The FreeRADIUS server  $Id: 15bac2a4c627c01d1aa2047687b3418955ac7f00 $
verify.c
Go to the documentation of this file.
1 /*
2  * This program is free software; you can redistribute it and/or modify
3  * it under the terms of the GNU General Public License as published by
4  * the Free Software Foundation; either version 2 of the License, or
5  * (at your option) any later version.
6  *
7  * This program is distributed in the hope that it will be useful,
8  * but WITHOUT ANY WARRANTY; without even the implied warranty of
9  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
10  * GNU General Public License for more details.
11  *
12  * You should have received a copy of the GNU General Public License
13  * along with this program; if not, write to the Free Software
14  * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
15  */
16 
17 /**
18  * $Id: f55f7875cedd10829152caa9ad8b2aef1bb465a3 $
19  *
20  * @file tls/verify.c
21  * @brief Expose certificate OIDs as attributes, and call validation virtual
22  * server to check cert is valid.
23  *
24  * @copyright 2001 hereUare Communications, Inc. (raghud@hereuare.com)
25  * @copyright 2003 Alan DeKok (aland@freeradius.org)
26  * @copyright 2006-2016 The FreeRADIUS server project
27  */
28 #ifdef WITH_TLS
29 #define LOG_PREFIX "tls"
30 
31 #include <freeradius-devel/server/exec.h>
32 #include <freeradius-devel/server/pair.h>
33 #include <freeradius-devel/tls/log.h>
34 #include <freeradius-devel/unlang/function.h>
35 #include <freeradius-devel/unlang/interpret.h>
36 #include <freeradius-devel/unlang/subrequest.h>
37 #include <freeradius-devel/util/debug.h>
38 #include <freeradius-devel/util/strerror.h>
39 #include <freeradius-devel/util/syserror.h>
40 
41 #include "attrs.h"
42 #include "base.h"
43 
44 /** Check to see if a verification operation should apply to a certificate
45  *
46  * @param[in] depth starting at 0.
47  * Certificate 0 is the leaf cert (i.e. the client or server cert);
48  * @param[in] untrusted The number of untrusted certificates.
49  * @param[in] mode to check
50  * @return
51  * - true if a given validation check should apply.
52  ** - false if a validation check should not apply.
53  */
54 static inline CC_HINT(always_inline)
55 bool verify_applies(fr_tls_verify_mode_t mode, int depth, int untrusted)
56 {
57  if (mode == FR_TLS_VERIFY_MODE_ALL) return true;
58  if (mode == FR_TLS_VERIFY_MODE_DISABLED) return false;
59 
60  if ((mode & FR_TLS_VERIFY_MODE_LEAF) && (depth == 0)) return true;
61  if ((mode & FR_TLS_VERIFY_MODE_ISSUER) && (depth == 1)) return true;
62  if ((mode & FR_TLS_VERIFY_MODE_UNTRUSTED) && (depth < untrusted)) return true;
63 
64  return false;
65 }
66 
68 DIAG_OFF(used-but-marked-unused) /* fix spurious warnings for sk macros */
69 
70 /** Print verbose humanly readable messages about why certificate validation failed
71  *
72  */
73 static void tls_verify_error_detail(request_t *request, SSL_CTX *ctx, int err)
74 {
75  X509_STORE *store = SSL_CTX_get_ex_data(ctx, FR_TLS_EX_CTX_INDEX_VERIFY_STORE);
76 
77  switch (err) {
78  /*
79  * We linked the provided cert to at least one
80  * other in a chain, but the chain doesn't terminate
81  * in a root CA.
82  */
83  case X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT:
85 
86  /*
87  * We failed to link the provided cert to any
88  * other local certificates in the chain.
89  */
90  case X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY:
91  RDEBUG2("Static certificates in verification store are");
92  if (RDEBUG_ENABLED2) {
93  RINDENT();
94  fr_tls_x509_objects_log(request, L_DBG, X509_STORE_get0_objects(store));
95  REXDENT();
96  }
97  break;
98 
99  default:
100  break;
101  }
102 }
103 
104 /** Validates a certificate using custom logic
105  *
106  * Before trusting a certificate, we make sure that the certificate is
107  * 'valid'. There are several checks we perform to verify its validity.
108  *
109  * 1. Verify the certificate's signature, and verifying that the certificate has
110  * been issued by a trusted Certificate Authority (this is done for us by OpenSSL).
