Home | History | Annotate | Line # | Download | only in pppoectl
pppoectl.c revision 1.17
      1  1.17  christos /*	$NetBSD: pppoectl.c,v 1.17 2005/02/19 18:26:09 christos Exp $	*/
      2   1.1    martin 
      3   1.1    martin /*
      4   1.1    martin  * Copyright (c) 1997 Joerg Wunsch
      5   1.1    martin  *
      6   1.1    martin  * All rights reserved.
      7   1.1    martin  *
      8   1.1    martin  * Redistribution and use in source and binary forms, with or without
      9   1.1    martin  * modification, are permitted provided that the following conditions
     10   1.1    martin  * are met:
     11   1.1    martin  * 1. Redistributions of source code must retain the above copyright
     12   1.1    martin  *    notice, this list of conditions and the following disclaimer.
     13   1.1    martin  * 2. Redistributions in binary form must reproduce the above copyright
     14   1.1    martin  *    notice, this list of conditions and the following disclaimer in the
     15   1.1    martin  *    documentation and/or other materials provided with the distribution.
     16   1.1    martin  *
     17   1.1    martin  * THIS SOFTWARE IS PROVIDED BY THE DEVELOPERS ``AS IS'' AND ANY EXPRESS OR
     18   1.1    martin  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
     19   1.1    martin  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
     20   1.1    martin  * IN NO EVENT SHALL THE DEVELOPERS BE LIABLE FOR ANY DIRECT, INDIRECT,
     21   1.1    martin  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
     22   1.1    martin  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
     23   1.1    martin  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
     24   1.1    martin  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
     25   1.1    martin  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
     26   1.1    martin  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
     27   1.1    martin  *
     28   1.1    martin  * From: spppcontrol.c,v 1.3 1998/01/07 07:55:26 charnier Exp
     29   1.1    martin  * From: ispppcontrol
     30   1.1    martin  */
     31  1.12       agc #include <sys/cdefs.h>
     32  1.12       agc 
     33  1.12       agc #ifndef lint
     34  1.17  christos __RCSID("$NetBSD: pppoectl.c,v 1.17 2005/02/19 18:26:09 christos Exp $");
     35  1.12       agc #endif
     36  1.12       agc 
     37   1.1    martin 
     38   1.1    martin #include <sys/param.h>
     39   1.1    martin #include <sys/callout.h>
     40   1.1    martin #include <sys/ioctl.h>
     41   1.1    martin #include <sys/mbuf.h>
     42   1.1    martin #include <sys/socket.h>
     43   1.1    martin #include <sys/time.h>
     44   1.1    martin #include <sys/sysctl.h>
     45   1.1    martin #include <net/if.h>
     46   1.1    martin #include <net/if_sppp.h>
     47   1.1    martin #include <net/if_pppoe.h>
     48   1.1    martin #include <err.h>
     49   1.1    martin #include <stdio.h>
     50   1.1    martin #include <stdlib.h>
     51   1.1    martin #include <string.h>
     52   1.1    martin #include <sysexits.h>
     53   1.1    martin #include <unistd.h>
     54   1.1    martin 
     55   1.1    martin static void usage(void);
     56   1.2    martin static void print_error(const char *ifname, int error, const char * str);
     57   1.4    martin static void print_vals(const char *ifname, int phase, struct spppauthcfg *sp,
     58   1.4    martin 	int lcp_timeout, time_t idle_timeout, int authfailures,
     59  1.14    martin 	int max_auth_failures, u_int maxalive, time_t max_noreceive);
     60   1.2    martin const char *phase_name(int phase);
     61   1.2    martin const char *proto_name(int proto);
     62   1.2    martin const char *authflags(int flags);
     63  1.11       mrg static void pppoectl_argument(char *arg);
     64   1.1    martin 
     65   1.1    martin int hz = 0;
     66   1.1    martin 
     67  1.11       mrg int set_auth, set_lcp, set_idle_to, set_auth_failure, set_dns,
