*** empty log message ***
[l2tpns.git] / autosnoop.c
index 45f27d8..fa3de8b 100644 (file)
@@ -4,36 +4,72 @@
 
 /* set up intercept based on RADIUS reply */
 
 
 /* set up intercept based on RADIUS reply */
 
-char const *cvs_id = "$Id: autosnoop.c,v 1.4 2004/11/05 02:39:35 bodea Exp $";
+char const *cvs_id = "$Id: autosnoop.c,v 1.12 2005/10/11 09:04:53 bodea Exp $";
 
 
-int __plugin_api_version = 1;
-struct pluginfuncs *p;
+int plugin_api_version = PLUGIN_API_VERSION;
+static struct pluginfuncs *f = 0;
 
 int plugin_radius_response(struct param_radius_response *data)
 {
 
 int plugin_radius_response(struct param_radius_response *data)
 {
-       if (strcmp(data->key, "intercept") == 0)
+    if (!strcmp(data->key, "intercept"))
+    {
+       char *p;
+       data->s->snoop_ip = 0;
+       data->s->snoop_port = 0;
+       if ((p = strchr(data->value, ':')))
        {
        {
-               char *x;
+           *p++ = 0;
+           if (*data->value)
+               data->s->snoop_ip = inet_addr(data->value);
+
+           if (data->s->snoop_ip == INADDR_NONE)
                data->s->snoop_ip = 0;
                data->s->snoop_ip = 0;
-               data->s->snoop_port = 0;
-               if ((x = strchr(data->value, ':')))
-               {
-                       *x++ = 0;
-                       if (*data->value) data->s->snoop_ip = inet_addr(data->value);
-                       if (data->s->snoop_ip == INADDR_NONE) data->s->snoop_ip = 0;
-                       if (*x) data->s->snoop_port = atoi(x);
-                       p->_log(3, 0, 0, 0, "         Intercepting user to %s:%d\n",
-                               p->inet_toa(data->s->snoop_ip), data->s->snoop_port);
-               }
-               else
-               {
-                       p->_log(3, 0, 0, 0, "         Not Intercepting user (reply string should be snoop=ip:port)\n");
-               }
+
+           if (*p)
+               data->s->snoop_port = atoi(p);
+
+           f->log(3, f->get_id_by_session(data->s), data->s->tunnel,
+               "         Intercepting user to %s:%d\n",
+               f->fmtaddr(data->s->snoop_ip, 0), data->s->snoop_port);
+       }
+       else
+       {
+           f->log(3, f->get_id_by_session(data->s), data->s->tunnel,
+                   "         Not Intercepting user (reply string should"
+                   " be intercept=ip:port)\n");
        }
        }
+    }
+
        return PLUGIN_RET_OK;
 }
 
        return PLUGIN_RET_OK;
 }
 
+int plugin_radius_reset(struct param_radius_reset *data)
+{
+    data->s->snoop_ip = 0;
+    data->s->snoop_port = 0;
+    return PLUGIN_RET_OK;
+}
+
+int plugin_radius_account(struct param_radius_account *data)
+{
+    if (data->s->snoop_ip && data->s->snoop_port)
+    {
+       uint8_t *p = *data->packet;
+
+       *p = 26;                                // vendor-specific
+       *(uint32_t *) (p + 2) = htonl(9);       // Cisco
+       p[6] = 1;                               // Cisco-AVPair
+       p[7] = 2 + sprintf((char *) p + 8, "intercept=%s:%d",
+           f->fmtaddr(data->s->snoop_ip, 0), data->s->snoop_port);
+
+       p[1] = p[7] + 6;
+       *data->packet += p[1];
+    }
+
+    return PLUGIN_RET_OK;
+}
+
 int plugin_init(struct pluginfuncs *funcs)
 {
 int plugin_init(struct pluginfuncs *funcs)
 {
-       return ((p = funcs)) ? 1 : 0;
+    return ((f = funcs)) ? 1 : 0;
 }
 }