ldp_command.c revision 1.4 1 1.4 kefren /* $NetBSD: ldp_command.c,v 1.4 2010/12/31 11:29:33 kefren Exp $ */
2 1.1 kefren
3 1.1 kefren /*-
4 1.1 kefren * Copyright (c) 2010 The NetBSD Foundation, Inc.
5 1.1 kefren * All rights reserved.
6 1.1 kefren *
7 1.1 kefren * This code is derived from software contributed to The NetBSD Foundation
8 1.1 kefren * by Mihai Chelaru <kefren (at) NetBSD.org>
9 1.1 kefren *
10 1.1 kefren * Redistribution and use in source and binary forms, with or without
11 1.1 kefren * modification, are permitted provided that the following conditions
12 1.1 kefren * are met:
13 1.1 kefren * 1. Redistributions of source code must retain the above copyright
14 1.1 kefren * notice, this list of conditions and the following disclaimer.
15 1.1 kefren * 2. Redistributions in binary form must reproduce the above copyright
16 1.1 kefren * notice, this list of conditions and the following disclaimer in the
17 1.1 kefren * documentation and/or other materials provided with the distribution.
18 1.1 kefren *
19 1.1 kefren * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20 1.1 kefren * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21 1.1 kefren * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22 1.1 kefren * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23 1.1 kefren * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24 1.1 kefren * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25 1.1 kefren * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26 1.1 kefren * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27 1.1 kefren * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28 1.1 kefren * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29 1.1 kefren * POSSIBILITY OF SUCH DAMAGE.
30 1.1 kefren */
31 1.1 kefren
32 1.1 kefren #include <arpa/inet.h>
33 1.1 kefren
34 1.1 kefren #include <netinet/in.h>
35 1.4 kefren #include <netinet/tcp.h>
36 1.1 kefren
37 1.1 kefren #include <sys/socket.h>
38 1.1 kefren #include <sys/queue.h>
39 1.1 kefren
40 1.1 kefren #include <errno.h>
41 1.1 kefren #include <pwd.h>
42 1.1 kefren #include <stdio.h>
43 1.1 kefren #include <stdlib.h>
44 1.1 kefren #include <string.h>
45 1.1 kefren #include <unistd.h>
46 1.1 kefren
47 1.1 kefren #include "label.h"
48 1.1 kefren #include "ldp.h"
49 1.1 kefren #include "ldp_command.h"
50 1.1 kefren #include "ldp_errors.h"
51 1.1 kefren #include "ldp_peer.h"
52 1.1 kefren #include "socketops.h"
53 1.1 kefren
54 1.1 kefren struct com_sock csockets[MAX_COMMAND_SOCKETS];
55 1.3 kefren extern int ldp_hello_time, ldp_keepalive_time, ldp_holddown_time,
56 1.3 kefren min_label, max_label, debug_f, warn_f;
57 1.1 kefren
58 1.1 kefren #define writestr(soc, str) write(soc, str, strlen(str))
59 1.1 kefren
60 1.1 kefren #define MAXSEND 1024
61 1.1 kefren char sendspace[MAXSEND];
62 1.1 kefren
