The FreeRADIUS server $Id: 15bac2a4c627c01d1aa2047687b3418955ac7f00 $
Loading...
Searching...
No Matches
radclient-ng.c
Go to the documentation of this file.
1/*
2 * This program is free software; you can redistribute it and/or modify
3 * it under the terms of the GNU General Public License as published by
4 * the Free Software Foundation; either version 2 of the License, or
5 * (at your option) any later version.
6 *
7 * This program is distributed in the hope that it will be useful,
8 * but WITHOUT ANY WARRANTY; without even the implied warranty of
9 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
10 * GNU General Public License for more details.
11 *
12 * You should have received a copy of the GNU General Public License
13 * along with this program; if not, write to the Free Software
14 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
15 */
16
17/**
18 * $Id: 645d89cc913d0766ff148247ad456de07c4b54f3 $
19 *
20 * @file src/bin/radclient.c
21 * @brief General radius client and debug tool.
22 *
23 * @copyright 2000,2006,2014 The FreeRADIUS server project
24 * @copyright 2000 Miquel van Smoorenburg (miquels@cistron.nl)
25 * @copyright 2000 Alan DeKok (aland@freeradius.org)
26 */
27
28RCSID("$Id: 645d89cc913d0766ff148247ad456de07c4b54f3 $")
29
30#include <freeradius-devel/util/conf.h>
31#include <freeradius-devel/util/syserror.h>
32#include <freeradius-devel/util/atexit.h>
33#include <freeradius-devel/util/pair_legacy.h>
34#include <freeradius-devel/util/time.h>
35#include <freeradius-devel/util/event.h>
36#include <freeradius-devel/server/packet.h>
37#include <freeradius-devel/radius/list.h>
38#include <freeradius-devel/radius/radius.h>
39#include <freeradius-devel/util/chap.h>
40#include <freeradius-devel/radius/client.h>
41
42#ifdef HAVE_OPENSSL_SSL_H
43#include <openssl/ssl.h>
44#include <freeradius-devel/util/md4.h>
45#include <freeradius-devel/util/md5.h>
46#endif
47#include <ctype.h>
48
49#ifdef HAVE_GETOPT_H
50# include <getopt.h>
51#endif
52
53#include <assert.h>
54
55typedef struct request_s request_t; /* to shut up warnings about mschap.h */
56
57#include "smbdes.h"
58#include "mschap.h"
59
60#include "radclient.h"
61
62#define pair_update_request(_attr, _da) do { \
63 _attr = fr_pair_find_by_da(&request->request_pairs, NULL, _da); \
64 if (!_attr) { \
65 _attr = fr_pair_afrom_da(request, _da); \
66 fr_assert(_attr != NULL); \
67 fr_pair_append(&request->request_pairs, _attr); \
68 } \
69 } while (0)
70
71static char *secret = NULL;
72static bool do_output = true;
73
74static const char *attr_coa_filter_name = "User-Name";
75
77
79static int resend_count = 1;
80static bool print_filename = false;
81
82static int forced_id = -1;
83static size_t parallel = 1;
84static bool paused = false;
85
87
89
91
93
94static int ipproto = IPPROTO_UDP;
95
96static bool do_coa = false;
97//static int coafd;
99static fr_rb_tree_t *coa_tree = NULL;
100
102static rc_request_t *current = NULL;
103
104static char const *radclient_version = RADIUSD_VERSION_BUILD("radclient");
105
107static fr_dict_t const *dict_radius;
108
109static TALLOC_CTX *autofree = NULL;
110
113 { .out = &dict_freeradius, .proto = "freeradius" },
114 { .out = &dict_radius, .proto = "radius" },
116};
117
119
123
126
132
135
136static fr_dict_attr_t const *attr_coa_filter = NULL;
137
140 { .out = &attr_cleartext_password, .name = "Password.Cleartext", .type = FR_TYPE_STRING, .dict = &dict_freeradius },
141 { .out = &attr_ms_chap_challenge, .name = "Vendor-Specific.Microsoft.CHAP-Challenge", .type = FR_TYPE_OCTETS, .dict = &dict_radius },
142 { .out = &attr_ms_chap_password, .name = "Password.MS-CHAP", .type = FR_TYPE_STRING, .dict = &dict_freeradius },
143 { .out = &attr_ms_chap_response, .name = "Vendor-Specific.Microsoft.CHAP-Response", .type = FR_TYPE_OCTETS, .dict = &dict_radius },
144
145 { .out = &attr_radclient_test_name, .name = "Radclient-Test-Name", .type = FR_TYPE_STRING, .dict = &dict_freeradius },
146 { .out = &attr_request_authenticator, .name = "Request-Authenticator", .type = FR_TYPE_OCTETS, .dict = &dict_freeradius },
147
148 { .out = &attr_radclient_coa_filename, .name = "Radclient-CoA-Filename", .type = FR_TYPE_STRING, .dict = &dict_freeradius },
149 { .out = &attr_radclient_coa_filter, .name = "Radclient-CoA-Filter", .type = FR_TYPE_STRING, .dict = &dict_freeradius },
150
151 { .out = &attr_chap_password, .name = "CHAP-Password", .type = FR_TYPE_OCTETS, .dict = &dict_radius },
152 { .out = &attr_chap_challenge, .name = "CHAP-Challenge", .type = FR_TYPE_OCTETS, .dict = &dict_radius },
153 { .out = &attr_packet_type, .name = "Packet-Type", .type = FR_TYPE_UINT32, .dict = &dict_radius },
154 { .out = &attr_user_password, .name = "User-Password", .type = FR_TYPE_STRING, .dict = &dict_radius },
155 { .out = &attr_user_name, .name = "User-Name", .type = FR_TYPE_STRING, .dict = &dict_radius },
156
158};
159
160static NEVER_RETURNS void usage(void)
161{
162 fprintf(stderr, "Usage: radclient [options] server[:port] <command> [<secret>]\n");
163
164 fprintf(stderr, " <command> One of auth, acct, status, coa, disconnect or auto.\n");
165 fprintf(stderr, " -4 Use IPv4 address of server\n");
166 fprintf(stderr, " -6 Use IPv6 address of server.\n");
167 fprintf(stderr, " -A <attribute> Use named 'attribute' to match CoA requests to packets. Default is User-Name\n");
168 fprintf(stderr, " -C [<client_ip>:]<client_port> Client source port and source IP address. Port values may be 1..65535\n");
169 fprintf(stderr, " -c <count> Send each packet 'count' times.\n");
170 fprintf(stderr, " -d <raddb> Set user dictionary directory (defaults to " RADDBDIR ").\n");
171 fprintf(stderr, " -D <dictdir> Set main dictionary directory (defaults to " DICTDIR ").\n");
172 fprintf(stderr, " -f <file>[:<file>] Read packets from file, not stdin.\n");
173 fprintf(stderr, " If a second file is provided, it will be used to verify responses\n");
174 fprintf(stderr, " -F Print the file name, packet number and reply code.\n");
175 fprintf(stderr, " -h Print usage help information.\n");
176 fprintf(stderr, " -i <id> Set request id to 'id'. Values may be 0..255\n");
177 fprintf(stderr, " -o <port> Set CoA listening port (defaults to 3799)\n");
178 fprintf(stderr, " -p <num> Send 'num' packets from a file in parallel.\n");
179 fprintf(stderr, " -P <proto> Use proto (tcp or udp) for transport.\n");
180 fprintf(stderr, " -r <retries> If timeout, retry sending the packet 'retries' times.\n");
181 fprintf(stderr, " -s Print out summary information of auth results.\n");
182 fprintf(stderr, " -S <file> read secret from file, not command line.\n");
183 fprintf(stderr, " -t <timeout> Wait 'timeout' seconds before retrying (may be a floating point number).\n");
184 fprintf(stderr, " -v Show program version information.\n");
185 fprintf(stderr, " -x Debugging mode.\n");
186
187 fr_exit_now(EXIT_SUCCESS);
188}
189
190/*
191 * Free a radclient struct, which may (or may not)
192 * already be in the list.
