2 * options.c - handles option processing for PPP.
4 * Copyright (c) 1989 Carnegie Mellon University.
7 * Redistribution and use in source and binary forms are permitted
8 * provided that the above copyright notice and this paragraph are
9 * duplicated in all such forms and that any documentation,
10 * advertising materials, and other materials related to such
11 * distribution and use acknowledge that the software was developed
12 * by Carnegie Mellon University. The name of the
13 * University may not be used to endorse or promote products derived
14 * from this software without specific prior written permission.
15 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
16 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
17 * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
21 static char rcsid[] = "$Id: options.c,v 1.51 1999/03/12 06:07:19 paulus Exp $";
35 #include <sys/types.h>
37 #include <netinet/in.h>
38 #include <arpa/inet.h>
41 #include <pcap-int.h> /* XXX: To get struct pcap */
45 #include "pathnames.h"
46 #include "patchlevel.h"
54 #include <net/ppp-comp.h>
59 #if defined(ultrix) || defined(NeXT)
60 char *strdup __P((char *));
64 * Option variables and default values.
67 int dflag = 0; /* Tell libpcap we want debugging */
69 int debug = 0; /* Debug flag */
70 int kdebugflag = 0; /* Tell kernel to print debug messages */
71 int default_device = 1; /* Using /dev/tty or equivalent */
72 char devnam[MAXPATHLEN] = "/dev/tty"; /* Device name */
73 int crtscts = 0; /* Use hardware flow control */
74 bool modem = 1; /* Use modem control lines */
75 int inspeed = 0; /* Input/Output speed requested */
76 u_int32_t netmask = 0; /* IP netmask to set on interface */
77 bool lockflag = 0; /* Create lock file to lock the serial dev */
78 bool nodetach = 0; /* Don't detach from controlling tty */
79 bool updetach = 0; /* Detach once link is up */
80 char *connector = NULL; /* Script to establish physical link */
81 char *disconnector = NULL; /* Script to disestablish physical link */
82 char *welcomer = NULL; /* Script to run after phys link estab. */
83 int maxconnect = 0; /* Maximum connect time */
84 char user[MAXNAMELEN]; /* Username for PAP */
85 char passwd[MAXSECRETLEN]; /* Password for PAP */
86 bool persist = 0; /* Reopen link after it goes down */
87 char our_name[MAXNAMELEN]; /* Our name for authentication purposes */
88 char remote_name[MAXNAMELEN]; /* Peer's name for authentication */
89 int explicit_remote = 0; /* User specified explicit remote name */
90 bool demand = 0; /* do dial-on-demand */
91 char *ipparam = NULL; /* Extra parameter for ip up/down scripts */
92 int idle_time_limit = 0; /* Disconnect if idle for this many seconds */
93 int holdoff = 30; /* # seconds to pause before reconnecting */
95 extern option_t auth_options[];
97 struct option_info connector_info;
98 struct option_info disconnector_info;
99 struct option_info welcomer_info;
100 struct option_info devnam_info;
103 struct bpf_program pass_filter;/* Filter program for packets to pass */
104 struct bpf_program active_filter; /* Filter program for link-active pkts */
105 pcap_t pc; /* Fake struct pcap so we can compile expr */
111 static int setdevname __P((char *, int));
112 static int setipaddr __P((char *));
113 static int setspeed __P((char *));
114 static int noopt __P((char **));
115 static int setdomain __P((char **));
116 static int setnetmask __P((char **));
117 static int setxonxoff __P((char **));
118 static int readfile __P((char **));
119 static int callfile __P((char **));
120 static int showversion __P((char **));
121 static int showhelp __P((char **));
124 static int setpassfilter __P((char **));
125 static int setactivefilter __P((char **));
129 static option_t *find_option __P((char *name));
130 static int process_option __P((option_t *, char **));
131 static int n_arguments __P((option_t *));
136 option_t general_options[] = {
137 { "debug", o_int, &debug,
138 "Increase debugging level", OPT_INC|OPT_NOARG|1 },
139 { "-d", o_int, &debug,
140 "Increase debugging level", OPT_INC|OPT_NOARG|1 },
