5 * Copyright (C) 2007-2009 Intel Corporation. All rights reserved.
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
30 #include <net/ethernet.h>
34 #define CONNMAN_API_SUBJECT_TO_CHANGE
35 #include <connman/device.h>
36 #include <connman/dbus.h>
37 #include <connman/log.h>
40 #include "supplicant.h"
44 #define IEEE80211_CAP_ESS 0x0001
45 #define IEEE80211_CAP_IBSS 0x0002
46 #define IEEE80211_CAP_PRIVACY 0x0010
48 #define SUPPLICANT_NAME "fi.epitest.hostap.WPASupplicant"
49 #define SUPPLICANT_INTF "fi.epitest.hostap.WPASupplicant"
50 #define SUPPLICANT_PATH "/fi/epitest/hostap/WPASupplicant"
52 /* Taken from "WPA Supplicant - Common definitions" */
53 enum supplicant_state {
55 * WPA_DISCONNECTED - Disconnected state
57 * This state indicates that client is not associated, but is likely to
58 * start looking for an access point. This state is entered when a
64 * WPA_INACTIVE - Inactive state (wpa_supplicant disabled)
66 * This state is entered if there are no enabled networks in the
67 * configuration. wpa_supplicant is not trying to associate with a new
68 * network and external interaction (e.g., ctrl_iface call to add or
69 * enable a network) is needed to start association.
74 * WPA_SCANNING - Scanning for a network
76 * This state is entered when wpa_supplicant starts scanning for a
82 * WPA_ASSOCIATING - Trying to associate with a BSS/SSID
84 * This state is entered when wpa_supplicant has found a suitable BSS
85 * to associate with and the driver is configured to try to associate
86 * with this BSS in ap_scan=1 mode. When using ap_scan=2 mode, this
87 * state is entered when the driver is configured to try to associate
88 * with a network using the configured SSID and security policy.
93 * WPA_ASSOCIATED - Association completed
95 * This state is entered when the driver reports that association has
96 * been successfully completed with an AP. If IEEE 802.1X is used
97 * (with or without WPA/WPA2), wpa_supplicant remains in this state
98 * until the IEEE 802.1X/EAPOL authentication has been completed.
103 * WPA_4WAY_HANDSHAKE - WPA 4-Way Key Handshake in progress
105 * This state is entered when WPA/WPA2 4-Way Handshake is started. In
106 * case of WPA-PSK, this happens when receiving the first EAPOL-Key
107 * frame after association. In case of WPA-EAP, this state is entered
108 * when the IEEE 802.1X/EAPOL authentication has been completed.
113 * WPA_GROUP_HANDSHAKE - WPA Group Key Handshake in progress
115 * This state is entered when 4-Way Key Handshake has been completed
116 * (i.e., when the supplicant sends out message 4/4) and when Group
117 * Key rekeying is started by the AP (i.e., when supplicant receives
123 * WPA_COMPLETED - All authentication completed
125 * This state is entered when the full authentication process is
126 * completed. In case of WPA2, this happens when the 4-Way Handshake is
127 * successfully completed. With WPA, this state is entered after the
128 * Group Key Handshake; with IEEE 802.1X (non-WPA) connection is
129 * completed after dynamic keys are received (or if not used, after
130 * the EAP authentication has been completed). With static WEP keys and
131 * plaintext connections, this state is entered when an association
132 * has been completed.
134 * This state indicates that the supplicant has completed its
135 * processing for the association phase and that data connection is
141 * WPA_INVALID - Invalid state (parsing error)
143 * This state is returned if the string input is invalid. It is not
144 * an official wpa_supplicant state.
