xref: /nrf52832-nimble/rt-thread/components/net/lwip-2.1.0/src/netif/ppp/auth.c (revision 104654410c56c573564690304ae786df310c91fc)
1*10465441SEvalZero /*
2*10465441SEvalZero  * auth.c - PPP authentication and phase control.
3*10465441SEvalZero  *
4*10465441SEvalZero  * Copyright (c) 1993-2002 Paul Mackerras. All rights reserved.
5*10465441SEvalZero  *
6*10465441SEvalZero  * Redistribution and use in source and binary forms, with or without
7*10465441SEvalZero  * modification, are permitted provided that the following conditions
8*10465441SEvalZero  * are met:
9*10465441SEvalZero  *
10*10465441SEvalZero  * 1. Redistributions of source code must retain the above copyright
11*10465441SEvalZero  *    notice, this list of conditions and the following disclaimer.
12*10465441SEvalZero  *
13*10465441SEvalZero  * 2. The name(s) of the authors of this software must not be used to
14*10465441SEvalZero  *    endorse or promote products derived from this software without
15*10465441SEvalZero  *    prior written permission.
16*10465441SEvalZero  *
17*10465441SEvalZero  * 3. Redistributions of any form whatsoever must retain the following
18*10465441SEvalZero  *    acknowledgment:
19*10465441SEvalZero  *    "This product includes software developed by Paul Mackerras
20*10465441SEvalZero  *     <[email protected]>".
21*10465441SEvalZero  *
22*10465441SEvalZero  * THE AUTHORS OF THIS SOFTWARE DISCLAIM ALL WARRANTIES WITH REGARD TO
23*10465441SEvalZero  * THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
24*10465441SEvalZero  * AND FITNESS, IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY
25*10465441SEvalZero  * SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
26*10465441SEvalZero  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
27*10465441SEvalZero  * AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
28*10465441SEvalZero  * OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
29*10465441SEvalZero  *
30*10465441SEvalZero  * Derived from main.c, which is:
31*10465441SEvalZero  *
32*10465441SEvalZero  * Copyright (c) 1984-2000 Carnegie Mellon University. All rights reserved.
33*10465441SEvalZero  *
34*10465441SEvalZero  * Redistribution and use in source and binary forms, with or without
35*10465441SEvalZero  * modification, are permitted provided that the following conditions
36*10465441SEvalZero  * are met:
37*10465441SEvalZero  *
38*10465441SEvalZero  * 1. Redistributions of source code must retain the above copyright
39*10465441SEvalZero  *    notice, this list of conditions and the following disclaimer.
40*10465441SEvalZero  *
41*10465441SEvalZero  * 2. Redistributions in binary form must reproduce the above copyright
42*10465441SEvalZero  *    notice, this list of conditions and the following disclaimer in
43*10465441SEvalZero  *    the documentation and/or other materials provided with the
44*10465441SEvalZero  *    distribution.
45*10465441SEvalZero  *
46*10465441SEvalZero  * 3. The name "Carnegie Mellon University" must not be used to
47*10465441SEvalZero  *    endorse or promote products derived from this software without
48*10465441SEvalZero  *    prior written permission. For permission or any legal
49*10465441SEvalZero  *    details, please contact
50*10465441SEvalZero  *      Office of Technology Transfer
51*10465441SEvalZero  *      Carnegie Mellon University
52*10465441SEvalZero  *      5000 Forbes Avenue
53*10465441SEvalZero  *      Pittsburgh, PA  15213-3890
54*10465441SEvalZero  *      (412) 268-4387, fax: (412) 268-7395
55*10465441SEvalZero  *      [email protected]
56*10465441SEvalZero  *
57*10465441SEvalZero  * 4. Redistributions of any form whatsoever must retain the following
58*10465441SEvalZero  *    acknowledgment:
59*10465441SEvalZero  *    "This product includes software developed by Computing Services
60*10465441SEvalZero  *     at Carnegie Mellon University (http://www.cmu.edu/computing/)."
61*10465441SEvalZero  *
62*10465441SEvalZero  * CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH REGARD TO
63*10465441SEvalZero  * THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
64*10465441SEvalZero  * AND FITNESS, IN NO EVENT SHALL CARNEGIE MELLON UNIVERSITY BE LIABLE
65*10465441SEvalZero  * FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
66*10465441SEvalZero  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
67*10465441SEvalZero  * AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
68*10465441SEvalZero  * OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
69*10465441SEvalZero  */
70*10465441SEvalZero 
71*10465441SEvalZero #include "netif/ppp/ppp_opts.h"
72*10465441SEvalZero #if PPP_SUPPORT /* don't build if not configured for use in lwipopts.h */
73*10465441SEvalZero 
74*10465441SEvalZero #if 0 /* UNUSED */
75*10465441SEvalZero #include <stdio.h>
76*10465441SEvalZero #include <stddef.h>
77*10465441SEvalZero #include <stdlib.h>
78*10465441SEvalZero #include <unistd.h>
79*10465441SEvalZero #include <errno.h>
80*10465441SEvalZero #include <pwd.h>
81*10465441SEvalZero #include <grp.h>
82*10465441SEvalZero #include <string.h>
83*10465441SEvalZero #include <sys/types.h>
84*10465441SEvalZero #include <sys/stat.h>
85*10465441SEvalZero #include <sys/socket.h>
86*10465441SEvalZero #include <utmp.h>
87*10465441SEvalZero #include <fcntl.h>
88*10465441SEvalZero #if defined(_PATH_LASTLOG) && defined(__linux__)
89*10465441SEvalZero #include <lastlog.h>
90*10465441SEvalZero #endif
91*10465441SEvalZero 
92*10465441SEvalZero #include <netdb.h>
93*10465441SEvalZero #include <netinet/in.h>
94*10465441SEvalZero #include <arpa/inet.h>
95*10465441SEvalZero 
96*10465441SEvalZero #ifdef HAS_SHADOW
97*10465441SEvalZero #include <shadow.h>
98*10465441SEvalZero #ifndef PW_PPP
99*10465441SEvalZero #define PW_PPP PW_LOGIN
100*10465441SEvalZero #endif
101*10465441SEvalZero #endif
102*10465441SEvalZero 
103*10465441SEvalZero #include <time.h>
104*10465441SEvalZero #endif /* UNUSED */
105*10465441SEvalZero 
106*10465441SEvalZero #include "netif/ppp/ppp_impl.h"
107*10465441SEvalZero 
108*10465441SEvalZero #include "netif/ppp/fsm.h"
109*10465441SEvalZero #include "netif/ppp/lcp.h"
110*10465441SEvalZero #if CCP_SUPPORT
111*10465441SEvalZero #include "netif/ppp/ccp.h"
112*10465441SEvalZero #endif /* CCP_SUPPORT */
113*10465441SEvalZero #if ECP_SUPPORT
114*10465441SEvalZero #include "netif/ppp/ecp.h"
115*10465441SEvalZero #endif /* ECP_SUPPORT */
116*10465441SEvalZero #include "netif/ppp/ipcp.h"
117*10465441SEvalZero #if PAP_SUPPORT
118*10465441SEvalZero #include "netif/ppp/upap.h"
119*10465441SEvalZero #endif /* PAP_SUPPORT */
120*10465441SEvalZero #if CHAP_SUPPORT
121*10465441SEvalZero #include "netif/ppp/chap-new.h"
122*10465441SEvalZero #endif /* CHAP_SUPPORT */
123*10465441SEvalZero #if EAP_SUPPORT
124*10465441SEvalZero #include "netif/ppp/eap.h"
125*10465441SEvalZero #endif /* EAP_SUPPORT */
126*10465441SEvalZero #if CBCP_SUPPORT
127*10465441SEvalZero #include "netif/ppp/cbcp.h"
128*10465441SEvalZero #endif
129*10465441SEvalZero 
130*10465441SEvalZero #if 0 /* UNUSED */
131*10465441SEvalZero #include "session.h"
132*10465441SEvalZero #endif /* UNUSED */
133*10465441SEvalZero 
134*10465441SEvalZero #if 0 /* UNUSED */
135*10465441SEvalZero /* Bits in scan_authfile return value */
136*10465441SEvalZero #define NONWILD_SERVER	1
137*10465441SEvalZero #define NONWILD_CLIENT	2
138*10465441SEvalZero 
139*10465441SEvalZero #define ISWILD(word)	(word[0] == '*' && word[1] == 0)
140*10465441SEvalZero #endif /* UNUSED */
141*10465441SEvalZero 
142*10465441SEvalZero #if 0 /* UNUSED */
143*10465441SEvalZero /* List of addresses which the peer may use. */
144*10465441SEvalZero static struct permitted_ip *addresses[NUM_PPP];
145*10465441SEvalZero 
146*10465441SEvalZero /* Wordlist giving addresses which the peer may use
147*10465441SEvalZero    without authenticating itself. */
148*10465441SEvalZero static struct wordlist *noauth_addrs;
149*10465441SEvalZero 
150*10465441SEvalZero /* Remote telephone number, if available */
151*10465441SEvalZero char remote_number[MAXNAMELEN];
152*10465441SEvalZero 
153*10465441SEvalZero /* Wordlist giving remote telephone numbers which may connect. */
154*10465441SEvalZero static struct wordlist *permitted_numbers;
155*10465441SEvalZero 
156*10465441SEvalZero /* Extra options to apply, from the secrets file entry for the peer. */
157*10465441SEvalZero static struct wordlist *extra_options;
158*10465441SEvalZero #endif /* UNUSED */
159*10465441SEvalZero 
160*10465441SEvalZero #if 0 /* UNUSED */
161*10465441SEvalZero /* Set if we require authentication only because we have a default route. */
162*10465441SEvalZero static bool default_auth;
163*10465441SEvalZero 
164*10465441SEvalZero /* Hook to enable a plugin to control the idle time limit */
165*10465441SEvalZero int (*idle_time_hook) (struct ppp_idle *) = NULL;
166*10465441SEvalZero 
167*10465441SEvalZero /* Hook for a plugin to say whether we can possibly authenticate any peer */
168*10465441SEvalZero int (*pap_check_hook) (void) = NULL;
169*10465441SEvalZero 
170*10465441SEvalZero /* Hook for a plugin to check the PAP user and password */
171*10465441SEvalZero int (*pap_auth_hook) (char *user, char *passwd, char **msgp,
172*10465441SEvalZero 			  struct wordlist **paddrs,
173*10465441SEvalZero 			  struct wordlist **popts) = NULL;
174*10465441SEvalZero 
175*10465441SEvalZero /* Hook for a plugin to know about the PAP user logout */
176*10465441SEvalZero void (*pap_logout_hook) (void) = NULL;
177*10465441SEvalZero 
178*10465441SEvalZero /* Hook for a plugin to get the PAP password for authenticating us */
179*10465441SEvalZero int (*pap_passwd_hook) (char *user, char *passwd) = NULL;
180*10465441SEvalZero 
181*10465441SEvalZero /* Hook for a plugin to say if we can possibly authenticate a peer using CHAP */
182*10465441SEvalZero int (*chap_check_hook) (void) = NULL;
183*10465441SEvalZero 
184*10465441SEvalZero /* Hook for a plugin to get the CHAP password for authenticating us */
185*10465441SEvalZero int (*chap_passwd_hook) (char *user, char *passwd) = NULL;
186*10465441SEvalZero 
187*10465441SEvalZero /* Hook for a plugin to say whether it is OK if the peer
188*10465441SEvalZero    refuses to authenticate. */
189*10465441SEvalZero int (*null_auth_hook) (struct wordlist **paddrs,
190*10465441SEvalZero 			   struct wordlist **popts) = NULL;
191*10465441SEvalZero 
192*10465441SEvalZero int (*allowed_address_hook) (u32_t addr) = NULL;
193*10465441SEvalZero #endif /* UNUSED */
194*10465441SEvalZero 
195*10465441SEvalZero #ifdef HAVE_MULTILINK
196*10465441SEvalZero /* Hook for plugin to hear when an interface joins a multilink bundle */
197*10465441SEvalZero void (*multilink_join_hook) (void) = NULL;
198*10465441SEvalZero #endif
199*10465441SEvalZero 
200*10465441SEvalZero #if PPP_NOTIFY
201*10465441SEvalZero /* A notifier for when the peer has authenticated itself,
202*10465441SEvalZero    and we are proceeding to the network phase. */
203*10465441SEvalZero struct notifier *auth_up_notifier = NULL;
204*10465441SEvalZero 
205*10465441SEvalZero /* A notifier for when the link goes down. */
206*10465441SEvalZero struct notifier *link_down_notifier = NULL;
207*10465441SEvalZero #endif /* PPP_NOTIFY */
208*10465441SEvalZero 
209*10465441SEvalZero /*
210*10465441SEvalZero  * Option variables.
211*10465441SEvalZero  */
212*10465441SEvalZero #if 0 /* MOVED TO ppp_settings */
213*10465441SEvalZero bool uselogin = 0;		/* Use /etc/passwd for checking PAP */
214*10465441SEvalZero bool session_mgmt = 0;		/* Do session management (login records) */
215*10465441SEvalZero bool cryptpap = 0;		/* Passwords in pap-secrets are encrypted */
216*10465441SEvalZero bool refuse_pap = 0;		/* Don't wanna auth. ourselves with PAP */
217*10465441SEvalZero bool refuse_chap = 0;		/* Don't wanna auth. ourselves with CHAP */
218*10465441SEvalZero bool refuse_eap = 0;		/* Don't wanna auth. ourselves with EAP */
219*10465441SEvalZero #if MSCHAP_SUPPORT
220*10465441SEvalZero bool refuse_mschap = 0;		/* Don't wanna auth. ourselves with MS-CHAP */
221*10465441SEvalZero bool refuse_mschap_v2 = 0;	/* Don't wanna auth. ourselves with MS-CHAPv2 */
222*10465441SEvalZero #else /* MSCHAP_SUPPORT */
223*10465441SEvalZero bool refuse_mschap = 1;		/* Don't wanna auth. ourselves with MS-CHAP */
224*10465441SEvalZero bool refuse_mschap_v2 = 1;	/* Don't wanna auth. ourselves with MS-CHAPv2 */
225*10465441SEvalZero #endif /* MSCHAP_SUPPORT */
226*10465441SEvalZero bool usehostname = 0;		/* Use hostname for our_name */
227*10465441SEvalZero bool auth_required = 0;		/* Always require authentication from peer */
228*10465441SEvalZero bool allow_any_ip = 0;		/* Allow peer to use any IP address */
229*10465441SEvalZero bool explicit_remote = 0;	/* User specified explicit remote name */
230*10465441SEvalZero bool explicit_user = 0;		/* Set if "user" option supplied */
231*10465441SEvalZero bool explicit_passwd = 0;	/* Set if "password" option supplied */
232*10465441SEvalZero char remote_name[MAXNAMELEN];	/* Peer's name for authentication */
233*10465441SEvalZero static char *uafname;		/* name of most recent +ua file */
234*10465441SEvalZero 
235*10465441SEvalZero extern char *crypt (const char *, const char *);
236*10465441SEvalZero #endif /* UNUSED */
237*10465441SEvalZero /* Prototypes for procedures local to this file. */
238*10465441SEvalZero 
239*10465441SEvalZero static void network_phase(ppp_pcb *pcb);
240*10465441SEvalZero #if PPP_IDLETIMELIMIT
241*10465441SEvalZero static void check_idle(void *arg);
242*10465441SEvalZero #endif /* PPP_IDLETIMELIMIT */
243*10465441SEvalZero #if PPP_MAXCONNECT
244*10465441SEvalZero static void connect_time_expired(void *arg);
245*10465441SEvalZero #endif /* PPP_MAXCONNECT */
246*10465441SEvalZero #if 0 /* UNUSED */
247*10465441SEvalZero static int  null_login (int);
248*10465441SEvalZero /* static int  get_pap_passwd (char *); */
249*10465441SEvalZero static int  have_pap_secret (int *);
250*10465441SEvalZero static int  have_chap_secret (char *, char *, int, int *);
251*10465441SEvalZero static int  have_srp_secret (char *client, char *server, int need_ip,
252*10465441SEvalZero     int *lacks_ipp);
253*10465441SEvalZero static int  ip_addr_check (u32_t, struct permitted_ip *);
254*10465441SEvalZero static int  scan_authfile (FILE *, char *, char *, char *,
255*10465441SEvalZero 			       struct wordlist **, struct wordlist **,
256*10465441SEvalZero 			       char *, int);
257*10465441SEvalZero static void free_wordlist (struct wordlist *);
258*10465441SEvalZero static void set_allowed_addrs (int, struct wordlist *, struct wordlist *);
259*10465441SEvalZero static int  some_ip_ok (struct wordlist *);
260*10465441SEvalZero static int  setupapfile (char **);
261*10465441SEvalZero static int  privgroup (char **);
262*10465441SEvalZero static int  set_noauth_addr (char **);
263*10465441SEvalZero static int  set_permitted_number (char **);
264*10465441SEvalZero static void check_access (FILE *, char *);
265*10465441SEvalZero static int  wordlist_count (struct wordlist *);
266*10465441SEvalZero #endif /* UNUSED */
267*10465441SEvalZero 
268*10465441SEvalZero #ifdef MAXOCTETS
269*10465441SEvalZero static void check_maxoctets (void *);
270*10465441SEvalZero #endif
271*10465441SEvalZero 
272*10465441SEvalZero #if PPP_OPTIONS
273*10465441SEvalZero /*
274*10465441SEvalZero  * Authentication-related options.
