Age | Commit message (Collapse) | Author |
|
|
|
Bug: 274020242
Test: CtsWifiTestCases, launch cvd, m checkbuild
Change-Id: I0ccb8176bb43842529c8d08d4941dd6c742f2b9d
Merged-In: I0ccb8176bb43842529c8d08d4941dd6c742f2b9d
(cherry picked from commit 1d7e56dee59fb1645b343fabfc8023746a5fccc2)
|
|
|
|
Bug: 319669529
Merged-In: Ie6d6540f66a9ed5fb2043909637b51382b198292
Change-Id: I536561ee611c72971701c86a7e30dc7bc29e6432
|
|
Original change: https://android-review.googlesource.com/c/platform/external/wpa_supplicant_8/+/2972836
Change-Id: Ie6d6540f66a9ed5fb2043909637b51382b198292
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
|
|
* changes:
Support loading configs from APEX
Revert apex support from wpa_supplicant
|
|
When wpa_supplicant is in its APEX, it loads configs (overlay/template)
from the APEX. It gets the APEX path from the executable's path.
Bug: 325392832
Test: atest CtsWifiTestCases
Change-Id: Idabbe75cca1d6d9ec987053525ef3b81d2ca6bda
|
|
This is a revert of 1f2ba85e6d4117e16d5132a82c8d775e1c0704a7.
This is a preparation for the follow up change to remove hard-coded
vendor apex name: com.android.wifi.hal.
Bug: 325392832
Test: m wpa_supplicant
Change-Id: I16ec62b0f46b05cbc4e254f12a51a26320b9df30
|
|
Bug: 319669529
Merged-In: Ia6c05d88e711f2a636e4365efcc246bac31b0401
Change-Id: Ibf8f5d7887561c8a8b669a14a68358dfbd9400ce
|
|
APIs." into main
|
|
-s ours am: b095cf4578 -s ours am: d4634f3871 -s ours
am skip reason: Merged-In I53d14bd9e3f02b5ae467a8607229144614692b7c with SHA-1 cdf2037de9 is already in history
Original change: https://android-review.googlesource.com/c/platform/external/wpa_supplicant_8/+/2862948
Change-Id: I747d5973734370867cc44563a23cb0d0f0f39eb5
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
|
|
3e1eb9590d -s ours am: bfb51d6b56 -s ours
am skip reason: Merged-In I53d14bd9e3f02b5ae467a8607229144614692b7c with SHA-1 cdf2037de9 is already in history
Original change: https://android-review.googlesource.com/c/platform/external/wpa_supplicant_8/+/2862948
Change-Id: I4ad4e77d8f5314377fe879d7ee5884416d0b3188
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
|
|
-s ours am: b095cf4578 -s ours
am skip reason: Merged-In I53d14bd9e3f02b5ae467a8607229144614692b7c with SHA-1 cdf2037de9 is already in history
Original change: https://android-review.googlesource.com/c/platform/external/wpa_supplicant_8/+/2862948
Change-Id: I5ca0befe28a15fdd4ea7d198409cd9f6708f3606
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
|
|
3e1eb9590d -s ours
am skip reason: Merged-In I53d14bd9e3f02b5ae467a8607229144614692b7c with SHA-1 cdf2037de9 is already in history
Original change: https://android-review.googlesource.com/c/platform/external/wpa_supplicant_8/+/2862948
Change-Id: I6f9f9f6b96948a1ea4aa6aacae6490fb281d69a3
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
|
|
-s ours
am skip reason: Merged-In I53d14bd9e3f02b5ae467a8607229144614692b7c with SHA-1 cdf2037de9 is already in history
Original change: https://android-review.googlesource.com/c/platform/external/wpa_supplicant_8/+/2862948
Change-Id: I4b025993cccdf7620b1bfef26d812d5f5878f1b6
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
|
|
am skip reason: Merged-In I53d14bd9e3f02b5ae467a8607229144614692b7c with SHA-1 cdf2037de9 is already in history
Original change: https://android-review.googlesource.com/c/platform/external/wpa_supplicant_8/+/2862948
Change-Id: I6a93125dc98f5ce7e996e27b3b5a2ff8b946f855
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
|
|
and connectWithParams." into main
|
|
|
|
Merged-In: I53d14bd9e3f02b5ae467a8607229144614692b7c
Bug: 315507370
Change-Id: I17a39d1e711b7cf5fd6963c54f967c9f205bf923
|
|
for findWithParams and connectWithParams.
