The FreeRADIUS server $Id: 15bac2a4c627c01d1aa2047687b3418955ac7f00 $
Loading...
Searching...
No Matches
map.c
Go to the documentation of this file.
1/*
2 * This program is is free software; you can redistribute it and/or modify
3 * it under the terms of the GNU General Public License as published by
4 * the Free Software Foundation; either version 2 of the License, or (at
5 * your option) any later version.
6 *
7 * This program is distributed in the hope that it will be useful,
8 * but WITHOUT ANY WARRANTY; without even the implied warranty of
9 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
10 * GNU General Public License for more details.
11 *
12 * You should have received a copy of the GNU General Public License
13 * along with this program; if not, write to the Free Software
14 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
15 */
16
17/**
18 * $Id: 7c2fb9d628db5f5566e2819d8cbff50fb6d7b3a3 $
19 * @file src/lib/ldap/map.c
20 * @brief Functions for mapping between LDAP and FreeRADIUS attributes.
21 *
22 * @author Arran Cudbard-Bell (a.cudbardb@freeradius.org)
23 * @copyright 2013 Network RADIUS SAS (legal@networkradius.com)
24 * @copyright 2013 The FreeRADIUS Server Project.
25 */
26RCSID("$Id: 7c2fb9d628db5f5566e2819d8cbff50fb6d7b3a3 $")
27
29
30#include <freeradius-devel/util/debug.h>
31#include <freeradius-devel/ldap/base.h>
32
33/** Callback for map_to_request
34 *
35 * Performs exactly the same job as map_to_vp, but pulls attribute values from LDAP entries
36 *
37 * @see map_to_vp
38 */
39int fr_ldap_map_getvalue(TALLOC_CTX *ctx, fr_pair_list_t *out, request_t *request, map_t const *map, void *uctx)
40{
41 fr_ldap_result_t *self = uctx;
43 fr_pair_list_t tmp_list;
45 int i;
46
48 fr_pair_list_init(&tmp_list);
49
50 fr_assert(map->lhs->type == TMPL_TYPE_ATTR);
51
52 /*
53 * This is a mapping in the form of:
54 * <list>. += <ldap attr>
55 *
56 * Where <ldap attr> is:
57 * <list>.<attr> <op> <value>
58 *
59 * It is to allow for legacy installations which stored
60 * RADIUS control and reply attributes in separate LDAP
61 * attributes.
62 */
63 if (tmpl_is_list(map->lhs)) {
64 for (i = 0; i < self->count; i++) {
65 map_t *attr = NULL;
66 char *attr_str;
67
68 tmpl_rules_t lhs_rules = {
69 .attr = {
70 .dict_def = request->dict,
71 .request_def = tmpl_request(map->lhs),
72 .list_def = tmpl_list(map->lhs),
73 },
74 .xlat = {
75 .runtime_el = unlang_interpret_event_list(request),
76 },
77 .at_runtime = true,
78 };
79
80 tmpl_rules_t rhs_rules = {
81 .attr = {
82 .dict_def = request->dict
83 },
84 .xlat = {
85 .runtime_el = lhs_rules.xlat.runtime_el,
86 },
87 .at_runtime = true,
88 };
89
90 RDEBUG3("Parsing valuepair string \"%pV\"",
91 fr_box_strvalue_len(self->values[i]->bv_val, self->values[i]->bv_len));
92
93 /*
94 * bv_val is NOT \0 terminated, so we need to make it
95 * safe (\0 terminate it) before passing it to any
96 * functions which take C strings and no lengths.
