| #ifndef HIDL_GENERATED_ANDROID_HARDWARE_WIFI_SUPPLICANT_V1_3_ISUPPLICANTSTANETWORK_H |
| #define HIDL_GENERATED_ANDROID_HARDWARE_WIFI_SUPPLICANT_V1_3_ISUPPLICANTSTANETWORK_H |
| |
| #include <android/hardware/wifi/supplicant/1.0/ISupplicantStaNetwork.h> |
| #include <android/hardware/wifi/supplicant/1.0/types.h> |
| #include <android/hardware/wifi/supplicant/1.2/ISupplicantStaNetwork.h> |
| #include <android/hardware/wifi/supplicant/1.3/types.h> |
| |
| #include <android/hidl/manager/1.0/IServiceNotification.h> |
| |
| #include <hidl/HidlSupport.h> |
| #include <hidl/MQDescriptor.h> |
| #include <hidl/Status.h> |
| #include <utils/NativeHandle.h> |
| #include <utils/misc.h> |
| |
| namespace android { |
| namespace hardware { |
| namespace wifi { |
| namespace supplicant { |
| namespace V1_3 { |
| |
| /** |
| * Interface exposed by the supplicant for each station mode network |
| * configuration it controls. |
| */ |
| struct ISupplicantStaNetwork : public ::android::hardware::wifi::supplicant::V1_2::ISupplicantStaNetwork { |
| /** |
| * Type tag for use in template logic that indicates this is a 'pure' class. |
| */ |
| typedef ::android::hardware::details::i_tag _hidl_tag; |
| |
| /** |
| * Fully qualified interface name: "android.hardware.wifi.supplicant@1.3::ISupplicantStaNetwork" |
| */ |
| static const char* descriptor; |
| |
| // Forward declaration for forward reference support: |
| enum class ProtoMask : uint32_t; |
| enum class KeyMgmtMask : uint32_t; |
| enum class PairwiseCipherMask : uint32_t; |
| enum class GroupCipherMask : uint32_t; |
| enum class AuthAlgMask : uint32_t; |
| |
| /** |
| * Possible mask of values for Proto param. |
| */ |
| enum class ProtoMask : uint32_t { |
| WPA = 1u /* 1 << 0 */, |
| RSN = 2u /* 1 << 1 */, |
| /** |
| * Unused 1 << 2 |
| */ |
| OSEN = 8u /* 1 << 3 */, |
| WAPI = 4u /* 1 << 2 */, |
| }; |
| |
| /** |
| * Possible mask of values for KeyMgmt param. |
| */ |
| enum class KeyMgmtMask : uint32_t { |
| WPA_EAP = 1u /* 1 << 0 */, |
| WPA_PSK = 2u /* 1 << 1 */, |
| NONE = 4u /* 1 << 2 */, |
| IEEE8021X = 8u /* 1 << 3 */, |
| FT_EAP = 32u /* 1 << 5 */, |
| FT_PSK = 64u /* 1 << 6 */, |
| OSEN = 32768u /* 1 << 15 */, |
| /** |
| * WPA using EAP authentication with stronger SHA256-based algorithms |
| */ |
| WPA_EAP_SHA256 = 128u /* 1 << 7 */, |
| /** |
| * WPA pre-shared key with stronger SHA256-based algorithms |
| */ |
| WPA_PSK_SHA256 = 256u /* 1 << 8 */, |
| /** |
| * WPA3-Personal SAE Key management |
| */ |
| SAE = 1024u /* 1 << 10 */, |
| /** |
| * WPA3-Enterprise Suite-B Key management |
| */ |
| SUITE_B_192 = 131072u /* 1 << 17 */, |
| /** |
| * Enhacned Open (OWE) Key management |
| */ |
| OWE = 4194304u /* 1 << 22 */, |
| /** |
| * Easy Connect (DPP) Key management |
| */ |
| DPP = 8388608u /* 1 << 23 */, |
| /* |
| * WAPI Psk |
| */ |
| WAPI_PSK = 4096u /* 1 << 12 */, |
| /** |
| * WAPI Cert |
| */ |
| WAPI_CERT = 8192u /* 1 << 13 */, |
| /** |
| * FILS shared key authentication with sha-256 |
| */ |
| FILS_SHA256 = 262144u /* 1 << 18 */, |
| /** |
| * FILS shared key authentication with sha-384 |
| */ |
| FILS_SHA384 = 524288u /* 1 << 19 */, |
| }; |
| |
| /** |
| * Possible mask of values for PairwiseCipher param. |
| */ |
| enum class PairwiseCipherMask : uint32_t { |
| NONE = 1u /* 1 << 0 */, |
| TKIP = 8u /* 1 << 3 */, |
| CCMP = 16u /* 1 << 4 */, |
| /** |
| * GCMP-256 Pairwise Cipher |
| */ |
| GCMP_256 = 256u /* 1 << 8 */, |
| /** |
| * SMS4 Pairwise Cipher |
| */ |
| SMS4 = 128u /* 1 << 7 */, |
| }; |
| |
| /** |
| * Possible mask of values for GroupCipher param. |
| */ |
| enum class GroupCipherMask : uint32_t { |
| WEP40 = 2u /* 1 << 1 */, |
| WEP104 = 4u /* 1 << 2 */, |
| TKIP = 8u /* 1 << 3 */, |
| CCMP = 16u /* 1 << 4 */, |
| GTK_NOT_USED = 16384u /* 1 << 14 */, |
| /** |
| * GCMP-256 Group Cipher |
| */ |
| GCMP_256 = 256u /* 1 << 8 */, |
| /** |
| * SMS4 Group Cipher |
| */ |
| SMS4 = 128u /* 1 << 7 */, |
| }; |
| |
| /** |
| * Possible mask of values for AuthAlg param. |
| */ |
| enum class AuthAlgMask : uint32_t { |
| OPEN = 1u /* 1 << 0 */, |
| SHARED = 2u /* 1 << 1 */, |
| LEAP = 4u /* 1 << 2 */, |
| SAE = 16u /* 1 << 4 */, |
| }; |
| |
| /** |
| * Returns whether this object's implementation is outside of the current process. |
| */ |
| virtual bool isRemote() const override { return false; } |
| |
| /** |
| * Return callback for getId |
| */ |
| using getId_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, uint32_t id)>; |
| /** |
| * Retrieves the ID allocated to this network by the supplicant. |
| * |
| * This is not the |SSID| of the network, but an internal identifier for |
| * this network used by the supplicant. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return id Network ID. |
| */ |
| virtual ::android::hardware::Return<void> getId(getId_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getInterfaceName |
| */ |
| using getInterfaceName_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_string& name)>; |
| /** |
| * Retrieves the name of the interface this network belongs to. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return Name of the network interface, e.g., wlan0 |
| */ |
| virtual ::android::hardware::Return<void> getInterfaceName(getInterfaceName_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getType |
| */ |
| using getType_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::wifi::supplicant::V1_0::IfaceType type)>; |
| /** |
| * Retrieves the type of the interface this network belongs to. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_IFACE_INVALID| |
| * @return type Type of the network interface, e.g., STA. |
| */ |
| virtual ::android::hardware::Return<void> getType(getType_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for registerCallback |
| */ |
| using registerCallback_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Register for callbacks from this network. |
| * |
| * These callbacks are invoked for events that are specific to this network. |
| * Registration of multiple callback objects is supported. These objects must |
| * be automatically deleted when the corresponding client process is dead or |
| * if this network is removed. |
| * |
| * @param callback An instance of the |ISupplicantStaNetworkCallback| HIDL |
| * interface object. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> registerCallback(const ::android::sp<::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetworkCallback>& callback, registerCallback_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setSsid |
| */ |
| using setSsid_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Setters for the various network params. |
| * These correspond to elements of |wpa_sssid| struct used internally by |
| * the supplicant to represent each network. |
| * |
| * |
| * Set SSID for this network. |
| * |
| * @param ssid value to set. |
| * Max length of |ParamSizeLimits.SSID_MAX_LEN_IN_BYTES|. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setSsid(const ::android::hardware::hidl_vec<uint8_t>& ssid, setSsid_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setBssid |
| */ |
| using setBssid_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set the network to only connect to an AP with provided BSSID. |
| * |
| * @param bssid value to set. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setBssid(const ::android::hardware::hidl_array<uint8_t, 6>& bssid, setBssid_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setScanSsid |
| */ |
| using setScanSsid_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set whether to send probe requests for this network (hidden). |
| * |
| * @param enable true to set, false otherwise. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setScanSsid(bool enable, setScanSsid_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setKeyMgmt |
| */ |
| using setKeyMgmt_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set key management mask for the network. |
| * |
| * @param keyMgmtMask value to set. |
| * Combination of |KeyMgmtMask| values. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setKeyMgmt(::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetwork::KeyMgmtMask> keyMgmtMask, setKeyMgmt_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setProto |
| */ |
| using setProto_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set proto mask for the network. |
| * |
| * @param protoMask value to set. |
| * Combination of |ProtoMask| values. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setProto(::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetwork::ProtoMask> protoMask, setProto_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setAuthAlg |
| */ |
| using setAuthAlg_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set auth alg mask for the network. |
| * |
| * @param authAlgMask value to set. |
| * Combination of |ProtoMask| values. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setAuthAlg(::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetwork::AuthAlgMask> authAlgMask, setAuthAlg_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setGroupCipher |
| */ |
| using setGroupCipher_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set group cipher mask for the network. |
| * |
| * @param groupCipherMask value to set. |
| * Combination of |ProtoMask| values. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setGroupCipher(::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetwork::GroupCipherMask> groupCipherMask, setGroupCipher_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setPairwiseCipher |
| */ |
| using setPairwiseCipher_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set pairwise cipher mask for the network. |
| * |
| * @param pairwiseCipherMask value to set. |
| * Combination of |ProtoMask| values. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setPairwiseCipher(::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetwork::PairwiseCipherMask> pairwiseCipherMask, setPairwiseCipher_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setPskPassphrase |
| */ |
| using setPskPassphrase_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set passphrase for WPA_PSK network. |
| * |
| * @param psk value to set. |
| * Length of value must be between |
| * |ParamSizeLimits.PSK_PASSPHRASE_MIN_LEN_IN_BYTES| and |
| * |ParamSizeLimits.PSK_PASSPHRASE_MAX_LEN_IN_BYTES|. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setPskPassphrase(const ::android::hardware::hidl_string& psk, setPskPassphrase_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setPsk |
| */ |
| using setPsk_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set raw psk for WPA_PSK network. |
| * |
| * @param psk value to set as specified in IEEE 802.11i-2004 standard. |
| * This is the calculated using 'wpa_passphrase <ssid> [passphrase]' |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setPsk(const ::android::hardware::hidl_array<uint8_t, 32>& psk, setPsk_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setWepKey |
| */ |
| using setWepKey_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set WEP key for WEP network. |
| * |
| * @param keyIdx Index of wep key to set. |
| * Max of |ParamSizeLimits.WEP_KEYS_MAX_NUM|. |
| * @param wepKey value to set. |
| * Length of each key must be either |
| * |ParamSizeLimits.WEP40_KEY_LEN_IN_BYTES| or |
| * |ParamSizeLimits.WEP104_KEY_LEN_IN_BYTES|. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setWepKey(uint32_t keyIdx, const ::android::hardware::hidl_vec<uint8_t>& wepKey, setWepKey_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setWepTxKeyIdx |
| */ |
| using setWepTxKeyIdx_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set default Tx key index for WEP network. |
