We should only run the vts which claim is supported.
Bug: 140172237
Test: atest VtsHalWifiHostapdV1_2TargetTest
Change-Id: If0b1d9f0a73bd171621299dab7828a9caf928a7a
This commit adds a new parameter to the channel parameters for IHostapd
Hidl interface to handle a list of channel freq in MHz to be used in
ACS. This is needed as part of support of Wifi 6GHz band since 6GHz band
channels use same channel numbers as 2.4/5GHz bands.
Bug: 146186687
Bug: 139354972
Test: Manual
Test: VTS test
Change-Id: I8692f3cd28cfaae1d3b870c9f8dbcdd2ff350ee4
This commit adds the 802.11ax parameters for SoftAp.
Bug: 141831296
Test: atest VtsHalWifiHostapdV1_2TargetTest
Change-Id: I7258c10c5dda040e6e05c1a8ec595072017e3ace
This commit fixes VTS tests in VtsHalWifiHostapdV1_1TargetTest
resulting from upgrading APIs and stopping support for old APIs.
Bug: 147006566
Test: atest VtsHalWifiHostapdV1_1TargetTest
Change-Id: Ia6be7f08c160ef3b0478630193fb6a39e774e109
This commit adds changes needed to support the 6GHz band to
SoftAP.
Bug: 139354972
Test: Manual
Test: VTS test
Change-Id: Ib4e14facc7cbb54ba89ecf07e75df8dceacb361f
If driver doesn't support the hotspot ACS feature.
It will cause ACS relate vts testcase failure.
Temp disable the vts test case and file b/140172237 to fix in R.
Bug: 135975451
Test: build - make vts
Test: atest VtsHalWifiHostapdV1_1Target / atest VtsHalWifiHostapdV1_0Target
Test: vts-tradefed run commandAndExit vts-hal --skip-all-system-status-check \
--primary-abi-only --skip-preconditions --module \
VtsHalWifiHostapdV1_0Target -l INFO
vts-tradefed run commandAndExit vts-hal --skip-all-system-status-check \
--primary-abi-only --skip-preconditions --module \
VtsHalWifiHostapdV1_1Target -l INFO
Change-Id: I489d5f5c54f37f3603128e127a6c8b1ee62390d3
From the log and case logic,when assertTrue isSupplicantRunning is not the real wpa_supplicant status.
So occasionally there will be a timeout when waiting for a callback in the waitForHidlService method.
Because this is a low memory version and it is gsi image, we can't modify the image, so we can solve it by extending the time.
Bug:[142585026]
Test:run vts of the VtsHalWifiSupplicantV1_2Host.
Change-Id: Ideef032d310165d956c3ca0967b26bc3e3f44c3b
libcrypto is unused, which causes problems when boringssl hash
injection is turned on as the code is all stripped and there is
nothing left to inject the hash into.
Bug: 137267623
Test: Ran the following together with the changes from
http://r.android.com/q/topic:bug137267623_bsslselftest
m VtsHalDrmV1_{0,1,2}TargetTest \
VtsHalWifiHostapdV1_{0,1}TargetTest{,Util} \
VtsHalWifiSupplicantV1_{0,1,2}TargetTest{,Util} \
VtsHalWifiSupplicantP2pV1_{0,2}TargetTest
(croot hardware/interfaces/confirmationui ; mma)
(croot hardware/interfaces/drm ; mma)
(croot hardware/interfaces/keymaster ; mma)
Change-Id: Ib0607671ef71d99becb483774f810aad9762f4f1
Changes to the VTS test to support OEM's who use a separate
dedicated SAP interface.
Note: This is a VTS test change only. The default implementation does
not still support a dedicated SAP interface (OEM's can obviously
customize the default implementation for their devices).
Bug: 136645414
Test: None (verified by partner OEM)
Change-Id: I42b87bf90cfa90c7c218309164ab2b77f3685f9e
hidl-generated makefiles are now generated such that bpfmt(file) == file.
Bug: 67417008
Test: enable bpfmt hook
Change-Id: I53e5bf67a0d314e1b10c0ba0c7172a7af358ddcc
If wpa_supplicant is running during hostapd vts and there are some
configuration in wpa_supplicant. It will happen both of hostapd and
wpa_supplicant are working with wlan0 interface.
Stop wpa_supplicant before running hostapd vts.
Reproduce step:
1. Connect to Wifi before execute hostapd vts.
2. Run hostapd vts.
Bug: 130207248
Test: vts with below commands
vts-tradefed run commandAndExit vts-hal --skip-all-system-status-check --primary-abi-only --skip-preconditions --module VtsHalWifiHostapdV1_0Target -l INFO
vts-tradefed run commandAndExit vts-hal --skip-all-system-status-check --primary-abi-only --skip-preconditions --module VtsHalWifiHostapdV1_1Target -l INFO
Change-Id: Id91463c2eab3c8c348a91bd978d7ea4aa8d42e85
hidl-generated makefiles are now generated such that bpfmt(file) == file.
Bug: 67417008
Test: enable bpfmt hook
Change-Id: I1f69d292bc23a7cc293a66110cb02d597e1019ad
This will be used to restrict channels selected by ACS.
Bug: 116839455
Test: no build errors
Signed-off-by: Daichi Ueura <daichi.ueura@sony.com>
Change-Id: I80eb81e2b13256abef41985d90c47096f6adedfd
(cherry-picked from 4ecb3b1b78d1b5b521dcc643a5c251390cc3644f)
Adding a callback object to indicate asynchronous events back to
framework. Only a failure indication method is added currently.
Also, Uprev the hostapd interface to 1.1.
Bug: 112705137
Test: Compiles
Change-Id: Ib885001e68734caa5ff192721f618010c125e4b7
This HIDL API is meant to terminate the HIDL service. On Pixel devices,
terminate will trigger the death of the corresponding daemon.
But, other OEM's may choose to do something else.
Bug: 71613595
Bug: 71613528
Test: Ran the VTS tests
Change-Id: I737458b5c49ecd5545be0dc7033092db9a35b089
These will be used to bring down the HIDL services (i.e kill the daemon)
when they're no longer needed.
Bug: 72394251
Test: ./hardware/interfaces/update-makefiles.sh
Change-Id: I99189efa6770ee5a1f1c8379598a9414d99bfe66
The HIDL interface exposes 2 methods:
1) addAccessPoint - Starts an access point on the specified interface
with params.
2) removeAccessPoint - Removes a previously started access point.
Bug: 36646171
Test: Compiles
Change-Id: I020f25a74f505e7fa4cfdfc25efb512456021877