2 * options.c - handles option processing for PPP.
4 * Copyright (c) 1989 Carnegie Mellon University.
7 * Redistribution and use in source and binary forms are permitted
8 * provided that the above copyright notice and this paragraph are
9 * duplicated in all such forms and that any documentation,
10 * advertising materials, and other materials related to such
11 * distribution and use acknowledge that the software was developed
12 * by Carnegie Mellon University. The name of the
13 * University may not be used to endorse or promote products derived
14 * from this software without specific prior written permission.
15 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
16 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
17 * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
21 static char rcsid[] = "$Id: options.c,v 1.45 1999/01/20 00:00:35 paulus Exp $";
35 #include <sys/types.h>
37 #include <netinet/in.h>
38 #include <arpa/inet.h>
41 #include <pcap-int.h> /* XXX: To get struct pcap */
45 #include "pathnames.h"
46 #include "patchlevel.h"
54 #include <net/ppp-comp.h>
59 #if defined(ultrix) || defined(NeXT)
60 char *strdup __P((char *));
64 #define GIDSET_TYPE gid_t
68 * Option variables and default values.
71 int dflag = 0; /* Tell libpcap we want debugging */
73 int debug = 0; /* Debug flag */
74 int kdebugflag = 0; /* Tell kernel to print debug messages */
75 int default_device = 1; /* Using /dev/tty or equivalent */
76 char devnam[MAXPATHLEN] = "/dev/tty"; /* Device name */
77 int crtscts = 0; /* Use hardware flow control */
78 bool modem = 1; /* Use modem control lines */
79 int inspeed = 0; /* Input/Output speed requested */
80 u_int32_t netmask = 0; /* IP netmask to set on interface */
81 bool lockflag = 0; /* Create lock file to lock the serial dev */
82 bool nodetach = 0; /* Don't detach from controlling tty */
83 bool updetach = 0; /* Detach once link is up */
84 char *connector = NULL; /* Script to establish physical link */
85 char *disconnector = NULL; /* Script to disestablish physical link */
86 char *welcomer = NULL; /* Script to run after phys link estab. */
87 int maxconnect = 0; /* Maximum connect time */
88 char user[MAXNAMELEN]; /* Username for PAP */
89 char passwd[MAXSECRETLEN]; /* Password for PAP */
90 bool persist = 0; /* Reopen link after it goes down */
91 char our_name[MAXNAMELEN]; /* Our name for authentication purposes */
92 char remote_name[MAXNAMELEN]; /* Peer's name for authentication */
93 int explicit_remote = 0; /* User specified explicit remote name */
94 bool demand = 0; /* do dial-on-demand */
95 char *ipparam = NULL; /* Extra parameter for ip up/down scripts */
96 int idle_time_limit = 0; /* Disconnect if idle for this many seconds */
97 int holdoff = 30; /* # seconds to pause before reconnecting */
99 extern option_t auth_options[];
101 struct option_info connector_info;
102 struct option_info disconnector_info;
103 struct option_info welcomer_info;
104 struct option_info devnam_info;
107 struct bpf_program pass_filter;/* Filter program for packets to pass */
108 struct bpf_program active_filter; /* Filter program for link-active pkts */
109 pcap_t pc; /* Fake struct pcap so we can compile expr */
115 static int setdevname __P((char *, int));
116 static int setipaddr __P((char *));
117 static int setspeed __P((char *));
118 static int noopt __P((char **));
119 static int setdomain __P((char **));
120 static int setnetmask __P((char **));
121 static int setxonxoff __P((char **));
122 static int readfile __P((char **));
123 static int callfile __P((char **));
124 static int showversion __P((char **));
125 static int showhelp __P((char **));
128 static int setpassfilter __P((char **));
129 static int setactivefilter __P((char **));
133 static option_t *find_option __P((char *name));
134 static int process_option __P((option_t *, char **));
135 static int n_arguments __P((option_t *));
136 static int readable __P((int fd));
141 option_t general_options[] = {
142 { "debug", o_int, &debug,
143 "Increase debugging level", OPT_INC|OPT_NOARG|1 },
