The FreeRADIUS server $Id: 15bac2a4c627c01d1aa2047687b3418955ac7f00 $
Loading...
Searching...
No Matches
client.c
Go to the documentation of this file.
1/*
2 * This library is free software; you can redistribute it and/or
3 * modify it under the terms of the GNU Lesser General Public
4 * License as published by the Free Software Foundation; either
5 * version 2.1 of the License, or (at your option) any later version.
6 *
7 * This library is distributed in the hope that it will be useful,
8 * but WITHOUT ANY WARRANTY; without even the implied warranty of
9 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
10 * Lesser General Public License for more details.
11 *
12 * You should have received a copy of the GNU Lesser General Public
13 * License along with this library; if not, write to the Free Software
14 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
15 */
16
17/**
18 * $Id: 79bc5c373527cf9b27a64a3eafccb2e47d479c28 $
19 *
20 * @file protocols/radius/client.c
21 * @brief Functions to support RADIUS bio handlers for client sockets
22 *
23 * @copyright 2024 Network RADIUS SAS (legal@networkradius.com)
24 */
25RCSID("$Id: 79bc5c373527cf9b27a64a3eafccb2e47d479c28 $")
26
27#include <freeradius-devel/radius/client.h>
28#include <freeradius-devel/radius/client_udp.h>
29#include <freeradius-devel/radius/client_tcp.h>
30#include <freeradius-devel/radius/client_priv.h>
31
32#include <freeradius-devel/protocol/radius/rfc2865.h>
33#include <freeradius-devel/protocol/radius/rfc2866.h>
34
35typedef struct {
36 uint32_t initial; //!< initial value
37 uint32_t start; //!< Unix time we started sending this packet
38
39 size_t offset; //!< offset to Acct-Delay-Time value
41
42static void radius_client_retry_sent(fr_bio_t *bio, void *packet_ctx, const void *buffer, UNUSED size_t size,
43 fr_bio_retry_entry_t *retry_ctx);
44static bool radius_client_retry_response(fr_bio_t *bio, fr_bio_retry_entry_t **retry_ctx_p, UNUSED void *packet_ctx, const void *buffer, UNUSED size_t size);
46static ssize_t radius_client_retry(fr_bio_t *bio, fr_bio_retry_entry_t *retry_ctx, UNUSED const void *buffer, NDEBUG_UNUSED size_t size);
47
49
51{
53
54 if (fd_cfg->path || fd_cfg->filename) {
55 fr_strerror_const("Domain sockets and files are not supported");
56 return NULL;
57 }
58
59 if (fd_cfg->socket_type == SOCK_DGRAM) return fr_radius_client_udp_bio_alloc(ctx, cfg, fd_cfg);
60
61 return fr_radius_client_tcp_bio_alloc(ctx, cfg, fd_cfg);
62}
63
65{
66 if (fr_bio_shutdown(my->common.bio) < 0) return -1;
67
68 if (fr_bio_free(my->common.bio) < 0) return -1;
69
70 return 0;
71}
72
73
75{
76 int i;
78 fr_bio_retry_rewrite_t rewrite = NULL;
79
81
82 my = talloc_zero(ctx, fr_radius_client_fd_bio_t);
83 if (!my) return NULL;
84
85 /*
86 * Allocate tracking for all of the packets.
87 */
88 for (i = 1; i < FR_RADIUS_CODE_MAX; i++) {
89 if (!cfg->outgoing[i]) continue;
90
91 my->codes[i] = fr_radius_id_alloc(my);
92 if (!my->codes[i]) goto fail;
93 }
94
95 my->fd = fr_bio_fd_alloc(my, fd_cfg, 0);
96 if (!my->fd) {
97 fail:
99 return NULL;
100 }
101
102 /*
103 * So that read / write pause / resume callbacks can find us
104 */
105 my->fd->uctx = my;
106
107 my->info.fd_info = fr_bio_fd_info(my->fd);
108 fr_assert(my->info.fd_info != NULL);
109
110 my->reply_socket = my->info.fd_info->socket;
111 if ((my->reply_socket.af == AF_INET) || (my->reply_socket.af == AF_INET6)) {
112 fr_socket_addr_swap(&my->reply_socket, &my->info.fd_info->socket);
113 }
114
115 my->mem = fr_bio_mem_alloc(my, read_size, 2 * 4096, my->fd);
116 if (!my->mem) goto fail;
117
118 my->mem->uctx = my;
119
120 if (cfg->packet_cb_cfg.retry) rewrite = radius_client_retry;
121
122 /*
123 * We allocate a retry BIO even for TCP, as we want to be able to timeout the packets.
124 */
125 if (cfg->retry_cfg.el) {
127 rewrite, radius_client_retry_release, &cfg->retry_cfg, my->mem);
128 if (!my->retry) goto fail;
129
130 my->retry->uctx = my;
131
132 my->info.retry_info = fr_bio_retry_info(my->retry);
133 fr_assert(my->info.retry_info != NULL);
134
135 my->common.bio = my->retry;
136
137 } else {
138 /*
139 * No timers for retries, we just use a memory buffer for outbound packets.
140 */
141 my->common.bio = my->mem;
142 }
143
144 my->cfg = *cfg;
145
146 /*
147 * Inform the packet BIO about our application callbacks.
