| /lib/lwip/lwip/contrib/examples/httpd/post_example/ |
| A D | post_example.c | 126 … char *user = (char *)pbuf_get_contiguous(p, buf_user, sizeof(buf_user), len_user, value_user); in httpd_post_receive_data() local 128 if (user && pass) { in httpd_post_receive_data() 129 user[len_user] = 0; in httpd_post_receive_data() 131 if (!strcmp(user, "lwip") && !strcmp(pass, "post")) { in httpd_post_receive_data() 134 memcpy(last_user, user, sizeof(last_user)); in httpd_post_receive_data()
|
| /lib/lwip/lwip/src/netif/ppp/ |
| A D | auth.c | 366 { "user", o_string, user, 464 strlcpy(ppp_settings.user, u, sizeof(ppp_settings.user)); 831 eap_authwithpeer(pcb, pcb->settings.user); in link_established() 1010 if (pcb->settings.user && pcb->settings.passwd) { in auth_check_passwd() 1011 secretuserlen = strlen(pcb->settings.user); in auth_check_passwd() 1383 if (ppp_settings.user[0] == 0 && !explicit_user) in auth_check_options() 1384 strlcpy(ppp_settings.user, our_name, sizeof(ppp_settings.user)); in auth_check_options() 1573 char passwd[256], user[256]; 1583 slprintf(ppp_settings.user, sizeof(ppp_settings.user), "%.*v", userlen, auser); 1759 ret = scan_authfile(f, user, [all …]
|
| A D | chap_ms.c | 538 const char *user; in ChallengeHash() local 541 if ((user = strrchr(username, '\\')) != NULL) in ChallengeHash() 542 ++user; in ChallengeHash() 544 user = username; in ChallengeHash() 550 lwip_sha1_update(&sha1Context, (const unsigned char*)user, strlen(user)); in ChallengeHash() 874 const char *user, const char *secret, int secret_len, unsigned char *response, in ChapMS2() argument 892 ChapMS2_NT(rchallenge, &response[MS_CHAP2_PEER_CHALLENGE], user, in ChapMS2() 899 rchallenge, user, authResponse); in ChapMS2()
|
| A D | upap.c | 155 void upap_authwithpeer(ppp_pcb *pcb, const char *user, const char *password) { in upap_authwithpeer() argument 157 if(!user || !password) in upap_authwithpeer() 161 pcb->upap.us_user = user; in upap_authwithpeer() 162 pcb->upap.us_userlen = (u8_t)LWIP_MIN(strlen(user), 0xff); in upap_authwithpeer() 607 const u_char *user, *pwd, *msg; in upap_printpkt() local 635 user = (const u_char *) (p + 1); in upap_printpkt() 640 ppp_print_string(user, ulen, printer, arg); in upap_printpkt()
|
| /lib/mbedtls/external/mbedtls/library/ |
| A D | psa_crypto_pake.c | 160 uint8_t *peer = NULL, *user = NULL; in mbedtls_psa_pake_setup() local 190 user = mbedtls_calloc(1, user_len); in mbedtls_psa_pake_setup() 191 if (user == NULL) { in mbedtls_psa_pake_setup() 208 status = psa_crypto_driver_pake_get_user(inputs, user, in mbedtls_psa_pake_setup() 240 if (memcmp(user, jpake_client_id, actual_user_len) == 0 && in mbedtls_psa_pake_setup() 244 if (memcmp(user, jpake_server_id, actual_user_len) == 0 && in mbedtls_psa_pake_setup() 261 mbedtls_free(user); mbedtls_free(peer); in mbedtls_psa_pake_setup() 272 mbedtls_free(user); mbedtls_free(peer); in mbedtls_psa_pake_setup()
|
| /lib/mbedtls/external/mbedtls/docs/proposed/ |
| A D | psa-driver-wrappers-codegen-migration-guide.md | 5 It is meant to give the library user migration guidelines while the Mbed TLS project tides over mul… 22 ### What's critical for a migrating user 33 …support is yet to come in, if the library user sees a need to patch psa_crypto_driver_wrappers.h f… 40 The JSON file 'driverlist.json' is meant to be edited by the user to reflect the drivers one wants …
|
| /lib/mbedtls/external/mbedtls/tests/suites/ |
| A D | test_suite_psa_crypto_pake.data | 41 PSA PAKE: set empty user 49 PSA PAKE: set invalid user 57 PSA PAKE: user already set 65 PSA PAKE: user and peer both servers 69 PSA PAKE: user and peer both clients 239 PSA PAKE: input getters: user
|
