The FreeRADIUS server $Id: 15bac2a4c627c01d1aa2047687b3418955ac7f00 $
Loading...
Searching...
No Matches
proto_dhcpv6.c
Go to the documentation of this file.
1/*
2 * This program is free software; you can redistribute it and/or modify
3 * it under the terms of the GNU General Public License as published by
4 * the Free Software Foundation; either version 2 of the License, or
5 * (at your option) any later version.
6 *
7 * This program is distributed in the hope that it will be useful,
8 * but WITHOUT ANY WARRANTY; without even the implied warranty of
9 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
10 * GNU General Public License for more details.
11 *
12 * You should have received a copy of the GNU General Public License
13 * along with this program; if not, write to the Free Software
14 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
15 */
16
17/**
18 * $Id: 298ab695d907245e8318f7450d71a387c567324a $
19 * @file proto_dhcpv6.c
20 * @brief DHCPV6 master protocol handler.
21 *
22 * @copyright 2020 Network RADIUS SAS (legal@networkradius.com)
23 */
24#define LOG_PREFIX "proto_dhcpv6"
25
26#include <freeradius-devel/io/listen.h>
27#include <freeradius-devel/server/module_rlm.h>
28#include <freeradius-devel/util/debug.h>
29#include "proto_dhcpv6.h"
30
32static int type_parse(TALLOC_CTX *ctx, void *out, void *parent, CONF_ITEM *ci, conf_parser_t const *rule);
33static int transport_parse(TALLOC_CTX *ctx, void *out, void *parent, CONF_ITEM *ci, conf_parser_t const *rule);
34
36 { FR_CONF_OFFSET("Solicit", proto_dhcpv6_t, priorities[FR_DHCPV6_SOLICIT]),
37 .func = cf_table_parse_int, .uctx = &(cf_table_parse_ctx_t){ .table = channel_packet_priority, .len = &channel_packet_priority_len }, .dflt = "normal" },
38 { FR_CONF_OFFSET("Request", proto_dhcpv6_t, priorities[FR_DHCPV6_REQUEST]),
39 .func = cf_table_parse_int, .uctx = &(cf_table_parse_ctx_t){ .table = channel_packet_priority, .len = &channel_packet_priority_len }, .dflt = "normal" },
40 { FR_CONF_OFFSET("Renew", proto_dhcpv6_t, priorities[FR_DHCPV6_RENEW]),
41 .func = cf_table_parse_int, .uctx = &(cf_table_parse_ctx_t){ .table = channel_packet_priority, .len = &channel_packet_priority_len }, .dflt = "normal" },
42 { FR_CONF_OFFSET("Rebind", proto_dhcpv6_t, priorities[FR_DHCPV6_REBIND]),
43 .func = cf_table_parse_int, .uctx = &(cf_table_parse_ctx_t){ .table = channel_packet_priority, .len = &channel_packet_priority_len }, .dflt = "normal" },
44 { FR_CONF_OFFSET("Release", proto_dhcpv6_t, priorities[FR_DHCPV6_RELEASE]),
45 .func = cf_table_parse_int, .uctx = &(cf_table_parse_ctx_t){ .table = channel_packet_priority, .len = &channel_packet_priority_len }, .dflt = "normal" },
46 { FR_CONF_OFFSET("Decline", proto_dhcpv6_t, priorities[FR_DHCPV6_DECLINE]),
47 .func = cf_table_parse_int, .uctx = &(cf_table_parse_ctx_t){ .table = channel_packet_priority, .len = &channel_packet_priority_len }, .dflt = "normal" },
