summaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)AuthorFilesLines
2012-07-13agent: Handle wpspin type as a PreviousPassphraseTomasz Bursztyka1-18/+27
2012-07-13agent: Rewrite how PreviousPassphrase field is handledTomasz Bursztyka1-19/+31
This is a necessary rewrite to make it clearer and simpler, before implementing wpspin type support.
2012-07-09device: Turn off all running interfaces at startupJukka Rissanen1-0/+50
Turning off running interfaces that have IP address, causes all routes related to those interfaces to be removed by kernel. This way connman will get a fresh start without any extra and obsolete routes around.
2012-07-09inet: Return all running interfacesJukka Rissanen2-0/+79
Add a function that returns all (except loopback) interfaces that are up and running (have IP address). This information is used in following patch to clean up the routes that are left hanging around.
2012-07-05service: Make sure the pending reply is not lostJukka Rissanen1-0/+3
The user data (pending reply) can be null if agent returns an error. In this case do not overwrite the real pending reply.
2012-07-05dhcp: warn on invalid netmaskJulien Massot1-0/+2
2012-07-05main: Dynamically allocate default blacklist array, free on exitPatrik Flykt1-2/+5
2012-07-05main: Move default string arrays top of the filePatrik Flykt1-12/+14
2012-07-05technology: check validity of given properties for tetheringJulien Massot1-2/+5
A WPA2 passphrase is between 8 and 63 characters, a SSID name is between 1 and 32 characters.
2012-07-05technology: return already enabled when tethering is enabledJulien Massot1-1/+1
2012-07-05technology: Set regulatory domain by device or fallback to technology basedTomasz Bursztyka1-4/+32
2012-07-05device: Add capability to notify on regulatory domain settingTomasz Bursztyka1-0/+13
2012-07-05technology: Notify the regulatory domain setting by deviceTomasz Bursztyka2-0/+17
2012-07-05device: Add driver capability to set regulatory domain on device basisTomasz Bursztyka1-0/+16
2012-07-02rtnl: Fixed log for the type RTM_GETADDRPaulo Pizarro1-0/+2
The connman prints an unknown type when sending a request RTM_GETADDR
2012-07-02tethering: Fix incorrect index value for private networkWu Zheng1-1/+1
In __connman_private_network_request, pn->fd is used as the index value and passed to __connman_ippool_create, which is not correct. It result in the private network is block used externally.
2012-06-28inet: Fix usage of getaddrinfo() return valuePatrik Flykt1-2/+0
Fixes BMC#25304
2012-06-28main: static-qualify default config valuesGrant Erickson1-2/+2
The default configuration arrays default_auto_connect and default_blacklist must be static-qualified. Otherwise, their stack-allocated storage will go out of scope after parse_config is finished and empty or commented-out DefaultAutoConnectTechnologies or NetworkInterfaceBlacklist config entries will refer to random stack data.
2012-06-26agent: Fix how to provide PreviousPassphrase through D-BusTomasz Bursztyka1-6/+29
2012-06-25ipconfig: Save prefixlen only if not clearedJulien Massot1-2/+3
This commit fixes a bug when using manual ipv4 addressing. The first time it works, but once the service is reconnected it uses an invalid netmask: 255.255.255.255.
2012-06-25technology: Return proper error code when already disabledJukka Rissanen1-1/+4
Return AlreadyDisabled to the caller instead of InProgress if we are already disabled.
2012-06-25technology: Return proper error code when already enabledJukka Rissanen1-1/+4
We do not call the generic error message function because it maps EALREADY to EINPROGRESS. So instead we call correct error return function which returns AlreadyEnabled to the caller. Fixes BMC#25306
2012-06-25main.conf: Comment out example default values and add documentationPatrik Flykt1-5/+6
2012-06-25main: Use 'NetworkInterfaceBlacklist' string everywherePatrik Flykt2-2/+2
2012-06-25rtnl: Use filtered devices to determine blacklisted devicesManfred Kober1-10/+1
Instead of hard-coding some selected devices to be ignored, the blacklist check now uses the connman_device_isfiltered list.
2012-06-25device: Consider blacklisted interfaces from main.conf when filteringManfred Kober1-1/+15
Interfaces blacklisted in main.conf are now also taken into account by connman_device_isfiltered. This is done in addition to what gets passed with -i or -I on the command line.
