pppoectl.c revision 1.9 1 1.9 martin /* $NetBSD: pppoectl.c,v 1.9 2002/09/01 09:42:05 martin Exp $ */
2 1.1 martin
3 1.1 martin /*
4 1.1 martin * Copyright (c) 1997 Joerg Wunsch
5 1.1 martin *
6 1.1 martin * All rights reserved.
7 1.1 martin *
8 1.1 martin * Redistribution and use in source and binary forms, with or without
9 1.1 martin * modification, are permitted provided that the following conditions
10 1.1 martin * are met:
11 1.1 martin * 1. Redistributions of source code must retain the above copyright
12 1.1 martin * notice, this list of conditions and the following disclaimer.
13 1.1 martin * 2. Redistributions in binary form must reproduce the above copyright
14 1.1 martin * notice, this list of conditions and the following disclaimer in the
15 1.1 martin * documentation and/or other materials provided with the distribution.
16 1.1 martin *
17 1.1 martin * THIS SOFTWARE IS PROVIDED BY THE DEVELOPERS ``AS IS'' AND ANY EXPRESS OR
18 1.1 martin * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19 1.1 martin * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20 1.1 martin * IN NO EVENT SHALL THE DEVELOPERS BE LIABLE FOR ANY DIRECT, INDIRECT,
21 1.1 martin * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
22 1.1 martin * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23 1.1 martin * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24 1.1 martin * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25 1.1 martin * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
26 1.1 martin * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27 1.1 martin *
28 1.1 martin * From: spppcontrol.c,v 1.3 1998/01/07 07:55:26 charnier Exp
29 1.1 martin * From: ispppcontrol
30 1.1 martin */
31 1.1 martin
32 1.1 martin #include <sys/param.h>
33 1.1 martin #include <sys/callout.h>
34 1.1 martin #include <sys/ioctl.h>
35 1.1 martin #include <sys/mbuf.h>
36 1.1 martin #include <sys/socket.h>
37 1.1 martin #include <sys/time.h>
38 1.1 martin #include <sys/sysctl.h>
39 1.1 martin #include <net/if.h>
40 1.1 martin #include <net/if_sppp.h>
41 1.1 martin #include <net/if_pppoe.h>
42 1.1 martin #include <err.h>
43 1.1 martin #include <stdio.h>
44 1.1 martin #include <stdlib.h>
45 1.1 martin #include <string.h>
46 1.1 martin #include <sysexits.h>
47 1.1 martin #include <unistd.h>
48 1.1 martin
49 1.1 martin static void usage(void);
50 1.2 martin static void print_error(const char *ifname, int error, const char * str);
51 1.4 martin static void print_vals(const char *ifname, int phase, struct spppauthcfg *sp,
52 1.4 martin int lcp_timeout, time_t idle_timeout, int authfailures,
53 1.4 martin int max_auth_failures);
54 1.2 martin const char *phase_name(int phase);
55 1.2 martin const char *proto_name(int proto);
56 1.2 martin const char *authflags(int flags);
57 1.1 martin
58 1.1 martin int hz = 0;
59 1.1 martin
60 1.1 martin int
61 1.1 martin main(int argc, char **argv)
62 1.1 martin {
63 1.1 martin int s, c;
64 1.6 martin int errs = 0, verbose = 0, dump = 0, dns1 = 0, dns2 = 0;
65 1.1 martin size_t off, len;
66 1.1 martin const char *ifname, *cp;
