The FreeRADIUS server $Id: 15bac2a4c627c01d1aa2047687b3418955ac7f00 $
Loading...
Searching...
No Matches
map.c
Go to the documentation of this file.
1/*
2 * This program is is free software; you can redistribute it and/or modify
3 * it under the terms of the GNU General Public License as published by
4 * the Free Software Foundation; either version 2 of the License, or (at
5 * your option) any later version.
6 *
7 * This program is distributed in the hope that it will be useful,
8 * but WITHOUT ANY WARRANTY; without even the implied warranty of
9 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
10 * GNU General Public License for more details.
11 *
12 * You should have received a copy of the GNU General Public License
13 * along with this program; if not, write to the Free Software
14 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
15 */
16
17/**
18 * $Id: 95b77b350bdcbc8a37e4018ca150beb6db433195 $
19 * @file src/lib/ldap/map.c
20 * @brief Functions for mapping between LDAP and FreeRADIUS attributes.
21 *
22 * @author Arran Cudbard-Bell (a.cudbardb@freeradius.org)
23 * @copyright 2013 Network RADIUS SAS (legal@networkradius.com)
24 * @copyright 2013 The FreeRADIUS Server Project.
25 */
26RCSID("$Id: 95b77b350bdcbc8a37e4018ca150beb6db433195 $")
27
29
30#include <freeradius-devel/util/debug.h>
31#include <freeradius-devel/ldap/base.h>
32
33/** Callback for map_to_request
34 *
35 * Performs exactly the same job as map_to_vp, but pulls attribute values from LDAP entries
36 *
37 * @see map_to_vp
38 */
39int fr_ldap_map_getvalue(TALLOC_CTX *ctx, fr_pair_list_t *out, request_t *request, map_t const *map, void *uctx)
40{
41 fr_ldap_result_t *self = uctx;
43 fr_pair_list_t tmp_list;
45 int i;
46
48 fr_pair_list_init(&tmp_list);
49
50 fr_assert(map->lhs->type == TMPL_TYPE_ATTR);
51
52 /*
53 * This is a mapping in the form of:
54 * <list>. += <ldap attr>
55 *
56 * Where <ldap attr> is:
57 * <list>.<attr> <op> <value>
58 *
59 * It is to allow for legacy installations which stored
60 * RADIUS control and reply attributes in separate LDAP
61 * attributes.
62 */
63 if (tmpl_is_list(map->lhs)) {
64 for (i = 0; i < self->count; i++) {
65 map_t *attr = NULL;
66 char *attr_str;
67
68 tmpl_rules_t lhs_rules = {
69 .attr = {
70 .dict_def = request->dict,
71 .request_def = tmpl_request(map->lhs),
72 .list_def = tmpl_list(map->lhs),
74 },
75 .xlat = {
76 .runtime_el = unlang_interpret_event_list(request),
77 },
78 .at_runtime = true,
79 };
80
81 tmpl_rules_t rhs_rules = {
82 .attr = {
83 .dict_def = request->dict
84 },
85 .xlat = {
86 .runtime_el = lhs_rules.xlat.runtime_el,
87 },
88 .at_runtime = true,
89 };
90
91 RDEBUG3("Parsing valuepair string \"%pV\"",
92 fr_box_strvalue_len(self->values[i]->bv_val, self->values[i]->bv_len));
93
94 /*
95 * bv_val is NOT \0 terminated, so we need to make it
96 * safe (\0 terminate it) before passing it to any
97 * functions which take C strings and no lengths.
