The FreeRADIUS server $Id: 15bac2a4c627c01d1aa2047687b3418955ac7f00 $
Loading...
Searching...
No Matches
radclient-ng.c
Go to the documentation of this file.
1/*
2 * This program is free software; you can redistribute it and/or modify
3 * it under the terms of the GNU General Public License as published by
4 * the Free Software Foundation; either version 2 of the License, or
5 * (at your option) any later version.
6 *
7 * This program is distributed in the hope that it will be useful,
8 * but WITHOUT ANY WARRANTY; without even the implied warranty of
9 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
10 * GNU General Public License for more details.
11 *
12 * You should have received a copy of the GNU General Public License
13 * along with this program; if not, write to the Free Software
14 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
15 */
16
17/**
18 * $Id: af6647771c8f934e9fed746e066c387094ea8c27 $
19 *
20 * @file src/bin/radclient.c
21 * @brief General radius client and debug tool.
22 *
23 * @copyright 2000,2006,2014 The FreeRADIUS server project
24 * @copyright 2000 Miquel van Smoorenburg (miquels@cistron.nl)
25 * @copyright 2000 Alan DeKok (aland@freeradius.org)
26 */
27
28RCSID("$Id: af6647771c8f934e9fed746e066c387094ea8c27 $")
29
30#include <freeradius-devel/util/conf.h>
31#include <freeradius-devel/util/syserror.h>
32#include <freeradius-devel/util/atexit.h>
33#include <freeradius-devel/util/pair_legacy.h>
34#include <freeradius-devel/util/time.h>
35#include <freeradius-devel/util/event.h>
36#include <freeradius-devel/server/packet.h>
37#include <freeradius-devel/radius/list.h>
38#include <freeradius-devel/radius/radius.h>
39#include <freeradius-devel/util/chap.h>
40#include <freeradius-devel/radius/client.h>
41
42#ifdef HAVE_OPENSSL_SSL_H
43#include <openssl/ssl.h>
44#include <freeradius-devel/util/md4.h>
45#include <freeradius-devel/util/md5.h>
46#endif
47#include <ctype.h>
48
49#ifdef HAVE_GETOPT_H
50# include <getopt.h>
51#endif
52
53#include <assert.h>
54
55typedef struct request_s request_t; /* to shut up warnings about mschap.h */
56
57#include "smbdes.h"
58#include "mschap.h"
59
60#include "radclient-ng.h"
61
62#define pair_update_request(_attr, _da) do { \
63 _attr = fr_pair_find_by_da(&request->request_pairs, NULL, _da); \
64 if (!_attr) { \
65 _attr = fr_pair_afrom_da(request, _da); \
66 fr_assert(_attr != NULL); \
67 fr_pair_append(&request->request_pairs, _attr); \
68 } \
69 } while (0)
70
71static char *secret = NULL;
72static bool do_output = true;
73
74static const char *attr_coa_filter_name = "User-Name";
75
77
79static int resend_count = 1;
80static bool print_filename = false;
81
82static int forced_id = -1;
83static size_t parallel = 1;
84static bool paused = false;
85
87
89
91
93
94static int ipproto = IPPROTO_UDP;
95
96static bool do_coa = false;
97//static int coafd;
99static fr_rb_tree_t *coa_tree = NULL;
100
101static FR_DLIST_HEAD(rc_request_list) rc_request_list;
102static rc_request_t *current = NULL;
103
104static char const *radclient_version = RADIUSD_VERSION_BUILD("radclient");
105
106static fr_dict_t const *dict_freeradius;
107static fr_dict_t const *dict_radius;
108
109static TALLOC_CTX *autofree = NULL;
110
111extern fr_dict_autoload_t radclient_dict[];
112fr_dict_autoload_t radclient_dict[] = {
113 { .out = &dict_freeradius, .proto = "freeradius" },
114 { .out = &dict_radius, .proto = "radius" },
116};
117
119
123
126
132
135
137
140 { .out = &attr_cleartext_password, .name = "Password.Cleartext", .type = FR_TYPE_STRING, .dict = &dict_freeradius },
141 { .out = &attr_ms_chap_challenge, .name = "Vendor-Specific.Microsoft.CHAP-Challenge", .type = FR_TYPE_OCTETS, .dict = &dict_radius },
142 { .out = &attr_ms_chap_password, .name = "Password.MS-CHAP", .type = FR_TYPE_STRING, .dict = &dict_freeradius },
143 { .out = &attr_ms_chap_response, .name = "Vendor-Specific.Microsoft.CHAP-Response", .type = FR_TYPE_OCTETS, .dict = &dict_radius },
144
145 { .out = &attr_radclient_test_name, .name = "Radclient-Test-Name", .type = FR_TYPE_STRING, .dict = &dict_freeradius },
146 { .out = &attr_request_authenticator, .name = "Request-Authenticator", .type = FR_TYPE_OCTETS, .dict = &dict_freeradius },
147
148 { .out = &attr_radclient_coa_filename, .name = "Radclient-CoA-Filename", .type = FR_TYPE_STRING, .dict = &dict_freeradius },
149 { .out = &attr_radclient_coa_filter, .name = "Radclient-CoA-Filter", .type = FR_TYPE_STRING, .dict = &dict_freeradius },
150
151 { .out = &attr_chap_password, .name = "CHAP-Password", .type = FR_TYPE_OCTETS, .dict = &dict_radius },
152 { .out = &attr_chap_challenge, .name = "CHAP-Challenge", .type = FR_TYPE_OCTETS, .dict = &dict_radius },
153 { .out = &attr_packet_type, .name = "Packet-Type", .type = FR_TYPE_UINT32, .dict = &dict_radius },
154 { .out = &attr_user_password, .name = "User-Password", .type = FR_TYPE_STRING, .dict = &dict_radius },
155 { .out = &attr_user_name, .name = "User-Name", .type = FR_TYPE_STRING, .dict = &dict_radius },
156
158};
159
160static NEVER_RETURNS void usage(void)
161{
162 fprintf(stderr, "Usage: radclient [options] server[:port] <command> [<secret>]\n");
163
164 fprintf(stderr, " <command> One of auth, acct, status, coa, disconnect or auto.\n");
165 fprintf(stderr, " -4 Use IPv4 address of server\n");
166 fprintf(stderr, " -6 Use IPv6 address of server.\n");
167 fprintf(stderr, " -A <attribute> Use named 'attribute' to match CoA requests to packets. Default is User-Name\n");
168 fprintf(stderr, " -C [<client_ip>:]<client_port> Client source port and source IP address. Port values may be 1..65535\n");
169 fprintf(stderr, " -c <count> Send each packet 'count' times.\n");
170 fprintf(stderr, " -d <confdir> Set user dictionary directory (defaults to " CONFDIR ").\n");
171 fprintf(stderr, " -D <dictdir> Set main dictionary directory (defaults to " DICTDIR ").\n");
172 fprintf(stderr, " -f <file>[:<file>] Read packets from file, not stdin.\n");
173 fprintf(stderr, " If a second file is provided, it will be used to verify responses\n");
174 fprintf(stderr, " -F Print the file name, packet number and reply code.\n");
175 fprintf(stderr, " -h Print usage help information.\n");
176 fprintf(stderr, " -i <id> Set request id to 'id'. Values may be 0..255\n");
177 fprintf(stderr, " -o <port> Set CoA listening port (defaults to 3799)\n");
178 fprintf(stderr, " -p <num> Send 'num' packets from a file in parallel.\n");
179 fprintf(stderr, " -P <proto> Use proto (tcp or udp) for transport.\n");
180 fprintf(stderr, " -r <retries> If timeout, retry sending the packet 'retries' times.\n");
181 fprintf(stderr, " -s Print out summary information of auth results.\n");
182 fprintf(stderr, " -S <file> read secret from file, not command line.\n");
183 fprintf(stderr, " -t <timeout> Wait 'timeout' seconds before retrying (may be a floating point number).\n");
184 fprintf(stderr, " -v Show program version information.\n");
185 fprintf(stderr, " -x Debugging mode.\n");
186
187 fr_exit_now(EXIT_SUCCESS);
188}
189
190/*
191 * Free a radclient struct, which may (or may not)
192 * already be in the list.