| * |
| * @param KeyIdx value to set. |
| * Max of |ParamSizeLimits.WEP_KEYS_MAX_NUM|. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setWepTxKeyIdx(uint32_t keyIdx, setWepTxKeyIdx_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setRequirePmf |
| */ |
| using setRequirePmf_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set whether RequirePmf is enabled for this network. |
| * |
| * @param enable true to set, false otherwise. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setRequirePmf(bool enable, setRequirePmf_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setEapMethod |
| */ |
| using setEapMethod_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set EAP Method for this network. |
| * |
| * @param method value to be set. |
| * Must be one of |EapMethod| values. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setEapMethod(::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetwork::EapMethod method, setEapMethod_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setEapPhase2Method |
| */ |
| using setEapPhase2Method_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set EAP Phase2 Method for this network. |
| * |
| * EAP method needs to be set for this to work. |
| * |
| * @param method value to set. |
| * Must be one of |EapPhase2Method| values. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setEapPhase2Method(::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetwork::EapPhase2Method method, setEapPhase2Method_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setEapIdentity |
| */ |
| using setEapIdentity_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set EAP Identity for this network. |
| * |
| * @param identity value to set. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setEapIdentity(const ::android::hardware::hidl_vec<uint8_t>& identity, setEapIdentity_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setEapAnonymousIdentity |
| */ |
| using setEapAnonymousIdentity_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set EAP Anonymous Identity for this network. |
| * |
| * @param identity value to set. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setEapAnonymousIdentity(const ::android::hardware::hidl_vec<uint8_t>& identity, setEapAnonymousIdentity_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setEapPassword |
| */ |
| using setEapPassword_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set EAP Password for this network. |
| * |
| * @param password value to set. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setEapPassword(const ::android::hardware::hidl_vec<uint8_t>& password, setEapPassword_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setEapCACert |
| */ |
| using setEapCACert_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set EAP CA certificate file path for this network. |
| * |
| * @param path value to set. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setEapCACert(const ::android::hardware::hidl_string& path, setEapCACert_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setEapCAPath |
| */ |
| using setEapCAPath_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set EAP CA certificate directory path for this network. |
| * |
| * @param path value to set. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setEapCAPath(const ::android::hardware::hidl_string& path, setEapCAPath_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setEapClientCert |
| */ |
| using setEapClientCert_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set EAP Client certificate file path for this network. |
| * |
| * @param path value to set. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setEapClientCert(const ::android::hardware::hidl_string& path, setEapClientCert_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setEapPrivateKeyId |
| */ |
| using setEapPrivateKeyId_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set EAP private key Id for this network. |
| * This is used if private key operations for EAP-TLS are performed |
| * using a smartcard. |
| * |
| * @param id value to set. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setEapPrivateKeyId(const ::android::hardware::hidl_string& id, setEapPrivateKeyId_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setEapSubjectMatch |
| */ |
| using setEapSubjectMatch_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set EAP subject match for this network. |
| * |
| * @param match value to set. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setEapSubjectMatch(const ::android::hardware::hidl_string& match, setEapSubjectMatch_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setEapAltSubjectMatch |
| */ |
| using setEapAltSubjectMatch_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set EAP Alt subject match for this network. |
| * |
| * @param match value to set. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setEapAltSubjectMatch(const ::android::hardware::hidl_string& match, setEapAltSubjectMatch_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setEapEngine |
| */ |
| using setEapEngine_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Enable EAP Open SSL Engine for this network. |
| * |
| * @param enable true to set, false otherwise. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setEapEngine(bool enable, setEapEngine_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setEapEngineID |
| */ |
| using setEapEngineID_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set EAP Open SSL Engine ID for this network. |
| * |
| * @param id value to set. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setEapEngineID(const ::android::hardware::hidl_string& id, setEapEngineID_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setEapDomainSuffixMatch |
| */ |
| using setEapDomainSuffixMatch_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set EAP Domain suffix match for this network. |
| * |
| * @param match value to set. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setEapDomainSuffixMatch(const ::android::hardware::hidl_string& match, setEapDomainSuffixMatch_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setProactiveKeyCaching |
| */ |
| using setProactiveKeyCaching_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * This field can be used to enable proactive key caching which is also |
| * known as opportunistic PMKSA caching for WPA2. This is disabled (0) |
| * by default unless default value is changed with the global okc=1 |
| * parameter. |
| * |
| * Proactive key caching is used to make supplicant assume that the APs |
| * are using the same PMK and generate PMKSA cache entries without |
| * doing RSN pre-authentication. This requires support from the AP side |
| * and is normally used with wireless switches that co-locate the |
| * authenticator. |
| * |
| * @param enable true to set, false otherwise. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setProactiveKeyCaching(bool enable, setProactiveKeyCaching_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setIdStr |
| */ |
| using setIdStr_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set ID string for this network. |
| * Network identifier string for external scripts. |
| * |
| * @return idStr ID string value to set. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setIdStr(const ::android::hardware::hidl_string& idStr, setIdStr_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setUpdateIdentifier |
| */ |
| using setUpdateIdentifier_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set PPS MO ID for this network. |
| * (Hotspot 2.0 PerProviderSubscription/UpdateIdentifier) |
| * |
| * @return id ID value to set. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setUpdateIdentifier(uint32_t id, setUpdateIdentifier_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getSsid |
| */ |
| using getSsid_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_vec<uint8_t>& ssid)>; |
| /** |
| * Getters for the various network params. |
| * |
| * |
| * Get SSID for this network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return ssid value set. |
| */ |
| virtual ::android::hardware::Return<void> getSsid(getSsid_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getBssid |
| */ |
| using getBssid_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_array<uint8_t, 6>& bssid)>; |
| /** |
| * Get the BSSID set for this network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return bssid value set. |
| */ |
| virtual ::android::hardware::Return<void> getBssid(getBssid_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getScanSsid |
| */ |
| using getScanSsid_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, bool enabled)>; |
| /** |
| * Get whether Probe Requests are being sent for this network (hidden). |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return enabled true if set, false otherwise. |
| */ |
| virtual ::android::hardware::Return<void> getScanSsid(getScanSsid_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getKeyMgmt |
| */ |
| using getKeyMgmt_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetwork::KeyMgmtMask> keyMgmtMask)>; |
| /** |
| * Get the key mgmt mask set for the network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return keyMgmtMask Combination of |KeyMgmtMask| values. |
| */ |
| virtual ::android::hardware::Return<void> getKeyMgmt(getKeyMgmt_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getProto |
| */ |
| using getProto_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetwork::ProtoMask> protoMask)>; |
| /** |
| * Get the proto mask set for the network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return protoMask Combination of |ProtoMask| values. |
| */ |
| virtual ::android::hardware::Return<void> getProto(getProto_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getAuthAlg |
| */ |
| using getAuthAlg_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetwork::AuthAlgMask> authAlgMask)>; |
| /** |
| * Get the auth alg mask set for the network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return authAlgMask Combination of |AuthAlgMask| values. |
| */ |
| virtual ::android::hardware::Return<void> getAuthAlg(getAuthAlg_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getGroupCipher |
| */ |
| using getGroupCipher_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetwork::GroupCipherMask> groupCipherMask)>; |
| /** |
| * Get the group cipher mask set for the network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return groupCipherMask Combination of |GroupCipherMask| values. |
| */ |
| virtual ::android::hardware::Return<void> getGroupCipher(getGroupCipher_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getPairwiseCipher |
| */ |
| using getPairwiseCipher_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetwork::PairwiseCipherMask> pairwiseCipherMask)>; |
| /** |
| * Get the pairwise cipher mask set for the network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return pairwiseCipherMask Combination of |PairwiseCipherMask| values. |
| */ |
| virtual ::android::hardware::Return<void> getPairwiseCipher(getPairwiseCipher_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getPskPassphrase |
| */ |
| using getPskPassphrase_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_string& psk)>; |
| /** |
| * Get passphrase for WPA_PSK network. |
| * Must return a failure if network has no passphrase set (use |getPsk| if |
| * network was configured with raw psk instead). |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return psk value set. |
| */ |
| virtual ::android::hardware::Return<void> getPskPassphrase(getPskPassphrase_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getPsk |