Bug: 296069900
Test: atest VtsHalWifiSupplicantP2pIfaceTargetTest
Change-Id: Ia6c05d88e711f2a636e4365efcc246bac31b0401
|
|
into main
|
|
into main
|
|
in the supplicant service.
Bug: 296069900
Test: atest VtsHalWifiSupplicantP2pIfaceTargetTest
Change-Id: Ia9ff7d8a913617ee421fb0fd7115b1eab3df3008
|
|
into main
|
|
ISupplicantStaNetwork#setVendorData.
Full implementation will be provided by
each OEM.
Bug: 296069900
Test: m
Change-Id: I9eaf95e43f88c9e27b4ccaa98483f476b1f9d81d
|
|
Fix conneciton issue seen with 8021x obsolete credential
Supplicant presently doesn't delete the PMKSA for 4way handshake
offload enabled drivers for 8021X cases. This is beacuse there is
no entry present in wpa_supplicant cache as the PMKSA cache add is
triggered only from EAPOL M1 (1/4) packet process context and hence
happens only for supplicant based 4way handshake. This patch invokes
set_pmk API so that a cache entry is made at the supplicant level.
Bug: 310053150
Test: basic security test
Change-Id: I4b2289fcc9366207db60c8e9ed7dbc3a3860dc8a
Signed-off-by: Dennis Jeon <dennis.jeon@broadcom.corp-partner.google.com>
|
|
for the MSCS configuration APIs.
Bug: 300870302
Test: m
Change-Id: I72cdfa84bfd20ad7e6fa5edd1223f604d5590f1a
|
|
|
|
In the trunk-stable model the HAL implementation should be
backward compatible with the wifi mainline module. So call the newer/modified
callback function based on the AIDL interface version.
Added the version check in three event paths,
1. AP-STA-CONNECTED event 2. AP-STA-DISCONNECTED event 3. Provision discovery frame
handler
Bug: 313582342
Bug: 310534969
Test: Ran P2P connection tests between Trunk build (version 2) and next build (version
3). Verfied from the logs that the version is set correctly. Also
verified that the right APIs are called.
Change-Id: I27140e10d37149b632d770124a39d0edd207ba66
|
|
Bug: 308711070
Test: atest VtsHalWifiSupplicantStaNetworkTargetTest
Change-Id: I85cc91a700882f08733fbc0415d5f4f5a312ebc6
|
|
|
|
|
|
Bug: 312033374
Allocated memory for wfd_r2_dev_info when the p2p device was found.
But not freed the memory after notifying the R2 information.
This causes memory leak.
Fixed the issue by freeing the memmory for wfd_r2_dev_info after usage.
Bug: 312033374
Test: Wi-Fi Direct Scan and connection via WiFi-Direct settings window
Change-Id: I70d72c4d76e3ee5f23849de6de7acc9282a30f26
Signed-off-by: jiangpingping <jiangpingping@xiaomi.com>
|
|
|
|
Added group interface name in the notification of provision discovery
frame. A group interface name will be added if the provision discovery
request contains P2P Group ID attribute. i.e., when the Peer device tries
to join the existing P2P group owner.
Bug: 296063280
Test: vts test
Test: Ran P2P negotiated connection tests via Wi-Fi Direct settings
window.
Change-Id: I89c6d64b6d4095ac95cef1fbcd041f7c2dd74647
|
|
|
|
When legacy clients connect to P2P GO, there won't be a
P2P device address in AP-STA-CONNECTED/AP-STA-DISCONNECTED event.