111  *
112  * 2. Verify that the certificate is valid for the present date (i.e. it is being
113  * presented within its validity dates).
114  *
115  * 3. Verify that the certificate has not been revoked by its issuing Certificate
116  * Authority, by checking with respect to a Certificate Revocation List (CRL).
117  *
118  * @note This callback will be called multiple times based on the depth of the root
119  * certificate chain.
120  *
121  * @note As a byproduct of validation, various OIDs will be extracted from the
122  * certificates, and inserted into the session-state list as fr_pair_t.
123  *
124  * @param ok preverify ok. 1 if true, 0 if false.
125  * @param x509_ctx containing certs to verify.
126  * @return
127  * - 0 if not valid.
128  * - 1 if valid.
129  */
130 int fr_tls_verify_cert_cb(int ok, X509_STORE_CTX *x509_ctx)
131 {
132  X509 *cert;
133 
134  SSL_CTX *ssl_ctx;
135  SSL *ssl;
136  fr_tls_session_t *tls_session;
137  int err, depth;
138  fr_tls_conf_t *conf;
139  int my_ok = ok;
140  int untrusted;
141 
142  request_t *request;
143  fr_pair_t *container = NULL;
144 
145  cert = X509_STORE_CTX_get_current_cert(x509_ctx);
146  err = X509_STORE_CTX_get_error(x509_ctx);
147  depth = X509_STORE_CTX_get_error_depth(x509_ctx);
148  untrusted = X509_STORE_CTX_get_num_untrusted(x509_ctx);
149 
150  /*
151  * Retrieve the pointer to the SSL of the connection currently treated
152  * and the application specific data stored into the SSL object.
153  */
154  ssl = X509_STORE_CTX_get_ex_data(x509_ctx, SSL_get_ex_data_X509_STORE_CTX_idx());
155  ssl_ctx = SSL_get_SSL_CTX(ssl);
156  conf = fr_tls_session_conf(ssl);
157  tls_session = talloc_get_type_abort(SSL_get_ex_data(ssl, FR_TLS_EX_INDEX_TLS_SESSION), fr_tls_session_t);
158  request = fr_tls_session_request(tls_session->ssl);
159 
160  /*
161  * If this error appears it suggests
162  * that OpenSSL is trying to perform post-handshake
163  * certificate validation which we don't support.
164  */
165  if (!tls_session->can_pause) {
166  fr_assert_msg("Unexpected call to %s. "
167  "tls_session_async_handshake_cont must be in call stack", __FUNCTION__);
168  return 0;
169  }
170 
171  /*
172  * Bail out as quickly as possible, producing
173  * as few errors as possible.
174  */
175  if (unlang_request_is_cancelled(request)) {
176  X509_STORE_CTX_set_error(x509_ctx, 0);
177  return 1;
178  }
179 
180  if (RDEBUG_ENABLED3) {
181  char subject[2048];
182  STACK_OF(X509) *our_chain;
183  int i;
184 
185  our_chain = X509_STORE_CTX_get0_chain(x509_ctx);
186  RDEBUG3("Certificate chain - %i cert(s) untrusted", untrusted);
187  for (i = sk_X509_num(our_chain); i > 0 ; i--) {
188  X509 *this_cert = sk_X509_value(our_chain, i - 1);
189 
190  X509_NAME_oneline(X509_get_subject_name(this_cert), subject, sizeof(subject));
191  subject[sizeof(subject) - 1] = '\0';
192 
193  RDEBUG3("%s [%i] %s", this_cert == cert ? ">" : " ", i - 1, subject);
194  }
195  }
196 
197  /*
198  * See if the user has disabled verification for
199  * this certificate. If they have, force verification
200  * to succeed.
