The FreeRADIUS server $Id: 15bac2a4c627c01d1aa2047687b3418955ac7f00 $
Loading...
Searching...
No Matches
verify.c
Go to the documentation of this file.
1/*
2 * This program is free software; you can redistribute it and/or modify
3 * it under the terms of the GNU General Public License as published by
4 * the Free Software Foundation; either version 2 of the License, or
5 * (at your option) any later version.
6 *
7 * This program is distributed in the hope that it will be useful,
8 * but WITHOUT ANY WARRANTY; without even the implied warranty of
9 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
10 * GNU General Public License for more details.
11 *
12 * You should have received a copy of the GNU General Public License
13 * along with this program; if not, write to the Free Software
14 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
15 */
16
17/**
18 * $Id: 5cb32159b53a6d2ad1a4b7eb72683f5f2e8162ce $
19 *
20 * @file tls/verify.c
21 * @brief Expose certificate OIDs as attributes, and call validation virtual
22 * server to check cert is valid.
23 *
24 * @copyright 2001 hereUare Communications, Inc. (raghud@hereuare.com)
25 * @copyright 2003 Alan DeKok (aland@freeradius.org)
26 * @copyright 2006-2016 The FreeRADIUS server project
27 */
28#ifdef WITH_TLS
29#define LOG_PREFIX "tls"
30
31#include <freeradius-devel/server/exec.h>
32#include <freeradius-devel/server/pair.h>
33#include <freeradius-devel/tls/log.h>
34#include <freeradius-devel/unlang/function.h>
35#include <freeradius-devel/unlang/interpret.h>
36#include <freeradius-devel/unlang/subrequest.h>
37#include <freeradius-devel/util/debug.h>
38#include <freeradius-devel/util/strerror.h>
39#include <freeradius-devel/util/syserror.h>
40
41#include "attrs.h"
42#include "base.h"
43
44/** Check to see if a verification operation should apply to a certificate
45 *
46 * @param[in] depth starting at 0.
47 * Certificate 0 is the leaf cert (i.e. the client or server cert);
48 * @param[in] untrusted The number of untrusted certificates.
49 * @param[in] mode to check
50 * @return
51 * - true if a given validation check should apply.
52 ** - false if a validation check should not apply.
53 */
54static inline CC_HINT(always_inline)
55bool verify_applies(fr_tls_verify_mode_t mode, int depth, int untrusted)
56{
57 if (mode == FR_TLS_VERIFY_MODE_ALL) return true;
58 if (mode == FR_TLS_VERIFY_MODE_DISABLED) return false;
59
60 if ((mode & FR_TLS_VERIFY_MODE_LEAF) && (depth == 0)) return true;
61 if ((mode & FR_TLS_VERIFY_MODE_ISSUER) && (depth == 1)) return true;
62 if ((mode & FR_TLS_VERIFY_MODE_UNTRUSTED) && (depth < untrusted)) return true;
63
64 return false;
65}
66
68DIAG_OFF(used-but-marked-unused) /* fix spurious warnings for sk macros */
69
70/** Print verbose humanly readable messages about why certificate validation failed
71 *
72 */
73static void tls_verify_error_detail(request_t *request, SSL_CTX *ctx, int err)
74{
75 X509_STORE *store = SSL_CTX_get_ex_data(ctx, FR_TLS_EX_CTX_INDEX_VERIFY_STORE);
76
77 switch (err) {
78 /*
79 * We linked the provided cert to at least one
80 * other in a chain, but the chain doesn't terminate
81 * in a root CA.
82 */
83 case X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT:
85
86 /*
87 * We failed to link the provided cert to any
88 * other local certificates in the chain.
89 */
90 case X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY:
91 RDEBUG2("Static certificates in verification store are");
92 if (RDEBUG_ENABLED2) {
93 RINDENT();
94 fr_tls_x509_objects_log(request, L_DBG, X509_STORE_get0_objects(store));
95 REXDENT();
96 }
97 break;
98
99 default:
100 break;
101 }
102}
103
104/** Validates a certificate using custom logic
105 *
106 * Before trusting a certificate, we make sure that the certificate is
107 * 'valid'. There are several checks we perform to verify its validity.