97 */
98 attr_str = talloc_bstrndup(NULL, self->values[i]->bv_val, self->values[i]->bv_len);
99 if (!attr_str) {
100 RWDEBUG("Failed making attribute string safe");
101 continue;
102 }
103
104 if (map_afrom_attr_str(ctx, &attr,
105 attr_str,
106 &lhs_rules, &rhs_rules) < 0) {
107 RPWDEBUG("Failed parsing \"%pV\" as valuepair, skipping...",
108 fr_box_strvalue_len(self->values[i]->bv_val, self->values[i]->bv_len));
109 talloc_free(attr_str);
110 continue;
111 }
112
113 talloc_free(attr_str);
114
115 if (tmpl_is_data_unresolved(attr->lhs)) {
116 RWDEBUG("Failed parsing left side of \"%pV\", skipping...",
117 fr_box_strvalue_len(self->values[i]->bv_val, self->values[i]->bv_len));
118 talloc_free(attr);
119 continue;
120 }
121
122 if (tmpl_request_ref_list_cmp(tmpl_request(attr->lhs), tmpl_request(map->lhs)) != 0) {
123 char *attr_request;
124 char *map_request;
125
126 tmpl_request_ref_list_aprint(NULL, &attr_request, tmpl_request(attr->lhs));
127 tmpl_request_ref_list_aprint(NULL, &map_request, tmpl_request(map->lhs));
128
129 RWDEBUG("valuepair \"%pV\" has conflicting request qualifier (%s vs %s), skipping...",
130 fr_box_strvalue_len(self->values[i]->bv_val, self->values[i]->bv_len),
131 attr_request, map_request);
132
133 talloc_free(attr_request);
134 talloc_free(map_request);
135
136 next_pair:
137 talloc_free(attr);
138 continue;
139 }
140
141 if ((tmpl_list(attr->lhs) != tmpl_list(map->lhs))) {
142 RWDEBUG("valuepair \"%pV\" has conflicting list qualifier (%s vs %s), skipping...",
143 fr_box_strvalue_len(self->values[i]->bv_val, self->values[i]->bv_len),
144 tmpl_list_name(tmpl_list(attr->lhs), "<INVALID>"),
145 tmpl_list_name(tmpl_list(map->lhs), "<INVALID>"));
146 goto next_pair;
147 }
148
149 if (map_to_request(request, attr, map_to_vp, NULL) < 0) {
150 RWDEBUG("Failed creating attribute for valuepair \"%pV\", skipping...",
151 fr_box_strvalue_len(self->values[i]->bv_val, self->values[i]->bv_len));
152 goto next_pair;
153 }
154
155 talloc_free(attr);
156
157 /*
158 * Only process the first value, unless the operator is +=
159 */
160 if (map->op != T_OP_ADD_EQ) break;
161 }
162 goto finish;
163 }
164
165 /*
166 * Iterate over all the retrieved values,
167 * don't try and be clever about changing operators
168 * just use whatever was set in the attribute map.
169 */
170 for (i = 0; i < self->count; i++) {
171 if (!self->values[i]->bv_len) continue;
172
174
175 if (fr_pair_value_from_str(vp, self->values[i]->bv_val,
176 self->values[i]->bv_len, NULL, true) < 0) {
177 RPWDEBUG("Failed parsing value \"%pV\" for attribute %s",
178 fr_box_strvalue_len(self->values[i]->bv_val, self->values[i]->bv_len),
179 tmpl_attr_tail_da(map->lhs)->name);
180
181 talloc_free(vp); /* also frees escaped */
182 continue;
183 }
184
186
187 /*
188 * Only process the first value, unless the operator is +=
189 */
190 if (map->op != T_OP_ADD_EQ) break;
191 }
192
193finish:
195
196 return 0;
197}
198
199int fr_ldap_map_verify(map_t *map, UNUSED void *instance)
200{
201 /*
202 * Destinations where we can put the fr_pair_ts we
203 * create using LDAP values.
204 */
205 switch (map->lhs->type) {
206 case TMPL_TYPE_ATTR:
207 break;
208
210 cf_log_err(map->ci, "Unknown attribute %s", tmpl_attr_tail_unresolved(map->lhs));
211 return -1;
212
213 default:
214 cf_log_err(map->ci, "Left hand side of map must be an attribute or list, not a %s",
215 tmpl_type_to_str(map->lhs->type));
216 return -1;
217 }
218
219 /*
220 * Sources we can use to get the name of the attribute
221 * we're retrieving from LDAP.
222 */
223 switch (map->rhs->type) {
225 case TMPL_TYPE_ATTR:
226 case TMPL_TYPE_EXEC:
228 break;
229
231 cf_log_err(map->ci, "Unknown attribute %s", tmpl_attr_tail_unresolved(map->rhs));
232 return -1;
233
234 default:
235 cf_log_err(map->ci, "Right hand side of map must be an xlat, attribute, exec, or literal, not a %s",
236 tmpl_type_to_str(map->rhs->type));
237 return -1;
238 }
239
240 /*
241 * Only =, :=, += and -= operators are supported for LDAP mappings.
