Home
last modified time | relevance | path

Searched refs:password (Results 1 – 25 of 75) sorted by relevance

123

/tools/test/connectivity/acts_tests/tests/google/fuchsia/wlan/functional/
DWlanTargetSecurityTest.py77 password = utils.rand_ascii_str(13)
82 password=password)
90 return (ssid, password)
98 ssid, password = self.setup_ap()
102 target_pwd=password),
106 ssid, password = self.setup_ap()
110 target_pwd=password),
114 ssid, password = self.setup_ap()
118 target_pwd=password),
122 ssid, password = self.setup_ap()
[all …]
DConnectionStressTest.py81 password=None, argument
97 password=ap_config['password'])
113 target_pwd=password,
123 if self.dut.associate(ssid, target_pwd=password):
210 password=rand_ascii_str(20),
221 password=rand_ascii_str(20),
DSoftApTest.py82 password = config.get('password', None)
84 if not password:
85 password = generate_random_password(security_mode=security_mode)
86 security = hostapd_security.Security(security_mode, password)
95 'password': password
115 password = config.get('password', '')
120 if security_type != SECURITY_OPEN and password == '':
121 password = generate_random_password(security_mode=security_type)
128 'password': password
240 password = settings.get('password', '')
[all …]
/tools/test/connectivity/acts_tests/tests/google/fuchsia/wlan/compliance/
DVapeInteropTest.py53 self.password = utils.rand_ascii_str(
57 password=self.password,
97 password=self.password)
100 target_pwd=self.password,
118 password=self.password)
121 target_pwd=self.password,
139 password=self.password)
142 target_pwd=self.password,
160 password=self.password)
163 target_pwd=self.password,
[all …]
DWlanSecurityComplianceABGTest.py101 password = generate_random_password(
104 password = str(
109 password = generate_random_password(length=5)
111 password = generate_random_password(length=13)
113 password = str(generate_random_password(length=10,
116 password = str(generate_random_password(length=26,
120 password = utf8_password_2g_french
122 password = utf8_password_2g_german
124 password = utf8_password_2g_dutch
126 password = utf8_password_2g_swedish
[all …]
DWlanPhyCompliance11ACTest.py86 password=rand_ascii_str(20),
178 password = None
181 password = security.password
196 password=password)
199 target_pwd=password,
DWlanPhyCompliance11NTest.py139 password = None
180 password=generate_random_password(length=20),
183 password = security_profile.password
195 password=password)
198 target_pwd=password,
/tools/test/connectivity/acts_tests/tests/google/fuchsia/wlan_policy/
DSavedNetworksTest.py79 def save_bad_network(self, fd, ssid, security_type, password=""): argument
90 ssid, security_type, password=password):
159 def save_and_check_network(self, ssid, security_type, password=""): argument
171 ssid, security_type, password=password):
174 self.credentialType(password),
175 password)
177 def start_ap(self, ssid, security_type, password=None, hidden=False): argument
192 password=password)
246 password = rand_ascii_str(13)
247 self.save_and_check_network(ssid, WEP, password)
[all …]
DStartStopClientConnectionsTest.py44 self.password = rand_ascii_str(
48 password=self.password)
147 self.ssid, self.security_type, password=self.password):
159 self.ssid, self.security_type, password=self.password):
DHiddenNetworksTest.py53 security_mode=self.hidden_security, password=self.hidden_password)
90 password=self.hidden_password):
131 password=self.hidden_password):
157 password=self.hidden_password):
/tools/test/connectivity/acts_tests/tests/google/fuchsia/wlan/performance/
DWlanRvrTest.py236 password=None, argument
281 target_pwd=password,
364 password=password,
386 password=None, argument
442 target_pwd=password,
660 password = rand_ascii_str(20)
661 security_profile = Security(security_mode='wpa2', password=password)
670 password=password,
685 password = rand_ascii_str(20)
686 security_profile = Security(security_mode='wpa2', password=password)
[all …]
/tools/test/connectivity/acts/framework/acts/controllers/ap_lib/
Dhostapd_security.py27 password=None, argument
74 if password:
76 if len(password) in hostapd_constants.WEP_STR_LENGTH:
77 self.password = '"%s"' % password
78 elif len(password) in hostapd_constants.WEP_HEX_LENGTH and all(
79 c in string.hexdigits for c in password):
80 self.password = password
86 if len(password) < hostapd_constants.MIN_WPA_PSK_LENGTH or len(
87 password) > hostapd_constants.MAX_WPA_PSK_LENGTH:
93 self.password = password
[all …]
/tools/apksig/src/apksigner/java/com/android/apksigner/
Dhelp_lineage.txt57 --ks-pass KeyStore password (see --ks). The following formats are
59 pass:<password> password provided inline
60 env:<name> password provided in the named
62 file:<file> password provided in the named
64 stdin password provided on standard input,
66 A password is required to open a KeyStore.
67 By default, the tool will prompt for password via console
73 signer, KeyStore password is read before the key password
78 pass:<password> password provided inline
79 env:<name> password provided in the named
[all …]
Dhelp_rotate.txt60 --ks-pass KeyStore password (see --ks). The following formats are