     68  1.14    martin     clear_auth_failure_count, set_keepalive;
     69  1.14    martin int maxalive = -1;
     70  1.14    martin int max_noreceive = -1;
     71  1.11       mrg struct spppauthcfg spr;
     72  1.11       mrg struct sppplcpcfg lcp;
     73  1.11       mrg struct spppstatus status;
     74  1.11       mrg struct spppidletimeout timeout;
     75  1.11       mrg struct spppauthfailurestats authfailstats;
     76  1.11       mrg struct spppauthfailuresettings authfailset;
     77  1.11       mrg struct spppdnssettings dnssettings;
     78  1.14    martin struct spppkeepalivesettings keepalivesettings;
     79  1.11       mrg 
     80   1.1    martin int
     81   1.1    martin main(int argc, char **argv)
     82   1.1    martin {
     83  1.11       mrg 	FILE *fp;
     84   1.1    martin 	int s, c;
     85   1.6    martin 	int errs = 0, verbose = 0, dump = 0, dns1 = 0, dns2 = 0;
     86  1.11       mrg 	size_t len;
     87   1.1    martin 	const char *eth_if_name, *access_concentrator, *service;
     88  1.11       mrg 	const char *ifname, *configname;
     89  1.11       mrg 	char *line;
     90   1.1    martin 	int mib[2];
     91   1.1    martin 	struct clockinfo clockinfo;
     92   1.5    martin 	setprogname(argv[0]);
     93   1.5    martin 
     94   1.1    martin 	eth_if_name = NULL;
     95   1.1    martin 	access_concentrator = NULL;
     96   1.1    martin 	service = NULL;
     97  1.11       mrg 	configname = NULL;
     98  1.11       mrg 	while ((c = getopt(argc, argv, "vde:f:s:a:n:")) != -1)
     99   1.1    martin 		switch (c) {
    100   1.1    martin 		case 'v':
    101   1.1    martin 			verbose++;
    102   1.1    martin 			break;
    103   1.1    martin 
    104   1.2    martin 		case 'd':
    105   1.2    martin 			dump++;
    106   1.2    martin 			break;
    107   1.2    martin 
    108   1.1    martin 		case 'e':
    109   1.1    martin 			eth_if_name = optarg;
    110   1.1    martin 			break;
    111   1.1    martin 
    112  1.11       mrg 		case 'f':
    113  1.11       mrg 			configname = optarg;
    114  1.11       mrg 			break;
    115  1.11       mrg 
    116   1.1    martin 		case 's':
    117   1.1    martin 			service = optarg;
    118   1.1    martin 			break;
    119   1.1    martin 
    120   1.1    martin 		case 'a':
    121   1.1    martin 			access_concentrator = optarg;
    122   1.1    martin 			break;
    123   1.1    martin 
    124   1.6    martin 		case 'n':
    125   1.6    martin 			if (strcmp(optarg, "1") == 0)
    126   1.6    martin 				dns1 = 1;
    127   1.6    martin 			else if (strcmp(optarg, "2") == 0)
    128   1.6    martin 				dns2 = 1;
    129   1.6    martin 			else {
    130   1.6    martin 				fprintf(stderr, "bad argument \"%s\" to -n (only 1 or two allowed)\n",
    131   1.6    martin 					optarg);
    132   1.6    martin 				errs++;
    133   1.6    martin 			}
    134   1.6    martin 			break;
    135   1.6    martin 
    136   1.1    martin 		default:
    137   1.1    martin 			errs++;
    138   1.1    martin 			break;
    139   1.1    martin 		}
    140   1.1    martin 	argv += optind;
    141   1.1    martin 	argc -= optind;
    142   1.1    martin 
    143   1.1    martin 	if (errs || argc < 1)
    144   1.1    martin 		usage();
    145   1.1    martin 
    146   1.1    martin 	ifname = argv[0];
    147   1.1    martin 
    148   1.1    martin 	/* use a random AF to create the socket */
    149   1.1    martin 	if ((s = socket(AF_INET, SOCK_DGRAM, 0)) < 0)
    150   1.1    martin 		err(EX_UNAVAILABLE, "ifconfig: socket");
    151   1.1    martin 
    152   1.1    martin 	argc--;
    153   1.1    martin 	argv++;
    154   1.1    martin 
    155   1.1    martin 	if (eth_if_name) {
    156   1.1    martin 		struct pppoediscparms parms;
    157   1.1    martin 		int e;
    158   1.1    martin 
    159   1.1    martin 		memset(&parms, 0, sizeof parms);
    160   1.1    martin 		strncpy(parms.ifname, ifname, sizeof(parms.ifname));
    161   1.1    martin 		strncpy(parms.eth_ifname, eth_if_name, sizeof(parms.eth_ifname));