So fill the p2p device address in AP-STA-CONNECTED and AP-STA-DISCONNECTED
events to framework as {0, 0, 0, 0, 0, 0};
Bug: 310969135
Bug: 291202830
Test: Setup P2P auto GO
Connect from a legacy STA to GO
Change-Id: I10e5fb023294d65318ab74de6546eb736dd72258
|
|
of the Hostapd HAL.
Bug: 296069900
Test: m
Change-Id: I5c69302d5cd9bf0de5f0bcebb84d60d4baa96e39
|
|
* changes:
Notify the IP address of connected client
Update supplicant service to use supplicant AIDL V3 interface.
|
|
Original change: https://googleplex-android-review.googlesource.com/c/platform/external/wpa_supplicant_8/+/24117152
Change-Id: I0b3f5005d5ede83b2f1a8d264b623adb4cfcadbf
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
|
|
Original change: https://googleplex-android-review.googlesource.com/c/platform/external/wpa_supplicant_8/+/24117152
Change-Id: I8e35d513d3bd4375efb119a378ec05da8fa4df8d
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
|
|
|
|
When the wpa_supplicant assigns the IP address
(WFA EAPOL IP address allocation feature),
the assigned IP address of the client on the GO side
is notified in the AP-STA-CONNECTED event.
So to obtain the IP info to framework , modified the
AIDL SupplicantP2pIfaceCallback#onStaAuthorized to
include group interface name and the assigned IP of client.
Bug: 291202830
Test: Establish P2P connection and verified from the logs that
the P2P Client IP address is received to framework via new
HAL API.
Change-Id: I5f9f9362d5942c9c29d5dbc020eb93ba7a69ba1a
|
|
Cleanup AKM based checks, in connect path, which are restricted to legacy AKMs
and extend these checks to newer AKMs (SAE-EXT-KEY/SAE-EXT-FT-KEY)
Bug: 289991109
Test: Tested connection to WPA2 AP and confirmed from logs that that two AKMs are
sent to driver in connect command.
Test: EVT platform.
Change-Id: I0910a4fbb0cd39eef174d38e27301ef16a43b74a
Signed-off-by: Mir Ali <mir-khizer.ali@broadcom.corp-partner.google.com>
|
|
Bug: 291202830
Test: Build successfully
Test: Establish P2P connection and verified from the logs that
the P2P Client IP address is received to framework via new
HAL API.
Change-Id: I0905901814ba51f3ba2792d99f5c9514e5303dc0
|
|
|
|
verification fails.
Notification can be sent using the existing
OpenSSL failure callback. See ag/17108489
for more information about the existing
callbacks.
Bug: 296398808
Test: Manual Test
1. Follow the Test Setup Instructions
doc to connect to WPA-Enterprise
using EAP-TTLS.
2. Set all fields correctly, but select
"Use system certificates" for the
CA Certificate field.
3. Check that the expected OpenSSL
failure event is generated.
Change-Id: I6c67240887ad5198c021689fe68f6ad1cd3d114d
|
|
Cleanup AKM based checks, in connect path, which are restricted to legacy AKMs
and extend these checks to newer AKMs (SAE-EXT-KEY/SAE-EXT-FT-KEY)
Bug: 289991109
Test: Tested connection to WPA2 AP and confirmed from logs that that two AKMs are sent to driver in connect command.
Test: Regression test
Change-Id: I0910a4fbb0cd39eef174d38e27301ef16a43b74a
Signed-off-by: Mir Ali <mir-khizer.ali@broadcom.corp-partner.google.com>
|
|
cdf2037de9 am: f303347aef
Original change: https://android-review.googlesource.com/c/platform/external/wpa_supplicant_8/+/2789752
Change-Id: Ib7689680ba252b263d6afc253ebd0edb163cac2e
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
|
|
cdf2037de9
Original change: https://android-review.googlesource.com/c/platform/external/wpa_supplicant_8/+/2789752
Change-Id: Ic9905f7d4c3559ea790e219ec46db25c2243e2c7
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
|