HomeSort by relevance Sort by last modified time
    Searched refs:shill (Results 1 - 25 of 83) sorted by null

1 2 3 4

  /system/update_engine/
connection_utils.cc 19 #include <shill/dbus-constants.h>
25 if (type_str == shill::kTypeEthernet) {
27 } else if (type_str == shill::kTypeWifi) {
29 } else if (type_str == shill::kTypeWimax) {
31 } else if (type_str == shill::kTypeBluetooth) {
33 } else if (type_str == shill::kTypeCellular) {
40 if (tethering_str == shill::kTetheringNotDetectedState) {
42 } else if (tethering_str == shill::kTetheringSuspectedState) {
44 } else if (tethering_str == shill::kTetheringConfirmedState) {
53 return shill::kTypeEthernet
    [all...]
connection_manager_unittest.cc 28 #include <shill/dbus-constants.h>
29 #include <shill/dbus-proxies.h>
30 #include <shill/dbus-proxy-mocks.h>
103 reply_dict[shill::kDefaultServiceProperty] =
118 reply_dict[shill::kTypeProperty] = string(service_type);
121 reply_dict[shill::kPhysicalTechnologyProperty] =
126 reply_dict[shill::kTetheringProperty] = string(service_tethering);
146 shill::kTetheringNotDetectedState);
161 "/service/guest/network", shill::kTypeWifi, nullptr, service_tethering);
172 TestWithServiceType(shill::kTypeEthernet, nullptr, ConnectionType::kEthernet)
    [all...]
connection_manager.cc 25 #include <shill/dbus-constants.h>
26 #include <shill/dbus-proxies.h>
76 if (!base::ContainsKey(allowed_types, shill::kTypeCellular)) {
129 // Shill uses the "/" service path to indicate that it is not connected.
146 properties.find(shill::kDefaultServiceProperty);
167 const auto& prop_tethering = properties.find(shill::kTetheringProperty);
179 const auto& prop_type = properties.find(shill::kTypeProperty);
187 if (type_str == shill::kTypeVPN) {
189 properties.find(shill::kPhysicalTechnologyProperty);
fake_shill_proxy.h 25 #include <shill/dbus-proxies.h>
26 #include <shill/dbus-proxy-mocks.h>
32 // This class implements the connection to shill using real DBus calls.
shill_proxy_interface.h 25 #include <shill/dbus-proxies.h>
29 // This class handles the DBus connection with shill daemon. The DBus interface
30 // with shill requires to monitor or request the current service by interacting
38 // Return the ManagerProxy instance of the shill daemon. The instance is owned
  /external/autotest/client/site_tests/network_DefaultProfileServices/
network_DefaultProfileServices.py 15 Wipe the default profile, start shill, configure a service, restart
16 shill, and check that the service exists.
22 DEFAULT_PROFILE_PATH = '/var/cache/shill/default.profile'
31 shill = shill_proxy.ShillProxy.get_proxy()
32 if shill is None:
33 raise error.TestFail('Could not connect to shill')
35 shill.manager.PopAllUserProfiles()
36 path = shill.configure_service({
37 shill.SERVICE_PROPERTY_TYPE: 'wifi',
38 shill.SERVICE_PROPERTY_MODE: 'managed'
    [all...]
  /external/autotest/client/cros/scripts/
profile 41 shill = shill_proxy.ShillProxy()
43 active_profile = shill.get_active_profile()
45 active_name = shill.dbus2primitive(
46 properties[shill.PROFILE_PROPERTY_NAME])
51 shill.manager.PopProfile(active_name)
52 shill.manager.RemoveProfile(active_name)
67 shill = shill_proxy.ShillProxy()
68 properties = shill.dbus2primitive(
69 shill.manager.GetProperties(utf8_strings=True))
70 active_profile = shill.get_active_profile(
    [all...]
destination 35 shill = shill_proxy.ShillProxy()
40 if shill.manager.VerifyDestination(*args[0:NUM_VERIFY_ARGS]):
48 print shill.manager.VerifyAndEncryptData(*args[0:NUM_ENCRYPT_ARGS])
device 44 shill = shill_proxy.ShillProxy()
47 shill.dbus2primitive(device.GetProperties(utf8_strings=True)),
58 shill = shill_proxy.ShillProxy()
59 for device in shill.get_devices():
77 shill = shill_proxy.ShillProxy()
78 device = shill.find_object('Device', {'Name': sys.argv[2]})
  /external/autotest/client/site_tests/network_WiFiInvalidParameters/
network_WiFiInvalidParameters.py 15 """Test that shill will reject invalid WiFi service configurations.
