• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /asus-wl-520gu-7.0.1.45/src/router/ppp/pppd/

Lines Matching defs:passwd

112 /* Set if we got the contents of passwd[] from the pap-secrets file. */
125 int (*pap_auth_hook) __P((char *user, char *passwd, char **msgp,
133 int (*pap_passwd_hook) __P((char *user, char *passwd)) = NULL;
153 bool uselogin = 0; /* Use /etc/passwd for checking PAP */
243 { "password", o_string, passwd,
316 if (override_value("passwd", option_priority, fname))
317 strlcpy(passwd, p, sizeof(passwd));
486 if (passwd[0] == 0) {
488 if (!get_pap_passwd(passwd))
491 upap_authwithpeer(unit, user, passwd);
639 BZERO(passwd, MAXSECRETLEN);
665 BZERO(passwd, MAXSECRETLEN);
878 ao->neg_upap = !refuse_pap && (passwd[0] != 0 || get_pap_passwd(NULL));
880 && (passwd[0] != 0
895 * check_passwd - Check the user name and passwd against the PAP secrets
917 char passwd[256], user[256];
926 slprintf(passwd, sizeof(passwd), "%.*v", passwdlen, apasswd);
934 ret = (*pap_auth_hook)(user, passwd, msg, &addrs, &opts);
938 BZERO(passwd, sizeof(passwd));
969 ret = plogin(user, passwd, msg);
977 if ((cryptpap || strcmp(passwd, secret) != 0)
978 && strcmp(crypt(passwd, secret), secret) != 0) {
992 * Frustrate passwd stealer programs.
1014 BZERO(passwd, sizeof(passwd));
1096 plogin(user, passwd, msg)
1098 char *passwd;
1117 PAM_password = passwd;
1151 struct passwd *pw = getpwnam(user);
1176 * If no passwd, don't let them login.
1179 || strcmp(crypt(passwd, pw->pw_passwd), pw->pw_passwd) != 0)
1194 if (pw != (struct passwd *)NULL) {
1288 * Assumes passwd points to MAXSECRETLEN bytes of space (if non-null).
1291 get_pap_passwd(passwd)
1292 char *passwd;
1303 ret = (*pap_passwd_hook)(user, passwd);
1319 if (passwd != NULL)
1320 strlcpy(passwd, secret, MAXSECRETLEN);
1428 if (!am_server && passwd[0] != 0) {
1429 strlcpy(secbuf, passwd, sizeof(secbuf));
1935 struct passwd *pw;