Home
last modified time | relevance | path

Searched refs:password (Results 1 – 4 of 4) sorted by relevance

/mOS-networking-stack/samples/lighttpd-1.4.32/src/
H A Dhttp_auth.c672 } else if (password->ptr[0] == '$' && password->ptr[2] == '$') { in http_auth_basic_password_compare()
840 buffer *username, *password; in http_auth_basic_check() local
868 password = buffer_init(); in http_auth_basic_check()
872 buffer_free(password); in http_auth_basic_check()
888 buffer_free(password); in http_auth_basic_check()
896 buffer_free(password); in http_auth_basic_check()
907 buffer_free(password); in http_auth_basic_check()
1058 password = buffer_init(); in http_auth_digest_check()
1062 buffer_free(password); in http_auth_digest_check()
1079 li_MD5_Update(&Md5Ctx, (unsigned char *)password->ptr, password->used - 1); in http_auth_digest_check()
[all …]
/mOS-networking-stack/samples/lighttpd-1.4.32/doc/outdated/
H A Dauthentication.txt33 The Basic method transfers the username and the password in
67 A file which contains username and the cleartext password
78 A file which contains username and the crypt()'ed password
95 password seperated by a colon. Each entry is terminated
106 Using md5sum can also generate the password-hash: ::
151 # filename of the password storage for
H A Dfeatures.txt65 Access control only allows authentication via username and password. There
/mOS-networking-stack/samples/lighttpd-1.4.32/
H A DNEWS78 * Include IP addresses on error log on password failures (fixes #2191)
639 * fixed possible overflow in password-salt handling