28#include <freeradius-devel/io/listen.h>
29#include <freeradius-devel/io/master.h>
30#include <freeradius-devel/server/main_config.h>
31#include <freeradius-devel/server/protocol.h>
32#include <freeradius-devel/server/state.h>
33#include <freeradius-devel/tacacs/tacacs.h>
34#include <freeradius-devel/unlang/call.h>
35#include <freeradius-devel/util/debug.h>
37#include <freeradius-devel/protocol/tacacs/tacacs.h>
196#define PROCESS_PACKET_TYPE fr_tacacs_packet_code_t
197#define PROCESS_CODE_MAX FR_TACACS_CODE_MAX
198#define PROCESS_CODE_DO_NOT_RESPOND FR_TACACS_CODE_DO_NOT_RESPOND
199#define PROCESS_PACKET_CODE_VALID FR_TACACS_PACKET_CODE_VALID
200#define PROCESS_INST process_tacacs_t
201#define PROCESS_CODE_DYNAMIC_CLIENT FR_TACACS_CODE_AUTH_PASS
203#include <freeradius-devel/server/process.h>
250 hash =
vp->vp_uint8 + ((int) reply << 1);
258 fr_assert(request->async->listen != NULL);
259 hash =
fr_hash(&request->async->listen,
sizeof(request->async->listen));
309 code = status2code[
vp->vp_uint8];
311 RDEBUG(
"Setting reply Packet-Type from %pP",
vp);
314 REDEBUG(
"Ignoring invalid status %pP",
vp);
318 code = state->packet_type[rcode];
332 RDEBUG(
"Setting reply Packet-Type from %pV", &
vp->data);
333 return vp->vp_uint32;
341 fr_process_state_t
const *state;
355 return CALL_SEND_STATE(state);
358 if (
vp->vp_uint8 != FR_ACTION_VALUE_LOGIN) {
359 RDEBUG(
"Invalid authentication action %u",
vp->vp_uint8);
367 return CALL_RECV(generic);
388 fr_process_state_t
const *state;
398 UPDATE_STATE(packet);
406 if (!request->reply->code) {
423 if (!request->reply->code) {
444 RDEBUG(
"No User-Name, replying with Authentication-GetUser");
447 RDEBUG(
"User-Name = %pV, replying with Authentication-GetPass", &
vp->data);
459 RDEBUG(
"No User-Password, replying with Authentication-GetPass");
486 if (request->reply->code) {
487 switch (request->reply->code) {
489 RDEBUG(
"The 'recv Authentication-Start' section returned %s - rejecting the request",
502 return CALL_SEND_STATE(state);
517 RDEBUG(
"No 'Auth-Type' or 'Authentication-Type' attribute found, "
518 "cannot authenticate the user - rejecting the request");
527 RDEBUG(
"Invalid value for '%s' attribute, cannot authenticate the user - rejecting the request",
551 RDEBUG2(
"No 'authenticate %s { ... }' section found - rejecting the request", dv->
name);
563 NULL, 0, mctx->rctx);
568 static const fr_process_rcode_t auth_type_rcode = {
580 fr_process_state_t
const *state;
594 if (!request->reply->code) {
602 switch (request->reply->code) {
604 RDEBUG(
"No reply code was set. Forcing to Authentication-Fail");
613 RDEBUG2(
"Failed to authenticate the user");
620 if (
vp && (
vp->vp_uint32 != FR_AUTHENTICATION_TYPE_VALUE_ASCII)) {
621 RDEBUG2(
"Cannot send challenges for %pP",
vp);
633 return state->send(p_result, mctx, request);
703#define COPY(_attr) do { \
704 vp = fr_pair_find_by_da(&request->request_pairs, NULL, _attr); \
706 MEM(copy = fr_pair_copy(session, vp)); \
707 fr_pair_append(&session->list, copy); \
708 RDEBUG2("%pP", copy); \
711 RDEBUG2(
"Caching session attributes:");
723 if (session->
rounds >
inst->auth.max_rounds) {
724 REDEBUG(
"Too many rounds of authentication - failing the session");
