5 * Copyright (C) 2007-2009 Intel Corporation. All rights reserved.
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
30 #include <net/ethernet.h>
34 #define CONNMAN_API_SUBJECT_TO_CHANGE
35 #include <connman/device.h>
36 #include <connman/dbus.h>
37 #include <connman/log.h>
40 #include "supplicant.h"
44 #define IEEE80211_CAP_ESS 0x0001
45 #define IEEE80211_CAP_IBSS 0x0002
46 #define IEEE80211_CAP_PRIVACY 0x0010
48 #define SUPPLICANT_NAME "fi.epitest.hostap.WPASupplicant"
49 #define SUPPLICANT_INTF "fi.epitest.hostap.WPASupplicant"
50 #define SUPPLICANT_PATH "/fi/epitest/hostap/WPASupplicant"
52 /* Taken from "WPA Supplicant - Common definitions" */
53 enum supplicant_state {
55 * WPA_DISCONNECTED - Disconnected state
57 * This state indicates that client is not associated, but is likely to
58 * start looking for an access point. This state is entered when a
64 * WPA_INACTIVE - Inactive state (wpa_supplicant disabled)
66 * This state is entered if there are no enabled networks in the
67 * configuration. wpa_supplicant is not trying to associate with a new
68 * network and external interaction (e.g., ctrl_iface call to add or
69 * enable a network) is needed to start association.
74 * WPA_SCANNING - Scanning for a network
76 * This state is entered when wpa_supplicant starts scanning for a
82 * WPA_ASSOCIATING - Trying to associate with a BSS/SSID
84 * This state is entered when wpa_supplicant has found a suitable BSS
85 * to associate with and the driver is configured to try to associate
86 * with this BSS in ap_scan=1 mode. When using ap_scan=2 mode, this
87 * state is entered when the driver is configured to try to associate
88 * with a network using the configured SSID and security policy.
93 * WPA_ASSOCIATED - Association completed
95 * This state is entered when the driver reports that association has
96 * been successfully completed with an AP. If IEEE 802.1X is used
97 * (with or without WPA/WPA2), wpa_supplicant remains in this state
98 * until the IEEE 802.1X/EAPOL authentication has been completed.
103 * WPA_4WAY_HANDSHAKE - WPA 4-Way Key Handshake in progress
105 * This state is entered when WPA/WPA2 4-Way Handshake is started. In
106 * case of WPA-PSK, this happens when receiving the first EAPOL-Key
107 * frame after association. In case of WPA-EAP, this state is entered
108 * when the IEEE 802.1X/EAPOL authentication has been completed.
113 * WPA_GROUP_HANDSHAKE - WPA Group Key Handshake in progress
115 * This state is entered when 4-Way Key Handshake has been completed
116 * (i.e., when the supplicant sends out message 4/4) and when Group
117 * Key rekeying is started by the AP (i.e., when supplicant receives
123 * WPA_COMPLETED - All authentication completed
125 * This state is entered when the full authentication process is
126 * completed. In case of WPA2, this happens when the 4-Way Handshake is
127 * successfully completed. With WPA, this state is entered after the
128 * Group Key Handshake; with IEEE 802.1X (non-WPA) connection is
129 * completed after dynamic keys are received (or if not used, after
130 * the EAP authentication has been completed). With static WEP keys and
131 * plaintext connections, this state is entered when an association
132 * has been completed.
134 * This state indicates that the supplicant has completed its
135 * processing for the association phase and that data connection is
141 * WPA_INVALID - Invalid state (parsing error)
143 * This state is returned if the string input is invalid. It is not
144 * an official wpa_supplicant state.
