Lines Matching defs:user

146 /* Hook for a plugin to check the PAP user and password */
147 int (*pap_auth_hook) __P((char *user, char *passwd, char **msgp,
151 /* Hook for a plugin to know about the PAP user logout */
155 int (*pap_passwd_hook) __P((char *user, char *passwd)) = NULL;
260 { "user", o_string, user,
276 "Get PAP user and password from file" },
320 /* open user info file */
325 option_error("unable to open user login data file %s", *argv);
331 if (fgets(user, MAXNAMELEN - 1, ufile) == NULL
333 option_error("unable to read user login data file %s", *argv);
339 l = strlen(user);
340 if (l > 0 && user[l-1] == '\n')
341 user[l-1] = '\0';
589 ChapAuthWithPeer(unit, user, ho->chap_mdtype);
599 upap_authwithpeer(unit, user, passwd);
942 /* Default our_name to hostname, and user to our_name */
945 if (user[0] == '\0')
946 (void) strlcpy(user, our_name, sizeof(user));
950 * unless the noauth option was given or the real user is root.
1028 have_chap_secret(user, (explicit_remote? remote_name: NULL), 0, NULL);
1057 * check_passwd - Check the user name and passwd against the PAP secrets
1059 * and login the user if OK.
1079 char passwd[256], user[256];
1089 (void) slprintf(user, sizeof(user), "%.*v", userlen, auser);
1099 ret = (*pap_auth_hook)(user, passwd, msg, &addrs, &opts);
1112 * for authenticating this user.
1123 if (scan_authfile(f, user, our_name, secret, &addrs, &opts, filename) < 0) {
1124 warn("no PAP secret found for %s", user);
1134 warn("PAP authentication failure for %s", user);
1137 ret = plogin(user, passwd, msg);
1139 warn("PAP login failure for %s", user);
1156 warn("%d LOGIN FAILURES ON %s, %s", attempts, devnam, user);
1249 * plogin - Check the user name and password against the system
1250 * password database, and login the user if OK.
1259 plogin(user, passwd, msg)
1260 char *user;
1275 dbglog("using PAM for user authentication");
1276 pam_error = pam_start ("ppp", user, &PAM_conversation, &pamh);
1286 PAM_username = user;
1299 * Validate the user
1324 dbglog("using passwd/shadow for user authentication");
1326 dbglog("using passwd for user authentication");
1333 pw = getpwnam(user);
1340 spwd = getspnam(user);
1350 warn("Password for %s has expired", user);
1366 * Write a wtmp entry for this user.
1372 logwtmp(tty, user, remote_name); /* Add wtmp login entry */
1390 info("user %s logged in", user);
1397 * plogout - Logout the user.
1489 ret = (*pap_passwd_hook)(user, passwd);
1499 ret = scan_authfile(f, user,
1816 * the user hasn't given one, AND there is an authorized address
2021 * if open fails, we try as the regular user; just in case
2150 * interface-name peer-name real-user tty speed