108 *
109 * 1. Verify the certificate's signature, and verifying that the certificate has
110 * been issued by a trusted Certificate Authority (this is done for us by OpenSSL).
111 *
112 * 2. Verify that the certificate is valid for the present date (i.e. it is being
113 * presented within its validity dates).
114 *
115 * 3. Verify that the certificate has not been revoked by its issuing Certificate
116 * Authority, by checking with respect to a Certificate Revocation List (CRL).
117 *
118 * @note This callback will be called multiple times based on the depth of the root
119 * certificate chain.
120 *
121 * @note As a byproduct of validation, various OIDs will be extracted from the
122 * certificates, and inserted into the session-state list as fr_pair_t.
123 *
124 * @param ok preverify ok. 1 if true, 0 if false.
125 * @param x509_ctx containing certs to verify.
126 * @return
127 * - 0 if not valid.
128 * - 1 if valid.
129 */
130int fr_tls_verify_cert_cb(int ok, X509_STORE_CTX *x509_ctx)
131{
132 X509 *cert;
133
134 SSL_CTX *ssl_ctx;
135 SSL *ssl;
136 fr_tls_session_t *tls_session;
137 int err, depth;
138 fr_tls_conf_t *conf;
139 int my_ok = ok;
140 int untrusted;
141
142 request_t *request;
143 fr_pair_t *container = NULL;
144
145 cert = X509_STORE_CTX_get_current_cert(x509_ctx);
146 err = X509_STORE_CTX_get_error(x509_ctx);
147 depth = X509_STORE_CTX_get_error_depth(x509_ctx);
148 untrusted = X509_STORE_CTX_get_num_untrusted(x509_ctx);
149
150 /*
151 * Retrieve the pointer to the SSL of the connection currently treated
152 * and the application specific data stored into the SSL object.
153 */
154 ssl = X509_STORE_CTX_get_ex_data(x509_ctx, SSL_get_ex_data_X509_STORE_CTX_idx());
155 ssl_ctx = SSL_get_SSL_CTX(ssl);
156 conf = fr_tls_session_conf(ssl);
157 tls_session = talloc_get_type_abort(SSL_get_ex_data(ssl, FR_TLS_EX_INDEX_TLS_SESSION), fr_tls_session_t);
158 request = fr_tls_session_request(tls_session->ssl);
159
160 /*
161 * If this error appears it suggests
162 * that OpenSSL is trying to perform post-handshake
163 * certificate validation which we don't support.
164 */
165 if (!tls_session->can_pause) {
166 fr_assert_msg("Unexpected call to %s. "
167 "tls_session_async_handshake_cont must be in call stack", __FUNCTION__);
168 return 0;
169 }
170
171 /*
172 * Bail out as quickly as possible, producing
173 * as few errors as possible.
174 */
175 if (unlang_request_is_cancelled(request)) {
176 X509_STORE_CTX_set_error(x509_ctx, 0);
177 return 1;
178 }
179
180 if (RDEBUG_ENABLED3) {
181 char subject[2048];
182 STACK_OF(X509) *our_chain;
183 int i;
184
185 our_chain = X509_STORE_CTX_get0_chain(x509_ctx);
186 RDEBUG3("Certificate chain - %i cert(s) untrusted", untrusted);
187 for (i = sk_X509_num(our_chain); i > 0 ; i--) {
188 X509 *this_cert = sk_X509_value(our_chain, i - 1);
189
190 X509_NAME_oneline(X509_get_subject_name(this_cert), subject, sizeof(subject));
191 subject[sizeof(subject) - 1] = '\0';
192
193 RDEBUG3("%s [%i] %s", this_cert == cert ? ">" : " ", i - 1, subject);
194 }
195 }
196
197 /*
198 * See if the user has disabled verification for
199 * this certificate. If they have, force verification
200 * to succeed.
