1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
|
/*
* vmps.c Handle VMPS traffic.
*
* Version: $Id$
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
*
* Copyright 2007 The FreeRADIUS server project
* Copyright 2007 Alan DeKok <aland@deployingradius.com>
*/
RCSID("$Id$")
#include <freeradius-devel/radiusd.h>
#include <freeradius-devel/protocol.h>
#include <freeradius-devel/process.h>
#include <freeradius-devel/modules.h>
#include <freeradius-devel/rad_assert.h>
#include "vqp.h"
static int vmps_process(REQUEST *request)
{
DEBUG2("Doing VMPS");
process_post_auth(0, request);
DEBUG2("Done VMPS");
request->packet->code = 0; /* hack for VMPS */
request->reply->code = PW_CODE_ACCESS_ACCEPT;
return 0;
}
/*
* Check if an incoming request is "ok"
*
* It takes packets, not requests. It sees if the packet looks
* OK. If so, it does a number of sanity checks on it.
*/
static int vqp_socket_recv(rad_listen_t *listener)
{
RADIUS_PACKET *packet;
RAD_REQUEST_FUNP fun = NULL;
RADCLIENT *client;
packet = vqp_recv(listener->fd);
if (!packet) {
ERROR("%s", fr_strerror());
return 0;
}
if ((client = client_listener_find(listener,
&packet->src_ipaddr,
packet->src_port)) == NULL) {
rad_free(&packet);
return 0;
}
/*
* Do new stuff.
*/
fun = vmps_process;
if (!request_receive(NULL, listener, packet, client, fun)) {
rad_free(&packet);
return 0;
}
return 1;
}
/*
* Send an authentication response packet
*/
static int vqp_socket_send(rad_listen_t *listener, REQUEST *request)
{
rad_assert(request->listener == listener);
rad_assert(listener->send == vqp_socket_send);
if (vqp_encode(request->reply, request->packet) < 0) {
DEBUG2("Failed encoding packet: %s\n", fr_strerror());
return -1;
}
return vqp_send(request->reply);
}
static int vqp_socket_encode(UNUSED rad_listen_t *listener, REQUEST *request)
{
return vqp_encode(request->reply, request->packet);
}
static int vqp_socket_decode(UNUSED rad_listen_t *listener, REQUEST *request)
{
return vqp_decode(request->packet);
}
extern fr_protocol_t proto_vmps;
fr_protocol_t proto_vmps = {
.magic = RLM_MODULE_INIT,
.name = "vmps",
.inst_size = sizeof(listen_socket_t),
.parse = common_socket_parse,
.recv = vqp_socket_recv,
.send = vqp_socket_send,
.print = common_socket_print,
.encode = vqp_socket_encode,
.decode = vqp_socket_decode
};
|