]> git.ipfire.org Git - thirdparty/freeradius-server.git/log
thirdparty/freeradius-server.git
2 years agoparent is used
Alan T. DeKok [Thu, 22 Jun 2023 13:56:26 +0000 (09:56 -0400)] 
parent is used

2 years agoas sent via email
Alan T. DeKok [Thu, 22 Jun 2023 13:48:13 +0000 (09:48 -0400)] 
as sent via email

2 years agocheck for invalid packet types in more protocols
Alan T. DeKok [Wed, 14 Jun 2023 14:12:11 +0000 (10:12 -0400)] 
check for invalid packet types in more protocols

2 years agoCorrect locating of fr_tls_conf_t when parsing cache mode
Nick Porter [Thu, 22 Jun 2023 13:15:35 +0000 (14:15 +0100)] 
Correct locating of fr_tls_conf_t when parsing cache mode

`parent` is the fr_tls_cache_conf_t being populated, which is a member
of the fr_tls_conf_t.

2 years agoMove tls_conf_parse_cache_mode outside of #ifdef __APPLE__
Nick Porter [Thu, 22 Jun 2023 10:42:13 +0000 (11:42 +0100)] 
Move tls_conf_parse_cache_mode outside of #ifdef __APPLE__

2 years agoAdd "--without rlm_python" support
Max Khon [Wed, 21 Jun 2023 21:20:43 +0000 (22:20 +0100)] 
Add "--without rlm_python" support

2 years agoAllow to specify YUM_BUILDDEP_FLAGS (like YUM_BUILDDEP_FLAGS="--define '_without_pyth...
Max Khon [Wed, 21 Jun 2023 21:27:07 +0000 (22:27 +0100)] 
Allow to specify YUM_BUILDDEP_FLAGS (like YUM_BUILDDEP_FLAGS="--define '_without_python 1'")

2 years agotls: Mark cache mode function as static
Arran Cudbard-Bell [Thu, 22 Jun 2023 03:36:08 +0000 (23:36 -0400)] 
tls: Mark cache mode function as static

2 years agoTypo
James Jones [Wed, 21 Jun 2023 22:23:43 +0000 (17:23 -0500)] 
Typo

2 years agoPrint line numbers in the format vscode likes
Arran Cudbard-Bell [Wed, 21 Jun 2023 21:02:10 +0000 (17:02 -0400)] 
Print line numbers in the format vscode likes

2 years agoFix build issue
Arran Cudbard-Bell [Wed, 21 Jun 2023 21:01:37 +0000 (17:01 -0400)] 
Fix build issue

2 years agocall_env: Write out an explicit result from evaluation so that module calls fail...
Arran Cudbard-Bell [Wed, 21 Jun 2023 20:25:41 +0000 (16:25 -0400)] 
call_env: Write out an explicit result from evaluation so that module calls fail correctly

2 years agotls: Process cache mode early
Arran Cudbard-Bell [Wed, 21 Jun 2023 19:47:57 +0000 (15:47 -0400)] 
tls: Process cache mode early

2 years agotriggers: Don't crash on trigger execution
Arran Cudbard-Bell [Wed, 21 Jun 2023 19:47:35 +0000 (15:47 -0400)] 
triggers: Don't crash on trigger execution

2 years agoGrammar
Arran Cudbard-Bell [Thu, 15 Jun 2023 15:48:22 +0000 (11:48 -0400)] 
Grammar

2 years agofr_redis_cluster_conn_create(): tls session should be allocated in `conn' context
Max Khon [Wed, 14 Jun 2023 20:18:04 +0000 (21:18 +0100)] 
fr_redis_cluster_conn_create(): tls session should be allocated in `conn' context

2 years agoredis: Add "use_cluster_map = no": when redis server is configured for TLS
Max Khon [Wed, 14 Jun 2023 19:20:14 +0000 (20:20 +0100)] 
redis: Add "use_cluster_map = no": when redis server is configured for TLS
and freeradius TLS is implemented using stunnel, freeradius connects to redis
(stunnel) using plaintext, then tries to open plaintext connection to cluster nodes
which only accept TLS

2 years agoredis: Add "use_tls = yes" support (if hiredis supports SSL).
Max Khon [Wed, 14 Jun 2023 19:19:34 +0000 (20:19 +0100)] 
redis: Add "use_tls = yes" support (if hiredis supports SSL).

