亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? upap.c

?? vxworks的源代碼
?? C
字號:
/* upap.c - User/Password Authentication Protocol *//* Copyright 1994-1995 Wind River Systems, Inc. */#include "copyright_wrs.h"/* * Copyright (c) 1989 Carnegie Mellon University. * All rights reserved. * * Redistribution and use in source and binary forms are permitted * provided that the above copyright notice and this paragraph are * duplicated in all such forms and that any documentation, * advertising materials, and other materials related to such * distribution and use acknowledge that the software was developed * by Carnegie Mellon University.  The name of the * University may not be used to endorse or promote products derived * from this software without specific prior written permission. * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE. *//*modification history--------------------01c,16jun95,dzb  header file consolidation.                 changed [UN]TIMEOUT macros to PPP_[UN]TIMEOUT.01b,16dec94,dab  removed misleading log message in upap_rauthack().01a,21dec94,dab  VxWorks port - first WRS version.	   +dzb  added: path for ppp header files, WRS copyright.*/#include "vxWorks.h"#include "string.h"#include "stdio.h"#include "sys/types.h"#include "sys/times.h"#include "pppLib.h"static void upap_timeout __ARGS((caddr_t));static void upap_rauthreq __ARGS((upap_state *, u_char *, int, int));static void upap_rauthack __ARGS((upap_state *, u_char *, int, int));static void upap_rauthnak __ARGS((upap_state *, u_char *, int, int));static void upap_sauthreq __ARGS((upap_state *));static void upap_sresp __ARGS((upap_state *, int, int, char *, int));/* * upap_init - Initialize a UPAP unit. */voidupap_init(unit)    int unit;{    upap_state *u = &ppp_if[unit]->upap;    u->us_unit = unit;    u->us_user = NULL;    u->us_userlen = 0;    u->us_passwd = NULL;    u->us_passwdlen = 0;    u->us_clientstate = UPAPCS_INITIAL;    u->us_serverstate = UPAPSS_INITIAL;    u->us_id = 0;    u->us_timeouttime = UPAP_DEFTIMEOUT;    u->us_maxtransmits = 10;}/* * upap_authwithpeer - Authenticate us with our peer (start client). * * Set new state and send authenticate's. */voidupap_authwithpeer(unit, user, password)    int unit;    char *user, *password;{    upap_state *u = &ppp_if[unit]->upap;    /* Save the username and password we're given */    u->us_user = user;    u->us_userlen = strlen(user);    u->us_passwd = password;    u->us_passwdlen = strlen(password);    u->us_transmits = 0;    /* Lower layer up yet? */    if (u->us_clientstate == UPAPCS_INITIAL ||	u->us_clientstate == UPAPCS_PENDING) {	u->us_clientstate = UPAPCS_PENDING;	return;    }    upap_sauthreq(u);			/* Start protocol */}/* * upap_authpeer - Authenticate our peer (start server). * * Set new state. */voidupap_authpeer(unit)    int unit;{    upap_state *u = &ppp_if[unit]->upap;    /* Lower layer up yet? */    if (u->us_serverstate == UPAPSS_INITIAL ||	u->us_serverstate == UPAPSS_PENDING) {	u->us_serverstate = UPAPSS_PENDING;	return;    }    u->us_serverstate = UPAPSS_LISTEN;}/* * upap_timeout - Timeout expired. */static voidupap_timeout(arg)    caddr_t arg;{    upap_state *u = (upap_state *) arg;    if (u->us_clientstate != UPAPCS_AUTHREQ)	return;    if (u->us_transmits >= u->us_maxtransmits) {	/* give up in disgust */	syslog(LOG_ERR, "No response to PAP authenticate-requests");	u->us_clientstate = UPAPCS_BADAUTH;	auth_withpeer_fail(u->us_unit, UPAP);	return;    }    upap_sauthreq(u);		/* Send Authenticate-Request */}/* * upap_lowerup - The lower layer is up. * * Start authenticating if pending. */voidupap_lowerup(unit)    int unit;{    upap_state *u = &ppp_if[unit]->upap;    if (u->us_clientstate == UPAPCS_INITIAL)	u->us_clientstate = UPAPCS_CLOSED;    else if (u->us_clientstate == UPAPCS_PENDING) {	upap_sauthreq(u);	/* send an auth-request */    }    if (u->us_serverstate == UPAPSS_INITIAL)	u->us_serverstate = UPAPSS_CLOSED;    else if (u->us_serverstate == UPAPSS_PENDING)	u->us_serverstate = UPAPSS_LISTEN;}/* * upap_lowerdown - The lower layer is down. * * Cancel all timeouts. */voidupap_lowerdown(unit)    int unit;{    upap_state *u = &ppp_if[unit]->upap;    if (u->us_clientstate == UPAPCS_AUTHREQ) /* Timeout pending? */	PPP_UNTIMEOUT(upap_timeout, (caddr_t) u);	/* Cancel timeout */    u->us_clientstate = UPAPCS_INITIAL;    u->us_serverstate = UPAPSS_INITIAL;}/* * upap_protrej - Peer doesn't speak this protocol. * * This shouldn't happen.  In any case, pretend lower layer went down. */voidupap_protrej(unit)    int unit;{    upap_state *u = &ppp_if[unit]->upap;    if (u->us_clientstate == UPAPCS_AUTHREQ) {	syslog(LOG_ERR, "PAP authentication failed due to protocol-reject");	auth_withpeer_fail(unit, UPAP);    }    if (u->us_serverstate == UPAPSS_LISTEN) {	syslog(LOG_ERR, "PAP authentication of peer failed (protocol-reject)");	auth_peer_fail(unit, UPAP);    }    upap_lowerdown(unit);}/* * upap_input - Input UPAP packet. */voidupap_input(unit, inpacket, l)    int unit;    u_char *inpacket;    int l;{    upap_state *u = &ppp_if[unit]->upap;    u_char *inp;    u_char code, id;    int len;    /*     * Parse header (code, id and length).     * If packet too short, drop it.     */    inp = inpacket;    if (l < UPAP_HEADERLEN) {	UPAPDEBUG((LOG_INFO, "upap_input: rcvd short header."));	return;    }    GETCHAR(code, inp);    GETCHAR(id, inp);    GETSHORT(len, inp);    if (len < UPAP_HEADERLEN) {	UPAPDEBUG((LOG_INFO, "upap_input: rcvd illegal length."));	return;    }    if (len > l) {	UPAPDEBUG((LOG_INFO, "upap_input: rcvd short packet."));	return;    }    len -= UPAP_HEADERLEN;    /*     * Action depends on code.     */    switch (code) {    case UPAP_AUTHREQ:	upap_rauthreq(u, inp, id, len);	break;    case UPAP_AUTHACK:	upap_rauthack(u, inp, id, len);	break;    case UPAP_AUTHNAK:	upap_rauthnak(u, inp, id, len);	break;    default:				/* XXX Need code reject */	break;    }}/* * upap_rauth - Receive Authenticate. */static voidupap_rauthreq(u, inp, id, len)    upap_state *u;    u_char *inp;    int id;    int len;{    u_char ruserlen, rpasswdlen;    char *ruser, *rpasswd;    int retcode;    char *msg;    int msglen;    UPAPDEBUG((LOG_INFO, "upap_rauth: Rcvd id %d.", id));    if (u->us_serverstate < UPAPSS_LISTEN)	return;    /*     * If we receive a duplicate authenticate-request, we are     * supposed to return the same status as for the first request.     */    if (u->us_serverstate == UPAPSS_OPEN) {	upap_sresp(u, UPAP_AUTHACK, id, "", 0);	/* return auth-ack */	return;    }    if (u->us_serverstate == UPAPSS_BADAUTH) {	upap_sresp(u, UPAP_AUTHNAK, id, "", 0);	/* return auth-nak */	return;    }    /*     * Parse user/passwd.     */    if (len < sizeof (u_char)) {	UPAPDEBUG((LOG_INFO, "upap_rauth: rcvd short packet."));	return;    }    GETCHAR(ruserlen, inp);    len -= sizeof (u_char) + ruserlen + sizeof (u_char);    if (len < 0) {	UPAPDEBUG((LOG_INFO, "upap_rauth: rcvd short packet."));	return;    }    ruser = (char *) inp;    INCPTR(ruserlen, inp);    GETCHAR(rpasswdlen, inp);    if (len < rpasswdlen) {	UPAPDEBUG((LOG_INFO, "upap_rauth: rcvd short packet."));	return;    }    rpasswd = (char *) inp;    /*     * Check the username and password given.     */    retcode = check_passwd(u->us_unit, ruser, ruserlen, rpasswd,			   rpasswdlen, &msg, &msglen);    upap_sresp(u, retcode, id, msg, msglen);    if (retcode == UPAP_AUTHACK) {	u->us_serverstate = UPAPSS_OPEN;	auth_peer_success(u->us_unit, UPAP);    } else {	u->us_serverstate = UPAPSS_BADAUTH;	auth_peer_fail(u->us_unit, UPAP);    }}/* * upap_rauthack - Receive Authenticate-Ack. */static voidupap_rauthack(u, inp, id, len)    upap_state *u;    u_char *inp;    int id;    int len;{    u_char msglen;    char *msg;    UPAPDEBUG((LOG_INFO, "upap_rauthack: Rcvd id %d.", id));    if (u->us_clientstate != UPAPCS_AUTHREQ) /* XXX */	return;    /*     * Parse message.     */    if (len < sizeof (u_char)) {	UPAPDEBUG((LOG_INFO, "upap_rauthack: rcvd short packet."));	return;    }    GETCHAR(msglen, inp);    len -= sizeof (u_char);    if (len < msglen) {	UPAPDEBUG((LOG_INFO, "upap_rauthack: rcvd short packet."));	return;    }    msg = (char *) inp;    PRINTMSG(msg, msglen);    u->us_clientstate = UPAPCS_OPEN;    auth_withpeer_success(u->us_unit, UPAP);}/* * upap_rauthnak - Receive Authenticate-Nakk. */static voidupap_rauthnak(u, inp, id, len)    upap_state *u;    u_char *inp;    int id;    int len;{    u_char msglen;    char *msg;    UPAPDEBUG((LOG_INFO, "upap_rauthnak: Rcvd id %d.", id));    if (u->us_clientstate != UPAPCS_AUTHREQ) /* XXX */	return;    /*     * Parse message.     */    if (len < sizeof (u_char)) {	UPAPDEBUG((LOG_INFO, "upap_rauthnak: rcvd short packet."));	return;    }    GETCHAR(msglen, inp);    len -= sizeof (u_char);    if (len < msglen) {	UPAPDEBUG((LOG_INFO, "upap_rauthnak: rcvd short packet."));	return;    }    msg = (char *) inp;    PRINTMSG(msg, msglen);    u->us_clientstate = UPAPCS_BADAUTH;    syslog(LOG_ERR, "PAP authentication failed");    auth_withpeer_fail(u->us_unit, UPAP);}/* * upap_sauthreq - Send an Authenticate-Request. */static voidupap_sauthreq(u)    upap_state *u;{    u_char *outp;    int outlen;    outlen = UPAP_HEADERLEN + 2 * sizeof (u_char) +	u->us_userlen + u->us_passwdlen;    outp = ppp_if[u->us_unit]->outpacket_buf;        MAKEHEADER(outp, UPAP);    PUTCHAR(UPAP_AUTHREQ, outp);    PUTCHAR(++u->us_id, outp);    PUTSHORT(outlen, outp);    PUTCHAR(u->us_userlen, outp);    BCOPY(u->us_user, (char *)outp, u->us_userlen);    INCPTR(u->us_userlen, outp);    PUTCHAR(u->us_passwdlen, outp);    BCOPY(u->us_passwd, (char *)outp, u->us_passwdlen);    output(u->us_unit, ppp_if[u->us_unit]->outpacket_buf, outlen + DLLHEADERLEN);    UPAPDEBUG((LOG_INFO, "upap_sauth: Sent id %d.", u->us_id));    PPP_TIMEOUT(upap_timeout, (caddr_t) u, u->us_timeouttime);    ++u->us_transmits;    u->us_clientstate = UPAPCS_AUTHREQ;}/* * upap_sresp - Send a response (ack or nak). */static voidupap_sresp(u, code, id, msg, msglen)    upap_state *u;    u_char code, id;    char *msg;    int msglen;{    u_char *outp;    int outlen;    outlen = UPAP_HEADERLEN + sizeof (u_char) + msglen;    outp = ppp_if[u->us_unit]->outpacket_buf;    MAKEHEADER(outp, UPAP);    PUTCHAR(code, outp);    PUTCHAR(id, outp);    PUTSHORT(outlen, outp);    PUTCHAR(msglen, outp);    BCOPY(msg, (char *)outp, msglen);    output(u->us_unit, ppp_if[u->us_unit]->outpacket_buf, outlen + DLLHEADERLEN);    UPAPDEBUG((LOG_INFO, "upap_sresp: Sent code %d, id %d.", code, id));}/* * upap_printpkt - print the contents of a PAP packet. */char *upap_codenames[] = {    "AuthReq", "AuthAck", "AuthNak"};intupap_printpkt(p, plen, printer, arg)    u_char *p;    int plen;    void (*printer) __ARGS((void *, char *, ...));    void *arg;{    int code, id, len;    int mlen, ulen, wlen;    char *user, *pwd, *msg;    u_char *pstart;    if (plen < UPAP_HEADERLEN)        return 0;    pstart = p;    GETCHAR(code, p);    GETCHAR(id, p);    GETSHORT(len, p);    if (len < UPAP_HEADERLEN || len > plen)        return 0;    if (code >= 1 && code <= sizeof(upap_codenames) / sizeof(char *))        printer(arg, " %s", upap_codenames[code-1]);    else        printer(arg, " code=0x%x", code);    printer(arg, " id=0x%x", id);    len -= UPAP_HEADERLEN;    switch (code) {    case UPAP_AUTHREQ:        if (len < 1)            break;        ulen = p[0];        if (len < ulen + 2)            break;        wlen = p[ulen + 1];        if (len < ulen + wlen + 2)            break;        user = (char *) (p + 1);        pwd = (char *) (p + ulen + 2);        p += ulen + wlen + 2;        len -= ulen + wlen + 2;        printer(arg, " user=");        print_string(user, ulen, printer, arg);        printer(arg, " password=");        print_string(pwd, wlen, printer, arg);        break;    case UPAP_AUTHACK:    case UPAP_AUTHNAK:        