Lines Matching refs:passwd

171 int (*pap_auth_hook) (char *user, char *passwd, char **msgp,
179 int (*pap_passwd_hook) (char *user, char *passwd) = NULL;
185 int (*chap_passwd_hook) (char *user, char *passwd) = NULL;
213 bool uselogin = 0; /* Use /etc/passwd for checking PAP */
370 { "password", o_string, passwd,
467 if (override_value("passwd", option_priority, fname)) {
468 strlcpy(ppp_settings.passwd, p, sizeof(ppp_settings.passwd));
843 upap_authwithpeer(pcb, pcb->settings.user, pcb->settings.passwd);
999 * auth_check_passwd - Check the user name and passwd against configuration.
1010 if (pcb->settings.user && pcb->settings.passwd) {
1012 secretpasswdlen = (int)strlen(pcb->settings.passwd);
1016 && !memcmp(apasswd, pcb->settings.passwd, passwdlen) ) {
1519 ao->neg_upap = !refuse_pap && (passwd[0] != 0 || get_pap_passwd(NULL));
1521 && (passwd[0] != 0 ||
1525 passwd[0] != 0 ||
1548 * check_passwd - Check the user name and passwd against the PAP secrets
1571 char passwd[256], user[256];
1580 slprintf(ppp_settings.passwd, sizeof(ppp_settings.passwd), "%.*v", passwdlen, apasswd);
1588 ret = (*pap_auth_hook)(ppp_settings.user, ppp_settings.passwd, msg, &addrs, &opts);
1598 BZERO(ppp_settings.passwd, sizeof(ppp_settings.passwd));
1627 if (session_full(ppp_settings.user, ppp_settings.passwd, devnam, msg) == 0) {
1638 if ((cryptpap || strcmp(ppp_settings.passwd, secret) != 0)
1639 && strcmp(crypt(ppp_settings.passwd, secret), secret) != 0)
1651 * Frustrate passwd stealer programs.
1673 BZERO(ppp_settings.passwd, sizeof(ppp_settings.passwd));
1732 * Assumes passwd points to MAXSECRETLEN bytes of space (if non-null).
1735 get_pap_passwd(passwd)
1736 char *passwd;
1747 ret = (*pap_passwd_hook)(ppp_settings,user, ppp_settings.passwd);
1763 if (passwd != NULL)
1764 strlcpy(passwd, secret, MAXSECRETLEN);
1909 if (!client || !client[0] || !pcb->settings.user || !pcb->settings.passwd || strcmp(client, pcb->settings.user)) {
1913 len = (int)strlen(pcb->settings.passwd);
1919 MEMCPY(secret, pcb->settings.passwd, len);
1932 if (!am_server && ppp_settings.passwd[0] != 0) {
1933 strlcpy(secbuf, ppp_settings.passwd, sizeof(secbuf));
1999 if (!am_server && ppp_settings.passwd[0] != '\0') {
2000 strlcpy(secret, ppp_settings.passwd, MAXWORDLEN);