summaryrefslogtreecommitdiff
path: root/framework/java
AgeCommit message (Collapse)Author
2025-04-04Update Aware pairing API documentation maheshkkv
Update the API documentation for isAwarePairingSupported() to include details about supporting NAN pairing and all associated Aware R4 security features, as defined in Wi-Fi Aware Specification Version 4.0. Bug: 406503442 Test: Build successfully Flag: DOCS_ONLY (cherry picked from https://googleplex-android-review.googlesource.com/q/commit:8cada2e3f646c7fec48d5ce1c5e13e486a8bc31e) Merged-In: If34941ab44d68f783cd9215eef822d952d9cad55 Change-Id: If34941ab44d68f783cd9215eef822d952d9cad55
2025-03-21Merge "Retrieve the attribution tag and package name when a multicast lock ↵ Gabriel Biren
is acquired." into main
2025-03-21Merge "Fix parsing of CIPHER and AKM for secure ranging" into main Mahesh KKV
2025-03-20Fix parsing of CIPHER and AKM for secure ranging maheshkkv
The capability string, found in scan results, includes encodings for supported AKMs and CIPHERs by the AP. Building secure ranging responder configuration process requires parsing these encodings to populate the PASN configuration with the available AKMs and CIPHERs. Later the best AKM and CIPHER is selected based on the device capability. Also make the CIPHER string for CCMP and GCMP explicitly as CCMP-128 and GCMP-128. Bug: 356734952 Test: atest FrameworksWifiTests Flag: EXEMPT bug fix Change-Id: I47329fe3b81535ac2a8cf4b70f9d4c89cf6aae75
2025-03-20Retrieve the attribution tag and package name Gabriel Biren
when a multicast lock is acquired. This will be used in the next CL for metrics. Bug: 391378901 Flag: EXEMPT minor metrics feature Test: atest WifiManagerTest Test: atest WifiServiceImplTest \ WifiMulticastLockManagerTest Change-Id: Ife2be68dfa8cbabe2cc8cda0fc9993cd46adebb2
2025-03-19Merge "Use ParceledListSlice fix the binder transcation issue" into main Nate Jiang
2025-03-18Use ParceledListSlice fix the binder transcation issue Nate Jiang
Flag: EXEMPT bugfix Bug: 403396045 Test: atest FrameworksWifiApiTests, FrameworksWifiTests Change-Id: Id3b62fee3c2b7d18e8caf5fac64f1c25ef9ac4ba
2025-03-17Fix Secure ranging result processing maheshkkv
Bug: 397619419 Test: atest FrameworksWifiTests Flag: EXEMPT bug fix Change-Id: I4500b5e7b99508b9996e56f89adf863f00e60833
2025-03-17Update pre-shared key for secure ranging maheshkkv
Bug: 388601492 Test: atest RttServiceImplTest Flag: EXEMPT bug fix Change-Id: I2c717f6ebe5afec6546ca89b2834a11d2aaa3ba5
2025-03-14Merge "Fix the cipher usage for PASN" into main Mahesh KKV
2025-03-14Mask the password string for PASN config maheshkkv
Bug: 397619419 Test: Build Flag: EXEMPT bug fix Change-Id: Ie0c45836b7b22cf38860657a1436d46bc6b158cd
2025-03-14Fix the cipher usage for PASN maheshkkv
Add support for GCMP_128 and CCMP_256. Also rename CCMP_128 to CCMP and GCMP_128 to GCMP which aligns with wpa_supplicant. Bug: 397619419 Test: atest FrameworksWifiTests Flag: EXEMPT bug fix Change-Id: I1ca01bbc4716708ac9cb749d47af1bdbfa17c724
2025-03-14Merge "Fix RangingResult#toString() format" into main Mahesh KKV
2025-03-14Merge "Parcel should not change any value" into main Nate Jiang
2025-03-14Fix RangingResult#toString() format maheshkkv
Bug: 403564439 Test: atest FrameworksWifiApiTests Flag: EXEMPT bug fix Change-Id: Ibebbffe7926e160da67e6d03c32427d6a722a44a
2025-03-12Merge "WiFi: Force 11be to false when 11ax is false." into main Yi Shiou (Les) Lee
2025-03-12Parcel should not change any value Nate Jiang
As build() will change some value back to default Flag: EXEMPT bugfix Bug: 402213768 Test: atest FrameworksWifiApiTests Change-Id: I0e2188a134f29701a73373ec226908e8dcac9a14
2025-03-10WiFi: Force 11be to false when 11ax is false. Les Lee
