Lines Matching defs:user

70 static int radius_pap_auth(char *user,
75 static int radius_chap_verify(char *user, char *ourname, int id,
83 static void make_username_realm(char *user);
115 char user[MAXNAMELEN];
124 VALUE_PAIR *avp; /* Additional (user supplied) vp's to send to server */
131 void (*radius_pre_auth_hook)(char const *user,
231 * user -- user-name of peer
242 radius_pap_auth(char *user,
260 /* Put user with potentially realm added in rstate.user */
261 make_username_realm(user);
264 radius_pre_auth_hook(rstate.user,
282 rc_avpair_add(&send, PW_USER_NAME, rstate.user , 0, VENDOR_NONE);
290 /* Add user specified vp's */
318 * user -- name of the peer
332 radius_chap_verify(char *user, char *ourname, int id,
371 /* Put user with potentially realm added in rstate.user */
373 make_username_realm(user);
376 radius_pre_auth_hook(rstate.user,
390 rc_avpair_add (&send, PW_USER_NAME, rstate.user , 0, VENDOR_NONE);
466 /* Add user specified vp's */
503 * user -- the user given to pppd
507 * Copies user into rstate.user. If it lacks a realm (no "@domain" part),
511 make_username_realm(char *user)
515 if ( user != NULL ) {
516 strlcpy(rstate.user, user, sizeof(rstate.user));
518 rstate.user[0] = 0;
523 if (!strchr(rstate.user, '@') &&
526 strlcat(rstate.user, "@", sizeof(rstate.user));
527 strlcat(rstate.user, default_realm, sizeof(rstate.user));
572 vp->lvalue, rstate.user);
582 vp->lvalue, rstate.user);
615 /* 0xffffffff means user should be allowed to select one */
622 remote, rstate.user);
869 rstate.user, 0, VENDOR_NONE);
901 /* Add user specified vp's */
917 "Accounting START failed for %s", rstate.user);
957 rc_avpair_add(&send, PW_USER_NAME, rstate.user, 0, VENDOR_NONE);
1049 /* Add user specified vp's */
1063 "Accounting STOP failed for %s", rstate.user);
1097 rc_avpair_add(&send, PW_USER_NAME, rstate.user, 0, VENDOR_NONE);
1146 /* Add user specified vp's */
1160 "Interim accounting failed for %s", rstate.user);
1305 return rstate.user;