1. 11 Mar, 2013 4 commits
  2. 05 Dec, 2012 1 commit
  3. 06 Nov, 2012 2 commits
  4. 01 Nov, 2012 1 commit
  5. 31 Oct, 2012 3 commits
  6. 30 Oct, 2012 1 commit
  7. 29 Oct, 2012 4 commits
  8. 23 Oct, 2012 3 commits
    • The Android Automerger's avatar
    • Jeff Johnson's avatar
      am b485b188: Add better handling of CTRL-EVENT-ASSOC-REJECT · 03df168d
      Jeff Johnson authored
      * commit 'b485b188':
        Add better handling of CTRL-EVENT-ASSOC-REJECT
      03df168d
    • Jeff Johnson's avatar
      Add better handling of CTRL-EVENT-ASSOC-REJECT · b485b188
      Jeff Johnson authored
      In an enterprise environment a given Access Point (AP) may reject an
      association request due to load balancing.  In an enterprise with a
      congested Wi-Fi network we may have to connect to many APs before we
      find one that will accept the connection.  Currently when the
      wpa_supplicant receives a CTRL-EVENT-ASSOC-REJECT it will continue to
      count down the 10 second authentication timer, and doesn't realize
      that it should now attempt to find a different AP.  Fix this issue in
      multiple ways.  First, we increase the number of association rejects
      we handle before we disable the network.  This will allow us more
      opportunity to authenticate with other APs which are sharing the same
      SSID.  Second, when we are rejected we immediately blacklist the AP
      and rescan so that we can immediately attempt to connect to other APs.
      
      Bug: 7329568
      Change-Id: I0ff66a0e05e6d4a9dec3dea98eccd850ecd5e343
      b485b188
  9. 17 Oct, 2012 6 commits
  10. 15 Oct, 2012 2 commits
  11. 14 Oct, 2012 2 commits
    • Jouni Malinen's avatar
      am 2c5b17df: P2P: Improve robustness against lost ctrl::ack · 532a21e6
      Jouni Malinen authored
      * commit '2c5b17df':
        P2P: Improve robustness against lost ctrl::ack
      532a21e6
    • Jouni Malinen's avatar
      P2P: Improve robustness against lost ctrl::ack · 2c5b17df
      Jouni Malinen authored
      P2P includes two use cases where one of the devices is going to start a
      group and likely change channels immediately after processing a frame.
      This operation may be fast enough to make the device leave the current
      channel before the peer has completed layer 2 retransmission of the
      frame in case the ctrl::ack frame was lost. This can result in the peer
      not getting TX status success notification.
      
      For GO Negotiation Confirm frame, p2p_go_neg_conf_cb() has a workaround
      that ignores the TX status failure and will continue with the group
      formation with the assumption that the peer actually received the frame
      even though we did not receive ctrl::ack. For Invitation Response frame
      to re-invoke a persistent group, no such workaround is used in
      p2p_invitation_resp_cb(). Consequently, TX status failure due to lost
      ctrl::ack frame results in one of the peers not starting the group.
      
      Increase the likelihood of layer 2 retransmission getting acknowledged
      and ctrl::ack being received by waiting a short duration after having
      processed the GO Negotiation Confirm and Invitation Response frames for
      the re-invocation case. For the former, use 20 ms wait since this case
      has been worked around in deployed devices. For the latter, use 50 ms
      wait to get even higher likelihood of getting ctrl::ack through since
      deployed devices (and the current wpa_supplicant implementation) do not
      have a workaround to ignore TX status failure.
      
      20 ms is long enough to include at least couple of retries and that
      should increase likelihood of getting ctrl::ack through quite a bit. The
      longer 50 ms wait is likely to include full set of layer 2 retries.
      
      Bug: 7282991
      Change-Id: If063895046ff42fb52579bfb386281085bedce58
      Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
      2c5b17df
  12. 05 Oct, 2012 3 commits
    • Jouni Malinen's avatar
      P2P: Fix network removal to select correct block · 1cccfe8c
      Jouni Malinen authored
      If wpa_s->current_ssid is not set (e.g., after disconnection that
      did not result in immediate group removal), an incorrect group could
      have been removed since the network block iteration here could select
      the network block that is used to store persistent group credentials.
      Fix this by verifying that disabled != 2 to avoid picking the network
      block that could not have been the temporary P2P group.
      
      Bug: 7290511
      Change-Id: Ia61bab3e11137ab2c0c34014e4d8d8bdee2a0469
      1cccfe8c
    • Jouni Malinen's avatar
      am 9d712833: P2P: Fix network removal to select correct block · fe62849f
      Jouni Malinen authored
      * commit '9d712833':
        P2P: Fix network removal to select correct block
      fe62849f
    • Jouni Malinen's avatar
      P2P: Fix network removal to select correct block · 9d712833
      Jouni Malinen authored
      If wpa_s->current_ssid is not set (e.g., after disconnection that
      did not result in immediate group removal), an incorrect group could
      have been removed since the network block iteration here could select
      the network block that is used to store persistent group credentials.
      Fix this by verifying that disabled != 2 to avoid picking the network
      block that could not have been the temporary P2P group.
      
      Bug: 7290511
      Change-Id: Ia61bab3e11137ab2c0c34014e4d8d8bdee2a0469
      9d712833
  13. 04 Oct, 2012 1 commit
  14. 03 Oct, 2012 2 commits
  15. 27 Sep, 2012 1 commit
  16. 26 Sep, 2012 3 commits
  17. 25 Sep, 2012 1 commit