diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-28 09:49:46 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-28 09:49:46 +0000 |
commit | 50b37d4a27d3295a29afca2286f1a5a086142cec (patch) | |
tree | 9212f763934ee090ef72d823f559f52ce387f268 /src/include/radiusd.h | |
parent | Initial commit. (diff) | |
download | freeradius-50b37d4a27d3295a29afca2286f1a5a086142cec.tar.xz freeradius-50b37d4a27d3295a29afca2286f1a5a086142cec.zip |
Adding upstream version 3.2.1+dfsg.upstream/3.2.1+dfsgupstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'src/include/radiusd.h')
-rw-r--r-- | src/include/radiusd.h | 630 |
1 files changed, 630 insertions, 0 deletions
diff --git a/src/include/radiusd.h b/src/include/radiusd.h new file mode 100644 index 0000000..c3e8cdd --- /dev/null +++ b/src/include/radiusd.h @@ -0,0 +1,630 @@ +/* + * This program is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation; either version 2 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, write to the Free Software + * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA + */ +#ifndef RADIUSD_H +#define RADIUSD_H +/** + * $Id$ + * + * @file radiusd.h + * @brief Structures, prototypes and global variables for the FreeRADIUS server. + * + * @copyright 1999-2000,2002-2008 The FreeRADIUS server project + */ + +RCSIDH(radiusd_h, "$Id$") + +#include <freeradius-devel/libradius.h> +#include <freeradius-devel/radpaths.h> +#include <freeradius-devel/conf.h> +#include <freeradius-devel/conffile.h> +#include <freeradius-devel/event.h> +#include <freeradius-devel/connection.h> + +typedef struct rad_request REQUEST; + +#include <freeradius-devel/log.h> + +#ifdef HAVE_PTHREAD_H +# include <pthread.h> +#else +# include <sys/wait.h> +#endif + +#ifndef NDEBUG +# define REQUEST_MAGIC (0xdeadbeef) +#endif + +/* + * WITH_VMPS is handled by src/include/features.h + */ +#ifdef WITHOUT_VMPS +# undef WITH_VMPS +#endif + +#ifdef WITH_TLS +# include <freeradius-devel/tls.h> +#endif + +#include <freeradius-devel/stats.h> +#include <freeradius-devel/realms.h> +#include <freeradius-devel/xlat.h> +#include <freeradius-devel/tmpl.h> +#include <freeradius-devel/map.h> +#include <freeradius-devel/clients.h> +#include <freeradius-devel/process.h> +/* + * All POSIX systems should have these headers + */ +#include <pwd.h> +#include <grp.h> + +#ifdef __cplusplus +extern "C" { +#endif + +/* + * See util.c + */ +typedef struct request_data_t request_data_t; + +/** Return codes indicating the result of the module call + * + * All module functions must return one of the codes listed below (apart from + * RLM_MODULE_NUMCODES, which is used to check for validity). + */ +typedef enum rlm_rcodes { + RLM_MODULE_REJECT = 0, //!< Immediately reject the request. + RLM_MODULE_FAIL, //!< Module failed, don't reply. + RLM_MODULE_OK, //!< The module is OK, continue. + RLM_MODULE_HANDLED, //!< The module handled the request, so stop. + RLM_MODULE_INVALID, //!< The module considers the request invalid. + RLM_MODULE_USERLOCK, //!< Reject the request (user is locked out). + RLM_MODULE_NOTFOUND, //!< User not found. + RLM_MODULE_NOOP, //!< Module succeeded without doing anything. + RLM_MODULE_UPDATED, //!< OK (pairs modified). + RLM_MODULE_NUMCODES, //!< How many valid return codes there are. + RLM_MODULE_UNKNOWN //!< Error resolving rcode (should not be + //!