/tools/test/connectivity/acts_tests/tests/google/fuchsia/wlan/functional/ |
D | WlanTargetSecurityTest.py | 77 password = utils.rand_ascii_str(13) 82 password=password) 90 return (ssid, password) 98 ssid, password = self.setup_ap() 102 target_pwd=password), 106 ssid, password = self.setup_ap() 110 target_pwd=password), 114 ssid, password = self.setup_ap() 118 target_pwd=password), 122 ssid, password = self.setup_ap() [all …]
|
D | ConnectionStressTest.py | 81 password=None, argument 97 password=ap_config['password']) 113 target_pwd=password, 123 if self.dut.associate(ssid, target_pwd=password): 210 password=rand_ascii_str(20), 221 password=rand_ascii_str(20),
|
D | SoftApTest.py | 82 password = config.get('password', None) 84 if not password: 85 password = generate_random_password(security_mode=security_mode) 86 security = hostapd_security.Security(security_mode, password) 95 'password': password 115 password = config.get('password', '') 120 if security_type != SECURITY_OPEN and password == '': 121 password = generate_random_password(security_mode=security_type) 128 'password': password 240 password = settings.get('password', '') [all …]
|
/tools/test/connectivity/acts_tests/tests/google/fuchsia/wlan/compliance/ |
D | VapeInteropTest.py | 53 self.password = utils.rand_ascii_str( 57 password=self.password, 97 password=self.password) 100 target_pwd=self.password, 118 password=self.password) 121 target_pwd=self.password, 139 password=self.password) 142 target_pwd=self.password, 160 password=self.password) 163 target_pwd=self.password, [all …]
|
D | WlanSecurityComplianceABGTest.py | 101 password = generate_random_password( 104 password = str( 109 password = generate_random_password(length=5) 111 password = generate_random_password(length=13) 113 password = str(generate_random_password(length=10, 116 password = str(generate_random_password(length=26, 120 password = utf8_password_2g_french 122 password = utf8_password_2g_german 124 password = utf8_password_2g_dutch 126 password = utf8_password_2g_swedish [all …]
|
D | WlanPhyCompliance11ACTest.py | 86 password=rand_ascii_str(20), 178 password = None 181 password = security.password 196 password=password) 199 target_pwd=password,
|
D | WlanPhyCompliance11NTest.py | 139 password = None 180 password=generate_random_password(length=20), 183 password = security_profile.password 195 password=password) 198 target_pwd=password,
|
/tools/test/connectivity/acts_tests/tests/google/fuchsia/wlan_policy/ |
D | SavedNetworksTest.py | 79 def save_bad_network(self, fd, ssid, security_type, password=""): argument 90 ssid, security_type, password=password): 159 def save_and_check_network(self, ssid, security_type, password=""): argument 171 ssid, security_type, password=password): 174 self.credentialType(password), 175 password) 177 def start_ap(self, ssid, security_type, password=None, hidden=False): argument 192 password=password) 246 password = rand_ascii_str(13) 247 self.save_and_check_network(ssid, WEP, password) [all …]
|
D | StartStopClientConnectionsTest.py | 44 self.password = rand_ascii_str( 48 password=self.password) 147 self.ssid, self.security_type, password=self.password): 159 self.ssid, self.security_type, password=self.password):
|
D | HiddenNetworksTest.py | 53 security_mode=self.hidden_security, password=self.hidden_password) 90 password=self.hidden_password): 131 password=self.hidden_password): 157 password=self.hidden_password):
|
/tools/test/connectivity/acts_tests/tests/google/fuchsia/wlan/performance/ |
D | WlanRvrTest.py | 236 password=None, argument 281 target_pwd=password, 364 password=password, 386 password=None, argument 442 target_pwd=password, 660 password = rand_ascii_str(20) 661 security_profile = Security(security_mode='wpa2', password=password) 670 password=password, 685 password = rand_ascii_str(20) 686 security_profile = Security(security_mode='wpa2', password=password) [all …]
|
/tools/test/connectivity/acts/framework/acts/controllers/ap_lib/ |
D | hostapd_security.py | 27 password=None, argument 74 if password: 76 if len(password) in hostapd_constants.WEP_STR_LENGTH: 77 self.password = '"%s"' % password 78 elif len(password) in hostapd_constants.WEP_HEX_LENGTH and all( 79 c in string.hexdigits for c in password): 80 self.password = password 86 if len(password) < hostapd_constants.MIN_WPA_PSK_LENGTH or len( 87 password) > hostapd_constants.MAX_WPA_PSK_LENGTH: 93 self.password = password [all …]
|
/tools/apksig/src/apksigner/java/com/android/apksigner/ |
D | help_lineage.txt | 57 --ks-pass KeyStore password (see --ks). The following formats are 59 pass:<password> password provided inline 60 env:<name> password provided in the named 62 file:<file> password provided in the named 64 stdin password provided on standard input, 66 A password is required to open a KeyStore. 67 By default, the tool will prompt for password via console 73 signer, KeyStore password is read before the key password 78 pass:<password> password provided inline 79 env:<name> password provided in the named [all …]
|