2 years agoScheduled fuzzing: Update src/tests/fuzzer-corpus/dhcpv6.tar
github-actions[bot] [Wed, 21 Jun 2023 09:35:12 +0000 (09:35 +0000)] 
Scheduled fuzzing: Update src/tests/fuzzer-corpus/dhcpv6.tar

2 years agoScheduled fuzzing: Update src/tests/fuzzer-corpus/dhcpv4.tar
github-actions[bot] [Wed, 21 Jun 2023 09:35:10 +0000 (09:35 +0000)] 
Scheduled fuzzing: Update src/tests/fuzzer-corpus/dhcpv4.tar

2 years agoScheduled fuzzing: Update src/tests/fuzzer-corpus/radius.tar
github-actions[bot] [Wed, 21 Jun 2023 09:35:06 +0000 (09:35 +0000)] 
Scheduled fuzzing: Update src/tests/fuzzer-corpus/radius.tar

2 years agoScheduled fuzzing: Update src/tests/fuzzer-corpus/util.tar
github-actions[bot] [Wed, 21 Jun 2023 09:35:01 +0000 (09:35 +0000)] 
Scheduled fuzzing: Update src/tests/fuzzer-corpus/util.tar

2 years agoScheduled fuzzing: Update src/tests/fuzzer-corpus/tftp.tar
github-actions[bot] [Wed, 21 Jun 2023 09:34:58 +0000 (09:34 +0000)] 
Scheduled fuzzing: Update src/tests/fuzzer-corpus/tftp.tar

2 years agoScheduled fuzzing: Update src/tests/fuzzer-corpus/vmps.tar
github-actions[bot] [Wed, 21 Jun 2023 09:34:55 +0000 (09:34 +0000)] 
Scheduled fuzzing: Update src/tests/fuzzer-corpus/vmps.tar

2 years agoScheduled fuzzing: Update src/tests/fuzzer-corpus/tacacs.tar
github-actions[bot] [Wed, 21 Jun 2023 09:34:52 +0000 (09:34 +0000)] 
Scheduled fuzzing: Update src/tests/fuzzer-corpus/tacacs.tar

2 years agoScheduled fuzzing: Update src/tests/fuzzer-corpus/dns.tar
github-actions[bot] [Wed, 21 Jun 2023 09:34:48 +0000 (09:34 +0000)] 
Scheduled fuzzing: Update src/tests/fuzzer-corpus/dns.tar

2 years agoMove assignment to success (CID #1504462) (#5074)
James Jones [Tue, 20 Jun 2023 19:31:41 +0000 (14:31 -0500)] 
Move assignment to success (CID #1504462) (#5074)

Coverity looks at control flow in xlat_purify_list() and judges that
success is guaranteed to be false by the time it's checked. We think
that moving the initialization before the unlang_xlat_push_node()
call, which passes it &success, will function the same while
reassuring coverity.

2 years agoModel fr_md5_calc() (#5065)
James Jones [Tue, 20 Jun 2023 14:50:01 +0000 (09:50 -0500)] 
Model fr_md5_calc() (#5065)

2 years agoRewrite udp_len check in fr_udp_header_check() for coverity (CID #1504068) (#5072)
James Jones [Tue, 20 Jun 2023 14:49:29 +0000 (09:49 -0500)] 
Rewrite udp_len check in fr_udp_header_check() for coverity (CID #1504068) (#5072)

It wasn't practical to write a single UDP header check function,
so the change to make coverity see that udp_len is valid has to be
there twice.

2 years agoTypo
Nick Porter [Tue, 20 Jun 2023 10:20:44 +0000 (11:20 +0100)] 
Typo

2 years agoSome dhcpv6 fixes (#5071)
Jorge Pereira [Tue, 20 Jun 2023 04:43:51 +0000 (01:43 -0300)] 
Some dhcpv6 fixes (#5071)

* dhcpv6: Fix potential memory leak

* dhcpv6: Fix typo in default virtual server

* dhcpv6: Don't crash if 'interface' is empty.

