- 14 Nov, 2012 2 commits
-
-
Kenny Root authored
-
Kenny Root authored
Change-Id: Idfcff5f2799863075160cc6c2565f2fe774c2552
-
- 06 Nov, 2012 3 commits
-
-
The Android Open Source Project authored
* commit 'c0aec062':
-
The Android Open Source Project authored
* commit '930540de': P2P: Fix network removal to select correct block wpa_supplicant: Postpone P2P scan if usual scan is in progress
-
The Android Open Source Project authored
Change-Id: Ibb893211cd723e60db60b80a3da19c58575461e2
-
- 01 Nov, 2012 2 commits
-
-
The Android Open Source Project authored
Change-Id: Id8e9b62ec7d117c1b6bdbeb739be7148f15f31cb
-
The Android Automerger authored
-
- 31 Oct, 2012 5 commits
-
-
Irfan Sheriff authored
* commit 'efb9743f': Increase timeouts for p2p
-
Irfan Sheriff authored
* commit '86c93df1': Increase timeouts for p2p
-
Irfan Sheriff authored
-
The Android Open Source Project authored
Change-Id: I99d44c2e57eba3b98e5d217591968559fa3d1fe3
-
Irfan Sheriff authored
Dongles can be slow to respond and a quick turn around time on packets does not help. Allow for upto 350ms on retry attempts for provision discovery, negotiation and invitation This will catch slow responses within the first attempt and prevent any kind of issues with sequence number handling Bug: 7445415 Change-Id: I88a849d400b10f42ac298bad6d01f49803fcc8ba
-
- 30 Oct, 2012 1 commit
-
-
The Android Automerger authored
-
- 29 Oct, 2012 6 commits
-
-
Sasha Levitskiy authored
* commit 'a27072d9': Add parameter checking and error reporting to wpa_blacklist API.
-
Sasha Levitskiy authored
* commit 'b8fdecbf': Add parameter checking and error reporting to wpa_blacklist API.
-
Sasha Levitskiy authored
Bug: 7423119 Change-Id: Iae85361aa0dc94a75bffd07deef451c85e3d9d96 Signed-off-by:
Sasha Levitskiy <sanek@google.com>
-
Dmitry Shmidt authored
* commit 'd73deeec': wpa_supplicant: Try to reject proper BSSID even if not set by the driver
-
Dmitry Shmidt authored
* commit '54cb0f6f': wpa_supplicant: Try to reject proper BSSID even if not set by the driver
-
Dmitry Shmidt authored
Bug: 7423119 Change-Id: Id0266274c9c60f8eea872ca3cfa5ad40d9180789 Signed-off-by:
Dmitry Shmidt <dimitrysh@google.com>
-
- 23 Oct, 2012 4 commits
-
-
The Android Automerger authored
-
Jeff Johnson authored
* commit '03df168d': Add better handling of CTRL-EVENT-ASSOC-REJECT
-
Jeff Johnson authored
* commit 'b485b188': Add better handling of CTRL-EVENT-ASSOC-REJECT
-
Jeff Johnson authored
In an enterprise environment a given Access Point (AP) may reject an association request due to load balancing. In an enterprise with a congested Wi-Fi network we may have to connect to many APs before we find one that will accept the connection. Currently when the wpa_supplicant receives a CTRL-EVENT-ASSOC-REJECT it will continue to count down the 10 second authentication timer, and doesn't realize that it should now attempt to find a different AP. Fix this issue in multiple ways. First, we increase the number of association rejects we handle before we disable the network. This will allow us more opportunity to authenticate with other APs which are sharing the same SSID. Second, when we are rejected we immediately blacklist the AP and rescan so that we can immediately attempt to connect to other APs. Bug: 7329568 Change-Id: I0ff66a0e05e6d4a9dec3dea98eccd850ecd5e343
-
- 17 Oct, 2012 8 commits
-
-
The Android Automerger authored
-
Jeff Johnson authored
* commit 'a44422be': Support conc_pref when use_p2p_group_interface=0
-
Jeff Johnson authored
* commit '12b1cd9e': Support conc_pref when use_p2p_group_interface=0
-
Jeff Johnson authored
