Searched refs:password (Results 1 – 5 of 5) sorted by relevance
| /iperf/src/ |
| H A D | iperf_auth.c | 67 int check_authentication(const char *username, const char *password, const time_t ts, const char *f… in check_authentication() argument 75 char salted[strlen(username) + strlen(password) + 3]; in check_authentication() 76 sprintf(salted, "{%s}%s", username, password); in check_authentication() 283 int encode_auth_setting(const char *username, const char *password, EVP_PKEY *public_key, char **au… in encode_auth_setting() argument 291 const int text_len = strlen(auth_text_format) + strlen(username) + strlen(password) + 32; in encode_auth_setting() 296 snprintf(text, text_len, auth_text_format, username, password, (int64_t)utc_seconds); in encode_auth_setting() 311 …debug, const char *authtoken, EVP_PKEY *private_key, char **username, char **password, time_t *ts){ in decode_auth_setting() argument 349 *password = s_password; in decode_auth_setting()
|
| H A D | iperf_auth.h | 38 int encode_auth_setting(const char *username, const char *password, EVP_PKEY *public_key, char **au… 39 …debug, const char *authtoken, EVP_PKEY *private_key, char **username, char **password, time_t *ts); 40 int check_authentication(const char *username, const char *password, const time_t ts, const char *f…
|
| H A D | iperf_api.c | 1985 char *username = NULL, *password = NULL; in test_is_authorized() local 1987 …g(test->debug, test->settings->authtoken, test->server_rsa_private_key, &username, &password, &ts); in test_is_authorized() 1991 …int ret = check_authentication(username, password, ts, test->server_authorized_users, test->server… in test_is_authorized() 1997 free(password); in test_is_authorized() 2004 free(password); in test_is_authorized()
|
| /iperf/docs/ |
| H A D | invoking.rst | 236 path to the RSA private key (not password-protected) used to 243 The file is a comma separated list of usernames and password 442 with OpenSSL support). The password will be prompted for inter- 443 actively when the test is run. Note, the password to use can 445 If this variable is present, the password prompt will be 459 tionally must not have a password set. The public key must be in PEM 476 of comma-separated pairs of a username and a corresponding password 477 hash. The password hash is a SHA256 hash of the string "{$user}$pass- 479 character). An example of commands to generate the password hash on a 485 An example of a password file (with an entry corresponding to the above [all …]
|
| /iperf/ |
| H A D | RELNOTES.md | 337 * Authentication via a username/password mechanism, coupled with a
|