Home
last modified time | relevance | path

Searched refs:password (Results 1 – 25 of 55) sorted by relevance

123

/tools/test/connectivity/acts_tests/tests/google/fuchsia/wlan/
DWlanSecurityComplianceABGTest.py96 password = rand_ascii_str(
99 password = str(rand_hex_str(
102 password = rand_ascii_str(5)
104 password = rand_ascii_str(13)
106 password = str(rand_hex_str(10)).lower()
108 password = str(rand_hex_str(26)).lower()
111 password = utf8_password_2g_french
113 password = utf8_password_2g_german
115 password = utf8_password_2g_dutch
117 password = utf8_password_2g_swedish
[all …]
DVapeInteropTest.py52 self.password = utils.rand_ascii_str(
56 password=self.password,
98 password=self.password)
116 password=self.password)
134 password=self.password)
152 password=self.password)
170 password=self.password)
188 password=self.password)
206 password=self.password)
224 password=self.password)
[all …]
DWlanRvrTest.py236 password=None, argument
281 password,
360 password=password,
381 password=None, argument
437 password,
652 password = rand_ascii_str(20)
653 security_profile = Security(security_mode='wpa2', password=password)
661 password=password,
676 password = rand_ascii_str(20)
677 security_profile = Security(security_mode='wpa2', password=password)
[all …]
DConnectionStressTest.py83 password=None, argument
102 if not associate(self.dut, ssid=ssid, password=password):
111 if associate(self.dut, ssid=ssid, password=password):
199 password=rand_ascii_str(10))
201 password=rand_ascii_str(20),
213 password=rand_ascii_str(10))
215 password=rand_ascii_str(20),
DSoftApTest.py164 password = settings.get('password', '')
172 ssid, security_type, password, connectivity_mode, operating_band)
199 password=settings.get('password'),
1015 password = ap_params.get('password', None)
1017 security = hostapd_security.Security(security_mode, password)
1027 password=password,
1155 password = config_settings.get('password', '')
1167 'password': password,
DWlanPhyCompliance11ACTest.py85 password=rand_ascii_str(20),
176 password = None
178 password = security.password
193 password=password)
DWlanPhyCompliance11NTest.py137 password = None
173 password=rand_ascii_str(20),
176 password = security_profile.password
188 password=password)
DChannelSweepTest.py586 password = utils.rand_hex_str(WEP_HEX_STRING_LENGTH)
588 password = utils.rand_ascii_str(
591 password=password)
593 password = None
598 password=password)
/tools/apksig/src/apksigner/java/com/android/apksigner/
Dhelp_lineage.txt57 --ks-pass KeyStore password (see --ks). The following formats are
59 pass:<password> password provided inline
60 env:<name> password provided in the named
62 file:<file> password provided in the named
64 stdin password provided on standard input,
66 A password is required to open a KeyStore.
67 By default, the tool will prompt for password via console
73 signer, KeyStore password is read before the key password
78 pass:<password> password provided inline
79 env:<name> password provided in the named
[all …]
Dhelp_sign.txt108 --ks-pass KeyStore password (see --ks). The following formats are
110 pass:<password> password provided inline
111 env:<name> password provided in the named
113 file:<file> password provided in the named
115 stdin password provided on standard input,
117 A password is required to open a KeyStore.
118 By default, the tool will prompt for password via console
124 signer, KeyStore password is read before the key password
129 pass:<password> password provided inline
130 env:<name> password provided in the named
[all …]
Dhelp_rotate.txt60 --ks-pass KeyStore password (see --ks). The following formats are
62 pass:<password> password provided inline
63 env:<name> password provided in the named
65 file:<file> password provided in the named
67 stdin password provided on standard input,
69 A password is required to open a KeyStore.
70 By default, the tool will prompt for password via console
76 signer, KeyStore password is read before the key password
81 pass:<password> password provided inline
82 env:<name> password provided in the named
[all …]
DSignerParams.java349 for (char[] password : passwords) { in loadKeyStoreFromFile()
353 ks.load(in, password); in loadKeyStoreFromFile()
356 ks.load(null, password); in loadKeyStoreFromFile()
373 for (char[] password : passwords) { in getKeyStoreKey()
375 return ks.getKey(keyAlias, password); in getKeyStoreKey()
452 for (char[] password : passwords) { in decryptPkcs8EncodedKey()
