| /components/finsh/ |
| A D | msh_file.c | 974 user[num] |= U; in cmd_chmod() 977 user[num] |= G; in cmd_chmod() 980 user[num] |= O; in cmd_chmod() 1047 if (user[i] & U) in cmd_chmod() 1052 if (user[i] & G) in cmd_chmod() 1057 if (user[i] & O) in cmd_chmod() 1064 if (user[i] & U) in cmd_chmod() 1069 if (user[i] & G) in cmd_chmod() 1074 if (user[i] & O) in cmd_chmod() 1081 if (user[i] & U) in cmd_chmod() [all …]
|
| /components/net/lwip/lwip-1.4.1/src/netif/ppp/ |
| A D | auth.c | 254 { "user", o_string, user, 313 l = strlen(user); 314 if (l > 0 && user[l-1] == '\n') 315 user[l-1] = 0; 796 if (ppp_settings.user[0] == 0) { 876 char passwd[256], user[256]; in check_passwd() 885 BCOPY(auser, user, userlen); in check_passwd() 886 user[userlen] = '\0'; in check_passwd() 960 LWIP_UNUSED_ARG(user); 1030 if(user) { in get_pap_passwd() [all …]
|
| A D | pap.c | 160 upap_authwithpeer(int unit, char *user, char *password) in upap_authwithpeer() argument 165 unit, user, password, u->us_clientstate)); in upap_authwithpeer() 168 u->us_user = user; in upap_authwithpeer() 169 u->us_userlen = (int)strlen(user); in upap_authwithpeer()
|
| A D | ppp.h | 130 void pppSetAuth(enum pppAuthType authType, const char *user, const char *passwd);
|
| A D | ppp.c | 461 pppSetAuth(enum pppAuthType authType, const char *user, const char *passwd) in pppSetAuth() argument 510 if(user) { in pppSetAuth() 511 strncpy(ppp_settings.user, user, sizeof(ppp_settings.user)-1); in pppSetAuth() 512 ppp_settings.user[sizeof(ppp_settings.user)-1] = '\0'; in pppSetAuth() 514 ppp_settings.user[0] = '\0'; in pppSetAuth()
|
| /components/net/lwip/lwip-2.0.3/src/netif/ppp/ |
| A D | auth.c | 366 { "user", o_string, user, 464 strlcpy(ppp_settings.user, u, sizeof(ppp_settings.user)); 831 eap_authwithpeer(pcb, pcb->settings.user); in link_established() 1010 if (pcb->settings.user && pcb->settings.passwd) { in auth_check_passwd() 1011 secretuserlen = (int)strlen(pcb->settings.user); in auth_check_passwd() 1382 strlcpy(ppp_settings.user, our_name, sizeof(ppp_settings.user)); in auth_check_options() 1571 char passwd[256], user[256]; 1581 slprintf(ppp_settings.user, sizeof(ppp_settings.user), "%.*v", userlen, auser); 1617 ppp_warn("no PAP secret found for %s", user); 1757 ret = scan_authfile(f, user, [all …]
|
| A D | chap_ms.c | 538 const char *user; in ChallengeHash() local 541 if ((user = strrchr(username, '\\')) != NULL) in ChallengeHash() 542 ++user; in ChallengeHash() 544 user = username; in ChallengeHash() 550 lwip_sha1_update(&sha1Context, (const unsigned char*)user, strlen(user)); in ChallengeHash() 874 const char *user, const char *secret, int secret_len, unsigned char *response, in ChapMS2() argument 892 ChapMS2_NT(rchallenge, &response[MS_CHAP2_PEER_CHALLENGE], user, in ChapMS2() 899 rchallenge, user, authResponse); in ChapMS2()
|
| A D | upap.c | 155 void upap_authwithpeer(ppp_pcb *pcb, const char *user, const char *password) { in upap_authwithpeer() argument 157 if(!user || !password) in upap_authwithpeer() 161 pcb->upap.us_user = user; in upap_authwithpeer() 162 pcb->upap.us_userlen = LWIP_MIN(strlen(user), 0xff); in upap_authwithpeer() 605 const u_char *user, *pwd, *msg; in upap_printpkt() local 633 user = (const u_char *) (p + 1); in upap_printpkt() 638 ppp_print_string(user, ulen, printer, arg); in upap_printpkt()
|
| /components/net/lwip/lwip-2.1.2/src/netif/ppp/ |
| A D | auth.c | 366 { "user", o_string, user, 464 strlcpy(ppp_settings.user, u, sizeof(ppp_settings.user)); 831 eap_authwithpeer(pcb, pcb->settings.user); in link_established() 1010 if (pcb->settings.user && pcb->settings.passwd) { in auth_check_passwd() 1011 secretuserlen = (int)strlen(pcb->settings.user); in auth_check_passwd() 1382 strlcpy(ppp_settings.user, our_name, sizeof(ppp_settings.user)); in auth_check_options() 1571 char passwd[256], user[256]; 1581 slprintf(ppp_settings.user, sizeof(ppp_settings.user), "%.*v", userlen, auser); 1617 ppp_warn("no PAP secret found for %s", user); 1757 ret = scan_authfile(f, user, [all …]