193 */
194static int _rc_request_free(rc_request_t *request)
195{
197
198 if (do_coa) {
199 (void) fr_rb_delete(coa_tree, &request->node);
200 // @todo - cancel incoming CoA packet/
201 }
202
203 if (request->packet && (request->packet->id >= 0)) {
205 }
206
207 return 0;
208}
209
210#ifdef HAVE_OPENSSL_SSL_H
211#include <openssl/provider.h>
212
213static OSSL_PROVIDER *openssl_default_provider = NULL;
214static OSSL_PROVIDER *openssl_legacy_provider = NULL;
215
216static int openssl3_init(void)
217{
218 /*
219 * Load the default provider for most algorithms
220 */
221 openssl_default_provider = OSSL_PROVIDER_load(NULL, "default");
222 if (!openssl_default_provider) {
223 ERROR("(TLS) Failed loading default provider");
224 return -1;
225 }
226
227 /*
228 * Needed for MD4
229 *
230 * https://www.openssl.org/docs/man3.0/man7/migration_guide.html#Legacy-Algorithms
231 */
232 openssl_legacy_provider = OSSL_PROVIDER_load(NULL, "legacy");
233 if (!openssl_legacy_provider) {
234 ERROR("(TLS) Failed loading legacy provider");
235 return -1;
236 }
237
238 fr_md5_openssl_init();
239 fr_md4_openssl_init();
240
241 return 0;
242}
243
244static void openssl3_free(void)
245{
246 if (openssl_default_provider && !OSSL_PROVIDER_unload(openssl_default_provider)) {
247 ERROR("Failed unloading default provider");
248 }
249 openssl_default_provider = NULL;
250
251 if (openssl_legacy_provider && !OSSL_PROVIDER_unload(openssl_legacy_provider)) {
252 ERROR("Failed unloading legacy provider");
253 }
254 openssl_legacy_provider = NULL;
255
256 fr_md5_openssl_free();
257 fr_md4_openssl_free();
258}
259#else
260#define openssl3_init()
261#define openssl3_free()
262#endif
263
264static int _loop_status(UNUSED fr_time_t now, fr_time_delta_t wake, UNUSED void *ctx)
265{
266 if (fr_time_delta_unwrap(wake) < (NSEC / 10)) return 0;
267
268 if (fr_dlist_num_elements(&rc_request_list) != 0) return 0;
269
270 fr_log(&default_log, L_DBG, __FILE__, __LINE__, "Main loop waking up in %pV seconds", fr_box_time_delta(wake));
271
272 return 0;
273}
274
276 char const *password)
277{
278 unsigned int i;
279 uint8_t *p;
280 fr_pair_t *challenge, *reply;
281 uint8_t nthash[16];
282
285
287
288 fr_pair_append(list, challenge);
289
290 MEM(p = talloc_array(challenge, uint8_t, 8));
291 fr_pair_value_memdup_buffer_shallow(challenge, p, false);
292
293 for (i = 0; i < challenge->vp_length; i++) {
294 p[i] = fr_rand();
295 }
296
298 fr_pair_append(list, reply);
299 p = talloc_zero_array(reply, uint8_t, 50); /* really reply->da->flags.length */
301
302 p[1] = 0x01; /* NT hash */
303
304 if (mschap_nt_password_hash(nthash, password) < 0) return 0;
305
306 smbdes_mschap(nthash, challenge->vp_octets, p + 26);
307 return 1;
308}
309
310
311static int getport(char const *name)
312{
313 struct servent *svp;
314
315 svp = getservbyname(name, "udp");
316 if (!svp) return 0;
317
318 return ntohs(svp->s_port);
319}
320
321/*
322 * Set a port from the request type if we don't already have one
323 */
325{
326 switch (type) {
327 default:
331 if (*port == 0) *port = getport("radius");
332 if (*port == 0) *port = FR_AUTH_UDP_PORT;
333 return;
334
336 if (*port == 0) *port = getport("radacct");
337 if (*port == 0) *port = FR_ACCT_UDP_PORT;
338 return;
339
341 if (*port == 0) *port = FR_POD_UDP_PORT;
342 return;
343
345 if (*port == 0) *port = FR_COA_UDP_PORT;
346 return;
347
349 if (*port == 0) *port = 0;
350 return;
351 }
352}
353
354/*
355 * Resolve a port to a request type
356 */
358{
359 /*
360 * getport returns 0 if the service doesn't exist
361 * so we need to return early, to avoid incorrect
362 * codes.
363 */
364 if (port == 0) return FR_RADIUS_CODE_UNDEFINED;
365
366 if ((port == getport("radius")) || (port == FR_AUTH_UDP_PORT) || (port == FR_AUTH_UDP_PORT_ALT)) {
368 }
369 if ((port == getport("radacct")) || (port == FR_ACCT_UDP_PORT) || (port == FR_ACCT_UDP_PORT_ALT)) {
371 }
373
375}
376
377
379{
380 size_t i;
381
382 if (!vp || (vp->vp_type != FR_TYPE_OCTETS)) return true;
383
384 /*
385 * If it's 17 octets, it *might* be already encoded.
386 * Or, it might just be a 17-character password (maybe UTF-8)
387 * Check it for non-printable characters. The odds of ALL
388 * of the characters being 32..255 is (1-7/8)^17, or (1/8)^17,
389 * or 1/(2^51), which is pretty much zero.
390 */
391 for (i = 0; i < vp->vp_length; i++) {
392 if (vp->vp_octets[i] < 32) {
393 return true;
394 }
395 }
396
397 return false;
398}
399
400/*
401 * Read one CoA reply and possibly filter
402 */
403static int coa_init(rc_request_t *parent, FILE *coa_reply, char const *reply_filename, bool *coa_reply_done, FILE *coa_filter, char const *filter_filename, bool *coa_filter_done)
404{
405 rc_request_t *request;
406 fr_pair_t *vp;
407
408 /*
409 * Allocate it.
410 */
411 MEM(request = talloc_zero(parent, rc_request_t));
412 MEM(request->reply = fr_packet_alloc(request, false));
413
414 /*
415 * Don't initialize src/dst IP/port, or anything else. That will be read from the network.
416 */
417 fr_pair_list_init(&request->filter);
420
421 /*
422 * Read the reply VP's.
423 */
425 &request->reply_pairs, coa_reply, coa_reply_done) < 0) {
426 REDEBUG("Error parsing \"%s\"", reply_filename);
427 error:
428 talloc_free(request);
429 return -1;
430 }
431
432 /*
433 * The reply can be empty. In which case we just send an empty ACK.
434 */
436 if (vp) request->reply->code = vp->vp_uint32;
437
438 /*
439 * Read in filter VP's.
440 */
441 if (coa_filter) {
443 &request->filter, coa_filter, coa_filter_done) < 0) {
444 REDEBUG("Error parsing \"%s\"", filter_filename);
445 goto error;
446 }
447
448 if (*coa_filter_done && !*coa_reply_done) {
449 REDEBUG("Differing number of replies/filters in %s:%s "
450 "(too many replies))", reply_filename, filter_filename);
451 goto error;
452 }
453
454 if (!*coa_filter_done && *coa_reply_done) {
455 REDEBUG("Differing number of replies/filters in %s:%s "
456 "(too many filters))", reply_filename, filter_filename);
457 goto error;
458 }
459
460 /*
461 * This allows efficient list comparisons later
462 */
464 }
465
466 request->name = parent->name;
467
468 /*
469 * Automatically set the response code from the request code
470 * (if one wasn't already set).
471 */
472 if (request->filter_code == FR_RADIUS_CODE_UNDEFINED) {
474 }
475
476 parent->coa = request;
477
478 /*
479 * Ensure that the packet is also tracked in the CoA tree.
480 */
483 ERROR("Failed inserting packet from %s into CoA tree", request->name);
484 fr_exit_now(EXIT_FAILURE);
485 }
486
487 return 0;
488}
489
490/*
491 * Initialize a radclient data structure and add it to
492 * the global linked list.
493 */
494static int radclient_init(TALLOC_CTX *ctx, rc_file_pair_t *files)
495{
496 FILE *packets, *filters = NULL;
497
498 fr_pair_t *vp;
499 rc_request_t *request = NULL;
500 bool packets_done = false;
501 uint64_t num = 0;
502
503 FILE *coa_reply = NULL;
504 FILE *coa_filter = NULL;
505 bool coa_reply_done = false;
506 bool coa_filter_done = false;
507
508 fr_assert(files->packets != NULL);
509
510 /*
511 * Determine where to read the VP's from.
512 */
513 if (strcmp(files->packets, "-") != 0) {
514 packets = fopen(files->packets, "r");
515 if (!packets) {
516 ERROR("Error opening %s: %s", files->packets, fr_syserror(errno));
517 return -1;
518 }
519
520 /*
521 * Read in the pairs representing the expected response.
522 */
523 if (files->filters) {
524 filters = fopen(files->filters, "r");
525 if (!filters) {
526 ERROR("Error opening %s: %s", files->filters, fr_syserror(errno));
527 goto error;
528 }
529 }
530
531 if (files->coa_reply) {
532 coa_reply = fopen(files->coa_reply, "r");
533 if (!coa_reply) {
534 ERROR("Error opening %s: %s", files->coa_reply, fr_syserror(errno));
535 goto error;
536 }
537 }
538
539 if (files->coa_filter) {
540 coa_filter = fopen(files->coa_filter, "r");
541 if (!coa_filter) {
542 ERROR("Error opening %s: %s", files->coa_filter, fr_syserror(errno));
543 goto error;
544 }
545 }
546 } else {
547 packets = stdin;
548 }
549
550 /*
551 * Loop until the file is done.
552 */
553 do {
554 char const *coa_reply_filename = NULL;
555 char const *coa_filter_filename = NULL;
556
557 /*
558 * Allocate it.
559 */
560 MEM(request = talloc_zero(ctx, rc_request_t));
561 MEM(request->packet = fr_packet_alloc(request, true));
562 request->packet->uctx = request;
563
564 /*
565 * Don't set request->packet->socket. The underlying socket isn't open yet.
566 */
567
568 request->files = files;
569 request->packet->id = -1;
570 request->num = num++;
571
572 fr_pair_list_init(&request->filter);
575
576 /*
577 * Read the request VP's.
578 */
580 &request->request_pairs, packets, &packets_done) < 0) {
581 char const *input;
582
583 if ((files->packets[0] == '-') && (files->packets[1] == '\0')) {
584 input = "stdin";
585 } else {
586 input = files->packets;
587 }
588
589 REDEBUG("Error parsing \"%s\"", input);
590 goto error;
591 }
592
593 /*
594 * Skip empty entries
595 */
596 if (fr_pair_list_empty(&request->request_pairs)) {
597 WARN("Skipping \"%s\": No Attributes", files->packets);
598 talloc_free(request);
599 continue;
600 }
601
602 /*
603 * Read in filter VP's.
604 */
605 if (filters) {
606 bool filters_done;
607
609 &request->filter, filters, &filters_done) < 0) {
610 REDEBUG("Error parsing \"%s\"", files->filters);
611 goto error;
612 }
613
614 if (filters_done && !packets_done) {
615 REDEBUG("Differing number of packets/filters in %s:%s "
616 "(too many requests))", files->packets, files->filters);
617 goto error;
618 }
619
620 if (!filters_done && packets_done) {
621 REDEBUG("Differing number of packets/filters in %s:%s "
622 "(too many filters))", files->packets, files->filters);
623 goto error;
624 }
625
626 vp = fr_pair_find_by_da(&request->filter, NULL, attr_packet_type);
627 if (vp) {
628 request->filter_code = vp->vp_uint32;
629 fr_pair_delete(&request->filter, vp);
630 }
631
632 /*
633 * This allows efficient list comparisons later
634 */
636 }
637
638 /*
639 * Process special attributes
640 */
641 for (vp = fr_pair_list_head(&request->request_pairs);
642 vp;
643 vp = fr_pair_list_next(&request->request_pairs, vp)) {
644 /*
645 * Allow it to set the packet type in
646 * the attributes read from the file.