193 */
194static int _rc_request_free(rc_request_t *request)
195{
196 rc_request_list_remove(&rc_request_list, request);
197
198 if (do_coa) {
199 (void) fr_rb_delete(coa_tree, &request->node);
200 // @todo - cancel incoming CoA packet/
201 }
202
203 if (request->packet && (request->packet->id >= 0)) {
205 }
206
207 return 0;
208}
209
210#ifdef HAVE_OPENSSL_SSL_H
211#include <openssl/provider.h>
212
213static OSSL_PROVIDER *openssl_default_provider = NULL;
214static OSSL_PROVIDER *openssl_legacy_provider = NULL;
215
216static int openssl3_init(void)
217{
218 /*
219 * Load the default provider for most algorithms
220 */
221 openssl_default_provider = OSSL_PROVIDER_load(NULL, "default");
222 if (!openssl_default_provider) {
223 ERROR("(TLS) Failed loading default provider");
224 return -1;
225 }
226
227 /*
228 * Needed for MD4
229 *
230 * https://www.openssl.org/docs/man3.0/man7/migration_guide.html#Legacy-Algorithms
231 */
232 openssl_legacy_provider = OSSL_PROVIDER_load(NULL, "legacy");
233 if (!openssl_legacy_provider) {
234 ERROR("(TLS) Failed loading legacy provider");
235 return -1;
236 }
237
238 fr_md5_openssl_init();
239 fr_md4_openssl_init();
240
241 return 0;
242}
243
244static void openssl3_free(void)
245{
246 if (openssl_default_provider && !OSSL_PROVIDER_unload(openssl_default_provider)) {
247 ERROR("Failed unloading default provider");
248 }
249 openssl_default_provider = NULL;
250
251 if (openssl_legacy_provider && !OSSL_PROVIDER_unload(openssl_legacy_provider)) {
252 ERROR("Failed unloading legacy provider");
253 }
254 openssl_legacy_provider = NULL;
255
256 fr_md5_openssl_free();
257 fr_md4_openssl_free();
258}
259#else
260#define openssl3_init()
261#define openssl3_free()
262#endif
263
264static int _loop_status(UNUSED fr_time_t now, fr_time_delta_t wake, UNUSED void *ctx)
265{
266 if (fr_time_delta_unwrap(wake) < (NSEC / 10)) return 0;
267
268 if (rc_request_list_num_elements(&rc_request_list) != 0) return 0;
269
270 fr_log(&default_log, L_DBG, __FILE__, __LINE__, "Main loop waking up in %pV seconds", fr_box_time_delta(wake));
271
272 return 0;
273}
274
276 char const *password)
277{
278 unsigned int i;
279 uint8_t *p;
280 fr_pair_t *challenge, *reply;
281 uint8_t nthash[16];
282
285
287
288 fr_pair_append(list, challenge);
289
290 MEM(p = talloc_array(challenge, uint8_t, 8));
291 fr_pair_value_memdup_buffer_shallow(challenge, p, false);
292
293 for (i = 0; i < challenge->vp_length; i++) {
294 p[i] = fr_rand();
295 }
296
298 fr_pair_append(list, reply);
299 p = talloc_zero_array(reply, uint8_t, 50); /* really reply->da->flags.length */
301
302 p[1] = 0x01; /* NT hash */
303
304 if (mschap_nt_password_hash(nthash, password) < 0) return 0;
305
306 smbdes_mschap(nthash, challenge->vp_octets, p + 26);
307 return 1;
308}
309
310
311static int getport(char const *name)
312{
313 struct servent *svp;
314
315 svp = getservbyname(name, "udp");
316 if (!svp) return 0;
317
318 return ntohs(svp->s_port);
319}
320
321/*
322 * Set a port from the request type if we don't already have one
323 */
325{
326 switch (type) {
327 default:
331 if (*port == 0) *port = getport("radius");
332 if (*port == 0) *port = FR_AUTH_UDP_PORT;
333 return;
334
336 if (*port == 0) *port = getport("radacct");
337 if (*port == 0) *port = FR_ACCT_UDP_PORT;
338 return;
339
341 if (*port == 0) *port = FR_POD_UDP_PORT;
342 return;
343
345 if (*port == 0) *port = FR_COA_UDP_PORT;
346 return;
347
349 if (*port == 0) *port = 0;
350 return;
351 }
352}
353
354/*
355 * Resolve a port to a request type
356 */
358{
359 /*
360 * getport returns 0 if the service doesn't exist
361 * so we need to return early, to avoid incorrect
362 * codes.
363 */
364 if (port == 0) return FR_RADIUS_CODE_UNDEFINED;
365
366 if ((port == getport("radius")) || (port == FR_AUTH_UDP_PORT) || (port == FR_AUTH_UDP_PORT_ALT)) {
368 }
369 if ((port == getport("radacct")) || (port == FR_ACCT_UDP_PORT) || (port == FR_ACCT_UDP_PORT_ALT)) {
371 }
373
375}
376
377
379{
380 size_t i;
381
382 if (!vp || (vp->vp_type != FR_TYPE_OCTETS)) return true;
383
384 /*
385 * If it's 17 octets, it *might* be already encoded.
386 * Or, it might just be a 17-character password (maybe UTF-8)
387 * Check it for non-printable characters. The odds of ALL
388 * of the characters being 32..255 is (1-7/8)^17, or (1/8)^17,
389 * or 1/(2^51), which is pretty much zero.
390 */
391 for (i = 0; i < vp->vp_length; i++) {
392 if (vp->vp_octets[i] < 32) {
393 return true;
394 }
395 }
396
397 return false;
398}
399
400/** Read one CoA reply and potentially a filter
401 *
402 */
404 FILE *coa_reply, char const *reply_filename, bool *coa_reply_done,
405 FILE *coa_filter, char const *filter_filename, bool *coa_filter_done)
406{
407 rc_request_t *request;
408 fr_pair_t *vp;
409
410 /*
411 * Allocate it.
412 */
413 MEM(request = talloc_zero(parent, rc_request_t));
414 MEM(request->reply = fr_packet_alloc(request, false));
415
416 /*
417 * Don't initialize src/dst IP/port, or anything else. That will be read from the network.
418 */
419 fr_pair_list_init(&request->filter);
422
423 /*
424 * Read the reply VP's.
425 */
427 &request->reply_pairs, coa_reply, coa_reply_done, true) < 0) {
428 REDEBUG("Error parsing \"%s\"", reply_filename);
429 error:
430 talloc_free(request);
431 return -1;
432 }
433
434 /*
435 * The reply can be empty. In which case we just send an empty ACK.
436 */
438 if (vp) request->reply->code = vp->vp_uint32;
439
440 /*
441 * Read in filter VP's.
442 */
443 if (coa_filter) {
445 &request->filter, coa_filter, coa_filter_done, true) < 0) {
446 REDEBUG("Error parsing \"%s\"", filter_filename);
447 goto error;
448 }
449
450 if (*coa_filter_done && !*coa_reply_done) {
451 REDEBUG("Differing number of replies/filters in %s:%s "
452 "(too many replies))", reply_filename, filter_filename);
453 goto error;
454 }
455
456 if (!*coa_filter_done && *coa_reply_done) {
457 REDEBUG("Differing number of replies/filters in %s:%s "
458 "(too many filters))", reply_filename, filter_filename);
459 goto error;
460 }
461
462 /*
463 * This allows efficient list comparisons later
464 */
466 }
467
468 request->name = parent->name;
469
470 /*
471 * Automatically set the response code from the request code
472 * (if one wasn't already set).
473 */
474 if (request->filter_code == FR_RADIUS_CODE_UNDEFINED) {
476 }
477
478 parent->coa = request;
479
480 /*
481 * Ensure that the packet is also tracked in the CoA tree.
482 */
485 ERROR("Failed inserting packet from %s into CoA tree", request->name);
486 fr_exit_now(EXIT_FAILURE);
487 }
488
489 return 0;
490}
491
492/*
493 * Initialize a radclient data structure and add it to
494 * the global linked list.
495 */
496static int radclient_init(TALLOC_CTX *ctx, rc_file_pair_t *files)
497{
498 FILE *packets, *filters = NULL;
499
500 fr_pair_t *vp;
501 rc_request_t *request = NULL;
502 bool packets_done = false;
503 uint64_t num = 0;
504
505 FILE *coa_reply = NULL;
506 FILE *coa_filter = NULL;
507 bool coa_reply_done = false;
508 bool coa_filter_done = false;
509
510 fr_assert(files->packets != NULL);
511
512 /*
513 * Determine where to read the VP's from.
514 */
515 if (strcmp(files->packets, "-") != 0) {
516 packets = fopen(files->packets, "r");
517 if (!packets) {
518 ERROR("Error opening %s: %s", files->packets, fr_syserror(errno));
519 return -1;
520 }
521
522 /*
523 * Read in the pairs representing the expected response.
524 */
525 if (files->filters) {
526 filters = fopen(files->filters, "r");
527 if (!filters) {
528 ERROR("Error opening %s: %s", files->filters, fr_syserror(errno));
529 goto error;
530 }
531 }
532
533 if (files->coa_reply) {
534 coa_reply = fopen(files->coa_reply, "r");
535 if (!coa_reply) {
536 ERROR("Error opening %s: %s", files->coa_reply, fr_syserror(errno));
537 goto error;
538 }
539 }
540
541 if (files->coa_filter) {
542 coa_filter = fopen(files->coa_filter, "r");
543 if (!coa_filter) {
544 ERROR("Error opening %s: %s", files->coa_filter, fr_syserror(errno));
545 goto error;
546 }
547 }
548 } else {
549 packets = stdin;
550 }
551
552 /*
553 * Loop until the file is done.
554 */
555 do {
556 char const *coa_reply_filename = NULL;
557 char const *coa_filter_filename = NULL;
558
559 /*
560 * Allocate it.
561 */
562 MEM(request = talloc_zero(ctx, rc_request_t));
563 MEM(request->packet = fr_packet_alloc(request, true));
564 request->packet->uctx = request;
565
566 /*
567 * Don't set request->packet->socket. The underlying socket isn't open yet.
568 */
569
570 request->files = files;
571 request->packet->id = -1;
572 request->num = num++;
573
574 fr_pair_list_init(&request->filter);
577
578 /*
579 * Read the request VP's.
580 */
582 &request->request_pairs, packets, &packets_done, true) < 0) {
583 char const *input;
584
585 if ((files->packets[0] == '-') && (files->packets[1] == '\0')) {
586 input = "stdin";
587 } else {
588 input = files->packets;
589 }
590
591 REDEBUG("Error parsing \"%s\"", input);
592 goto error;
593 }
594
595 /*
596 * Skip empty entries
597 */
598 if (fr_pair_list_empty(&request->request_pairs)) {
599 WARN("Skipping \"%s\": No Attributes", files->packets);
600 talloc_free(request);
601 continue;
602 }
603
604 /*
605 * Read in filter VP's.
606 */
607 if (filters) {
608 bool filters_done;
609
611 &request->filter, filters, &filters_done, true) < 0) {
612 REDEBUG("Error parsing \"%s\"", files->filters);
613 goto error;
614 }
615
616 if (filters_done && !packets_done) {
617 REDEBUG("Differing number of packets/filters in %s:%s "
618 "(too many requests))", files->packets, files->filters);
619 goto error;
620 }
621
622 if (!filters_done && packets_done) {
623 REDEBUG("Differing number of packets/filters in %s:%s "
624 "(too many filters))", files->packets, files->filters);
625 goto error;
626 }
627
628 vp = fr_pair_find_by_da(&request->filter, NULL, attr_packet_type);
629 if (vp) {
630 request->filter_code = vp->vp_uint32;
631 fr_pair_delete(&request->filter, vp);
632 }
633
634 /*
635 * This allows efficient list comparisons later
636 */
638 }
639
640 /*
641 * Process special attributes
642 */
643 for (vp = fr_pair_list_head(&request->request_pairs);
644 vp;
645 vp = fr_pair_list_next(&request->request_pairs, vp)) {
646 /*
647 * Allow it to set the packet type in
648 * the attributes read from the file.
