|
@@ -929,7 +929,7 @@ char *HTTP_HistoryPage(uint32_t reqNum, char *bufIn, char *bufOut, uint16_t lenB
|
|
|
(void)lenBufIn;
|
|
|
(void)reqNum;
|
|
|
|
|
|
- memset(bufOut, 0, FILE_BUF_MAX_LEN);
|
|
|
+ memset(bufOut, 0, SEND_BUF_MAX_LEN);
|
|
|
|
|
|
ClearParamString(bufIn);
|
|
|
|
|
@@ -984,7 +984,7 @@ char *HTTP_UpsHistoryPage(uint32_t reqNum, char *bufIn, char *bufOut, uint16_t l
|
|
|
(void)lenBufIn;
|
|
|
(void)reqNum;
|
|
|
|
|
|
- memset(bufOut, 0, FILE_BUF_MAX_LEN);
|
|
|
+ memset(bufOut, 0, SEND_BUF_MAX_LEN);
|
|
|
|
|
|
ClearParamString(bufIn);
|
|
|
|
|
@@ -2086,15 +2086,13 @@ static void getAuthenticatedState(void)
|
|
|
}
|
|
|
}
|
|
|
|
|
|
-int test = 0;
|
|
|
-
|
|
|
char *HTTP_LoginPage(uint32_t reqNum, char *bufIn, char *bufOut, uint16_t lenBufIn, uint16_t *lenBufOut)
|
|
|
{
|
|
|
(void)reqNum;
|
|
|
uint32_t req_data_received = 0;
|
|
|
char *offset = 0;
|
|
|
|
|
|
- printf("!!!!!!: %d\r\n", test++);
|
|
|
+ memset(bufOut, 0, SEND_BUF_MAX_LEN);
|
|
|
|
|
|
|
|
|
post_data_count = Parse_Content_Length(bufIn, lenBufIn);
|
|
@@ -2123,19 +2121,9 @@ char *HTTP_LoginPage(uint32_t reqNum, char *bufIn, char *bufOut, uint16_t lenBuf
|
|
|
|
|
|
|
|
|
post_data_count = 0;
|
|
|
- if (HTTP_ConfirmWebPwd(post_req_data, bufOut, strlen(post_req_data), lenBufOut) == SEND_REQUIRED_YES) {
|
|
|
- *lenBufOut = strlen(bufOut);
|
|
|
- return bufOut;
|
|
|
- } else {
|
|
|
-
|
|
|
- if ((sSettings.sRADIUS.RDSEnable == true) && (fl_raddius_net_err == false)) {
|
|
|
- fs_open("/rslogin.html", &file);
|
|
|
- } else {
|
|
|
- fs_open("/login.html", &file);
|
|
|
- }
|
|
|
- *lenBufOut = file.len;
|
|
|
- return file.data;
|
|
|
- }
|
|
|
+ HTTP_ConfirmWebPwd(post_req_data, bufOut, strlen(post_req_data), lenBufOut);
|
|
|
+ *lenBufOut = strlen(bufOut);
|
|
|
+ return bufOut;
|
|
|
}
|
|
|
}
|
|
|
|