< returned by modules). +} rlm_rcode_t; +extern const FR_NAME_NUMBER modreturn_table[]; + +/** Main server configuration + * + * The parsed version of the main server config. + */ +typedef struct main_config { + struct main_config *next; //!< Next version of the main_config. + + char const *name; //!< Name of the daemon, usually 'radiusd'. + CONF_SECTION *config; //!< Root of the server config. + + fr_ipaddr_t myip; //!< IP to bind to. Set on command line. + uint16_t port; //!< Port to bind to. Set on command line. + + bool suppress_secrets; //!< for debug levels < 3 + bool log_auth; //!< Log all authentication attempts. + bool log_accept; //!< Log Access-Accept + bool log_reject; //!< Log Access-Reject + bool log_auth_badpass; //!< Log successful authentications. + bool log_auth_goodpass; //!< Log failed authentications. + char const *auth_badpass_msg; //!< Additional text to append to successful auth messages. + char const *auth_goodpass_msg; //!< Additional text to append to failed auth messages. + + char const *denied_msg; //!< Additional text to append if the user is already logged + //!< in (simultaneous use check failed). + + bool daemonize; //!< Should the server daemonize on startup. + char const *pid_file; //!< Path to write out PID file. + +#ifdef WITH_PROXY + bool proxy_requests; //!< Toggle to enable/disable proxying globally. +#endif + struct timeval reject_delay; //!< How long to wait before sending an Access-Reject. + bool status_server; //!< Whether to respond to status-server messages. + + + uint32_t max_request_time; //!< How long a request can be processed for before + //!< timing out. + uint32_t cleanup_delay; //!< How long before cleaning up cached responses. + uint32_t max_requests; + + bool postauth_client_lost; //!< Whether to run Post-Auth-Type Client-Lost section + + uint32_t debug_level; + char const *log_file; + int syslog_facility; + + char const *dictionary_dir; //!< Where to load dictionaries from. + + char const *checkrad; //!< Script to use to determine if a user is already + //!< connected. + + rad_listen_t *listen; //!< Head of a linked list of listeners. + + + char const *panic_action; //!< Command to execute if the server receives a fatal + //!< signal. + + struct timeval init_delay; //!< Initial request processing delay. + + uint32_t talloc_pool_size; //!< Size of pool to allocate to hold each #REQUEST. + bool debug_memory; //!< Cleanup the server properly on exit, freeing + //!< up any memory we allocated. + bool memory_report; //!< Print a memory report on what's left unfreed. + //!< Can only be used when the server is running in single + //!< threaded mode. + + bool allow_core_dumps; //!< Whether the server is allowed to drop a core when + //!< receiving a fatal signal. + + bool write_pid; //!< write the PID file + + bool exiting; //!< are we exiting? + + +#ifdef ENABLE_OPENSSL_VERSION_CHECK + char const *allow_vulnerable_openssl; //!