Age | Commit message (Collapse) | Author |
|
Update the API documentation for isAwarePairingSupported() to include
details about supporting NAN pairing and all associated Aware R4
security features, as defined in Wi-Fi Aware Specification Version 4.0.
Bug: 406503442
Test: Build successfully
Flag: DOCS_ONLY
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:8cada2e3f646c7fec48d5ce1c5e13e486a8bc31e)
Merged-In: If34941ab44d68f783cd9215eef822d952d9cad55
Change-Id: If34941ab44d68f783cd9215eef822d952d9cad55
|
|
is acquired." into main
|
|
|
|
The capability string, found in scan results, includes encodings
for supported AKMs and CIPHERs by the AP. Building secure
ranging responder configuration process requires parsing these
encodings to populate the PASN configuration with the available
AKMs and CIPHERs. Later the best AKM and CIPHER is selected
based on the device capability.
Also make the CIPHER string for CCMP and GCMP explicitly as
CCMP-128 and GCMP-128.
Bug: 356734952
Test: atest FrameworksWifiTests
Flag: EXEMPT bug fix
Change-Id: I47329fe3b81535ac2a8cf4b70f9d4c89cf6aae75
|
|
when a multicast lock is acquired.
This will be used in the next CL for metrics.
Bug: 391378901
Flag: EXEMPT minor metrics feature
Test: atest WifiManagerTest
Test: atest WifiServiceImplTest \
WifiMulticastLockManagerTest
Change-Id: Ife2be68dfa8cbabe2cc8cda0fc9993cd46adebb2
|
|
|
|
Flag: EXEMPT bugfix
Bug: 403396045
Test: atest FrameworksWifiApiTests, FrameworksWifiTests
Change-Id: Id3b62fee3c2b7d18e8caf5fac64f1c25ef9ac4ba
|
|
Bug: 397619419
Test: atest FrameworksWifiTests
Flag: EXEMPT bug fix
Change-Id: I4500b5e7b99508b9996e56f89adf863f00e60833
|
|
Bug: 388601492
Test: atest RttServiceImplTest
Flag: EXEMPT bug fix
Change-Id: I2c717f6ebe5afec6546ca89b2834a11d2aaa3ba5
|
|
|
|
Bug: 397619419
Test: Build
Flag: EXEMPT bug fix
Change-Id: Ie0c45836b7b22cf38860657a1436d46bc6b158cd
|
|
Add support for GCMP_128 and CCMP_256. Also rename CCMP_128 to
CCMP and GCMP_128 to GCMP which aligns with wpa_supplicant.
Bug: 397619419
Test: atest FrameworksWifiTests
Flag: EXEMPT bug fix
Change-Id: I1ca01bbc4716708ac9cb749d47af1bdbfa17c724
|
|
|
|
|
|
Bug: 403564439
Test: atest FrameworksWifiApiTests
Flag: EXEMPT bug fix
Change-Id: Ibebbffe7926e160da67e6d03c32427d6a722a44a
|
|
|
|
As build() will change some value back to default
Flag: EXEMPT bugfix
Bug: 402213768
Test: atest FrameworksWifiApiTests
Change-Id: I0e2188a134f29701a73373ec226908e8dcac9a14
|
|
The 11be hotspot requires 11ax due to a dependency.
When 11ax is false, but 11be is configured, it can cause
a hostapd error (e.g., b/378048737). To prevent this,
especially when OEMs might retain invalid SoftApConfigurations
in Settings, we should implement the following protection:
Protection for Android 16 and later.
Automatically force 11be to false when 11ax is false.
Trigger an error for invalid configurations,
preventing changes in the Settings
(this applies only when callers bypass the SDK API,
such as through reflection).
Flag: EXEMPT minor fix
Bug: 401184848
Test: atest -c FrameworksWifiTests
Test: atest -c FrameworksWifiApiTests
Change-Id: I5b4ebc2a3dd82c02bb0f742815e3b13f40444c4c
|
|
|
|
The minimum distance is same as outer threshold of egress geofence. This
can be more than max distance which is same as inner threshold of
ingress geofence i.e. discovery with distance <= max or distance >= min.
Bug: 382583697
Flag: EXEMPT bug fix
Test: atest FrameworksWifiApiTests
Change-Id: I4b8da9315f0c78dcb28707d505ad658878165547
|
|
main
|
|
|
|
* changes:
Add coverage for secure ranging in NetworkDetail
Add coverage for secure ranging in ScanResult
Add coverage for Rsnxe class
Fix RangingResult parcelling
Add unit test for SecureRangingConfig
|
|
is available.