if (len < 1)            break;        mlen = p[0];        if (len < mlen + 1)            break;        msg = (char *) (p + 1);        p += mlen + 1;        len -= mlen + 1;        printer(arg, "msg=");        print_string(msg, mlen, printer, arg);        break;    }    /* print the rest of the bytes in the packet */    for (; len > 0; --len) {        GETCHAR(code, p);        printer(arg, " %.2x", code);    }    return p - pstart;}

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
蜜臀av性久久久久蜜臀aⅴ流畅| 国产精品理伦片| 午夜私人影院久久久久| 欧日韩精品视频| 亚洲精品乱码久久久久久黑人| 91免费看片在线观看| 亚洲女同一区二区| 在线视频欧美区| 亚洲国产日韩精品| 欧美一区二区在线免费播放 | 欧美精品自拍偷拍| 亚洲国产va精品久久久不卡综合 | 欧美日本在线视频| 麻豆成人av在线| 久久综合999| 成人av网址在线观看| 一区二区三区在线观看国产| 欧美日韩精品一区二区在线播放| 日本人妖一区二区| 国产日韩影视精品| 日本精品视频一区二区| 日韩经典一区二区| 久久久久99精品国产片| 一本在线高清不卡dvd| 日韩极品在线观看| 国产精品丝袜一区| 欧美精品少妇一区二区三区| 韩国成人福利片在线播放| 国产精品久久久久天堂| 欧美人与性动xxxx| 久草精品在线观看| 亚洲欧美色图小说| 精品国产乱码久久久久久久久 | 中文字幕在线观看不卡| 欧美日韩黄色影视| 国产精品综合视频| 亚洲综合免费观看高清完整版在线 | 色婷婷精品大在线视频| 一区二区国产视频| 久久综合99re88久久爱| 欧美中文字幕亚洲一区二区va在线 | 欧美午夜精品免费| 国产成人免费在线视频| 亚洲成人777| 国产精品女同一区二区三区| 欧美一区二区三区四区久久| av在线播放不卡| 玖玖九九国产精品| 亚洲一区二区在线视频| 精品99一区二区三区| 欧美三级资源在线| 成人一区二区视频| 免费成人小视频| 夜夜嗨av一区二区三区中文字幕| 精品福利在线导航| 欧美日本一区二区| 色综合一个色综合亚洲| 国产成人在线视频免费播放| 亚洲国产成人tv| 亚洲免费视频中文字幕| 中文字幕精品—区二区四季| 日韩视频一区二区三区 | 成人免费毛片高清视频| 看电视剧不卡顿的网站| 日韩在线一区二区| 亚洲国产一区二区三区| 自拍偷拍亚洲激情| 亚洲国产精品精华液2区45| 日韩精品一区二区三区视频| 欧美日本韩国一区二区三区视频| 欧美优质美女网站| 欧美最猛黑人xxxxx猛交| 色综合久久综合| 99久久综合国产精品| 波多野结衣中文字幕一区二区三区| 精品一区二区三区免费视频| 精品一区二区三区免费视频| 精品一区二区日韩| 精品在线一区二区| 国产一区二区伦理| 丰满岳乱妇一区二区三区| 狠狠色伊人亚洲综合成人| 国产在线精品免费| 国产一区二区三区电影在线观看| 国产一区二区精品在线观看| 国产乱子伦一区二区三区国色天香| 久久精品噜噜噜成人88aⅴ| 蜜臀91精品一区二区三区| 老司机精品视频一区二区三区| 久久成人久久鬼色| 国产精品综合视频| 成人免费毛片片v| 91麻豆精品在线观看| 日韩免费看的电影| 欧美成人性战久久| 久久蜜桃av一区精品变态类天堂| 久久久综合精品| 国产精品免费av| 综合自拍亚洲综合图不卡区| 伊人性伊人情综合网| 午夜av一区二区| 久久电影国产免费久久电影| 精品一区二区三区影院在线午夜| 国产传媒欧美日韩成人| 99久精品国产| 欧美日韩在线三区| 欧美成人性战久久| 国产精品久久网站| 亚洲亚洲精品在线观看| 日本不卡一二三| 丁香桃色午夜亚洲一区二区三区 | 97se亚洲国产综合在线| 在线观看成人免费视频| 制服丝袜中文字幕亚洲| 久久综合给合久久狠狠狠97色69| 国产精品伦理一区二区| 亚洲午夜电影网| 精彩视频一区二区三区| caoporm超碰国产精品| 欧美喷潮久久久xxxxx| 久久久久久久久免费| 一区二区三区日韩精品视频| 日韩高清欧美激情| 成人黄动漫网站免费app| 8v天堂国产在线一区二区| 久久久久久久久久久电影| 一区二区三区在线不卡| 国模冰冰炮一区二区| 91国偷自产一区二区三区成为亚洲经典 | 免费看欧美美女黄的网站| 成人深夜在线观看| 777午夜精品免费视频| 欧美国产视频在线| 亚洲成人黄色影院| 成人av网址在线| 欧美大片一区二区| 一区二区三区加勒比av| 国产在线不卡一卡二卡三卡四卡| 欧美日韩黄视频| 综合婷婷亚洲小说| 国产精品一区二区无线| 91精品国产综合久久精品 | 欧美另类z0zxhd电影| 中文字幕欧美激情| 久久精品国产**网站演员| 欧美少妇bbb| 亚洲日本va午夜在线影院| 国产二区国产一区在线观看| 日韩精品一区二区三区中文精品| 亚洲欧美日韩国产中文在线| 国产91高潮流白浆在线麻豆| 亚洲乱码中文字幕综合| 国产精品伊人色| 日韩精品一区二区三区中文精品| 亚洲小说欧美激情另类| 色综合天天做天天爱| 中文字幕在线一区二区三区| 精品亚洲欧美一区| 日韩一区二区三区四区五区六区| 亚洲精品精品亚洲| 91亚洲国产成人精品一区二区三 | 国产精品丝袜在线| 国产精品自拍一区| www久久精品| 美女网站一区二区| 欧美一级在线免费| 奇米在线7777在线精品| 欧美日韩精品免费观看视频| 亚洲超丰满肉感bbw| 欧美在线不卡视频| 亚洲六月丁香色婷婷综合久久| 99国产欧美另类久久久精品| 日本一区二区电影| www.激情成人| 亚洲欧美日韩国产综合在线| 91麻豆成人久久精品二区三区| 国产精品久久久久影院亚瑟| 成人免费毛片嘿嘿连载视频| 国产精品丝袜黑色高跟| 不卡一卡二卡三乱码免费网站| 国产精品国产三级国产普通话三级 | 不卡电影免费在线播放一区| 日韩一区欧美一区| 91视频免费观看| 亚洲成在人线免费| 7777精品伊人久久久大香线蕉经典版下载 | 一二三四社区欧美黄| 欧美日韩午夜精品| 日韩精品国产欧美| 久久一区二区视频| 成人黄色免费短视频| 亚洲柠檬福利资源导航| 欧美美女一区二区| 国产一区二区三区免费观看 | 亚洲精品自拍动漫在线| 欧美三区在线视频| 精品一区二区综合| 亚洲欧洲精品天堂一级 | 蜜桃一区二区三区在线| 久久精品夜色噜噜亚洲aⅴ|