption request");
7673
7674         if (!passphrase) {
7675                 SUPPLICANT_DBG("Invalid parameter");
7676                 return -EINVAL;
7677         }
7678
7679         if (!connection)
7680                 return -EINVAL;
7681
7682         msg = dbus_message_new_method_call(NETCONFIG_SERVICE, NETCONFIG_WIFI_PATH,
7683                         NETCONFIG_WIFI_INTERFACE, "DecryptPassphrase");
7684         if (!msg)
7685                 return -EINVAL;
7686
7687 #if defined TIZEN_EXT
7688         if (!dbus_message_append_args(msg, DBUS_TYPE_STRING, &passphrase,
7689                                                         DBUS_TYPE_INVALID)) {
7690                 SUPPLICANT_DBG("Could not fulfill decryption request");
7691                 return -ENOMEM;
7692         }
7693 #else
7694         dbus_message_append_args(msg, DBUS_TYPE_STRING, &passphrase,
7695                                                         DBUS_TYPE_INVALID);
7696 #endif
7697
7698         if (!dbus_connection_send_with_reply(connection, msg,
7699                                 &call, DBUS_TIMEOUT_USE_DEFAULT)) {
7700                 dbus_message_unref(msg);
7701                 return -EIO;
7702         }
7703
7704         if (!call) {
7705                 dbus_message_unref(msg);
7706                 return -EIO;
7707         }
7708
7709         decrypt_request_data.pending_call = call;
7710         decrypt_request_data.data = data;
7711
7712         dbus_pending_call_set_notify(call, decryption_request_reply, data, NULL);
7713         dbus_message_unref(msg);
7714
7715         SUPPLICANT_DBG("Decryption request succeeded");
7716
7717         return 0;
7718 }
7719
7720 static void decrypt_conf_obj_reply(DBusPendingCall *call,
7721                                                 void *user_data)
7722 {
7723         DBusMessage *reply;
7724         DBusError error;
7725         DBusMessageIter iter, dict;
7726         char *out_data;
7727         int ret;
7728         struct interface_connect_data *data = user_data;
7729
7730         reply = dbus_pending_call_steal_reply(call);
7731
7732         dbus_error_init(&error);
7733         if (dbus_set_error_from_message(&error, reply)) {
7734                 SUPPLICANT_DBG("decryption_conf_obj_reply() %s %s", error.name, error.message);
7735                 dbus_error_free(&error);
7736                 ret = -EINVAL;
7737                 goto done;
7738         }
7739
7740         if (dbus_message_iter_init(reply, &iter) == FALSE) {
7741                 SUPPLICANT_DBG("dbus_message_iter_init() failed");
7742                 ret = -EINVAL;
7743                 goto done;
7744         }
7745
7746         dbus_message_iter_recurse(&iter, &dict);
7747
7748         while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_DICT_ENTRY) {
7749                 DBusMessageIter entry, value;
7750                 const char *key;
7751
7752                 dbus_message_iter_recurse(&dict, &entry);
7753                 dbus_message_iter_get_basic(&entry, &key);
7754                 dbus_message_iter_next(&entry);
7755                 dbus_message_iter_recurse(&entry, &value);
7756                 if (dbus_message_iter_get_arg_type(&value) == DBUS_TYPE_STRING) {
7757                         if (g_strcmp0(key, "connector") == 0) {
7758                                 dbus_message_iter_get_basic(&value, &out_data);
7759                                 data->ssid->connector = g_strdup((const gchar *)out_data);
7760                                 SUPPLICANT_DBG("connector %s", data->ssid->connector);
7761                         } else if (g_strcmp0(key, "c_sign_key") == 0) {
7762                                 dbus_message_iter_get_basic(&value, &out_data);
7763                                 data->ssid->c_sign_key = g_strdup((const gchar *)out_data);
7764                                 SUPPLICANT_DBG("c_sign_key %s", data->ssid->c_sign_key);
7765                         } else if (g_strcmp0(key, "net_access_key") == 0) {
7766                                 dbus_message_iter_get_basic(&value, &out_data);
7767                                 data->ssid->net_access_key = g_strdup((const gchar *)out_data);
7768                                 SUPPLICANT_DBG("net_access_key %s", data->ssid->net_access_key);
7769                         }
7770                 }
7771                 dbus_message_iter_next(&dict);
7772         }
7773
7774         ret = supplicant_dbus_method_call(data->interface->path,
7775                 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
7776                 interface_add_network_params,
7777                 interface_add_network_result, data,
7778                 data->interface);
7779
7780 done:
7781         if (ret < 0) {
7782                 SUPPLICANT_DBG("AddNetwork failed %d", ret);
7783                 callback_assoc_failed(decrypt_request_data.data->user_data);
7784                 g_free(data->path);
7785                 g_free(data->ssid->ssid);
7786                 g_free((char *)data->ssid->connector);
7787                 g_free((char *)data->ssid->c_sign_key);
7788                 g_free((char *)data->ssid->net_access_key);
7789                 g_free(data->ssid);
7790                 dbus_free(data);
7791         }
7792
7793         dbus_message_unref(reply);
7794         dbus_pending_call_unref(call);
7795
7796         decrypt_request_data.pending_call = NULL;
7797         decrypt_request_data.data = NULL;
7798 }
7799
7800 static int send_decryption_conf_obj_request(GSupplicantSSID *ssid,
7801                         struct interface_connect_data *data)
7802 {
7803         DBusMessage *msg = NULL;
7804         DBusPendingCall *call;
7805
7806         SUPPLICANT_DBG("Decryption configuration object request");
7807
7808         if (!ssid) {
7809                 SUPPLICANT_DBG("Invalid parameter");
7810                 return -EINVAL;
7811         }
7812
7813         if (!connection)
7814                 return -EINVAL;
7815
7816         msg = dbus_message_new_method_call(NETCONFIG_SERVICE, NETCONFIG_WIFI_PATH,
7817                         NETCONFIG_WIFI_INTERFACE, "DecryptConfObj");
7818         if (!msg)
7819                 return -EINVAL;
7820
7821         dbus_message_append_args(msg, DBUS_TYPE_STRING, &ssid->connector,
7822                                                         DBUS_TYPE_INVALID);
7823         dbus_message_append_args(msg, DBUS_TYPE_STRING, &ssid->c_sign_key,
7824                                                         DBUS_TYPE_INVALID);
7825         dbus_message_append_args(msg, DBUS_TYPE_STRING, &ssid->net_access_key,
7826                                                         DBUS_TYPE_INVALID);
7827
7828         if (!dbus_connection_send_with_reply(connection, msg,
7829                                 &call, DBUS_TIMEOUT_USE_DEFAULT)) {
7830                 dbus_message_unref(msg);
7831                 return -EIO;
7832         }
7833
7834         if (!call) {
7835                 dbus_message_unref(msg);
7836                 return -EIO;
7837         }
7838
7839         decrypt_request_data.pending_call = call;
7840         decrypt_request_data.data = data;
7841
7842         dbus_pending_call_set_notify(call, decrypt_conf_obj_reply, data, NULL);
7843         dbus_message_unref(msg);
7844
7845         SUPPLICANT_DBG("Decrypt Conf Obj request succeeded");
7846
7847         return 0;
7848 }
7849
7850 static bool is_valid_config_object(GSupplicantSSID *ssid)
7851 {