63 1.1 kefren static int verify_root_pwd(char *);
64 1.1 kefren static void echo_on(int s);
65 1.1 kefren static void echo_off(int s);
66 1.1 kefren
67 1.3 kefren static struct com_func main_commands[] = {
68 1.1 kefren { "show", show_func },
69 1.1 kefren { "set", set_func },
70 1.1 kefren { "quit", exit_func },
71 1.1 kefren { "exit", exit_func },
72 1.1 kefren { "", NULL }
73 1.1 kefren };
74 1.1 kefren
75 1.3 kefren static struct com_func show_commands[] = {
76 1.1 kefren { "neighbours", show_neighbours },
77 1.1 kefren { "bindings", show_bindings },
78 1.1 kefren { "debug", show_debug },
79 1.1 kefren { "hellos", show_hellos },
80 1.1 kefren { "parameters", show_parameters },
81 1.1 kefren { "version", show_version },
82 1.1 kefren { "warning", show_warning },
83 1.1 kefren { "", NULL }
84 1.1 kefren };
85 1.1 kefren
86 1.1 kefren struct com_func set_commands[] = {
87 1.1 kefren { "debug", set_debug },
88 1.1 kefren { "hello-time", set_hello_time },
89 1.1 kefren { "warning", set_warning },
90 1.1 kefren { "", NULL }
91 1.1 kefren };
92 1.1 kefren
93 1.1 kefren int
94 1.1 kefren verify_root_pwd(char *pw)
95 1.1 kefren {
96 1.1 kefren struct passwd *p;
97 1.1 kefren
98 1.1 kefren if ((p = getpwuid(0)) == NULL)
99 1.1 kefren return 0;
100 1.1 kefren
101 1.1 kefren if (strcmp(crypt(pw, p->pw_passwd), p->pw_passwd))
102 1.1 kefren return 0;
103 1.1 kefren
104 1.1 kefren return 1;
105 1.1 kefren }
106 1.1 kefren
107 1.1 kefren
108 1.1 kefren void
109 1.1 kefren init_command_sockets()
110 1.1 kefren {
111 1.1 kefren int i;
112 1.1 kefren
113 1.1 kefren for (i = 0; i<MAX_COMMAND_SOCKETS; i++) {
114 1.1 kefren csockets[i].socket = -1;
115 1.1 kefren csockets[i].auth = 0;
116 1.1 kefren }
117 1.1 kefren }
118 1.1 kefren
119 1.1 kefren int
120 1.1 kefren create_command_socket(int port)
121 1.1 kefren {
122 1.1 kefren struct sockaddr_in sin;
123 1.1 kefren int s;
124 1.1 kefren
125 1.1 kefren sin.sin_len = sizeof(sin);
126 1.1 kefren sin.sin_family = AF_INET;
127 1.1 kefren sin.sin_port = htons(port);
128 1.1 kefren sin.sin_addr.s_addr = ntohl(INADDR_LOOPBACK);
129 1.1 kefren
130 1.1 kefren s = socket(PF_INET, SOCK_STREAM, 6);
131 1.1 kefren if (s < 0)
132 1.1 kefren return s;
133 1.1 kefren
134 1.1 kefren if (bind(s, (struct sockaddr *) &sin, sizeof(sin))) {
135 1.1 kefren fatalp("bind: %s", strerror(errno));
136 1.1 kefren close(s);
137 1.1 kefren return -1;
138 1.1 kefren }
139 1.1 kefren
140 1.1 kefren if (listen(s, 5) == -1) {
141 1.1 kefren fatalp("listen: %s", strerror(errno));
142 1.1 kefren close(s);
143 1.1 kefren return -1;
144 1.1 kefren }
145 1.1 kefren return s;
146 1.1 kefren }
147 1.1 kefren
148 1.1 kefren void
149 1.1 kefren command_accept(int s)
150 1.1 kefren {
151 1.1 kefren int as = accept(s, NULL, 0);
152 1.1 kefren
153 1.1 kefren if (as < 0) {
