Daiki Kato / mbed-os-lychee

Dependents:   mbed-os-example-blinky-gr-lychee GR-Boads_Camera_sample GR-Boards_Audio_Recoder GR-Boads_Camera_DisplayApp ... more

Committer:
dkato
Date:
Fri Feb 02 05:42:23 2018 +0000
Revision:
0:f782d9c66c49
mbed-os for GR-LYCHEE

Who changed what in which revision?

UserRevisionLine numberNew contents of line
dkato 0:f782d9c66c49 1 /*
dkato 0:f782d9c66c49 2 * upap.c - User/Password Authentication Protocol.
dkato 0:f782d9c66c49 3 *
dkato 0:f782d9c66c49 4 * Copyright (c) 1984-2000 Carnegie Mellon University. All rights reserved.
dkato 0:f782d9c66c49 5 *
dkato 0:f782d9c66c49 6 * Redistribution and use in source and binary forms, with or without
dkato 0:f782d9c66c49 7 * modification, are permitted provided that the following conditions
dkato 0:f782d9c66c49 8 * are met:
dkato 0:f782d9c66c49 9 *
dkato 0:f782d9c66c49 10 * 1. Redistributions of source code must retain the above copyright
dkato 0:f782d9c66c49 11 * notice, this list of conditions and the following disclaimer.
dkato 0:f782d9c66c49 12 *
dkato 0:f782d9c66c49 13 * 2. Redistributions in binary form must reproduce the above copyright
dkato 0:f782d9c66c49 14 * notice, this list of conditions and the following disclaimer in
dkato 0:f782d9c66c49 15 * the documentation and/or other materials provided with the
dkato 0:f782d9c66c49 16 * distribution.
dkato 0:f782d9c66c49 17 *
dkato 0:f782d9c66c49 18 * 3. The name "Carnegie Mellon University" must not be used to
dkato 0:f782d9c66c49 19 * endorse or promote products derived from this software without
dkato 0:f782d9c66c49 20 * prior written permission. For permission or any legal
dkato 0:f782d9c66c49 21 * details, please contact
dkato 0:f782d9c66c49 22 * Office of Technology Transfer
dkato 0:f782d9c66c49 23 * Carnegie Mellon University
dkato 0:f782d9c66c49 24 * 5000 Forbes Avenue
dkato 0:f782d9c66c49 25 * Pittsburgh, PA 15213-3890
dkato 0:f782d9c66c49 26 * (412) 268-4387, fax: (412) 268-7395
dkato 0:f782d9c66c49 27 * tech-transfer@andrew.cmu.edu
dkato 0:f782d9c66c49 28 *
dkato 0:f782d9c66c49 29 * 4. Redistributions of any form whatsoever must retain the following
dkato 0:f782d9c66c49 30 * acknowledgment:
dkato 0:f782d9c66c49 31 * "This product includes software developed by Computing Services
dkato 0:f782d9c66c49 32 * at Carnegie Mellon University (http://www.cmu.edu/computing/)."
dkato 0:f782d9c66c49 33 *
dkato 0:f782d9c66c49 34 * CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH REGARD TO
dkato 0:f782d9c66c49 35 * THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
dkato 0:f782d9c66c49 36 * AND FITNESS, IN NO EVENT SHALL CARNEGIE MELLON UNIVERSITY BE LIABLE
dkato 0:f782d9c66c49 37 * FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
dkato 0:f782d9c66c49 38 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
dkato 0:f782d9c66c49 39 * AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
dkato 0:f782d9c66c49 40 * OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
dkato 0:f782d9c66c49 41 */
dkato 0:f782d9c66c49 42
dkato 0:f782d9c66c49 43 #include "netif/ppp/ppp_opts.h"
dkato 0:f782d9c66c49 44 #if PPP_SUPPORT && PAP_SUPPORT /* don't build if not configured for use in lwipopts.h */
dkato 0:f782d9c66c49 45
dkato 0:f782d9c66c49 46 /*
dkato 0:f782d9c66c49 47 * @todo:
dkato 0:f782d9c66c49 48 */
dkato 0:f782d9c66c49 49
dkato 0:f782d9c66c49 50 #if 0 /* UNUSED */
dkato 0:f782d9c66c49 51 #include <stdio.h>
dkato 0:f782d9c66c49 52 #include <string.h>
dkato 0:f782d9c66c49 53 #endif /* UNUSED */
dkato 0:f782d9c66c49 54
dkato 0:f782d9c66c49 55 #include "netif/ppp/ppp_impl.h"
dkato 0:f782d9c66c49 56
dkato 0:f782d9c66c49 57 #include "netif/ppp/upap.h"
dkato 0:f782d9c66c49 58
dkato 0:f782d9c66c49 59 #if PPP_OPTIONS
dkato 0:f782d9c66c49 60 /*
dkato 0:f782d9c66c49 61 * Command-line options.
dkato 0:f782d9c66c49 62 */
dkato 0:f782d9c66c49 63 static option_t pap_option_list[] = {
dkato 0:f782d9c66c49 64 { "hide-password", o_bool, &hide_password,
dkato 0:f782d9c66c49 65 "Don't output passwords to log", OPT_PRIO | 1 },
dkato 0:f782d9c66c49 66 { "show-password", o_bool, &hide_password,
dkato 0:f782d9c66c49 67 "Show password string in debug log messages", OPT_PRIOSUB | 0 },
dkato 0:f782d9c66c49 68
dkato 0:f782d9c66c49 69 { "pap-restart", o_int, &upap[0].us_timeouttime,
dkato 0:f782d9c66c49 70 "Set retransmit timeout for PAP", OPT_PRIO },
dkato 0:f782d9c66c49 71 { "pap-max-authreq", o_int, &upap[0].us_maxtransmits,
dkato 0:f782d9c66c49 72 "Set max number of transmissions for auth-reqs", OPT_PRIO },
dkato 0:f782d9c66c49 73 { "pap-timeout", o_int, &upap[0].us_reqtimeout,
dkato 0:f782d9c66c49 74 "Set time limit for peer PAP authentication", OPT_PRIO },
dkato 0:f782d9c66c49 75
dkato 0:f782d9c66c49 76 { NULL }
dkato 0:f782d9c66c49 77 };
dkato 0:f782d9c66c49 78 #endif /* PPP_OPTIONS */
dkato 0:f782d9c66c49 79
dkato 0:f782d9c66c49 80 /*
dkato 0:f782d9c66c49 81 * Protocol entry points.
