The FreeRADIUS server $Id: 15bac2a4c627c01d1aa2047687b3418955ac7f00 $
Loading...
Searching...
No Matches
verify.c
Go to the documentation of this file.
1/*
2 * This program is free software; you can redistribute it and/or modify
3 * it under the terms of the GNU General Public License as published by
4 * the Free Software Foundation; either version 2 of the License, or
5 * (at your option) any later version.
6 *
7 * This program is distributed in the hope that it will be useful,
8 * but WITHOUT ANY WARRANTY; without even the implied warranty of
9 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
10 * GNU General Public License for more details.
11 *
12 * You should have received a copy of the GNU General Public License
13 * along with this program; if not, write to the Free Software
14 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
15 */
16
17/**
18 * $Id: 13cc0fff9571752b54aab6de323f2195c4295514 $
19 *
20 * @file tls/verify.c
21 * @brief Expose certificate OIDs as attributes, and call validation virtual
22 * server to check cert is valid.
23 *
24 * @copyright 2001 hereUare Communications, Inc. (raghud@hereuare.com)
25 * @copyright 2003 Alan DeKok (aland@freeradius.org)
26 * @copyright 2006-2016 The FreeRADIUS server project
27 */
28#ifdef WITH_TLS
29#define LOG_PREFIX "tls"
30
31#include <freeradius-devel/server/exec.h>
32#include <freeradius-devel/server/pair.h>
33#include <freeradius-devel/tls/log.h>
34#include <freeradius-devel/unlang/function.h>
35#include <freeradius-devel/unlang/interpret.h>
36#include <freeradius-devel/unlang/subrequest.h>
37#include <freeradius-devel/util/debug.h>
38#include <freeradius-devel/util/strerror.h>
39#include <freeradius-devel/util/syserror.h>
40
41#include "attrs.h"
42#include "base.h"
43
44/** Check to see if a verification operation should apply to a certificate
45 *
46 * @param[in] depth starting at 0.
47 * Certificate 0 is the leaf cert (i.e. the client or server cert);
48 * @param[in] untrusted The number of untrusted certificates.
49 * @param[in] mode to check
50 * @return
51 * - true if a given validation check should apply.
52 ** - false if a validation check should not apply.
53 */
54static inline CC_HINT(always_inline)
55bool verify_applies(fr_tls_verify_mode_t mode, int depth, int untrusted)
56{
57 if (mode == FR_TLS_VERIFY_MODE_ALL) return true;
58 if (mode == FR_TLS_VERIFY_MODE_DISABLED) return false;
59
60 if ((mode & FR_TLS_VERIFY_MODE_LEAF) && (depth == 0)) return true;
61 if ((mode & FR_TLS_VERIFY_MODE_ISSUER) && (depth == 1)) return true;
62 if ((mode & FR_TLS_VERIFY_MODE_UNTRUSTED) && (depth < untrusted)) return true;
63
64 return false;
65}
66
68DIAG_OFF(used-but-marked-unused) /* fix spurious warnings for sk macros */
69
70/** Print verbose humanly readable messages about why certificate validation failed
71 *
72 */
73static void tls_verify_error_detail(request_t *request, SSL_CTX *ctx, int err)
74{
75 X509_STORE *store = SSL_CTX_get_ex_data(ctx, FR_TLS_EX_CTX_INDEX_VERIFY_STORE);
76
77 switch (err) {
78 /*
79 * We linked the provided cert to at least one
80 * other in a chain, but the chain doesn't terminate
81 * in a root CA.
82 */
83 case X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT:
85
86 /*
87 * We failed to link the provided cert to any
88 * other local certificates in the chain.
89 */
90 case X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY:
91 RDEBUG2("Static certificates in verification store are");
92 if (RDEBUG_ENABLED2) {
93 RINDENT();
94 fr_tls_x509_objects_log(request, L_DBG, X509_STORE_get0_objects(store));
95 REXDENT();
96 }
97 break;
98
99 default:
100 break;
101 }
102}
103
104/** Validates a certificate using custom logic
105 *
106 * Before trusting a certificate, we make sure that the certificate is
107 * 'valid'. There are several checks we perform to verify its validity.
108 *
109 * 1. Verify the certificate's signature, and verifying that the certificate has
110 * been issued by a trusted Certificate Authority (this is done for us by OpenSSL).
111 *
112 * 2. Verify that the certificate is valid for the present date (i.e. it is being
113 * presented within its validity dates).
