Home
last modified time | relevance | path

Searched refs:password (Results 1 – 25 of 30) sorted by relevance

12

/tools/test/connectivity/acts/framework/acts/controllers/ap_lib/
Dhostapd_security.py28 password=None, argument
84 if password:
86 if len(password) in hostapd_constants.WEP_HEX_LENGTH and all(
87 c in string.hexdigits for c in password):
88 self.password = password
94 if len(password) < hostapd_constants.MIN_WPA_PSK_LENGTH or len(
95 password) > hostapd_constants.MAX_WPA_PSK_LENGTH:
101 self.password = password
109 settings['wep_key' + str(self.wep_default_key)] = self.password
119 if len(self.password) == hostapd_constants.MAX_WPA_PSK_LENGTH:
[all …]
/tools/apksig/src/apksigner/java/com/android/apksigner/
Dhelp_lineage.txt57 --ks-pass KeyStore password (see --ks). The following formats are
59 pass:<password> password provided inline
60 env:<name> password provided in the named
62 file:<file> password provided in the named
64 stdin password provided on standard input,
66 A password is required to open a KeyStore.
67 By default, the tool will prompt for password via console
73 signer, KeyStore password is read before the key password
78 pass:<password> password provided inline
79 env:<name> password provided in the named
[all …]
Dhelp_rotate.txt60 --ks-pass KeyStore password (see --ks). The following formats are
62 pass:<password> password provided inline
63 env:<name> password provided in the named
65 file:<file> password provided in the named
67 stdin password provided on standard input,
69 A password is required to open a KeyStore.
70 By default, the tool will prompt for password via console
76 signer, KeyStore password is read before the key password
81 pass:<password> password provided inline
82 env:<name> password provided in the named
[all …]
Dhelp_sign.txt108 --ks-pass KeyStore password (see --ks). The following formats are
110 pass:<password> password provided inline
111 env:<name> password provided in the named
113 file:<file> password provided in the named
115 stdin password provided on standard input,
117 A password is required to open a KeyStore.
118 By default, the tool will prompt for password via console
124 signer, KeyStore password is read before the key password
129 pass:<password> password provided inline
130 env:<name> password provided in the named
[all …]
DSignerParams.java349 for (char[] password : passwords) { in loadKeyStoreFromFile()
353 ks.load(in, password); in loadKeyStoreFromFile()
356 ks.load(null, password); in loadKeyStoreFromFile()
373 for (char[] password : passwords) { in getKeyStoreKey()
375 return ks.getKey(keyAlias, password); in getKeyStoreKey()
452 for (char[] password : passwords) { in decryptPkcs8EncodedKey()
453 PBEKeySpec decryptionKeySpec = new PBEKeySpec(password); in decryptPkcs8EncodedKey()
DPasswordRetriever.java266 private static void addPassword(List<char[]> passwords, char[] password) { in addPassword() argument
268 if (Arrays.equals(password, existingPassword)) { in addPassword()
272 passwords.add(password); in addPassword()
/tools/test/connectivity/acts/framework/acts/test_utils/wifi/
Dwifi_retail_ap.py291 def set_security(self, network, security_type, *password): argument
299 if (len(password) == 1) and (type(password[0]) == str):
302 "password_{}".format(network): str(password[0])
387 password=self.ap_settings["admin_password"],
401 password=self.ap_settings["admin_password"],
648 password=self.ap_settings["admin_password"],
656 password=self.ap_settings["admin_password"],
963 password=self.ap_settings["admin_password"],
977 password=self.ap_settings["admin_password"],
1031 password=self.ap_settings["admin_password"],
[all …]
Dwifi_power_test_utils.py251 password = network["password"]
253 security_mode="wpa", password=password)