149 struct supplicant_result {
154 unsigned int ssid_len;
155 dbus_uint16_t capabilities;
161 dbus_int32_t quality;
164 dbus_int32_t maxrate;
167 struct supplicant_task {
170 struct connman_device *device;
171 struct connman_network *network;
175 enum supplicant_state state;
177 GSList *scan_results;
180 static GSList *task_list = NULL;
182 static DBusConnection *connection;
184 static void free_task(struct supplicant_task *task)
186 DBG("task %p", task);
188 g_free(task->ifname);
193 static struct supplicant_task *find_task_by_index(int index)
197 for (list = task_list; list; list = list->next) {
198 struct supplicant_task *task = list->data;
200 if (task->ifindex == index)
207 static struct supplicant_task *find_task_by_path(const char *path)
211 for (list = task_list; list; list = list->next) {
212 struct supplicant_task *task = list->data;
214 if (g_str_equal(task->path, path) == TRUE)
221 static void add_interface_reply(DBusPendingCall *call, void *user_data)
223 struct supplicant_task *task = user_data;
228 DBG("task %p", task);
230 reply = dbus_pending_call_steal_reply(call);
234 if (dbus_message_get_type(reply) == DBUS_MESSAGE_TYPE_ERROR)
237 dbus_error_init(&error);
239 if (dbus_message_get_args(reply, &error, DBUS_TYPE_OBJECT_PATH, &path,
240 DBUS_TYPE_INVALID) == FALSE) {
241 if (dbus_error_is_set(&error) == TRUE) {
242 connman_error("%s", error.message);
243 dbus_error_free(&error);
245 connman_error("Wrong arguments for add interface");
249 DBG("path %s", path);
251 task->path = g_strdup(path);
252 task->created = TRUE;
254 connman_device_set_powered(task->device, TRUE);
257 dbus_message_unref(reply);
260 static int add_interface(struct supplicant_task *task)
262 DBusMessage *message;
263 DBusPendingCall *call;
265 DBG("task %p", task);
267 message = dbus_message_new_method_call(SUPPLICANT_NAME, SUPPLICANT_PATH,
268 SUPPLICANT_INTF, "addInterface");
272 dbus_message_append_args(message, DBUS_TYPE_STRING, &task->ifname,
275 if (dbus_connection_send_with_reply(connection, message,
276 &call, TIMEOUT) == FALSE) {
277 connman_error("Failed to add interface");
278 dbus_message_unref(message);
283 connman_error("D-Bus connection not available");
284 dbus_message_unref(message);
288 dbus_pending_call_set_notify(call, add_interface_reply, task, NULL);
290 dbus_message_unref(message);
295 static void get_interface_reply(DBusPendingCall *call, void *user_data)
297 struct supplicant_task *task = user_data;
302 DBG("task %p", task);
304 reply = dbus_pending_call_steal_reply(call);
308 if (dbus_message_get_type(reply) == DBUS_MESSAGE_TYPE_ERROR) {
313 dbus_error_init(&error);
315 if (dbus_message_get_args(reply, &error, DBUS_TYPE_OBJECT_PATH, &path,
316 DBUS_TYPE_INVALID) == FALSE) {
317 if (dbus_error_is_set(&error) == TRUE) {
318 connman_error("%s", error.message);
319 dbus_error_free(&error);
321 connman_error("Wrong arguments for get interface");
325 DBG("path %s", path);
327 task->path = g_strdup(path);
328 task->created = FALSE;
330 connman_device_set_powered(task->device, TRUE);
333 dbus_message_unref(reply);
336 static int create_interface(struct supplicant_task *task)
338 DBusMessage *message;
339 DBusPendingCall *call;
341 DBG("task %p", task);
343 message = dbus_message_new_method_call(SUPPLICANT_NAME, SUPPLICANT_PATH,
344 SUPPLICANT_INTF, "getInterface");
348 dbus_message_append_args(message, DBUS_TYPE_STRING, &task->ifname,
351 if (dbus_connection_send_with_reply(connection, message,
352 &call, TIMEOUT) == FALSE) {
353 connman_error("Failed to get interface");
354 dbus_message_unref(message);
359 connman_error("D-Bus connection not available");
360 dbus_message_unref(message);
364 dbus_pending_call_set_notify(call, get_interface_reply, task, NULL);
366 dbus_message_unref(message);
371 static void remove_interface_reply(DBusPendingCall *call, void *user_data)
373 struct supplicant_task *task = user_data;
376 DBG("task %p", task);
378 reply = dbus_pending_call_steal_reply(call);
380 connman_device_set_powered(task->device, FALSE);
382 connman_device_unref(task->device);
384 inet_ifdown(task->ifindex);
388 dbus_message_unref(reply);
391 static int remove_interface(struct supplicant_task *task)
393 DBusMessage *message;
394 DBusPendingCall *call;
396 DBG("task %p", task);
398 if (task->created == FALSE) {
399 connman_device_set_powered(task->device, FALSE);