67 1.1 martin const char *eth_if_name, *access_concentrator, *service;
68 1.2 martin struct spppauthcfg spr;
69 1.2 martin struct sppplcpcfg lcp;
70 1.2 martin struct spppstatus status;
71 1.3 martin struct spppidletimeout timeout;
72 1.4 martin struct spppauthfailurestats authfailstats;
73 1.4 martin struct spppauthfailuresettings authfailset;
74 1.6 martin struct spppdnssettings dnssettings;
75 1.1 martin int mib[2];
76 1.9 martin int set_auth = 0, set_lcp = 0, set_idle_to = 0, set_auth_failure = 0,
77 1.9 martin set_dns = 0, clear_auth_failure_count = 0;
78 1.1 martin struct clockinfo clockinfo;
79 1.1 martin
80 1.5 martin setprogname(argv[0]);
81 1.5 martin
82 1.1 martin eth_if_name = NULL;
83 1.1 martin access_concentrator = NULL;
84 1.1 martin service = NULL;
85 1.6 martin while ((c = getopt(argc, argv, "vde:s:a:n:")) != -1)
86 1.1 martin switch (c) {
87 1.1 martin case 'v':
88 1.1 martin verbose++;
89 1.1 martin break;
90 1.1 martin
91 1.2 martin case 'd':
92 1.2 martin dump++;
93 1.2 martin break;
94 1.2 martin
95 1.1 martin case 'e':
96 1.1 martin eth_if_name = optarg;
97 1.1 martin break;
98 1.1 martin
99 1.1 martin case 's':
100 1.1 martin service = optarg;
101 1.1 martin break;
102 1.1 martin
103 1.1 martin case 'a':
104 1.1 martin access_concentrator = optarg;
105 1.1 martin break;
106 1.1 martin
107 1.6 martin case 'n':
108 1.6 martin if (strcmp(optarg, "1") == 0)
109 1.6 martin dns1 = 1;
110 1.6 martin else if (strcmp(optarg, "2") == 0)
111 1.6 martin dns2 = 1;
112 1.6 martin else {
113 1.6 martin fprintf(stderr, "bad argument \"%s\" to -n (only 1 or two allowed)\n",
114 1.6 martin optarg);
115 1.6 martin errs++;
116 1.6 martin }
117 1.6 martin break;
118 1.6 martin
119 1.1 martin default:
120 1.1 martin errs++;
121 1.1 martin break;
122 1.1 martin }
123 1.1 martin argv += optind;
124 1.1 martin argc -= optind;
125 1.1 martin
126 1.1 martin if (errs || argc < 1)
127 1.1 martin usage();
128 1.1 martin
129 1.1 martin ifname = argv[0];
130 1.1 martin
131 1.1 martin /* use a random AF to create the socket */
132 1.1 martin if ((s = socket(AF_INET, SOCK_DGRAM, 0)) < 0)
133 1.1 martin err(EX_UNAVAILABLE, "ifconfig: socket");
134 1.1 martin
135 1.1 martin argc--;
136 1.1 martin argv++;
137 1.1 martin
138 1.1 martin if (eth_if_name) {
139 1.1 martin struct pppoediscparms parms;
140 1.1 martin int e;
141 1.1 martin
142 1.1 martin memset(&parms, 0, sizeof parms);
143 1.1 martin strncpy(parms.ifname, ifname, sizeof(parms.ifname));
144 1.1 martin strncpy(parms.eth_ifname, eth_if_name, sizeof(parms.eth_ifname));
145 1.1 martin if (access_concentrator) {
146 1.1 martin parms.ac_name = (char*)access_concentrator;
147 1.1 martin parms.ac_name_len = strlen(access_concentrator);
148 1.1 martin }
149 1.1 martin if (service) {
150 1.1 martin parms.service_name = (char*)service;
151 1.1 martin parms.service_name_len = strlen(service);
152 1.1 martin }
153 1.1 martin
154 1.1 martin e = ioctl(s, PPPOESETPARMS, &parms);
155 1.2 martin if (e)
156 1.2 martin print_error(ifname, e, "PPPOESETPARMS");
157 1.2 martin return 0;
158 1.2 martin }
159 1.2 martin
160 1.6 martin if (dns1 || dns2) {
161 1.6 martin /* print DNS addresses */