201  */
202  if (!my_ok) {
203  char const *p = X509_verify_cert_error_string(err);
204  if (!verify_applies(conf->verify.mode, depth, untrusted) ||
205  ((conf->verify.allow_expired_crl) && (err == X509_V_ERR_CRL_HAS_EXPIRED)) ||
206  ((conf->verify.allow_not_yet_valid_crl) && (err == X509_V_ERR_CRL_NOT_YET_VALID))) {
207  RDEBUG2("Ignoring verification error - %s (%i)", p, err);
208  tls_verify_error_detail(request, ssl_ctx, err);
209 
210  my_ok = 1;
211  X509_STORE_CTX_set_error(x509_ctx, 0);
212  } else {
213  RERROR("Verification error - %s (%i)", p, err);
214  tls_verify_error_detail(request, ssl_ctx, err);
215  goto done;
216  }
217  }
218 
219  if (verify_applies(conf->verify.attribute_mode, depth, untrusted) &&
220  (!(container = fr_pair_find_by_da_idx(&request->session_state_pairs, attr_tls_certificate, depth)) ||
221  fr_pair_list_empty(&container->vp_group))) {
222  if (!container) {
223  unsigned int i;
224 
225  /*
226  * Build a stack of container attributes.
227  *
228  * OpenSSL passes us the deepest certificate
229  * first, so we need to build out sufficient
230  * TLS-Certificate container TLVs so the TLS-Certificate
231  * indexes match the attribute depth.
232  */
233  for (i = fr_pair_count_by_da(&request->session_state_pairs, attr_tls_certificate);
234  i <= (unsigned int)depth;
235  i++) {
236  MEM(container = fr_pair_afrom_da(request->session_state_ctx, attr_tls_certificate));
237  fr_pair_append(&request->session_state_pairs, container);
238  }
239  }
240 
241 #ifdef STATIC_ANALYZER
242  /*
243  * Container can never be NULL, because if container
244  * was previously NULL, i will be <= depth.
245  */
246  if (!fr_cond_assert(container)) {
247  my_ok = 0;
248  goto done;
249  }
250 #endif
251  /*
252  * If we fail to populate the cert attributes,
253  * trash all instances in the session-state list
254  * and cause validation to fail.
255  */
256  if (fr_tls_session_pairs_from_x509_cert(&container->vp_group, container,
257  request, cert) < 0) {
258  fr_pair_delete_by_da(&request->session_state_pairs, attr_tls_certificate);
259  my_ok = 0;
260  goto done;
261  }
262 
263  log_request_pair(L_DBG_LVL_2, request, NULL, container, "&session-state.");
264  }
265 done:
266  /*
267  * If verification hasn't already failed
268  * and we're meant to verify this cert
269  * then call the virtual server.
270  *
271  * We only call the virtual server for
272  * the certificate at depth 0 as all
273  * other certificate attributes should
274  * have been added by this point.
275  */
276  if (my_ok && (depth == 0)) {
277  if (conf->virtual_server && tls_session->verify_client_cert) {
278  RDEBUG2("Requesting certificate validation");
279 
280  /*
281  * This sets the validation state of the tls_session
282  * so that when we call ASYNC_pause_job(), and execution
283  * jumps back to tls_session_async_handshake_cont
284  * (just under SSL_read())
285  * the code there knows what job it needs to push onto
286  * the unlang stack.
287  */
288  fr_tls_verify_cert_request(tls_session, SSL_session_reused(tls_session->ssl));
289 
290  /*
291  * Jumps back to SSL_read() in session.c
292  *
293  * Be aware that if the request is cancelled
294  * whatever was meant to be done during the
295  * time we yielded may not have been completed.
296  */
297  ASYNC_pause_job();
298 
299  /*
300  * Just try and bail out as quickly as possible.
301  */
302  if (unlang_request_is_cancelled(request)) {
303  X509_STORE_CTX_set_error(x509_ctx, 0);
304  fr_tls_verify_cert_reset(tls_session);
305  return 1;
306  }
307 
308 
309  /*
310  * If we couldn't validate the certificate
311  * then validation overall fails.
312  */
313  if (!fr_tls_verify_cert_result(tls_session)) {
314  REDEBUG("Certificate validation failed");
315  my_ok = 0;
316  X509_STORE_CTX_set_error(x509_ctx, X509_V_ERR_APPLICATION_VERIFICATION);
317  }
318  }
319  }
320 
321  tls_session->client_cert_ok = (my_ok > 0);
322  RDEBUG2("[verify] = %s", my_ok ? "ok" : "invalid");
323 
324  return my_ok;
325 }
326 DIAG_ON(used-but-marked-unused)
328 
329 /** Revalidates the client's certificate chain
330  *
331  * Wraps the fr_tls_verify_cert_cb callback, allowing us to use the same
332  * validation logic whenever we need to.
333  *
334  * @note Only use so far is forcing the chain to be re-validated on session
335  * resumption.
