Searched refs:rhostname (Results 1 – 3 of 3) sorted by relevance
/third_party/ltp/testcases/kernel/containers/utsname/ |
D | utstest.c | 118 char hostname[HLEN], newhostname[HLEN], rhostname[HLEN]; in P1() local 131 zeroize(rhostname); in P1() 132 len = read(p1fd[0], rhostname, HLEN); in P1() 133 if (strcmp(hostname, rhostname) == 0) { in P1() 139 tsttype, hostname, rhostname); in P1() 150 zeroize(rhostname); in P1() 151 len = read(p1fd[0], rhostname, HLEN); in P1() 152 if (strcmp(newhostname, rhostname) == 0) { in P1() 158 tsttype, newhostname, rhostname); in P1() 170 zeroize(rhostname); in P1() [all …]
|
/third_party/lwip/src/netif/ppp/ |
D | eap.c | 1316 char rhostname[MAXNAMELEN]; in eap_request() local 1365 strcpy(rhostname, SRP_PSEUDO_ID); in eap_request() 1366 len = read(fd, rhostname + SRP_PSEUDO_LEN, in eap_request() 1367 sizeof (rhostname) - SRP_PSEUDO_LEN); in eap_request() 1371 rhostname, len + SRP_PSEUDO_LEN); in eap_request() 1420 if (vallen >= len + sizeof (rhostname)) { in eap_request() 1422 MEMCPY(rhostname, inp + vallen, sizeof (rhostname) - 1); in eap_request() 1423 rhostname[sizeof (rhostname) - 1] = '\0'; in eap_request() 1425 MEMCPY(rhostname, inp + vallen, len - vallen); in eap_request() 1426 rhostname[len - vallen] = '\0'; in eap_request() [all …]
|
D | upap.c | 363 char rhostname[256]; in upap_rauthreq() local 438 ppp_slprintf(rhostname, sizeof(rhostname), "%.*v", ruserlen, ruser); in upap_rauthreq() 442 ppp_notice("PAP peer authentication succeeded for %q", rhostname); in upap_rauthreq() 446 ppp_warn("PAP peer authentication failed for %q", rhostname); in upap_rauthreq()
|