733#define COPY_MISSING(_attr) do { \
734 vp = fr_pair_find_by_da(&session->list, NULL, _attr); \
739 RDEBUG2(
"Caching additional session attributes:");
745 session->
reply = request->reply->code;
746 session->
seq_no = request->packet->data[2];
752 if ((
state_create(request->reply_ctx, &request->reply_pairs, request,
true) < 0) ||
765 if ((
state_create(request->request_ctx, &request->request_pairs, request,
false) < 0) ||
777 if (request->packet->data[2] <= session->
seq_no) {
778 REDEBUG(
"Client sent invalid sequence number %02x, expected >%02x", request->packet->data[2], session->
seq_no);
784 RDEBUG2(
"Restoring session attributes:");
791 if (
fr_pair_list_copy(request->request_ctx, &request->request_pairs, &session->
list) < 0)
goto error;
796#define EXTRACT(_attr) \
797 vp = fr_pair_find_by_da(&request->request_pairs, NULL, attr_tacacs_user_message); \
799 fr_value_box_set_secret(&vp->data, _attr->flags.secret); \
800 if (pair_append_request(©, _attr) < 0) break; \
801 if (fr_pair_value_copy(copy, vp) < 0) { \
802 fr_pair_remove(&request->request_pairs, copy); \
806 RDEBUG2("Populated %pP from user_message", copy)
808 switch (session->
reply) {
822 return CALL_RECV(generic);
832 if ((
state_create(request->request_ctx, &request->request_pairs, request,
false) < 0) ||
837 return CALL_RECV(generic);
842 fr_process_state_t
const *state;
849 return CALL_SEND_STATE(state);
864 fr_process_state_t
const *state;
873 UPDATE_STATE(packet);
881 if (!request->reply->code) {
895 return CALL_SEND_STATE(state);
905 static const fr_process_rcode_t acct_type_rcode = {
917 fr_process_state_t
const *state;
924 if (!request->reply->code) {
926 NULL, acct_type_rcode, rcode);
935 return state->send(p_result, mctx, request);
939 false,
true,
true,
false,
940 true,
true,
false,
false,
953 RWDEBUG(
"Invalid accounting request flag field %02x",
vp->vp_uint8);
957 return CALL_RECV(generic);
966 fr_process_state_t
const *state;
973 UPDATE_STATE(packet);
981 if (!request->reply->code) {
991 if (request->reply->code) {
999 return CALL_SEND_STATE(state);
1009 UPDATE_STATE(reply);
1011 return CALL_SEND_STATE(state);
1019 RDEBUG2(
"No 'accounting %s { ... }' section found - skipping...", dv->
name);
1030 NULL, 0, mctx->rctx);
1035 fr_process_state_t
const *state;
1042 request->component =
"tacacs";
1043 request->module = NULL;
1046 UPDATE_STATE(packet);
1049 REDEBUG(
"Invalid packet type (%u)", request->packet->code);
1057 return new_client(p_result, mctx, request);
1060 return state->recv(p_result, mctx, request);
1076 inst->auth.session_timeout,
inst->auth.state_server_id,
1108 .recv = recv_auth_start,
1109 .resume = resume_auth_start,
1120 .send = send_generic,
1121 .resume = resume_auth_pass,
1132 .send = send_generic,
1133 .resume = resume_auth_fail,
1144 .send = send_generic,
1145 .resume = resume_auth_get,
1156 .send = send_generic,
1157 .resume = resume_auth_get,
1168 .send = send_generic,
1169 .resume = resume_auth_get,
1176 .send = send_generic,
1177 .resume = resume_auth_restart,
1184 .send = send_generic,
1185 .resume = resume_auth_restart,
1198 .recv = recv_auth_cont,
1199 .resume = resume_auth_start,