275*10465441SEvalZero  */
276*10465441SEvalZero option_t auth_options[] = {
277*10465441SEvalZero     { "auth", o_bool, &auth_required,
278*10465441SEvalZero       "Require authentication from peer", OPT_PRIO | 1 },
279*10465441SEvalZero     { "noauth", o_bool, &auth_required,
280*10465441SEvalZero       "Don't require peer to authenticate", OPT_PRIOSUB | OPT_PRIV,
281*10465441SEvalZero       &allow_any_ip },
282*10465441SEvalZero     { "require-pap", o_bool, &lcp_wantoptions[0].neg_upap,
283*10465441SEvalZero       "Require PAP authentication from peer",
284*10465441SEvalZero       OPT_PRIOSUB | 1, &auth_required },
285*10465441SEvalZero     { "+pap", o_bool, &lcp_wantoptions[0].neg_upap,
286*10465441SEvalZero       "Require PAP authentication from peer",
287*10465441SEvalZero       OPT_ALIAS | OPT_PRIOSUB | 1, &auth_required },
288*10465441SEvalZero     { "require-chap", o_bool, &auth_required,
289*10465441SEvalZero       "Require CHAP authentication from peer",
290*10465441SEvalZero       OPT_PRIOSUB | OPT_A2OR | MDTYPE_MD5,
291*10465441SEvalZero       &lcp_wantoptions[0].chap_mdtype },
292*10465441SEvalZero     { "+chap", o_bool, &auth_required,
293*10465441SEvalZero       "Require CHAP authentication from peer",
294*10465441SEvalZero       OPT_ALIAS | OPT_PRIOSUB | OPT_A2OR | MDTYPE_MD5,
295*10465441SEvalZero       &lcp_wantoptions[0].chap_mdtype },
296*10465441SEvalZero #if MSCHAP_SUPPORT
297*10465441SEvalZero     { "require-mschap", o_bool, &auth_required,
298*10465441SEvalZero       "Require MS-CHAP authentication from peer",
299*10465441SEvalZero       OPT_PRIOSUB | OPT_A2OR | MDTYPE_MICROSOFT,
300*10465441SEvalZero       &lcp_wantoptions[0].chap_mdtype },
301*10465441SEvalZero     { "+mschap", o_bool, &auth_required,
302*10465441SEvalZero       "Require MS-CHAP authentication from peer",
303*10465441SEvalZero       OPT_ALIAS | OPT_PRIOSUB | OPT_A2OR | MDTYPE_MICROSOFT,
304*10465441SEvalZero       &lcp_wantoptions[0].chap_mdtype },
305*10465441SEvalZero     { "require-mschap-v2", o_bool, &auth_required,
306*10465441SEvalZero       "Require MS-CHAPv2 authentication from peer",
307*10465441SEvalZero       OPT_PRIOSUB | OPT_A2OR | MDTYPE_MICROSOFT_V2,
308*10465441SEvalZero       &lcp_wantoptions[0].chap_mdtype },
309*10465441SEvalZero     { "+mschap-v2", o_bool, &auth_required,
310*10465441SEvalZero       "Require MS-CHAPv2 authentication from peer",
311*10465441SEvalZero       OPT_ALIAS | OPT_PRIOSUB | OPT_A2OR | MDTYPE_MICROSOFT_V2,
312*10465441SEvalZero       &lcp_wantoptions[0].chap_mdtype },
313*10465441SEvalZero #endif /* MSCHAP_SUPPORT */
314*10465441SEvalZero #if 0
315*10465441SEvalZero     { "refuse-pap", o_bool, &refuse_pap,
316*10465441SEvalZero       "Don't agree to auth to peer with PAP", 1 },
317*10465441SEvalZero     { "-pap", o_bool, &refuse_pap,
318*10465441SEvalZero       "Don't allow PAP authentication with peer", OPT_ALIAS | 1 },
319*10465441SEvalZero     { "refuse-chap", o_bool, &refuse_chap,
320*10465441SEvalZero       "Don't agree to auth to peer with CHAP",
321*10465441SEvalZero       OPT_A2CLRB | MDTYPE_MD5,
322*10465441SEvalZero       &lcp_allowoptions[0].chap_mdtype },
323*10465441SEvalZero     { "-chap", o_bool, &refuse_chap,
324*10465441SEvalZero       "Don't allow CHAP authentication with peer",
325*10465441SEvalZero       OPT_ALIAS | OPT_A2CLRB | MDTYPE_MD5,
326*10465441SEvalZero       &lcp_allowoptions[0].chap_mdtype },
327*10465441SEvalZero #endif
328*10465441SEvalZero #if MSCHAP_SUPPORT
329*10465441SEvalZero #if 0
330*10465441SEvalZero     { "refuse-mschap", o_bool, &refuse_mschap,
331*10465441SEvalZero       "Don't agree to auth to peer with MS-CHAP",
332*10465441SEvalZero       OPT_A2CLRB | MDTYPE_MICROSOFT,
333*10465441SEvalZero       &lcp_allowoptions[0].chap_mdtype },
334*10465441SEvalZero     { "-mschap", o_bool, &refuse_mschap,
335*10465441SEvalZero       "Don't allow MS-CHAP authentication with peer",
336*10465441SEvalZero       OPT_ALIAS | OPT_A2CLRB | MDTYPE_MICROSOFT,
337*10465441SEvalZero       &lcp_allowoptions[0].chap_mdtype },
338*10465441SEvalZero     { "refuse-mschap-v2", o_bool, &refuse_mschap_v2,
339*10465441SEvalZero       "Don't agree to auth to peer with MS-CHAPv2",
340*10465441SEvalZero       OPT_A2CLRB | MDTYPE_MICROSOFT_V2,
341*10465441SEvalZero       &lcp_allowoptions[0].chap_mdtype },
342*10465441SEvalZero     { "-mschap-v2", o_bool, &refuse_mschap_v2,
343*10465441SEvalZero       "Don't allow MS-CHAPv2 authentication with peer",
344*10465441SEvalZero       OPT_ALIAS | OPT_A2CLRB | MDTYPE_MICROSOFT_V2,
345*10465441SEvalZero       &lcp_allowoptions[0].chap_mdtype },
346*10465441SEvalZero #endif
347*10465441SEvalZero #endif /* MSCHAP_SUPPORT*/
348*10465441SEvalZero #if EAP_SUPPORT
349*10465441SEvalZero     { "require-eap", o_bool, &lcp_wantoptions[0].neg_eap,
350*10465441SEvalZero       "Require EAP authentication from peer", OPT_PRIOSUB | 1,
351*10465441SEvalZero       &auth_required },
352*10465441SEvalZero #if 0
353*10465441SEvalZero     { "refuse-eap", o_bool, &refuse_eap,
354*10465441SEvalZero       "Don't agree to authenticate to peer with EAP", 1 },
355*10465441SEvalZero #endif
356*10465441SEvalZero #endif /* EAP_SUPPORT */
357*10465441SEvalZero     { "name", o_string, our_name,
358*10465441SEvalZero       "Set local name for authentication",
359*10465441SEvalZero       OPT_PRIO | OPT_PRIV | OPT_STATIC, NULL, MAXNAMELEN },
360*10465441SEvalZero 
361*10465441SEvalZero     { "+ua", o_special, (void *)setupapfile,
362*10465441SEvalZero       "Get PAP user and password from file",
363*10465441SEvalZero       OPT_PRIO | OPT_A2STRVAL, &uafname },
364*10465441SEvalZero 
365*10465441SEvalZero #if 0
366*10465441SEvalZero     { "user", o_string, user,
367*10465441SEvalZero       "Set name for auth with peer", OPT_PRIO | OPT_STATIC,
368*10465441SEvalZero       &explicit_user, MAXNAMELEN },
369*10465441SEvalZero 
370*10465441SEvalZero     { "password", o_string, passwd,
371*10465441SEvalZero       "Password for authenticating us to the peer",
372*10465441SEvalZero       OPT_PRIO | OPT_STATIC | OPT_HIDE,
373*10465441SEvalZero       &explicit_passwd, MAXSECRETLEN },
374*10465441SEvalZero #endif
375*10465441SEvalZero 
376*10465441SEvalZero     { "usehostname", o_bool, &usehostname,
377*10465441SEvalZero       "Must use hostname for authentication", 1 },
378*10465441SEvalZero 
379*10465441SEvalZero     { "remotename", o_string, remote_name,
380*10465441SEvalZero       "Set remote name for authentication", OPT_PRIO | OPT_STATIC,
381*10465441SEvalZero       &explicit_remote, MAXNAMELEN },
382*10465441SEvalZero 
383*10465441SEvalZero     { "login", o_bool, &uselogin,
384*10465441SEvalZero       "Use system password database for PAP", OPT_A2COPY | 1 ,
385*10465441SEvalZero       &session_mgmt },
386*10465441SEvalZero     { "enable-session", o_bool, &session_mgmt,
387*10465441SEvalZero       "Enable session accounting for remote peers", OPT_PRIV | 1 },
388*10465441SEvalZero 
389*10465441SEvalZero     { "papcrypt", o_bool, &cryptpap,
390*10465441SEvalZero       "PAP passwords are encrypted", 1 },
391*10465441SEvalZero 
392*10465441SEvalZero     { "privgroup", o_special, (void *)privgroup,
393*10465441SEvalZero       "Allow group members to use privileged options", OPT_PRIV | OPT_A2LIST },
394*10465441SEvalZero 
395*10465441SEvalZero     { "allow-ip", o_special, (void *)set_noauth_addr,
396*10465441SEvalZero       "Set IP address(es) which can be used without authentication",
397*10465441SEvalZero       OPT_PRIV | OPT_A2LIST },
398*10465441SEvalZero 
399*10465441SEvalZero     { "remotenumber", o_string, remote_number,
400*10465441SEvalZero       "Set remote telephone number for authentication", OPT_PRIO | OPT_STATIC,
401*10465441SEvalZero       NULL, MAXNAMELEN },
402*10465441SEvalZero 
403*10465441SEvalZero     { "allow-number", o_special, (void *)set_permitted_number,
404*10465441SEvalZero       "Set telephone number(s) which are allowed to connect",
405*10465441SEvalZero       OPT_PRIV | OPT_A2LIST },
406*10465441SEvalZero 
407*10465441SEvalZero     { NULL }
408*10465441SEvalZero };
409*10465441SEvalZero #endif /* PPP_OPTIONS */
410*10465441SEvalZero 
411*10465441SEvalZero #if 0 /* UNUSED */
412*10465441SEvalZero /*
413*10465441SEvalZero  * setupapfile - specifies UPAP info for authenticating with peer.
414*10465441SEvalZero  */
415*10465441SEvalZero static int
416*10465441SEvalZero setupapfile(argv)
417*10465441SEvalZero     char **argv;
418*10465441SEvalZero {
419*10465441SEvalZero     FILE *ufile;
420*10465441SEvalZero     int l;
421*10465441SEvalZero     uid_t euid;
422*10465441SEvalZero     char u[MAXNAMELEN], p[MAXSECRETLEN];
423*10465441SEvalZero     char *fname;
424*10465441SEvalZero 
425*10465441SEvalZero     lcp_allowoptions[0].neg_upap = 1;
426*10465441SEvalZero 
427*10465441SEvalZero     /* open user info file */
428*10465441SEvalZero     fname = strdup(*argv);
429*10465441SEvalZero     if (fname == NULL)
430*10465441SEvalZero 	novm("+ua file name");
431*10465441SEvalZero     euid = geteuid();
432*10465441SEvalZero     if (seteuid(getuid()) == -1) {
433*10465441SEvalZero 	option_error("unable to reset uid before opening %s: %m", fname);
434*10465441SEvalZero 	return 0;
435*10465441SEvalZero     }
436*10465441SEvalZero     ufile = fopen(fname, "r");
437*10465441SEvalZero     if (seteuid(euid) == -1)
438*10465441SEvalZero 	fatal("unable to regain privileges: %m");
439*10465441SEvalZero     if (ufile == NULL) {
440*10465441SEvalZero 	option_error("unable to open user login data file %s", fname);
441*10465441SEvalZero 	return 0;
442*10465441SEvalZero     }
443*10465441SEvalZero     check_access(ufile, fname);
444*10465441SEvalZero     uafname = fname;
445*10465441SEvalZero 
446*10465441SEvalZero     /* get username */
447*10465441SEvalZero     if (fgets(u, MAXNAMELEN - 1, ufile) == NULL
448*10465441SEvalZero 	|| fgets(p, MAXSECRETLEN - 1, ufile) == NULL) {
449*10465441SEvalZero 	fclose(ufile);
450*10465441SEvalZero 	option_error("unable to read user login data file %s", fname);
451*10465441SEvalZero 	return 0;
452*10465441SEvalZero     }
453*10465441SEvalZero     fclose(ufile);
454*10465441SEvalZero 
455*10465441SEvalZero     /* get rid of newlines */
456*10465441SEvalZero     l = strlen(u);
457*10465441SEvalZero     if (l > 0 && u[l-1] == '\n')
458*10465441SEvalZero 	u[l-1] = 0;
459*10465441SEvalZero     l = strlen(p);
460*10465441SEvalZero     if (l > 0 && p[l-1] == '\n')
461*10465441SEvalZero 	p[l-1] = 0;
462*10465441SEvalZero 
463*10465441SEvalZero     if (override_value("user", option_priority, fname)) {
464*10465441SEvalZero 	strlcpy(ppp_settings.user, u, sizeof(ppp_settings.user));
465*10465441SEvalZero 	explicit_user = 1;
466*10465441SEvalZero     }
467*10465441SEvalZero     if (override_value("passwd", option_priority, fname)) {
468*10465441SEvalZero 	strlcpy(ppp_settings.passwd, p, sizeof(ppp_settings.passwd));
469*10465441SEvalZero 	explicit_passwd = 1;
470*10465441SEvalZero     }
471*10465441SEvalZero 
472*10465441SEvalZero     return (1);
473*10465441SEvalZero }
474*10465441SEvalZero 
475*10465441SEvalZero /*
476*10465441SEvalZero  * privgroup - allow members of the group to have privileged access.
477*10465441SEvalZero  */
478*10465441SEvalZero static int
479*10465441SEvalZero privgroup(argv)
480*10465441SEvalZero     char **argv;
481*10465441SEvalZero {
482*10465441SEvalZero     struct group *g;
483*10465441SEvalZero     int i;
484*10465441SEvalZero 
485*10465441SEvalZero     g = getgrnam(*argv);
486*10465441SEvalZero     if (g == 0) {
487*10465441SEvalZero 	option_error("group %s is unknown", *argv);
488*10465441SEvalZero 	return 0;
489*10465441SEvalZero     }
490*10465441SEvalZero     for (i = 0; i < ngroups; ++i) {
491*10465441SEvalZero 	if (groups[i] == g->gr_gid) {
492*10465441SEvalZero 	    privileged = 1;
493*10465441SEvalZero 	    break;
494*10465441SEvalZero 	}
495*10465441SEvalZero     }
496*10465441SEvalZero     return 1;
497*10465441SEvalZero }
498*10465441SEvalZero 
499*10465441SEvalZero 
500*10465441SEvalZero /*
501*10465441SEvalZero  * set_noauth_addr - set address(es) that can be used without authentication.
502*10465441SEvalZero  * Equivalent to specifying an entry like `"" * "" addr' in pap-secrets.
503*10465441SEvalZero  */
504*10465441SEvalZero static int
505*10465441SEvalZero set_noauth_addr(argv)
506*10465441SEvalZero     char **argv;
507*10465441SEvalZero {
508*10465441SEvalZero     char *addr = *argv;
509*10465441SEvalZero     int l = strlen(addr) + 1;
510*10465441SEvalZero     struct wordlist *wp;
511*10465441SEvalZero 
512*10465441SEvalZero     wp = (struct wordlist *) malloc(sizeof(struct wordlist) + l);
513*10465441SEvalZero     if (wp == NULL)
514*10465441SEvalZero 	novm("allow-ip argument");
515*10465441SEvalZero     wp->word = (char *) (wp + 1);
516*10465441SEvalZero     wp->next = noauth_addrs;
517*10465441SEvalZero     MEMCPY(wp->word, addr, l);
518*10465441SEvalZero     noauth_addrs = wp;
519*10465441SEvalZero     return 1;
520*10465441SEvalZero }
521*10465441SEvalZero 
522*10465441SEvalZero 
523*10465441SEvalZero /*
524*10465441SEvalZero  * set_permitted_number - set remote telephone number(s) that may connect.
525*10465441SEvalZero  */
526*10465441SEvalZero static int
527*10465441SEvalZero set_permitted_number(argv)
528*10465441SEvalZero     char **argv;
529*10465441SEvalZero {
530*10465441SEvalZero     char *number = *argv;
531*10465441SEvalZero     int l = strlen(number) + 1;
532*10465441SEvalZero     struct wordlist *wp;
533*10465441SEvalZero 
534*10465441SEvalZero     wp = (struct wordlist *) malloc(sizeof(struct wordlist) + l);
535*10465441SEvalZero     if (wp == NULL)
536*10465441SEvalZero 	novm("allow-number argument");
537*10465441SEvalZero     wp->word = (char *) (wp + 1);
538*10465441SEvalZero     wp->next = permitted_numbers;
539*10465441SEvalZero     MEMCPY(wp->word, number, l);
540*10465441SEvalZero     permitted_numbers = wp;
541*10465441SEvalZero     return 1;
542*10465441SEvalZero }
543*10465441SEvalZero #endif
544*10465441SEvalZero 
545*10465441SEvalZero /*
546*10465441SEvalZero  * An Open on LCP has requested a change from Dead to Establish phase.
547*10465441SEvalZero  */
link_required(ppp_pcb * pcb)548*10465441SEvalZero void link_required(ppp_pcb *pcb) {
549*10465441SEvalZero     LWIP_UNUSED_ARG(pcb);
550*10465441SEvalZero }
551*10465441SEvalZero 
552*10465441SEvalZero #if 0
553*10465441SEvalZero /*
554*10465441SEvalZero  * Bring the link up to the point of being able to do ppp.
555*10465441SEvalZero  */
556*10465441SEvalZero void start_link(unit)
557*10465441SEvalZero     int unit;
558*10465441SEvalZero {
559*10465441SEvalZero     ppp_pcb *pcb = &ppp_pcb_list[unit];
560*10465441SEvalZero     char *msg;
561*10465441SEvalZero 
562*10465441SEvalZero     status = EXIT_NEGOTIATION_FAILED;
563*10465441SEvalZero     new_phase(pcb, PPP_PHASE_SERIALCONN);
564*10465441SEvalZero 
565*10465441SEvalZero     hungup = 0;
566*10465441SEvalZero     devfd = the_channel->connect();
567*10465441SEvalZero     msg = "Connect script failed";
568*10465441SEvalZero     if (devfd < 0)
569*10465441SEvalZero 	goto fail;
570*10465441SEvalZero 
571*10465441SEvalZero     /* set up the serial device as a ppp interface */
572*10465441SEvalZero     /*
573*10465441SEvalZero      * N.B. we used to do tdb_writelock/tdb_writeunlock around this
574*10465441SEvalZero      * (from establish_ppp to set_ifunit).  However, we won't be
575*10465441SEvalZero      * doing the set_ifunit in multilink mode, which is the only time
576*10465441SEvalZero      * we need the atomicity that the tdb_writelock/tdb_writeunlock
577*10465441SEvalZero      * gives us.  Thus we don't need the tdb_writelock/tdb_writeunlock.
578*10465441SEvalZero      */
579*10465441SEvalZero     fd_ppp = the_channel->establish_ppp(devfd);
580*10465441SEvalZero     msg = "ppp establishment failed";
581*10465441SEvalZero     if (fd_ppp < 0) {
582*10465441SEvalZero 	status = EXIT_FATAL_ERROR;
583*10465441SEvalZero 	goto disconnect;
584*10465441SEvalZero     }
585*10465441SEvalZero 
586*10465441SEvalZero     if (!demand && ifunit >= 0)
587*10465441SEvalZero 	set_ifunit(1);
588*10465441SEvalZero 
589*10465441SEvalZero     /*
590*10465441SEvalZero      * Start opening the connection and wait for
591*10465441SEvalZero      * incoming events (reply, timeout, etc.).
592*10465441SEvalZero      */
593*10465441SEvalZero     if (ifunit >= 0)
594*10465441SEvalZero 	ppp_notice("Connect: %s <--> %s", ifname, ppp_devnam);
595*10465441SEvalZero     else
596*10465441SEvalZero 	ppp_notice("Starting negotiation on %s", ppp_devnam);
597*10465441SEvalZero     add_fd(fd_ppp);
598*10465441SEvalZero 
599*10465441SEvalZero     new_phase(pcb, PPP_PHASE_ESTABLISH);
600*10465441SEvalZero 
601*10465441SEvalZero     lcp_lowerup(pcb);
602*10465441SEvalZero     return;
603*10465441SEvalZero 
604*10465441SEvalZero  disconnect:
605*10465441SEvalZero     new_phase(pcb, PPP_PHASE_DISCONNECT);
606*10465441SEvalZero     if (the_channel->disconnect)
607*10465441SEvalZero 	the_channel->disconnect();
608*10465441SEvalZero 
609*10465441SEvalZero  fail:
610*10465441SEvalZero     new_phase(pcb, PPP_PHASE_DEAD);
611*10465441SEvalZero     if (the_channel->cleanup)
612*10465441SEvalZero 	(*the_channel->cleanup)();
613*10465441SEvalZero }
614*10465441SEvalZero #endif
615*10465441SEvalZero 
616*10465441SEvalZero /*
617*10465441SEvalZero  * LCP has terminated the link; go to the Dead phase and take the
618*10465441SEvalZero  * physical layer down.
