/tools/test/connectivity/acts/framework/acts/controllers/openwrt_lib/ |
D | network_settings.py | 110 out = self.ssh.run("cat %s" % HISTORY_CONFIG_PATH).stdout 125 out = self.ssh.run("cat %s" % HISTORY_CONFIG_PATH).stdout 127 self.ssh.run("rm %s" % HISTORY_CONFIG_PATH) 131 self.ssh.run("uci commit") 143 self.ssh.run("opkg update") 146 self.ssh.run("opkg install %s" % package_name, 160 self.ssh.run("opkg remove %s" % package_name) 174 if self.ssh.run("opkg list-installed %s" % package_name).stdout: 188 if self.ssh.run("ls %s | grep %s" % (path, file_name), 200 self.ssh.run("ls %s" % abs_path) [all …]
|
D | wireless_settings_applier.py | 62 self.ssh.run("uci set wireless.%s.channel='%s'" % (self.radio_2g, self.channel_2g)) 63 self.ssh.run("uci set wireless.%s.channel='%s'" % (self.radio_5g, self.channel_5g)) 65 self.ssh.run("uci set wireless.%s.htmode='VHT20'" % self.radio_5g) 67 self.ssh.run("iw reg set ZA") 68 self.ssh.run("uci set wireless.%s.htmode='VHT40'" % self.radio_5g) 71 self.ssh.run("iw reg set AU") 74 self.ssh.run("uci set wireless.%s.disabled='%s'" % 76 self.ssh.run("uci set wireless.%s.disabled='%s'" % 80 self.ssh.run("uci set wireless.%s.disabled='%s'" % (self.radio_2g, ENABLE_RADIO)) 81 self.ssh.run("uci set wireless.%s.disabled='%s'" % (self.radio_5g, ENABLE_RADIO)) [all …]
|
/tools/test/connectivity/acts/framework/acts/controllers/ |
D | openwrt_ap.py | 169 self.ssh.run("wifi up") 180 self.ssh.run("wifi down") 216 str_output = self.ssh.run("wifi status %s" % radio).stdout 237 ifconfig = self.ssh.run("ifconfig %s" % ifname).stdout 247 str_output = self.ssh.run("wifi status").stdout 260 origin_encryption = self.ssh.run( 268 self.ssh.run( 273 self.ssh.run( 277 self.ssh.run("uci commit wireless") 278 self.ssh.run("wifi") [all …]
|
D | access_point.py | 252 self.ssh.run('stop wpasupplicant') 256 self.ssh.run('stop hostapd') 262 self.ssh.run(WLAN_DOWN) 269 self.ssh.run(BRIDGE_DOWN) 270 self.ssh.run(BRIDGE_DEL) 319 interface_mac_orig = self.ssh.run(cmd) 474 self.ssh.run('iptables -t nat -F') 475 self.ssh.run('iptables -t nat -A POSTROUTING -o %s -j MASQUERADE' % 477 self.ssh.run('echo 1 > /proc/sys/net/ipv4/ip_forward') 478 self.ssh.run('echo 1 > /proc/sys/net/ipv6/conf/all/forwarding') [all …]
|
D | packet_capture.py | 110 result = self.ssh.run('ifconfig -a', ignore_status=True) 125 self.ssh.run('ifconfig wlan%s down' % iface[-1], ignore_status=True) 126 self.ssh.run('iw dev %s del' % iface, ignore_status=True) 127 self.ssh.run('iw phy%s interface add %s type %s' 129 self.ssh.run('ip link set %s up' % iface, ignore_status=True) 130 result = self.ssh.run('iw dev %s info' % iface, ignore_status=True) 136 self.ssh.run('iw dev %s del' % iface, ignore_status=True) 137 result = self.ssh.run('iw dev %s info' % iface, ignore_status=True) 183 result = self.ssh.run('iw dev %s scan' % SCAN_IFACE) 228 self.ssh.run('iw dev %s set channel %s' % [all …]
|
/tools/test/connectivity/acts_tests/tests/google/bt/pts/instructions/ |
D | RFCOMM_PTS_INSTRUCTIONS | 29 Note: If not bonded run: bta_set_scan_mode connectable_discoverable 33 Note: If not bonded run: bta_set_scan_mode connectable_discoverable 37 Note: If not bonded run: bta_set_scan_mode connectable_discoverable 41 Note: If not bonded run: bta_set_scan_mode connectable_discoverable 48 Note: If not bonded run: bta_set_scan_mode connectable_discoverable 55 Note: If not bonded run: bta_set_scan_mode connectable_discoverable 59 Note: If not bonded run: bta_set_scan_mode connectable_discoverable 63 Note: If not bonded run: bta_set_scan_mode connectable_discoverable 67 Note: If not bonded run: bta_set_scan_mode connectable_discoverable 72 Note: If not bonded run: bta_set_scan_mode connectable_discoverable [all …]
|
/tools/test/connectivity/acts/framework/tests/ |
