Lines Matching refs:rhostname
1316 char rhostname[MAXNAMELEN]; in eap_request() local
1365 strcpy(rhostname, SRP_PSEUDO_ID); in eap_request()
1366 len = read(fd, rhostname + SRP_PSEUDO_LEN, in eap_request()
1367 sizeof (rhostname) - SRP_PSEUDO_LEN); in eap_request()
1371 rhostname, len + SRP_PSEUDO_LEN); in eap_request()
1420 if (vallen >= len + sizeof (rhostname)) { in eap_request()
1422 MEMCPY(rhostname, inp + vallen, sizeof (rhostname) - 1); in eap_request()
1423 rhostname[sizeof (rhostname) - 1] = '\0'; in eap_request()
1425 MEMCPY(rhostname, inp + vallen, len - vallen); in eap_request()
1426 rhostname[len - vallen] = '\0'; in eap_request()
1433 strlcpy(rhostname, pcb->settings.remote_name, sizeof (rhostname)); in eap_request()
1441 rhostname, secret, &secret_len, 0)) { in eap_request()
1442 ppp_dbglog("EAP: no MD5 secret for auth to %q", rhostname); in eap_request()
1500 MEMCPY(rhostname, inp, vallen); in eap_request()
1501 rhostname[vallen] = '\0'; in eap_request()
1511 strlcpy(rhostname, remote_name, in eap_request()
1512 sizeof (rhostname)); in eap_request()
1515 rhostnamelen = (int)strlen(rhostname); in eap_request()
1519 MEMCPY(pcb->eap.es_client.ea_peer, rhostname, rhostnamelen); in eap_request()
1730 char rhostname[MAXNAMELEN]; in eap_response() local
1848 if (vallen >= len + sizeof (rhostname)) { in eap_response()
1850 MEMCPY(rhostname, inp + vallen, sizeof (rhostname) - 1); in eap_response()
1851 rhostname[sizeof (rhostname) - 1] = '\0'; in eap_response()
1853 MEMCPY(rhostname, inp + vallen, len - vallen); in eap_response()
1854 rhostname[len - vallen] = '\0'; in eap_response()
1861 strlcpy(rhostname, remote_name, sizeof (rhostname)); in eap_response()
1868 if (!get_secret(pcb, rhostname, in eap_response()
1870 ppp_dbglog("EAP: no MD5 secret for auth of %q", rhostname); in eap_response()