619*10465441SEvalZero  */
link_terminated(ppp_pcb * pcb)620*10465441SEvalZero void link_terminated(ppp_pcb *pcb) {
621*10465441SEvalZero     if (pcb->phase == PPP_PHASE_DEAD
622*10465441SEvalZero #ifdef HAVE_MULTILINK
623*10465441SEvalZero     || pcb->phase == PPP_PHASE_MASTER
624*10465441SEvalZero #endif /* HAVE_MULTILINK */
625*10465441SEvalZero     )
626*10465441SEvalZero 	return;
627*10465441SEvalZero     new_phase(pcb, PPP_PHASE_DISCONNECT);
628*10465441SEvalZero 
629*10465441SEvalZero #if 0 /* UNUSED */
630*10465441SEvalZero     if (pap_logout_hook) {
631*10465441SEvalZero 	pap_logout_hook();
632*10465441SEvalZero     }
633*10465441SEvalZero     session_end(devnam);
634*10465441SEvalZero #endif /* UNUSED */
635*10465441SEvalZero 
636*10465441SEvalZero     if (!doing_multilink) {
637*10465441SEvalZero 	ppp_notice("Connection terminated.");
638*10465441SEvalZero #if PPP_STATS_SUPPORT
639*10465441SEvalZero 	print_link_stats();
640*10465441SEvalZero #endif /* PPP_STATS_SUPPORT */
641*10465441SEvalZero     } else
642*10465441SEvalZero 	ppp_notice("Link terminated.");
643*10465441SEvalZero 
644*10465441SEvalZero     lcp_lowerdown(pcb);
645*10465441SEvalZero 
646*10465441SEvalZero     ppp_link_terminated(pcb);
647*10465441SEvalZero #if 0
648*10465441SEvalZero     /*
649*10465441SEvalZero      * Delete pid files before disestablishing ppp.  Otherwise it
650*10465441SEvalZero      * can happen that another pppd gets the same unit and then
651*10465441SEvalZero      * we delete its pid file.
652*10465441SEvalZero      */
653*10465441SEvalZero     if (!doing_multilink && !demand)
654*10465441SEvalZero 	remove_pidfiles();
655*10465441SEvalZero 
656*10465441SEvalZero     /*
657*10465441SEvalZero      * If we may want to bring the link up again, transfer
658*10465441SEvalZero      * the ppp unit back to the loopback.  Set the
659*10465441SEvalZero      * real serial device back to its normal mode of operation.
660*10465441SEvalZero      */
661*10465441SEvalZero     if (fd_ppp >= 0) {
662*10465441SEvalZero 	remove_fd(fd_ppp);
663*10465441SEvalZero 	clean_check();
664*10465441SEvalZero 	the_channel->disestablish_ppp(devfd);
665*10465441SEvalZero 	if (doing_multilink)
666*10465441SEvalZero 	    mp_exit_bundle();
667*10465441SEvalZero 	fd_ppp = -1;
668*10465441SEvalZero     }
669*10465441SEvalZero     if (!hungup)
670*10465441SEvalZero 	lcp_lowerdown(pcb);
671*10465441SEvalZero     if (!doing_multilink && !demand)
672*10465441SEvalZero 	script_unsetenv("IFNAME");
673*10465441SEvalZero 
674*10465441SEvalZero     /*
675*10465441SEvalZero      * Run disconnector script, if requested.
676*10465441SEvalZero      * XXX we may not be able to do this if the line has hung up!
677*10465441SEvalZero      */
678*10465441SEvalZero     if (devfd >= 0 && the_channel->disconnect) {
679*10465441SEvalZero 	the_channel->disconnect();
680*10465441SEvalZero 	devfd = -1;
681*10465441SEvalZero     }
682*10465441SEvalZero     if (the_channel->cleanup)
683*10465441SEvalZero 	(*the_channel->cleanup)();
684*10465441SEvalZero 
685*10465441SEvalZero     if (doing_multilink && multilink_master) {
686*10465441SEvalZero 	if (!bundle_terminating)
687*10465441SEvalZero 	    new_phase(pcb, PPP_PHASE_MASTER);
688*10465441SEvalZero 	else
689*10465441SEvalZero 	    mp_bundle_terminated();
690*10465441SEvalZero     } else
691*10465441SEvalZero 	new_phase(pcb, PPP_PHASE_DEAD);
692*10465441SEvalZero #endif
693*10465441SEvalZero }
694*10465441SEvalZero 
695*10465441SEvalZero /*
696*10465441SEvalZero  * LCP has gone down; it will either die or try to re-establish.
697*10465441SEvalZero  */
link_down(ppp_pcb * pcb)698*10465441SEvalZero void link_down(ppp_pcb *pcb) {
699*10465441SEvalZero #if PPP_NOTIFY
700*10465441SEvalZero     notify(link_down_notifier, 0);
701*10465441SEvalZero #endif /* PPP_NOTIFY */
702*10465441SEvalZero 
703*10465441SEvalZero     if (!doing_multilink) {
704*10465441SEvalZero 	upper_layers_down(pcb);
705*10465441SEvalZero 	if (pcb->phase != PPP_PHASE_DEAD
706*10465441SEvalZero #ifdef HAVE_MULTILINK
707*10465441SEvalZero 	&& pcb->phase != PPP_PHASE_MASTER
708*10465441SEvalZero #endif /* HAVE_MULTILINK */
709*10465441SEvalZero 	)
710*10465441SEvalZero 	    new_phase(pcb, PPP_PHASE_ESTABLISH);
711*10465441SEvalZero     }
712*10465441SEvalZero     /* XXX if doing_multilink, should do something to stop
713*10465441SEvalZero        network-layer traffic on the link */
714*10465441SEvalZero }
715*10465441SEvalZero 
upper_layers_down(ppp_pcb * pcb)716*10465441SEvalZero void upper_layers_down(ppp_pcb *pcb) {
717*10465441SEvalZero     int i;
718*10465441SEvalZero     const struct protent *protp;
719*10465441SEvalZero 
720*10465441SEvalZero     for (i = 0; (protp = protocols[i]) != NULL; ++i) {
721*10465441SEvalZero         if (protp->protocol != PPP_LCP && protp->lowerdown != NULL)
722*10465441SEvalZero 	    (*protp->lowerdown)(pcb);
723*10465441SEvalZero         if (protp->protocol < 0xC000 && protp->close != NULL)
724*10465441SEvalZero 	    (*protp->close)(pcb, "LCP down");
725*10465441SEvalZero     }
726*10465441SEvalZero     pcb->num_np_open = 0;
727*10465441SEvalZero     pcb->num_np_up = 0;
728*10465441SEvalZero }
729*10465441SEvalZero 
730*10465441SEvalZero /*
731*10465441SEvalZero  * The link is established.
732*10465441SEvalZero  * Proceed to the Dead, Authenticate or Network phase as appropriate.
733*10465441SEvalZero  */
link_established(ppp_pcb * pcb)734*10465441SEvalZero void link_established(ppp_pcb *pcb) {
735*10465441SEvalZero #if PPP_AUTH_SUPPORT
736*10465441SEvalZero     int auth;
737*10465441SEvalZero #if PPP_SERVER
738*10465441SEvalZero #if PAP_SUPPORT
739*10465441SEvalZero     lcp_options *wo = &pcb->lcp_wantoptions;
740*10465441SEvalZero #endif /* PAP_SUPPORT */
741*10465441SEvalZero     lcp_options *go = &pcb->lcp_gotoptions;
742*10465441SEvalZero #endif /* PPP_SERVER */
743*10465441SEvalZero     lcp_options *ho = &pcb->lcp_hisoptions;
744*10465441SEvalZero #endif /* PPP_AUTH_SUPPORT */
745*10465441SEvalZero     int i;
746*10465441SEvalZero     const struct protent *protp;
747*10465441SEvalZero 
748*10465441SEvalZero     /*
749*10465441SEvalZero      * Tell higher-level protocols that LCP is up.
750*10465441SEvalZero      */
751*10465441SEvalZero     if (!doing_multilink) {
752*10465441SEvalZero 	for (i = 0; (protp = protocols[i]) != NULL; ++i)
753*10465441SEvalZero 	    if (protp->protocol != PPP_LCP
754*10465441SEvalZero 		&& protp->lowerup != NULL)
755*10465441SEvalZero 		(*protp->lowerup)(pcb);
756*10465441SEvalZero     }
757*10465441SEvalZero 
758*10465441SEvalZero #if PPP_AUTH_SUPPORT
759*10465441SEvalZero #if PPP_SERVER
760*10465441SEvalZero #if PPP_ALLOWED_ADDRS
761*10465441SEvalZero     if (!auth_required && noauth_addrs != NULL)
762*10465441SEvalZero 	set_allowed_addrs(unit, NULL, NULL);
763*10465441SEvalZero #endif /* PPP_ALLOWED_ADDRS */
764*10465441SEvalZero 
765*10465441SEvalZero     if (pcb->settings.auth_required && !(0
766*10465441SEvalZero #if PAP_SUPPORT
767*10465441SEvalZero 	|| go->neg_upap
768*10465441SEvalZero #endif /* PAP_SUPPORT */
769*10465441SEvalZero #if CHAP_SUPPORT
770*10465441SEvalZero 	|| go->neg_chap
771*10465441SEvalZero #endif /* CHAP_SUPPORT */
772*10465441SEvalZero #if EAP_SUPPORT
773*10465441SEvalZero 	|| go->neg_eap
774*10465441SEvalZero #endif /* EAP_SUPPORT */
775*10465441SEvalZero 	)) {
776*10465441SEvalZero 
777*10465441SEvalZero #if PPP_ALLOWED_ADDRS
778*10465441SEvalZero 	/*
779*10465441SEvalZero 	 * We wanted the peer to authenticate itself, and it refused:
780*10465441SEvalZero 	 * if we have some address(es) it can use without auth, fine,
781*10465441SEvalZero 	 * otherwise treat it as though it authenticated with PAP using
782*10465441SEvalZero 	 * a username of "" and a password of "".  If that's not OK,
783*10465441SEvalZero 	 * boot it out.
784*10465441SEvalZero 	 */
785*10465441SEvalZero 	if (noauth_addrs != NULL) {
786*10465441SEvalZero 	    set_allowed_addrs(unit, NULL, NULL);
787*10465441SEvalZero 	} else
788*10465441SEvalZero #endif /* PPP_ALLOWED_ADDRS */
789*10465441SEvalZero 	if (!pcb->settings.null_login
790*10465441SEvalZero #if PAP_SUPPORT
791*10465441SEvalZero 	    || !wo->neg_upap
792*10465441SEvalZero #endif /* PAP_SUPPORT */
793*10465441SEvalZero 	    ) {
794*10465441SEvalZero 	    ppp_warn("peer refused to authenticate: terminating link");
795*10465441SEvalZero #if 0 /* UNUSED */
796*10465441SEvalZero 	    status = EXIT_PEER_AUTH_FAILED;
797*10465441SEvalZero #endif /* UNUSED */
798*10465441SEvalZero 	    pcb->err_code = PPPERR_AUTHFAIL;
799*10465441SEvalZero 	    lcp_close(pcb, "peer refused to authenticate");
800*10465441SEvalZero 	    return;
801*10465441SEvalZero 	}
802*10465441SEvalZero     }
803*10465441SEvalZero #endif /* PPP_SERVER */
804*10465441SEvalZero 
805*10465441SEvalZero     new_phase(pcb, PPP_PHASE_AUTHENTICATE);
806*10465441SEvalZero     auth = 0;
807*10465441SEvalZero #if PPP_SERVER
808*10465441SEvalZero #if EAP_SUPPORT
809*10465441SEvalZero     if (go->neg_eap) {
810*10465441SEvalZero 	eap_authpeer(pcb, PPP_OUR_NAME);
811*10465441SEvalZero 	auth |= EAP_PEER;
812*10465441SEvalZero     } else
813*10465441SEvalZero #endif /* EAP_SUPPORT */
814*10465441SEvalZero #if CHAP_SUPPORT
815*10465441SEvalZero     if (go->neg_chap) {
816*10465441SEvalZero 	chap_auth_peer(pcb, PPP_OUR_NAME, CHAP_DIGEST(go->chap_mdtype));
817*10465441SEvalZero 	auth |= CHAP_PEER;
818*10465441SEvalZero     } else
819*10465441SEvalZero #endif /* CHAP_SUPPORT */
820*10465441SEvalZero #if PAP_SUPPORT
821*10465441SEvalZero     if (go->neg_upap) {
822*10465441SEvalZero 	upap_authpeer(pcb);
823*10465441SEvalZero 	auth |= PAP_PEER;
824*10465441SEvalZero     } else
825*10465441SEvalZero #endif /* PAP_SUPPORT */
826*10465441SEvalZero     {}
827*10465441SEvalZero #endif /* PPP_SERVER */
828*10465441SEvalZero 
829*10465441SEvalZero #if EAP_SUPPORT
830*10465441SEvalZero     if (ho->neg_eap) {
831*10465441SEvalZero 	eap_authwithpeer(pcb, pcb->settings.user);
832*10465441SEvalZero 	auth |= EAP_WITHPEER;
833*10465441SEvalZero     } else
834*10465441SEvalZero #endif /* EAP_SUPPORT */
835*10465441SEvalZero #if CHAP_SUPPORT
836*10465441SEvalZero     if (ho->neg_chap) {
837*10465441SEvalZero 	chap_auth_with_peer(pcb, pcb->settings.user, CHAP_DIGEST(ho->chap_mdtype));
838*10465441SEvalZero 	auth |= CHAP_WITHPEER;
839*10465441SEvalZero     } else
840*10465441SEvalZero #endif /* CHAP_SUPPORT */
841*10465441SEvalZero #if PAP_SUPPORT
842*10465441SEvalZero     if (ho->neg_upap) {
843*10465441SEvalZero 	upap_authwithpeer(pcb, pcb->settings.user, pcb->settings.passwd);
844*10465441SEvalZero 	auth |= PAP_WITHPEER;
845*10465441SEvalZero     } else
846*10465441SEvalZero #endif /* PAP_SUPPORT */
847*10465441SEvalZero     {}
848*10465441SEvalZero 
849*10465441SEvalZero     pcb->auth_pending = auth;
850*10465441SEvalZero     pcb->auth_done = 0;
851*10465441SEvalZero 
852*10465441SEvalZero     if (!auth)
853*10465441SEvalZero #endif /* PPP_AUTH_SUPPORT */
854*10465441SEvalZero 	network_phase(pcb);
855*10465441SEvalZero }
856*10465441SEvalZero 
857*10465441SEvalZero /*
858*10465441SEvalZero  * Proceed to the network phase.
859*10465441SEvalZero  */
network_phase(ppp_pcb * pcb)860*10465441SEvalZero static void network_phase(ppp_pcb *pcb) {
861*10465441SEvalZero #if CBCP_SUPPORT
862*10465441SEvalZero     ppp_pcb *pcb = &ppp_pcb_list[unit];
863*10465441SEvalZero #endif
864*10465441SEvalZero #if 0 /* UNUSED */
865*10465441SEvalZero     lcp_options *go = &lcp_gotoptions[unit];
866*10465441SEvalZero #endif /* UNUSED */
867*10465441SEvalZero 
868*10465441SEvalZero #if 0 /* UNUSED */
869*10465441SEvalZero     /* Log calling number. */
870*10465441SEvalZero     if (*remote_number)
871*10465441SEvalZero 	ppp_notice("peer from calling number %q authorized", remote_number);
872*10465441SEvalZero #endif /* UNUSED */
873*10465441SEvalZero 
874*10465441SEvalZero #if PPP_NOTIFY
875*10465441SEvalZero     /*
876*10465441SEvalZero      * If the peer had to authenticate, notify it now.
877*10465441SEvalZero      */
878*10465441SEvalZero     if (0
879*10465441SEvalZero #if CHAP_SUPPORT
880*10465441SEvalZero 	|| go->neg_chap
881*10465441SEvalZero #endif /* CHAP_SUPPORT */
882*10465441SEvalZero #if PAP_SUPPORT
883*10465441SEvalZero 	|| go->neg_upap
884*10465441SEvalZero #endif /* PAP_SUPPORT */
885*10465441SEvalZero #if EAP_SUPPORT
886*10465441SEvalZero 	|| go->neg_eap
887*10465441SEvalZero #endif /* EAP_SUPPORT */
888*10465441SEvalZero 	) {
889*10465441SEvalZero 	notify(auth_up_notifier, 0);
890*10465441SEvalZero     }
891*10465441SEvalZero #endif /* PPP_NOTIFY */
892*10465441SEvalZero 
893*10465441SEvalZero #if CBCP_SUPPORT
894*10465441SEvalZero     /*
895*10465441SEvalZero      * If we negotiated callback, do it now.
896*10465441SEvalZero      */
897*10465441SEvalZero     if (go->neg_cbcp) {
898*10465441SEvalZero 	new_phase(pcb, PPP_PHASE_CALLBACK);
899*10465441SEvalZero 	(*cbcp_protent.open)(pcb);
900*10465441SEvalZero 	return;
901*10465441SEvalZero     }
902*10465441SEvalZero #endif
903*10465441SEvalZero 
904*10465441SEvalZero #if PPP_OPTIONS
905*10465441SEvalZero     /*
906*10465441SEvalZero      * Process extra options from the secrets file
907*10465441SEvalZero      */
908*10465441SEvalZero     if (extra_options) {
909*10465441SEvalZero 	options_from_list(extra_options, 1);
910*10465441SEvalZero 	free_wordlist(extra_options);
911*10465441SEvalZero 	extra_options = 0;
912*10465441SEvalZero     }
913*10465441SEvalZero #endif /* PPP_OPTIONS */
914*10465441SEvalZero     start_networks(pcb);
915*10465441SEvalZero }
916*10465441SEvalZero 
start_networks(ppp_pcb * pcb)917*10465441SEvalZero void start_networks(ppp_pcb *pcb) {
918*10465441SEvalZero #if CCP_SUPPORT || ECP_SUPPORT
919*10465441SEvalZero     int i;
920*10465441SEvalZero     const struct protent *protp;
921*10465441SEvalZero #endif /* CCP_SUPPORT || ECP_SUPPORT */
922*10465441SEvalZero 
923*10465441SEvalZero     new_phase(pcb, PPP_PHASE_NETWORK);
924*10465441SEvalZero 
925*10465441SEvalZero #ifdef HAVE_MULTILINK
926*10465441SEvalZero     if (multilink) {
927*10465441SEvalZero 	if (mp_join_bundle()) {
928*10465441SEvalZero 	    if (multilink_join_hook)
929*10465441SEvalZero 		(*multilink_join_hook)();
930*10465441SEvalZero 	    if (updetach && !nodetach)
931*10465441SEvalZero 		detach();
932*10465441SEvalZero 	    return;
933*10465441SEvalZero 	}
934*10465441SEvalZero     }
935*10465441SEvalZero #endif /* HAVE_MULTILINK */
936*10465441SEvalZero 
937*10465441SEvalZero #ifdef PPP_FILTER
938*10465441SEvalZero     if (!demand)
939*10465441SEvalZero 	set_filters(&pass_filter, &active_filter);
940*10465441SEvalZero #endif
941*10465441SEvalZero #if CCP_SUPPORT || ECP_SUPPORT
942*10465441SEvalZero     /* Start CCP and ECP */
943*10465441SEvalZero     for (i = 0; (protp = protocols[i]) != NULL; ++i)
944*10465441SEvalZero 	if (
945*10465441SEvalZero 	    (0
946*10465441SEvalZero #if ECP_SUPPORT
947*10465441SEvalZero 	    || protp->protocol == PPP_ECP
948*10465441SEvalZero #endif /* ECP_SUPPORT */
949*10465441SEvalZero #if CCP_SUPPORT
950*10465441SEvalZero 	    || protp->protocol == PPP_CCP
951*10465441SEvalZero #endif /* CCP_SUPPORT */
952*10465441SEvalZero 	    )
953*10465441SEvalZero 	    && protp->open != NULL)
954*10465441SEvalZero 	    (*protp->open)(pcb);
955*10465441SEvalZero #endif /* CCP_SUPPORT || ECP_SUPPORT */
956*10465441SEvalZero 
957*10465441SEvalZero     /*
958*10465441SEvalZero      * Bring up other network protocols iff encryption is not required.
