pppoectl.c revision 1.18.2.1 1 1.18.2.1 tron /* $NetBSD: pppoectl.c,v 1.18.2.1 2005/05/11 12:25:49 tron Exp $ */
2 1.1 martin
3 1.1 martin /*
4 1.1 martin * Copyright (c) 1997 Joerg Wunsch
5 1.1 martin *
6 1.1 martin * All rights reserved.
7 1.1 martin *
8 1.1 martin * Redistribution and use in source and binary forms, with or without
9 1.1 martin * modification, are permitted provided that the following conditions
10 1.1 martin * are met:
11 1.1 martin * 1. Redistributions of source code must retain the above copyright
12 1.1 martin * notice, this list of conditions and the following disclaimer.
13 1.1 martin * 2. Redistributions in binary form must reproduce the above copyright
14 1.1 martin * notice, this list of conditions and the following disclaimer in the
15 1.1 martin * documentation and/or other materials provided with the distribution.
16 1.1 martin *
17 1.1 martin * THIS SOFTWARE IS PROVIDED BY THE DEVELOPERS ``AS IS'' AND ANY EXPRESS OR
18 1.1 martin * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 1.1 martin * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 1.1 martin * IN NO EVENT SHALL THE DEVELOPERS BE LIABLE FOR ANY DIRECT, INDIRECT,
21 1.1 martin * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22 1.1 martin * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 1.1 martin * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 1.1 martin * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 1.1 martin * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 1.1 martin * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27 1.1 martin *
28 1.1 martin * From: spppcontrol.c,v 1.3 1998/01/07 07:55:26 charnier Exp
29 1.1 martin * From: ispppcontrol
30 1.1 martin */
31 1.12 agc #include <sys/cdefs.h>
32 1.12 agc
33 1.12 agc #ifndef lint
34 1.18.2.1 tron __RCSID("$NetBSD: pppoectl.c,v 1.18.2.1 2005/05/11 12:25:49 tron Exp $");
35 1.12 agc #endif
36 1.12 agc
37 1.1 martin
38 1.1 martin #include <sys/param.h>
39 1.1 martin #include <sys/callout.h>
40 1.1 martin #include <sys/ioctl.h>
41 1.1 martin #include <sys/mbuf.h>
42 1.1 martin #include <sys/socket.h>
43 1.1 martin #include <sys/time.h>
44 1.1 martin #include <sys/sysctl.h>
45 1.1 martin #include <net/if.h>
46 1.1 martin #include <net/if_sppp.h>
47 1.1 martin #include <net/if_pppoe.h>
48 1.1 martin #include <err.h>
49 1.1 martin #include <stdio.h>
50 1.1 martin #include <stdlib.h>
51 1.1 martin #include <string.h>
52 1.1 martin #include <sysexits.h>
53 1.1 martin #include <unistd.h>
54 1.1 martin
55 1.1 martin static void usage(void);
56 1.2 martin static void print_error(const char *ifname, int error, const char * str);
57 1.4 martin static void print_vals(const char *ifname, int phase, struct spppauthcfg *sp,
58 1.4 martin int lcp_timeout, time_t idle_timeout, int authfailures,
59 1.14 martin int max_auth_failures, u_int maxalive, time_t max_noreceive);
60 1.2 martin const char *phase_name(int phase);
61 1.2 martin const char *proto_name(int proto);
62 1.2 martin const char *authflags(int flags);
63 1.11 mrg static void pppoectl_argument(char *arg);
64 1.1 martin
65 1.1 martin int hz = 0;
66 1.1 martin
67 1.11 mrg int set_auth, set_lcp, set_idle_to, set_auth_failure, set_dns,
