亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? upap.c

?? vxwork源代碼
?? C
字號:
/* upap.c - User/Password Authentication Protocol *//* Copyright 1994-1995 Wind River Systems, Inc. */#include "copyright_wrs.h"/* * Copyright (c) 1989 Carnegie Mellon University. * All rights reserved. * * Redistribution and use in source and binary forms are permitted * provided that the above copyright notice and this paragraph are * duplicated in all such forms and that any documentation, * advertising materials, and other materials related to such * distribution and use acknowledge that the software was developed * by Carnegie Mellon University.  The name of the * University may not be used to endorse or promote products derived * from this software without specific prior written permission. * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE. *//*modification history--------------------01c,16jun95,dzb  header file consolidation.                 changed [UN]TIMEOUT macros to PPP_[UN]TIMEOUT.01b,16dec94,dab  removed misleading log message in upap_rauthack().01a,21dec94,dab  VxWorks port - first WRS version.	   +dzb  added: path for ppp header files, WRS copyright.*/#include "vxWorks.h"#include "string.h"#include "stdio.h"#include "sys/types.h"#include "sys/times.h"#include "pppLib.h"static void upap_timeout __ARGS((caddr_t));static void upap_rauthreq __ARGS((upap_state *, u_char *, int, int));static void upap_rauthack __ARGS((upap_state *, u_char *, int, int));static void upap_rauthnak __ARGS((upap_state *, u_char *, int, int));static void upap_sauthreq __ARGS((upap_state *));static void upap_sresp __ARGS((upap_state *, int, int, char *, int));/* * upap_init - Initialize a UPAP unit. */voidupap_init(unit)    int unit;{    upap_state *u = &ppp_if[unit]->upap;    u->us_unit = unit;    u->us_user = NULL;    u->us_userlen = 0;    u->us_passwd = NULL;    u->us_passwdlen = 0;    u->us_clientstate = UPAPCS_INITIAL;    u->us_serverstate = UPAPSS_INITIAL;    u->us_id = 0;    u->us_timeouttime = UPAP_DEFTIMEOUT;    u->us_maxtransmits = 10;}/* * upap_authwithpeer - Authenticate us with our peer (start client). * * Set new state and send authenticate's. */voidupap_authwithpeer(unit, user, password)    int unit;    char *user, *password;{    upap_state *u = &ppp_if[unit]->upap;    /* Save the username and password we're given */    u->us_user = user;    u->us_userlen = strlen(user);    u->us_passwd = password;    u->us_passwdlen = strlen(password);    u->us_transmits = 0;    /* Lower layer up yet? */    if (u->us_clientstate == UPAPCS_INITIAL ||	u->us_clientstate == UPAPCS_PENDING) {	u->us_clientstate = UPAPCS_PENDING;	return;    }    upap_sauthreq(u);			/* Start protocol */}/* * upap_authpeer - Authenticate our peer (start server). * * Set new state. */voidupap_authpeer(unit)    int unit;{    upap_state *u = &ppp_if[unit]->upap;    /* Lower layer up yet? */    if (u->us_serverstate == UPAPSS_INITIAL ||	u->us_serverstate == UPAPSS_PENDING) {	u->us_serverstate = UPAPSS_PENDING;	return;    }    u->us_serverstate = UPAPSS_LISTEN;}/* * upap_timeout - Timeout expired. */static voidupap_timeout(arg)    caddr_t arg;{    upap_state *u = (upap_state *) arg;    if (u->us_clientstate != UPAPCS_AUTHREQ)	return;    if (u->us_transmits >= u->us_maxtransmits) {	/* give up in disgust */	syslog(LOG_ERR, "No response to PAP authenticate-requests");	u->us_clientstate = UPAPCS_BADAUTH;	auth_withpeer_fail(u->us_unit, UPAP);	return;    }    upap_sauthreq(u);		/* Send Authenticate-Request */}/* * upap_lowerup - The lower layer is up. * * Start authenticating if pending. */voidupap_lowerup(unit)    int unit;{    upap_state *u = &ppp_if[unit]->upap;    if (u->us_clientstate == UPAPCS_INITIAL)	u->us_clientstate = UPAPCS_CLOSED;    else if (u->us_clientstate == UPAPCS_PENDING) {	upap_sauthreq(u);	/* send an auth-request */    }    if (u->us_serverstate == UPAPSS_INITIAL)	u->us_serverstate = UPAPSS_CLOSED;    else if (u->us_serverstate == UPAPSS_PENDING)	u->us_serverstate = UPAPSS_LISTEN;}/* * upap_lowerdown - The lower layer is down. * * Cancel all timeouts. */voidupap_lowerdown(unit)    int unit;{    upap_state *u = &ppp_if[unit]->upap;    if (u->us_clientstate == UPAPCS_AUTHREQ) /* Timeout pending? */	PPP_UNTIMEOUT(upap_timeout, (caddr_t) u);	/* Cancel timeout */    u->us_clientstate = UPAPCS_INITIAL;    u->us_serverstate = UPAPSS_INITIAL;}/* * upap_protrej - Peer doesn't speak this protocol. * * This shouldn't happen.  In any case, pretend lower layer went down. */voidupap_protrej(unit)    int unit;{    upap_state *u = &ppp_if[unit]->upap;    if (u->us_clientstate == UPAPCS_AUTHREQ) {	syslog(LOG_ERR, "PAP authentication failed due to protocol-reject");	auth_withpeer_fail(unit, UPAP);    }    if (u->us_serverstate == UPAPSS_LISTEN) {	syslog(LOG_ERR, "PAP authentication of peer failed (protocol-reject)");	auth_peer_fail(unit, UPAP);    }    upap_lowerdown(unit);}/* * upap_input - Input UPAP packet. */voidupap_input(unit, inpacket, l)    int unit;    u_char *inpacket;    int l;{    upap_state *u = &ppp_if[unit]->upap;    u_char *inp;    u_char code, id;    int len;    /*     * Parse header (code, id and length).     * If packet too short, drop it.     */    inp = inpacket;    if (l < UPAP_HEADERLEN) {	UPAPDEBUG((LOG_INFO, "upap_input: rcvd short header."));	return;    }    GETCHAR(code, inp);    GETCHAR(id, inp);    GETSHORT(len, inp);    if (len < UPAP_HEADERLEN) {	UPAPDEBUG((LOG_INFO, "upap_input: rcvd illegal length."));	return;    }    if (len > l) {	UPAPDEBUG((LOG_INFO, "upap_input: rcvd short packet."));	return;    }    len -= UPAP_HEADERLEN;    /*     * Action depends on code.     */    switch (code) {    case UPAP_AUTHREQ:	upap_rauthreq(u, inp, id, len);	break;    case UPAP_AUTHACK:	upap_rauthack(u, inp, id, len);	break;    case UPAP_AUTHNAK:	upap_rauthnak(u, inp, id, len);	break;    default:				/* XXX Need code reject */	break;    }}/* * upap_rauth - Receive Authenticate. */static voidupap_rauthreq(u, inp, id, len)    upap_state *u;    u_char *inp;    int id;    int len;{    u_char ruserlen, rpasswdlen;    char *ruser, *rpasswd;    int retcode;    char *msg;    int msglen;    UPAPDEBUG((LOG_INFO, "upap_rauth: Rcvd id %d.", id));    if (u->us_serverstate < UPAPSS_LISTEN)	return;    /*     * If we receive a duplicate authenticate-request, we are     * supposed to return the same status as for the first request.     */    if (u->us_serverstate == UPAPSS_OPEN) {	upap_sresp(u, UPAP_AUTHACK, id, "", 0);	/* return auth-ack */	return;    }    if (u->us_serverstate == UPAPSS_BADAUTH) {	upap_sresp(u, UPAP_AUTHNAK, id, "", 0);	/* return auth-nak */	return;    }    /*     * Parse user/passwd.     */    if (len < sizeof (u_char)) {	UPAPDEBUG((LOG_INFO, "upap_rauth: rcvd short packet."));	return;    }    GETCHAR(ruserlen, inp);    len -= sizeof (u_char) + ruserlen + sizeof (u_char);    if (len < 0) {	UPAPDEBUG((LOG_INFO, "upap_rauth: rcvd short packet."));	return;    }    ruser = (char *) inp;    INCPTR(ruserlen, inp);    GETCHAR(rpasswdlen, inp);    if (len < rpasswdlen) {	UPAPDEBUG((LOG_INFO, "upap_rauth: rcvd short packet."));	return;    }    rpasswd = (char *) inp;    /*     * Check the username and password given.     */    retcode = check_passwd(u->us_unit, ruser, ruserlen, rpasswd,			   rpasswdlen, &msg, &msglen);    upap_sresp(u, retcode, id, msg, msglen);    if (retcode == UPAP_AUTHACK) {	u->us_serverstate = UPAPSS_OPEN;	auth_peer_success(u->us_unit, UPAP);    } else {	u->us_serverstate = UPAPSS_BADAUTH;	auth_peer_fail(u->us_unit, UPAP);    }}/* * upap_rauthack - Receive Authenticate-Ack. */static voidupap_rauthack(u, inp, id, len)    upap_state *u;    u_char *inp;    int id;    int len;{    u_char msglen;    char *msg;    UPAPDEBUG((LOG_INFO, "upap_rauthack: Rcvd id %d.", id));    if (u->us_clientstate != UPAPCS_AUTHREQ) /* XXX */	return;    /*     * Parse message.     */    if (len < sizeof (u_char)) {	UPAPDEBUG((LOG_INFO, "upap_rauthack: rcvd short packet."));	return;    }    GETCHAR(msglen, inp);    len -= sizeof (u_char);    if (len < msglen) {	UPAPDEBUG((LOG_INFO, "upap_rauthack: rcvd short packet."));	return;    }    msg = (char *) inp;    PRINTMSG(msg, msglen);    u->us_clientstate = UPAPCS_OPEN;    auth_withpeer_success(u->us_unit, UPAP);}/* * upap_rauthnak - Receive Authenticate-Nakk. */static voidupap_rauthnak(u, inp, id, len)    upap_state *u;    u_char *inp;    int id;    int len;{    u_char msglen;    char *msg;    UPAPDEBUG((LOG_INFO, "upap_rauthnak: Rcvd id %d.", id));    if (u->us_clientstate != UPAPCS_AUTHREQ) /* XXX */	return;    /*     * Parse message.     */    if (len < sizeof (u_char)) {	UPAPDEBUG((LOG_INFO, "upap_rauthnak: rcvd short packet."));	return;    }    GETCHAR(msglen, inp);    len -= sizeof (u_char);    if (len < msglen) {	UPAPDEBUG((LOG_INFO, "upap_rauthnak: rcvd short packet."));	return;    }    msg = (char *) inp;    PRINTMSG(msg, msglen);    u->us_clientstate = UPAPCS_BADAUTH;    syslog(LOG_ERR, "PAP authentication failed");    auth_withpeer_fail(u->us_unit, UPAP);}/* * upap_sauthreq - Send an Authenticate-Request. */static voidupap_sauthreq(u)    upap_state *u;{    u_char *outp;    int outlen;    outlen = UPAP_HEADERLEN + 2 * sizeof (u_char) +	u->us_userlen + u->us_passwdlen;    outp = ppp_if[u->us_unit]->outpacket_buf;        MAKEHEADER(outp, UPAP);    PUTCHAR(UPAP_AUTHREQ, outp);    PUTCHAR(++u->us_id, outp);    PUTSHORT(outlen, outp);    PUTCHAR(u->us_userlen, outp);    BCOPY(u->us_user, (char *)outp, u->us_userlen);    INCPTR(u->us_userlen, outp);    PUTCHAR(u->us_passwdlen, outp);    BCOPY(u->us_passwd, (char *)outp, u->us_passwdlen);    output(u->us_unit, ppp_if[u->us_unit]->outpacket_buf, outlen + DLLHEADERLEN);    UPAPDEBUG((LOG_INFO, "upap_sauth: Sent id %d.", u->us_id));    PPP_TIMEOUT(upap_timeout, (caddr_t) u, u->us_timeouttime);    ++u->us_transmits;    u->us_clientstate = UPAPCS_AUTHREQ;}/* * upap_sresp - Send a response (ack or nak). */static voidupap_sresp(u, code, id, msg, msglen)    upap_state *u;    u_char code, id;    char *msg;    int msglen;{    u_char *outp;    int outlen;    outlen = UPAP_HEADERLEN + sizeof (u_char) + msglen;    outp = ppp_if[u->us_unit]->outpacket_buf;    MAKEHEADER(outp, UPAP);    PUTCHAR(code, outp);    PUTCHAR(id, outp);    PUTSHORT(outlen, outp);    PUTCHAR(msglen, outp);    BCOPY(msg, (char *)outp, msglen);    output(u->us_unit, ppp_if[u->us_unit]->outpacket_buf, outlen + DLLHEADERLEN);    UPAPDEBUG((LOG_INFO, "upap_sresp: Sent code %d, id %d.", code, id));}/* * upap_printpkt - print the contents of a PAP packet. */char *upap_codenames[] = {    "AuthReq", "AuthAck", "AuthNak"};intupap_printpkt(p, plen, printer, arg)    u_char *p;    int plen;    void (*printer) __ARGS((void *, char *, ...));    void *arg;{    int code, id, len;    int mlen, ulen, wlen;    char *user, *pwd, *msg;    u_char *pstart;    if (plen < UPAP_HEADERLEN)        return 0;    pstart = p;    GETCHAR(code, p);    GETCHAR(id, p);    GETSHORT(len, p);    if (len < UPAP_HEADERLEN || len > plen)        return 0;    if (code >= 1 && code <= sizeof(upap_codenames) / sizeof(char *))        printer(arg, " %s", upap_codenames[code-1]);    else        printer(arg, " code=0x%x", code);    printer(arg, " id=0x%x", id);    len -= UPAP_HEADERLEN;    switch (code) {    case UPAP_AUTHREQ:        if (len < 1)            break;        ulen = p[0];        if (len < ulen + 2)            break;        wlen = p[ulen + 1];        if (len < ulen + wlen + 2)            break;        user = (char *) (p + 1);        pwd = (char *) (p + ulen + 2);        p += ulen + wlen + 2;        len -= ulen + wlen + 2;        printer(arg, " user=");        print_string(user, ulen, printer, arg);        printer(arg, " password=");        print_string(pwd, wlen, printer, arg);        break;    case UPAP_AUTHACK:    case