62 pass:<password> password provided inline
63 env:<name> password provided in the named
65 file:<file> password provided in the named
67 stdin password provided on standard input,
69 A password is required to open a KeyStore.
70 By default, the tool will prompt for password via console
76 signer, KeyStore password is read before the key password
81 pass:<password> password provided inline
82 env:<name> password provided in the named
[all …]
Dhelp_sign.txt136 --ks-pass KeyStore password (see --ks). The following formats are
138 pass:<password> password provided inline
139 env:<name> password provided in the named
141 file:<file> password provided in the named
143 stdin password provided on standard input,
145 A password is required to open a KeyStore.
146 By default, the tool will prompt for password via console
152 signer, KeyStore password is read before the key password
157 pass:<password> password provided inline
158 env:<name> password provided in the named
[all …]
DSignerParams.java358 for (char[] password : passwords) { in loadKeyStoreFromFile()
362 ks.load(in, password); in loadKeyStoreFromFile()
365 ks.load(null, password); in loadKeyStoreFromFile()
382 for (char[] password : passwords) { in getKeyStoreKey()
384 return ks.getKey(keyAlias, password); in getKeyStoreKey()
461 for (char[] password : passwords) { in decryptPkcs8EncodedKey()
462 PBEKeySpec decryptionKeySpec = new PBEKeySpec(password); in decryptPkcs8EncodedKey()
/tools/test/connectivity/acts/framework/acts/controllers/fuchsia_lib/lib_controllers/
Dwlan_policy_controller.py144 def save_and_connect(self, ssid, security, password=None, timeout=30): argument
160 if not self.save_network(ssid, security, password=password):
171 password=None, argument
189 if not self.save_network(ssid, security, password=password):
196 password=None, argument
218 if not self.remove_network(ssid, security_type, password=password):
240 def save_network(self, ssid, security_type, password=None): argument
252 ssid, security_type, target_pwd=password)
259 def remove_network(self, ssid, security_type, password=None): argument
271 ssid, security_type, target_pwd=password)
/tools/test/connectivity/acts/framework/acts/controllers/
Dpdu.py51 password = config.get('password')
52 pdu = _create_device(device, host, username, password)
83 'password': pdu.password
88 def _create_device(device, host, username, password): argument
94 return module.PduDevice(host, username, password)
163 def __init__(self, host, username, password): argument
169 self.password = password
Dopenwrt_ap.py336 password=config["password"],
344 password=config["password"],
375 password=config["password"],
398 password=config["password"],
406 password=config["password"],
437 password=config["password"],
Dasus_axe11000_ap.py169 self.password = config["admin_password"]
183 self.driver.find_element_by_name(PASSWORD).send_keys(self.password)
388 def _configure_personal_network(self, band, auth, ssid=None, password=None): argument
416 if password:
418 self.driver.find_element_by_name(psk_field).send_keys(password)
584 password = network_dict[band]["password"] if "password" in network_dict[
589 self._configure_personal_network(band, security, ssid, password)
/tools/test/connectivity/acts_tests/tests/google/nr/nsa5g/
DNsa5gTetheringTest.py283 password = TETHERING_PASSWORD_HAS_ESCAPE
285 "Starting WiFi Tethering test with password: {}".format(password))
295 password=password)
317 password = rand_ascii_str(8)
318 self.log.info("SSID: <{}>, Password: <{}>".format(ssid, password))
323 password):
324 fail_list[ssid] = password
351 for password in password_list:
353 self.log.info("SSID: <{}>, Password: <{}>".format(ssid, password))
358 password):
[all …]
/tools/test/connectivity/acts_tests/tests/google/wifi/
DWifiDppTest.py351 password = utils.rand_ascii_str(8)
357 password = self.sae_network_password
362 password = self.psk_network_password
381 password_encoded = binascii.b2a_hex(password.encode()).decode()
384 password_encoded = password
385 self.log.debug("Password = %s" % password)
389 if password: # SAE password or PSK passphrase
784 password = utils.rand_ascii_str(8)
790 password = self.sae_network_password
795 password = self.psk_network_password
[all …]
/tools/test/connectivity/acts/framework/acts/controllers/pdu_lib/digital_loggers/
Dwebpowerswitch.py35 def __init__(self, host, username, password): argument
40 super(PduDevice, self).__init__(host, username, password)
43 password=password)
/tools/test/connectivity/acts_tests/acts_contrib/test_utils/tel/
Dtel_data_utils.py142 password=None): argument
184 if password is None:
185 password = rand_ascii_str(8)
188 if password == "":
189 password = None
205 password)
207 if not start_wifi_tethering(log, provider, ssid, password, ap_band):
218 if not ensure_wifi_connected(log, client, ssid, password):
1690 password=None, argument
1733 password=password)
[all …]
/tools/test/connectivity/acts/framework/acts/controllers/openwrt_lib/
Dwireless_config.py32 password=None, argument
45 self.password = password

123