201 */
202 if (!my_ok) {
203 char const *p = X509_verify_cert_error_string(err);
204 if (!verify_applies(conf->verify.mode, depth, untrusted) ||
205 ((conf->verify.allow_expired_crl) && (err == X509_V_ERR_CRL_HAS_EXPIRED)) ||
206 ((conf->verify.allow_not_yet_valid_crl) && (err == X509_V_ERR_CRL_NOT_YET_VALID))) {
207 RDEBUG2("Ignoring verification error - %s (%i)", p, err);
208 tls_verify_error_detail(request, ssl_ctx, err);
209
210 my_ok = 1;
211 X509_STORE_CTX_set_error(x509_ctx, 0);
212 } else {
213 RERROR("Verification error - %s (%i)", p, err);
214 tls_verify_error_detail(request, ssl_ctx, err);
215 goto done;
216 }
217 }
218
219 if (verify_applies(conf->verify.attribute_mode, depth, untrusted) &&
220 (!(container = fr_pair_find_by_da_idx(&request->session_state_pairs, attr_tls_certificate, depth)) ||
221 fr_pair_list_empty(&container->vp_group))) {
222 if (!container) {
223 unsigned int i;
224
225 /*
226 * Build a stack of container attributes.
227 *
228 * OpenSSL passes us the deepest certificate
229 * first, so we need to build out sufficient
230 * TLS-Certificate container TLVs so the TLS-Certificate
231 * indexes match the attribute depth.
232 */
233 for (i = fr_pair_count_by_da(&request->session_state_pairs, attr_tls_certificate);
234 i <= (unsigned int)depth;
235 i++) {
236 MEM(container = fr_pair_afrom_da(request->session_state_ctx, attr_tls_certificate));
237 fr_pair_append(&request->session_state_pairs, container);
238 }
239 }
240
241#ifdef STATIC_ANALYZER
242 /*
243 * Container can never be NULL, because if container
244 * was previously NULL, i will be <= depth.
245 */
246 if (!fr_cond_assert(container)) {
247 my_ok = 0;
248 goto done;
249 }
250#endif
251 /*
252 * If we fail to populate the cert attributes,
253 * trash all instances in the session-state list
254 * and cause validation to fail.
255 */
256 if (fr_tls_session_pairs_from_x509_cert(&container->vp_group, container,
257 request, cert) < 0) {
258 fr_pair_delete_by_da(&request->session_state_pairs, attr_tls_certificate);
259 my_ok = 0;
260 goto done;
261 }
262
263 log_request_pair(L_DBG_LVL_2, request, NULL, container, "&session-state.");
264 }
265done:
266 /*
267 * If verification hasn't already failed
268 * and we're meant to verify this cert
269 * then call the virtual server.
270 *
271 * We only call the virtual server for
272 * the certificate at depth 0 as all
273 * other certificate attributes should
274 * have been added by this point.
275 */
276 if (my_ok && (depth == 0)) {
277 if (conf->verify_certificate && tls_session->verify_client_cert) {
278 RDEBUG2("Requesting certificate validation");
279
280 /*
281 * This sets the validation state of the tls_session
282 * so that when we call ASYNC_pause_job(), and execution
283 * jumps back to tls_session_async_handshake_cont
284 * (just under SSL_read())
285 * the code there knows what job it needs to push onto
286 * the unlang stack.
287 */
288 fr_tls_verify_cert_request(tls_session, SSL_session_reused(tls_session->ssl));
289
290 /*
291 * Jumps back to SSL_read() in session.c
292 *
293 * Be aware that if the request is cancelled
294 * whatever was meant to be done during the
295 * time we yielded may not have been completed.
296 */
297 ASYNC_pause_job();
298
299 /*
300 * Just try and bail out as quickly as possible.
301 */
302 if (unlang_request_is_cancelled(request)) {
303 X509_STORE_CTX_set_error(x509_ctx, 0);
304 fr_tls_verify_cert_reset(tls_session);
305 return 1;
306 }
307
308
309 /*
310 * If we couldn't validate the certificate
311 * then validation overall fails.
312 */
313 if (!fr_tls_verify_cert_result(tls_session)) {
314 REDEBUG("Certificate validation failed");
315 my_ok = 0;
316 X509_STORE_CTX_set_error(x509_ctx, X509_V_ERR_APPLICATION_VERIFICATION);
317 }
318 }
319 }
320
321 tls_session->client_cert_ok = (my_ok > 0);
322 RDEBUG2("[verify] = %s", my_ok ? "ok" : "invalid");
323
324 return my_ok;
325}
326DIAG_ON(used-but-marked-unused)
328
329/** Revalidates the client's certificate chain
330 *
331 * Wraps the fr_tls_verify_cert_cb callback, allowing us to use the same
332 * validation logic whenever we need to.