336  *
337  * @return
338  * - 1 if the chain could be validated.
339  * - 0 if the chain failed validation.
340  */
341 int fr_tls_verify_cert_chain(request_t *request, SSL *ssl)
342 {
343  int err;
344  int verify;
345  int ret = 1;
346 
347  SSL_CTX *ssl_ctx;
348  STACK_OF(X509) *chain;
349  X509 *cert;
350  X509_STORE *store;
351  X509_STORE_CTX *store_ctx;
352 
353  /*
354  * If there's no client certificate, we just return OK.
355  */
356  cert = SSL_get0_peer_certificate(ssl); /* Does not increase ref count */
357  if (!cert) return 1;
358 
359  ssl_ctx = SSL_get_SSL_CTX(ssl);
360  store_ctx = X509_STORE_CTX_new();
361  chain = SSL_get_peer_cert_chain(ssl); /* Does not increase ref count */
362  store = SSL_CTX_get_ex_data(ssl_ctx, FR_TLS_EX_CTX_INDEX_VERIFY_STORE); /* Gets the verification store */
363 
364  /*
365  * This sets up a store_ctx for doing peer certificate verification.
366  *
367  * store_ctx - Is the ctx to initialise
368  * store - Is an X509_STORE of implicitly
369  * trusted certificates. Here we're using
370  * the verify store that was created when we
371  * allocated the SSL_CTX.
372  * cert - Is the certificate to validate.
373  * chain - Is any other certificates the peer provided
374  * us in order to build a chain from a trusted
375  * root or intermediary to its leaf (cert).
376  *
377  * Note: SSL_CTX_get_cert_store() returns the ctx->cert_store, which
378  * is not the same as the verification cert store.
379  */
380  X509_STORE_CTX_init(store_ctx, store, cert, chain);
381  X509_STORE_CTX_set_ex_data(store_ctx, SSL_get_ex_data_X509_STORE_CTX_idx(), ssl);
382  X509_STORE_CTX_set_verify_cb(store_ctx, fr_tls_verify_cert_cb);
383 
384  verify = X509_verify_cert(store_ctx);
385  if (verify != 1) {
386  err = X509_STORE_CTX_get_error(store_ctx);
387 
388  if (err != X509_V_OK) {
389  REDEBUG("Failed re-validating resumed session: %s", X509_verify_cert_error_string(err));
390  ret = 0;
391  }
392  }
393 
394  X509_STORE_CTX_free(store_ctx);
395 
396  return ret;
397 }
398 
399 /** Process the result of `verify certificate { ... }`
400  *
401  */
402 static unlang_action_t tls_verify_client_cert_result(UNUSED rlm_rcode_t *p_result, UNUSED int *priority,
403  request_t *request, void *uctx)
404 {
405  fr_tls_session_t *tls_session = talloc_get_type_abort(uctx, fr_tls_session_t);
406  fr_pair_t *vp;
407 
408  fr_assert(tls_session->validate.state == FR_TLS_VALIDATION_REQUESTED);
409 
410  vp = fr_pair_find_by_da(&request->reply_pairs, NULL, attr_tls_packet_type);
411  if (!vp || (vp->vp_uint32 != enum_tls_packet_type_success->vb_uint32)) {
412  REDEBUG("Failed (re-)validating certificates");
413  tls_session->validate.state = FR_TLS_VALIDATION_FAILED;
415  }
416 
417  tls_session->validate.state = FR_TLS_VALIDATION_SUCCESS;
418 
419  RDEBUG2("Certificates (re-)validated");
420 
422 }
423 
424 /** Push a `verify certificate { ... }` call into the current request, using a subrequest
425  *
426  * @param[in] request The current request.
427  * @Param[in] tls_session The current TLS session.
428  * @return
429  * - UNLANG_ACTION_CALCULATE_RESULT on noop.
430  * - UNLANG_ACTION_PUSHED_CHILD on success.
431  * - UNLANG_ACTION_FAIL on failure.
432  */
433 static unlang_action_t tls_verify_client_cert_push(request_t *request, fr_tls_session_t *tls_session)
434 {
435  fr_tls_conf_t *conf = fr_tls_session_conf(tls_session->ssl);
436  request_t *child;
437  fr_pair_t *vp;
438  unlang_action_t ua;
439 
440  MEM(child = unlang_subrequest_alloc(request, dict_tls));
441  request = child;
442 
443  /*
444  * Add extra pairs to the subrequest
445  */
446  fr_tls_session_extra_pairs_copy_to_child(child, tls_session);
447 
448  /*
449  * Setup the child request for loading
450  * session resumption data.