dkato 0:f782d9c66c49 82 */
dkato 0:f782d9c66c49 83 static void upap_init(ppp_pcb *pcb);
dkato 0:f782d9c66c49 84 static void upap_lowerup(ppp_pcb *pcb);
dkato 0:f782d9c66c49 85 static void upap_lowerdown(ppp_pcb *pcb);
dkato 0:f782d9c66c49 86 static void upap_input(ppp_pcb *pcb, u_char *inpacket, int l);
dkato 0:f782d9c66c49 87 static void upap_protrej(ppp_pcb *pcb);
dkato 0:f782d9c66c49 88 #if PRINTPKT_SUPPORT
dkato 0:f782d9c66c49 89 static int upap_printpkt(const u_char *p, int plen, void (*printer) (void *, const char *, ...), void *arg);
dkato 0:f782d9c66c49 90 #endif /* PRINTPKT_SUPPORT */
dkato 0:f782d9c66c49 91
dkato 0:f782d9c66c49 92 const struct protent pap_protent = {
dkato 0:f782d9c66c49 93 PPP_PAP,
dkato 0:f782d9c66c49 94 upap_init,
dkato 0:f782d9c66c49 95 upap_input,
dkato 0:f782d9c66c49 96 upap_protrej,
dkato 0:f782d9c66c49 97 upap_lowerup,
dkato 0:f782d9c66c49 98 upap_lowerdown,
dkato 0:f782d9c66c49 99 NULL,
dkato 0:f782d9c66c49 100 NULL,
dkato 0:f782d9c66c49 101 #if PRINTPKT_SUPPORT
dkato 0:f782d9c66c49 102 upap_printpkt,
dkato 0:f782d9c66c49 103 #endif /* PRINTPKT_SUPPORT */
dkato 0:f782d9c66c49 104 #if PPP_DATAINPUT
dkato 0:f782d9c66c49 105 NULL,
dkato 0:f782d9c66c49 106 #endif /* PPP_DATAINPUT */
dkato 0:f782d9c66c49 107 #if PRINTPKT_SUPPORT
dkato 0:f782d9c66c49 108 "PAP",
dkato 0:f782d9c66c49 109 NULL,
dkato 0:f782d9c66c49 110 #endif /* PRINTPKT_SUPPORT */
dkato 0:f782d9c66c49 111 #if PPP_OPTIONS
dkato 0:f782d9c66c49 112 pap_option_list,
dkato 0:f782d9c66c49 113 NULL,
dkato 0:f782d9c66c49 114 #endif /* PPP_OPTIONS */
dkato 0:f782d9c66c49 115 #if DEMAND_SUPPORT
dkato 0:f782d9c66c49 116 NULL,
dkato 0:f782d9c66c49 117 NULL
dkato 0:f782d9c66c49 118 #endif /* DEMAND_SUPPORT */
dkato 0:f782d9c66c49 119 };
dkato 0:f782d9c66c49 120
dkato 0:f782d9c66c49 121 static void upap_timeout(void *arg);
dkato 0:f782d9c66c49 122 #if PPP_SERVER
dkato 0:f782d9c66c49 123 static void upap_reqtimeout(void *arg);
dkato 0:f782d9c66c49 124 static void upap_rauthreq(ppp_pcb *pcb, u_char *inp, int id, int len);
dkato 0:f782d9c66c49 125 #endif /* PPP_SERVER */
dkato 0:f782d9c66c49 126 static void upap_rauthack(ppp_pcb *pcb, u_char *inp, int id, int len);
dkato 0:f782d9c66c49 127 static void upap_rauthnak(ppp_pcb *pcb, u_char *inp, int id, int len);
dkato 0:f782d9c66c49 128 static void upap_sauthreq(ppp_pcb *pcb);
dkato 0:f782d9c66c49 129 #if PPP_SERVER
dkato 0:f782d9c66c49 130 static void upap_sresp(ppp_pcb *pcb, u_char code, u_char id, const char *msg, int msglen);
dkato 0:f782d9c66c49 131 #endif /* PPP_SERVER */
dkato 0:f782d9c66c49 132
dkato 0:f782d9c66c49 133
dkato 0:f782d9c66c49 134 /*
dkato 0:f782d9c66c49 135 * upap_init - Initialize a UPAP unit.
dkato 0:f782d9c66c49 136 */
dkato 0:f782d9c66c49 137 static void upap_init(ppp_pcb *pcb) {
dkato 0:f782d9c66c49 138 pcb->upap.us_user = NULL;
dkato 0:f782d9c66c49 139 pcb->upap.us_userlen = 0;
dkato 0:f782d9c66c49 140 pcb->upap.us_passwd = NULL;
dkato 0:f782d9c66c49 141 pcb->upap.us_passwdlen = 0;
dkato 0:f782d9c66c49 142 pcb->upap.us_clientstate = UPAPCS_INITIAL;
dkato 0:f782d9c66c49 143 #if PPP_SERVER
dkato 0:f782d9c66c49 144 pcb->upap.us_serverstate = UPAPSS_INITIAL;
dkato 0:f782d9c66c49 145 #endif /* PPP_SERVER */
dkato 0:f782d9c66c49 146 pcb->upap.us_id = 0;
dkato 0:f782d9c66c49 147 }
dkato 0:f782d9c66c49 148
dkato 0:f782d9c66c49 149
dkato 0:f782d9c66c49 150 /*
dkato 0:f782d9c66c49 151 * upap_authwithpeer - Authenticate us with our peer (start client).
dkato 0:f782d9c66c49 152 *
dkato 0:f782d9c66c49 153 * Set new state and send authenticate's.
