Re: cli or gui client

2012-12-13 Thread Patrik Flykt
On Wed, 2012-12-12 at 10:43 -0800, Kok, Auke-jan H wrote:
 connman creates a folder for each network under /var/lib/connman.
 
 You should be able to pre-define a network in there and use connmanctl
 to connect to a service. This way you can set WPA/WEP passwords
 without any client. However, the format of these files isn't
 documented AFAIK.

No. You should not touch/create any directories in /var/lib/connman. The
only thing one is allowed to add/remove in /var/lib/connman are the wifi
provisioning files ending with '.config' and documented in
doc/config-format.txt. ConnMan will pick up the provisioned wifi network
from the .config files and use those settings when a matching SSID is
found. After that connmanctl can be used to connect/disconnect the
service normally.

Cheers,

Patrik


___
connman mailing list
connman@connman.net
http://lists.connman.net/listinfo/connman


Re: [PATCH] technology: Enable wifi tethering open network type

2012-12-13 Thread Patrik Flykt

Hi,

On Thu, 2012-12-13 at 11:25 +0800, Arron Wang wrote:
 some device want to support wifi open tethering network type
 our ConnMan already supported, just not export the API, I also
 not sure whether we force the user to use encrypied wifi network
 for security consideration

If the passphrase is defined, WPA encryption is enabled. If it's
missing, an open WiFi network is created.

 ---
  src/technology.c  |   18 +-
  test/enable-tethering |7 +--
  2 files changed, 18 insertions(+), 7 deletions(-)
 
 diff --git a/src/technology.c b/src/technology.c
 index bf82b8d..d4382b8 100644
 --- a/src/technology.c
 +++ b/src/technology.c
 @@ -216,9 +216,6 @@ static int set_tethering(struct connman_technology 
 *technology,
  {
   const char *ident, *passphrase, *bridge;
  
 - ident = technology-tethering_ident;
 - passphrase = technology-tethering_passphrase;
 -
   if (technology-driver == NULL ||
   technology-driver-set_tethering == NULL)
   return -EOPNOTSUPP;
 @@ -227,12 +224,23 @@ static int set_tethering(struct connman_technology 
 *technology,
   if (technology-enabled == FALSE)
   return -EACCES;
  
 + /* Clear passphrase filed when disable wifi tethering,
 +  * else if we once enabled encrypied wifi network,
 +  * we may failed to enable open wifi network type
 +  */
 + if (enabled == FALSE) {
 + g_free(technology-tethering_passphrase);
 + technology-tethering_passphrase = NULL;
 + }
 +
 + ident = technology-tethering_ident;
 + passphrase = technology-tethering_passphrase;
 +

We don't want to clear the passphrase when disconnecting since that'd
mean explicitely selecting open/WPA secured WiFi from some UI every time
tethering is enabled.

Thus NACK for this patch.


Patrik


___
connman mailing list
connman@connman.net
http://lists.connman.net/listinfo/connman


Re: Connman not showing a wifi adapter as a technology

2012-12-13 Thread Patrik Flykt
On Tue, 2012-12-11 at 11:04 -0500, Gary Coulbourne wrote:


  That sounds like a bug. Should work without rfkill support also.
  
  Cheers,
  
  Patrik
  
 
 It would be good to verify that it happens generally, not just in my
 circumstance.  It's possible there is some other underlying thing that
 changed in my configuration that I didn't account for.

When starting up ConnMan for the first time (or removing its settings
file in /var), all wireless technologies are by default off. The safest
way to fix this is to do 'connmanctl enable wifi' or similar
incantation in a preferred programming language at first time startup.

I noticed that with rfkill enabled, there was a bug in handling the
initial WiFi state. It now also correctly defaults to WiFi off and
actually works as expected if WiFi is to be disabled when the device is
restarted. It now works the same way with and without rfkill support.


Cheers,

Patrik


___
connman mailing list
connman@connman.net
http://lists.connman.net/listinfo/connman


Re: cli or gui client

2012-12-13 Thread Carsten Mattner
On Thu, Dec 13, 2012 at 9:14 AM, Patrik Flykt
patrik.fl...@linux.intel.com wrote:
 On Wed, 2012-12-12 at 10:43 -0800, Kok, Auke-jan H wrote:
 connman creates a folder for each network under /var/lib/connman.