1211 .recv = recv_auth_cont_abort,
1212 .resume = resume_auth_cont_abort,
1233 .recv = recv_generic,
1234 .resume = resume_autz_request,
1246 .send = send_generic,
1247 .resume = resume_send_generic,
1259 .send = send_generic,
1260 .resume = resume_send_generic,
1267 .send = send_generic,
1268 .resume = resume_send_generic,
1275 .send = send_generic,
1276 .resume = resume_send_generic,
1292 .recv = recv_accounting_request,
1293 .resume = resume_accounting_request,
1305 .send = send_generic,
1306 .resume = resume_send_generic,
1313 .send = send_generic,
1314 .resume = resume_send_generic,
1331 .send = send_generic,
1332 .resume = resume_send_generic,
1355 .offset = PROCESS_CONF_OFFSET(auth_start),
1358 .section =
SECTION_NAME(
"send",
"Authentication-Pass"),
1360 .offset = PROCESS_CONF_OFFSET(auth_pass),
1363 .section =
SECTION_NAME(
"send",
"Authentication-Fail"),
1365 .offset = PROCESS_CONF_OFFSET(auth_fail),
1368 .section =
SECTION_NAME(
"send",
"Authentication-GetData"),
1370 .offset = PROCESS_CONF_OFFSET(auth_getdata),
1373 .section =
SECTION_NAME(
"send",
"Authentication-GetUser"),
1375 .offset = PROCESS_CONF_OFFSET(auth_getuser),
1378 .section =
SECTION_NAME(
"send",
"Authentication-GetPass"),
1380 .offset = PROCESS_CONF_OFFSET(auth_getpass),
1383 .section =
SECTION_NAME(
"send",
"Authentication-Restart"),
1385 .offset = PROCESS_CONF_OFFSET(auth_restart),
1388 .section =
SECTION_NAME(
"send",
"Authentication-Error"),
1390 .offset = PROCESS_CONF_OFFSET(auth_error),
1393 .section =
SECTION_NAME(
"recv",
"Authentication-Continue"),
1395 .offset = PROCESS_CONF_OFFSET(auth_cont),
1398 .section =
SECTION_NAME(
"recv",
"Authentication-Continue-Abort"),
1400 .offset = PROCESS_CONF_OFFSET(auth_cont_abort),
1411 .section =
SECTION_NAME(
"recv",
"Authorization-Request"),
1413 .offset = PROCESS_CONF_OFFSET(autz_request),
1416 .section =
SECTION_NAME(
"send",
"Authorization-Pass-Add"),
1418 .offset = PROCESS_CONF_OFFSET(autz_pass_add),
1421 .section =
SECTION_NAME(
"send",
"Authorization-Pass-Replace"),
1423 .offset = PROCESS_CONF_OFFSET(autz_pass_replace),
1428 .offset = PROCESS_CONF_OFFSET(autz_fail),
1431 .section =
SECTION_NAME(
"send",
"Authorization-Error"),
1433 .offset = PROCESS_CONF_OFFSET(autz_error),
1441 .offset = PROCESS_CONF_OFFSET(acct_request),
1446 .offset = PROCESS_CONF_OFFSET(acct_success),
1451 .offset = PROCESS_CONF_OFFSET(acct_error),
1462 .offset = PROCESS_CONF_OFFSET(do_not_respond),
1465 DYNAMIC_CLIENT_SECTIONS,
unlang_action_t
Returned by unlang_op_t calls, determine the next action of the interpreter.
static int const char char buffer[256]
#define FALL_THROUGH
clang 10 doesn't recognised the FALL-THROUGH comment anymore
#define CONF_PARSER_TERMINATOR
#define FR_INTEGER_BOUND_CHECK(_name, _var, _op, _bound)
#define FR_CONF_OFFSET(_name, _struct, _field)
conf_parser_t which parses a single CONF_PAIR, writing the result to a field in a struct
#define FR_CONF_POINTER(_name, _type, _flags, _res_p)
conf_parser_t which parses a single CONF_PAIR producing a single global result
@ CONF_FLAG_SUBSECTION
Instead of putting the information into a configuration structure, the configuration file routines MA...
