The FreeRADIUS server $Id: 15bac2a4c627c01d1aa2047687b3418955ac7f00 $
Loading...
Searching...
No Matches
pairs.c
Go to the documentation of this file.
1/*
2 * This program is free software; you can redistribute it and/or modify
3 * it under the terms of the GNU General Public License as published by
4 * the Free Software Foundation; either version 2 of the License, or
5 * (at your option) any later version.
6 *
7 * This program is distributed in the hope that it will be useful,
8 * but WITHOUT ANY WARRANTY; without even the implied warranty of
9 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
10 * GNU General Public License for more details.
11 *
12 * You should have received a copy of the GNU General Public License
13 * along with this program; if not, write to the Free Software
14 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
15 */
16
17/**
18 * $Id: e3d658928853be5e1fb96014e90e25fb83b133fe $
19 *
20 * @file tls/pairs.c
21 * @brief Functions to convert certificate OIDs to attribute pairs
22 *
23 * @copyright 2021 Arran Cudbard-Bell (a.cudbardb@freeradius.org)
24 */
25RCSID("$Id: e3d658928853be5e1fb96014e90e25fb83b133fe $")
26USES_APPLE_DEPRECATED_API /* OpenSSL API has been deprecated by Apple */
27
28#ifdef WITH_TLS
29#define LOG_PREFIX "tls"
30
31#include <freeradius-devel/tls/openssl_user_macros.h>
32#include <freeradius-devel/util/pair.h>
33#include <freeradius-devel/server/request.h>
34#include <freeradius-devel/server/pair.h>
35#include <freeradius-devel/der/der.h>
36
37#include "attrs.h"
38#include "bio.h"
39#include "log.h"
40#include "session.h"
41#include "utils.h"
42
43#include <openssl/x509v3.h>
44#include <openssl/ssl.h>
45
47DIAG_OFF(used-but-marked-unused) /* fix spurious warnings for sk macros */
48/** Extract session pairs from the Subject Alternate Name extension
49 *
50 */
51static bool tls_session_pairs_from_san(fr_pair_list_t *pair_list, TALLOC_CTX *ctx, request_t *request, X509_EXTENSION *ext)
52{
53 GENERAL_NAMES *names = NULL;
54 int i;
56
57 if (!(names = X509V3_EXT_d2i(ext))) return false;
58
59 for (i = 0; i < sk_GENERAL_NAME_num(names); i++) {
60 GENERAL_NAME *name = sk_GENERAL_NAME_value(names, i);
61
62 switch (name->type) {
63#ifdef GEN_EMAIL
64 case GEN_EMAIL:
68 (char const *)ASN1_STRING_get0_data(name->d.rfc822Name),
69 ASN1_STRING_length(name->d.rfc822Name), true) == 0);
70 break;
71#endif /* GEN_EMAIL */
72#ifdef GEN_DNS
73 case GEN_DNS:
77 (char const *)ASN1_STRING_get0_data(name->d.dNSName),
78 ASN1_STRING_length(name->d.dNSName), true) == 0);
79 break;
80#endif /* GEN_DNS */
81#ifdef GEN_OTHERNAME
82 case GEN_OTHERNAME:
83 /* look for a MS UPN */
84 if (NID_ms_upn != OBJ_obj2nid(name->d.otherName->type_id)) break;
85
86 /* we've got a UPN - Must be ASN1-encoded UTF8 string */
87 if (name->d.otherName->value->type == V_ASN1_UTF8STRING) {
91 (char const *)ASN1_STRING_get0_data(name->d.otherName->value->value.utf8string),
92 ASN1_STRING_length(name->d.otherName->value->value.utf8string),
93 true) == 0);
94 break;
95 }
96 RWARN("Invalid UPN in Subject Alt Name (should be UTF-8)");
97 break;
98#endif /* GEN_OTHERNAME */
99 default:
100 /* XXX TODO handle other SAN types */
101 break;
102 }
103 }
104 if (names != NULL) GENERAL_NAMES_free(names);
105
106 return true;
107}
108
109/** Extract session pairs from the X509v3-CRL-Distribution-Points extension
110 *
111 */
112static bool tls_session_pairs_from_crl(fr_pair_list_t *pair_list, TALLOC_CTX *ctx, UNUSED request_t *request, X509_EXTENSION *ext)
113{
114 ASN1_STRING *s = X509_EXTENSION_get_data(ext);
115 char unsigned const *data = ASN1_STRING_get0_data(s);
116 STACK_OF(DIST_POINT) *dps;
117 DIST_POINT *dp;
118 STACK_OF(GENERAL_NAME) *names;
119 GENERAL_NAME *name;
120 fr_pair_t *vp;
121 int i, j;
122
123 if (!(dps = d2i_CRL_DIST_POINTS(NULL, &data, ASN1_STRING_length(s)))) return false;
124
125 for (i = 0; i < sk_DIST_POINT_num(dps); i++) {
126 dp = sk_DIST_POINT_value(dps, i);
127 names = dp->distpoint->name.fullname;
128
129 /*
130 * We only want CRL distribution points that cover all reasons,
131 * so ignore any where reasons are set.