149 struct supplicant_result {
154 unsigned int ssid_len;
155 dbus_uint16_t capabilities;
161 dbus_int32_t quality;
164 dbus_int32_t maxrate;
167 struct supplicant_task {
170 struct connman_device *device;
171 struct connman_network *network;
175 enum supplicant_state state;
177 GSList *scan_results;
180 static GSList *task_list = NULL;
182 static DBusConnection *connection;
184 static void free_task(struct supplicant_task *task)
186 DBG("task %p", task);
188 g_free(task->ifname);
193 static struct supplicant_task *find_task_by_index(int index)
197 for (list = task_list; list; list = list->next) {
198 struct supplicant_task *task = list->data;
200 if (task->ifindex == index)
207 static struct supplicant_task *find_task_by_path(const char *path)
211 for (list = task_list; list; list = list->next) {
212 struct supplicant_task *task = list->data;
214 if (g_str_equal(task->path, path) == TRUE)
221 static void add_interface_reply(DBusPendingCall *call, void *user_data)
223 struct supplicant_task *task = user_data;
228 DBG("task %p", task);
230 reply = dbus_pending_call_steal_reply(call);
234 if (dbus_message_get_type(reply) == DBUS_MESSAGE_TYPE_ERROR)
237 dbus_error_init(&error);
239 if (dbus_message_get_args(reply, &error, DBUS_TYPE_OBJECT_PATH, &path,
240 DBUS_TYPE_INVALID) == FALSE) {
241 if (dbus_error_is_set(&error) == TRUE) {
242 connman_error("%s", error.message);
243 dbus_error_free(&error);
245 connman_error("Wrong arguments for add interface");
249 DBG("path %s", path);
251 task->path = g_strdup(path);
252 task->created = TRUE;
254 connman_device_set_powered(task->device, TRUE);
257 dbus_message_unref(reply);
260 static int add_interface(struct supplicant_task *task)
262 DBusMessage *message;
263 DBusPendingCall *call;
265 DBG("task %p", task);
267 message = dbus_message_new_method_call(SUPPLICANT_NAME, SUPPLICANT_PATH,
268 SUPPLICANT_INTF, "addInterface");
272 dbus_message_append_args(message, DBUS_TYPE_STRING, &task->ifname,
275 if (dbus_connection_send_with_reply(connection, message,
276 &call, TIMEOUT) == FALSE) {
277 connman_error("Failed to add interface");
278 dbus_message_unref(message);
282 dbus_pending_call_set_notify(call, add_interface_reply, task, NULL);
284 dbus_message_unref(message);
289 static void get_interface_reply(DBusPendingCall *call, void *user_data)
291 struct supplicant_task *task = user_data;
296 DBG("task %p", task);
298 reply = dbus_pending_call_steal_reply(call);
302 if (dbus_message_get_type(reply) == DBUS_MESSAGE_TYPE_ERROR) {
307 dbus_error_init(&error);
309 if (dbus_message_get_args(reply, &error, DBUS_TYPE_OBJECT_PATH, &path,
310 DBUS_TYPE_INVALID) == FALSE) {
311 if (dbus_error_is_set(&error) == TRUE) {
312 connman_error("%s", error.message);
313 dbus_error_free(&error);
315 connman_error("Wrong arguments for get interface");
319 DBG("path %s", path);
321 task->path = g_strdup(path);
322 task->created = FALSE;
324 connman_device_set_powered(task->device, TRUE);
327 dbus_message_unref(reply);
330 static int create_interface(struct supplicant_task *task)
332 DBusMessage *message;
333 DBusPendingCall *call;
335 DBG("task %p", task);
337 message = dbus_message_new_method_call(SUPPLICANT_NAME, SUPPLICANT_PATH,
338 SUPPLICANT_INTF, "getInterface");
342 dbus_message_append_args(message, DBUS_TYPE_STRING, &task->ifname,
345 if (dbus_connection_send_with_reply(connection, message,
346 &call, TIMEOUT) == FALSE) {
347 connman_error("Failed to get interface");
348 dbus_message_unref(message);
352 dbus_pending_call_set_notify(call, get_interface_reply, task, NULL);
354 dbus_message_unref(message);
359 static void remove_interface_reply(DBusPendingCall *call, void *user_data)
361 struct supplicant_task *task = user_data;
364 DBG("task %p", task);
366 reply = dbus_pending_call_steal_reply(call);
368 connman_device_set_powered(task->device, FALSE);
370 connman_device_unref(task->device);
374 dbus_message_unref(reply);
377 static int remove_interface(struct supplicant_task *task)
379 DBusMessage *message;
380 DBusPendingCall *call;
382 DBG("task %p", task);
384 if (task->created == FALSE) {
385 connman_device_set_powered(task->device, FALSE);
389 message = dbus_message_new_method_call(SUPPLICANT_NAME, SUPPLICANT_PATH,
