radius_user.c 8.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324
  1. /********************************* (C) РОТЕК ***********************************
  2. * @module template
  3. * @file template.c
  4. * @version 1.0.0
  5. * @date XX.XX.XXXX
  6. * $brief template
  7. *******************************************************************************
  8. * @history Version Author Comment
  9. * XX.XX.XXXX 1.0.0 Telenkov D.A. First release.
  10. *******************************************************************************
  11. */
  12. #include "stm32f4xx.h"
  13. #include "radius_user.h"
  14. #include "FreeRTOS.h"
  15. #include "task.h"
  16. #include "freeradius-client.h"
  17. #include "fr_options.h"
  18. rc_handle rcHandle;
  19. int auth_order = AUTH_LOCAL_SND;
  20. int login_tries = 4;
  21. int login_timeout = 60;
  22. char* nologin = "?";
  23. char* issue = "?";
  24. char* authserver = "192.168.1.2:1645";
  25. char* acctserver = "0";
  26. char* servers = "?";
  27. char* dictionary = "?";
  28. char *login_radius = "?";
  29. char *mapfile = "?";
  30. char *default_realm = NULL;
  31. int radius_timeout = 10;
  32. int radius_retries = 3;
  33. int radius_deadtime = 0;
  34. char *bindaddr = "*";
  35. char *login_local = "?";
  36. OPTION rcOptions[] = {
  37. {"auth_order", OT_AUO, ST_UNDEF, (void*)&auth_order}, // AUTH_LOCAL_FST AUTH_RADIUS_FST AUTH_LOCAL_SND AUTH_RADIUS_SND
  38. {"login_tries", OT_INT, ST_UNDEF, (void*)&login_tries},
  39. {"login_timeout", OT_INT, ST_UNDEF, (void*)&login_timeout},
  40. {"nologin", OT_STR, ST_UNDEF, NULL},
  41. {"issue", OT_STR, ST_UNDEF, NULL},
  42. // RADIUS specific options
  43. {"authserver", OT_SRV, ST_UNDEF, (void*)&authserver},
  44. {"acctserver", OT_SRV, ST_UNDEF, (void*)&acctserver},
  45. {"servers", OT_STR, ST_UNDEF, (void*)&servers},
  46. {"dictionary", OT_STR, ST_UNDEF, (void*)&dictionary},
  47. {"login_radius", OT_STR, ST_UNDEF, (void*)&login_radius},
  48. {"mapfile", OT_STR, ST_UNDEF, (void*)&mapfile},
  49. {"default_realm", OT_STR, ST_UNDEF, (void*)&default_realm},
  50. {"radius_timeout", OT_INT, ST_UNDEF, (void*)&radius_timeout},
  51. {"radius_retries", OT_INT, ST_UNDEF, (void*)&radius_retries},
  52. {"radius_deadtime", OT_INT, ST_UNDEF, (void*)&radius_deadtime},
  53. {"bindaddr", OT_STR, ST_UNDEF, (void*)&bindaddr},
  54. // local options
  55. {"login_local", OT_STR, ST_UNDEF, (void*)&login_local},
  56. };
  57. static DICT_ATTR attr_1;
  58. static DICT_ATTR attr_2;
  59. static DICT_ATTR attr_3;
  60. static char rc_msg[PW_MAX_MSG_SIZE];
  61. RadiusClientResult RC_Login(char* login, char* pas)
  62. {
  63. VALUE_PAIR* send;
  64. VALUE_PAIR* received;
  65. uint32_t service;
  66. int result;
  67. memset(rc_msg, 0, PW_MAX_MSG_SIZE);
  68. rc_read_config(&rcHandle);
  69. // Формирование атрибутов
  70. // 1. User name
  71. strncpy(attr_1.name, login, strlen(login));
  72. attr_1.value = 1;
  73. attr_1.type = PW_TYPE_STRING;
  74. attr_1.next = NULL;
  75. // 2. Password
  76. strncpy(attr_2.name, pas, strlen(pas));
  77. attr_2.value = 2;
  78. attr_2.type = PW_TYPE_STRING;
  79. attr_2.next = &attr_1;
  80. // 3. Service type
  81. strcpy(attr_3.name, "Service-Type");
  82. attr_3.value = 6;
  83. attr_3.type = PW_TYPE_INTEGER;
  84. attr_3.next = &attr_2;
  85. rcHandle.dictionary_attributes = &attr_3;
  86. send = NULL;
  87. // User-Name
  88. if (rc_avpair_add(&rcHandle, &send, PW_USER_NAME, login, -1, 0) == NULL)
  89. return RC_ERROR;
  90. // User-Password
  91. if (rc_avpair_add(&rcHandle, &send, PW_USER_PASSWORD, pas, -1, 0) == NULL)
  92. return RC_ERROR;
  93. // Service-Type
  94. service = PW_AUTHENTICATE_ONLY;
  95. if (rc_avpair_add(&rcHandle, &send, PW_SERVICE_TYPE, &service, -1, 0) == NULL)
  96. return RC_ERROR;
  97. result = rc_auth(&rcHandle, 0, send, &received, rc_msg);
  98. switch (result)
  99. {
  100. case USER_RC :
  101. return RC_LOGIN_USER_OK;
  102. break;
  103. case ADMIN_RC :
  104. return RC_LOGIN_ADMIN_OK;
  105. break;
  106. case NET_ERR_RC :
  107. return RC_NET_ERR;
  108. break;
  109. case ERROR_RC :
  110. return RC_ERROR;
  111. break;
  112. case BADRESP_RC :
  113. return RC_ACC_DENIED;
  114. break;
  115. case REJECT_RC :
  116. return RC_ACC_DENIED;
  117. break;
  118. default :
  119. return RC_ERROR;
  120. break;
  121. }
  122. //printf("\r\n");
