Handle the case that best_bss is NULL
[platform/upstream/connman.git] / gsupplicant / supplicant.c
1 /*
2  *
3  *  WPA supplicant library with GLib integration
4  *
5  *  Copyright (C) 2012-2013  Intel Corporation. All rights reserved.
6  *
7  *  This program is free software; you can redistribute it and/or modify
8  *  it under the terms of the GNU General Public License version 2 as
9  *  published by the Free Software Foundation.
10  *
11  *  This program is distributed in the hope that it will be useful,
12  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
13  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14  *  GNU General Public License for more details.
15  *
16  *  You should have received a copy of the GNU General Public License
17  *  along with this program; if not, write to the Free Software
18  *  Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA
19  *
20  */
21
22 #ifdef HAVE_CONFIG_H
23 #include <config.h>
24 #endif
25
26 #include <errno.h>
27 #include <stdio.h>
28 #include <stdlib.h>
29 #include <string.h>
30 #include <stdint.h>
31 #include <syslog.h>
32 #include <ctype.h>
33 #include <stdbool.h>
34 #include <netinet/if_ether.h>
35 #include <netinet/in.h>
36
37 #include <glib.h>
38 #include <gdbus.h>
39
40 #include "dbus.h"
41 #include "gsupplicant.h"
42
43 #define IEEE80211_CAP_ESS       0x0001
44 #define IEEE80211_CAP_IBSS      0x0002
45 #define IEEE80211_CAP_PRIVACY   0x0010
46
47 #if defined TIZEN_EXT
48 #define WLAN_EID_HT_CAP 45
49 #define WLAN_EID_VHT_CAP 191
50 #define WLAN_EID_SUPP_RATES 1
51 #define WLAN_EID_EXT_SUPP_RATES 50
52 #define COUNTRY_CODE_LENGTH     2
53 #define WIFI_BSSID_LEN_MAX 6
54 #endif
55
56 #if defined TIZEN_EXT
57 #define LAST_CONNECTED_TIMEOUT       (5 * 60)
58 #define ASSOC_REJECT_TIMEOUT         10
59 #define FREQ_RANGE_24GHZ_CHANNEL_1   2412
60 #define FREQ_RANGE_24GHZ_CHANNEL_14  2484
61 #define FREQ_RANGE_5GHZ_CHANNEL_32   5160
62 #define FREQ_RANGE_5GHZ_CHANNEL_165  5825
63
64 #define MAC2STR(a) (a)[0], (a)[1], (a)[2], (a)[3], (a)[4], (a)[5]
65 #define MACSTR "%02x:%02x:%02x:%02x:%02x:%02x"
66 #endif
67
68 #define BSS_UNKNOWN_STRENGTH    -90
69
70 static DBusConnection *connection;
71
72 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
73 static GSupplicantCallbacks *callbacks_pointer;
74 #else /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
75 static const GSupplicantCallbacks *callbacks_pointer;
76 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
77
78 static dbus_bool_t system_available = FALSE;
79 static dbus_bool_t system_ready = FALSE;
80
81 static dbus_int32_t debug_level;
82 static dbus_bool_t debug_timestamp = FALSE;
83 static dbus_bool_t debug_showkeys = FALSE;
84
85 static const char *debug_strings[] = {
86         "msgdump", "debug", "info", "warning", "error", NULL
87 };
88
89 static unsigned int eap_methods;
90
91 struct strvalmap {
92         const char *str;
93         unsigned int val;
94 };
95
96 static struct strvalmap eap_method_map[] = {
97         { "MD5",        G_SUPPLICANT_EAP_METHOD_MD5     },
98         { "TLS",        G_SUPPLICANT_EAP_METHOD_TLS     },
99         { "MSCHAPV2",   G_SUPPLICANT_EAP_METHOD_MSCHAPV2        },
100         { "PEAP",       G_SUPPLICANT_EAP_METHOD_PEAP    },
101         { "TTLS",       G_SUPPLICANT_EAP_METHOD_TTLS    },
102         { "GTC",        G_SUPPLICANT_EAP_METHOD_GTC     },
103         { "OTP",        G_SUPPLICANT_EAP_METHOD_OTP     },
104         { "LEAP",       G_SUPPLICANT_EAP_METHOD_LEAP    },
105         { "WSC",        G_SUPPLICANT_EAP_METHOD_WSC     },
106         { }
107 };
108
109 static struct strvalmap keymgmt_map[] = {
110         { "none",               G_SUPPLICANT_KEYMGMT_NONE               },
111         { "ieee8021x",          G_SUPPLICANT_KEYMGMT_IEEE8021X  },
112         { "wpa-none",           G_SUPPLICANT_KEYMGMT_WPA_NONE   },
113         { "wpa-psk",            G_SUPPLICANT_KEYMGMT_WPA_PSK    },
114         { "wpa-psk-sha256",     G_SUPPLICANT_KEYMGMT_WPA_PSK_256        },
115         { "wpa-ft-psk",         G_SUPPLICANT_KEYMGMT_WPA_FT_PSK },
116         { "wpa-ft-eap",         G_SUPPLICANT_KEYMGMT_WPA_FT_EAP },
117         { "wpa-eap",            G_SUPPLICANT_KEYMGMT_WPA_EAP    },
118         { "wpa-eap-sha256",     G_SUPPLICANT_KEYMGMT_WPA_EAP_256        },
119         { "wps",                G_SUPPLICANT_KEYMGMT_WPS                },
120 #if defined TIZEN_EXT
121         { "sae",                G_SUPPLICANT_KEYMGMT_SAE                },
122         { "owe",                G_SUPPLICANT_KEYMGMT_OWE                },
123         { "dpp",                G_SUPPLICANT_KEYMGMT_DPP                },
124 #endif
125         { }
126 };
127
128 static struct strvalmap authalg_capa_map[] = {
129         { "open",       G_SUPPLICANT_CAPABILITY_AUTHALG_OPEN    },
130         { "shared",     G_SUPPLICANT_CAPABILITY_AUTHALG_SHARED  },
131         { "leap",       G_SUPPLICANT_CAPABILITY_AUTHALG_LEAP    },
132         { }
133 };
134
135 static struct strvalmap proto_capa_map[] = {
136         { "wpa",        G_SUPPLICANT_CAPABILITY_PROTO_WPA               },
137         { "rsn",        G_SUPPLICANT_CAPABILITY_PROTO_RSN               },
138         { }
139 };
140
141 static struct strvalmap group_map[] = {
142         { "wep40",      G_SUPPLICANT_GROUP_WEP40        },
143         { "wep104",     G_SUPPLICANT_GROUP_WEP104       },
144         { "tkip",       G_SUPPLICANT_GROUP_TKIP },
145         { "ccmp",       G_SUPPLICANT_GROUP_CCMP },
146         { }
147 };
148
149 static struct strvalmap pairwise_map[] = {
150         { "none",       G_SUPPLICANT_PAIRWISE_NONE      },
151         { "tkip",       G_SUPPLICANT_PAIRWISE_TKIP      },
152         { "ccmp",       G_SUPPLICANT_PAIRWISE_CCMP      },
153         { }
154 };
155
156 static struct strvalmap scan_capa_map[] = {
157         { "active",     G_SUPPLICANT_CAPABILITY_SCAN_ACTIVE     },
158         { "passive",    G_SUPPLICANT_CAPABILITY_SCAN_PASSIVE    },
159         { "ssid",       G_SUPPLICANT_CAPABILITY_SCAN_SSID               },
160         { }
161 };
162
163 static struct strvalmap mode_capa_map[] = {
164         { "infrastructure",     G_SUPPLICANT_CAPABILITY_MODE_INFRA      },
165         { "ad-hoc",             G_SUPPLICANT_CAPABILITY_MODE_IBSS       },
166         { "ap",                 G_SUPPLICANT_CAPABILITY_MODE_AP         },
167         { "p2p",                G_SUPPLICANT_CAPABILITY_MODE_P2P        },
168 #if defined TIZEN_EXT_WIFI_MESH
169         { "mesh",               G_SUPPLICANT_CAPABILITY_MODE_MESH       },
170 #endif
171         { }
172 };
173
174 #if defined TIZEN_EXT
175 struct _GSupplicantINSSettings {
176         GSupplicantINSPreferredFreq preferred_freq_bssid;
177         unsigned int preferred_freq_bssid_score;
178         bool last_connected_bssid;
179         unsigned int last_connected_bssid_score;
180         bool assoc_reject;
181         unsigned int assoc_reject_score;
182         bool signal_bssid;
183         int signal_level3_5ghz;
184         int signal_level3_24ghz;
185 };
186
187 static struct _GSupplicantINSSettings ins_settings;
188
189 static unsigned char invalid_bssid[WIFI_BSSID_LEN_MAX] = {
190         0x00, 0x00, 0x00, 0x00, 0x00, 0x00
191 };
192 #endif
193
194 static GHashTable *interface_table;
195 static GHashTable *bss_mapping;
196 static GHashTable *peer_mapping;
197 static GHashTable *group_mapping;
198 static GHashTable *pending_peer_connection;
199 static GHashTable *config_file_table;
200
201 struct _GSupplicantWpsCredentials {
202         unsigned char ssid[32];
203         unsigned int ssid_len;
204         char *key;
205 };
206
207 struct added_network_information {
208         char * ssid;
209         GSupplicantSecurity security;
210         char * passphrase;
211         char * private_passphrase;
212 #if defined TIZEN_EXT
213         char *connector;
214         char *c_sign_key;
215         char *net_access_key;
216 #endif
217 };
218
219 #if defined TIZEN_EXT_WIFI_MESH
220 struct _GSupplicantMeshGroupInfo {
221         unsigned char ssid[32];
222         unsigned int ssid_len;
223         int disconnect_reason;
224 };
225 #endif
226
227 struct _GSupplicantInterface {
228         char *path;
229         char *network_path;
230         unsigned int keymgmt_capa;
231         unsigned int authalg_capa;
232         unsigned int proto_capa;
233         unsigned int group_capa;
234         unsigned int pairwise_capa;
235         unsigned int scan_capa;
236         unsigned int mode_capa;
237         unsigned int max_scan_ssids;
238         bool p2p_support;
239         bool p2p_finding;
240         bool ap_create_in_progress;
241         dbus_bool_t ready;
242         GSupplicantState state;
243         dbus_bool_t scanning;
244         GSupplicantInterfaceCallback scan_callback;
245         void *scan_data;
246         int apscan;
247         char *ifname;
248         char *driver;
249         char *bridge;
250         struct _GSupplicantWpsCredentials wps_cred;
251         GSupplicantWpsState wps_state;
252         GHashTable *network_table;
253         GHashTable *peer_table;
254         GHashTable *group_table;
255         GHashTable *bss_mapping;
256         void *data;
257         const char *pending_peer_path;
258         GSupplicantNetwork *current_network;
259         struct added_network_information network_info;
260 #if defined TIZEN_EXT
261         dbus_bool_t is_5_0_Ghz_supported;
262         int disconnect_reason;
263 #endif
264 #if defined TIZEN_EXT
265         unsigned char add_network_bssid[WIFI_BSSID_LEN_MAX];
266         unsigned char connected_bssid[WIFI_BSSID_LEN_MAX];
267 #endif
268 #if defined TIZEN_EXT_WIFI_MESH
269         bool mesh_support;
270         struct _GSupplicantMeshGroupInfo group_info;
271 #endif
272 };
273
274 struct g_supplicant_bss {
275         GSupplicantInterface *interface;
276         char *path;
277         unsigned char bssid[6];
278         unsigned char ssid[32];
279         unsigned int ssid_len;
280         dbus_uint16_t frequency;
281         dbus_uint32_t maxrate;
282         dbus_int16_t signal;
283         GSupplicantMode mode;
284         GSupplicantSecurity security;
285         dbus_bool_t rsn_selected;
286         unsigned int wpa_keymgmt;
287         unsigned int wpa_pairwise;
288         unsigned int wpa_group;
289         unsigned int rsn_keymgmt;
290         unsigned int rsn_pairwise;
291         unsigned int rsn_group;
292         unsigned int keymgmt;
293         dbus_bool_t privacy;
294         dbus_bool_t psk;
295         dbus_bool_t ieee8021x;
296 #if defined TIZEN_EXT
297         dbus_bool_t ft_psk;
298         dbus_bool_t ft_ieee8021x;
299         GSList *vsie_list;
300         dbus_bool_t hs20;
301         unsigned char country_code[COUNTRY_CODE_LENGTH];
302         GSupplicantPhy_mode phy_mode;
303 #endif
304         unsigned int wps_capabilities;
305 #if defined TIZEN_EXT
306         dbus_bool_t sae;
307         dbus_bool_t owe;
308         dbus_bool_t dpp;
309 #endif
310 };
311
312 struct _GSupplicantNetwork {
313         GSupplicantInterface *interface;
314         char *path;
315         char *group;
316         char *name;
317         unsigned char ssid[32];
318         unsigned int ssid_len;
319         dbus_int16_t signal;
320         dbus_uint16_t frequency;
321         struct g_supplicant_bss *best_bss;
322         GSupplicantMode mode;
323         GSupplicantSecurity security;
324         dbus_bool_t wps;
325         unsigned int wps_capabilities;
326         GHashTable *bss_table;
327         GHashTable *config_table;
328 #if defined TIZEN_EXT
329         bool isHS20AP;
330         char *eap;
331         char *identity;
332         char *phase2;
333         unsigned int keymgmt;
334         GSList *vsie_list;
335         unsigned char country_code[COUNTRY_CODE_LENGTH];
336         GSupplicantPhy_mode phy_mode;
337 #endif
338 #if defined TIZEN_EXT
339         unsigned char last_connected_bssid[WIFI_BSSID_LEN_MAX];
340         GHashTable *assoc_reject_table;
341 #endif
342 };
343
344 struct _GSupplicantPeer {
345         GSupplicantInterface *interface;
346         char *path;
347         unsigned char device_address[ETH_ALEN];
348         unsigned char iface_address[ETH_ALEN];
349         char *name;
350         unsigned char *widi_ies;
351         int widi_ies_length;
352         char *identifier;
353         unsigned int wps_capabilities;
354         GSList *groups;
355         const GSupplicantInterface *current_group_iface;
356         bool connection_requested;
357 };
358
359 struct _GSupplicantGroup {
360         GSupplicantInterface *interface;
361         GSupplicantInterface *orig_interface;
362         char *path;
363         int role;
364         GSList *members;
365 };
366
367 struct interface_data {
368         GSupplicantInterface *interface;
369         char *path; /* Interface path cannot be taken from interface (above) as
370                      * it might have been freed already.
371                      */
372         GSupplicantInterfaceCallback callback;
373         void *user_data;
374         bool network_remove_in_progress;
375         GSupplicantSSID *ssid;
376 };
377
378 #if defined TIZEN_EXT
379 struct interface_signalpoll_data {
380         GSupplicantInterface *interface;
381         char *path;
382         GSupplicantMaxSpeedCallback callback;
383         void *user_data;
384 };
385 #endif
386
387 struct interface_create_data {
388         char *ifname;
389         char *driver;
390         char *bridge;
391 #if defined TIZEN_EXT_WIFI_MESH
392         char *parent_ifname;
393         bool is_mesh_interface;
394 #endif
395         GSupplicantInterface *interface;
396         GSupplicantInterfaceCallback callback;
397         void *user_data;
398 };
399
400 struct interface_connect_data {
401         GSupplicantInterface *interface;
402         char *path;
403         GSupplicantInterfaceCallback callback;
404         void *user_data;
405         union {
406                 GSupplicantSSID *ssid;
407                 GSupplicantPeerParams *peer;
408         };
409 };
410
411 struct interface_scan_data {
412         GSupplicantInterface *interface;
413         char *path;
414         GSupplicantInterfaceCallback callback;
415         GSupplicantScanParams *scan_params;
416         void *user_data;
417 };
418
419 #if defined TIZEN_EXT
420 struct g_connman_bssids {
421         unsigned char bssid[WIFI_BSSID_LEN_MAX];
422         uint16_t strength;
423         uint16_t frequency;
424         uint16_t assoc_reject_cnt;
425         bool is_last_connected;
426 #if defined TIZEN_EXT_INS
427         int score_last_connected_bssid;
428         int score_assoc_reject;
429         int score_frequency;
430         int score_strength;
431 #endif
432         int ins_score;
433 };
434
435 struct update_bssid_data {
436         GSupplicantNetwork *network;
437         unsigned char last_connected_bssid[WIFI_BSSID_LEN_MAX];
438         GHashTable *assoc_reject_table;
439         GSList *bssid_list;
440 };
441
442 struct assoc_reject_data {
443         char *bssid;
444         GSList *reject_time_list;
445 };
446
447 struct assoc_count_data {
448         time_t ref_time;
449         int assoc_count;
450 };
451
452 static unsigned int last_connected_bss_timeout = 0;
453 #endif
454
455 static void interface_get_params(DBusMessageIter *iter, void *user_data);
456 static void interface_get_result(const char *error,
457                                 DBusMessageIter *iter, void *user_data);
458
459 static int network_remove(struct interface_data *data);
460
461 #if defined TIZEN_EXT_WIFI_MESH
462 struct _GSupplicantMeshPeer {
463         GSupplicantInterface *interface;
464         char *peer_address;
465         int disconnect_reason;
466 };
467 #endif
468
469 static inline void debug(const char *format, ...)
470 {
471         char str[256];
472         va_list ap;
473
474         if (!callbacks_pointer || !callbacks_pointer->debug)
475                 return;
476
477         va_start(ap, format);
478
479         if (vsnprintf(str, sizeof(str), format, ap) > 0)
480                 callbacks_pointer->debug(str);
481
482         va_end(ap);
483 }
484
485 #define SUPPLICANT_DBG(fmt, arg...) \
486         debug("%s:%s() " fmt, __FILE__, __FUNCTION__ , ## arg);
487
488 static GSupplicantMode string2mode(const char *mode)
489 {
490         if (!mode)
491                 return G_SUPPLICANT_MODE_UNKNOWN;
492
493         if (g_str_equal(mode, "infrastructure"))
494                 return G_SUPPLICANT_MODE_INFRA;
495         else if (g_str_equal(mode, "ad-hoc"))
496                 return G_SUPPLICANT_MODE_IBSS;
497 #if defined TIZEN_EXT_WIFI_MESH
498         else if (g_str_equal(mode, "mesh"))
499                 return G_SUPPLICANT_MODE_MESH;
500 #endif
501
502         return G_SUPPLICANT_MODE_UNKNOWN;
503 }
504
505 static const char *mode2string(GSupplicantMode mode)
506 {
507         switch (mode) {
508         case G_SUPPLICANT_MODE_UNKNOWN:
509                 break;
510         case G_SUPPLICANT_MODE_INFRA:
511                 return "managed";
512         case G_SUPPLICANT_MODE_IBSS:
513                 return "adhoc";
514         case G_SUPPLICANT_MODE_MASTER:
515                 return "ap";
516 #if defined TIZEN_EXT_WIFI_MESH
517         case G_SUPPLICANT_MODE_MESH:
518                 return "mesh";
519 #endif
520         }
521
522         return NULL;
523 }
524
525 static const char *security2string(GSupplicantSecurity security)
526 {
527         switch (security) {
528         case G_SUPPLICANT_SECURITY_UNKNOWN:
529                 break;
530         case G_SUPPLICANT_SECURITY_NONE:
531                 return "none";
532         case G_SUPPLICANT_SECURITY_WEP:
533                 return "wep";
534         case G_SUPPLICANT_SECURITY_PSK:
535                 return "psk";
536         case G_SUPPLICANT_SECURITY_IEEE8021X:
537                 return "ieee8021x";
538 #if defined TIZEN_EXT
539         case G_SUPPLICANT_SECURITY_FT_PSK:
540                 return "ft_psk";
541         case G_SUPPLICANT_SECURITY_FT_IEEE8021X:
542                 return "ft_ieee8021x";
543         case G_SUPPLICANT_SECURITY_SAE:
544                 return "sae";
545         case G_SUPPLICANT_SECURITY_OWE:
546                 return "owe";
547         case G_SUPPLICANT_SECURITY_DPP:
548                 return "dpp";
549 #endif
550         }
551
552         return NULL;
553 }
554
555 static GSupplicantState string2state(const char *state)
556 {
557         if (!state)
558                 return G_SUPPLICANT_STATE_UNKNOWN;
559
560         if (g_str_equal(state, "unknown"))
561                 return G_SUPPLICANT_STATE_UNKNOWN;
562         else if (g_str_equal(state, "interface_disabled"))
563                 return G_SUPPLICANT_STATE_DISABLED;
564         else if (g_str_equal(state, "disconnected"))
565                 return G_SUPPLICANT_STATE_DISCONNECTED;
566         else if (g_str_equal(state, "inactive"))
567                 return G_SUPPLICANT_STATE_INACTIVE;
568         else if (g_str_equal(state, "scanning"))
569                 return G_SUPPLICANT_STATE_SCANNING;
570         else if (g_str_equal(state, "authenticating"))
571                 return G_SUPPLICANT_STATE_AUTHENTICATING;
572         else if (g_str_equal(state, "associating"))
573                 return G_SUPPLICANT_STATE_ASSOCIATING;
574         else if (g_str_equal(state, "associated"))
575                 return G_SUPPLICANT_STATE_ASSOCIATED;
576         else if (g_str_equal(state, "group_handshake"))
577                 return G_SUPPLICANT_STATE_GROUP_HANDSHAKE;
578         else if (g_str_equal(state, "4way_handshake"))
579                 return G_SUPPLICANT_STATE_4WAY_HANDSHAKE;
580         else if (g_str_equal(state, "completed"))
581                 return G_SUPPLICANT_STATE_COMPLETED;
582
583         return G_SUPPLICANT_STATE_UNKNOWN;
584 }
585
586 static bool compare_network_parameters(GSupplicantInterface *interface,
587                                 GSupplicantSSID *ssid)
588 {
589 #if defined TIZEN_EXT
590         if (!interface->network_info.ssid)
591                 return FALSE;
592 #endif
593
594         if (memcmp(interface->network_info.ssid, ssid->ssid, ssid->ssid_len))
595                 return FALSE;
596
597         if (interface->network_info.security != ssid->security)
598                 return FALSE;
599
600         if (interface->network_info.passphrase &&
601                         g_strcmp0(interface->network_info.passphrase,
602                                 ssid->passphrase) != 0) {
603                 return FALSE;
604         }
605
606         if (interface->network_info.private_passphrase &&
607                         g_strcmp0(interface->network_info.private_passphrase,
608                                 ssid->private_key_passphrase) != 0) {
609                 return FALSE;
610         }
611
612 #if defined TIZEN_EXT
613         if (interface->network_info.connector &&
614                         g_strcmp0(interface->network_info.connector,
615                                 ssid->connector) != 0) {
616                 return FALSE;
617         }
618         if (interface->network_info.c_sign_key &&
619                         g_strcmp0(interface->network_info.c_sign_key,
620                                 ssid->c_sign_key) != 0) {
621                 return FALSE;
622         }
623         if (interface->network_info.net_access_key &&
624                         g_strcmp0(interface->network_info.net_access_key,
625                                 ssid->net_access_key) != 0) {
626                 return FALSE;
627         }
628 #endif
629         return TRUE;
630 }
631
632 static void remove_network_information(GSupplicantInterface * interface)
633 {
634         g_free(interface->network_info.ssid);
635         g_free(interface->network_info.passphrase);
636         g_free(interface->network_info.private_passphrase);
637 #if defined TIZEN_EXT
638         g_free(interface->network_info.connector);
639         g_free(interface->network_info.c_sign_key);
640         g_free(interface->network_info.net_access_key);
641 #endif
642         interface->network_info.ssid = NULL;
643         interface->network_info.passphrase = NULL;
644         interface->network_info.private_passphrase = NULL;
645 #if defined TIZEN_EXT
646         interface->network_info.connector = NULL;
647         interface->network_info.c_sign_key = NULL;
648         interface->network_info.net_access_key = NULL;
649 #endif
650 }
651
652 static int store_network_information(GSupplicantInterface * interface,
653                                 GSupplicantSSID *ssid)
654 {
655         interface->network_info.ssid = g_malloc(ssid->ssid_len + 1);
656         if (interface->network_info.ssid != NULL) {
657                 memcpy(interface->network_info.ssid, ssid->ssid,
658                         ssid->ssid_len);
659                 interface->network_info.ssid[ssid->ssid_len] = '\0';
660         } else {
661                 return -ENOMEM;
662         }
663
664         interface->network_info.security = ssid->security;
665
666         if ((ssid->security == G_SUPPLICANT_SECURITY_WEP ||
667                 ssid->security == G_SUPPLICANT_SECURITY_PSK ||
668                 ssid->security == G_SUPPLICANT_SECURITY_NONE) &&
669                 ssid->passphrase) {
670                 interface->network_info.passphrase = g_strdup(ssid->passphrase);
671         }
672
673         if (ssid->security == G_SUPPLICANT_SECURITY_IEEE8021X &&
674                         ssid->private_key_passphrase) {
675                 interface->network_info.private_passphrase =
676                         g_strdup(ssid->private_key_passphrase);
677         }
678
679         return 0;
680 }
681
682 static void callback_system_ready(void)
683 {
684         if (system_ready)
685                 return;
686
687         system_ready = TRUE;
688
689         if (!callbacks_pointer)
690                 return;
691
692         if (!callbacks_pointer->system_ready)
693                 return;
694
695         callbacks_pointer->system_ready();
696 }
697
698 static void callback_system_killed(void)
699 {
700         system_ready = FALSE;
701
702         if (!callbacks_pointer)
703                 return;
704
705         if (!callbacks_pointer->system_killed)
706                 return;
707
708         callbacks_pointer->system_killed();
709 }
710
711 static void callback_interface_added(GSupplicantInterface *interface)
712 {
713         SUPPLICANT_DBG("");
714
715         if (!callbacks_pointer)
716                 return;
717
718         if (!callbacks_pointer->interface_added)
719                 return;
720
721         callbacks_pointer->interface_added(interface);
722 }
723
724 static void callback_interface_state(GSupplicantInterface *interface)
725 {
726         if (!callbacks_pointer)
727                 return;
728
729         if (!callbacks_pointer->interface_state)
730                 return;
731
732         callbacks_pointer->interface_state(interface);
733 }
734
735 static void callback_interface_removed(GSupplicantInterface *interface)
736 {
737         if (!callbacks_pointer)
738                 return;
739
740         if (!callbacks_pointer->interface_removed)
741                 return;
742
743         callbacks_pointer->interface_removed(interface);
744 }
745
746 #if !defined TIZEN_EXT
747 static void callback_p2p_support(GSupplicantInterface *interface)
748 {
749         SUPPLICANT_DBG("");
750
751         if (!interface->p2p_support)
752                 return;
753
754         if (callbacks_pointer && callbacks_pointer->p2p_support)
755                 callbacks_pointer->p2p_support(interface);
756 }
757 #endif
758
759 #if defined TIZEN_EXT_WIFI_MESH
760 static void callback_mesh_support(GSupplicantInterface *interface)
761 {
762         SUPPLICANT_DBG("");
763
764         if (!interface->mesh_support)
765                 return;
766
767         if (callbacks_pointer && callbacks_pointer->mesh_support)
768                 callbacks_pointer->mesh_support(interface);
769 }
770
771 bool g_supplicant_interface_has_mesh(GSupplicantInterface *interface)
772 {
773         if (!interface)
774                 return false;
775
776         return interface->mesh_support;
777 }
778 #endif
779
780 static void callback_scan_started(GSupplicantInterface *interface)
781 {
782         if (!callbacks_pointer)
783                 return;
784
785         if (!callbacks_pointer->scan_started)
786                 return;
787
788         callbacks_pointer->scan_started(interface);
789 }
790
791 static void callback_ap_create_fail(GSupplicantInterface *interface)
792 {
793         if (!callbacks_pointer)
794                 return;
795
796         if (!callbacks_pointer->ap_create_fail)
797                 return;
798
799         callbacks_pointer->ap_create_fail(interface);
800 }
801
802 static void callback_scan_finished(GSupplicantInterface *interface)
803 {
804         if (!callbacks_pointer)
805                 return;
806
807         if (!callbacks_pointer->scan_finished)
808                 return;
809
810         callbacks_pointer->scan_finished(interface);
811 }
812
813 static void callback_network_added(GSupplicantNetwork *network)
814 {
815         if (!callbacks_pointer)
816                 return;
817
818         if (!callbacks_pointer->network_added)
819                 return;
820
821         callbacks_pointer->network_added(network);
822 }
823
824 static void callback_network_removed(GSupplicantNetwork *network)
825 {
826         if (!callbacks_pointer)
827                 return;
828
829         if (!callbacks_pointer->network_removed)
830                 return;
831
832         callbacks_pointer->network_removed(network);
833 }
834
835 #if defined TIZEN_EXT
836 static void callback_network_merged(GSupplicantNetwork *network)
837 {
838         if (!callbacks_pointer)
839                 return;
840
841         if (!callbacks_pointer->network_merged)
842                 return;
843
844         callbacks_pointer->network_merged(network);
845 }
846
847 static void callback_assoc_failed(void *user_data)
848 {
849         if (!callbacks_pointer)
850                 return;
851
852         if (!callbacks_pointer->assoc_failed)
853                 return;
854
855         callbacks_pointer->assoc_failed(user_data);
856 }
857
858 static void callback_scan_done(GSupplicantInterface *interface)
859 {
860         if (!callbacks_pointer)
861                 return;
862
863         if (!callbacks_pointer->scan_done)
864                 return;
865
866         callbacks_pointer->scan_done(interface);
867 }
868 #endif
869
870 static void callback_network_changed(GSupplicantNetwork *network,
871                                         const char *property)
872 {
873         if (!callbacks_pointer)
874                 return;
875
876         if (!callbacks_pointer->network_changed)
877                 return;
878
879         callbacks_pointer->network_changed(network, property);
880 }
881
882 static void callback_network_associated(GSupplicantNetwork *network)
883 {
884         if (!callbacks_pointer)
885                 return;
886
887         if (!callbacks_pointer->network_associated)
888                 return;
889
890         callbacks_pointer->network_associated(network);
891 }
892
893 static void callback_sta_authorized(GSupplicantInterface *interface,
894                                         const char *addr)
895 {
896         if (!callbacks_pointer)
897                 return;
898
899         if (!callbacks_pointer->sta_authorized)
900                 return;
901
902         callbacks_pointer->sta_authorized(interface, addr);
903 }
904
905 static void callback_sta_deauthorized(GSupplicantInterface *interface,
906                                         const char *addr)
907 {
908         if (!callbacks_pointer)
909                 return;
910
911         if (!callbacks_pointer->sta_deauthorized)
912                 return;
913
914         callbacks_pointer->sta_deauthorized(interface, addr);
915 }
916
917 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
918 static void callback_eap(GSupplicantInterface *interface, bool status)
919 {
920         if (!callbacks_pointer)
921                 return;
922
923         if (!callbacks_pointer->eap)
924                 return;
925
926         callbacks_pointer->eap(interface, status);
927 }
928 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
929
930 static void callback_peer_found(GSupplicantPeer *peer)
931 {
932         if (!callbacks_pointer)
933                 return;
934
935         if (!callbacks_pointer->peer_found)
936                 return;
937
938         callbacks_pointer->peer_found(peer);
939 }
940
941 static void callback_peer_lost(GSupplicantPeer *peer)
942 {
943         if (!callbacks_pointer)
944                 return;
945
946         if (!callbacks_pointer->peer_lost)
947                 return;
948
949         callbacks_pointer->peer_lost(peer);
950 }
951
952 static void callback_peer_changed(GSupplicantPeer *peer,
953                                                 GSupplicantPeerState state)
954 {
955         if (!callbacks_pointer)
956                 return;
957
958         if (!callbacks_pointer->peer_changed)
959                 return;
960
961         callbacks_pointer->peer_changed(peer, state);
962 }
963
964 static void callback_peer_request(GSupplicantPeer *peer)
965 {
966         if (!callbacks_pointer)
967                 return;
968
969         if (!callbacks_pointer->peer_request)
970                 return;
971
972         peer->connection_requested = true;
973
974         callbacks_pointer->peer_request(peer);
975 }
976
977 static void callback_disconnect_reason_code(GSupplicantInterface *interface,
978                                         int reason_code)
979 {
980         if (!callbacks_pointer)
981                 return;
982
983         if (!callbacks_pointer->disconnect_reasoncode)
984                 return;
985
986         if (reason_code != 0)
987                 callbacks_pointer->disconnect_reasoncode(interface,
988                                                         reason_code);
989 }
990
991 static void callback_assoc_status_code(GSupplicantInterface *interface,
992                                 int status_code)
993 {
994         if (!callbacks_pointer)
995                 return;
996
997         if (!callbacks_pointer->assoc_status_code)
998                 return;
999
1000         callbacks_pointer->assoc_status_code(interface, status_code);
1001
1002 }
1003
1004 static void remove_group(gpointer data)
1005 {
1006         GSupplicantGroup *group = data;
1007
1008         if (group->members)
1009                 g_slist_free_full(group->members, g_free);
1010
1011         g_free(group->path);
1012         g_free(group);
1013 }
1014
1015 static void remove_interface(gpointer data)
1016 {
1017         GSupplicantInterface *interface = data;
1018
1019         g_hash_table_destroy(interface->bss_mapping);
1020         g_hash_table_destroy(interface->network_table);
1021         g_hash_table_destroy(interface->peer_table);
1022         g_hash_table_destroy(interface->group_table);
1023
1024         if (interface->scan_callback) {
1025                 SUPPLICANT_DBG("call interface %p callback %p scanning %d",
1026                                 interface, interface->scan_callback,
1027                                 interface->scanning);
1028
1029                 interface->scan_callback(-EIO, interface, interface->scan_data);
1030                 interface->scan_callback = NULL;
1031                 interface->scan_data = NULL;
1032
1033                 if (interface->scanning) {
1034                         interface->scanning = FALSE;
1035                         callback_scan_finished(interface);
1036                 }
1037         }
1038
1039         callback_interface_removed(interface);
1040
1041         g_free(interface->wps_cred.key);
1042         g_free(interface->path);
1043         g_free(interface->network_path);
1044 #if defined TIZEN_EXT
1045         interface->network_path = NULL;
1046 #endif
1047         g_free(interface->ifname);
1048         g_free(interface->driver);
1049         g_free(interface->bridge);
1050         remove_network_information(interface);
1051         g_free(interface);
1052 }
1053
1054 static void remove_network(gpointer data)
1055 {
1056         GSupplicantNetwork *network = data;
1057
1058         g_hash_table_destroy(network->bss_table);
1059
1060         callback_network_removed(network);
1061
1062         g_hash_table_destroy(network->config_table);
1063 #if defined TIZEN_EXT
1064         g_hash_table_destroy(network->assoc_reject_table);
1065 #endif
1066
1067         g_free(network->path);
1068         g_free(network->group);
1069         g_free(network->name);
1070 #if defined TIZEN_EXT
1071         g_free(network->eap);
1072         g_free(network->identity);
1073         g_free(network->phase2);
1074 #endif
1075 #if defined TIZEN_EXT
1076         g_slist_free_full(network->vsie_list, g_free);
1077 #endif
1078
1079         g_free(network);
1080 }
1081
1082 static void remove_bss(gpointer data)
1083 {
1084         struct g_supplicant_bss *bss = data;
1085
1086         supplicant_dbus_property_call_cancel_all(bss);
1087
1088         g_free(bss->path);
1089 #if defined TIZEN_EXT
1090         g_slist_free_full(bss->vsie_list, g_free);
1091 #endif
1092         g_free(bss);
1093 }
1094
1095 static void remove_peer(gpointer data)
1096 {
1097         GSupplicantPeer *peer = data;
1098
1099         callback_peer_lost(peer);
1100
1101         if (peer->groups)
1102                 g_slist_free_full(peer->groups, g_free);
1103
1104         if (peer_mapping)
1105                 g_hash_table_remove(peer_mapping, peer->path);
1106
1107         if (pending_peer_connection)
1108                 g_hash_table_remove(pending_peer_connection, peer->path);
1109
1110         g_free(peer->path);
1111         g_free(peer->name);
1112         g_free(peer->identifier);
1113         g_free(peer->widi_ies);
1114
1115         g_free(peer);
1116 }
1117
1118 #if defined TIZEN_EXT
1119 static void remove_assoc_data(gpointer data)
1120 {
1121         struct assoc_reject_data *assoc_data = data;
1122
1123         g_free(assoc_data->bssid);
1124         g_slist_free(assoc_data->reject_time_list);
1125
1126         g_free(assoc_data);
1127 }
1128 #endif
1129
1130 static void debug_strvalmap(const char *label, struct strvalmap *map,
1131                                                         unsigned int val)
1132 {
1133         int i;
1134
1135         for (i = 0; map[i].str; i++) {
1136                 if (val & map[i].val)
1137                         SUPPLICANT_DBG("%s: %s", label, map[i].str);
1138         }
1139 }
1140
1141 static void interface_capability_keymgmt(DBusMessageIter *iter, void *user_data)
1142 {
1143         GSupplicantInterface *interface = user_data;
1144         const char *str = NULL;
1145         int i;
1146
1147         dbus_message_iter_get_basic(iter, &str);
1148         if (!str)
1149                 return;
1150
1151         for (i = 0; keymgmt_map[i].str; i++)
1152                 if (strcmp(str, keymgmt_map[i].str) == 0) {
1153                         interface->keymgmt_capa |= keymgmt_map[i].val;
1154                         break;
1155                 }
1156 }
1157
1158 static void interface_capability_authalg(DBusMessageIter *iter, void *user_data)
1159 {
1160         GSupplicantInterface *interface = user_data;
1161         const char *str = NULL;
1162         int i;
1163
1164         dbus_message_iter_get_basic(iter, &str);
1165         if (!str)
1166                 return;
1167
1168         for (i = 0; authalg_capa_map[i].str; i++)
1169                 if (strcmp(str, authalg_capa_map[i].str) == 0) {
1170                         interface->authalg_capa |= authalg_capa_map[i].val;
1171                         break;
1172                 }
1173 }
1174
1175 static void interface_capability_proto(DBusMessageIter *iter, void *user_data)
1176 {
1177         GSupplicantInterface *interface = user_data;
1178         const char *str = NULL;
1179         int i;
1180
1181         dbus_message_iter_get_basic(iter, &str);
1182         if (!str)
1183                 return;
1184
1185         for (i = 0; proto_capa_map[i].str; i++)
1186                 if (strcmp(str, proto_capa_map[i].str) == 0) {
1187                         interface->proto_capa |= proto_capa_map[i].val;
1188                         break;
1189                 }
1190 }
1191
1192 static void interface_capability_pairwise(DBusMessageIter *iter,
1193                                                         void *user_data)
1194 {
1195         GSupplicantInterface *interface = user_data;
1196         const char *str = NULL;
1197         int i;
1198
1199         dbus_message_iter_get_basic(iter, &str);
1200         if (!str)
1201                 return;
1202
1203         for (i = 0; pairwise_map[i].str; i++)
1204                 if (strcmp(str, pairwise_map[i].str) == 0) {
1205                         interface->pairwise_capa |= pairwise_map[i].val;
1206                         break;
1207                 }
1208 }
1209
1210 static void interface_capability_group(DBusMessageIter *iter, void *user_data)
1211 {
1212         GSupplicantInterface *interface = user_data;
1213         const char *str = NULL;
1214         int i;
1215
1216         dbus_message_iter_get_basic(iter, &str);
1217         if (!str)
1218                 return;
1219
1220         for (i = 0; group_map[i].str; i++)
1221                 if (strcmp(str, group_map[i].str) == 0) {
1222                         interface->group_capa |= group_map[i].val;
1223                         break;
1224                 }
1225 }
1226
1227 static void interface_capability_scan(DBusMessageIter *iter, void *user_data)
1228 {
1229         GSupplicantInterface *interface = user_data;
1230         const char *str = NULL;
1231         int i;
1232
1233         dbus_message_iter_get_basic(iter, &str);
1234         if (!str)
1235                 return;
1236
1237         for (i = 0; scan_capa_map[i].str; i++)
1238                 if (strcmp(str, scan_capa_map[i].str) == 0) {
1239                         interface->scan_capa |= scan_capa_map[i].val;
1240                         break;
1241                 }
1242 }
1243
1244 static void interface_capability_mode(DBusMessageIter *iter, void *user_data)
1245 {
1246         GSupplicantInterface *interface = user_data;
1247         const char *str = NULL;
1248         int i;
1249
1250         dbus_message_iter_get_basic(iter, &str);
1251         if (!str)
1252                 return;
1253
1254         for (i = 0; mode_capa_map[i].str; i++)
1255                 if (strcmp(str, mode_capa_map[i].str) == 0) {
1256                         interface->mode_capa |= mode_capa_map[i].val;
1257                         break;
1258                 }
1259 }
1260
1261 static void interface_capability(const char *key, DBusMessageIter *iter,
1262                                                         void *user_data)
1263 {
1264         GSupplicantInterface *interface = user_data;
1265
1266         if (!key)
1267                 return;
1268
1269         if (g_strcmp0(key, "KeyMgmt") == 0)
1270                 supplicant_dbus_array_foreach(iter,
1271                                 interface_capability_keymgmt, interface);
1272         else if (g_strcmp0(key, "AuthAlg") == 0)
1273                 supplicant_dbus_array_foreach(iter,
1274                                 interface_capability_authalg, interface);
1275         else if (g_strcmp0(key, "Protocol") == 0)
1276                 supplicant_dbus_array_foreach(iter,
1277                                 interface_capability_proto, interface);
1278         else if (g_strcmp0(key, "Pairwise") == 0)
1279                 supplicant_dbus_array_foreach(iter,
1280                                 interface_capability_pairwise, interface);
1281         else if (g_strcmp0(key, "Group") == 0)
1282                 supplicant_dbus_array_foreach(iter,
1283                                 interface_capability_group, interface);
1284         else if (g_strcmp0(key, "Scan") == 0)
1285                 supplicant_dbus_array_foreach(iter,
1286                                 interface_capability_scan, interface);
1287         else if (g_strcmp0(key, "Modes") == 0)
1288                 supplicant_dbus_array_foreach(iter,
1289                                 interface_capability_mode, interface);
1290         else if (g_strcmp0(key, "MaxScanSSID") == 0) {
1291                 dbus_int32_t max_scan_ssid;
1292
1293                 dbus_message_iter_get_basic(iter, &max_scan_ssid);
1294                 if (max_scan_ssid < 2)
1295                         max_scan_ssid = 0;
1296                 interface->max_scan_ssids = max_scan_ssid;
1297 #if defined TIZEN_EXT
1298         } else if (g_strcmp0(key, "Is5GhzSupported") == 0) {
1299                 dbus_bool_t is_5_0_Ghz_supported;
1300
1301                 dbus_message_iter_get_basic(iter, &is_5_0_Ghz_supported);
1302                 interface->is_5_0_Ghz_supported = is_5_0_Ghz_supported;
1303 #endif
1304         } else
1305                 SUPPLICANT_DBG("key %s type %c",
1306                                 key, dbus_message_iter_get_arg_type(iter));
1307 }
1308
1309 struct set_apscan_data
1310 {
1311         unsigned int ap_scan;
1312         GSupplicantInterface *interface;
1313 };
1314
1315 static void set_apscan(DBusMessageIter *iter, void *user_data)
1316 {
1317         struct set_apscan_data *data = user_data;
1318         unsigned int ap_scan = data->ap_scan;
1319
1320         dbus_message_iter_append_basic(iter, DBUS_TYPE_UINT32, &ap_scan);
1321 }
1322
1323 static void set_apscan_complete(const char *error,
1324                 DBusMessageIter *iter, void *user_data)
1325 {