649 */
650 if (vp->da == attr_packet_type) {
651 request->packet->code = vp->vp_uint32;
652 } else if (vp->da == attr_request_authenticator) {
653 if (vp->vp_length > sizeof(request->packet->vector)) {
654 memcpy(request->packet->vector, vp->vp_octets, sizeof(request->packet->vector));
655 } else {
656 memset(request->packet->vector, 0, sizeof(request->packet->vector));
657 memcpy(request->packet->vector, vp->vp_octets, vp->vp_length);
658 }
659 } else if (vp->da == attr_cleartext_password) {
660 request->password = vp;
661 /*
662 * Keep a copy of the the password attribute.
663 */
664 } else if (vp->da == attr_chap_password) {
665 /*
666 * If it's already hex, do nothing.
667 */
668 if ((vp->vp_length == 17) && (already_hex(vp))) continue;
669
670 /*
671 * CHAP-Password is octets, so it may not be zero terminated.
672 */
674 fr_pair_value_bstrndup(request->password, vp->vp_strvalue, vp->vp_length, true);
675 } else if (vp->da == attr_ms_chap_password) {
677 fr_pair_value_bstrndup(request->password, vp->vp_strvalue, vp->vp_length, true);
678
679 } else if (vp->da == attr_radclient_test_name) {
680 request->name = vp->vp_strvalue;
681
682 /*
683 * Allow these to be dynamically specified
684 * in the request file, as well as on the
685 * command line.
686 */
687 } else if (vp->da == attr_radclient_coa_filename) {
688 coa_reply_filename = vp->vp_strvalue;
689
690 } else if (vp->da == attr_radclient_coa_filter) {
691 coa_filter_filename = vp->vp_strvalue;
692 }
693 } /* loop over the VP's we read in */
694
695 /*
696 * Use the default set on the command line
697 */
698 if (request->packet->code == FR_RADIUS_CODE_UNDEFINED) request->packet->code = packet_code;
699
700 /*
701 * Fill in the packet header from attributes, and then
702 * re-realize the attributes.
703 */
704 fr_packet_net_from_pairs(request->packet, &request->request_pairs);
705
706 /*
707 * Default to the filename
708 */
709 if (!request->name) request->name = request->files->packets;
710
711 /*
712 * Automatically set the response code from the request code
713 * (if one wasn't already set).
714 */
715 if (request->filter_code == FR_RADIUS_CODE_UNDEFINED) {
716 switch (request->packet->code) {
719 break;
720
723 break;
724
727 break;
728
731 break;
732
735 break;
736
738 REDEBUG("Packet-Type must be defined,"
739 "or a well known RADIUS port");
740 goto error;
741
742 default:
743 REDEBUG("Can't determine expected reply.Packet-Type for Packet-Type %i",
744 request->packet->code);
745 goto error;
746 }
747 /*
748 * Automatically set the request code from the response code
749 * (if one wasn't already set).
750 */
751 } else if (request->packet->code == FR_RADIUS_CODE_UNDEFINED) {
752 switch (request->filter_code) {
756 break;
757
760 break;
761
765 break;
766
770 break;
771
772 default:
773 REDEBUG("Can't determine expected Packet-Type for reply.Packet-Type %i",
774 request->filter_code);
775 goto error;
776 }
777 }
778
779 /*
780 * Automatically set the dst port (if one wasn't already set).
781 */
782 radclient_get_port(request->packet->code, &request->packet->socket.inet.dst_port);
783 if (request->packet->socket.inet.dst_port == 0) {
784 REDEBUG("Can't determine destination port");
785 goto error;
786 }
787
788 /*
789 * We expect different responses for Status-Server, depending on which port is being used.
790 */
791 if (request->packet->code == FR_RADIUS_CODE_STATUS_SERVER) {
792 switch (radclient_get_code(request->packet->socket.inet.dst_port)) {
795 break;
796
799 break;
800
801 default:
803 break;
804 }
805 }
806
807 /*
808 * Read in the CoA filename and filter.
809 */
810 if (coa_reply_filename) {
811 if (coa_reply) {
812 RDEBUG("Cannot specify CoA file on both the command line and via Radclient-CoA-Filename");
813 goto error;
814 }
815
816 coa_reply = fopen(coa_reply_filename, "r");
817 if (!coa_reply) {
818 ERROR("Error opening %s: %s", coa_reply_filename, fr_syserror(errno));
819 goto error;
820 }
821
822 if (coa_filter_filename) {
823 coa_filter = fopen(coa_filter_filename, "r");
824 if (!coa_filter) {
825 ERROR("Error opening %s: %s", coa_filter_filename, fr_syserror(errno));
826 goto error;
827 }
828 } else {
829 coa_filter = NULL;
830 }
831
832 /*
833 * Read in one CoA reply and/or filter
834 */
835 if (coa_init(request,
836 coa_reply, coa_reply_filename, &coa_reply_done,
837 coa_filter, coa_filter_filename, &coa_filter_done) < 0) {
838 goto error;
839 }
840
841 fclose(coa_reply);
842 coa_reply = NULL;
843 if (coa_filter) {
844 fclose(coa_filter);
845 coa_filter = NULL;
846 }
847 do_coa = true;
848
849 } else if (coa_reply) {
850 if (coa_init(request,
851 coa_reply, coa_reply_filename, &coa_reply_done,
852 coa_filter, coa_filter_filename, &coa_filter_done) < 0) {
853 goto error;
854 }
855
856 if (coa_reply_done != packets_done) {
857 REDEBUG("Differing number of packets in input file and coa_reply in %s:%s ",
858 files->packets, files->coa_reply);
859 goto error;
860
861 }
862 }
863
864 /*
865 * Add it to the tail of the list.
866 */
867 rc_request_list_insert_tail(&rc_request_list, request);
868
869 /*
870 * Set the destructor so it removes itself from the
871 * request list when freed. We don't set this until
872 * the packet is actually in the list, else we trigger
873 * the asserts in the free callback.
874 */
875 talloc_set_destructor(request, _rc_request_free);
876 } while (!packets_done); /* loop until the file is done. */
877
878 if (packets != stdin) fclose(packets);
879 if (filters) fclose(filters);
880 if (coa_reply) fclose(coa_reply);
881 if (coa_filter) fclose(coa_filter);
882
883 /*
884 * And we're done.
885 */
886 return 0;
887
888error:
889 talloc_free(request);
890
891 if (packets != stdin) fclose(packets);
892 if (filters) fclose(filters);
893 if (coa_reply) fclose(coa_reply);
894 if (coa_filter) fclose(coa_filter);
895
896 return -1;
897}
898
899
900/*
901 * Sanity check each argument.
902 */
903static int radclient_sane(rc_request_t *request)
904{
905 request->packet->socket.inet.src_ipaddr = client_info->fd_info->socket.inet.src_ipaddr;
906 request->packet->socket.inet.src_port = client_info->fd_info->socket.inet.src_port;
907 request->packet->socket.inet.ifindex = client_info->fd_info->socket.inet.ifindex;
908
909 if (request->packet->socket.inet.dst_port == 0) {
910 request->packet->socket.inet.dst_port = fd_config.dst_port;
911 }
912
913 if (request->packet->socket.inet.dst_ipaddr.af == AF_UNSPEC) {
914 if (fd_config.dst_ipaddr.af == AF_UNSPEC) {
915 ERROR("No server was given, and request %" PRIu64 " in file %s did not contain "
916 "Packet-Dst-IP-Address", request->num, request->files->packets);
917 return -1;
918 }
919 request->packet->socket.inet.dst_ipaddr = fd_config.dst_ipaddr;
920 }
921
922 if (request->packet->code == 0) {
923 if (packet_code == -1) {
924 ERROR("Request was \"auto\", and request %" PRIu64 " in file %s did not contain Packet-Type",
925 request->num, request->files->packets);
926 return -1;
927 }
928 request->packet->code = packet_code;
929 }
930
931 request->packet->socket.fd = -1;
932
933 return 0;
934}
935
936
937static int8_t request_cmp(void const *one, void const *two)
938{
939 rc_request_t const *a = one, *b = two;
940 fr_pair_t *vp1, *vp2;
941
943 vp2 = fr_pair_find_by_da(&b->request_pairs, NULL, attr_coa_match_attr);
944
945 if (!vp1) return -1;
946 if (!vp2) return +1;
947
948 return fr_value_box_cmp(&vp1->data, &vp2->data);
949}
950
951static void cleanup(fr_bio_packet_t *client, rc_request_t *request)
952{
953 /*
954 * Don't leave a dangling pointer around.
955 */
956 if (current == request) {
957 current = rc_request_list_prev(&rc_request_list, current);
958 }
959
960 talloc_free(request);
961
962 /*
963 * There are more packets to send, then allow the writer to send them.
964 */
965 if (rc_request_list_num_elements(&rc_request_list) != 0) {
966 return;
967 }
968
969 /*
970 * We're done all packets, and there's nothing more to read, stop.
971 */
972 if (fr_radius_client_bio_outstanding(client) == 0) {
974
976 }
977}
978
980{
981 rc_request_t *request = packet->uctx;
982
983 DEBUG("Timeout - resending packet");
984
985 // @todo - log the updated Acct-Delay-Time from the packet?
986
987 fr_radius_packet_log(&default_log, request->packet, &request->request_pairs, false);
988}
989
991{
992 rc_request_t *request = packet->uctx;
993
994 ERROR("No reply to packet");
995
996 cleanup(client, request);
997}
998
999
1000/*
1001 * Send one packet.
1002 */
1003static int send_one_packet(fr_bio_packet_t *client, rc_request_t *request)
1004{
1005 int rcode;
1006
1007 fr_assert(!request->done);
1008 fr_assert(request->reply == NULL);
1009
1010#ifdef STATIC_ANALYZER
1011 if (!secret) fr_exit_now(EXIT_FAILURE);
1012#endif
1013
1014 fr_assert(request->packet->id < 0);
1015 fr_assert(request->packet->data == NULL);
1016
1017 /*
1018 * Update the password, so it can be encrypted with the
1019 * new authentication vector.
