blob: d6089e079bf09bbc87906357f95095f576f3d299 [file] [log] [blame]
#ifndef HIDL_GENERATED_ANDROID_HARDWARE_WIFI_SUPPLICANT_V1_3_ISUPPLICANTSTANETWORK_H
#define HIDL_GENERATED_ANDROID_HARDWARE_WIFI_SUPPLICANT_V1_3_ISUPPLICANTSTANETWORK_H
#include <android/hardware/wifi/supplicant/1.0/ISupplicantStaNetwork.h>
#include <android/hardware/wifi/supplicant/1.0/types.h>
#include <android/hardware/wifi/supplicant/1.2/ISupplicantStaNetwork.h>
#include <android/hardware/wifi/supplicant/1.3/types.h>
#include <android/hidl/manager/1.0/IServiceNotification.h>
#include <hidl/HidlSupport.h>
#include <hidl/MQDescriptor.h>
#include <hidl/Status.h>
#include <utils/NativeHandle.h>
#include <utils/misc.h>
namespace android {
namespace hardware {
namespace wifi {
namespace supplicant {
namespace V1_3 {
/**
* Interface exposed by the supplicant for each station mode network
* configuration it controls.
*/
struct ISupplicantStaNetwork : public ::android::hardware::wifi::supplicant::V1_2::ISupplicantStaNetwork {
/**
* Type tag for use in template logic that indicates this is a 'pure' class.
*/
typedef ::android::hardware::details::i_tag _hidl_tag;
/**
* Fully qualified interface name: "android.hardware.wifi.supplicant@1.3::ISupplicantStaNetwork"
*/
static const char* descriptor;
// Forward declaration for forward reference support:
enum class ProtoMask : uint32_t;
enum class KeyMgmtMask : uint32_t;
enum class PairwiseCipherMask : uint32_t;
enum class GroupCipherMask : uint32_t;
enum class AuthAlgMask : uint32_t;
/**
* Possible mask of values for Proto param.
*/
enum class ProtoMask : uint32_t {
WPA = 1u /* 1 << 0 */,
RSN = 2u /* 1 << 1 */,
/**
* Unused 1 << 2
*/
OSEN = 8u /* 1 << 3 */,
WAPI = 4u /* 1 << 2 */,
};
/**
* Possible mask of values for KeyMgmt param.
*/
enum class KeyMgmtMask : uint32_t {
WPA_EAP = 1u /* 1 << 0 */,
WPA_PSK = 2u /* 1 << 1 */,
NONE = 4u /* 1 << 2 */,
IEEE8021X = 8u /* 1 << 3 */,
FT_EAP = 32u /* 1 << 5 */,
FT_PSK = 64u /* 1 << 6 */,
OSEN = 32768u /* 1 << 15 */,
/**
* WPA using EAP authentication with stronger SHA256-based algorithms
*/
WPA_EAP_SHA256 = 128u /* 1 << 7 */,
/**
* WPA pre-shared key with stronger SHA256-based algorithms
*/
WPA_PSK_SHA256 = 256u /* 1 << 8 */,
/**
* WPA3-Personal SAE Key management
*/
SAE = 1024u /* 1 << 10 */,
/**
* WPA3-Enterprise Suite-B Key management
*/
SUITE_B_192 = 131072u /* 1 << 17 */,
/**
* Enhacned Open (OWE) Key management
*/
OWE = 4194304u /* 1 << 22 */,
/**
* Easy Connect (DPP) Key management
*/
DPP = 8388608u /* 1 << 23 */,
/*
* WAPI Psk
*/
WAPI_PSK = 4096u /* 1 << 12 */,
/**
* WAPI Cert
*/
WAPI_CERT = 8192u /* 1 << 13 */,
/**
* FILS shared key authentication with sha-256
*/
FILS_SHA256 = 262144u /* 1 << 18 */,
/**
* FILS shared key authentication with sha-384
*/
FILS_SHA384 = 524288u /* 1 << 19 */,
};
/**
* Possible mask of values for PairwiseCipher param.
*/
enum class PairwiseCipherMask : uint32_t {
NONE = 1u /* 1 << 0 */,
TKIP = 8u /* 1 << 3 */,
CCMP = 16u /* 1 << 4 */,
/**
* GCMP-256 Pairwise Cipher
*/
GCMP_256 = 256u /* 1 << 8 */,
/**
* SMS4 Pairwise Cipher
*/
SMS4 = 128u /* 1 << 7 */,
};
/**
* Possible mask of values for GroupCipher param.
*/
enum class GroupCipherMask : uint32_t {
WEP40 = 2u /* 1 << 1 */,
WEP104 = 4u /* 1 << 2 */,
TKIP = 8u /* 1 << 3 */,
CCMP = 16u /* 1 << 4 */,
GTK_NOT_USED = 16384u /* 1 << 14 */,
/**
* GCMP-256 Group Cipher
*/
GCMP_256 = 256u /* 1 << 8 */,
/**
* SMS4 Group Cipher
*/
SMS4 = 128u /* 1 << 7 */,
};
/**
* Possible mask of values for AuthAlg param.
*/
enum class AuthAlgMask : uint32_t {
OPEN = 1u /* 1 << 0 */,
SHARED = 2u /* 1 << 1 */,
LEAP = 4u /* 1 << 2 */,
SAE = 16u /* 1 << 4 */,
};
/**
* Returns whether this object's implementation is outside of the current process.
*/
virtual bool isRemote() const override { return false; }
/**
* Return callback for getId
*/
using getId_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, uint32_t id)>;
/**
* Retrieves the ID allocated to this network by the supplicant.
*
* This is not the |SSID| of the network, but an internal identifier for
* this network used by the supplicant.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return id Network ID.
*/
virtual ::android::hardware::Return<void> getId(getId_cb _hidl_cb) = 0;
/**
* Return callback for getInterfaceName
*/
using getInterfaceName_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_string& name)>;
/**
* Retrieves the name of the interface this network belongs to.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return Name of the network interface, e.g., wlan0
*/
virtual ::android::hardware::Return<void> getInterfaceName(getInterfaceName_cb _hidl_cb) = 0;
/**
* Return callback for getType
*/
using getType_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::wifi::supplicant::V1_0::IfaceType type)>;
/**
* Retrieves the type of the interface this network belongs to.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_IFACE_INVALID|
* @return type Type of the network interface, e.g., STA.
*/
virtual ::android::hardware::Return<void> getType(getType_cb _hidl_cb) = 0;
/**
* Return callback for registerCallback
*/
using registerCallback_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Register for callbacks from this network.
*
* These callbacks are invoked for events that are specific to this network.
* Registration of multiple callback objects is supported. These objects must
* be automatically deleted when the corresponding client process is dead or
* if this network is removed.
*
* @param callback An instance of the |ISupplicantStaNetworkCallback| HIDL
* interface object.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> registerCallback(const ::android::sp<::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetworkCallback>& callback, registerCallback_cb _hidl_cb) = 0;
/**
* Return callback for setSsid
*/
using setSsid_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Setters for the various network params.
* These correspond to elements of |wpa_sssid| struct used internally by
* the supplicant to represent each network.
*
*
* Set SSID for this network.
*
* @param ssid value to set.
* Max length of |ParamSizeLimits.SSID_MAX_LEN_IN_BYTES|.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setSsid(const ::android::hardware::hidl_vec<uint8_t>& ssid, setSsid_cb _hidl_cb) = 0;
/**
* Return callback for setBssid
*/
using setBssid_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set the network to only connect to an AP with provided BSSID.
*
* @param bssid value to set.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setBssid(const ::android::hardware::hidl_array<uint8_t, 6>& bssid, setBssid_cb _hidl_cb) = 0;
/**
* Return callback for setScanSsid
*/
using setScanSsid_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set whether to send probe requests for this network (hidden).
*
* @param enable true to set, false otherwise.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setScanSsid(bool enable, setScanSsid_cb _hidl_cb) = 0;
/**
* Return callback for setKeyMgmt
*/
using setKeyMgmt_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set key management mask for the network.
*
* @param keyMgmtMask value to set.
* Combination of |KeyMgmtMask| values.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setKeyMgmt(::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetwork::KeyMgmtMask> keyMgmtMask, setKeyMgmt_cb _hidl_cb) = 0;
/**
* Return callback for setProto
*/
using setProto_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set proto mask for the network.
*
* @param protoMask value to set.
* Combination of |ProtoMask| values.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setProto(::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetwork::ProtoMask> protoMask, setProto_cb _hidl_cb) = 0;
/**
* Return callback for setAuthAlg
*/
using setAuthAlg_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set auth alg mask for the network.
*
* @param authAlgMask value to set.
* Combination of |ProtoMask| values.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setAuthAlg(::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetwork::AuthAlgMask> authAlgMask, setAuthAlg_cb _hidl_cb) = 0;
/**
* Return callback for setGroupCipher
*/
using setGroupCipher_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set group cipher mask for the network.
*
* @param groupCipherMask value to set.
