#include <ctype.h>
#include <errno.h>
-#ifdef LIBSTOKEN_HDR
-#include LIBSTOKEN_HDR
+#ifdef HAVE_LIBSTOKEN
+#include <stoken.h>
#endif
-#ifdef LIBOATH_HDR
-#include LIBOATH_HDR
+#ifdef HAVE_LIBOATH
+#include <liboath/oath.h>
#endif
#include <libxml/parser.h>
}
-#ifdef LIBSTOKEN_HDR
+#ifdef HAVE_LIBSTOKEN
static void nuke_opt_values(struct oc_form_opt *opt)
{
for (; opt; opt = opt->next) {
*/
int prepare_stoken(struct openconnect_info *vpninfo)
{
-#ifdef LIBSTOKEN_HDR
+#ifdef HAVE_LIBSTOKEN
struct oc_auth_form form;
struct oc_form_opt opts[3], *opt = opts;
char **devid = NULL, **pass = NULL, **pin = NULL;
struct oc_auth_form *form,
struct oc_form_opt *opt)
{
-#ifdef LIBSTOKEN_HDR
+#ifdef HAVE_LIBSTOKEN
if ((strcmp(opt->name, "password") && strcmp(opt->name, "answer")) ||
vpninfo->token_bypassed)
return -EINVAL;
struct oc_auth_form *form,
struct oc_form_opt *opt)
{
-#if defined(LIBOATH_HDR)
+#ifdef HAVE_LIBOATH
if ((strcmp(opt->name, "secondary_password") != 0) ||
vpninfo->token_bypassed)
return -EINVAL;
struct oc_auth_form *form,
struct oc_form_opt *opt)
{
-#ifdef LIBSTOKEN_HDR
+#ifdef HAVE_LIBSTOKEN
char tokencode[STOKEN_MAX_TOKENCODE + 1];
if (!vpninfo->token_time)
struct oc_auth_form *form,
struct oc_form_opt *opt)
{
-#if defined(LIBOATH_HDR)
+#ifdef HAVE_LIBOATH
int oath_err;
char tokencode[7];
AS_IF([test "x$with_stoken" != "xno"], [
PKG_CHECK_MODULES(LIBSTOKEN, stoken,
[AC_SUBST(LIBSTOKEN_PC, stoken)
- AC_DEFINE([LIBSTOKEN_HDR], ["stoken.h"])
+ AC_DEFINE([HAVE_LIBSTOKEN], 1)
libstoken_pkg=yes],
libstoken_pkg=no)
], [libstoken_pkg=disabled])
AS_IF([test "x$with_liboath" != "xno"], [
PKG_CHECK_MODULES(LIBOATH, liboath,
[AC_SUBST(LIBOATH_PC, liboath)
- AC_DEFINE([LIBOATH_HDR], ["liboath/oath.h"])
+ AC_DEFINE([HAVE_LIBOATH], 1)
liboath_pkg=yes],
liboath_pkg=no)
])
#include <errno.h>
#include <stdlib.h>
-#ifdef LIBSTOKEN_HDR
-#include LIBSTOKEN_HDR
+#ifdef HAVE_LIBSTOKEN
+#include <stoken.h>
#endif
-#ifdef LIBOATH_HDR
-#include LIBOATH_HDR
+#ifdef HAVE_LIBOATH
+#include <liboath/oath.h>
#endif
#include <libxml/tree.h>
vpninfo->peer_cert = NULL;
}
free(vpninfo->useragent);
-#ifdef LIBSTOKEN_HDR
+#ifdef HAVE_LIBSTOKEN
if (vpninfo->stoken_pin)
free(vpninfo->stoken_pin);
if (vpninfo->stoken_ctx)
stoken_destroy(vpninfo->stoken_ctx);
#endif
-#ifdef LIBOATH_HDR
+#ifdef HAVE_LIBOATH
if (vpninfo->oath_secret)
oath_done();
#endif
int openconnect_has_stoken_support(void)
{
-#ifdef LIBSTOKEN_HDR
+#ifdef HAVE_LIBSTOKEN
return 1;
#else
return 0;
int openconnect_has_oath_support(void)
{
-#ifdef LIBOATH_HDR
+#ifdef HAVE_LIBOATH
return 1;
#else
return 0;
static int set_libstoken_mode(struct openconnect_info *vpninfo,
const char *token_str)
{
-#ifdef LIBSTOKEN_HDR
+#ifdef HAVE_LIBSTOKEN
int ret;
if (!vpninfo->stoken_ctx) {
static int set_oath_mode(struct openconnect_info *vpninfo,
const char *token_str)
{
-#ifdef LIBOATH_HDR
+#ifdef HAVE_LIBOATH
int ret;
ret = oath_init();
printf(" --token-mode=MODE %s\n", _("Software token type: stoken (default) or totp"));
printf(" --token-secret[=STRING] %s\n", _("Software token secret (can be empty for stoken mode"));
printf(" %s\n", _(" to read from ~/.stokenrc)"));
-#ifndef LIBSTOKEN_HDR
+#ifndef HAVE_LIBSTOKEN
printf(" %s\n", _("(NOTE: libstoken (RSA SecurID) disabled in this build)"));
#endif
-#ifndef LIBOATH_HDR
+#ifndef HAVE_LIBOATH
printf(" %s\n", _("(NOTE: liboath (TOTP) disabled in this build)"));
#endif
printf(" --reconnect-timeout %s\n", _("Connection retry timeout in seconds"));
#include LIBPROXY_HDR
#endif
-#ifdef LIBSTOKEN_HDR
-#include LIBSTOKEN_HDR
+#ifdef HAVE_LIBSTOKEN
+#include <stoken.h>
#endif
#ifdef ENABLE_NLS
int token_bypassed;
int token_tries;
time_t token_time;
-#ifdef LIBSTOKEN_HDR
+#ifdef HAVE_LIBSTOKEN
struct stoken_ctx *stoken_ctx;
char *stoken_pin;
#endif
-#ifdef LIBOATH_HDR
+#ifdef HAVE_LIBOATH
char *oath_secret;
size_t oath_secret_len;
#endif