/system/update_engine/ |
connection_utils.cc | 19 #include <shill/dbus-constants.h> 25 if (type_str == shill::kTypeEthernet) { 27 } else if (type_str == shill::kTypeWifi) { 29 } else if (type_str == shill::kTypeWimax) { 31 } else if (type_str == shill::kTypeBluetooth) { 33 } else if (type_str == shill::kTypeCellular) { 40 if (tethering_str == shill::kTetheringNotDetectedState) { 42 } else if (tethering_str == shill::kTetheringSuspectedState) { 44 } else if (tethering_str == shill::kTetheringConfirmedState) { 53 return shill::kTypeEthernet [all...] |
connection_manager_unittest.cc | 28 #include <shill/dbus-constants.h> 29 #include <shill/dbus-proxies.h> 30 #include <shill/dbus-proxy-mocks.h> 103 reply_dict[shill::kDefaultServiceProperty] = 118 reply_dict[shill::kTypeProperty] = string(service_type); 121 reply_dict[shill::kPhysicalTechnologyProperty] = 126 reply_dict[shill::kTetheringProperty] = string(service_tethering); 146 shill::kTetheringNotDetectedState); 161 "/service/guest/network", shill::kTypeWifi, nullptr, service_tethering); 172 TestWithServiceType(shill::kTypeEthernet, nullptr, ConnectionType::kEthernet) [all...] |
connection_manager.cc | 25 #include <shill/dbus-constants.h> 26 #include <shill/dbus-proxies.h> 76 if (!base::ContainsKey(allowed_types, shill::kTypeCellular)) { 129 // Shill uses the "/" service path to indicate that it is not connected. 146 properties.find(shill::kDefaultServiceProperty); 167 const auto& prop_tethering = properties.find(shill::kTetheringProperty); 179 const auto& prop_type = properties.find(shill::kTypeProperty); 187 if (type_str == shill::kTypeVPN) { 189 properties.find(shill::kPhysicalTechnologyProperty);
|
fake_shill_proxy.h | 25 #include <shill/dbus-proxies.h> 26 #include <shill/dbus-proxy-mocks.h> 32 // This class implements the connection to shill using real DBus calls.
|
shill_proxy_interface.h | 25 #include <shill/dbus-proxies.h> 29 // This class handles the DBus connection with shill daemon. The DBus interface 30 // with shill requires to monitor or request the current service by interacting 38 // Return the ManagerProxy instance of the shill daemon. The instance is owned
|
/external/autotest/client/site_tests/network_DefaultProfileServices/ |
network_DefaultProfileServices.py | 15 Wipe the default profile, start shill, configure a service, restart 16 shill, and check that the service exists. 22 DEFAULT_PROFILE_PATH = '/var/cache/shill/default.profile' 31 shill = shill_proxy.ShillProxy.get_proxy() 32 if shill is None: 33 raise error.TestFail('Could not connect to shill') 35 shill.manager.PopAllUserProfiles() 36 path = shill.configure_service({ 37 shill.SERVICE_PROPERTY_TYPE: 'wifi', 38 shill.SERVICE_PROPERTY_MODE: 'managed' [all...] |
/external/autotest/client/cros/scripts/ |
profile | 41 shill = shill_proxy.ShillProxy() 43 active_profile = shill.get_active_profile() 45 active_name = shill.dbus2primitive( 46 properties[shill.PROFILE_PROPERTY_NAME]) 51 shill.manager.PopProfile(active_name) 52 shill.manager.RemoveProfile(active_name) 67 shill = shill_proxy.ShillProxy() 68 properties = shill.dbus2primitive( 69 shill.manager.GetProperties(utf8_strings=True)) 70 active_profile = shill.get_active_profile( [all...] |
destination | 35 shill = shill_proxy.ShillProxy() 40 if shill.manager.VerifyDestination(*args[0:NUM_VERIFY_ARGS]): 48 print shill.manager.VerifyAndEncryptData(*args[0:NUM_ENCRYPT_ARGS])
|
device | 44 shill = shill_proxy.ShillProxy() 47 shill.dbus2primitive(device.GetProperties(utf8_strings=True)), 58 shill = shill_proxy.ShillProxy() 59 for device in shill.get_devices(): 77 shill = shill_proxy.ShillProxy() 78 device = shill.find_object('Device', {'Name': sys.argv[2]})
|
/external/autotest/client/site_tests/network_WiFiInvalidParameters/ |
