perl -p -i -e 'next if !/DEBUG/;s/\"&/\"/' $(git grep '"&' src | grep DEBUG | sed 's/:.*//' | sort -u)
perl -p -i -e 'next if !/DEBUG/;s/&control/control/g' $(git grep DEBUG | grep '&' | sed 's/:.*//' | sort -u)
along with request, reply, session, and a few manual edits
goto error;
default:
- REDEBUG("Can't determine expected &reply.Packet-Type for Packet-Type %i",
+ REDEBUG("Can't determine expected reply.Packet-Type for Packet-Type %i",
request->packet->code);
goto error;
}
break;
default:
- REDEBUG("Can't determine expected Packet-Type for &reply.Packet-Type %i",
+ REDEBUG("Can't determine expected Packet-Type for reply.Packet-Type %i",
request->filter_code);
goto error;
}
goto error;
default:
- REDEBUG("Can't determine expected &reply.Packet-Type for Packet-Type %i",
+ REDEBUG("Can't determine expected reply.Packet-Type for Packet-Type %i",
request->packet->code);
goto error;
}
break;
default:
- REDEBUG("Can't determine expected Packet-Type for &reply.Packet-Type %i",
+ REDEBUG("Can't determine expected Packet-Type for reply.Packet-Type %i",
request->filter_code);
goto error;
}
fr_pair_value_memdup(vp, value, len, false);
RINDENT();
- RDEBUG2("&reply.%pP", vp);
+ RDEBUG2("reply.%pP", vp);
REXDENT();
}
fr_pair_value_memdup_buffer_shallow(vp, session_id, false);
RINDENT();
- RDEBUG2("&reply.%pP", vp);
+ RDEBUG2("reply.%pP", vp);
REXDENT();
}
eap_aka_sim_session->id_req = AKA_SIM_PERMANENT_ID_REQ;
found:
set_by_user = true;
- RDEBUG2("Previous section added &reply.%pP, will request additional identity", vp);
+ RDEBUG2("Previous section added reply.%pP, will request additional identity", vp);
fr_pair_delete(&request->reply_pairs, vp);
}
else if (vp->da == attr_eap_aka_sim_fullauth_id_req) {
fr_aka_sim_hint_byte(AKA_SIM_ID_TYPE_PERMANENT, expected_method),
fr_aka_sim_hint_byte(our_type, our_method));
RINDENT();
- RDEBUG2("&session-state.%pP", vp);
+ RDEBUG2("session-state.%pP", vp);
REXDENT();
} else {
/*
RDEBUG2("Stripping 'hint' byte from %s", attr_eap_aka_sim_permanent_identity->name);
RINDENT();
- RDEBUG2("&session-state.%pP", vp);
+ RDEBUG2("session-state.%pP", vp);
REXDENT();
}
*/
our_mac = fr_pair_find_by_da(&request->control_pairs, NULL, attr_eap_aka_sim_mac);
if (!our_mac) {
- REDEBUG("Missing &control.%s", attr_eap_aka_sim_mac->name);
+ REDEBUG("Missing control.%s", attr_eap_aka_sim_mac->name);
return -1;
}
if (!eap_aka_sim_session->allow_encrypted) {
fr_pair_list_foreach(&request->reply_pairs, vp) {
if (fr_dict_attr_common_parent(attr_eap_aka_sim_encr_data, vp->da, true)) {
- RWDEBUG("Silently discarding &reply.%pP: Encrypted attributes not "
+ RWDEBUG("Silently discarding reply.%pP: Encrypted attributes not "
"allowed in this round", vp);
fr_pair_delete(&request->reply_pairs, vp);
}
*/
vp = fr_pair_find_by_da(&request->control_pairs, NULL, attr_sim_sqn);
if (!vp) {
- REDEBUG("No &control.SQN value provided after resynchronisation, cannot continue");
+ REDEBUG("No control.SQN value provided after resynchronisation, cannot continue");
goto failure;
}
* the submodule.
*/
eap_type = fr_pair_find_by_da(&request->control_pairs, NULL, attr_eap_type);
- if (eap_type) RWDEBUG("Ignoring &control.EAP-Type, this must be set *before* the EAP module is called");
+ if (eap_type) RWDEBUG("Ignoring control.EAP-Type, this must be set *before* the EAP module is called");
method = fr_pair_find_by_da(&request->request_pairs, NULL, attr_eap_aka_sim_method_hint);
opc_vp = fr_pair_find_by_da(list, NULL, attr_sim_opc);
if (opc_vp) {
if (opc_vp->vp_length != MILENAGE_OPC_SIZE) {
- REDEBUG("&control.%s has incorrect length, expected %d bytes got %zu bytes",
+ REDEBUG("control.%s has incorrect length, expected %d bytes got %zu bytes",
attr_sim_opc->name, MILENAGE_OPC_SIZE, opc_vp->vp_length);
return -1;
}
op_vp = fr_pair_find_by_da(list, NULL, attr_sim_op);
if (op_vp) {
if (op_vp->vp_length != MILENAGE_OP_SIZE) {
- REDEBUG("&control.%s has incorrect length, expected %d bytes got %zu bytes",
+ REDEBUG("control.%s has incorrect length, expected %d bytes got %zu bytes",
attr_sim_op->name, MILENAGE_OP_SIZE, op_vp->vp_length);
return -1;
}
*/
ki_vp = fr_pair_find_by_da(vps, NULL, attr_sim_ki);
if (!ki_vp) {
- RDEBUG3("No &control.%sfound, not generating triplets locally", attr_sim_ki->name);
+ RDEBUG3("No control.%sfound, not generating triplets locally", attr_sim_ki->name);
return 1;
} else if (ki_vp->vp_length != MILENAGE_KI_SIZE) {
- REDEBUG("&control.%s has incorrect length, expected 16 bytes got %zu bytes",
+ REDEBUG("control.%s has incorrect length, expected 16 bytes got %zu bytes",
attr_sim_ki->name, ki_vp->vp_length);
return -1;
}
if (version == FR_SIM_ALGO_VERSION_VALUE_COMP128_4) {
