/tools/test/connectivity/acts/framework/acts/controllers/ap_lib/ |
D | hostapd_security.py | 28 password=None, argument 84 if password: 86 if len(password) in hostapd_constants.WEP_HEX_LENGTH and all( 87 c in string.hexdigits for c in password): 88 self.password = password 94 if len(password) < hostapd_constants.MIN_WPA_PSK_LENGTH or len( 95 password) > hostapd_constants.MAX_WPA_PSK_LENGTH: 101 self.password = password 109 settings['wep_key' + str(self.wep_default_key)] = self.password 119 if len(self.password) == hostapd_constants.MAX_WPA_PSK_LENGTH: [all …]
|
/tools/apksig/src/apksigner/java/com/android/apksigner/ |
D | help_lineage.txt | 57 --ks-pass KeyStore password (see --ks). The following formats are 59 pass:<password> password provided inline 60 env:<name> password provided in the named 62 file:<file> password provided in the named 64 stdin password provided on standard input, 66 A password is required to open a KeyStore. 67 By default, the tool will prompt for password via console 73 signer, KeyStore password is read before the key password 78 pass:<password> password provided inline 79 env:<name> password provided in the named [all …]
|
D | help_rotate.txt | 60 --ks-pass KeyStore password (see --ks). The following formats are 62 pass:<password> password provided inline 63 env:<name> password provided in the named 65 file:<file> password provided in the named 67 stdin password provided on standard input, 69 A password is required to open a KeyStore. 70 By default, the tool will prompt for password via console 76 signer, KeyStore password is read before the key password 81 pass:<password> password provided inline 82 env:<name> password provided in the named [all …]
|
D | help_sign.txt | 108 --ks-pass KeyStore password (see --ks). The following formats are 110 pass:<password> password provided inline 111 env:<name> password provided in the named 113 file:<file> password provided in the named 115 stdin password provided on standard input, 117 A password is required to open a KeyStore. 118 By default, the tool will prompt for password via console 124 signer, KeyStore password is read before the key password 129 pass:<password> password provided inline 130 env:<name> password provided in the named [all …]
|
D | SignerParams.java | 349 for (char[] password : passwords) { in loadKeyStoreFromFile() 353 ks.load(in, password); in loadKeyStoreFromFile() 356 ks.load(null, password); in loadKeyStoreFromFile() 373 for (char[] password : passwords) { in getKeyStoreKey() 375 return ks.getKey(keyAlias, password); in getKeyStoreKey() 452 for (char[] password : passwords) { in decryptPkcs8EncodedKey() 453 PBEKeySpec decryptionKeySpec = new PBEKeySpec(password); in decryptPkcs8EncodedKey()
|
D | PasswordRetriever.java | 266 private static void addPassword(List<char[]> passwords, char[] password) { in addPassword() argument 268 if (Arrays.equals(password, existingPassword)) { in addPassword() 272 passwords.add(password); in addPassword()
|
/tools/test/connectivity/acts/framework/acts/test_utils/wifi/ |
D | wifi_retail_ap.py | 291 def set_security(self, network, security_type, *password): argument 299 if (len(password) == 1) and (type(password[0]) == str): 302 "password_{}".format(network): str(password[0]) 387 password=self.ap_settings["admin_password"], 401 password=self.ap_settings["admin_password"], 648 password=self.ap_settings["admin_password"], 656 password=self.ap_settings["admin_password"], 963 password=self.ap_settings["admin_password"], 977 password=self.ap_settings["admin_password"], 1031 password=self.ap_settings["admin_password"], [all …]
|
D | wifi_power_test_utils.py | 251 password = network["password"] 253 security_mode="wpa", password=password) 255 security = hostapd_security.Security(security_mode=None, password=None)
|
