Ethernetwebsoc

Dependencies:   C12832_lcd LM75B WebSocketClient mbed-rtos mbed Socket lwip-eth lwip-sys lwip

Committer:
GordonSin
Date:
Fri May 31 04:09:54 2013 +0000
Revision:
0:0ed2a7c7190c
31/5/2013;

Who changed what in which revision?

UserRevisionLine numberNew contents of line
GordonSin 0:0ed2a7c7190c 1 /*** WARNING - THIS HAS NEVER BEEN FINISHED ***/
GordonSin 0:0ed2a7c7190c 2 /*****************************************************************************
GordonSin 0:0ed2a7c7190c 3 * chap.c - Network Challenge Handshake Authentication Protocol program file.
GordonSin 0:0ed2a7c7190c 4 *
GordonSin 0:0ed2a7c7190c 5 * Copyright (c) 2003 by Marc Boucher, Services Informatiques (MBSI) inc.
GordonSin 0:0ed2a7c7190c 6 * portions Copyright (c) 1997 by Global Election Systems Inc.
GordonSin 0:0ed2a7c7190c 7 *
GordonSin 0:0ed2a7c7190c 8 * The authors hereby grant permission to use, copy, modify, distribute,
GordonSin 0:0ed2a7c7190c 9 * and license this software and its documentation for any purpose, provided
GordonSin 0:0ed2a7c7190c 10 * that existing copyright notices are retained in all copies and that this
GordonSin 0:0ed2a7c7190c 11 * notice and the following disclaimer are included verbatim in any
GordonSin 0:0ed2a7c7190c 12 * distributions. No written agreement, license, or royalty fee is required
GordonSin 0:0ed2a7c7190c 13 * for any of the authorized uses.
GordonSin 0:0ed2a7c7190c 14 *
GordonSin 0:0ed2a7c7190c 15 * THIS SOFTWARE IS PROVIDED BY THE CONTRIBUTORS *AS IS* AND ANY EXPRESS OR
GordonSin 0:0ed2a7c7190c 16 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
GordonSin 0:0ed2a7c7190c 17 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
GordonSin 0:0ed2a7c7190c 18 * IN NO EVENT SHALL THE CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
GordonSin 0:0ed2a7c7190c 19 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
GordonSin 0:0ed2a7c7190c 20 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
GordonSin 0:0ed2a7c7190c 21 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
GordonSin 0:0ed2a7c7190c 22 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
GordonSin 0:0ed2a7c7190c 23 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
GordonSin 0:0ed2a7c7190c 24 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
GordonSin 0:0ed2a7c7190c 25 *
GordonSin 0:0ed2a7c7190c 26 ******************************************************************************
GordonSin 0:0ed2a7c7190c 27 * REVISION HISTORY
GordonSin 0:0ed2a7c7190c 28 *
GordonSin 0:0ed2a7c7190c 29 * 03-01-01 Marc Boucher <marc@mbsi.ca>
GordonSin 0:0ed2a7c7190c 30 * Ported to lwIP.
GordonSin 0:0ed2a7c7190c 31 * 97-12-04 Guy Lancaster <lancasterg@acm.org>, Global Election Systems Inc.
GordonSin 0:0ed2a7c7190c 32 * Original based on BSD chap.c.
GordonSin 0:0ed2a7c7190c 33 *****************************************************************************/
GordonSin 0:0ed2a7c7190c 34 /*
GordonSin 0:0ed2a7c7190c 35 * chap.c - Challenge Handshake Authentication Protocol.
GordonSin 0:0ed2a7c7190c 36 *
GordonSin 0:0ed2a7c7190c 37 * Copyright (c) 1993 The Australian National University.
GordonSin 0:0ed2a7c7190c 38 * All rights reserved.
GordonSin 0:0ed2a7c7190c 39 *
GordonSin 0:0ed2a7c7190c 40 * Redistribution and use in source and binary forms are permitted
GordonSin 0:0ed2a7c7190c 41 * provided that the above copyright notice and this paragraph are
GordonSin 0:0ed2a7c7190c 42 * duplicated in all such forms and that any documentation,
GordonSin 0:0ed2a7c7190c 43 * advertising materials, and other materials related to such
GordonSin 0:0ed2a7c7190c 44 * distribution and use acknowledge that the software was developed
GordonSin 0:0ed2a7c7190c 45 * by the Australian National University. The name of the University
GordonSin 0:0ed2a7c7190c 46 * may not be used to endorse or promote products derived from this
GordonSin 0:0ed2a7c7190c 47 * software without specific prior written permission.
GordonSin 0:0ed2a7c7190c 48 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
GordonSin 0:0ed2a7c7190c 49 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
GordonSin 0:0ed2a7c7190c 50 * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
GordonSin 0:0ed2a7c7190c 51 *
GordonSin 0:0ed2a7c7190c 52 * Copyright (c) 1991 Gregory M. Christy.
GordonSin 0:0ed2a7c7190c 53 * All rights reserved.
GordonSin 0:0ed2a7c7190c 54 *
GordonSin 0:0ed2a7c7190c 55 * Redistribution and use in source and binary forms are permitted
GordonSin 0:0ed2a7c7190c 56 * provided that the above copyright notice and this paragraph are
GordonSin 0:0ed2a7c7190c 57 * duplicated in all such forms and that any documentation,
GordonSin 0:0ed2a7c7190c 58 * advertising materials, and other materials related to such
GordonSin 0:0ed2a7c7190c 59 * distribution and use acknowledge that the software was developed
GordonSin 0:0ed2a7c7190c 60 * by Gregory M. Christy. The name of the author may not be used to
GordonSin 0:0ed2a7c7190c 61 * endorse or promote products derived from this software without
GordonSin 0:0ed2a7c7190c 62 * specific prior written permission.
GordonSin 0:0ed2a7c7190c 63 *
GordonSin 0:0ed2a7c7190c 64 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
GordonSin 0:0ed2a7c7190c 65 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
GordonSin 0:0ed2a7c7190c 66 * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
GordonSin 0:0ed2a7c7190c 67 */
GordonSin 0:0ed2a7c7190c 68
GordonSin 0:0ed2a7c7190c 69 #include "lwip/opt.h"
GordonSin 0:0ed2a7c7190c 70
GordonSin 0:0ed2a7c7190c 71 #if PPP_SUPPORT /* don't build if not configured for use in lwipopts.h */
GordonSin 0:0ed2a7c7190c 72
GordonSin 0:0ed2a7c7190c 73 #if CHAP_SUPPORT /* don't build if not configured for use in lwipopts.h */
GordonSin 0:0ed2a7c7190c 74
GordonSin 0:0ed2a7c7190c 75 #include "ppp.h"
GordonSin 0:0ed2a7c7190c 76 #include "pppdebug.h"
GordonSin 0:0ed2a7c7190c 77
GordonSin 0:0ed2a7c7190c 78 #include "magic.h"
GordonSin 0:0ed2a7c7190c 79 #include "randm.h"
GordonSin 0:0ed2a7c7190c 80 #include "auth.h"
GordonSin 0:0ed2a7c7190c 81 #include "md5.h"
GordonSin 0:0ed2a7c7190c 82 #include "chap.h"
GordonSin 0:0ed2a7c7190c 83 #include "chpms.h"
GordonSin 0:0ed2a7c7190c 84
GordonSin 0:0ed2a7c7190c 85 #include <string.h>
GordonSin 0:0ed2a7c7190c 86
GordonSin 0:0ed2a7c7190c 87 #if 0 /* UNUSED */
GordonSin 0:0ed2a7c7190c 88 /*
GordonSin 0:0ed2a7c7190c 89 * Command-line options.
GordonSin 0:0ed2a7c7190c 90 */
GordonSin 0:0ed2a7c7190c 91 static option_t chap_option_list[] = {
GordonSin 0:0ed2a7c7190c 92 { "chap-restart", o_int, &chap[0].timeouttime,
GordonSin 0:0ed2a7c7190c 93 "Set timeout for CHAP" },
GordonSin 0:0ed2a7c7190c 94 { "chap-max-challenge", o_int, &chap[0].max_transmits,
GordonSin 0:0ed2a7c7190c 95 "Set max #xmits for challenge" },
GordonSin 0:0ed2a7c7190c 96 { "chap-interval", o_int, &chap[0].chal_interval,
GordonSin 0:0ed2a7c7190c 97 "Set interval for rechallenge" },
GordonSin 0:0ed2a7c7190c 98 #ifdef MSLANMAN
GordonSin 0:0ed2a7c7190c 99 { "ms-lanman", o_bool, &ms_lanman,
GordonSin 0:0ed2a7c7190c 100 "Use LanMan passwd when using MS-CHAP", 1 },
GordonSin 0:0ed2a7c7190c 101 #endif
GordonSin 0:0ed2a7c7190c 102 { NULL }
GordonSin 0:0ed2a7c7190c 103 };
GordonSin 0:0ed2a7c7190c 104 #endif /* UNUSED */
GordonSin 0:0ed2a7c7190c 105
GordonSin 0:0ed2a7c7190c 106 /*
GordonSin 0:0ed2a7c7190c 107 * Protocol entry points.