148 */
149 my->common.cb = cfg->packet_cb_cfg;
150
151 /*
152 * Initialize the packet handlers in each BIO.
153 */
154 fr_bio_packet_init(&my->common);
155
156 talloc_set_destructor(my, _radius_client_fd_bio_free);
157
158 /*
159 * Set up the connected status.
160 */
161 my->info.connected = false;
162
163 /*
164 * If we're supposed to be connected (but aren't), then ensure that we don't keep trying to
165 * connect forever.
166 */
167 if ((my->info.fd_info->type == FR_BIO_FD_CONNECTED) && !my->info.connected &&
169 if (fr_timer_in(my, cfg->el->tl, &my->common.ev, cfg->connection_timeout, false,
172 return NULL;
173 }
174 }
175
176 my->proto_ctx = (fr_radius_ctx_t) {
177 .secret = (char const *) my->cfg.verify.secret,
178 .secret_length = my->cfg.verify.secret_len,
179 .secure_transport = false,
180 .proxy_state = my->cfg.proxy_state,
181 };
182
183 my->info.last_idle = fr_time();
184
185 return my;
186}
187
189{
190 ssize_t slen;
191 fr_radius_id_ctx_t *id_ctx;
192
193 fr_assert(!packet->data);
194
195 fr_assert(packet->code > 0);
197 fr_assert(!my->common.write_blocked);
198
199 if (!my->codes[packet->code]) {
200 fr_strerror_printf("Outgoing packet code %s is disallowed by the configuration",
201 fr_radius_packet_name[packet->code]);
202 return fr_bio_error(GENERIC);
203 }
204
205 id_ctx = fr_radius_code_id_pop(my->codes, packet);
206 if (!id_ctx) {
207 /*
208 * Try to cancel the oldest one.
209 */
210 if (!my->retry || fr_bio_retry_entry_cancel(my->retry, NULL) < 1) {
211 all_ids_used:
212 my->all_ids_used = true;
213
214 /*
215 * Tell the application to stop writing data to the BIO.
216 */
217 if (my->common.cb.write_blocked) my->common.cb.write_blocked(&my->common);
218
219 fr_strerror_const("All IDs are in use");
220 return fr_bio_error(GENERIC);
221 }
222
223 id_ctx = fr_radius_code_id_pop(my->codes, packet);
224 if (!id_ctx) goto all_ids_used;
225 }
226 id_ctx->request_ctx = pctx;
227 fr_assert(id_ctx->packet == packet);
228
229 /*
230 * @todo - just create the random auth vector here?
231 */
232 if ((packet->code == FR_RADIUS_CODE_ACCESS_REQUEST) ||
233 (packet->code == FR_RADIUS_CODE_STATUS_SERVER)) {
234 memcpy(my->buffer + 4, packet->vector, sizeof(packet->vector));
235 }
236
237 /*
238 * Encode the packet.
239 */
240 slen = fr_radius_encode(&FR_DBUFF_TMP(my->buffer, sizeof(my->buffer)), list, &(fr_radius_encode_ctx_t) {
241 .common = &my->proto_ctx,
242 .request_authenticator = NULL,
243 .rand_ctx = (fr_fast_rand_t) {
244 .a = fr_rand(),
245 .b = fr_rand(),
246 },
247 .code = packet->code,
248 .id = packet->id,
249 .add_proxy_state = my->cfg.add_proxy_state,
250 });
251 if (slen < 0) {
252 fail:
253 fr_radius_code_id_push(my->codes, packet);
254 return fr_bio_error(GENERIC);
255 }
256
258 packet->data_len = slen;
259
260 slen = fr_radius_sign(my->buffer, NULL,
261 (uint8_t const *) my->cfg.verify.secret, my->cfg.verify.secret_len);
262 if (slen < 0) goto fail;
263
264 /*
265 * The other BIOs will take care of calling fr_radius_client_bio_write_blocked() when the write
266 * is blocked.
267 *
268 * The "next" BIO is a memory one, which can store the entire packet. So write() never returns a
269 * partial packet.
270 */
271 slen = fr_bio_write(my->common.bio, &packet->socket, my->buffer, packet->data_len);
272 if (slen < 0) {
273 fr_assert((slen != fr_bio_error(IO_WOULD_BLOCK)) || my->common.write_blocked);
274
275 fr_radius_code_id_push(my->codes, packet);
276 return slen;
277 }
278
279 fr_assert((size_t) slen == packet->data_len);
280
281 /*
282 * We only allocate packet data after writing it to the socket. If the write fails, we avoid a
283 * memory alloc / free.
284 */
285 packet->data = talloc_array(packet, uint8_t, packet->data_len);
286 if (!packet->data) goto fail;
287
288 /*
289 * Only after successful write do we copy the data back to the packet structure.