network_WiFiInvalidParameters.py | 15 """Test that shill will reject invalid WiFi service configurations. 17 In particular, this test checks shill's behavior with invalid SSIDs, 41 def check_bad_ssids(self, shill): 42 """Assert that shill will reject attempts connect to invalid SSIDs. 44 @param shill ShillProxy object representing shill. 49 config_params = {shill.SERVICE_PROPERTY_TYPE: 'wifi', 50 shill.SERVICE_PROPERTY_SSID: ssid, 51 shill.SERVICE_PROPERTY_SECURITY_CLASS: 'none'} 54 shill.configure_service(config_params [all...] |
/system/update_engine/update_manager/ |
real_shill_provider_unittest.cc | 26 #include <shill/dbus-constants.h> 27 #include <shill/dbus-proxies.h> 28 #include <shill/dbus-proxy-mocks.h> 137 shill::kDefaultServiceProperty, dbus::ObjectPath(service_path)); 180 shill::kTetheringNotDetectedState, 199 service_path, shill::kTypeEthernet, shill_tethering, &conn_change_time); 234 reply_dict[shill::kDefaultServiceProperty] = 250 reply_dict[shill::kTypeProperty] = std::string(service_type); 253 reply_dict[shill::kPhysicalTechnologyProperty] = 258 reply_dict[shill::kTetheringProperty] = std::string(service_tethering) [all...] |
real_shill_provider.cc | 24 #include <shill/dbus-constants.h> 25 #include <shill/dbus-proxies.h> 46 // Attempt to read initial connection status. Even if this fails because shill 55 properties.find(shill::kDefaultServiceProperty); 66 if (name == shill::kDefaultServiceProperty) { 122 const auto& prop_tethering = properties.find(shill::kTetheringProperty); 125 // error in shill and the policy will handle it, but we will print a log 139 const auto& prop_type = properties.find(shill::kTypeProperty); 146 if (type_str == shill::kTypeVPN) { 148 properties.find(shill::kPhysicalTechnologyProperty) [all...] |
/external/autotest/client/site_tests/cellular_Smoke/ |
cellular_Smoke.py | 41 device = self.test_env.shill.find_cellular_device_object() 45 service = self.test_env.shill.wait_for_cellular_service_object() 50 self.test_env.shill.connect_service_synchronous( 53 state = self.test_env.shill.get_dbus_property( 66 interface = self.test_env.shill.get_dbus_property( 82 self.test_env.shill.disconnect_service_synchronous( 101 test_env.shill.find_cellular_service_object, False):
|
/external/autotest/client/site_tests/cellular_SafetyDance/ |
cellular_SafetyDance.py | 42 self.test_env.shill.manager.EnableTechnology('cellular')) 47 self.test_env.shill.manager.DisableTechnology('cellular')) 60 return not self.test_env.shill.find_cellular_service_object() 66 service = self.test_env.shill.wait_for_cellular_service_object( 72 self.test_env.shill.connect_service_synchronous( 82 service = self.test_env.shill.wait_for_cellular_service_object( 88 self.test_env.shill.disconnect_service_synchronous( 114 self.device = self.test_env.shill.find_cellular_device_object() 128 test_env.shill.find_cellular_service_object, False): 133 test_env.shill.wait_for_cellular_service_object( [all...] |
/external/autotest/client/site_tests/cellular_DeferredRegistration/ |
cellular_DeferredRegistration.py | 18 Tests that shill can handle temporary registration loss without 21 sure that shill still disconnects a service that has suffered a 31 service = self.test_env.shill.find_cellular_service_object() 32 self.test_env.shill.connect_service_synchronous( 34 timeout_seconds=self.test_env.shill.SERVICE_CONNECT_TIMEOUT) 52 if self.test_env.shill.find_cellular_service_object() is None: 64 if self.test_env.shill.find_cellular_service_object() is not None:
|
/external/autotest/client/site_tests/network_BasicProfileProperties/ |
network_BasicProfileProperties.py | 14 """Test that shill's DBus properties for profiles work.""" 44 shill = wifi_proxy.WifiProxy.get_proxy() 46 shill.manager, profile_name=self.PROFILE_NAME): 47 profiles = shill.get_profiles() 51 profile_properties = shill.dbus2primitive( 60 entries = shill.dbus2primitive(self.get_field_from_properties(
|
/external/autotest/server/site_tests/network_WiFi_ChaosConnectDisconnect/ |
network_WiFi_ChaosConnectDisconnect.py | 37 client.shill.disconnect(assoc_params.ssid) 38 if not client.shill.init_test_network_state(): 48 client.shill.connect_wifi(assoc_params)) 70 client.shill.disconnect(assoc_params.ssid) 71 client.shill.clean_profiles()
