summaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2012-07-02Release 1.31.3Marcel Holtmann2-1/+7
2012-07-02rtnl: Fixed log for the type RTM_GETADDRPaulo Pizarro1-0/+2
The connman prints an unknown type when sending a request RTM_GETADDR
2012-07-02tethering: Fix incorrect index value for private networkWu Zheng1-1/+1
In __connman_private_network_request, pn->fd is used as the index value and passed to __connman_ippool_create, which is not correct. It result in the private network is block used externally.
2012-06-30unit: Watch for signals only on CONNMAN_SERVICELucas De Marchi1-1/+1
2012-06-30ofono: Watch for signals only on OFONO_SERVICELucas De Marchi1-15/+18
2012-06-30dundee: Watch for signals only on DUNDEE_SERVICELucas De Marchi1-5/+5
2012-06-30bluetooth: Watch for signals only on BLUEZ_SERVICELucas De Marchi1-8/+9
2012-06-30gdbus: Fix removal of filter after last filter_dataLucas De Marchi1-9/+8
If there's a signal watch that's also watching for name (data->name_watch) currently we are trying to remove the message_filter twice since we may have the following call chain: filter_data_remove_callback() filter_data_free() g_dbus_remove_watch() filter_data_remove_callback() filter_data_free() dbus_connection_remove_filter() dbus_connection_remove_filter() Because of this we can't currently watch for signals passing the bus name. After this patch we don't have this issue anymore. We fix it by removing the filter before calling filter_data_free() if we are the last filter_data and thus avoid calling dbus_connection_remove_filter() twice.
2012-06-30ofono: Fix potential crashGuillaume Zajac1-0/+6
If a dummy context is created, it might happen that its index is equal to -1. In this particular case the IP address has not been copied to context->address during ipv4 extraction. If we force from oFono a context activation, it will make ConnMan crashing on set_connected().
2012-06-28inet: Fix usage of getaddrinfo() return valuePatrik Flykt1-2/+0
Fixes BMC#25304
2012-06-28wifi: Add wifi pointer NULL checksPatrik Flykt1-3/+24
Always check what connman_device_get_data() returns and act accordingly.
2012-06-28main: static-qualify default config valuesGrant Erickson1-2/+2
The default configuration arrays default_auto_connect and default_blacklist must be static-qualified. Otherwise, their stack-allocated storage will go out of scope after parse_config is finished and empty or commented-out DefaultAutoConnectTechnologies or NetworkInterfaceBlacklist config entries will refer to random stack data.
2012-06-27TODO: Add WPS pin code taskPatrik Flykt1-0/+7
2012-06-27TODO: Remove DUN task, update WiFi scan ownerPatrik Flykt1-8/+1
2012-06-26Release 1.21.2Marcel Holtmann2-1/+15
2012-06-26gweb: Use g_try_realloc instead of g_reallocJukka Rissanen1-1/+3
2012-06-26doc: Document 'informational' value of Requirement fieldTomasz Bursztyka1-7/+12
2012-06-26agent: Fix how to provide PreviousPassphrase through D-BusTomasz Bursztyka1-6/+29
2012-06-25ipconfig: Save prefixlen only if not clearedJulien Massot1-2/+3
This commit fixes a bug when using manual ipv4 addressing. The first time it works, but once the service is reconnected it uses an invalid netmask: 255.255.255.255.
2012-06-25wifi: Check we have valid wifi pointer in autoscanJukka Rissanen1-0/+3
The wifi pointer in device might be NULL if wpa_supplicant dies between autoscans.
2012-06-25technology: Return proper error code when already disabledJukka Rissanen1-1/+4
Return AlreadyDisabled to the caller instead of InProgress if we are already disabled.
2012-06-25technology: Return proper error code when already enabledJukka Rissanen1-1/+4
We do not call the generic error message function because it maps EALREADY to EINPROGRESS. So instead we call correct error return function which returns AlreadyEnabled to the caller. Fixes BMC#25306
2012-06-25main.conf: Comment out example default values and add documentationPatrik Flykt1-5/+6
2012-06-25main: Use 'NetworkInterfaceBlacklist' string everywherePatrik Flykt2-2/+2
2012-06-25rtnl: Use filtered devices to determine blacklisted devicesManfred Kober1-10/+1
Instead of hard-coding some selected devices to be ignored, the blacklist check now uses the connman_device_isfiltered list.
2012-06-25device: Consider blacklisted interfaces from main.conf when filteringManfred Kober1-1/+15
Interfaces blacklisted in main.conf are now also taken into account by connman_device_isfiltered. This is done in addition to what gets passed with -i or -I on the command line.
