ldp_command.c revision 1.3 1 1.3 kefren /* $NetBSD: ldp_command.c,v 1.3 2010/12/30 11:29:21 kefren Exp $ */
2 1.1 kefren
3 1.1 kefren /*-
4 1.1 kefren * Copyright (c) 2010 The NetBSD Foundation, Inc.
5 1.1 kefren * All rights reserved.
6 1.1 kefren *
7 1.1 kefren * This code is derived from software contributed to The NetBSD Foundation
8 1.1 kefren * by Mihai Chelaru <kefren (at) NetBSD.org>
9 1.1 kefren *
10 1.1 kefren * Redistribution and use in source and binary forms, with or without
11 1.1 kefren * modification, are permitted provided that the following conditions
12 1.1 kefren * are met:
13 1.1 kefren * 1. Redistributions of source code must retain the above copyright
14 1.1 kefren * notice, this list of conditions and the following disclaimer.
15 1.1 kefren * 2. Redistributions in binary form must reproduce the above copyright
16 1.1 kefren * notice, this list of conditions and the following disclaimer in the
17 1.1 kefren * documentation and/or other materials provided with the distribution.
18 1.1 kefren *
19 1.1 kefren * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20 1.1 kefren * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21 1.1 kefren * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22 1.1 kefren * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23 1.1 kefren * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24 1.1 kefren * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25 1.1 kefren * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26 1.1 kefren * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27 1.1 kefren * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28 1.1 kefren * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29 1.1 kefren * POSSIBILITY OF SUCH DAMAGE.
30 1.1 kefren */
31 1.1 kefren
32 1.1 kefren #include <arpa/inet.h>
33 1.1 kefren
34 1.1 kefren #include <netinet/in.h>
35 1.1 kefren
36 1.1 kefren #include <sys/socket.h>
37 1.1 kefren #include <sys/queue.h>
38 1.1 kefren
39 1.1 kefren #include <errno.h>
40 1.1 kefren #include <pwd.h>
41 1.1 kefren #include <stdio.h>
42 1.1 kefren #include <stdlib.h>
43 1.1 kefren #include <string.h>
44 1.1 kefren #include <unistd.h>
45 1.1 kefren
46 1.1 kefren #include "label.h"
47 1.1 kefren #include "ldp.h"
48 1.1 kefren #include "ldp_command.h"
49 1.1 kefren #include "ldp_errors.h"
50 1.1 kefren #include "ldp_peer.h"
51 1.1 kefren #include "socketops.h"
52 1.1 kefren
53 1.1 kefren struct com_sock csockets[MAX_COMMAND_SOCKETS];
54 1.3 kefren extern int ldp_hello_time, ldp_keepalive_time, ldp_holddown_time,
55 1.3 kefren min_label, max_label, debug_f, warn_f;
56 1.1 kefren
57 1.1 kefren #define writestr(soc, str) write(soc, str, strlen(str))
58 1.1 kefren
59 1.1 kefren #define MAXSEND 1024
60 1.1 kefren char sendspace[MAXSEND];
61 1.1 kefren
62 1.1 kefren static int verify_root_pwd(char *);
63 1.1 kefren static void echo_on(int s);
64 1.1 kefren static void echo_off(int s);
65 1.1 kefren
66 1.3 kefren static struct com_func main_commands[] = {
67 1.1 kefren { "show", show_func },
68 1.1 kefren { "set", set_func },
69 1.1 kefren { "quit", exit_func },
70 1.1 kefren { "exit", exit_func },
71 1.1 kefren { "", NULL }
72 1.1 kefren };
73 1.1 kefren
