*
*/
rs_stats_tmpl_t *rs_stats_collectd_init_latency(TALLOC_CTX *ctx, rs_stats_tmpl_t **out, rs_t *conf,
- char const *type, rs_latency_t *stats, fr_packet_code_t code)
+ char const *type, rs_latency_t *stats, fr_radius_packet_code_t code)
{
rs_stats_tmpl_t **tmpl = out, *last;
char *p;
};
#define INIT_STATS(_ti, _v) do {\
- strlcpy(buffer, fr_packet_names[code], sizeof(buffer)); \
+ strlcpy(buffer, fr_radius_packet_name[code], sizeof(buffer)); \
for (p = buffer; *p; ++p) *p = tolower((uint8_t) *p);\
last = *tmpl = rs_stats_collectd_init(ctx, conf, type, _ti, buffer, stats, _v);\
if (!*tmpl) {\
/*
* Set a port from the request type if we don't already have one
*/
-static void radclient_get_port(fr_packet_code_t type, uint16_t *port)
+static void radclient_get_port(fr_radius_packet_code_t type, uint16_t *port)
{
switch (type) {
default:
/*
* Resolve a port to a request type
*/
-static fr_packet_code_t radclient_get_code(uint16_t port)
+static fr_radius_packet_code_t radclient_get_code(uint16_t port)
{
/*
* getport returns 0 if the service doesn't exist
*/
if ((request->filter_code != FR_RADIUS_CODE_UNDEFINED) && (request->reply->code != request->filter_code)) {
if (FR_RADIUS_PACKET_CODE_VALID(request->reply->code)) {
- REDEBUG("%s: Expected %s got %s", request->name, fr_packet_names[request->filter_code],
- fr_packet_names[request->reply->code]);
+ REDEBUG("%s: Expected %s got %s", request->name, fr_radius_packet_name[request->filter_code],
+ fr_radius_packet_name[request->reply->code]);
} else {
REDEBUG("%s: Expected %u got %i", request->name, request->filter_code,
request->reply->code);
/*
* Set a port from the request type if we don't already have one
*/
-static void radclient_get_port(fr_packet_code_t type, uint16_t *port)
+static void radclient_get_port(fr_radius_packet_code_t type, uint16_t *port)
{
switch (type) {
default:
/*
* Resolve a port to a request type
*/
-static fr_packet_code_t radclient_get_code(uint16_t port)
+static fr_radius_packet_code_t radclient_get_code(uint16_t port)
{
/*
* getport returns 0 if the service doesn't exist
*/
if (request->reply->code != request->filter_code) {
if (FR_RADIUS_PACKET_CODE_VALID(request->reply->code)) {
- REDEBUG("%s: Expected %s got %s", request->name, fr_packet_names[request->filter_code],
- fr_packet_names[request->reply->code]);
+ REDEBUG("%s: Expected %s got %s", request->name, fr_radius_packet_name[request->filter_code],
+ fr_radius_packet_name[request->reply->code]);
} else {
REDEBUG("%s: Expected %u got %i", request->name, request->filter_code,
request->reply->code);
*/
if ((request->filter_code != FR_RADIUS_CODE_UNDEFINED) && (request->reply->code != request->filter_code)) {
if (FR_RADIUS_PACKET_CODE_VALID(request->reply->code)) {
- REDEBUG("%s: Expected %s got %s", request->name, fr_packet_names[request->filter_code],
- fr_packet_names[request->reply->code]);
+ REDEBUG("%s: Expected %s got %s", request->name, fr_radius_packet_name[request->filter_code],
+ fr_radius_packet_name[request->reply->code]);
} else {
REDEBUG("%s: Expected %u got %i", request->name, request->filter_code,
request->reply->code);
fr_pair_list_t reply_pairs;
fr_pair_list_t filter; //!< If the reply passes the filter, then the request passes.
- fr_packet_code_t filter_code; //!< Expected code of the response packet.