* Combination of |ProtoMask| values.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setGroupCipher(::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetwork::GroupCipherMask> groupCipherMask, setGroupCipher_cb _hidl_cb) = 0;
/**
* Return callback for setPairwiseCipher
*/
using setPairwiseCipher_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set pairwise cipher mask for the network.
*
* @param pairwiseCipherMask value to set.
* Combination of |ProtoMask| values.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setPairwiseCipher(::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetwork::PairwiseCipherMask> pairwiseCipherMask, setPairwiseCipher_cb _hidl_cb) = 0;
/**
* Return callback for setPskPassphrase
*/
using setPskPassphrase_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set passphrase for WPA_PSK network.
*
* @param psk value to set.
* Length of value must be between
* |ParamSizeLimits.PSK_PASSPHRASE_MIN_LEN_IN_BYTES| and
* |ParamSizeLimits.PSK_PASSPHRASE_MAX_LEN_IN_BYTES|.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setPskPassphrase(const ::android::hardware::hidl_string& psk, setPskPassphrase_cb _hidl_cb) = 0;
/**
* Return callback for setPsk
*/
using setPsk_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set raw psk for WPA_PSK network.
*
* @param psk value to set as specified in IEEE 802.11i-2004 standard.
* This is the calculated using 'wpa_passphrase <ssid> [passphrase]'
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setPsk(const ::android::hardware::hidl_array<uint8_t, 32>& psk, setPsk_cb _hidl_cb) = 0;
/**
* Return callback for setWepKey
*/
using setWepKey_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set WEP key for WEP network.
*
* @param keyIdx Index of wep key to set.
* Max of |ParamSizeLimits.WEP_KEYS_MAX_NUM|.
* @param wepKey value to set.
* Length of each key must be either
* |ParamSizeLimits.WEP40_KEY_LEN_IN_BYTES| or
* |ParamSizeLimits.WEP104_KEY_LEN_IN_BYTES|.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setWepKey(uint32_t keyIdx, const ::android::hardware::hidl_vec<uint8_t>& wepKey, setWepKey_cb _hidl_cb) = 0;
/**
* Return callback for setWepTxKeyIdx
*/
using setWepTxKeyIdx_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set default Tx key index for WEP network.
*
* @param KeyIdx value to set.
* Max of |ParamSizeLimits.WEP_KEYS_MAX_NUM|.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setWepTxKeyIdx(uint32_t keyIdx, setWepTxKeyIdx_cb _hidl_cb) = 0;
/**
* Return callback for setRequirePmf
*/
using setRequirePmf_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set whether RequirePmf is enabled for this network.
*
* @param enable true to set, false otherwise.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setRequirePmf(bool enable, setRequirePmf_cb _hidl_cb) = 0;
/**
* Return callback for setEapMethod
*/
using setEapMethod_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set EAP Method for this network.
*
* @param method value to be set.
* Must be one of |EapMethod| values.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setEapMethod(::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetwork::EapMethod method, setEapMethod_cb _hidl_cb) = 0;
/**
* Return callback for setEapPhase2Method
*/
using setEapPhase2Method_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set EAP Phase2 Method for this network.
*
* EAP method needs to be set for this to work.
*
* @param method value to set.
* Must be one of |EapPhase2Method| values.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setEapPhase2Method(::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetwork::EapPhase2Method method, setEapPhase2Method_cb _hidl_cb) = 0;
/**
* Return callback for setEapIdentity
*/
using setEapIdentity_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set EAP Identity for this network.
*
* @param identity value to set.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setEapIdentity(const ::android::hardware::hidl_vec<uint8_t>& identity, setEapIdentity_cb _hidl_cb) = 0;
/**
* Return callback for setEapAnonymousIdentity
*/
using setEapAnonymousIdentity_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set EAP Anonymous Identity for this network.
*
* @param identity value to set.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setEapAnonymousIdentity(const ::android::hardware::hidl_vec<uint8_t>& identity, setEapAnonymousIdentity_cb _hidl_cb) = 0;
/**
* Return callback for setEapPassword
*/
using setEapPassword_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set EAP Password for this network.
*
* @param password value to set.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setEapPassword(const ::android::hardware::hidl_vec<uint8_t>& password, setEapPassword_cb _hidl_cb) = 0;
/**
* Return callback for setEapCACert
*/
using setEapCACert_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set EAP CA certificate file path for this network.
*
* @param path value to set.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setEapCACert(const ::android::hardware::hidl_string& path, setEapCACert_cb _hidl_cb) = 0;
/**
* Return callback for setEapCAPath
*/
using setEapCAPath_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set EAP CA certificate directory path for this network.
*
* @param path value to set.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setEapCAPath(const ::android::hardware::hidl_string& path, setEapCAPath_cb _hidl_cb) = 0;
/**
* Return callback for setEapClientCert
*/
using setEapClientCert_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set EAP Client certificate file path for this network.
*
* @param path value to set.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setEapClientCert(const ::android::hardware::hidl_string& path, setEapClientCert_cb _hidl_cb) = 0;
/**
* Return callback for setEapPrivateKeyId
*/
using setEapPrivateKeyId_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set EAP private key Id for this network.
* This is used if private key operations for EAP-TLS are performed
* using a smartcard.
*
* @param id value to set.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setEapPrivateKeyId(const ::android::hardware::hidl_string& id, setEapPrivateKeyId_cb _hidl_cb) = 0;
/**
* Return callback for setEapSubjectMatch
*/
using setEapSubjectMatch_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set EAP subject match for this network.
*
* @param match value to set.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setEapSubjectMatch(const ::android::hardware::hidl_string& match, setEapSubjectMatch_cb _hidl_cb) = 0;
/**
* Return callback for setEapAltSubjectMatch
*/
using setEapAltSubjectMatch_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set EAP Alt subject match for this network.
*
* @param match value to set.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setEapAltSubjectMatch(const ::android::hardware::hidl_string& match, setEapAltSubjectMatch_cb _hidl_cb) = 0;
/**
* Return callback for setEapEngine
*/
using setEapEngine_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Enable EAP Open SSL Engine for this network.
*
* @param enable true to set, false otherwise.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setEapEngine(bool enable, setEapEngine_cb _hidl_cb) = 0;
/**
* Return callback for setEapEngineID
*/
using setEapEngineID_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set EAP Open SSL Engine ID for this network.
*
* @param id value to set.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setEapEngineID(const ::android::hardware::hidl_string& id, setEapEngineID_cb _hidl_cb) = 0;
/**
* Return callback for setEapDomainSuffixMatch
*/
using setEapDomainSuffixMatch_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set EAP Domain suffix match for this network.
*
* @param match value to set.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setEapDomainSuffixMatch(const ::android::hardware::hidl_string& match, setEapDomainSuffixMatch_cb _hidl_cb) = 0;
/**
* Return callback for setProactiveKeyCaching
*/
using setProactiveKeyCaching_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* This field can be used to enable proactive key caching which is also
* known as opportunistic PMKSA caching for WPA2. This is disabled (0)
* by default unless default value is changed with the global okc=1
* parameter.
*
* Proactive key caching is used to make supplicant assume that the APs
* are using the same PMK and generate PMKSA cache entries without
* doing RSN pre-authentication. This requires support from the AP side
* and is normally used with wireless switches that co-locate the
* authenticator.
*
* @param enable true to set, false otherwise.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setProactiveKeyCaching(bool enable, setProactiveKeyCaching_cb _hidl_cb) = 0;
/**
* Return callback for setIdStr
*/
using setIdStr_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set ID string for this network.
* Network identifier string for external scripts.
*
* @return idStr ID string value to set.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setIdStr(const ::android::hardware::hidl_string& idStr, setIdStr_cb _hidl_cb) = 0;
/**
* Return callback for setUpdateIdentifier
*/
using setUpdateIdentifier_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set PPS MO ID for this network.
* (Hotspot 2.0 PerProviderSubscription/UpdateIdentifier)
*
* @return id ID value to set.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setUpdateIdentifier(uint32_t id, setUpdateIdentifier_cb _hidl_cb) = 0;
/**
* Return callback for getSsid
*/
using getSsid_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_vec<uint8_t>& ssid)>;
/**
* Getters for the various network params.
*
*
* Get SSID for this network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return ssid value set.
*/
virtual ::android::hardware::Return<void> getSsid(getSsid_cb _hidl_cb) = 0;
/**
* Return callback for getBssid
*/
using getBssid_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_array<uint8_t, 6>& bssid)>;
/**
* Get the BSSID set for this network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return bssid value set.
*/
virtual ::android::hardware::Return<void> getBssid(getBssid_cb _hidl_cb) = 0;
/**
* Return callback for getScanSsid
*/
using getScanSsid_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, bool enabled)>;
/**
* Get whether Probe Requests are being sent for this network (hidden).
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return enabled true if set, false otherwise.
*/
virtual ::android::hardware::Return<void> getScanSsid(getScanSsid_cb _hidl_cb) = 0;
/**
* Return callback for getKeyMgmt
*/
using getKeyMgmt_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetwork::KeyMgmtMask> keyMgmtMask)>;
/**
* Get the key mgmt mask set for the network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return keyMgmtMask Combination of |KeyMgmtMask| values.