    162   1.1    martin 		if (access_concentrator) {
    163   1.1    martin 			parms.ac_name = (char*)access_concentrator;
    164   1.1    martin 			parms.ac_name_len = strlen(access_concentrator);
    165   1.1    martin 		}
    166   1.1    martin 		if (service) {
    167   1.1    martin 			parms.service_name = (char*)service;
    168   1.1    martin 			parms.service_name_len = strlen(service);
    169   1.1    martin 		}
    170   1.1    martin 
    171   1.1    martin 		e = ioctl(s, PPPOESETPARMS, &parms);
    172   1.2    martin 		if (e)
    173   1.2    martin 			print_error(ifname, e, "PPPOESETPARMS");
    174   1.2    martin 		return 0;
    175   1.2    martin 	}
    176   1.2    martin 
    177   1.6    martin 	if (dns1 || dns2) {
    178   1.6    martin 		/* print DNS addresses */
    179   1.6    martin 		int e;
    180   1.6    martin 		struct spppdnsaddrs addrs;
    181   1.6    martin 		memset(&addrs, 0, sizeof addrs);
    182   1.6    martin 		strncpy(addrs.ifname, ifname, sizeof addrs.ifname);
    183   1.6    martin 		e = ioctl(s, SPPPGETDNSADDRS, &addrs);
    184   1.6    martin 		if (e)
    185   1.6    martin 			print_error(ifname, e, "SPPPGETDNSADDRS");
    186   1.6    martin 		if (dns1)
    187   1.6    martin 			printf("%d.%d.%d.%d\n",
    188   1.6    martin 				(addrs.dns[0] >> 24) & 0xff,
    189   1.6    martin 				(addrs.dns[0] >> 16) & 0xff,
    190   1.6    martin 				(addrs.dns[0] >> 8) & 0xff,
    191   1.6    martin 				addrs.dns[0] & 0xff);
    192   1.6    martin 		if (dns2)
    193   1.6    martin 			printf("%d.%d.%d.%d\n",
    194   1.6    martin 				(addrs.dns[1] >> 24) & 0xff,
    195   1.6    martin 				(addrs.dns[1] >> 16) & 0xff,
    196   1.6    martin 				(addrs.dns[1] >> 8) & 0xff,
    197   1.6    martin 				addrs.dns[1] & 0xff);
    198   1.6    martin 	}
    199   1.6    martin 
    200   1.2    martin 	if (dump) {
    201   1.2    martin 		/* dump PPPoE session state */
    202   1.2    martin 		struct pppoeconnectionstate state;
    203   1.2    martin 		int e;
    204   1.2    martin 
    205   1.2    martin 		memset(&state, 0, sizeof state);
    206   1.2    martin 		strncpy(state.ifname, ifname, sizeof state.ifname);
    207   1.2    martin 		e = ioctl(s, PPPOEGETSESSION, &state);
    208   1.2    martin 		if (e)
    209   1.6    martin 			print_error(ifname, e, "PPPOEGETSESSION");
    210   1.2    martin 
    211   1.2    martin 		printf("%s:\tstate = ", ifname);
    212   1.2    martin 		switch(state.state) {
    213   1.2    martin 		case PPPOE_STATE_INITIAL:
    214   1.2    martin 			printf("initial\n"); break;
    215   1.2    martin 		case PPPOE_STATE_PADI_SENT:
    216   1.2    martin 			printf("PADI sent\n"); break;
    217   1.2    martin 		case PPPOE_STATE_PADR_SENT:
    218   1.2    martin 			printf("PADR sent\n"); break;
    219   1.2    martin 		case PPPOE_STATE_SESSION:
    220   1.2    martin 			printf("session\n"); break;
    221   1.2    martin 		case PPPOE_STATE_CLOSING:
    222   1.2    martin 			printf("closing\n"); break;
    223   1.1    martin 		}
    224   1.2    martin 		printf("\tSession ID: 0x%x\n", state.session_id);
    225   1.2    martin 		printf("\tPADI retries: %d\n", state.padi_retry_no);
    226   1.2    martin 		printf("\tPADR retries: %d\n", state.padr_retry_no);
    227   1.2    martin 
    228   1.1    martin 		return 0;
    229   1.1    martin 	}
    230   1.1    martin 
    231   1.1    martin 
    232   1.2    martin 	memset(&spr, 0, sizeof spr);
    233   1.2    martin 	strncpy(spr.ifname, ifname, sizeof spr.ifname);
    234   1.2    martin 	memset(&lcp, 0, sizeof lcp);
    235   1.2    martin 	strncpy(lcp.ifname, ifname, sizeof lcp.ifname);
    236   1.2    martin 	memset(&status, 0, sizeof status);
    237   1.2    martin 	strncpy(status.ifname, ifname, sizeof status.ifname);
    238   1.3    martin 	memset(&timeout, 0, sizeof timeout);
    239   1.3    martin 	strncpy(timeout.ifname, ifname, sizeof timeout.ifname);
