Important changes to repositories hosted on mbed.com
Mbed hosted mercurial repositories are deprecated and are due to be permanently deleted in July 2026.
To keep a copy of this software download the repository Zip archive or clone locally using Mercurial.
It is also possible to export all your personal repositories from the account settings page.
Dependents: mbed-os-example-blinky-gr-lychee GR-Boads_Camera_sample GR-Boards_Audio_Recoder GR-Boads_Camera_DisplayApp ... more
features/FEATURE_LWIP/lwip-interface/lwip/src/netif/ppp/lwip_upap.c@0:f782d9c66c49, 2018-02-02 (annotated)
- Committer:
- dkato
- Date:
- Fri Feb 02 05:42:23 2018 +0000
- Revision:
- 0:f782d9c66c49
mbed-os for GR-LYCHEE
Who changed what in which revision?
| User | Revision | Line number | New contents of line |
|---|---|---|---|
| dkato | 0:f782d9c66c49 | 1 | /* |
| dkato | 0:f782d9c66c49 | 2 | * upap.c - User/Password Authentication Protocol. |
| dkato | 0:f782d9c66c49 | 3 | * |
| dkato | 0:f782d9c66c49 | 4 | * Copyright (c) 1984-2000 Carnegie Mellon University. All rights reserved. |
| dkato | 0:f782d9c66c49 | 5 | * |
| dkato | 0:f782d9c66c49 | 6 | * Redistribution and use in source and binary forms, with or without |
| dkato | 0:f782d9c66c49 | 7 | * modification, are permitted provided that the following conditions |
| dkato | 0:f782d9c66c49 | 8 | * are met: |
| dkato | 0:f782d9c66c49 | 9 | * |
| dkato | 0:f782d9c66c49 | 10 | * 1. Redistributions of source code must retain the above copyright |
| dkato | 0:f782d9c66c49 | 11 | * notice, this list of conditions and the following disclaimer. |
| dkato | 0:f782d9c66c49 | 12 | * |
| dkato | 0:f782d9c66c49 | 13 | * 2. Redistributions in binary form must reproduce the above copyright |
| dkato | 0:f782d9c66c49 | 14 | * notice, this list of conditions and the following disclaimer in |
| dkato | 0:f782d9c66c49 | 15 | * the documentation and/or other materials provided with the |
| dkato | 0:f782d9c66c49 | 16 | * distribution. |
| dkato | 0:f782d9c66c49 | 17 | * |
| dkato | 0:f782d9c66c49 | 18 | * 3. The name "Carnegie Mellon University" must not be used to |
| dkato | 0:f782d9c66c49 | 19 | * endorse or promote products derived from this software without |
| dkato | 0:f782d9c66c49 | 20 | * prior written permission. For permission or any legal |
| dkato | 0:f782d9c66c49 | 21 | * details, please contact |
| dkato | 0:f782d9c66c49 | 22 | * Office of Technology Transfer |
| dkato | 0:f782d9c66c49 | 23 | * Carnegie Mellon University |
| dkato | 0:f782d9c66c49 | 24 | * 5000 Forbes Avenue |
| dkato | 0:f782d9c66c49 | 25 | * Pittsburgh, PA 15213-3890 |
| dkato | 0:f782d9c66c49 | 26 | * (412) 268-4387, fax: (412) 268-7395 |
| dkato | 0:f782d9c66c49 | 27 | * tech-transfer@andrew.cmu.edu |
| dkato | 0:f782d9c66c49 | 28 | * |
| dkato | 0:f782d9c66c49 | 29 | * 4. Redistributions of any form whatsoever must retain the following |
| dkato | 0:f782d9c66c49 | 30 | * acknowledgment: |
| dkato | 0:f782d9c66c49 | 31 | * "This product includes software developed by Computing Services |
| dkato | 0:f782d9c66c49 | 32 | * at Carnegie Mellon University (http://www.cmu.edu/computing/)." |
| dkato | 0:f782d9c66c49 | 33 | * |
| dkato | 0:f782d9c66c49 | 34 | * CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH REGARD TO |
| dkato | 0:f782d9c66c49 | 35 | * THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY |
| dkato | 0:f782d9c66c49 | 36 | * AND FITNESS, IN NO EVENT SHALL CARNEGIE MELLON UNIVERSITY BE LIABLE |
| dkato | 0:f782d9c66c49 | 37 | * FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES |
| dkato | 0:f782d9c66c49 | 38 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN |
| dkato | 0:f782d9c66c49 | 39 | * AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING |
| dkato | 0:f782d9c66c49 | 40 | * OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| dkato | 0:f782d9c66c49 | 41 | */ |
| dkato | 0:f782d9c66c49 | 42 | |
| dkato | 0:f782d9c66c49 | 43 | #include "netif/ppp/ppp_opts.h" |
| dkato | 0:f782d9c66c49 | 44 | #if PPP_SUPPORT && PAP_SUPPORT /* don't build if not configured for use in lwipopts.h */ |
| dkato | 0:f782d9c66c49 | 45 | |
| dkato | 0:f782d9c66c49 | 46 | /* |
| dkato | 0:f782d9c66c49 | 47 | * @todo: |
| dkato | 0:f782d9c66c49 | 48 | */ |
| dkato | 0:f782d9c66c49 | 49 | |
| dkato | 0:f782d9c66c49 | 50 | #if 0 /* UNUSED */ |
| dkato | 0:f782d9c66c49 | 51 | #include <stdio.h> |
| dkato | 0:f782d9c66c49 | 52 | #include <string.h> |
| dkato | 0:f782d9c66c49 | 53 | #endif /* UNUSED */ |
| dkato | 0:f782d9c66c49 | 54 | |
| dkato | 0:f782d9c66c49 | 55 | #include "netif/ppp/ppp_impl.h" |
| dkato | 0:f782d9c66c49 | 56 | |
| dkato | 0:f782d9c66c49 | 57 | #include "netif/ppp/upap.h" |
| dkato | 0:f782d9c66c49 | 58 | |
| dkato | 0:f782d9c66c49 | 59 | #if PPP_OPTIONS |
| dkato | 0:f782d9c66c49 | 60 | /* |
| dkato | 0:f782d9c66c49 | 61 | * Command-line options. |
| dkato | 0:f782d9c66c49 | 62 | */ |
| dkato | 0:f782d9c66c49 | 63 | static option_t pap_option_list[] = { |
| dkato | 0:f782d9c66c49 | 64 | { "hide-password", o_bool, &hide_password, |