dkato 0:f782d9c66c49 154 */
dkato 0:f782d9c66c49 155 void upap_authwithpeer(ppp_pcb *pcb, const char *user, const char *password) {
dkato 0:f782d9c66c49 156
dkato 0:f782d9c66c49 157 if(!user || !password)
dkato 0:f782d9c66c49 158 return;
dkato 0:f782d9c66c49 159
dkato 0:f782d9c66c49 160 /* Save the username and password we're given */
dkato 0:f782d9c66c49 161 pcb->upap.us_user = user;
dkato 0:f782d9c66c49 162 pcb->upap.us_userlen = LWIP_MIN(strlen(user), 0xff);
dkato 0:f782d9c66c49 163 pcb->upap.us_passwd = password;
dkato 0:f782d9c66c49 164 pcb->upap.us_passwdlen = LWIP_MIN(strlen(password), 0xff);
dkato 0:f782d9c66c49 165 pcb->upap.us_transmits = 0;
dkato 0:f782d9c66c49 166
dkato 0:f782d9c66c49 167 /* Lower layer up yet? */
dkato 0:f782d9c66c49 168 if (pcb->upap.us_clientstate == UPAPCS_INITIAL ||
dkato 0:f782d9c66c49 169 pcb->upap.us_clientstate == UPAPCS_PENDING) {
dkato 0:f782d9c66c49 170 pcb->upap.us_clientstate = UPAPCS_PENDING;
dkato 0:f782d9c66c49 171 return;
dkato 0:f782d9c66c49 172 }
dkato 0:f782d9c66c49 173
dkato 0:f782d9c66c49 174 upap_sauthreq(pcb); /* Start protocol */
dkato 0:f782d9c66c49 175 }
dkato 0:f782d9c66c49 176
dkato 0:f782d9c66c49 177 #if PPP_SERVER
dkato 0:f782d9c66c49 178 /*
dkato 0:f782d9c66c49 179 * upap_authpeer - Authenticate our peer (start server).
dkato 0:f782d9c66c49 180 *
dkato 0:f782d9c66c49 181 * Set new state.
dkato 0:f782d9c66c49 182 */
dkato 0:f782d9c66c49 183 void upap_authpeer(ppp_pcb *pcb) {
dkato 0:f782d9c66c49 184
dkato 0:f782d9c66c49 185 /* Lower layer up yet? */
dkato 0:f782d9c66c49 186 if (pcb->upap.us_serverstate == UPAPSS_INITIAL ||
dkato 0:f782d9c66c49 187 pcb->upap.us_serverstate == UPAPSS_PENDING) {
dkato 0:f782d9c66c49 188 pcb->upap.us_serverstate = UPAPSS_PENDING;
dkato 0:f782d9c66c49 189 return;
dkato 0:f782d9c66c49 190 }
dkato 0:f782d9c66c49 191
dkato 0:f782d9c66c49 192 pcb->upap.us_serverstate = UPAPSS_LISTEN;
dkato 0:f782d9c66c49 193 if (pcb->settings.pap_req_timeout > 0)
dkato 0:f782d9c66c49 194 TIMEOUT(upap_reqtimeout, pcb, pcb->settings.pap_req_timeout);
dkato 0:f782d9c66c49 195 }
dkato 0:f782d9c66c49 196 #endif /* PPP_SERVER */
dkato 0:f782d9c66c49 197
dkato 0:f782d9c66c49 198 /*
dkato 0:f782d9c66c49 199 * upap_timeout - Retransmission timer for sending auth-reqs expired.
dkato 0:f782d9c66c49 200 */
dkato 0:f782d9c66c49 201 static void upap_timeout(void *arg) {
dkato 0:f782d9c66c49 202 ppp_pcb *pcb = (ppp_pcb*)arg;
dkato 0:f782d9c66c49 203
dkato 0:f782d9c66c49 204 if (pcb->upap.us_clientstate != UPAPCS_AUTHREQ)
dkato 0:f782d9c66c49 205 return;
dkato 0:f782d9c66c49 206
dkato 0:f782d9c66c49 207 if (pcb->upap.us_transmits >= pcb->settings.pap_max_transmits) {
dkato 0:f782d9c66c49 208 /* give up in disgust */
dkato 0:f782d9c66c49 209 ppp_error("No response to PAP authenticate-requests");
dkato 0:f782d9c66c49 210 pcb->upap.us_clientstate = UPAPCS_BADAUTH;
dkato 0:f782d9c66c49 211 auth_withpeer_fail(pcb, PPP_PAP);
dkato 0:f782d9c66c49 212 return;
dkato 0:f782d9c66c49 213 }
dkato 0:f782d9c66c49 214
dkato 0:f782d9c66c49 215 upap_sauthreq(pcb); /* Send Authenticate-Request */
dkato 0:f782d9c66c49 216 }
dkato 0:f782d9c66c49 217
dkato 0:f782d9c66c49 218
dkato 0:f782d9c66c49 219 #if PPP_SERVER
dkato 0:f782d9c66c49 220 /*
dkato 0:f782d9c66c49 221 * upap_reqtimeout - Give up waiting for the peer to send an auth-req.
dkato 0:f782d9c66c49 222 */
dkato 0:f782d9c66c49 223 static void upap_reqtimeout(void *arg) {
dkato 0:f782d9c66c49 224 ppp_pcb *pcb = (ppp_pcb*)arg;
dkato 0:f782d9c66c49 225
dkato 0:f782d9c66c49 226 if (pcb->upap.us_serverstate != UPAPSS_LISTEN)
dkato 0:f782d9c66c49 227 return; /* huh?? */
dkato 0:f782d9c66c49 228
dkato 0:f782d9c66c49 229 auth_peer_fail(pcb, PPP_PAP);
dkato 0:f782d9c66c49 230 pcb->upap.us_serverstate = UPAPSS_BADAUTH;
dkato 0:f782d9c66c49 231 }
dkato 0:f782d9c66c49 232 #endif /* PPP_SERVER */
dkato 0:f782d9c66c49 233
dkato 0:f782d9c66c49 234
dkato 0:f782d9c66c49 235 /*
dkato 0:f782d9c66c49 236 * upap_lowerup - The lower layer is up.
dkato 0:f782d9c66c49 237 *
dkato 0:f782d9c66c49 238 * Start authenticating if pending.
