2 * rlm_jradius - The FreeRADIUS JRadius Server Module
3 * Copyright (C) 2004-2006 PicoPoint, B.V.
4 * Copyright (c) 2007-2008 David Bird
6 * This program is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License as published by the
8 * Free Software Foundation; either version 2 of the License, or (at your
9 * option) any later version.
11 * This program is distributed in the hope that it will be useful, but
12 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
13 * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
16 * You should have received a copy of the GNU General Public License along
17 * with this program; if not, write to the Free Software Foundation, Inc.,
18 * 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20 * This module is used to connect FreeRADIUS to the JRadius server.
21 * JRadius is a Java RADIUS client and server framework, see doc/rlm_jradius
22 * and http://jradius.net/ for more information.
24 * Author(s): David Bird <dbird@acm.org>
26 * Connection pooling code based on rlm_sql, see rlm_sql/sql.c for copyright and license.
32 #include <sys/signal.h>
33 #include <sys/types.h>
37 #include <freeradius-devel/ident.h>
40 #include <freeradius-devel/autoconf.h>
41 #include <freeradius-devel/libradius.h>
42 #include <freeradius-devel/radiusd.h>
43 #include <freeradius-devel/modules.h>
44 #include <freeradius-devel/conffile.h>
50 #ifdef HAVE_SYS_SOCKET_H
51 #include <sys/socket.h>
55 #define O_NONBLOCK O_NDELAY
58 static const int JRADIUS_PORT = 1814;
59 static const int HALF_MESSAGE_LEN = 16384;
60 static const int MESSAGE_LEN = 32768;
62 static const int JRADIUS_authenticate = 1;
63 static const int JRADIUS_authorize = 2;
64 static const int JRADIUS_preacct = 3;
65 static const int JRADIUS_accounting = 4;
66 static const int JRADIUS_checksimul = 5;
67 static const int JRADIUS_pre_proxy = 6;
68 static const int JRADIUS_post_proxy = 7;
69 static const int JRADIUS_post_auth = 8;
71 #define LOG_PREFIX "rlm_jradius: "
74 typedef struct jradius_socket {
77 pthread_mutex_t mutex;
79 struct jradius_socket *next;
80 enum { is_connected, not_connected } state;
87 typedef struct jradius_inst {
93 char * host [MAX_HOSTS];
94 uint32_t ipaddr [MAX_HOSTS];
107 typedef struct _byte_array
115 static CONF_PARSER module_config[] = {
116 { "name", PW_TYPE_STRING_PTR, offsetof(JRADIUS, name), NULL, "localhost"},
117 { "primary", PW_TYPE_STRING_PTR, offsetof(JRADIUS, host[0]), NULL, "localhost"},
118 { "secondary", PW_TYPE_STRING_PTR, offsetof(JRADIUS, host[1]), NULL, NULL},
119 { "tertiary", PW_TYPE_STRING_PTR, offsetof(JRADIUS, host[2]), NULL, NULL},
120 { "timeout", PW_TYPE_INTEGER, offsetof(JRADIUS, timeout), NULL, "5"},
121 { "read_timeout", PW_TYPE_INTEGER, offsetof(JRADIUS, read_timeout), NULL, "90"},
122 { "write_timeout",PW_TYPE_INTEGER, offsetof(JRADIUS, write_timeout),NULL, "90"},
123 { "onfail", PW_TYPE_STRING_PTR, offsetof(JRADIUS, onfail_s), NULL, NULL},
124 { "keepalive", PW_TYPE_BOOLEAN, offsetof(JRADIUS, keepalive), NULL, "yes"},
125 { "connections", PW_TYPE_INTEGER, offsetof(JRADIUS, jrsock_cnt), NULL, "8"},