*/
virtual ::android::hardware::Return<void> getKeyMgmt(getKeyMgmt_cb _hidl_cb) = 0;
/**
* Return callback for getProto
*/
using getProto_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetwork::ProtoMask> protoMask)>;
/**
* Get the proto mask set for the network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return protoMask Combination of |ProtoMask| values.
*/
virtual ::android::hardware::Return<void> getProto(getProto_cb _hidl_cb) = 0;
/**
* Return callback for getAuthAlg
*/
using getAuthAlg_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetwork::AuthAlgMask> authAlgMask)>;
/**
* Get the auth alg mask set for the network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return authAlgMask Combination of |AuthAlgMask| values.
*/
virtual ::android::hardware::Return<void> getAuthAlg(getAuthAlg_cb _hidl_cb) = 0;
/**
* Return callback for getGroupCipher
*/
using getGroupCipher_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetwork::GroupCipherMask> groupCipherMask)>;
/**
* Get the group cipher mask set for the network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return groupCipherMask Combination of |GroupCipherMask| values.
*/
virtual ::android::hardware::Return<void> getGroupCipher(getGroupCipher_cb _hidl_cb) = 0;
/**
* Return callback for getPairwiseCipher
*/
using getPairwiseCipher_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetwork::PairwiseCipherMask> pairwiseCipherMask)>;
/**
* Get the pairwise cipher mask set for the network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return pairwiseCipherMask Combination of |PairwiseCipherMask| values.
*/
virtual ::android::hardware::Return<void> getPairwiseCipher(getPairwiseCipher_cb _hidl_cb) = 0;
/**
* Return callback for getPskPassphrase
*/
using getPskPassphrase_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_string& psk)>;
/**
* Get passphrase for WPA_PSK network.
* Must return a failure if network has no passphrase set (use |getPsk| if
* network was configured with raw psk instead).
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return psk value set.
*/
virtual ::android::hardware::Return<void> getPskPassphrase(getPskPassphrase_cb _hidl_cb) = 0;
/**
* Return callback for getPsk
*/
using getPsk_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_array<uint8_t, 32>& psk)>;
/**
* Get raw psk for WPA_PSK network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @param psk value set.
*/
virtual ::android::hardware::Return<void> getPsk(getPsk_cb _hidl_cb) = 0;
/**
* Return callback for getWepKey
*/
using getWepKey_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_vec<uint8_t>& wepKey)>;
/**
* Get WEP key for WEP network.
*
* @param keyIdx Index of wep key to be fetched.
* Max of |WEP_KEYS_MAX_NUM|.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return wepKey value set.
*/
virtual ::android::hardware::Return<void> getWepKey(uint32_t keyIdx, getWepKey_cb _hidl_cb) = 0;
/**
* Return callback for getWepTxKeyIdx
*/
using getWepTxKeyIdx_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, uint32_t keyIdx)>;
/**
* Get default Tx key index for WEP network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return keyIdx value set.
*/
virtual ::android::hardware::Return<void> getWepTxKeyIdx(getWepTxKeyIdx_cb _hidl_cb) = 0;
/**
* Return callback for getRequirePmf
*/
using getRequirePmf_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, bool enabled)>;
/**
* Get whether RequirePmf is enabled for this network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return enabled true if set, false otherwise.
*/
virtual ::android::hardware::Return<void> getRequirePmf(getRequirePmf_cb _hidl_cb) = 0;
/**
* Return callback for getEapMethod
*/
using getEapMethod_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetwork::EapMethod method)>;
/**
* Get EAP Method set for this network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return method value set.
* Must be one of |EapMethod| values.
*/
virtual ::android::hardware::Return<void> getEapMethod(getEapMethod_cb _hidl_cb) = 0;
/**
* Return callback for getEapPhase2Method
*/
using getEapPhase2Method_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetwork::EapPhase2Method method)>;
/**
* Get EAP Phase2 Method set for this network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return method value set.
* Must be one of |EapPhase2Method| values.
*/
virtual ::android::hardware::Return<void> getEapPhase2Method(getEapPhase2Method_cb _hidl_cb) = 0;
/**
* Return callback for getEapIdentity
*/
using getEapIdentity_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_vec<uint8_t>& identity)>;
/**
* Get EAP Identity set for this network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return identity value set.
*/
virtual ::android::hardware::Return<void> getEapIdentity(getEapIdentity_cb _hidl_cb) = 0;
/**
* Return callback for getEapAnonymousIdentity
*/
using getEapAnonymousIdentity_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_vec<uint8_t>& identity)>;
/**
* Get EAP Anonymous Identity set for this network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return identity value set.
*/
virtual ::android::hardware::Return<void> getEapAnonymousIdentity(getEapAnonymousIdentity_cb _hidl_cb) = 0;
/**
* Return callback for getEapPassword
*/
using getEapPassword_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_vec<uint8_t>& password)>;
/**
* Get EAP Password set for this network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return password value set.
*/
virtual ::android::hardware::Return<void> getEapPassword(getEapPassword_cb _hidl_cb) = 0;
/**
* Return callback for getEapCACert
*/
using getEapCACert_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_string& path)>;
/**
* Get EAP CA certificate file path set for this network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return path value set.
*/
virtual ::android::hardware::Return<void> getEapCACert(getEapCACert_cb _hidl_cb) = 0;
/**
* Return callback for getEapCAPath
*/
using getEapCAPath_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_string& path)>;
/**
* Get EAP CA certificate directory path set for this network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return path value set.
*/
virtual ::android::hardware::Return<void> getEapCAPath(getEapCAPath_cb _hidl_cb) = 0;
/**
* Return callback for getEapClientCert
*/
using getEapClientCert_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_string& path)>;
/**
* Get EAP Client certificate file path set for this network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return path value set.
*/
virtual ::android::hardware::Return<void> getEapClientCert(getEapClientCert_cb _hidl_cb) = 0;
/**
* Return callback for getEapPrivateKeyId
*/
using getEapPrivateKeyId_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_string& id)>;
/**
* Get EAP private key Id set for this network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return id value set.
*/
virtual ::android::hardware::Return<void> getEapPrivateKeyId(getEapPrivateKeyId_cb _hidl_cb) = 0;
/**
* Return callback for getEapSubjectMatch
*/
using getEapSubjectMatch_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_string& match)>;
/**
* Get EAP subject match set for this network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return match value set.
*/
virtual ::android::hardware::Return<void> getEapSubjectMatch(getEapSubjectMatch_cb _hidl_cb) = 0;
/**
* Return callback for getEapAltSubjectMatch
*/
using getEapAltSubjectMatch_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_string& match)>;
/**
* Get EAP Alt subject match set for this network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return match value set.
*/
virtual ::android::hardware::Return<void> getEapAltSubjectMatch(getEapAltSubjectMatch_cb _hidl_cb) = 0;
/**
* Return callback for getEapEngine
*/
using getEapEngine_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, bool enabled)>;
/**
* Get if EAP Open SSL Engine is enabled for this network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return enabled true if set, false otherwise.
*/
virtual ::android::hardware::Return<void> getEapEngine(getEapEngine_cb _hidl_cb) = 0;
/**
* Return callback for getEapEngineID
*/
using getEapEngineID_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_string& id)>;
/**
* Get EAP Open SSL Engine ID set for this network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return id value set.
*/
virtual ::android::hardware::Return<void> getEapEngineID(getEapEngineID_cb _hidl_cb) = 0;
/**
* Return callback for getEapDomainSuffixMatch
*/
using getEapDomainSuffixMatch_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_string& match)>;
/**
* Get EAP Domain suffix match set for this network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return match value set.
*/
virtual ::android::hardware::Return<void> getEapDomainSuffixMatch(getEapDomainSuffixMatch_cb _hidl_cb) = 0;
/**
* Return callback for getIdStr
*/
using getIdStr_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_string& idStr)>;
/**
* Get ID string set for this network.
* Network identifier string for external scripts.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return idStr ID string set.
*/
virtual ::android::hardware::Return<void> getIdStr(getIdStr_cb _hidl_cb) = 0;
/**
* Return callback for getWpsNfcConfigurationToken
*/
using getWpsNfcConfigurationToken_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_vec<uint8_t>& token)>;
/**
* Retrieves a WPS-NFC configuration token for this network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return token Bytes representing WPS-NFC configuration token.
* This is a dump of all the WPS atrributes of the AP configuration
* as specified in the Wi-Fi Protected Setup Specification.
*/
virtual ::android::hardware::Return<void> getWpsNfcConfigurationToken(getWpsNfcConfigurationToken_cb _hidl_cb) = 0;
/**
* Return callback for enable
*/
using enable_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Enable the network for connection purposes.
*
* This must trigger a connection to the network if:
* a) |noConnect| is false, and
* b) This is the only network configured, and
* c) Is visible in the current scan results.