242 */
243 switch (map->op) {
244 case T_OP_SET:
245 case T_OP_EQ:
246 case T_OP_SUB_EQ:
247 case T_OP_ADD_EQ:
248 break;
249
250 default:
251 cf_log_err(map->ci, "Operator \"%s\" not allowed for LDAP mappings",
252 fr_table_str_by_value(fr_tokens_table, map->op, "<INVALID>"));
253 return -1;
254 }
255
256 return 0;
257}
258
259/** Expand values in an attribute map where needed
260 *
261 * @param[in] ctx o allocate any dynamic expansions in.
262 * @param[out] expanded array of attributes. Need not be initialised (we'll initialise).
263 * @param[in] request The current request.
264 * @param[in] maps to expand.
265 * @param[in] generic_attr name to append to the attribute list.
266 * @param[in] check_attr name to append to the attribute list.
267 * @param[in] fallthrough_attr name to append to the attribute list.
268 * @return
269 * - 0 on success.
270 * - -1 on failure.
271 */
272int fr_ldap_map_expand(TALLOC_CTX *ctx, fr_ldap_map_exp_t *expanded, request_t *request, map_list_t const *maps,
273 char const *generic_attr, char const *check_attr, char const *fallthrough_attr)
274{
275 map_t const *map = NULL;
276 unsigned int total = 0;
277
278 TALLOC_CTX *our_ctx = NULL;
279 char const *attr;
280 char attr_buff[1024 + 1]; /* X.501 says we need to support at least 1024 chars for attr names */
281
282 while ((map = map_list_next(maps, map))) {
283 if (tmpl_expand(&attr, attr_buff, sizeof(attr_buff), request, map->rhs) < 0) {
284 REDEBUG("Expansion of LDAP attribute \"%s\" failed", map->rhs->name);
285 TALLOC_FREE(our_ctx);
286 return -1;
287 }
288
289 /*
290 * Dynamic value
291 */
292 if (attr == attr_buff) {
293 if (!our_ctx) our_ctx = talloc_new(ctx);
294 expanded->attrs[total++] = talloc_strdup(our_ctx, attr_buff);
295 continue;
296 }
297 expanded->attrs[total++] = attr;
298 }
299
300 if (generic_attr) expanded->attrs[total++] = generic_attr;
301 if (check_attr) expanded->attrs[total++] = check_attr;
302 if (fallthrough_attr) expanded->attrs[total++] = fallthrough_attr;
303
304 expanded->attrs[total] = NULL;
305 expanded->count = total;
306 expanded->maps = maps;
307
308 return 0;
309}
310
311
312/** Convert attribute map into valuepairs
313 *
314 * Use the attribute map built earlier to convert LDAP values into valuepairs and insert them into whichever
315 * list they need to go into.
316 *
317 * This is *NOT* atomic, but there's no condition for which we should error out...
318 *
319 * @param[in] request Current request.
320 * @param[in] check_attr Treat attribute with this name as a condition to process the map.
321 * @param[in] valuepair_attr Treat attribute with this name as holding complete AVP definitions.
322 * @param[in] expanded attributes (rhs of map).
323 * @param[in] entry to retrieve attributes from.
324 * @return
325 * - Number of maps successfully applied.
326 * - -1 on failure.