403 message = dbus_message_new_method_call(SUPPLICANT_NAME, SUPPLICANT_PATH,
404 SUPPLICANT_INTF, "removeInterface");
408 dbus_message_append_args(message, DBUS_TYPE_OBJECT_PATH, &task->path,
411 if (dbus_connection_send_with_reply(connection, message,
412 &call, TIMEOUT) == FALSE) {
413 connman_error("Failed to remove interface");
414 dbus_message_unref(message);
419 connman_error("D-Bus connection not available");
420 dbus_message_unref(message);
424 dbus_pending_call_set_notify(call, remove_interface_reply, task, NULL);
426 dbus_message_unref(message);
432 static int set_ap_scan(struct supplicant_task *task)
434 DBusMessage *message, *reply;
438 DBG("task %p", task);
440 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
441 SUPPLICANT_INTF ".Interface", "setAPScan");
445 dbus_message_append_args(message, DBUS_TYPE_UINT32, &ap_scan,
448 dbus_error_init(&error);
450 reply = dbus_connection_send_with_reply_and_block(connection,
451 message, -1, &error);
453 if (dbus_error_is_set(&error) == TRUE) {
454 connman_error("%s", error.message);
455 dbus_error_free(&error);
457 connman_error("Failed to set AP scan");
458 dbus_message_unref(message);
462 dbus_message_unref(message);
464 dbus_message_unref(reply);
470 static int add_network(struct supplicant_task *task)
472 DBusMessage *message, *reply;
476 DBG("task %p", task);
478 if (task->netpath != NULL)
481 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
482 SUPPLICANT_INTF ".Interface", "addNetwork");
486 dbus_error_init(&error);
488 reply = dbus_connection_send_with_reply_and_block(connection,
489 message, -1, &error);
491 if (dbus_error_is_set(&error) == TRUE) {
492 connman_error("%s", error.message);
493 dbus_error_free(&error);
495 connman_error("Failed to add network");
496 dbus_message_unref(message);
500 dbus_message_unref(message);
502 dbus_error_init(&error);
504 if (dbus_message_get_args(reply, &error, DBUS_TYPE_OBJECT_PATH, &path,
505 DBUS_TYPE_INVALID) == FALSE) {
506 if (dbus_error_is_set(&error) == TRUE) {
507 connman_error("%s", error.message);
508 dbus_error_free(&error);
510 connman_error("Wrong arguments for network");
511 dbus_message_unref(reply);
515 DBG("path %s", path);
517 task->netpath = g_strdup(path);
519 dbus_message_unref(reply);
524 static int remove_network(struct supplicant_task *task)
526 DBusMessage *message, *reply;
529 DBG("task %p", task);
531 if (task->netpath == NULL)
534 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
535 SUPPLICANT_INTF ".Interface", "removeNetwork");
539 dbus_message_append_args(message, DBUS_TYPE_OBJECT_PATH, &task->netpath,
542 dbus_error_init(&error);
544 reply = dbus_connection_send_with_reply_and_block(connection,
545 message, -1, &error);
547 if (dbus_error_is_set(&error) == TRUE) {
548 connman_error("%s", error.message);
549 dbus_error_free(&error);
551 connman_error("Failed to remove network");
552 dbus_message_unref(message);
556 dbus_message_unref(message);
558 dbus_message_unref(reply);
560 g_free(task->netpath);
561 task->netpath = NULL;
566 static int select_network(struct supplicant_task *task)
568 DBusMessage *message, *reply;
571 DBG("task %p", task);
573 if (task->netpath == NULL)
576 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
577 SUPPLICANT_INTF ".Interface", "selectNetwork");
581 dbus_message_append_args(message, DBUS_TYPE_OBJECT_PATH, &task->netpath,
584 dbus_error_init(&error);
586 reply = dbus_connection_send_with_reply_and_block(connection,
587 message, -1, &error);
589 if (dbus_error_is_set(&error) == TRUE) {
590 connman_error("%s", error.message);
591 dbus_error_free(&error);
593 connman_error("Failed to select network");
594 dbus_message_unref(message);
598 dbus_message_unref(message);
600 dbus_message_unref(reply);
605 static int enable_network(struct supplicant_task *task)
607 DBusMessage *message, *reply;
610 DBG("task %p", task);
612 if (task->netpath == NULL)
615 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->netpath,
616 SUPPLICANT_INTF ".Network", "enable");
620 dbus_error_init(&error);
622 reply = dbus_connection_send_with_reply_and_block(connection,
623 message, -1, &error);
625 if (dbus_error_is_set(&error) == TRUE) {
626 connman_error("%s", error.message);
627 dbus_error_free(&error);
629 connman_error("Failed to enable network");
630 dbus_message_unref(message);
634 dbus_message_unref(message);
636 dbus_message_unref(reply);
