Age | Commit message (Collapse) | Author | Files | Lines |
|
Change-Id: I7104f40a29f5e45cd2b6ba0391f36d7c37bfa0a2
Signed-off-by: Nishant Chaprana <n.chaprana@samsung.com>
|
|
In case of device reboot enable wpa-supplicant for eapol
connection if last connection was EAP over ethernet.
Change-Id: Ia264accac74ecffdba6c2b116807e45f675ef3db
Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
|
|
Change-Id: I9e650762f3b2b2a31945b66e044e67a77e3b4b12
Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
|
|
|
|
Change-Id: Ibb5305175a1987d74f0a24ba413a664940233e76
Signed-off-by: Jaehyun Kim <jeik01.kim@samsung.com>
|
|
Change-Id: I21f1d8c970f1053ce4337dc0d251d2fa20bbd509
Signed-off-by: Nishant Chaprana <n.chaprana@samsung.com>
|
|
1. Add support for dlog
2. Add some log options to main.conf
3. Allow to simplify the amount of logs by option
Change-Id: I8c1202ae267aca9bb2c18d44c2ccd3e6d5a74a73
Signed-off-by: Jaehyun Kim <jeik01.kim@samsung.com>
|
|
Change-Id: I4762c8d3444167dce34498634de4948e822f865f
Signed-off-by: Jaehyun Kim <jeik01.kim@samsung.com>
|
|
Change-Id: I373ab90bbb699be56d9e416346a51b0795ed1e8b
Signed-off-by: Nishant Chaprana <n.chaprana@samsung.com>
Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
|
|
Change-Id: I498fac295defe24eab8e3d23c6e0864bfda8fd86
Signed-off-by: hyunuk.tak <hyunuk.tak@samsung.com>
|
|
Change-Id: I049207e7d662f657ca21a4046be953f8f33bbd10
Signed-off-by: hyunuk.tak <hyunuk.tak@samsung.com>
|
|
Change-Id: Idb47c1ddbedc9f97181b8e9a5eeac04ddd832a2c
Signed-off-by: Nishant Chaprana <n.chaprana@samsung.com>
|
|
This patch reduced the SignalPoll monitor from 30 second to 10 second frequency.
This patch also extracts already available parameter strength/RSSI in SignalPoll
and update connected service's RSSI/Strength accordingly.
Change-Id: Ie9bbb21bf50ad0b8c72e3ca2fc9f7f6500c77f23
Signed-off-by: Nishant Chaprana <n.chaprana@samsung.com>
|
|
Change-Id: Ib5957e7ee3a9315ee86a331189bc3e9e71751ee8
Signed-off-by: Nishant Chaprana <n.chaprana@samsung.com>
|
|
This patch appends the IEEE 802.11b/g/n/a/ac PHY
protocol modes of scanned Access Points
using internal logic.
Following logic is used to determine WLAN HW protocol:-
1) If “Supported rates” is only till 11 Mbps, and frequency is in
2.4GHz band, then protocol is 802.11B.
2) If “Supported rates” is till 54Mbps or “Extended supported rates”
are present, and frequency is in 2.4GHz band, then protocol is 802.11G.
3) If “Supported rates” is only till 54 Mbps, frequency is in 5GHz
band , then protocol is 802.11A.
4) If “HT capabilities” is supported , then protocol is 802.11N.
5) If “HT capabilities” & “VHT” is supported and frequency is in 5 GHz
band, then protocol is 802.11AC.
Change-Id: I1156ef249cf4a8052a883d31da66788c7d2de22f
|
|
Change-Id: Iec2ec99fb7d4fc6d9c0539e5a9e7c903e1969580
Signed-off-by: Nishant Chaprana <n.chaprana@samsung.com>
|
|
It also includes parsing country code from IEs received from the supplicant
Change-Id: Iea5f8b2ea7cc8fefe07591cc4d636d27b015d427
Signed-off-by: Mayank Haarit <mayank.h@samsung.com>
|
|
Change-Id: I95d2a56c1d26db06cbdb5c85dc0e2b33b3c10da3
Signed-off-by: Jaehyun Kim <jeik01.kim@samsung.com>
|
|
Change-Id: I13526fbf80296a79be15548fc226a308941ac9ec
Signed-off-by: Taesub Kim <taesub.kim@samsung.com>
|
|
Change-Id: I174854914d9fd06a813270b57d1f7bc2bac63c6a
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
|
|
Change-Id: Ife8902c48b338cec4a91429441e8435a6b21bc7e
Signed-off-by: Jaehyun Kim <jeik01.kim@samsung.com>
|
|
Change-Id: I34e42d98ab540ffb75e0ae860fb1b615ef2bddcb
Signed-off-by: Taesub Kim <taesub.kim@samsung.com>
|
|
Change-Id: Ib8f446164242caeb7fbc29c2917eff4b8a5b8bf7
Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
|
|
Change-Id: I560be68a876a5fef516647365db3c56761f2aba1
Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
|
|
Change-Id: I0727c24f30be5162d27e49996dfa376348f98527
Signed-off-by: Abhishek Sansanwal <abhishek.s94@samsung.com>
|
|
|
|
last address
(DHCP discovery) wlan0 retry timeout=1sec retries=15
(DHCP request) retry timeout=1sec
Change-Id: I28b8f8361dcf2c8cff7f3084c47707f05bc0da64
Signed-off-by: Taesub Kim <taesub.kim@samsung.com>
|
|
Added fix to prevent RA message processing pass by kernel via
RTM_NEDNDUSEROPT if ipv6 DNS method is set as manual.