1326         struct set_apscan_data *data = user_data;
1327         GSupplicantInterface *interface = data->interface;
1328
1329         if (error) {
1330                 interface->ap_create_in_progress = false;
1331                 SUPPLICANT_DBG("Set AP scan error %s", error);
1332                 goto error;
1333         }
1334
1335         interface->ap_create_in_progress = true;
1336 error:
1337         dbus_free(data);
1338 }
1339
1340 int g_supplicant_interface_set_apscan(GSupplicantInterface *interface,
1341                                                         unsigned int ap_scan)
1342 {
1343         struct set_apscan_data *data;
1344         int ret;
1345
1346         data = dbus_malloc0(sizeof(*data));
1347
1348         if (!data)
1349                 return -ENOMEM;
1350
1351         data->ap_scan = ap_scan;
1352         data->interface = interface;
1353
1354         ret = supplicant_dbus_property_set(interface->path,
1355                         SUPPLICANT_INTERFACE ".Interface",
1356                         "ApScan", DBUS_TYPE_UINT32_AS_STRING,
1357                         set_apscan, set_apscan_complete, data, NULL);
1358         if (ret < 0)
1359                 dbus_free(data);
1360
1361         return ret;
1362 }
1363
1364 void g_supplicant_interface_set_data(GSupplicantInterface *interface,
1365                                                                 void *data)
1366 {
1367         if (!interface)
1368                 return;
1369
1370         interface->data = data;
1371
1372         if (!data)
1373                 interface->scan_callback = NULL;
1374 }
1375
1376 void *g_supplicant_interface_get_data(GSupplicantInterface *interface)
1377 {
1378         if (!interface)
1379                 return NULL;
1380
1381         return interface->data;
1382 }
1383
1384 const char *g_supplicant_interface_get_ifname(GSupplicantInterface *interface)
1385 {
1386         if (!interface)
1387                 return NULL;
1388
1389         return interface->ifname;
1390 }
1391
1392 #if defined TIZEN_EXT
1393 bool g_supplicant_interface_get_is_5_0_ghz_supported(GSupplicantInterface *interface)
1394 {
1395         if (!interface)
1396                 return NULL;
1397
1398         return interface->is_5_0_Ghz_supported;
1399 }
1400 #endif
1401
1402 const char *g_supplicant_interface_get_driver(GSupplicantInterface *interface)
1403 {
1404         if (!interface)
1405                 return NULL;
1406
1407         return interface->driver;
1408 }
1409
1410 GSupplicantState g_supplicant_interface_get_state(
1411                                         GSupplicantInterface *interface)
1412 {
1413         if (!interface)
1414                 return G_SUPPLICANT_STATE_UNKNOWN;
1415
1416         return interface->state;
1417 }
1418
1419 const char *g_supplicant_interface_get_wps_key(GSupplicantInterface *interface)
1420 {
1421         if (!interface)
1422                 return NULL;
1423
1424         return (const char *)interface->wps_cred.key;
1425 }
1426
1427 const void *g_supplicant_interface_get_wps_ssid(GSupplicantInterface *interface,
1428                                                         unsigned int *ssid_len)
1429 {
1430         if (!ssid_len)
1431                 return NULL;
1432
1433         if (!interface || interface->wps_cred.ssid_len == 0) {
1434                 *ssid_len = 0;
1435                 return NULL;
1436         }
1437
1438         *ssid_len = interface->wps_cred.ssid_len;
1439         return interface->wps_cred.ssid;
1440 }
1441
1442 GSupplicantWpsState g_supplicant_interface_get_wps_state(
1443                                         GSupplicantInterface *interface)
1444 {
1445         if (!interface)
1446                 return G_SUPPLICANT_WPS_STATE_UNKNOWN;
1447
1448         return interface->wps_state;
1449 }
1450
1451 unsigned int g_supplicant_interface_get_mode(GSupplicantInterface *interface)
1452 {
1453         if (!interface)
1454                 return 0;
1455
1456         return interface->mode_capa;
1457 }
1458
1459 unsigned int g_supplicant_interface_get_max_scan_ssids(
1460                                 GSupplicantInterface *interface)
1461 {
1462         if (!interface)
1463                 return 0;
1464
1465         if (interface->max_scan_ssids == 0)
1466                 return WPAS_MAX_SCAN_SSIDS;
1467
1468         return interface->max_scan_ssids;
1469 }
1470
1471 static void set_network_enabled(DBusMessageIter *iter, void *user_data)
1472 {
1473         dbus_bool_t enable = *(dbus_bool_t *)user_data;
1474
1475         dbus_message_iter_append_basic(iter, DBUS_TYPE_BOOLEAN, &enable);
1476 }
1477
1478 int g_supplicant_interface_enable_selected_network(GSupplicantInterface *interface,
1479                                                         dbus_bool_t enable)
1480 {
1481         if (!interface)
1482                 return -1;
1483
1484         if (!interface->network_path)
1485                 return -1;
1486
1487         SUPPLICANT_DBG(" ");
1488         return supplicant_dbus_property_set(interface->network_path,
1489                                 SUPPLICANT_INTERFACE ".Network",
1490                                 "Enabled", DBUS_TYPE_BOOLEAN_AS_STRING,
1491                                 set_network_enabled, NULL, &enable, NULL);
1492 }
1493
1494 dbus_bool_t g_supplicant_interface_get_ready(GSupplicantInterface *interface)
1495 {
1496         if (!interface)
1497                 return FALSE;
1498
1499         return interface->ready;
1500 }
1501
1502 GSupplicantInterface *g_supplicant_network_get_interface(
1503                                         GSupplicantNetwork *network)
1504 {
1505         if (!network)
1506                 return NULL;
1507
1508         return network->interface;
1509 }
1510
1511 const char *g_supplicant_network_get_name(GSupplicantNetwork *network)
1512 {
1513         if (!network || !network->name)
1514                 return "";
1515
1516         return network->name;
1517 }
1518
1519 const char *g_supplicant_network_get_identifier(GSupplicantNetwork *network)
1520 {
1521         if (!network || !network->group)
1522                 return "";
1523
1524         return network->group;
1525 }
1526
1527 const char *g_supplicant_network_get_path(GSupplicantNetwork *network)
1528 {
1529         if (!network || !network->path)
1530                 return NULL;
1531
1532         return network->path;
1533 }
1534
1535 const char *g_supplicant_network_get_mode(GSupplicantNetwork *network)
1536 {
1537         if (!network)
1538                 return G_SUPPLICANT_MODE_UNKNOWN;
1539
1540         return mode2string(network->mode);
1541 }
1542
1543 const char *g_supplicant_network_get_security(GSupplicantNetwork *network)
1544 {
1545         if (!network)
1546                 return G_SUPPLICANT_SECURITY_UNKNOWN;
1547
1548         return security2string(network->security);
1549 }
1550
1551 const void *g_supplicant_network_get_ssid(GSupplicantNetwork *network,
1552                                                 unsigned int *ssid_len)
1553 {
1554         if (!network) {
1555                 *ssid_len = 0;
1556                 return NULL;
1557         }
1558
1559         *ssid_len = network->ssid_len;
1560         return network->ssid;
1561 }
1562
1563 dbus_int16_t g_supplicant_network_get_signal(GSupplicantNetwork *network)
1564 {
1565         if (!network)
1566                 return 0;
1567
1568         return network->signal;
1569 }
1570
1571 dbus_uint16_t g_supplicant_network_get_frequency(GSupplicantNetwork *network)
1572 {
1573         if (!network)
1574                 return 0;
1575
1576         return network->frequency;
1577 }
1578
1579 dbus_bool_t g_supplicant_network_get_wps(GSupplicantNetwork *network)
1580 {
1581         if (!network)
1582                 return FALSE;
1583
1584         return network->wps;
1585 }
1586
1587 dbus_bool_t g_supplicant_network_is_wps_active(GSupplicantNetwork *network)
1588 {
1589         if (!network)
1590                 return FALSE;
1591
1592         if (network->wps_capabilities & G_SUPPLICANT_WPS_CONFIGURED)
1593                 return TRUE;
1594
1595         return FALSE;
1596 }
1597
1598 dbus_bool_t g_supplicant_network_is_wps_pbc(GSupplicantNetwork *network)
1599 {
1600         if (!network)
1601                 return FALSE;
1602
1603         if (network->wps_capabilities & G_SUPPLICANT_WPS_PBC)
1604                 return TRUE;
1605
1606         return FALSE;
1607 }
1608
1609 dbus_bool_t g_supplicant_network_is_wps_advertizing(GSupplicantNetwork *network)
1610 {
1611         if (!network)
1612                 return FALSE;
1613
1614         if (network->wps_capabilities & G_SUPPLICANT_WPS_REGISTRAR)
1615                 return TRUE;
1616
1617         return FALSE;
1618 }
1619
1620 #ifdef TIZEN_EXT
1621 GSupplicantPhy_mode g_supplicant_network_get_phy_mode(GSupplicantNetwork *network)
1622 {
1623         if (!network)
1624                 return G_SUPPLICANT_MODE_IEEE80211_UNKNOWN;
1625
1626         return network->phy_mode;
1627 }
1628 #endif
1629
1630 GSupplicantInterface *g_supplicant_peer_get_interface(GSupplicantPeer *peer)
1631 {
1632         if (!peer)
1633                 return NULL;
1634
1635         return peer->interface;
1636 }
1637
1638 const char *g_supplicant_peer_get_path(GSupplicantPeer *peer)
1639 {
1640         if (!peer)
1641                 return NULL;
1642
1643         return peer->path;
1644 }
1645
1646 const char *g_supplicant_peer_get_identifier(GSupplicantPeer *peer)
1647 {
1648         if (!peer)
1649                 return NULL;
1650
1651         return peer->identifier;
1652 }
1653
1654 const void *g_supplicant_peer_get_device_address(GSupplicantPeer *peer)
1655 {
1656         if (!peer)
1657                 return NULL;
1658
1659         return peer->device_address;
1660 }
1661
1662 const void *g_supplicant_peer_get_iface_address(GSupplicantPeer *peer)
1663 {
1664         if (!peer)
1665                 return NULL;
1666
1667         return peer->iface_address;
1668 }
1669
1670 const char *g_supplicant_peer_get_name(GSupplicantPeer *peer)
1671 {
1672         if (!peer)
1673                 return NULL;
1674
1675         return peer->name;
1676 }
1677
1678 #if defined TIZEN_EXT
1679 bool g_supplicant_network_is_hs20AP(GSupplicantNetwork *network)
1680 {
1681         if (!network)
1682                 return 0;
1683
1684         return network->isHS20AP;
1685 }
1686
1687 const char *g_supplicant_network_get_eap(GSupplicantNetwork *network)
1688 {
1689         if (!network || !network->eap)
1690                 return NULL;
1691
1692         return network->eap;
1693 }
1694
1695 const char *g_supplicant_network_get_identity(GSupplicantNetwork *network)
1696 {
1697         if (!network || !network->identity)
1698                 return NULL;
1699
1700         return network->identity;
1701 }
1702
1703 const char *g_supplicant_network_get_phase2(GSupplicantNetwork *network)
1704 {
1705         if (!network || !network->phase2)
1706                 return NULL;
1707
1708         return network->phase2;
1709 }
1710
1711 unsigned int g_supplicant_network_get_keymgmt(GSupplicantNetwork *network)
1712 {
1713         if (network == NULL)
1714                 return 0;
1715
1716         return network->keymgmt;
1717 }
1718
1719 const unsigned char *g_supplicant_network_get_countrycode(GSupplicantNetwork
1720                                                           *network)
1721 {
1722         if (!network)
1723                 return NULL;
1724
1725         return network->country_code;
1726 }
1727 #endif
1728
1729 const unsigned char *g_supplicant_peer_get_widi_ies(GSupplicantPeer *peer,
1730                                                                 int *length)
1731 {
1732         if (!peer || !length)
1733                 return NULL;
1734
1735         *length = peer->widi_ies_length;
1736         return peer->widi_ies;
1737 }
1738
1739 bool g_supplicant_peer_is_wps_pbc(GSupplicantPeer *peer)
1740 {
1741         if (!peer)
1742                 return false;
1743
1744         if (peer->wps_capabilities & G_SUPPLICANT_WPS_PBC)
1745                 return true;
1746
1747         return false;
1748 }
1749
1750 bool g_supplicant_peer_is_wps_pin(GSupplicantPeer *peer)
1751 {
1752         if (!peer)
1753                 return false;
1754
1755         if (peer->wps_capabilities & G_SUPPLICANT_WPS_PIN)
1756                 return true;
1757
1758         return false;
1759 }
1760
1761 bool g_supplicant_peer_is_in_a_group(GSupplicantPeer *peer)
1762 {
1763         if (!peer || !peer->groups)
1764                 return false;
1765
1766         return true;
1767 }
1768
1769 GSupplicantInterface *g_supplicant_peer_get_group_interface(GSupplicantPeer *peer)
1770 {
1771         if (!peer)
1772                 return NULL;
1773
1774         return (GSupplicantInterface *) peer->current_group_iface;
1775 }
1776
1777 bool g_supplicant_peer_is_client(GSupplicantPeer *peer)
1778 {
1779         GSupplicantGroup *group;
1780         GSList *list;
1781
1782         if (!peer)
1783                 return false;
1784
1785         for (list = peer->groups; list; list = list->next) {
1786                 const char *path = list->data;
1787
1788                 group = g_hash_table_lookup(group_mapping, path);
1789                 if (!group)
1790                         continue;
1791
1792                 if (group->role != G_SUPPLICANT_GROUP_ROLE_CLIENT ||
1793                                 group->orig_interface != peer->interface)
1794                         continue;
1795
1796                 if (group->interface == peer->current_group_iface)
1797                         return true;
1798         }
1799
1800         return false;
1801 }
1802
1803 bool g_supplicant_peer_has_requested_connection(GSupplicantPeer *peer)
1804 {
1805         if (!peer)
1806                 return false;
1807
1808         return peer->connection_requested;
1809 }
1810
1811 #if defined TIZEN_EXT
1812 /*
1813  * Description: Network client requires additional wifi specific info
1814  */
1815 const unsigned char *g_supplicant_network_get_bssid(GSupplicantNetwork *network)
1816 {
1817         if (network == NULL || network->best_bss == NULL)
1818                 return NULL;
1819
1820         return (const unsigned char *)network->best_bss->bssid;
1821 }
1822
1823 unsigned int g_supplicant_network_get_maxrate(GSupplicantNetwork *network)
1824 {
1825         if (network == NULL || network->best_bss == NULL)
1826                 return 0;
1827
1828         return network->best_bss->maxrate;
1829 }
1830
1831 const char *g_supplicant_network_get_enc_mode(GSupplicantNetwork *network)
1832 {
1833         if (network == NULL || network->best_bss == NULL)
1834                 return NULL;
1835
1836         if (network->best_bss->security == G_SUPPLICANT_SECURITY_PSK ||
1837 #if defined TIZEN_EXT
1838             network->best_bss->security == G_SUPPLICANT_SECURITY_SAE ||
1839             network->best_bss->security == G_SUPPLICANT_SECURITY_OWE ||
1840             network->best_bss->security == G_SUPPLICANT_SECURITY_DPP ||
1841 #endif /* TIZEN_EXT */
1842             network->best_bss->security == G_SUPPLICANT_SECURITY_IEEE8021X) {
1843                 unsigned int pairwise;
1844
1845                 pairwise = network->best_bss->rsn_pairwise |
1846                                 network->best_bss->wpa_pairwise;
1847
1848                 if ((pairwise & G_SUPPLICANT_PAIRWISE_CCMP) &&
1849                     (pairwise & G_SUPPLICANT_PAIRWISE_TKIP))
1850                         return "mixed";
1851                 else if (pairwise & G_SUPPLICANT_PAIRWISE_CCMP)
1852                         return "aes";
1853                 else if (pairwise & G_SUPPLICANT_PAIRWISE_TKIP)
1854                         return "tkip";
1855
1856         } else if (network->best_bss->security == G_SUPPLICANT_SECURITY_WEP)
1857                 return "wep";
1858         else if (network->best_bss->security == G_SUPPLICANT_SECURITY_NONE)
1859                 return "none";
1860
1861         return NULL;
1862 }
1863
1864 bool g_supplicant_network_get_rsn_mode(GSupplicantNetwork *network)
1865 {
1866         if (network == NULL || network->best_bss == NULL)
1867                 return 0;
1868
1869 #if defined TIZEN_EXT
1870         if (network->best_bss->security == G_SUPPLICANT_SECURITY_SAE ||
1871                         network->best_bss->security == G_SUPPLICANT_SECURITY_OWE ||
1872                         network->best_bss->security == G_SUPPLICANT_SECURITY_DPP)
1873                 return false;
1874 #endif /* TIZEN_EXT */
1875
1876         if (network->best_bss->rsn_selected) {
1877                 const char *mode = g_supplicant_network_get_enc_mode(network);
1878                 if (g_strcmp0(mode, "aes") == 0 ||
1879                                 g_strcmp0(mode, "mixed") == 0)
1880                         return true;
1881                 else
1882                         return false;
1883         } else
1884                 return false;
1885 }
1886
1887 void *g_supplicant_network_get_wifi_vsie(GSupplicantNetwork *network)
1888 {
1889         GSList *vsie_list = NULL;
1890
1891         if (!network)
1892                 return NULL;
1893
1894         if (g_slist_length(network->vsie_list) > 0) {
1895                 GSList *list = NULL;
1896                 unsigned char *vsie = NULL;
1897                 for (list = network->vsie_list; list; list = list->next) {
1898                         unsigned char *ie = (unsigned char *)list->data;
1899                         if (ie == NULL)
1900                                 continue;
1901                         vsie = (unsigned char *)g_try_malloc0(ie[1]+2); // tag number size(1), tag length size(1)
1902
1903                         if (vsie) {
1904                                 memcpy(vsie, ie, ie[1]+2);
1905                                 vsie_list = g_slist_append(vsie_list, vsie);
1906                         } else
1907                                 SUPPLICANT_DBG("Failed to allocate memory");
1908                 }
1909         }
1910
1911         return vsie_list;
1912 }
1913
1914 static bool compare_bssid(unsigned char *bssid_a, unsigned char *bssid_b)
1915 {
1916         if (!memcmp(bssid_a, bssid_b, WIFI_BSSID_LEN_MAX))
1917                 return true;
1918
1919         return false;
1920 }
1921
1922 static gchar *convert_bssid_to_str(unsigned char *bssid)
1923 {
1924         GString *bssid_str;
1925         unsigned int i;
1926
1927         bssid_str = g_string_sized_new(18);
1928         if (!bssid_str)
1929                 return NULL;
1930
1931         for (i = 0; i < WIFI_BSSID_LEN_MAX; i++) {
1932                 g_string_append_printf(bssid_str, "%02x", bssid[i]);
1933                 if (i < WIFI_BSSID_LEN_MAX - 1)
1934                         g_string_append(bssid_str, ":");
1935         }
1936
1937         return g_string_free(bssid_str, FALSE);
1938 }
1939
1940 static void count_assoc_reject(gpointer data, gpointer user_data)
1941 {
1942         time_t assoc_reject_time = GPOINTER_TO_INT(data);
1943         struct assoc_count_data *assoc_count = user_data;
1944
1945         if (assoc_reject_time > assoc_count->ref_time)
1946                 assoc_count->assoc_count++;
1947 }
1948
1949 static uint16_t get_assoc_reject_cnt(GHashTable *assoc_reject_table, unsigned char *bssid)
1950 {
1951         gchar *bssid_str;
1952         struct assoc_reject_data *assoc_data;
1953         struct assoc_count_data assoc_count;
1954         time_t curr_time;
1955         struct tm* timeinfo;
1956
1957         if (g_hash_table_size(assoc_reject_table) < 1)
1958                 return 0;
1959
1960         if (!bssid)
1961                 return 0;
1962
1963         if (!memcmp(bssid, invalid_bssid, WIFI_BSSID_LEN_MAX))
1964                 return 0;
1965
1966         bssid_str = convert_bssid_to_str(bssid);
1967         if (!bssid_str)
1968                 return 0;
1969
1970         assoc_data = g_hash_table_lookup(assoc_reject_table, bssid_str);
1971         if (!assoc_data) {
1972                 g_free(bssid_str);
1973                 return 0;
1974         }
1975
1976         if (g_slist_length(assoc_data->reject_time_list) < 1) {
1977                 g_free(bssid_str);
1978                 return 0;
1979         }
1980
1981         /* Only events that occur within one hour are appened. */
1982         curr_time = time(NULL);
1983         timeinfo = localtime(&curr_time);
1984         timeinfo->tm_hour -= 1;
1985
1986         assoc_count.ref_time = mktime(timeinfo);
1987         assoc_count.assoc_count = 0;
1988
1989         g_slist_foreach(assoc_data->reject_time_list, count_assoc_reject, &assoc_count);
1990
1991         g_free(bssid_str);
1992         return assoc_count.assoc_count;
1993 }
1994
1995 static int calculate_score_last_connected_bssid(bool is_last_connected)
1996 {
1997         int score = 0;
1998
1999         if (ins_settings.last_connected_bssid) {
2000                 if (is_last_connected)
2001                         score += ins_settings.last_connected_bssid_score;
2002         }
2003
2004         return score;
2005 }
2006
2007 static int calculate_score_assoc_reject(uint16_t assoc_reject_cnt)
2008 {
2009         int score = 0;
2010
2011         if (ins_settings.assoc_reject)
2012                 score -= (assoc_reject_cnt * ins_settings.assoc_reject_score);
2013
2014         return score;
2015 }
2016
2017 static int calculate_score_frequency(dbus_int16_t strength, dbus_uint16_t frequency)
2018 {
2019         int score = 0;
2020
2021         switch (ins_settings.preferred_freq_bssid) {
2022         case G_SUPPLICANT_INS_PREFERRED_FREQ_24GHZ:
2023                 if ((frequency >= FREQ_RANGE_24GHZ_CHANNEL_1 &&
2024                         frequency <= FREQ_RANGE_24GHZ_CHANNEL_14) &&
2025                         (strength > ins_settings.signal_level3_24ghz))
2026                         score += ins_settings.preferred_freq_bssid_score;
2027
2028                 break;
2029         case G_SUPPLICANT_INS_PREFERRED_FREQ_5GHZ:
2030                 if ((frequency >= FREQ_RANGE_5GHZ_CHANNEL_32 &&
2031                         frequency <= FREQ_RANGE_5GHZ_CHANNEL_165) &&
2032                         (strength > ins_settings.signal_level3_5ghz))
2033                         score += ins_settings.preferred_freq_bssid_score;
2034
2035                 break;
2036         default:
2037                 break;
2038         }
2039
2040         return score;
2041 }
2042
2043 static int calculate_score_strength(dbus_int16_t strength)
2044 {
2045         int score = 0;
2046
2047         if (ins_settings.signal_bssid)
2048                 score += (((strength > -60) ? -60 : strength) + 85);
2049
2050         return score;
2051 }
2052
2053 static int calculate_score(bool is_last_connected, uint16_t assoc_reject_cnt,
2054                 dbus_int16_t strength, dbus_uint16_t frequency)
2055 {
2056         int score = 0;
2057
2058         score += calculate_score_last_connected_bssid(is_last_connected);
2059         score += calculate_score_assoc_reject(assoc_reject_cnt);
2060         score += calculate_score_frequency(strength, frequency);
2061         score += calculate_score_strength(strength);
2062
2063         return score;
2064 }
2065
2066 static void update_bssid_list(gpointer key, gpointer value, gpointer user_data)
2067 {
2068         struct g_supplicant_bss *bss = value;
2069         struct g_connman_bssids *bssids = NULL;
2070         struct update_bssid_data *bssid_data = (struct update_bssid_data *)user_data;
2071
2072         bssids = (struct g_connman_bssids *)g_try_malloc0(sizeof(struct g_connman_bssids));
2073
2074         if (bssids) {
2075                 memcpy(bssids->bssid, bss->bssid, WIFI_BSSID_LEN_MAX);
2076
2077                 bssids->strength = bss->signal;
2078                 bssids->strength += 120;
2079
2080                 if (bssids->strength > 100)
2081                         bssids->strength = 100;
2082
2083                 bssids->frequency = bss->frequency;
2084
2085                 bssids->assoc_reject_cnt = get_assoc_reject_cnt(bssid_data->assoc_reject_table, bssids->bssid);
2086
2087                 bssids->is_last_connected = compare_bssid(bssids->bssid, bssid_data->last_connected_bssid);
2088
2089 #if defined TIZEN_EXT_INS
2090                 bssids->score_last_connected_bssid = calculate_score_last_connected_bssid(bssids->is_last_connected);
2091                 bssids->score_assoc_reject = calculate_score_assoc_reject(bssids->assoc_reject_cnt);
2092                 bssids->score_frequency = calculate_score_frequency(bss->signal, bssids->frequency);
2093                 bssids->score_strength = calculate_score_strength(bssids->strength);
2094 #endif
2095
2096                 bssids->ins_score = calculate_score(bssids->is_last_connected,
2097                         bssids->assoc_reject_cnt, bssids->frequency, bss->signal);
2098
2099                 bssid_data->bssid_list = g_slist_append(bssid_data->bssid_list, bssids);
2100         } else
2101                 SUPPLICANT_DBG("Failed to allocate memory");
2102 }
2103
2104 static gint cmp_bss(gconstpointer a, gconstpointer b)
2105 {
2106         struct g_connman_bssids *entry_a = (struct g_connman_bssids *)a;
2107         struct g_connman_bssids *entry_b = (struct g_connman_bssids *)b;
2108
2109         if (entry_a->ins_score > entry_b->ins_score)
2110                 return -1;
2111
2112         if (entry_a->ins_score < entry_b->ins_score)
2113                 return 1;
2114
2115         return 0;
2116 }
2117
2118 #if defined TIZEN_EXT_INS
2119 static void print_bssid_sort(gpointer data, gpointer user_data)
2120 {
2121         struct g_connman_bssids *bssids = data;
2122
2123         SUPPLICANT_DBG("bssid[" MACSTR "] total[%2d] freq[%2d] "
2124                         "last_conn[%2d] assoc_reject[%2d] strength[%2d]",
2125                         MAC2STR(bssids->bssid), bssids->ins_score,
2126                         bssids->score_frequency, bssids->score_last_connected_bssid,
2127                         bssids->score_assoc_reject, bssids->score_strength);
2128 }
2129 #endif
2130
2131 void *g_supplicant_network_get_bssid_list(GSupplicantNetwork *network)
2132 {
2133         struct update_bssid_data bssid_data;
2134
2135         if (g_hash_table_size(network->bss_table) < 1)
2136                 return NULL;
2137
2138         bssid_data.network = network;
2139         memset(&bssid_data, 0, sizeof(bssid_data));
2140         memcpy(bssid_data.last_connected_bssid, network->last_connected_bssid, WIFI_BSSID_LEN_MAX);
2141         bssid_data.assoc_reject_table = network->assoc_reject_table;
2142
2143         g_hash_table_foreach(network->bss_table, update_bssid_list, &bssid_data);
2144         bssid_data.bssid_list = g_slist_sort(bssid_data.bssid_list, cmp_bss);
2145 #if defined TIZEN_EXT_INS
2146         g_slist_foreach(bssid_data.bssid_list, print_bssid_sort, NULL);
2147 #endif
2148
2149         return bssid_data.bssid_list;
2150 }
2151
2152 void g_supplicant_network_set_last_connected_bssid(GSupplicantNetwork *network, const unsigned char *bssid)
2153 {
2154         if (!bssid)
2155                 return;
2156
2157         if (!memcmp(bssid, invalid_bssid, WIFI_BSSID_LEN_MAX))
2158                 return;
2159
2160         memcpy(network->last_connected_bssid, bssid, WIFI_BSSID_LEN_MAX);
2161
2162         SUPPLICANT_DBG("last connected bssid [" MACSTR "]", MAC2STR(bssid));
2163 }
2164
2165 const unsigned char *g_supplicant_network_get_last_connected_bssid(GSupplicantNetwork *network)
2166 {
2167         if (network == NULL)
2168                 return NULL;
2169
2170         return (const unsigned char *)network->last_connected_bssid;
2171 }
2172
2173 void g_supplicant_network_update_assoc_reject(GSupplicantInterface *interface,
2174                 GSupplicantNetwork *network)
2175 {
2176         struct assoc_reject_data *assoc_data;
2177         gchar *bssid_str;
2178         time_t curr_time;
2179
2180         if (!network)
2181                 return;
2182
2183         bssid_str = convert_bssid_to_str(interface->add_network_bssid);
2184         if (!bssid_str)
2185                 return;
2186
2187         assoc_data = g_hash_table_lookup(network->assoc_reject_table, bssid_str);
2188         if (!assoc_data) {
2189                 assoc_data = g_try_new0(struct assoc_reject_data, 1);
2190                 if (!assoc_data) {
2191                         g_free(bssid_str);
2192                         return;
2193                 }
2194
2195                 assoc_data->bssid = g_strdup(bssid_str);
2196                 g_hash_table_insert(network->assoc_reject_table, assoc_data->bssid, assoc_data);
2197         }
2198
2199         curr_time = time(NULL);
2200         assoc_data->reject_time_list = g_slist_append(assoc_data->reject_time_list, GINT_TO_POINTER(curr_time));
2201
2202         SUPPLICANT_DBG("bssid [%s] time [%u]", bssid_str, curr_time);
2203
2204         g_free(bssid_str);
2205
2206         callback_network_changed(network, "UpdateAssocReject");
2207 }
2208
2209 GHashTable *g_supplicant_network_get_assoc_reject_table(GSupplicantNetwork *network)
2210 {
2211         if (!network)
2212                 return NULL;
2213
2214         return network->assoc_reject_table;
2215 }
2216
2217 GSupplicantNetwork *g_supplicant_interface_get_network(GSupplicantInterface *interface,
2218                 const char *group)
2219 {
2220         if (!interface)
2221                 return NULL;
2222
2223         return g_hash_table_lookup(interface->network_table, group);
2224 }
2225 #endif
2226
2227 static void merge_network(GSupplicantNetwork *network)
2228 {
2229         GString *str;
2230         const char *ssid, *mode, *key_mgmt;
2231 #if defined TIZEN_EXT
2232         const char *isHS20AP;
2233         const char *eap, *identity, *phase2;
2234 #endif
2235         unsigned int i, ssid_len;
2236         char *group;
2237
2238         ssid = g_hash_table_lookup(network->config_table, "ssid");
2239         mode = g_hash_table_lookup(network->config_table, "mode");
2240         key_mgmt = g_hash_table_lookup(network->config_table, "key_mgmt");
2241 #if defined TIZEN_EXT
2242         isHS20AP = g_hash_table_lookup(network->config_table, "isHS20AP");
2243         eap = g_hash_table_lookup(network->config_table, "eap");
2244         identity = g_hash_table_lookup(network->config_table, "identity");
2245         phase2 = g_hash_table_lookup(network->config_table, "phase2");
2246 #endif
2247
2248         SUPPLICANT_DBG("ssid %s mode %s", ssid, mode);
2249
2250         if (ssid)
2251                 ssid_len = strlen(ssid);
2252         else
2253                 ssid_len = 0;
2254
2255         str = g_string_sized_new((ssid_len * 2) + 24);
2256         if (!str)
2257                 return;
2258
2259         for (i = 0; i < ssid_len; i++)
2260 #if defined TIZEN_EXT
2261         {
2262                 if (ssid[i] != '"')
2263 #endif
2264                 g_string_append_printf(str, "%02x", ssid[i]);
2265 #if defined TIZEN_EXT
2266         }
2267 #endif
2268
2269         if (g_strcmp0(mode, "0") == 0)
2270                 g_string_append_printf(str, "_managed");
2271         else if (g_strcmp0(mode, "1") == 0)
2272                 g_string_append_printf(str, "_adhoc");
2273 #if defined TIZEN_EXT_WIFI_MESH
2274         else if (g_strcmp0(mode, "5") == 0)
2275                 g_string_append_printf(str, "_mesh");
2276 #endif
2277
2278         if (g_strcmp0(key_mgmt, "WPA-PSK") == 0)
2279                 g_string_append_printf(str, "_psk");
2280 #if defined TIZEN_EXT
2281         else if (g_strcmp0(key_mgmt, "WPA-EAP") == 0)
2282                 g_string_append_printf(str, "_ieee8021x");
2283         else
2284                 g_string_append_printf(str, "_none");
2285 #endif
2286
2287         group = g_string_free(str, FALSE);
2288
2289         SUPPLICANT_DBG("%s", group);
2290
2291 #if defined TIZEN_EXT
2292         if (g_strcmp0(isHS20AP, "1") == 0) {
2293                 network->isHS20AP = 1;
2294                 if (network->eap)
2295                         g_free(network->eap);
2296                 network->eap = g_strdup(eap);
2297
2298                 if (network->identity)
2299                         g_free(network->identity);
2300                 network->identity = g_strdup(identity);
2301
2302                 if (network->phase2)
2303                         g_free(network->phase2);
2304                 network->phase2 = g_strdup(phase2);
2305         } else
2306                 network->isHS20AP = 0;
2307
2308         network->group = g_strdup(group);
2309         callback_network_merged(network);
2310         g_free(network->group);
2311 #endif
2312
2313         g_free(group);
2314
2315         g_hash_table_destroy(network->config_table);
2316
2317         g_free(network->path);
2318         g_free(network);
2319 }
2320
2321 static void network_property(const char *key, DBusMessageIter *iter,
2322                                                         void *user_data)
2323 {
2324         GSupplicantNetwork *network = user_data;
2325
2326         if (!network->interface)
2327                 return;
2328
2329         if (!key) {
2330                 merge_network(network);
2331                 return;
2332         }
2333
2334         if (g_strcmp0(key, "Enabled") == 0) {
2335                 dbus_bool_t enabled = FALSE;
2336
2337                 dbus_message_iter_get_basic(iter, &enabled);
2338         } else if (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_STRING) {
2339                 const char *str = NULL;
2340
2341                 dbus_message_iter_get_basic(iter, &str);
2342                 if (str) {
2343                         g_hash_table_replace(network->config_table,
2344                                                 g_strdup(key), g_strdup(str));
2345                 }
2346         } else
2347                 SUPPLICANT_DBG("key %s type %c",
2348                                 key, dbus_message_iter_get_arg_type(iter));
2349 }
2350
2351 static void interface_network_added(DBusMessageIter *iter, void *user_data)
2352 {
2353         GSupplicantInterface *interface = user_data;
2354         GSupplicantNetwork *network;
2355         const char *path = NULL;
2356
2357         SUPPLICANT_DBG("");
2358
2359         dbus_message_iter_get_basic(iter, &path);
2360         if (!path)
2361                 return;
2362
2363         if (g_strcmp0(path, "/") == 0)
2364                 return;
2365
2366         network = g_try_new0(GSupplicantNetwork, 1);
2367         if (!network)
2368                 return;
2369
2370         network->interface = interface;
2371         network->path = g_strdup(path);
2372
2373         network->config_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2374                                                         g_free, g_free);
2375
2376         dbus_message_iter_next(iter);
2377         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
2378                 supplicant_dbus_property_foreach(iter, network_property,
2379                                                                 network);
2380                 network_property(NULL, NULL, network);
2381                 return;
2382         }
2383
2384         supplicant_dbus_property_get_all(path,
2385                                 SUPPLICANT_INTERFACE ".Network",
2386                                         network_property, network, NULL);
2387 }
2388
2389 static void interface_network_removed(DBusMessageIter *iter, void *user_data)
2390 {
2391         SUPPLICANT_DBG("");
2392 }
2393
2394 static char *create_name(unsigned char *ssid, int ssid_len)
2395 {
2396         GString *string;
2397         const gchar *remainder, *invalid;
2398         int valid_bytes, remaining_bytes;
2399
2400         if (ssid_len < 1 || ssid[0] == '\0')
2401                 return g_strdup("");
2402
2403         string = NULL;
2404         remainder = (const gchar *)ssid;
2405         remaining_bytes = ssid_len;
2406
2407         while (remaining_bytes != 0) {
2408                 if (g_utf8_validate(remainder, remaining_bytes,
2409                                         &invalid)) {
2410                         break;
2411                 }
2412
2413                 valid_bytes = invalid - remainder;
2414
2415                 if (!string)
2416                         string = g_string_sized_new(remaining_bytes);
2417
2418                 g_string_append_len(string, remainder, valid_bytes);
2419
2420                 /* append U+FFFD REPLACEMENT CHARACTER */
2421                 g_string_append(string, "\357\277\275");
2422
2423                 remaining_bytes -= valid_bytes + 1;
2424                 remainder = invalid + 1;
2425         }
2426
2427         if (!string)
2428                 return g_strndup((const gchar *)ssid, ssid_len + 1);
2429
2430         g_string_append(string, remainder);
2431
2432         return g_string_free(string, FALSE);
2433 }
2434
2435 static char *create_group(struct g_supplicant_bss *bss)
2436 {
2437         GString *str;
2438         unsigned int i;
2439         const char *mode, *security;
2440
2441         str = g_string_sized_new((bss->ssid_len * 2) + 24);
2442         if (!str)
2443                 return NULL;
2444
2445         if (bss->ssid_len > 0 && bss->ssid[0] != '\0') {
2446                 for (i = 0; i < bss->ssid_len; i++)
2447                         g_string_append_printf(str, "%02x", bss->ssid[i]);
2448         } else
2449                 g_string_append_printf(str, "hidden");
2450
2451         mode = mode2string(bss->mode);
2452         if (mode)
2453                 g_string_append_printf(str, "_%s", mode);
2454
2455         security = security2string(bss->security);
2456         if (security)
2457                 g_string_append_printf(str, "_%s", security);
2458
2459         return g_string_free(str, FALSE);
2460 }
2461
2462 static void update_network_with_best_bss(GSupplicantNetwork *network,
2463                 struct g_supplicant_bss *best_bss)
2464 {
2465         network->signal = best_bss->signal;
2466         network->frequency = best_bss->frequency;
2467         network->best_bss = best_bss;
2468 }
2469
2470 static bool update_best_bss(GSupplicantNetwork *network,
2471                 struct g_supplicant_bss *bss, struct g_supplicant_bss *best_bss)
2472 {
2473         int score_new;
2474         int score_best;
2475
2476         if (network->best_bss == NULL) {
2477                 update_network_with_best_bss(network, bss);
2478                 return true;
2479         }
2480
2481         score_new = calculate_score(
2482                 compare_bssid(bss->bssid, network->last_connected_bssid),
2483                 get_assoc_reject_cnt(network->assoc_reject_table, bss->bssid),
2484                 bss->frequency, bss->signal);
2485
2486         score_best = calculate_score(
2487                 compare_bssid(network->best_bss->bssid, network->last_connected_bssid),
2488                 get_assoc_reject_cnt(network->assoc_reject_table, network->best_bss->bssid),
2489                 network->best_bss->frequency, network->best_bss->signal);
2490
2491         if (score_new > score_best) {
2492                 SUPPLICANT_DBG("new[" MACSTR "][%u] : best[" MACSTR "][%u]",
2493                         MAC2STR(bss->bssid), score_new,
2494                         MAC2STR(network->best_bss->bssid), score_best);
2495
2496                 update_network_with_best_bss(network, bss);
2497
2498                 SUPPLICANT_DBG("Update best BSS for %s", network->name);
2499
2500                 return true;
2501         }
2502
2503         return false;
2504 }
2505
2506 static int add_or_replace_bss_to_network(struct g_supplicant_bss *bss)
2507 {
2508         GSupplicantInterface *interface = bss->interface;
2509         GSupplicantNetwork *network;
2510         char *group;
2511         bool is_new_network;
2512
2513         group = create_group(bss);
2514         SUPPLICANT_DBG("New group created: %s", group);
2515
2516         if (!group)
2517                 return -ENOMEM;
2518
2519         network = g_hash_table_lookup(interface->network_table, group);
2520         if (network) {
2521                 g_free(group);
2522                 SUPPLICANT_DBG("Network %s already exist", network->name);
2523                 is_new_network = false;
2524
2525                 goto done;
2526         }
2527
2528         is_new_network = true;
2529
2530         network = g_try_new0(GSupplicantNetwork, 1);
2531         if (!network) {
2532                 g_free(group);
2533                 return -ENOMEM;
2534         }
2535
2536         network->interface = interface;
2537         if (!network->path)
2538                 network->path = g_strdup(bss->path);
2539         network->group = group;
2540         network->name = create_name(bss->ssid, bss->ssid_len);
2541         network->mode = bss->mode;
2542         network->security = bss->security;
2543         network->ssid_len = bss->ssid_len;
2544         memcpy(network->ssid, bss->ssid, bss->ssid_len);
2545         network->signal = bss->signal;
2546         network->frequency = bss->frequency;
2547         network->best_bss = bss;
2548
2549         if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
2550                 network->wps = TRUE;
2551                 network->wps_capabilities = bss->wps_capabilities;
2552         }
2553
2554 #if defined TIZEN_EXT
2555         network->keymgmt = bss->keymgmt;
2556
2557         if (g_slist_length(bss->vsie_list) > 0) {
2558                 GSList *list = NULL;
2559                 unsigned char *vsie = NULL;
2560                 for (list = bss->vsie_list; list; list = list->next) {
2561                         unsigned char *ie = (unsigned char *)list->data;
2562                         vsie = (unsigned char *)g_try_malloc0(ie[1]+2); // tag number size(1), tag length size(1)
2563
2564                         if (vsie) {
2565                                 memcpy(vsie, ie, ie[1]+2);
2566                                 network->vsie_list = g_slist_append(network->vsie_list, vsie);
2567                         } else
2568                                 SUPPLICANT_DBG("Failed to allocate memory.");
2569                 }
2570         }
2571
2572         network->isHS20AP = bss->hs20;
2573         memcpy(network->country_code, bss->country_code, COUNTRY_CODE_LENGTH);
2574         network->phy_mode = bss->phy_mode;
2575 #endif
2576
2577         SUPPLICANT_DBG("New network %s created", network->name);
2578
2579         network->bss_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2580                                                         NULL, remove_bss);
2581
2582         network->config_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2583                                                         g_free, g_free);
2584
2585 #if defined TIZEN_EXT
2586         network->assoc_reject_table = g_hash_table_new_full(g_str_hash, g_str_equal,
2587                                                         NULL, remove_assoc_data);
2588 #endif
2589
2590         g_hash_table_replace(interface->network_table,
2591                                                 network->group, network);
2592
2593         callback_network_added(network);
2594
2595 done:
2596         /* We update network's WPS properties if only bss provides WPS. */
2597         if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
2598                 network->wps = TRUE;
2599                 network->wps_capabilities = bss->wps_capabilities;
2600
2601                 if (!is_new_network)
2602                         callback_network_changed(network, "WPSCapabilities");
2603         }
2604
2605         /*
2606          * Do not change best BSS if we are connected. It will be done through
2607          * CurrentBSS property in case of misalignment with wpa_s or roaming.
