summaryrefslogtreecommitdiff
path: root/plugins
AgeCommit message (Collapse)AuthorFilesLines
2010-11-25ofono: Fix Modem properties parsingGustavo F. Padovan1-7/+4
Rename properties to prop to keep code under 80 columns.
2010-11-24Return to mainloop before starting DHCP procedureMarcel Holtmann1-1/+12
Just before starting the DHCP procedure return to mainloop first. This fixes some cases where the interface is not yet up. This happens mainly when using Bluetooth PAN connections where the network interface will be newly created every single time.
2010-11-23ofono: Set network group when adding the networkMohamed Abbas1-1/+3
The network probing code path already calls profile_add_network, calling it again from the oFono network probing hook leads to wrong reference counting. Fixes BMC#9985
2010-11-22gsupplicant: Set interface data to NULL upon driver removalLeena Gunda1-0/+2
Fixes BMC#10302
2010-11-19openconnect: Fix connect-vpn and plugin indentationSamuel Ortiz1-1/+1
2010-11-19openconnect: Pass server certificate hash directly to openconnectDavid Woodhouse1-1/+7
When we spawn openconnect to make a VPN connection, it obviously needs to validate the server's SSL certificate to protect against a MiTM attack. But it may not have full access to the user's CA chain, or the user may have manually accepted a dubious certificate. To allow for this, the GUI authentication dialog returns a SHA1 of the server's SSL certificate fingerprint, for the *specific* server that it managed to authenticate to. The intention is that this should be passed through to openconnect when it connects. That way, openconnect doesn't need to do any normal validation; it only needs to compare the certificate with what's expected. From openconnect v2.26, certificate validation is enabled by default; rather than only when a --cafile option is given. So it's important that we start passing the certificate fingerprint through, to avoid connection failures (which we don't currently detect and report gracefully, btw).
2010-11-19dnsproxy: Remove TCP receive path potential busy waitsDavid Woodhouse1-29/+57
When receiving a DNS over TCP request response back from the server, ConnMan busy waits for the whole response to arrive, or if the server closes the TCP connection. Fixes BMC#9960
2010-11-16wifi-legacy: Set associating to FALSE when disconnectingSamuel Ortiz1-0/+2
2010-11-13dnsproxy: Handle POLLERR and POLLHUP on the nameserver UDP socketSamuel Ortiz1-3/+10
poll is restarted when ConnMan receives a new UDP request from the client. Fixes BMC#9960
2010-11-13Use technology information when reporting Tethering statusMarcel Holtmann1-22/+24
2010-11-13Use a proper technology callback to report Tethering statusMarcel Holtmann1-3/+2
2010-11-13Don't take reference count based on if resultMarcel Holtmann1-3/+7
To make the code more readable turn the failure into a clear error case and only take the reference count later in the code flow.
2010-11-12Fix for crash with new proxy lookup callbacksMohamed Abbas1-4/+9
This crash happens when the service disconnects before the proxy callback is called.
2010-11-10tethering: Add async tethering_enabled callbackSamuel Ortiz1-2/+38
2010-11-10dnsproxy: Remove TCP connection lookup from create_server()Samuel Ortiz1-10/+0
The TCP connections are opened and closed for each DNS over TCP request, no need to try to find an already opened one.
2010-11-10dnsproxy: Handle TCP receive loop retriesSamuel Ortiz1-4/+15
On the TCP nonblocking socket, EAGAIN or EWOULDBLOCK recv() errors should be handled more carefully. Fixes BMC#9834
2010-11-08bluetooth: Implement tethering hookSamuel Ortiz1-0/+112
2010-11-08technology: Add bridge name to the tethering hookSamuel Ortiz1-1/+1
2010-11-07Use GWeb for portal detection supportMarcel Holtmann1-370/+52
2010-11-06Use proxy framework for portal checkMarcel Holtmann1-37/+53
2010-11-04Fix fallout within pluginsMarcel Holtmann3-5/+0
2010-11-04Remove unneeded enum connman_network_protocolMarcel Holtmann5-13/+1
2010-11-04Remove unneeded enum connman_device_modeMarcel Holtmann2-4/+0
2010-11-03supplicant: Check for network before removing itSamuel Ortiz1-0/+3
When disconnecting by removing a network, check that the targeted network is the one currently set.