255 security = hostapd_security.Security(security_mode=None, password=None)
DWifiBaseTest.py476 password=network["password"])))
485 password=network["wepKeys"][0])))
512 password=hostapd_config_settings["password"]),
523 password=hostapd_config_settings["wepKeys"][0]),
Dwifi_test_utils.py892 def start_wifi_tethering(ad, ssid, password, band=None, hidden=None): argument
907 if password:
908 config[WifiEnums.PWD_KEY] = password
2217 password = network["password"]
2219 security_mode="wpa", password=password)
2221 security = hostapd_security.Security(security_mode=None, password=None)
/tools/test/connectivity/acts/framework/acts/test_utils/tel/
Dtel_data_utils.py85 password=None): argument
127 if password is None:
128 password = rand_ascii_str(8)
131 if password == "":
132 password = None
148 password)
150 if not start_wifi_tethering(log, provider, ssid, password, ap_band):
161 if not ensure_wifi_connected(log, client, ssid, password):
Dtel_test_utils.py5594 def start_wifi_tethering(log, ad, ssid, password, ap_band=None): argument
5611 password,
6648 ad.unlock_screen(password="1111")
/tools/test/connectivity/acts/tests/google/net/arduino/connect_wifi/
Dconnect_wifi.ino6 const char* password = "password";
33 WiFi.begin(ssid, password);
/tools/test/connectivity/acts/tests/google/tel/live/
DTelLiveDataTest.py1957 password = '"DQ=/{Yqq;M=(^_3HzRvhOiL8S%`]w&l<Qp8qH)bs<4E9v_q=HLr^)}w$blA0Kg'
1959 "Starting WiFi Tethering test with password: {}".format(password))
1968 password=password)
1971 ssid, password): argument
1994 if not start_wifi_tethering(self.log, ad_host, ssid, password,
1999 if not ensure_wifi_connected(self.log, ad_client, ssid, password):
2039 password = rand_ascii_str(8)
2040 self.log.info("SSID: <{}>, Password: <{}>".format(ssid, password))
2042 self.provider, self.clients[0], ssid, password):
2043 fail_list[ssid] = password
[all …]
/tools/test/connectivity/acts/tests/google/wifi/
DWifiDppTest.py294 password = utils.rand_ascii_str(8)
296 password_encoded = binascii.b2a_hex(password.encode()).decode()
299 password_encoded = password
300 self.log.debug("Password = %s" % password)
304 if password: # SAE password or PSK passphrase
DWifiTetheringPowerTest.py45 self.network = { "SSID": self.ssid, "password": self.password }
110 self.password,
DSetupWifiNetworkTest.py74 security_mode=self.security, password=self.passphrase)
/tools/test/connectivity/acts/framework/acts/test_utils/gnss/
Dgnss_test_utils.py59 ad.unlock_screen(password=None)
111 ad.unlock_screen(password=None)
157 ad.unlock_screen(password=None)
225 ad.unlock_screen(password=None)
/tools/test/connectivity/acts/tests/google/wifi/aware/functional/
DNonConcurrencyTest.py64 wutils.start_wifi_tethering(dut, self.TETHER_SSID, password=None)
82 wutils.start_wifi_tethering(dut, self.TETHER_SSID, password=None)
/tools/test/connectivity/acts/framework/acts/controllers/
Dandroid_device.py1366 self.unlock_screen(password=DEFAULT_DEVICE_PASSWORD)
1388 def unlock_screen(self, password=None): argument
1389 self.log.info("Unlocking with %s", password or "swipe up")
1396 if password:
1398 for number in password:
/tools/test/connectivity/acts/framework/acts/test_utils/coex/
Dbluez_test_utils.py53 def __init__(self, profile, password, log_path): argument
62 self.sudo_command = "echo " + password + " | sudo -S "
Dcoex_test_utils.py180 security_mode=network["security"], password=network["password"])
/tools/test/connectivity/acts/tests/google/tel/config/
DREADME.md9 - **wifi_network_pass** - The password to the network specified by *wifi_network_ssid*.
/tools/test/connectivity/acts/tests/google/gnss/
DGNSSSanityTest.py562 self.ad.unlock_screen(password=None)
/tools/dexter/testdata/expected/
Dmedium.rewrite13622 225| const-string/jumbo v4, "; password: "

12