647 */
648 if (vp->da == attr_packet_type) {
649 request->packet->code = vp->vp_uint32;
650 } else if (vp->da == attr_request_authenticator) {
651 if (vp->vp_length > sizeof(request->packet->vector)) {
652 memcpy(request->packet->vector, vp->vp_octets, sizeof(request->packet->vector));
653 } else {
654 memset(request->packet->vector, 0, sizeof(request->packet->vector));
655 memcpy(request->packet->vector, vp->vp_octets, vp->vp_length);
656 }
657 } else if (vp->da == attr_cleartext_password) {
658 request->password = vp;
659 /*
660 * Keep a copy of the the password attribute.
661 */
662 } else if (vp->da == attr_chap_password) {
663 /*
664 * If it's already hex, do nothing.
665 */
666 if ((vp->vp_length == 17) && (already_hex(vp))) continue;
667
668 /*
669 * CHAP-Password is octets, so it may not be zero terminated.
670 */
672 fr_pair_value_bstrndup(request->password, vp->vp_strvalue, vp->vp_length, true);
673 } else if (vp->da == attr_ms_chap_password) {
675 fr_pair_value_bstrndup(request->password, vp->vp_strvalue, vp->vp_length, true);
676
677 } else if (vp->da == attr_radclient_test_name) {
678 request->name = vp->vp_strvalue;
679
680 } else if (vp->da == attr_radclient_coa_filename) {
681 coa_reply_filename = vp->vp_strvalue;
682
683 } else if (vp->da == attr_radclient_coa_filter) {
684 coa_filter_filename = vp->vp_strvalue;
685 }
686 } /* loop over the VP's we read in */
687
688 /*
689 * Use the default set on the command line
690 */
691 if (request->packet->code == FR_RADIUS_CODE_UNDEFINED) request->packet->code = packet_code;
692
693 /*
694 * Fill in the packet header from attributes, and then
695 * re-realize the attributes.
696 */
697 fr_packet_net_from_pairs(request->packet, &request->request_pairs);
698
699 /*
700 * Default to the filename
701 */
702 if (!request->name) request->name = request->files->packets;
703
704 /*
705 * Automatically set the response code from the request code
706 * (if one wasn't already set).
707 */
708 if (request->filter_code == FR_RADIUS_CODE_UNDEFINED) {
709 switch (request->packet->code) {
712 break;
713
716 break;
717
720 break;
721
724 break;
725
728 break;
729
731 REDEBUG("Packet-Type must be defined,"
732 "or a well known RADIUS port");
733 goto error;
734
735 default:
736 REDEBUG("Can't determine expected reply.Packet-Type for Packet-Type %i",
737 request->packet->code);
738 goto error;
739 }
740 /*
741 * Automatically set the request code from the response code
742 * (if one wasn't already set).
743 */
744 } else if (request->packet->code == FR_RADIUS_CODE_UNDEFINED) {
745 switch (request->filter_code) {
749 break;
750
753 break;
754
758 break;
759
763 break;
764
765 default:
766 REDEBUG("Can't determine expected Packet-Type for reply.Packet-Type %i",
767 request->filter_code);
768 goto error;
769 }
770 }
771
772 /*
773 * Automatically set the dst port (if one wasn't already set).
774 */
775 radclient_get_port(request->packet->code, &request->packet->socket.inet.dst_port);
776 if (request->packet->socket.inet.dst_port == 0) {
777 REDEBUG("Can't determine destination port");
778 goto error;
779 }
780
781 /*
782 * We expect different responses for Status-Server, depending on which port is being used.
783 */
784 if (request->packet->code == FR_RADIUS_CODE_STATUS_SERVER) {
785 switch (radclient_get_code(request->packet->socket.inet.dst_port)) {
788 break;
789
792 break;
793
794 default:
796 break;
797 }
798 }
799
800 /*
801 * Read in the CoA filename and filter.
802 */
803 if (coa_reply_filename) {
804 if (coa_reply) {
805 RDEBUG("Cannot specify CoA file on both the command line and via Radclient-CoA-Filename");
806 goto error;
807 }
808
809 coa_reply = fopen(coa_reply_filename, "r");
810 if (!coa_reply) {
811 ERROR("Error opening %s: %s", coa_reply_filename, fr_syserror(errno));
812 goto error;
813 }
814
815 if (coa_filter_filename) {
816 coa_filter = fopen(coa_filter_filename, "r");
817 if (!coa_filter) {
818 ERROR("Error opening %s: %s", coa_filter_filename, fr_syserror(errno));
819 goto error;
820 }
821 } else {
822 coa_filter = NULL;
823 }
824
825 if (coa_init(request, coa_reply, coa_reply_filename, &coa_reply_done,
826 coa_filter, coa_filter_filename, &coa_filter_done) < 0) {
827 goto error;
828 }
829
830 fclose(coa_reply);
831 coa_reply = NULL;
832 if (coa_filter) {
833 fclose(coa_filter);
834 coa_filter = NULL;
835 }
836 do_coa = true;
837
838 } else if (coa_reply) {
839 if (coa_init(request, coa_reply, coa_reply_filename, &coa_reply_done,
840 coa_filter, coa_filter_filename, &coa_filter_done) < 0) {
841 goto error;
842 }
843
844 if (coa_reply_done != packets_done) {
845 REDEBUG("Differing number of packets in input file and coa_reply in %s:%s ",
846 files->packets, files->coa_reply);
847 goto error;
848
849 }
850 }
851
852 /*
853 * Add it to the tail of the list.
854 */
856
857 /*
858 * Set the destructor so it removes itself from the
859 * request list when freed. We don't set this until
860 * the packet is actually in the list, else we trigger
861 * the asserts in the free callback.
862 */
863 talloc_set_destructor(request, _rc_request_free);
864 } while (!packets_done); /* loop until the file is done. */
865
866 if (packets != stdin) fclose(packets);
867 if (filters) fclose(filters);
868 if (coa_reply) fclose(coa_reply);
869 if (coa_filter) fclose(coa_filter);
870
871 /*
872 * And we're done.
873 */
874 return 0;
875
876error:
877 talloc_free(request);
878
879 if (packets != stdin) fclose(packets);
880 if (filters) fclose(filters);
881 if (coa_reply) fclose(coa_reply);
882 if (coa_filter) fclose(coa_filter);
883
884 return -1;
885}
886
887
888/*
889 * Sanity check each argument.
890 */
891static int radclient_sane(rc_request_t *request)
892{
893 request->packet->socket.inet.src_ipaddr = client_info->fd_info->socket.inet.src_ipaddr;
894 request->packet->socket.inet.src_port = client_info->fd_info->socket.inet.src_port;
895 request->packet->socket.inet.ifindex = client_info->fd_info->socket.inet.ifindex;
896
897 if (request->packet->socket.inet.dst_port == 0) {
898 request->packet->socket.inet.dst_port = fd_config.dst_port;
899 }
900
901 if (request->packet->socket.inet.dst_ipaddr.af == AF_UNSPEC) {
902 if (fd_config.dst_ipaddr.af == AF_UNSPEC) {
903 ERROR("No server was given, and request %" PRIu64 " in file %s did not contain "
904 "Packet-Dst-IP-Address", request->num, request->files->packets);
905 return -1;
906 }
907 request->packet->socket.inet.dst_ipaddr = fd_config.dst_ipaddr;
908 }
909
910 if (request->packet->code == 0) {
911 if (packet_code == -1) {
912 ERROR("Request was \"auto\", and request %" PRIu64 " in file %s did not contain Packet-Type",
913 request->num, request->files->packets);
914 return -1;
915 }
916 request->packet->code = packet_code;
917 }
918
919 request->packet->socket.fd = -1;
920
921 return 0;
922}
923
924
925static int8_t request_cmp(void const *one, void const *two)
926{
927 rc_request_t const *a = one, *b = two;
928 fr_pair_t *vp1, *vp2;
929
931 vp2 = fr_pair_find_by_da(&b->request_pairs, NULL, attr_coa_filter);
932
933 if (!vp1) return -1;
934 if (!vp2) return +1;
935
936 return fr_value_box_cmp(&vp1->data, &vp2->data);
937}
938
939static void cleanup(fr_bio_packet_t *client, rc_request_t *request)
940{
941 /*
942 * Don't leave a dangling pointer around.
943 */
944 if (current == request) {
946 }
947
948 talloc_free(request);
949
950 /*
951 * There are more packets to send, then allow the writer to send them.
952 */
954 return;
955 }
956
957 /*
958 * We're done all packets, and there's nothing more to read, stop.
959 */
960 if (fr_radius_client_bio_outstanding(client) == 0) {
962
964 }
965}
966
968{
969 rc_request_t *request = packet->uctx;
970
971 DEBUG("Timeout - resending packet");
972
973 // @todo - log the updated Acct-Delay-Time from the packet?
974
975 fr_radius_packet_log(&default_log, request->packet, &request->request_pairs, false);
976}
977
979{
980 rc_request_t *request = packet->uctx;
981
982 ERROR("No reply to packet");
983
984 cleanup(client, request);
985}
986
987
988/*
989 * Send one packet.
990 */
991static int send_one_packet(fr_bio_packet_t *client, rc_request_t *request)
992{
993 int rcode;
994
995 fr_assert(!request->done);
996 fr_assert(request->reply == NULL);
997
998#ifdef STATIC_ANALYZER
999 if (!secret) fr_exit_now(EXIT_FAILURE);
1000#endif
1001
1002 fr_assert(request->packet->id < 0);
1003 fr_assert(request->packet->data == NULL);
1004
1005 /*
1006 * Update the password, so it can be encrypted with the
1007 * new authentication vector.
1008 */
1009 if (request->password) {
1010 fr_pair_t *vp;
1011
1012 if ((vp = fr_pair_find_by_da(&request->request_pairs, NULL, attr_chap_password)) != NULL) {
1013 uint8_t buffer[17];
1014 fr_pair_t *challenge;
1015
1016 /*
1017 * Use CHAP-Challenge pair if present, otherwise create CHAP-Challenge and
1018 * populate with current Request Authenticator.