126 { "allow_codechange", PW_TYPE_BOOLEAN, offsetof(JRADIUS, allow_codechange), NULL, "no"},
127 { "allow_idchange", PW_TYPE_BOOLEAN, offsetof(JRADIUS, allow_idchange), NULL, "no"},
128 { NULL, -1, 0, NULL, NULL }
132 sock_read(JRADIUS * inst, JRSOCK *jrsock, uint8_t *b, size_t blen) {
133 int fd = jrsock->con.sock;
134 int timeout = inst->read_timeout;
140 while (recd < blen) {
148 if (select(fd + 1, &fds, (fd_set *) 0, (fd_set *) 0, &tv) == -1)
151 if (FD_ISSET(fd, &fds))
153 c = recv(fd, b + recd, blen-recd, 0);
155 c = read(fd, b + recd, blen-recd);
160 if (c <= 0) return -1;
164 if (recd < blen) return -1;
169 sock_write(JRADIUS * inst, JRSOCK *jrsock, char *b, size_t blen) {
170 int fd = jrsock->con.sock;
171 int timeout = inst->write_timeout;
177 while (sent < blen) {
185 if (select(fd + 1, (fd_set *) 0, &fds, (fd_set *) 0, &tv) == -1)
188 if (FD_ISSET(fd, &fds))
190 c = send(fd, b+sent, blen-sent, 0);
192 c = write(fd, b+sent, blen-sent);
197 if (c <= 0) return -1;
201 if (sent != blen) return -1;
205 static int connect_socket(JRSOCK *jrsock, JRADIUS *inst)
207 struct sockaddr_in local_addr, serv_addr;
208 int i, connected = 0;
213 * Connect to jradius servers until we succeed or die trying
215 for (i = 0; !connected && i < MAX_HOSTS && inst->ipaddr[i] > 0; i++) {
218 * Allocate a TCP socket
220 if ((sock = socket(AF_INET, SOCK_STREAM, 0)) == -1) {
221 radlog(L_ERR, LOG_PREFIX "could not allocate TCP socket");
226 * If we have a timeout value set, make the socket non-blocking
228 if (inst->timeout > 0 &&
229 fcntl(sock, F_SETFL, fcntl(sock, F_GETFL, 0) | O_NONBLOCK) == -1) {
230 radlog(L_ERR, LOG_PREFIX "could not set non-blocking on socket");
235 * Bind to any local port
237 memset(&local_addr, 0, sizeof(local_addr));
238 local_addr.sin_family = AF_INET;
239 local_addr.sin_addr.s_addr = htonl(INADDR_ANY);
240 local_addr.sin_port = htons(0);
242 if (bind(sock, (struct sockaddr *) &local_addr, sizeof(local_addr)) < 0) {
243 radlog(L_ERR, LOG_PREFIX "could not locally bind TCP socket");
248 * Attempt connection to remote server
250 memset(&serv_addr, 0, sizeof(serv_addr));
251 serv_addr.sin_family = AF_INET;
252 memcpy((char *) &serv_addr.sin_addr, &(inst->ipaddr[i]), 4);
253 serv_addr.sin_port = htons(inst->port[i]);
255 if (connect(sock, (struct sockaddr *)&serv_addr, sizeof(serv_addr)) < 0) {
256 if (inst->timeout > 0 && (errno == EINPROGRESS || errno == EWOULDBLOCK)) {
258 * Wait to see if non-blocking socket connects or times-out
261 memset(&pfd, 0, sizeof(pfd));
264 pfd.events = POLLOUT;
266 if (poll(&pfd, 1, inst->timeout * 1000) == 1 && pfd.revents) {
268 * Lets make absolutely sure we are connected
270 struct sockaddr_in sa;
271 unsigned int salen = sizeof(sa);
272 if (getpeername(sock, (struct sockaddr *) &sa, &salen) != -1) {
274 * CONNECTED! break out of for-loop
285 radlog(L_ERR, LOG_PREFIX "could not connect to %s:%d",
286 ip_ntoa(buff, inst->ipaddr[i]), inst->port[i]);
290 * CONNECTED (instantly)! break out of for-loop
297 * Unable to connect, cleanup and start over
303 radlog(L_ERR, LOG_PREFIX "could not find any jradius server!");
308 * If we previously set the socket to non-blocking, restore blocking