154 1.1 kefren fatalp("Cannot accept new command socket %s",
155 1.1 kefren strerror(errno));
156 1.1 kefren return;
157 1.1 kefren }
158 1.1 kefren
159 1.1 kefren if (add_command_socket(as) != 0) {
160 1.1 kefren fatalp("Cannot accept command. Too many connections\n");
161 1.1 kefren close(as);
162 1.1 kefren return;
163 1.1 kefren }
164 1.1 kefren
165 1.1 kefren /* auth */
166 1.1 kefren send_pwd_prompt(as);
167 1.1 kefren }
168 1.1 kefren
169 1.1 kefren struct com_sock *
170 1.1 kefren is_command_socket(int s)
171 1.1 kefren {
172 1.1 kefren int i;
173 1.1 kefren
174 1.1 kefren if (s == -1)
175 1.1 kefren return NULL;
176 1.1 kefren for (i=0; i<MAX_COMMAND_SOCKETS; i++)
177 1.1 kefren if (s == csockets[i].socket)
178 1.1 kefren return &csockets[i];
179 1.1 kefren return NULL;
180 1.1 kefren }
181 1.1 kefren
182 1.1 kefren int
183 1.1 kefren add_command_socket(int s)
184 1.1 kefren {
185 1.1 kefren int i;
186 1.1 kefren
187 1.1 kefren for (i=0; i<MAX_COMMAND_SOCKETS; i++)
188 1.1 kefren if (csockets[i].socket == -1) {
189 1.1 kefren csockets[i].socket = s;
190 1.1 kefren csockets[i].auth = 0;
191 1.1 kefren return 0;
192 1.1 kefren }
193 1.1 kefren return -1;
194 1.1 kefren }
195 1.1 kefren
196 1.1 kefren void
197 1.1 kefren command_dispatch(struct com_sock *cs)
198 1.1 kefren {
199 1.1 kefren char recvspace[MAX_COMMAND_SIZE + 1];
200 1.1 kefren char *nextc = recvspace;
201 1.1 kefren int r = recv(cs->socket, recvspace, MAX_COMMAND_SIZE, MSG_PEEK);
202 1.1 kefren
203 1.1 kefren if (r < 0) {
204 1.1 kefren command_close(cs->socket);
205 1.1 kefren return;
206 1.1 kefren }
207 1.1 kefren
208 1.1 kefren recv(cs->socket, recvspace, r, MSG_WAITALL);
209 1.1 kefren
210 1.1 kefren if (r < 3) { /*at least \r\n */
211 1.1 kefren if (cs->auth) {
212 1.1 kefren /*writestr(cs->socket, "Unknown command. Use ? for help\n");*/
213 1.1 kefren send_prompt(cs->socket);
214 1.1 kefren } else {
215 1.1 kefren writestr(cs->socket, "Bad password\n");
216 1.1 kefren command_close(cs->socket);
217 1.1 kefren }
218 1.1 kefren return;
219 1.1 kefren }
220 1.1 kefren
221 1.1 kefren recvspace[r - 2] = '\0';
222 1.1 kefren
223 1.1 kefren if (!cs->auth) {
224 1.1 kefren if (verify_root_pwd(recvspace)) {
225 1.1 kefren echo_on(cs->socket);
226 1.1 kefren cs->auth = 1;
227 1.1 kefren writestr(cs->socket, "\n");
228 1.1 kefren send_prompt(cs->socket);
229 1.1 kefren } else {
230 1.1 kefren echo_on(cs->socket);
231 1.1 kefren writestr(cs->socket, "Bad password\n");
232 1.1 kefren command_close(cs->socket);
233 1.1 kefren }
234 1.1 kefren return;
235 1.1 kefren }
236 1.1 kefren
237 1.1 kefren strsep(&nextc, " ");
238 1.1 kefren
239 1.1 kefren command_match(main_commands, cs->socket, recvspace, nextc);
240 1.1 kefren
241 1.1 kefren }
242 1.1 kefren
243 1.1 kefren void
244 1.1 kefren command_close(int s)
245 1.1 kefren {
246 1.1 kefren int i;
