2 * options.c - handles option processing for PPP.
4 * Copyright (c) 1984-2000 Carnegie Mellon University. All rights reserved.
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in
15 * the documentation and/or other materials provided with the
18 * 3. The name "Carnegie Mellon University" must not be used to
19 * endorse or promote products derived from this software without
20 * prior written permission. For permission or any legal
21 * details, please contact
22 * Office of Technology Transfer
23 * Carnegie Mellon University
25 * Pittsburgh, PA 15213-3890
26 * (412) 268-4387, fax: (412) 268-7395
27 * tech-transfer@andrew.cmu.edu
29 * 4. Redistributions of any form whatsoever must retain the following
31 * "This product includes software developed by Computing Services
32 * at Carnegie Mellon University (http://www.cmu.edu/computing/)."
34 * CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH REGARD TO
35 * THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
36 * AND FITNESS, IN NO EVENT SHALL CARNEGIE MELLON UNIVERSITY BE LIABLE
37 * FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
38 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
39 * AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
40 * OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
64 * There have been 3 or 4 different names for this in libpcap CVS, but
65 * this seems to be what they have settled on...
66 * For older versions of libpcap, use DLT_PPP - but that means
67 * we lose the inbound and outbound qualifiers.
70 #ifdef DLT_PPP_WITHDIRECTION
71 #define DLT_PPP_PPPD DLT_PPP_WITHDIRECTION
73 #define DLT_PPP_PPPD DLT_PPP
76 #endif /* PPP_FILTER */
79 #include "pathnames.h"
81 #if defined(ultrix) || defined(NeXT)
87 struct option_value *next;
93 * Option variables and default values.
95 int debug = 0; /* Debug flag */
96 int kdebugflag = 0; /* Tell kernel to print debug messages */
97 int default_device = 1; /* Using /dev/tty or equivalent */
98 char devnam[MAXPATHLEN]; /* Device name */
99 bool nodetach = 0; /* Don't detach from controlling tty */
100 bool updetach = 0; /* Detach once link is up */
101 bool master_detach; /* Detach when we're (only) multilink master */
103 bool up_sdnotify = 0; /* Notify systemd once link is up */
105 int maxconnect = 0; /* Maximum connect time */
106 char user[MAXNAMELEN]; /* Username for PAP */
107 char passwd[MAXSECRETLEN]; /* Password for PAP */
108 bool persist = 0; /* Reopen link after it goes down */
109 char our_name[MAXNAMELEN]; /* Our name for authentication purposes */
110 bool demand = 0; /* do dial-on-demand */
111 char *ipparam = NULL; /* Extra parameter for ip up/down scripts */
112 int idle_time_limit = 0; /* Disconnect if idle for this many seconds */
113 int holdoff = 30; /* # seconds to pause before reconnecting */
114 bool holdoff_specified; /* true if a holdoff value has been given */
115 int log_to_fd = 1; /* send log messages to this fd too */
116 bool log_default = 1; /* log_to_fd is default (stdout) */
117 int maxfail = 10; /* max # of unsuccessful connection attempts */
118 char linkname[MAXPATHLEN]; /* logical name for link */
119 bool tune_kernel; /* may alter kernel settings */
120 int connect_delay = 1000; /* wait this many ms after connect script */
121 int req_unit = -1; /* requested interface unit */
122 char path_ipup[MAXPATHLEN]; /* pathname of ip-up script */
123 char path_ipdown[MAXPATHLEN];/* pathname of ip-down script */
124 char req_ifname[MAXIFNAMELEN]; /* requested interface name */
125 bool multilink = 0; /* Enable multilink operation */
126 char *bundle_name = NULL; /* bundle name for multilink */
127 bool dump_options; /* print out option values */
128 bool dryrun; /* print out option values and exit */
129 char *domain; /* domain name set by domain option */
130 int child_wait = 5; /* # seconds to wait for children at exit */
131 struct userenv *userenv_list; /* user environment variables */
132 int dfl_route_metric = -1; /* metric of the default route to set over the PPP link */
135 unsigned int maxoctets = 0; /* default - no limit */
136 int maxoctets_dir = 0; /* default - sum of traffic */
137 int maxoctets_timeout = 1; /* default 1 second */
141 extern option_t auth_options[];
142 extern struct stat devstat;
145 struct bpf_program pass_filter;/* Filter program for packets to pass */
146 struct bpf_program active_filter; /* Filter program for link-active pkts */
149 static option_t *curopt; /* pointer to option being processed */
150 char *current_option; /* the name of the option being parsed */
151 int privileged_option; /* set iff the current option came from root */
152 char *option_source; /* string saying where the option came from */
153 int option_priority = OPRIO_CFGFILE; /* priority of the current options */
154 bool devnam_fixed; /* can no longer change device name */
156 static int logfile_fd = -1; /* fd opened for log file */
157 static char logfile_name[MAXPATHLEN]; /* name of log file */
162 static int setdomain(char **);
163 static int readfile(char **);
164 static int callfile(char **);
165 static int showversion(char **);
166 static int showhelp(char **);
167 static void usage(void);
168 static int setlogfile(char **);
170 static int loadplugin(char **);
174 static int setpassfilter(char **);
175 static int setactivefilter(char **);
179 static int setmodir(char **);
182 static int user_setenv(char **);
183 static void user_setprint(option_t *, printer_func, void *);
184 static int user_unsetenv(char **);
185 static void user_unsetprint(option_t *, printer_func, void *);
187 static option_t *find_option(char *name);
188 static int process_option(option_t *, char *, char **);
189 static int n_arguments(option_t *);
190 static int number_option(char *, u_int32_t *, int);
193 * Structure to store extra lists of options.
