/* Copyright 2010, 2011 NORDUnet A/S. All rights reserved.
- See the file COPYING for licensing information. */
+ See LICENSE for licensing information. */
#if defined HAVE_CONFIG_H
#include <config.h>
#endif
#include <string.h>
+#include <stdlib.h>
+#include <errno.h>
#include <assert.h>
#include <event2/event.h>
#include <event2/bufferevent.h>
int
conn_close (struct rs_connection **connp)
{
- int r;
+ int r = 0;
assert (connp);
assert (*connp);
- r = rs_conn_destroy (*connp);
- if (!r)
+ if ((*connp)->is_connected)
+ r = rs_conn_disconnect (*connp);
+ if (r == RSE_OK)
*connp = NULL;
return r;
}
}
int
-rs_conn_create (struct rs_context *ctx, struct rs_connection **conn,
+rs_conn_create (struct rs_context *ctx,
+ struct rs_connection **conn,
const char *config)
{
struct rs_connection *c;
}
int
-rs_conn_add_listener (struct rs_connection *conn, rs_conn_type_t type,
- const char *hostname, int port)
+rs_conn_add_listener (struct rs_connection *conn,
+ rs_conn_type_t type,
+ const char *hostname,
+ int port)
{
return rs_err_conn_push_fl (conn, RSE_NOSYS, __FILE__, __LINE__, NULL);
}
if (conn->is_connected)
err = rs_conn_disconnect (conn);
+
+#if defined (RS_ENABLE_TLS)
+ if (conn->tls_ssl) /* FIXME: Free SSL strucxt in rs_conn_disconnect? */
+ SSL_free (conn->tls_ssl);
+ if (conn->tls_ctx)
+ SSL_CTX_free (conn->tls_ctx);
+#endif
+
if (conn->tev)
event_free (conn->tev);
if (conn->bev)
bufferevent_free (conn->bev);
+ if (conn->rev)
+ event_free (conn->rev);
+ if (conn->wev)
+ event_free (conn->wev);
if (conn->evb)
event_base_free (conn->evb);
- /* TODO: free tls_ctx */
- /* TODO: free tls_ssl */
+ rs_free (conn->ctx, conn);
return err;
}
}
int
-rs_conn_get_current_peer (struct rs_connection *conn, const char *name,
+rs_conn_get_current_peer (struct rs_connection *conn,
+ const char *name,
size_t buflen)
{
return rs_err_conn_push_fl (conn, RSE_NOSYS, __FILE__, __LINE__, NULL);
event_del (pkt->conn->rev);
}
-/* Special function used in libradsec blocking dispatching mode,
- i.e. with socket set to block on read/write and with no libradsec
- callbacks registered.
-
- For any other use of libradsec, a the received_cb callback should
- be registered in the callbacks member of struct rs_connection.
-
- On successful reception of a RADIUS message it will be verified
- against REQ_MSG, if !NULL.
-
- If PKT_OUT is !NULL it will upon return point at a pointer to a
- struct rs_packet containing the message.
-
- If anything goes wrong or if the read times out (TODO: explain),
- PKT_OUT will not be changed and one or more errors are pushed on
- the connection (available through rs_err_conn_pop()). */
int
rs_conn_receive_packet (struct rs_connection *conn,
struct rs_packet *req_msg,
assert (conn);
assert (conn->realm);
- assert (!conn_user_dispatch_p (conn)); /* Dispatching mode only. */
+ assert (!conn_user_dispatch_p (conn)); /* Blocking mode only. */
if (rs_packet_create (conn, &pkt))
return -1;
"event_add: %s",
evutil_gai_strerror (err));
- /* Activae retransmission timer. */
+ /* Activate retransmission timer. */
conn_activate_timeout (pkt->conn);
}
|| (req_msg
&& packet_verify_response (pkt->conn, pkt, req_msg) != RSE_OK))
{
- assert (rs_err_conn_peek_code (pkt->conn));
+ if (rs_err_conn_peek_code (pkt->conn) == RSE_OK)
+ /* No packet and no error on the stack _should_ mean that the
+ server hung up on us. */
+ rs_err_conn_push (pkt->conn, RSE_DISCO, "no response");
return rs_err_conn_peek_code (conn);
}