7852         return ((ssid->connector &&
7853                         g_strcmp0(ssid->connector, "") != 0) &&
7854                         (ssid->c_sign_key &&
7855                         g_strcmp0(ssid->c_sign_key, "") != 0) &&
7856                         (ssid->net_access_key &&
7857                         g_strcmp0(ssid->net_access_key, "") != 0));
7858 }
7859 #endif
7860
7861 int g_supplicant_interface_connect(GSupplicantInterface *interface,
7862                                 GSupplicantSSID *ssid,
7863                                 GSupplicantInterfaceCallback callback,
7864                                                         void *user_data)
7865 {
7866         struct interface_connect_data *data;
7867         struct interface_data *intf_data;
7868         int ret = 0;
7869
7870         SUPPLICANT_DBG("");
7871
7872         if (!interface)
7873                 return -EINVAL;
7874
7875         if (!system_available)
7876                 return -EFAULT;
7877
7878         /* TODO: Check if we're already connected and switch */
7879
7880         data = dbus_malloc0(sizeof(*data));
7881         if (!data)
7882                 return -ENOMEM;
7883
7884         data->interface = interface;
7885         data->path = g_strdup(interface->path);
7886         data->callback = callback;
7887         data->ssid = ssid;
7888         data->user_data = user_data;
7889
7890         if (ssid->use_wps) {
7891                 g_free(interface->wps_cred.key);
7892                 memset(&interface->wps_cred, 0,
7893                                 sizeof(struct _GSupplicantWpsCredentials));
7894
7895                 ret = supplicant_dbus_property_set(interface->path,
7896                         SUPPLICANT_INTERFACE ".Interface.WPS",
7897                         "ProcessCredentials", DBUS_TYPE_BOOLEAN_AS_STRING,
7898                         wps_process_credentials, wps_start, data, interface);
7899         } else {
7900                 /* By the time there is a request for connect and the network
7901                  * path is not NULL it means that connman has not removed the
7902                  * previous network pointer. This can happen in the case AP
7903                  * deauthenticated client and connman does not remove the
7904                  * previously connected network pointer. This causes supplicant
7905                  * to reallocate the memory for struct wpa_ssid again even if it
7906                  * is the same SSID. This causes memory usage of wpa_supplicnat
7907                  * to go high. The idea here is that if the previously connected
7908                  * network is not removed at the time of next connection attempt
7909                  * check if the network path is not NULL. In case it is non-NULL
7910                  * first remove the network and then once removal is successful, add
7911                  * the network.
7912                  */
7913
7914                 if (interface->network_path != NULL) {
7915                         g_free(data->path);
7916                         dbus_free(data);
7917
7918                         /*
7919                          * If this add network is for the same network for
7920                          * which wpa_supplicant already has a profile then do
7921                          * not need to add another profile. Only if the
7922                          * profile that needs to get added is different from
7923                          * what is there in wpa_s delete the current one. A
7924                          * network is identified by its SSID, security_type
7925                          * and passphrase (private passphrase in case security
7926                          * type is 802.11x).
7927                          */
7928                         if (compare_network_parameters(interface, ssid)) {
7929                                 return -EALREADY;
7930                         }
7931
7932                         intf_data = dbus_malloc0(sizeof(*intf_data));
7933                         if (!intf_data)
7934                                 return -ENOMEM;
7935
7936                         intf_data->interface = interface;
7937                         intf_data->path = g_strdup(interface->path);
7938                         intf_data->callback = callback;
7939                         intf_data->ssid = ssid;
7940                         intf_data->user_data = user_data;
7941                         intf_data->network_remove_in_progress = TRUE;
7942                         network_remove(intf_data);
7943                 } else {
7944 #if defined TIZEN_EXT
7945                         if (ssid->passphrase &&
7946                             g_strcmp0(ssid->passphrase, "") != 0 &&
7947 #if defined TIZEN_EXT_WIFI_MESH
7948                             ssid->mode != G_SUPPLICANT_MODE_MESH &&
7949 #endif
7950                             !ssid->eap) {
7951                                 ret = send_decryption_request(ssid->passphrase, data);
7952                                 if (ret < 0)
7953                                         SUPPLICANT_DBG("Decryption request failed %d", ret);
7954                         } else if (is_valid_config_object(ssid)) {
7955                                 ret = send_decryption_conf_obj_request(ssid, data);
7956                                 if (ret < 0)
7957                                         SUPPLICANT_DBG("Decryption Conf Obj request failed %d", ret);
7958
7959                         } else
7960 #endif
7961                         ret = supplicant_dbus_method_call(interface->path,
7962                                         SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
7963                                         interface_add_network_params,
7964                                         interface_add_network_result, data,
7965                                         interface);
7966                 }
7967         }
7968
7969         if (ret < 0) {
7970                 g_free(data->path);
7971                 dbus_free(data);
7972                 return ret;
7973         }
7974
7975         return -EINPROGRESS;
7976 }
7977
7978 static void network_remove_result(const char *error,
7979                                 DBusMessageIter *iter, void *user_data)
7980 {
7981         struct interface_data *data = user_data;
7982         struct interface_connect_data *connect_data;
7983         int result = 0;
7984
7985         SUPPLICANT_DBG("");
7986
7987         if (error) {
7988                 result = -EIO;
7989                 SUPPLICANT_DBG("error: %s", error);
7990
7991                 if (g_strcmp0("org.freedesktop.DBus.Error.UnknownMethod",
7992                                                 error) == 0)
7993                         result = -ECONNABORTED;
7994         }
7995
7996         g_free(data->interface->network_path);
7997         data->interface->network_path = NULL;
7998
7999         remove_network_information(data->interface);
8000
8001         if (data->network_remove_in_progress == TRUE) {
8002                 data->network_remove_in_progress = FALSE;
8003                 connect_data = dbus_malloc0(sizeof(*connect_data));
8004                 if (!connect_data)
8005                         return;
8006
8007                 connect_data->interface = data->interface;
8008                 connect_data->path = g_strdup(data->path);
8009                 connect_data->callback = data->callback;