197 struct option_list *next;
200 static struct option_list *extra_options = NULL;
205 option_t general_options[] = {
206 { "debug", o_int, &debug,
207 "Increase debugging level", OPT_INC | OPT_NOARG | 1 },
208 { "-d", o_int, &debug,
209 "Increase debugging level",
210 OPT_ALIAS | OPT_INC | OPT_NOARG | 1 },
212 { "kdebug", o_int, &kdebugflag,
213 "Set kernel driver debug level", OPT_PRIO },
215 { "nodetach", o_bool, &nodetach,
216 "Don't detach from controlling tty", OPT_PRIO | 1 },
217 { "-detach", o_bool, &nodetach,
218 "Don't detach from controlling tty", OPT_ALIAS | OPT_PRIOSUB | 1 },
220 { "up_sdnotify", o_bool, &up_sdnotify,
221 "Notify systemd once link is up (implies nodetach)",
222 OPT_PRIOSUB | OPT_A2COPY | 1, &nodetach },
224 { "updetach", o_bool, &updetach,
225 "Detach from controlling tty once link is up",
226 OPT_PRIOSUB | OPT_A2CLR | 1, &nodetach },
228 { "master_detach", o_bool, &master_detach,
229 "Detach when we're multilink master but have no link", 1 },
231 { "holdoff", o_int, &holdoff,
232 "Set time in seconds before retrying connection",
233 OPT_PRIO, &holdoff_specified },
235 { "idle", o_int, &idle_time_limit,
236 "Set time in seconds before disconnecting idle link", OPT_PRIO },
238 { "maxconnect", o_int, &maxconnect,
239 "Set connection time limit",
240 OPT_PRIO | OPT_LLIMIT | OPT_NOINCR | OPT_ZEROINF },
242 { "domain", o_special, (void *)setdomain,
243 "Add given domain name to hostname",
244 OPT_PRIO | OPT_PRIV | OPT_A2STRVAL, &domain },
246 { "file", o_special, (void *)readfile,
247 "Take options from a file", OPT_NOPRINT },
248 { "call", o_special, (void *)callfile,
249 "Take options from a privileged file", OPT_NOPRINT },
251 { "persist", o_bool, &persist,
252 "Keep on reopening connection after close", OPT_PRIO | 1 },
253 { "nopersist", o_bool, &persist,
254 "Turn off persist option", OPT_PRIOSUB },
256 { "demand", o_bool, &demand,
257 "Dial on demand", OPT_INITONLY | 1, &persist },
259 { "--version", o_special_noarg, (void *)showversion,
260 "Show version number" },
261 { "--help", o_special_noarg, (void *)showhelp,
262 "Show brief listing of options" },
263 { "-h", o_special_noarg, (void *)showhelp,
264 "Show brief listing of options", OPT_ALIAS },
266 { "logfile", o_special, (void *)setlogfile,
267 "Append log messages to this file",
268 OPT_PRIO | OPT_A2STRVAL | OPT_STATIC, &logfile_name },
269 { "logfd", o_int, &log_to_fd,
270 "Send log messages to this file descriptor",
271 OPT_PRIOSUB | OPT_A2CLR, &log_default },
272 { "nolog", o_int, &log_to_fd,
273 "Don't send log messages to any file",
274 OPT_PRIOSUB | OPT_NOARG | OPT_VAL(-1) },
275 { "nologfd", o_int, &log_to_fd,
276 "Don't send log messages to any file descriptor",
277 OPT_PRIOSUB | OPT_ALIAS | OPT_NOARG | OPT_VAL(-1) },
279 { "linkname", o_string, linkname,
280 "Set logical name for link",
281 OPT_PRIO | OPT_PRIV | OPT_STATIC, NULL, MAXPATHLEN },
283 { "maxfail", o_int, &maxfail,
284 "Maximum number of unsuccessful connection attempts to allow",
287 { "ktune", o_bool, &tune_kernel,
288 "Alter kernel settings as necessary", OPT_PRIO | 1 },
289 { "noktune", o_bool, &tune_kernel,
290 "Don't alter kernel settings", OPT_PRIOSUB },
292 { "connect-delay", o_int, &connect_delay,
293 "Maximum time (in ms) to wait after connect script finishes",
296 { "unit", o_int, &req_unit,
297 "PPP interface unit number to use if possible",
298 OPT_PRIO | OPT_LLIMIT, 0, 0 },
300 { "ifname", o_string, req_ifname,
301 "Set PPP interface name",
302 OPT_PRIO | OPT_PRIV | OPT_STATIC, NULL, MAXIFNAMELEN },
304 { "dump", o_bool, &dump_options,
305 "Print out option values after parsing all options", 1 },
306 { "dryrun", o_bool, &dryrun,
307 "Stop after parsing, printing, and checking options", 1 },
309 { "child-timeout", o_int, &child_wait,
310 "Number of seconds to wait for child processes at exit",
313 { "set", o_special, (void *)user_setenv,
314 "Set user environment variable",
315 OPT_A2PRINTER | OPT_NOPRINT, (void *)user_setprint },
316 { "unset", o_special, (void *)user_unsetenv,
317 "Unset user environment variable",
318 OPT_A2PRINTER | OPT_NOPRINT, (void *)user_unsetprint },
320 { "defaultroute-metric", o_int, &dfl_route_metric,
321 "Metric to use for the default route (Linux only; -1 for default behavior)",
