OLD | NEW |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/extensions/api/networking_private/networking_private_li
nux.h" | 5 #include "chrome/browser/extensions/api/networking_private/networking_private_li
nux.h" |
6 | 6 |
7 #include "base/bind.h" | 7 #include "base/bind.h" |
8 #include "base/bind_helpers.h" | 8 #include "base/bind_helpers.h" |
9 #include "base/callback.h" | 9 #include "base/callback.h" |
10 #include "base/message_loop/message_loop.h" | 10 #include "base/message_loop/message_loop.h" |
(...skipping 562 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
573 if (!reader.PopVariantOfByte(&strength)) { | 573 if (!reader.PopVariantOfByte(&strength)) { |
574 LOG(ERROR) << "Unexpected response for " << access_point_path.value() | 574 LOG(ERROR) << "Unexpected response for " << access_point_path.value() |
575 << ": " << response->ToString(); | 575 << ": " << response->ToString(); |
576 return false; | 576 return false; |
577 } | 577 } |
578 | 578 |
579 access_point_info->SetInteger(kAccessPointInfoWifiSignalStrengthDotted, | 579 access_point_info->SetInteger(kAccessPointInfoWifiSignalStrengthDotted, |
580 strength); | 580 strength); |
581 } | 581 } |
582 | 582 |
583 // Read the security type. | 583 // Read the security type. This is from the WpaFlags and RsnFlags property |
| 584 // which are of the same type and can be OR'd together to find all supported |
| 585 // security modes. |
| 586 |
| 587 uint32 wpa_security_flags = 0; |
584 { | 588 { |
585 scoped_ptr<dbus::Response> response(GetAccessPointProperty( | 589 scoped_ptr<dbus::Response> response(GetAccessPointProperty( |
586 access_point_proxy, | 590 access_point_proxy, |
587 networking_private::kNetworkManagerWpaFlagsProperty)); | 591 networking_private::kNetworkManagerWpaFlagsProperty)); |
588 if (!response) { | 592 if (!response) { |
589 return false; | 593 return false; |
590 } | 594 } |
591 | 595 |
592 dbus::MessageReader reader(response.get()); | 596 dbus::MessageReader reader(response.get()); |
593 uint32 security_flags = 0; | 597 |
594 if (!reader.PopVariantOfUint32(&security_flags)) { | 598 if (!reader.PopVariantOfUint32(&wpa_security_flags)) { |
595 LOG(ERROR) << "Unexpected response for " << access_point_path.value() | 599 LOG(ERROR) << "Unexpected response for " << access_point_path.value() |
596 << ": " << response->ToString(); | 600 << ": " << response->ToString(); |
597 return false; | 601 return false; |
598 } | 602 } |
599 | |
600 std::string security; | |
601 MapSecurityFlagsToString(security_flags, &security); | |
602 access_point_info->SetString(kAccessPointInfoWifiSecurityDotted, security); | |
603 } | 603 } |
604 | 604 |
| 605 uint32 rsn_security_flags = 0; |
| 606 { |
| 607 scoped_ptr<dbus::Response> response(GetAccessPointProperty( |
| 608 access_point_proxy, |
| 609 networking_private::kNetworkManagerRsnFlagsProperty)); |
| 610 if (!response) { |
| 611 return false; |
| 612 } |
| 613 |
| 614 dbus::MessageReader reader(response.get()); |
| 615 |
| 616 if (!reader.PopVariantOfUint32(&rsn_security_flags)) { |
| 617 LOG(ERROR) << "Unexpected response for " << access_point_path.value() |
| 618 << ": " << response->ToString(); |
| 619 return false; |
| 620 } |
| 621 } |
| 622 |
| 623 std::string security; |
| 624 MapSecurityFlagsToString(rsn_security_flags | wpa_security_flags, &security); |
