/Zephyr-latest/include/zephyr/net/ |
D | wifi_credentials.h | 71 char password[WIFI_CREDENTIALS_MAX_PASSWORD_LEN]; /**< Password/PSK */ member 136 const uint8_t *bssid, size_t bssid_len, const char *password,
|
D | mqtt.h | 518 struct mqtt_utf8 *password; member
|
/Zephyr-latest/include/zephyr/drivers/modem/ |
D | hl7800.h | 54 char password[MDM_HL7800_APN_PASSWORD_MAX_SIZE]; member 214 char *password; member 457 int32_t mdm_hl7800_polte_enable(char *user, char *password);
|
/Zephyr-latest/subsys/net/lib/wifi_credentials/ |
D | wifi_credentials.c | 193 const uint8_t *bssid, size_t bssid_len, const char *password, in wifi_credentials_set_personal() argument 213 if ((type != WIFI_SECURITY_TYPE_NONE && (password_len == 0 || password == NULL)) || in wifi_credentials_set_personal() 244 memcpy(header_personal->password, password, password_len); in wifi_credentials_set_personal() 315 memcpy(password_buf, header_personal->password, header_personal->password_len); in wifi_credentials_get_by_ssid_personal()
|
D | Kconfig | 50 int "Max. length of SAE password" 53 There is no official limit on SAE password length,
|
D | wifi_credentials_shell.c | 51 creds.password, creds.password_len); in print_network_info() 182 memcpy(creds.password, argv[3], creds.password_len); in cmd_add_network()
|
/Zephyr-latest/samples/net/cloud/mqtt_azure/src/ |
D | main.c | 146 static struct mqtt_utf8 password; in client_init() local 161 password.utf8 = (uint8_t *)CONFIG_SAMPLE_CLOUD_AZURE_PASSWORD; in client_init() 162 password.size = strlen(CONFIG_SAMPLE_CLOUD_AZURE_PASSWORD); in client_init() 164 client->password = &password; in client_init()
|
/Zephyr-latest/tests/net/lib/mqtt/v3_1_1/mqtt_packet/src/ |
D | mqtt_packet.c | 47 static ZTEST_DMEM struct mqtt_utf8 password = PASSWORD; variable 239 .password = NULL 263 .password = NULL 285 .password = NULL 307 .password = NULL 329 .password = NULL 353 .password = &password 724 client.password = test_client->password; in eval_msg_connect()
|
/Zephyr-latest/drivers/wifi/esp32/src/ |
D | esp_wifi_drv.c | 541 memcpy(wifi_config.sta.password, params->psk, params->psk_length); in esp32_wifi_connect() 542 wifi_config.sta.password[params->psk_length] = '\0'; in esp32_wifi_connect() 550 memcpy(wifi_config.sta.password, params->sae_password, in esp32_wifi_connect() 552 wifi_config.sta.password[params->sae_password_length] = '\0'; in esp32_wifi_connect() 554 memcpy(wifi_config.sta.password, params->psk, params->psk_length); in esp32_wifi_connect() 555 wifi_config.sta.password[params->psk_length] = '\0'; in esp32_wifi_connect() 670 memset(wifi_config.ap.password, 0, sizeof(wifi_config.ap.password)); in esp32_wifi_ap_enable() 676 strncpy((char *) wifi_config.ap.password, params->psk, params->psk_length); in esp32_wifi_ap_enable()
|
/Zephyr-latest/subsys/net/lib/mqtt/ |
D | mqtt_encoder.c | 380 if (client->password != NULL) { in connect_request_encode() 383 NET_HEXDUMP_DBG(client->password->utf8, in connect_request_encode() 384 client->password->size, in connect_request_encode() 386 err_code = pack_utf8_str(client->password, buf); in connect_request_encode()
|
/Zephyr-latest/samples/subsys/mgmt/updatehub/ |
D | Kconfig | 28 string "WIFI PSK - Network password key"
|
/Zephyr-latest/samples/net/cloud/tagoio_http_post/ |
D | Kconfig | 37 string "WIFI PSK - Network password key"
|
D | README.rst | 64 ``CONFIG_TAGOIO_HTTP_WIFI_PSK`` with the correspondent password at
|
/Zephyr-latest/subsys/shell/backends/ |
D | shell_mqtt.c | 197 static struct mqtt_utf8 password; in client_init() local 200 password.utf8 = (uint8_t *)MQTT_PASSWORD; in client_init() 201 password.size = strlen(MQTT_PASSWORD); in client_init() 212 sh_mqtt->mqtt_cli.password = &password; in client_init()
|
/Zephyr-latest/doc/develop/west/ |
D | workspaces.rst | 54 You can either enter the password manually or use any of the `credential 59 having to enter your password, as well as how to troubleshoot issues. 68 your GitHub password in a graphical window once, then store it for future use 94 account password. (This may be required if your account has two-factor 95 authentication enabled, and may be preferable to storing your account password 125 If your SSH key has no password, fetching should just work. If it does have a 126 password, you can avoid entering it manually every time using `ssh-agent`_.
|
D | troubleshooting.rst | 41 for a password when you run it directly, you will be able to run ``west 42 update`` without entering your password in that same shell.
|
/Zephyr-latest/samples/net/cloud/mqtt_azure/ |
D | Kconfig | 14 string "Azure cloud password"
|
/Zephyr-latest/tests/net/lib/mqtt/v3_1_1/mqtt_packet/ |
D | README | 46 [PASS] 6 - CONNECT, new session, username and password
|
/Zephyr-latest/tests/boards/espressif/wifi/ |
D | Kconfig | 27 during test scenarios. The device will use this password to authenticate
|
/Zephyr-latest/samples/subsys/mgmt/hawkbit/ |
D | README.rst | 76 ``admin`` as the login and password by default. 234 server.ssl.key-password= <password_of_key> 235 server.ssl.key-store-password= <password_of_key_store>
|
/Zephyr-latest/tests/net/lib/wifi_credentials_backend_psa/src/ |
D | main.c | 61 .password = PSK1,
|
/Zephyr-latest/tests/net/lib/wifi_credentials_backend_settings/src/ |
D | main.c | 58 .password = PSK1,
|
/Zephyr-latest/modules/thrift/src/thrift/transport/ |
D | TSSLSocket.h | 355 static int passwordCallback(char *password, int size, int, void *data);
|
D | TSSLSocket.cpp | 554 int TSSLSocketFactory::passwordCallback(char *password, int size, int, void *data) in passwordCallback() argument 563 strncpy(password, userPassword.c_str(), length); in passwordCallback()
|
/Zephyr-latest/drivers/eeprom/ |
D | eeprom_mchp_xec.c | 58 uint32_t password; member
|