74 1.3 kefren static struct com_func show_commands[] = {
75 1.1 kefren { "neighbours", show_neighbours },
76 1.1 kefren { "bindings", show_bindings },
77 1.1 kefren { "debug", show_debug },
78 1.1 kefren { "hellos", show_hellos },
79 1.1 kefren { "parameters", show_parameters },
80 1.1 kefren { "version", show_version },
81 1.1 kefren { "warning", show_warning },
82 1.1 kefren { "", NULL }
83 1.1 kefren };
84 1.1 kefren
85 1.1 kefren struct com_func set_commands[] = {
86 1.1 kefren { "debug", set_debug },
87 1.1 kefren { "hello-time", set_hello_time },
88 1.1 kefren { "warning", set_warning },
89 1.1 kefren { "", NULL }
90 1.1 kefren };
91 1.1 kefren
92 1.1 kefren int
93 1.1 kefren verify_root_pwd(char *pw)
94 1.1 kefren {
95 1.1 kefren struct passwd *p;
96 1.1 kefren
97 1.1 kefren if ((p = getpwuid(0)) == NULL)
98 1.1 kefren return 0;
99 1.1 kefren
100 1.1 kefren if (strcmp(crypt(pw, p->pw_passwd), p->pw_passwd))
101 1.1 kefren return 0;
102 1.1 kefren
103 1.1 kefren return 1;
104 1.1 kefren }
105 1.1 kefren
106 1.1 kefren
107 1.1 kefren void
108 1.1 kefren init_command_sockets()
109 1.1 kefren {
110 1.1 kefren int i;
111 1.1 kefren
112 1.1 kefren for (i = 0; i<MAX_COMMAND_SOCKETS; i++) {
113 1.1 kefren csockets[i].socket = -1;
114 1.1 kefren csockets[i].auth = 0;
115 1.1 kefren }
116 1.1 kefren }
117 1.1 kefren
118 1.1 kefren int
119 1.1 kefren create_command_socket(int port)
120 1.1 kefren {
121 1.1 kefren struct sockaddr_in sin;
122 1.1 kefren int s;
123 1.1 kefren
124 1.1 kefren sin.sin_len = sizeof(sin);
125 1.1 kefren sin.sin_family = AF_INET;
126 1.1 kefren sin.sin_port = htons(port);
127 1.1 kefren sin.sin_addr.s_addr = ntohl(INADDR_LOOPBACK);
128 1.1 kefren
129 1.1 kefren s = socket(PF_INET, SOCK_STREAM, 6);
130 1.1 kefren if (s < 0)
131 1.1 kefren return s;
132 1.1 kefren
133 1.1 kefren if (bind(s, (struct sockaddr *) &sin, sizeof(sin))) {
134 1.1 kefren fatalp("bind: %s", strerror(errno));
135 1.1 kefren close(s);
136 1.1 kefren return -1;
137 1.1 kefren }
138 1.1 kefren
139 1.1 kefren if (listen(s, 5) == -1) {
140 1.1 kefren fatalp("listen: %s", strerror(errno));
141 1.1 kefren close(s);
142 1.1 kefren return -1;
143 1.1 kefren }
144 1.1 kefren return s;
145 1.1 kefren }
146 1.1 kefren
147 1.1 kefren void
148 1.1 kefren command_accept(int s)
149 1.1 kefren {
150 1.1 kefren int as = accept(s, NULL, 0);
151 1.1 kefren
152 1.1 kefren if (as < 0) {
153 1.1 kefren fatalp("Cannot accept new command socket %s",
154 1.1 kefren strerror(errno));
155 1.1 kefren return;
156 1.1 kefren }
157 1.1 kefren
158 1.1 kefren if (add_command_socket(as) != 0) {
159 1.1 kefren fatalp("Cannot accept command. Too many connections\n");
160 1.1 kefren close(as);
161 1.1 kefren return;
162 1.1 kefren }
163 1.1 kefren
164 1.1 kefren /* auth */
165 1.1 kefren send_pwd_prompt(as);
166 1.1 kefren }
167 1.1 kefren
168 1.1 kefren struct com_sock *
169 1.1 kefren is_command_socket(int s)
170 1.1 kefren {
171 1.1 kefren int i;
172 1.1 kefren
173 1.1 kefren if (s == -1)
174 1.1 kefren return NULL;
175 1.1 kefren for (i=0; i<MAX_COMMAND_SOCKETS; i++)
176 1.1 kefren if (s == csockets[i].socket)
177 1.1 kefren return &csockets[i];
178 1.1 kefren return NULL;
179 1.1 kefren }
180 1.1 kefren
181 1.1 kefren int
182 1.1 kefren add_command_socket(int s)