641 static int disable_network(struct supplicant_task *task)
643 DBusMessage *message, *reply;
646 DBG("task %p", task);
648 if (task->netpath == NULL)
651 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->netpath,
652 SUPPLICANT_INTF ".Network", "disable");
656 dbus_error_init(&error);
658 reply = dbus_connection_send_with_reply_and_block(connection,
659 message, -1, &error);
661 if (dbus_error_is_set(&error) == TRUE) {
662 connman_error("%s", error.message);
663 dbus_error_free(&error);
665 connman_error("Failed to disable network");
666 dbus_message_unref(message);
670 dbus_message_unref(message);
672 dbus_message_unref(reply);
677 static int set_network(struct supplicant_task *task,
678 const unsigned char *network, int len,
679 const char *address, const char *security,
680 const char *passphrase)
682 DBusMessage *message, *reply;
683 DBusMessageIter array, dict;
686 DBG("task %p", task);
688 if (task->netpath == NULL)
691 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->netpath,
692 SUPPLICANT_INTF ".Network", "set");
696 dbus_message_iter_init_append(message, &array);
698 dbus_message_iter_open_container(&array, DBUS_TYPE_ARRAY,
699 DBUS_DICT_ENTRY_BEGIN_CHAR_AS_STRING
700 DBUS_TYPE_STRING_AS_STRING DBUS_TYPE_VARIANT_AS_STRING
701 DBUS_DICT_ENTRY_END_CHAR_AS_STRING, &dict);
703 if (address == NULL) {
704 dbus_uint32_t scan_ssid = 1;
705 connman_dbus_dict_append_variant(&dict, "scan_ssid",
706 DBUS_TYPE_UINT32, &scan_ssid);
708 connman_dbus_dict_append_variant(&dict, "bssid",
709 DBUS_TYPE_STRING, &address);
711 connman_dbus_dict_append_array(&dict, "ssid",
712 DBUS_TYPE_BYTE, &network, len);
714 if (g_ascii_strcasecmp(security, "wpa") == 0 ||
715 g_ascii_strcasecmp(security, "wpa2") == 0) {
716 const char *key_mgmt = "WPA-PSK";
717 connman_dbus_dict_append_variant(&dict, "key_mgmt",
718 DBUS_TYPE_STRING, &key_mgmt);
720 if (passphrase && strlen(passphrase) > 0)
721 connman_dbus_dict_append_variant(&dict, "psk",
722 DBUS_TYPE_STRING, &passphrase);
723 } else if (g_ascii_strcasecmp(security, "wep") == 0) {
724 const char *key_mgmt = "NONE", *index = "0";
725 connman_dbus_dict_append_variant(&dict, "key_mgmt",
726 DBUS_TYPE_STRING, &key_mgmt);
729 int size = strlen(passphrase);
730 if (size == 10 || size == 26) {
731 unsigned char *key = malloc(13);
734 memset(tmp, 0, sizeof(tmp));
737 for (i = 0; i < size / 2; i++) {
738 memcpy(tmp, passphrase + (i * 2), 2);
739 key[i] = (unsigned char) strtol(tmp,
742 connman_dbus_dict_append_array(&dict,
743 "wep_key0", DBUS_TYPE_BYTE,
747 connman_dbus_dict_append_variant(&dict,
748 "wep_key0", DBUS_TYPE_STRING,
750 connman_dbus_dict_append_variant(&dict, "wep_tx_keyidx",
751 DBUS_TYPE_STRING, &index);
754 const char *key_mgmt = "NONE";
755 connman_dbus_dict_append_variant(&dict, "key_mgmt",
756 DBUS_TYPE_STRING, &key_mgmt);
759 dbus_message_iter_close_container(&array, &dict);
761 dbus_error_init(&error);
763 reply = dbus_connection_send_with_reply_and_block(connection,
764 message, -1, &error);
766 if (dbus_error_is_set(&error) == TRUE) {
767 connman_error("%s", error.message);
768 dbus_error_free(&error);
770 connman_error("Failed to set network options");
771 dbus_message_unref(message);
775 dbus_message_unref(message);
777 dbus_message_unref(reply);
782 static int initiate_scan(struct supplicant_task *task)
784 DBusMessage *message;
785 DBusPendingCall *call;
787 DBG("task %p", task);
789 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
790 SUPPLICANT_INTF ".Interface", "scan");
794 if (dbus_connection_send_with_reply(connection, message,
795 &call, TIMEOUT) == FALSE) {
796 connman_error("Failed to initiate scan");
797 dbus_message_unref(message);
801 dbus_message_unref(message);
806 static char *build_group(const char *addr,
807 const unsigned char *ssid, unsigned int ssid_len,
808 const char *mode, const char *security)
813 if (ssid_len > 0 && ssid[0] != '\0') {
814 str = g_string_sized_new((ssid_len * 2) + 24);
818 for (i = 0; i < ssid_len; i++)
819 g_string_append_printf(str, "%02x", ssid[i]);
824 str = g_string_sized_new(15 + 24);
828 g_string_append_printf(str, "hidden_%s", addr);
831 g_string_append_printf(str, "_%s_%s", mode, security);
833 return g_string_free(str, FALSE);
836 static void extract_addr(DBusMessageIter *value,
837 struct supplicant_result *result)
839 DBusMessageIter array;
840 struct ether_addr *eth;
