28 #include <freeradius-devel/io/listen.h>
29 #include <freeradius-devel/io/master.h>
30 #include <freeradius-devel/server/main_config.h>
31 #include <freeradius-devel/server/protocol.h>
32 #include <freeradius-devel/server/state.h>
33 #include <freeradius-devel/tacacs/tacacs.h>
34 #include <freeradius-devel/unlang/call.h>
35 #include <freeradius-devel/util/debug.h>
37 #include <freeradius-devel/protocol/tacacs/tacacs.h>
192 #define PROCESS_PACKET_TYPE fr_tacacs_packet_code_t
193 #define PROCESS_CODE_MAX FR_TACACS_CODE_MAX
194 #define PROCESS_PACKET_CODE_VALID FR_TACACS_PACKET_CODE_VALID
195 #define PROCESS_INST process_tacacs_t
197 #include <freeradius-devel/server/process.h>
244 hash =
vp->vp_uint8 + ((int) reply << 1);
252 fr_assert(request->async->listen != NULL);
253 hash =
fr_hash(&request->async->listen,
sizeof(request->async->listen));
303 code = status2code[
vp->vp_uint8];
305 RDEBUG(
"Setting reply Packet-Type from %pP",
vp);
308 REDEBUG(
"Ignoring invalid status %pP",
vp);
312 code = state->packet_type[rcode];
326 RDEBUG(
"Setting reply Packet-Type from %pV", &
vp->data);
327 return vp->vp_uint32;
335 fr_process_state_t
const *state;
349 return CALL_SEND_STATE(state);
352 if (
vp->vp_uint8 != FR_ACTION_VALUE_LOGIN) {
353 RDEBUG(
"Invalid authentication action %u",
vp->vp_uint8);
361 return CALL_RECV(
generic);
382 fr_process_state_t
const *state;
392 UPDATE_STATE(packet);
400 if (!request->reply->code) {
417 if (!request->reply->code) {
438 RDEBUG(
"No User-Name, replying with Authentication-GetUser");
441 RDEBUG(
"User-Name = %pV, replying with Authentication-GetPass", &
vp->data);
453 RDEBUG(
"No User-Password, replying with Authentication-GetPass");
480 if (request->reply->code) {
481 switch (request->reply->code) {
483 RDEBUG(
"The 'recv Authentication-Start' section returned %s - rejecting the request",
496 return CALL_SEND_STATE(state);
511 RDEBUG(
"No 'Auth-Type' or 'Authentication-Type' attribute found, "
512 "cannot authenticate the user - rejecting the request");
521 RDEBUG(
"Invalid value for '%s' attribute, cannot authenticate the user - rejecting the request",
545 RDEBUG2(
"No 'authenticate %s { ... }' section found - rejecting the request", dv->
name);
557 NULL, 0, mctx->rctx);
562 static const fr_process_rcode_t auth_type_rcode = {
574 fr_process_state_t
const *state;
588 if (!request->reply->code) {
596 switch (request->reply->code) {
598 RDEBUG(
"No reply code was set. Forcing to Authentication-Fail");
607 RDEBUG2(
"Failed to authenticate the user");
614 if (
vp && (
vp->vp_uint32 != FR_AUTHENTICATION_TYPE_VALUE_ASCII)) {
615 RDEBUG2(
"Cannot send challenges for %pP",
vp);
627 return state->send(p_result, mctx, request);
697 #define COPY(_attr) do { \
698 vp = fr_pair_find_by_da(&request->request_pairs, NULL, _attr); \
700 MEM(copy = fr_pair_copy(session, vp)); \
701 fr_pair_append(&session->list, copy); \
702 RDEBUG2("%pP", copy); \
705 RDEBUG2(
"Caching session attributes:");
717 if (session->
rounds >
inst->auth.max_rounds) {
718 REDEBUG(
"Too many rounds of authentication - failing the session");
727 #define COPY_MISSING(_attr) do { \
728 vp = fr_pair_find_by_da(&session->list, NULL, _attr); \
733 RDEBUG2(
"Caching additional session attributes:");
739 session->
reply = request->reply->code;
740 session->
seq_no = request->packet->data[2];
746 if ((
state_create(request->reply_ctx, &request->reply_pairs, request,
true) < 0) ||
759 if ((
state_create(request->request_ctx, &request->request_pairs, request,
false) < 0) ||
771 if (request->packet->data[2] <= session->
seq_no) {
772 REDEBUG(