dkato 0:f782d9c66c49 239 */
dkato 0:f782d9c66c49 240 static void upap_lowerup(ppp_pcb *pcb) {
dkato 0:f782d9c66c49 241
dkato 0:f782d9c66c49 242 if (pcb->upap.us_clientstate == UPAPCS_INITIAL)
dkato 0:f782d9c66c49 243 pcb->upap.us_clientstate = UPAPCS_CLOSED;
dkato 0:f782d9c66c49 244 else if (pcb->upap.us_clientstate == UPAPCS_PENDING) {
dkato 0:f782d9c66c49 245 upap_sauthreq(pcb); /* send an auth-request */
dkato 0:f782d9c66c49 246 }
dkato 0:f782d9c66c49 247
dkato 0:f782d9c66c49 248 #if PPP_SERVER
dkato 0:f782d9c66c49 249 if (pcb->upap.us_serverstate == UPAPSS_INITIAL)
dkato 0:f782d9c66c49 250 pcb->upap.us_serverstate = UPAPSS_CLOSED;
dkato 0:f782d9c66c49 251 else if (pcb->upap.us_serverstate == UPAPSS_PENDING) {
dkato 0:f782d9c66c49 252 pcb->upap.us_serverstate = UPAPSS_LISTEN;
dkato 0:f782d9c66c49 253 if (pcb->settings.pap_req_timeout > 0)
dkato 0:f782d9c66c49 254 TIMEOUT(upap_reqtimeout, pcb, pcb->settings.pap_req_timeout);
dkato 0:f782d9c66c49 255 }
dkato 0:f782d9c66c49 256 #endif /* PPP_SERVER */
dkato 0:f782d9c66c49 257 }
dkato 0:f782d9c66c49 258
dkato 0:f782d9c66c49 259
dkato 0:f782d9c66c49 260 /*
dkato 0:f782d9c66c49 261 * upap_lowerdown - The lower layer is down.
dkato 0:f782d9c66c49 262 *
dkato 0:f782d9c66c49 263 * Cancel all timeouts.
dkato 0:f782d9c66c49 264 */
dkato 0:f782d9c66c49 265 static void upap_lowerdown(ppp_pcb *pcb) {
dkato 0:f782d9c66c49 266
dkato 0:f782d9c66c49 267 if (pcb->upap.us_clientstate == UPAPCS_AUTHREQ) /* Timeout pending? */
dkato 0:f782d9c66c49 268 UNTIMEOUT(upap_timeout, pcb); /* Cancel timeout */
dkato 0:f782d9c66c49 269 #if PPP_SERVER
dkato 0:f782d9c66c49 270 if (pcb->upap.us_serverstate == UPAPSS_LISTEN && pcb->settings.pap_req_timeout > 0)
dkato 0:f782d9c66c49 271 UNTIMEOUT(upap_reqtimeout, pcb);
dkato 0:f782d9c66c49 272 #endif /* PPP_SERVER */
dkato 0:f782d9c66c49 273
dkato 0:f782d9c66c49 274 pcb->upap.us_clientstate = UPAPCS_INITIAL;
dkato 0:f782d9c66c49 275 #if PPP_SERVER
dkato 0:f782d9c66c49 276 pcb->upap.us_serverstate = UPAPSS_INITIAL;
dkato 0:f782d9c66c49 277 #endif /* PPP_SERVER */
dkato 0:f782d9c66c49 278 }
dkato 0:f782d9c66c49 279
dkato 0:f782d9c66c49 280
dkato 0:f782d9c66c49 281 /*
dkato 0:f782d9c66c49 282 * upap_protrej - Peer doesn't speak this protocol.
dkato 0:f782d9c66c49 283 *
dkato 0:f782d9c66c49 284 * This shouldn't happen. In any case, pretend lower layer went down.
dkato 0:f782d9c66c49 285 */
dkato 0:f782d9c66c49 286 static void upap_protrej(ppp_pcb *pcb) {
dkato 0:f782d9c66c49 287
dkato 0:f782d9c66c49 288 if (pcb->upap.us_clientstate == UPAPCS_AUTHREQ) {
dkato 0:f782d9c66c49 289 ppp_error("PAP authentication failed due to protocol-reject");
dkato 0:f782d9c66c49 290 auth_withpeer_fail(pcb, PPP_PAP);
dkato 0:f782d9c66c49 291 }
dkato 0:f782d9c66c49 292 #if PPP_SERVER
dkato 0:f782d9c66c49 293 if (pcb->upap.us_serverstate == UPAPSS_LISTEN) {
dkato 0:f782d9c66c49 294 ppp_error("PAP authentication of peer failed (protocol-reject)");
dkato 0:f782d9c66c49 295 auth_peer_fail(pcb, PPP_PAP);
dkato 0:f782d9c66c49 296 }
dkato 0:f782d9c66c49 297 #endif /* PPP_SERVER */
dkato 0:f782d9c66c49 298 upap_lowerdown(pcb);
dkato 0:f782d9c66c49 299 }
dkato 0:f782d9c66c49 300
dkato 0:f782d9c66c49 301
dkato 0:f782d9c66c49 302 /*
dkato 0:f782d9c66c49 303 * upap_input - Input UPAP packet.
dkato 0:f782d9c66c49 304 */
dkato 0:f782d9c66c49 305 static void upap_input(ppp_pcb *pcb, u_char *inpacket, int l) {
dkato 0:f782d9c66c49 306 u_char *inp;
dkato 0:f782d9c66c49 307 u_char code, id;
dkato 0:f782d9c66c49 308 int len;
dkato 0:f782d9c66c49 309
dkato 0:f782d9c66c49 310 /*
dkato 0:f782d9c66c49 311 * Parse header (code, id and length).
dkato 0:f782d9c66c49 312 * If packet too short, drop it.
dkato 0:f782d9c66c49 313 */
dkato 0:f782d9c66c49 314 inp = inpacket;
dkato 0:f782d9c66c49 315 if (l < UPAP_HEADERLEN) {
dkato 0:f782d9c66c49 316 UPAPDEBUG(("pap_input: rcvd short header."));
dkato 0:f782d9c66c49 317 return;
dkato 0:f782d9c66c49 318 }
dkato 0:f782d9c66c49 319 GETCHAR(code, inp);
dkato 0:f782d9c66c49 320 GETCHAR(id, inp);
dkato 0:f782d9c66c49 321 GETSHORT(len, inp);
dkato 0:f782d9c66c49 322 if (len < UPAP_HEADERLEN) {
dkato 0:f782d9c66c49 323 UPAPDEBUG(("pap_input: rcvd illegal length."));
dkato 0:f782d9c66c49 324 return;
dkato 0:f782d9c66c49 325 }
dkato 0:f782d9c66c49 326 if (len > l) {
dkato 0:f782d9c66c49 327 UPAPDEBUG(("pap_input: rcvd short packet."));
dkato 0:f782d9c66c49 328 return;
dkato 0:f782d9c66c49 329 }
dkato 0:f782d9c66c49 330 len -= UPAP_HEADERLEN;
dkato 0:f782d9c66c49 331
dkato 0:f782d9c66c49 332 /*
dkato 0:f782d9c66c49 333 * Action depends on code.
