• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /asus-wl-520gu-7.0.1.45/src/router/pppd/pppd/

Lines Matching defs:user

178 /* Hook for a plugin to check the PAP user and password */
179 int (*pap_auth_hook) __P((char *user, char *passwd, char **msgp,
183 /* Hook for a plugin to know about the PAP user logout */
187 int (*pap_passwd_hook) __P((char *user, char *passwd)) = NULL;
193 int (*chap_passwd_hook) __P((char *user, char *passwd)) = NULL;
367 "Get PAP user and password from file",
370 { "user", o_string, user,
422 /* open user info file */
430 option_error("unable to open user login data file %s", fname);
440 option_error("unable to read user login data file %s", fname);
453 if (override_value("user", option_priority, fname))
454 strlcpy(user, u, sizeof(user));
651 eap_authwithpeer(unit, user);
654 chap_auth_with_peer(unit, user, CHAP_DIGEST(ho->chap_mdtype));
662 upap_authwithpeer(unit, user, passwd);
1094 /* Default our_name to hostname, and user to our_name */
1097 if (user[0] == 0)
1098 strlcpy(user, our_name, sizeof(user));
1102 * unless the noauth option was given or the real user is root.
1191 (hadchap = have_chap_secret(user, (explicit_remote? remote_name:
1195 (hadchap == 1 || (hadchap == -1 && have_chap_secret(user,
1197 have_srp_secret(user, (explicit_remote? remote_name: NULL), 0, NULL));
1218 * check_passwd - Check the user name and passwd against the PAP secrets
1220 * and login the user if OK.
1240 char passwd[256], user[256];
1250 slprintf(user, sizeof(user), "%.*v", userlen, auser);
1257 ret = (*pap_auth_hook)(user, passwd, msg, &addrs, &opts);
1273 * for authenticating this user.
1284 if (scan_authfile(f, user, our_name, secret, &addrs, &opts, filename, 0) < 0) {
1285 warn("no PAP secret found for %s", user);
1295 if ((ret = plogin(user, passwd, msg)) == UPAP_AUTHACK)
1318 warn("%d LOGIN FAILURES ON %s, %s", attempts, devnam, user);
1411 * plogin - Check the user name and password against the system
1412 * password database, and login the user if OK.
1421 plogin(user, passwd, msg)
1422 char *user;
1431 pam_error = pam_start ("ppp", user, &PAM_conversation, &pamh);
1441 PAM_username = user;
1447 * Validate the user
1476 struct passwd *pw = getpwnam(user);
1483 spwd = getspnam(user);
1493 warn("Password for %s has expired", user);
1510 * Write a wtmp entry for this user.
1516 logwtmp(tty, user, ifname); /* Add wtmp login entry */
1534 info("user %s logged in", user);
1541 * plogout - Logout the user.
1637 ret = (*pap_passwd_hook)(user, passwd);
1647 ret = scan_authfile(f, user,
2048 * the user hasn't given one, AND there is an authorized address
2413 * interface-name peer-name real-user tty speed