141 { "kdebug", o_int, &kdebugflag,
142 "Set kernel driver debug level" },
143 { "nodetach", o_bool, &nodetach,
144 "Don't detach from controlling tty", 1 },
145 { "-detach", o_bool, &nodetach,
146 "Don't detach from controlling tty", 1 },
147 { "updetach", o_bool, &updetach,
148 "Detach from controlling tty once link is up", 1 },
149 { "holdoff", o_int, &holdoff,
150 "Set time in seconds before retrying connection" },
151 { "idle", o_int, &idle_time_limit,
152 "Set time in seconds before disconnecting idle link" },
153 { "lock", o_bool, &lockflag,
154 "Lock serial device with UUCP-style lock file", 1 },
155 { "-all", o_special_noarg, noopt,
156 "Don't request/allow any LCP or IPCP options (useless)" },
157 { "connect", o_string, &connector,
158 "A program to set up a connection",
159 OPT_A2INFO | OPT_PRIVFIX, &connector_info },
160 { "disconnect", o_string, &disconnector,
161 "Program to disconnect serial device",
162 OPT_A2INFO | OPT_PRIVFIX, &disconnector_info },
163 { "welcome", o_string, &welcomer,
164 "Script to welcome client",
165 OPT_A2INFO | OPT_PRIVFIX, &welcomer_info },
166 { "maxconnect", o_int, &maxconnect,
167 "Set connection time limit", OPT_LLIMIT|OPT_NOINCR|OPT_ZEROINF },
168 { "crtscts", o_int, &crtscts,
169 "Set hardware (RTS/CTS) flow control", OPT_NOARG|OPT_VAL(1) },
170 { "nocrtscts", o_int, &crtscts,
171 "Disable hardware flow control", OPT_NOARG|OPT_VAL(-1) },
172 { "-crtscts", o_int, &crtscts,
173 "Disable hardware flow control", OPT_NOARG|OPT_VAL(-1) },
174 { "cdtrcts", o_int, &crtscts,
175 "Set alternate hardware (DTR/CTS) flow control", OPT_NOARG|OPT_VAL(2) },
176 { "nocdtrcts", o_int, &crtscts,
177 "Disable hardware flow control", OPT_NOARG|OPT_VAL(-1) },
178 { "xonxoff", o_special_noarg, setxonxoff,
179 "Set software (XON/XOFF) flow control" },
180 { "domain", o_special, setdomain,
181 "Add given domain name to hostname" },
182 { "mtu", o_int, &lcp_allowoptions[0].mru,
183 "Set our MTU", OPT_LIMITS, NULL, MAXMRU, MINMRU },
184 { "netmask", o_special, setnetmask,
186 { "modem", o_bool, &modem,
187 "Use modem control lines", 1 },
188 { "local", o_bool, &modem,
189 "Don't use modem control lines" },
190 { "file", o_special, readfile,
191 "Take options from a file" },
192 { "call", o_special, callfile,
193 "Take options from a privileged file" },
194 { "persist", o_bool, &persist,
195 "Keep on reopening connection after close", 1 },
196 { "nopersist", o_bool, &persist,
197 "Turn off persist option" },
198 { "demand", o_bool, &demand,
199 "Dial on demand", 1, &persist },
200 { "--version", o_special_noarg, showversion,
201 "Show version number" },
202 { "--help", o_special_noarg, showhelp,
203 "Show brief listing of options" },
204 { "-h", o_special_noarg, showhelp,
205 "Show brief listing of options" },
208 { "pdebug", o_int, &dflag,
209 "libpcap debugging" },
210 { "pass-filter", 1, setpassfilter,
211 "set filter for packets to pass" },
212 { "active-filter", 1, setactivefilter,
213 "set filter for active pkts" },
219 #ifndef IMPLEMENTATION
220 #define IMPLEMENTATION ""
223 static char *usage_string = "\
224 pppd version %s.%d%s\n\
225 Usage: %s [ options ], where options are:\n\
226 <device> Communicate over the named device\n\
227 <speed> Set the baud rate to <speed>\n\
228 <loc>:<rem> Set the local and/or remote interface IP\n\
229 addresses. Either one may be omitted.\n\
230 asyncmap <n> Set the desired async map to hex <n>\n\
231 auth Require authentication from peer\n\
232 connect <p> Invoke shell command <p> to set up the serial line\n\
233 crtscts Use hardware RTS/CTS flow control\n\
234 defaultroute Add default route through interface\n\
235 file <f> Take options from file <f>\n\
236 modem Use modem control lines\n\
237 mru <n> Set MRU value to <n> for negotiation\n\
238 See pppd(8) for more options.\n\
242 * parse_args - parse a string of arguments from the command line.
245 parse_args(argc, argv)
253 privileged_option = privileged;
254 option_source = "command line";
260 * First see if it's an option in the new option list.
