Home | History | Annotate | Download | only in radius

Lines Matching refs:send

124     VALUE_PAIR *avp;	/* Additional (user supplied) vp's to send to server */
248 VALUE_PAIR *send, *received;
269 send = NULL;
277 rc_avpair_add(&send, PW_SERVICE_TYPE, &av_type, 0, VENDOR_NONE);
280 rc_avpair_add(&send, PW_FRAMED_PROTOCOL, &av_type, 0, VENDOR_NONE);
282 rc_avpair_add(&send, PW_USER_NAME, rstate.user , 0, VENDOR_NONE);
283 rc_avpair_add(&send, PW_USER_PASSWORD, passwd, 0, VENDOR_NONE);
285 rc_avpair_add(&send, PW_CALLING_STATION_ID, remote_number, 0,
288 rc_avpair_add(&send, PW_CALLING_STATION_ID, ipparam, 0, VENDOR_NONE);
292 rc_avpair_insert(&send, NULL, rc_avpair_copy(rstate.avp));
296 rstate.client_port, send,
299 result = rc_auth(rstate.client_port, send, &received, radius_msg, NULL);
310 rc_avpair_free(send);
337 VALUE_PAIR *send, *received;
382 send = received = NULL;
385 rc_avpair_add (&send, PW_SERVICE_TYPE, &av_type, 0, VENDOR_NONE);
388 rc_avpair_add (&send, PW_FRAMED_PROTOCOL, &av_type, 0, VENDOR_NONE);
390 rc_avpair_add (&send, PW_USER_NAME, rstate.user , 0, VENDOR_NONE);
403 rc_avpair_add(&send, PW_CHAP_CHALLENGE,
405 rc_avpair_add(&send, PW_CHAP_PASSWORD,
426 rc_avpair_add(&send, PW_MS_CHAP_CHALLENGE,
428 rc_avpair_add(&send, PW_MS_CHAP_RESPONSE,
451 rc_avpair_add(&send, PW_MS_CHAP_CHALLENGE,
453 rc_avpair_add(&send, PW_MS_CHAP2_RESPONSE,
461 rc_avpair_add(&send, PW_CALLING_STATION_ID, remote_number, 0,
464 rc_avpair_add(&send, PW_CALLING_STATION_ID, ipparam, 0, VENDOR_NONE);
468 rc_avpair_insert(&send, NULL, rc_avpair_copy(rstate.avp));
476 rstate.client_port, send,
479 result = rc_auth(rstate.client_port, send, &received, radius_msg,
496 rc_avpair_free (send);
554 /* Send RADIUS attributes to anyone else who might be interested */
602 /* Send accounting updates every few seconds */
668 "Send": "Recv");
774 * vp -- value pair holding MS-MPPE-SEND-KEY or MS-MPPE-RECV-KEY attribute
791 char *type = "Send";
854 VALUE_PAIR *send = NULL;
866 rc_avpair_add(&send, PW_ACCT_SESSION_ID,
868 rc_avpair_add(&send, PW_USER_NAME,
872 rc_avpair_add(&send, PW_CLASS,
876 rc_avpair_add(&send, PW_ACCT_STATUS_TYPE, &av_type, 0, VENDOR_NONE);
879 rc_avpair_add(&send, PW_SERVICE_TYPE, &av_type, 0, VENDOR_NONE);
882 rc_avpair_add(&send, PW_FRAMED_PROTOCOL, &av_type, 0, VENDOR_NONE);
885 rc_avpair_add(&send, PW_CALLING_STATION_ID,
888 rc_avpair_add(&send, PW_CALLING_STATION_ID, ipparam, 0, VENDOR_NONE);
891 rc_avpair_add(&send, PW_ACCT_AUTHENTIC, &av_type, 0, VENDOR_NONE);
895 rc_avpair_add(&send, PW_NAS_PORT_TYPE, &av_type, 0, VENDOR_NONE);
899 rc_avpair_add(&send, PW_FRAMED_IP_ADDRESS , &av_type , 0, VENDOR_NONE);
903 rc_avpair_insert(&send, NULL, rc_avpair_copy(rstate.avp));
