mirror of
https://github.com/monitoring-plugins/monitoring-plugins.git
synced 2026-02-12 15:23:35 -05:00
check_radius: clang-format
This commit is contained in:
parent
9f71e510af
commit
6fcc97400a
1 changed files with 211 additions and 220 deletions
|
|
@ -1,32 +1,32 @@
|
|||
/*****************************************************************************
|
||||
*
|
||||
* Monitoring check_radius plugin
|
||||
*
|
||||
* License: GPL
|
||||
* Copyright (c) 1999-2024 Monitoring Plugins Development Team
|
||||
*
|
||||
* Description:
|
||||
*
|
||||
* This file contains the check_radius plugin
|
||||
*
|
||||
* Tests to see if a radius server is accepting connections.
|
||||
*
|
||||
*
|
||||
* This program is free software: you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation, either version 3 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
*
|
||||
*
|
||||
*****************************************************************************/
|
||||
*
|
||||
* Monitoring check_radius plugin
|
||||
*
|
||||
* License: GPL
|
||||
* Copyright (c) 1999-2024 Monitoring Plugins Development Team
|
||||
*
|
||||
* Description:
|
||||
*
|
||||
* This file contains the check_radius plugin
|
||||
*
|
||||
* Tests to see if a radius server is accepting connections.
|
||||
*
|
||||
*
|
||||
* This program is free software: you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation, either version 3 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
*
|
||||
*
|
||||
*****************************************************************************/
|
||||
|
||||
const char *progname = "check_radius";
|
||||
const char *copyright = "2000-2024";
|
||||
|
|
@ -37,45 +37,45 @@ const char *email = "devel@monitoring-plugins.org";
|
|||
#include "netutils.h"
|
||||
|
||||
#if defined(HAVE_LIBRADCLI)
|
||||
#include <radcli/radcli.h>
|
||||
# include <radcli/radcli.h>
|
||||
#elif defined(HAVE_LIBFREERADIUS_CLIENT)
|
||||
#include <freeradius-client.h>
|
||||
# include <freeradius-client.h>
|
||||
#elif defined(HAVE_LIBRADIUSCLIENT_NG)
|
||||
#include <radiusclient-ng.h>
|
||||
# include <radiusclient-ng.h>
|
||||
#else
|
||||
#include <radiusclient.h>
|
||||
# include <radiusclient.h>
|
||||
#endif
|
||||
|
||||
static int process_arguments (int /*argc*/, char ** /*argv*/);
|
||||
static void print_help (void);
|
||||
void print_usage (void);
|
||||
static int process_arguments(int /*argc*/, char ** /*argv*/);
|
||||
static void print_help(void);
|
||||
void print_usage(void);
|
||||
|
||||
#if defined(HAVE_LIBFREERADIUS_CLIENT) || defined(HAVE_LIBRADIUSCLIENT_NG) || defined(HAVE_LIBRADCLI)
|
||||
#define my_rc_conf_str(a) rc_conf_str(rch,a)
|
||||
#if defined(HAVE_LIBRADCLI)
|
||||
#define my_rc_send_server(a,b) rc_send_server(rch,a,b,AUTH)
|
||||
# define my_rc_conf_str(a) rc_conf_str(rch, a)
|
||||
# if defined(HAVE_LIBRADCLI)
|
||||
# define my_rc_send_server(a, b) rc_send_server(rch, a, b, AUTH)
|
||||
# else
|
||||
# define my_rc_send_server(a, b) rc_send_server(rch, a, b)
|
