Support target security for all Fuchsia tests

Allow all Fuchsia (and abstract device designed for Fuchsia) tests
to support target security, without ruining tests agnosticity.

Fix some target security issues that were preventing security permutations
in some suites from running.

Simplify the random password creation with a util function.

Design doc: go/fuchsia-wlan-target-security-tests
Bug: None
Test: Ran affected suites

Change-Id: Ida4f17158542ae4a36d8d07c375a1c04c1c16806
diff --git a/acts_tests/tests/google/fuchsia/wlan/performance/ChannelSweepTest.py b/acts_tests/tests/google/fuchsia/wlan/performance/ChannelSweepTest.py
index 552cfa9..dd19904 100644
--- a/acts_tests/tests/google/fuchsia/wlan/performance/ChannelSweepTest.py
+++ b/acts_tests/tests/google/fuchsia/wlan/performance/ChannelSweepTest.py
@@ -593,11 +593,16 @@
                     hostapd_constants.MIN_WPA_PSK_LENGTH)
             security_profile = Security(security_mode=security,
                                         password=password)
+            target_security = hostapd_constants.SECURITY_STRING_TO_DEFAULT_TARGET_SECURITY.get(
+                security)
         else:
             password = None
             security_profile = None
+            target_security = None
         ssid = self.setup_ap(channel, channel_bandwidth, security_profile)
-        associated = self.dut.associate(ssid, target_pwd=password)
+        associated = self.dut.associate(ssid,
+                                        target_pwd=password,
+                                        target_security=target_security)
         if not associated:
             self.log_to_file_and_throughput_data(channel, channel_bandwidth,
                                                  None, None)