It fixes:

Mon Jun 19 23:40:31 2023: Bootstrapping proto_dhcpv4 "dhcp.dhcpv4"
Mon Jun 19 23:40:31 2023: Bootstrapping proto_dhcpv6 "dhcpv6.all_dhcp_servers_and_relays"
Process 73144 stopped
* thread #1, queue = 'com.apple.main-thread', stop reason = EXC_BAD_ACCESS (code=1, address=0x0)
    frame #0: 0x00000001a68c853c libsystem_platform.dylib`_platform_strcmp + 12
libsystem_platform.dylib`:
->  0x1a68c853c <+12>: ldrb   w5, [x1], #0x1
    0x1a68c8540 <+16>: subs   x3, x4, x5
    0x1a68c8544 <+20>: ccmp   w4, #0x0, #0x4, eq
    0x1a68c8548 <+24>: b.ne   0x1a68c8530               ; <+0>
(lldb) bt
* thread #1, queue = 'com.apple.main-thread', stop reason = EXC_BAD_ACCESS (code=1, address=0x0)
  * frame #0: 0x00000001a68c853c libsystem_platform.dylib`_platform_strcmp + 12
    frame #1: 0x0000000100368d60 libfreeradius-util.dylib`fr_interface_to_ethernet(interface=0x0000000000000000, ethernet=0x0000600003e041b0) at inet.c:1570:7
    frame #2: 0x0000000100ed7c7c proto_dhcpv6_udp.dylib`mod_bootstrap(mctx=0x000000016fdfdd60) at proto_dhcpv6_udp.c:564:9
    frame #3: 0x00000001002aecbc libfreeradius-io.dylib`mod_bootstrap(mctx=0x000000016fdfe100) at master.c:2610:41
    frame #4: 0x0000000100b85260 proto_dhcpv6.dylib`mod_bootstrap(mctx=0x000000016fdfe890) at proto_dhcpv6.c:470:9
    frame #5: 0x0000000100619bd8 libfreeradius-server.dylib`module_bootstrap(mi=0x0000000102214890) at module.c:778:7
    frame #6: 0x0000000100619d0c libfreeradius-server.dylib`modules_bootstrap(ml=0x0000600002fa85e0) at module.c:811:7
    frame #7: 0x000000010066c9b0 libfreeradius-server.dylib`virtual_servers_bootstrap(config=0x0000000100ff2c30) at virtual_servers.c:1301:6
    frame #8: 0x00000001005ce87c libfreeradius-server.dylib`server_init(cs=0x0000000100ff2c30) at base.c:68:6
    frame #9: 0x00000001000043a0 radiusd`main(argc=7, argv=0x000000016fdfecb8) at radiusd.c:788:6

2 years agoThe option 'tmpdir' is no longer available (#5070)
Jorge Pereira [Tue, 20 Jun 2023 04:41:38 +0000 (01:41 -0300)] 
The option 'tmpdir' is no longer available (#5070)

2 years agoHelp coverity see validation of option_len (#5064)
James Jones [Thu, 15 Jun 2023 23:11:48 +0000 (18:11 -0500)] 
Help coverity see validation of option_len (#5064)

2 years agoxlat: Register xlat protocols _AFTER_ bootstrap has completed
Arran Cudbard-Bell [Thu, 15 Jun 2023 15:20:09 +0000 (11:20 -0400)] 
xlat: Register xlat protocols _AFTER_ bootstrap has completed

2 years agoxlat: Expose the protocol xlat registraiton function
Arran Cudbard-Bell [Thu, 15 Jun 2023 15:17:11 +0000 (11:17 -0400)] 
xlat: Expose the protocol xlat registraiton function

2 years agoxlat: Add module find function
Arran Cudbard-Bell [Thu, 15 Jun 2023 15:16:46 +0000 (11:16 -0400)] 
xlat: Add module find function

2 years agoVirtual servers should be freed and unloaded before modules Closes #5062
Arran Cudbard-Bell [Wed, 14 Jun 2023 22:11:01 +0000 (18:11 -0400)] 
Virtual servers should be freed and unloaded before modules Closes #5062

