The FreeRADIUS server $Id: 15bac2a4c627c01d1aa2047687b3418955ac7f00 $
Loading...
Searching...
No Matches
pairs.c
Go to the documentation of this file.
1/*
2 * This program is free software; you can redistribute it and/or modify
3 * it under the terms of the GNU General Public License as published by
4 * the Free Software Foundation; either version 2 of the License, or
5 * (at your option) any later version.
6 *
7 * This program is distributed in the hope that it will be useful,
8 * but WITHOUT ANY WARRANTY; without even the implied warranty of
9 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
10 * GNU General Public License for more details.
11 *
12 * You should have received a copy of the GNU General Public License
13 * along with this program; if not, write to the Free Software
14 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
15 */
16
17/**
18 * $Id: 890af502b250c0088f4187806dd9ba849c6d0e15 $
19 *
20 * @file tls/pairs.c
21 * @brief Functions to convert certificate OIDs to attribute pairs
22 *
23 * @copyright 2021 Arran Cudbard-Bell (a.cudbardb@freeradius.org)
24 */
25RCSID("$Id: 890af502b250c0088f4187806dd9ba849c6d0e15 $")
26USES_APPLE_DEPRECATED_API /* OpenSSL API has been deprecated by Apple */
27
28#ifdef WITH_TLS
29#define LOG_PREFIX "tls"
30
31#include <freeradius-devel/tls/openssl_user_macros.h>
32#include <freeradius-devel/util/pair.h>
33#include <freeradius-devel/server/request.h>
34#include <freeradius-devel/server/pair.h>
35#include <freeradius-devel/der/der.h>
36
37#include "attrs.h"
38#include "bio.h"
39#include "log.h"
40#include "session.h"
41#include "utils.h"
42
43#include <openssl/x509v3.h>
44#include <openssl/ssl.h>
45
47DIAG_OFF(used-but-marked-unused) /* fix spurious warnings for sk macros */
48/** Extract session pairs from the Subject Alternate Name extension
49 *
50 */
51static bool tls_session_pairs_from_san(fr_pair_list_t *pair_list, TALLOC_CTX *ctx, request_t *request, X509_EXTENSION *ext)
52{
53 GENERAL_NAMES *names = NULL;
54 int i;
56
57 if (!(names = X509V3_EXT_d2i(ext))) return false;
58
59 for (i = 0; i < sk_GENERAL_NAME_num(names); i++) {
60 GENERAL_NAME *name = sk_GENERAL_NAME_value(names, i);
61
62 switch (name->type) {
63#ifdef GEN_EMAIL
64 case GEN_EMAIL:
68 (char const *)ASN1_STRING_get0_data(name->d.rfc822Name),
69 ASN1_STRING_length(name->d.rfc822Name), true) == 0);
70 break;
71#endif /* GEN_EMAIL */
72#ifdef GEN_DNS
73 case GEN_DNS:
77 (char const *)ASN1_STRING_get0_data(name->d.dNSName),
78 ASN1_STRING_length(name->d.dNSName), true) == 0);
79 break;
80#endif /* GEN_DNS */
81#ifdef GEN_OTHERNAME
82 case GEN_OTHERNAME:
83 /* look for a MS UPN */
84 if (NID_ms_upn != OBJ_obj2nid(name->d.otherName->type_id)) break;
85
86 /* we've got a UPN - Must be ASN1-encoded UTF8 string */
87 if (name->d.otherName->value->type == V_ASN1_UTF8STRING) {
91 (char const *)ASN1_STRING_get0_data(name->d.otherName->value->value.utf8string),
92 ASN1_STRING_length(name->d.otherName->value->value.utf8string),
93 true) == 0);
94 break;
95 }
96 RWARN("Invalid UPN in Subject Alt Name (should be UTF-8)");
97 break;
98#endif /* GEN_OTHERNAME */
99 default:
100 /* XXX TODO handle other SAN types */
101 break;
102 }
103 }
104 if (names != NULL) GENERAL_NAMES_free(names);
105
106 return true;
107}
108
109/** Extract session pairs from the X509v3-CRL-Distribution-Points extension
110 *
111 */
112static bool tls_session_pairs_from_crl(fr_pair_list_t *pair_list, TALLOC_CTX *ctx, UNUSED request_t *request, X509_EXTENSION *ext)
113{
114 ASN1_STRING *s = X509_EXTENSION_get_data(ext);
115 char unsigned const *data = ASN1_STRING_get0_data(s);
116 STACK_OF(DIST_POINT) *dps;
117 DIST_POINT *dp;
118 STACK_OF(GENERAL_NAME) *names;
119 GENERAL_NAME *name;
120 fr_pair_t *vp;
121 int i, j;
122
123 if (!(dps = d2i_CRL_DIST_POINTS(NULL, &data, ASN1_STRING_length(s)))) return false;
124
125 for (i = 0; i < sk_DIST_POINT_num(dps); i++) {
126 dp = sk_DIST_POINT_value(dps, i);
127 names = dp->distpoint->name.fullname;
128
129 /*
130 * We only want CRL distribution points that cover all reasons,
131 * so ignore any where reasons are set.