132 */
133 if (dp->reasons) continue;
134
135 for (j = 0; j < sk_GENERAL_NAME_num(names); j++) {
136 name = sk_GENERAL_NAME_value(names, j);
137
138 if (name->type != GEN_URI) continue;
142 (char const *)ASN1_STRING_get0_data(name->d.uniformResourceIdentifier),
143 true) == 0);
144 }
145 }
146
147 CRL_DIST_POINTS_free(dps);
148
149 return true;
150}
151
152/** Extract attributes from an X509 certificate
153 *
154 * @param[out] pair_list to copy attributes to.
155 * @param[in] ctx to allocate attributes in.
156 * @param[in] request the current request.
157 * @param[in] cert to validate.
158 * @param[in] der_decode should the certificate be parsed with the DER decoder.
159 * @return
160 * - 1 already exists.
161 * - 0 on success.
162 * - < 0 on failure.
163 */
164int fr_tls_session_pairs_from_x509_cert(fr_pair_list_t *pair_list, TALLOC_CTX *ctx, request_t *request, X509 *cert,
165#if OPENSSL_VERSION_NUMBER >= 0x30400000L
166 bool der_decode
167#else
168 UNUSED bool der_decode
169#endif
170 )
171{
172 int loc;
173 char buff[1024];
174
175 ASN1_TIME const *asn_time;
176 time_t time;
177
178 STACK_OF(X509_EXTENSION) const *ext_list = NULL;
179
180 fr_pair_t *vp = NULL;
181 ssize_t slen;
182 bool san_found = false, crl_found = false;
183
184 /*
185 * We require OpenSSL >= 3.4 to call the DER decoder due to the stack size
186 * needed to handle the recursive calls involved in certificate decoding.
187 */
188#if OPENSSL_VERSION_NUMBER >= 0x30400000L
189 if (der_decode) {
190 uint8_t *cert_der;
191 uint8_t *cd;
192 int der_len;
193 fr_der_decode_ctx_t der_ctx;
194
195 der_len = i2d_X509(cert, NULL);
196 if (der_len < 0) {
197 fr_tls_log(request, "Failed retrieving certificate");
198 return -1;
199 }
200 der_ctx.tmp_ctx = talloc_new(ctx);
201 cert_der = cd = talloc_array(der_ctx.tmp_ctx, uint8_t, der_len);
202 i2d_X509(cert, &cd);
203 slen = fr_der_decode_pair_dbuff(request->session_state_ctx, &request->session_state_pairs,
204 attr_der_certificate, &FR_DBUFF_TMP(cert_der, (size_t)der_len), &der_ctx);
205 talloc_free(der_ctx.tmp_ctx);
206 if (slen < 0) {
207 fr_tls_log(request, "Failed decoding certificate");
208 return -1;
209 }
210 }
211#endif
212
213 /*
214 * Subject
215 */
217 if (unlikely(X509_NAME_print_ex(fr_tls_bio_dbuff_thread_local(vp, 256, 0),
218 X509_get_subject_name(cert), 0, XN_FLAG_ONELINE) < 0)) {
219 fr_tls_bio_dbuff_thread_local_clear();
220 fr_tls_log(request, "Failed retrieving certificate subject");
221 error:
223 return -1;
224 }
225 fr_pair_value_bstrdup_buffer_shallow(vp, fr_tls_bio_dbuff_thread_local_finalise_bstr(), true);
226
227 RDEBUG3("Creating attributes for \"%pV\":", fr_box_strvalue_buffer(vp->vp_strvalue));
228
229 /*
230 * Common name
231 */
232 slen = X509_NAME_get_text_by_NID(X509_get_subject_name(cert),
233 NID_commonName, NULL, 0);
234 if (slen > 0) {
235 char *cn;
236