290 */
291 memcpy(packet->data, my->buffer, packet->data_len);
292 memcpy(packet->vector, packet->data + 4, RADIUS_AUTH_VECTOR_LENGTH);
293
294 return 0;
295}
296
312
313static ssize_t radius_client_retry(fr_bio_t *bio, fr_bio_retry_entry_t *retry_ctx, UNUSED const void *buffer, NDEBUG_UNUSED size_t size)
314{
315 fr_radius_client_fd_bio_t *my = talloc_get_type_abort(bio->uctx, fr_radius_client_fd_bio_t);
316 fr_radius_id_ctx_t *id_ctx = retry_ctx->uctx;
317 fr_packet_t *packet = id_ctx->packet;
318
319 fr_assert(packet->data_len == size);
320
321 fr_assert(my->cfg.packet_cb_cfg.retry);
322
323 my->cfg.packet_cb_cfg.retry(&my->common, id_ctx->packet);
324
325 /*
326 * Note do do NOT ball fr_bio_write(), because that will treat the packet as a new one!
327 */
328 return fr_bio_retry_rewrite(bio, retry_ctx, packet->data, packet->data_len);
329}
330
331
333{
334 fr_radius_client_fd_bio_t *my = talloc_get_type_abort(bio->uctx, fr_radius_client_fd_bio_t);
335 fr_radius_client_bio_retry_t *acct = retry_ctx->rewrite_ctx;
336 fr_radius_id_ctx_t *id_ctx = retry_ctx->uctx;
337 fr_radius_id_ctx_t my_id_ctx = *id_ctx;
338 fr_packet_t *packet = id_ctx->packet;
339 uint8_t *ptr = packet->data + acct->offset;
340 uint32_t now, delay;
341
342 fr_assert(packet->data_len == size);
343
344 /*
345 * Change IDs, since we're changing the value of Acct-Delay-Time
346 */
347 fr_radius_code_id_push(my->codes, packet);
348
349 id_ctx = fr_radius_code_id_pop(my->codes, packet);
350 if (!id_ctx) return fr_bio_error(GENERIC); /* at the minimum, we should get the ID we just pushed */
351
352 /*
353 * Update the ID context, and tell the retry context that the ID context has changed.
354 */
355 id_ctx->request_ctx = my_id_ctx.request_ctx;
356 retry_ctx->uctx = id_ctx;
357
358 now = fr_time_to_sec(retry_ctx->retry.updated);
359 fr_assert(now >= acct->start);
360 fr_assert((now - acct->start) < (1 << 20)); /* just for pairanoia */
361
362 delay = acct->initial + (now - acct->start);
363
364 fr_nbo_from_uint32(ptr, delay);
365
366 /*
367 * Sign the updated packet.
368 */
369 (void) fr_radius_sign(packet->data, NULL,
370 (uint8_t const *) my->cfg.verify.secret, my->cfg.verify.secret_len);
371
372 /*
373 * Signal that the packet has been retried.
374 */
375 if (my->cfg.packet_cb_cfg.retry) my->cfg.packet_cb_cfg.retry(&my->common, id_ctx->packet);
376
377 /*
378 * Note do do NOT ball fr_bio_write(), because that will treat the packet as a new one!
379 */
380 return fr_bio_retry_rewrite(bio, retry_ctx, packet->data, packet->data_len);
381}
382
383
384static void radius_client_retry_sent(fr_bio_t *bio, void *packet_ctx, const void *buffer, size_t size,
385 fr_bio_retry_entry_t *retry_ctx)
386{
387 fr_radius_client_fd_bio_t *my = talloc_get_type_abort(bio->uctx, fr_radius_client_fd_bio_t);
388 fr_radius_id_ctx_t *id_ctx;
389 uint8_t const *data = buffer;
390 uint8_t const *end;
392
393 id_ctx = fr_radius_code_id_find(my->codes, data[0], data[1]);
394 fr_assert(id_ctx != NULL);
395
396 id_ctx->packet = packet_ctx;
397 id_ctx->retry_ctx = retry_ctx;
398
399 retry_ctx->uctx = id_ctx;
400
401 (void) fr_bio_retry_entry_init(bio, retry_ctx, &my->cfg.retry[data[0]]);
402
403 my->info.outstanding++;
404 my->info.last_sent = retry_ctx->retry.start;
405 if (fr_time_lteq(my->info.first_sent, my->info.last_idle)) my->info.first_sent = my->info.last_sent;
406
407 /*
408 * For Accounting-Request packets which have Acct-Delay-Time, we need to track where the
409 * Acct-Delay-Time is in the packet, along with its original value, and then we can use the
410 * #fr_retry_t to discover how many seconds to add to Acct-Delay-Time.
411 */
412 retry_ctx->rewrite = NULL;
413
414 if ((data[0] != FR_RADIUS_CODE_ACCOUNTING_REQUEST) || (my->cfg.retry[FR_RADIUS_CODE_ACCOUNTING_REQUEST].mrc == 1)) return;
415
416 end = data + size;
418
419 /*
420 * Find the Acct-Delay-Time attribute. If it doesn't exist, we don't update it on retransmits.
421 *
422 * @todo - maybe if it doesn't exist, we look for Event-Timestamp? And add one if necessary?
423 */
424 while (data < end) {
425 if (data[0] == FR_ACCT_DELAY_TIME) break;
426
427 data += data[1];
428 }
429
430 if ((data == end) || (data[1] != 6)) return;
431
432 acct = retry_ctx->rewrite_ctx = talloc_zero(my, fr_radius_client_bio_retry_t);
433 if (!acct) return;
434
435 /*
436 * Set up the retry handler with initial data.
