/tools/test/connectivity/acts_tests/tests/google/fuchsia/wlan/ |
D | WlanSecurityComplianceABGTest.py | 96 password = rand_ascii_str( 99 password = str(rand_hex_str( 102 password = rand_ascii_str(5) 104 password = rand_ascii_str(13) 106 password = str(rand_hex_str(10)).lower() 108 password = str(rand_hex_str(26)).lower() 111 password = utf8_password_2g_french 113 password = utf8_password_2g_german 115 password = utf8_password_2g_dutch 117 password = utf8_password_2g_swedish [all …]
|
D | VapeInteropTest.py | 52 self.password = utils.rand_ascii_str( 56 password=self.password, 98 password=self.password) 116 password=self.password) 134 password=self.password) 152 password=self.password) 170 password=self.password) 188 password=self.password) 206 password=self.password) 224 password=self.password) [all …]
|
D | WlanRvrTest.py | 236 password=None, argument 281 password, 360 password=password, 381 password=None, argument 437 password, 652 password = rand_ascii_str(20) 653 security_profile = Security(security_mode='wpa2', password=password) 661 password=password, 676 password = rand_ascii_str(20) 677 security_profile = Security(security_mode='wpa2', password=password) [all …]
|
D | ConnectionStressTest.py | 83 password=None, argument 102 if not associate(self.dut, ssid=ssid, password=password): 111 if associate(self.dut, ssid=ssid, password=password): 199 password=rand_ascii_str(10)) 201 password=rand_ascii_str(20), 213 password=rand_ascii_str(10)) 215 password=rand_ascii_str(20),
|
D | SoftApTest.py | 164 password = settings.get('password', '') 172 ssid, security_type, password, connectivity_mode, operating_band) 199 password=settings.get('password'), 1015 password = ap_params.get('password', None) 1017 security = hostapd_security.Security(security_mode, password) 1027 password=password, 1155 password = config_settings.get('password', '') 1167 'password': password,
|
D | WlanPhyCompliance11ACTest.py | 85 password=rand_ascii_str(20), 176 password = None 178 password = security.password 193 password=password)
|
D | WlanPhyCompliance11NTest.py | 137 password = None 173 password=rand_ascii_str(20), 176 password = security_profile.password 188 password=password)
|
D | ChannelSweepTest.py | 586 password = utils.rand_hex_str(WEP_HEX_STRING_LENGTH) 588 password = utils.rand_ascii_str( 591 password=password) 593 password = None 598 password=password)
|
/tools/apksig/src/apksigner/java/com/android/apksigner/ |
D | help_lineage.txt | 57 --ks-pass KeyStore password (see --ks). The following formats are 59 pass:<password> password provided inline 60 env:<name> password provided in the named 62 file:<file> password provided in the named 64 stdin password provided on standard input, 66 A password is required to open a KeyStore. 67 By default, the tool will prompt for password via console 73 signer, KeyStore password is read before the key password 78 pass:<password> password provided inline 79 env:<name> password provided in the named [all …]
|
D | help_sign.txt | 108 --ks-pass KeyStore password (see --ks). The following formats are 110 pass:<password> password provided inline 111 env:<name> password provided in the named 113 file:<file> password provided in the named 115 stdin password provided on standard input, 117 A password is required to open a KeyStore. 118 By default, the tool will prompt for password via console 124 signer, KeyStore password is read before the key password 129 pass:<password> password provided inline 130 env:<name> password provided in the named [all …]
|
D | help_rotate.txt | 60 --ks-pass KeyStore password (see --ks). The following formats are 62 pass:<password> password provided inline 63 env:<name> password provided in the named 65 file:<file> password provided in the named 67 stdin password provided on standard input, 69 A password is required to open a KeyStore. 70 By default, the tool will prompt for password via console 76 signer, KeyStore password is read before the key password 81 pass:<password> password provided inline 82 env:<name> password provided in the named [all …]
|
D | SignerParams.java | 349 for (char[] password : passwords) { in loadKeyStoreFromFile() 353 ks.load(in, password); in loadKeyStoreFromFile() 356 ks.load(null, password); in loadKeyStoreFromFile() 373 for (char[] password : passwords) { in getKeyStoreKey() 375 return ks.getKey(keyAlias, password); in getKeyStoreKey() 452 for (char[] password : passwords) { in decryptPkcs8EncodedKey() 453 PBEKeySpec decryptionKeySpec = new PBEKeySpec(password); in decryptPkcs8EncodedKey()
|
