summaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2014-10-31Tizen: Unify bluetooth tethering enable logicZhang zhengguang1-1/+1
In bluez 4.x plugin, when bluetooth tethering is enabled, set_tethering() returns 0, while in bluez 5.x plugin, it returns -EINPROGRESS, which is not compatiable for ConnMan to handle both of them, this patch makes bluez 5.x tethering enable logic consistent with bluez 4.x. Change-Id: I618efd32b5f123fe9bdb58d10adb29c67a87796f
2014-10-31Tizen: Check some telephony flags before active contextguoqiang.liu1-0/+8
Telephony active maybe fail if data_allowed or ps_attached is false, so check it before actived. When data_allowed is false, if connman starts to auto connect 3G service, it will result in 3G service auto connected fail, which leads to it will not be auto connected next time. Change-Id: Ibdd9c34fee7a612c1788a364c69550c4f7e79123 Signed-off-by: guoqiang.liu <guoqiang.liu@archermind.com>
2014-10-31Tizen: Fix wifi enterprise to support SIM and AKAArron Wang2-1/+32
Revise Wi-Fi enterprise to enable PEAP, TLS, TTLS Fix wifi enterprise to support SIM and AKA Change-Id: Ib9c10615fd0668b2ebca57eac9285bf8a3564427
2014-10-31Tizen: Integrate telephony pluginArron Wang4-0/+1777
Change-Id: Ia178f5de981501296573bf3f48e329d5a1355af6
2014-10-31Tizen: Export network proxy API for telephony pluginArron Wang4-0/+41
Telephony plug-in requires manual PROXY setting function Telephony stack provides proxy address (3G profile). Change-Id: Iaa02f59465a687961c303667ee09051b419507d2
2014-10-31Tizen: Append extra wifi service propertyArron Wang2-0/+69
Append wifi property bssid, maxrate, frequency, encryptionmode to wifi service Change-Id: I1d5987334ab288fc04ff931fda5108f4afe864f0
2014-10-31Tizen: Export more wifi info in ConnMan network APIArron Wang5-1/+173
Network client requires additional wifi specific info Export the BSSID property Export the MaxRate property Export the detailed info for encryption mode(mixed,aes,tkip,wep,none) Export the connman_network get/set method for bssid, maxrate, encryption_mode property Change-Id: Ic5744978282e49cb2f70165aaadc7822dc718dfb
2014-10-31Add connmanctl to the built rpmZhang zhengguang1-1/+1
Change-Id: I84fb13ea9224985ad9e15b5c3c5f616bcf7431a4
2014-10-31Enable ConnMan VPND/OpenVPN/OpenConnect configurable in spec fileZhang zhengguang1-0/+88
2014-10-31Enable ConnMan NTP configurable in spec fileZhang zhengguang1-0/+19
2014-10-31Set ConnMan default settings in config filesZhang zhengguang2-1/+6
2014-10-31Set manifest request domain to floorZhang zhengguang2-0/+10
2014-10-31Add systemd service to manager ConnMan NTPZhang zhengguang2-0/+14
2014-10-31Add package build spec fileZhang zhengguang1-0/+97
Change-Id: Ia8c78e122998da70565700d895dbf54688e7c8b9
2014-10-31Add bootstrap filesZhang zhengguang2-0/+27
Change-Id: Ia3923cb1ff35e7bfbd4e45f13dd18af15ed89f56
2014-10-29Imported Upstream version 1.26upstream/1.26Zhang zhengguang94-1204/+5859
2014-07-17Imported Upstream version 1.24upstream/1.24Zhang zhengguang216-12462/+64845
2013-06-13client: Fix passphrase handlingPatrik Flykt1-2/+10
An empty passphrase means that WPS is to be tried next. If WPS is not supported by the service, passphrase can not be left empty.
2013-06-13client: Implement VPN Agent API RequestInput method callPatrik Flykt1-54/+77
Instead of having a global agent_input struct, make the structure a member of the agent_data structure that gets passed around when handling the RequestInput method call. With this modification agent_data is self-contained with all needed information and the RequestInput handling code can be shared between ConnMan and VPN agent implementations.
2013-06-13client: Add vpnagent command to register and unregister VPN AgentPatrik Flykt1-0/+30
2013-06-13client: Implement support for queueing Agent messagesPatrik Flykt1-9/+60
ConnMan and ConnMan VPN daemon both send only one Agent message at a time. Since they are two different daemons, they can be sending messages at the same time independent of each other. Implement a check for an agent request from the other daemon being already processed and if so store the message for later. When the current agent request has been processed, check if there are pending requests from the other daemon and re-run the pending function. In order to support arbitrary queueing, make all method call implementations asynchronous.
2013-06-13client: Add VPN Agent support for Release, Cancel and ReportErrorPatrik Flykt2-0/+119
Create a new agent data structure for the VPN Agent and add the needed minor modifications to Release, Cancel and ReportError method calls in order to get them working both for Agent and VPN Agent. Create new register and unregister functions for the VPN Agent code.
