radius_user.c 6.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248
  1. /********************************* (C) РОТЕК ***********************************
  2. * @module template
  3. * @file template.c
  4. * @version 1.0.0
  5. * @date XX.XX.XXXX
  6. * $brief template
  7. *******************************************************************************
  8. * @history Version Author Comment
  9. * XX.XX.XXXX 1.0.0 Telenkov D.A. First release.
  10. *******************************************************************************
  11. */
  12. #include "stm32f4xx.h"
  13. #include "radius_user.h"
  14. #include "FreeRTOS.h"
  15. #include "task.h"
  16. #include "freeradius-client.h"
  17. #include "fr_options.h"
  18. rc_handle rcHandle;
  19. int auth_order = AUTH_LOCAL_SND;
  20. int login_tries = 4;
  21. int login_timeout = 60;
  22. char* nologin = "?";
  23. char* issue = "?";
  24. char* authserver = "192.168.1.2:1645";
  25. char* acctserver = "0";
  26. char* servers = "?";
  27. char* dictionary = "?";
  28. char *login_radius = "?";
  29. char *mapfile = "?";
  30. char *default_realm = NULL;
  31. int radius_timeout = 10;
  32. int radius_retries = 3;
  33. int radius_deadtime = 0;
  34. char *bindaddr = "*";
  35. char *login_local = "?";
  36. OPTION rcOptions[] = {
  37. {"auth_order", OT_AUO, ST_UNDEF, (void*)&auth_order}, // AUTH_LOCAL_FST AUTH_RADIUS_FST AUTH_LOCAL_SND AUTH_RADIUS_SND
  38. {"login_tries", OT_INT, ST_UNDEF, (void*)&login_tries},
  39. {"login_timeout", OT_INT, ST_UNDEF, (void*)&login_timeout},
  40. {"nologin", OT_STR, ST_UNDEF, NULL},
  41. {"issue", OT_STR, ST_UNDEF, NULL},
  42. // RADIUS specific options
  43. {"authserver", OT_SRV, ST_UNDEF, (void*)&authserver},
  44. {"acctserver", OT_SRV, ST_UNDEF, (void*)&acctserver},
  45. {"servers", OT_STR, ST_UNDEF, (void*)&servers},
  46. {"dictionary", OT_STR, ST_UNDEF, (void*)&dictionary},
  47. {"login_radius", OT_STR, ST_UNDEF, (void*)&login_radius},
  48. {"mapfile", OT_STR, ST_UNDEF, (void*)&mapfile},
  49. {"default_realm", OT_STR, ST_UNDEF, (void*)&default_realm},
  50. {"radius_timeout", OT_INT, ST_UNDEF, (void*)&radius_timeout},
  51. {"radius_retries", OT_INT, ST_UNDEF, (void*)&radius_retries},
  52. {"radius_deadtime", OT_INT, ST_UNDEF, (void*)&radius_deadtime},
  53. {"bindaddr", OT_STR, ST_UNDEF, (void*)&bindaddr},
  54. // local options
  55. {"login_local", OT_STR, ST_UNDEF, (void*)&login_local},
  56. };
  57. DICT_ATTR attr_1;
  58. DICT_ATTR attr_2;
  59. DICT_ATTR attr_3;
  60. static char fr_msg[PW_MAX_MSG_SIZE];
  61. void FR_Login(char* login, char* pas)
  62. {
  63. VALUE_PAIR* send;
  64. VALUE_PAIR* received;
  65. uint32_t service;
  66. memset(fr_msg, 0, PW_MAX_MSG_SIZE);
  67. // Формирование атрибутов
  68. // 1. User name
  69. strncpy(attr_1.name, login, strlen(login));
  70. attr_1.value = 1;
  71. attr_1.type = PW_TYPE_STRING;
  72. attr_1.next = NULL;
  73. // 2. Password
  74. strncpy(attr_2.name, pas, strlen(pas));
  75. attr_2.value = 2;
  76. attr_2.type = PW_TYPE_STRING;
  77. attr_2.next = &attr_1;
  78. // 3. Service type
  79. strcpy(attr_3.name, "Service-Type");
  80. attr_3.value = 6;
  81. attr_3.type = PW_TYPE_INTEGER;
  82. attr_3.next = &attr_2;
  83. rcHandle.dictionary_attributes = &attr_3;
  84. }
  85. /**
  86. * @brief
  87. */
  88. int RD_TestInit(void)
  89. {
  90. int result;
  91. char username[128];
  92. char passwd[AUTH_PASS_LEN + 1];
  93. VALUE_PAIR *send, *received;
  94. uint32_t service;
  95. char msg[PW_MAX_MSG_SIZE], username_realm[256];
  96. char *default_realm;
  97. // Моя подготовка