48 { FR_CONF_OFFSET("Information-Request", proto_dhcpv6_t, priorities[FR_DHCPV6_INFORMATION_REQUEST]),
49 .func = cf_table_parse_int, .uctx = &(cf_table_parse_ctx_t){ .table = channel_packet_priority, .len = &channel_packet_priority_len }, .dflt = "normal" },
50 { FR_CONF_OFFSET("Relay-Forward", proto_dhcpv6_t, priorities[FR_DHCPV6_RELAY_FORWARD]),
51 .func = cf_table_parse_int, .uctx = &(cf_table_parse_ctx_t){ .table = channel_packet_priority, .len = &channel_packet_priority_len }, .dflt = "normal" },
53};
54
55static conf_parser_t const limit_config[] = {
56 { FR_CONF_OFFSET("cleanup_delay", proto_dhcpv6_t, io.cleanup_delay), .dflt = "5.0" } ,
57 { FR_CONF_OFFSET("idle_timeout", proto_dhcpv6_t, io.idle_timeout), .dflt = "30.0" } ,
58 { FR_CONF_OFFSET("dynamic_timeout", proto_dhcpv6_t, io.dynamic_timeout), .dflt = "600.0" } ,
59 { FR_CONF_OFFSET("nak_lifetime", proto_dhcpv6_t, io.nak_lifetime), .dflt = "30.0" } ,
60
61 { FR_CONF_OFFSET("max_connections", proto_dhcpv6_t, io.max_connections), .dflt = "1024" } ,
62 { FR_CONF_OFFSET("max_clients", proto_dhcpv6_t, io.max_clients), .dflt = "256" } ,
63 { FR_CONF_OFFSET("max_pending_packets", proto_dhcpv6_t, io.max_pending_packets), .dflt = "256" } ,
64
65 /*
66 * For performance tweaking. NOT for normal humans.
67 */
68 { FR_CONF_OFFSET("max_packet_size", proto_dhcpv6_t, max_packet_size) } ,
69 { FR_CONF_OFFSET("num_messages", proto_dhcpv6_t, num_messages) } ,
70 { FR_CONF_POINTER("priority", 0, CONF_FLAG_SUBSECTION, NULL), .subcs = (void const *) priority_config },
71
73};
74
75static conf_parser_t const log_config[] = {
76 { FR_CONF_OFFSET("ignored_clients", proto_dhcpv6_t, io.log_ignored_clients), .dflt = "yes" } ,
77
79};
80
81/** How to parse a DHCPV6 listen section
82 *
83 */
86 { FR_CONF_OFFSET_TYPE_FLAGS("transport", FR_TYPE_VOID, 0, proto_dhcpv6_t, io.submodule),
87 .func = transport_parse },
88
89 { FR_CONF_POINTER("log", 0, CONF_FLAG_SUBSECTION, NULL), .subcs = (void const *) log_config },
90 { FR_CONF_POINTER("limit", 0, CONF_FLAG_SUBSECTION, NULL), .subcs = (void const *) limit_config },
91
93};
94
95static fr_dict_t const *dict_dhcpv6;
96
99 { .out = &dict_dhcpv6, .proto = "dhcpv6" },
101};
102
105
108 { .out = &attr_packet_type, .name = "Packet-Type", .type = FR_TYPE_UINT32, .dict = &dict_dhcpv6},
109 { .out = &attr_client_id, .name = "Client-Id", .type = FR_TYPE_STRUCT, .dict = &dict_dhcpv6},
111};
112
113/** Translates the packet-type into a submodule name
114 *
115 * @param[in] ctx to allocate data in (instance of proto_dhcpv6).
116 * @param[out] out Where to write a module_instance_t containing the module handle and instance.
117 * @param[in] parent Base structure address.
118 * @param[in] ci #CONF_PAIR specifying the name of the type module.
119 * @param[in] rule unused.
120 * @return
121 * - 0 on success.
122 * - -1 on failure.