||||
# endif
|
||||
# if defined(HAVE_LIBFREERADIUS_CLIENT) || defined(HAVE_LIBRADCLI)
|
||||
# define my_rc_buildreq(a, b, c, d, e, f) rc_buildreq(rch, a, b, c, d, (a)->secret, e, f)
|
||||
# else
|
||||
# define my_rc_buildreq(a, b, c, d, e, f) rc_buildreq(rch, a, b, c, d, e, f)
|
||||
# endif
|
||||
# define my_rc_avpair_add(a, b, c, d) rc_avpair_add(rch, a, b, c, -1, d)
|
||||
# define my_rc_read_dictionary(a) rc_read_dictionary(rch, a)
|
||||
#else
|
||||
#define my_rc_send_server(a,b) rc_send_server(rch,a,b)
|
||||
#endif
|
||||
#if defined(HAVE_LIBFREERADIUS_CLIENT) || defined(HAVE_LIBRADCLI)
|
||||
#define my_rc_buildreq(a,b,c,d,e,f) rc_buildreq(rch,a,b,c,d,(a)->secret,e,f)
|
||||
#else
|
||||
#define my_rc_buildreq(a,b,c,d,e,f) rc_buildreq(rch,a,b,c,d,e,f)
|
||||
#endif
|
||||
#define my_rc_avpair_add(a,b,c,d) rc_avpair_add(rch,a,b,c,-1,d)
|
||||
#define my_rc_read_dictionary(a) rc_read_dictionary(rch, a)
|
||||
#else
|
||||
#define my_rc_conf_str(a) rc_conf_str(a)
|
||||
#define my_rc_send_server(a,b) rc_send_server(a, b)
|
||||
#define my_rc_buildreq(a,b,c,d,e,f) rc_buildreq(a,b,c,d,e,f)
|
||||
#define my_rc_avpair_add(a,b,c,d) rc_avpair_add(a, b, c, d)
|
||||
#define my_rc_read_dictionary(a) rc_read_dictionary(a)
|
||||
# define my_rc_conf_str(a) rc_conf_str(a)
|
||||
# define my_rc_send_server(a, b) rc_send_server(a, b)
|
||||
# define my_rc_buildreq(a, b, c, d, e, f) rc_buildreq(a, b, c, d, e, f)
|
||||
# define my_rc_avpair_add(a, b, c, d) rc_avpair_add(a, b, c, d)
|
||||
# define my_rc_read_dictionary(a) rc_read_dictionary(a)
|
||||
#endif
|
||||
|
||||
/* REJECT_RC is only defined in some version of radiusclient. It has
|
||||
* been reported from radiusclient-ng 0.5.6 on FreeBSD 7.2-RELEASE */
|
||||
#ifndef REJECT_RC
|
||||
#define REJECT_RC BADRESP_RC
|
||||
# define REJECT_RC BADRESP_RC
|
||||
#endif
|
||||
|
||||
static int my_rc_read_config(char * /*a*/);
|
||||
|
|
@ -148,11 +148,7 @@ Please note that all tags must be lowercase to use the DocBook XML DTD.
|
|||
-@@
|
||||
******************************************************************************/
|
||||
|
||||
|
||||
|
||||
int
|
||||
main (int argc, char **argv)
|
||||
{
|
||||
int main(int argc, char **argv) {
|
||||
struct sockaddr_storage ss;
|
||||
char name[HOST_NAME_MAX];
|
||||
#ifdef RC_BUFFER_LEN
|
||||
|
|
@ -165,131 +161,130 @@ main (int argc, char **argv)
|
|||
uint32_t client_id, service;
|
||||
char *str;
|
||||
|
||||
setlocale (LC_ALL, "");
|
||||
bindtextdomain (PACKAGE, LOCALEDIR);
|
||||
textdomain (PACKAGE);
|
||||
setlocale(LC_ALL, "");
|
||||
bindtextdomain(PACKAGE, LOCALEDIR);
|
||||
textdomain(PACKAGE);
|
||||
|
||||
/* Parse extra opts if any */
|
||||
argv=np_extra_opts (&argc, argv, progname);
|
||||
argv = np_extra_opts(&argc, argv, progname);
|
||||
|
||||
if (process_arguments (argc, argv) == ERROR)
|
||||
usage4 (_("Could not parse arguments"));
|
||||
if (process_arguments(argc, argv) == ERROR) {
|
||||
usage4(_("Could not parse arguments"));
|
||||
}
|
||||
|
