xref: /freebsd/usr.sbin/ppp/radius.c (revision 6eafd35305dee6df318b4652fdea0360ab4c4569)
1972a1bcfSBrian Somers /*
2972a1bcfSBrian Somers  * Copyright 1999 Internet Business Solutions Ltd., Switzerland
3972a1bcfSBrian Somers  * All rights reserved.
4972a1bcfSBrian Somers  *
5972a1bcfSBrian Somers  * Redistribution and use in source and binary forms, with or without
6972a1bcfSBrian Somers  * modification, are permitted provided that the following conditions
7972a1bcfSBrian Somers  * are met:
8972a1bcfSBrian Somers  * 1. Redistributions of source code must retain the above copyright
9972a1bcfSBrian Somers  *    notice, this list of conditions and the following disclaimer.
10972a1bcfSBrian Somers  * 2. Redistributions in binary form must reproduce the above copyright
11972a1bcfSBrian Somers  *    notice, this list of conditions and the following disclaimer in the
12972a1bcfSBrian Somers  *    documentation and/or other materials provided with the distribution.
13972a1bcfSBrian Somers  *
14972a1bcfSBrian Somers  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15972a1bcfSBrian Somers  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16972a1bcfSBrian Somers  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17972a1bcfSBrian Somers  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18972a1bcfSBrian Somers  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19972a1bcfSBrian Somers  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20972a1bcfSBrian Somers  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21972a1bcfSBrian Somers  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22972a1bcfSBrian Somers  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23972a1bcfSBrian Somers  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24972a1bcfSBrian Somers  * SUCH DAMAGE.
25972a1bcfSBrian Somers  *
2697d92980SPeter Wemm  * $FreeBSD$
27972a1bcfSBrian Somers  *
28972a1bcfSBrian Somers  */
29972a1bcfSBrian Somers 
30972a1bcfSBrian Somers #include <sys/param.h>
318fb5ef5aSBrian Somers 
326b457978SBrian Somers #include <sys/socket.h>
33972a1bcfSBrian Somers #include <netinet/in_systm.h>
34972a1bcfSBrian Somers #include <netinet/in.h>
35972a1bcfSBrian Somers #include <netinet/ip.h>
36972a1bcfSBrian Somers #include <arpa/inet.h>
37972a1bcfSBrian Somers #include <sys/un.h>
386b457978SBrian Somers #include <net/route.h>
39972a1bcfSBrian Somers 
4010e629b9SBrian Somers #ifdef LOCALRAD
4110e629b9SBrian Somers #include "radlib.h"
42ff8e577bSBrian Somers #include "radlib_vs.h"
4310e629b9SBrian Somers #else
44972a1bcfSBrian Somers #include <radlib.h>
45ff8e577bSBrian Somers #include <radlib_vs.h>
4610e629b9SBrian Somers #endif
4710e629b9SBrian Somers 
4810e629b9SBrian Somers #include <errno.h>
498fb5ef5aSBrian Somers #ifndef NODES
508fb5ef5aSBrian Somers #include <md5.h>
518fb5ef5aSBrian Somers #endif
526eafd353SBrian Somers #include <stdarg.h>
53972a1bcfSBrian Somers #include <stdio.h>
54972a1bcfSBrian Somers #include <stdlib.h>
55972a1bcfSBrian Somers #include <string.h>
56f0cdd9c0SBrian Somers #include <sys/time.h>
57972a1bcfSBrian Somers #include <termios.h>
58f10f5203SBrian Somers #include <unistd.h>
59f10f5203SBrian Somers #include <netdb.h>
60972a1bcfSBrian Somers 
615d9e6103SBrian Somers #include "layer.h"
62972a1bcfSBrian Somers #include "defs.h"
63972a1bcfSBrian Somers #include "log.h"
64972a1bcfSBrian Somers #include "descriptor.h"
65972a1bcfSBrian Somers #include "prompt.h"
66972a1bcfSBrian Somers #include "timer.h"
67972a1bcfSBrian Somers #include "fsm.h"
68972a1bcfSBrian Somers #include "iplist.h"
69972a1bcfSBrian Somers #include "slcompress.h"
70972a1bcfSBrian Somers #include "throughput.h"
71972a1bcfSBrian Somers #include "lqr.h"
72972a1bcfSBrian Somers #include "hdlc.h"
73972a1bcfSBrian Somers #include "mbuf.h"
7430949fd4SBrian Somers #include "ncpaddr.h"
7530949fd4SBrian Somers #include "ip.h"
76972a1bcfSBrian Somers #include "ipcp.h"
7730949fd4SBrian Somers #include "ipv6cp.h"
78972a1bcfSBrian Somers #include "route.h"
79972a1bcfSBrian Somers #include "command.h"
80972a1bcfSBrian Somers #include "filter.h"
81972a1bcfSBrian Somers #include "lcp.h"
82972a1bcfSBrian Somers #include "ccp.h"
83972a1bcfSBrian Somers #include "link.h"
84972a1bcfSBrian Somers #include "mp.h"
85972a1bcfSBrian Somers #include "radius.h"
86f0cdd9c0SBrian Somers #include "auth.h"
87f0cdd9c0SBrian Somers #include "async.h"
88f0cdd9c0SBrian Somers #include "physical.h"
89f0cdd9c0SBrian Somers #include "chat.h"
90f0cdd9c0SBrian Somers #include "cbcp.h"
91f0cdd9c0SBrian Somers #include "chap.h"
92f0cdd9c0SBrian Somers #include "datalink.h"
9330949fd4SBrian Somers #include "ncp.h"
94972a1bcfSBrian Somers #include "bundle.h"
95ff8e577bSBrian Somers #include "proto.h"
96ff8e577bSBrian Somers 
97ff8e577bSBrian Somers #ifndef NODES
98a16061b2SBrian Somers struct mschap_response {
99ff8e577bSBrian Somers   u_char ident;
100ff8e577bSBrian Somers   u_char flags;
101ff8e577bSBrian Somers   u_char lm_response[24];
102ff8e577bSBrian Somers   u_char nt_response[24];
103ff8e577bSBrian Somers };
104a16061b2SBrian Somers 
105a16061b2SBrian Somers struct mschap2_response {
106a16061b2SBrian Somers   u_char ident;
107a16061b2SBrian Somers   u_char flags;
108a16061b2SBrian Somers   u_char pchallenge[16];
109a16061b2SBrian Somers   u_char reserved[8];
110a16061b2SBrian Somers   u_char response[24];
111a16061b2SBrian Somers };
1128fb5ef5aSBrian Somers 
1138fb5ef5aSBrian Somers #define	AUTH_LEN	16
1148fb5ef5aSBrian Somers #define	SALT_LEN	2
1158fb5ef5aSBrian Somers #endif
1168fb5ef5aSBrian Somers 
1178fb5ef5aSBrian Somers static const char *
1188fb5ef5aSBrian Somers radius_policyname(int policy)
1198fb5ef5aSBrian Somers {
1208fb5ef5aSBrian Somers   switch(policy) {
1218fb5ef5aSBrian Somers   case MPPE_POLICY_ALLOWED:
1228fb5ef5aSBrian Somers     return "Allowed";
1238fb5ef5aSBrian Somers   case MPPE_POLICY_REQUIRED:
1248fb5ef5aSBrian Somers     return "Required";
1258fb5ef5aSBrian Somers   }
1268fb5ef5aSBrian Somers   return NumStr(policy, NULL, 0);
1278fb5ef5aSBrian Somers }
1288fb5ef5aSBrian Somers 
1298fb5ef5aSBrian Somers static const char *
1308fb5ef5aSBrian Somers radius_typesname(int types)
1318fb5ef5aSBrian Somers {
1328fb5ef5aSBrian Somers   switch(types) {
1338fb5ef5aSBrian Somers   case MPPE_TYPE_40BIT:
1348fb5ef5aSBrian Somers     return "40 bit";
1358fb5ef5aSBrian Somers   case MPPE_TYPE_128BIT:
1368fb5ef5aSBrian Somers     return "128 bit";
1378fb5ef5aSBrian Somers   case MPPE_TYPE_40BIT|MPPE_TYPE_128BIT:
1388fb5ef5aSBrian Somers     return "40 or 128 bit";
1398fb5ef5aSBrian Somers   }
1408fb5ef5aSBrian Somers   return NumStr(types, NULL, 0);
1418fb5ef5aSBrian Somers }
1428fb5ef5aSBrian Somers 
1438fb5ef5aSBrian Somers #ifndef NODES
1448fb5ef5aSBrian Somers static void
1458fb5ef5aSBrian Somers demangle(struct radius *r, const void *mangled, size_t mlen,
1468fb5ef5aSBrian Somers          char **buf, size_t *len)
1478fb5ef5aSBrian Somers {
1488fb5ef5aSBrian Somers   char R[AUTH_LEN];		/* variable names as per rfc2548 */
1498fb5ef5aSBrian Somers   const char *S;
1508fb5ef5aSBrian Somers   u_char b[16];
1518fb5ef5aSBrian Somers   const u_char *A, *C;
1528fb5ef5aSBrian Somers   MD5_CTX Context;
1538fb5ef5aSBrian Somers   int Slen, i, Clen, Ppos;
1548fb5ef5aSBrian Somers   u_char *P;
1558fb5ef5aSBrian Somers 
1568fb5ef5aSBrian Somers   if (mlen % 16 != SALT_LEN) {
1578fb5ef5aSBrian Somers     log_Printf(LogWARN, "Cannot interpret mangled data of length %ld\n",