1020 */
1021 if (request->password) {
1022 fr_pair_t *vp;
1023
1024 if ((vp = fr_pair_find_by_da(&request->request_pairs, NULL, attr_chap_password)) != NULL) {
1025 uint8_t buffer[17];
1026 fr_pair_t *challenge;
1027
1028 /*
1029 * Use CHAP-Challenge pair if present, otherwise create CHAP-Challenge and
1030 * populate with current Request Authenticator.
1031 *
1032 * Request Authenticator is re-calculated by fr_packet_sign
1033 */
1034 challenge = fr_pair_find_by_da(&request->request_pairs, NULL, attr_chap_challenge);
1035 if (!challenge || (challenge->vp_length < 7)) {
1037 fr_pair_value_memdup(challenge, request->packet->vector, RADIUS_AUTH_VECTOR_LENGTH, false);
1038 }
1039
1041 fr_rand() & 0xff, challenge->vp_octets, challenge->vp_length,
1042 request->password->vp_strvalue,
1043 request->password->vp_length);
1044 fr_pair_value_memdup(vp, buffer, sizeof(buffer), false);
1045
1046 } else if (fr_pair_find_by_da_nested(&request->request_pairs, NULL, attr_ms_chap_password) != NULL) {
1047 mschapv1_encode(request->packet, &request->request_pairs, request->password->vp_strvalue);
1048
1049 } else {
1050 DEBUG("WARNING: No password in the request");
1051 }
1052 }
1053
1054 request->timestamp = fr_time();
1055 request->tries = 1;
1056
1057 /*
1058 * Ensure that each Access-Request is unique.
1059 */
1060 if (request->packet->code == FR_RADIUS_CODE_ACCESS_REQUEST) {
1061 fr_rand_buffer(request->packet->vector, sizeof(request->packet->vector));
1062 }
1063
1064 /*
1065 * Send the current packet.
1066 */
1067 rcode = fr_bio_packet_write(client, request, request->packet, &request->request_pairs);
1068 if (rcode < 0) {
1069 /*
1070 * Failed writing it. Try again later.
1071 */
1072 if (rcode == fr_bio_error(IO_WOULD_BLOCK)) return 0;
1073
1074 REDEBUG("Failed writing packet - %s", fr_strerror());
1075 return -1;
1076 }
1077
1078 fr_radius_packet_log(&default_log, request->packet, &request->request_pairs, false);
1079
1080 return 0;
1081}
1082
1085 { 0 }
1086};
1087
1090 { 0 }
1091};
1092
1093
1095{
1097
1099 return fr_bio_error(GENERIC);
1100 }
1101
1102 return 0;
1103}
1104
1106{
1108
1110 return fr_bio_error(GENERIC);
1111 }
1112
1113 return 1;
1114}
1115
1116
1118{
1119 ERROR("Failed connecting to server");
1120
1121 /*
1122 * Cleanly close the BIO, so that we exercise the shutdown path.
1123 */
1124 fr_assert(bio == client_bio);
1125 TALLOC_FREE(bio);
1126
1127 fr_exit_now(EXIT_FAILURE);
1128}
1129
1130
1132 int fd_errno, void *uctx)
1133{
1134 fr_bio_packet_t *client = uctx;
1135
1136 ERROR("Failed in connection - %s", fr_syserror(fd_errno));
1137
1138 /*
1139 * Cleanly close the BIO, so that we exercise the shutdown path.
1140 */
1141 fr_assert(client == client_bio);
1142 TALLOC_FREE(client);
1143
1144 fr_exit_now(EXIT_FAILURE);
1145}
1146
1147static void client_read(fr_event_list_t *el, int fd, UNUSED int flags, void *uctx)
1148{
1149 fr_bio_packet_t *client = uctx;
1150 rc_request_t *request;
1152 fr_packet_t *reply;
1153 int rcode;
1154
1156
1157 /*
1158 * Read one packet.
1159 */
1160 rcode = fr_bio_packet_read(client, (void **) &request, &reply, client, &reply_pairs);
1161 if (rcode < 0) {
1162 ERROR("Failed reading packet - %s", fr_bio_strerror(rcode));
1163 fr_exit_now(EXIT_FAILURE);
1164 }
1165
1166 /*
1167 * Not a RADIUS packet, or not a reply to a packet we sent.
1168 */
1169 if (!rcode) return;
1170
1172
1173 if (print_filename) {
1174 RDEBUG("%s response code %d", request->files->packets, reply->code);
1175 }
1176
1177 /*
1178 * Increment counters...
1179 */
1180 switch (reply->code) {
1185 stats.accepted++;
1186 break;
1187
1189 break;
1190
1191 default:
1192 stats.rejected++;
1193 }
1194
1195 fr_strerror_clear(); /* Clear strerror buffer */
1196
1197 /*
1198 * If we had an expected response code, check to see if the
1199 * packet matched that.
1200 */
1201 if ((request->filter_code != FR_RADIUS_CODE_UNDEFINED) && (reply->code != request->filter_code)) {
1202 if (FR_RADIUS_PACKET_CODE_VALID(reply->code)) {
1203 REDEBUG("%s: Expected %s got %s", request->name, fr_radius_packet_name[request->filter_code],
1204 fr_radius_packet_name[reply->code]);
1205 } else {
1206 REDEBUG("%s: Expected %u got %i", request->name, request->filter_code,
1207 reply->code);
1208 }
1209 stats.failed++;
1210 /*
1211 * Check if the contents of the packet matched the filter
1212 */
1213 } else if (fr_pair_list_empty(&request->filter)) {
1214 stats.passed++;
1215 } else {
1216 fr_pair_t const *failed[2];
1217
1219 if (fr_pair_validate(failed, &request->filter, &reply_pairs)) {
1220 RDEBUG("%s: Response passed filter", request->name);
1221 stats.passed++;
1222 } else {
1223 fr_pair_validate_debug(failed);
1224 REDEBUG("%s: Response for failed filter", request->name);
1225 stats.failed++;
1226 }
1227 }
1228
1229 /*
1230 * The retry bio takes care of suppressing duplicate replies.
1231 */
1232 if (paused) {
1234 fr_perror("radclient");
1235 fr_exit_now(EXIT_FAILURE);
1236 }
1237 paused = false;
1238 }
1239
1240 /*
1241 * If we're not done, then leave this packet in the list for future resending.
1242 */
1243 request->done = (request->resend >= resend_count);
1244 if (!request->done) {
1245 /*
1246 * We don't care about duplicate replies, they can go away.
1247 */
1248 (void) fr_radius_client_fd_bio_cancel(client, request->packet);
1249 request->packet->id = -1;
1250 TALLOC_FREE(request->packet->data);
1251 return;
1252 }
1253
1254 fr_packet_free(&reply);
1255
1256 cleanup(client, request);
1257}
1258
1259static void client_write(fr_event_list_t *el, int fd, UNUSED int flags, void *uctx)
1260{
1261 fr_bio_packet_t *client = uctx;
1262 rc_request_t *request;
1263
1264 request = rc_request_list_next(&rc_request_list, current);
1265 fr_assert(!paused);
1266
1267 if (!request) request = rc_request_list_head(&rc_request_list);
1268
1269 /*
1270 * Nothing more to send, stop trying to write packets.
1271 */
1272 if (!request) {
1273 pause:
1275 fr_perror("radclient");
1276 fr_exit_now(EXIT_FAILURE);
1277 }
1278 return;
1279 }
1280
1281 /*
1282 * No more packets to send, we pause the read.
1283 */
1284 if (request->packet->id >= 0) {
1285 paused = true;
1286 goto pause;
1287 }
1288
1289 if (send_one_packet(client, request) < 0) {
1290 fr_perror("radclient");
1291 fr_exit_now(EXIT_FAILURE);
1292 }
1293
1294 request->resend++;
1295 current = request;
1296
1297 /*
1298 * 0 means "don't limit requests".
1299 */
1301 paused = true;
1302 goto pause;
1303 }
1304}
1305
1307{
1308 fr_radius_client_bio_info_t const *info;
1309
1310 info = fr_radius_client_bio_info(client);
1311
1312 if (fr_event_fd_insert(autofree, NULL, info->retry_info->el, info->fd_info->socket.fd,
1313 client_read, client_write, client_error, client) < 0) {
1314 fr_perror("radclient");
1315 fr_exit_now(EXIT_FAILURE);
1316 }
1317}
1318
1319
1320/**
1321 *
1322 * @hidecallgraph
1323 */
1324int main(int argc, char **argv)
1325{
1326 int ret = EXIT_SUCCESS;
1327 int c;
1328 char const *confdir = CONFDIR;
1329 char const *dict_dir = DICTDIR;
1330 char *end;
1331 char filesecret[256];
1332 FILE *fp;
1333 int do_summary = false;
1334 fr_dlist_head_t filenames;
1335
1336 int retries = 5;
1338
1339 /*
1340 * It's easier having two sets of flags to set the
1341 * verbosity of library calls and the verbosity of
1342 * radclient.
1343 */
1344 fr_debug_lvl = 0;
1345 fr_log_fp = stdout;
1346
1347 /*
1348 * Must be called first, so the handler is called last
1349 */
1351
1352 fr_time_start();
1353
1355#ifndef NDEBUG
1356 if (fr_fault_setup(autofree, getenv("PANIC_ACTION"), argv[0]) < 0) {
1357 fr_perror("radclient");
1358 fr_exit_now(EXIT_FAILURE);
1359 }
1360#endif
1361
1362#ifdef STATIC_ANALYZER
1363 /*
1364 * clang scan thinks that fr_fault_setup() will set autofree=NULL.
1365 */
1366 if (!autofree) fr_exit_now(EXIT_FAILURE);
1367#endif
1368
1369 talloc_set_log_stderr();
1370
1371 rc_request_list_talloc_init(&rc_request_list);
1372
1373 fr_dlist_talloc_init(&filenames, rc_file_pair_t, entry);
1374
1375 /*
1376 * Always log to stdout
1377 */
1379 default_log.fd = STDOUT_FILENO;
1380 default_log.print_level = false;
1381
1382 /*
1383 * Initialize the kind of socket we want.