||||
str = strdup ("dictionary");
|
||||
if ((config_file && my_rc_read_config (config_file)) ||
|
||||
my_rc_read_dictionary (my_rc_conf_str (str)))
|
||||
die (STATE_UNKNOWN, _("Config file error\n"));
|
||||
str = strdup("dictionary");
|
||||
if ((config_file && my_rc_read_config(config_file)) || my_rc_read_dictionary(my_rc_conf_str(str))) {
|
||||
die(STATE_UNKNOWN, _("Config file error\n"));
|
||||
}
|
||||
|
||||
service = PW_AUTHENTICATE_ONLY;
|
||||
|
||||
memset (&data, 0, sizeof(data));
|
||||
if (!(my_rc_avpair_add (&data.send_pairs, PW_SERVICE_TYPE, &service, 0) &&
|
||||
my_rc_avpair_add (&data.send_pairs, PW_USER_NAME, username, 0) &&
|
||||
my_rc_avpair_add (&data.send_pairs, PW_USER_PASSWORD, password, 0)
|
||||
))
|
||||
die (STATE_UNKNOWN, _("Out of Memory?\n"));
|
||||
memset(&data, 0, sizeof(data));
|
||||
if (!(my_rc_avpair_add(&data.send_pairs, PW_SERVICE_TYPE, &service, 0) &&
|
||||
my_rc_avpair_add(&data.send_pairs, PW_USER_NAME, username, 0) &&
|
||||
my_rc_avpair_add(&data.send_pairs, PW_USER_PASSWORD, password, 0))) {
|
||||
die(STATE_UNKNOWN, _("Out of Memory?\n"));
|
||||
}
|
||||
|
||||
if (nasid != NULL) {
|
||||
if (!(my_rc_avpair_add (&data.send_pairs, PW_NAS_IDENTIFIER, nasid, 0)))
|
||||
die (STATE_UNKNOWN, _("Invalid NAS-Identifier\n"));
|
||||
if (!(my_rc_avpair_add(&data.send_pairs, PW_NAS_IDENTIFIER, nasid, 0))) {
|
||||
die(STATE_UNKNOWN, _("Invalid NAS-Identifier\n"));
|
||||
}
|
||||
}
|
||||
|
||||
if (nasipaddress == NULL) {
|
||||
if (gethostname (name, sizeof(name)) != 0)
|
||||
die (STATE_UNKNOWN, _("gethostname() failed!\n"));
|
||||
if (gethostname(name, sizeof(name)) != 0) {
|
||||
die(STATE_UNKNOWN, _("gethostname() failed!\n"));
|
||||
}
|
||||
nasipaddress = name;
|
||||
}
|
||||
if (!dns_lookup (nasipaddress, &ss, AF_INET)) /* TODO: Support IPv6. */
|
||||
die (STATE_UNKNOWN, _("Invalid NAS-IP-Address\n"));
|
||||
client_id = ntohl (((struct sockaddr_in *)&ss)->sin_addr.s_addr);
|
||||
if (my_rc_avpair_add (&(data.send_pairs), PW_NAS_IP_ADDRESS, &client_id, 0) == NULL)
|
||||
die (STATE_UNKNOWN, _("Invalid NAS-IP-Address\n"));
|
||||
if (!dns_lookup(nasipaddress, &ss, AF_INET)) { /* TODO: Support IPv6. */
|
||||
die(STATE_UNKNOWN, _("Invalid NAS-IP-Address\n"));
|
||||
}
|
||||
client_id = ntohl(((struct sockaddr_in *)&ss)->sin_addr.s_addr);
|
||||
if (my_rc_avpair_add(&(data.send_pairs), PW_NAS_IP_ADDRESS, &client_id, 0) == NULL) {
|
||||
die(STATE_UNKNOWN, _("Invalid NAS-IP-Address\n"));
|
||||
}
|
||||
|
||||
my_rc_buildreq (&data, PW_ACCESS_REQUEST, server, port, (int)timeout_interval,
|
||||
retries);
|
||||
my_rc_buildreq(&data, PW_ACCESS_REQUEST, server, port, (int)timeout_interval, retries);
|
||||
|
||||
result = my_rc_send_server (&data, msg);
|
||||
rc_avpair_free (data.send_pairs);
|
||||
if (data.receive_pairs)
|
||||
rc_avpair_free (data.receive_pairs);
|
||||
result = my_rc_send_server(&data, msg);
|
||||
rc_avpair_free(data.send_pairs);
|
||||
if (data.receive_pairs) {
|
||||
rc_avpair_free(data.receive_pairs);
