summaryrefslogtreecommitdiff
path: root/plugins
AgeCommit message (Collapse)AuthorFilesLines
2016-07-06Call g_supplicant_interface_scan with scan_paramshyunuktak1-11/+1
when latest connection is specific ssid as hidden Change-Id: Id5a58977ac3dcb05f3006dbed85d3e07aab15326 Signed-off-by: hyunuktak <hyunuk.tak@samsung.com>
2016-07-05Fixed some issuessubmit/tizen/20160705.082658accepted/tizen/wearable/20160705.101859accepted/tizen/tv/20160705.101845accepted/tizen/mobile/20160705.101933accepted/tizen/ivi/20160705.101849accepted/tizen/common/20160705.170548hyunuktak1-5/+0
Removed to set autoconnect when 4way handshake failed Release passphrase of service when indicate error occurred for invalid key Change-Id: Id748ddcd21ad896f0d8e91ce4711a4c9c0df6d96 Signed-off-by: hyunuktak <hyunuk.tak@samsung.com>
2016-06-28Modify to get rsn mode using pairwisesubmit/tizen/20160628.112647accepted/tizen/wearable/20160629.021326accepted/tizen/tv/20160629.021220accepted/tizen/mobile/20160629.021329accepted/tizen/ivi/20160629.021304accepted/tizen/common/20160628.141818hyunuktak1-2/+2
Change-Id: Icb3942835130528c4d61d427ee1891d88cc1ac3b Signed-off-by: hyunuktak <hyunuk.tak@samsung.com>
2016-06-22Remove some features and modify service filesubmit/tizen/20160624.012559accepted/tizen/wearable/20160624.064357accepted/tizen/tv/20160624.064037accepted/tizen/mobile/20160624.064052accepted/tizen/ivi/20160624.064339accepted/tizen/common/20160624.132425hyunuktak1-31/+0
Change-Id: Id3697d995e4db5d6f03cdf182825d5f61136e235 Signed-off-by: hyunuktak <hyunuk.tak@samsung.com>
2016-06-17[SPIN] Indicate auth-failed error.Niraj Kumar Goit1-1/+1
desc: In case of wifi connection if Association fail, indicate "auth-failed" error. Change-Id: Ie08088f3e5b5ff940d0e4290814c266d28e59b15 Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
2016-06-17[SPIN] Fix wireless issues in connman.Niraj Kumar Goit1-33/+24
desc: Set connection error when AP is removed. Change ASSOC_RETRY_COUNT(3 -> 4). send the scan request after connecting - check the ap availability fix the too much scan in associating Change-Id: Ia1d0367a2f792f6c2f92a6ef498b37511840135d Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
2016-06-17[SPIN] Check if network is already removed in connect callback.Niraj Kumar Goit1-0/+17
Change-Id: I6b7916473347bba2b93d1565d59c95eaca0d2190 Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
2016-06-17[SPIN] Added the connman disconnect reason property.Niraj Kumar Goit1-0/+8
Change-Id: I11fd7baa7d00fa3f3a12bdafda7ff7aa6943d020 Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
2016-06-17[SPIN] add keymgmt property for bss.Niraj Kumar Goit1-0/+2
Change-Id: Id436db5828febaabd8273c2e0aab91f9ee9572ff Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
2016-06-17[SPIN] request RemoveNetwork when disconnected to stop scanning in supplicant.Niraj Kumar Goit1-2/+6
Change-Id: I4248b2de4d00d4218dcfac078bcda3e95db83896 Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
2016-06-15[SPIN] gsupplicant: fix stucking in scanning state when scan failed.Niraj Kumar Goit2-11/+75
- gsupplicant: fix stucking in scanning state when scan failed. - Apply ASLR option. - Add ""TIZEN_WEARABLE"" check in service file. - change the dhcp client device name. - default internet service: fix not cleared if pdp activation failed. - Change Russia cert build feature. - Update the Connman.service.in file. - Remove connection retry when association fail. Change-Id: I3ac8e49d0a3c229b298296f8e7cbf34845c2c90d Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
2016-06-14[SPIN] support ft-psk and ft-eap security type.Niraj Kumar Goit1-0/+6
Change-Id: Idc4ff4294ada3b234dd4af29558c0923b9aff017 Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
2016-06-10Add support for WPS2-PSK security type in Security property of service interfaceJaehyun Kim1-0/+2
Change-Id: I5531a2e3e45da6b3d4caa6d5df15f54ebc2700d8
2016-02-23bluetooth: Fix Memory LeakNiraj Kumar Goit1-1/+3
To avoid memory leak issue allocate memory to tethering structure after all error checks. Change-Id: If10578acce2eb8eedbdbc96f73a30c79c1a7a125 Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