437 */
439
440 data += 2;
441
443 acct->start = fr_time_to_sec(retry_ctx->retry.start);
444 acct->offset = (size_t) (data - (uint8_t const *) buffer);
445}
446
447
448static bool radius_client_retry_response(fr_bio_t *bio, fr_bio_retry_entry_t **retry_ctx_p, void *packet_ctx, const void *buffer, UNUSED size_t size)
449{
450 fr_radius_client_fd_bio_t *my = talloc_get_type_abort(bio->uctx, fr_radius_client_fd_bio_t);
451 unsigned int code;
452 uint8_t *data = UNCONST(uint8_t *, buffer); /* @todo - for verify() */
453 fr_radius_id_ctx_t *id_ctx;
454 fr_packet_t *response = packet_ctx;
455
456 /*
457 * We now have a complete packet in our buffer. Check if it is one we expect.
458 */
459 fr_assert(data[0] > 0);
461
462 /*
463 * Is the code an allowed reply code?
464 */
465 code = allowed_replies[data[0]];
466 if (!code) return false;
467
468 /*
469 * It's a reply, but not a permitted reply to a particular request.
470 *
471 * @todo - Status-Server. And for protocol error, look up original packet code
472 */
473 id_ctx = fr_radius_code_id_find(my->codes, code, data[1]);
474 if (!id_ctx) return false;
475
476 /*
477 * No reply yet, verify the response packet, and save it for later.
478 */
479 if (!id_ctx->response) {
481
482 if (fr_radius_verify(data, id_ctx->packet->data + 4,
483 my->cfg.verify.secret, my->cfg.verify.secret_len,
484 my->cfg.verify.require_message_authenticator,
485 my->cfg.verify.limit_proxy_state) < 0) {
486 return false;
487 }
488
489 retry = *retry_ctx_p = id_ctx->retry_ctx;
490
491 if (fr_time_gt(retry->retry.start, my->info.mrs_time)) my->info.mrs_time = retry->retry.start;
492 my->info.last_reply = fr_time(); /* @todo - cache this so read() doesn't call time? */
493
494 *retry_ctx_p = id_ctx->retry_ctx;
495 response->uctx = id_ctx->packet;
496 return true;
497 }
498
499 /*
500 * The reply has the correct ID / Code, but it's not the
501 * same as our previous reply: ignore it.
502 */
503 if (memcmp(buffer, id_ctx->response->data, RADIUS_HEADER_LENGTH) != 0) return false;
504
505 /*
506 * Tell the caller that it's a duplicate reply.
507 */
508 *retry_ctx_p = id_ctx->retry_ctx;
509 my->info.last_reply = fr_time(); /* @todo - cache this so read() doesn't call time? */
510 return false;
511}
512
514{
515 fr_radius_client_fd_bio_t *my = talloc_get_type_abort(bio->uctx, fr_radius_client_fd_bio_t);
516 fr_radius_id_ctx_t *id_ctx = retry_ctx->uctx;
517 fr_packet_t *packet = id_ctx->packet;
518
519 fr_assert(id_ctx->packet == retry_ctx->packet_ctx);
520
521 fr_radius_code_id_push(my->codes, id_ctx->packet);
522
523 /*
524 * Free any pending rewrite CTX.
525 */
526 TALLOC_FREE(retry_ctx->rewrite_ctx);
527
528 /*
529 * We're no longer retrying this packet.
530 *
531 * However, we leave id_ctx->request_ctx and id_ctx->packet around, because the other code still
532 * needs it.
533 */
534 id_ctx->request_ctx = NULL;
535 id_ctx->retry_ctx = NULL;
536
537 /*
538 * Tell the application that this packet did not see a reply/
539 */
540 if (my->cfg.packet_cb_cfg.release && (reason == FR_BIO_RETRY_NO_REPLY)) my->cfg.packet_cb_cfg.release(&my->common, packet);
541
542 fr_assert(my->info.outstanding > 0);
543 my->info.outstanding--;
544
545 /*
546 * IO was blocked due to IDs. We now have a free ID, so we resume the normal write process.
547 */
548 if (my->all_ids_used) {
549 my->all_ids_used = false;
550
551 /*
552 * Tell the application to resume writing to the BIO.
553 */
554 if (my->common.cb.write_resume) my->common.cb.write_resume(&my->common);
555
556 } else if (!my->info.outstanding) {
557 my->info.last_idle = fr_time();
558 }
559}
560
561/** Cancel one packet.
562 *
563 * The packet can have a reply, or not. It doesn't matter.
564 *
565 * This also frees any IDs associated with the packet.
