Age | Commit message (Collapse) | Author | Files | Lines |
|
Change-Id: Ia624ab6e2ddc967c1581ed48a7eababa0cdb909f
Signed-off-by: pradeep kumar B <b.pradeep@samsung.com
|
|
Change-Id: Id3847d1d8233c2177cfbd65ba42ead8ff44a06a8
|
|
Change-Id: I279ad9d0e623872f4dcf37a6c3c9cd012842e448
Signed-off-by: Taesub Kim <taesub.kim@samsung.com>
|
|
|
|
This reverts commit 9e7ccc53900e9fe24bfcf56c22a4c6be7b002dc5.
Change-Id: I369ccf417c12a24c80aaed902127c80b3f109ce2
|
|
Support the IPv6 auto in cellular network
desc : Add the logic if the IPv6 configuration is auto conf in cellular network
Change-Id: Ibb0602a449469d42d8caf4c6162caab95136aeff
Signed-off-by: Taesub Kim <taesub.kim@samsung.com>
|
|
Change-Id: I624a38019f853988eabe65fb8552710d5dd7aeb7
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
|
|
Fixes TC-2298
Root cause:
ConnMan will check the wifi security type from nfc daemon
to decide whether to auto connect the related wifi service,
but it can't get the security type in current mechanism,
So that the wifi AP got from nfc tag will not be connected.
Solution:
ConnMan doesn't need to check wifi security type when it
tries to provision service.
Change-Id: I4ee3294214b756f9a39b6dc21cb658acd0640cc7
|
|
In curernt IVI image, systemd doesn't write utmp entries
for logged in users, so that ConnMan can't get the related
user info, under which condition, it doesn't need to forbid
service auto connect for this user.
Change-Id: I4ca33b2b43ac351d1be8c862808304d8a17d8d7d
|
|
Refine service load/save to be multi-user complicant.
Change-Id: Icc8a0507826f4cae72319191e4fdbebe548434fc
|
|
Expose the function to check whether the service is favorite
to the current user.
Change-Id: Ib232f16c652ec94ef2e10b199a638a98554a1066
|
|
Use case:
For wifi auto connect mechamnism, only when the user who owns the
wifi service login, the service is allowed to be auto connected.
Change-Id: I99135117facafda41532e0280c89194b27baac16
|
|
Use case:
Given 2 users: UserA and UserB
If UserA is connected to a wifi service, then UserB is not allowed
to turn on offline mode.
Change-Id: I54b108beb580a805c7fa2d3ae9dac192b836ba77
|
|
Use case:
Given 2 users: UserA and UserB
If UserA is connected to a wifi service, then UserB is not allowed
to set wifi technology properties.
Change-Id: Ia783b22bc28e9e487ddfa3a4c249c9d1ea76bde8
|
|
Use cases:
Given 2 users: UserA and UserB
1. If UserA is connected to a wifi service, then UserB is not allowed
to connect wifi service, and not allowed to disconnect the service
UserA connected.
2. If UserA is connected to a wifi service, then UserB is allowed to
use the same connection, but he is not allowed to modify the connection.
3. If UserA is connected to a wifi service with security wep/wpa/psk,
then UserA disconnects it, when UserB tries to connect the same wifi
service, it must input passphrase to connect it.
Change-Id: Id686ebd7d1f3490875a9d8f877219bd004907227
|
|
Change-Id: Ic41643e5f8b6e1a28ce00e0456d961fe2de7a7fb
|
|
Change-Id: I73fccf5f322ee2597f8f58d5e3d7f60ddeb0a641
|
|
Change-Id: I86f4a22567f5df2fbd5d0c0c03c6cc5b6fc24a2d
|
|
Change-Id: I048c1a8a348b6f862ca104ad2fbe971f580fe180
|
|
Change-Id: I2f699e42ec5ce7f148b8c1d685b52ee32e2e236b
|
|
Revise Wi-Fi enterprise to enable PEAP, TLS, TTLS
Fix wifi enterprise to support SIM and AKA
Change-Id: Ib9c10615fd0668b2ebca57eac9285bf8a3564427
|
|
Telephony plug-in requires manual PROXY setting function
Telephony stack provides proxy address (3G profile).
