- Mar 14, 2023
-
-
Mohannad Farrag authored
* Remove the python3 calls and replace them with the binary right away. * Fix action_foreach where sources can be used with {{source_file_name}} Test: None Change-Id: I0c2e6fd5135de70339168b9ba5d3b7f3a6866fdc
-
Mohannad Farrag authored
Apply https://chromium-review.googlesource.com/c/chromium/src/+/4166159 Test: None Change-Id: I297718dddd86a838367e86b8a0449d23114439b6
-
Mohannad Farrag authored
This reverts commit 379d79d1. Reason for revert: This is breaking the symbols of test library. Test: None Change-Id: I3a2e8a9a6ec6ce04038ed34489ece6a1ca053cef
-
Treehugger Robot authored
-
Wayne Ma authored
-
Treehugger Robot authored
-
Remi NGUYEN VAN authored
-
Motomu Utsumi authored
For manual Android.bp change in aosp/2475845 Bug: 265674359 Test: ./update_results.sh Change-Id: Ie94708167479a67a52bbc1c7fd629a8206585cfd
-
Wayne Ma authored
Test: atest TetheringMetricsTest Change-Id: Ic44f47460342300164fa6ad5c928a850ba28d1fb
-
Maciej Żenczykowski authored
-
Chiachang Wang authored
-
Maciej Żenczykowski authored
This switches incoming packets from L3 to L2, ie. they now include the ethernet header for non-rawip cases (like wifi) Note: depends on userspace clatd change to offset packet processing index by tpacket_auxdata->tp_net L3 header offset, an increase in the read buffer size, and on change to use IPv6 header relative cBPF for ingress packet filtering! Test: TreeHugger, atest libclat_test, ping 1.1.1.1 on v6-only wifi Bug: 265591307 Signed-off-by:
Maciej Żenczykowski <maze@google.com> Change-Id: Ie5893d18b0dd796751f95150680a0d4cd5f64c3c
-
- Mar 13, 2023
-
-
Stefano Duo authored
Use a more expressive always_disable function to disable unneeded third_party dependencies. Test: Android.bp.swp output is equivalent Change-Id: Ib21646dfa076fc6f745b7871851744d6ed18eaf3
-
Stefano Duo authored
Due to AOSP's FIPS requirements, AOSP-Cronet's BoringSSL must be built differently than Chromium-Cronet's BoringSSL. The downstream way of building BoringSSL is manually mantained in //external/cronet/third_party/boringssl. So, whenever a target depends on upstream's boringssl translate that to the downstream custom target. Test: m && CtsNetHttpTestCases Change-Id: I34a69de79397c35358745388be433934c203d2b2
-
Stefano Duo authored
Test: m && atest CtsNetHttpTestCases Change-Id: I3c28a52d60128cf4324eda436c1f6e9fa463108e
-
Chidera Olibie authored
-
Motomu Utsumi authored
-
chiachangwang authored
As the review feedback, this commits address below concern. 1. The TCP keepalive code doesn't use the network parameter at all. This parameter doesn't seem meaningful for TCP keepalives. Starting a TCP keepalive with a non-null underpinned network should throw IllegalArgumentException. 2. The feedback mention that the start version which takes a @NonNull network should throw NPE if the network is null. But Starting a NATT keepalive does not always require a underpinned network. A new IkeSession started from Vpn will also not assign the underpinned network at the initial stage which means underpinned will be null until setNetwork() is called. Thus, the underpinned network should be @Nullable instead. Fix: 271797087 Test: atest FrameworksNetTests Change-Id: Ieb57a7b15a06b2ccd94358b65cc00768c4f62e7d
-
Remi NGUYEN VAN authored
When the interface has no IPv6 address yet, the error is EADDRNOTAVAIL, not ENETUNREACH. Bug: 272147547 Bug: 272917228 Bug: 272925668 Test: atest Change-Id: I189f691405e2e0596ea0c9fe8f8ffe3c21dd5b46
-
Treehugger Robot authored
-
Motomu Utsumi authored
Test: m Change-Id: Ide8a5b649c7bda26c41e3d11a5071eb1af7ae0a2
-
Yuyang Huang authored
Using packageManager from ConnectivityService context to get the caller application info in binder calls can cause the permission issue. Calling the Binder.clearCallingIdentity() before interact with packageManager can fix the permission issue. Test: atest CtsHostsideNetworkTests Bug: 272165411 Change-Id: I0a289afc6fb0e42a92aa3ffa0c77ed396c4485c3
-
Motomu Utsumi authored
Bug: 271232428 Test: atest CtsNetTestCases Change-Id: Ib49a2fc566066ea2b33d52e1f0d6a0c0e02fbb00
-
- Mar 11, 2023
-
-
Treehugger Robot authored
* changes: clat: switch to relative cbpf filter clatutils - code cleanup
-
- Mar 10, 2023
-
-
Maciej Żenczykowski authored
Needed to support AF_PACKET/SOCK_RAW sockets Test: TreeHugger, ping on ipv6-only wifi works Bug: 265591307 Signed-off-by:
Maciej Żenczykowski <maze@google.com> Change-Id: If324ee1e97a90b1a0a2ee0fabe1d91ef0603fdac
-
Maciej Żenczykowski authored
add const, etc. Test: TreeHugger Bug: 265591307 Signed-off-by:
Maciej Żenczykowski <maze@google.com> Change-Id: I8daa05891759370f6f5d7369a283d8ffc543a790
-
Chidera Olibie authored
The license file has moved to external/cronet/Android.extras.bp in aosp/2469561 Test: m Change-Id: I2b99de4970a8bf8275195b73b9ad603477bcaf24
-
Dan Stahr authored
-
Dan Stahr authored
-
Dan Stahr authored
-
Motomu Utsumi authored
Bug: 265674359 Test: TH Change-Id: I867a66518db0eb9fe446aa28e07d4678f0e3af94
-
Dan Stahr authored
Test: atest CronetCtsTestCases Bug: 251012627 Change-Id: Ida490d54c62e8c3b1716b5fc2c3f702ba1c844bd
-
Maciej Żenczykowski authored
* changes: BpfCoordinator: refactor updateUpstreamNetworkState to get MTU Test: move getClatIpv6Address to common function
-
Maciej Żenczykowski authored
-
Motomu Utsumi authored
Bug: 272009719 Bug: 265674359 Test: TH Change-Id: If98ea3c45d9e181773f9d5877462d4d3c6097302
-
Chiachang Wang authored
-
Chiachang Wang authored
-
- Mar 09, 2023
-
-
Treehugger Robot authored
-
Motomu Utsumi authored
-
Patrick Rohr authored
* changes: ethernet: report server mode interfaces when listener is registered ethernet: rename getInterfaces to getClientModeInterfaces
-