1384 */
1387 .socket_type = SOCK_DGRAM,
1388
1389 .src_ipaddr = (fr_ipaddr_t) {
1390 .af = AF_INET,
1391 },
1392 .dst_ipaddr = (fr_ipaddr_t) {
1393 .af = AF_INET,
1394 },
1395
1396 .src_port = 0,
1397 .dst_port = 1812,
1398
1399 .interface = NULL,
1400
1401 .path = NULL,
1402 .filename = NULL,
1403
1404 .async = true,
1405 };
1406
1407 /*
1408 * Initialize the client configuration.
1409 */
1411 .log = &default_log,
1412 .verify = {
1413 .require_message_authenticator = false,
1414 .max_attributes = RADIUS_MAX_ATTRIBUTES,
1415 .max_packet_size = 4096,
1416 },
1417 };
1418
1419 /***********************************************************************
1420 *
1421 * Parse command-line options.
1422 *
1423 ***********************************************************************/
1424
1425 while ((c = getopt(argc, argv, "46A:c:C:d:D:f:Fi:ho:p:P:r:sS:t:vx")) != -1) switch (c) {
1426 case '4':
1427 fd_config.dst_ipaddr.af = AF_INET;
1428 break;
1429
1430 case '6':
1431 fd_config.dst_ipaddr.af = AF_INET6;
1432 break;
1433
1434 case 'A':
1435 attr_coa_filter_name = optarg;
1436 break;
1437
1438 case 'c':
1439 if (!isdigit((uint8_t) *optarg)) usage();
1440
1441 resend_count = atoi(optarg);
1442
1443 if (resend_count < 1) usage();
1444 break;
1445
1446 case 'C':
1447 {
1448 int tmp;
1449
1450 if (strchr(optarg, ':')) {
1452 optarg, -1, AF_UNSPEC, true, false) < 0) {
1453 fr_perror("Failed parsing source address");
1454 fr_exit_now(EXIT_FAILURE);
1455 }
1456 break;
1457 }
1458
1459 tmp = atoi(optarg);
1460 if (tmp < 1 || tmp > 65535) usage();
1461
1463 }
1464 break;
1465
1466 case 'D':
1467 dict_dir = optarg;
1468 break;
1469
1470 case 'd':
1471 confdir = optarg;
1472 break;
1473
1474 /*
1475 * packet,filter
1476 */
1477 case 'f':
1478 {
1479 char const *p;
1480 rc_file_pair_t *files;
1481
1482 MEM(files = talloc_zero(talloc_autofree_context(), rc_file_pair_t));
1483
1484 /*
1485 * Commas are nicer than colons.
1486 */
1487 c = ':';
1488
1489 p = strchr(optarg, c);
1490 if (!p) {
1491 c = ',';
1492 p = strchr(optarg, c);
1493 }
1494 if (!p) {
1495 files->packets = optarg;
1496 files->filters = NULL;
1497 } else {
1498 MEM(files->packets = talloc_strndup(files, optarg, p - optarg));
1499 files->filters = p + 1;
1500 }
1501 fr_dlist_insert_tail(&filenames, files);
1502 }
1503 break;
1504
1505 case 'F':
1506 print_filename = true;
1507 break;
1508
1509 case 'i':
1510 if (!isdigit((uint8_t) *optarg)) {
1511 usage();
1512 }
1513 forced_id = atoi(optarg);
1514 if ((forced_id < 0) || (forced_id > 255)) {
1515 usage();
1516 }
1517 break;
1518
1519 case 'o':
1520 coa_port = atoi(optarg);
1521 if (!coa_port || (coa_port > 65535)) usage();
1522 break;
1523
1524 /*
1525 * Note that sending MANY requests in
1526 * parallel can over-run the kernel
1527 * queues, and Linux will happily discard
1528 * packets. So even if the server responds,
1529 * the client may not see the reply.
1530 */
1531 case 'p':
1532 parallel = strtoul(optarg, &end, 10);
1533 if (*end) usage();
1534 if (parallel > 65536) usage();
1535 break;
1536
1537 case 'P':
1538 if (!strcmp(optarg, "tcp")) {
1539 fd_config.socket_type = SOCK_STREAM;
1540 ipproto = IPPROTO_TCP;
1541 } else if (!strcmp(optarg, "udp")) {
1542 fd_config.socket_type = SOCK_DGRAM;
1543 ipproto = IPPROTO_UDP;
1544 } else {
1545 usage();
1546 }
1547 break;
1548
1549 case 'r':
1550 if (!isdigit((uint8_t) *optarg)) usage();
1551 retries = atoi(optarg);
1552 if ((retries == 0) || (retries > 1000)) usage();
1553 break;
1554
1555 case 's':
1556 do_summary = true;
1557 break;
1558
1559 case 'S':
1560 {
1561 char *p;
1562 fp = fopen(optarg, "r");
1563 if (!fp) {
1564 ERROR("Error opening %s: %s", optarg, fr_syserror(errno));
1565 fr_exit_now(EXIT_FAILURE);
1566 }
1567 if (fgets(filesecret, sizeof(filesecret), fp) == NULL) {
1568 ERROR("Error reading %s: %s", optarg, fr_syserror(errno));
1569 fr_exit_now(EXIT_FAILURE);
1570 }
1571 fclose(fp);
1572
1573 /* truncate newline */
1574 p = filesecret + strlen(filesecret) - 1;
1575 while ((p >= filesecret) &&
1576 (*p < ' ')) {
1577 *p = '\0';
1578 --p;
1579 }
1580
1581 if (strlen(filesecret) < 2) {
1582 ERROR("Secret in %s is too short", optarg);
1583 fr_exit_now(EXIT_FAILURE);
1584 }
1585 secret = talloc_strdup(autofree, filesecret);
1587 client_config.verify.secret_len = talloc_array_length(secret) - 1;
1588 }
1589 break;
1590
1591 case 't':
1592 if (fr_time_delta_from_str(&timeout, optarg, strlen(optarg), FR_TIME_RES_SEC) < 0) {
1593 fr_perror("Failed parsing timeout value");
1594 fr_exit_now(EXIT_FAILURE);
1595 }
1596 break;
1597
1598 case 'v':
1599 fr_debug_lvl = 1;
1600 DEBUG("%s", radclient_version);
1601 fr_exit_now(0);
1602
1603 case 'x':
1604 fr_debug_lvl++;
1605 if (fr_debug_lvl > 1) default_log.print_level = true;
1606 break;
1607
1608 case 'h':
1609 default:
1610 usage();
1611 }
1612 argc -= (optind - 1);
1613 argv += (optind - 1);
1614
1615 if ((argc < 3) || ((secret == NULL) && (argc < 4))) {
1616 ERROR("Insufficient arguments");
1617 usage();
1618 }
1619
1620 /*
1621 * Get the request type
1622 */
1623 if (!isdigit((uint8_t) argv[2][0])) {
1625 if (packet_code == -2) {
1626 ERROR("Unrecognised request type \"%s\"", argv[2]);
1627 usage();
1628 }
1629 } else {
1630 packet_code = atoi(argv[2]);
1631 }
1632
1633 fr_assert(packet_code != 0);
1635
1636 /*
1637 * Initialize the retry configuration for this type of packet.
1638 */
1641
1643 .irt = timeout,
1644 .mrt = fr_time_delta_from_sec(16),
1645 .mrd = (retries == 1) ? timeout : fr_time_delta_from_sec(30),
1646 .mrc = retries,
1647 };
1649
1650 /*
1651 * Resolve hostname.
1652 */
1653 if (strcmp(argv[1], "-") != 0) {
1654 if (fr_inet_pton_port(&fd_config.dst_ipaddr, &fd_config.dst_port, argv[1], -1, fd_config.dst_ipaddr.af, true, true) < 0) {
1655 fr_perror("radclient");
1656 fr_exit_now(EXIT_FAILURE);
1657 }
1658
1659 /*
1660 * Work backwards from the port to determine the packet type
1661 */
1663 }
1665
1666 /*
1667 * Add the secret.
1668 */
1669 if (argv[3]) {
1670 secret = talloc_strdup(autofree, argv[3]);
1672 client_config.verify.secret_len = talloc_array_length(secret) - 1;
1673 }
1674
1675 /***********************************************************************
1676 *
1677 * We're done parsing command-line options, bootstrap the various libraries, etc.
1678 *
1679 ***********************************************************************/
1680
1682 fr_perror("radclient");
1683 fr_exit_now(EXIT_FAILURE);
1684 }
1685
1686 if (!fr_dict_global_ctx_init(NULL, true, dict_dir)) {
1687 fr_perror("radclient");
1688 fr_exit_now(EXIT_FAILURE);
1689 }
1690
1691 if (fr_radius_global_init() < 0) {
1692 fr_perror("radclient");
1693 fr_exit_now(EXIT_FAILURE);
1694 }
1695
1696 if (fr_dict_autoload(radclient_dict) < 0) {
1697 fr_perror("radclient");
1698 exit(EXIT_FAILURE);
1699 }
1700
1702 fr_perror("radclient");
1703 exit(EXIT_FAILURE);
1704 }
1705
1707 fr_log_perror(&default_log, L_ERR, __FILE__, __LINE__, NULL,
1708 "Failed to initialize the dictionaries");
1709 exit(EXIT_FAILURE);
1710 }
1711
1712 if (do_coa) {
1714 if (!attr_coa_match_attr) {
1715 ERROR("Unknown or invalid CoA filter attribute %s", optarg);
1716 fr_exit_now(EXIT_FAILURE);
1717 }
1718
1719 /*
1720 * If there's no attribute given to match CoA to requests, use User-Name
1721 */
1723
1725 }
1727
1728 openssl3_init();
1729
1731
1732 /***********************************************************************
1733 *
1734 * We're done bootstrapping the libraries and dictionaries, read the input files.
1735 *
1736 ***********************************************************************/
1737
1738 /*
1739 * If no '-f' is specified, then we are reading from stdin.