"Client sent invalid sequence number %02x, expected >%02x", request->packet->data[2], session->
seq_no);
778 RDEBUG2(
"Restoring session attributes:");
785 if (
fr_pair_list_copy(request->request_ctx, &request->request_pairs, &session->
list) < 0)
goto error;
790 #define EXTRACT(_attr) \
791 vp = fr_pair_find_by_da(&request->request_pairs, NULL, attr_tacacs_user_message); \
793 fr_value_box_set_secret(&vp->data, _attr->flags.secret); \
794 if (pair_append_request(©, _attr) < 0) break; \
795 if (fr_pair_value_copy(copy, vp) < 0) { \
796 fr_pair_remove(&request->request_pairs, copy); \
800 RDEBUG2("Populated %pP from user_message", copy)
802 switch (session->
reply) {
816 return CALL_RECV(
generic);
826 if ((
state_create(request->request_ctx, &request->request_pairs, request,
false) < 0) ||
831 return CALL_RECV(
generic);
836 fr_process_state_t
const *state;
843 return CALL_SEND_STATE(state);
858 fr_process_state_t
const *state;
867 UPDATE_STATE(packet);
875 if (!request->reply->code) {
889 return CALL_SEND_STATE(state);
899 static const fr_process_rcode_t acct_type_rcode = {
911 fr_process_state_t
const *state;
918 if (!request->reply->code) {
920 NULL, acct_type_rcode, rcode);
929 return state->send(p_result, mctx, request);
933 false,
true,
true,
false,
934 true,
true,
false,
false,
947 RWDEBUG(
"Invalid accounting request flag field %02x",
vp->vp_uint8);
951 return CALL_RECV(
generic);
960 fr_process_state_t
const *state;
967 UPDATE_STATE(packet);
975 if (!request->reply->code) {
985 if (request->reply->code) {
993 return CALL_SEND_STATE(state);
1003 UPDATE_STATE(reply);
1005 return CALL_SEND_STATE(state);
1013 RDEBUG2(
"No 'accounting %s { ... }' section found - skipping...", dv->
name);
1024 NULL, 0, mctx->rctx);
1029 fr_process_state_t
const *state;
1036 request->component =
"tacacs";
1037 request->module = NULL;
1040 UPDATE_STATE(packet);
1043 REDEBUG(
"Invalid packet type (%u)", request->packet->code);
1050 return state->recv(p_result, mctx, request);
1066 inst->auth.session_timeout,
inst->auth.state_server_id,
1098 .recv = recv_auth_start,
1099 .resume = resume_auth_start,
1110 .send = send_generic,
1111 .resume = resume_auth_pass,
1122 .send = send_generic,
1123 .resume = resume_auth_fail,
1134 .send = send_generic,
1135 .resume = resume_auth_get,
1146 .send = send_generic,
1147 .resume = resume_auth_get,
1158 .send = send_generic,
1159 .resume = resume_auth_get,
1166 .send = send_generic,
1167 .resume = resume_auth_restart,
1174 .send = send_generic,
1175 .resume = resume_auth_restart,
1188 .recv = recv_auth_cont,
1189 .resume = resume_auth_start,
1201 .recv = recv_auth_cont_abort,
1202 .resume = resume_auth_cont_abort,
1223 .recv = recv_generic,
1224 .resume = resume_autz_request,
1236 .send = send_generic,
1237 .resume = resume_send_generic,
1249 .send = send_generic,
1250 .resume = resume_send_generic,
1257 .send = send_generic,
1258 .resume = resume_send_generic,
1265 .send = send_generic,
1266 .resume = resume_send_generic,
1282 .recv = recv_accounting_request,
1283 .resume = resume_accounting_request,
1295 .send = send_generic,
1296 .resume = resume_send_generic,
1303 .send = send_generic,
1304 .resume = resume_send_generic,
1327 .offset = PROCESS_CONF_OFFSET(auth_start),
1330 .section =
SECTION_NAME(
"send",
"Authentication-Pass"),
1332 .offset = PROCESS_CONF_OFFSET(auth_pass),
1335 .section =
SECTION_NAME(
"send",
"Authentication-Fail"),
1337 .offset = PROCESS_CONF_OFFSET(auth_fail),
1340 .section =
SECTION_NAME(
"send",
"Authentication-GetData"),
1342 .offset = PROCESS_CONF_OFFSET(auth_getdata),
1345 .section =
SECTION_NAME(
"send",
"Authentication-GetUser"),