238 MEM(fr_pair_value_bstr_alloc(vp, &cn, (size_t)slen, true) == 0); /* Allocs \0 byte in addition to len */
239
240 slen = X509_NAME_get_text_by_NID(X509_get_subject_name(cert), NID_commonName, cn, (size_t)slen + 1);
241 if (slen < 0) {
242 fr_tls_log(request, "Failed retrieving certificate common name");
243 goto error;
244 }
245 }
246
247 /*
248 * Signature
249 */
250 {
251 ASN1_BIT_STRING const *sig;
252 X509_ALGOR const *alg;
253
254 X509_get0_signature(&sig, &alg, cert);
255
258 (uint8_t const *)ASN1_STRING_get0_data(sig),
259 ASN1_STRING_length(sig), true) == 0);
260
261 OBJ_obj2txt(buff, sizeof(buff), alg->algorithm, 0);
264 }
265
266 /*
267 * Issuer
268 */
270 if (unlikely(X509_NAME_print_ex(fr_tls_bio_dbuff_thread_local(vp, 256, 0),
271 X509_get_issuer_name(cert), 0, XN_FLAG_ONELINE) < 0)) {
272 fr_tls_bio_dbuff_thread_local_clear();
273 fr_tls_log(request, "Failed retrieving certificate issuer");
274 goto error;
275 }
276 fr_pair_value_bstrdup_buffer_shallow(vp, fr_tls_bio_dbuff_thread_local_finalise_bstr(), true);
277
278 /*
279 * Serial number
280 */
281 {
282 ASN1_INTEGER const *serial = NULL;
283 unsigned char *der;
284 int len;
285
286 serial = X509_get0_serialNumber(cert);
287 if (!serial) {
288 fr_tls_log(request, "Failed retrieving certificate serial");
289 goto error;
290 }
291
292 len = i2d_ASN1_INTEGER(serial, NULL); /* get length */
294 MEM(fr_pair_value_mem_alloc(vp, &der, len, false) == 0);
295 i2d_ASN1_INTEGER(serial, &der);
296 }
297
298 /*
299 * Not valid before
300 */
301 asn_time = X509_get0_notBefore(cert);
302
303 if (fr_tls_utils_asn1time_to_epoch(&time, asn_time) < 0) {
304 RPWDEBUG("Failed parsing certificate not-before");
305 goto error;
306 }
307
309 vp->vp_date = fr_unix_time_from_time(time);
310
311 /*
312 * Not valid after
313 */
314 asn_time = X509_get0_notAfter(cert);
315
316 if (fr_tls_utils_asn1time_to_epoch(&time, asn_time) < 0) {
317 RPWDEBUG("Failed parsing certificate not-after");
318 goto error;
319 }
320
322 vp->vp_date = fr_unix_time_from_time(time);
323
324 /*
325 * Get the RFC822 Subject Alternative Name
326 */
327 loc = X509_get_ext_by_NID(cert, NID_subject_alt_name, 0);
328 if (loc >= 0) {
329 X509_EXTENSION *ext = X509_get_ext(cert, loc);
330 if (ext) san_found = tls_session_pairs_from_san(pair_list, ctx, request, ext);
331 }
332
333 loc = X509_get_ext_by_NID(cert, NID_crl_distribution_points, 0);
334 if (loc >= 0) {
335 X509_EXTENSION *ext = X509_get_ext(cert, loc);
336 if (ext) crl_found = tls_session_pairs_from_crl(pair_list, ctx, request, ext);
337 }
338
339 /*
340 * Only add extensions for the actual client certificate
341 */
342 ext_list = X509_get0_extensions(cert);
343 if (unlikely(!ext_list)) {
344 RWDEBUG("Failed retrieving extensions");
345 goto done;
346 }
347
348 /*
349 * Grab the X509 extensions, and create attributes out of them.