  98. memset(username, 0, 128);
  99. memset(passwd, 0, AUTH_PASS_LEN + 1);
  100. memset(msg, 0, PW_MAX_MSG_SIZE);
  101. memset(username_realm, 0, 256);
  102. // Просто копируем структуру настроек которая жесто задана
  103. rc_read_config(&rcHandle);
  104. // Словарь пока опускаем и не инициализируем
  105. //if (rc_read_dictionary(&rcHandle, rc_conf_str(&rcHandle, "dictionary")) != 0)
  106. // return ERROR_RC;
  107. // Заполняем словарь
  108. // 1. User name
  109. strcpy(attr_1.name, "test1");
  110. attr_1.value = 1;
  111. attr_1.type = PW_TYPE_STRING;
  112. attr_1.next = NULL;
  113. // 2. Password
  114. strcpy(attr_2.name, "12345");
  115. attr_2.value = 2;
  116. attr_2.type = PW_TYPE_STRING;
  117. attr_2.next = &attr_1;
  118. // 3. Service type
  119. strcpy(attr_3.name, "Service-Type");
  120. attr_3.value = 6;
  121. attr_3.type = PW_TYPE_INTEGER;
  122. attr_3.next = &attr_2;
  123. /*
  124. attr_3.value = 244;
  125. attr_3.type = PW_TYPE_STRING;
  126. attr_3.next = &attr_2;
  127. */
  128. rcHandle.dictionary_attributes = &attr_3;
  129. // Не понял что за параметра, пока NULL
  130. //default_realm = rc_conf_str(rh, "default_realm");
  131. default_realm = NULL;
  132. // Рараметры ожидаются от пользователя
  133. //strncpy(username, "dtelenkov", 9);
  134. strncpy(username, "test1", 5);
  135. strncpy(passwd, "12345", 5);
  136. //strncpy(username, rc_getstr (rh, "login: ",1), sizeof(username));
  137. //strncpy (passwd, rc_getstr(rh, "Password: ",0), sizeof (passwd));
  138. send = NULL;
  139. /*
  140. * Fill in User-Name
  141. */
  142. strncpy(username_realm, username, sizeof(username_realm));
  143. /* Append default realm */
  144. /*
  145. if ((strchr(username_realm, '@') == NULL) && default_realm &&
  146. (*default_realm != '\0'))
  147. {
  148. strncat(username_realm, "@", sizeof(username_realm)-strlen(username_realm)-1);
  149. strncat(username_realm, default_realm, sizeof(username_realm)-strlen(username_realm)-1);
  150. }
  151. */
  152. if (rc_avpair_add(&rcHandle, &send, PW_USER_NAME, username_realm, -1, 0) == NULL)
  153. return ERROR_RC;
  154. /*
  155. * Fill in User-Password
  156. */
  157. if (rc_avpair_add(&rcHandle, &send, PW_USER_PASSWORD, passwd, -1, 0) == NULL)
  158. return ERROR_RC;
  159. /*
  160. * Fill in Service-Type
  161. */
  162. service = PW_AUTHENTICATE_ONLY;
  163. if (rc_avpair_add(&rcHandle, &send, PW_SERVICE_TYPE, &service, -1, 0) == NULL)
  164. return ERROR_RC;
  165. #if 1
  166. result = rc_auth(&rcHandle, 0, send, &received, msg);
  167. if (result == OK_RC)
  168. {
  169. fprintf(stderr, "\"%s\" RADIUS Authentication OK\n", username);
  170. }
  171. else
  172. {
  173. fprintf(stderr, "\"%s\" RADIUS Authentication failure (RC=%i)\n", username, result);
  174. }
  175. #endif
  176. send = NULL;
  177. return 0;
  178. }
  179. void initFdsets(fdsets *sets)
  180. {
  181. memset((sets)->buf1, 0xab, 8);
  182. memset((sets)->buf2, 0xab, 8);
  183. memset((sets)->buf3, 0xab, 8);
  184. memset((sets)->buf4, 0xab, 8);
  185. }
  186. bool recvSelect(fdsets *sets, int *socket, uint32_t timeout)
  187. {
  188. struct timeval tv;
  189. tv.tv_sec = 0;
  190. tv.tv_usec = timeout * 1000;
  191. FD_ZERO(&(sets->readset));
  192. FD_SET(*socket, &sets->readset);
  193. FD_ZERO(&sets->errset);
  194. FD_SET(*socket, &sets->errset);
  195. lwip_select(*socket + 1, &sets->readset, NULL, &sets->errset, &tv);
  196. if (FD_ISSET(*socket, &sets->readset))
  197. return true;
  198. return false;
  199. }
  200. /********************************* (C) РОТЕК **********************************/