132 */
133 if (dp->reasons) continue;
134
135 for (j = 0; j < sk_GENERAL_NAME_num(names); j++) {
136 name = sk_GENERAL_NAME_value(names, j);
137
138 if (name->type != GEN_URI) continue;
142 (char const *)ASN1_STRING_get0_data(name->d.uniformResourceIdentifier),
143 true) == 0);
144 }
145 }
146
147 CRL_DIST_POINTS_free(dps);
148
149 return true;
150}
151
152/** Extract attributes from an X509 certificate
153 *
154 * @param[out] pair_list to copy attributes to.
155 * @param[in] ctx to allocate attributes in.
156 * @param[in] request the current request.
157 * @param[in] cert to validate.
158 * @param[in] der_decode should the certificate be parsed with the DER decoder.
159 * @return
160 * - 1 already exists.
161 * - 0 on success.
162 * - < 0 on failure.
163 */
164int fr_tls_session_pairs_from_x509_cert(fr_pair_list_t *pair_list, TALLOC_CTX *ctx, request_t *request, X509 *cert,
165#if OPENSSL_VERSION_NUMBER >= 0x30400000L
166 bool der_decode
167#else
168 UNUSED bool der_decode
169#endif
170 )
171{
172 int loc;
173 char buff[1024];
174
175 ASN1_TIME const *asn_time;
176 time_t time;
177
178 STACK_OF(X509_EXTENSION) const *ext_list = NULL;
179
180 fr_pair_t *vp = NULL;
181 ssize_t slen;
182 bool san_found = false, crl_found = false;
183
184 /*
185 * We require OpenSSL >= 3.4 to call the DER decoder due to the stack size
186 * needed to handle the recursive calls involved in certificate decoding.
187 */
188#if OPENSSL_VERSION_NUMBER >= 0x30400000L
189 if (der_decode) {
190 uint8_t *cert_der;
191 uint8_t *cd;
192 int der_len;
193 fr_der_decode_ctx_t der_ctx;
194 fr_pair_list_t tmp_list;
195
196 der_len = i2d_X509(cert, NULL);
197 if (der_len < 0) {
198 fr_tls_log(request, "Failed retrieving certificate");
199 return -1;
200 }
201 der_ctx.tmp_ctx = talloc_new(ctx);
202 cert_der = cd = talloc_array(der_ctx.tmp_ctx, uint8_t, der_len);
203 i2d_X509(cert, &cd);
204 fr_pair_list_init(&tmp_list);
205 slen = fr_der_decode_pair_dbuff(request->session_state_ctx, &tmp_list,
206 attr_der_certificate, &FR_DBUFF_TMP(cert_der, (size_t)der_len), &der_ctx);
207 talloc_free(der_ctx.tmp_ctx);
208 if (slen < 0) {
209 fr_tls_log(request, "Failed decoding certificate");
210 fr_pair_list_free(&tmp_list);
211 return -1;
212 }
213 /*
214 * Certificates are decoded in CA .. intermediate .. client sequence
215 * so, prepend each decoded one to get the client cert first.