566 */
568{
569 fr_radius_id_ctx_t *id_ctx;
570 fr_radius_client_fd_bio_t *my = talloc_get_type_abort(bio, fr_radius_client_fd_bio_t);
571
572 id_ctx = fr_radius_code_id_find(my->codes, packet->code, packet->id);
573
574 if (!id_ctx || !id_ctx->retry_ctx) return 0;
575 fr_assert(id_ctx->packet == packet);
576
577 if (!my->retry) goto done;
578
579 if (fr_bio_retry_entry_cancel(my->retry, id_ctx->retry_ctx) < 0) return -1;
580
581done:
582 id_ctx->retry_ctx = NULL;
583 id_ctx->packet = NULL;
584
585 return 0;
586}
587
588int fr_radius_client_fd_bio_read(fr_bio_packet_t *bio, void **pctx_p, fr_packet_t **packet_p,
589 UNUSED TALLOC_CTX *out_ctx, fr_pair_list_t *out)
590{
591 ssize_t slen;
592 fr_radius_client_fd_bio_t *my = talloc_get_type_abort(bio, fr_radius_client_fd_bio_t);
593 fr_packet_t *reply, *original;
594
595 /*
596 * We don't need to set up response.socket for connected bios.
597 */
598 fr_packet_t response = {};
599
600 /*
601 * We read the response packet ctx into our local structure. If we have a real response, we will
602 * swap to using the request context, and not the response context.
603 */
604 slen = fr_bio_read(my->common.bio, &response, &my->buffer, sizeof(my->buffer));
605 if (!slen) return 0;
606
607 if (slen < 0) {
608 fr_assert(slen != fr_bio_error(IO_WOULD_BLOCK));
609 return slen;
610 }
611
612 original = response.uctx;
613
614 /*
615 * Allocate the new request data structure
616 */
617 reply = fr_packet_alloc(original, false);
618 if (!reply) return -1;
619
620 /*
621 * This is for connected sockets.
622 */
623 reply->socket = my->reply_socket;
624 reply->timestamp = fr_time();
625
626 reply->data = talloc_memdup(reply, my->buffer, slen);
627 if (!reply->data) {
628 talloc_free(reply);
629 return -1;
630 }
631 reply->data_len = slen;
632
633 reply->code = reply->data[0];
634 reply->id = reply->data[1];
635 memcpy(reply->vector, reply->data + 4, sizeof(reply->vector));
636
637 /*
638 * If this fails, we're out of memory.
639 */
640 if (fr_radius_decode_simple(original, out, reply->data, reply->data_len,
641 original->vector, (char const *) my->cfg.verify.secret) < 0) {
642 talloc_free(reply);
643 return -1;
644 }
645
646 *pctx_p = original->uctx;
647 *packet_p = reply;
648
649 return 1;
650}
651
653{
654 fr_radius_client_fd_bio_t *my = talloc_get_type_abort(bio, fr_radius_client_fd_bio_t);
655
656 /*
657 * @todo - add API for ID allocation to track this.
658 */
659 if (!my->retry) return 0;
660
661 return fr_bio_retry_outstanding(my->retry);
662}
663
665{
666 fr_radius_client_fd_bio_t *my = talloc_get_type_abort(bio, fr_radius_client_fd_bio_t);
667
668 return &my->info;
669}
670
671
673{
674 fr_radius_client_fd_bio_t *my = talloc_get_type_abort(bio, fr_radius_client_fd_bio_t);
675
676 if (!code || (code >= FR_RADIUS_CODE_MAX)) {
677 fr_strerror_const("Invalid packet code");
678 return -1;
679 }
680
681 if ((id < 0) || (id > 256)) {
682 fr_strerror_const("Invalid ID");
683 return -1;
684 }
685
686 return fr_radius_code_id_force(my->codes, code, id);
687}
688
689/** We failed to connect in the given timeout, the connection is dead.
690 *
691 */
693{
694 fr_radius_client_fd_bio_t *my = talloc_get_type_abort(uctx, fr_radius_client_fd_bio_t);
695
696 fr_assert(!my->retry || (my->info.retry_info->el->tl == tl));
697
698 if (my->common.cb.failed) my->common.cb.failed(&my->common);
699}
700
701
703{
704 fr_radius_client_fd_bio_t *my = talloc_get_type_abort(uctx, fr_radius_client_fd_bio_t);
705
706 fr_assert(my->common.cb.connected);
707 fr_assert(!my->retry || (my->info.retry_info->el == el));
708 fr_assert(my->info.fd_info->socket.fd == fd);
709
710 /*
711 * The socket is already connected, tell the application. This happens when the FD bio opens an
712 * unconnected socket. It calls our connected routine before the application has a chance to
713 * call our connect routine.
714 */
715 if (my->info.connected) return;
716
717 /*
718 * We don't pass the callbacks to fr_bio_fd_alloc(), so it can't call our connected routine.
719 * As a result, we have to check if the FD is open, and then call it ourselves.
720 */
721 if (my->info.fd_info->state == FR_BIO_FD_STATE_OPEN) {
723 return;
724 }
725
726 fr_assert(my->info.fd_info->type == FR_BIO_FD_CONNECTED);
727 fr_assert(my->info.fd_info->state == FR_BIO_FD_STATE_CONNECTING);
728
729 /*
730 * Try to connect it. Any magic handling is done in the callbacks.
731 */
732 (void) fr_bio_fd_connect(my->fd);
733}
static int const char char buffer[256]
Definition acutest.h:576
static ssize_t fr_bio_write(fr_bio_t *bio, void *packet_ctx, void const *buffer, size_t size)
Write raw data to a bio.