144 { "-d", o_int, &debug,
145 "Increase debugging level", OPT_INC|OPT_NOARG|1 },
146 { "kdebug", o_int, &kdebugflag,
147 "Set kernel driver debug level" },
148 { "nodetach", o_bool, &nodetach,
149 "Don't detach from controlling tty", 1 },
150 { "-detach", o_bool, &nodetach,
151 "Don't detach from controlling tty", 1 },
152 { "updetach", o_bool, &updetach,
153 "Detach from controlling tty once link is up", 1 },
154 { "holdoff", o_int, &holdoff,
155 "Set time in seconds before retrying connection" },
156 { "idle", o_int, &idle_time_limit,
157 "Set time in seconds before disconnecting idle link" },
158 { "lock", o_bool, &lockflag,
159 "Lock serial device with UUCP-style lock file", 1 },
160 { "-all", o_special_noarg, noopt,
161 "Don't request/allow any LCP or IPCP options (useless)" },
162 { "connect", o_string, &connector,
163 "A program to set up a connection", OPT_A2INFO, &connector_info },
164 { "disconnect", o_string, &disconnector,
165 "Program to disconnect serial device", OPT_A2INFO, &disconnector_info },
166 { "welcome", o_string, &welcomer,
167 "Script to welcome client", OPT_A2INFO, &welcomer_info },
168 { "maxconnect", o_int, &maxconnect,
169 "Set connection time limit", OPT_LLIMIT|OPT_NOINCR|OPT_ZEROINF },
170 { "crtscts", o_int, &crtscts,
171 "Set hardware (RTS/CTS) flow control", OPT_NOARG|OPT_VAL(1) },
172 { "nocrtscts", o_int, &crtscts,
173 "Disable hardware flow control", OPT_NOARG|OPT_VAL(-1) },
174 { "-crtscts", o_int, &crtscts,
175 "Disable hardware flow control", OPT_NOARG|OPT_VAL(-1) },
176 { "cdtrcts", o_int, &crtscts,
177 "Set alternate hardware (DTR/CTS) flow control", OPT_NOARG|OPT_VAL(2) },
178 { "nocdtrcts", o_int, &crtscts,
179 "Disable hardware flow control", OPT_NOARG|OPT_VAL(-1) },
180 { "xonxoff", o_special_noarg, setxonxoff,
181 "Set software (XON/XOFF) flow control" },
182 { "domain", o_special, setdomain,
183 "Add given domain name to hostname" },
184 { "mtu", o_int, &lcp_allowoptions[0].mru,
185 "Set our MTU", OPT_LIMITS, NULL, MAXMRU, MINMRU },
186 { "netmask", o_special, setnetmask,
188 { "modem", o_bool, &modem,
189 "Use modem control lines", 1 },
190 { "local", o_bool, &modem,
191 "Don't use modem control lines" },
192 { "file", o_special, readfile,
193 "Take options from a file" },
194 { "call", o_special, callfile,
195 "Take options from a privileged file" },
196 { "persist", o_bool, &persist,
197 "Keep on reopening connection after close", 1 },
198 { "nopersist", o_bool, &persist,
199 "Turn off persist option" },
200 { "demand", o_bool, &demand,
201 "Dial on demand", 1, &persist },
202 { "--version", o_special_noarg, showversion,
203 "Show version number" },
204 { "--help", o_special_noarg, showhelp,
205 "Show brief listing of options" },
206 { "-h", o_special_noarg, showhelp,
207 "Show brief listing of options" },
210 { "pdebug", o_int, &dflag,
211 "libpcap debugging" },
212 { "pass-filter", 1, setpassfilter,
213 "set filter for packets to pass" },
214 { "active-filter", 1, setactivefilter,
215 "set filter for active pkts" },
221 #ifndef IMPLEMENTATION
222 #define IMPLEMENTATION ""
225 static char *usage_string = "\
226 pppd version %s patch level %d%s\n\
227 Usage: %s [ options ], where options are:\n\
228 <device> Communicate over the named device\n\
229 <speed> Set the baud rate to <speed>\n\
230 <loc>:<rem> Set the local and/or remote interface IP\n\
231 addresses. Either one may be omitted.\n\
232 asyncmap <n> Set the desired async map to hex <n>\n\
233 auth Require authentication from peer\n\
234 connect <p> Invoke shell command <p> to set up the serial line\n\
235 crtscts Use hardware RTS/CTS flow control\n\
236 defaultroute Add default route through interface\n\
237 file <f> Take options from file <f>\n\
238 modem Use modem control lines\n\
239 mru <n> Set MRU value to <n> for negotiation\n\
240 See pppd(8) for more options.\n\
244 * parse_args - parse a string of arguments from the command line.
247 parse_args(argc, argv)
255 privileged_option = privileged;
256 option_source = "command line";
262 * First see if it's an option in the new option list.
