1. 11 Mar, 2013 1 commit
  2. 01 Nov, 2012 1 commit
  3. 31 Oct, 2012 2 commits
    • Irfan Sheriff's avatar
      86c93df1
    • Irfan Sheriff's avatar
      Increase timeouts for p2p · 1a2ce111
      Irfan Sheriff authored
      Dongles can be slow to respond and a quick turn around time on packets does not help.
      Allow for upto 350ms on retry attempts for provision discovery, negotiation and invitation
      
      This will catch slow responses within the first attempt and prevent any kind of issues
      with sequence number handling
      
      Bug: 7445415
      Change-Id: I88a849d400b10f42ac298bad6d01f49803fcc8ba
      1a2ce111
  4. 30 Oct, 2012 1 commit
  5. 29 Oct, 2012 2 commits
  6. 23 Oct, 2012 2 commits
    • The Android Automerger's avatar
    • Jeff Johnson's avatar
      Add better handling of CTRL-EVENT-ASSOC-REJECT · b485b188
      Jeff Johnson authored
      In an enterprise environment a given Access Point (AP) may reject an
      association request due to load balancing.  In an enterprise with a
      congested Wi-Fi network we may have to connect to many APs before we
      find one that will accept the connection.  Currently when the
      wpa_supplicant receives a CTRL-EVENT-ASSOC-REJECT it will continue to
      count down the 10 second authentication timer, and doesn't realize
      that it should now attempt to find a different AP.  Fix this issue in
      multiple ways.  First, we increase the number of association rejects
      we handle before we disable the network.  This will allow us more
      opportunity to authenticate with other APs which are sharing the same
      SSID.  Second, when we are rejected we immediately blacklist the AP
      and rescan so that we can immediately attempt to connect to other APs.
      
      Bug: 7329568
      Change-Id: I0ff66a0e05e6d4a9dec3dea98eccd850ecd5e343
      b485b188
  7. 17 Oct, 2012 4 commits
  8. 15 Oct, 2012 1 commit
  9. 14 Oct, 2012 1 commit
    • Jouni Malinen's avatar
      P2P: Improve robustness against lost ctrl::ack · 2c5b17df
      Jouni Malinen authored
      P2P includes two use cases where one of the devices is going to start a
      group and likely change channels immediately after processing a frame.
      This operation may be fast enough to make the device leave the current
      channel before the peer has completed layer 2 retransmission of the
      frame in case the ctrl::ack frame was lost. This can result in the peer
      not getting TX status success notification.
      
      For GO Negotiation Confirm frame, p2p_go_neg_conf_cb() has a workaround
      that ignores the TX status failure and will continue with the group
      formation with the assumption that the peer actually received the frame
      even though we did not receive ctrl::ack. For Invitation Response frame
      to re-invoke a persistent group, no such workaround is used in
      p2p_invitation_resp_cb(). Consequently, TX status failure due to lost
      ctrl::ack frame results in one of the peers not starting the group.
      
      Increase the likelihood of layer 2 retransmission getting acknowledged
      and ctrl::ack being received by waiting a short duration after having
      processed the GO Negotiation Confirm and Invitation Response frames for
      the re-invocation case. For the former, use 20 ms wait since this case
      has been worked around in deployed devices. For the latter, use 50 ms
      wait to get even higher likelihood of getting ctrl::ack through since
      deployed devices (and the current wpa_supplicant implementation) do not
      have a workaround to ignore TX status failure.
      
      20 ms is long enough to include at least couple of retries and that
      should increase likelihood of getting ctrl::ack through quite a bit. The
      longer 50 ms wait is likely to include full set of layer 2 retries.
      
      Bug: 7282991
      Change-Id: If063895046ff42fb52579bfb386281085bedce58
      Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
      2c5b17df
  10. 05 Oct, 2012 2 commits
    • Jouni Malinen's avatar
      P2P: Fix network removal to select correct block · 1cccfe8c
      Jouni Malinen authored
      If wpa_s->current_ssid is not set (e.g., after disconnection that
      did not result in immediate group removal), an incorrect group could
      have been removed since the network block iteration here could select
      the network block that is used to store persistent group credentials.
      Fix this by verifying that disabled != 2 to avoid picking the network
      block that could not have been the temporary P2P group.
      