|
||||
}
|
||||
|
||||
if (result == TIMEOUT_RC)
|
||||
die (STATE_CRITICAL, _("Timeout\n"));
|
||||
if (result == ERROR_RC)
|
||||
die (STATE_CRITICAL, _("Auth Error\n"));
|
||||
if (result == REJECT_RC)
|
||||
die (STATE_WARNING, _("Auth Failed\n"));
|
||||
if (result == BADRESP_RC)
|
||||
die (STATE_WARNING, _("Bad Response\n"));
|
||||
if (expect && !strstr (msg, expect))
|
||||
die (STATE_WARNING, "%s\n", msg);
|
||||
if (result == OK_RC)
|
||||
die (STATE_OK, _("Auth OK\n"));
|
||||
if (result == TIMEOUT_RC) {
|
||||
die(STATE_CRITICAL, _("Timeout\n"));
|
||||
}
|
||||
if (result == ERROR_RC) {
|
||||
die(STATE_CRITICAL, _("Auth Error\n"));
|
||||
}
|
||||
if (result == REJECT_RC) {
|
||||
die(STATE_WARNING, _("Auth Failed\n"));
|
||||
}
|
||||
if (result == BADRESP_RC) {
|
||||
die(STATE_WARNING, _("Bad Response\n"));
|
||||
}
|
||||
if (expect && !strstr(msg, expect)) {
|
||||
die(STATE_WARNING, "%s\n", msg);
|
||||
}
|
||||
if (result == OK_RC) {
|
||||
die(STATE_OK, _("Auth OK\n"));
|
||||
}
|
||||
(void)snprintf(msg, sizeof(msg), _("Unexpected result code %d"), result);
|
||||
die (STATE_UNKNOWN, "%s\n", msg);
|
||||
die(STATE_UNKNOWN, "%s\n", msg);
|
||||
}
|
||||
|
||||
|
||||
|
||||
/* process command-line arguments */
|
||||
int
|
||||
process_arguments (int argc, char **argv)
|
||||
{
|
||||
int process_arguments(int argc, char **argv) {
|
||||
int c;
|
||||
|
||||
int option = 0;
|
||||
static struct option longopts[] = {
|
||||
{"hostname", required_argument, 0, 'H'},
|
||||
{"port", required_argument, 0, 'P'},
|
||||
{"username", required_argument, 0, 'u'},
|
||||
{"password", required_argument, 0, 'p'},
|
||||
{"nas-id", required_argument, 0, 'n'},
|
||||
{"nas-ip-address", required_argument, 0, 'N'},
|
||||
{"filename", required_argument, 0, 'F'},
|
||||
{"expect", required_argument, 0, 'e'},
|
||||
{"retries", required_argument, 0, 'r'},
|
||||
{"timeout", required_argument, 0, 't'},
|
||||
{"verbose", no_argument, 0, 'v'},
|
||||
{"version", no_argument, 0, 'V'},
|
||||
{"help", no_argument, 0, 'h'},
|
||||
{0, 0, 0, 0}
|
||||
};
|
||||
static struct option longopts[] = {{"hostname", required_argument, 0, 'H'}, {"port", required_argument, 0, 'P'},
|
||||
{"username", required_argument, 0, 'u'}, {"password", required_argument, 0, 'p'},
|
||||
{"nas-id", required_argument, 0, 'n'}, {"nas-ip-address", required_argument, 0, 'N'},
|
||||
{"filename", required_argument, 0, 'F'}, {"expect", required_argument, 0, 'e'},
|
||||
{"retries", required_argument, 0, 'r'}, {"timeout", required_argument, 0, 't'},
|
||||
{"verbose", no_argument, 0, 'v'}, {"version", no_argument, 0, 'V'},
|
||||
{"help", no_argument, 0, 'h'}, {0, 0, 0, 0}};
|
||||
|
||||
while (1) {
|
||||
c = getopt_long (argc, argv, "+hVvH:P:F:u:p:n:N:t:r:e:", longopts,
|
||||
&option);
|
||||
c = getopt_long(argc, argv, "+hVvH:P:F:u:p:n:N:t:r:e:", longopts, &option);
|
||||
|
||||
if (c == -1 || c == EOF || c == 1)
|
||||
if (c == -1 || c == EOF || c == 1) {
|
||||
break;
|
||||
}
|
||||