247 1.1 kefren
248 1.1 kefren for (i=0; i<MAX_COMMAND_SOCKETS; i++)
249 1.1 kefren if (s == csockets[i].socket) {
250 1.1 kefren close(s);
251 1.1 kefren csockets[i].socket = -1;
252 1.1 kefren csockets[i].auth = 0;
253 1.1 kefren break;
254 1.1 kefren }
255 1.1 kefren }
256 1.1 kefren
257 1.1 kefren void
258 1.1 kefren send_prompt(int s) {
259 1.1 kefren writestr(s, "LDP> ");
260 1.1 kefren }
261 1.1 kefren
262 1.1 kefren void
263 1.1 kefren send_pwd_prompt(int s) {
264 1.1 kefren echo_off(s);
265 1.1 kefren writestr(s, "Password: ");
266 1.1 kefren }
267 1.1 kefren
268 1.1 kefren static void echo_off(int s)
269 1.1 kefren {
270 1.1 kefren char iac_will_echo[3] = { 0xff, 0xfb, 0x01 }, bf[32];
271 1.1 kefren write(s, iac_will_echo, sizeof(iac_will_echo));
272 1.1 kefren read(s, bf, sizeof(bf));
273 1.1 kefren }
274 1.1 kefren
275 1.1 kefren static void echo_on(int s)
276 1.1 kefren {
277 1.1 kefren char iac_wont_echo[3] = { 0xff, 0xfc, 0x01 }, bf[32];
278 1.1 kefren write(s, iac_wont_echo, sizeof(iac_wont_echo));
279 1.1 kefren read(s, bf, sizeof(bf));
280 1.1 kefren }
281 1.1 kefren
282 1.1 kefren /*
283 1.1 kefren * Matching function
284 1.1 kefren * Returns 1 if matched anything
285 1.1 kefren */
286 1.1 kefren int
287 1.1 kefren command_match(struct com_func *cf, int s, char *orig, char *next)
288 1.1 kefren {
289 1.2 christos size_t i, len;
290 1.2 christos int last_match = -1;
291 1.2 christos const char *msg = NULL;
292 1.1 kefren
293 1.2 christos if (orig == NULL || orig[0] == '\0')
294 1.2 christos goto out;
295 1.1 kefren
296 1.1 kefren if (!strcmp(orig, "?")) {
297 1.2 christos for (i = 0; cf[i].func != NULL; i++) {
298 1.1 kefren snprintf(sendspace, MAXSEND, "\t%s\n", cf[i].com);
299 1.1 kefren writestr(s, sendspace);
300 1.1 kefren }
301 1.2 christos goto out;
302 1.1 kefren }
303 1.1 kefren
304 1.2 christos len = strlen(orig);
305 1.2 christos for (i = 0; cf[i].func != NULL; i++) {
306 1.2 christos if (strncasecmp(orig, cf[i].com, len) == 0) {
307 1.2 christos if (last_match != -1) {
308 1.2 christos msg = "Ambiguous";
309 1.2 christos goto out;
310 1.2 christos } else
311 1.2 christos last_match = i;
312 1.1 kefren }
313 1.1 kefren }
314 1.1 kefren
315 1.2 christos if (last_match == -1) {
316 1.2 christos msg = "Unknown";
317 1.2 christos goto out;
318 1.1 kefren }
319 1.1 kefren
320 1.2 christos if (cf[last_match].func(s, next) != 0)
321 1.1 kefren send_prompt(s);
322 1.1 kefren return 1;
323 1.2 christos out:
324 1.2 christos if (msg) {
325 1.2 christos writestr(s, msg);
326 1.2 christos writestr(s, " command. Use ? for help\n");
327 1.2 christos }
328 1.2 christos send_prompt(s);
329 1.2 christos return 0;
330 1.1 kefren }
331 1.1 kefren
332 1.1 kefren /*
333 1.1 kefren * Main CLI functions
334 1.1 kefren */
335 1.1 kefren int
336 1.1 kefren set_func(int s, char *recvspace)