333 *
334 * @note Only use so far is forcing the chain to be re-validated on session
335 * resumption.
336 *
337 * @return
338 * - 1 if the chain could be validated.
339 * - 0 if the chain failed validation.
340 */
341int fr_tls_verify_cert_chain(request_t *request, SSL *ssl)
342{
343 int err;
344 int verify;
345 int ret = 1;
346
347 SSL_CTX *ssl_ctx;
348 STACK_OF(X509) *chain;
349 X509 *cert;
350 X509_STORE *store;
351 X509_STORE_CTX *store_ctx;
352
353 /*
354 * If there's no client certificate, we just return OK.
355 */
356 cert = SSL_get0_peer_certificate(ssl); /* Does not increase ref count */
357 if (!cert) return 1;
358
359 ssl_ctx = SSL_get_SSL_CTX(ssl);
360 store_ctx = X509_STORE_CTX_new();
361 chain = SSL_get_peer_cert_chain(ssl); /* Does not increase ref count */
362 store = SSL_CTX_get_ex_data(ssl_ctx, FR_TLS_EX_CTX_INDEX_VERIFY_STORE); /* Gets the verification store */
363
364 /*
365 * This sets up a store_ctx for doing peer certificate verification.
366 *
367 * store_ctx - Is the ctx to initialise
368 * store - Is an X509_STORE of implicitly
369 * trusted certificates. Here we're using
370 * the verify store that was created when we
371 * allocated the SSL_CTX.
372 * cert - Is the certificate to validate.
373 * chain - Is any other certificates the peer provided
374 * us in order to build a chain from a trusted
375 * root or intermediary to its leaf (cert).
376 *
377 * Note: SSL_CTX_get_cert_store() returns the ctx->cert_store, which
378 * is not the same as the verification cert store.
379 */
380 X509_STORE_CTX_init(store_ctx, store, cert, chain);
381 X509_STORE_CTX_set_ex_data(store_ctx, SSL_get_ex_data_X509_STORE_CTX_idx(), ssl);
382 X509_STORE_CTX_set_verify_cb(store_ctx, fr_tls_verify_cert_cb);
383
384 verify = X509_verify_cert(store_ctx);
385 if (verify != 1) {
386 err = X509_STORE_CTX_get_error(store_ctx);
387
388 if (err != X509_V_OK) {
389 REDEBUG("Failed re-validating resumed session: %s", X509_verify_cert_error_string(err));
390 ret = 0;
391 }
392 }
393
394 X509_STORE_CTX_free(store_ctx);
395
396 return ret;
397}
398
399/** Process the result of `verify certificate { ... }`
400 *
401 */
402static unlang_action_t tls_verify_client_cert_result(UNUSED rlm_rcode_t *p_result, UNUSED int *priority,
403 request_t *request, void *uctx)
404{
405 fr_tls_session_t *tls_session = talloc_get_type_abort(uctx, fr_tls_session_t);
406 fr_pair_t *vp;
407
408 fr_assert(tls_session->validate.state == FR_TLS_VALIDATION_REQUESTED);
409
410 vp = fr_pair_find_by_da(&request->reply_pairs, NULL, attr_tls_packet_type);
411 if (!vp || (vp->vp_uint32 != enum_tls_packet_type_success->vb_uint32)) {
412 REDEBUG("Failed (re-)validating certificates");
413 tls_session->validate.state = FR_TLS_VALIDATION_FAILED;
415 }
416
417 tls_session->validate.state = FR_TLS_VALIDATION_SUCCESS;
418
419 RDEBUG2("Certificates (re-)validated");
420
422}
423
424/** Push a `verify certificate { ... }` call into the current request, using a subrequest
425 *
426 * @param[in] request The current request.
427 * @param[in] tls_session The current TLS session.
428 * @return
429 * - UNLANG_ACTION_CALCULATE_RESULT on noop.
430 * - UNLANG_ACTION_PUSHED_CHILD on success.
431 * - UNLANG_ACTION_FAIL on failure.
