--- src/openvpn/init.c | 4 ++-- src/openvpn/manage.c | 5 +---- src/openvpn/misc.c | 9 ++++----- src/openvpn/misc.h | 2 +- src/openvpn/options.c | 2 -- src/openvpn/options.h | 2 +- src/openvpn/push.c | 5 ++--- src/openvpn/ssl.c | 8 ++++---- src/openvpn/ssl.h | 2 +- src/openvpn/ssl_common.h | 2 +- src/openvpn/syshead.h | 7 ------- 11 files changed, 17 insertions(+), 31 deletions(-)
diff --git a/src/openvpn/init.c b/src/openvpn/init.c index 7dfc4aa..b9a9075 100644 --- a/src/openvpn/init.c +++ b/src/openvpn/init.c @@ -421,7 +421,7 @@ init_query_passwords (const struct context *c) /* Auth user/pass input */ if (c->options.auth_user_pass_file) { -#ifdef ENABLE_CLIENT_CR +#ifdef ENABLE_MANAGEMENT auth_user_pass_setup (c->options.auth_user_pass_file, &c->options.sc_info); #else auth_user_pass_setup (c->options.auth_user_pass_file, NULL); @@ -2305,7 +2305,7 @@ do_init_crypto_tls (struct context *c, const unsigned int flags) #endif #if P2MP -#ifdef ENABLE_CLIENT_CR +#ifdef ENABLE_MANAGEMENT to.sci = &options->sc_info; #endif #endif diff --git a/src/openvpn/manage.c b/src/openvpn/manage.c index dcb1bc1..891a498 100644 --- a/src/openvpn/manage.c +++ b/src/openvpn/manage.c @@ -3056,9 +3056,8 @@ management_query_user_pass (struct management *man, const char *alert_type = NULL; const char *prefix = NULL; unsigned int up_query_mode = 0; -#ifdef ENABLE_CLIENT_CR const char *sc = NULL; -#endif + ret = true; man->persist.standalone_disabled = false; /* This is so M_CLIENT messages will be correctly passed through msg() */ man->persist.special_state_msg = NULL; @@ -3088,10 +3087,8 @@ management_query_user_pass (struct management *man, up_query_mode = UP_QUERY_USER_PASS; prefix = "PASSWORD"; alert_type = "username/password"; -#ifdef ENABLE_CLIENT_CR if (static_challenge) sc = static_challenge; -#endif } buf_printf (&alert_msg, ">%s:Need '%s' %s", prefix, diff --git a/src/openvpn/misc.c b/src/openvpn/misc.c index 5713d2e..52ef81a 100644 --- a/src/openvpn/misc.c +++ b/src/openvpn/misc.c @@ -1055,10 +1055,9 @@ get_user_pass_cr (struct user_pass *up, if (flags & GET_USER_PASS_PREVIOUS_CREDS_FAILED) management_auth_failure (management, prefix, "previous auth credentials failed"); -#ifdef ENABLE_CLIENT_CR if (auth_challenge && (flags & GET_USER_PASS_STATIC_CHALLENGE)) sc = auth_challenge; -#endif + if (!management_query_user_pass (management, up, prefix, flags, sc)) { if ((flags & GET_USER_PASS_NOFATAL) != 0) @@ -1143,7 +1142,7 @@ get_user_pass_cr (struct user_pass *up, { msg(M_FATAL, "neither stdin nor stderr are a tty device, can't ask for %s password. If you used --daemon, you need to use --askpass to make passphrase-protected keys work, and you can not use --auth-nocache.", prefix ); } #endif -#ifdef ENABLE_CLIENT_CR +#ifdef ENABLE_MANAGEMENT if (auth_challenge && (flags & GET_USER_PASS_DYNAMIC_CHALLENGE)) { struct auth_challenge_info *ac = get_auth_challenge (auth_challenge, &gc); @@ -1184,7 +1183,7 @@ get_user_pass_cr (struct user_pass *up, if (password_from_stdin && !get_console_input (BSTR (&pass_prompt), false, up->password, USER_PASS_LEN)) msg (M_FATAL, "ERROR: could not not read %s password from stdin", prefix); -#ifdef ENABLE_CLIENT_CR +#ifdef ENABLE_MANAGEMENT if (auth_challenge && (flags & GET_USER_PASS_STATIC_CHALLENGE)) { char *response = (char *) gc_malloc (USER_PASS_LEN, false, &gc); @@ -1223,7 +1222,7 @@ get_user_pass_cr (struct user_pass *up, return true; } -#ifdef ENABLE_CLIENT_CR +#ifdef ENABLE_MANAGEMENT /* * See management/management-notes.txt for more info on the diff --git a/src/openvpn/misc.h b/src/openvpn/misc.h index dbe899e..5b853fa 100644 --- a/src/openvpn/misc.h +++ b/src/openvpn/misc.h @@ -207,7 +207,7 @@ struct user_pass char password[USER_PASS_LEN]; }; -#ifdef ENABLE_CLIENT_CR +#ifdef ENABLE_MANAGEMENT /* * Challenge response info on client as pushed by server. */ diff --git a/src/openvpn/options.c b/src/openvpn/options.c index 9481610..4347525 100644 --- a/src/openvpn/options.c +++ b/src/openvpn/options.c @@ -5960,7 +5960,6 @@ add_option (struct options *options, VERIFY_PERMISSION (OPT_P_GENERAL); auth_retry_set (msglevel, p[1]); } -#ifdef ENABLE_CLIENT_CR else if (streq (p[0], "static-challenge") && p[1] && p[2] && !p[3]) { VERIFY_PERMISSION (OPT_P_GENERAL); @@ -5969,7 +5968,6 @@ add_option (struct options *options, options->sc_info.flags |= SC_ECHO; } #endif -#endif #ifdef WIN32 else if (streq (p[0], "win-sys") && p[1] && !p[2]) { diff --git a/src/openvpn/options.h b/src/openvpn/options.h index 30b995d..7e2d9f3 100644 --- a/src/openvpn/options.h +++ b/src/openvpn/options.h @@ -458,7 +458,7 @@ struct options int scheduled_exit_interval; -#ifdef ENABLE_CLIENT_CR +#ifdef ENABLE_MANAGEMENT struct static_challenge_info sc_info; #endif #endif diff --git a/src/openvpn/push.c b/src/openvpn/push.c index d4f3cb6..a691984 100644 --- a/src/openvpn/push.c +++ b/src/openvpn/push.c @@ -76,10 +76,9 @@ receive_auth_failed (struct context *c, const struct buffer *buffer) if (buf_string_compare_advance (&buf, "AUTH_FAILED,") && BLEN (&buf)) reason = BSTR (&buf); management_auth_failure (management, UP_TYPE_AUTH, reason); - } else -#endif + } + else { -#ifdef ENABLE_CLIENT_CR struct buffer buf = *buffer; if (buf_string_match_head_str (&buf, "AUTH_FAILED,CRV1:") && BLEN (&buf)) { diff --git a/src/openvpn/ssl.c b/src/openvpn/ssl.c index 887bd75..b6ca098 100644 --- a/src/openvpn/ssl.c +++ b/src/openvpn/ssl.c @@ -357,7 +357,7 @@ pem_password_callback (char *buf, int size, int rwflag, void *u) static bool auth_user_pass_enabled; /* GLOBAL */ static struct user_pass auth_user_pass; /* GLOBAL */ -#ifdef ENABLE_CLIENT_CR +#ifdef ENABLE_MANAGEMENT static char *auth_challenge; /* GLOBAL */ #endif @@ -370,7 +370,7 @@ auth_user_pass_setup (const char *auth_file, const struct static_challenge_info #if AUTO_USERID get_user_pass_auto_userid (&auth_user_pass, auth_file); #else -# ifdef ENABLE_CLIENT_CR +#ifdef ENABLE_MANAGEMENT if (auth_challenge) /* dynamic challenge/response */ get_user_pass_cr (&auth_user_pass, auth_file, @@ -428,12 +428,12 @@ ssl_purge_auth (const bool auth_user_pass_only) purge_user_pass (&passbuf, true); } purge_user_pass (&auth_user_pass, true); -#ifdef ENABLE_CLIENT_CR +#ifdef ENABLE_MANAGEMENT ssl_purge_auth_challenge(); #endif } -#ifdef ENABLE_CLIENT_CR +#ifdef ENABLE_MANAGEMENT void ssl_purge_auth_challenge (void) diff --git a/src/openvpn/ssl.h b/src/openvpn/ssl.h index 797c3e5..1bea04c 100644 --- a/src/openvpn/ssl.h +++ b/src/openvpn/ssl.h @@ -404,7 +404,7 @@ void ssl_purge_auth (const bool auth_user_pass_only); void ssl_set_auth_token (const char *token); -#ifdef ENABLE_CLIENT_CR +#ifdef ENABLE_MANAGEMENT /* * ssl_get_auth_challenge will parse the server-pushed auth-failed * reason string and return a dynamically allocated diff --git a/src/openvpn/ssl_common.h b/src/openvpn/ssl_common.h index e2b0ebf..b74f32a 100644 --- a/src/openvpn/ssl_common.h +++ b/src/openvpn/ssl_common.h @@ -312,7 +312,7 @@ struct tls_options const struct x509_track *x509_track; #endif -#ifdef ENABLE_CLIENT_CR +#ifdef ENABLE_MANAGEMENT const struct static_challenge_info *sci; #endif diff --git a/src/openvpn/syshead.h b/src/openvpn/syshead.h index 7e77b6c..9e1bd05 100644 --- a/src/openvpn/syshead.h +++ b/src/openvpn/syshead.h @@ -694,13 +694,6 @@ socket_defined (const socket_descriptor_t sd) #endif /* - * Do we support challenge/response authentication as client? - */ -#if defined(ENABLE_MANAGEMENT) -#define ENABLE_CLIENT_CR -#endif - -/* * Do we support pushing peer info? */ #if defined(ENABLE_CRYPTO) -- 2.5.4 (Apple Git-61)