radius_user.c 7.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262
  1. /********************************* (C) РОТЕК ***********************************
  2. * @module template
  3. * @file template.c
  4. * @version 1.0.0
  5. * @date XX.XX.XXXX
  6. * $brief template
  7. *******************************************************************************
  8. * @history Version Author Comment
  9. * XX.XX.XXXX 1.0.0 Telenkov D.A. First release.
  10. *******************************************************************************
  11. */
  12. #include "stm32f4xx.h"
  13. #include "radius_user.h"
  14. #include "FreeRTOS.h"
  15. #include "task.h"
  16. #include "freeradius-client.h"
  17. #include "fr_options.h"
  18. rc_handle rcHandle;
  19. int auth_order = AUTH_LOCAL_SND;
  20. int login_tries = 4;
  21. int login_timeout = 60;
  22. char* nologin = "?";
  23. char* issue = "?";
  24. char* authserver = "192.168.1.2:1645";
  25. char* acctserver = "0";
  26. char* servers = "?";
  27. char* dictionary = "?";
  28. char *login_radius = "?";
  29. char *mapfile = "?";
  30. char *default_realm = NULL;
  31. int radius_timeout = 10;
  32. int radius_retries = 3;
  33. int radius_deadtime = 0;
  34. char *bindaddr = "*";
  35. char *login_local = "?";
  36. OPTION rcOptions[] = {
  37. {"auth_order", OT_AUO, ST_UNDEF, (void*)&auth_order}, // AUTH_LOCAL_FST AUTH_RADIUS_FST AUTH_LOCAL_SND AUTH_RADIUS_SND
  38. {"login_tries", OT_INT, ST_UNDEF, (void*)&login_tries},
  39. {"login_timeout", OT_INT, ST_UNDEF, (void*)&login_timeout},
  40. {"nologin", OT_STR, ST_UNDEF, NULL},
  41. {"issue", OT_STR, ST_UNDEF, NULL},
  42. // RADIUS specific options
  43. {"authserver", OT_SRV, ST_UNDEF, (void*)&authserver},
  44. {"acctserver", OT_SRV, ST_UNDEF, (void*)&acctserver},
  45. {"servers", OT_STR, ST_UNDEF, (void*)&servers},
  46. {"dictionary", OT_STR, ST_UNDEF, (void*)&dictionary},
  47. {"login_radius", OT_STR, ST_UNDEF, (void*)&login_radius},
  48. {"mapfile", OT_STR, ST_UNDEF, (void*)&mapfile},
  49. {"default_realm", OT_STR, ST_UNDEF, (void*)&default_realm},
  50. {"radius_timeout", OT_INT, ST_UNDEF, (void*)&radius_timeout},
  51. {"radius_retries", OT_INT, ST_UNDEF, (void*)&radius_retries},
  52. {"radius_deadtime", OT_INT, ST_UNDEF, (void*)&radius_deadtime},
  53. {"bindaddr", OT_STR, ST_UNDEF, (void*)&bindaddr},
  54. // local options
  55. {"login_local", OT_STR, ST_UNDEF, (void*)&login_local},
  56. };
  57. DICT_ATTR attr_1;
  58. DICT_ATTR attr_2;
  59. DICT_ATTR attr_3;
  60. static char fr_msg[PW_MAX_MSG_SIZE];
  61. RadiusClientResult RC_Login(char* login, char* pas)
  62. {
  63. VALUE_PAIR* send;
  64. VALUE_PAIR* received;
  65. uint32_t service;
  66. memset(fr_msg, 0, PW_MAX_MSG_SIZE);
  67. // Формирование атрибутов
  68. // 1. User name
  69. strncpy(attr_1.name, login, strlen(login));
  70. attr_1.value = 1;
  71. attr_1.type = PW_TYPE_STRING;
  72. attr_1.next = NULL;
  73. // 2. Password
  74. strncpy(attr_2.name, pas, strlen(pas));
  75. attr_2.value = 2;
  76. attr_2.type = PW_TYPE_STRING;
  77. attr_2.next = &attr_1;
  78. // 3. Service type
  79. strcpy(attr_3.name, "Service-Type");
  80. attr_3.value = 6;
  81. attr_3.type = PW_TYPE_INTEGER;
  82. attr_3.next = &attr_2;
  83. rcHandle.dictionary_attributes = &attr_3;
  84. /*
  85. // Fill in User-Name
  86. if (rc_avpair_add(&rcHandle, &send, PW_USER_NAME, username_realm, -1, 0) == NULL)
  87. return RC_ERROR;
  88. // Fill in User-Password
  89. if (rc_avpair_add(&rcHandle, &send, PW_USER_PASSWORD, passwd, -1, 0) == NULL)
  90. return RC_ERROR;
  91. // Fill in Service-Type
  92. service = PW_AUTHENTICATE_ONLY;
  93. if (rc_avpair_add(&rcHandle, &send, PW_SERVICE_TYPE, &service, -1, 0) == NULL)
  94. return RC_ERROR;
  95. */
  96. }
  97. /**
  98. * @brief
  99. */
  100. int RD_TestInit(void)
  101. {
  102. int result;