162 1.6 martin int e;
163 1.6 martin struct spppdnsaddrs addrs;
164 1.6 martin memset(&addrs, 0, sizeof addrs);
165 1.6 martin strncpy(addrs.ifname, ifname, sizeof addrs.ifname);
166 1.6 martin e = ioctl(s, SPPPGETDNSADDRS, &addrs);
167 1.6 martin if (e)
168 1.6 martin print_error(ifname, e, "SPPPGETDNSADDRS");
169 1.6 martin if (dns1)
170 1.6 martin printf("%d.%d.%d.%d\n",
171 1.6 martin (addrs.dns[0] >> 24) & 0xff,
172 1.6 martin (addrs.dns[0] >> 16) & 0xff,
173 1.6 martin (addrs.dns[0] >> 8) & 0xff,
174 1.6 martin addrs.dns[0] & 0xff);
175 1.6 martin if (dns2)
176 1.6 martin printf("%d.%d.%d.%d\n",
177 1.6 martin (addrs.dns[1] >> 24) & 0xff,
178 1.6 martin (addrs.dns[1] >> 16) & 0xff,
179 1.6 martin (addrs.dns[1] >> 8) & 0xff,
180 1.6 martin addrs.dns[1] & 0xff);
181 1.6 martin }
182 1.6 martin
183 1.2 martin if (dump) {
184 1.2 martin /* dump PPPoE session state */
185 1.2 martin struct pppoeconnectionstate state;
186 1.2 martin int e;
187 1.2 martin
188 1.2 martin memset(&state, 0, sizeof state);
189 1.2 martin strncpy(state.ifname, ifname, sizeof state.ifname);
190 1.2 martin e = ioctl(s, PPPOEGETSESSION, &state);
191 1.2 martin if (e)
192 1.6 martin print_error(ifname, e, "PPPOEGETSESSION");
193 1.2 martin
194 1.2 martin printf("%s:\tstate = ", ifname);
195 1.2 martin switch(state.state) {
196 1.2 martin case PPPOE_STATE_INITIAL:
197 1.2 martin printf("initial\n"); break;
198 1.2 martin case PPPOE_STATE_PADI_SENT:
199 1.2 martin printf("PADI sent\n"); break;
200 1.2 martin case PPPOE_STATE_PADR_SENT:
201 1.2 martin printf("PADR sent\n"); break;
202 1.2 martin case PPPOE_STATE_SESSION:
203 1.2 martin printf("session\n"); break;
204 1.2 martin case PPPOE_STATE_CLOSING:
205 1.2 martin printf("closing\n"); break;
206 1.1 martin }
207 1.2 martin printf("\tSession ID: 0x%x\n", state.session_id);
208 1.2 martin printf("\tPADI retries: %d\n", state.padi_retry_no);
209 1.2 martin printf("\tPADR retries: %d\n", state.padr_retry_no);
210 1.2 martin
211 1.1 martin return 0;
212 1.1 martin }
213 1.1 martin
214 1.1 martin
215 1.2 martin memset(&spr, 0, sizeof spr);
216 1.2 martin strncpy(spr.ifname, ifname, sizeof spr.ifname);
217 1.2 martin memset(&lcp, 0, sizeof lcp);
218 1.2 martin strncpy(lcp.ifname, ifname, sizeof lcp.ifname);
219 1.2 martin memset(&status, 0, sizeof status);
220 1.2 martin strncpy(status.ifname, ifname, sizeof status.ifname);
221 1.3 martin memset(&timeout, 0, sizeof timeout);
222 1.3 martin strncpy(timeout.ifname, ifname, sizeof timeout.ifname);
223 1.4 martin memset(&authfailstats, 0, sizeof &authfailstats);
224 1.4 martin strncpy(authfailstats.ifname, ifname, sizeof authfailstats.ifname);
225 1.4 martin memset(&authfailset, 0, sizeof authfailset);
226 1.4 martin strncpy(authfailset.ifname, ifname, sizeof authfailset.ifname);
227 1.6 martin memset(&dnssettings, 0, sizeof dnssettings);
228 1.6 martin strncpy(dnssettings.ifname, ifname, sizeof dnssettings.ifname);
229 1.1 martin
230 1.1 martin mib[0] = CTL_KERN;
231 1.1 martin mib[1] = KERN_CLOCKRATE;
232 1.1 martin len = sizeof(clockinfo);
233 1.1 martin if(sysctl(mib, 2, &clockinfo, &len, NULL, 0) == -1)
