// L2TPNS PPP Stuff
-char const *cvs_id_ppp = "$Id: ppp.c,v 1.43 2005/01/25 04:38:49 bodea Exp $";
+char const *cvs_id_ppp = "$Id: ppp.c,v 1.47 2005/04/27 13:53:17 bodea Exp $";
#include <stdio.h>
#include <string.h>
// Process PAP messages
void processpap(tunnelidt t, sessionidt s, uint8_t *p, uint16_t l)
{
- char user[129];
- char pass[129];
+ char user[MAXUSER];
+ char pass[MAXPASS];
uint16_t hl;
CSTAT(processpap);
{
LOG(1, s, t, "Short PAP %u bytes\n", l);
STAT(tunnel_rx_errors);
+ sessionshutdown(s, "Short PAP packet.", 3, 0);
return ;
}
{
LOG(1, s, t, "Length mismatch PAP %u/%u\n", hl, l);
STAT(tunnel_rx_errors);
+ sessionshutdown(s, "PAP length mismatch.", 3, 0);
return ;
}
l = hl;
{
LOG(1, s, t, "Unexpected PAP code %d\n", *p);
STAT(tunnel_rx_errors);
+ sessionshutdown(s, "Unexpected PAP code.", 3, 0);
return ;
}
{
uint8_t *b = p;
b += 4;
+ user[0] = pass[0] = 0;
if (*b && *b < sizeof(user))
+ {
memcpy(user, b + 1, *b);
- user[*b] = 0;
- b += 1 + *b;
- if (*b && *b < sizeof(pass))
- memcpy(pass, b + 1, *b);
- pass[*b] = 0;
+ user[*b] = 0;
+ b += 1 + *b;
+ if (*b && *b < sizeof(pass))
+ {
+ memcpy(pass, b + 1, *b);
+ pass[*b] = 0;
+ }
+ }
LOG(3, s, t, "PAP login %s/%s\n", user, pass);
}
if (session[s].ip || !session[s].radius)
}
LOG(3, s, t, "Fallback response to PAP (%s)\n", (session[s].ip) ? "ACK" : "NAK");
tunnelsend(b, 5 + (p - b), t); // send it
+ sessionshutdown(s, "PAP authentication failed.", 3, 0);
}
else
{
q = makeppp(b, sizeof(b), p, l, t, s, PPPLCP);
if (!q) return;
tunnelsend(b, l + (q - b), t); // send it
- sessionshutdown(s, "Remote end closed connection.");
+ sessionshutdown(s, "Remote end closed connection.", 3, 0);
}
else if (*p == TerminateAck)
{
- sessionshutdown(s, "Connection closed.");
+ sessionshutdown(s, "Connection closed.", 3, 0);
}
else if (*p == ProtocolRej)
{
tunnelsend(b, l + (q - b), t); // send it
}
-// send a CHAP PP packet
+// send a CHAP challenge
void sendchap(tunnelidt t, sessionidt s)
{
uint8_t b[MAXCONTROL];
uint16_t r = session[s].radius;
uint8_t *q;
+ uint8_t *l;
CSTAT(sendchap);
radius[r].retry = backoff(radius[r].try++);
if (radius[r].try > 5)
{
- sessionshutdown(s, "Timeout CHAP");
+ sessionshutdown(s, "CHAP timeout.", 3, 0);
STAT(tunnel_tx_errors);
return ;
}
*q = 1; // challenge
q[1] = radius[r].id; // ID
- q[4] = 16; // length
+ q[4] = 16; // value size (size of challenge)
memcpy(q + 5, radius[r].auth, 16); // challenge
strcpy(q + 21, hostname); // our name
*(uint16_t *) (q + 2) = htons(strlen(hostname) + 21); // length