Searched refs:rhostname (Results 1 - 3 of 3) sorted by relevance
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/ppp/pppd/ |
H A D | chap.c | 409 char rhostname[256];
local 433 if (len >= sizeof(rhostname))
434 len = sizeof(rhostname) - 1;
435 BCOPY(inp, rhostname, len);
436 rhostname[len] = '\000';
439 if (explicit_remote || (remote_name[0] != 0 && rhostname[0] == 0)) {
440 strlcpy(rhostname, remote_name, sizeof(rhostname));
442 rhostname));
446 if (!get_secret(cstate->unit, cstate->resp_name, rhostname,
501 char rhostname[256]; local [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/ppp-2.4.4/pppd/ |
H A D | eap.c | 1320 char rhostname[256]; local 1369 strcpy(rhostname, SRP_PSEUDO_ID); 1370 len = read(fd, rhostname + SRP_PSEUDO_LEN, 1371 sizeof (rhostname) - SRP_PSEUDO_LEN); 1375 rhostname, len + SRP_PSEUDO_LEN); 1424 if (vallen >= len + sizeof (rhostname)) { 1426 BCOPY(inp + vallen, rhostname, sizeof (rhostname) - 1); 1427 rhostname[sizeof (rhostname) 1730 char rhostname[256]; local [all...] |
H A D | upap.c | 379 char rhostname[256]; local 448 slprintf(rhostname, sizeof(rhostname), "%.*v", ruserlen, ruser); 452 notice("PAP peer authentication succeeded for %q", rhostname); 456 warn("PAP peer authentication failed for %q", rhostname);
|
Completed in 170 milliseconds