Added group interface name in the notification of provision discovery
frame. A group interface name will be added if the provision discovery
request contains P2P Group ID attribute. i.e., when the Peer device tries
to join the existing P2P group owner.
Bug: 296063280
Test: vts test
Test: Ran P2P negotiated connection tests via Wi-Fi Direct settings
window.
Change-Id: I89c6d64b6d4095ac95cef1fbcd041f7c2dd74647
When the wpa_supplicant assigns the IP address
(WFA EAPOL IP address allocation feature),
the assigned IP address of the client on the GO side
is notified in the AP-STA-CONNECTED event.
So to obtain the IP info to framework , modified the
AIDL SupplicantP2pIfaceCallback#onStaAuthorized to
include group interface name and the assigned IP of client.
Bug: 291202830
Test: Establish P2P connection and verified from the logs that
the P2P Client IP address is received to framework via new
HAL API.
Change-Id: I5f9f9362d5942c9c29d5dbc020eb93ba7a69ba1a
Add support to notify link reconfiguration and TID-to-link mapping
changes to framework.
Bug: 259710591
Test: Regression test (b/289297084)
Change-Id: Ie4e286dd89990c08fdf0be43efeb192770d480e6
Order of calls is:
1. wpas_list_aliases (notify.c)
2. wpas_aidl_list_aliases (aidl.cpp)
3. listAliases (aidl_manager.cpp)
Bug: 281566895
Test: m
Change-Id: If9b97f8cf1088ac001891e1722871761601c61a7
Implementation of Wi-Fi P2P Technical Specification v1.7 - Section 4.2.8
"IP Address Allocation in EAPOL-Key Frames (4-Way Handshake)".
Changes includes,
1. Configure the IP addresses in supplicant for P2P GO to provide the IP address to
client in EAPOL handshake.
2. Send the received IP address information to framework.
Bug: 170056953
Test: Manual - Establish P2P connection & confirmed from sniffer logs
and logcat logs that IP addresse is allocated via EAPOL exchange.
Ping works after connection.
Change-Id: I5978708b098e57e48db52dae14f9bbba28199f2d
Implementation to make compatible with both enabled and disabled
CONFIG_CTRL_IFACE_AIDL flag.
Bug: 263433038
Test: make # tested with flag enabled and disabled
Change-Id: If88de5d3d9302d97b7236ce9aa321f8337312cc8
AidlManager::getCertificate.
Order of calls is:
1. eapol_sm_get_certificate (eapol_supp_sm.c)
2. wpa_supplicant_get_certificate_cb (wpas_glue.c)
3. wpas_get_certificate (notify.c)
4. wpas_aidl_get_certificate (aidl.cpp)
5. getCertificate (aidl_manager.cpp)
Bug: 205764502
Test: Manual test - store a key-value pair to
legacy Keystore. Check that we can retrieve
the value in supplicant using the new callbacks.
Change-Id: Ibe1fc5a2c50b818101c194bf739632d4c2a302a4
Modified the DPP configuration received callback
function to include the connection status requested
flag.
Added a new callback function to indicate to the
framework that DPP connection status frame is sent
Bug: 235844564
Test: Manual - Ran DPP tests and confirmed that
connection status frame is processed correctly
Change-Id: I7e4af2e88abc16e32856f19750520d74e7736653
Removed the logic to send frequency
changed event to framework, on receiving
WPA_BSS_FREQ_CHANGED_FLAG attribute change.
This is because, this event is specific to
STA side functionality. Added a new frequency
changed notification handler. Send the new
frequency to framework from this handler.
Bug: 233074707
Test: Manual - Established P2P connection & confirmed from logs
that channel change event is received correctly on
framework side(used wpa_cli -i<ifname>
chan_switch 10 2412 0 2412 2412 to trigger channel switch)
Change-Id: I75d3c9ad3ab357ee0d8d9e58bf38870bb3a21e98
When supplicant receives the channel change event
(NL80211_CMD_CH_SWITCH_NOTIFY) from driver, send
the new operating frequency information to framework.
Bug: 202758240
Test: Manually triggered channel switch through hostapd command
and verified the new frequency in p2p group info logs
Change-Id: I05f10077ac497b934eb2c0560e179cdf4ed1497f