    240   1.4    martin 	memset(&authfailstats, 0, sizeof &authfailstats);
    241   1.4    martin 	strncpy(authfailstats.ifname, ifname, sizeof authfailstats.ifname);
    242   1.4    martin 	memset(&authfailset, 0, sizeof authfailset);
    243   1.4    martin 	strncpy(authfailset.ifname, ifname, sizeof authfailset.ifname);
    244   1.6    martin 	memset(&dnssettings, 0, sizeof dnssettings);
    245   1.6    martin 	strncpy(dnssettings.ifname, ifname, sizeof dnssettings.ifname);
    246  1.14    martin 	memset(&keepalivesettings, 0, sizeof keepalivesettings);
    247  1.14    martin 	strncpy(keepalivesettings.ifname, ifname, sizeof keepalivesettings.ifname);
    248   1.1    martin 
    249   1.1    martin 	mib[0] = CTL_KERN;
    250   1.1    martin 	mib[1] = KERN_CLOCKRATE;
    251   1.1    martin 	len = sizeof(clockinfo);
    252   1.1    martin 	if(sysctl(mib, 2, &clockinfo, &len, NULL, 0) == -1)
    253   1.1    martin 	{
    254   1.1    martin 		fprintf(stderr, "error, cannot sysctl kern.clockrate!\n");
    255   1.1    martin 		exit(1);
    256   1.1    martin 	}
    257   1.1    martin 
    258   1.1    martin 	hz = clockinfo.hz;
    259   1.1    martin 
    260  1.11       mrg 	if (argc == 0 && !(dns1||dns2) && !configname) {
    261   1.1    martin 		/* list only mode */
    262   1.2    martin 
    263  1.15       wiz 		/* first pass, get name lengths */
    264   1.2    martin 		if (ioctl(s, SPPPGETAUTHCFG, &spr) == -1)
    265   1.2    martin 			err(EX_OSERR, "SPPPGETAUTHCFG");
    266   1.2    martin 		/* now allocate buffers for strings */
    267   1.2    martin 		if (spr.myname_length)
    268   1.2    martin 			spr.myname = malloc(spr.myname_length);
    269   1.2    martin 		if (spr.hisname_length)
    270   1.2    martin 			spr.hisname = malloc(spr.hisname_length);
    271   1.2    martin 		/* second pass: get names too */
    272   1.2    martin 		if (ioctl(s, SPPPGETAUTHCFG, &spr) == -1)
    273   1.2    martin 			err(EX_OSERR, "SPPPGETAUTHCFG");
    274   1.2    martin 
    275   1.2    martin 		if (ioctl(s, SPPPGETLCPCFG, &lcp) == -1)
    276   1.2    martin 			err(EX_OSERR, "SPPPGETLCPCFG");
    277   1.2    martin 		if (ioctl(s, SPPPGETSTATUS, &status) == -1)
    278   1.2    martin 			err(EX_OSERR, "SPPPGETSTATUS");
    279   1.3    martin 		if (ioctl(s, SPPPGETIDLETO, &timeout) == -1)
    280   1.3    martin 			err(EX_OSERR, "SPPPGETIDLETO");
    281   1.4    martin 		if (ioctl(s, SPPPGETAUTHFAILURES, &authfailstats) == -1)
    282   1.4    martin 			err(EX_OSERR, "SPPPGETAUTHFAILURES");
    283  1.14    martin 		if (ioctl(s, SPPPGETKEEPALIVE, &keepalivesettings) == -1)
    284  1.14    martin 			err(EX_OSERR, "SPPPGETKEEPALIVE");
    285   1.2    martin 
    286  1.14    martin 		print_vals(ifname, status.phase, &spr, lcp.lcp_timeout,
    287  1.14    martin 		    timeout.idle_seconds, authfailstats.auth_failures,
    288  1.14    martin 		    authfailstats.max_failures,
    289  1.14    martin 		    keepalivesettings.maxalive,
    290  1.14    martin 		    keepalivesettings.max_noreceive);
    291   1.2    martin 
    292   1.2    martin 		if (spr.hisname) free(spr.hisname);
    293   1.2    martin 		if (spr.myname) free(spr.myname);
    294   1.1    martin 		return 0;
    295   1.1    martin 	}
    296   1.1    martin 
    297  1.11       mrg 	/* first load the config file, then parse command line args */
    298  1.11       mrg 	if (configname && (fp = fopen(configname, "r")))
    299  1.17  christos 		while ((line = fparseln(fp, NULL, NULL, NULL,
    300  1.17  christos 					FPARSELN_UNESCALL)))
    301  1.11       mrg 			pppoectl_argument(line);
    302  1.11       mrg 
    303   1.1    martin 	while (argc > 0) {
    304  1.11       mrg 		pppoectl_argument(argv[0]);
    305   1.1    martin 
    306   1.1    martin 		argv++;
    307   1.1    martin 		argc--;
    308   1.1    martin 	}
    309   1.1    martin 
    310   1.3    martin 	if (set_auth) {
    311   1.3    martin 		if (ioctl(s, SPPPSETAUTHCFG, &spr) == -1)
