Age | Commit message (Collapse) | Author |
|
Flag: EXEMPT bug fix
Bug: 399885815
Test: atest com.android.server.wifi
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:b8feb0cc861f6071e3d3e5e289ce969237901722)
Merged-In: I1ee7a09b7628a67dcb3502b29d99761bafd913b5
Change-Id: I1ee7a09b7628a67dcb3502b29d99761bafd913b5
|
|
into 25Q2-release.
Change-Id: Ib9f35190f5b8159b845be123a157b479eeea28e2
|
|
Auto-generated-cl: translation import
Bug: 408276020
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:9d80ea4f6b00e88831c7ceb1d37a0aa2253b108f)
Merged-In: Id37cc6f445a707bd4b192290f9c021f696bd43ac
Change-Id: Id37cc6f445a707bd4b192290f9c021f696bd43ac
|
|
into 25Q2-release.
Change-Id: Ic6aa0698c9bf8696cafea063f427a0f9ecbc68a3
|
|
Update the API documentation for isAwarePairingSupported() to include
details about supporting NAN pairing and all associated Aware R4
security features, as defined in Wi-Fi Aware Specification Version 4.0.
Bug: 406503442
Test: Build successfully
Flag: DOCS_ONLY
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:8cada2e3f646c7fec48d5ce1c5e13e486a8bc31e)
Merged-In: If34941ab44d68f783cd9215eef822d952d9cad55
Change-Id: If34941ab44d68f783cd9215eef822d952d9cad55
|
|
Change-Id: I9879fdb210e69645ae511c8f266c23c9d2c10f24
|
|
|
|
* changes:
Log WifiMulticastLockManager active sessions in WifiMetrics when filtering is re-enabled.
Split addWifiLockActiveSession into separate methods for WifiLockManager and MulticastLockManager.
Log WifiMulticastLockManager acquired sessions in WifiMetrics when locks are released.
|
|
Change-Id: I16325a9e2adb27470f5ef76e57ff51dc5509c385
|
|
is acquired." into main
|
|
Before triggering the DHCP, clientModeImpl send BLOCK_DISCOVERY
to stop the P2P discovery. And wait for CMD_PRE_DHCP_ACTION_COMPLETE
message back from P2P module. This is done to protect the DHCP exchange.
But if p2p is in a waiting state(Transitioned from Disabled state) for user
response to create the interface, all the messages will be deferred.
So clientModeImpl doesn't get CMD_PRE_DHCP_ACTION_COMPLETE response from P2P module.
This blocks the DHCP when p2p is in waiting state.
A change (Iacf3e35e82c3cf06e9986dba3535a1ac71b4dd88) was added in last year
to prevent BLOCK_DISCOVERY message exchange when P2P is in waiting state.
But that didn't fix the issue. So modified the
logic to, not to send BLOCK_DISCOVER if p2p service is not running.
Bug: 391509308
Test: atest ClientModeImplTest
Flag: EXEMPT bugfix
Change-Id: I65ffa331c5bfeb2c4143c9e21ddc780ee66f36c1
|
|
|
|
* changes:
Implement the remaining USD methods in the framework mainline supplicant wrapper.
Add framework implementations for startUsdPublish and startUsdSubscribe.
|
|
and MulticastLockManager." into main
|
|
in WifiMetrics when filtering is re-enabled.
Bug: 391378901
Flag: EXEMPT minor metrics feature
Test: atest WifiMulticastLockManagerTest
Change-Id: Ie79a3d67bdab271c8d2aba3be20fb60b2b7f2077
|
|
The capability string, found in scan results, includes encodings
for supported AKMs and CIPHERs by the AP. Building secure
ranging responder configuration process requires parsing these
encodings to populate the PASN configuration with the available
AKMs and CIPHERs. Later the best AKM and CIPHER is selected
based on the device capability.
Also make the CIPHER string for CCMP and GCMP explicitly as
CCMP-128 and GCMP-128.
Bug: 356734952
Test: atest FrameworksWifiTests
Flag: EXEMPT bug fix
Change-Id: I47329fe3b81535ac2a8cf4b70f9d4c89cf6aae75
|
|
class." into main
|
|
for WifiLockManager and MulticastLockManager.
Some of the existing logic does not apply to
the metrics for multicast locks.
Also see ag/32466544 where a similar split
was done for the lock acquired method.
Bug: 391378901
Flag: EXEMPT minor metrics feature
Test: atest WifiLockManagerTest WifiMetricsTest
Change-Id: Ia601da87163e5a9d0775569d66dcdc8805438832
|
|
in WifiMetrics when locks are released.
