- 14 Dec, 2014 1 commit
-
-
Prem Kumar authored
-
- 11 Dec, 2014 2 commits
-
-
Vinit Deshpande authored
-
vandwalle authored
Bug:18654243 Change-Id: Ied2fbc87c7effc23fecb68e9863153d63c0cfba4
-
- 10 Dec, 2014 1 commit
-
-
vandwalle authored
Bug:18589301 Change-Id: Ifa2ae05620207798d24e5e196ff522a71fc0fd48
-
- 09 Dec, 2014 1 commit
-
-
Vinit Deshpande authored
An exception is thrown when group creation is deemed failed. It is thrown because an empty peer address is encountered. It is not clear when the address goes empty (there are no logs); but this change would prevent resstarting of the framework. Bug: 18667239 Change-Id: I523646eaa1ff6c8dab9ee99b893ebc4291eee2da
-
- 08 Dec, 2014 1 commit
-
-
Jason Monk authored
-
- 06 Dec, 2014 4 commits
-
-
Prem Kumar authored
* changes: rework scan logic so as to make use of delayed messages instead of scan alarm reenable disabled config after a few minutes
-
Jeff Davidson authored
Merge "- keep track of ephemeral configurations that are deleted by user - make sure we cleaned up prior ephemeral WiFiconfiguration from wpa_supplicant.conf Bug:18525241" into lmp-mr1-dev
-
vandwalle authored
Bug:18594119 Change-Id: I0d49fa2908d824de6adb125cf862de47f8ba5e91
-
vandwalle authored
This change also loose stale user selection which prevents device to re-join potentially reenabled configs Bug:18571727 Change-Id: I0acacd3fb1fbb64a48d0407d7b9e4e5403a93726
-
- 05 Dec, 2014 2 commits
-
-
Jason Monk authored
Allow callers that hold INTERACT_ACROSS_USERS_FULL access to scan results even if they aren't on the current user. Bug: 16559573 Change-Id: I27fae71b3cdc1c084777242f21fe4bb692ab7135
-
vandwalle authored
- make sure we cleaned up prior ephemeral WiFiconfiguration from wpa_supplicant.conf Bug:18525241 Change-Id: I773cb9b28fe139d1cd5df622619b4a9cf866d6ce
-
- 04 Dec, 2014 1 commit
-
-
Vinit Deshpande authored
This change uses list_network last_id=x form of list_networks to retrieve all networks saved in the system. Bug: 18566264 Change-Id: Ie439acd98d39ca32417418944035dcce3068d44b
-
- 02 Dec, 2014 1 commit
-
-
Vinit Deshpande authored
-
- 01 Dec, 2014 2 commits
-
-
Dianne Hackborn authored
...(512KB RAM, 10K objects) Pull this back to 300 entries on Svelte devices... we also need to reduce this on non-Svelte devices, but at least right now we desperately need it fixed on Svelte. Change-Id: I301bf8a4637c066166a5a69c178d581c072b8dc5
-
Vinit Deshpande authored
Bug: 18245283 Change-Id: Ie844353bffcf40baa4db8cad2c18dcc5ffaf5a82
-
- 26 Nov, 2014 2 commits
- 25 Nov, 2014 2 commits
- 20 Nov, 2014 1 commit
-
-
Jeff Davidson authored
-
- 19 Nov, 2014 1 commit
-
-
vandwalle authored
Bug:18451553 Change-Id: I729ae360209e852e4e64bed0c584ed076b1281b4
-
- 18 Nov, 2014 1 commit
-
-
Vinit Deshpande authored
Bug: 17397676 Change-Id: I0356c363b90a40a9f9424cf9c50e0d9f1c370414
-
- 15 Nov, 2014 3 commits
-
-
Vinit Deshpande authored
-
Vinit Deshpande authored
-
Vinit Deshpande authored
* changes: Handle bad WifiHAL implementation Don't allow SCAN_REQUEST broadcast to launch apps
-
- 14 Nov, 2014 2 commits
-
-
Jeff Davidson authored
Connections to these networks should only be managed by auto-join. If we enable these configs then it is possible that the supplicant brings up an unwanted ephemeral connection that auto-join will immediately discard, which is wasteful. Bug: 18389875 Change-Id: I0d3a9a35542eda71401920c0b600dcd2b1e134ba
-
vandwalle authored
-
- 13 Nov, 2014 2 commits
-
-
vandwalle authored
Change-Id: Icc3bcb37d181e6f28673808d5c3239d18c6a482f
-
Jeff Davidson authored
Bug: 18221007 Change-Id: Idb526b1f275100ab2a004e7923a032f2e98db6de
-
- 12 Nov, 2014 5 commits
-
-
vandwalle authored
- trigger a scan when changing settings allowing use of untrusted networks Bug:18221007 Bug:18269621 Change-Id: I7eec8913737726a1bf468a96eae562cc567ecfd3
-
Vinit Deshpande authored
This change fixes a bug in Wifi state machine - it unintentionally enables all the networks and results in connecting to a network that may not have been chosen by AutoJoinController. Bug: 18266514 Change-Id: I0d5d274819194c0eea4f3812d506a92899f3eb54
-
Vinit Deshpande authored
wifi_initialize() may succeed even without any wlan. This crashes the framework. This change handles such inconsistencies. Bug: 18337642 Change-Id: I578e0d92ea6b981a1d61469a0f4e870d87843107
-
Vinit Deshpande authored
This change sets the package to Wifi package for all the timer broadcasts it schedules. This way, the alarm manager won't wake up any other apps. Bug: 17611296 Change-Id: I248695b2c4763c799b730a236945e91757dfde16
-
vandwalle authored
Merge "dont blacklist wifi config that have had validated internet status in the past" into lmp-mr1-dev
-
- 10 Nov, 2014 1 commit
-
-
vandwalle authored
Change-Id: I4498888ffb1d3189204a553462ff4342239ed2af
-
- 06 Nov, 2014 2 commits
-
-
Jeff Davidson authored
Treat Byte#MIN_VALUE equivalently to a null score curve. This allows a scorer to define an RSSI threshold below which a network should not be used. Currently, any non-null score curve will result in us connecting to a given network regardless of RSSI. Also, instead of applying a hard-coded dBm boost to the currently active network, make use of the boost specified in the RSSI curve itself, allowing the scorer to fine-tune this boost. Bug: 15432594 Change-Id: I7a8f5f68ef074827d4b1cfbbed0841448498f179
-
Jeff Davidson authored
-
- 05 Nov, 2014 1 commit
-
-
Jeff Davidson authored
When the user requests to connect to a network which already has an untrusted config, we update the existing config and clear the ephemeral bit rather than creating a new config. We also maintain the current connection if that ephemeral config matches the currently connected configuration, and merely tell the system that the network is now trusted. The above also applies for AUTO_JOIN_DELETED networks, which are similarly filtered out from the list of WifiConfigurations. Bug: 18206275 Change-Id: I1dff7e3c073888c619e6a5c3a40295a44b12e403
-
- 04 Nov, 2014 1 commit
-
-
vandwalle authored
-