1019 *
1020 * Request Authenticator is re-calculated by fr_packet_sign
1021 */
1022 challenge = fr_pair_find_by_da(&request->request_pairs, NULL, attr_chap_challenge);
1023 if (!challenge || (challenge->vp_length < 7)) {
1025 fr_pair_value_memdup(challenge, request->packet->vector, RADIUS_AUTH_VECTOR_LENGTH, false);
1026 }
1027
1029 fr_rand() & 0xff, challenge->vp_octets, challenge->vp_length,
1030 request->password->vp_strvalue,
1031 request->password->vp_length);
1032 fr_pair_value_memdup(vp, buffer, sizeof(buffer), false);
1033
1034 } else if (fr_pair_find_by_da_nested(&request->request_pairs, NULL, attr_ms_chap_password) != NULL) {
1035 mschapv1_encode(request->packet, &request->request_pairs, request->password->vp_strvalue);
1036
1037 } else {
1038 DEBUG("WARNING: No password in the request");
1039 }
1040 }
1041
1042 request->timestamp = fr_time();
1043 request->tries = 1;
1044
1045 /*
1046 * Ensure that each Access-Request is unique.
1047 */
1048 if (request->packet->code == FR_RADIUS_CODE_ACCESS_REQUEST) {
1049 fr_rand_buffer(request->packet->vector, sizeof(request->packet->vector));
1050 }
1051
1052 /*
1053 * Send the current packet.
1054 */
1055 rcode = fr_bio_packet_write(client, request, request->packet, &request->request_pairs);
1056 if (rcode < 0) {
1057 /*
1058 * Failed writing it. Try again later.
1059 */
1060 if (rcode == fr_bio_error(IO_WOULD_BLOCK)) return 0;
1061
1062 REDEBUG("Failed writing packet - %s", fr_strerror());
1063 return -1;
1064 }
1065
1066 fr_radius_packet_log(&default_log, request->packet, &request->request_pairs, false);
1067
1068 return 0;
1069}
1070
1073 { 0 }
1074};
1075
1078 { 0 }
1079};
1080
1081
1083{
1085
1087 return fr_bio_error(GENERIC);
1088 }
1089
1090 return 0;
1091}
1092
1094{
1096
1098 return fr_bio_error(GENERIC);
1099 }
1100
1101 return 1;
1102}
1103
1104
1106{
1107 ERROR("Failed connecting to server");
1108
1109 /*
1110 * Cleanly close the BIO, so that we exercise the shutdown path.
1111 */
1112 fr_assert(bio == client_bio);
1113 TALLOC_FREE(bio);
1114
1115 fr_exit_now(EXIT_FAILURE);
1116}
1117
1118
1120 int fd_errno, void *uctx)
1121{
1122 fr_bio_packet_t *client = uctx;
1123
1124 ERROR("Failed in connection - %s", fr_syserror(fd_errno));
1125
1126 /*
1127 * Cleanly close the BIO, so that we exercise the shutdown path.
1128 */
1129 fr_assert(client == client_bio);
1130 TALLOC_FREE(client);
1131
1132 fr_exit_now(EXIT_FAILURE);
1133}
1134
1135static void client_read(fr_event_list_t *el, int fd, UNUSED int flags, void *uctx)
1136{
1137 fr_bio_packet_t *client = uctx;
1138 rc_request_t *request;
1140 fr_packet_t *reply;
1141 int rcode;
1142
1144
1145 /*
1146 * Read one packet.
1147 */
1148 rcode = fr_bio_packet_read(client, (void **) &request, &reply, client, &reply_pairs);
1149 if (rcode < 0) {
1150 ERROR("Failed reading packet - %s", fr_bio_strerror(rcode));
1151 fr_exit_now(EXIT_FAILURE);
1152 }
1153
1154 /*
1155 * Not a RADIUS packet, or not a reply to a packet we sent.
1156 */
1157 if (!rcode) return;
1158
1160
1161 if (print_filename) {
1162 RDEBUG("%s response code %d", request->files->packets, reply->code);
1163 }
1164
1165 /*
1166 * Increment counters...
1167 */
1168 switch (reply->code) {
1173 stats.accepted++;
1174 break;
1175
1177 break;
1178
1179 default:
1180 stats.rejected++;
1181 }
1182
1183 fr_strerror_clear(); /* Clear strerror buffer */
1184
1185 /*
1186 * If we had an expected response code, check to see if the
1187 * packet matched that.
1188 */
1189 if ((request->filter_code != FR_RADIUS_CODE_UNDEFINED) && (reply->code != request->filter_code)) {
1190 if (FR_RADIUS_PACKET_CODE_VALID(reply->code)) {
1191 REDEBUG("%s: Expected %s got %s", request->name, fr_radius_packet_name[request->filter_code],
1192 fr_radius_packet_name[reply->code]);
1193 } else {
1194 REDEBUG("%s: Expected %u got %i", request->name, request->filter_code,
1195 reply->code);
1196 }
1197 stats.failed++;
1198 /*
1199 * Check if the contents of the packet matched the filter
1200 */
1201 } else if (fr_pair_list_empty(&request->filter)) {
1202 stats.passed++;
1203 } else {
1204 fr_pair_t const *failed[2];
1205
1207 if (fr_pair_validate(failed, &request->filter, &reply_pairs)) {
1208 RDEBUG("%s: Response passed filter", request->name);
1209 stats.passed++;
1210 } else {
1211 fr_pair_validate_debug(failed);
1212 REDEBUG("%s: Response for failed filter", request->name);
1213 stats.failed++;
1214 }
1215 }
1216
1217 /*
1218 * The retry bio takes care of suppressing duplicate replies.
1219 */
1220 if (paused) {
1222 fr_perror("radclient");
1223 fr_exit_now(EXIT_FAILURE);
1224 }
1225 paused = false;
1226 }
1227
1228 /*
1229 * If we're not done, then leave this packet in the list for future resending.
1230 */
1231 request->done = (request->resend >= resend_count);
1232 if (!request->done) {
1233 /*
1234 * We don't care about duplicate replies, they can go away.
1235 */
1236 (void) fr_radius_client_fd_bio_cancel(client, request->packet);
1237 request->packet->id = -1;
1238 TALLOC_FREE(request->packet->data);
1239 return;
1240 }
1241
1242 fr_packet_free(&reply);
1243
1244 cleanup(client, request);
1245}
1246
1247static void client_write(fr_event_list_t *el, int fd, UNUSED int flags, void *uctx)
1248{
1249 fr_bio_packet_t *client = uctx;
1250 rc_request_t *request;
1251
1253 fr_assert(!paused);
1254
1255 if (!request) request = fr_dlist_head(&rc_request_list);
1256
1257 /*
1258 * Nothing more to send, stop trying to write packets.
1259 */
1260 if (!request) {
1261 pause:
1263 fr_perror("radclient");
1264 fr_exit_now(EXIT_FAILURE);
1265 }
1266 return;
1267 }
1268
1269 /*
1270 * No more packets to send, we pause the read.
1271 */
1272 if (request->packet->id >= 0) {
1273 paused = true;
1274 goto pause;
1275 }
1276
1277 if (send_one_packet(client, request) < 0) {
1278 fr_perror("radclient");
1279 fr_exit_now(EXIT_FAILURE);
1280 }
1281
1282 request->resend++;
1283 current = request;
1284
1285 /*
1286 * 0 means "don't limit requests".
1287 */
1289 paused = true;
1290 goto pause;
1291 }
1292}
1293
1295{
1296 fr_radius_client_bio_info_t const *info;
1297
1298 info = fr_radius_client_bio_info(client);
1299
1300 if (fr_event_fd_insert(autofree, NULL, info->retry_info->el, info->fd_info->socket.fd,
1301 client_read, client_write, client_error, client) < 0) {
1302 fr_perror("radclient");
1303 fr_exit_now(EXIT_FAILURE);
1304 }
1305}
1306
1307
1308/**
1309 *
1310 * @hidecallgraph
1311 */
1312int main(int argc, char **argv)
1313{
1314 int ret = EXIT_SUCCESS;
1315 int c;
1316 char const *raddb_dir = RADDBDIR;
1317 char const *dict_dir = DICTDIR;
1318 char *end;
1319 char filesecret[256];
1320 FILE *fp;
1321 int do_summary = false;
1322 fr_dlist_head_t filenames;
1323
1324 int retries = 5;
1326
1327 /*
1328 * It's easier having two sets of flags to set the
1329 * verbosity of library calls and the verbosity of
1330 * radclient.
1331 */
1332 fr_debug_lvl = 0;
1333 fr_log_fp = stdout;
1334
1335 /*
1336 * Must be called first, so the handler is called last
1337 */
1339
1340 fr_time_start();
1341
1343#ifndef NDEBUG
1344 if (fr_fault_setup(autofree, getenv("PANIC_ACTION"), argv[0]) < 0) {
1345 fr_perror("radclient");
1346 fr_exit_now(EXIT_FAILURE);
1347 }
1348#endif
1349
1350#ifdef STATIC_ANALYZER
1351 /*
1352 * clang scan thinks that fr_fault_setup() will set autofree=NULL.
1353 */
1354 if (!autofree) fr_exit_now(EXIT_FAILURE);
1355#endif
1356
1357 talloc_set_log_stderr();
1358
1360
1361 fr_dlist_talloc_init(&filenames, rc_file_pair_t, entry);
1362
1363 /*
1364 * Always log to stdout
1365 */
1367 default_log.fd = STDOUT_FILENO;
1368 default_log.print_level = false;
1369
1370 /*
1371 * Initialize the kind of socket we want.
1372 */
1375 .socket_type = SOCK_DGRAM,
1376
1377 .src_ipaddr = (fr_ipaddr_t) {
1378 .af = AF_INET,
1379 },
1380 .dst_ipaddr = (fr_ipaddr_t) {
1381 .af = AF_INET,
1382 },
1383
1384 .src_port = 0,
1385 .dst_port = 1812,
1386
1387 .interface = NULL,
1388
1389 .path = NULL,
1390 .filename = NULL,
1391
1392 .async = true,
1393 };
1394
1395 /*
1396 * Initialize the client configuration.
1397 */
1399 .log = &default_log,
1400 .verify = {
1401 .require_message_authenticator = false,
1402 .max_attributes = RADIUS_MAX_ATTRIBUTES,
1403 .max_packet_size = 4096,
1404 },
1405 };
1406
1407 /***********************************************************************
1408 *
1409 * Parse command-line options.