216 */
217 fr_pair_list_prepend(&request->session_state_pairs, &tmp_list);
218 }
219#endif
220
221 /*
222 * Subject
223 */
225 if (unlikely(X509_NAME_print_ex(fr_tls_bio_dbuff_thread_local(vp, 256, 0),
226 X509_get_subject_name(cert), 0, XN_FLAG_ONELINE) < 0)) {
227 fr_tls_bio_dbuff_thread_local_clear();
228 fr_tls_log(request, "Failed retrieving certificate subject");
229 error:
231 return -1;
232 }
233 fr_pair_value_bstrdup_buffer_shallow(vp, fr_tls_bio_dbuff_thread_local_finalise_bstr(), true);
234
235 RDEBUG3("Creating attributes for \"%pV\":", fr_box_strvalue_buffer(vp->vp_strvalue));
236
237 /*
238 * Common name
239 */
240 slen = X509_NAME_get_text_by_NID(X509_get_subject_name(cert),
241 NID_commonName, NULL, 0);
242 if (slen > 0) {
243 char *cn;
244
246 MEM(fr_pair_value_bstr_alloc(vp, &cn, (size_t)slen, true) == 0); /* Allocs \0 byte in addition to len */
247
248 slen = X509_NAME_get_text_by_NID(X509_get_subject_name(cert), NID_commonName, cn, (size_t)slen + 1);
249 if (slen < 0) {
250 fr_tls_log(request, "Failed retrieving certificate common name");
251 goto error;
252 }
253 }
254
255 /*
256 * Signature
257 */
258 {
259 ASN1_BIT_STRING const *sig;
260 X509_ALGOR const *alg;
261
262 X509_get0_signature(&sig, &alg, cert);
263
266 (uint8_t const *)ASN1_STRING_get0_data(sig),
267 ASN1_STRING_length(sig), true) == 0);
268
269 OBJ_obj2txt(buff, sizeof(buff), alg->algorithm, 0);
272 }
273
274 /*
275 * Issuer
276 */
278 if (unlikely(X509_NAME_print_ex(fr_tls_bio_dbuff_thread_local(vp, 256, 0),
279 X509_get_issuer_name(cert), 0, XN_FLAG_ONELINE) < 0)) {
280 fr_tls_bio_dbuff_thread_local_clear();
281 fr_tls_log(request, "Failed retrieving certificate issuer");
282 goto error;
283 }
284 fr_pair_value_bstrdup_buffer_shallow(vp, fr_tls_bio_dbuff_thread_local_finalise_bstr(), true);
285
286 /*
287 * Serial number
288 */
289 {
290 ASN1_INTEGER const *serial = NULL;
291 unsigned char *der;
292 int len;
293
294 serial = X509_get0_serialNumber(cert);
295 if (!serial) {
296 fr_tls_log(request, "Failed retrieving certificate serial");
297 goto error;
298 }
299
300 len = i2d_ASN1_INTEGER(serial, NULL); /* get length */
302 MEM(fr_pair_value_mem_alloc(vp, &der, len, false) == 0);
303 i2d_ASN1_INTEGER(serial, &der);
304 }
305
306 /*
307 * Not valid before
308 */
309 asn_time = X509_get0_notBefore(cert);
310
311 if (fr_tls_utils_asn1time_to_epoch(&time, asn_time) < 0) {
312 RPWDEBUG("Failed parsing certificate not-before");
313 goto error;
314 }
315
317 vp->vp_date = fr_unix_time_from_time(time);
318
319 /*
320 * Not valid after
321 */
322 asn_time = X509_get0_notAfter(cert);
323
324 if (fr_tls_utils_asn1time_to_epoch(&time, asn_time) < 0) {
325 RPWDEBUG("Failed parsing certificate not-after");
326 goto error;
327 }
328
330 vp->vp_date = fr_unix_time_from_time(time);
331
332 /*
333 * Get the RFC822 Subject Alternative Name
334 */
335 loc = X509_get_ext_by_NID(cert, NID_subject_alt_name, 0);
336 if (loc >= 0) {
337 X509_EXTENSION *ext = X509_get_ext(cert, loc);
338 if (ext) san_found = tls_session_pairs_from_san(pair_list, ctx, request, ext);
339 }
340
341 loc = X509_get_ext_by_NID(cert, NID_crl_distribution_points, 0);
342 if (loc >= 0) {
343 X509_EXTENSION *ext = X509_get_ext(cert, loc);
344 if (ext) crl_found = tls_session_pairs_from_crl(pair_list, ctx, request, ext);
345 }
346
347 /*
348 * Only add extensions for the actual client certificate
349 */
350 ext_list = X509_get0_extensions(cert);
351 if (unlikely(!ext_list)) {
352 RWDEBUG("Failed retrieving extensions");
353 goto done;
354 }
355
356 /*
357 * Grab the X509 extensions, and create attributes out of them.