1588fb5ef5aSBrian Somers                (u_long)mlen);
1598fb5ef5aSBrian Somers     *buf = NULL;
1608fb5ef5aSBrian Somers     *len = 0;
1618fb5ef5aSBrian Somers     return;
1628fb5ef5aSBrian Somers   }
1638fb5ef5aSBrian Somers 
1648fb5ef5aSBrian Somers   /* We need the RADIUS Request-Authenticator */
1658fb5ef5aSBrian Somers   if (rad_request_authenticator(r->cx.rad, R, sizeof R) != AUTH_LEN) {
1668fb5ef5aSBrian Somers     log_Printf(LogWARN, "Cannot obtain the RADIUS request authenticator\n");
1678fb5ef5aSBrian Somers     *buf = NULL;
1688fb5ef5aSBrian Somers     *len = 0;
1698fb5ef5aSBrian Somers     return;
1708fb5ef5aSBrian Somers   }
1718fb5ef5aSBrian Somers 
1728fb5ef5aSBrian Somers   A = (const u_char *)mangled;			/* Salt comes first */
1738fb5ef5aSBrian Somers   C = (const u_char *)mangled + SALT_LEN;	/* Then the ciphertext */
1748fb5ef5aSBrian Somers   Clen = mlen - SALT_LEN;
1758fb5ef5aSBrian Somers   S = rad_server_secret(r->cx.rad);		/* We need the RADIUS secret */
1768fb5ef5aSBrian Somers   Slen = strlen(S);
1778fb5ef5aSBrian Somers   P = alloca(Clen);				/* We derive our plaintext */
1788fb5ef5aSBrian Somers 
1798fb5ef5aSBrian Somers   MD5Init(&Context);
1808fb5ef5aSBrian Somers   MD5Update(&Context, S, Slen);
1818fb5ef5aSBrian Somers   MD5Update(&Context, R, AUTH_LEN);
1828fb5ef5aSBrian Somers   MD5Update(&Context, A, SALT_LEN);
1838fb5ef5aSBrian Somers   MD5Final(b, &Context);
1848fb5ef5aSBrian Somers   Ppos = 0;
1858fb5ef5aSBrian Somers 
1868fb5ef5aSBrian Somers   while (Clen) {
1878fb5ef5aSBrian Somers     Clen -= 16;
1888fb5ef5aSBrian Somers 
1898fb5ef5aSBrian Somers     for (i = 0; i < 16; i++)
1908fb5ef5aSBrian Somers       P[Ppos++] = C[i] ^ b[i];
1918fb5ef5aSBrian Somers 
1928fb5ef5aSBrian Somers     if (Clen) {
1938fb5ef5aSBrian Somers       MD5Init(&Context);
1948fb5ef5aSBrian Somers       MD5Update(&Context, S, Slen);
1958fb5ef5aSBrian Somers       MD5Update(&Context, C, 16);
1968fb5ef5aSBrian Somers       MD5Final(b, &Context);
1978fb5ef5aSBrian Somers     }
1988fb5ef5aSBrian Somers 
1998fb5ef5aSBrian Somers     C += 16;
2008fb5ef5aSBrian Somers   }
2018fb5ef5aSBrian Somers 
2028fb5ef5aSBrian Somers   /*
2038fb5ef5aSBrian Somers    * The resulting plain text consists of a one-byte length, the text and
2048fb5ef5aSBrian Somers    * maybe some padding.
2058fb5ef5aSBrian Somers    */
2068fb5ef5aSBrian Somers   *len = *P;
2078fb5ef5aSBrian Somers   if (*len > mlen - 1) {
2088fb5ef5aSBrian Somers     log_Printf(LogWARN, "Mangled data seems to be garbage\n");
2098fb5ef5aSBrian Somers     *buf = NULL;
2108fb5ef5aSBrian Somers     *len = 0;
2118fb5ef5aSBrian Somers     return;
2128fb5ef5aSBrian Somers   }
2138fb5ef5aSBrian Somers 
2148fb5ef5aSBrian Somers   *buf = malloc(*len);
2158fb5ef5aSBrian Somers   memcpy(*buf, P + 1, *len);
2168fb5ef5aSBrian Somers }
217ff8e577bSBrian Somers #endif
218972a1bcfSBrian Somers 
219f0cdd9c0SBrian Somers /*
220f0cdd9c0SBrian Somers  * rad_continue_send_request() has given us `got' (non-zero).  Deal with it.
221f0cdd9c0SBrian Somers  */
222f0cdd9c0SBrian Somers static void
223f0cdd9c0SBrian Somers radius_Process(struct radius *r, int got)
224972a1bcfSBrian Somers {
225972a1bcfSBrian Somers   char *argv[MAXARGS], *nuke;
226f0cdd9c0SBrian Somers   struct bundle *bundle;
227ff8e577bSBrian Somers   int argc, addrs, res, width;
22828e610e3SBrian Somers   size_t len;
22930949fd4SBrian Somers   struct ncprange dest;
23030949fd4SBrian Somers   struct ncpaddr gw;
231f0cdd9c0SBrian Somers   const void *data;
232c42627ffSBrian Somers   const char *stype;
233ff8e577bSBrian Somers   u_int32_t ipaddr, vendor;
23430949fd4SBrian Somers   struct in_addr ip;
235972a1bcfSBrian Somers 
236f0cdd9c0SBrian Somers   r->cx.fd = -1;		/* Stop select()ing */
237c42627ffSBrian Somers   stype = r->cx.auth ? "auth" : "acct";
238972a1bcfSBrian Somers 
239972a1bcfSBrian Somers   switch (got) {
240972a1bcfSBrian Somers     case RAD_ACCESS_ACCEPT:
241c42627ffSBrian Somers       log_Printf(LogPHASE, "Radius(%s): ACCEPT received\n", stype);
242c42627ffSBrian Somers       if (!r->cx.auth) {
243c42627ffSBrian Somers         rad_close(r->cx.rad);
244c42627ffSBrian Somers         return;
245c42627ffSBrian Somers       }
246972a1bcfSBrian Somers       break;
247972a1bcfSBrian Somers 
248f0cdd9c0SBrian Somers     case RAD_ACCESS_REJECT:
249c42627ffSBrian Somers       log_Printf(LogPHASE, "Radius(%s): REJECT received\n", stype);
250ff8e577bSBrian Somers       if (!r->cx.auth) {
251f0cdd9c0SBrian Somers         rad_close(r->cx.rad);
252f0cdd9c0SBrian Somers         return;
253ff8e577bSBrian Somers       }
254ff8e577bSBrian Somers       break;
255f0cdd9c0SBrian Somers 
256972a1bcfSBrian Somers     case RAD_ACCESS_CHALLENGE:
257972a1bcfSBrian Somers       /* we can't deal with this (for now) ! */
258f0cdd9c0SBrian Somers       log_Printf(LogPHASE, "Radius: CHALLENGE received (can't handle yet)\n");
259c42627ffSBrian Somers       if (r->cx.auth)
260f0cdd9c0SBrian Somers         auth_Failure(r->cx.auth);
261f0cdd9c0SBrian Somers       rad_close(r->cx.rad);
262f0cdd9c0SBrian Somers       return;
263972a1bcfSBrian Somers 
264794c9bbcSBrian Somers     case RAD_ACCOUNTING_RESPONSE:
265c42627ffSBrian Somers       log_Printf(LogPHASE, "Radius(%s): Accounting response received\n", stype);
266c42627ffSBrian Somers       if (r->cx.auth)
267c42627ffSBrian Somers         auth_Failure(r->cx.auth);		/* unexpected !!! */
268c42627ffSBrian Somers 
269794c9bbcSBrian Somers       /* No further processing for accounting requests, please */
270794c9bbcSBrian Somers       rad_close(r->cx.rad);
271794c9bbcSBrian Somers       return;
272794c9bbcSBrian Somers 
273972a1bcfSBrian Somers     case -1:
274c42627ffSBrian Somers       log_Printf(LogPHASE, "radius(%s): %s\n", stype, rad_strerror(r->cx.rad));
275c42627ffSBrian Somers       if (r->cx.auth)
276f0cdd9c0SBrian Somers         auth_Failure(r->cx.auth);
277f0cdd9c0SBrian Somers       rad_close(r->cx.rad);
278f0cdd9c0SBrian Somers       return;
279972a1bcfSBrian Somers 
280972a1bcfSBrian Somers     default:
281c42627ffSBrian Somers       log_Printf(LogERROR, "rad_send_request(%s): Failed %d: %s\n", stype,
282f0cdd9c0SBrian Somers                  got, rad_strerror(r->cx.rad));
283c42627ffSBrian Somers       if (r->cx.auth)
284f0cdd9c0SBrian Somers         auth_Failure(r->cx.auth);
285f0cdd9c0SBrian Somers       rad_close(r->cx.rad);
286f0cdd9c0SBrian Somers       return;
287972a1bcfSBrian Somers   }
288972a1bcfSBrian Somers 
289ff8e577bSBrian Somers   /* Let's see what we've got in our reply */
290972a1bcfSBrian Somers   r->ip.s_addr = r->mask.s_addr = INADDR_NONE;
291972a1bcfSBrian Somers   r->mtu = 0;
292972a1bcfSBrian Somers   r->vj = 0;
293ff8e577bSBrian Somers   while ((res = rad_get_attr(r->cx.rad, &data, &len)) > 0) {
294ff8e577bSBrian Somers     switch (res) {
295972a1bcfSBrian Somers       case RAD_FRAMED_IP_ADDRESS:
296972a1bcfSBrian Somers         r->ip = rad_cvt_addr(data);
297f0cdd9c0SBrian Somers         log_Printf(LogPHASE, " IP %s\n", inet_ntoa(r->ip));
298972a1bcfSBrian Somers         break;
299972a1bcfSBrian Somers 
300bf1eaec5SBrian Somers       case RAD_FILTER_ID:
301bf1eaec5SBrian Somers         free(r->filterid);
302bf1eaec5SBrian Somers         if ((r->filterid = rad_cvt_string(data, len)) == NULL) {
303bf1eaec5SBrian Somers           log_Printf(LogERROR, "rad_cvt_string: %s\n", rad_strerror(r->cx.rad));
304ff8e577bSBrian Somers           auth_Failure(r->cx.auth);
