radius_user.c 8.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324
  1. /********************************* (C) РОТЕК ***********************************
  2. * @module template
  3. * @file template.c
  4. * @version 1.0.0
  5. * @date XX.XX.XXXX
  6. * $brief template
  7. *******************************************************************************
  8. * @history Version Author Comment
  9. * XX.XX.XXXX 1.0.0 Telenkov D.A. First release.
  10. *******************************************************************************
  11. */
  12. #include "stm32f4xx.h"
  13. #include "radius_user.h"
  14. #include "FreeRTOS.h"
  15. #include "task.h"
  16. #include "freeradius-client.h"
  17. #include "fr_options.h"
  18. rc_handle rcHandle;
  19. int auth_order = AUTH_LOCAL_SND;
  20. int login_tries = 4;
  21. int login_timeout = 60;
  22. char* nologin = "?";
  23. char* issue = "?";
  24. char* authserver = "192.168.1.2:1645";
  25. char* acctserver = "0";
  26. char* servers = "?";
  27. char* dictionary = "?";
  28. char *login_radius = "?";
  29. char *mapfile = "?";
  30. char *default_realm = NULL;
  31. int radius_timeout = 10;
  32. int radius_retries = 3;
  33. int radius_deadtime = 0;
  34. char *bindaddr = "*";
  35. char *login_local = "?";
  36. OPTION rcOptions[] = {
  37. {"auth_order", OT_AUO, ST_UNDEF, (void*)&auth_order}, // AUTH_LOCAL_FST AUTH_RADIUS_FST AUTH_LOCAL_SND AUTH_RADIUS_SND
  38. {"login_tries", OT_INT, ST_UNDEF, (void*)&login_tries},
  39. {"login_timeout", OT_INT, ST_UNDEF, (void*)&login_timeout},
  40. {"nologin", OT_STR, ST_UNDEF, NULL},
  41. {"issue", OT_STR, ST_UNDEF, NULL},
  42. // RADIUS specific options
  43. {"authserver", OT_SRV, ST_UNDEF, (void*)&authserver},
  44. {"acctserver", OT_SRV, ST_UNDEF, (void*)&acctserver},
  45. {"servers", OT_STR, ST_UNDEF, (void*)&servers},
  46. {"dictionary", OT_STR, ST_UNDEF, (void*)&dictionary},
  47. {"login_radius", OT_STR, ST_UNDEF, (void*)&login_radius},
  48. {"mapfile", OT_STR, ST_UNDEF, (void*)&mapfile},
  49. {"default_realm", OT_STR, ST_UNDEF, (void*)&default_realm},
  50. {"radius_timeout", OT_INT, ST_UNDEF, (void*)&radius_timeout},
  51. {"radius_retries", OT_INT, ST_UNDEF, (void*)&radius_retries},
  52. {"radius_deadtime", OT_INT, ST_UNDEF, (void*)&radius_deadtime},
  53. {"bindaddr", OT_STR, ST_UNDEF, (void*)&bindaddr},
  54. // local options
  55. {"login_local", OT_STR, ST_UNDEF, (void*)&login_local},
  56. };
  57. static DICT_ATTR attr_1;
  58. static DICT_ATTR attr_2;
  59. static DICT_ATTR attr_3;
  60. static char rc_msg[PW_MAX_MSG_SIZE];
  61. RadiusClientResult RC_Login(char* login, char* pas)
  62. {
  63. VALUE_PAIR* send;
  64. VALUE_PAIR* received;
  65. uint32_t service;
  66. int result;
  67. memset(rc_msg, 0, PW_MAX_MSG_SIZE);
  68. rc_read_config(&rcHandle);
  69. // Формирование атрибутов
  70. // 1. User name
  71. strncpy(attr_1.name, login, strlen(login));
  72. attr_1.value = 1;
  73. attr_1.type = PW_TYPE_STRING;
  74. attr_1.next = NULL;
  75. // 2. Password
  76. strncpy(attr_2.name, pas, strlen(pas));
  77. attr_2.value = 2;
  78. attr_2.type = PW_TYPE_STRING;
  79. attr_2.next = &attr_1;
  80. // 3. Service type
  81. strcpy(attr_3.name, "Service-Type");
  82. attr_3.value = 6;
  83. attr_3.type = PW_TYPE_INTEGER;
  84. attr_3.next = &attr_2;
  85. rcHandle.dictionary_attributes = &attr_3;
  86. send = NULL;
  87. // User-Name
  88. if (rc_avpair_add(&rcHandle, &send, PW_USER_NAME, login, -1, 0) == NULL)
  89. return RC_ERROR;
  90. // User-Password
  91. if (rc_avpair_add(&rcHandle, &send, PW_USER_PASSWORD, pas, -1, 0) == NULL)
  92. return RC_ERROR;
  93. // Service-Type
  94. service = PW_AUTHENTICATE_ONLY;
  95. if (rc_avpair_add(&rcHandle, &send, PW_SERVICE_TYPE, &service, -1, 0) == NULL)
  96. return RC_ERROR;
  97. result = rc_auth(&rcHandle, 0, send, &received, rc_msg);
  98. switch (result)
  99. {
  100. case USER_RC :
  101. return RC_LOGIN_USER_OK;
  102. break;
  103. case ADMIN_RC :
  104. return RC_LOGIN_ADMIN_OK;
  105. break;
  106. case NET_ERR_RC :
  107. return RC_NET_ERR;
  108. break;
  109. case ERROR_RC :
  110. return RC_ERROR;
  111. break;
  112. case BADRESP_RC :
  113. return RC_ACC_DENIED;
  114. break;
  115. case REJECT_RC :
  116. return RC_ACC_DENIED;
  117. break;
  118. default :
  119. return RC_ERROR;
  120. break;
  121. }
  122. return RC_ERROR;
  123. //printf("\r\n");