  103. char username[128];
  104. char passwd[AUTH_PASS_LEN + 1];
  105. VALUE_PAIR *send, *received;
  106. uint32_t service;
  107. char msg[PW_MAX_MSG_SIZE], username_realm[256];
  108. char *default_realm;
  109. // Моя подготовка
  110. memset(username, 0, 128);
  111. memset(passwd, 0, AUTH_PASS_LEN + 1);
  112. memset(msg, 0, PW_MAX_MSG_SIZE);
  113. memset(username_realm, 0, 256);
  114. // Просто копируем структуру настроек которая жесто задана
  115. rc_read_config(&rcHandle);
  116. // Словарь пока опускаем и не инициализируем
  117. //if (rc_read_dictionary(&rcHandle, rc_conf_str(&rcHandle, "dictionary")) != 0)
  118. // return ERROR_RC;
  119. // Заполняем словарь
  120. // 1. User name
  121. strcpy(attr_1.name, "test1");
  122. attr_1.value = 1;
  123. attr_1.type = PW_TYPE_STRING;
  124. attr_1.next = NULL;
  125. // 2. Password
  126. strcpy(attr_2.name, "12345");
  127. attr_2.value = 2;
  128. attr_2.type = PW_TYPE_STRING;
  129. attr_2.next = &attr_1;
  130. // 3. Service type
  131. strcpy(attr_3.name, "Service-Type");
  132. attr_3.value = 6;
  133. attr_3.type = PW_TYPE_INTEGER;
  134. attr_3.next = &attr_2;
  135. /*
  136. attr_3.value = 244;
  137. attr_3.type = PW_TYPE_STRING;
  138. attr_3.next = &attr_2;
  139. */
  140. rcHandle.dictionary_attributes = &attr_3;
  141. // Не понял что за параметра, пока NULL
  142. //default_realm = rc_conf_str(rh, "default_realm");
  143. default_realm = NULL;
  144. // Рараметры ожидаются от пользователя
  145. //strncpy(username, "dtelenkov", 9);
  146. strncpy(username, "test1", 5);
  147. strncpy(passwd, "12345", 5);
  148. //strncpy(username, rc_getstr (rh, "login: ",1), sizeof(username));
  149. //strncpy (passwd, rc_getstr(rh, "Password: ",0), sizeof (passwd));
  150. send = NULL;
  151. /*
  152. * Fill in User-Name
  153. */
  154. strncpy(username_realm, username, sizeof(username_realm));
  155. /* Append default realm */
  156. /*
  157. if ((strchr(username_realm, '@') == NULL) && default_realm &&
  158. (*default_realm != '\0'))
  159. {
  160. strncat(username_realm, "@", sizeof(username_realm)-strlen(username_realm)-1);
  161. strncat(username_realm, default_realm, sizeof(username_realm)-strlen(username_realm)-1);
  162. }
  163. */
  164. if (rc_avpair_add(&rcHandle, &send, PW_USER_NAME, username_realm, -1, 0) == NULL)
  165. return ERROR_RC;
  166. /*
  167. * Fill in User-Password
  168. */
  169. if (rc_avpair_add(&rcHandle, &send, PW_USER_PASSWORD, passwd, -1, 0) == NULL)
  170. return ERROR_RC;
  171. /*
  172. * Fill in Service-Type
  173. */
  174. service = PW_AUTHENTICATE_ONLY;
  175. if (rc_avpair_add(&rcHandle, &send, PW_SERVICE_TYPE, &service, -1, 0) == NULL)
  176. return ERROR_RC;
  177. #if 1
  178. result = rc_auth(&rcHandle, 0, send, &received, msg);
  179. if (result == OK_RC)
  180. {
  181. fprintf(stderr, "\"%s\" RADIUS Authentication OK\n", username);
  182. }
  183. else
  184. {
  185. fprintf(stderr, "\"%s\" RADIUS Authentication failure (RC=%i)\n", username, result);
  186. }
  187. #endif
  188. send = NULL;
  189. return 0;
  190. }
  191. void initFdsets(fdsets *sets)
  192. {
  193. memset((sets)->buf1, 0xab, 8);
  194. memset((sets)->buf2, 0xab, 8);
  195. memset((sets)->buf3, 0xab, 8);
  196. memset((sets)->buf4, 0xab, 8);
  197. }
  198. bool recvSelect(fdsets *sets, int *socket, uint32_t timeout)
  199. {
  200. struct timeval tv;
  201. tv.tv_sec = 0;
  202. tv.tv_usec = timeout * 1000;
  203. FD_ZERO(&(sets->readset));
  204. FD_SET(*socket, &sets->readset);
  205. FD_ZERO(&sets->errset);
  206. FD_SET(*socket, &sets->errset);
  207. lwip_select(*socket + 1, &sets->readset, NULL, &sets->errset, &tv);
  208. if (FD_ISSET(*socket, &sets->readset))
  209. return true;
  210. return false;
  211. }
  212. /********************************* (C) РОТЕК **********************************/