Age | Commit message (Collapse) | Author |
|
Flag: EXEMPT bug fix
Bug: 399885815
Test: atest com.android.server.wifi
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:b8feb0cc861f6071e3d3e5e289ce969237901722)
Merged-In: I1ee7a09b7628a67dcb3502b29d99761bafd913b5
Change-Id: I1ee7a09b7628a67dcb3502b29d99761bafd913b5
|
|
Auto-generated-cl: translation import
Bug: 408276020
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:9d80ea4f6b00e88831c7ceb1d37a0aa2253b108f)
Merged-In: Id37cc6f445a707bd4b192290f9c021f696bd43ac
Change-Id: Id37cc6f445a707bd4b192290f9c021f696bd43ac
|
|
* changes:
Log WifiMulticastLockManager active sessions in WifiMetrics when filtering is re-enabled.
Split addWifiLockActiveSession into separate methods for WifiLockManager and MulticastLockManager.
Log WifiMulticastLockManager acquired sessions in WifiMetrics when locks are released.
|
|
is acquired." into main
|
|
Before triggering the DHCP, clientModeImpl send BLOCK_DISCOVERY
to stop the P2P discovery. And wait for CMD_PRE_DHCP_ACTION_COMPLETE
message back from P2P module. This is done to protect the DHCP exchange.
But if p2p is in a waiting state(Transitioned from Disabled state) for user
response to create the interface, all the messages will be deferred.
So clientModeImpl doesn't get CMD_PRE_DHCP_ACTION_COMPLETE response from P2P module.
This blocks the DHCP when p2p is in waiting state.
A change (Iacf3e35e82c3cf06e9986dba3535a1ac71b4dd88) was added in last year
to prevent BLOCK_DISCOVERY message exchange when P2P is in waiting state.
But that didn't fix the issue. So modified the
logic to, not to send BLOCK_DISCOVER if p2p service is not running.
Bug: 391509308
Test: atest ClientModeImplTest
Flag: EXEMPT bugfix
Change-Id: I65ffa331c5bfeb2c4143c9e21ddc780ee66f36c1
|
|
|
|
* changes:
Implement the remaining USD methods in the framework mainline supplicant wrapper.
Add framework implementations for startUsdPublish and startUsdSubscribe.
|
|
and MulticastLockManager." into main
|
|
in WifiMetrics when filtering is re-enabled.
Bug: 391378901
Flag: EXEMPT minor metrics feature
Test: atest WifiMulticastLockManagerTest
Change-Id: Ie79a3d67bdab271c8d2aba3be20fb60b2b7f2077
|
|
The capability string, found in scan results, includes encodings
for supported AKMs and CIPHERs by the AP. Building secure
ranging responder configuration process requires parsing these
encodings to populate the PASN configuration with the available
AKMs and CIPHERs. Later the best AKM and CIPHER is selected
based on the device capability.
Also make the CIPHER string for CCMP and GCMP explicitly as
CCMP-128 and GCMP-128.
Bug: 356734952
Test: atest FrameworksWifiTests
Flag: EXEMPT bug fix
Change-Id: I47329fe3b81535ac2a8cf4b70f9d4c89cf6aae75
|
|
class." into main
|
|
for WifiLockManager and MulticastLockManager.
Some of the existing logic does not apply to
the metrics for multicast locks.
Also see ag/32466544 where a similar split
was done for the lock acquired method.
Bug: 391378901
Flag: EXEMPT minor metrics feature
Test: atest WifiLockManagerTest WifiMetricsTest
Change-Id: Ia601da87163e5a9d0775569d66dcdc8805438832
|
|
in WifiMetrics when locks are released.
Bug: 391378901
Flag: EXEMPT minor metrics feature
Test: atest WifiInjectorTest \
WifiMulticastLockManagerTest
Change-Id: Ie593dc64d97210b29ca657d3bb5b1254caf5eae2
|
|
framework mainline supplicant wrapper.
Bug: 365585450
Flag: com.android.wifi.flags.mainline_supplicant
Test: atest MainlineSupplicantTest
Change-Id: I9f6e080e919007b0078925fc7dd8e676c199b613
|
|
and startUsdSubscribe.
Bug: 365585450
Flag: com.android.wifi.flags.mainline_supplicant
Test: atest MainlineSupplicantTest
Change-Id: Ie43970729532e3553a5d3470b2941867b3ae0503
|
|
when a multicast lock is acquired.
This will be used in the next CL for metrics.
Bug: 391378901
Flag: EXEMPT minor metrics feature
Test: atest WifiManagerTest
Test: atest WifiServiceImplTest \
WifiMulticastLockManagerTest
Change-Id: Ife2be68dfa8cbabe2cc8cda0fc9993cd46adebb2
|
|
|
|
for WifiLockManager and MulticastLockManager.
Some of the existing logic does not apply to
the metrics for multicast locks.