1410 *
1411 ***********************************************************************/
1412
1413 while ((c = getopt(argc, argv, "46A:c:C:d:D:f:Fi:ho:p:P:r:sS:t:vx")) != -1) switch (c) {
1414 case '4':
1415 fd_config.dst_ipaddr.af = AF_INET;
1416 break;
1417
1418 case '6':
1419 fd_config.dst_ipaddr.af = AF_INET6;
1420 break;
1421
1422 case 'A':
1423 attr_coa_filter_name = optarg;
1424 break;
1425
1426 case 'c':
1427 if (!isdigit((uint8_t) *optarg)) usage();
1428
1429 resend_count = atoi(optarg);
1430
1431 if (resend_count < 1) usage();
1432 break;
1433
1434 case 'C':
1435 {
1436 int tmp;
1437
1438 if (strchr(optarg, ':')) {
1440 optarg, -1, AF_UNSPEC, true, false) < 0) {
1441 fr_perror("Failed parsing source address");
1442 fr_exit_now(EXIT_FAILURE);
1443 }
1444 break;
1445 }
1446
1447 tmp = atoi(optarg);
1448 if (tmp < 1 || tmp > 65535) usage();
1449
1451 }
1452 break;
1453
1454 case 'D':
1455 dict_dir = optarg;
1456 break;
1457
1458 case 'd':
1459 raddb_dir = optarg;
1460 break;
1461
1462 /*
1463 * packet,filter
1464 */
1465 case 'f':
1466 {
1467 char const *p;
1468 rc_file_pair_t *files;
1469
1470 MEM(files = talloc_zero(talloc_autofree_context(), rc_file_pair_t));
1471
1472 /*
1473 * Commas are nicer than colons.
1474 */
1475 c = ':';
1476
1477 p = strchr(optarg, c);
1478 if (!p) {
1479 c = ',';
1480 p = strchr(optarg, c);
1481 }
1482 if (!p) {
1483 files->packets = optarg;
1484 files->filters = NULL;
1485 } else {
1486 MEM(files->packets = talloc_strndup(files, optarg, p - optarg));
1487 files->filters = p + 1;
1488 }
1489 fr_dlist_insert_tail(&filenames, files);
1490 }
1491 break;
1492
1493 case 'F':
1494 print_filename = true;
1495 break;
1496
1497 case 'i':
1498 if (!isdigit((uint8_t) *optarg))
1499 usage();
1500 forced_id = atoi(optarg);
1501 if ((forced_id < 0) || (forced_id > 255)) {
1502 usage();
1503 }
1504 break;
1505
1506 case 'o':
1507 coa_port = atoi(optarg);
1508 if (!coa_port || (coa_port > 65535)) usage();
1509 break;
1510
1511 /*
1512 * Note that sending MANY requests in
1513 * parallel can over-run the kernel
1514 * queues, and Linux will happily discard
1515 * packets. So even if the server responds,
1516 * the client may not see the reply.
1517 */
1518 case 'p':
1519 parallel = strtoul(optarg, &end, 10);
1520 if (*end) usage();
1521 if (parallel > 65536) usage();
1522 break;
1523
1524 case 'P':
1525 if (!strcmp(optarg, "tcp")) {
1526 fd_config.socket_type = SOCK_STREAM;
1527 ipproto = IPPROTO_TCP;
1528 } else if (!strcmp(optarg, "udp")) {
1529 fd_config.socket_type = SOCK_DGRAM;
1530 ipproto = IPPROTO_UDP;
1531 } else {
1532 usage();
1533 }
1534 break;
1535
1536 case 'r':
1537 if (!isdigit((uint8_t) *optarg)) usage();
1538 retries = atoi(optarg);
1539 if ((retries == 0) || (retries > 1000)) usage();
1540 break;
1541
1542 case 's':
1543 do_summary = true;
1544 break;
1545
1546 case 'S':
1547 {
1548 char *p;
1549 fp = fopen(optarg, "r");
1550 if (!fp) {
1551 ERROR("Error opening %s: %s", optarg, fr_syserror(errno));
1552 fr_exit_now(EXIT_FAILURE);
1553 }
1554 if (fgets(filesecret, sizeof(filesecret), fp) == NULL) {
1555 ERROR("Error reading %s: %s", optarg, fr_syserror(errno));
1556 fr_exit_now(EXIT_FAILURE);
1557 }
1558 fclose(fp);
1559
1560 /* truncate newline */
1561 p = filesecret + strlen(filesecret) - 1;
1562 while ((p >= filesecret) &&
1563 (*p < ' ')) {
1564 *p = '\0';
1565 --p;
1566 }
1567
1568 if (strlen(filesecret) < 2) {
1569 ERROR("Secret in %s is too short", optarg);
1570 fr_exit_now(EXIT_FAILURE);
1571 }
1572 secret = talloc_strdup(autofree, filesecret);
1574 client_config.verify.secret_len = talloc_array_length(secret) - 1;
1575 }
1576 break;
1577
1578 case 't':
1579 if (fr_time_delta_from_str(&timeout, optarg, strlen(optarg), FR_TIME_RES_SEC) < 0) {
1580 fr_perror("Failed parsing timeout value");
1581 fr_exit_now(EXIT_FAILURE);
1582 }
1583 break;
1584
1585 case 'v':
1586 fr_debug_lvl = 1;
1587 DEBUG("%s", radclient_version);
1588 fr_exit_now(0);
1589
1590 case 'x':
1591 fr_debug_lvl++;
1592 if (fr_debug_lvl > 1) default_log.print_level = true;
1593 break;
1594
1595 case 'h':
1596 default:
1597 usage();
1598 }
1599 argc -= (optind - 1);
1600 argv += (optind - 1);
1601
1602 if ((argc < 3) || ((secret == NULL) && (argc < 4))) {
1603 ERROR("Insufficient arguments");
1604 usage();
1605 }
1606
1607 /*
1608 * Get the request type
1609 */
1610 if (!isdigit((uint8_t) argv[2][0])) {
1612 if (packet_code == -2) {
1613 ERROR("Unrecognised request type \"%s\"", argv[2]);
1614 usage();
1615 }
1616 } else {
1617 packet_code = atoi(argv[2]);
1618 }
1619
1620 fr_assert(packet_code != 0);
1622
1623 /*
1624 * Initialize the retry configuration for this type of packet.
1625 */
1628
1630 .irt = timeout,
1631 .mrt = fr_time_delta_from_sec(16),
1632 .mrd = (retries == 1) ? timeout : fr_time_delta_from_sec(30),
1633 .mrc = retries,
1634 };
1636
1637 /*
1638 * Resolve hostname.
1639 */
1640 if (strcmp(argv[1], "-") != 0) {
1641 if (fr_inet_pton_port(&fd_config.dst_ipaddr, &fd_config.dst_port, argv[1], -1, fd_config.dst_ipaddr.af, true, true) < 0) {
1642 fr_perror("radclient");
1643 fr_exit_now(EXIT_FAILURE);
1644 }
1645
1646 /*
1647 * Work backwards from the port to determine the packet type
1648 */
1650 }
1652
1653 /*
1654 * Add the secret.
1655 */
1656 if (argv[3]) {
1657 secret = talloc_strdup(autofree, argv[3]);
1659 client_config.verify.secret_len = talloc_array_length(secret) - 1;
1660 }
1661
1662 /***********************************************************************
1663 *
1664 * We're done parsing command-line options, bootstrap the various libraries, etc.
1665 *
1666 ***********************************************************************/
1667
1669 fr_perror("radclient");
1670 fr_exit_now(EXIT_FAILURE);
1671 }
1672
1673 if (!fr_dict_global_ctx_init(NULL, true, dict_dir)) {
1674 fr_perror("radclient");
1675 fr_exit_now(EXIT_FAILURE);
1676 }
1677
1678 if (fr_radius_global_init() < 0) {
1679 fr_perror("radclient");
1680 fr_exit_now(EXIT_FAILURE);
1681 }
1682
1684 fr_perror("radclient");
1685 exit(EXIT_FAILURE);
1686 }
1687
1689 fr_perror("radclient");
1690 exit(EXIT_FAILURE);
1691 }
1692
1694 fr_log_perror(&default_log, L_ERR, __FILE__, __LINE__, NULL,
1695 "Failed to initialize the dictionaries");
1696 exit(EXIT_FAILURE);
1697 }
1698
1699 if (do_coa) {
1701 if (!attr_coa_filter) {
1702 ERROR("Unknown or invalid CoA filter attribute %s", optarg);
1703 fr_exit_now(EXIT_FAILURE);
1704 }
1705
1706 /*
1707 * If there's no attribute given to match CoA to requests, use User-Name
1708 */
1710
1712 }
1714
1715 openssl3_init();
1716
1718
1719 /***********************************************************************
1720 *
1721 * We're done bootstrapping the libraries and dictionaries, read the input files.
1722 *
1723 ***********************************************************************/
1724
1725 /*
1726 * If no '-f' is specified, then we are reading from stdin.
1727 */
1728 if (fr_dlist_num_elements(&filenames) == 0) {
1729 rc_file_pair_t *files;
1730
1731 files = talloc_zero(talloc_autofree_context(), rc_file_pair_t);
1732 files->packets = "-";
1733 if (radclient_init(files, files) < 0) fr_exit_now(EXIT_FAILURE);
1734 }
1735
1736 if ((forced_id >= 0) && (fr_dlist_num_elements(&filenames) > 1)) {
1737 usage();
1738 }
1739
1740 /*
1741 * Walk over the list of filenames, creating the requests.
1742 */
1743 fr_dlist_foreach(&filenames, rc_file_pair_t, files) {
1744 if (radclient_init(files, files)) {
1745 ERROR("Failed parsing input files");
1746 fr_exit_now(EXIT_FAILURE);
1747 }
1748 }
1749
1750 /*
1751 * No packets were read. Die.
1752 */
1754 ERROR("Nothing to send");
1755 fr_exit_now(EXIT_FAILURE);
1756 }
1757
1758 /***********************************************************************
1759 *
1760 * We're done reading files, open the socket, event loop, and start sending packets.