| */ |
| using getPsk_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_array<uint8_t, 32>& psk)>; |
| /** |
| * Get raw psk for WPA_PSK network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @param psk value set. |
| */ |
| virtual ::android::hardware::Return<void> getPsk(getPsk_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getWepKey |
| */ |
| using getWepKey_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_vec<uint8_t>& wepKey)>; |
| /** |
| * Get WEP key for WEP network. |
| * |
| * @param keyIdx Index of wep key to be fetched. |
| * Max of |WEP_KEYS_MAX_NUM|. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return wepKey value set. |
| */ |
| virtual ::android::hardware::Return<void> getWepKey(uint32_t keyIdx, getWepKey_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getWepTxKeyIdx |
| */ |
| using getWepTxKeyIdx_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, uint32_t keyIdx)>; |
| /** |
| * Get default Tx key index for WEP network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return keyIdx value set. |
| */ |
| virtual ::android::hardware::Return<void> getWepTxKeyIdx(getWepTxKeyIdx_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getRequirePmf |
| */ |
| using getRequirePmf_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, bool enabled)>; |
| /** |
| * Get whether RequirePmf is enabled for this network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return enabled true if set, false otherwise. |
| */ |
| virtual ::android::hardware::Return<void> getRequirePmf(getRequirePmf_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getEapMethod |
| */ |
| using getEapMethod_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetwork::EapMethod method)>; |
| /** |
| * Get EAP Method set for this network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return method value set. |
| * Must be one of |EapMethod| values. |
| */ |
| virtual ::android::hardware::Return<void> getEapMethod(getEapMethod_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getEapPhase2Method |
| */ |
| using getEapPhase2Method_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetwork::EapPhase2Method method)>; |
| /** |
| * Get EAP Phase2 Method set for this network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return method value set. |
| * Must be one of |EapPhase2Method| values. |
| */ |
| virtual ::android::hardware::Return<void> getEapPhase2Method(getEapPhase2Method_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getEapIdentity |
| */ |
| using getEapIdentity_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_vec<uint8_t>& identity)>; |
| /** |
| * Get EAP Identity set for this network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return identity value set. |
| */ |
| virtual ::android::hardware::Return<void> getEapIdentity(getEapIdentity_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getEapAnonymousIdentity |
| */ |
| using getEapAnonymousIdentity_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_vec<uint8_t>& identity)>; |
| /** |
| * Get EAP Anonymous Identity set for this network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return identity value set. |
| */ |
| virtual ::android::hardware::Return<void> getEapAnonymousIdentity(getEapAnonymousIdentity_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getEapPassword |
| */ |
| using getEapPassword_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_vec<uint8_t>& password)>; |
| /** |
| * Get EAP Password set for this network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return password value set. |
| */ |
| virtual ::android::hardware::Return<void> getEapPassword(getEapPassword_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getEapCACert |
| */ |
| using getEapCACert_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_string& path)>; |
| /** |
| * Get EAP CA certificate file path set for this network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return path value set. |
| */ |
| virtual ::android::hardware::Return<void> getEapCACert(getEapCACert_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getEapCAPath |
| */ |
| using getEapCAPath_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_string& path)>; |
| /** |
| * Get EAP CA certificate directory path set for this network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return path value set. |
| */ |
| virtual ::android::hardware::Return<void> getEapCAPath(getEapCAPath_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getEapClientCert |
| */ |
| using getEapClientCert_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_string& path)>; |
| /** |
| * Get EAP Client certificate file path set for this network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return path value set. |
| */ |
| virtual ::android::hardware::Return<void> getEapClientCert(getEapClientCert_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getEapPrivateKeyId |
| */ |
| using getEapPrivateKeyId_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_string& id)>; |
| /** |
| * Get EAP private key Id set for this network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return id value set. |
| */ |
| virtual ::android::hardware::Return<void> getEapPrivateKeyId(getEapPrivateKeyId_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getEapSubjectMatch |
| */ |
| using getEapSubjectMatch_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_string& match)>; |
| /** |
| * Get EAP subject match set for this network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return match value set. |
| */ |
| virtual ::android::hardware::Return<void> getEapSubjectMatch(getEapSubjectMatch_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getEapAltSubjectMatch |
| */ |
| using getEapAltSubjectMatch_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_string& match)>; |
| /** |
| * Get EAP Alt subject match set for this network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return match value set. |
| */ |
| virtual ::android::hardware::Return<void> getEapAltSubjectMatch(getEapAltSubjectMatch_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getEapEngine |
| */ |
| using getEapEngine_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, bool enabled)>; |
| /** |
| * Get if EAP Open SSL Engine is enabled for this network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return enabled true if set, false otherwise. |
| */ |
| virtual ::android::hardware::Return<void> getEapEngine(getEapEngine_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getEapEngineID |
| */ |
| using getEapEngineID_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_string& id)>; |
| /** |
| * Get EAP Open SSL Engine ID set for this network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return id value set. |
| */ |
| virtual ::android::hardware::Return<void> getEapEngineID(getEapEngineID_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getEapDomainSuffixMatch |
| */ |
| using getEapDomainSuffixMatch_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_string& match)>; |
| /** |
| * Get EAP Domain suffix match set for this network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return match value set. |
| */ |
| virtual ::android::hardware::Return<void> getEapDomainSuffixMatch(getEapDomainSuffixMatch_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getIdStr |
| */ |
| using getIdStr_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_string& idStr)>; |
| /** |
| * Get ID string set for this network. |
| * Network identifier string for external scripts. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return idStr ID string set. |
| */ |
| virtual ::android::hardware::Return<void> getIdStr(getIdStr_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getWpsNfcConfigurationToken |
| */ |
| using getWpsNfcConfigurationToken_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_vec<uint8_t>& token)>; |
| /** |
| * Retrieves a WPS-NFC configuration token for this network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return token Bytes representing WPS-NFC configuration token. |
| * This is a dump of all the WPS atrributes of the AP configuration |
| * as specified in the Wi-Fi Protected Setup Specification. |
| */ |
| virtual ::android::hardware::Return<void> getWpsNfcConfigurationToken(getWpsNfcConfigurationToken_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for enable |
| */ |
| using enable_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Enable the network for connection purposes. |
| * |
| * This must trigger a connection to the network if: |
| * a) |noConnect| is false, and |
| * b) This is the only network configured, and |
| * c) Is visible in the current scan results. |
| * |
| * @param noConnect Only enable the network, dont trigger a connect. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> enable(bool noConnect, enable_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for disable |
| */ |
| using disable_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Disable the network for connection purposes. |
| * |
| * This must trigger a disconnection from the network, if currently |
| * connected to this one. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> disable(disable_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for select |
| */ |
| using select_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Initiate connection to this network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> select(select_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for sendNetworkEapSimGsmAuthResponse |
| */ |
| using sendNetworkEapSimGsmAuthResponse_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Used to send a response to the |
| * |ISupplicantNetworkCallback.onNetworkEapSimGsmAuthRequest| request. |
| * |
| * @param params Params to be used for EAP GSM authentication. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> sendNetworkEapSimGsmAuthResponse(const ::android::hardware::hidl_vec<::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetwork::NetworkResponseEapSimGsmAuthParams>& params, sendNetworkEapSimGsmAuthResponse_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for sendNetworkEapSimGsmAuthFailure |
| */ |
| using sendNetworkEapSimGsmAuthFailure_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Used to send a response to the |
| * |ISupplicantNetworkCallback.onNetworkEapSimGsmAuthRequest| request. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> sendNetworkEapSimGsmAuthFailure(sendNetworkEapSimGsmAuthFailure_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for sendNetworkEapSimUmtsAuthResponse |
| */ |
| using sendNetworkEapSimUmtsAuthResponse_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Used to send a response to the |
| * |ISupplicantNetworkCallback.onNetworkEapSimUmtsAuthRequest| request. |
| * |
| * @param params Params to be used for EAP UMTS authentication. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> sendNetworkEapSimUmtsAuthResponse(const ::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetwork::NetworkResponseEapSimUmtsAuthParams& params, sendNetworkEapSimUmtsAuthResponse_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for sendNetworkEapSimUmtsAutsResponse |
| */ |
| using sendNetworkEapSimUmtsAutsResponse_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Used to send a response to the |
| * |ISupplicantNetworkCallback.onNetworkEapSimUmtsAuthRequest| request. |
| * |
| * @param auts Params to be used for EAP UMTS authentication. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> sendNetworkEapSimUmtsAutsResponse(const ::android::hardware::hidl_array<uint8_t, 14>& auts, sendNetworkEapSimUmtsAutsResponse_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for sendNetworkEapSimUmtsAuthFailure |