+ fr_radius_packet_code_t filter_code; //!< Expected code of the response packet.
int resend;
int tries;
/* Status, Type, Interface, Src, Src port, Dst, Dst port, ID */
if (FR_RADIUS_PACKET_CODE_VALID(packet->code)) {
if (fr_sbuff_in_sprintf(&sbuff, "%s,%s,%s,%i,%s,%i,%i,",
- fr_packet_names[packet->code], handle->name,
+ fr_radius_packet_name[packet->code], handle->name,
src, packet->socket.inet.src_port, dst, packet->socket.inet.dst_port, packet->id) < 0) return;
} else {
if (fr_sbuff_in_sprintf(&sbuff, "%u,%s,%s,%i,%s,%i,%i,", packet->code, handle->name,
if (FR_RADIUS_PACKET_CODE_VALID(packet->code)) {
len = snprintf(p, s, "%s Id %i %s:%s:%d %s %s:%i ",
- fr_packet_names[packet->code],
+ fr_radius_packet_name[packet->code],
packet->id,
handle->name,
response ? dst : src,
}
}
-static void rs_stats_print_code_fancy(rs_latency_t *stats, fr_packet_code_t code)
+static void rs_stats_print_code_fancy(rs_latency_t *stats, fr_radius_packet_code_t code)
{
int i;
bool have_rt = false;
if (!stats->interval.received && !have_rt && !stats->interval.reused) return;
if (stats->interval.received || stats->interval.linked) {
- INFO("%s counters:", fr_packet_names[code]);
+ INFO("%s counters:", fr_radius_packet_name[code]);
if (stats->interval.received > 0) {
INFO("\tTotal : %.3lf/s" , stats->interval.received);
}
if (stats->interval.linked > 0) {
INFO("\tLinked : %.3lf/s", stats->interval.linked);
INFO("\tUnlinked : %.3lf/s", stats->interval.unlinked);
- INFO("%s latency:", fr_packet_names[code]);
+ INFO("%s latency:", fr_radius_packet_name[code]);
INFO("\tHigh : %.3lfms", stats->interval.latency_high);
INFO("\tLow : %.3lfms", stats->interval.latency_low);
INFO("\tAverage : %.3lfms", stats->interval.latency_average);
}
if (have_rt || stats->interval.lost || stats->interval.reused) {
- INFO("%s retransmits & loss:", fr_packet_names[code]);
+ INFO("%s retransmits & loss:", fr_radius_packet_name[code]);
if (stats->interval.lost) INFO("\tLost : %.3lf/s", stats->interval.lost);
if (stats->interval.reused) INFO("\tID Reused : %.3lf/s", stats->interval.reused);
}
for (i = 0; i < rs_codes_len; i++) {
- char const *name = fr_packet_names[rs_useful_codes[i]];
+ char const *name = fr_radius_packet_name[rs_useful_codes[i]];
fprintf(stdout,
",\"%s received/s\""
DEBUG2(" RADIUS secret : [%s]", conf->radius_secret);
if (conf->filter_request_code) {
- DEBUG2(" RADIUS request code : [%s]", fr_packet_names[conf->filter_request_code]);
+ DEBUG2(" RADIUS request code : [%s]", fr_radius_packet_name[conf->filter_request_code]);
}
if (!fr_pair_list_empty(&conf->filter_request_vps)){
}
if (conf->filter_response_code) {
- DEBUG2(" RADIUS response code : [%s]", fr_packet_names[conf->filter_response_code]);
+ DEBUG2(" RADIUS response code : [%s]", fr_radius_packet_name[conf->filter_response_code]);
}
if (conf->to_output_dir) {
fr_pair_list_t filter_request_vps; //!< Sorted filter vps.
fr_pair_list_t filter_response_vps; //!< Sorted filter vps.
- fr_packet_code_t filter_request_code; //!< Filter request packets by code.
- fr_packet_code_t filter_response_code; //!< Filter response packets by code.
+ fr_radius_packet_code_t filter_request_code; //!< Filter request packets by code.
+ fr_radius_packet_code_t filter_response_code; //!< Filter response packets by code.
rs_status_t event_flags; //!< Events we log and capture on.