2013-06-13client: Create agent data structure and pass it in function callbacksPatrik Flykt3-76/+116
Collect the agent variables into a data structure and update the agent functionality to pass this data structure around as function callback user data. Update the agent mode input functionality to store both the callback function and user data pointers. Notice that only only one input callback can be handled at any one time due to the input handling itself and the simple storing of callback and user data pointers.
2013-06-13client: Don't handle Agent messages in monitor codePatrik Flykt1-0/+4
Agent messages need to be handled in the agent code, ignore them when they get captured in the monitor code.
2013-06-13client: Fix DBUS_TYPE_UINT16 pretty-printingPatrik Flykt1-0/+5
The previous pretty-printing fix causes another change to be made for DBUS_TYPE_UINT16.
2013-06-12dhcpv6: Send domain list option to serverJukka Rissanen3-12/+22
OPTION_DOMAIN_LIST(24) was not sent to server.
2013-06-12unit: Multiple collisions with different poolsJukka Rissanen1-0/+97
Existing tests did not test this scenario: * new address is registered to 192.168.0.2 * new address is registered to 192.168.1.2 * ippool is created to 192.168.2.1 (no collision) * ippool is created to 192.168.3.1 (no collision) * new address is registered to 192.168.3.1 (collision detected)
2013-06-12unit: Test ippool collision differentlyJukka Rissanen1-0/+87
Existing tests did not test this scenario: * new address is registered to 192.168.1.2 * ippool is created to 192.168.0.1 (no collision) * ippool is created to 192.168.2.1 (there is a collision and the code should skip the 192.168.1.1 range)
2013-06-12ippool: Clear allocated block pointer at cleanupJukka Rissanen1-0/+1
Without this the unit tests might core dump as the allocated_block pointer would point to already freed memory.
2013-06-12ippool: Private address check was incorrectJukka Rissanen1-13/+5
Fixes BMC#25993
2013-06-10service: Send proxy properties when connected or disconnectedJukka Rissanen1-0/+2
Fixes BMC#26019
2013-06-10technology: Offlinemode could not be disabled if no technology was poweredJukka Rissanen1-5/+9
If all the technologies were powered off, then offline mode could not be disabled. Fixes BMC#26018
2013-06-10TODO: Mark GSequence removal doneDaniel Wagner1-2/+1
2013-06-10service: Use GList instead of GSequence for service listDaniel Wagner1-186/+116
The hash table is now the owner of the service entry instead of the service list.
2013-06-10session: Use GList instead of GSequence for service listDaniel Wagner1-53/+41
The hash table is now the owner of the service entry instead of the service list.
2013-06-10session: Use service iterator instead of match/creation callbacksDaniel Wagner3-36/+28
When a new session is created we need to get the initial list of services which match the session AllowedBearers criteria. As soon the session is running add or removed services are tracked via the notifier interface. We concluded that exposing all the services is not really necessary and therefore we are using currently two callbacks to get the initial list. That exposes implementation details from session to service, that is GSequence. We also need to expose the type 'struct service_entry'. Instead doing so we are using an iterator and keep all the implementation details in session.c.
2013-06-10service: Initialize tech_dataDaniel Wagner1-1/+1
tech_data is allocated on the stack and is therefore not initilized with NULL.
2013-06-07client: Avoid printing extra prompt on RequestInputPatrik Flykt1-1/+2
2013-06-07client: Read D-Bus string type only if argument is 'Type'Patrik Flykt1-3/+4
A basic type was always read independent of the argument type which on some systems lead to a crash and on others only to a warning printout.
2013-06-07client: Pretty-print D-Bus signed integersPatrik Flykt1-1/+7
To keep it more logical, rename the unsigned variable in the code.
2013-06-07client: Add VPN monitoring supportPatrik Flykt1-38/+84
When adding VPN monitoring capabilities, also clean up the monitor code.
2013-06-07client: Add support for displaying VPN connectionsPatrik Flykt1-4/+75
Show a list of VPN connections known to the VPN daemon. Also allow D-Bus path names to start with numbers, as it is fine with the D-Bus library to define such path names. Fix up help command pretty-printing as the VPN command is slightly longer.
2013-06-07client: Add VPN connection helper functionPatrik Flykt3-0/+150
Add helper function for printing VPN connections. Show also configuration and failure states using 'C' and 'F' as configuration might take some time and failure conveys practical information to the user.
2013-06-07client: Add parameter to specify D-Bus service for method callPatrik Flykt4-26/+33
2013-06-07client: Add missing header file boilerplatePatrik Flykt2-0/+26
2013-06-04dhcpv6: Make sure release message is sentJukka Rissanen1-2/+11
Register an empty Release callback so that the message will be sent.
2013-05-31build: Add session policy format documentDaniel Wagner1-1/+2
2013-05-31doc: Document session policy file formatDaniel Wagner1-0/+83
2013-05-31session-test: Add tests for session_policy_localDaniel Wagner1-0/+151
Use the UID as identification.
2013-05-31session_policy_local: Set session identification methodDaniel Wagner1-1/+43
For SELinux we need to store the complete context for iptables to work.