2608          */
2609 #if defined TIZEN_EXT
2610         if (network != interface->current_network) {
2611                 if (update_best_bss(network, bss, network->best_bss))
2612                         callback_network_changed(network, "Signal");
2613         }
2614 #else
2615         if (network != interface->current_network &&
2616                                 bss->signal > network->signal) {
2617                 network->signal = bss->signal;
2618                 network->best_bss = bss;
2619                 callback_network_changed(network, "Signal");
2620         }
2621 #endif
2622
2623         g_hash_table_replace(interface->bss_mapping, bss->path, network);
2624         g_hash_table_replace(network->bss_table, bss->path, bss);
2625
2626         g_hash_table_replace(bss_mapping, bss->path, interface);
2627
2628         return 0;
2629 }
2630
2631 static void bss_rates(DBusMessageIter *iter, void *user_data)
2632 {
2633         struct g_supplicant_bss *bss = user_data;
2634         dbus_uint32_t rate = 0;
2635
2636         dbus_message_iter_get_basic(iter, &rate);
2637         if (rate == 0)
2638                 return;
2639
2640         if (rate > bss->maxrate)
2641                 bss->maxrate = rate;
2642 }
2643
2644 static void bss_keymgmt(DBusMessageIter *iter, void *user_data)
2645 {
2646         unsigned int *keymgmt = user_data;
2647         const char *str = NULL;
2648         int i;
2649
2650         dbus_message_iter_get_basic(iter, &str);
2651         if (!str)
2652                 return;
2653
2654         for (i = 0; keymgmt_map[i].str; i++)
2655                 if (strcmp(str, keymgmt_map[i].str) == 0) {
2656                         SUPPLICANT_DBG("Keymgmt: %s", str);
2657                         *keymgmt |= keymgmt_map[i].val;
2658                         break;
2659                 }
2660 }
2661
2662 static void bss_group(DBusMessageIter *iter, void *user_data)
2663 {
2664         unsigned int *group = user_data;
2665         const char *str = NULL;
2666         int i;
2667
2668         dbus_message_iter_get_basic(iter, &str);
2669         if (!str)
2670                 return;
2671
2672         for (i = 0; group_map[i].str; i++)
2673                 if (strcmp(str, group_map[i].str) == 0) {
2674                         SUPPLICANT_DBG("Group: %s", str);
2675                         *group |= group_map[i].val;
2676                         break;
2677                 }
2678 }
2679
2680 static void bss_pairwise(DBusMessageIter *iter, void *user_data)
2681 {
2682         unsigned int *pairwise = user_data;
2683         const char *str = NULL;
2684         int i;
2685
2686         dbus_message_iter_get_basic(iter, &str);
2687         if (!str)
2688                 return;
2689
2690         for (i = 0; pairwise_map[i].str; i++)
2691                 if (strcmp(str, pairwise_map[i].str) == 0) {
2692                         SUPPLICANT_DBG("Pairwise: %s", str);
2693                         *pairwise |= pairwise_map[i].val;
2694                         break;
2695                 }
2696 }
2697
2698 static void bss_wpa(const char *key, DBusMessageIter *iter,
2699                         void *user_data)
2700 {
2701         struct g_supplicant_bss *bss = user_data;
2702         unsigned int value = 0;
2703
2704         SUPPLICANT_DBG("Key: %s", key);
2705
2706         if (g_strcmp0(key, "KeyMgmt") == 0) {
2707                 supplicant_dbus_array_foreach(iter, bss_keymgmt, &value);
2708
2709                 if (bss->rsn_selected)
2710                         bss->rsn_keymgmt = value;
2711                 else
2712                         bss->wpa_keymgmt = value;
2713         } else if (g_strcmp0(key, "Group") == 0) {
2714                 supplicant_dbus_array_foreach(iter, bss_group, &value);
2715
2716                 if (bss->rsn_selected)
2717                         bss->rsn_group = value;
2718                 else
2719                         bss->wpa_group = value;
2720         } else if (g_strcmp0(key, "Pairwise") == 0) {
2721                 supplicant_dbus_array_foreach(iter, bss_pairwise, &value);
2722
2723                 if (bss->rsn_selected)
2724                         bss->rsn_pairwise = value;
2725                 else
2726                         bss->wpa_pairwise = value;
2727         }
2728 }
2729
2730 static unsigned int get_tlv(unsigned char *ie, unsigned int ie_size,
2731                                                         unsigned int type)
2732 {
2733         unsigned int len = 0;
2734
2735         while (len + 4 < ie_size) {
2736                 unsigned int hi = ie[len];
2737                 unsigned int lo = ie[len + 1];
2738                 unsigned int tmp_type = (hi << 8) + lo;
2739                 unsigned int v_len = 0;
2740
2741                 /* hi and lo are used to recreate an unsigned int
2742                  * based on 2 8bits length unsigned int. */
2743
2744                 hi = ie[len + 2];
2745                 lo = ie[len + 3];
2746                 v_len = (hi << 8) + lo;
2747
2748                 if (tmp_type == type) {
2749                         unsigned int ret_value = 0;
2750                         unsigned char *value = (unsigned char *)&ret_value;
2751
2752                         SUPPLICANT_DBG("IE: match type 0x%x", type);
2753
2754                         /* Verifying length relevance */
2755                         if (v_len > sizeof(unsigned int) ||
2756                                 len + 4 + v_len > ie_size)
2757                                 break;
2758
2759                         memcpy(value, ie + len + 4, v_len);
2760
2761                         SUPPLICANT_DBG("returning 0x%x", ret_value);
2762                         return ret_value;
2763                 }
2764
2765                 len += v_len + 4;
2766         }
2767
2768         SUPPLICANT_DBG("returning 0");
2769         return 0;
2770 }
2771
2772 #if defined TIZEN_EXT
2773 static void get_bss_phy_mode(unsigned int max_rate,
2774                 unsigned int max_ext_rate, bool ht, bool vht, void *data)
2775 {
2776         struct g_supplicant_bss *bss = data;
2777         unsigned int freq = bss->frequency;
2778
2779         /* Following conditions are used to determine
2780          * IEEE 802.11 Protocol Modes:-
2781          *
2782          * 1. If “Supported rates” is only till 11 Mbps,
2783          *    and frequency is in 2.4GHz band, then protocol is 11B.
2784          * 2. If “Supported rates” is till 54Mbps or
2785          *    “Extended supported rates” are present,
2786          *    and frequency is in 2.4GHz band, then protocol is 11G.
2787          * 3. If “Supported rates” is only till 54 Mbps,
2788          *    frequency is in 5GHz band , then protocol is 11A.
2789          * 4. If “HT capabilities” is supported , then protocol is 11N.
2790          * 5. If “HT capabilities” & “VHT” is supported and
2791          *    frequency is in 5 GHz band, then protocol is 11AC.
2792          * */
2793
2794         if (freq >= 2412 && freq <= 2484) { /* 2.4 Ghz Band */
2795                 if (max_rate <= 11 && max_ext_rate <= 0 && !ht)
2796                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211B;
2797                 else if ((max_rate <= 54 || max_ext_rate > 0) && !ht)
2798                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211BG;
2799                 else if ((max_rate >= 54 || max_ext_rate > 0) && ht)
2800                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211BGN;
2801                 else
2802                         bss->phy_mode = G_SUPPLICANT_MODE_UNKNOWN;
2803         } else if (freq >= 5180 && freq <= 5825) { /* 5 Ghz Band */
2804                 if (max_rate <= 54 && !ht)
2805                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211A;
2806                 else if ((max_rate >= 54 || max_ext_rate > 0) && ht && !vht)
2807                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211AN;
2808                 else if ((max_rate >= 54 || max_ext_rate > 0) && ht && vht)
2809                         bss->phy_mode = G_SUPPLICANT_MODE_IEEE80211ANAC;
2810                 else
2811                         bss->phy_mode = G_SUPPLICANT_MODE_UNKNOWN;
2812         }
2813 }
2814 #endif
2815
2816 static void bss_process_ies(DBusMessageIter *iter, void *user_data)
2817 {
2818         struct g_supplicant_bss *bss = user_data;
2819         const unsigned char WPS_OUI[] = { 0x00, 0x50, 0xf2, 0x04 };
2820         unsigned char *ie, *ie_end;
2821         DBusMessageIter array;
2822         unsigned int value;
2823         int ie_len;
2824 #if defined TIZEN_EXT
2825         int r_len, j;
2826         unsigned char *rates = NULL;
2827         unsigned char *ext_rates = NULL;
2828         unsigned int max_rate = 0;
2829         unsigned int max_ext_rate = 0;
2830         bool ht = false;
2831         bool vht = false;
2832 #endif
2833
2834 #define WMM_WPA1_WPS_INFO 221
2835 #define WPS_INFO_MIN_LEN  6
2836 #define WPS_VERSION_TLV   0x104A
2837 #define WPS_STATE_TLV     0x1044
2838 #define WPS_METHODS_TLV   0x1012
2839 #define WPS_REGISTRAR_TLV 0x1041
2840 #define WPS_VERSION       0x10
2841 #define WPS_PBC           0x04
2842 #define WPS_PIN           0x00
2843 #define WPS_CONFIGURED    0x02
2844 #if defined TIZEN_EXT
2845 #define VENDOR_SPECIFIC_INFO 0xDD
2846 #define WLAN_EID_COUNTRY 7
2847 #endif
2848
2849         dbus_message_iter_recurse(iter, &array);
2850         dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
2851
2852         if (!ie || ie_len < 2)
2853                 return;
2854
2855         bss->wps_capabilities = 0;
2856         bss->keymgmt = 0;
2857
2858         for (ie_end = ie + ie_len; ie < ie_end && ie + ie[1] + 1 <= ie_end;
2859                                                         ie += ie[1] + 2) {
2860 #if defined TIZEN_EXT
2861                 unsigned char *vsie;
2862                 int vsie_len = 0;
2863                 if(ie[0] == VENDOR_SPECIFIC_INFO && memcmp(ie+2, WPS_OUI, sizeof(WPS_OUI)) != 0) {
2864                         SUPPLICANT_DBG("IE: match vendor specific data");
2865
2866                         vsie_len = ie[1]+2;     // tag number size(1), tag length size(1)
2867                         vsie = (unsigned char *)g_try_malloc0(vsie_len);
2868
2869                         if (vsie) {
2870                                 memcpy(vsie, ie, vsie_len);
2871                                 bss->vsie_list = g_slist_append(bss->vsie_list, vsie);
2872                         } else
2873                                 SUPPLICANT_DBG("Failed to allocate memory");
2874                         continue;
2875                 }
2876
2877                 if(ie[0] == WLAN_EID_COUNTRY && ie[1] >= 2) {
2878                         /* Add country code only if it is a valid alphabet */
2879                         if (ie[2] >= 65 && ie[2] <= 90 && ie[3] >= 65 && ie[3] <= 90) {
2880                                 memcpy(bss->country_code, ie+2, COUNTRY_CODE_LENGTH);
2881                                 continue;
2882                         }
2883                 }
2884
2885                 if (ie[0] == WLAN_EID_HT_CAP && ie[1]) {
2886                         ht = true;
2887                         continue;
2888                 }
2889
2890                 if (ie[0] == WLAN_EID_VHT_CAP && ie[1]) {
2891                         vht = true;
2892                         continue;
2893                 }
2894
2895                 if (ie[0] == WLAN_EID_SUPP_RATES && ie[1]) {
2896                         r_len = ie[1];
2897                         rates = g_malloc0(r_len);
2898                         if (!rates)
2899                                 continue;
2900
2901                         for (j = 0; ie && j < r_len; j++) {
2902                                 rates[j] = ((ie[j + 2] & 0x7f) * 500000)/1000000;
2903                                 if (max_rate < rates[j])
2904                                         max_rate = rates[j];
2905                         }
2906                         continue;
2907                 }
2908
2909                 if (ie[0] == WLAN_EID_EXT_SUPP_RATES && ie[1] > 0) {
2910                         r_len = ie[1];
2911                         ext_rates = g_malloc0(r_len);
2912                         if (!ext_rates)
2913                                 continue;
2914
2915                         for (j = 0; ie && j < r_len; j++) {
2916                                 ext_rates[j] = ((ie[j + 2] & 0x7f) * 500000)/1000000;
2917                                 if (max_ext_rate < ext_rates[j])
2918                                         max_ext_rate = ext_rates[j];
2919                         }
2920                         continue;
2921                 }
2922 #endif
2923                 if (ie[0] != WMM_WPA1_WPS_INFO || ie[1] < WPS_INFO_MIN_LEN ||
2924                         memcmp(ie+2, WPS_OUI, sizeof(WPS_OUI)) != 0)
2925                         continue;
2926
2927                 SUPPLICANT_DBG("IE: match WPS_OUI");
2928
2929                 value = get_tlv(&ie[6], ie[1], WPS_STATE_TLV);
2930                 if (get_tlv(&ie[6], ie[1], WPS_VERSION_TLV) == WPS_VERSION &&
2931                                                                 value != 0) {
2932                         bss->keymgmt |= G_SUPPLICANT_KEYMGMT_WPS;
2933
2934                         if (value == WPS_CONFIGURED)
2935                                 bss->wps_capabilities |=
2936                                         G_SUPPLICANT_WPS_CONFIGURED;
2937                 }
2938
2939                 value = get_tlv(&ie[6], ie[1], WPS_METHODS_TLV);
2940                 if (value != 0) {
2941                         if (GUINT16_FROM_BE(value) == WPS_PBC)
2942                                 bss->wps_capabilities |= G_SUPPLICANT_WPS_PBC;
2943                         if (GUINT16_FROM_BE(value) == WPS_PIN)
2944                                 bss->wps_capabilities |= G_SUPPLICANT_WPS_PIN;
2945                 } else
2946                         bss->wps_capabilities |=
2947                                 G_SUPPLICANT_WPS_PBC | G_SUPPLICANT_WPS_PIN;
2948
2949                 /* If the AP sends this it means it's advertizing
2950                  * as a registrar and the WPS process is launched
2951                  * on its side */
2952                 if (get_tlv(&ie[6], ie[1], WPS_REGISTRAR_TLV) != 0)
2953                         bss->wps_capabilities |= G_SUPPLICANT_WPS_REGISTRAR;
2954
2955                 SUPPLICANT_DBG("WPS Methods 0x%x", bss->wps_capabilities);
2956         }
2957 #ifdef TIZEN_EXT
2958         get_bss_phy_mode(max_rate, max_ext_rate, ht, vht, user_data);
2959         if (rates)
2960                 g_free(rates);
2961         if (ext_rates)
2962                 g_free(ext_rates);
2963 #endif
2964 }
2965
2966 static void bss_compute_security(struct g_supplicant_bss *bss)
2967 {
2968         /*
2969          * Combining RSN and WPA keymgmt
2970          * We combine it since parsing IEs might have set something for WPS. */
2971         bss->keymgmt |= bss->rsn_keymgmt | bss->wpa_keymgmt;
2972
2973         bss->ieee8021x = FALSE;
2974         bss->psk = FALSE;
2975 #if defined TIZEN_EXT
2976         bss->ft_ieee8021x = FALSE;
2977         bss->ft_psk = FALSE;
2978 #endif
2979
2980 #if defined TIZEN_EXT
2981         if (bss->keymgmt &
2982                         (G_SUPPLICANT_KEYMGMT_WPA_EAP |
2983                                         G_SUPPLICANT_KEYMGMT_WPA_EAP_256))
2984                 bss->ieee8021x = TRUE;
2985         else if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_EAP)
2986                 bss->ft_ieee8021x = TRUE;
2987 #else
2988         if (bss->keymgmt &
2989                         (G_SUPPLICANT_KEYMGMT_WPA_EAP |
2990                                 G_SUPPLICANT_KEYMGMT_WPA_FT_EAP |
2991                                 G_SUPPLICANT_KEYMGMT_WPA_EAP_256))
2992                 bss->ieee8021x = TRUE;
2993 #endif
2994
2995 #if defined TIZEN_EXT
2996         if (bss->keymgmt &
2997                         (G_SUPPLICANT_KEYMGMT_WPA_PSK |
2998                                         G_SUPPLICANT_KEYMGMT_WPA_PSK_256))
2999                 bss->psk = TRUE;
3000         else if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPA_FT_PSK)
3001                 bss->ft_psk = TRUE;
3002 #else
3003         if (bss->keymgmt &
3004                         (G_SUPPLICANT_KEYMGMT_WPA_PSK |
3005                                 G_SUPPLICANT_KEYMGMT_WPA_FT_PSK |
3006                                 G_SUPPLICANT_KEYMGMT_WPA_PSK_256))
3007                 bss->psk = TRUE;
3008 #endif
3009
3010 #if defined TIZEN_EXT
3011         if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_SAE)
3012                 bss->sae = TRUE;
3013         if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_OWE)
3014                 bss->owe = TRUE;
3015         if (bss->keymgmt & G_SUPPLICANT_KEYMGMT_DPP)
3016                 bss->dpp = TRUE;
3017 #endif
3018
3019         if (bss->ieee8021x)
3020                 bss->security = G_SUPPLICANT_SECURITY_IEEE8021X;
3021         else if (bss->psk)
3022                 bss->security = G_SUPPLICANT_SECURITY_PSK;
3023 #if defined TIZEN_EXT
3024         else if (bss->ft_psk)
3025                 bss->security = G_SUPPLICANT_SECURITY_FT_PSK;
3026         else if (bss->ft_ieee8021x == TRUE)
3027                 bss->security = G_SUPPLICANT_SECURITY_IEEE8021X;
3028         else if (bss->sae)
3029                 bss->security = G_SUPPLICANT_SECURITY_SAE;
3030         else if (bss->owe)
3031                 bss->security = G_SUPPLICANT_SECURITY_OWE;
3032         else if (bss->dpp)
3033                 bss->security = G_SUPPLICANT_SECURITY_DPP;
3034 #endif
3035         else if (bss->privacy)
3036                 bss->security = G_SUPPLICANT_SECURITY_WEP;
3037         else
3038                 bss->security = G_SUPPLICANT_SECURITY_NONE;
3039 }
3040
3041
3042 static void bss_property(const char *key, DBusMessageIter *iter,
3043                                                         void *user_data)
3044 {
3045         struct g_supplicant_bss *bss = user_data;
3046
3047         if (!bss->interface)
3048                 return;
3049
3050         SUPPLICANT_DBG("key %s", key);
3051
3052         if (!key)
3053                 return;
3054
3055         if (g_strcmp0(key, "BSSID") == 0) {
3056                 DBusMessageIter array;
3057                 unsigned char *addr;
3058                 int addr_len;
3059
3060                 dbus_message_iter_recurse(iter, &array);
3061                 dbus_message_iter_get_fixed_array(&array, &addr, &addr_len);
3062
3063                 if (addr_len == 6)
3064                         memcpy(bss->bssid, addr, addr_len);
3065         } else if (g_strcmp0(key, "SSID") == 0) {
3066                 DBusMessageIter array;
3067                 unsigned char *ssid;
3068                 int ssid_len;
3069
3070                 dbus_message_iter_recurse(iter, &array);
3071                 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
3072
3073                 if (ssid_len > 0 && ssid_len < 33) {
3074                         memcpy(bss->ssid, ssid, ssid_len);
3075                         bss->ssid_len = ssid_len;
3076                 } else {
3077                         memset(bss->ssid, 0, sizeof(bss->ssid));
3078                         bss->ssid_len = 0;
3079                 }
3080         } else if (g_strcmp0(key, "Capabilities") == 0) {
3081                 dbus_uint16_t capabilities = 0x0000;
3082
3083                 dbus_message_iter_get_basic(iter, &capabilities);
3084
3085                 if (capabilities & IEEE80211_CAP_ESS)
3086                         bss->mode = G_SUPPLICANT_MODE_INFRA;
3087                 else if (capabilities & IEEE80211_CAP_IBSS)
3088                         bss->mode = G_SUPPLICANT_MODE_IBSS;
3089
3090                 if (capabilities & IEEE80211_CAP_PRIVACY)
3091                         bss->privacy = TRUE;
3092         } else if (g_strcmp0(key, "Mode") == 0) {
3093                 const char *mode = NULL;
3094
3095                 dbus_message_iter_get_basic(iter, &mode);
3096                 bss->mode = string2mode(mode);
3097         } else if (g_strcmp0(key, "Frequency") == 0) {
3098                 dbus_uint16_t frequency = 0;
3099
3100                 dbus_message_iter_get_basic(iter, &frequency);
3101                 bss->frequency = frequency;
3102         } else if (g_strcmp0(key, "Signal") == 0) {
3103                 dbus_int16_t signal = 0;
3104
3105                 dbus_message_iter_get_basic(iter, &signal);
3106
3107                 bss->signal = signal;
3108                 if (!bss->signal)
3109                         bss->signal = BSS_UNKNOWN_STRENGTH;
3110
3111         } else if (g_strcmp0(key, "Level") == 0) {
3112                 dbus_int32_t level = 0;
3113
3114                 dbus_message_iter_get_basic(iter, &level);
3115         } else if (g_strcmp0(key, "Rates") == 0) {
3116                 supplicant_dbus_array_foreach(iter, bss_rates, bss);
3117         } else if (g_strcmp0(key, "MaxRate") == 0) {
3118                 dbus_uint32_t maxrate = 0;
3119
3120                 dbus_message_iter_get_basic(iter, &maxrate);
3121                 if (maxrate != 0)
3122                         bss->maxrate = maxrate;
3123         } else if (g_strcmp0(key, "Privacy") == 0) {
3124                 dbus_bool_t privacy = FALSE;
3125
3126                 dbus_message_iter_get_basic(iter, &privacy);
3127                 bss->privacy = privacy;
3128         } else if (g_strcmp0(key, "RSN") == 0) {
3129                 bss->rsn_selected = TRUE;
3130
3131                 supplicant_dbus_property_foreach(iter, bss_wpa, bss);
3132         } else if (g_strcmp0(key, "WPA") == 0) {
3133                 bss->rsn_selected = FALSE;
3134
3135                 supplicant_dbus_property_foreach(iter, bss_wpa, bss);
3136 #if defined TIZEN_EXT
3137         } else if (g_strcmp0(key, "HS20") == 0) {
3138                 dbus_bool_t hs20 = FALSE;
3139                 dbus_message_iter_get_basic(iter, &hs20);
3140                 bss->hs20 = hs20;
3141 #endif
3142         } else if (g_strcmp0(key, "IEs") == 0)
3143                 bss_process_ies(iter, bss);
3144         else
3145                 SUPPLICANT_DBG("key %s type %c",
3146                                 key, dbus_message_iter_get_arg_type(iter));
3147 }
3148
3149 static struct g_supplicant_bss *interface_bss_added(DBusMessageIter *iter,
3150                                                         void *user_data)
3151 {
3152         GSupplicantInterface *interface = user_data;
3153         GSupplicantNetwork *network;
3154         struct g_supplicant_bss *bss;
3155         const char *path = NULL;
3156
3157         SUPPLICANT_DBG("");
3158
3159         dbus_message_iter_get_basic(iter, &path);
3160         if (!path)
3161                 return NULL;
3162
3163         if (g_strcmp0(path, "/") == 0)
3164                 return NULL;
3165
3166         SUPPLICANT_DBG("%s", path);
3167
3168         network = g_hash_table_lookup(interface->bss_mapping, path);
3169         if (network) {
3170                 bss = g_hash_table_lookup(network->bss_table, path);
3171                 if (bss)
3172                         return NULL;
3173         }
3174
3175         bss = g_try_new0(struct g_supplicant_bss, 1);
3176         if (!bss)
3177                 return NULL;
3178
3179         bss->interface = interface;
3180         bss->path = g_strdup(path);
3181         bss->signal = BSS_UNKNOWN_STRENGTH;
3182
3183         return bss;
3184 }
3185
3186 static void interface_bss_added_with_keys(DBusMessageIter *iter,
3187                                                 void *user_data)
3188 {
3189         struct g_supplicant_bss *bss;
3190
3191         SUPPLICANT_DBG("");
3192
3193         bss = interface_bss_added(iter, user_data);
3194         if (!bss)
3195                 return;
3196
3197         dbus_message_iter_next(iter);
3198
3199         if (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_INVALID)
3200 #if defined TIZEN_EXT
3201         {
3202                 g_free(bss->path);
3203                 g_free(bss);
3204                 return;
3205         }
3206 #else
3207                 return;
3208 #endif
3209
3210         supplicant_dbus_property_foreach(iter, bss_property, bss);
3211
3212         bss_compute_security(bss);
3213         if (add_or_replace_bss_to_network(bss) < 0)
3214                 SUPPLICANT_DBG("add_or_replace_bss_to_network failed");
3215 }
3216
3217 static void interface_bss_added_without_keys(DBusMessageIter *iter,
3218                                                 void *user_data)
3219 {
3220         struct g_supplicant_bss *bss;
3221
3222         SUPPLICANT_DBG("");
3223
3224         bss = interface_bss_added(iter, user_data);
3225         if (!bss)
3226                 return;
3227
3228         supplicant_dbus_property_get_all(bss->path,
3229                                         SUPPLICANT_INTERFACE ".BSS",
3230                                         bss_property, bss, bss);
3231
3232         bss_compute_security(bss);
3233         if (add_or_replace_bss_to_network(bss) < 0)
3234                         SUPPLICANT_DBG("add_or_replace_bss_to_network failed");
3235 }
3236
3237 static void update_signal(gpointer key, gpointer value,
3238                                                 gpointer user_data)
3239 {
3240         struct g_supplicant_bss *bss = value;
3241         GSupplicantNetwork *network = user_data;
3242
3243 #if defined TIZEN_EXT
3244         if (!network->best_bss || (network->best_bss == bss)) {
3245                 if (bss->signal > network->signal) {
3246                         network->signal = bss->signal;
3247                         network->best_bss = bss;
3248                 }
3249                 return;
3250         }
3251
3252         update_best_bss(network, bss, network->best_bss);
3253 #else
3254         if (bss->signal > network->signal) {
3255                 network->signal = bss->signal;
3256                 network->best_bss = bss;
3257         }
3258 #endif
3259 }
3260
3261 static void update_network_signal(GSupplicantNetwork *network)
3262 {
3263         if (g_hash_table_size(network->bss_table) <= 1 && network->best_bss)
3264                 return;
3265
3266         g_hash_table_foreach(network->bss_table,
3267                                 update_signal, network);
3268
3269         SUPPLICANT_DBG("New network signal %d", network->signal);
3270 }
3271
3272 #if defined TIZEN_EXT
3273 static gboolean last_connected_timeout(gpointer data)
3274 {
3275         GSupplicantInterface *interface = data;
3276         GSupplicantNetwork *current_network = interface->current_network;
3277
3278         SUPPLICANT_DBG("Timeout last connected bss");
3279
3280         if (current_network && current_network->best_bss) {
3281                 if (compare_bssid(current_network->best_bss->bssid, interface->connected_bssid)) {
3282                         g_supplicant_network_set_last_connected_bssid(current_network, interface->connected_bssid);
3283                         callback_network_changed(current_network, "LastConnectedBSSID");
3284                 }
3285         }
3286
3287         last_connected_bss_timeout = 0;
3288         return FALSE;
3289 }
3290
3291 static void add_timer_for_last_connected(GSupplicantInterface *interface)
3292 {
3293         GSupplicantNetwork *current_network = interface->current_network;
3294
3295         if (interface->state == G_SUPPLICANT_STATE_COMPLETED) {
3296                 if (current_network) {
3297                         struct g_supplicant_bss *best_bss = current_network->best_bss;
3298
3299                         memcpy(interface->connected_bssid, best_bss->bssid, WIFI_BSSID_LEN_MAX);
3300
3301                         if (last_connected_bss_timeout)
3302                                 g_source_remove(last_connected_bss_timeout);
3303
3304                         last_connected_bss_timeout = g_timeout_add_seconds(LAST_CONNECTED_TIMEOUT,
3305                                 last_connected_timeout, interface);
3306
3307                         SUPPLICANT_DBG("Add timer for last connected bssid [" MACSTR "]",
3308                                         MAC2STR(best_bss->bssid));
3309                 }
3310         }
3311 }
3312
3313 static void remove_timer_for_last_connected(GSupplicantInterface *interface)
3314 {
3315         if (interface->state == G_SUPPLICANT_STATE_DISCONNECTED) {
3316                 if (last_connected_bss_timeout != 0) {
3317                         g_source_remove(last_connected_bss_timeout);
3318                         last_connected_bss_timeout = 0;
3319                         SUPPLICANT_DBG("Remove timer for last connected bss");
3320                 }
3321         }
3322 }
3323 #endif
3324
3325 static void interface_current_bss(GSupplicantInterface *interface,
3326                                                 DBusMessageIter *iter)
3327 {
3328         GSupplicantNetwork *network;
3329         struct g_supplicant_bss *bss;
3330         const char *path;
3331
3332         dbus_message_iter_get_basic(iter, &path);
3333         if (g_strcmp0(path, "/") == 0) {
3334                 interface->current_network = NULL;
3335                 return;
3336         }
3337
3338         interface_bss_added_without_keys(iter, interface);
3339
3340         network = g_hash_table_lookup(interface->bss_mapping, path);
3341         if (!network)
3342                 return;
3343
3344         bss = g_hash_table_lookup(network->bss_table, path);
3345         if (!bss)
3346                 return;
3347
3348         interface->current_network = network;
3349 #if defined TIZEN_EXT
3350         SUPPLICANT_DBG("current network [%p]", interface->current_network);
3351 #endif
3352
3353         if (bss != network->best_bss) {
3354                 /*
3355                  * This is the case where either wpa_s got associated
3356                  * to a BSS different than the one ConnMan considers
3357                  * the best, or we are roaming.