844 dbus_message_iter_recurse(value, &array);
845 dbus_message_iter_get_fixed_array(&array, &addr, &addr_len);
852 result->addr = g_try_malloc0(18);
853 if (result->addr == NULL)
856 snprintf(result->addr, 18, "%02X:%02X:%02X:%02X:%02X:%02X",
857 eth->ether_addr_octet[0],
858 eth->ether_addr_octet[1],
859 eth->ether_addr_octet[2],
860 eth->ether_addr_octet[3],
861 eth->ether_addr_octet[4],
862 eth->ether_addr_octet[5]);
864 result->path = g_try_malloc0(18);
865 if (result->path == NULL)
868 snprintf(result->path, 18, "%02x%02x%02x%02x%02x%02x",
869 eth->ether_addr_octet[0],
870 eth->ether_addr_octet[1],
871 eth->ether_addr_octet[2],
872 eth->ether_addr_octet[3],
873 eth->ether_addr_octet[4],
874 eth->ether_addr_octet[5]);
877 static void extract_ssid(DBusMessageIter *value,
878 struct supplicant_result *result)
880 DBusMessageIter array;
884 dbus_message_iter_recurse(value, &array);
885 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
893 result->ssid = g_try_malloc(ssid_len);
894 if (result->ssid == NULL)
897 memcpy(result->ssid, ssid, ssid_len);
898 result->ssid_len = ssid_len;
900 result->name = g_try_malloc0(ssid_len + 1);
901 if (result->name == NULL)
904 memcpy(result->name, ssid, ssid_len);
907 static void extract_wpaie(DBusMessageIter *value,
908 struct supplicant_result *result)
910 DBusMessageIter array;
914 dbus_message_iter_recurse(value, &array);
915 dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
918 result->has_wpa = TRUE;
921 static void extract_rsnie(DBusMessageIter *value,
922 struct supplicant_result *result)
924 DBusMessageIter array;
928 dbus_message_iter_recurse(value, &array);
929 dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
932 result->has_rsn = TRUE;
935 static void extract_wpsie(DBusMessageIter *value,
936 struct supplicant_result *result)
938 DBusMessageIter array;
942 dbus_message_iter_recurse(value, &array);
943 dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
946 result->has_wps = TRUE;
949 static void extract_capabilites(DBusMessageIter *value,
950 struct supplicant_result *result)
952 dbus_message_iter_get_basic(value, &result->capabilities);
954 if (result->capabilities & IEEE80211_CAP_ESS)
955 result->adhoc = FALSE;
956 else if (result->capabilities & IEEE80211_CAP_IBSS)
957 result->adhoc = TRUE;
959 if (result->capabilities & IEEE80211_CAP_PRIVACY)
960 result->has_wep = TRUE;
963 static void get_properties(struct supplicant_task *task);
965 static void properties_reply(DBusPendingCall *call, void *user_data)
967 struct supplicant_task *task = user_data;
968 struct supplicant_result result;
969 struct connman_network *network;
971 DBusMessageIter array, dict;
972 unsigned char strength;
973 const char *mode, *security;
976 DBG("task %p", task);
978 reply = dbus_pending_call_steal_reply(call);
980 get_properties(task);
984 if (dbus_message_get_type(reply) == DBUS_MESSAGE_TYPE_ERROR) {
985 dbus_message_unref(reply);
986 get_properties(task);
990 memset(&result, 0, sizeof(result));
992 dbus_message_iter_init(reply, &array);
994 dbus_message_iter_recurse(&array, &dict);
996 while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_DICT_ENTRY) {
997 DBusMessageIter entry, value;
1000 dbus_message_iter_recurse(&dict, &entry);
1001 dbus_message_iter_get_basic(&entry, &key);
1003 dbus_message_iter_next(&entry);
1005 dbus_message_iter_recurse(&entry, &value);
1007 //type = dbus_message_iter_get_arg_type(&value);
1008 //dbus_message_iter_get_basic(&value, &val);
1016 * frequency : i (105)
1017 * capabilities : q (113)
1024 if (g_str_equal(key, "bssid") == TRUE)
1025 extract_addr(&value, &result);
1026 else if (g_str_equal(key, "ssid") == TRUE)
1027 extract_ssid(&value, &result);
1028 else if (g_str_equal(key, "wpaie") == TRUE)
1029 extract_wpaie(&value, &result);
1030 else if (g_str_equal(key, "rsnie") == TRUE)
1031 extract_rsnie(&value, &result);
1032 else if (g_str_equal(key, "wpsie") == TRUE)
1033 extract_wpsie(&value, &result);
1034 else if (g_str_equal(key, "capabilities") == TRUE)
1035 extract_capabilites(&value, &result);
1036 else if (g_str_equal(key, "quality") == TRUE)
1037 dbus_message_iter_get_basic(&value, &result.quality);
1038 else if (g_str_equal(key, "noise") == TRUE)
1039 dbus_message_iter_get_basic(&value, &result.noise);
1040 else if (g_str_equal(key, "level") == TRUE)
1041 dbus_message_iter_get_basic(&value, &result.level);