if (vector_opc_from_op(request, &opc_p, opc_buff, vps, ki_vp->vp_octets) < 0) return -1;
if (!opc_p) {
- RPEDEBUG2("No &control.%s or &control.%s found, "
+ RPEDEBUG2("No control.%s or control.%s found, "
"can't run Milenage (COMP128-4)", attr_sim_op->name, attr_sim_opc->name);
return -1;
}
(i < idx) && (kc = fr_dcursor_next(&cursor));
i++);
if (!kc) {
- RDEBUG3("No &control.%s[%i] attribute found, not using GSM triplets",
+ RDEBUG3("No control.%s[%i] attribute found, not using GSM triplets",
attr_eap_aka_sim_kc->name, idx);
return 1;
}
if (kc->vp_length != AKA_SIM_VECTOR_GSM_KC_SIZE) {
- REDEBUG("&control.%s[%i] is not " STRINGIFY(AKA_SIM_VECTOR_GSM_KC_SIZE) " bytes, got %zu bytes",
+ REDEBUG("control.%s[%i] is not " STRINGIFY(AKA_SIM_VECTOR_GSM_KC_SIZE) " bytes, got %zu bytes",
attr_eap_aka_sim_kc->name, idx, kc->vp_length);
return -1;
}
(i < idx) && (rand = fr_dcursor_next(&cursor));
i++);
if (!rand) {
- RDEBUG3("No &control.%s[%i] attribute found, not using GSM triplets",
+ RDEBUG3("No control.%s[%i] attribute found, not using GSM triplets",
attr_eap_aka_sim_rand->name, idx);
return 1;
}
if (rand->vp_length != AKA_SIM_VECTOR_GSM_RAND_SIZE) {
- REDEBUG("&control.RAND[%i] is not " STRINGIFY(SIM_RAND_SIZE) " bytes, got %zu bytes",
+ REDEBUG("control.RAND[%i] is not " STRINGIFY(SIM_RAND_SIZE) " bytes, got %zu bytes",
idx, rand->vp_length);
return -1;
}
(i < idx) && (sres = fr_dcursor_next(&cursor));
i++);
if (!sres) {
- RDEBUG3("No &control.%s[%i] attribute found, not using GSM triplets",
+ RDEBUG3("No control.%s[%i] attribute found, not using GSM triplets",
attr_eap_aka_sim_sres->name, idx);
return 1;
}
if (sres->vp_length != AKA_SIM_VECTOR_GSM_SRES_SIZE) {
- REDEBUG("&control.%s[%i] is not " STRINGIFY(AKA_SIM_VECTOR_GSM_SRES_SIZE) " bytes, got %zu bytes",
+ REDEBUG("control.%s[%i] is not " STRINGIFY(AKA_SIM_VECTOR_GSM_SRES_SIZE) " bytes, got %zu bytes",
attr_eap_aka_sim_sres->name, idx, sres->vp_length);
return -1;
}
(i < idx) && (ck = fr_dcursor_next(&cursor));
i++);
if (!ck) {
- RDEBUG3("No &control.%s[%i] attribute found, not using quintuplet derivation",
+ RDEBUG3("No control.%s[%i] attribute found, not using quintuplet derivation",
attr_eap_aka_sim_ck->name, idx);
return 1;
}
(i < idx) && (ik = fr_dcursor_next(&cursor));
i++);
if (!ik) {
- RDEBUG3("No &control.%s[%i] attribute found, not using quintuplet derivation",
+ RDEBUG3("No control.%s[%i] attribute found, not using quintuplet derivation",
attr_eap_aka_sim_ik->name, idx);
return 1;
}
(i < idx) && (rand = fr_dcursor_next(&cursor));
i++);
if (!rand) {
- RDEBUG3("No &control.%s[%i] attribute found, not using quintuplet derivation",
+ RDEBUG3("No control.%s[%i] attribute found, not using quintuplet derivation",
attr_eap_aka_sim_rand->name, idx);
return 1;
}
if (rand->vp_length != AKA_SIM_VECTOR_UMTS_RAND_SIZE) {
- REDEBUG("&control.%s[%i] incorrect length. Expected "
+ REDEBUG("control.%s[%i] incorrect length. Expected "
STRINGIFY(AKA_SIM_VECTOR_UMTS_RAND_SIZE) " bytes, "
"got %zu bytes", attr_eap_aka_sim_rand->name, idx, rand->vp_length);
return -1;
(i < idx) && (xres = fr_dcursor_next(&cursor));
i++);
if (!xres) {
- RDEBUG3("No &control.%s[%i] attribute found, not using quintuplet derivation",
+ RDEBUG3("No control.%s[%i] attribute found, not using quintuplet derivation",
attr_eap_aka_sim_xres->name, idx);
return 1;
}
*/
ki_vp = fr_pair_find_by_da(vps, NULL, attr_sim_ki);
if (!ki_vp) {
- RDEBUG3("No &control.%s found, not generating quintuplets locally", attr_sim_ki->name);
+ RDEBUG3("No control.%s found, not generating quintuplets locally", attr_sim_ki->name);
return 1;
} else if (ki_vp->vp_length != ki_size) {
- REDEBUG("&control.%s has incorrect length, expected %zu bytes got %zu bytes",
+ REDEBUG("control.%s has incorrect length, expected %zu bytes got %zu bytes",
attr_sim_ki->name, ki_size, ki_vp->vp_length);
return -1;
}
amf_vp = fr_pair_find_by_da(vps, NULL, attr_sim_amf);
if (amf_vp) {
if (amf_vp->vp_length != amf_size) {
- REDEBUG("&control.%s has incorrect length, expected %zu bytes got %zu bytes",
+ REDEBUG("control.%s has incorrect length, expected %zu bytes got %zu bytes",
attr_sim_amf->name, amf_size, amf_vp->vp_length);
return -1;
}
*/
autn_vp = fr_pair_find_by_da(vps, NULL, attr_eap_aka_sim_autn);
if (!autn_vp) {
- RDEBUG3("No &control.%s attribute found, not using UMTS quintuplets", attr_eap_aka_sim_autn->name);
+ RDEBUG3("No control.%s attribute found, not using UMTS quintuplets", attr_eap_aka_sim_autn->name);
return 1;
}
if (autn_vp->vp_length > AKA_SIM_VECTOR_UMTS_AUTN_SIZE) {
- REDEBUG("&control.%s incorrect length. Expected "
+ REDEBUG("control.%s incorrect length. Expected "