Bug: 365585450
Flag: com.android.wifi.flags.mainline_supplicant
Test: Manual test - verify that the method returns
true under the appropriate conditions
Change-Id: I8c3ac30b2dfa8b9d8aeb2444673b55b3df0f9dd6
|
|
Bug: 397709104
Test: atest com.android.server.wifi.rtt
Flag: EXEMPT bug fix
Change-Id: I775b85765de05a0403705a1720c76fdfbf650ef4
|
|
|
|
Bug: 397619419
Test: atest PasnConfigTest
Flag: EXEMPT bugfix
Change-Id: Ie67917f6ef9b38da4706ce748cf8931b2bd4b45b
|
|
The CL includes,
1. Changes in supporting provision discovery request/response.
2. Generate PIN/Passphrase for DISPLAY methods
Bug: 388057182
Test: Manual - P2P connection via Wi-Fi Direct Window
Test: Manual - NearbyShare file transfer
Test: atest com.android.server.wifi.p2p
Flag: com.android.wifi.flags.wifi_direct_r2
Change-Id: I8512da37349935de253af4811b4ea38bdc8a6fe1
Signed-off-by: Sunil Ravi <sunilravi@google.com>
|
|
Flag: EXEMPT bugfix
Bug: 391440945
Test: compile
Change-Id: I19b4384b653f145f0047c112f5d6c00a19ad42c3
|
|
Use mMldAddress instead of mBssid to display MLD MAC if exist.
Bug: 395521142
Test: Start Dual band SAP on UI
Change-Id: I46181ca0a0e725fd4330310e61b01b330bcf8c3d
|
|
When setPreferSecondarySta is true, the wifi framework will try to use
secondary STA for this connection when possible.
Flag: EXEMPT bugfix
Bug: 391440945
Test: atest android.net.wifi
Test: atest com.android.server.wifi
Change-Id: I3d68c52b66b6ccf389e3e005abfdd026a723827a
|
|
Passpoint-supported APIs." into main
|
|
main
|
|
To match with RADIUS max attribute length which is 253 octets.
Bug: 380887726
Test: atest android.net.wifi.hotspot2.pps.CredentialTest
Flag: EXEMPT bugfix
Change-Id: I18573476a4b927ccb34114394d11bb6ba1548f85
|
|
|
|
P2P, Aware, and Passpoint-supported APIs.
Bug: 369252118
Flag: EXEMPT minor behavior change
Test: Call isP2pSupported from the CTS test
and log the result
Change-Id: I4ff8f868856bb4eee54e65d4297ca207fad9de18
|
|
|
|
As per the Wi-Fi Direct R2 spec, if the P2P connection is established by
using the P2P pairing protocol, the devices shall use IPV6 link local
address as IP address. So set the IP provisioning mode to IPv6
link local in the WifiP2pConfig, so that the P2P service will skip the
DHCP and derive the IPV6 address from the P2P interface address.
Bug: 388057182
Flag: com.android.wifi.flags.wifi_direct_r2
Test: Manual - Basic P2P connect/disconnect tests
Test: TH Presubmit tests
Test: atest com.android.server.wifi.p2p
Change-Id: I232c7c1ac13c3c70e93ce32bbdc67c7562cece37
|
|
Seems lint could not read the flag from the annotation. Also add the
check in the code. Will clean this up when SDK finalized. Also add
suppresslink to bypass link check
Flag: EXEMPT lint fix
Bug: 392855319
Bug: 392958298
Test: build
Change-Id: Ida9bbda1c54b0790d1093f74086c87523e3c33fa
|
|
|
|
Bug: 389750823
Bug: 380517015
Test: atest FrameworksWifiApiTests
Flag: EXEMPT bugfix
Change-Id: I235b096bf5fc7502ce3ca15054110a8c6f061af1
|
|
Considering OEM may like to use one build for all chip solution.
The new overlay about number of supported MLD on SAP mightn't cover
when device didn't support multiple mld. Reading chip capability
when determining the number of supported mld to allow OEM to use
single build for all chip. When chip doesn't support multiple MLD on SAP,
the device will limit the supported MLD to 1.
Flag: com.android.wifi.flags.multiple_mld_on_sap_supported
Bug: 382023801
Test: atest -c FrameworksWifiTests
Change-Id: Ibbde2cc1ab24b2715f750e8d7ecdeaaa6bb80062
|
|
The IEEE 802.11mc standard is only compatible with HE and EHT
technologies when using the 6 GHz band. However, the IEEE 802.11az
standard supports HE and EHT across all Wi-Fi bands (2.4 GHz, 5 GHz, and
6 GHz).
BYPASS_INCLUSIVE_LANGUAGE_REASON=HE refers to High Efficiency.
Flag: EXEMPT bugfix
Bug: 383975447
Test: atest android.net.wifi
Change-Id: I185d3e0e2180849c9c52bc25b409311606738ce9
|
|
Only get the looper when we need it
Flag: EXEMPT refactor
Bug: 385840659
Test: atest android.net.wifi
Change-Id: If16c3a72b3bc4d4d62505706fd8ba4aa9a349eef
|
|
|
|
83274c7424afc98522e9424a49190bdfaebbf296
Change-Id: Id9faac575bb0fd41ce82643939bcec2235f9d8bf
|
|
|
|
|
|
Bug: 383179268
Flag: com.android.ranging.flags.ranging_rtt_enabled
Test: atest FrameworksWifiApiTests
Change-Id: I3771e0be22ab32e0c6f161bc3671ba06692e3e9f
|
|
* changes:
Update feature logging in WifiServiceImpl and add shell command to print the supported features.
Add utility class to format the WifiManager features as a String.
|