Defines a CONF_PAIR to C data type mapping.
A section grouping multiple CONF_PAIR.
char const * cf_section_name2(CONF_SECTION const *cs)
Return the second identifier of a CONF_SECTION.
CONF_SECTION * cf_section_find(CONF_SECTION const *cs, char const *name1, char const *name2)
Find a CONF_SECTION with name1 and optionally name2.
CONF_SECTION * cf_item_to_section(CONF_ITEM const *ci)
Cast a CONF_ITEM to a CONF_SECTION.
fr_dict_enum_value_t * fr_dict_enum_by_value(fr_dict_attr_t const *da, fr_value_box_t const *value)
Lookup the structure representing an enum value in a fr_dict_attr_t.
fr_value_box_t const ** out
Enumeration value.
fr_dict_attr_t const ** out
Where to write a pointer to the resolved fr_dict_attr_t.
fr_dict_t const ** out
Where to write a pointer to the loaded/resolved fr_dict_t.
fr_value_box_t const * value
Enum value (what name maps to).
char const * name
Enum name.
Specifies an attribute which must be present for the module to function.
Specifies a dictionary which must be loaded/loadable for the module to function.
Specifies a value which must be present for the module to function.
Value of an enumerated attribute.
#define MODULE_MAGIC_INIT
Stop people using different module/library/server versions together.
uint32_t fr_hash(void const *data, size_t size)
uint32_t fr_hash_string(char const *p)
static fr_dict_t const * dict_freeradius
fr_dict_attr_t const * attr_packet_type
fr_dict_attr_t const * attr_user_name
#define REXDENT()
Exdent (unindent) R* messages by one level.
#define RINDENT()
Indent R* messages by one level.
@ L_DBG_LVL_2
2nd highest priority debug messages (-xx | -X).
main_config_t const * main_config
Main server configuration.
bool spawn_workers
Should the server spawn threads.
@ FR_TYPE_STRING
String of printable characters.
@ FR_TYPE_UINT8
8 Bit unsigned integer.
@ FR_TYPE_UINT32
32 Bit unsigned integer.
@ FR_TYPE_OCTETS
Raw octets.
unlang_mod_actions_t const mod_actions_authenticate
unlang_mod_actions_t const mod_actions_accounting
unlang_mod_actions_t const mod_actions_authorize
unlang_mod_actions_t const mod_actions_postauth
unlang_mod_action_t actions[RLM_MODULE_NUMCODES]
module_instance_t const * mi
Instance of the module being instantiated.
module_instance_t * mi
Instance of the module being instantiated.
Temporary structure to hold arguments for module calls.
Temporary structure to hold arguments for instantiation calls.
static void fr_nbo_from_uint32(uint8_t out[static sizeof(uint32_t)], uint32_t num)
Write out an unsigned 32bit integer in wire format (big endian)
int fr_pair_list_copy(TALLOC_CTX *ctx, fr_pair_list_t *to, fr_pair_list_t const *from)
Duplicate a list of pairs.
int fr_pair_value_memdup(fr_pair_t *vp, uint8_t const *src, size_t len, bool tainted)
Copy data into an "octets" data type.
fr_pair_t * fr_pair_find_by_da_nested(fr_pair_list_t const *list, fr_pair_t const *prev, fr_dict_attr_t const *da)
Find a pair with a matching fr_dict_attr_t, by walking the nested fr_dict_attr_t tree.
fr_pair_t * fr_pair_find_by_da(fr_pair_list_t const *list, fr_pair_t const *prev, fr_dict_attr_t const *da)
Find the first pair with a matching da.
int fr_pair_append(fr_pair_list_t *list, fr_pair_t *to_add)
Add a VP to the end of the list.