309 if (inst->timeout > 0 &&
310 fcntl(sock, F_SETFL, fcntl(sock, F_GETFL, 0) & ~O_NONBLOCK) == -1) {
311 radlog(L_ERR, LOG_PREFIX "could not set blocking on socket");
316 jrsock->state = is_connected;
317 jrsock->con.sock = sock;
321 if (sock > 0) { shutdown(sock, 2); close(sock); }
322 jrsock->state = not_connected;
326 static void close_socket(UNUSED JRADIUS * inst, JRSOCK *jrsock)
328 radlog(L_INFO, "rlm_jradius: Closing JRadius connection %d", jrsock->id);
329 if (jrsock->con.sock > 0) {
330 shutdown(jrsock->con.sock, 2);
331 close(jrsock->con.sock);
333 jrsock->state = not_connected;
334 jrsock->con.sock = 0;
337 static void free_socket(JRADIUS * inst, JRSOCK *jrsock) {
338 close_socket(inst, jrsock);
339 if (inst->keepalive) {
340 #ifdef HAVE_PTHREAD_H
341 pthread_mutex_destroy(&jrsock->mutex);
347 static int init_socketpool(JRADIUS * inst)
353 inst->connect_after = 0;
354 inst->sock_pool = NULL;
356 for (i = 0; i < inst->jrsock_cnt; i++) {
357 radlog(L_INFO, "rlm_jradius: starting JRadius connection %d", i);
359 if ((jrsock = rad_malloc(sizeof(*jrsock))) == 0) return -1;
361 memset(jrsock, 0, sizeof(*jrsock));
363 jrsock->state = not_connected;
365 #ifdef HAVE_PTHREAD_H
366 rcode = pthread_mutex_init(&jrsock->mutex,NULL);
368 radlog(L_ERR, "rlm_jradius: Failed to init lock: %s", strerror(errno));
373 if (time(NULL) > inst->connect_after)
374 if (connect_socket(jrsock, inst))
377 jrsock->next = inst->sock_pool;
378 inst->sock_pool = jrsock;
380 inst->last_used = NULL;
383 radlog(L_DBG, "rlm_jradius: Failed to connect to JRadius server.");
389 static void free_socketpool(JRADIUS * inst)
394 for (cur = inst->sock_pool; cur; cur = next) {
396 free_socket(inst, cur);
399 inst->sock_pool = NULL;
402 static JRSOCK * get_socket(JRADIUS * inst)
405 int tried_to_connect = 0;
408 start = inst->last_used;
409 if (!start) start = inst->sock_pool;
414 #ifdef HAVE_PTHREAD_H
415 if (pthread_mutex_trylock(&cur->mutex) != 0) {
420 if ((cur->state == not_connected) && (time(NULL) > inst->connect_after)) {
421 radlog(L_INFO, "rlm_jradius: Trying to (re)connect unconnected handle %d", cur->id);
423 connect_socket(cur, inst);
426 if (cur->state == not_connected) {
427 radlog(L_DBG, "rlm_jradius: Ignoring unconnected handle %d", cur->id);
429 #ifdef HAVE_PTHREAD_H
430 pthread_mutex_unlock(&cur->mutex);
435 radlog(L_DBG, "rlm_jradius: Reserving JRadius socket id: %d", cur->id);
437 if (unconnected != 0 || tried_to_connect != 0) {
438 radlog(L_INFO, "rlm_jradius: got socket %d after skipping %d unconnected handles, tried to reconnect %d though",
439 cur->id, unconnected, tried_to_connect);
442 inst->last_used = cur->next;
447 if (!cur) cur = inst->sock_pool;
448 if (cur == start) break;
451 radlog(L_INFO, "rlm_jradius: There are no sockets to use! skipped %d, tried to connect %d",
452 unconnected, tried_to_connect);
456 static int release_socket(UNUSED JRADIUS * inst, JRSOCK * jrsock)
458 #ifdef HAVE_PTHREAD_H
459 pthread_mutex_unlock(&jrsock->mutex);
462 radlog(L_DBG, "rlm_jradius: Released JRadius socket id: %d", jrsock->id);
469 * Initialize the jradius module