< The CVE number of the last security issue acknowledged. +#endif +} main_config_t; + +#if defined(WITH_VERIFY_PTR) +# define VERIFY_REQUEST(_x) verify_request(__FILE__, __LINE__, _x) +#else +/* + * Even if were building without WITH_VERIFY_PTR + * the pointer must not be NULL when these various macros are used + * so we can add some sneaky asserts. + */ +# define VERIFY_REQUEST(_x) rad_assert(_x) +#endif + +typedef enum { + REQUEST_ACTIVE = 1, + REQUEST_STOP_PROCESSING, + REQUEST_COUNTED +} rad_master_state_t; +#define REQUEST_MASTER_NUM_STATES (REQUEST_COUNTED + 1) + +typedef enum { + REQUEST_QUEUED = 1, + REQUEST_RUNNING, + REQUEST_PROXIED, + REQUEST_RESPONSE_DELAY, + REQUEST_CLEANUP_DELAY, + REQUEST_DONE +} rad_child_state_t; +#define REQUEST_CHILD_NUM_STATES (REQUEST_DONE + 1) + +struct rad_request { +#ifndef NDEBUG + uint32_t magic; //!< Magic number used to detect memory corruption, + //!< or request structs that have not been properly initialised. +#endif + unsigned int number; //!< Monotonically increasing request number. Reset on server restart. + time_t timestamp; //!< When the request was received. + + request_data_t *data; //!< Request metadata. + + rad_listen_t *listener; //!< The listener that received the request. + RADCLIENT *client; //!< The client that originally sent us the request. + + RADIUS_PACKET *packet; //!< Incoming request. + VALUE_PAIR *username; //!< Cached username #VALUE_PAIR from request #RADIUS_PACKET. + VALUE_PAIR *password; //!< Cached password #VALUE_PAIR from request #RADIUS_PACKET. + + RADIUS_PACKET *reply; //!< Outgoing response. + + VALUE_PAIR *config; //!< #VALUE_PAIR (s) used to set per request parameters + //!< for modules and the server core at runtime. + + TALLOC_CTX *state_ctx; //!< for request->state + VALUE_PAIR *state; //!< #VALUE_PAIR (s) available over the lifetime of the authentication + //!< attempt. Useful where the attempt involves a sequence of + //!< many request/challenge packets, like OTP, and EAP. + +#ifdef WITH_PROXY + rad_listen_t *proxy_listener;//!< Listener for outgoing requests. + RADIUS_PACKET *proxy; //!< Outgoing request to proxy server. + RADIUS_PACKET *proxy_reply; //!< Incoming response from proxy server. + + home_server_t *home_server; + home_pool_t *home_pool; //!< For dynamic failover +#endif + + fr_request_process_t process; //!< The function to call to move the request through the state machine. + + struct timeval response_delay; //!< How long to wait before sending Access-Rejects. + fr_state_action_t timer_action; //!< What action to perform when the timer event fires. + fr_event_t *ev; //!< Event in event loop tied to this request. + + RAD_REQUEST_FUNP handle; //!< The function to call to move the request through the + //!< various server configuration sections. + rlm_rcode_t rcode; //!< Last rcode returned by a module + char const *module; //!< Module the request is currently being processed by. + char const *component; //!< Section the request is in. + + int delay; + + rad_master_state_t master_state; //!< Set by the master thread to signal the child that's currently + //!< working with the request, to do something. + rad_child_state_t child_state; + +#ifdef HAVE_PTHREAD_H + pthread_t child_pid; //!< Current thread handling the request. +#endif + + main_config_t *root; //!< Pointer to the main config hack to try and deal with hup. + + + int simul_max; //!< Maximum number of concurrent sessions for this user. +#ifdef WITH_SESSION_MGMT + int simul_count; //!< The current number of sessions for this user. + int simul_mpp; //!< WEIRD: 1 is false, 2 is true. +#endif + + RAD_LISTEN_TYPE priority; + + bool max_time; //!< did we hit max time? + + bool in_request_hash; +#ifdef WITH_PROXY + bool in_proxy_hash; + + uint32_t num_proxied_requests; //!