3358                  */
3359                 SUPPLICANT_DBG("Update best BSS for %s", network->name);
3360
3361                 network->best_bss = bss;
3362
3363                 if (network->signal != bss->signal) {
3364                         SUPPLICANT_DBG("New network signal %d dBm",
3365                                                 bss->signal);
3366
3367                         network->signal = bss->signal;
3368                         callback_network_changed(network, "Signal");
3369                 }
3370         }
3371
3372         /*
3373          * wpa_s could notify about CurrentBSS in any state once
3374          * it got associated. It is not sure such notification will
3375          * arrive together with transition to ASSOCIATED state.
3376          * In fact, for networks with security WEP or OPEN, it
3377          * always arrives together with transition to COMPLETED.
3378          */
3379         switch (interface->state) {
3380         case G_SUPPLICANT_STATE_UNKNOWN:
3381         case G_SUPPLICANT_STATE_DISABLED:
3382         case G_SUPPLICANT_STATE_DISCONNECTED:
3383         case G_SUPPLICANT_STATE_INACTIVE:
3384         case G_SUPPLICANT_STATE_SCANNING:
3385         case G_SUPPLICANT_STATE_AUTHENTICATING:
3386         case G_SUPPLICANT_STATE_ASSOCIATING:
3387                 return;
3388         case G_SUPPLICANT_STATE_ASSOCIATED:
3389         case G_SUPPLICANT_STATE_4WAY_HANDSHAKE:
3390         case G_SUPPLICANT_STATE_GROUP_HANDSHAKE:
3391         case G_SUPPLICANT_STATE_COMPLETED:
3392                 callback_network_associated(network);
3393 #if defined TIZEN_EXT
3394                 add_timer_for_last_connected(interface);
3395 #endif
3396                 break;
3397         }
3398 }
3399
3400 static void interface_bss_removed(DBusMessageIter *iter, void *user_data)
3401 {
3402         GSupplicantInterface *interface = user_data;
3403         GSupplicantNetwork *network;
3404         struct g_supplicant_bss *bss = NULL;
3405         const char *path = NULL;
3406         bool is_current_network_bss = false;
3407
3408         dbus_message_iter_get_basic(iter, &path);
3409         if (!path)
3410                 return;
3411
3412         network = g_hash_table_lookup(interface->bss_mapping, path);
3413         if (!network)
3414                 return;
3415
3416         bss = g_hash_table_lookup(network->bss_table, path);
3417         if (network->best_bss == bss) {
3418                 network->best_bss = NULL;
3419                 network->signal = BSS_UNKNOWN_STRENGTH;
3420                 is_current_network_bss = true;
3421         }
3422
3423         g_hash_table_remove(bss_mapping, path);
3424
3425         g_hash_table_remove(interface->bss_mapping, path);
3426         g_hash_table_remove(network->bss_table, path);
3427
3428         update_network_signal(network);
3429
3430         if (g_hash_table_size(network->bss_table) == 0) {
3431                 g_hash_table_remove(interface->network_table, network->group);
3432         } else {
3433                 if (is_current_network_bss && network->best_bss)
3434 #if defined TIZEN_EXT
3435                         callback_network_changed(network, "CheckMultiBssidConnect");
3436 #else
3437                         callback_network_changed(network, "");
3438 #endif
3439         }
3440 }
3441
3442 static void set_config_methods(DBusMessageIter *iter, void *user_data)
3443 {
3444         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, user_data);
3445 }
3446
3447 static void wps_property(const char *key, DBusMessageIter *iter,
3448                                                         void *user_data)
3449 {
3450         GSupplicantInterface *interface = user_data;
3451
3452         if (!interface)
3453                 return;
3454
3455         SUPPLICANT_DBG("key: %s", key);
3456
3457         if (g_strcmp0(key, "ConfigMethods") == 0) {
3458                 const char *config_methods = "push_button", *str = NULL;
3459
3460                 dbus_message_iter_get_basic(iter, &str);
3461                 if (str && strlen(str) > 0) {
3462                         /* It was already set at wpa_s level, don't modify it. */
3463                         SUPPLICANT_DBG("%s", str);
3464                         return;
3465                 }
3466
3467                 supplicant_dbus_property_set(interface->path,
3468                         SUPPLICANT_INTERFACE ".Interface.WPS",
3469                         "ConfigMethods", DBUS_TYPE_STRING_AS_STRING,
3470                         set_config_methods, NULL, &config_methods, NULL);
3471
3472                 SUPPLICANT_DBG("No value. Set %s", config_methods);
3473         }
3474
3475 }
3476
3477 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
3478 void g_supplicant_replace_config_file(const char *ifname, const char *config_file)
3479 {
3480         if (!ifname)
3481                return;
3482
3483         if (!config_file)
3484                 return;
3485
3486         SUPPLICANT_DBG("New {%s, %s}", ifname, config_file);
3487         g_hash_table_replace(config_file_table,
3488                         g_strdup(ifname), g_strdup(config_file));
3489 }
3490 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
3491
3492 static void interface_property(const char *key, DBusMessageIter *iter,
3493                                                         void *user_data)
3494 {
3495         GSupplicantInterface *interface = user_data;
3496
3497         if (!interface)
3498                 return;
3499
3500         SUPPLICANT_DBG("%s", key);
3501
3502         if (!key) {
3503                 debug_strvalmap("KeyMgmt capability", keymgmt_map,
3504                                                 interface->keymgmt_capa);
3505                 debug_strvalmap("AuthAlg capability", authalg_capa_map,
3506                                                 interface->authalg_capa);
3507                 debug_strvalmap("Protocol capability", proto_capa_map,
3508                                                 interface->proto_capa);
3509                 debug_strvalmap("Pairwise capability", pairwise_map,
3510                                                 interface->pairwise_capa);
3511                 debug_strvalmap("Group capability", group_map,
3512                                                 interface->group_capa);
3513                 debug_strvalmap("Scan capability", scan_capa_map,
3514                                                 interface->scan_capa);
3515                 debug_strvalmap("Mode capability", mode_capa_map,
3516                                                 interface->mode_capa);
3517
3518                 supplicant_dbus_property_get_all(interface->path,
3519                                 SUPPLICANT_INTERFACE ".Interface.WPS",
3520                                 wps_property, interface, interface);
3521
3522                 if (interface->ready)
3523                         callback_interface_added(interface);
3524
3525                 return;
3526         }
3527
3528         if (g_strcmp0(key, "Capabilities") == 0) {
3529                 supplicant_dbus_property_foreach(iter, interface_capability,
3530                                                                 interface);
3531 #if !defined TIZEN_EXT
3532                 if (interface->mode_capa & G_SUPPLICANT_CAPABILITY_MODE_P2P)
3533                         interface->p2p_support = true;
3534 #endif
3535 #if defined TIZEN_EXT_WIFI_MESH
3536                 if (interface->mode_capa & G_SUPPLICANT_CAPABILITY_MODE_MESH)
3537                         interface->mesh_support = true;
3538 #endif
3539         } else if (g_strcmp0(key, "State") == 0) {
3540                 const char *str = NULL;
3541
3542                 dbus_message_iter_get_basic(iter, &str);
3543                 if (str)
3544                         if (string2state(str) != interface->state) {
3545                                 interface->state = string2state(str);
3546                                 callback_interface_state(interface);
3547                         }
3548 #if defined TIZEN_EXT
3549                 switch (interface->state) {
3550                 case G_SUPPLICANT_STATE_COMPLETED:
3551                         add_timer_for_last_connected(interface);
3552                         break;
3553                 case G_SUPPLICANT_STATE_DISCONNECTED:
3554                         remove_timer_for_last_connected(interface);
3555                         break;
3556                 default:
3557                         break;
3558                 }
3559 #endif
3560                 if (interface->ap_create_in_progress) {
3561                         if (interface->state == G_SUPPLICANT_STATE_DISCONNECTED)
3562                                 callback_ap_create_fail(interface);
3563
3564                         interface->ap_create_in_progress = false;
3565                 }
3566
3567                 if (interface->state == G_SUPPLICANT_STATE_DISABLED)
3568                         interface->ready = FALSE;
3569                 else
3570                         interface->ready = TRUE;
3571
3572                 SUPPLICANT_DBG("state %s (%d)", str, interface->state);
3573         } else if (g_strcmp0(key, "Scanning") == 0) {
3574                 dbus_bool_t scanning = FALSE;
3575
3576                 dbus_message_iter_get_basic(iter, &scanning);
3577                 interface->scanning = scanning;
3578
3579                 if (interface->ready) {
3580                         if (interface->scanning)
3581                                 callback_scan_started(interface);
3582                         else
3583                                 callback_scan_finished(interface);
3584                 }
3585         } else if (g_strcmp0(key, "ApScan") == 0) {
3586                 int apscan = 1;
3587
3588                 dbus_message_iter_get_basic(iter, &apscan);
3589                 interface->apscan = apscan;
3590         } else if (g_strcmp0(key, "Ifname") == 0) {
3591                 const char *str = NULL;
3592
3593                 dbus_message_iter_get_basic(iter, &str);
3594                 if (str) {
3595                         g_free(interface->ifname);
3596                         interface->ifname = g_strdup(str);
3597                 }
3598         } else if (g_strcmp0(key, "Driver") == 0) {
3599                 const char *str = NULL;
3600
3601                 dbus_message_iter_get_basic(iter, &str);
3602                 if (str) {
3603                         g_free(interface->driver);
3604                         interface->driver = g_strdup(str);
3605                 }
3606         } else if (g_strcmp0(key, "BridgeIfname") == 0) {
3607                 const char *str = NULL;
3608
3609                 dbus_message_iter_get_basic(iter, &str);
3610                 if (str) {
3611                         g_free(interface->bridge);
3612                         interface->bridge = g_strdup(str);
3613                 }
3614         } else if (g_strcmp0(key, "ConfigFile") == 0) {
3615                 const char *str = NULL;
3616
3617                 dbus_message_iter_get_basic(iter, &str);
3618                 if (str && strlen(str) > 0 && interface->ifname) {
3619                         SUPPLICANT_DBG("New {%s, %s}", interface->ifname, str);
3620                         g_hash_table_replace(config_file_table,
3621                                 g_strdup(interface->ifname), g_strdup(str));
3622                 }
3623         } else if (g_strcmp0(key, "CurrentBSS") == 0) {
3624                 interface_current_bss(interface, iter);
3625         } else if (g_strcmp0(key, "CurrentNetwork") == 0) {
3626 #if defined TIZEN_EXT
3627                 if (interface->state != G_SUPPLICANT_STATE_COMPLETED)
3628 #endif
3629                 interface_network_added(iter, interface);
3630         } else if (g_strcmp0(key, "BSSs") == 0) {
3631                 supplicant_dbus_array_foreach(iter,
3632                                         interface_bss_added_without_keys,
3633                                         interface);
3634         } else if (g_strcmp0(key, "Blobs") == 0) {
3635                 /* Nothing */
3636         } else if (g_strcmp0(key, "Networks") == 0) {
3637                 supplicant_dbus_array_foreach(iter, interface_network_added,
3638                                                                 interface);
3639         } else if (g_strcmp0(key, "DisconnectReason") == 0) {
3640                 int reason_code;
3641                 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
3642                         dbus_message_iter_get_basic(iter, &reason_code);
3643                         callback_disconnect_reason_code(interface, reason_code);
3644 #if defined TIZEN_EXT
3645                         SUPPLICANT_DBG("reason code (%d)", reason_code);
3646 #endif
3647                 }
3648         } else if (g_strcmp0(key, "AssocStatusCode") == 0) {
3649                 int status_code;
3650                 if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
3651                         dbus_message_iter_get_basic(iter, &status_code);
3652                         callback_assoc_status_code(interface, status_code);
3653 #if defined TIZEN_EXT
3654                         SUPPLICANT_DBG("status code (%d)", status_code);
3655 #endif
3656                 }
3657         } else {
3658                 SUPPLICANT_DBG("key %s type %c",
3659                                 key, dbus_message_iter_get_arg_type(iter));
3660         }
3661 }
3662
3663 static void scan_network_update(DBusMessageIter *iter, void *user_data)
3664 {
3665         GSupplicantInterface *interface = user_data;
3666         GSupplicantNetwork *network;
3667         char *path;
3668
3669         if (!iter)
3670                 return;
3671
3672         dbus_message_iter_get_basic(iter, &path);
3673
3674         if (!path)
3675                 return;
3676
3677         if (g_strcmp0(path, "/") == 0)
3678                 return;
3679
3680         /* Update the network details based on scan BSS data */
3681         network = g_hash_table_lookup(interface->bss_mapping, path);
3682         if (network)
3683                 callback_network_added(network);
3684 }
3685
3686 static void scan_bss_data(const char *key, DBusMessageIter *iter,
3687                                 void *user_data)
3688 {
3689         GSupplicantInterface *interface = user_data;
3690
3691 /*Fixed : stucking in scanning state when scan failed*/
3692 #if defined TIZEN_EXT
3693         GSupplicantInterfaceCallback scan_callback;
3694         SUPPLICANT_DBG("");
3695 #endif
3696
3697         if (iter)
3698                 supplicant_dbus_array_foreach(iter, scan_network_update,
3699                                                 interface);
3700
3701 #if defined TIZEN_EXT
3702         scan_callback = interface->scan_callback;
3703         callback_scan_done(interface);
3704 #endif
3705
3706         if (interface->scan_callback)
3707                 interface->scan_callback(0, interface, interface->scan_data);
3708
3709 #if defined TIZEN_EXT
3710         if (interface->scan_callback == scan_callback) {
3711 #endif
3712         interface->scan_callback = NULL;
3713         interface->scan_data = NULL;
3714 #if defined TIZEN_EXT
3715         }
3716 #endif
3717 }
3718
3719 static GSupplicantInterface *interface_alloc(const char *path)
3720 {
3721         GSupplicantInterface *interface;
3722
3723         interface = g_try_new0(GSupplicantInterface, 1);
3724         if (!interface)
3725                 return NULL;
3726
3727         interface->path = g_strdup(path);
3728
3729         interface->network_table = g_hash_table_new_full(g_str_hash,
3730                                         g_str_equal, NULL, remove_network);
3731         interface->peer_table = g_hash_table_new_full(g_str_hash,
3732                                         g_str_equal, NULL, remove_peer);
3733         interface->group_table = g_hash_table_new_full(g_str_hash,
3734                                         g_str_equal, NULL, remove_group);
3735         interface->bss_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
3736                                                                 NULL, NULL);
3737
3738         g_hash_table_replace(interface_table, interface->path, interface);
3739
3740         return interface;
3741 }
3742
3743 static void interface_added(DBusMessageIter *iter, void *user_data)
3744 {
3745         GSupplicantInterface *interface;
3746         const char *path = NULL;
3747         bool properties_appended = GPOINTER_TO_UINT(user_data);
3748
3749         SUPPLICANT_DBG("");
3750
3751         dbus_message_iter_get_basic(iter, &path);
3752         if (!path)
3753                 return;
3754
3755         if (g_strcmp0(path, "/") == 0)
3756                 return;
3757
3758         interface = g_hash_table_lookup(interface_table, path);
3759         if (interface)
3760                 return;
3761
3762         interface = interface_alloc(path);
3763         if (!interface)
3764                 return;
3765
3766         if (!properties_appended) {
3767                 supplicant_dbus_property_get_all(path,
3768                                                 SUPPLICANT_INTERFACE ".Interface",
3769                                                 interface_property, interface,
3770                                                 interface);
3771                 return;
3772         }
3773
3774         dbus_message_iter_next(iter);
3775         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
3776                 supplicant_dbus_property_foreach(iter, interface_property,
3777                                                                 interface);
3778                 interface_property(NULL, NULL, interface);
3779         }
3780 }
3781
3782 static void interface_removed(DBusMessageIter *iter, void *user_data)
3783 {
3784         const char *path = NULL;
3785         GSupplicantInterface *interface = user_data;
3786
3787         dbus_message_iter_get_basic(iter, &path);
3788         if (!path)
3789                 return;
3790
3791         interface = g_hash_table_lookup(interface_table, path);
3792         g_supplicant_interface_cancel(interface);
3793
3794         g_hash_table_remove(interface_table, path);
3795 }
3796
3797 static void eap_method(DBusMessageIter *iter, void *user_data)
3798 {
3799         const char *str = NULL;
3800         int i;
3801
3802         dbus_message_iter_get_basic(iter, &str);
3803         if (!str)
3804                 return;
3805
3806         for (i = 0; eap_method_map[i].str; i++)
3807                 if (strcmp(str, eap_method_map[i].str) == 0) {
3808                         eap_methods |= eap_method_map[i].val;
3809                         break;
3810                 }
3811 }
3812
3813 static void service_property(const char *key, DBusMessageIter *iter,
3814                                                         void *user_data)
3815 {
3816         if (!key) {
3817                 callback_system_ready();
3818                 return;
3819         }
3820
3821         if (g_strcmp0(key, "DebugLevel") == 0) {
3822                 const char *str = NULL;
3823                 int i;
3824
3825                 dbus_message_iter_get_basic(iter, &str);
3826                 for (i = 0; debug_strings[i]; i++)
3827                         if (g_strcmp0(debug_strings[i], str) == 0) {
3828                                 debug_level = i;
3829                                 break;
3830                         }
3831                 SUPPLICANT_DBG("Debug level %d", debug_level);
3832         } else if (g_strcmp0(key, "DebugTimestamp") == 0) {
3833                 dbus_message_iter_get_basic(iter, &debug_timestamp);
3834                 SUPPLICANT_DBG("Debug timestamp %u", debug_timestamp);
3835         } else if (g_strcmp0(key, "DebugShowKeys") == 0) {
3836                 dbus_message_iter_get_basic(iter, &debug_showkeys);
3837                 SUPPLICANT_DBG("Debug show keys %u", debug_showkeys);
3838         } else if (g_strcmp0(key, "Interfaces") == 0) {
3839                 supplicant_dbus_array_foreach(iter, interface_added, NULL);
3840         } else if (g_strcmp0(key, "EapMethods") == 0) {
3841                 supplicant_dbus_array_foreach(iter, eap_method, NULL);
3842                 debug_strvalmap("EAP method", eap_method_map, eap_methods);
3843         } else if (g_strcmp0(key, "Country") == 0) {
3844                 const char *country = NULL;
3845
3846                 dbus_message_iter_get_basic(iter, &country);
3847                 SUPPLICANT_DBG("Country %s", country);
3848         } else
3849                 SUPPLICANT_DBG("key %s type %c",
3850                                 key, dbus_message_iter_get_arg_type(iter));
3851 }
3852
3853 static void signal_name_owner_changed(const char *path, DBusMessageIter *iter)
3854 {
3855         const char *name = NULL, *old = NULL, *new = NULL;
3856
3857         SUPPLICANT_DBG("");
3858
3859         if (g_strcmp0(path, DBUS_PATH_DBUS) != 0)
3860                 return;
3861
3862         dbus_message_iter_get_basic(iter, &name);
3863         if (!name)
3864                 return;
3865
3866         if (g_strcmp0(name, SUPPLICANT_SERVICE) != 0)
3867                 return;
3868
3869         dbus_message_iter_next(iter);
3870         dbus_message_iter_get_basic(iter, &old);
3871         dbus_message_iter_next(iter);
3872         dbus_message_iter_get_basic(iter, &new);
3873
3874         if (!old || !new)
3875                 return;
3876
3877         if (strlen(old) > 0 && strlen(new) == 0) {
3878                 system_available = FALSE;
3879                 g_hash_table_remove_all(bss_mapping);
3880                 g_hash_table_remove_all(peer_mapping);
3881                 g_hash_table_remove_all(group_mapping);
3882                 g_hash_table_remove_all(config_file_table);
3883                 g_hash_table_remove_all(interface_table);
3884                 callback_system_killed();
3885         }
3886
3887         if (strlen(new) > 0 && strlen(old) == 0) {
3888                 system_available = TRUE;
3889                 supplicant_dbus_property_get_all(SUPPLICANT_PATH,
3890                                                 SUPPLICANT_INTERFACE,
3891                                                 service_property, NULL, NULL);
3892         }
3893 }
3894
3895 static void signal_properties_changed(const char *path, DBusMessageIter *iter)
3896 {
3897         SUPPLICANT_DBG("");
3898
3899         if (g_strcmp0(path, SUPPLICANT_PATH) != 0)
3900                 return;
3901
3902         supplicant_dbus_property_foreach(iter, service_property, NULL);
3903 }
3904
3905 static void signal_interface_added(const char *path, DBusMessageIter *iter)
3906 {
3907         SUPPLICANT_DBG("path %s %s", path, SUPPLICANT_PATH);
3908
3909         if (g_strcmp0(path, SUPPLICANT_PATH) == 0)
3910                 interface_added(iter, GUINT_TO_POINTER(true));
3911 }
3912
3913 static void signal_interface_removed(const char *path, DBusMessageIter *iter)
3914 {
3915         SUPPLICANT_DBG("");
3916
3917         if (g_strcmp0(path, SUPPLICANT_PATH) == 0)
3918                 interface_removed(iter, NULL);
3919 }
3920
3921 static void signal_interface_changed(const char *path, DBusMessageIter *iter)
3922 {
3923         GSupplicantInterface *interface;
3924
3925         SUPPLICANT_DBG("");
3926
3927         interface = g_hash_table_lookup(interface_table, path);
3928         if (!interface)
3929                 return;
3930
3931         supplicant_dbus_property_foreach(iter, interface_property, interface);
3932 }
3933
3934 static void signal_scan_done(const char *path, DBusMessageIter *iter)
3935 {
3936         GSupplicantInterface *interface;
3937         dbus_bool_t success = FALSE;
3938
3939         SUPPLICANT_DBG("");
3940
3941         interface = g_hash_table_lookup(interface_table, path);
3942         if (!interface)
3943                 return;
3944
3945         dbus_message_iter_get_basic(iter, &success);
3946
3947         if (interface->scanning) {
3948                 callback_scan_finished(interface);
3949                 interface->scanning = FALSE;
3950         }
3951
3952         /*
3953          * If scan is unsuccessful return -EIO else get the scanned BSSs
3954          * and update the network details accordingly
3955          */
3956         if (!success) {
3957                 if (interface->scan_callback)
3958                         interface->scan_callback(-EIO, interface,
3959                                                 interface->scan_data);
3960
3961                 interface->scan_callback = NULL;
3962                 interface->scan_data = NULL;
3963
3964                 return;
3965         }
3966
3967         supplicant_dbus_property_get(path, SUPPLICANT_INTERFACE ".Interface",
3968                                 "BSSs", scan_bss_data, interface, interface);
3969 }
3970
3971 static void signal_bss_added(const char *path, DBusMessageIter *iter)
3972 {
3973         GSupplicantInterface *interface;
3974
3975         SUPPLICANT_DBG("");
3976
3977         interface = g_hash_table_lookup(interface_table, path);
3978         if (!interface)
3979                 return;
3980
3981         interface_bss_added_with_keys(iter, interface);
3982 }
3983
3984 static void signal_bss_removed(const char *path, DBusMessageIter *iter)
3985 {
3986         GSupplicantInterface *interface;
3987
3988         SUPPLICANT_DBG("");
3989
3990         interface = g_hash_table_lookup(interface_table, path);
3991         if (!interface)
3992                 return;
3993
3994         interface_bss_removed(iter, interface);
3995 }
3996
3997 static void signal_network_added(const char *path, DBusMessageIter *iter)
3998 {
3999         GSupplicantInterface *interface;
4000
4001         SUPPLICANT_DBG("");
4002
4003         interface = g_hash_table_lookup(interface_table, path);
4004         if (!interface)
4005                 return;
4006
4007         interface_network_added(iter, interface);
4008 }
4009
4010 static void signal_network_removed(const char *path, DBusMessageIter *iter)
4011 {
4012         GSupplicantInterface *interface;
4013
4014         SUPPLICANT_DBG("");
4015
4016         interface = g_hash_table_lookup(interface_table, path);
4017         if (!interface)
4018                 return;
4019
4020         interface_network_removed(iter, interface);
4021 }
4022 #if defined TIZEN_EXT
4023 void *copy_vsie_list(gconstpointer src, gpointer data)
4024 {
4025         return g_strdup(src);
4026 }
4027 #endif
4028
4029
4030 static void signal_sta_authorized(const char *path, DBusMessageIter *iter)
4031 {
4032         GSupplicantInterface *interface;
4033         const char *addr = NULL;
4034
4035         SUPPLICANT_DBG("");
4036
4037         interface = g_hash_table_lookup(interface_table, path);
4038         if (!interface)
4039                 return;
4040
4041         dbus_message_iter_get_basic(iter, &addr);
4042         if (!addr)
4043                 return;
4044
4045         callback_sta_authorized(interface, addr);
4046 }
4047
4048 static void signal_sta_deauthorized(const char *path, DBusMessageIter *iter)
4049 {
4050         GSupplicantInterface *interface;
4051         const char *addr = NULL;
4052
4053         SUPPLICANT_DBG("");
4054
4055         interface = g_hash_table_lookup(interface_table, path);
4056         if (!interface)
4057                 return;
4058
4059         dbus_message_iter_get_basic(iter, &addr);
4060         if (!addr)
4061                 return;
4062
4063         callback_sta_deauthorized(interface, addr);
4064 }
4065
4066 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
4067 static void signal_eap(const char *path, DBusMessageIter *iter)
4068 {
4069         GSupplicantInterface *interface;
4070         const char *str = NULL;
4071
4072         SUPPLICANT_DBG("EAPOL_DEBUG callback eap signal");
4073
4074         interface = g_hash_table_lookup(interface_table, path);
4075         if (!interface)
4076                 return;
4077
4078         // TODO: Identify EAP fail condition, currently timeout is used for failure.
4079
4080         dbus_message_iter_get_basic(iter, &str);
4081         if (!str)
4082                 return;
4083
4084         if (g_strcmp0("completion", str))
4085                 return;
4086
4087         dbus_message_iter_next(iter);
4088
4089         dbus_message_iter_get_basic(iter, &str);
4090         if (!str)
4091                 return;
4092
4093         if (!g_strcmp0("success", str))
4094                 callback_eap(interface, true);
4095         else
4096                 callback_eap(interface, false);
4097 }
4098 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
4099
4100 static void signal_bss_changed(const char *path, DBusMessageIter *iter)
4101 {
4102         GSupplicantInterface *interface;
4103         GSupplicantNetwork *network;
4104         GSupplicantSecurity old_security;
4105         unsigned int old_wps_capabilities;
4106         struct g_supplicant_bss *bss;
4107
4108         SUPPLICANT_DBG("");
4109
4110         interface = g_hash_table_lookup(bss_mapping, path);
4111         if (!interface)
4112                 return;
4113
4114         network = g_hash_table_lookup(interface->bss_mapping, path);
4115         if (!network)
4116                 return;
4117
4118         bss = g_hash_table_lookup(network->bss_table, path);
4119         if (!bss)
4120                 return;
4121
4122         supplicant_dbus_property_foreach(iter, bss_property, bss);
4123
4124 #if defined TIZEN_EXT
4125         network->frequency = bss->frequency;
4126         network->phy_mode = bss->phy_mode;
4127 #endif
4128         old_security = network->security;
4129         bss_compute_security(bss);
4130
4131         if (old_security != bss->security) {
4132                 struct g_supplicant_bss *new_bss;
4133
4134                 SUPPLICANT_DBG("New network security for %s with path %s",
4135                                bss->ssid, bss->path);
4136
4137                 /*
4138                  * Security change policy:
4139                  * - We first copy the current bss into a new one with
4140                  *   its own pointer (path)
4141                  * - Clear the old bss pointer and remove the network completely
4142                  *   if there are no more BSSs in the bss table.
4143                  * - The new bss will be added either to an existing network
4144                  *   or an additional network will be created
4145                  */
4146
4147                 new_bss = g_try_new0(struct g_supplicant_bss, 1);
4148                 if (!new_bss)
4149                         return;
4150
4151                 memcpy(new_bss, bss, sizeof(struct g_supplicant_bss));
4152                 new_bss->path = g_strdup(bss->path);
4153 #if defined TIZEN_EXT
4154                 new_bss->vsie_list = g_slist_copy_deep(bss->vsie_list, copy_vsie_list, NULL);
4155 #endif
4156
4157                 if (network->best_bss == bss) {
4158                         network->best_bss = NULL;
4159                         network->signal = BSS_UNKNOWN_STRENGTH;
4160                 }
4161
4162                 g_hash_table_remove(bss_mapping, path);
4163
4164                 g_hash_table_remove(interface->bss_mapping, path);
4165                 g_hash_table_remove(network->bss_table, path);
4166
4167                 update_network_signal(network);
4168
4169                 if (g_hash_table_size(network->bss_table) == 0)
4170                         g_hash_table_remove(interface->network_table,
4171                                             network->group);
4172
4173                 if (add_or_replace_bss_to_network(new_bss) < 0) {
4174                         /*
4175                          * Prevent a memory leak on failure in
4176                          * add_or_replace_bss_to_network
4177                          */
4178                         SUPPLICANT_DBG("Failed to add bss %s to network table",
4179                                        new_bss->path);
4180                         g_free(new_bss->path);
4181                         g_free(new_bss);
4182                 }
4183
4184                 return;
4185         }
4186
4187         old_wps_capabilities = network->wps_capabilities;
4188
4189         if (old_wps_capabilities != bss->wps_capabilities) {
4190                 network->wps_capabilities = bss->wps_capabilities;
4191                 callback_network_changed(network, "WPSCapabilities");
4192         }
4193
4194 #if defined TIZEN_EXT
4195         if ((bss->keymgmt & G_SUPPLICANT_KEYMGMT_WPS) != 0) {
4196                 network->wps = TRUE;
4197                 network->wps_capabilities |= bss->wps_capabilities;
4198         } else
4199                 network->wps = FALSE;
4200 #endif
4201
4202         /* Consider only property changes of the connected BSS */
4203         if (network == interface->current_network && bss != network->best_bss)
4204                 return;
4205
4206         if (bss->signal == network->signal)
4207 #ifndef TIZEN_EXT
4208                 return;
4209 #else
4210         {
4211                 callback_network_changed(network, "");
4212                 return;
4213         }
4214 #endif
4215
4216         /*
4217          * If the new signal is lower than the SSID signal, we need
4218          * to check for the new maximum.
