projects
/
l2tpns.git
/ commitdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
| commitdiff |
tree
raw
|
patch
|
inline
| side by side (parent:
ac381e0
)
Change log level
author
Fernando Alves
<falves@maltem.com>
Sun, 17 Sep 2023 12:52:00 +0000
(14:52 +0200)
committer
Fernando Alves
<falves@maltem.com>
Sun, 17 Sep 2023 12:52:00 +0000
(14:52 +0200)
l2tpns.c
patch
|
blob
|
history
diff --git
a/l2tpns.c
b/l2tpns.c
index
5947561
..
0838607
100644
(file)
--- a/
l2tpns.c
+++ b/
l2tpns.c
@@
-2800,7
+2800,7
@@
void processudp(uint8_t *buf, int len, struct sockaddr_in *addr, uint16_t indexu
n = orig_len;
}
n = orig_len;
}
- LOG(
4
, s, t, " AVP %u (%s) len %d%s%s\n", mtype, l2tp_avp_name(mtype), n,
+ LOG(
3
, s, t, " AVP %u (%s) len %d%s%s\n", mtype, l2tp_avp_name(mtype), n,
flags & 0x40 ? ", hidden" : "", flags & 0x80 ? ", mandatory" : "");
switch (mtype)
flags & 0x40 ? ", hidden" : "", flags & 0x80 ? ", mandatory" : "");
switch (mtype)
@@
-2808,7
+2808,7
@@
void processudp(uint8_t *buf, int len, struct sockaddr_in *addr, uint16_t indexu
case 0: // message type
message = ntohs(*(uint16_t *) b);
mandatory = flags & 0x80;
case 0: // message type
message = ntohs(*(uint16_t *) b);
mandatory = flags & 0x80;
- LOG(
4
, s, t, " Message type = %u (%s)\n", message, l2tp_code(message));
+ LOG(
3
, s, t, " Message type = %u (%s)\n", message, l2tp_code(message));
break;
case 1: // result code
{
break;
case 1: // result code
{
@@
-2831,15
+2831,15
@@
void processudp(uint8_t *buf, int len, struct sockaddr_in *addr, uint16_t indexu
cause = TERM_ADMIN_RESET;
}
cause = TERM_ADMIN_RESET;
}
- LOG(
4
, s, t, " Result Code %u: %s\n", rescode, resdesc);
+ LOG(
3
, s, t, " Result Code %u: %s\n", rescode, resdesc);
if (n >= 4)
{
uint16_t errcode = ntohs(*(uint16_t *)(b + 2));
errdesc = l2tp_error_code(errcode);
if (n >= 4)
{
uint16_t errcode = ntohs(*(uint16_t *)(b + 2));
errdesc = l2tp_error_code(errcode);
- LOG(
4
, s, t, " Error Code %u: %s\n", errcode, errdesc);
+ LOG(
3
, s, t, " Error Code %u: %s\n", errcode, errdesc);
}
if (n > 4)
}
if (n > 4)
- LOG(
4
, s, t, " Error String: %.*s\n", n-4, b+4);
+ LOG(
3
, s, t, " Error String: %.*s\n", n-4, b+4);
if (cause && disc_cause_set < mtype) // take cause from attrib 46 in preference
{
if (cause && disc_cause_set < mtype) // take cause from attrib 46 in preference
{
@@
-2854,7
+2854,7
@@
void processudp(uint8_t *buf, int len, struct sockaddr_in *addr, uint16_t indexu
case 2: // protocol version
{
version = ntohs(*(uint16_t *) (b));
case 2: // protocol version
{
version = ntohs(*(uint16_t *) (b));
- LOG(
4
, s, t, " Protocol version = %u\n", version);
+ LOG(
3
, s, t, " Protocol version = %u\n", version);
if (version && version != 0x0100)
{ // allow 0.0 and 1.0
LOG(1, s, t, " Bad protocol version %04X\n", version);
if (version && version != 0x0100)
{ // allow 0.0 and 1.0
LOG(1, s, t, " Bad protocol version %04X\n", version);
@@
-2878,27
+2878,27
@@
void processudp(uint8_t *buf, int len, struct sockaddr_in *addr, uint16_t indexu
case 7: // host name
memset(tunnel[t].hostname, 0, sizeof(tunnel[t].hostname));
memcpy(tunnel[t].hostname, b, (n < sizeof(tunnel[t].hostname)) ? n : sizeof(tunnel[t].hostname) - 1);
case 7: // host name
memset(tunnel[t].hostname, 0, sizeof(tunnel[t].hostname));
memcpy(tunnel[t].hostname, b, (n < sizeof(tunnel[t].hostname)) ? n : sizeof(tunnel[t].hostname) - 1);
- LOG(
4
, s, t, " Tunnel hostname = \"%s\"\n", tunnel[t].hostname);
+ LOG(
3
, s, t, " Tunnel hostname = \"%s\"\n", tunnel[t].hostname);
// TBA - to send to RADIUS
break;
case 8: // vendor name
memset(tunnel[t].vendor, 0, sizeof(tunnel[t].vendor));
memcpy(tunnel[t].vendor, b, (n < sizeof(tunnel[t].vendor)) ? n : sizeof(tunnel[t].vendor) - 1);