GordonSin 0:0ed2a7c7190c 108 */
GordonSin 0:0ed2a7c7190c 109 static void ChapInit (int);
GordonSin 0:0ed2a7c7190c 110 static void ChapLowerUp (int);
GordonSin 0:0ed2a7c7190c 111 static void ChapLowerDown (int);
GordonSin 0:0ed2a7c7190c 112 static void ChapInput (int, u_char *, int);
GordonSin 0:0ed2a7c7190c 113 static void ChapProtocolReject (int);
GordonSin 0:0ed2a7c7190c 114 #if PPP_ADDITIONAL_CALLBACKS
GordonSin 0:0ed2a7c7190c 115 static int ChapPrintPkt (u_char *, int, void (*) (void *, char *, ...), void *);
GordonSin 0:0ed2a7c7190c 116 #endif
GordonSin 0:0ed2a7c7190c 117
GordonSin 0:0ed2a7c7190c 118 struct protent chap_protent = {
GordonSin 0:0ed2a7c7190c 119 PPP_CHAP,
GordonSin 0:0ed2a7c7190c 120 ChapInit,
GordonSin 0:0ed2a7c7190c 121 ChapInput,
GordonSin 0:0ed2a7c7190c 122 ChapProtocolReject,
GordonSin 0:0ed2a7c7190c 123 ChapLowerUp,
GordonSin 0:0ed2a7c7190c 124 ChapLowerDown,
GordonSin 0:0ed2a7c7190c 125 NULL,
GordonSin 0:0ed2a7c7190c 126 NULL,
GordonSin 0:0ed2a7c7190c 127 #if PPP_ADDITIONAL_CALLBACKS
GordonSin 0:0ed2a7c7190c 128 ChapPrintPkt,
GordonSin 0:0ed2a7c7190c 129 NULL,
GordonSin 0:0ed2a7c7190c 130 #endif /* PPP_ADDITIONAL_CALLBACKS */
GordonSin 0:0ed2a7c7190c 131 1,
GordonSin 0:0ed2a7c7190c 132 "CHAP",
GordonSin 0:0ed2a7c7190c 133 #if PPP_ADDITIONAL_CALLBACKS
GordonSin 0:0ed2a7c7190c 134 NULL,
GordonSin 0:0ed2a7c7190c 135 NULL,
GordonSin 0:0ed2a7c7190c 136 NULL
GordonSin 0:0ed2a7c7190c 137 #endif /* PPP_ADDITIONAL_CALLBACKS */
GordonSin 0:0ed2a7c7190c 138 };
GordonSin 0:0ed2a7c7190c 139
GordonSin 0:0ed2a7c7190c 140 chap_state chap[NUM_PPP]; /* CHAP state; one for each unit */
GordonSin 0:0ed2a7c7190c 141
GordonSin 0:0ed2a7c7190c 142 static void ChapChallengeTimeout (void *);
GordonSin 0:0ed2a7c7190c 143 static void ChapResponseTimeout (void *);
GordonSin 0:0ed2a7c7190c 144 static void ChapReceiveChallenge (chap_state *, u_char *, u_char, int);
GordonSin 0:0ed2a7c7190c 145 static void ChapRechallenge (void *);
GordonSin 0:0ed2a7c7190c 146 static void ChapReceiveResponse (chap_state *, u_char *, int, int);
GordonSin 0:0ed2a7c7190c 147 static void ChapReceiveSuccess(chap_state *cstate, u_char *inp, u_char id, int len);
GordonSin 0:0ed2a7c7190c 148 static void ChapReceiveFailure(chap_state *cstate, u_char *inp, u_char id, int len);
GordonSin 0:0ed2a7c7190c 149 static void ChapSendStatus (chap_state *, int);
GordonSin 0:0ed2a7c7190c 150 static void ChapSendChallenge (chap_state *);
GordonSin 0:0ed2a7c7190c 151 static void ChapSendResponse (chap_state *);
GordonSin 0:0ed2a7c7190c 152 static void ChapGenChallenge (chap_state *);
GordonSin 0:0ed2a7c7190c 153
GordonSin 0:0ed2a7c7190c 154 /*
GordonSin 0:0ed2a7c7190c 155 * ChapInit - Initialize a CHAP unit.
GordonSin 0:0ed2a7c7190c 156 */
GordonSin 0:0ed2a7c7190c 157 static void
GordonSin 0:0ed2a7c7190c 158 ChapInit(int unit)
GordonSin 0:0ed2a7c7190c 159 {
GordonSin 0:0ed2a7c7190c 160 chap_state *cstate = &chap[unit];
GordonSin 0:0ed2a7c7190c 161
GordonSin 0:0ed2a7c7190c 162 BZERO(cstate, sizeof(*cstate));
GordonSin 0:0ed2a7c7190c 163 cstate->unit = unit;
GordonSin 0:0ed2a7c7190c 164 cstate->clientstate = CHAPCS_INITIAL;
GordonSin 0:0ed2a7c7190c 165 cstate->serverstate = CHAPSS_INITIAL;
GordonSin 0:0ed2a7c7190c 166 cstate->timeouttime = CHAP_DEFTIMEOUT;
GordonSin 0:0ed2a7c7190c 167 cstate->max_transmits = CHAP_DEFTRANSMITS;
GordonSin 0:0ed2a7c7190c 168 /* random number generator is initialized in magic_init */
GordonSin 0:0ed2a7c7190c 169 }
GordonSin 0:0ed2a7c7190c 170
GordonSin 0:0ed2a7c7190c 171
GordonSin 0:0ed2a7c7190c 172 /*
GordonSin 0:0ed2a7c7190c 173 * ChapAuthWithPeer - Authenticate us with our peer (start client).
GordonSin 0:0ed2a7c7190c 174 *
GordonSin 0:0ed2a7c7190c 175 */
GordonSin 0:0ed2a7c7190c 176 void
GordonSin 0:0ed2a7c7190c 177 ChapAuthWithPeer(int unit, char *our_name, u_char digest)
GordonSin 0:0ed2a7c7190c 178 {
GordonSin 0:0ed2a7c7190c 179 chap_state *cstate = &chap[unit];
GordonSin 0:0ed2a7c7190c 180
GordonSin 0:0ed2a7c7190c 181 cstate->resp_name = our_name;
GordonSin 0:0ed2a7c7190c 182 cstate->resp_type = digest;
GordonSin 0:0ed2a7c7190c 183
GordonSin 0:0ed2a7c7190c 184 if (cstate->clientstate == CHAPCS_INITIAL ||
GordonSin 0:0ed2a7c7190c 185 cstate->clientstate == CHAPCS_PENDING) {
GordonSin 0:0ed2a7c7190c 186 /* lower layer isn't up - wait until later */
GordonSin 0:0ed2a7c7190c 187 cstate->clientstate = CHAPCS_PENDING;
GordonSin 0:0ed2a7c7190c 188 return;
GordonSin 0:0ed2a7c7190c 189 }
GordonSin 0:0ed2a7c7190c 190
GordonSin 0:0ed2a7c7190c 191 /*
GordonSin 0:0ed2a7c7190c 192 * We get here as a result of LCP coming up.
GordonSin 0:0ed2a7c7190c 193 * So even if CHAP was open before, we will
GordonSin 0:0ed2a7c7190c 194 * have to re-authenticate ourselves.
GordonSin 0:0ed2a7c7190c 195 */
GordonSin 0:0ed2a7c7190c 196 cstate->clientstate = CHAPCS_LISTEN;
GordonSin 0:0ed2a7c7190c 197 }
GordonSin 0:0ed2a7c7190c 198
GordonSin 0:0ed2a7c7190c 199
GordonSin 0:0ed2a7c7190c 200 /*
GordonSin 0:0ed2a7c7190c 201 * ChapAuthPeer - Authenticate our peer (start server).
GordonSin 0:0ed2a7c7190c 202 */
GordonSin 0:0ed2a7c7190c 203 void
GordonSin 0:0ed2a7c7190c 204 ChapAuthPeer(int unit, char *our_name, u_char digest)
GordonSin 0:0ed2a7c7190c 205 {
GordonSin 0:0ed2a7c7190c 206 chap_state *cstate = &chap[unit];
GordonSin 0:0ed2a7c7190c 207
GordonSin 0:0ed2a7c7190c 208 cstate->chal_name = our_name;
GordonSin 0:0ed2a7c7190c 209 cstate->chal_type = digest;
GordonSin 0:0ed2a7c7190c 210
GordonSin 0:0ed2a7c7190c 211 if (cstate->serverstate == CHAPSS_INITIAL ||
GordonSin 0:0ed2a7c7190c 212 cstate->serverstate == CHAPSS_PENDING) {
GordonSin 0:0ed2a7c7190c 213 /* lower layer isn't up - wait until later */
GordonSin 0:0ed2a7c7190c 214 cstate->serverstate = CHAPSS_PENDING;
GordonSin 0:0ed2a7c7190c 215 return;
GordonSin 0:0ed2a7c7190c 216 }
GordonSin 0:0ed2a7c7190c 217
GordonSin 0:0ed2a7c7190c 218 ChapGenChallenge(cstate);
GordonSin 0:0ed2a7c7190c 219 ChapSendChallenge(cstate); /* crank it up dude! */
GordonSin 0:0ed2a7c7190c 220 cstate->serverstate = CHAPSS_INITIAL_CHAL;
GordonSin 0:0ed2a7c7190c 221 }
GordonSin 0:0ed2a7c7190c 222
GordonSin 0:0ed2a7c7190c 223
GordonSin 0:0ed2a7c7190c 224 /*
GordonSin 0:0ed2a7c7190c 225 * ChapChallengeTimeout - Timeout expired on sending challenge.
