Removal MTU size limitation
[l2tpns.git] / autosnoop.c
index 7ab4321..c520aaf 100644 (file)
@@ -1,45 +1,75 @@
 #include <string.h>
 #include <string.h>
-#include <malloc.h>
-#include <stdlib.h>
-#include <sys/wait.h>
-#include <sys/types.h>
+#include <netinet/ip6.h>
+#include "dhcp6.h"
 #include "l2tpns.h"
 #include "plugin.h"
 #include "l2tpns.h"
 #include "plugin.h"
-#include "control.h"
 
 
-int __plugin_api_version = 1;
-struct pluginfuncs *p;
+/* set up intercept based on RADIUS reply */
+
+int plugin_api_version = PLUGIN_API_VERSION;
+static struct pluginfuncs *f = 0;
 
 int plugin_radius_response(struct param_radius_response *data)
 {
 
 int plugin_radius_response(struct param_radius_response *data)
 {
-       if (strcmp(data->key, "intercept") == 0)
+    if (!strcmp(data->key, "intercept"))
+    {
+       char *p;
+       data->s->snoop_ip = 0;
+       data->s->snoop_port = 0;
+       if ((p = strchr(data->value, ':')))
        {
        {
-               char *x;
+           *p++ = 0;
+           if (*data->value)
+               data->s->snoop_ip = inet_addr(data->value);
+
+           if (data->s->snoop_ip == INADDR_NONE)
                data->s->snoop_ip = 0;
                data->s->snoop_ip = 0;
-               data->s->snoop_port = 0;
-               if ((x = strchr(data->value, ':')))
-               {
-                       *x++ = 0;
-                       if (*data->value) data->s->snoop_ip = inet_addr(data->value);
-                       if (data->s->snoop_ip == INADDR_NONE) data->s->snoop_ip = 0;
-                       if (*x) data->s->snoop_port = atoi(x);
-                       p->log(3, 0, 0, 0, "         Intercepting user to %s:%d\n",
-                               p->inet_toa(data->s->snoop_ip), data->s->snoop_port);
-               }
-               else
-               {
-                       p->log(3, 0, 0, 0, "         Not Intercepting user (reply string should be snoop=ip:port)\n");
-               }
+
+           if (*p)
+               data->s->snoop_port = atoi(p);
+
+           f->log(3, f->get_id_by_session(data->s), data->s->tunnel,
+               "         Intercepting user to %s:%d\n",
+               f->fmtaddr(data->s->snoop_ip, 0), data->s->snoop_port);
        }
        }
+       else
+       {
+           f->log(3, f->get_id_by_session(data->s), data->s->tunnel,
+                   "         Not Intercepting user (reply string should"
+                   " be intercept=ip:port)\n");
+       }
+    }
+
        return PLUGIN_RET_OK;
 }
 
        return PLUGIN_RET_OK;
 }
 
-int plugin_init(struct pluginfuncs *funcs)
+int plugin_radius_reset(struct param_radius_reset *data)
 {
 {
-       return ((p = funcs)) ? 1 : 0;
+    data->s->snoop_ip = 0;
+    data->s->snoop_port = 0;
+    return PLUGIN_RET_OK;
 }
 
 }
 
-void plugin_done()
+int plugin_radius_account(struct param_radius_account *data)
 {
 {
+    if (data->s->snoop_ip && data->s->snoop_port)
+    {
+       uint8_t *p = *data->packet;
+
+       *p = 26;                                // vendor-specific
+       *(uint32_t *) (p + 2) = htonl(9);       // Cisco
+       p[6] = 1;                               // Cisco-AVPair
+       p[7] = 2 + sprintf((char *) p + 8, "intercept=%s:%d",
+           f->fmtaddr(data->s->snoop_ip, 0), data->s->snoop_port);
+
+       p[1] = p[7] + 6;
+       *data->packet += p[1];
+    }
+
+    return PLUGIN_RET_OK;
 }
 
 }
 
+int plugin_init(struct pluginfuncs *funcs)
+{
+    return ((f = funcs)) ? 1 : 0;
+}