959*10465441SEvalZero      */
960*10465441SEvalZero     if (1
961*10465441SEvalZero #if ECP_SUPPORT
962*10465441SEvalZero         && !ecp_gotoptions[unit].required
963*10465441SEvalZero #endif /* ECP_SUPPORT */
964*10465441SEvalZero #if MPPE_SUPPORT
965*10465441SEvalZero         && !pcb->ccp_gotoptions.mppe
966*10465441SEvalZero #endif /* MPPE_SUPPORT */
967*10465441SEvalZero         )
968*10465441SEvalZero 	continue_networks(pcb);
969*10465441SEvalZero }
970*10465441SEvalZero 
continue_networks(ppp_pcb * pcb)971*10465441SEvalZero void continue_networks(ppp_pcb *pcb) {
972*10465441SEvalZero     int i;
973*10465441SEvalZero     const struct protent *protp;
974*10465441SEvalZero 
975*10465441SEvalZero     /*
976*10465441SEvalZero      * Start the "real" network protocols.
977*10465441SEvalZero      */
978*10465441SEvalZero     for (i = 0; (protp = protocols[i]) != NULL; ++i)
979*10465441SEvalZero 	if (protp->protocol < 0xC000
980*10465441SEvalZero #if CCP_SUPPORT
981*10465441SEvalZero 	    && protp->protocol != PPP_CCP
982*10465441SEvalZero #endif /* CCP_SUPPORT */
983*10465441SEvalZero #if ECP_SUPPORT
984*10465441SEvalZero 	    && protp->protocol != PPP_ECP
985*10465441SEvalZero #endif /* ECP_SUPPORT */
986*10465441SEvalZero 	    && protp->open != NULL) {
987*10465441SEvalZero 	    (*protp->open)(pcb);
988*10465441SEvalZero 	    ++pcb->num_np_open;
989*10465441SEvalZero 	}
990*10465441SEvalZero 
991*10465441SEvalZero     if (pcb->num_np_open == 0)
992*10465441SEvalZero 	/* nothing to do */
993*10465441SEvalZero 	lcp_close(pcb, "No network protocols running");
994*10465441SEvalZero }
995*10465441SEvalZero 
996*10465441SEvalZero #if PPP_AUTH_SUPPORT
997*10465441SEvalZero #if PPP_SERVER
998*10465441SEvalZero /*
999*10465441SEvalZero  * auth_check_passwd - Check the user name and passwd against configuration.
1000*10465441SEvalZero  *
1001*10465441SEvalZero  * returns:
1002*10465441SEvalZero  *      0: Authentication failed.
1003*10465441SEvalZero  *      1: Authentication succeeded.
1004*10465441SEvalZero  * In either case, msg points to an appropriate message and msglen to the message len.
1005*10465441SEvalZero  */
auth_check_passwd(ppp_pcb * pcb,char * auser,int userlen,char * apasswd,int passwdlen,const char ** msg,int * msglen)1006*10465441SEvalZero int auth_check_passwd(ppp_pcb *pcb, char *auser, int userlen, char *apasswd, int passwdlen, const char **msg, int *msglen) {
1007*10465441SEvalZero   int secretuserlen;
1008*10465441SEvalZero   int secretpasswdlen;
1009*10465441SEvalZero 
1010*10465441SEvalZero   if (pcb->settings.user && pcb->settings.passwd) {
1011*10465441SEvalZero     secretuserlen = (int)strlen(pcb->settings.user);
1012*10465441SEvalZero     secretpasswdlen = (int)strlen(pcb->settings.passwd);
1013*10465441SEvalZero     if (secretuserlen == userlen
1014*10465441SEvalZero         && secretpasswdlen == passwdlen
1015*10465441SEvalZero         && !memcmp(auser, pcb->settings.user, userlen)
1016*10465441SEvalZero         && !memcmp(apasswd, pcb->settings.passwd, passwdlen) ) {
1017*10465441SEvalZero       *msg = "Login ok";
1018*10465441SEvalZero       *msglen = sizeof("Login ok")-1;
1019*10465441SEvalZero       return 1;
1020*10465441SEvalZero     }
1021*10465441SEvalZero   }
1022*10465441SEvalZero 
1023*10465441SEvalZero   *msg = "Login incorrect";
1024*10465441SEvalZero   *msglen = sizeof("Login incorrect")-1;
1025*10465441SEvalZero   return 0;
1026*10465441SEvalZero }
1027*10465441SEvalZero 
1028*10465441SEvalZero /*
1029*10465441SEvalZero  * The peer has failed to authenticate himself using `protocol'.
1030*10465441SEvalZero  */
auth_peer_fail(ppp_pcb * pcb,int protocol)1031*10465441SEvalZero void auth_peer_fail(ppp_pcb *pcb, int protocol) {
1032*10465441SEvalZero     LWIP_UNUSED_ARG(protocol);
1033*10465441SEvalZero     /*
1034*10465441SEvalZero      * Authentication failure: take the link down
1035*10465441SEvalZero      */
1036*10465441SEvalZero #if 0 /* UNUSED */
1037*10465441SEvalZero     status = EXIT_PEER_AUTH_FAILED;
1038*10465441SEvalZero #endif /* UNUSED */
1039*10465441SEvalZero     pcb->err_code = PPPERR_AUTHFAIL;
1040*10465441SEvalZero     lcp_close(pcb, "Authentication failed");
1041*10465441SEvalZero }
1042*10465441SEvalZero 
1043*10465441SEvalZero /*
1044*10465441SEvalZero  * The peer has been successfully authenticated using `protocol'.
1045*10465441SEvalZero  */
auth_peer_success(ppp_pcb * pcb,int protocol,int prot_flavor,const char * name,int namelen)1046*10465441SEvalZero void auth_peer_success(ppp_pcb *pcb, int protocol, int prot_flavor, const char *name, int namelen) {
1047*10465441SEvalZero     int bit;
1048*10465441SEvalZero #ifndef HAVE_MULTILINK
1049*10465441SEvalZero     LWIP_UNUSED_ARG(name);
1050*10465441SEvalZero     LWIP_UNUSED_ARG(namelen);
1051*10465441SEvalZero #endif /* HAVE_MULTILINK */
1052*10465441SEvalZero 
1053*10465441SEvalZero     switch (protocol) {
1054*10465441SEvalZero #if CHAP_SUPPORT
1055*10465441SEvalZero     case PPP_CHAP:
1056*10465441SEvalZero 	bit = CHAP_PEER;
1057*10465441SEvalZero 	switch (prot_flavor) {
1058*10465441SEvalZero 	case CHAP_MD5:
1059*10465441SEvalZero 	    bit |= CHAP_MD5_PEER;
1060*10465441SEvalZero 	    break;
1061*10465441SEvalZero #if MSCHAP_SUPPORT
1062*10465441SEvalZero 	case CHAP_MICROSOFT:
1063*10465441SEvalZero 	    bit |= CHAP_MS_PEER;
1064*10465441SEvalZero 	    break;
1065*10465441SEvalZero 	case CHAP_MICROSOFT_V2:
1066*10465441SEvalZero 	    bit |= CHAP_MS2_PEER;
1067*10465441SEvalZero 	    break;
1068*10465441SEvalZero #endif /* MSCHAP_SUPPORT */
1069*10465441SEvalZero 	default:
1070*10465441SEvalZero 	    break;
1071*10465441SEvalZero 	}
1072*10465441SEvalZero 	break;
1073*10465441SEvalZero #endif /* CHAP_SUPPORT */
1074*10465441SEvalZero #if PAP_SUPPORT
1075*10465441SEvalZero     case PPP_PAP:
1076*10465441SEvalZero 	bit = PAP_PEER;
1077*10465441SEvalZero 	break;
1078*10465441SEvalZero #endif /* PAP_SUPPORT */
1079*10465441SEvalZero #if EAP_SUPPORT
1080*10465441SEvalZero     case PPP_EAP:
1081*10465441SEvalZero 	bit = EAP_PEER;
1082*10465441SEvalZero 	break;
1083*10465441SEvalZero #endif /* EAP_SUPPORT */
1084*10465441SEvalZero     default:
1085*10465441SEvalZero 	ppp_warn("auth_peer_success: unknown protocol %x", protocol);
1086*10465441SEvalZero 	return;
1087*10465441SEvalZero     }
1088*10465441SEvalZero 
1089*10465441SEvalZero #ifdef HAVE_MULTILINK
1090*10465441SEvalZero     /*
1091*10465441SEvalZero      * Save the authenticated name of the peer for later.
1092*10465441SEvalZero      */
1093*10465441SEvalZero     if (namelen > (int)sizeof(pcb->peer_authname) - 1)
1094*10465441SEvalZero 	namelen = (int)sizeof(pcb->peer_authname) - 1;
1095*10465441SEvalZero     MEMCPY(pcb->peer_authname, name, namelen);
1096*10465441SEvalZero     pcb->peer_authname[namelen] = 0;
1097*10465441SEvalZero #endif /* HAVE_MULTILINK */
1098*10465441SEvalZero #if 0 /* UNUSED */
1099*10465441SEvalZero     script_setenv("PEERNAME", , 0);
1100*10465441SEvalZero #endif /* UNUSED */
1101*10465441SEvalZero 
1102*10465441SEvalZero     /* Save the authentication method for later. */
1103*10465441SEvalZero     pcb->auth_done |= bit;
1104*10465441SEvalZero 
1105*10465441SEvalZero     /*
1106*10465441SEvalZero      * If there is no more authentication still to be done,
1107*10465441SEvalZero      * proceed to the network (or callback) phase.
1108*10465441SEvalZero      */
1109*10465441SEvalZero     if ((pcb->auth_pending &= ~bit) == 0)
1110*10465441SEvalZero         network_phase(pcb);
1111*10465441SEvalZero }
1112*10465441SEvalZero #endif /* PPP_SERVER */
1113*10465441SEvalZero 
1114*10465441SEvalZero /*
1115*10465441SEvalZero  * We have failed to authenticate ourselves to the peer using `protocol'.
1116*10465441SEvalZero  */
auth_withpeer_fail(ppp_pcb * pcb,int protocol)1117*10465441SEvalZero void auth_withpeer_fail(ppp_pcb *pcb, int protocol) {
1118*10465441SEvalZero     LWIP_UNUSED_ARG(protocol);
1119*10465441SEvalZero     /*
1120*10465441SEvalZero      * We've failed to authenticate ourselves to our peer.
1121*10465441SEvalZero      *
1122*10465441SEvalZero      * Some servers keep sending CHAP challenges, but there
1123*10465441SEvalZero      * is no point in persisting without any way to get updated
1124*10465441SEvalZero      * authentication secrets.
1125*10465441SEvalZero      *
1126*10465441SEvalZero      * He'll probably take the link down, and there's not much
1127*10465441SEvalZero      * we can do except wait for that.
1128*10465441SEvalZero      */
1129*10465441SEvalZero     pcb->err_code = PPPERR_AUTHFAIL;
1130*10465441SEvalZero     lcp_close(pcb, "Failed to authenticate ourselves to peer");
1131*10465441SEvalZero }
1132*10465441SEvalZero 
1133*10465441SEvalZero /*
1134*10465441SEvalZero  * We have successfully authenticated ourselves with the peer using `protocol'.
1135*10465441SEvalZero  */
auth_withpeer_success(ppp_pcb * pcb,int protocol,int prot_flavor)1136*10465441SEvalZero void auth_withpeer_success(ppp_pcb *pcb, int protocol, int prot_flavor) {
1137*10465441SEvalZero     int bit;
1138*10465441SEvalZero     const char *prot = "";
1139*10465441SEvalZero 
1140*10465441SEvalZero     switch (protocol) {
1141*10465441SEvalZero #if CHAP_SUPPORT
1142*10465441SEvalZero     case PPP_CHAP:
1143*10465441SEvalZero 	bit = CHAP_WITHPEER;
1144*10465441SEvalZero 	prot = "CHAP";
1145*10465441SEvalZero 	switch (prot_flavor) {
1146*10465441SEvalZero 	case CHAP_MD5:
1147*10465441SEvalZero 	    bit |= CHAP_MD5_WITHPEER;
1148*10465441SEvalZero 	    break;
1149*10465441SEvalZero #if MSCHAP_SUPPORT
1150*10465441SEvalZero 	case CHAP_MICROSOFT:
1151*10465441SEvalZero 	    bit |= CHAP_MS_WITHPEER;
1152*10465441SEvalZero 	    break;
1153*10465441SEvalZero 	case CHAP_MICROSOFT_V2:
1154*10465441SEvalZero 	    bit |= CHAP_MS2_WITHPEER;
1155*10465441SEvalZero 	    break;
1156*10465441SEvalZero #endif /* MSCHAP_SUPPORT */
1157*10465441SEvalZero 	default:
1158*10465441SEvalZero 	    break;
1159*10465441SEvalZero 	}
1160*10465441SEvalZero 	break;
1161*10465441SEvalZero #endif /* CHAP_SUPPORT */
1162*10465441SEvalZero #if PAP_SUPPORT
1163*10465441SEvalZero     case PPP_PAP:
1164*10465441SEvalZero 	bit = PAP_WITHPEER;
1165*10465441SEvalZero 	prot = "PAP";
1166*10465441SEvalZero 	break;
1167*10465441SEvalZero #endif /* PAP_SUPPORT */
1168*10465441SEvalZero #if EAP_SUPPORT
1169*10465441SEvalZero     case PPP_EAP:
1170*10465441SEvalZero 	bit = EAP_WITHPEER;
1171*10465441SEvalZero 	prot = "EAP";
1172*10465441SEvalZero 	break;
1173*10465441SEvalZero #endif /* EAP_SUPPORT */
1174*10465441SEvalZero     default:
1175*10465441SEvalZero 	ppp_warn("auth_withpeer_success: unknown protocol %x", protocol);
1176*10465441SEvalZero 	bit = 0;
1177*10465441SEvalZero 	/* no break */
1178*10465441SEvalZero     }
1179*10465441SEvalZero 
1180*10465441SEvalZero     ppp_notice("%s authentication succeeded", prot);
1181*10465441SEvalZero 
1182*10465441SEvalZero     /* Save the authentication method for later. */
1183*10465441SEvalZero     pcb->auth_done |= bit;
1184*10465441SEvalZero 
1185*10465441SEvalZero     /*
1186*10465441SEvalZero      * If there is no more authentication still being done,
1187*10465441SEvalZero      * proceed to the network (or callback) phase.
1188*10465441SEvalZero      */
1189*10465441SEvalZero     if ((pcb->auth_pending &= ~bit) == 0)
1190*10465441SEvalZero 	network_phase(pcb);
1191*10465441SEvalZero }
1192*10465441SEvalZero #endif /* PPP_AUTH_SUPPORT */
1193*10465441SEvalZero 
1194*10465441SEvalZero 
1195*10465441SEvalZero /*
1196*10465441SEvalZero  * np_up - a network protocol has come up.
1197*10465441SEvalZero  */
np_up(ppp_pcb * pcb,int proto)1198*10465441SEvalZero void np_up(ppp_pcb *pcb, int proto) {
1199*10465441SEvalZero #if PPP_IDLETIMELIMIT
1200*10465441SEvalZero     int tlim;
1201*10465441SEvalZero #endif /* PPP_IDLETIMELIMIT */
1202*10465441SEvalZero     LWIP_UNUSED_ARG(proto);
1203*10465441SEvalZero 
1204*10465441SEvalZero     if (pcb->num_np_up == 0) {
1205*10465441SEvalZero 	/*
1206*10465441SEvalZero 	 * At this point we consider that the link has come up successfully.
1207*10465441SEvalZero 	 */
1208*10465441SEvalZero 	new_phase(pcb, PPP_PHASE_RUNNING);
1209*10465441SEvalZero 
1210*10465441SEvalZero #if PPP_IDLETIMELIMIT
1211*10465441SEvalZero #if 0 /* UNUSED */
1212*10465441SEvalZero 	if (idle_time_hook != 0)
1213*10465441SEvalZero 	    tlim = (*idle_time_hook)(NULL);
1214*10465441SEvalZero 	else
1215*10465441SEvalZero #endif /* UNUSED */
1216*10465441SEvalZero 	    tlim = pcb->settings.idle_time_limit;
1217*10465441SEvalZero 	if (tlim > 0)
1218*10465441SEvalZero 	    TIMEOUT(check_idle, (void*)pcb, tlim);
1219*10465441SEvalZero #endif /* PPP_IDLETIMELIMIT */
1220*10465441SEvalZero 
1221*10465441SEvalZero #if PPP_MAXCONNECT
1222*10465441SEvalZero 	/*
1223*10465441SEvalZero 	 * Set a timeout to close the connection once the maximum
1224*10465441SEvalZero 	 * connect time has expired.
1225*10465441SEvalZero 	 */
1226*10465441SEvalZero 	if (pcb->settings.maxconnect > 0)
1227*10465441SEvalZero 	    TIMEOUT(connect_time_expired, (void*)pcb, pcb->settings.maxconnect);
1228*10465441SEvalZero #endif /* PPP_MAXCONNECT */
1229*10465441SEvalZero 
1230*10465441SEvalZero #ifdef MAXOCTETS
1231*10465441SEvalZero 	if (maxoctets > 0)
1232*10465441SEvalZero 	    TIMEOUT(check_maxoctets, NULL, maxoctets_timeout);
1233*10465441SEvalZero #endif
1234*10465441SEvalZero 
1235*10465441SEvalZero #if 0 /* Unused */
1236*10465441SEvalZero 	/*
1237*10465441SEvalZero 	 * Detach now, if the updetach option was given.