183 1.1 kefren {
184 1.1 kefren int i;
185 1.1 kefren
186 1.1 kefren for (i=0; i<MAX_COMMAND_SOCKETS; i++)
187 1.1 kefren if (csockets[i].socket == -1) {
188 1.1 kefren csockets[i].socket = s;
189 1.1 kefren csockets[i].auth = 0;
190 1.1 kefren return 0;
191 1.1 kefren }
192 1.1 kefren return -1;
193 1.1 kefren }
194 1.1 kefren
195 1.1 kefren void
196 1.1 kefren command_dispatch(struct com_sock *cs)
197 1.1 kefren {
198 1.1 kefren char recvspace[MAX_COMMAND_SIZE + 1];
199 1.1 kefren char *nextc = recvspace;
200 1.1 kefren int r = recv(cs->socket, recvspace, MAX_COMMAND_SIZE, MSG_PEEK);
201 1.1 kefren
202 1.1 kefren if (r < 0) {
203 1.1 kefren command_close(cs->socket);
204 1.1 kefren return;
205 1.1 kefren }
206 1.1 kefren
207 1.1 kefren recv(cs->socket, recvspace, r, MSG_WAITALL);
208 1.1 kefren
209 1.1 kefren if (r < 3) { /*at least \r\n */
210 1.1 kefren if (cs->auth) {
211 1.1 kefren /*writestr(cs->socket, "Unknown command. Use ? for help\n");*/
212 1.1 kefren send_prompt(cs->socket);
213 1.1 kefren } else {
214 1.1 kefren writestr(cs->socket, "Bad password\n");
215 1.1 kefren command_close(cs->socket);
216 1.1 kefren }
217 1.1 kefren return;
218 1.1 kefren }
219 1.1 kefren
220 1.1 kefren recvspace[r - 2] = '\0';
221 1.1 kefren
222 1.1 kefren if (!cs->auth) {
223 1.1 kefren if (verify_root_pwd(recvspace)) {
224 1.1 kefren echo_on(cs->socket);
225 1.1 kefren cs->auth = 1;
226 1.1 kefren writestr(cs->socket, "\n");
227 1.1 kefren send_prompt(cs->socket);
228 1.1 kefren } else {
229 1.1 kefren echo_on(cs->socket);
230 1.1 kefren writestr(cs->socket, "Bad password\n");
231 1.1 kefren command_close(cs->socket);
232 1.1 kefren }
233 1.1 kefren return;
234 1.1 kefren }
235 1.1 kefren
236 1.1 kefren strsep(&nextc, " ");
237 1.1 kefren
238 1.1 kefren command_match(main_commands, cs->socket, recvspace, nextc);
239 1.1 kefren
240 1.1 kefren }
241 1.1 kefren
242 1.1 kefren void
243 1.1 kefren command_close(int s)
244 1.1 kefren {
245 1.1 kefren int i;
246 1.1 kefren
247 1.1 kefren for (i=0; i<MAX_COMMAND_SOCKETS; i++)
248 1.1 kefren if (s == csockets[i].socket) {
249 1.1 kefren close(s);
250 1.1 kefren csockets[i].socket = -1;
251 1.1 kefren csockets[i].auth = 0;
252 1.1 kefren break;
253 1.1 kefren }
254 1.1 kefren }
255 1.1 kefren
256 1.1 kefren void
257 1.1 kefren send_prompt(int s) {
258 1.1 kefren writestr(s, "LDP> ");
259 1.1 kefren }
260 1.1 kefren
261 1.1 kefren void
262 1.1 kefren send_pwd_prompt(int s) {
263 1.1 kefren echo_off(s);
264 1.1 kefren writestr(s, "Password: ");
265 1.1 kefren }
266 1.1 kefren
267 1.1 kefren static void echo_off(int s)
268 1.1 kefren {
269 1.1 kefren char iac_will_echo[3] = { 0xff, 0xfb, 0x01 }, bf[32];
270 1.1 kefren write(s, iac_will_echo, sizeof(iac_will_echo));
271 1.1 kefren read(s, bf, sizeof(bf));
272 1.1 kefren }
273 1.1 kefren
274 1.1 kefren static void echo_on(int s)
275 1.1 kefren {
276 1.1 kefren char iac_wont_echo[3] = { 0xff, 0xfc, 0x01 }, bf[32];
277 1.1 kefren write(s, iac_wont_echo, sizeof(iac_wont_echo));
278 1.1 kefren read(s, bf, sizeof(bf));
279 1.1 kefren }
280 1.1 kefren
281 1.1 kefren /*
282 1.1 kefren * Matching function
283 1.1 kefren * Returns 1 if matched anything
284 1.1 kefren */
285 1.1 kefren int