98 */
99 attr_str = talloc_bstrndup(NULL, self->values[i]->bv_val, self->values[i]->bv_len);
100 if (!attr_str) {
101 RWDEBUG("Failed making attribute string safe");
102 continue;
103 }
104
105 if (map_afrom_attr_str(ctx, &attr,
106 attr_str,
107 &lhs_rules, &rhs_rules) < 0) {
108 RPWDEBUG("Failed parsing \"%pV\" as valuepair, skipping...",
109 fr_box_strvalue_len(self->values[i]->bv_val, self->values[i]->bv_len));
110 talloc_free(attr_str);
111 continue;
112 }
113
114 talloc_free(attr_str);
115
116 if (tmpl_is_data_unresolved(attr->lhs)) {
117 RWDEBUG("Failed parsing left side of \"%pV\", skipping...",
118 fr_box_strvalue_len(self->values[i]->bv_val, self->values[i]->bv_len));
119 talloc_free(attr);
120 continue;
121 }
122
123 if (tmpl_request_ref_list_cmp(tmpl_request(attr->lhs), tmpl_request(map->lhs)) != 0) {
124 char *attr_request;
125 char *map_request;
126
127 tmpl_request_ref_list_aprint(NULL, &attr_request, tmpl_request(attr->lhs));
128 tmpl_request_ref_list_aprint(NULL, &map_request, tmpl_request(map->lhs));
129
130 RWDEBUG("valuepair \"%pV\" has conflicting request qualifier (%s vs %s), skipping...",
131 fr_box_strvalue_len(self->values[i]->bv_val, self->values[i]->bv_len),
132 attr_request, map_request);
133
134 talloc_free(attr_request);
135 talloc_free(map_request);
136
137 next_pair:
138 talloc_free(attr);
139 continue;
140 }
141
142 if ((tmpl_list(attr->lhs) != tmpl_list(map->lhs))) {
143 RWDEBUG("valuepair \"%pV\" has conflicting list qualifier (%s vs %s), skipping...",
144 fr_box_strvalue_len(self->values[i]->bv_val, self->values[i]->bv_len),
145 tmpl_list_name(tmpl_list(attr->lhs), "<INVALID>"),
146 tmpl_list_name(tmpl_list(map->lhs), "<INVALID>"));
147 goto next_pair;
148 }
149
150 if (map_to_request(request, attr, map_to_vp, NULL) < 0) {
151 RWDEBUG("Failed creating attribute for valuepair \"%pV\", skipping...",
152 fr_box_strvalue_len(self->values[i]->bv_val, self->values[i]->bv_len));
153 goto next_pair;
154 }
155
156 talloc_free(attr);
157
158 /*
159 * Only process the first value, unless the operator is +=
160 */
161 if (map->op != T_OP_ADD_EQ) break;
162 }
163 goto finish;
164 }
165
166 /*
167 * Iterate over all the retrieved values,
168 * don't try and be clever about changing operators
169 * just use whatever was set in the attribute map.
170 */
171 for (i = 0; i < self->count; i++) {
172 if (!self->values[i]->bv_len) continue;
173
175
176 if (fr_pair_value_from_str(vp, self->values[i]->bv_val,
177 self->values[i]->bv_len, NULL, true) < 0) {
178 RPWDEBUG("Failed parsing value \"%pV\" for attribute %s",
179 fr_box_strvalue_len(self->values[i]->bv_val, self->values[i]->bv_len),
180 tmpl_attr_tail_da(map->lhs)->name);
181
182 talloc_free(vp); /* also frees escaped */
183 continue;
184 }
185
187
188 /*
189 * Only process the first value, unless the operator is +=
190 */
191 if (map->op != T_OP_ADD_EQ) break;
192 }
193
194finish:
196
197 return 0;
198}
199
200int fr_ldap_map_verify(map_t *map, UNUSED void *instance)
201{
202 /*
203 * Destinations where we can put the fr_pair_ts we
204 * create using LDAP values.
205 */
206 switch (map->lhs->type) {
207 case TMPL_TYPE_ATTR:
208 break;
209
211 cf_log_err(map->ci, "Unknown attribute %s", tmpl_attr_tail_unresolved(map->lhs));
212 return -1;
213
214 default:
215 cf_log_err(map->ci, "Left hand side of map must be an attribute or list, not a %s",
216 tmpl_type_to_str(map->lhs->type));
217 return -1;
218 }
219
220 /*
221 * Sources we can use to get the name of the attribute
222 * we're retrieving from LDAP.
223 */
224 switch (map->rhs->type) {
226 case TMPL_TYPE_ATTR:
227 case TMPL_TYPE_EXEC:
229 break;
230
232 cf_log_err(map->ci, "Unknown attribute %s", tmpl_attr_tail_unresolved(map->rhs));
233 return -1;
234
235 default:
236 cf_log_err(map->ci, "Right hand side of map must be an xlat, attribute, exec, or literal, not a %s",
237 tmpl_type_to_str(map->rhs->type));
238 return -1;
239 }
240
241 /*
242 * Only =, :=, += and -= operators are supported for LDAP mappings.