D | help_rotate.txt | 60 --ks-pass KeyStore password (see --ks). The following formats are 62 pass:<password> password provided inline 63 env:<name> password provided in the named 65 file:<file> password provided in the named 67 stdin password provided on standard input, 69 A password is required to open a KeyStore. 70 By default, the tool will prompt for password via console 76 signer, KeyStore password is read before the key password 81 pass:<password> password provided inline 82 env:<name> password provided in the named [all …]
|
D | help_sign.txt | 136 --ks-pass KeyStore password (see --ks). The following formats are 138 pass:<password> password provided inline 139 env:<name> password provided in the named 141 file:<file> password provided in the named 143 stdin password provided on standard input, 145 A password is required to open a KeyStore. 146 By default, the tool will prompt for password via console 152 signer, KeyStore password is read before the key password 157 pass:<password> password provided inline 158 env:<name> password provided in the named [all …]
|
D | SignerParams.java | 358 for (char[] password : passwords) { in loadKeyStoreFromFile() 362 ks.load(in, password); in loadKeyStoreFromFile() 365 ks.load(null, password); in loadKeyStoreFromFile() 382 for (char[] password : passwords) { in getKeyStoreKey() 384 return ks.getKey(keyAlias, password); in getKeyStoreKey() 461 for (char[] password : passwords) { in decryptPkcs8EncodedKey() 462 PBEKeySpec decryptionKeySpec = new PBEKeySpec(password); in decryptPkcs8EncodedKey()
|
/tools/test/connectivity/acts/framework/acts/controllers/fuchsia_lib/lib_controllers/ |
D | wlan_policy_controller.py | 144 def save_and_connect(self, ssid, security, password=None, timeout=30): argument 160 if not self.save_network(ssid, security, password=password): 171 password=None, argument 189 if not self.save_network(ssid, security, password=password): 196 password=None, argument 218 if not self.remove_network(ssid, security_type, password=password): 240 def save_network(self, ssid, security_type, password=None): argument 252 ssid, security_type, target_pwd=password) 259 def remove_network(self, ssid, security_type, password=None): argument 271 ssid, security_type, target_pwd=password)
|
/tools/test/connectivity/acts/framework/acts/controllers/ |
D | pdu.py | 51 password = config.get('password') 52 pdu = _create_device(device, host, username, password) 83 'password': pdu.password 88 def _create_device(device, host, username, password): argument 94 return module.PduDevice(host, username, password) 163 def __init__(self, host, username, password): argument 169 self.password = password
|
D | openwrt_ap.py | 336 password=config["password"], 344 password=config["password"], 375 password=config["password"], 398 password=config["password"], 406 password=config["password"], 437 password=config["password"],
|
D | asus_axe11000_ap.py | 169 self.password = config["admin_password"] 183 self.driver.find_element_by_name(PASSWORD).send_keys(self.password) 388 def _configure_personal_network(self, band, auth, ssid=None, password=None): argument 416 if password: 418 self.driver.find_element_by_name(psk_field).send_keys(password) 584 password = network_dict[band]["password"] if "password" in network_dict[ 589 self._configure_personal_network(band, security, ssid, password)
|
/tools/test/connectivity/acts_tests/tests/google/nr/nsa5g/ |
D | Nsa5gTetheringTest.py | 283 password = TETHERING_PASSWORD_HAS_ESCAPE 285 "Starting WiFi Tethering test with password: {}".format(password)) 295 password=password) 317 password = rand_ascii_str(8) 318 self.log.info("SSID: <{}>, Password: <{}>".format(ssid, password)) 323 password): 324 fail_list[ssid] = password 351 for password in password_list: 353 self.log.info("SSID: <{}>, Password: <{}>".format(ssid, password)) 358 password): [all …]
|
/tools/test/connectivity/acts_tests/tests/google/wifi/ |
D | WifiDppTest.py | 351 password = utils.rand_ascii_str(8) 357 password = self.sae_network_password 362 password = self.psk_network_password 381 password_encoded = binascii.b2a_hex(password.encode()).decode() 384 password_encoded = password 385 self.log.debug("Password = %s" % password) 389 if password: # SAE password or PSK passphrase 784 password = utils.rand_ascii_str(8) 790 password = self.sae_network_password 795 password = self.psk_network_password [all …]
|
/tools/test/connectivity/acts/framework/acts/controllers/pdu_lib/digital_loggers/ |
D | webpowerswitch.py | 35 def __init__(self, host, username, password): argument 40 super(PduDevice, self).__init__(host, username, password) 43 password=password)
|
/tools/test/connectivity/acts_tests/acts_contrib/test_utils/tel/ |
D | tel_data_utils.py | 142 password=None): argument 184 if password is None: 185 password = rand_ascii_str(8) 188 if password == "": 189 password = None 205 password) 207 if not start_wifi_tethering(log, provider, ssid, password, ap_band): 218 if not ensure_wifi_connected(log, client, ssid, password): 1690 password=None, argument 1733 password=password) [all …]
|
/tools/test/connectivity/acts/framework/acts/controllers/openwrt_lib/ |
D | wireless_config.py | 32 password=None, argument 45 self.password = password
|