Home
last modified time | relevance | path

Searched refs:password (Results 1 – 25 of 86) sorted by relevance

1234

/tools/test/connectivity/acts_tests/tests/google/fuchsia/wlan/functional/
DWlanTargetSecurityTest.py79 password = utils.rand_ascii_str(13)
84 password=password)
92 return (ssid, password)
100 ssid, password = self.setup_ap()
104 target_pwd=password),
108 ssid, password = self.setup_ap()
112 target_pwd=password),
116 ssid, password = self.setup_ap()
120 target_pwd=password),
124 ssid, password = self.setup_ap()
[all …]
DConnectionStressTest.py77 password=None, argument
93 password=ap_config['password'])
109 target_pwd=password,
119 if self.dut.associate(ssid, target_pwd=password):
206 password=rand_ascii_str(20),
217 password=rand_ascii_str(20),
DWlanRebootTest.py177 password=None): argument
190 password=password)
478 password = settings.get('password', None)
482 elif not password:
483 password = generate_random_password(
508 self.setup_ap(self.ssid, band, ipv4, ipv6, security_mode, password)
513 target_pwd=password):
569 password)
/tools/test/connectivity/acts_tests/tests/google/fuchsia/wlan/compliance/
DVapeInteropTest.py52 self.password = utils.rand_ascii_str(
56 password=self.password,
97 password=self.password)
100 target_pwd=self.password,
118 password=self.password)
121 target_pwd=self.password,
139 password=self.password)
142 target_pwd=self.password,
160 password=self.password)
163 target_pwd=self.password,
[all …]
DWlanSecurityComplianceABGTest.py102 password = generate_random_password(
105 password = str(
110 password = generate_random_password(length=5)
112 password = generate_random_password(length=13)
114 password = str(generate_random_password(length=10,
117 password = str(generate_random_password(length=26,
121 password = utf8_password_2g_french
123 password = utf8_password_2g_german
125 password = utf8_password_2g_dutch
127 password = utf8_password_2g_swedish
[all …]
DWlanPhyCompliance11ACTest.py83 password=rand_ascii_str(20),
177 password = None
180 password = security.password
195 password=password)
198 target_pwd=password,
DWlanPhyCompliance11NTest.py150 password = None
191 password=generate_random_password(length=20),
194 password = security_profile.password
211 password=password)
214 target_pwd=password,
/tools/test/connectivity/acts_tests/tests/google/fuchsia/wlan_policy/
DSavedNetworksTest.py76 def save_bad_network(self, fd, ssid, security_type, password=""): argument
88 password=password):
157 def save_and_check_network(self, ssid, security_type, password=""): argument
169 ssid, security_type, password=password):
172 self.credentialType(password),
173 password)
175 def start_ap(self, ssid, security_type, password=None, hidden=False): argument
190 password=password)
244 password = rand_ascii_str(13)
245 self.save_and_check_network(ssid, WEP, password)
[all …]
DStartStopClientConnectionsTest.py48 self.password = rand_ascii_str(
52 password=self.password)
162 self.ssid, self.security_type, password=self.password):
174 self.ssid, self.security_type, password=self.password):
DHiddenNetworksTest.py56 security_mode=self.hidden_security, password=self.hidden_password)
93 password=self.hidden_password):
134 password=self.hidden_password):
160 password=self.hidden_password):
/tools/test/connectivity/acts/framework/acts/controllers/ap_lib/
Dhostapd_security.py27 password=None, argument
74 if password:
76 if len(password) in hostapd_constants.WEP_STR_LENGTH:
77 self.password = '"%s"' % password
78 elif len(password) in hostapd_constants.WEP_HEX_LENGTH and all(
79 c in string.hexdigits for c in password):
80 self.password = password
86 if len(password) < hostapd_constants.MIN_WPA_PSK_LENGTH or len(
87 password) > hostapd_constants.MAX_WPA_PSK_LENGTH:
93 self.password = password
[all …]
/tools/test/connectivity/acts_tests/tests/google/fuchsia/wlan/performance/
DWlanRvrTest.py326 password=None, argument
366 target_pwd=password,
410 password=password,
432 password=None, argument
489 target_pwd=password,
704 password = rand_ascii_str(20)
705 security_profile = Security(security_mode='wpa2', password=password)
714 password=password,
729 password = rand_ascii_str(20)
730 security_profile = Security(security_mode='wpa2', password=password)
[all …]
/tools/apksig/src/apksigner/java/com/android/apksigner/
Dhelp_lineage.txt61 --ks-pass KeyStore password (see --ks). The following formats are
63 pass:<password> password provided inline
64 env:<name> password provided in the named
66 file:<file> password provided in the named
68 stdin password provided on standard input,
70 A password is required to open a KeyStore.
71 By default, the tool will prompt for password via console
77 signer, KeyStore password is read before the key password
82 pass:<password> password provided inline
83 env:<name> password provided in the named
[all …]