< How many times this request was proxied. + //!< Retransmissions are driven by requests from the NAS. + uint32_t num_proxied_responses; +#endif + + char const *server; + REQUEST *parent; + + struct { + radlog_func_t func; //!< Function to call to output log messages about this + //!< request. + + log_lvl_t lvl; //!< Controls the verbosity of debug statements regarding + //!< the request. + + uint8_t indent; //!< By how much to indent log messages. uin8_t so it's obvious + //!< when a request has been exdented too much. + } log; + + uint32_t options; //!< mainly for proxying EAP-MSCHAPv2. + +#ifdef WITH_COA + REQUEST *coa; //!< CoA request originated by this request. + uint32_t num_coa_requests;//!< Counter for number of requests sent including + //!< retransmits. +#endif +}; /* REQUEST typedef */ + +#define RAD_REQUEST_LVL_NONE (0) //!< No debug messages should be printed. +#define RAD_REQUEST_LVL_DEBUG (1) +#define RAD_REQUEST_LVL_DEBUG2 (2) +#define RAD_REQUEST_LVL_DEBUG3 (3) +#define RAD_REQUEST_LVL_DEBUG4 (4) + +#define RAD_REQUEST_OPTION_COA (1 << 0) +#define RAD_REQUEST_OPTION_CTX (1 << 1) +#define RAD_REQUEST_OPTION_CANCELLED (1 << 2) + +#define SECONDS_PER_DAY 86400 +#define MAX_REQUEST_TIME 30 +#define CLEANUP_DELAY 5 +#define MAX_REQUESTS 256 +#define RETRY_DELAY 5 +#define RETRY_COUNT 3 +#define DEAD_TIME 120 +#define EXEC_TIMEOUT 10 + +/* for paircompare_register */ +typedef int (*RAD_COMPARE_FUNC)(void *instance, REQUEST *,VALUE_PAIR *, VALUE_PAIR *, VALUE_PAIR *, VALUE_PAIR **); + +typedef enum request_fail { + REQUEST_FAIL_UNKNOWN = 0, + REQUEST_FAIL_NO_THREADS, //!< No threads to handle it. + REQUEST_FAIL_DECODE, //!< Rad_decode didn't like it. + REQUEST_FAIL_PROXY, //!< Call to proxy modules failed. + REQUEST_FAIL_PROXY_SEND, //!< Proxy_send didn't like it. + REQUEST_FAIL_NO_RESPONSE, //!< We weren't told to respond, so we reject. + REQUEST_FAIL_HOME_SERVER, //!< The home server didn't respond. + REQUEST_FAIL_HOME_SERVER2, //!< Another case of the above. + REQUEST_FAIL_HOME_SERVER3, //!< Another case of the above. + REQUEST_FAIL_NORMAL_REJECT, //!< Authentication failure. + REQUEST_FAIL_SERVER_TIMEOUT //!< The server took too long to process the request. +} request_fail_t; + +/* + * Global variables. + * + * We really shouldn't have this many. + */ +extern log_lvl_t rad_debug_lvl; +extern char const *radacct_dir; +extern char const *radlog_dir; +extern char const *radlib_dir; +extern bool log_stripped_names; +extern char const *radiusd_version; +extern char const *radiusd_version_short; +void radius_signal_self(int flag); + +typedef enum { + RADIUS_SIGNAL_SELF_NONE = (0), + RADIUS_SIGNAL_SELF_HUP = (1 << 0), + RADIUS_SIGNAL_SELF_TERM = (1 << 1), + RADIUS_SIGNAL_SELF_EXIT = (1 << 2), + RADIUS_SIGNAL_SELF_DETAIL = (1 << 3), + RADIUS_SIGNAL_SELF_NEW_FD = (1 << 4), + RADIUS_SIGNAL_SELF_MAX = (1 << 5) +} radius_signal_t; +/* + * Function prototypes. + */ + +/* acct.c */ +int rad_accounting(REQUEST *); + +int rad_coa_recv(REQUEST *request); + +/* session.c */ +int rad_check_ts(fr_ipaddr_t const *nas_addr, uint32_t nas_port, char const *user, char const *sessionid); +int session_zap(REQUEST *request, fr_ipaddr_t const *nas_addr, + uint32_t nas_port, char const *user, + char const *sessionid, uint32_t cliaddr, + char proto, int session_time); + +/* radiusd.c */ +#undef debug_pair +void debug_pair(VALUE_PAIR *); +void rdebug_pair(log_lvl_t level, REQUEST *, VALUE_PAIR *, char const *); +void rdebug_pair_list(log_lvl_t level, REQUEST *, VALUE_PAIR *, char const *); +void rdebug_proto_pair_list(log_lvl_t level, REQUEST *, VALUE_PAIR *); +int log_err (char *); + +/* util.c */ +#define MEM(x) if (!