286 1.1 kefren command_match(struct com_func *cf, int s, char *orig, char *next)
287 1.1 kefren {
288 1.2 christos size_t i, len;
289 1.2 christos int last_match = -1;
290 1.2 christos const char *msg = NULL;
291 1.1 kefren
292 1.2 christos if (orig == NULL || orig[0] == '\0')
293 1.2 christos goto out;
294 1.1 kefren
295 1.1 kefren if (!strcmp(orig, "?")) {
296 1.2 christos for (i = 0; cf[i].func != NULL; i++) {
297 1.1 kefren snprintf(sendspace, MAXSEND, "\t%s\n", cf[i].com);
298 1.1 kefren writestr(s, sendspace);
299 1.1 kefren }
300 1.2 christos goto out;
301 1.1 kefren }
302 1.1 kefren
303 1.2 christos len = strlen(orig);
304 1.2 christos for (i = 0; cf[i].func != NULL; i++) {
305 1.2 christos if (strncasecmp(orig, cf[i].com, len) == 0) {
306 1.2 christos if (last_match != -1) {
307 1.2 christos msg = "Ambiguous";
308 1.2 christos goto out;
309 1.2 christos } else
310 1.2 christos last_match = i;
311 1.1 kefren }
312 1.1 kefren }
313 1.1 kefren
314 1.2 christos if (last_match == -1) {
315 1.2 christos msg = "Unknown";
316 1.2 christos goto out;
317 1.1 kefren }
318 1.1 kefren
319 1.2 christos if (cf[last_match].func(s, next) != 0)
320 1.1 kefren send_prompt(s);
321 1.1 kefren return 1;
322 1.2 christos out:
323 1.2 christos if (msg) {
324 1.2 christos writestr(s, msg);
325 1.2 christos writestr(s, " command. Use ? for help\n");
326 1.2 christos }
327 1.2 christos send_prompt(s);
328 1.2 christos return 0;
329 1.1 kefren }
330 1.1 kefren
331 1.1 kefren /*
332 1.1 kefren * Main CLI functions
333 1.1 kefren */
334 1.1 kefren int
335 1.1 kefren set_func(int s, char *recvspace)
336 1.1 kefren {
337 1.1 kefren char *nextc = recvspace;
338 1.1 kefren
339 1.1 kefren if (recvspace == NULL || recvspace[0] == '\0') {
340 1.1 kefren writestr(s, "Unknown set command. Use set ? for help\n");
341 1.1 kefren return 1;
342 1.1 kefren }
343 1.1 kefren
344 1.1 kefren strsep(&nextc, " ");
345 1.1 kefren
346 1.1 kefren command_match(set_commands, s, recvspace, nextc);
347 1.1 kefren return 0;
348 1.1 kefren }
349 1.1 kefren
350 1.1 kefren int
351 1.1 kefren show_func(int s, char *recvspace)
352 1.1 kefren {
353 1.1 kefren char *nextc = recvspace;
354 1.1 kefren
355 1.1 kefren if (recvspace == NULL || recvspace[0] == '\0') {
356 1.1 kefren writestr(s, "Unknown show command. Use show ? for help\n");
357 1.1 kefren return 1;
358 1.1 kefren }
359 1.1 kefren
360 1.1 kefren strsep(&nextc, " ");
361 1.1 kefren
362 1.1 kefren command_match(show_commands, s, recvspace, nextc);
363 1.1 kefren return 0;
364 1.1 kefren }
365 1.1 kefren
366 1.1 kefren int
367 1.1 kefren exit_func(int s, char *recvspace)
368 1.1 kefren {
369 1.1 kefren command_close(s);
370 1.1 kefren return 0;
371 1.1 kefren }
372 1.1 kefren
373 1.1 kefren /*
374 1.1 kefren * Show functions
375 1.1 kefren */
376 1.1 kefren int
377 1.1 kefren show_neighbours(int s, char *recvspace)
378 1.1 kefren {
379 1.1 kefren struct ldp_peer *p;
380 1.1 kefren struct ldp_peer_address *wp;
381 1.1 kefren struct sockaddr_in ssin;
382 1.1 kefren socklen_t sin_len = sizeof(struct sockaddr_in);
383 1.1 kefren
384 1.1 kefren SLIST_FOREACH(p, &ldp_peer_head, peers) {
385 1.1 kefren snprintf(sendspace, MAXSEND, "LDP peer: %s\n",
386 1.1 kefren inet_ntoa(p->ldp_id));