234 1.1 martin {
235 1.1 martin fprintf(stderr, "error, cannot sysctl kern.clockrate!\n");
236 1.1 martin exit(1);
237 1.1 martin }
238 1.1 martin
239 1.1 martin hz = clockinfo.hz;
240 1.1 martin
241 1.6 martin if (argc == 0 && !(dns1||dns2)) {
242 1.1 martin /* list only mode */
243 1.2 martin
244 1.2 martin /* first pass, get name lenghts */
245 1.2 martin if (ioctl(s, SPPPGETAUTHCFG, &spr) == -1)
246 1.2 martin err(EX_OSERR, "SPPPGETAUTHCFG");
247 1.2 martin /* now allocate buffers for strings */
248 1.2 martin if (spr.myname_length)
249 1.2 martin spr.myname = malloc(spr.myname_length);
250 1.2 martin if (spr.hisname_length)
251 1.2 martin spr.hisname = malloc(spr.hisname_length);
252 1.2 martin /* second pass: get names too */
253 1.2 martin if (ioctl(s, SPPPGETAUTHCFG, &spr) == -1)
254 1.2 martin err(EX_OSERR, "SPPPGETAUTHCFG");
255 1.2 martin
256 1.2 martin if (ioctl(s, SPPPGETLCPCFG, &lcp) == -1)
257 1.2 martin err(EX_OSERR, "SPPPGETLCPCFG");
258 1.2 martin if (ioctl(s, SPPPGETSTATUS, &status) == -1)
259 1.2 martin err(EX_OSERR, "SPPPGETSTATUS");
260 1.3 martin if (ioctl(s, SPPPGETIDLETO, &timeout) == -1)
261 1.3 martin err(EX_OSERR, "SPPPGETIDLETO");
262 1.4 martin if (ioctl(s, SPPPGETAUTHFAILURES, &authfailstats) == -1)
263 1.4 martin err(EX_OSERR, "SPPPGETAUTHFAILURES");
264 1.2 martin
265 1.4 martin print_vals(ifname, status.phase, &spr, lcp.lcp_timeout, timeout.idle_seconds, authfailstats.auth_failures, authfailstats.max_failures);
266 1.2 martin
267 1.2 martin if (spr.hisname) free(spr.hisname);
268 1.2 martin if (spr.myname) free(spr.myname);
269 1.1 martin return 0;
270 1.1 martin }
271 1.1 martin
272 1.1 martin #define startswith(s) strncmp(argv[0], s, (off = strlen(s))) == 0
273 1.1 martin
274 1.1 martin while (argc > 0) {
275 1.1 martin if (startswith("authproto=")) {
276 1.1 martin cp = argv[0] + off;
277 1.1 martin if (strcmp(cp, "pap") == 0)
278 1.2 martin spr.myauth =
279 1.2 martin spr.hisauth = SPPP_AUTHPROTO_PAP;
280 1.1 martin else if (strcmp(cp, "chap") == 0)
281 1.2 martin spr.myauth = spr.hisauth = SPPP_AUTHPROTO_CHAP;
282 1.1 martin else if (strcmp(cp, "none") == 0)
283 1.2 martin spr.myauth = spr.hisauth = SPPP_AUTHPROTO_NONE;
284 1.1 martin else
285 1.1 martin errx(EX_DATAERR, "bad auth proto: %s", cp);
286 1.3 martin set_auth = 1;
287 1.1 martin } else if (startswith("myauthproto=")) {
288 1.1 martin cp = argv[0] + off;
289 1.1 martin if (strcmp(cp, "pap") == 0)
290 1.2 martin spr.myauth = SPPP_AUTHPROTO_PAP;
291 1.1 martin else if (strcmp(cp, "chap") == 0)
292 1.2 martin spr.myauth = SPPP_AUTHPROTO_CHAP;
293 1.1 martin else if (strcmp(cp, "none") == 0)
294 1.2 martin spr.myauth = SPPP_AUTHPROTO_NONE;
295 1.1 martin else
296 1.1 martin errx(EX_DATAERR, "bad auth proto: %s", cp);
297 1.3 martin set_auth = 1;
298 1.2 martin } else if (startswith("myauthname=")) {
299 1.2 martin spr.myname = argv[0] + off;
300 1.2 martin spr.myname_length = strlen(spr.myname)+1;
301 1.3 martin set_auth = 1;
302 1.2 martin } else if (startswith("myauthsecret=") || startswith("myauthkey=")) {
303 1.2 martin spr.mysecret = argv[0] + off;