8010                 connect_data->ssid = data->ssid;
8011                 connect_data->user_data = data->user_data;
8012
8013 #if defined TIZEN_EXT
8014                 int ret;
8015                 if (data->ssid->passphrase && g_strcmp0(data->ssid->passphrase, "") != 0
8016                         && !data->ssid->eap) {
8017                         ret = send_decryption_request(data->ssid->passphrase, connect_data);
8018                         if (ret < 0) {
8019                                 SUPPLICANT_DBG("Decryption request failed %d", ret);
8020                                 g_free(connect_data->ssid);
8021                                 g_free(connect_data->path);
8022                                 dbus_free(connect_data);
8023                         }
8024                 } else if (is_valid_config_object(data->ssid)) {
8025                         ret = send_decryption_conf_obj_request(data->ssid, connect_data);
8026                         if (ret < 0) {
8027                                 SUPPLICANT_DBG("Decryption Conf Obj request failed %d", ret);
8028                                 g_free(connect_data->ssid);
8029                                 g_free(connect_data->path);
8030                                 dbus_free(connect_data);
8031                         }
8032                 } else
8033 #endif
8034                 supplicant_dbus_method_call(data->interface->path,
8035                         SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
8036                         interface_add_network_params,
8037                         interface_add_network_result, connect_data,
8038                         connect_data->interface);
8039         } else {
8040                 if (data->callback)
8041                         data->callback(result, data->interface, data->user_data);
8042         }
8043         g_free(data->path);
8044         dbus_free(data);
8045 }
8046
8047 static void network_remove_params(DBusMessageIter *iter, void *user_data)
8048 {
8049         struct interface_data *data = user_data;
8050         const char *path = data->interface->network_path;
8051
8052         SUPPLICANT_DBG("path %s", path);
8053
8054         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH, &path);
8055 }
8056
8057 static int network_remove(struct interface_data *data)
8058 {
8059         GSupplicantInterface *interface = data->interface;
8060
8061         SUPPLICANT_DBG("");
8062
8063 #if defined TIZEN_EXT
8064         GSupplicantInterface *intf = NULL;
8065         /*
8066          * Check if 'interface' is valid
8067          */
8068         intf = g_hash_table_lookup(interface_table, interface->path);
8069         if (intf == NULL)
8070                 return -EINVAL;
8071 #endif
8072
8073         return supplicant_dbus_method_call(interface->path,
8074                         SUPPLICANT_INTERFACE ".Interface", "RemoveNetwork",
8075                         network_remove_params, network_remove_result, data,
8076                         interface);
8077 }
8078
8079 static void interface_disconnect_result(const char *error,
8080                                 DBusMessageIter *iter, void *user_data)
8081 {
8082         struct interface_data *data = user_data;
8083         int result = 0;
8084
8085         SUPPLICANT_DBG("");
8086
8087         if (error) {
8088                 result = -EIO;
8089                 SUPPLICANT_DBG("error: %s", error);
8090
8091                 if (g_strcmp0("org.freedesktop.DBus.Error.UnknownMethod",
8092                                                 error) == 0)
8093                         result = -ECONNABORTED;
8094         }
8095
8096         /* If we are disconnecting from previous WPS successful
8097          * association. i.e.: it did not went through AddNetwork,
8098          * and interface->network_path was never set. */
8099         if (!data->interface->network_path) {
8100                 if (data->callback)
8101                         data->callback(result, data->interface,
8102                                                         data->user_data);
8103
8104                 g_free(data->path);
8105                 dbus_free(data);
8106                 return;
8107         }
8108
8109         if (result < 0 && data->callback) {
8110                 data->callback(result, data->interface, data->user_data);
8111                 data->callback = NULL;
8112         }
8113
8114         if (result != -ECONNABORTED) {
8115                 if (network_remove(data) < 0) {
8116                         g_free(data->path);
8117                         dbus_free(data);
8118                 }
8119         } else {
8120                 g_free(data->path);
8121                 dbus_free(data);
8122         }
8123 }
8124
8125 int g_supplicant_interface_disconnect(GSupplicantInterface *interface,
8126                                         GSupplicantInterfaceCallback callback,
8127                                                         void *user_data)
8128 {
8129         struct interface_data *data;
8130         int ret;
8131
8132         SUPPLICANT_DBG("");
8133
8134         if (!interface)
8135                 return -EINVAL;
8136
8137         if (!system_available)
8138                 return -EFAULT;
8139 #if defined TIZEN_EXT
8140         if (decrypt_request_data.pending_call &&
8141                         decrypt_request_data.data &&
8142                         decrypt_request_data.data->user_data == user_data) {
8143
8144                 callback_assoc_failed(decrypt_request_data.data->user_data);
8145                 crypt_method_call_cancel();
8146
8147                 return 0;
8148         }
8149 #endif
8150         data = dbus_malloc0(sizeof(*data));
8151         if (!data)
8152                 return -ENOMEM;
8153
8154         data->interface = interface;
8155         data->path = g_strdup(interface->path);
8156         data->callback = callback;
8157         data->user_data = user_data;
8158
8159         ret = supplicant_dbus_method_call(interface->path,
8160                         SUPPLICANT_INTERFACE ".Interface", "Disconnect",
8161                         NULL, interface_disconnect_result, data,
8162                         interface);
8163
8164         if (ret < 0) {
8165                 g_free(data->path);
8166                 dbus_free(data);
8167         }
8168
8169         return ret;
8170 }
8171
8172 static void interface_p2p_find_result(const char *error,
8173                                         DBusMessageIter *iter, void *user_data)
8174 {
8175         struct interface_scan_data *data = user_data;
8176         int err = 0;
8177
8178         SUPPLICANT_DBG("error %s", error);
8179
8180         if (error)
8181                 err = -EIO;
8182
8183         if (interface_exists(data->interface, data->path)) {
8184                 if (!data->interface->ready)
8185                         err = -ENOLINK;
8186                 if (!err)
8187                         data->interface->p2p_finding = true;
8188         }
8189
8190         if (data->callback)
8191                 data->callback(err, data->interface, data->user_data);
8192
8193         g_free(data->path);
8194         dbus_free(data);
8195 }
8196
8197 static void interface_p2p_find_params(DBusMessageIter *iter, void *user_data)
8198 {
8199         DBusMessageIter dict;
8200
8201         supplicant_dbus_dict_open(iter, &dict);
8202         supplicant_dbus_dict_close(iter, &dict);
8203 }
