Lines Matching refs:u

138   upap_state *u = &upap[unit];
141 u->us_unit = unit;
142 u->us_user = NULL;
143 u->us_userlen = 0;
144 u->us_passwd = NULL;
145 u->us_passwdlen = 0;
146 u->us_clientstate = UPAPCS_INITIAL;
147 u->us_serverstate = UPAPSS_INITIAL;
148 u->us_id = 0;
149 u->us_timeouttime = UPAP_DEFTIMEOUT;
150 u->us_maxtransmits = 10;
151 u->us_reqtimeout = UPAP_DEFREQTIME;
162 upap_state *u = &upap[unit];
165 unit, user, password, u->us_clientstate));
168 u->us_user = user;
169 u->us_userlen = (int)strlen(user);
170 u->us_passwd = password;
171 u->us_passwdlen = (int)strlen(password);
173 u->us_transmits = 0;
176 if (u->us_clientstate == UPAPCS_INITIAL ||
177 u->us_clientstate == UPAPCS_PENDING) {
178 u->us_clientstate = UPAPCS_PENDING;
182 upap_sauthreq(u); /* Start protocol */
194 upap_state *u = &upap[unit];
197 if (u->us_serverstate == UPAPSS_INITIAL ||
198 u->us_serverstate == UPAPSS_PENDING) {
199 u->us_serverstate = UPAPSS_PENDING;
203 u->us_serverstate = UPAPSS_LISTEN;
204 if (u->us_reqtimeout > 0) {
205 TIMEOUT(upap_reqtimeout, u, u->us_reqtimeout);
215 upap_state *u = (upap_state *) arg;
218 u->us_unit, u->us_timeouttime, u->us_clientstate));
220 if (u->us_clientstate != UPAPCS_AUTHREQ) {
225 if (u->us_transmits >= u->us_maxtransmits) {
228 u->us_clientstate = UPAPCS_BADAUTH;
229 auth_withpeer_fail(u->us_unit, PPP_PAP);
233 upap_sauthreq(u); /* Send Authenticate-Request and set upap timeout*/
243 upap_state *u = (upap_state *) arg;
245 if (u->us_serverstate != UPAPSS_LISTEN) {
249 auth_peer_fail(u->us_unit, PPP_PAP);
250 u->us_serverstate = UPAPSS_BADAUTH;
262 upap_state *u = &upap[unit];
264 UPAPDEBUG(LOG_INFO, ("upap_lowerup: init %d clientstate s=%d\n", unit, u->us_clientstate));
266 if (u->us_clientstate == UPAPCS_INITIAL) {
267 u->us_clientstate = UPAPCS_CLOSED;
268 } else if (u->us_clientstate == UPAPCS_PENDING) {
269 upap_sauthreq(u); /* send an auth-request */
273 if (u->us_serverstate == UPAPSS_INITIAL) {
274 u->us_serverstate = UPAPSS_CLOSED;
275 } else if (u->us_serverstate == UPAPSS_PENDING) {
276 u->us_serverstate = UPAPSS_LISTEN;
277 if (u->us_reqtimeout > 0) {
278 TIMEOUT(upap_reqtimeout, u, u->us_reqtimeout);
292 upap_state *u = &upap[unit];
294 UPAPDEBUG(LOG_INFO, ("upap_lowerdown: %d s=%d\n", unit, u->us_clientstate));
296 if (u->us_clientstate == UPAPCS_AUTHREQ) { /* Timeout pending? */
297 UNTIMEOUT(upap_timeout, u); /* Cancel timeout */
299 if (u->us_serverstate == UPAPSS_LISTEN && u->us_reqtimeout > 0) {
300 UNTIMEOUT(upap_reqtimeout, u);
303 u->us_clientstate = UPAPCS_INITIAL;
304 u->us_serverstate = UPAPSS_INITIAL;
316 upap_state *u = &upap[unit];
318 if (u->us_clientstate == UPAPCS_AUTHREQ) {
322 if (u->us_serverstate == UPAPSS_LISTEN) {
336 upap_state *u = &upap[unit];
368 upap_rauthreq(u, inp, id, len);
372 upap_rauthack(u, inp, id, len);
376 upap_rauthnak(u, inp, id, len);
390 upap_rauthreq(upap_state *u, u_char *inp, u_char id, int len)
400 if (u->us_serverstate < UPAPSS_LISTEN) {
408 if (u->us_serverstate == UPAPSS_OPEN) {
409 upap_sresp(u, UPAP_AUTHACK, id, "", 0); /* return auth-ack */
412 if (u->us_serverstate == UPAPSS_BADAUTH) {
413 upap_sresp(u, UPAP_AUTHNAK, id, "", 0); /* return auth-nak */
442 retcode = check_passwd(u->us_unit, ruser, ruserlen, rpasswd, rpasswdlen, &msg, &msglen);
446 upap_sresp(u, retcode, id, msg, msglen);
449 u->us_serverstate = UPAPSS_OPEN;
450 auth_peer_success(u->us_unit, PPP_PAP, ruser, ruserlen);
452 u->us_serverstate = UPAPSS_BADAUTH;
453 auth_peer_fail(u->us_unit, PPP_PAP);
456 if (u->us_reqtimeout > 0) {
457 UNTIMEOUT(upap_reqtimeout, u);
466 upap_rauthack(upap_state *u, u_char *inp, int id, int len)
473 UPAPDEBUG(LOG_INFO, ("pap_rauthack: Rcvd id %d s=%d\n", id, u->us_clientstate));
475 if (u->us_clientstate != UPAPCS_AUTHREQ) { /* XXX */
497 UNTIMEOUT(upap_timeout, u); /* Cancel timeout */
498 u->us_clientstate = UPAPCS_OPEN;
500 auth_withpeer_success(u->us_unit, PPP_PAP);
508 upap_rauthnak(upap_state *u, u_char *inp, int id, int len)
515 UPAPDEBUG(LOG_INFO, ("pap_rauthnak: Rcvd id %d s=%d\n", id, u->us_clientstate));
517 if (u->us_clientstate != UPAPCS_AUTHREQ) { /* XXX */
539 u->us_clientstate = UPAPCS_BADAUTH;
542 auth_withpeer_fail(u->us_unit, PPP_PAP);
550 upap_sauthreq(upap_state *u)
556 + u->us_userlen + u->us_passwdlen;
557 outp = outpacket_buf[u->us_unit];
562 PUTCHAR(++u->us_id, outp);
564 PUTCHAR(u->us_userlen, outp);
565 BCOPY(u->us_user, outp, u->us_userlen);
566 INCPTR(u->us_userlen, outp);
567 PUTCHAR(u->us_passwdlen, outp);
568 BCOPY(u->us_passwd, outp, u->us_passwdlen);
570 pppWrite(u->us_unit, outpacket_buf[u->us_unit], outlen + PPP_HDRLEN);
572 UPAPDEBUG(LOG_INFO, ("pap_sauth: Sent id %d\n", u->us_id));
574 TIMEOUT(upap_timeout, u, u->us_timeouttime);
575 ++u->us_transmits;
576 u->us_clientstate = UPAPCS_AUTHREQ;
584 upap_sresp(upap_state *u, u_char code, u_char id, char *msg, int msglen)
590 outp = outpacket_buf[u->us_unit];
598 pppWrite(u->us_unit, outpacket_buf[u->us_unit], outlen + PPP_HDRLEN);
600 UPAPDEBUG(LOG_INFO, ("pap_sresp: Sent code %d, id %d s=%d\n", code, id, u->us_clientstate));