rs_packet_logger_t logger; //!< Packet logger
* collectd.c - Registration and processing functions
*/
rs_stats_tmpl_t *rs_stats_collectd_init_latency(TALLOC_CTX *ctx, rs_stats_tmpl_t **out, rs_t *conf,
- char const *type, rs_latency_t *stats, fr_packet_code_t code);
+ char const *type, rs_latency_t *stats, fr_radius_packet_code_t code);
void rs_stats_collectd_do_stats(rs_t *conf, rs_stats_tmpl_t *tmpls, struct timeval *now);
int rs_stats_collectd_open(rs_t *conf);
int rs_stats_collectd_close(rs_t *conf);
}
-fr_packet_code_t chbind_process(request_t *request, CHBIND_REQ *chbind)
+fr_radius_packet_code_t chbind_process(request_t *request, CHBIND_REQ *chbind)
{
- fr_packet_code_t code;
+ fr_radius_packet_code_t code;
rlm_rcode_t rcode;
request_t *fake = NULL;
uint8_t const *attr_data;
#define CHBIND_CODE_FAILURE 3
/* Channel binding function prototypes */
-fr_packet_code_t chbind_process(request_t *request, CHBIND_REQ *chbind_req);
+fr_radius_packet_code_t chbind_process(request_t *request, CHBIND_REQ *chbind_req);
fr_pair_t *eap_chbind_packet2vp(TALLOC_CTX *ctx, chbind_packet_t *chbind);
chbind_packet_t *eap_chbind_vp2packet(TALLOC_CTX *ctx, fr_pair_list_t *vps);
if (RDEBUG_ENABLED) {
RDEBUG("Sending %s ID %i from %pV:%i to %pV:%i length %zu via socket %s",
- fr_packet_names[request->reply->code],
+ fr_radius_packet_name[request->reply->code],
request->reply->id,
fr_box_ipaddr(request->reply->socket.inet.src_ipaddr),
request->reply->socket.inet.src_port,
* Print out what we received.
*/
DEBUG2("proto_radius_tcp - Received %s ID %d length %d %s",
- fr_packet_names[buffer[0]], buffer[1],
+ fr_radius_packet_name[buffer[0]], buffer[1],
(int) packet_len, thread->name);
return packet_len;
* Print out what we received.
*/
DEBUG2("proto_radius_udp - Received %s ID %d length %d %s",
- fr_packet_names[buffer[0]], buffer[1],
+ fr_radius_packet_name[buffer[0]], buffer[1],
(int) packet_len, thread->name);
return packet_len;
eap_fast_tlv_append(tls_session, attr_eap_fast_error, true, sizeof(value), &value);
}
-static void eap_fast_append_result(fr_tls_session_t *tls_session, fr_packet_code_t code)
+static void eap_fast_append_result(fr_tls_session_t *tls_session, fr_radius_packet_code_t code)
{
eap_fast_tunnel_t *t = talloc_get_type_abort(tls_session->opaque, eap_fast_tunnel_t);
uint16_t state;
return rcode;
}
-static fr_packet_code_t eap_fast_eap_payload(request_t *request, eap_session_t *eap_session,
+static fr_radius_packet_code_t eap_fast_eap_payload(request_t *request, eap_session_t *eap_session,
fr_tls_session_t *tls_session, fr_pair_t *tlv_eap_payload)
{
- fr_packet_code_t code = FR_RADIUS_CODE_ACCESS_REJECT;
+ fr_radius_packet_code_t code = FR_RADIUS_CODE_ACCESS_REJECT;
rlm_rcode_t rcode;
fr_pair_t *vp;
eap_fast_tunnel_t *t;
return code;
}
-static fr_packet_code_t eap_fast_crypto_binding(request_t *request, UNUSED eap_session_t *eap_session,
+static fr_radius_packet_code_t eap_fast_crypto_binding(request_t *request, UNUSED eap_session_t *eap_session,
fr_tls_session_t *tls_session, eap_tlv_crypto_binding_tlv_t *binding)
{
uint8_t cmac[sizeof(binding->compound_mac)];
return FR_RADIUS_CODE_ACCESS_ACCEPT;
}
-static fr_packet_code_t eap_fast_process_tlvs(request_t *request, eap_session_t *eap_session,
+static fr_radius_packet_code_t eap_fast_process_tlvs(request_t *request, eap_session_t *eap_session,
fr_tls_session_t *tls_session, fr_pair_list_t *fast_vps)
{
eap_fast_tunnel_t *t = talloc_get_type_abort(tls_session->opaque, eap_fast_tunnel_t);
for (vp = fr_pair_list_head(fast_vps);
vp;
vp = fr_pair_list_next(fast_vps, vp)) {
- fr_packet_code_t code = FR_RADIUS_CODE_ACCESS_REJECT;
+ fr_radius_packet_code_t code = FR_RADIUS_CODE_ACCESS_REJECT;
if (vp->da->parent == fr_dict_root(dict_eap_fast)) {
if (vp->da == attr_eap_fast_eap_payload) {
code = eap_fast_eap_payload(request, eap_session, tls_session, vp);
}
if (binding) {
- fr_packet_code_t code = eap_fast_crypto_binding(request, eap_session, tls_session, binding);
+ fr_radius_packet_code_t code = eap_fast_crypto_binding(request, eap_session, tls_session, binding);
if (code == FR_RADIUS_CODE_ACCESS_ACCEPT) {
t->stage = EAP_FAST_PROVISIONING;
}
/*
* Process the inner tunnel data
*/
-fr_packet_code_t eap_fast_process(request_t *request, eap_session_t *eap_session, fr_tls_session_t *tls_session)
+fr_radius_packet_code_t eap_fast_process(request_t *request, eap_session_t *eap_session, fr_tls_session_t *tls_session)
{
- fr_packet_code_t code;
+ fr_radius_packet_code_t code;
fr_pair_list_t fast_vps;
uint8_t const *data;
size_t data_len;
*/
void eap_fast_tlv_append(fr_tls_session_t *tls_session, fr_dict_attr_t const *da, bool mandatory,
int length, const void *data) CC_HINT(nonnull);
-fr_packet_code_t eap_fast_process(request_t *request, eap_session_t *eap_session, fr_tls_session_t *tls_session) CC_HINT(nonnull);
+fr_radius_packet_code_t eap_fast_process(request_t *request, eap_session_t *eap_session, fr_tls_session_t *tls_session) CC_HINT(nonnull);
/*
* A bunch of EAP-FAST helper functions.
