- Drop sendccp. If client sends a CCP request for compression just NAK it.

- Don't copy the old buffer into Config{Nak,Rej} LCP responses (oops);
  add length checks when appending.
- Have makeppp print a backtrace on overflow.
This commit is contained in:
Brendan O'Dea 2004-11-25 02:45:27 +00:00
parent 236ca962a7
commit 0753f6fc9f
6 changed files with 106 additions and 144 deletions

View file

@ -1,6 +1,6 @@
// L2TPNS Radius Stuff
char const *cvs_id_radius = "$Id: radius.c,v 1.12 2004-11-16 07:54:32 bodea Exp $";
char const *cvs_id_radius = "$Id: radius.c,v 1.13 2004-11-25 02:45:27 bodea Exp $";
#include <time.h>
#include <stdio.h>
@ -426,9 +426,8 @@ void processrad(u8 *buf, int len, char socket_index)
{
// CHAP
u8 *p = makeppp(b, sizeof(b), 0, 0, t, s, PPPCHAP);
if (!p) {
return; // Abort!
}
if (!p) return; // Abort!
{
struct param_post_auth packet = { &tunnel[t], &session[s], session[s].user, (*buf == 2), PPPCHAP };
run_plugins(PLUGIN_POST_AUTH, &packet);
@ -446,8 +445,7 @@ void processrad(u8 *buf, int len, char socket_index)
{
// PAP
u8 *p = makeppp(b, sizeof(b), 0, 0, t, s, PPPPAP);
if (!p)
return; // Abort!
if (!p) return; // Abort!
{
struct param_post_auth packet = { &tunnel[t], &session[s], session[s].user, (*buf == 2), PPPPAP };