1347 .offset = PROCESS_CONF_OFFSET(auth_getuser),
1350 .section =
SECTION_NAME(
"send",
"Authentication-GetPass"),
1352 .offset = PROCESS_CONF_OFFSET(auth_getpass),
1355 .section =
SECTION_NAME(
"send",
"Authentication-Restart"),
1357 .offset = PROCESS_CONF_OFFSET(auth_restart),
1360 .section =
SECTION_NAME(
"send",
"Authentication-Error"),
1362 .offset = PROCESS_CONF_OFFSET(auth_error),
1365 .section =
SECTION_NAME(
"recv",
"Authentication-Continue"),
1367 .offset = PROCESS_CONF_OFFSET(auth_cont),
1370 .section =
SECTION_NAME(
"recv",
"Authentication-Continue-Abort"),
1372 .offset = PROCESS_CONF_OFFSET(auth_cont_abort),
1383 .section =
SECTION_NAME(
"recv",
"Authorization-Request"),
1385 .offset = PROCESS_CONF_OFFSET(autz_request),
1388 .section =
SECTION_NAME(
"send",
"Authorization-Pass-Add"),
1390 .offset = PROCESS_CONF_OFFSET(autz_pass_add),
1393 .section =
SECTION_NAME(
"send",
"Authorization-Pass-Replace"),
1395 .offset = PROCESS_CONF_OFFSET(autz_pass_replace),
1400 .offset = PROCESS_CONF_OFFSET(autz_fail),
1403 .section =
SECTION_NAME(
"send",
"Authorization-Error"),
1405 .offset = PROCESS_CONF_OFFSET(autz_error),
1413 .offset = PROCESS_CONF_OFFSET(acct_request),
1418 .offset = PROCESS_CONF_OFFSET(acct_success),
1423 .offset = PROCESS_CONF_OFFSET(acct_error),
1434 .offset = PROCESS_CONF_OFFSET(do_not_respond),
unlang_action_t
Returned by unlang_op_t calls, determine the next action of the interpreter.
static int const char char buffer[256]
#define FALL_THROUGH
clang 10 doesn't recognised the FALL-THROUGH comment anymore
#define CONF_PARSER_TERMINATOR
#define FR_INTEGER_BOUND_CHECK(_name, _var, _op, _bound)
#define FR_CONF_OFFSET(_name, _struct, _field)
conf_parser_t which parses a single CONF_PAIR, writing the result to a field in a struct
#define FR_CONF_POINTER(_name, _type, _flags, _res_p)
conf_parser_t which parses a single CONF_PAIR producing a single global result
@ CONF_FLAG_SUBSECTION
Instead of putting the information into a configuration structure, the configuration file routines MA...
Defines a CONF_PAIR to C data type mapping.
A section grouping multiple CONF_PAIR.
CONF_SECTION * cf_section_find(CONF_SECTION const *cs, char const *name1, char const *name2)
Find a CONF_SECTION with name1 and optionally name2.
char const * cf_section_name2(CONF_SECTION const *cs)
Return the second identifier of a CONF_SECTION.
CONF_SECTION * cf_item_to_section(CONF_ITEM const *ci)
Cast a CONF_ITEM to a CONF_SECTION.
fr_value_box_t const ** out
Enumeration value.
fr_dict_enum_value_t * fr_dict_enum_by_value(fr_dict_attr_t const *da, fr_value_box_t const *value)
Lookup the structure representing an enum value in a fr_dict_attr_t.
fr_dict_attr_t const ** out
Where to write a pointer to the resolved fr_dict_attr_t.
fr_dict_t const ** out
Where to write a pointer to the loaded/resolved fr_dict_t.
fr_value_box_t const * value
Enum value (what name maps to).
char const * name
Enum name.
Specifies an attribute which must be present for the module to function.
Specifies a dictionary which must be loaded/loadable for the module to function.
Specifies a value which must be present for the module to function.
Value of an enumerated attribute.
#define MODULE_MAGIC_INIT
Stop people using different module/library/server versions together.
uint32_t fr_hash(void const *data, size_t size)
uint32_t fr_hash_string(char const *p)
fr_dict_attr_t const * attr_packet_type
fr_dict_t const * dict_freeradius
fr_dict_attr_t const * attr_user_name
#define REXDENT()
Exdent (unindent) R* messages by one level.
#define RINDENT()
Indent R* messages by one level.