262 opt = find_option(arg);
264 int n = n_arguments(opt);
266 option_error("too few parameters for option %s", arg);
269 current_option = arg;
270 if (!process_option(opt, argv))
278 * Maybe a tty name, speed or IP address?
280 if ((ret = setdevname(arg, 0)) == 0
281 && (ret = setspeed(arg)) == 0
282 && (ret = setipaddr(arg)) == 0) {
283 option_error("unrecognized option '%s'", arg);
287 if (ret < 0) /* error */
294 * scan_args - scan the command line arguments to get the tty name,
298 scan_args(argc, argv)
305 privileged_option = privileged;
310 /* Skip options and their arguments */
311 opt = find_option(arg);
313 int n = n_arguments(opt);
319 /* Check if it's a tty name and copy it if so */
320 (void) setdevname(arg, 1);
325 * options_from_file - Read a string of options from a file,
326 * and interpret them.
329 options_from_file(filename, must_exist, check_prot, priv)
341 char args[MAXARGS][MAXWORDLEN];
342 char cmd[MAXWORDLEN];
346 f = fopen(filename, "r");
350 if (!must_exist && errno == ENOENT)
352 option_error("Can't open options file %s: %m", filename);
355 #if 0 /* check done by setting effective UID above */
356 if (check_prot && !readable(fileno(f))) {
357 option_error("Can't open options file %s: access denied", filename);
363 oldpriv = privileged_option;
364 privileged_option = priv;
365 oldsource = option_source;
366 option_source = strdup(filename);
367 if (option_source == NULL)
368 option_source = "file";
370 while (getword(f, cmd, &newline, filename)) {
372 * First see if it's a command.
374 opt = find_option(cmd);
376 int n = n_arguments(opt);
377 for (i = 0; i < n; ++i) {
378 if (!getword(f, args[i], &newline, filename)) {
380 "In file %s: too few parameters for option '%s'",
386 current_option = cmd;
387 if (!process_option(opt, argv))
393 * Maybe a tty name, speed or IP address?
395 if ((i = setdevname(cmd, 0)) == 0
396 && (i = setspeed(cmd)) == 0
397 && (i = setipaddr(cmd)) == 0) {
398 option_error("In file %s: unrecognized option '%s'",
402 if (i < 0) /* error */
409 privileged_option = oldpriv;
410 option_source = oldsource;
415 * options_from_user - See if the use has a ~/.ppprc file,
416 * and if so, interpret options from it.
421 char *user, *path, *file;
426 pw = getpwuid(getuid());
427 if (pw == NULL || (user = pw->pw_dir) == NULL || user[0] == 0)
429 file = _PATH_USEROPT;
430 pl = strlen(user) + strlen(file) + 2;
433 novm("init file name");
434 slprintf(path, pl, "%s/%s", user, file);
435 ret = options_from_file(path, 0, 1, privileged);
441 * options_for_tty - See if an options file exists for the serial
442 * device, and if so, interpret options from it.
447 char *dev, *path, *p;
452 if (strncmp(dev, "/dev/", 5) == 0)
454 if (strcmp(dev, "tty") == 0)
455 return 1; /* don't look for /etc/ppp/options.tty */
456 pl = strlen(_PATH_TTYOPT) + strlen(dev) + 1;
459 novm("tty init file name");
460 slprintf(path, pl, "%s%s", _PATH_TTYOPT, dev);
461 /* Turn slashes into dots, for Solaris case (e.g. /dev/term/a) */
462 for (p = path + strlen(_PATH_TTYOPT); *p != 0; ++p)
465 ret = options_from_file(path, 0, 0, 1);
471 * find_option - scan the option lists for the various protocols
472 * looking for an entry with the given name.
473 * This could be optimized by using a hash table.
482 for (opt = general_options; opt->name != NULL; ++opt)
483 if (strcmp(name, opt->name) == 0)
485 for (opt = auth_options; opt->name != NULL; ++opt)
486 if (strcmp(name, opt->name) == 0)
488 for (i = 0; protocols[i] != NULL; ++i)
489 if ((opt = protocols[i]->options) != NULL)
490 for (; opt->name != NULL; ++opt)
491 if (strcmp(name, opt->name) == 0)
497 * process_option - process one new-style option.
