return SIG_ERR;
return oact.sa_handler;
#else
-
+
/*
* re-set by calling the 'signal' function, which
* may cause infinite recursion and core dumps due to
*/
struct request_data_t {
request_data_t *next;
-
+
void *unique_ptr;
int unique_int;
void *opaque;
* blow up!
*/
rad_assert(request->child_pid == NO_SUCH_CHILD_PID);
-
- if (request->packet)
+
+ if (request->packet)
rad_free(&request->packet);
- if (request->proxy)
+ if (request->proxy)
rad_free(&request->proxy);
- if (request->reply)
+ if (request->reply)
rad_free(&request->reply);
- if (request->proxy_reply)
+ if (request->proxy_reply)
rad_free(&request->proxy_reply);
- if (request->config_items)
+ if (request->config_items)
pairfree(&request->config_items);
request->username = NULL;
void *rad_malloc(size_t size)
{
void *ptr = malloc(size);
-
+
if (ptr == NULL) {
radlog(L_ERR|L_CONS, "no memory");
exit(1);
vps = packet->vps;
packet->vps = NULL;
break;
-
+
/*
* Accounting responses can only contain
* Proxy-State and VSA's. Note that we do NOT
if (request->options & RAD_REQUEST_OPTION_REJECTED) {
return;
}
-
+
DEBUG2("Server rejecting request %d.", request->number);
switch (request->packet->code) {
/*
* reject message sent.
*/
case PW_AUTHENTICATION_REQUEST:
- request->reply->code = PW_AUTHENTICATION_REJECT;
+ request->reply->code = PW_AUTHENTICATION_REJECT;
/*
* Perform RFC limitations on outgoing replies.
pairadd(&(request->reply->vps), vps);
break;
}
-
+
/*
* If a reply exists, send it.
*/