*
* @param noConnect Only enable the network, dont trigger a connect.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> enable(bool noConnect, enable_cb _hidl_cb) = 0;
/**
* Return callback for disable
*/
using disable_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Disable the network for connection purposes.
*
* This must trigger a disconnection from the network, if currently
* connected to this one.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> disable(disable_cb _hidl_cb) = 0;
/**
* Return callback for select
*/
using select_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Initiate connection to this network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> select(select_cb _hidl_cb) = 0;
/**
* Return callback for sendNetworkEapSimGsmAuthResponse
*/
using sendNetworkEapSimGsmAuthResponse_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Used to send a response to the
* |ISupplicantNetworkCallback.onNetworkEapSimGsmAuthRequest| request.
*
* @param params Params to be used for EAP GSM authentication.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> sendNetworkEapSimGsmAuthResponse(const ::android::hardware::hidl_vec<::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetwork::NetworkResponseEapSimGsmAuthParams>& params, sendNetworkEapSimGsmAuthResponse_cb _hidl_cb) = 0;
/**
* Return callback for sendNetworkEapSimGsmAuthFailure
*/
using sendNetworkEapSimGsmAuthFailure_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Used to send a response to the
* |ISupplicantNetworkCallback.onNetworkEapSimGsmAuthRequest| request.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> sendNetworkEapSimGsmAuthFailure(sendNetworkEapSimGsmAuthFailure_cb _hidl_cb) = 0;
/**
* Return callback for sendNetworkEapSimUmtsAuthResponse
*/
using sendNetworkEapSimUmtsAuthResponse_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Used to send a response to the
* |ISupplicantNetworkCallback.onNetworkEapSimUmtsAuthRequest| request.
*
* @param params Params to be used for EAP UMTS authentication.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> sendNetworkEapSimUmtsAuthResponse(const ::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetwork::NetworkResponseEapSimUmtsAuthParams& params, sendNetworkEapSimUmtsAuthResponse_cb _hidl_cb) = 0;
/**
* Return callback for sendNetworkEapSimUmtsAutsResponse
*/
using sendNetworkEapSimUmtsAutsResponse_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Used to send a response to the
* |ISupplicantNetworkCallback.onNetworkEapSimUmtsAuthRequest| request.
*
* @param auts Params to be used for EAP UMTS authentication.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> sendNetworkEapSimUmtsAutsResponse(const ::android::hardware::hidl_array<uint8_t, 14>& auts, sendNetworkEapSimUmtsAutsResponse_cb _hidl_cb) = 0;
/**
* Return callback for sendNetworkEapSimUmtsAuthFailure
*/
using sendNetworkEapSimUmtsAuthFailure_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Used to send a response to the
* |ISupplicantNetworkCallback.onNetworkEapSimUmtsAuthRequest| request.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> sendNetworkEapSimUmtsAuthFailure(sendNetworkEapSimUmtsAuthFailure_cb _hidl_cb) = 0;
/**
* Return callback for sendNetworkEapIdentityResponse
*/
using sendNetworkEapIdentityResponse_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Used to send a response to the
* |ISupplicantNetworkCallback.onNetworkEapIdentityRequest| request.
*
* @param identity Identity to be used for the network.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> sendNetworkEapIdentityResponse(const ::android::hardware::hidl_vec<uint8_t>& identity, sendNetworkEapIdentityResponse_cb _hidl_cb) = 0;
/**
* Return callback for setEapEncryptedImsiIdentity
*/
using setEapEncryptedImsiIdentity_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set EAP encrypted IMSI Identity for this network.
*
* @param identity Identity string built from the encrypted IMSI.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setEapEncryptedImsiIdentity(const ::android::hardware::hidl_vec<uint8_t>& identity, setEapEncryptedImsiIdentity_cb _hidl_cb) = 0;
/**
* Return callback for sendNetworkEapIdentityResponse_1_1
*/
using sendNetworkEapIdentityResponse_1_1_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Used to send a response to the
* |ISupplicantNetworkCallback.onNetworkEapIdentityRequest| request.
*
* @param identity Identity string containing the IMSI.
* @param encryptedIdentity Identity string containing the encrypted IMSI.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> sendNetworkEapIdentityResponse_1_1(const ::android::hardware::hidl_vec<uint8_t>& identity, const ::android::hardware::hidl_vec<uint8_t>& encryptedIdentity, sendNetworkEapIdentityResponse_1_1_cb _hidl_cb) = 0;
/**
* Return callback for setKeyMgmt_1_2
*/
using setKeyMgmt_1_2_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set key management mask for the network.
*
* @param keyMgmtMask value to set.
* Combination of |KeyMgmtMask| values.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setKeyMgmt_1_2(::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_2::ISupplicantStaNetwork::KeyMgmtMask> keyMgmtMask, setKeyMgmt_1_2_cb _hidl_cb) = 0;
/**
* Return callback for getKeyMgmt_1_2
*/
using getKeyMgmt_1_2_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_2::ISupplicantStaNetwork::KeyMgmtMask> keyMgmtMask)>;
/**
* Get the key mgmt mask set for the network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return keyMgmtMask Combination of |KeyMgmtMask| values.
*/
virtual ::android::hardware::Return<void> getKeyMgmt_1_2(getKeyMgmt_1_2_cb _hidl_cb) = 0;
/**
* Return callback for setPairwiseCipher_1_2
*/
using setPairwiseCipher_1_2_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set pairwise cipher mask for the network.
*
* @param pairwiseCipherMask value to set.
* Combination of |PairwiseCipherMask| values.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setPairwiseCipher_1_2(::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_2::ISupplicantStaNetwork::PairwiseCipherMask> pairwiseCipherMask, setPairwiseCipher_1_2_cb _hidl_cb) = 0;
/**
* Return callback for getPairwiseCipher_1_2
*/
using getPairwiseCipher_1_2_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_2::ISupplicantStaNetwork::PairwiseCipherMask> pairwiseCipherMask)>;
/**
* Get the pairwise cipher mask set for the network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return pairwiseCipherMask Combination of |PairwiseCipherMask| values.
*/
virtual ::android::hardware::Return<void> getPairwiseCipher_1_2(getPairwiseCipher_1_2_cb _hidl_cb) = 0;
/**
* Return callback for setGroupCipher_1_2
*/
using setGroupCipher_1_2_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set group cipher mask for the network.
*
* @param groupCipherMask value to set.
* Combination of |GroupCipherMask| values.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setGroupCipher_1_2(::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_2::ISupplicantStaNetwork::GroupCipherMask> groupCipherMask, setGroupCipher_1_2_cb _hidl_cb) = 0;
/**
* Return callback for getGroupCipher_1_2
*/
using getGroupCipher_1_2_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_2::ISupplicantStaNetwork::GroupCipherMask> groupCipherMask)>;
/**
* Get the group cipher mask set for the network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return groupCipherMask Combination of |GroupCipherMask| values.
*/
virtual ::android::hardware::Return<void> getGroupCipher_1_2(getGroupCipher_1_2_cb _hidl_cb) = 0;
/**
* Return callback for setGroupMgmtCipher
*/
using setGroupMgmtCipher_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set group management cipher mask for the network.
*
* @param groupMgmtCipherMask value to set.
* Combination of |GroupMgmtCipherMask| values.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setGroupMgmtCipher(::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_2::ISupplicantStaNetwork::GroupMgmtCipherMask> groupMgmtCipherMask, setGroupMgmtCipher_cb _hidl_cb) = 0;
/**
* Return callback for getGroupMgmtCipher
*/
using getGroupMgmtCipher_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_2::ISupplicantStaNetwork::GroupMgmtCipherMask> groupMgmtCipherMask)>;
/**
* Get the group management cipher mask set for the network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return groupMgmtCipherMask Combination of |GroupMgmtCipherMask| values.
*/
virtual ::android::hardware::Return<void> getGroupMgmtCipher(getGroupMgmtCipher_cb _hidl_cb) = 0;
/**
* Return callback for enableTlsSuiteBEapPhase1Param
*/
using enableTlsSuiteBEapPhase1Param_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Enable TLS Suite-B in EAP Phase1
*
* @param enable Set to true to enable TLS Suite-B in EAP phase1
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> enableTlsSuiteBEapPhase1Param(bool enable, enableTlsSuiteBEapPhase1Param_cb _hidl_cb) = 0;
/**
* Return callback for enableSuiteBEapOpenSslCiphers
*/
using enableSuiteBEapOpenSslCiphers_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set EAP OpenSSL Suite-B-192 ciphers for WPA3-Enterprise
* Supported option:
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> enableSuiteBEapOpenSslCiphers(enableSuiteBEapOpenSslCiphers_cb _hidl_cb) = 0;
/**
* Return callback for getSaePassword
*/
using getSaePassword_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_string& saePassword)>;
/**
* Get SAE password for WPA3-Personal
*
* @return status Status of the operation, and a string.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> getSaePassword(getSaePassword_cb _hidl_cb) = 0;
/**
* Return callback for getSaePasswordId
*/
using getSaePasswordId_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_string& saePasswordId)>;
/**
* Get SAE password ID for WPA3-Personal
*
* @return status Status of the operation, and a string.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> getSaePasswordId(getSaePasswordId_cb _hidl_cb) = 0;
/**
* Return callback for setSaePassword
*/
using setSaePassword_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set SAE password for WPA3-Personal
*
* @param saePassword string with the above option
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setSaePassword(const ::android::hardware::hidl_string& saePassword, setSaePassword_cb _hidl_cb) = 0;
/**
* Return callback for setSaePasswordId
*/
using setSaePasswordId_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set SAE password ID for WPA3-Personal
*
* @param sae_password_id string with the above option
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setSaePasswordId(const ::android::hardware::hidl_string& saePasswordId, setSaePasswordId_cb _hidl_cb) = 0;
/**
* Return callback for setOcsp
*/
using setOcsp_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set OCSP (Online Certificate Status Protocol) type for this network.
