radius_user.c 8.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326
  1. /********************************* (C) РОТЕК ***********************************
  2. * @module template
  3. * @file template.c
  4. * @version 1.0.0
  5. * @date XX.XX.XXXX
  6. * $brief template
  7. *******************************************************************************
  8. * @history Version Author Comment
  9. * XX.XX.XXXX 1.0.0 Telenkov D.A. First release.
  10. *******************************************************************************
  11. */
  12. #include "stm32f4xx.h"
  13. #include "radius_user.h"
  14. #include "FreeRTOS.h"
  15. #include "task.h"
  16. #include "freeradius-client.h"
  17. #include "fr_options.h"
  18. rc_handle rcHandle;
  19. int auth_order = AUTH_LOCAL_SND;
  20. int login_tries = 4;
  21. int login_timeout = 60;
  22. char* nologin = "?";
  23. char* issue = "?";
  24. char* authserver = "192.168.1.2:1645";
  25. char* acctserver = "0";
  26. char* servers = "?";
  27. char* dictionary = "?";
  28. char *login_radius = "?";
  29. char *mapfile = "?";
  30. char *default_realm = NULL;
  31. int radius_timeout = 10;
  32. int radius_retries = 3;
  33. int radius_deadtime = 0;
  34. char *bindaddr = "*";
  35. char *login_local = "?";
  36. OPTION rcOptions[] = {
  37. {"auth_order", OT_AUO, ST_UNDEF, (void*)&auth_order}, // AUTH_LOCAL_FST AUTH_RADIUS_FST AUTH_LOCAL_SND AUTH_RADIUS_SND
  38. {"login_tries", OT_INT, ST_UNDEF, (void*)&login_tries},
  39. {"login_timeout", OT_INT, ST_UNDEF, (void*)&login_timeout},
  40. {"nologin", OT_STR, ST_UNDEF, NULL},
  41. {"issue", OT_STR, ST_UNDEF, NULL},
  42. // RADIUS specific options
  43. {"authserver", OT_SRV, ST_UNDEF, (void*)&authserver},
  44. {"acctserver", OT_SRV, ST_UNDEF, (void*)&acctserver},
  45. {"servers", OT_STR, ST_UNDEF, (void*)&servers},
  46. {"dictionary", OT_STR, ST_UNDEF, (void*)&dictionary},
  47. {"login_radius", OT_STR, ST_UNDEF, (void*)&login_radius},
  48. {"mapfile", OT_STR, ST_UNDEF, (void*)&mapfile},
  49. {"default_realm", OT_STR, ST_UNDEF, (void*)&default_realm},
  50. {"radius_timeout", OT_INT, ST_UNDEF, (void*)&radius_timeout},
  51. {"radius_retries", OT_INT, ST_UNDEF, (void*)&radius_retries},
  52. {"radius_deadtime", OT_INT, ST_UNDEF, (void*)&radius_deadtime},
  53. {"bindaddr", OT_STR, ST_UNDEF, (void*)&bindaddr},
  54. // local options
  55. {"login_local", OT_STR, ST_UNDEF, (void*)&login_local},
  56. };
  57. static DICT_ATTR attr_1;
  58. static DICT_ATTR attr_2;
  59. static DICT_ATTR attr_3;
  60. static char rc_msg[PW_MAX_MSG_SIZE];
  61. RadiusClientResult RC_Login(char* login, char* pas)
  62. {
  63. VALUE_PAIR* send;
  64. VALUE_PAIR* received;
  65. uint32_t service;
  66. int result;
  67. memset(rc_msg, 0, PW_MAX_MSG_SIZE);
  68. memset(&rcHandle, 0, sizeof(rc_handle));
  69. rc_read_config(&rcHandle);
  70. // Формирование атрибутов
  71. // 1. User name
  72. strncpy(attr_1.name, login, strlen(login));