1740 */
1741 if (fr_dlist_num_elements(&filenames) == 0) {
1742 rc_file_pair_t *files;
1743
1744 files = talloc_zero(talloc_autofree_context(), rc_file_pair_t);
1745 files->packets = "-";
1746 if (radclient_init(files, files) < 0) fr_exit_now(EXIT_FAILURE);
1747 }
1748
1749 if ((forced_id >= 0) && (fr_dlist_num_elements(&filenames) > 1)) {
1750 usage();
1751 }
1752
1753 /*
1754 * Walk over the list of filenames, creating the requests.
1755 */
1756 fr_dlist_foreach(&filenames, rc_file_pair_t, files) {
1757 if (radclient_init(files, files)) {
1758 ERROR("Failed parsing input files");
1759 fr_exit_now(EXIT_FAILURE);
1760 }
1761 }
1762
1763 /*
1764 * No packets were read. Die.
1765 */
1766 if (!rc_request_list_num_elements(&rc_request_list)) {
1767 ERROR("Nothing to send");
1768 fr_exit_now(EXIT_FAILURE);
1769 }
1770
1771 /***********************************************************************
1772 *
1773 * We're done reading files, open the socket, event loop, and start sending packets.
1774 *
1775 ***********************************************************************/
1776
1778 (fr_debug_lvl >= 2) ? _loop_status : NULL,
1779 NULL);
1780 if (!client_config.el) {
1781 ERROR("Failed opening event list: %s", fr_strerror());
1782 fr_exit_now(EXIT_FAILURE);
1783 }
1785
1786 /*
1787 * Set callbacks so that the socket is automatically
1788 * paused or resumed when the socket becomes writeable.
1789 */
1792 .failed = client_bio_failed,
1793
1794 .write_blocked = client_bio_write_pause,
1795 .write_resume = client_bio_write_resume,
1796
1797 .retry = (fr_debug_lvl > 0) ? client_packet_retry_log : NULL,
1798 .release = client_packet_release,
1799 };
1800
1801#ifdef STATIC_ANALYZER
1802 if (!autofree) fr_exit_now(EXIT_FAILURE);
1803#endif
1804
1805 /*
1806 * Open the RADIUS client bio, and then get the information associated with it.
1807 */
1809 if (!client_bio) {
1810 ERROR("Failed opening socket: %s", fr_strerror());
1811 fr_exit_now(EXIT_FAILURE);
1812 }
1813
1815 fr_assert(client_info != NULL);
1816
1817 if (forced_id >= 0) {
1819 fr_perror("radclient");
1820 fr_exit_now(EXIT_FAILURE);
1821 }
1822 }
1823
1824 if (do_coa) {
1825 // allocate a dedup server bio
1826 }
1827
1828 /*
1829 * Walk over the list of packets, updating to use the correct addresses, and sanity checking them.
1830 */
1831 rc_request_list_foreach(&rc_request_list, this) {
1832 if (radclient_sane(this) < 0) {
1833 fr_exit_now(EXIT_FAILURE);
1834 }
1835 }
1836
1837 /*
1838 * Always bounce through a connect(), even if we don't need it.
1839 *
1840 * Once the connect() passes, we start reading from the request list, and processing packets.
1841 */
1844 fr_perror("radclient");
1845 fr_exit_now(EXIT_FAILURE);
1846 }
1847
1848 /***********************************************************************
1849 *
1850 * Run the main event loop until we either see an error, or we have sent (and received) all of the packets.
1851 *
1852 ***********************************************************************/
1854
1855 /***********************************************************************
1856 *
1857 * We are done the event loop. Start cleaning things up.
1858 *
1859 ***********************************************************************/
1860 rc_request_list_talloc_free(&rc_request_list);
1861
1863
1865
1866 if (fr_dict_autofree(radclient_dict) < 0) {
1867 fr_perror("radclient");
1868 ret = EXIT_FAILURE;
1869 }
1870
1872
1874
1875 if (do_summary) {
1876 fr_perror("Packet summary:\n"
1877 "\tAccepted : %" PRIu64 "\n"
1878 "\tRejected : %" PRIu64 "\n"
1879 "\tLost : %" PRIu64 "\n"
1880 "\tPassed filter : %" PRIu64 "\n"
1881 "\tFailed filter : %" PRIu64,
1884 stats.lost,
1885 stats.passed,
1887 );
1888 }
1889
1890 /*
1891 * Ensure our atexit handlers run before any other
1892 * atexit handlers registered by third party libraries.
1893 */
1895
1896 openssl3_free();
1897
1898 if ((stats.lost > 0) || (stats.failed > 0)) return EXIT_FAILURE;
1899
1900 return ret;
1901}
static int const char char buffer[256]
Definition acutest.h:578
int fr_atexit_global_setup(void)
Setup the atexit handler, should be called at the start of a program's execution.
Definition atexit.c:160
int fr_atexit_global_trigger_all(void)
Cause all global free triggers to fire.
Definition atexit.c:286
static TALLOC_CTX * autofree
Definition fuzzer.c:46
#define fr_bio_error(_x)
Definition base.h:200
static int fr_bio_packet_read(fr_bio_packet_t *my, void **pctx_p, fr_packet_t **packet_p, TALLOC_CTX *out_ctx, fr_pair_list_t *out)
Read a packet from a packet BIO.
Definition packet.h:119
fr_bio_packet_callback_t connected
Definition packet.h:71
static int fr_bio_packet_write(fr_bio_packet_t *my, void *pctx, fr_packet_t *packet, fr_pair_list_t *list)
Write a packet to a packet BIO.
Definition packet.h:138
fr_event_list_t * el
event list
Definition retry.h:51
fr_retry_config_t retry_config
base retry config
Definition retry.h:47
fr_event_list_t * el
event list
Definition retry.h:45
#define RCSID(id)
Definition build.h:487
#define NEVER_RETURNS
Should be placed before the function return type.
Definition build.h:315
#define UNUSED
Definition build.h:317
void fr_chap_encode(uint8_t out[static 1+FR_CHAP_CHALLENGE_LENGTH], uint8_t id, uint8_t const *challenge, size_t challenge_len, char const *password, size_t password_len)
Encode a CHAP password.
Definition chap.c:34
int fr_fault_setup(TALLOC_CTX *ctx, char const *cmd, char const *program)
Registers signal handlers to execute panic_action on fatal signal.
Definition debug.c:1056
#define MEM(x)
Definition debug.h:36
#define fr_exit_now(_x)
Exit without calling atexit() handlers, producing a log message in debug builds.
Definition debug.h:226
fr_radius_packet_code_t
RADIUS packet codes.
Definition defs.h:31
@ FR_RADIUS_CODE_ACCESS_CHALLENGE
RFC2865 - Access-Challenge.
Definition defs.h:43
@ FR_RADIUS_CODE_ACCESS_REQUEST
RFC2865 - Access-Request.
Definition defs.h:33
@ FR_RADIUS_CODE_DISCONNECT_REQUEST
RFC3575/RFC5176 - Disconnect-Request.
Definition defs.h:46
@ FR_RADIUS_CODE_MAX
Maximum possible protocol code.
Definition defs.h:53
@ FR_RADIUS_CODE_DISCONNECT_ACK
RFC3575/RFC5176 - Disconnect-Ack (positive)
Definition defs.h:47
@ FR_RADIUS_CODE_STATUS_SERVER
RFC2865/RFC5997 - Status Server (request)
Definition defs.h:44
@ FR_RADIUS_CODE_COA_REQUEST
RFC3575/RFC5176 - CoA-Request.
Definition defs.h:49
@ FR_RADIUS_CODE_ACCESS_ACCEPT
RFC2865 - Access-Accept.
Definition defs.h:34
@ FR_RADIUS_CODE_ACCOUNTING_RESPONSE
RFC2866 - Accounting-Response.
Definition defs.h:37
@ FR_RADIUS_CODE_COA_NAK
RFC3575/RFC5176 - CoA-Nak (not willing to perform)
Definition defs.h:51
@ FR_RADIUS_CODE_UNDEFINED
Packet code has not been set.
Definition defs.h:32
@ FR_RADIUS_CODE_COA_ACK
RFC3575/RFC5176 - CoA-Ack (positive)
Definition defs.h:50
@ FR_RADIUS_CODE_DISCONNECT_NAK
RFC3575/RFC5176 - Disconnect-Nak (not willing to perform)
Definition defs.h:48
@ FR_RADIUS_CODE_ACCOUNTING_REQUEST
RFC2866 - Accounting-Request.
Definition defs.h:36
@ FR_RADIUS_CODE_ACCESS_REJECT
RFC2865 - Access-Reject.
Definition defs.h:35
#define FR_COA_UDP_PORT
Definition defs.h:63
#define FR_AUTH_UDP_PORT
Definition defs.h:57
#define FR_ACCT_UDP_PORT_ALT
Definition defs.h:60
#define FR_AUTH_UDP_PORT_ALT
Definition defs.h:58
#define FR_POD_UDP_PORT
Definition defs.h:61
#define FR_ACCT_UDP_PORT
Definition defs.h:59
#define ERROR(fmt,...)
Definition dhcpclient.c:41
static fr_dict_t const * dict_freeradius
Definition dhcpclient.c:79
static int retries
Definition dhcpclient.c:53
#define DEBUG(fmt,...)
Definition dhcpclient.c:39
fr_dict_t * fr_dict_unconst(fr_dict_t const *dict)
Coerce to non-const.
Definition dict_util.c:4910
#define fr_dict_autofree(_to_free)
Definition dict.h:917
fr_dict_attr_t const * fr_dict_attr_by_name(fr_dict_attr_err_t *err, fr_dict_attr_t const *parent, char const *attr))
Locate a fr_dict_attr_t by its name.
Definition dict_util.c:3535
fr_dict_attr_t const * fr_dict_root(fr_dict_t const *dict)
Return the root attribute of a dictionary.
Definition dict_util.c:2672
fr_dict_attr_t const ** out
Where to write a pointer to the resolved fr_dict_attr_t.
Definition dict.h:294
fr_dict_t const ** out
Where to write a pointer to the loaded/resolved fr_dict_t.
Definition dict.h:307
int fr_dict_read(fr_dict_t *dict, char const *dict_dir, char const *filename))
Read supplementary attribute definitions into an existing dictionary.
int fr_dict_attr_autoload(fr_dict_attr_autoload_t const *to_load)
Process a dict_attr_autoload element to load/verify a dictionary attribute.