| */ |
| using sendNetworkEapSimUmtsAuthFailure_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Used to send a response to the |
| * |ISupplicantNetworkCallback.onNetworkEapSimUmtsAuthRequest| request. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> sendNetworkEapSimUmtsAuthFailure(sendNetworkEapSimUmtsAuthFailure_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for sendNetworkEapIdentityResponse |
| */ |
| using sendNetworkEapIdentityResponse_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Used to send a response to the |
| * |ISupplicantNetworkCallback.onNetworkEapIdentityRequest| request. |
| * |
| * @param identity Identity to be used for the network. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> sendNetworkEapIdentityResponse(const ::android::hardware::hidl_vec<uint8_t>& identity, sendNetworkEapIdentityResponse_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setEapEncryptedImsiIdentity |
| */ |
| using setEapEncryptedImsiIdentity_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set EAP encrypted IMSI Identity for this network. |
| * |
| * @param identity Identity string built from the encrypted IMSI. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setEapEncryptedImsiIdentity(const ::android::hardware::hidl_vec<uint8_t>& identity, setEapEncryptedImsiIdentity_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for sendNetworkEapIdentityResponse_1_1 |
| */ |
| using sendNetworkEapIdentityResponse_1_1_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Used to send a response to the |
| * |ISupplicantNetworkCallback.onNetworkEapIdentityRequest| request. |
| * |
| * @param identity Identity string containing the IMSI. |
| * @param encryptedIdentity Identity string containing the encrypted IMSI. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> sendNetworkEapIdentityResponse_1_1(const ::android::hardware::hidl_vec<uint8_t>& identity, const ::android::hardware::hidl_vec<uint8_t>& encryptedIdentity, sendNetworkEapIdentityResponse_1_1_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setKeyMgmt_1_2 |
| */ |
| using setKeyMgmt_1_2_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set key management mask for the network. |
| * |
| * @param keyMgmtMask value to set. |
| * Combination of |KeyMgmtMask| values. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setKeyMgmt_1_2(::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_2::ISupplicantStaNetwork::KeyMgmtMask> keyMgmtMask, setKeyMgmt_1_2_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getKeyMgmt_1_2 |
| */ |
| using getKeyMgmt_1_2_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_2::ISupplicantStaNetwork::KeyMgmtMask> keyMgmtMask)>; |
| /** |
| * Get the key mgmt mask set for the network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return keyMgmtMask Combination of |KeyMgmtMask| values. |
| */ |
| virtual ::android::hardware::Return<void> getKeyMgmt_1_2(getKeyMgmt_1_2_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setPairwiseCipher_1_2 |
| */ |
| using setPairwiseCipher_1_2_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set pairwise cipher mask for the network. |
| * |
| * @param pairwiseCipherMask value to set. |
| * Combination of |PairwiseCipherMask| values. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setPairwiseCipher_1_2(::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_2::ISupplicantStaNetwork::PairwiseCipherMask> pairwiseCipherMask, setPairwiseCipher_1_2_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getPairwiseCipher_1_2 |
| */ |
| using getPairwiseCipher_1_2_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_2::ISupplicantStaNetwork::PairwiseCipherMask> pairwiseCipherMask)>; |
| /** |
| * Get the pairwise cipher mask set for the network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return pairwiseCipherMask Combination of |PairwiseCipherMask| values. |
| */ |
| virtual ::android::hardware::Return<void> getPairwiseCipher_1_2(getPairwiseCipher_1_2_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setGroupCipher_1_2 |
| */ |
| using setGroupCipher_1_2_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set group cipher mask for the network. |
| * |
| * @param groupCipherMask value to set. |
| * Combination of |GroupCipherMask| values. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setGroupCipher_1_2(::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_2::ISupplicantStaNetwork::GroupCipherMask> groupCipherMask, setGroupCipher_1_2_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getGroupCipher_1_2 |
| */ |
| using getGroupCipher_1_2_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_2::ISupplicantStaNetwork::GroupCipherMask> groupCipherMask)>; |
| /** |
| * Get the group cipher mask set for the network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return groupCipherMask Combination of |GroupCipherMask| values. |
| */ |
| virtual ::android::hardware::Return<void> getGroupCipher_1_2(getGroupCipher_1_2_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setGroupMgmtCipher |
| */ |
| using setGroupMgmtCipher_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set group management cipher mask for the network. |
| * |
| * @param groupMgmtCipherMask value to set. |
| * Combination of |GroupMgmtCipherMask| values. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setGroupMgmtCipher(::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_2::ISupplicantStaNetwork::GroupMgmtCipherMask> groupMgmtCipherMask, setGroupMgmtCipher_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getGroupMgmtCipher |
| */ |
| using getGroupMgmtCipher_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_2::ISupplicantStaNetwork::GroupMgmtCipherMask> groupMgmtCipherMask)>; |
| /** |
| * Get the group management cipher mask set for the network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return groupMgmtCipherMask Combination of |GroupMgmtCipherMask| values. |
| */ |
| virtual ::android::hardware::Return<void> getGroupMgmtCipher(getGroupMgmtCipher_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for enableTlsSuiteBEapPhase1Param |
| */ |
| using enableTlsSuiteBEapPhase1Param_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Enable TLS Suite-B in EAP Phase1 |
| * |
| * @param enable Set to true to enable TLS Suite-B in EAP phase1 |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> enableTlsSuiteBEapPhase1Param(bool enable, enableTlsSuiteBEapPhase1Param_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for enableSuiteBEapOpenSslCiphers |
| */ |
| using enableSuiteBEapOpenSslCiphers_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set EAP OpenSSL Suite-B-192 ciphers for WPA3-Enterprise |
| * Supported option: |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> enableSuiteBEapOpenSslCiphers(enableSuiteBEapOpenSslCiphers_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getSaePassword |
| */ |
| using getSaePassword_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_string& saePassword)>; |
| /** |
| * Get SAE password for WPA3-Personal |
| * |
| * @return status Status of the operation, and a string. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> getSaePassword(getSaePassword_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getSaePasswordId |
| */ |
| using getSaePasswordId_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_string& saePasswordId)>; |
| /** |
| * Get SAE password ID for WPA3-Personal |
| * |
| * @return status Status of the operation, and a string. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> getSaePasswordId(getSaePasswordId_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setSaePassword |
| */ |
| using setSaePassword_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set SAE password for WPA3-Personal |
| * |
| * @param saePassword string with the above option |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setSaePassword(const ::android::hardware::hidl_string& saePassword, setSaePassword_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setSaePasswordId |
| */ |
| using setSaePasswordId_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set SAE password ID for WPA3-Personal |
| * |
| * @param sae_password_id string with the above option |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setSaePasswordId(const ::android::hardware::hidl_string& saePasswordId, setSaePasswordId_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setOcsp |
| */ |
| using setOcsp_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set OCSP (Online Certificate Status Protocol) type for this network. |
| * |
| * @param ocspType value to set. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setOcsp(::android::hardware::wifi::supplicant::V1_3::OcspType ocspType, setOcsp_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getOcsp |
| */ |
| using getOcsp_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::wifi::supplicant::V1_3::OcspType ocspType)>; |
| /** |
| * Get OCSP (Online Certificate Status Protocol) type for this network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return ocspType ocsp type. |
| */ |
| virtual ::android::hardware::Return<void> getOcsp(getOcsp_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setKeyMgmt_1_3 |
| */ |
| using setKeyMgmt_1_3_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set key management mask for the network. |
| * |
| * @param keyMgmtMask value to set. |
| * Combination of |KeyMgmtMask| values. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN| |
| */ |
| virtual ::android::hardware::Return<void> setKeyMgmt_1_3(::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask> keyMgmtMask, setKeyMgmt_1_3_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getKeyMgmt_1_3 |
| */ |
| using getKeyMgmt_1_3_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask> keyMgmtMask)>; |
| /** |
| * Get the key mgmt mask set for the network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN| |
| * @return keyMgmtMask Combination of |KeyMgmtMask| values. |
| */ |
| virtual ::android::hardware::Return<void> getKeyMgmt_1_3(getKeyMgmt_1_3_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setProto_1_3 |
| */ |
| using setProto_1_3_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set proto mask for the network. |
| * |
| * @param protoMask value to set. |
| * Combination of |ProtoMask| values. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN| |
| */ |
| virtual ::android::hardware::Return<void> setProto_1_3(::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask> protoMask, setProto_1_3_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getProto_1_3 |
| */ |
| using getProto_1_3_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask> protoMask)>; |
| /** |
| * Get the proto mask set for the network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN| |
| * @return protoMask Combination of |ProtoMask| values. |
| */ |
| virtual ::android::hardware::Return<void> getProto_1_3(getProto_1_3_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setGroupCipher_1_3 |
| */ |
| using setGroupCipher_1_3_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set group cipher mask for the network. |
| * |
| * @param groupCipherMask value to set. |
| * Combination of |ProtoMask| values. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN| |
| */ |
| virtual ::android::hardware::Return<void> setGroupCipher_1_3(::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask> groupCipherMask, setGroupCipher_1_3_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getPairwiseCipher_1_3 |
| */ |
