summaryrefslogtreecommitdiff
path: root/gsupplicant
AgeCommit message (Collapse)AuthorFilesLines
2017-08-18[connman] Enabled specific scan for Multiple APs.submit/tizen/20170822.002714submit/tizen/20170821.070104Niraj Kumar Goit1-1/+5
Change-Id: I2156778ed0bcc703e8823c7eccaf344ab21503c1 Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
2017-08-09[connman] Added support to get WiFi vendor element.submit/tizen/20170811.041528accepted/tizen/unified/20170811.133331Niraj Kumar Goit2-1/+54
Change-Id: I560be68a876a5fef516647365db3c56761f2aba1 Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
2017-08-02[WGID-260167] Add null checksubmit/tizen/20170803.074947chleun.moon1-0/+4
Change-Id: Ifc1e9e5d28fa2f58a0e7f98677daf08e4e3de161 Signed-off-by: cheoleun <chleun.moon@samsung.com>
2017-07-04Added support of EAP-AKA, EAP-SIM.Niraj Kumar Goit1-0/+14
Change-Id: I5e1b30061271baace51e31da973dbc5298a5341f Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
2017-02-16[tizen 4.0]: Add support of Disconnect Reason Event HandlerManeesh Jain2-28/+21
Description: Merged the following upstream patch and modified the connMan accordingly. http://git.kernel.org/cgit/network/connman/connman.git/commit/?id=6245582d0dc9a3f47a6880dabf437ee7c351caef Change-Id: Id90b6d83849c62c2842c038aec516354a2b74060 Signed-off-by: Maneesh Jain <maneesh.jain@samsung.com>
2017-01-12Fix for single channel scan in SelectNetworktaesub kim1-0/+22
Change-Id: I165fd22bab5ced4a383b0034da79a87712110636 Signed-off-by: Taesub Kim <taesub.kim@samsung.com>
2016-09-07Append bssid property to the add_network call to wpa_supplicantMilind Ramesh Murhekar1-0/+13
Description: This change supports the Strongest AP connection. If there are multiple APs that have same SSID and security type the Bssid property will help to ensure the correct connectivity of the AP among them. Change-Id: I600772fa2bea72f3917e24d677057b34b87c7f1e Signed-off-by: Milind Ramesh Murhekar <m.murhekar@samsung.com>
2016-06-28Modify to get rsn mode using pairwisesubmit/tizen/20160628.112647accepted/tizen/wearable/20160629.021326accepted/tizen/tv/20160629.021220accepted/tizen/mobile/20160629.021329accepted/tizen/ivi/20160629.021304accepted/tizen/common/20160628.141818hyunuktak2-5/+10
Change-Id: Icb3942835130528c4d61d427ee1891d88cc1ac3b Signed-off-by: hyunuktak <hyunuk.tak@samsung.com>
2016-06-17[SPIN] Added the connman disconnect reason property.Niraj Kumar Goit2-0/+32
Change-Id: I11fd7baa7d00fa3f3a12bdafda7ff7aa6943d020 Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
2016-06-17[SPIN] fix the invalid state from supplicant.Niraj Kumar Goit1-0/+6
Change-Id: I68de9746804f5a9045dca026dc1230cd40cf1a37 Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
2016-06-17[SPIN] Update operating frequency properly.Niraj Kumar Goit1-1/+3
Change-Id: If4ce1cbf1518e1fc93ced32affe98aa05209b307 Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
2016-06-17[SPIN] add keymgmt property for bss.Niraj Kumar Goit2-0/+14
Change-Id: Id436db5828febaabd8273c2e0aab91f9ee9572ff Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
2016-06-17[SPIN] request RemoveNetwork when disconnected to stop scanning in supplicant.Niraj Kumar Goit2-0/+28
Change-Id: I4248b2de4d00d4218dcfac078bcda3e95db83896 Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
2016-06-15[SPIN] gsupplicant: fix stucking in scanning state when scan failed.Niraj Kumar Goit1-0/+15
- gsupplicant: fix stucking in scanning state when scan failed. - Apply ASLR option. - Add ""TIZEN_WEARABLE"" check in service file. - change the dhcp client device name. - default internet service: fix not cleared if pdp activation failed. - Change Russia cert build feature. - Update the Connman.service.in file. - Remove connection retry when association fail. Change-Id: I3ac8e49d0a3c229b298296f8e7cbf34845c2c90d Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
2016-06-14[SPIN] support ft-psk and ft-eap security type.Niraj Kumar Goit2-0/+61
Change-Id: Idc4ff4294ada3b234dd4af29558c0923b9aff017 Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
2016-06-13Merge "Add support for WPS2-PSK security type in Security property of ↵submit/tizen/20160614.053635accepted/tizen/wearable/20160614.103626accepted/tizen/tv/20160614.103619accepted/tizen/mobile/20160614.103642accepted/tizen/ivi/20160614.103653accepted/tizen/common/20160614.144019taesub kim2-0/+13
