blob: daeb80f83690e7551e51351e1d51a7e75c3c22b6 [file] [log] [blame]
mukesh agrawalb54601c2011-06-07 17:39:22 -07001// Copyright (c) 2011 The Chromium OS Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "shill/wifi_service.h"
6
7#include <string>
8
9#include <base/logging.h>
Chris Masone34af2182011-08-22 11:59:36 -070010#include <base/stringprintf.h>
11#include <base/string_number_conversions.h>
12#include <base/string_util.h>
Chris Masone3bd3c8c2011-06-13 08:20:26 -070013#include <chromeos/dbus/service_constants.h>
mukesh agrawal6e277772011-09-29 15:04:23 -070014#include <dbus/dbus.h>
mukesh agrawalb54601c2011-06-07 17:39:22 -070015
16#include "shill/control_interface.h"
17#include "shill/device.h"
18#include "shill/shill_event.h"
19#include "shill/wifi.h"
mukesh agrawal6e277772011-09-29 15:04:23 -070020#include "shill/wifi_endpoint.h"
21#include "shill/wpa_supplicant.h"
mukesh agrawalb54601c2011-06-07 17:39:22 -070022
23using std::string;
24
25namespace shill {
mukesh agrawalb54601c2011-06-07 17:39:22 -070026
27WiFiService::WiFiService(ControlInterface *control_interface,
28 EventDispatcher *dispatcher,
Chris Masone6791a432011-07-12 13:23:19 -070029 Manager *manager,
Chris Masone2b105542011-06-22 10:58:09 -070030 const WiFiRefPtr &device,
mukesh agrawalb54601c2011-06-07 17:39:22 -070031 const std::vector<uint8_t> ssid,
Chris Masone092df3e2011-08-22 09:41:39 -070032 const std::string &mode,
mukesh agrawal6e277772011-09-29 15:04:23 -070033 const std::string &security)
mukesh agrawal7a4e4002011-09-06 11:26:05 -070034 : Service(control_interface, dispatcher, manager, flimflam::kTypeWifi),
mukesh agrawal6e277772011-09-29 15:04:23 -070035 security_(security),
Chris Masone092df3e2011-08-22 09:41:39 -070036 mode_(mode),
mukesh agrawalb54601c2011-06-07 17:39:22 -070037 task_factory_(this),
38 wifi_(device),
Chris Masone092df3e2011-08-22 09:41:39 -070039 ssid_(ssid) {
mukesh agrawalde29fa82011-09-16 16:16:36 -070040 PropertyStore *store = this->mutable_store();
Paul Stewartac4ac002011-08-26 12:04:26 -070041 store->RegisterConstString(flimflam::kModeProperty, &mode_);
42 store->RegisterString(flimflam::kPassphraseProperty, &passphrase_);
43 store->RegisterBool(flimflam::kPassphraseRequiredProperty, &need_passphrase_);
44 store->RegisterConstString(flimflam::kSecurityProperty, &security_);
45 store->RegisterConstUint8(flimflam::kSignalStrengthProperty, &strength_);
Chris Masone3bd3c8c2011-06-13 08:20:26 -070046
Paul Stewartac4ac002011-08-26 12:04:26 -070047 store->RegisterConstString(flimflam::kWifiAuthMode, &auth_mode_);
48 store->RegisterConstBool(flimflam::kWifiHiddenSsid, &hidden_ssid_);
49 store->RegisterConstUint16(flimflam::kWifiFrequency, &frequency_);
50 store->RegisterConstUint16(flimflam::kWifiPhyMode, &physical_mode_);
mukesh agrawal32399322011-09-01 10:53:43 -070051 store->RegisterConstString(flimflam::kWifiHexSsid, &hex_ssid_);
52
53 hex_ssid_ = base::HexEncode(&(*ssid_.begin()), ssid_.size());
Chris Masone9d779932011-08-25 16:33:41 -070054 set_name(name() +
55 "_" +
56 string(reinterpret_cast<const char*>(ssid_.data()), ssid_.size()));
57
mukesh agrawal6e277772011-09-29 15:04:23 -070058 // TODO(quiche): determine if it is okay to set EAP.KeyManagement for
59 // a service that is not 802.1x.
60 if (security_ == flimflam::kSecurity8021x) {
61 NOTIMPLEMENTED();
62 // XXX needs_passpharse_ = false ?
63 } else if (security_ == flimflam::kSecurityPsk) {
64 SetEAPKeyManagement("WPA-PSK");
65 need_passphrase_ = true;
66 } else if (security_ == flimflam::kSecurityRsn) {
67 SetEAPKeyManagement("WPA-PSK");
68 need_passphrase_ = true;
69 } else if (security_ == flimflam::kSecurityWpa) {
70 SetEAPKeyManagement("WPA-PSK");
71 need_passphrase_ = true;
72 } else if (security_ == flimflam::kSecurityWep) {
73 SetEAPKeyManagement("NONE");
74 need_passphrase_ = true;
75 } else if (security_ == flimflam::kSecurityNone) {
76 SetEAPKeyManagement("NONE");
77 need_passphrase_ = false;
78 } else {
79 LOG(ERROR) << "unsupported security method " << security_;
80 }
81
mukesh agrawal32399322011-09-01 10:53:43 -070082 // TODO(quiche): figure out when to set true
83 hidden_ssid_ = false;
mukesh agrawalb54601c2011-06-07 17:39:22 -070084}
85
86WiFiService::~WiFiService() {
87 LOG(INFO) << __func__;
88}
89
mukesh agrawal1830fa12011-09-26 14:31:40 -070090void WiFiService::Connect(Error */*error*/) {
mukesh agrawalb54601c2011-06-07 17:39:22 -070091 LOG(INFO) << __func__;
92
93 // NB(quiche) defer handling, since dbus-c++ does not permit us to
94 // send an outbound request while processing an inbound one.