305bf1eaec5SBrian Somers           rad_close(r->cx.rad);
306bf1eaec5SBrian Somers           return;
307bf1eaec5SBrian Somers         }
308bf1eaec5SBrian Somers         log_Printf(LogPHASE, " Filter \"%s\"\n", r->filterid);
309bf1eaec5SBrian Somers         break;
310bf1eaec5SBrian Somers 
311bf1eaec5SBrian Somers       case RAD_SESSION_TIMEOUT:
312bf1eaec5SBrian Somers         r->sessiontime = rad_cvt_int(data);
313bf1eaec5SBrian Somers         log_Printf(LogPHASE, " Session-Timeout %lu\n", r->sessiontime);
314bf1eaec5SBrian Somers         break;
315bf1eaec5SBrian Somers 
316972a1bcfSBrian Somers       case RAD_FRAMED_IP_NETMASK:
317972a1bcfSBrian Somers         r->mask = rad_cvt_addr(data);
318f0cdd9c0SBrian Somers         log_Printf(LogPHASE, " Netmask %s\n", inet_ntoa(r->mask));
319972a1bcfSBrian Somers         break;
320972a1bcfSBrian Somers 
321972a1bcfSBrian Somers       case RAD_FRAMED_MTU:
322972a1bcfSBrian Somers         r->mtu = rad_cvt_int(data);
323f0cdd9c0SBrian Somers         log_Printf(LogPHASE, " MTU %lu\n", r->mtu);
324972a1bcfSBrian Somers         break;
325972a1bcfSBrian Somers 
326972a1bcfSBrian Somers       case RAD_FRAMED_ROUTING:
327972a1bcfSBrian Somers         /* Disabled for now - should we automatically set up some filters ? */
328972a1bcfSBrian Somers         /* rad_cvt_int(data); */
329972a1bcfSBrian Somers         /* bit 1 = Send routing packets */
330972a1bcfSBrian Somers         /* bit 2 = Receive routing packets */
331972a1bcfSBrian Somers         break;
332972a1bcfSBrian Somers 
333972a1bcfSBrian Somers       case RAD_FRAMED_COMPRESSION:
334972a1bcfSBrian Somers         r->vj = rad_cvt_int(data) == 1 ? 1 : 0;
335f0cdd9c0SBrian Somers         log_Printf(LogPHASE, " VJ %sabled\n", r->vj ? "en" : "dis");
336972a1bcfSBrian Somers         break;
337972a1bcfSBrian Somers 
338972a1bcfSBrian Somers       case RAD_FRAMED_ROUTE:
339972a1bcfSBrian Somers         /*
340972a1bcfSBrian Somers          * We expect a string of the format ``dest[/bits] gw [metrics]''
341972a1bcfSBrian Somers          * Any specified metrics are ignored.  MYADDR and HISADDR are
342972a1bcfSBrian Somers          * understood for ``dest'' and ``gw'' and ``0.0.0.0'' is the same
343972a1bcfSBrian Somers          * as ``HISADDR''.
344972a1bcfSBrian Somers          */
345972a1bcfSBrian Somers 
346972a1bcfSBrian Somers         if ((nuke = rad_cvt_string(data, len)) == NULL) {
347f0cdd9c0SBrian Somers           log_Printf(LogERROR, "rad_cvt_string: %s\n", rad_strerror(r->cx.rad));
348ff8e577bSBrian Somers           auth_Failure(r->cx.auth);
349f0cdd9c0SBrian Somers           rad_close(r->cx.rad);
350f0cdd9c0SBrian Somers           return;
351972a1bcfSBrian Somers         }
352972a1bcfSBrian Somers 
353f0cdd9c0SBrian Somers         log_Printf(LogPHASE, " Route: %s\n", nuke);
354f0cdd9c0SBrian Somers         bundle = r->cx.auth->physical->dl->bundle;
35530949fd4SBrian Somers         ip.s_addr = INADDR_ANY;
35630949fd4SBrian Somers         ncprange_setip4host(&dest, ip);
357972a1bcfSBrian Somers         argc = command_Interpret(nuke, strlen(nuke), argv);
358c39aa54eSBrian Somers         if (argc < 0)
359c39aa54eSBrian Somers           log_Printf(LogWARN, "radius: %s: Syntax error\n",
360c39aa54eSBrian Somers                      argc == 1 ? argv[0] : "\"\"");
361c39aa54eSBrian Somers         else if (argc < 2)
362972a1bcfSBrian Somers           log_Printf(LogWARN, "radius: %s: Invalid route\n",
363972a1bcfSBrian Somers                      argc == 1 ? argv[0] : "\"\"");
364972a1bcfSBrian Somers         else if ((strcasecmp(argv[0], "default") != 0 &&
36530949fd4SBrian Somers                   !ncprange_aton(&dest, &bundle->ncp, argv[0])) ||
36630949fd4SBrian Somers                  !ncpaddr_aton(&gw, &bundle->ncp, argv[1]))
367972a1bcfSBrian Somers           log_Printf(LogWARN, "radius: %s %s: Invalid route\n",
368972a1bcfSBrian Somers                      argv[0], argv[1]);
369972a1bcfSBrian Somers         else {
37030949fd4SBrian Somers           ncprange_getwidth(&dest, &width);
37130949fd4SBrian Somers           if (width == 32 && strchr(argv[0], '/') == NULL) {
372972a1bcfSBrian Somers             /* No mask specified - use the natural mask */
37330949fd4SBrian Somers             ncprange_getip4addr(&dest, &ip);
37430949fd4SBrian Somers             ncprange_setip4mask(&dest, addr2mask(ip));
37530949fd4SBrian Somers           }
376972a1bcfSBrian Somers           addrs = 0;
377972a1bcfSBrian Somers 
378972a1bcfSBrian Somers           if (!strncasecmp(argv[0], "HISADDR", 7))
379972a1bcfSBrian Somers             addrs = ROUTE_DSTHISADDR;
380972a1bcfSBrian Somers           else if (!strncasecmp(argv[0], "MYADDR", 6))
381972a1bcfSBrian Somers             addrs = ROUTE_DSTMYADDR;
382972a1bcfSBrian Somers 
38330949fd4SBrian Somers           if (ncpaddr_getip4addr(&gw, &ipaddr) && ipaddr == INADDR_ANY) {
384972a1bcfSBrian Somers             addrs |= ROUTE_GWHISADDR;
38530949fd4SBrian Somers             ncpaddr_setip4(&gw, bundle->ncp.ipcp.peer_ip);
386972a1bcfSBrian Somers           } else if (strcasecmp(argv[1], "HISADDR") == 0)
387972a1bcfSBrian Somers             addrs |= ROUTE_GWHISADDR;
388972a1bcfSBrian Somers 
38930949fd4SBrian Somers           route_Add(&r->routes, addrs, &dest, &gw);
390972a1bcfSBrian Somers         }
391972a1bcfSBrian Somers         free(nuke);
392972a1bcfSBrian Somers         break;
393972a1bcfSBrian Somers 
394ff8e577bSBrian Somers       case RAD_REPLY_MESSAGE:
395ff8e577bSBrian Somers         free(r->repstr);
396ff8e577bSBrian Somers         if ((r->repstr = rad_cvt_string(data, len)) == NULL) {
397ff8e577bSBrian Somers           log_Printf(LogERROR, "rad_cvt_string: %s\n", rad_strerror(r->cx.rad));
398ff8e577bSBrian Somers           auth_Failure(r->cx.auth);
399ff8e577bSBrian Somers           rad_close(r->cx.rad);
400ff8e577bSBrian Somers           return;
401ff8e577bSBrian Somers         }
402ff8e577bSBrian Somers         log_Printf(LogPHASE, " Reply-Message \"%s\"\n", r->repstr);
403ff8e577bSBrian Somers         break;
404ff8e577bSBrian Somers 
405ff8e577bSBrian Somers       case RAD_VENDOR_SPECIFIC:
406ff8e577bSBrian Somers         if ((res = rad_get_vendor_attr(&vendor, &data, &len)) <= 0) {
407ff8e577bSBrian Somers           log_Printf(LogERROR, "rad_get_vendor_attr: %s (failing!)\n",
408f0cdd9c0SBrian Somers                      rad_strerror(r->cx.rad));
409f0cdd9c0SBrian Somers           auth_Failure(r->cx.auth);
410f0cdd9c0SBrian Somers           rad_close(r->cx.rad);
411ff8e577bSBrian Somers           return;
412ff8e577bSBrian Somers         }
413ff8e577bSBrian Somers 
414ff8e577bSBrian Somers 	switch (vendor) {
415ff8e577bSBrian Somers           case RAD_VENDOR_MICROSOFT:
416ff8e577bSBrian Somers             switch (res) {
4178fb5ef5aSBrian Somers #ifndef NODES
418ff8e577bSBrian Somers               case RAD_MICROSOFT_MS_CHAP_ERROR:
419ff8e577bSBrian Somers                 free(r->errstr);
420a95b23a6SBrian Somers                 if (len == 0)
421a95b23a6SBrian Somers                   r->errstr = NULL;
422a95b23a6SBrian Somers                 else {
42399cfc2e2SBrian Somers                   if (len < 3 || ((const char *)data)[1] != '=') {
42499cfc2e2SBrian Somers                     /*
42599cfc2e2SBrian Somers                      * Only point at the String field if we don't think the
42699cfc2e2SBrian Somers                      * peer has misformatted the response.