// TBA - to send to RADIUS
break;
case 8: // vendor name
memset(tunnel[t].vendor, 0, sizeof(tunnel[t].vendor));
memcpy(tunnel[t].vendor, b, (n < sizeof(tunnel[t].vendor)) ? n : sizeof(tunnel[t].vendor) - 1);
- LOG(
4
, s, t, " Vendor name = \"%s\"\n", tunnel[t].vendor);
+ LOG(
3
, s, t, " Vendor name = \"%s\"\n", tunnel[t].vendor);
break;
case 9: // assigned tunnel
tunnel[t].far = ntohs(*(uint16_t *) (b));
break;
case 9: // assigned tunnel
tunnel[t].far = ntohs(*(uint16_t *) (b));
- LOG(
4
, s, t, " Remote tunnel id = %u\n", tunnel[t].far);
+ LOG(
3
, s, t, " Remote tunnel id = %u\n", tunnel[t].far);
break;
case 10: // rx window
tunnel[t].window = ntohs(*(uint16_t *) (b));
if (!tunnel[t].window)
tunnel[t].window = 1; // window of 0 is silly
break;
case 10: // rx window
tunnel[t].window = ntohs(*(uint16_t *) (b));
if (!tunnel[t].window)
tunnel[t].window = 1; // window of 0 is silly
- LOG(
4
, s, t, " rx window = %u\n", tunnel[t].window);
+ LOG(
3
, s, t, " rx window = %u\n", tunnel[t].window);
break;
case 11: // Request Challenge
{
break;
case 11: // Request Challenge
{
- LOG(
4
, s, t, " LAC requested CHAP authentication for tunnel\n");
+ LOG(
3
, s, t, " LAC requested CHAP authentication for tunnel\n");
if (message == 1)
build_chap_response(b, 2, n, &sendchalresponse);
else if (message == 2)
if (message == 1)
build_chap_response(b, 2, n, &sendchalresponse);
else if (message == 2)
@@
-2919,28
+2919,28
@@
void processudp(uint8_t *buf, int len, struct sockaddr_in *addr, uint16_t indexu
case 14: // assigned session
asession = session[s].far = ntohs(*(uint16_t *) (b));
case 14: // assigned session
asession = session[s].far = ntohs(*(uint16_t *) (b));
- LOG(
4
, s, t, " assigned session = %u\n", asession);
+ LOG(
3
, s, t, " assigned session = %u\n", asession);
break;
case 15: // call serial number
break;
case 15: // call serial number
- LOG(
4
, s, t, " call serial number = %u\n", ntohl(*(uint32_t *)b));
+ LOG(
3
, s, t, " call serial number = %u\n", ntohl(*(uint32_t *)b));
break;
case 18: // bearer type
break;
case 18: // bearer type
- LOG(
4
, s, t, " bearer type = %u\n", ntohl(*(uint32_t *)b));
+ LOG(
3
, s, t, " bearer type = %u\n", ntohl(*(uint32_t *)b));
// TBA - for RADIUS
break;
case 19: // framing type
// TBA - for RADIUS
break;
case 19: // framing type
- LOG(
4
, s, t, " framing type = %u\n", ntohl(*(uint32_t *)b));
+ LOG(
3
, s, t, " framing type = %u\n", ntohl(*(uint32_t *)b));
// TBA
break;
case 21: // called number
memset(called, 0, sizeof(called));
memcpy(called, b, (n < sizeof(called)) ? n : sizeof(called) - 1);
// TBA
break;
case 21: // called number
memset(called, 0, sizeof(called));
memcpy(called, b, (n < sizeof(called)) ? n : sizeof(called) - 1);
- LOG(
4
, s, t, " Called <%s>\n", called);
+ LOG(
3
, s, t, " Called <%s>\n", called);
break;
case 22: // calling number
memset(calling, 0, sizeof(calling));
memcpy(calling, b, (n < sizeof(calling)) ? n : sizeof(calling) - 1);
break;
case 22: // calling number
memset(calling, 0, sizeof(calling));
memcpy(calling, b, (n < sizeof(calling)) ? n : sizeof(calling) - 1);
- LOG(
4
, s, t, " Calling <%s>\n", calling);
+ LOG(
3
, s, t, " Calling <%s>\n", calling);
break;
case 23: // subtype
break;
break;
case 23: // subtype
break;
@@
-2957,7
+2957,7
@@
void processudp(uint8_t *buf, int len, struct sockaddr_in *addr, uint16_t indexu
memcpy(tmp, b, (n < sizeof(tmp)) ? n : sizeof(tmp) - 1);
session[s].tx_connect_speed = atol(tmp);
}
memcpy(tmp, b, (n < sizeof(tmp)) ? n : sizeof(tmp) - 1);
session[s].tx_connect_speed = atol(tmp);
}
- LOG(
4
, s, t, " TX connect speed <%u>\n", session[s].tx_connect_speed);
+ LOG(
3
, s, t, " TX connect speed <%u>\n", session[s].tx_connect_speed);
break;