123 */
124static int type_parse(UNUSED TALLOC_CTX *ctx, void *out, void *parent,
125 CONF_ITEM *ci, UNUSED conf_parser_t const *rule)
126{
127 proto_dhcpv6_t *inst = talloc_get_type_abort(parent, proto_dhcpv6_t);
128 fr_dict_enum_value_t const *dv;
129 CONF_PAIR *cp;
130 char const *value;
131
132 cp = cf_item_to_pair(ci);
133 value = cf_pair_value(cp);
134
136 if (!dv || (dv->value->vb_uint32 >= FR_DHCPV6_CODE_MAX)) {
137 cf_log_err(ci, "Unknown DHCPv6 packet type '%s'", value);
138 return -1;
139 }
140
141 inst->allowed[dv->value->vb_uint32] = true;
142 *((char const **) out) = value;
143
144 return 0;
145}
146
147static int transport_parse(TALLOC_CTX *ctx, void *out, void *parent, CONF_ITEM *ci, conf_parser_t const *rule)
148{
149 proto_dhcpv6_t *inst = talloc_get_type_abort(parent, proto_dhcpv6_t);
151
152 if (unlikely(virtual_server_listen_transport_parse(ctx, out, parent, ci, rule) < 0)) {
153 return -1;
154 }
155
156 mi = talloc_get_type_abort(*(void **)out, module_instance_t);
157 inst->io.app_io = (fr_app_io_t const *)mi->exported;
158 inst->io.app_io_instance = mi->data;
159 inst->io.app_io_conf = mi->conf;
160
161 return 0;
162}
163
164/** Decode the packet
165 *
166 */
167static int mod_decode(UNUSED void const *instance, request_t *request, uint8_t *const data, size_t data_len)
168{
169 fr_io_track_t const *track = talloc_get_type_abort_const(request->async->packet_ctx, fr_io_track_t);
170 fr_io_address_t const *address = track->address;
171 fr_client_t const *client;
172 fr_packet_t *packet = request->packet;
173
174 RHEXDUMP3(data, data_len, "proto_dhcpv6 decode packet");
175
176 client = address->radclient;
177
178 /*
179 * Hacks for now until we have a lower-level decode routine.
180 */
181 request->packet->code = data[0];
182 request->packet->id = (data[1] << 16) | (data[2] << 8) | data[3];
183 request->reply->id = request->packet->id;
184
185 request->packet->data = talloc_memdup(request->packet, data, data_len);
186 request->packet->data_len = data_len;
187
188 /*
189 * Note that we don't set a limit on max_attributes here.
190 * That MUST be set and checked in the underlying
191 * transport, via a call to fr_dhcpv6_ok().
192 */
193 if (fr_dhcpv6_decode(request->request_ctx, &request->request_pairs, packet->data, packet->data_len) < 0) {
194 RPEDEBUG("Failed decoding packet");
195 return -1;
196 }
197
198 /*
199 * Set the rest of the fields.
200 */
201 request->client = UNCONST(fr_client_t *, client);
202
203 request->packet->socket = address->socket;
204 fr_socket_addr_swap(&request->reply->socket, &address->socket);
205
206 if (fr_packet_pairs_from_packet(request->request_ctx, &request->request_pairs, request->packet) < 0) {
207 RPEDEBUG("Failed decoding 'Net.*' packet");
208 return -1;
209 }
210
211 REQUEST_VERIFY(request);
212
213 return 0;
214}
215
216static ssize_t mod_encode(UNUSED void const *instance, request_t *request, uint8_t *buffer, size_t buffer_len)
217{
218 fr_io_track_t *track = talloc_get_type_abort(request->async->packet_ctx, fr_io_track_t);
219 fr_io_address_t const *address = track->address;
221 fr_dhcpv6_packet_t *original = (fr_dhcpv6_packet_t *) request->packet->data;
222 ssize_t data_len;
223 fr_client_t const *client;
224
225 /*
226 * Process layer NAK, never respond, or "Do not respond".