Bug: 391378901
Flag: EXEMPT minor metrics feature
Test: atest WifiLockManagerTest WifiMetricsTest
Change-Id: I83a9cf064b27677e013c68926fbcbda2a82a8532
|
|
Especailly handle back to back disable/enable cases.
Flag: EXEMPT bugfix
Bug: 393479148
Test: atest com.android.server.wifi
Change-Id: I88cecaa198805d8f8ffadc5d934715eb7c8d7fea
|
|
|
|
|
|
mainline supplicant class.
Bug: 365585450
Flag: com.android.wifi.flags.mainline_supplicant
Test: atest MainlineSupplicantTest
Change-Id: Ic534ec940041b5520f86540a9536c1ea8998f2d8
|
|
And if SAR supported, update during the bootup completed
Flag: EXEMPT bugfix
Bug: 403455814
Test: atest com.android.server.wifi
Change-Id: Icc2336c06fa1832d9428ee6bbc2449331809c4fb
|
|
Flag: EXEMPT bugfix
Bug: 403348813
Test: atest com.android.server.wifi
Change-Id: I348be3a1671bf7cfa67ce9db0be4fadb31bc7900
|
|
|
|
* changes:
Fix secure ranging result flag
Fix Secure ranging result processing
Update pre-shared key for secure ranging
|
|
Flag: EXEMPT bugfix
Bug: 403396045
Test: atest FrameworksWifiApiTests, FrameworksWifiTests
Change-Id: Id3b62fee3c2b7d18e8caf5fac64f1c25ef9ac4ba
|
|
|
|
|
|
Upstream Mockito has deleted the deprecated matchers. Migrates usage to replacements
to unblock upgrade.
Test: m checkbuild
Flag: TEST_ONLY
Bug: 310268946
Change-Id: I2ff49a5857c05632f418157436559a24a1fa4e56
|
|
Set the flag RangingResult#is80211azNtbMeasurement for secure
ranging.
Bug: 397619419
Flag: EXEMPT bug fix
Test: atest WifiRttControllerAidlImplTest
Change-Id: I661de072a27b2ef578a0ff8d870c2f879d6a76ee
|
|
Bug: 397619419
Test: atest FrameworksWifiTests
Flag: EXEMPT bug fix
Change-Id: I4500b5e7b99508b9996e56f89adf863f00e60833
|
|
Bug: 388601492
Test: atest RttServiceImplTest
Flag: EXEMPT bug fix
Change-Id: I2c717f6ebe5afec6546ca89b2834a11d2aaa3ba5
|
|
|
|
|
|
Add support for GCMP_128 and CCMP_256. Also rename CCMP_128 to
CCMP and GCMP_128 to GCMP which aligns with wpa_supplicant.
Bug: 397619419
Test: atest FrameworksWifiTests
Flag: EXEMPT bug fix
Change-Id: I1ca01bbc4716708ac9cb749d47af1bdbfa17c724
|
|
|
|
The connection timeout already handled in the ClientMode
Flag: EXEMPT bugfix
Bug: 401085685
Test: atest com.android.server.wifi
Change-Id: I5c9feed54cebadf68e403632d971744b6e2db8d3
|
|
This is a low priority logging operation that has file IO which is shown
to block the wifi thread and cause ANR on some devices.
Move the File IO to the background thread to prevent the wifi thread
blocking.
Flag: EXEMPT bugfix
Bug: 373418066
Test: atest com.android.server.wifi
Change-Id: I94fa44337ccacd3ba1d4faf35459421c9aee857a
|
|
|
|
Reduce this timeout so that connection retry happen faster when the AP
does not respond to the connection request.
Metrics show that this new timeout already covers 99% tile connections
across all form factors.
Flag: EXEMPT trivial change
Bug: 401085685
Test: atest com.android.server.wifi
Change-Id: Id387e89d3428ccae4607872c0a227a6ef78089dc
|
|
1. Config lab entitlement server for 310950(1187), 311180(1187) and
312670(2119) SIMs.
2. Config prod entitlement server for 313140(2119) SIM.
Bug: 372726667
Test: atest com.android.server.wifi and carrier test
Flag: NONE This feature has been enable for a long time. Carrier wants
to config more SIMs for this feature.
Change-Id: I8cc5164aec71608bf89175d473b8cd3e7a9dc439
|
|
into main
|
|
This should speed up the SSR.
Flag: EXEMPT bugfix
Bug: 398808150
Test: atest com.android.server.wifi
Change-Id: I1fe3e3ffa6c17fe3d6d78c11473142fa0a8d11ac
|
|
mainline supplicant." into main
|
|
|
|
MainlineSupplicantStaIfaceCallback." into main
|
|
it is brought up in mainline supplicant.
Bug: 365585450
Flag: com.android.wifi.flags.mainline_supplicant
Test: atest MainlineSupplicantTest WifiInjectorTest
Change-Id: I5a0ac7ad4ca578056e10a3daf4e8b766cbc21452
|
|
Mockito.verifyZeroInteractions" into main
|
|
|