500 process_option(opt, argv)
507 int (*parser) __P((char **));
509 if ((opt->flags & OPT_PRIV) && !privileged_option) {
510 option_error("using the %s option requires root privilege", opt->name);
513 if ((opt->flags & OPT_ENABLE) && *(bool *)(opt->addr2) == 0) {
514 option_error("%s option is disabled", opt->name);
517 if ((opt->flags & OPT_PRIVFIX) && !privileged_option) {
518 struct option_info *ip = (struct option_info *) opt->addr2;
519 if (ip && ip->priv) {
520 option_error("%s option cannot be overridden", opt->name);
527 v = opt->flags & OPT_VALUE;
528 *(bool *)(opt->addr) = v;
529 if (opt->addr2 && (opt->flags & OPT_A2COPY))
530 *(bool *)(opt->addr2) = v;
535 if ((opt->flags & OPT_NOARG) == 0) {
536 if (!int_option(*argv, &iv))
538 if ((((opt->flags & OPT_LLIMIT) && iv < opt->lower_limit)
539 || ((opt->flags & OPT_ULIMIT) && iv > opt->upper_limit))
540 && !((opt->flags & OPT_ZEROOK && iv == 0))) {
541 char *zok = (opt->flags & OPT_ZEROOK)? " zero or": "";
542 switch (opt->flags & OPT_LIMITS) {
544 option_error("%s value must be%s >= %d",
545 opt->name, zok, opt->lower_limit);
548 option_error("%s value must be%s <= %d",
549 opt->name, zok, opt->upper_limit);
552 option_error("%s value must be%s between %d and %d",
553 opt->name, opt->lower_limit, opt->upper_limit);
559 a = opt->flags & OPT_VALUE;
561 a -= 256; /* sign extend */
563 if (opt->flags & OPT_INC)
564 iv += *(int *)(opt->addr);
565 if ((opt->flags & OPT_NOINCR) && !privileged_option) {
566 int oldv = *(int *)(opt->addr);
567 if ((opt->flags & OPT_ZEROINF) ?
568 (oldv != 0 && (iv == 0 || iv > oldv)) : (iv > oldv)) {
569 option_error("%s value cannot be increased", opt->name);
573 *(int *)(opt->addr) = iv;
574 if (opt->addr2 && (opt->flags & OPT_A2COPY))
575 *(int *)(opt->addr2) = iv;
579 if (opt->flags & OPT_NOARG) {
580 v = opt->flags & OPT_VALUE;
581 } else if (!number_option(*argv, &v, 16))
583 if (opt->flags & OPT_OR)
584 v |= *(u_int32_t *)(opt->addr);
585 *(u_int32_t *)(opt->addr) = v;
586 if (opt->addr2 && (opt->flags & OPT_A2COPY))
587 *(u_int32_t *)(opt->addr2) = v;
591 if (opt->flags & OPT_STATIC) {
592 strlcpy((char *)(opt->addr), opt->upper_limit, *argv);
596 novm("option argument");
597 *(char **)(opt->addr) = sv;
601 case o_special_noarg:
603 parser = (int (*) __P((char **))) opt->addr;
604 if (!(*parser)(argv))
610 if (opt->flags & OPT_A2INFO) {
611 struct option_info *ip = (struct option_info *) opt->addr2;
612 ip->priv = privileged_option;
613 ip->source = option_source;
614 } else if ((opt->flags & (OPT_A2COPY|OPT_ENABLE)) == 0)
615 *(bool *)(opt->addr2) = 1;
622 * n_arguments - tell how many arguments an option takes
628 return (opt->type == o_bool || opt->type == o_special_noarg
629 || (opt->flags & OPT_NOARG))? 0: 1;
633 * usage - print out a message telling how to use the program.
638 if (phase == PHASE_INITIALIZE)
639 fprintf(stderr, usage_string, VERSION, PATCHLEVEL, IMPLEMENTATION,
644 * showhelp - print out usage message and exit.
650 if (phase == PHASE_INITIALIZE) {
658 * showversion - print out the version number and exit.
664 if (phase == PHASE_INITIALIZE) {
665 fprintf(stderr, "pppd version %s.%d%s\n",
666 VERSION, PATCHLEVEL, IMPLEMENTATION);
673 * option_error - print a message about an error in an option.
674 * The message is logged, and also sent to
675 * stderr if phase == PHASE_INITIALIZE.
678 option_error __V((char *fmt, ...))
688 fmt = va_arg(args, char *);
690 vslprintf(buf, sizeof(buf), fmt, args);
692 if (phase == PHASE_INITIALIZE)
693 fprintf(stderr, "%s: %s\n", progname, buf);
694 syslog(LOG_ERR, "%s", buf);
698 * readable - check if a file is readable by the real user.