227 */
228 if ((buffer_len == 1) ||
229 (request->reply->code == FR_DHCPV6_DO_NOT_RESPOND) ||
230 (request->reply->code == 0) || (request->reply->code >= FR_DHCPV6_CODE_MAX)) {
231 track->do_not_respond = true;
232 return 1;
233 }
234
235 client = address->radclient;
236 fr_assert(client);
237
238 /*
239 * Dynamic client stuff
240 */
241 if (client->dynamic && !client->active) {
242 fr_client_t *new_client;
243
244 fr_assert(buffer_len >= sizeof(client));
245
246 /*
247 * We don't accept the new client, so don't do
248 * anything.
249 */
250 if (request->reply->code != FR_DHCPV6_REPLY) {
251 *buffer = true;
252 return 1;
253 }
254
255 /*
256 * Allocate the client. If that fails, send back a NAK.
257 *
258 * @todo - deal with NUMA zones? Or just deal with this
259 * client being in different memory.
260 *
261 * Maybe we should create a CONF_SECTION from the client,
262 * and pass *that* back to mod_write(), which can then
263 * parse it to create the actual client....
264 */
265 new_client = client_afrom_request(NULL, request);
266 if (!new_client) {
267 PERROR("Failed creating new client");
268 buffer[0] = true;
269 return 1;
270 }
271
272 memcpy(buffer, &new_client, sizeof(new_client));
273 return sizeof(new_client);
274 }
275
276 if (buffer_len < 4) {
277 REDEBUG("Output buffer is too small to hold a DHCPv6 packet.");
278 return -1;
279 }
280
281 memset(buffer, 0, buffer_len);
282 memcpy(&reply->transaction_id, &original->transaction_id, sizeof(reply->transaction_id));
283
284 data_len = fr_dhcpv6_encode(&FR_DBUFF_TMP(buffer, buffer_len),
285 request->packet->data, request->packet->data_len,
286 request->reply->code, &request->reply_pairs);
287 if (data_len < 0) {
288 RPEDEBUG("Failed encoding DHCPv6 reply");
289 return -1;
290 }
291
292 /*
293 * ACK the client ID.
294 */
295 if (!fr_dhcpv6_option_find(buffer + 4, buffer + data_len, attr_client_id->attr)) {
296 uint8_t const *client_id;
297
298 client_id = fr_dhcpv6_option_find(request->packet->data + 4, request->packet->data + request->packet->data_len, attr_client_id->attr);
299 if (client_id) {
300 size_t len = fr_nbo_to_uint16(client_id + 2);
301 if (len <= (buffer_len - (data_len + 4))) {
302 memcpy(buffer + data_len, client_id, 4 + len);
303 data_len += 4 + len;
304 }
305 }
306 }
307
308 RHEXDUMP3(buffer, data_len, "proto_dhcpv6 encode packet");
309
310 request->reply->data_len = data_len;
311 return data_len;
312}
313
314static int mod_priority_set(void const *instance, uint8_t const *buffer, UNUSED size_t buflen)
315{
317
318 fr_assert(buffer[0] > 0);
320
321 /*
322 * Disallowed packet
323 */
324 if (!inst->priorities[buffer[0]]) return 0;
325
326 if (!inst->allowed[buffer[0]]) return -1;
327
328 /*
329 * @todo - if we cared, we could also return -1 for "this
330 * is a bad packet". But that's really only for
331 * mod_inject, as we assume that app_io->read() always
332 * returns good packets.
333 */
334
335 /*
336 * Return the configured priority.
337 */
338 return inst->priorities[buffer[0]];
339}
340
341/** Open listen sockets/connect to external event source
342 *
343 * @param[in] instance Ctx data for this application.
344 * @param[in] sc to add our file descriptor to.
345 * @param[in] conf Listen section parsed to give us instance.
346 * @return
347 * - 0 on success.
348 * - -1 on failure.
349 */
350static int mod_open(void *instance, fr_schedule_t *sc, UNUSED CONF_SECTION *conf)
351{
352 proto_dhcpv6_t *inst = talloc_get_type_abort(instance, proto_dhcpv6_t);
353
354 inst->io.app = &proto_dhcpv6;
355 inst->io.app_instance = instance;
356
357 return fr_master_io_listen(&inst->io, sc,
358 inst->max_packet_size, inst->num_messages);
359}
360
361/** Instantiate the application
362 *
363 * Instantiate I/O and type submodules.