    312   1.3    martin 			err(EX_OSERR, "SPPPSETAUTHCFG");
    313   1.3    martin 	}
    314   1.2    martin 	if (set_lcp) {
    315   1.2    martin 		if (ioctl(s, SPPPSETLCPCFG, &lcp) == -1)
    316   1.2    martin 			err(EX_OSERR, "SPPPSETLCPCFG");
    317   1.2    martin 	}
    318   1.3    martin 	if (set_idle_to) {
    319   1.3    martin 		if (ioctl(s, SPPPSETIDLETO, &timeout) == -1)
    320   1.3    martin 			err(EX_OSERR, "SPPPSETIDLETO");
    321   1.3    martin 	}
    322   1.4    martin 	if (set_auth_failure) {
    323   1.9    martin 		if (ioctl(s, SPPPSETAUTHFAILURE, &authfailset) == -1)
    324   1.9    martin 			err(EX_OSERR, "SPPPSETAUTHFAILURE");
    325   1.9    martin 	}
    326   1.9    martin 	if (clear_auth_failure_count && !(set_auth || set_auth_failure)) {
    327   1.9    martin 		/*
    328   1.9    martin 		 * We want to clear the auth failure count, but did not
    329   1.9    martin 		 * do that implicitly by setting authentication - so
    330   1.9    martin 		 * do a zero-effect auth setting change
    331   1.9    martin 		 */
    332   1.9    martin 		if (ioctl(s, SPPPGETAUTHFAILURES, &authfailstats) == -1)
    333   1.9    martin 			err(EX_OSERR, "SPPPGETAUTHFAILURES");
    334   1.9    martin 		authfailset.max_failures = authfailstats.max_failures;
    335   1.4    martin 		if (ioctl(s, SPPPSETAUTHFAILURE, &authfailset) == -1)
    336   1.4    martin 			err(EX_OSERR, "SPPPSETAUTHFAILURE");
    337   1.4    martin 	}
    338   1.6    martin 	if (set_dns) {
    339   1.6    martin 		if (ioctl(s, SPPPSETDNSOPTS, &dnssettings) == -1)
    340   1.6    martin 			err(EX_OSERR, "SPPPSETDNSOPTS");
    341   1.6    martin 	}
    342  1.14    martin 	if (set_keepalive) {
    343  1.14    martin 		if (ioctl(s, SPPPGETKEEPALIVE, &keepalivesettings) == -1)
    344  1.14    martin 			err(EX_OSERR, "SPPPGETKEEPALIVE");
    345  1.14    martin 		if (max_noreceive >= 0)
    346  1.14    martin 			keepalivesettings.max_noreceive = max_noreceive;
    347  1.14    martin 		if (maxalive >= 0)
    348  1.14    martin 			keepalivesettings.maxalive = maxalive;
    349  1.14    martin 		if (ioctl(s, SPPPSETKEEPALIVE, &keepalivesettings) == -1)
    350  1.14    martin 			err(EX_OSERR, "SPPPSETKEEPALIVE");
    351  1.14    martin 	}
    352   1.1    martin 
    353   1.4    martin 	if (verbose) {
    354   1.4    martin 		if (ioctl(s, SPPPGETAUTHFAILURES, &authfailstats) == -1)
    355   1.4    martin 			err(EX_OSERR, "SPPPGETAUTHFAILURES");
    356  1.14    martin 		if (ioctl(s, SPPPGETKEEPALIVE, &keepalivesettings) == -1)
    357  1.14    martin 			err(EX_OSERR, "SPPPGETKEEPALIVE");
    358  1.14    martin 		print_vals(ifname, status.phase, &spr, lcp.lcp_timeout,
    359  1.14    martin 		    timeout.idle_seconds, authfailstats.auth_failures,
    360  1.14    martin 		    authfailstats.max_failures,
    361  1.14    martin 		    keepalivesettings.maxalive,
    362  1.14    martin 		    keepalivesettings.max_noreceive);
    363   1.4    martin 	}
    364   1.1    martin 
    365   1.1    martin 	return 0;
    366   1.1    martin }
    367   1.1    martin 
    368   1.1    martin static void
    369  1.11       mrg pppoectl_argument(char *arg)
    370  1.11       mrg {
    371  1.11       mrg 	size_t off;
    372  1.11       mrg 	const char *cp;
    373  1.11       mrg 
    374  1.11       mrg #define startswith(a,s) strncmp(a, s, (off = strlen(s))) == 0
    375  1.11       mrg 	if (startswith(arg, "authproto=")) {
    376  1.11       mrg 		cp = arg + off;
    377  1.11       mrg 		if (strcmp(cp, "pap") == 0)
    378  1.11       mrg 			spr.myauth =
    379  1.11       mrg 				spr.hisauth = SPPP_AUTHPROTO_PAP;
    380  1.11       mrg 		else if (strcmp(cp, "chap") == 0)
    381  1.11       mrg 			spr.myauth = spr.hisauth = SPPP_AUTHPROTO_CHAP;
    382  1.11       mrg 		else if (strcmp(cp, "none") == 0)
    383  1.11       mrg 			spr.myauth = spr.hisauth = SPPP_AUTHPROTO_NONE;
    384  1.11       mrg 		else
    385  1.11       mrg 			errx(EX_DATAERR, "bad auth proto: %s", cp);