2012-06-25main: Support NetworkInterfaceBlacklist from main.confManfred Kober1-0/+23
This adds a settings variable and a function for fetching that list
2012-06-25main.conf: Add NetworkInterfaceBlacklistManfred Kober1-0/+6
2012-06-20dnsproxy: Check cache for TCP request before connecting to serverJukka Rissanen1-1/+31
It is not necessary to create TCP sockets to server if we have the answer already in the cache.
2012-06-20dnsproxy: Use DNS header in checksJukka Rissanen1-5/+7
We should use the DNS header struct when checking DNS protocol values instead of using pointer so that the TCP offset is properly taken care of.
2012-06-20dnsproxy: Add more debugging printsJukka Rissanen1-7/+17
2012-06-20dnsproxy: Check cache properly for TCP packetsJukka Rissanen1-4/+13
The DNS packet starts from offset 2 in TCP payload.
2012-06-20dnsproxy: Fix the negative caching of AAAA recordJukka Rissanen1-4/+13
Handle the TCP offset properly.
2012-06-20dnsproxy: Save DNS packet in cache always in TCP formatJukka Rissanen1-13/+57
The cached DNS packet will always contain two prefix bytes. For UDP we do not send these two extra bytes. This way we do not need to know if the cached message is from UDP or TCP query.
2012-06-20dnsproxy: Do not generate SIGPIPEJukka Rissanen1-6/+6
Instead of generating SIGPIPE, just return EPIPE error if TCP stream is broken. This way we cannot get aborted if we receive SIGPIPE (seen this happening).
2012-06-20ippool: Fix endless loop issue with 32 prefix lengthGuillaume Zajac1-1/+5
While trying to establish a DUN connection with oFono, an endless loop was found when requesting an IP block. The problem was on data connection activation its address with 32 length prefix was notified through ConnMann using __connman_ippool_newaddr() but mask address shifting with 32 bits was obsolete. So IP pool was considerating block 0.0.0.0 to 255.255.255.255 was in use.
2012-06-18dnsproxy: Fix flushing pending requestsPaulo Pizarro1-19/+15
2012-06-18dnsproxy: Release all the fields of the request after forward dns replyPaulo Pizarro1-5/+1
2012-06-18dnsproxy: Avoid duplication of domains in the TCP server domain listPaulo Pizarro1-15/+2
The domain list is created in the tcp_server_event function at connection time (G_IO_OUT event), so it is not necessary to create it here too.
2012-06-18dnsproxy: If no request was sent then the TCP server is destroyedPaulo Pizarro1-2/+17
2012-06-18dnsproxy: If the answer is in the cache, the TCP request is releasedPaulo Pizarro1-23/+28
2012-06-18dnsproxy: Only one copy of the relevant buffers will be made to a TCP requestPaulo Pizarro1-37/+38
This copy will be made after scanning the list of nameservers and only if at least one TCP server is created. Otherwise, it will be sent an error response to the request.
2012-06-18device: Don't unnecessarily set device->scanning to falsePatrik Flykt1-2/+0
The WiFi plugin will call connman_device_set_scanning() immediately after connman_device_reset_scanning().
2012-06-18technology: Disable technology when the last device is unpoweredPatrik Flykt1-4/+8
Reply via D-Bus to the caller and send the technology 'Powered' property set to FALSE only after the last device has been powered off. Update code but not behavior in __connman_technology_enabled() so that the logic looks the same as in __connman_technology_disabled().
2012-06-18device: Combine multiple if statements into one block of codePatrik Flykt1-5/+4
2012-06-18device: Combine two if statements with identical outcomePatrik Flykt1-6/+1
2012-06-18technology: Remove unneeded scan stop when removing devicePatrik Flykt1-3/+0
Scanning has already been stopped when a device is to be removed from the technology struct. Let __connman_technology_remove_device() just remove the device and nothing else.
2012-06-18service: Connecting hidden network waits until connectedJukka Rissanen4-13/+79
If the user is connecting to hidden network, then we delay the return of the reply to caller until the real service has connected. This way the user connect to hidden and non-hidden networks works the same way from caller point of view.
2012-06-18service: Add support functions for pending repliesJukka Rissanen2-0/+36
2012-06-18service: Split reply_pending function to two partsJukka Rissanen2-13/+21
Split reply_pending() into two parts so that a D-Bus reply can be sent to the client waiting for a reply.