*
* @param ocspType value to set.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setOcsp(::android::hardware::wifi::supplicant::V1_3::OcspType ocspType, setOcsp_cb _hidl_cb) = 0;
/**
* Return callback for getOcsp
*/
using getOcsp_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::wifi::supplicant::V1_3::OcspType ocspType)>;
/**
* Get OCSP (Online Certificate Status Protocol) type for this network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return ocspType ocsp type.
*/
virtual ::android::hardware::Return<void> getOcsp(getOcsp_cb _hidl_cb) = 0;
/**
* Return callback for setKeyMgmt_1_3
*/
using setKeyMgmt_1_3_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set key management mask for the network.
*
* @param keyMgmtMask value to set.
* Combination of |KeyMgmtMask| values.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|
*/
virtual ::android::hardware::Return<void> setKeyMgmt_1_3(::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask> keyMgmtMask, setKeyMgmt_1_3_cb _hidl_cb) = 0;
/**
* Return callback for getKeyMgmt_1_3
*/
using getKeyMgmt_1_3_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask> keyMgmtMask)>;
/**
* Get the key mgmt mask set for the network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|
* @return keyMgmtMask Combination of |KeyMgmtMask| values.
*/
virtual ::android::hardware::Return<void> getKeyMgmt_1_3(getKeyMgmt_1_3_cb _hidl_cb) = 0;
/**
* Return callback for setProto_1_3
*/
using setProto_1_3_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set proto mask for the network.
*
* @param protoMask value to set.
* Combination of |ProtoMask| values.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|
*/
virtual ::android::hardware::Return<void> setProto_1_3(::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask> protoMask, setProto_1_3_cb _hidl_cb) = 0;
/**
* Return callback for getProto_1_3
*/
using getProto_1_3_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask> protoMask)>;
/**
* Get the proto mask set for the network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|
* @return protoMask Combination of |ProtoMask| values.
*/
virtual ::android::hardware::Return<void> getProto_1_3(getProto_1_3_cb _hidl_cb) = 0;
/**
* Return callback for setGroupCipher_1_3
*/
using setGroupCipher_1_3_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set group cipher mask for the network.
*
* @param groupCipherMask value to set.
* Combination of |ProtoMask| values.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|
*/
virtual ::android::hardware::Return<void> setGroupCipher_1_3(::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask> groupCipherMask, setGroupCipher_1_3_cb _hidl_cb) = 0;
/**
* Return callback for getPairwiseCipher_1_3
*/
using getPairwiseCipher_1_3_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask> pairwiseCipherMask)>;
/**
* Get the pairwise cipher mask set for the network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|
* @return pairwiseCipherMask Combination of |PairwiseCipherMask| values.
*/
virtual ::android::hardware::Return<void> getPairwiseCipher_1_3(getPairwiseCipher_1_3_cb _hidl_cb) = 0;
/**
* Return callback for setPairwiseCipher_1_3
*/
using setPairwiseCipher_1_3_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set pairwise cipher mask for the network.
*
* @param pairwiseCipherMask value to set.
* Combination of |ProtoMask| values.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|
*/
virtual ::android::hardware::Return<void> setPairwiseCipher_1_3(::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask> pairwiseCipherMask, setPairwiseCipher_1_3_cb _hidl_cb) = 0;
/**
* Return callback for getGroupCipher_1_3
*/
using getGroupCipher_1_3_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask> groupCipherMask)>;
/**
* Get the group cipher mask set for the network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|
* @return groupCipherMask Combination of |GroupCipherMask| values.
*/
virtual ::android::hardware::Return<void> getGroupCipher_1_3(getGroupCipher_1_3_cb _hidl_cb) = 0;
/**
* Return callback for setWapiCertSuite
*/
using setWapiCertSuite_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set WAPI certificate suite name for this network.
*
* @param suite value to set.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|
*/
virtual ::android::hardware::Return<void> setWapiCertSuite(const ::android::hardware::hidl_string& suite, setWapiCertSuite_cb _hidl_cb) = 0;
/**
* Return callback for getWapiCertSuite
*/
using getWapiCertSuite_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_string& suite)>;
/**
* Get WAPI certificate suite name set for this network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|
* @return suite The name of a suite.
*/
virtual ::android::hardware::Return<void> getWapiCertSuite(getWapiCertSuite_cb _hidl_cb) = 0;
/**
* Return callback for setPmkCache
*/
using setPmkCache_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Add a pairwise master key (PMK) into supplicant PMK cache.
*
* @param serializedEntry is serialized PMK cache entry, the content is
* opaque for the framework and depends on the native implementation.
* @return status Status of the operation
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setPmkCache(const ::android::hardware::hidl_vec<uint8_t>& serializedEntry, setPmkCache_cb _hidl_cb) = 0;
/**
* Return callback for setAuthAlg_1_3
*/
using setAuthAlg_1_3_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Set auth alg mask for the network.
*
* @param authAlgMask value to set.
* Combination of |ProtoMask| values.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_ARGS_INVALID|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setAuthAlg_1_3(::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask> authAlgMask, setAuthAlg_1_3_cb _hidl_cb) = 0;
/**
* Return callback for getAuthAlg_1_3
*/
using getAuthAlg_1_3_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask> authAlgMask)>;
/**
* Get the auth alg mask set for the network.
*
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
* @return authAlgMask Combination of |AuthAlgMask| values.
*/
virtual ::android::hardware::Return<void> getAuthAlg_1_3(getAuthAlg_1_3_cb _hidl_cb) = 0;
/**
* Return callback for setEapErp
*/
using setEapErp_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>;
/**
* Enable Extensible Authentication (EAP) - Re-authentication Protocol (ERP) for this network.
*
* @param enable true to set, false otherwise.
* @return status Status of the operation.
* Possible status codes:
* |SupplicantStatusCode.SUCCESS|,
* |SupplicantStatusCode.FAILURE_UNKNOWN|,
* |SupplicantStatusCode.FAILURE_NETWORK_INVALID|
*/
virtual ::android::hardware::Return<void> setEapErp(bool enable, setEapErp_cb _hidl_cb) = 0;
/**
* Return callback for interfaceChain
*/
using interfaceChain_cb = std::function<void(const ::android::hardware::hidl_vec<::android::hardware::hidl_string>& descriptors)>;
/*
* Provides run-time type information for this object.
* For example, for the following interface definition:
* package android.hardware.foo@1.0;
* interface IParent {};
* interface IChild extends IParent {};
* Calling interfaceChain on an IChild object must yield the following:
* ["android.hardware.foo@1.0::IChild",
* "android.hardware.foo@1.0::IParent"
* "android.hidl.base@1.0::IBase"]
*
* @return descriptors a vector of descriptors of the run-time type of the
* object.
*/
virtual ::android::hardware::Return<void> interfaceChain(interfaceChain_cb _hidl_cb) override;
/*
* Emit diagnostic information to the given file.
*
* Optionally overriden.
*
* @param fd File descriptor to dump data to.
* Must only be used for the duration of this call.
* @param options Arguments for debugging.
* Must support empty for default debug information.
*/
virtual ::android::hardware::Return<void> debug(const ::android::hardware::hidl_handle& fd, const ::android::hardware::hidl_vec<::android::hardware::hidl_string>& options) override;
/**
* Return callback for interfaceDescriptor
*/
using interfaceDescriptor_cb = std::function<void(const ::android::hardware::hidl_string& descriptor)>;
/*
* Provides run-time type information for this object.
* For example, for the following interface definition:
* package android.hardware.foo@1.0;
* interface IParent {};
* interface IChild extends IParent {};
* Calling interfaceDescriptor on an IChild object must yield
* "android.hardware.foo@1.0::IChild"
*
* @return descriptor a descriptor of the run-time type of the
* object (the first element of the vector returned by
* interfaceChain())
*/
virtual ::android::hardware::Return<void> interfaceDescriptor(interfaceDescriptor_cb _hidl_cb) override;
/**
* Return callback for getHashChain
*/
using getHashChain_cb = std::function<void(const ::android::hardware::hidl_vec<::android::hardware::hidl_array<uint8_t, 32>>& hashchain)>;
/*
* Returns hashes of the source HAL files that define the interfaces of the
* runtime type information on the object.