| using getPairwiseCipher_1_3_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask> pairwiseCipherMask)>; |
| /** |
| * Get the pairwise cipher mask set for the network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN| |
| * @return pairwiseCipherMask Combination of |PairwiseCipherMask| values. |
| */ |
| virtual ::android::hardware::Return<void> getPairwiseCipher_1_3(getPairwiseCipher_1_3_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setPairwiseCipher_1_3 |
| */ |
| using setPairwiseCipher_1_3_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set pairwise cipher mask for the network. |
| * |
| * @param pairwiseCipherMask value to set. |
| * Combination of |ProtoMask| values. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN| |
| */ |
| virtual ::android::hardware::Return<void> setPairwiseCipher_1_3(::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask> pairwiseCipherMask, setPairwiseCipher_1_3_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getGroupCipher_1_3 |
| */ |
| using getGroupCipher_1_3_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask> groupCipherMask)>; |
| /** |
| * Get the group cipher mask set for the network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN| |
| * @return groupCipherMask Combination of |GroupCipherMask| values. |
| */ |
| virtual ::android::hardware::Return<void> getGroupCipher_1_3(getGroupCipher_1_3_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setWapiCertSuite |
| */ |
| using setWapiCertSuite_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set WAPI certificate suite name for this network. |
| * |
| * @param suite value to set. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN| |
| */ |
| virtual ::android::hardware::Return<void> setWapiCertSuite(const ::android::hardware::hidl_string& suite, setWapiCertSuite_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getWapiCertSuite |
| */ |
| using getWapiCertSuite_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, const ::android::hardware::hidl_string& suite)>; |
| /** |
| * Get WAPI certificate suite name set for this network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN| |
| * @return suite The name of a suite. |
| */ |
| virtual ::android::hardware::Return<void> getWapiCertSuite(getWapiCertSuite_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setPmkCache |
| */ |
| using setPmkCache_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Add a pairwise master key (PMK) into supplicant PMK cache. |
| * |
| * @param serializedEntry is serialized PMK cache entry, the content is |
| * opaque for the framework and depends on the native implementation. |
| * @return status Status of the operation |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setPmkCache(const ::android::hardware::hidl_vec<uint8_t>& serializedEntry, setPmkCache_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setAuthAlg_1_3 |
| */ |
| using setAuthAlg_1_3_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Set auth alg mask for the network. |
| * |
| * @param authAlgMask value to set. |
| * Combination of |ProtoMask| values. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_ARGS_INVALID|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setAuthAlg_1_3(::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask> authAlgMask, setAuthAlg_1_3_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for getAuthAlg_1_3 |
| */ |
| using getAuthAlg_1_3_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status, ::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask> authAlgMask)>; |
| /** |
| * Get the auth alg mask set for the network. |
| * |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| * @return authAlgMask Combination of |AuthAlgMask| values. |
| */ |
| virtual ::android::hardware::Return<void> getAuthAlg_1_3(getAuthAlg_1_3_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for setEapErp |
| */ |
| using setEapErp_cb = std::function<void(const ::android::hardware::wifi::supplicant::V1_0::SupplicantStatus& status)>; |
| /** |
| * Enable Extensible Authentication (EAP) - Re-authentication Protocol (ERP) for this network. |
| * |
| * @param enable true to set, false otherwise. |
| * @return status Status of the operation. |
| * Possible status codes: |
| * |SupplicantStatusCode.SUCCESS|, |
| * |SupplicantStatusCode.FAILURE_UNKNOWN|, |
| * |SupplicantStatusCode.FAILURE_NETWORK_INVALID| |
| */ |
| virtual ::android::hardware::Return<void> setEapErp(bool enable, setEapErp_cb _hidl_cb) = 0; |
| |
| /** |
| * Return callback for interfaceChain |
| */ |
| using interfaceChain_cb = std::function<void(const ::android::hardware::hidl_vec<::android::hardware::hidl_string>& descriptors)>; |
| /* |
| * Provides run-time type information for this object. |
| * For example, for the following interface definition: |
| * package android.hardware.foo@1.0; |
| * interface IParent {}; |
| * interface IChild extends IParent {}; |
| * Calling interfaceChain on an IChild object must yield the following: |
| * ["android.hardware.foo@1.0::IChild", |
| * "android.hardware.foo@1.0::IParent" |
| * "android.hidl.base@1.0::IBase"] |
| * |
| * @return descriptors a vector of descriptors of the run-time type of the |
| * object. |
| */ |
| virtual ::android::hardware::Return<void> interfaceChain(interfaceChain_cb _hidl_cb) override; |
| |
| /* |
| * Emit diagnostic information to the given file. |
| * |
| * Optionally overriden. |
| * |
| * @param fd File descriptor to dump data to. |
| * Must only be used for the duration of this call. |
| * @param options Arguments for debugging. |
| * Must support empty for default debug information. |
| */ |
| virtual ::android::hardware::Return<void> debug(const ::android::hardware::hidl_handle& fd, const ::android::hardware::hidl_vec<::android::hardware::hidl_string>& options) override; |
| |
| /** |
| * Return callback for interfaceDescriptor |
| */ |
| using interfaceDescriptor_cb = std::function<void(const ::android::hardware::hidl_string& descriptor)>; |
| /* |
| * Provides run-time type information for this object. |
| * For example, for the following interface definition: |
| * package android.hardware.foo@1.0; |
| * interface IParent {}; |
| * interface IChild extends IParent {}; |
| * Calling interfaceDescriptor on an IChild object must yield |
| * "android.hardware.foo@1.0::IChild" |
| * |
| * @return descriptor a descriptor of the run-time type of the |
| * object (the first element of the vector returned by |
| * interfaceChain()) |
| */ |
| virtual ::android::hardware::Return<void> interfaceDescriptor(interfaceDescriptor_cb _hidl_cb) override; |
| |
| /** |
| * Return callback for getHashChain |
| */ |
| using getHashChain_cb = std::function<void(const ::android::hardware::hidl_vec<::android::hardware::hidl_array<uint8_t, 32>>& hashchain)>; |
| /* |
| * Returns hashes of the source HAL files that define the interfaces of the |
| * runtime type information on the object. |
| * For example, for the following interface definition: |
| * package android.hardware.foo@1.0; |
| * interface IParent {}; |
| * interface IChild extends IParent {}; |
| * Calling interfaceChain on an IChild object must yield the following: |
| * [(hash of IChild.hal), |
| * (hash of IParent.hal) |
| * (hash of IBase.hal)]. |
| * |
| * SHA-256 is used as the hashing algorithm. Each hash has 32 bytes |
| * according to SHA-256 standard. |
| * |
| * @return hashchain a vector of SHA-1 digests |
| */ |
| virtual ::android::hardware::Return<void> getHashChain(getHashChain_cb _hidl_cb) override; |
| |
| /* |
| * This method trigger the interface to enable/disable instrumentation based |
| * on system property hal.instrumentation.enable. |
| */ |
| virtual ::android::hardware::Return<void> setHALInstrumentation() override; |
| |
| /* |
| * Registers a death recipient, to be called when the process hosting this |
| * interface dies. |
| * |
| * @param recipient a hidl_death_recipient callback object |
| * @param cookie a cookie that must be returned with the callback |
| * @return success whether the death recipient was registered successfully. |
| */ |
| virtual ::android::hardware::Return<bool> linkToDeath(const ::android::sp<::android::hardware::hidl_death_recipient>& recipient, uint64_t cookie) override; |
| |
| /* |
| * Provides way to determine if interface is running without requesting |
| * any functionality. |
| */ |
| virtual ::android::hardware::Return<void> ping() override; |
| |
| /** |
| * Return callback for getDebugInfo |
| */ |
| using getDebugInfo_cb = std::function<void(const ::android::hidl::base::V1_0::DebugInfo& info)>; |
| /* |
| * Get debug information on references on this interface. |
| * @return info debugging information. See comments of DebugInfo. |
| */ |
| virtual ::android::hardware::Return<void> getDebugInfo(getDebugInfo_cb _hidl_cb) override; |
| |
| /* |
| * This method notifies the interface that one or more system properties |
| * have changed. The default implementation calls |
| * (C++) report_sysprop_change() in libcutils or |
| * (Java) android.os.SystemProperties.reportSyspropChanged, |
| * which in turn calls a set of registered callbacks (eg to update trace |
| * tags). |
| */ |
| virtual ::android::hardware::Return<void> notifySyspropsChanged() override; |
| |
| /* |
| * Unregisters the registered death recipient. If this service was registered |
| * multiple times with the same exact death recipient, this unlinks the most |
| * recently registered one. |
| * |
| * @param recipient a previously registered hidl_death_recipient callback |
| * @return success whether the death recipient was unregistered successfully. |
| */ |
| virtual ::android::hardware::Return<bool> unlinkToDeath(const ::android::sp<::android::hardware::hidl_death_recipient>& recipient) override; |
| |
| // cast static functions |
| /** |
| * This performs a checked cast based on what the underlying implementation actually is. |
| */ |
| static ::android::hardware::Return<::android::sp<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork>> castFrom(const ::android::sp<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork>& parent, bool emitError = false); |
| /** |
| * This performs a checked cast based on what the underlying implementation actually is. |
| */ |
| static ::android::hardware::Return<::android::sp<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork>> castFrom(const ::android::sp<::android::hardware::wifi::supplicant::V1_2::ISupplicantStaNetwork>& parent, bool emitError = false); |
| /** |
| * This performs a checked cast based on what the underlying implementation actually is. |
| */ |
| static ::android::hardware::Return<::android::sp<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork>> castFrom(const ::android::sp<::android::hardware::wifi::supplicant::V1_1::ISupplicantStaNetwork>& parent, bool emitError = false); |
| /** |
| * This performs a checked cast based on what the underlying implementation actually is. |
| */ |
| static ::android::hardware::Return<::android::sp<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork>> castFrom(const ::android::sp<::android::hardware::wifi::supplicant::V1_0::ISupplicantStaNetwork>& parent, bool emitError = false); |
| /** |
| * This performs a checked cast based on what the underlying implementation actually is. |
| */ |
| static ::android::hardware::Return<::android::sp<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork>> castFrom(const ::android::sp<::android::hardware::wifi::supplicant::V1_0::ISupplicantNetwork>& parent, bool emitError = false); |
| /** |
| * This performs a checked cast based on what the underlying implementation actually is. |
| */ |