The original implementation of wpas_p2p_handle_frequency_conflicts() only works correctly when P2P groups use a separate interface (i.e. use_p2p_group_interface=1). Update the implementation so that it also works when the device interfaces is used (i.e. use_p2p_group_interface=0). Bug: 7290509 Change-Id: Icbc489125c5b7bd6e174d6aecd53555cdc9ad99d
-
The Android Automerger authored
-
Irfan Sheriff authored
* commit 'f1b71881': Increase channel delay to 100ms
-
Irfan Sheriff authored
* commit '81931b8b': Increase channel delay to 100ms
-
Irfan Sheriff authored
There is an inherent flaw in the p2p protocol design where an ACK loss right before channel switch leads to peers being out of sync. A work around of 50ms was added persistent case, but it turns out in heavy lossy conditions that is not enough. Increase it to 100ms. Experimental evaluation showed 100ms improves the reliability of p2p persistence reinvocation. Bug: 7359500 Change-Id: I73ab1b64e32b87101e95b0e487c90818c2c0aaf3
-
- 15 Oct, 2012 3 commits
-
-
The Android Automerger authored
-
The Android Open Source Project authored
Change-Id: I1253d2b70d2ba5be1771d5824386c8c42bdbdf0f
-
The Android Automerger authored
-
- 14 Oct, 2012 3 commits
-
-
Jouni Malinen authored
* commit '532a21e6': P2P: Improve robustness against lost ctrl::ack
-
Jouni Malinen authored
* commit '2c5b17df': P2P: Improve robustness against lost ctrl::ack
-
Jouni Malinen authored
P2P includes two use cases where one of the devices is going to start a group and likely change channels immediately after processing a frame. This operation may be fast enough to make the device leave the current channel before the peer has completed layer 2 retransmission of the frame in case the ctrl::ack frame was lost. This can result in the peer not getting TX status success notification. For GO Negotiation Confirm frame, p2p_go_neg_conf_cb() has a workaround that ignores the TX status failure and will continue with the group formation with the assumption that the peer actually received the frame even though we did not receive ctrl::ack. For Invitation Response frame to re-invoke a persistent group, no such workaround is used in p2p_invitation_resp_cb(). Consequently, TX status failure due to lost ctrl::ack frame results in one of the peers not starting the group. Increase the likelihood of layer 2 retransmission getting acknowledged and ctrl::ack being received by waiting a short duration after having processed the GO Negotiation Confirm and Invitation Response frames for the re-invocation case. For the former, use 20 ms wait since this case has been worked around in deployed devices. For the latter, use 50 ms wait to get even higher likelihood of getting ctrl::ack through since deployed devices (and the current wpa_supplicant implementation) do not have a workaround to ignore TX status failure. 20 ms is long enough to include at least couple of retries and that should increase likelihood of getting ctrl::ack through quite a bit. The longer 50 ms wait is likely to include full set of layer 2 retries. Bug: 7282991 Change-Id: If063895046ff42fb52579bfb386281085bedce58 Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
-
- 09 Oct, 2012 1 commit
-
-
The Android Open Source Project authored
Change-Id: Ia76fbf94fed108207ae3cb4d53f710f81aa4311f
-
- 05 Oct, 2012 2 commits
-
-
Jouni Malinen authored
If wpa_s->current_ssid is not set (e.g., after disconnection that did not result in immediate group removal), an incorrect group could have been removed since the network block iteration here could select the network block that is used to store persistent group credentials. Fix this by verifying that disabled != 2 to avoid picking the network block that could not have been the temporary P2P group. Bug: 7290511 Change-Id: Ia61bab3e11137ab2c0c34014e4d8d8bdee2a0469
-
Jouni Malinen authored
* commit 'fe62849f': P2P: Fix network removal to select correct block
-