8204
8205 int g_supplicant_interface_p2p_find(GSupplicantInterface *interface,
8206                                         GSupplicantInterfaceCallback callback,
8207                                                         void *user_data)
8208 {
8209         struct interface_scan_data *data;
8210         int ret;
8211
8212         if (!interface->p2p_support)
8213                 return -ENOTSUP;
8214
8215         ret = interface_ready_to_scan(interface);
8216         if (ret && ret != -EALREADY)
8217                 return ret;
8218
8219         data = dbus_malloc0(sizeof(*data));
8220         if (!data)
8221                 return -ENOMEM;
8222
8223         data->interface = interface;
8224         data->path = g_strdup(interface->path);
8225         data->callback = callback;
8226         data->user_data = user_data;
8227
8228         ret = supplicant_dbus_method_call(interface->path,
8229                         SUPPLICANT_INTERFACE ".Interface.P2PDevice", "Find",
8230                         interface_p2p_find_params, interface_p2p_find_result,
8231                         data, interface);
8232         if (ret < 0) {
8233                 g_free(data->path);
8234                 dbus_free(data);
8235         }
8236
8237         return ret;
8238 }
8239
8240 bool g_supplicant_interface_is_p2p_finding(GSupplicantInterface *interface)
8241 {
8242         if (!interface)
8243                 return false;
8244
8245         return interface->p2p_finding;
8246 }
8247
8248 int g_supplicant_interface_p2p_stop_find(GSupplicantInterface *interface)
8249 {
8250         if (!interface->p2p_finding)
8251                 return 0;
8252
8253         SUPPLICANT_DBG("");
8254
8255         interface->p2p_finding = false;
8256
8257         return supplicant_dbus_method_call(interface->path,
8258                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "StopFind",
8259                 NULL, NULL, NULL, NULL);
8260 }
8261
8262 static void interface_p2p_connect_result(const char *error,
8263                                         DBusMessageIter *iter, void *user_data)
8264 {
8265         struct interface_connect_data *data = user_data;
8266         int err = 0;
8267
8268         SUPPLICANT_DBG("");
8269
8270         if (error) {
8271                 SUPPLICANT_DBG("error: %s", error);
8272                 err = parse_supplicant_error(iter);
8273         }
8274
8275         if (data->callback)
8276                 data->callback(err, data->interface, data->user_data);
8277
8278         g_free(data->path);
8279         g_free(data->peer->wps_pin);
8280         g_free(data->peer->path);
8281         g_free(data->peer);
8282         g_free(data);
8283 }
8284
8285 static void interface_p2p_connect_params(DBusMessageIter *iter, void *user_data)
8286 {
8287         struct interface_connect_data *data = user_data;
8288         const char *wps = "pbc";
8289         DBusMessageIter dict;
8290         int go_intent = 7;
8291
8292         SUPPLICANT_DBG("");
8293
8294         supplicant_dbus_dict_open(iter, &dict);
8295
8296         if (data->peer->master)
8297                 go_intent = 15;
8298
8299         if (data->peer->wps_pin)
8300                 wps = "pin";
8301
8302         supplicant_dbus_dict_append_basic(&dict, "peer",
8303                                 DBUS_TYPE_OBJECT_PATH, &data->peer->path);
8304         supplicant_dbus_dict_append_basic(&dict, "wps_method",
8305                                 DBUS_TYPE_STRING, &wps);
8306         if (data->peer->wps_pin) {
8307                 supplicant_dbus_dict_append_basic(&dict, "pin",
8308                                 DBUS_TYPE_STRING, &data->peer->wps_pin);
8309         }
8310
8311         supplicant_dbus_dict_append_basic(&dict, "go_intent",
8312                                         DBUS_TYPE_INT32, &go_intent);
8313
8314         supplicant_dbus_dict_close(iter, &dict);
8315 }
8316
8317 int g_supplicant_interface_p2p_connect(GSupplicantInterface *interface,
8318                                         GSupplicantPeerParams *peer_params,
8319                                         GSupplicantInterfaceCallback callback,
8320                                         void *user_data)
8321 {
8322         struct interface_connect_data *data;
8323         int ret;
8324
8325         SUPPLICANT_DBG("");
8326
8327         if (!interface->p2p_support)
8328                 return -ENOTSUP;
8329
8330         data = dbus_malloc0(sizeof(*data));
8331         if (!data)
8332                 return -ENOMEM;
8333
8334         data->interface = interface;
8335         data->path = g_strdup(interface->path);
8336         data->peer = peer_params;
8337         data->callback = callback;
8338         data->user_data = user_data;
8339
8340         ret = supplicant_dbus_method_call(interface->path,
8341                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "Connect",
8342                 interface_p2p_connect_params, interface_p2p_connect_result,
8343                 data, interface);
8344         if (ret < 0) {
8345                 g_free(data->path);
8346                 dbus_free(data);
8347                 return ret;
8348         }
8349
8350         return -EINPROGRESS;
8351 }
8352
8353 int g_supplicant_interface_p2p_disconnect(GSupplicantInterface *interface,
8354                                         GSupplicantPeerParams *peer_params)
8355 {
8356         GSupplicantPeer *peer;
8357         int count = 0;
8358         GSList *list;
8359
8360         SUPPLICANT_DBG("");
8361
8362         if (!interface->p2p_support)
8363                 return -ENOTSUP;
8364
8365         peer = g_hash_table_lookup(interface->peer_table, peer_params->path);
8366         if (!peer)
8367                 return -ENODEV;
8368
8369         for (list = peer->groups; list; list = list->next, count++) {
8370                 const char *group_obj_path = list->data;
8371                 GSupplicantInterface *g_interface;
8372                 GSupplicantGroup *group;
8373
8374                 group = g_hash_table_lookup(group_mapping, group_obj_path);
8375                 if (!group || !group->interface)
8376                         continue;
8377
8378                 g_interface = group->interface;
8379                 supplicant_dbus_method_call(g_interface->path,
8380                                 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
8381                                 "Disconnect", NULL, NULL, NULL, g_interface);
8382         }
8383
8384         if (count == 0 && peer->current_group_iface) {
8385                 supplicant_dbus_method_call(peer->current_group_iface->path,
8386                                 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
8387                                 "Disconnect", NULL, NULL, NULL,
8388                                 peer->current_group_iface->path);
8389         }
8390
8391         peer->current_group_iface = NULL;
8392
8393         return -EINPROGRESS;
8394 }
8395
8396 struct p2p_service_data {
8397         bool registration;
8398         GSupplicantInterface *interface;
8399         GSupplicantP2PServiceParams *service;
8400         GSupplicantInterfaceCallback callback;
8401         void *user_data;
8402 };
8403
8404 static void interface_p2p_service_result(const char *error,
8405                                         DBusMessageIter *iter, void *user_data)
8406 {
8407         struct p2p_service_data *data = user_data;
8408         int result = 0;
