struct mbuf * pap_Input(struct bundle *bundle, struct link *l, struct mbuf *bp) { struct physical *p = link2physical(l); struct authinfo *authp = &p->dl->pap; u_char nlen, klen, *key; const char *txt; int txtlen; if (p == NULL) { log_Printf(LogERROR, "pap_Input: Not a physical link - dropped\n"); m_freem(bp); return NULL; } if (bundle_Phase(bundle) != PHASE_NETWORK && bundle_Phase(bundle) != PHASE_AUTHENTICATE) { log_Printf(LogPHASE, "Unexpected pap input - dropped !\n"); m_freem(bp); return NULL; } if ((bp = auth_ReadHeader(authp, bp)) == NULL && ntohs(authp->in.hdr.length) == 0) { log_Printf(LogWARN, "Pap Input: Truncated header !\n"); return NULL; } if (authp->in.hdr.code == 0 || authp->in.hdr.code > MAXPAPCODE) { log_Printf(LogPHASE, "Pap Input: %d: Bad PAP code !\n", authp->in.hdr.code); m_freem(bp); return NULL; } if (authp->in.hdr.code != PAP_REQUEST && authp->id != authp->in.hdr.id && Enabled(bundle, OPT_IDCHECK)) { /* Wrong conversation dude ! */ log_Printf(LogPHASE, "Pap Input: %s dropped (got id %d, not %d)\n", papcodes[authp->in.hdr.code], authp->in.hdr.id, authp->id); m_freem(bp); return NULL; } m_settype(bp, MB_PAPIN); authp->id = authp->in.hdr.id; /* We respond with this id */ if (bp) { bp = mbuf_Read(bp, &nlen, 1); if (authp->in.hdr.code == PAP_ACK) { /* * Don't restrict the length of our acknowledgement freetext to * nlen (a one-byte length). Show the rest of the ack packet * instead. This isn't really part of the protocol..... */ bp = m_pullup(bp); txt = MBUF_CTOP(bp); txtlen = m_length(bp); } else { bp = auth_ReadName(authp, bp, nlen); txt = authp->in.name; txtlen = strlen(authp->in.name); } } else { txt = ""; txtlen = 0; } log_Printf(LogPHASE, "Pap Input: %s (%.*s)\n", papcodes[authp->in.hdr.code], txtlen, txt); switch (authp->in.hdr.code) { case PAP_REQUEST: if (bp == NULL) { log_Printf(LogPHASE, "Pap Input: No key given !\n"); break; } bp = mbuf_Read(bp, &klen, 1); if (m_length(bp) < klen) { log_Printf(LogERROR, "Pap Input: Truncated key !\n"); break; } if ((key = malloc(klen+1)) == NULL) { log_Printf(LogERROR, "Pap Input: Out of memory !\n"); break; } bp = mbuf_Read(bp, key, klen); key[klen] = '\0'; #ifndef NORADIUS if (*bundle->radius.cfg.file) { if (!radius_Authenticate(&bundle->radius, authp, authp->in.name, key, strlen(key), NULL, 0)) pap_Failure(authp); } else #endif if (auth_Validate(bundle, authp->in.name, key)) pap_Success(authp); else pap_Failure(authp); free(key); break; case PAP_ACK: auth_StopTimer(authp); if (p->link.lcp.auth_iwait == PROTO_PAP) { p->link.lcp.auth_iwait = 0; if (p->link.lcp.auth_ineed == 0) /* * We've succeeded in our ``login'' * If we're not expecting the peer to authenticate (or he already * has), proceed to network phase. */ datalink_AuthOk(p->dl); } break; case PAP_NAK: auth_StopTimer(authp); datalink_AuthNotOk(p->dl); break; } m_freem(bp); return NULL; }
PPP_ZC_STRU * pap_Input(/*struct bundle *bundle,*/ struct link *l, PPP_ZC_STRU *pstMem) { /* struct physical *p = link2physical(l);*/ #if 0 /* delete for transplant */ VOS_CHAR nlen, *key; #endif struct authinfo *authp =/* &p->dl*/&(l->pap.auth); VOS_CHAR nlen; VOS_UINT8 klen; const VOS_CHAR *txt; VOS_INT32 txtlen; struct ppp_mbuf *bp; bp = ppp_m_get_from_ttfmem(pstMem); PPP_MemFree(pstMem); if (VOS_NULL_PTR == bp) { return VOS_NULL_PTR; } if (l == VOS_NULL_PTR) { PPP_MNTN_LOG(PS_PID_APP_PPP, 0, PS_PRINT_WARNING, "pap input, Not a physical link - dropped\r\n"); ppp_m_freem(bp); return VOS_NULL_PTR; } if (/*bundle_Phase(bundle)*/ l->phase!= PHASE_NETWORK && /*bundle_Phase(bundle)*/ l->phase!