264 opt = find_option(arg);
266 int n = n_arguments(opt);
268 option_error("too few parameters for option %s", arg);
271 current_option = arg;
272 if (!process_option(opt, argv))
280 * Maybe a tty name, speed or IP address?
282 if ((ret = setdevname(arg, 0)) == 0
283 && (ret = setspeed(arg)) == 0
284 && (ret = setipaddr(arg)) == 0) {
285 option_error("unrecognized option '%s'", arg);
289 if (ret < 0) /* error */
296 * scan_args - scan the command line arguments to get the tty name,
300 scan_args(argc, argv)
307 privileged_option = privileged;
312 /* Skip options and their arguments */
313 opt = find_option(arg);
315 int n = n_arguments(opt);
321 /* Check if it's a tty name and copy it if so */
322 (void) setdevname(arg, 1);
327 * options_from_file - Read a string of options from a file,
328 * and interpret them.
331 options_from_file(filename, must_exist, check_prot, priv)
343 char args[MAXARGS][MAXWORDLEN];
344 char cmd[MAXWORDLEN];
346 if ((f = fopen(filename, "r")) == NULL) {
347 if (!must_exist && errno == ENOENT)
349 option_error("Can't open options file %s: %m", filename);
352 if (check_prot && !readable(fileno(f))) {
353 option_error("Can't open options file %s: access denied", filename);
358 oldpriv = privileged_option;
359 privileged_option = priv;
360 oldsource = option_source;
361 option_source = strdup(filename);
362 if (option_source == NULL)
363 option_source = "file";
365 while (getword(f, cmd, &newline, filename)) {
367 * First see if it's a command.
369 opt = find_option(cmd);
371 int n = n_arguments(opt);
372 for (i = 0; i < n; ++i) {
373 if (!getword(f, args[i], &newline, filename)) {
375 "In file %s: too few parameters for option '%s'",
381 current_option = cmd;
382 if (!process_option(opt, argv))
388 * Maybe a tty name, speed or IP address?
390 if ((i = setdevname(cmd, 0)) == 0
391 && (i = setspeed(cmd)) == 0
392 && (i = setipaddr(cmd)) == 0) {
393 option_error("In file %s: unrecognized option '%s'",
397 if (i < 0) /* error */
404 privileged_option = oldpriv;
405 option_source = oldsource;
410 * options_from_user - See if the use has a ~/.ppprc file,
411 * and if so, interpret options from it.
416 char *user, *path, *file;
420 pw = getpwuid(getuid());
421 if (pw == NULL || (user = pw->pw_dir) == NULL || user[0] == 0)
423 file = _PATH_USEROPT;
424 path = malloc(strlen(user) + strlen(file) + 2);
426 novm("init file name");
430 ret = options_from_file(path, 0, 1, privileged);
436 * options_for_tty - See if an options file exists for the serial
437 * device, and if so, interpret options from it.
442 char *dev, *path, *p;
446 if (strncmp(dev, "/dev/", 5) == 0)
448 if (strcmp(dev, "tty") == 0)
449 return 1; /* don't look for /etc/ppp/options.tty */
450 path = malloc(strlen(_PATH_TTYOPT) + strlen(dev) + 1);
452 novm("tty init file name");
453 strcpy(path, _PATH_TTYOPT);
454 /* Turn slashes into dots, for Solaris case (e.g. /dev/term/a) */
455 for (p = path + strlen(path); *dev != 0; ++dev)
456 *p++ = (*dev == '/'? '.': *dev);
458 ret = options_from_file(path, 0, 0, 1);
464 * find_option - scan the option lists for the various protocols
465 * looking for an entry with the given name.
466 * This could be optimized by using a hash table.
469 find_option(char *name)
474 for (opt = general_options; opt->name != NULL; ++opt)
475 if (strcmp(name, opt->name) == 0)
477 for (opt = auth_options; opt->name != NULL; ++opt)
478 if (strcmp(name, opt->name) == 0)
480 for (i = 0; protocols[i] != NULL; ++i)
481 if ((opt = protocols[i]->options) != NULL)
482 for (; opt->name != NULL; ++opt)
483 if (strcmp(name, opt->name) == 0)
489 * process_option - process one new-style option.