| dkato | 0:f782d9c66c49 | 65 | "Don't output passwords to log", OPT_PRIO | 1 }, |
| dkato | 0:f782d9c66c49 | 66 | { "show-password", o_bool, &hide_password, |
| dkato | 0:f782d9c66c49 | 67 | "Show password string in debug log messages", OPT_PRIOSUB | 0 }, |
| dkato | 0:f782d9c66c49 | 68 | |
| dkato | 0:f782d9c66c49 | 69 | { "pap-restart", o_int, &upap[0].us_timeouttime, |
| dkato | 0:f782d9c66c49 | 70 | "Set retransmit timeout for PAP", OPT_PRIO }, |
| dkato | 0:f782d9c66c49 | 71 | { "pap-max-authreq", o_int, &upap[0].us_maxtransmits, |
| dkato | 0:f782d9c66c49 | 72 | "Set max number of transmissions for auth-reqs", OPT_PRIO }, |
| dkato | 0:f782d9c66c49 | 73 | { "pap-timeout", o_int, &upap[0].us_reqtimeout, |
| dkato | 0:f782d9c66c49 | 74 | "Set time limit for peer PAP authentication", OPT_PRIO }, |
| dkato | 0:f782d9c66c49 | 75 | |
| dkato | 0:f782d9c66c49 | 76 | { NULL } |
| dkato | 0:f782d9c66c49 | 77 | }; |
| dkato | 0:f782d9c66c49 | 78 | #endif /* PPP_OPTIONS */ |
| dkato | 0:f782d9c66c49 | 79 | |
| dkato | 0:f782d9c66c49 | 80 | /* |
| dkato | 0:f782d9c66c49 | 81 | * Protocol entry points. |
| dkato | 0:f782d9c66c49 | 82 | */ |
| dkato | 0:f782d9c66c49 | 83 | static void upap_init(ppp_pcb *pcb); |
| dkato | 0:f782d9c66c49 | 84 | static void upap_lowerup(ppp_pcb *pcb); |
| dkato | 0:f782d9c66c49 | 85 | static void upap_lowerdown(ppp_pcb *pcb); |
| dkato | 0:f782d9c66c49 | 86 | static void upap_input(ppp_pcb *pcb, u_char *inpacket, int l); |
| dkato | 0:f782d9c66c49 | 87 | static void upap_protrej(ppp_pcb *pcb); |
| dkato | 0:f782d9c66c49 | 88 | #if PRINTPKT_SUPPORT |
| dkato | 0:f782d9c66c49 | 89 | static int upap_printpkt(const u_char *p, int plen, void (*printer) (void *, const char *, ...), void *arg); |
| dkato | 0:f782d9c66c49 | 90 | #endif /* PRINTPKT_SUPPORT */ |
| dkato | 0:f782d9c66c49 | 91 | |
| dkato | 0:f782d9c66c49 | 92 | const struct protent pap_protent = { |
| dkato | 0:f782d9c66c49 | 93 | PPP_PAP, |
| dkato | 0:f782d9c66c49 | 94 | upap_init, |
| dkato | 0:f782d9c66c49 | 95 | upap_input, |
| dkato | 0:f782d9c66c49 | 96 | upap_protrej, |
| dkato | 0:f782d9c66c49 | 97 | upap_lowerup, |
| dkato | 0:f782d9c66c49 | 98 | upap_lowerdown, |
| dkato | 0:f782d9c66c49 | 99 | NULL, |
| dkato | 0:f782d9c66c49 | 100 | NULL, |
| dkato | 0:f782d9c66c49 | 101 | #if PRINTPKT_SUPPORT |
| dkato | 0:f782d9c66c49 | 102 | upap_printpkt, |
| dkato | 0:f782d9c66c49 | 103 | #endif /* PRINTPKT_SUPPORT */ |
| dkato | 0:f782d9c66c49 | 104 | #if PPP_DATAINPUT |
| dkato | 0:f782d9c66c49 | 105 | NULL, |
| dkato | 0:f782d9c66c49 | 106 | #endif /* PPP_DATAINPUT */ |
| dkato | 0:f782d9c66c49 | 107 | #if PRINTPKT_SUPPORT |
| dkato | 0:f782d9c66c49 | 108 | "PAP", |
| dkato | 0:f782d9c66c49 | 109 | NULL, |
| dkato | 0:f782d9c66c49 | 110 | #endif /* PRINTPKT_SUPPORT */ |
| dkato | 0:f782d9c66c49 | 111 | #if PPP_OPTIONS |
| dkato | 0:f782d9c66c49 | 112 | pap_option_list, |
| dkato | 0:f782d9c66c49 | 113 | NULL, |
| dkato | 0:f782d9c66c49 | 114 | #endif /* PPP_OPTIONS */ |
| dkato | 0:f782d9c66c49 | 115 | #if DEMAND_SUPPORT |
| dkato | 0:f782d9c66c49 | 116 | NULL, |
| dkato | 0:f782d9c66c49 | 117 | NULL |
| dkato | 0:f782d9c66c49 | 118 | #endif /* DEMAND_SUPPORT */ |
| dkato | 0:f782d9c66c49 | 119 | }; |
| dkato | 0:f782d9c66c49 | 120 | |
| dkato | 0:f782d9c66c49 | 121 | static void upap_timeout(void *arg); |
| dkato | 0:f782d9c66c49 | 122 | #if PPP_SERVER |
| dkato | 0:f782d9c66c49 | 123 | static void upap_reqtimeout(void *arg); |
| dkato | 0:f782d9c66c49 | 124 | static void upap_rauthreq(ppp_pcb *pcb, u_char *inp, int id, int len); |
| dkato | 0:f782d9c66c49 | 125 | #endif /* PPP_SERVER */ |
| dkato | 0:f782d9c66c49 | 126 | static void upap_rauthack(ppp_pcb *pcb, u_char *inp, int id, int len); |
| dkato | 0:f782d9c66c49 | 127 | static void upap_rauthnak(ppp_pcb *pcb, u_char *inp, int id, int len); |
| dkato | 0:f782d9c66c49 | 128 | static void upap_sauthreq(ppp_pcb *pcb); |
| dkato | 0:f782d9c66c49 | 129 | #if PPP_SERVER |
| dkato | 0:f782d9c66c49 | 130 | static void upap_sresp(ppp_pcb *pcb, u_char code, u_char id, const char *msg, int msglen); |
| dkato | 0:f782d9c66c49 | 131 | #endif /* PPP_SERVER */ |
| dkato | 0:f782d9c66c49 | 132 | |
| dkato | 0:f782d9c66c49 | 133 | |
| dkato | 0:f782d9c66c49 | 134 | /* |
| dkato | 0:f782d9c66c49 | 135 | * upap_init - Initialize a UPAP unit. |
| dkato | 0:f782d9c66c49 | 136 | */ |
| dkato | 0:f782d9c66c49 | 137 | static void upap_init(ppp_pcb *pcb) { |
| dkato | 0:f782d9c66c49 | 138 | pcb->upap.us_user = NULL; |
| dkato | 0:f782d9c66c49 | 139 | pcb->upap.us_userlen = 0; |
| dkato | 0:f782d9c66c49 | 140 | pcb->upap.us_passwd = NULL; |
| dkato | 0:f782d9c66c49 | 141 | pcb->upap.us_passwdlen = 0; |
| dkato | 0:f782d9c66c49 | 142 | pcb->upap.us_clientstate = UPAPCS_INITIAL; |
| dkato | 0:f782d9c66c49 | 143 | #if PPP_SERVER |
| dkato | 0:f782d9c66c49 | 144 | pcb->upap.us_serverstate = UPAPSS_INITIAL; |
| dkato | 0:f782d9c66c49 | 145 | #endif /* PPP_SERVER */ |