42799cfc2e2SBrian Somers                      */
42899cfc2e2SBrian Somers                     ((const char *)data)++;
42999cfc2e2SBrian Somers                     len--;
430579abfd8SBrian Somers                   } else
431579abfd8SBrian Somers                     log_Printf(LogWARN, "Warning: The MS-CHAP-Error "
432579abfd8SBrian Somers                                "attribute is mis-formatted.  Compensating\n");
43399cfc2e2SBrian Somers                   if ((r->errstr = rad_cvt_string((const char *)data,
43499cfc2e2SBrian Somers                                                   len)) == NULL) {
435ff8e577bSBrian Somers                     log_Printf(LogERROR, "rad_cvt_string: %s\n",
436ff8e577bSBrian Somers                                rad_strerror(r->cx.rad));
437ff8e577bSBrian Somers                     auth_Failure(r->cx.auth);
438ff8e577bSBrian Somers                     rad_close(r->cx.rad);
439ff8e577bSBrian Somers                     return;
440ff8e577bSBrian Somers                   }
441ff8e577bSBrian Somers                   log_Printf(LogPHASE, " MS-CHAP-Error \"%s\"\n", r->errstr);
442a95b23a6SBrian Somers                 }
443ff8e577bSBrian Somers                 break;
444ff8e577bSBrian Somers 
445a16061b2SBrian Somers               case RAD_MICROSOFT_MS_CHAP2_SUCCESS:
446a16061b2SBrian Somers                 free(r->msrepstr);
447a95b23a6SBrian Somers                 if (len == 0)
448a95b23a6SBrian Somers                   r->msrepstr = NULL;
449a95b23a6SBrian Somers                 else {
45099cfc2e2SBrian Somers                   if (len < 3 || ((const char *)data)[1] != '=') {
45199cfc2e2SBrian Somers                     /*
45299cfc2e2SBrian Somers                      * Only point at the String field if we don't think the
45399cfc2e2SBrian Somers                      * peer has misformatted the response.
45499cfc2e2SBrian Somers                      */
45599cfc2e2SBrian Somers                     ((const char *)data)++;
45699cfc2e2SBrian Somers                     len--;
457579abfd8SBrian Somers                   } else
458579abfd8SBrian Somers                     log_Printf(LogWARN, "Warning: The MS-CHAP2-Success "
459579abfd8SBrian Somers                                "attribute is mis-formatted.  Compensating\n");
46099cfc2e2SBrian Somers                   if ((r->msrepstr = rad_cvt_string((const char *)data,
46199cfc2e2SBrian Somers                                                     len)) == NULL) {
462a16061b2SBrian Somers                     log_Printf(LogERROR, "rad_cvt_string: %s\n",
463a16061b2SBrian Somers                                rad_strerror(r->cx.rad));
464a16061b2SBrian Somers                     auth_Failure(r->cx.auth);
465a16061b2SBrian Somers                     rad_close(r->cx.rad);
466a16061b2SBrian Somers                     return;
467a16061b2SBrian Somers                   }
468a95b23a6SBrian Somers                   log_Printf(LogPHASE, " MS-CHAP2-Success \"%s\"\n",
469a95b23a6SBrian Somers                              r->msrepstr);
470a95b23a6SBrian Somers                 }
471a16061b2SBrian Somers                 break;
472a16061b2SBrian Somers 
4738fb5ef5aSBrian Somers               case RAD_MICROSOFT_MS_MPPE_ENCRYPTION_POLICY:
4748fb5ef5aSBrian Somers                 r->mppe.policy = rad_cvt_int(data);
4758fb5ef5aSBrian Somers                 log_Printf(LogPHASE, " MS-MPPE-Encryption-Policy %s\n",
4768fb5ef5aSBrian Somers                            radius_policyname(r->mppe.policy));
4778fb5ef5aSBrian Somers                 break;
4788fb5ef5aSBrian Somers 
4798fb5ef5aSBrian Somers               case RAD_MICROSOFT_MS_MPPE_ENCRYPTION_TYPES:
4808fb5ef5aSBrian Somers                 r->mppe.types = rad_cvt_int(data);
4818fb5ef5aSBrian Somers                 log_Printf(LogPHASE, " MS-MPPE-Encryption-Types %s\n",
4828fb5ef5aSBrian Somers                            radius_typesname(r->mppe.types));
4838fb5ef5aSBrian Somers                 break;
4848fb5ef5aSBrian Somers 
4858fb5ef5aSBrian Somers               case RAD_MICROSOFT_MS_MPPE_RECV_KEY:
4868fb5ef5aSBrian Somers                 free(r->mppe.recvkey);
4878fb5ef5aSBrian Somers 		demangle(r, data, len, &r->mppe.recvkey, &r->mppe.recvkeylen);
4888fb5ef5aSBrian Somers                 log_Printf(LogPHASE, " MS-MPPE-Recv-Key ********\n");
4898fb5ef5aSBrian Somers                 break;
4908fb5ef5aSBrian Somers 
4918fb5ef5aSBrian Somers               case RAD_MICROSOFT_MS_MPPE_SEND_KEY:
4928fb5ef5aSBrian Somers 		demangle(r, data, len, &r->mppe.sendkey, &r->mppe.sendkeylen);
4938fb5ef5aSBrian Somers                 log_Printf(LogPHASE, " MS-MPPE-Send-Key ********\n");
4948fb5ef5aSBrian Somers                 break;
4958fb5ef5aSBrian Somers #endif
4968fb5ef5aSBrian Somers 
497ff8e577bSBrian Somers               default:
498ff8e577bSBrian Somers                 log_Printf(LogDEBUG, "Dropping MICROSOFT vendor specific "
499ff8e577bSBrian Somers                            "RADIUS attribute %d\n", res);
500ff8e577bSBrian Somers                 break;
501ff8e577bSBrian Somers             }
502ff8e577bSBrian Somers             break;
503ff8e577bSBrian Somers 
504ff8e577bSBrian Somers           default:
505ff8e577bSBrian Somers             log_Printf(LogDEBUG, "Dropping vendor %lu RADIUS attribute %d\n",
506ff8e577bSBrian Somers                        (unsigned long)vendor, res);
507ff8e577bSBrian Somers             break;
508ff8e577bSBrian Somers         }
509ff8e577bSBrian Somers         break;
510ff8e577bSBrian Somers 
511ff8e577bSBrian Somers       default:
512ff8e577bSBrian Somers         log_Printf(LogDEBUG, "Dropping RADIUS attribute %d\n", res);
513ff8e577bSBrian Somers         break;
514ff8e577bSBrian Somers     }
515ff8e577bSBrian Somers   }
516ff8e577bSBrian Somers 
517ff8e577bSBrian Somers   if (res == -1) {
518ff8e577bSBrian Somers     log_Printf(LogERROR, "rad_get_attr: %s (failing!)\n",
519ff8e577bSBrian Somers                rad_strerror(r->cx.rad));
520ff8e577bSBrian Somers     auth_Failure(r->cx.auth);
521ff8e577bSBrian Somers   } else if (got == RAD_ACCESS_REJECT)
522ff8e577bSBrian Somers     auth_Failure(r->cx.auth);
523ff8e577bSBrian Somers   else {
524f0cdd9c0SBrian Somers     r->valid = 1;
525f0cdd9c0SBrian Somers     auth_Success(r->cx.auth);
526f0cdd9c0SBrian Somers   }
527ff8e577bSBrian Somers   rad_close(r->cx.rad);
528972a1bcfSBrian Somers }
529972a1bcfSBrian Somers 
530f0cdd9c0SBrian Somers /*
5318e7bd08eSBrian Somers  * We've either timed out or select()ed on the read descriptor
532f0cdd9c0SBrian Somers  */
533f0cdd9c0SBrian Somers static void
534f0cdd9c0SBrian Somers radius_Continue(struct radius *r, int sel)
535f0cdd9c0SBrian Somers {
536f0cdd9c0SBrian Somers   struct timeval tv;
537f0cdd9c0SBrian Somers   int got;
538972a1bcfSBrian Somers 
539f0cdd9c0SBrian Somers   timer_Stop(&r->cx.timer);
540f0cdd9c0SBrian Somers   if ((got = rad_continue_send_request(r->cx.rad, sel, &r->cx.fd, &tv)) == 0) {
541f0cdd9c0SBrian Somers     log_Printf(LogPHASE, "Radius: Request re-sent\n");
542f0cdd9c0SBrian Somers     r->cx.timer.load = tv.tv_usec / TICKUNIT + tv.tv_sec * SECTICKS;
543f0cdd9c0SBrian Somers     timer_Start(&r->cx.timer);
544f0cdd9c0SBrian Somers     return;
545f0cdd9c0SBrian Somers   }
546f0cdd9c0SBrian Somers 
547f0cdd9c0SBrian Somers   radius_Process(r, got);
548f0cdd9c0SBrian Somers }
549f0cdd9c0SBrian Somers 
550f0cdd9c0SBrian Somers /*
551f0cdd9c0SBrian Somers  * Time to call rad_continue_send_request() - timed out.