350 * For laziness, we reuse the OpenSSL names
351 */
352 if (sk_X509_EXTENSION_num(ext_list) > 0) {
353 int i;
354 BIO *bio;
355 fr_tls_bio_dbuff_t *bd;
356 fr_dbuff_t *in, *out;
357
358 bio = fr_tls_bio_dbuff_alloc(&bd, NULL, NULL, 257, 4097, true);
359 in = fr_tls_bio_dbuff_in(bd);
360 out = fr_tls_bio_dbuff_out(bd);
361
362 for (i = 0; i < sk_X509_EXTENSION_num(ext_list); i++) {
363 ASN1_OBJECT *obj;
364 X509_EXTENSION *ext;
365 fr_dict_attr_t const *da;
366 char *p;
367
368 ext = sk_X509_EXTENSION_value(ext_list, i);
369
370 obj = X509_EXTENSION_get_object(ext);
371
372 /*
373 * If this is extension is Subject Alternate Name have we already
374 * handled it? If not, do that now.
375 *
376 * Some certificate encodings have been observed where the SAN extension
377 * was not found by X509_get_ext_by_NID() but then seen when the list
378 * of extensions is handled here.
379 */
380 if (OBJ_obj2nid(obj) == NID_subject_alt_name) {
381 if (!san_found) san_found = tls_session_pairs_from_san(pair_list, ctx, request, ext);
382 goto again;
383 }
384
385 if (OBJ_obj2nid(obj) == NID_crl_distribution_points) {
386 if (!crl_found) crl_found = tls_session_pairs_from_crl(pair_list, ctx, request, ext);
387 goto again;
388 }
389
390 if (i2a_ASN1_OBJECT(bio, obj) <= 0) {
391 RPWDEBUG("Skipping X509 Extension (%i) conversion to attribute. "
392 "Conversion from ASN1 failed...", i);
393 again:
394 fr_tls_bio_dbuff_reset(bd);
395 continue;
396 }
397
398 if (fr_dbuff_remaining(out) == 0) goto again; /* Nothing written ? */
399
400 /*
401 * All disallowed chars get mashed to '-'
402 */
403 for (p = (char *)fr_dbuff_current(out);
404 p < (char *)fr_dbuff_end(out);
405 p++) if (!fr_dict_attr_allowed_chars[(uint8_t)*p]) *p = '-';
406
407 /*
408 * Terminate the buffer (after char replacement,
409 * so we do don't replace the \0)
410 */
411 if (unlikely(fr_dbuff_in_bytes(in, (uint8_t)'\0') <= 0)) {
412 RWDEBUG("Attribute name too long");
413 goto again;
414 }
415
417
418 fr_dbuff_set(in, fr_dbuff_current(in) - 1); /* Ensure the \0 isn't counted in remaining */
419
420 if (!da) {
421 RWDEBUG3("Skipping attribute \"%pV\": "
422 "Add a dictionary definition if you want to access it",
425 fr_strerror_clear(); /* Don't leave spurious errors from failed resolution */
426 goto again;
427 }
428
429 fr_tls_bio_dbuff_reset(bd); /* 'free' any data used */
430
431 if (X509V3_EXT_print(bio, ext, X509V3_EXT_PARSE_UNKNOWN, 0) != 1) {
432 REDEBUG("Failed extracting data for \"%s\"", da->name);
433 goto again;
434 }
435
436 MEM(vp = fr_pair_afrom_da(ctx, da));
438 NULL, true) < 0) {
439 RPWDEBUG3("Skipping: %s += \"%pV\"",
440 da->name, fr_box_strvalue_len((char *)fr_dbuff_current(out),
443 goto again;
444 }
445 fr_tls_bio_dbuff_reset(bd); /* 'free' any data used */
446
448 }
449 talloc_free(bd);
450 }
451
452done:
453 return 0;
454}
455
456/** Callback to extract pairs from a Client Hello
457 *
458 */
459int fr_tls_session_client_hello_cb(SSL *ssl, UNUSED int *al, UNUSED void *arg)
460{
461 request_t *request = SSL_get_ex_data(ssl, FR_TLS_EX_INDEX_REQUEST);
462 request_t *parent = request->parent;
463 uint8_t const *ciphers, *extension;
464 int *extensions, extension_len, i;
465 size_t data_size, j;
466 STACK_OF(SSL_CIPHER) *sk;
467 SSL_CIPHER const *cipher;
