[PATCH] main.conf: Add InputRequestTimeout and BrowserLaunchTimeout

2012-05-22 Thread Marcel Holtmann
--- src/main.conf | 14 ++ 1 files changed, 14 insertions(+), 0 deletions(-) diff --git a/src/main.conf b/src/main.conf index fc6d8a6..e8ab393 100644 --- a/src/main.conf +++ b/src/main.conf @@ -1,5 +1,19 @@ [General] +# Set input request timeout. Default is 120 seconds +# The req

Thoughts about passphrase handling

2012-05-22 Thread Marcel Holtmann
Hello, with the ConnMan 1.0 release we introduced a purely agent based handling of passphrases. The term passphrases here applies to WEP and WPA/WPA2 pre-shared keys. ConnMan does store (and only these) by itself so they are available when attempting to reconnect. And we do store them since there

Re: Agent-based Service Termination Mid-connection

2012-05-22 Thread Grant Erickson
On May 22, 2012, at 2:03 PM, Grant Erickson wrote: > Picking up a thread from IRC, I've been working on getting agent-based > service connections working with connman-1.0. However, what I've found is > that rather than performing the following sequence of operations: > > 1) Issue .Service.

Agent-based Service Termination Mid-connection

2012-05-22 Thread Grant Erickson
Picking up a thread from IRC, I've been working on getting agent-based service connections working with connman-1.0. However, what I've found is that rather than performing the following sequence of operations: 1) Issue .Service.Connect call. 2) Receive properties dictionary from

Re: [PATCH] ipconfig: Show FIXED configuration IP address info

2012-05-22 Thread Marcel Holtmann
Hi Patrik, > Show FIXED configuration IP address info in service IPv4 and > IPv6 properties. If IP address is not available via > ipconfig->system, use the provider configured ones instead. > > Fixes BMC#25084 > --- > src/ipconfig.c | 62 > +

Re: [PATCH v3] Send RS before RDNSS lifetime expires

2012-05-22 Thread Marcel Holtmann
Hi Elena, > Implemented feature from RFC 6106 section > '5.1. Recursive DNS Server Option': > "Lifetime 32-bit unsigned integer. > ... > Hosts MAY send a Router Solicitation to ensure > the RDNSS information is fresh before the interval expires." > > Host will send RS

Re: [PATCH v2]resolver: Fixed cleanup of Resolver timer

2012-05-22 Thread Marcel Holtmann
Hi Elena, > When connman is restarted, DNS servers are removed and added again > with function __connman_resolver_redo_servers(). While removing a > DNS entry, one should also remove the resolver timer registered for it. > Not doing so, causes the timeout handler resolver_expire_cb to fire > witho

Re: [PATCH 0/2] Fix service Domains property

2012-05-22 Thread Marcel Holtmann
Hi Patrik, > Here is a fix for showing service Domains property and updated documentation > as read from the code. The first patch actually mostly moves append_domain() > below append_domainconfig() in the code, git just made it look horrible. both patches have been applied. Regards Marcel __

Re: [PATCH 0/2] WISPr: avoid running wispr if TLS is not supported

2012-05-22 Thread Marcel Holtmann
Hi Tomasz, > Following Marcel's patch providing --disable-wispr option at configuration > time, here are two patches > which take care of not running wispr logic when TLS is not supported. both patches have been applied. Regards Marcel ___ connman

Re: [PATCH v2] agent: Verify that the reply contains a dictionary

2012-05-22 Thread Marcel Holtmann
Hi Patrik, > --- > src/agent.c | 31 ++- > 1 file changed, 30 insertions(+), 1 deletion(-) patch has been applied. Regards Marcel ___ connman mailing list connman@connman.net http://lists.connman.net/listinfo/connman