1042 else if (g_str_equal(key, "maxrate") == TRUE)
1043 dbus_message_iter_get_basic(&value, &result.maxrate);
1045 dbus_message_iter_next(&dict);
1048 if (result.path == NULL)
1051 if (result.path[0] == '\0')
1054 strength = result.quality;
1056 if (result.has_rsn == TRUE)
1058 else if (result.has_wpa == TRUE)
1060 else if (result.has_wep == TRUE)
1065 mode = (result.adhoc == TRUE) ? "adhoc" : "managed";
1067 group = build_group(result.path, result.ssid, result.ssid_len,
1070 network = connman_device_get_network(task->device, result.path);
1071 if (network == NULL) {
1074 network = connman_network_create(result.path,
1075 CONNMAN_NETWORK_TYPE_WIFI);
1076 if (network == NULL)
1079 index = connman_device_get_index(task->device);
1080 connman_network_set_index(network, index);
1082 connman_network_set_protocol(network,
1083 CONNMAN_NETWORK_PROTOCOL_IP);
1085 connman_network_set_string(network, "Address", result.addr);
1087 connman_network_set_group(network, group);
1089 if (result.name != NULL && result.name[0] != '\0')
1090 connman_network_set_string(network, "Name", result.name);
1092 connman_network_set_uint8(network, "Strength", strength);
1094 connman_network_set_string(network, "WiFi.Mode", mode);
1095 connman_network_set_string(network, "WiFi.Security", security);
1097 if (connman_device_add_network(task->device, network) < 0) {
1098 connman_network_unref(network);
1103 connman_network_set_group(network, group);
1107 if (result.name != NULL && result.name[0] != '\0')
1108 connman_network_set_string(network, "Name", result.name);
1110 connman_network_set_blob(network, "WiFi.SSID",
1111 result.ssid, result.ssid_len);
1113 connman_network_set_string(network, "WiFi.Mode", mode);
1115 DBG("%s (%s %s) strength %d (%s)",
1116 result.name, mode, security, strength,
1117 (result.has_wps == TRUE) ? "WPS" : "no WPS");
1119 connman_network_set_available(network, TRUE);
1120 connman_network_set_uint8(network, "Strength", strength);
1122 connman_network_set_string(network, "WiFi.Security", security);
1125 g_free(result.path);
1126 g_free(result.addr);
1127 g_free(result.name);
1128 g_free(result.ssid);
1130 dbus_message_unref(reply);
1132 get_properties(task);
1135 static void get_properties(struct supplicant_task *task)
1137 DBusMessage *message;
1138 DBusPendingCall *call;
1141 path = g_slist_nth_data(task->scan_results, 0);
1145 message = dbus_message_new_method_call(SUPPLICANT_NAME, path,
1146 SUPPLICANT_INTF ".BSSID",
1149 task->scan_results = g_slist_remove(task->scan_results, path);
1152 if (message == NULL)
1155 if (dbus_connection_send_with_reply(connection, message,
1156 &call, TIMEOUT) == FALSE) {
1157 connman_error("Failed to get network properties");
1158 dbus_message_unref(message);
1163 connman_error("D-Bus connection not available");
1164 dbus_message_unref(message);
1168 dbus_pending_call_set_notify(call, properties_reply, task, NULL);
1170 dbus_message_unref(message);
1175 if (task->noscan == FALSE)
1176 connman_device_set_scanning(task->device, FALSE);
1179 static void scan_results_reply(DBusPendingCall *call, void *user_data)
1181 struct supplicant_task *task = user_data;
1187 DBG("task %p", task);
1189 reply = dbus_pending_call_steal_reply(call);
1193 if (dbus_message_get_type(reply) == DBUS_MESSAGE_TYPE_ERROR)
1196 dbus_error_init(&error);
1198 if (dbus_message_get_args(reply, &error,
1199 DBUS_TYPE_ARRAY, DBUS_TYPE_OBJECT_PATH,
1200 &results, &num_results,
1201 DBUS_TYPE_INVALID) == FALSE) {
1202 if (dbus_error_is_set(&error) == TRUE) {
1203 connman_error("%s", error.message);
1204 dbus_error_free(&error);
1206 connman_error("Wrong arguments for scan result");
1210 if (num_results == 0)
1213 for (i = 0; i < num_results; i++) {
1214 char *path = g_strdup(results[i]);
1218 task->scan_results = g_slist_append(task->scan_results, path);
1221 g_strfreev(results);
1223 dbus_message_unref(reply);
1225 get_properties(task);
1230 dbus_message_unref(reply);
1233 if (task->noscan == FALSE)
1234 connman_device_set_scanning(task->device, FALSE);
1237 static void scan_results_available(struct supplicant_task *task)
1239 DBusMessage *message;
1240 DBusPendingCall *call;
1242 DBG("task %p", task);
1244 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
1245 SUPPLICANT_INTF ".Interface",
1247 if (message == NULL)
1250 if (dbus_connection_send_with_reply(connection, message,