492 process_option(opt, argv)
499 int (*parser) __P((char **));
501 if ((opt->flags & OPT_PRIV) && !privileged_option) {
502 option_error("using the %s option requires root privilege", opt->name);
505 if ((opt->flags & OPT_ENABLE) && *(bool *)(opt->addr2) == 0) {
506 option_error("%s option is disabled", opt->name);
512 v = opt->flags & OPT_VALUE;
513 *(bool *)(opt->addr) = v;
514 if (opt->addr2 && (opt->flags & OPT_A2COPY))
515 *(bool *)(opt->addr2) = v;
520 if ((opt->flags & OPT_NOARG) == 0) {
521 if (!int_option(*argv, &iv))
523 if ((((opt->flags & OPT_LLIMIT) && iv < opt->lower_limit)
524 || ((opt->flags & OPT_ULIMIT) && iv > opt->upper_limit))
525 && !((opt->flags & OPT_ZEROOK && iv == 0))) {
526 char *zok = (opt->flags & OPT_ZEROOK)? " zero or": "";
527 switch (opt->flags & OPT_LIMITS) {
529 option_error("%s value must be%s >= %d",
530 opt->name, zok, opt->lower_limit);
533 option_error("%s value must be%s <= %d",
534 opt->name, zok, opt->upper_limit);
537 option_error("%s value must be%s between %d and %d",
538 opt->name, opt->lower_limit, opt->upper_limit);
544 a = opt->flags & OPT_VALUE;
546 a -= 256; /* sign extend */
548 if (opt->flags & OPT_INC)
549 iv += *(int *)(opt->addr);
550 if ((opt->flags & OPT_NOINCR) && !privileged_option) {
551 int oldv = *(int *)(opt->addr);
552 if ((opt->flags & OPT_ZEROINF) ?
553 (oldv != 0 && (iv == 0 || iv > oldv)) : (iv > oldv)) {
554 option_error("%s value cannot be increased", opt->name);
558 *(int *)(opt->addr) = iv;
559 if (opt->addr2 && (opt->flags & OPT_A2COPY))
560 *(int *)(opt->addr2) = iv;
564 if (opt->flags & OPT_NOARG) {
565 v = opt->flags & OPT_VALUE;
566 } else if (!number_option(*argv, &v, 16))
568 if (opt->flags & OPT_OR)
569 v |= *(u_int32_t *)(opt->addr);
570 *(u_int32_t *)(opt->addr) = v;
571 if (opt->addr2 && (opt->flags & OPT_A2COPY))
572 *(u_int32_t *)(opt->addr2) = v;
576 if (opt->flags & OPT_STATIC) {
577 if (opt->upper_limit) {
578 strncpy((char *)(opt->addr), *argv, opt->upper_limit);
579 ((char *)(opt->addr))[opt->upper_limit-1] = 0;
581 strcpy((char *)(opt->addr), *argv);
585 novm("option argument");
586 *(char **)(opt->addr) = sv;
590 case o_special_noarg:
592 parser = (int (*) __P((char **))) opt->addr;
593 if (!(*parser)(argv))
599 if (opt->flags & OPT_A2INFO) {
600 struct option_info *ip = (struct option_info *) opt->addr2;
601 ip->priv = privileged_option;
602 ip->source = option_source;
603 } else if ((opt->flags & (OPT_A2COPY|OPT_ENABLE)) == 0)
604 *(bool *)(opt->addr2) = 1;
611 * n_arguments - tell how many arguments an option takes
614 n_arguments(option_t *opt)
616 return (opt->type == o_bool || opt->type == o_special_noarg
617 || (opt->flags & OPT_NOARG))? 0: 1;
621 * usage - print out a message telling how to use the program.
626 if (phase == PHASE_INITIALIZE)
627 fprintf(stderr, usage_string, VERSION, PATCHLEVEL, IMPLEMENTATION,
632 * showhelp - print out usage message and exit.
638 if (phase == PHASE_INITIALIZE) {
646 * showversion - print out the version number and exit.
652 if (phase == PHASE_INITIALIZE) {
653 fprintf(stderr, "pppd version %s patch level %d%s\n",
654 VERSION, PATCHLEVEL, IMPLEMENTATION);
661 * option_error - print a message about an error in an option.
662 * The message is logged, and also sent to
663 * stderr if phase == PHASE_INITIALIZE.
666 option_error __V((char *fmt, ...))
676 fmt = va_arg(args, char *);
678 vfmtmsg(buf, sizeof(buf), fmt, args);
680 if (phase == PHASE_INITIALIZE)
681 fprintf(stderr, "%s: %s\n", progname, buf);
682 syslog(LOG_ERR, "%s", buf);
686 * readable - check if a file is readable by the real user.