|
||||
switch (c) {
|
||||
case '?': /* print short usage statement if args not parsable */
|
||||
usage5 ();
|
||||
case 'h': /* help */
|
||||
print_help ();
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'V': /* version */
|
||||
print_revision (progname, NP_VERSION);
|
||||
exit (STATE_UNKNOWN);
|
||||
case 'v': /* verbose mode */
|
||||
case '?': /* print short usage statement if args not parsable */
|
||||
usage5();
|
||||
case 'h': /* help */
|
||||
print_help();
|
||||
exit(STATE_UNKNOWN);
|
||||
case 'V': /* version */
|
||||
print_revision(progname, NP_VERSION);
|
||||
exit(STATE_UNKNOWN);
|
||||
case 'v': /* verbose mode */
|
||||
verbose = true;
|
||||
break;
|
||||
case 'H': /* hostname */
|
||||
if (!is_host (optarg)) {
|
||||
usage2 (_("Invalid hostname/address"), optarg);
|
||||
case 'H': /* hostname */
|
||||
if (!is_host(optarg)) {
|
||||
usage2(_("Invalid hostname/address"), optarg);
|
||||
}
|
||||
server = optarg;
|
||||
break;
|
||||
case 'P': /* port */
|
||||
if (is_intnonneg (optarg))
|
||||
port = (unsigned short)atoi (optarg);
|
||||
else
|
||||
usage4 (_("Port must be a positive integer"));
|
||||
case 'P': /* port */
|
||||
if (is_intnonneg(optarg)) {
|
||||
port = (unsigned short)atoi(optarg);
|
||||
} else {
|
||||
usage4(_("Port must be a positive integer"));
|
||||
}
|
||||
break;
|
||||
case 'u': /* username */
|
||||
case 'u': /* username */
|
||||
username = optarg;
|
||||
break;
|
||||
case 'p': /* password */
|
||||
case 'p': /* password */
|
||||
password = strdup(optarg);
|
||||
|
||||
/* Delete the password from process list */
|
||||
|
|
@ -298,115 +293,111 @@ process_arguments (int argc, char **argv)
|
|||
optarg++;
|
||||
}
|
||||
break;
|
||||
case 'n': /* nas id */
|
||||
case 'n': /* nas id */
|
||||
nasid = optarg;
|
||||
break;
|
||||
case 'N': /* nas ip address */
|
||||
case 'N': /* nas ip address */
|
||||
nasipaddress = optarg;
|
||||
break;
|
||||
case 'F': /* configuration file */
|
||||
case 'F': /* configuration file */
|
||||
config_file = optarg;
|
||||
break;
|
||||
case 'e': /* expect */
|
||||
case 'e': /* expect */
|
||||
expect = optarg;
|
||||
break;
|
||||
case 'r': /* retries */
|
||||
if (is_intpos (optarg))
|
||||
retries = atoi (optarg);
|
||||
else
|
||||
usage4 (_("Number of retries must be a positive integer"));
|
||||
case 'r': /* retries */
|
||||
if (is_intpos(optarg)) {
|
||||
retries = atoi(optarg);
|
||||
} else {
|
||||
usage4(_("Number of retries must be a positive integer"));
|
||||
}
|
||||
break;
|
||||
case 't': /* timeout */
|
||||
if (is_intpos (optarg))
|
||||
timeout_interval = (unsigned)atoi (optarg);
|
||||
else
|
||||
usage2 (_("Timeout interval must be a positive integer"), optarg);
|
||||
case 't': /* timeout */
|
||||
if (is_intpos(optarg)) {
|
||||
timeout_interval = (unsigned)atoi(optarg);
|
||||
} else {
|
||||
usage2(_("Timeout interval must be a positive integer"), optarg);
|
||||
}
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
if (server == NULL)
|
||||