243 */
244 switch (map->op) {
245 case T_OP_SET:
246 case T_OP_EQ:
247 case T_OP_SUB_EQ:
248 case T_OP_ADD_EQ:
249 break;
250
251 default:
252 cf_log_err(map->ci, "Operator \"%s\" not allowed for LDAP mappings",
253 fr_table_str_by_value(fr_tokens_table, map->op, "<INVALID>"));
254 return -1;
255 }
256
257 return 0;
258}
259
260/** Expand values in an attribute map where needed
261 *
262 * @param[in] ctx o allocate any dynamic expansions in.
263 * @param[out] expanded array of attributes. Need not be initialised (we'll initialise).
264 * @param[in] request The current request.
265 * @param[in] maps to expand.
266 * @param[in] generic_attr name to append to the attribute list.
267 * @param[in] check_attr name to append to the attribute list.
268 * @return
269 * - 0 on success.
270 * - -1 on failure.
271 */
272int fr_ldap_map_expand(TALLOC_CTX *ctx, fr_ldap_map_exp_t *expanded, request_t *request, map_list_t const *maps,
273 char const *generic_attr, char const *check_attr)
274{
275 map_t const *map = NULL;
276 unsigned int total = 0;
277
278 TALLOC_CTX *our_ctx = NULL;
279 char const *attr;
280 char attr_buff[1024 + 1]; /* X.501 says we need to support at least 1024 chars for attr names */
281
282 while ((map = map_list_next(maps, map))) {
283 if (tmpl_expand(&attr, attr_buff, sizeof(attr_buff), request, map->rhs, NULL, NULL) < 0) {
284 REDEBUG("Expansion of LDAP attribute \"%s\" failed", map->rhs->name);
285 TALLOC_FREE(our_ctx);
286 return -1;
287 }
288
289 /*
290 * Dynamic value
291 */
292 if (attr == attr_buff) {
293 if (!our_ctx) our_ctx = talloc_new(ctx);
294 expanded->attrs[total++] = talloc_strdup(our_ctx, attr_buff);
295 continue;
296 }
297 expanded->attrs[total++] = attr;
298 }
299
300 if (generic_attr) expanded->attrs[total++] = generic_attr;
301 if (check_attr) expanded->attrs[total++] = check_attr;
302
303 expanded->attrs[total] = NULL;
304 expanded->count = total;
305 expanded->maps = maps;
306
307 return 0;
308}
309
310
311/** Convert attribute map into valuepairs
312 *
313 * Use the attribute map built earlier to convert LDAP values into valuepairs and insert them into whichever
314 * list they need to go into.
315 *
316 * This is *NOT* atomic, but there's no condition for which we should error out...
317 *
318 * @param[in] request Current request.
319 * @param[in] check_attr Treat attribute with this name as a condition to process the map.
320 * @param[in] valuepair_attr Treat attribute with this name as holding complete AVP definitions.
321 * @param[in] expanded attributes (rhs of map).
322 * @param[in] entry to retrieve attributes from.
323 * @return
324 * - Number of maps successfully applied.
325 * - -1 on failure.
