/tools/test/connectivity/acts_tests/tests/google/fuchsia/wlan/functional/ |
D | WlanTargetSecurityTest.py | 79 password = utils.rand_ascii_str(13) 84 password=password) 92 return (ssid, password) 100 ssid, password = self.setup_ap() 104 target_pwd=password), 108 ssid, password = self.setup_ap() 112 target_pwd=password), 116 ssid, password = self.setup_ap() 120 target_pwd=password), 124 ssid, password = self.setup_ap() [all …]
|
D | ConnectionStressTest.py | 77 password=None, argument 93 password=ap_config['password']) 109 target_pwd=password, 119 if self.dut.associate(ssid, target_pwd=password): 206 password=rand_ascii_str(20), 217 password=rand_ascii_str(20),
|
D | WlanRebootTest.py | 177 password=None): argument 190 password=password) 478 password = settings.get('password', None) 482 elif not password: 483 password = generate_random_password( 508 self.setup_ap(self.ssid, band, ipv4, ipv6, security_mode, password) 513 target_pwd=password): 569 password)
|
/tools/test/connectivity/acts_tests/tests/google/fuchsia/wlan/compliance/ |
D | VapeInteropTest.py | 52 self.password = utils.rand_ascii_str( 56 password=self.password, 97 password=self.password) 100 target_pwd=self.password, 118 password=self.password) 121 target_pwd=self.password, 139 password=self.password) 142 target_pwd=self.password, 160 password=self.password) 163 target_pwd=self.password, [all …]
|
D | WlanSecurityComplianceABGTest.py | 102 password = generate_random_password( 105 password = str( 110 password = generate_random_password(length=5) 112 password = generate_random_password(length=13) 114 password = str(generate_random_password(length=10, 117 password = str(generate_random_password(length=26, 121 password = utf8_password_2g_french 123 password = utf8_password_2g_german 125 password = utf8_password_2g_dutch 127 password = utf8_password_2g_swedish [all …]
|
D | WlanPhyCompliance11ACTest.py | 83 password=rand_ascii_str(20), 177 password = None 180 password = security.password 195 password=password) 198 target_pwd=password,
|
D | WlanPhyCompliance11NTest.py | 150 password = None 191 password=generate_random_password(length=20), 194 password = security_profile.password 211 password=password) 214 target_pwd=password,
|
/tools/test/connectivity/acts_tests/tests/google/fuchsia/wlan_policy/ |
D | SavedNetworksTest.py | 76 def save_bad_network(self, fd, ssid, security_type, password=""): argument 88 password=password): 157 def save_and_check_network(self, ssid, security_type, password=""): argument 169 ssid, security_type, password=password): 172 self.credentialType(password), 173 password) 175 def start_ap(self, ssid, security_type, password=None, hidden=False): argument 190 password=password) 244 password = rand_ascii_str(13) 245 self.save_and_check_network(ssid, WEP, password) [all …]
|
D | StartStopClientConnectionsTest.py | 48 self.password = rand_ascii_str( 52 password=self.password) 162 self.ssid, self.security_type, password=self.password): 174 self.ssid, self.security_type, password=self.password):
|
D | HiddenNetworksTest.py | 56 security_mode=self.hidden_security, password=self.hidden_password) 93 password=self.hidden_password): 134 password=self.hidden_password): 160 password=self.hidden_password):
|
/tools/test/connectivity/acts/framework/acts/controllers/ap_lib/ |
D | hostapd_security.py | 27 password=None, argument 74 if password: 76 if len(password) in hostapd_constants.WEP_STR_LENGTH: 77 self.password = '"%s"' % password 78 elif len(password) in hostapd_constants.WEP_HEX_LENGTH and all( 79 c in string.hexdigits for c in password): 80 self.password = password 86 if len(password) < hostapd_constants.MIN_WPA_PSK_LENGTH or len( 87 password) > hostapd_constants.MAX_WPA_PSK_LENGTH: 93 self.password = password [all …]
|
/tools/test/connectivity/acts_tests/tests/google/fuchsia/wlan/performance/ |
D | WlanRvrTest.py | 326 password=None, argument 366 target_pwd=password, 410 password=password, 432 password=None, argument 489 target_pwd=password, 704 password = rand_ascii_str(20) 705 security_profile = Security(security_mode='wpa2', password=password) 714 password=password, 729 password = rand_ascii_str(20) 730 security_profile = Security(security_mode='wpa2', password=password) [all …]
|
/tools/apksig/src/apksigner/java/com/android/apksigner/ |
D | help_lineage.txt | 61 --ks-pass KeyStore password (see --ks). The following formats are 63 pass:<password> password provided inline 64 env:<name> password provided in the named 66 file:<file> password provided in the named 68 stdin password provided on standard input, 70 A password is required to open a KeyStore. 71 By default, the tool will prompt for password via console 77 signer, KeyStore password is read before the key password 82 pass:<password> password provided inline 83 env:<name> password provided in the named [all …]
|