2010-11-03openvpn: Add OpenVPN supportDaniel Wagner1-0/+239
2010-11-02gsupplicant: Fix deadlock when disassociate while associatingMohamed Abbas1-0/+2
Without setting the associating flag to false, ConnMan could potentially enter an infinite loop through __connman_network_disconnect().
2010-10-27Add the openconnect plugin to the distcheck ruleSamuel Ortiz1-1/+1
2010-10-22Split openconnect into generic vpn and openconnect partDaniel Wagner3-314/+478
2010-10-22wifi: Search for networks based on their identifierLeena Gunda1-3/+2
2010-10-18Update pacrunner plugin to take care of all proxy methodsTomasz Bursztyka1-16/+63
2010-10-03Add information if scan has been requestedMarcel Holtmann1-0/+2
2010-10-02Add support for handling DHCP timerserver values from DHCPMarcel Holtmann1-0/+4
2010-09-30supplicant: Do not reset passphrase when asociation failsSamuel Ortiz1-7/+0
Resetting the passphrase is redundant as the service will present a "connect-failed" error string through D-Bus whenever association fails.
2010-09-30supplicant: No need for actively remove network upon disconnectionSamuel Ortiz1-15/+0
When being disconnected, ConnMan should just wait for wpa_supplicant scan results instead of trying to be smart about if the disconnected AP is still around or not. wpa_supplicant will try to roam and run periodic scan for that purpose. If the AP is missing after 2 scans, it's removed from the list, and ConnMan then removes it from the enabled networks. Fixes BMC#7730 BMC#7734
2010-09-30Set WiFi task scanning flag when receiving a Scanning eventSamuel Ortiz1-0/+3
wpa_supplicant can start scanning without ConnMan telling it to do so (in the roaming case for example), and thus the task scanning state should be updated accordingly in that case. Without this fix the device network list is not refreshed appropriately.
2010-09-30Implement WiFi network driver remove hookSamuel Ortiz3-0/+23
2010-09-29Reset WiFi passphrase if association or WPA handshake failsSamuel Ortiz1-0/+7
2010-09-28Set device scanning state to false from the scan callbackSamuel Ortiz1-6/+1
If scan fails, the scan callback is called. When scan results are available, it is called as well. In both cases, the device is no longer scanning when it's called.
2010-09-28wifi: use const pointer for a ssid bufferKalle Valo1-2/+2
A pointer for an ssid buffer was incorrectly stored to a non-const pointer. After fixing this a unneeded cast can be removed.
2010-09-28wifi: remove unneeded castsKalle Valo1-6/+6
2010-09-28Set the network associating state to false when disconnectingSamuel Ortiz1-0/+2
The gsupplicant based plugin is not setting the network state appropriately and can trigger an infinite loop between connman_network_set_connected() and network_disconnect.
2010-09-27wifi: use connman options to get the wpasupplicant driverKalle Valo1-1/+3
The new gsupplicant based wifi plugin doesn't support -c command-line switch to make it possible to choose between wext, nl80211 or both. Add support for this by using connman_option_get_string().
2010-09-27Check device before call connman_device_set_string at ofono pluginMartin Xu1-3/+3
Fixes BMC#6681
2010-09-24Add support for domain name concatenation on TCP DNS requestsSamuel Ortiz1-7/+19
2010-09-24Define protocol_offset() for DNS transport layer offsetSamuel Ortiz1-26/+20
2010-09-24Do not access the DNS request buffer if it's NULLSamuel Ortiz1-1/+5
2010-09-24Close TCP DNS connections once the reply is forwardedSamuel Ortiz1-4/+6
This is still sub optimal as the ideal solution would be to keep the TCP connection opened for a 20-30 seconds for the next DNS over TCP requests.
2010-09-24Stop polling the nameserver TCP socket once we're done with itSamuel Ortiz1-2/+10
2010-09-24Send an error response when the DNS request times outSamuel Ortiz1-37/+63
2010-09-24Add a protocol field to the DNS request structureSamuel Ortiz1-2/+5
This is cleaner than checking for the client socket value.