711 if (fstat(fd, &sbuf) != 0)
713 if (sbuf.st_uid == uid)
714 return sbuf.st_mode & S_IRUSR;
715 if (sbuf.st_gid == getgid())
716 return sbuf.st_mode & S_IRGRP;
717 for (i = 0; i < ngroups; ++i)
718 if (sbuf.st_gid == groups[i])
719 return sbuf.st_mode & S_IRGRP;
720 return sbuf.st_mode & S_IROTH;
724 * Read a word from a file.
725 * Words are delimited by white-space or by quotes (" or ').
726 * Quotes, white-space and \ may be escaped with \.
727 * \<newline> is ignored.
730 getword(f, word, newlinep, filename)
738 int value, digit, got, n;
740 #define isoctal(c) ((c) >= '0' && (c) < '8')
748 * First skip white-space and comments.
756 * A newline means the end of a comment; backslash-newline
757 * is ignored. Note that we cannot have escape && comment.
769 * Ignore characters other than newline in a comment.
775 * If this character is escaped, we have a word start.
781 * If this is the escape character, look at the next character.
789 * If this is the start of a comment, ignore the rest of the line.
797 * A non-whitespace character is the start of a word.
804 * Save the delimiter for quoted strings.
806 if (!escape && (c == '"' || c == '\'')) {
813 * Process characters until the end of the word.
818 * This character is escaped: backslash-newline is ignored,
819 * various other characters indicate particular values
820 * as for C backslash-escapes.
855 * \ddd octal sequence
858 for (n = 0; n < 3 && isoctal(c); ++n) {
859 value = (value << 3) + (c & 07);
868 * \x<hex_string> sequence
872 for (n = 0; n < 2 && isxdigit(c); ++n) {
873 digit = toupper(c) - '0';
875 digit += '0' + 10 - 'A';
876 value = (value << 4) + digit;
884 * Otherwise the character stands for itself.
891 * Store the resulting character for the escape sequence.
893 if (len < MAXWORDLEN-1)
904 * Not escaped: see if we've reached the end of the word.
910 if (isspace(c) || c == '#') {
917 * Backslash starts an escape sequence.
926 * An ordinary character: store it in the word and get another.
928 if (len < MAXWORDLEN-1)
936 * End of the word: check for errors.
942 option_error("Error reading %s: %m", filename);
946 * If len is zero, then we didn't find a word before the
954 * Warn if the word was too long, and append a terminating null.
956 if (len >= MAXWORDLEN) {
957 option_error("warning: word in file %s too long (%.20s...)",
959 len = MAXWORDLEN - 1;
970 * number_option - parse an unsigned numeric parameter for an option.
973 number_option(str, valp, base)
980 *valp = strtoul(str, &ptr, base);
982 option_error("invalid numeric parameter '%s' for %s option",
983 str, current_option);
991 * int_option - like number_option, but valp is int *,
992 * the base is assumed to be 0, and *valp is not changed
993 * if there is an error.
996 int_option(str, valp)
1002 if (!number_option(str, &v, 0))
1010 * The following procedures parse options.
1014 * readfile - take commands from a file.
1020 return options_from_file(*argv, 1, 1, privileged_option);
1024 * callfile - take commands from /etc/ppp/peers/<name>.
1025 * Name may not contain /../, start with / or ../, or end in /..
1031 char *fname, *arg, *p;
1036 if (arg[0] == '/' || arg[0] == 0)
1039 for (p = arg; *p != 0; ) {
1040 if (p[0] == '.' && p[1] == '.' && (p[2] == '/' || p[2] == 0)) {
1044 while (*p != '/' && *p != 0)
1051 option_error("call option value may not contain .. or start with /");
1055 l = strlen(arg) + strlen(_PATH_PEERFILES) + 1;
1056 if ((fname = (char *) malloc(l)) == NULL)
1057 novm("call file name");
1058 slprintf(fname, l, "%s%s", _PATH_PEERFILES, arg);
1060 ok = options_from_file(fname, 1, 1, 1);
1068 * setpdebug - Set libpcap debugging level.