358 * For laziness, we reuse the OpenSSL names
359 */
360 if (sk_X509_EXTENSION_num(ext_list) > 0) {
361 int i;
362 BIO *bio;
363 fr_tls_bio_dbuff_t *bd;
364 fr_dbuff_t *in, *out;
365
366 bio = fr_tls_bio_dbuff_alloc(&bd, NULL, NULL, 257, 4097, true);
367 in = fr_tls_bio_dbuff_in(bd);
368 out = fr_tls_bio_dbuff_out(bd);
369
370 for (i = 0; i < sk_X509_EXTENSION_num(ext_list); i++) {
371 ASN1_OBJECT *obj;
372 X509_EXTENSION *ext;
373 fr_dict_attr_t const *da;
374 char *p;
375
376 ext = sk_X509_EXTENSION_value(ext_list, i);
377
378 obj = X509_EXTENSION_get_object(ext);
379
380 /*
381 * If this is extension is Subject Alternate Name have we already
382 * handled it? If not, do that now.
383 *
384 * Some certificate encodings have been observed where the SAN extension
385 * was not found by X509_get_ext_by_NID() but then seen when the list
386 * of extensions is handled here.
387 */
388 if (OBJ_obj2nid(obj) == NID_subject_alt_name) {
389 if (!san_found) san_found = tls_session_pairs_from_san(pair_list, ctx, request, ext);
390 goto again;
391 }
392
393 if (OBJ_obj2nid(obj) == NID_crl_distribution_points) {
394 if (!crl_found) crl_found = tls_session_pairs_from_crl(pair_list, ctx, request, ext);
395 goto again;
396 }
397
398 if (i2a_ASN1_OBJECT(bio, obj) <= 0) {
399 RPWDEBUG("Skipping X509 Extension (%i) conversion to attribute. "
400 "Conversion from ASN1 failed...", i);
401 again:
402 fr_tls_bio_dbuff_reset(bd);
403 continue;
404 }
405
406 if (fr_dbuff_remaining(out) == 0) goto again; /* Nothing written ? */
407
408 /*
409 * All disallowed chars get mashed to '-'
410 */
411 for (p = (char *)fr_dbuff_current(out);
412 p < (char *)fr_dbuff_end(out);
413 p++) if (!fr_dict_attr_allowed_chars[(uint8_t)*p]) *p = '-';
414
415 /*
416 * Terminate the buffer (after char replacement,
417 * so we do don't replace the \0)
418 */
419 if (unlikely(fr_dbuff_in_bytes(in, (uint8_t)'\0') <= 0)) {
420 RWDEBUG("Attribute name too long");
421 goto again;
422 }
423
425
426 fr_dbuff_set(in, fr_dbuff_current(in) - 1); /* Ensure the \0 isn't counted in remaining */
427
428 if (!da) {
429 RWDEBUG3("Skipping attribute \"%pV\": "
430 "Add a dictionary definition if you want to access it",
433 fr_strerror_clear(); /* Don't leave spurious errors from failed resolution */
434 goto again;
435 }
436
437 fr_tls_bio_dbuff_reset(bd); /* 'free' any data used */
438
439 if (X509V3_EXT_print(bio, ext, X509V3_EXT_PARSE_UNKNOWN, 0) != 1) {
440 REDEBUG("Failed extracting data for \"%s\"", da->name);
441 goto again;
442 }
443
444 MEM(vp = fr_pair_afrom_da(ctx, da));
446 NULL, true) < 0) {
447 RPWDEBUG3("Skipping: %s += \"%pV\"",
448 da->name, fr_box_strvalue_len((char *)fr_dbuff_current(out),
451 goto again;
452 }
453 fr_tls_bio_dbuff_reset(bd); /* 'free' any data used */
454
456 }
457 talloc_free(bd);
458 }
459
460done:
461 return 0;
462}
463
464/** Callback to extract pairs from a Client Hello
465 *
466 */
467int fr_tls_session_client_hello_cb(SSL *ssl, UNUSED int *al, UNUSED void *arg)
468{
469 request_t *request = SSL_get_ex_data(ssl, FR_TLS_EX_INDEX_REQUEST);
470 request_t *parent = request->parent;
471 uint8_t const *ciphers, *extension;
472 int *extensions, extension_len, i;
473 size_t data_size, j;
474 STACK_OF(SSL_CIPHER) *sk;
475 SSL_CIPHER const *cipher;