68 1.14 martin clear_auth_failure_count, set_keepalive;
69 1.14 martin int maxalive = -1;
70 1.14 martin int max_noreceive = -1;
71 1.11 mrg struct spppauthcfg spr;
72 1.11 mrg struct sppplcpcfg lcp;
73 1.11 mrg struct spppstatus status;
74 1.11 mrg struct spppidletimeout timeout;
75 1.11 mrg struct spppauthfailurestats authfailstats;
76 1.11 mrg struct spppauthfailuresettings authfailset;
77 1.11 mrg struct spppdnssettings dnssettings;
78 1.14 martin struct spppkeepalivesettings keepalivesettings;
79 1.11 mrg
80 1.1 martin int
81 1.1 martin main(int argc, char **argv)
82 1.1 martin {
83 1.11 mrg FILE *fp;
84 1.1 martin int s, c;
85 1.6 martin int errs = 0, verbose = 0, dump = 0, dns1 = 0, dns2 = 0;
86 1.11 mrg size_t len;
87 1.1 martin const char *eth_if_name, *access_concentrator, *service;
88 1.11 mrg const char *ifname, *configname;
89 1.11 mrg char *line;
90 1.1 martin int mib[2];
91 1.1 martin struct clockinfo clockinfo;
92 1.5 martin setprogname(argv[0]);
93 1.5 martin
94 1.1 martin eth_if_name = NULL;
95 1.1 martin access_concentrator = NULL;
96 1.1 martin service = NULL;
97 1.11 mrg configname = NULL;
98 1.11 mrg while ((c = getopt(argc, argv, "vde:f:s:a:n:")) != -1)
99 1.1 martin switch (c) {
100 1.1 martin case 'v':
101 1.1 martin verbose++;
102 1.1 martin break;
103 1.1 martin
104 1.2 martin case 'd':
105 1.2 martin dump++;
106 1.2 martin break;
107 1.2 martin
108 1.1 martin case 'e':
109 1.1 martin eth_if_name = optarg;
110 1.1 martin break;
111 1.1 martin
112 1.11 mrg case 'f':
113 1.11 mrg configname = optarg;
114 1.11 mrg break;
115 1.11 mrg
116 1.1 martin case 's':
117 1.1 martin service = optarg;
118 1.1 martin break;
119 1.1 martin
120 1.1 martin case 'a':
121 1.1 martin access_concentrator = optarg;
122 1.1 martin break;
123 1.1 martin
124 1.6 martin case 'n':
125 1.6 martin if (strcmp(optarg, "1") == 0)
126 1.6 martin dns1 = 1;
127 1.6 martin else if (strcmp(optarg, "2") == 0)
128 1.6 martin dns2 = 1;
129 1.6 martin else {
130 1.6 martin fprintf(stderr, "bad argument \"%s\" to -n (only 1 or two allowed)\n",
131 1.6 martin optarg);
132 1.6 martin errs++;
133 1.6 martin }
134 1.6 martin break;
135 1.6 martin
136 1.1 martin default:
137 1.1 martin errs++;
138 1.1 martin break;
139 1.1 martin }
140 1.1 martin argv += optind;
141 1.1 martin argc -= optind;
142 1.1 martin
143 1.1 martin if (errs || argc < 1)
144 1.1 martin usage();
145 1.1 martin
146 1.1 martin ifname = argv[0];
147 1.1 martin
148 1.1 martin /* use a random AF to create the socket */
149 1.1 martin if ((s = socket(AF_INET, SOCK_DGRAM, 0)) < 0)
150 1.1 martin err(EX_UNAVAILABLE, "ifconfig: socket");
151 1.1 martin
152 1.1 martin argc--;
153 1.1 martin argv++;
154 1.1 martin
155 1.1 martin if (eth_if_name) {
156 1.1 martin struct pppoediscparms parms;
157 1.1 martin int e;
158 1.1 martin
159 1.1 martin memset(&parms, 0, sizeof parms);
160 1.1 martin strncpy(parms.ifname, ifname, sizeof(parms.ifname));
161 1.1 martin strncpy(parms.eth_ifname, eth_if_name, sizeof(parms.eth_ifname));
162 1.1 martin if (access_concentrator) {
163 1.1 martin parms.ac_name = (char*)access_concentrator;
164 1.1 martin parms.ac_name_len = strlen(access_concentrator);
165 1.1 martin }
166 1.1 martin if (service) {