695 GIDSET_TYPE groups[NGROUPS_MAX];
700 if (fstat(fd, &sbuf) != 0)
702 if (sbuf.st_uid == uid)
703 return sbuf.st_mode & S_IRUSR;
704 if (sbuf.st_gid == getgid())
705 return sbuf.st_mode & S_IRGRP;
706 ngroups = getgroups(NGROUPS_MAX, groups);
707 for (i = 0; i < ngroups; ++i)
708 if (sbuf.st_gid == groups[i])
709 return sbuf.st_mode & S_IRGRP;
710 return sbuf.st_mode & S_IROTH;
714 * Read a word from a file.
715 * Words are delimited by white-space or by quotes (" or ').
716 * Quotes, white-space and \ may be escaped with \.
717 * \<newline> is ignored.
720 getword(f, word, newlinep, filename)
728 int value, digit, got, n;
730 #define isoctal(c) ((c) >= '0' && (c) < '8')
738 * First skip white-space and comments.
746 * A newline means the end of a comment; backslash-newline
747 * is ignored. Note that we cannot have escape && comment.
759 * Ignore characters other than newline in a comment.
765 * If this character is escaped, we have a word start.
771 * If this is the escape character, look at the next character.
779 * If this is the start of a comment, ignore the rest of the line.
787 * A non-whitespace character is the start of a word.
794 * Save the delimiter for quoted strings.
796 if (!escape && (c == '"' || c == '\'')) {
803 * Process characters until the end of the word.
808 * This character is escaped: backslash-newline is ignored,
809 * various other characters indicate particular values
810 * as for C backslash-escapes.
845 * \ddd octal sequence
848 for (n = 0; n < 3 && isoctal(c); ++n) {
849 value = (value << 3) + (c & 07);
858 * \x<hex_string> sequence
862 for (n = 0; n < 2 && isxdigit(c); ++n) {
863 digit = toupper(c) - '0';
865 digit += '0' + 10 - 'A';
866 value = (value << 4) + digit;
874 * Otherwise the character stands for itself.
881 * Store the resulting character for the escape sequence.
883 if (len < MAXWORDLEN-1)
894 * Not escaped: see if we've reached the end of the word.
900 if (isspace(c) || c == '#') {
907 * Backslash starts an escape sequence.
916 * An ordinary character: store it in the word and get another.
918 if (len < MAXWORDLEN-1)
926 * End of the word: check for errors.
932 option_error("Error reading %s: %m", filename);
936 * If len is zero, then we didn't find a word before the
944 * Warn if the word was too long, and append a terminating null.
946 if (len >= MAXWORDLEN) {
947 option_error("warning: word in file %s too long (%.20s...)",
949 len = MAXWORDLEN - 1;
960 * number_option - parse an unsigned numeric parameter for an option.
963 number_option(str, valp, base)
970 *valp = strtoul(str, &ptr, base);
972 option_error("invalid numeric parameter '%s' for %s option",
973 str, current_option);
981 * int_option - like number_option, but valp is int *,
982 * the base is assumed to be 0, and *valp is not changed
983 * if there is an error.
986 int_option(str, valp)
992 if (!number_option(str, &v, 0))
1000 * The following procedures parse options.
1004 * readfile - take commands from a file.
1010 return options_from_file(*argv, 1, 1, privileged_option);
1014 * callfile - take commands from /etc/ppp/peers/<name>.
1015 * Name may not contain /../, start with / or ../, or end in /..
1021 char *fname, *arg, *p;
1026 if (arg[0] == '/' || arg[0] == 0)
1029 for (p = arg; *p != 0; ) {
1030 if (p[0] == '.' && p[1] == '.' && (p[2] == '/' || p[2] == 0)) {
1034 while (*p != '/' && *p != 0)
1041 option_error("call option value may not contain .. or start with /");
1045 l = strlen(arg) + strlen(_PATH_PEERFILES) + 1;
1046 if ((fname = (char *) malloc(l)) == NULL)
1047 novm("call file name");
1048 strcpy(fname, _PATH_PEERFILES);
1051 ok = options_from_file(fname, 1, 1, 1);
1059 * setpdebug - Set libpcap debugging level.