453 PBEKeySpec decryptionKeySpec = new PBEKeySpec(password); in decryptPkcs8EncodedKey()
/tools/test/connectivity/acts/framework/acts/controllers/ap_lib/
Dhostapd_security.py27 password=None, argument
87 if password:
89 if len(password) in hostapd_constants.WEP_STR_LENGTH:
90 self.password = '"%s"' % password
91 elif len(password) in hostapd_constants.WEP_HEX_LENGTH and all(
92 c in string.hexdigits for c in password):
93 self.password = password
99 if len(password) < hostapd_constants.MIN_WPA_PSK_LENGTH or len(
100 password) > hostapd_constants.MAX_WPA_PSK_LENGTH:
106 self.password = password
[all …]
/tools/test/connectivity/acts/framework/acts/test_utils/wifi/
Dwifi_retail_ap.py329 def set_security(self, network, security_type, *password): argument
337 if (len(password) == 1) and (type(password[0]) == str):
340 "password_{}".format(network): str(password[0])
457 password=self.ap_settings["admin_password"],
471 password=self.ap_settings["admin_password"],
714 password=self.ap_settings["admin_password"],
722 password=self.ap_settings["admin_password"],
1018 password=self.ap_settings["admin_password"],
1032 password=self.ap_settings["admin_password"],
1079 password=self.ap_settings["admin_password"],
[all …]
Dwifi_test_utils.py908 def start_wifi_tethering(ad, ssid, password, band=None, hidden=None): argument
923 if password:
924 config[WifiEnums.PWD_KEY] = password
2315 password = network["password"]
2317 security_mode="wpa", password=password)
2319 security = hostapd_security.Security(security_mode=None, password=None)
Dwifi_power_test_utils.py122 password = network["password"]
124 security_mode="wpa", password=password)
126 security = hostapd_security.Security(security_mode=None, password=None)
DWifiBaseTest.py533 password=network["password"])))
542 password=network["wepKeys"][0])))
569 password=hostapd_config_settings["password"]),
580 password=hostapd_config_settings["wepKeys"][0]),
/tools/test/connectivity/acts/framework/acts/controllers/
Dpdu.py51 password = config.get('password')
52 pdu = _create_device(device, host, username, password)
83 'password': pdu.password
88 def _create_device(device, host, username, password): argument
94 return module.PduDevice(host, username, password)
163 def __init__(self, host, username, password): argument
169 self.password = password
Dandroid_device.py1448 self.unlock_screen(password=DEFAULT_DEVICE_PASSWORD)
1474 def unlock_screen(self, password=None): argument
1475 self.log.info("Unlocking with %s", password or "swipe up")
1482 if password:
1484 for number in password:
/tools/test/connectivity/acts/framework/acts/test_utils/abstract_devices/utils_lib/
Dwlan_utils.py48 password=None, argument
75 force_wmm, hidden, security, additional_ap_parameters, password,
82 password,
89 password=password,
108 password=None, argument
157 password=None, argument
172 password,
/tools/test/connectivity/acts_tests/tests/google/tel/live/
DTelLiveDataTest.py2208 password = '"DQ=/{Yqq;M=(^_3HzRvhOiL8S%`]w&l<Qp8qH)bs<4E9v_q=HLr^)}w$blA0Kg'
2210 "Starting WiFi Tethering test with password: {}".format(password))
2219 password=password)
2222 ssid, password): argument
2245 if not start_wifi_tethering(self.log, ad_host, ssid, password,
2250 if not ensure_wifi_connected(self.log, ad_client, ssid, password):
2290 password = rand_ascii_str(8)
2291 self.log.info("SSID: <{}>, Password: <{}>".format(ssid, password))
2293 self.provider, self.clients[0], ssid, password):
2294 fail_list[ssid] = password
[all …]
/tools/test/connectivity/acts/framework/acts/test_utils/tel/
Dtel_data_utils.py89 password=None): argument
131 if password is None:
132 password = rand_ascii_str(8)
135 if password == "":
136 password = None
152 password)
154 if not start_wifi_tethering(log, provider, ssid, password, ap_band):
165 if not ensure_wifi_connected(log, client, ssid, password):
/tools/test/connectivity/acts/framework/acts/controllers/pdu_lib/digital_loggers/
Dwebpowerswitch.py35 def __init__(self, host, username, password): argument
40 super(PduDevice, self).__init__(host, username, password)
43 password=password)
/tools/test/connectivity/acts/tests/google/wifi/
DWifiDppTest.py294 password = utils.rand_ascii_str(8)
296 password_encoded = binascii.b2a_hex(password.encode()).decode()
299 password_encoded = password
300 self.log.debug("Password = %s" % password)
304 if password: # SAE password or PSK passphrase
/tools/test/connectivity/acts_tests/tests/google/net/arduino/connect_wifi/
Dconnect_wifi.ino6 const char* password = "password";
33 WiFi.begin(ssid, password);

123