Lines Matching refs:rhostname
429 char rhostname[MAXNAMELEN]; local
457 if (len >= sizeof(rhostname))
458 len = sizeof(rhostname) - 1;
460 BCOPY(inp, rhostname, len);
462 rhostname[len] = '\0';
467 rhostname, rchallenge_len);
476 (remote_name[0] != '\0' && rhostname[0] == '\0')) {
477 (void) strlcpy(rhostname, remote_name, sizeof(rhostname));
480 rhostname);
484 (void) strlcpy(cstate->peercname, rhostname,
486 } else if (strcmp(rhostname, cstate->peercname) != 0) {
489 cstate->peercname, rhostname);
490 (void) strlcpy(cstate->peercname, rhostname,
496 rhostname);
501 if (!get_secret(cstate->unit, cstate->resp_name, rhostname,
505 cstate->resp_name, rhostname);
568 char rhostname[MAXNAMELEN], *rhn; local
622 if (len >= sizeof(rhostname))
623 len = sizeof(rhostname) - 1;
624 BCOPY(inp, rhostname, len);
625 rhostname[len] = '\0';
632 rhn = (explicit_remote? remote_name: rhostname);
634 strcmp(rhostname, peer_authname) != 0) {
636 peer_authname, rhostname);
670 if (ChapMSv2Validate(cstate, rhostname, remmd, remmd_len,
688 auth_peer_success(cstate->unit, PPP_CHAP, rhostname, len);
693 notice("CHAP peer authentication succeeded for %q", rhostname);
695 dbglog("CHAP peer reauthentication succeeded for %q", rhostname);
699 rhostname);