Definition base.h:172
static ssize_t fr_bio_read(fr_bio_t *bio, void *packet_ctx, void *buffer, size_t size)
Read raw data from a bio.
Definition base.h:149
void * uctx
user ctx, caller can manually set it.
Definition base.h:113
#define fr_bio_error(_x)
Definition base.h:192
fr_bio_packet_signal_t retry
Definition packet.h:82
int fr_bio_retry_entry_init(UNUSED fr_bio_t *bio, fr_bio_retry_entry_t *item, fr_retry_config_t const *cfg)
Set a per-packet retry config.
Definition retry.c:1025
fr_bio_t * fr_bio_retry_alloc(TALLOC_CTX *ctx, size_t max_saved, fr_bio_retry_sent_t sent, fr_bio_retry_response_t response, fr_bio_retry_rewrite_t rewrite, fr_bio_retry_release_t release, fr_bio_retry_config_t const *cfg, fr_bio_t *next)
Allocate a fr_bio_retry_t.
Definition retry.c:1087
size_t fr_bio_retry_outstanding(fr_bio_t *bio)
Definition retry.c:1165
int fr_bio_retry_entry_cancel(fr_bio_t *bio, fr_bio_retry_entry_t *item)
Cancel one item.
Definition retry.c:993
ssize_t fr_bio_retry_rewrite(fr_bio_t *bio, fr_bio_retry_entry_t *item, const void *buffer, size_t size)
Resend a packet.
Definition retry.c:554
fr_bio_retry_info_t const * fr_bio_retry_info(fr_bio_t *bio)
Definition retry.c:1158
void * rewrite_ctx
context specifically for rewriting this packet
Definition retry.c:68
fr_retry_t retry
retry timers and counters
Definition retry.c:70
fr_bio_retry_release_reason_t
Definition retry.h:79
@ FR_BIO_RETRY_NO_REPLY
Definition retry.h:81
ssize_t(* fr_bio_retry_rewrite_t)(fr_bio_t *bio, fr_bio_retry_entry_t *retry_ctx, const void *buffer, size_t size)
Definition retry.h:66
fr_event_list_t * el
event list
Definition retry.h:45
void * packet_ctx
packet_ctx from the write() call
Definition retry.c:66
fr_bio_retry_rewrite_t rewrite
per-packet rewrite callback
Definition retry.c:67
void * uctx
user-writable context
Definition retry.c:65
Definition retry.c:64
#define UNCONST(_type, _ptr)
Remove const qualification from a pointer.
Definition build.h:167
#define RCSID(id)
Definition build.h:485
#define NDEBUG_UNUSED
Definition build.h:328
#define UNUSED
Definition build.h:317
fr_bio_packet_t * fr_radius_client_tcp_bio_alloc(TALLOC_CTX *ctx, fr_radius_client_config_t *cfg, fr_bio_fd_config_t const *fd_cfg)
Allocate a RADIUS bio for writing client packets.
Definition client_tcp.c:50
fr_bio_packet_t * fr_radius_client_udp_bio_alloc(TALLOC_CTX *ctx, fr_radius_client_config_t *cfg, fr_bio_fd_config_t const *fd_cfg)
Allocate a RADIUS bio for writing client packets.
Definition client_udp.c:51
#define FR_DBUFF_TMP(_start, _len_or_end)
Creates a compound literal to pass into functions which accept a dbuff.
Definition dbuff.h:514
fr_radius_packet_code_t
RADIUS packet codes.
Definition defs.h:31
@ FR_RADIUS_CODE_ACCESS_CHALLENGE
RFC2865 - Access-Challenge.
Definition defs.h:43
@ FR_RADIUS_CODE_ACCESS_REQUEST
RFC2865 - Access-Request.
Definition defs.h:33
@ FR_RADIUS_CODE_DISCONNECT_REQUEST
RFC3575/RFC5176 - Disconnect-Request.
Definition defs.h:46
@ FR_RADIUS_CODE_MAX
Maximum possible protocol code.
Definition defs.h:53
@ FR_RADIUS_CODE_DISCONNECT_ACK
RFC3575/RFC5176 - Disconnect-Ack (positive)
Definition defs.h:47
@ FR_RADIUS_CODE_STATUS_SERVER
RFC2865/RFC5997 - Status Server (request)
Definition defs.h:44
@ FR_RADIUS_CODE_COA_REQUEST
RFC3575/RFC5176 - CoA-Request.
Definition defs.h:49
@ FR_RADIUS_CODE_ACCESS_ACCEPT
RFC2865 - Access-Accept.
Definition defs.h:34
@ FR_RADIUS_CODE_ACCOUNTING_RESPONSE
RFC2866 - Accounting-Response.
Definition defs.h:37
@ FR_RADIUS_CODE_COA_NAK
RFC3575/RFC5176 - CoA-Nak (not willing to perform)
Definition defs.h:51
@ FR_RADIUS_CODE_COA_ACK
RFC3575/RFC5176 - CoA-Ack (positive)
Definition defs.h:50
@ FR_RADIUS_CODE_DISCONNECT_NAK
RFC3575/RFC5176 - Disconnect-Nak (not willing to perform)
Definition defs.h:48
@ FR_RADIUS_CODE_PROTOCOL_ERROR
RFC7930 - Protocol-Error (generic NAK)
Definition defs.h:52
@ FR_RADIUS_CODE_ACCOUNTING_REQUEST
RFC2866 - Accounting-Request.