  73. attr_1.value = 1;
  74. attr_1.type = PW_TYPE_STRING;
  75. attr_1.next = NULL;
  76. // 2. Password
  77. strncpy(attr_2.name, pas, strlen(pas));
  78. attr_2.value = 2;
  79. attr_2.type = PW_TYPE_STRING;
  80. attr_2.next = &attr_1;
  81. // 3. Service type
  82. strcpy(attr_3.name, "Service-Type");
  83. attr_3.value = 6;
  84. attr_3.type = PW_TYPE_INTEGER;
  85. attr_3.next = &attr_2;
  86. rcHandle.dictionary_attributes = &attr_3;
  87. send = NULL;
  88. // User-Name
  89. if (rc_avpair_add(&rcHandle, &send, PW_USER_NAME, login, -1, 0) == NULL)
  90. return RC_ERROR;
  91. // User-Password
  92. if (rc_avpair_add(&rcHandle, &send, PW_USER_PASSWORD, pas, -1, 0) == NULL)
  93. return RC_ERROR;
  94. // Service-Type
  95. service = PW_AUTHENTICATE_ONLY;
  96. if (rc_avpair_add(&rcHandle, &send, PW_SERVICE_TYPE, &service, -1, 0) == NULL)
  97. return RC_ERROR;
  98. result = rc_auth(&rcHandle, 0, send, &received, rc_msg);
  99. switch (result)
  100. {
  101. case USER_RC :
  102. return RC_LOGIN_USER_OK;
  103. break;
  104. case ADMIN_RC :
  105. return RC_LOGIN_ADMIN_OK;
  106. break;
  107. case NET_ERR_RC :
  108. return RC_NET_ERR;
  109. break;
  110. case ERROR_RC :
  111. return RC_ERROR;
  112. break;
  113. case BADRESP_RC :
  114. return RC_ACC_DENIED;
  115. break;
  116. case REJECT_RC :
  117. return RC_ACC_DENIED;
  118. break;
  119. default :
  120. return RC_ERROR;
  121. break;
  122. }
  123. return RC_ERROR;
  124. //printf("\r\n");
  125. //printf("Radius client result: %i\r\n", result);
  126. }
  127. /**
  128. * @brief
  129. */
  130. int RD_TestInit(void)
  131. {
  132. int result;
  133. char username[128];
  134. char passwd[AUTH_PASS_LEN + 1];
  135. VALUE_PAIR *send, *received;
  136. uint32_t service;
  137. char msg[PW_MAX_MSG_SIZE], username_realm[256];
  138. char *default_realm;
  139. // Моя подготовка
  140. memset(username, 0, 128);
  141. memset(passwd, 0, AUTH_PASS_LEN + 1);
  142. memset(msg, 0, PW_MAX_MSG_SIZE);
  143. memset(username_realm, 0, 256);
  144. // Просто копируем структуру настроек которая жесто задана
  145. rc_read_config(&rcHandle);
  146. // Словарь пока опускаем и не инициализируем
  147. //if (rc_read_dictionary(&rcHandle, rc_conf_str(&rcHandle, "dictionary")) != 0)
  148. // return ERROR_RC;
  149. // Заполняем словарь
  150. // 1. User name
  151. strcpy(attr_1.name, "test1");
  152. attr_1.value = 1;
  153. attr_1.type = PW_TYPE_STRING;
  154. attr_1.next = NULL;
  155. // 2. Password
  156. strcpy(attr_2.name, "12345");
  157. attr_2.value = 2;
  158. attr_2.type = PW_TYPE_STRING;
  159. attr_2.next = &attr_1;
  160. // 3. Service type
  161. strcpy(attr_3.name, "Service-Type");
  162. attr_3.value = 6;
  163. attr_3.type = PW_TYPE_INTEGER;
  164. attr_3.next = &attr_2;
  165. /*
  166. attr_3.value = 244;
  167. attr_3.type = PW_TYPE_STRING;
  168. attr_3.next = &attr_2;
  169. */
  170. rcHandle.dictionary_attributes = &attr_3;
