summaryrefslogtreecommitdiff
path: root/plugins/wifi.c
AgeCommit message (Collapse)AuthorFilesLines
2017-01-05Fix abnormal wifi deactivationsubmit/tizen_3.0/20170106.055933accepted/tizen/3.0/wearable/20170106.095217accepted/tizen/3.0/tv/20170106.095153accepted/tizen/3.0/mobile/20170106.095138accepted/tizen/3.0/ivi/20170106.095236accepted/tizen/3.0/common/20170109.200255Jaehyun Kim1-8/+4
The scan done event for SSID based scan was blocked to prevent Double Scan Indication Event but It can cause abnormal wifi deactivation because the scanning flag may not be cleared correctly. So the existing solution is removed and applied other solution. Change-Id: I720faece9cb423e65f23292d4c48cd562e4f2f70
2016-12-21Merge "[connman]: @fix WGID 166257 SVACE Issue" into tizen_3.0submit/tizen_3.0/20161222.015649accepted/tizen/3.0/wearable/20161222.093629accepted/tizen/3.0/tv/20161222.093605accepted/tizen/3.0/mobile/20161222.093553accepted/tizen/3.0/ivi/20161222.093644accepted/tizen/3.0/common/20161222.181612cheoleun moon1-1/+1
2016-12-21[connman]: @fix WGID 166257 SVACE IssueManeesh Jain1-1/+1
Change-Id: I91f9f3b5410c5b4751b95e5e1839a36932ea8020 Signed-off-by: Maneesh Jain <maneesh.jain@samsung.com>
2016-12-20Merge "[connman]:Fixed Double Scan Indication Event" into tizen_3.0submit/tizen_3.0/20161221.012149cheoleun moon1-4/+9
2016-12-19Clear scanning flag & device when state is connectedtaesub kim1-0/+8
http://slp-info.sec.samsung.net/gerrit/#/c/2752007/ http://slp-info.sec.samsung.net/gerrit/#/c/2763075/ Change-Id: Ia290ba7d4d50935c1473d8a864a508dbad3f5e90 Signed-off-by: Taesub Kim <taesub.kim@samsung.com>
2016-12-15[connman]:Fixed Double Scan Indication EventManeesh Jain1-4/+9
Description: In specific case, CommMan issue the SSID based scan followed by full channel scan. In that case, applicaiton receive the two scan done event. To handle this , block the scan done event for SSID based scan. Change-Id: I5d502b654c2b1d62098c274aeb66d6c1227d56a4 Signed-off-by: Maneesh Jain <maneesh.jain@samsung.com>
2016-11-17Remove Tizen specific hidden connection logicSaurav Babu1-0/+5
Change-Id: I0f485580bd16234fe371e0cfb153d9f1cc23dbcc Signed-off-by: Saurav Babu <saurav.babu@samsung.com>
2016-10-05Merge "[connman]: Fixed Scan Issue" into tizensubmit/tizen_3.0_wearable/20161015.000001submit/tizen_3.0_tv/20161015.000001submit/tizen_3.0_mobile/20161015.000001submit/tizen_3.0_ivi/20161010.000001submit/tizen/20161006.010203accepted/tizen/wearable/20161006.080157accepted/tizen/tv/20161006.080141accepted/tizen/mobile/20161006.080107accepted/tizen/ivi/20161006.080215accepted/tizen/common/20161006.153612accepted/tizen/3.0/wearable/20161015.082011accepted/tizen/3.0/tv/20161016.004154accepted/tizen/3.0/mobile/20161015.032812accepted/tizen/3.0/ivi/20161011.043852cheoleun moon1-0/+14
2016-09-29[connman]: Fixed Scan IssueManeesh Jain1-0/+14
Description: In following use case, ConnMan always perform the ssid based scan and unable to find the new AP's. a. Connect with any AP (Normal or Hidden) b. Disconnect with AP c. After this, ConnMan always perform the SSID based scan. Impact: Tizen Device is unable to scan new AP's. Reason: In Tizen, ConnMan configure the "BackgroundScanning" flag as false because background scan feature is implemented in net-config module. Due to this reason, I have added patch to sync-up the ConnMan scan implementation with net-config background scan feature. Change-Id: I0cff11df18780816b5f61a647c2298c781e78557 Signed-off-by: Maneesh Jain <maneesh.jain@samsung.com>
2016-09-28Revert "Remove Tizen specific hidden connection logic"submit/tizen/20160929.042234accepted/tizen/wearable/20160929.081746accepted/tizen/tv/20160929.081805accepted/tizen/mobile/20160929.081738accepted/tizen/ivi/20160929.081755accepted/tizen/common/20160929.163218taesub kim1-5/+0
This reverts commit 7ace8c778781a6d3e47010843d9bc5c0d337594d. Change-Id: Ia05ae51984781af64d3225ac302bdfb24df37263
2016-09-26Remove Tizen specific hidden connection logicsubmit/tizen/20160928.053415accepted/tizen/wearable/20160929.081029accepted/tizen/tv/20160929.081156accepted/tizen/mobile/20160929.081112accepted/tizen/ivi/20160929.081222accepted/tizen/common/20160928.164122Saurav Babu1-0/+5
Change-Id: I466d0a4d73ade1278211245fbc94ca2fffeb392f Signed-off-by: Saurav Babu <saurav.babu@samsung.com>