17 In particular, this test checks shill's behavior with invalid SSIDs,
41 def check_bad_ssids(self, shill):
42 """Assert that shill will reject attempts connect to invalid SSIDs.
44 @param shill ShillProxy object representing shill.
49 config_params = {shill.SERVICE_PROPERTY_TYPE: 'wifi',
50 shill.SERVICE_PROPERTY_SSID: ssid,
51 shill.SERVICE_PROPERTY_SECURITY_CLASS: 'none'}
54 shill.configure_service(config_params
    [all...]
  /system/update_engine/update_manager/
real_shill_provider_unittest.cc 26 #include <shill/dbus-constants.h>
27 #include <shill/dbus-proxies.h>
28 #include <shill/dbus-proxy-mocks.h>
137 shill::kDefaultServiceProperty, dbus::ObjectPath(service_path));
180 shill::kTetheringNotDetectedState,
199 service_path, shill::kTypeEthernet, shill_tethering, &conn_change_time);
234 reply_dict[shill::kDefaultServiceProperty] =
250 reply_dict[shill::kTypeProperty] = std::string(service_type);
253 reply_dict[shill::kPhysicalTechnologyProperty] =
258 reply_dict[shill::kTetheringProperty] = std::string(service_tethering)
    [all...]
real_shill_provider.cc 24 #include <shill/dbus-constants.h>
25 #include <shill/dbus-proxies.h>
46 // Attempt to read initial connection status. Even if this fails because shill
55 properties.find(shill::kDefaultServiceProperty);
66 if (name == shill::kDefaultServiceProperty) {
122 const auto& prop_tethering = properties.find(shill::kTetheringProperty);
125 // error in shill and the policy will handle it, but we will print a log
139 const auto& prop_type = properties.find(shill::kTypeProperty);
146 if (type_str == shill::kTypeVPN) {
148 properties.find(shill::kPhysicalTechnologyProperty)
    [all...]
  /external/autotest/client/site_tests/cellular_Smoke/
cellular_Smoke.py 41 device = self.test_env.shill.find_cellular_device_object()
45 service = self.test_env.shill.wait_for_cellular_service_object()
50 self.test_env.shill.connect_service_synchronous(
53 state = self.test_env.shill.get_dbus_property(
66 interface = self.test_env.shill.get_dbus_property(
82 self.test_env.shill.disconnect_service_synchronous(
101 test_env.shill.find_cellular_service_object, False):
  /external/autotest/client/site_tests/cellular_SafetyDance/
cellular_SafetyDance.py 42 self.test_env.shill.manager.EnableTechnology('cellular'))
47 self.test_env.shill.manager.DisableTechnology('cellular'))
60 return not self.test_env.shill.find_cellular_service_object()
66 service = self.test_env.shill.wait_for_cellular_service_object(
72 self.test_env.shill.connect_service_synchronous(
82 service = self.test_env.shill.wait_for_cellular_service_object(
88 self.test_env.shill.disconnect_service_synchronous(
114 self.device = self.test_env.shill.find_cellular_device_object()
128 test_env.shill.find_cellular_service_object, False):
133 test_env.shill.wait_for_cellular_service_object(
    [all...]
  /external/autotest/client/site_tests/cellular_DeferredRegistration/
cellular_DeferredRegistration.py 18 Tests that shill can handle temporary registration loss without
21 sure that shill still disconnects a service that has suffered a
31 service = self.test_env.shill.find_cellular_service_object()
32 self.test_env.shill.connect_service_synchronous(
34 timeout_seconds=self.test_env.shill.SERVICE_CONNECT_TIMEOUT)
52 if self.test_env.shill.find_cellular_service_object() is None:
64 if self.test_env.shill.find_cellular_service_object() is not None:
  /external/autotest/client/site_tests/network_BasicProfileProperties/
network_BasicProfileProperties.py 14 """Test that shill's DBus properties for profiles work."""
44 shill = wifi_proxy.WifiProxy.get_proxy()
46 shill.manager, profile_name=self.PROFILE_NAME):
47 profiles = shill.get_profiles()
51 profile_properties = shill.dbus2primitive(
60 entries = shill.dbus2primitive(self.get_field_from_properties(
  /external/autotest/server/site_tests/network_WiFi_ChaosConnectDisconnect/
network_WiFi_ChaosConnectDisconnect.py 37 client.shill.disconnect(assoc_params.ssid)
38 if not client.shill.init_test_network_state():
48 client.shill.connect_wifi(assoc_params))
70 client.shill.disconnect(assoc_params.ssid)
71 client.shill.clean_profiles()
  /external/autotest/server/site_tests/network_WiFi_ChaosLongConnect/
network_WiFi_ChaosLongConnect.py 39 client.shill.disconnect(assoc_params.ssid)
40 if not client.shill.init_test_network_state():
51 client.shill.connect_wifi(assoc_params))
76 client.shill.disconnect(assoc_params.ssid)
77 client.shill.clean_profiles()
  /external/autotest/client/cros/networking/
shill_context.py 5 """A collection of context managers for working with shill objects."""