390 SUPPLICANT_INTF, "removeInterface");
394 dbus_message_append_args(message, DBUS_TYPE_OBJECT_PATH, &task->path,
397 if (dbus_connection_send_with_reply(connection, message,
398 &call, TIMEOUT) == FALSE) {
399 connman_error("Failed to remove interface");
400 dbus_message_unref(message);
404 dbus_pending_call_set_notify(call, remove_interface_reply, task, NULL);
406 dbus_message_unref(message);
412 static int set_ap_scan(struct supplicant_task *task)
414 DBusMessage *message, *reply;
418 DBG("task %p", task);
420 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
421 SUPPLICANT_INTF ".Interface", "setAPScan");
425 dbus_message_append_args(message, DBUS_TYPE_UINT32, &ap_scan,
428 dbus_error_init(&error);
430 reply = dbus_connection_send_with_reply_and_block(connection,
431 message, -1, &error);
433 if (dbus_error_is_set(&error) == TRUE) {
434 connman_error("%s", error.message);
435 dbus_error_free(&error);
437 connman_error("Failed to set AP scan");
438 dbus_message_unref(message);
442 dbus_message_unref(message);
444 dbus_message_unref(reply);
450 static int add_network(struct supplicant_task *task)
452 DBusMessage *message, *reply;
456 DBG("task %p", task);
458 if (task->netpath != NULL)
461 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
462 SUPPLICANT_INTF ".Interface", "addNetwork");
466 dbus_error_init(&error);
468 reply = dbus_connection_send_with_reply_and_block(connection,
469 message, -1, &error);
471 if (dbus_error_is_set(&error) == TRUE) {
472 connman_error("%s", error.message);
473 dbus_error_free(&error);
475 connman_error("Failed to add network");
476 dbus_message_unref(message);
480 dbus_message_unref(message);
482 dbus_error_init(&error);
484 if (dbus_message_get_args(reply, &error, DBUS_TYPE_OBJECT_PATH, &path,
485 DBUS_TYPE_INVALID) == FALSE) {
486 if (dbus_error_is_set(&error) == TRUE) {
487 connman_error("%s", error.message);
488 dbus_error_free(&error);
490 connman_error("Wrong arguments for network");
491 dbus_message_unref(reply);
495 DBG("path %s", path);
497 task->netpath = g_strdup(path);
499 dbus_message_unref(reply);
504 static int remove_network(struct supplicant_task *task)
506 DBusMessage *message, *reply;
509 DBG("task %p", task);
511 if (task->netpath == NULL)
514 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
515 SUPPLICANT_INTF ".Interface", "removeNetwork");
519 dbus_message_append_args(message, DBUS_TYPE_OBJECT_PATH, &task->netpath,
522 dbus_error_init(&error);
524 reply = dbus_connection_send_with_reply_and_block(connection,
525 message, -1, &error);
527 if (dbus_error_is_set(&error) == TRUE) {
528 connman_error("%s", error.message);
529 dbus_error_free(&error);
531 connman_error("Failed to remove network");
532 dbus_message_unref(message);
536 dbus_message_unref(message);
538 dbus_message_unref(reply);
540 g_free(task->netpath);
541 task->netpath = NULL;
546 static int select_network(struct supplicant_task *task)
548 DBusMessage *message, *reply;
551 DBG("task %p", task);
553 if (task->netpath == NULL)
556 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
557 SUPPLICANT_INTF ".Interface", "selectNetwork");
561 dbus_message_append_args(message, DBUS_TYPE_OBJECT_PATH, &task->netpath,
564 dbus_error_init(&error);
566 reply = dbus_connection_send_with_reply_and_block(connection,
567 message, -1, &error);
569 if (dbus_error_is_set(&error) == TRUE) {
570 connman_error("%s", error.message);
571 dbus_error_free(&error);
573 connman_error("Failed to select network");
574 dbus_message_unref(message);
578 dbus_message_unref(message);
580 dbus_message_unref(reply);
585 static int enable_network(struct supplicant_task *task)
587 DBusMessage *message, *reply;
590 DBG("task %p", task);
592 if (task->netpath == NULL)
595 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->netpath,
596 SUPPLICANT_INTF ".Network", "enable");
600 dbus_error_init(&error);
602 reply = dbus_connection_send_with_reply_and_block(connection,
603 message, -1, &error);
605 if (dbus_error_is_set(&error) == TRUE) {
606 connman_error("%s", error.message);
607 dbus_error_free(&error);
609 connman_error("Failed to enable network");
610 dbus_message_unref(message);
614 dbus_message_unref(message);
616 dbus_message_unref(reply);