| A D | test_suite_psa_crypto_pake.function | 63 /* The only two JPAKE user/peer identifiers supported for the time being. */ 610 uint8_t *user = (uint8_t *) user_arg; 637 TEST_EQUAL(psa_pake_set_user(&operation, user, user_len), 668 SETUP_ALWAYS_CHECK_STEP(psa_pake_set_user(&operation, user, user_len), 674 SETUP_CONDITIONAL_CHECK_STEP(psa_pake_set_user(&operation, user, user_len), 1084 uint8_t user_ret[20] = { 0 }; // max user length is 20 bytes 1099 uint8_t *user = (uint8_t *) users[i]; 1114 PSA_ASSERT(psa_pake_set_user(&operation, user, user_len)); 1133 TEST_MEMORY_COMPARE(user_ret, buffer_len_ret, user, user_len);
|
| A D | test_suite_lmots.data | 26 # pip3 install --user hsslms==0.1.2 51 # pip3 install --user hsslms==0.1.2 74 # pip3 install --user hsslms==0.1.2
|
| /lib/mbedtls/external/mbedtls/visualc/VS2017/ |
| A D | .gitignore | 10 /*.vcxproj.user
|
| /lib/lwip/lwip/contrib/ports/unix/ |
| A D | setup-tapif | 17 sudo ip tuntap add dev $PRECONFIGURED_TAPIF mode tap user `whoami`
|
| A D | README | 24 * tapif: Network interface that is mapped to a tap interface (Unix user
|
| A D | Filelists.cmake | 1 # This file is indended to be included in end-user CMakeLists.txt
|
| /lib/mbedtls/external/mbedtls/ |
| A D | SECURITY.md | 33 Mbed TLS aims to fully protect against remote attacks and to enable the user 84 a user application's threat model, they need to be mitigated by the platform. 92 attacks. If local fault injection attacks are present in a use case or a user 102 physical attacks are present in a use case or a user application's threat
|
| /lib/lwip/lwip/src/include/netif/ppp/ |
| A D | upap.h | 119 void upap_authwithpeer(ppp_pcb *pcb, const char *user, const char *password);
|
| A D | ppp.h | 254 const char *user; /* Username for PAP */ member 466 void ppp_set_auth(ppp_pcb *pcb, u8_t authtype, const char *user, const char *passwd);
|
| /lib/mbedtls/external/mbedtls/docs/ |
| A D | redirects.yaml | 2 # See https://docs.readthedocs.io/en/stable/user-defined-redirects.html
|
| /lib/mbedtls/external/mbedtls/tests/scripts/ |
| A D | docker_env.sh | 82 --user "$(id -u):$(id -g)" \
|
| /lib/lwip/lwip/src/include/lwip/apps/ |
| A D | smtp.h | 80 u8_t user[SMTP_BODYDH_USER_SIZE]; member
|
| /lib/mbedtls/external/mbedtls/programs/test/cmake_package/ |
| A D | CMakeLists.txt | 4 # Simulate configuring and building Mbed TLS as the user might do it. We'll
|
| /lib/mbedtls/external/mbedtls/programs/test/cmake_package_install/ |
| A D | CMakeLists.txt | 4 # Simulate configuring and building Mbed TLS as the user might do it. We'll
|
| /lib/lwip/lwip/test/unit/ |
| A D | Filelists.cmake | 1 # This file is indended to be included in end-user CMakeLists.txt
|
| /lib/lwip/lwip/contrib/apps/LwipMibCompiler/SharpSnmpLib/ |
| A D | license.txt | 82 does Less to protect the user's freedom than the ordinary General 105 users' freedom, it does ensure that the user of a program that is 283 directing the user to the copy of this License. Also, you must do one 292 user can modify the Library and then relink to produce a modified 294 that the user who changes the contents of definitions files in the 300 copy of the library already present on the user's computer system, 303 the user installs one, as long as the modified version is 307 least three years, to give the same user the materials 315 e) Verify that the user has already received a copy of these 316 materials or that you have already sent this user a copy.
|
| /lib/lwip/lwip/doc/ |
| A D | mqtt_client.txt | 84 notifying user, retry subscribe or disconnect from server */ 101 /* Decode topic string into a user defined reference */
|
| A D | savannah.txt | 35 documentation and a graphic user interface. Use its key generator. 121 You will have to submit this via the user News interface, then approve
|