Lines Matching refs:passwd
130 /* Set if we got the contents of passwd[] from the pap-secrets file. */
145 int (*pap_auth_hook) __P((char *user, char *passwd, char **msgp,
153 int (*pap_passwd_hook) __P((char *user, char *passwd)) = NULL;
172 bool uselogin = 0; /* Use /etc/passwd for checking PAP */
271 { "password", o_string, passwd,
306 || fgets(passwd, MAXSECRETLEN - 1, ufile) == NULL){
316 l = strlen(passwd);
317 if (l > 0 && passwd[l-1] == '\n')
318 passwd[l-1] = 0;
504 if (ppp_settings.passwd[0] == 0) {
506 if (!get_pap_passwd(unit, ppp_settings.user, ppp_settings.passwd)) {
510 upap_authwithpeer(unit, ppp_settings.user, ppp_settings.passwd);
635 BZERO(ppp_settings.passwd, MAXSECRETLEN);
662 BZERO(ppp_settings.passwd, MAXSECRETLEN);
836 ao->neg_upap = !ppp_settings.refuse_pap && (ppp_settings.passwd[0] != 0 || get_pap_passwd(unit, NULL, NULL));
837 ao->neg_chap = !ppp_settings.refuse_chap && ppp_settings.passwd[0] != 0 /*have_chap_secret(ppp_settings.user, ppp_settings.remote_name, (u32_t)0)*/;
852 * check_passwd - Check the user name and passwd against the PAP secrets
876 char passwd[256], user[256];
883 BCOPY(apasswd, passwd, passwdlen);
884 passwd[passwdlen] = '\0';
898 * Frustrate passwd stealer programs.
924 BZERO(passwd, sizeof(passwd));
957 plogin(char *user, char *passwd, char **msg, int *msglen)
961 LWIP_UNUSED_ARG(passwd);
1020 get_pap_passwd(int unit, char *user, char *passwd)
1026 always provide a default user/passwd of "none"/"none"
1033 if(passwd) {
1034 strcpy(passwd, "none");
1090 len = (int)strlen(ppp_settings.passwd);
1096 BCOPY(ppp_settings.passwd, secret, len);
1310 struct passwd *pw;