STRINGIFY(AKA_SIM_VECTOR_UMTS_AUTN_SIZE) " bytes, got %zu bytes",
attr_eap_aka_sim_autn->name, autn_vp->vp_length);
return -1;
*/
ck_vp = fr_pair_find_by_da(vps, NULL, attr_eap_aka_sim_ck);
if (!ck_vp) {
- RDEBUG3("No &control.%s attribute found, not using UMTS quintuplets", attr_eap_aka_sim_ck->name);
+ RDEBUG3("No control.%s attribute found, not using UMTS quintuplets", attr_eap_aka_sim_ck->name);
return 1;
}
if (ck_vp->vp_length > AKA_SIM_VECTOR_UMTS_CK_SIZE) {
- REDEBUG("&control.%s incorrect length. Expected "
+ REDEBUG("control.%s incorrect length. Expected "
STRINGIFY(EAP_AKA_XRES_MAX_SIZE) " bytes, got %zu bytes",
attr_eap_aka_sim_ck->name, ck_vp->vp_length);
return -1;
*/
ik_vp = fr_pair_find_by_da(vps, NULL, attr_eap_aka_sim_ik);
if (!ik_vp) {
- RDEBUG3("No &control.%s attribute found, not using UMTS quintuplets", attr_eap_aka_sim_ik->name);
+ RDEBUG3("No control.%s attribute found, not using UMTS quintuplets", attr_eap_aka_sim_ik->name);
return 1;
}
if (ik_vp->vp_length > AKA_SIM_VECTOR_UMTS_IK_SIZE) {
- REDEBUG("&control.%s incorrect length. Expected "
+ REDEBUG("control.%s incorrect length. Expected "
STRINGIFY(AKA_SIM_VECTOR_UMTS_IK_SIZE) " bytes, got %zu bytes",
attr_eap_aka_sim_ik->name, ik_vp->vp_length);
return -1;
*/
rand_vp = fr_pair_find_by_da(vps, NULL, attr_eap_aka_sim_rand);
if (!rand_vp) {
- RDEBUG3("No &control.%s attribute found, not using quintuplet derivation", attr_eap_aka_sim_rand->name);
+ RDEBUG3("No control.%s attribute found, not using quintuplet derivation", attr_eap_aka_sim_rand->name);
return 1;
}
if (rand_vp->vp_length != AKA_SIM_VECTOR_UMTS_RAND_SIZE) {
- REDEBUG("&control.%s incorrect length. Expected " STRINGIFY(AKA_SIM_VECTOR_UMTS_RAND_SIZE) " bytes, "
+ REDEBUG("control.%s incorrect length. Expected " STRINGIFY(AKA_SIM_VECTOR_UMTS_RAND_SIZE) " bytes, "
"got %zu bytes", attr_eap_aka_sim_rand->name, rand_vp->vp_length);
return -1;
}
*/
xres_vp = fr_pair_find_by_da(vps, NULL, attr_eap_aka_sim_xres);
if (!xres_vp) {
- RDEBUG3("No &control.%s attribute found, not using UMTS quintuplets", attr_eap_aka_sim_xres->name);
+ RDEBUG3("No control.%s attribute found, not using UMTS quintuplets", attr_eap_aka_sim_xres->name);
return 1;
}
if (xres_vp->vp_length > AKA_SIM_VECTOR_UMTS_XRES_MAX_SIZE) {
- REDEBUG("&control.%s incorrect length. Expected < "
+ REDEBUG("control.%s incorrect length. Expected < "
STRINGIFY(EAP_AKA_XRES_MAX_SIZE) " bytes, got %zu bytes",
attr_eap_aka_sim_xres->name, xres_vp->vp_length);
return -1;
*/
ak_vp = fr_pair_find_by_da(vps, NULL, attr_eap_aka_sim_ak);
if (ak_vp && (ak_vp->vp_length != MILENAGE_AK_SIZE)) {
- REDEBUG("&control.%s incorrect length. Expected "
+ REDEBUG("control.%s incorrect length. Expected "
STRINGIFY(MILENAGE_AK_SIZE) " bytes, got %zu bytes",
attr_eap_aka_sim_ak->name, ak_vp->vp_length);
return -1;
*/
sqn_vp = fr_pair_find_by_da(vps, NULL, attr_sim_sqn);
if (sqn_vp && (sqn_vp->vp_length != MILENAGE_SQN_SIZE)) {
- REDEBUG("&control.%s incorrect length. Expected "
+ REDEBUG("control.%s incorrect length. Expected "
STRINGIFY(MILENAGE_AK_SIZE) " bytes, got %zu bytes",
attr_sim_sqn->name, sqn_vp->vp_length);
return -1;
*/
counter_vp = fr_pair_find_by_da_nested(vps, NULL, attr_eap_aka_sim_counter);
if (!counter_vp) {
- RDEBUG2("No &session-state.%s attribute found, can't calculate re-auth keys",
+ RDEBUG2("No session-state.%s attribute found, can't calculate re-auth keys",
attr_eap_aka_sim_counter->name);
return 1;
}
mk_vp = fr_pair_find_by_da(vps, NULL, attr_session_data);
if (!mk_vp) mk_vp = fr_pair_find_by_da(vps, NULL, attr_eap_aka_sim_mk);
if (!mk_vp) {
- RDEBUG2("Neither &session-state.%s or &session-state.%s attributes found, "
+ RDEBUG2("Neither session-state.%s or session-state.%s attributes found, "
"can't calculate re-auth keys", attr_session_data->name, attr_eap_aka_sim_mk->name);
return 1;
}
if (mk_vp->vp_length != AKA_SIM_MK_SIZE) {
- REDEBUG("&session-state.%s incorrect length. Expected %u bytes, got %zu bytes",
+ REDEBUG("session-state.%s incorrect length. Expected %u bytes, got %zu bytes",
attr_eap_aka_sim_mk->name, AKA_SIM_MK_SIZE, mk_vp->vp_length);
return -1;
}
*/
counter_vp = fr_pair_find_by_da_nested(vps, NULL, attr_eap_aka_sim_counter);
if (!counter_vp) {
- RDEBUG2("No &session-state.%s attribute found, can't calculate re-auth keys",
+ RDEBUG2("No session-state.%s attribute found, can't calculate re-auth keys",
attr_eap_aka_sim_counter->name);
return 1;
}
mk_vp = fr_pair_find_by_da(vps, NULL, attr_session_data);
if (!mk_vp) mk_vp = fr_pair_find_by_da(vps, NULL, attr_eap_aka_sim_mk);
if (!mk_vp) {
- RDEBUG2("Neither &session-state.%s or &session-sate:%s attributes found, "