8409
8410         SUPPLICANT_DBG("%s result - %s", data->registration ?
8411                                 "Registration" : "Deletion",
8412                                 error ? error : "Success");
8413         if (error)
8414                 result = -EINVAL;
8415
8416         if (data->callback)
8417                 data->callback(result, data->interface, data->user_data);
8418
8419         g_free(data->service->query);
8420         g_free(data->service->response);
8421         g_free(data->service->service);
8422         g_free(data->service->wfd_ies);
8423         g_free(data->service);
8424         dbus_free(data);
8425 }
8426
8427 static void interface_p2p_service_params(DBusMessageIter *iter,
8428                                                         void *user_data)
8429 {
8430         struct p2p_service_data *data = user_data;
8431         GSupplicantP2PServiceParams *service;
8432         DBusMessageIter dict;
8433         const char *type;
8434
8435         SUPPLICANT_DBG("");
8436
8437         service = data->service;
8438
8439         supplicant_dbus_dict_open(iter, &dict);
8440
8441         if (service->query && service->response) {
8442                 type = "bonjour";
8443                 supplicant_dbus_dict_append_basic(&dict, "service_type",
8444                                                 DBUS_TYPE_STRING, &type);
8445                 supplicant_dbus_dict_append_fixed_array(&dict, "query",
8446                                         DBUS_TYPE_BYTE, &service->query,
8447                                         service->query_length);
8448                 supplicant_dbus_dict_append_fixed_array(&dict, "response",
8449                                         DBUS_TYPE_BYTE, &service->response,
8450                                         service->response_length);
8451         } else if (service->version && service->service) {
8452                 type = "upnp";
8453                 supplicant_dbus_dict_append_basic(&dict, "service_type",
8454                                                 DBUS_TYPE_STRING, &type);
8455                 supplicant_dbus_dict_append_basic(&dict, "version",
8456                                         DBUS_TYPE_INT32, &service->version);
8457                 supplicant_dbus_dict_append_basic(&dict, "service",
8458                                         DBUS_TYPE_STRING, &service->service);
8459         }
8460
8461         supplicant_dbus_dict_close(iter, &dict);
8462 }
8463
8464 int g_supplicant_interface_p2p_add_service(GSupplicantInterface *interface,
8465                                 GSupplicantInterfaceCallback callback,
8466                                 GSupplicantP2PServiceParams *p2p_service_params,
8467                                 void *user_data)
8468 {
8469         struct p2p_service_data *data;
8470         int ret;
8471
8472         SUPPLICANT_DBG("");
8473
8474         if (!interface->p2p_support)
8475                 return -ENOTSUP;
8476
8477         data = dbus_malloc0(sizeof(*data));
8478         if (!data)
8479                 return -ENOMEM;
8480
8481         data->registration = true;
8482         data->interface = interface;
8483         data->service = p2p_service_params;
8484         data->callback = callback;
8485         data->user_data = user_data;
8486
8487         ret = supplicant_dbus_method_call(interface->path,
8488                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "AddService",
8489                 interface_p2p_service_params, interface_p2p_service_result,
8490                 data, interface);
8491         if (ret < 0) {
8492                 dbus_free(data);
8493                 return ret;
8494         }
8495
8496         return -EINPROGRESS;
8497 }
8498
8499 int g_supplicant_interface_p2p_del_service(GSupplicantInterface *interface,
8500                                 GSupplicantP2PServiceParams *p2p_service_params)
8501 {
8502         struct p2p_service_data *data;
8503         int ret;
8504
8505         SUPPLICANT_DBG("");
8506
8507         if (!interface->p2p_support)
8508                 return -ENOTSUP;
8509
8510         data = dbus_malloc0(sizeof(*data));
8511         if (!data)
8512                 return -ENOMEM;
8513
8514         data->interface = interface;
8515         data->service = p2p_service_params;
8516
8517         ret = supplicant_dbus_method_call(interface->path,
8518                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeleteService",
8519                 interface_p2p_service_params, interface_p2p_service_result,
8520                 data, interface);
8521         if (ret < 0) {
8522                 dbus_free(data);
8523                 return ret;
8524         }
8525
8526         return -EINPROGRESS;
8527 }
8528
8529 struct p2p_listen_data {
8530         int period;
8531         int interval;
8532 };
8533
8534 static void interface_p2p_listen_params(DBusMessageIter *iter, void *user_data)
8535 {
8536         struct p2p_listen_data *params = user_data;
8537         DBusMessageIter dict;
8538
8539         supplicant_dbus_dict_open(iter, &dict);
8540
8541         supplicant_dbus_dict_append_basic(&dict, "period",
8542                                         DBUS_TYPE_INT32, &params->period);
8543         supplicant_dbus_dict_append_basic(&dict, "interval",
8544                                         DBUS_TYPE_INT32, &params->interval);
8545         supplicant_dbus_dict_close(iter, &dict);
8546 }
8547
8548 int g_supplicant_interface_p2p_listen(GSupplicantInterface *interface,
8549                                                 int period, int interval)
8550 {
8551         struct p2p_listen_data params;
8552
8553         SUPPLICANT_DBG("");
8554
8555         if (!interface->p2p_support)
8556                 return -ENOTSUP;
8557
8558         params.period = period;
8559         params.interval = interval;
8560
8561         return supplicant_dbus_method_call(interface->path,
8562                         SUPPLICANT_INTERFACE ".Interface.P2PDevice",
8563                         "ExtendedListen", interface_p2p_listen_params,
8564                         NULL, &params, NULL);
8565 }
8566
8567 static void widi_ies_params(DBusMessageIter *iter, void *user_data)
8568 {
8569         struct p2p_service_data *data = user_data;
8570         GSupplicantP2PServiceParams *service = data->service;
8571         DBusMessageIter array;
8572
8573         SUPPLICANT_DBG("%p - %d", service->wfd_ies, service->wfd_ies_length);
8574
8575         dbus_message_iter_open_container(iter, DBUS_TYPE_ARRAY,
8576                                         DBUS_TYPE_BYTE_AS_STRING, &array);
8577
8578         if (service->wfd_ies && service->wfd_ies_length > 0) {