|
| A D | chap_ms.c | 538 const char *user; in ChallengeHash() local 541 if ((user = strrchr(username, '\\')) != NULL) in ChallengeHash() 542 ++user; in ChallengeHash() 544 user = username; in ChallengeHash() 550 lwip_sha1_update(&sha1Context, (const unsigned char*)user, strlen(user)); in ChallengeHash() 874 const char *user, const char *secret, int secret_len, unsigned char *response, in ChapMS2() argument 892 ChapMS2_NT(rchallenge, &response[MS_CHAP2_PEER_CHALLENGE], user, in ChapMS2() 899 rchallenge, user, authResponse); in ChapMS2()
|
| A D | upap.c | 155 void upap_authwithpeer(ppp_pcb *pcb, const char *user, const char *password) { in upap_authwithpeer() argument 157 if(!user || !password) in upap_authwithpeer() 161 pcb->upap.us_user = user; in upap_authwithpeer() 162 pcb->upap.us_userlen = (u8_t)LWIP_MIN(strlen(user), 0xff); in upap_authwithpeer() 605 const u_char *user, *pwd, *msg; in upap_printpkt() local 633 user = (const u_char *) (p + 1); in upap_printpkt() 638 ppp_print_string(user, ulen, printer, arg); in upap_printpkt()
|
| /components/legacy/fdt/examples/ |
| A D | fdt_test.c | 55 struct dtb_node *user = user1; in dtb_test() local 59 for_each_node_sibling(user) in dtb_test() 61 …rt_kprintf("name = %s, lable = %s\n", user->name, dtb_node_get_dtb_node_property(user, "label", RT… in dtb_test()
|
| /components/lwp/vdso/ |
| A D | SConscript | 24 if not os.path.exists(cwd + "/user" + "/arch" +"/" + rtconfig.ARCH + "/vdso.lds"): 25 Preprocessing("user/arch/" + rtconfig.ARCH + "/vdso.lds.S", ".lds", CPPPATH=[cwd]) 27 vdso_arch = os.path.join(cwd, 'user',"arch", rtconfig.ARCH)
|
| /components/dfs/dfs_v2/filesystems/procfs/ |
| A D | proc_stat.c | 54 user_total = user_total + pcpu->cpu_stat.user; in seq_show() 64 dfs_seq_printf(seq, "%llu ",pcpu->cpu_stat.user);//user in seq_show()
|
| /components/net/lwip/lwip-2.0.3/src/include/netif/ppp/ |
| A D | upap.h | 115 void upap_authwithpeer(ppp_pcb *pcb, const char *user, const char *password);
|
| A D | ppp.h | 250 const char *user; /* Username for PAP */ member 462 void ppp_set_auth(ppp_pcb *pcb, u8_t authtype, const char *user, const char *passwd);
|
| /components/net/lwip/lwip-2.1.2/src/include/netif/ppp/ |
| A D | upap.h | 119 void upap_authwithpeer(ppp_pcb *pcb, const char *user, const char *password);
|
| A D | ppp.h | 254 const char *user; /* Username for PAP */ member 466 void ppp_set_auth(ppp_pcb *pcb, u8_t authtype, const char *user, const char *passwd);
|
| /components/drivers/watchdog/ |
| A D | watchdog-dw.c | 67 rt_uint32_t user; member 405 dw_wdt->user++; in dw_wdt_control() 410 dw_wdt->user--; in dw_wdt_control() 456 if (!dw_wdt->user) in dw_wdt_pm_resume()
|
| /components/net/lwip/lwip-2.1.2/src/include/lwip/apps/ |
| A D | smtp.h | 80 u8_t user[SMTP_BODYDH_USER_SIZE]; member
|
| /components/drivers/cputime/ |
| A D | Kconfig | 10 Then user can use high resolution clock counter with:
|
| /components/net/lwip/lwip-2.1.2/test/unit/ |
| A D | Filelists.cmake | 1 # This file is indended to be included in end-user CMakeLists.txt
|
| /components/lwp/vdso/user/arch/aarch64/ |
| A D | SConstruct | 31 target = os.path.join(vdso_path, 'user', 'build', 'libvdso.so')
|
| /components/net/lwip/lwip-1.4.1/ |
| A D | UPGRADING | 78 be used to place these pools into user-defined memory by using external 105 * The heap now may be moved to user-defined memory by defining 109 with user-allocated structs instead of calling mem_malloc
|
| /components/lwp/ |
| A D | Kconfig | 6 The lwP is a light weight process running in user mode.
|