327 */
328int fr_ldap_map_do(request_t *request, char const *check_attr,
329 char const *valuepair_attr, fr_ldap_map_exp_t const *expanded, LDAPMessage *entry)
330{
331 map_t const *map = NULL;
332 unsigned int total = 0;
333 int applied = 0; /* How many maps have been applied to the current request */
334
335 fr_ldap_result_t result;
336 char const *name;
337 LDAP *handle = fr_ldap_handle_thread_local();
338
339 if (check_attr) {
340 struct berval **values;
341 int count, i;
342 tmpl_rules_t const parse_rules = {
343 .attr = {
344 .dict_def = request->dict,
345 .list_def = request_attr_request,
346 },
347 .xlat = {
348 .runtime_el = unlang_interpret_event_list(request),
349 },
350 .at_runtime = true,
351 };
352
353 values = ldap_get_values_len(handle, entry, check_attr);
354 count = ldap_count_values_len(values);
355
356 for (i = 0; i < count; i++) {
357 char *value = fr_ldap_berval_to_string(request, values[i]);
358 xlat_exp_head_t *cond_expr = NULL;
359 fr_value_box_list_t res;
360
361 RDEBUG3("Parsing condition %s", value);
362
363 if (xlat_tokenize_expression(request, &cond_expr,
364 &FR_SBUFF_IN(value, talloc_array_length(value) - 1),
365 NULL, &parse_rules) < 0) {
366 RPEDEBUG("Failed parsing '%s' value \"%s\"", check_attr, value);
367 fail:
368 applied = -1;
369 free:
370 talloc_free(cond_expr);
372 ldap_value_free_len(values);
373 return applied;
374 }
375
376 if (xlat_impure_func(cond_expr)) {
377 fr_strerror_const("Condition expression cannot depend on functions which call external databases");
378 goto fail;
379 }
380
381 RDEBUG2("Checking condition %s", value);
382 fr_value_box_list_init(&res);
383 if (unlang_xlat_eval(request, &res, request, cond_expr) < 0) {
384 RPEDEBUG("Failed evaluating condition");
385 goto fail;
386 }
387 if (!fr_value_box_list_head(&res) || !fr_value_box_is_truthy(fr_value_box_list_head(&res))) {
388 RDEBUG2("Failed match: skipping this profile");
389 fr_value_box_list_talloc_free(&res);
390 goto free;
391 }
393 talloc_free(cond_expr);
394 fr_value_box_list_talloc_free(&res);
395 }
396 ldap_value_free_len(values);
397 }
398
399 while ((map = map_list_next(expanded->maps, map))) {
400 int ret;
401
402 name = expanded->attrs[total++];
403
404 /*
405 * Binary safe
406 */
407 result.values = ldap_get_values_len(handle, entry, name);
408 if (!result.values) {
409 RDEBUG3("Attribute \"%s\" not found in LDAP object", name);
410
411 goto next;
412 }
413
414 /*
415 * Find out how many values there are for the
416 * attribute and extract all of them.
417 */
418 result.count = ldap_count_values_len(result.values);
419
420 /*
421 * If something bad happened, just skip, this is probably
422 * a case of the dst being incorrect for the current
423 * request context
424 */
425 ret = map_to_request(request, map, fr_ldap_map_getvalue, &result);
426 if (ret == -1) return -1; /* Fail */
427
428 /*
429 * How many maps we've processed
430 */
431 applied++;
432
433 next:
434 ldap_value_free_len(result.values);
435 }
436
437
438 /*
439 * Retrieve any valuepair attributes from the result, these are generic values specifying
440 * a radius list, operator and value.
441 */
442 if (valuepair_attr) {
443 struct berval **values;
444 int count, i;
445
446 values = ldap_get_values_len(handle, entry, valuepair_attr);
447 count = ldap_count_values_len(values);
448
449 for (i = 0; i < count; i++) {
450 map_t *attr;
451 char *value;
452
453 tmpl_rules_t const parse_rules = {
454 .attr = {
455 .dict_def = request->dict,
456 .list_def = request_attr_request,
457 },
458 .xlat = {
459 .runtime_el = unlang_interpret_event_list(request),
460 },
461 .at_runtime = true,
462 };
463
464 value = fr_ldap_berval_to_string(request, values[i]);
465 RDEBUG3("Parsing attribute string '%s'", value);
466 if (map_afrom_attr_str(request, &attr, value,
467 &parse_rules, &parse_rules) < 0) {
468 RPWDEBUG("Failed parsing '%s' value \"%s\" as valuepair, skipping...",
469 valuepair_attr, value);
471 continue;
472 }
473 if (map_to_request(request, attr, map_to_vp, NULL) < 0) {
474 RWDEBUG("Failed adding \"%s\" to request, skipping...", value);
475 } else {
476 applied++;
477 }
478 talloc_free(attr);
480 }
481 ldap_value_free_len(values);
482 }
483
484 return applied;
485}
#define USES_APPLE_DEPRECATED_API
Definition build.h:472
#define RCSID(id)
Definition build.h:485
#define UNUSED
Definition build.h:317
#define cf_log_err(_cf, _fmt,...)
Definition cf_util.h:289
#define MEM(x)
Definition debug.h:36
Test enumeration values.
Definition dict_test.h:92
free(array)
fr_event_list_t * unlang_interpret_event_list(request_t *request)
Get the event list for the current interpreter.