case 38: // rx connect speed
if (n == 4)
break;
case 38: // rx connect speed
if (n == 4)
@@
-2972,18
+2972,18
@@
void processudp(uint8_t *buf, int len, struct sockaddr_in *addr, uint16_t indexu
memcpy(tmp, b, (n < sizeof(tmp)) ? n : sizeof(tmp) - 1);
session[s].rx_connect_speed = atol(tmp);
}
memcpy(tmp, b, (n < sizeof(tmp)) ? n : sizeof(tmp) - 1);
session[s].rx_connect_speed = atol(tmp);
}
- LOG(
4
, s, t, " RX connect speed <%u>\n", session[s].rx_connect_speed);
+ LOG(
3
, s, t, " RX connect speed <%u>\n", session[s].rx_connect_speed);
break;
case 25: // Physical Channel ID
{
uint32_t tmp = ntohl(*(uint32_t *) b);
break;
case 25: // Physical Channel ID
{
uint32_t tmp = ntohl(*(uint32_t *) b);
- LOG(
4
, s, t, " Physical Channel ID <%X>\n", tmp);
+ LOG(
3
, s, t, " Physical Channel ID <%X>\n", tmp);
break;
}
case 29: // Proxy Authentication Type
{
uint16_t atype = ntohs(*(uint16_t *)b);
break;
}
case 29: // Proxy Authentication Type
{
uint16_t atype = ntohs(*(uint16_t *)b);
- LOG(
4
, s, t, " Proxy Auth Type %u (%s)\n", atype, ppp_auth_type(atype));
+ LOG(
3
, s, t, " Proxy Auth Type %u (%s)\n", atype, ppp_auth_type(atype));
break;
}
case 30: // Proxy Authentication Name
break;
}
case 30: // Proxy Authentication Name
@@
-2991,23
+2991,23
@@
void processudp(uint8_t *buf, int len, struct sockaddr_in *addr, uint16_t indexu
char authname[64];
memset(authname, 0, sizeof(authname));
memcpy(authname, b, (n < sizeof(authname)) ? n : sizeof(authname) - 1);
char authname[64];
memset(authname, 0, sizeof(authname));
memcpy(authname, b, (n < sizeof(authname)) ? n : sizeof(authname) - 1);
- LOG(
4
, s, t, " Proxy Auth Name (%s)\n",
+ LOG(
3
, s, t, " Proxy Auth Name (%s)\n",
authname);
break;
}
case 31: // Proxy Authentication Challenge
{
authname);
break;
}
case 31: // Proxy Authentication Challenge
{
- LOG(
4
, s, t, " Proxy Auth Challenge\n");
+ LOG(
3
, s, t, " Proxy Auth Challenge\n");
break;
}
case 32: // Proxy Authentication ID
{
uint16_t authid = ntohs(*(uint16_t *)(b));
break;
}
case 32: // Proxy Authentication ID
{
uint16_t authid = ntohs(*(uint16_t *)(b));
- LOG(
4
, s, t, " Proxy Auth ID (%u)\n", authid);
+ LOG(
3
, s, t, " Proxy Auth ID (%u)\n", authid);
break;
}
case 33: // Proxy Authentication Response
break;
}
case 33: // Proxy Authentication Response
- LOG(
4
, s, t, " Proxy Auth Response\n");
+ LOG(
3
, s, t, " Proxy Auth Response\n");
break;
case 27: // last sent lcp
{ // find magic number
break;
case 27: // last sent lcp
{ // find magic number
@@
-3031,7
+3031,7
@@
void processudp(uint8_t *buf, int len, struct sockaddr_in *addr, uint16_t indexu
case 39: // seq required - we control it as an LNS anyway...
break;
case 36: // Random Vector
case 39: // seq required - we control it as an LNS anyway...
break;
case 36: // Random Vector
- LOG(
4
, s, t, " Random Vector received. Enabled AVP Hiding.\n");
+ LOG(
3
, s, t, " Random Vector received. Enabled AVP Hiding.\n");
memset(session[s].random_vector, 0, sizeof(session[s].random_vector));
if (n > sizeof(session[s].random_vector))
n = sizeof(session[s].random_vector);
memset(session[s].random_vector, 0, sizeof(session[s].random_vector));
if (n > sizeof(session[s].random_vector))
n = sizeof(session[s].random_vector);
@@
-3045,7
+3045,7
@@
void processudp(uint8_t *buf, int len, struct sockaddr_in *addr, uint16_t indexu
uint16_t proto = ntohs(*(uint16_t *) (b + 2));
uint8_t dir = *(b + 4);
uint16_t proto = ntohs(*(uint16_t *) (b + 2));
uint8_t dir = *(b + 4);
- LOG(
4
, s, t, " PPP disconnect cause "
+ LOG(
3
, s, t, " PPP disconnect cause "
"(code=%u, proto=%04X, dir=%u, msg=\"%.*s\")\n",
code, proto, dir, n - 5, b + 5);
"(code=%u, proto=%04X, dir=%u, msg=\"%.*s\")\n",
code, proto, dir, n - 5, b + 5);