Home
last modified time | relevance | path

Searched refs:password (Results 1 – 5 of 5) sorted by relevance

/iperf/src/
H A Diperf_auth.c67 int check_authentication(const char *username, const char *password, const time_t ts, const char *f… in check_authentication() argument
75 char salted[strlen(username) + strlen(password) + 3]; in check_authentication()
76 sprintf(salted, "{%s}%s", username, password); in check_authentication()
283 int encode_auth_setting(const char *username, const char *password, EVP_PKEY *public_key, char **au… in encode_auth_setting() argument
291 const int text_len = strlen(auth_text_format) + strlen(username) + strlen(password) + 32; in encode_auth_setting()
296 snprintf(text, text_len, auth_text_format, username, password, (int64_t)utc_seconds); in encode_auth_setting()
311 …debug, const char *authtoken, EVP_PKEY *private_key, char **username, char **password, time_t *ts){ in decode_auth_setting() argument
349 *password = s_password; in decode_auth_setting()
H A Diperf_auth.h38 int encode_auth_setting(const char *username, const char *password, EVP_PKEY *public_key, char **au…
39 …debug, const char *authtoken, EVP_PKEY *private_key, char **username, char **password, time_t *ts);
40 int check_authentication(const char *username, const char *password, const time_t ts, const char *f…
H A Diperf_api.c1985 char *username = NULL, *password = NULL; in test_is_authorized() local
1987 …g(test->debug, test->settings->authtoken, test->server_rsa_private_key, &username, &password, &ts); in test_is_authorized()
1991 …int ret = check_authentication(username, password, ts, test->server_authorized_users, test->server… in test_is_authorized()
1997 free(password); in test_is_authorized()
2004 free(password); in test_is_authorized()
/iperf/docs/
H A Dinvoking.rst236 path to the RSA private key (not password-protected) used to
243 The file is a comma separated list of usernames and password
442 with OpenSSL support). The password will be prompted for inter-
443 actively when the test is run. Note, the password to use can
445 If this variable is present, the password prompt will be
459 tionally must not have a password set. The public key must be in PEM
476 of comma-separated pairs of a username and a corresponding password
477 hash. The password hash is a SHA256 hash of the string "{$user}$pass-
479 character). An example of commands to generate the password hash on a
485 An example of a password file (with an entry corresponding to the above
[all …]
/iperf/
H A DRELNOTES.md337 * Authentication via a username/password mechanism, coupled with a