Update APF VTS for VSR-14 compliance
Modified the VTS to check the APF version is 4 (or higher) as mandated
by VSR-14.
Bug: 380756020
Test: TH
Change-Id: I28f6579bf426e5338880fcc6afff33c769f29634
Merged-In: I28f6579bf426e5338880fcc6afff33c769f29634
(cherry picked from commit fe83a98b3e139a0caf7d7f5b64ec3144e26b9b41)
diff --git a/wifi/aidl/vts/functional/wifi_sta_iface_aidl_test.cpp b/wifi/aidl/vts/functional/wifi_sta_iface_aidl_test.cpp
index e456e49..2ee960f 100644
--- a/wifi/aidl/vts/functional/wifi_sta_iface_aidl_test.cpp
+++ b/wifi/aidl/vts/functional/wifi_sta_iface_aidl_test.cpp
@@ -175,9 +175,9 @@
EXPECT_TRUE(isFeatureSupported(IWifiStaIface::FeatureSetMask::APF));
StaApfPacketFilterCapabilities apf_caps = {};
EXPECT_TRUE(wifi_sta_iface_->getApfPacketFilterCapabilities(&apf_caps).isOk());
- // The APF version must be 4 and the usable memory must be at least
+ // The APF version must be 4 or higher and the usable memory must be at least
// 1024 bytes.
- EXPECT_EQ(apf_caps.version, 4);
+ EXPECT_GE(apf_caps.version, 4);
EXPECT_GE(apf_caps.maxLength, 1024);
}
}