}
break;
+#ifdef WITH_ACCOUNTING
case PW_ACCOUNTING_RESPONSE:
rad_snmp.acct.total_responses++;
if (request->client && request->client->acct) {
request->client->acct->responses++;
}
break;
+#endif
/*
* No response, it must have been a bad
"Message-Authenticator", "0x00", T_OP_SET);
} else {
+#ifdef WITH_ACCOUNTING
request->proxy->code = PW_ACCOUNTING_REQUEST;
radius_pairmake(request, &request->proxy->vps,
vp = radius_pairmake(request, &request->proxy->vps,
"Event-Timestamp", "0", T_OP_SET);
vp->vp_date = now.tv_sec;
+#else
+ rad_assert("Internal sanity check failed");
+#endif
}
radius_pairmake(request, &request->proxy->vps,
if (request->proxy->code == PW_AUTHENTICATION_REQUEST) {
fun = rad_authenticate;
+#ifdef WITH_ACCOUNTING
} else if (request->proxy->code == PW_ACCOUNTING_REQUEST) {
fun = rad_accounting;
+#endif
} else {
DEBUG2("Unknown packet type %d", request->proxy->code);
if (request->packet->code == PW_AUTHENTICATION_REQUEST) {
pool = realm->auth_pool;
+#ifdef WITH_ACCOUNTING
} else if (request->packet->code == PW_ACCOUNTING_REQUEST) {
pool = realm->acct_pool;
+#endif
} else {
rad_panic("Internal sanity check failed");