* attributes.
*/
if (FR_RADIUS_PACKET_CODE_VALID(reply->code)) {
- RDEBUG2("Got tunneled reply %s", fr_packet_names[reply->code]);
+ RDEBUG2("Got tunneled reply %s", fr_radius_packet_name[reply->code]);
} else {
RDEBUG2("Got tunneled reply code %i", reply->code);
}
/*
* Process the TTLS portion of an EAP-TTLS request.
*/
-fr_packet_code_t eap_ttls_process(request_t *request, eap_session_t *eap_session, fr_tls_session_t *tls_session) CC_HINT(nonnull);
+fr_radius_packet_code_t eap_ttls_process(request_t *request, eap_session_t *eap_session, fr_tls_session_t *tls_session) CC_HINT(nonnull);
/*
* Process the "diameter" contents of the tunneled data.
*/
-fr_packet_code_t eap_ttls_process(request_t *request, eap_session_t *eap_session, fr_tls_session_t *tls_session)
+fr_radius_packet_code_t eap_ttls_process(request_t *request, eap_session_t *eap_session, fr_tls_session_t *tls_session)
{
- fr_packet_code_t code = FR_RADIUS_CODE_ACCESS_REJECT;
+ fr_radius_packet_code_t code = FR_RADIUS_CODE_ACCESS_REJECT;
rlm_rcode_t rcode;
fr_pair_t *vp = NULL;
fr_dcursor_t cursor;
*/
chbind = eap_chbind_vp2packet(request, &request->request_pairs);
if (chbind) {
- fr_packet_code_t chbind_code;
+ fr_radius_packet_code_t chbind_code;
CHBIND_REQ *req = talloc_zero(request, CHBIND_REQ);
RDEBUG2("received chbind request");
if (!inst->allowed[request->packet->code]) {
REDEBUG("Packet code %s is disallowed by the configuration",
- fr_packet_names[request->packet->code]);
+ fr_radius_packet_name[request->packet->code]);
RETURN_MODULE_FAIL;
}
*/
if (inst->replicate && inst->status_check) {
cf_log_warn(conf, "Ignoring 'status_check = %s' due to 'replicate = true'",
- fr_packet_names[inst->status_check]);
+ fr_radius_packet_name[inst->status_check]);
inst->status_check = 0;
}
} else if (!inst->allowed[inst->status_check]) {
cf_log_err(conf, "Using 'status_check = %s' requires also 'type = %s'",
- fr_packet_names[inst->status_check], fr_packet_names[inst->status_check]);
+ fr_radius_packet_name[inst->status_check], fr_radius_packet_name[inst->status_check]);
return -1;
}
u->code = inst->parent->status_check;
request->packet->code = u->code;
- DEBUG3("%s - Status check packet type will be %s", h->module_name, fr_packet_names[u->code]);
+ DEBUG3("%s - Status check packet type will be %s", h->module_name, fr_radius_packet_name[u->code]);
log_request_pair_list(L_DBG_LVL_3, request, NULL, &request->request_pairs, NULL);
MEM(h->status_r = talloc_zero(request, udp_result_t));
}
DEBUG("%s - Sending %s ID %d length %ld over connection %s",
- h->module_name, fr_packet_names[u->code], u->id, u->packet_len, h->name);
+ h->module_name, fr_radius_packet_name[u->code], u->id, u->packet_len, h->name);
if (encode(h->inst, h->status_request, u, u->id) < 0) {
fail:
slen = write(h->fd, u->packet, u->packet_len);
if (slen < 0) {
ERROR("%s - Failed sending %s ID %d length %ld over connection %s: %s",
- h->module_name, fr_packet_names[u->code], u->id, u->packet_len, h->name, fr_syserror(errno));
+ h->module_name, fr_radius_packet_name[u->code], u->id, u->packet_len, h->name, fr_syserror(errno));