304 1.2 martin spr.mysecret_length = strlen(spr.mysecret)+1;
305 1.3 martin set_auth = 1;
306 1.2 martin } else if (startswith("hisauthproto=")) {
307 1.1 martin cp = argv[0] + off;
308 1.1 martin if (strcmp(cp, "pap") == 0)
309 1.2 martin spr.hisauth = SPPP_AUTHPROTO_PAP;
310 1.1 martin else if (strcmp(cp, "chap") == 0)
311 1.2 martin spr.hisauth = SPPP_AUTHPROTO_CHAP;
312 1.1 martin else if (strcmp(cp, "none") == 0)
313 1.2 martin spr.hisauth = SPPP_AUTHPROTO_NONE;
314 1.1 martin else
315 1.1 martin errx(EX_DATAERR, "bad auth proto: %s", cp);
316 1.3 martin set_auth = 1;
317 1.2 martin } else if (startswith("hisauthname=")) {
318 1.2 martin spr.hisname = argv[0] + off;
319 1.2 martin spr.hisname_length = strlen(spr.hisname)+1;
320 1.3 martin set_auth = 1;
321 1.2 martin } else if (startswith("hisauthsecret=") || startswith("hisauthkey=")) {
322 1.2 martin spr.hissecret = argv[0] + off;
323 1.2 martin spr.hissecret_length = strlen(spr.hissecret)+1;
324 1.3 martin set_auth = 1;
325 1.2 martin } else if (strcmp(argv[0], "callin") == 0)
326 1.2 martin spr.hisauthflags |= SPPP_AUTHFLAG_NOCALLOUT;
327 1.1 martin else if (strcmp(argv[0], "always") == 0)
328 1.2 martin spr.hisauthflags &= ~SPPP_AUTHFLAG_NOCALLOUT;
329 1.1 martin else if (strcmp(argv[0], "norechallenge") == 0)
330 1.2 martin spr.hisauthflags |= SPPP_AUTHFLAG_NORECHALLENGE;
331 1.1 martin else if (strcmp(argv[0], "rechallenge") == 0)
332 1.2 martin spr.hisauthflags &= ~SPPP_AUTHFLAG_NORECHALLENGE;
333 1.1 martin #ifndef __NetBSD__
334 1.1 martin else if (strcmp(argv[0], "enable-vj") == 0)
335 1.1 martin spr.defs.enable_vj = 1;
336 1.1 martin else if (strcmp(argv[0], "disable-vj") == 0)
337 1.1 martin spr.defs.enable_vj = 0;
338 1.1 martin #endif
339 1.1 martin else if (startswith("lcp-timeout=")) {
340 1.1 martin int timeout_arg = atoi(argv[0]+off);
341 1.1 martin if ((timeout_arg > 20000) || (timeout_arg <= 0))
342 1.1 martin errx(EX_DATAERR, "bad lcp timeout value: %s",
343 1.1 martin argv[0]+off);
344 1.2 martin lcp.lcp_timeout = timeout_arg * hz / 1000;
345 1.2 martin set_lcp = 1;
346 1.3 martin } else if (startswith("idle-timeout=")) {
347 1.4 martin timeout.idle_seconds = (time_t)atol(argv[0]+off);
348 1.3 martin set_idle_to = 1;
349 1.4 martin } else if (startswith("max-auth-failure=")) {
350 1.4 martin authfailset.max_failures = atoi(argv[0]+off);
351 1.4 martin set_auth_failure = 1;
352 1.9 martin } else if (strcmp(argv[0], "clear-auth-failure") == 0) {
353 1.9 martin clear_auth_failure_count = 1;
354 1.6 martin } else if (startswith("query-dns=")) {
355 1.6 martin dnssettings.query_dns = atoi(argv[0]+off);
356 1.6 martin set_dns = 1;
357 1.1 martin } else
358 1.1 martin errx(EX_DATAERR, "bad parameter: \"%s\"", argv[0]);
359 1.1 martin
360 1.1 martin argv++;
361 1.1 martin argc--;
362 1.1 martin }
363 1.1 martin
364 1.3 martin if (set_auth) {
365 1.3 martin if (ioctl(s, SPPPSETAUTHCFG, &spr) == -1)
366 1.3 martin err(EX_OSERR, "SPPPSETAUTHCFG");
367 1.3 martin }
368 1.2 martin if (set_lcp) {
369 1.2 martin if (ioctl(s, SPPPSETLCPCFG, &lcp) == -1)
370 1.2 martin err(EX_OSERR, "SPPPSETLCPCFG");
371 1.2 martin }
372 1.3 martin if (set_idle_to) {