D | acts_base_class_test.py | 73 bt_cls.run(test_names=['test_func']) 93 bt_cls.run() 125 bt_cls.run(test_names=test_names) 145 bt_cls.run() 164 bt_cls.run() 188 bt_cls.run(test_names=['test_something']) 213 bt_cls.run(test_names=['test_something']) 238 bt_cls.run(test_names=['test_something']) 263 bt_cls.run() 287 bt_cls.run() [all …]
|
D | acts_job_test.py | 67 result = job.run('echo TEST') 75 result = job.run('echo TEST 1>&2') 85 self.assertRaises(job.Error, job.run, 'exit 1') 92 result = job.run('exit 1', ignore_status=True) 100 self.assertRaises(job.Error, job.run, 'sleep 5', timeout=0.1) 107 result = job.run(['echo', 'TEST']) 116 result = job.run('printenv', env=test_env.copy())
|
D | test_runner_test.py | 58 tr.run() 72 tr.run() 87 tr.run() 101 tr.run() 117 tr.run()
|
/tools/test/connectivity/acts_tests/acts_contrib/test_utils/wifi/ |
D | ota_sniffer.py | 247 self.tshark_path = self._sniffer_server.run('which tshark').stdout 344 self._sniffer_server.run( 351 self._sniffer_server.run('sudo kill -15 {}'.format( 360 self._sniffer_server.run('sudo kill -9 {}'.format( 440 self._sniffer_server.run('sudo chmod 777 {}'.format( 460 scan_result = self._sniffer_server.run(scan_command).stdout 478 self._sniffer_server.run(connect_command) 491 self._sniffer_server.run('sudo modprobe -r iwlwifi') 492 self._sniffer_server.run('sudo dmesg -C') 493 self._sniffer_server.run('cat /dev/null | sudo tee /var/log/syslog') [all …]
|
D | rpm_controller_utils.py | 57 self.run(USERNAME, LOGIN_PWD) 58 result = self.run(PASSWORD, LOGIN_PWD) 63 def run(self, prompt, cmd_str): member in RpmController 98 self.run(RPM_PROMPT, '%s %s' % (state.lower(), port)) 99 result = self.run(RPM_PROMPT, 'status %s' % port)
|
/tools/test/connectivity/acts/framework/acts/controllers/utils_lib/commands/ |
D | shell.py | 43 def run(self, command, timeout=60): member in ShellCommand 64 return self._runner.run(command_str, timeout=timeout) 83 self.run('ps aux | grep -v grep | grep %s' % identifier) 106 result = self.run('ps aux | grep -v grep | grep %s' % identifier) 139 self.run('grep %s %s' % (shlex.quote(search_string), file_name)) 153 return self.run('cat %s' % file_name).stdout 162 return self.run('echo %s > %s' % (shlex.quote(data), file_name)) 171 return self.run('echo %s >> %s' % (shlex.quote(data), file_name)) 188 self.run('rm -r %s' % file_name) 244 self.run('kill -%d %d' % (sig, pid))
|
D | ip.py | 47 results = self._runner.run('ip addr show dev %s' % net_interface) 86 self._runner.run('ip addr add %s broadcast %s dev %s' % 89 self._runner.run('ip addr add %s dev %s' % 106 return self._runner.run(
|
/tools/asuite/atest/docs/ |
D | developer_workflow.md | 18 and run. Note that the wrapper code is written in python, so we'll be 25 information needed for the test runner to run the test. It then invokes 26 the appropriate test runner code to run the tests. As the tests 27 are run it also parses the test runner's output into the output seen by 41 involves how the test is actually run, you'll need to work with this 70 You can use atest to run all unit tests via:<br> 76 Alternatively, it is possible to run ALL the python tests by executing the 119 TradeFed itself is used to run the TradeFed unittests so you'll need 124 first run the test file your code change affected individually. The 125 command to run an individual test file is:<br> [all …]
|
/tools/asuite/atest-py2/docs/ |
D | developer_workflow.md | 18 and run. Note that the wrapper code is written in python, so we'll be 25 information needed for the test runner to run the test. It then invokes 26 the appropriate test runner code to run the tests. As the tests 27 are run it also parses the test runner's output into the output seen by 41 involves how the test is actually run, you'll need to work with this 70 You can run ALL the python tests by executing this bash script in the 104 TradeFed itself is used to run the TradeFed unittests so you'll need 109 first run the test file your code change affected individually. The 110 command to run an individual test file is:<br> 112 `tradefed.sh run host -n --class <fully.qualified.ClassName>` [all …]