387 1.1 kefren writestr(s, sendspace);
388 1.1 kefren snprintf(sendspace, MAXSEND, "Transport address: %s\n",
389 1.1 kefren inet_ntoa(p->transport_address));
390 1.1 kefren writestr(s, sendspace);
391 1.1 kefren snprintf(sendspace, MAXSEND, "Next-hop address: %s\n",
392 1.1 kefren inet_ntoa(p->address));
393 1.1 kefren writestr(s, sendspace);
394 1.1 kefren snprintf(sendspace, MAXSEND, "State: %s\n",
395 1.1 kefren ldp_state_to_name(p->state));
396 1.1 kefren writestr(s, sendspace);
397 1.1 kefren if (p->state == LDP_PEER_ESTABLISHED) {
398 1.1 kefren snprintf(sendspace, MAXSEND, "Since: %s",
399 1.1 kefren ctime(&p->established_t));
400 1.1 kefren writestr(s, sendspace);
401 1.1 kefren }
402 1.1 kefren snprintf(sendspace, MAXSEND, "Holdtime: %d\nTimeout: %d\n",
403 1.1 kefren p->holdtime, p->timeout);
404 1.1 kefren writestr(s, sendspace);
405 1.1 kefren
406 1.1 kefren switch(p->state) {
407 1.1 kefren case LDP_PEER_CONNECTING:
408 1.1 kefren case LDP_PEER_CONNECTED:
409 1.1 kefren case LDP_PEER_ESTABLISHED:
410 1.1 kefren if (getsockname(p->socket,(struct sockaddr *) &ssin,
411 1.1 kefren &sin_len))
412 1.1 kefren break;
413 1.1 kefren snprintf(sendspace, MAXSEND,"Socket: %d\nLocal %s:%d\n",
414 1.1 kefren p->socket, inet_ntoa(ssin.sin_addr),
415 1.1 kefren ntohs(ssin.sin_port));
416 1.1 kefren writestr(s, sendspace);
417 1.1 kefren
418 1.1 kefren if (getpeername(p->socket,(struct sockaddr *) &ssin,
419 1.1 kefren &sin_len))
420 1.1 kefren break;
421 1.1 kefren snprintf(sendspace, MAXSEND, "Remote %s:%d\n",
422 1.1 kefren inet_ntoa(ssin.sin_addr), ntohs(ssin.sin_port));
423 1.1 kefren writestr(s, sendspace);
424 1.1 kefren }
425 1.1 kefren
426 1.1 kefren snprintf(sendspace, MAXSEND,"Addresses bounded to this peer: ");
427 1.1 kefren writestr(s, sendspace);
428 1.1 kefren SLIST_FOREACH(wp, &p->ldp_peer_address_head, addresses) {
429 1.1 kefren snprintf(sendspace, MAXSEND, "%s ",
430 1.1 kefren inet_ntoa(wp->address));
431 1.1 kefren writestr(s, sendspace);
432 1.1 kefren }
433 1.1 kefren sendspace[0] = sendspace[1] = '\n';
434 1.1 kefren write(s, sendspace, 2);
435 1.1 kefren }
436 1.1 kefren return 1;
437 1.1 kefren }
438 1.1 kefren
439 1.1 kefren int
440 1.1 kefren show_bindings(int s, char *recvspace)
441 1.1 kefren {
442 1.1 kefren struct label *l;
443 1.1 kefren
444 1.1 kefren snprintf(sendspace, MAXSEND, "Local label\tNetwork\t\t\t\tNexthop\n");
445 1.1 kefren writestr(s, sendspace);
446 1.1 kefren SLIST_FOREACH (l, &label_head, labels) {
447 1.1 kefren snprintf(sendspace, MAXSEND, "%d\t\t%s/", l->binding,
448 1.1 kefren union_ntoa(&l->so_dest));
449 1.1 kefren writestr(s, sendspace);
450 1.1 kefren snprintf(sendspace, MAXSEND, "%s", union_ntoa(&l->so_pref));
451 1.1 kefren writestr(s, sendspace);
452 1.1 kefren if (l->p)
453 1.1 kefren snprintf(sendspace, MAXSEND, "\t%s:%d\n",
454 1.1 kefren inet_ntoa(l->p->address), l->label);
455 1.1 kefren else
456 1.1 kefren snprintf(sendspace, MAXSEND, "\n");
457 1.1 kefren writestr(s, sendspace);
458 1.1 kefren }
459 1.1 kefren return 1;
460 1.1 kefren }
461 1.1 kefren
462 1.1 kefren int
463 1.1 kefren show_debug(int s, char *recvspace)
464 1.1 kefren {
465 1.1 kefren if (recvspace) {
466 1.1 kefren writestr(s, "Invalid command\n");
