summaryrefslogtreecommitdiff
path: root/gsupplicant
diff options
context:
space:
mode:
authorJaehyun Kim <jeik01.kim@samsung.com>2013-04-16 17:43:48 +0900
committerZhang zhengguang <zhengguang.zhang@intel.com>2013-07-01 11:20:23 +0800
commit74aa0e84aeb9c42960b4ffd095516c9ac0673aa5 (patch)
tree3ad549b5b6b35a7c873bf1e51a9718f7eb9bf2f4 /gsupplicant
parent936ec03de949ffa457b3ee778c369a9a4fc2e42f (diff)
downloadconnman-74aa0e84aeb9c42960b4ffd095516c9ac0673aa5.tar.gz
connman-74aa0e84aeb9c42960b4ffd095516c9ac0673aa5.tar.bz2
connman-74aa0e84aeb9c42960b4ffd095516c9ac0673aa5.zip
Fix Wi-Fi WEP OPEN and WEP SHARED
Unable to connect with the WEP(open key) mode AP again with correct password if connecting the AP with wrong password before. Fix this issue.
Diffstat (limited to 'gsupplicant')
-rw-r--r--gsupplicant/supplicant.c17
1 files changed, 17 insertions, 0 deletions
diff --git a/gsupplicant/supplicant.c b/gsupplicant/supplicant.c
index 79bad7d5..0f625bcb 100644
--- a/gsupplicant/supplicant.c
+++ b/gsupplicant/supplicant.c
@@ -3430,6 +3430,17 @@ static void add_network_security_proto(DBusMessageIter *dict,
g_free(proto);
}
+#if defined TIZEN_EXT
+static void add_network_security_none(DBusMessageIter *dict,
+ GSupplicantSSID *ssid)
+{
+ const char *auth_alg = "OPEN";
+
+ supplicant_dbus_dict_append_basic(dict, "auth_alg",
+ DBUS_TYPE_STRING, &auth_alg);
+}
+#endif
+
static void add_network_security(DBusMessageIter *dict, GSupplicantSSID *ssid)
{
char *key_mgmt;
@@ -3437,6 +3448,12 @@ static void add_network_security(DBusMessageIter *dict, GSupplicantSSID *ssid)
switch (ssid->security) {
case G_SUPPLICANT_SECURITY_UNKNOWN:
case G_SUPPLICANT_SECURITY_NONE:
+#if defined TIZEN_EXT
+ key_mgmt = "NONE";
+ add_network_security_none(dict, ssid);
+ add_network_security_ciphers(dict, ssid);
+ break;
+#endif
case G_SUPPLICANT_SECURITY_WEP:
key_mgmt = "NONE";
add_network_security_wep(dict, ssid);