326 */
327int fr_ldap_map_do(request_t *request, char const *check_attr,
328 char const *valuepair_attr, fr_ldap_map_exp_t const *expanded, LDAPMessage *entry)
329{
330 map_t const *map = NULL;
331 unsigned int total = 0;
332 int applied = 0; /* How many maps have been applied to the current request */
333
334 fr_ldap_result_t result;
335 char const *name;
336 LDAP *handle = fr_ldap_handle_thread_local();
337
338 if (check_attr) {
339 struct berval **values;
340 int count, i;
341 tmpl_rules_t const parse_rules = {
342 .attr = {
343 .dict_def = request->dict,
344 .list_def = request_attr_request,
346 },
347 .xlat = {
348 .runtime_el = unlang_interpret_event_list(request),
349 },
350 .at_runtime = true,
351 };
352
353 values = ldap_get_values_len(handle, entry, check_attr);
354 count = ldap_count_values_len(values);
355
356 for (i = 0; i < count; i++) {
357 char *value = fr_ldap_berval_to_string(request, values[i]);
358 xlat_exp_head_t *cond_expr = NULL;
359 fr_value_box_list_t res;
360
361 RDEBUG3("Parsing condition %s", value);
362
363 if (xlat_tokenize_expression(request, &cond_expr,
364 &FR_SBUFF_IN(value, talloc_array_length(value) - 1),
365 NULL, &parse_rules) < 0) {
366 RPEDEBUG("Failed parsing '%s' value \"%s\"", check_attr, value);
367 fail:
368 applied = -1;
369 free:
370 talloc_free(cond_expr);
372 ldap_value_free_len(values);
373 return applied;
374 }
375
376 if (xlat_impure_func(cond_expr)) {
377 fr_strerror_const("Condition expression cannot depend on functions which call external databases");
378 goto fail;
379 }
380
381 RDEBUG2("Checking condition %s", value);
382 fr_value_box_list_init(&res);
383 if (unlang_xlat_eval(request, &res, request, cond_expr) < 0) {
384 RPEDEBUG("Failed evaluating condition");
385 goto fail;
386 }
387 if (!fr_value_box_list_head(&res) || !fr_value_box_is_truthy(fr_value_box_list_head(&res))) {
388 RDEBUG2("Failed match: skipping this profile");
389 goto free;
390 }
392 talloc_free(cond_expr);
393 }
394 ldap_value_free_len(values);
395 }
396
397 while ((map = map_list_next(expanded->maps, map))) {
398 int ret;
399
400 name = expanded->attrs[total++];
401
402 /*
403 * Binary safe
404 */
405 result.values = ldap_get_values_len(handle, entry, name);
406 if (!result.values) {
407 RDEBUG3("Attribute \"%s\" not found in LDAP object", name);
408
409 goto next;
410 }
411
412 /*
413 * Find out how many values there are for the
414 * attribute and extract all of them.
415 */
416 result.count = ldap_count_values_len(result.values);
417
418 /*
419 * If something bad happened, just skip, this is probably
420 * a case of the dst being incorrect for the current
421 * request context
422 */
423 ret = map_to_request(request, map, fr_ldap_map_getvalue, &result);
424 if (ret == -1) return -1; /* Fail */
425
426 /*
427 * How many maps we've processed
428 */
429 applied++;
430
431 next:
432 ldap_value_free_len(result.values);
433 }
434
435
436 /*
437 * Retrieve any valuepair attributes from the result, these are generic values specifying
438 * a radius list, operator and value.
439 */
440 if (valuepair_attr) {
441 struct berval **values;
442 int count, i;
443
444 values = ldap_get_values_len(handle, entry, valuepair_attr);
445 count = ldap_count_values_len(values);
446
447 for (i = 0; i < count; i++) {
448 map_t *attr;
449 char *value;
450
451 tmpl_rules_t const parse_rules = {
452 .attr = {
453 .dict_def = request->dict,
454 .list_def = request_attr_request,
456 },
457 .xlat = {
458 .runtime_el = unlang_interpret_event_list(request),
459 },
460 .at_runtime = true,
461 };
462
463 value = fr_ldap_berval_to_string(request, values[i]);
464 RDEBUG3("Parsing attribute string '%s'", value);
465 if (map_afrom_attr_str(request, &attr, value,
466 &parse_rules, &parse_rules) < 0) {
467 RPWDEBUG("Failed parsing '%s' value \"%s\" as valuepair, skipping...",
468 valuepair_attr, value);
470 continue;
471 }
472 if (map_to_request(request, attr, map_to_vp, NULL) < 0) {
473 RWDEBUG("Failed adding \"%s\" to request, skipping...", value);
474 } else {
475 applied++;
476 }
477 talloc_free(attr);
479 }
480 ldap_value_free_len(values);
481 }
482
483 return applied;
484}
#define USES_APPLE_DEPRECATED_API
Definition build.h:470
#define RCSID(id)
Definition build.h:483
#define UNUSED
Definition build.h:315
#define cf_log_err(_cf, _fmt,...)
Definition cf_util.h:289
#define MEM(x)
Definition debug.h:36
Test enumeration values.
Definition dict_test.h:92
free(array)
fr_event_list_t * unlang_interpret_event_list(request_t *request)
Get the event list for the current interpreter.
Definition interpret.c:1768
struct berval ** values
libldap struct containing bv_val (char *) and length bv_len.
Definition base.h:361
int count
Index on next free element.