  123. //printf("Radius client result: %i\r\n", result);
  124. }
  125. /**
  126. * @brief
  127. */
  128. int RD_TestInit(void)
  129. {
  130. int result;
  131. char username[128];
  132. char passwd[AUTH_PASS_LEN + 1];
  133. VALUE_PAIR *send, *received;
  134. uint32_t service;
  135. char msg[PW_MAX_MSG_SIZE], username_realm[256];
  136. char *default_realm;
  137. // Моя подготовка
  138. memset(username, 0, 128);
  139. memset(passwd, 0, AUTH_PASS_LEN + 1);
  140. memset(msg, 0, PW_MAX_MSG_SIZE);
  141. memset(username_realm, 0, 256);
  142. // Просто копируем структуру настроек которая жесто задана
  143. rc_read_config(&rcHandle);
  144. // Словарь пока опускаем и не инициализируем
  145. //if (rc_read_dictionary(&rcHandle, rc_conf_str(&rcHandle, "dictionary")) != 0)
  146. // return ERROR_RC;
  147. // Заполняем словарь
  148. // 1. User name
  149. strcpy(attr_1.name, "test1");
  150. attr_1.value = 1;
  151. attr_1.type = PW_TYPE_STRING;
  152. attr_1.next = NULL;
  153. // 2. Password
  154. strcpy(attr_2.name, "12345");
  155. attr_2.value = 2;
  156. attr_2.type = PW_TYPE_STRING;
  157. attr_2.next = &attr_1;
  158. // 3. Service type
  159. strcpy(attr_3.name, "Service-Type");
  160. attr_3.value = 6;
  161. attr_3.type = PW_TYPE_INTEGER;
  162. attr_3.next = &attr_2;
  163. /*
  164. attr_3.value = 244;
  165. attr_3.type = PW_TYPE_STRING;
  166. attr_3.next = &attr_2;
  167. */
  168. rcHandle.dictionary_attributes = &attr_3;
  169. // Не понял что за параметра, пока NULL
  170. //default_realm = rc_conf_str(rh, "default_realm");
  171. default_realm = NULL;
  172. // Рараметры ожидаются от пользователя
  173. //strncpy(username, "dtelenkov", 9);
  174. strncpy(username, "test1", 5);
  175. strncpy(passwd, "12345", 5);
  176. //strncpy(username, rc_getstr (rh, "login: ",1), sizeof(username));
  177. //strncpy (passwd, rc_getstr(rh, "Password: ",0), sizeof (passwd));
  178. send = NULL;
  179. /*
  180. * Fill in User-Name
  181. */
  182. strncpy(username_realm, username, sizeof(username_realm));
  183. /* Append default realm */
  184. /*
  185. if ((strchr(username_realm, '@') == NULL) && default_realm &&
  186. (*default_realm != '\0'))
  187. {
  188. strncat(username_realm, "@", sizeof(username_realm)-strlen(username_realm)-1);
  189. strncat(username_realm, default_realm, sizeof(username_realm)-strlen(username_realm)-1);
  190. }
  191. */
  192. if (rc_avpair_add(&rcHandle, &send, PW_USER_NAME, username_realm, -1, 0) == NULL)
  193. return ERROR_RC;
  194. /*
  195. * Fill in User-Password
  196. */
  197. if (rc_avpair_add(&rcHandle, &send, PW_USER_PASSWORD, passwd, -1, 0) == NULL)
  198. return ERROR_RC;
  199. /*
  200. * Fill in Service-Type
  201. */
  202. service = PW_AUTHENTICATE_ONLY;
  203. if (rc_avpair_add(&rcHandle, &send, PW_SERVICE_TYPE, &service, -1, 0) == NULL)
  204. return ERROR_RC;
  205. #if 0
  206. result = rc_auth(&rcHandle, 0, send, &received, msg);
  207. if (result == OK_RC)
  208. {
  209. fprintf(stderr, "\"%s\" RADIUS Authentication OK\n", username);
  210. }
  211. else
  212. {
  213. fprintf(stderr, "\"%s\" RADIUS Authentication failure (RC=%i)\n", username, result);
  214. }
  215. #endif
  216. send = NULL;
  217. return 0;
  218. }
  219. void initFdsets(fdsets *sets)
  220. {
  221. memset((sets)->buf1, 0xab, 8);
  222. memset((sets)->buf2, 0xab, 8);
  223. memset((sets)->buf3, 0xab, 8);
  224. memset((sets)->buf4, 0xab, 8);
  225. }
  226. bool recvSelect(fdsets *sets, int *socket, uint32_t timeout)
  227. {
  228. struct timeval tv;
  229. tv.tv_sec = 0;
  230. tv.tv_usec = timeout * 1000;
  231. FD_ZERO(&(sets->readset));
  232. FD_SET(*socket, &sets->readset);
  233. FD_ZERO(&sets->errset);
  234. FD_SET(*socket, &sets->errset);
  235. lwip_select(*socket + 1, &sets->readset, NULL, &sets->errset, &tv);
  236. if (FD_ISSET(*socket, &sets->readset))
  237. return true;
  238. return false;
  239. }
  240. //
  241. int RC_GetAccessRights(char* buf)
  242. {
  243. uint16_t tmpLen = 0;
  244. uint8_t att = 10;
  245. while (att)
  246. {
  247. att--; // Предохранитель
  248. if (strstr(buf, "user") != 0) {
  249. return USER_RC; }
  250. else if (strstr(buf, "admin") != 0) {
  251. return ADMIN_RC; }
  252. tmpLen = strlen(buf);
  253. buf += tmpLen + 1;
  254. }
  255. return ERROR_RC;
  256. }
  257. /********************************* (C) РОТЕК **********************************/