summaryrefslogtreecommitdiff
path: root/wifi/1.5/default/hidl_struct_util.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'wifi/1.5/default/hidl_struct_util.cpp')
-rw-r--r--wifi/1.5/default/hidl_struct_util.cpp10
1 files changed, 4 insertions, 6 deletions
diff --git a/wifi/1.5/default/hidl_struct_util.cpp b/wifi/1.5/default/hidl_struct_util.cpp
index 338a8f13c1..ec8e0759a4 100644
--- a/wifi/1.5/default/hidl_struct_util.cpp
+++ b/wifi/1.5/default/hidl_struct_util.cpp
@@ -52,7 +52,7 @@ IWifiChip::ChipCapabilityMask convertLegacyLoggerFeatureToHidlChipCapability(
case legacy_hal::WIFI_LOGGER_POWER_EVENT_SUPPORTED:
return HidlChipCaps::DEBUG_RING_BUFFER_POWER_EVENT;
case legacy_hal::WIFI_LOGGER_WAKE_LOCK_SUPPORTED:
- return HidlChipCaps::DEBUG_RING_BUFFER_WAKELOCK_EVENT;
+ return HidlChipCaps::DEBUG_HOST_WAKE_REASON_STATS;
};
CHECK(false) << "Unknown legacy feature: " << feature;
return {};
@@ -158,10 +158,8 @@ bool convertLegacyFeaturesToHidlChipCapabilities(
}
}
- // There are no flags for these 3 in the legacy feature set. Adding them to
+ // There are no flags for these in the legacy feature set. Adding this to
// the set because all the current devices support it.
- *hidl_caps |= HidlChipCaps::DEBUG_RING_BUFFER_VENDOR_DATA;
- *hidl_caps |= HidlChipCaps::DEBUG_HOST_WAKE_REASON_STATS;
*hidl_caps |= HidlChipCaps::DEBUG_ERROR_ALERTS;
return true;
}
@@ -2102,7 +2100,7 @@ bool convertHidlNanDataPathInitiatorRequestToLegacy(
"ifaceName too long";
return false;
}
- strncpy(legacy_request->ndp_iface, hidl_request.ifaceName.c_str(),
+ strlcpy(legacy_request->ndp_iface, hidl_request.ifaceName.c_str(),
IFNAMSIZ + 1);
legacy_request->ndp_cfg.security_cfg =
(hidl_request.securityConfig.securityType !=
@@ -2189,7 +2187,7 @@ bool convertHidlNanDataPathIndicationResponseToLegacy(
"ifaceName too long";
return false;
}
- strncpy(legacy_request->ndp_iface, hidl_request.ifaceName.c_str(),
+ strlcpy(legacy_request->ndp_iface, hidl_request.ifaceName.c_str(),
IFNAMSIZ + 1);
legacy_request->ndp_cfg.security_cfg =
(hidl_request.securityConfig.securityType !=