2016-07-06Call g_supplicant_interface_scan with scan_paramshyunuktak1-11/+1
when latest connection is specific ssid as hidden Change-Id: Id5a58977ac3dcb05f3006dbed85d3e07aab15326 Signed-off-by: hyunuktak <hyunuk.tak@samsung.com>
2016-07-05Fixed some issuessubmit/tizen/20160705.082658accepted/tizen/wearable/20160705.101859accepted/tizen/tv/20160705.101845accepted/tizen/mobile/20160705.101933accepted/tizen/ivi/20160705.101849accepted/tizen/common/20160705.170548hyunuktak1-5/+0
Removed to set autoconnect when 4way handshake failed Release passphrase of service when indicate error occurred for invalid key Change-Id: Id748ddcd21ad896f0d8e91ce4711a4c9c0df6d96 Signed-off-by: hyunuktak <hyunuk.tak@samsung.com>
2016-06-28Modify to get rsn mode using pairwisesubmit/tizen/20160628.112647accepted/tizen/wearable/20160629.021326accepted/tizen/tv/20160629.021220accepted/tizen/mobile/20160629.021329accepted/tizen/ivi/20160629.021304accepted/tizen/common/20160628.141818hyunuktak1-2/+2
Change-Id: Icb3942835130528c4d61d427ee1891d88cc1ac3b Signed-off-by: hyunuktak <hyunuk.tak@samsung.com>
2016-06-17[SPIN] Indicate auth-failed error.Niraj Kumar Goit1-1/+1
desc: In case of wifi connection if Association fail, indicate "auth-failed" error. Change-Id: Ie08088f3e5b5ff940d0e4290814c266d28e59b15 Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
2016-06-17[SPIN] Fix wireless issues in connman.Niraj Kumar Goit1-33/+24
desc: Set connection error when AP is removed. Change ASSOC_RETRY_COUNT(3 -> 4). send the scan request after connecting - check the ap availability fix the too much scan in associating Change-Id: Ia1d0367a2f792f6c2f92a6ef498b37511840135d Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
2016-06-17[SPIN] Added the connman disconnect reason property.Niraj Kumar Goit1-0/+8
Change-Id: I11fd7baa7d00fa3f3a12bdafda7ff7aa6943d020 Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
2016-06-17[SPIN] add keymgmt property for bss.Niraj Kumar Goit1-0/+2
Change-Id: Id436db5828febaabd8273c2e0aab91f9ee9572ff Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
2016-06-17[SPIN] request RemoveNetwork when disconnected to stop scanning in supplicant.Niraj Kumar Goit1-2/+6
Change-Id: I4248b2de4d00d4218dcfac078bcda3e95db83896 Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
2016-06-15[SPIN] gsupplicant: fix stucking in scanning state when scan failed.Niraj Kumar Goit1-2/+0
- gsupplicant: fix stucking in scanning state when scan failed. - Apply ASLR option. - Add ""TIZEN_WEARABLE"" check in service file. - change the dhcp client device name. - default internet service: fix not cleared if pdp activation failed. - Change Russia cert build feature. - Update the Connman.service.in file. - Remove connection retry when association fail. Change-Id: I3ac8e49d0a3c229b298296f8e7cbf34845c2c90d Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
2016-06-14[SPIN] support ft-psk and ft-eap security type.Niraj Kumar Goit1-0/+6
Change-Id: Idc4ff4294ada3b234dd4af29558c0923b9aff017 Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
2016-06-10Add support for WPS2-PSK security type in Security property of service interfaceJaehyun Kim1-0/+2
Change-Id: I5531a2e3e45da6b3d4caa6d5df15f54ebc2700d8
2015-10-06Sync with Tizen 2.4(1.29.36)submit/tizen/20151020.082803accepted/tizen/wearable/20151020.111030accepted/tizen/tv/20151020.111019accepted/tizen/mobile/20151020.111002taesub.kim1-3/+49
Change-Id: I02fc50820cccc66aed702a97a9928981e73b43cf Signed-off-by: Taesub Kim <taesub.kim@samsung.com>
2015-08-07Base Code merged to SPIN 2.4submit/tizen/20150810.034432hyunuktak1-28/+91
Signed-off-by: hyunuktak <hyunuk.tak@samsung.com> Change-Id: I84a42375b5c59739e4caca1f726699ea7647ef17
2015-07-08Fix for wifi_scan-->"no Wifi-ap found"submit/tizen/20150708.074848pradeep kumar B1-0/+301
Change-Id: Ia624ab6e2ddc967c1581ed48a7eababa0cdb909f Signed-off-by: pradeep kumar B <b.pradeep@samsung.com
2015-07-08Fix for WPS Push Button & WPS router Pinpradeep kumar B1-0/+60
Change-Id: Ie8374a6c8d401a2178ad701e94978a6cdc1517e7 Signed-off-by: pradeep kumar B <b.pradeep@samsung.com>
2014-10-31Tethering: Add hidden access point support in technologyChengyi Zhao1-3/+10
Change-Id: I73fccf5f322ee2597f8f58d5e3d7f60ddeb0a641
2014-10-31Tethering: Add station information management featureChengyi Zhao1-0/+13
Change-Id: I2f699e42ec5ce7f148b8c1d685b52ee32e2e236b
