From 6fcc97400a8e6926e6700a050e33cd767d6e67f3 Mon Sep 17 00:00:00 2001 From: Lorenz Kästle <12514511+RincewindsHat@users.noreply.github.com> Date: Wed, 12 Mar 2025 16:19:38 +0100 Subject: check_radius: clang-format --- plugins/check_radius.c | 451 ++++++++++++++++++++++++------------------------- 1 file changed, 221 insertions(+), 230 deletions(-) diff --git a/plugins/check_radius.c b/plugins/check_radius.c index d9ff8fa7..646ffcbe 100644 --- a/plugins/check_radius.c +++ b/plugins/check_radius.c @@ -1,32 +1,32 @@ /***************************************************************************** -* -* Monitoring check_radius plugin -* -* License: GPL -* Copyright (c) 1999-2024 Monitoring Plugins Development Team -* -* Description: -* -* This file contains the check_radius plugin -* -* Tests to see if a radius server is accepting connections. -* -* -* This program is free software: you can redistribute it and/or modify -* it under the terms of the GNU General Public License as published by -* the Free Software Foundation, either version 3 of the License, or -* (at your option) any later version. -* -* This program is distributed in the hope that it will be useful, -* but WITHOUT ANY WARRANTY; without even the implied warranty of -* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -* GNU General Public License for more details. -* -* You should have received a copy of the GNU General Public License -* along with this program. If not, see . -* -* -*****************************************************************************/ + * + * Monitoring check_radius plugin + * + * License: GPL + * Copyright (c) 1999-2024 Monitoring Plugins Development Team + * + * Description: + * + * This file contains the check_radius plugin + * + * Tests to see if a radius server is accepting connections. + * + * + * This program is free software: you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation, either version 3 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program. If not, see . + * + * + *****************************************************************************/ const char *progname = "check_radius"; const char *copyright = "2000-2024"; @@ -37,45 +37,45 @@ const char *email = "devel@monitoring-plugins.org"; #include "netutils.h" #if defined(HAVE_LIBRADCLI) -#include +# include #elif defined(HAVE_LIBFREERADIUS_CLIENT) -#include +# include #elif defined(HAVE_LIBRADIUSCLIENT_NG) -#include +# include #else -#include +# include #endif -static int process_arguments (int /*argc*/, char ** /*argv*/); -static void print_help (void); -void print_usage (void); +static int process_arguments(int /*argc*/, char ** /*argv*/); +static void print_help(void); +void print_usage(void); #if defined(HAVE_LIBFREERADIUS_CLIENT) || defined(HAVE_LIBRADIUSCLIENT_NG) || defined(HAVE_LIBRADCLI) -#define my_rc_conf_str(a) rc_conf_str(rch,a) -#if defined(HAVE_LIBRADCLI) -#define my_rc_send_server(a,b) rc_send_server(rch,a,b,AUTH) -#else -#define my_rc_send_server(a,b) rc_send_server(rch,a,b) -#endif -#if defined(HAVE_LIBFREERADIUS_CLIENT) || defined(HAVE_LIBRADCLI) -#define my_rc_buildreq(a,b,c,d,e,f) rc_buildreq(rch,a,b,c,d,(a)->secret,e,f) -#else -#define my_rc_buildreq(a,b,c,d,e,f) rc_buildreq(rch,a,b,c,d,e,f) -#endif -#define my_rc_avpair_add(a,b,c,d) rc_avpair_add(rch,a,b,c,-1,d) -#define my_rc_read_dictionary(a) rc_read_dictionary(rch, a) +# define my_rc_conf_str(a) rc_conf_str(rch, a) +# if defined(HAVE_LIBRADCLI) +# define my_rc_send_server(a, b) rc_send_server(rch, a, b, AUTH) +# else +# define my_rc_send_server(a, b) rc_send_server(rch, a, b) +# endif +# if defined(HAVE_LIBFREERADIUS_CLIENT) || defined(HAVE_LIBRADCLI) +# define my_rc_buildreq(a, b, c, d, e, f) rc_buildreq(rch, a, b, c, d, (a)->secret, e, f) +# else +# define