Home | History | Annotate | Download | only in radius

Lines Matching refs:send

126     VALUE_PAIR *avp;	/* Additional (user supplied) vp's to send to server */
250 VALUE_PAIR *send, *received;
271 send = NULL;
279 rc_avpair_add(&send, PW_SERVICE_TYPE, &av_type, 0, VENDOR_NONE);
282 rc_avpair_add(&send, PW_FRAMED_PROTOCOL, &av_type, 0, VENDOR_NONE);
284 rc_avpair_add(&send, PW_USER_NAME, rstate.user , 0, VENDOR_NONE);
285 rc_avpair_add(&send, PW_USER_PASSWORD, passwd, 0, VENDOR_NONE);
287 rc_avpair_add(&send, PW_CALLING_STATION_ID, remote_number, 0,
290 rc_avpair_add(&send, PW_CALLING_STATION_ID, ipparam, 0, VENDOR_NONE);
294 rc_avpair_insert(&send, NULL, rc_avpair_copy(rstate.avp));
298 rstate.client_port, send,
301 result = rc_auth(rstate.client_port, send, &received, radius_msg, NULL);
312 rc_avpair_free(send);
339 VALUE_PAIR *send, *received;
384 send = received = NULL;
387 rc_avpair_add (&send, PW_SERVICE_TYPE, &av_type, 0, VENDOR_NONE);
390 rc_avpair_add (&send, PW_FRAMED_PROTOCOL, &av_type, 0, VENDOR_NONE);
392 rc_avpair_add (&send, PW_USER_NAME, rstate.user , 0, VENDOR_NONE);
405 rc_avpair_add(&send, PW_CHAP_CHALLENGE,
407 rc_avpair_add(&send, PW_CHAP_PASSWORD,
424 rc_avpair_add(&send, PW_MS_CHAP_CHALLENGE,
426 rc_avpair_add(&send, PW_MS_CHAP_RESPONSE,
444 rc_avpair_add(&send, PW_MS_CHAP_CHALLENGE,
446 rc_avpair_add(&send, PW_MS_CHAP2_RESPONSE,
454 rc_avpair_add(&send, PW_CALLING_STATION_ID, remote_number, 0,
457 rc_avpair_add(&send, PW_CALLING_STATION_ID, ipparam, 0, VENDOR_NONE);
461 rc_avpair_insert(&send, NULL, rc_avpair_copy(rstate.avp));
469 rstate.client_port, send,
472 result = rc_auth(rstate.client_port, send, &received, radius_msg,
491 rc_avpair_free (send);
557 /* Send RADIUS attributes to anyone else who might be interested */
617 /* Send accounting updates every few seconds */
686 "Send": "Recv");
811 * vp -- value pair holding MS-MPPE-SEND-KEY or MS-MPPE-RECV-KEY attribute
828 char *type = "Send";
891 VALUE_PAIR *send = NULL;
903 rc_avpair_add(&send, PW_ACCT_SESSION_ID,
905 rc_avpair_add(&send, PW_USER_NAME,
909 rc_avpair_add(&send, PW_CLASS,
913 rc_avpair_add(&send, PW_ACCT_STATUS_TYPE, &av_type, 0, VENDOR_NONE);
916 rc_avpair_add(&send, PW_SERVICE_TYPE, &av_type, 0, VENDOR_NONE);
919 rc_avpair_add(&send, PW_FRAMED_PROTOCOL, &av_type, 0, VENDOR_NONE);
922 rc_avpair_add(&send, PW_CALLING_STATION_ID,
925 rc_avpair_add(&send, PW_CALLING_STATION_ID, ipparam, 0, VENDOR_NONE);
928 rc_avpair_add(&send, PW_ACCT_AUTHENTIC, &av_type, 0, VENDOR_NONE);
932 rc_avpair_add(&send, PW_NAS_PORT_TYPE, &av_type, 0, VENDOR_NONE);
936 rc_avpair_add(&send, PW_FRAMED_IP_ADDRESS , &av_type , 0, VENDOR_NONE);
940 rc_avpair_insert(&send, NULL, rc_avpair_copy(rstate.avp));