468 STACK_OF(SSL_CIPHER) *scsvs;
469 uint16_t tls_version = 0;
470 fr_pair_t *container, *vp;
471
473
474 container = fr_pair_find_by_da(&parent->session_state_pairs, NULL, attr_tls_client_hello);
475 if (container) return SSL_CLIENT_HELLO_SUCCESS;
476
477 MEM(container = fr_pair_afrom_da(parent->session_state_ctx, attr_tls_client_hello));
478
479 data_size = SSL_client_hello_get0_ciphers(ssl, &ciphers);
480 if (SSL_bytes_to_cipher_list(ssl, ciphers, data_size, SSL_client_hello_isv2(ssl), &sk, &scsvs) == 0) {
481 RPEDEBUG("Failed to decode cipher list");
482 fail:
483 talloc_free(container);
484 return SSL_CLIENT_HELLO_ERROR;
485 }
486
487 for (i = 0; i < sk_SSL_CIPHER_num(sk); i++) {
488 fr_pair_append_by_da(container, &vp, &container->vp_group, attr_tls_client_hello_cipher);
489 cipher = sk_SSL_CIPHER_value(sk, i);
490 fr_value_box_strdup(vp, &vp->data, NULL, SSL_CIPHER_get_name(cipher), false);
491 }
492
493 sk_SSL_CIPHER_free(sk);
494 sk_SSL_CIPHER_free(scsvs);
495
496 /*
497 * Fetch the extensions and decode the ones we know about
498 * These are the ones which are returned as simple lists
499 * of values of known length which map to enum attributes.
500 */
501 if (SSL_client_hello_get1_extensions_present(ssl, &extensions, &data_size) == 0) {
502 RPEDEBUG("Failed to fetch client hello extensions");
503 goto fail;
504 }
505 for (j = 0; j < data_size; j++) {
506 if (SSL_client_hello_get0_ext(ssl, extensions[j], &extension, NULL) == 0) {
507 RPDEBUG("Failed getting client hello extension %d", extensions[j]);
508 OPENSSL_free(extensions);
509 goto fail;
510 }
511
512 switch (extensions[j]) {
513 case TLSEXT_TYPE_supported_groups:
514 extension_len = (extension[0] << 8) + extension[1];
515 for (i = 0; i < extension_len; i += 2) {
516 fr_pair_append_by_da(container, &vp, &container->vp_group, attr_tls_client_hello_supported_group);
517 vp->vp_uint16 = (extension[i + 2] << 8) + extension[i + 3];
518 }
519 break;
520
521 case TLSEXT_TYPE_ec_point_formats:
522 for (i = 0; i < extension[0]; i += 1) {
523 fr_pair_append_by_da(container, &vp, &container->vp_group, attr_tls_client_hello_ec_point_format);
524 vp->vp_uint8 = extension[i + 1];
525 }
526 break;
527
528 case TLSEXT_TYPE_signature_algorithms:
529 extension_len = (extension[0] << 8) + extension[1];
530 for (i = 0; i < extension_len; i += 2) {
531 fr_pair_append_by_da(container, &vp, &container->vp_group, attr_tls_client_hello_sig_algo);
532 vp->vp_uint16 = (extension[i + 2] << 8) + extension[i + 3];
533 }
534 break;
535
536 case TLSEXT_TYPE_supported_versions:
537 for (i = 0; i < extension[0]; i += 2) {
538 fr_pair_append_by_da(container, &vp, &container->vp_group, attr_tls_client_hello_tls_version);
539 tls_version = vp->vp_uint16 = (extension[i + 1] << 8) + extension[i + 2];
540 }
541 break;
542
543 case TLSEXT_TYPE_psk_kex_modes:
544 for (i = 0; i < extension[0]; i += 1) {
545 fr_pair_append_by_da(container, &vp, &container->vp_group, attr_tls_client_hello_psk_key_mode);
546 vp->vp_uint8 = extension[i + 1];
547 }
548 break;
549 }
550 }
551
552 if (extensions) OPENSSL_free(extensions);
553
554 /*
555 * This is the version being negotiated by the client, but tops at 1.2.
556 * After that the supported_versions extension is where the real value is.