| dkato | 0:f782d9c66c49 | 146 | pcb->upap.us_id = 0; |
| dkato | 0:f782d9c66c49 | 147 | } |
| dkato | 0:f782d9c66c49 | 148 | |
| dkato | 0:f782d9c66c49 | 149 | |
| dkato | 0:f782d9c66c49 | 150 | /* |
| dkato | 0:f782d9c66c49 | 151 | * upap_authwithpeer - Authenticate us with our peer (start client). |
| dkato | 0:f782d9c66c49 | 152 | * |
| dkato | 0:f782d9c66c49 | 153 | * Set new state and send authenticate's. |
| dkato | 0:f782d9c66c49 | 154 | */ |
| dkato | 0:f782d9c66c49 | 155 | void upap_authwithpeer(ppp_pcb *pcb, const char *user, const char *password) { |
| dkato | 0:f782d9c66c49 | 156 | |
| dkato | 0:f782d9c66c49 | 157 | if(!user || !password) |
| dkato | 0:f782d9c66c49 | 158 | return; |
| dkato | 0:f782d9c66c49 | 159 | |
| dkato | 0:f782d9c66c49 | 160 | /* Save the username and password we're given */ |
| dkato | 0:f782d9c66c49 | 161 | pcb->upap.us_user = user; |
| dkato | 0:f782d9c66c49 | 162 | pcb->upap.us_userlen = LWIP_MIN(strlen(user), 0xff); |
| dkato | 0:f782d9c66c49 | 163 | pcb->upap.us_passwd = password; |
| dkato | 0:f782d9c66c49 | 164 | pcb->upap.us_passwdlen = LWIP_MIN(strlen(password), 0xff); |
| dkato | 0:f782d9c66c49 | 165 | pcb->upap.us_transmits = 0; |
| dkato | 0:f782d9c66c49 | 166 | |
| dkato | 0:f782d9c66c49 | 167 | /* Lower layer up yet? */ |
| dkato | 0:f782d9c66c49 | 168 | if (pcb->upap.us_clientstate == UPAPCS_INITIAL || |
| dkato | 0:f782d9c66c49 | 169 | pcb->upap.us_clientstate == UPAPCS_PENDING) { |
| dkato | 0:f782d9c66c49 | 170 | pcb->upap.us_clientstate = UPAPCS_PENDING; |
| dkato | 0:f782d9c66c49 | 171 | return; |
| dkato | 0:f782d9c66c49 | 172 | } |
| dkato | 0:f782d9c66c49 | 173 | |
| dkato | 0:f782d9c66c49 | 174 | upap_sauthreq(pcb); /* Start protocol */ |
| dkato | 0:f782d9c66c49 | 175 | } |
| dkato | 0:f782d9c66c49 | 176 | |
| dkato | 0:f782d9c66c49 | 177 | #if PPP_SERVER |
| dkato | 0:f782d9c66c49 | 178 | /* |
| dkato | 0:f782d9c66c49 | 179 | * upap_authpeer - Authenticate our peer (start server). |
| dkato | 0:f782d9c66c49 | 180 | * |
| dkato | 0:f782d9c66c49 | 181 | * Set new state. |
| dkato | 0:f782d9c66c49 | 182 | */ |
| dkato | 0:f782d9c66c49 | 183 | void upap_authpeer(ppp_pcb *pcb) { |
| dkato | 0:f782d9c66c49 | 184 | |
| dkato | 0:f782d9c66c49 | 185 | /* Lower layer up yet? */ |
| dkato | 0:f782d9c66c49 | 186 | if (pcb->upap.us_serverstate == UPAPSS_INITIAL || |
| dkato | 0:f782d9c66c49 | 187 | pcb->upap.us_serverstate == UPAPSS_PENDING) { |
| dkato | 0:f782d9c66c49 | 188 | pcb->upap.us_serverstate = UPAPSS_PENDING; |
| dkato | 0:f782d9c66c49 | 189 | return; |
| dkato | 0:f782d9c66c49 | 190 | } |
| dkato | 0:f782d9c66c49 | 191 | |
| dkato | 0:f782d9c66c49 | 192 | pcb->upap.us_serverstate = UPAPSS_LISTEN; |
| dkato | 0:f782d9c66c49 | 193 | if (pcb->settings.pap_req_timeout > 0) |
| dkato | 0:f782d9c66c49 | 194 | TIMEOUT(upap_reqtimeout, pcb, pcb->settings.pap_req_timeout); |
| dkato | 0:f782d9c66c49 | 195 | } |
| dkato | 0:f782d9c66c49 | 196 | #endif /* PPP_SERVER */ |
| dkato | 0:f782d9c66c49 | 197 | |
| dkato | 0:f782d9c66c49 | 198 | /* |
| dkato | 0:f782d9c66c49 | 199 | * upap_timeout - Retransmission timer for sending auth-reqs expired. |
| dkato | 0:f782d9c66c49 | 200 | */ |
| dkato | 0:f782d9c66c49 | 201 | static void upap_timeout(void *arg) { |
| dkato | 0:f782d9c66c49 | 202 | ppp_pcb *pcb = (ppp_pcb*)arg; |
| dkato | 0:f782d9c66c49 | 203 | |
| dkato | 0:f782d9c66c49 | 204 | if (pcb->upap.us_clientstate != UPAPCS_AUTHREQ) |
| dkato | 0:f782d9c66c49 | 205 | return; |
| dkato | 0:f782d9c66c49 | 206 | |
| dkato | 0:f782d9c66c49 | 207 | if (pcb->upap.us_transmits >= pcb->settings.pap_max_transmits) { |
| dkato | 0:f782d9c66c49 | 208 | /* give up in disgust */ |
| dkato | 0:f782d9c66c49 | 209 | ppp_error("No response to PAP authenticate-requests"); |
| dkato | 0:f782d9c66c49 | 210 | pcb->upap.us_clientstate = UPAPCS_BADAUTH; |
| dkato | 0:f782d9c66c49 | 211 | auth_withpeer_fail(pcb, PPP_PAP); |
| dkato | 0:f782d9c66c49 | 212 | return; |
| dkato | 0:f782d9c66c49 | 213 | } |
| dkato | 0:f782d9c66c49 | 214 | |
| dkato | 0:f782d9c66c49 | 215 | upap_sauthreq(pcb); /* Send Authenticate-Request */ |
| dkato | 0:f782d9c66c49 | 216 | } |
| dkato | 0:f782d9c66c49 | 217 | |
| dkato | 0:f782d9c66c49 | 218 | |
| dkato | 0:f782d9c66c49 | 219 | #if PPP_SERVER |
| dkato | 0:f782d9c66c49 | 220 | /* |
| dkato | 0:f782d9c66c49 | 221 | * upap_reqtimeout - Give up waiting for the peer to send an auth-req. |
| dkato | 0:f782d9c66c49 | 222 | */ |
| dkato | 0:f782d9c66c49 | 223 | static void upap_reqtimeout(void *arg) { |
| dkato | 0:f782d9c66c49 | 224 | ppp_pcb *pcb = (ppp_pcb*)arg; |
| dkato | 0:f782d9c66c49 | 225 | |
| dkato | 0:f782d9c66c49 | 226 | if (pcb->upap.us_serverstate != UPAPSS_LISTEN) |
| dkato | 0:f782d9c66c49 | 227 | return; /* huh?? */ |
| dkato | 0:f782d9c66c49 | 228 | |
| dkato | 0:f782d9c66c49 | 229 | auth_peer_fail(pcb, PPP_PAP); |
| dkato | 0:f782d9c66c49 | 230 | pcb->upap.us_serverstate = UPAPSS_BADAUTH; |
| dkato | 0:f782d9c66c49 | 231 | } |
| dkato | 0:f782d9c66c49 | 232 | #endif /* PPP_SERVER */ |
