Searched refs:rhostname (Results 1 - 3 of 3) sorted by relevance

/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/ppp/pppd/
H A Dchap.c409 char rhostname[256]; local
433 if (len >= sizeof(rhostname))
434 len = sizeof(rhostname) - 1;
435 BCOPY(inp, rhostname, len);
436 rhostname[len] = '\000';
439 if (explicit_remote || (remote_name[0] != 0 && rhostname[0] == 0)) {
440 strlcpy(rhostname, remote_name, sizeof(rhostname));
442 rhostname));
446 if (!get_secret(cstate->unit, cstate->resp_name, rhostname,
501 char rhostname[256]; local
[all...]
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/ppp-2.4.4/pppd/
H A Deap.c1320 char rhostname[256]; local
1369 strcpy(rhostname, SRP_PSEUDO_ID);
1370 len = read(fd, rhostname + SRP_PSEUDO_LEN,
1371 sizeof (rhostname) - SRP_PSEUDO_LEN);
1375 rhostname, len + SRP_PSEUDO_LEN);
1424 if (vallen >= len + sizeof (rhostname)) {
1426 BCOPY(inp + vallen, rhostname, sizeof (rhostname) - 1);
1427 rhostname[sizeof (rhostname)
1730 char rhostname[256]; local
[all...]
H A Dupap.c379 char rhostname[256]; local
448 slprintf(rhostname, sizeof(rhostname), "%.*v", ruserlen, ruser);
452 notice("PAP peer authentication succeeded for %q", rhostname);
456 warn("PAP peer authentication failed for %q", rhostname);

Completed in 170 milliseconds