621 static int disable_network(struct supplicant_task *task)
623 DBusMessage *message, *reply;
626 DBG("task %p", task);
628 if (task->netpath == NULL)
631 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->netpath,
632 SUPPLICANT_INTF ".Network", "disable");
636 dbus_error_init(&error);
638 reply = dbus_connection_send_with_reply_and_block(connection,
639 message, -1, &error);
641 if (dbus_error_is_set(&error) == TRUE) {
642 connman_error("%s", error.message);
643 dbus_error_free(&error);
645 connman_error("Failed to disable network");
646 dbus_message_unref(message);
650 dbus_message_unref(message);
652 dbus_message_unref(reply);
657 static int set_network(struct supplicant_task *task,
658 const unsigned char *network, int len,
659 const char *address, const char *security,
660 const char *passphrase)
662 DBusMessage *message, *reply;
663 DBusMessageIter array, dict;
666 DBG("task %p", task);
668 if (task->netpath == NULL)
671 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->netpath,
672 SUPPLICANT_INTF ".Network", "set");
676 dbus_message_iter_init_append(message, &array);
678 dbus_message_iter_open_container(&array, DBUS_TYPE_ARRAY,
679 DBUS_DICT_ENTRY_BEGIN_CHAR_AS_STRING
680 DBUS_TYPE_STRING_AS_STRING DBUS_TYPE_VARIANT_AS_STRING
681 DBUS_DICT_ENTRY_END_CHAR_AS_STRING, &dict);
683 if (address == NULL) {
684 dbus_uint32_t scan_ssid = 1;
685 connman_dbus_dict_append_variant(&dict, "scan_ssid",
686 DBUS_TYPE_UINT32, &scan_ssid);
688 connman_dbus_dict_append_variant(&dict, "bssid",
689 DBUS_TYPE_STRING, &address);
691 connman_dbus_dict_append_array(&dict, "ssid",
692 DBUS_TYPE_BYTE, &network, len);
694 if (g_ascii_strcasecmp(security, "wpa") == 0 ||
695 g_ascii_strcasecmp(security, "wpa2") == 0) {
696 const char *key_mgmt = "WPA-PSK";
697 connman_dbus_dict_append_variant(&dict, "key_mgmt",
698 DBUS_TYPE_STRING, &key_mgmt);
700 if (passphrase && strlen(passphrase) > 0)
701 connman_dbus_dict_append_variant(&dict, "psk",
702 DBUS_TYPE_STRING, &passphrase);
703 } else if (g_ascii_strcasecmp(security, "wep") == 0) {
704 const char *key_mgmt = "NONE", *index = "0";
705 connman_dbus_dict_append_variant(&dict, "key_mgmt",
706 DBUS_TYPE_STRING, &key_mgmt);
709 int size = strlen(passphrase);
710 if (size == 10 || size == 26) {
711 unsigned char *key = malloc(13);
714 memset(tmp, 0, sizeof(tmp));
717 for (i = 0; i < size / 2; i++) {
718 memcpy(tmp, passphrase + (i * 2), 2);
719 key[i] = (unsigned char) strtol(tmp,
722 connman_dbus_dict_append_array(&dict,
723 "wep_key0", DBUS_TYPE_BYTE,
727 connman_dbus_dict_append_variant(&dict,
728 "wep_key0", DBUS_TYPE_STRING,
730 connman_dbus_dict_append_variant(&dict, "wep_tx_keyidx",
731 DBUS_TYPE_STRING, &index);
734 const char *key_mgmt = "NONE";
735 connman_dbus_dict_append_variant(&dict, "key_mgmt",
736 DBUS_TYPE_STRING, &key_mgmt);
739 dbus_message_iter_close_container(&array, &dict);
741 dbus_error_init(&error);
743 reply = dbus_connection_send_with_reply_and_block(connection,
744 message, -1, &error);
746 if (dbus_error_is_set(&error) == TRUE) {
747 connman_error("%s", error.message);
748 dbus_error_free(&error);
750 connman_error("Failed to set network options");
751 dbus_message_unref(message);
755 dbus_message_unref(message);
757 dbus_message_unref(reply);
762 static int initiate_scan(struct supplicant_task *task)
764 DBusMessage *message;
765 DBusPendingCall *call;
767 DBG("task %p", task);
769 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
770 SUPPLICANT_INTF ".Interface", "scan");
774 if (dbus_connection_send_with_reply(connection, message,
775 &call, TIMEOUT) == FALSE) {
776 connman_error("Failed to initiate scan");
777 dbus_message_unref(message);
781 dbus_message_unref(message);
786 static char *build_group(const unsigned char *ssid, unsigned int ssid_len,
787 const char *mode, const char *security)
795 str = g_string_sized_new((ssid_len * 2) + 24);
799 g_string_append_printf(str, "wifi_");
801 for (i = 0; i < ssid_len; i++)
802 g_string_append_printf(str, "%02x", ssid[i]);
804 g_string_append_printf(str, "_%s_%s", mode, security);
806 return g_string_free(str, FALSE);
809 static void extract_addr(DBusMessageIter *value,
810 struct supplicant_result *result)
812 DBusMessageIter array;
