Disregard auth failure events during WPS connection. The EAP sequence is
retried several times, and there might be failures (especially for wps pin).
We will get a WPS_XXX event at the end of the sequence anyway.
Without this change, the SupplicantStateTracker class will disable
the WPS network we are connecting to after 2 failed authentication events.
Then, even if WPS succeeds, we will never connect to the selected network.
Change-Id: I57c8e508bfd738405b7f2c2c2325df7838e1b4af
Signed-off-by: Arik Nemtsov <arik@wizery.com>
Signed-off-by: Vishal Mahaveer <vishalm@ti.com>
With b/6979211 fixed, we can reinstate timestamps.
This reverts commit 578531082b8e8c8aa03868e69591b7613b0e8b8e
Change-Id: I5dffc8d9701004f7c6325f21e1e33d1cdd2d05c0
The new WiFi watchdog requires kernel/driver to export some packet loss
counters. This CTS tests whether those counters are correctly exported.
Change-Id: I41999676f8488e86f35f1f8214ce668f1a2b5638
Temporarily reverting this until all devices switch to using wpa_supplicant_8.
This reverts commit b31f78f93768fef269617ec788a5c6655a375f80.
Change-Id: I33fcb8415288d95289dcd46fa71e950e0f2b87ec
Signed-off-by: Iliyan Malchev <malchev@google.com>
Propogate 802.11 tsf details per scan result to the applications
and open up hidden access points
BUg: 2961159
Change-Id: I05658fd0cf010c0b36193db3f79422640e8b3a6b
Sometimes IllegalArgumantException can happen in constructor of ArpPeer
class when IPv6 address is provided. This causes crash of systemserver.
Fixing it by adding appropriate exception handler
Change-Id: I4bb7bbca790745a1bf56ece96dd91b84b1f70cad
Signed-off-by: Andrii Beregovenko <a.beregovenko@ti.com>
Signed-off-by: Vishal Mahaveer <vishalm@ti.com>
- use packet loss (wlutil pktcnt) instead of frame loss, retune all parameters
- use wpa_supplicant to get packet loss counters, instead of netd
- handle BSSID roaming in all situations
- improve flapping avoidance mechanism by setting different target RSSI
- handle high packet loss in high RSSI (never seen in real testing)
- add more comments on how to set all parameters
Signed-off-by yuhaozheng@google.com
Change-Id: I33429f063d8625a458be4791edd83a86d5a723df
During WPS, EAP failure occurs many times due to searching
external registrar. EAP failure can also occur after WPS-success.
WPS failures are handled through seperate events, ignore auth failures.
Change-Id: I6a051398d306250510536d157bf812b5a434c84b
Signed-off-by: Irfan Sheriff <isheriff@google.com>
Signed-off-by: Yoshihiko Ikenaga <yoshihiko.ikenaga@jp.sony.com>
Make StateMachine#quit non-conditional and remove the need to
process the SM_QUIT_CMD it is now private.
Rename halting to onHalting.
Add onQuitting
Change the message specific logging to be more generic and change
the xxxProcessedMessagesYyy methods to xxxLogRecXyy names. Also add
addLogRec(String) and addLogRec(String, State) as the generic logging
methods.
bug: 5678189
Change-Id: I22f66d11828bfd70498db625fe1be728b90478b7
Conflicts:
services/java/com/android/server/NsdService.java
We need to get the latest group capability information before connect
now that the supplicant behavior is to do a delayed cleanup.
Bug: 6613470
Change-Id: Ie374d750950f3bd4376fd6a767bb253fd7986eb1
Make StateMachine#quit non-conditional and remove the need to
process the SM_QUIT_CMD it is now private.
Rename halting to onHalting.
Add onQuitting
Change the message specific logging to be more generic and change
the xxxProcessedMessagesYyy methods to xxxLogRecXyy names. Also add
addLogRec(String) and addLogRec(String, State) as the generic logging
methods.
bug: 5678189
Change-Id: I22f66d11828bfd70498db625fe1be728b90478b7
With join taking much longer, sometimes device can be lost from supplicant.
Retain device to complete connection.
Also, clear up stale peer data after find stops during inactive state.
Bug: 6557725
Change-Id: I15b92e50a837481f974034b1ea7b32c8abee969e
Use a wake up alarm to ensure delayed shut down message is sent
Bug: 5926285
Change-Id: I26a3353ddabb17d55299d8b5f9faf4c7ef5b2448
Signed-off-by: Vishal Mahaveer <vishalm@ti.com>
A driver start can fail and device can stay stuck in that state.
Add a work around to retry once after a period of time and then
reload wifi if that does not work.
Bug: 6005966
Change-Id: I930554ac96ac25da2a38e49630d375656e32f6f6
- BSS command is unreliable, use group owner information from p2p_find
- Fix the autonomousgroup settings
- Use group idle settings only on the p2p group interface to avoid group idle
resulting group formation failures
Bug: 6426991
Change-Id: I44fc204775580fb4fec6ce27070ddbde0751b495
This constant indicates what should be sent when a wpa_supplicant's
engine field should be marked as "disable."
Bug: 6480500
Change-Id: Ic963eff4b2ae1496f06e23f80514bf530767c568