UPAP_AUTHNAK:        if (len < 1)            break;        mlen = p[0];        if (len < mlen + 1)            break;        msg = (char *) (p + 1);        p += mlen + 1;        len -= mlen + 1;        printer(arg, "msg=");        print_string(msg, mlen, printer, arg);        break;    }    /* print the rest of the bytes in the packet */    for (; len > 0; --len) {        GETCHAR(code, p);        printer(arg, " %.2x", code);    }    return p - pstart;}

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
一区二区欧美精品| 国产女人aaa级久久久级| 亚洲国产sm捆绑调教视频 | 国产大陆a不卡| 欧美va亚洲va在线观看蝴蝶网| 久久精品国产精品亚洲综合| 日韩一区二区中文字幕| 福利电影一区二区| 国产精品激情偷乱一区二区∴| www.久久久久久久久| 一区二区免费看| 欧美一级片免费看| 国产精品一二二区| 亚洲日本中文字幕区| 欧美欧美午夜aⅴ在线观看| 狠狠色2019综合网| 自拍偷拍国产亚洲| 欧美精品99久久久**| 国产一区二区三区久久久| 日韩毛片视频在线看| 欧美日韩激情一区二区| 蜜桃视频一区二区三区| 中文字幕第一区| 欧美亚洲国产一卡| 韩国v欧美v日本v亚洲v| 亚洲三级电影全部在线观看高清| 欧美人狂配大交3d怪物一区| 国产一区二区h| 亚洲一区国产视频| 国产偷v国产偷v亚洲高清| 色一区在线观看| 国产精品一级在线| 五月天婷婷综合| 免费在线看成人av| 国产精品久久三区| 日韩欧美一级二级三级久久久| 成人精品电影在线观看| 五月综合激情网| 国产精品毛片无遮挡高清| 91精品在线免费观看| 一本色道久久加勒比精品| 国产一区二区视频在线播放| 亚洲成人三级小说| 欧美激情一区二区三区蜜桃视频| 欧美日韩一级视频| 白白色亚洲国产精品| 国内精品视频666| 调教+趴+乳夹+国产+精品| 中文字幕中文字幕一区二区 | 欧美福利视频一区| 成人动漫一区二区三区| 黑人巨大精品欧美一区| 亚洲高清一区二区三区| 亚洲人成网站在线| 亚洲国产精品成人综合色在线婷婷| 欧美群妇大交群中文字幕| 91蝌蚪porny| 成人精品免费看| 国模少妇一区二区三区| 日韩精品午夜视频| 一级做a爱片久久| 亚洲日本乱码在线观看| 中文字幕精品在线不卡| 久久久精品天堂| 久久影视一区二区| 久久夜色精品一区| 亚洲精品在线观看网站| 日韩一区二区精品葵司在线| 欧美日韩的一区二区| 欧美三级视频在线观看| 91福利小视频| 在线亚洲+欧美+日本专区| 一本到三区不卡视频| 色综合久久综合中文综合网| 成人app网站| av网站一区二区三区| bt欧美亚洲午夜电影天堂| 成人理论电影网| 99re这里只有精品视频首页| 99在线精品视频| 色噜噜狠狠色综合欧洲selulu| 99re在线视频这里只有精品| 日本精品一区二区三区四区的功能| 91网站黄www| 欧美日韩一区三区四区| 欧美日韩国产大片| 日韩欧美在线1卡| 欧美α欧美αv大片| 国产亚洲一二三区| 综合激情网...| 亚洲高清一区二区三区| 日韩av中文字幕一区二区三区| 麻豆精品一区二区三区| 黄页视频在线91| 国产大陆亚洲精品国产| 91在线播放网址| 欧美日韩国产a| 久久久久久99精品| 《视频一区视频二区| 亚洲成人动漫av| 九九精品视频在线看| 北岛玲一区二区三区四区| 欧美视频精品在线| 欧美精品一区在线观看| 国产精品热久久久久夜色精品三区 | 国产亚洲污的网站| 一区在线观看免费| 亚洲成av人片在线| 国产久卡久卡久卡久卡视频精品| 粉嫩13p一区二区三区| 91国产福利在线| 精品国产乱码久久久久久免费| 国产精品久久久久久久浪潮网站| 亚洲电影欧美电影有声小说| 精品一区二区三区蜜桃| 一本久久a久久免费精品不卡| 欧美日韩在线不卡| 中文字幕欧美三区| 日韩专区一卡二卡| av在线免费不卡| 欧美一级日韩不卡播放免费| 亚洲国产成人私人影院tom| 天堂在线亚洲视频| 色综合天天综合给合国产| 欧美猛男超大videosgay| 久久久久9999亚洲精品| 一区二区三区欧美视频| 国产乱人伦偷精品视频免下载| 一本大道av伊人久久综合| 欧美成人r级一区二区三区| 18欧美亚洲精品| 国产乱码一区二区三区| 欧美日韩精品是欧美日韩精品| 国产欧美一区二区精品久导航| 亚洲不卡在线观看| 色综合久久99| 2020国产精品自拍| 日日摸夜夜添夜夜添精品视频| 99久久伊人网影院| 精品福利一区二区三区| 五月开心婷婷久久| 99久久综合国产精品| 久久久另类综合| 美女视频黄免费的久久| 欧美主播一区二区三区| 自拍视频在线观看一区二区| 久久99热99| 日韩一区二区三区观看| 亚洲3atv精品一区二区三区| 91在线观看地址| 亚洲欧洲一区二区在线播放| 国产成人精品一区二区三区网站观看| 欧美日韩亚洲综合在线 欧美亚洲特黄一级| 中文字幕av资源一区| 极品少妇xxxx精品少妇| 日韩精品在线一区| 男人操女人的视频在线观看欧美| 欧美日韩一区不卡| 亚洲成国产人片在线观看| 在线精品国精品国产尤物884a| 亚洲色图色小说| 99精品欧美一区二区蜜桃免费| 国产精品久久久久久妇女6080| 国产不卡高清在线观看视频| 国产亚洲欧美中文| 成人一级视频在线观看| 国产亚洲欧洲一区高清在线观看| 国产福利一区在线| 中文字幕不卡在线| 丰满亚洲少妇av| 亚洲视频在线观看一区| 91蜜桃视频在线| 亚洲国产乱码最新视频| 欧美日韩成人综合| 免费精品视频最新在线| 精品久久久久av影院| 国产精品一品视频| 中文字幕在线不卡一区| 91视频com| 亚洲国产欧美在线| 欧美一区2区视频在线观看| 日韩精品每日更新| 久久亚洲精精品中文字幕早川悠里| 国产在线一区观看| 国产精品污www在线观看| 99精品国产99久久久久久白柏| 一区二区三区日韩欧美| 91麻豆精品国产91久久久久久久久 | www.久久久久久久久| 亚洲视频网在线直播| 欧美成人一区二区三区片免费 | 欧美日韩1234| 日本成人在线视频网站| 久久亚洲二区三区| 99精品欧美一区二区蜜桃免费| 亚洲综合色丁香婷婷六月图片| 欧美一区二区精品在线| 国产69精品久久777的优势| 亚洲一区二区三区视频在线| 日韩免费高清电影|