GordonSin 0:0ed2a7c7190c 226 */
GordonSin 0:0ed2a7c7190c 227 static void
GordonSin 0:0ed2a7c7190c 228 ChapChallengeTimeout(void *arg)
GordonSin 0:0ed2a7c7190c 229 {
GordonSin 0:0ed2a7c7190c 230 chap_state *cstate = (chap_state *) arg;
GordonSin 0:0ed2a7c7190c 231
GordonSin 0:0ed2a7c7190c 232 /* if we aren't sending challenges, don't worry. then again we */
GordonSin 0:0ed2a7c7190c 233 /* probably shouldn't be here either */
GordonSin 0:0ed2a7c7190c 234 if (cstate->serverstate != CHAPSS_INITIAL_CHAL &&
GordonSin 0:0ed2a7c7190c 235 cstate->serverstate != CHAPSS_RECHALLENGE) {
GordonSin 0:0ed2a7c7190c 236 return;
GordonSin 0:0ed2a7c7190c 237 }
GordonSin 0:0ed2a7c7190c 238
GordonSin 0:0ed2a7c7190c 239 if (cstate->chal_transmits >= cstate->max_transmits) {
GordonSin 0:0ed2a7c7190c 240 /* give up on peer */
GordonSin 0:0ed2a7c7190c 241 CHAPDEBUG(LOG_ERR, ("Peer failed to respond to CHAP challenge\n"));
GordonSin 0:0ed2a7c7190c 242 cstate->serverstate = CHAPSS_BADAUTH;
GordonSin 0:0ed2a7c7190c 243 auth_peer_fail(cstate->unit, PPP_CHAP);
GordonSin 0:0ed2a7c7190c 244 return;
GordonSin 0:0ed2a7c7190c 245 }
GordonSin 0:0ed2a7c7190c 246
GordonSin 0:0ed2a7c7190c 247 ChapSendChallenge(cstate); /* Re-send challenge */
GordonSin 0:0ed2a7c7190c 248 }
GordonSin 0:0ed2a7c7190c 249
GordonSin 0:0ed2a7c7190c 250
GordonSin 0:0ed2a7c7190c 251 /*
GordonSin 0:0ed2a7c7190c 252 * ChapResponseTimeout - Timeout expired on sending response.
GordonSin 0:0ed2a7c7190c 253 */
GordonSin 0:0ed2a7c7190c 254 static void
GordonSin 0:0ed2a7c7190c 255 ChapResponseTimeout(void *arg)
GordonSin 0:0ed2a7c7190c 256 {
GordonSin 0:0ed2a7c7190c 257 chap_state *cstate = (chap_state *) arg;
GordonSin 0:0ed2a7c7190c 258
GordonSin 0:0ed2a7c7190c 259 /* if we aren't sending a response, don't worry. */
GordonSin 0:0ed2a7c7190c 260 if (cstate->clientstate != CHAPCS_RESPONSE) {
GordonSin 0:0ed2a7c7190c 261 return;
GordonSin 0:0ed2a7c7190c 262 }
GordonSin 0:0ed2a7c7190c 263
GordonSin 0:0ed2a7c7190c 264 ChapSendResponse(cstate); /* re-send response */
GordonSin 0:0ed2a7c7190c 265 }
GordonSin 0:0ed2a7c7190c 266
GordonSin 0:0ed2a7c7190c 267
GordonSin 0:0ed2a7c7190c 268 /*
GordonSin 0:0ed2a7c7190c 269 * ChapRechallenge - Time to challenge the peer again.
GordonSin 0:0ed2a7c7190c 270 */
GordonSin 0:0ed2a7c7190c 271 static void
GordonSin 0:0ed2a7c7190c 272 ChapRechallenge(void *arg)
GordonSin 0:0ed2a7c7190c 273 {
GordonSin 0:0ed2a7c7190c 274 chap_state *cstate = (chap_state *) arg;
GordonSin 0:0ed2a7c7190c 275
GordonSin 0:0ed2a7c7190c 276 /* if we aren't sending a response, don't worry. */
GordonSin 0:0ed2a7c7190c 277 if (cstate->serverstate != CHAPSS_OPEN) {
GordonSin 0:0ed2a7c7190c 278 return;
GordonSin 0:0ed2a7c7190c 279 }
GordonSin 0:0ed2a7c7190c 280
GordonSin 0:0ed2a7c7190c 281 ChapGenChallenge(cstate);
GordonSin 0:0ed2a7c7190c 282 ChapSendChallenge(cstate);
GordonSin 0:0ed2a7c7190c 283 cstate->serverstate = CHAPSS_RECHALLENGE;
GordonSin 0:0ed2a7c7190c 284 }
GordonSin 0:0ed2a7c7190c 285
GordonSin 0:0ed2a7c7190c 286
GordonSin 0:0ed2a7c7190c 287 /*
GordonSin 0:0ed2a7c7190c 288 * ChapLowerUp - The lower layer is up.
GordonSin 0:0ed2a7c7190c 289 *
GordonSin 0:0ed2a7c7190c 290 * Start up if we have pending requests.
GordonSin 0:0ed2a7c7190c 291 */
GordonSin 0:0ed2a7c7190c 292 static void
GordonSin 0:0ed2a7c7190c 293 ChapLowerUp(int unit)
GordonSin 0:0ed2a7c7190c 294 {
GordonSin 0:0ed2a7c7190c 295 chap_state *cstate = &chap[unit];
GordonSin 0:0ed2a7c7190c 296
GordonSin 0:0ed2a7c7190c 297 if (cstate->clientstate == CHAPCS_INITIAL) {
GordonSin 0:0ed2a7c7190c 298 cstate->clientstate = CHAPCS_CLOSED;
GordonSin 0:0ed2a7c7190c 299 } else if (cstate->clientstate == CHAPCS_PENDING) {
GordonSin 0:0ed2a7c7190c 300 cstate->clientstate = CHAPCS_LISTEN;
GordonSin 0:0ed2a7c7190c 301 }
GordonSin 0:0ed2a7c7190c 302
GordonSin 0:0ed2a7c7190c 303 if (cstate->serverstate == CHAPSS_INITIAL) {
GordonSin 0:0ed2a7c7190c 304 cstate->serverstate = CHAPSS_CLOSED;
GordonSin 0:0ed2a7c7190c 305 } else if (cstate->serverstate == CHAPSS_PENDING) {
GordonSin 0:0ed2a7c7190c 306 ChapGenChallenge(cstate);
GordonSin 0:0ed2a7c7190c 307 ChapSendChallenge(cstate);
GordonSin 0:0ed2a7c7190c 308 cstate->serverstate = CHAPSS_INITIAL_CHAL;
GordonSin 0:0ed2a7c7190c 309 }
GordonSin 0:0ed2a7c7190c 310 }
GordonSin 0:0ed2a7c7190c 311
GordonSin 0:0ed2a7c7190c 312
GordonSin 0:0ed2a7c7190c 313 /*
GordonSin 0:0ed2a7c7190c 314 * ChapLowerDown - The lower layer is down.
GordonSin 0:0ed2a7c7190c 315 *
GordonSin 0:0ed2a7c7190c 316 * Cancel all timeouts.
GordonSin 0:0ed2a7c7190c 317 */
GordonSin 0:0ed2a7c7190c 318 static void
GordonSin 0:0ed2a7c7190c 319 ChapLowerDown(int unit)
GordonSin 0:0ed2a7c7190c 320 {
GordonSin 0:0ed2a7c7190c 321 chap_state *cstate = &chap[unit];
GordonSin 0:0ed2a7c7190c 322
GordonSin 0:0ed2a7c7190c 323 /* Timeout(s) pending? Cancel if so. */
GordonSin 0:0ed2a7c7190c 324 if (cstate->serverstate == CHAPSS_INITIAL_CHAL ||
GordonSin 0:0ed2a7c7190c 325 cstate->serverstate == CHAPSS_RECHALLENGE) {
GordonSin 0:0ed2a7c7190c 326 UNTIMEOUT(ChapChallengeTimeout, cstate);
GordonSin 0:0ed2a7c7190c 327 } else if (cstate->serverstate == CHAPSS_OPEN
GordonSin 0:0ed2a7c7190c 328 && cstate->chal_interval != 0) {
GordonSin 0:0ed2a7c7190c 329 UNTIMEOUT(ChapRechallenge, cstate);
GordonSin 0:0ed2a7c7190c 330 }
GordonSin 0:0ed2a7c7190c 331 if (cstate->clientstate == CHAPCS_RESPONSE) {
GordonSin 0:0ed2a7c7190c 332 UNTIMEOUT(ChapResponseTimeout, cstate);
GordonSin 0:0ed2a7c7190c 333 }
GordonSin 0:0ed2a7c7190c 334 cstate->clientstate = CHAPCS_INITIAL;
GordonSin 0:0ed2a7c7190c 335 cstate->serverstate = CHAPSS_INITIAL;
GordonSin 0:0ed2a7c7190c 336 }
GordonSin 0:0ed2a7c7190c 337
GordonSin 0:0ed2a7c7190c 338
GordonSin 0:0ed2a7c7190c 339 /*
GordonSin 0:0ed2a7c7190c 340 * ChapProtocolReject - Peer doesn't grok CHAP.