| dkato | 0:f782d9c66c49 | 233 | |
| dkato | 0:f782d9c66c49 | 234 | |
| dkato | 0:f782d9c66c49 | 235 | /* |
| dkato | 0:f782d9c66c49 | 236 | * upap_lowerup - The lower layer is up. |
| dkato | 0:f782d9c66c49 | 237 | * |
| dkato | 0:f782d9c66c49 | 238 | * Start authenticating if pending. |
| dkato | 0:f782d9c66c49 | 239 | */ |
| dkato | 0:f782d9c66c49 | 240 | static void upap_lowerup(ppp_pcb *pcb) { |
| dkato | 0:f782d9c66c49 | 241 | |
| dkato | 0:f782d9c66c49 | 242 | if (pcb->upap.us_clientstate == UPAPCS_INITIAL) |
| dkato | 0:f782d9c66c49 | 243 | pcb->upap.us_clientstate = UPAPCS_CLOSED; |
| dkato | 0:f782d9c66c49 | 244 | else if (pcb->upap.us_clientstate == UPAPCS_PENDING) { |
| dkato | 0:f782d9c66c49 | 245 | upap_sauthreq(pcb); /* send an auth-request */ |
| dkato | 0:f782d9c66c49 | 246 | } |
| dkato | 0:f782d9c66c49 | 247 | |
| dkato | 0:f782d9c66c49 | 248 | #if PPP_SERVER |
| dkato | 0:f782d9c66c49 | 249 | if (pcb->upap.us_serverstate == UPAPSS_INITIAL) |
| dkato | 0:f782d9c66c49 | 250 | pcb->upap.us_serverstate = UPAPSS_CLOSED; |
| dkato | 0:f782d9c66c49 | 251 | else if (pcb->upap.us_serverstate == UPAPSS_PENDING) { |
| dkato | 0:f782d9c66c49 | 252 | pcb->upap.us_serverstate = UPAPSS_LISTEN; |
| dkato | 0:f782d9c66c49 | 253 | if (pcb->settings.pap_req_timeout > 0) |
| dkato | 0:f782d9c66c49 | 254 | TIMEOUT(upap_reqtimeout, pcb, pcb->settings.pap_req_timeout); |
| dkato | 0:f782d9c66c49 | 255 | } |
| dkato | 0:f782d9c66c49 | 256 | #endif /* PPP_SERVER */ |
| dkato | 0:f782d9c66c49 | 257 | } |
| dkato | 0:f782d9c66c49 | 258 | |
| dkato | 0:f782d9c66c49 | 259 | |
| dkato | 0:f782d9c66c49 | 260 | /* |
| dkato | 0:f782d9c66c49 | 261 | * upap_lowerdown - The lower layer is down. |
| dkato | 0:f782d9c66c49 | 262 | * |
| dkato | 0:f782d9c66c49 | 263 | * Cancel all timeouts. |
| dkato | 0:f782d9c66c49 | 264 | */ |
| dkato | 0:f782d9c66c49 | 265 | static void upap_lowerdown(ppp_pcb *pcb) { |
| dkato | 0:f782d9c66c49 | 266 | |
| dkato | 0:f782d9c66c49 | 267 | if (pcb->upap.us_clientstate == UPAPCS_AUTHREQ) /* Timeout pending? */ |
| dkato | 0:f782d9c66c49 | 268 | UNTIMEOUT(upap_timeout, pcb); /* Cancel timeout */ |
| dkato | 0:f782d9c66c49 | 269 | #if PPP_SERVER |
| dkato | 0:f782d9c66c49 | 270 | if (pcb->upap.us_serverstate == UPAPSS_LISTEN && pcb->settings.pap_req_timeout > 0) |
| dkato | 0:f782d9c66c49 | 271 | UNTIMEOUT(upap_reqtimeout, pcb); |
| dkato | 0:f782d9c66c49 | 272 | #endif /* PPP_SERVER */ |
| dkato | 0:f782d9c66c49 | 273 | |
| dkato | 0:f782d9c66c49 | 274 | pcb->upap.us_clientstate = UPAPCS_INITIAL; |
| dkato | 0:f782d9c66c49 | 275 | #if PPP_SERVER |
| dkato | 0:f782d9c66c49 | 276 | pcb->upap.us_serverstate = UPAPSS_INITIAL; |
| dkato | 0:f782d9c66c49 | 277 | #endif /* PPP_SERVER */ |
| dkato | 0:f782d9c66c49 | 278 | } |
| dkato | 0:f782d9c66c49 | 279 | |
| dkato | 0:f782d9c66c49 | 280 | |
| dkato | 0:f782d9c66c49 | 281 | /* |
| dkato | 0:f782d9c66c49 | 282 | * upap_protrej - Peer doesn't speak this protocol. |
| dkato | 0:f782d9c66c49 | 283 | * |
| dkato | 0:f782d9c66c49 | 284 | * This shouldn't happen. In any case, pretend lower layer went down. |
| dkato | 0:f782d9c66c49 | 285 | */ |
| dkato | 0:f782d9c66c49 | 286 | static void upap_protrej(ppp_pcb *pcb) { |
| dkato | 0:f782d9c66c49 | 287 | |
| dkato | 0:f782d9c66c49 | 288 | if (pcb->upap.us_clientstate == UPAPCS_AUTHREQ) { |
| dkato | 0:f782d9c66c49 | 289 | ppp_error("PAP authentication failed due to protocol-reject"); |
| dkato | 0:f782d9c66c49 | 290 | auth_withpeer_fail(pcb, PPP_PAP); |
| dkato | 0:f782d9c66c49 | 291 | } |
| dkato | 0:f782d9c66c49 | 292 | #if PPP_SERVER |
| dkato | 0:f782d9c66c49 | 293 | if (pcb->upap.us_serverstate == UPAPSS_LISTEN) { |
| dkato | 0:f782d9c66c49 | 294 | ppp_error("PAP authentication of peer failed (protocol-reject)"); |
| dkato | 0:f782d9c66c49 | 295 | auth_peer_fail(pcb, PPP_PAP); |
| dkato | 0:f782d9c66c49 | 296 | } |
| dkato | 0:f782d9c66c49 | 297 | #endif /* PPP_SERVER */ |
| dkato | 0:f782d9c66c49 | 298 | upap_lowerdown(pcb); |
| dkato | 0:f782d9c66c49 | 299 | } |
| dkato | 0:f782d9c66c49 | 300 | |
| dkato | 0:f782d9c66c49 | 301 | |
| dkato | 0:f782d9c66c49 | 302 | /* |
| dkato | 0:f782d9c66c49 | 303 | * upap_input - Input UPAP packet. |
| dkato | 0:f782d9c66c49 | 304 | */ |
| dkato | 0:f782d9c66c49 | 305 | static void upap_input(ppp_pcb *pcb, u_char *inpacket, int l) { |
| dkato | 0:f782d9c66c49 | 306 | u_char *inp; |
| dkato | 0:f782d9c66c49 | 307 | u_char code, id; |
| dkato | 0:f782d9c66c49 | 308 | int len; |
| dkato | 0:f782d9c66c49 | 309 | |
| dkato | 0:f782d9c66c49 | 310 | /* |
| dkato | 0:f782d9c66c49 | 311 | * Parse header (code, id and length). |
| dkato | 0:f782d9c66c49 | 312 | * If packet too short, drop it. |
| dkato | 0:f782d9c66c49 | 313 | */ |
| dkato | 0:f782d9c66c49 | 314 | inp = inpacket; |
| dkato | 0:f782d9c66c49 | 315 | if (l < UPAP_HEADERLEN) { |
| dkato | 0:f782d9c66c49 | 316 | UPAPDEBUG(("pap_input: rcvd short header.")); |
| dkato | 0:f782d9c66c49 | 317 | return; |
| dkato | 0:f782d9c66c49 | 318 | } |