Definition defs.h:36
@ FR_RADIUS_CODE_ACCESS_REJECT
RFC2865 - Access-Reject.
Definition defs.h:35
fr_bio_t * fr_bio_fd_alloc(TALLOC_CTX *ctx, fr_bio_fd_config_t const *cfg, size_t offset)
Allocate a FD bio.
Definition fd.c:1030
fr_bio_fd_info_t const * fr_bio_fd_info(fr_bio_t *bio)
Returns a pointer to the bio-specific information.
Definition fd.c:1350
@ FR_BIO_FD_CONNECTED
connected client sockets (UDP or TCP)
Definition fd.h:68
@ FR_BIO_FD_STATE_CONNECTING
Definition fd.h:60
@ FR_BIO_FD_STATE_OPEN
error states must be before this
Definition fd.h:59
fr_bio_fd_type_t type
accept, connected, unconnected, etc.
Definition fd.h:82
char const * path
for Unix domain sockets
Definition fd.h:103
char const * filename
for files
Definition fd.h:109
#define fr_bio_fd_connect(_x)
Definition fd.h:153
int socket_type
SOCK_STREAM or SOCK_DGRAM.
Definition fd.h:84
Configuration for sockets.
Definition fd.h:81
fr_bio_shutdown & my
Definition fd_errno.h:59
int fr_bio_free(fr_bio_t *bio)
Free this bio, and everything it calls.
Definition base.c:105
int fr_bio_shutdown(fr_bio_t *bio)
Shut down a set of BIOs.
Definition base.c:141
fr_bio_t * fr_bio_mem_alloc(TALLOC_CTX *ctx, size_t read_size, size_t write_size, fr_bio_t *next)
Allocate a memory buffer bio.
Definition mem.c:727
void fr_bio_packet_init(fr_bio_packet_t *my)
Definition packet.c:177
void fr_bio_packet_connected(fr_bio_t *bio)
Called when a particular BIO is connected.
Definition packet.c:116
talloc_free(reap)
Stores all information relating to an event list.
Definition event.c:380
fr_packet_t * fr_packet_alloc(TALLOC_CTX *ctx, bool new_vector)
Allocate a new fr_packet_t.
Definition packet.c:38
unsigned int uint32_t
long int ssize_t
unsigned char uint8_t
unsigned long int size_t
static uint32_t fr_nbo_to_uint32(uint8_t const data[static sizeof(uint32_t)])
Read an unsigned 32bit integer from wire format (big endian)
Definition nbo.h:167
static void fr_nbo_from_uint32(uint8_t out[static sizeof(uint32_t)], uint32_t num)
Write out an unsigned 32bit integer in wire format (big endian)
Definition nbo.h:61
#define RADIUS_HEADER_LENGTH
Definition net.h:80
#define RADIUS_AUTH_VECTOR_LENGTH
Definition net.h:89
int fr_radius_sign(uint8_t *packet, uint8_t const *vector, uint8_t const *secret, size_t secret_len)
Sign a previously encoded packet.
Definition base.c:358
int fr_radius_verify(uint8_t *packet, uint8_t const *vector, uint8_t const *secret, size_t secret_len, bool require_message_authenticator, bool limit_proxy_state)
Verify a request / response packet.
Definition base.c:776
ssize_t fr_radius_decode_simple(TALLOC_CTX *ctx, fr_pair_list_t *out, uint8_t *packet, size_t packet_len, uint8_t const *vector, char const *secret)
Simple wrapper for callers who just need a shared secret.
Definition base.c:1190
ssize_t fr_radius_encode(fr_dbuff_t *dbuff, fr_pair_list_t *vps, fr_radius_encode_ctx_t *packet_ctx)
Definition base.c:951
char const * fr_radius_packet_name[FR_RADIUS_CODE_MAX]
Definition base.c:112
fr_event_list_t * el
Definition client.h:35
fr_bio_retry_config_t retry_cfg
Definition client.h:40
fr_bio_packet_cb_funcs_t packet_cb_cfg
Definition client.h:42
bool outgoing[FR_RADIUS_CODE_MAX]
allowed outgoing packet types
Definition client.h:49
fr_time_delta_t connection_timeout
Definition client.h:44
fr_radius_id_t * fr_radius_id_alloc(TALLOC_CTX *ctx)
Allocate a tracking structure for one packet code.