      Bug: 7290511
      Change-Id: Ia61bab3e11137ab2c0c34014e4d8d8bdee2a0469
      1cccfe8c
    • Jouni Malinen's avatar
      P2P: Fix network removal to select correct block · 9d712833
      Jouni Malinen authored
      If wpa_s->current_ssid is not set (e.g., after disconnection that
      did not result in immediate group removal), an incorrect group could
      have been removed since the network block iteration here could select
      the network block that is used to store persistent group credentials.
      Fix this by verifying that disabled != 2 to avoid picking the network
      block that could not have been the temporary P2P group.
      
      Bug: 7290511
      Change-Id: Ia61bab3e11137ab2c0c34014e4d8d8bdee2a0469
      9d712833
  11. 04 Oct, 2012 1 commit
  12. 03 Oct, 2012 1 commit
    • Jouni Malinen's avatar
      P2P: Fix p2p_cancel processing during group formation · adddfc48
      Jouni Malinen authored
      
      The wpa_s->p2p_in_provisioning flag did not get cleared in some cases
      where p2p_cancel command is used to stop group formation. This can result
      in some operations (like p2p_find) failing afterwards. Fix this by using
      wpas_group_formation_completed() when processing p2p_cancel for a group
      that has not yet completed group formation.
      
      Bug: 7280743
      Change-Id: I2dea935bd7c0509237de54bd048954f75ce80bfc
      Signed-off-by: default avatarJouni Malinen <jouni@qca.qualcomm.com>
      adddfc48
  13. 27 Sep, 2012 1 commit
  14. 26 Sep, 2012 2 commits
  15. 25 Sep, 2012 2 commits
  16. 24 Sep, 2012 5 commits
    • Dmitry Shmidt's avatar
      wpa_supplicant: P2P-related fixes · aa532510
      Dmitry Shmidt authored
      
      - Remove unused function warning in WPS-NFC case
      - P2P: Fix p2p_ctrl_invite_persistent to parse peer parameter
      - hostapd: Fix CONFIG_INTERWORKING=y build without CONFIG_HS20=y
      - hostapd: Fix WDS VLAN bridge handling
      - hostapd: Send EAPOL frames from the VO queue if WMM is active
      - P2P: Remove channel 14 from supported P2P channels
      - hostapd: Clear WLAN_STA_ASSOC_REQ_OK if sending the assoc response failed
      - hostapd: Add check for the wds sta flag before creating 4addr VLANs
      - nl80211: Use the monitor interface if socket tx status is not supported
      - wpa_supplicant: Set state to DISCONNECTED on AP creation errors
      - P2P: Fix p2p_group_idle in no-group-interface P2P client case
      - P2P: Fix PSK configuration for GO network
      - Print control interface commands in easier format
      - Add debug print for no enabled networks case
      - P2P: Add more debug prints for GO start routines
      - P2P: Fix pending sta scan processing for concurrent operation cases
      
      BUG: 6940646
      Change-Id: I1b1c54a08c61ec4af2bfd2274afc93501004eea2
      Signed-off-by: default avatarDmitry Shmidt <dimitrysh@google.com>
      aa532510
    • The Android Automerger's avatar
    • Irfan Sheriff's avatar
      Fix build: Add ANDROID_P2P for SCC interop fixes · f0619665
      Irfan Sheriff authored
      Change-Id: I847b63428b47016cf9a9a0b090636e1d5b9d28b8
      f0619665
    • The Android Automerger's avatar
    • Irfan Sheriff's avatar
      GC channel fixes for better interop with SCC · af84a575
      Irfan Sheriff authored
      - Force operating channel as the only channel in channel list attribute for go negotiation
      and persistence
      - Force an operating channel in go negotiation response even if the GO indicates a different
      in negotiation request
      - Fix a bug with updating peer operating channel based on GO negotiation confirm
      
      Bug: 7217600
      Change-Id: I6da0dc1a49c1d99ae97dcab8ee9899e07a80a6cb
      af84a575
  17. 16 Sep, 2012 1 commit
  18. 14 Sep, 2012 7 commits
  19. 13 Sep, 2012 3 commits