Paul Stewartac4ac002011-08-26 12:04:26 -070095 dispatcher()->PostTask(
mukesh agrawaldc42bb32011-07-28 10:40:26 -070096 task_factory_.NewRunnableMethod(&WiFiService::ConnectTask));
mukesh agrawalb54601c2011-06-07 17:39:22 -070097}
98
Chris Masone3bd3c8c2011-06-13 08:20:26 -070099void WiFiService::Disconnect() {
100 // TODO(quiche) RemoveNetwork from supplicant
101 // XXX remove from favorite networks list?
102}
103
Paul Stewart22aa71b2011-09-16 12:15:11 -0700104bool WiFiService::TechnologyIs(const Technology::Identifier type) const {
105 return wifi_->TechnologyIs(type);
106}
107
Chris Masone9d779932011-08-25 16:33:41 -0700108string WiFiService::GetStorageIdentifier() {
Chris Masone34af2182011-08-22 11:59:36 -0700109 return StringToLowerASCII(base::StringPrintf("%s_%s_%s_%s_%s",
mukesh agrawal32399322011-09-01 10:53:43 -0700110 flimflam::kTypeWifi,
Chris Masone9d779932011-08-25 16:33:41 -0700111 wifi_->address().c_str(),
mukesh agrawal32399322011-09-01 10:53:43 -0700112 hex_ssid_.c_str(),
Chris Masone34af2182011-08-22 11:59:36 -0700113 mode_.c_str(),
114 security_.c_str()));
115}
116
Chris Masone092df3e2011-08-22 09:41:39 -0700117const string &WiFiService::mode() const {
mukesh agrawal445e72c2011-06-22 11:13:50 -0700118 return mode_;
119}
120
Chris Masone092df3e2011-08-22 09:41:39 -0700121const string &WiFiService::key_management() const {
Paul Stewartac4ac002011-08-26 12:04:26 -0700122 return GetEAPKeyManagement();
mukesh agrawal445e72c2011-06-22 11:13:50 -0700123}
124
125const std::vector<uint8_t> &WiFiService::ssid() const {
126 return ssid_;
127}
128
mukesh agrawal32399322011-09-01 10:53:43 -0700129// private methods
mukesh agrawaldc42bb32011-07-28 10:40:26 -0700130void WiFiService::ConnectTask() {
mukesh agrawal6e277772011-09-29 15:04:23 -0700131 std::map<string, DBus::Variant> params;
132 DBus::MessageIter writer;
133
134 params[wpa_supplicant::kNetworkPropertyMode].writer().
135 append_uint32(WiFiEndpoint::ModeStringToUint(mode_));
136
137 if (security_ == flimflam::kSecurity8021x) {
138 NOTIMPLEMENTED();
139 } else if (security_ == flimflam::kSecurityPsk) {
140 NOTIMPLEMENTED();
141 } else if (security_ == flimflam::kSecurityRsn) {
mukesh agrawalf2fd7452011-10-03 16:38:47 -0700142 params[wpa_supplicant::kPropertySecurityProtocol].writer().
143 append_string(wpa_supplicant::kSecurityModeRSN);
144 params[wpa_supplicant::kPropertyPreSharedKey].writer().
145 append_string(passphrase_.c_str());
mukesh agrawal6e277772011-09-29 15:04:23 -0700146 } else if (security_ == flimflam::kSecurityWpa) {
147 params[wpa_supplicant::kPropertySecurityProtocol].writer().
148 append_string(wpa_supplicant::kSecurityModeWPA);
149 params[wpa_supplicant::kPropertyPreSharedKey].writer().
150 append_string(passphrase_.c_str());
151 } else if (security_ == flimflam::kSecurityWep) {
152 NOTIMPLEMENTED();
153 } else if (security_ == flimflam::kSecurityNone) {
154 // nothing special to do here
155 } else {
156 LOG(ERROR) << "can't connect. unsupported security method " << security_;
157 }
158
159 params[wpa_supplicant::kPropertyKeyManagement].writer().
160 append_string(key_management().c_str());
161 // TODO(quiche): figure out why we can't use operator<< without the
162 // temporary variable.
163 writer = params[wpa_supplicant::kNetworkPropertySSID].writer();
164 writer << ssid_;
165
166 wifi_->ConnectTo(this, params);
mukesh agrawalb54601c2011-06-07 17:39:22 -0700167}
168
Chris Masone95207da2011-06-29 16:50:49 -0700169string WiFiService::GetDeviceRpcId() {
170 return wifi_->GetRpcIdentifier();
171}
172
mukesh agrawalb54601c2011-06-07 17:39:22 -0700173} // namespace shill