1. 24 May, 2016 1 commit
    • Randy Pan's avatar
      Wifi: local log size reduction · 15941215
      Randy Pan authored
      Cut down the max number of lines allowed in Wifi LocalLogs.
      Currently LocalLog checks the number of lines in its buffer
      instead of total size in number of bytes. The buffer being
      used can grow really big if some lines are lengthy.
      
      Bug: 28865103
      Change-Id: I7f77de1048bb465b79265b3ecb3a925e3a2659d9
      Test: Wifi Framework Unit Tests
      15941215
  2. 23 May, 2016 2 commits
  3. 21 May, 2016 1 commit
  4. 20 May, 2016 6 commits
  5. 19 May, 2016 3 commits
    • Roshan Pius's avatar
      Change clock for time interval/elapsed measurments · ee0ab818
      Roshan Pius authored
      1. Use the clock retrieved from WifiInjector in more modules: QNS,
      Scanner, WifiConfigManager.
      2. Use |elapsedRealtime| for time interval/elapsed measurments. Things
      like scan results, config elements still continue to use
      |currentTimeMillis|
      
      Also,
      1. Had to make |tryEnableQualifiedNetwork| public to prevent mockito from
      calling the real method in WifiConfigManager.
      2. Move keystore also into WifiInjector.
      
      BUG: 28299258
      BUG: 28824635
      Change-Id: I91272aa5665abb741da7530d8920d09c8c5ea41f
      TEST: Compiles & unit-test passes
      ee0ab818
    • mukesh agrawal's avatar
      WifiLogger: fetch packet fate on dump() · 1bf15571
      mukesh agrawal authored
      We've observed that it's tricky to detect when a connection
      fails. Consequently, even if the user is careful to generate
      a bugreport while the device is in the failed state, the
      bugreport will not include packet fate data for the most
      recent connection.
      
      Improve the utility of packet fate, by fetching the most
      recent fate on the call to dump(). With this change in place,
      we'll get packet fates for the most recent connection
      attempt (even if it's still in progress).
      
      BUG=28849396
      TEST=unit tests, manual
      
      Manual test
      - configure bullhead for open network
      - configure bullhead for wpa-2 network, wrong password
      - let bullhead fail connecting to wpa-2 network
      - let bullhead succeed connecting to open network
      $ adb dumpsys > /tmp/dumpsys
      $ grep 'fates ---' /tmp/dumpsys
      --------------------- Last failed connection fates ----------------------
      --------------------- Latest fates ----------------------
      
      Change-Id: Iaeb2584020f70ac5d2f3139bac72ea07a7ddce81
      1bf15571
    • Mukesh Agrawal's avatar
  6. 18 May, 2016 8 commits
  7. 17 May, 2016 12 commits
    • Randy Pan's avatar
      Merge changes from topic 'exponential backoff periodic scan' into nyc-dev · ac90f832
      Randy Pan authored
      * changes:
        WifiConfigManager: clean up makeChannelList()
        WifiStateMachine: clean up dead code
        WifiConnectivityManagerTest: exponential backoff periodic scan
        Restrict connectivty periodic scan
      ac90f832
    • Mitchell Wills's avatar
      Fix crash when scanner gets results that don't match the request · f5cdd8e7
      Mitchell Wills authored
      Before this, when WifiScanningService processed single scan results from
      supplicant that only contained results that did not match a request the
      filter code would return null indicating that the results should not be
      delivered, causing a NPE later. This change updates the meaning of the
      bucket index that the single scan code provides to the filtering code to
      instead force it to always include scan results.
      
      Change-Id: I65cd57b14abacec3f407991188c570601d05ac77
      Fixes: 28794598
      f5cdd8e7
    • TreeHugger Robot's avatar
    • Mukesh Agrawal's avatar
    • Randy Pan's avatar
      WifiConfigManager: clean up makeChannelList() · 304d3451
      Randy Pan authored
      Removed the unused input paramater 'restrict'. Updated its
      callers.
      
      Bug: 28786277
      Change-Id: I44dc870ce3f353698187f76e8996cc77395b17d3
      Tests: Wifi Framework Unit Tests, manual tests
      304d3451
    • Randy Pan's avatar
      WifiStateMachine: clean up dead code · 46604d0d
      Randy Pan authored
      Cleaned up the dead code from the original exponential back off
      scan implementation.
      
      Bug: 28750989
      Bug: 28070598
      
      Change-Id: I8abf82cdaa3530fb514794b4004c5d3f15950672
      Tests: Wifi Unit Tests, manual test
      46604d0d
    • Randy Pan's avatar
      WifiConnectivityManagerTest: exponential backoff periodic scan · b32b649c
      Randy Pan authored
      Add a couple of unit tests to cover the periodic scan exponential
      backoff feature.
      
      Extended MockAlarmManager class such that users can query a
      pending alarm's trigger time.
      
