src/mobileap_network.c
)
-SET(APP_VENDOR "samsung")
+SET(CMAKE_INSTALL_PREFIX /usr)
+
+SET(APP_VENDOR "tizen")
SET(APP_NAME mobileap-agent)
-SET(APP_DIR /usr/bin)
+SET(APP_DIR ${CMAKE_INSTALL_PREFIX}/bin)
SET(INCLUDE_DIR ${CMAKE_SOURCE_DIR}/include)
IF("${CMAKE_BUILD_TYPE}" STREQUAL "")
SET(CMAKE_BUILD_TYPE "Release")
ENDIF("${CMAKE_BUILD_TYPE}" STREQUAL "")
-IF("${CMAKE_BUILD_TYPE}" STREQUAL "Private")
- SET(CMAKE_BUILD_TYPE "Release")
- ADD_DEFINITIONS("-D__PRIVATE_CODE__")
- SET(PRIVATE_REQUIRED_PKGS "mdm kies-control-point")
-ENDIF("${CMAKE_BUILD_TYPE}" STREQUAL "Private")
MESSAGE("Build type: ${CMAKE_BUILD_TYPE}")
INCLUDE_DIRECTORIES(${INCLUDE_DIR})
INCLUDE(FindPkgConfig)
-pkg_check_modules(pkgs REQUIRED dlog dbus-glib-1 pmapi vconf notification libssl secure-storage capi-network-connection capi-network-bluetooth ${PRIVATE_REQUIRED_PKGS})
+pkg_check_modules(pkgs REQUIRED dlog dbus-glib-1 pmapi vconf notification libssl secure-storage capi-network-connection capi-network-bluetooth)
FOREACH(flag ${pkgs_CFLAGS})
SET(EXTRA_CFLAGS "${EXTRA_CFLAGS} ${flag}")
ENDFOREACH(flag)
-SET(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} ${EXTRA_CFLAGS}")
+SET(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} ${EXTRA_CFLAGS} -fpie -Wall")
SET(CMAKE_C_FLAGS_DEBUG "-O0 -g")
SET(CMAKE_C_FLAGS_RELEASE "-O2")
ADD_DEFINITIONS("-DAPPNAME=\"${APP_NAME}\"")
ADD_DEFINITIONS("-DAPP_DIR=\"${APP_DIR}\"")
-SET(CMAKE_EXE_LINKER_FLAGS "${CMAKE_EXE_LINKER_FLAGS} -Wl,--as-needed")
+SET(CMAKE_EXE_LINKER_FLAGS "${CMAKE_EXE_LINKER_FLAGS} -Wl,--as-needed -pie")
ADD_EXECUTABLE(${PROJECT_NAME} ${SRCS})
TARGET_LINK_LIBRARIES(${PROJECT_NAME} ${pkgs_LDFLAGS})
Name: mobileap-agent
Summary: Mobile AP daemon for setting tethering environments
-Version: 0.1.83
-Release: 1
+Version: 0.1.85
+Release: 2
Group: TO_BE/FILLED_IN
-License: Apache License Version 2.0
+License: Apache-2.0
Source0: %{name}-%{version}.tar.gz
BuildRequires: pkgconfig(dlog)
BuildRequires: pkgconfig(dbus-glib-1)
%setup -q
%build
-export CFLAGS+=" -fpie"
-CFLAGS="${CFLAGS}" cmake . -DCMAKE_INSTALL_PREFIX="%{_prefix}"
+%cmake .