(x)) { ERROR("%s[%u] OUT OF MEMORY", __FILE__, __LINE__); _fr_exit_now(__FILE__, __LINE__, 1); } +void (*reset_signal(int signo, void (*func)(int)))(int); +int rad_mkdir(char *directory, mode_t mode, uid_t uid, gid_t gid); +size_t rad_filename_make_safe(UNUSED REQUEST *request, char *out, size_t outlen, + char const *in, UNUSED void *arg); +size_t rad_filename_escape(UNUSED REQUEST *request, char *out, size_t outlen, + char const *in, UNUSED void *arg); +ssize_t rad_filename_unescape(char *out, size_t outlen, char const *in, size_t inlen); +void *rad_malloc(size_t size); /* calls exit(1) on error! */ +void rad_const_free(void const *ptr); +REQUEST *request_alloc(TALLOC_CTX *ctx); +REQUEST *request_alloc_fake(REQUEST *oldreq); +REQUEST *request_alloc_coa(REQUEST *request); +int request_data_add(REQUEST *request, + void *unique_ptr, int unique_int, + void *opaque, bool free_opaque); +void *request_data_get(REQUEST *request, + void *unique_ptr, int unique_int); +void *request_data_reference(REQUEST *request, + void *unique_ptr, int unique_int); +int rad_copy_string(char *dst, char const *src); +int rad_copy_string_bare(char *dst, char const *src); +int rad_copy_variable(char *dst, char const *from); +uint32_t rad_pps(uint32_t *past, uint32_t *present, time_t *then, struct timeval *now); +int rad_expand_xlat(REQUEST *request, char const *cmd, + int max_argc, char const *argv[], bool can_fail, + size_t argv_buflen, char *argv_buf); +void rad_tv_sub(struct timeval const *end, struct timeval const *start, struct timeval *elapsed); + +void verify_request(char const *file, int line, REQUEST *request); /* only for special debug builds */ +void rad_mode_to_str(char out[10], mode_t mode); +void rad_mode_to_oct(char out[5], mode_t mode); +int rad_getpwuid(TALLOC_CTX *ctx, struct passwd **out, uid_t uid); +int rad_getpwnam(TALLOC_CTX *ctx, struct passwd **out, char const *name); +int rad_getgrgid(TALLOC_CTX *ctx, struct group **out, gid_t gid); +int rad_getgrnam(TALLOC_CTX *ctx, struct group **out, char const *name); +int rad_getgid(TALLOC_CTX *ctx, gid_t *out, char const *name); +int rad_prints_uid(TALLOC_CTX *ctx, char *out, size_t outlen, uid_t uid); +int rad_prints_gid(TALLOC_CTX *ctx, char *out, size_t outlen, gid_t gid); +int rad_seuid(uid_t uid); +int rad_segid(gid_t gid); + +void rad_suid_set_down_uid(uid_t uid); +void rad_suid_down(void); +void rad_suid_up(void); +void rad_suid_down_permanent(void); +/* regex.c */ + +#ifdef HAVE_REGEX +/* + * Increasing this is essentially free + * It just increases memory usage. 