 You should be able to pre-define a network in there and use connmanctl
 to connect to a service. This way you can set WPA/WEP passwords
 without any client. However, the format of these files isn't
 documented AFAIK.

 No. You should not touch/create any directories in /var/lib/connman. The
 only thing one is allowed to add/remove in /var/lib/connman are the wifi
 provisioning files ending with '.config' and documented in
 doc/config-format.txt. ConnMan will pick up the provisioned wifi network
 from the .config files and use those settings when a matching SSID is
 found. After that connmanctl can be used to connect/disconnect the
 service normally.

Sounds useful, but how does that work with a hidden SSID?
Would it try to match the configured profiles and see if the
AP responds to that SSID. I don't know too much about the
protocol but always wondered how that woks.

If I configure a connection and set the SSID which is not advertized
does connman or networmanager have to blindly try or is there
a well defined method to see if the SSID matches an AP?

Guys thanks for all the hints and I don't want to repeat myself
or sound helpless but any idea how I can debug the dbus connection
problem so that I can finally try out the suggested connection methods?

btw, thanks for the quick responses.
___
connman mailing list
connman@connman.net
http://lists.connman.net/listinfo/connman


Re: [PATCH] technology: Enable wifi tethering open network type

2012-12-13 Thread Marcel Holtmann
Hi Arron,

 some device want to support wifi open tethering network type
 our ConnMan already supported, just not export the API, I also
 not sure whether we force the user to use encrypied wifi network
 for security consideration

I am strictly against providing anything else than a WPA2 encrypted
Hotspot. It is an extremely bad idea to let the user configure a Hotspot
without password.

So yes, we force the user to have a passphrase. That is 100% intentional
and has been spelled out clearly 2 years ago when we added Tethering
support to ConnMan.

Same as we do required Bluetooth authentication and authorization before
Tethering over Bluetooth can be used.

The one thing we have not done yet is setting the friendly name
automatically from something like hostnamed (from systemd).

Regards

Marcel


___
connman mailing list
connman@connman.net
http://lists.connman.net/listinfo/connman


Re: cli or gui client

2012-12-13 Thread Patrik Flykt

Hi,

On Thu, 2012-12-13 at 11:16 +0100, Carsten Mattner wrote:
 Sounds useful, but how does that work with a hidden SSID?

In the .config file, add an entry saying 'Hidden = true'. This will make
ConnMan do an active scan for the specified SSID. This and more is in
doc/config-format.txt.


Cheers,

Patrik


___
connman mailing list
connman@connman.net
http://lists.connman.net/listinfo/connman


Re: cli or gui client

2012-12-13 Thread Kok, Auke-jan H
On Thu, Dec 13, 2012 at 12:14 AM, Patrik Flykt
patrik.fl...@linux.intel.com wrote:
 On Wed, 2012-12-12 at 10:43 -0800, Kok, Auke-jan H wrote:
 connman creates a folder for each network under /var/lib/connman.

 You should be able to pre-define a network in there and use connmanctl
 to connect to a service. This way you can set WPA/WEP passwords
 without any client. However, the format of these files isn't
 documented AFAIK.

 No. You should not touch/create any directories in /var/lib/connman. The
 only thing one is allowed to add/remove in /var/lib/connman are the wifi
 provisioning files ending with '.config' and documented in
 doc/config-format.txt. ConnMan will pick up the provisioned wifi network
 from the .config files and use those settings when a matching SSID is
 found. After that connmanctl can be used to connect/disconnect the
 service normally.

ahhh, thanks for the pointer - I never saw this file before.

Auke
___
connman mailing list
connman@connman.net
http://lists.connman.net/listinfo/connman


Connman upstream test result_20121214

2012-12-13 Thread Li, XiaX
Hi all,

This is test report for  connman-1.9.191.gd735026-1.1.i586.
In this testing,we ran 114 cases. 97 cases passed and 17 cases blocked
because of new bugs. The pass rate is 87%. We found 3 new bugs,
reopen 0 bug and verify 0 bug. In this commit we found the bug that
Fail to connect to wifi AP with security by simple-agent,Errors output
when connect to OpenVPN in the first time and Connmanctl can't remove
connected wifi services.