Definition interpret.c:1779
struct berval ** values
libldap struct containing bv_val (char *) and length bv_len.
Definition base.h:361
int count
Index on next free element.
Definition base.h:375
map_list_t const * maps
Head of list of maps we expanded the RHS of.
Definition base.h:371
char * fr_ldap_berval_to_string(TALLOC_CTX *ctx, struct berval const *in)
Convert a berval to a talloced string.
Definition util.c:441
int count
Number of values.
Definition base.h:363
char const * attrs[LDAP_MAX_ATTRMAP+LDAP_MAP_RESERVED+1]
Reserve some space for access attributes.
Definition base.h:372
Result of expanding the RHS of a set of maps.
Definition base.h:370
Contains a collection of values.
Definition base.h:360
LDAP * fr_ldap_handle_thread_local(void)
Get a thread local dummy LDAP handle.
Definition base.c:1106
int fr_ldap_map_do(request_t *request, char const *check_attr, char const *valuepair_attr, fr_ldap_map_exp_t const *expanded, LDAPMessage *entry)
Convert attribute map into valuepairs.
Definition map.c:328
USES_APPLE_DEPRECATED_API int fr_ldap_map_getvalue(TALLOC_CTX *ctx, fr_pair_list_t *out, request_t *request, map_t const *map, void *uctx)
Callback for map_to_request.
Definition map.c:39
int fr_ldap_map_verify(map_t *map, UNUSED void *instance)
Definition map.c:199
int fr_ldap_map_expand(TALLOC_CTX *ctx, fr_ldap_map_exp_t *expanded, request_t *request, map_list_t const *maps, char const *generic_attr, char const *check_attr, char const *fallthrough_attr)
Expand values in an attribute map where needed.
Definition map.c:272
#define RWDEBUG(fmt,...)
Definition log.h:361
#define RDEBUG3(fmt,...)
Definition log.h:343
#define RPEDEBUG(fmt,...)
Definition log.h:376
#define RPWDEBUG(fmt,...)
Definition log.h:366
int map_to_vp(TALLOC_CTX *ctx, fr_pair_list_t *out, request_t *request, map_t const *map, UNUSED void *uctx)
Convert a map to a fr_pair_t.
Definition map.c:1573
int map_to_request(request_t *request, map_t const *map, radius_map_getvalue_t func, void *ctx)
Convert map_t to fr_pair_t (s) and add them to a request_t.
Definition map.c:1867
int map_afrom_attr_str(TALLOC_CTX *ctx, map_t **out, char const *vp_str, tmpl_rules_t const *lhs_rules, tmpl_rules_t const *rhs_rules)
Convert a value pair string to valuepair map.
Definition map.c:1405
talloc_free(reap)
int fr_pair_value_from_str(fr_pair_t *vp, char const *value, size_t inlen, fr_sbuff_unescape_rules_t const *uerules, UNUSED bool tainted)
Convert string value to native attribute value.
Definition pair.c:2591
int fr_pair_append(fr_pair_list_t *list, fr_pair_t *to_add)
Add a VP to the end of the list.
Definition pair.c:1347
fr_pair_t * fr_pair_afrom_da(TALLOC_CTX *ctx, fr_dict_attr_t const *da)
Dynamically allocate a new attribute and assign a fr_dict_attr_t.
Definition pair.c:285
void fr_pair_list_init(fr_pair_list_t *list)
Initialise a pair list header.
Definition pair.c:46
#define fr_assert(_expr)
Definition rad_assert.h:38
#define REDEBUG(fmt,...)
Definition radclient.h:52
#define RDEBUG2(fmt,...)
Definition radclient.h:54
fr_dict_attr_t const * request_attr_request
Definition request.c:45
static char const * name
#define FR_SBUFF_IN(_start, _len_or_end)
int8_t tmpl_request_ref_list_cmp(FR_DLIST_HEAD(tmpl_request_list) const *a, FR_DLIST_HEAD(tmpl_request_list) const *b)
Compare a list of request qualifiers.
static char const * tmpl_type_to_str(tmpl_type_t type)
Return a static string containing the type name.
Definition tmpl.h:639
static fr_dict_attr_t const * tmpl_list(tmpl_t const *vpt)
Definition tmpl.h:909
static fr_slen_t tmpl_request_ref_list_aprint(TALLOC_CTX *ctx, char **out, FR_DLIST_HEAD(tmpl_request_list) const *rql) 1(tmpl_request_ref_list_print
@ TMPL_TYPE_ATTR_UNRESOLVED
An attribute reference that we couldn't resolve but looked valid.