    386  1.11       mrg 		set_auth = 1;
    387  1.11       mrg 	} else if (startswith(arg, "myauthproto=")) {
    388  1.11       mrg 		cp = arg + off;
    389  1.11       mrg 		if (strcmp(cp, "pap") == 0)
    390  1.11       mrg 			spr.myauth = SPPP_AUTHPROTO_PAP;
    391  1.11       mrg 		else if (strcmp(cp, "chap") == 0)
    392  1.11       mrg 			spr.myauth = SPPP_AUTHPROTO_CHAP;
    393  1.11       mrg 		else if (strcmp(cp, "none") == 0)
    394  1.11       mrg 			spr.myauth = SPPP_AUTHPROTO_NONE;
    395  1.11       mrg 		else
    396  1.11       mrg 			errx(EX_DATAERR, "bad auth proto: %s", cp);
    397  1.11       mrg 		set_auth = 1;
    398  1.11       mrg 	} else if (startswith(arg, "myauthname=")) {
    399  1.11       mrg 		spr.myname = arg + off;
    400  1.11       mrg 		spr.myname_length = strlen(spr.myname)+1;
    401  1.11       mrg 		set_auth = 1;
    402  1.11       mrg 	} else if (startswith(arg, "myauthsecret=") || startswith(arg, "myauthkey=")) {
    403  1.11       mrg 		spr.mysecret = arg + off;
    404  1.11       mrg 		spr.mysecret_length = strlen(spr.mysecret)+1;
    405  1.11       mrg 		set_auth = 1;
    406  1.11       mrg 	} else if (startswith(arg, "hisauthproto=")) {
    407  1.11       mrg 		cp = arg + off;
    408  1.11       mrg 		if (strcmp(cp, "pap") == 0)
    409  1.11       mrg 			spr.hisauth = SPPP_AUTHPROTO_PAP;
    410  1.11       mrg 		else if (strcmp(cp, "chap") == 0)
    411  1.11       mrg 			spr.hisauth = SPPP_AUTHPROTO_CHAP;
    412  1.11       mrg 		else if (strcmp(cp, "none") == 0)
    413  1.11       mrg 			spr.hisauth = SPPP_AUTHPROTO_NONE;
    414  1.11       mrg 		else
    415  1.11       mrg 			errx(EX_DATAERR, "bad auth proto: %s", cp);
    416  1.11       mrg 		set_auth = 1;
    417  1.11       mrg 	} else if (startswith(arg, "hisauthname=")) {
    418  1.11       mrg 		spr.hisname = arg + off;
    419  1.11       mrg 		spr.hisname_length = strlen(spr.hisname)+1;
    420  1.11       mrg 		set_auth = 1;
    421  1.11       mrg 	} else if (startswith(arg, "hisauthsecret=") || startswith(arg, "hisauthkey=")) {
    422  1.11       mrg 		spr.hissecret = arg + off;
    423  1.11       mrg 		spr.hissecret_length = strlen(spr.hissecret)+1;
    424  1.11       mrg 		set_auth = 1;
    425  1.14    martin 	} else if (startswith(arg, "max-noreceive=")) {
    426  1.14    martin 		max_noreceive = atoi(arg+off);
    427  1.14    martin 		if (max_noreceive < 0) {
    428  1.14    martin 			fprintf(stderr,
    429  1.14    martin 			    "max-noreceive value must be at least 0\n");
    430  1.14    martin 			max_noreceive = -1;
    431  1.14    martin 		} else {
    432  1.14    martin 			set_keepalive = 1;
    433  1.14    martin 		}
    434  1.14    martin 	} else if (startswith(arg, "max-alive-missed=")) {
    435  1.14    martin 		maxalive = atoi(arg+off);
    436  1.14    martin 		if (maxalive < 0) {
    437  1.14    martin 			fprintf(stderr,
    438  1.14    martin 			    "max-alive-missed value must be at least 0\n");
    439  1.14    martin 			maxalive = -1;
    440  1.14    martin 		} else {
    441  1.14    martin 			set_keepalive = 1;
    442  1.14    martin 		}
    443  1.11       mrg 	} else if (strcmp(arg, "callin") == 0)
    444  1.11       mrg 		spr.hisauthflags |= SPPP_AUTHFLAG_NOCALLOUT;
    445  1.11       mrg 	else if (strcmp(arg, "always") == 0)
    446  1.11       mrg 		spr.hisauthflags &= ~SPPP_AUTHFLAG_NOCALLOUT;
    447  1.11       mrg 	else if (strcmp(arg, "norechallenge") == 0)
    448  1.11       mrg 		spr.hisauthflags |= SPPP_AUTHFLAG_NORECHALLENGE;
    449  1.11       mrg 	else if (strcmp(arg, "rechallenge") == 0)
    450  1.11       mrg 		spr.hisauthflags &= ~SPPP_AUTHFLAG_NORECHALLENGE;
    451  1.11       mrg #ifndef __NetBSD__
    452  1.11       mrg 	else if (strcmp(arg, "enable-vj") == 0)
    453  1.11       mrg 		spr.defs.enable_vj = 1;
    454  1.11       mrg 	else if (strcmp(arg, "disable-vj") == 0)
    455  1.11       mrg 		spr.defs.enable_vj = 0;
    456  1.11       mrg #endif
