summaryrefslogtreecommitdiffstats
path: root/chromeos/dbus/shill_manager_client.h
diff options
context:
space:
mode:
Diffstat (limited to 'chromeos/dbus/shill_manager_client.h')
-rw-r--r--chromeos/dbus/shill_manager_client.h42
1 files changed, 31 insertions, 11 deletions
diff --git a/chromeos/dbus/shill_manager_client.h b/chromeos/dbus/shill_manager_client.h
index 9b9541d..8bc7251 100644
--- a/chromeos/dbus/shill_manager_client.h
+++ b/chromeos/dbus/shill_manager_client.h
@@ -14,10 +14,12 @@
#include "chromeos/dbus/shill_client_helper.h"
namespace dbus {
-
class ObjectPath;
+}
-} // namespace dbus
+namespace net {
+class IPEndPoint;
+}
namespace chromeos {
@@ -193,35 +195,53 @@ class CHROMEOS_EXPORT ShillManagerClient : public DBusClient {
const ObjectPathCallback& callback,
const ErrorCallback& error_callback) = 0;
- // Verify that the given data corresponds to a trusted device, and return true
- // to the callback if it is.
+ // Verifies that the given data corresponds to a trusted device, and returns
+ // true to the callback if it is.
virtual void VerifyDestination(const VerificationProperties& properties,
const BooleanCallback& callback,
const ErrorCallback& error_callback) = 0;
- // Verify that the given data corresponds to a trusted device, and if it is,
- // return the encrypted credentials for connecting to the network represented
+ // Verifies that the given data corresponds to a trusted device, and if it is,
+ // returns the encrypted credentials for connecting to the network represented
// by the given |service_path|, encrypted using the |public_key| for the
- // trusted device. If the device is not trusted, return the empty string.
+ // trusted device. If the device is not trusted, returns the empty string.
virtual void VerifyAndEncryptCredentials(
const VerificationProperties& properties,
const std::string& service_path,
const StringCallback& callback,
const ErrorCallback& error_callback) = 0;
- // Verify that the given data corresponds to a trusted device, and return the
- // |data| encrypted using the |public_key| for the trusted device. If the
- // device is not trusted, return the empty string.
+ // Verifies that the given data corresponds to a trusted device, and returns
+ // the |data| encrypted using the |public_key| for the trusted device. If the
+ // device is not trusted, returns the empty string.
virtual void VerifyAndEncryptData(const VerificationProperties& properties,
const std::string& data,
const StringCallback& callback,
const ErrorCallback& error_callback) = 0;
- // For each technology present, connect to the "best" service available.
+ // For each technology present, connects to the "best" service available.
// Called once the user is logged in and certificates are loaded.
virtual void ConnectToBestServices(const base::Closure& callback,
const ErrorCallback& error_callback) = 0;
+ // Requests that shill program the NIC so that packets incoming on
+ // |ip_connection| wake up the CPU.
+ virtual void AddWakeOnPacketConnection(
+ const net::IPEndPoint& ip_endpoint,
+ const base::Closure& callback,
+ const ErrorCallback& error_callback) = 0;
+
+ // Removes a request to wake up on packets coming on |ip_connection|.
+ virtual void RemoveWakeOnPacketConnection(
+ const net::IPEndPoint& ip_endpoint,
+ const base::Closure& callback,
+ const ErrorCallback& error_callback) = 0;
+
+ // Clears all requests to wake up on packets.
+ virtual void RemoveAllWakeOnPacketConnections(
+ const base::Closure& callback,
+ const ErrorCallback& error_callback) = 0;
+
// Returns an interface for testing (stub only), or returns NULL.
virtual TestInterface* GetTestInterface() = 0;