|
/tools/test/connectivity/acts/framework/acts/controllers/ap_lib/ |
D | bridge_interface.py | 68 self.ssh.run(CREATE_BRIDGE) 77 self.ssh.run(ENABLE_4ADDR) 86 self.ssh.run(ADD_INTERFACE) 94 self.ssh.run(SET_BRIDGE_IP) 108 self.ssh.run(BRING_DOWN_BRIDGE) 110 self.ssh.run(DELETE_BRIDGE) 114 self.ssh.run(BRING_DOWN_WLAN) 117 self.ssh.run(DISABLE_4ADDR)
|
D | ap_get_interface.py | 49 output = self.ssh.run(GET_ALL_INTERFACE) 60 output = self.ssh.run(GET_VIRTUAL_INTERFACE) 87 output = self.ssh.run(BRCTL_SHOW) 111 output = self.ssh.run(IW_LIST_FREQ) 148 output = self.ssh.run('ifconfig') 169 output = self.ssh.run(LAN_CHECK) 185 self.ssh.run(PING)
|
/tools/treble/build/sandbox/ |
D | nsjail_test.py | 30 commands = nsjail.run( 51 commands = nsjail.run( 63 nsjail.run( 79 nsjail.run( 87 commands = nsjail.run( 109 commands = nsjail.run( 130 commands = nsjail.run( 151 commands = nsjail.run(
|
/tools/test/connectivity/acts/framework/acts/controllers/fuchsia_lib/ |
D | ffx.py | 145 self.run("target wait", 154 self.run("target wait", 162 result = self.run("target show --json", 190 ffx_version = self.run("version").stdout 202 self.run("daemon stop", skip_reachability_check=True) 214 def run(self, member in FFX 246 result = job.run(command=full_command,
|
/tools/test/connectivity/acts/framework/acts/controllers/utils_lib/ssh/ |
D | connection.py | 153 def run(self, member in SshConnection 207 result = job.run(terminal_command, 271 ping_output = job.run('ping %s -c 3 -w 1' % self._settings.hostname, 276 self.run(command, timeout, ignore_status, env, io_encoding, 302 result = self.run(command, env=env) 405 job.run('scp %s %s:%s' % (local_path, user_host, remote_path), 417 job.run('scp %s:%s %s' % (user_host, remote_path, local_path), 438 port = int(self.run(free_port_cmd).stdout)
|
/tools/test/graphicsbenchmark/ |
D | README | 12 To run, ensure that `adb` and `aapt` are available on your path, and run from tools/test/graphicsbe… 14 $ tradefed.sh run commandAndExit AndroidTest.xml 25 To create a gamecore.zip for distribution, run: 32 To run unit tests:
|
/tools/test/connectivity/acts_tests/ |
D | setup.py | 83 def run(self): member in ActsContribInstall 97 def run(self): member in ActsContribDevelop 98 super().run() 122 def run(self): member in ActsContribInstallDependencies 166 def run(self): member in ActsContribUninstall
|
/tools/trebuchet/trebuchet/user-switch-analyzer/ |
D | README.md | 8 To run the tool, enter the root directory for the 10 `./gradlew :trebuchet:system-server-analyzer:run --args="<trace_file> [-u user_Id] [-o output_filen… 24 Alternatively, run-user-switch-perf.sh script in the scripts folder 25 `./scripts/run-user-switch-perf.sh <from_user> <to_user>` 26 `./scripts/run-user-switch-perf.sh 10 11`
|
/tools/ndkports/buildSrc/src/main/kotlin/com/android/ndkports/ |
D | AdHocPortTask.kt | 41 fun run(block: RunBuilder.() -> Unit) { in arg() method 71 for (run in builder.runs) { in builder() constant 73 run.cmd, buildDirectory, additionalEnvironment = run.env in builder()
|
/tools/test/connectivity/acts/framework/acts/ |
D | utils.py | 1040 pid = job.run('pgrep -f %s' % command_regex).stdout 1043 runtime = job.run('ps -o etime= -p "%s"' % pid).stdout 1049 pid = job.run('pidof %s' % process, ignore_status=True).stdout 1052 runtime = job.run('ps -o etime= -p "%s"' % pid).stdout 1437 all_interfaces_and_addresses = comm_channel.run( 1440 ifconfig_output = comm_channel.run('ifconfig %s' % interface).stdout 1518 all_ips_and_interfaces = comm_channel.run( 1528 comm_channel.run('sudo ifconfig %s down' % interface) 1529 comm_channel.run('sudo ifconfig %s up' % interface) 1530 comm_channel.run('sudo dhclient -r %s' % interface) [all …]
|