557 */
558 if (tls_version == 0) {
559 fr_pair_append_by_da(container, &vp, &container->vp_group, attr_tls_client_hello_tls_version);
560 vp->vp_uint16 = SSL_client_hello_get0_legacy_version(ssl);
561 }
562
563 fr_pair_append(&parent->session_state_pairs, container);
564
565 return SSL_CLIENT_HELLO_SUCCESS;
566}
567DIAG_ON(used-but-marked-unused)
569#endif
#define USES_APPLE_DEPRECATED_API
Definition build.h:472
#define RCSID(id)
Definition build.h:485
#define DIAG_UNKNOWN_PRAGMAS
Definition build.h:458
#define DIAG_ON(_x)
Definition build.h:460
#define unlikely(_x)
Definition build.h:383
#define UNUSED
Definition build.h:317
#define DIAG_OFF(_x)
Definition build.h:459
#define fr_dbuff_current(_dbuff_or_marker)
Return the 'current' position of a dbuff or marker.
Definition dbuff.h:921
#define fr_dbuff_set(_dst, _src)
Set the 'current' position in a dbuff or marker using another dbuff or marker, a char pointer,...
Definition dbuff.h:1014
#define fr_dbuff_end(_dbuff_or_marker)
Return the current 'end' position of a dbuff or marker.
Definition dbuff.h:948
#define fr_dbuff_remaining(_dbuff_or_marker)
Return the number of bytes remaining between the dbuff or marker and the end of the buffer.
Definition dbuff.h:753
#define fr_dbuff_in_bytes(_dbuff_or_marker,...)
Copy a byte sequence into a dbuff or marker.
Definition dbuff.h:1476
#define FR_DBUFF_TMP(_start, _len_or_end)
Creates a compound literal to pass into functions which accept a dbuff.
Definition dbuff.h:524
#define MEM(x)
Definition debug.h:36
TALLOC_CTX * tmp_ctx
ctx under which temporary data will be allocated
Definition der.h:117
bool const fr_dict_attr_allowed_chars[UINT8_MAX+1]
Characters allowed in a single dictionary attribute name.
Definition dict_util.c:64
fr_dict_attr_t const * fr_dict_attr_by_name(fr_dict_attr_err_t *err, fr_dict_attr_t const *parent, char const *attr))
Locate a fr_dict_attr_t by its name.
Definition dict_util.c:3558
static fr_slen_t in
Definition dict.h:887
HIDDEN fr_dict_attr_t const * attr_tls_certificate
Attribute definitions for lib curl.
Definition base.c:36
#define RWDEBUG(fmt,...)
Definition log.h:361
#define RDEBUG3(fmt,...)
Definition log.h:343
#define RWARN(fmt,...)
Definition log.h:297
#define RPDEBUG(fmt,...)
Definition log.h:346
#define RPEDEBUG(fmt,...)
Definition log.h:376
#define RPWDEBUG3(fmt,...)
Definition log.h:368
#define RPWDEBUG(fmt,...)
Definition log.h:366
#define RWDEBUG3(fmt,...)
Definition log.h:363
HIDDEN fr_dict_attr_t const * attr_tls_certificate_subject
HIDDEN fr_dict_attr_t const * attr_tls_client_hello
HIDDEN fr_dict_attr_t const * attr_tls_client_hello_psk_key_mode
HIDDEN fr_dict_attr_t const * attr_tls_certificate_serial
HIDDEN fr_dict_attr_t const * attr_tls_certificate_subject_alt_name_dns
HIDDEN fr_dict_attr_t const * attr_tls_client_hello_supported_group
HIDDEN fr_dict_attr_t const * attr_tls_certificate_not_after
HIDDEN fr_dict_attr_t const * attr_tls_certificate_not_before
HIDDEN fr_dict_attr_t const * attr_tls_certificate_signature_algorithm
HIDDEN fr_dict_attr_t const * attr_tls_certificate_subject_alt_name_upn
HIDDEN fr_dict_attr_t const * attr_tls_client_hello_sig_algo
HIDDEN fr_dict_attr_t const * attr_tls_certificate_common_name
HIDDEN fr_dict_attr_t const * attr_tls_certificate_issuer
HIDDEN fr_dict_attr_t const * attr_tls_certificate_x509v3_crl_distribution_points
HIDDEN fr_dict_attr_t const * attr_tls_client_hello_ec_point_format
HIDDEN fr_dict_attr_t const * attr_der_certificate
HIDDEN fr_dict_attr_t const * attr_tls_certificate_signature
HIDDEN fr_dict_attr_t const * attr_tls_client_hello_tls_version
HIDDEN fr_dict_attr_t const * attr_tls_client_hello_cipher
HIDDEN fr_dict_attr_t const * attr_tls_certificate_subject_alt_name_email
talloc_free(reap)
unsigned short uint16_t
long int ssize_t
unsigned char uint8_t
static size_t used
int fr_pair_append_by_da(TALLOC_CTX *ctx, fr_pair_t **out, fr_pair_list_t *list, fr_dict_attr_t const *da)
Alloc a new fr_pair_t (and append)
Definition pair.c:1467
int fr_pair_value_memdup(fr_pair_t *vp, uint8_t const *src, size_t len, bool tainted)
Copy data into an "octets" data type.