2014-10-31Tizen: Export more wifi info in ConnMan network APIArron Wang1-1/+24
Network client requires additional wifi specific info Export the BSSID property Export the MaxRate property Export the detailed info for encryption mode(mixed,aes,tkip,wep,none) Export the connman_network get/set method for bssid, maxrate, encryption_mode property Change-Id: Ic5744978282e49cb2f70165aaadc7822dc718dfb
2014-10-29Imported Upstream version 1.26upstream/1.26Zhang zhengguang1-21/+763
2014-07-17Imported Upstream version 1.24upstream/1.24Zhang zhengguang1-278/+524
2013-05-17wifi: Scan all stored hidden networksTomasz Bursztyka1-44/+120
Previously the number of scanned hidden WiFi networks was restricted by the fast scan limit of the WiFi driver. This patch takes into account the driver fast scan limit and will scan for all configured hidden WiFi networks. Thanks to Jukka for testing this.
2013-04-15wifi: improve fix to avoid device double release on disableGrant Erickson1-35/+11
Per MEEGO-25999 <https://bugs.meego.com/show_bug.cgi?id=25999>, there exists a race between scan_callback and wifi_disable such that a care- fully-timed deassertion of the technology Powered property between throw_wifi_scan and scan_callback will lead to a device reference count underflow. A second Powered property false -> true -> false transition will then deallocate the device and Wi-Fi will no longer function until connman or the system is restarted. This patch improves upon and revises the prior patch to address this issue by recognizing that hidden networks involve a slightly different code path and timing and that both this and the prior case can be addressed by tracking the device scanning state and only releasing the device when the state is asserted.
2013-04-12wifi: avoid device double release on disableGrant Erickson1-2/+38
Per MEEGO-25999 <https://bugs.meego.com/show_bug.cgi?id=25999>, there exists a race between scan_callback and wifi_disable such that a care- fully-timed deassertion of the technology Powered property between throw_wifi_scan and scan_callback will lead to a device reference count underflow. A second Powered property false -> true -> false transition will then deallocate the device and Wi-Fi will no longer function until connman or the system is restarted. This patch addresses that race by tracking and observing the disabling state such that scan_callback ad wifi_disable can effectively negotiate which has performed the device release, thereby avoiding the double release and resulting underflow.
2013-03-27wifi: terminate autoscan stop if autoscan is not activeGrant Erickson1-0/+5
This terminates the body of stop_autoscan if autoscan is not active. Per MEEGO-25987 <http://bugs.meego.com/show_bug.cgi?id=25987>, running stop_autoscan when changing connected services can prematurely and incorrectly terminate a new, in-flight service connection and result in a failure of that connection with "net.connman.Error.OperationAborted: Operation aborted". When a scan is started, all networks are marked unavailable. Should the check added in this patch not be present, device scanning is set to false and all not yet found networks are removed. Thus the service will not be able to connect if its network wasn't already found.
2013-03-05wifi: Preliminary fix for autoscanning known hidden SSIDsTomasz Bursztyka1-16/+15
Currently, it relies on max_ssids to know how many SSIDs it can provide as paremeters. However, patch 6af0579c434058536fb40480f40f5e9895cfe863, which fixes an issue about fast scanning, affects such feature. Therefore, as a default, it will fallback to 1 if given max_ssids is 0. There is still the issue that it will autoscan only max_ssid (1 or more) known hidden SSIDs. This need to be fixed. Reported by Sameer Naik
2013-02-19config: Read only wifi configJukka Rissanen1-1/+1
2012-11-13wifi: Handle D-Bus method call failurePatrik Flykt1-0/+8
If -ECONNABORTED is received from the gsupplicant network disconnect callback, it's an indication that the interface has already been removed from wpa_supplicant side. This can happen due to a race condition between rtnl and wpa_supplicant interface removal when a USB WiFi dongle is pulled out. The pointers given to the callback can no longer be trusted, don't touch them in the callback. The have been removed by other code at this point.
