Lines Matching defs:rhostname
439 char rhostname[MAXNAMELEN];
467 if (len >= sizeof(rhostname))
468 len = sizeof(rhostname) - 1;
470 BCOPY(inp, rhostname, len);
472 rhostname[len] = '\0';
477 rhostname, rchallenge_len);
486 (remote_name[0] != '\0' && rhostname[0] == '\0')) {
487 (void) strlcpy(rhostname, remote_name, sizeof(rhostname));
490 rhostname);
494 (void) strlcpy(cstate->peercname, rhostname,
496 } else if (strcmp(rhostname, cstate->peercname) != 0) {
499 cstate->peercname, rhostname);
500 (void) strlcpy(cstate->peercname, rhostname,
506 rhostname);
511 if (!get_secret(cstate->unit, cstate->resp_name, rhostname,
515 cstate->resp_name, rhostname);
578 char rhostname[MAXNAMELEN], *rhn;
632 if (len >= sizeof(rhostname))
633 len = sizeof(rhostname) - 1;
634 BCOPY(inp, rhostname, len);
635 rhostname[len] = '\0';
642 rhn = (explicit_remote? remote_name: rhostname);
644 strcmp(rhostname, peer_authname) != 0) {
646 peer_authname, rhostname);
680 if (ChapMSv2Validate(cstate, rhostname, remmd, remmd_len,
698 auth_peer_success(cstate->unit, PPP_CHAP, rhostname, len);
703 notice("CHAP peer authentication succeeded for %q", rhostname);
705 dbglog("CHAP peer reauthentication succeeded for %q", rhostname);
709 rhostname);