Definition pair.c:2945
int fr_pair_value_strdup(fr_pair_t *vp, char const *src, bool tainted)
Copy data into an "string" data type.
Definition pair.c:2645
int fr_pair_value_bstrdup_buffer_shallow(fr_pair_t *vp, char const *src, bool tainted)
Assign a string to a "string" type value pair.
Definition pair.c:2866
int fr_pair_value_from_str(fr_pair_t *vp, char const *value, size_t inlen, fr_sbuff_unescape_rules_t const *uerules, UNUSED bool tainted)
Convert string value to native attribute value.
Definition pair.c:2599
fr_pair_t * fr_pair_find_by_da(fr_pair_list_t const *list, fr_pair_t const *prev, fr_dict_attr_t const *da)
Find the first pair with a matching da.
Definition pair.c:703
int fr_pair_append(fr_pair_list_t *list, fr_pair_t *to_add)
Add a VP to the end of the list.
Definition pair.c:1348
fr_pair_t * fr_pair_afrom_da(TALLOC_CTX *ctx, fr_dict_attr_t const *da)
Dynamically allocate a new attribute and assign a fr_dict_attr_t.
Definition pair.c:289
int fr_pair_value_bstrndup(fr_pair_t *vp, char const *src, size_t len, bool tainted)
Copy data into a "string" type value pair.
Definition pair.c:2795
int fr_pair_value_bstr_alloc(fr_pair_t *vp, char **out, size_t size, bool tainted)
Pre-allocate a memory buffer for a "string" type value pair.
Definition pair.c:2741
int fr_pair_value_mem_alloc(fr_pair_t *vp, uint8_t **out, size_t size, bool tainted)
Pre-allocate a memory buffer for a "octets" type value pair.
Definition pair.c:2894
ssize_t fr_der_decode_pair_dbuff(TALLOC_CTX *ctx, fr_pair_list_t *out, fr_dict_attr_t const *parent, fr_dbuff_t *in, fr_der_decode_ctx_t *decode_ctx)
Definition decode.c:2363
#define fr_assert(_expr)
Definition rad_assert.h:38
static bool done
Definition radclient.c:83
#define REDEBUG(fmt,...)
Definition radclient.h:52
static char const * name
static char buff[sizeof("18446744073709551615")+3]
Definition size_tests.c:41
fr_pair_t * vp
Stores an attribute, a value and various bits of other data.
Definition pair.h:68
static const char * names[8]
Definition time.c:584
static fr_unix_time_t fr_unix_time_from_time(time_t time)
Convert a time_t into out internal fr_unix_time_t.
Definition time.h:536
void fr_pair_list_free(fr_pair_list_t *list)
Free memory used by a valuepair list.
static fr_slen_t parent
Definition pair.h:857
void fr_strerror_clear(void)
Clears all pending messages from the talloc pools.
Definition strerror.c:576
int fr_tls_utils_asn1time_to_epoch(time_t *out, ASN1_TIME const *asn1)
Convert OpenSSL's ASN1_TIME to an epoch time.
Definition utils.c:115
int fr_value_box_strdup(TALLOC_CTX *ctx, fr_value_box_t *dst, fr_dict_attr_t const *enumv, char const *src, bool tainted)
Copy a nul terminated string to a fr_value_box_t.
Definition value.c:4396
#define fr_box_strvalue_buffer(_val)
Definition value.h:311
static fr_slen_t data
Definition value.h:1322
#define fr_box_strvalue_len(_val, _len)
Definition value.h:308
static size_t char ** out
Definition value.h:1023