GordonSin 0:0ed2a7c7190c 341 */
GordonSin 0:0ed2a7c7190c 342 static void
GordonSin 0:0ed2a7c7190c 343 ChapProtocolReject(int unit)
GordonSin 0:0ed2a7c7190c 344 {
GordonSin 0:0ed2a7c7190c 345 chap_state *cstate = &chap[unit];
GordonSin 0:0ed2a7c7190c 346
GordonSin 0:0ed2a7c7190c 347 if (cstate->serverstate != CHAPSS_INITIAL &&
GordonSin 0:0ed2a7c7190c 348 cstate->serverstate != CHAPSS_CLOSED) {
GordonSin 0:0ed2a7c7190c 349 auth_peer_fail(unit, PPP_CHAP);
GordonSin 0:0ed2a7c7190c 350 }
GordonSin 0:0ed2a7c7190c 351 if (cstate->clientstate != CHAPCS_INITIAL &&
GordonSin 0:0ed2a7c7190c 352 cstate->clientstate != CHAPCS_CLOSED) {
GordonSin 0:0ed2a7c7190c 353 auth_withpeer_fail(unit, PPP_CHAP); /* lwip: just sets the PPP error code on this unit to PPPERR_AUTHFAIL */
GordonSin 0:0ed2a7c7190c 354 }
GordonSin 0:0ed2a7c7190c 355 ChapLowerDown(unit); /* shutdown chap */
GordonSin 0:0ed2a7c7190c 356 }
GordonSin 0:0ed2a7c7190c 357
GordonSin 0:0ed2a7c7190c 358
GordonSin 0:0ed2a7c7190c 359 /*
GordonSin 0:0ed2a7c7190c 360 * ChapInput - Input CHAP packet.
GordonSin 0:0ed2a7c7190c 361 */
GordonSin 0:0ed2a7c7190c 362 static void
GordonSin 0:0ed2a7c7190c 363 ChapInput(int unit, u_char *inpacket, int packet_len)
GordonSin 0:0ed2a7c7190c 364 {
GordonSin 0:0ed2a7c7190c 365 chap_state *cstate = &chap[unit];
GordonSin 0:0ed2a7c7190c 366 u_char *inp;
GordonSin 0:0ed2a7c7190c 367 u_char code, id;
GordonSin 0:0ed2a7c7190c 368 int len;
GordonSin 0:0ed2a7c7190c 369
GordonSin 0:0ed2a7c7190c 370 /*
GordonSin 0:0ed2a7c7190c 371 * Parse header (code, id and length).
GordonSin 0:0ed2a7c7190c 372 * If packet too short, drop it.
GordonSin 0:0ed2a7c7190c 373 */
GordonSin 0:0ed2a7c7190c 374 inp = inpacket;
GordonSin 0:0ed2a7c7190c 375 if (packet_len < CHAP_HEADERLEN) {
GordonSin 0:0ed2a7c7190c 376 CHAPDEBUG(LOG_INFO, ("ChapInput: rcvd short header.\n"));
GordonSin 0:0ed2a7c7190c 377 return;
GordonSin 0:0ed2a7c7190c 378 }
GordonSin 0:0ed2a7c7190c 379 GETCHAR(code, inp);
GordonSin 0:0ed2a7c7190c 380 GETCHAR(id, inp);
GordonSin 0:0ed2a7c7190c 381 GETSHORT(len, inp);
GordonSin 0:0ed2a7c7190c 382 if (len < CHAP_HEADERLEN) {
GordonSin 0:0ed2a7c7190c 383 CHAPDEBUG(LOG_INFO, ("ChapInput: rcvd illegal length.\n"));
GordonSin 0:0ed2a7c7190c 384 return;
GordonSin 0:0ed2a7c7190c 385 }
GordonSin 0:0ed2a7c7190c 386 if (len > packet_len) {
GordonSin 0:0ed2a7c7190c 387 CHAPDEBUG(LOG_INFO, ("ChapInput: rcvd short packet.\n"));
GordonSin 0:0ed2a7c7190c 388 return;
GordonSin 0:0ed2a7c7190c 389 }
GordonSin 0:0ed2a7c7190c 390 len -= CHAP_HEADERLEN;
GordonSin 0:0ed2a7c7190c 391
GordonSin 0:0ed2a7c7190c 392 /*
GordonSin 0:0ed2a7c7190c 393 * Action depends on code (as in fact it usually does :-).
GordonSin 0:0ed2a7c7190c 394 */
GordonSin 0:0ed2a7c7190c 395 switch (code) {
GordonSin 0:0ed2a7c7190c 396 case CHAP_CHALLENGE:
GordonSin 0:0ed2a7c7190c 397 ChapReceiveChallenge(cstate, inp, id, len);
GordonSin 0:0ed2a7c7190c 398 break;
GordonSin 0:0ed2a7c7190c 399
GordonSin 0:0ed2a7c7190c 400 case CHAP_RESPONSE:
GordonSin 0:0ed2a7c7190c 401 ChapReceiveResponse(cstate, inp, id, len);
GordonSin 0:0ed2a7c7190c 402 break;
GordonSin 0:0ed2a7c7190c 403
GordonSin 0:0ed2a7c7190c 404 case CHAP_FAILURE:
GordonSin 0:0ed2a7c7190c 405 ChapReceiveFailure(cstate, inp, id, len);
GordonSin 0:0ed2a7c7190c 406 break;
GordonSin 0:0ed2a7c7190c 407
GordonSin 0:0ed2a7c7190c 408 case CHAP_SUCCESS:
GordonSin 0:0ed2a7c7190c 409 ChapReceiveSuccess(cstate, inp, id, len);
GordonSin 0:0ed2a7c7190c 410 break;
GordonSin 0:0ed2a7c7190c 411
GordonSin 0:0ed2a7c7190c 412 default: /* Need code reject? */
GordonSin 0:0ed2a7c7190c 413 CHAPDEBUG(LOG_WARNING, ("Unknown CHAP code (%d) received.\n", code));
GordonSin 0:0ed2a7c7190c 414 break;
GordonSin 0:0ed2a7c7190c 415 }
GordonSin 0:0ed2a7c7190c 416 }
GordonSin 0:0ed2a7c7190c 417
GordonSin 0:0ed2a7c7190c 418
GordonSin 0:0ed2a7c7190c 419 /*
GordonSin 0:0ed2a7c7190c 420 * ChapReceiveChallenge - Receive Challenge and send Response.
GordonSin 0:0ed2a7c7190c 421 */
GordonSin 0:0ed2a7c7190c 422 static void
GordonSin 0:0ed2a7c7190c 423 ChapReceiveChallenge(chap_state *cstate, u_char *inp, u_char id, int len)
GordonSin 0:0ed2a7c7190c 424 {
GordonSin 0:0ed2a7c7190c 425 int rchallenge_len;
GordonSin 0:0ed2a7c7190c 426 u_char *rchallenge;
GordonSin 0:0ed2a7c7190c 427 int secret_len;
GordonSin 0:0ed2a7c7190c 428 char secret[MAXSECRETLEN];
GordonSin 0:0ed2a7c7190c 429 char rhostname[256];
GordonSin 0:0ed2a7c7190c 430 MD5_CTX mdContext;
GordonSin 0:0ed2a7c7190c 431 u_char hash[MD5_SIGNATURE_SIZE];
GordonSin 0:0ed2a7c7190c 432
GordonSin 0:0ed2a7c7190c 433 CHAPDEBUG(LOG_INFO, ("ChapReceiveChallenge: Rcvd id %d.\n", id));
GordonSin 0:0ed2a7c7190c 434 if (cstate->clientstate == CHAPCS_CLOSED ||
GordonSin 0:0ed2a7c7190c 435 cstate->clientstate == CHAPCS_PENDING) {
GordonSin 0:0ed2a7c7190c 436 CHAPDEBUG(LOG_INFO, ("ChapReceiveChallenge: in state %d\n",
GordonSin 0:0ed2a7c7190c 437 cstate->clientstate));
GordonSin 0:0ed2a7c7190c 438 return;
GordonSin 0:0ed2a7c7190c 439 }
GordonSin 0:0ed2a7c7190c 440
GordonSin 0:0ed2a7c7190c 441 if (len < 2) {
GordonSin 0:0ed2a7c7190c 442 CHAPDEBUG(LOG_INFO, ("ChapReceiveChallenge: rcvd short packet.\n"));
GordonSin 0:0ed2a7c7190c 443 return;
GordonSin 0:0ed2a7c7190c 444 }
GordonSin 0:0ed2a7c7190c 445
GordonSin 0:0ed2a7c7190c 446 GETCHAR(rchallenge_len, inp);
GordonSin 0:0ed2a7c7190c 447 len -= sizeof (u_char) + rchallenge_len; /* now name field length */
GordonSin 0:0ed2a7c7190c 448 if (len < 0) {
GordonSin 0:0ed2a7c7190c 449 CHAPDEBUG(LOG_INFO, ("ChapReceiveChallenge: rcvd short packet.\n"));
GordonSin 0:0ed2a7c7190c 450 return;
GordonSin 0:0ed2a7c7190c 451 }
GordonSin 0:0ed2a7c7190c 452 rchallenge = inp;
GordonSin 0:0ed2a7c7190c 453 INCPTR(rchallenge_len, inp);
GordonSin 0:0ed2a7c7190c 454
GordonSin 0:0ed2a7c7190c 455 if (len >= (int)sizeof(rhostname)) {
GordonSin 0:0ed2a7c7190c 456 len = sizeof(rhostname) - 1;
GordonSin 0:0ed2a7c7190c 457 }
GordonSin 0:0ed2a7c7190c 458 BCOPY(inp, rhostname, len);
GordonSin 0:0ed2a7c7190c 459 rhostname[len] = '\000';
GordonSin 0:0ed2a7c7190c 460
GordonSin 0:0ed2a7c7190c 461 CHAPDEBUG(LOG_INFO, ("ChapReceiveChallenge: received name field '%s'\n",
GordonSin 0:0ed2a7c7190c 462 rhostname));
GordonSin 0:0ed2a7c7190c 463
GordonSin 0:0ed2a7c7190c 464 /* Microsoft doesn't send their name back in the PPP packet */
GordonSin 0:0ed2a7c7190c 465 if (ppp_settings.remote_name[0] != 0 && (ppp_settings.explicit_remote || rhostname[0] == 0)) {