Re: [HEADS UP] vim users

2012-05-22 Thread Gustavo Sverzut Barbieri
On Tue, May 22, 2012 at 12:38 PM, Lucas De Marchi wrote: > > Hey, > > As I sent previously to BlueZ mailing list, the patches for d-bus > introspection exposes a bug in vim c syntax highlight. There's already > a fix for that: > https://groups.google.com/forum/#!msg/vim_dev/_IL5jM1-t_w/D-vIwZM2Rfw

[HEADS UP] vim users

2012-05-22 Thread Lucas De Marchi
Hey, As I sent previously to BlueZ mailing list, the patches for d-bus introspection exposes a bug in vim c syntax highlight. There's already a fix for that: https://groups.google.com/forum/#!msg/vim_dev/_IL5jM1-t_w/D-vIwZM2RfwJ I'm not sure when there will be a new version, so I'm attaching to t

[PATCH ell 6/6] util: safely derive the size of an array

2012-05-22 Thread Lucas De Marchi
With this trick from CCAN (http://ccodearchive.net/info/array_size.html) we ensure at build-time user is indeed passing an array and not a pointer. The code in CCAN uses several other macros like BUILD_ASSERT, BUILD_ASSERT_OR_ZERO. Since this is a public header, i think it's preferred not to expor

[PATCH ell 5/6] hashmap: optimize and cleanup by using array

2012-05-22 Thread Lucas De Marchi
From: Gustavo Sverzut Barbieri Using an ordered array will allow binary search, the code is also reduced. Bonus for less memory fragmentation due less memory allocations and less cache trashing due using linear memory for lookups. --- ell/hashmap.c | 159 ---

[PATCH ell 4/6] Add array type

2012-05-22 Thread Lucas De Marchi
From: Gustavo Sverzut Barbieri Array with configurable member size and optimized operations such as binary search and insert sorted. --- .gitignore|1 + Makefile.am | 11 +- ell/array.c | 758 + ell/array.h |

[PATCH ell 3/6] hashmap: introduce string hash

2012-05-22 Thread Lucas De Marchi
From: Gustavo Sverzut Barbieri keys are copied so we avoid crashes if they go away. keys may be kept in another format than user provided, for instance we keep the size for easier comparison and hashing. --- ell/hashmap.c | 146 +-- ell/has

[PATCH ell 2/6] hashmap: better hash function

2012-05-22 Thread Lucas De Marchi
From: Lucas De Marchi Add hash function with better spread of items. It is used by WebKit, EFL, kmod and others. Its intent is to be used by string hashes and types other than a simple pointer, although it could be used for this later case, too. Reference: http://www.azillionmonkeys.com/qed/hash

[PATCH ell 1/6] util: add macros for dealing with unaligned access

2012-05-22 Thread Lucas De Marchi
From: Lucas De Marchi --- ell/util.h | 16 1 file changed, 16 insertions(+) diff --git a/ell/util.h b/ell/util.h index 1c805cf..d7849c1 100644 --- a/ell/util.h +++ b/ell/util.h @@ -36,6 +36,22 @@ extern "C" { #define L_PTR_TO_INT(p) ((int) ((intptr_t) (p))) #define L_INT_TO

[PATCH v2] agent: Verify that the reply contains a dictionary

2012-05-22 Thread patrik . flykt
From: Patrik Flykt --- src/agent.c | 31 ++- 1 file changed, 30 insertions(+), 1 deletion(-) diff --git a/src/agent.c b/src/agent.c index feeb48e..ebee19c 100644 --- a/src/agent.c +++ b/src/agent.c @@ -85,6 +85,26 @@ int __connman_agent_unregister(const char *sende

[PATCH 2/2] wispr: If redirected and TLS is not supported we fallback on browser request

2012-05-22 Thread Tomasz Bursztyka
--- src/wispr.c |5 +++-- 1 files changed, 3 insertions(+), 2 deletions(-) diff --git a/src/wispr.c b/src/wispr.c index d43763d..e5796d7 100644 --- a/src/wispr.c +++ b/src/wispr.c @@ -692,8 +692,9 @@ static gboolean wispr_portal_web_result(GWebResult *result, gpointer user_data)