8579                 dbus_message_iter_append_fixed_array(&array, DBUS_TYPE_BYTE,
8580                                 &service->wfd_ies, service->wfd_ies_length);
8581         }
8582
8583         dbus_message_iter_close_container(iter, &array);
8584 }
8585
8586 int g_supplicant_set_widi_ies(GSupplicantP2PServiceParams *p2p_service_params,
8587                                         GSupplicantInterfaceCallback callback,
8588                                         void *user_data)
8589 {
8590         struct p2p_service_data *data;
8591         int ret;
8592
8593         SUPPLICANT_DBG("");
8594
8595         if (!system_available)
8596                 return -EFAULT;
8597
8598         data = dbus_malloc0(sizeof(*data));
8599         if (!data)
8600                 return -ENOMEM;
8601
8602         data->service = p2p_service_params;
8603         data->callback = callback;
8604         data->user_data = user_data;
8605
8606         if (p2p_service_params->wfd_ies)
8607                 data->registration = true;
8608
8609         ret = supplicant_dbus_property_set(SUPPLICANT_PATH,
8610                                         SUPPLICANT_INTERFACE, "WFDIEs",
8611                                         DBUS_TYPE_ARRAY_AS_STRING
8612                                         DBUS_TYPE_BYTE_AS_STRING,
8613                                         widi_ies_params,
8614                                         interface_p2p_service_result,
8615                                         data, NULL);
8616         if (ret < 0 && ret != -EINPROGRESS) {
8617                 dbus_free(data);
8618                 return ret;
8619         }
8620
8621         return -EINPROGRESS;
8622 }
8623
8624
8625 static const char *g_supplicant_rule0 = "type=signal,"
8626                                         "path=" DBUS_PATH_DBUS ","
8627                                         "sender=" DBUS_SERVICE_DBUS ","
8628                                         "interface=" DBUS_INTERFACE_DBUS ","
8629                                         "member=NameOwnerChanged,"
8630                                         "arg0=" SUPPLICANT_SERVICE;
8631 static const char *g_supplicant_rule1 = "type=signal,"
8632                         "interface=" SUPPLICANT_INTERFACE;
8633 static const char *g_supplicant_rule2 = "type=signal,"
8634                         "interface=" SUPPLICANT_INTERFACE ".Interface";
8635 static const char *g_supplicant_rule3 = "type=signal,"
8636                         "interface=" SUPPLICANT_INTERFACE ".Interface.WPS";
8637 static const char *g_supplicant_rule4 = "type=signal,"
8638                         "interface=" SUPPLICANT_INTERFACE ".BSS";
8639 static const char *g_supplicant_rule5 = "type=signal,"
8640                         "interface=" SUPPLICANT_INTERFACE ".Network";
8641 #if !defined TIZEN_EXT
8642 static const char *g_supplicant_rule6 = "type=signal,"
8643                 "interface=" SUPPLICANT_INTERFACE ".Interface.P2PDevice";
8644 static const char *g_supplicant_rule7 = "type=signal,"
8645                 "interface=" SUPPLICANT_INTERFACE ".Peer";
8646 static const char *g_supplicant_rule8 = "type=signal,"
8647                 "interface=" SUPPLICANT_INTERFACE ".Group";
8648 #endif
8649 #if defined TIZEN_EXT_WIFI_MESH
8650 static const char *g_supplicant_rule9 = "type=signal,"
8651                 "interface=" SUPPLICANT_INTERFACE ".Interface.Mesh";
8652 #endif
8653
8654 static void invoke_introspect_method(void)
8655 {
8656         DBusMessage *message;
8657
8658         message = dbus_message_new_method_call(SUPPLICANT_SERVICE,
8659                                         SUPPLICANT_PATH,
8660                                         DBUS_INTERFACE_INTROSPECTABLE,
8661                                         "Introspect");
8662
8663         if (!message)
8664                 return;
8665
8666         dbus_message_set_no_reply(message, TRUE);
8667         dbus_connection_send(connection, message, NULL);
8668         dbus_message_unref(message);
8669 }
8670
8671 #if defined TIZEN_EXT && defined TIZEN_EXT_INS
8672 void g_supplicant_set_ins_settings(GSupplicantINSPreferredFreq preferred_freq_bssid,
8673                 bool last_connected_bssid, bool assoc_reject, bool signal_bssid,
8674                 unsigned int preferred_freq_bssid_score, unsigned int last_connected_bssid_score,
8675                 unsigned int assoc_reject_score, int signal_level3_5ghz, int signal_level3_24ghz)
8676 {
8677         ins_settings.preferred_freq_bssid = preferred_freq_bssid;
8678         ins_settings.last_connected_bssid = last_connected_bssid;
8679         ins_settings.assoc_reject = assoc_reject;
8680         ins_settings.signal_bssid = signal_bssid;
8681         ins_settings.preferred_freq_bssid_score = preferred_freq_bssid_score;
8682         ins_settings.last_connected_bssid_score = last_connected_bssid_score;
8683         ins_settings.assoc_reject_score = assoc_reject_score;
8684         ins_settings.signal_level3_5ghz = signal_level3_5ghz;
8685         ins_settings.signal_level3_24ghz = signal_level3_24ghz;
8686
8687         SUPPLICANT_DBG("preferred_freq_bssid [%s]", preferred_freq_bssid ? "true" : "false");
8688         SUPPLICANT_DBG("preferred_freq_bssid_score [%d]", preferred_freq_bssid_score);
8689         SUPPLICANT_DBG("last_connected_bssid [%s]", last_connected_bssid ? "true" : "false");
8690         SUPPLICANT_DBG("last_connected_bssid_score [%d]", last_connected_bssid_score);
8691         SUPPLICANT_DBG("assoc_reject [%s]", assoc_reject ? "true" : "false");
8692         SUPPLICANT_DBG("assoc_reject_score [%d]", assoc_reject_score);
8693         SUPPLICANT_DBG("signal_bssid [%s]", signal_bssid ? "true" : "false");
8694         SUPPLICANT_DBG("signal_level3_5ghz [%d]", signal_level3_5ghz);
8695         SUPPLICANT_DBG("signal_level3_24ghz [%d]", signal_level3_24ghz);
8696 }
8697 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_INS */
8698
8699 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
8700 void g_supplicant_register_eap_callback(g_supplicant_eap_callback cb)
8701 {
8702         SUPPLICANT_DBG("g_supplicant_register_eap_callback %p", cb);
8703
8704         if (!callbacks_pointer) {
8705                 SUPPLICANT_DBG("callbacks_pointer is NULL");
8706                 return;
8707         }
8708
8709         callbacks_pointer->eap = cb;
8710 }
8711
8712 void g_supplicant_unregister_eap_callback(void)
8713 {
8714         SUPPLICANT_DBG("g_supplicant_unregister_eap_callback");
8715
8716         if (!callbacks_pointer) {
8717                 SUPPLICANT_DBG("callbacks_pointer is NULL");
8718                 return;
8719         }
8720
8721         callbacks_pointer->eap = NULL;