114 *
115 * 3. Verify that the certificate has not been revoked by its issuing Certificate
116 * Authority, by checking with respect to a Certificate Revocation List (CRL).
117 *
118 * @note This callback will be called multiple times based on the depth of the root
119 * certificate chain.
120 *
121 * @note As a byproduct of validation, various OIDs will be extracted from the
122 * certificates, and inserted into the session-state list as fr_pair_t.
123 *
124 * @param ok preverify ok. 1 if true, 0 if false.
125 * @param x509_ctx containing certs to verify.
126 * @return
127 * - 0 if not valid.
128 * - 1 if valid.
129 */
130int fr_tls_verify_cert_cb(int ok, X509_STORE_CTX *x509_ctx)
131{
132 X509 *cert;
133
134 SSL_CTX *ssl_ctx;
135 SSL *ssl;
136 fr_tls_session_t *tls_session;
137 int err, depth;
138 fr_tls_conf_t *conf;
139 int my_ok = ok;
140 int untrusted;
141
142 request_t *request;
143 fr_pair_t *container = NULL;
144 fr_pair_t *depth_pair;
145
146 cert = X509_STORE_CTX_get_current_cert(x509_ctx);
147 err = X509_STORE_CTX_get_error(x509_ctx);
148 depth = X509_STORE_CTX_get_error_depth(x509_ctx);
149 untrusted = X509_STORE_CTX_get_num_untrusted(x509_ctx);
150
151 /*
152 * Retrieve the pointer to the SSL of the connection currently treated
153 * and the application specific data stored into the SSL object.
154 */
155 ssl = X509_STORE_CTX_get_ex_data(x509_ctx, SSL_get_ex_data_X509_STORE_CTX_idx());
156 ssl_ctx = SSL_get_SSL_CTX(ssl);
157 conf = fr_tls_session_conf(ssl);
158 tls_session = talloc_get_type_abort(SSL_get_ex_data(ssl, FR_TLS_EX_INDEX_TLS_SESSION), fr_tls_session_t);
159 request = fr_tls_session_request(tls_session->ssl);
160
161 /*
162 * If this error appears it suggests
163 * that OpenSSL is trying to perform post-handshake
164 * certificate validation which we don't support.
165 */
166 if (!tls_session->can_pause) {
167 fr_assert_msg("Unexpected call to %s. "
168 "tls_session_async_handshake_cont must be in call stack", __FUNCTION__);
169 return 0;
170 }
171
172 /*
173 * Bail out as quickly as possible, producing
174 * as few errors as possible.
175 */
176 if (unlang_request_is_cancelled(request)) {
177 X509_STORE_CTX_set_error(x509_ctx, 0);
178 return 1;
179 }
180
181 /*
182 * Find or add the chain depth attribute and record the greatest depth we see + 1,
183 * as depth is zero based.
184 */
185 if (unlikely(fr_pair_find_or_append_by_da(request->session_state_ctx, &depth_pair, &request->session_state_pairs,
187 RERROR("Failed to add certificate chain depth pair");
188 return 0;
189 }
190 if (depth_pair->vp_uint32 < ((uint32_t)depth) + 1) depth_pair->vp_uint32 = (uint32_t)depth + 1;
191
192 if (RDEBUG_ENABLED3) {
193 char subject[2048];
194 STACK_OF(X509) *our_chain;
195 int i;
196
197 our_chain = X509_STORE_CTX_get0_chain(x509_ctx);
198 RDEBUG3("Certificate chain - %i cert(s) untrusted", untrusted);
199 for (i = sk_X509_num(our_chain); i > 0 ; i--) {
200 X509 *this_cert = sk_X509_value(our_chain, i - 1);
201
202 X509_NAME_oneline(X509_get_subject_name(this_cert), subject, sizeof(subject));
203 subject[sizeof(subject) - 1] = '\0';
204
205 RDEBUG3("%s [%i] %s", this_cert == cert ? ">" : " ", i - 1, subject);
206 }
207 }
208
209 /*
210 * See if the user has disabled verification for
211 * this certificate. If they have, force verification
212 * to succeed.