fr_pair_t * fr_pair_afrom_da(TALLOC_CTX *ctx, fr_dict_attr_t const *da)
Dynamically allocate a new attribute and assign a fr_dict_attr_t.
void fr_pair_list_init(fr_pair_list_t *list)
Initialise a pair list header.
static unlang_action_t mod_process(rlm_rcode_t *p_result, module_ctx_t const *mctx, request_t *request)
static const virtual_server_compile_t compile_list[]
static fr_process_state_t const process_state[]
static fr_dict_attr_t const * attr_module_failure_message
static fr_dict_attr_t const * attr_module_success_message
static int mod_instantiate(module_inst_ctx_t const *mctx)
RECV(for_any_server)
Validate a solicit/rebind/confirm message.
static fr_dict_attr_t const * attr_user_password
static fr_dict_attr_t const * attr_stripped_user_name
static const conf_parser_t session_config[]
static int mod_bootstrap(module_inst_ctx_t const *mctx)
static fr_dict_attr_t const * attr_auth_type
static fr_value_box_t const * enum_auth_type_reject
static const conf_parser_t auth_config[]
static fr_value_box_t const * enum_auth_type_accept
static const conf_parser_t config[]
fr_process_module_t process_tacacs
static fr_dict_attr_t const * attr_tacacs_authentication_flags
CONF_SECTION * autz_pass_add
fr_pair_list_t list
copied from the request
CONF_SECTION * new_client
static fr_value_box_t const * enum_tacacs_auth_type_ascii
CONF_SECTION * add_client
CONF_SECTION * auth_start
CONF_SECTION * acct_success
CONF_SECTION * auth_error
CONF_SECTION * acct_request
CONF_SECTION * auth_cont_abort
fr_dict_attr_autoload_t process_tacacs_dict_attr[]
static fr_dict_attr_t const * attr_tacacs_user_message
CONF_SECTION * server_cs
Our virtual server.
static fr_dict_attr_t const * attr_chap_password
static const uint32_t acct_status_to_packet_code[UINT8_MAX+1]
CONF_SECTION * auth_restart
static const uint32_t authen_status_to_packet_code[UINT8_MAX+1]
process_tacacs_sections_t sections
Pointers to various config sections we need to execute.
static uint32_t reply_code(request_t *request, fr_dict_attr_t const *status_da, uint32_t const status2code[static UINT8_MAX+1], fr_process_state_t const *state, fr_process_rcode_t const process_rcode, rlm_rcode_t rcode)
Try and determine what the response packet type should be.
static fr_dict_t const * dict_tacacs
fr_time_delta_t session_timeout
Maximum time between the last response and next request.
uint32_t rounds
how many rounds were taken
fr_dict_enum_autoload_t process_tacacs_dict_enum[]
#define COPY_MISSING(_attr)
static fr_dict_attr_t const * attr_tacacs_session_id
static fr_dict_attr_t const * attr_tacacs_server_message
CONF_SECTION * autz_error
CONF_SECTION * do_not_respond
static const uint32_t author_status_to_packet_code[UINT8_MAX+1]
static fr_value_box_t const * enum_auth_flags_noecho
uint8_t state_server_id
Sets a specific byte in the state to allow the authenticating server to be identified in packet captu...
CONF_SECTION * autz_pass_replace
uint32_t reply
for multiround state machine
CONF_SECTION * auth_getuser
static fr_dict_attr_t const * attr_tacacs_privilege_level
CONF_SECTION * auth_getdata
static fr_dict_attr_t const * attr_tacacs_authentication_type
CONF_SECTION * acct_error
static fr_dict_attr_t const * attr_tacacs_accounting_status
CONF_SECTION * autz_request
uint32_t max_session
Maximum ongoing session allowed.