| 625 access_point_info->SetString(kAccessPointInfoWifiSecurityDotted, security); |
605 access_point_info->SetString(kAccessPointInfoType, kAccessPointInfoTypeWifi); | 626 access_point_info->SetString(kAccessPointInfoType, kAccessPointInfoTypeWifi); |
606 access_point_info->SetBoolean(kAccessPointInfoConnectable, true); | 627 access_point_info->SetBoolean(kAccessPointInfoConnectable, true); |
607 return true; | 628 return true; |
608 } | 629 } |
609 | 630 |
610 bool NetworkingPrivateLinux::AddAccessPointsFromDevice( | 631 bool NetworkingPrivateLinux::AddAccessPointsFromDevice( |
611 const dbus::ObjectPath& device_path, | 632 const dbus::ObjectPath& device_path, |
612 NetworkMap* network_map) { | 633 NetworkMap* network_map) { |
613 AssertOnDBusThread(); | 634 AssertOnDBusThread(); |
614 dbus::ObjectPath connected_access_point; | 635 dbus::ObjectPath connected_access_point; |
(...skipping 95 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
710 connection_state); | 731 connection_state); |
711 existing_access_point->SetInteger( | 732 existing_access_point->SetInteger( |
712 kAccessPointInfoWifiSignalStrengthDotted, signal_strength); | 733 kAccessPointInfoWifiSignalStrengthDotted, signal_strength); |
713 existing_access_point->SetString(kAccessPointInfoGuid, network_guid); | 734 existing_access_point->SetString(kAccessPointInfoGuid, network_guid); |
714 } | 735 } |
715 } | 736 } |
716 } | 737 } |
717 | 738 |
718 void NetworkingPrivateLinux::MapSecurityFlagsToString(uint32 security_flags, | 739 void NetworkingPrivateLinux::MapSecurityFlagsToString(uint32 security_flags, |
719 std::string* security) { | 740 std::string* security) { |
720 // TODO(zentaro): Correct mapping - this may not be correct but the underlying | |
721 // API appears not to work on Trusty so I can't verify yet. | |
722 // Everything returns 0. | |
723 // Valid values are None, WEP-PSK, WEP-8021X, WPA-PSK, WPA-EAP | 741 // Valid values are None, WEP-PSK, WEP-8021X, WPA-PSK, WPA-EAP |
724 if (security_flags == NetworkingPrivateLinux::NM_802_11_AP_SEC_NONE) { | 742 if (security_flags == NetworkingPrivateLinux::NM_802_11_AP_SEC_NONE) { |
725 *security = kAccessPointSecurityNone; | 743 *security = kAccessPointSecurityNone; |
726 } else if (security_flags & | 744 } else if (security_flags & |
727 NetworkingPrivateLinux::NM_802_11_AP_SEC_KEY_MGMT_PSK) { | 745 NetworkingPrivateLinux::NM_802_11_AP_SEC_KEY_MGMT_PSK) { |
728 *security = kAccessPointSecurityWpaPsk; | 746 *security = kAccessPointSecurityWpaPsk; |
729 } else if (security_flags & | 747 } else if (security_flags & |
730 NetworkingPrivateLinux::NM_802_11_AP_SEC_KEY_MGMT_802_1X) { | 748 NetworkingPrivateLinux::NM_802_11_AP_SEC_KEY_MGMT_802_1X) { |
731 *security = kAccessPointSecurity9021X; | 749 *security = kAccessPointSecurity9021X; |
732 } else { | 750 } else { |
(...skipping 141 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
874 | 892 |
875 if (!variant_reader.PopObjectPath(access_point_path)) { | 893 if (!variant_reader.PopObjectPath(access_point_path)) { |
876 LOG(ERROR) << "Unexpected response: " << response->ToString(); | 894 LOG(ERROR) << "Unexpected response: " << response->ToString(); |
877 return false; | 895 return false; |
878 } | 896 } |
879 | 897 |
880 return true; | 898 return true; |
881 } | 899 } |
882 | 900 |
883 } // namespace extensions | 901 } // namespace extensions |
OLD | NEW |