* For example, for the following interface definition:
* package android.hardware.foo@1.0;
* interface IParent {};
* interface IChild extends IParent {};
* Calling interfaceChain on an IChild object must yield the following:
* [(hash of IChild.hal),
* (hash of IParent.hal)
* (hash of IBase.hal)].
*
* SHA-256 is used as the hashing algorithm. Each hash has 32 bytes
* according to SHA-256 standard.
*
* @return hashchain a vector of SHA-1 digests
*/
virtual ::android::hardware::Return<void> getHashChain(getHashChain_cb _hidl_cb) override;
/*
* This method trigger the interface to enable/disable instrumentation based
* on system property hal.instrumentation.enable.
*/
virtual ::android::hardware::Return<void> setHALInstrumentation() override;
/*
* Registers a death recipient, to be called when the process hosting this
* interface dies.
*
* @param recipient a hidl_death_recipient callback object
* @param cookie a cookie that must be returned with the callback
* @return success whether the death recipient was registered successfully.
*/
virtual ::android::hardware::Return<bool> linkToDeath(const ::android::sp<::android::hardware::hidl_death_recipient>& recipient, uint64_t cookie) override;
/*
* Provides way to determine if interface is running without requesting
* any functionality.
*/
virtual ::android::hardware::Return<void> ping() override;
/**
* Return callback for getDebugInfo
*/
using getDebugInfo_cb = std::function<void(const ::android::hidl::base::V1_0::DebugInfo& info)>;
/*
* Get debug information on references on this interface.
* @return info debugging information. See comments of DebugInfo.
*/
virtual ::android::hardware::Return<void> getDebugInfo(getDebugInfo_cb _hidl_cb) override;
/*
* This method notifies the interface that one or more system properties
* have changed. The default implementation calls
* (C++) report_sysprop_change() in libcutils or
* (Java) android.os.SystemProperties.reportSyspropChanged,
* which in turn calls a set of registered callbacks (eg to update trace
* tags).
*/
virtual ::android::hardware::Return<void> notifySyspropsChanged() override;
/*
* Unregisters the registered death recipient. If this service was registered
* multiple times with the same exact death recipient, this unlinks the most
* recently registered one.
*
* @param recipient a previously registered hidl_death_recipient callback
* @return success whether the death recipient was unregistered successfully.
*/
virtual ::android::hardware::Return<bool> unlinkToDeath(const ::android::sp<::android::hardware::hidl_death_recipient>& recipient) override;
// cast static functions
/**
* This performs a checked cast based on what the underlying implementation actually is.
*/
static ::android::hardware::Return<::android::sp<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork>> castFrom(const ::android::sp<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork>& parent, bool emitError = false);
/**
* This performs a checked cast based on what the underlying implementation actually is.
*/
static ::android::hardware::Return<::android::sp<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork>> castFrom(const ::android::sp<::android::hardware::wifi::supplicant::V1_2::ISupplicantStaNetwork>& parent, bool emitError = false);
/**
* This performs a checked cast based on what the underlying implementation actually is.
*/
static ::android::hardware::Return<::android::sp<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork>> castFrom(const ::android::sp<::android::hardware::wifi::supplicant::V1_1::ISupplicantStaNetwork>& parent, bool emitError = false);
/**
* This performs a checked cast based on what the underlying implementation actually is.
*/
static ::android::hardware::Return<::android::sp<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork>> castFrom(const ::android::sp<::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetwork>& parent, bool emitError = false);
/**
* This performs a checked cast based on what the underlying implementation actually is.
*/
static ::android::hardware::Return<::android::sp<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork>> castFrom(const ::android::sp<::android::hardware::wifi::supplicant::V1_0::ISupplicantNetwork>& parent, bool emitError = false);
/**
* This performs a checked cast based on what the underlying implementation actually is.
*/
static ::android::hardware::Return<::android::sp<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork>> castFrom(const ::android::sp<::android::hidl::base::V1_0::IBase>& parent, bool emitError = false);
// helper methods for interactions with the hwservicemanager
/**
* This gets the service of this type with the specified instance name. If the
* service is currently not available or not in the VINTF manifest on a Trebilized
* device, this will return nullptr. This is useful when you don't want to block
* during device boot. If getStub is true, this will try to return an unwrapped
* passthrough implementation in the same process. This is useful when getting an
* implementation from the same partition/compilation group.
*
* In general, prefer getService(std::string,bool)
*/
static ::android::sp<ISupplicantStaNetwork> tryGetService(const std::string &serviceName="default", bool getStub=false);
/**
* Deprecated. See tryGetService(std::string, bool)
*/
static ::android::sp<ISupplicantStaNetwork> tryGetService(const char serviceName[], bool getStub=false) { std::string str(serviceName ? serviceName : ""); return tryGetService(str, getStub); }
/**
* Deprecated. See tryGetService(std::string, bool)
*/
static ::android::sp<ISupplicantStaNetwork> tryGetService(const ::android::hardware::hidl_string& serviceName, bool getStub=false) { std::string str(serviceName.c_str()); return tryGetService(str, getStub); }
/**
* Calls tryGetService("default", bool). This is the recommended instance name for singleton services.
*/
static ::android::sp<ISupplicantStaNetwork> tryGetService(bool getStub) { return tryGetService("default", getStub); }
/**
* This gets the service of this type with the specified instance name. If the
* service is not in the VINTF manifest on a Trebilized device, this will return
* nullptr. If the service is not available, this will wait for the service to
* become available. If the service is a lazy service, this will start the service
* and return when it becomes available. If getStub is true, this will try to
* return an unwrapped passthrough implementation in the same process. This is
* useful when getting an implementation from the same partition/compilation group.
*/
static ::android::sp<ISupplicantStaNetwork> getService(const std::string &serviceName="default", bool getStub=false);
/**
* Deprecated. See getService(std::string, bool)
*/
static ::android::sp<ISupplicantStaNetwork> getService(const char serviceName[], bool getStub=false) { std::string str(serviceName ? serviceName : ""); return getService(str, getStub); }
/**
* Deprecated. See getService(std::string, bool)
*/
static ::android::sp<ISupplicantStaNetwork> getService(const ::android::hardware::hidl_string& serviceName, bool getStub=false) { std::string str(serviceName.c_str()); return getService(str, getStub); }
/**
* Calls getService("default", bool). This is the recommended instance name for singleton services.
*/
static ::android::sp<ISupplicantStaNetwork> getService(bool getStub) { return getService("default", getStub); }
/**
* Registers a service with the service manager. For Trebilized devices, the service
* must also be in the VINTF manifest.
*/
__attribute__ ((warn_unused_result))::android::status_t registerAsService(const std::string &serviceName="default");
/**
* Registers for notifications for when a service is registered.
