Lines Matching defs:u

144     upap_state *u = &upap[unit];
146 u->us_unit = unit;
147 u->us_user = NULL;
148 u->us_userlen = 0;
149 u->us_passwd = NULL;
150 u->us_clientstate = UPAPCS_INITIAL;
151 u->us_serverstate = UPAPSS_INITIAL;
152 u->us_id = 0;
153 u->us_timeouttime = UPAP_DEFTIMEOUT;
154 u->us_maxtransmits = 10;
155 u->us_reqtimeout = UPAP_DEFREQTIME;
156 u->us_maxreceives = 3;
157 u->us_msg = "";
158 u->us_msglen = 0;
172 upap_state *u = &upap[unit];
175 u->us_user = user;
176 u->us_userlen = strlen(user);
177 u->us_passwd = password;
178 u->us_transmits = 0;
181 if (u->us_clientstate == UPAPCS_INITIAL ||
182 u->us_clientstate == UPAPCS_PENDING) {
183 u->us_clientstate = UPAPCS_PENDING;
187 upap_sauthreq(u); /* Start protocol */
200 upap_state *u = &upap[unit];
203 if (u->us_serverstate == UPAPSS_INITIAL ||
204 u->us_serverstate == UPAPSS_PENDING) {
205 u->us_serverstate = UPAPSS_PENDING;
209 u->us_serverstate = UPAPSS_LISTEN;
210 u->us_receives = 0;
211 if (u->us_reqtimeout > 0)
212 TIMEOUT(upap_reqtimeout, u, u->us_reqtimeout);
223 upap_state *u = (upap_state *) arg;
225 if (u->us_clientstate != UPAPCS_AUTHREQ)
228 if (u->us_transmits >= u->us_maxtransmits) {
230 error("No response to %d PAP Authenticate-Requests", u->us_transmits);
231 u->us_clientstate = UPAPCS_BADAUTH;
232 auth_withpeer_fail(u->us_unit, PPP_PAP);
236 upap_sauthreq(u); /* Send Authenticate-Request */
247 upap_state *u = (upap_state *) arg;
249 if (u->us_serverstate != UPAPSS_LISTEN)
252 auth_peer_fail(u->us_unit, PPP_PAP);
253 u->us_serverstate = UPAPSS_BADAUTH;
266 upap_state *u = &upap[unit];
268 if (u->us_clientstate == UPAPCS_INITIAL)
269 u->us_clientstate = UPAPCS_CLOSED;
270 else if (u->us_clientstate == UPAPCS_PENDING) {
271 upap_sauthreq(u); /* send an auth-request */
274 if (u->us_serverstate == UPAPSS_INITIAL)
275 u->us_serverstate = UPAPSS_CLOSED;
276 else if (u->us_serverstate == UPAPSS_PENDING) {
277 u->us_serverstate = UPAPSS_LISTEN;
278 if (u->us_reqtimeout > 0)
279 TIMEOUT(upap_reqtimeout, u, u->us_reqtimeout);
293 upap_state *u = &upap[unit];
296 if (u->us_clientstate == UPAPCS_AUTHREQ && u->us_timeouttime > 0)
297 UNTIMEOUT(upap_timeout, u);
298 if (u->us_serverstate == UPAPSS_LISTEN && u->us_reqtimeout > 0)
299 UNTIMEOUT(upap_reqtimeout, u);
301 u->us_clientstate = UPAPCS_INITIAL;
302 u->us_serverstate = UPAPSS_INITIAL;
315 upap_state *u = &upap[unit];
317 if (u->us_clientstate == UPAPCS_AUTHREQ) {
321 if (u->us_serverstate == UPAPSS_LISTEN) {
338 upap_state *u = &upap[unit];
367 upap_rauthreq(u, inp, id, len);
371 upap_rauthack(u, inp, id, len);
375 upap_rauthnak(u, inp, id, len);
389 upap_rauthreq(u, inp, id, len)
390 upap_state *u;
401 if (u->us_serverstate < UPAPSS_LISTEN) {
403 pap_sstate(u->us_serverstate));
411 if (u->us_serverstate == UPAPSS_OPEN) {
413 upap_sresp(u, UPAP_AUTHACK, id, u->us_msg, u->us_msglen);
416 if (u->us_serverstate == UPAPSS_BADAUTH) {
418 upap_sresp(u, UPAP_AUTHNAK, id, u->us_msg, u->us_msglen);
447 retcode = check_passwd(u->us_unit, ruser, ruserlen, rpasswd,
454 u->us_msg = msg;
455 u->us_msglen = msglen;
456 upap_sresp(u, retcode, id, u->us_msg, u->us_msglen);
459 u->us_serverstate = UPAPSS_OPEN;
460 auth_peer_success(u->us_unit, PPP_PAP, ruser, ruserlen);
461 } else if (++u->us_receives >= u->us_maxreceives) {
462 u->us_serverstate = UPAPSS_BADAUTH;
463 auth_peer_fail(u->us_unit, PPP_PAP);
469 if (u->us_reqtimeout > 0)
470 UNTIMEOUT(upap_reqtimeout, u);
479 upap_rauthack(u, inp, id, len)
480 upap_state *u;
488 if (u->us_clientstate != UPAPCS_AUTHREQ) {
490 pap_cstate(u->us_clientstate));
494 if (id != u->us_id) {
496 id, u->us_id);
500 if (u->us_timeouttime > 0)
501 UNTIMEOUT(upap_timeout, u);
521 u->us_clientstate = UPAPCS_OPEN;
523 auth_withpeer_success(u->us_unit, PPP_PAP);
532 upap_rauthnak(u, inp, id, len)
533 upap_state *u;
541 if (u->us_clientstate != UPAPCS_AUTHREQ) {
543 pap_cstate(u->us_clientstate));
547 if (id != u->us_id) {
549 id, u->us_id);
553 if (u->us_timeouttime > 0)
554 UNTIMEOUT(upap_timeout, u);
576 if (u->us_transmits < u->us_maxtransmits) {
578 upap_sauthreq(u);
587 u->us_clientstate = UPAPCS_BADAUTH;
590 auth_withpeer_fail(u->us_unit, PPP_PAP);
598 upap_sauthreq(u)
599 upap_state *u;
608 outlen = UPAP_HEADERLEN + 2 * sizeof (u_char) + u->us_userlen + pwlen;
614 PUTCHAR(++u->us_id, outp);
616 PUTCHAR(u->us_userlen, outp);
617 BCOPY(u->us_user, outp, u->us_userlen);
618 INCPTR(u->us_userlen, outp);
620 BCOPY(u->us_passwd, outp, pwlen);
622 output(u->us_unit, outpacket_buf, outlen + PPP_HDRLEN);
624 if (u->us_timeouttime > 0)
625 TIMEOUT(upap_timeout, u, u->us_timeouttime);
626 ++u->us_transmits;
627 u->us_clientstate = UPAPCS_AUTHREQ;
635 upap_sresp(u, code, id, msg, msglen)
636 upap_state *u;
653 output(u->us_unit, outpacket_buf, outlen + PPP_HDRLEN);