813 struct ether_addr *eth;
817 dbus_message_iter_recurse(value, &array);
818 dbus_message_iter_get_fixed_array(&array, &addr, &addr_len);
825 result->addr = g_try_malloc0(18);
826 if (result->addr == NULL)
829 snprintf(result->addr, 18, "%02X:%02X:%02X:%02X:%02X:%02X",
830 eth->ether_addr_octet[0],
831 eth->ether_addr_octet[1],
832 eth->ether_addr_octet[2],
833 eth->ether_addr_octet[3],
834 eth->ether_addr_octet[4],
835 eth->ether_addr_octet[5]);
837 result->path = g_try_malloc0(18);
838 if (result->path == NULL)
841 snprintf(result->path, 18, "%02X_%02X_%02X_%02X_%02X_%02X",
842 eth->ether_addr_octet[0],
843 eth->ether_addr_octet[1],
844 eth->ether_addr_octet[2],
845 eth->ether_addr_octet[3],
846 eth->ether_addr_octet[4],
847 eth->ether_addr_octet[5]);
850 static void extract_ssid(DBusMessageIter *value,
851 struct supplicant_result *result)
853 DBusMessageIter array;
857 dbus_message_iter_recurse(value, &array);
858 dbus_message_iter_get_fixed_array(&array, &ssid, &ssid_len);
866 result->ssid = g_try_malloc(ssid_len);
867 if (result->ssid == NULL)
870 memcpy(result->ssid, ssid, ssid_len);
871 result->ssid_len = ssid_len;
873 result->name = g_try_malloc0(ssid_len + 1);
874 if (result->name == NULL)
877 memcpy(result->name, ssid, ssid_len);
880 static void extract_wpaie(DBusMessageIter *value,
881 struct supplicant_result *result)
883 DBusMessageIter array;
887 dbus_message_iter_recurse(value, &array);
888 dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
891 result->has_wpa = TRUE;
894 static void extract_rsnie(DBusMessageIter *value,
895 struct supplicant_result *result)
897 DBusMessageIter array;
901 dbus_message_iter_recurse(value, &array);
902 dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
905 result->has_rsn = TRUE;
908 static void extract_wpsie(DBusMessageIter *value,
909 struct supplicant_result *result)
911 DBusMessageIter array;
915 dbus_message_iter_recurse(value, &array);
916 dbus_message_iter_get_fixed_array(&array, &ie, &ie_len);
919 result->has_wps = TRUE;
922 static void extract_capabilites(DBusMessageIter *value,
923 struct supplicant_result *result)
925 dbus_message_iter_get_basic(value, &result->capabilities);
927 if (result->capabilities & IEEE80211_CAP_ESS)
928 result->adhoc = FALSE;
929 else if (result->capabilities & IEEE80211_CAP_IBSS)
930 result->adhoc = TRUE;
932 if (result->capabilities & IEEE80211_CAP_PRIVACY)
933 result->has_wep = TRUE;
936 static void get_properties(struct supplicant_task *task);
938 static void properties_reply(DBusPendingCall *call, void *user_data)
940 struct supplicant_task *task = user_data;
941 struct supplicant_result result;
942 struct connman_network *network;
944 DBusMessageIter array, dict;
945 unsigned char strength;
946 const char *mode, *security;
949 DBG("task %p", task);
951 reply = dbus_pending_call_steal_reply(call);
953 get_properties(task);
957 if (dbus_message_get_type(reply) == DBUS_MESSAGE_TYPE_ERROR) {
958 dbus_message_unref(reply);
959 get_properties(task);
963 memset(&result, 0, sizeof(result));
965 dbus_message_iter_init(reply, &array);
967 dbus_message_iter_recurse(&array, &dict);
969 while (dbus_message_iter_get_arg_type(&dict) == DBUS_TYPE_DICT_ENTRY) {
970 DBusMessageIter entry, value;
973 dbus_message_iter_recurse(&dict, &entry);
974 dbus_message_iter_get_basic(&entry, &key);
976 dbus_message_iter_next(&entry);
978 dbus_message_iter_recurse(&entry, &value);
980 //type = dbus_message_iter_get_arg_type(&value);
981 //dbus_message_iter_get_basic(&value, &val);
989 * frequency : i (105)
990 * capabilities : q (113)
997 if (g_str_equal(key, "bssid") == TRUE)
998 extract_addr(&value, &result);
999 else if (g_str_equal(key, "ssid") == TRUE)
1000 extract_ssid(&value, &result);
1001 else if (g_str_equal(key, "wpaie") == TRUE)
1002 extract_wpaie(&value, &result);
1003 else if (g_str_equal(key, "rsnie") == TRUE)
1004 extract_rsnie(&value, &result);
1005 else if (g_str_equal(key, "wpsie") == TRUE)
1006 extract_wpsie(&value, &result);
1007 else if (g_str_equal(key, "capabilities") == TRUE)
1008 extract_capabilites(&value, &result);
1009 else if (g_str_equal(key, "quality") == TRUE)
1010 dbus_message_iter_get_basic(&value, &result.quality);