The 11be hotspot requires 11ax due to a dependency. When 11ax is false, but 11be is configured, it can cause a hostapd error (e.g., b/378048737). To prevent this, especially when OEMs might retain invalid SoftApConfigurations in Settings, we should implement the following protection: Protection for Android 16 and later. Automatically force 11be to false when 11ax is false. Trigger an error for invalid configurations, preventing changes in the Settings (this applies only when callers bypass the SDK API, such as through reflection). Flag: EXEMPT minor fix Bug: 401184848 Test: atest -c FrameworksWifiTests Test: atest -c FrameworksWifiApiTests Change-Id: I5b4ebc2a3dd82c02bb0f742815e3b13f40444c4c
2025-03-06Merge "Fix the Aware geofence threshold" into main Treehugger Robot
2025-03-04Fix the Aware geofence threshold maheshkkv
The minimum distance is same as outer threshold of egress geofence. This can be more than max distance which is same as inner threshold of ingress geofence i.e. discovery with distance <= max or distance >= min. Bug: 382583697 Flag: EXEMPT bug fix Test: atest FrameworksWifiApiTests Change-Id: I4b8da9315f0c78dcb28707d505ad658878165547
2025-02-25Merge "Add a method to check whether mainline supplicant is available." into ↵ Treehugger Robot
main
2025-02-20Merge "WFD-R2: Support for provision discovery" into main Sunil Ravi
2025-02-20Merge changes I0c7a5557,I4c835885,I5b6b1db3,I775b8576,Ie128b26f into main Mahesh KKV
* changes: Add coverage for secure ranging in NetworkDetail Add coverage for secure ranging in ScanResult Add coverage for Rsnxe class Fix RangingResult parcelling Add unit test for SecureRangingConfig
2025-02-21Add a method to check whether mainline supplicant Gabriel Biren
is available. Bug: 365585450 Flag: com.android.wifi.flags.mainline_supplicant Test: Manual test - verify that the method returns true under the appropriate conditions Change-Id: I8c3ac30b2dfa8b9d8aeb2444673b55b3df0f9dd6
2025-02-20Fix RangingResult parcelling maheshkkv
Bug: 397709104 Test: atest com.android.server.wifi.rtt Flag: EXEMPT bug fix Change-Id: I775b85765de05a0403705a1720c76fdfbf650ef4
2025-02-19Merge "Fix PasnConfig parcelling" into main Mahesh KKV
2025-02-19Fix PasnConfig parcelling maheshkkv
Bug: 397619419 Test: atest PasnConfigTest Flag: EXEMPT bugfix Change-Id: Ie67917f6ef9b38da4706ce748cf8931b2bd4b45b
2025-02-19WFD-R2: Support for provision discovery Sunil Ravi
The CL includes, 1. Changes in supporting provision discovery request/response. 2. Generate PIN/Passphrase for DISPLAY methods Bug: 388057182 Test: Manual - P2P connection via Wi-Fi Direct Window Test: Manual - NearbyShare file transfer Test: atest com.android.server.wifi.p2p Flag: com.android.wifi.flags.wifi_direct_r2 Change-Id: I8512da37349935de253af4811b4ea38bdc8a6fe1 Signed-off-by: Sunil Ravi <sunilravi@google.com>
2025-02-19Add @UnsupportedAppUsage to @hide API Oscar Shu
Flag: EXEMPT bugfix Bug: 391440945 Test: compile Change-Id: I19b4384b653f145f0047c112f5d6c00a19ad42c3
2025-02-11Wifi: use mMldAddress to display MLD MAC if exist Xin Deng
Use mMldAddress instead of mBssid to display MLD MAC if exist. Bug: 395521142 Test: Start Dual band SAP on UI Change-Id: I46181ca0a0e725fd4330310e61b01b330bcf8c3d
2025-02-07Allow WifiNetworkSpecifier to hint preference to secondary Oscar Shu
When setPreferSecondarySta is true, the wifi framework will try to use secondary STA for this connection when possible. Flag: EXEMPT bugfix Bug: 391440945 Test: atest android.net.wifi Test: atest com.android.server.wifi Change-Id: I3d68c52b66b6ccf389e3e005abfdd026a723827a
2025-02-06Merge "Check both OEM and chip support in the P2P, Aware, and ↵ Gabriel Biren
Passpoint-supported APIs." into main
2025-02-06Merge "Change the max length of username from 63 octets to 253 octets." into ↵ Xiaoying Liu
main
2025-02-06Change the max length of username from 63 octets to 253 octets. xiaoyingliu
To match with RADIUS max attribute length which is 253 octets. Bug: 380887726 Test: atest android.net.wifi.hotspot2.pps.CredentialTest Flag: EXEMPT bugfix Change-Id: I18573476a4b927ccb34114394d11bb6ba1548f85