+ RDEBUG2("Neither session-state.%s or session-sate:%s attributes found, "
"can't calculate re-auth keys", attr_session_data->name, attr_eap_aka_sim_mk->name);
return 1;
}
if (mk_vp->vp_length != AKA_PRIME_MK_REAUTH_SIZE) {
- REDEBUG("&session-state.%s incorrect length. Expected "
+ REDEBUG("session-state.%s incorrect length. Expected "
"%u bytes, got %zu bytes",
attr_eap_aka_sim_mk->name, AKA_PRIME_MK_REAUTH_SIZE, mk_vp->vp_length);
return -1;
}
if (auts_vp->vp_length != MILENAGE_AUTS_SIZE) {
- REDEBUG("&control.%s incorrect length. Expected "
+ REDEBUG("control.%s incorrect length. Expected "
STRINGIFY(MILENAGE_AUTS_SIZE) " bytes, got %zu bytes",
attr_eap_aka_sim_auts->name, auts_vp->vp_length);
return -1;
eap_type = fr_pair_find_by_da(&request->request_pairs, NULL, attr_eap_type);
if (!eap_type) {
- REDEBUG("ID does not contain method hint, and no &request.EAP-Type found. "
+ REDEBUG("ID does not contain method hint, and no request.EAP-Type found. "
"Don't know what tag to prepend to encrypted identity");
goto error;
}
} else if (eap_type->vp_uint32 == enum_eap_type_aka_prime->vb_uint32) {
tag = !fastauth ? ID_TAG_AKA_PRIME_PSEUDONYM_B64 : ID_TAG_AKA_PRIME_FASTAUTH_B64;
} else {
- REDEBUG("&request.EAP-Type does not match a SIM based EAP-Type (SIM, AKA, AKA-Prime)");
+ REDEBUG("request.EAP-Type does not match a SIM based EAP-Type (SIM, AKA, AKA-Prime)");
}
id_p = id;
cs = cf_section_alloc(ctx, NULL, "client", fr_sbuff_current(tmp));
- RDEBUG2("Converting &control.FreeRADIUS-Client-* to client {...} section");
+ RDEBUG2("Converting control.FreeRADIUS-Client-* to client {...} section");
RINDENT();
fr_pair_list_foreach(&request->control_pairs, vp) {
case 0:
fr_value_box_copy(vp, &vp->data, enumv->value);
vp->data.enumv = vp->da; /* So we get the correct string alias */
- RDEBUG2("Setting &control.%pP", vp);
+ RDEBUG2("Setting control.%pP", vp);
return true;
case 1:
- RDEBUG2("&control.%s already set. Not setting to %s", vp->da->name, enumv->name);
+ RDEBUG2("control.%s already set. Not setting to %s", vp->da->name, enumv->name);
return false;
default:
for (map = map_list_head(list);
map != NULL;
map = map_list_next(list, map)) {
- RDEBUG2("&%s %s %s", map->lhs->name, fr_tokens[map->op],
+ RDEBUG2("%s %s %s", map->lhs->name, fr_tokens[map->op],
map->rhs ? map->rhs->name : "{ ... }");
if (radius_legacy_map_apply(request, map, el) < 0) {
* header to indicate hash type.
*/
if (RDEBUG_ENABLED3) {
- RDEBUG3("No {...} in &control.%pP, re-writing to %s", known_good, def->name);
+ RDEBUG3("No {...} in control.%pP, re-writing to %s", known_good, def->name);
} else {
- RDEBUG2("No {...} in &control.%s, re-writing to %s", known_good->da->name, def->name);
+ RDEBUG2("No {...} in control.%s, re-writing to %s", known_good->da->name, def->name);
}
bad_header:
*/
if (info->min_hash_len && (out->vp_length < MIN_LEN(info))) {
if (RDEBUG_ENABLED3) {
- RWDEBUG3("&control.%pP too short, expected %zu bytes, got %zu bytes",
+ RWDEBUG3("control.%pP too short, expected %zu bytes, got %zu bytes",
out, MIN_LEN(info), out->vp_length);
} else {
- RWDEBUG2("&control.%s too short, expected %zu bytes, got %zu bytes",
+ RWDEBUG2("control.%s too short, expected %zu bytes, got %zu bytes",
out->da->name, MIN_LEN(info), out->vp_length);
}
invalid:
*/
if (info->max_hash_len && (out->vp_length > info->max_hash_len)) {
if (RDEBUG_ENABLED3) {
- RWDEBUG3("&control.%pP too long, expected %zu bytes, got %zu bytes",
+ RWDEBUG3("control.%pP too long, expected %zu bytes, got %zu bytes",
out, info->max_hash_len, out->vp_length);
} else {
- RWDEBUG2("&control.%s too long, expected %zu bytes, got %zu bytes",
+ RWDEBUG2("control.%s too long, expected %zu bytes, got %zu bytes",
out->da->name, info->max_hash_len, out->vp_length);
}
goto invalid;
if ((info->type == PASSWORD_HASH) && (out->vp_length != info->min_hash_len)) {
if (RDEBUG_ENABLED3) {
- RWDEBUG3("&control.%pP incorrect length, expected %zu bytes, got %zu bytes",
+ RWDEBUG3("control.%pP incorrect length, expected %zu bytes, got %zu bytes",
out, info->min_hash_len, out->vp_length);
} else {
- RWDEBUG2("&control.%s incorrect length, expected %zu bytes, got %zu bytes",
+ RWDEBUG2("control.%s incorrect length, expected %zu bytes, got %zu bytes",
out->da->name, info->min_hash_len, out->vp_length);
}
goto invalid;
if (!new) break; /* Process next input attribute */
if (RDEBUG_ENABLED3) {
- RDEBUG3("Replacing &control.%pP with &control.%pP",
+ RDEBUG3("Replacing control.%pP with control.%pP",
known_good, new);
} else {
- RDEBUG2("Replacing &control.%s with &control.%s",
+ RDEBUG2("Replacing control.%s with control.%s",
known_good->da->name, new->da->name);