Definition id.c:45
static void fr_radius_code_id_push(fr_radius_code_id_t codes, fr_packet_t const *packet)
Definition id.h:74
void * retry_ctx
to find the retry information
Definition id.h:38
void * request_ctx
for the application to track
Definition id.h:35
fr_packet_t * packet
outgoing packet
Definition id.h:36
fr_packet_t * response
response to outgoing packet
Definition id.h:37
static fr_radius_id_ctx_t * fr_radius_code_id_pop(fr_radius_code_id_t codes, fr_packet_t *packet)
Definition id.h:64
static fr_radius_id_ctx_t * fr_radius_code_id_find(fr_radius_code_id_t codes, int code, int id)
Definition id.h:84
static int fr_radius_code_id_force(fr_radius_code_id_t codes, int code, int id)
Definition id.h:94
#define fr_assert(_expr)
Definition rad_assert.h:38
static bool done
Definition radclient.c:80
static int _radius_client_fd_bio_free(fr_radius_client_fd_bio_t *my)
Definition client.c:64
static void radius_client_retry_release(fr_bio_t *bio, fr_bio_retry_entry_t *retry_ctx, UNUSED fr_bio_retry_release_reason_t reason)
static ssize_t radius_client_retry(fr_bio_t *bio, fr_bio_retry_entry_t *retry_ctx, UNUSED const void *buffer, NDEBUG_UNUSED size_t size)
Definition client.c:313
static bool radius_client_retry_response(fr_bio_t *bio, fr_bio_retry_entry_t **retry_ctx_p, UNUSED void *packet_ctx, const void *buffer, UNUSED size_t size)
static void radius_client_retry_sent(fr_bio_t *bio, void *packet_ctx, const void *buffer, UNUSED size_t size, fr_bio_retry_entry_t *retry_ctx)
void fr_radius_client_bio_connect(NDEBUG_UNUSED fr_event_list_t *el, NDEBUG_UNUSED int fd, UNUSED int flags, void *uctx)
Definition client.c:702
static ssize_t radius_client_rewrite_acct(fr_bio_t *bio, fr_bio_retry_entry_t *retry_ctx, UNUSED const void *buffer, NDEBUG_UNUSED size_t size)
Definition client.c:332
static const fr_radius_packet_code_t allowed_replies[FR_RADIUS_CODE_MAX]
Definition client.c:297
int fr_radius_client_fd_bio_cancel(fr_bio_packet_t *bio, fr_packet_t *packet)
Cancel one packet.
Definition client.c:567
size_t offset
offset to Acct-Delay-Time value
Definition client.c:39
fr_bio_packet_t * fr_radius_client_bio_alloc(TALLOC_CTX *ctx, fr_radius_client_config_t *cfg, fr_bio_fd_config_t const *fd_cfg)
Definition client.c:50
static void fr_radius_client_bio_connect_timer(fr_timer_list_t *tl, fr_time_t now, void *uctx)
int fr_radius_client_bio_force_id(fr_bio_packet_t *bio, int code, int id)
Definition client.c:672
uint32_t initial
initial value
Definition client.c:36
int fr_radius_client_fd_bio_read(fr_bio_packet_t *bio, void **pctx_p, fr_packet_t **packet_p, UNUSED TALLOC_CTX *out_ctx, fr_pair_list_t *out)
Definition client.c:588
size_t fr_radius_client_bio_outstanding(fr_bio_packet_t *bio)
Definition client.c:652
fr_radius_client_bio_info_t const * fr_radius_client_bio_info(fr_bio_packet_t *bio)
Definition client.c:664
uint32_t start
Unix time we started sending this packet.
Definition client.c:37
int fr_radius_client_fd_bio_write(fr_radius_client_fd_bio_t *my, void *pctx, fr_packet_t *packet, fr_pair_list_t *list)
Definition client.c:188
fr_radius_client_fd_bio_t * fr_radius_client_fd_bio_alloc(TALLOC_CTX *ctx, size_t read_size, fr_radius_client_config_t *cfg, fr_bio_fd_config_t const *fd_cfg)
Definition client.c:74
#define fr_time()
Allow us to arbitrarily manipulate time.
Definition state_test.c:8
static int64_t fr_time_to_sec(fr_time_t when)
Convert an fr_time_t (internal time) to number of sec since the unix epoch (wallclock time)
Definition time.h:731
#define fr_time_lteq(_a, _b)
Definition time.h:240
#define fr_time_delta_ispos(_a)
Definition time.h:290
#define fr_time_gt(_a, _b)
Definition time.h:237
"server local" time.
Definition time.h:69
An event timer list.
Definition timer.c:53
#define fr_timer_in(...)
Definition timer.h:86
static fr_event_list_t * el
void * uctx
Definition packet.h:79
unsigned int code
Packet code (type).
Definition packet.h:61
fr_socket_t socket
This packet was received on.
Definition packet.h:57
int id
Packet ID (used to link requests/responses).
Definition packet.h:60
uint8_t * data
Packet data (body).
Definition packet.h:63
size_t data_len
Length of packet data.
Definition packet.h:64
uint8_t vector[RADIUS_AUTH_VECTOR_LENGTH]
RADIUS authentication vector.
Definition packet.h:69
fr_time_t timestamp
When we received the packet.
Definition packet.h:58
fr_time_t start
when we started the retransmission
Definition retry.h:53
fr_time_t updated
last update, really a cached "now".
Definition retry.h:56
static void fr_socket_addr_swap(fr_socket_t *dst, fr_socket_t const *src)
Swap src/dst information of a fr_socket_t.
Definition socket.h:121
#define fr_strerror_printf(_fmt,...)
Log to thread local error buffer.
Definition strerror.h:64
#define fr_strerror_const(_msg)
Definition strerror.h:223
static fr_slen_t data
Definition value.h:1274
static size_t char ** out
Definition value.h:1012