8722 }
8723 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
8724
8725 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
8726 int g_supplicant_register(GSupplicantCallbacks *callbacks)
8727 #else /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
8728 int g_supplicant_register(const GSupplicantCallbacks *callbacks)
8729 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
8730 {
8731         connection = dbus_bus_get(DBUS_BUS_SYSTEM, NULL);
8732         if (!connection)
8733                 return -EIO;
8734
8735         if (!dbus_connection_add_filter(connection, g_supplicant_filter,
8736                                                 NULL, NULL)) {
8737                 dbus_connection_unref(connection);
8738                 connection = NULL;
8739                 return -EIO;
8740         }
8741 #if defined TIZEN_EXT
8742         simplified_log = connman_setting_get_bool("SimplifiedLog");
8743 #endif
8744         callbacks_pointer = callbacks;
8745         eap_methods = 0;
8746
8747         interface_table = g_hash_table_new_full(g_str_hash, g_str_equal,
8748                                                 NULL, remove_interface);
8749
8750         bss_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
8751                                                                 NULL, NULL);
8752         peer_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
8753                                                                 NULL, NULL);
8754         group_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
8755                                                                 NULL, NULL);
8756         pending_peer_connection = g_hash_table_new_full(g_str_hash, g_str_equal,
8757                                                                 NULL, NULL);
8758         config_file_table = g_hash_table_new_full(g_str_hash, g_str_equal,
8759                                                                 g_free, g_free);
8760
8761         supplicant_dbus_setup(connection);
8762
8763         dbus_bus_add_match(connection, g_supplicant_rule0, NULL);
8764         dbus_bus_add_match(connection, g_supplicant_rule1, NULL);
8765         dbus_bus_add_match(connection, g_supplicant_rule2, NULL);
8766         dbus_bus_add_match(connection, g_supplicant_rule3, NULL);
8767         dbus_bus_add_match(connection, g_supplicant_rule4, NULL);
8768         dbus_bus_add_match(connection, g_supplicant_rule5, NULL);
8769 #if defined TIZEN_EXT
8770         dbus_bus_add_match(connection,
8771                         "type=signal,interface=org.tizen.system.deviced.PowerOff,"
8772                         "member=ChangeState", NULL);
8773 #endif
8774 #if !defined TIZEN_EXT
8775         dbus_bus_add_match(connection, g_supplicant_rule6, NULL);
8776         dbus_bus_add_match(connection, g_supplicant_rule7, NULL);
8777         dbus_bus_add_match(connection, g_supplicant_rule8, NULL);
8778 #endif
8779 #if defined TIZEN_EXT_WIFI_MESH
8780         dbus_bus_add_match(connection, g_supplicant_rule9, NULL);
8781 #endif
8782         dbus_connection_flush(connection);
8783
8784         if (dbus_bus_name_has_owner(connection,
8785                                         SUPPLICANT_SERVICE, NULL)) {
8786                 system_available = TRUE;
8787                 supplicant_dbus_property_get_all(SUPPLICANT_PATH,
8788                                                 SUPPLICANT_INTERFACE,
8789                                                 service_property, NULL, NULL);
8790         } else
8791                 invoke_introspect_method();
8792
8793         SUPPLICANT_DBG("supplicant dbus setup completed");
8794         return 0;
8795 }
8796
8797 static void unregister_interface_remove_params(DBusMessageIter *iter,
8798                                                 void *user_data)
8799 {
8800         const char *path = user_data;
8801
8802         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
8803                                                         &path);
8804 }
8805
8806
8807 static void unregister_remove_interface(gpointer key, gpointer value,
8808                                                 gpointer user_data)
8809 {
8810         GSupplicantInterface *interface = value;
8811
8812         supplicant_dbus_method_call(SUPPLICANT_PATH,
8813                                         SUPPLICANT_INTERFACE,
8814                                         "RemoveInterface",
8815                                         unregister_interface_remove_params,
8816                                         NULL, interface->path, NULL);
8817 }
8818
8819 void g_supplicant_unregister(const GSupplicantCallbacks *callbacks)
8820 {
8821         SUPPLICANT_DBG("");
8822
8823         if (connection) {
8824 #if defined TIZEN_EXT_WIFI_MESH
8825                 dbus_bus_remove_match(connection, g_supplicant_rule9, NULL);
8826 #endif
8827 #if !defined TIZEN_EXT
8828                 dbus_bus_remove_match(connection, g_supplicant_rule8, NULL);
8829                 dbus_bus_remove_match(connection, g_supplicant_rule7, NULL);
8830                 dbus_bus_remove_match(connection, g_supplicant_rule6, NULL);
8831 #endif
8832                 dbus_bus_remove_match(connection, g_supplicant_rule5, NULL);
8833                 dbus_bus_remove_match(connection, g_supplicant_rule4, NULL);
8834                 dbus_bus_remove_match(connection, g_supplicant_rule3, NULL);
8835                 dbus_bus_remove_match(connection, g_supplicant_rule2, NULL);
8836                 dbus_bus_remove_match(connection, g_supplicant_rule1, NULL);
8837                 dbus_bus_remove_match(connection, g_supplicant_rule0, NULL);
8838                 dbus_connection_flush(connection);
8839
8840                 dbus_connection_remove_filter(connection,
8841                                                 g_supplicant_filter, NULL);
8842         }
8843
8844         if (config_file_table) {
8845                 g_hash_table_destroy(config_file_table);
8846                 config_file_table = NULL;
8847         }
8848
8849         if (bss_mapping) {
8850                 g_hash_table_destroy(bss_mapping);
8851                 bss_mapping = NULL;
8852         }
8853
8854         if (peer_mapping) {
8855                 g_hash_table_destroy(peer_mapping);
8856                 peer_mapping = NULL;
8857         }
8858
8859         if (group_mapping) {
8860                 g_hash_table_destroy(group_mapping);
8861                 group_mapping = NULL;
8862         }
8863
8864         if (interface_table) {
8865                 g_hash_table_foreach(interface_table,
8866                                         unregister_remove_interface, NULL);