    457  1.11       mrg 	else if (startswith(arg, "lcp-timeout=")) {
    458  1.11       mrg 		int timeout_arg = atoi(arg+off);
    459  1.11       mrg 		if ((timeout_arg > 20000) || (timeout_arg <= 0))
    460  1.11       mrg 			errx(EX_DATAERR, "bad lcp timeout value: %s",
    461  1.11       mrg 			     arg+off);
    462  1.11       mrg 		lcp.lcp_timeout = timeout_arg * hz / 1000;
    463  1.11       mrg 		set_lcp = 1;
    464  1.11       mrg 	} else if (startswith(arg, "idle-timeout=")) {
    465  1.11       mrg 		timeout.idle_seconds = (time_t)atol(arg+off);
    466  1.11       mrg 		set_idle_to = 1;
    467  1.11       mrg 	} else if (startswith(arg, "max-auth-failure=")) {
    468  1.11       mrg 		authfailset.max_failures = atoi(arg+off);
    469  1.11       mrg 		set_auth_failure = 1;
    470  1.11       mrg 	} else if (strcmp(arg, "clear-auth-failure") == 0) {
    471  1.11       mrg 		clear_auth_failure_count = 1;
    472  1.11       mrg 	} else if (startswith(arg, "query-dns=")) {
    473  1.11       mrg 		dnssettings.query_dns = atoi(arg+off);
    474  1.11       mrg 		set_dns = 1;
    475  1.11       mrg 	} else
    476  1.11       mrg 		errx(EX_DATAERR, "bad parameter: \"%s\"", arg);
    477  1.11       mrg }
    478  1.11       mrg 
    479  1.11       mrg static void
    480   1.1    martin usage(void)
    481   1.1    martin {
    482   1.5    martin 	const char * prog = getprogname();
    483   1.5    martin 	fprintf(stderr,
    484   1.5    martin 	    "usage:\n"
    485  1.11       mrg 	    "       %s [-f config] ifname [...]\n"
    486   1.5    martin 	    "       %s [-v] ifname [{my|his}auth{proto|name|secret}=...] \\\n"
    487   1.5    martin             "                      [callin] [always] [{no}rechallenge]\n"
    488   1.6    martin             "                      [query-dns=3]\n"
    489   1.5    martin 	    "           to set authentication names, passwords\n"
    490   1.5    martin 	    "           and (optional) paramaters\n"
    491  1.10    martin 	    "       %s [-v] ifname lcp-timeout=ms|idle-timeout=s|\n"
    492  1.14    martin 	    "                      max-noreceive=s|max-alive-missed=cnt|\n"
    493  1.10    martin 	    "                      max-auth-failure=count|clear-auth-failure\n"
    494   1.5    martin 	    "           to set general parameters\n"
    495   1.5    martin 	    "   or\n"
    496   1.5    martin 	    "       %s -e ethernet-ifname ifname\n"
    497   1.5    martin 	    "           to connect an ethernet interface for PPPoE\n"
    498   1.5    martin 	    "       %s [-a access-concentrator-name] [-s service-name] ifname\n"
    499   1.5    martin 	    "           to specify (optional) data for PPPoE sessions\n"
    500   1.5    martin 	    "       %s -d ifname\n"
    501   1.5    martin 	    "           to dump the current PPPoE session state\n"
    502   1.7    itojun 	    "       %s -n (1|2) ifname\n"
    503   1.6    martin 	    "           to print DNS addresses retrieved via query-dns\n"
    504  1.11       mrg 	    , prog, prog, prog, prog, prog, prog, prog);
    505   1.1    martin 	exit(EX_USAGE);
    506   1.1    martin }
    507   1.1    martin 
    508   1.2    martin static void
    509   1.4    martin print_vals(const char *ifname, int phase, struct spppauthcfg *sp, int lcp_timeout,
    510  1.14    martin 	time_t idle_timeout, int authfailures, int max_auth_failures,
    511  1.14    martin 	u_int maxalive_cnt, time_t max_noreceive_time)
    512   1.1    martin {
    513   1.1    martin #ifndef __NetBSD__
    514   1.1    martin 	time_t send, recv;
    515   1.1    martin #endif
    516   1.1    martin 
    517   1.2    martin 	printf("%s:\tphase=%s\n", ifname, phase_name(phase));
    518   1.2    martin 	if (sp->myauth) {
    519   1.2    martin 		printf("\tmyauthproto=%s myauthname=\"%s\"\n",
    520   1.2    martin 		       proto_name(sp->myauth),
    521   1.2    martin 		       sp->myname);
    522   1.2    martin 	}
    523   1.2    martin 	if (sp->hisauth) {