2012-11-07wifi: Skip service if there is error while loading its settingsJukka Rissanen1-0/+4
If service settings cannot be loaded, then skip that service. Thanks for Felipe Tonello for reporting the issue.
2012-10-16wifi: Do not start autoscan if interface was not readyTomasz Bursztyka1-1/+4
2012-10-16gsupplicant: Add a new state according to 'interface_disabled'Tomasz Bursztyka1-0/+3
When soft rfkill is on, wpa_supplicant sets the interface disabled and sends a state named 'interface_disabled'. Taking this information into account fixes the following issue: - disable wifi (user setting) and hard rfkill it - then un-hard rfkill it, whereafter rfkill states (soft/hard) will go like this: * from 1/1 to 0/0 * from 0/0 to 1/0 when 0/0 occurs, connman will request to enable wifi The problem with this is that enabling wifi takes quite some time and in between ConnMan will soft block wifi to disable it (according to previous user setting). Thus it will request to disable wifi but since enabling is still going on, this request won't do anything. Meanwhile wpa_supplicant will also catch the soft rfkill event and wpa_supplicant will set the state to 'interface_disabled', but since it's not handled properly by ConnMan, the wifi_enable() callback will be called and the function will assume wifi got enabled.
2012-09-24wifi: Fix tethering with kernel 3.5Artem Bityutskiy1-3/+0
Wifi tethering works with kernel 3.4, but not with 3.5. Bisecting showed that the following kernel patch causes the breakage: "3edaf3e mac80211: manage AP netdev carrier state". Running connman with debugging enabled showed that in case of 3.4 we have the following sequence of RTM_NEWLINK events from the kernel: 1. IFF_UP not set, ifi_change=1 2. IFF_UP,IFF_LOWER_UP, ifi_change=1 which makes connman do the following: connmand[210]: plugins/wifi.c:wifi_newlink() index 4 flags 4098 change 1 connmand[210]: plugins/wifi.c:wifi_newlink() interface down connmand[210]: plugins/wifi.c:wifi_newlink() index 4 flags 69635 change 1 connmand[210]: plugins/wifi.c:wifi_newlink() interface up connmand[210]: plugins/wifi.c:wifi_newlink() carrier on connmand[210]: plugins/wifi.c:handle_tethering() index 4 bridge tether However, in 3.5 we have the following sequents of events from the kernel: 1. IFF_UP, ifi_change=1 2. IFF_UP,IFF_LOWER_UP, ifi_change=0 which makes connman do the following: connmand[493]: plugins/wifi.c:wifi_newlink() index 4 flags 4099 change 1 connmand[493]: plugins/wifi.c:wifi_newlink() interface up connmand[493]: plugins/wifi.c:wifi_newlink() index 4 flags 69635 change 0 The root-cause for it is that connman handles the "ifi_change" flag incorrectly. Connman interprets it as "if non-zero, there was some change", which is wrong. According to RFC 3549, it is "reserved for future use. Must be set to 0xFFFFFFFF". Thus, just remove that check, which makes tethering work.
2012-09-04Use g_slist_prepend() where appropriatePatrik Flykt1-1/+1
Convert usage of g_slist_append() to g_slist_prepend() where appropriate. gdbus, dnsproxy, resolver, rtnl, session and session unit test have ordering requirements and thus not touched.
2012-08-23device: Refactor device scan functionJukka Rissanen1-83/+61
In wifi plugin this means that we combine three wifi scan functions (normal, fast, hidden) into one scan function.
2012-08-22wifi: Ignore duplicate hidden APsJukka Rissanen1-23/+46
We must not add duplicate entries to list of hidden AP. There can be more that one service file for each AP if we have multiple wifi cards in the system. Fixes BMC#24779
2012-08-22wifi: Always Scan hidden APsJukka Rissanen1-7/+0
We should scan hidden AP even if the AP is not marked as autoconnectable so that the user is able to connect to it manually.
2012-08-15wifi: Try only twice when connecting to a non-favorite serviceJulien Massot1-2/+13
2012-07-24wifi: Return -EBUSY when tetheringTomasz Bursztyka1-1/+1
Fixes BMC#25561
2012-07-13wifi: Debug print fixedJukka Rissanen1-1/+1
Convert a warn message to debug one because it is printed too often to be usefull as a warning message.
2012-07-13wifi: Scan all hidden and provisioned APJukka Rissanen1-13/+59