Definition tmpl.h:189
@ TMPL_TYPE_ATTR
Reference to one or more attributes.
Definition tmpl.h:146
@ TMPL_TYPE_EXEC
Callout to an external script or program.
Definition tmpl.h:154
@ TMPL_TYPE_DATA_UNRESOLVED
Unparsed literal string.
Definition tmpl.h:183
@ TMPL_TYPE_XLAT_UNRESOLVED
A xlat expansion with unresolved xlat functions or attribute references.
Definition tmpl.h:197
tmpl_xlat_rules_t xlat
Rules/data for parsing xlats.
Definition tmpl.h:341
static char const * tmpl_attr_tail_unresolved(tmpl_t const *vpt)
Return the last attribute reference unresolved da.
Definition tmpl.h:874
static bool tmpl_is_list(tmpl_t const *vpt)
Definition tmpl.h:925
#define tmpl_expand(_out, _buff, _buff_len, _request, _vpt)
Expand a tmpl to a C type, using existing storage to hold variably sized types.
Definition tmpl.h:1057
#define tmpl_is_data_unresolved(vpt)
Definition tmpl.h:222
tmpl_attr_rules_t attr
Rules/data for parsing attribute references.
Definition tmpl.h:340
static fr_dict_attr_t const * tmpl_attr_tail_da(tmpl_t const *vpt)
Return the last attribute reference da.
Definition tmpl.h:806
static char const * tmpl_list_name(fr_dict_attr_t const *list, char const *def)
Return the name of a tmpl list or def if list not provided.
Definition tmpl.h:920
fr_event_list_t * runtime_el
The eventlist to use for runtime instantiation of xlats.
Definition tmpl.h:329
Optional arguments passed to vp_tmpl functions.
Definition tmpl.h:337
return count
Definition module.c:163
fr_pair_t * vp
Value pair map.
Definition map.h:77
fr_token_t op
The operator that controls insertion of the dst attribute.
Definition map.h:82
tmpl_t * lhs
Typically describes the attribute to add, modify or compare.
Definition map.h:78
tmpl_t * rhs
Typically describes a literal value or a src attribute to copy or compare.
Definition map.h:79
CONF_ITEM * ci
Config item that the map was created from.
Definition map.h:85
fr_dict_t const * dict_def
Default dictionary to use with unqualified attribute references.
Definition tmpl.h:278
Stores an attribute, a value and various bits of other data.
Definition pair.h:68
#define fr_table_str_by_value(_table, _number, _def)
Convert an integer to a string.
Definition table.h:772
char * talloc_bstrndup(TALLOC_CTX *ctx, char const *in, size_t inlen)
Binary safe strndup function.
Definition talloc.c:564
fr_table_num_ordered_t const fr_tokens_table[]
Definition token.c:33
@ T_OP_SUB_EQ
Definition token.h:70
@ T_OP_EQ
Definition token.h:83
@ T_OP_SET
Definition token.h:84
@ T_OP_ADD_EQ
Definition token.h:69
int unlang_xlat_eval(TALLOC_CTX *ctx, fr_value_box_list_t *out, request_t *request, xlat_exp_head_t const *xlat)
Evaluate a "pure" (or not impure) xlat.
Definition xlat.c:741
bool xlat_impure_func(xlat_exp_head_t const *head)
static fr_slen_t head
Definition xlat.h:418
fr_slen_t xlat_tokenize_expression(TALLOC_CTX *ctx, xlat_exp_head_t **head, fr_sbuff_t *in, fr_sbuff_parse_rules_t const *p_rules, tmpl_rules_t const *t_rules)
Definition xlat_expr.c:3208
void fr_pair_list_append(fr_pair_list_t *dst, fr_pair_list_t *src)
Appends a list of fr_pair_t from a temporary list to a destination list.
#define fr_strerror_const(_msg)
Definition strerror.h:223
bool fr_value_box_is_truthy(fr_value_box_t const *in)
Check truthiness of values.
Definition value.c:6370
#define fr_box_strvalue_len(_val, _len)
Definition value.h:297
static size_t char ** out
Definition value.h:1012