| dkato | 0:f782d9c66c49 | 319 | GETCHAR(code, inp); |
| dkato | 0:f782d9c66c49 | 320 | GETCHAR(id, inp); |
| dkato | 0:f782d9c66c49 | 321 | GETSHORT(len, inp); |
| dkato | 0:f782d9c66c49 | 322 | if (len < UPAP_HEADERLEN) { |
| dkato | 0:f782d9c66c49 | 323 | UPAPDEBUG(("pap_input: rcvd illegal length.")); |
| dkato | 0:f782d9c66c49 | 324 | return; |
| dkato | 0:f782d9c66c49 | 325 | } |
| dkato | 0:f782d9c66c49 | 326 | if (len > l) { |
| dkato | 0:f782d9c66c49 | 327 | UPAPDEBUG(("pap_input: rcvd short packet.")); |
| dkato | 0:f782d9c66c49 | 328 | return; |
| dkato | 0:f782d9c66c49 | 329 | } |
| dkato | 0:f782d9c66c49 | 330 | len -= UPAP_HEADERLEN; |
| dkato | 0:f782d9c66c49 | 331 | |
| dkato | 0:f782d9c66c49 | 332 | /* |
| dkato | 0:f782d9c66c49 | 333 | * Action depends on code. |
| dkato | 0:f782d9c66c49 | 334 | */ |
| dkato | 0:f782d9c66c49 | 335 | switch (code) { |
| dkato | 0:f782d9c66c49 | 336 | case UPAP_AUTHREQ: |
| dkato | 0:f782d9c66c49 | 337 | #if PPP_SERVER |
| dkato | 0:f782d9c66c49 | 338 | upap_rauthreq(pcb, inp, id, len); |
| dkato | 0:f782d9c66c49 | 339 | #endif /* PPP_SERVER */ |
| dkato | 0:f782d9c66c49 | 340 | break; |
| dkato | 0:f782d9c66c49 | 341 | |
| dkato | 0:f782d9c66c49 | 342 | case UPAP_AUTHACK: |
| dkato | 0:f782d9c66c49 | 343 | upap_rauthack(pcb, inp, id, len); |
| dkato | 0:f782d9c66c49 | 344 | break; |
| dkato | 0:f782d9c66c49 | 345 | |
| dkato | 0:f782d9c66c49 | 346 | case UPAP_AUTHNAK: |
| dkato | 0:f782d9c66c49 | 347 | upap_rauthnak(pcb, inp, id, len); |
| dkato | 0:f782d9c66c49 | 348 | break; |
| dkato | 0:f782d9c66c49 | 349 | |
| dkato | 0:f782d9c66c49 | 350 | default: /* XXX Need code reject */ |
| dkato | 0:f782d9c66c49 | 351 | break; |
| dkato | 0:f782d9c66c49 | 352 | } |
| dkato | 0:f782d9c66c49 | 353 | } |
| dkato | 0:f782d9c66c49 | 354 | |
| dkato | 0:f782d9c66c49 | 355 | #if PPP_SERVER |
| dkato | 0:f782d9c66c49 | 356 | /* |
| dkato | 0:f782d9c66c49 | 357 | * upap_rauth - Receive Authenticate. |
| dkato | 0:f782d9c66c49 | 358 | */ |
| dkato | 0:f782d9c66c49 | 359 | static void upap_rauthreq(ppp_pcb *pcb, u_char *inp, int id, int len) { |
| dkato | 0:f782d9c66c49 | 360 | u_char ruserlen, rpasswdlen; |
| dkato | 0:f782d9c66c49 | 361 | char *ruser; |
| dkato | 0:f782d9c66c49 | 362 | char *rpasswd; |
| dkato | 0:f782d9c66c49 | 363 | char rhostname[256]; |
| dkato | 0:f782d9c66c49 | 364 | int retcode; |
| dkato | 0:f782d9c66c49 | 365 | const char *msg; |
| dkato | 0:f782d9c66c49 | 366 | int msglen; |
| dkato | 0:f782d9c66c49 | 367 | |
| dkato | 0:f782d9c66c49 | 368 | if (pcb->upap.us_serverstate < UPAPSS_LISTEN) |
| dkato | 0:f782d9c66c49 | 369 | return; |
| dkato | 0:f782d9c66c49 | 370 | |
| dkato | 0:f782d9c66c49 | 371 | /* |
| dkato | 0:f782d9c66c49 | 372 | * If we receive a duplicate authenticate-request, we are |
| dkato | 0:f782d9c66c49 | 373 | * supposed to return the same status as for the first request. |
| dkato | 0:f782d9c66c49 | 374 | */ |
| dkato | 0:f782d9c66c49 | 375 | if (pcb->upap.us_serverstate == UPAPSS_OPEN) { |
| dkato | 0:f782d9c66c49 | 376 | upap_sresp(pcb, UPAP_AUTHACK, id, "", 0); /* return auth-ack */ |
| dkato | 0:f782d9c66c49 | 377 | return; |
| dkato | 0:f782d9c66c49 | 378 | } |
| dkato | 0:f782d9c66c49 | 379 | if (pcb->upap.us_serverstate == UPAPSS_BADAUTH) { |
| dkato | 0:f782d9c66c49 | 380 | upap_sresp(pcb, UPAP_AUTHNAK, id, "", 0); /* return auth-nak */ |
| dkato | 0:f782d9c66c49 | 381 | return; |
| dkato | 0:f782d9c66c49 | 382 | } |
| dkato | 0:f782d9c66c49 | 383 | |
| dkato | 0:f782d9c66c49 | 384 | /* |
| dkato | 0:f782d9c66c49 | 385 | * Parse user/passwd. |
| dkato | 0:f782d9c66c49 | 386 | */ |
| dkato | 0:f782d9c66c49 | 387 | if (len < 1) { |
| dkato | 0:f782d9c66c49 | 388 | UPAPDEBUG(("pap_rauth: rcvd short packet.")); |
| dkato | 0:f782d9c66c49 | 389 | return; |
| dkato | 0:f782d9c66c49 | 390 | } |
| dkato | 0:f782d9c66c49 | 391 | GETCHAR(ruserlen, inp); |
| dkato | 0:f782d9c66c49 | 392 | len -= sizeof (u_char) + ruserlen + sizeof (u_char); |
| dkato | 0:f782d9c66c49 | 393 | if (len < 0) { |
| dkato | 0:f782d9c66c49 | 394 | UPAPDEBUG(("pap_rauth: rcvd short packet.")); |
| dkato | 0:f782d9c66c49 | 395 | return; |
| dkato | 0:f782d9c66c49 | 396 | } |
| dkato | 0:f782d9c66c49 | 397 | ruser = (char *) inp; |
| dkato | 0:f782d9c66c49 | 398 | INCPTR(ruserlen, inp); |
| dkato | 0:f782d9c66c49 | 399 | GETCHAR(rpasswdlen, inp); |
| dkato | 0:f782d9c66c49 | 400 | if (len < rpasswdlen) { |
| dkato | 0:f782d9c66c49 | 401 | UPAPDEBUG(("pap_rauth: rcvd short packet.")); |
| dkato | 0:f782d9c66c49 | 402 | return; |
| dkato | 0:f782d9c66c49 | 403 | } |
| dkato | 0:f782d9c66c49 | 404 | |
| dkato | 0:f782d9c66c49 | 405 | rpasswd = (char *) inp; |
| dkato | 0:f782d9c66c49 | 406 | |
| dkato | 0:f782d9c66c49 | 407 | /* |
| dkato | 0:f782d9c66c49 | 408 | * Check the username and password given. |
| dkato | 0:f782d9c66c49 | 409 | */ |
| dkato | 0:f782d9c66c49 | 410 | retcode = UPAP_AUTHNAK; |
| dkato | 0:f782d9c66c49 | 411 | if (auth_check_passwd(pcb, ruser, ruserlen, rpasswd, rpasswdlen, &msg, &msglen)) { |