| static ::android::hardware::Return<::android::sp<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork>> castFrom(const ::android::sp<::android::hidl::base::V1_0::IBase>& parent, bool emitError = false); |
| |
| // helper methods for interactions with the hwservicemanager |
| /** |
| * This gets the service of this type with the specified instance name. If the |
| * service is currently not available or not in the VINTF manifest on a Trebilized |
| * device, this will return nullptr. This is useful when you don't want to block |
| * during device boot. If getStub is true, this will try to return an unwrapped |
| * passthrough implementation in the same process. This is useful when getting an |
| * implementation from the same partition/compilation group. |
| * |
| * In general, prefer getService(std::string,bool) |
| */ |
| static ::android::sp<ISupplicantStaNetwork> tryGetService(const std::string &serviceName="default", bool getStub=false); |
| /** |
| * Deprecated. See tryGetService(std::string, bool) |
| */ |
| static ::android::sp<ISupplicantStaNetwork> tryGetService(const char serviceName[], bool getStub=false) { std::string str(serviceName ? serviceName : ""); return tryGetService(str, getStub); } |
| /** |
| * Deprecated. See tryGetService(std::string, bool) |
| */ |
| static ::android::sp<ISupplicantStaNetwork> tryGetService(const ::android::hardware::hidl_string& serviceName, bool getStub=false) { std::string str(serviceName.c_str()); return tryGetService(str, getStub); } |
| /** |
| * Calls tryGetService("default", bool). This is the recommended instance name for singleton services. |
| */ |
| static ::android::sp<ISupplicantStaNetwork> tryGetService(bool getStub) { return tryGetService("default", getStub); } |
| /** |
| * This gets the service of this type with the specified instance name. If the |
| * service is not in the VINTF manifest on a Trebilized device, this will return |
| * nullptr. If the service is not available, this will wait for the service to |
| * become available. If the service is a lazy service, this will start the service |
| * and return when it becomes available. If getStub is true, this will try to |
| * return an unwrapped passthrough implementation in the same process. This is |
| * useful when getting an implementation from the same partition/compilation group. |
| */ |
| static ::android::sp<ISupplicantStaNetwork> getService(const std::string &serviceName="default", bool getStub=false); |
| /** |
| * Deprecated. See getService(std::string, bool) |
| */ |
| static ::android::sp<ISupplicantStaNetwork> getService(const char serviceName[], bool getStub=false) { std::string str(serviceName ? serviceName : ""); return getService(str, getStub); } |
| /** |
| * Deprecated. See getService(std::string, bool) |
| */ |
| static ::android::sp<ISupplicantStaNetwork> getService(const ::android::hardware::hidl_string& serviceName, bool getStub=false) { std::string str(serviceName.c_str()); return getService(str, getStub); } |
| /** |
| * Calls getService("default", bool). This is the recommended instance name for singleton services. |
| */ |
| static ::android::sp<ISupplicantStaNetwork> getService(bool getStub) { return getService("default", getStub); } |
| /** |
| * Registers a service with the service manager. For Trebilized devices, the service |
| * must also be in the VINTF manifest. |
| */ |
| __attribute__ ((warn_unused_result))::android::status_t registerAsService(const std::string &serviceName="default"); |
| /** |
| * Registers for notifications for when a service is registered. |
| */ |
| static bool registerForNotifications( |
| const std::string &serviceName, |
| const ::android::sp<::android::hidl::manager::V1_0::IServiceNotification> ¬ification); |
| }; |
| |
| // |
| // type declarations for package |
| // |
| |
| template<typename> |
| static inline std::string toString(uint32_t o); |
| static inline std::string toString(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask o); |
| static inline void PrintTo(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask o, ::std::ostream* os); |
| constexpr uint32_t operator|(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask rhs) { |
| return static_cast<uint32_t>(static_cast<uint32_t>(lhs) | static_cast<uint32_t>(rhs)); |
| } |
| constexpr uint32_t operator|(const uint32_t lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask rhs) { |
| return static_cast<uint32_t>(lhs | static_cast<uint32_t>(rhs)); |
| } |
| constexpr uint32_t operator|(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask lhs, const uint32_t rhs) { |
| return static_cast<uint32_t>(static_cast<uint32_t>(lhs) | rhs); |
| } |
| constexpr uint32_t operator&(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask rhs) { |
| return static_cast<uint32_t>(static_cast<uint32_t>(lhs) & static_cast<uint32_t>(rhs)); |
| } |
| constexpr uint32_t operator&(const uint32_t lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask rhs) { |
| return static_cast<uint32_t>(lhs & static_cast<uint32_t>(rhs)); |
| } |
| constexpr uint32_t operator&(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask lhs, const uint32_t rhs) { |
| return static_cast<uint32_t>(static_cast<uint32_t>(lhs) & rhs); |
| } |
| constexpr uint32_t &operator|=(uint32_t& v, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask e) { |
| v |= static_cast<uint32_t>(e); |
| return v; |
| } |
| constexpr uint32_t &operator&=(uint32_t& v, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask e) { |
| v &= static_cast<uint32_t>(e); |
| return v; |
| } |
| |
| template<typename> |
| static inline std::string toString(uint32_t o); |
| static inline std::string toString(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask o); |
| static inline void PrintTo(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask o, ::std::ostream* os); |
| constexpr uint32_t operator|(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask rhs) { |
| return static_cast<uint32_t>(static_cast<uint32_t>(lhs) | static_cast<uint32_t>(rhs)); |
| } |
| constexpr uint32_t operator|(const uint32_t lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask rhs) { |
| return static_cast<uint32_t>(lhs | static_cast<uint32_t>(rhs)); |
| } |
| constexpr uint32_t operator|(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask lhs, const uint32_t rhs) { |
| return static_cast<uint32_t>(static_cast<uint32_t>(lhs) | rhs); |
| } |
| constexpr uint32_t operator&(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask rhs) { |
| return static_cast<uint32_t>(static_cast<uint32_t>(lhs) & static_cast<uint32_t>(rhs)); |
| } |
| constexpr uint32_t operator&(const uint32_t lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask rhs) { |
| return static_cast<uint32_t>(lhs & static_cast<uint32_t>(rhs)); |
| } |
| constexpr uint32_t operator&(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask lhs, const uint32_t rhs) { |
| return static_cast<uint32_t>(static_cast<uint32_t>(lhs) & rhs); |
| } |
| constexpr uint32_t &operator|=(uint32_t& v, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask e) { |
| v |= static_cast<uint32_t>(e); |
| return v; |
| } |
| constexpr uint32_t &operator&=(uint32_t& v, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask e) { |
| v &= static_cast<uint32_t>(e); |
| return v; |
| } |
| |
| template<typename> |
| static inline std::string toString(uint32_t o); |
| static inline std::string toString(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask o); |
| static inline void PrintTo(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask o, ::std::ostream* os); |
| constexpr uint32_t operator|(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask rhs) { |
| return static_cast<uint32_t>(static_cast<uint32_t>(lhs) | static_cast<uint32_t>(rhs)); |
| } |
| constexpr uint32_t operator|(const uint32_t lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask rhs) { |
| return static_cast<uint32_t>(lhs | static_cast<uint32_t>(rhs)); |
| } |
| constexpr uint32_t operator|(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask lhs, const uint32_t rhs) { |
| return static_cast<uint32_t>(static_cast<uint32_t>(lhs) | rhs); |
| } |
| constexpr uint32_t operator&(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask rhs) { |
| return static_cast<uint32_t>(static_cast<uint32_t>(lhs) & static_cast<uint32_t>(rhs)); |
| } |
| constexpr uint32_t operator&(const uint32_t lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask rhs) { |
| return static_cast<uint32_t>(lhs & static_cast<uint32_t>(rhs)); |
| } |
| constexpr uint32_t operator&(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask lhs, const uint32_t rhs) { |
| return static_cast<uint32_t>(static_cast<uint32_t>(lhs) & rhs); |
| } |
| constexpr uint32_t &operator|=(uint32_t& v, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask e) { |
| v |= static_cast<uint32_t>(e); |
| return v; |
| } |
| constexpr uint32_t &operator&=(uint32_t& v, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask e) { |
| v &= static_cast<uint32_t>(e); |
| return v; |
| } |
| |
| template<typename> |
| static inline std::string toString(uint32_t o); |
| static inline std::string toString(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask o); |
| static inline void PrintTo(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask o, ::std::ostream* os); |
| constexpr uint32_t operator|(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask rhs) { |
| return static_cast<uint32_t>(static_cast<uint32_t>(lhs) | static_cast<uint32_t>(rhs)); |
| } |
| constexpr uint32_t operator|(const uint32_t lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask rhs) { |
| return static_cast<uint32_t>(lhs | static_cast<uint32_t>(rhs)); |
| } |
| constexpr uint32_t operator|(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask lhs, const uint32_t rhs) { |
| return static_cast<uint32_t>(static_cast<uint32_t>(lhs) | rhs); |
| } |
| constexpr uint32_t operator&(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask rhs) { |
| return static_cast<uint32_t>(static_cast<uint32_t>(lhs) & static_cast<uint32_t>(rhs)); |
| } |
| constexpr uint32_t operator&(const uint32_t lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask rhs) { |
| return static_cast<uint32_t>(lhs & static_cast<uint32_t>(rhs)); |
| } |
| constexpr uint32_t operator&(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask lhs, const uint32_t rhs) { |
| return static_cast<uint32_t>(static_cast<uint32_t>(lhs) & rhs); |
| } |
| constexpr uint32_t &operator|=(uint32_t& v, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask e) { |
| v |= static_cast<uint32_t>(e); |
| return v; |
| } |
| constexpr uint32_t &operator&=(uint32_t& v, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask e) { |
| v &= static_cast<uint32_t>(e); |
| return v; |
| } |
| |
| template<typename> |
| static inline std::string toString(uint32_t o); |
| static inline std::string toString(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask o); |
| static inline void PrintTo(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask o, ::std::ostream* os); |
| constexpr uint32_t operator|(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask rhs) { |
| return static_cast<uint32_t>(static_cast<uint32_t>(lhs) | static_cast<uint32_t>(rhs)); |
| } |
| constexpr uint32_t operator|(const uint32_t lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask rhs) { |
| return static_cast<uint32_t>(lhs | static_cast<uint32_t>(rhs)); |
| } |
| constexpr uint32_t operator|(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask lhs, const uint32_t rhs) { |
| return static_cast<uint32_t>(static_cast<uint32_t>(lhs) | rhs); |
| } |
| constexpr uint32_t operator&(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask rhs) { |