}
fr_dcursor_free_item(&cursor);
break;
}
- RWDEBUG("Ignoring invalid packet-type &reply.%pP", vp);
+ RWDEBUG("Ignoring invalid packet-type reply.%pP", vp);
goto update_packet_type;
default:
*/
vp = fr_pair_find_by_da(&request->request_pairs, NULL, state->da);
if (!vp) {
- RDEBUG3("No &request.%s attribute, can't restore &session-state", state->da->name);
+ RDEBUG3("No request.%s attribute, can't restore session-state", state->da->name);
if (request->seq_start == 0) request->seq_start = request->number; /* Need check for fake requests */
return 1;
}
entry = state_entry_find_and_unlink(state, &vp->data);
if (!entry) {
PTHREAD_MUTEX_UNLOCK(&state->mutex);
- RDEBUG2("No state entry matching &request.%pP found", vp);
+ RDEBUG2("No state entry matching request.%pP found", vp);
return 2;
}
PTHREAD_MUTEX_UNLOCK(&state->mutex);
entry->thawed = request;
if (!fr_pair_list_empty(&request->session_state_pairs)) {
- RDEBUG2("Restored &session-state");
+ RDEBUG2("Restored session-state");
log_request_pair_list(L_DBG_LVL_2, request, NULL, &request->session_state_pairs, "&session-state.");
}
if (fr_pair_list_empty(&request->session_state_pairs) && fr_dlist_empty(&data)) return 0;
if (!fr_pair_list_empty(&request->session_state_pairs)) {
- RDEBUG2("Saving &session-state");
+ RDEBUG2("Saving session-state");
log_request_pair_list(L_DBG_LVL_2, request, NULL, &request->session_state_pairs, "&session-state.");
#ifdef WITH_VERIFY_PTR
if (RDEBUG_ENABLED2) {
SESSION_ID(sess_id, sess);
- RDEBUG2("Session ID %pV - Adding &session-state[*] to data", &sess_id);
+ RDEBUG2("Session ID %pV - Adding session-state[*] to data", &sess_id);
RINDENT();
log_request_pair_list(L_DBG_LVL_2, request, NULL, &request->session_state_pairs, NULL);
REXDENT();
if (RDEBUG_ENABLED2) {
SESSION_ID(sess_id, sess);
- RDEBUG2("Session-ID %pV - Restoring &session-state[*]", &sess_id);
+ RDEBUG2("Session-ID %pV - Restoring session-state[*]", &sess_id);
RINDENT();
log_request_pair_list(L_DBG_LVL_2, request, NULL, &tmp, "&session-state.");
REXDENT();
vp = fr_pair_find_by_da(&request->control_pairs, NULL, attr_allow_session_resumption);
if (vp && (vp->vp_uint32 == 0)) {
- RDEBUG2("&control.Allow-Session-Resumption == no, denying session resumption");
+ RDEBUG2("control.Allow-Session-Resumption == no, denying session resumption");
disable:
SSL_CTX_remove_session(tls_session->ctx, tls_session->session);
tls_session->allow_session_resumption = false;
MEM(pair_update_request(&vp, attr_tls_client_error_code) >= 0);
vp->vp_uint8 = ret & 0xff;
- ROPTIONAL(RDEBUG2, DEBUG2, "&TLS-Client-Error-Code := %pV", &vp->data);
+ ROPTIONAL(RDEBUG2, DEBUG2, "TLS-Client-Error-Code := %pV", &vp->data);
/*
* We're sending the client an alert.
*/
RINDENT();
MEM(pair_update_session_state(&vp, attr_tls_session_cipher_suite) >= 0);
fr_pair_value_strdup(vp, SSL_CIPHER_get_name(cipher), false);
- RDEBUG2("&session-state.%pP", vp);
+ RDEBUG2("session-state.%pP", vp);
if (((size_t)tls_session->info.version >= NUM_ELEMENTS(tls_version_str)) ||
!tls_version_str[tls_session->info.version]) {
MEM(pair_update_session_state(&vp, attr_tls_session_version) >= 0);
fr_pair_value_strdup(vp, version, false);
- RDEBUG2("&session-state.%pP", vp);
+ RDEBUG2("session-state.%pP", vp);
REXDENT();
/*
switch (vp->vp_type) {
case FR_TYPE_STRUCTURAL:
if (vpt) {
- RIDEBUG2("&%s.%s = {",
+ RIDEBUG2("%s.%s = {",
tmpl_list_name(tmpl_list(vpt), "<INVALID>"),
vp->da->name);
} else {
default:
if (vpt) {
- RIDEBUG2("&%s.%s = %pV",
+ RIDEBUG2("%s.%s = %pV",
tmpl_list_name(tmpl_list(vpt), "<INVALID>"),
vp->da->name,
&vp->data);
char const *name = parent->name;
while ((vp = fr_pair_list_next(&head, vp))) {
- RDEBUG2("decode %s: &%pP", name, vp);
+ RDEBUG2("decode %s: %pP", name, vp);
}
}
case FR_CACHE_ALLOW_MERGE:
case FR_CACHE_ALLOW_INSERT:
case FR_CACHE_MERGE_NEW:
- RDEBUG2("Removing &control.%s", vp->da->name);
+ RDEBUG2("Removing control.%s", vp->da->name);
vp = fr_dcursor_remove(&cursor);
talloc_free(vp);
vp = fr_dcursor_current(&cursor);
case FR_CACHE_ALLOW_MERGE:
case FR_CACHE_ALLOW_INSERT:
case FR_CACHE_MERGE_NEW:
- RDEBUG2("Removing &control:%s", vp->da->name);
+ RDEBUG2("Removing control:%s", vp->da->name);
vp = fr_dcursor_remove(&cursor);
TALLOC_FREE(vp);
vp = fr_dcursor_current(&cursor);
challenge_len = env_data->chap_challenge.vb_length;
} else {
if (env_data->chap_challenge.type == FR_TYPE_OCTETS)
- RWDEBUG("&request.CHAP-Challenge shorter than minimum length (%ld)", inst->min_challenge_len);
+ RWDEBUG("request.CHAP-Challenge shorter than minimum length (%ld)", inst->min_challenge_len);
challenge = request->packet->vector;
challenge_len = RADIUS_AUTH_VECTOR_LENGTH;