  171. // Не понял что за параметра, пока NULL
  172. //default_realm = rc_conf_str(rh, "default_realm");
  173. default_realm = NULL;
  174. // Рараметры ожидаются от пользователя
  175. //strncpy(username, "dtelenkov", 9);
  176. strncpy(username, "test1", 5);
  177. strncpy(passwd, "12345", 5);
  178. //strncpy(username, rc_getstr (rh, "login: ",1), sizeof(username));
  179. //strncpy (passwd, rc_getstr(rh, "Password: ",0), sizeof (passwd));
  180. send = NULL;
  181. /*
  182. * Fill in User-Name
  183. */
  184. strncpy(username_realm, username, sizeof(username_realm));
  185. /* Append default realm */
  186. /*
  187. if ((strchr(username_realm, '@') == NULL) && default_realm &&
  188. (*default_realm != '\0'))
  189. {
  190. strncat(username_realm, "@", sizeof(username_realm)-strlen(username_realm)-1);
  191. strncat(username_realm, default_realm, sizeof(username_realm)-strlen(username_realm)-1);
  192. }
  193. */
  194. if (rc_avpair_add(&rcHandle, &send, PW_USER_NAME, username_realm, -1, 0) == NULL)
  195. return ERROR_RC;
  196. /*
  197. * Fill in User-Password
  198. */
  199. if (rc_avpair_add(&rcHandle, &send, PW_USER_PASSWORD, passwd, -1, 0) == NULL)
  200. return ERROR_RC;
  201. /*
  202. * Fill in Service-Type
  203. */
  204. service = PW_AUTHENTICATE_ONLY;
  205. if (rc_avpair_add(&rcHandle, &send, PW_SERVICE_TYPE, &service, -1, 0) == NULL)
  206. return ERROR_RC;
  207. #if 0
  208. result = rc_auth(&rcHandle, 0, send, &received, msg);
  209. if (result == OK_RC)
  210. {
  211. fprintf(stderr, "\"%s\" RADIUS Authentication OK\n", username);
  212. }
  213. else
  214. {
  215. fprintf(stderr, "\"%s\" RADIUS Authentication failure (RC=%i)\n", username, result);
  216. }
  217. #endif
  218. send = NULL;
  219. return 0;
  220. }
  221. void initFdsets(fdsets *sets)
  222. {
  223. memset((sets)->buf1, 0xab, 8);
  224. memset((sets)->buf2, 0xab, 8);
  225. memset((sets)->buf3, 0xab, 8);
  226. memset((sets)->buf4, 0xab, 8);
  227. }
  228. bool recvSelect(fdsets *sets, int *socket, uint32_t timeout)
  229. {
  230. struct timeval tv;
  231. tv.tv_sec = 0;
  232. tv.tv_usec = timeout * 1000;
  233. FD_ZERO(&(sets->readset));
  234. FD_SET(*socket, &sets->readset);
  235. FD_ZERO(&sets->errset);
  236. FD_SET(*socket, &sets->errset);
  237. lwip_select(*socket + 1, &sets->readset, NULL, &sets->errset, &tv);
  238. if (FD_ISSET(*socket, &sets->readset))
  239. return true;
  240. return false;
  241. }
  242. //
  243. int RC_GetAccessRights(char* buf)
  244. {
  245. uint16_t tmpLen = 0;
  246. uint8_t att = 10;
  247. while (att)
  248. {
  249. att--; // Предохранитель
  250. if (strstr(buf, "user") != 0) {
  251. return USER_RC; }
  252. else if (strstr(buf, "admin") != 0) {
  253. return ADMIN_RC; }
  254. tmpLen = strlen(buf);
  255. buf += tmpLen + 1;
  256. }
  257. return ERROR_RC;
  258. }
  259. /********************************* (C) РОТЕК **********************************/