451  */
453  vp->vp_uint32 = enum_tls_packet_type_verify_certificate->vb_uint32;
454 
455  /*
456  * Copy certificate pairs to the child session state
457  */
458  vp = NULL;
459  while ((vp = fr_pair_find_by_da(&request->parent->session_state_pairs, vp, attr_tls_certificate))) {
460  fr_pair_append(&request->session_state_pairs, fr_pair_copy(request->session_state_ctx, vp));
461  }
462 
464  vp->vp_bool = tls_session->validate.resumed;
465 
466  /*
467  * Allocate a child, and set it up to call
468  * the TLS virtual server.
469  */
470  ua = fr_tls_call_push(child, tls_verify_client_cert_result, conf, tls_session);
471  if (ua < 0) {
472  PERROR("Failed calling TLS virtual server");
473  talloc_free(child);
474  return UNLANG_ACTION_FAIL;
475  }
476 
477  return ua;
478 }
479 
480 /** Clear any previous validation result
481  *
482  * Should be called by the validation requestor to get the result and reset
483  * the validation state.
484  *
485  * @return
486  * - true if the certificate chain was validated.
487  * - false if the certificate chain failed validation.
488  */
489 bool fr_tls_verify_cert_result(fr_tls_session_t *tls_session)
490 {
491  bool result;
492 
493  fr_assert(tls_session->validate.state != FR_TLS_VALIDATION_INIT);
494 
495  result = tls_session->validate.state == FR_TLS_VALIDATION_SUCCESS;
496 
497  tls_session->validate.state = FR_TLS_VALIDATION_INIT;
498  tls_session->validate.resumed = false;
499 
500  return result;
501 }
502 
503 /** Reset the verification state
504  *
505  */
506 void fr_tls_verify_cert_reset(fr_tls_session_t *tls_session)
507 {
508  tls_session->validate.state = FR_TLS_VALIDATION_INIT;
509  tls_session->validate.resumed = false;
510 }
511 
512 /** Setup a verification request
513  *
514  */
515 void fr_tls_verify_cert_request(fr_tls_session_t *tls_session, bool session_resumed)
516 {
517  fr_assert(tls_session->validate.state == FR_TLS_VALIDATION_INIT);
518 
519  tls_session->validate.state = FR_TLS_VALIDATION_REQUESTED;
520  tls_session->validate.resumed = session_resumed;
521 }
522 
523 /** Push a `verify certificate { ... }` section
524  *
525  * @param[in] request The current request.
526  * @Param[in] tls_session The current TLS session.
527  * @return
528  * - UNLANG_ACTION_CALCULATE_RESULT - No pending actions
529  * - UNLANG_ACTION_PUSHED_CHILD - Pending operations to evaluate.
530  */
531 unlang_action_t fr_tls_verify_cert_pending_push(request_t *request, fr_tls_session_t *tls_session)
532 {
533  if (tls_session->validate.state == FR_TLS_VALIDATION_REQUESTED) {
534  return tls_verify_client_cert_push(request, tls_session);
535  }
536 
538 }
539 #endif /* WITH_TLS */
unlang_action_t
Returned by unlang_op_t calls, determine the next action of the interpreter.
Definition: action.h:35
@ UNLANG_ACTION_FAIL
Encountered an unexpected error.
Definition: action.h:36
@ UNLANG_ACTION_CALCULATE_RESULT
Calculate a new section rlm_rcode_t value.
Definition: action.h:37
#define store(_store, _var)
Definition: atomic_queue.h:48
#define DIAG_UNKNOWN_PRAGMAS
Definition: build.h:454
#define FALL_THROUGH
clang 10 doesn't recognised the FALL-THROUGH comment anymore
Definition: build.h:320
#define DIAG_ON(_x)
Definition: build.h:456
#define UNUSED
Definition: build.h:313
#define DIAG_OFF(_x)
Definition: build.h:455
fr_dcursor_eval_t void const * uctx
Definition: dcursor.h:546
#define fr_cond_assert(_x)
Calls panic_action ifndef NDEBUG, else logs error and evaluates to value of _x.