337 1.1 kefren {
338 1.1 kefren char *nextc = recvspace;
339 1.1 kefren
340 1.1 kefren if (recvspace == NULL || recvspace[0] == '\0') {
341 1.1 kefren writestr(s, "Unknown set command. Use set ? for help\n");
342 1.1 kefren return 1;
343 1.1 kefren }
344 1.1 kefren
345 1.1 kefren strsep(&nextc, " ");
346 1.1 kefren
347 1.1 kefren command_match(set_commands, s, recvspace, nextc);
348 1.1 kefren return 0;
349 1.1 kefren }
350 1.1 kefren
351 1.1 kefren int
352 1.1 kefren show_func(int s, char *recvspace)
353 1.1 kefren {
354 1.1 kefren char *nextc = recvspace;
355 1.1 kefren
356 1.1 kefren if (recvspace == NULL || recvspace[0] == '\0') {
357 1.1 kefren writestr(s, "Unknown show command. Use show ? for help\n");
358 1.1 kefren return 1;
359 1.1 kefren }
360 1.1 kefren
361 1.1 kefren strsep(&nextc, " ");
362 1.1 kefren
363 1.1 kefren command_match(show_commands, s, recvspace, nextc);
364 1.1 kefren return 0;
365 1.1 kefren }
366 1.1 kefren
367 1.1 kefren int
368 1.1 kefren exit_func(int s, char *recvspace)
369 1.1 kefren {
370 1.1 kefren command_close(s);
371 1.1 kefren return 0;
372 1.1 kefren }
373 1.1 kefren
374 1.1 kefren /*
375 1.1 kefren * Show functions
376 1.1 kefren */
377 1.1 kefren int
378 1.1 kefren show_neighbours(int s, char *recvspace)
379 1.1 kefren {
380 1.1 kefren struct ldp_peer *p;
381 1.1 kefren struct ldp_peer_address *wp;
382 1.1 kefren struct sockaddr_in ssin;
383 1.1 kefren socklen_t sin_len = sizeof(struct sockaddr_in);
384 1.4 kefren int enc;
385 1.4 kefren socklen_t enclen = sizeof(enc);
386 1.1 kefren
387 1.1 kefren SLIST_FOREACH(p, &ldp_peer_head, peers) {
388 1.1 kefren snprintf(sendspace, MAXSEND, "LDP peer: %s\n",
389 1.1 kefren inet_ntoa(p->ldp_id));
390 1.1 kefren writestr(s, sendspace);
391 1.1 kefren snprintf(sendspace, MAXSEND, "Transport address: %s\n",
392 1.1 kefren inet_ntoa(p->transport_address));
393 1.1 kefren writestr(s, sendspace);
394 1.1 kefren snprintf(sendspace, MAXSEND, "Next-hop address: %s\n",
395 1.1 kefren inet_ntoa(p->address));
396 1.1 kefren writestr(s, sendspace);
397 1.1 kefren snprintf(sendspace, MAXSEND, "State: %s\n",
398 1.1 kefren ldp_state_to_name(p->state));
399 1.1 kefren writestr(s, sendspace);
400 1.1 kefren if (p->state == LDP_PEER_ESTABLISHED) {
401 1.1 kefren snprintf(sendspace, MAXSEND, "Since: %s",
402 1.1 kefren ctime(&p->established_t));
403 1.1 kefren writestr(s, sendspace);
404 1.1 kefren }
405 1.1 kefren snprintf(sendspace, MAXSEND, "Holdtime: %d\nTimeout: %d\n",
406 1.1 kefren p->holdtime, p->timeout);
407 1.1 kefren writestr(s, sendspace);
408 1.1 kefren
409 1.1 kefren switch(p->state) {
410 1.1 kefren case LDP_PEER_CONNECTING:
411 1.1 kefren case LDP_PEER_CONNECTED:
412 1.1 kefren case LDP_PEER_ESTABLISHED:
413 1.1 kefren if (getsockname(p->socket,(struct sockaddr *) &ssin,
414 1.1 kefren &sin_len))