= PHASE_AUTHENTICATE) { PPP_MNTN_LOG(PS_PID_APP_PPP, 0, PS_PRINT_NORMAL, "Unexpected pap input - dropped\r\n"); ppp_m_freem(bp); return VOS_NULL_PTR; } if ((bp = auth_ReadHeader(authp, bp)) == VOS_NULL_PTR && VOS_NTOHS(authp->in.hdr.length) == 0) { PPP_MNTN_LOG(PS_PID_APP_PPP, 0, PS_PRINT_WARNING, "Pap Input: Truncated header\r\n"); return VOS_NULL_PTR; } if (authp->in.hdr.code == 0 || authp->in.hdr.code > MAXPAPCODE) { PPP_MNTN_LOG1(PS_PID_APP_PPP, 0, LOG_LEVEL_WARNING, "Bad PAP code: %d", authp->in.hdr.code); ppp_m_freem(bp); return VOS_NULL_PTR; } if (authp->in.hdr.code != PAP_REQUEST && authp->id != authp->in.hdr.id) { /* Wrong conversation dude ! */ PPP_MNTN_LOG(PS_PID_APP_PPP, 0, PS_PRINT_WARNING, "pap input, dropped (got id not equal to previous id)\r\n"); ppp_m_freem(bp); return VOS_NULL_PTR; } authp->id = authp->in.hdr.id; /* We respond with this id */ /*fanzhibin f49086 add it begin*/ if (authp->in.hdr.code == PAP_REQUEST) { /*将config req报文头部拷贝到缓存中*/ PS_MEM_CPY(l->pap.RecordData.BufRequest,&(authp->in.hdr),sizeof(authp->in.hdr)); ppp_mbuf_View(bp,(l->pap.RecordData.BufRequest + sizeof(authp->in.hdr)), VOS_NTOHS(authp->in.hdr.length) - sizeof(authp->in.hdr)); l->pap.RecordData.LenOfRequest = VOS_NTOHS(authp->in.hdr.length); } /*fanzhibin f49086 add it end*/ if (bp) { bp = ppp_mbuf_Read(bp, &nlen, 1); if (authp->in.hdr.code == PAP_ACK) { /* * Don't restrict the length of our acknowledgement freetext to * nlen (a one-byte length). Show the rest of the ack packet * instead. This isn't really part of the protocol..... */ bp = ppp_m_pullup(bp); txt = PPP_MBUF_CTOP(bp); txtlen = ppp_m_length(bp); } else { bp = auth_ReadName(authp, bp, nlen); txt = authp->in.name; txtlen = VOS_StrNLen(authp->in.name,AUTHLEN); PPP_MNTN_LOG(PS_PID_APP_PPP, 0, PS_PRINT_NORMAL, "username:"******""; txtlen = 0; } PPP_MNTN_LOG(PS_PID_APP_PPP, 0, PS_PRINT_NORMAL, "\r\nPap Input\r\n"); switch (authp->in.hdr.code) { case PAP_REQUEST: if (bp == VOS_NULL_PTR) { PPP_MNTN_LOG(PS_PID_APP_PPP, 0, PS_PRINT_NORMAL, "Pap Input: No key given !\r\n"); break; } bp = ppp_mbuf_Read(bp, &klen, 1); if (ppp_m_length(bp) < klen) { PPP_MNTN_LOG(PS_PID_APP_PPP, 0, PS_PRINT_WARNING, "Pap Input: Truncated key !\r\n"); break; } #if 0/*fanzhibin f49086 delete it*/ if ((key = VOS_MemAlloc(PS_PID_APP_PPP, DYNAMIC_DOPRA_MEM_PT,klen+1)) == VOS_NULL_PTR) { PS_LOG(PS_PID_APP_PPP, 0, PS_PRINT_ERROR, "Pap Input: Out of memory !\n"); break; } bp = ppp_mbuf_Read(bp, key, klen); key[klen] = '\0'; #ifndef NORADIUS if (*bundle->radius.cfg.file) { if (!radius_Authenticate(&bundle->radius, authp, authp->in.name, key, strlen(key), VOS_NULL_PTR, 0)) pap_Failure(authp); } else #endif /*下面这句在改造的时候要添进去*/ if (auth_Validate(bundle, authp->in.name, key, p)) pap_Success(authp); else pap_Failure(authp); VOS_MemFree(PS_PID_APP_PPP,key); #endif /*fanzhibin f49086 add it begin*/ if (klen > sizeof l->pap.RecordData.password- 1) { PPP_MNTN_LOG1(PS_PID_APP_PPP, 0, LOG_LEVEL_WARNING, "auth_ReadPassword: PassWord too long,len= %d", klen); } else { if (klen > ppp_m_length(bp)) { PPP_MNTN_LOG1(PS_PID_APP_PPP, 0, LOG_LEVEL_WARNING, "auth_ReadPassword: Short packet, pass_len = %d", klen); } else { bp = ppp_mbuf_Read(bp, l->pap.RecordData.password, klen); l->pap.RecordData.password[klen] = '\0'; PPP_MNTN_LOG(PS_PID_APP_PPP, 0, PS_PRINT_NORMAL, "password:"); PPP_MNTN_LOG(PS_PID_APP_PPP, 0, PS_PRINT_NORMAL, l->pap.RecordData.password); } } pap_Success(l); /*fanzhibin f49086 add it end*/ break; case PAP_ACK: #if 0/*fanzhibin f49086 delete it*/ auth_StopTimer(authp); if (p->link.lcp.auth_iwait == PROTO_PAP) { p->link.lcp.auth_iwait = 0; if (p->link.lcp.auth_ineed == 0) /* * We've succeeded in our ``login'' * If we're not expecting the peer to authenticate (or he already * has), proceed to network phase. */ datalink_AuthOk(p->dl); } #endif break; case PAP_NAK: #if 0/*fanzhibin f49086 delete it*/ auth_StopTimer(authp); datalink_AuthNotOk(p->dl); #endif break; } ppp_m_freem(bp); return VOS_NULL_PTR; }