1011 else if (g_str_equal(key, "noise") == TRUE)
1012 dbus_message_iter_get_basic(&value, &result.noise);
1013 else if (g_str_equal(key, "level") == TRUE)
1014 dbus_message_iter_get_basic(&value, &result.level);
1015 else if (g_str_equal(key, "maxrate") == TRUE)
1016 dbus_message_iter_get_basic(&value, &result.maxrate);
1018 dbus_message_iter_next(&dict);
1021 if (result.path == NULL)
1024 if (result.path[0] == '\0')
1027 strength = result.quality;
1029 if (result.has_rsn == TRUE)
1031 else if (result.has_wpa == TRUE)
1033 else if (result.has_wep == TRUE)
1038 mode = (result.adhoc == TRUE) ? "adhoc" : "managed";
1040 group = build_group(result.ssid, result.ssid_len, mode, security);
1042 network = connman_device_get_network(task->device, result.path);
1043 if (network == NULL) {
1046 network = connman_network_create(result.path,
1047 CONNMAN_NETWORK_TYPE_WIFI);
1048 if (network == NULL)
1051 index = connman_device_get_index(task->device);
1052 connman_network_set_index(network, index);
1054 connman_network_set_protocol(network,
1055 CONNMAN_NETWORK_PROTOCOL_IP);
1057 connman_network_set_string(network, "Address", result.addr);
1059 connman_network_set_group(network, group);
1061 if (connman_device_add_network(task->device, network) < 0) {
1062 connman_network_unref(network);
1067 connman_network_set_group(network, group);
1071 if (result.name != NULL && result.name[0] != '\0')
1072 connman_network_set_string(network, "Name", result.name);
1074 connman_network_set_blob(network, "WiFi.SSID",
1075 result.ssid, result.ssid_len);
1077 connman_network_set_string(network, "WiFi.Mode", mode);
1079 DBG("%s (%s %s) strength %d (%s)",
1080 result.name, mode, security, strength,
1081 (result.has_wps == TRUE) ? "WPS" : "no WPS");
1083 connman_network_set_available(network, TRUE);
1084 connman_network_set_uint8(network, "Strength", strength);
1086 connman_network_set_string(network, "WiFi.Security", security);
1089 g_free(result.path);
1090 g_free(result.addr);
1091 g_free(result.name);
1092 g_free(result.ssid);
1094 dbus_message_unref(reply);
1096 get_properties(task);
1099 static void get_properties(struct supplicant_task *task)
1101 DBusMessage *message;
1102 DBusPendingCall *call;
1105 path = g_slist_nth_data(task->scan_results, 0);
1109 message = dbus_message_new_method_call(SUPPLICANT_NAME, path,
1110 SUPPLICANT_INTF ".BSSID",
1113 task->scan_results = g_slist_remove(task->scan_results, path);
1116 if (message == NULL)
1119 if (dbus_connection_send_with_reply(connection, message,
1120 &call, TIMEOUT) == FALSE) {
1121 connman_error("Failed to get network properties");
1122 dbus_message_unref(message);
1126 dbus_pending_call_set_notify(call, properties_reply, task, NULL);
1128 dbus_message_unref(message);
1133 if (task->noscan == FALSE)
1134 connman_device_set_scanning(task->device, FALSE);
1137 static void scan_results_reply(DBusPendingCall *call, void *user_data)
1139 struct supplicant_task *task = user_data;
1145 DBG("task %p", task);
1147 reply = dbus_pending_call_steal_reply(call);
1151 if (dbus_message_get_type(reply) == DBUS_MESSAGE_TYPE_ERROR)
1154 dbus_error_init(&error);
1156 if (dbus_message_get_args(reply, &error,
1157 DBUS_TYPE_ARRAY, DBUS_TYPE_OBJECT_PATH,
1158 &results, &num_results,
1159 DBUS_TYPE_INVALID) == FALSE) {
1160 if (dbus_error_is_set(&error) == TRUE) {
1161 connman_error("%s", error.message);
1162 dbus_error_free(&error);
1164 connman_error("Wrong arguments for scan result");
1168 if (num_results == 0)
1171 for (i = 0; i < num_results; i++) {
1172 char *path = g_strdup(results[i]);
1176 task->scan_results = g_slist_append(task->scan_results, path);
1179 g_strfreev(results);
1181 dbus_message_unref(reply);
1183 get_properties(task);
1188 dbus_message_unref(reply);
1191 if (task->noscan == FALSE)
1192 connman_device_set_scanning(task->device, FALSE);
1195 static void scan_results_available(struct supplicant_task *task)
1197 DBusMessage *message;
1198 DBusPendingCall *call;
1200 DBG("task %p", task);
1202 message = dbus_message_new_method_call(SUPPLICANT_NAME, task->path,
1203 SUPPLICANT_INTF ".Interface",
1205 if (message == NULL)
1208 if (dbus_connection_send_with_reply(connection, message,
1209 &call, TIMEOUT) == FALSE) {
1210 connman_error("Failed to request scan result");