2 years agoUpdate copyright year... now we're in June
Arran Cudbard-Bell [Wed, 14 Jun 2023 18:19:05 +0000 (14:19 -0400)] 
Update copyright year... now we're in June

2 years agoeap: Deal with the case where the first response message is not an Identity-Response...
Arran Cudbard-Bell [Wed, 14 Jun 2023 18:05:37 +0000 (14:05 -0400)] 
eap: Deal with the case where the first response message is not an Identity-Response Closes #5061

2 years agodhcpclient: Add missing '-r <retries>' help message. (#5058)
Jorge Pereira [Wed, 14 Jun 2023 16:15:38 +0000 (13:15 -0300)] 
dhcpclient: Add missing '-r <retries>' help message. (#5058)

* dhcpclient: Add missing '-r <retries>' help message.

* dhcpclient: Better message to avoid bad experience

Even in debug mode (-x), its impossible to know if the client is blocked
or trying something.

2 years agoHelp coverity see validation of field_len (#5059)
James Jones [Wed, 14 Jun 2023 16:15:09 +0000 (11:15 -0500)] 
Help coverity see validation of field_len (#5059)

2 years agoDon't set msg callback: required for SSL objects created by SSL_new() from freeradius...
Max Khon [Wed, 14 Jun 2023 16:14:41 +0000 (17:14 +0100)] 
Don't set msg callback: required for SSL objects created by SSL_new() from freeradius SSL_CTX (#5056)

2 years agodouble-check for bad packets. Fixes #5060
Alan T. DeKok [Wed, 14 Jun 2023 14:09:24 +0000 (10:09 -0400)] 
double-check for bad packets.  Fixes #5060

2 years agoadd definition for decline. Helps with #5060
Alan T. DeKok [Wed, 14 Jun 2023 14:06:17 +0000 (10:06 -0400)] 
add definition for decline.  Helps with #5060

2 years agoremove unused label
Alan T. DeKok [Wed, 14 Jun 2023 03:13:57 +0000 (23:13 -0400)] 
remove unused label

2 years agomove "set priority or discard"
Alan T. DeKok [Wed, 14 Jun 2023 02:20:51 +0000 (22:20 -0400)] 
move "set priority or discard"

to just before "send packet to worker"

2 years agoremove unused priority from mod_read()
Alan T. DeKok [Wed, 14 Jun 2023 02:07:22 +0000 (22:07 -0400)] 
remove unused priority from mod_read()

this is now a function of the app (proto_radius), and not the
IO layer (proto_radius_udp)

2 years agoset the priority if there's a mod_priority_set() function
Alan T. DeKok [Wed, 14 Jun 2023 01:53:11 +0000 (21:53 -0400)] 
set the priority if there's a mod_priority_set() function

because the app_io routines probably shouldn't be setting the
priority for each packet.

2 years agoadd mod_priority_set(), as with all of the other listeners
Alan T. DeKok [Wed, 14 Jun 2023 01:46:49 +0000 (21:46 -0400)] 
add mod_priority_set(), as with all of the other listeners

because setting the packet priority is a function of the protocol
(i.e. proto_radius), and not of the IO handler (e.g. proto_radius_udp)

2 years agoremove is_dup parameter from app_io mod_read()
Alan T. DeKok [Wed, 14 Jun 2023 01:35:21 +0000 (21:35 -0400)] 
remove is_dup parameter from app_io mod_read()

nothing used it, so it's not necessary.

The base IO routines should just read packets.  The code which adds
tracking should instead check for duplicates.