usage4 (_("Hostname was not supplied"));
|
||||
if (username == NULL)
|
||||
usage4 (_("User not specified"));
|
||||
if (password == NULL)
|
||||
usage4 (_("Password not specified"));
|
||||
if (config_file == NULL)
|
||||
usage4 (_("Configuration file not specified"));
|
||||
if (server == NULL) {
|
||||
usage4(_("Hostname was not supplied"));
|
||||
}
|
||||
if (username == NULL) {
|
||||
usage4(_("User not specified"));
|
||||
}
|
||||
if (password == NULL) {
|
||||
usage4(_("Password not specified"));
|
||||
}
|
||||
if (config_file == NULL) {
|
||||
usage4(_("Configuration file not specified"));
|
||||
}
|
||||
|
||||
return OK;
|
||||
}
|
||||
|
||||
|
||||
|
||||
void
|
||||
print_help (void)
|
||||
{
|
||||
void print_help(void) {
|
||||
char *myport;
|
||||
xasprintf (&myport, "%d", PW_AUTH_UDP_PORT);
|
||||
xasprintf(&myport, "%d", PW_AUTH_UDP_PORT);
|
||||
|
||||
print_revision (progname, NP_VERSION);
|
||||
print_revision(progname, NP_VERSION);
|
||||
|
||||
printf ("Copyright (c) 1999 Robert August Vincent II\n");
|
||||
printf (COPYRIGHT, copyright, email);
|
||||
printf("Copyright (c) 1999 Robert August Vincent II\n");
|
||||
printf(COPYRIGHT, copyright, email);
|
||||
|
||||
printf("%s\n", _("Tests to see if a RADIUS server is accepting connections."));
|
||||
|
||||
printf ("\n\n");
|
||||
printf("\n\n");
|
||||
|
||||
print_usage ();
|
||||
print_usage();
|
||||
|
||||
printf (UT_HELP_VRSN);
|
||||
printf (UT_EXTRA_OPTS);
|
||||
printf(UT_HELP_VRSN);
|
||||
printf(UT_EXTRA_OPTS);
|
||||
|
||||
printf (UT_HOST_PORT, 'P', myport);
|
||||
printf(UT_HOST_PORT, 'P', myport);
|
||||
|
||||
printf (" %s\n", "-u, --username=STRING");
|
||||
printf (" %s\n", _("The user to authenticate"));
|
||||
printf (" %s\n", "-p, --password=STRING");
|
||||
printf (" %s\n", _("Password for authentication (SECURITY RISK)"));
|
||||
printf (" %s\n", "-n, --nas-id=STRING");
|
||||
printf (" %s\n", _("NAS identifier"));
|
||||
printf (" %s\n", "-N, --nas-ip-address=STRING");
|
||||
printf (" %s\n", _("NAS IP Address"));
|
||||
printf (" %s\n", "-F, --filename=STRING");
|
||||
printf (" %s\n", _("Configuration file"));
|
||||
printf (" %s\n", "-e, --expect=STRING");
|
||||
printf (" %s\n", _("Response string to expect from the server"));
|
||||
printf (" %s\n", "-r, --retries=INTEGER");
|
||||
printf (" %s\n", _("Number of times to retry a failed connection"));
|
||||
printf(" %s\n", "-u, --username=STRING");
|
||||
printf(" %s\n", _("The user to authenticate"));
|
||||
printf(" %s\n", "-p, --password=STRING");
|
||||
printf(" %s\n", _("Password for authentication (SECURITY RISK)"));
|
||||
printf(" %s\n", "-n, --nas-id=STRING");
|
||||
printf(" %s\n", _("NAS identifier"));
|
||||
printf(" %s\n", "-N, --nas-ip-address=STRING");
|
||||
printf(" %s\n", _("NAS IP Address"));
|
||||
printf(" %s\n", "-F, --filename=STRING");
|
||||
printf(" %s\n", _("Configuration file"));
|
||||
printf(" %s\n", "-e, --expect=STRING");
|
||||
printf(" %s\n", _("Response string to expect from the server"));
