Searched refs:ruser (Results 1 - 3 of 3) sorted by relevance
/barrelfish-master/lib/libc/net/ |
H A D | rcmd.c | 374 ruserok(const char *rhost, int superuser, const char *ruser, const char *luser) argument 387 if (iruserok_sa(r->ai_addr, r->ai_addrlen, superuser, ruser, 407 iruserok(unsigned long raddr, int superuser, const char *ruser, const char *luser) argument 416 ruser, luser); 425 iruserok_sa(const void *ra, int rlen, int superuser, const char *ruser, argument 448 if (__ivaliduser_sa(hostf, raddr, rlen, luser, ruser) == 0) { 506 __ivaliduser(FILE *hostf, u_int32_t raddr, const char *luser, const char *ruser) argument 515 luser, ruser); 525 const char *ruser, int af, int len) 560 return __ivaliduser_sa(hostf, sa, sa->sa_len, luser, ruser); 524 __ivaliduser_af(FILE *hostf, const void *raddr, const char *luser, const char *ruser, int af, int len) argument 564 __ivaliduser_sa(FILE *hostf, const struct sockaddr *raddr, socklen_t salen, const char *luser, const char *ruser) argument [all...] |
/barrelfish-master/lib/lwip2/src/netif/ppp/ |
H A D | upap.c | 361 char *ruser; local 397 ruser = (char *) inp; 411 if (auth_check_passwd(pcb, ruser, ruserlen, rpasswd, rpasswdlen, &msg, &msglen)) { 438 ppp_slprintf(rhostname, sizeof(rhostname), "%.*v", ruserlen, ruser); 443 auth_peer_success(pcb, PPP_PAP, 0, ruser, ruserlen);
|
/barrelfish-master/include/lwip2/netif/ppp/ |
H A D | upap.c | 361 char *ruser; local 397 ruser = (char *) inp; 411 if (auth_check_passwd(pcb, ruser, ruserlen, rpasswd, rpasswdlen, &msg, &msglen)) { 438 ppp_slprintf(rhostname, sizeof(rhostname), "%.*v", ruserlen, ruser); 443 auth_peer_success(pcb, PPP_PAP, 0, ruser, ruserlen);
|
Completed in 35 milliseconds