Definition base.h:375
map_list_t const * maps
Head of list of maps we expanded the RHS of.
Definition base.h:371
char * fr_ldap_berval_to_string(TALLOC_CTX *ctx, struct berval const *in)
Convert a berval to a talloced string.
Definition util.c:390
int count
Number of values.
Definition base.h:363
char const * attrs[LDAP_MAX_ATTRMAP+LDAP_MAP_RESERVED+1]
Reserve some space for access attributes.
Definition base.h:372
Result of expanding the RHS of a set of maps.
Definition base.h:370
Contains a collection of values.
Definition base.h:360
LDAP * fr_ldap_handle_thread_local(void)
Get a thread local dummy LDAP handle.
Definition base.c:1106
int fr_ldap_map_do(request_t *request, char const *check_attr, char const *valuepair_attr, fr_ldap_map_exp_t const *expanded, LDAPMessage *entry)
Convert attribute map into valuepairs.
Definition map.c:327
USES_APPLE_DEPRECATED_API int fr_ldap_map_getvalue(TALLOC_CTX *ctx, fr_pair_list_t *out, request_t *request, map_t const *map, void *uctx)
Callback for map_to_request.
Definition map.c:39
int fr_ldap_map_expand(TALLOC_CTX *ctx, fr_ldap_map_exp_t *expanded, request_t *request, map_list_t const *maps, char const *generic_attr, char const *check_attr)
Expand values in an attribute map where needed.
Definition map.c:272
int fr_ldap_map_verify(map_t *map, UNUSED void *instance)
Definition map.c:200
#define RWDEBUG(fmt,...)
Definition log.h:361
#define RDEBUG3(fmt,...)
Definition log.h:343
#define RPEDEBUG(fmt,...)
Definition log.h:376
#define RPWDEBUG(fmt,...)
Definition log.h:366
int map_to_vp(TALLOC_CTX *ctx, fr_pair_list_t *out, request_t *request, map_t const *map, UNUSED void *uctx)
Convert a map to a fr_pair_t.
Definition map.c:1562
int map_to_request(request_t *request, map_t const *map, radius_map_getvalue_t func, void *ctx)
Convert map_t to fr_pair_t (s) and add them to a request_t.
Definition map.c:1856
int map_afrom_attr_str(TALLOC_CTX *ctx, map_t **out, char const *vp_str, tmpl_rules_t const *lhs_rules, tmpl_rules_t const *rhs_rules)
Convert a value pair string to valuepair map.
Definition map.c:1394
talloc_free(reap)
@ TMPL_ATTR_REF_PREFIX_AUTO
Attribute refs may have a '&' prefix.
int fr_pair_append(fr_pair_list_t *list, fr_pair_t *to_add)
Add a VP to the end of the list.
Definition pair.c:1345
fr_pair_t * fr_pair_afrom_da(TALLOC_CTX *ctx, fr_dict_attr_t const *da)
Dynamically allocate a new attribute and assign a fr_dict_attr_t.
Definition pair.c:283
void fr_pair_list_init(fr_pair_list_t *list)
Initialise a pair list header.
Definition pair.c:46
int fr_pair_value_from_str(fr_pair_t *vp, char const *value, size_t inlen, fr_sbuff_unescape_rules_t const *uerules, bool tainted)
Convert string value to native attribute value.
Definition pair.c:2589
#define fr_assert(_expr)
Definition rad_assert.h:38
#define REDEBUG(fmt,...)
Definition radclient.h:52
#define RDEBUG2(fmt,...)
Definition radclient.h:54
fr_dict_attr_t const * request_attr_request
Definition request.c:45
static char const * name
#define FR_SBUFF_IN(_start, _len_or_end)
int8_t tmpl_request_ref_list_cmp(FR_DLIST_HEAD(tmpl_request_list) const *a, FR_DLIST_HEAD(tmpl_request_list) const *b)
Compare a list of request qualifiers.
static char const * tmpl_type_to_str(tmpl_type_t type)
Return a static string containing the type name.
Definition tmpl.h:651
static fr_dict_attr_t const * tmpl_list(tmpl_t const *vpt)
Definition tmpl.h:921
static fr_slen_t tmpl_request_ref_list_aprint(TALLOC_CTX *ctx, char **out, FR_DLIST_HEAD(tmpl_request_list) const *rql) 1(tmpl_request_ref_list_print
@ TMPL_TYPE_ATTR_UNRESOLVED
An attribute reference that we couldn't resolve but looked valid.