432 */
433static unlang_action_t tls_verify_client_cert_push(request_t *request, fr_tls_session_t *tls_session)
434{
435 fr_tls_conf_t *conf = fr_tls_session_conf(tls_session->ssl);
436 request_t *child;
437 fr_pair_t *vp;
439
440 MEM(child = unlang_subrequest_alloc(request, dict_tls));
441 request = child;
442
443 /*
444 * Add extra pairs to the subrequest
445 */
446 fr_tls_session_extra_pairs_copy_to_child(child, tls_session);
447
448 /*
449 * Setup the child request for loading
450 * session resumption data.
451 */
453 vp->vp_uint32 = enum_tls_packet_type_verify_certificate->vb_uint32;
454
455 /*
456 * Copy certificate pairs to the child session state
457 */
458 vp = NULL;
459 while ((vp = fr_pair_find_by_da(&request->parent->session_state_pairs, vp, attr_tls_certificate))) {
460 fr_pair_append(&request->session_state_pairs, fr_pair_copy(request->session_state_ctx, vp));
461 }
462
464 vp->vp_bool = tls_session->validate.resumed;
465
466 /*
467 * Allocate a child, and set it up to call
468 * the TLS virtual server.
469 */
470 ua = fr_tls_call_push(child, tls_verify_client_cert_result, conf, tls_session);
471 if (ua < 0) {
472 PERROR("Failed calling TLS virtual server");
473 talloc_free(child);
474 return UNLANG_ACTION_FAIL;
475 }
476
477 return ua;
478}
479
480/** Clear any previous validation result
481 *
482 * Should be called by the validation requestor to get the result and reset
483 * the validation state.
484 *
485 * @return
486 * - true if the certificate chain was validated.
487 * - false if the certificate chain failed validation.
488 */
489bool fr_tls_verify_cert_result(fr_tls_session_t *tls_session)
490{
491 bool result;
492
493 fr_assert(tls_session->validate.state != FR_TLS_VALIDATION_INIT);
494
495 result = tls_session->validate.state == FR_TLS_VALIDATION_SUCCESS;
496
497 tls_session->validate.state = FR_TLS_VALIDATION_INIT;
498 tls_session->validate.resumed = false;
499
500 return result;
501}
502
503/** Reset the verification state
504 *
505 */
506void fr_tls_verify_cert_reset(fr_tls_session_t *tls_session)
507{
508 tls_session->validate.state = FR_TLS_VALIDATION_INIT;
509 tls_session->validate.resumed = false;
510}
511
512/** Setup a verification request
513 *
514 */
515void fr_tls_verify_cert_request(fr_tls_session_t *tls_session, bool session_resumed)
516{
517 fr_assert(tls_session->validate.state == FR_TLS_VALIDATION_INIT);
518
519 tls_session->validate.state = FR_TLS_VALIDATION_REQUESTED;
520 tls_session->validate.resumed = session_resumed;
521}
522
523/** Push a `verify certificate { ... }` section
524 *
525 * @param[in] request The current request.
526 * @param[in] tls_session The current TLS session.
527 * @return
528 * - UNLANG_ACTION_CALCULATE_RESULT - No pending actions
529 * - UNLANG_ACTION_PUSHED_CHILD - Pending operations to evaluate.
530 */
531unlang_action_t fr_tls_verify_cert_pending_push(request_t *request, fr_tls_session_t *tls_session)
532{
533 if (tls_session->validate.state == FR_TLS_VALIDATION_REQUESTED) {
534 return tls_verify_client_cert_push(request, tls_session);
535 }
536
538}
539#endif /* WITH_TLS */
unlang_action_t
Returned by unlang_op_t calls, determine the next action of the interpreter.
Definition action.h:35
@ UNLANG_ACTION_FAIL
Encountered an unexpected error.
Definition action.h:36
@ UNLANG_ACTION_CALCULATE_RESULT
Calculate a new section rlm_rcode_t value.
Definition action.h:37
#define store(_store, _var)
#define DIAG_UNKNOWN_PRAGMAS
Definition build.h:456
#define FALL_THROUGH
clang 10 doesn't recognised the FALL-THROUGH comment anymore
Definition build.h:322
#define DIAG_ON(_x)
Definition build.h:458
#define UNUSED
Definition build.h:315
#define DIAG_OFF(_x)
Definition build.h:457
#define fr_cond_assert(_x)
Calls panic_action ifndef NDEBUG, else logs error and evaluates to value of _x.