552f0cdd9c0SBrian Somers  */
553f0cdd9c0SBrian Somers static void
554f0cdd9c0SBrian Somers radius_Timeout(void *v)
555f0cdd9c0SBrian Somers {
556f0cdd9c0SBrian Somers   radius_Continue((struct radius *)v, 0);
557f0cdd9c0SBrian Somers }
558f0cdd9c0SBrian Somers 
559f0cdd9c0SBrian Somers /*
560f0cdd9c0SBrian Somers  * Time to call rad_continue_send_request() - something to read.
561f0cdd9c0SBrian Somers  */
562f0cdd9c0SBrian Somers static void
563f013f33eSBrian Somers radius_Read(struct fdescriptor *d, struct bundle *bundle, const fd_set *fdset)
564f0cdd9c0SBrian Somers {
565f0cdd9c0SBrian Somers   radius_Continue(descriptor2radius(d), 1);
566f0cdd9c0SBrian Somers }
567f0cdd9c0SBrian Somers 
568f0cdd9c0SBrian Somers /*
5698e7bd08eSBrian Somers  * Behave as a struct fdescriptor (descriptor.h)
570f0cdd9c0SBrian Somers  */
571f0cdd9c0SBrian Somers static int
572f013f33eSBrian Somers radius_UpdateSet(struct fdescriptor *d, fd_set *r, fd_set *w, fd_set *e, int *n)
573f0cdd9c0SBrian Somers {
574f0cdd9c0SBrian Somers   struct radius *rad = descriptor2radius(d);
575f0cdd9c0SBrian Somers 
576f0cdd9c0SBrian Somers   if (r && rad->cx.fd != -1) {
577f0cdd9c0SBrian Somers     FD_SET(rad->cx.fd, r);
578f0cdd9c0SBrian Somers     if (*n < rad->cx.fd + 1)
579f0cdd9c0SBrian Somers       *n = rad->cx.fd + 1;
580f0cdd9c0SBrian Somers     log_Printf(LogTIMER, "Radius: fdset(r) %d\n", rad->cx.fd);
58182d6780cSBrian Somers     return 1;
582972a1bcfSBrian Somers   }
583972a1bcfSBrian Somers 
584f0cdd9c0SBrian Somers   return 0;
585f0cdd9c0SBrian Somers }
586f0cdd9c0SBrian Somers 
587f0cdd9c0SBrian Somers /*
5888e7bd08eSBrian Somers  * Behave as a struct fdescriptor (descriptor.h)
589f0cdd9c0SBrian Somers  */
590f0cdd9c0SBrian Somers static int
591f013f33eSBrian Somers radius_IsSet(struct fdescriptor *d, const fd_set *fdset)
592f0cdd9c0SBrian Somers {
593f0cdd9c0SBrian Somers   struct radius *r = descriptor2radius(d);
594f0cdd9c0SBrian Somers 
595f0cdd9c0SBrian Somers   return r && r->cx.fd != -1 && FD_ISSET(r->cx.fd, fdset);
596f0cdd9c0SBrian Somers }
597f0cdd9c0SBrian Somers 
598f0cdd9c0SBrian Somers /*
5998e7bd08eSBrian Somers  * Behave as a struct fdescriptor (descriptor.h)
600f0cdd9c0SBrian Somers  */
601f0cdd9c0SBrian Somers static int
602f013f33eSBrian Somers radius_Write(struct fdescriptor *d, struct bundle *bundle, const fd_set *fdset)
603f0cdd9c0SBrian Somers {
604f0cdd9c0SBrian Somers   /* We never want to write here ! */
605f0cdd9c0SBrian Somers   log_Printf(LogALERT, "radius_Write: Internal error: Bad call !\n");
606f0cdd9c0SBrian Somers   return 0;
607f0cdd9c0SBrian Somers }
608f0cdd9c0SBrian Somers 
609f0cdd9c0SBrian Somers /*
610f0cdd9c0SBrian Somers  * Initialise ourselves
611f0cdd9c0SBrian Somers  */
612f0cdd9c0SBrian Somers void
613f0cdd9c0SBrian Somers radius_Init(struct radius *r)
614f0cdd9c0SBrian Somers {
615f0cdd9c0SBrian Somers   r->desc.type = RADIUS_DESCRIPTOR;
616f0cdd9c0SBrian Somers   r->desc.UpdateSet = radius_UpdateSet;
617f0cdd9c0SBrian Somers   r->desc.IsSet = radius_IsSet;
618f0cdd9c0SBrian Somers   r->desc.Read = radius_Read;
619f0cdd9c0SBrian Somers   r->desc.Write = radius_Write;
620ff8e577bSBrian Somers   r->cx.fd = -1;
621ff8e577bSBrian Somers   r->cx.rad = NULL;
622f0cdd9c0SBrian Somers   memset(&r->cx.timer, '\0', sizeof r->cx.timer);
623ff8e577bSBrian Somers   r->cx.auth = NULL;
624ff8e577bSBrian Somers   r->valid = 0;
625ff8e577bSBrian Somers   r->vj = 0;
626ff8e577bSBrian Somers   r->ip.s_addr = INADDR_ANY;
627ff8e577bSBrian Somers   r->mask.s_addr = INADDR_NONE;
628ff8e577bSBrian Somers   r->routes = NULL;
629ff8e577bSBrian Somers   r->mtu = DEF_MTU;
630a16061b2SBrian Somers   r->msrepstr = NULL;
631ff8e577bSBrian Somers   r->repstr = NULL;
632ff8e577bSBrian Somers   r->errstr = NULL;
6338fb5ef5aSBrian Somers   r->mppe.policy = 0;
6348fb5ef5aSBrian Somers   r->mppe.types = 0;
6358fb5ef5aSBrian Somers   r->mppe.recvkey = NULL;
6368fb5ef5aSBrian Somers   r->mppe.recvkeylen = 0;
6378fb5ef5aSBrian Somers   r->mppe.sendkey = NULL;
6388fb5ef5aSBrian Somers   r->mppe.sendkeylen = 0;
639ff8e577bSBrian Somers   *r->cfg.file = '\0';;
640794c9bbcSBrian Somers   log_Printf(LogDEBUG, "Radius: radius_Init\n");
641f0cdd9c0SBrian Somers }
642f0cdd9c0SBrian Somers 
643f0cdd9c0SBrian Somers /*
644f0cdd9c0SBrian Somers  * Forget everything and go back to initialised state.
645f0cdd9c0SBrian Somers  */
646f0cdd9c0SBrian Somers void
647f0cdd9c0SBrian Somers radius_Destroy(struct radius *r)
648f0cdd9c0SBrian Somers {
649f0cdd9c0SBrian Somers   r->valid = 0;
650794c9bbcSBrian Somers   log_Printf(LogDEBUG, "Radius: radius_Destroy\n");
651f0cdd9c0SBrian Somers   timer_Stop(&r->cx.timer);
652f0cdd9c0SBrian Somers   route_DeleteAll(&r->routes);
653bf1eaec5SBrian Somers   free(r->filterid);
654bf1eaec5SBrian Somers   r->filterid = NULL;
655a16061b2SBrian Somers   free(r->msrepstr);
656a16061b2SBrian Somers   r->msrepstr = NULL;
657ff8e577bSBrian Somers   free(r->repstr);
658ff8e577bSBrian Somers   r->repstr = NULL;
659ff8e577bSBrian Somers   free(r->errstr);
660ff8e577bSBrian Somers   r->errstr = NULL;
6618fb5ef5aSBrian Somers   free(r->mppe.recvkey);
6628fb5ef5aSBrian Somers   r->mppe.recvkey = NULL;
6638fb5ef5aSBrian Somers   r->mppe.recvkeylen = 0;
6648fb5ef5aSBrian Somers   free(r->mppe.sendkey);
6658fb5ef5aSBrian Somers   r->mppe.sendkey = NULL;
6668fb5ef5aSBrian Somers   r->mppe.sendkeylen = 0;
667f0cdd9c0SBrian Somers   if (r->cx.fd != -1) {
668f0cdd9c0SBrian Somers     r->cx.fd = -1;
669f0cdd9c0SBrian Somers     rad_close(r->cx.rad);
670f0cdd9c0SBrian Somers   }
671f0cdd9c0SBrian Somers }
672f0cdd9c0SBrian Somers 
673de59e178SBrian Somers static int
674de59e178SBrian Somers radius_put_physical_details(struct rad_handle *rad, struct physical *p)
675de59e178SBrian Somers {
676de59e178SBrian Somers   int slot, type;
677de59e178SBrian Somers 
678de59e178SBrian Somers   type = RAD_VIRTUAL;
679de59e178SBrian Somers   if (p->handler)
680de59e178SBrian Somers     switch (p->handler->type) {
681de59e178SBrian Somers       case I4B_DEVICE:
682de59e178SBrian Somers         type = RAD_ISDN_SYNC;
683de59e178SBrian Somers         break;
684de59e178SBrian Somers 
685de59e178SBrian Somers       case TTY_DEVICE:
686de59e178SBrian Somers         type = RAD_ASYNC;
687de59e178SBrian Somers         break;
688de59e178SBrian Somers 
689de59e178SBrian Somers       case ETHER_DEVICE:
690de59e178SBrian Somers         type = RAD_ETHERNET;
691de59e178SBrian Somers         break;
692de59e178SBrian Somers 
693de59e178SBrian Somers       case TCP_DEVICE:
694de59e178SBrian Somers       case UDP_DEVICE:
695de59e178SBrian Somers       case EXEC_DEVICE:
696de59e178SBrian Somers       case ATM_DEVICE:
697de59e178SBrian Somers       case NG_DEVICE:
698de59e178SBrian Somers         type = RAD_VIRTUAL;
699de59e178SBrian Somers         break;
700de59e178SBrian Somers     }
701de59e178SBrian Somers 
702de59e178SBrian Somers   if (rad_put_int(rad, RAD_NAS_PORT_TYPE, type) != 0) {
703de59e178SBrian Somers     log_Printf(LogERROR, "rad_put: rad_put_int: %s\n", rad_strerror(rad));
704de59e178SBrian Somers     rad_close(rad);
705de59e178SBrian Somers     return 0;
706de59e178SBrian Somers   }
707de59e178SBrian Somers 
708de59e178SBrian Somers   if ((slot = physical_Slot(p)) >= 0)
709de59e178SBrian Somers     if (rad_put_int(rad, RAD_NAS_PORT, slot) != 0) {
710de59e178SBrian Somers       log_Printf(LogERROR, "rad_put: rad_put_int: %s\n", rad_strerror(rad));
711de59e178SBrian Somers       rad_close(rad);
712de59e178SBrian Somers       return 0;
713de59e178SBrian Somers     }
714de59e178SBrian Somers 
715de59e178SBrian Somers   return 1;
716de59e178SBrian Somers }
717de59e178SBrian Somers 
718f0cdd9c0SBrian Somers /*
719f0cdd9c0SBrian Somers  * Start an authentication request to the RADIUS server.