213 */
214 if (!my_ok) {
215 char const *p = X509_verify_cert_error_string(err);
216 if (!verify_applies(conf->verify.mode, depth, untrusted) ||
217 ((conf->verify.allow_expired_crl) && (err == X509_V_ERR_CRL_HAS_EXPIRED)) ||
218 ((conf->verify.allow_not_yet_valid_crl) && (err == X509_V_ERR_CRL_NOT_YET_VALID))) {
219 RDEBUG2("Ignoring verification error - %s (%i)", p, err);
220 tls_verify_error_detail(request, ssl_ctx, err);
221
222 my_ok = 1;
223 X509_STORE_CTX_set_error(x509_ctx, 0);
224 } else {
225 RERROR("Verification error - %s (%i)", p, err);
226 tls_verify_error_detail(request, ssl_ctx, err);
227 goto done;
228 }
229 }
230
231 if (verify_applies(conf->verify.attribute_mode, depth, untrusted) &&
232 (!(container = fr_pair_find_by_da_idx(&request->session_state_pairs, attr_tls_certificate, depth)) ||
233 fr_pair_list_empty(&container->vp_group))) {
234 if (!container) {
235 unsigned int i;
236
237 /*
238 * Build a stack of container attributes.
239 *
240 * OpenSSL passes us the deepest certificate
241 * first, so we need to build out sufficient
242 * TLS-Certificate container TLVs so the TLS-Certificate
243 * indexes match the attribute depth.
244 */
245 for (i = fr_pair_count_by_da(&request->session_state_pairs, attr_tls_certificate);
246 i <= (unsigned int)depth;
247 i++) {
248 MEM(container = fr_pair_afrom_da(request->session_state_ctx, attr_tls_certificate));
249 fr_pair_append(&request->session_state_pairs, container);
250 }
251 }
252
253#ifdef STATIC_ANALYZER
254 /*
255 * Container can never be NULL, because if container
256 * was previously NULL, i will be <= depth.
257 */
258 if (!fr_cond_assert(container)) {
259 my_ok = 0;
260 goto done;
261 }
262#endif
263 /*
264 * If we fail to populate the cert attributes,
265 * trash all instances in the session-state list
266 * and cause validation to fail.
267 */
268 if (fr_tls_session_pairs_from_x509_cert(&container->vp_group, container,
269 request, cert) < 0) {
270 fr_pair_delete_by_da(&request->session_state_pairs, attr_tls_certificate);
271 my_ok = 0;
272 goto done;
273 }
274
275 log_request_pair(L_DBG_LVL_2, request, NULL, container, "session-state.");
276 }
277done:
278 /*
279 * If verification hasn't already failed
280 * and we're meant to verify this cert
281 * then call the virtual server.
282 *
283 * We only call the virtual server for
284 * the certificate at depth 0 as all
285 * other certificate attributes should
286 * have been added by this point.
287 */
288 if (my_ok && (depth == 0)) {
289 if (conf->verify_certificate && tls_session->verify_client_cert) {
290 RDEBUG2("Requesting certificate validation");
291
292 /*
293 * This sets the validation state of the tls_session
294 * so that when we call ASYNC_pause_job(), and execution
295 * jumps back to tls_session_async_handshake_cont
296 * (just under SSL_read())
297 * the code there knows what job it needs to push onto
298 * the unlang stack.
299 */
300 fr_tls_verify_cert_request(tls_session, SSL_session_reused(tls_session->ssl));
301
302 /*
303 * Jumps back to SSL_read() in session.c
304 *
305 * Be aware that if the request is cancelled
306 * whatever was meant to be done during the
307 * time we yielded may not have been completed.
308 */
309 ASYNC_pause_job();
310
311 /*
312 * Just try and bail out as quickly as possible.
313 */
314 if (unlang_request_is_cancelled(request)) {
315 X509_STORE_CTX_set_error(x509_ctx, 0);
316 fr_tls_verify_cert_reset(tls_session);
317 return 1;
318 }
319
320
321 /*
322 * If we couldn't validate the certificate
323 * then validation overall fails.
324 */
325 if (!fr_tls_verify_cert_result(tls_session)) {
326 REDEBUG("Certificate validation failed");
327 my_ok = 0;
328 X509_STORE_CTX_set_error(x509_ctx, X509_V_ERR_APPLICATION_VERIFICATION);
329 }
330 }
331 }
332
333 tls_session->client_cert_ok = (my_ok > 0);
334 RDEBUG2("[verify] = %s", my_ok ? "ok" : "invalid");
335
336 return my_ok;
337}
338DIAG_ON(used-but-marked-unused)
340
341/** Revalidates the client's certificate chain
342 *
343 * Wraps the fr_tls_verify_cert_cb callback, allowing us to use the same
344 * validation logic whenever we need to.