goto fail;
}
fr_assert((size_t)slen == u->packet_len);
code = data[0];
RDEBUG("Received %s ID %d length %ld reply packet on connection %s",
- fr_packet_names[code], data[1], data_len, h->name);
+ fr_radius_packet_name[code], data[1], data_len, h->name);
log_request_pair_list(L_DBG_LVL_2, request, NULL, reply, NULL);
*response_code = code;
u->id = u->rr->id;
RDEBUG("Sending %s ID %d length %ld over connection %s",
- fr_packet_names[u->code], u->id, u->packet_len, h->name);
+ fr_radius_packet_name[u->code], u->id, u->packet_len, h->name);
if (encode(h->inst, request, u, u->id) < 0) {
/*
(void) radius_track_entry_update(u->rr, u->packet + RADIUS_AUTH_VECTOR_OFFSET);
} else {
RDEBUG("Retransmitting %s ID %d length %ld over connection %s",
- fr_packet_names[u->code], u->id, u->packet_len, h->name);
+ fr_radius_packet_name[u->code], u->id, u->packet_len, h->name);
}
log_request_pair_list(L_DBG_LVL_2, request, NULL, &request->request_pairs, NULL);
}
RDEBUG("Sending %s ID %d length %ld over connection %s",
- fr_packet_names[u->code], u->id, u->packet_len, h->name);
+ fr_radius_packet_name[u->code], u->id, u->packet_len, h->name);
RHEXDUMP3(u->packet, u->packet_len, "Encoded packet");
h->coalesced[queued].treq = treq;
if (!local_stats[i]) continue;
- strlcpy(buffer + 18, fr_packet_names[i], sizeof(buffer) - 18);
+ strlcpy(buffer + 18, fr_radius_packet_name[i], sizeof(buffer) - 18);
da = fr_dict_attr_by_name(NULL, fr_dict_root(dict_radius), buffer);
if (!da) continue;
#define FR_RADIUS_PROCESS_CODE_VALID(_x) (FR_RADIUS_PACKET_CODE_VALID(_x) || (_x == FR_RADIUS_CODE_DO_NOT_RESPOND))
-#define PROCESS_PACKET_TYPE fr_packet_code_t
+#define PROCESS_PACKET_TYPE fr_radius_packet_code_t
#define PROCESS_CODE_MAX FR_RADIUS_CODE_MAX
#define PROCESS_CODE_DO_NOT_RESPOND FR_RADIUS_CODE_DO_NOT_RESPOND
#define PROCESS_PACKET_CODE_VALID FR_RADIUS_PROCESS_CODE_VALID
#endif
"",
received ? "Received" : "Sending",
- fr_packet_names[packet->code],
+ fr_radius_packet_name[packet->code],
packet->id,
packet->socket.inet.src_ipaddr.af == AF_INET6 ? "[" : "",
fr_box_ipaddr(packet->socket.inet.src_ipaddr),
process_ttls_auth_t auth; //!< Authentication configuration.
} process_ttls_t;
-#define PROCESS_PACKET_TYPE fr_packet_code_t
+#define PROCESS_PACKET_TYPE fr_radius_packet_code_t
#define PROCESS_CODE_MAX FR_RADIUS_CODE_MAX
#define PROCESS_CODE_DO_NOT_RESPOND FR_RADIUS_CODE_DO_NOT_RESPOND
#define PROCESS_PACKET_CODE_VALID FR_RADIUS_PACKET_CODE_VALID
#endif
"",
received ? "Received" : "Sending",
- fr_packet_names[packet->code],
+ fr_radius_packet_name[packet->code],
packet->id,
packet->socket.inet.src_ipaddr.af == AF_INET6 ? "[" : "",
fr_box_ipaddr(packet->socket.inet.src_ipaddr),
};
size_t fr_radius_request_name_table_len = NUM_ELEMENTS(fr_radius_request_name_table);
-char const *fr_packet_names[FR_RADIUS_CODE_MAX] = {
+char const *fr_radius_packet_name[FR_RADIUS_CODE_MAX] = {
"", //!< 0
"Access-Request",
"Access-Accept",
/** If we get a reply, the request must come from one of a small
* number of packet types.