322 OPT_PRIV|OPT_LLIMIT|OPT_INITONLY, NULL, 0, -1 },
324 { "ip-up-script", o_string, path_ipup,
325 "Set pathname of ip-up script",
326 OPT_PRIV|OPT_STATIC, NULL, MAXPATHLEN },
327 { "ip-down-script", o_string, path_ipdown,
328 "Set pathname of ip-down script",
329 OPT_PRIV|OPT_STATIC, NULL, MAXPATHLEN },
331 #ifdef HAVE_MULTILINK
332 { "multilink", o_bool, &multilink,
333 "Enable multilink operation", OPT_PRIO | 1 },
334 { "mp", o_bool, &multilink,
335 "Enable multilink operation", OPT_PRIOSUB | OPT_ALIAS | 1 },
336 { "nomultilink", o_bool, &multilink,
337 "Disable multilink operation", OPT_PRIOSUB | 0 },
338 { "nomp", o_bool, &multilink,
339 "Disable multilink operation", OPT_PRIOSUB | OPT_ALIAS | 0 },
341 { "bundle", o_string, &bundle_name,
342 "Bundle name for multilink", OPT_PRIO },
343 #endif /* HAVE_MULTILINK */
346 { "plugin", o_special, (void *)loadplugin,
347 "Load a plug-in module into pppd", OPT_PRIV | OPT_A2LIST },
351 { "pass-filter", o_special, setpassfilter,
352 "set filter for packets to pass", OPT_PRIO },
354 { "active-filter", o_special, setactivefilter,
355 "set filter for active pkts", OPT_PRIO },
359 { "maxoctets", o_int, &maxoctets,
360 "Set connection traffic limit",
361 OPT_PRIO | OPT_LLIMIT | OPT_NOINCR | OPT_ZEROINF },
362 { "mo", o_int, &maxoctets,
363 "Set connection traffic limit",
364 OPT_ALIAS | OPT_PRIO | OPT_LLIMIT | OPT_NOINCR | OPT_ZEROINF },
365 { "mo-direction", o_special, setmodir,
366 "Set direction for limit traffic (sum,in,out,max)" },
367 { "mo-timeout", o_int, &maxoctets_timeout,
368 "Check for traffic limit every N seconds", OPT_PRIO | OPT_LLIMIT | 1 },
374 #ifndef IMPLEMENTATION
375 #define IMPLEMENTATION ""
378 static char *usage_string = "\
380 Usage: %s [ options ], where options are:\n\
381 <device> Communicate over the named device\n\
382 <speed> Set the baud rate to <speed>\n\
383 <loc>:<rem> Set the local and/or remote interface IP\n\
384 addresses. Either one may be omitted.\n\
385 asyncmap <n> Set the desired async map to hex <n>\n\
386 auth Require authentication from peer\n\
387 connect <p> Invoke shell command <p> to set up the serial line\n\
388 crtscts Use hardware RTS/CTS flow control\n\
389 defaultroute Add default route through interface\n\
390 file <f> Take options from file <f>\n\
391 modem Use modem control lines\n\
392 mru <n> Set MRU value to <n> for negotiation\n\
393 See pppd(8) for more options.\n\
397 * parse_args - parse a string of arguments from the command line.
400 parse_args(int argc, char **argv)
406 privileged_option = privileged;
407 option_source = "command line";
408 option_priority = OPRIO_CMDLINE;
412 opt = find_option(arg);
414 option_error("unrecognized option '%s'", arg);
418 n = n_arguments(opt);
420 option_error("too few parameters for option %s", arg);
423 if (!process_option(opt, arg, argv))
432 * options_from_file - Read a string of options from a file,
433 * and interpret them.
436 options_from_file(char *filename, int must_exist, int check_prot, int priv)
439 int i, newline, ret, err;
445 char args[MAXARGS][MAXWORDLEN];
446 char cmd[MAXWORDLEN];
449 if (check_prot && seteuid(getuid()) == -1) {
450 option_error("unable to drop privileges to open %s: %m", filename);
453 f = fopen(filename, "r");
455 if (check_prot && seteuid(euid) == -1)
456 fatal("unable to regain privileges");
460 if (err != ENOENT && err != ENOTDIR)
461 warn("Warning: can't open options file %s: %m", filename);
464 option_error("Can't open options file %s: %m", filename);
468 oldpriv = privileged_option;
469 privileged_option = priv;
470 oldsource = option_source;
471 option_source = strdup(filename);
472 if (option_source == NULL)
473 option_source = "file";
475 while (getword(f, cmd, &newline, filename)) {
476 opt = find_option(cmd);
478 option_error("In file %s: unrecognized option '%s'",
482 n = n_arguments(opt);
483 for (i = 0; i < n; ++i) {
484 if (!getword(f, args[i], &newline, filename)) {
486 "In file %s: too few parameters for option '%s'",
492 if (!process_option(opt, cmd, argv))
499 privileged_option = oldpriv;
500 option_source = oldsource;
505 * options_from_user - See if the use has a ~/.ppprc file,
506 * and if so, interpret options from it.