345 *
346 * @note Only use so far is forcing the chain to be re-validated on session
347 * resumption.
348 *
349 * @return
350 * - 1 if the chain could be validated.
351 * - 0 if the chain failed validation.
352 */
353int fr_tls_verify_cert_chain(request_t *request, SSL *ssl)
354{
355 int err;
356 int verify;
357 int ret = 1;
358
359 SSL_CTX *ssl_ctx;
360 STACK_OF(X509) *chain;
361 X509 *cert;
362 X509_STORE *store;
363 X509_STORE_CTX *store_ctx;
364
365 /*
366 * If there's no client certificate, we just return OK.
367 */
368 cert = SSL_get0_peer_certificate(ssl); /* Does not increase ref count */
369 if (!cert) return 1;
370
371 ssl_ctx = SSL_get_SSL_CTX(ssl);
372 store_ctx = X509_STORE_CTX_new();
373 chain = SSL_get_peer_cert_chain(ssl); /* Does not increase ref count */
374 store = SSL_CTX_get_ex_data(ssl_ctx, FR_TLS_EX_CTX_INDEX_VERIFY_STORE); /* Gets the verification store */
375
376 /*
377 * This sets up a store_ctx for doing peer certificate verification.
378 *
379 * store_ctx - Is the ctx to initialise
380 * store - Is an X509_STORE of implicitly
381 * trusted certificates. Here we're using
382 * the verify store that was created when we
383 * allocated the SSL_CTX.
384 * cert - Is the certificate to validate.
385 * chain - Is any other certificates the peer provided
386 * us in order to build a chain from a trusted
387 * root or intermediary to its leaf (cert).
388 *
389 * Note: SSL_CTX_get_cert_store() returns the ctx->cert_store, which
390 * is not the same as the verification cert store.
391 */
392 X509_STORE_CTX_init(store_ctx, store, cert, chain);
393 X509_STORE_CTX_set_ex_data(store_ctx, SSL_get_ex_data_X509_STORE_CTX_idx(), ssl);
394 X509_STORE_CTX_set_verify_cb(store_ctx, fr_tls_verify_cert_cb);
395
396 verify = X509_verify_cert(store_ctx);
397 if (verify != 1) {
398 err = X509_STORE_CTX_get_error(store_ctx);
399
400 if (err != X509_V_OK) {
401 REDEBUG("Failed re-validating resumed session: %s", X509_verify_cert_error_string(err));
402 ret = 0;
403 }
404 }
405
406 X509_STORE_CTX_free(store_ctx);
407
408 return ret;
409}
410
411/** Process the result of `verify certificate { ... }`
412 *
413 */
414static unlang_action_t tls_verify_client_cert_result(UNUSED rlm_rcode_t *p_result, UNUSED int *priority,
415 request_t *request, void *uctx)
416{
417 fr_tls_session_t *tls_session = talloc_get_type_abort(uctx, fr_tls_session_t);
418 fr_pair_t *vp;
419
420 fr_assert(tls_session->validate.state == FR_TLS_VALIDATION_REQUESTED);
421
422 vp = fr_pair_find_by_da(&request->reply_pairs, NULL, attr_tls_packet_type);
423 if (!vp || (vp->vp_uint32 != enum_tls_packet_type_success->vb_uint32)) {
424 REDEBUG("Failed (re-)validating certificates");
425 tls_session->validate.state = FR_TLS_VALIDATION_FAILED;
427 }
428
429 tls_session->validate.state = FR_TLS_VALIDATION_SUCCESS;
430
431 RDEBUG2("Certificates (re-)validated");
432
434}
435
436/** Push a `verify certificate { ... }` call into the current request, using a subrequest
437 *
438 * @param[in] request The current request.
439 * @param[in] tls_session The current TLS session.
440 * @return
441 * - UNLANG_ACTION_CALCULATE_RESULT on noop.
442 * - UNLANG_ACTION_PUSHED_CHILD on success.
443 * - UNLANG_ACTION_FAIL on failure.