2016-01-18[vpn]:Initialized variable "err" to avoid error condition failureManeesh Jain1-1/+1
Change-Id: Iebc480c352206a809942a769cbc0d0ba4c194b87 Signed-off-by: Maneesh Jain <maneesh.jain@samsung.com>
2015-10-06Sync with Tizen 2.4(1.29.36)submit/tizen/20151020.082803accepted/tizen/wearable/20151020.111030accepted/tizen/tv/20151020.111019accepted/tizen/mobile/20151020.111002taesub.kim1-3/+49
Change-Id: I02fc50820cccc66aed702a97a9928981e73b43cf Signed-off-by: Taesub Kim <taesub.kim@samsung.com>
2015-08-07Base Code merged to SPIN 2.4submit/tizen/20150810.034432hyunuktak21-67/+297
Signed-off-by: hyunuktak <hyunuk.tak@samsung.com> Change-Id: I84a42375b5c59739e4caca1f726699ea7647ef17
2015-07-08Fix for wifi_scan-->"no Wifi-ap found"submit/tizen/20150708.074848pradeep kumar B1-0/+301
Change-Id: Ia624ab6e2ddc967c1581ed48a7eababa0cdb909f Signed-off-by: pradeep kumar B <b.pradeep@samsung.com
2015-07-08Fix for WPS Push Button & WPS router Pinpradeep kumar B1-0/+60
Change-Id: Ie8374a6c8d401a2178ad701e94978a6cdc1517e7 Signed-off-by: pradeep kumar B <b.pradeep@samsung.com>
2015-07-08Fix MMS connection failureJaehyun Kim1-447/+594
Change-Id: Id3847d1d8233c2177cfbd65ba42ead8ff44a06a8
2015-05-27Add support for ipv6taesub.kim1-1/+4
Support the IPv6 auto in cellular network desc : Add the logic if the IPv6 configuration is auto conf in cellular network Change-Id: Ibb0602a449469d42d8caf4c6162caab95136aeff Signed-off-by: Taesub Kim <taesub.kim@samsung.com>
2014-10-31Tethering: Get the client mac info of Gadget tethersubmit/tizen_mobile/20141120.000000submit/tizen/20141103.030434accepted/tizen/mobile/20141117.073754accepted/tizen/ivi/20141107.062620accepted/tizen/common/20141103.141112guoqiang.liu1-0/+87
Change-Id: Icfa6cd683c659e6728060d6201b90109c63fe56d
2014-10-31Tethering: Watch the connection and disconnection signal of BluetoothChengyi Zhao1-3/+72
Signed-off-by: Chengyi Zhao <chengyix.zhao@intel.com> Change-Id: I38bb9b799c3e4c4c25acd9d264a4225bf59401dc
2014-10-31Tethering: Add hidden access point support in technologyChengyi Zhao5-7/+14
Change-Id: I73fccf5f322ee2597f8f58d5e3d7f60ddeb0a641
2014-10-31Tethering: Add station information management featureChengyi Zhao1-0/+13
Change-Id: I2f699e42ec5ce7f148b8c1d685b52ee32e2e236b
2014-10-31Tizen: Unify bluetooth tethering enable logicZhang zhengguang1-1/+1
In bluez 4.x plugin, when bluetooth tethering is enabled, set_tethering() returns 0, while in bluez 5.x plugin, it returns -EINPROGRESS, which is not compatiable for ConnMan to handle both of them, this patch makes bluez 5.x tethering enable logic consistent with bluez 4.x. Change-Id: I618efd32b5f123fe9bdb58d10adb29c67a87796f
2014-10-31Tizen: Check some telephony flags before active contextguoqiang.liu1-0/+8
Telephony active maybe fail if data_allowed or ps_attached is false, so check it before actived. When data_allowed is false, if connman starts to auto connect 3G service, it will result in 3G service auto connected fail, which leads to it will not be auto connected next time. Change-Id: Ibdd9c34fee7a612c1788a364c69550c4f7e79123 Signed-off-by: guoqiang.liu <guoqiang.liu@archermind.com>
2014-10-31Tizen: Integrate telephony pluginArron Wang1-0/+1757
Change-Id: Ia178f5de981501296573bf3f48e329d5a1355af6
2014-10-31Tizen: Export more wifi info in ConnMan network APIArron Wang1-1/+24
Network client requires additional wifi specific info Export the BSSID property Export the MaxRate property Export the detailed info for encryption mode(mixed,aes,tkip,wep,none) Export the connman_network get/set method for bssid, maxrate, encryption_mode property Change-Id: Ic5744978282e49cb2f70165aaadc7822dc718dfb
2014-10-29Imported Upstream version 1.26upstream/1.26Zhang zhengguang5-25/+767
2014-07-17Imported Upstream version 1.24upstream/1.24Zhang zhengguang16-1422/+2031
2013-05-31session_policy_local: Set session identification methodDaniel Wagner1-1/+43
For SELinux we need to store the complete context for iptables to work.
