Searched refs:ruser (Results 1 - 3 of 3) sorted by relevance

/barrelfish-master/lib/libc/net/
H A Drcmd.c374 ruserok(const char *rhost, int superuser, const char *ruser, const char *luser) argument
387 if (iruserok_sa(r->ai_addr, r->ai_addrlen, superuser, ruser,
407 iruserok(unsigned long raddr, int superuser, const char *ruser, const char *luser) argument
416 ruser, luser);
425 iruserok_sa(const void *ra, int rlen, int superuser, const char *ruser, argument
448 if (__ivaliduser_sa(hostf, raddr, rlen, luser, ruser) == 0) {
506 __ivaliduser(FILE *hostf, u_int32_t raddr, const char *luser, const char *ruser) argument
515 luser, ruser);
525 const char *ruser, int af, int len)
560 return __ivaliduser_sa(hostf, sa, sa->sa_len, luser, ruser);
524 __ivaliduser_af(FILE *hostf, const void *raddr, const char *luser, const char *ruser, int af, int len) argument
564 __ivaliduser_sa(FILE *hostf, const struct sockaddr *raddr, socklen_t salen, const char *luser, const char *ruser) argument
[all...]
/barrelfish-master/lib/lwip2/src/netif/ppp/
H A Dupap.c361 char *ruser; local
397 ruser = (char *) inp;
411 if (auth_check_passwd(pcb, ruser, ruserlen, rpasswd, rpasswdlen, &msg, &msglen)) {
438 ppp_slprintf(rhostname, sizeof(rhostname), "%.*v", ruserlen, ruser);
443 auth_peer_success(pcb, PPP_PAP, 0, ruser, ruserlen);
/barrelfish-master/include/lwip2/netif/ppp/
H A Dupap.c361 char *ruser; local
397 ruser = (char *) inp;
411 if (auth_check_passwd(pcb, ruser, ruserlen, rpasswd, rpasswdlen, &msg, &msglen)) {
438 ppp_slprintf(rhostname, sizeof(rhostname), "%.*v", ruserlen, ruser);
443 auth_peer_success(pcb, PPP_PAP, 0, ruser, ruserlen);

Completed in 35 milliseconds