1238*10465441SEvalZero 	 */
1239*10465441SEvalZero 	if (updetach && !nodetach)
1240*10465441SEvalZero 	    detach();
1241*10465441SEvalZero #endif /* Unused */
1242*10465441SEvalZero     }
1243*10465441SEvalZero     ++pcb->num_np_up;
1244*10465441SEvalZero }
1245*10465441SEvalZero 
1246*10465441SEvalZero /*
1247*10465441SEvalZero  * np_down - a network protocol has gone down.
1248*10465441SEvalZero  */
np_down(ppp_pcb * pcb,int proto)1249*10465441SEvalZero void np_down(ppp_pcb *pcb, int proto) {
1250*10465441SEvalZero     LWIP_UNUSED_ARG(proto);
1251*10465441SEvalZero     if (--pcb->num_np_up == 0) {
1252*10465441SEvalZero #if PPP_IDLETIMELIMIT
1253*10465441SEvalZero 	UNTIMEOUT(check_idle, (void*)pcb);
1254*10465441SEvalZero #endif /* PPP_IDLETIMELIMIT */
1255*10465441SEvalZero #if PPP_MAXCONNECT
1256*10465441SEvalZero 	UNTIMEOUT(connect_time_expired, NULL);
1257*10465441SEvalZero #endif /* PPP_MAXCONNECT */
1258*10465441SEvalZero #ifdef MAXOCTETS
1259*10465441SEvalZero 	UNTIMEOUT(check_maxoctets, NULL);
1260*10465441SEvalZero #endif
1261*10465441SEvalZero 	new_phase(pcb, PPP_PHASE_NETWORK);
1262*10465441SEvalZero     }
1263*10465441SEvalZero }
1264*10465441SEvalZero 
1265*10465441SEvalZero /*
1266*10465441SEvalZero  * np_finished - a network protocol has finished using the link.
1267*10465441SEvalZero  */
np_finished(ppp_pcb * pcb,int proto)1268*10465441SEvalZero void np_finished(ppp_pcb *pcb, int proto) {
1269*10465441SEvalZero     LWIP_UNUSED_ARG(proto);
1270*10465441SEvalZero     if (--pcb->num_np_open <= 0) {
1271*10465441SEvalZero 	/* no further use for the link: shut up shop. */
1272*10465441SEvalZero 	lcp_close(pcb, "No network protocols running");
1273*10465441SEvalZero     }
1274*10465441SEvalZero }
1275*10465441SEvalZero 
1276*10465441SEvalZero #ifdef MAXOCTETS
1277*10465441SEvalZero static void
check_maxoctets(arg)1278*10465441SEvalZero check_maxoctets(arg)
1279*10465441SEvalZero     void *arg;
1280*10465441SEvalZero {
1281*10465441SEvalZero #if PPP_STATS_SUPPORT
1282*10465441SEvalZero     unsigned int used;
1283*10465441SEvalZero 
1284*10465441SEvalZero     update_link_stats(ifunit);
1285*10465441SEvalZero     link_stats_valid=0;
1286*10465441SEvalZero 
1287*10465441SEvalZero     switch(maxoctets_dir) {
1288*10465441SEvalZero 	case PPP_OCTETS_DIRECTION_IN:
1289*10465441SEvalZero 	    used = link_stats.bytes_in;
1290*10465441SEvalZero 	    break;
1291*10465441SEvalZero 	case PPP_OCTETS_DIRECTION_OUT:
1292*10465441SEvalZero 	    used = link_stats.bytes_out;
1293*10465441SEvalZero 	    break;
1294*10465441SEvalZero 	case PPP_OCTETS_DIRECTION_MAXOVERAL:
1295*10465441SEvalZero 	case PPP_OCTETS_DIRECTION_MAXSESSION:
1296*10465441SEvalZero 	    used = (link_stats.bytes_in > link_stats.bytes_out) ? link_stats.bytes_in : link_stats.bytes_out;
1297*10465441SEvalZero 	    break;
1298*10465441SEvalZero 	default:
1299*10465441SEvalZero 	    used = link_stats.bytes_in+link_stats.bytes_out;
1300*10465441SEvalZero 	    break;
1301*10465441SEvalZero     }
1302*10465441SEvalZero     if (used > maxoctets) {
1303*10465441SEvalZero 	ppp_notice("Traffic limit reached. Limit: %u Used: %u", maxoctets, used);
1304*10465441SEvalZero 	status = EXIT_TRAFFIC_LIMIT;
1305*10465441SEvalZero 	lcp_close(pcb, "Traffic limit");
1306*10465441SEvalZero #if 0 /* UNUSED */
1307*10465441SEvalZero 	need_holdoff = 0;
1308*10465441SEvalZero #endif /* UNUSED */
1309*10465441SEvalZero     } else {
1310*10465441SEvalZero         TIMEOUT(check_maxoctets, NULL, maxoctets_timeout);
1311*10465441SEvalZero     }
1312*10465441SEvalZero #endif /* PPP_STATS_SUPPORT */
1313*10465441SEvalZero }
1314*10465441SEvalZero #endif /* MAXOCTETS */
1315*10465441SEvalZero 
1316*10465441SEvalZero #if PPP_IDLETIMELIMIT
1317*10465441SEvalZero /*
1318*10465441SEvalZero  * check_idle - check whether the link has been idle for long
1319*10465441SEvalZero  * enough that we can shut it down.
1320*10465441SEvalZero  */
check_idle(void * arg)1321*10465441SEvalZero static void check_idle(void *arg) {
1322*10465441SEvalZero     ppp_pcb *pcb = (ppp_pcb*)arg;
1323*10465441SEvalZero     struct ppp_idle idle;
1324*10465441SEvalZero     time_t itime;
1325*10465441SEvalZero     int tlim;
1326*10465441SEvalZero 
1327*10465441SEvalZero     if (!get_idle_time(pcb, &idle))
1328*10465441SEvalZero 	return;
1329*10465441SEvalZero #if 0 /* UNUSED */
1330*10465441SEvalZero     if (idle_time_hook != 0) {
1331*10465441SEvalZero 	tlim = idle_time_hook(&idle);
1332*10465441SEvalZero     } else {
1333*10465441SEvalZero #endif /* UNUSED */
1334*10465441SEvalZero 	itime = LWIP_MIN(idle.xmit_idle, idle.recv_idle);
1335*10465441SEvalZero 	tlim = pcb->settings.idle_time_limit - itime;
1336*10465441SEvalZero #if 0 /* UNUSED */
1337*10465441SEvalZero     }
1338*10465441SEvalZero #endif /* UNUSED */
1339*10465441SEvalZero     if (tlim <= 0) {
1340*10465441SEvalZero 	/* link is idle: shut it down. */
1341*10465441SEvalZero 	ppp_notice("Terminating connection due to lack of activity.");
1342*10465441SEvalZero 	pcb->err_code = PPPERR_IDLETIMEOUT;
1343*10465441SEvalZero 	lcp_close(pcb, "Link inactive");
1344*10465441SEvalZero #if 0 /* UNUSED */
1345*10465441SEvalZero 	need_holdoff = 0;
1346*10465441SEvalZero #endif /* UNUSED */
1347*10465441SEvalZero     } else {
1348*10465441SEvalZero 	TIMEOUT(check_idle, (void*)pcb, tlim);
1349*10465441SEvalZero     }
1350*10465441SEvalZero }
1351*10465441SEvalZero #endif /* PPP_IDLETIMELIMIT */
1352*10465441SEvalZero 
1353*10465441SEvalZero #if PPP_MAXCONNECT
1354*10465441SEvalZero /*
1355*10465441SEvalZero  * connect_time_expired - log a message and close the connection.
1356*10465441SEvalZero  */
connect_time_expired(void * arg)1357*10465441SEvalZero static void connect_time_expired(void *arg) {
1358*10465441SEvalZero     ppp_pcb *pcb = (ppp_pcb*)arg;
1359*10465441SEvalZero     ppp_info("Connect time expired");
1360*10465441SEvalZero     pcb->err_code = PPPERR_CONNECTTIME;
1361*10465441SEvalZero     lcp_close(pcb, "Connect time expired");	/* Close connection */
1362*10465441SEvalZero }
1363*10465441SEvalZero #endif /* PPP_MAXCONNECT */
1364*10465441SEvalZero 
1365*10465441SEvalZero #if PPP_OPTIONS
1366*10465441SEvalZero /*
1367*10465441SEvalZero  * auth_check_options - called to check authentication options.
1368*10465441SEvalZero  */
1369*10465441SEvalZero void
auth_check_options()1370*10465441SEvalZero auth_check_options()
1371*10465441SEvalZero {
1372*10465441SEvalZero     lcp_options *wo = &lcp_wantoptions[0];
1373*10465441SEvalZero     int can_auth;
1374*10465441SEvalZero     int lacks_ip;
1375*10465441SEvalZero 
1376*10465441SEvalZero     /* Default our_name to hostname, and user to our_name */
1377*10465441SEvalZero     if (our_name[0] == 0 || usehostname)
1378*10465441SEvalZero 	strlcpy(our_name, hostname, sizeof(our_name));
1379*10465441SEvalZero     /* If a blank username was explicitly given as an option, trust
1380*10465441SEvalZero        the user and don't use our_name */
1381*10465441SEvalZero     if (ppp_settings.user[0] == 0 && !explicit_user)
1382*10465441SEvalZero 	strlcpy(ppp_settings.user, our_name, sizeof(ppp_settings.user));
1383*10465441SEvalZero 
1384*10465441SEvalZero     /*
1385*10465441SEvalZero      * If we have a default route, require the peer to authenticate
1386*10465441SEvalZero      * unless the noauth option was given or the real user is root.
1387*10465441SEvalZero      */
1388*10465441SEvalZero     if (!auth_required && !allow_any_ip && have_route_to(0) && !privileged) {
1389*10465441SEvalZero 	auth_required = 1;
1390*10465441SEvalZero 	default_auth = 1;
1391*10465441SEvalZero     }
1392*10465441SEvalZero 
1393*10465441SEvalZero #if CHAP_SUPPORT
1394*10465441SEvalZero     /* If we selected any CHAP flavors, we should probably negotiate it. :-) */
1395*10465441SEvalZero     if (wo->chap_mdtype)
1396*10465441SEvalZero 	wo->neg_chap = 1;
1397*10465441SEvalZero #endif /* CHAP_SUPPORT */
1398*10465441SEvalZero 
1399*10465441SEvalZero     /* If authentication is required, ask peer for CHAP, PAP, or EAP. */
1400*10465441SEvalZero     if (auth_required) {
1401*10465441SEvalZero 	allow_any_ip = 0;
1402*10465441SEvalZero 	if (1
1403*10465441SEvalZero #if CHAP_SUPPORT
1404*10465441SEvalZero 	    && !wo->neg_chap
1405*10465441SEvalZero #endif /* CHAP_SUPPORT */
1406*10465441SEvalZero #if PAP_SUPPORT
1407*10465441SEvalZero 	    && !wo->neg_upap
1408*10465441SEvalZero #endif /* PAP_SUPPORT */
1409*10465441SEvalZero #if EAP_SUPPORT
1410*10465441SEvalZero 	    && !wo->neg_eap
1411*10465441SEvalZero #endif /* EAP_SUPPORT */
1412*10465441SEvalZero 	    ) {
1413*10465441SEvalZero #if CHAP_SUPPORT
1414*10465441SEvalZero 	    wo->neg_chap = CHAP_MDTYPE_SUPPORTED != MDTYPE_NONE;
1415*10465441SEvalZero 	    wo->chap_mdtype = CHAP_MDTYPE_SUPPORTED;
1416*10465441SEvalZero #endif /* CHAP_SUPPORT */
1417*10465441SEvalZero #if PAP_SUPPORT
1418*10465441SEvalZero 	    wo->neg_upap = 1;
1419*10465441SEvalZero #endif /* PAP_SUPPORT */
1420*10465441SEvalZero #if EAP_SUPPORT
1421*10465441SEvalZero 	    wo->neg_eap = 1;
1422*10465441SEvalZero #endif /* EAP_SUPPORT */
1423*10465441SEvalZero 	}
1424*10465441SEvalZero     } else {
1425*10465441SEvalZero #if CHAP_SUPPORT
1426*10465441SEvalZero 	wo->neg_chap = 0;
1427*10465441SEvalZero 	wo->chap_mdtype = MDTYPE_NONE;
1428*10465441SEvalZero #endif /* CHAP_SUPPORT */
1429*10465441SEvalZero #if PAP_SUPPORT
1430*10465441SEvalZero 	wo->neg_upap = 0;
1431*10465441SEvalZero #endif /* PAP_SUPPORT */
1432*10465441SEvalZero #if EAP_SUPPORT
1433*10465441SEvalZero 	wo->neg_eap = 0;
1434*10465441SEvalZero #endif /* EAP_SUPPORT */
1435*10465441SEvalZero     }
1436*10465441SEvalZero 
1437*10465441SEvalZero     /*
1438*10465441SEvalZero      * Check whether we have appropriate secrets to use
1439*10465441SEvalZero      * to authenticate the peer.  Note that EAP can authenticate by way
1440*10465441SEvalZero      * of a CHAP-like exchanges as well as SRP.
1441*10465441SEvalZero      */
1442*10465441SEvalZero     lacks_ip = 0;
1443*10465441SEvalZero #if PAP_SUPPORT
1444*10465441SEvalZero     can_auth = wo->neg_upap && (uselogin || have_pap_secret(&lacks_ip));
1445*10465441SEvalZero #else
1446*10465441SEvalZero     can_auth = 0;
1447*10465441SEvalZero #endif /* PAP_SUPPORT */
1448*10465441SEvalZero     if (!can_auth && (0
1449*10465441SEvalZero #if CHAP_SUPPORT
1450*10465441SEvalZero 	|| wo->neg_chap
1451*10465441SEvalZero #endif /* CHAP_SUPPORT */
1452*10465441SEvalZero #if EAP_SUPPORT
1453*10465441SEvalZero 	|| wo->neg_eap
1454*10465441SEvalZero #endif /* EAP_SUPPORT */
1455*10465441SEvalZero 	)) {
1456*10465441SEvalZero #if CHAP_SUPPORT
1457*10465441SEvalZero 	can_auth = have_chap_secret((explicit_remote? remote_name: NULL),
1458*10465441SEvalZero 				    our_name, 1, &lacks_ip);
1459*10465441SEvalZero #else
1460*10465441SEvalZero 	can_auth = 0;
1461*10465441SEvalZero #endif
1462*10465441SEvalZero     }
1463*10465441SEvalZero     if (!can_auth
1464*10465441SEvalZero #if EAP_SUPPORT
1465*10465441SEvalZero 	&& wo->neg_eap
1466*10465441SEvalZero #endif /* EAP_SUPPORT */
1467*10465441SEvalZero 	) {
1468*10465441SEvalZero 	can_auth = have_srp_secret((explicit_remote? remote_name: NULL),
1469*10465441SEvalZero 				    our_name, 1, &lacks_ip);
1470*10465441SEvalZero     }
1471*10465441SEvalZero 
1472*10465441SEvalZero     if (auth_required && !can_auth && noauth_addrs == NULL) {
1473*10465441SEvalZero 	if (default_auth) {
1474*10465441SEvalZero 	    option_error(
1475*10465441SEvalZero "By default the remote system is required to authenticate itself");
1476*10465441SEvalZero 	    option_error(
1477*10465441SEvalZero "(because this system has a default route to the internet)");
1478*10465441SEvalZero 	} else if (explicit_remote)
1479*10465441SEvalZero 	    option_error(
1480*10465441SEvalZero "The remote system (%s) is required to authenticate itself",
1481*10465441SEvalZero 			 remote_name);
1482*10465441SEvalZero 	else
1483*10465441SEvalZero 	    option_error(
1484*10465441SEvalZero "The remote system is required to authenticate itself");
1485*10465441SEvalZero 	option_error(
1486*10465441SEvalZero "but I couldn't find any suitable secret (password) for it to use to do so.");
1487*10465441SEvalZero 	if (lacks_ip)
1488*10465441SEvalZero 	    option_error(
1489*10465441SEvalZero "(None of the available passwords would let it use an IP address.)");
1490*10465441SEvalZero 
1491*10465441SEvalZero 	exit(1);
1492*10465441SEvalZero     }
1493*10465441SEvalZero 
1494*10465441SEvalZero     /*
1495*10465441SEvalZero      * Early check for remote number authorization.
1496*10465441SEvalZero      */
1497*10465441SEvalZero     if (!auth_number()) {
1498*10465441SEvalZero 	ppp_warn("calling number %q is not authorized", remote_number);
1499*10465441SEvalZero 	exit(EXIT_CNID_AUTH_FAILED);
1500*10465441SEvalZero     }
1501*10465441SEvalZero }
1502*10465441SEvalZero #endif /* PPP_OPTIONS */
1503*10465441SEvalZero 
1504*10465441SEvalZero #if 0 /* UNUSED */
1505*10465441SEvalZero /*
1506*10465441SEvalZero  * auth_reset - called when LCP is starting negotiations to recheck
1507*10465441SEvalZero  * authentication options, i.e. whether we have appropriate secrets
1508*10465441SEvalZero  * to use for authenticating ourselves and/or the peer.
1509*10465441SEvalZero  */
1510*10465441SEvalZero void
1511*10465441SEvalZero auth_reset(unit)
1512*10465441SEvalZero     int unit;
1513*10465441SEvalZero {
1514*10465441SEvalZero     lcp_options *go = &lcp_gotoptions[unit];
1515*10465441SEvalZero     lcp_options *ao = &lcp_allowoptions[unit];
1516*10465441SEvalZero     int hadchap;
1517*10465441SEvalZero 
1518*10465441SEvalZero     hadchap = -1;
1519*10465441SEvalZero     ao->neg_upap = !refuse_pap && (passwd[0] != 0 || get_pap_passwd(NULL));
1520*10465441SEvalZero     ao->neg_chap = (!refuse_chap || !refuse_mschap || !refuse_mschap_v2)
1521*10465441SEvalZero 	&& (passwd[0] != 0 ||
1522*10465441SEvalZero 	    (hadchap = have_chap_secret(user, (explicit_remote? remote_name:
1523*10465441SEvalZero 					       NULL), 0, NULL)));
1524*10465441SEvalZero     ao->neg_eap = !refuse_eap && (
1525*10465441SEvalZero 	passwd[0] != 0 ||
1526*10465441SEvalZero 	(hadchap == 1 || (hadchap == -1 && have_chap_secret(user,
1527*10465441SEvalZero 	    (explicit_remote? remote_name: NULL), 0, NULL))) ||
1528*10465441SEvalZero 	have_srp_secret(user, (explicit_remote? remote_name: NULL), 0, NULL));
1529*10465441SEvalZero 
1530*10465441SEvalZero     hadchap = -1;
1531*10465441SEvalZero     if (go->neg_upap && !uselogin && !have_pap_secret(NULL))
1532*10465441SEvalZero 	go->neg_upap = 0;
1533*10465441SEvalZero     if (go->neg_chap) {
1534*10465441SEvalZero 	if (!(hadchap = have_chap_secret((explicit_remote? remote_name: NULL),
1535*10465441SEvalZero 			      our_name, 1, NULL)))
1536*10465441SEvalZero 	    go->neg_chap = 0;
1537*10465441SEvalZero     }
1538*10465441SEvalZero     if (go->neg_eap &&
1539*10465441SEvalZero 	(hadchap == 0 || (hadchap == -1 &&
1540*10465441SEvalZero 	    !have_chap_secret((explicit_remote? remote_name: NULL), our_name,
1541*10465441SEvalZero 		1, NULL))) &&
1542*10465441SEvalZero 	!have_srp_secret((explicit_remote? remote_name: NULL), our_name, 1,
1543*10465441SEvalZero 	    NULL))
1544*10465441SEvalZero 	go->neg_eap = 0;
1545*10465441SEvalZero }
1546*10465441SEvalZero 
1547*10465441SEvalZero /*
1548*10465441SEvalZero  * check_passwd - Check the user name and passwd against the PAP secrets
1549*10465441SEvalZero  * file.  If requested, also check against the system password database,
1550*10465441SEvalZero  * and login the user if OK.