Bug: 391378901
Flag: EXEMPT minor metrics feature
Test: atest WifiInjectorTest \
WifiMulticastLockManagerTest
Change-Id: Ie593dc64d97210b29ca657d3bb5b1254caf5eae2
|
|
Change-Id: Icb69c7893197346e55213e951de675113bc35637
|
|
Fix an issue during cherry pick
Flag: TEST_ONLY
Bug: 366011709
Test: atest WifiP2pGroupTestCases
Change-Id: I47fa7eea02d45e843828b3f5eb715a2a98288927
|
|
framework mainline supplicant wrapper.
Bug: 365585450
Flag: com.android.wifi.flags.mainline_supplicant
Test: atest MainlineSupplicantTest
Change-Id: I9f6e080e919007b0078925fc7dd8e676c199b613
|
|
and startUsdSubscribe.
Bug: 365585450
Flag: com.android.wifi.flags.mainline_supplicant
Test: atest MainlineSupplicantTest
Change-Id: Ie43970729532e3553a5d3470b2941867b3ae0503
|
|
when a multicast lock is acquired.
This will be used in the next CL for metrics.
Bug: 391378901
Flag: EXEMPT minor metrics feature
Test: atest WifiManagerTest
Test: atest WifiServiceImplTest \
WifiMulticastLockManagerTest
Change-Id: Ife2be68dfa8cbabe2cc8cda0fc9993cd46adebb2
|
|
|
|
for WifiLockManager and MulticastLockManager.
Some of the existing logic does not apply to
the metrics for multicast locks.
Bug: 391378901
Flag: EXEMPT minor metrics feature
Test: atest WifiLockManagerTest WifiMetricsTest
Change-Id: I83a9cf064b27677e013c68926fbcbda2a82a8532
|
|
Especailly handle back to back disable/enable cases.
Flag: EXEMPT bugfix
Bug: 393479148
Test: atest com.android.server.wifi
Change-Id: I88cecaa198805d8f8ffadc5d934715eb7c8d7fea
|
|
Change-Id: Idd31390c89443fd8e186a35cf67978159778e470
|
|
|
|
|
|
mainline supplicant class.
Bug: 365585450
Flag: com.android.wifi.flags.mainline_supplicant
Test: atest MainlineSupplicantTest
Change-Id: Ic534ec940041b5520f86540a9536c1ea8998f2d8
|
|
And if SAR supported, update during the bootup completed
Flag: EXEMPT bugfix
Bug: 403455814
Test: atest com.android.server.wifi
Change-Id: Icc2336c06fa1832d9428ee6bbc2449331809c4fb
|
|
Flag: EXEMPT bugfix
Bug: 403348813
Test: atest com.android.server.wifi
Change-Id: I348be3a1671bf7cfa67ce9db0be4fadb31bc7900
|
|
|
|
* changes:
Fix secure ranging result flag
Fix Secure ranging result processing
Update pre-shared key for secure ranging
|
|
Change-Id: Ifbc1881149aa7631c06b89afae39ae23a9b681bf
|
|
Flag: EXEMPT bugfix
Bug: 403396045
Test: atest FrameworksWifiApiTests, FrameworksWifiTests
Change-Id: Id3b62fee3c2b7d18e8caf5fac64f1c25ef9ac4ba
|
|
|
|
|
|
Upstream Mockito has deleted the deprecated matchers. Migrates usage to replacements
to unblock upgrade.
Test: m checkbuild
Flag: TEST_ONLY
Bug: 310268946
Change-Id: I2ff49a5857c05632f418157436559a24a1fa4e56
|
|
Set the flag RangingResult#is80211azNtbMeasurement for secure
ranging.
Bug: 397619419
Flag: EXEMPT bug fix
Test: atest WifiRttControllerAidlImplTest
Change-Id: I661de072a27b2ef578a0ff8d870c2f879d6a76ee
|
|
Bug: 397619419
Test: atest FrameworksWifiTests
Flag: EXEMPT bug fix
Change-Id: I4500b5e7b99508b9996e56f89adf863f00e60833
|
|
Bug: 388601492
Test: atest RttServiceImplTest
Flag: EXEMPT bug fix
Change-Id: I2c717f6ebe5afec6546ca89b2834a11d2aaa3ba5
|
|
|
|
|
|
Change-Id: I1fac4ba1c48d88edafb389e5b5e4d524b9e1c23e
|
|
|
|
Change-Id: I887a72872f80bbfc16d76eac37f2ee90d2d3df46
|
|
Bug: 397619419
Test: Build
Flag: EXEMPT bug fix
Change-Id: Ie0c45836b7b22cf38860657a1436d46bc6b158cd
|
|
Add support for GCMP_128 and CCMP_256. Also rename CCMP_128 to
CCMP and GCMP_128 to GCMP which aligns with wpa_supplicant.
Bug: 397619419
Test: atest FrameworksWifiTests
Flag: EXEMPT bug fix
Change-Id: I1ca01bbc4716708ac9cb749d47af1bdbfa17c724
|