2 * util.c Various utility functions.
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
20 * Copyright 2000,2006 The FreeRADIUS server project
23 #include <freeradius-devel/ident.h>
26 #include <freeradius-devel/radiusd.h>
27 #include <freeradius-devel/rad_assert.h>
36 * The signal() function in Solaris 2.5.1 sets SA_NODEFER in
37 * sa_flags, which causes grief if signal() is called in the
38 * handler before the cause of the signal has been cleared.
39 * (Infinite recursion).
41 * The same problem appears on HPUX, so we avoid it, if we can.
43 * Using sigaction() to reset the signal handler fixes the problem,
44 * so where available, we prefer that solution.
47 void (*reset_signal(int signo, void (*func)(int)))(int)
50 struct sigaction act, oact;
52 act.sa_handler = func;
53 sigemptyset(&act.sa_mask);
55 #ifdef SA_INTERRUPT /* SunOS */
56 act.sa_flags |= SA_INTERRUPT;
58 if (sigaction(signo, &act, &oact) < 0)
60 return oact.sa_handler;
64 * re-set by calling the 'signal' function, which
65 * may cause infinite recursion and core dumps due to
68 * However, the system is too dumb to implement sigaction(),
69 * so we don't have a choice.
78 * Per-request data, added by modules...
80 struct request_data_t {
86 void (*free_opaque)(void *);
90 * Add opaque data (with a "free" function) to a REQUEST.
92 * The unique ptr is meant to be a malloc'd module configuration,
93 * and the unique integer allows the caller to have multiple
94 * opaque data associated with a REQUEST.
96 int request_data_add(REQUEST *request,
97 void *unique_ptr, int unique_int,
98 void *opaque, void (*free_opaque)(void *))
100 request_data_t *this, **last, *next;
103 * Some simple sanity checks.
105 if (!request || !opaque) return -1;
108 for (last = &(request->data); *last != NULL; last = &((*last)->next)) {
109 if (((*last)->unique_ptr == unique_ptr) &&
110 ((*last)->unique_int == unique_int)) {
115 if (this->opaque && /* free it, if necessary */
117 this->free_opaque(this->opaque);
118 break; /* replace the existing entry */
122 if (!this) this = rad_malloc(sizeof(*this));
123 memset(this, 0, sizeof(*this));
126 this->unique_ptr = unique_ptr;
127 this->unique_int = unique_int;
128 this->opaque = opaque;
129 this->free_opaque = free_opaque;
138 * Get opaque data from a request.
140 void *request_data_get(REQUEST *request,
141 void *unique_ptr, int unique_int)
143 request_data_t **last;
145 if (!request) return NULL;
147 for (last = &(request->data); *last != NULL; last = &((*last)->next)) {
148 if (((*last)->unique_ptr == unique_ptr) &&
149 ((*last)->unique_int == unique_int)) {
150 request_data_t *this = *last;
151 void *ptr = this->opaque;
154 * Remove the entry from the list, and free it.
158 return ptr; /* don't free it, the caller does that */
162 return NULL; /* wasn't found, too bad... */
167 * Get opaque data from a request without removing it.
169 void *request_data_reference(REQUEST *request,
170 void *unique_ptr, int unique_int)
172 request_data_t **last;
174 for (last = &(request->data); *last != NULL; last = &((*last)->next)) {
175 if (((*last)->unique_ptr == unique_ptr) &&
176 ((*last)->unique_int == unique_int)) {
177 request_data_t *this = *last;
178 void *ptr = this->opaque;
184 return NULL; /* wasn't found, too bad... */
189 * Free a REQUEST struct.
191 void request_free(REQUEST **request_ptr)
195 if ((request_ptr == NULL) || !*request_ptr)
198 request = *request_ptr;
201 rad_free(&request->packet);
205 rad_free(&request->proxy);
209 rad_free(&request->reply);
212 if (request->proxy_reply)
213 rad_free(&request->proxy_reply);
216 if (request->config_items)
217 pairfree(&request->config_items);
219 request->username = NULL;
220 request->password = NULL;
223 request_data_t *this, *next;
225 for (this = request->data; this != NULL; this = next) {
227 if (this->opaque && /* free it, if necessary */
229 this->free_opaque(this->opaque);
232 request->data = NULL;
236 (request->root->refcount > 0)) {
237 request->root->refcount--;
238 request->root = NULL;
242 request->magic = 0x01020304; /* set the request to be nonsense */
244 request->client = NULL;
246 request->home_server = NULL;
254 * Check a filename for sanity.
256 * Allow only uppercase/lowercase letters, numbers, and '-_/.'
258 int rad_checkfilename(const char *filename)
260 if (strspn(filename, "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789-_/.") == strlen(filename)) {
268 * Create possibly many directories.