476 STACK_OF(SSL_CIPHER) *scsvs;
477 uint16_t tls_version = 0;
478 fr_pair_t *container, *vp;
479
481
482 container = fr_pair_find_by_da(&parent->session_state_pairs, NULL, attr_tls_client_hello);
483 if (container) return SSL_CLIENT_HELLO_SUCCESS;
484
485 MEM(container = fr_pair_afrom_da(parent->session_state_ctx, attr_tls_client_hello));
486
487 data_size = SSL_client_hello_get0_ciphers(ssl, &ciphers);
488 if (SSL_bytes_to_cipher_list(ssl, ciphers, data_size, SSL_client_hello_isv2(ssl), &sk, &scsvs) == 0) {
489 RPEDEBUG("Failed to decode cipher list");
490 fail:
491 talloc_free(container);
492 return SSL_CLIENT_HELLO_ERROR;
493 }
494
495 for (i = 0; i < sk_SSL_CIPHER_num(sk); i++) {
496 fr_pair_append_by_da(container, &vp, &container->vp_group, attr_tls_client_hello_cipher);
497 cipher = sk_SSL_CIPHER_value(sk, i);
498 fr_value_box_strdup(vp, &vp->data, NULL, SSL_CIPHER_get_name(cipher), false);
499 }
500
501 sk_SSL_CIPHER_free(sk);
502 sk_SSL_CIPHER_free(scsvs);
503
504 /*
505 * Fetch the extensions and decode the ones we know about
506 * These are the ones which are returned as simple lists
507 * of values of known length which map to enum attributes.
508 */
509 if (SSL_client_hello_get1_extensions_present(ssl, &extensions, &data_size) == 0) {
510 RPEDEBUG("Failed to fetch client hello extensions");
511 goto fail;
512 }
513 for (j = 0; j < data_size; j++) {
514 if (SSL_client_hello_get0_ext(ssl, extensions[j], &extension, NULL) == 0) {
515 RPDEBUG("Failed getting client hello extension %d", extensions[j]);
516 OPENSSL_free(extensions);
517 goto fail;
518 }
519
520 switch (extensions[j]) {
521 case TLSEXT_TYPE_supported_groups:
522 extension_len = (extension[0] << 8) + extension[1];
523 for (i = 0; i < extension_len; i += 2) {
524 fr_pair_append_by_da(container, &vp, &container->vp_group, attr_tls_client_hello_supported_group);
525 vp->vp_uint16 = (extension[i + 2] << 8) + extension[i + 3];
526 }
527 break;
528
529 case TLSEXT_TYPE_ec_point_formats:
530 for (i = 0; i < extension[0]; i += 1) {
531 fr_pair_append_by_da(container, &vp, &container->vp_group, attr_tls_client_hello_ec_point_format);
532 vp->vp_uint8 = extension[i + 1];
533 }
534 break;
535
536 case TLSEXT_TYPE_signature_algorithms:
537 extension_len = (extension[0] << 8) + extension[1];
538 for (i = 0; i < extension_len; i += 2) {
539 fr_pair_append_by_da(container, &vp, &container->vp_group, attr_tls_client_hello_sig_algo);
540 vp->vp_uint16 = (extension[i + 2] << 8) + extension[i + 3];
541 }
542 break;
543
544 case TLSEXT_TYPE_supported_versions:
545 for (i = 0; i < extension[0]; i += 2) {
546 fr_pair_append_by_da(container, &vp, &container->vp_group, attr_tls_client_hello_tls_version);
547 tls_version = vp->vp_uint16 = (extension[i + 1] << 8) + extension[i + 2];
548 }
549 break;
550
551 case TLSEXT_TYPE_psk_kex_modes:
552 for (i = 0; i < extension[0]; i += 1) {
553 fr_pair_append_by_da(container, &vp, &container->vp_group, attr_tls_client_hello_psk_key_mode);
554 vp->vp_uint8 = extension[i + 1];
555 }
556 break;
557 }
558 }
559
560 if (extensions) OPENSSL_free(extensions);
561
562 /*
563 * This is the version being negotiated by the client, but tops at 1.2.
564 * After that the supported_versions extension is where the real value is.
