You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
kamailio/modules/auth_diameter/auth_diameter.c

265 lines
5.6 KiB

/*
* $Id$
*
* Digest Authentication - Diameter support
*
* Copyright (C) 2001-2003 FhG Fokus
*
* This file is part of Kamailio, a free SIP server.
*
* Kamailio is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version
*
* Kamailio is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
*
* History:
* -------
*
*
* 2006-03-01 pseudo variables support for domain name (bogdan)
*/
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <netdb.h>
#include "../../sr_module.h"
#include "../../error.h"
#include "../../dprint.h"
#include "../../pvar.h"
#include "../../mem/mem.h"
#include "diameter_msg.h"
#include "auth_diameter.h"
#include "authorize.h"
#include "tcp_comm.h"
MODULE_VERSION
/** SL API structure */
sl_api_t slb;
static int mod_init(void); /* Module initialization function*/
static int mod_child_init(int r); /* Child initialization function*/
static int auth_fixup(void** param, int param_no);
static int group_fixup(void** param, int param_no);
int diameter_www_authorize(struct sip_msg* _msg, char* _realm, char* _s2);
int diameter_proxy_authorize(struct sip_msg* _msg, char* _realm, char* _s2);
int diameter_is_user_in(struct sip_msg* _msg, char* group, char* _s2);
/*
* Module parameter variables
*/
char* diameter_client_host = "localhost";
int diameter_client_port = 3000;
int use_domain = 0;
rd_buf_t *rb;
/*
* Exported functions
*/
static cmd_export_t cmds[] = {
{"diameter_www_authorize", (cmd_function)diameter_www_authorize, 1, auth_fixup,
0, REQUEST_ROUTE},
{"diameter_proxy_authorize", (cmd_function)diameter_proxy_authorize, 1, auth_fixup,
0, REQUEST_ROUTE},
{"diameter_is_user_in", (cmd_function)diameter_is_user_in, 2, group_fixup,
0, REQUEST_ROUTE},
{0, 0, 0, 0, 0, 0}
};
/*
* Exported parameters
*/
static param_export_t params[] = {
{"diameter_client_host", PARAM_STRING, &diameter_client_host},
{"diameter_client_port", INT_PARAM, &diameter_client_port},
{"use_domain", INT_PARAM, &use_domain},
{0, 0, 0}
};
/*
* Module interface
*/
struct module_exports exports = {
"auth_diameter",
DEFAULT_DLFLAGS, /* dlopen flags */
cmds, /* Exported functions */
params, /* Exported parameters */
0, /* exported statistics */
0, /* exported MI functions */
0, /* exported pseudo-variables */
0, /* extra processes */
mod_init, /* module initialization function */
0, /* response function */
0, /* destroy function */
mod_child_init /* child initialization function */
};
/*
* Module initialization function
*/
static int mod_init(void)
{
LM_DBG("auth_diameter - Initializing\n");
/* bind the SL API */
if (sl_load_api(&slb)!=0) {
LM_ERR("cannot bind to SL API\n");
return -1;
}
return 0;
}
static int mod_child_init(int r)
{
/* open TCP connection */
LM_DBG("initializing TCP connection\n");
sockfd = init_mytcp(diameter_client_host, diameter_client_port);
if(sockfd==-1)
{
LM_DBG("the TCP connection was not established\n");
return -1;
}
LM_DBG("the TCP connection was established on socket=%d\n", sockfd);
rb = (rd_buf_t*)pkg_malloc(sizeof(rd_buf_t));
if(!rb)
{
LM_DBG("no more free pkg memory\n");
return -1;
}
rb->buf = 0;
rb->chall = 0;
return 0;
}
#if 0
static void destroy(void)
{
close_tcp_connection(sockfd);
}
#endif
/*
* Convert char* parameter to pv_elem_t* parameter
*/
static int auth_fixup(void** param, int param_no)
{
pv_elem_t *model;
str s;
if (param_no == 1) {
s.s = (char*)*param;
if (s.s==0 || s.s[0]==0) {
model = 0;
} else {
s.len = strlen(s.s);
if (pv_parse_format(&s,&model)<0) {
LM_ERR("pv_parse_format failed\n");
return E_OUT_OF_MEM;
}
}
*param = (void*)model;
}
return 0;
}
/*
* Authorize using Proxy-Authorization header field
*/
int diameter_proxy_authorize(struct sip_msg* _msg, char* _realm, char* _s2)
{
/* realm parameter is converted in fixup */
return authorize(_msg, (pv_elem_t*)_realm, HDR_PROXYAUTH_T);
}
/*
* Authorize using WWW-Authorization header field
*/
int diameter_www_authorize(struct sip_msg* _msg, char* _realm, char* _s2)
{
return authorize(_msg, (pv_elem_t*)_realm, HDR_AUTHORIZATION_T);
}
static int group_fixup(void** param, int param_no)
{
str* s;
if (param_no == 1)
{
if (!strcasecmp((char*)*param, "Request-URI"))
{
*param = (void*)1;
goto end;
}
if(!strcasecmp((char*)*param, "To"))
{
*param = (void*)2;
goto end;
}
if (!strcasecmp((char*)*param, "From"))
{
*param = (void*)3;
goto end;
}
if (!strcasecmp((char*)*param, "Credentials"))
{
*param = (void*)4;
goto end;
}
LM_ERR("unsupported Header Field identifier\n");
return E_UNSPEC;
}
if (param_no == 2)
{
s = (str*)pkg_malloc(sizeof(str));
if (!s)
{
LM_ERR("no pkg memory left\n");
return E_UNSPEC;
}
s->s = (char*)*param;
s->len = strlen(s->s);
*param = (void*)s;
}
end:
return 0;
}