X-Git-Url: https://git.ozlabs.org/?a=blobdiff_plain;f=pppd%2Fauth.c;h=5c1fbf1f52c92167479069dab68013e738b3b9f9;hb=49464ac3690f1a89de335d99b64c7e846ca6fcd1;hp=c924d7be35bfaf72105a4d8ce288f19a4808a3ff;hpb=bfa20ccde2a70b1252dbb614132f1a4cbee815d4;p=ppp.git diff --git a/pppd/auth.c b/pppd/auth.c index c924d7b..5c1fbf1 100644 --- a/pppd/auth.c +++ b/pppd/auth.c @@ -33,7 +33,7 @@ */ #ifndef lint -static char rcsid[] = "$Id: auth.c,v 1.39 1998/11/07 06:59:25 paulus Exp $"; +static char rcsid[] = "$Id: auth.c,v 1.41 1999/02/26 10:38:50 paulus Exp $"; #endif #include @@ -154,10 +154,7 @@ static int scan_authfile __P((FILE *, char *, char *, u_int32_t, char *, static void free_wordlist __P((struct wordlist *)); static void auth_script __P((char *)); static void set_allowed_addrs __P((int, struct wordlist *)); - -#ifdef OLD_OPTIONS static int setupapfile __P((char **)); -#endif /* * Authentication-related options. @@ -170,7 +167,7 @@ option_t auth_options[] = { { "refuse-pap", o_bool, &refuse_pap, "Don't agree to auth to peer with PAP", 1 }, { "-pap", o_bool, &refuse_pap, - "Don't allow UPAP authentication with peer", 1 }, + "Don't allow PAP authentication with peer", 1 }, { "require-chap", o_bool, &lcp_wantoptions[0].neg_chap, "Require CHAP authentication from peer", 1, &auth_required }, { "+chap", o_bool, &lcp_wantoptions[0].neg_chap, @@ -196,14 +193,11 @@ option_t auth_options[] = { "Use system password database for PAP", 1 }, { "papcrypt", o_bool, &cryptpap, "PAP passwords are encrypted", 1 }, -#if OLD_OPTIONS { "+ua", o_special, setupapfile, "Get PAP user and password from file" }, -#endif { NULL } }; -#if OLD_OPTIONS /* * setupapfile - specifies UPAP info for authenticating with peer. */ @@ -245,7 +239,6 @@ setupapfile(argv) return (1); } -#endif /* @@ -660,10 +653,6 @@ auth_check_options() * set by root. */ if (allow_any_ip) { - if (!default_device && devnam_info.priv == 0) { - option_error("can't override device name when noauth option used"); - exit(1); - } if ((connector != NULL && connector_info.priv == 0) || (disconnector != NULL && disconnector_info.priv == 0) || (welcomer != NULL && welcomer_info.priv == 0)) { @@ -1537,6 +1526,8 @@ scan_authfile(f, client, server, ipaddr, secret, addrs, filename) /* * Check if the given IP address is allowed by the wordlist. + * XXX accepts this entry even if it has no allowed IP addresses + * if they didn't specify a remote IP address. XXX */ if (ipaddr != 0 && !ip_addr_check(ipaddr, alist)) { free_wordlist(alist);