471 static int jradius_instantiate(CONF_SECTION *conf, void **instance)
473 JRADIUS *inst = (JRADIUS *) instance;
474 char host[128], b[128], *h;
477 inst = rad_malloc(sizeof(JRADIUS));
478 memset(inst, 0, sizeof(JRADIUS));
480 if (cf_section_parse(conf, inst, module_config) < 0) {
485 for (i = 0, idx = 0; i < MAX_HOSTS; i++) {
486 if (inst->host[i] && strlen(inst->host[i]) < sizeof(host)) {
491 if (sscanf(b, "%[^:]:%d", host, &port) == 2) { h = host; p = port; }
495 if (ip_hton(h, AF_INET, &ipaddr) < 0) {
496 radlog(L_ERR, "Can't find IP address for host %s", h);
499 if ((inst->ipaddr[idx] = ipaddr.ipaddr.ip4addr.s_addr) != htonl(INADDR_NONE)) {
501 radlog(L_INFO, LOG_PREFIX "configuring jradius server %s:%d", h, p);
504 radlog(L_ERR, LOG_PREFIX "invalid jradius server %s", h);
510 if (inst->keepalive) init_socketpool(inst);
512 inst->onfail = RLM_MODULE_FAIL;
514 if (inst->onfail_s) {
515 if (!strcmp(inst->onfail_s, "NOOP")) inst->onfail = RLM_MODULE_NOOP;
516 else if (!strcmp(inst->onfail_s, "REJECT")) inst->onfail = RLM_MODULE_REJECT;
517 else if (!strcmp(inst->onfail_s, "OK")) inst->onfail = RLM_MODULE_OK;
518 else if (!strcmp(inst->onfail_s, "FAIL")) inst->onfail = RLM_MODULE_FAIL;
519 else radlog(L_ERR, LOG_PREFIX "invalid jradius 'onfail' state %s", inst->onfail_s);
528 * Initialize a byte array buffer structure
530 static void init_byte_array(byte_array * ba, unsigned char *b, int blen)
533 ba->size = ba->left = blen;
538 * Pack a single byte into a byte array buffer
540 static int pack_byte(byte_array * ba, unsigned char c)
542 if (ba->left < 1) return -1;
552 * Pack an array of bytes into a byte array buffer
554 static int pack_bytes(byte_array * ba, unsigned char *d, unsigned int dlen)
556 if (ba->left < dlen) return -1;
558 memcpy((void *)(ba->b + ba->pos), d, dlen);
566 * Pack an integer into a byte array buffer (adjusting for byte-order)
568 static int pack_uint32(byte_array * ba, uint32_t i)
570 if (ba->left < 4) return -1;
574 memcpy((void *)(ba->b + ba->pos), (void *)&i, 4);
582 * Pack a short into a byte array buffer (adjusting for byte-order)
584 static int pack_uint16(byte_array * ba, uint16_t i)
586 if (ba->left < 2) return -1;
590 memcpy((void *)(ba->b + ba->pos), (void *)&i, 2);
598 * Pack a byte into a byte array buffer
600 static int pack_uint8(byte_array * ba, uint8_t i)
602 if (ba->left < 1) return -1;
604 memcpy((void *)(ba->b + ba->pos), (void *)&i, 1);
612 * Pack one byte array buffer into another byte array buffer
614 static int pack_array(byte_array * ba, byte_array * a)
616 if (ba->left < a->pos) return -1;
618 memcpy((void *)(ba->b + ba->pos), (void *)a->b, a->pos);
626 * Pack radius attributes into a byte array buffer
628 static int pack_vps(byte_array * ba, VALUE_PAIR * vps)
633 for (vp = vps; vp != NULL; vp = vp->next) {
635 radlog(L_DBG, LOG_PREFIX "packing attribute %s (type: %d; len: %d)", vp->name, vp->attribute, vp->length);
637 i = vp->attribute; /* element is int, not uint32_t */
638 if (pack_uint32(ba, i) == -1) return -1;
640 if (pack_uint32(ba, i) == -1) return -1;
642 if (pack_uint32(ba, i) == -1) return -1;