dkato 0:f782d9c66c49 334 */
dkato 0:f782d9c66c49 335 switch (code) {
dkato 0:f782d9c66c49 336 case UPAP_AUTHREQ:
dkato 0:f782d9c66c49 337 #if PPP_SERVER
dkato 0:f782d9c66c49 338 upap_rauthreq(pcb, inp, id, len);
dkato 0:f782d9c66c49 339 #endif /* PPP_SERVER */
dkato 0:f782d9c66c49 340 break;
dkato 0:f782d9c66c49 341
dkato 0:f782d9c66c49 342 case UPAP_AUTHACK:
dkato 0:f782d9c66c49 343 upap_rauthack(pcb, inp, id, len);
dkato 0:f782d9c66c49 344 break;
dkato 0:f782d9c66c49 345
dkato 0:f782d9c66c49 346 case UPAP_AUTHNAK:
dkato 0:f782d9c66c49 347 upap_rauthnak(pcb, inp, id, len);
dkato 0:f782d9c66c49 348 break;
dkato 0:f782d9c66c49 349
dkato 0:f782d9c66c49 350 default: /* XXX Need code reject */
dkato 0:f782d9c66c49 351 break;
dkato 0:f782d9c66c49 352 }
dkato 0:f782d9c66c49 353 }
dkato 0:f782d9c66c49 354
dkato 0:f782d9c66c49 355 #if PPP_SERVER
dkato 0:f782d9c66c49 356 /*
dkato 0:f782d9c66c49 357 * upap_rauth - Receive Authenticate.
dkato 0:f782d9c66c49 358 */
dkato 0:f782d9c66c49 359 static void upap_rauthreq(ppp_pcb *pcb, u_char *inp, int id, int len) {
dkato 0:f782d9c66c49 360 u_char ruserlen, rpasswdlen;
dkato 0:f782d9c66c49 361 char *ruser;
dkato 0:f782d9c66c49 362 char *rpasswd;
dkato 0:f782d9c66c49 363 char rhostname[256];
dkato 0:f782d9c66c49 364 int retcode;
dkato 0:f782d9c66c49 365 const char *msg;
dkato 0:f782d9c66c49 366 int msglen;
dkato 0:f782d9c66c49 367
dkato 0:f782d9c66c49 368 if (pcb->upap.us_serverstate < UPAPSS_LISTEN)
dkato 0:f782d9c66c49 369 return;
dkato 0:f782d9c66c49 370
dkato 0:f782d9c66c49 371 /*
dkato 0:f782d9c66c49 372 * If we receive a duplicate authenticate-request, we are
dkato 0:f782d9c66c49 373 * supposed to return the same status as for the first request.
dkato 0:f782d9c66c49 374 */
dkato 0:f782d9c66c49 375 if (pcb->upap.us_serverstate == UPAPSS_OPEN) {
dkato 0:f782d9c66c49 376 upap_sresp(pcb, UPAP_AUTHACK, id, "", 0); /* return auth-ack */
dkato 0:f782d9c66c49 377 return;
dkato 0:f782d9c66c49 378 }
dkato 0:f782d9c66c49 379 if (pcb->upap.us_serverstate == UPAPSS_BADAUTH) {
dkato 0:f782d9c66c49 380 upap_sresp(pcb, UPAP_AUTHNAK, id, "", 0); /* return auth-nak */
dkato 0:f782d9c66c49 381 return;
dkato 0:f782d9c66c49 382 }
dkato 0:f782d9c66c49 383
dkato 0:f782d9c66c49 384 /*
dkato 0:f782d9c66c49 385 * Parse user/passwd.
dkato 0:f782d9c66c49 386 */
dkato 0:f782d9c66c49 387 if (len < 1) {
dkato 0:f782d9c66c49 388 UPAPDEBUG(("pap_rauth: rcvd short packet."));
dkato 0:f782d9c66c49 389 return;
dkato 0:f782d9c66c49 390 }
dkato 0:f782d9c66c49 391 GETCHAR(ruserlen, inp);
dkato 0:f782d9c66c49 392 len -= sizeof (u_char) + ruserlen + sizeof (u_char);
dkato 0:f782d9c66c49 393 if (len < 0) {
dkato 0:f782d9c66c49 394 UPAPDEBUG(("pap_rauth: rcvd short packet."));
dkato 0:f782d9c66c49 395 return;
dkato 0:f782d9c66c49 396 }
dkato 0:f782d9c66c49 397 ruser = (char *) inp;
dkato 0:f782d9c66c49 398 INCPTR(ruserlen, inp);
dkato 0:f782d9c66c49 399 GETCHAR(rpasswdlen, inp);
dkato 0:f782d9c66c49 400 if (len < rpasswdlen) {
dkato 0:f782d9c66c49 401 UPAPDEBUG(("pap_rauth: rcvd short packet."));
dkato 0:f782d9c66c49 402 return;
dkato 0:f782d9c66c49 403 }
dkato 0:f782d9c66c49 404
dkato 0:f782d9c66c49 405 rpasswd = (char *) inp;
dkato 0:f782d9c66c49 406
dkato 0:f782d9c66c49 407 /*
dkato 0:f782d9c66c49 408 * Check the username and password given.
dkato 0:f782d9c66c49 409 */
dkato 0:f782d9c66c49 410 retcode = UPAP_AUTHNAK;
dkato 0:f782d9c66c49 411 if (auth_check_passwd(pcb, ruser, ruserlen, rpasswd, rpasswdlen, &msg, &msglen)) {
dkato 0:f782d9c66c49 412 retcode = UPAP_AUTHACK;
dkato 0:f782d9c66c49 413 }
dkato 0:f782d9c66c49 414 BZERO(rpasswd, rpasswdlen);
dkato 0:f782d9c66c49 415
dkato 0:f782d9c66c49 416 #if 0 /* UNUSED */
dkato 0:f782d9c66c49 417 /*
dkato 0:f782d9c66c49 418 * Check remote number authorization. A plugin may have filled in
dkato 0:f782d9c66c49 419 * the remote number or added an allowed number, and rather than
dkato 0:f782d9c66c49 420 * return an authenticate failure, is leaving it for us to verify.