static const bool acct_flag_valid[8]
static fr_dict_attr_t const * attr_tacacs_authentication_service
static fr_dict_attr_t const * attr_tacacs_authentication_status
CONF_SECTION * deny_client
static fr_dict_attr_t const * attr_tacacs_authentication_action
static fr_dict_attr_t const * attr_tacacs_client_port
process_tacacs_auth_t auth
Authentication configuration.
static fr_dict_attr_t const * attr_tacacs_remote_address
uint8_t seq_no
sequence number of last request.
fr_state_tree_t * state_tree
State tree to link multiple requests/responses.
static fr_dict_attr_t const * attr_tacacs_action
static fr_dict_attr_t const * attr_tacacs_sequence_number
static fr_dict_attr_t const * attr_tacacs_authorization_status
static fr_dict_attr_t const * attr_tacacs_accounting_flags
static fr_dict_attr_t const * attr_tacacs_data
static fr_dict_attr_t const * attr_tacacs_state
uint32_t max_rounds
maximum number of authentication rounds allowed
uint32_t session_id
current session ID
CONF_SECTION * auth_getpass
fr_dict_autoload_t process_tacacs_dict[]
static int state_create(TALLOC_CTX *ctx, fr_pair_list_t *out, request_t *request, bool reply)
#define PROCESS_TRACE
Trace each state function as it's entered.
module_t common
Common fields for all loadable modules.
Common public symbol definition for all process modules.
char const * fr_tacacs_packet_names[FR_TACACS_CODE_MAX]
static void send_reply(int sockfd, fr_channel_data_t *reply)
fr_table_num_sorted_t const rcode_table[]
#define RETURN_MODULE_FAIL
rlm_rcode_t
Return codes indicating the result of the module call.
@ RLM_MODULE_INVALID
The module considers the request invalid.
@ RLM_MODULE_OK
The module is OK, continue.
@ RLM_MODULE_FAIL
Module failed, don't reply.
@ RLM_MODULE_DISALLOW
Reject the request (user is locked out).
@ RLM_MODULE_REJECT
Immediately reject the request.
@ RLM_MODULE_NOTFOUND
User not found.
@ RLM_MODULE_UPDATED
OK (pairs modified).
@ RLM_MODULE_NOOP
Module succeeded without doing anything.
@ RLM_MODULE_NUMCODES
How many valid return codes there are.
@ RLM_MODULE_HANDLED
The module handled the request, so stop.
#define request_is_dynamic_client(_x)
void * request_data_reference(request_t *request, void const *unique_ptr, int unique_int)
Get opaque data from a request without removing it.
#define request_data_talloc_add(_request, _unique_ptr, _unique_int, _type, _opaque, _free_on_replace, _free_on_parent, _persist)
Add opaque data to a request_t.
static unlang_action_t process_rcode(rlm_rcode_t *p_result, module_ctx_t const *mctx, request_t *request)
static unsigned int hash(char const *username, unsigned int tablesize)
static int instantiate(module_inst_ctx_t const *mctx)
#define SECTION_NAME(_name1, _name2)
Define a section name consisting of a verb and a noun.
CONF_SECTION * conf
Module's instance configuration.
void * data
Module's instance data.
conf_parser_t const * config
How to convert a CONF_SECTION to a module instance.
#define pair_append_reply(_attr, _da)
Allocate and append a fr_pair_t to reply list.
fr_state_tree_t * fr_state_tree_init(TALLOC_CTX *ctx, fr_dict_attr_t const *da, bool thread_safe, uint32_t max_sessions, fr_time_delta_t timeout, uint8_t server_id, uint32_t context_id)
Initialise a new state tree.
void fr_state_discard(fr_state_tree_t *state, request_t *request)
Called when sending an Access-Accept/Access-Reject to discard state information.
int fr_request_to_state(fr_state_tree_t *state, request_t *request)
Transfer ownership of the state fr_pair_ts and ctx, back to a state entry.
int fr_state_to_request(fr_state_tree_t *state, request_t *request)
Copy a pointer to the head of the list of state fr_pair_ts (and their ctx) into the request.
unlang_action_t unlang_module_yield_to_section(rlm_rcode_t *p_result, request_t *request, CONF_SECTION *subcs, rlm_rcode_t default_rcode, module_method_t resume, unlang_module_signal_t signal, fr_signal_t sigmask, void *rctx)
eap_aka_sim_process_conf_t * inst
Stores an attribute, a value and various bits of other data.
fr_dict_attr_t const *_CONST da
Dictionary attribute defines the attribute number, vendor and type of the pair.