467 1.1 kefren return 1;
468 1.1 kefren }
469 1.1 kefren
470 1.1 kefren snprintf(sendspace, MAXSEND, "Debug: %s\n",
471 1.1 kefren debug_f ? "YES" : "NO");
472 1.1 kefren writestr(s, sendspace);
473 1.1 kefren return 1;
474 1.1 kefren }
475 1.1 kefren
476 1.1 kefren int
477 1.1 kefren show_hellos(int s, char *recvspace)
478 1.1 kefren {
479 1.1 kefren struct hello_info *hi;
480 1.1 kefren
481 1.1 kefren SLIST_FOREACH(hi, &hello_info_head, infos) {
482 1.1 kefren snprintf(sendspace, MAXSEND, "%s: %ds\n", inet_ntoa(hi->ldp_id),
483 1.1 kefren hi->keepalive);
484 1.1 kefren writestr(s, sendspace);
485 1.1 kefren }
486 1.1 kefren return 1;
487 1.1 kefren }
488 1.1 kefren
489 1.1 kefren int
490 1.1 kefren show_parameters(int s, char *recvspace)
491 1.1 kefren {
492 1.1 kefren snprintf(sendspace, MAXSEND, "LDP ID: %s\nProtocol version: %d\n"
493 1.1 kefren "Hello time: %d\nKeepalive time: %d\nHoldtime: %d\n"
494 1.1 kefren "Minimum label: %d\nMaximum label: %d\n",
495 1.1 kefren my_ldp_id,
496 1.1 kefren LDP_VERSION,
497 1.1 kefren ldp_hello_time,
498 1.3 kefren ldp_keepalive_time,
499 1.3 kefren ldp_holddown_time,
500 1.3 kefren min_label,
501 1.3 kefren max_label);
502 1.1 kefren writestr(s, sendspace);
503 1.1 kefren return 1;
504 1.1 kefren }
505 1.1 kefren
506 1.1 kefren int
507 1.1 kefren show_version(int s, char *recvspace)
508 1.1 kefren {
509 1.1 kefren if (recvspace) { /* Nothing more after this */
510 1.1 kefren writestr(s, "Invalid command\n");
511 1.1 kefren return 1;
512 1.1 kefren }
513 1.1 kefren
514 1.1 kefren snprintf(sendspace, MAXSEND, "NetBSD LDP daemon version: %s\n",
515 1.1 kefren LDPD_VER);
516 1.1 kefren writestr(s, sendspace);
517 1.1 kefren return 1;
518 1.1 kefren }
519 1.1 kefren
520 1.1 kefren int
521 1.1 kefren show_warning(int s, char *recvspace)
522 1.1 kefren {
523 1.1 kefren if (recvspace) {
524 1.1 kefren writestr(s, "Invalid command\n");
525 1.1 kefren return 1;
526 1.1 kefren }
527 1.1 kefren
528 1.1 kefren snprintf(sendspace, MAXSEND, "Warnings: %s\n",
529 1.1 kefren warn_f ? "YES" : "NO");
530 1.1 kefren writestr(s, sendspace);
531 1.1 kefren return 1;
532 1.1 kefren }
533 1.1 kefren
534 1.1 kefren /* Set commands */
535 1.1 kefren int
536 1.1 kefren set_hello_time(int s, char *recvspace)
537 1.1 kefren {
538 1.1 kefren if (!recvspace || atoi(recvspace) < 1) {
539 1.1 kefren writestr(s, "Invalid timeout\n");
540 1.1 kefren return 1;
541 1.1 kefren }
542 1.1 kefren
543 1.1 kefren ldp_hello_time = atoi(recvspace);
544 1.1 kefren return 1;
545 1.1 kefren }
546 1.1 kefren
547 1.1 kefren int
548 1.1 kefren set_debug(int s, char *recvspace)
549 1.1 kefren {
550 1.1 kefren if (!recvspace || atoi(recvspace) < 0) {
551 1.1 kefren writestr(s, "Invalid command\n");
552 1.1 kefren return 1;
553 1.1 kefren }
554 1.1 kefren
555 1.1 kefren debug_f = atoi(recvspace);
556 1.1 kefren return 1;
557 1.1 kefren }
558 1.1 kefren
559 1.1 kefren int
560 1.1 kefren set_warning(int s, char *recvspace)
561 1.1 kefren {
562 1.1 kefren if (!recvspace || atoi(recvspace) < 0) {
563 1.1 kefren writestr(s, "Invalid command\n");
564 1.1 kefren return 1;
565 1.1 kefren }
566 1.1 kefren
567 1.1 kefren warn_f = atoi(recvspace);
568 1.1 kefren return 1;
569 1.1 kefren }
570