[PATCH 1/2] gweb: Adding a function to know if TLS is supported or not

2012-05-22 Thread Tomasz Bursztyka
--- gweb/gweb.c |5 + gweb/gweb.h |2 ++ 2 files changed, 7 insertions(+), 0 deletions(-) diff --git a/gweb/gweb.c b/gweb/gweb.c index db3850c..7aa6fa4 100644 --- a/gweb/gweb.c +++ b/gweb/gweb.c @@ -266,6 +266,11 @@ void g_web_unref(GWeb *web) g_free(web); } +gboolean g_web

[PATCH 0/2] WISPr: avoid running wispr if TLS is not supported

2012-05-22 Thread Tomasz Bursztyka
Hi, Following Marcel's patch providing --disable-wispr option at configuration time, here are two patches which take care of not running wispr logic when TLS is not supported. Please review, Tomasz Bursztyka (2): gweb: Adding a function to know if TLS is supported or not wispr: If redirect

Re: [PATCH] agent: Verify that the reply contains a dictionary

2012-05-22 Thread Marcel Holtmann
Hi Patrik, > --- > src/agent.c | 30 +- > 1 file changed, 29 insertions(+), 1 deletion(-) > > diff --git a/src/agent.c b/src/agent.c > index feeb48e..3ecbc41 100644 > --- a/src/agent.c > +++ b/src/agent.c > @@ -85,6 +85,25 @@ int __connman_agent_unregister(const cha

[PATCH] agent: Verify that the reply contains a dictionary

2012-05-22 Thread patrik . flykt
From: Patrik Flykt --- src/agent.c | 30 +- 1 file changed, 29 insertions(+), 1 deletion(-) diff --git a/src/agent.c b/src/agent.c index feeb48e..3ecbc41 100644 --- a/src/agent.c +++ b/src/agent.c @@ -85,6 +85,25 @@ int __connman_agent_unregister(const char *sender

RE: Possibility to use OpenSSL or GnuTLS

2012-05-22 Thread Bach, Pascal
Hi Marcel > it is not even used for Internet connectivity detection. It is required > by WISPr to log into a hotspot. > Ok that is good to know, I wanted to ask if there is a possibility to disable WISPr but your last commits already answered my question. Your --disable-wispr patchs indeed we

[PATCH 0/2] Fix service Domains property

2012-05-22 Thread patrik . flykt
From: Patrik Flykt Hi, Here is a fix for showing service Domains property and updated documentation as read from the code. The first patch actually mostly moves append_domain() below append_domainconfig() in the code, git just made it look horrible. Cheers, Patrik Patrik Flyk

[PATCH 2/2] doc: Update service Domains property description

2012-05-22 Thread patrik . flykt
From: Patrik Flykt --- doc/service-api.txt |4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/doc/service-api.txt b/doc/service-api.txt index a75727d..7cc6fb4 100644 --- a/doc/service-api.txt +++ b/doc/service-api.txt @@ -282,7 +282,9 @@ Properties string State [readonly]

[PATCH 1/2] service: Fix Domains property

2012-05-22 Thread patrik . flykt
From: Patrik Flykt The service Domains property shows Domains.Configuration if set, otherwise the domain name given by DHCP or provider. Fixes BMC#25122 --- src/service.c | 26 +- 1 file changed, 13 insertions(+), 13 deletions(-) diff --git a/src/service.c b/src/servi

Re: [PATCH v2]resolver: Fixed cleanup of Resolver timer

2012-05-22 Thread Jukka Rissanen
Hi Elena, On 05/21/2012 06:48 PM, Elena Tebesoi wrote: When connman is restarted, DNS servers are removed and added again with function __connman_resolver_redo_servers(). While removing a DNS entry, one should also remove the resolver timer registered for it. Not doing so, causes the timeout han