• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /asus-wl-520gu-7.0.1.45/src/router/ppp/pppd/

Lines Matching defs:user

124 /* Hook for a plugin to check the PAP user and password */
125 int (*pap_auth_hook) __P((char *user, char *passwd, char **msgp,
129 /* Hook for a plugin to know about the PAP user logout */
133 int (*pap_passwd_hook) __P((char *user, char *passwd)) = NULL;
237 "Get PAP user and password from file",
240 { "user", o_string, user,
284 /* open user info file */
292 option_error("unable to open user login data file %s", fname);
301 option_error("unable to read user login data file %s", fname);
314 if (override_value("user", option_priority, fname))
315 strlcpy(user, u, sizeof(user));
483 ChapAuthWithPeer(unit, user, ho->chap_mdtype);
491 upap_authwithpeer(unit, user, passwd);
805 /* Default our_name to hostname, and user to our_name */
808 if (user[0] == 0)
809 strlcpy(user, our_name, sizeof(user));
813 * unless the noauth option was given or the real user is root.
881 || have_chap_secret(user, (explicit_remote? remote_name: NULL),
895 * check_passwd - Check the user name and passwd against the PAP secrets
897 * and login the user if OK.
917 char passwd[256], user[256];
927 slprintf(user, sizeof(user), "%.*v", userlen, auser);
934 ret = (*pap_auth_hook)(user, passwd, msg, &addrs, &opts);
947 * for authenticating this user.
958 if (scan_authfile(f, user, our_name, secret, &addrs, &opts, filename) < 0) {
959 warn("no PAP secret found for %s", user);
969 ret = plogin(user, passwd, msg);
971 warn("PAP login failure for %s", user);
980 warn("PAP authentication failure for %s", user);
997 warn("%d LOGIN FAILURES ON %s, %s", attempts, devnam, user);
1086 * plogin - Check the user name and password against the system
1087 * password database, and login the user if OK.
1096 plogin(user, passwd, msg)
1097 char *user;
1106 pam_error = pam_start ("ppp", user, &PAM_conversation, &pamh);
1116 PAM_username = user;
1122 * Validate the user
1151 struct passwd *pw = getpwnam(user);
1158 spwd = getspnam(user);
1168 warn("Password for %s has expired", user);
1185 * Write a wtmp entry for this user.
1191 logwtmp(tty, user, remote_name); /* Add wtmp login entry */
1209 info("user %s logged in", user);
1216 * plogout - Logout the user.
1303 ret = (*pap_passwd_hook)(user, passwd);
1313 ret = scan_authfile(f, user,
1609 * the user hasn't given one, AND there is an authorized address
1928 * interface-name peer-name real-user tty speed