1551*10465441SEvalZero  *
1552*10465441SEvalZero  * returns:
1553*10465441SEvalZero  *	UPAP_AUTHNAK: Authentication failed.
1554*10465441SEvalZero  *	UPAP_AUTHACK: Authentication succeeded.
1555*10465441SEvalZero  * In either case, msg points to an appropriate message.
1556*10465441SEvalZero  */
1557*10465441SEvalZero int
1558*10465441SEvalZero check_passwd(unit, auser, userlen, apasswd, passwdlen, msg)
1559*10465441SEvalZero     int unit;
1560*10465441SEvalZero     char *auser;
1561*10465441SEvalZero     int userlen;
1562*10465441SEvalZero     char *apasswd;
1563*10465441SEvalZero     int passwdlen;
1564*10465441SEvalZero     char **msg;
1565*10465441SEvalZero {
1566*10465441SEvalZero   return UPAP_AUTHNAK;
1567*10465441SEvalZero     int ret;
1568*10465441SEvalZero     char *filename;
1569*10465441SEvalZero     FILE *f;
1570*10465441SEvalZero     struct wordlist *addrs = NULL, *opts = NULL;
1571*10465441SEvalZero     char passwd[256], user[256];
1572*10465441SEvalZero     char secret[MAXWORDLEN];
1573*10465441SEvalZero     static int attempts = 0;
1574*10465441SEvalZero 
1575*10465441SEvalZero     /*
1576*10465441SEvalZero      * Make copies of apasswd and auser, then null-terminate them.
1577*10465441SEvalZero      * If there are unprintable characters in the password, make
1578*10465441SEvalZero      * them visible.
1579*10465441SEvalZero      */
1580*10465441SEvalZero     slprintf(ppp_settings.passwd, sizeof(ppp_settings.passwd), "%.*v", passwdlen, apasswd);
1581*10465441SEvalZero     slprintf(ppp_settings.user, sizeof(ppp_settings.user), "%.*v", userlen, auser);
1582*10465441SEvalZero     *msg = "";
1583*10465441SEvalZero 
1584*10465441SEvalZero     /*
1585*10465441SEvalZero      * Check if a plugin wants to handle this.
1586*10465441SEvalZero      */
1587*10465441SEvalZero     if (pap_auth_hook) {
1588*10465441SEvalZero 	ret = (*pap_auth_hook)(ppp_settings.user, ppp_settings.passwd, msg, &addrs, &opts);
1589*10465441SEvalZero 	if (ret >= 0) {
1590*10465441SEvalZero 	    /* note: set_allowed_addrs() saves opts (but not addrs):
1591*10465441SEvalZero 	       don't free it! */
1592*10465441SEvalZero 	    if (ret)
1593*10465441SEvalZero 		set_allowed_addrs(unit, addrs, opts);
1594*10465441SEvalZero 	    else if (opts != 0)
1595*10465441SEvalZero 		free_wordlist(opts);
1596*10465441SEvalZero 	    if (addrs != 0)
1597*10465441SEvalZero 		free_wordlist(addrs);
1598*10465441SEvalZero 	    BZERO(ppp_settings.passwd, sizeof(ppp_settings.passwd));
1599*10465441SEvalZero 	    return ret? UPAP_AUTHACK: UPAP_AUTHNAK;
1600*10465441SEvalZero 	}
1601*10465441SEvalZero     }
1602*10465441SEvalZero 
1603*10465441SEvalZero     /*
1604*10465441SEvalZero      * Open the file of pap secrets and scan for a suitable secret
1605*10465441SEvalZero      * for authenticating this user.
1606*10465441SEvalZero      */
1607*10465441SEvalZero     filename = _PATH_UPAPFILE;
1608*10465441SEvalZero     addrs = opts = NULL;
1609*10465441SEvalZero     ret = UPAP_AUTHNAK;
1610*10465441SEvalZero     f = fopen(filename, "r");
1611*10465441SEvalZero     if (f == NULL) {
1612*10465441SEvalZero 	ppp_error("Can't open PAP password file %s: %m", filename);
1613*10465441SEvalZero 
1614*10465441SEvalZero     } else {
1615*10465441SEvalZero 	check_access(f, filename);
1616*10465441SEvalZero 	if (scan_authfile(f, ppp_settings.user, our_name, secret, &addrs, &opts, filename, 0) < 0) {
1617*10465441SEvalZero 	    ppp_warn("no PAP secret found for %s", user);
1618*10465441SEvalZero 	} else {
1619*10465441SEvalZero 	    /*
1620*10465441SEvalZero 	     * If the secret is "@login", it means to check
1621*10465441SEvalZero 	     * the password against the login database.
1622*10465441SEvalZero 	     */
1623*10465441SEvalZero 	    int login_secret = strcmp(secret, "@login") == 0;
1624*10465441SEvalZero 	    ret = UPAP_AUTHACK;
1625*10465441SEvalZero 	    if (uselogin || login_secret) {
1626*10465441SEvalZero 		/* login option or secret is @login */
1627*10465441SEvalZero 		if (session_full(ppp_settings.user, ppp_settings.passwd, devnam, msg) == 0) {
1628*10465441SEvalZero 		    ret = UPAP_AUTHNAK;
1629*10465441SEvalZero 		}
1630*10465441SEvalZero 	    } else if (session_mgmt) {
1631*10465441SEvalZero 		if (session_check(ppp_settings.user, NULL, devnam, NULL) == 0) {
1632*10465441SEvalZero 		    ppp_warn("Peer %q failed PAP Session verification", user);
1633*10465441SEvalZero 		    ret = UPAP_AUTHNAK;
1634*10465441SEvalZero 		}
1635*10465441SEvalZero 	    }
1636*10465441SEvalZero 	    if (secret[0] != 0 && !login_secret) {
1637*10465441SEvalZero 		/* password given in pap-secrets - must match */
1638*10465441SEvalZero 		if ((cryptpap || strcmp(ppp_settings.passwd, secret) != 0)
1639*10465441SEvalZero 		    && strcmp(crypt(ppp_settings.passwd, secret), secret) != 0)
1640*10465441SEvalZero 		    ret = UPAP_AUTHNAK;
1641*10465441SEvalZero 	    }
1642*10465441SEvalZero 	}
1643*10465441SEvalZero 	fclose(f);
1644*10465441SEvalZero     }
1645*10465441SEvalZero 
1646*10465441SEvalZero     if (ret == UPAP_AUTHNAK) {
1647*10465441SEvalZero         if (**msg == 0)
1648*10465441SEvalZero 	    *msg = "Login incorrect";
1649*10465441SEvalZero 	/*
1650*10465441SEvalZero 	 * XXX can we ever get here more than once??
1651*10465441SEvalZero 	 * Frustrate passwd stealer programs.
1652*10465441SEvalZero 	 * Allow 10 tries, but start backing off after 3 (stolen from login).
1653*10465441SEvalZero 	 * On 10'th, drop the connection.
1654*10465441SEvalZero 	 */
1655*10465441SEvalZero 	if (attempts++ >= 10) {
1656*10465441SEvalZero 	    ppp_warn("%d LOGIN FAILURES ON %s, %s", attempts, devnam, user);
1657*10465441SEvalZero 	    lcp_close(pcb, "login failed");
1658*10465441SEvalZero 	}
1659*10465441SEvalZero 	if (attempts > 3)
1660*10465441SEvalZero 	    sleep((u_int) (attempts - 3) * 5);
1661*10465441SEvalZero 	if (opts != NULL)
1662*10465441SEvalZero 	    free_wordlist(opts);
1663*10465441SEvalZero 
1664*10465441SEvalZero     } else {
1665*10465441SEvalZero 	attempts = 0;			/* Reset count */
1666*10465441SEvalZero 	if (**msg == 0)
1667*10465441SEvalZero 	    *msg = "Login ok";
1668*10465441SEvalZero 	set_allowed_addrs(unit, addrs, opts);
1669*10465441SEvalZero     }
1670*10465441SEvalZero 
1671*10465441SEvalZero     if (addrs != NULL)
1672*10465441SEvalZero 	free_wordlist(addrs);
1673*10465441SEvalZero     BZERO(ppp_settings.passwd, sizeof(ppp_settings.passwd));
1674*10465441SEvalZero     BZERO(secret, sizeof(secret));
1675*10465441SEvalZero 
1676*10465441SEvalZero     return ret;
1677*10465441SEvalZero }
1678*10465441SEvalZero 
1679*10465441SEvalZero /*
1680*10465441SEvalZero  * null_login - Check if a username of "" and a password of "" are
1681*10465441SEvalZero  * acceptable, and iff so, set the list of acceptable IP addresses
1682*10465441SEvalZero  * and return 1.
1683*10465441SEvalZero  */
1684*10465441SEvalZero static int
1685*10465441SEvalZero null_login(unit)
1686*10465441SEvalZero     int unit;
1687*10465441SEvalZero {
1688*10465441SEvalZero     char *filename;
1689*10465441SEvalZero     FILE *f;
1690*10465441SEvalZero     int i, ret;
1691*10465441SEvalZero     struct wordlist *addrs, *opts;
1692*10465441SEvalZero     char secret[MAXWORDLEN];
1693*10465441SEvalZero 
1694*10465441SEvalZero     /*
1695*10465441SEvalZero      * Check if a plugin wants to handle this.
1696*10465441SEvalZero      */
1697*10465441SEvalZero     ret = -1;
1698*10465441SEvalZero     if (null_auth_hook)
1699*10465441SEvalZero 	ret = (*null_auth_hook)(&addrs, &opts);
1700*10465441SEvalZero 
1701*10465441SEvalZero     /*
1702*10465441SEvalZero      * Open the file of pap secrets and scan for a suitable secret.
1703*10465441SEvalZero      */
1704*10465441SEvalZero     if (ret <= 0) {
1705*10465441SEvalZero 	filename = _PATH_UPAPFILE;
1706*10465441SEvalZero 	addrs = NULL;
1707*10465441SEvalZero 	f = fopen(filename, "r");
1708*10465441SEvalZero 	if (f == NULL)
1709*10465441SEvalZero 	    return 0;
1710*10465441SEvalZero 	check_access(f, filename);
1711*10465441SEvalZero 
1712*10465441SEvalZero 	i = scan_authfile(f, "", our_name, secret, &addrs, &opts, filename, 0);
1713*10465441SEvalZero 	ret = i >= 0 && secret[0] == 0;
1714*10465441SEvalZero 	BZERO(secret, sizeof(secret));
1715*10465441SEvalZero 	fclose(f);
1716*10465441SEvalZero     }
1717*10465441SEvalZero 
1718*10465441SEvalZero     if (ret)
1719*10465441SEvalZero 	set_allowed_addrs(unit, addrs, opts);
1720*10465441SEvalZero     else if (opts != 0)
1721*10465441SEvalZero 	free_wordlist(opts);
1722*10465441SEvalZero     if (addrs != 0)
1723*10465441SEvalZero 	free_wordlist(addrs);
1724*10465441SEvalZero 
1725*10465441SEvalZero     return ret;
1726*10465441SEvalZero }
1727*10465441SEvalZero 
1728*10465441SEvalZero /*
1729*10465441SEvalZero  * get_pap_passwd - get a password for authenticating ourselves with
1730*10465441SEvalZero  * our peer using PAP.  Returns 1 on success, 0 if no suitable password
1731*10465441SEvalZero  * could be found.
1732*10465441SEvalZero  * Assumes passwd points to MAXSECRETLEN bytes of space (if non-null).
1733*10465441SEvalZero  */
1734*10465441SEvalZero static int
1735*10465441SEvalZero get_pap_passwd(passwd)
1736*10465441SEvalZero     char *passwd;
1737*10465441SEvalZero {
1738*10465441SEvalZero     char *filename;
1739*10465441SEvalZero     FILE *f;
1740*10465441SEvalZero     int ret;
1741*10465441SEvalZero     char secret[MAXWORDLEN];
1742*10465441SEvalZero 
1743*10465441SEvalZero     /*
1744*10465441SEvalZero      * Check whether a plugin wants to supply this.
1745*10465441SEvalZero      */
1746*10465441SEvalZero     if (pap_passwd_hook) {
1747*10465441SEvalZero 	ret = (*pap_passwd_hook)(ppp_settings,user, ppp_settings.passwd);
1748*10465441SEvalZero 	if (ret >= 0)
1749*10465441SEvalZero 	    return ret;
1750*10465441SEvalZero     }
1751*10465441SEvalZero 
1752*10465441SEvalZero     filename = _PATH_UPAPFILE;
1753*10465441SEvalZero     f = fopen(filename, "r");
1754*10465441SEvalZero     if (f == NULL)
1755*10465441SEvalZero 	return 0;
1756*10465441SEvalZero     check_access(f, filename);
1757*10465441SEvalZero     ret = scan_authfile(f, user,
1758*10465441SEvalZero 			(remote_name[0]? remote_name: NULL),
1759*10465441SEvalZero 			secret, NULL, NULL, filename, 0);
1760*10465441SEvalZero     fclose(f);
1761*10465441SEvalZero     if (ret < 0)
1762*10465441SEvalZero 	return 0;
1763*10465441SEvalZero     if (passwd != NULL)
1764*10465441SEvalZero 	strlcpy(passwd, secret, MAXSECRETLEN);
1765*10465441SEvalZero     BZERO(secret, sizeof(secret));
1766*10465441SEvalZero     return 1;
1767*10465441SEvalZero }
1768*10465441SEvalZero 
1769*10465441SEvalZero /*
1770*10465441SEvalZero  * have_pap_secret - check whether we have a PAP file with any
1771*10465441SEvalZero  * secrets that we could possibly use for authenticating the peer.
1772*10465441SEvalZero  */
1773*10465441SEvalZero static int
1774*10465441SEvalZero have_pap_secret(lacks_ipp)
1775*10465441SEvalZero     int *lacks_ipp;
1776*10465441SEvalZero {
1777*10465441SEvalZero     FILE *f;
1778*10465441SEvalZero     int ret;
1779*10465441SEvalZero     char *filename;
1780*10465441SEvalZero     struct wordlist *addrs;
1781*10465441SEvalZero 
1782*10465441SEvalZero     /* let the plugin decide, if there is one */
1783*10465441SEvalZero     if (pap_check_hook) {
1784*10465441SEvalZero 	ret = (*pap_check_hook)();
1785*10465441SEvalZero 	if (ret >= 0)
1786*10465441SEvalZero 	    return ret;
1787*10465441SEvalZero     }
1788*10465441SEvalZero 
1789*10465441SEvalZero     filename = _PATH_UPAPFILE;
1790*10465441SEvalZero     f = fopen(filename, "r");
1791*10465441SEvalZero     if (f == NULL)
1792*10465441SEvalZero 	return 0;
1793*10465441SEvalZero 
1794*10465441SEvalZero     ret = scan_authfile(f, (explicit_remote? remote_name: NULL), our_name,
1795*10465441SEvalZero 			NULL, &addrs, NULL, filename, 0);
1796*10465441SEvalZero     fclose(f);
1797*10465441SEvalZero     if (ret >= 0 && !some_ip_ok(addrs)) {
1798*10465441SEvalZero 	if (lacks_ipp != 0)
1799*10465441SEvalZero 	    *lacks_ipp = 1;
1800*10465441SEvalZero 	ret = -1;
1801*10465441SEvalZero     }
1802*10465441SEvalZero     if (addrs != 0)
1803*10465441SEvalZero 	free_wordlist(addrs);
1804*10465441SEvalZero 
1805*10465441SEvalZero     return ret >= 0;
1806*10465441SEvalZero }
1807*10465441SEvalZero 
1808*10465441SEvalZero /*
1809*10465441SEvalZero  * have_chap_secret - check whether we have a CHAP file with a
1810*10465441SEvalZero  * secret that we could possibly use for authenticating `client'
1811*10465441SEvalZero  * on `server'.  Either can be the null string, meaning we don't
1812*10465441SEvalZero  * know the identity yet.
1813*10465441SEvalZero  */
1814*10465441SEvalZero static int
1815*10465441SEvalZero have_chap_secret(client, server, need_ip, lacks_ipp)
1816*10465441SEvalZero     char *client;
1817*10465441SEvalZero     char *server;
1818*10465441SEvalZero     int need_ip;
1819*10465441SEvalZero     int *lacks_ipp;
1820*10465441SEvalZero {
1821*10465441SEvalZero     FILE *f;
1822*10465441SEvalZero     int ret;
1823*10465441SEvalZero     char *filename;
1824*10465441SEvalZero     struct wordlist *addrs;
1825*10465441SEvalZero 
1826*10465441SEvalZero     if (chap_check_hook) {
1827*10465441SEvalZero 	ret = (*chap_check_hook)();
1828*10465441SEvalZero 	if (ret >= 0) {
1829*10465441SEvalZero 	    return ret;
1830*10465441SEvalZero 	}
1831*10465441SEvalZero     }
1832*10465441SEvalZero 
1833*10465441SEvalZero     filename = _PATH_CHAPFILE;
1834*10465441SEvalZero     f = fopen(filename, "r");
1835*10465441SEvalZero     if (f == NULL)
1836*10465441SEvalZero 	return 0;
1837*10465441SEvalZero 
1838*10465441SEvalZero     if (client != NULL && client[0] == 0)
1839*10465441SEvalZero 	client = NULL;
1840*10465441SEvalZero     else if (server != NULL && server[0] == 0)
1841*10465441SEvalZero 	server = NULL;
1842*10465441SEvalZero 
1843*10465441SEvalZero     ret = scan_authfile(f, client, server, NULL, &addrs, NULL, filename, 0);
1844*10465441SEvalZero     fclose(f);
1845*10465441SEvalZero     if (ret >= 0 && need_ip && !some_ip_ok(addrs)) {
1846*10465441SEvalZero 	if (lacks_ipp != 0)
1847*10465441SEvalZero 	    *lacks_ipp = 1;
1848*10465441SEvalZero 	ret = -1;
1849*10465441SEvalZero     }
1850*10465441SEvalZero     if (addrs != 0)
1851*10465441SEvalZero 	free_wordlist(addrs);
1852*10465441SEvalZero 
1853*10465441SEvalZero     return ret >= 0;
1854*10465441SEvalZero }
1855*10465441SEvalZero 
1856*10465441SEvalZero /*
1857*10465441SEvalZero  * have_srp_secret - check whether we have a SRP file with a
1858*10465441SEvalZero  * secret that we could possibly use for authenticating `client'
1859*10465441SEvalZero  * on `server'.  Either can be the null string, meaning we don't
1860*10465441SEvalZero  * know the identity yet.