373 1.3 martin if (ioctl(s, SPPPSETIDLETO, &timeout) == -1)
374 1.3 martin err(EX_OSERR, "SPPPSETIDLETO");
375 1.3 martin }
376 1.4 martin if (set_auth_failure) {
377 1.9 martin if (ioctl(s, SPPPSETAUTHFAILURE, &authfailset) == -1)
378 1.9 martin err(EX_OSERR, "SPPPSETAUTHFAILURE");
379 1.9 martin }
380 1.9 martin if (clear_auth_failure_count && !(set_auth || set_auth_failure)) {
381 1.9 martin /*
382 1.9 martin * We want to clear the auth failure count, but did not
383 1.9 martin * do that implicitly by setting authentication - so
384 1.9 martin * do a zero-effect auth setting change
385 1.9 martin */
386 1.9 martin if (ioctl(s, SPPPGETAUTHFAILURES, &authfailstats) == -1)
387 1.9 martin err(EX_OSERR, "SPPPGETAUTHFAILURES");
388 1.9 martin authfailset.max_failures = authfailstats.max_failures;
389 1.4 martin if (ioctl(s, SPPPSETAUTHFAILURE, &authfailset) == -1)
390 1.4 martin err(EX_OSERR, "SPPPSETAUTHFAILURE");
391 1.4 martin }
392 1.6 martin if (set_dns) {
393 1.6 martin if (ioctl(s, SPPPSETDNSOPTS, &dnssettings) == -1)
394 1.6 martin err(EX_OSERR, "SPPPSETDNSOPTS");
395 1.6 martin }
396 1.1 martin
397 1.4 martin if (verbose) {
398 1.4 martin if (ioctl(s, SPPPGETAUTHFAILURES, &authfailstats) == -1)
399 1.4 martin err(EX_OSERR, "SPPPGETAUTHFAILURES");
400 1.4 martin print_vals(ifname, status.phase, &spr, lcp.lcp_timeout, timeout.idle_seconds, authfailstats.auth_failures, authfailstats.max_failures);
401 1.4 martin }
402 1.1 martin
403 1.1 martin return 0;
404 1.1 martin }
405 1.1 martin
406 1.1 martin static void
407 1.1 martin usage(void)
408 1.1 martin {
409 1.5 martin const char * prog = getprogname();
410 1.5 martin fprintf(stderr,
411 1.5 martin "usage:\n"
412 1.5 martin " %s [-v] ifname [{my|his}auth{proto|name|secret}=...] \\\n"
413 1.5 martin " [callin] [always] [{no}rechallenge]\n"
414 1.6 martin " [query-dns=3]\n"
415 1.5 martin " to set authentication names, passwords\n"
416 1.5 martin " and (optional) paramaters\n"
417 1.5 martin " %s [-v] ifname lcp-timeout=ms|idle-timeout=s|max-auth-failure=count\n"
418 1.5 martin " to set general parameters\n"
419 1.5 martin " or\n"
420 1.5 martin " %s -e ethernet-ifname ifname\n"
421 1.5 martin " to connect an ethernet interface for PPPoE\n"
422 1.5 martin " %s [-a access-concentrator-name] [-s service-name] ifname\n"
423 1.5 martin " to specify (optional) data for PPPoE sessions\n"
424 1.5 martin " %s -d ifname\n"
425 1.5 martin " to dump the current PPPoE session state\n"
426 1.7 itojun " %s -n (1|2) ifname\n"
427 1.6 martin " to print DNS addresses retrieved via query-dns\n"
428 1.6 martin , prog, prog, prog, prog, prog, prog);
429 1.1 martin exit(EX_USAGE);
430 1.1 martin }
431 1.1 martin
432 1.2 martin static void
433 1.4 martin print_vals(const char *ifname, int phase, struct spppauthcfg *sp, int lcp_timeout,
434 1.4 martin time_t idle_timeout, int authfailures, int max_auth_failures)
435 1.1 martin {
436 1.1 martin #ifndef __NetBSD__
437 1.1 martin time_t send, recv;
438 1.1 martin #endif
439 1.1 martin
440 1.2 martin printf("%s:\tphase=%s\n", ifname, phase_name(phase));
441 1.2 martin if (sp->myauth) {