|
||||
printf(" %s\n", "-r, --retries=INTEGER");
|
||||
printf(" %s\n", _("Number of times to retry a failed connection"));
|
||||
|
||||
printf (UT_CONN_TIMEOUT, timeout_interval);
|
||||
printf(UT_CONN_TIMEOUT, timeout_interval);
|
||||
|
||||
printf ("\n");
|
||||
printf ("%s\n", _("This plugin tests a RADIUS server to see if it is accepting connections."));
|
||||
printf ("%s\n", _("The server to test must be specified in the invocation, as well as a user"));
|
||||
printf ("%s\n", _("name and password. A configuration file must be present. The format of"));
|
||||
printf ("%s\n", _("the configuration file is described in the radiusclient library sources."));
|
||||
printf ("%s\n", _("The password option presents a substantial security issue because the"));
|
||||
printf ("%s\n", _("password can possibly be determined by careful watching of the command line"));
|
||||
printf ("%s\n", _("in a process listing. This risk is exacerbated because the plugin will"));
|
||||
printf ("%s\n", _("typically be executed at regular predictable intervals. Please be sure that"));
|
||||
printf ("%s\n", _("the password used does not allow access to sensitive system resources."));
|
||||
printf("\n");
|
||||
printf("%s\n", _("This plugin tests a RADIUS server to see if it is accepting connections."));
|
||||
printf("%s\n", _("The server to test must be specified in the invocation, as well as a user"));
|
||||
printf("%s\n", _("name and password. A configuration file must be present. The format of"));
|
||||
printf("%s\n", _("the configuration file is described in the radiusclient library sources."));
|
||||
printf("%s\n", _("The password option presents a substantial security issue because the"));
|
||||
printf("%s\n", _("password can possibly be determined by careful watching of the command line"));
|
||||
printf("%s\n", _("in a process listing. This risk is exacerbated because the plugin will"));
|
||||
printf("%s\n", _("typically be executed at regular predictable intervals. Please be sure that"));
|
||||
printf("%s\n", _("the password used does not allow access to sensitive system resources."));
|
||||
|
||||
printf (UT_SUPPORT);
|
||||
printf(UT_SUPPORT);
|
||||
}
|
||||
|
||||
|
||||
|
||||
void
|
||||
print_usage (void)
|
||||
{
|
||||
printf ("%s\n", _("Usage:"));
|
||||
printf ("%s -H host -F config_file -u username -p password\n\
|
||||
void print_usage(void) {
|
||||
printf("%s\n", _("Usage:"));
|
||||
printf("%s -H host -F config_file -u username -p password\n\
|
||||
[-P port] [-t timeout] [-r retries] [-e expect]\n\
|
||||
[-n nas-id] [-N nas-ip-addr]\n", progname);
|
||||
[-n nas-id] [-N nas-ip-addr]\n",
|
||||
progname);
|
||||
}
|
||||
|
||||
|
||||
|
||||
int my_rc_read_config(char * a)
|
||||
{
|
||||
int my_rc_read_config(char *a) {
|
||||
#if defined(HAVE_LIBFREERADIUS_CLIENT) || defined(HAVE_LIBRADIUSCLIENT_NG) || defined(HAVE_LIBRADCLI)
|
||||
rch = rc_read_config(a);
|
||||
return (rch == NULL) ? 1 : 0;
|
||||
|
|
|
|||
Loading…
Reference in a new issue