| dkato | 0:f782d9c66c49 | 412 | retcode = UPAP_AUTHACK; |
| dkato | 0:f782d9c66c49 | 413 | } |
| dkato | 0:f782d9c66c49 | 414 | BZERO(rpasswd, rpasswdlen); |
| dkato | 0:f782d9c66c49 | 415 | |
| dkato | 0:f782d9c66c49 | 416 | #if 0 /* UNUSED */ |
| dkato | 0:f782d9c66c49 | 417 | /* |
| dkato | 0:f782d9c66c49 | 418 | * Check remote number authorization. A plugin may have filled in |
| dkato | 0:f782d9c66c49 | 419 | * the remote number or added an allowed number, and rather than |
| dkato | 0:f782d9c66c49 | 420 | * return an authenticate failure, is leaving it for us to verify. |
| dkato | 0:f782d9c66c49 | 421 | */ |
| dkato | 0:f782d9c66c49 | 422 | if (retcode == UPAP_AUTHACK) { |
| dkato | 0:f782d9c66c49 | 423 | if (!auth_number()) { |
| dkato | 0:f782d9c66c49 | 424 | /* We do not want to leak info about the pap result. */ |
| dkato | 0:f782d9c66c49 | 425 | retcode = UPAP_AUTHNAK; /* XXX exit value will be "wrong" */ |
| dkato | 0:f782d9c66c49 | 426 | warn("calling number %q is not authorized", remote_number); |
| dkato | 0:f782d9c66c49 | 427 | } |
| dkato | 0:f782d9c66c49 | 428 | } |
| dkato | 0:f782d9c66c49 | 429 | |
| dkato | 0:f782d9c66c49 | 430 | msglen = strlen(msg); |
| dkato | 0:f782d9c66c49 | 431 | if (msglen > 255) |
| dkato | 0:f782d9c66c49 | 432 | msglen = 255; |
| dkato | 0:f782d9c66c49 | 433 | #endif /* UNUSED */ |
| dkato | 0:f782d9c66c49 | 434 | |
| dkato | 0:f782d9c66c49 | 435 | upap_sresp(pcb, retcode, id, msg, msglen); |
| dkato | 0:f782d9c66c49 | 436 | |
| dkato | 0:f782d9c66c49 | 437 | /* Null terminate and clean remote name. */ |
| dkato | 0:f782d9c66c49 | 438 | ppp_slprintf(rhostname, sizeof(rhostname), "%.*v", ruserlen, ruser); |
| dkato | 0:f782d9c66c49 | 439 | |
| dkato | 0:f782d9c66c49 | 440 | if (retcode == UPAP_AUTHACK) { |
| dkato | 0:f782d9c66c49 | 441 | pcb->upap.us_serverstate = UPAPSS_OPEN; |
| dkato | 0:f782d9c66c49 | 442 | ppp_notice("PAP peer authentication succeeded for %q", rhostname); |
| dkato | 0:f782d9c66c49 | 443 | auth_peer_success(pcb, PPP_PAP, 0, ruser, ruserlen); |
| dkato | 0:f782d9c66c49 | 444 | } else { |
| dkato | 0:f782d9c66c49 | 445 | pcb->upap.us_serverstate = UPAPSS_BADAUTH; |
| dkato | 0:f782d9c66c49 | 446 | ppp_warn("PAP peer authentication failed for %q", rhostname); |
| dkato | 0:f782d9c66c49 | 447 | auth_peer_fail(pcb, PPP_PAP); |
| dkato | 0:f782d9c66c49 | 448 | } |
| dkato | 0:f782d9c66c49 | 449 | |
| dkato | 0:f782d9c66c49 | 450 | if (pcb->settings.pap_req_timeout > 0) |
| dkato | 0:f782d9c66c49 | 451 | UNTIMEOUT(upap_reqtimeout, pcb); |
| dkato | 0:f782d9c66c49 | 452 | } |
| dkato | 0:f782d9c66c49 | 453 | #endif /* PPP_SERVER */ |
| dkato | 0:f782d9c66c49 | 454 | |
| dkato | 0:f782d9c66c49 | 455 | /* |
| dkato | 0:f782d9c66c49 | 456 | * upap_rauthack - Receive Authenticate-Ack. |
| dkato | 0:f782d9c66c49 | 457 | */ |
| dkato | 0:f782d9c66c49 | 458 | static void upap_rauthack(ppp_pcb *pcb, u_char *inp, int id, int len) { |
| dkato | 0:f782d9c66c49 | 459 | u_char msglen; |
| dkato | 0:f782d9c66c49 | 460 | char *msg; |
| dkato | 0:f782d9c66c49 | 461 | LWIP_UNUSED_ARG(id); |
| dkato | 0:f782d9c66c49 | 462 | |
| dkato | 0:f782d9c66c49 | 463 | if (pcb->upap.us_clientstate != UPAPCS_AUTHREQ) /* XXX */ |
| dkato | 0:f782d9c66c49 | 464 | return; |
| dkato | 0:f782d9c66c49 | 465 | |
| dkato | 0:f782d9c66c49 | 466 | /* |
| dkato | 0:f782d9c66c49 | 467 | * Parse message. |
| dkato | 0:f782d9c66c49 | 468 | */ |
| dkato | 0:f782d9c66c49 | 469 | if (len < 1) { |
| dkato | 0:f782d9c66c49 | 470 | UPAPDEBUG(("pap_rauthack: ignoring missing msg-length.")); |
| dkato | 0:f782d9c66c49 | 471 | } else { |
| dkato | 0:f782d9c66c49 | 472 | GETCHAR(msglen, inp); |
| dkato | 0:f782d9c66c49 | 473 | if (msglen > 0) { |
| dkato | 0:f782d9c66c49 | 474 | len -= sizeof (u_char); |
| dkato | 0:f782d9c66c49 | 475 | if (len < msglen) { |
| dkato | 0:f782d9c66c49 | 476 | UPAPDEBUG(("pap_rauthack: rcvd short packet.")); |
| dkato | 0:f782d9c66c49 | 477 | return; |
| dkato | 0:f782d9c66c49 | 478 | } |
| dkato | 0:f782d9c66c49 | 479 | msg = (char *) inp; |
| dkato | 0:f782d9c66c49 | 480 | PRINTMSG(msg, msglen); |
| dkato | 0:f782d9c66c49 | 481 | } |
| dkato | 0:f782d9c66c49 | 482 | } |
| dkato | 0:f782d9c66c49 | 483 | |
| dkato | 0:f782d9c66c49 | 484 | pcb->upap.us_clientstate = UPAPCS_OPEN; |
| dkato | 0:f782d9c66c49 | 485 | |
| dkato | 0:f782d9c66c49 | 486 | auth_withpeer_success(pcb, PPP_PAP, 0); |
| dkato | 0:f782d9c66c49 | 487 | } |
| dkato | 0:f782d9c66c49 | 488 | |
| dkato | 0:f782d9c66c49 | 489 | |
| dkato | 0:f782d9c66c49 | 490 | /* |
| dkato | 0:f782d9c66c49 | 491 | * upap_rauthnak - Receive Authenticate-Nak. |
| dkato | 0:f782d9c66c49 | 492 | */ |
| dkato | 0:f782d9c66c49 | 493 | static void upap_rauthnak(ppp_pcb *pcb, u_char *inp, int id, int len) { |
| dkato | 0:f782d9c66c49 | 494 | u_char msglen; |
| dkato | 0:f782d9c66c49 | 495 | char *msg; |
| dkato | 0:f782d9c66c49 | 496 | LWIP_UNUSED_ARG(id); |
| dkato | 0:f782d9c66c49 | 497 | |