*/
-static const fr_packet_code_t allowed_replies[FR_RADIUS_CODE_MAX] = {
+static const fr_radius_packet_code_t allowed_replies[FR_RADIUS_CODE_MAX] = {
[FR_RADIUS_CODE_ACCESS_ACCEPT] = FR_RADIUS_CODE_ACCESS_REQUEST,
[FR_RADIUS_CODE_ACCESS_CHALLENGE] = FR_RADIUS_CODE_ACCESS_REQUEST,
[FR_RADIUS_CODE_ACCESS_REJECT] = FR_RADIUS_CODE_ACCESS_REQUEST,
if (!allowed_replies[code]) {
fr_strerror_printf("%s packet received unknown reply code %s",
- fr_packet_names[decode_ctx->request_code], fr_packet_names[code]);
+ fr_radius_packet_name[decode_ctx->request_code], fr_radius_packet_name[code]);
return DECODE_FAIL_UNKNOWN_PACKET_CODE;
}
if ((code != FR_RADIUS_CODE_PROTOCOL_ERROR) && (decode_ctx->request_code != FR_RADIUS_CODE_STATUS_SERVER) &&
(allowed_replies[code] != decode_ctx->request_code)) {
fr_strerror_printf("%s packet received invalid reply code %s",
- fr_packet_names[decode_ctx->request_code], fr_packet_names[code]);
+ fr_radius_packet_name[decode_ctx->request_code], fr_radius_packet_name[code]);
return DECODE_FAIL_UNKNOWN_PACKET_CODE;
}
}
return 0;
}
-static const fr_packet_code_t allowed_replies[FR_RADIUS_CODE_MAX] = {
+static const fr_radius_packet_code_t allowed_replies[FR_RADIUS_CODE_MAX] = {
[FR_RADIUS_CODE_ACCESS_ACCEPT] = FR_RADIUS_CODE_ACCESS_REQUEST,
[FR_RADIUS_CODE_ACCESS_CHALLENGE] = FR_RADIUS_CODE_ACCESS_REQUEST,
[FR_RADIUS_CODE_ACCESS_REJECT] = FR_RADIUS_CODE_ACCESS_REQUEST,
FR_RADIUS_CODE_PROTOCOL_ERROR = 52, //!< RFC7930 - Protocol-Error (generic NAK)
FR_RADIUS_CODE_MAX = 53, //!< Maximum possible protocol code
FR_RADIUS_CODE_DO_NOT_RESPOND = 256 //!< Special rcode to indicate we will not respond.
-} fr_packet_code_t;
+} fr_radius_packet_code_t;
#define FR_AUTH_UDP_PORT 1812
#define FR_AUTH_UDP_PORT_ALT 1645
#endif
"length %zu\n",
received ? "Received" : "Sent",
- fr_packet_names[packet->code],
+ fr_radius_packet_name[packet->code],
packet->id,
packet->socket.inet.src_ipaddr.af == AF_INET6 ? "[" : "",
fr_inet_ntop(src_ipaddr, sizeof(src_ipaddr), &packet->socket.inet.src_ipaddr),
}
if ((packet->data[0] > 0) && (packet->data[0] < FR_RADIUS_CODE_MAX)) {
- fr_log(log, L_DBG, file, line, " Code : %s", fr_packet_names[packet->data[0]]);
+ fr_log(log, L_DBG, file, line, " Code : %s", fr_radius_packet_name[packet->data[0]]);
} else {
fr_log(log, L_DBG, file, line, " Code : %u", packet->data[0]);
}
* protocols/radius/base.c
*/
-extern char const *fr_packet_names[FR_RADIUS_CODE_MAX];
+extern char const *fr_radius_packet_name[FR_RADIUS_CODE_MAX];
#define FR_RADIUS_PACKET_CODE_VALID(_x) ((_x > 0) && (_x < FR_RADIUS_CODE_MAX))
#define AUTH_PASS_LEN (RADIUS_AUTH_VECTOR_LENGTH)