167 1.1 martin parms.service_name = (char*)service;
168 1.1 martin parms.service_name_len = strlen(service);
169 1.1 martin }
170 1.1 martin
171 1.1 martin e = ioctl(s, PPPOESETPARMS, &parms);
172 1.2 martin if (e)
173 1.2 martin print_error(ifname, e, "PPPOESETPARMS");
174 1.2 martin return 0;
175 1.2 martin }
176 1.2 martin
177 1.6 martin if (dns1 || dns2) {
178 1.6 martin /* print DNS addresses */
179 1.6 martin int e;
180 1.6 martin struct spppdnsaddrs addrs;
181 1.6 martin memset(&addrs, 0, sizeof addrs);
182 1.6 martin strncpy(addrs.ifname, ifname, sizeof addrs.ifname);
183 1.6 martin e = ioctl(s, SPPPGETDNSADDRS, &addrs);
184 1.6 martin if (e)
185 1.6 martin print_error(ifname, e, "SPPPGETDNSADDRS");
186 1.6 martin if (dns1)
187 1.6 martin printf("%d.%d.%d.%d\n",
188 1.6 martin (addrs.dns[0] >> 24) & 0xff,
189 1.6 martin (addrs.dns[0] >> 16) & 0xff,
190 1.6 martin (addrs.dns[0] >> 8) & 0xff,
191 1.6 martin addrs.dns[0] & 0xff);
192 1.6 martin if (dns2)
193 1.6 martin printf("%d.%d.%d.%d\n",
194 1.6 martin (addrs.dns[1] >> 24) & 0xff,
195 1.6 martin (addrs.dns[1] >> 16) & 0xff,
196 1.6 martin (addrs.dns[1] >> 8) & 0xff,
197 1.6 martin addrs.dns[1] & 0xff);
198 1.6 martin }
199 1.6 martin
200 1.2 martin if (dump) {
201 1.2 martin /* dump PPPoE session state */
202 1.2 martin struct pppoeconnectionstate state;
203 1.2 martin int e;
204 1.2 martin
205 1.2 martin memset(&state, 0, sizeof state);
206 1.2 martin strncpy(state.ifname, ifname, sizeof state.ifname);
207 1.2 martin e = ioctl(s, PPPOEGETSESSION, &state);
208 1.2 martin if (e)
209 1.6 martin print_error(ifname, e, "PPPOEGETSESSION");
210 1.2 martin
211 1.2 martin printf("%s:\tstate = ", ifname);
212 1.2 martin switch(state.state) {
213 1.2 martin case PPPOE_STATE_INITIAL:
214 1.2 martin printf("initial\n"); break;
215 1.2 martin case PPPOE_STATE_PADI_SENT:
216 1.2 martin printf("PADI sent\n"); break;
217 1.2 martin case PPPOE_STATE_PADR_SENT:
218 1.2 martin printf("PADR sent\n"); break;
219 1.2 martin case PPPOE_STATE_SESSION:
220 1.2 martin printf("session\n"); break;
221 1.2 martin case PPPOE_STATE_CLOSING:
222 1.2 martin printf("closing\n"); break;
223 1.1 martin }
224 1.2 martin printf("\tSession ID: 0x%x\n", state.session_id);
225 1.2 martin printf("\tPADI retries: %d\n", state.padi_retry_no);
226 1.2 martin printf("\tPADR retries: %d\n", state.padr_retry_no);
227 1.2 martin
228 1.1 martin return 0;
229 1.1 martin }
230 1.1 martin
231 1.1 martin
232 1.2 martin memset(&spr, 0, sizeof spr);
233 1.2 martin strncpy(spr.ifname, ifname, sizeof spr.ifname);
234 1.2 martin memset(&lcp, 0, sizeof lcp);
235 1.2 martin strncpy(lcp.ifname, ifname, sizeof lcp.ifname);
236 1.2 martin memset(&status, 0, sizeof status);
237 1.2 martin strncpy(status.ifname, ifname, sizeof status.ifname);
238 1.3 martin memset(&timeout, 0, sizeof timeout);
239 1.3 martin strncpy(timeout.ifname, ifname, sizeof timeout.ifname);
240 1.4 martin memset(&authfailstats, 0, sizeof &authfailstats);
241 1.4 martin strncpy(authfailstats.ifname, ifname, sizeof authfailstats.ifname);
242 1.4 martin memset(&authfailset, 0, sizeof authfailset);
243 1.4 martin strncpy(authfailset.ifname, ifname, sizeof authfailset.ifname);
244 1.6 martin memset(&dnssettings, 0, sizeof dnssettings);