}
size_t challenge_len;
if (env_data->username.type != FR_TYPE_STRING) {
- REDEBUG("&User-Name attribute is required for authentication");
+ REDEBUG("User-Name attribute is required for authentication");
RETURN_MODULE_INVALID;
}
if (env_data->chap_password.type != FR_TYPE_OCTETS) {
- REDEBUG("You set '&control.Auth-Type = CHAP' for a request that "
+ REDEBUG("You set 'control.Auth-Type = CHAP' for a request that "
"does not contain a CHAP-Password attribute!");
RETURN_MODULE_INVALID;
}
if (env_data->chap_password.vb_length == 0) {
- REDEBUG("&request.CHAP-Password is empty");
+ REDEBUG("request.CHAP-Password is empty");
RETURN_MODULE_INVALID;
}
if (env_data->chap_password.vb_length != FR_CHAP_CHALLENGE_LENGTH + 1) {
- REDEBUG("&request.CHAP-Password has invalid length");
+ REDEBUG("request.CHAP-Password has invalid length");
RETURN_MODULE_INVALID;
}
challenge_len = env_data->chap_challenge.vb_length;
} else {
if (env_data->chap_challenge.type == FR_TYPE_OCTETS)
- RWDEBUG("&request.CHAP-Challenge shorter than minimum length (%ld)", inst->min_challenge_len);
+ RWDEBUG("request.CHAP-Challenge shorter than minimum length (%ld)", inst->min_challenge_len);
challenge = request->packet->vector;
challenge_len = RADIUS_AUTH_VECTOR_LENGTH;
}
size_t length;
if (env_data->chap_challenge.type == FR_TYPE_OCTETS) {
- RDEBUG2("Using challenge from &request.CHAP-Challenge");
+ RDEBUG2("Using challenge from request.CHAP-Challenge");
p = env_data->chap_challenge.vb_octets;
length = env_data->chap_challenge.vb_length;
} else {
*/
vp = fr_pair_find_by_da_nested(&request->control_pairs, NULL, attr_net_dst_ip);
if (!vp || (vp->vp_ip.af != AF_INET)) {
- RDEBUG("No &control.Net.Dst.IP, cannot relay packet");
+ RDEBUG("No control.Net.Dst.IP, cannot relay packet");
RETURN_MODULE_NOOP;
}
*/
vp = fr_pair_find_by_da(&eap_session->request->control_pairs, NULL, attr_eap_type);
if (vp) {
- RDEBUG2("Using method from &control.EAP-Type");
+ RDEBUG2("Using method from control.EAP-Type");
next = vp->vp_uint32;
/*
* We have an array of the submodules which
RDEBUG2("Peer started EAP type %s (%d) without sending an Identity", eap_type2name(type->num), type->num);
vp = fr_pair_find_by_da(&eap_session->request->control_pairs, NULL, attr_eap_type);
if (vp) {
- RDEBUG2("Using method from &control.EAP-Type");
+ RDEBUG2("Using method from control.EAP-Type");
next = vp->vp_uint32;
}
goto do_init;
*/
auth_challenge = fr_pair_find_by_da_nested(&parent->control_pairs, NULL, attr_ms_chap_challenge);
if (auth_challenge && (auth_challenge->vp_length != MSCHAPV2_CHALLENGE_LEN)) {
- RWDEBUG("&parent.control.MS-CHAP-Challenge is incorrect length. Ignoring it");
+ RWDEBUG("parent.control.MS-CHAP-Challenge is incorrect length. Ignoring it");
auth_challenge = NULL;
}
peer_challenge = fr_pair_find_by_da_nested(&parent->control_pairs, NULL, attr_ms_chap_peer_challenge);
if (peer_challenge && (peer_challenge->vp_length != MSCHAPV2_CHALLENGE_LEN)) {
- RWDEBUG("&parent.control.MS-CHAP-Peer-Challenge is incorrect length. Ignoring it");
+ RWDEBUG("parent.control.MS-CHAP-Peer-Challenge is incorrect length. Ignoring it");
peer_challenge = NULL;
}
if (t->username) {
vp = fr_pair_copy(child->request_ctx, t->username);
fr_pair_append(&child->request_pairs, vp);
- RDEBUG2("Setting &request.User-Name from tunneled (inner) identity \"%s\"",
+ RDEBUG2("Setting request.User-Name from tunneled (inner) identity \"%s\"",
vp->vp_strvalue);
} else {
RDEBUG2("No tunnel username (SSL resumption?)");
for (vp = fr_pair_list_head(&group_ctx->groups);
vp;
vp = fr_pair_list_next(&group_ctx->groups, vp)) {
- RDEBUG2("&control.%s += \"%pV\"", group_ctx->inst->group.cache_da->name, &vp->data);
+ RDEBUG2("control.%s += \"%pV\"", group_ctx->inst->group.cache_da->name, &vp->data);
}
}
fr_pair_value_strdup(vp, dn, false);
RINDENT();
- RDEBUG2("&control.%pP", vp);
+ RDEBUG2("control.%pP", vp);
REXDENT();
ldap_memfree(dn);
}
fr_pair_value_bstrndup(vp, values[0]->bv_val, values[0]->bv_len, true);
RINDENT();
- RDEBUG2("&control.%pP", vp);
+ RDEBUG2("control.%pP", vp);
REXDENT();
ldap_value_free_len(values);
fr_ldap_thread_t);
if (!password) {
- REDEBUG("Failed to find &control.Password.Cleartext");
+ REDEBUG("Failed to find control.Password.Cleartext");
rcode = RLM_MODULE_FAIL;
goto finish;
}
RWDEBUG2("!!! - Configure authentication via wbclient (mschapv2 only)");
RWDEBUG2("!!! - Bind as the user by listing %s in an 'authenticate %s' section, and",
inst_name, inst_name);
- RWDEBUG2("!!! setting attribute &control.Auth-Type := '%s' in the 'recv Access-Request' section",
+ RWDEBUG2("!!! setting attribute control.Auth-Type := '%s' in the 'recv Access-Request' section",
