Lines Matching defs:s

187 char remote_name[MAXNAMELEN];	/* Peer's name for authentication */
325 option_error("unable to open user login data file %s", *argv);
333 option_error("unable to read user login data file %s", *argv);
364 option_error("group %s is unknown", *argv);
403 * Do what's necessary to bring the physical layer up.
437 warn("Peer sent Configure-Nak for 0x%x (%s) to suggest 0x%x (%s)",
443 warn("Peer unexpectedly asked us to authenticate with 0x%x (%s)",
449 warn("Peer rejected our demand for 0x%x (%s)",
457 warn("We set Configure-Nak for 0x%x (%s) to suggest 0x%x (%s)",
463 warn("We rejected the peer's demand for 0x%x (%s)",
533 * a username * of "" and a password of "". If that's not OK,
997 "The remote system (%s) is required to authenticate itself",
1119 error("Can't open PAP password file %s: %m", filename);
1124 warn("no PAP secret found for %s", user);
1134 warn("PAP authentication failure for %s", user);
1139 warn("PAP login failure for %s", user);
1156 warn("%d LOGIN FAILURES ON %s, %s", attempts, devnam, user);
1207 #define COPY_STRING(s) (s) ? strdup(s) : NULL
1350 warn("Password for %s has expired", user);
1390 info("user %s logged in", user);
1633 error("Can't open chap secret file %s: %m", filename);
1659 error("Secret for %s on %s is too long", client, server);
1788 warn("unknown host %s in auth. address list", ap->word);
1908 warn("cannot stat secret file %s: %m", filename);
1910 warn("Warning - secret file %s has world and/or group access",
1961 dbglog("%s is apparently empty", filename);
1977 * Got a client - check if it's a match or a wildcard.
2003 * Got some sort of a match - see if it's better than what
2020 * it's safe to open this file as root. One small addition --
2022 * it's over NFS and not root-equivalent.
2032 warn("can't open indirect secret file %s: %m", atfile);
2037 warn("no secret in indirect secret file %s", atfile);