]> git.ipfire.org Git - thirdparty/freeradius-server.git/commitdiff
Substitute 'signature' for 'Request Authenticator' or 'Response Authenticator' where...
authorArran Cudbard-Bell <a.cudbardb@freeradius.org>
Thu, 18 Oct 2012 10:39:42 +0000 (11:39 +0100)
committerArran Cudbard-Bell <a.cudbardb@freeradius.org>
Thu, 18 Oct 2012 10:47:48 +0000 (11:47 +0100)
src/lib/radius.c
src/main/command.c

index 04aaadbe900d7741b9dd33160dda920ccc0c1d09..e0800932665e1de78f12fe865ca608f0e2c992d6 100644 (file)
@@ -1831,7 +1831,7 @@ int rad_sign(RADIUS_PACKET *packet, const RADIUS_PACKET *original,
 
                /*
                 *      Set the authentication vector to zero,
-                *      calculate the signature, and put it
+                *      calculate the HMAC, and put it
                 *      into the Message-Authenticator
                 *      attribute.
                 */
@@ -1983,7 +1983,7 @@ int rad_digest_cmp(const uint8_t *a, const uint8_t *b, size_t length)
 
 /**
  * @brief Validates the requesting client NAS.  Calculates the
- *     signature based on the clients private key.
+ *     Request Authenticator based on the clients private key.
  */
 static int calc_acctdigest(RADIUS_PACKET *packet, const char *secret)
 {
@@ -2016,7 +2016,7 @@ static int calc_acctdigest(RADIUS_PACKET *packet, const char *secret)
 
 /**
  * @brief Validates the requesting client NAS.  Calculates the
- *     signature based on the clients private key.
+ *     Response Authenticator based on the clients private key.
  */
 static int calc_replydigest(RADIUS_PACKET *packet, RADIUS_PACKET *original,
                            const char *secret)
@@ -2571,7 +2571,8 @@ RADIUS_PACKET *rad_recv(int fd, int flags)
 
 
 /**
- * @brief Verify the signature of a packet.
+ * @brief Verify the Request/Response Authenticator
+ *     (and Message-Authenticator if present) of a packet.
  */
 int rad_verify(RADIUS_PACKET *packet, RADIUS_PACKET *original,
               const char *secret)
@@ -2665,13 +2666,13 @@ int rad_verify(RADIUS_PACKET *packet, RADIUS_PACKET *original,
        } /* loop over the packet, sanity checking the attributes */
 
        /*
-        *      It looks like a RADIUS packet, but we can't validate
-        *      the signature.
+        *      It looks like a RADIUS packet, but we don't know what it is
+        *      so can't validate the authenticators.
         */
        if ((packet->code == 0) || (packet->code >= FR_MAX_PACKET_CODE)) {
                char buffer[32];
                fr_strerror_printf("Received Unknown packet code %d "
-                          "from client %s port %d: Cannot validate signature.",
+                          "from client %s port %d: Cannot validate Request/Response Authenticator.",
                           packet->code,
                           inet_ntop(packet->src_ipaddr.af,
                                     &packet->src_ipaddr.ipaddr,
@@ -2681,7 +2682,7 @@ int rad_verify(RADIUS_PACKET *packet, RADIUS_PACKET *original,
        }
 
        /*
-        *      Calculate and/or verify digest.
+        *      Calculate and/or verify Request or Response Authenticator.
         */
        switch(packet->code) {
                int rcode;
@@ -2700,7 +2701,7 @@ int rad_verify(RADIUS_PACKET *packet, RADIUS_PACKET *original,
                case PW_ACCOUNTING_REQUEST:
                        if (calc_acctdigest(packet, secret) > 1) {
                                fr_strerror_printf("Received %s packet "
-                                          "from client %s with invalid signature!  (Shared secret is incorrect.)",
+                                          "from client %s with invalid Request Authenticator!  (Shared secret is incorrect.)",
                                           fr_packet_codes[packet->code],
                                           inet_ntop(packet->src_ipaddr.af,
                                                     &packet->src_ipaddr.ipaddr,
@@ -2721,7 +2722,7 @@ int rad_verify(RADIUS_PACKET *packet, RADIUS_PACKET *original,
                        rcode = calc_replydigest(packet, original, secret);
                        if (rcode > 1) {
                                fr_strerror_printf("Received %s packet "
-                                          "from home server %s port %d with invalid signature!  (Shared secret is incorrect.)",
+                                          "from home server %s port %d with invalid Response Authenticator!  (Shared secret is incorrect.)",
                                           fr_packet_codes[packet->code],
                                           inet_ntop(packet->src_ipaddr.af,
                                                     &packet->src_ipaddr.ipaddr,
@@ -2733,7 +2734,7 @@ int rad_verify(RADIUS_PACKET *packet, RADIUS_PACKET *original,
 
                default:
                        fr_strerror_printf("Received Unknown packet code %d "
-                                  "from client %s port %d: Cannot validate signature",
+                                  "from client %s port %d: Cannot validate Request/Response Authenticator",
                                   packet->code,
                                   inet_ntop(packet->src_ipaddr.af,
                                             &packet->src_ipaddr.ipaddr,
@@ -4379,7 +4380,7 @@ int rad_chap_encode(RADIUS_PACKET *packet, uint8_t *output, int id,
 
        /*
         *      Use Chap-Challenge pair if present,
-        *      Request-Authenticator otherwise.
+        *      Request Authenticator otherwise.
         */
        challenge = pairfind(packet->vps, PW_CHAP_CHALLENGE, 0);
        if (challenge) {
index 89d89119cff7589f7ee5d0312dfb921132ff9ff5..f23c7f90ce34b348b81f13c3f57c5b75f9149ab3 100644 (file)
@@ -1596,7 +1596,7 @@ static int command_print_stats(rad_listen_t *listener, fr_stats_t *stats,
        cprintf(listener, "\tdup\t\t" PU "\n", stats->total_dup_requests);
        cprintf(listener, "\tinvalid\t\t" PU "\n", stats->total_invalid_requests);
        cprintf(listener, "\tmalformed\t" PU "\n", stats->total_malformed_requests);
-       cprintf(listener, "\tbad_signature\t" PU "\n", stats->total_bad_authenticators);
+       cprintf(listener, "\tbad_authenticator\t" PU "\n", stats->total_bad_authenticators);
        cprintf(listener, "\tdropped\t\t" PU "\n", stats->total_packets_dropped);
        cprintf(listener, "\tunknown_types\t" PU "\n", stats->total_unknown_types);