service interface" into tizen
2016-06-10Add support for WPS2-PSK security type in Security property of service interfaceJaehyun Kim2-0/+13
Change-Id: I5531a2e3e45da6b3d4caa6d5df15f54ebc2700d8
2016-06-09[SPIN] Admit to connect EAP-TLS without passphrase of privatekey.Niraj Kumar Goit1-0/+8
Change-Id: If00ccb9b15e5d2c224c016996468db418c59147c Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
2016-06-09[SPIN]Set interface callback during scan requestNiraj Kumar Goit1-0/+5
[Cause] Inteface callback was not being called in error case when 'scan done' signal was received from wpasupplicant and hence the 'scanning' state was not being set properly [Solution] Set the interface callback during scan request which gets called back and sets the 'scanning' state properly during error cases Change-Id: I1ac96a7657bee12ee642f8b680a5b7ef51118048 Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
2016-01-05gsupplicant: Disable P2P support in connmanSaurav Babu1-0/+2
In Tizen connman is not used for P2P support so disable P2P in connman. Currently if interface has P2P capabilities then P2P support is enabled in connman. Change-Id: Iff00505b8abd13ff85cdac9d88f80d27ecd96a95 Signed-off-by: Saurav Babu <saurav.babu@samsung.com>
2015-10-06Sync with Tizen 2.4(1.29.36)submit/tizen/20151020.082803accepted/tizen/wearable/20151020.111030accepted/tizen/tv/20151020.111019accepted/tizen/mobile/20151020.111002taesub.kim2-2/+98
Change-Id: I02fc50820cccc66aed702a97a9928981e73b43cf Signed-off-by: Taesub Kim <taesub.kim@samsung.com>
2015-08-07Base Code merged to SPIN 2.4submit/tizen/20150810.034432hyunuktak4-76/+173
Signed-off-by: hyunuktak <hyunuk.tak@samsung.com> Change-Id: I84a42375b5c59739e4caca1f726699ea7647ef17
2014-10-31Tethering: Add hidden access point support in technologyChengyi Zhao2-0/+11
Change-Id: I73fccf5f322ee2597f8f58d5e3d7f60ddeb0a641
2014-10-31Tethering: Add handling for wpa_supplicant authorized/deauthorized signalsChengyi Zhao2-0/+55
Change-Id: Iff022e257ee9d2c5227585bf0b84e726914cc62b
2014-10-31Tizen: Fix wifi enterprise to support SIM and AKAArron Wang1-0/+20
Revise Wi-Fi enterprise to enable PEAP, TLS, TTLS Fix wifi enterprise to support SIM and AKA Change-Id: Ib9c10615fd0668b2ebca57eac9285bf8a3564427
2014-10-31Tizen: Export more wifi info in ConnMan network APIArron Wang2-0/+59
Network client requires additional wifi specific info Export the BSSID property Export the MaxRate property Export the detailed info for encryption mode(mixed,aes,tkip,wep,none) Export the connman_network get/set method for bssid, maxrate, encryption_mode property Change-Id: Ic5744978282e49cb2f70165aaadc7822dc718dfb
2014-10-29Imported Upstream version 1.26upstream/1.26Zhang zhengguang4-117/+1367
2014-07-17Imported Upstream version 1.24upstream/1.24Zhang zhengguang4-368/+885
2013-05-17wifi: Scan all stored hidden networksTomasz Bursztyka2-1/+2
Previously the number of scanned hidden WiFi networks was restricted by the fast scan limit of the WiFi driver. This patch takes into account the driver fast scan limit and will scan for all configured hidden WiFi networks. Thanks to Jukka for testing this.
2013-02-26gsupplicant: Increase D-Bus timeout to 30 secondsPatrik Flykt1-1/+1
2013-02-25gsupplicant: Remove pointless timeout constantMarcel Holtmann1-2/+0
2013-02-22gsupplicant: Set the scan callback in g_supplicant_interface_scanJulien Massot1-0/+3
The callback is required to properly handle scanning errors reported by wpa_supplicant through the scan_done signal. Steps to reproduce: 1. Set a country code to the WiFi card which have more frequencies allowed than the world roaming allow. 2. Connect to a WiFi network not available in the world roaming setup. 3. Stop connman. 4. Change the country code to 00, be sure the frequencies use in step 2. is no longer allowed. Take care of cfg80211 authorize frequencies when beacons are received, I prefer using mac80211_hwsim from here to avoid side effects about beacon reception. 5. Start connman again. Now ConnMan is stuck in scanning state as the scan_fast method of plugins/wifi.c is called with a forbidden frequency. wpa_supplicant returns an error received in "gsupplicant/supplicant.c: signal_scan_done", where the code enters 'if (success == FALSE)' but unfortunately scan_callback is NULL at this point as the scan_callback is normally set in interface_scan_result().