Definition tmpl.h:189
@ TMPL_TYPE_ATTR
Reference to one or more attributes.
Definition tmpl.h:146
@ TMPL_TYPE_EXEC
Callout to an external script or program.
Definition tmpl.h:154
@ TMPL_TYPE_DATA_UNRESOLVED
Unparsed literal string.
Definition tmpl.h:183
@ TMPL_TYPE_XLAT_UNRESOLVED
A xlat expansion with unresolved xlat functions or attribute references.
Definition tmpl.h:197
tmpl_xlat_rules_t xlat
Rules/data for parsing xlats.
Definition tmpl.h:351
static char const * tmpl_attr_tail_unresolved(tmpl_t const *vpt)
Return the last attribute reference unresolved da.
Definition tmpl.h:886
static bool tmpl_is_list(tmpl_t const *vpt)
Definition tmpl.h:937
#define tmpl_is_data_unresolved(vpt)
Definition tmpl.h:222
tmpl_attr_rules_t attr
Rules/data for parsing attribute references.
Definition tmpl.h:350
static fr_dict_attr_t const * tmpl_attr_tail_da(tmpl_t const *vpt)
Return the last attribute reference da.
Definition tmpl.h:818
static char const * tmpl_list_name(fr_dict_attr_t const *list, char const *def)
Return the name of a tmpl list or def if list not provided.
Definition tmpl.h:932
#define tmpl_expand(_out, _buff, _buff_len, _request, _vpt, _escape, _escape_ctx)
Expand a tmpl to a C type, using existing storage to hold variably sized types.
Definition tmpl.h:1066
fr_event_list_t * runtime_el
The eventlist to use for runtime instantiation of xlats.
Definition tmpl.h:339
Optional arguments passed to vp_tmpl functions.
Definition tmpl.h:347
return count
Definition module.c:163
fr_pair_t * vp
Value pair map.
Definition map.h:77
fr_token_t op
The operator that controls insertion of the dst attribute.
Definition map.h:82
tmpl_t * lhs
Typically describes the attribute to add, modify or compare.
Definition map.h:78
tmpl_t * rhs
Typically describes a literal value or a src attribute to copy or compare.
Definition map.h:79
CONF_ITEM * ci
Config item that the map was created from.
Definition map.h:85
fr_dict_t const * dict_def
Default dictionary to use with unqualified attribute references.
Definition tmpl.h:287
Stores an attribute, a value and various bits of other data.
Definition pair.h:68
#define fr_table_str_by_value(_table, _number, _def)
Convert an integer to a string.
Definition table.h:772
char * talloc_bstrndup(TALLOC_CTX *ctx, char const *in, size_t inlen)
Binary safe strndup function.
Definition talloc.c:564
fr_table_num_ordered_t const fr_tokens_table[]
Definition token.c:33
@ T_OP_SUB_EQ
Definition token.h:70
@ T_OP_EQ
Definition token.h:83
@ T_OP_SET
Definition token.h:84
@ T_OP_ADD_EQ
Definition token.h:69
int unlang_xlat_eval(TALLOC_CTX *ctx, fr_value_box_list_t *out, request_t *request, xlat_exp_head_t const *xlat)
Evaluate a "pure" (or not impure) xlat.
Definition xlat.c:739
bool xlat_impure_func(xlat_exp_head_t const *head)
static fr_slen_t head
Definition xlat.h:422
fr_slen_t xlat_tokenize_expression(TALLOC_CTX *ctx, xlat_exp_head_t **head, fr_sbuff_t *in, fr_sbuff_parse_rules_t const *p_rules, tmpl_rules_t const *t_rules)
Definition xlat_expr.c:3258
void fr_pair_list_append(fr_pair_list_t *dst, fr_pair_list_t *src)
Appends a list of fr_pair_t from a temporary list to a destination list.
#define fr_strerror_const(_msg)
Definition strerror.h:223
bool fr_value_box_is_truthy(fr_value_box_t const *in)
Check truthiness of values.
Definition value.c:6372
#define fr_box_strvalue_len(_val, _len)
Definition value.h:286
static size_t char ** out
Definition value.h:997