270 * Note that the input directory name is NOT a constant!
271 * This is so that IF an error is returned, the 'directory' ptr
272 * points to the name of the file which caused the error.
274 int rad_mkdir(char *directory, int mode)
281 * If the directory exists, don't do anything.
283 if (stat(directory, &st) == 0) {
288 * Look for the LAST directory name. Try to create that,
289 * failing on any error.
291 p = strrchr(directory, FR_DIR_SEP);
294 rcode = rad_mkdir(directory, mode);
297 * On error, we leave the directory name as the
298 * one which caused the error.
305 * Reset the directory delimiter, and go ask
306 * the system to make the directory.
314 * Having done everything successfully, we do the
315 * system call to actually go create the directory.
317 return mkdir(directory, mode);
322 * Module malloc() call, which does stuff if the malloc fails.
324 * This call ALWAYS succeeds!
326 void *rad_malloc(size_t size)
328 void *ptr = malloc(size);
331 radlog(L_ERR|L_CONS, "no memory");
339 * Logs an error message and aborts the program
343 void NEVER_RETURNS rad_assert_fail (const char *file, unsigned int line,
346 radlog(L_ERR, "ASSERT FAILED %s[%u]: %s", file, line, expr);
352 * Create a new REQUEST data structure.
354 REQUEST *request_alloc(void)
358 request = rad_malloc(sizeof(REQUEST));
359 memset(request, 0, sizeof(REQUEST));
361 request->magic = REQUEST_MAGIC;
364 request->proxy = NULL;
366 request->reply = NULL;
368 request->proxy_reply = NULL;
370 request->config_items = NULL;
371 request->username = NULL;
372 request->password = NULL;
373 request->timestamp = time(NULL);
374 #ifdef HAVE_PTHREAD_H
375 request->child_pid = NO_SUCH_CHILD_PID;
377 request->options = RAD_REQUEST_OPTION_NONE;
379 request->module = "";
380 request->component = "";
381 if (debug_flag) request->radlog = radlog_request;
388 * Create a new REQUEST, based on an old one.
390 * This function allows modules to inject fake requests
391 * into the server, for tunneled protocols like TTLS & PEAP.
393 REQUEST *request_alloc_fake(REQUEST *request)
397 fake = request_alloc();
399 fake->number = request->number;
400 #ifdef HAVE_PTHREAD_H
401 fake->child_pid = NO_SUCH_CHILD_PID;
403 fake->parent = request;
404 fake->root = request->root;
405 fake->client = request->client;
408 * For new server support.
410 * FIXME: Key instead off of a "virtual server" data structure.
412 * FIXME: Permit different servers for inner && outer sessions?
414 fake->server = request->server;
416 fake->packet = rad_alloc(0);
422 fake->reply = rad_alloc(0);
428 fake->master_state = REQUEST_ACTIVE;
429 fake->child_state = REQUEST_RUNNING;
432 * Fill in the fake request.
434 fake->packet->sockfd = -1;
435 fake->packet->src_ipaddr = request->packet->src_ipaddr;
436 fake->packet->src_port = request->packet->src_port;
437 fake->packet->dst_ipaddr = request->packet->dst_ipaddr;
438 fake->packet->dst_port = 0;
441 * This isn't STRICTLY required, as the fake request MUST NEVER
442 * be put into the request list. However, it's still reasonable
445 fake->packet->id = fake->number & 0xff;
446 fake->packet->code = request->packet->code;
447 fake->timestamp = request->timestamp;
450 * Required for new identity support
452 fake->listener = request->listener;
455 * Fill in the fake reply, based on the fake request.
457 fake->reply->sockfd = fake->packet->sockfd;
458 fake->reply->src_ipaddr = fake->packet->dst_ipaddr;
459 fake->reply->src_port = fake->packet->dst_port;
460 fake->reply->dst_ipaddr = fake->packet->src_ipaddr;
461 fake->reply->dst_port = fake->packet->src_port;
462 fake->reply->id = fake->packet->id;
463 fake->reply->code = 0; /* UNKNOWN code */
470 * Copy a quoted string.
472 int rad_copy_string(char *to, const char *from)
484 } while (*from && (*from != quote));
486 if (*from != quote) return -1; /* not properly quoted */
499 int rad_copy_variable(char *to, const char *from)
511 sublen = rad_copy_string(to, from);
512 if (sublen < 0) return sublen;
517 case '}': /* end of variable expansion */
521 return length; /* proper end of variable */
529 case '%': /* start of variable expansion */
530 if (from[1] == '{') {
534 sublen = rad_copy_variable(to, from);
535 if (sublen < 0) return sublen;
539 } /* else FIXME: catch %%{ ?*/
549 } /* loop over the input string */
552 * We ended the string before a trailing '}'