509 options_from_user(void)
511 char *user, *path, *file;
516 pw = getpwuid(getuid());
517 if (pw == NULL || (user = pw->pw_dir) == NULL || user[0] == 0)
519 file = _PATH_USEROPT;
520 pl = strlen(user) + strlen(file) + 2;
523 novm("init file name");
524 slprintf(path, pl, "%s/%s", user, file);
525 option_priority = OPRIO_CFGFILE;
526 ret = options_from_file(path, 0, 1, privileged);
532 * options_for_tty - See if an options file exists for the serial
533 * device, and if so, interpret options from it.
534 * We only allow the per-tty options file to override anything from
535 * the command line if it is something that the user can't override
536 * once it has been set by root; this is done by giving configuration
537 * files a lower priority than the command line.
540 options_for_tty(void)
542 char *dev, *path, *p;
547 if ((p = strstr(dev, "/dev/")) != NULL)
549 if (dev[0] == 0 || strcmp(dev, "tty") == 0)
550 return 1; /* don't look for /etc/ppp/options.tty */
551 pl = strlen(_PATH_TTYOPT) + strlen(dev) + 1;
554 novm("tty init file name");
555 slprintf(path, pl, "%s%s", _PATH_TTYOPT, dev);
556 /* Turn slashes into dots, for Solaris case (e.g. /dev/term/a) */
557 for (p = path + strlen(_PATH_TTYOPT); *p != 0; ++p)
560 option_priority = OPRIO_CFGFILE;
561 ret = options_from_file(path, 0, 0, 1);
567 * options_from_list - process a string of options in a wordlist.
570 options_from_list(struct wordlist *w, int priv)
577 privileged_option = priv;
578 option_source = "secrets file";
579 option_priority = OPRIO_SECFILE;
582 opt = find_option(w->word);
584 option_error("In secrets file: unrecognized option '%s'",
588 n = n_arguments(opt);
590 for (i = 0; i < n; ++i) {
594 "In secrets file: too few parameters for option '%s'",
600 if (!process_option(opt, w0->word, argv))
611 * match_option - see if this option matches an option_t structure.
614 match_option(char *name, option_t *opt, int dowild)
616 int (*match)(char *, char **, int);
618 if (dowild != (opt->type == o_wild))
621 return strcmp(name, opt->name) == 0;
622 match = (int (*)(char *, char **, int)) opt->addr;
623 return (*match)(name, NULL, 0);
627 * find_option - scan the option lists for the various protocols
628 * looking for an entry with the given name.
629 * This could be optimized by using a hash table.
632 find_option(char *name)
635 struct option_list *list;
638 for (dowild = 0; dowild <= 1; ++dowild) {
639 for (opt = general_options; opt->name != NULL; ++opt)
640 if (match_option(name, opt, dowild))
642 for (opt = auth_options; opt->name != NULL; ++opt)
643 if (match_option(name, opt, dowild))
645 for (list = extra_options; list != NULL; list = list->next)
646 for (opt = list->options; opt->name != NULL; ++opt)
647 if (match_option(name, opt, dowild))
649 for (opt = the_channel->options; opt->name != NULL; ++opt)
650 if (match_option(name, opt, dowild))
652 for (i = 0; protocols[i] != NULL; ++i)
653 if ((opt = protocols[i]->options) != NULL)
654 for (; opt->name != NULL; ++opt)
655 if (match_option(name, opt, dowild))
662 * process_option - process one new-style option.
665 process_option(option_t *opt, char *cmd, char **argv)
670 int (*parser)(char **);
671 int (*wildp)(char *, char **, int);
672 char *optopt = (opt->type == o_wild)? "": " option";
673 int prio = option_priority;
674 option_t *mainopt = opt;
676 current_option = opt->name;
677 if ((opt->flags & OPT_PRIVFIX) && privileged_option)
679 while (mainopt->flags & OPT_PRIOSUB)
681 if (mainopt->flags & OPT_PRIO) {
682 if (prio < mainopt->priority) {
683 /* new value doesn't override old */
684 if (prio == OPRIO_CMDLINE && mainopt->priority > OPRIO_ROOT) {
685 option_error("%s%s set in %s cannot be overridden\n",
686 opt->name, optopt, mainopt->source);
691 if (prio > OPRIO_ROOT && mainopt->priority == OPRIO_CMDLINE)
692 warn("%s%s from %s overrides command line",
693 opt->name, optopt, option_source);
696 if ((opt->flags & OPT_INITONLY) && phase != PHASE_INITIALIZE) {
697 option_error("%s%s cannot be changed after initialization",
701 if ((opt->flags & OPT_PRIV) && !privileged_option) {
702 option_error("using the %s%s requires root privilege",
706 if ((opt->flags & OPT_ENABLE) && *(bool *)(opt->addr2) == 0) {
707 option_error("%s%s is disabled", opt->name, optopt);
710 if ((opt->flags & OPT_DEVEQUIV) && devnam_fixed) {
711 option_error("the %s%s may not be changed in %s",
712 opt->name, optopt, option_source);
718 v = opt->flags & OPT_VALUE;
719 *(bool *)(opt->addr) = v;
720 if (opt->addr2 && (opt->flags & OPT_A2COPY))
721 *(bool *)(opt->addr2) = v;
722 else if (opt->addr2 && (opt->flags & OPT_A2CLR))
723 *(bool *)(opt->addr2) = 0;
724 else if (opt->addr2 && (opt->flags & OPT_A2CLRB))
725 *(u_char *)(opt->addr2) &= ~v;
726 else if (opt->addr2 && (opt->flags & OPT_A2OR))
727 *(u_char *)(opt->addr2) |= v;
732 if ((opt->flags & OPT_NOARG) == 0) {
733 if (!int_option(*argv, &iv))
735 if ((((opt->flags & OPT_LLIMIT) && iv < opt->lower_limit)
736 || ((opt->flags & OPT_ULIMIT) && iv > opt->upper_limit))
737 && !((opt->flags & OPT_ZEROOK && iv == 0))) {
738 char *zok = (opt->flags & OPT_ZEROOK)? " zero or": "";
739 switch (opt->flags & OPT_LIMITS) {
741 option_error("%s value must be%s >= %d",
742 opt->name, zok, opt->lower_limit);
745 option_error("%s value must be%s <= %d",
746 opt->name, zok, opt->upper_limit);
749 option_error("%s value must be%s between %d and %d",
750 opt->name, zok, opt->lower_limit, opt->upper_limit);
756 a = opt->flags & OPT_VALUE;
758 a -= 256; /* sign extend */
760 if (opt->flags & OPT_INC)
761 iv += *(int *)(opt->addr);
762 if ((opt->flags & OPT_NOINCR) && !privileged_option) {
763 int oldv = *(int *)(opt->addr);
764 if ((opt->flags & OPT_ZEROINF) ?