inst_name);
RWDEBUG2("!!! (pap only)");
RWDEBUG2("!!! eDir server (recommended)");
RWDEBUG2("!!! - Bind as the user by listing %s in an 'authenticate %s' section, and",
inst_name, inst_name);
- RWDEBUG2("!!! setting attribute &control.Auth-Type := '%s' in the 'recv Access-Request' section",
+ RWDEBUG2("!!! setting attribute control.Auth-Type := '%s' in the 'recv Access-Request' section",
inst_name);
RWDEBUG("!!! (pap only)");
break;
ttrunk->config.admin_identity ? '"' : '\0');
RWDEBUG2("!!! - Bind as the user by listing %s in an 'authenticate %s' section, and",
inst_name, inst_name);
- RWDEBUG2("!!! setting attribute &control.Auth-Type := '%s' in the 'recv Access-Request' section",
+ RWDEBUG2("!!! setting attribute control.Auth-Type := '%s' in the 'recv Access-Request' section",
inst_name);
RWDEBUG2("!!! (pap only)");
break;
MEM(pair_update_reply(&vp, da) >= 0);
fr_pair_value_memdup(vp, value, len, false);
RINDENT();
- RDEBUG2("&reply.%pP", vp);
+ RDEBUG2("reply.%pP", vp);
REXDENT();
}
/*
* If we're doing internal auth, then this is an issue
*/
- RWDEBUG2("No &control.%s or &control.%s found. Cannot create Password.NT",
+ RWDEBUG2("No control.%s or control.%s found. Cannot create Password.NT",
attr_cleartext_password->name, attr_nt_password->name);
return -1;
}
if (RDEBUG_ENABLED3) {
- RDEBUG3("Hashed &control.%pP to create %s = %pV",
+ RDEBUG3("Hashed control.%pP to create %s = %pV",
password, attr_nt_password->name, fr_box_octets(p, NT_DIGEST_LENGTH));
} else {
- RDEBUG2("Hashed &control.%s to create %s", attr_nt_password->name, password->da->name);
+ RDEBUG2("Hashed control.%s to create %s", attr_nt_password->name, password->da->name);
}
if (ephemeral) TALLOC_FREE(password);
fr_assert(password->da == attr_nt_password);
if (RDEBUG_ENABLED3) {
- RDEBUG3("Found &control.%pP", password);
+ RDEBUG3("Found control.%pP", password);
} else {
- RDEBUG2("Found &control.%s", attr_nt_password->name);
+ RDEBUG2("Found control.%s", attr_nt_password->name);
}
*out = password;
challenge = fr_pair_find_by_da_nested(&request->request_pairs, NULL, tmpl_attr_tail_da(env_data->chap_challenge));
if (!challenge) {
- REDEBUG("&control.Auth-Type = %s set for a request that does not contain &%s",
+ REDEBUG("control.Auth-Type = %s set for a request that does not contain %s",
auth_ctx->name, env_data->chap_challenge->name);
rcode = RLM_MODULE_INVALID;
goto finish;
challenge, response);
if (rcode != RLM_MODULE_OK) goto finish;
} else { /* Neither CHAPv1 or CHAPv2 response: die */
- REDEBUG("&control.Auth-Type = %s set for a request that does not contain &%s or &%s attributes",
+ REDEBUG("control.Auth-Type = %s set for a request that does not contain %s or %s attributes",
auth_ctx->name, env_data->chap_response->name, env_data->chap2_response->name);
rcode = RLM_MODULE_INVALID;
goto finish;
RDEBUG2("Serializing OCSP response");
RINDENT();
- RDEBUG2("&%pP", vp);
+ RDEBUG2("%pP", vp);
REXDENT();
*out = vp;
vp = fr_pair_find_by_da(&request->control_pairs, NULL, attr_tls_ocsp_cert_valid);
if (vp) switch (vp->vp_uint32) {
case 0: /* no */
- RDEBUG2("Found &control.TLS-OCSP-Cert-Valid = no, forcing OCSP failure");
+ RDEBUG2("Found control.TLS-OCSP-Cert-Valid = no, forcing OCSP failure");
return OCSP_STATUS_FAILED;
case 1: /* yes */
- RDEBUG2("Found &control.TLS-OCSP-Cert-Valid = yes, forcing OCSP success");
+ RDEBUG2("Found control.TLS-OCSP-Cert-Valid = yes, forcing OCSP success");
/*
* If this fails, and an OCSP stapled response is required,
if (staple_response) {
vp = fr_pair_find_by_da(&request->control_pairs, NULL, attr_tls_ocsp_response);
if (!vp) {
- RDEBUG2("No &control.TLS-OCSP-Response attribute found, performing full OCSP check");
+ RDEBUG2("No control.TLS-OCSP-Response attribute found, performing full OCSP check");
break;
}
if (ocsp_staple_from_pair(request, ssl, vp) < 0) {
return OCSP_STATUS_OK;
case 2: /* skipped */
- RDEBUG2("Found &control.TLS-OCSP-Cert-Valid = skipped, skipping OCSP check");
+ RDEBUG2("Found control.TLS-OCSP-Cert-Valid = skipped, skipping OCSP check");
return conf->softfail ? OCSP_STATUS_OK : OCSP_STATUS_FAILED;
case 3: /* unknown */
MEM(pair_update_request(&vp, attr_tls_ocsp_next_update) >= 0);
vp->vp_uint32 = next - fr_time_to_sec(now);
RINDENT();
- RDEBUG2("&%pP", vp);
+ RDEBUG2("%pP", vp);
REXDENT();
} else {
- RDEBUG2("Update time is in the past. Not adding &TLS-OCSP-Next-Update");
+ RDEBUG2("Update time is in the past. Not adding TLS-OCSP-Next-Update");
}
} else {
- RDEBUG2("Update time not provided. Not adding &TLS-OCSP-Next-Update");
+ RDEBUG2("Update time not provided. Not adding TLS-OCSP-Next-Update");
}
switch (status) {
