fr_ipaddr_t myip; //!< IP to bind to. Set on command line.
uint16_t port; //!< Port to bind to. Set on command line.
+ bool suppress_secrets; //!< for debug levels < 3
bool log_auth; //!< Log all authentication attempts.
bool log_accept; //!< Log Access-Accept
bool log_reject; //!< Log Access-Reject
#define RAD_REQUEST_LVL_DEBUG3 (3)
#define RAD_REQUEST_LVL_DEBUG4 (4)
-#define RAD_REQUEST_OPTION_COA (1 << 0)
-#define RAD_REQUEST_OPTION_CTX (1 << 1)
+#define RAD_REQUEST_OPTION_COA (1 << 0)
+#define RAD_REQUEST_OPTION_CTX (1 << 1)
+#define RAD_REQUEST_OPTION_CANCELLED (1 << 2)
#define SECONDS_PER_DAY 86400
#define MAX_REQUEST_TIME 30
{ "colourise",FR_CONF_POINTER(PW_TYPE_BOOLEAN, &do_colourise), NULL },
{ "use_utc", FR_CONF_POINTER(PW_TYPE_BOOLEAN, &log_dates_utc), NULL },
{ "msg_denied", FR_CONF_POINTER(PW_TYPE_STRING, &main_config.denied_msg), "You are already logged in - access denied" },
+ { "suppress_secrets", FR_CONF_POINTER(PW_TYPE_BOOLEAN, &main_config.suppress_secrets), NULL },
CONF_PARSER_TERMINATOR
};
if (!radlog_debug_enabled(L_DBG, level, request)) return;
+ if (vp->da->flags.secret && request->root->suppress_secrets && (rad_debug_lvl < 3)) {
+ RDEBUGX(level, "%s%s = <<< secret >>>", prefix ? prefix : "", vp->da->name);
+ return;
+ }
+
vp_prints(buffer, sizeof(buffer), vp);
RDEBUGX(level, "%s%s", prefix ? prefix : "", buffer);
}
vp = fr_cursor_next(&cursor)) {
VERIFY_VP(vp);
+ if (vp->da->flags.secret && request->root->suppress_secrets && (rad_debug_lvl < 3)) {
+ RDEBUGX(level, "%s = <<< secret >>>", vp->da->name);
+ continue;
+ }
+
vp_prints(buffer, sizeof(buffer), vp);
RDEBUGX(level, "%s%s", prefix ? prefix : "", buffer);
}
VERIFY_VP(vp);
if ((vp->da->vendor == 0) &&
((vp->da->attr & 0xFFFF) > 0xff)) continue;
+
+ if (vp->da->flags.secret && request->root->suppress_secrets && (rad_debug_lvl < 3)) {
+ RDEBUGX(level, "%s = <<< secret >>>", vp->da->name);
+ continue;
+ }
+
vp_prints(buffer, sizeof(buffer), vp);
RDEBUGX(level, "%s", buffer);
}