720f0cdd9c0SBrian Somers  */
721a16061b2SBrian Somers int
722f0cdd9c0SBrian Somers radius_Authenticate(struct radius *r, struct authinfo *authp, const char *name,
723a16061b2SBrian Somers                     const char *key, int klen, const char *nchallenge,
724250be50bSBrian Somers                     int nclen)
725f0cdd9c0SBrian Somers {
726f0cdd9c0SBrian Somers   struct timeval tv;
727de59e178SBrian Somers   int got;
72826e6a622SBrian Somers   char hostname[MAXHOSTNAMELEN];
729aadbb4eaSBrian Somers #if 0
730f10f5203SBrian Somers   struct hostent *hp;
731f10f5203SBrian Somers   struct in_addr hostaddr;
7328fb5ef5aSBrian Somers #endif
733ff8e577bSBrian Somers #ifndef NODES
734a16061b2SBrian Somers   struct mschap_response msresp;
735a16061b2SBrian Somers   struct mschap2_response msresp2;
736250be50bSBrian Somers   const struct MSCHAPv2_resp *keyv2;
737ff8e577bSBrian Somers #endif
738f0cdd9c0SBrian Somers 
739f0cdd9c0SBrian Somers   if (!*r->cfg.file)
740a16061b2SBrian Somers     return 0;
741f0cdd9c0SBrian Somers 
742f0cdd9c0SBrian Somers   if (r->cx.fd != -1)
743f0cdd9c0SBrian Somers     /*
744f0cdd9c0SBrian Somers      * We assume that our name/key/challenge is the same as last time,
745f0cdd9c0SBrian Somers      * and just continue to wait for the RADIUS server(s).
746f0cdd9c0SBrian Somers      */
747a16061b2SBrian Somers     return 1;
748f0cdd9c0SBrian Somers 
749f0cdd9c0SBrian Somers   radius_Destroy(r);
750f0cdd9c0SBrian Somers 
751794c9bbcSBrian Somers   if ((r->cx.rad = rad_auth_open()) == NULL) {
752794c9bbcSBrian Somers     log_Printf(LogERROR, "rad_auth_open: %s\n", strerror(errno));
753a16061b2SBrian Somers     return 0;
754f0cdd9c0SBrian Somers   }
755f0cdd9c0SBrian Somers 
756f0cdd9c0SBrian Somers   if (rad_config(r->cx.rad, r->cfg.file) != 0) {
757f0cdd9c0SBrian Somers     log_Printf(LogERROR, "rad_config: %s\n", rad_strerror(r->cx.rad));
758f0cdd9c0SBrian Somers     rad_close(r->cx.rad);
759a16061b2SBrian Somers     return 0;
760f0cdd9c0SBrian Somers   }
761f0cdd9c0SBrian Somers 
762f0cdd9c0SBrian Somers   if (rad_create_request(r->cx.rad, RAD_ACCESS_REQUEST) != 0) {
763f0cdd9c0SBrian Somers     log_Printf(LogERROR, "rad_create_request: %s\n", rad_strerror(r->cx.rad));
764f0cdd9c0SBrian Somers     rad_close(r->cx.rad);
765a16061b2SBrian Somers     return 0;
766f0cdd9c0SBrian Somers   }
767f0cdd9c0SBrian Somers 
7684dc4e1eeSBrian Somers   if (rad_put_string(r->cx.rad, RAD_USER_NAME, name) != 0 ||
769f0cdd9c0SBrian Somers       rad_put_int(r->cx.rad, RAD_SERVICE_TYPE, RAD_FRAMED) != 0 ||
770f0cdd9c0SBrian Somers       rad_put_int(r->cx.rad, RAD_FRAMED_PROTOCOL, RAD_PPP) != 0) {
771f0cdd9c0SBrian Somers     log_Printf(LogERROR, "rad_put: %s\n", rad_strerror(r->cx.rad));
772f0cdd9c0SBrian Somers     rad_close(r->cx.rad);
773a16061b2SBrian Somers     return 0;
774f0cdd9c0SBrian Somers   }
775f0cdd9c0SBrian Somers 
776ff8e577bSBrian Somers   switch (authp->physical->link.lcp.want_auth) {
777ff8e577bSBrian Somers   case PROTO_PAP:
778ff8e577bSBrian Somers     /* We're talking PAP */
779ff8e577bSBrian Somers     if (rad_put_attr(r->cx.rad, RAD_USER_PASSWORD, key, klen) != 0) {
780ff8e577bSBrian Somers       log_Printf(LogERROR, "PAP: rad_put_string: %s\n",
781ff8e577bSBrian Somers                  rad_strerror(r->cx.rad));
782ff8e577bSBrian Somers       rad_close(r->cx.rad);
783a16061b2SBrian Somers       return 0;
784ff8e577bSBrian Somers     }
785ff8e577bSBrian Somers     break;
786ff8e577bSBrian Somers 
787ff8e577bSBrian Somers   case PROTO_CHAP:
788ff8e577bSBrian Somers     switch (authp->physical->link.lcp.want_authtype) {
789ff8e577bSBrian Somers     case 0x5:
79050ca6ec3SBrian Somers       if (rad_put_attr(r->cx.rad, RAD_CHAP_PASSWORD, key, klen) != 0 ||
791a16061b2SBrian Somers           rad_put_attr(r->cx.rad, RAD_CHAP_CHALLENGE, nchallenge, nclen) != 0) {
792f0cdd9c0SBrian Somers         log_Printf(LogERROR, "CHAP: rad_put_string: %s\n",
793f0cdd9c0SBrian Somers                    rad_strerror(r->cx.rad));
794f0cdd9c0SBrian Somers         rad_close(r->cx.rad);
795a16061b2SBrian Somers         return 0;
796f0cdd9c0SBrian Somers       }
797ff8e577bSBrian Somers       break;
798ff8e577bSBrian Somers 
799ff8e577bSBrian Somers #ifndef NODES
800ff8e577bSBrian Somers     case 0x80:
801ff8e577bSBrian Somers       if (klen != 50) {
802a16061b2SBrian Somers         log_Printf(LogERROR, "CHAP80: Unrecognised key length %d\n", klen);
803f0cdd9c0SBrian Somers         rad_close(r->cx.rad);
804a16061b2SBrian Somers         return 0;
805f0cdd9c0SBrian Somers       }
806a16061b2SBrian Somers 
807ff8e577bSBrian Somers       rad_put_vendor_attr(r->cx.rad, RAD_VENDOR_MICROSOFT,
808a16061b2SBrian Somers                           RAD_MICROSOFT_MS_CHAP_CHALLENGE, nchallenge, nclen);
809a16061b2SBrian Somers       msresp.ident = *key;
810a16061b2SBrian Somers       msresp.flags = 0x01;
811a16061b2SBrian Somers       memcpy(msresp.lm_response, key + 1, 24);
812a16061b2SBrian Somers       memcpy(msresp.nt_response, key + 25, 24);
813ff8e577bSBrian Somers       rad_put_vendor_attr(r->cx.rad, RAD_VENDOR_MICROSOFT,
814a16061b2SBrian Somers                           RAD_MICROSOFT_MS_CHAP_RESPONSE, &msresp,
815a16061b2SBrian Somers                           sizeof msresp);
816ff8e577bSBrian Somers       break;
817ff8e577bSBrian Somers 
818ff8e577bSBrian Somers     case 0x81:
819250be50bSBrian Somers       if (klen != sizeof(*keyv2) + 1) {
820a16061b2SBrian Somers         log_Printf(LogERROR, "CHAP81: Unrecognised key length %d\n", klen);
821a16061b2SBrian Somers         rad_close(r->cx.rad);
822a16061b2SBrian Somers         return 0;
823a16061b2SBrian Somers       }
824a16061b2SBrian Somers 
825250be50bSBrian Somers       keyv2 = (const struct MSCHAPv2_resp *)(key + 1);
826a16061b2SBrian Somers       rad_put_vendor_attr(r->cx.rad, RAD_VENDOR_MICROSOFT,
827a16061b2SBrian Somers                           RAD_MICROSOFT_MS_CHAP_CHALLENGE, nchallenge, nclen);
828a16061b2SBrian Somers       msresp2.ident = *key;
829250be50bSBrian Somers       msresp2.flags = keyv2->Flags;
830250be50bSBrian Somers       memcpy(msresp2.response, keyv2->NTResponse, sizeof msresp2.response);
831a16061b2SBrian Somers       memset(msresp2.reserved, '\0', sizeof msresp2.reserved);
832250be50bSBrian Somers       memcpy(msresp2.pchallenge, keyv2->PeerChallenge,