245 1.6 martin strncpy(dnssettings.ifname, ifname, sizeof dnssettings.ifname);
246 1.14 martin memset(&keepalivesettings, 0, sizeof keepalivesettings);
247 1.14 martin strncpy(keepalivesettings.ifname, ifname, sizeof keepalivesettings.ifname);
248 1.1 martin
249 1.1 martin mib[0] = CTL_KERN;
250 1.1 martin mib[1] = KERN_CLOCKRATE;
251 1.1 martin len = sizeof(clockinfo);
252 1.1 martin if(sysctl(mib, 2, &clockinfo, &len, NULL, 0) == -1)
253 1.1 martin {
254 1.1 martin fprintf(stderr, "error, cannot sysctl kern.clockrate!\n");
255 1.1 martin exit(1);
256 1.1 martin }
257 1.1 martin
258 1.1 martin hz = clockinfo.hz;
259 1.1 martin
260 1.11 mrg if (argc == 0 && !(dns1||dns2) && !configname) {
261 1.1 martin /* list only mode */
262 1.2 martin
263 1.15 wiz /* first pass, get name lengths */
264 1.2 martin if (ioctl(s, SPPPGETAUTHCFG, &spr) == -1)
265 1.2 martin err(EX_OSERR, "SPPPGETAUTHCFG");
266 1.2 martin /* now allocate buffers for strings */
267 1.2 martin if (spr.myname_length)
268 1.2 martin spr.myname = malloc(spr.myname_length);
269 1.2 martin if (spr.hisname_length)
270 1.2 martin spr.hisname = malloc(spr.hisname_length);
271 1.2 martin /* second pass: get names too */
272 1.2 martin if (ioctl(s, SPPPGETAUTHCFG, &spr) == -1)
273 1.2 martin err(EX_OSERR, "SPPPGETAUTHCFG");
274 1.2 martin
275 1.2 martin if (ioctl(s, SPPPGETLCPCFG, &lcp) == -1)
276 1.2 martin err(EX_OSERR, "SPPPGETLCPCFG");
277 1.2 martin if (ioctl(s, SPPPGETSTATUS, &status) == -1)
278 1.2 martin err(EX_OSERR, "SPPPGETSTATUS");
279 1.3 martin if (ioctl(s, SPPPGETIDLETO, &timeout) == -1)
280 1.3 martin err(EX_OSERR, "SPPPGETIDLETO");
281 1.4 martin if (ioctl(s, SPPPGETAUTHFAILURES, &authfailstats) == -1)
282 1.4 martin err(EX_OSERR, "SPPPGETAUTHFAILURES");
283 1.14 martin if (ioctl(s, SPPPGETKEEPALIVE, &keepalivesettings) == -1)
284 1.14 martin err(EX_OSERR, "SPPPGETKEEPALIVE");
285 1.2 martin
286 1.14 martin print_vals(ifname, status.phase, &spr, lcp.lcp_timeout,
287 1.14 martin timeout.idle_seconds, authfailstats.auth_failures,
288 1.14 martin authfailstats.max_failures,
289 1.14 martin keepalivesettings.maxalive,
290 1.14 martin keepalivesettings.max_noreceive);
291 1.2 martin
292 1.2 martin if (spr.hisname) free(spr.hisname);
293 1.2 martin if (spr.myname) free(spr.myname);
294 1.1 martin return 0;
295 1.1 martin }
296 1.1 martin
297 1.11 mrg /* first load the config file, then parse command line args */
298 1.11 mrg if (configname && (fp = fopen(configname, "r")))
299 1.17 christos while ((line = fparseln(fp, NULL, NULL, NULL,
300 1.18 christos FPARSELN_UNESCALL)) != NULL) {
301 1.18 christos if (line[0] != '\0')
302 1.18 christos pppoectl_argument(line);
303 1.18.2.1 tron /*
304 1.18.2.1 tron * We do not free(line) here, because we
305 1.18.2.1 tron * still have references to parts of the
306 1.18.2.1 tron * string collected in the various ioctl
307 1.18.2.1 tron * argument structures (and need those).
308 1.18.2.1 tron * Yes, this is a memory leak.
309 1.18.2.1 tron * We could copy the partial strings instead,
310 1.18.2.1 tron * and free those later - but this is a one-shot
311 1.18.2.1 tron * program and memory will be freed at process
312 1.18.2.1 tron * exit time anyway.