765 (oldv != 0 && (iv == 0 || iv > oldv)) : (iv > oldv)) {
766 option_error("%s value cannot be increased", opt->name);
770 *(int *)(opt->addr) = iv;
771 if (opt->addr2 && (opt->flags & OPT_A2COPY))
772 *(int *)(opt->addr2) = iv;
776 if (opt->flags & OPT_NOARG) {
777 v = opt->flags & OPT_VALUE;
780 } else if (!number_option(*argv, &v, 16))
782 if (opt->flags & OPT_OR)
783 v |= *(u_int32_t *)(opt->addr);
784 *(u_int32_t *)(opt->addr) = v;
785 if (opt->addr2 && (opt->flags & OPT_A2COPY))
786 *(u_int32_t *)(opt->addr2) = v;
790 if (opt->flags & OPT_STATIC) {
791 strlcpy((char *)(opt->addr), *argv, opt->upper_limit);
793 char **optptr = (char **)(opt->addr);
796 novm("option argument");
801 /* obfuscate original argument for things like password */
802 if (opt->flags & OPT_HIDE) {
803 memset(*argv, '?', strlen(*argv));
808 case o_special_noarg:
810 parser = (int (*)(char **)) opt->addr;
812 if (!(*parser)(argv))
814 if (opt->flags & OPT_A2LIST) {
815 struct option_value *ovp, *pp;
817 ovp = malloc(sizeof(*ovp) + strlen(*argv));
819 strcpy(ovp->value, *argv);
820 ovp->source = option_source;
822 if (opt->addr2 == NULL) {
825 for (pp = opt->addr2; pp->next != NULL; pp = pp->next)
834 wildp = (int (*)(char *, char **, int)) opt->addr;
835 if (!(*wildp)(cmd, argv, 1))
841 * If addr2 wasn't used by any flag (OPT_A2COPY, etc.) but is set,
842 * treat it as a bool and set/clear it based on the OPT_A2CLR bit.
844 if (opt->addr2 && (opt->flags & (OPT_A2COPY|OPT_ENABLE
845 |OPT_A2PRINTER|OPT_A2STRVAL|OPT_A2LIST|OPT_A2OR)) == 0)
846 *(bool *)(opt->addr2) = !(opt->flags & OPT_A2CLR);
848 mainopt->source = option_source;
849 mainopt->priority = prio;
850 mainopt->winner = opt - mainopt;
856 * override_value - if the option priorities would permit us to
857 * override the value of option, return 1 and update the priority
858 * and source of the option value. Otherwise returns 0.
861 override_value(char *option, int priority, const char *source)
865 opt = find_option(option);
868 while (opt->flags & OPT_PRIOSUB)
870 if ((opt->flags & OPT_PRIO) && priority < opt->priority)
872 opt->priority = priority;
873 opt->source = source;
879 * n_arguments - tell how many arguments an option takes
882 n_arguments(option_t *opt)
884 return (opt->type == o_bool || opt->type == o_special_noarg
885 || (opt->flags & OPT_NOARG))? 0: 1;
889 * add_options - add a list of options to the set we grok.
892 add_options(option_t *opt)
894 struct option_list *list;
896 list = malloc(sizeof(*list));
898 novm("option list entry");
900 list->next = extra_options;
901 extra_options = list;
905 * check_options - check that options are valid and consistent.