442 1.2 martin printf("\tmyauthproto=%s myauthname=\"%s\"\n",
443 1.2 martin proto_name(sp->myauth),
444 1.2 martin sp->myname);
445 1.2 martin }
446 1.2 martin if (sp->hisauth) {
447 1.2 martin printf("\thisauthproto=%s hisauthname=\"%s\"%s\n",
448 1.2 martin proto_name(sp->hisauth),
449 1.2 martin sp->hisname,
450 1.2 martin authflags(sp->hisauthflags));
451 1.1 martin }
452 1.1 martin #ifndef __NetBSD__
453 1.1 martin if (sp->defs.pp_phase > PHASE_DEAD) {
454 1.1 martin send = time(NULL) - sp->defs.pp_last_sent;
455 1.1 martin recv = time(NULL) - sp->defs.pp_last_recv;
456 1.1 martin printf("\tidle_time=%ld\n", (send<recv)? send : recv);
457 1.1 martin }
458 1.1 martin #endif
459 1.2 martin
460 1.1 martin printf("\tlcp timeout: %.3f s\n",
461 1.2 martin (double)lcp_timeout / hz);
462 1.3 martin
463 1.3 martin if (idle_timeout != 0)
464 1.3 martin printf("\tidle timeout = %lu s\n", (unsigned long)idle_timeout);
465 1.3 martin else
466 1.3 martin printf("\tidle timeout = disabled\n");
467 1.2 martin
468 1.4 martin if (authfailures != 0)
469 1.4 martin printf("\tauthentication failures = %d\n", authfailures);
470 1.4 martin printf("\tmax-auth-failure = %d\n", max_auth_failures);
471 1.4 martin
472 1.1 martin #ifndef __NetBSD__
473 1.1 martin printf("\tenable_vj: %s\n",
474 1.1 martin sp->defs.enable_vj ? "on" : "off");
475 1.1 martin #endif
476 1.1 martin }
477 1.1 martin
478 1.1 martin const char *
479 1.2 martin phase_name(int phase)
480 1.1 martin {
481 1.1 martin switch (phase) {
482 1.2 martin case SPPP_PHASE_DEAD: return "dead";
483 1.2 martin case SPPP_PHASE_ESTABLISH: return "establish";
484 1.2 martin case SPPP_PHASE_TERMINATE: return "terminate";
485 1.2 martin case SPPP_PHASE_AUTHENTICATE: return "authenticate";
486 1.2 martin case SPPP_PHASE_NETWORK: return "network";
487 1.1 martin }
488 1.1 martin return "illegal";
489 1.1 martin }
490 1.1 martin
491 1.1 martin const char *
492 1.2 martin proto_name(int proto)
493 1.1 martin {
494 1.1 martin static char buf[12];
495 1.1 martin switch (proto) {
496 1.2 martin case SPPP_AUTHPROTO_PAP: return "pap";
497 1.2 martin case SPPP_AUTHPROTO_CHAP: return "chap";
498 1.2 martin case SPPP_AUTHPROTO_NONE: return "none";
499 1.1 martin }
500 1.1 martin sprintf(buf, "0x%x", (unsigned)proto);
501 1.1 martin return buf;
502 1.1 martin }
503 1.1 martin
504 1.1 martin const char *
505 1.2 martin authflags(int flags)
506 1.1 martin {
507 1.1 martin static char buf[32];
508 1.1 martin buf[0] = '\0';
509 1.2 martin if (flags & SPPP_AUTHFLAG_NOCALLOUT)
510 1.1 martin strcat(buf, " callin");
511 1.2 martin if (flags & SPPP_AUTHFLAG_NORECHALLENGE)
512 1.1 martin strcat(buf, " norechallenge");
513 1.1 martin return buf;
514 1.1 martin }
515 1.2 martin
516 1.2 martin static void
517 1.2 martin print_error(const char *ifname, int error, const char * str)
518 1.2 martin {
519 1.2 martin if (error == -1)
520 1.2 martin fprintf(stderr, "%s: interface not found\n", ifname);
521 1.2 martin else
522 1.2 martin fprintf(stderr, "%s: %s: %s\n", ifname, str, strerror(error));
523 1.2 martin exit(EX_DATAERR);
524 1.2 martin }
525 1.2 martin
526 1.2 martin
527