GordonSin 0:0ed2a7c7190c 466 strncpy(rhostname, ppp_settings.remote_name, sizeof(rhostname));
GordonSin 0:0ed2a7c7190c 467 rhostname[sizeof(rhostname) - 1] = 0;
GordonSin 0:0ed2a7c7190c 468 CHAPDEBUG(LOG_INFO, ("ChapReceiveChallenge: using '%s' as remote name\n",
GordonSin 0:0ed2a7c7190c 469 rhostname));
GordonSin 0:0ed2a7c7190c 470 }
GordonSin 0:0ed2a7c7190c 471
GordonSin 0:0ed2a7c7190c 472 /* get secret for authenticating ourselves with the specified host */
GordonSin 0:0ed2a7c7190c 473 if (!get_secret(cstate->unit, cstate->resp_name, rhostname,
GordonSin 0:0ed2a7c7190c 474 secret, &secret_len, 0)) {
GordonSin 0:0ed2a7c7190c 475 secret_len = 0; /* assume null secret if can't find one */
GordonSin 0:0ed2a7c7190c 476 CHAPDEBUG(LOG_WARNING, ("No CHAP secret found for authenticating us to %s\n",
GordonSin 0:0ed2a7c7190c 477 rhostname));
GordonSin 0:0ed2a7c7190c 478 }
GordonSin 0:0ed2a7c7190c 479
GordonSin 0:0ed2a7c7190c 480 /* cancel response send timeout if necessary */
GordonSin 0:0ed2a7c7190c 481 if (cstate->clientstate == CHAPCS_RESPONSE) {
GordonSin 0:0ed2a7c7190c 482 UNTIMEOUT(ChapResponseTimeout, cstate);
GordonSin 0:0ed2a7c7190c 483 }
GordonSin 0:0ed2a7c7190c 484
GordonSin 0:0ed2a7c7190c 485 cstate->resp_id = id;
GordonSin 0:0ed2a7c7190c 486 cstate->resp_transmits = 0;
GordonSin 0:0ed2a7c7190c 487
GordonSin 0:0ed2a7c7190c 488 /* generate MD based on negotiated type */
GordonSin 0:0ed2a7c7190c 489 switch (cstate->resp_type) {
GordonSin 0:0ed2a7c7190c 490
GordonSin 0:0ed2a7c7190c 491 case CHAP_DIGEST_MD5:
GordonSin 0:0ed2a7c7190c 492 MD5Init(&mdContext);
GordonSin 0:0ed2a7c7190c 493 MD5Update(&mdContext, &cstate->resp_id, 1);
GordonSin 0:0ed2a7c7190c 494 MD5Update(&mdContext, (u_char*)secret, secret_len);
GordonSin 0:0ed2a7c7190c 495 MD5Update(&mdContext, rchallenge, rchallenge_len);
GordonSin 0:0ed2a7c7190c 496 MD5Final(hash, &mdContext);
GordonSin 0:0ed2a7c7190c 497 BCOPY(hash, cstate->response, MD5_SIGNATURE_SIZE);
GordonSin 0:0ed2a7c7190c 498 cstate->resp_length = MD5_SIGNATURE_SIZE;
GordonSin 0:0ed2a7c7190c 499 break;
GordonSin 0:0ed2a7c7190c 500
GordonSin 0:0ed2a7c7190c 501 #if MSCHAP_SUPPORT
GordonSin 0:0ed2a7c7190c 502 case CHAP_MICROSOFT:
GordonSin 0:0ed2a7c7190c 503 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len);
GordonSin 0:0ed2a7c7190c 504 break;
GordonSin 0:0ed2a7c7190c 505 #endif
GordonSin 0:0ed2a7c7190c 506
GordonSin 0:0ed2a7c7190c 507 default:
GordonSin 0:0ed2a7c7190c 508 CHAPDEBUG(LOG_INFO, ("unknown digest type %d\n", cstate->resp_type));
GordonSin 0:0ed2a7c7190c 509 return;
GordonSin 0:0ed2a7c7190c 510 }
GordonSin 0:0ed2a7c7190c 511
GordonSin 0:0ed2a7c7190c 512 BZERO(secret, sizeof(secret));
GordonSin 0:0ed2a7c7190c 513 ChapSendResponse(cstate);
GordonSin 0:0ed2a7c7190c 514 }
GordonSin 0:0ed2a7c7190c 515
GordonSin 0:0ed2a7c7190c 516
GordonSin 0:0ed2a7c7190c 517 /*
GordonSin 0:0ed2a7c7190c 518 * ChapReceiveResponse - Receive and process response.
GordonSin 0:0ed2a7c7190c 519 */
GordonSin 0:0ed2a7c7190c 520 static void
GordonSin 0:0ed2a7c7190c 521 ChapReceiveResponse(chap_state *cstate, u_char *inp, int id, int len)
GordonSin 0:0ed2a7c7190c 522 {
GordonSin 0:0ed2a7c7190c 523 u_char *remmd, remmd_len;
GordonSin 0:0ed2a7c7190c 524 int secret_len, old_state;
GordonSin 0:0ed2a7c7190c 525 int code;
GordonSin 0:0ed2a7c7190c 526 char rhostname[256];
GordonSin 0:0ed2a7c7190c 527 MD5_CTX mdContext;
GordonSin 0:0ed2a7c7190c 528 char secret[MAXSECRETLEN];
GordonSin 0:0ed2a7c7190c 529 u_char hash[MD5_SIGNATURE_SIZE];
GordonSin 0:0ed2a7c7190c 530
GordonSin 0:0ed2a7c7190c 531 CHAPDEBUG(LOG_INFO, ("ChapReceiveResponse: Rcvd id %d.\n", id));
GordonSin 0:0ed2a7c7190c 532
GordonSin 0:0ed2a7c7190c 533 if (cstate->serverstate == CHAPSS_CLOSED ||
GordonSin 0:0ed2a7c7190c 534 cstate->serverstate == CHAPSS_PENDING) {
GordonSin 0:0ed2a7c7190c 535 CHAPDEBUG(LOG_INFO, ("ChapReceiveResponse: in state %d\n",
GordonSin 0:0ed2a7c7190c 536 cstate->serverstate));
GordonSin 0:0ed2a7c7190c 537 return;
GordonSin 0:0ed2a7c7190c 538 }
GordonSin 0:0ed2a7c7190c 539
GordonSin 0:0ed2a7c7190c 540 if (id != cstate->chal_id) {
GordonSin 0:0ed2a7c7190c 541 return; /* doesn't match ID of last challenge */
GordonSin 0:0ed2a7c7190c 542 }
GordonSin 0:0ed2a7c7190c 543
GordonSin 0:0ed2a7c7190c 544 /*
GordonSin 0:0ed2a7c7190c 545 * If we have received a duplicate or bogus Response,
GordonSin 0:0ed2a7c7190c 546 * we have to send the same answer (Success/Failure)
GordonSin 0:0ed2a7c7190c 547 * as we did for the first Response we saw.
GordonSin 0:0ed2a7c7190c 548 */
GordonSin 0:0ed2a7c7190c 549 if (cstate->serverstate == CHAPSS_OPEN) {
GordonSin 0:0ed2a7c7190c 550 ChapSendStatus(cstate, CHAP_SUCCESS);
GordonSin 0:0ed2a7c7190c 551 return;
GordonSin 0:0ed2a7c7190c 552 }
GordonSin 0:0ed2a7c7190c 553 if (cstate->serverstate == CHAPSS_BADAUTH) {
GordonSin 0:0ed2a7c7190c 554 ChapSendStatus(cstate, CHAP_FAILURE);
GordonSin 0:0ed2a7c7190c 555 return;
GordonSin 0:0ed2a7c7190c 556 }
GordonSin 0:0ed2a7c7190c 557
GordonSin 0:0ed2a7c7190c 558 if (len < 2) {
GordonSin 0:0ed2a7c7190c 559 CHAPDEBUG(LOG_INFO, ("ChapReceiveResponse: rcvd short packet.\n"));
GordonSin 0:0ed2a7c7190c 560 return;
GordonSin 0:0ed2a7c7190c 561 }
GordonSin 0:0ed2a7c7190c 562 GETCHAR(remmd_len, inp); /* get length of MD */
GordonSin 0:0ed2a7c7190c 563 remmd = inp; /* get pointer to MD */
GordonSin 0:0ed2a7c7190c 564 INCPTR(remmd_len, inp);
GordonSin 0:0ed2a7c7190c 565
GordonSin 0:0ed2a7c7190c 566 len -= sizeof (u_char) + remmd_len;
GordonSin 0:0ed2a7c7190c 567 if (len < 0) {
GordonSin 0:0ed2a7c7190c 568 CHAPDEBUG(LOG_INFO, ("ChapReceiveResponse: rcvd short packet.\n"));
GordonSin 0:0ed2a7c7190c 569 return;
GordonSin 0:0ed2a7c7190c 570 }
GordonSin 0:0ed2a7c7190c 571
GordonSin 0:0ed2a7c7190c 572 UNTIMEOUT(ChapChallengeTimeout, cstate);
GordonSin 0:0ed2a7c7190c 573
GordonSin 0:0ed2a7c7190c 574 if (len >= (int)sizeof(rhostname)) {
GordonSin 0:0ed2a7c7190c 575 len = sizeof(rhostname) - 1;
GordonSin 0:0ed2a7c7190c 576 }
GordonSin 0:0ed2a7c7190c 577 BCOPY(inp, rhostname, len);
GordonSin 0:0ed2a7c7190c 578 rhostname[len] = '\000';
GordonSin 0:0ed2a7c7190c 579
GordonSin 0:0ed2a7c7190c 580 CHAPDEBUG(LOG_INFO, ("ChapReceiveResponse: received name field: %s\n",
GordonSin 0:0ed2a7c7190c 581 rhostname));
GordonSin 0:0ed2a7c7190c 582
GordonSin 0:0ed2a7c7190c 583 /*
GordonSin 0:0ed2a7c7190c 584 * Get secret for authenticating them with us,
GordonSin 0:0ed2a7c7190c 585 * do the hash ourselves, and compare the result.