364 *
365 * @return
366 * - 0 on success.
367 * - -1 on failure.
368 */
369static int mod_instantiate(module_inst_ctx_t const *mctx)
370{
371 proto_dhcpv6_t *inst = talloc_get_type_abort(mctx->mi->data, proto_dhcpv6_t);
372
373 /*
374 * Ensure that the server CONF_SECTION is always set.
375 */
376 inst->io.server_cs = cf_item_to_section(cf_parent(mctx->mi->conf));
377
378 fr_assert(dict_dhcpv6 != NULL);
380
381 /*
382 * No IO module, it's an empty listener.
383 */
384 if (!inst->io.submodule) return 0;
385
386 /*
387 * These timers are usually protocol specific.
388 */
389 FR_TIME_DELTA_BOUND_CHECK("idle_timeout", inst->io.idle_timeout, >=, fr_time_delta_from_sec(1));
390 FR_TIME_DELTA_BOUND_CHECK("idle_timeout", inst->io.idle_timeout, <=, fr_time_delta_from_sec(600));
391
392 FR_TIME_DELTA_BOUND_CHECK("nak_lifetime", inst->io.nak_lifetime, >=, fr_time_delta_from_sec(1));
393 FR_TIME_DELTA_BOUND_CHECK("nak_lifetime", inst->io.nak_lifetime, <=, fr_time_delta_from_sec(600));
394
395 FR_TIME_DELTA_BOUND_CHECK("cleanup_delay", inst->io.cleanup_delay, <=, fr_time_delta_from_sec(30));
396 FR_TIME_DELTA_BOUND_CHECK("cleanup_delay", inst->io.cleanup_delay, >, fr_time_delta_from_sec(0));
397
398 /*
399 * Tell the master handler about the main protocol instance.
400 */
401 inst->io.app = &proto_dhcpv6;
402 inst->io.app_instance = inst;
403
404 /*
405 * We will need this for dynamic clients and connected sockets.
406 */
407 inst->io.mi = mctx->mi;
408
409 /*
410 * These configuration items are not printed by default,
411 * because normal people shouldn't be touching them.
412 */
413 if (!inst->max_packet_size && inst->io.app_io) inst->max_packet_size = inst->io.app_io->default_message_size;
414
415 if (!inst->num_messages) inst->num_messages = 256;
416
417 FR_INTEGER_BOUND_CHECK("num_messages", inst->num_messages, >=, 32);
418 FR_INTEGER_BOUND_CHECK("num_messages", inst->num_messages, <=, 65535);
419
420 FR_INTEGER_BOUND_CHECK("max_packet_size", inst->max_packet_size, >=, 1024);
421 FR_INTEGER_BOUND_CHECK("max_packet_size", inst->max_packet_size, <=, 65535);
422
423 /*
424 * Instantiate the transport module before calling the
425 * common instantiation function.
426 */
427 if (module_instantiate(inst->io.submodule) < 0) return -1;
428
429 /*
430 * Instantiate the master io submodule
431 */
433}
434
435static int mod_load(void)
436{
437 if (fr_dhcpv6_global_init() < 0) {
438 PERROR("Failed initialising protocol library");
439 return -1;
440 }
441
442 return 0;
443}
444
445static void mod_unload(void)
446{
448}
449
451 .common = {
452 .magic = MODULE_MAGIC_INIT,
453 .name = "dhcpv6",
455 .inst_size = sizeof(proto_dhcpv6_t),
456 .onload = mod_load,
457 .unload = mod_unload,
458
459 .instantiate = mod_instantiate
460 },
461 .dict = &dict_dhcpv6,
462 .open = mod_open,
463 .decode = mod_decode,
464 .encode = mod_encode,
465 .priority = mod_priority_set
466};
static int const char char buffer[256]
Definition acutest.h:578
module_t common
Common fields to all loadable modules.