D | WifiBaseTest.py | 476 password=network["password"]))) 485 password=network["wepKeys"][0]))) 512 password=hostapd_config_settings["password"]), 523 password=hostapd_config_settings["wepKeys"][0]),
|
D | wifi_test_utils.py | 892 def start_wifi_tethering(ad, ssid, password, band=None, hidden=None): argument 907 if password: 908 config[WifiEnums.PWD_KEY] = password 2217 password = network["password"] 2219 security_mode="wpa", password=password) 2221 security = hostapd_security.Security(security_mode=None, password=None)
|
/tools/test/connectivity/acts/framework/acts/test_utils/tel/ |
D | tel_data_utils.py | 85 password=None): argument 127 if password is None: 128 password = rand_ascii_str(8) 131 if password == "": 132 password = None 148 password) 150 if not start_wifi_tethering(log, provider, ssid, password, ap_band): 161 if not ensure_wifi_connected(log, client, ssid, password):
|
D | tel_test_utils.py | 5594 def start_wifi_tethering(log, ad, ssid, password, ap_band=None): argument 5611 password, 6648 ad.unlock_screen(password="1111")
|
/tools/test/connectivity/acts/tests/google/net/arduino/connect_wifi/ |
D | connect_wifi.ino | 6 const char* password = "password"; 33 WiFi.begin(ssid, password);
|
/tools/test/connectivity/acts/tests/google/tel/live/ |
D | TelLiveDataTest.py | 1957 password = '"DQ=/{Yqq;M=(^_3HzRvhOiL8S%`]w&l<Qp8qH)bs<4E9v_q=HLr^)}w$blA0Kg' 1959 "Starting WiFi Tethering test with password: {}".format(password)) 1968 password=password) 1971 ssid, password): argument 1994 if not start_wifi_tethering(self.log, ad_host, ssid, password, 1999 if not ensure_wifi_connected(self.log, ad_client, ssid, password): 2039 password = rand_ascii_str(8) 2040 self.log.info("SSID: <{}>, Password: <{}>".format(ssid, password)) 2042 self.provider, self.clients[0], ssid, password): 2043 fail_list[ssid] = password [all …]
|
/tools/test/connectivity/acts/tests/google/wifi/ |
D | WifiDppTest.py | 294 password = utils.rand_ascii_str(8) 296 password_encoded = binascii.b2a_hex(password.encode()).decode() 299 password_encoded = password 300 self.log.debug("Password = %s" % password) 304 if password: # SAE password or PSK passphrase
|
D | WifiTetheringPowerTest.py | 45 self.network = { "SSID": self.ssid, "password": self.password } 110 self.password,
|
D | SetupWifiNetworkTest.py | 74 security_mode=self.security, password=self.passphrase)
|
/tools/test/connectivity/acts/framework/acts/test_utils/gnss/ |
D | gnss_test_utils.py | 59 ad.unlock_screen(password=None) 111 ad.unlock_screen(password=None) 157 ad.unlock_screen(password=None) 225 ad.unlock_screen(password=None)
|
/tools/test/connectivity/acts/tests/google/wifi/aware/functional/ |
D | NonConcurrencyTest.py | 64 wutils.start_wifi_tethering(dut, self.TETHER_SSID, password=None) 82 wutils.start_wifi_tethering(dut, self.TETHER_SSID, password=None)
|
/tools/test/connectivity/acts/framework/acts/controllers/ |
D | android_device.py | 1366 self.unlock_screen(password=DEFAULT_DEVICE_PASSWORD) 1388 def unlock_screen(self, password=None): argument 1389 self.log.info("Unlocking with %s", password or "swipe up") 1396 if password: 1398 for number in password:
|
/tools/test/connectivity/acts/framework/acts/test_utils/coex/ |
D | bluez_test_utils.py | 53 def __init__(self, profile, password, log_path): argument 62 self.sudo_command = "echo " + password + " | sudo -S "
|
D | coex_test_utils.py | 180 security_mode=network["security"], password=network["password"])
|
/tools/test/connectivity/acts/tests/google/tel/config/ |
D | README.md | 9 - **wifi_network_pass** - The password to the network specified by *wifi_network_ssid*.
|
/tools/test/connectivity/acts/tests/google/gnss/ |
D | GNSSSanityTest.py | 562 self.ad.unlock_screen(password=None)
|
/tools/dexter/testdata/expected/ |
D | medium.rewrite | 13622 225| const-string/jumbo v4, "; password: "
|