@ L_DBG_LVL_2
2nd highest priority debug messages (-xx | -X).
main_config_t const * main_config
Main server configuration.
bool spawn_workers
Should the server spawn threads.
@ FR_TYPE_STRING
String of printable characters.
@ FR_TYPE_UINT8
8 Bit unsigned integer.
@ FR_TYPE_UINT32
32 Bit unsigned integer.
@ FR_TYPE_OCTETS
Raw octets.
unlang_mod_actions_t const mod_actions_authenticate
unlang_mod_actions_t const mod_actions_accounting
unlang_mod_actions_t const mod_actions_authorize
unlang_mod_actions_t const mod_actions_postauth
module_instance_t const * mi
Instance of the module being instantiated.
module_instance_t * mi
Instance of the module being instantiated.
Temporary structure to hold arguments for module calls.
Temporary structure to hold arguments for instantiation calls.
static void fr_nbo_from_uint32(uint8_t out[static sizeof(uint32_t)], uint32_t num)
Write out an unsigned 32bit integer in wire format (big endian)
fr_pair_t * fr_pair_find_by_da(fr_pair_list_t const *list, fr_pair_t const *prev, fr_dict_attr_t const *da)
Find the first pair with a matching da.
fr_pair_t * fr_pair_afrom_da(TALLOC_CTX *ctx, fr_dict_attr_t const *da)
Dynamically allocate a new attribute and assign a fr_dict_attr_t.
int fr_pair_list_copy(TALLOC_CTX *ctx, fr_pair_list_t *to, fr_pair_list_t const *from)
Duplicate a list of pairs.
int fr_pair_value_memdup(fr_pair_t *vp, uint8_t const *src, size_t len, bool tainted)
Copy data into an "octets" data type.
int fr_pair_append(fr_pair_list_t *list, fr_pair_t *to_add)
Add a VP to the end of the list.
void fr_pair_list_init(fr_pair_list_t *list)
Initialise a pair list header.
fr_pair_t * fr_pair_find_by_da_nested(fr_pair_list_t const *list, fr_pair_t const *prev, fr_dict_attr_t const *da)
Find a pair with a matching fr_dict_attr_t, by walking the nested fr_dict_attr_t tree.
RECV(for_any_server)
Validate a solicit/rebind/confirm message.
fr_process_module_t process_tacacs
static fr_dict_attr_t const * attr_tacacs_authentication_flags
CONF_SECTION * autz_pass_add
fr_pair_list_t list
copied from the request
static fr_dict_attr_t const * attr_user_password
static virtual_server_compile_t compile_list[]
static fr_dict_attr_t const * attr_module_failure_message
static unlang_action_t mod_process(rlm_rcode_t *p_result, module_ctx_t const *mctx, request_t *request)
static fr_value_box_t const * enum_tacacs_auth_type_ascii
CONF_SECTION * auth_start
CONF_SECTION * acct_success
static fr_dict_attr_t const * attr_stripped_user_name
CONF_SECTION * auth_error
CONF_SECTION * acct_request
CONF_SECTION * auth_cont_abort
fr_dict_attr_autoload_t process_tacacs_dict_attr[]
static fr_dict_attr_t const * attr_tacacs_user_message
CONF_SECTION * server_cs
Our virtual server.
static fr_dict_attr_t const * attr_chap_password
static const conf_parser_t session_config[]
static const uint32_t acct_status_to_packet_code[UINT8_MAX+1]
CONF_SECTION * auth_restart
static const uint32_t authen_status_to_packet_code[UINT8_MAX+1]
process_tacacs_sections_t sections
Pointers to various config sections we need to execute.
static uint32_t reply_code(request_t *request, fr_dict_attr_t const *status_da, uint32_t const status2code[static UINT8_MAX+1], fr_process_state_t const *state, fr_process_rcode_t const process_rcode, rlm_rcode_t rcode)
Try and determine what the response packet type should be.
static fr_dict_t const * dict_tacacs
static int mod_bootstrap(module_inst_ctx_t const *mctx)
fr_time_delta_t session_timeout
Maximum time between the last response and next request.
uint32_t rounds
how many rounds were taken
static fr_dict_attr_t const * attr_auth_type
fr_dict_enum_autoload_t process_tacacs_dict_enum[]
#define COPY_MISSING(_attr)
static fr_dict_attr_t const * attr_tacacs_session_id
static fr_dict_attr_t const * attr_tacacs_server_message
CONF_SECTION * autz_error
CONF_SECTION * do_not_respond
static fr_value_box_t const * enum_auth_type_reject
static const conf_parser_t auth_config[]
static const uint32_t author_status_to_packet_code[UINT8_MAX+1]
static fr_process_state_t const process_state[]
static fr_value_box_t const * enum_auth_flags_noecho
uint8_t state_server_id
Sets a specific byte in the state to allow the authenticating server to be identified in packet captu...