      Bug: 28750989
      Change-Id: I9520477180786fce2937e5fa87f790f60f12a3da
      b32b649c
    • Randy Pan's avatar
      Restrict connectivty periodic scan · ae9e0ef3
      Randy Pan authored
      When the phone screen is on, the periodic scan interval is setup
      in an exponential backoff fashion. Also, if the traffic is higher
      than certain threshold, perform scan on certain channels only
      instead of full band.
      
      Bug: 28627603
      Change-Id: I95b686d7835265d843edac7c005f661393ae5383
      ae9e0ef3
    • Roshan Pius's avatar
      SupplicantScannerImpl: Change PNO scan log location · ab3adbcc
      Roshan Pius authored
      Since PNO scans are started by the PNO debouncer (which debounces PNO state
      change for 5 seconds), the log message stating that we have started PNO
      scan should be moved to the location where the scan is actually started.
      
      This removes the confusion from the logs in the below case:
      05-16 16:51:40.135 D/SupplicantWifiScannerImpl(  876): Change PNO state
      from false to true
      05-16 16:51:42.356 D/SupplicantWifiScannerImpl(  876): Change PNO state
      from true to false
      05-16 16:51:45.109 D/SupplicantWifiScannerImpl(  876): Start PNO timer
      with delay 2247
      05-16 16:51:45.116 D/SupplicantWifiScannerImpl(  876): Starting wifi PNO
      scan
      05-16 16:51:50.111 D/SupplicantWifiScannerImpl(  876): Change PNO state
      from false to true
      05-16 16:51:52.368 D/SupplicantWifiScannerImpl(  876): Change PNO state
      from true to false
      05-16 16:51:55.143 D/SupplicantWifiScannerImpl(  876): Start PNO timer
      with delay 2225
      05-16 16:51:55.148 D/SupplicantWifiScannerImpl(  876): Starting wifi PNO
      scan
      
      BUG: 28800979
      Change-Id: Ib4cc7c59fde83a02a2b938fb334a85f0c046cd87
      ab3adbcc
    • Ningyuan Wang's avatar
      8adf99d6
    • Ningyuan Wang's avatar
      Fix null intent handling · cf731bc4
      Ningyuan Wang authored
      This also fixes the potential crash when handling intent
      with null action string.
      
      BUG=28689719
      TEST=compile
      TEST=runtest frameworks-wifi
      
      Change-Id: I6ef3e07e38f33d8c5040dd358f161224095189d6
      cf731bc4
    • mukesh agrawal's avatar
      packet fate: include status code for auth+associate · 5e550bdc
      mukesh agrawal authored
      During 802.11 authentication, we've seen wpa_supplicant
      report error information that is at odds with
      over-the-air traffic.
      
      For systems that provide packet fate for these early
      frames, we can gather better information about the
      auth process from the frames themselves.
      
      Specifically: we can include the status code in the
      packet fate summary. Make it so.
      
      While there:
      - fix a whitespace issue in parseIeee80211FrameCtrlType()
      - rename frameControlField, since it didn't really hold
        all of the frame control info. (frameControlField
        omitted the frame control flags.)
      - modify some packet fate tests to be less specific about
        expected whitespace; it's too hard to maintain the tests
        when exact whitespace matching is required
      
      BUG=28717266
      TEST=unit tests
      TEST=manual
      
      Manual test
      - configure hostapd to allow zero connections
      - configure bullhead to connect to hostapd
      $ adb shell dumpsys > /tmp/dumpsys
      - verify that packet fate summary shows auth frame with status 17
      
      Change-Id: Ib8742091d0a9acc7fdde0423229d150bf4c1c6d8
      5e550bdc
  8. 16 May, 2016 1 commit
  9. 13 May, 2016 1 commit
  10. 10 May, 2016 3 commits
  11. 09 May, 2016 2 commits
    • Rebecca Silberstein's avatar
      WifiController: set to proper state after SoftAP · 191fa5b4
      Rebecca Silberstein authored
      After receiving a CMD_AP_STOPPED message, WifiController should return
      to the DeviceActive state or the appropriate Idle state.  This CL sets
      the correct pending state and also adds a check for the idle state.
      A test is also added to confirm the DeviceActive state is entered after
      the SoftAp state is completed.
      
      Note: An additional test for the DeviceIdle path will be added at a
      later point after some code refactoring (bug 28669096)
      
      BUG: 28434530
      Change-Id: Ie19e66b9c84ff545a622119890bc7705ebd74c46
      191fa5b4
    • Rebecca Silberstein's avatar
      WifiControllerTest: cleanup style issues · 8ec7811c
      Rebecca Silberstein authored
      Clean up some style issues for WifiControllerTest.
      
      This is in preparation for additional tests being added for the bug fix.
      
      BUG: 28434530
      Change-Id: Idfcc51e2d30753051b9d8e2ec066035f771f0339
      8ec7811c