On Wed, 2012-12-12 at 10:43 -0800, Kok, Auke-jan H wrote:
connman creates a folder for each network under /var/lib/connman.
You should be able to pre-define a network in there and use connmanctl
to connect to a service. This way you can set WPA/WEP passwords
without any client. However, the
Hi,
On Thu, 2012-12-13 at 11:25 +0800, Arron Wang wrote:
some device want to support wifi open tethering network type
our ConnMan already supported, just not export the API, I also
not sure whether we force the user to use encrypied wifi network
for security consideration
If the
On Tue, 2012-12-11 at 11:04 -0500, Gary Coulbourne wrote:
That sounds like a bug. Should work without rfkill support also.
Cheers,
Patrik
It would be good to verify that it happens generally, not just in my
circumstance. It's possible there is some other underlying thing that
On Thu, Dec 13, 2012 at 9:14 AM, Patrik Flykt
patrik.fl...@linux.intel.com wrote:
On Wed, 2012-12-12 at 10:43 -0800, Kok, Auke-jan H wrote:
connman creates a folder for each network under /var/lib/connman.
You should be able to pre-define a network in there and use connmanctl
to connect to a
Hi Arron,
some device want to support wifi open tethering network type
our ConnMan already supported, just not export the API, I also
not sure whether we force the user to use encrypied wifi network
for security consideration
I am strictly against providing anything else than a WPA2
Hi,
On Thu, 2012-12-13 at 11:16 +0100, Carsten Mattner wrote:
Sounds useful, but how does that work with a hidden SSID?
In the .config file, add an entry saying 'Hidden = true'. This will make
ConnMan do an active scan for the specified SSID. This and more is in
doc/config-format.txt.
On Thu, Dec 13, 2012 at 12:14 AM, Patrik Flykt
patrik.fl...@linux.intel.com wrote:
On Wed, 2012-12-12 at 10:43 -0800, Kok, Auke-jan H wrote:
connman creates a folder for each network under /var/lib/connman.
You should be able to pre-define a network in there and use connmanctl
to connect to a
Hi all,
This is test report for connman-1.9.191.gd735026-1.1.i586.
In this testing,we ran 114 cases. 97 cases passed and 17 cases blocked
because of new bugs. The pass rate is 87%. We found 3 new bugs,
reopen 0 bug and verify 0 bug. In this commit we found the bug that
Fail to connect to wifi AP