2 years agoMore SoH clean-ups
Jorge Pereira [Wed, 14 Jun 2023 00:19:41 +0000 (21:19 -0300)] 
More SoH clean-ups

Remove all doc references

2 years agoFix formatting in dhcpv6 (#5053)
Jorge Pereira [Tue, 13 Jun 2023 17:33:34 +0000 (14:33 -0300)] 
Fix formatting in dhcpv6 (#5053)

2 years agotls: Make request optional in more places
Arran Cudbard-Bell [Tue, 13 Jun 2023 17:32:31 +0000 (13:32 -0400)] 
tls: Make request optional in more places

2 years agoAdd TEST_CHECK_SLEN_RETURN() and use as appropriate in sbuff tests (#5050)
James Jones [Tue, 13 Jun 2023 15:18:12 +0000 (10:18 -0500)] 
Add TEST_CHECK_SLEN_RETURN() and use as appropriate in sbuff tests (#5050)

Test code typically only looks at check results to the extent
necessary to report errors. That means that even if the functions
tests call are correctly modeled, coverity will rightly see that,
for example, some buffers may not be initialized.

We therefore write TEST_CHECK_SLEN_RETURN(), which does what
TEST_CHECK_SLEN() does and then returns if the check fails.

2 years agoClean up remains of SoH protocol (#5052)
Jorge Pereira [Tue, 13 Jun 2023 08:36:34 +0000 (05:36 -0300)] 
Clean up remains of SoH protocol (#5052)

Related to the previous 309f347 commit.

2 years agoRemove unused variable (#5049)
Jorge Pereira [Mon, 12 Jun 2023 19:57:10 +0000 (16:57 -0300)] 
Remove unused variable (#5049)

2 years agoCI: fix with latest mariadb 11 docker image
Matthew Newton [Mon, 12 Jun 2023 19:14:35 +0000 (20:14 +0100)] 
CI: fix with latest mariadb 11 docker image

ref https://jira.mariadb.org/browse/MDBF-568

2 years agotls: SSL_set_verify is used in the session alloc functions, so we don't need to call...
Arran Cudbard-Bell [Mon, 12 Jun 2023 17:57:32 +0000 (13:57 -0400)] 
tls: SSL_set_verify is used in the session alloc functions, so we don't need to call it in the SSL_CTX alloc function

2 years agojust nuke erroneous Proxy-State attributes
Alan T. DeKok [Mon, 12 Jun 2023 17:40:33 +0000 (13:40 -0400)] 
just nuke erroneous Proxy-State attributes

There's no reason for a policy or module to create / inspect / use
Proxy-State.  It's strictly a RADIUS client-server signalling
attribute.

2 years agoremove SoH protocol API.
Alan T. DeKok [Mon, 12 Jun 2023 17:34:09 +0000 (13:34 -0400)] 
remove SoH protocol API.

It's been dead for a long time.

2 years agoAdd new Huawei VSA, Closes #5016
Arran Cudbard-Bell [Mon, 12 Jun 2023 16:44:49 +0000 (12:44 -0400)] 
Add new Huawei VSA, Closes #5016

2 years agoTLS changes required for native redis TLS support (#5046)
Max Khon [Mon, 12 Jun 2023 16:41:06 +0000 (17:41 +0100)] 
TLS changes required for native redis TLS support (#5046)

* Allow empty tls configuration

2 years agoModel tmpl_print()
James Jones [Mon, 12 Jun 2023 13:58:19 +0000 (08:58 -0500)] 
Model tmpl_print()

2 years agoRemove needless benign redefinition of TEST_CHECK_SLEN()
James Jones [Mon, 12 Jun 2023 15:39:08 +0000 (10:39 -0500)] 
Remove needless benign redefinition of TEST_CHECK_SLEN()

2 years agoRemove dup macros from dbuff_tests
Arran Cudbard-Bell [Mon, 12 Jun 2023 16:34:59 +0000 (12:34 -0400)] 
Remove dup macros from dbuff_tests

2 years agotls: Make fr_tls_session_alloc_client work without a bound request
Arran Cudbard-Bell [Mon, 12 Jun 2023 16:07:27 +0000 (12:07 -0400)] 
tls: Make fr_tls_session_alloc_client work without a bound request

2 years agounlang: Component isn't used for module compilation anymore
Arran Cudbard-Bell [Fri, 9 Jun 2023 18:19:00 +0000 (14:19 -0400)] 
unlang: Component isn't used for module compilation anymore

2 years agoradius: Don't add proxy state if there's already proxy state attributes in the reponse.
Arran Cudbard-Bell [Fri, 9 Jun 2023 15:31:04 +0000 (11:31 -0400)] 
radius: Don't add proxy state if there's already proxy state attributes in the reponse.