646 if (pack_uint8(ba, vp->lvalue) == -1) return -1;
649 if (pack_uint16(ba, vp->lvalue) == -1) return -1;
651 case PW_TYPE_INTEGER:
653 if (pack_uint32(ba, vp->lvalue) == -1) return -1;
656 if (pack_bytes(ba, (void *)&vp->vp_ipaddr, vp->length) == -1) return -1;
659 if (pack_bytes(ba, (void *)vp->vp_octets, vp->length) == -1) return -1;
668 * Pack a radius packet into a byte array buffer
670 static int pack_packet(byte_array * ba, RADIUS_PACKET * p)
672 /*unsigned char code = p->code;*/
673 unsigned char buff[HALF_MESSAGE_LEN];
676 init_byte_array(&pba, buff, sizeof(buff));
678 if (pack_vps(&pba, p->vps) == -1) return -1;
680 radlog(L_DBG, LOG_PREFIX "packing packet with code: %d (attr length: %d)", p->code, pba.pos);
683 if (pack_uint32(ba, p->code) == -1) return -1;
684 if (pack_uint32(ba, p->id) == -1) return -1;
686 if (pack_byte(ba, p->code) == -1) return -1;
687 if (pack_byte(ba, p->id) == -1) return -1;
689 if (pack_uint32(ba, pba.pos) == -1) return -1;
690 if (pba.pos == 0) return 0;
691 if (pack_array(ba, &pba) == -1) return -1;
696 static int pack_request(byte_array * ba, REQUEST *r)
698 unsigned char buff[HALF_MESSAGE_LEN];
701 init_byte_array(&pba, buff, sizeof(buff));
703 if (pack_vps(&pba, r->config_items) == -1) return -1;
704 if (pack_uint32(ba, pba.pos) == -1) return -1;
705 if (pba.pos == 0) return 0;
706 if (pack_array(ba, &pba) == -1) return -1;
711 static uint32_t unpack_uint32(unsigned char *c)
714 memcpy((void *)&ii, c, 4);
718 static uint16_t unpack_uint16(unsigned char *c)
721 memcpy((void *)&ii, c, 2);
725 static uint8_t unpack_uint8(unsigned char *c)
728 memcpy((void *)&ii, c, 1);
735 * Read a single byte from socket
737 static int read_byte(JRADIUS *inst, JRSOCK *jrsock, uint8_t *b)
739 return (sock_read(inst, jrsock, b, 1) == 1) ? 0 : -1;
743 * Read an integer from the socket (adjusting for byte-order)
745 static int read_uint32(JRADIUS *inst, JRSOCK *jrsock, uint32_t *i)
749 if (sock_read(inst, jrsock, (uint8_t *)&ii, 4) != 4) return -1;
756 * Read a value-pair list from the socket
758 static int read_vps(JRADIUS *inst, JRSOCK *jrsock, VALUE_PAIR **pl, int plen)
761 unsigned char buff[MESSAGE_LEN];
762 uint32_t alen, atype, aop;
765 while (rlen < plen) {
766 if (read_uint32(inst, jrsock, &atype) == -1) return -1; rlen += 4;
767 if (read_uint32(inst, jrsock, &alen) == -1) return -1; rlen += 4;
768 if (read_uint32(inst, jrsock, &aop) == -1) return -1; rlen += 4;
770 radlog(L_DBG, LOG_PREFIX "reading attribute: type=%d; len=%d", atype, alen);
772 if (alen >= sizeof(buff)) {
773 radlog(L_ERR, LOG_PREFIX "packet value too large (len: %d)", alen);
777 if (sock_read(inst, jrsock, buff, alen) != (int)alen) return -1; rlen += alen;
781 * Create new attribute
783 vp = paircreate(atype, -1);
786 if (vp->type == -1) {
788 * FreeRADIUS should know about the same attributes that JRadius knows
790 radlog(L_ERR, LOG_PREFIX "received attribute we do not recognize (type: %d)", atype);
796 * Fill in the attribute value based on type
800 vp->lvalue = unpack_uint8(buff);
805 vp->lvalue = unpack_uint16(buff);
809 case PW_TYPE_INTEGER:
811 vp->lvalue = unpack_uint32(buff);
816 memcpy((void *)&vp->vp_ipaddr, buff, 4);
821 if (alen >= sizeof(vp->vp_octets)) alen = sizeof(vp->vp_octets) - 1;
822 memcpy((void *)vp->vp_octets, buff, alen);
828 * Add the attribute to the packet
837 * Read a radius packet from the socket
839 static int read_packet(JRADIUS * inst, JRSOCK *jrsock, RADIUS_PACKET *p)
846 if (read_uint32(inst, jrsock, &code) == -1) return -1;
847 if (read_uint32(inst, jrsock, &id) == -1) return -1;
850 if (read_byte(inst, jrsock, &c) == -1) return -1;
852 if (read_byte(inst, jrsock, &c) == -1) return -1;
856 if (read_uint32(inst, jrsock, &plen) == -1) return -1;
858 radlog(L_DBG, LOG_PREFIX "reading packet: code=%d len=%d", (int)code, plen);
860 if (inst->allow_codechange)
861 if (code != p->code) {
862 radlog(L_INFO, LOG_PREFIX "changing packet code from %d to %d", p->code, code);
866 if (inst->allow_idchange)
867 if ((int)id != p->id) {
868 radlog(L_INFO, LOG_PREFIX "changing packet id from %d to %d", p->id, id);
873 * Delete previous attribute list
877 if (plen == 0) return 0;
879 if (read_vps(inst, jrsock, &p->vps, plen) == -1) return -1;
884 static int read_request(JRADIUS *inst, JRSOCK *jrsock, REQUEST *p)
888 if (read_uint32(inst, jrsock, &plen) == -1) return -1;
890 radlog(L_DBG, LOG_PREFIX "reading request: config_item: len=%d", plen);
893 * Delete previous attribute list
895 pairfree(&p->config_items);
897 if (plen == 0) return 0;
899 if (read_vps(inst, jrsock, &p->config_items, plen) == -1) return -1;
904 static int rlm_jradius_call(char func, void *instance, REQUEST *req, int isproxy)
906 JRADIUS * inst = instance;
907 RADIUS_PACKET * request = isproxy ? req->proxy : req->packet;
908 RADIUS_PACKET * reply = isproxy ? req->proxy_reply : req->reply;
912 int exitstatus = inst->onfail;
913 unsigned char rcode, pcount;
915 unsigned char buff[MESSAGE_LEN];
918 char * n = inst->name;
919 unsigned int nlen = strlen(n);
920 const char * err = 0;
923 #define W_ERR(s) { err=s; goto packerror; }
924 #define R_ERR(s) { err=s; goto parseerror; }
926 if (inst->keepalive) {
927 jrsock = get_socket(inst);
928 if (!jrsock) return exitstatus;
931 memset(jrsock, 0, sizeof(*jrsock));
932 jrsock->state = not_connected;
935 init_byte_array(&ba, buff, sizeof(buff));
938 if (request) pcount++;
942 * Create byte array to send to jradius
944 if ((rc = pack_uint32 (&ba, nlen)) == -1) W_ERR("pack_uint32(nlen)");
945 if ((rc = pack_bytes (&ba, (void *)n, nlen)) == -1) W_ERR("pack_bytes(name)");
946 if ((rc = pack_byte (&ba, func)) == -1) W_ERR("pack_byte(fun)");
947 if ((rc = pack_byte (&ba, pcount)) == -1) W_ERR("pack_byte(pcnt)");
948 if (pcount > 0 && (rc = pack_packet (&ba, request)) == -1) W_ERR("pack_packet(req)");
949 if (pcount > 1 && (rc = pack_packet (&ba, reply)) == -1) W_ERR("pack_packet(rep)");
950 if ((rc = pack_request(&ba, req)) == -1) W_ERR("pack_request()");
956 if (jrsock->state == not_connected) {
957 if (attempt2) radlog(L_ERR, LOG_PREFIX "reconnecting socket id %d", jrsock->id);
958 if (!connect_socket(jrsock, inst)) {
959 if (attempt2) radlog(L_ERR, LOG_PREFIX "could not reconnect socket %d, giving up", jrsock->id);