1761 *
1762 ***********************************************************************/
1763
1765 (fr_debug_lvl >= 2) ? _loop_status : NULL,
1766 NULL);
1767 if (!client_config.el) {
1768 ERROR("Failed opening event list: %s", fr_strerror());
1769 fr_exit_now(EXIT_FAILURE);
1770 }
1772
1773 /*
1774 * Set callbacks so that the socket is automatically
1775 * paused or resumed when the socket becomes writeable.
1776 */
1779 .failed = client_bio_failed,
1780
1781 .write_blocked = client_bio_write_pause,
1782 .write_resume = client_bio_write_resume,
1783
1784 .retry = (fr_debug_lvl > 0) ? client_packet_retry_log : NULL,
1785 .release = client_packet_release,
1786 };
1787
1788#ifdef STATIC_ANALYZER
1789 if (!autofree) fr_exit_now(EXIT_FAILURE);
1790#endif
1791
1792 /*
1793 * Open the RADIUS client bio, and then get the information associated with it.
1794 */
1796 if (!client_bio) {
1797 ERROR("Failed opening socket: %s", fr_strerror());
1798 fr_exit_now(EXIT_FAILURE);
1799 }
1800
1802 fr_assert(client_info != NULL);
1803
1804 if (forced_id >= 0) {
1806 fr_perror("radclient");
1807 fr_exit_now(EXIT_FAILURE);
1808 }
1809 }
1810
1811 if (do_coa) {
1812 // allocate a dedup server bio
1813 }
1814
1815 /*
1816 * Walk over the list of packets, updating to use the correct addresses, and sanity checking them.
1817 */
1819 if (radclient_sane(this) < 0) {
1820 fr_exit_now(EXIT_FAILURE);
1821 }
1822 }
1823
1824 /*
1825 * Always bounce through a connect(), even if we don't need it.
1826 *
1827 * Once the connect() passes, we start reading from the request list, and processing packets.
1828 */
1831 fr_perror("radclient");
1832 fr_exit_now(EXIT_FAILURE);
1833 }
1834
1835 /***********************************************************************
1836 *
1837 * Run the main event loop until we either see an error, or we have sent (and received) all of the packets.
1838 *
1839 ***********************************************************************/
1841
1842 /***********************************************************************
1843 *
1844 * We are done the event loop. Start cleaning things up.
1845 *
1846 ***********************************************************************/
1848
1850
1852
1854 fr_perror("radclient");
1855 ret = EXIT_FAILURE;
1856 }
1857
1859
1861
1862 if (do_summary) {
1863 fr_perror("Packet summary:\n"
1864 "\tAccepted : %" PRIu64 "\n"
1865 "\tRejected : %" PRIu64 "\n"
1866 "\tLost : %" PRIu64 "\n"
1867 "\tPassed filter : %" PRIu64 "\n"
1868 "\tFailed filter : %" PRIu64,
1871 stats.lost,
1872 stats.passed,
1874 );
1875 }
1876
1877 /*
1878 * Ensure our atexit handlers run before any other
1879 * atexit handlers registered by third party libraries.
1880 */
1882
1883 openssl3_free();
1884
1885 if ((stats.lost > 0) || (stats.failed > 0)) return EXIT_FAILURE;
1886
1887 return ret;
1888}
static int const char char buffer[256]
Definition acutest.h:578
int fr_atexit_global_setup(void)
Setup the atexit handler, should be called at the start of a program's execution.
Definition atexit.c:160
int fr_atexit_global_trigger_all(void)
Cause all global free triggers to fire.
Definition atexit.c:286
#define fr_bio_error(_x)
Definition base.h:200
static int fr_bio_packet_read(fr_bio_packet_t *my, void **pctx_p, fr_packet_t **packet_p, TALLOC_CTX *out_ctx, fr_pair_list_t *out)
Read a packet from a packet BIO.
Definition packet.h:119
fr_bio_packet_callback_t connected
Definition packet.h:71
static int fr_bio_packet_write(fr_bio_packet_t *my, void *pctx, fr_packet_t *packet, fr_pair_list_t *list)
Write a packet to a packet BIO.
Definition packet.h:138
fr_event_list_t * el
event list
Definition retry.h:51
fr_retry_config_t retry_config
base retry config
Definition retry.h:47
fr_event_list_t * el
event list
Definition retry.h:45
#define RCSID(id)
Definition build.h:485
#define NEVER_RETURNS
Should be placed before the function return type.
Definition build.h:315
#define UNUSED
Definition build.h:317
void fr_chap_encode(uint8_t out[static 1+FR_CHAP_CHALLENGE_LENGTH], uint8_t id, uint8_t const *challenge, size_t challenge_len, char const *password, size_t password_len)
Encode a CHAP password.
Definition chap.c:34
int fr_fault_setup(TALLOC_CTX *ctx, char const *cmd, char const *program)
Registers signal handlers to execute panic_action on fatal signal.
Definition debug.c:1055
#define MEM(x)
Definition debug.h:36
#define fr_exit_now(_x)
Exit without calling atexit() handlers, producing a log message in debug builds.
Definition debug.h:226
fr_radius_packet_code_t
RADIUS packet codes.
Definition defs.h:31
@ FR_RADIUS_CODE_ACCESS_CHALLENGE
RFC2865 - Access-Challenge.
Definition defs.h:43
@ FR_RADIUS_CODE_ACCESS_REQUEST
RFC2865 - Access-Request.
Definition defs.h:33
@ FR_RADIUS_CODE_DISCONNECT_REQUEST
RFC3575/RFC5176 - Disconnect-Request.
Definition defs.h:46
@ FR_RADIUS_CODE_MAX
Maximum possible protocol code.
Definition defs.h:53
@ FR_RADIUS_CODE_DISCONNECT_ACK
RFC3575/RFC5176 - Disconnect-Ack (positive)
Definition defs.h:47
@ FR_RADIUS_CODE_STATUS_SERVER
RFC2865/RFC5997 - Status Server (request)
Definition defs.h:44
@ FR_RADIUS_CODE_COA_REQUEST
RFC3575/RFC5176 - CoA-Request.
Definition defs.h:49
@ FR_RADIUS_CODE_ACCESS_ACCEPT
RFC2865 - Access-Accept.
Definition defs.h:34
@ FR_RADIUS_CODE_ACCOUNTING_RESPONSE
RFC2866 - Accounting-Response.
Definition defs.h:37
@ FR_RADIUS_CODE_COA_NAK
RFC3575/RFC5176 - CoA-Nak (not willing to perform)
Definition defs.h:51
@ FR_RADIUS_CODE_UNDEFINED
Packet code has not been set.
Definition defs.h:32
@ FR_RADIUS_CODE_COA_ACK
RFC3575/RFC5176 - CoA-Ack (positive)
Definition defs.h:50
@ FR_RADIUS_CODE_DISCONNECT_NAK
RFC3575/RFC5176 - Disconnect-Nak (not willing to perform)
Definition defs.h:48
@ FR_RADIUS_CODE_ACCOUNTING_REQUEST
RFC2866 - Accounting-Request.
Definition defs.h:36
@ FR_RADIUS_CODE_ACCESS_REJECT
RFC2865 - Access-Reject.
Definition defs.h:35
#define FR_COA_UDP_PORT
Definition defs.h:63
#define FR_AUTH_UDP_PORT
Definition defs.h:57
#define FR_ACCT_UDP_PORT_ALT
Definition defs.h:60
#define FR_AUTH_UDP_PORT_ALT
Definition defs.h:58
#define FR_POD_UDP_PORT
Definition defs.h:61
#define FR_ACCT_UDP_PORT
Definition defs.h:59
#define ERROR(fmt,...)
Definition dhcpclient.c:41
static int retries
Definition dhcpclient.c:53
#define DEBUG(fmt,...)
Definition dhcpclient.c:39
fr_dict_gctx_t * fr_dict_global_ctx_init(TALLOC_CTX *ctx, bool free_at_exit, char const *dict_dir)
Initialise the global protocol hashes.
Definition dict_util.c:4737
fr_dict_t * fr_dict_unconst(fr_dict_t const *dict)
Coerce to non-const.
Definition dict_util.c:4932
#define fr_dict_autofree(_to_free)
Definition dict.h:918
fr_dict_attr_t const * fr_dict_attr_by_name(fr_dict_attr_err_t *err, fr_dict_attr_t const *parent, char const *attr))
Locate a fr_dict_attr_t by its name.
Definition dict_util.c:3567
fr_dict_attr_t const * fr_dict_root(fr_dict_t const *dict)
Return the root attribute of a dictionary.
Definition dict_util.c:2704
fr_dict_attr_t const ** out
Where to write a pointer to the resolved fr_dict_attr_t.
Definition dict.h:293
fr_dict_t const ** out
Where to write a pointer to the loaded/resolved fr_dict_t.
Definition dict.h:306
int fr_dict_attr_autoload(fr_dict_attr_autoload_t const *to_load)
Process a dict_attr_autoload element to load/verify a dictionary attribute.
Definition dict_util.c:4435
#define fr_dict_autoload(_to_load)
Definition dict.h:915
int fr_dict_read(fr_dict_t *dict, char const *dict_dir, char const *filename)
Read supplementary attribute definitions into an existing dictionary.
#define DICT_AUTOLOAD_TERMINATOR
Definition dict.h:312
Specifies an attribute which must be present for the module to function.
Definition dict.h:292
Specifies a dictionary which must be loaded/loadable for the module to function.
Definition dict.h:305
static void * fr_dlist_head(fr_dlist_head_t const *list_head)
Return the HEAD item of a list or NULL if the list is empty.
Definition dlist.h:486
#define fr_dlist_foreach(_list_head, _type, _iter)
Iterate over the contents of a list.
Definition dlist.h:94
static void * fr_dlist_remove(fr_dlist_head_t *list_head, void *ptr)
Remove an item from the list.
Definition dlist.h:638
static void fr_dlist_talloc_free(fr_dlist_head_t *head)
Free all items in a doubly linked list (with talloc)
Definition dlist.h:908
static void * fr_dlist_prev(fr_dlist_head_t const *list_head, void const *ptr)
Get the previous item in a list.
Definition dlist.h:588
static unsigned int fr_dlist_num_elements(fr_dlist_head_t const *head)
Return the number of elements in the dlist.