Definition: debug.h:139
#define fr_assert_msg(_x, _msg,...)
Calls panic_action ifndef NDEBUG, else logs error and causes the server to exit immediately with code...
Definition: debug.h:210
static fr_slen_t err
Definition: dict.h:821
bool unlang_request_is_cancelled(request_t const *request)
Return whether a request has been cancelled.
Definition: interpret.c:1322
HIDDEN fr_dict_attr_t const * attr_tls_certificate
Attribute definitions for lib curl.
Definition: base.c:36
void log_request_pair(fr_log_lvl_t lvl, request_t *request, fr_pair_t const *parent, fr_pair_t const *vp, char const *prefix)
Print a fr_pair_t.
Definition: log.c:781
#define PERROR(_fmt,...)
Definition: log.h:228
#define REXDENT()
Exdent (unindent) R* messages by one level.
Definition: log.h:443
#define RDEBUG_ENABLED3
True if request debug level 1-3 messages are enabled.
Definition: log.h:335
#define RDEBUG3(fmt,...)
Definition: log.h:343
#define RERROR(fmt,...)
Definition: log.h:298
#define RINDENT()
Indent R* messages by one level.
Definition: log.h:430
HIDDEN fr_dict_attr_t const * attr_tls_packet_type
HIDDEN fr_dict_t const * dict_tls
HIDDEN fr_dict_attr_t const * attr_tls_session_resumed
fr_value_box_t const * enum_tls_packet_type_success
fr_value_box_t const * enum_tls_packet_type_verify_certificate
talloc_free(reap)
@ L_DBG_LVL_2
2nd highest priority debug messages (-xx | -X).
Definition: log.h:71
@ L_DBG
Only displayed when debugging is enabled.
Definition: log.h:59
static size_t used
static uint8_t depth(fr_minmax_heap_index_t i)
Definition: minmax_heap.c:83
fr_pair_t * fr_pair_find_by_da(fr_pair_list_t const *list, fr_pair_t const *prev, fr_dict_attr_t const *da)
Find the first pair with a matching da.
Definition: pair.c:693
unsigned int fr_pair_count_by_da(fr_pair_list_t const *list, fr_dict_attr_t const *da)
Return the number of instances of a given da in the specified list.
Definition: pair.c:670
fr_pair_t * fr_pair_afrom_da(TALLOC_CTX *ctx, fr_dict_attr_t const *da)
Dynamically allocate a new attribute and assign a fr_dict_attr_t.
Definition: pair.c:283
int fr_pair_append(fr_pair_list_t *list, fr_pair_t *to_add)
Add a VP to the end of the list.
Definition: pair.c:1345
int fr_pair_delete_by_da(fr_pair_list_t *list, fr_dict_attr_t const *da)
Delete matching pairs from the specified list.
Definition: pair.c:1689
fr_pair_t * fr_pair_find_by_da_idx(fr_pair_list_t const *list, fr_dict_attr_t const *da, unsigned int idx)
Find a pair with a matching da at a given index.
Definition: pair.c:741
fr_pair_t * fr_pair_copy(TALLOC_CTX *ctx, fr_pair_t const *vp)
Copy a single valuepair.
Definition: pair.c:489
static bool done
Definition: radclient.c:80
#define REDEBUG(fmt,...)
Definition: radclient.h:52
#define RDEBUG_ENABLED2()
Definition: radclient.h:50
#define RDEBUG2(fmt,...)
Definition: radclient.h:54
static rs_t * conf
Definition: radsniff.c:53
rlm_rcode_t
Return codes indicating the result of the module call.
Definition: rcode.h:40
#define pair_append_request(_attr, _da)
Allocate and append a fr_pair_t to the request list.
Definition: pair.h:37
#define pair_prepend_request(_attr, _da)
Allocate and prepend a fr_pair_t to the request list.
Definition: pair.h:77
fr_assert(0)
MEM(pair_append_request(&vp, attr_eap_aka_sim_identity) >=0)
fr_pair_t * vp
Stores an attribute, a value and various bits of other data.
Definition: pair.h:68
request_t * unlang_subrequest_alloc(request_t *parent, fr_dict_t const *namespace)
Allocate a subrequest to run through a virtual server at some point in the future.
Definition: subrequest.c:287
bool fr_pair_list_empty(fr_pair_list_t const *list)
Is a valuepair list empty.
Definition: pair_inline.c:125