2013-02-18gsupplicant: Return zero for max scan SSID parameterPatrik Flykt1-2/+2
A driver can return a valid max scan SSID value of zero. Thus no fast scans can be done, so the code falls back to a simple scan instead. A value of zero is properly handled in plugins/wifi.c. An active scan for a hidden SSID adds only the SSID parameter to the wpa_supplicant D-Bus method call, which wpa_supplicant then handles properly. Some drivers also report a max scan SSID value of one. In some of the cases that value is bogus, the driver will not be able to do a fast scan anyway. In addition, it is questionable why only one SSID can be fast scanned as the feature would not differ much from an active scan for a hidden network. Thus we set the limit to two, i.e. zero or one is treated as zero, two or more is reported as is. Thanks to Grant Erickson and Tomasz Bursztyka for finding and pinpointing this issue. Fixes BMC#25971
2013-01-11gsupplicant: Return max SSIDs to scan given by wpa_supplicantPatrik Flykt2-12/+2
Although it seems wpa_supplicant can handle 4 SSIDs in version 0.7.x and 16 starting with 0.8.x, in practise this does not work. Return the value reported without relying on wpa_supplicant internals to handle the situation. In order for hidden scans to work properly, the minimum value needs to be 1.
2012-11-13supplicant: Handle race condition on WiFi dongle removalPatrik Flykt1-4/+21
When a WiFi USB dongle is removed, both rtnl and wpa_supplicant will be telling that the device is gone. While disconnecting and removing an interface via gsupplicant, check that D-Bus doesn't give us an error indicating the interface is already unregistered from D-Bus. The gdb output looks like: (gdb) where #0 0x0042247c in network_connect (network=0x2) at plugins/wifi.c:1197 #1 0x004228f0 in disconnect_callback (result=<value optimized out>, interface=0x0, user_data=0x99) at plugins/wifi.c:1254 #2 0x0042b910 in network_remove_result (error=0x4d5458 "org.freedesktop.DBus.Error.UnknownMethod", iter=<value optimized out>, user_data=<value optimized out>) at gsupplicant/supplicant.c:3593 #3 0x0042ede0 in method_call_reply (call=0x4c6fd0, user_data=0x4d3be8) at gsupplicant/dbus.c:386 #4 0x2abfddb4 in complete_pending_call_and_unlock () from /usr/lib/libdbus-1.so.3 Also don't call the same callback twice.
2012-10-16gsupplicant: Send -ENOLINK error on scan reply if interface was not readyTomasz Bursztyka1-1/+9
2012-10-16gsupplicant: Add a new state according to 'interface_disabled'Tomasz Bursztyka2-1/+8
When soft rfkill is on, wpa_supplicant sets the interface disabled and sends a state named 'interface_disabled'. Taking this information into account fixes the following issue: - disable wifi (user setting) and hard rfkill it - then un-hard rfkill it, whereafter rfkill states (soft/hard) will go like this: * from 1/1 to 0/0 * from 0/0 to 1/0 when 0/0 occurs, connman will request to enable wifi The problem with this is that enabling wifi takes quite some time and in between ConnMan will soft block wifi to disable it (according to previous user setting). Thus it will request to disable wifi but since enabling is still going on, this request won't do anything. Meanwhile wpa_supplicant will also catch the soft rfkill event and wpa_supplicant will set the state to 'interface_disabled', but since it's not handled properly by ConnMan, the wifi_enable() callback will be called and the function will assume wifi got enabled.
2012-07-15gsupplicant: Avoid shadowing key variableMarcel Holtmann1-4/+5
2012-07-05gsupplicant: Add a function to handle autoscan methodTomasz Bursztyka2-0/+64
2012-07-05gsupplicant: Add a method to set interface's country propertyTomasz Bursztyka2-0/+26
2012-07-05gsupplicant: Adapt set country callback to return a resultTomasz Bursztyka2-11/+12
This is necessary for the next coming patches, to fix country setting by interface
2012-06-18supplicant: Call scan callback if needed when removing interfacePatrik Flykt1-0/+15
Check whether a scan callback is set for the interface when an interface removed signal is received from wpa_supplicant. wpa_supplicant seems not to reply to any outstanding scan method calls after a wpa_supplicant 'RemoveInterface' has been received.
2012-06-11gsupplicant: Properly handle WPS properties updateTomasz Bursztyka1-7/+9
2012-06-11gsupplicant: Properly handle WiFi security changeTomasz Bursztyka1-29/+70
Handle RSN and WPA security separately and combine the results.
2012-05-16gsupplicant: Coding style clean-upGrant Erickson1-12/+14
This resolves several post-commit review coding style comments for raw PSK support.
2012-05-15gsupplicant: Avoid critical errorsJukka Rissanen1-1/+1
wpa_supplicant sends error if wlan interface cannot be created. Do not treat this error as critical because after calling g_critical() the program logging will be disabled.
2012-05-15gsupplicant: fix "raw" PSK supportGrant Erickson1-6/+36
This fixes "raw" PSK support by first converting the "raw" PSK from a 64-character hexadecimal string to 32-byte array before appending it to the network dictionary.
2012-05-09gsupplicant: Remove dead assignmentHenrique Dante de Almeida1-1/+0
2012-05-08gsupplicant: Use the right dbus helper when adding a fixed array in a dictTomasz Bursztyka1-2/+1
Fixes BMC#25120
2012-05-08gsupplicant: Fixing a possible memory leak when disconnectingTomasz Bursztyka1-1/+3