444 */
445static unlang_action_t tls_verify_client_cert_push(request_t *request, fr_tls_session_t *tls_session)
446{
447 fr_tls_conf_t *conf = fr_tls_session_conf(tls_session->ssl);
448 request_t *child;
449 fr_pair_t *vp;
451
452 MEM(child = unlang_subrequest_alloc(request, dict_tls));
453 request = child;
454
455 /*
456 * Add extra pairs to the subrequest
457 */
458 fr_tls_session_extra_pairs_copy_to_child(child, tls_session);
459
460 /*
461 * Setup the child request for loading
462 * session resumption data.
463 */
465 vp->vp_uint32 = enum_tls_packet_type_verify_certificate->vb_uint32;
466
467 /*
468 * Copy certificate pairs to the child session state
469 */
470 vp = NULL;
471 while ((vp = fr_pair_find_by_da(&request->parent->session_state_pairs, vp, attr_tls_certificate))) {
472 fr_pair_append(&request->session_state_pairs, fr_pair_copy(request->session_state_ctx, vp));
473 }
474
476 vp->vp_bool = tls_session->validate.resumed;
477
478 /*
479 * Allocate a child, and set it up to call
480 * the TLS virtual server.
481 */
482 ua = fr_tls_call_push(child, tls_verify_client_cert_result, conf, tls_session, false);
483 if (ua < 0) {
484 PERROR("Failed calling TLS virtual server");
485 talloc_free(child);
486 return UNLANG_ACTION_FAIL;
487 }
488
489 return ua;
490}
491
492/** Clear any previous validation result
493 *
494 * Should be called by the validation requestor to get the result and reset
495 * the validation state.
496 *
497 * @return
498 * - true if the certificate chain was validated.
499 * - false if the certificate chain failed validation.
500 */
501bool fr_tls_verify_cert_result(fr_tls_session_t *tls_session)
502{
503 bool result;
504
505 fr_assert(tls_session->validate.state != FR_TLS_VALIDATION_INIT);
506
507 result = tls_session->validate.state == FR_TLS_VALIDATION_SUCCESS;
508
509 tls_session->validate.state = FR_TLS_VALIDATION_INIT;
510 tls_session->validate.resumed = false;
511
512 return result;
513}
514
515/** Reset the verification state
516 *
517 */
518void fr_tls_verify_cert_reset(fr_tls_session_t *tls_session)
519{
520 tls_session->validate.state = FR_TLS_VALIDATION_INIT;
521 tls_session->validate.resumed = false;
522}
523
524/** Setup a verification request
525 *
526 */
527void fr_tls_verify_cert_request(fr_tls_session_t *tls_session, bool session_resumed)
528{
529 fr_assert(tls_session->validate.state == FR_TLS_VALIDATION_INIT);
530
531 tls_session->validate.state = FR_TLS_VALIDATION_REQUESTED;
532 tls_session->validate.resumed = session_resumed;
533}
534
535/** Push a `verify certificate { ... }` section
536 *
537 * @param[in] request The current request.
538 * @param[in] tls_session The current TLS session.
539 * @return
540 * - UNLANG_ACTION_CALCULATE_RESULT - No pending actions
541 * - UNLANG_ACTION_PUSHED_CHILD - Pending operations to evaluate.
542 */
543unlang_action_t fr_tls_verify_cert_pending_push(request_t *request, fr_tls_session_t *tls_session)
544{
545 if (tls_session->validate.state == FR_TLS_VALIDATION_REQUESTED) {
546 return tls_verify_client_cert_push(request, tls_session);
547 }
548
550}
551#endif /* WITH_TLS */
unlang_action_t
Returned by unlang_op_t calls, determine the next action of the interpreter.
Definition action.h:35
@ UNLANG_ACTION_FAIL
Encountered an unexpected error.
Definition action.h:36
@ UNLANG_ACTION_CALCULATE_RESULT
Calculate a new section rlm_rcode_t value.
Definition action.h:37
#define store(_store, _var)
#define DIAG_UNKNOWN_PRAGMAS
Definition build.h:458
#define FALL_THROUGH
clang 10 doesn't recognised the FALL-THROUGH comment anymore
Definition build.h:324
#define DIAG_ON(_x)
Definition build.h:460
#define unlikely(_x)
Definition build.h:383
#define UNUSED
Definition build.h:317
#define DIAG_OFF(_x)
Definition build.h:459
#define fr_cond_assert(_x)
Calls panic_action ifndef NDEBUG, else logs error and evaluates to value of _x.
Definition debug.h:139
#define fr_assert_msg(_x, _msg,...)
Calls panic_action ifndef NDEBUG, else logs error and causes the server to exit immediately with code...