1074 return int_option(*argv, &dflag);
1078 * setpassfilter - Set the pass filter for packets
1084 pc.linktype = DLT_PPP;
1085 pc.snapshot = PPP_HDRLEN;
1087 if (pcap_compile(&pc, &pass_filter, *argv, 1, netmask) == 0)
1089 option_error("error in pass-filter expression: %s\n", pcap_geterr(&pc));
1094 * setactivefilter - Set the active filter for packets
1097 setactivefilter(argv)
1100 pc.linktype = DLT_PPP;
1101 pc.snapshot = PPP_HDRLEN;
1103 if (pcap_compile(&pc, &active_filter, *argv, 1, netmask) == 0)
1105 option_error("error in active-filter expression: %s\n", pcap_geterr(&pc));
1111 * noopt - Disable all options.
1117 BZERO((char *) &lcp_wantoptions[0], sizeof (struct lcp_options));
1118 BZERO((char *) &lcp_allowoptions[0], sizeof (struct lcp_options));
1119 BZERO((char *) &ipcp_wantoptions[0], sizeof (struct ipcp_options));
1120 BZERO((char *) &ipcp_allowoptions[0], sizeof (struct ipcp_options));
1126 * setdomain - Set domain name to append to hostname
1132 if (!privileged_option) {
1133 option_error("using the domain option requires root privilege");
1136 gethostname(hostname, MAXNAMELEN);
1139 strncat(hostname, ".", MAXNAMELEN - strlen(hostname));
1140 strncat(hostname, *argv, MAXNAMELEN - strlen(hostname));
1142 hostname[MAXNAMELEN-1] = 0;
1148 * setspeed - Set the speed.
1157 spd = strtol(arg, &ptr, 0);
1158 if (ptr == arg || *ptr != 0 || spd == 0)
1166 * setdevname - Set the device name.
1169 setdevname(cp, quiet)
1173 struct stat statbuf;
1174 char dev[MAXPATHLEN];
1179 if (strncmp("/dev/", cp, 5) != 0) {
1180 strlcpy(dev, sizeof(dev), "/dev/");
1181 strlcat(dev, sizeof(dev), cp);
1186 * Check if there is a device by this name.
1188 if (stat(cp, &statbuf) < 0) {
1189 if (errno == ENOENT || quiet)
1191 option_error("Couldn't stat %s: %m", cp);
1195 if (devnam_info.priv && !privileged_option) {
1197 option_error("device name cannot be overridden");
1201 strlcpy(devnam, sizeof(devnam), cp);
1202 default_device = FALSE;
1203 devnam_info.priv = privileged_option;
1204 devnam_info.source = option_source;
1211 * setipaddr - Set the IP address
1219 u_int32_t local, remote;
1220 ipcp_options *wo = &ipcp_wantoptions[0];
1223 * IP address pair separated by ":".
1225 if ((colon = strchr(arg, ':')) == NULL)
1229 * If colon first character, then no local addr.
1233 if ((local = inet_addr(arg)) == -1) {
1234 if ((hp = gethostbyname(arg)) == NULL) {
1235 option_error("unknown host: %s", arg);
1238 local = *(u_int32_t *)hp->h_addr;
1241 if (bad_ip_adrs(local)) {
1242 option_error("bad local IP address %s", ip_ntoa(local));
1246 wo->ouraddr = local;
1251 * If colon last character, then no remote addr.
1253 if (*++colon != '\0') {
1254 if ((remote = inet_addr(colon)) == -1) {
1255 if ((hp = gethostbyname(colon)) == NULL) {
1256 option_error("unknown host: %s", colon);
1259 remote = *(u_int32_t *)hp->h_addr;
1260 if (remote_name[0] == 0)
1261 strlcpy(remote_name, sizeof(remote_name), colon);
1264 if (bad_ip_adrs(remote)) {
1265 option_error("bad remote IP address %s", ip_ntoa(remote));
1269 wo->hisaddr = remote;
1277 * setnetmask - set the netmask to be used on the interface.
1288 * Unfortunately, if we use inet_addr, we can't tell whether
1289 * a result of all 1s is an error or a valid 255.255.255.255.
1295 b = strtoul(p, &endp, 0);
1298 if (b < 0 || b > 255) {
1300 /* accept e.g. 0xffffff00 */
1306 mask |= b << (n * 8);
1308 if (*p != '.' || n == 0)
1315 if (*p != 0 || (netmask & ~mask) != 0) {
1316 option_error("invalid netmask value '%s'", *argv);
1328 lcp_wantoptions[0].asyncmap |= 0x000A0000; /* escape ^S and ^Q */
1329 lcp_wantoptions[0].neg_asyncmap = 1;