2 years agosubrequest: Don't crash in debug builds when a detached subrequest is about to exit
Arran Cudbard-Bell [Fri, 9 Jun 2023 15:22:02 +0000 (11:22 -0400)] 
subrequest:  Don't crash in debug builds when a detached subrequest is about to exit

2 years agoUse module method names to set methods for DHCP send sections
Nick Porter [Thu, 8 Jun 2023 09:50:51 +0000 (10:50 +0100)] 
Use module method names to set methods for DHCP send sections

2 years agoRemove tmpls from rlm_redis_ippool_t
Nick Porter [Thu, 8 Jun 2023 09:08:57 +0000 (10:08 +0100)] 
Remove tmpls from rlm_redis_ippool_t

2 years agoRemove un-used ippool_pool_name()
Nick Porter [Thu, 8 Jun 2023 09:02:06 +0000 (10:02 +0100)] 
Remove un-used ippool_pool_name()

2 years agoRe-work redis_ippool method calls to use call environment
Nick Porter [Thu, 8 Jun 2023 08:39:14 +0000 (09:39 +0100)] 
Re-work redis_ippool method calls to use call environment

2 years agoAdd a call environment to rlm_redis_ippool
Nick Porter [Wed, 7 Jun 2023 16:23:34 +0000 (17:23 +0100)] 
Add a call environment to rlm_redis_ippool

2 years agoAdd check that tmpl exands to attr ref when type == FR_TYPE_ATTRIBUTE
Nick Porter [Thu, 8 Jun 2023 08:41:05 +0000 (09:41 +0100)] 
Add check that tmpl exands to attr ref when type == FR_TYPE_ATTRIBUTE

2 years agoAdd tmpl only call environment entries
Nick Porter [Wed, 7 Jun 2023 13:44:24 +0000 (14:44 +0100)] 
Add tmpl only call environment entries

For use where the requirement is just a tmpl to produce output pair(s)

2 years agoCorrect function name in comment
James Jones [Thu, 8 Jun 2023 16:09:00 +0000 (11:09 -0500)] 
Correct function name in comment

2 years agoTest get_chunk() return value in some simple cases
James Jones [Thu, 1 Jun 2023 15:00:49 +0000 (10:00 -0500)] 
Test get_chunk() return value in some simple cases

Those are cases that use a byte-swapped value, which sets off
coverity's tainted data alarms. Adding the same check used for
the more complex cases shoulo placate coverity and let us get
rid of the annotations that follow get_check() invocations.

2 years agoAdd test of removing static IP assignment
Nick Porter [Tue, 30 May 2023 15:13:09 +0000 (16:13 +0100)] 
Add test of removing static IP assignment

2 years agoSplit static and dynamic leases in redis_ippool_tool statistics
Nick Porter [Tue, 30 May 2023 12:26:31 +0000 (13:26 +0100)] 
Split static and dynamic leases in redis_ippool_tool statistics

2 years agoAdd un-assignment of static leases to redis_ippool_tool
Nick Porter [Tue, 30 May 2023 09:43:18 +0000 (10:43 +0100)] 
Add un-assignment of static leases to redis_ippool_tool

2 years agoTidy other redis_ippool tests
Nick Porter [Thu, 25 May 2023 14:32:25 +0000 (15:32 +0100)] 
Tidy other redis_ippool tests

2 years agoAdd tests of static redis_ippool assignments
Nick Porter [Thu, 25 May 2023 12:44:08 +0000 (13:44 +0100)] 
Add tests of static redis_ippool assignments

2 years agoUpdate rlm_redis_ippool_tool to be able to add static assignments
Nick Porter [Mon, 15 May 2023 16:47:53 +0000 (17:47 +0100)] 
Update rlm_redis_ippool_tool to be able to add static assignments

2 years agoAdd a uctx to redis_ippool_queue_t callback
Nick Porter [Mon, 15 May 2023 16:49:32 +0000 (17:49 +0100)] 
Add a uctx to redis_ippool_queue_t callback