make %{?jobs:-j%jobs}
%install
-rm -rf %{buildroot}
%make_install
%post
%{_bindir}/mobileap-agent
%changelog
+* Sat Feb 16 2013 Seungyoun Ju <sy39.ju@samsung.com> 0.1.85-2
+- Function return value is checked
+- Private SSID is considered
+- Build option clean-up and g_type_init is deprecated from glib 2.35
+
+* Thu Feb 14 2013 Seungyoun Ju <sy39.ju@samsung.com> 0.1.84-1
+- User is specified in service file for Dbus auto activation
+
* Mon Jan 28 2013 Seungyoun Ju <sy39.ju@samsung.com> 0.1.83-1
- Remove unrequired log
[D-BUS Service]
Name=org.tizen.tethering
Exec=/usr/bin/mobileap-agent
+User=root
}
#else
GError *err = NULL;
+ GIOStatus ios;
- g_io_channel_read_chars(hostapd_io_channel, buf,
+ ios = g_io_channel_read_chars(hostapd_io_channel, buf,
HOSTAPD_REQ_MAX_LEN, &read, &err);
if (err != NULL) {
ERR("g_io_channel_read_chars is failed : %s\n", err->message);
g_error_free(err);
return FALSE;
+ } else if (ios != G_IO_STATUS_NORMAL) {
+ ERR("g_io_channel_read_chars is failed : %d\n", ios);
+ return FALSE;
}
#endif
GError *error = NULL;
int mobileap_vconf_key = VCONFKEY_MOBILE_HOTSPOT_MODE_NONE;
+#if !GLIB_CHECK_VERSION(2,35,0)
g_type_init();
+#endif
if (vconf_get_int(VCONFKEY_MOBILE_HOTSPOT_MODE, &mobileap_vconf_key)) {
ERR("vconf_get_int FAIL\n");
static int __generate_initial_passphrase(char *passphrase_buf);
static mobile_ap_error_code_e __get_hide_mode(int *hide_mode);
static mobile_ap_error_code_e __set_hide_mode(const int hide_mode);
-static mobile_ap_error_code_e __get_ssid(char *ssid, unsigned int size);
+static mobile_ap_error_code_e __get_common_ssid(char *ssid, unsigned int size);
static mobile_ap_error_code_e __get_security_type(char *security_type, unsigned int len);
static mobile_ap_error_code_e __set_security_type(const char *security_type);
static mobile_ap_error_code_e __get_passphrase(char *passphrase, unsigned int size, unsigned int *passphrase_len);
return MOBILE_AP_ERROR_NONE;
}
-static mobile_ap_error_code_e __get_ssid(char *ssid, unsigned int size)
+static mobile_ap_error_code_e __get_common_ssid(char *ssid, unsigned int size)
{
if (ssid == NULL)
return MOBILE_AP_ERROR_INVALID_PARAM;
mobile_ap_error_code_e ret = MOBILE_AP_ERROR_NONE;
unsigned int read_len = 0;
- ret = __get_ssid(obj->ssid, sizeof(obj->ssid));
+ ret = __get_common_ssid(obj->ssid, sizeof(obj->ssid));
if (ret != MOBILE_AP_ERROR_NONE)
return ret;
goto FAIL;
}
+ if (strlen(ssid) > 0) {
+ DBG("Private(Passed) SSID is used : %s\n", ssid);
+ g_strlcpy(obj->ssid, ssid, sizeof(obj->ssid));
+ }
+
/* Initialize tethering */
if (!_init_tethering(obj)) {
ret = MOBILE_AP_ERROR_RESOURCE;
g_assert(obj != NULL);
g_assert(context != NULL);
- ret = __get_ssid(ssid, sizeof(ssid));
- if (ret != MOBILE_AP_ERROR_NONE) {
- ERR("__get_ssid is failed : %d\n", ret);
+ if (_mobileap_is_enabled(MOBILE_AP_STATE_WIFI)) {
+ g_strlcpy(ssid, obj->ssid, sizeof(ssid));
+ } else {
+ ret = __get_common_ssid(ssid, sizeof(ssid));
+ if (ret != MOBILE_AP_ERROR_NONE) {
+ ERR("__get_common_ssid is failed : %d\n", ret);
+ }
}
dbus_g_method_return(context, ssid);
return TRUE;
-
}
gboolean tethering_get_wifi_tethering_security_type(TetheringObject *obj,