4219          */
4220 #if defined TIZEN_EXT
4221         if (!update_best_bss(network, bss, network->best_bss)) {
4222                 if (bss != network->best_bss) {
4223                         callback_network_changed(network, "");
4224                         return;
4225                 }
4226
4227                 network->signal = bss->signal;
4228                 update_network_signal(network);
4229         }
4230 #else
4231         if (bss->signal < network->signal) {
4232                 if (bss != network->best_bss)
4233                         return;
4234
4235                 network->signal = bss->signal;
4236                 update_network_signal(network);
4237         } else {
4238                 network->signal = bss->signal;
4239                 network->best_bss = bss;
4240         }
4241 #endif
4242
4243         SUPPLICANT_DBG("New network signal for %s %d dBm", network->ssid,
4244                         network->signal);
4245
4246         callback_network_changed(network, "Signal");
4247 }
4248
4249 static void wps_credentials(const char *key, DBusMessageIter *iter,
4250                         void *user_data)
4251 {
4252         GSupplicantInterface *interface = user_data;
4253
4254         if (!key)
4255                 return;
4256
4257         SUPPLICANT_DBG("key %s", key);
4258
4259         if (g_strcmp0(key, "Key") == 0) {
4260                 DBusMessageIter array;
4261                 unsigned char *key_val;
4262                 int key_len;
4263
4264                 dbus_message_iter_recurse(iter, &array);
4265                 dbus_message_iter_get_fixed_array(&array, &key_val, &key_len);
4266
4267                 g_free(interface->wps_cred.key);
4268                 interface->wps_cred.key = g_try_malloc0(
4269                                                 sizeof(char) * key_len + 1);
4270
4271                 if (!interface->wps_cred.key)
4272                         return;
4273
4274                 memcpy(interface->wps_cred.key, key_val,
4275                                                 sizeof(char) * key_len);
4276
4277                 SUPPLICANT_DBG("WPS key present");
4278         } else if (g_strcmp0(key, "SSID") == 0) {
4279                 DBusMessageIter array;
4280                 unsigned char *ssid;
4281                 int ssid_len;
4282
4283                 dbus_message_iter_recurse(iter, &array);
4284                 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
4285
4286                 if (ssid_len > 0 && ssid_len < 33) {
4287                         memcpy(interface->wps_cred.ssid, ssid, ssid_len);
4288                         interface->wps_cred.ssid_len = ssid_len;
4289                 } else {
4290                         memset(interface->wps_cred.ssid, 0, 32);
4291                         interface->wps_cred.ssid_len = 0;
4292                 }
4293         }
4294 }
4295
4296 static void signal_wps_credentials(const char *path, DBusMessageIter *iter)
4297 {
4298         GSupplicantInterface *interface;
4299
4300         SUPPLICANT_DBG("");
4301
4302         interface = g_hash_table_lookup(interface_table, path);
4303         if (!interface)
4304                 return;
4305
4306         supplicant_dbus_property_foreach(iter, wps_credentials, interface);
4307 }
4308
4309 static void wps_event_args(const char *key, DBusMessageIter *iter,
4310                         void *user_data)
4311 {
4312         GSupplicantInterface *interface = user_data;
4313
4314         if (!key || !interface)
4315                 return;
4316
4317         SUPPLICANT_DBG("Arg Key %s", key);
4318 }
4319
4320 static void signal_wps_event(const char *path, DBusMessageIter *iter)
4321 {
4322         GSupplicantInterface *interface;
4323         const char *name = NULL;
4324
4325         SUPPLICANT_DBG("");
4326
4327         interface = g_hash_table_lookup(interface_table, path);
4328         if (!interface)
4329                 return;
4330
4331         dbus_message_iter_get_basic(iter, &name);
4332
4333         SUPPLICANT_DBG("Name: %s", name);
4334
4335         if (g_strcmp0(name, "success") == 0)
4336                 interface->wps_state = G_SUPPLICANT_WPS_STATE_SUCCESS;
4337         else if (g_strcmp0(name, "fail") == 0)
4338                 interface->wps_state = G_SUPPLICANT_WPS_STATE_FAIL;
4339         else
4340                 interface->wps_state = G_SUPPLICANT_WPS_STATE_UNKNOWN;
4341
4342         if (!dbus_message_iter_has_next(iter))
4343                 return;
4344
4345         dbus_message_iter_next(iter);
4346
4347         supplicant_dbus_property_foreach(iter, wps_event_args, interface);
4348 }
4349
4350 #if defined TIZEN_EXT
4351 static void signal_power_off(const char *path, DBusMessageIter *iter)
4352 {
4353         int poweroff_state = 0;
4354
4355         dbus_message_iter_get_basic(iter, &poweroff_state);
4356
4357         SUPPLICANT_DBG("poweroff_state(%d)", poweroff_state);
4358
4359         /* POWER_OFF_DIRECT 2 && POWER_OFF_RESTART 3 */
4360         if (poweroff_state != 2 && poweroff_state != 3)
4361                 return;
4362
4363         if (callbacks_pointer == NULL)
4364                 return;
4365
4366         if (callbacks_pointer->system_power_off == NULL)
4367                 return;
4368
4369         callbacks_pointer->system_power_off();
4370 }
4371 #endif
4372
4373 static void create_peer_identifier(GSupplicantPeer *peer)
4374 {
4375         const unsigned char test[ETH_ALEN] = {};
4376
4377         if (!peer)
4378                 return;
4379
4380         if (!memcmp(peer->device_address, test, ETH_ALEN)) {
4381                 peer->identifier = g_strdup(peer->name);
4382                 return;
4383         }
4384
4385         peer->identifier = g_malloc0(19);
4386         snprintf(peer->identifier, 19, "%02x%02x%02x%02x%02x%02x",
4387                                                 peer->device_address[0],
4388                                                 peer->device_address[1],
4389                                                 peer->device_address[2],
4390                                                 peer->device_address[3],
4391                                                 peer->device_address[4],
4392                                                 peer->device_address[5]);
4393 }
4394
4395 struct peer_property_data {
4396         GSupplicantPeer *peer;
4397         GSList *old_groups;
4398         bool groups_changed;
4399         bool services_changed;
4400 };
4401
4402 static void peer_groups_relation(DBusMessageIter *iter, void *user_data)
4403 {
4404         struct peer_property_data *data = user_data;
4405         GSupplicantPeer *peer = data->peer;
4406         GSupplicantGroup *group;
4407         const char *str = NULL;
4408         GSList *elem;
4409
4410         dbus_message_iter_get_basic(iter, &str);
4411         if (!str)
4412                 return;
4413
4414         group = g_hash_table_lookup(group_mapping, str);
4415         if (!group)
4416                 return;
4417
4418         elem = g_slist_find_custom(data->old_groups, str, (GCompareFunc)g_strcmp0);
4419         if (elem) {
4420                 data->old_groups = g_slist_remove_link(data->old_groups, elem);
4421                 peer->groups = g_slist_concat(elem, peer->groups);
4422         } else {
4423                 peer->groups = g_slist_prepend(peer->groups, g_strdup(str));
4424                 data->groups_changed = true;
4425         }
4426 }
4427
4428 static void peer_property(const char *key, DBusMessageIter *iter,
4429                                                         void *user_data)
4430 {
4431         GSupplicantPeer *pending_peer;
4432         struct peer_property_data *data = user_data;
4433         GSupplicantPeer *peer = data->peer;
4434
4435         SUPPLICANT_DBG("key: %s", key);
4436
4437         if (!peer->interface)
4438                 return;
4439
4440         if (!key) {
4441                 if (peer->name) {
4442                         create_peer_identifier(peer);
4443                         callback_peer_found(peer);
4444                         pending_peer = g_hash_table_lookup(
4445                                         pending_peer_connection, peer->path);
4446
4447                         if (pending_peer && pending_peer == peer) {
4448                                 callback_peer_request(peer);
4449                                 g_hash_table_remove(pending_peer_connection,
4450                                                 peer->path);
4451                         }
4452
4453                         dbus_free(data);
4454                 }
4455
4456                 return;
4457         }
4458
4459         if (g_strcmp0(key, "DeviceAddress") == 0) {
4460                 unsigned char *dev_addr;
4461                 DBusMessageIter array;
4462                 int len;
4463
4464                 dbus_message_iter_recurse(iter, &array);
4465                 dbus_message_iter_get_fixed_array(&array, &dev_addr, &len);
4466
4467                 if (len == ETH_ALEN)
4468                         memcpy(peer->device_address, dev_addr, len);
4469         } else if (g_strcmp0(key, "DeviceName") == 0) {
4470                 const char *str = NULL;
4471
4472                 dbus_message_iter_get_basic(iter, &str);
4473                 if (str)
4474                         peer->name = g_strdup(str);
4475         } else if (g_strcmp0(key, "config_method") == 0) {
4476                 uint16_t wps_config;
4477
4478                 dbus_message_iter_get_basic(iter, &wps_config);
4479
4480                 if (wps_config & G_SUPPLICANT_WPS_CONFIG_PBC)
4481                         peer->wps_capabilities |= G_SUPPLICANT_WPS_PBC;
4482                 if (wps_config & ~G_SUPPLICANT_WPS_CONFIG_PBC)
4483                         peer->wps_capabilities |= G_SUPPLICANT_WPS_PIN;
4484         } else if (g_strcmp0(key, "Groups") == 0) {
4485                 data->old_groups = peer->groups;
4486                 peer->groups = NULL;
4487
4488                 supplicant_dbus_array_foreach(iter,
4489                                                 peer_groups_relation, data);
4490                 if (g_slist_length(data->old_groups) > 0) {
4491                         g_slist_free_full(data->old_groups, g_free);
4492                         data->groups_changed = true;
4493                 }
4494         } else if (g_strcmp0(key, "IEs") == 0) {
4495                 DBusMessageIter array;
4496                 unsigned char *ie;
4497                 int ie_len;
4498
4499                 dbus_message_iter_recurse(iter, &array);
4500                 dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
4501
4502                 if (!ie || ie_len < 2)
4503                         return;
4504
4505                 if (peer->widi_ies) {
4506                         if (memcmp(peer->widi_ies, ie, ie_len) == 0)
4507                                 return;
4508
4509                         g_free(peer->widi_ies);
4510                         peer->widi_ies_length = 0;
4511                 }
4512
4513                 peer->widi_ies = g_malloc0(ie_len * sizeof(unsigned char));
4514
4515                 memcpy(peer->widi_ies, ie, ie_len);
4516                 peer->widi_ies_length = ie_len;
4517                 data->services_changed = true;
4518         }
4519 }
4520
4521 static void signal_peer_found(const char *path, DBusMessageIter *iter)
4522 {
4523         struct peer_property_data *property_data;
4524         GSupplicantInterface *interface;
4525         const char *obj_path = NULL;
4526         GSupplicantPeer *peer;
4527
4528         SUPPLICANT_DBG("");
4529
4530         interface = g_hash_table_lookup(interface_table, path);
4531         if (!interface)
4532                 return;
4533
4534         dbus_message_iter_get_basic(iter, &obj_path);
4535         if (!obj_path || g_strcmp0(obj_path, "/") == 0)
4536                 return;
4537
4538         peer = g_hash_table_lookup(interface->peer_table, obj_path);
4539         if (peer)
4540                 return;
4541
4542         peer = g_try_new0(GSupplicantPeer, 1);
4543         if (!peer)
4544                 return;
4545
4546         peer->interface = interface;
4547         peer->path = g_strdup(obj_path);
4548         g_hash_table_insert(interface->peer_table, peer->path, peer);
4549         g_hash_table_replace(peer_mapping, peer->path, interface);
4550
4551         property_data = dbus_malloc0(sizeof(struct peer_property_data));
4552         property_data->peer = peer;
4553
4554         dbus_message_iter_next(iter);
4555         if (dbus_message_iter_get_arg_type(iter) != DBUS_TYPE_INVALID) {
4556                 supplicant_dbus_property_foreach(iter, peer_property,
4557                                                         property_data);
4558                 peer_property(NULL, NULL, property_data);
4559                 return;
4560         }
4561
4562         supplicant_dbus_property_get_all(obj_path,
4563                                         SUPPLICANT_INTERFACE ".Peer",
4564                                         peer_property, property_data, NULL);
4565 }
4566
4567 static void signal_peer_lost(const char *path, DBusMessageIter *iter)
4568 {
4569         GSupplicantInterface *interface;
4570         const char *obj_path = NULL;
4571         GSupplicantPeer *peer;
4572
4573         SUPPLICANT_DBG("");
4574
4575         interface = g_hash_table_lookup(interface_table, path);
4576         if (!interface)
4577                 return;
4578
4579         dbus_message_iter_get_basic(iter, &obj_path);
4580         if (!obj_path || g_strcmp0(obj_path, "/") == 0)
4581                 return;
4582
4583         peer = g_hash_table_lookup(interface->peer_table, obj_path);
4584         if (!peer)
4585                 return;
4586
4587         g_hash_table_remove(interface->peer_table, obj_path);
4588 }
4589
4590 static void signal_peer_changed(const char *path, DBusMessageIter *iter)
4591 {
4592         struct peer_property_data *property_data;
4593         GSupplicantInterface *interface;
4594         GSupplicantPeer *peer;
4595
4596         SUPPLICANT_DBG("");
4597
4598         interface = g_hash_table_lookup(peer_mapping, path);
4599         if (!interface)
4600                 return;
4601
4602         peer = g_hash_table_lookup(interface->peer_table, path);
4603         if (!peer) {
4604                 g_hash_table_remove(peer_mapping, path);
4605                 return;
4606         }
4607
4608         property_data = dbus_malloc0(sizeof(struct peer_property_data));
4609         property_data->peer = peer;
4610
4611         supplicant_dbus_property_foreach(iter, peer_property, property_data);
4612         if (property_data->services_changed)
4613                 callback_peer_changed(peer,
4614                                         G_SUPPLICANT_PEER_SERVICES_CHANGED);
4615
4616         if (property_data->groups_changed)
4617                 callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_CHANGED);
4618
4619         dbus_free(property_data);
4620
4621         if (!g_supplicant_peer_is_in_a_group(peer))
4622                 peer->connection_requested = false;
4623 }
4624
4625 struct group_sig_data {
4626         const char *peer_obj_path;
4627         unsigned char iface_address[ETH_ALEN];
4628         const char *interface_obj_path;
4629         const char *group_obj_path;
4630         int role;
4631 };
4632
4633 static void group_sig_property(const char *key, DBusMessageIter *iter,
4634                                                         void *user_data)
4635 {
4636         struct group_sig_data *data = user_data;
4637
4638         if (!key)
4639                 return;
4640
4641         if (g_strcmp0(key, "peer_interface_addr") == 0) {
4642                 unsigned char *dev_addr;
4643                 DBusMessageIter array;
4644                 int len;
4645
4646                 dbus_message_iter_recurse(iter, &array);
4647                 dbus_message_iter_get_fixed_array(&array, &dev_addr, &len);
4648
4649                 if (len == ETH_ALEN)
4650                         memcpy(data->iface_address, dev_addr, len);
4651         } else if (g_strcmp0(key, "role") == 0) {
4652                 const char *str = NULL;
4653
4654                 dbus_message_iter_get_basic(iter, &str);
4655                 if (g_strcmp0(str, "GO") == 0)
4656                         data->role = G_SUPPLICANT_GROUP_ROLE_GO;
4657                 else
4658                         data->role = G_SUPPLICANT_GROUP_ROLE_CLIENT;
4659         } else if (g_strcmp0(key, "peer_object") == 0)
4660                 dbus_message_iter_get_basic(iter, &data->peer_obj_path);
4661         else if (g_strcmp0(key, "interface_object") == 0)
4662                 dbus_message_iter_get_basic(iter, &data->interface_obj_path);
4663         else if (g_strcmp0(key, "group_object") == 0)
4664                 dbus_message_iter_get_basic(iter, &data->group_obj_path);
4665
4666 }
4667
4668 static void signal_group_success(const char *path, DBusMessageIter *iter)
4669 {
4670         GSupplicantInterface *interface;
4671         struct group_sig_data data = {};
4672         GSupplicantPeer *peer;
4673
4674         SUPPLICANT_DBG("");
4675
4676         interface = g_hash_table_lookup(interface_table, path);
4677         if (!interface)
4678                 return;
4679
4680         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
4681         if (!data.peer_obj_path)
4682                 return;
4683
4684         peer = g_hash_table_lookup(interface->peer_table, data.peer_obj_path);
4685         if (!peer)
4686                 return;
4687
4688         memcpy(peer->iface_address, data.iface_address, ETH_ALEN);
4689         interface->pending_peer_path = peer->path;
4690 }
4691
4692 static void signal_group_failure(const char *path, DBusMessageIter *iter)
4693 {
4694         GSupplicantInterface *interface;
4695         struct group_sig_data data = {};
4696         GSupplicantPeer *peer;
4697
4698         SUPPLICANT_DBG("");
4699
4700         interface = g_hash_table_lookup(interface_table, path);
4701         if (!interface)
4702                 return;
4703
4704         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
4705         if (!data.peer_obj_path)
4706                 return;
4707
4708         peer = g_hash_table_lookup(interface->peer_table, data.peer_obj_path);
4709         if (!peer)
4710                 return;
4711
4712         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_FAILED);
4713         peer->connection_requested = false;
4714 }
4715
4716 static void signal_group_started(const char *path, DBusMessageIter *iter)
4717 {
4718         GSupplicantInterface *interface, *g_interface;
4719         struct group_sig_data data = {};
4720         GSupplicantGroup *group;
4721         GSupplicantPeer *peer;
4722
4723         SUPPLICANT_DBG("");
4724
4725         interface = g_hash_table_lookup(interface_table, path);
4726         if (!interface)
4727                 return;
4728
4729         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
4730         if (!data.interface_obj_path || !data.group_obj_path)
4731                 return;
4732
4733         peer = g_hash_table_lookup(interface->peer_table,
4734                                                 interface->pending_peer_path);
4735         interface->pending_peer_path = NULL;
4736         if (!peer)
4737                 return;
4738
4739         g_interface = g_hash_table_lookup(interface_table,
4740                                                 data.interface_obj_path);
4741         if (!g_interface)
4742                 return;
4743
4744         group = g_hash_table_lookup(interface->group_table,
4745                                                 data.group_obj_path);
4746         if (group)
4747                 return;
4748
4749         group = g_try_new0(GSupplicantGroup, 1);
4750         if (!group)
4751                 return;
4752
4753         group->interface = g_interface;
4754         group->orig_interface = interface;
4755         group->path = g_strdup(data.group_obj_path);
4756         group->role = data.role;
4757
4758         g_hash_table_insert(interface->group_table, group->path, group);
4759         g_hash_table_replace(group_mapping, group->path, group);
4760
4761         peer->current_group_iface = g_interface;
4762         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_STARTED);
4763 }
4764
4765 static void remove_peer_group_interface(GHashTable *group_table,
4766                                 const char* path)
4767 {
4768         GSupplicantGroup *group;
4769         GHashTableIter iter;
4770         gpointer value, key;
4771
4772         if (!group_table)
4773                 return;
4774
4775         group = g_hash_table_lookup(group_table, path);
4776
4777         if (!group || !group->orig_interface)
4778                 return;
4779
4780         g_hash_table_iter_init(&iter, group->orig_interface->peer_table);
4781
4782         while (g_hash_table_iter_next(&iter, &key, &value)) {
4783                 GSupplicantPeer *peer = value;
4784
4785                 if (peer->current_group_iface == group->interface)
4786                         peer->current_group_iface = NULL;
4787         }
4788 }
4789
4790 static void signal_group_finished(const char *path, DBusMessageIter *iter)
4791 {
4792         GSupplicantInterface *interface;
4793         struct group_sig_data data = {};
4794
4795         SUPPLICANT_DBG("");
4796
4797         interface = g_hash_table_lookup(interface_table, path);
4798         if (!interface)
4799                 return;
4800
4801         supplicant_dbus_property_foreach(iter, group_sig_property, &data);
4802         if (!data.interface_obj_path || !data.group_obj_path)
4803                 return;
4804
4805         remove_peer_group_interface(interface->group_table, data.group_obj_path);
4806
4807         g_hash_table_remove(group_mapping, data.group_obj_path);
4808
4809         g_hash_table_remove(interface->group_table, data.group_obj_path);
4810 }
4811
4812 static void signal_group_request(const char *path, DBusMessageIter *iter)
4813 {
4814         GSupplicantInterface *interface;
4815         GSupplicantPeer *peer;
4816         const char *obj_path;
4817
4818         SUPPLICANT_DBG("");
4819
4820         interface = g_hash_table_lookup(interface_table, path);
4821         if (!interface)
4822                 return;
4823
4824         dbus_message_iter_get_basic(iter, &obj_path);
4825         if (!obj_path || !g_strcmp0(obj_path, "/"))
4826                 return;
4827
4828         peer = g_hash_table_lookup(interface->peer_table, obj_path);
4829         if (!peer)
4830                 return;
4831
4832         /*
4833          * Peer has been previously found and property set,
4834          * otherwise, defer connection to when peer property
4835          * is set.
4836          */
4837         if (peer->identifier)
4838                 callback_peer_request(peer);
4839         else
4840                 g_hash_table_replace(pending_peer_connection, peer->path, peer);
4841 }
4842
4843 static void signal_group_peer_joined(const char *path, DBusMessageIter *iter)
4844 {
4845         const char *peer_path = NULL;
4846         GSupplicantInterface *interface;
4847         GSupplicantGroup *group;
4848         GSupplicantPeer *peer;
4849
4850         SUPPLICANT_DBG("");
4851
4852         group = g_hash_table_lookup(group_mapping, path);
4853         if (!group)
4854                 return;
4855
4856         dbus_message_iter_get_basic(iter, &peer_path);
4857         if (!peer_path)
4858                 return;
4859
4860         interface = g_hash_table_lookup(peer_mapping, peer_path);
4861         if (!interface)
4862                 return;
4863
4864         peer = g_hash_table_lookup(interface->peer_table, peer_path);
4865         if (!peer)
4866                 return;
4867
4868         group->members = g_slist_prepend(group->members, g_strdup(peer_path));
4869
4870         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_JOINED);
4871 }
4872
4873 static void signal_group_peer_disconnected(const char *path, DBusMessageIter *iter)
4874 {
4875         const char *peer_path = NULL;
4876         GSupplicantInterface *interface;
4877         GSupplicantGroup *group;
4878         GSupplicantPeer *peer;
4879         GSList *elem;
4880
4881         SUPPLICANT_DBG("");
4882
4883         group = g_hash_table_lookup(group_mapping, path);
4884         if (!group)
4885                 return;
4886
4887         dbus_message_iter_get_basic(iter, &peer_path);
4888         if (!peer_path)
4889                 return;
4890
4891         for (elem = group->members; elem; elem = elem->next) {
4892                 if (!g_strcmp0(elem->data, peer_path))
4893                         break;
4894         }
4895
4896         if (!elem)
4897                 return;
4898
4899         g_free(elem->data);
4900         group->members = g_slist_delete_link(group->members, elem);
4901
4902         interface = g_hash_table_lookup(peer_mapping, peer_path);
4903         if (!interface)
4904                 return;
4905
4906         peer = g_hash_table_lookup(interface->peer_table, peer_path);
4907         if (!peer)
4908                 return;
4909
4910         callback_peer_changed(peer, G_SUPPLICANT_PEER_GROUP_DISCONNECTED);
4911         peer->connection_requested = false;
4912 }
4913
4914 #if defined TIZEN_EXT_WIFI_MESH
4915 const void *g_supplicant_interface_get_mesh_group_ssid(
4916                                                         GSupplicantInterface *interface,
4917                                                         unsigned int *ssid_len)
4918 {
4919         if (!ssid_len)
4920                 return NULL;
4921
4922         if (!interface || interface->group_info.ssid_len == 0) {
4923                 *ssid_len = 0;
4924                 return NULL;
4925         }
4926
4927         *ssid_len = interface->group_info.ssid_len;
4928         return interface->group_info.ssid;
4929 }
4930
4931 int g_supplicant_mesh_get_disconnect_reason(GSupplicantInterface *interface)
4932 {
4933         if (!interface)
4934                 return -EINVAL;
4935
4936         return interface->group_info.disconnect_reason;
4937 }
4938
4939 const char *g_supplicant_mesh_peer_get_address(GSupplicantMeshPeer *mesh_peer)
4940 {
4941         if (!mesh_peer || !mesh_peer->peer_address)
4942                 return NULL;
4943
4944         return mesh_peer->peer_address;
4945 }
4946
4947 int g_supplicant_mesh_peer_get_disconnect_reason(GSupplicantMeshPeer *mesh_peer)
4948 {
4949         if (!mesh_peer)
4950                 return -EINVAL;
4951
4952         return mesh_peer->disconnect_reason;
4953 }
4954
4955 static void callback_mesh_group_started(GSupplicantInterface *interface)
4956 {
4957         if (!callbacks_pointer)
4958                 return;
4959
4960         if (!callbacks_pointer->mesh_group_started)
4961                 return;
4962
4963         callbacks_pointer->mesh_group_started(interface);
4964 }
4965
4966 static void callback_mesh_group_removed(GSupplicantInterface *interface)
4967 {
4968         if (!callbacks_pointer)
4969                 return;
4970
4971         if (!callbacks_pointer->mesh_group_removed)
4972                 return;
4973
4974         callbacks_pointer->mesh_group_removed(interface);
4975 }
4976
4977 static void mesh_group_info(const char *key, DBusMessageIter *iter,
4978                                                         void *user_data)
4979 {
4980         GSupplicantInterface *interface = user_data;
4981         if (!key)
4982                 return;
4983
4984         if (g_strcmp0(key, "SSID") == 0) {
4985                 DBusMessageIter array;
4986                 unsigned char *ssid;
4987                 int ssid_len;
4988
4989                 dbus_message_iter_recurse(iter, &array);
4990                 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
4991
4992                 if (ssid_len > 0 && ssid_len < 33) {
4993                         memcpy(interface->group_info.ssid, ssid, ssid_len);
4994                         interface->group_info.ssid_len = ssid_len;
4995                 } else {
4996                         memset(interface->group_info.ssid, 0, 32);
4997                         interface->group_info.ssid_len = 0;
4998                 }
4999         } else if (g_strcmp0(key, "DisconnectReason") == 0) {
5000                 int disconnect_reason = 0;
5001                 dbus_message_iter_get_basic(iter, &disconnect_reason);
5002                 interface->group_info.disconnect_reason = disconnect_reason;
5003         }
5004 }
5005
5006 static void signal_mesh_group_started(const char *path, DBusMessageIter *iter)
5007 {
5008         GSupplicantInterface *interface;
5009
5010         interface = g_hash_table_lookup(interface_table, path);
5011         if (!interface)
5012                 return;
5013
5014         supplicant_dbus_property_foreach(iter, mesh_group_info, interface);
5015
5016         callback_mesh_group_started(interface);
5017 }
5018
5019 static void signal_mesh_group_removed(const char *path, DBusMessageIter *iter)
5020 {
5021         GSupplicantInterface *interface;
5022
5023         interface = g_hash_table_lookup(interface_table, path);
5024         if (!interface)
5025                 return;
5026
5027         supplicant_dbus_property_foreach(iter, mesh_group_info, interface);
5028
5029         callback_mesh_group_removed(interface);
5030 }
5031
5032 static void callback_mesh_peer_connected(GSupplicantMeshPeer *mesh_peer)
5033 {
5034         if (!callbacks_pointer)
5035                 return;
5036
5037         if (!callbacks_pointer->mesh_peer_connected)
5038                 return;
5039
5040         callbacks_pointer->mesh_peer_connected(mesh_peer);
5041 }
5042
5043 static void callback_mesh_peer_disconnected(GSupplicantMeshPeer *mesh_peer)
5044 {
5045         if (!callbacks_pointer)
5046                 return;
5047
5048         if (!callbacks_pointer->mesh_peer_disconnected)
5049                 return;
5050
5051         callbacks_pointer->mesh_peer_disconnected(mesh_peer);
5052 }
5053
5054 static void mesh_peer_info(const char *key, DBusMessageIter *iter,
5055                                                         void *user_data)
5056 {
5057         GSupplicantMeshPeer *mesh_peer = user_data;
5058         if (!key)
5059                 return;
5060
5061         if (g_strcmp0(key, "PeerAddress") == 0) {
5062                 DBusMessageIter array;
5063                 unsigned char *addr;
5064                 int addr_len;
5065
5066                 dbus_message_iter_recurse(iter, &array);
5067                 dbus_message_iter_get_fixed_array(&array, &addr, &addr_len);
5068
5069                 if (addr_len == 6) {
5070                         mesh_peer->peer_address = g_malloc0(19);
5071                         snprintf(mesh_peer->peer_address, 19,
5072                                          "%02x:%02x:%02x:%02x:%02x:%02x", addr[0], addr[1],
5073                                          addr[2], addr[3], addr[4], addr[5]);
5074                 }
5075         } else if (g_strcmp0(key, "DisconnectReason") == 0) {
5076                 int disconnect_reason = 0;
5077                 dbus_message_iter_get_basic(iter, &disconnect_reason);
5078                 mesh_peer->disconnect_reason = disconnect_reason;
5079         }
5080 }
5081
5082 static void signal_mesh_peer_connected(const char *path, DBusMessageIter *iter)
5083 {
5084         GSupplicantInterface *interface;
5085         GSupplicantMeshPeer *mesh_peer;
5086
5087         interface = g_hash_table_lookup(interface_table, path);
5088         if (!interface)
5089                 return;
5090
5091         mesh_peer = dbus_malloc0(sizeof(GSupplicantMeshPeer));
5092         mesh_peer->interface = interface;
5093
5094         supplicant_dbus_property_foreach(iter, mesh_peer_info, mesh_peer);
5095
5096         callback_mesh_peer_connected(mesh_peer);
5097         g_free(mesh_peer->peer_address);
5098         g_free(mesh_peer);
5099 }
5100
5101 static void signal_mesh_peer_disconnected(const char *path,
5102                                                                 DBusMessageIter *iter)
5103 {
5104         GSupplicantInterface *interface;
5105         GSupplicantMeshPeer *mesh_peer;
5106
5107         interface = g_hash_table_lookup(interface_table, path);
5108         if (!interface)
5109                 return;
5110
5111         mesh_peer = dbus_malloc0(sizeof(GSupplicantMeshPeer));
5112         mesh_peer->interface = interface;
5113
5114         supplicant_dbus_property_foreach(iter, mesh_peer_info, mesh_peer);
5115
5116         callback_mesh_peer_disconnected(mesh_peer);
5117         g_free(mesh_peer->peer_address);
5118         g_free(mesh_peer);
5119 }
5120 #endif
5121
5122 static struct {
5123         const char *interface;
5124         const char *member;
5125         void (*function) (const char *path, DBusMessageIter *iter);
5126 } signal_map[] = {
5127         { DBUS_INTERFACE_DBUS,  "NameOwnerChanged",  signal_name_owner_changed },
5128
5129         { SUPPLICANT_INTERFACE, "PropertiesChanged", signal_properties_changed },
5130         { SUPPLICANT_INTERFACE, "InterfaceAdded",    signal_interface_added    },
5131         { SUPPLICANT_INTERFACE, "InterfaceCreated",  signal_interface_added    },
5132         { SUPPLICANT_INTERFACE, "InterfaceRemoved",  signal_interface_removed  },
5133
5134         { SUPPLICANT_INTERFACE ".Interface", "PropertiesChanged", signal_interface_changed },
5135         { SUPPLICANT_INTERFACE ".Interface", "ScanDone",          signal_scan_done         },
5136         { SUPPLICANT_INTERFACE ".Interface", "BSSAdded",          signal_bss_added         },
5137         { SUPPLICANT_INTERFACE ".Interface", "BSSRemoved",        signal_bss_removed       },
5138         { SUPPLICANT_INTERFACE ".Interface", "NetworkAdded",      signal_network_added     },
5139         { SUPPLICANT_INTERFACE ".Interface", "NetworkRemoved",    signal_network_removed   },
5140         { SUPPLICANT_INTERFACE ".Interface", "StaAuthorized",     signal_sta_authorized    },
5141         { SUPPLICANT_INTERFACE ".Interface", "StaDeauthorized",   signal_sta_deauthorized  },
5142
5143         { SUPPLICANT_INTERFACE ".BSS", "PropertiesChanged", signal_bss_changed   },
5144
5145         { SUPPLICANT_INTERFACE ".Interface.WPS", "Credentials", signal_wps_credentials },
5146         { SUPPLICANT_INTERFACE ".Interface.WPS", "Event",       signal_wps_event       },
5147 #if defined TIZEN_EXT
5148         { "org.tizen.system.deviced.PowerOff", "ChangeState", signal_power_off },
5149 #endif
5150
5151         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeviceFound", signal_peer_found },
5152         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeviceLost",  signal_peer_lost  },
5153
5154         { SUPPLICANT_INTERFACE ".Peer", "PropertiesChanged", signal_peer_changed },
5155
5156         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationSuccess", signal_group_success },
5157         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationFailure", signal_group_failure },
5158         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GroupStarted", signal_group_started },
5159         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GroupFinished", signal_group_finished },
5160         { SUPPLICANT_INTERFACE ".Interface.P2PDevice", "GONegotiationRequest", signal_group_request },
5161
5162         { SUPPLICANT_INTERFACE ".Group", "PeerJoined", signal_group_peer_joined },
5163         { SUPPLICANT_INTERFACE ".Group", "PeerDisconnected", signal_group_peer_disconnected },
5164 #if defined TIZEN_EXT_WIFI_MESH
5165         { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshGroupStarted",
5166                 signal_mesh_group_started },
5167         { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshGroupRemoved",
5168                 signal_mesh_group_removed },
5169         { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshPeerConnected",
5170                 signal_mesh_peer_connected },
5171         { SUPPLICANT_INTERFACE ".Interface.Mesh", "MeshPeerDisconnected",
5172                 signal_mesh_peer_disconnected },
5173 #endif
5174
5175 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
5176         { SUPPLICANT_INTERFACE ".Interface", "EAP", signal_eap },
5177 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
5178
5179         { }
5180 };
5181
5182 static DBusHandlerResult g_supplicant_filter(DBusConnection *conn,
5183                                         DBusMessage *message, void *data)
5184 {
5185         DBusMessageIter iter;
5186         const char *path;
5187         int i;
5188
5189         path = dbus_message_get_path(message);
5190         if (!path)
5191                 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
5192
5193         if (!dbus_message_iter_init(message, &iter))
5194                 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
5195
5196         for (i = 0; signal_map[i].interface; i++) {
5197                 if (!dbus_message_has_interface(message, signal_map[i].interface))
5198                         continue;
5199
5200                 if (!dbus_message_has_member(message, signal_map[i].member))
5201                         continue;
5202
5203                 signal_map[i].function(path, &iter);
5204                 break;
5205         }
5206
5207         return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
5208 }
5209
5210 void g_supplicant_interface_cancel(GSupplicantInterface *interface)
5211 {
5212         SUPPLICANT_DBG("Cancelling any pending DBus calls");
5213         supplicant_dbus_method_call_cancel_all(interface);
5214         supplicant_dbus_property_call_cancel_all(interface);
5215 }
5216
5217 struct supplicant_regdom {
5218         GSupplicantCountryCallback callback;
5219         const char *alpha2;
5220         const void *user_data;
5221 };
5222
5223 static void country_result(const char *error,
5224                                 DBusMessageIter *iter, void *user_data)
5225 {
5226         struct supplicant_regdom *regdom = user_data;
5227         int result = 0;
5228
5229         SUPPLICANT_DBG("Country setting result");
5230
5231         if (!user_data)
5232                 return;
5233
5234         if (error) {
5235                 SUPPLICANT_DBG("Country setting failure %s", error);
5236                 result = -EINVAL;
5237         }
5238
5239         if (regdom->callback)
5240                 regdom->callback(result, regdom->alpha2,
5241                                         (void *) regdom->user_data);
5242
5243         g_free(regdom);
5244 }
5245
5246 static void country_params(DBusMessageIter *iter, void *user_data)
5247 {
5248         struct supplicant_regdom *regdom = user_data;
5249
5250         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING,
5251                                                         &regdom->alpha2);
5252 }
5253
5254 int g_supplicant_set_country(const char *alpha2,
5255                                 GSupplicantCountryCallback callback,
5256                                         const void *user_data)
5257 {
5258         struct supplicant_regdom *regdom;
5259         int ret;
5260
5261         SUPPLICANT_DBG("Country setting %s", alpha2);
5262
5263         if (!system_available)
5264                 return -EFAULT;
5265
5266         regdom = dbus_malloc0(sizeof(*regdom));
5267         if (!regdom)
5268                 return -ENOMEM;
5269
5270         regdom->callback = callback;
5271         regdom->alpha2 = alpha2;
5272         regdom->user_data = user_data;
5273
5274         ret =  supplicant_dbus_property_set(SUPPLICANT_PATH, SUPPLICANT_INTERFACE,
5275                                         "Country", DBUS_TYPE_STRING_AS_STRING,
5276                                         country_params, country_result,
5277                                         regdom, NULL);
5278         if (ret < 0) {
5279                 dbus_free(regdom);
5280                 SUPPLICANT_DBG("Unable to set Country configuration");
5281         }
5282         return ret;
5283 }
5284
5285 int g_supplicant_interface_set_country(GSupplicantInterface *interface,
5286                                         GSupplicantCountryCallback callback,
5287                                                         const char *alpha2,
5288                                                         void *user_data)
5289 {
5290         struct supplicant_regdom *regdom;
5291         int ret;
5292
5293         regdom = dbus_malloc0(sizeof(*regdom));
5294         if (!regdom)
5295                 return -ENOMEM;
5296
5297         regdom->callback = callback;
5298         regdom->alpha2 = alpha2;
5299         regdom->user_data = user_data;
5300
5301         ret =  supplicant_dbus_property_set(interface->path,
5302                                 SUPPLICANT_INTERFACE ".Interface",
5303                                 "Country", DBUS_TYPE_STRING_AS_STRING,
5304                                 country_params, country_result,
5305                                         regdom, NULL);
5306         if (ret < 0) {
5307                 dbus_free(regdom);
5308                 SUPPLICANT_DBG("Unable to set Country configuration");
5309         }
5310
5311         return ret;
5312 }
5313
5314 bool g_supplicant_interface_has_p2p(GSupplicantInterface *interface)
5315 {
5316         if (!interface)
5317                 return false;
5318
5319         return interface->p2p_support;
5320 }
5321
5322 struct supplicant_p2p_dev_config {
5323         char *device_name;
5324         char *dev_type;
5325 };
5326
5327 static void p2p_device_config_result(const char *error,
5328                                         DBusMessageIter *iter, void *user_data)
5329 {
5330         struct supplicant_p2p_dev_config *config = user_data;
5331
5332         if (error)
5333                 SUPPLICANT_DBG("Unable to set P2P Device configuration: %s",
5334                                                                         error);
5335
5336         g_free(config->device_name);
5337         g_free(config->dev_type);
5338         dbus_free(config);
5339 }
5340
5341 static int dev_type_str2bin(const char *type, unsigned char dev_type[8])
5342 {
5343         int length, pos, end;
5344         char b[3] = {};
5345         char *e = NULL;
5346
5347         end = strlen(type);
5348         for (length = pos = 0; type[pos] != '\0' && length < 8; length++) {
5349                 if (pos+2 > end)
5350                         return 0;
5351
5352                 b[0] = type[pos];
5353                 b[1] = type[pos+1];
5354
5355                 dev_type[length] = strtol(b, &e, 16);
5356                 if (e && *e != '\0')
5357                         return 0;
5358
5359                 pos += 2;
5360         }
5361
5362         return 8;
5363 }
5364
5365 static void p2p_device_config_params(DBusMessageIter *iter, void *user_data)
5366 {
5367         struct supplicant_p2p_dev_config *config = user_data;
5368         DBusMessageIter dict;
5369
5370         supplicant_dbus_dict_open(iter, &dict);
5371
5372         supplicant_dbus_dict_append_basic(&dict, "DeviceName",
5373                                 DBUS_TYPE_STRING, &config->device_name);
5374
5375         if (config->dev_type) {
5376                 unsigned char dev_type[8] = {}, *type;
5377                 int len;
5378
5379                 len = dev_type_str2bin(config->dev_type, dev_type);
5380                 if (len) {
5381                         type = dev_type;
5382                         supplicant_dbus_dict_append_fixed_array(&dict,
5383                                         "PrimaryDeviceType",
5384                                         DBUS_TYPE_BYTE, &type, len);
5385                 }
5386         }
5387
5388         supplicant_dbus_dict_close(iter, &dict);
5389 }
5390
5391 int g_supplicant_interface_set_p2p_device_config(GSupplicantInterface *interface,
5392                                         const char *device_name,
5393                                         const char *primary_dev_type)
5394 {
5395         struct supplicant_p2p_dev_config *config;
5396         int ret;
5397
5398         SUPPLICANT_DBG("P2P Device settings %s/%s",
5399                                         device_name, primary_dev_type);
5400
5401         config = dbus_malloc0(sizeof(*config));
5402         if (!config)
5403                 return -ENOMEM;
5404
5405         config->device_name = g_strdup(device_name);
5406         config->dev_type = g_strdup(primary_dev_type);
5407
5408         ret = supplicant_dbus_property_set(interface->path,
5409                                 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
5410                                 "P2PDeviceConfig",
5411                                 DBUS_TYPE_ARRAY_AS_STRING
5412                                 DBUS_DICT_ENTRY_BEGIN_CHAR_AS_STRING
5413                                 DBUS_TYPE_STRING_AS_STRING
5414                                 DBUS_TYPE_VARIANT_AS_STRING
5415                                 DBUS_DICT_ENTRY_END_CHAR_AS_STRING,
5416                                 p2p_device_config_params,
5417                                 p2p_device_config_result, config, NULL);
5418         if (ret < 0) {
5419                 g_free(config->device_name);
5420                 g_free(config->dev_type);
5421                 dbus_free(config);
5422                 SUPPLICANT_DBG("Unable to set P2P Device configuration");
5423         }
5424
5425         return ret;
5426 }