2013-05-31session_policy_local: Retrieve UID/GID from session userDaniel Wagner1-25/+179
When the session core ask to create a configuration, then we first ask the D-Bus server which UID/GID the session belongs to. If possible we also ask for the SELinux context. Then we try to figure out which file containts the configuration for SElinux, UID or GID identification. The order of matching preference is SELinux, UID and finally GID.
2013-05-31session_policy_local: Remove struct create_dataDaniel Wagner1-29/+14
Use struct policy_data instead of struct create_data.
2013-05-31session_policy_local: Rework policy file handlingDaniel Wagner1-143/+257
The old assumption was that a config file is associtated with one session only. With introducing UID/GID support a policy might be used for several sessions. Furthermore, it was assumed that the file name is the key/ident to identify a session and a file containts exactly one policy. Here are the new rules for writing a policy file. - A valid file name contains letters or numbers and must have a '.policy' suffix. - The file name has not semantical meaning - A policy file may contain contain more than 1 policy - Each policy entry starts with 'policy_' - Each policy entry shall have one and exactly one valid key (e.g. selinux) The implementation has two main hash tables, file_hash and session_hash which owns 'the file' respectively the session config. Additionally there is a hash table which connects a policy with a session (selinux_hash).
2013-05-31session_policy_local: Add some more debug informationDaniel Wagner1-8/+19
2013-05-31session_policy_local: Update session before unref policyDaniel Wagner1-10/+4
The update flag can be removed as it is no longer needed.
2013-05-31session_policy_local: Refactor SELinux context parserDaniel Wagner1-13/+8
g_strplit() will eventually strdup the tokens so no need to strdup() 'context'. But we an ugly cast (from 'const unsigned char *' to 'const char *') is needed for g_strsplit() to make the compiler happy.
2013-05-31session_policy_local: Do not handle small allocationDaniel Wagner1-29/+4
Let's remove the small allocations error path because glib will abort on memory exhausting anyway. Basically we remove dead code.
2013-05-17wifi: Scan all stored hidden networksTomasz Bursztyka1-44/+120
Previously the number of scanned hidden WiFi networks was restricted by the fast scan limit of the WiFi driver. This patch takes into account the driver fast scan limit and will scan for all configured hidden WiFi networks. Thanks to Jukka for testing this.
2013-04-26ethernet: Add tethering supportJukka Rissanen1-1/+101
2013-04-18session: Do not fail when creating default policy configurationDaniel Wagner1-12/+1
Do not handle the small alloc failures because glib will abort when memory is tight anyway.
2013-04-18session: Change to "func_t" postfix to callback typedefDaniel Wagner1-3/+3
Streamline the callback typedefs with the rest of the code.
2013-04-18session_policy_local: Use callback helpersDaniel Wagner1-7/+9
Use the generic callback helpers to encapsulate struct create_data. In a later patch we will add some more data elemets to struct create_data. That is the reason why it is not remove here.
2013-04-18session_policy_local: Load policy when a new file is addedDaniel Wagner1-0/+7
When a file is added (not modified) we need to parse it as well
2013-04-18session_policy_local: Do not free policy on load errorDaniel Wagner1-2/+5
We should not unref the policy on parsing errors becase the policy lifetime is attached to the lifetime of the file. When the file is removed we remove it from the hash table.
2013-04-18session_policy_local: Empty policy list indicated no match allDaniel Wagner1-8/+3
Match all is expressed via CONNMAN_SERVICE_TYPE_UNKNOWN. An empty list means no match.
2013-04-18session_policy_local: Set default policy using common codeDaniel Wagner1-4/+2
Use connman_sessoin_set_default_config() instead of open coded version. This prepars the next fix.
2013-04-15wifi: improve fix to avoid device double release on disableGrant Erickson1-35/+11
Per MEEGO-25999 <https://bugs.meego.com/show_bug.cgi?id=25999>, there exists a race between scan_callback and wifi_disable such that a care- fully-timed deassertion of the technology Powered property between throw_wifi_scan and scan_callback will lead to a device reference count underflow. A second Powered property false -> true -> false transition will then deallocate the device and Wi-Fi will no longer function until connman or the system is restarted. This patch improves upon and revises the prior patch to address this issue by recognizing that hidden networks involve a slightly different code path and timing and that both this and the prior case can be addressed by tracking the device scanning state and only releasing the device when the state is asserted.
2013-04-12wifi: avoid device double release on disableGrant Erickson1-2/+38
Per MEEGO-25999 <https://bugs.meego.com/show_bug.cgi?id=25999>, there exists a race between scan_callback and wifi_disable such that a care- fully-timed deassertion of the technology Powered property between throw_wifi_scan and scan_callback will lead to a device reference count underflow. A second Powered property false -> true -> false transition will then deallocate the device and Wi-Fi will no longer function until connman or the system is restarted. This patch addresses that race by tracking and observing the disabling state such that scan_callback ad wifi_disable can effectively negotiate which has performed the device release, thereby avoiding the double release and resulting underflow.