#define fr_table_str_by_value(_table, _number, _def)
Convert an integer to a string.
@ FR_TAC_PLUS_AUTHOR_STATUS_PASS_ADD
@ FR_TAC_PLUS_AUTHOR_STATUS_ERROR
@ FR_TAC_PLUS_AUTHOR_STATUS_FAIL
@ FR_TAC_PLUS_AUTHOR_STATUS_PASS_REPL
#define FR_TACACS_PACKET_CODE_VALID(_code)
#define packet_is_authen_start_request(p)
3.4.
@ FR_TACACS_CODE_ACCT_ERROR
@ FR_TACACS_CODE_DO_NOT_RESPOND
@ FR_TACACS_CODE_ACCT_REQUEST
@ FR_TACACS_CODE_AUTZ_REQUEST
@ FR_TACACS_CODE_AUTH_GETDATA
@ FR_TACACS_CODE_AUTH_RESTART
@ FR_TACACS_CODE_AUTZ_PASS_REPLACE
@ FR_TACACS_CODE_AUTH_GETUSER
@ FR_TACACS_CODE_AUTH_GETPASS
@ FR_TACACS_CODE_AUTZ_FAIL
@ FR_TACACS_CODE_AUTH_CONT_ABORT
@ FR_TACACS_CODE_AUTH_PASS
@ FR_TACACS_CODE_AUTH_CONT
@ FR_TACACS_CODE_AUTZ_PASS_ADD
@ FR_TACACS_CODE_AUTH_START
@ FR_TACACS_CODE_AUTH_FAIL
@ FR_TACACS_CODE_AUTH_ERROR
@ FR_TACACS_CODE_AUTZ_ERROR
@ FR_TACACS_CODE_ACCT_SUCCESS
@ FR_TAC_PLUS_ACCT_STATUS_SUCCESS
@ FR_TAC_PLUS_ACCT_STATUS_ERROR
@ FR_TAC_PLUS_AUTHEN_STATUS_PASS
@ FR_TAC_PLUS_AUTHEN_STATUS_GETDATA
@ FR_TAC_PLUS_AUTHEN_STATUS_ERROR
@ FR_TAC_PLUS_AUTHEN_STATUS_GETUSER
@ FR_TAC_PLUS_AUTHEN_STATUS_FAIL
@ FR_TAC_PLUS_AUTHEN_STATUS_RESTART
@ FR_TAC_PLUS_AUTHEN_STATUS_GETPASS
#define talloc_get_type_abort_const
A time delta, a difference in time measured in nanoseconds.
fr_pair_t * fr_pair_list_next(fr_pair_list_t const *list, fr_pair_t const *item))
Get the next item in a valuepair list after a specific entry.
int8_t fr_value_box_cmp(fr_value_box_t const *a, fr_value_box_t const *b)
Compare two values.
int fr_value_box_copy(TALLOC_CTX *ctx, fr_value_box_t *dst, const fr_value_box_t *src)
Copy value data verbatim duplicating any buffers.
static size_t char ** out
int virtual_server_section_attribute_define(CONF_SECTION *server_cs, char const *subcs_name, fr_dict_attr_t const *da)
Define a values for Auth-Type attributes by the sections present in a virtual-server.
#define COMPILE_TERMINATOR
section_name_t const * section
Identifier for the section.
Processing sections which are allowed in this virtual server.