CONF_SECTION * autz_pass_replace
uint32_t reply
for multiround state machine
static fr_value_box_t const * enum_auth_type_accept
CONF_SECTION * auth_getuser
static fr_dict_attr_t const * attr_tacacs_privilege_level
CONF_SECTION * auth_getdata
static fr_dict_attr_t const * attr_tacacs_authentication_type
CONF_SECTION * acct_error
static fr_dict_attr_t const * attr_tacacs_accounting_status
CONF_SECTION * autz_request
uint32_t max_session
Maximum ongoing session allowed.
static const bool acct_flag_valid[8]
static fr_dict_attr_t const * attr_tacacs_authentication_service
static fr_dict_attr_t const * attr_tacacs_authentication_status
static fr_dict_attr_t const * attr_tacacs_authentication_action
static fr_dict_attr_t const * attr_tacacs_client_port
process_tacacs_auth_t auth
Authentication configuration.
static fr_dict_attr_t const * attr_tacacs_remote_address
uint8_t seq_no
sequence number of last request.
fr_state_tree_t * state_tree
State tree to link multiple requests/responses.
static fr_dict_attr_t const * attr_tacacs_action
static const conf_parser_t config[]
static fr_dict_attr_t const * attr_tacacs_sequence_number
static fr_dict_attr_t const * attr_tacacs_authorization_status
static fr_dict_attr_t const * attr_tacacs_accounting_flags
static fr_dict_attr_t const * attr_tacacs_data
static fr_dict_attr_t const * attr_tacacs_state
uint32_t max_rounds
maximum number of authentication rounds allowed
static int mod_instantiate(module_inst_ctx_t const *mctx)
static fr_dict_attr_t const * attr_module_success_message
uint32_t session_id
current session ID
CONF_SECTION * auth_getpass
fr_dict_autoload_t process_tacacs_dict[]
static int state_create(TALLOC_CTX *ctx, fr_pair_list_t *out, request_t *request, bool reply)
#define PROCESS_TRACE
Trace each state function as it's entered.
module_t common
Common fields for all loadable modules.
Common public symbol definition for all process modules.
char const * fr_tacacs_packet_names[FR_TACACS_CODE_MAX]
static void send_reply(int sockfd, fr_channel_data_t *reply)
fr_table_num_sorted_t const rcode_table[]
rlm_rcode_t
Return codes indicating the result of the module call.
@ RLM_MODULE_INVALID
The module considers the request invalid.
@ RLM_MODULE_OK
The module is OK, continue.
@ RLM_MODULE_FAIL
Module failed, don't reply.
@ RLM_MODULE_DISALLOW
Reject the request (user is locked out).
@ RLM_MODULE_REJECT
Immediately reject the request.
@ RLM_MODULE_NOTFOUND
User not found.
@ RLM_MODULE_UPDATED
OK (pairs modified).
@ RLM_MODULE_NOOP
Module succeeded without doing anything.
@ RLM_MODULE_NUMCODES
How many valid return codes there are.
@ RLM_MODULE_HANDLED
The module handled the request, so stop.
void * request_data_reference(request_t *request, void const *unique_ptr, int unique_int)
Get opaque data from a request without removing it.
#define request_data_talloc_add(_request, _unique_ptr, _unique_int, _type, _opaque, _free_on_replace, _free_on_parent, _persist)
Add opaque data to a request_t.
static unlang_action_t process_rcode(rlm_rcode_t *p_result, module_ctx_t const *mctx, request_t *request)
static unsigned int hash(char const *username, unsigned int tablesize)
static int instantiate(module_inst_ctx_t const *mctx)
#define SECTION_NAME(_name1, _name2)
Define a section name consisting of a verb and a noun.
CONF_SECTION * conf
Module's instance configuration.
void * data
Module's instance data.