my_rc_buildreq(a, b, c, d, e, f) rc_buildreq(rch, a, b, c, d, e, f) +# endif +# define my_rc_avpair_add(a, b, c, d) rc_avpair_add(rch, a, b, c, -1, d) +# define my_rc_read_dictionary(a) rc_read_dictionary(rch, a) #else -#define my_rc_conf_str(a) rc_conf_str(a) -#define my_rc_send_server(a,b) rc_send_server(a, b) -#define my_rc_buildreq(a,b,c,d,e,f) rc_buildreq(a,b,c,d,e,f) -#define my_rc_avpair_add(a,b,c,d) rc_avpair_add(a, b, c, d) -#define my_rc_read_dictionary(a) rc_read_dictionary(a) +# define my_rc_conf_str(a) rc_conf_str(a) +# define my_rc_send_server(a, b) rc_send_server(a, b) +# define my_rc_buildreq(a, b, c, d, e, f) rc_buildreq(a, b, c, d, e, f) +# define my_rc_avpair_add(a, b, c, d) rc_avpair_add(a, b, c, d) +# define my_rc_read_dictionary(a) rc_read_dictionary(a) #endif /* REJECT_RC is only defined in some version of radiusclient. It has * been reported from radiusclient-ng 0.5.6 on FreeBSD 7.2-RELEASE */ #ifndef REJECT_RC -#define REJECT_RC BADRESP_RC +# define REJECT_RC BADRESP_RC #endif static int my_rc_read_config(char * /*a*/); @@ -148,11 +148,7 @@ Please note that all tags must be lowercase to use the DocBook XML DTD. -@@ ******************************************************************************/ - - -int -main (int argc, char **argv) -{ +int main(int argc, char **argv) { struct sockaddr_storage ss; char name[HOST_NAME_MAX]; #ifdef RC_BUFFER_LEN @@ -165,131 +161,130 @@ main (int argc, char **argv) uint32_t client_id, service; char *str; - setlocale (LC_ALL, ""); - bindtextdomain (PACKAGE, LOCALEDIR); - textdomain (PACKAGE); + setlocale(LC_ALL, ""); + bindtextdomain(PACKAGE, LOCALEDIR); + textdomain(PACKAGE); /* Parse extra opts if any */ - argv=np_extra_opts (&argc, argv, progname); + argv = np_extra_opts(&argc, argv, progname); - if (process_arguments (argc, argv) == ERROR) - usage4 (_("Could not parse arguments")); + if (process_arguments(argc, argv) == ERROR) { + usage4(_("Could not parse arguments")); + } - str = strdup ("dictionary"); - if ((config_file && my_rc_read_config (config_file)) || - my_rc_read_dictionary (my_rc_conf_str (str))) - die (STATE_UNKNOWN, _("Config file error\n")); + str = strdup("dictionary"); + if ((config_file && my_rc_read_config(config_file)) || my_rc_read_dictionary(my_rc_conf_str(str))) { + die(STATE_UNKNOWN, _("Config file error\n")); + } service = PW_AUTHENTICATE_ONLY; - memset (&data, 0, sizeof(data)); - if (!(my_rc_avpair_add (&data.send_pairs, PW_SERVICE_TYPE, &service, 0) && - my_rc_avpair_add (&data.send_pairs, PW_USER_NAME, username, 0) && - my_rc_avpair_add (&data.send_pairs, PW_USER_PASSWORD, password, 0) - )) - die (STATE_UNKNOWN, _("Out of Memory?\n")); + memset(&data, 0, sizeof(data)); + if (!(my_rc_avpair_add(&data.send_pairs, PW_SERVICE_TYPE, &service, 0) && + my_rc_avpair_add(&data.send_pairs, PW_USER_NAME, username, 0) && + my_rc_avpair_add(&data.send_pairs, PW_USER_PASSWORD, password, 0))) { + die(STATE_UNKNOWN, _("Out of Memory?\n")); + } if (nasid != NULL) { - if (!(my_rc_avpair_add (&data.send_pairs, PW_NAS_IDENTIFIER, nasid, 0))) - die (STATE_UNKNOWN, _("Invalid NAS-Identifier\n")); + if (!(my_rc_avpair_add(&data.send_pairs, PW_NAS_IDENTIFIER, nasid, 0))) { + die(STATE_UNKNOWN, _("Invalid NAS-Identifier\n")); + } } if (nasipaddress == NULL) { - if (gethostname (name, sizeof(name)) != 0) - die (STATE_UNKNOWN, _("gethostname() failed!\n")); + if (gethostname(name, sizeof(name)) != 0) { + die(STATE_UNKNOWN, _("gethostname() failed!