GordonSin 0:0ed2a7c7190c 586 */
GordonSin 0:0ed2a7c7190c 587 code = CHAP_FAILURE;
GordonSin 0:0ed2a7c7190c 588 if (!get_secret(cstate->unit, rhostname, cstate->chal_name,
GordonSin 0:0ed2a7c7190c 589 secret, &secret_len, 1)) {
GordonSin 0:0ed2a7c7190c 590 CHAPDEBUG(LOG_WARNING, ("No CHAP secret found for authenticating %s\n",
GordonSin 0:0ed2a7c7190c 591 rhostname));
GordonSin 0:0ed2a7c7190c 592 } else {
GordonSin 0:0ed2a7c7190c 593 /* generate MD based on negotiated type */
GordonSin 0:0ed2a7c7190c 594 switch (cstate->chal_type) {
GordonSin 0:0ed2a7c7190c 595
GordonSin 0:0ed2a7c7190c 596 case CHAP_DIGEST_MD5: /* only MD5 is defined for now */
GordonSin 0:0ed2a7c7190c 597 if (remmd_len != MD5_SIGNATURE_SIZE) {
GordonSin 0:0ed2a7c7190c 598 break; /* it's not even the right length */
GordonSin 0:0ed2a7c7190c 599 }
GordonSin 0:0ed2a7c7190c 600 MD5Init(&mdContext);
GordonSin 0:0ed2a7c7190c 601 MD5Update(&mdContext, &cstate->chal_id, 1);
GordonSin 0:0ed2a7c7190c 602 MD5Update(&mdContext, (u_char*)secret, secret_len);
GordonSin 0:0ed2a7c7190c 603 MD5Update(&mdContext, cstate->challenge, cstate->chal_len);
GordonSin 0:0ed2a7c7190c 604 MD5Final(hash, &mdContext);
GordonSin 0:0ed2a7c7190c 605
GordonSin 0:0ed2a7c7190c 606 /* compare local and remote MDs and send the appropriate status */
GordonSin 0:0ed2a7c7190c 607 if (memcmp (hash, remmd, MD5_SIGNATURE_SIZE) == 0) {
GordonSin 0:0ed2a7c7190c 608 code = CHAP_SUCCESS; /* they are the same! */
GordonSin 0:0ed2a7c7190c 609 }
GordonSin 0:0ed2a7c7190c 610 break;
GordonSin 0:0ed2a7c7190c 611
GordonSin 0:0ed2a7c7190c 612 default:
GordonSin 0:0ed2a7c7190c 613 CHAPDEBUG(LOG_INFO, ("unknown digest type %d\n", cstate->chal_type));
GordonSin 0:0ed2a7c7190c 614 }
GordonSin 0:0ed2a7c7190c 615 }
GordonSin 0:0ed2a7c7190c 616
GordonSin 0:0ed2a7c7190c 617 BZERO(secret, sizeof(secret));
GordonSin 0:0ed2a7c7190c 618 ChapSendStatus(cstate, code);
GordonSin 0:0ed2a7c7190c 619
GordonSin 0:0ed2a7c7190c 620 if (code == CHAP_SUCCESS) {
GordonSin 0:0ed2a7c7190c 621 old_state = cstate->serverstate;
GordonSin 0:0ed2a7c7190c 622 cstate->serverstate = CHAPSS_OPEN;
GordonSin 0:0ed2a7c7190c 623 if (old_state == CHAPSS_INITIAL_CHAL) {
GordonSin 0:0ed2a7c7190c 624 auth_peer_success(cstate->unit, PPP_CHAP, rhostname, len);
GordonSin 0:0ed2a7c7190c 625 }
GordonSin 0:0ed2a7c7190c 626 if (cstate->chal_interval != 0) {
GordonSin 0:0ed2a7c7190c 627 TIMEOUT(ChapRechallenge, cstate, cstate->chal_interval);
GordonSin 0:0ed2a7c7190c 628 }
GordonSin 0:0ed2a7c7190c 629 } else {
GordonSin 0:0ed2a7c7190c 630 CHAPDEBUG(LOG_ERR, ("CHAP peer authentication failed\n"));
GordonSin 0:0ed2a7c7190c 631 cstate->serverstate = CHAPSS_BADAUTH;
GordonSin 0:0ed2a7c7190c 632 auth_peer_fail(cstate->unit, PPP_CHAP);
GordonSin 0:0ed2a7c7190c 633 }
GordonSin 0:0ed2a7c7190c 634 }
GordonSin 0:0ed2a7c7190c 635
GordonSin 0:0ed2a7c7190c 636 /*
GordonSin 0:0ed2a7c7190c 637 * ChapReceiveSuccess - Receive Success
GordonSin 0:0ed2a7c7190c 638 */
GordonSin 0:0ed2a7c7190c 639 static void
GordonSin 0:0ed2a7c7190c 640 ChapReceiveSuccess(chap_state *cstate, u_char *inp, u_char id, int len)
GordonSin 0:0ed2a7c7190c 641 {
GordonSin 0:0ed2a7c7190c 642 LWIP_UNUSED_ARG(id);
GordonSin 0:0ed2a7c7190c 643 LWIP_UNUSED_ARG(inp);
GordonSin 0:0ed2a7c7190c 644
GordonSin 0:0ed2a7c7190c 645 CHAPDEBUG(LOG_INFO, ("ChapReceiveSuccess: Rcvd id %d.\n", id));
GordonSin 0:0ed2a7c7190c 646
GordonSin 0:0ed2a7c7190c 647 if (cstate->clientstate == CHAPCS_OPEN) {
GordonSin 0:0ed2a7c7190c 648 /* presumably an answer to a duplicate response */
GordonSin 0:0ed2a7c7190c 649 return;
GordonSin 0:0ed2a7c7190c 650 }
GordonSin 0:0ed2a7c7190c 651
GordonSin 0:0ed2a7c7190c 652 if (cstate->clientstate != CHAPCS_RESPONSE) {
GordonSin 0:0ed2a7c7190c 653 /* don't know what this is */
GordonSin 0:0ed2a7c7190c 654 CHAPDEBUG(LOG_INFO, ("ChapReceiveSuccess: in state %d\n",
GordonSin 0:0ed2a7c7190c 655 cstate->clientstate));
GordonSin 0:0ed2a7c7190c 656 return;
GordonSin 0:0ed2a7c7190c 657 }
GordonSin 0:0ed2a7c7190c 658
GordonSin 0:0ed2a7c7190c 659 UNTIMEOUT(ChapResponseTimeout, cstate);
GordonSin 0:0ed2a7c7190c 660
GordonSin 0:0ed2a7c7190c 661 /*
GordonSin 0:0ed2a7c7190c 662 * Print message.
GordonSin 0:0ed2a7c7190c 663 */
GordonSin 0:0ed2a7c7190c 664 if (len > 0) {
GordonSin 0:0ed2a7c7190c 665 PRINTMSG(inp, len);
GordonSin 0:0ed2a7c7190c 666 }
GordonSin 0:0ed2a7c7190c 667
GordonSin 0:0ed2a7c7190c 668 cstate->clientstate = CHAPCS_OPEN;
GordonSin 0:0ed2a7c7190c 669
GordonSin 0:0ed2a7c7190c 670 auth_withpeer_success(cstate->unit, PPP_CHAP);
GordonSin 0:0ed2a7c7190c 671 }
GordonSin 0:0ed2a7c7190c 672
GordonSin 0:0ed2a7c7190c 673
GordonSin 0:0ed2a7c7190c 674 /*
GordonSin 0:0ed2a7c7190c 675 * ChapReceiveFailure - Receive failure.