907 rstate.client_port, send);
909 result = rc_acct(rstate.client_port, send);
912 rc_avpair_free(send);
940 VALUE_PAIR *send = NULL;
954 rc_avpair_add(&send, PW_ACCT_SESSION_ID, rstate.session_id,
957 rc_avpair_add(&send, PW_USER_NAME, rstate.user, 0, VENDOR_NONE);
960 rc_avpair_add(&send, PW_ACCT_STATUS_TYPE, &av_type, 0, VENDOR_NONE);
963 rc_avpair_add(&send, PW_SERVICE_TYPE, &av_type, 0, VENDOR_NONE);
966 rc_avpair_add(&send, PW_FRAMED_PROTOCOL, &av_type, 0, VENDOR_NONE);
969 rc_avpair_add(&send, PW_ACCT_AUTHENTIC, &av_type, 0, VENDOR_NONE);
974 rc_avpair_add(&send, PW_ACCT_SESSION_TIME, &av_type, 0, VENDOR_NONE);
977 rc_avpair_add(&send, PW_ACCT_OUTPUT_OCTETS, &av_type, 0, VENDOR_NONE);
980 rc_avpair_add(&send, PW_ACCT_INPUT_OCTETS, &av_type, 0, VENDOR_NONE);
983 rc_avpair_add(&send, PW_ACCT_OUTPUT_PACKETS, &av_type, 0, VENDOR_NONE);
986 rc_avpair_add(&send, PW_ACCT_INPUT_PACKETS, &av_type, 0, VENDOR_NONE);
990 rc_avpair_add(&send, PW_CALLING_STATION_ID,
993 rc_avpair_add(&send, PW_CALLING_STATION_ID, ipparam, 0, VENDOR_NONE);
996 rc_avpair_add(&send, PW_NAS_PORT_TYPE, &av_type, 0, VENDOR_NONE);
1043 rc_avpair_add(&send, PW_ACCT_TERMINATE_CAUSE, &av_type, 0, VENDOR_NONE);
1047 rc_avpair_add(&send, PW_FRAMED_IP_ADDRESS , &av_type , 0, VENDOR_NONE);
1051 rc_avpair_insert(&send, NULL, rc_avpair_copy(rstate.avp));
1055 rstate.client_port, send);
1057 result = rc_acct(rstate.client_port, send);
1065 rc_avpair_free(send);
1081 VALUE_PAIR *send = NULL;
1094 rc_avpair_add(&send, PW_ACCT_SESSION_ID, rstate.session_id,
1097 rc_avpair_add(&send, PW_USER_NAME, rstate.user, 0, VENDOR_NONE);
1100 rc_avpair_add(&send, PW_ACCT_STATUS_TYPE, &av_type, 0, VENDOR_NONE);
1103 rc_avpair_add(&send, PW_SERVICE_TYPE, &av_type, 0, VENDOR_NONE);
1106 rc_avpair_add(&send, PW_FRAMED_PROTOCOL, &av_type, 0, VENDOR_NONE);
1109 rc_avpair_add(&send, PW_ACCT_AUTHENTIC, &av_type, 0, VENDOR_NONE);
1118 rc_avpair_add(&send, PW_ACCT_SESSION_TIME, &av_type, 0, VENDOR_NONE);
1121 rc_avpair_add(&send, PW_ACCT_OUTPUT_OCTETS, &av_type, 0, VENDOR_NONE);
1124 rc_avpair_add(&send, PW_ACCT_INPUT_OCTETS, &av_type, 0, VENDOR_NONE);
1127 rc_avpair_add(&send, PW_ACCT_OUTPUT_PACKETS, &av_type, 0, VENDOR_NONE);
1130 rc_avpair_add(&send, PW_ACCT_INPUT_PACKETS, &av_type, 0, VENDOR_NONE);
1134 rc_avpair_add(&send, PW_CALLING_STATION_ID,
1137 rc_avpair_add(&send, PW_CALLING_STATION_ID, ipparam, 0, VENDOR_NONE);
1140 rc_avpair_add(&send, PW_NAS_PORT_TYPE, &av_type, 0, VENDOR_NONE);
1144 rc_avpair_add(&send, PW_FRAMED_IP_ADDRESS , &av_type , 0, VENDOR_NONE);
1148 rc_avpair_insert(&send, NULL, rc_avpair_copy(rstate.avp));
1152 rstate.client_port, send);
1154 result = rc_acct(rstate.client_port, send);
1162 rc_avpair_free(send);