5427
5428 static gboolean peer_lookup_by_identifier(gpointer key, gpointer value,
5429                                                         gpointer user_data)
5430 {
5431         const GSupplicantPeer *peer = value;
5432         const char *identifier = user_data;
5433
5434         if (!g_strcmp0(identifier, peer->identifier))
5435                 return TRUE;
5436
5437         return FALSE;
5438 }
5439
5440 GSupplicantPeer *g_supplicant_interface_peer_lookup(GSupplicantInterface *interface,
5441                                                         const char *identifier)
5442 {
5443         GSupplicantPeer *peer;
5444
5445         peer = g_hash_table_find(interface->peer_table,
5446                                         peer_lookup_by_identifier,
5447                                         (void *) identifier);
5448         return peer;
5449 }
5450
5451 static void interface_create_data_free(struct interface_create_data *data)
5452 {
5453         g_free(data->ifname);
5454         g_free(data->driver);
5455         g_free(data->bridge);
5456 #if defined TIZEN_EXT_WIFI_MESH
5457         g_free(data->parent_ifname);
5458 #endif
5459         dbus_free(data);
5460 }
5461
5462 static bool interface_exists(GSupplicantInterface *interface,
5463                                 const char *path)
5464 {
5465         GSupplicantInterface *tmp;
5466
5467         tmp = g_hash_table_lookup(interface_table, path);
5468         if (tmp && tmp == interface)
5469                 return true;
5470
5471         return false;
5472 }
5473
5474 static void interface_create_property(const char *key, DBusMessageIter *iter,
5475                                                         void *user_data)
5476 {
5477         struct interface_create_data *data = user_data;
5478         GSupplicantInterface *interface = data->interface;
5479
5480         if (!key) {
5481                 if (data->callback) {
5482                         data->callback(0, data->interface, data->user_data);
5483 #if !defined TIZEN_EXT
5484                         callback_p2p_support(interface);
5485 #endif
5486 #if defined TIZEN_EXT_WIFI_MESH
5487                         callback_mesh_support(interface);
5488 #endif
5489                 }
5490
5491                 interface_create_data_free(data);
5492         }
5493
5494         interface_property(key, iter, interface);
5495 }
5496
5497 static void interface_create_result(const char *error,
5498                                 DBusMessageIter *iter, void *user_data)
5499 {
5500         struct interface_create_data *data = user_data;
5501         const char *path = NULL;
5502         int err;
5503 #if defined TIZEN_EXT
5504         int ret;
5505 #endif
5506
5507         SUPPLICANT_DBG("");
5508
5509         if (error) {
5510                 g_message("error %s", error);
5511 #if defined TIZEN_EXT
5512                 SUPPLICANT_DBG("error %s", error);
5513                 if (strcmp(error, "fi.w1.wpa_supplicant1.InterfaceExists") == 0) {
5514                         SUPPLICANT_DBG("Send method: GetInterface");
5515                         ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
5516                                         SUPPLICANT_INTERFACE,
5517                                         "GetInterface",
5518                                         interface_get_params,
5519                                         interface_get_result, user_data,
5520                                         NULL);
5521                         if (ret < 0)
5522                                 interface_create_data_free(data);
5523                         return;
5524                 }
5525 #endif
5526                 err = -EIO;
5527                 goto done;
5528         }
5529
5530         dbus_message_iter_get_basic(iter, &path);
5531         if (!path) {
5532                 err = -EINVAL;
5533                 goto done;
5534         }
5535
5536         if (!system_available) {
5537                 err = -EFAULT;
5538                 goto done;
5539         }
5540
5541         data->interface = g_hash_table_lookup(interface_table, path);
5542         if (!data->interface) {
5543                 data->interface = interface_alloc(path);
5544                 if (!data->interface) {
5545                         err = -ENOMEM;
5546                         goto done;
5547                 }
5548         }
5549
5550         err = supplicant_dbus_property_get_all(path,
5551                                         SUPPLICANT_INTERFACE ".Interface",
5552                                         interface_create_property, data,
5553                                         NULL);
5554         if (err == 0)
5555                 return;
5556
5557 done:
5558         if (data->callback)
5559                 data->callback(err, NULL, data->user_data);
5560
5561         interface_create_data_free(data);
5562 }
5563
5564 static void interface_create_params(DBusMessageIter *iter, void *user_data)
5565 {
5566         struct interface_create_data *data = user_data;
5567         DBusMessageIter dict;
5568         char *config_file = NULL;
5569
5570         SUPPLICANT_DBG("");
5571
5572         supplicant_dbus_dict_open(iter, &dict);
5573
5574         supplicant_dbus_dict_append_basic(&dict, "Ifname",
5575                                         DBUS_TYPE_STRING, &data->ifname);
5576
5577         if (data->driver)
5578                 supplicant_dbus_dict_append_basic(&dict, "Driver",
5579                                         DBUS_TYPE_STRING, &data->driver);
5580
5581         if (data->bridge)
5582                 supplicant_dbus_dict_append_basic(&dict, "BridgeIfname",
5583                                         DBUS_TYPE_STRING, &data->bridge);
5584
5585         config_file = g_hash_table_lookup(config_file_table, data->ifname);
5586         if (config_file) {
5587                 SUPPLICANT_DBG("[%s] ConfigFile %s", data->ifname, config_file);
5588
5589                 supplicant_dbus_dict_append_basic(&dict, "ConfigFile",
5590                                         DBUS_TYPE_STRING, &config_file);
5591         }
5592
5593 #if defined TIZEN_EXT_WIFI_MESH
5594         if (data->is_mesh_interface) {
5595                 if (data->parent_ifname)
5596                         supplicant_dbus_dict_append_basic(&dict, "ParentIfname",
5597                                         DBUS_TYPE_STRING, &data->parent_ifname);
5598
5599                 supplicant_dbus_dict_append_basic(&dict, "IsMeshInterface",
5600                                         DBUS_TYPE_BOOLEAN, &data->is_mesh_interface);
5601         }
5602 #endif
5603
5604         supplicant_dbus_dict_close(iter, &dict);
5605 }
5606
5607 #if defined TIZEN_EXT
5608 static void interface_get_state(const char *key, DBusMessageIter *iter,
5609                 void *user_data)
5610 {
5611         struct interface_create_data *data = user_data;
5612         GSupplicantInterface *interface = NULL;
5613         const char *str = NULL;
5614
5615         SUPPLICANT_DBG("key[%s]", key);
5616
5617         if (!data) {
5618                 SUPPLICANT_DBG("data is NULL");
5619                 return;
5620         }
5621
5622         interface = data->interface;
5623         if (!interface) {
5624                 SUPPLICANT_DBG("interface is NULL");
5625                 return;
5626         }
5627
5628         if (iter)
5629                 dbus_message_iter_get_basic(iter, &str);
5630
5631         if (str) {
5632                 if (string2state(str) != interface->state)
5633                         interface->state = string2state(str);
5634         }
5635
5636         if (interface->state == G_SUPPLICANT_STATE_DISABLED)
5637                 interface->ready = FALSE;
5638         else
5639                 interface->ready = TRUE;
5640
5641         SUPPLICANT_DBG("state %s (%d)", str, interface->state);
5642
5643         if (data->callback) {
5644                 data->callback(0, interface, data->user_data);
5645 #if defined TIZEN_EXT_WIFI_MESH
5646                 callback_mesh_support(interface);
5647 #endif
5648         }
5649
5650         interface_create_data_free(data);
5651 }
5652 #endif
5653
5654 static void interface_get_result(const char *error,
5655                                 DBusMessageIter *iter, void *user_data)
5656 {
5657         struct interface_create_data *data = user_data;
5658         GSupplicantInterface *interface;
5659         const char *path = NULL;
5660         int err;
5661
5662         SUPPLICANT_DBG("");
5663
5664         if (error) {
5665                 SUPPLICANT_DBG("Interface not created yet");
5666                 goto create;
5667         }
5668
5669         dbus_message_iter_get_basic(iter, &path);
5670         if (!path) {
5671                 err = -EINVAL;
5672                 goto done;
5673         }
5674
5675         interface = g_hash_table_lookup(interface_table, path);
5676         if (!interface) {
5677                 err = -ENOENT;
5678                 goto done;
5679         }
5680
5681 #if defined TIZEN_EXT
5682         data->interface = interface;
5683         err = supplicant_dbus_property_get(path,
5684                         SUPPLICANT_INTERFACE ".Interface",
5685                         "State", interface_get_state, data, NULL);
5686
5687         if (err == 0)
5688                 return;
5689 #endif
5690
5691         if (data->callback) {
5692                 data->callback(0, interface, data->user_data);
5693 #if !defined TIZEN_EXT
5694                 callback_p2p_support(interface);
5695 #endif
5696 #if defined TIZEN_EXT_WIFI_MESH
5697                 callback_mesh_support(interface);
5698 #endif
5699         }
5700
5701         interface_create_data_free(data);
5702
5703         return;
5704
5705 create:
5706         if (!system_available) {
5707                 err = -EFAULT;
5708                 goto done;
5709         }
5710
5711         SUPPLICANT_DBG("Creating interface");
5712
5713         err = supplicant_dbus_method_call(SUPPLICANT_PATH,
5714                                                 SUPPLICANT_INTERFACE,
5715                                                 "CreateInterface",
5716                                                 interface_create_params,
5717                                                 interface_create_result, data,
5718                                                 NULL);
5719         if (err == 0)
5720                 return;
5721
5722 done:
5723         if (data->callback)
5724                 data->callback(err, NULL, data->user_data);
5725
5726         interface_create_data_free(data);
5727 }
5728
5729 static void interface_get_params(DBusMessageIter *iter, void *user_data)
5730 {
5731         struct interface_create_data *data = user_data;
5732
5733         SUPPLICANT_DBG("");
5734
5735         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, &data->ifname);
5736 }
5737
5738 #if defined TIZEN_EXT_WIFI_MESH
5739 int g_supplicant_mesh_interface_create(const char *ifname, const char *driver,
5740                                                 const char *bridge, const char *parent_ifname,
5741                                                 GSupplicantInterfaceCallback callback, void *user_data)
5742 {
5743         struct interface_create_data *data;
5744         int ret;
5745
5746         SUPPLICANT_DBG("ifname %s", ifname);
5747
5748         if (!ifname || !parent_ifname)
5749                 return -EINVAL;
5750
5751         if (!system_available)
5752                 return -EFAULT;
5753
5754         data = dbus_malloc0(sizeof(*data));
5755         if (!data)
5756                 return -ENOMEM;
5757
5758         data->ifname = g_strdup(ifname);
5759         data->driver = g_strdup(driver);
5760         data->bridge = g_strdup(bridge);
5761         data->is_mesh_interface = true;
5762         data->parent_ifname = g_strdup(parent_ifname);
5763         data->callback = callback;
5764         data->user_data = user_data;
5765
5766         ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
5767                                                 SUPPLICANT_INTERFACE,
5768                                                 "CreateInterface",
5769                                                 interface_create_params,
5770                                                 interface_create_result, data,
5771                                                 NULL);
5772         return ret;
5773 }
5774
5775 struct interface_mesh_peer_data {
5776         char *peer_address;
5777         char *method;
5778         GSupplicantInterface *interface;
5779         GSupplicantInterfaceCallback callback;
5780         void *user_data;
5781 };
5782
5783 static void interface_mesh_change_peer_params(DBusMessageIter *iter,
5784                                                 void *user_data)
5785 {
5786         struct interface_mesh_peer_data *data = user_data;
5787
5788         SUPPLICANT_DBG("");
5789
5790         dbus_message_iter_append_basic(iter, DBUS_TYPE_STRING, &data->peer_address);
5791 }
5792
5793 static void interface_mesh_change_peer_result(const char *error,
5794                                 DBusMessageIter *iter, void *user_data)
5795 {
5796         struct interface_mesh_peer_data *data = user_data;
5797         int err = 0;
5798
5799         SUPPLICANT_DBG("%s", data->method);
5800
5801         if (error) {
5802                 err = -EIO;
5803                 SUPPLICANT_DBG("error %s", error);
5804         }
5805
5806         if (data->callback)
5807                 data->callback(err, data->interface, data->user_data);
5808
5809         g_free(data->peer_address);
5810         g_free(data->method);
5811         dbus_free(data);
5812 }
5813
5814 int g_supplicant_interface_mesh_peer_change_status(
5815                                 GSupplicantInterface *interface,
5816                                 GSupplicantInterfaceCallback callback, const char *peer_address,
5817                                 const char *method, void *user_data)
5818 {
5819         struct interface_mesh_peer_data *data;
5820         int ret;
5821
5822         if (!peer_address)
5823                 return -EINVAL;
5824
5825         data = dbus_malloc0(sizeof(*data));
5826         if (!data)
5827                 return -ENOMEM;
5828
5829         data->peer_address = g_strdup(peer_address);
5830         data->method = g_strdup(method);
5831         data->interface = interface;
5832         data->callback = callback;
5833         data->user_data = user_data;
5834
5835         ret = supplicant_dbus_method_call(interface->path,
5836                                                 SUPPLICANT_INTERFACE ".Interface.Mesh",
5837                                                 method, interface_mesh_change_peer_params,
5838                                                 interface_mesh_change_peer_result, data, NULL);
5839         if (ret < 0) {
5840                 g_free(data->peer_address);
5841                 g_free(data->method);
5842                 dbus_free(data);
5843         }
5844
5845         return ret;
5846 }
5847 #endif
5848
5849 int g_supplicant_interface_create(const char *ifname, const char *driver,
5850                                         const char *bridge,
5851                                         GSupplicantInterfaceCallback callback,
5852                                                         void *user_data)
5853 {
5854         struct interface_create_data *data;
5855         int ret;
5856
5857         SUPPLICANT_DBG("ifname %s", ifname);
5858
5859         if (!ifname)
5860                 return -EINVAL;
5861
5862         if (!system_available)
5863                 return -EFAULT;
5864
5865         data = dbus_malloc0(sizeof(*data));
5866         if (!data)
5867                 return -ENOMEM;
5868
5869         data->ifname = g_strdup(ifname);
5870         data->driver = g_strdup(driver);
5871         data->bridge = g_strdup(bridge);
5872         data->callback = callback;
5873         data->user_data = user_data;
5874
5875 #if !defined TIZEN_EXT
5876         ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
5877                                                 SUPPLICANT_INTERFACE,
5878                                                 "GetInterface",
5879                                                 interface_get_params,
5880                                                 interface_get_result, data,
5881                                                 NULL);
5882         if (ret < 0)
5883                 interface_create_data_free(data);
5884 #else
5885         ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
5886                                                 SUPPLICANT_INTERFACE,
5887                                                 "CreateInterface",
5888                                                 interface_create_params,
5889                                                 interface_create_result, data,
5890                                                 NULL);
5891         if (ret < 0)
5892                 interface_create_data_free(data);
5893 #endif
5894
5895         return ret;
5896 }
5897
5898 static void interface_remove_result(const char *error,
5899                                 DBusMessageIter *iter, void *user_data)
5900 {
5901         struct interface_data *data = user_data;
5902         int err;
5903
5904         if (error) {
5905                 err = -EIO;
5906                 SUPPLICANT_DBG("error: %s", error);
5907                 goto done;
5908         }
5909
5910         if (!system_available) {
5911                 err = -EFAULT;
5912                 goto done;
5913         }
5914
5915         /*
5916          * The gsupplicant interface is already freed by the InterfaceRemoved
5917          * signal callback. Simply invoke the interface_data callback.
5918          */
5919         err = 0;
5920
5921 done:
5922         g_free(data->path);
5923
5924         if (data->callback)
5925                 data->callback(err, NULL, data->user_data);
5926
5927         dbus_free(data);
5928 }
5929
5930
5931 static void interface_remove_params(DBusMessageIter *iter, void *user_data)
5932 {
5933         struct interface_data *data = user_data;
5934
5935         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
5936                                                         &data->interface->path);
5937 }
5938
5939 int g_supplicant_interface_remove(GSupplicantInterface *interface,
5940                         GSupplicantInterfaceCallback callback,
5941                                                         void *user_data)
5942 {
5943         struct interface_data *data;
5944         int ret;
5945
5946         if (!interface)
5947                 return -EINVAL;
5948
5949         if (!system_available)
5950                 return -EFAULT;
5951
5952         g_supplicant_interface_cancel(interface);
5953
5954         data = dbus_malloc0(sizeof(*data));
5955         if (!data)
5956                 return -ENOMEM;
5957
5958         data->interface = interface;
5959         data->path = g_strdup(interface->path);
5960         data->callback = callback;
5961         data->user_data = user_data;
5962
5963         ret = supplicant_dbus_method_call(SUPPLICANT_PATH,
5964                                                 SUPPLICANT_INTERFACE,
5965                                                 "RemoveInterface",
5966                                                 interface_remove_params,
5967                                                 interface_remove_result, data,
5968                                                 NULL);
5969         if (ret < 0) {
5970                 g_free(data->path);
5971                 dbus_free(data);
5972         }
5973         return ret;
5974 }
5975
5976 static void interface_scan_result(const char *error,
5977                                 DBusMessageIter *iter, void *user_data)
5978 {
5979         struct interface_scan_data *data = user_data;
5980         int err = 0;
5981
5982         if (error) {
5983                 SUPPLICANT_DBG("error %s", error);
5984                 err = -EIO;
5985         }
5986
5987         /* A non ready interface cannot send/receive anything */
5988         if (interface_exists(data->interface, data->path)) {
5989                 if (!data->interface->ready)
5990                         err = -ENOLINK;
5991         }
5992
5993         g_free(data->path);
5994
5995         if (err != 0) {
5996                 if (data->callback)
5997                         data->callback(err, data->interface, data->user_data);
5998         } else {
5999                 data->interface->scan_callback = data->callback;
6000                 data->interface->scan_data = data->user_data;
6001         }
6002
6003         if (data->scan_params)
6004                 g_supplicant_free_scan_params(data->scan_params);
6005
6006         dbus_free(data);
6007 }
6008
6009 static void add_scan_frequency(DBusMessageIter *iter, unsigned int freq)
6010 {
6011         DBusMessageIter data;
6012         unsigned int width = 0; /* Not used by wpa_supplicant atm */
6013
6014         dbus_message_iter_open_container(iter, DBUS_TYPE_STRUCT, NULL, &data);
6015
6016         dbus_message_iter_append_basic(&data, DBUS_TYPE_UINT32, &freq);
6017         dbus_message_iter_append_basic(&data, DBUS_TYPE_UINT32, &width);
6018
6019         dbus_message_iter_close_container(iter, &data);
6020 }
6021
6022 static void add_scan_frequencies(DBusMessageIter *iter,
6023                                                 void *user_data)
6024 {
6025         GSupplicantScanParams *scan_data = user_data;
6026         unsigned int freq;
6027         int i;
6028
6029         for (i = 0; i < scan_data->num_freqs; i++) {
6030                 freq = scan_data->freqs[i];
6031                 if (!freq)
6032                         break;
6033
6034                 add_scan_frequency(iter, freq);
6035         }
6036 }
6037
6038 static void append_ssid(DBusMessageIter *iter,
6039                         const void *ssid, unsigned int len)
6040 {
6041         DBusMessageIter array;
6042
6043         dbus_message_iter_open_container(iter, DBUS_TYPE_ARRAY,
6044         DBUS_TYPE_BYTE_AS_STRING, &array);
6045
6046         dbus_message_iter_append_fixed_array(&array, DBUS_TYPE_BYTE,
6047                                                                 &ssid, len);
6048         dbus_message_iter_close_container(iter, &array);
6049 }
6050
6051 static void append_ssids(DBusMessageIter *iter, void *user_data)
6052 {
6053         GSupplicantScanParams *scan_data = user_data;
6054         GSList *list;
6055
6056         for (list = scan_data->ssids; list; list = list->next) {
6057                 struct scan_ssid *scan_ssid = list->data;
6058
6059                 append_ssid(iter, scan_ssid->ssid, scan_ssid->ssid_len);
6060         }
6061 }
6062
6063 static void supplicant_add_scan_frequency(DBusMessageIter *dict,
6064                 supplicant_dbus_array_function function,
6065                                         void *user_data)
6066 {
6067         GSupplicantScanParams *scan_params = user_data;
6068         DBusMessageIter entry, value, array;
6069         const char *key = "Channels";
6070
6071         if (scan_params->freqs && scan_params->freqs[0] != 0) {
6072                 dbus_message_iter_open_container(dict, DBUS_TYPE_DICT_ENTRY,
6073                                                 NULL, &entry);
6074
6075                 dbus_message_iter_append_basic(&entry, DBUS_TYPE_STRING, &key);
6076
6077                 dbus_message_iter_open_container(&entry, DBUS_TYPE_VARIANT,
6078                                         DBUS_TYPE_ARRAY_AS_STRING
6079                                         DBUS_STRUCT_BEGIN_CHAR_AS_STRING
6080                                         DBUS_TYPE_UINT32_AS_STRING
6081                                         DBUS_TYPE_UINT32_AS_STRING
6082                                         DBUS_STRUCT_END_CHAR_AS_STRING,
6083                                         &value);
6084
6085                 dbus_message_iter_open_container(&value, DBUS_TYPE_ARRAY,
6086                                         DBUS_STRUCT_BEGIN_CHAR_AS_STRING
6087                                         DBUS_TYPE_UINT32_AS_STRING
6088                                         DBUS_TYPE_UINT32_AS_STRING
6089                                         DBUS_STRUCT_END_CHAR_AS_STRING,
6090                                         &array);
6091
6092                 if (function)
6093                         function(&array, user_data);
6094
6095                 dbus_message_iter_close_container(&value, &array);
6096                 dbus_message_iter_close_container(&entry, &value);
6097                 dbus_message_iter_close_container(dict, &entry);
6098         }
6099 }
6100
6101 static void interface_scan_params(DBusMessageIter *iter, void *user_data)
6102 {
6103         DBusMessageIter dict;
6104         const char *type = "passive";
6105         struct interface_scan_data *data = user_data;
6106
6107         supplicant_dbus_dict_open(iter, &dict);
6108
6109         if (data && data->scan_params) {
6110                 type = "active";
6111
6112                 supplicant_dbus_dict_append_basic(&dict, "Type",
6113                                         DBUS_TYPE_STRING, &type);
6114
6115 #if defined TIZEN_EXT
6116                 SUPPLICANT_DBG("[specific_scan] num_ssids %d",
6117                                data->scan_params->num_ssids);
6118 #endif
6119
6120                 if (data->scan_params->ssids) {
6121                         supplicant_dbus_dict_append_array(&dict, "SSIDs",
6122                                                         DBUS_TYPE_STRING,
6123                                                         append_ssids,
6124                                                         data->scan_params);
6125                 }
6126                 supplicant_add_scan_frequency(&dict, add_scan_frequencies,
6127                                                 data->scan_params);
6128         } else
6129                 supplicant_dbus_dict_append_basic(&dict, "Type",
6130                                         DBUS_TYPE_STRING, &type);
6131
6132         supplicant_dbus_dict_close(iter, &dict);
6133 }
6134
6135 static int interface_ready_to_scan(GSupplicantInterface *interface)
6136 {
6137         if (!interface)
6138                 return -EINVAL;
6139
6140         if (!system_available)
6141                 return -EFAULT;
6142
6143         if (interface->scanning)
6144                 return -EALREADY;
6145
6146         switch (interface->state) {
6147         case G_SUPPLICANT_STATE_AUTHENTICATING:
6148         case G_SUPPLICANT_STATE_ASSOCIATING:
6149         case G_SUPPLICANT_STATE_ASSOCIATED:
6150         case G_SUPPLICANT_STATE_4WAY_HANDSHAKE:
6151         case G_SUPPLICANT_STATE_GROUP_HANDSHAKE:
6152                 return -EBUSY;
6153 #if defined TIZEN_EXT
6154         case G_SUPPLICANT_STATE_DISABLED:
6155                 return -ENOLINK;
6156         case G_SUPPLICANT_STATE_UNKNOWN:
6157 #else
6158         case G_SUPPLICANT_STATE_UNKNOWN:
6159         case G_SUPPLICANT_STATE_DISABLED:
6160 #endif
6161         case G_SUPPLICANT_STATE_DISCONNECTED:
6162         case G_SUPPLICANT_STATE_INACTIVE:
6163         case G_SUPPLICANT_STATE_SCANNING:
6164         case G_SUPPLICANT_STATE_COMPLETED:
6165                 break;
6166         }
6167
6168         return 0;
6169 }
6170
6171 #if defined TIZEN_EXT_WIFI_MESH
6172 static void interface_abort_scan_result(const char *error,
6173                                 DBusMessageIter *iter, void *user_data)
6174 {
6175         struct interface_scan_data *data = user_data;
6176         int err = 0;
6177
6178         if (error) {
6179                 SUPPLICANT_DBG("error %s", error);
6180                 err = -EIO;
6181         }
6182
6183         g_free(data->path);
6184
6185                 if (data->callback)
6186                         data->callback(err, data->interface, data->user_data);
6187
6188         dbus_free(data);
6189 }
6190
6191 int g_supplicant_interface_abort_scan(GSupplicantInterface *interface,
6192                                 GSupplicantInterfaceCallback callback, void *user_data)
6193 {
6194         struct interface_scan_data *data;
6195         int ret;
6196
6197         if (!interface->scanning)
6198                 return -EEXIST;
6199
6200         data = dbus_malloc0(sizeof(*data));
6201         if (!data)
6202                 return -ENOMEM;
6203
6204         data->interface = interface;
6205         data->path = g_strdup(interface->path);
6206         data->callback = callback;
6207         data->user_data = user_data;
6208
6209         ret = supplicant_dbus_method_call(interface->path,
6210                         SUPPLICANT_INTERFACE ".Interface", "AbortScan", NULL,
6211                         interface_abort_scan_result, data, interface);
6212
6213         if (ret < 0) {
6214                 g_free(data->path);
6215                 dbus_free(data);
6216         }
6217
6218         return ret;
6219 }
6220 #endif
6221
6222 int g_supplicant_interface_scan(GSupplicantInterface *interface,
6223                                 GSupplicantScanParams *scan_data,
6224                                 GSupplicantInterfaceCallback callback,
6225                                                         void *user_data)
6226 {
6227         struct interface_scan_data *data;
6228         int ret;
6229
6230         ret = interface_ready_to_scan(interface);
6231         if (ret)
6232                 return ret;
6233
6234         data = dbus_malloc0(sizeof(*data));
6235         if (!data)
6236                 return -ENOMEM;
6237
6238         data->interface = interface;
6239         data->path = g_strdup(interface->path);
6240 #if defined TIZEN_EXT
6241         data->interface->scan_callback = data->callback = callback;
6242         data->interface->scan_data = data->user_data = user_data;
6243 #else
6244         data->callback = callback;
6245         data->user_data = user_data;
6246 #endif
6247         data->scan_params = scan_data;
6248
6249         interface->scan_callback = callback;
6250         interface->scan_data = user_data;
6251
6252         ret = supplicant_dbus_method_call(interface->path,
6253                         SUPPLICANT_INTERFACE ".Interface", "Scan",
6254                         interface_scan_params, interface_scan_result, data,
6255                         interface);
6256
6257         if (ret < 0) {
6258                 g_free(data->path);
6259                 dbus_free(data);
6260         }
6261
6262         return ret;
6263 }
6264
6265 #if defined TIZEN_EXT
6266 static void interface_signalpoll_result(const char *error,
6267                                 DBusMessageIter *iter, void *user_data)
6268 {
6269         struct interface_signalpoll_data *data = user_data;
6270         int err = 0;
6271         dbus_int32_t maxspeed = 0;
6272         dbus_int32_t strength = 0;
6273         DBusMessageIter sub_iter, dict;
6274
6275         if (error) {
6276                 err = -EIO;
6277                 SUPPLICANT_DBG("error: %s", error);
6278                 goto out;
6279         }
6280
6281         dbus_message_iter_get_arg_type(iter);
6282         dbus_message_iter_recurse(iter, &sub_iter);
6283         dbus_message_iter_recurse(&sub_iter, &dict);
6284
6285         while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_DICT_ENTRY) {
6286                 DBusMessageIter entry, value;
6287                 const char *key;
6288
6289                 dbus_message_iter_recurse(&dict, &entry);
6290                 dbus_message_iter_get_basic(&entry, &key);
6291                 dbus_message_iter_next(&entry);
6292                 dbus_message_iter_recurse(&entry, &value);
6293
6294                 switch (dbus_message_iter_get_arg_type(&value)) {
6295                 case DBUS_TYPE_INT32:
6296                         if (g_strcmp0(key, "linkspeed") == 0) {
6297                                 dbus_message_iter_get_basic(&value, &maxspeed);
6298                                 SUPPLICANT_DBG("linkspeed = %d", maxspeed);
6299                                 break;
6300                         } else if (g_strcmp0(key, "rssi") == 0) {
6301                                 dbus_message_iter_get_basic(&value, &strength);
6302                                 SUPPLICANT_DBG("Strength = %d", strength);
6303                                 break;
6304                         }
6305                 }
6306                 dbus_message_iter_next(&dict);
6307         }
6308
6309 out:
6310         if(data->callback)
6311                 data->callback(err, maxspeed, strength, data->user_data);
6312
6313         g_free(data->path);
6314         dbus_free(data);
6315 }
6316
6317 int g_supplicant_interface_signalpoll(GSupplicantInterface *interface,
6318                                 GSupplicantMaxSpeedCallback callback,
6319                                 void *user_data)
6320 {
6321         struct interface_signalpoll_data *data;
6322         int ret;
6323
6324         if (!interface)
6325                 return -EINVAL;
6326
6327         if (!system_available)
6328                 return -EFAULT;
6329
6330         data = dbus_malloc0(sizeof(*data));
6331         if (!data)
6332                 return -ENOMEM;
6333
6334         data->interface = interface;
6335         data->path = g_strdup(interface->path);
6336         data->callback = callback;
6337         data->user_data = user_data;
6338
6339         ret = supplicant_dbus_method_call(interface->path,
6340                         SUPPLICANT_INTERFACE ".Interface", "SignalPoll",
6341                         NULL, interface_signalpoll_result, data,
6342                         interface);
6343
6344         if (ret < 0) {
6345                 g_free(data->path);
6346                 dbus_free(data);
6347         }
6348
6349         return ret;
6350 }
6351 #endif
6352
6353 static int parse_supplicant_error(DBusMessageIter *iter)
6354 {
6355         int err = -ECONNABORTED;
6356         char *key;
6357
6358         if (!iter)
6359                 return err;
6360
6361         /* If the given passphrase is malformed wpa_s returns
6362          * "invalid message format" but this error should be interpreted as
6363          * invalid-key.
6364          */
6365         while (dbus_message_iter_get_arg_type(iter) == DBUS_TYPE_STRING) {
6366                 dbus_message_iter_get_basic(iter, &key);
6367                 if (strncmp(key, "psk", 3) == 0 ||
6368                                 strncmp(key, "wep_key", 7) == 0 ||
6369                                 strcmp(key, "invalid message format") == 0) {
6370                         err = -ENOKEY;
6371                         break;
6372                 }
6373                 dbus_message_iter_next(iter);
6374         }
6375
6376         return err;
6377 }
6378
6379 static void interface_select_network_result(const char *error,
6380                                 DBusMessageIter *iter, void *user_data)
6381 {
6382         struct interface_connect_data *data = user_data;
6383         int err;
6384
6385         SUPPLICANT_DBG("");
6386
6387         err = 0;
6388         if (error) {
6389 #if defined TIZEN_EXT
6390                 SUPPLICANT_DBG("SelectNetwork errorFreq %s", error);
6391 #else
6392                 SUPPLICANT_DBG("SelectNetwork error %s", error);
6393 #endif
6394                 err = parse_supplicant_error(iter);
6395         }
6396
6397         g_free(data->path);
6398
6399         if (data->callback)
6400                 data->callback(err, data->interface, data->user_data);
6401
6402 #if defined TIZEN_EXT
6403         g_free(data->ssid->ssid);
6404         g_free((char *)data->ssid->passphrase);
6405         g_free((char *)data->ssid->connector);
6406         g_free((char *)data->ssid->c_sign_key);
6407         g_free((char *)data->ssid->net_access_key);
6408 #endif
6409         g_free(data->ssid);
6410         dbus_free(data);
6411 }
6412
6413 static void interface_select_network_params(DBusMessageIter *iter,
6414                                                         void *user_data)
6415 {
6416         struct interface_connect_data *data = user_data;
6417         GSupplicantInterface *interface = data->interface;
6418 #if defined TIZEN_EXT
6419         GSupplicantSSID *ssid = data->ssid;
6420 #endif
6421
6422         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
6423                                         &interface->network_path);
6424 #if defined TIZEN_EXT
6425         if (!ssid->bssid_for_connect_len)
6426                 dbus_message_iter_append_basic(iter, DBUS_TYPE_INT32, &ssid->freq);
6427 #endif
6428 }
6429
6430 static void interface_add_network_result(const char *error,
6431                                 DBusMessageIter *iter, void *user_data)
6432 {
6433         struct interface_connect_data *data = user_data;
6434         GSupplicantInterface *interface = data->interface;
6435         const char *path;
6436         int err;
6437
6438         if (error)
6439                 goto error;
6440
6441         dbus_message_iter_get_basic(iter, &path);
6442         if (!path)
6443                 goto error;
6444
6445         SUPPLICANT_DBG("PATH: %s", path);
6446
6447 #if defined TIZEN_EXT
6448         if (interface->network_path)
6449                 g_free(interface->network_path);
6450 #endif
6451         interface->network_path = g_strdup(path);
6452
6453         store_network_information(interface, data->ssid);
6454
6455 #if defined TIZEN_EXT
6456         SUPPLICANT_DBG(".Interface.SelectNetworkFreq");
6457         GSupplicantSSID *ssid = data->ssid;
6458
6459         if (!ssid->bssid_for_connect_len)
6460                 supplicant_dbus_method_call(data->interface->path,
6461                                 SUPPLICANT_INTERFACE ".Interface", "SelectNetworkFreq",
6462                                 interface_select_network_params,
6463                                 interface_select_network_result, data,
6464                                 interface);
6465         else
6466                 supplicant_dbus_method_call(data->interface->path,
6467                                 SUPPLICANT_INTERFACE ".Interface", "SelectNetwork",
6468                                 interface_select_network_params,
6469                                 interface_select_network_result, data,
6470                                 interface);
6471 #else
6472         supplicant_dbus_method_call(data->interface->path,
6473                         SUPPLICANT_INTERFACE ".Interface", "SelectNetwork",
6474                         interface_select_network_params,
6475                         interface_select_network_result, data,
6476                         interface);
6477 #endif
6478
6479         return;
6480
6481 error:
6482         SUPPLICANT_DBG("AddNetwork error %s", error);
6483
6484         if (interface_exists(data->interface, data->interface->path)) {
6485                 err = parse_supplicant_error(iter);
6486                 if (data->callback)
6487                         data->callback(err, data->interface, data->user_data);
6488
6489                 g_free(interface->network_path);
6490                 interface->network_path = NULL;
6491         }
6492
6493         g_free(data->path);
6494 #if defined TIZEN_EXT
6495         g_free(data->ssid->ssid);
6496         g_free((char *)data->ssid->passphrase);
6497         g_free((char *)data->ssid->connector);
6498         g_free((char *)data->ssid->c_sign_key);
6499         g_free((char *)data->ssid->net_access_key);
6500 #endif
6501         g_free(data->ssid);
6502         g_free(data);
6503 }
6504
6505 static void add_network_security_none(DBusMessageIter *dict)
6506 {
6507         const char *auth_alg = "OPEN";
6508
6509         supplicant_dbus_dict_append_basic(dict, "auth_alg",
6510                                         DBUS_TYPE_STRING, &auth_alg);
6511 }
6512
6513 static void add_network_security_wep(DBusMessageIter *dict,
6514                                         GSupplicantSSID *ssid)
6515 {
6516         const char *auth_alg = "OPEN SHARED";
6517         dbus_uint32_t key_index = 0;
6518
6519         supplicant_dbus_dict_append_basic(dict, "auth_alg",
6520                                         DBUS_TYPE_STRING, &auth_alg);
6521
6522         if (ssid->passphrase) {
6523                 int size = strlen(ssid->passphrase);
6524                 if (size == 10 || size == 26) {
6525                         unsigned char *key = g_try_malloc(13);
6526                         char tmp[3];
6527                         int i;
6528
6529                         memset(tmp, 0, sizeof(tmp));
6530                         if (!key)
6531                                 size = 0;
6532
6533                         for (i = 0; i < size / 2; i++) {
6534                                 memcpy(tmp, ssid->passphrase + (i * 2), 2);
6535                                 key[i] = (unsigned char) strtol(tmp, NULL, 16);
6536                         }
6537
6538                         supplicant_dbus_dict_append_fixed_array(dict,
6539                                                         "wep_key0",
6540                                                         DBUS_TYPE_BYTE,
6541                                                         &key, size / 2);
6542                         g_free(key);
6543                 } else if (size == 5 || size == 13) {
6544                         unsigned char *key = g_try_malloc(13);
6545                         int i;
6546
6547                         if (!key)
6548                                 size = 0;
6549
6550                         for (i = 0; i < size; i++)
6551                                 key[i] = (unsigned char) ssid->passphrase[i];
6552
6553                         supplicant_dbus_dict_append_fixed_array(dict,
6554                                                                 "wep_key0",
6555                                                                 DBUS_TYPE_BYTE,
6556                                                                 &key, size);
6557                         g_free(key);
6558                 } else
6559                         supplicant_dbus_dict_append_basic(dict,
6560                                                         "wep_key0",
6561                                                         DBUS_TYPE_STRING,
6562                                                         &ssid->passphrase);
6563
6564                 supplicant_dbus_dict_append_basic(dict, "wep_tx_keyidx",
6565                                         DBUS_TYPE_UINT32, &key_index);
6566         }
6567 }
6568
6569 static dbus_bool_t is_psk_raw_key(const char *psk)
6570 {
6571         int i;
6572
6573         /* A raw key is always 64 bytes length... */
6574         if (strlen(psk) != 64)
6575                 return FALSE;
6576
6577         /* ... and its content is in hex representation */
6578         for (i = 0; i < 64; i++)
6579                 if (!isxdigit((unsigned char) psk[i]))
6580                         return FALSE;
6581
6582         return TRUE;
6583 }
6584
6585 static unsigned char hexchar2bin(char c)
6586 {
6587         if ((c >= '0') && (c <= '9'))
6588                 return c - '0';
6589         else if ((c >= 'A') && (c <= 'F'))
6590                 return c - 'A' + 10;
6591         else if ((c >= 'a') && (c <= 'f'))
6592                 return c - 'a' + 10;
6593         else
6594                 return c;
6595 }
6596
6597 static void hexstring2bin(const char *string, unsigned char *data,
6598                                 size_t data_len)
6599 {
6600         size_t i;
6601
6602         for (i = 0; i < data_len; i++)
6603                 data[i] = (hexchar2bin(string[i * 2 + 0]) << 4 |
6604                            hexchar2bin(string[i * 2 + 1]) << 0);
6605 }
6606
6607 static void add_network_security_psk(DBusMessageIter *dict,
6608                                         GSupplicantSSID *ssid)
6609 {
6610         if (ssid->passphrase && strlen(ssid->passphrase) > 0) {
6611                 const char *key = "psk";
6612
6613                 if (is_psk_raw_key(ssid->passphrase)) {
6614                         unsigned char data[32];
6615                         unsigned char *datap = data;
6616
6617                         /* The above pointer alias is required by D-Bus because
6618                          * with D-Bus and GCC, non-heap-allocated arrays cannot
6619                          * be passed directly by their base pointer. */
6620
6621                         hexstring2bin(ssid->passphrase, datap, sizeof(data));
6622
6623                         supplicant_dbus_dict_append_fixed_array(dict,
6624                                                         key, DBUS_TYPE_BYTE,
6625                                                         &datap, sizeof(data));
6626                 } else
6627                         supplicant_dbus_dict_append_basic(dict,
6628                                                         key, DBUS_TYPE_STRING,
6629                                                         &ssid->passphrase);
6630         }
6631 }
6632
6633 static void add_network_security_tls(DBusMessageIter *dict,
6634                                         GSupplicantSSID *ssid)
6635 {
6636         /*
6637          * For TLS, we at least need:
6638          *              The client certificate
6639          *              The client private key file
6640          *              The client private key file password
6641          *
6642          * The Authority certificate is optional.