2012-06-25main: Support NetworkInterfaceBlacklist from main.confManfred Kober1-0/+23
This adds a settings variable and a function for fetching that list
2012-06-25main.conf: Add NetworkInterfaceBlacklistManfred Kober1-0/+6
2012-06-20dnsproxy: Check cache for TCP request before connecting to serverJukka Rissanen1-1/+31
It is not necessary to create TCP sockets to server if we have the answer already in the cache.
2012-06-20dnsproxy: Use DNS header in checksJukka Rissanen1-5/+7
We should use the DNS header struct when checking DNS protocol values instead of using pointer so that the TCP offset is properly taken care of.
2012-06-20dnsproxy: Add more debugging printsJukka Rissanen1-7/+17
2012-06-20dnsproxy: Check cache properly for TCP packetsJukka Rissanen1-4/+13
The DNS packet starts from offset 2 in TCP payload.
2012-06-20dnsproxy: Fix the negative caching of AAAA recordJukka Rissanen1-4/+13
Handle the TCP offset properly.
2012-06-20dnsproxy: Save DNS packet in cache always in TCP formatJukka Rissanen1-13/+57
The cached DNS packet will always contain two prefix bytes. For UDP we do not send these two extra bytes. This way we do not need to know if the cached message is from UDP or TCP query.
2012-06-20dnsproxy: Do not generate SIGPIPEJukka Rissanen1-6/+6
Instead of generating SIGPIPE, just return EPIPE error if TCP stream is broken. This way we cannot get aborted if we receive SIGPIPE (seen this happening).
2012-06-20ippool: Fix endless loop issue with 32 prefix lengthGuillaume Zajac1-1/+5
While trying to establish a DUN connection with oFono, an endless loop was found when requesting an IP block. The problem was on data connection activation its address with 32 length prefix was notified through ConnMann using __connman_ippool_newaddr() but mask address shifting with 32 bits was obsolete. So IP pool was considerating block 0.0.0.0 to 255.255.255.255 was in use.
2012-06-18dnsproxy: Fix flushing pending requestsPaulo Pizarro1-19/+15
2012-06-18dnsproxy: Release all the fields of the request after forward dns replyPaulo Pizarro1-5/+1
2012-06-18dnsproxy: Avoid duplication of domains in the TCP server domain listPaulo Pizarro1-15/+2
The domain list is created in the tcp_server_event function at connection time (G_IO_OUT event), so it is not necessary to create it here too.
2012-06-18dnsproxy: If no request was sent then the TCP server is destroyedPaulo Pizarro1-2/+17
2012-06-18dnsproxy: If the answer is in the cache, the TCP request is releasedPaulo Pizarro1-23/+28
2012-06-18dnsproxy: Only one copy of the relevant buffers will be made to a TCP requestPaulo Pizarro1-37/+38
This copy will be made after scanning the list of nameservers and only if at least one TCP server is created. Otherwise, it will be sent an error response to the request.
2012-06-18README: Add information about mailing list and siteLucas De Marchi1-0/+10
2012-06-18wifi: Use common scan callback handlingPatrik Flykt1-2/+1
2012-06-18wifi: Do a hidden WiFi network scan also for user scansPatrik Flykt1-3/+3
Rename the callback function since it's not used only for autoscan.
2012-06-18wifi: Use scan_callback() instead of hidden_scan_callback()Patrik Flykt1-36/+26
The functionality of the callbacks are the same, thus start using scan_callback() only. As a result move code around.
2012-06-18device: Don't unnecessarily set device->scanning to falsePatrik Flykt1-2/+0
The WiFi plugin will call connman_device_set_scanning() immediately after connman_device_reset_scanning().
2012-06-18supplicant: Call scan callback if needed when removing interfacePatrik Flykt1-0/+15
Check whether a scan callback is set for the interface when an interface removed signal is received from wpa_supplicant. wpa_supplicant seems not to reply to any outstanding scan method calls after a wpa_supplicant 'RemoveInterface' has been received.
2012-06-18wifi: Reset autoscan timer on a new scanPatrik Flykt1-8/+14
Setting device scanning to false will clean up all networks not seen so far. If a user scan happens to be requested while the emulated background scan is running, the background scan will be cancelled and the non-discovered networks cleared. This causes unnecessary clearing and re-discovery of WiFi networks when the user scan is completed. Create a reset autoscan function that will only reset the autoscan parameters and not set device scanning to false. Call this function when starting a scan.
2012-06-18technology: Disable technology when the last device is unpoweredPatrik Flykt1-4/+8
Reply via D-Bus to the caller and send the technology 'Powered' property set to FALSE only after the last device has been powered off. Update code but not behavior in __connman_technology_enabled() so that the logic looks the same as in __connman_technology_disabled().