Change-Id: Ibee486071e5a235a1426028f107e105920499c6e
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
|
|
Change-Id: If16e739fde7e9d736c66015ab1efa982e49d3482
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
|
|
1. Added code to set IPv6 gateway addess.
2. Fix IPv6 issue in case of auto-configuration.
Change-Id: Ie0e1d53dd269a09600d2f08e66d73cefd6dd3c29
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
|
|
- This is for Tizen 4.0.
: Tizen 4.0 Configurability and Build Blocks require
to remove all profile-depending build options in spec files.
(No More profile macros)
- It is recommended to distinguish features/profiles at runtime.
unless it incurs too much overhead, which requires you to
create multiple binaries and subpackages.
- Now it reads if it is TV based on the /etc/ conf file.
Change-Id: Id9d2f6e9db7814ab06f5d166ef2299a1a8aacb51
Signed-off-by: MyungJoo Ham <myungjoo.ham@samsung.com>
|
|
Removed to set autoconnect when 4way handshake failed
Release passphrase of service when indicate error occurred for invalid
key
Change-Id: Id748ddcd21ad896f0d8e91ce4711a4c9c0df6d96
Signed-off-by: hyunuktak <hyunuk.tak@samsung.com>
|
|
Change-Id: Id3697d995e4db5d6f03cdf182825d5f61136e235
Signed-off-by: hyunuktak <hyunuk.tak@samsung.com>
|
|
- Fixed NTP service's DNS resolving failure in Hive project.
- Do not turn "wlan0" interface down in cleanup_devices().
- Set resource limits "RLIMIT_NOFILE" for a process.
- After appending a file, fflush and fsync all modified in-core data of the file.
Change-Id: I2767b3302d6204d066fe2075027828ff209d0ee0
Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
|
|
Change-Id: I174b228529374f80b1c4197a310124c028564bb8
Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
|
|
Change-Id: Idf19d82d0052f83a69b424536ecfceca65e840cb
Signed-off-by: Niraj Kumar Goit <niraj.g@samsung.com>
|
|
Change-Id: I2958446c35966d9ed72df0120b80561be7d89f54
Signed-off-by: Taesub Kim <taesub.kim@samsung.com>
|
|
Signed-off-by: hyunuktak <hyunuk.tak@samsung.com>
Change-Id: I84a42375b5c59739e4caca1f726699ea7647ef17
|
|
Change-Id: Ia624ab6e2ddc967c1581ed48a7eababa0cdb909f
Signed-off-by: pradeep kumar B <b.pradeep@samsung.com
|
|
Change-Id: Id3847d1d8233c2177cfbd65ba42ead8ff44a06a8
|
|
Use cases:
Given 2 users: UserA and UserB
1. If UserA is connected to a wifi service, then UserB is not allowed
to connect wifi service, and not allowed to disconnect the service
UserA connected.
2. If UserA is connected to a wifi service, then UserB is allowed to
use the same connection, but he is not allowed to modify the connection.
3. If UserA is connected to a wifi service with security wep/wpa/psk,
then UserA disconnects it, when UserB tries to connect the same wifi
service, it must input passphrase to connect it.
Change-Id: Id686ebd7d1f3490875a9d8f877219bd004907227
|
|
Telephony plug-in requires manual PROXY setting function
Telephony stack provides proxy address (3G profile).
Change-Id: Iaa02f59465a687961c303667ee09051b419507d2
|
|
|
|
|
|
When a new session is created we need to get the initial list
of services which match the session AllowedBearers criteria. As soon
the session is running add or removed services are tracked via the
notifier interface.
We concluded that exposing all the services is not really necessary
and therefore we are using currently two callbacks to get the initial
list. That exposes implementation details from session to service, that
is GSequence. We also need to expose the type 'struct service_entry'.
Instead doing so we are using an iterator and keep all the
implementation details in session.c.
|
|
Remember which session this struct service_entry belongs to when
removing the entries again.
|
|
|
|
The returned address is used when we need to have a listening
socket tied to specific interface and address, and do not want to
bind to any address.
|
|
The main idea behind this API is to collect several iptables rules
together and enable or disable in one go.
For this a context is created via __connman_firewall_create() and
the rules added to this context via __connman_firewall_add_rule().
In order to append all rules __connman_firewall_enable() has
to be called. To remove all rules associated with one context
__connman_firewall_disable() has to be used.
If something goes awry the code tries to get back to the initial
state.
|
|
|