910 if (logfile_fd >= 0 && logfile_fd != log_to_fd)
915 * print_option - print out an option and its value
918 print_option(option_t *opt, option_t *mainopt, printer_func printer, void *arg)
923 if (opt->flags & OPT_NOPRINT)
927 v = opt->flags & OPT_VALUE;
928 if (*(bool *)opt->addr != v)
929 /* this can happen legitimately, e.g. lock
930 option turned off for default device */
932 printer(arg, "%s", opt->name);
935 v = opt->flags & OPT_VALUE;
938 i = *(int *)opt->addr;
939 if (opt->flags & OPT_NOARG) {
940 printer(arg, "%s", opt->name);
942 if (opt->flags & OPT_INC) {
943 for (; i > v; i -= v)
944 printer(arg, " %s", opt->name);
946 printer(arg, " # oops: %d not %d\n",
950 printer(arg, "%s %d", opt->name, i);
954 printer(arg, "%s", opt->name);
955 if ((opt->flags & OPT_NOARG) == 0)
956 printer(arg, " %x", *(u_int32_t *)opt->addr);
960 if (opt->flags & OPT_HIDE) {
963 p = (char *) opt->addr;
964 if ((opt->flags & OPT_STATIC) == 0)
967 printer(arg, "%s %q", opt->name, p);
971 case o_special_noarg:
973 if (opt->type != o_wild) {
974 printer(arg, "%s", opt->name);
975 if (n_arguments(opt) == 0)
979 if (opt->flags & OPT_A2PRINTER) {
980 void (*oprt)(option_t *, printer_func, void *);
981 oprt = (void (*)(option_t *, printer_func, void *))
983 (*oprt)(opt, printer, arg);
984 } else if (opt->flags & OPT_A2STRVAL) {
985 p = (char *) opt->addr2;
986 if ((opt->flags & OPT_STATIC) == 0)
988 printer(arg, "%q", p);
989 } else if (opt->flags & OPT_A2LIST) {
990 struct option_value *ovp;
992 ovp = (struct option_value *) opt->addr2;
994 printer(arg, "%q", ovp->value);
995 if ((ovp = ovp->next) == NULL)
997 printer(arg, "\t\t# (from %s)\n%s ",
998 ovp->source, opt->name);
1001 printer(arg, "xxx # [don't know how to print value]");
1006 printer(arg, "# %s value (type %d\?\?)", opt->name, opt->type);
1009 printer(arg, "\t\t# (from %s)\n", mainopt->source);
1013 * print_option_list - print out options in effect from an
1017 print_option_list(option_t *opt, printer_func printer, void *arg)
1019 while (opt->name != NULL) {
1020 if (opt->priority != OPRIO_DEFAULT
1021 && opt->winner != (short int) -1)
1022 print_option(opt + opt->winner, opt, printer, arg);
1025 } while (opt->flags & OPT_PRIOSUB);
1030 * print_options - print out what options are in effect.
1033 print_options(printer_func printer, void *arg)
1035 struct option_list *list;
1038 printer(arg, "pppd options in effect:\n");
1039 print_option_list(general_options, printer, arg);
1040 print_option_list(auth_options, printer, arg);
1041 for (list = extra_options; list != NULL; list = list->next)
1042 print_option_list(list->options, printer, arg);
1043 print_option_list(the_channel->options, printer, arg);
1044 for (i = 0; protocols[i] != NULL; ++i)
1045 print_option_list(protocols[i]->options, printer, arg);
1049 * usage - print out a message telling how to use the program.
1054 if (phase == PHASE_INITIALIZE)
1055 fprintf(stderr, usage_string, VERSION, progname);
1059 * showhelp - print out usage message and exit.
1062 showhelp(char **argv)
1064 if (phase == PHASE_INITIALIZE) {
1072 * showversion - print out the version number and exit.
1075 showversion(char **argv)
1077 if (phase == PHASE_INITIALIZE) {
1078 fprintf(stdout, "pppd version %s\n", VERSION);
1085 * option_error - print a message about an error in an option.
1086 * The message is logged, and also sent to
1087 * stderr if phase == PHASE_INITIALIZE.
1090 option_error(char *fmt, ...)
1095 va_start(args, fmt);
1096 vslprintf(buf, sizeof(buf), fmt, args);
1098 if (phase == PHASE_INITIALIZE)
1099 fprintf(stderr, "%s: %s\n", progname, buf);
1100 syslog(LOG_ERR, "%s", buf);
1105 * readable - check if a file is readable by the real user.
1117 if (fstat(fd, &sbuf) != 0)
1119 if (sbuf.st_uid == uid)
1120 return sbuf.st_mode & S_IRUSR;
1121 if (sbuf.st_gid == getgid())
1122 return sbuf.st_mode & S_IRGRP;
1123 for (i = 0; i < ngroups; ++i)
1124 if (sbuf.st_gid == groups[i])
1125 return sbuf.st_mode & S_IRGRP;
1126 return sbuf.st_mode & S_IROTH;
1131 * Read a word from a file.
1132 * Words are delimited by white-space or by quotes (" or ').
1133 * Quotes, white-space and \ may be escaped with \.
1134 * \<newline> is ignored.
1137 getword(FILE *f, char *word, int *newlinep, char *filename)
1140 int quoted, comment;
1141 int value, digit, got, n;
1143 #define isoctal(c) ((c) >= '0' && (c) < '8')
1152 * First skip white-space and comments.
1160 * A newline means the end of a comment; backslash-newline
1161 * is ignored. Note that we cannot have escape && comment.
1173 * Ignore characters other than newline in a comment.
1179 * If this character is escaped, we have a word start.
1185 * If this is the escape character, look at the next character.
1193 * If this is the start of a comment, ignore the rest of the line.
1201 * A non-whitespace character is the start of a word.
1208 * Process characters until the end of the word.
1213 * This character is escaped: backslash-newline is ignored,
1214 * various other characters indicate particular values
1215 * as for C backslash-escapes.