833250be50bSBrian Somers              sizeof msresp2.pchallenge);
834a16061b2SBrian Somers       rad_put_vendor_attr(r->cx.rad, RAD_VENDOR_MICROSOFT,
835a16061b2SBrian Somers                           RAD_MICROSOFT_MS_CHAP2_RESPONSE, &msresp2,
836a16061b2SBrian Somers                           sizeof msresp2);
837a16061b2SBrian Somers       break;
838ff8e577bSBrian Somers #endif
839ff8e577bSBrian Somers     default:
840ff8e577bSBrian Somers       log_Printf(LogERROR, "CHAP: Unrecognised type 0x%02x\n",
841ff8e577bSBrian Somers                  authp->physical->link.lcp.want_authtype);
842ff8e577bSBrian Somers       rad_close(r->cx.rad);
843a16061b2SBrian Somers       return 0;
844ff8e577bSBrian Somers     }
845ff8e577bSBrian Somers   }
846f0cdd9c0SBrian Somers 
847f10f5203SBrian Somers   if (gethostname(hostname, sizeof hostname) != 0)
848f10f5203SBrian Somers     log_Printf(LogERROR, "rad_put: gethostname(): %s\n", strerror(errno));
849f10f5203SBrian Somers   else {
850aadbb4eaSBrian Somers #if 0
851f10f5203SBrian Somers     if ((hp = gethostbyname(hostname)) != NULL) {
852f10f5203SBrian Somers       hostaddr.s_addr = *(u_long *)hp->h_addr;
853f10f5203SBrian Somers       if (rad_put_addr(r->cx.rad, RAD_NAS_IP_ADDRESS, hostaddr) != 0) {
854f10f5203SBrian Somers         log_Printf(LogERROR, "rad_put: rad_put_string: %s\n",
855f10f5203SBrian Somers                    rad_strerror(r->cx.rad));
856f10f5203SBrian Somers         rad_close(r->cx.rad);
857a16061b2SBrian Somers         return 0;
858f10f5203SBrian Somers       }
859f10f5203SBrian Somers     }
860aadbb4eaSBrian Somers #endif
861f10f5203SBrian Somers     if (rad_put_string(r->cx.rad, RAD_NAS_IDENTIFIER, hostname) != 0) {
862f10f5203SBrian Somers       log_Printf(LogERROR, "rad_put: rad_put_string: %s\n",
863f10f5203SBrian Somers                  rad_strerror(r->cx.rad));
864f10f5203SBrian Somers       rad_close(r->cx.rad);
865a16061b2SBrian Somers       return 0;
866f10f5203SBrian Somers     }
867f10f5203SBrian Somers   }
868f10f5203SBrian Somers 
869de59e178SBrian Somers   radius_put_physical_details(r->cx.rad, authp->physical);
870f10f5203SBrian Somers 
871c42627ffSBrian Somers   r->cx.auth = authp;
872f0cdd9c0SBrian Somers   if ((got = rad_init_send_request(r->cx.rad, &r->cx.fd, &tv)))
873f0cdd9c0SBrian Somers     radius_Process(r, got);
874f0cdd9c0SBrian Somers   else {
875f0cdd9c0SBrian Somers     log_Printf(LogPHASE, "Radius: Request sent\n");
876f0cdd9c0SBrian Somers     log_Printf(LogDEBUG, "Using radius_Timeout [%p]\n", radius_Timeout);
877f0cdd9c0SBrian Somers     r->cx.timer.load = tv.tv_usec / TICKUNIT + tv.tv_sec * SECTICKS;
878f0cdd9c0SBrian Somers     r->cx.timer.func = radius_Timeout;
879c42627ffSBrian Somers     r->cx.timer.name = "radius auth";
880f0cdd9c0SBrian Somers     r->cx.timer.arg = r;
881f0cdd9c0SBrian Somers     timer_Start(&r->cx.timer);
882f0cdd9c0SBrian Somers   }
883a16061b2SBrian Somers 
884a16061b2SBrian Somers   return 1;
885f0cdd9c0SBrian Somers }
886f0cdd9c0SBrian Somers 
887f0cdd9c0SBrian Somers /*
888794c9bbcSBrian Somers  * Send an accounting request to the RADIUS server
889794c9bbcSBrian Somers  */
890794c9bbcSBrian Somers void
891794c9bbcSBrian Somers radius_Account(struct radius *r, struct radacct *ac, struct datalink *dl,
892794c9bbcSBrian Somers                int acct_type, struct in_addr *peer_ip, struct in_addr *netmask,
893794c9bbcSBrian Somers                struct pppThroughput *stats)
894794c9bbcSBrian Somers {
895794c9bbcSBrian Somers   struct timeval tv;
896de59e178SBrian Somers   int got;
89726e6a622SBrian Somers   char hostname[MAXHOSTNAMELEN];
898aadbb4eaSBrian Somers #if 0
899794c9bbcSBrian Somers   struct hostent *hp;
900794c9bbcSBrian Somers   struct in_addr hostaddr;
9018fb5ef5aSBrian Somers #endif
902794c9bbcSBrian Somers 
903794c9bbcSBrian Somers   if (!*r->cfg.file)
904794c9bbcSBrian Somers     return;
905794c9bbcSBrian Somers 
906794c9bbcSBrian Somers   if (r->cx.fd != -1)
907794c9bbcSBrian Somers     /*
908794c9bbcSBrian Somers      * We assume that our name/key/challenge is the same as last time,
909794c9bbcSBrian Somers      * and just continue to wait for the RADIUS server(s).
910794c9bbcSBrian Somers      */
911794c9bbcSBrian Somers     return;
912794c9bbcSBrian Somers 
9138fb5ef5aSBrian Somers   timer_Stop(&r->cx.timer);
914794c9bbcSBrian Somers 
915ba093e81SBrian Somers   if ((r->cx.rad = rad_acct_open()) == NULL) {
916794c9bbcSBrian Somers     log_Printf(LogERROR, "rad_auth_open: %s\n", strerror(errno));
917794c9bbcSBrian Somers     return;
918794c9bbcSBrian Somers   }
919794c9bbcSBrian Somers 
920794c9bbcSBrian Somers   if (rad_config(r->cx.rad, r->cfg.file) != 0) {
921794c9bbcSBrian Somers     log_Printf(LogERROR, "rad_config: %s\n", rad_strerror(r->cx.rad));
922794c9bbcSBrian Somers     rad_close(r->cx.rad);
923794c9bbcSBrian Somers     return;
924794c9bbcSBrian Somers   }
925794c9bbcSBrian Somers 
926794c9bbcSBrian Somers   if (rad_create_request(r->cx.rad, RAD_ACCOUNTING_REQUEST) != 0) {
927794c9bbcSBrian Somers     log_Printf(LogERROR, "rad_create_request: %s\n", rad_strerror(r->cx.rad));
928794c9bbcSBrian Somers     rad_close(r->cx.rad);
929794c9bbcSBrian Somers     return;
930794c9bbcSBrian Somers   }
931794c9bbcSBrian Somers 
932794c9bbcSBrian Somers   /* Grab some accounting data and initialize structure */
933794c9bbcSBrian Somers   if (acct_type == RAD_START) {
934794c9bbcSBrian Somers     ac->rad_parent = r;
935794c9bbcSBrian Somers     /* Fetch username from datalink */
9364dc4e1eeSBrian Somers     strncpy(ac->user_name, dl->peer.authname, sizeof ac->user_name);
937794c9bbcSBrian Somers     ac->user_name[AUTHLEN-1] = '\0';
938794c9bbcSBrian Somers 
939794c9bbcSBrian Somers     ac->authentic = 2;		/* Assume RADIUS verified auth data */
940794c9bbcSBrian Somers 
941794c9bbcSBrian Somers     /* Generate a session ID */
94212b5aabaSBrian Somers     snprintf(ac->session_id, sizeof ac->session_id, "%s%ld-%s%lu",
94312b5aabaSBrian Somers              dl->bundle->cfg.auth.name, (long)getpid(),
9444dc4e1eeSBrian Somers              dl->peer.authname, (unsigned long)stats->uptime);
945794c9bbcSBrian Somers 
946794c9bbcSBrian Somers     /* And grab our MP socket name */
947794c9bbcSBrian Somers     snprintf(ac->multi_session_id, sizeof ac->multi_session_id, "%s",
948794c9bbcSBrian Somers              dl->bundle->ncp.mp.active ?
