X-Git-Url: http://www.project-moonshot.org/gitweb/?a=blobdiff_plain;f=lib%2Fexamples%2Fclient-blocking.c;h=13039052181ee305193e6e4ec79ac0a21860155f;hb=0e0b4ad17c5f41392f943a845933ccb51a9126c9;hp=73c526d1f7a9271d7de4978b487f57f52bd0b319;hpb=4874dc3d84e23b1f465a1ff8b686aca5ba0a5853;p=libradsec.git diff --git a/lib/examples/client-blocking.c b/lib/examples/client-blocking.c index 73c526d..1303905 100644 --- a/lib/examples/client-blocking.c +++ b/lib/examples/client-blocking.c @@ -1,13 +1,11 @@ -/* RADIUS client doing blocking i/o. */ +/* RADIUS/RadSec client using libradsec in blocking mode. */ #include -#include -#include #include -#include -#include +#include #include #include +#include "err.h" #include "debug.h" /* For rs_dump_packet(). */ #define SECRET "sikrit" @@ -23,16 +21,19 @@ blocking_client (const char *config_fn, const char *configuration, struct rs_request *request = NULL; struct rs_packet *req = NULL, *resp = NULL; struct rs_error *err = NULL; + int r; - if (rs_context_create (&h)) - return NULL; + r = rs_context_create (&h); + if (r) + { + assert(r == RSE_NOMEM); + assert (!"out of RAM -- unable to create libradsec context"); + } #if !defined (USE_CONFIG_FILE) { struct rs_peer *server; - if (rs_context_init_freeradius_dict (h, "/usr/share/freeradius/dictionary")) - goto cleanup; if (rs_conn_create (h, &conn, NULL)) goto cleanup; rs_conn_set_type (conn, RS_CONN_TYPE_UDP); @@ -48,22 +49,20 @@ blocking_client (const char *config_fn, const char *configuration, #else /* defined (USE_CONFIG_FILE) */ if (rs_context_read_config (h, config_fn)) goto cleanup; - if (rs_context_init_freeradius_dict (h, NULL)) - goto cleanup; if (rs_conn_create (h, &conn, configuration)) goto cleanup; #endif /* defined (USE_CONFIG_FILE) */ if (use_request_object_flag) { - if (rs_request_create_authn (conn, &request, USER_NAME, USER_PW)) + if (rs_request_create_authn (conn, &request, USER_NAME, USER_PW, SECRET)) goto cleanup; if (rs_request_send (request, &resp)) goto cleanup; } else { - if (rs_packet_create_authn_request (conn, &req, USER_NAME, USER_PW)) + if (rs_packet_create_authn_request (conn, &req, USER_NAME, USER_PW, SECRET)) goto cleanup; if (rs_packet_send (req, NULL)) goto cleanup; @@ -74,10 +73,10 @@ blocking_client (const char *config_fn, const char *configuration, if (resp) { rs_dump_packet (resp); - if (rs_packet_frpkt (resp)->code == PW_AUTHENTICATION_ACK) + if (rs_packet_code (resp) == PW_ACCESS_ACCEPT) printf ("Good auth.\n"); else - printf ("Bad auth: %d\n", rs_packet_frpkt (resp)->code); + printf ("Bad auth: %d\n", rs_packet_code (resp)); } else fprintf (stderr, "%s: no response\n", __func__); @@ -122,7 +121,7 @@ main (int argc, char *argv[]) err = blocking_client (argv[1], argv[2], use_request_object_flag); if (err) { - fprintf (stderr, "%s\n", rs_err_msg (err)); + fprintf (stderr, "error: %s: %d\n", rs_err_msg (err), rs_err_code (err, 0)); return rs_err_code (err, 1); } return 0;