8867                 g_hash_table_destroy(interface_table);
8868                 interface_table = NULL;
8869         }
8870
8871         if (system_available)
8872                 callback_system_killed();
8873
8874         if (connection) {
8875                 dbus_connection_unref(connection);
8876                 connection = NULL;
8877         }
8878
8879         callbacks_pointer = NULL;
8880         eap_methods = 0;
8881 }
8882
8883 #ifdef TIZEN_EXT
8884 struct supplicant_mac_policy {
8885         GSupplicantMacPolicyCallback callback;
8886         dbus_uint32_t policy;
8887         const void *user_data;
8888 };
8889
8890 static void mac_policy_result(const char *error,
8891                                 DBusMessageIter *iter, void *user_data)
8892 {
8893         struct supplicant_mac_policy *data = user_data;
8894         int result = 0;
8895
8896         if (!user_data)
8897                 return;
8898
8899         if (error) {
8900                 SUPPLICANT_DBG("Mac policy setting failure %s", error);
8901                 result = -EINVAL;
8902         }
8903
8904         if (data->callback)
8905                 data->callback(result, data->policy,
8906                                         (void *) data->user_data);
8907
8908         dbus_free(data);
8909 }
8910
8911 static void mac_policy_params(DBusMessageIter *iter, void *user_data)
8912 {
8913         struct supplicant_mac_policy *data = user_data;
8914
8915         dbus_message_iter_append_basic(iter, DBUS_TYPE_INT32, &(data->policy));
8916 }
8917
8918 int g_supplicant_interface_set_mac_policy(GSupplicantInterface *interface,
8919                                         GSupplicantMacPolicyCallback callback,
8920                                                         unsigned int policy,
8921                                                         void *user_data)
8922 {
8923         struct supplicant_mac_policy *data = NULL;
8924         int ret;
8925
8926         if (!system_available)
8927                 return -EFAULT;
8928
8929         if (!interface)
8930                 return -EINVAL;
8931
8932         data = dbus_malloc0(sizeof(*data));
8933         if (!data)
8934                 return -ENOMEM;
8935
8936         data->callback = callback;
8937         data->policy = policy;
8938         data->user_data = user_data;
8939
8940         ret =  supplicant_dbus_property_set(interface->path,
8941                                 SUPPLICANT_INTERFACE ".Interface",
8942                                 "MacAddr", DBUS_TYPE_INT32_AS_STRING,
8943                                 mac_policy_params, mac_policy_result, data, NULL);
8944         if (ret < 0) {
8945                 SUPPLICANT_DBG("Unable to set MacAddr configuration");
8946                 dbus_free(data);
8947         }
8948
8949         return ret;
8950 }
8951
8952 int g_supplicant_interface_set_preassoc_mac_policy(GSupplicantInterface *interface,
8953                                         GSupplicantMacPolicyCallback callback,
8954                                                         unsigned int policy,
8955                                                         void *user_data)
8956 {
8957         struct supplicant_mac_policy *data;
8958         int ret;
8959
8960         if (!system_available)
8961                 return -EFAULT;
8962
8963         if (!interface)
8964                 return -EINVAL;
8965
8966         data = dbus_malloc0(sizeof(*data));
8967         if (!data)
8968                 return -ENOMEM;
8969
8970         data->callback = callback;
8971         data->policy = policy;
8972         data->user_data = user_data;
8973
8974         ret =  supplicant_dbus_property_set(interface->path,
8975                                 SUPPLICANT_INTERFACE ".Interface",
8976                                 "PreassocMacAddr", DBUS_TYPE_INT32_AS_STRING,
8977                                 mac_policy_params, mac_policy_result, data, NULL);
8978         if (ret < 0) {
8979                 SUPPLICANT_DBG("Unable to set PreassocMacAddr configuration");
8980                 dbus_free(data);
8981         }
8982
8983         return ret;
8984 }
8985
8986 struct supplicant_random_mac_lifetime {
8987         GSupplicantRandomMaclifetimeCallback callback;
8988         dbus_uint32_t lifetime;
8989         const void *user_data;
8990 };
8991
8992 static void random_mac_lifetime_result(const char *error,
8993                                 DBusMessageIter *iter, void *user_data)
8994 {
8995         struct supplicant_random_mac_lifetime *data = user_data;
8996         int result = 0;
8997
8998         if (!user_data)
8999                 return;
9000
9001         if (error) {
9002                 SUPPLICANT_DBG("Random Mac lifetime setting failure %s", error);
9003                 result = -EINVAL;
9004         }
9005
9006         if (data->callback)
9007                 data->callback(result, data->lifetime,
9008                                         (void *) data->user_data);
9009
9010         dbus_free(data);
9011 }
9012
9013 static void random_mac_lifetime_params(DBusMessageIter *iter, void *user_data)
9014 {
9015         struct supplicant_random_mac_lifetime *data = user_data;
9016
9017         dbus_message_iter_append_basic(iter, DBUS_TYPE_UINT32, &(data->lifetime));
9018 }
9019
9020 int g_supplicant_interface_set_random_mac_lifetime(GSupplicantInterface *interface,
9021                                         GSupplicantRandomMaclifetimeCallback callback,
9022                                                         unsigned int lifetime,
9023                                                         void *user_data)
9024 {
9025         struct supplicant_random_mac_lifetime *data;
9026         int ret;
9027
9028         if (!system_available)
9029                 return -EFAULT;
9030
9031         if (!interface)
9032                 return -EINVAL;
9033
9034         data = dbus_malloc0(sizeof(*data));
9035         if (!data)
9036                 return -ENOMEM;
9037
9038         data->callback = callback;
9039         data->lifetime = lifetime;
9040         data->user_data = user_data;
9041
9042         ret =  supplicant_dbus_property_set(interface->path,
9043                                 SUPPLICANT_INTERFACE ".Interface",
9044                                 "RandAddrLifetime", DBUS_TYPE_UINT32_AS_STRING,
9045                                 random_mac_lifetime_params, random_mac_lifetime_result,
9046                                 data, NULL);
9047         if (ret < 0) {
9048                 SUPPLICANT_DBG("Unable to set RandAddrLifetime configuration");
9049                 dbus_free(data);
9050         }
9051
9052         return ret;
9053 }
9054 #endif