6643          */
6644         if (!ssid->client_cert_path)
6645                 return;
6646
6647         if (!ssid->private_key_path)
6648                 return;
6649
6650 #if !defined TIZEN_EXT
6651         if (!ssid->private_key_passphrase)
6652                 return;
6653 #endif
6654
6655         if (ssid->ca_cert_path)
6656                 supplicant_dbus_dict_append_basic(dict, "ca_cert",
6657                                         DBUS_TYPE_STRING, &ssid->ca_cert_path);
6658
6659         supplicant_dbus_dict_append_basic(dict, "private_key",
6660                                                 DBUS_TYPE_STRING,
6661                                                 &ssid->private_key_path);
6662 #if !defined TIZEN_EXT
6663         supplicant_dbus_dict_append_basic(dict, "private_key_passwd",
6664                                                 DBUS_TYPE_STRING,
6665                                                 &ssid->private_key_passphrase);
6666 #endif
6667         supplicant_dbus_dict_append_basic(dict, "client_cert",
6668                                                 DBUS_TYPE_STRING,
6669                                                 &ssid->client_cert_path);
6670 }
6671
6672 static void add_network_security_peap(DBusMessageIter *dict,
6673                                         GSupplicantSSID *ssid)
6674 {
6675         char *phase2_auth;
6676
6677         /*
6678          * For PEAP/TTLS, we at least need
6679          *              The authority certificate
6680          *              The 2nd phase authentication method
6681          *              The 2nd phase passphrase
6682          *
6683          * The Client certificate is optional although strongly recommended
6684          * When setting it, we need in addition
6685          *              The Client private key file
6686          *              The Client private key file password
6687          */
6688         if (!ssid->passphrase)
6689                 return;
6690
6691         if (!ssid->phase2_auth)
6692                 return;
6693
6694         if (ssid->client_cert_path) {
6695                 if (!ssid->private_key_path)
6696                         return;
6697
6698 #if !defined TIZEN_EXT
6699                 if (!ssid->private_key_passphrase)
6700                         return;
6701 #endif
6702
6703                 supplicant_dbus_dict_append_basic(dict, "client_cert",
6704                                                 DBUS_TYPE_STRING,
6705                                                 &ssid->client_cert_path);
6706
6707                 supplicant_dbus_dict_append_basic(dict, "private_key",
6708                                                 DBUS_TYPE_STRING,
6709                                                 &ssid->private_key_path);
6710
6711 #if !defined TIZEN_EXT
6712                 supplicant_dbus_dict_append_basic(dict, "private_key_passwd",
6713                                                 DBUS_TYPE_STRING,
6714                                                 &ssid->private_key_passphrase);
6715 #endif
6716
6717         }
6718
6719         if(g_strcmp0(ssid->phase2_auth, "GTC") == 0 && g_strcmp0(ssid->eap, "ttls") == 0)
6720                 phase2_auth = g_strdup_printf("autheap=%s", ssid->phase2_auth);
6721         else if (g_str_has_prefix(ssid->phase2_auth, "EAP-")) {
6722                 phase2_auth = g_strdup_printf("autheap=%s",
6723                                         ssid->phase2_auth + strlen("EAP-"));
6724         } else
6725                 phase2_auth = g_strdup_printf("auth=%s", ssid->phase2_auth);
6726
6727         supplicant_dbus_dict_append_basic(dict, "password",
6728                                                 DBUS_TYPE_STRING,
6729                                                 &ssid->passphrase);
6730
6731         if (ssid->ca_cert_path)
6732                 supplicant_dbus_dict_append_basic(dict, "ca_cert",
6733                                                 DBUS_TYPE_STRING,
6734                                                 &ssid->ca_cert_path);
6735
6736         supplicant_dbus_dict_append_basic(dict, "phase2",
6737                                                 DBUS_TYPE_STRING,
6738                                                 &phase2_auth);
6739
6740         g_free(phase2_auth);
6741 }
6742
6743 #if defined TIZEN_EXT
6744 static void add_network_security_aka_sim(DBusMessageIter *dict,
6745                                         GSupplicantSSID *ssid)
6746 {
6747         if (!ssid->passphrase)
6748                 return;
6749
6750         supplicant_dbus_dict_append_basic(dict, "password",
6751                         DBUS_TYPE_STRING,
6752                         &ssid->passphrase);
6753 }
6754
6755 static void add_network_security_fast(DBusMessageIter *dict,
6756                 GSupplicantSSID *ssid)
6757 {
6758         /*
6759          * For FAST, we at least need:
6760          *              id / password
6761          *              phase1 (provisiong information)
6762          *              pac_file
6763          */
6764
6765         /* Allow provisioing both authenticated and unauthenticated */
6766         const char *phase1 = "fast_provisioning=2";
6767         supplicant_dbus_dict_append_basic(dict, "phase1",
6768                         DBUS_TYPE_STRING,
6769                         &phase1);
6770
6771         SUPPLICANT_DBG("pac_file [%s]", ssid->pac_file);
6772         if(ssid->pac_file)
6773                 supplicant_dbus_dict_append_basic(dict, "pac_file",
6774                                 DBUS_TYPE_STRING,
6775                                 &ssid->pac_file);
6776
6777         supplicant_dbus_dict_append_basic(dict, "password",
6778                         DBUS_TYPE_STRING,
6779                         &ssid->passphrase);
6780 }
6781 #endif
6782
6783 static void add_network_security_eap(DBusMessageIter *dict,
6784                                         GSupplicantSSID *ssid)
6785 {
6786         char *eap_value;
6787
6788 #if defined TIZEN_EXT
6789         if (!ssid->eap)
6790 #else
6791         if (!ssid->eap || !ssid->identity)
6792 #endif
6793                 return;
6794
6795         if (g_strcmp0(ssid->eap, "tls") == 0) {
6796                 add_network_security_tls(dict, ssid);
6797         } else if (g_strcmp0(ssid->eap, "peap") == 0 ||
6798                                 g_strcmp0(ssid->eap, "ttls") == 0) {
6799 #if defined TIZEN_EXT
6800                 if (!ssid->identity)
6801                         return;
6802 #endif
6803                 add_network_security_peap(dict, ssid);
6804
6805 #if defined TIZEN_EXT
6806         } else if (g_strcmp0(ssid->eap, "sim") == 0 ||
6807                         g_strcmp0(ssid->eap, "aka") == 0 ||
6808                         g_strcmp0(ssid->eap, "aka'") == 0) {
6809                 add_network_security_aka_sim(dict, ssid);
6810         } else if (g_strcmp0(ssid->eap, "pwd") == 0) {
6811                 if(!ssid->passphrase)
6812                         return;
6813                 supplicant_dbus_dict_append_basic(dict, "password",
6814                                 DBUS_TYPE_STRING,
6815                                 &ssid->passphrase);
6816         } else if (g_strcmp0(ssid->eap, "fast") == 0){
6817                 if (!ssid->identity || !ssid->passphrase)
6818                         return;
6819
6820                 add_network_security_fast(dict, ssid);
6821 #endif
6822         } else
6823                 return;
6824
6825         eap_value = g_ascii_strup(ssid->eap, -1);
6826
6827         supplicant_dbus_dict_append_basic(dict, "eap",
6828                                                 DBUS_TYPE_STRING,
6829                                                 &eap_value);
6830 #if defined TIZEN_EXT
6831         if (ssid->identity != NULL)
6832                 supplicant_dbus_dict_append_basic(dict, "identity",
6833                                                         DBUS_TYPE_STRING,
6834                                                         &ssid->identity);
6835 #else
6836         supplicant_dbus_dict_append_basic(dict, "identity",
6837                                                 DBUS_TYPE_STRING,
6838                                                 &ssid->identity);
6839 #endif
6840         if(ssid->anonymous_identity)
6841                 supplicant_dbus_dict_append_basic(dict, "anonymous_identity",
6842                                                      DBUS_TYPE_STRING,
6843                                                      &ssid->anonymous_identity);
6844
6845         if(ssid->subject_match)
6846                 supplicant_dbus_dict_append_basic(dict, "subject_match",
6847                                                      DBUS_TYPE_STRING,
6848                                                      &ssid->subject_match);
6849
6850         if(ssid->altsubject_match)
6851                 supplicant_dbus_dict_append_basic(dict, "altsubject_match",
6852                                                      DBUS_TYPE_STRING,
6853                                                      &ssid->altsubject_match);
6854
6855         if(ssid->domain_suffix_match)
6856                 supplicant_dbus_dict_append_basic(dict, "domain_suffix_match",
6857                                                      DBUS_TYPE_STRING,
6858                                                      &ssid->domain_suffix_match);
6859
6860         if(ssid->domain_match)
6861                 supplicant_dbus_dict_append_basic(dict, "domain_match",
6862                                                      DBUS_TYPE_STRING,
6863                                                      &ssid->domain_match);
6864
6865         g_free(eap_value);
6866 }
6867
6868 static void add_network_security_ciphers(DBusMessageIter *dict,
6869                                                 GSupplicantSSID *ssid)
6870 {
6871         unsigned int p_cipher, g_cipher, i;
6872         char *pairwise, *group;
6873         char *pair_ciphers[4];
6874         char *group_ciphers[5];
6875
6876         p_cipher = ssid->pairwise_cipher;
6877         g_cipher = ssid->group_cipher;
6878
6879         if (p_cipher == 0 && g_cipher == 0)
6880                 return;
6881
6882         i = 0;
6883
6884         if (p_cipher & G_SUPPLICANT_PAIRWISE_CCMP)
6885                 pair_ciphers[i++] = "CCMP";
6886
6887         if (p_cipher & G_SUPPLICANT_PAIRWISE_TKIP)
6888                 pair_ciphers[i++] = "TKIP";
6889
6890         if (p_cipher & G_SUPPLICANT_PAIRWISE_NONE)
6891                 pair_ciphers[i++] = "NONE";
6892
6893         pair_ciphers[i] = NULL;
6894
6895         i = 0;
6896
6897         if (g_cipher & G_SUPPLICANT_GROUP_CCMP)
6898                 group_ciphers[i++] = "CCMP";
6899
6900         if (g_cipher & G_SUPPLICANT_GROUP_TKIP)
6901                 group_ciphers[i++] = "TKIP";
6902
6903         if (g_cipher & G_SUPPLICANT_GROUP_WEP104)
6904                 group_ciphers[i++] = "WEP104";
6905
6906         if (g_cipher & G_SUPPLICANT_GROUP_WEP40)
6907                 group_ciphers[i++] = "WEP40";
6908
6909         group_ciphers[i] = NULL;
6910
6911         pairwise = g_strjoinv(" ", pair_ciphers);
6912         group = g_strjoinv(" ", group_ciphers);
6913
6914         SUPPLICANT_DBG("cipher %s %s", pairwise, group);
6915
6916         supplicant_dbus_dict_append_basic(dict, "pairwise",
6917                                                 DBUS_TYPE_STRING,
6918                                                 &pairwise);
6919         supplicant_dbus_dict_append_basic(dict, "group",
6920                                                 DBUS_TYPE_STRING,
6921                                                 &group);
6922
6923         g_free(pairwise);
6924         g_free(group);
6925 }
6926
6927 static void add_network_security_proto(DBusMessageIter *dict,
6928                                                 GSupplicantSSID *ssid)
6929 {
6930         unsigned int protocol, i;
6931         char *proto;
6932         char *protos[3];
6933
6934         protocol = ssid->protocol;
6935
6936         if (protocol == 0)
6937                 return;
6938
6939         i = 0;
6940
6941         if (protocol & G_SUPPLICANT_PROTO_RSN)
6942                 protos[i++] = "RSN";
6943
6944         if (protocol & G_SUPPLICANT_PROTO_WPA)
6945                 protos[i++] = "WPA";
6946
6947         protos[i] = NULL;
6948
6949         proto = g_strjoinv(" ", protos);
6950
6951         SUPPLICANT_DBG("proto %s", proto);
6952
6953         supplicant_dbus_dict_append_basic(dict, "proto",
6954                                                 DBUS_TYPE_STRING,
6955                                                 &proto);
6956
6957         g_free(proto);
6958 }
6959
6960 #if defined TIZEN_EXT
6961 static void add_network_ieee80211w(DBusMessageIter *dict, GSupplicantSSID *ssid)
6962 {
6963         if (ssid->security != G_SUPPLICANT_SECURITY_SAE
6964                         && ssid->security != G_SUPPLICANT_SECURITY_OWE
6965                         && ssid->security != G_SUPPLICANT_SECURITY_DPP)
6966                 return;
6967
6968         supplicant_dbus_dict_append_basic(dict, "ieee80211w", DBUS_TYPE_UINT32,
6969                                           &ssid->ieee80211w);
6970 }
6971
6972 static void add_network_security_connector(DBusMessageIter *dict, GSupplicantSSID *ssid)
6973 {
6974         if (ssid->connector && strlen(ssid->connector) > 0) {
6975                 const char *key = "dpp_connector";
6976
6977                 supplicant_dbus_dict_append_basic(dict,
6978                                 key, DBUS_TYPE_STRING,
6979                                 &ssid->connector);
6980         }
6981 }
6982
6983 static size_t convert_hexstr_to_bin(const char *hex_str, unsigned char **bin)
6984 {
6985         unsigned char *bin_res = NULL;
6986         unsigned int i, j, hex;
6987         size_t hex_str_len;
6988
6989         if (!hex_str || strlen(hex_str) == 0)
6990                 return 0;
6991
6992         hex_str_len = strlen(hex_str);
6993         bin_res = g_try_malloc0(hex_str_len / 2);
6994         if (!bin_res)
6995                 return 0;
6996
6997         j = 0;
6998         for (i = 0; i < hex_str_len; i+=2) {
6999                 sscanf(hex_str + i, "%02x", &hex);
7000                 bin_res[j++] = hex;
7001         }
7002
7003         *bin = bin_res;
7004         return hex_str_len / 2;
7005 }
7006
7007 static void add_network_security_c_sign_key(DBusMessageIter *dict, GSupplicantSSID *ssid)
7008 {
7009         if (ssid->c_sign_key && strlen(ssid->c_sign_key) > 0) {
7010                 const char *key = "dpp_csign";
7011                 unsigned char *bin_csign = NULL;
7012                 size_t bin_csign_len = convert_hexstr_to_bin(ssid->c_sign_key, &bin_csign);
7013                 if  (bin_csign_len != 0)
7014                         supplicant_dbus_dict_append_fixed_array(dict,
7015                                         key, DBUS_TYPE_BYTE,
7016                                         &bin_csign, bin_csign_len);
7017                 g_free(bin_csign);
7018         }
7019 }
7020
7021 static void add_network_security_net_access_key(DBusMessageIter *dict, GSupplicantSSID *ssid)
7022 {
7023         if (ssid->net_access_key && strlen(ssid->net_access_key) > 0) {
7024                 const char *key = "dpp_netaccesskey";
7025                 unsigned char *bin_netaccesskey = NULL;
7026                 size_t bin_netaccesskey_len = convert_hexstr_to_bin(ssid->net_access_key, &bin_netaccesskey);
7027                 if  (bin_netaccesskey_len != 0)
7028                         supplicant_dbus_dict_append_fixed_array(dict,
7029                                         key, DBUS_TYPE_BYTE,
7030                                         &bin_netaccesskey, bin_netaccesskey_len);
7031                 g_free(bin_netaccesskey);
7032         }
7033 }
7034
7035 #endif
7036
7037 static void add_network_security(DBusMessageIter *dict, GSupplicantSSID *ssid)
7038 {
7039         char *key_mgmt;
7040
7041         switch (ssid->security) {
7042         case G_SUPPLICANT_SECURITY_NONE:
7043                 key_mgmt = "NONE";
7044                 add_network_security_none(dict);
7045                 add_network_security_ciphers(dict, ssid);
7046                 break;
7047         case G_SUPPLICANT_SECURITY_UNKNOWN:
7048         case G_SUPPLICANT_SECURITY_WEP:
7049                 key_mgmt = "NONE";
7050                 add_network_security_wep(dict, ssid);
7051                 add_network_security_ciphers(dict, ssid);
7052                 break;
7053         case G_SUPPLICANT_SECURITY_PSK:
7054                 key_mgmt = "WPA-PSK";
7055                 add_network_security_psk(dict, ssid);
7056                 add_network_security_ciphers(dict, ssid);
7057                 add_network_security_proto(dict, ssid);
7058                 break;
7059         case G_SUPPLICANT_SECURITY_IEEE8021X:
7060                 key_mgmt = "WPA-EAP";
7061                 add_network_security_eap(dict, ssid);
7062                 add_network_security_ciphers(dict, ssid);
7063                 add_network_security_proto(dict, ssid);
7064                 break;
7065 #if defined TIZEN_EXT
7066         case G_SUPPLICANT_SECURITY_FT_PSK:
7067                 key_mgmt = "FT-PSK";
7068                 add_network_security_psk(dict, ssid);
7069                 add_network_security_ciphers(dict, ssid);
7070                 add_network_security_proto(dict, ssid);
7071                 break;
7072         case G_SUPPLICANT_SECURITY_FT_IEEE8021X:
7073                 key_mgmt = "FT-EAP";
7074                 add_network_security_eap(dict, ssid);
7075                 add_network_security_ciphers(dict, ssid);
7076                 add_network_security_proto(dict, ssid);
7077                 break;
7078         case G_SUPPLICANT_SECURITY_SAE:
7079                 key_mgmt = "SAE";
7080                 add_network_security_psk(dict, ssid);
7081                 break;
7082         case G_SUPPLICANT_SECURITY_OWE:
7083                 key_mgmt = "OWE";
7084                 add_network_security_ciphers(dict, ssid);
7085                 add_network_security_proto(dict, ssid);
7086                 break;
7087         case G_SUPPLICANT_SECURITY_DPP:
7088                 key_mgmt = "DPP";
7089                 add_network_security_connector(dict, ssid);
7090                 add_network_security_c_sign_key(dict, ssid);
7091                 add_network_security_net_access_key(dict, ssid);
7092                 break;
7093 #endif
7094         }
7095
7096         supplicant_dbus_dict_append_basic(dict, "key_mgmt",
7097                                 DBUS_TYPE_STRING, &key_mgmt);
7098 }
7099
7100 static void add_network_mode(DBusMessageIter *dict, GSupplicantSSID *ssid)
7101 {
7102         dbus_uint32_t mode;
7103
7104         switch (ssid->mode) {
7105         case G_SUPPLICANT_MODE_UNKNOWN:
7106         case G_SUPPLICANT_MODE_INFRA:
7107                 mode = 0;
7108                 break;
7109         case G_SUPPLICANT_MODE_IBSS:
7110                 mode = 1;
7111                 break;
7112         case G_SUPPLICANT_MODE_MASTER:
7113                 mode = 2;
7114                 break;
7115 #if defined TIZEN_EXT_WIFI_MESH
7116         case G_SUPPLICANT_MODE_MESH:
7117                 mode = 5;
7118                 break;
7119 #endif
7120         }
7121
7122         supplicant_dbus_dict_append_basic(dict, "mode",
7123                                 DBUS_TYPE_UINT32, &mode);
7124 }
7125
7126 static void interface_add_network_params(DBusMessageIter *iter, void *user_data)
7127 {
7128         DBusMessageIter dict;
7129         struct interface_connect_data *data = user_data;
7130         GSupplicantSSID *ssid = data->ssid;
7131 #if defined TIZEN_EXT
7132         GSupplicantInterface *interface = data->interface;
7133 #endif
7134
7135         supplicant_dbus_dict_open(iter, &dict);
7136
7137         if (ssid->scan_ssid)
7138                 supplicant_dbus_dict_append_basic(&dict, "scan_ssid",
7139                                          DBUS_TYPE_UINT32, &ssid->scan_ssid);
7140
7141         if (ssid->freq)
7142                 supplicant_dbus_dict_append_basic(&dict, "frequency",
7143                                          DBUS_TYPE_UINT32, &ssid->freq);
7144
7145         if (ssid->bgscan)
7146                 supplicant_dbus_dict_append_basic(&dict, "bgscan",
7147                                         DBUS_TYPE_STRING, &ssid->bgscan);
7148
7149         add_network_mode(&dict, ssid);
7150
7151         add_network_security(&dict, ssid);
7152
7153 #if defined TIZEN_EXT
7154         add_network_ieee80211w(&dict, ssid);
7155 #endif
7156
7157         supplicant_dbus_dict_append_fixed_array(&dict, "ssid",
7158                                         DBUS_TYPE_BYTE, &ssid->ssid,
7159                                                 ssid->ssid_len);
7160
7161 #if defined TIZEN_EXT
7162         if (ssid->bssid) {
7163                 char *bssid = NULL;
7164                 bssid = g_try_malloc0(18);
7165                 if (bssid == NULL) {
7166                         SUPPLICANT_DBG("memory allocation error");
7167                         supplicant_dbus_dict_close(iter, &dict);
7168                         return;
7169                 }
7170
7171                 if (ssid->bssid_for_connect_len) {
7172                         snprintf(bssid, 18, MACSTR, MAC2STR(ssid->bssid_for_connect));
7173                         memcpy(interface->add_network_bssid, ssid->bssid_for_connect, WIFI_BSSID_LEN_MAX);
7174                 } else {
7175                         snprintf(bssid, 18, MACSTR, MAC2STR(ssid->bssid));
7176                         memcpy(interface->add_network_bssid, ssid->bssid, WIFI_BSSID_LEN_MAX);
7177                 }
7178
7179                 SUPPLICANT_DBG("bssid [" MACSTR "]", MAC2STR(interface->add_network_bssid));
7180
7181                 supplicant_dbus_dict_append_basic(&dict, "bssid",
7182                                         DBUS_TYPE_STRING, &bssid);
7183                 g_free(bssid);
7184         }
7185 #endif
7186
7187         supplicant_dbus_dict_close(iter, &dict);
7188 }
7189
7190 static void interface_wps_start_result(const char *error,
7191                                 DBusMessageIter *iter, void *user_data)
7192 {
7193         struct interface_connect_data *data = user_data;
7194         int err;
7195
7196         SUPPLICANT_DBG("");
7197
7198         err = 0;
7199         if (error) {
7200                 SUPPLICANT_DBG("error: %s", error);
7201                 err = parse_supplicant_error(iter);
7202         }
7203
7204         if(data->callback)
7205                 data->callback(err, data->interface, data->user_data);
7206
7207         g_free(data->path);
7208         g_free(data->ssid);
7209         dbus_free(data);
7210 }
7211
7212 static void interface_add_wps_params(DBusMessageIter *iter, void *user_data)
7213 {
7214         struct interface_connect_data *data = user_data;
7215         GSupplicantSSID *ssid = data->ssid;
7216         const char *role = "enrollee", *type;
7217         DBusMessageIter dict;
7218
7219         SUPPLICANT_DBG("");
7220
7221         supplicant_dbus_dict_open(iter, &dict);
7222
7223         supplicant_dbus_dict_append_basic(&dict, "Role",
7224                                                 DBUS_TYPE_STRING, &role);
7225
7226         type = "pbc";
7227         if (ssid->pin_wps) {
7228                 type = "pin";
7229                 supplicant_dbus_dict_append_basic(&dict, "Pin",
7230                                         DBUS_TYPE_STRING, &ssid->pin_wps);
7231         }
7232
7233         supplicant_dbus_dict_append_basic(&dict, "Type",
7234                                         DBUS_TYPE_STRING, &type);
7235
7236 #if defined TIZEN_EXT
7237         if (ssid->bssid)
7238                 supplicant_dbus_dict_append_fixed_array(&dict, "Bssid",
7239                                                 DBUS_TYPE_BYTE, &ssid->bssid, 6);
7240 #endif
7241
7242         supplicant_dbus_dict_close(iter, &dict);
7243 }
7244
7245 static void wps_start(const char *error, DBusMessageIter *iter, void *user_data)
7246 {
7247         struct interface_connect_data *data = user_data;
7248
7249         SUPPLICANT_DBG("");
7250
7251         if (error) {
7252                 SUPPLICANT_DBG("error: %s", error);
7253                 g_free(data->path);
7254                 g_free(data->ssid);
7255                 dbus_free(data);
7256                 return;
7257         }
7258
7259 #if defined TIZEN_EXT
7260         GSupplicantSSID *ssid = data->ssid;
7261         if (ssid->pin_wps != NULL) {
7262                 if (!g_utf8_validate(ssid->pin_wps, 8, NULL)) {
7263                         SUPPLICANT_DBG("Invalid characters in WPS_PIN");
7264                         g_free(data->ssid);
7265                         dbus_free(data);
7266                         return;
7267                 }
7268         }
7269 #endif
7270         supplicant_dbus_method_call(data->interface->path,
7271                         SUPPLICANT_INTERFACE ".Interface.WPS", "Start",
7272                         interface_add_wps_params,
7273                         interface_wps_start_result, data, NULL);
7274 }
7275
7276 static void wps_process_credentials(DBusMessageIter *iter, void *user_data)
7277 {
7278         dbus_bool_t credentials = TRUE;
7279
7280         SUPPLICANT_DBG("");
7281
7282         dbus_message_iter_append_basic(iter, DBUS_TYPE_BOOLEAN, &credentials);
7283 }
7284
7285
7286 #if defined TIZEN_EXT
7287 #define NETCONFIG_SERVICE "net.netconfig"
7288 #define NETCONFIG_WIFI_PATH "/net/netconfig/wifi"
7289 #define NETCONFIG_WIFI_INTERFACE NETCONFIG_SERVICE ".wifi"
7290
7291 struct dec_method_call_data {
7292         struct interface_connect_data *data;
7293         DBusPendingCall *pending_call;
7294 };
7295
7296 static struct dec_method_call_data decrypt_request_data;
7297
7298 static void crypt_method_call_cancel(void)
7299 {
7300         if (decrypt_request_data.pending_call) {
7301                 dbus_pending_call_cancel(decrypt_request_data.pending_call);
7302                 dbus_pending_call_unref(decrypt_request_data.pending_call);
7303                 decrypt_request_data.pending_call = NULL;
7304         }
7305
7306         g_free(decrypt_request_data.data->path);
7307         g_free(decrypt_request_data.data->ssid);
7308         dbus_free(decrypt_request_data.data);
7309         decrypt_request_data.data = NULL;
7310 }
7311
7312 static void decryption_request_reply(DBusPendingCall *call,
7313                                                 void *user_data)
7314 {
7315         DBusMessage *reply;
7316         DBusError error;
7317         DBusMessageIter args;
7318         char *out_data;
7319         int ret;
7320         struct interface_connect_data *data = user_data;
7321
7322         SUPPLICANT_DBG("");
7323
7324         reply = dbus_pending_call_steal_reply(call);
7325
7326         dbus_error_init(&error);
7327         if (dbus_set_error_from_message(&error, reply)) {
7328                 SUPPLICANT_DBG("decryption_request_reply() %s %s", error.name, error.message);
7329                 dbus_error_free(&error);
7330                 ret = -EINVAL;
7331                 goto done;
7332         }
7333
7334         if (dbus_message_iter_init(reply, &args) == FALSE) {
7335                 SUPPLICANT_DBG("dbus_message_iter_init() failed");
7336                 ret = -EINVAL;
7337                 goto done;
7338         }
7339
7340         dbus_message_iter_get_basic(&args, &out_data);
7341         data->ssid->passphrase = g_strdup((const gchar *)out_data);
7342
7343         ret = supplicant_dbus_method_call(data->interface->path,
7344                 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
7345                 interface_add_network_params,
7346                 interface_add_network_result, data,
7347                 data->interface);
7348
7349 done:
7350         if (ret < 0) {
7351                 SUPPLICANT_DBG("AddNetwork failed %d", ret);
7352                 callback_assoc_failed(decrypt_request_data.data->user_data);
7353                 g_free(data->path);
7354                 g_free(data->ssid->ssid);
7355                 g_free((char *)data->ssid->passphrase);
7356                 g_free((char *)data->ssid->connector);
7357                 g_free((char *)data->ssid->c_sign_key);
7358                 g_free((char *)data->ssid->net_access_key);
7359                 g_free(data->ssid);
7360                 dbus_free(data);
7361         }
7362
7363         dbus_message_unref(reply);
7364         dbus_pending_call_unref(call);
7365
7366         decrypt_request_data.pending_call = NULL;
7367         decrypt_request_data.data = NULL;
7368 }
7369
7370 static int send_decryption_request(const char *passphrase,
7371                         struct interface_connect_data *data)
7372 {
7373         DBusMessage *msg = NULL;
7374         DBusPendingCall *call;
7375
7376         SUPPLICANT_DBG("Decryption request");
7377
7378         if (!passphrase) {
7379                 SUPPLICANT_DBG("Invalid parameter");
7380                 return -EINVAL;
7381         }
7382
7383         if (!connection)
7384                 return -EINVAL;
7385
7386         msg = dbus_message_new_method_call(NETCONFIG_SERVICE, NETCONFIG_WIFI_PATH,
7387                         NETCONFIG_WIFI_INTERFACE, "DecryptPassphrase");
7388         if (!msg)
7389                 return -EINVAL;
7390
7391         dbus_message_append_args(msg, DBUS_TYPE_STRING, &passphrase,
7392                                                         DBUS_TYPE_INVALID);
7393
7394         if (!dbus_connection_send_with_reply(connection, msg,
7395                                 &call, DBUS_TIMEOUT_USE_DEFAULT)) {
7396                 dbus_message_unref(msg);
7397                 return -EIO;
7398         }
7399
7400         if (!call) {
7401                 dbus_message_unref(msg);
7402                 return -EIO;
7403         }
7404
7405         decrypt_request_data.pending_call = call;
7406         decrypt_request_data.data = data;
7407
7408         dbus_pending_call_set_notify(call, decryption_request_reply, data, NULL);
7409         dbus_message_unref(msg);
7410
7411         SUPPLICANT_DBG("Decryption request succeeded");
7412
7413         return 0;
7414 }
7415
7416 static void decrypt_conf_obj_reply(DBusPendingCall *call,
7417                                                 void *user_data)
7418 {
7419         DBusMessage *reply;
7420         DBusError error;
7421         DBusMessageIter iter, dict;
7422         char *out_data;
7423         int ret;
7424         struct interface_connect_data *data = user_data;
7425
7426         reply = dbus_pending_call_steal_reply(call);
7427
7428         dbus_error_init(&error);
7429         if (dbus_set_error_from_message(&error, reply)) {
7430                 SUPPLICANT_DBG("decryption_conf_obj_reply() %s %s", error.name, error.message);
7431                 dbus_error_free(&error);
7432                 ret = -EINVAL;
7433                 goto done;
7434         }
7435
7436         if (dbus_message_iter_init(reply, &iter) == FALSE) {
7437                 SUPPLICANT_DBG("dbus_message_iter_init() failed");
7438                 ret = -EINVAL;
7439                 goto done;
7440         }
7441
7442         dbus_message_iter_recurse(&iter, &dict);
7443
7444         while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_DICT_ENTRY) {
7445                 DBusMessageIter entry, value;
7446                 const char *key;
7447
7448                 dbus_message_iter_recurse(&dict, &entry);
7449                 dbus_message_iter_get_basic(&entry, &key);
7450                 dbus_message_iter_next(&entry);
7451                 dbus_message_iter_recurse(&entry, &value);
7452                 if (dbus_message_iter_get_arg_type(&value) == DBUS_TYPE_STRING) {
7453                         if (g_strcmp0(key, "connector") == 0) {
7454                                 dbus_message_iter_get_basic(&value, &out_data);
7455                                 data->ssid->connector = g_strdup((const gchar *)out_data);
7456                                 SUPPLICANT_DBG("connector %s", data->ssid->connector);
7457                         } else if (g_strcmp0(key, "c_sign_key") == 0) {
7458                                 dbus_message_iter_get_basic(&value, &out_data);
7459                                 data->ssid->c_sign_key = g_strdup((const gchar *)out_data);
7460                                 SUPPLICANT_DBG("c_sign_key %s", data->ssid->c_sign_key);
7461                         } else if (g_strcmp0(key, "net_access_key") == 0) {
7462                                 dbus_message_iter_get_basic(&value, &out_data);
7463                                 data->ssid->net_access_key = g_strdup((const gchar *)out_data);
7464                                 SUPPLICANT_DBG("net_access_key %s", data->ssid->net_access_key);
7465                         }
7466                 }
7467                 dbus_message_iter_next(&dict);
7468         }
7469
7470         ret = supplicant_dbus_method_call(data->interface->path,
7471                 SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
7472                 interface_add_network_params,
7473                 interface_add_network_result, data,
7474                 data->interface);
7475
7476 done:
7477         if (ret < 0) {
7478                 SUPPLICANT_DBG("AddNetwork failed %d", ret);
7479                 callback_assoc_failed(decrypt_request_data.data->user_data);
7480                 g_free(data->path);
7481                 g_free(data->ssid->ssid);
7482                 g_free((char *)data->ssid->connector);
7483                 g_free((char *)data->ssid->c_sign_key);
7484                 g_free((char *)data->ssid->net_access_key);
7485                 g_free(data->ssid);
7486                 dbus_free(data);
7487         }
7488
7489         dbus_message_unref(reply);
7490         dbus_pending_call_unref(call);
7491
7492         decrypt_request_data.pending_call = NULL;
7493         decrypt_request_data.data = NULL;
7494 }
7495
7496 static int send_decryption_conf_obj_request(GSupplicantSSID *ssid,
7497                         struct interface_connect_data *data)
7498 {
7499         DBusMessage *msg = NULL;
7500         DBusPendingCall *call;
7501
7502         SUPPLICANT_DBG("Decryption configuration object request");
7503
7504         if (!ssid) {
7505                 SUPPLICANT_DBG("Invalid parameter");
7506                 return -EINVAL;
7507         }
7508
7509         if (!connection)
7510                 return -EINVAL;
7511
7512         msg = dbus_message_new_method_call(NETCONFIG_SERVICE, NETCONFIG_WIFI_PATH,
7513                         NETCONFIG_WIFI_INTERFACE, "DecryptConfObj");
7514         if (!msg)
7515                 return -EINVAL;
7516
7517         dbus_message_append_args(msg, DBUS_TYPE_STRING, &ssid->connector,
7518                                                         DBUS_TYPE_INVALID);
7519         dbus_message_append_args(msg, DBUS_TYPE_STRING, &ssid->c_sign_key,
7520                                                         DBUS_TYPE_INVALID);
7521         dbus_message_append_args(msg, DBUS_TYPE_STRING, &ssid->net_access_key,
7522                                                         DBUS_TYPE_INVALID);
7523
7524         if (!dbus_connection_send_with_reply(connection, msg,
7525                                 &call, DBUS_TIMEOUT_USE_DEFAULT)) {
7526                 dbus_message_unref(msg);
7527                 return -EIO;
7528         }
7529
7530         if (!call) {
7531                 dbus_message_unref(msg);
7532                 return -EIO;
7533         }
7534
7535         decrypt_request_data.pending_call = call;
7536         decrypt_request_data.data = data;
7537
7538         dbus_pending_call_set_notify(call, decrypt_conf_obj_reply, data, NULL);
7539         dbus_message_unref(msg);
7540
7541         SUPPLICANT_DBG("Decrypt Conf Obj request succeeded");
7542
7543         return 0;
7544 }
7545
7546 static bool is_valid_config_object(GSupplicantSSID *ssid)
7547 {
7548         return ((ssid->connector &&
7549                         g_strcmp0(ssid->connector, "") != 0) &&
7550                         (ssid->c_sign_key &&
7551                         g_strcmp0(ssid->c_sign_key, "") != 0) &&
7552                         (ssid->net_access_key &&
7553                         g_strcmp0(ssid->net_access_key, "") != 0));
7554 }
7555 #endif
7556
7557 int g_supplicant_interface_connect(GSupplicantInterface *interface,
7558                                 GSupplicantSSID *ssid,
7559                                 GSupplicantInterfaceCallback callback,
7560                                                         void *user_data)
7561 {
7562         struct interface_connect_data *data;
7563         struct interface_data *intf_data;
7564         int ret = 0;
7565
7566         SUPPLICANT_DBG("");
7567
7568         if (!interface)
7569                 return -EINVAL;
7570
7571         if (!system_available)
7572                 return -EFAULT;
7573
7574         /* TODO: Check if we're already connected and switch */
7575
7576         data = dbus_malloc0(sizeof(*data));
7577         if (!data)
7578                 return -ENOMEM;
7579
7580         data->interface = interface;
7581         data->path = g_strdup(interface->path);
7582         data->callback = callback;
7583         data->ssid = ssid;
7584         data->user_data = user_data;
7585
7586         if (ssid->use_wps) {
7587                 g_free(interface->wps_cred.key);
7588                 memset(&interface->wps_cred, 0,
7589                                 sizeof(struct _GSupplicantWpsCredentials));
7590
7591                 ret = supplicant_dbus_property_set(interface->path,
7592                         SUPPLICANT_INTERFACE ".Interface.WPS",
7593                         "ProcessCredentials", DBUS_TYPE_BOOLEAN_AS_STRING,
7594                         wps_process_credentials, wps_start, data, interface);
7595         } else {
7596                 /* By the time there is a request for connect and the network
7597                  * path is not NULL it means that connman has not removed the
7598                  * previous network pointer. This can happen in the case AP
7599                  * deauthenticated client and connman does not remove the
7600                  * previously connected network pointer. This causes supplicant
7601                  * to reallocate the memory for struct wpa_ssid again even if it
7602                  * is the same SSID. This causes memory usage of wpa_supplicnat
7603                  * to go high. The idea here is that if the previously connected
7604                  * network is not removed at the time of next connection attempt
7605                  * check if the network path is not NULL. In case it is non-NULL
7606                  * first remove the network and then once removal is successful, add
7607                  * the network.