1861*10465441SEvalZero  */
1862*10465441SEvalZero static int
1863*10465441SEvalZero have_srp_secret(client, server, need_ip, lacks_ipp)
1864*10465441SEvalZero     char *client;
1865*10465441SEvalZero     char *server;
1866*10465441SEvalZero     int need_ip;
1867*10465441SEvalZero     int *lacks_ipp;
1868*10465441SEvalZero {
1869*10465441SEvalZero     FILE *f;
1870*10465441SEvalZero     int ret;
1871*10465441SEvalZero     char *filename;
1872*10465441SEvalZero     struct wordlist *addrs;
1873*10465441SEvalZero 
1874*10465441SEvalZero     filename = _PATH_SRPFILE;
1875*10465441SEvalZero     f = fopen(filename, "r");
1876*10465441SEvalZero     if (f == NULL)
1877*10465441SEvalZero 	return 0;
1878*10465441SEvalZero 
1879*10465441SEvalZero     if (client != NULL && client[0] == 0)
1880*10465441SEvalZero 	client = NULL;
1881*10465441SEvalZero     else if (server != NULL && server[0] == 0)
1882*10465441SEvalZero 	server = NULL;
1883*10465441SEvalZero 
1884*10465441SEvalZero     ret = scan_authfile(f, client, server, NULL, &addrs, NULL, filename, 0);
1885*10465441SEvalZero     fclose(f);
1886*10465441SEvalZero     if (ret >= 0 && need_ip && !some_ip_ok(addrs)) {
1887*10465441SEvalZero 	if (lacks_ipp != 0)
1888*10465441SEvalZero 	    *lacks_ipp = 1;
1889*10465441SEvalZero 	ret = -1;
1890*10465441SEvalZero     }
1891*10465441SEvalZero     if (addrs != 0)
1892*10465441SEvalZero 	free_wordlist(addrs);
1893*10465441SEvalZero 
1894*10465441SEvalZero     return ret >= 0;
1895*10465441SEvalZero }
1896*10465441SEvalZero #endif /* UNUSED */
1897*10465441SEvalZero 
1898*10465441SEvalZero #if PPP_AUTH_SUPPORT
1899*10465441SEvalZero /*
1900*10465441SEvalZero  * get_secret - open the CHAP secret file and return the secret
1901*10465441SEvalZero  * for authenticating the given client on the given server.
1902*10465441SEvalZero  * (We could be either client or server).
1903*10465441SEvalZero  */
get_secret(ppp_pcb * pcb,const char * client,const char * server,char * secret,int * secret_len,int am_server)1904*10465441SEvalZero int get_secret(ppp_pcb *pcb, const char *client, const char *server, char *secret, int *secret_len, int am_server) {
1905*10465441SEvalZero   int len;
1906*10465441SEvalZero   LWIP_UNUSED_ARG(server);
1907*10465441SEvalZero   LWIP_UNUSED_ARG(am_server);
1908*10465441SEvalZero 
1909*10465441SEvalZero   if (!client || !client[0] || !pcb->settings.user || !pcb->settings.passwd || strcmp(client, pcb->settings.user)) {
1910*10465441SEvalZero     return 0;
1911*10465441SEvalZero   }
1912*10465441SEvalZero 
1913*10465441SEvalZero   len = (int)strlen(pcb->settings.passwd);
1914*10465441SEvalZero   if (len > MAXSECRETLEN) {
1915*10465441SEvalZero     ppp_error("Secret for %s on %s is too long", client, server);
1916*10465441SEvalZero     len = MAXSECRETLEN;
1917*10465441SEvalZero   }
1918*10465441SEvalZero 
1919*10465441SEvalZero   MEMCPY(secret, pcb->settings.passwd, len);
1920*10465441SEvalZero   *secret_len = len;
1921*10465441SEvalZero   return 1;
1922*10465441SEvalZero 
1923*10465441SEvalZero #if 0 /* UNUSED */
1924*10465441SEvalZero     FILE *f;
1925*10465441SEvalZero     int ret, len;
1926*10465441SEvalZero     char *filename;
1927*10465441SEvalZero     struct wordlist *addrs, *opts;
1928*10465441SEvalZero     char secbuf[MAXWORDLEN];
1929*10465441SEvalZero     struct wordlist *addrs;
1930*10465441SEvalZero     addrs = NULL;
1931*10465441SEvalZero 
1932*10465441SEvalZero     if (!am_server && ppp_settings.passwd[0] != 0) {
1933*10465441SEvalZero 	strlcpy(secbuf, ppp_settings.passwd, sizeof(secbuf));
1934*10465441SEvalZero     } else if (!am_server && chap_passwd_hook) {
1935*10465441SEvalZero 	if ( (*chap_passwd_hook)(client, secbuf) < 0) {
1936*10465441SEvalZero 	    ppp_error("Unable to obtain CHAP password for %s on %s from plugin",
1937*10465441SEvalZero 		  client, server);
1938*10465441SEvalZero 	    return 0;
1939*10465441SEvalZero 	}
1940*10465441SEvalZero     } else {
1941*10465441SEvalZero 	filename = _PATH_CHAPFILE;
1942*10465441SEvalZero 	addrs = NULL;
1943*10465441SEvalZero 	secbuf[0] = 0;
1944*10465441SEvalZero 
1945*10465441SEvalZero 	f = fopen(filename, "r");
1946*10465441SEvalZero 	if (f == NULL) {
1947*10465441SEvalZero 	    ppp_error("Can't open chap secret file %s: %m", filename);
1948*10465441SEvalZero 	    return 0;
1949*10465441SEvalZero 	}
1950*10465441SEvalZero 	check_access(f, filename);
1951*10465441SEvalZero 
1952*10465441SEvalZero 	ret = scan_authfile(f, client, server, secbuf, &addrs, &opts, filename, 0);
1953*10465441SEvalZero 	fclose(f);
1954*10465441SEvalZero 	if (ret < 0)
1955*10465441SEvalZero 	    return 0;
1956*10465441SEvalZero 
1957*10465441SEvalZero 	if (am_server)
1958*10465441SEvalZero 	    set_allowed_addrs(unit, addrs, opts);
1959*10465441SEvalZero 	else if (opts != 0)
1960*10465441SEvalZero 	    free_wordlist(opts);
1961*10465441SEvalZero 	if (addrs != 0)
1962*10465441SEvalZero 	    free_wordlist(addrs);
1963*10465441SEvalZero     }
1964*10465441SEvalZero 
1965*10465441SEvalZero     len = strlen(secbuf);
1966*10465441SEvalZero     if (len > MAXSECRETLEN) {
1967*10465441SEvalZero 	ppp_error("Secret for %s on %s is too long", client, server);
1968*10465441SEvalZero 	len = MAXSECRETLEN;
1969*10465441SEvalZero     }
1970*10465441SEvalZero     MEMCPY(secret, secbuf, len);
1971*10465441SEvalZero     BZERO(secbuf, sizeof(secbuf));
1972*10465441SEvalZero     *secret_len = len;
1973*10465441SEvalZero 
1974*10465441SEvalZero     return 1;
1975*10465441SEvalZero #endif /* UNUSED */
1976*10465441SEvalZero }
1977*10465441SEvalZero #endif /* PPP_AUTH_SUPPORT */
1978*10465441SEvalZero 
1979*10465441SEvalZero 
1980*10465441SEvalZero #if 0 /* UNUSED */
1981*10465441SEvalZero /*
1982*10465441SEvalZero  * get_srp_secret - open the SRP secret file and return the secret
1983*10465441SEvalZero  * for authenticating the given client on the given server.
1984*10465441SEvalZero  * (We could be either client or server).
1985*10465441SEvalZero  */
1986*10465441SEvalZero int
1987*10465441SEvalZero get_srp_secret(unit, client, server, secret, am_server)
1988*10465441SEvalZero     int unit;
1989*10465441SEvalZero     char *client;
1990*10465441SEvalZero     char *server;
1991*10465441SEvalZero     char *secret;
1992*10465441SEvalZero     int am_server;
1993*10465441SEvalZero {
1994*10465441SEvalZero     FILE *fp;
1995*10465441SEvalZero     int ret;
1996*10465441SEvalZero     char *filename;
1997*10465441SEvalZero     struct wordlist *addrs, *opts;
1998*10465441SEvalZero 
1999*10465441SEvalZero     if (!am_server && ppp_settings.passwd[0] != '\0') {
2000*10465441SEvalZero 	strlcpy(secret, ppp_settings.passwd, MAXWORDLEN);
2001*10465441SEvalZero     } else {
2002*10465441SEvalZero 	filename = _PATH_SRPFILE;
2003*10465441SEvalZero 	addrs = NULL;
2004*10465441SEvalZero 
2005*10465441SEvalZero 	fp = fopen(filename, "r");
2006*10465441SEvalZero 	if (fp == NULL) {
2007*10465441SEvalZero 	    ppp_error("Can't open srp secret file %s: %m", filename);
2008*10465441SEvalZero 	    return 0;
2009*10465441SEvalZero 	}
2010*10465441SEvalZero 	check_access(fp, filename);
2011*10465441SEvalZero 
2012*10465441SEvalZero 	secret[0] = '\0';
2013*10465441SEvalZero 	ret = scan_authfile(fp, client, server, secret, &addrs, &opts,
2014*10465441SEvalZero 	    filename, am_server);
2015*10465441SEvalZero 	fclose(fp);
2016*10465441SEvalZero 	if (ret < 0)
2017*10465441SEvalZero 	    return 0;
2018*10465441SEvalZero 
2019*10465441SEvalZero 	if (am_server)
2020*10465441SEvalZero 	    set_allowed_addrs(unit, addrs, opts);
2021*10465441SEvalZero 	else if (opts != NULL)
2022*10465441SEvalZero 	    free_wordlist(opts);
2023*10465441SEvalZero 	if (addrs != NULL)
2024*10465441SEvalZero 	    free_wordlist(addrs);
2025*10465441SEvalZero     }
2026*10465441SEvalZero 
2027*10465441SEvalZero     return 1;
2028*10465441SEvalZero }
2029*10465441SEvalZero 
2030*10465441SEvalZero /*
2031*10465441SEvalZero  * set_allowed_addrs() - set the list of allowed addresses.
2032*10465441SEvalZero  * Also looks for `--' indicating options to apply for this peer
2033*10465441SEvalZero  * and leaves the following words in extra_options.
2034*10465441SEvalZero  */
2035*10465441SEvalZero static void
2036*10465441SEvalZero set_allowed_addrs(unit, addrs, opts)
2037*10465441SEvalZero     int unit;
2038*10465441SEvalZero     struct wordlist *addrs;
2039*10465441SEvalZero     struct wordlist *opts;
2040*10465441SEvalZero {
2041*10465441SEvalZero     int n;
2042*10465441SEvalZero     struct wordlist *ap, **plink;
2043*10465441SEvalZero     struct permitted_ip *ip;
2044*10465441SEvalZero     char *ptr_word, *ptr_mask;
2045*10465441SEvalZero     struct hostent *hp;
2046*10465441SEvalZero     struct netent *np;
2047*10465441SEvalZero     u32_t a, mask, ah, offset;
2048*10465441SEvalZero     struct ipcp_options *wo = &ipcp_wantoptions[unit];
2049*10465441SEvalZero     u32_t suggested_ip = 0;
2050*10465441SEvalZero 
2051*10465441SEvalZero     if (addresses[unit] != NULL)
2052*10465441SEvalZero 	free(addresses[unit]);
2053*10465441SEvalZero     addresses[unit] = NULL;
2054*10465441SEvalZero     if (extra_options != NULL)
2055*10465441SEvalZero 	free_wordlist(extra_options);
2056*10465441SEvalZero     extra_options = opts;
2057*10465441SEvalZero 
2058*10465441SEvalZero     /*
2059*10465441SEvalZero      * Count the number of IP addresses given.
2060*10465441SEvalZero      */
2061*10465441SEvalZero     n = wordlist_count(addrs) + wordlist_count(noauth_addrs);
2062*10465441SEvalZero     if (n == 0)
2063*10465441SEvalZero 	return;
2064*10465441SEvalZero     ip = (struct permitted_ip *) malloc((n + 1) * sizeof(struct permitted_ip));
2065*10465441SEvalZero     if (ip == 0)
2066*10465441SEvalZero 	return;
2067*10465441SEvalZero 
2068*10465441SEvalZero     /* temporarily append the noauth_addrs list to addrs */
2069*10465441SEvalZero     for (plink = &addrs; *plink != NULL; plink = &(*plink)->next)
2070*10465441SEvalZero 	;
2071*10465441SEvalZero     *plink = noauth_addrs;
2072*10465441SEvalZero 
2073*10465441SEvalZero     n = 0;
2074*10465441SEvalZero     for (ap = addrs; ap != NULL; ap = ap->next) {
2075*10465441SEvalZero 	/* "-" means no addresses authorized, "*" means any address allowed */
2076*10465441SEvalZero 	ptr_word = ap->word;
2077*10465441SEvalZero 	if (strcmp(ptr_word, "-") == 0)
2078*10465441SEvalZero 	    break;
2079*10465441SEvalZero 	if (strcmp(ptr_word, "*") == 0) {
2080*10465441SEvalZero 	    ip[n].permit = 1;
2081*10465441SEvalZero 	    ip[n].base = ip[n].mask = 0;
2082*10465441SEvalZero 	    ++n;
2083*10465441SEvalZero 	    break;
2084*10465441SEvalZero 	}
2085*10465441SEvalZero 
2086*10465441SEvalZero 	ip[n].permit = 1;
2087*10465441SEvalZero 	if (*ptr_word == '!') {
2088*10465441SEvalZero 	    ip[n].permit = 0;
2089*10465441SEvalZero 	    ++ptr_word;
2090*10465441SEvalZero 	}
2091*10465441SEvalZero 
2092*10465441SEvalZero 	mask = ~ (u32_t) 0;
2093*10465441SEvalZero 	offset = 0;
2094*10465441SEvalZero 	ptr_mask = strchr (ptr_word, '/');
2095*10465441SEvalZero 	if (ptr_mask != NULL) {
2096*10465441SEvalZero 	    int bit_count;
2097*10465441SEvalZero 	    char *endp;
2098*10465441SEvalZero 
2099*10465441SEvalZero 	    bit_count = (int) strtol (ptr_mask+1, &endp, 10);
2100*10465441SEvalZero 	    if (bit_count <= 0 || bit_count > 32) {
2101*10465441SEvalZero 		ppp_warn("invalid address length %v in auth. address list",
2102*10465441SEvalZero 		     ptr_mask+1);
2103*10465441SEvalZero 		continue;
2104*10465441SEvalZero 	    }
2105*10465441SEvalZero 	    bit_count = 32 - bit_count;	/* # bits in host part */
2106*10465441SEvalZero 	    if (*endp == '+') {
2107*10465441SEvalZero 		offset = ifunit + 1;
2108*10465441SEvalZero 		++endp;
2109*10465441SEvalZero 	    }
2110*10465441SEvalZero 	    if (*endp != 0) {
2111*10465441SEvalZero 		ppp_warn("invalid address length syntax: %v", ptr_mask+1);
2112*10465441SEvalZero 		continue;
2113*10465441SEvalZero 	    }
2114*10465441SEvalZero 	    *ptr_mask = '\0';
2115*10465441SEvalZero 	    mask <<= bit_count;
2116*10465441SEvalZero 	}
2117*10465441SEvalZero 
2118*10465441SEvalZero 	hp = gethostbyname(ptr_word);
2119*10465441SEvalZero 	if (hp != NULL && hp->h_addrtype == AF_INET) {
2120*10465441SEvalZero 	    a = *(u32_t *)hp->h_addr;
2121*10465441SEvalZero 	} else {
2122*10465441SEvalZero 	    np = getnetbyname (ptr_word);
2123*10465441SEvalZero 	    if (np != NULL && np->n_addrtype == AF_INET) {
2124*10465441SEvalZero 		a = lwip_htonl ((u32_t)np->n_net);
2125*10465441SEvalZero 		if (ptr_mask == NULL) {
2126*10465441SEvalZero 		    /* calculate appropriate mask for net */
2127*10465441SEvalZero 		    ah = lwip_ntohl(a);
2128*10465441SEvalZero 		    if (IN_CLASSA(ah))
2129*10465441SEvalZero 			mask = IN_CLASSA_NET;
2130*10465441SEvalZero 		    else if (IN_CLASSB(ah))
2131*10465441SEvalZero 			mask = IN_CLASSB_NET;
2132*10465441SEvalZero 		    else if (IN_CLASSC(ah))
2133*10465441SEvalZero 			mask = IN_CLASSC_NET;
2134*10465441SEvalZero 		}
2135*10465441SEvalZero 	    } else {
2136*10465441SEvalZero 		a = inet_addr (ptr_word);
2137*10465441SEvalZero 	    }
2138*10465441SEvalZero 	}
2139*10465441SEvalZero 
2140*10465441SEvalZero 	if (ptr_mask != NULL)
2141*10465441SEvalZero 	    *ptr_mask = '/';
2142*10465441SEvalZero 
2143*10465441SEvalZero 	if (a == (u32_t)-1L) {
2144*10465441SEvalZero 	    ppp_warn("unknown host %s in auth. address list", ap->word);
2145*10465441SEvalZero 	    continue;
2146*10465441SEvalZero 	}
2147*10465441SEvalZero 	if (offset != 0) {
2148*10465441SEvalZero 	    if (offset >= ~mask) {
2149*10465441SEvalZero 		ppp_warn("interface unit %d too large for subnet %v",
2150*10465441SEvalZero 		     ifunit, ptr_word);
2151*10465441SEvalZero 		continue;
2152*10465441SEvalZero 	    }
2153*10465441SEvalZero 	    a = lwip_htonl((lwip_ntohl(a) & mask) + offset);
2154*10465441SEvalZero 	    mask = ~(u32_t)0;
2155*10465441SEvalZero 	}
2156*10465441SEvalZero 	ip[n].mask = lwip_htonl(mask);
2157*10465441SEvalZero 	ip[n].base = a & ip[n].mask;
2158*10465441SEvalZero 	++n;
2159*10465441SEvalZero 	if (~mask == 0 && suggested_ip == 0)
2160*10465441SEvalZero 	    suggested_ip = a;
2161*10465441SEvalZero     }
2162*10465441SEvalZero     *plink = NULL;
2163*10465441SEvalZero 
2164*10465441SEvalZero     ip[n].permit = 0;		/* make the last entry forbid all addresses */
2165*10465441SEvalZero     ip[n].base = 0;		/* to terminate the list */
2166*10465441SEvalZero     ip[n].mask = 0;
2167*10465441SEvalZero 
2168*10465441SEvalZero     addresses[unit] = ip;
2169*10465441SEvalZero 
2170*10465441SEvalZero     /*
2171*10465441SEvalZero      * If the address given for the peer isn't authorized, or if
2172*10465441SEvalZero      * the user hasn't given one, AND there is an authorized address
2173*10465441SEvalZero      * which is a single host, then use that if we find one.