MEM(pair_update_request(&vp, attr_rest_http_body) >= 0);
fr_pair_value_bstrndup(vp, raw, rawlen, true);
- RDEBUG2("&%pP", vp);
+ RDEBUG2("%pP", vp);
return 1;
}
if (!vp) continue;
}
RINDENT();
- RDEBUG2("&%s:%pP", tmpl_list_name(tmpl_list(dst), ""), vp);
+ RDEBUG2("%s:%pP", tmpl_list_name(tmpl_list(dst), ""), vp);
REXDENT();
fr_pair_list_init(&tmp_list);
code = rest_get_handle_code(handle);
if (!code) {
pair_delete_request(attr_rest_http_status_code);
- RDEBUG2("&request.REST-HTTP-Status-Code !* ANY");
+ RDEBUG2("request.REST-HTTP-Status-Code !* ANY");
REXDENT();
return -1;
}
- RDEBUG2("&request.REST-HTTP-Status-Code := %i", code);
+ RDEBUG2("request.REST-HTTP-Status-Code := %i", code);
MEM(pair_update_request(&vp, attr_rest_http_status_code) >= 0);
vp->vp_uint32 = code;
MEM(vp = fr_pair_afrom_da(request->control_ctx, attr_eap_aka_sim_rand));
MEM(fr_pair_value_memdup_buffer(vp, vec->sim.rand, true) == 0);
TALLOC_FREE(vec->sim.rand);
- RDEBUG2("&control.%pP", vp);
+ RDEBUG2("control.%pP", vp);
fr_pair_append(&request->control_pairs, vp);
MEM(vp = fr_pair_afrom_da(request->control_ctx, attr_eap_aka_sim_sres));
MEM(fr_pair_value_memdup_buffer(vp, vec->sim.sres, true) == 0);
TALLOC_FREE(vec->sim.sres);
- RDEBUG2("&control.%pP", vp);
+ RDEBUG2("control.%pP", vp);
fr_pair_append(&request->control_pairs, vp);
MEM(vp = fr_pair_afrom_da(request->control_ctx, attr_eap_aka_sim_kc));
MEM(fr_pair_value_memdup_buffer(vp, vec->sim.kc, true) == 0);
TALLOC_FREE(vec->sim.kc);
- RDEBUG2("&control.%pP", vp);
+ RDEBUG2("control.%pP", vp);
fr_pair_append(&request->control_pairs, vp);
REXDENT();
MEM(vp = fr_pair_afrom_da(request->control_ctx, attr_eap_aka_sim_rand));
MEM(fr_pair_value_memdup_buffer(vp, vec->umts.rand, true) == 0);
TALLOC_FREE(vec->umts.rand);
- RDEBUG2("&control.%pP", vp);
+ RDEBUG2("control.%pP", vp);
fr_pair_append(&request->control_pairs, vp);
MEM(vp = fr_pair_afrom_da(request->control_ctx, attr_eap_aka_sim_xres));
MEM(fr_pair_value_memdup_buffer(vp, vec->umts.xres, true) == 0);
TALLOC_FREE(vec->umts.xres);
- RDEBUG2("&control.%pP", vp);
+ RDEBUG2("control.%pP", vp);
fr_pair_append(&request->control_pairs, vp);
MEM(vp = fr_pair_afrom_da(request->control_ctx, attr_eap_aka_sim_ck));
MEM(fr_pair_value_memdup_buffer(vp, vec->umts.ck, true) == 0);
TALLOC_FREE(vec->umts.ck);
- RDEBUG2("&control.%pP", vp);
+ RDEBUG2("control.%pP", vp);
fr_pair_append(&request->control_pairs, vp);
MEM(vp = fr_pair_afrom_da(request->control_ctx, attr_eap_aka_sim_ik));
MEM(fr_pair_value_memdup_buffer(vp, vec->umts.ik, true) == 0);
TALLOC_FREE(vec->umts.ik);
- RDEBUG2("&control.%pP", vp);
+ RDEBUG2("control.%pP", vp);
fr_pair_append(&request->control_pairs, vp);
MEM(vp = fr_pair_afrom_da(request->control_ctx, attr_eap_aka_sim_autn));
MEM(fr_pair_value_memdup_buffer(vp, vec->umts.authn, true) == 0);
TALLOC_FREE(vec->umts.authn);
- RDEBUG2("&control.%pP", vp);
+ RDEBUG2("control.%pP", vp);
fr_pair_append(&request->control_pairs, vp);
REXDENT();
* If any recipients were found, ignore to cc and bcc, return the amount added.
**/
if (recipients_set) {
- RDEBUG2("Recipients were generated from \"&SMTP-Recipients\" and/or recipients in the config");
+ RDEBUG2("Recipients were generated from \"SMTP-Recipients\" and/or recipients in the config");
return recipients_set;
}
- RDEBUG2("No addresses were found in \"&SMTP-Recipients\"");
+ RDEBUG2("No addresses were found in \"SMTP-Recipients\"");
/*
* Try to load the to: addresses into the envelope recipients if they are set
fr_value_box_cast(vp, &vp->data, vp->data.type, NULL, &vb);
- RDEBUG2("&%pP", vp);
+ RDEBUG2("%pP", vp);
RETURN_MODULE_UPDATED;
}
*/
MEM(fr_pair_value_bstr_realloc(password, NULL, password_len) == 0);
- RDEBUG2("&request.%pP", vp);
- RDEBUG2("&request.%pP", password);
+ RDEBUG2("request.%pP", vp);
+ RDEBUG2("request.%pP", password);
/*
* So the ID split code works on the non password portion.
if (inst->id_len) {
MEM(pair_update_request(&vp, attr_yubikey_public_id) >= 0);
fr_pair_value_bstrndup(vp, passcode, inst->id_len, true);
- RDEBUG2("&request.%pP", vp);
+ RDEBUG2("request.%pP", vp);
}
if (!inst->auth_type) {
vp = fr_pair_find_by_da(&request->reply_pairs, NULL, (*to_restore)->da);
if (vp) {
if (fr_pair_cmp(vp, *to_restore) != 0) {
- RWDEBUG("&reply.%pP does not match &request.%pP", vp, *to_restore);
+ RWDEBUG("reply.%pP does not match request.%pP", vp, *to_restore);
free:
talloc_free(*to_restore);
*to_restore = NULL;
MEM(vp = fr_pair_afrom_da(request->reply_ctx, attr_proxy_state));
fr_value_box_copy(vp, &vp->data, proxy_state_value);
fr_pair_append(&request->reply_pairs, vp);
- RDEBUG3("&reply.%pP", vp);
+ RDEBUG3("reply.%pP", vp);
}
REXDENT();
}