17 SHILL_START_LOCK_PATH = '/run/lock/shill-start.lock'
20 """An error raised by a context managers dealing with shill objects."""
25 """A context manager for allowing only specified technologies in shill.
42 shill = shill_proxy.ShillProxy.get_proxy()
46 enabled = shill.get_dbus_property(
47 shill.manager,
53 prohibited_csv = shill.get_dbus_property(
54 shill.manager,
73 shill.set_dbus_property
    [all...]
  /external/autotest/server/site_tests/network_WiFi_ProfileBasic/
network_WiFi_ProfileBasic.py 27 if not all([self._wifi_client.shill.create_profile(self.profile_name),
28 self._wifi_client.shill.push_profile(self.profile_name)]):
36 self._wifi_client.shill.pop_profile(self.profile_name)
37 if not self._wifi_client.shill.remove_profile(self.profile_name):
71 self.context.client.shill.clean_profiles()
88 if not self.context.client.shill.pop_profile(bottom.profile_name):
94 if not self.context.client.shill.push_profile(bottom.profile_name):
102 self.context.client.shill.disconnect(client_config0.ssid)
108 # disconnected" flag on all services. This should cause shill
121 if not self.context.client.shill.delete_entries_for_ssid
    [all...]
  /external/autotest/client/site_tests/cellular_SIMLocking/
cellular_SIMLocking.py 20 Test the SIM locking functionality of shill.
63 if e.get_dbus_name() == self.test_env.shill.ERROR_INCORRECT_PIN:
76 if e.get_dbus_name() == self.test_env.shill.ERROR_INCORRECT_PIN:
87 self.test_env.shill.DEVICE_PROPERTY_SIM_LOCK_STATUS,
91 return self.test_env.shill.dbus2primitive(sim_lock_status)
98 self.test_env.shill.PROPERTY_KEY_SIM_LOCK_ENABLED,
110 self.test_env.shill.PROPERTY_KEY_SIM_LOCK_TYPE,
115 return lock_type == self.test_env.shill.VALUE_SIM_LOCK_TYPE_PIN
122 self.test_env.shill.PROPERTY_KEY_SIM_LOCK_TYPE,
127 return lock_type == self.test_env.shill.VALUE_SIM_LOCK_TYPE_PU
    [all...]
  /external/vboot_reference/tests/
rbtest.conf 16 # shill to start, but that's not enough, and in the while loop below we also
19 start on started shill
  /external/autotest/client/site_tests/cellular_ModemControl/
cellular_ModemControl.py 33 """Control the modem mostly using shill Technology interfaces."""
34 def __init__(self, shill, command_delegate):
35 self.shill = shill
39 self.shill.manager.EnableTechnology(
43 self.shill.manager.DisableTechnology(
79 True - to indicate that shill may autoconnect again.
94 """Control the modem using shill device interfaces."""
95 def __init__(self, shill, device, slow_connect):
96 self.shill = shil
    [all...]
  /external/autotest/client/site_tests/network_RestartShill/
network_RestartShill.py 13 Stop shill, restart it, check that we can talk to it.
15 DEFAULT_PROFILE_PATH = '/var/cache/shill/default.profile'
24 shill = shill_proxy.ShillProxy.get_proxy()
  /external/autotest/client/site_tests/cellular_DisconnectFailure/
cellular_DisconnectFailure.py 57 modem state to DISCONNECTING and then fails, fooling shill into
157 service = self.test_env.shill.find_cellular_service_object()
168 service = self.test_env.shill.find_cellular_service_object()
211 service = self.test_env.shill.find_cellular_service_object()
212 self.test_env.shill.connect_service_synchronous(
216 self.test_env.shill.disconnect_service_synchronous(
237 service = self.test_env.shill.find_cellular_service_object()
238 self.test_env.shill.connect_service_synchronous(
242 self.test_env.shill.disconnect_service_synchronous(
254 self.test_env.shill.disconnect_service_synchronous
    [all...]

Completed in 398 milliseconds

1 2 3 4