New bugs
===
25893 - Fail to connect to wifi AP with security by simple-agent
https://bugs.meego.com/show_bug.cgi?id=25893

25894 - Errors output when connect to OpenVPN in the first time
https://bugs.meego.com/show_bug.cgi?id=25894

25895 - Connmanctl can't remove connected wifi services
https://bugs.meego.com/show_bug.cgi?id=25895


Re-open bugs:
===
N/A

 Verified bugs:
===
N/A

reproduced bugs:
===
25862 - service-move-before does not change the connman state
https://bugs.meego.com/show_bug.cgi?id=25862

25884 - Still see wifi service after disable wifi
https://bugs.meego.com/show_bug.cgi?id=25884


===
Testing Environment
==
Hardware:  netbook Eeepc 1005PE / Cedar Trail / Ocktrail Green Ridge
Image:  meego-netbook-ia32-1.2.0 / netbook-ia32-pinetrail-tizen_20120424.2
ConnMan: connman-1.9.191.gd735026-1.1.i586
wpa_supplicant: wpa_supplicant-1.0-13.1.i586
Ofono: ofono-1.11.306.g660bbf6-1.1.i586
bluez:  bluez-4.87-1.12.i586
3G:  Unicom Sim card/ZTE MF190/HuaWei E261
BT:   Palm Pre/AnyCom AP/CSR dongle (disable the onboard BT device)
Wireless AP:netgear WNR2000/dlink

Test Execution Summary
==
Category  Total  PASS   FAILN/A  Comments
WiFi   18  117
bt66
3G  29 29
Ethernet  28 28
Regulatory1  1
NTP  1  1
Openvpn   7  7
surfing  3  3
proxy  11 11
tethering 10 10
Total 11497   17

Bug referred here is bug at bugs.meego.com, for example, bug #23110 refer
to http://bugs.meego.com/show_bug.cgi?id=23110
 ConnMan Test Report List
Date:2012-12-14


---Ethernet---

CM_Eth_BigBroadcastPing  PASS
CM_Eth_Conn  PASS
CM_Eth_HasDHCP   PASS
CM_Eth_IsReEnableWorks   PASS
CM_Eth_PoweredOn PASS
CM_Eth_SmallBroadcastPingPASS
CM_Eth_IsPoweredOn   PASS
CM_Eth_IsReady   PASS
CM_Eth_DisconnectPASS
CM_Eth_PoweredOffPASS
CM_Eth_Hotplug   PASS
CM_Eth_HasIP PASS
CM_Eth_Connect   PASS
CM_Advance_StaticIP_WiredPASS
CM_Advance_StaticIP  PASS
CM_Eth_UploadPASS
CM_Eth_Download  PASS
CM_Flt_eth_autoconn  PASS  
CM_Flt_ConnWired PASS  
CM_Flt_EthNoPing PASS
CM_Flt_EthPoweredOff PASS
CM_Flt_EthIsPoweredOff   PASS
CM_Flt_EthPoweredOn  PASS
CM_Flt_EthOnline PASS
CM_IPv6_eth_set_address  PASS
CM_Info_EthConnInfo  PASS
CM_IPv6_eth_ssh  PASS
CM_AutoConn_RebootWired  PASS

Total:28 Pass:28 Fail:0 N/A:0


---WiFi---

CM_WF_wps_pinBlock  block by #25893
CM_WF_wps_pbcBlock  block by #25893
CM_WS_WEP_Upload Block  block by #25893
CM_WS_WEP_Download   Block  block by #25893
CM_WS_PSK2   Block  block by #25893
CM_WS_RSNBlock  block by #25893
CM_WS_WEP64  Block  block by #25893
CM_WS_SharedHiddenWEP128 Block  block by #25893
CM_WS_WPABlock  block by #25893
CM_WS_OpenBroadcastWEP40 Block  block by #25893
CM_WS_WEP128 Block  block by #25893
CM_WS_Open   PASS
CM_WS_Hidden Block  block by #25893
CM_Autoconn_HIDDEN_Rem_NoSecuBlock  block by #25893  
CM_AutoConn_RememWEP64   Block  block by #25893
CM_Autoconn_HIDDEN_Rem_WPAPSKAES Block  block by #25893
CM_Autoconn_RememWPAPSKTKIP  Block  block by #25893
CM_Autoconn_HIDDEN_Rem_WEP128Block  block by #25893

Total:18 Pass:1 Fail:0 N/A:17


---Bluetooth---

CM_BT_ConnectPASS
CM_BT_SmallPing  PASS
CM_BT_BigPingPASS
CM_BT_IsReEnableWorksPASS