963 radlog(L_DBG, LOG_PREFIX "sending %d bytes to socket %d", ba.pos, jrsock->id);
964 if (sock_write(inst, jrsock, ba.b, ba.pos) != (int)ba.pos ||
965 (rc = read_byte(inst, jrsock, &rcode)) == -1) {
967 * With an error on the write or the first read, try closing the socket
968 * and reconnecting to see if that improves matters any (tries this only once)
970 radlog(L_ERR, LOG_PREFIX "error sending request with socket %d", jrsock->id);
971 if (!inst->keepalive || attempt2) W_ERR("socket_send/first_read");
972 close_socket(inst, jrsock);
980 if ((rc = read_byte(inst, jrsock, &pcount)) == -1) R_ERR("read_byte(pcnt)");
982 radlog(L_DBG, LOG_PREFIX "return code %d; receiving %d packets", (int)rcode, (int)pcount);
984 if (pcount > 0 && request) if ((rc = read_packet (inst, jrsock, request)) == -1) R_ERR("read_packet(req)");
985 if (pcount > 1 && reply) if ((rc = read_packet (inst, jrsock, reply)) == -1) R_ERR("read_packet(rep)");
987 if ((rc = read_request(inst, jrsock, req)) == -1) R_ERR("read_request()");
990 * Since we deleted all the attribute lists in the request,
991 * we need to reconfigure a few pointers in the REQUEST object
994 req->username = pairfind(request->vps, PW_USER_NAME);
997 req->password = pairfind(request->vps, PW_PASSWORD);
998 if (!req->password) req->password = pairfind(request->vps, PW_CHAP_PASSWORD);
1002 * All done, set return code and cleanup
1004 exitstatus = (int)rcode;
1008 radlog(L_ERR, LOG_PREFIX "problem parsing the data [%s]",err);
1009 if (inst->keepalive) close_socket(inst, jrsock);
1013 radlog(L_ERR, LOG_PREFIX "problem packing the data[%s]",err);
1014 if (inst->keepalive) close_socket(inst, jrsock);
1017 if (inst->keepalive)
1018 release_socket(inst, jrsock);
1020 close_socket(inst, jrsock);
1025 static int jradius_authenticate(void *instance, REQUEST *request)
1027 return rlm_jradius_call(JRADIUS_authenticate, instance, request, 0);
1030 static int jradius_authorize(void *instance, REQUEST *request)
1032 return rlm_jradius_call(JRADIUS_authorize, instance, request, 0);
1035 static int jradius_preacct(void *instance, REQUEST *request)
1037 return rlm_jradius_call(JRADIUS_preacct, instance, request, 0);
1040 static int jradius_accounting(void *instance, REQUEST *request)
1042 return rlm_jradius_call(JRADIUS_accounting, instance, request, 0);
1045 static int jradius_checksimul(void *instance, REQUEST *request)
1047 return rlm_jradius_call(JRADIUS_checksimul, instance, request, 0);
1050 static int jradius_pre_proxy(void *instance, REQUEST *request)
1052 return rlm_jradius_call(JRADIUS_pre_proxy, instance, request, 1);
1055 static int jradius_post_proxy(void *instance, REQUEST *request)
1057 return rlm_jradius_call(JRADIUS_post_proxy, instance, request, 1);
1060 static int jradius_post_auth(void *instance, REQUEST *request)
1062 return rlm_jradius_call(JRADIUS_post_auth, instance, request, 0);
1065 static int jradius_detach(void *instance)
1067 JRADIUS *inst = (JRADIUS *) instance;
1068 free_socketpool(inst);
1073 module_t rlm_jradius = {
1076 RLM_TYPE_THREAD_SAFE,
1077 jradius_instantiate,
1080 jradius_authenticate,