| return static_cast<uint32_t>(static_cast<uint32_t>(lhs) & static_cast<uint32_t>(rhs)); |
| } |
| constexpr uint32_t operator&(const uint32_t lhs, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask rhs) { |
| return static_cast<uint32_t>(lhs & static_cast<uint32_t>(rhs)); |
| } |
| constexpr uint32_t operator&(const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask lhs, const uint32_t rhs) { |
| return static_cast<uint32_t>(static_cast<uint32_t>(lhs) & rhs); |
| } |
| constexpr uint32_t &operator|=(uint32_t& v, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask e) { |
| v |= static_cast<uint32_t>(e); |
| return v; |
| } |
| constexpr uint32_t &operator&=(uint32_t& v, const ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask e) { |
| v &= static_cast<uint32_t>(e); |
| return v; |
| } |
| |
| static inline std::string toString(const ::android::sp<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork>& o); |
| |
| // |
| // type header definitions for package |
| // |
| |
| template<> |
| inline std::string toString<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask>(uint32_t o) { |
| using ::android::hardware::details::toHexString; |
| std::string os; |
| ::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask> flipped = 0; |
| bool first = true; |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::WPA) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::WPA)) { |
| os += (first ? "" : " | "); |
| os += "WPA"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::WPA; |
| } |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::RSN) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::RSN)) { |
| os += (first ? "" : " | "); |
| os += "RSN"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::RSN; |
| } |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::OSEN) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::OSEN)) { |
| os += (first ? "" : " | "); |
| os += "OSEN"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::OSEN; |
| } |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::WAPI) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::WAPI)) { |
| os += (first ? "" : " | "); |
| os += "WAPI"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::WAPI; |
| } |
| if (o != flipped) { |
| os += (first ? "" : " | "); |
| os += toHexString(o & (~flipped)); |
| }os += " ("; |
| os += toHexString(o); |
| os += ")"; |
| return os; |
| } |
| |
| static inline std::string toString(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask o) { |
| using ::android::hardware::details::toHexString; |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::WPA) { |
| return "WPA"; |
| } |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::RSN) { |
| return "RSN"; |
| } |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::OSEN) { |
| return "OSEN"; |
| } |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::WAPI) { |
| return "WAPI"; |
| } |
| std::string os; |
| os += toHexString(static_cast<uint32_t>(o)); |
| return os; |
| } |
| |
| static inline void PrintTo(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask o, ::std::ostream* os) { |
| *os << toString(o); |
| } |
| |
| template<> |
| inline std::string toString<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask>(uint32_t o) { |
| using ::android::hardware::details::toHexString; |
| std::string os; |
| ::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask> flipped = 0; |
| bool first = true; |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_EAP) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_EAP)) { |
| os += (first ? "" : " | "); |
| os += "WPA_EAP"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_EAP; |
| } |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_PSK) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_PSK)) { |
| os += (first ? "" : " | "); |
| os += "WPA_PSK"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_PSK; |
| } |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::NONE) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::NONE)) { |
| os += (first ? "" : " | "); |
| os += "NONE"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::NONE; |
| } |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::IEEE8021X) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::IEEE8021X)) { |
| os += (first ? "" : " | "); |
| os += "IEEE8021X"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::IEEE8021X; |
| } |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FT_EAP) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FT_EAP)) { |
| os += (first ? "" : " | "); |
| os += "FT_EAP"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FT_EAP; |
| } |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FT_PSK) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FT_PSK)) { |
| os += (first ? "" : " | "); |
| os += "FT_PSK"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FT_PSK; |
| } |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::OSEN) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::OSEN)) { |
| os += (first ? "" : " | "); |
| os += "OSEN"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::OSEN; |
| } |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_EAP_SHA256) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_EAP_SHA256)) { |
| os += (first ? "" : " | "); |
| os += "WPA_EAP_SHA256"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_EAP_SHA256; |
| } |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_PSK_SHA256) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_PSK_SHA256)) { |
| os += (first ? "" : " | "); |
| os += "WPA_PSK_SHA256"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_PSK_SHA256; |
| } |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::SAE) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::SAE)) { |
| os += (first ? "" : " | "); |
| os += "SAE"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::SAE; |
| } |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::SUITE_B_192) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::SUITE_B_192)) { |
| os += (first ? "" : " | "); |
| os += "SUITE_B_192"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::SUITE_B_192; |
| } |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::OWE) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::OWE)) { |
| os += (first ? "" : " | "); |
| os += "OWE"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::OWE; |
| } |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::DPP) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::DPP)) { |
| os += (first ? "" : " | "); |
| os += "DPP"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::DPP; |
| } |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WAPI_PSK) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WAPI_PSK)) { |
| os += (first ? "" : " | "); |
| os += "WAPI_PSK"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WAPI_PSK; |
| } |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WAPI_CERT) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WAPI_CERT)) { |
| os += (first ? "" : " | "); |
| os += "WAPI_CERT"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WAPI_CERT; |
| } |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FILS_SHA256) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FILS_SHA256)) { |
| os += (first ? "" : " | "); |
| os += "FILS_SHA256"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FILS_SHA256; |
| } |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FILS_SHA384) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FILS_SHA384)) { |
| os += (first ? "" : " | "); |
| os += "FILS_SHA384"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FILS_SHA384; |
| } |
| if (o != flipped) { |
| os += (first ? "" : " | "); |
| os += toHexString(o & (~flipped)); |
| }os += " ("; |
| os += toHexString(o); |
| os += ")"; |
| return os; |
| } |
| |
| static inline std::string toString(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask o) { |
| using ::android::hardware::details::toHexString; |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_EAP) { |
| return "WPA_EAP"; |
| } |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_PSK) { |
| return "WPA_PSK"; |
| } |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::NONE) { |
| return "NONE"; |
| } |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::IEEE8021X) { |
| return "IEEE8021X"; |
| } |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FT_EAP) { |
| return "FT_EAP"; |
| } |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FT_PSK) { |
| return "FT_PSK"; |
| } |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::OSEN) { |
| return "OSEN"; |
| } |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_EAP_SHA256) { |
| return "WPA_EAP_SHA256"; |
| } |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_PSK_SHA256) { |
| return "WPA_PSK_SHA256"; |
| } |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::SAE) { |
| return "SAE"; |
| } |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::SUITE_B_192) { |
| return "SUITE_B_192"; |
| } |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::OWE) { |
| return "OWE"; |
| } |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::DPP) { |
| return "DPP"; |
| } |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WAPI_PSK) { |
| return "WAPI_PSK"; |
| } |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WAPI_CERT) { |
| return "WAPI_CERT"; |
| } |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FILS_SHA256) { |
| return "FILS_SHA256"; |
| } |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FILS_SHA384) { |
| return "FILS_SHA384"; |
| } |
| std::string os; |
| os += toHexString(static_cast<uint32_t>(o)); |
| return os; |
| } |
| |
| static inline void PrintTo(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask o, ::std::ostream* os) { |
| *os << toString(o); |
| } |
| |
| template<> |
| inline std::string toString<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask>(uint32_t o) { |
| using ::android::hardware::details::toHexString; |
| std::string os; |
| ::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask> flipped = 0; |
| bool first = true; |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::NONE) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::NONE)) { |
| os += (first ? "" : " | "); |
| os += "NONE"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::NONE; |
| } |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::TKIP) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::TKIP)) { |
| os += (first ? "" : " | "); |
| os += "TKIP"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::TKIP; |
| } |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::CCMP) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::CCMP)) { |
| os += (first ? "" : " | "); |
| os += "CCMP"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::CCMP; |
| } |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::GCMP_256) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::GCMP_256)) { |
| os += (first ? "" : " | "); |
| os += "GCMP_256"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::GCMP_256; |
| } |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::SMS4) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::SMS4)) { |
| os += (first ? "" : " | "); |
| os += "SMS4"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::SMS4; |
| } |
| if (o != flipped) { |
| os += (first ? "" : " | "); |
| os += toHexString(o & (~flipped)); |
| }os += " ("; |
| os += toHexString(o); |
| os += ")"; |
| return os; |
| } |
| |
| static inline std::string toString(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask o) { |