313 1.18.2.1 tron */
314 1.18 christos }
315 1.18 christos
316 1.11 mrg
317 1.1 martin while (argc > 0) {
318 1.11 mrg pppoectl_argument(argv[0]);
319 1.1 martin
320 1.1 martin argv++;
321 1.1 martin argc--;
322 1.1 martin }
323 1.1 martin
324 1.3 martin if (set_auth) {
325 1.3 martin if (ioctl(s, SPPPSETAUTHCFG, &spr) == -1)
326 1.3 martin err(EX_OSERR, "SPPPSETAUTHCFG");
327 1.3 martin }
328 1.2 martin if (set_lcp) {
329 1.2 martin if (ioctl(s, SPPPSETLCPCFG, &lcp) == -1)
330 1.2 martin err(EX_OSERR, "SPPPSETLCPCFG");
331 1.2 martin }
332 1.3 martin if (set_idle_to) {
333 1.3 martin if (ioctl(s, SPPPSETIDLETO, &timeout) == -1)
334 1.3 martin err(EX_OSERR, "SPPPSETIDLETO");
335 1.3 martin }
336 1.4 martin if (set_auth_failure) {
337 1.9 martin if (ioctl(s, SPPPSETAUTHFAILURE, &authfailset) == -1)
338 1.9 martin err(EX_OSERR, "SPPPSETAUTHFAILURE");
339 1.9 martin }
340 1.9 martin if (clear_auth_failure_count && !(set_auth || set_auth_failure)) {
341 1.9 martin /*
342 1.9 martin * We want to clear the auth failure count, but did not
343 1.9 martin * do that implicitly by setting authentication - so
344 1.9 martin * do a zero-effect auth setting change
345 1.9 martin */
346 1.9 martin if (ioctl(s, SPPPGETAUTHFAILURES, &authfailstats) == -1)
347 1.9 martin err(EX_OSERR, "SPPPGETAUTHFAILURES");
348 1.9 martin authfailset.max_failures = authfailstats.max_failures;
349 1.4 martin if (ioctl(s, SPPPSETAUTHFAILURE, &authfailset) == -1)
350 1.4 martin err(EX_OSERR, "SPPPSETAUTHFAILURE");
351 1.4 martin }
352 1.6 martin if (set_dns) {
353 1.6 martin if (ioctl(s, SPPPSETDNSOPTS, &dnssettings) == -1)
354 1.6 martin err(EX_OSERR, "SPPPSETDNSOPTS");
355 1.6 martin }
356 1.14 martin if (set_keepalive) {
357 1.14 martin if (ioctl(s, SPPPGETKEEPALIVE, &keepalivesettings) == -1)
358 1.14 martin err(EX_OSERR, "SPPPGETKEEPALIVE");
359 1.14 martin if (max_noreceive >= 0)
360 1.14 martin keepalivesettings.max_noreceive = max_noreceive;
361 1.14 martin if (maxalive >= 0)
362 1.14 martin keepalivesettings.maxalive = maxalive;
363 1.14 martin if (ioctl(s, SPPPSETKEEPALIVE, &keepalivesettings) == -1)
364 1.14 martin err(EX_OSERR, "SPPPSETKEEPALIVE");
365 1.14 martin }
366 1.1 martin
367 1.4 martin if (verbose) {
368 1.4 martin if (ioctl(s, SPPPGETAUTHFAILURES, &authfailstats) == -1)
369 1.4 martin err(EX_OSERR, "SPPPGETAUTHFAILURES");
370 1.14 martin if (ioctl(s, SPPPGETKEEPALIVE, &keepalivesettings) == -1)
371 1.14 martin err(EX_OSERR, "SPPPGETKEEPALIVE");
372 1.14 martin print_vals(ifname, status.phase, &spr, lcp.lcp_timeout,
373 1.14 martin timeout.idle_seconds, authfailstats.auth_failures,
374 1.14 martin authfailstats.max_failures,
375 1.14 martin keepalivesettings.maxalive,
376 1.14 martin keepalivesettings.max_noreceive);
377 1.4 martin }
378 1.1 martin
379 1.1 martin return 0;
380 1.1 martin }
381 1.1 martin
382 1.1 martin static void
383 1.11 mrg pppoectl_argument(char *arg)
384 1.11 mrg {
385 1.11 mrg size_t off;
386 1.11 mrg const char *cp;
387 1.11 mrg
388 1.11 mrg #define startswith(a,s) strncmp(a, s, (off = strlen(s))) == 0
389 1.11 mrg if (startswith(arg, "authproto=")) {
390 1.11 mrg cp = arg + off;
391 1.11 mrg if (strcmp(cp, "pap") == 0)
392 1.11 mrg spr.myauth =