    524   1.2    martin 		printf("\thisauthproto=%s hisauthname=\"%s\"%s\n",
    525   1.2    martin 		       proto_name(sp->hisauth),
    526   1.2    martin 		       sp->hisname,
    527   1.2    martin 		       authflags(sp->hisauthflags));
    528   1.1    martin 	}
    529   1.1    martin #ifndef __NetBSD__
    530   1.1    martin 	if (sp->defs.pp_phase > PHASE_DEAD) {
    531   1.1    martin 		send = time(NULL) - sp->defs.pp_last_sent;
    532   1.1    martin 		recv = time(NULL) - sp->defs.pp_last_recv;
    533   1.1    martin 		printf("\tidle_time=%ld\n", (send<recv)? send : recv);
    534   1.1    martin 	}
    535   1.1    martin #endif
    536   1.2    martin 
    537   1.1    martin 	printf("\tlcp timeout: %.3f s\n",
    538   1.2    martin 	       (double)lcp_timeout / hz);
    539   1.3    martin 
    540   1.3    martin 	if (idle_timeout != 0)
    541   1.3    martin 		printf("\tidle timeout = %lu s\n", (unsigned long)idle_timeout);
    542   1.3    martin 	else
    543   1.3    martin 		printf("\tidle timeout = disabled\n");
    544   1.2    martin 
    545   1.4    martin 	if (authfailures != 0)
    546   1.4    martin 		printf("\tauthentication failures = %d\n", authfailures);
    547   1.4    martin 	printf("\tmax-auth-failure = %d\n", max_auth_failures);
    548  1.14    martin 
    549  1.14    martin 	printf("\tmax-noreceive = %ld seconds\n", (long)max_noreceive_time);
    550  1.16  jdolecek 	printf("\tmax-alive-missed = %u unanswered echo requests\n", maxalive_cnt);
    551  1.14    martin 
    552   1.1    martin #ifndef __NetBSD__
    553   1.1    martin 	printf("\tenable_vj: %s\n",
    554   1.1    martin 	       sp->defs.enable_vj ? "on" : "off");
    555   1.1    martin #endif
    556   1.1    martin }
    557   1.1    martin 
    558   1.1    martin const char *
    559   1.2    martin phase_name(int phase)
    560   1.1    martin {
    561   1.1    martin 	switch (phase) {
    562   1.2    martin 	case SPPP_PHASE_DEAD:		return "dead";
    563   1.2    martin 	case SPPP_PHASE_ESTABLISH:	return "establish";
    564   1.2    martin 	case SPPP_PHASE_TERMINATE:	return "terminate";
    565   1.2    martin 	case SPPP_PHASE_AUTHENTICATE:	return "authenticate";
    566   1.2    martin 	case SPPP_PHASE_NETWORK:	return "network";
    567   1.1    martin 	}
    568   1.1    martin 	return "illegal";
    569   1.1    martin }
    570   1.1    martin 
    571   1.1    martin const char *
    572   1.2    martin proto_name(int proto)
    573   1.1    martin {
    574   1.1    martin 	static char buf[12];
    575   1.1    martin 	switch (proto) {
    576   1.2    martin 	case SPPP_AUTHPROTO_PAP:	return "pap";
    577   1.2    martin 	case SPPP_AUTHPROTO_CHAP:	return "chap";
    578   1.2    martin 	case SPPP_AUTHPROTO_NONE:	return "none";
    579   1.1    martin 	}
    580  1.13    itojun 	snprintf(buf, sizeof(buf), "0x%x", (unsigned)proto);
    581   1.1    martin 	return buf;
    582   1.1    martin }
    583   1.1    martin 
    584   1.1    martin const char *
    585   1.2    martin authflags(int flags)
    586   1.1    martin {
    587   1.1    martin 	static char buf[32];
    588   1.1    martin 	buf[0] = '\0';
    589   1.2    martin 	if (flags & SPPP_AUTHFLAG_NOCALLOUT)
    590  1.13    itojun 		strlcat(buf, " callin", sizeof(buf));
    591   1.2    martin 	if (flags & SPPP_AUTHFLAG_NORECHALLENGE)
    592  1.13    itojun 		strlcat(buf, " norechallenge", sizeof(buf));
    593   1.1    martin 	return buf;
    594   1.1    martin }
    595   1.2    martin 
    596   1.2    martin static void
    597   1.2    martin print_error(const char *ifname, int error, const char * str)
    598   1.2    martin {
    599   1.2    martin 	if (error == -1)
    600   1.2    martin 		fprintf(stderr, "%s: interface not found\n", ifname);
    601   1.2    martin 	else
    602   1.2    martin 		fprintf(stderr, "%s: %s: %s\n", ifname, str, strerror(error));
    603   1.2    martin 	exit(EX_DATAERR);
    604   1.2    martin }
    605   1.2    martin 
    606   1.2    martin 
    607