#define pair_append_reply(_attr, _da)
Allocate and append a fr_pair_t to reply list.
fr_state_tree_t * fr_state_tree_init(TALLOC_CTX *ctx, fr_dict_attr_t const *da, bool thread_safe, uint32_t max_sessions, fr_time_delta_t timeout, uint8_t server_id, uint32_t context_id)
Initialise a new state tree.
void fr_state_discard(fr_state_tree_t *state, request_t *request)
Called when sending an Access-Accept/Access-Reject to discard state information.
int fr_request_to_state(fr_state_tree_t *state, request_t *request)
Transfer ownership of the state fr_pair_ts and ctx, back to a state entry.
int fr_state_to_request(fr_state_tree_t *state, request_t *request)
Copy a pointer to the head of the list of state fr_pair_ts (and their ctx) into the request.
unlang_action_t unlang_module_yield_to_section(rlm_rcode_t *p_result, request_t *request, CONF_SECTION *subcs, rlm_rcode_t default_rcode, module_method_t resume, unlang_module_signal_t signal, fr_signal_t sigmask, void *rctx)
MEM(pair_append_request(&vp, attr_eap_aka_sim_identity) >=0)
eap_aka_sim_process_conf_t * inst
Stores an attribute, a value and various bits of other data.
fr_dict_attr_t const *_CONST da
Dictionary attribute defines the attribute number, vendor and type of the pair.
#define fr_table_str_by_value(_table, _number, _def)
Convert an integer to a string.
@ FR_TAC_PLUS_AUTHOR_STATUS_PASS_ADD
@ FR_TAC_PLUS_AUTHOR_STATUS_ERROR
@ FR_TAC_PLUS_AUTHOR_STATUS_FAIL
@ FR_TAC_PLUS_AUTHOR_STATUS_PASS_REPL
#define FR_TACACS_PACKET_CODE_VALID(_code)
#define packet_is_authen_start_request(p)
3.4.
@ FR_TACACS_CODE_ACCT_ERROR
@ FR_TACACS_CODE_ACCT_REQUEST
@ FR_TACACS_CODE_AUTZ_REQUEST
@ FR_TACACS_CODE_AUTH_GETDATA
@ FR_TACACS_CODE_AUTH_RESTART
@ FR_TACACS_CODE_AUTZ_PASS_REPLACE
@ FR_TACACS_CODE_AUTH_GETUSER
@ FR_TACACS_CODE_AUTH_GETPASS
@ FR_TACACS_CODE_AUTZ_FAIL
@ FR_TACACS_CODE_AUTH_CONT_ABORT
@ FR_TACACS_CODE_AUTH_PASS
@ FR_TACACS_CODE_AUTH_CONT
@ FR_TACACS_CODE_AUTZ_PASS_ADD
@ FR_TACACS_CODE_AUTH_START
@ FR_TACACS_CODE_AUTH_FAIL
@ FR_TACACS_CODE_AUTH_ERROR
@ FR_TACACS_CODE_AUTZ_ERROR
@ FR_TACACS_CODE_ACCT_SUCCESS
@ FR_TAC_PLUS_ACCT_STATUS_SUCCESS
@ FR_TAC_PLUS_ACCT_STATUS_ERROR
@ FR_TAC_PLUS_AUTHEN_STATUS_PASS
@ FR_TAC_PLUS_AUTHEN_STATUS_GETDATA
@ FR_TAC_PLUS_AUTHEN_STATUS_ERROR
@ FR_TAC_PLUS_AUTHEN_STATUS_GETUSER
@ FR_TAC_PLUS_AUTHEN_STATUS_FAIL
@ FR_TAC_PLUS_AUTHEN_STATUS_RESTART
@ FR_TAC_PLUS_AUTHEN_STATUS_GETPASS
#define talloc_get_type_abort_const
A time delta, a difference in time measured in nanoseconds.
fr_pair_t * fr_pair_list_next(fr_pair_list_t const *list, fr_pair_t const *item))
Get the next item in a valuepair list after a specific entry.
int8_t fr_value_box_cmp(fr_value_box_t const *a, fr_value_box_t const *b)
Compare two values.
int fr_value_box_copy(TALLOC_CTX *ctx, fr_value_box_t *dst, const fr_value_box_t *src)
Copy value data verbatim duplicating any buffers.
static size_t char ** out
int virtual_server_section_attribute_define(CONF_SECTION *server_cs, char const *subcs_name, fr_dict_attr_t const *da)
Define a values for Auth-Type attributes by the sections present in a virtual-server.
#define COMPILE_TERMINATOR
section_name_t const * section
Identifier for the section.
Processing sections which are allowed in this virtual server.