Definition dict_util.c:4402
#define fr_dict_autoload(_to_load)
Definition dict.h:914
#define DICT_AUTOLOAD_TERMINATOR
Definition dict.h:313
fr_dict_gctx_t * fr_dict_global_ctx_init(TALLOC_CTX *ctx, bool free_at_exit, char const *dict_dir))
Initialise the global protocol hashes.
Definition dict_util.c:4720
Specifies an attribute which must be present for the module to function.
Definition dict.h:293
Specifies a dictionary which must be loaded/loadable for the module to function.
Definition dict.h:306
#define fr_dlist_foreach(_list_head, _type, _iter)
Iterate over the contents of a list.
Definition dlist.h:98
static unsigned int fr_dlist_num_elements(fr_dlist_head_t const *head)
Return the number of elements in the dlist.
Definition dlist.h:921
static int fr_dlist_insert_tail(fr_dlist_head_t *list_head, void *ptr)
Insert an item into the tail of a list.
Definition dlist.h:360
#define FR_DLIST_HEAD(_name)
Expands to the type name used for the head wrapper structure.
Definition dlist.h:1104
#define fr_dlist_talloc_init(_head, _type, _field)
Initialise the head structure of a doubly linked list.
Definition dlist.h:257
Head of a doubly linked list.
Definition dlist.h:51
#define fr_event_fd_insert(...)
Definition event.h:248
@ FR_EVENT_FILTER_IO
Combined filter for read/write functions/.
Definition event.h:84
#define fr_event_filter_update(...)
Definition event.h:240
#define FR_EVENT_RESUME(_s, _f)
Re-add the filter for a func from kevent.
Definition event.h:132
#define FR_EVENT_SUSPEND(_s, _f)
Temporarily remove the filter for a func from kevent.
Definition event.h:116
Callbacks for the FR_EVENT_FILTER_IO filter.
Definition event.h:189
Structure describing a modification to a filter's state.
Definition event.h:97
fr_socket_t socket
as connected socket
Definition fd.h:132
uint16_t src_port
our port
Definition fd.h:91
@ FR_BIO_FD_CONNECTED
connected client sockets (UDP or TCP)
Definition fd.h:68
fr_ipaddr_t dst_ipaddr
their IP address
Definition fd.h:89
fr_bio_fd_type_t type
accept, connected, unconnected, etc.
Definition fd.h:81
int socket_type
SOCK_STREAM or SOCK_DGRAM.
Definition fd.h:83
uint16_t dst_port
their port
Definition fd.h:92
fr_ipaddr_t src_ipaddr
our IP address
Definition fd.h:88
Configuration for sockets.
Definition fd.h:80
talloc_free(hp)
int fr_inet_pton_port(fr_ipaddr_t *out, uint16_t *port_out, char const *value, ssize_t inlen, int af, bool resolve, bool mask)
Parses IPv4/6 address + port, to fr_ipaddr_t and integer (port)
Definition inet.c:945
int af
Address family.
Definition inet.h:64
IPv4/6 prefix.
char const * fr_bio_strerror(ssize_t error)
Definition base.c:161
int packet_global_init(void)
Initialises the Net.
Definition packet.c:200
void fr_packet_net_from_pairs(fr_packet_t *packet, fr_pair_list_t const *list)
Convert pairs to information in a packet.
Definition packet.c:154
fr_event_list_t * fr_event_list_alloc(TALLOC_CTX *ctx, fr_event_status_cb_t status, void *status_uctx)
Initialise a new event list.
Definition event.c:2522
void fr_event_loop_exit(fr_event_list_t *el, int code)
Signal an event loop exit with the specified code.
Definition event.c:2371
int fr_event_fd_delete(fr_event_list_t *el, int fd, fr_event_filter_t filter)
Remove a file descriptor from the event loop.
Definition event.c:1203
int fr_event_loop(fr_event_list_t *el)
Run an event loop.
Definition event.c:2393
Stores all information relating to an event list.
Definition event.c:377
int fr_debug_lvl
Definition log.c:40
FILE * fr_log_fp
Definition log.c:39
fr_log_t default_log
Definition log.c:288
void fr_log_perror(fr_log_t const *log, fr_log_type_t type, char const *file, int line, fr_log_perror_format_t const *rules, char const *fmt,...)
Drain any outstanding messages from the fr_strerror buffers.
Definition log.c:703
void fr_log(fr_log_t const *log, fr_log_type_t type, char const *file, int line, char const *fmt,...)
Send a server log message to its destination.
Definition log.c:577
@ L_DST_STDOUT
Log to stdout.
Definition log.h:78
@ L_ERR
Error message.
Definition log.h:56
@ L_DBG
Only displayed when debugging is enabled.
Definition log.h:59
fr_packet_t * fr_packet_alloc(TALLOC_CTX *ctx, bool new_vector)
Allocate a new fr_packet_t.
Definition packet.c:38
void fr_packet_free(fr_packet_t **packet_p)
Free a fr_packet_t.
Definition packet.c:89
unsigned short uint16_t
@ FR_TYPE_STRING
String of printable characters.
@ FR_TYPE_UINT32
32 Bit unsigned integer.
@ FR_TYPE_OCTETS
Raw octets.
unsigned char uint8_t
int mschap_nt_password_hash(uint8_t out[static NT_DIGEST_LENGTH], char const *password)
Converts Unicode password to 16-byte NT hash with MD4.
Definition mschap.c:52
#define RADIUS_AUTH_VECTOR_LENGTH
Definition net.h:89
int fr_pair_value_memdup(fr_pair_t *vp, uint8_t const *src, size_t len, bool tainted)
Copy data into an "octets" data type.
Definition pair.c:2945
void fr_pair_validate_debug(fr_pair_t const *failed[2])
Write an error to the library errorbuff detailing the mismatch.
Definition pair.c:2097
fr_pair_t * fr_pair_find_by_da_nested(fr_pair_list_t const *list, fr_pair_t const *prev, fr_dict_attr_t const *da)
Find a pair with a matching fr_dict_attr_t, by walking the nested fr_dict_attr_t tree.
Definition pair.c:781
fr_pair_t * fr_pair_find_by_da(fr_pair_list_t const *list, fr_pair_t const *prev, fr_dict_attr_t const *da)
Find the first pair with a matching da.
Definition pair.c:704
int fr_pair_append(fr_pair_list_t *list, fr_pair_t *to_add)
Add a VP to the end of the list.
Definition pair.c:1349
int fr_pair_delete_by_da(fr_pair_list_t *list, fr_dict_attr_t const *da)
Delete matching pairs from the specified list.
Definition pair.c:1693
fr_pair_t * fr_pair_afrom_da(TALLOC_CTX *ctx, fr_dict_attr_t const *da)
Dynamically allocate a new attribute and assign a fr_dict_attr_t.
Definition pair.c:290
bool fr_pair_validate(fr_pair_t const *failed[2], fr_pair_list_t *filter, fr_pair_list_t *list)
Uses fr_pair_cmp to verify all fr_pair_ts in list match the filter defined by check.
Definition pair.c:2132
void fr_pair_list_init(fr_pair_list_t *list)
Initialise a pair list header.
Definition pair.c:46
int fr_pair_value_bstrndup(fr_pair_t *vp, char const *src, size_t len, bool tainted)
Copy data into a "string" type value pair.
Definition pair.c:2795
int fr_pair_delete(fr_pair_list_t *list, fr_pair_t *vp)
Remove fr_pair_t from a list and free.
Definition pair.c:1830
int8_t fr_pair_cmp_by_da(void const *a, void const *b)
Order attributes by their da, and tag.
Definition pair.c:1848
int fr_pair_value_memdup_buffer_shallow(fr_pair_t *vp, uint8_t const *src, bool tainted)
Assign a talloced buffer to a "octets" type value pair.
Definition pair.c:3020
int fr_pair_list_afrom_file(TALLOC_CTX *ctx, fr_dict_t const *dict, fr_pair_list_t *out, FILE *fp, bool *pfiledone, bool allow_exec)
Read valuepairs from the fp up to End-Of-File.