Definition dlist.h:939
static int fr_dlist_insert_tail(fr_dlist_head_t *list_head, void *ptr)
Insert an item into the tail of a list.
Definition dlist.h:378
#define fr_dlist_talloc_init(_head, _type, _field)
Initialise the head structure of a doubly linked list.
Definition dlist.h:275
static void * fr_dlist_next(fr_dlist_head_t const *list_head, void const *ptr)
Get the next item in a list.
Definition dlist.h:555
Head of a doubly linked list.
Definition dlist.h:51
#define fr_event_fd_insert(...)
Definition event.h:248
@ FR_EVENT_FILTER_IO
Combined filter for read/write functions/.
Definition event.h:84
#define fr_event_filter_update(...)
Definition event.h:240
#define FR_EVENT_RESUME(_s, _f)
Re-add the filter for a func from kevent.
Definition event.h:132
#define FR_EVENT_SUSPEND(_s, _f)
Temporarily remove the filter for a func from kevent.
Definition event.h:116
Callbacks for the FR_EVENT_FILTER_IO filter.
Definition event.h:189
Structure describing a modification to a filter's state.
Definition event.h:97
fr_socket_t socket
as connected socket
Definition fd.h:132
uint16_t src_port
our port
Definition fd.h:91
@ FR_BIO_FD_CONNECTED
connected client sockets (UDP or TCP)
Definition fd.h:68
fr_ipaddr_t dst_ipaddr
their IP address
Definition fd.h:89
fr_bio_fd_type_t type
accept, connected, unconnected, etc.
Definition fd.h:81
int socket_type
SOCK_STREAM or SOCK_DGRAM.
Definition fd.h:83
uint16_t dst_port
their port
Definition fd.h:92
fr_ipaddr_t src_ipaddr
our IP address
Definition fd.h:88
Configuration for sockets.
Definition fd.h:80
int fr_inet_pton_port(fr_ipaddr_t *out, uint16_t *port_out, char const *value, ssize_t inlen, int af, bool resolve, bool mask)
Parses IPv4/6 address + port, to fr_ipaddr_t and integer (port)
Definition inet.c:938
int af
Address family.
Definition inet.h:64
IPv4/6 prefix.
char const * fr_bio_strerror(ssize_t error)
Definition base.c:161
int packet_global_init(void)
Initialises the Net.
Definition packet.c:200
void fr_packet_net_from_pairs(fr_packet_t *packet, fr_pair_list_t const *list)
Convert pairs to information in a packet.
Definition packet.c:154
talloc_free(reap)
fr_event_list_t * fr_event_list_alloc(TALLOC_CTX *ctx, fr_event_status_cb_t status, void *status_uctx)
Initialise a new event list.
Definition event.c:2522
void fr_event_loop_exit(fr_event_list_t *el, int code)
Signal an event loop exit with the specified code.
Definition event.c:2371
int fr_event_fd_delete(fr_event_list_t *el, int fd, fr_event_filter_t filter)
Remove a file descriptor from the event loop.
Definition event.c:1203
int fr_event_loop(fr_event_list_t *el)
Run an event loop.
Definition event.c:2393
Stores all information relating to an event list.
Definition event.c:377
int fr_debug_lvl
Definition log.c:40
FILE * fr_log_fp
Definition log.c:39
fr_log_t default_log
Definition log.c:288
void fr_log_perror(fr_log_t const *log, fr_log_type_t type, char const *file, int line, fr_log_perror_format_t const *rules, char const *fmt,...)
Drain any outstanding messages from the fr_strerror buffers.
Definition log.c:703
void fr_log(fr_log_t const *log, fr_log_type_t type, char const *file, int line, char const *fmt,...)
Send a server log message to its destination.
Definition log.c:577
@ L_DST_STDOUT
Log to stdout.
Definition log.h:78
@ L_ERR
Error message.
Definition log.h:56
@ L_DBG
Only displayed when debugging is enabled.
Definition log.h:59
fr_packet_t * fr_packet_alloc(TALLOC_CTX *ctx, bool new_vector)
Allocate a new fr_packet_t.
Definition packet.c:38
void fr_packet_free(fr_packet_t **packet_p)
Free a fr_packet_t.
Definition packet.c:89
unsigned short uint16_t
@ FR_TYPE_STRING
String of printable characters.
@ FR_TYPE_UINT32
32 Bit unsigned integer.
@ FR_TYPE_OCTETS
Raw octets.
unsigned char uint8_t
int mschap_nt_password_hash(uint8_t out[static NT_DIGEST_LENGTH], char const *password)
Converts Unicode password to 16-byte NT hash with MD4.
Definition mschap.c:52
#define RADIUS_AUTH_VECTOR_LENGTH
Definition net.h:89
int fr_pair_value_memdup(fr_pair_t *vp, uint8_t const *src, size_t len, bool tainted)
Copy data into an "octets" data type.
Definition pair.c:2945
void fr_pair_validate_debug(fr_pair_t const *failed[2])
Write an error to the library errorbuff detailing the mismatch.
Definition pair.c:2096
fr_pair_t * fr_pair_find_by_da_nested(fr_pair_list_t const *list, fr_pair_t const *prev, fr_dict_attr_t const *da)
Find a pair with a matching fr_dict_attr_t, by walking the nested fr_dict_attr_t tree.
Definition pair.c:780
fr_pair_t * fr_pair_find_by_da(fr_pair_list_t const *list, fr_pair_t const *prev, fr_dict_attr_t const *da)
Find the first pair with a matching da.
Definition pair.c:703
int fr_pair_append(fr_pair_list_t *list, fr_pair_t *to_add)
Add a VP to the end of the list.
Definition pair.c:1348
int fr_pair_delete_by_da(fr_pair_list_t *list, fr_dict_attr_t const *da)
Delete matching pairs from the specified list.
Definition pair.c:1692
fr_pair_t * fr_pair_afrom_da(TALLOC_CTX *ctx, fr_dict_attr_t const *da)
Dynamically allocate a new attribute and assign a fr_dict_attr_t.
Definition pair.c:289
bool fr_pair_validate(fr_pair_t const *failed[2], fr_pair_list_t *filter, fr_pair_list_t *list)
Uses fr_pair_cmp to verify all fr_pair_ts in list match the filter defined by check.
Definition pair.c:2131
void fr_pair_list_init(fr_pair_list_t *list)
Initialise a pair list header.
Definition pair.c:46
int fr_pair_value_bstrndup(fr_pair_t *vp, char const *src, size_t len, bool tainted)
Copy data into a "string" type value pair.
Definition pair.c:2795
int fr_pair_delete(fr_pair_list_t *list, fr_pair_t *vp)
Remove fr_pair_t from a list and free.
Definition pair.c:1829
int8_t fr_pair_cmp_by_da(void const *a, void const *b)
Order attributes by their da, and tag.
Definition pair.c:1847
int fr_pair_value_memdup_buffer_shallow(fr_pair_t *vp, uint8_t const *src, bool tainted)
Assign a talloced buffer to a "octets" type value pair.
Definition pair.c:3020
int fr_pair_list_afrom_file(TALLOC_CTX *ctx, fr_dict_t const *dict, fr_pair_list_t *out, FILE *fp, bool *pfiledone)
Read valuepairs from the fp up to End-Of-File.
int fr_radius_global_init(void)
Definition base.c:1245
void fr_radius_global_free(void)
Definition base.c:1269
fr_table_num_sorted_t const fr_radius_request_name_table[]
Definition base.c:105
char const * fr_radius_packet_name[FR_RADIUS_CODE_MAX]
Definition base.c:116
int fr_radius_allow_reply(int code, bool allowed[static FR_RADIUS_CODE_MAX])
Definition base.c:231
uint8_t const * secret
Definition bio.h:34
bool allowed[FR_RADIUS_CODE_MAX]
allowed outgoing packet types
Definition bio.h:40
size_t secret_len
Definition bio.h:35
fr_radius_bio_verify_t verify
Definition client.h:38
fr_event_list_t * el
Definition client.h:35
fr_bio_retry_info_t const * retry_info
Definition client.h:67
fr_bio_retry_config_t retry_cfg
Definition client.h:40
fr_retry_config_t retry[FR_RADIUS_CODE_MAX]
default retry configuration for each packet type
Definition client.h:51
fr_bio_fd_info_t const * fd_info
Definition client.h:57
fr_bio_packet_cb_funcs_t packet_cb_cfg
Definition client.h:42
bool outgoing[FR_RADIUS_CODE_MAX]
allowed outgoing packet types
Definition client.h:49
void fr_radius_packet_log(fr_log_t const *log, fr_packet_t *packet, fr_pair_list_t *list, bool received)
Definition packet.c:482
#define fr_assert(_expr)
Definition rad_assert.h:38
static fr_rb_tree_t * coa_tree
static fr_dict_attr_t const * attr_packet_type
static fr_dict_attr_t const * attr_request_authenticator
static int send_one_packet(fr_bio_packet_t *client, rc_request_t *request)
static fr_dict_attr_t const * attr_user_password
static bool paused
static int getport(char const *name)
static void client_packet_release(fr_bio_packet_t *client, fr_packet_t *packet)
static char const * radclient_version
static int _rc_request_free(rc_request_t *request)
fr_dict_autoload_t radclient_dict[]
static void client_read(fr_event_list_t *el, int fd, UNUSED int flags, void *uctx)
static int radclient_sane(rc_request_t *request)
static TALLOC_CTX * autofree
static fr_bio_fd_config_t fd_config
static fr_bio_packet_t * client_bio
int main(int argc, char **argv)
static fr_dict_t const * dict_freeradius
static fr_dict_attr_t const * attr_chap_password
static fr_radius_client_config_t client_config
static int forced_id
static int resend_count
static fr_radius_client_bio_info_t const * client_info
static int client_bio_write_pause(fr_bio_packet_t *bio)
static rc_stats_t stats
static fr_dict_attr_t const * attr_ms_chap_response
static fr_event_update_t const resume_write[]
static fr_dict_t const * dict_radius
static fr_dict_attr_t const * attr_ms_chap_challenge
static NEVER_RETURNS void client_bio_failed(fr_bio_packet_t *bio)
static size_t parallel
static int packet_code
static fr_dict_attr_t const * attr_chap_challenge
static void client_bio_connected(fr_bio_packet_t *client)
static bool do_output
#define openssl3_free()
static int _loop_status(UNUSED fr_time_t now, fr_time_delta_t wake, UNUSED void *ctx)
static int ipproto
fr_dict_attr_autoload_t radclient_dict_attr[]
static fr_dict_attr_t const * attr_cleartext_password
static int client_bio_write_resume(fr_bio_packet_t *bio)
static bool print_filename
static bool do_coa
#define openssl3_init()
static fr_dict_attr_t const * attr_radclient_test_name
static rc_request_t * current
static int radclient_init(TALLOC_CTX *ctx, rc_file_pair_t *files)
static void client_packet_retry_log(UNUSED fr_bio_packet_t *client, fr_packet_t *packet)
static fr_dict_attr_t const * attr_radclient_coa_filename
static NEVER_RETURNS void client_error(UNUSED fr_event_list_t *el, UNUSED int fd, UNUSED int flags, int fd_errno, void *uctx)
static int mschapv1_encode(fr_packet_t *packet, fr_pair_list_t *list, char const *password)
static bool already_hex(fr_pair_t *vp)
static fr_dict_attr_t const * attr_user_name
static void client_write(fr_event_list_t *el, int fd, UNUSED int flags, void *uctx)
static char * secret
static fr_dlist_head_t rc_request_list
static fr_dict_attr_t const * attr_coa_filter
static void radclient_get_port(fr_radius_packet_code_t type, uint16_t *port)
static fr_dict_attr_t const * attr_ms_chap_password
#define pair_update_request(_attr, _da)
static int8_t request_cmp(void const *one, void const *two)
static int coa_port
static const char * attr_coa_filter_name
static fr_dict_attr_t const * attr_radclient_coa_filter
static fr_event_update_t const pause_write[]
static NEVER_RETURNS void usage(void)
static fr_radius_packet_code_t radclient_get_code(uint16_t port)
static int coa_init(rc_request_t *parent, FILE *coa_reply, char const *reply_filename, bool *coa_reply_done, FILE *coa_filter, char const *filter_filename, bool *coa_filter_done)
Structures for the radclient utility.