1065 return int_option(*argv, &dflag);
1069 * setpassfilter - Set the pass filter for packets
1075 pc.linktype = DLT_PPP;
1076 pc.snapshot = PPP_HDRLEN;
1078 if (pcap_compile(&pc, &pass_filter, *argv, 1, netmask) == 0)
1080 option_error("error in pass-filter expression: %s\n", pcap_geterr(&pc));
1085 * setactivefilter - Set the active filter for packets
1088 setactivefilter(argv)
1091 pc.linktype = DLT_PPP;
1092 pc.snapshot = PPP_HDRLEN;
1094 if (pcap_compile(&pc, &active_filter, *argv, 1, netmask) == 0)
1096 option_error("error in active-filter expression: %s\n", pcap_geterr(&pc));
1102 * noopt - Disable all options.
1108 BZERO((char *) &lcp_wantoptions[0], sizeof (struct lcp_options));
1109 BZERO((char *) &lcp_allowoptions[0], sizeof (struct lcp_options));
1110 BZERO((char *) &ipcp_wantoptions[0], sizeof (struct ipcp_options));
1111 BZERO((char *) &ipcp_allowoptions[0], sizeof (struct ipcp_options));
1117 * setdomain - Set domain name to append to hostname
1123 if (!privileged_option) {
1124 option_error("using the domain option requires root privilege");
1127 gethostname(hostname, MAXNAMELEN);
1130 strncat(hostname, ".", MAXNAMELEN - strlen(hostname));
1131 strncat(hostname, *argv, MAXNAMELEN - strlen(hostname));
1133 hostname[MAXNAMELEN-1] = 0;
1139 * setspeed - Set the speed.
1148 spd = strtol(arg, &ptr, 0);
1149 if (ptr == arg || *ptr != 0 || spd == 0)
1157 * setdevname - Set the device name.
1160 setdevname(cp, quiet)
1164 struct stat statbuf;
1165 char dev[MAXPATHLEN];
1170 if (strncmp("/dev/", cp, 5) != 0) {
1171 strcpy(dev, "/dev/");
1172 strncat(dev, cp, MAXPATHLEN - 5);
1173 dev[MAXPATHLEN-1] = 0;
1178 * Check if there is a device by this name.
1180 if (stat(cp, &statbuf) < 0) {
1181 if (errno == ENOENT || quiet)
1183 option_error("Couldn't stat %s: %m", cp);
1187 if (!privileged_option) {
1189 option_error("setting the device name requires root privilege");
1193 (void) strncpy(devnam, cp, MAXPATHLEN);
1194 devnam[MAXPATHLEN-1] = 0;
1195 default_device = FALSE;
1202 * setipaddr - Set the IP address
1210 u_int32_t local, remote;
1211 ipcp_options *wo = &ipcp_wantoptions[0];
1214 * IP address pair separated by ":".
1216 if ((colon = strchr(arg, ':')) == NULL)
1220 * If colon first character, then no local addr.
1224 if ((local = inet_addr(arg)) == -1) {
1225 if ((hp = gethostbyname(arg)) == NULL) {
1226 option_error("unknown host: %s", arg);
1229 local = *(u_int32_t *)hp->h_addr;
1232 if (bad_ip_adrs(local)) {
1233 option_error("bad local IP address %s", ip_ntoa(local));
1237 wo->ouraddr = local;
1242 * If colon last character, then no remote addr.
1244 if (*++colon != '\0') {
1245 if ((remote = inet_addr(colon)) == -1) {
1246 if ((hp = gethostbyname(colon)) == NULL) {
1247 option_error("unknown host: %s", colon);
1250 remote = *(u_int32_t *)hp->h_addr;
1251 if (remote_name[0] == 0) {
1252 strncpy(remote_name, colon, MAXNAMELEN);
1253 remote_name[MAXNAMELEN-1] = 0;
1257 if (bad_ip_adrs(remote)) {
1258 option_error("bad remote IP address %s", ip_ntoa(remote));
1262 wo->hisaddr = remote;
1270 * setnetmask - set the netmask to be used on the interface.
1281 * Unfortunately, if we use inet_addr, we can't tell whether
1282 * a result of all 1s is an error or a valid 255.255.255.255.
1288 b = strtoul(p, &endp, 0);
1291 if (b < 0 || b > 255) {
1293 /* accept e.g. 0xffffff00 */
1299 mask |= b << (n * 8);
1301 if (*p != '.' || n == 0)
1308 if (*p != 0 || (netmask & ~mask) != 0) {
1309 option_error("invalid netmask value '%s'", *argv);
1321 lcp_wantoptions[0].asyncmap |= 0x000A0000; /* escape ^S and ^Q */
1322 lcp_wantoptions[0].neg_asyncmap = 1;