int fr_radius_global_init(void)
Definition base.c:1238
void fr_radius_global_free(void)
Definition base.c:1262
fr_table_num_sorted_t const fr_radius_request_name_table[]
Definition base.c:105
char const * fr_radius_packet_name[FR_RADIUS_CODE_MAX]
Definition base.c:116
int fr_radius_allow_reply(int code, bool allowed[static FR_RADIUS_CODE_MAX])
Definition base.c:231
uint8_t const * secret
Definition bio.h:34
bool allowed[FR_RADIUS_CODE_MAX]
allowed outgoing packet types
Definition bio.h:40
size_t secret_len
Definition bio.h:35
fr_radius_bio_verify_t verify
Definition client.h:38
fr_event_list_t * el
Definition client.h:35
fr_bio_retry_info_t const * retry_info
Definition client.h:67
fr_bio_retry_config_t retry_cfg
Definition client.h:40
fr_retry_config_t retry[FR_RADIUS_CODE_MAX]
default retry configuration for each packet type
Definition client.h:51
fr_bio_fd_info_t const * fd_info
Definition client.h:57
fr_bio_packet_cb_funcs_t packet_cb_cfg
Definition client.h:42
bool outgoing[FR_RADIUS_CODE_MAX]
allowed outgoing packet types
Definition client.h:49
void fr_radius_packet_log(fr_log_t const *log, fr_packet_t *packet, fr_pair_list_t *list, bool received)
Definition packet.c:478
#define fr_assert(_expr)
Definition rad_assert.h:38
static fr_rb_tree_t * coa_tree
static fr_dict_attr_t const * attr_packet_type
static fr_dict_attr_t const * attr_request_authenticator
static int send_one_packet(fr_bio_packet_t *client, rc_request_t *request)
static fr_dict_attr_t const * attr_user_password
static bool paused
static int getport(char const *name)
static void client_packet_release(fr_bio_packet_t *client, fr_packet_t *packet)
static int _rc_request_free(rc_request_t *request)
static void client_read(fr_event_list_t *el, int fd, UNUSED int flags, void *uctx)
static int radclient_sane(rc_request_t *request)
static fr_bio_fd_config_t fd_config
static fr_dict_attr_t const * attr_coa_match_attr
static fr_bio_packet_t * client_bio
int main(int argc, char **argv)
static fr_dict_attr_t const * attr_chap_password
static fr_radius_client_config_t client_config
static int forced_id
static int resend_count
static fr_radius_client_bio_info_t const * client_info
static int client_bio_write_pause(fr_bio_packet_t *bio)
static rc_stats_t stats
static fr_dict_attr_t const * attr_ms_chap_response
static fr_event_update_t const resume_write[]
static fr_dict_attr_t const * attr_ms_chap_challenge
static NEVER_RETURNS void client_bio_failed(fr_bio_packet_t *bio)
static size_t parallel
static int packet_code
static fr_dict_attr_t const * attr_chap_challenge
static void client_bio_connected(fr_bio_packet_t *client)
static bool do_output
#define openssl3_free()
static int _loop_status(UNUSED fr_time_t now, fr_time_delta_t wake, UNUSED void *ctx)
static int ipproto
fr_dict_attr_autoload_t radclient_dict_attr[]
static fr_dict_attr_t const * attr_cleartext_password
static int client_bio_write_resume(fr_bio_packet_t *bio)
static bool print_filename
static bool do_coa
#define openssl3_init()
static fr_dict_attr_t const * attr_radclient_test_name
static int radclient_init(TALLOC_CTX *ctx, rc_file_pair_t *files)
static void client_packet_retry_log(UNUSED fr_bio_packet_t *client, fr_packet_t *packet)
static fr_dict_attr_t const * attr_radclient_coa_filename
static NEVER_RETURNS void client_error(UNUSED fr_event_list_t *el, UNUSED int fd, UNUSED int flags, int fd_errno, void *uctx)
static int mschapv1_encode(fr_packet_t *packet, fr_pair_list_t *list, char const *password)
static bool already_hex(fr_pair_t *vp)
static fr_dict_attr_t const * attr_user_name
static void client_write(fr_event_list_t *el, int fd, UNUSED int flags, void *uctx)
static char * secret
static void radclient_get_port(fr_radius_packet_code_t type, uint16_t *port)
static fr_dict_attr_t const * attr_ms_chap_password
#define pair_update_request(_attr, _da)
static int8_t request_cmp(void const *one, void const *two)
static int coa_port
static const char * attr_coa_filter_name
static fr_dict_attr_t const * attr_radclient_coa_filter
static fr_event_update_t const pause_write[]
static NEVER_RETURNS void usage(void)
static fr_radius_packet_code_t radclient_get_code(uint16_t port)
static int coa_init(rc_request_t *parent, FILE *coa_reply, char const *reply_filename, bool *coa_reply_done, FILE *coa_filter, char const *filter_filename, bool *coa_filter_done)
Read one CoA reply and potentially a filter.
#define REDEBUG(fmt,...)
#define RDEBUG(fmt,...)
#define rc_request_list_foreach(_list_head, _iter)
#define WARN(fmt,...)
uint64_t accepted
Requests to which we received a accept.
uint64_t rejected
Requests to which we received a reject.
uint64_t lost
Requests to which we received no response.
uint64_t failed
Requests which failed a filter.
char const * coa_filter
file containing the CoA filter we want to match
uint64_t passed
Requests which passed a filter.
char const * filters
The file containing the definition of the packet we want to match.
char const * coa_reply
file containing the CoA filter we want to match
char const * packets
The file containing the request packet.
#define RADIUS_MAX_ATTRIBUTES
Definition radius.h:40
#define FR_RADIUS_PACKET_CODE_VALID(_x)
Definition radius.h:52
static fr_dict_t const * dict_radius
Definition radsniff.c:94
static bool cleanup
Definition radsniff.c:60
uint32_t fr_rand(void)
Return a 32-bit random number.
Definition rand.c:105
void fr_rand_buffer(void *start, size_t length)
Definition rand.c:125
bool fr_rb_insert(fr_rb_tree_t *tree, void const *data)
Insert data into a tree.
Definition rb.c:626
bool fr_rb_delete(fr_rb_tree_t *tree, void const *data)
Remove node and free data (if a free function was specified)
Definition rb.c:741
#define fr_rb_talloc_alloc(_ctx, _type, _data_cmp, _data_free)
Allocs a red black that verifies elements are of a specific talloc type.
Definition rb.h:205
The main red black tree structure.
Definition rb.h:73
fr_packet_t * reply
Outgoing response.
Definition request.h:252
char const *fr_packet_t * packet
< Module the request is currently being processed by.
Definition request.h:251
#define reply_pairs
Convenience macro for accessing the reply list.
Definition request.h:127
static char const * name
void smbdes_mschap(uint8_t const win_password[16], uint8_t const *challenge, uint8_t *response)
Definition smbdes.c:339
void fr_radius_client_bio_connect(NDEBUG_UNUSED fr_event_list_t *el, NDEBUG_UNUSED int fd, UNUSED int flags, void *uctx)
Definition client.c:690
int fr_radius_client_fd_bio_cancel(fr_bio_packet_t *bio, fr_packet_t *packet)
Cancel one packet.
Definition client.c:555
fr_bio_packet_t * fr_radius_client_bio_alloc(TALLOC_CTX *ctx, fr_radius_client_config_t *cfg, fr_bio_fd_config_t const *fd_cfg)
Definition client.c:50
int fr_radius_client_bio_force_id(fr_bio_packet_t *bio, int code, int id)
Definition client.c:660
size_t fr_radius_client_bio_outstanding(fr_bio_packet_t *bio)
Definition client.c:640
fr_radius_client_bio_info_t const * fr_radius_client_bio_info(fr_bio_packet_t *bio)
Definition client.c:652
fr_aka_sim_id_type_t type
fr_pair_t * vp
#define fr_time()
Allow us to arbitrarily manipulate time.
Definition state_test.c:8
fr_log_dst_t dst
Log destination.
Definition log.h:97
int fd
File descriptor to write messages to.
Definition log.h:112
bool print_level
sometimes we don't want log levels printed
Definition log.h:106
uint64_t num
The number (within the file) of the request were reading.
fr_packet_t * reply
The incoming response.
fr_pair_t * password
Password.Cleartext.
char const * name
Test name (as specified in the request).
rc_file_pair_t * files
Request and response file names.
fr_packet_t * packet
The outgoing request.
fr_pair_list_t request_pairs
fr_rb_node_t node
rbtree node data for CoA
bool done
Whether the request is complete.
fr_pair_list_t filter
If the reply passes the filter, then the request passes.
fr_pair_list_t reply_pairs
fr_radius_packet_code_t filter_code
Expected code of the response packet.
fr_time_t timestamp
Stores an attribute, a value and various bits of other data.
Definition pair.h:68
fr_dict_attr_t const *_CONST da
Dictionary attribute defines the attribute number, vendor and type of the pair.
Definition pair.h:69
char const * fr_syserror(int num)
Guaranteed to be thread-safe version of strerror.
Definition syserror.c:243
#define fr_table_value_by_str(_table, _name, _def)
Convert a string to a value using a sorted or ordered table.
Definition table.h:653
#define talloc_autofree_context
The original function is deprecated, so replace it with our version.
Definition talloc.h:51
fr_slen_t fr_time_delta_from_str(fr_time_delta_t *out, char const *in, size_t inlen, fr_time_res_t hint)
Create fr_time_delta_t from a string.
Definition time.c:412
int fr_time_start(void)
Initialize the local time.
Definition time.c:150
static int64_t fr_time_delta_unwrap(fr_time_delta_t time)
Definition time.h:154
static fr_time_delta_t fr_time_delta_from_sec(int64_t sec)
Definition time.h:590
@ FR_TIME_RES_SEC
Definition time.h:50
#define NSEC
Definition time.h:379
A time delta, a difference in time measured in nanoseconds.
Definition time.h:80
"server local" time.
Definition time.h:69
static fr_event_list_t * el
#define FR_DICTIONARY_FILE
Definition conf.h:7
void * uctx
Definition packet.h:79
unsigned int code
Packet code (type).
Definition packet.h:61
fr_socket_t socket
This packet was received on.
Definition packet.h:57
int id
Packet ID (used to link requests/responses).
Definition packet.h:60
uint8_t * data
Packet data (body).
Definition packet.h:63
uint8_t vector[RADIUS_AUTH_VECTOR_LENGTH]
RADIUS authentication vector.
Definition packet.h:69
bool fr_pair_list_empty(fr_pair_list_t const *list)
Is a valuepair list empty.
void fr_pair_list_sort(fr_pair_list_t *list, fr_cmp_t cmp)
Sort a doubly linked list of fr_pair_ts using merge sort.
fr_pair_t * fr_pair_list_next(fr_pair_list_t const *list, fr_pair_t const *item))
Get the next item in a valuepair list after a specific entry.
Definition pair_inline.c:69
fr_pair_t * fr_pair_list_head(fr_pair_list_t const *list)
Get the head of a valuepair list.
Definition pair_inline.c:42
static fr_slen_t parent
Definition pair.h:858
fr_time_delta_t irt
Initial transmission time.
Definition retry.h:33
int af
AF_INET, AF_INET6, or AF_UNIX.
Definition socket.h:78
int fd
File descriptor if this is a live socket.
Definition socket.h:81
char const * fr_strerror(void)
Get the last library error.
Definition strerror.c:553
void fr_perror(char const *fmt,...)
Print the current error to stderr with a prefix.
Definition strerror.c:732
void fr_strerror_clear(void)
Clears all pending messages from the talloc pools.
Definition strerror.c:576
int fr_check_lib_magic(uint64_t magic)
Check if the application linking to the library has the correct magic number.
Definition version.c:40
#define RADIUSD_VERSION_BUILD(_x)
Create a version string for a utility in the suite of FreeRADIUS utilities.
Definition version.h:58
#define RADIUSD_MAGIC_NUMBER
Definition version.h:81
int8_t fr_value_box_cmp(fr_value_box_t const *a, fr_value_box_t const *b)
Compare two values.
Definition value.c:749
#define fr_box_time_delta(_val)
Definition value.h:366