2174*10465441SEvalZero      */
2175*10465441SEvalZero     if (suggested_ip != 0
2176*10465441SEvalZero 	&& (wo->hisaddr == 0 || !auth_ip_addr(unit, wo->hisaddr))) {
2177*10465441SEvalZero 	wo->hisaddr = suggested_ip;
2178*10465441SEvalZero 	/*
2179*10465441SEvalZero 	 * Do we insist on this address?  No, if there are other
2180*10465441SEvalZero 	 * addresses authorized than the suggested one.
2181*10465441SEvalZero 	 */
2182*10465441SEvalZero 	if (n > 1)
2183*10465441SEvalZero 	    wo->accept_remote = 1;
2184*10465441SEvalZero     }
2185*10465441SEvalZero }
2186*10465441SEvalZero 
2187*10465441SEvalZero /*
2188*10465441SEvalZero  * auth_ip_addr - check whether the peer is authorized to use
2189*10465441SEvalZero  * a given IP address.  Returns 1 if authorized, 0 otherwise.
2190*10465441SEvalZero  */
2191*10465441SEvalZero int
2192*10465441SEvalZero auth_ip_addr(unit, addr)
2193*10465441SEvalZero     int unit;
2194*10465441SEvalZero     u32_t addr;
2195*10465441SEvalZero {
2196*10465441SEvalZero     int ok;
2197*10465441SEvalZero 
2198*10465441SEvalZero     /* don't allow loopback or multicast address */
2199*10465441SEvalZero     if (bad_ip_adrs(addr))
2200*10465441SEvalZero 	return 0;
2201*10465441SEvalZero 
2202*10465441SEvalZero     if (allowed_address_hook) {
2203*10465441SEvalZero 	ok = allowed_address_hook(addr);
2204*10465441SEvalZero 	if (ok >= 0) return ok;
2205*10465441SEvalZero     }
2206*10465441SEvalZero 
2207*10465441SEvalZero     if (addresses[unit] != NULL) {
2208*10465441SEvalZero 	ok = ip_addr_check(addr, addresses[unit]);
2209*10465441SEvalZero 	if (ok >= 0)
2210*10465441SEvalZero 	    return ok;
2211*10465441SEvalZero     }
2212*10465441SEvalZero 
2213*10465441SEvalZero     if (auth_required)
2214*10465441SEvalZero 	return 0;		/* no addresses authorized */
2215*10465441SEvalZero     return allow_any_ip || privileged || !have_route_to(addr);
2216*10465441SEvalZero }
2217*10465441SEvalZero 
2218*10465441SEvalZero static int
2219*10465441SEvalZero ip_addr_check(addr, addrs)
2220*10465441SEvalZero     u32_t addr;
2221*10465441SEvalZero     struct permitted_ip *addrs;
2222*10465441SEvalZero {
2223*10465441SEvalZero     for (; ; ++addrs)
2224*10465441SEvalZero 	if ((addr & addrs->mask) == addrs->base)
2225*10465441SEvalZero 	    return addrs->permit;
2226*10465441SEvalZero }
2227*10465441SEvalZero 
2228*10465441SEvalZero /*
2229*10465441SEvalZero  * bad_ip_adrs - return 1 if the IP address is one we don't want
2230*10465441SEvalZero  * to use, such as an address in the loopback net or a multicast address.
2231*10465441SEvalZero  * addr is in network byte order.
2232*10465441SEvalZero  */
2233*10465441SEvalZero int
2234*10465441SEvalZero bad_ip_adrs(addr)
2235*10465441SEvalZero     u32_t addr;
2236*10465441SEvalZero {
2237*10465441SEvalZero     addr = lwip_ntohl(addr);
2238*10465441SEvalZero     return (addr >> IN_CLASSA_NSHIFT) == IN_LOOPBACKNET
2239*10465441SEvalZero 	|| IN_MULTICAST(addr) || IN_BADCLASS(addr);
2240*10465441SEvalZero }
2241*10465441SEvalZero 
2242*10465441SEvalZero /*
2243*10465441SEvalZero  * some_ip_ok - check a wordlist to see if it authorizes any
2244*10465441SEvalZero  * IP address(es).
2245*10465441SEvalZero  */
2246*10465441SEvalZero static int
2247*10465441SEvalZero some_ip_ok(addrs)
2248*10465441SEvalZero     struct wordlist *addrs;
2249*10465441SEvalZero {
2250*10465441SEvalZero     for (; addrs != 0; addrs = addrs->next) {
2251*10465441SEvalZero 	if (addrs->word[0] == '-')
2252*10465441SEvalZero 	    break;
2253*10465441SEvalZero 	if (addrs->word[0] != '!')
2254*10465441SEvalZero 	    return 1;		/* some IP address is allowed */
2255*10465441SEvalZero     }
2256*10465441SEvalZero     return 0;
2257*10465441SEvalZero }
2258*10465441SEvalZero 
2259*10465441SEvalZero /*
2260*10465441SEvalZero  * auth_number - check whether the remote number is allowed to connect.
2261*10465441SEvalZero  * Returns 1 if authorized, 0 otherwise.
2262*10465441SEvalZero  */
2263*10465441SEvalZero int
2264*10465441SEvalZero auth_number()
2265*10465441SEvalZero {
2266*10465441SEvalZero     struct wordlist *wp = permitted_numbers;
2267*10465441SEvalZero     int l;
2268*10465441SEvalZero 
2269*10465441SEvalZero     /* Allow all if no authorization list. */
2270*10465441SEvalZero     if (!wp)
2271*10465441SEvalZero 	return 1;
2272*10465441SEvalZero 
2273*10465441SEvalZero     /* Allow if we have a match in the authorization list. */
2274*10465441SEvalZero     while (wp) {
2275*10465441SEvalZero 	/* trailing '*' wildcard */
2276*10465441SEvalZero 	l = strlen(wp->word);
2277*10465441SEvalZero 	if ((wp->word)[l - 1] == '*')
2278*10465441SEvalZero 	    l--;
2279*10465441SEvalZero 	if (!strncasecmp(wp->word, remote_number, l))
2280*10465441SEvalZero 	    return 1;
2281*10465441SEvalZero 	wp = wp->next;
2282*10465441SEvalZero     }
2283*10465441SEvalZero 
2284*10465441SEvalZero     return 0;
2285*10465441SEvalZero }
2286*10465441SEvalZero 
2287*10465441SEvalZero /*
2288*10465441SEvalZero  * check_access - complain if a secret file has too-liberal permissions.
2289*10465441SEvalZero  */
2290*10465441SEvalZero static void
2291*10465441SEvalZero check_access(f, filename)
2292*10465441SEvalZero     FILE *f;
2293*10465441SEvalZero     char *filename;
2294*10465441SEvalZero {
2295*10465441SEvalZero     struct stat sbuf;
2296*10465441SEvalZero 
2297*10465441SEvalZero     if (fstat(fileno(f), &sbuf) < 0) {
2298*10465441SEvalZero 	ppp_warn("cannot stat secret file %s: %m", filename);
2299*10465441SEvalZero     } else if ((sbuf.st_mode & (S_IRWXG | S_IRWXO)) != 0) {
2300*10465441SEvalZero 	ppp_warn("Warning - secret file %s has world and/or group access",
2301*10465441SEvalZero 	     filename);
2302*10465441SEvalZero     }
2303*10465441SEvalZero }
2304*10465441SEvalZero 
2305*10465441SEvalZero /*
2306*10465441SEvalZero  * scan_authfile - Scan an authorization file for a secret suitable
2307*10465441SEvalZero  * for authenticating `client' on `server'.  The return value is -1
2308*10465441SEvalZero  * if no secret is found, otherwise >= 0.  The return value has
2309*10465441SEvalZero  * NONWILD_CLIENT set if the secret didn't have "*" for the client, and
2310*10465441SEvalZero  * NONWILD_SERVER set if the secret didn't have "*" for the server.
2311*10465441SEvalZero  * Any following words on the line up to a "--" (i.e. address authorization
2312*10465441SEvalZero  * info) are placed in a wordlist and returned in *addrs.  Any
2313*10465441SEvalZero  * following words (extra options) are placed in a wordlist and
2314*10465441SEvalZero  * returned in *opts.
2315*10465441SEvalZero  * We assume secret is NULL or points to MAXWORDLEN bytes of space.
2316*10465441SEvalZero  * Flags are non-zero if we need two colons in the secret in order to
2317*10465441SEvalZero  * match.
2318*10465441SEvalZero  */
2319*10465441SEvalZero static int
2320*10465441SEvalZero scan_authfile(f, client, server, secret, addrs, opts, filename, flags)
2321*10465441SEvalZero     FILE *f;
2322*10465441SEvalZero     char *client;
2323*10465441SEvalZero     char *server;
2324*10465441SEvalZero     char *secret;
2325*10465441SEvalZero     struct wordlist **addrs;
2326*10465441SEvalZero     struct wordlist **opts;
2327*10465441SEvalZero     char *filename;
2328*10465441SEvalZero     int flags;
2329*10465441SEvalZero {
2330*10465441SEvalZero     int newline, xxx;
2331*10465441SEvalZero     int got_flag, best_flag;
2332*10465441SEvalZero     FILE *sf;
2333*10465441SEvalZero     struct wordlist *ap, *addr_list, *alist, **app;
2334*10465441SEvalZero     char word[MAXWORDLEN];
2335*10465441SEvalZero     char atfile[MAXWORDLEN];
2336*10465441SEvalZero     char lsecret[MAXWORDLEN];
2337*10465441SEvalZero     char *cp;
2338*10465441SEvalZero 
2339*10465441SEvalZero     if (addrs != NULL)
2340*10465441SEvalZero 	*addrs = NULL;
2341*10465441SEvalZero     if (opts != NULL)
2342*10465441SEvalZero 	*opts = NULL;
2343*10465441SEvalZero     addr_list = NULL;
2344*10465441SEvalZero     if (!getword(f, word, &newline, filename))
2345*10465441SEvalZero 	return -1;		/* file is empty??? */
2346*10465441SEvalZero     newline = 1;
2347*10465441SEvalZero     best_flag = -1;
2348*10465441SEvalZero     for (;;) {
2349*10465441SEvalZero 	/*
2350*10465441SEvalZero 	 * Skip until we find a word at the start of a line.
2351*10465441SEvalZero 	 */
2352*10465441SEvalZero 	while (!newline && getword(f, word, &newline, filename))
2353*10465441SEvalZero 	    ;
2354*10465441SEvalZero 	if (!newline)
2355*10465441SEvalZero 	    break;		/* got to end of file */
2356*10465441SEvalZero 
2357*10465441SEvalZero 	/*
2358*10465441SEvalZero 	 * Got a client - check if it's a match or a wildcard.
2359*10465441SEvalZero 	 */
2360*10465441SEvalZero 	got_flag = 0;
2361*10465441SEvalZero 	if (client != NULL && strcmp(word, client) != 0 && !ISWILD(word)) {
2362*10465441SEvalZero 	    newline = 0;
2363*10465441SEvalZero 	    continue;
2364*10465441SEvalZero 	}
2365*10465441SEvalZero 	if (!ISWILD(word))
2366*10465441SEvalZero 	    got_flag = NONWILD_CLIENT;
2367*10465441SEvalZero 
2368*10465441SEvalZero 	/*
2369*10465441SEvalZero 	 * Now get a server and check if it matches.
2370*10465441SEvalZero 	 */
2371*10465441SEvalZero 	if (!getword(f, word, &newline, filename))
2372*10465441SEvalZero 	    break;
2373*10465441SEvalZero 	if (newline)
2374*10465441SEvalZero 	    continue;
2375*10465441SEvalZero 	if (!ISWILD(word)) {
2376*10465441SEvalZero 	    if (server != NULL && strcmp(word, server) != 0)
2377*10465441SEvalZero 		continue;
2378*10465441SEvalZero 	    got_flag |= NONWILD_SERVER;
2379*10465441SEvalZero 	}
2380*10465441SEvalZero 
2381*10465441SEvalZero 	/*
2382*10465441SEvalZero 	 * Got some sort of a match - see if it's better than what
2383*10465441SEvalZero 	 * we have already.
2384*10465441SEvalZero 	 */
2385*10465441SEvalZero 	if (got_flag <= best_flag)
2386*10465441SEvalZero 	    continue;
2387*10465441SEvalZero 
2388*10465441SEvalZero 	/*
2389*10465441SEvalZero 	 * Get the secret.
2390*10465441SEvalZero 	 */
2391*10465441SEvalZero 	if (!getword(f, word, &newline, filename))
2392*10465441SEvalZero 	    break;
2393*10465441SEvalZero 	if (newline)
2394*10465441SEvalZero 	    continue;
2395*10465441SEvalZero 
2396*10465441SEvalZero 	/*
2397*10465441SEvalZero 	 * SRP-SHA1 authenticator should never be reading secrets from
2398*10465441SEvalZero 	 * a file.  (Authenticatee may, though.)
2399*10465441SEvalZero 	 */
2400*10465441SEvalZero 	if (flags && ((cp = strchr(word, ':')) == NULL ||
2401*10465441SEvalZero 	    strchr(cp + 1, ':') == NULL))
2402*10465441SEvalZero 	    continue;
2403*10465441SEvalZero 
2404*10465441SEvalZero 	if (secret != NULL) {
2405*10465441SEvalZero 	    /*
2406*10465441SEvalZero 	     * Special syntax: @/pathname means read secret from file.
2407*10465441SEvalZero 	     */
2408*10465441SEvalZero 	    if (word[0] == '@' && word[1] == '/') {
2409*10465441SEvalZero 		strlcpy(atfile, word+1, sizeof(atfile));
2410*10465441SEvalZero 		if ((sf = fopen(atfile, "r")) == NULL) {
2411*10465441SEvalZero 		    ppp_warn("can't open indirect secret file %s", atfile);
2412*10465441SEvalZero 		    continue;
2413*10465441SEvalZero 		}
2414*10465441SEvalZero 		check_access(sf, atfile);
2415*10465441SEvalZero 		if (!getword(sf, word, &xxx, atfile)) {
2416*10465441SEvalZero 		    ppp_warn("no secret in indirect secret file %s", atfile);
2417*10465441SEvalZero 		    fclose(sf);
2418*10465441SEvalZero 		    continue;
2419*10465441SEvalZero 		}
2420*10465441SEvalZero 		fclose(sf);
2421*10465441SEvalZero 	    }
2422*10465441SEvalZero 	    strlcpy(lsecret, word, sizeof(lsecret));
2423*10465441SEvalZero 	}
2424*10465441SEvalZero 
2425*10465441SEvalZero 	/*
2426*10465441SEvalZero 	 * Now read address authorization info and make a wordlist.
2427*10465441SEvalZero 	 */
2428*10465441SEvalZero 	app = &alist;
2429*10465441SEvalZero 	for (;;) {
2430*10465441SEvalZero 	    if (!getword(f, word, &newline, filename) || newline)
2431*10465441SEvalZero 		break;
2432*10465441SEvalZero 	    ap = (struct wordlist *)
2433*10465441SEvalZero 		    malloc(sizeof(struct wordlist) + strlen(word) + 1);
2434*10465441SEvalZero 	    if (ap == NULL)
2435*10465441SEvalZero 		novm("authorized addresses");
2436*10465441SEvalZero 	    ap->word = (char *) (ap + 1);
2437*10465441SEvalZero 	    strcpy(ap->word, word);
2438*10465441SEvalZero 	    *app = ap;
2439*10465441SEvalZero 	    app = &ap->next;
2440*10465441SEvalZero 	}
2441*10465441SEvalZero 	*app = NULL;
2442*10465441SEvalZero 
2443*10465441SEvalZero 	/*
2444*10465441SEvalZero 	 * This is the best so far; remember it.
2445*10465441SEvalZero 	 */
2446*10465441SEvalZero 	best_flag = got_flag;
2447*10465441SEvalZero 	if (addr_list)
2448*10465441SEvalZero 	    free_wordlist(addr_list);
2449*10465441SEvalZero 	addr_list = alist;
2450*10465441SEvalZero 	if (secret != NULL)
2451*10465441SEvalZero 	    strlcpy(secret, lsecret, MAXWORDLEN);
2452*10465441SEvalZero 
2453*10465441SEvalZero 	if (!newline)
2454*10465441SEvalZero 	    break;
2455*10465441SEvalZero     }
2456*10465441SEvalZero 
2457*10465441SEvalZero     /* scan for a -- word indicating the start of options */
2458*10465441SEvalZero     for (app = &addr_list; (ap = *app) != NULL; app = &ap->next)
2459*10465441SEvalZero 	if (strcmp(ap->word, "--") == 0)
2460*10465441SEvalZero 	    break;
2461*10465441SEvalZero     /* ap = start of options */
2462*10465441SEvalZero     if (ap != NULL) {
2463*10465441SEvalZero 	ap = ap->next;		/* first option */
2464*10465441SEvalZero 	free(*app);			/* free the "--" word */
2465*10465441SEvalZero 	*app = NULL;		/* terminate addr list */
2466*10465441SEvalZero     }
2467*10465441SEvalZero     if (opts != NULL)
2468*10465441SEvalZero 	*opts = ap;
2469*10465441SEvalZero     else if (ap != NULL)
2470*10465441SEvalZero 	free_wordlist(ap);
2471*10465441SEvalZero     if (addrs != NULL)
2472*10465441SEvalZero 	*addrs = addr_list;
2473*10465441SEvalZero     else if (addr_list != NULL)
2474*10465441SEvalZero 	free_wordlist(addr_list);
2475*10465441SEvalZero 
2476*10465441SEvalZero     return best_flag;
2477*10465441SEvalZero }
2478*10465441SEvalZero 
2479*10465441SEvalZero /*
2480*10465441SEvalZero  * wordlist_count - return the number of items in a wordlist
2481*10465441SEvalZero  */
2482*10465441SEvalZero static int
2483*10465441SEvalZero wordlist_count(wp)
2484*10465441SEvalZero     struct wordlist *wp;
2485*10465441SEvalZero {
2486*10465441SEvalZero     int n;
2487*10465441SEvalZero 
2488*10465441SEvalZero     for (n = 0; wp != NULL; wp = wp->next)
2489*10465441SEvalZero 	++n;
2490*10465441SEvalZero     return n;
2491*10465441SEvalZero }
2492*10465441SEvalZero 
2493*10465441SEvalZero /*
2494*10465441SEvalZero  * free_wordlist - release memory allocated for a wordlist.
2495*10465441SEvalZero  */
2496*10465441SEvalZero static void
2497*10465441SEvalZero free_wordlist(wp)
2498*10465441SEvalZero     struct wordlist *wp;
2499*10465441SEvalZero {
2500*10465441SEvalZero     struct wordlist *next;
2501*10465441SEvalZero 
2502*10465441SEvalZero     while (wp != NULL) {
2503*10465441SEvalZero 	next = wp->next;
2504*10465441SEvalZero 	free(wp);
2505*10465441SEvalZero 	wp = next;
2506*10465441SEvalZero     }
2507*10465441SEvalZero }
2508*10465441SEvalZero #endif /* UNUSED */
2509*10465441SEvalZero 
2510*10465441SEvalZero #endif /* PPP_SUPPORT */
2511