944 rstate.client_port, send);
946 result = rc_acct(rstate.client_port, send);
949 rc_avpair_free(send);
977 VALUE_PAIR *send = NULL;
994 rc_avpair_add(&send, PW_ACCT_SESSION_ID, rstate.session_id,
997 rc_avpair_add(&send, PW_USER_NAME, rstate.user, 0, VENDOR_NONE);
1000 rc_avpair_add(&send, PW_ACCT_STATUS_TYPE, &av_type, 0, VENDOR_NONE);
1003 rc_avpair_add(&send, PW_SERVICE_TYPE, &av_type, 0, VENDOR_NONE);
1006 rc_avpair_add(&send, PW_FRAMED_PROTOCOL, &av_type, 0, VENDOR_NONE);
1009 rc_avpair_add(&send, PW_ACCT_AUTHENTIC, &av_type, 0, VENDOR_NONE);
1014 rc_avpair_add(&send, PW_ACCT_SESSION_TIME, &av_type, 0, VENDOR_NONE);
1017 rc_avpair_add(&send, PW_ACCT_OUTPUT_OCTETS, &av_type, 0, VENDOR_NONE);
1020 rc_avpair_add(&send, PW_ACCT_INPUT_OCTETS, &av_type, 0, VENDOR_NONE);
1023 rc_avpair_add(&send, PW_ACCT_OUTPUT_PACKETS, &av_type, 0, VENDOR_NONE);
1026 rc_avpair_add(&send, PW_ACCT_INPUT_PACKETS, &av_type, 0, VENDOR_NONE);
1030 rc_avpair_add(&send, PW_CALLING_STATION_ID,
1033 rc_avpair_add(&send, PW_CALLING_STATION_ID, ipparam, 0, VENDOR_NONE);
1036 rc_avpair_add(&send, PW_NAS_PORT_TYPE, &av_type, 0, VENDOR_NONE);
1087 rc_avpair_add(&send, PW_ACCT_TERMINATE_CAUSE, &av_type, 0, VENDOR_NONE);
1091 rc_avpair_add(&send, PW_FRAMED_IP_ADDRESS , &av_type , 0, VENDOR_NONE);
1095 rc_avpair_insert(&send, NULL, rc_avpair_copy(rstate.avp));
1099 rstate.client_port, send);
1101 result = rc_acct(rstate.client_port, send);
1109 rc_avpair_free(send);
1125 VALUE_PAIR *send = NULL;
1138 rc_avpair_add(&send, PW_ACCT_SESSION_ID, rstate.session_id,
1141 rc_avpair_add(&send, PW_USER_NAME, rstate.user, 0, VENDOR_NONE);
1144 rc_avpair_add(&send, PW_ACCT_STATUS_TYPE, &av_type, 0, VENDOR_NONE);
1147 rc_avpair_add(&send, PW_SERVICE_TYPE, &av_type, 0, VENDOR_NONE);
1150 rc_avpair_add(&send, PW_FRAMED_PROTOCOL, &av_type, 0, VENDOR_NONE);
1153 rc_avpair_add(&send, PW_ACCT_AUTHENTIC, &av_type, 0, VENDOR_NONE);
1162 rc_avpair_add(&send, PW_ACCT_SESSION_TIME, &av_type, 0, VENDOR_NONE);
1165 rc_avpair_add(&send, PW_ACCT_OUTPUT_OCTETS, &av_type, 0, VENDOR_NONE);
1168 rc_avpair_add(&send, PW_ACCT_INPUT_OCTETS, &av_type, 0, VENDOR_NONE);
1171 rc_avpair_add(&send, PW_ACCT_OUTPUT_PACKETS, &av_type, 0, VENDOR_NONE);
1174 rc_avpair_add(&send, PW_ACCT_INPUT_PACKETS, &av_type, 0, VENDOR_NONE);
1178 rc_avpair_add(&send, PW_CALLING_STATION_ID,
1181 rc_avpair_add(&send, PW_CALLING_STATION_ID, ipparam, 0, VENDOR_NONE);
1184 rc_avpair_add(&send, PW_NAS_PORT_TYPE, &av_type, 0, VENDOR_NONE);
1188 rc_avpair_add(&send, PW_FRAMED_IP_ADDRESS , &av_type , 0, VENDOR_NONE);
1192 rc_avpair_insert(&send, NULL, rc_avpair_copy(rstate.avp));
1196 rstate.client_port, send);
1198 result = rc_acct(rstate.client_port, send);
1206 rc_avpair_free(send);