Definition debug.h:139
#define fr_assert_msg(_x, _msg,...)
Calls panic_action ifndef NDEBUG, else logs error and causes the server to exit immediately with code...
Definition debug.h:210
#define MEM(x)
Definition debug.h:36
static fr_slen_t err
Definition dict.h:824
bool unlang_request_is_cancelled(request_t const *request)
Return whether a request has been cancelled.
Definition interpret.c:1322
HIDDEN fr_dict_attr_t const * attr_tls_certificate
Attribute definitions for lib curl.
Definition base.c:36
fr_dict_t const * dict_tls
Definition base.c:79
void log_request_pair(fr_log_lvl_t lvl, request_t *request, fr_pair_t const *parent, fr_pair_t const *vp, char const *prefix)
Print a fr_pair_t.
Definition log.c:781
#define PERROR(_fmt,...)
Definition log.h:228
#define REXDENT()
Exdent (unindent) R* messages by one level.
Definition log.h:443
#define RDEBUG_ENABLED3
True if request debug level 1-3 messages are enabled.
Definition log.h:335
#define RDEBUG3(fmt,...)
Definition log.h:343
#define RERROR(fmt,...)
Definition log.h:298
#define RINDENT()
Indent R* messages by one level.
Definition log.h:430
HIDDEN fr_dict_attr_t const * attr_tls_packet_type
HIDDEN fr_dict_attr_t const * attr_tls_session_resumed
fr_value_box_t const * enum_tls_packet_type_success
fr_value_box_t const * enum_tls_packet_type_verify_certificate
talloc_free(reap)
@ L_DBG_LVL_2
2nd highest priority debug messages (-xx | -X).
Definition log.h:71
@ L_DBG
Only displayed when debugging is enabled.
Definition log.h:59
static size_t used
static uint8_t depth(fr_minmax_heap_index_t i)
Definition minmax_heap.c:83
unsigned int fr_pair_count_by_da(fr_pair_list_t const *list, fr_dict_attr_t const *da)
Return the number of instances of a given da in the specified list.
Definition pair.c:670
fr_pair_t * fr_pair_find_by_da(fr_pair_list_t const *list, fr_pair_t const *prev, fr_dict_attr_t const *da)
Find the first pair with a matching da.
Definition pair.c:693
int fr_pair_append(fr_pair_list_t *list, fr_pair_t *to_add)
Add a VP to the end of the list.
Definition pair.c:1345
int fr_pair_delete_by_da(fr_pair_list_t *list, fr_dict_attr_t const *da)
Delete matching pairs from the specified list.
Definition pair.c:1689
fr_pair_t * fr_pair_find_by_da_idx(fr_pair_list_t const *list, fr_dict_attr_t const *da, unsigned int idx)
Find a pair with a matching da at a given index.
Definition pair.c:741
fr_pair_t * fr_pair_afrom_da(TALLOC_CTX *ctx, fr_dict_attr_t const *da)
Dynamically allocate a new attribute and assign a fr_dict_attr_t.
Definition pair.c:283
fr_pair_t * fr_pair_copy(TALLOC_CTX *ctx, fr_pair_t const *vp)
Copy a single valuepair.
Definition pair.c:489
#define fr_assert(_expr)
Definition rad_assert.h:38
static bool done
Definition radclient.c:80
#define REDEBUG(fmt,...)
Definition radclient.h:52
#define RDEBUG_ENABLED2()
Definition radclient.h:50
#define RDEBUG2(fmt,...)
Definition radclient.h:54
static rs_t * conf
Definition radsniff.c:53
rlm_rcode_t
Return codes indicating the result of the module call.
Definition rcode.h:40
#define pair_append_request(_attr, _da)
Allocate and append a fr_pair_t to the request list.
Definition pair.h:37
#define pair_prepend_request(_attr, _da)
Allocate and prepend a fr_pair_t to the request list.
Definition pair.h:77
fr_pair_t * vp
Stores an attribute, a value and various bits of other data.
Definition pair.h:68
request_t * unlang_subrequest_alloc(request_t *parent, fr_dict_t const *namespace)
Allocate a subrequest to run through a virtual server at some point in the future.
Definition subrequest.c:287
bool fr_pair_list_empty(fr_pair_list_t const *list)
Is a valuepair list empty.