GordonSin 0:0ed2a7c7190c 676 */
GordonSin 0:0ed2a7c7190c 677 static void
GordonSin 0:0ed2a7c7190c 678 ChapReceiveFailure(chap_state *cstate, u_char *inp, u_char id, int len)
GordonSin 0:0ed2a7c7190c 679 {
GordonSin 0:0ed2a7c7190c 680 LWIP_UNUSED_ARG(id);
GordonSin 0:0ed2a7c7190c 681 LWIP_UNUSED_ARG(inp);
GordonSin 0:0ed2a7c7190c 682
GordonSin 0:0ed2a7c7190c 683 CHAPDEBUG(LOG_INFO, ("ChapReceiveFailure: Rcvd id %d.\n", id));
GordonSin 0:0ed2a7c7190c 684
GordonSin 0:0ed2a7c7190c 685 if (cstate->clientstate != CHAPCS_RESPONSE) {
GordonSin 0:0ed2a7c7190c 686 /* don't know what this is */
GordonSin 0:0ed2a7c7190c 687 CHAPDEBUG(LOG_INFO, ("ChapReceiveFailure: in state %d\n",
GordonSin 0:0ed2a7c7190c 688 cstate->clientstate));
GordonSin 0:0ed2a7c7190c 689 return;
GordonSin 0:0ed2a7c7190c 690 }
GordonSin 0:0ed2a7c7190c 691
GordonSin 0:0ed2a7c7190c 692 UNTIMEOUT(ChapResponseTimeout, cstate);
GordonSin 0:0ed2a7c7190c 693
GordonSin 0:0ed2a7c7190c 694 /*
GordonSin 0:0ed2a7c7190c 695 * Print message.
GordonSin 0:0ed2a7c7190c 696 */
GordonSin 0:0ed2a7c7190c 697 if (len > 0) {
GordonSin 0:0ed2a7c7190c 698 PRINTMSG(inp, len);
GordonSin 0:0ed2a7c7190c 699 }
GordonSin 0:0ed2a7c7190c 700
GordonSin 0:0ed2a7c7190c 701 CHAPDEBUG(LOG_ERR, ("CHAP authentication failed\n"));
GordonSin 0:0ed2a7c7190c 702 auth_withpeer_fail(cstate->unit, PPP_CHAP); /* lwip: just sets the PPP error code on this unit to PPPERR_AUTHFAIL */
GordonSin 0:0ed2a7c7190c 703 }
GordonSin 0:0ed2a7c7190c 704
GordonSin 0:0ed2a7c7190c 705
GordonSin 0:0ed2a7c7190c 706 /*
GordonSin 0:0ed2a7c7190c 707 * ChapSendChallenge - Send an Authenticate challenge.
GordonSin 0:0ed2a7c7190c 708 */
GordonSin 0:0ed2a7c7190c 709 static void
GordonSin 0:0ed2a7c7190c 710 ChapSendChallenge(chap_state *cstate)
GordonSin 0:0ed2a7c7190c 711 {
GordonSin 0:0ed2a7c7190c 712 u_char *outp;
GordonSin 0:0ed2a7c7190c 713 int chal_len, name_len;
GordonSin 0:0ed2a7c7190c 714 int outlen;
GordonSin 0:0ed2a7c7190c 715
GordonSin 0:0ed2a7c7190c 716 chal_len = cstate->chal_len;
GordonSin 0:0ed2a7c7190c 717 name_len = (int)strlen(cstate->chal_name);
GordonSin 0:0ed2a7c7190c 718 outlen = CHAP_HEADERLEN + sizeof (u_char) + chal_len + name_len;
GordonSin 0:0ed2a7c7190c 719 outp = outpacket_buf[cstate->unit];
GordonSin 0:0ed2a7c7190c 720
GordonSin 0:0ed2a7c7190c 721 MAKEHEADER(outp, PPP_CHAP); /* paste in a CHAP header */
GordonSin 0:0ed2a7c7190c 722
GordonSin 0:0ed2a7c7190c 723 PUTCHAR(CHAP_CHALLENGE, outp);
GordonSin 0:0ed2a7c7190c 724 PUTCHAR(cstate->chal_id, outp);
GordonSin 0:0ed2a7c7190c 725 PUTSHORT(outlen, outp);
GordonSin 0:0ed2a7c7190c 726
GordonSin 0:0ed2a7c7190c 727 PUTCHAR(chal_len, outp); /* put length of challenge */
GordonSin 0:0ed2a7c7190c 728 BCOPY(cstate->challenge, outp, chal_len);
GordonSin 0:0ed2a7c7190c 729 INCPTR(chal_len, outp);
GordonSin 0:0ed2a7c7190c 730
GordonSin 0:0ed2a7c7190c 731 BCOPY(cstate->chal_name, outp, name_len); /* append hostname */
GordonSin 0:0ed2a7c7190c 732
GordonSin 0:0ed2a7c7190c 733 pppWrite(cstate->unit, outpacket_buf[cstate->unit], outlen + PPP_HDRLEN);
GordonSin 0:0ed2a7c7190c 734
GordonSin 0:0ed2a7c7190c 735 CHAPDEBUG(LOG_INFO, ("ChapSendChallenge: Sent id %d.\n", cstate->chal_id));
GordonSin 0:0ed2a7c7190c 736
GordonSin 0:0ed2a7c7190c 737 TIMEOUT(ChapChallengeTimeout, cstate, cstate->timeouttime);
GordonSin 0:0ed2a7c7190c 738 ++cstate->chal_transmits;
GordonSin 0:0ed2a7c7190c 739 }
GordonSin 0:0ed2a7c7190c 740
GordonSin 0:0ed2a7c7190c 741
GordonSin 0:0ed2a7c7190c 742 /*
GordonSin 0:0ed2a7c7190c 743 * ChapSendStatus - Send a status response (ack or nak).
GordonSin 0:0ed2a7c7190c 744 */
GordonSin 0:0ed2a7c7190c 745 static void
GordonSin 0:0ed2a7c7190c 746 ChapSendStatus(chap_state *cstate, int code)
GordonSin 0:0ed2a7c7190c 747 {
GordonSin 0:0ed2a7c7190c 748 u_char *outp;
GordonSin 0:0ed2a7c7190c 749 int outlen, msglen;
GordonSin 0:0ed2a7c7190c 750 char msg[256]; /* @todo: this can be a char*, no strcpy needed */
GordonSin 0:0ed2a7c7190c 751
GordonSin 0:0ed2a7c7190c 752 if (code == CHAP_SUCCESS) {
GordonSin 0:0ed2a7c7190c 753 strcpy(msg, "Welcome!");
GordonSin 0:0ed2a7c7190c 754 } else {
GordonSin 0:0ed2a7c7190c 755 strcpy(msg, "I don't like you. Go 'way.");
GordonSin 0:0ed2a7c7190c 756 }
GordonSin 0:0ed2a7c7190c 757 msglen = (int)strlen(msg);
GordonSin 0:0ed2a7c7190c 758
GordonSin 0:0ed2a7c7190c 759 outlen = CHAP_HEADERLEN + msglen;
GordonSin 0:0ed2a7c7190c 760 outp = outpacket_buf[cstate->unit];
GordonSin 0:0ed2a7c7190c 761
GordonSin 0:0ed2a7c7190c 762 MAKEHEADER(outp, PPP_CHAP); /* paste in a header */
GordonSin 0:0ed2a7c7190c 763
GordonSin 0:0ed2a7c7190c 764 PUTCHAR(code, outp);
GordonSin 0:0ed2a7c7190c 765 PUTCHAR(cstate->chal_id, outp);
GordonSin 0:0ed2a7c7190c 766 PUTSHORT(outlen, outp);
GordonSin 0:0ed2a7c7190c 767 BCOPY(msg, outp, msglen);
GordonSin 0:0ed2a7c7190c 768 pppWrite(cstate->unit, outpacket_buf[cstate->unit], outlen + PPP_HDRLEN);
GordonSin 0:0ed2a7c7190c 769
GordonSin 0:0ed2a7c7190c 770 CHAPDEBUG(LOG_INFO, ("ChapSendStatus: Sent code %d, id %d.\n", code,
GordonSin 0:0ed2a7c7190c 771 cstate->chal_id));
GordonSin 0:0ed2a7c7190c 772 }
GordonSin 0:0ed2a7c7190c 773
GordonSin 0:0ed2a7c7190c 774 /*
GordonSin 0:0ed2a7c7190c 775 * ChapGenChallenge is used to generate a pseudo-random challenge string of
GordonSin 0:0ed2a7c7190c 776 * a pseudo-random length between min_len and max_len. The challenge
GordonSin 0:0ed2a7c7190c 777 * string and its length are stored in *cstate, and various other fields of
GordonSin 0:0ed2a7c7190c 778 * *cstate are initialized.
