Home | History | Annotate | Download | only in pppd

Lines Matching refs:user

174 /* Hook for a plugin to check the PAP user and password */
175 int (*pap_auth_hook) __P((char *user, char *passwd, char **msgp,
179 /* Hook for a plugin to know about the PAP user logout */
183 int (*pap_passwd_hook) __P((char *user, char *passwd)) = NULL;
189 int (*chap_passwd_hook) __P((char *user, char *passwd)) = NULL;
238 bool explicit_remote = 0; /* User specified explicit remote name */
362 "Get PAP user and password from file",
365 { "user", o_string, user,
417 /* open user info file */
425 option_error("unable to open user login data file %s", fname);
435 option_error("unable to read user login data file %s", fname);
448 if (override_value("user", option_priority, fname))
449 strlcpy(user, u, sizeof(user));
757 eap_authwithpeer(unit, user);
760 chap_auth_with_peer(unit, user, CHAP_DIGEST(ho->chap_mdtype));
768 upap_authwithpeer(unit, user, passwd);
1196 /* Default our_name to hostname, and user to our_name */
1199 if (user[0] == 0)
1200 strlcpy(user, our_name, sizeof(user));
1204 * unless the noauth option was given or the real user is root.
1295 (hadchap = have_chap_secret(user, (explicit_remote? remote_name:
1299 (hadchap == 1 || (hadchap == -1 && have_chap_secret(user,
1301 have_srp_secret(user, (explicit_remote? remote_name: NULL), 0, NULL));
1322 * check_passwd - Check the user name and passwd against the PAP secrets
1324 * and login the user if OK.
1347 char passwd[256], user[256];
1357 slprintf(user, sizeof(user), "%.*v", userlen, auser);
1364 ret = (*pap_auth_hook)(user, passwd, msg, &addrs, &opts);
1381 * for authenticating this user.
1392 if (scan_authfile(f, user, our_name, secret, &addrs, &opts, filename, 0) < 0) {
1393 warn("no PAP secret found for %s", user);
1403 if ((ret = plogin(user, passwd, msg)) == UPAP_AUTHACK)
1426 warn("%d LOGIN FAILURES ON %s, %s", attempts, devnam, user);
1520 * plogin - Check the user name and password against the system
1521 * password database, and login the user if OK.
1530 plogin(user, passwd, msg)
1531 char *user;
1543 pam_error = pam_start ("ppp", user, &PAM_conversation, &pamh);
1553 PAM_username = user;
1559 * Validate the user
1588 struct passwd *pw = getpwnam(user);
1595 spwd = getspnam(user);
1605 warn("Password for %s has expired", user);
1622 * Write a wtmp entry for this user.
1628 logwtmp(tty, user, ifname); /* Add wtmp login entry */
1646 info("user %s logged in", user);
1654 * plogout - Logout the user.
1750 ret = (*pap_passwd_hook)(user, passwd);
1760 ret = scan_authfile(f, user,
2161 * the user hasn't given one, AND there is an authorized address
2526 * interface-name peer-name real-user tty speed