| using ::android::hardware::details::toHexString; |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::NONE) { |
| return "NONE"; |
| } |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::TKIP) { |
| return "TKIP"; |
| } |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::CCMP) { |
| return "CCMP"; |
| } |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::GCMP_256) { |
| return "GCMP_256"; |
| } |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::SMS4) { |
| return "SMS4"; |
| } |
| std::string os; |
| os += toHexString(static_cast<uint32_t>(o)); |
| return os; |
| } |
| |
| static inline void PrintTo(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask o, ::std::ostream* os) { |
| *os << toString(o); |
| } |
| |
| template<> |
| inline std::string toString<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask>(uint32_t o) { |
| using ::android::hardware::details::toHexString; |
| std::string os; |
| ::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask> flipped = 0; |
| bool first = true; |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::WEP40) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::WEP40)) { |
| os += (first ? "" : " | "); |
| os += "WEP40"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::WEP40; |
| } |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::WEP104) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::WEP104)) { |
| os += (first ? "" : " | "); |
| os += "WEP104"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::WEP104; |
| } |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::TKIP) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::TKIP)) { |
| os += (first ? "" : " | "); |
| os += "TKIP"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::TKIP; |
| } |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::CCMP) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::CCMP)) { |
| os += (first ? "" : " | "); |
| os += "CCMP"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::CCMP; |
| } |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::GTK_NOT_USED) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::GTK_NOT_USED)) { |
| os += (first ? "" : " | "); |
| os += "GTK_NOT_USED"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::GTK_NOT_USED; |
| } |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::GCMP_256) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::GCMP_256)) { |
| os += (first ? "" : " | "); |
| os += "GCMP_256"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::GCMP_256; |
| } |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::SMS4) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::SMS4)) { |
| os += (first ? "" : " | "); |
| os += "SMS4"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::SMS4; |
| } |
| if (o != flipped) { |
| os += (first ? "" : " | "); |
| os += toHexString(o & (~flipped)); |
| }os += " ("; |
| os += toHexString(o); |
| os += ")"; |
| return os; |
| } |
| |
| static inline std::string toString(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask o) { |
| using ::android::hardware::details::toHexString; |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::WEP40) { |
| return "WEP40"; |
| } |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::WEP104) { |
| return "WEP104"; |
| } |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::TKIP) { |
| return "TKIP"; |
| } |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::CCMP) { |
| return "CCMP"; |
| } |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::GTK_NOT_USED) { |
| return "GTK_NOT_USED"; |
| } |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::GCMP_256) { |
| return "GCMP_256"; |
| } |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::SMS4) { |
| return "SMS4"; |
| } |
| std::string os; |
| os += toHexString(static_cast<uint32_t>(o)); |
| return os; |
| } |
| |
| static inline void PrintTo(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask o, ::std::ostream* os) { |
| *os << toString(o); |
| } |
| |
| template<> |
| inline std::string toString<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask>(uint32_t o) { |
| using ::android::hardware::details::toHexString; |
| std::string os; |
| ::android::hardware::hidl_bitfield<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask> flipped = 0; |
| bool first = true; |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::OPEN) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::OPEN)) { |
| os += (first ? "" : " | "); |
| os += "OPEN"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::OPEN; |
| } |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::SHARED) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::SHARED)) { |
| os += (first ? "" : " | "); |
| os += "SHARED"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::SHARED; |
| } |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::LEAP) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::LEAP)) { |
| os += (first ? "" : " | "); |
| os += "LEAP"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::LEAP; |
| } |
| if ((o & ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::SAE) == static_cast<uint32_t>(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::SAE)) { |
| os += (first ? "" : " | "); |
| os += "SAE"; |
| first = false; |
| flipped |= ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::SAE; |
| } |
| if (o != flipped) { |
| os += (first ? "" : " | "); |
| os += toHexString(o & (~flipped)); |
| }os += " ("; |
| os += toHexString(o); |
| os += ")"; |
| return os; |
| } |
| |
| static inline std::string toString(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask o) { |
| using ::android::hardware::details::toHexString; |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::OPEN) { |
| return "OPEN"; |
| } |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::SHARED) { |
| return "SHARED"; |
| } |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::LEAP) { |
| return "LEAP"; |
| } |
| if (o == ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::SAE) { |
| return "SAE"; |
| } |
| std::string os; |
| os += toHexString(static_cast<uint32_t>(o)); |
| return os; |
| } |
| |
| static inline void PrintTo(::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask o, ::std::ostream* os) { |
| *os << toString(o); |
| } |
| |
| static inline std::string toString(const ::android::sp<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork>& o) { |
| std::string os = "[class or subclass of "; |
| os += ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::descriptor; |
| os += "]"; |
| os += o->isRemote() ? "@remote" : "@local"; |
| return os; |
| } |
| |
| |
| } // namespace V1_3 |
| } // namespace supplicant |
| } // namespace wifi |
| } // namespace hardware |
| } // namespace android |
| |
| // |
| // global type declarations for package |
| // |
| |
| namespace android { |
| namespace hardware { |
| namespace details { |
| #pragma clang diagnostic push |
| #pragma clang diagnostic ignored "-Wc++17-extensions" |
| template<> inline constexpr std::array<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask, 4> hidl_enum_values<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask> = { |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::WPA, |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::RSN, |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::OSEN, |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::ProtoMask::WAPI, |
| }; |
| #pragma clang diagnostic pop |
| } // namespace details |
| } // namespace hardware |
| } // namespace android |
| |
| namespace android { |
| namespace hardware { |
| namespace details { |
| #pragma clang diagnostic push |
| #pragma clang diagnostic ignored "-Wc++17-extensions" |
| template<> inline constexpr std::array<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask, 17> hidl_enum_values<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask> = { |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_EAP, |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_PSK, |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::NONE, |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::IEEE8021X, |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FT_EAP, |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FT_PSK, |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::OSEN, |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_EAP_SHA256, |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WPA_PSK_SHA256, |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::SAE, |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::SUITE_B_192, |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::OWE, |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::DPP, |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WAPI_PSK, |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::WAPI_CERT, |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FILS_SHA256, |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::KeyMgmtMask::FILS_SHA384, |
| }; |
| #pragma clang diagnostic pop |
| } // namespace details |
| } // namespace hardware |
| } // namespace android |
| |
| namespace android { |
| namespace hardware { |
| namespace details { |
| #pragma clang diagnostic push |
| #pragma clang diagnostic ignored "-Wc++17-extensions" |
| template<> inline constexpr std::array<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask, 5> hidl_enum_values<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask> = { |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::NONE, |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::TKIP, |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::CCMP, |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::GCMP_256, |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::PairwiseCipherMask::SMS4, |
| }; |
| #pragma clang diagnostic pop |
| } // namespace details |
| } // namespace hardware |
| } // namespace android |
| |
| namespace android { |
| namespace hardware { |
| namespace details { |
| #pragma clang diagnostic push |
| #pragma clang diagnostic ignored "-Wc++17-extensions" |
| template<> inline constexpr std::array<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask, 7> hidl_enum_values<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask> = { |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::WEP40, |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::WEP104, |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::TKIP, |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::CCMP, |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::GTK_NOT_USED, |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::GCMP_256, |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::GroupCipherMask::SMS4, |
| }; |
| #pragma clang diagnostic pop |
| } // namespace details |
| } // namespace hardware |
| } // namespace android |
| |
| namespace android { |
| namespace hardware { |
| namespace details { |
| #pragma clang diagnostic push |
| #pragma clang diagnostic ignored "-Wc++17-extensions" |
| template<> inline constexpr std::array<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask, 4> hidl_enum_values<::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask> = { |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::OPEN, |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::SHARED, |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::LEAP, |
| ::android::hardware::wifi::supplicant::V1_3::ISupplicantStaNetwork::AuthAlgMask::SAE, |
| }; |
| #pragma clang diagnostic pop |
| } // namespace details |
| } // namespace hardware |
| } // namespace android |
| |
| |
| #endif // HIDL_GENERATED_ANDROID_HARDWARE_WIFI_SUPPLICANT_V1_3_ISUPPLICANTSTANETWORK_H |