/tools/test/connectivity/acts/framework/acts/controllers/ap_lib/ |
D | hostapd_security.py | 27 password=None, argument 87 if password: 89 if len(password) in hostapd_constants.WEP_STR_LENGTH: 90 self.password = '"%s"' % password 91 elif len(password) in hostapd_constants.WEP_HEX_LENGTH and all( 92 c in string.hexdigits for c in password): 93 self.password = password 99 if len(password) < hostapd_constants.MIN_WPA_PSK_LENGTH or len( 100 password) > hostapd_constants.MAX_WPA_PSK_LENGTH: 106 self.password = password [all …]
|
/tools/test/connectivity/acts/framework/acts/test_utils/wifi/ |
D | wifi_retail_ap.py | 329 def set_security(self, network, security_type, *password): argument 337 if (len(password) == 1) and (type(password[0]) == str): 340 "password_{}".format(network): str(password[0]) 457 password=self.ap_settings["admin_password"], 471 password=self.ap_settings["admin_password"], 714 password=self.ap_settings["admin_password"], 722 password=self.ap_settings["admin_password"], 1018 password=self.ap_settings["admin_password"], 1032 password=self.ap_settings["admin_password"], 1079 password=self.ap_settings["admin_password"], [all …]
|
D | wifi_test_utils.py | 908 def start_wifi_tethering(ad, ssid, password, band=None, hidden=None): argument 923 if password: 924 config[WifiEnums.PWD_KEY] = password 2315 password = network["password"] 2317 security_mode="wpa", password=password) 2319 security = hostapd_security.Security(security_mode=None, password=None)
|
D | wifi_power_test_utils.py | 122 password = network["password"] 124 security_mode="wpa", password=password) 126 security = hostapd_security.Security(security_mode=None, password=None)
|
D | WifiBaseTest.py | 533 password=network["password"]))) 542 password=network["wepKeys"][0]))) 569 password=hostapd_config_settings["password"]), 580 password=hostapd_config_settings["wepKeys"][0]),
|
/tools/test/connectivity/acts/framework/acts/controllers/ |
D | pdu.py | 51 password = config.get('password') 52 pdu = _create_device(device, host, username, password) 83 'password': pdu.password 88 def _create_device(device, host, username, password): argument 94 return module.PduDevice(host, username, password) 163 def __init__(self, host, username, password): argument 169 self.password = password
|
D | android_device.py | 1448 self.unlock_screen(password=DEFAULT_DEVICE_PASSWORD) 1474 def unlock_screen(self, password=None): argument 1475 self.log.info("Unlocking with %s", password or "swipe up") 1482 if password: 1484 for number in password:
|
/tools/test/connectivity/acts/framework/acts/test_utils/abstract_devices/utils_lib/ |
D | wlan_utils.py | 48 password=None, argument 75 force_wmm, hidden, security, additional_ap_parameters, password, 82 password, 89 password=password, 108 password=None, argument 157 password=None, argument 172 password,
|
/tools/test/connectivity/acts_tests/tests/google/tel/live/ |
D | TelLiveDataTest.py | 2208 password = '"DQ=/{Yqq;M=(^_3HzRvhOiL8S%`]w&l<Qp8qH)bs<4E9v_q=HLr^)}w$blA0Kg' 2210 "Starting WiFi Tethering test with password: {}".format(password)) 2219 password=password) 2222 ssid, password): argument 2245 if not start_wifi_tethering(self.log, ad_host, ssid, password, 2250 if not ensure_wifi_connected(self.log, ad_client, ssid, password): 2290 password = rand_ascii_str(8) 2291 self.log.info("SSID: <{}>, Password: <{}>".format(ssid, password)) 2293 self.provider, self.clients[0], ssid, password): 2294 fail_list[ssid] = password [all …]
|
/tools/test/connectivity/acts/framework/acts/test_utils/tel/ |
D | tel_data_utils.py | 89 password=None): argument 131 if password is None: 132 password = rand_ascii_str(8) 135 if password == "": 136 password = None 152 password) 154 if not start_wifi_tethering(log, provider, ssid, password, ap_band): 165 if not ensure_wifi_connected(log, client, ssid, password):
|
/tools/test/connectivity/acts/framework/acts/controllers/pdu_lib/digital_loggers/ |
D | webpowerswitch.py | 35 def __init__(self, host, username, password): argument 40 super(PduDevice, self).__init__(host, username, password) 43 password=password)
|
/tools/test/connectivity/acts/tests/google/wifi/ |
D | WifiDppTest.py | 294 password = utils.rand_ascii_str(8) 296 password_encoded = binascii.b2a_hex(password.encode()).decode() 299 password_encoded = password 300 self.log.debug("Password = %s" % password) 304 if password: # SAE password or PSK passphrase
|
/tools/test/connectivity/acts_tests/tests/google/net/arduino/connect_wifi/ |
D | connect_wifi.ino | 6 const char* password = "password"; 33 WiFi.begin(ssid, password);
|