12-16 bytes for each additional subcapture. + */ +# define REQUEST_MAX_REGEX 32 + +void regex_sub_to_request(REQUEST *request, regex_t **preg, char const *value, + size_t len, regmatch_t rxmatch[], size_t nmatch); + +int regex_request_to_sub(TALLOC_CTX *ctx, char **out, REQUEST *request, uint32_t num); + +/* + * Named capture groups only supported by PCRE. + */ +# ifdef HAVE_PCRE +int regex_request_to_sub_named(TALLOC_CTX *ctx, char **out, REQUEST *request, char const *name); +# endif +#endif + +/* files.c */ +int pairlist_read(TALLOC_CTX *ctx, char const *file, PAIR_LIST **list, int complain); +void pairlist_free(PAIR_LIST **); + +/* version.c */ +int rad_check_lib_magic(uint64_t magic); +int ssl_check_consistency(void); +char const *ssl_version_by_num(uint32_t version); +char const *ssl_version_num(void); +char const *ssl_version_range(uint32_t low, uint32_t high); +char const *ssl_version(void); +int version_add_feature(CONF_SECTION *cs, char const *name, bool enabled); +int version_add_number(CONF_SECTION *cs, char const *name, char const *version); +void version_init_features(CONF_SECTION *cs); +void version_init_numbers(CONF_SECTION *cs); +void version_print(void); + +/* auth.c */ +char *auth_name(char *buf, size_t buflen, REQUEST *request, bool do_cli); +int rad_authenticate (REQUEST *); +int rad_postauth(REQUEST *); +int rad_virtual_server(REQUEST *); + +/* exec.c */ +pid_t radius_start_program(char const *cmd, REQUEST *request, bool exec_wait, + int *input_fd, int *output_fd, + VALUE_PAIR *input_pairs, bool shell_escape); +int radius_readfrom_program(int fd, pid_t pid, int timeout, + char *answer, int left); +int radius_exec_program(TALLOC_CTX *ctx, char *out, size_t outlen, VALUE_PAIR **output_pairs, + REQUEST *request, char const *cmd, VALUE_PAIR *input_pairs, + bool exec_wait, bool shell_escape, int timeout) CC_HINT(nonnull (5, 6)); +void exec_trigger(REQUEST *request, CONF_SECTION *cs, char const *name, int quench) + CC_HINT(nonnull (3)); + +/* valuepair.c */ +int paircompare_register_byname(char const *name, DICT_ATTR const *from, + bool first_only, RAD_COMPARE_FUNC func, void *instance); +int paircompare_register(DICT_ATTR const *attribute, DICT_ATTR const *from, + bool first_only, RAD_COMPARE_FUNC func, void *instance); +void paircompare_unregister(DICT_ATTR const *attr, RAD_COMPARE_FUNC func); +void paircompare_unregister_instance(void *instance); +int paircompare(REQUEST *request, VALUE_PAIR *req_list, + VALUE_PAIR *check, VALUE_PAIR **rep_list); +vp_tmpl_t *xlat_to_tmpl_attr(TALLOC_CTX *ctx, xlat_exp_t *xlat); +xlat_exp_t *xlat_from_tmpl_attr(TALLOC_CTX *ctx, vp_tmpl_t *vpt); +int radius_xlat_do(REQUEST *request, VALUE_PAIR *vp); +int radius_compare_vps(REQUEST *request, VALUE_PAIR *check, VALUE_PAIR *vp); +int radius_callback_compare(REQUEST *request, VALUE_PAIR *req, + VALUE_PAIR *check, VALUE_PAIR *check_pairs, + VALUE_PAIR **reply_pairs); +int radius_find_compare(DICT_ATTR const *attribute); +VALUE_PAIR *radius_pair_create(TALLOC_CTX *ctx, VALUE_PAIR **vps, unsigned int attribute, unsigned int vendor); + +void module_failure_msg(REQUEST *request, char const *fmt, ...) CC_HINT(format (printf, 2, 3)); +void vmodule_failure_msg(REQUEST *request, char const *fmt, va_list ap) CC_HINT(format (printf, 2, 0)); + +int radius_get_vp(VALUE_PAIR **out, REQUEST *request, char const *name); +int radius_copy_vp(TALLOC_CTX *ctx, VALUE_PAIR **out, REQUEST *request, char const *name); + + +/* + * Less code == fewer bugs + * + * @param _a attribute + * @param _b value + * @param _c op + */ +#define pair_make_request(_a, _b, _c) fr_pair_make(request->packet, &request->packet->vps, _a, _b, _c) +#define pair_make_reply(_a, _b, _c) fr_pair_make(request->reply, &request->reply->vps, _a, _b, _c) +#define