7608                  */
7609
7610                 if (interface->network_path != NULL) {
7611                         g_free(data->path);
7612                         dbus_free(data);
7613
7614                         /*
7615                          * If this add network is for the same network for
7616                          * which wpa_supplicant already has a profile then do
7617                          * not need to add another profile. Only if the
7618                          * profile that needs to get added is different from
7619                          * what is there in wpa_s delete the current one. A
7620                          * network is identified by its SSID, security_type
7621                          * and passphrase (private passphrase in case security
7622                          * type is 802.11x).
7623                          */
7624                         if (compare_network_parameters(interface, ssid)) {
7625                                 return -EALREADY;
7626                         }
7627
7628                         intf_data = dbus_malloc0(sizeof(*intf_data));
7629                         if (!intf_data)
7630                                 return -ENOMEM;
7631
7632                         intf_data->interface = interface;
7633                         intf_data->path = g_strdup(interface->path);
7634                         intf_data->callback = callback;
7635                         intf_data->ssid = ssid;
7636                         intf_data->user_data = user_data;
7637                         intf_data->network_remove_in_progress = TRUE;
7638                         network_remove(intf_data);
7639                 } else {
7640 #if defined TIZEN_EXT
7641                         if (ssid->passphrase &&
7642                             g_strcmp0(ssid->passphrase, "") != 0 &&
7643 #if defined TIZEN_EXT_WIFI_MESH
7644                             ssid->mode != G_SUPPLICANT_MODE_MESH &&
7645 #endif
7646                             !ssid->eap) {
7647                                 ret = send_decryption_request(ssid->passphrase, data);
7648                                 if (ret < 0)
7649                                         SUPPLICANT_DBG("Decryption request failed %d", ret);
7650                         } else if (is_valid_config_object(ssid)) {
7651                                 ret = send_decryption_conf_obj_request(ssid, data);
7652                                 if (ret < 0)
7653                                         SUPPLICANT_DBG("Decryption Conf Obj request failed %d", ret);
7654
7655                         } else
7656 #endif
7657                         ret = supplicant_dbus_method_call(interface->path,
7658                                         SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
7659                                         interface_add_network_params,
7660                                         interface_add_network_result, data,
7661                                         interface);
7662                 }
7663         }
7664
7665         if (ret < 0) {
7666                 g_free(data->path);
7667                 dbus_free(data);
7668                 return ret;
7669         }
7670
7671         return -EINPROGRESS;
7672 }
7673
7674 static void network_remove_result(const char *error,
7675                                 DBusMessageIter *iter, void *user_data)
7676 {
7677         struct interface_data *data = user_data;
7678         struct interface_connect_data *connect_data;
7679         int result = 0;
7680
7681         SUPPLICANT_DBG("");
7682
7683         if (error) {
7684                 result = -EIO;
7685                 SUPPLICANT_DBG("error: %s", error);
7686
7687                 if (g_strcmp0("org.freedesktop.DBus.Error.UnknownMethod",
7688                                                 error) == 0)
7689                         result = -ECONNABORTED;
7690         }
7691
7692         g_free(data->interface->network_path);
7693         data->interface->network_path = NULL;
7694
7695         remove_network_information(data->interface);
7696
7697         if (data->network_remove_in_progress == TRUE) {
7698                 data->network_remove_in_progress = FALSE;
7699                 connect_data = dbus_malloc0(sizeof(*connect_data));
7700                 if (!connect_data)
7701                         return;
7702
7703                 connect_data->interface = data->interface;
7704                 connect_data->path = g_strdup(data->path);
7705                 connect_data->callback = data->callback;
7706                 connect_data->ssid = data->ssid;
7707                 connect_data->user_data = data->user_data;
7708
7709 #if defined TIZEN_EXT
7710                 int ret;
7711                 if (data->ssid->passphrase && g_strcmp0(data->ssid->passphrase, "") != 0
7712                         && !data->ssid->eap) {
7713                         ret = send_decryption_request(data->ssid->passphrase, connect_data);
7714                         if (ret < 0) {
7715                                 SUPPLICANT_DBG("Decryption request failed %d", ret);
7716                                 g_free(connect_data->ssid);
7717                                 g_free(connect_data->path);
7718                                 dbus_free(connect_data);
7719                         }
7720                 } else if (is_valid_config_object(data->ssid)) {
7721                         ret = send_decryption_conf_obj_request(data->ssid, connect_data);
7722                         if (ret < 0) {
7723                                 SUPPLICANT_DBG("Decryption Conf Obj request failed %d", ret);
7724                                 g_free(connect_data->ssid);
7725                                 g_free(connect_data->path);
7726                                 dbus_free(connect_data);
7727                         }
7728                 } else
7729 #endif
7730                 supplicant_dbus_method_call(data->interface->path,
7731                         SUPPLICANT_INTERFACE ".Interface", "AddNetwork",
7732                         interface_add_network_params,
7733                         interface_add_network_result, connect_data,
7734                         connect_data->interface);
7735         } else {
7736                 if (data->callback)
7737                         data->callback(result, data->interface, data->user_data);
7738         }
7739         g_free(data->path);
7740         dbus_free(data);
7741 }
7742
7743 static void network_remove_params(DBusMessageIter *iter, void *user_data)
7744 {
7745         struct interface_data *data = user_data;
7746         const char *path = data->interface->network_path;
7747
7748         SUPPLICANT_DBG("path %s", path);
7749
7750         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH, &path);
7751 }
7752
7753 static int network_remove(struct interface_data *data)
7754 {
7755         GSupplicantInterface *interface = data->interface;
7756
7757         SUPPLICANT_DBG("");
7758
7759 #if defined TIZEN_EXT
7760         GSupplicantInterface *intf = NULL;
7761         /*
7762          * Check if 'interface' is valid
7763          */
7764         intf = g_hash_table_lookup(interface_table, interface->path);
7765         if (intf == NULL)
7766                 return -EINVAL;
7767 #endif
7768
7769         return supplicant_dbus_method_call(interface->path,
7770                         SUPPLICANT_INTERFACE ".Interface", "RemoveNetwork",
7771                         network_remove_params, network_remove_result, data,
7772                         interface);
7773 }
7774
7775 static void interface_disconnect_result(const char *error,
7776                                 DBusMessageIter *iter, void *user_data)
7777 {
7778         struct interface_data *data = user_data;
7779         int result = 0;
7780
7781         SUPPLICANT_DBG("");
7782
7783         if (error) {
7784                 result = -EIO;
7785                 SUPPLICANT_DBG("error: %s", error);
7786
7787                 if (g_strcmp0("org.freedesktop.DBus.Error.UnknownMethod",
7788                                                 error) == 0)
7789                         result = -ECONNABORTED;
7790         }
7791
7792         /* If we are disconnecting from previous WPS successful
7793          * association. i.e.: it did not went through AddNetwork,
7794          * and interface->network_path was never set. */
7795         if (!data->interface->network_path) {
7796                 if (data->callback)
7797                         data->callback(result, data->interface,
7798                                                         data->user_data);
7799
7800                 g_free(data->path);
7801                 dbus_free(data);
7802                 return;
7803         }
7804
7805         if (result < 0 && data->callback) {
7806                 data->callback(result, data->interface, data->user_data);
7807                 data->callback = NULL;
7808         }
7809
7810         if (result != -ECONNABORTED) {
7811                 if (network_remove(data) < 0) {
7812                         g_free(data->path);
7813                         dbus_free(data);
7814                 }
7815         } else {
7816                 g_free(data->path);
7817                 dbus_free(data);
7818         }
7819 }
7820
7821 int g_supplicant_interface_disconnect(GSupplicantInterface *interface,
7822                                         GSupplicantInterfaceCallback callback,
7823                                                         void *user_data)
7824 {
7825         struct interface_data *data;
7826         int ret;
7827
7828         SUPPLICANT_DBG("");
7829
7830         if (!interface)
7831                 return -EINVAL;
7832
7833         if (!system_available)
7834                 return -EFAULT;
7835 #if defined TIZEN_EXT
7836         if (decrypt_request_data.pending_call &&
7837                         decrypt_request_data.data &&
7838                         decrypt_request_data.data->user_data == user_data) {
7839
7840                 callback_assoc_failed(decrypt_request_data.data->user_data);
7841                 crypt_method_call_cancel();
7842
7843                 return 0;
7844         }
7845 #endif
7846         data = dbus_malloc0(sizeof(*data));
7847         if (!data)
7848                 return -ENOMEM;
7849
7850         data->interface = interface;
7851         data->path = g_strdup(interface->path);
7852         data->callback = callback;
7853         data->user_data = user_data;
7854
7855         ret = supplicant_dbus_method_call(interface->path,
7856                         SUPPLICANT_INTERFACE ".Interface", "Disconnect",
7857                         NULL, interface_disconnect_result, data,
7858                         interface);
7859
7860         if (ret < 0) {
7861                 g_free(data->path);
7862                 dbus_free(data);
7863         }
7864
7865         return ret;
7866 }
7867
7868 static void interface_p2p_find_result(const char *error,
7869                                         DBusMessageIter *iter, void *user_data)
7870 {
7871         struct interface_scan_data *data = user_data;
7872         int err = 0;
7873
7874         SUPPLICANT_DBG("error %s", error);
7875
7876         if (error)
7877                 err = -EIO;
7878
7879         if (interface_exists(data->interface, data->path)) {
7880                 if (!data->interface->ready)
7881                         err = -ENOLINK;
7882                 if (!err)
7883                         data->interface->p2p_finding = true;
7884         }
7885
7886         if (data->callback)
7887                 data->callback(err, data->interface, data->user_data);
7888
7889         g_free(data->path);
7890         dbus_free(data);
7891 }
7892
7893 static void interface_p2p_find_params(DBusMessageIter *iter, void *user_data)
7894 {
7895         DBusMessageIter dict;
7896
7897         supplicant_dbus_dict_open(iter, &dict);
7898         supplicant_dbus_dict_close(iter, &dict);
7899 }
7900
7901 int g_supplicant_interface_p2p_find(GSupplicantInterface *interface,
7902                                         GSupplicantInterfaceCallback callback,
7903                                                         void *user_data)
7904 {
7905         struct interface_scan_data *data;
7906         int ret;
7907
7908         if (!interface->p2p_support)
7909                 return -ENOTSUP;
7910
7911         ret = interface_ready_to_scan(interface);
7912         if (ret && ret != -EALREADY)
7913                 return ret;
7914
7915         data = dbus_malloc0(sizeof(*data));
7916         if (!data)
7917                 return -ENOMEM;
7918
7919         data->interface = interface;
7920         data->path = g_strdup(interface->path);
7921         data->callback = callback;
7922         data->user_data = user_data;
7923
7924         ret = supplicant_dbus_method_call(interface->path,
7925                         SUPPLICANT_INTERFACE ".Interface.P2PDevice", "Find",
7926                         interface_p2p_find_params, interface_p2p_find_result,
7927                         data, interface);
7928         if (ret < 0) {
7929                 g_free(data->path);
7930                 dbus_free(data);
7931         }
7932
7933         return ret;
7934 }
7935
7936 bool g_supplicant_interface_is_p2p_finding(GSupplicantInterface *interface)
7937 {
7938         if (!interface)
7939                 return false;
7940
7941         return interface->p2p_finding;
7942 }
7943
7944 int g_supplicant_interface_p2p_stop_find(GSupplicantInterface *interface)
7945 {
7946         if (!interface->p2p_finding)
7947                 return 0;
7948
7949         SUPPLICANT_DBG("");
7950
7951         interface->p2p_finding = false;
7952
7953         return supplicant_dbus_method_call(interface->path,
7954                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "StopFind",
7955                 NULL, NULL, NULL, NULL);
7956 }
7957
7958 static void interface_p2p_connect_result(const char *error,
7959                                         DBusMessageIter *iter, void *user_data)
7960 {
7961         struct interface_connect_data *data = user_data;
7962         int err = 0;
7963
7964         SUPPLICANT_DBG("");
7965
7966         if (error) {
7967                 SUPPLICANT_DBG("error: %s", error);
7968                 err = parse_supplicant_error(iter);
7969         }
7970
7971         if (data->callback)
7972                 data->callback(err, data->interface, data->user_data);
7973
7974         g_free(data->path);
7975         g_free(data->peer->wps_pin);
7976         g_free(data->peer->path);
7977         g_free(data->peer);
7978         g_free(data);
7979 }
7980
7981 static void interface_p2p_connect_params(DBusMessageIter *iter, void *user_data)
7982 {
7983         struct interface_connect_data *data = user_data;
7984         const char *wps = "pbc";
7985         DBusMessageIter dict;
7986         int go_intent = 7;
7987
7988         SUPPLICANT_DBG("");
7989
7990         supplicant_dbus_dict_open(iter, &dict);
7991
7992         if (data->peer->master)
7993                 go_intent = 15;
7994
7995         if (data->peer->wps_pin)
7996                 wps = "pin";
7997
7998         supplicant_dbus_dict_append_basic(&dict, "peer",
7999                                 DBUS_TYPE_OBJECT_PATH, &data->peer->path);
8000         supplicant_dbus_dict_append_basic(&dict, "wps_method",
8001                                 DBUS_TYPE_STRING, &wps);
8002         if (data->peer->wps_pin) {
8003                 supplicant_dbus_dict_append_basic(&dict, "pin",
8004                                 DBUS_TYPE_STRING, &data->peer->wps_pin);
8005         }
8006
8007         supplicant_dbus_dict_append_basic(&dict, "go_intent",
8008                                         DBUS_TYPE_INT32, &go_intent);
8009
8010         supplicant_dbus_dict_close(iter, &dict);
8011 }
8012
8013 int g_supplicant_interface_p2p_connect(GSupplicantInterface *interface,
8014                                         GSupplicantPeerParams *peer_params,
8015                                         GSupplicantInterfaceCallback callback,
8016                                         void *user_data)
8017 {
8018         struct interface_connect_data *data;
8019         int ret;
8020
8021         SUPPLICANT_DBG("");
8022
8023         if (!interface->p2p_support)
8024                 return -ENOTSUP;
8025
8026         data = dbus_malloc0(sizeof(*data));
8027         if (!data)
8028                 return -ENOMEM;
8029
8030         data->interface = interface;
8031         data->path = g_strdup(interface->path);
8032         data->peer = peer_params;
8033         data->callback = callback;
8034         data->user_data = user_data;
8035
8036         ret = supplicant_dbus_method_call(interface->path,
8037                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "Connect",
8038                 interface_p2p_connect_params, interface_p2p_connect_result,
8039                 data, interface);
8040         if (ret < 0) {
8041                 g_free(data->path);
8042                 dbus_free(data);
8043                 return ret;
8044         }
8045
8046         return -EINPROGRESS;
8047 }
8048
8049 int g_supplicant_interface_p2p_disconnect(GSupplicantInterface *interface,
8050                                         GSupplicantPeerParams *peer_params)
8051 {
8052         GSupplicantPeer *peer;
8053         int count = 0;
8054         GSList *list;
8055
8056         SUPPLICANT_DBG("");
8057
8058         if (!interface->p2p_support)
8059                 return -ENOTSUP;
8060
8061         peer = g_hash_table_lookup(interface->peer_table, peer_params->path);
8062         if (!peer)
8063                 return -ENODEV;
8064
8065         for (list = peer->groups; list; list = list->next, count++) {
8066                 const char *group_obj_path = list->data;
8067                 GSupplicantInterface *g_interface;
8068                 GSupplicantGroup *group;
8069
8070                 group = g_hash_table_lookup(group_mapping, group_obj_path);
8071                 if (!group || !group->interface)
8072                         continue;
8073
8074                 g_interface = group->interface;
8075                 supplicant_dbus_method_call(g_interface->path,
8076                                 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
8077                                 "Disconnect", NULL, NULL, NULL, g_interface);
8078         }
8079
8080         if (count == 0 && peer->current_group_iface) {
8081                 supplicant_dbus_method_call(peer->current_group_iface->path,
8082                                 SUPPLICANT_INTERFACE ".Interface.P2PDevice",
8083                                 "Disconnect", NULL, NULL, NULL,
8084                                 peer->current_group_iface->path);
8085         }
8086
8087         peer->current_group_iface = NULL;
8088
8089         return -EINPROGRESS;
8090 }
8091
8092 struct p2p_service_data {
8093         bool registration;
8094         GSupplicantInterface *interface;
8095         GSupplicantP2PServiceParams *service;
8096         GSupplicantInterfaceCallback callback;
8097         void *user_data;
8098 };
8099
8100 static void interface_p2p_service_result(const char *error,
8101                                         DBusMessageIter *iter, void *user_data)
8102 {
8103         struct p2p_service_data *data = user_data;
8104         int result = 0;
8105
8106         SUPPLICANT_DBG("%s result - %s", data->registration ?
8107                                 "Registration" : "Deletion",
8108                                 error ? error : "Success");
8109         if (error)
8110                 result = -EINVAL;
8111
8112         if (data->callback)
8113                 data->callback(result, data->interface, data->user_data);
8114
8115         g_free(data->service->query);
8116         g_free(data->service->response);
8117         g_free(data->service->service);
8118         g_free(data->service->wfd_ies);
8119         g_free(data->service);
8120         dbus_free(data);
8121 }
8122
8123 static void interface_p2p_service_params(DBusMessageIter *iter,
8124                                                         void *user_data)
8125 {
8126         struct p2p_service_data *data = user_data;
8127         GSupplicantP2PServiceParams *service;
8128         DBusMessageIter dict;
8129         const char *type;
8130
8131         SUPPLICANT_DBG("");
8132
8133         service = data->service;
8134
8135         supplicant_dbus_dict_open(iter, &dict);
8136
8137         if (service->query && service->response) {
8138                 type = "bonjour";
8139                 supplicant_dbus_dict_append_basic(&dict, "service_type",
8140                                                 DBUS_TYPE_STRING, &type);
8141                 supplicant_dbus_dict_append_fixed_array(&dict, "query",
8142                                         DBUS_TYPE_BYTE, &service->query,
8143                                         service->query_length);
8144                 supplicant_dbus_dict_append_fixed_array(&dict, "response",
8145                                         DBUS_TYPE_BYTE, &service->response,
8146                                         service->response_length);
8147         } else if (service->version && service->service) {
8148                 type = "upnp";
8149                 supplicant_dbus_dict_append_basic(&dict, "service_type",
8150                                                 DBUS_TYPE_STRING, &type);
8151                 supplicant_dbus_dict_append_basic(&dict, "version",
8152                                         DBUS_TYPE_INT32, &service->version);
8153                 supplicant_dbus_dict_append_basic(&dict, "service",
8154                                         DBUS_TYPE_STRING, &service->service);
8155         }
8156
8157         supplicant_dbus_dict_close(iter, &dict);
8158 }
8159
8160 int g_supplicant_interface_p2p_add_service(GSupplicantInterface *interface,
8161                                 GSupplicantInterfaceCallback callback,
8162                                 GSupplicantP2PServiceParams *p2p_service_params,
8163                                 void *user_data)
8164 {
8165         struct p2p_service_data *data;
8166         int ret;
8167
8168         SUPPLICANT_DBG("");
8169
8170         if (!interface->p2p_support)
8171                 return -ENOTSUP;
8172
8173         data = dbus_malloc0(sizeof(*data));
8174         if (!data)
8175                 return -ENOMEM;
8176
8177         data->registration = true;
8178         data->interface = interface;
8179         data->service = p2p_service_params;
8180         data->callback = callback;
8181         data->user_data = user_data;
8182
8183         ret = supplicant_dbus_method_call(interface->path,
8184                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "AddService",
8185                 interface_p2p_service_params, interface_p2p_service_result,
8186                 data, interface);
8187         if (ret < 0) {
8188                 dbus_free(data);
8189                 return ret;
8190         }
8191
8192         return -EINPROGRESS;
8193 }
8194
8195 int g_supplicant_interface_p2p_del_service(GSupplicantInterface *interface,
8196                                 GSupplicantP2PServiceParams *p2p_service_params)
8197 {
8198         struct p2p_service_data *data;
8199         int ret;
8200
8201         SUPPLICANT_DBG("");
8202
8203         if (!interface->p2p_support)
8204                 return -ENOTSUP;
8205
8206         data = dbus_malloc0(sizeof(*data));
8207         if (!data)
8208                 return -ENOMEM;
8209
8210         data->interface = interface;
8211         data->service = p2p_service_params;
8212
8213         ret = supplicant_dbus_method_call(interface->path,
8214                 SUPPLICANT_INTERFACE ".Interface.P2PDevice", "DeleteService",
8215                 interface_p2p_service_params, interface_p2p_service_result,
8216                 data, interface);
8217         if (ret < 0) {
8218                 dbus_free(data);
8219                 return ret;
8220         }
8221
8222         return -EINPROGRESS;
8223 }
8224
8225 struct p2p_listen_data {
8226         int period;
8227         int interval;
8228 };
8229
8230 static void interface_p2p_listen_params(DBusMessageIter *iter, void *user_data)
8231 {
8232         struct p2p_listen_data *params = user_data;
8233         DBusMessageIter dict;
8234
8235         supplicant_dbus_dict_open(iter, &dict);
8236
8237         supplicant_dbus_dict_append_basic(&dict, "period",
8238                                         DBUS_TYPE_INT32, &params->period);
8239         supplicant_dbus_dict_append_basic(&dict, "interval",
8240                                         DBUS_TYPE_INT32, &params->interval);
8241         supplicant_dbus_dict_close(iter, &dict);
8242 }
8243
8244 int g_supplicant_interface_p2p_listen(GSupplicantInterface *interface,
8245                                                 int period, int interval)
8246 {
8247         struct p2p_listen_data params;
8248
8249         SUPPLICANT_DBG("");
8250
8251         if (!interface->p2p_support)
8252                 return -ENOTSUP;
8253
8254         params.period = period;
8255         params.interval = interval;
8256
8257         return supplicant_dbus_method_call(interface->path,
8258                         SUPPLICANT_INTERFACE ".Interface.P2PDevice",
8259                         "ExtendedListen", interface_p2p_listen_params,
8260                         NULL, &params, NULL);
8261 }
8262
8263 static void widi_ies_params(DBusMessageIter *iter, void *user_data)
8264 {
8265         struct p2p_service_data *data = user_data;
8266         GSupplicantP2PServiceParams *service = data->service;
8267         DBusMessageIter array;
8268
8269         SUPPLICANT_DBG("%p - %d", service->wfd_ies, service->wfd_ies_length);
8270
8271         dbus_message_iter_open_container(iter, DBUS_TYPE_ARRAY,
8272                                         DBUS_TYPE_BYTE_AS_STRING, &array);
8273
8274         if (service->wfd_ies && service->wfd_ies_length > 0) {
8275                 dbus_message_iter_append_fixed_array(&array, DBUS_TYPE_BYTE,
8276                                 &service->wfd_ies, service->wfd_ies_length);
8277         }
8278
8279         dbus_message_iter_close_container(iter, &array);
8280 }
8281
8282 int g_supplicant_set_widi_ies(GSupplicantP2PServiceParams *p2p_service_params,
8283                                         GSupplicantInterfaceCallback callback,
8284                                         void *user_data)
8285 {
8286         struct p2p_service_data *data;
8287         int ret;
8288
8289         SUPPLICANT_DBG("");
8290
8291         if (!system_available)
8292                 return -EFAULT;
8293
8294         data = dbus_malloc0(sizeof(*data));
8295         if (!data)
8296                 return -ENOMEM;
8297
8298         data->service = p2p_service_params;
8299         data->callback = callback;
8300         data->user_data = user_data;
8301
8302         if (p2p_service_params->wfd_ies)
8303                 data->registration = true;
8304
8305         ret = supplicant_dbus_property_set(SUPPLICANT_PATH,
8306                                         SUPPLICANT_INTERFACE, "WFDIEs",
8307                                         DBUS_TYPE_ARRAY_AS_STRING
8308                                         DBUS_TYPE_BYTE_AS_STRING,
8309                                         widi_ies_params,
8310                                         interface_p2p_service_result,
8311                                         data, NULL);
8312         if (ret < 0 && ret != -EINPROGRESS) {
8313                 dbus_free(data);
8314                 return ret;
8315         }
8316
8317         return -EINPROGRESS;
8318 }
8319
8320
8321 static const char *g_supplicant_rule0 = "type=signal,"
8322                                         "path=" DBUS_PATH_DBUS ","
8323                                         "sender=" DBUS_SERVICE_DBUS ","
8324                                         "interface=" DBUS_INTERFACE_DBUS ","
8325                                         "member=NameOwnerChanged,"
8326                                         "arg0=" SUPPLICANT_SERVICE;
8327 static const char *g_supplicant_rule1 = "type=signal,"
8328                         "interface=" SUPPLICANT_INTERFACE;
8329 static const char *g_supplicant_rule2 = "type=signal,"
8330                         "interface=" SUPPLICANT_INTERFACE ".Interface";
8331 static const char *g_supplicant_rule3 = "type=signal,"
8332                         "interface=" SUPPLICANT_INTERFACE ".Interface.WPS";
8333 static const char *g_supplicant_rule4 = "type=signal,"
8334                         "interface=" SUPPLICANT_INTERFACE ".BSS";
8335 static const char *g_supplicant_rule5 = "type=signal,"
8336                         "interface=" SUPPLICANT_INTERFACE ".Network";
8337 #if !defined TIZEN_EXT
8338 static const char *g_supplicant_rule6 = "type=signal,"
8339                 "interface=" SUPPLICANT_INTERFACE ".Interface.P2PDevice";
8340 static const char *g_supplicant_rule7 = "type=signal,"
8341                 "interface=" SUPPLICANT_INTERFACE ".Peer";
8342 static const char *g_supplicant_rule8 = "type=signal,"
8343                 "interface=" SUPPLICANT_INTERFACE ".Group";
8344 #endif
8345 #if defined TIZEN_EXT_WIFI_MESH
8346 static const char *g_supplicant_rule9 = "type=signal,"
8347                 "interface=" SUPPLICANT_INTERFACE ".Interface.Mesh";
8348 #endif
8349
8350 static void invoke_introspect_method(void)
8351 {
8352         DBusMessage *message;
8353
8354         message = dbus_message_new_method_call(SUPPLICANT_SERVICE,
8355                                         SUPPLICANT_PATH,
8356                                         DBUS_INTERFACE_INTROSPECTABLE,
8357                                         "Introspect");
8358
8359         if (!message)
8360                 return;
8361
8362         dbus_message_set_no_reply(message, TRUE);
8363         dbus_connection_send(connection, message, NULL);
8364         dbus_message_unref(message);
8365 }
8366
8367 #if defined TIZEN_EXT
8368 void g_supplicant_set_ins_settings(GSupplicantINSPreferredFreq preferred_freq_bssid,
8369                 bool last_connected_bssid, bool assoc_reject, bool signal_bssid,
8370                 unsigned int preferred_freq_bssid_score, unsigned int last_connected_bssid_score,
8371                 unsigned int assoc_reject_score, int signal_level3_5ghz, int signal_level3_24ghz)
8372 {
8373         ins_settings.preferred_freq_bssid = preferred_freq_bssid;
8374         ins_settings.last_connected_bssid = last_connected_bssid;
8375         ins_settings.assoc_reject = assoc_reject;
8376         ins_settings.signal_bssid = signal_bssid;
8377         ins_settings.preferred_freq_bssid_score = preferred_freq_bssid_score;
8378         ins_settings.last_connected_bssid_score = last_connected_bssid_score;
8379         ins_settings.assoc_reject_score = assoc_reject_score;
8380         ins_settings.signal_level3_5ghz = signal_level3_5ghz;
8381         ins_settings.signal_level3_24ghz = signal_level3_24ghz;
8382
8383         SUPPLICANT_DBG("preferred_freq_bssid [%s]", preferred_freq_bssid ? "true" : "false");
8384         SUPPLICANT_DBG("preferred_freq_bssid_score [%d]", preferred_freq_bssid_score);
8385         SUPPLICANT_DBG("last_connected_bssid [%s]", last_connected_bssid ? "true" : "false");
8386         SUPPLICANT_DBG("last_connected_bssid_score [%d]", last_connected_bssid_score);
8387         SUPPLICANT_DBG("assoc_reject [%s]", assoc_reject ? "true" : "false");
8388         SUPPLICANT_DBG("assoc_reject_score [%d]", assoc_reject_score);
8389         SUPPLICANT_DBG("signal_bssid [%s]", signal_bssid ? "true" : "false");
8390         SUPPLICANT_DBG("signal_level3_5ghz [%d]", signal_level3_5ghz);
8391         SUPPLICANT_DBG("signal_level3_24ghz [%d]", signal_level3_24ghz);
8392 }
8393 #endif
8394
8395 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
8396 void g_supplicant_register_eap_callback(g_supplicant_eap_callback cb)
8397 {
8398         SUPPLICANT_DBG("g_supplicant_register_eap_callback %p", cb);
8399
8400         if (!callbacks_pointer) {
8401                 SUPPLICANT_DBG("callbacks_pointer is NULL");
8402                 return;
8403         }
8404
8405         callbacks_pointer->eap = cb;
8406 }
8407
8408 void g_supplicant_unregister_eap_callback(void)
8409 {
8410         SUPPLICANT_DBG("g_supplicant_unregister_eap_callback");
8411
8412         if (!callbacks_pointer) {
8413                 SUPPLICANT_DBG("callbacks_pointer is NULL");
8414                 return;
8415         }
8416
8417         callbacks_pointer->eap = NULL;
8418 }
8419 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
8420
8421 #if defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET
8422 int g_supplicant_register(GSupplicantCallbacks *callbacks)
8423 #else /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
8424 int g_supplicant_register(const GSupplicantCallbacks *callbacks)
8425 #endif /* defined TIZEN_EXT && defined TIZEN_EXT_EAP_ON_ETHERNET */
8426 {
8427         connection = dbus_bus_get(DBUS_BUS_SYSTEM, NULL);
8428         if (!connection)
8429                 return -EIO;
8430
8431         if (!dbus_connection_add_filter(connection, g_supplicant_filter,
8432                                                 NULL, NULL)) {
8433                 dbus_connection_unref(connection);
8434                 connection = NULL;
8435                 return -EIO;
8436         }
8437
8438         callbacks_pointer = callbacks;
8439         eap_methods = 0;
8440
8441         interface_table = g_hash_table_new_full(g_str_hash, g_str_equal,
8442                                                 NULL, remove_interface);
8443
8444         bss_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
8445                                                                 NULL, NULL);
8446         peer_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
8447                                                                 NULL, NULL);
8448         group_mapping = g_hash_table_new_full(g_str_hash, g_str_equal,
8449                                                                 NULL, NULL);
8450         pending_peer_connection = g_hash_table_new_full(g_str_hash, g_str_equal,
8451                                                                 NULL, NULL);
8452         config_file_table = g_hash_table_new_full(g_str_hash, g_str_equal,
8453                                                                 g_free, g_free);
8454
8455         supplicant_dbus_setup(connection);
8456
8457         dbus_bus_add_match(connection, g_supplicant_rule0, NULL);
8458         dbus_bus_add_match(connection, g_supplicant_rule1, NULL);
8459         dbus_bus_add_match(connection, g_supplicant_rule2, NULL);
8460         dbus_bus_add_match(connection, g_supplicant_rule3, NULL);
8461         dbus_bus_add_match(connection, g_supplicant_rule4, NULL);
8462         dbus_bus_add_match(connection, g_supplicant_rule5, NULL);
8463 #if defined TIZEN_EXT
8464         dbus_bus_add_match(connection,
8465                         "type=signal,interface=org.tizen.system.deviced.PowerOff,"
8466                         "member=ChangeState", NULL);
8467 #endif
8468 #if !defined TIZEN_EXT
8469         dbus_bus_add_match(connection, g_supplicant_rule6, NULL);
8470         dbus_bus_add_match(connection, g_supplicant_rule7, NULL);
8471         dbus_bus_add_match(connection, g_supplicant_rule8, NULL);
8472 #endif
8473 #if defined TIZEN_EXT_WIFI_MESH
8474         dbus_bus_add_match(connection, g_supplicant_rule9, NULL);
8475 #endif
8476         dbus_connection_flush(connection);
8477
8478         if (dbus_bus_name_has_owner(connection,
8479                                         SUPPLICANT_SERVICE, NULL)) {
8480                 system_available = TRUE;
8481                 supplicant_dbus_property_get_all(SUPPLICANT_PATH,
8482                                                 SUPPLICANT_INTERFACE,
8483                                                 service_property, NULL, NULL);
8484         } else
8485                 invoke_introspect_method();
8486
8487         SUPPLICANT_DBG("supplicant dbus setup completed");
8488         return 0;
8489 }
8490
8491 static void unregister_interface_remove_params(DBusMessageIter *iter,
8492                                                 void *user_data)
8493 {
8494         const char *path = user_data;
8495
8496         dbus_message_iter_append_basic(iter, DBUS_TYPE_OBJECT_PATH,
8497                                                         &path);
8498 }
8499
8500
8501 static void unregister_remove_interface(gpointer key, gpointer value,
8502                                                 gpointer user_data)
8503 {
8504         GSupplicantInterface *interface = value;
8505
8506         supplicant_dbus_method_call(SUPPLICANT_PATH,
8507                                         SUPPLICANT_INTERFACE,
8508                                         "RemoveInterface",
8509                                         unregister_interface_remove_params,
8510                                         NULL, interface->path, NULL);
8511 }
8512
8513 void g_supplicant_unregister(const GSupplicantCallbacks *callbacks)
8514 {
8515         SUPPLICANT_DBG("");
8516
8517         if (connection) {
8518 #if defined TIZEN_EXT_WIFI_MESH
8519                 dbus_bus_remove_match(connection, g_supplicant_rule9, NULL);
8520 #endif
8521 #if !defined TIZEN_EXT
8522                 dbus_bus_remove_match(connection, g_supplicant_rule8, NULL);
8523                 dbus_bus_remove_match(connection, g_supplicant_rule7, NULL);
8524                 dbus_bus_remove_match(connection, g_supplicant_rule6, NULL);
8525 #endif
8526                 dbus_bus_remove_match(connection, g_supplicant_rule5, NULL);
8527                 dbus_bus_remove_match(connection, g_supplicant_rule4, NULL);
8528                 dbus_bus_remove_match(connection, g_supplicant_rule3, NULL);
8529                 dbus_bus_remove_match(connection, g_supplicant_rule2, NULL);
8530                 dbus_bus_remove_match(connection, g_supplicant_rule1, NULL);
8531                 dbus_bus_remove_match(connection, g_supplicant_rule0, NULL);
8532                 dbus_connection_flush(connection);
8533
8534                 dbus_connection_remove_filter(connection,
8535                                                 g_supplicant_filter, NULL);
8536         }
8537
8538         if (config_file_table) {
8539                 g_hash_table_destroy(config_file_table);
8540                 config_file_table = NULL;
8541         }
8542
8543         if (bss_mapping) {
8544                 g_hash_table_destroy(bss_mapping);
8545                 bss_mapping = NULL;
8546         }
8547
8548         if (peer_mapping) {
8549                 g_hash_table_destroy(peer_mapping);
8550                 peer_mapping = NULL;
8551         }
8552
8553         if (group_mapping) {
8554                 g_hash_table_destroy(group_mapping);
8555                 group_mapping = NULL;
8556         }
8557
8558         if (interface_table) {
8559                 g_hash_table_foreach(interface_table,
8560                                         unregister_remove_interface, NULL);
8561                 g_hash_table_destroy(interface_table);
8562                 interface_table = NULL;
8563         }
8564
8565         if (system_available)
8566                 callback_system_killed();
8567
8568         if (connection) {
8569                 dbus_connection_unref(connection);
8570                 connection = NULL;
8571         }
8572
8573         callbacks_pointer = NULL;
8574         eap_methods = 0;
8575 }