1250 * \ddd octal sequence
1253 for (n = 0; n < 3 && isoctal(c); ++n) {
1254 value = (value << 3) + (c & 07);
1263 * \x<hex_string> sequence
1267 for (n = 0; n < 2 && isxdigit(c); ++n) {
1268 digit = toupper(c) - '0';
1270 digit += '0' + 10 - 'A';
1271 value = (value << 4) + digit;
1279 * Otherwise the character stands for itself.
1286 * Store the resulting character for the escape sequence.
1288 if (len < MAXWORDLEN) {
1299 * Backslash starts a new escape sequence.
1308 * Not escaped: check for the start or end of a quoted
1309 * section and see if we've reached the end of the word.
1317 } else if (c == '"' || c == '\'') {
1321 } else if (isspace(c) || c == '#') {
1327 * An ordinary character: store it in the word and get another.
1329 if (len < MAXWORDLEN) {
1336 word[MAXWORDLEN-1] = 0; /* make sure word is null-terminated */
1339 * End of the word: check for errors.
1345 option_error("Error reading %s: %m", filename);
1349 * If len is zero, then we didn't find a word before the
1355 option_error("warning: quoted word runs to end of file (%.20s...)",
1360 * Warn if the word was too long, and append a terminating null.
1362 if (len >= MAXWORDLEN) {
1363 option_error("warning: word in file %s too long (%.20s...)",
1365 len = MAXWORDLEN - 1;
1376 * number_option - parse an unsigned numeric parameter for an option.
1379 number_option(char *str, u_int32_t *valp, int base)
1383 *valp = strtoul(str, &ptr, base);
1385 option_error("invalid numeric parameter '%s' for %s option",
1386 str, current_option);
1394 * int_option - like number_option, but valp is int *,
1395 * the base is assumed to be 0, and *valp is not changed
1396 * if there is an error.
1399 int_option(char *str, int *valp)
1403 if (!number_option(str, &v, 0))
1411 * The following procedures parse options.
1415 * readfile - take commands from a file.
1418 readfile(char **argv)
1420 return options_from_file(*argv, 1, 1, privileged_option);
1424 * callfile - take commands from /etc/ppp/peers/<name>.
1425 * Name may not contain /../, start with / or ../, or end in /..
1428 callfile(char **argv)
1430 char *fname, *arg, *p;
1435 if (arg[0] == '/' || arg[0] == 0)
1438 for (p = arg; *p != 0; ) {
1439 if (p[0] == '.' && p[1] == '.' && (p[2] == '/' || p[2] == 0)) {
1443 while (*p != '/' && *p != 0)
1450 option_error("call option value may not contain .. or start with /");
1454 l = strlen(arg) + strlen(_PATH_PEERFILES) + 1;
1455 if ((fname = (char *) malloc(l)) == NULL)
1456 novm("call file name");
1457 slprintf(fname, l, "%s%s", _PATH_PEERFILES, arg);
1458 script_setenv("CALL_FILE", arg, 0);
1460 ok = options_from_file(fname, 1, 1, 1);
1468 * setpassfilter - Set the pass filter for packets
1471 setpassfilter(char **argv)
1476 pc = pcap_open_dead(DLT_PPP_PPPD, 65535);
1477 if (pcap_compile(pc, &pass_filter, *argv, 1, netmask) == -1) {
1478 option_error("error in pass-filter expression: %s\n",
1488 * setactivefilter - Set the active filter for packets
1491 setactivefilter(char **argv)
1496 pc = pcap_open_dead(DLT_PPP_PPPD, 65535);
1497 if (pcap_compile(pc, &active_filter, *argv, 1, netmask) == -1) {
1498 option_error("error in active-filter expression: %s\n",
1509 * setdomain - Set domain name to append to hostname
1512 setdomain(char **argv)
1514 gethostname(hostname, MAXNAMELEN);
1517 strncat(hostname, ".", MAXNAMELEN - strlen(hostname));
1518 domain = hostname + strlen(hostname);
1519 strncat(hostname, *argv, MAXNAMELEN - strlen(hostname));
1521 hostname[MAXNAMELEN-1] = 0;
1526 setlogfile(char **argv)
1532 if (!privileged_option && seteuid(getuid()) == -1) {
1533 option_error("unable to drop permissions to open %s: %m", *argv);
1536 fd = open(*argv, O_WRONLY | O_APPEND | O_CREAT | O_EXCL, 0644);
1537 if (fd < 0 && errno == EEXIST)
1538 fd = open(*argv, O_WRONLY | O_APPEND);
1540 if (!privileged_option && seteuid(euid) == -1)
1541 fatal("unable to regain privileges: %m");
1544 option_error("Can't open log file %s: %m", *argv);
1547 strlcpy(logfile_name, *argv, sizeof(logfile_name));
1548 if (logfile_fd >= 0)
1558 setmodir(char **argv)
1562 if(!strcmp(*argv,"in")) {
1563 maxoctets_dir = PPP_OCTETS_DIRECTION_IN;
1564 } else if (!strcmp(*argv,"out")) {
1565 maxoctets_dir = PPP_OCTETS_DIRECTION_OUT;
1566 } else if (!strcmp(*argv,"max")) {
1567 maxoctets_dir = PPP_OCTETS_DIRECTION_MAXOVERAL;
1569 maxoctets_dir = PPP_OCTETS_DIRECTION_SUM;
1577 loadplugin(char **argv)
1586 if (strchr(arg, '/') == 0) {
1587 const char *base = _PATH_PLUGIN;
1588 int l = strlen(base) + strlen(arg) + 2;
1591 novm("plugin file path");
1592 strlcpy(path, base, l);
1593 strlcat(path, "/", l);
1594 strlcat(path, arg, l);
1596 handle = dlopen(path, RTLD_GLOBAL | RTLD_NOW);
1600 option_error("%s", err);
1601 option_error("Couldn't load plugin %s", arg);
1604 init = (void (*)(void))dlsym(handle, "plugin_init");
1606 option_error("%s has no initialization entry point", arg);
1609 vers = (const char *) dlsym(handle, "pppd_version");
1611 warn("Warning: plugin %s has no version information", arg);
1612 } else if (strcmp(vers, VERSION) != 0) {
1613 option_error("Plugin %s is for pppd version %s, this is %s",
1614 arg, vers, VERSION);
1617 info("Plugin %s loaded.", arg);
1631 * Set an environment variable specified by the user.