1214 if (task->noscan == FALSE)
1215 connman_device_set_scanning(task->device, TRUE);
1217 dbus_pending_call_set_notify(call, scan_results_reply, task, NULL);
1220 dbus_message_unref(message);
1223 static enum supplicant_state string2state(const char *state)
1225 if (g_str_equal(state, "INACTIVE") == TRUE)
1226 return WPA_INACTIVE;
1227 else if (g_str_equal(state, "SCANNING") == TRUE)
1228 return WPA_SCANNING;
1229 else if (g_str_equal(state, "ASSOCIATING") == TRUE)
1230 return WPA_ASSOCIATING;
1231 else if (g_str_equal(state, "ASSOCIATED") == TRUE)
1232 return WPA_ASSOCIATED;
1233 else if (g_str_equal(state, "GROUP_HANDSHAKE") == TRUE)
1234 return WPA_GROUP_HANDSHAKE;
1235 else if (g_str_equal(state, "4WAY_HANDSHAKE") == TRUE)
1236 return WPA_4WAY_HANDSHAKE;
1237 else if (g_str_equal(state, "COMPLETED") == TRUE)
1238 return WPA_COMPLETED;
1239 else if (g_str_equal(state, "DISCONNECTED") == TRUE)
1240 return WPA_DISCONNECTED;
1245 static void state_change(struct supplicant_task *task, DBusMessage *msg)
1248 const char *newstate, *oldstate;
1249 enum supplicant_state state;
1251 dbus_error_init(&error);
1253 if (dbus_message_get_args(msg, &error, DBUS_TYPE_STRING, &newstate,
1254 DBUS_TYPE_STRING, &oldstate,
1255 DBUS_TYPE_INVALID) == FALSE) {
1256 if (dbus_error_is_set(&error) == TRUE) {
1257 connman_error("%s", error.message);
1258 dbus_error_free(&error);
1260 connman_error("Wrong arguments for state change");
1264 DBG("state %s ==> %s", oldstate, newstate);
1266 state = string2state(newstate);
1267 if (state == WPA_INVALID)
1270 task->state = state;
1272 switch (task->state) {
1274 task->noscan = TRUE;
1275 connman_device_set_scanning(task->device, TRUE);
1277 case WPA_ASSOCIATING:
1278 case WPA_ASSOCIATED:
1279 case WPA_4WAY_HANDSHAKE:
1280 case WPA_GROUP_HANDSHAKE:
1281 task->noscan = TRUE;
1284 case WPA_DISCONNECTED:
1285 task->noscan = FALSE;
1288 task->noscan = FALSE;
1289 connman_device_set_scanning(task->device, FALSE);
1295 if (task->network == NULL)
1298 switch (task->state) {
1301 connman_network_set_connected(task->network, TRUE);
1302 connman_device_set_scanning(task->device, FALSE);
1304 case WPA_DISCONNECTED:
1306 connman_network_set_connected(task->network, FALSE);
1307 connman_device_set_scanning(task->device, FALSE);
1314 static DBusHandlerResult supplicant_filter(DBusConnection *conn,
1315 DBusMessage *msg, void *data)
1317 struct supplicant_task *task;
1318 const char *member, *path;
1320 if (dbus_message_has_interface(msg,
1321 SUPPLICANT_INTF ".Interface") == FALSE)
1322 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1324 member = dbus_message_get_member(msg);
1326 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1328 path = dbus_message_get_path(msg);
1330 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1332 task = find_task_by_path(path);
1334 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1336 DBG("task %p member %s", task, member);
1338 if (g_str_equal(member, "ScanResultsAvailable") == TRUE)
1339 scan_results_available(task);
1340 else if (g_str_equal(member, "StateChange") == TRUE)
1341 state_change(task, msg);
1343 return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
1346 int supplicant_start(struct connman_device *device)
1348 struct supplicant_task *task;
1350 DBG("device %p", device);
1352 task = g_try_new0(struct supplicant_task, 1);
1356 task->ifindex = connman_device_get_index(device);
1357 task->ifname = inet_index2name(task->ifindex);
1359 if (task->ifname == NULL) {
1364 task->device = connman_device_ref(device);
1366 task->created = FALSE;
1367 task->noscan = FALSE;
1368 task->state = WPA_INVALID;
1370 task_list = g_slist_append(task_list, task);
1372 return create_interface(task);
1375 int supplicant_stop(struct connman_device *device)
1377 int index = connman_device_get_index(device);
1378 struct supplicant_task *task;
1380 DBG("device %p", device);
1382 task = find_task_by_index(index);
1386 task_list = g_slist_remove(task_list, task);
1388 disable_network(task);
1390 remove_network(task);
1392 return remove_interface(task);
1395 int supplicant_scan(struct connman_device *device)
1397 int index = connman_device_get_index(device);