415 1.1 kefren break;
416 1.4 kefren
417 1.4 kefren if (getsockopt(p->socket, IPPROTO_TCP, TCP_MD5SIG,
418 1.4 kefren &enc, &enclen) == 0) {
419 1.4 kefren snprintf(sendspace, MAXSEND,
420 1.4 kefren "Authenticated: %s\n",
421 1.4 kefren enc != 0 ? "YES" : "NO");
422 1.4 kefren writestr(s, sendspace);
423 1.4 kefren }
424 1.4 kefren
425 1.1 kefren snprintf(sendspace, MAXSEND,"Socket: %d\nLocal %s:%d\n",
426 1.1 kefren p->socket, inet_ntoa(ssin.sin_addr),
427 1.1 kefren ntohs(ssin.sin_port));
428 1.1 kefren writestr(s, sendspace);
429 1.1 kefren
430 1.1 kefren if (getpeername(p->socket,(struct sockaddr *) &ssin,
431 1.1 kefren &sin_len))
432 1.1 kefren break;
433 1.1 kefren snprintf(sendspace, MAXSEND, "Remote %s:%d\n",
434 1.1 kefren inet_ntoa(ssin.sin_addr), ntohs(ssin.sin_port));
435 1.1 kefren writestr(s, sendspace);
436 1.1 kefren }
437 1.1 kefren
438 1.1 kefren snprintf(sendspace, MAXSEND,"Addresses bounded to this peer: ");
439 1.1 kefren writestr(s, sendspace);
440 1.1 kefren SLIST_FOREACH(wp, &p->ldp_peer_address_head, addresses) {
441 1.1 kefren snprintf(sendspace, MAXSEND, "%s ",
442 1.1 kefren inet_ntoa(wp->address));
443 1.1 kefren writestr(s, sendspace);
444 1.1 kefren }
445 1.1 kefren sendspace[0] = sendspace[1] = '\n';
446 1.1 kefren write(s, sendspace, 2);
447 1.1 kefren }
448 1.1 kefren return 1;
449 1.1 kefren }
450 1.1 kefren
451 1.1 kefren int
452 1.1 kefren show_bindings(int s, char *recvspace)
453 1.1 kefren {
454 1.1 kefren struct label *l;
455 1.1 kefren
456 1.1 kefren snprintf(sendspace, MAXSEND, "Local label\tNetwork\t\t\t\tNexthop\n");
457 1.1 kefren writestr(s, sendspace);
458 1.1 kefren SLIST_FOREACH (l, &label_head, labels) {
459 1.1 kefren snprintf(sendspace, MAXSEND, "%d\t\t%s/", l->binding,
460 1.1 kefren union_ntoa(&l->so_dest));
461 1.1 kefren writestr(s, sendspace);
462 1.1 kefren snprintf(sendspace, MAXSEND, "%s", union_ntoa(&l->so_pref));
463 1.1 kefren writestr(s, sendspace);
464 1.1 kefren if (l->p)
465 1.1 kefren snprintf(sendspace, MAXSEND, "\t%s:%d\n",
466 1.1 kefren inet_ntoa(l->p->address), l->label);
467 1.1 kefren else
468 1.1 kefren snprintf(sendspace, MAXSEND, "\n");
469 1.1 kefren writestr(s, sendspace);
470 1.1 kefren }
471 1.1 kefren return 1;
472 1.1 kefren }
473 1.1 kefren
474 1.1 kefren int
475 1.1 kefren show_debug(int s, char *recvspace)
476 1.1 kefren {
477 1.1 kefren if (recvspace) {
478 1.1 kefren writestr(s, "Invalid command\n");
479 1.1 kefren return 1;
480 1.1 kefren }
481 1.1 kefren
482 1.1 kefren snprintf(sendspace, MAXSEND, "Debug: %s\n",
483 1.1 kefren debug_f ? "YES" : "NO");
484 1.1 kefren writestr(s, sendspace);
485 1.1 kefren return 1;
486 1.1 kefren }
487 1.1 kefren
488 1.1 kefren int
489 1.1 kefren show_hellos(int s, char *recvspace)
490 1.1 kefren {
491 1.1 kefren struct hello_info *hi;
492 1.1 kefren