Definition app_io.h:34
Public structure describing an I/O path for a protocol.
Definition app_io.h:33
module_t common
Common fields provided by all modules.
Definition application.h:72
Describes a new application (protocol)
Definition application.h:71
#define UNCONST(_type, _ptr)
Remove const qualification from a pointer.
Definition build.h:167
#define unlikely(_x)
Definition build.h:383
#define UNUSED
Definition build.h:317
int cf_table_parse_int(UNUSED TALLOC_CTX *ctx, void *out, UNUSED void *parent, CONF_ITEM *ci, conf_parser_t const *rule)
Generic function for parsing conf pair values as int.
Definition cf_parse.c:1636
#define CONF_PARSER_TERMINATOR
Definition cf_parse.h:660
cf_parse_t func
Override default parsing behaviour for the specified type with a custom parsing function.
Definition cf_parse.h:614
#define FR_INTEGER_BOUND_CHECK(_name, _var, _op, _bound)
Definition cf_parse.h:520
#define FR_CONF_OFFSET(_name, _struct, _field)
conf_parser_t which parses a single CONF_PAIR, writing the result to a field in a struct
Definition cf_parse.h:283
#define FR_CONF_POINTER(_name, _type, _flags, _res_p)
conf_parser_t which parses a single CONF_PAIR producing a single global result
Definition cf_parse.h:337
#define FR_CONF_OFFSET_FLAGS(_name, _flags, _struct, _field)
conf_parser_t which parses a single CONF_PAIR, writing the result to a field in a struct
Definition cf_parse.h:271
#define FR_TIME_DELTA_BOUND_CHECK(_name, _var, _op, _bound)
Definition cf_parse.h:531
@ CONF_FLAG_NOT_EMPTY
CONF_PAIR is required to have a non zero length value.
Definition cf_parse.h:450
@ CONF_FLAG_SUBSECTION
Instead of putting the information into a configuration structure, the configuration file routines MA...
Definition cf_parse.h:426
#define FR_CONF_OFFSET_TYPE_FLAGS(_name, _type, _flags, _struct, _field)
conf_parser_t which parses a single CONF_PAIR, writing the result to a field in a struct
Definition cf_parse.h:241
Defines a CONF_PAIR to C data type mapping.
Definition cf_parse.h:597
Common header for all CONF_* types.
Definition cf_priv.h:49
Configuration AVP similar to a fr_pair_t.
Definition cf_priv.h:72
A section grouping multiple CONF_PAIR.
Definition cf_priv.h:101
CONF_SECTION * cf_item_to_section(CONF_ITEM const *ci)
Cast a CONF_ITEM to a CONF_SECTION.
Definition cf_util.c:683
CONF_PAIR * cf_item_to_pair(CONF_ITEM const *ci)
Cast a CONF_ITEM to a CONF_PAIR.
Definition cf_util.c:663
char const * cf_pair_value(CONF_PAIR const *pair)
Return the value of a CONF_PAIR.
Definition cf_util.c:1574
#define cf_log_err(_cf, _fmt,...)
Definition cf_util.h:288
#define cf_parent(_cf)
Definition cf_util.h:101
size_t channel_packet_priority_len
Definition channel.c:170
fr_table_num_sorted_t const channel_packet_priority[]
Definition channel.c:164
#define FR_DBUFF_TMP(_start, _len_or_end)
Creates a compound literal to pass into functions which accept a dbuff.