Allows call specific data to be passed

2 years agoRenumber lines in redis_ippool Lua scripts
Nick Porter [Tue, 30 May 2023 07:59:19 +0000 (08:59 +0100)] 
Renumber lines in redis_ippool Lua scripts

2 years agoUpdate redis_ippool to allow for static IP allocation
Nick Porter [Mon, 15 May 2023 16:42:21 +0000 (17:42 +0100)] 
Update redis_ippool to allow for static IP allocation

Static allocations are defined by a ZSCORE with bit 52 set in the <pool_name>:pool ZSET and pre-created entries in the <pool_name>:ip:<address> hash and <pool_name>:device:<owner> key

2 years agoremove SoH support
Alan T. DeKok [Thu, 8 Jun 2023 08:03:04 +0000 (10:03 +0200)] 
remove SoH support

2 years agobuild out make util library, too
Alan T. DeKok [Thu, 8 Jun 2023 08:02:01 +0000 (10:02 +0200)] 
build out make util library, too

2 years agoremove SoH tests
Alan T. DeKok [Thu, 8 Jun 2023 07:57:11 +0000 (09:57 +0200)] 
remove SoH tests

2 years agouse IPV6_BOUND_IF, too.
Alan T. DeKok [Thu, 8 Jun 2023 07:37:36 +0000 (09:37 +0200)] 
use IPV6_BOUND_IF, too.

And minor cleanups and consistency changes

2 years agoRemove rlm_soh
Alan T. DeKok [Mon, 29 May 2023 19:42:46 +0000 (15:42 -0400)] 
Remove rlm_soh

Microsoft deprecated SoH / NAP in Windows Server 2012 E2, and
removed it from Windows Server 2016.  The NAP client was removed
in Windows 10, in 2015

2 years agoCorrect calculation of tmpl pointer
Nick Porter [Wed, 7 Jun 2023 14:54:44 +0000 (15:54 +0100)] 
Correct calculation of tmpl pointer

2 years agoUse udp_len in UDP length checks
James Jones [Fri, 2 Jun 2023 13:45:24 +0000 (08:45 -0500)] 
Use udp_len in UDP length checks

Coverity appears to be faked out by the use of diff to
validate udp_len, and hence complains about tainted data.

2 years agoRewrite check on length in dhcpv6_print_hex()
James Jones [Fri, 2 Jun 2023 18:44:47 +0000 (13:44 -0500)] 
Rewrite check on length in dhcpv6_print_hex()

We suspect that coverity is confused by the check as written, and
so rewrite it so that the variable checked is alone on the LHS of
the comparison.

2 years agoradius: Make it impossible for the user to modify Proxy-State attributes, as we do...
Arran Cudbard-Bell [Tue, 6 Jun 2023 16:41:37 +0000 (12:41 -0400)] 
radius: Make it impossible for the user to modify Proxy-State attributes, as we do with DHCPv6 and response fields

2 years agoRemove NO_RCTX state machine macros, there's always an RCTX now
Arran Cudbard-Bell [Tue, 6 Jun 2023 16:41:08 +0000 (12:41 -0400)] 
Remove NO_RCTX state machine macros, there's always an RCTX now

2 years agoRevert "Quick hack to try and get tests passing again"
Arran Cudbard-Bell [Tue, 6 Jun 2023 13:20:38 +0000 (09:20 -0400)] 
Revert "Quick hack to try and get tests passing again"

This reverts commit 82ef4fc33b2d61fe3da92501b036f6db59fde5c5.

2 years agoDO_NOT_RESPOND is a valid reply packet type for DHCP
Nick Porter [Tue, 6 Jun 2023 11:29:50 +0000 (12:29 +0100)] 
DO_NOT_RESPOND is a valid reply packet type for DHCP

2 years agoUpdate tests to match echoed back Proxy-State
Nick Porter [Tue, 6 Jun 2023 10:11:30 +0000 (11:11 +0100)] 
Update tests to match echoed back Proxy-State

The module accounting tests use Access-Request packets but call the
modules in accouning context.

Since Access-Request packets are used, the Proxy-State in the request is
reflected back in the Access-Accept