393 1.11 mrg spr.hisauth = SPPP_AUTHPROTO_PAP;
394 1.11 mrg else if (strcmp(cp, "chap") == 0)
395 1.11 mrg spr.myauth = spr.hisauth = SPPP_AUTHPROTO_CHAP;
396 1.11 mrg else if (strcmp(cp, "none") == 0)
397 1.11 mrg spr.myauth = spr.hisauth = SPPP_AUTHPROTO_NONE;
398 1.11 mrg else
399 1.11 mrg errx(EX_DATAERR, "bad auth proto: %s", cp);
400 1.11 mrg set_auth = 1;
401 1.11 mrg } else if (startswith(arg, "myauthproto=")) {
402 1.11 mrg cp = arg + off;
403 1.11 mrg if (strcmp(cp, "pap") == 0)
404 1.11 mrg spr.myauth = SPPP_AUTHPROTO_PAP;
405 1.11 mrg else if (strcmp(cp, "chap") == 0)
406 1.11 mrg spr.myauth = SPPP_AUTHPROTO_CHAP;
407 1.11 mrg else if (strcmp(cp, "none") == 0)
408 1.11 mrg spr.myauth = SPPP_AUTHPROTO_NONE;
409 1.11 mrg else
410 1.11 mrg errx(EX_DATAERR, "bad auth proto: %s", cp);
411 1.11 mrg set_auth = 1;
412 1.11 mrg } else if (startswith(arg, "myauthname=")) {
413 1.11 mrg spr.myname = arg + off;
414 1.11 mrg spr.myname_length = strlen(spr.myname)+1;
415 1.11 mrg set_auth = 1;
416 1.11 mrg } else if (startswith(arg, "myauthsecret=") || startswith(arg, "myauthkey=")) {
417 1.11 mrg spr.mysecret = arg + off;
418 1.11 mrg spr.mysecret_length = strlen(spr.mysecret)+1;
419 1.11 mrg set_auth = 1;
420 1.11 mrg } else if (startswith(arg, "hisauthproto=")) {
421 1.11 mrg cp = arg + off;
422 1.11 mrg if (strcmp(cp, "pap") == 0)
423 1.11 mrg spr.hisauth = SPPP_AUTHPROTO_PAP;
424 1.11 mrg else if (strcmp(cp, "chap") == 0)
425 1.11 mrg spr.hisauth = SPPP_AUTHPROTO_CHAP;
426 1.11 mrg else if (strcmp(cp, "none") == 0)
427 1.11 mrg spr.hisauth = SPPP_AUTHPROTO_NONE;
428 1.11 mrg else
429 1.11 mrg errx(EX_DATAERR, "bad auth proto: %s", cp);
430 1.11 mrg set_auth = 1;
431 1.11 mrg } else if (startswith(arg, "hisauthname=")) {
432 1.11 mrg spr.hisname = arg + off;
433 1.11 mrg spr.hisname_length = strlen(spr.hisname)+1;
434 1.11 mrg set_auth = 1;
435 1.11 mrg } else if (startswith(arg, "hisauthsecret=") || startswith(arg, "hisauthkey=")) {
436 1.11 mrg spr.hissecret = arg + off;
437 1.11 mrg spr.hissecret_length = strlen(spr.hissecret)+1;
438 1.11 mrg set_auth = 1;
439 1.14 martin } else if (startswith(arg, "max-noreceive=")) {
440 1.14 martin max_noreceive = atoi(arg+off);
441 1.14 martin if (max_noreceive < 0) {
442 1.14 martin fprintf(stderr,
443 1.14 martin "max-noreceive value must be at least 0\n");
444 1.14 martin max_noreceive = -1;
445 1.14 martin } else {
446 1.14 martin set_keepalive = 1;
447 1.14 martin }
448 1.14 martin } else if (startswith(arg, "max-alive-missed=")) {
449 1.14 martin maxalive = atoi(arg+off);
450 1.14 martin if (maxalive < 0) {
451 1.14 martin fprintf(stderr,
452 1.14 martin "max-alive-missed value must be at least 0\n");
453 1.14 martin maxalive = -1;
454 1.14 martin } else {
455 1.14 martin set_keepalive = 1;
456 1.14 martin }
457 1.11 mrg } else if (strcmp(arg, "callin") == 0)
458 1.11 mrg spr.hisauthflags |= SPPP_AUTHFLAG_NOCALLOUT;
459 1.11 mrg else if (strcmp(arg, "always") == 0)
460 1.11 mrg spr.hisauthflags &= ~SPPP_AUTHFLAG_NOCALLOUT;
461 1.11 mrg else if (strcmp(arg, "norechallenge") == 0)
462 1.11 mrg spr.hisauthflags |= SPPP_AUTHFLAG_NORECHALLENGE;
463 1.11 mrg else if (strcmp(arg, "rechallenge") == 0)
464 1.11 mrg spr.hisauthflags &= ~SPPP_AUTHFLAG_NORECHALLENGE;