dkato 0:f782d9c66c49 421 */
dkato 0:f782d9c66c49 422 if (retcode == UPAP_AUTHACK) {
dkato 0:f782d9c66c49 423 if (!auth_number()) {
dkato 0:f782d9c66c49 424 /* We do not want to leak info about the pap result. */
dkato 0:f782d9c66c49 425 retcode = UPAP_AUTHNAK; /* XXX exit value will be "wrong" */
dkato 0:f782d9c66c49 426 warn("calling number %q is not authorized", remote_number);
dkato 0:f782d9c66c49 427 }
dkato 0:f782d9c66c49 428 }
dkato 0:f782d9c66c49 429
dkato 0:f782d9c66c49 430 msglen = strlen(msg);
dkato 0:f782d9c66c49 431 if (msglen > 255)
dkato 0:f782d9c66c49 432 msglen = 255;
dkato 0:f782d9c66c49 433 #endif /* UNUSED */
dkato 0:f782d9c66c49 434
dkato 0:f782d9c66c49 435 upap_sresp(pcb, retcode, id, msg, msglen);
dkato 0:f782d9c66c49 436
dkato 0:f782d9c66c49 437 /* Null terminate and clean remote name. */
dkato 0:f782d9c66c49 438 ppp_slprintf(rhostname, sizeof(rhostname), "%.*v", ruserlen, ruser);
dkato 0:f782d9c66c49 439
dkato 0:f782d9c66c49 440 if (retcode == UPAP_AUTHACK) {
dkato 0:f782d9c66c49 441 pcb->upap.us_serverstate = UPAPSS_OPEN;
dkato 0:f782d9c66c49 442 ppp_notice("PAP peer authentication succeeded for %q", rhostname);
dkato 0:f782d9c66c49 443 auth_peer_success(pcb, PPP_PAP, 0, ruser, ruserlen);
dkato 0:f782d9c66c49 444 } else {
dkato 0:f782d9c66c49 445 pcb->upap.us_serverstate = UPAPSS_BADAUTH;
dkato 0:f782d9c66c49 446 ppp_warn("PAP peer authentication failed for %q", rhostname);
dkato 0:f782d9c66c49 447 auth_peer_fail(pcb, PPP_PAP);
dkato 0:f782d9c66c49 448 }
dkato 0:f782d9c66c49 449
dkato 0:f782d9c66c49 450 if (pcb->settings.pap_req_timeout > 0)
dkato 0:f782d9c66c49 451 UNTIMEOUT(upap_reqtimeout, pcb);
dkato 0:f782d9c66c49 452 }
dkato 0:f782d9c66c49 453 #endif /* PPP_SERVER */
dkato 0:f782d9c66c49 454
dkato 0:f782d9c66c49 455 /*
dkato 0:f782d9c66c49 456 * upap_rauthack - Receive Authenticate-Ack.
dkato 0:f782d9c66c49 457 */
dkato 0:f782d9c66c49 458 static void upap_rauthack(ppp_pcb *pcb, u_char *inp, int id, int len) {
dkato 0:f782d9c66c49 459 u_char msglen;
dkato 0:f782d9c66c49 460 char *msg;
dkato 0:f782d9c66c49 461 LWIP_UNUSED_ARG(id);
dkato 0:f782d9c66c49 462
dkato 0:f782d9c66c49 463 if (pcb->upap.us_clientstate != UPAPCS_AUTHREQ) /* XXX */
dkato 0:f782d9c66c49 464 return;
dkato 0:f782d9c66c49 465
dkato 0:f782d9c66c49 466 /*
dkato 0:f782d9c66c49 467 * Parse message.
dkato 0:f782d9c66c49 468 */
dkato 0:f782d9c66c49 469 if (len < 1) {
dkato 0:f782d9c66c49 470 UPAPDEBUG(("pap_rauthack: ignoring missing msg-length."));
dkato 0:f782d9c66c49 471 } else {
dkato 0:f782d9c66c49 472 GETCHAR(msglen, inp);
dkato 0:f782d9c66c49 473 if (msglen > 0) {
dkato 0:f782d9c66c49 474 len -= sizeof (u_char);
dkato 0:f782d9c66c49 475 if (len < msglen) {
dkato 0:f782d9c66c49 476 UPAPDEBUG(("pap_rauthack: rcvd short packet."));
dkato 0:f782d9c66c49 477 return;
dkato 0:f782d9c66c49 478 }
dkato 0:f782d9c66c49 479 msg = (char *) inp;
dkato 0:f782d9c66c49 480 PRINTMSG(msg, msglen);
dkato 0:f782d9c66c49 481 }
dkato 0:f782d9c66c49 482 }
dkato 0:f782d9c66c49 483
dkato 0:f782d9c66c49 484 pcb->upap.us_clientstate = UPAPCS_OPEN;
dkato 0:f782d9c66c49 485
dkato 0:f782d9c66c49 486 auth_withpeer_success(pcb, PPP_PAP, 0);
dkato 0:f782d9c66c49 487 }
dkato 0:f782d9c66c49 488
dkato 0:f782d9c66c49 489
dkato 0:f782d9c66c49 490 /*
dkato 0:f782d9c66c49 491 * upap_rauthnak - Receive Authenticate-Nak.
dkato 0:f782d9c66c49 492 */
dkato 0:f782d9c66c49 493 static void upap_rauthnak(ppp_pcb *pcb, u_char *inp, int id, int len) {
dkato 0:f782d9c66c49 494 u_char msglen;
dkato 0:f782d9c66c49 495 char *msg;
dkato 0:f782d9c66c49 496 LWIP_UNUSED_ARG(id);
dkato 0:f782d9c66c49 497
dkato 0:f782d9c66c49 498 if (pcb->upap.us_clientstate != UPAPCS_AUTHREQ) /* XXX */
dkato 0:f782d9c66c49 499 return;
dkato 0:f782d9c66c49 500
dkato 0:f782d9c66c49 501 /*
dkato 0:f782d9c66c49 502 * Parse message.