949794c9bbcSBrian Somers              dl->bundle->ncp.mp.server.socket.sun_path : "");
950794c9bbcSBrian Somers 
951794c9bbcSBrian Somers     /* Fetch IP, netmask from IPCP */
952794c9bbcSBrian Somers     memcpy(&ac->ip, peer_ip, sizeof(ac->ip));
953794c9bbcSBrian Somers     memcpy(&ac->mask, netmask, sizeof(ac->mask));
954794c9bbcSBrian Somers   };
955794c9bbcSBrian Somers 
956794c9bbcSBrian Somers   if (rad_put_string(r->cx.rad, RAD_USER_NAME, ac->user_name) != 0 ||
957794c9bbcSBrian Somers       rad_put_int(r->cx.rad, RAD_SERVICE_TYPE, RAD_FRAMED) != 0 ||
958794c9bbcSBrian Somers       rad_put_int(r->cx.rad, RAD_FRAMED_PROTOCOL, RAD_PPP) != 0 ||
959794c9bbcSBrian Somers       rad_put_addr(r->cx.rad, RAD_FRAMED_IP_ADDRESS, ac->ip) != 0 ||
960794c9bbcSBrian Somers       rad_put_addr(r->cx.rad, RAD_FRAMED_IP_NETMASK, ac->mask) != 0) {
961794c9bbcSBrian Somers     log_Printf(LogERROR, "rad_put: %s\n", rad_strerror(r->cx.rad));
962794c9bbcSBrian Somers     rad_close(r->cx.rad);
963794c9bbcSBrian Somers     return;
964794c9bbcSBrian Somers   }
965794c9bbcSBrian Somers 
966794c9bbcSBrian Somers   if (gethostname(hostname, sizeof hostname) != 0)
967794c9bbcSBrian Somers     log_Printf(LogERROR, "rad_put: gethostname(): %s\n", strerror(errno));
968794c9bbcSBrian Somers   else {
969aadbb4eaSBrian Somers #if 0
970794c9bbcSBrian Somers     if ((hp = gethostbyname(hostname)) != NULL) {
971794c9bbcSBrian Somers       hostaddr.s_addr = *(u_long *)hp->h_addr;
972794c9bbcSBrian Somers       if (rad_put_addr(r->cx.rad, RAD_NAS_IP_ADDRESS, hostaddr) != 0) {
973794c9bbcSBrian Somers         log_Printf(LogERROR, "rad_put: rad_put_string: %s\n",
974794c9bbcSBrian Somers                    rad_strerror(r->cx.rad));
975794c9bbcSBrian Somers         rad_close(r->cx.rad);
976794c9bbcSBrian Somers         return;
977794c9bbcSBrian Somers       }
978794c9bbcSBrian Somers     }
979aadbb4eaSBrian Somers #endif
980794c9bbcSBrian Somers     if (rad_put_string(r->cx.rad, RAD_NAS_IDENTIFIER, hostname) != 0) {
981794c9bbcSBrian Somers       log_Printf(LogERROR, "rad_put: rad_put_string: %s\n",
982794c9bbcSBrian Somers                  rad_strerror(r->cx.rad));
983794c9bbcSBrian Somers       rad_close(r->cx.rad);
984794c9bbcSBrian Somers       return;
985794c9bbcSBrian Somers     }
986794c9bbcSBrian Somers   }
987794c9bbcSBrian Somers 
988de59e178SBrian Somers   radius_put_physical_details(r->cx.rad, dl->physical);
989794c9bbcSBrian Somers 
990794c9bbcSBrian Somers   if (rad_put_int(r->cx.rad, RAD_ACCT_STATUS_TYPE, acct_type) != 0 ||
991794c9bbcSBrian Somers       rad_put_string(r->cx.rad, RAD_ACCT_SESSION_ID, ac->session_id) != 0 ||
992794c9bbcSBrian Somers       rad_put_string(r->cx.rad, RAD_ACCT_MULTI_SESSION_ID,
993794c9bbcSBrian Somers                      ac->multi_session_id) != 0 ||
994794c9bbcSBrian Somers       rad_put_int(r->cx.rad, RAD_ACCT_DELAY_TIME, 0) != 0) {
995794c9bbcSBrian Somers /* XXX ACCT_DELAY_TIME should be increased each time a packet is waiting */
996794c9bbcSBrian Somers     log_Printf(LogERROR, "rad_put: %s\n", rad_strerror(r->cx.rad));
997794c9bbcSBrian Somers     rad_close(r->cx.rad);
998794c9bbcSBrian Somers     return;
999794c9bbcSBrian Somers   }
1000794c9bbcSBrian Somers 
1001794c9bbcSBrian Somers   if (acct_type == RAD_STOP)
1002794c9bbcSBrian Somers   /* Show some statistics */
1003794c9bbcSBrian Somers     if (rad_put_int(r->cx.rad, RAD_ACCT_INPUT_OCTETS, stats->OctetsIn) != 0 ||
1004794c9bbcSBrian Somers         rad_put_int(r->cx.rad, RAD_ACCT_INPUT_PACKETS, stats->PacketsIn) != 0 ||
1005794c9bbcSBrian Somers         rad_put_int(r->cx.rad, RAD_ACCT_OUTPUT_OCTETS, stats->OctetsOut) != 0 ||
1006794c9bbcSBrian Somers         rad_put_int(r->cx.rad, RAD_ACCT_OUTPUT_PACKETS, stats->PacketsOut)
1007794c9bbcSBrian Somers         != 0 ||
1008794c9bbcSBrian Somers         rad_put_int(r->cx.rad, RAD_ACCT_SESSION_TIME, throughput_uptime(stats))
1009794c9bbcSBrian Somers         != 0) {
1010794c9bbcSBrian Somers       log_Printf(LogERROR, "rad_put: %s\n", rad_strerror(r->cx.rad));
1011794c9bbcSBrian Somers       rad_close(r->cx.rad);
1012794c9bbcSBrian Somers       return;
1013794c9bbcSBrian Somers     }
1014794c9bbcSBrian Somers 
1015c42627ffSBrian Somers   r->cx.auth = NULL;			/* Not valid for accounting requests */
1016794c9bbcSBrian Somers   if ((got = rad_init_send_request(r->cx.rad, &r->cx.fd, &tv)))
1017794c9bbcSBrian Somers     radius_Process(r, got);
1018794c9bbcSBrian Somers   else {
1019794c9bbcSBrian Somers     log_Printf(LogDEBUG, "Using radius_Timeout [%p]\n", radius_Timeout);
1020794c9bbcSBrian Somers     r->cx.timer.load = tv.tv_usec / TICKUNIT + tv.tv_sec * SECTICKS;
1021794c9bbcSBrian Somers     r->cx.timer.func = radius_Timeout;
1022c42627ffSBrian Somers     r->cx.timer.name = "radius acct";
1023794c9bbcSBrian Somers     r->cx.timer.arg = r;
1024794c9bbcSBrian Somers     timer_Start(&r->cx.timer);
1025794c9bbcSBrian Somers   }
1026794c9bbcSBrian Somers }
1027794c9bbcSBrian Somers 
1028794c9bbcSBrian Somers /*
1029f0cdd9c0SBrian Somers  * How do things look at the moment ?
1030f0cdd9c0SBrian Somers  */
1031972a1bcfSBrian Somers void
1032972a1bcfSBrian Somers radius_Show(struct radius *r, struct prompt *p)
1033972a1bcfSBrian Somers {
103474457d3dSBrian Somers   prompt_Printf(p, " Radius config:     %s",
103574457d3dSBrian Somers                 *r->cfg.file ? r->cfg.file : "none");
1036972a1bcfSBrian Somers   if (r->valid) {
1037972a1bcfSBrian Somers     prompt_Printf(p, "\n                IP: %s\n", inet_ntoa(r->ip));
1038972a1bcfSBrian Somers     prompt_Printf(p, "           Netmask: %s\n", inet_ntoa(r->mask));
1039972a1bcfSBrian Somers     prompt_Printf(p, "               MTU: %lu\n", r->mtu);
1040972a1bcfSBrian Somers     prompt_Printf(p, "                VJ: %sabled\n", r->vj ? "en" : "dis");
1041ff8e577bSBrian Somers     prompt_Printf(p, "           Message: %s\n", r->repstr ? r->repstr : "");
10428fb5ef5aSBrian Somers     prompt_Printf(p, "   MPPE Enc Policy: %s\n",
10438fb5ef5aSBrian Somers                   radius_policyname(r->mppe.policy));
10448fb5ef5aSBrian Somers     prompt_Printf(p, "    MPPE Enc Types: %s\n",
10458fb5ef5aSBrian Somers                   radius_typesname(r->mppe.types));
10468fb5ef5aSBrian Somers     prompt_Printf(p, "     MPPE Recv Key: %seceived\n",
10478fb5ef5aSBrian Somers                   r->mppe.recvkey ? "R" : "Not r");
10488fb5ef5aSBrian Somers     prompt_Printf(p, "     MPPE Send Key: %seceived\n",
10498fb5ef5aSBrian Somers                   r->mppe.sendkey ? "R" : "Not r");
1050a16061b2SBrian Somers     prompt_Printf(p, " MS-CHAP2-Response: %s\n",
1051a16061b2SBrian Somers                   r->msrepstr ? r->msrepstr : "");
1052ff8e577bSBrian Somers     prompt_Printf(p, "     Error Message: %s\n", r->errstr ? r->errstr : "");
1053972a1bcfSBrian Somers     if (r->routes)
1054972a1bcfSBrian Somers       route_ShowSticky(p, r->routes, "            Routes", 16);
1055972a1bcfSBrian Somers   } else
1056972a1bcfSBrian Somers     prompt_Printf(p, " (not authenticated)\n");
1057972a1bcfSBrian Somers }
1058