565 */
566 if (tls_version == 0) {
567 fr_pair_append_by_da(container, &vp, &container->vp_group, attr_tls_client_hello_tls_version);
568 vp->vp_uint16 = SSL_client_hello_get0_legacy_version(ssl);
569 }
570
571 fr_pair_append(&parent->session_state_pairs, container);
572
573 return SSL_CLIENT_HELLO_SUCCESS;
574}
575DIAG_ON(used-but-marked-unused)
577#endif
#define USES_APPLE_DEPRECATED_API
Definition build.h:474
#define RCSID(id)
Definition build.h:487
#define DIAG_UNKNOWN_PRAGMAS
Definition build.h:460
#define DIAG_ON(_x)
Definition build.h:462
#define unlikely(_x)
Definition build.h:383
#define UNUSED
Definition build.h:317
#define DIAG_OFF(_x)
Definition build.h:461
#define fr_dbuff_current(_dbuff_or_marker)
Return the 'current' position of a dbuff or marker.
Definition dbuff.h:921
#define fr_dbuff_set(_dst, _src)
Set the 'current' position in a dbuff or marker using another dbuff or marker, a char pointer,...
Definition dbuff.h:1014
#define fr_dbuff_end(_dbuff_or_marker)
Return the current 'end' position of a dbuff or marker.
Definition dbuff.h:948
#define fr_dbuff_remaining(_dbuff_or_marker)
Return the number of bytes remaining between the dbuff or marker and the end of the buffer.
Definition dbuff.h:753
#define fr_dbuff_in_bytes(_dbuff_or_marker,...)
Copy a byte sequence into a dbuff or marker.
Definition dbuff.h:1476
#define FR_DBUFF_TMP(_start, _len_or_end)
Creates a compound literal to pass into functions which accept a dbuff.
Definition dbuff.h:524
#define MEM(x)
Definition debug.h:36
TALLOC_CTX * tmp_ctx
ctx under which temporary data will be allocated
Definition der.h:119
bool const fr_dict_attr_allowed_chars[UINT8_MAX+1]
Characters allowed in a single dictionary attribute name.
Definition dict_util.c:64
fr_dict_attr_t const * fr_dict_attr_by_name(fr_dict_attr_err_t *err, fr_dict_attr_t const *parent, char const *attr))
Locate a fr_dict_attr_t by its name.
Definition dict_util.c:3535
static fr_slen_t in
Definition dict.h:884
talloc_free(hp)
HIDDEN fr_dict_attr_t const * attr_tls_certificate
Attribute definitions for lib curl.
Definition base.c:36
#define RWDEBUG(fmt,...)
Definition log.h:361
#define RDEBUG3(fmt,...)
Definition log.h:343
#define RWARN(fmt,...)
Definition log.h:297
#define RPDEBUG(fmt,...)
Definition log.h:346
#define RPEDEBUG(fmt,...)
Definition log.h:376
#define RPWDEBUG3(fmt,...)
Definition log.h:368
#define RPWDEBUG(fmt,...)
Definition log.h:366
#define RWDEBUG3(fmt,...)
Definition log.h:363
HIDDEN fr_dict_attr_t const * attr_tls_certificate_subject
HIDDEN fr_dict_attr_t const * attr_tls_client_hello
HIDDEN fr_dict_attr_t const * attr_tls_client_hello_psk_key_mode
HIDDEN fr_dict_attr_t const * attr_tls_certificate_serial
HIDDEN fr_dict_attr_t const * attr_tls_certificate_subject_alt_name_dns
HIDDEN fr_dict_attr_t const * attr_tls_client_hello_supported_group
HIDDEN fr_dict_attr_t const * attr_tls_certificate_not_after
HIDDEN fr_dict_attr_t const * attr_tls_certificate_not_before
HIDDEN fr_dict_attr_t const * attr_tls_certificate_signature_algorithm
HIDDEN fr_dict_attr_t const * attr_tls_certificate_subject_alt_name_upn
HIDDEN fr_dict_attr_t const * attr_tls_client_hello_sig_algo
HIDDEN fr_dict_attr_t const * attr_tls_certificate_common_name
HIDDEN fr_dict_attr_t const * attr_tls_certificate_issuer
HIDDEN fr_dict_attr_t const * attr_tls_certificate_x509v3_crl_distribution_points
HIDDEN fr_dict_attr_t const * attr_tls_client_hello_ec_point_format
HIDDEN fr_dict_attr_t const * attr_der_certificate
HIDDEN fr_dict_attr_t const * attr_tls_certificate_signature
HIDDEN fr_dict_attr_t const * attr_tls_client_hello_tls_version
HIDDEN fr_dict_attr_t const * attr_tls_client_hello_cipher
HIDDEN fr_dict_attr_t const * attr_tls_certificate_subject_alt_name_email
unsigned short uint16_t
long int ssize_t
unsigned char uint8_t
static size_t used
int fr_pair_append_by_da(TALLOC_CTX *ctx, fr_pair_t **out, fr_pair_list_t *list, fr_dict_attr_t const *da)
Alloc a new fr_pair_t (and append)
Definition pair.c:1467
int fr_pair_value_memdup(fr_pair_t *vp, uint8_t const *src, size_t len, bool tainted)
Copy data into an "octets" data type.