| dkato | 0:f782d9c66c49 | 498 | if (pcb->upap.us_clientstate != UPAPCS_AUTHREQ) /* XXX */ |
| dkato | 0:f782d9c66c49 | 499 | return; |
| dkato | 0:f782d9c66c49 | 500 | |
| dkato | 0:f782d9c66c49 | 501 | /* |
| dkato | 0:f782d9c66c49 | 502 | * Parse message. |
| dkato | 0:f782d9c66c49 | 503 | */ |
| dkato | 0:f782d9c66c49 | 504 | if (len < 1) { |
| dkato | 0:f782d9c66c49 | 505 | UPAPDEBUG(("pap_rauthnak: ignoring missing msg-length.")); |
| dkato | 0:f782d9c66c49 | 506 | } else { |
| dkato | 0:f782d9c66c49 | 507 | GETCHAR(msglen, inp); |
| dkato | 0:f782d9c66c49 | 508 | if (msglen > 0) { |
| dkato | 0:f782d9c66c49 | 509 | len -= sizeof (u_char); |
| dkato | 0:f782d9c66c49 | 510 | if (len < msglen) { |
| dkato | 0:f782d9c66c49 | 511 | UPAPDEBUG(("pap_rauthnak: rcvd short packet.")); |
| dkato | 0:f782d9c66c49 | 512 | return; |
| dkato | 0:f782d9c66c49 | 513 | } |
| dkato | 0:f782d9c66c49 | 514 | msg = (char *) inp; |
| dkato | 0:f782d9c66c49 | 515 | PRINTMSG(msg, msglen); |
| dkato | 0:f782d9c66c49 | 516 | } |
| dkato | 0:f782d9c66c49 | 517 | } |
| dkato | 0:f782d9c66c49 | 518 | |
| dkato | 0:f782d9c66c49 | 519 | pcb->upap.us_clientstate = UPAPCS_BADAUTH; |
| dkato | 0:f782d9c66c49 | 520 | |
| dkato | 0:f782d9c66c49 | 521 | ppp_error("PAP authentication failed"); |
| dkato | 0:f782d9c66c49 | 522 | auth_withpeer_fail(pcb, PPP_PAP); |
| dkato | 0:f782d9c66c49 | 523 | } |
| dkato | 0:f782d9c66c49 | 524 | |
| dkato | 0:f782d9c66c49 | 525 | |
| dkato | 0:f782d9c66c49 | 526 | /* |
| dkato | 0:f782d9c66c49 | 527 | * upap_sauthreq - Send an Authenticate-Request. |
| dkato | 0:f782d9c66c49 | 528 | */ |
| dkato | 0:f782d9c66c49 | 529 | static void upap_sauthreq(ppp_pcb *pcb) { |
| dkato | 0:f782d9c66c49 | 530 | struct pbuf *p; |
| dkato | 0:f782d9c66c49 | 531 | u_char *outp; |
| dkato | 0:f782d9c66c49 | 532 | int outlen; |
| dkato | 0:f782d9c66c49 | 533 | |
| dkato | 0:f782d9c66c49 | 534 | outlen = UPAP_HEADERLEN + 2 * sizeof (u_char) + |
| dkato | 0:f782d9c66c49 | 535 | pcb->upap.us_userlen + pcb->upap.us_passwdlen; |
| dkato | 0:f782d9c66c49 | 536 | p = pbuf_alloc(PBUF_RAW, (u16_t)(PPP_HDRLEN +outlen), PPP_CTRL_PBUF_TYPE); |
| dkato | 0:f782d9c66c49 | 537 | if(NULL == p) |
| dkato | 0:f782d9c66c49 | 538 | return; |
| dkato | 0:f782d9c66c49 | 539 | if(p->tot_len != p->len) { |
| dkato | 0:f782d9c66c49 | 540 | pbuf_free(p); |
| dkato | 0:f782d9c66c49 | 541 | return; |
| dkato | 0:f782d9c66c49 | 542 | } |
| dkato | 0:f782d9c66c49 | 543 | |
| dkato | 0:f782d9c66c49 | 544 | outp = (u_char*)p->payload; |
| dkato | 0:f782d9c66c49 | 545 | MAKEHEADER(outp, PPP_PAP); |
| dkato | 0:f782d9c66c49 | 546 | |
| dkato | 0:f782d9c66c49 | 547 | PUTCHAR(UPAP_AUTHREQ, outp); |
| dkato | 0:f782d9c66c49 | 548 | PUTCHAR(++pcb->upap.us_id, outp); |
| dkato | 0:f782d9c66c49 | 549 | PUTSHORT(outlen, outp); |
| dkato | 0:f782d9c66c49 | 550 | PUTCHAR(pcb->upap.us_userlen, outp); |
| dkato | 0:f782d9c66c49 | 551 | MEMCPY(outp, pcb->upap.us_user, pcb->upap.us_userlen); |
| dkato | 0:f782d9c66c49 | 552 | INCPTR(pcb->upap.us_userlen, outp); |
| dkato | 0:f782d9c66c49 | 553 | PUTCHAR(pcb->upap.us_passwdlen, outp); |
| dkato | 0:f782d9c66c49 | 554 | MEMCPY(outp, pcb->upap.us_passwd, pcb->upap.us_passwdlen); |
| dkato | 0:f782d9c66c49 | 555 | |
| dkato | 0:f782d9c66c49 | 556 | ppp_write(pcb, p); |
| dkato | 0:f782d9c66c49 | 557 | |
| dkato | 0:f782d9c66c49 | 558 | TIMEOUT(upap_timeout, pcb, pcb->settings.pap_timeout_time); |
| dkato | 0:f782d9c66c49 | 559 | ++pcb->upap.us_transmits; |
| dkato | 0:f782d9c66c49 | 560 | pcb->upap.us_clientstate = UPAPCS_AUTHREQ; |
| dkato | 0:f782d9c66c49 | 561 | } |
| dkato | 0:f782d9c66c49 | 562 | |
| dkato | 0:f782d9c66c49 | 563 | #if PPP_SERVER |
| dkato | 0:f782d9c66c49 | 564 | /* |
| dkato | 0:f782d9c66c49 | 565 | * upap_sresp - Send a response (ack or nak). |
| dkato | 0:f782d9c66c49 | 566 | */ |
| dkato | 0:f782d9c66c49 | 567 | static void upap_sresp(ppp_pcb *pcb, u_char code, u_char id, const char *msg, int msglen) { |
| dkato | 0:f782d9c66c49 | 568 | struct pbuf *p; |
| dkato | 0:f782d9c66c49 | 569 | u_char *outp; |
| dkato | 0:f782d9c66c49 | 570 | int outlen; |
| dkato | 0:f782d9c66c49 | 571 | |
| dkato | 0:f782d9c66c49 | 572 | outlen = UPAP_HEADERLEN + sizeof (u_char) + msglen; |
| dkato | 0:f782d9c66c49 | 573 | p = pbuf_alloc(PBUF_RAW, (u16_t)(PPP_HDRLEN +outlen), PPP_CTRL_PBUF_TYPE); |
| dkato | 0:f782d9c66c49 | 574 | if(NULL == p) |
| dkato | 0:f782d9c66c49 | 575 | return; |
| dkato | 0:f782d9c66c49 | 576 | if(p->tot_len != p->len) { |
| dkato | 0:f782d9c66c49 | 577 | pbuf_free(p); |
| dkato | 0:f782d9c66c49 | 578 | return; |
| dkato | 0:f782d9c66c49 | 579 | } |
| dkato | 0:f782d9c66c49 | 580 | |
| dkato | 0:f782d9c66c49 | 581 | outp = (u_char*)p->payload; |
| dkato | 0:f782d9c66c49 | 582 | MAKEHEADER(outp, PPP_PAP); |
| dkato | 0:f782d9c66c49 | 583 | |
| dkato | 0:f782d9c66c49 | 584 | PUTCHAR(code, outp); |
| dkato | 0:f782d9c66c49 | 585 | PUTCHAR(id, outp); |
| dkato | 0:f782d9c66c49 | 586 | PUTSHORT(outlen, outp); |