Definition dbuff.h:524
@ FR_DHCPV6_RELEASE
Definition dhcpv6.h:75
@ FR_DHCPV6_DECLINE
Definition dhcpv6.h:76
@ FR_DHCPV6_DO_NOT_RESPOND
Definition dhcpv6.h:104
@ FR_DHCPV6_REBIND
Definition dhcpv6.h:73
@ FR_DHCPV6_REPLY
Definition dhcpv6.h:74
@ FR_DHCPV6_SOLICIT
Definition dhcpv6.h:68
@ FR_DHCPV6_RENEW
Definition dhcpv6.h:72
@ FR_DHCPV6_INFORMATION_REQUEST
Definition dhcpv6.h:78
@ FR_DHCPV6_REQUEST
Definition dhcpv6.h:70
@ FR_DHCPV6_CODE_MAX
Definition dhcpv6.h:103
@ FR_DHCPV6_RELAY_FORWARD
Definition dhcpv6.h:79
uint8_t transaction_id[3]
Definition dhcpv6.h:116
subtype values for DHCPv4 and DHCPv6
Definition dhcpv6.h:114
fr_dict_attr_t const ** out
Where to write a pointer to the resolved fr_dict_attr_t.
Definition dict.h:294
fr_dict_t const ** out
Where to write a pointer to the loaded/resolved fr_dict_t.
Definition dict.h:307
fr_value_box_t const * value
Enum value (what name maps to).
Definition dict.h:259
#define DICT_AUTOLOAD_TERMINATOR
Definition dict.h:313
fr_dict_enum_value_t const * fr_dict_enum_by_name(fr_dict_attr_t const *da, char const *name, ssize_t len)
Definition dict_util.c:3702
Specifies an attribute which must be present for the module to function.
Definition dict.h:293
Specifies a dictionary which must be loaded/loadable for the module to function.
Definition dict.h:306
Value of an enumerated attribute.
Definition dict.h:255
Test enumeration values.
Definition dict_test.h:92
#define MODULE_MAGIC_INIT
Stop people using different module/library/server versions together.
Definition dl_module.h:63
fr_socket_t socket
src/dst ip and port.
Definition base.h:336
fr_client_t const * radclient
old-style client definition
Definition base.h:338
bool active
for dynamic clients
Definition client.h:120
bool dynamic
Whether the client was dynamically defined.
Definition client.h:119
Describes a host allowed to send packets to the server.
Definition client.h:80
#define PERROR(_fmt,...)
Definition log.h:228
#define RPEDEBUG(fmt,...)
Definition log.h:388
#define RHEXDUMP3(_data, _len, _fmt,...)
Definition log.h:717
int fr_packet_pairs_from_packet(TALLOC_CTX *ctx, fr_pair_list_t *list, fr_packet_t const *packet)
Allocate a "Net." struct with src/dst host and port.
Definition packet.c:91
fr_app_io_t fr_master_app_io
Definition master.c:3343
int fr_master_io_listen(fr_io_instance_t *inst, fr_schedule_t *sc, size_t default_message_size, size_t num_messages)
Definition master.c:3133
fr_io_address_t const * address
of this packet.. shared between multiple packets
Definition master.h:55
bool do_not_respond
don't respond
Definition master.h:51
@ FR_TYPE_UINT32
32 Bit unsigned integer.
@ FR_TYPE_STRUCT
like TLV, but without T or L, and fixed-width children
@ FR_TYPE_VOID
User data.
long int ssize_t
unsigned char uint8_t
#define MODULE_INST_CTX(_mi)
Wrapper to create a module_inst_ctx_t as a compound literal.
Definition module_ctx.h:158
module_instance_t * mi
Instance of the module being instantiated.
Definition module_ctx.h:51
Temporary structure to hold arguments for instantiation calls.