465 1.11 mrg #ifndef __NetBSD__
466 1.11 mrg else if (strcmp(arg, "enable-vj") == 0)
467 1.11 mrg spr.defs.enable_vj = 1;
468 1.11 mrg else if (strcmp(arg, "disable-vj") == 0)
469 1.11 mrg spr.defs.enable_vj = 0;
470 1.11 mrg #endif
471 1.11 mrg else if (startswith(arg, "lcp-timeout=")) {
472 1.11 mrg int timeout_arg = atoi(arg+off);
473 1.11 mrg if ((timeout_arg > 20000) || (timeout_arg <= 0))
474 1.11 mrg errx(EX_DATAERR, "bad lcp timeout value: %s",
475 1.11 mrg arg+off);
476 1.11 mrg lcp.lcp_timeout = timeout_arg * hz / 1000;
477 1.11 mrg set_lcp = 1;
478 1.11 mrg } else if (startswith(arg, "idle-timeout=")) {
479 1.11 mrg timeout.idle_seconds = (time_t)atol(arg+off);
480 1.11 mrg set_idle_to = 1;
481 1.11 mrg } else if (startswith(arg, "max-auth-failure=")) {
482 1.11 mrg authfailset.max_failures = atoi(arg+off);
483 1.11 mrg set_auth_failure = 1;
484 1.11 mrg } else if (strcmp(arg, "clear-auth-failure") == 0) {
485 1.11 mrg clear_auth_failure_count = 1;
486 1.11 mrg } else if (startswith(arg, "query-dns=")) {
487 1.11 mrg dnssettings.query_dns = atoi(arg+off);
488 1.11 mrg set_dns = 1;
489 1.11 mrg } else
490 1.11 mrg errx(EX_DATAERR, "bad parameter: \"%s\"", arg);
491 1.11 mrg }
492 1.11 mrg
493 1.11 mrg static void
494 1.1 martin usage(void)
495 1.1 martin {
496 1.5 martin const char * prog = getprogname();
497 1.5 martin fprintf(stderr,
498 1.5 martin "usage:\n"
499 1.11 mrg " %s [-f config] ifname [...]\n"
500 1.5 martin " %s [-v] ifname [{my|his}auth{proto|name|secret}=...] \\\n"
501 1.5 martin " [callin] [always] [{no}rechallenge]\n"
502 1.6 martin " [query-dns=3]\n"
503 1.5 martin " to set authentication names, passwords\n"
504 1.5 martin " and (optional) paramaters\n"
505 1.10 martin " %s [-v] ifname lcp-timeout=ms|idle-timeout=s|\n"
506 1.14 martin " max-noreceive=s|max-alive-missed=cnt|\n"
507 1.10 martin " max-auth-failure=count|clear-auth-failure\n"
508 1.5 martin " to set general parameters\n"
509 1.5 martin " or\n"
510 1.5 martin " %s -e ethernet-ifname ifname\n"
511 1.5 martin " to connect an ethernet interface for PPPoE\n"
512 1.5 martin " %s [-a access-concentrator-name] [-s service-name] ifname\n"
513 1.5 martin " to specify (optional) data for PPPoE sessions\n"
514 1.5 martin " %s -d ifname\n"
515 1.5 martin " to dump the current PPPoE session state\n"
516 1.7 itojun " %s -n (1|2) ifname\n"
517 1.6 martin " to print DNS addresses retrieved via query-dns\n"
518 1.11 mrg , prog, prog, prog, prog, prog, prog, prog);
519 1.1 martin exit(EX_USAGE);
520 1.1 martin }
521 1.1 martin
522 1.2 martin static void
523 1.4 martin print_vals(const char *ifname, int phase, struct spppauthcfg *sp, int lcp_timeout,
524 1.14 martin time_t idle_timeout, int authfailures, int max_auth_failures,
525 1.14 martin u_int maxalive_cnt, time_t max_noreceive_time)
526 1.1 martin {
527 1.1 martin #ifndef __NetBSD__
528 1.1 martin time_t send, recv;
529 1.1 martin #endif
530 1.1 martin
531 1.2 martin printf("%s:\tphase=%s\n", ifname, phase_name(phase));
532 1.2 martin if (sp->myauth) {
533 1.2 martin printf("\tmyauthproto=%s myauthname=\"%s\"\n",
534 1.2 martin proto_name(sp->myauth),
535 1.2 martin sp->myname);
536 1.2 martin }