dkato 0:f782d9c66c49 503 */
dkato 0:f782d9c66c49 504 if (len < 1) {
dkato 0:f782d9c66c49 505 UPAPDEBUG(("pap_rauthnak: ignoring missing msg-length."));
dkato 0:f782d9c66c49 506 } else {
dkato 0:f782d9c66c49 507 GETCHAR(msglen, inp);
dkato 0:f782d9c66c49 508 if (msglen > 0) {
dkato 0:f782d9c66c49 509 len -= sizeof (u_char);
dkato 0:f782d9c66c49 510 if (len < msglen) {
dkato 0:f782d9c66c49 511 UPAPDEBUG(("pap_rauthnak: rcvd short packet."));
dkato 0:f782d9c66c49 512 return;
dkato 0:f782d9c66c49 513 }
dkato 0:f782d9c66c49 514 msg = (char *) inp;
dkato 0:f782d9c66c49 515 PRINTMSG(msg, msglen);
dkato 0:f782d9c66c49 516 }
dkato 0:f782d9c66c49 517 }
dkato 0:f782d9c66c49 518
dkato 0:f782d9c66c49 519 pcb->upap.us_clientstate = UPAPCS_BADAUTH;
dkato 0:f782d9c66c49 520
dkato 0:f782d9c66c49 521 ppp_error("PAP authentication failed");
dkato 0:f782d9c66c49 522 auth_withpeer_fail(pcb, PPP_PAP);
dkato 0:f782d9c66c49 523 }
dkato 0:f782d9c66c49 524
dkato 0:f782d9c66c49 525
dkato 0:f782d9c66c49 526 /*
dkato 0:f782d9c66c49 527 * upap_sauthreq - Send an Authenticate-Request.
dkato 0:f782d9c66c49 528 */
dkato 0:f782d9c66c49 529 static void upap_sauthreq(ppp_pcb *pcb) {
dkato 0:f782d9c66c49 530 struct pbuf *p;
dkato 0:f782d9c66c49 531 u_char *outp;
dkato 0:f782d9c66c49 532 int outlen;
dkato 0:f782d9c66c49 533
dkato 0:f782d9c66c49 534 outlen = UPAP_HEADERLEN + 2 * sizeof (u_char) +
dkato 0:f782d9c66c49 535 pcb->upap.us_userlen + pcb->upap.us_passwdlen;
dkato 0:f782d9c66c49 536 p = pbuf_alloc(PBUF_RAW, (u16_t)(PPP_HDRLEN +outlen), PPP_CTRL_PBUF_TYPE);
dkato 0:f782d9c66c49 537 if(NULL == p)
dkato 0:f782d9c66c49 538 return;
dkato 0:f782d9c66c49 539 if(p->tot_len != p->len) {
dkato 0:f782d9c66c49 540 pbuf_free(p);
dkato 0:f782d9c66c49 541 return;
dkato 0:f782d9c66c49 542 }
dkato 0:f782d9c66c49 543
dkato 0:f782d9c66c49 544 outp = (u_char*)p->payload;
dkato 0:f782d9c66c49 545 MAKEHEADER(outp, PPP_PAP);
dkato 0:f782d9c66c49 546
dkato 0:f782d9c66c49 547 PUTCHAR(UPAP_AUTHREQ, outp);
dkato 0:f782d9c66c49 548 PUTCHAR(++pcb->upap.us_id, outp);
dkato 0:f782d9c66c49 549 PUTSHORT(outlen, outp);
dkato 0:f782d9c66c49 550 PUTCHAR(pcb->upap.us_userlen, outp);
dkato 0:f782d9c66c49 551 MEMCPY(outp, pcb->upap.us_user, pcb->upap.us_userlen);
dkato 0:f782d9c66c49 552 INCPTR(pcb->upap.us_userlen, outp);
dkato 0:f782d9c66c49 553 PUTCHAR(pcb->upap.us_passwdlen, outp);
dkato 0:f782d9c66c49 554 MEMCPY(outp, pcb->upap.us_passwd, pcb->upap.us_passwdlen);
dkato 0:f782d9c66c49 555
dkato 0:f782d9c66c49 556 ppp_write(pcb, p);
dkato 0:f782d9c66c49 557
dkato 0:f782d9c66c49 558 TIMEOUT(upap_timeout, pcb, pcb->settings.pap_timeout_time);
dkato 0:f782d9c66c49 559 ++pcb->upap.us_transmits;
dkato 0:f782d9c66c49 560 pcb->upap.us_clientstate = UPAPCS_AUTHREQ;
dkato 0:f782d9c66c49 561 }
dkato 0:f782d9c66c49 562
dkato 0:f782d9c66c49 563 #if PPP_SERVER
dkato 0:f782d9c66c49 564 /*
dkato 0:f782d9c66c49 565 * upap_sresp - Send a response (ack or nak).
dkato 0:f782d9c66c49 566 */
dkato 0:f782d9c66c49 567 static void upap_sresp(ppp_pcb *pcb, u_char code, u_char id, const char *msg, int msglen) {
dkato 0:f782d9c66c49 568 struct pbuf *p;
dkato 0:f782d9c66c49 569 u_char *outp;
dkato 0:f782d9c66c49 570 int outlen;
dkato 0:f782d9c66c49 571
dkato 0:f782d9c66c49 572 outlen = UPAP_HEADERLEN + sizeof (u_char) + msglen;
dkato 0:f782d9c66c49 573 p = pbuf_alloc(PBUF_RAW, (u16_t)(PPP_HDRLEN +outlen), PPP_CTRL_PBUF_TYPE);
dkato 0:f782d9c66c49 574 if(NULL == p)
dkato 0:f782d9c66c49 575 return;
dkato 0:f782d9c66c49 576 if(p->tot_len != p->len) {
dkato 0:f782d9c66c49 577 pbuf_free(p);
dkato 0:f782d9c66c49 578 return;
dkato 0:f782d9c66c49 579 }
dkato 0:f782d9c66c49 580
dkato 0:f782d9c66c49 581 outp = (u_char*)p->payload;
dkato 0:f782d9c66c49 582 MAKEHEADER(outp, PPP_PAP);
dkato 0:f782d9c66c49 583
dkato 0:f782d9c66c49 584 PUTCHAR(code, outp);
dkato 0:f782d9c66c49 585 PUTCHAR(id, outp);
dkato 0:f782d9c66c49 586 PUTSHORT(outlen, outp);
dkato 0:f782d9c66c49 587 PUTCHAR(msglen, outp);
dkato 0:f782d9c66c49 588 MEMCPY(outp, msg, msglen);
dkato 0:f782d9c66c49 589
dkato 0:f782d9c66c49 590 ppp_write(pcb, p);
dkato 0:f782d9c66c49 591 }
dkato 0:f782d9c66c49 592 #endif /* PPP_SERVER */
dkato 0:f782d9c66c49 593
dkato 0:f782d9c66c49 594 #if PRINTPKT_SUPPORT
dkato 0:f782d9c66c49 595 /*
dkato 0:f782d9c66c49 596 * upap_printpkt - print the contents of a PAP packet.