1398 struct supplicant_task *task;
1401 DBG("device %p", device);
1403 task = find_task_by_index(index);
1407 switch (task->state) {
1410 case WPA_ASSOCIATING:
1411 case WPA_ASSOCIATED:
1412 case WPA_4WAY_HANDSHAKE:
1413 case WPA_GROUP_HANDSHAKE:
1419 err = initiate_scan(task);
1424 int supplicant_connect(struct connman_network *network)
1426 struct supplicant_task *task;
1427 const char *address, *security, *passphrase;
1429 unsigned int ssid_len;
1432 DBG("network %p", network);
1434 address = connman_network_get_string(network, "Address");
1435 security = connman_network_get_string(network, "WiFi.Security");
1436 passphrase = connman_network_get_string(network, "WiFi.Passphrase");
1438 ssid = connman_network_get_blob(network, "WiFi.SSID", &ssid_len);
1440 DBG("address %s security %s passphrase %s",
1441 address, security, passphrase);
1443 if (security == NULL && passphrase == NULL)
1446 if (g_str_equal(security, "none") == FALSE && passphrase == NULL)
1449 index = connman_network_get_index(network);
1451 task = find_task_by_index(index);
1455 task->network = connman_network_ref(network);
1459 select_network(task);
1460 disable_network(task);
1462 set_network(task, ssid, ssid_len, address, security, passphrase);
1464 enable_network(task);
1469 int supplicant_disconnect(struct connman_network *network)
1471 struct supplicant_task *task;
1474 DBG("network %p", network);
1476 index = connman_network_get_index(network);
1478 task = find_task_by_index(index);
1482 disable_network(task);
1484 remove_network(task);
1486 connman_network_set_connected(task->network, FALSE);
1488 connman_network_unref(task->network);
1493 static void supplicant_activate(DBusConnection *conn)
1495 DBusMessage *message;
1497 DBG("conn %p", conn);
1499 message = dbus_message_new_method_call(SUPPLICANT_NAME, "/",
1500 DBUS_INTERFACE_INTROSPECTABLE, "Introspect");
1501 if (message == NULL)
1504 dbus_message_set_no_reply(message, TRUE);
1506 dbus_connection_send(conn, message, NULL);
1508 dbus_message_unref(message);
1511 static GSList *driver_list = NULL;
1513 static void supplicant_probe(DBusConnection *conn, void *user_data)
1517 DBG("conn %p", conn);
1519 for (list = driver_list; list; list = list->next) {
1520 struct supplicant_driver *driver = list->data;
1522 DBG("driver %p name %s", driver, driver->name);
1529 static void supplicant_remove(DBusConnection *conn, void *user_data)
1533 DBG("conn %p", conn);
1535 for (list = driver_list; list; list = list->next) {
1536 struct supplicant_driver *driver = list->data;
1538 DBG("driver %p name %s", driver, driver->name);
1545 static const char *supplicant_rule = "type=signal,"
1546 "interface=" SUPPLICANT_INTF ".Interface";
1549 static int supplicant_create(void)
1551 if (g_slist_length(driver_list) > 0)
1554 connection = connman_dbus_get_connection();
1555 if (connection == NULL)
1558 DBG("connection %p", connection);
1560 if (dbus_connection_add_filter(connection,
1561 supplicant_filter, NULL, NULL) == FALSE) {
1562 connection = connman_dbus_get_connection();
1566 dbus_bus_add_match(connection, supplicant_rule, NULL);
1567 dbus_connection_flush(connection);
1569 watch = g_dbus_add_service_watch(connection, SUPPLICANT_NAME,
1570 supplicant_probe, supplicant_remove, NULL, NULL);
1575 static void supplicant_destroy(void)
1577 if (g_slist_length(driver_list) > 0)
1580 DBG("connection %p", connection);
1583 g_dbus_remove_watch(connection, watch);
1585 dbus_bus_remove_match(connection, supplicant_rule, NULL);
1586 dbus_connection_flush(connection);
1588 dbus_connection_remove_filter(connection, supplicant_filter, NULL);
1590 dbus_connection_unref(connection);
1594 int supplicant_register(struct supplicant_driver *driver)
1598 DBG("driver %p name %s", driver, driver->name);
1600 err = supplicant_create();
1604 driver_list = g_slist_append(driver_list, driver);
1606 if (g_dbus_check_service(connection, SUPPLICANT_NAME) == TRUE)
1607 supplicant_probe(connection, NULL);
1609 supplicant_activate(connection);
1614 void supplicant_unregister(struct supplicant_driver *driver)
1616 DBG("driver %p name %s", driver, driver->name);
1618 supplicant_remove(connection, NULL);
1620 driver_list = g_slist_remove(driver_list, driver);
1622 supplicant_destroy();