493 1.1 kefren SLIST_FOREACH(hi, &hello_info_head, infos) {
494 1.1 kefren snprintf(sendspace, MAXSEND, "%s: %ds\n", inet_ntoa(hi->ldp_id),
495 1.1 kefren hi->keepalive);
496 1.1 kefren writestr(s, sendspace);
497 1.1 kefren }
498 1.1 kefren return 1;
499 1.1 kefren }
500 1.1 kefren
501 1.1 kefren int
502 1.1 kefren show_parameters(int s, char *recvspace)
503 1.1 kefren {
504 1.1 kefren snprintf(sendspace, MAXSEND, "LDP ID: %s\nProtocol version: %d\n"
505 1.1 kefren "Hello time: %d\nKeepalive time: %d\nHoldtime: %d\n"
506 1.1 kefren "Minimum label: %d\nMaximum label: %d\n",
507 1.1 kefren my_ldp_id,
508 1.1 kefren LDP_VERSION,
509 1.1 kefren ldp_hello_time,
510 1.3 kefren ldp_keepalive_time,
511 1.3 kefren ldp_holddown_time,
512 1.3 kefren min_label,
513 1.3 kefren max_label);
514 1.1 kefren writestr(s, sendspace);
515 1.1 kefren return 1;
516 1.1 kefren }
517 1.1 kefren
518 1.1 kefren int
519 1.1 kefren show_version(int s, char *recvspace)
520 1.1 kefren {
521 1.1 kefren if (recvspace) { /* Nothing more after this */
522 1.1 kefren writestr(s, "Invalid command\n");
523 1.1 kefren return 1;
524 1.1 kefren }
525 1.1 kefren
526 1.1 kefren snprintf(sendspace, MAXSEND, "NetBSD LDP daemon version: %s\n",
527 1.1 kefren LDPD_VER);
528 1.1 kefren writestr(s, sendspace);
529 1.1 kefren return 1;
530 1.1 kefren }
531 1.1 kefren
532 1.1 kefren int
533 1.1 kefren show_warning(int s, char *recvspace)
534 1.1 kefren {
535 1.1 kefren if (recvspace) {
536 1.1 kefren writestr(s, "Invalid command\n");
537 1.1 kefren return 1;
538 1.1 kefren }
539 1.1 kefren
540 1.1 kefren snprintf(sendspace, MAXSEND, "Warnings: %s\n",
541 1.1 kefren warn_f ? "YES" : "NO");
542 1.1 kefren writestr(s, sendspace);
543 1.1 kefren return 1;
544 1.1 kefren }
545 1.1 kefren
546 1.1 kefren /* Set commands */
547 1.1 kefren int
548 1.1 kefren set_hello_time(int s, char *recvspace)
549 1.1 kefren {
550 1.1 kefren if (!recvspace || atoi(recvspace) < 1) {
551 1.1 kefren writestr(s, "Invalid timeout\n");
552 1.1 kefren return 1;
553 1.1 kefren }
554 1.1 kefren
555 1.1 kefren ldp_hello_time = atoi(recvspace);
556 1.1 kefren return 1;
557 1.1 kefren }
558 1.1 kefren
559 1.1 kefren int
560 1.1 kefren set_debug(int s, char *recvspace)
561 1.1 kefren {
562 1.1 kefren if (!recvspace || atoi(recvspace) < 0) {
563 1.1 kefren writestr(s, "Invalid command\n");
564 1.1 kefren return 1;
565 1.1 kefren }
566 1.1 kefren
567 1.1 kefren debug_f = atoi(recvspace);
568 1.1 kefren return 1;
569 1.1 kefren }
570 1.1 kefren
571 1.1 kefren int
572 1.1 kefren set_warning(int s, char *recvspace)
573 1.1 kefren {
574 1.1 kefren if (!recvspace || atoi(recvspace) < 0) {
575 1.1 kefren writestr(s, "Invalid command\n");
576 1.1 kefren return 1;
577 1.1 kefren }
578 1.1 kefren
579 1.1 kefren warn_f = atoi(recvspace);
580 1.1 kefren return 1;
581 1.1 kefren }
582