dkato 0:f782d9c66c49 597 */
dkato 0:f782d9c66c49 598 static const char* const upap_codenames[] = {
dkato 0:f782d9c66c49 599 "AuthReq", "AuthAck", "AuthNak"
dkato 0:f782d9c66c49 600 };
dkato 0:f782d9c66c49 601
dkato 0:f782d9c66c49 602 static int upap_printpkt(const u_char *p, int plen, void (*printer) (void *, const char *, ...), void *arg) {
dkato 0:f782d9c66c49 603 int code, id, len;
dkato 0:f782d9c66c49 604 int mlen, ulen, wlen;
dkato 0:f782d9c66c49 605 const u_char *user, *pwd, *msg;
dkato 0:f782d9c66c49 606 const u_char *pstart;
dkato 0:f782d9c66c49 607
dkato 0:f782d9c66c49 608 if (plen < UPAP_HEADERLEN)
dkato 0:f782d9c66c49 609 return 0;
dkato 0:f782d9c66c49 610 pstart = p;
dkato 0:f782d9c66c49 611 GETCHAR(code, p);
dkato 0:f782d9c66c49 612 GETCHAR(id, p);
dkato 0:f782d9c66c49 613 GETSHORT(len, p);
dkato 0:f782d9c66c49 614 if (len < UPAP_HEADERLEN || len > plen)
dkato 0:f782d9c66c49 615 return 0;
dkato 0:f782d9c66c49 616
dkato 0:f782d9c66c49 617 if (code >= 1 && code <= (int)LWIP_ARRAYSIZE(upap_codenames))
dkato 0:f782d9c66c49 618 printer(arg, " %s", upap_codenames[code-1]);
dkato 0:f782d9c66c49 619 else
dkato 0:f782d9c66c49 620 printer(arg, " code=0x%x", code);
dkato 0:f782d9c66c49 621 printer(arg, " id=0x%x", id);
dkato 0:f782d9c66c49 622 len -= UPAP_HEADERLEN;
dkato 0:f782d9c66c49 623 switch (code) {
dkato 0:f782d9c66c49 624 case UPAP_AUTHREQ:
dkato 0:f782d9c66c49 625 if (len < 1)
dkato 0:f782d9c66c49 626 break;
dkato 0:f782d9c66c49 627 ulen = p[0];
dkato 0:f782d9c66c49 628 if (len < ulen + 2)
dkato 0:f782d9c66c49 629 break;
dkato 0:f782d9c66c49 630 wlen = p[ulen + 1];
dkato 0:f782d9c66c49 631 if (len < ulen + wlen + 2)
dkato 0:f782d9c66c49 632 break;
dkato 0:f782d9c66c49 633 user = (const u_char *) (p + 1);
dkato 0:f782d9c66c49 634 pwd = (const u_char *) (p + ulen + 2);
dkato 0:f782d9c66c49 635 p += ulen + wlen + 2;
dkato 0:f782d9c66c49 636 len -= ulen + wlen + 2;
dkato 0:f782d9c66c49 637 printer(arg, " user=");
dkato 0:f782d9c66c49 638 ppp_print_string(user, ulen, printer, arg);
dkato 0:f782d9c66c49 639 printer(arg, " password=");
dkato 0:f782d9c66c49 640 /* FIXME: require ppp_pcb struct as printpkt() argument */
dkato 0:f782d9c66c49 641 #if 0
dkato 0:f782d9c66c49 642 if (!pcb->settings.hide_password)
dkato 0:f782d9c66c49 643 #endif
dkato 0:f782d9c66c49 644 ppp_print_string(pwd, wlen, printer, arg);
dkato 0:f782d9c66c49 645 #if 0
dkato 0:f782d9c66c49 646 else
dkato 0:f782d9c66c49 647 printer(arg, "<hidden>");
dkato 0:f782d9c66c49 648 #endif
dkato 0:f782d9c66c49 649 break;
dkato 0:f782d9c66c49 650 case UPAP_AUTHACK:
dkato 0:f782d9c66c49 651 case UPAP_AUTHNAK:
dkato 0:f782d9c66c49 652 if (len < 1)
dkato 0:f782d9c66c49 653 break;
dkato 0:f782d9c66c49 654 mlen = p[0];
dkato 0:f782d9c66c49 655 if (len < mlen + 1)
dkato 0:f782d9c66c49 656 break;
dkato 0:f782d9c66c49 657 msg = (const u_char *) (p + 1);
dkato 0:f782d9c66c49 658 p += mlen + 1;
dkato 0:f782d9c66c49 659 len -= mlen + 1;
dkato 0:f782d9c66c49 660 printer(arg, " ");
dkato 0:f782d9c66c49 661 ppp_print_string(msg, mlen, printer, arg);
dkato 0:f782d9c66c49 662 break;
dkato 0:f782d9c66c49 663 default:
dkato 0:f782d9c66c49 664 break;
dkato 0:f782d9c66c49 665 }
dkato 0:f782d9c66c49 666
dkato 0:f782d9c66c49 667 /* print the rest of the bytes in the packet */
dkato 0:f782d9c66c49 668 for (; len > 0; --len) {
dkato 0:f782d9c66c49 669 GETCHAR(code, p);
dkato 0:f782d9c66c49 670 printer(arg, " %.2x", code);
dkato 0:f782d9c66c49 671 }
dkato 0:f782d9c66c49 672
dkato 0:f782d9c66c49 673 return p - pstart;
dkato 0:f782d9c66c49 674 }
dkato 0:f782d9c66c49 675 #endif /* PRINTPKT_SUPPORT */
dkato 0:f782d9c66c49 676
dkato 0:f782d9c66c49 677 #endif /* PPP_SUPPORT && PAP_SUPPORT */