  124. //printf("Radius client result: %i\r\n", result);
  125. }
  126. /**
  127. * @brief
  128. */
  129. int RD_TestInit(void)
  130. {
  131. int result;
  132. char username[128];
  133. char passwd[AUTH_PASS_LEN + 1];
  134. VALUE_PAIR *send, *received;
  135. uint32_t service;
  136. char msg[PW_MAX_MSG_SIZE], username_realm[256];
  137. char *default_realm;
  138. // Моя подготовка
  139. memset(username, 0, 128);
  140. memset(passwd, 0, AUTH_PASS_LEN + 1);
  141. memset(msg, 0, PW_MAX_MSG_SIZE);
  142. memset(username_realm, 0, 256);
  143. // Просто копируем структуру настроек которая жесто задана
  144. rc_read_config(&rcHandle);
  145. // Словарь пока опускаем и не инициализируем
  146. //if (rc_read_dictionary(&rcHandle, rc_conf_str(&rcHandle, "dictionary")) != 0)
  147. // return ERROR_RC;
  148. // Заполняем словарь
  149. // 1. User name
  150. strcpy(attr_1.name, "test1");
  151. attr_1.value = 1;
  152. attr_1.type = PW_TYPE_STRING;
  153. attr_1.next = NULL;
  154. // 2. Password
  155. strcpy(attr_2.name, "12345");
  156. attr_2.value = 2;
  157. attr_2.type = PW_TYPE_STRING;
  158. attr_2.next = &attr_1;
  159. // 3. Service type
  160. strcpy(attr_3.name, "Service-Type");
  161. attr_3.value = 6;
  162. attr_3.type = PW_TYPE_INTEGER;
  163. attr_3.next = &attr_2;
  164. /*
  165. attr_3.value = 244;
  166. attr_3.type = PW_TYPE_STRING;
  167. attr_3.next = &attr_2;
  168. */
  169. rcHandle.dictionary_attributes = &attr_3;
  170. // Не понял что за параметра, пока NULL
  171. //default_realm = rc_conf_str(rh, "default_realm");
  172. default_realm = NULL;
  173. // Рараметры ожидаются от пользователя
  174. //strncpy(username, "dtelenkov", 9);
  175. strncpy(username, "test1", 5);
  176. strncpy(passwd, "12345", 5);
  177. //strncpy(username, rc_getstr (rh, "login: ",1), sizeof(username));
  178. //strncpy (passwd, rc_getstr(rh, "Password: ",0), sizeof (passwd));
  179. send = NULL;
  180. /*
  181. * Fill in User-Name
  182. */
  183. strncpy(username_realm, username, sizeof(username_realm));
  184. /* Append default realm */
  185. /*
  186. if ((strchr(username_realm, '@') == NULL) && default_realm &&
  187. (*default_realm != '\0'))
  188. {
  189. strncat(username_realm, "@", sizeof(username_realm)-strlen(username_realm)-1);
  190. strncat(username_realm, default_realm, sizeof(username_realm)-strlen(username_realm)-1);
  191. }
  192. */
  193. if (rc_avpair_add(&rcHandle, &send, PW_USER_NAME, username_realm, -1, 0) == NULL)
  194. return ERROR_RC;
  195. /*
  196. * Fill in User-Password
  197. */
  198. if (rc_avpair_add(&rcHandle, &send, PW_USER_PASSWORD, passwd, -1, 0) == NULL)
  199. return ERROR_RC;
  200. /*
  201. * Fill in Service-Type
  202. */
  203. service = PW_AUTHENTICATE_ONLY;
  204. if (rc_avpair_add(&rcHandle, &send, PW_SERVICE_TYPE, &service, -1, 0) == NULL)
  205. return ERROR_RC;
  206. #if 0
  207. result = rc_auth(&rcHandle, 0, send, &received, msg);
  208. if (result == OK_RC)
  209. {
  210. fprintf(stderr, "\"%s\" RADIUS Authentication OK\n", username);
  211. }
  212. else
  213. {
  214. fprintf(stderr, "\"%s\" RADIUS Authentication failure (RC=%i)\n", username, result);
  215. }
  216. #endif
  217. send = NULL;
  218. return 0;
  219. }
  220. void initFdsets(fdsets *sets)
  221. {
  222. memset((sets)->buf1, 0xab, 8);
  223. memset((sets)->buf2, 0xab, 8);
  224. memset((sets)->buf3, 0xab, 8);
  225. memset((sets)->buf4, 0xab, 8);
  226. }
  227. bool recvSelect(fdsets *sets, int *socket, uint32_t timeout)
  228. {
  229. struct timeval tv;
  230. tv.tv_sec = 0;
  231. tv.tv_usec = timeout * 1000;
  232. FD_ZERO(&(sets->readset));
  233. FD_SET(*socket, &sets->readset);
  234. FD_ZERO(&sets->errset);
  235. FD_SET(*socket, &sets->errset);
  236. lwip_select(*socket + 1, &sets->readset, NULL, &sets->errset, &tv);
  237. if (FD_ISSET(*socket, &sets->readset))
  238. return true;
  239. return false;
  240. }
  241. //
  242. int RC_GetAccessRights(char* buf)
  243. {
  244. uint16_t tmpLen = 0;
  245. uint8_t att = 10;
  246. while (att)
  247. {
  248. att--; // Предохранитель
  249. if (strstr(buf, "user") != 0) {
  250. return USER_RC; }
  251. else if (strstr(buf, "admin") != 0) {
  252. return ADMIN_RC; }
  253. tmpLen = strlen(buf);
  254. buf += tmpLen + 1;
  255. }
  256. return ERROR_RC;
  257. }
  258. /********************************* (C) РОТЕК **********************************/