D | help_rotate.txt | 67 --ks-pass KeyStore password (see --ks). The following formats are 69 pass:<password> password provided inline 70 env:<name> password provided in the named 72 file:<file> password provided in the named 74 stdin password provided on standard input, 76 A password is required to open a KeyStore. 77 By default, the tool will prompt for password via console 83 signer, KeyStore password is read before the key password 88 pass:<password> password provided inline 89 env:<name> password provided in the named [all …]
|
D | help_sign.txt | 178 --ks-pass KeyStore password (see --ks). The following formats are 180 pass:<password> password provided inline 181 env:<name> password provided in the named 183 file:<file> password provided in the named 185 stdin password provided on standard input, 187 A password is required to open a KeyStore. 188 By default, the tool will prompt for password via console 194 signer, KeyStore password is read before the key password 199 pass:<password> password provided inline 200 env:<name> password provided in the named [all …]
|
D | SignerParams.java | 428 for (char[] password : passwords) { in loadKeyStoreFromFile() 432 ks.load(in, password); in loadKeyStoreFromFile() 435 ks.load(null, password); in loadKeyStoreFromFile() 511 for (char[] password : passwords) { in getKeyStoreKey() 513 return ks.getKey(keyAlias, password); in getKeyStoreKey() 538 for (char[] password : passwords) { in decryptPkcs8EncodedKey() 539 PBEKeySpec decryptionKeySpec = new PBEKeySpec(password); in decryptPkcs8EncodedKey()
|
/tools/test/connectivity/acts/framework/acts/controllers/ |
D | pdu.py | 51 password = config.get('password') 52 pdu = _create_device(device, host, username, password) 83 'password': pdu.password 88 def _create_device(device, host, username, password): argument 94 return module.PduDevice(host, username, password) 164 def __init__(self, host, username, password): argument 170 self.password = password
|
/tools/test/connectivity/acts/framework/acts/controllers/fuchsia_lib/lib_controllers/ |
D | wlan_policy_controller.py | 180 def save_and_connect(self, ssid, security, password=None, timeout=30): argument 196 if not self.save_network(ssid, security, password=password): 207 password=None, argument 225 if not self.save_network(ssid, security, password=password): 232 password=None, argument 254 if not self.remove_network(ssid, security_type, password=password): 276 def save_network(self, ssid, security_type, password=None): argument 288 ssid, security_type, target_pwd=password) 295 def remove_network(self, ssid, security_type, password=None): argument 307 ssid, security_type, target_pwd=password)
|
/tools/test/connectivity/acts_tests/tests/google/nr/nsa5gmmw/ |
D | Nsa5gMmwTetheringTest.py | 250 password = TETHERING_PASSWORD_HAS_ESCAPE 252 "Starting WiFi Tethering test with password: {}".format(password)) 262 password=password, 285 password = rand_ascii_str(8) 286 self.log.info("SSID: <{}>, Password: <{}>".format(ssid, password)) 291 password): 292 fail_list[ssid] = password 319 for password in password_list: 321 self.log.info("SSID: <{}>, Password: <{}>".format(ssid, password)) 326 password): [all …]
|
/tools/test/connectivity/acts/framework/acts/controllers/openwrt_lib/ |
D | openwrt_authentication.py | 26 def __init__(self, hostname, username="root", password="root", port=22): argument 42 self.password = password 118 password=self.password)
|
D | wireless_config.py | 32 password=None, argument 45 self.password = password
|
/tools/test/connectivity/acts_tests/tests/google/nr/nsa5g/ |
D | Nsa5gTetheringTest.py | 286 password = TETHERING_PASSWORD_HAS_ESCAPE 288 "Starting WiFi Tethering test with password: {}".format(password)) 298 password=password, 325 password = rand_ascii_str(8) 326 self.log.info("SSID: <{}>, Password: <{}>".format(ssid, password)) 331 password): 332 fail_list[ssid] = password 363 for password in password_list: 365 self.log.info("SSID: <{}>, Password: <{}>".format(ssid, password)) 370 password): [all …]
|
/tools/test/connectivity/acts/framework/acts/controllers/pdu_lib/digital_loggers/ |
D | webpowerswitch.py | 45 def __init__(self, host, username, password): argument 50 super(PduDevice, self).__init__(host, username, password) 59 password=password)
|
/tools/test/connectivity/acts/framework/acts/controllers/amarisoft_lib/ |
D | ssh_utils.py | 48 password: str, 53 self.password = password 87 self.ssh.connect(self.host, self.port, self.username, self.password)
|
/tools/test/connectivity/acts_tests/tests/google/wifi/ |
D | WifiDppTest.py | 351 password = utils.rand_ascii_str(8) 357 password = self.sae_network_password 362 password = self.psk_network_password 381 password_encoded = binascii.b2a_hex(password.encode()).decode() 384 password_encoded = password 385 self.log.debug("Password = %s" % password) 389 if password: # SAE password or PSK passphrase 784 password = utils.rand_ascii_str(8) 790 password = self.sae_network_password 795 password = self.psk_network_password [all …]
|