\n")); + } nasipaddress = name; } - if (!dns_lookup (nasipaddress, &ss, AF_INET)) /* TODO: Support IPv6. */ - die (STATE_UNKNOWN, _("Invalid NAS-IP-Address\n")); - client_id = ntohl (((struct sockaddr_in *)&ss)->sin_addr.s_addr); - if (my_rc_avpair_add (&(data.send_pairs), PW_NAS_IP_ADDRESS, &client_id, 0) == NULL) - die (STATE_UNKNOWN, _("Invalid NAS-IP-Address\n")); - - my_rc_buildreq (&data, PW_ACCESS_REQUEST, server, port, (int)timeout_interval, - retries); - - result = my_rc_send_server (&data, msg); - rc_avpair_free (data.send_pairs); - if (data.receive_pairs) - rc_avpair_free (data.receive_pairs); - - if (result == TIMEOUT_RC) - die (STATE_CRITICAL, _("Timeout\n")); - if (result == ERROR_RC) - die (STATE_CRITICAL, _("Auth Error\n")); - if (result == REJECT_RC) - die (STATE_WARNING, _("Auth Failed\n")); - if (result == BADRESP_RC) - die (STATE_WARNING, _("Bad Response\n")); - if (expect && !strstr (msg, expect)) - die (STATE_WARNING, "%s\n", msg); - if (result == OK_RC) - die (STATE_OK, _("Auth OK\n")); - (void)snprintf(msg, sizeof(msg), _("Unexpected result code %d"), result); - die (STATE_UNKNOWN, "%s\n", msg); -} + if (!dns_lookup(nasipaddress, &ss, AF_INET)) { /* TODO: Support IPv6. */ + die(STATE_UNKNOWN, _("Invalid NAS-IP-Address\n")); + } + client_id = ntohl(((struct sockaddr_in *)&ss)->sin_addr.s_addr); + if (my_rc_avpair_add(&(data.send_pairs), PW_NAS_IP_ADDRESS, &client_id, 0) == NULL) { + die(STATE_UNKNOWN, _("Invalid NAS-IP-Address\n")); + } + + my_rc_buildreq(&data, PW_ACCESS_REQUEST, server, port, (int)timeout_interval, retries); + result = my_rc_send_server(&data, msg); + rc_avpair_free(data.send_pairs); + if (data.receive_pairs) { + rc_avpair_free(data.receive_pairs); + } + if (result == TIMEOUT_RC) { + die(STATE_CRITICAL, _("Timeout\n")); + } + if (result == ERROR_RC) { + die(STATE_CRITICAL, _("Auth Error\n")); + } + if (result == REJECT_RC) { + die(STATE_WARNING, _("Auth Failed\n")); + } + if (result == BADRESP_RC) { + die(STATE_WARNING, _("Bad Response\n")); + } + if (expect && !strstr(msg, expect)) { + die(STATE_WARNING, "%s\n", msg); + } + if (result == OK_RC) { + die(STATE_OK, _("Auth OK\n")); + } + (void)snprintf(msg, sizeof(msg), _("Unexpected result code %d"), result); + die(STATE_UNKNOWN, "%s\n", msg); +} /* process command-line arguments */ -int -process_arguments (int argc, char **argv) -{ +int process_arguments(int argc, char **argv) { int c; int option = 0; - static struct option longopts[] = { - {"hostname", required_argument, 0, 'H'}, - {"port", required_argument, 0, 'P'}, - {"username", required_argument, 0, 'u'}, - {"password", required_argument, 0, 'p'}, - {"nas-id", required_argument, 0, 'n'}, - {"nas-ip-address", required_argument, 0, 'N'}, - {"filename", required_argument, 0, 'F'}, - {"expect", required_argument, 0, 'e'}, - {"retries", required_argument, 0, 'r'}, - {"timeout", required_argument, 0, 't'}, - {"verbose", no_argument, 0, 'v'}, - {"version", no_argument, 0, 'V'}, - {"help", no_argument, 0, 'h'}, - {0, 0, 0, 0} - }; + static struct option longopts[] = {{"hostname", required_argument, 0, 'H'}, {"port", required_argument, 0, 'P'}, + {"username", required_argument, 0, 'u'}, {"password", required_argument, 0, 'p'}, + {"nas-id", required_argument, 0, 'n'}, {"nas-ip-address", required_argument, 0, 'N'}, + {"filename", required_argument, 0, 'F'}, {"expect", required_argument, 0, 'e'}, + {"retries", required_argument, 0, 'r'}, {"timeout", required_argument, 0, 't'}, + {"verbose", no_argument, 0, 'v'}, {"version", no_argument, 0, 'V'}, + {"help", no_argument, 0, 'h'}, {0, 0, 0, 0}}; while (1) { - c = getopt_long (argc, argv, "+hVvH:P:F:u:p:n:N:t:r:e:", longopts, - &option); + c = getopt_long(argc, argv, "+hVvH:P:F:u:p:n:N:t:r:e:", longopts, &option); - if (c == -1 || c == EOF || c == 1) + if (c == -1 || c == EOF || c == 1) { break; + } switch (c) { - case '?': /* print short usage statement if args not parsable */ - usage5 (); - case 'h': /* help */ - print_help (); - exit (STATE_UNKNOWN); - case 'V': /* version */ - print_revision (progname, NP_VERSION); - exit (STATE_UNKNOWN); - case 'v': /* verbose mode */ + case '?': /* print short usage statement if args not parsable */ + usage5(); + case 'h': /* help */ + print_help(); + exit(STATE_UNKNOWN); + case 'V': /* version */ + print_revision(progname, NP_VERSION); + exit(STATE_UNKNOWN); + case 'v': /* verbose mode */ verbose = true; break; - case 'H': /* hostname */ - if (!is_host (optarg)) { - usage2 (_("Invalid hostname/address"), optarg); + case 'H': /* hostname */ + if (!is_host(optarg)) { + usage2(_("Invalid hostname/address"), optarg); } server = optarg; break; - case 'P': /* port */ - if (is_intnonneg (optarg)) - port = (unsigned short)atoi (optarg); - else - usage4 (_("Port must be a positive integer")); + case 'P': /* port */ + if (is_intnonneg(optarg)) { + port = (unsigned short)atoi(optarg); + } else { + usage4(_("Port must be a positive integer")); + } break; - case 'u': /* username */ + case 'u': /* username */ username = optarg; break; - case 'p': /* password */ + case 'p': /* password */ password = strdup(optarg); /* Delete the password from process list */ @@ -298,115 +293,111 @@ process_arguments (int argc, char **argv) optarg++; } break; - case 'n': /* nas id */ + case 'n': /* nas id */ nasid = optarg; break; - case 'N': /* nas ip address */ + case 'N': /* nas ip address */ nasipaddress = optarg; break; - case 'F': /* configuration file */ + case 'F': /* configuration file */ config_file = optarg; break; - case 'e': /* expect */ + case 'e': /* expect */ expect = optarg; break; - case 'r': /* retries */ - if (is_intpos (optarg)) - retries = atoi (optarg); - else - usage4 (_("Number of retries must be a positive integer")); + case 'r': /* retries */ + if (is_intpos(optarg)) { + retries = atoi(optarg); + } else { + usage4(_("Number of retries must be a positive integer")); + } break; - case 't': /* timeout */ - if (is_intpos (optarg)) - timeout_interval = (unsigned)atoi (optarg); - else - usage2 (_("Timeout interval must be a positive integer"), optarg); + case 't': /* timeout */ + if (is_intpos(optarg)) { + timeout_interval = (unsigned)atoi(optarg); + } else { + usage2(_("Timeout interval must be a positive integer"), optarg); + } break; } } - if (server == NULL) - usage4 (_("Hostname was not supplied")); - if (username == NULL) - usage4 (_("User not specified")); - if (password == NULL) - usage4 (_("Password not specified")); - if (config_file == NULL) - usage4 (_("Configuration file not specified")); + if (server == NULL) { + usage4(_("Hostname was not supplied")); + } + if (username == NULL) { + usage4(_("User not specified")); + } + if (password == NULL) { + usage4(_("Password not specified")); + } + if (config_file == NULL) { + usage4(_("Configuration file not specified")); + } return OK; } - - -void -print_help (void) -{ +void print_help(void) { char *myport; - xasprintf (&myport, "%d", PW_AUTH_UDP_PORT); + xasprintf(&myport, "%d", PW_AUTH_UDP_PORT); - print_revision (progname, NP_VERSION); + print_revision(progname, NP_VERSION); - printf ("Copyright (c) 1999 Robert August Vincent II\n"); - printf (COPYRIGHT, copyright, email); + printf("Copyright (c) 1999 Robert August Vincent II\n"); + printf(COPYRIGHT, copyright, email); printf("%s\n", _("Tests to see if a RADIUS server is accepting connections.")); - printf ("\n\n"); - - print_usage (); - - printf (UT_HELP_VRSN); - printf (UT_EXTRA_OPTS); - - printf (UT_HOST_PORT, 'P', myport); - - printf (" %s\n", "-u, --username=STRING"); - printf (" %s\n", _("The user to authenticate")); - printf (" %s\n", "-p, --password=STRING"); - printf (" %s\n", _("Password for authentication (SECURITY RISK)")); - printf (" %s\n", "-n, --nas-id=STRING"); - printf (" %s\n", _("NAS identifier")); - printf (" %s\n", "-N, --nas-ip-address=STRING"); - printf (" %s\n", _("NAS IP Address")); - printf (" %s\n", "-F, --filename=STRING"); - printf (" %s\n", _("Configuration file")); - printf (" %s\n", "-e, --expect=STRING"); - printf (" %s\n", _("Response string to expect from the server")); - printf (" %s\n", "-r, --retries=INTEGER"); - printf (" %s\n", _("Number of times to retry a failed connection")); - - printf (UT_CONN_TIMEOUT, timeout_interval); - - printf ("\n"); - printf ("%s\n", _("This plugin tests a RADIUS server to see if it is accepting connections.")); - printf ("%s\n", _("The server to test must be specified in the invocation, as well as a user")); - printf ("%s\n", _("name and password. A configuration file must be present. The format of")); - printf ("%s\n", _("the configuration file is described in the radiusclient library sources.")); - printf ("%s\n", _("The password option presents a substantial security issue because the")); - printf ("%s\n", _("password can possibly be determined by careful watching of the command line")); - printf ("%s\n", _("in a process listing. This risk is exacerbated because the plugin will")); - printf ("%s\n", _("typically be executed at regular predictable intervals. Please be sure that")); - printf ("%s\n", _("the password used does not allow access to sensitive system resources.")); - - printf (UT_SUPPORT); + printf("\n\n"); + + print_usage(); + + printf(UT_HELP_VRSN); + printf(UT_EXTRA_OPTS); + + printf(UT_HOST_PORT, 'P', myport); + + printf(" %s\n", "-u, --username=STRING"); + printf(" %s\n", _("The user to authenticate")); + printf(" %s\n", "-p, --password=STRING"); + printf(" %s\n", _("Password for authentication (SECURITY RISK)")); + printf(" %s\n", "-n, --nas-id=STRING"); + printf(" %s\n", _("NAS identifier")); + printf(" %s\n", "-N, --nas-ip-address=STRING"); + printf(" %s\n", _("NAS IP Address")); + printf(" %s\n", "-F, --filename=STRING"); + printf(" %s\n", _("Configuration file")); + printf(" %s\n", "-e, --expect=STRING"); + printf(" %s\n", _("Response string to expect from the server")); + printf(" %s\n", "-r, --retries=INTEGER"); + printf(" %s\n", _("Number of times to retry a failed connection")); + + printf(UT_CONN_TIMEOUT, timeout_interval); + + printf("\n"); + printf("%s\n", _("This plugin tests a RADIUS server to see if it is accepting connections.")); + printf("%s\n", _("The server to test must be specified in the invocation, as well as a user")); + printf("%s\n", _("name and password. A configuration file must be present. The format of")); + printf("%s\n", _("the configuration file is described in the radiusclient library sources.")); + printf("%s\n", _("The password option presents a substantial security issue because the")); + printf("%s\n", _("password can possibly be determined by careful watching of the command line")); + printf("%s\n", _("in a process listing. This risk is exacerbated because the plugin will")); + printf("%s\n", _("typically be executed at regular predictable intervals. Please be sure that")); + printf("%s\n", _("the password used does not allow access to sensitive system resources.")); + + printf(UT_SUPPORT); } - - -void -print_usage (void) -{ - printf ("%s\n", _("Usage:")); - printf ("%s -H host -F config_file -u username -p password\n\ +void print_usage(void) { + printf("%s\n", _("Usage:")); + printf("%s -H host -F config_file -u username -p password\n\ [-P port] [-t timeout] [-r retries] [-e expect]\n\ - [-n nas-id] [-N nas-ip-addr]\n", progname); + [-n nas-id] [-N nas-ip-addr]\n", + progname); } - - -int my_rc_read_config(char * a) -{ +int my_rc_read_config(char *a) { #if defined(HAVE_LIBFREERADIUS_CLIENT) || defined(HAVE_LIBRADIUSCLIENT_NG) || defined(HAVE_LIBRADCLI) rch = rc_read_config(a); return (rch == NULL) ? 1 : 0; -- cgit v1.2.3-74-g34f1