Change-Id: Iaa02f59465a687961c303667ee09051b419507d2
|
|
Append wifi property bssid, maxrate, frequency, encryptionmode to wifi
service
Change-Id: I1d5987334ab288fc04ff931fda5108f4afe864f0
|
|
Network client requires additional wifi specific info
Export the BSSID property
Export the MaxRate property
Export the detailed info for encryption mode(mixed,aes,tkip,wep,none)
Export the connman_network get/set method for bssid, maxrate,
encryption_mode property
Change-Id: Ic5744978282e49cb2f70165aaadc7822dc718dfb
|
|
|
|
|
|
|
|
OPTION_DOMAIN_LIST(24) was not sent to server.
|
|
Without this the unit tests might core dump as the allocated_block
pointer would point to already freed memory.
|
|
Fixes BMC#25993
|
|
Fixes BMC#26019
|
|
If all the technologies were powered off, then offline mode could
not be disabled.
Fixes BMC#26018
|
|
The hash table is now the owner of the service entry instead of the
service list.
|
|
The hash table is now the owner of the service entry instead of
the service list.
|
|
When a new session is created we need to get the initial list
of services which match the session AllowedBearers criteria. As soon
the session is running add or removed services are tracked via the
notifier interface.
We concluded that exposing all the services is not really necessary
and therefore we are using currently two callbacks to get the initial
list. That exposes implementation details from session to service, that
is GSequence. We also need to expose the type 'struct service_entry'.
Instead doing so we are using an iterator and keep all the
implementation details in session.c.
|
|
tech_data is allocated on the stack and is therefore not initilized
with NULL.
|
|
Register an empty Release callback so that the message will be sent.
|
|
The session core needs to the know which kind of session
identification method has been selected in the plugin in order
to use the right iptables rules etc.
|
|
When removing the entry clear all references towards it.
|
|
Remember which session this struct service_entry belongs to when
removing the entries again.
|
|
The current situation is that a failed timeserver name resolution
removes the timeserver immediately from the list of used timeservers
and failing to connect to the nameserver IP address removes the
timeserver after a 2 second delay. Currently no mechanism exists to
re-create the list of nameservers once the list has been exhausted or
the more preferred timeservers have been removed from it.
This implementation combats both problems where less used timeservers
further away end up being used despite a more optimal closer one
becoming available as well as the problem of exhausting the
nameserver list. This is done by periodially waking up and checking
the timeserver in use. If the timeserver in use is not the most
preferred one or the list of timeservers is empty, the timeserver
list is recreated and the timeserver polling procedure is restarted.
|
|
xtables_find_match() returns two different kind of pointers.
The first type is pointing to the function pointer table loaded
via dlopen(). The second type is a copy (via plain malloc) of the
first type. xtables_find_match() marks the copies/clones with
m == m->next. So we need to free the struct xtables_match which
point back to themself.
Also fix the issue that we didn't handle multple match instances
at the same time.
The memory leak is only visible when having more than one match
of a kind.
|
|
The code was relevant only for Manager.ProvisionService method call
which was removed a long time ago.
|
|
Domains property was not updated when Domains.Configuration was changed.
If Domains.Configuration is for example set to empty when using DHCP,
the Domains property is to be updated with the value configured via DHCP.
Fixes BMC#26010
|
|
For VPNs, the index is available from provider, for other services from
network.
Fixes BMC#26009
|
|
Addresses and gateway for the service IPv4 property being used in the
system are available from ipconfig->system when the property is set to
'manual'.
|
|
|
|
When timeservers are set, recreate timeserver polling list only if the
service is the the default one.
|
|
Load and save TimeUpdates and TimezoneUpdates Clock API properties.
Clock API Timeservers property is already handled by the timeserver
code.
Fixes BMC#25988
|
|
If the time update method is manual, no NTP time servers are returned.
|