1251 &call, TIMEOUT) == FALSE) {
1252 connman_error("Failed to request scan result");
1256 if (task->noscan == FALSE)
1257 connman_device_set_scanning(task->device, TRUE);
1260 connman_error("D-Bus connection not available");
1264 dbus_pending_call_set_notify(call, scan_results_reply, task, NULL);
1267 dbus_message_unref(message);
1270 static enum supplicant_state string2state(const char *state)
1272 if (g_str_equal(state, "INACTIVE") == TRUE)
1273 return WPA_INACTIVE;
1274 else if (g_str_equal(state, "SCANNING") == TRUE)
1275 return WPA_SCANNING;
1276 else if (g_str_equal(state, "ASSOCIATING") == TRUE)
1277 return WPA_ASSOCIATING;
1278 else if (g_str_equal(state, "ASSOCIATED") == TRUE)
1279 return WPA_ASSOCIATED;
1280 else if (g_str_equal(state, "GROUP_HANDSHAKE") == TRUE)
1281 return WPA_GROUP_HANDSHAKE;
1282 else if (g_str_equal(state, "4WAY_HANDSHAKE") == TRUE)
1283 return WPA_4WAY_HANDSHAKE;
1284 else if (g_str_equal(state, "COMPLETED") == TRUE)
1285 return WPA_COMPLETED;
1286 else if (g_str_equal(state, "DISCONNECTED") == TRUE)
1287 return WPA_DISCONNECTED;
1292 static void state_change(struct supplicant_task *task, DBusMessage *msg)
1295 const char *newstate, *oldstate;
1296 enum supplicant_state state;
1298 dbus_error_init(&error);
1300 if (dbus_message_get_args(msg, &error, DBUS_TYPE_STRING, &newstate,
1301 DBUS_TYPE_STRING, &oldstate,
1302 DBUS_TYPE_INVALID) == FALSE) {
1303 if (dbus_error_is_set(&error) == TRUE) {
1304 connman_error("%s", error.message);
1305 dbus_error_free(&error);
1307 connman_error("Wrong arguments for state change");
1311 DBG("state %s ==> %s", oldstate, newstate);
1313 state = string2state(newstate);
1314 if (state == WPA_INVALID)
1317 task->state = state;
1319 switch (task->state) {
1321 task->noscan = TRUE;
1322 connman_device_set_scanning(task->device, TRUE);
1324 case WPA_ASSOCIATING:
1325 case WPA_ASSOCIATED:
1326 case WPA_4WAY_HANDSHAKE:
1327 case WPA_GROUP_HANDSHAKE:
1328 task->noscan = TRUE;
1331 case WPA_DISCONNECTED:
1332 task->noscan = FALSE;
1335 task->noscan = FALSE;
1336 connman_device_set_scanning(task->device, FALSE);
1342 if (task->network == NULL)
1345 switch (task->state) {
1348 connman_network_set_connected(task->network, TRUE);
1349 connman_device_set_scanning(task->device, FALSE);
1351 case WPA_DISCONNECTED:
1353 connman_network_set_connected(task->network, FALSE);
1354 connman_device_set_scanning(task->device, FALSE);
1356 case WPA_ASSOCIATING:
1357 connman_network_set_associating(task->network, TRUE);
1360 connman_network_set_associating(task->network, FALSE);
1365 static DBusHandlerResult supplicant_filter(DBusConnection *conn,
1366 DBusMessage *msg, void *data)
1368 struct supplicant_task *task;
1369 const char *member, *path;
1371 if (dbus_message_has_interface(msg,
1372 SUPPLICANT_INTF ".Interface") == FALSE)
1373 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1375 member = dbus_message_get_member(msg);
1377 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1379 path = dbus_message_get_path(msg);
1381 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1383 task = find_task_by_path(path);
1385 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1387 DBG("task %p member %s", task, member);
1389 if (g_str_equal(member, "ScanResultsAvailable") == TRUE)
1390 scan_results_available(task);
1391 else if (g_str_equal(member, "StateChange") == TRUE)
1392 state_change(task, msg);
1394 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1397 int supplicant_start(struct connman_device *device)
1399 struct supplicant_task *task;
1401 DBG("device %p", device);
1403 task = g_try_new0(struct supplicant_task, 1);
1407 task->ifindex = connman_device_get_index(device);
1408 task->ifname = inet_index2name(task->ifindex);
1410 if (task->ifname == NULL) {
1415 task->device = connman_device_ref(device);
1417 task->created = FALSE;
1418 task->noscan = FALSE;
1419 task->state = WPA_INVALID;
1421 task_list = g_slist_append(task_list, task);
1423 return create_interface(task);
1426 int supplicant_stop(struct connman_device *device)
1428 int index = connman_device_get_index(device);
1429 struct supplicant_task *task;
1431 DBG("device %p", device);
1433 task = find_task_by_index(index);
1437 task_list = g_slist_remove(task_list, task);
1439 disable_network(task);
1441 remove_network(task);
1443 return remove_interface(task);
1446 int supplicant_scan(struct connman_device *device)