|
/external/autotest/server/site_tests/network_WiFi_ChaosLongConnect/ |
network_WiFi_ChaosLongConnect.py | 39 client.shill.disconnect(assoc_params.ssid) 40 if not client.shill.init_test_network_state(): 51 client.shill.connect_wifi(assoc_params)) 76 client.shill.disconnect(assoc_params.ssid) 77 client.shill.clean_profiles()
|
/external/autotest/client/cros/networking/ |
shill_context.py | 5 """A collection of context managers for working with shill objects.""" 17 SHILL_START_LOCK_PATH = '/run/lock/shill-start.lock' 20 """An error raised by a context managers dealing with shill objects.""" 25 """A context manager for allowing only specified technologies in shill. 42 shill = shill_proxy.ShillProxy.get_proxy() 46 enabled = shill.get_dbus_property( 47 shill.manager, 53 prohibited_csv = shill.get_dbus_property( 54 shill.manager, 73 shill.set_dbus_property [all...] |
/external/autotest/server/site_tests/network_WiFi_ProfileBasic/ |
network_WiFi_ProfileBasic.py | 27 if not all([self._wifi_client.shill.create_profile(self.profile_name), 28 self._wifi_client.shill.push_profile(self.profile_name)]): 36 self._wifi_client.shill.pop_profile(self.profile_name) 37 if not self._wifi_client.shill.remove_profile(self.profile_name): 71 self.context.client.shill.clean_profiles() 88 if not self.context.client.shill.pop_profile(bottom.profile_name): 94 if not self.context.client.shill.push_profile(bottom.profile_name): 102 self.context.client.shill.disconnect(client_config0.ssid) 108 # disconnected" flag on all services. This should cause shill 121 if not self.context.client.shill.delete_entries_for_ssid [all...] |
/external/autotest/client/site_tests/cellular_SIMLocking/ |
cellular_SIMLocking.py | 20 Test the SIM locking functionality of shill. 63 if e.get_dbus_name() == self.test_env.shill.ERROR_INCORRECT_PIN: 76 if e.get_dbus_name() == self.test_env.shill.ERROR_INCORRECT_PIN: 87 self.test_env.shill.DEVICE_PROPERTY_SIM_LOCK_STATUS, 91 return self.test_env.shill.dbus2primitive(sim_lock_status) 98 self.test_env.shill.PROPERTY_KEY_SIM_LOCK_ENABLED, 110 self.test_env.shill.PROPERTY_KEY_SIM_LOCK_TYPE, 115 return lock_type == self.test_env.shill.VALUE_SIM_LOCK_TYPE_PIN 122 self.test_env.shill.PROPERTY_KEY_SIM_LOCK_TYPE, 127 return lock_type == self.test_env.shill.VALUE_SIM_LOCK_TYPE_PU [all...] |
/external/vboot_reference/tests/ |
rbtest.conf | 16 # shill to start, but that's not enough, and in the while loop below we also 19 start on started shill
|
/external/autotest/client/site_tests/cellular_ModemControl/ |
cellular_ModemControl.py | 33 """Control the modem mostly using shill Technology interfaces.""" 34 def __init__(self, shill, command_delegate): 35 self.shill = shill 39 self.shill.manager.EnableTechnology( 43 self.shill.manager.DisableTechnology( 79 True - to indicate that shill may autoconnect again. 94 """Control the modem using shill device interfaces.""" 95 def __init__(self, shill, device, slow_connect): 96 self.shill = shil [all...] |
/external/autotest/client/site_tests/network_RestartShill/ |
network_RestartShill.py | 13 Stop shill, restart it, check that we can talk to it. 15 DEFAULT_PROFILE_PATH = '/var/cache/shill/default.profile' 24 shill = shill_proxy.ShillProxy.get_proxy()
|
/external/autotest/client/site_tests/cellular_DisconnectFailure/ |
cellular_DisconnectFailure.py | 57 modem state to DISCONNECTING and then fails, fooling shill into 157 service = self.test_env.shill.find_cellular_service_object() 168 service = self.test_env.shill.find_cellular_service_object() 211 service = self.test_env.shill.find_cellular_service_object() 212 self.test_env.shill.connect_service_synchronous( 216 self.test_env.shill.disconnect_service_synchronous( 237 service = self.test_env.shill.find_cellular_service_object() 238 self.test_env.shill.connect_service_synchronous( 242 self.test_env.shill.disconnect_service_synchronous( 254 self.test_env.shill.disconnect_service_synchronous [all...] |