*/
static bool registerForNotifications(
const std::string &serviceName,
const ::android::sp<::android::hidl::manager::V1_0::IServiceNotification> &notification);
};
//
// type declarations for package
//
template<typename>
static inline std::string toString(uint32_t o);
static inline std::string toString(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask o);
static inline void PrintTo(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask o, ::std::ostream* os);
constexpr uint32_t operator|(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask rhs) {
return static_cast<uint32_t>(static_cast<uint32_t>(lhs) | static_cast<uint32_t>(rhs));
}
constexpr uint32_t operator|(const uint32_t lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask rhs) {
return static_cast<uint32_t>(lhs | static_cast<uint32_t>(rhs));
}
constexpr uint32_t operator|(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask lhs, const uint32_t rhs) {
return static_cast<uint32_t>(static_cast<uint32_t>(lhs) | rhs);
}
constexpr uint32_t operator&(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask rhs) {
return static_cast<uint32_t>(static_cast<uint32_t>(lhs) & static_cast<uint32_t>(rhs));
}
constexpr uint32_t operator&(const uint32_t lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask rhs) {
return static_cast<uint32_t>(lhs & static_cast<uint32_t>(rhs));
}
constexpr uint32_t operator&(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask lhs, const uint32_t rhs) {
return static_cast<uint32_t>(static_cast<uint32_t>(lhs) & rhs);
}
constexpr uint32_t &operator|=(uint32_t& v, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask e) {
v |= static_cast<uint32_t>(e);
return v;
}
constexpr uint32_t &operator&=(uint32_t& v, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask e) {
v &= static_cast<uint32_t>(e);
return v;
}
template<typename>
static inline std::string toString(uint32_t o);
static inline std::string toString(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask o);
static inline void PrintTo(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask o, ::std::ostream* os);
constexpr uint32_t operator|(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask rhs) {
return static_cast<uint32_t>(static_cast<uint32_t>(lhs) | static_cast<uint32_t>(rhs));
}
constexpr uint32_t operator|(const uint32_t lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask rhs) {
return static_cast<uint32_t>(lhs | static_cast<uint32_t>(rhs));
}
constexpr uint32_t operator|(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask lhs, const uint32_t rhs) {
return static_cast<uint32_t>(static_cast<uint32_t>(lhs) | rhs);
}
constexpr uint32_t operator&(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask rhs) {
return static_cast<uint32_t>(static_cast<uint32_t>(lhs) & static_cast<uint32_t>(rhs));
}
constexpr uint32_t operator&(const uint32_t lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask rhs) {
return static_cast<uint32_t>(lhs & static_cast<uint32_t>(rhs));
}
constexpr uint32_t operator&(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask lhs, const uint32_t rhs) {
return static_cast<uint32_t>(static_cast<uint32_t>(lhs) & rhs);
}
constexpr uint32_t &operator|=(uint32_t& v, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask e) {
v |= static_cast<uint32_t>(e);
return v;
}
constexpr uint32_t &operator&=(uint32_t& v, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask e) {
v &= static_cast<uint32_t>(e);
return v;
}
template<typename>
static inline std::string toString(uint32_t o);
static inline std::string toString(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask o);
static inline void PrintTo(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask o, ::std::ostream* os);
constexpr uint32_t operator|(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask rhs) {
return static_cast<uint32_t>(static_cast<uint32_t>(lhs) | static_cast<uint32_t>(rhs));
}
constexpr uint32_t operator|(const uint32_t lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask rhs) {
return static_cast<uint32_t>(lhs | static_cast<uint32_t>(rhs));
}
constexpr uint32_t operator|(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask lhs, const uint32_t rhs) {
return static_cast<uint32_t>(static_cast<uint32_t>(lhs) | rhs);
}
constexpr uint32_t operator&(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask rhs) {
return static_cast<uint32_t>(static_cast<uint32_t>(lhs) & static_cast<uint32_t>(rhs));
}
constexpr uint32_t operator&(const uint32_t lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask rhs) {
return static_cast<uint32_t>(lhs & static_cast<uint32_t>(rhs));
}
constexpr uint32_t operator&(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask lhs, const uint32_t rhs) {
return static_cast<uint32_t>(static_cast<uint32_t>(lhs) & rhs);
}
constexpr uint32_t &operator|=(uint32_t& v, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask e) {
v |= static_cast<uint32_t>(e);
return v;
}
constexpr uint32_t &operator&=(uint32_t& v, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask e) {
v &= static_cast<uint32_t>(e);
return v;
}
template<typename>
static inline std::string toString(uint32_t o);
static inline std::string toString(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask o);
static inline void PrintTo(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask o, ::std::ostream* os);
constexpr uint32_t operator|(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask rhs) {
return static_cast<uint32_t>(static_cast<uint32_t>(lhs) | static_cast<uint32_t>(rhs));
}
constexpr uint32_t operator|(const uint32_t lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask rhs) {
return static_cast<uint32_t>(lhs | static_cast<uint32_t>(rhs));
}
constexpr uint32_t operator|(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask lhs, const uint32_t rhs) {
return static_cast<uint32_t>(static_cast<uint32_t>(lhs) | rhs);
}
constexpr uint32_t operator&(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask rhs) {
return static_cast<uint32_t>(static_cast<uint32_t>(lhs) & static_cast<uint32_t>(rhs));
}
constexpr uint32_t operator&(const uint32_t lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask rhs) {
return static_cast<uint32_t>(lhs & static_cast<uint32_t>(rhs));
}
constexpr uint32_t operator&(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask lhs, const uint32_t rhs) {
return static_cast<uint32_t>(static_cast<uint32_t>(lhs) & rhs);
}
constexpr uint32_t &operator|=(uint32_t& v, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask e) {
v |= static_cast<uint32_t>(e);
return v;
}
constexpr uint32_t &operator&=(uint32_t& v, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask e) {
v &= static_cast<uint32_t>(e);
return v;
}
template<typename>
static inline std::string toString(uint32_t o);
static inline std::string toString(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask o);
static inline void PrintTo(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask o, ::std::ostream* os);
constexpr uint32_t operator|(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask rhs) {
return static_cast<uint32_t>(static_cast<uint32_t>(lhs) | static_cast<uint32_t>(rhs));
}
constexpr uint32_t operator|(const uint32_t lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask rhs) {
return static_cast<uint32_t>(lhs | static_cast<uint32_t>(rhs));
}
constexpr uint32_t operator|(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask lhs, const uint32_t rhs) {
return static_cast<uint32_t>(static_cast<uint32_t>(lhs) | rhs);
}
constexpr uint32_t operator&(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask rhs) {
return static_cast<uint32_t>(static_cast<uint32_t>(lhs) & static_cast<uint32_t>(rhs));
}
constexpr uint32_t operator&(const uint32_t lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask rhs) {
return static_cast<uint32_t>(lhs & static_cast<uint32_t>(rhs));
}
constexpr uint32_t operator&(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask lhs, const uint32_t rhs) {
return static_cast<uint32_t>(static_cast<uint32_t>(lhs) & rhs);
}
constexpr uint32_t &operator|=(uint32_t& v, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask e) {
v |= static_cast<uint32_t>(e);
return v;
}
constexpr uint32_t &operator&=(uint32_t& v, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask e) {
v &= static_cast<uint32_t>(e);
return v;
}
static inline std::string toString(const ::android::sp<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork>& o);
//
// type header definitions for package
//
template<>
inline std::string toString<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask>(uint32_t o) {
using ::android::hardware::details::toHexString;
std::string os;
::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask> flipped = 0;
bool first = true;
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::WPA) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::WPA)) {
os += (first ? "" : " | ");
os += "WPA";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::WPA;
}
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::RSN) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::RSN)) {
os += (first ? "" : " | ");
os += "RSN";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::RSN;
}
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::OSEN) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::OSEN)) {
os += (first ? "" : " | ");
os += "OSEN";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::OSEN;
}
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::WAPI) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::WAPI)) {
os += (first ? "" : " | ");
os += "WAPI";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::WAPI;
}
if (o != flipped) {
os += (first ? "" : " | ");
os += toHexString(o & (~flipped));
}os += " (";
os += toHexString(o);
os += ")";
return os;
}
static inline std::string toString(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask o) {
using ::android::hardware::details::toHexString;
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::WPA) {
return "WPA";
}
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::RSN) {
return "RSN";
}
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::OSEN) {
return "OSEN";
}
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::WAPI) {
return "WAPI";
}
std::string os;
os += toHexString(static_cast<uint32_t>(o));
return os;
}
static inline void PrintTo(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask o, ::std::ostream* os) {
*os << toString(o);
}
template<>
inline std::string toString<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask>(uint32_t o) {
using ::android::hardware::details::toHexString;
std::string os;
::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask> flipped = 0;
bool first = true;
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_EAP) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_EAP)) {
os += (first ? "" : " | ");
os += "WPA_EAP";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_EAP;
}
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_PSK) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_PSK)) {
os += (first ? "" : " | ");
os += "WPA_PSK";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_PSK;
}
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::NONE) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::NONE)) {
os += (first ? "" : " | ");
os += "NONE";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::NONE;
}
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::IEEE8021X) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::IEEE8021X)) {
os += (first ? "" : " | ");
os += "IEEE8021X";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::IEEE8021X;
}
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FT_EAP) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FT_EAP)) {
os += (first ? "" : " | ");
os += "FT_EAP";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FT_EAP;
}
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FT_PSK) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FT_PSK)) {
os += (first ? "" : " | ");
os += "FT_PSK";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FT_PSK;
}
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::OSEN) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::OSEN)) {
os += (first ? "" : " | ");
os += "OSEN";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::OSEN;
}
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_EAP_SHA256) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_EAP_SHA256)) {
os += (first ? "" : " | ");
os += "WPA_EAP_SHA256";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_EAP_SHA256;
}
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_PSK_SHA256) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_PSK_SHA256)) {
os += (first ? "" : " | ");
os += "WPA_PSK_SHA256";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_PSK_SHA256;
}
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::SAE) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::SAE)) {
os += (first ? "" : " | ");
os += "SAE";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::SAE;
}
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::SUITE_B_192) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::SUITE_B_192)) {
os += (first ? "" : " | ");
os += "SUITE_B_192";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::SUITE_B_192;
}
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::OWE) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::OWE)) {
os += (first ? "" : " | ");
os += "OWE";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::OWE;
}
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::DPP) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::DPP)) {
os += (first ? "" : " | ");
os += "DPP";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::DPP;
}
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WAPI_PSK) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WAPI_PSK)) {
os += (first ? "" : " | ");
os += "WAPI_PSK";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WAPI_PSK;
}
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WAPI_CERT) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WAPI_CERT)) {
os += (first ? "" : " | ");
os += "WAPI_CERT";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WAPI_CERT;
}
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FILS_SHA256) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FILS_SHA256)) {
os += (first ? "" : " | ");
os += "FILS_SHA256";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FILS_SHA256;