#define REDEBUG(fmt,...)
Definition radclient.h:52
uint64_t num
The number (within the file) of the request were reading.
Definition radclient.h:77
#define RDEBUG(fmt,...)
Definition radclient.h:53
fr_pair_t * password
Password.Cleartext.
Definition radclient.h:86
uint64_t accepted
Requests to which we received a accept.
Definition radclient.h:57
fr_packet_t * reply
The incoming response.
Definition radclient.h:90
fr_pair_list_t request_pairs
Definition radclient.h:92
char const * coa_reply
file containing the CoA filter we want to match
Definition radclient.h:71
uint64_t rejected
Requests to which we received a reject.
Definition radclient.h:58
fr_rb_node_t node
rbtree node data for CoA
Definition radclient.h:84
char const * packets
The file containing the request packet.
Definition radclient.h:67
uint64_t lost
Requests to which we received no response.
Definition radclient.h:59
bool done
Whether the request is complete.
Definition radclient.h:100
char const * coa_filter
file containing the CoA filter we want to match
Definition radclient.h:70
fr_pair_list_t filter
If the reply passes the filter, then the request passes.
Definition radclient.h:95
uint64_t failed
Requests which failed a filter.
Definition radclient.h:62
fr_pair_list_t reply_pairs
Definition radclient.h:93
uint64_t passed
Requests which passed a filter.
Definition radclient.h:61
fr_radius_packet_code_t filter_code
Expected code of the response packet.
Definition radclient.h:96
fr_time_t timestamp
Definition radclient.h:87
char const * name
Test name (as specified in the request).
Definition radclient.h:102
#define WARN(fmt,...)
Definition radclient.h:47
char const * filters
The file containing the definition of the packet we want to match.
Definition radclient.h:68
fr_packet_t * packet
The outgoing request.
Definition radclient.h:89
rc_file_pair_t * files
Request and response file names.
Definition radclient.h:81
#define RADIUS_MAX_ATTRIBUTES
Definition radius.h:40
#define FR_RADIUS_PACKET_CODE_VALID(_x)
Definition radius.h:52
static bool cleanup
Definition radsniff.c:60
uint32_t fr_rand(void)
Return a 32-bit random number.
Definition rand.c:105
void fr_rand_buffer(void *start, size_t length)
Definition rand.c:125
bool fr_rb_insert(fr_rb_tree_t *tree, void const *data)
Insert data into a tree.
Definition rb.c:626
bool fr_rb_delete(fr_rb_tree_t *tree, void const *data)
Remove node and free data (if a free function was specified)
Definition rb.c:741
#define fr_rb_talloc_alloc(_ctx, _type, _data_cmp, _data_free)
Allocs a red black that verifies elements are of a specific talloc type.
Definition rb.h:205
The main red black tree structure.
Definition rb.h:73
fr_packet_t * reply
Outgoing response.
Definition request.h:252
char const *fr_packet_t * packet
< Module the request is currently being processed by.
Definition request.h:251
#define reply_pairs
Convenience macro for accessing the reply list.
Definition request.h:127
static char const * name
void smbdes_mschap(uint8_t const win_password[16], uint8_t const *challenge, uint8_t *response)
Definition smbdes.c:339
void fr_radius_client_bio_connect(NDEBUG_UNUSED fr_event_list_t *el, NDEBUG_UNUSED int fd, UNUSED int flags, void *uctx)
Definition client.c:690
int fr_radius_client_fd_bio_cancel(fr_bio_packet_t *bio, fr_packet_t *packet)
Cancel one packet.
Definition client.c:555
fr_bio_packet_t * fr_radius_client_bio_alloc(TALLOC_CTX *ctx, fr_radius_client_config_t *cfg, fr_bio_fd_config_t const *fd_cfg)
Definition client.c:50
int fr_radius_client_bio_force_id(fr_bio_packet_t *bio, int code, int id)
Definition client.c:660
size_t fr_radius_client_bio_outstanding(fr_bio_packet_t *bio)
Definition client.c:640
fr_radius_client_bio_info_t const * fr_radius_client_bio_info(fr_bio_packet_t *bio)
Definition client.c:652
fr_aka_sim_id_type_t type
fr_pair_t * vp
#define fr_time()
Allow us to arbitrarily manipulate time.
Definition state_test.c:8
fr_log_dst_t dst
Log destination.
Definition log.h:97
int fd
File descriptor to write messages to.
Definition log.h:112
bool print_level
sometimes we don't want log levels printed
Definition log.h:106
Stores an attribute, a value and various bits of other data.
Definition pair.h:68
fr_dict_attr_t const *_CONST da
Dictionary attribute defines the attribute number, vendor and type of the pair.
Definition pair.h:69
char const * fr_syserror(int num)
Guaranteed to be thread-safe version of strerror.
Definition syserror.c:243
#define fr_table_value_by_str(_table, _name, _def)
Convert a string to a value using a sorted or ordered table.
Definition table.h:653
#define talloc_autofree_context
The original function is deprecated, so replace it with our version.
Definition talloc.h:51
fr_slen_t fr_time_delta_from_str(fr_time_delta_t *out, char const *in, size_t inlen, fr_time_res_t hint)
Create fr_time_delta_t from a string.
Definition time.c:412
int fr_time_start(void)
Initialize the local time.
Definition time.c:150
static int64_t fr_time_delta_unwrap(fr_time_delta_t time)
Definition time.h:154
static fr_time_delta_t fr_time_delta_from_sec(int64_t sec)
Definition time.h:590
@ FR_TIME_RES_SEC
Definition time.h:50
#define NSEC
Definition time.h:379
A time delta, a difference in time measured in nanoseconds.
Definition time.h:80
"server local" time.
Definition time.h:69
static fr_event_list_t * el
#define FR_DICTIONARY_FILE
Definition conf.h:7
void * uctx
Definition packet.h:79
unsigned int code
Packet code (type).
Definition packet.h:61
fr_socket_t socket
This packet was received on.
Definition packet.h:57
int id
Packet ID (used to link requests/responses).
Definition packet.h:60
uint8_t * data
Packet data (body).
Definition packet.h:63
uint8_t vector[RADIUS_AUTH_VECTOR_LENGTH]
RADIUS authentication vector.
Definition packet.h:69
bool fr_pair_list_empty(fr_pair_list_t const *list)
Is a valuepair list empty.
void fr_pair_list_sort(fr_pair_list_t *list, fr_cmp_t cmp)
Sort a doubly linked list of fr_pair_ts using merge sort.
fr_pair_t * fr_pair_list_next(fr_pair_list_t const *list, fr_pair_t const *item))
Get the next item in a valuepair list after a specific entry.
Definition pair_inline.c:69
fr_pair_t * fr_pair_list_head(fr_pair_list_t const *list)
Get the head of a valuepair list.
Definition pair_inline.c:42
static fr_slen_t parent
Definition pair.h:857
fr_time_delta_t irt
Initial transmission time.
Definition retry.h:33
int af
AF_INET, AF_INET6, or AF_UNIX.
Definition socket.h:78
int fd
File descriptor if this is a live socket.
Definition socket.h:81
char const * fr_strerror(void)
Get the last library error.
Definition strerror.c:553
void fr_perror(char const *fmt,...)
Print the current error to stderr with a prefix.
Definition strerror.c:732
void fr_strerror_clear(void)
Clears all pending messages from the talloc pools.
Definition strerror.c:576
int fr_check_lib_magic(uint64_t magic)
Check if the application linking to the library has the correct magic number.
Definition version.c:40
#define RADIUSD_VERSION_BUILD(_x)
Create a version string for a utility in the suite of FreeRADIUS utilities.
Definition version.h:58
#define RADIUSD_MAGIC_NUMBER
Definition version.h:81
int8_t fr_value_box_cmp(fr_value_box_t const *a, fr_value_box_t const *b)
Compare two values.
Definition value.c:743
#define fr_box_time_delta(_val)
Definition value.h:365