Home
last modified time | relevance | path

Searched refs:password (Results 1 – 25 of 54) sorted by relevance

123

/Zephyr-latest/include/zephyr/net/
Dwifi_credentials.h71 char password[WIFI_CREDENTIALS_MAX_PASSWORD_LEN]; /**< Password/PSK */ member
136 const uint8_t *bssid, size_t bssid_len, const char *password,
Dmqtt.h518 struct mqtt_utf8 *password; member
/Zephyr-latest/include/zephyr/drivers/modem/
Dhl7800.h54 char password[MDM_HL7800_APN_PASSWORD_MAX_SIZE]; member
214 char *password; member
457 int32_t mdm_hl7800_polte_enable(char *user, char *password);
/Zephyr-latest/subsys/net/lib/wifi_credentials/
Dwifi_credentials.c193 const uint8_t *bssid, size_t bssid_len, const char *password, in wifi_credentials_set_personal() argument
213 if ((type != WIFI_SECURITY_TYPE_NONE && (password_len == 0 || password == NULL)) || in wifi_credentials_set_personal()
244 memcpy(header_personal->password, password, password_len); in wifi_credentials_set_personal()
315 memcpy(password_buf, header_personal->password, header_personal->password_len); in wifi_credentials_get_by_ssid_personal()
DKconfig50 int "Max. length of SAE password"
53 There is no official limit on SAE password length,
Dwifi_credentials_shell.c51 creds.password, creds.password_len); in print_network_info()
182 memcpy(creds.password, argv[3], creds.password_len); in cmd_add_network()
/Zephyr-latest/samples/net/cloud/mqtt_azure/src/
Dmain.c146 static struct mqtt_utf8 password; in client_init() local
161 password.utf8 = (uint8_t *)CONFIG_SAMPLE_CLOUD_AZURE_PASSWORD; in client_init()
162 password.size = strlen(CONFIG_SAMPLE_CLOUD_AZURE_PASSWORD); in client_init()
164 client->password = &password; in client_init()
/Zephyr-latest/tests/net/lib/mqtt/v3_1_1/mqtt_packet/src/
Dmqtt_packet.c47 static ZTEST_DMEM struct mqtt_utf8 password = PASSWORD; variable
239 .password = NULL
263 .password = NULL
285 .password = NULL
307 .password = NULL
329 .password = NULL
353 .password = &password
724 client.password = test_client->password; in eval_msg_connect()
/Zephyr-latest/drivers/wifi/esp32/src/
Desp_wifi_drv.c541 memcpy(wifi_config.sta.password, params->psk, params->psk_length); in esp32_wifi_connect()
542 wifi_config.sta.password[params->psk_length] = '\0'; in esp32_wifi_connect()
550 memcpy(wifi_config.sta.password, params->sae_password, in esp32_wifi_connect()
552 wifi_config.sta.password[params->sae_password_length] = '\0'; in esp32_wifi_connect()
554 memcpy(wifi_config.sta.password, params->psk, params->psk_length); in esp32_wifi_connect()
555 wifi_config.sta.password[params->psk_length] = '\0'; in esp32_wifi_connect()
670 memset(wifi_config.ap.password, 0, sizeof(wifi_config.ap.password)); in esp32_wifi_ap_enable()
676 strncpy((char *) wifi_config.ap.password, params->psk, params->psk_length); in esp32_wifi_ap_enable()
/Zephyr-latest/subsys/net/lib/mqtt/
Dmqtt_encoder.c380 if (client->password != NULL) { in connect_request_encode()
383 NET_HEXDUMP_DBG(client->password->utf8, in connect_request_encode()
384 client->password->size, in connect_request_encode()
386 err_code = pack_utf8_str(client->password, buf); in connect_request_encode()
/Zephyr-latest/samples/subsys/mgmt/updatehub/
DKconfig28 string "WIFI PSK - Network password key"
/Zephyr-latest/samples/net/cloud/tagoio_http_post/
DKconfig37 string "WIFI PSK - Network password key"
DREADME.rst64 ``CONFIG_TAGOIO_HTTP_WIFI_PSK`` with the correspondent password at
/Zephyr-latest/subsys/shell/backends/
Dshell_mqtt.c197 static struct mqtt_utf8 password; in client_init() local
200 password.utf8 = (uint8_t *)MQTT_PASSWORD; in client_init()
201 password.size = strlen(MQTT_PASSWORD); in client_init()
212 sh_mqtt->mqtt_cli.password = &password; in client_init()
/Zephyr-latest/doc/develop/west/
Dworkspaces.rst54 You can either enter the password manually or use any of the `credential
59 having to enter your password, as well as how to troubleshoot issues.
68 your GitHub password in a graphical window once, then store it for future use
94 account password. (This may be required if your account has two-factor
95 authentication enabled, and may be preferable to storing your account password
125 If your SSH key has no password, fetching should just work. If it does have a
126 password, you can avoid entering it manually every time using `ssh-agent`_.
Dtroubleshooting.rst41 for a password when you run it directly, you will be able to run ``west
42 update`` without entering your password in that same shell.
/Zephyr-latest/samples/net/cloud/mqtt_azure/
DKconfig14 string "Azure cloud password"
/Zephyr-latest/tests/net/lib/mqtt/v3_1_1/mqtt_packet/
DREADME46 [PASS] 6 - CONNECT, new session, username and password
/Zephyr-latest/tests/boards/espressif/wifi/
DKconfig27 during test scenarios. The device will use this password to authenticate
/Zephyr-latest/samples/subsys/mgmt/hawkbit/
DREADME.rst76 ``admin`` as the login and password by default.
234 server.ssl.key-password= <password_of_key>
235 server.ssl.key-store-password= <password_of_key_store>
/Zephyr-latest/tests/net/lib/wifi_credentials_backend_psa/src/
Dmain.c61 .password = PSK1,
/Zephyr-latest/tests/net/lib/wifi_credentials_backend_settings/src/
Dmain.c58 .password = PSK1,
/Zephyr-latest/modules/thrift/src/thrift/transport/
DTSSLSocket.h355 static int passwordCallback(char *password, int size, int, void *data);
DTSSLSocket.cpp554 int TSSLSocketFactory::passwordCallback(char *password, int size, int, void *data) in passwordCallback() argument
563 strncpy(password, userPassword.c_str(), length); in passwordCallback()
/Zephyr-latest/drivers/eeprom/
Deeprom_mchp_xec.c58 uint32_t password; member

123