Definition debug.h:210
#define MEM(x)
Definition debug.h:36
static fr_slen_t err
Definition dict.h:840
bool unlang_request_is_cancelled(request_t const *request)
Return whether a request has been cancelled.
Definition interpret.c:1323
HIDDEN fr_dict_attr_t const * attr_tls_certificate
Attribute definitions for lib curl.
Definition base.c:36
fr_dict_t const * dict_tls
Definition base.c:79
void log_request_pair(fr_log_lvl_t lvl, request_t *request, fr_pair_t const *parent, fr_pair_t const *vp, char const *prefix)
Print a fr_pair_t.
Definition log.c:779
#define PERROR(_fmt,...)
Definition log.h:228
#define REXDENT()
Exdent (unindent) R* messages by one level.
Definition log.h:443
#define RDEBUG_ENABLED3
True if request debug level 1-3 messages are enabled.
Definition log.h:335
#define RDEBUG3(fmt,...)
Definition log.h:343
#define RERROR(fmt,...)
Definition log.h:298
#define RINDENT()
Indent R* messages by one level.
Definition log.h:430
HIDDEN fr_dict_attr_t const * attr_tls_packet_type
HIDDEN fr_dict_attr_t const * attr_tls_session_resumed
fr_value_box_t const * enum_tls_packet_type_success
fr_value_box_t const * enum_tls_packet_type_verify_certificate
HIDDEN fr_dict_attr_t const * attr_tls_certificate_chain_depth
talloc_free(reap)
@ L_DBG_LVL_2
2nd highest priority debug messages (-xx | -X).
Definition log.h:71
@ L_DBG
Only displayed when debugging is enabled.
Definition log.h:59
unsigned int uint32_t
static size_t used
static uint8_t depth(fr_minmax_heap_index_t i)
Definition minmax_heap.c:83
unsigned int fr_pair_count_by_da(fr_pair_list_t const *list, fr_dict_attr_t const *da)
Return the number of instances of a given da in the specified list.
Definition pair.c:674
fr_pair_t * fr_pair_find_by_da(fr_pair_list_t const *list, fr_pair_t const *prev, fr_dict_attr_t const *da)
Find the first pair with a matching da.
Definition pair.c:697
int fr_pair_append(fr_pair_list_t *list, fr_pair_t *to_add)
Add a VP to the end of the list.
Definition pair.c:1351
int fr_pair_delete_by_da(fr_pair_list_t *list, fr_dict_attr_t const *da)
Delete matching pairs from the specified list.
Definition pair.c:1695
fr_pair_t * fr_pair_find_by_da_idx(fr_pair_list_t const *list, fr_dict_attr_t const *da, unsigned int idx)
Find a pair with a matching da at a given index.
Definition pair.c:745
fr_pair_t * fr_pair_afrom_da(TALLOC_CTX *ctx, fr_dict_attr_t const *da)
Dynamically allocate a new attribute and assign a fr_dict_attr_t.
Definition pair.c:287
fr_pair_t * fr_pair_copy(TALLOC_CTX *ctx, fr_pair_t const *vp)
Copy a single valuepair.
Definition pair.c:493
#define fr_assert(_expr)
Definition rad_assert.h:38
static bool done
Definition radclient.c:81
#define REDEBUG(fmt,...)
Definition radclient.h:52
#define RDEBUG_ENABLED2()
Definition radclient.h:50
#define RDEBUG2(fmt,...)
Definition radclient.h:54
static rs_t * conf
Definition radsniff.c:53
rlm_rcode_t
Return codes indicating the result of the module call.
Definition rcode.h:40
#define pair_append_request(_attr, _da)
Allocate and append a fr_pair_t to the request list.
Definition pair.h:37
#define pair_prepend_request(_attr, _da)
Allocate and prepend a fr_pair_t to the request list.
Definition pair.h:77
fr_pair_t * vp
Stores an attribute, a value and various bits of other data.
Definition pair.h:68
request_t * unlang_subrequest_alloc(request_t *parent, fr_dict_t const *namespace)
Allocate a subrequest to run through a virtual server at some point in the future.
Definition subrequest.c:303
bool fr_pair_list_empty(fr_pair_list_t const *list)
Is a valuepair list empty.
static int fr_pair_find_or_append_by_da(TALLOC_CTX *ctx, fr_pair_t **out, fr_pair_list_t *list, fr_dict_attr_t const *da)
Definition pair.h:523