GordonSin 0:0ed2a7c7190c 779 */
GordonSin 0:0ed2a7c7190c 780
GordonSin 0:0ed2a7c7190c 781 static void
GordonSin 0:0ed2a7c7190c 782 ChapGenChallenge(chap_state *cstate)
GordonSin 0:0ed2a7c7190c 783 {
GordonSin 0:0ed2a7c7190c 784 int chal_len;
GordonSin 0:0ed2a7c7190c 785 u_char *ptr = cstate->challenge;
GordonSin 0:0ed2a7c7190c 786 int i;
GordonSin 0:0ed2a7c7190c 787
GordonSin 0:0ed2a7c7190c 788 /* pick a random challenge length between MIN_CHALLENGE_LENGTH and
GordonSin 0:0ed2a7c7190c 789 MAX_CHALLENGE_LENGTH */
GordonSin 0:0ed2a7c7190c 790 chal_len = (unsigned)
GordonSin 0:0ed2a7c7190c 791 ((((magic() >> 16) *
GordonSin 0:0ed2a7c7190c 792 (MAX_CHALLENGE_LENGTH - MIN_CHALLENGE_LENGTH)) >> 16)
GordonSin 0:0ed2a7c7190c 793 + MIN_CHALLENGE_LENGTH);
GordonSin 0:0ed2a7c7190c 794 LWIP_ASSERT("chal_len <= 0xff", chal_len <= 0xffff);
GordonSin 0:0ed2a7c7190c 795 cstate->chal_len = (u_char)chal_len;
GordonSin 0:0ed2a7c7190c 796 cstate->chal_id = ++cstate->id;
GordonSin 0:0ed2a7c7190c 797 cstate->chal_transmits = 0;
GordonSin 0:0ed2a7c7190c 798
GordonSin 0:0ed2a7c7190c 799 /* generate a random string */
GordonSin 0:0ed2a7c7190c 800 for (i = 0; i < chal_len; i++ ) {
GordonSin 0:0ed2a7c7190c 801 *ptr++ = (char) (magic() & 0xff);
GordonSin 0:0ed2a7c7190c 802 }
GordonSin 0:0ed2a7c7190c 803 }
GordonSin 0:0ed2a7c7190c 804
GordonSin 0:0ed2a7c7190c 805 /*
GordonSin 0:0ed2a7c7190c 806 * ChapSendResponse - send a response packet with values as specified
GordonSin 0:0ed2a7c7190c 807 * in *cstate.
GordonSin 0:0ed2a7c7190c 808 */
GordonSin 0:0ed2a7c7190c 809 /* ARGSUSED */
GordonSin 0:0ed2a7c7190c 810 static void
GordonSin 0:0ed2a7c7190c 811 ChapSendResponse(chap_state *cstate)
GordonSin 0:0ed2a7c7190c 812 {
GordonSin 0:0ed2a7c7190c 813 u_char *outp;
GordonSin 0:0ed2a7c7190c 814 int outlen, md_len, name_len;
GordonSin 0:0ed2a7c7190c 815
GordonSin 0:0ed2a7c7190c 816 md_len = cstate->resp_length;
GordonSin 0:0ed2a7c7190c 817 name_len = (int)strlen(cstate->resp_name);
GordonSin 0:0ed2a7c7190c 818 outlen = CHAP_HEADERLEN + sizeof (u_char) + md_len + name_len;
GordonSin 0:0ed2a7c7190c 819 outp = outpacket_buf[cstate->unit];
GordonSin 0:0ed2a7c7190c 820
GordonSin 0:0ed2a7c7190c 821 MAKEHEADER(outp, PPP_CHAP);
GordonSin 0:0ed2a7c7190c 822
GordonSin 0:0ed2a7c7190c 823 PUTCHAR(CHAP_RESPONSE, outp); /* we are a response */
GordonSin 0:0ed2a7c7190c 824 PUTCHAR(cstate->resp_id, outp); /* copy id from challenge packet */
GordonSin 0:0ed2a7c7190c 825 PUTSHORT(outlen, outp); /* packet length */
GordonSin 0:0ed2a7c7190c 826
GordonSin 0:0ed2a7c7190c 827 PUTCHAR(md_len, outp); /* length of MD */
GordonSin 0:0ed2a7c7190c 828 BCOPY(cstate->response, outp, md_len); /* copy MD to buffer */
GordonSin 0:0ed2a7c7190c 829 INCPTR(md_len, outp);
GordonSin 0:0ed2a7c7190c 830
GordonSin 0:0ed2a7c7190c 831 BCOPY(cstate->resp_name, outp, name_len); /* append our name */
GordonSin 0:0ed2a7c7190c 832
GordonSin 0:0ed2a7c7190c 833 /* send the packet */
GordonSin 0:0ed2a7c7190c 834 pppWrite(cstate->unit, outpacket_buf[cstate->unit], outlen + PPP_HDRLEN);
GordonSin 0:0ed2a7c7190c 835
GordonSin 0:0ed2a7c7190c 836 cstate->clientstate = CHAPCS_RESPONSE;
GordonSin 0:0ed2a7c7190c 837 TIMEOUT(ChapResponseTimeout, cstate, cstate->timeouttime);
GordonSin 0:0ed2a7c7190c 838 ++cstate->resp_transmits;
GordonSin 0:0ed2a7c7190c 839 }
GordonSin 0:0ed2a7c7190c 840
GordonSin 0:0ed2a7c7190c 841 #if PPP_ADDITIONAL_CALLBACKS
GordonSin 0:0ed2a7c7190c 842 static char *ChapCodenames[] = {
GordonSin 0:0ed2a7c7190c 843 "Challenge", "Response", "Success", "Failure"
GordonSin 0:0ed2a7c7190c 844 };
GordonSin 0:0ed2a7c7190c 845 /*
GordonSin 0:0ed2a7c7190c 846 * ChapPrintPkt - print the contents of a CHAP packet.
GordonSin 0:0ed2a7c7190c 847 */
GordonSin 0:0ed2a7c7190c 848 static int
GordonSin 0:0ed2a7c7190c 849 ChapPrintPkt( u_char *p, int plen, void (*printer) (void *, char *, ...), void *arg)
GordonSin 0:0ed2a7c7190c 850 {
GordonSin 0:0ed2a7c7190c 851 int code, id, len;
GordonSin 0:0ed2a7c7190c 852 int clen, nlen;
GordonSin 0:0ed2a7c7190c 853 u_char x;
GordonSin 0:0ed2a7c7190c 854
GordonSin 0:0ed2a7c7190c 855 if (plen < CHAP_HEADERLEN) {
GordonSin 0:0ed2a7c7190c 856 return 0;
GordonSin 0:0ed2a7c7190c 857 }
GordonSin 0:0ed2a7c7190c 858 GETCHAR(code, p);
GordonSin 0:0ed2a7c7190c 859 GETCHAR(id, p);
GordonSin 0:0ed2a7c7190c 860 GETSHORT(len, p);
GordonSin 0:0ed2a7c7190c 861 if (len < CHAP_HEADERLEN || len > plen) {
GordonSin 0:0ed2a7c7190c 862 return 0;
GordonSin 0:0ed2a7c7190c 863 }
GordonSin 0:0ed2a7c7190c 864
GordonSin 0:0ed2a7c7190c 865 if (code >= 1 && code <= sizeof(ChapCodenames) / sizeof(char *)) {
GordonSin 0:0ed2a7c7190c 866 printer(arg, " %s", ChapCodenames[code-1]);
GordonSin 0:0ed2a7c7190c 867 } else {
GordonSin 0:0ed2a7c7190c 868 printer(arg, " code=0x%x", code);
GordonSin 0:0ed2a7c7190c 869 }
GordonSin 0:0ed2a7c7190c 870 printer(arg, " id=0x%x", id);
GordonSin 0:0ed2a7c7190c 871 len -= CHAP_HEADERLEN;
GordonSin 0:0ed2a7c7190c 872 switch (code) {
GordonSin 0:0ed2a7c7190c 873 case CHAP_CHALLENGE:
GordonSin 0:0ed2a7c7190c 874 case CHAP_RESPONSE:
GordonSin 0:0ed2a7c7190c 875 if (len < 1) {
GordonSin 0:0ed2a7c7190c 876 break;
GordonSin 0:0ed2a7c7190c 877 }
GordonSin 0:0ed2a7c7190c 878 clen = p[0];
GordonSin 0:0ed2a7c7190c 879 if (len < clen + 1) {
GordonSin 0:0ed2a7c7190c 880 break;
GordonSin 0:0ed2a7c7190c 881 }
GordonSin 0:0ed2a7c7190c 882 ++p;
GordonSin 0:0ed2a7c7190c 883 nlen = len - clen - 1;
GordonSin 0:0ed2a7c7190c 884 printer(arg, " <");
GordonSin 0:0ed2a7c7190c 885 for (; clen > 0; --clen) {
GordonSin 0:0ed2a7c7190c 886 GETCHAR(x, p);
GordonSin 0:0ed2a7c7190c 887 printer(arg, "%.2x", x);
GordonSin 0:0ed2a7c7190c 888 }
GordonSin 0:0ed2a7c7190c 889 printer(arg, ">, name = %.*Z", nlen, p);
GordonSin 0:0ed2a7c7190c 890 break;
GordonSin 0:0ed2a7c7190c 891 case CHAP_FAILURE:
GordonSin 0:0ed2a7c7190c 892 case CHAP_SUCCESS:
GordonSin 0:0ed2a7c7190c 893 printer(arg, " %.*Z", len, p);
GordonSin 0:0ed2a7c7190c 894 break;
GordonSin 0:0ed2a7c7190c 895 default:
GordonSin 0:0ed2a7c7190c 896 for (clen = len; clen > 0; --clen) {
GordonSin 0:0ed2a7c7190c 897 GETCHAR(x, p);
GordonSin 0:0ed2a7c7190c 898 printer(arg, " %.2x", x);
GordonSin 0:0ed2a7c7190c 899 }
GordonSin 0:0ed2a7c7190c 900 }
GordonSin 0:0ed2a7c7190c 901
GordonSin 0:0ed2a7c7190c 902 return len + CHAP_HEADERLEN;
GordonSin 0:0ed2a7c7190c 903 }
GordonSin 0:0ed2a7c7190c 904 #endif /* PPP_ADDITIONAL_CALLBACKS */
GordonSin 0:0ed2a7c7190c 905
GordonSin 0:0ed2a7c7190c 906 #endif /* CHAP_SUPPORT */
GordonSin 0:0ed2a7c7190c 907
GordonSin 0:0ed2a7c7190c 908 #endif /* PPP_SUPPORT */