summaryrefslogtreecommitdiffstats
path: root/usr.sbin/radiusd/radiusd_radius.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* When system calls indicate an error they return -1, not some arbitraryderaadt2019-06-281-2/+2
| | | | | | value < 0. errno is only updated in this case. Change all (most?) callers of syscalls to follow this better, and let's see if this strictness helps us in the future.
* Pass the debug status to modules. Also some non functional changesyasuoka2019-04-011-3/+8
| | | | (comment, log message, and rearrange lines).
* Update authenticator and message authenticator always. Previous wasyasuoka2019-04-011-2/+2
| | | | | | to keep the original authenticators and modify them only if needed. But actually, there supposed to be no case such that the original authenticators can be used for the client. Original diff from IIJ.
* Make "secret" become a required configuration for both client andyasuoka2019-04-011-28/+29
| | | | | radius module. "secret" for client was required already, but it hadn't cause an error if it's missing. Original diff from IIJ.
* Don't call TAILQ_REMOVE twice. This caused radiusd crash if it has ayasuoka2017-05-301-4/+2
| | | | pending request when it stops.
* Instead of creating a socket with socket() or accept() and thenguenther2016-03-211-13/+3
| | | | | | | | setting the O_NONBLOCK flag on it with fcntl(F_SETFL) afterwards, just pass SOCK_NONBLOCK to socket() or accept4() and get it right to begin with. ok millert@ krw@ beck@ deraadt@ jca@
* Blank lines around pledge call.mmcc2015-11-031-1/+3
|
* Initialize module_radius_req before use it.yasuoka2015-10-271-2/+2
| | | | diff from Yuuichi Someya
* Set O_NONBLOCK for UDP sockets not to block on recv(). Actuallyyasuoka2015-10-271-2/+17
| | | | | | block had happened if an error of the socket is handled by send(). diff from Yuuichi Someya.
* Add pledge(2) for radiusctl(8) and radiusd(8).yasuoka2015-10-191-1/+3
| | | | | | | | | | | - radiusd: "stdio inet" - radiusd_radius: "stdio inet" - radiusd_bsdauth: - "stdio proc" for the non-priviledged process - "stdio getpw rpath proc exec" for the priviledged process - radiusctl: "stdio dns inet" "go ahead" deraadt
* Fix radiusd_radius to use syslog(3). It had used stderr for debug.yasuoka2015-08-021-2/+2
|
* Use the dedicated log function instead of log_warn(). Also, fix theyasuoka2015-07-301-23/+27
| | | | variable name again.
* Fix the variable name for struct radius_server. It was confused.yasuoka2015-07-301-28/+28
|
* q_id didn't pass to radiusd_radius properly. It should be u_int not u_int.yasuoka2015-07-301-2/+2
|
* Stop using _this in radiusd modules.yasuoka2015-07-271-95/+95
|
* Drop the privilege from modules. "radiusd_radius" could simply runyasuoka2015-07-271-5/+4
| | | | | | without root. "radiusd_bsdauth" uses some functions which needs root. So separate its process into a privileged process and a non-privileged process.
* Add radiusd(8) and radiusctl(8). They are WIP. radiusd(8) is a RADIUSyasuoka2015-07-211-0/+613
server and radiusctl(8) is to control the server. radiusd(8) currently supports bsdauth and radius (upstream radius servers) as authentication backends. fixes from jsg blambert ok deraadt