| dkato | 0:f782d9c66c49 | 587 | PUTCHAR(msglen, outp); |
| dkato | 0:f782d9c66c49 | 588 | MEMCPY(outp, msg, msglen); |
| dkato | 0:f782d9c66c49 | 589 | |
| dkato | 0:f782d9c66c49 | 590 | ppp_write(pcb, p); |
| dkato | 0:f782d9c66c49 | 591 | } |
| dkato | 0:f782d9c66c49 | 592 | #endif /* PPP_SERVER */ |
| dkato | 0:f782d9c66c49 | 593 | |
| dkato | 0:f782d9c66c49 | 594 | #if PRINTPKT_SUPPORT |
| dkato | 0:f782d9c66c49 | 595 | /* |
| dkato | 0:f782d9c66c49 | 596 | * upap_printpkt - print the contents of a PAP packet. |
| dkato | 0:f782d9c66c49 | 597 | */ |
| dkato | 0:f782d9c66c49 | 598 | static const char* const upap_codenames[] = { |
| dkato | 0:f782d9c66c49 | 599 | "AuthReq", "AuthAck", "AuthNak" |
| dkato | 0:f782d9c66c49 | 600 | }; |
| dkato | 0:f782d9c66c49 | 601 | |
| dkato | 0:f782d9c66c49 | 602 | static int upap_printpkt(const u_char *p, int plen, void (*printer) (void *, const char *, ...), void *arg) { |
| dkato | 0:f782d9c66c49 | 603 | int code, id, len; |
| dkato | 0:f782d9c66c49 | 604 | int mlen, ulen, wlen; |
| dkato | 0:f782d9c66c49 | 605 | const u_char *user, *pwd, *msg; |
| dkato | 0:f782d9c66c49 | 606 | const u_char *pstart; |
| dkato | 0:f782d9c66c49 | 607 | |
| dkato | 0:f782d9c66c49 | 608 | if (plen < UPAP_HEADERLEN) |
| dkato | 0:f782d9c66c49 | 609 | return 0; |
| dkato | 0:f782d9c66c49 | 610 | pstart = p; |
| dkato | 0:f782d9c66c49 | 611 | GETCHAR(code, p); |
| dkato | 0:f782d9c66c49 | 612 | GETCHAR(id, p); |
| dkato | 0:f782d9c66c49 | 613 | GETSHORT(len, p); |
| dkato | 0:f782d9c66c49 | 614 | if (len < UPAP_HEADERLEN || len > plen) |
| dkato | 0:f782d9c66c49 | 615 | return 0; |
| dkato | 0:f782d9c66c49 | 616 | |
| dkato | 0:f782d9c66c49 | 617 | if (code >= 1 && code <= (int)LWIP_ARRAYSIZE(upap_codenames)) |
| dkato | 0:f782d9c66c49 | 618 | printer(arg, " %s", upap_codenames[code-1]); |
| dkato | 0:f782d9c66c49 | 619 | else |
| dkato | 0:f782d9c66c49 | 620 | printer(arg, " code=0x%x", code); |
| dkato | 0:f782d9c66c49 | 621 | printer(arg, " id=0x%x", id); |
| dkato | 0:f782d9c66c49 | 622 | len -= UPAP_HEADERLEN; |
| dkato | 0:f782d9c66c49 | 623 | switch (code) { |
| dkato | 0:f782d9c66c49 | 624 | case UPAP_AUTHREQ: |
| dkato | 0:f782d9c66c49 | 625 | if (len < 1) |
| dkato | 0:f782d9c66c49 | 626 | break; |
| dkato | 0:f782d9c66c49 | 627 | ulen = p[0]; |
| dkato | 0:f782d9c66c49 | 628 | if (len < ulen + 2) |
| dkato | 0:f782d9c66c49 | 629 | break; |
| dkato | 0:f782d9c66c49 | 630 | wlen = p[ulen + 1]; |
| dkato | 0:f782d9c66c49 | 631 | if (len < ulen + wlen + 2) |
| dkato | 0:f782d9c66c49 | 632 | break; |
| dkato | 0:f782d9c66c49 | 633 | user = (const u_char *) (p + 1); |
| dkato | 0:f782d9c66c49 | 634 | pwd = (const u_char *) (p + ulen + 2); |
| dkato | 0:f782d9c66c49 | 635 | p += ulen + wlen + 2; |
| dkato | 0:f782d9c66c49 | 636 | len -= ulen + wlen + 2; |
| dkato | 0:f782d9c66c49 | 637 | printer(arg, " user="); |
| dkato | 0:f782d9c66c49 | 638 | ppp_print_string(user, ulen, printer, arg); |
| dkato | 0:f782d9c66c49 | 639 | printer(arg, " password="); |
| dkato | 0:f782d9c66c49 | 640 | /* FIXME: require ppp_pcb struct as printpkt() argument */ |
| dkato | 0:f782d9c66c49 | 641 | #if 0 |
| dkato | 0:f782d9c66c49 | 642 | if (!pcb->settings.hide_password) |
| dkato | 0:f782d9c66c49 | 643 | #endif |
| dkato | 0:f782d9c66c49 | 644 | ppp_print_string(pwd, wlen, printer, arg); |
| dkato | 0:f782d9c66c49 | 645 | #if 0 |
| dkato | 0:f782d9c66c49 | 646 | else |
| dkato | 0:f782d9c66c49 | 647 | printer(arg, "<hidden>"); |
| dkato | 0:f782d9c66c49 | 648 | #endif |
| dkato | 0:f782d9c66c49 | 649 | break; |
| dkato | 0:f782d9c66c49 | 650 | case UPAP_AUTHACK: |
| dkato | 0:f782d9c66c49 | 651 | case UPAP_AUTHNAK: |
| dkato | 0:f782d9c66c49 | 652 | if (len < 1) |
| dkato | 0:f782d9c66c49 | 653 | break; |
| dkato | 0:f782d9c66c49 | 654 | mlen = p[0]; |
| dkato | 0:f782d9c66c49 | 655 | if (len < mlen + 1) |
| dkato | 0:f782d9c66c49 | 656 | break; |
| dkato | 0:f782d9c66c49 | 657 | msg = (const u_char *) (p + 1); |
| dkato | 0:f782d9c66c49 | 658 | p += mlen + 1; |
| dkato | 0:f782d9c66c49 | 659 | len -= mlen + 1; |
| dkato | 0:f782d9c66c49 | 660 | printer(arg, " "); |
| dkato | 0:f782d9c66c49 | 661 | ppp_print_string(msg, mlen, printer, arg); |
| dkato | 0:f782d9c66c49 | 662 | break; |
| dkato | 0:f782d9c66c49 | 663 | default: |
| dkato | 0:f782d9c66c49 | 664 | break; |
| dkato | 0:f782d9c66c49 | 665 | } |
| dkato | 0:f782d9c66c49 | 666 | |
| dkato | 0:f782d9c66c49 | 667 | /* print the rest of the bytes in the packet */ |
| dkato | 0:f782d9c66c49 | 668 | for (; len > 0; --len) { |
| dkato | 0:f782d9c66c49 | 669 | GETCHAR(code, p); |
| dkato | 0:f782d9c66c49 | 670 | printer(arg, " %.2x", code); |
| dkato | 0:f782d9c66c49 | 671 | } |
| dkato | 0:f782d9c66c49 | 672 | |
| dkato | 0:f782d9c66c49 | 673 | return p - pstart; |
| dkato | 0:f782d9c66c49 | 674 | } |
| dkato | 0:f782d9c66c49 | 675 | #endif /* PRINTPKT_SUPPORT */ |
| dkato | 0:f782d9c66c49 | 676 | |
| dkato | 0:f782d9c66c49 | 677 | #endif /* PPP_SUPPORT && PAP_SUPPORT */ |