1448 int index = connman_device_get_index(device);
1449 struct supplicant_task *task;
1452 DBG("device %p", device);
1454 task = find_task_by_index(index);
1458 switch (task->state) {
1461 case WPA_ASSOCIATING:
1462 case WPA_ASSOCIATED:
1463 case WPA_4WAY_HANDSHAKE:
1464 case WPA_GROUP_HANDSHAKE:
1470 err = initiate_scan(task);
1475 int supplicant_connect(struct connman_network *network)
1477 struct supplicant_task *task;
1478 const char *address, *security, *passphrase;
1480 unsigned int ssid_len;
1483 DBG("network %p", network);
1485 address = connman_network_get_string(network, "Address");
1486 security = connman_network_get_string(network, "WiFi.Security");
1487 passphrase = connman_network_get_string(network, "WiFi.Passphrase");
1489 ssid = connman_network_get_blob(network, "WiFi.SSID", &ssid_len);
1491 DBG("address %s security %s passphrase %s",
1492 address, security, passphrase);
1494 if (security == NULL && passphrase == NULL)
1497 if (g_str_equal(security, "none") == FALSE && passphrase == NULL)
1500 index = connman_network_get_index(network);
1502 task = find_task_by_index(index);
1506 task->network = connman_network_ref(network);
1510 select_network(task);
1511 disable_network(task);
1513 set_network(task, ssid, ssid_len, address, security, passphrase);
1515 enable_network(task);
1517 connman_network_set_associating(task->network, TRUE);
1522 int supplicant_disconnect(struct connman_network *network)
1524 struct supplicant_task *task;
1527 DBG("network %p", network);
1529 index = connman_network_get_index(network);
1531 task = find_task_by_index(index);
1535 disable_network(task);
1537 remove_network(task);
1539 connman_network_set_connected(task->network, FALSE);
1541 connman_network_unref(task->network);
1546 static void supplicant_activate(DBusConnection *conn)
1548 DBusMessage *message;
1550 DBG("conn %p", conn);
1552 message = dbus_message_new_method_call(SUPPLICANT_NAME, "/",
1553 DBUS_INTERFACE_INTROSPECTABLE, "Introspect");
1554 if (message == NULL)
1557 dbus_message_set_no_reply(message, TRUE);
1559 dbus_connection_send(conn, message, NULL);
1561 dbus_message_unref(message);
1564 static GSList *driver_list = NULL;
1566 static void supplicant_probe(DBusConnection *conn, void *user_data)
1570 DBG("conn %p", conn);
1572 for (list = driver_list; list; list = list->next) {
1573 struct supplicant_driver *driver = list->data;
1575 DBG("driver %p name %s", driver, driver->name);
1582 static void supplicant_remove(DBusConnection *conn, void *user_data)
1586 DBG("conn %p", conn);
1588 for (list = driver_list; list; list = list->next) {
1589 struct supplicant_driver *driver = list->data;
1591 DBG("driver %p name %s", driver, driver->name);
1598 static const char *supplicant_rule = "type=signal,"
1599 "interface=" SUPPLICANT_INTF ".Interface";
1602 static int supplicant_create(void)
1604 if (g_slist_length(driver_list) > 0)
1607 connection = connman_dbus_get_connection();
1608 if (connection == NULL)
1611 DBG("connection %p", connection);
1613 if (dbus_connection_add_filter(connection,
1614 supplicant_filter, NULL, NULL) == FALSE) {
1615 connection = connman_dbus_get_connection();
1619 dbus_bus_add_match(connection, supplicant_rule, NULL);
1620 dbus_connection_flush(connection);
1622 watch = g_dbus_add_service_watch(connection, SUPPLICANT_NAME,
1623 supplicant_probe, supplicant_remove, NULL, NULL);
1628 static void supplicant_destroy(void)
1630 if (g_slist_length(driver_list) > 0)
1633 DBG("connection %p", connection);
1636 g_dbus_remove_watch(connection, watch);
1638 dbus_bus_remove_match(connection, supplicant_rule, NULL);
1639 dbus_connection_flush(connection);
1641 dbus_connection_remove_filter(connection, supplicant_filter, NULL);
1643 dbus_connection_unref(connection);
1647 int supplicant_register(struct supplicant_driver *driver)
1651 DBG("driver %p name %s", driver, driver->name);
1653 err = supplicant_create();
1657 driver_list = g_slist_append(driver_list, driver);
1659 if (g_dbus_check_service(connection, SUPPLICANT_NAME) == TRUE)
1660 supplicant_probe(connection, NULL);
1662 supplicant_activate(connection);
1667 void supplicant_unregister(struct supplicant_driver *driver)
1669 DBG("driver %p name %s", driver, driver->name);
1671 supplicant_remove(connection, NULL);
1673 driver_list = g_slist_remove(driver_list, driver);
1675 supplicant_destroy();