Lines Matching defs:network

250      * Verifies that getConfiguredNetworksSize() returns the number of network configurations
277 // Find the network configuration to test (assume that |actualConfigs| contains them in
290 * Verifies that getConfiguredNetworksSize() returns the network configurations visible to the
303 * Verifies that getPrivilegedConfiguredNetworks() returns the network configurations visible to
317 * Verifies that getWifiConfiguration(int netId) can be used to access network configurations
339 * Verifies that getWifiConfiguration(String key) can be used to access network configurations
361 * Verifies that enableAllNetworks() enables all temporarily disabled network configurations
391 * Verifies that selectNetwork() disables all network configurations visible to the current user
402 // Enable all network configurations.
407 // Try to select a network configuration.
414 // If the network configuration is not visible to the current user, verify that
423 // If the network configuration is visible to the current user, verify that it
424 // was enabled and all other network configurations visible to the user were
446 * Verifies that saveNetwork() correctly stores a network configuration in wpa_supplicant
452 private void verifySaveNetwork(int network) throws Exception {
454 switchUserToCreatorOrParentOf(CONFIGS.get(network));
458 when(mWifiNative.setNetworkVariable(eq(network), anyString(), anyString()))
460 when(mWifiNative.setNetworkExtra(eq(network), anyString(),
462 when(mWifiNative.getNetworkVariable(network, WifiConfiguration.ssidVarName))
463 .thenReturn(encodeConfigSSID(CONFIGS.get(network)));
464 when(mWifiNative.getNetworkVariable(network, WifiConfiguration.pmfVarName))
467 // Store a network configuration.
468 mWifiConfigManager.saveNetwork(CONFIGS.get(network), CONFIGS.get(network).creatorUid);
470 // Verify that wpa_supplicant variables were written correctly for the network
473 if (CONFIGS.get(network).FQDN != null) {
474 metadata.put(WifiConfigStore.ID_STRING_KEY_FQDN, CONFIGS.get(network).FQDN);
476 metadata.put(WifiConfigStore.ID_STRING_KEY_CONFIG_KEY, CONFIGS.get(network).configKey());
478 Integer.toString(CONFIGS.get(network).creatorUid));
479 verify(mWifiNative).setNetworkExtra(network, WifiConfigStore.ID_STRING_VAR_NAME,
483 verify(mWifiNative).getNetworkVariable(network, WifiConfiguration.pmfVarName);
485 // Verify that no wpa_supplicant variables were read or written for any other network
487 verify(mWifiNative, never()).setNetworkExtra(intThat(not(network)), anyString(),
489 verify(mWifiNative, never()).setNetworkVariable(intThat(not(network)), anyString(),
491 verify(mWifiNative, never()).getNetworkVariable(intThat(not(network)), anyString());
511 // Verify that a networkHistory.txt entry was written correctly for the network
515 assertEquals(CONFIGS.get(network).configKey(), values.get(0));
518 assertEquals(Integer.toString(CONFIGS.get(network).creatorUid),
522 assertEquals(Boolean.toString(CONFIGS.get(network).shared), values.get(sharedIndex));
524 // Verify that no networkHistory.txt entries were written for any other network
531 * Verifies that saveNetwork() correctly stores a regular network configuration.
539 * Verifies that saveNetwork() correctly stores a HotSpot 2.0 network configuration.
547 * Verifies that saveNetwork() correctly stores a private network configuration.
564 // Set up list of network configurations returned by wpa_supplicant.
565 final String header = "network id / ssid / bssid / flags";
573 // Set up variables returned by wpa_supplicant for the individual network configurations.
578 // Legacy regular network configuration: No "id_str".
581 // Legacy Hotspot 2.0 network configuration: Quoted FQDN in "id_str".
586 // Up-to-date Hotspot 2.0 network configuration: Metadata in "id_str".
594 // Up-to-date regular network configuration: Metadata in "id_str".
635 // Load network configurations.
638 // Verify that network configurations were loaded and correlated correctly across the three
644 * Verifies that loadConfiguredNetworks() correctly handles duplicates when reading network
652 // Set up list of network configurations returned by wpa_supplicant. The two configurations
653 // are identical except for their network IDs.
654 final String header = "network id / ssid / bssid / flags";
670 // Load network configurations.
673 // Verify that the second network configuration (network ID 1) overwrote the first (network
679 * Verifies that handleUserSwitch() removes ephemeral network configurations, disables network
680 * configurations that should no longer be visible and enables network configurations that
727 // Verify that the ephemeral network configuration was removed.
737 // Verify that the other network configurations were revealed/hidden and enabled/disabled as
760 * network configuration and reveals a private network configuration.
769 * network configuration.
778 testSaveLoadSingleEapNetwork("eap network", new EnterpriseConfig(Eap.TTLS)
782 testSaveLoadSingleEapNetwork("eap network", new EnterpriseConfig(Eap.TTLS)
797 // network configurations.
807 // network configurations.
821 // Store a network configuration.
824 // Verify that wpa_supplicant variables were written correctly for the network
839 final String header = "network id / ssid / bssid / flags";
977 * network in expectedNetworkIDOrder list.
985 assertEquals("Expected network ID: " + pnoNetwork.networkId,
1167 * Verifies that hasEverConnected is false for a newly added network
1174 assertFalse("Adding a new network should not have hasEverConnected set to true.",
1180 * Verifies that hasEverConnected is false for a newly added network even when new config has
1192 assertFalse("Adding a new network should not have hasEverConnected set to true.",
1207 assertFalse("Adding a new network should not have hasEverConnected set to true.",
1218 * Verifies that hasEverConnected is cleared when a network config preSharedKey is updated.
1242 * Verifies that hasEverConnected is cleared when a network config allowedKeyManagement is
1272 * Verifies that hasEverConnected is cleared when a network config allowedProtocols is
1303 * Verifies that hasEverConnected is cleared when a network config allowedAuthAlgorithms is
1334 * Verifies that hasEverConnected is cleared when a network config allowedPairwiseCiphers is
1365 * Verifies that hasEverConnected is cleared when a network config allowedGroupCiphers is
1396 * Verifies that hasEverConnected is cleared when a network config wepKeys is
1424 * Verifies that hasEverConnected is cleared when a network config hiddenSSID is
1451 * Verifies that hasEverConnected is cleared when a network config pmfVarName is
1603 assertFalse("Updating credentials network config should clear hasEverConnected.",