}
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FILS_SHA384) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FILS_SHA384)) {
os += (first ? "" : " | ");
os += "FILS_SHA384";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FILS_SHA384;
}
if (o != flipped) {
os += (first ? "" : " | ");
os += toHexString(o & (~flipped));
}os += " (";
os += toHexString(o);
os += ")";
return os;
}
static inline std::string toString(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask o) {
using ::android::hardware::details::toHexString;
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_EAP) {
return "WPA_EAP";
}
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_PSK) {
return "WPA_PSK";
}
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::NONE) {
return "NONE";
}
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::IEEE8021X) {
return "IEEE8021X";
}
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FT_EAP) {
return "FT_EAP";
}
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FT_PSK) {
return "FT_PSK";
}
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::OSEN) {
return "OSEN";
}
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_EAP_SHA256) {
return "WPA_EAP_SHA256";
}
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_PSK_SHA256) {
return "WPA_PSK_SHA256";
}
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::SAE) {
return "SAE";
}
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::SUITE_B_192) {
return "SUITE_B_192";
}
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::OWE) {
return "OWE";
}
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::DPP) {
return "DPP";
}
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WAPI_PSK) {
return "WAPI_PSK";
}
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WAPI_CERT) {
return "WAPI_CERT";
}
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FILS_SHA256) {
return "FILS_SHA256";
}
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FILS_SHA384) {
return "FILS_SHA384";
}
std::string os;
os += toHexString(static_cast<uint32_t>(o));
return os;
}
static inline void PrintTo(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask o, ::std::ostream* os) {
*os << toString(o);
}
template<>
inline std::string toString<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask>(uint32_t o) {
using ::android::hardware::details::toHexString;
std::string os;
::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask> flipped = 0;
bool first = true;
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::NONE) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::NONE)) {
os += (first ? "" : " | ");
os += "NONE";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::NONE;
}
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::TKIP) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::TKIP)) {
os += (first ? "" : " | ");
os += "TKIP";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::TKIP;
}
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::CCMP) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::CCMP)) {
os += (first ? "" : " | ");
os += "CCMP";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::CCMP;
}
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::GCMP_256) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::GCMP_256)) {
os += (first ? "" : " | ");
os += "GCMP_256";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::GCMP_256;
}
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::SMS4) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::SMS4)) {
os += (first ? "" : " | ");
os += "SMS4";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::SMS4;
}
if (o != flipped) {
os += (first ? "" : " | ");
os += toHexString(o & (~flipped));
}os += " (";
os += toHexString(o);
os += ")";
return os;
}
static inline std::string toString(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask o) {
using ::android::hardware::details::toHexString;
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::NONE) {
return "NONE";
}
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::TKIP) {
return "TKIP";
}
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::CCMP) {
return "CCMP";
}
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::GCMP_256) {
return "GCMP_256";
}
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::SMS4) {
return "SMS4";
}
std::string os;
os += toHexString(static_cast<uint32_t>(o));
return os;
}
static inline void PrintTo(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask o, ::std::ostream* os) {
*os << toString(o);
}
template<>
inline std::string toString<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask>(uint32_t o) {
using ::android::hardware::details::toHexString;
std::string os;
::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask> flipped = 0;
bool first = true;
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::WEP40) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::WEP40)) {
os += (first ? "" : " | ");
os += "WEP40";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::WEP40;
}
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::WEP104) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::WEP104)) {
os += (first ? "" : " | ");
os += "WEP104";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::WEP104;
}
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::TKIP) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::TKIP)) {
os += (first ? "" : " | ");
os += "TKIP";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::TKIP;
}
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::CCMP) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::CCMP)) {
os += (first ? "" : " | ");
os += "CCMP";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::CCMP;
}
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::GTK_NOT_USED) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::GTK_NOT_USED)) {
os += (first ? "" : " | ");
os += "GTK_NOT_USED";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::GTK_NOT_USED;
}
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::GCMP_256) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::GCMP_256)) {
os += (first ? "" : " | ");
os += "GCMP_256";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::GCMP_256;
}
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::SMS4) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::SMS4)) {
os += (first ? "" : " | ");
os += "SMS4";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::SMS4;
}
if (o != flipped) {
os += (first ? "" : " | ");
os += toHexString(o & (~flipped));
}os += " (";
os += toHexString(o);
os += ")";
return os;
}
static inline std::string toString(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask o) {
using ::android::hardware::details::toHexString;
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::WEP40) {
return "WEP40";
}
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::WEP104) {
return "WEP104";
}
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::TKIP) {
return "TKIP";
}
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::CCMP) {
return "CCMP";
}
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::GTK_NOT_USED) {
return "GTK_NOT_USED";
}
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::GCMP_256) {
return "GCMP_256";
}
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::SMS4) {
return "SMS4";
}
std::string os;
os += toHexString(static_cast<uint32_t>(o));
return os;
}
static inline void PrintTo(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask o, ::std::ostream* os) {
*os << toString(o);
}
template<>
inline std::string toString<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask>(uint32_t o) {
using ::android::hardware::details::toHexString;
std::string os;
::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask> flipped = 0;
bool first = true;
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::OPEN) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::OPEN)) {
os += (first ? "" : " | ");
os += "OPEN";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::OPEN;
}
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::SHARED) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::SHARED)) {
os += (first ? "" : " | ");
os += "SHARED";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::SHARED;
}
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::LEAP) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::LEAP)) {
os += (first ? "" : " | ");
os += "LEAP";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::LEAP;
}
if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::SAE) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::SAE)) {
os += (first ? "" : " | ");
os += "SAE";
first = false;
flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::SAE;
}
if (o != flipped) {
os += (first ? "" : " | ");
os += toHexString(o & (~flipped));
}os += " (";
os += toHexString(o);
os += ")";
return os;
}
static inline std::string toString(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask o) {
using ::android::hardware::details::toHexString;
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::OPEN) {
return "OPEN";
}
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::SHARED) {
return "SHARED";
}
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::LEAP) {
return "LEAP";
}
if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::SAE) {
return "SAE";
}
std::string os;
os += toHexString(static_cast<uint32_t>(o));
return os;
}
static inline void PrintTo(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask o, ::std::ostream* os) {
*os << toString(o);
}
static inline std::string toString(const ::android::sp<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork>& o) {
std::string os = "[class or subclass of ";
os += ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::descriptor;
os += "]";
os += o->isRemote() ? "@remote" : "@local";
return os;
}
} // namespace V1_3
} // namespace supplicant
} // namespace wifi
} // namespace hardware
} // namespace android
//
// global type declarations for package
//
namespace android {
namespace hardware {
namespace details {
#pragma clang diagnostic push
#pragma clang diagnostic ignored "-Wc++17-extensions"
template<> inline constexpr std::array<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask, 4> hidl_enum_values<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask> = {
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::WPA,
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::RSN,
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::OSEN,
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::WAPI,
};
#pragma clang diagnostic pop
} // namespace details
} // namespace hardware
} // namespace android
namespace android {
namespace hardware {
namespace details {
#pragma clang diagnostic push
#pragma clang diagnostic ignored "-Wc++17-extensions"
template<> inline constexpr std::array<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask, 17> hidl_enum_values<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask> = {
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_EAP,
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_PSK,
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::NONE,
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::IEEE8021X,
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FT_EAP,
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FT_PSK,
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::OSEN,
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_EAP_SHA256,
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_PSK_SHA256,
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::SAE,
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::SUITE_B_192,
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::OWE,
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::DPP,
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WAPI_PSK,
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WAPI_CERT,
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FILS_SHA256,
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FILS_SHA384,
};
#pragma clang diagnostic pop
} // namespace details
} // namespace hardware
} // namespace android
namespace android {
namespace hardware {
namespace details {
#pragma clang diagnostic push
#pragma clang diagnostic ignored "-Wc++17-extensions"
template<> inline constexpr std::array<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask, 5> hidl_enum_values<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask> = {
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::NONE,
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::TKIP,
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::CCMP,
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::GCMP_256,
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::SMS4,
};
#pragma clang diagnostic pop
} // namespace details
} // namespace hardware
} // namespace android
namespace android {
namespace hardware {
namespace details {
#pragma clang diagnostic push
#pragma clang diagnostic ignored "-Wc++17-extensions"
template<> inline constexpr std::array<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask, 7> hidl_enum_values<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask> = {
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::WEP40,
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::WEP104,
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::TKIP,
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::CCMP,
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::GTK_NOT_USED,
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::GCMP_256,
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::SMS4,
};
#pragma clang diagnostic pop
} // namespace details
} // namespace hardware
} // namespace android
namespace android {
namespace hardware {
namespace details {
#pragma clang diagnostic push
#pragma clang diagnostic ignored "-Wc++17-extensions"
template<> inline constexpr std::array<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask, 4> hidl_enum_values<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask> = {
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::OPEN,
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::SHARED,
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::LEAP,
::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::SAE,
};
#pragma clang diagnostic pop
} // namespace details
} // namespace hardware
} // namespace android
#endif // HIDL_GENERATED_ANDROID_HARDWARE_WIFI_SUPPLICANT_V1_3_ISUPPLICANTSTANETWORK_H