2025-02-05Merge "Fix RTT preamble based on band and RTT type" into main Mahesh KKV
2025-02-05Check both OEM and chip support in the Gabriel Biren
P2P, Aware, and Passpoint-supported APIs. Bug: 369252118 Flag: EXEMPT minor behavior change Test: Call isP2pSupported from the CTS test and log the result Change-Id: I4ff8f868856bb4eee54e65d4297ca207fad9de18
2025-02-01Merge "WFD-R2: Set IP provisioning mode to IPV6 link local" into main Sunil Ravi
2025-01-30WFD-R2: Set IP provisioning mode to IPV6 link local Sunil Ravi
As per the Wi-Fi Direct R2 spec, if the P2P connection is established by using the P2P pairing protocol, the devices shall use IPV6 link local address as IP address. So set the IP provisioning mode to IPv6 link local in the WifiP2pConfig, so that the P2P service will skip the DHCP and derive the IPV6 address from the P2P interface address. Bug: 388057182 Flag: com.android.wifi.flags.wifi_direct_r2 Test: Manual - Basic P2P connect/disconnect tests Test: TH Presubmit tests Test: atest com.android.server.wifi.p2p Change-Id: I232c7c1ac13c3c70e93ce32bbdc67c7562cece37
2025-01-28Check the flag in the code when using new API Nate Jiang
Seems lint could not read the flag from the annotation. Also add the check in the code. Will clean this up when SDK finalized. Also add suppresslink to bypass link check Flag: EXEMPT lint fix Bug: 392855319 Bug: 392958298 Test: build Change-Id: Ida9bbda1c54b0790d1093f74086c87523e3c33fa
2025-01-15Merge "Fix channel validation logic in USD subscriber" into main Mahesh KKV
2025-01-14Fix channel validation logic in USD subscriber maheshkkv
Bug: 389750823 Bug: 380517015 Test: atest FrameworksWifiApiTests Flag: EXEMPT bugfix Change-Id: I235b096bf5fc7502ce3ca15054110a8c6f061af1
2025-01-12wifi: Check driver capability when determining the number of supported MLD Les Lee
Considering OEM may like to use one build for all chip solution. The new overlay about number of supported MLD on SAP mightn't cover when device didn't support multiple mld. Reading chip capability when determining the number of supported mld to allow OEM to use single build for all chip. When chip doesn't support multiple MLD on SAP, the device will limit the supported MLD to 1. Flag: com.android.wifi.flags.multiple_mld_on_sap_supported Bug: 382023801 Test: atest -c FrameworksWifiTests Change-Id: Ibbde2cc1ab24b2715f750e8d7ecdeaaa6bb80062
2025-01-09Fix RTT preamble based on band and RTT type maheshkkv
The IEEE 802.11mc standard is only compatible with HE and EHT technologies when using the 6 GHz band. However, the IEEE 802.11az standard supports HE and EHT across all Wi-Fi bands (2.4 GHz, 5 GHz, and 6 GHz). BYPASS_INCLUSIVE_LANGUAGE_REASON=HE refers to High Efficiency. Flag: EXEMPT bugfix Bug: 383975447 Test: atest android.net.wifi Change-Id: I185d3e0e2180849c9c52bc25b409311606738ce9
2025-01-07Do not get looper during initialize Nate Jiang
Only get the looper when we need it Flag: EXEMPT refactor Bug: 385840659 Test: atest android.net.wifi Change-Id: If16c3a72b3bc4d4d62505706fd8ba4aa9a349eef
2025-01-03Merge "Revert^2 "[AAPM] Update WEP feature identifier"" into main Hani Kazmi
2025-01-02Revert^2 "[AAPM] Update WEP feature identifier" Hani Kazmi
83274c7424afc98522e9424a49190bdfaebbf296 Change-Id: Id9faac575bb0fd41ce82643939bcec2235f9d8bf
2024-12-30Merge "Address API review comments for NAN periodic ranging" into main Mahesh KKV
2024-12-27Merge "Revert "[AAPM] Update WEP feature identifier"" into main Priyanka Advani (xWF)
2024-12-26Address API review comments for NAN periodic ranging maheshkkv
Bug: 383179268 Flag: com.android.ranging.flags.ranging_rtt_enabled Test: atest FrameworksWifiApiTests Change-Id: I3771e0be22ab32e0c6f161bc3671ba06692e3e9f
2024-12-26Merge changes Id7e5790f,Icd523b35 into main Gabriel Biren
* changes: Update feature logging in WifiServiceImpl and add shell command to print the supported features. Add utility class to format the WifiManager features as a String.