537 1.2 martin if (sp->hisauth) {
538 1.2 martin printf("\thisauthproto=%s hisauthname=\"%s\"%s\n",
539 1.2 martin proto_name(sp->hisauth),
540 1.2 martin sp->hisname,
541 1.2 martin authflags(sp->hisauthflags));
542 1.1 martin }
543 1.1 martin #ifndef __NetBSD__
544 1.1 martin if (sp->defs.pp_phase > PHASE_DEAD) {
545 1.1 martin send = time(NULL) - sp->defs.pp_last_sent;
546 1.1 martin recv = time(NULL) - sp->defs.pp_last_recv;
547 1.1 martin printf("\tidle_time=%ld\n", (send<recv)? send : recv);
548 1.1 martin }
549 1.1 martin #endif
550 1.2 martin
551 1.1 martin printf("\tlcp timeout: %.3f s\n",
552 1.2 martin (double)lcp_timeout / hz);
553 1.3 martin
554 1.3 martin if (idle_timeout != 0)
555 1.3 martin printf("\tidle timeout = %lu s\n", (unsigned long)idle_timeout);
556 1.3 martin else
557 1.3 martin printf("\tidle timeout = disabled\n");
558 1.2 martin
559 1.4 martin if (authfailures != 0)
560 1.4 martin printf("\tauthentication failures = %d\n", authfailures);
561 1.4 martin printf("\tmax-auth-failure = %d\n", max_auth_failures);
562 1.14 martin
563 1.14 martin printf("\tmax-noreceive = %ld seconds\n", (long)max_noreceive_time);
564 1.16 jdolecek printf("\tmax-alive-missed = %u unanswered echo requests\n", maxalive_cnt);
565 1.14 martin
566 1.1 martin #ifndef __NetBSD__
567 1.1 martin printf("\tenable_vj: %s\n",
568 1.1 martin sp->defs.enable_vj ? "on" : "off");
569 1.1 martin #endif
570 1.1 martin }
571 1.1 martin
572 1.1 martin const char *
573 1.2 martin phase_name(int phase)
574 1.1 martin {
575 1.1 martin switch (phase) {
576 1.2 martin case SPPP_PHASE_DEAD: return "dead";
577 1.2 martin case SPPP_PHASE_ESTABLISH: return "establish";
578 1.2 martin case SPPP_PHASE_TERMINATE: return "terminate";
579 1.2 martin case SPPP_PHASE_AUTHENTICATE: return "authenticate";
580 1.2 martin case SPPP_PHASE_NETWORK: return "network";
581 1.1 martin }
582 1.1 martin return "illegal";
583 1.1 martin }
584 1.1 martin
585 1.1 martin const char *
586 1.2 martin proto_name(int proto)
587 1.1 martin {
588 1.1 martin static char buf[12];
589 1.1 martin switch (proto) {
590 1.2 martin case SPPP_AUTHPROTO_PAP: return "pap";
591 1.2 martin case SPPP_AUTHPROTO_CHAP: return "chap";
592 1.2 martin case SPPP_AUTHPROTO_NONE: return "none";
593 1.1 martin }
594 1.13 itojun snprintf(buf, sizeof(buf), "0x%x", (unsigned)proto);
595 1.1 martin return buf;
596 1.1 martin }
597 1.1 martin
598 1.1 martin const char *
599 1.2 martin authflags(int flags)
600 1.1 martin {
601 1.1 martin static char buf[32];
602 1.1 martin buf[0] = '\0';
603 1.2 martin if (flags & SPPP_AUTHFLAG_NOCALLOUT)
604 1.13 itojun strlcat(buf, " callin", sizeof(buf));
605 1.2 martin if (flags & SPPP_AUTHFLAG_NORECHALLENGE)
606 1.13 itojun strlcat(buf, " norechallenge", sizeof(buf));
607 1.1 martin return buf;
608 1.1 martin }
609 1.2 martin
610 1.2 martin static void
611 1.2 martin print_error(const char *ifname, int error, const char * str)
612 1.2 martin {
613 1.2 martin if (error == -1)
614 1.2 martin fprintf(stderr, "%s: interface not found\n", ifname);
615 1.2 martin else
616 1.2 martin fprintf(stderr, "%s: %s: %s\n", ifname, str, strerror(error));
617 1.2 martin exit(EX_DATAERR);
618 1.2 martin }
619 1.2 martin
620 1.2 martin
621