Definition pair.c:2944
int fr_pair_value_strdup(fr_pair_t *vp, char const *src, bool tainted)
Copy data into an "string" data type.
Definition pair.c:2645
int fr_pair_value_bstrdup_buffer_shallow(fr_pair_t *vp, char const *src, bool tainted)
Assign a string to a "string" type value pair.
Definition pair.c:2865
int fr_pair_value_from_str(fr_pair_t *vp, char const *value, size_t inlen, fr_sbuff_unescape_rules_t const *uerules, UNUSED bool tainted)
Convert string value to native attribute value.
Definition pair.c:2599
fr_pair_t * fr_pair_find_by_da(fr_pair_list_t const *list, fr_pair_t const *prev, fr_dict_attr_t const *da)
Find the first pair with a matching da.
Definition pair.c:703
int fr_pair_append(fr_pair_list_t *list, fr_pair_t *to_add)
Add a VP to the end of the list.
Definition pair.c:1348
fr_pair_t * fr_pair_afrom_da(TALLOC_CTX *ctx, fr_dict_attr_t const *da)
Dynamically allocate a new attribute and assign a fr_dict_attr_t.
Definition pair.c:289
void fr_pair_list_init(fr_pair_list_t *list)
Initialise a pair list header.
Definition pair.c:46
int fr_pair_value_bstrndup(fr_pair_t *vp, char const *src, size_t len, bool tainted)
Copy data into a "string" type value pair.
Definition pair.c:2794
int fr_pair_value_bstr_alloc(fr_pair_t *vp, char **out, size_t size, bool tainted)
Pre-allocate a memory buffer for a "string" type value pair.
Definition pair.c:2741
int fr_pair_value_mem_alloc(fr_pair_t *vp, uint8_t **out, size_t size, bool tainted)
Pre-allocate a memory buffer for a "octets" type value pair.
Definition pair.c:2893
ssize_t fr_der_decode_pair_dbuff(TALLOC_CTX *ctx, fr_pair_list_t *out, fr_dict_attr_t const *parent, fr_dbuff_t *in, fr_der_decode_ctx_t *decode_ctx)
Definition decode.c:2393
#define fr_assert(_expr)
Definition rad_assert.h:38
static bool done
Definition radclient.c:83
#define REDEBUG(fmt,...)
Definition radclient.h:52
static char const * name
static char buff[sizeof("18446744073709551615")+3]
Definition size_tests.c:41
fr_pair_t * vp
Stores an attribute, a value and various bits of other data.
Definition pair.h:68
static const char * names[8]
Definition time.c:584
static fr_unix_time_t fr_unix_time_from_time(time_t time)
Convert a time_t into out internal fr_unix_time_t.
Definition time.h:536
void fr_pair_list_free(fr_pair_list_t *list)
Free memory used by a valuepair list.
void fr_pair_list_prepend(fr_pair_list_t *dst, fr_pair_list_t *src)
Move a list of fr_pair_t from a temporary list to the head of a destination list.
static fr_slen_t parent
Definition pair.h:859
void fr_strerror_clear(void)
Clears all pending messages from the talloc pools.
Definition strerror.c:576
int fr_tls_utils_asn1time_to_epoch(time_t *out, ASN1_TIME const *asn1)
Convert OpenSSL's ASN1_TIME to an epoch time.
Definition utils.c:115
int fr_value_box_strdup(TALLOC_CTX *ctx, fr_value_box_t *dst, fr_dict_attr_t const *enumv, char const *src, bool tainted)
Copy a nul terminated string to a fr_value_box_t.
Definition value.c:4636
#define fr_box_strvalue_buffer(_val)
Definition value.h:312
static fr_slen_t data
Definition value.h:1334
#define fr_box_strvalue_len(_val, _len)
Definition value.h:309
static size_t char ** out
Definition value.h:1024