HomeSort by: relevance | last modified time | path
    Searched refs:rhostname (Results 1 - 3 of 3) sorted by relevancy

  /src/external/bsd/ppp/dist/pppd/
eap.c 1675 char rhostname[256]; local
1737 strcpy(rhostname, SRP_PSEUDO_ID);
1738 len = read(fd, rhostname + SRP_PSEUDO_LEN,
1739 sizeof (rhostname) - SRP_PSEUDO_LEN);
1743 rhostname, len + SRP_PSEUDO_LEN);
1792 if (len - vallen >= sizeof (rhostname)) {
1794 BCOPY(inp + vallen, rhostname, sizeof (rhostname) - 1);
1795 rhostname[sizeof (rhostname) - 1] = '\0'
2335 char rhostname[256]; local
    [all...]
peap.c 285 char rhostname[MAXWORDLEN]; local
386 rhostname[0] = '\0';
388 if (in_len >= sizeof(rhostname)) {
390 in_len = sizeof(rhostname) - 1;
392 BCOPY(in_buf, rhostname, in_len);
393 rhostname[in_len] = '\0';
398 strlcpy(rhostname, remote_name, sizeof(rhostname));
402 rhostname, secret, &secret_len, 0)) {
422 dbglog("PEAP: no CHAP secret for auth to %q", rhostname);
    [all...]
upap.c 370 char rhostname[256]; local
439 slprintf(rhostname, sizeof(rhostname), "%.*v", ruserlen, ruser);
443 notice("PAP peer authentication succeeded for %q", rhostname);
447 warn("PAP peer authentication failed for %q", rhostname);

Completed in 34 milliseconds