pair_make_config(_a, _b, _c) fr_pair_make(request, &request->config, _a, _b, _c) + +/* threads.c */ +int thread_pool_init(CONF_SECTION *cs, bool *spawn_flag); +void thread_pool_stop(void); +int thread_pool_addrequest(REQUEST *, RAD_REQUEST_FUNP); +pid_t rad_fork(void); +pid_t rad_waitpid(pid_t pid, int *status); +int total_active_threads(void); +void thread_pool_lock(void); +void thread_pool_unlock(void); +void thread_pool_queue_stats(int array[RAD_LISTEN_MAX], int pps[2]); + +#ifndef HAVE_PTHREAD_H +# define rad_fork(n) fork() +# define rad_waitpid(a,b) waitpid(a,b, 0) +#endif + +/* main_config.c */ +/* Define a global config structure */ +extern bool log_dates_utc; +extern main_config_t main_config; +extern bool event_loop_started; + +void set_radius_dir(TALLOC_CTX *ctx, char const *path); +char const *get_radius_dir(void); +int main_config_init(void); +int main_config_free(void); +void main_config_hup(void); +void hup_logfile(void); + +/* listen.c */ +void listen_free(rad_listen_t **head); +int listen_init(CONF_SECTION *cs, rad_listen_t **head, bool spawn_flag); +rad_listen_t *proxy_new_listener(TALLOC_CTX *ctx, home_server_t *home, uint16_t src_port); +RADCLIENT *client_listener_find(rad_listen_t *listener, fr_ipaddr_t const *ipaddr, uint16_t src_port); + +#ifdef WITH_STATS +RADCLIENT_LIST *listener_find_client_list(fr_ipaddr_t const *ipaddr, uint16_t port, int proto); +#endif +rad_listen_t *listener_find_byipaddr(fr_ipaddr_t const *ipaddr, uint16_t port, int proto); +int rad_status_server(REQUEST *request); + +/* event.c */ +typedef enum event_corral_t { + EVENT_CORRAL_MAIN = 0, //!< Always main thread event list + EVENT_CORRAL_AUX //!< Maybe main thread or one shared by modules +} event_corral_t; + +fr_event_list_t *radius_event_list_corral(event_corral_t hint); +int radius_event_init(TALLOC_CTX *ctx); +int radius_event_start(CONF_SECTION *cs, bool spawn_flag); +void radius_event_free(void); +int radius_event_process(void); +void radius_update_listener(rad_listen_t *listener); +void revive_home_server(void *ctx); +void mark_home_server_dead(home_server_t *home, struct timeval *when, bool down); + +/* evaluate.c */ +typedef struct fr_cond_t fr_cond_t; +int radius_evaluate_tmpl(REQUEST *request, int modreturn, int depth, + vp_tmpl_t const *vpt); +int radius_evaluate_map(REQUEST *request, int modreturn, int depth, + fr_cond_t const *c); +int radius_evaluate_cond(REQUEST *request, int modreturn, int depth, + fr_cond_t const *c); +void radius_pairmove(REQUEST *request, VALUE_PAIR **to, VALUE_PAIR *from, bool do_xlat) CC_HINT(nonnull); + +#ifdef WITH_TLS +/* + * For run-time patching of which function handles which socket. + */ +int dual_tls_recv(rad_listen_t *listener); +int dual_tls_send(rad_listen_t *listener, REQUEST *request); +int proxy_tls_recv(rad_listen_t *listener); +int proxy_tls_send(rad_listen_t *listener, REQUEST *request); +#ifdef WITH_COA_TUNNEL +int proxy_tls_send_reply(rad_listen_t *listener, REQUEST *request); +int dual_tls_send_coa_request(rad_listen_t *listener, REQUEST *request); +void listen_coa_free(void); +void listen_coa_add(rad_listen_t *listener, char const *key); +int listen_coa_find(REQUEST *request, char const *key); +#endif +#endif + +/* + * For radmin over TCP. + */ +#define PW_RADMIN_PORT 18120 + +#ifdef __cplusplus +} +#endif + +#endif /*RADIUSD_H*/ |