1. 31 Oct, 2012 1 commit
  2. 30 Oct, 2012 1 commit
  3. 29 Oct, 2012 6 commits
  4. 23 Oct, 2012 4 commits
  5. 17 Oct, 2012 8 commits
  6. 15 Oct, 2012 3 commits
  7. 14 Oct, 2012 3 commits
    • Jouni Malinen's avatar
      am 532a21e6: am 2c5b17df: P2P: Improve robustness against lost ctrl::ack · 6c59bc14
      Jouni Malinen authored
      * commit '532a21e6':
        P2P: Improve robustness against lost ctrl::ack
      6c59bc14
    • Jouni Malinen's avatar
      am 2c5b17df: P2P: Improve robustness against lost ctrl::ack · 532a21e6
      Jouni Malinen authored
      * commit '2c5b17df':
        P2P: Improve robustness against lost ctrl::ack
      532a21e6
    • Jouni Malinen's avatar
      P2P: Improve robustness against lost ctrl::ack · 2c5b17df
      Jouni Malinen authored
      P2P includes two use cases where one of the devices is going to start a
      group and likely change channels immediately after processing a frame.
      This operation may be fast enough to make the device leave the current
      channel before the peer has completed layer 2 retransmission of the
      frame in case the ctrl::ack frame was lost. This can result in the peer
      not getting TX status success notification.
      
      For GO Negotiation Confirm frame, p2p_go_neg_conf_cb() has a workaround
      that ignores the TX status failure and will continue with the group
      formation with the assumption that the peer actually received the frame
      even though we did not receive ctrl::ack. For Invitation Response frame
      to re-invoke a persistent group, no such workaround is used in
      p2p_invitation_resp_cb(). Consequently, TX status failure due to lost
      ctrl::ack frame results in one of the peers not starting the group.
      
      Increase the likelihood of layer 2 retransmission getting acknowledged
      and ctrl::ack being received by waiting a short duration after having
      processed the GO Negotiation Confirm and Invitation Response frames for
      the re-invocation case. For the former, use 20 ms wait since this case
      has been worked around in deployed devices. For the latter, use 50 ms
      wait to get even higher likelihood of getting ctrl::ack through since
      deployed devices (and the current wpa_supplicant implementation) do not
      have a workaround to ignore TX status failure.
      
      20 ms is long enough to include at least couple of retries and that
      should increase likelihood of getting ctrl::ack through quite a bit. The
      longer 50 ms wait is likely to include full set of layer 2 retries.
      
      Bug: 7282991
      Change-Id: If063895046ff42fb52579bfb386281085bedce58
      Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
      2c5b17df
  8. 09 Oct, 2012 1 commit
  9. 05 Oct, 2012 4 commits
    • Jouni Malinen's avatar
      P2P: Fix network removal to select correct block · 1cccfe8c
      Jouni Malinen authored
      If wpa_s->current_ssid is not set (e.g., after disconnection that
      did not result in immediate group removal), an incorrect group could
      have been removed since the network block iteration here could select
      the network block that is used to store persistent group credentials.
      Fix this by verifying that disabled != 2 to avoid picking the network
      block that could not have been the temporary P2P group.
      
      Bug: 7290511
      Change-Id: Ia61bab3e11137ab2c0c34014e4d8d8bdee2a0469
      1cccfe8c
    • Jouni Malinen's avatar
      am fe62849f: am 9d712833: P2P: Fix network removal to select correct block · 7c5e12ad
      Jouni Malinen authored
      * commit 'fe62849f':
        P2P: Fix network removal to select correct block
      7c5e12ad
    • Jouni Malinen's avatar
      am 9d712833: P2P: Fix network removal to select correct block · fe62849f
      Jouni Malinen authored
      * commit '9d712833':
        P2P: Fix network removal to select correct block
      fe62849f
    • Jouni Malinen's avatar
      P2P: Fix network removal to select correct block · 9d712833
      Jouni Malinen authored
      If wpa_s->current_ssid is not set (e.g., after disconnection that
      did not result in immediate group removal), an incorrect group could
      have been removed since the network block iteration here could select
      the network block that is used to store persistent group credentials.
      Fix this by verifying that disabled != 2 to avoid picking the network
      block that could not have been the temporary P2P group.
      
      Bug: 7290511
      Change-Id: Ia61bab3e11137ab2c0c34014e4d8d8bdee2a0469
      9d712833
  10. 04 Oct, 2012 2 commits
  11. 03 Oct, 2012 5 commits
  12. 28 Sep, 2012 1 commit
  13. 27 Sep, 2012 1 commit