Definition module_ctx.h:50
static uint16_t fr_nbo_to_uint16(uint8_t const data[static sizeof(uint16_t)])
Read an unsigned 16bit integer from wire format (big endian)
Definition nbo.h:146
static int mod_load(void)
static fr_dict_attr_t const * attr_packet_type
static ssize_t mod_encode(UNUSED void const *instance, request_t *request, uint8_t *buffer, size_t buffer_len)
static conf_parser_t const limit_config[]
static int type_parse(TALLOC_CTX *ctx, void *out, void *parent, CONF_ITEM *ci, conf_parser_t const *rule)
fr_app_t proto_dhcpv6
static conf_parser_t const log_config[]
static void mod_unload(void)
fr_dict_attr_autoload_t proto_dhcpv6_dict_attr[]
static int mod_decode(UNUSED void const *instance, request_t *request, uint8_t *const data, size_t data_len)
Decode the packet.
static fr_dict_t const * dict_dhcpv6
static const conf_parser_t priority_config[]
static conf_parser_t const proto_dhcpv6_config[]
How to parse a DHCPV6 listen section.
static int transport_parse(TALLOC_CTX *ctx, void *out, void *parent, CONF_ITEM *ci, conf_parser_t const *rule)
static fr_dict_attr_t const * attr_client_id
fr_dict_autoload_t proto_dhcpv6_dict[]
static int mod_instantiate(module_inst_ctx_t const *mctx)
Instantiate the application.
static int mod_open(void *instance, fr_schedule_t *sc, UNUSED CONF_SECTION *conf)
Open listen sockets/connect to external event source.
static int mod_priority_set(void const *instance, uint8_t const *buffer, UNUSED size_t buflen)
An instance of a proto_dhcpv6 listen section.
void fr_dhcpv6_global_free(void)
Definition base.c:924
uint8_t const * fr_dhcpv6_option_find(uint8_t const *start, uint8_t const *end, unsigned int option)
Definition base.c:247
int fr_dhcpv6_global_init(void)
Definition base.c:900
ssize_t fr_dhcpv6_decode(TALLOC_CTX *ctx, fr_pair_list_t *out, uint8_t const *packet, size_t packet_len)
Decode a DHCPv6 packet.
Definition base.c:582
ssize_t fr_dhcpv6_encode(fr_dbuff_t *dbuff, uint8_t const *original, size_t length, int msg_type, fr_pair_list_t *vps)
Encode a DHCPv6 packet.
Definition base.c:721
#define fr_assert(_expr)
Definition rad_assert.h:38
#define REDEBUG(fmt,...)
static rs_t * conf
Definition radsniff.c:53
#define REQUEST_VERIFY(_x)
Definition request.h:309
The scheduler.
Definition schedule.c:125
CONF_SECTION * conf
Module's instance configuration.
Definition module.h:349
void * data
Module's instance data.
Definition module.h:291
module_instantiate_t instantiate
Callback to allow the module to register any per-instance resources like sockets and file handles.
Definition module.h:227
conf_parser_t const * config
How to convert a CONF_SECTION to a module instance.
Definition module.h:206
module_t * exported
Public module structure.
Definition module.h:296
Module instance data.
Definition module.h:285
static const uchar sc[16]
Definition smbdes.c:115
fr_client_t * client_afrom_request(TALLOC_CTX *ctx, request_t *request)
Create a new client, consuming all attributes in the control list of the request.
Definition client.c:939
int module_instantiate(module_instance_t *instance)
Manually complete module setup by calling its instantiate function.
Definition module.c:1194
eap_aka_sim_process_conf_t * inst
#define talloc_get_type_abort_const
Definition talloc.h:113
static fr_time_delta_t fr_time_delta_from_sec(int64_t sec)
Definition time.h:590
uint8_t * data
Packet data (body).
Definition packet.h:63
size_t data_len
Length of packet data.
Definition packet.h:64
static fr_slen_t parent
Definition pair.h:858
static void fr_socket_addr_swap(fr_socket_t *dst, fr_socket_t const *src)
Swap src/dst information of a fr_socket_t.
Definition socket.h:121
static fr_slen_t data
Definition value.h:1340
static size_t char ** out
Definition value.h:1030
int virtual_server_listen_transport_parse(TALLOC_CTX *ctx, void *out, void *parent, CONF_ITEM *ci, conf_parser_t const *rule)
Generic conf_parser_t func for loading drivers.