Dhelp_rotate.txt67 --ks-pass KeyStore password (see --ks). The following formats are
69 pass:<password> password provided inline
70 env:<name> password provided in the named
72 file:<file> password provided in the named
74 stdin password provided on standard input,
76 A password is required to open a KeyStore.
77 By default, the tool will prompt for password via console
83 signer, KeyStore password is read before the key password
88 pass:<password> password provided inline
89 env:<name> password provided in the named
[all …]
Dhelp_sign.txt178 --ks-pass KeyStore password (see --ks). The following formats are
180 pass:<password> password provided inline
181 env:<name> password provided in the named
183 file:<file> password provided in the named
185 stdin password provided on standard input,
187 A password is required to open a KeyStore.
188 By default, the tool will prompt for password via console
194 signer, KeyStore password is read before the key password
199 pass:<password> password provided inline
200 env:<name> password provided in the named
[all …]
DSignerParams.java428 for (char[] password : passwords) { in loadKeyStoreFromFile()
432 ks.load(in, password); in loadKeyStoreFromFile()
435 ks.load(null, password); in loadKeyStoreFromFile()
511 for (char[] password : passwords) { in getKeyStoreKey()
513 return ks.getKey(keyAlias, password); in getKeyStoreKey()
538 for (char[] password : passwords) { in decryptPkcs8EncodedKey()
539 PBEKeySpec decryptionKeySpec = new PBEKeySpec(password); in decryptPkcs8EncodedKey()
/tools/test/connectivity/acts/framework/acts/controllers/
Dpdu.py51 password = config.get('password')
52 pdu = _create_device(device, host, username, password)
83 'password': pdu.password
88 def _create_device(device, host, username, password): argument
94 return module.PduDevice(host, username, password)
164 def __init__(self, host, username, password): argument
170 self.password = password
/tools/test/connectivity/acts/framework/acts/controllers/fuchsia_lib/lib_controllers/
Dwlan_policy_controller.py180 def save_and_connect(self, ssid, security, password=None, timeout=30): argument
196 if not self.save_network(ssid, security, password=password):
207 password=None, argument
225 if not self.save_network(ssid, security, password=password):
232 password=None, argument
254 if not self.remove_network(ssid, security_type, password=password):
276 def save_network(self, ssid, security_type, password=None): argument
288 ssid, security_type, target_pwd=password)
295 def remove_network(self, ssid, security_type, password=None): argument
307 ssid, security_type, target_pwd=password)
/tools/test/connectivity/acts_tests/tests/google/nr/nsa5gmmw/
DNsa5gMmwTetheringTest.py250 password = TETHERING_PASSWORD_HAS_ESCAPE
252 "Starting WiFi Tethering test with password: {}".format(password))
262 password=password,
285 password = rand_ascii_str(8)
286 self.log.info("SSID: <{}>, Password: <{}>".format(ssid, password))
291 password):
292 fail_list[ssid] = password
319 for password in password_list:
321 self.log.info("SSID: <{}>, Password: <{}>".format(ssid, password))
326 password):
[all …]
/tools/test/connectivity/acts/framework/acts/controllers/openwrt_lib/
Dopenwrt_authentication.py26 def __init__(self, hostname, username="root", password="root", port=22): argument
42 self.password = password
118 password=self.password)
Dwireless_config.py32 password=None, argument
45 self.password = password
/tools/test/connectivity/acts_tests/tests/google/nr/nsa5g/
DNsa5gTetheringTest.py286 password = TETHERING_PASSWORD_HAS_ESCAPE
288 "Starting WiFi Tethering test with password: {}".format(password))
298 password=password,
325 password = rand_ascii_str(8)
326 self.log.info("SSID: <{}>, Password: <{}>".format(ssid, password))
331 password):
332 fail_list[ssid] = password
363 for password in password_list:
365 self.log.info("SSID: <{}>, Password: <{}>".format(ssid, password))
370 password):
[all …]
/tools/test/connectivity/acts/framework/acts/controllers/pdu_lib/digital_loggers/
Dwebpowerswitch.py45 def __init__(self, host, username, password): argument
50 super(PduDevice, self).__init__(host, username, password)
59 password=password)
/tools/test/connectivity/acts/framework/acts/controllers/amarisoft_lib/
Dssh_utils.py48 password: str,
53 self.password = password
87 self.ssh.connect(self.host, self.port, self.username, self.password)
/tools/test/connectivity/acts_tests/tests/google/wifi/
DWifiDppTest.py351 password = utils.rand_ascii_str(8)
357 password = self.sae_network_password
362 password = self.psk_network_password
381 password_encoded = binascii.b2a_hex(password.encode()).decode()
384 password_encoded = password
385 self.log.debug("Password = %s" % password)
389 if password: # SAE password or PSK passphrase
784 password = utils.rand_ascii_str(8)
790 password = self.sae_network_password
795 password = self.psk_network_password
[all …]

1234