1634 user_setenv(char **argv)
1636 char *arg = argv[0];
1638 struct userenv *uep, **insp;
1640 if ((eqp = strchr(arg, '=')) == NULL) {
1641 option_error("missing = in name=value: %s", arg);
1645 option_error("missing variable name: %s", arg);
1648 for (uep = userenv_list; uep != NULL; uep = uep->ue_next) {
1649 int nlen = strlen(uep->ue_name);
1650 if (nlen == (eqp - arg) &&
1651 strncmp(arg, uep->ue_name, nlen) == 0)
1654 /* Ignore attempts by unprivileged users to override privileged sources */
1655 if (uep != NULL && !privileged_option && uep->ue_priv)
1657 /* The name never changes, so allocate it with the structure */
1659 uep = malloc(sizeof (*uep) + (eqp-arg));
1660 strncpy(uep->ue_name, arg, eqp-arg);
1661 uep->ue_name[eqp-arg] = '\0';
1662 uep->ue_next = NULL;
1663 insp = &userenv_list;
1664 while (*insp != NULL)
1665 insp = &(*insp)->ue_next;
1668 struct userenv *uep2;
1669 for (uep2 = userenv_list; uep2 != NULL; uep2 = uep2->ue_next) {
1670 if (uep2 != uep && !uep2->ue_isset)
1673 if (uep2 == NULL && !uep->ue_isset)
1674 find_option("unset")->flags |= OPT_NOPRINT;
1675 free(uep->ue_value);
1678 uep->ue_priv = privileged_option;
1679 uep->ue_source = option_source;
1680 uep->ue_value = strdup(eqp + 1);
1681 curopt->flags &= ~OPT_NOPRINT;
1686 user_setprint(option_t *opt, printer_func printer, void *arg)
1688 struct userenv *uep, *uepnext;
1690 uepnext = userenv_list;
1691 while (uepnext != NULL && !uepnext->ue_isset)
1692 uepnext = uepnext->ue_next;
1693 while ((uep = uepnext) != NULL) {
1694 uepnext = uep->ue_next;
1695 while (uepnext != NULL && !uepnext->ue_isset)
1696 uepnext = uepnext->ue_next;
1697 (*printer)(arg, "%s=%s", uep->ue_name, uep->ue_value);
1698 if (uepnext != NULL)
1699 (*printer)(arg, "\t\t# (from %s)\n%s ", uep->ue_source, opt->name);
1701 opt->source = uep->ue_source;
1706 user_unsetenv(char **argv)
1708 struct userenv *uep, **insp;
1709 char *arg = argv[0];
1711 if (strchr(arg, '=') != NULL) {
1712 option_error("unexpected = in name: %s", arg);
1716 option_error("missing variable name for unset");
1719 for (uep = userenv_list; uep != NULL; uep = uep->ue_next) {
1720 if (strcmp(arg, uep->ue_name) == 0)
1723 /* Ignore attempts by unprivileged users to override privileged sources */
1724 if (uep != NULL && !privileged_option && uep->ue_priv)
1726 /* The name never changes, so allocate it with the structure */
1728 uep = malloc(sizeof (*uep) + strlen(arg));
1729 strcpy(uep->ue_name, arg);
1730 uep->ue_next = NULL;
1731 insp = &userenv_list;
1732 while (*insp != NULL)
1733 insp = &(*insp)->ue_next;
1736 struct userenv *uep2;
1737 for (uep2 = userenv_list; uep2 != NULL; uep2 = uep2->ue_next) {
1738 if (uep2 != uep && uep2->ue_isset)
1741 if (uep2 == NULL && uep->ue_isset)
1742 find_option("set")->flags |= OPT_NOPRINT;
1743 free(uep->ue_value);
1746 uep->ue_priv = privileged_option;
1747 uep->ue_source = option_source;
1748 uep->ue_value = NULL;
1749 curopt->flags &= ~OPT_NOPRINT;
1754 user_unsetprint(option_t *opt, printer_func printer, void *arg)
1756 struct userenv *uep, *uepnext;
1758 uepnext = userenv_list;
1759 while (uepnext != NULL && uepnext->ue_isset)
1760 uepnext = uepnext->ue_next;
1761 while ((uep = uepnext) != NULL) {
1762 uepnext = uep->ue_next;
1763 while (uepnext != NULL && uepnext->ue_isset)
1764 uepnext = uepnext->ue_next;
1765 (*printer)(arg, "%s", uep->ue_name);
1766 if (uepnext != NULL)
1767 (*printer)(arg, "\t\t# (from %s)\n%s ", uep->ue_source, opt->name);
1769 opt->source = uep->ue_source;